text stringlengths 192 1.05M |
|---|
What is McAfee Anti-virus?
McAfee antivirus, also known as The security software SafeGuard, is a fantastic antivirus software. It works by simply scanning and distinguishing viruses, which can be computer attacks. It then assists to eliminate them utilizing a series of distinct methods.
One of the most important parts of anti-virus applications are the scanning of documents. The scanning method can either be through basic file scanning, which in turn identifies dangers, or it can be through more here a more advanced scanning method. McAfee antivirus uses the more advanced method of file scanning services.
In addition to these basic scanning features, anti-virus programs are usually able to protect you from other conditions that could appear when you down load files to your computer. This consists of but is not limited to virus and worm attacks. You will also become protected coming from spyware and spyware and adware infections.
Antivirus security software features a variety of several tools, like the ability to build personal fire wall rules. This protects you from not known websites that may make an effort to send you excess emails. Additionally, it enables you to scan a file prior to you down load it, so that it is automatically not downloaded if there is no factor to download it.
Files can also be found and removed with ease, since the anti-virus software is allowed to block and remove viruses from files on the harddisk. This can remove some of the likelihood of infections that can occur. However , if you want to use a more advanced variant of the software program, McAfee comes with an advanced edition of their Anti virus software that allows you to get rid of malware without removing documents. This advanced version in the program is called McAfee SafeGuard.
Web template SafeGuard, the antivirus software is able to study all types of data files. It has the ability to get both executable and distributed files and will remove malware and worms from these types of files. It might be able to focus on USB pushes and detachable storage devices. SafeGuard does have some unique features that make it a lot better than its simple antivirus software.
It has the capacity to quarantine data, which is a extremely important feature that numerous other anti-virus programs you don’t have. This characteristic allows data files to be properly taken off your computer. You need to use SafeGuard to protect your entire computer and protect your crucial files and documents. With SafeGuard, you will not worry about your documents being stolen.
Also you can use the software program to prevent computer system errors coming from occurring. You can utilize the software to create an anti-spyware policy to avoid spyware attacks. SafeGuard can also be used to encrypt files, that happen to be another important characteristic that many anti virus programs will not offer.
Yet , what you should keep in mind is the fact SafeGuard is not going to give you the same protection that you just would discover with a great antivirus course that is designed particularly for the LAPTOP OR COMPUTER. It will, nevertheless , provide you with enough protection to truly get you through a basic virus strike. Once the threat is gone, the software will be able to avoid any other issue that could happen.
Some people decide to protect all their PC with antivirus application because it really helps to prevent their computer via being infected by spyware and. When you are not able to open a file, or you find that a file is definitely corrupted, you should use the anti-virus program to aid fix it. Once the problem is set, you can then take advantage of the anti-virus software program to completely brush your registry.
There are a few malicious courses that will make an effort of stealing information through your PC and install these people onto an alternative computer. It will be possible to use the software program to scan your computer and delete any attacks that may be lurking. appear.
Just like many anti virus programs, McAfee ant-virus is becoming more complex every day. If you prefer a complete safety program, guarantee that you get the latest version of the computer software. |
Skip to main content
Advertisement
Are the effects of blood pressure lowering treatment diminishing?: meta-regression analyses
Article metrics
Abstract
Background
Previous studies have suggested that the effects of medical interventions tend to diminish over time. We investigated whether the effects of blood pressure lowering treatment on all-cause mortality and stroke have diminished over time.
Methods
We conducted meta-regression analyses. We extracted the target trials from two recently published comprehensive systematic reviews and meta-analyses. Adopted variables were relative risk (RR) of all-cause mortality and stroke, trial start year, mean age, sample size, baseline systolic blood pressure (SBP), difference in attained SBP reduction between intervention groups and control groups (SBP difference), and regional dummies. We implemented single meta-regressions, in which the dependent variable was the log of RR and the explanatory variable was each of other adopted variables. We also conducted multiple meta-regressions, in which the dependent variable was the log of RR and explanatory variables were all of other adopted variables. Our variable of greatest interest was trial start year.
Results
The included reviews assessed 85 trials with a total of 343,126 participants. Although trial start year was positively associated with the log of RR in the results of single meta-regressions, it lost significance in multiple meta-regressions for both all-cause mortality and stroke.
Conclusions
The effects of blood pressure lowering treatment on all-cause mortality and stroke have not diminished over time.
Background
Previous studies suggest that the effects of medical interventions tend to diminish over time [1,2,3,4,5,6,7]. For example, recent analyses using meta-regression of the relevant trials suggested that the effects of antidepressants and cognitive behavioral therapy as treatments for depression diminished over time [8,9,10,11]. Nevertheless, whether this diminishing phenomenon can be observed in other medical fields seems to be underexplored.
Given this, we investigated whether the effects of blood pressure lowering treatments on all-cause mortality and stroke have diminished over time. Numerous clinical trials and meta-analyses indicated that blood pressure lowering treatments lessen serious cardiovascular events and all-cause mortality [12, 13]. To our knowledge, however, it has not been sufficiently explored in previous studies whether the effect of blood pressure lowering treatment has changed over time.
Therefore, the objective of this study was to examine whether the effects of blood pressure lowering treatment on all-cause mortality and stroke have diminished over time.
Methods
Ideas for inclusion of trials
Although there are several systematic reviews and meta-analyses regarding the effects of blood pressure lowering treatment on cardiovascular diseases and mortality, the most recent and comprehensive we are aware of are Ettehad et al. [13], which was published in 2016, and Brunström and Carlberg [14], which was published in 2018.
The Ettehad paper included a whole range of randomized controlled trials on blood pressure lowering treatment. The authors searched MEDLINE from January 1, 1966 till July 7, 2015. They also searched the medical literature and identified trials till November 9, 2015. Their search strategy was compatible to that of Law et al. [12] and used search terms related to hypertension, blood pressure, major classes of blood pressure lowering drugs (for example, diuretics), and the specific names of blood pressure lowering drugs listed in the British National Formulary. The studies Ettehad et al. included had a minimum of 1000 patient-years of follow-up in each trial group. The paper selected trials which compared active drug treatment groups with control groups, which mostly used placebo. The paper also selected trials which compared groups with different blood pressure targets. Although the paper did not exclude trials based on the existence of comorbidities at baseline, they excluded trials in patients with heart failure or left ventricular dysfunction.
The Brunström and Carlberg paper identified previous systematic reviews on the effect of blood pressure lowering from PubMed, the Cochrane Database of Systematic Reviews, and the Database of Abstracts of Reviews of Effect. They identified trials by scrutinizing reference lists from relevant reviews. They additionally searched PubMed and Cochrane Central Register for Controlled Trials in order to find trials after November 1, 2015 up till February 2017. The Brunström and Carlberg paper included mostly the same type of trials as the Ettehad paper, except for the following points. Unlike the Ettehad paper, the Brunström and Carlberg paper excluded trials in the acute phase after myocardial infarction from meta-analysis. They also excluded trials they deemed to be at high risk of bias. Unlike the Ettehad paper, which required a minimum of 1000 patient-years of follow-up for each trial group, the Brunström and Carlberg paper required a minimum of 1000 patient-years of follow-up for the whole study sample. We constructed our dataset for meta-analysis and meta-regression by adopting the trials included in these two papers. We used the names of included trials as used in the Ettehad paper and/or the Brunström and Carlberg paper.
Data extraction
One of the authors (YS) extracted the following data from each trial: trial start year, sample size of trial (number of total participants), number of events (all-cause mortality and stroke), mean age at baseline, mean systolic blood pressure (SBP) at baseline, difference in SBP reduction between the two groups, SBP reduction from the baseline in each group, attained SBP in each group, and the region in which each trial was carried out.
As defined in both the Ettehad paper and the Brunström and Carlberg paper, stroke included fatal and non-fatal stroke and excluded transient ischemic attack (TIA). In addition to data on stroke as a whole, we aimed to extract data on its subtypes (e.g., cerebral infarction, cerebral hemorrhage, and subarachnoid hemorrhage) from each trial and, where possible, performed analyses based on the subtypes. In the process of data extraction, we found that several papers covered only fatal stroke or non-fatal stroke. For these papers, we recorded the cases shown in each paper. We also found that several papers included TIA in the number of cases, and exclusion of TIA was not possible. In these cases, we extracted the number of cases including TIA.
As the Ettehad paper showed the number of events (all-cause mortality and stroke) in its appendix, we compared our extraction results with those of the Ettehad paper. When there were differences, we explored the causes of the differences. This exploration revealed that some data were different from those in the Ettehad paper. Regarding all-cause mortality, there were three differences compared with the Ettehad paper (Supp. Figure 11 [13]). In PREVEND IT [15], we calculated the number of non-cardiovascular deaths from the indicated ratio and added them to the cardiovascular death number. In BBB [16], we could not extract all-cause mortality data because it was not indicated in the paper. In EWPHE [17], we used the number from the intention-to-treat analysis. Regarding stroke, there were five differences compared with the Ettehad paper (Supp. Figure 8 [13]). In PHARAO [18], we added hemorrhage. In Oslo [19], we added fatal subarachnoidal hemorrhage. In JATOS [20], we subtracted the number of TIA. In EWPHE [17], we used the numbers from the intention-to-treat analysis. In the Hunan Province study [21], we used the data indicated in the original publication.
Regarding the variable to identify when each trial was carried out, we used the data of trial start year. To extract the trial start year, we first checked the papers for each trial. When we could not find the trial start year, we checked ClinicalTrials.gov. When these did not work, we emailed the corresponding or first author of the original papers.
Differences in the attained SBP reduction between intervention groups and control groups (hereinafter, “SBP difference”) were determined in the following way. We retrieved three patterns of figures for SBP difference: (1) difference in SBP reduction between the two groups, (2) SBP reduction from the baseline in each group, and (3) attained SBP in each group. We prioritized (1) when reported. If (1) was not reported, we calculated the difference from (2). If neither (1) nor (2) were reported, we calculated the difference from (3). We used mean figures of the whole measurements when reported. When plural measurements were reported and mean figures were not reported, we calculated the mean of plural measurements. When only graphs of SBP transition were shown, we calculated the SBP levels using an online tool [22]. Regarding the Lewis study [23], SBP data were extracted from Black et al. [24]. In BBB [16], the number in each group was not mentioned, so we split the total amount (N = 2127) and assumed both groups included 1064 participants.
The regions in which trials were carried out were categorized as follows: Asia, Europe, North America, Oceania, South America, and mixed regions. Trials carried out in two or more regions were included in the mixed region category. Turkey and Israel were included in Europe.
Statistical analysis
The statistical analyses in this study were carried out in the following two steps. First, we conducted single meta-regressions, in which the dependent variable was the log RR of all-cause mortality or stroke and the explanatory variable was each of the extracted variables, namely trial start year, sample size, age, baseline SBP, SBP difference, and region (Model 1M for all-cause mortality and Model 1S for stroke). RR was calculated by dividing the risk of outcome events of intervention groups by the risk of outcome events of control groups. Risk of outcome events of each group was calculated by dividing the number of participants experiencing outcome events by the number of participants. With regard to the variable of region, there were several variables for regional dummies in the model, but we included it in the table of single meta-regression because they all belonged to the regional category.
Second, we conducted multiple meta-regressions, in which the dependent variable was the log RR and the explanatory variables were all of the abovementioned variables (Model 2M for all-cause mortality and Model 2S for stroke). We judged whether the effects of blood pressure lowering treatment on all-cause mortality and stroke have diminished over time from Model 2M and Model 2S. Diminishing was confirmed only when the variable of trial start year was significant at the 5% level.
When there was no event in either group in a trial, we added 0.5 to the number of events and the number of non-events in both groups before performing the meta-regressions. All analyses were performed using STATA 15 (Stata Corp., College Station, TX, USA). For meta-regressions, we used the “metareg” command [25], which estimates the random-effects model via the restricted maximum likelihood method.
For trials with three or more arms, we followed the classification performed in the Ettehad paper or the Brunström and Carlberg paper. The two papers defined the control group in the ONTARGET study [26] differently; here, we followed the Brunström and Carlberg paper’s classification.
Results
Number of trials and participants
The list of all trials in our study is shown in Additional file 1: Table S1. Data for trial start year, sample size, mean age, mean baseline SBP, mean SBP difference of each trial, and the region in which each trial was carried out are also shown in Additional file 1: Table S1. Outcome events and the number of participants of intervention groups and control groups are shown in Additional file 2: Table S2 for all-cause mortality and in Additional file 3: Table S3 for stroke.
A total of 85 trials were selected, representing 343,126 participants. Among these, there were 82 trials for all-cause mortality and 74 trials for stroke. Summary statistics of the trials are shown in Table 1.
Table 1 Summary statistics of the included trials
Results of meta-regressions for all-cause mortality
In Table 2, we reported the results of meta-regressions for all-cause mortality. The dependent variable was log RR of all-cause mortality. With the increase in RR, the effect of blood pressure lowering treatment is interpreted to decrease. In the table, exponentiated coefficients (exp(b)) instead of coefficients per se are reported. Exp(b) is the exponential of the unstandardized coefficient and shows a proportional change in RR per unit change in each explanatory variable. This makes more straightforward interpretation possible by denoting the multiplicative effects upon RR. If exp(b) is greater than 1, when the explanatory variable rises by one unit, RR increases (effect of blood pressure lowering treatment on all-cause mortality diminishes) by the ratio of exp(b) minus one. If exp(b) is smaller than 1, when the explanatory variable rises by one unit, RR falls (effect of blood pressure lowering treatment on all-cause mortality increases) by the ratio of one minus exp(b).
Table 2 Meta-regression analyses (Dependent variable: natural log of relative risk for all-cause mortality)
The results of single meta-regressions (Model 1M in Table 2), in which other explanatory variables were not adjusted for, are as follows. Regarding the trial start year, which was the explanatory variable of greatest interest, RR rose with the increase in trial start year; for every 10 years added to the trial start year, RR of all-cause mortality increased significantly by 5% (exp(b) = 1.05; 95% CI 1.02, 1.09; p = 0.004) in the case of no adjustment for other explanatory variables. For other explanatory variables, RR significantly grew with the rise in sample size and decreased with the enlarged SBP difference. RR was significantly lower in trials carried out in North America and Asia than in mixed region trials.
According to multiple meta-regression that included all of the explanatory variables, the association between trial start year and log RR of all-cause mortality lost significance (exp(b) = 1.05; 95% CI 0.99, 1.10; p = 0.078) after adjusting for other explanatory variables. Similarly, associations of log RR of all-cause mortality with sample size, SBP difference, and regional dummies for North America lost significance after adjusting for other explanatory variables. Trials in Asia still had a significantly lower log RR than mixed region trials after adjusting for other explanatory variables; RR of all-cause mortality of trials in Asia was 16% lower than mixed region trials (exp(b) = 0.84; 95% CI 0.73, 0.97; p = 0.020) after adjusting for other explanatory variables (Model 2M in Table 2).
As the trial start year variable was not significant at the 5% level in multiple meta-regression, we concluded that the effects of blood pressure lowering treatment on all-cause mortality have not diminished over time.
Results of meta-regressions for stroke
In Table 3, we reported the results of meta-regressions for stroke. The dependent variable was log RR of stroke. Results of single meta-regressions (Model 1S in Table 3), in which other explanatory variables were not adjusted for, are as follows. Regarding the trial start year which is the explanatory variable of greatest interest, RR rose with the increase in trial start year; for every 10 years added to the trial start year, RR of stroke grew significantly by 12% (exp(b) = 1.12; 95% CI 1.06, 1.19; p < 0.001) in the case of no adjustment for other explanatory variables. For other explanatory variables, RR significantly climbed with the rise in sample size and fell with the growing baseline SBP and SBP difference. RR was significantly lower in trials carried out in North America, Europe, and Asia than in mixed region trials.
Table 3 Meta-regression analyses (Dependent variable: natural log of relative risk for stroke)
According to multiple meta-regression that included all of the explanatory variables, the association between trial start year and log RR of stroke lost significance (exp(b) = 1.07; 95% CI 0.97, 1.19; p = 0.154) after adjusting for other explanatory variables. Similarly, associations of log RR of stroke with sample size, baseline SBP, and regional dummies for North America and Europe lost significance after adjusting for other explanatory variables. SBP difference still had a significant association with log RR; for every 10 mmHg increase in SBP difference, RR of stroke decreased significantly by 19% (exp(b) = 0.81; 95% CI 0.69, 0.94; p = 0.008) after adjusting for other explanatory variables. Trials in Asia still had a significantly lower log RR than mixed region trials after adjusting for other explanatory variables; RR of stroke for trials in Asia was 17% lower than mixed region trials (exp(b) = 0.83; 95% CI 0.70, 0.99; p = 0.042) after adjusting for other explanatory variables (Model 2S in Table 3).
As the trial start year variable was not significant at the 5% level in multiple meta-regression, we concluded that the effects of blood pressure lowering treatment on stroke have not diminished over time.
Regarding analyses by stroke subtypes, out of the 74 trials we covered, we found only five trials [20, 27,28,29,30] which indicated data based on ischemic type and hemorrhagic type. Hence, we discontinued our analyses of stroke subtypes.
Discussion
In this study, we investigated whether the effects of blood pressure lowering treatment on all-cause mortality and stroke have diminished over time by performing meta-regressions in which log RRs of the outcome events were the dependent variable and trial start year was the explanatory variable of greatest interest. Although trial start year was positively associated with log RR in the results of single meta-regressions, it lost significance in multiple meta-regressions which adjusted for mean age, sample size, baseline SBP, SBP difference, and regional dummies for both all-cause mortality and stroke. We concluded that the effects of blood pressure lowering treatment on all-cause mortality and stroke have not diminished over time from the results of the multiple meta-regressions.
In this study, we used the data of trial start year instead of year of publication as the variable to identify when each trial was performed. One problem in using data of trial start year was that some studies do not report this variable in published papers. Although we did our best to identify trial start year by checking the ClinicalTrials.gov website and emailing the corresponding authors, we were still unable to identify the trial start year for three trials. This may have caused some bias and/or lessened statistical power.
In this study, SBP difference (difference in attained SBP reduction between intervention groups and control groups) was not associated with risk reduction of all-cause mortality in multiple meta-regression. Although Ettehad et al. [13] indicated that there was a significant association between the extent of SBP reduction and improved RR outcome in all-cause mortality from single meta-regression analysis, and we also found similar results in our single meta-regression, the results gained from single meta-regression were not supported by multiple meta-regression analysis as done in this study. By contrast, our results on stroke, which showed that SBP difference was associated with a lower RR of stroke in both single and multiple meta-regressions, support and strengthen the findings of Ettehad et al. [13] and another meta-regression analysis [31].
In this study, trials in Asia showed significantly lower RR compared with mixed region trials in both all-cause mortality and stroke. Of the 11 trials carried out in Asia, six were from China, four from Japan, and one from Hong Kong and Japan. The reasons why such higher effects are shown in Asia need to be explored in future studies.
There are several limitations to this study. First, we included the trials covered by two recent comprehensive systematic reviews. Additional trials not covered by the included systematic reviews may alter these findings. Second, the definition of stroke varied among trials. Variation in definition may have caused biases in our meta-regression on stroke. Third, since most trials included participants with comorbidities, the trials covered in this study might be heterogeneous. Fourth, we assumed a linear relationship between log RRs and trial start year. This assumption may be questioned, and the analysis could be improved by better reflecting the behavior of the data when constructing the model. Fifth, adjusted R2 for multiple regressions was not large enough (68.9% for all-cause mortality and 79.8% for stroke), suggesting the possibility of other important factors which would substantially change the results of this paper.
Conclusions
The effects of blood pressure lowering treatment on all-cause mortality and stroke have not diminished over time.
Abbreviations
CI:
Confidence interval
RR:
Relative risk
SBP difference:
Difference in attained SBP reduction between intervention groups and control groups
SBP:
Systolic blood pressure
TIA:
Transient ischemic attack
References
1. 1.
Gehr BT, Weiss C, Porzsolt F. The fading of reported effectiveness. A meta-analysis of randomised controlled trials. BMC Med Res Methodol. 2006;6:25.
2. 2.
Protzko J, Schooler JW. Decline Effects. In: Lilienfeld SO, Waldman, editors. Psychological Science Under Scrutiny. West Sussex: Wiley-Blackwell; 2017. p. 85–107.
3. 3.
Baker R, Jackson D. Inference for meta-analysis with a suspected temporal trend. Biom J. 2010;52:538–51. https://doi.org/10.1002/bimj.200900307.
4. 4.
Ioannidis JPA. Evolution and translation of research findings: from bench to where. PLoS Clin Trials. 2006;1:e36. https://doi.org/10.1371/journal.pctr.0010036.
5. 5.
Dogo SH, Clark A, Kulinskaya E. Sequential change detection and monitoring of temporal trends in random-effects meta-analysis. Res Synth Methods. 2017;8:220–35. https://doi.org/10.1002/jrsm.1222.
6. 6.
Fanshawe TR, Shaw LF, Spence GT. A large-scale assessment of temporal trends in meta-analyses using systematic review reports from the Cochrane library. Res Synth Methods. 2017;8:404–15. https://doi.org/10.1002/jrsm.1238.
7. 7.
Trikalinos TA, Ioannidis J. Assessing the evolution of effect sizes over time. In: Rothstein HR, Sutton AJ, Borenstein M, editors. Publication bias in meta-analysis: prevention, assessment and adjustments. West Sussex: Wiley-Blackwell; 2005. p. 241–59.
8. 8.
Johnsen TJ, Friborg O. The effects of cognitive behavioral therapy as an anti-depressive treatment is falling: a meta-analysis. Psychol Bull. 2015;141:747–68. https://doi.org/10.1037/bul0000015.
9. 9.
Leucht S, Hierl S, Kissling W, Dold M, Davis JM. Putting the efficacy of psychiatric and general medicine medication into perspective: review of meta-analyses. Br J Psychiatry. 2012;200:97–106. https://doi.org/10.1192/bjp.bp.111.096594.
10. 10.
Jakobsen JC, Katakam KK, Schou A, Hellmuth SG, Stallknecht SE, Leth-Moller K, et al. Selective serotonin reuptake inhibitors versus placebo in patients with major depressive disorder. A systematic review with meta-analysis and Trial sequential analysis. BMC Psychiatry. 2017;17:58. https://doi.org/10.1186/s12888-016-1173-2.
11. 11.
Cipriani A, Furukawa TA, Salanti G, Chaimani A, Atkinson LZ, Ogawa Y, et al. Comparative efficacy and acceptability of 21 antidepressant drugs for the acute treatment of adults with major depressive disorder: a systematic review and network meta-analysis. Lancet. 2018;391:1357–66. https://doi.org/10.1016/s0140-6736(17)32802-7.
12. 12.
Law MR, Morris JK, Wald NJ. Use of blood pressure lowering drugs in the prevention of cardiovascular disease: meta-analysis of 147 randomised trials in the context of expectations from prospective epidemiological studies. 2009;338:BMJ. https://doi.org/10.1136/bmj.b1665.
13. 13.
Ettehad D, Emdin CA, Kiran A, Anderson SG, Callender T, Emberson J, et al. Blood pressure lowering for prevention of cardiovascular disease and death: a systematic review and meta-analysis. Lancet. 2016;387:957–67. https://doi.org/10.1016/s0140-6736(15)01225-8.
14. 14.
Brunström M, Carlberg B. Association of Blood Pressure Lowering with Mortality and Cardiovascular Disease across Blood Pressure Levels: a systematic review and meta-analysis. JAMA Intern Med. 2018;178:28–36. https://doi.org/10.1001/jamainternmed.2017.6015.
15. 15.
Asselbergs FW, Diercks GF, Hillege HL, van Boven AJ, Janssen WM, Voors AA, et al. Effects of fosinopril and pravastatin on cardiovascular events in subjects with microalbuminuria. Circulation. 2004;110:2809–16. https://doi.org/10.1161/01.CIR.0000146378.65439.7A.
16. 16.
Hansson L. The BBB study: the effect of intensified antihypertensive treatment on the level of blood pressure, side-effects, morbidity and mortality in “well-treated” hypertensive patients. Blood Press. 1994;3:248–54. https://doi.org/10.3109/08037059409102265.
17. 17.
Amery A, Berthaux P, Birkenhäger W, Boel A, Brixko P, Bulpitt C, et al. Antihypertensive therapy in patients above age 60 years (fourth interim report of the European working party on high blood pressure in elderly: EWPHE). Clin Sci. 1978;55:263s–70s. https://doi.org/10.1042/cs055263s.
18. 18.
Luders S, Schrader J, Berger J, Unger T, Zidek W, Bohm M, et al. The PHARAO study: prevention of hypertension with the angiotensin-converting enzyme inhibitor ramipril in patients with high-normal blood pressure: a prospective, randomized, controlled prevention trial of the German hypertension league. J Hypertens. 2008;26:1487–96. https://doi.org/10.1097/HJH.0b013e3282ff8864.
19. 19.
Helgeland A. Treatment of mild hypertension: a five year controlled drug trial. The Oslo study Am J Med. 1980;69:725–32.
20. 20.
Jatos Study Group. Principal results of the Japanese trial to assess optimal systolic blood pressure in elderly hypertensive patients (JATOS). Hypertens Res. 2008;31:2115. https://doi.org/10.1291/hypres.31.2115.
21. 21.
Sun M, Zhou H, Jia Z. Prevention and treatment of stroke after hypertension for ten years in Hunan Province. Zhonghua Nei Ke Za Zhi. 1997;36:312–4.
22. 22.
Rohatgi A. WebPlotDigitizer. 2018. https://automeris.io/WebPlotDigitizer. Accessed 3 Aug 2018.
23. 23.
Lewis EJ, Hunsicker LG, Bain RP, Rohde RD. The effect of angiotensin-converting-enzyme inhibition on diabetic nephropathy. The Collaborative Study Group. N Engl J Med. 1993;329:1456–62. https://doi.org/10.1056/nejm199311113292004.
24. 24.
Black HR, editor. Clinical trials in hypertension. New York: Marcel Dekker Inc; 2001.
25. 25.
Harbord RM, Higgins J. Meta-regression in Stata. Stata J. 2008;8:493–519.
26. 26.
The ONTARGET Investigators. Telmisartan, Ramipril, or both in patients at high risk for vascular events. N Engl J Med. 2008;358:1547–59. https://doi.org/10.1056/NEJMoa0801317.
27. 27.
Yusuf S, Diener HC, Sacco RL, Cotton D, Ounpuu S, Lawton WA, et al. Telmisartan to prevent recurrent stroke and cardiovascular events. N Engl J Med. 2008;359:1225–37. https://doi.org/10.1056/NEJMoa0804593.
28. 28.
The SPS3 Study Group. Blood-pressure targets in patients with recent lacunar stroke: the SPS3 randomised trial. Lancet. 2013;382:507–15. https://doi.org/10.1016/S0140-6736(13)60852-1.
29. 29.
PROGRESS Collaborative Group. Randomised trial of a perindopril-based blood-pressure-lowering regimen among 6105 individuals with previous stroke or transient ischaemic attack. Lancet. 2001;358:1033–41. https://doi.org/10.1016/S0140-6736(01)06178-5.
30. 30.
Yusuf S, Healey JS, Pogue J, Chrolavicius S, Flather M, Hart RG, et al. Irbesartan in patients with atrial fibrillation. N Engl J Med. 2011;364:928–38. https://doi.org/10.1056/NEJMoa1008816.
31. 31.
Thomopoulos C, Parati G, Zanchetti A. Effects of blood pressure lowering on outcome incidence in hypertension. 1. Overview, meta-analyses, and meta-regression analyses of randomized trials. 2014;32:2285–95. https://doi.org/10.1097/HJH.0000000000000378.
Download references
Acknowledgements
The authors would like to thank Yoshiko Mizuno and Kazuhiro Uchimura for their invaluable help with the manuscript.
Funding
This work was supported by the Research Institute of Economy, Trade and Industry, Japan. The institute had no role in the study design, data analyses, decision to publish, or preparation of the manuscript.
Availability of data and materials
All data generated or analyzed during the current study are included in this published paper and its additional files.
Author information
YS and YK drafted the manuscript. YS extracted the data. YK performed the analyses. All authors read, provided feedback and approved the final manuscript.
Correspondence to Yoichi Sekizawa.
Ethics declarations
Ethics approval and consent to participate
Not applicable.
Consent for publication
Not applicable.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Additional files
Additional file 1:
Table S1. Summary of Included Trials. (DOCX 31 kb)
Additional file 2:
Table S2. Summary of Outcome Events on All-cause Mortality. (DOCX 28 kb)
Additional file 3:
Table S3. Summary of Outcome Events on Stroke. (DOCX 28 kb)
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
Reprints and Permissions
About this article
Verify currency and authenticity via CrossMark
Cite this article
Sekizawa, Y., Konishi, Y. & Kimura, M. Are the effects of blood pressure lowering treatment diminishing?: meta-regression analyses. Clin Hypertens 24, 16 (2018) doi:10.1186/s40885-018-0101-9
Download citation
Keywords
• Blood pressure lowering treatment
• Temporal trend
• Diminishing effect
• All-cause mortality
• Stroke
• Meta-regression |
The Community Forums
Interact with an entire community of cPanel & WHM users!
1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
Rate-limiting outgoing e-mail
Discussion in 'E-mail Discussions' started by danf, Feb 6, 2009.
1. danf
danf Active Member
Joined:
Apr 10, 2006
Messages:
26
Likes Received:
0
Trophy Points:
151
I would like to help prevent rogue scripts from sending out spam. I found this option in WHM:
The maximum each domain can send out per hour (0 is unlimited)
But, since this is implemented in /etc/exim.pl, it simply drops any messages over the rate limit. This is a bit drastic, especially since the messages are not recoverable, even if they are legitimate.
Is there a way to tell Exim to freeze any messages over the rate limit instead? Then I could have a script that checks for frozen messages, and they could be investigated.
Thanks.
2. kernow
kernow Well-Known Member
Joined:
Jul 23, 2004
Messages:
896
Likes Received:
12
Trophy Points:
168
cPanel Access Level:
Root Administrator
3. ethical
ethical Well-Known Member
Joined:
Apr 7, 2009
Messages:
83
Likes Received:
2
Trophy Points:
58
kernow, and exactly how does CSF do anything of the sort of what the OP asked? That is mostly a reporting and logging tool? If you know how why not just say it for the help of everyone?
Further to this discussion, I think the answer lies in the below code in exim.pl
Code:
#logsmtpbw here
my $now = time();
$domain =~ s/[^\w\.\-]//g;
#we just can't trust user input
my $message_size = Exim::expand_string('$message_size');
if ($domain ne "") {
my $maxmails = 0;
open(CF,"/var/cpanel/cpanel.config");
while(<CF>) {
next if (/^#/);
s/\n//g;
my($var,$value) = split(/=/, $_);
if ($var eq "maxemailsperhour") {
$maxmails = int($value);
}
}
close(CF);
open(CPM,"/var/cpanel/maxemails");
while(<CPM>) {
s/\n//g;
my($mdomain,$mmax) = split(/=/);
if ($mdomain eq $domain) {
$maxmails = int($mmax);
}
}
close(CPM);
if ($maxmails > 0) {
my $nummailsinhour = readbacktodate("/usr/local/apache/domlogs/$domain-smtpbytes_log");
if ($nummailsinhour > $maxmails) {
die "Domain $domain has exceeded the max emails per hour. Message discarded.\n";
}
}
so the part i would assume that needs changing is the last if statement.
can anyone advise as to how to change that IF so that mails are queue and not killed?
Thanks
John
4. !@#$*?!
!@#$*?! Guest
Anyone ever find a solution to this? I've read up on the online spec for exim but can't seem to make it work. (exim queue keeps crashing).
Loading...
Share This Page |
Author: How It Works Team
How do sunglasses protect your eyes?
Reaching for our sunglasses on a bright, sunny day is second nature; we all know that spending time in the Sun puts us at risk of eye damage and no one enjoys a squinting-induced headache....
What if the bees died out?
Dogs might be man’s best friend but bees are our lifeline. A single bee makes a measly one-twelfth of a teaspoon of honey during its lifetime, but losing the sweet stuff is the least... |
The effects of changing dairy intake on trans and saturated fatty acid levels- results from a randomized controlled study
• Jocelyne R Benatar1, 2Email author and
Affiliated with
• Ralph AH Stewart1
Affiliated with
Nutrition Journal201413:32
DOI: 10.1186/1475-2891-13-32
Received: 26 November 2013
Accepted: 28 March 2014
Published: 3 April 2014
Abstract
Background
Dairy food is an important natural source of saturated and trans fatty acids in the human diet. This study evaluates the effect of dietary advice to change dairy food intake on plasma fatty acid levels known to be present in milk in healthy volunteers.
Methods
Twenty one samples of whole fat dairy milk were analyzed for fatty acids levels. Changes in levels of plasma phospholipid levels were evaluated in 180 healthy volunteers randomized to increase, not change or reduce dairy intake for one month. Fatty acids were measured by gas chromatography–mass spectrometry and levels are normalized to d-4 alanine.
Results
The long chain fatty acids palmitic (13.4%), stearic (16.7%) and myristic (18.9%) acid were most common saturated fats in milk. Four trans fatty acids constituted 3.7% of the total milk fat content. Increased dairy food intake by 3.0 (± 1.2) serves/ day for 1 month was associated with small increases in plasma levels of myristic (+0.05, 95% confidence level-0.08 to 0.13, p = 0.07), pentadecanoic (+0.014, 95% confidence level -0.016 to 0.048, p = 0.02) and margaric acid (+0.02, -0.03 to 0.05, p = 0.03). There was no significant change in plasma levels of 4 saturated, 4 trans and 10 unsaturated fatty acids. Decreasing dairy food intake by 2.5 (± 1.2) serves per day was not associated with change in levels of any plasma fatty acid levels.
Conclusion
Dietary advice to change dairy food has a minor effect on plasma fatty acid levels.
Trial registration
ACTRN12612000574842.
Keywords
Trans fatty acids Saturated fatty acids Dairy food Vaccenic acid Palmitelaidic acid Randomized controlled study
Background
A healthy diet is important to reduce the risk of cardiovascular disease [1] and diabetes [2]. In observational studies, high intake of saturated [3] and trans fatty acids [4] and low intake of polyunsaturated fats [5] is associated with increased cardiovascular risk. Studies also suggest that increased plasma levels of trans [6] and saturated [7] fatty acids are associated with increased risk of cardiovascular disease. Plasma levels of trans, odd-numbered saturated and polyunsaturated (n-3 and n-6) fatty acids reflect dietary intake as these are not endogenously synthesized [8]. The aim of dietary advice to reduce intake of foods with saturated fats and TFA is to reduce plasma levels of ‘harmful’ fats and increase levels of ‘beneficial’ polyunsaturated fats.
Dairy food is a highly complex food comprised of constituents thought to be both harmful and beneficial for cardiovascular health. It is the most abundant source of animal fat in the diet including saturated fats and ‘naturally occurring’ ruminant trans fatty acids (rTFA) [8]. It is rich in in long chain saturated fatty acids such as myristic and palmitic acids; thought to be harmful for cardiovascular health [9]. However, dairy food also contains unsaturated, short and medium chain saturated fatty acids thought to be beneficial for heart health [10, 11]. Whilst industrial trans fatty acids are considered harmful, the effects of trans fatty acids from dairy on cardiovascular health is less clear [12]. Some studies suggest rTFA may be beneficial to health [13] but others suggest a neutral effect [14, 15]. These assumptions are based on the premise that certain trans fatty acids, like vaccenic acid, are exclusively from dairy [16], and others like elaidic acid are exclusively industrial [17].
This inconsistent data on the health effects of dairy [1820] has led to confusing messages for consumers. Cardiovascular guidelines recommend avoidance of dairy fat [18, 21] but others recommend at least 3–4 servings of dairy food per day [19].
No randomized studies have assessed the effects of changing dairy food intake in the real world on rTFA, saturated and polyunsaturated fatty acid levels. Consumers change intake of whole food rather than a specific fat. This study is designed to see whether changes in whole food result in significant changes in fatty acid levels. In this study, we analyzed the composition of fatty acid in dairy food in New Zealand. We then evaluated the effects of dietary advice to increase, decrease or not change daily dairy food intake for one month on plasma fatty acid levels in a randomized clinical trial with180 healthy volunteers.
Methods
Randomized study
A more detailed description of the randomized study , and effects of dietary intervention on cardio-metabolic risk factors have been reported previously [20]. Healthy volunteers (n = 180) living in Auckland, New Zealand regularly consuming dairy and who were willing to modify dairy intake for one month were recruited by advertisement from February 2011 to September 2011. Exclusion criteria included inability to tolerate dairy food, known diabetes, cardiovascular disease, inflammatory conditions, currently taking any lipid or glucose modifying medication and age ≤18 years. Ethics approval was obtained from the Northern X Ethics Committee and all participants provided written informed consent.
Participants were instructed to fast for 10 hours prior to clinic visits. Blood samples were collected in ethylene-diamine-tetra acetic acid tubes on all participants at baseline and after one month. Plasma was separated in a 4°Celsius centrifuge within 20 minutes of the blood draw and stored at -80°Celsius in nunc tubes until analysis.
Participants were randomized by a computer generated randomization algorithm to one of three possible arms; increased dairy (n = 60), reduced dairy (n = 60) or no change (n = 60) for 1 month. Participants were given advice on how to change dairy intake including written diet sheets. Participants randomized to increased dairy were asked to increase intake of full fat dairy food by more than three servings a day. Those asked to reduce dairy food were asked to eliminate dairy food and red meat as much as possible from the diet. This was to ensure that participants did not increase uptake of alternative sources of ruminant trans fatty acids. A follow-up assessment was arranged for one month. The National Cancer Institute Diet History Questionnaire [22], a validated food frequency questionnaire, was used to assess all dairy and red meat intake during the preceding 3 days at baseline and 1 month.
Milk samples
Seven brands of whole (3.3% fat) cow’s milk were purchased in April 2011. These included homogenised, non-homogenised, organic and non-organic brands. Three samples of each brand were collected (total n = 21), decanted into nunc tubes and stored at -800 Celsius until analysis. Fasting blood samples were taken in ethylene-diamine-tetra acetic acid tubes. Plasma was separated and stored at -70°Celsius until analysis.
Analysis of milk and plasma
Phospholipids analysis of milk and plasma was performed at the School of Biological Science, Auckland University. Total lipids were extracted with AR Methanol and fatty acid methyl esters formed by transmethylation. Fatty composition was assessed by gas chromatography–mass spectrometry (Hewlett Packard 6890 Gas Chromatograph with an SGE BPX70 column and a Flame Ionisation Detector. Peaks were normalised to d4-analine.
The coefficient of variation for each fatty acids at this laboratory is added to Table 1.
Table 1
Fatty acids in milk and in human plasma at baseline
Levels in whole fat milk N = 21
Coefficient of variation (%) milk
Plasma levels in humans at baseline
Coefficient of variation (%) plasma
Trans fatty acids
Fumaric acid (C4:1n2t)
0.059 (0.004)
0.071
ND
ND
Palmitelaidic acid(C16:1n7t)
0.007 (0.009)
1.292
0.022 (0.031)
1.593
Vaccenic acid (C18:1n7t)
0.334 (0.183)
0.551
0.458 (0.210)
0.465
Myristelaidic acid (C17:1n9t)
0.041 (0.006)
0.153
0.073 (0.313)
4.012
Saturated fats
Caprylic acid (C8:0)
0.791 (0.213)
0.265
0.005 (0.003)
0.583
Capric acid (C10:0)
1.293 (0.347)
0.248
0.015 (0.019)
1.44
Lauric acid (C12:0)
1.520 (0.474)
0.322
0.034 (0.054)
1.633
Tridecylic acid (C13:0)
0.018 (0.003)
0.136
ND
ND
Myristic acid (C14:0)
1.996 (0.345)
0.179
0.262 (0.131)
0.476
Pentadecanoic acid (C15:0)
0.167 (0.088)
0.532
0.084 (0.032)
0.374
Palmitic acid (C16:0)
1.767 (0.265)
0.153
2.221 (0.635)
0.301
Margaric acid (C17:0)
0.122 (0.014)
0.824
0.160 (0.077)
0.534
Stearic acid (C18:0)
1.415 (0.137)
0.099
1.966 (0.548)
0.336
Arachidic acid (C20:0)
0.016 (0.002)
0.133
0.013 (0.004)
3.587
Lignoceric acid (C23:0)
0.006 (0.001)
0.224
ND
ND
Polyunsaturated fats
Eicosatetraenoic acid (C20:4n8c,11c,14c,17c)
0.018 (0.003)
0.142
0.231 (0.868)
0.73
Linoleic acid (C18:2n9c,12c)
0.160 (0.012)
0.615
0.789 (0.373)
0.564
gamma-Linolenic acid (C18:3n6c,9c,12c)
0.176 (0.038)
0.222
0.076 (0.097)
1.230
Eicosadienoic acid (C20:2n11c,14c)
0.002 (0.002)
0.412
0.041 (0.017)
0.489
Arachidonic acid (C20:4n5c,8c,11c,14c)
0.020 (0.006)
0.285
0.556 (0.146)
0.283
Cervonic acid (C22:6n4c,7c,10c,13c,16c,19c)
0.024 (0.004)
0.283
0.381(0.132)
0.374
Monounsaturated fats
Myristoleic acid (C14:1n9c)
0.12 (0.04)
0.33
ND
ND
Palmitoleic acid (C16:1n9)*
0.106 (0.026)
0.18
0.081(0.055)
0.53
Oleic acid (C18:1n9c)*
0.898 (0.085)
0.10
0.69(0.21)
0.32
Gondoic acid (C20:1n11c)*
0.004 (0.004)
0.78
ND
ND
Units are levels normalized to d4- alanine. Results are mean (standard deviation). The coefficient of variation for each plasma fatty acid is also listed.
ND = not detected.
*Monounsaturated fatty acids.
Definitions
The United States Department of Agriculture criteria [23] were used to define serving size. For example one serving size was equivalent to 250 ml 3% milk, 250 ml yogurt, 500 ml 1.5% milk or 1/3 cup cheddar cheese. The total dairy fat content ingested in g/day was calculated based on the reported intakes of each food, and the fat content from manufacturers’ labels [24].
Saturated fatty acids were defined as short chain (aliphatic tails of2 < 6 carbons), medium chain (aliphatic tails of 6–12 carbons), long chain (aliphatic tails of 13–21 carbons), and very long chain (aliphatic tails of >21 carbons) [25].
Statistical analysis
Baseline and one month visit levels of fatty acids and change in these measurements between baseline and one month were summarized as median and interquartile range. A 30% difference in vaccenic acid levels was expected to be seen with the intervention. Sixty in each group was estimated to give 80% power to detect a treatment difference with a two-sided 0.05 significance level, if the true difference in between the treatments is 1.5.
Analysis was done only on those participants who completed the study, as no measurable outcomes were available on those who did not return at one month. Baseline characteristics and scores were compared across the three arms using the analysis of variance (ANOVA). Analysis of covariance (ANCOVA) was used to determine if there were significant differences in fatty acid values between the three dairy groups [26]. ANCOVA was conducted on the follow up values adjusting for the baselines values. For the few variables that did not meet the ANCOVA assumptions [27], ANOVA was used to determine significant differences in follow-up values between the three dairy groups. Secondary analysis was performed to determine differences within randomized groups using ANOVA. Statistical analyses were performed with SAS software version 9.3 (SAS Institute, Cary, NC).
To adjust for multiplicity testing the Bonferroni method was used [28].
Ethics approval
NTX/10/11/15 (Northern X ethics committee, Auckland, New Zealand).
Results
Fatty acids in milk
3.3% whole fat milk contained 90% saturated fats, 3.7% TFA and 5.3% unsaturated fats (Table 1). The most common saturated fats were the medium chain lauric acid 12.3 (SD 4.7)%, and long chain palmitic acid 14.3 (SD 5.8)% and myristic acid 16.1 (SD 3.5)%. Vaccenic acid was the most plentiful rTFA (2.8% of milk fat), and oleic acid is the most common unsaturated fat (Figure 1).
http://static-content.springer.com/image/art%3A10.1186%2F1475-2891-13-32/MediaObjects/12937_2013_762_Fig1_HTML.jpg
Figure 1
Fatty acids found in New Zealand milk. Plasma fatty acids are measured by mass spectrometry and normalized to d-4 alanine.
Randomized study
176 of 180 randomized participants completed the study. Baseline characteristic are presented in Table 2. The mean age of the population was 47 (IQR: 38–55) years and 70% of the participants were female. The average body mass index was 24.5 (SD 4.0) and participants were normotensive with an average blood pressure (BP) 110/70 (SD10/8) mmHg. There were no significant differences in baseline characteristics by dietary group.
Table 2
Baseline characteristics according to randomized group
Reduced dairy intake
Same dairy intake
Increased dairy intake
N
60
60
60
Female (%)
62
66
63
Age (years)
48.6 (12.0)
45.3 (12.4)
46.3 (10.5)
Heart rate (Beats per minute)
63.7 (8.2)
63.0 (9.1)
64.1 (8.6)
Systolic blood pressure
116.6 (12)
114.2 (10)
113.9 (11)
Diastolic blood pressure
70.3 (9)
70.0 (8)
70.2 (8)
Waist circumference (cm)
84.2 (12.3)
83.2 (12.6)
84.3 (9.8)
Hip circumference(cm)
100.1 (8.8)
100.8 (10.1)
101.7 (7.1)
BMI
24.2 (4.0)
24.8 (4.0)
24.6 (4.1)
TC (mmol/L)
5.31 (0.97)
5.13 (0.98)
5.15 (0.93)
HDL (mmol/L)
1.70 (0.42)
1.68 (0.47)
1.68 (0.48)
LDL (mmol/L)
3.12 (0.88)
2.97 (0.86)
2.98 (0.78)
TG (mmol/L)
1.12 (0.81)
1.12 (0.72)
1.04 (0.64)
Insulin resistance (HOMA)
1.38 (0.82)
1.43 (1.08)
1.47 (1.1)
Results are mean (standard deviation) and P > 0.03 for all.
Change in dairy food intake assessed by the FFQ across all three groups was significant (p < 0.001). For the increased dairy food diet this was +3.0 (1.2) serves/day, p < 0.001, no change was -0.6 (0.2) serves/day, p = 0.78 and for decreased dairy diet -2.5 (1.2) serves/day, p < 0.001. The total difference between those asked to increased and reduced dairy food intake was 5.5 (SD1.4) serves per day, p < 0.001. Change in dairy fat for the reduced dairy diet was -10.4 (10.1) g/day, no change was -3.4 (7.9) g/day, and increased dairy was +12.5 (15.7) g/day, p < 0.001. There was no significant change in intake of food from ruminant sources such as meat or goat milk and cheese by randomized group.
The effect of changing dairy food intake on plasma fatty acid levels is displayed in Tables 3 and 4. There was no significant change in TFA between randomized groups. In those randomized to decrease dairy food intake, there was no significant change in fatty acid levels compared to the control group. In those randomized to increase dairy food intake, plasma levels of pentadecanoic (p = 0.02) and margaric acid (p = 0.03) increased compared to the control group. When comparison was made between increased and decreased dairy food intake (Figure 2), there was an increase in caprylic, myristic, pentadecanoic and margaric acid. Other long chain and medium chain saturated fats did not change significantly. After adjustment for multiple testing, change in pentadecanoic acid levels between increased and reduced dairy intake remained significant (p = 0.02). However, change in other fatty acid levels was no longer significant.
Table 3
The difference across the three dairy groups using ANCOVA
Trans fatty acid
Reduced dairy intake
Same dairy intake
Increased dairy intake
Across all three groups P
Reduced vs. same P
Same vs. increased P
Vaccenic acid
Baseline
0.50
0.51
0.51
(0.32 to 0.63)
(0.36 to 0.61)
(0.37 to 0.61)
1 month
0.54
0.49
0.50
(0.40 to 0.64)
(0.36 to 0.60)
(0.36 to 0.68)
Change
0.05
-0.03
-0.04
0.74
0.24
0.31
(-0.14 to 0.16)
(-0.23 to 0.26)
(-0.22 to 0.30)
Myristelaidic acid
Baseline
0.018
0.018
0.018
(0.015 to 0.024)
(0.013 to 0.023)
(0.015 to 0.023)
1 month
0.019
0.018
0.018
(0.015 to 0.024)
(0.015 to 0.023)
(0.015 to 0.023)
Change
0.001
0.001
0.001
0.79
0.91
0.26
(-0.003 to 0.005)
(-0.004 to 0.005)
(-0.004 to 0.005)
Saturated Fatty Acid
Myristic acid
Baseline
0.22
0.24
0.25
(0.17 to 0.30)
(0.18 to 0.32)
(0.19 to 0.33)
1 month
0.25
0.24
0.29
(0.19 to 0.33)
(0.203 to 0.32)
(0.22 to 0.36)
Change
0.01
0.01
0.05
0.39
1.00
0.07
(-0.05 to 0.1)
(-0.08 to 0.09)
(-0.08 to 0.13)
Palmitic Acid
Baseline
2.33
2.32
2.20
(1.88 to 2.75)
(1.97 to 2.70)
(1.96 to 2.64)
1 month
2.43
2.34
2.51
(2.09 to 2.89)
(1.97 to 2.91)
(2.06 to 2.93)
Change
-0.52
0.42
1.37
0.79
0.47
0.42
(-0.51 to 0.90)
(-0.47 to 0.62)
(-0.41 to 9.37)
Stearic acid
Baseline
1.98
1.98
1.97
(1.77 to 2.21)
(1.84 to 2.15)
(1.76 to 2.24)
1 month
2.12
2.15
2.12
(1.88 to 2.35)
(1.91to 2.39)
(1.83 to 2.4)
Change
+0.05
+0.17
+0.13
0.84
0.56
0.41
(-0.27 to 0.48)
(-0.10 to 0.52)
(-0.32 to 0.56)
Pentadecanoic acid
Baseline
0.084
0.084
0.085
(0.072 to 0.101)
(0.076 to 0.120)
(0.070 to 0.101)
1 month
0.079
0.085
0.098
(0.054 to 0.088)
(0.068 to 0.104)
(0.078 to 0.120)
Change
-0.006
-0.00
+0.014
0.11
0.33
0.02
(-0.015 to 0.00)
(-0.015 to 0.017)
(-0.016 to 0.048)
Margaric acid
Baseline
0.17
0.17
0.16
( 0.12 to 0.22)
( 0.12 to 0.21)
( 0.09 to 0.21)
1 month
0.15
0.17
0.18
( 0.08 to 0.19)
( 0.08 to 0.18)
(0.14 to 0.24)
Change
-0.02
-0.001
+0.02
0.95
0.54
0.03
( -0.09 to 0.03)
( -0.08 to 0.02)
(-0.03 to 0.05)
ANCOVA was used unless assumptions were not met. ANOVA was used for all others (Table 4) Fatty acids are standardized to d4- alanine and presented as median (interquartile range).
Table 4
The difference across the three dairy groups using ANOVA for those fats who did not meet the assumptions for ANCOVA
Trans fatty acid
Reduced dairy intake
Same dairy intake
Increased dairy intake
P value
Palmitelaidic acid
Baseline
0.033
0.04
0.02
(0.00 to 0.45)
(0.00 to 0.43)
(0.00 to 0.32)
1 month
0.049
0.039
0.034
(0.00 to 0.50)
(0.00 to 0.49)
(0.01 to 0.39)
Change
0.00
0.00
0.00
0.96
(-0.09 to 0.09)
(-0.27 to 0.22)
(-0.07 to 0.14)
Linoelaidic acid
Baseline
0.000
0.000
0.000
(0.000 to 0.0296)
(0.000 to 0.026)
(0.001 to 0.018)
1 month
0.000
0.000
0.000
(0.000 to 0.0233)
(0.000 to 0.0274)
(0.000 to 0.033)
Change
0.000
0.000
0.000
0.53
(-0.010 to 0.000)
(-0.014 to 0.016)
(0.000 to 0.018)
Saturated fats
Lauric acid
Baseline
0.025
0.026
0.025
(0.000 to 0.039)
(0.000 to 0.043)
(0.000 to 0.042)
1 month
0.030
0.026
0.036
(0.000 to 0.056)
(0.000 to 0.041)
(0.025 to 0.052)
Change
0.00
0.000
0.012
0.12
(-0.011 to 0.027)
(-0.022 to 0.024)
(-0.005 to 0.024)
http://static-content.springer.com/image/art%3A10.1186%2F1475-2891-13-32/MediaObjects/12937_2013_762_Fig2_HTML.jpg
Figure 2
Change in plasma levels of fatty acids with a high dairy compared to a low dairy food diet. Results are expressed as a standard mean difference. This graph shows that increasing dairy food intake compared to the control group (no change) relatively increases plasma levels of caprylic, myristic, pentadecanoic and margaric acid, but has no effect on other fatty acids. However when correcting for multiplicity testing; only the change in pentadecanoic acid remained significantly different between high and low dairy diets.
There was no significant change in total saturated fats for increased dairy diet +13.1 (95% confidence interval (CI) -1.2 to + 25.3)%, same dairy diet +2.4 (95% CI -9.2 to +11.3)% or decreased dairy diet +3.5 (95% CI -5.5 to +11.6)%. The FFQ indicated that participants randomized to reduce dairy food intake switched to rice, almond and soy milk products.
Change within randomized groups was then analyzed. There was no significant change in total rTFA for increased dairy diet -5.5% (95% CI -15.4 to +10.2 )%, same dairy diet -9.1(95% CI -20 to +1.2)%, and decreased dairy diet +10.1 (95% CI -2.4 to +22.5)%. Levels of the individual trans fatty acid isomers, vaccenic acid, palmitelaidic acid and myristelaidic acid also did not change. Pentadecanoic (15:0), myristic (14:0) and margaric (heptadecanoic (17:0)) acid increased with increased dairy intake (p = 0.02 and 0.03 respectively); however, there was no significant change for reduced dairy intake.
Figure 3 shows associations between levels of milk fatty acids and effects of increasing dairy food intake on plasma levels of fatty acids. Figure 4 shows associations between levels of milk fatty acids and effects of reducing dairy food intake on plasma levels of fatty acids. Change in plasma levels of fatty acid isomers did not correlate with the amount of that fatty acid in dairy food. For example, myristic acid and palmitic acid were the most plentiful saturated fats in milk, but changing dairy food intake did not correlate with change in plasma levels.
http://static-content.springer.com/image/art%3A10.1186%2F1475-2891-13-32/MediaObjects/12937_2013_762_Fig3_HTML.jpg
Figure 3
Correlation between fatty acid levels in milk and change in plasma fatty acid levels in those participants asked to increase dairy food intake. Results are mean levels and are normalized to d4 alanine.
http://static-content.springer.com/image/art%3A10.1186%2F1475-2891-13-32/MediaObjects/12937_2013_762_Fig4_HTML.jpg
Figure 4
Correlation between fatty acid levels in milk and change in plasma fatty acid levels in those participants asked to decrease dairy food intake. Results are mean levels and are normalized to d4 alanine.
Discussion
Dairy food is the richest natural source of ‘harmful’ fats like long chain saturated and trans fatty acid in the diet [29]. Changing dietary intake should significantly affect plasma levels of these fats, especially long chain fatty acids, and rTFA thought to be almost exclusively from dairy food. In this study cow’s milk was analyzed to assess fatty acids present in dairy food. Fatty acid composition in milk is mainly dependent on the feed and seasonality [30] and varies between countries. It was therefore essential to confirm fatty acids levels concurrent with the randomized study to allow for interpretation of study findings. Milk was considered the most useful dairy food to analyze as participants increased dairy food intake mainly by increasing intake of whole fat milk, yogurt and ice cream rather than cheese.
Intake of dairy food significantly changed for all those randomized to increase and decrease dairy food intake, with those that increased dairy food consuming on average 5.5 serves per day more than those that decreased dairy food intake. However, whilst there was a small increase in plasma levels of myristic, pentadecanoic acid and margaric acid with increased dairy consumption, plasma levels of most fatty acids present in milk did not change with diet. After multiplicity testing, only pentadecanoic acid changed significantly.
Dietary guidelines recommend consumption of low fat dairy food to reduce intake of long chain fatty acids like myristic and palmitic acid that are associated with increased cardiovascular risk [31], and stearic acid that is associated with reduced HDL cholesterol [32]. However the effects of pentadecanoic acid, which increased in those asked to increase dairy food intake, are not known. Some studies have suggested that margaric acid and pentadecanoic acid are markers of dairy food intake [33], however this study suggests that in the real world, large changes in dairy food intake marginally changes fatty acids. Moreover, reducing dairy food intake had no effect on plasma levels of these fats suggesting that these may be present in other food sources. Participants increased uptake of food that are good sources of saturated fats such as foods with palm and coconut oils (such as table spreads, processed foods) and almond milk. Ultimately, separating the health effects of these fatty acids is difficult to justify when giving dietary advice, as they are highly correlated because they are found in the same food (e.g., beef and dairy products).
Similarly, rTFA did not change significantly between groups. Dietary advice to reduce dairy food intake in patients with cardiovascular disease is not aimed at reducing plasma rTFA levels. Consumption of rTFA is thought to be too low to have biological effects [34] and some studies suggest that vaccenic acid may not be harmful for human health [13]. Previous studies have identified palmitelaidic acid as exclusively from dairy food [35, 36]; however, this study suggests that these assumptions may be misplaced.
It is possible in persons who decreased dairy food, rTFA from other sources increased. Oils containing precursors to vaccenic and palmitelaidic acid are increasingly used for processing and cooking food. Increased heat or pressure during cooking can increase rTFA levels in these oils [37]. Vaccenic acid is found in dairy free processed foods such as takeaway chips in the United Kingdom [38]. Dairy is also added to products like margarines, often assumed to be dairy- free. When these are heated, TFA levels can significantly be increased [37]. A less likely possibility is that humans are able to catalyze a reaction to convert small amounts of cis to TFA. Whilst humans are able to convert vaccenic acid to conjugated linoleic acid by delta-9 desaturase in the liver [39, 40], bioconversion of cis to trans fatty acids has not been demonstrated.
Changing dairy food intake for one month could be too short to affect plasma TFA levels. However, in feeding studies changes in plasma TFA occur within 2–3 weeks [41, 42], and other dairy fatty acids like pentadecanoic and margaric acid [33], changed with a change in dairy intake within 3 weeks. There was a large difference in dairy food intake within and between groups. In contrast to some observational studies [35, 36], no correlation was observed between vaccenic acid and palmitelaidic acid either at baseline or 1 month (r = 0.053 and 0.089 respectively) suggesting they are not exclusively from the same source.
Limitations
It is possible participants did not adhere to the randomized diet. However, food frequency questionnaires suggested good adherence and that consumption of other sources of TFA such as processed food, and goat’s milk or meat were not increased.
Food frequency questionnaires may not accurately reflect dietary intake [43, 44]. Studies comparing food frequency measures with repeated dietary recalls generally show correlations of the order of 0.4–0.7 [45].
Conclusion
Dietary advice to change the intake of dairy food does not significantly change plasma fatty acid levels including ruminant trans fatty acids. Dietary advice may need to focus on total food patterns rather than individual food groups to affect plasma fatty acid levels.
Abbreviations
SD:
Standard deviation
CI:
Confidence interval
TFA:
Tran fatty acid(s)
rTFA:
Ruminant trans fatty acid(s)
ANOVA:
Analysis of variance
ANCOVA:
Analysis of covariance
IQR:
Interquartile range
FFQ:
Food frequency questionnaire.
Declarations
Funding
The ADHB Charitable trust and Green Lane Research and Educational Fund provided financial support for the study. A report was submitted to the funders following completion of the study. The funders had no role in study design, data collection or analysis, or the decision to publish.
Authors’ Affiliations
(1)
Green Lane Cardiovascular Service, Auckland City Hospital
(2)
Cardiovascular Research Unit, Greenlane Cardiovascular Service, Auckland City Hospital
References
1. World Health Statistics. http://apps.who.int/gho/data/node.main.1?lang=en
2. IDF Diabetes Atlas. http://www.idf.org/diabetesatlas
3. Reduced or modified dietary fat for preventing cardiovascular disease Cochrane Database Syst Rev 2011, CD002137. doi:002110.001002/14651858.CD14002137.pub14651852
4. Mozaffarian D, Katan MB, Ascherio A, Stampfer MJ, Willett WC: Trans fatty acids and cardiovascular disease. N Engl J Med 2006, 354:1601–1613.View Article
5. de Goede J, Verschuren WM, Boer JM, Verberne LD, Kromhout D, Geleijnse JM: N-6 and N-3 fatty acid cholesteryl esters in relation to fatal CHD in a Dutch adult population: a nested case–control study and meta-analysis. PLoS One 2013, 8:e59408.View Article
6. Lemaitre RN, King IB, Mozaffarian D, Sotoodehnia N, Rea TD, Kuller LH, Tracy RP, Siscovick DS: Plasma phospholipid trans fatty acids, fatal ischemic heart disease, and sudden cardiac death in older adults: the cardiovascular health study. Circulation 2006, 114:209–215.View Article
7. Khaw KT, Friesen MD, Riboli E, Luben R, Wareham N: Plasma phospholipid fatty acid concentration and incident coronary heart disease in men and women: the EPIC-Norfolk prospective study. PLoS Med 2012, 9:e1001255.View Article
8. Mansson HL: Fatty acids in bovine milk fat. Food Nutr Res 2008, 52:10–34.View Article
9. Diet, nutrition and the prevention of chronic diseases-Report of the joint WHO/FAO expert consultation. http://www.who.int/dietphysicalactivity/publications/trs916/summary/en/
10. Parodi PW: Distribution of isomeric octadecenoic fatty acids in milk fat. J Dairy Sci 1976, 59:1870–1873.View Article
11. Elwood PC: Time to value milk. Int J Epidemiol 2005, 34:1160–1162.View Article
12. Mozaffarian D, Aro A, Willett WC: Health effects of trans-fatty acids: experimental and observational evidence. Eur J Clin Nutr 2009,63(Suppl 2):S5-S21.View Article
13. Field CJ, Blewett HH, Proctor S, Vine D: Human health benefits of vaccenic acid. Appl Physiol Nutr Metab 2009, 34:979–991.View Article
14. Bendsen NT, Christensen R, Bartels EM, Astrup A: Consumption of industrial and ruminant trans fatty acids and risk of coronary heart disease: a systematic review and meta-analysis of cohort studies. Eur J Clin Nutr 2011, 65:773–783.View Article
15. Jakobsen MU, Overvad K, Dyerberg J, Heitmann BL: Intake of ruminant trans fatty acids and risk of coronary heart disease. Int J Epidemiol 2008, 37:173–182.View Article
16. O’Donnell-Megaro AM, Barbano DM, Bauman DE: Survey of the fatty acid composition of retail milk in the United States including regional and seasonal variations. J Dairy Sci 2011, 94:59–65.View Article
17. Zock PL, Katan MB: Hydrogenation alternatives: effects of trans fatty acids and stearic acid versus linoleic acid on serum lipids and lipoproteins in humans. J Lipid Res 1992, 33:399–410.
18. Perk J, De Backer G, Gohlke H, Graham I, Reiner Z, Verschuren M, Albus C, Benlian P, Boysen G, Cifkova R, Deaton C, Ebrahim S, Fisher M, Germano G, Hobbs R, Hoes A, Karadeniz S, Mezzani A, Mezzani A, Prescott E, Ryden L, Scherer M, Syvanne M, op Reimer WJ S, Vrints C, Wood D, Zamorano JL, Zannad F: European Guidelines on cardiovascular disease prevention in clinical practice (version 2012). The Fifth Joint Task Force of the European Society of Cardiology and Other Societies on Cardiovascular Disease Prevention in Clinical Practice (constituted by representatives of nine societies and by invited experts). Developed with the special contribution of the European Association for Cardiovascular Prevention & Rehabilitation (EACPR). Eur Heart J 2012,33(17):1635–1701.
19. Ludwig DS, Willett WC: Three daily servings of reduced-fat milk: an evidence-based recommendation? JAMA Pediatr 2013, 1–2.
20. US ChooseMyPlate. http://www.choosemyplate.gov/
21. Benatar JR, Jones E, White H, Stewart RA: A randomized trial evaluating the effects of change in dairy food consumption on cardio-metabolic risk factors. Eur J Prev Cardiol 2013. Epub ahead of print
22. Diet History Questionnaire, Version 2.0. http://riskfactor.cancer.gov/dhq2/
23. US Department of Agriculture [http://www.ers.usda.gov/]
24. Brands of dairy products in New Zealand. http://www.fonterrafoodservices.co.nz/brands.html?view=brand&id=17
25. Beermann C, Jelinek J, Reinecker T, Hauenschild A, Boehm G, Klor H-U: Short term effects of dietary medium-chain fatty acids and n-3 long-chain polyunsaturated fatty acids on the fat metabolism of healthy volunteers. Lipids Health Dis 2003, 2:10.View Article
26. Vickers AJ, Altman DG: Analysing controlled trials with baseline and follow up measurements. BMJ 2001, 323:1123–1124.View Article
27. Kutner MH, Nachtsheim CJ, Neter J, Li W: Applied Linear Statistical Models. 5th edition. New York, NY: McGraw-Hill/Irwin; 2004.
28. Proschan MA, Waclawiw MA: Practical guidelines for multiplicity adjustment in clinical trials. Control Clin Trials 2000, 21:527–539.View Article
29. Gebauer SK, Chardigny JM, Jakobsen MU, Lamarche B, Lock AL, Proctor SD, Baer DJ: Effects of ruminant trans fatty acids on cardiovascular disease and cancer: a comprehensive review of epidemiological, clinical, and mechanistic studies. Adv Nutr 2011, 2:332–354.View Article
30. Carroll SM, DePeters EJ, Taylor SJ, Rosenberg M, Perez-Monti H, Capps VA: Milk composition of Holstein, Jersey, and Brown Swiss cows in response to increasing levels of dietary fat. Anim Feed Sci Technol 2006, 131:451–473.View Article
31. Hu FB, Stampfer MJ, Manson JE, Ascherio A, Colditz GA, Speizer FE, Hennekens CH, Willett WC: Dietary saturated fats and their food sources in relation to the risk of coronary heart disease in women. Am J Clin Nutr 1999, 70:1001–1008.
32. Hu FB, Manson JE, Willett WC: Types of dietary fat and risk of coronary heart disease: a critical review. J Am Coll Nutr 2001, 20:5–19.View Article
33. Aslibekyan S, Campos H, Baylin A: Biomarkers of dairy intake and the risk of heart disease. Nutr Metab Cardiovasc Dis 2012, 22:1039–1045.View Article
34. Nishida C, Uauy R: WHO Scientific Update on health consequences of trans fatty acids: introduction. Eur J Clin Nutr 2009,63(Suppl 2):S1-S4.View Article
35. Mozaffarian D, Cao H, King IB, Lemaitre RN, Song X, Siscovick DS, Hotamisligil GS: Trans-palmitoleic acid, metabolic risk factors, and new-onset diabetes in U.S. Adults: a cohort study. Ann Int Med 2010, 153:790–799.View Article
36. Benatar JR, Gladding P, White HD, Zeng I, Stewart RA: Trans-fatty acids in New Zealand patients with coronary artery disease. Eur J Cardiovasc Prev Rehabil 2011, 18:615–620.View Article
37. Herzallah SM, Humeid MA, Al-Ismail KM: Effect of heating and processing methods of milk and dairy products on conjugated Linoleic acid and trans fatty acid Isomer content. J Dairy Sci 2005, 88:1301–1310.View Article
38. Roe M, Pinchen H, Church S, Elahi S, Walker M, Farron-Wilson M, Buttriss J, Finglas P: Trans fatty acids in a range of UK processed foods. Food Chem 2013, 140:427–431.View Article
39. Bhattacharya A, Banu J, Rahman M, Causey J, Fernandes G: Biological effects of conjugated linoleic acids in health and disease. J Nutr Biochem 2006, 17:789–810.View Article
40. Turpeinen AM, Mutanen M, Aro A, Salminen I, Basu S, Palmquist DL, Griinari JM: Bioconversion of vaccenic acid to conjugated linoleic acid in humans. Am J Clin Nutr 2002, 76:504–510.
41. Wanders AJ, Brouwer IA, Siebelink E, Katan MB: Effect of a high intake of conjugated linoleic acid on lipoprotein levels in healthy human subjects. PLoS One 2010, 5:e9000.View Article
42. Chardigny JM, Destaillats F, Malpuech-Brugere C, Moulin J, Bauman DE, Lock AL, Barbano DM, Mensink RP, Bezelgues JB, Chaumont P, Combe N, Cristiani I, Joffre F, German JB, Dionisi F, Boirie Y, Sebedio J: Do trans fatty acids from industrially produced sources and from natural sources have the same effect on cardiovascular disease risk factors in healthy subjects? Results of the trans Fatty Acids Collaboration (TRANSFACT) study. Am J Clin Nutr 2008, 87:558–566.
43. Schaefer EJ, Augustin JL, Schaefer MM, Rasmussen H, Ordovas JM, Dallal GE, Dwyer JT: Lack of efficacy of a food-frequency questionnaire in assessing dietary macronutrient intakes in subjects consuming diets of known composition. Am J Clin Nutr 2000, 71:746–751.
44. Kristal AR, Peters U, Potter JD: Is it time to abandon the food frequency questionnaire? Cancer Epidemiol Biomarkers Prev 2005, 14:2826–2828.View Article
45. Subar AF, Thompson FE, Kipnis V, Midthune D, Hurwitz P, McNutt S, McIntosh A, Rosenfeld S: Comparative validation of the Block, Willett, and National Cancer Institute food frequency questionnaires : the Eating at America’s Table Study. Am J Epidemiol 2001, 154:1089–1099.View Article
Copyright
© Benatar and Stewart; licensee BioMed Central Ltd. 2014
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. |
1
Dez
2006
Wie raffiniert die Mobilfunklobby zuschlägt
http://www.buergerwelle.de/pdf/wie_raffiniert_die_mobilfunklobby_zuschlaegt.htm
The safe way forward for wireless technology
Take a look at the information and e-mails from Dr George Carlo with regards to the safe way forward for wireless technology.
http://www.buergerwelle.de/pdf/carlo_the_safe_way_forward_for_wireless_technology.pdf
Best wishes
Eileen O'Connor
This interview is a pretty good summary of where things are scientifically. There are some parts that address the fiber optic infrastructure and government involvement.
Perhaps this might be useful to Michael Bell and your other colleagues.
Talk soon.
G
Dr. George L. Carlo Science and Public Policy Institute
1101 Pennsylvania Ave. NW -- 7th Floor Washington, D.C. 20004
http://www.sppionline.org
202-756-7744
Sent: Mon, 27 Nov 2006 1:05 PM
Subject: Re: Dr. Sellman's radio show
Here's the interview you did with me! It's really fabulous!
http://www.ssellman.com/ftploads/Dr.CarloIntvw.mov
Warmest regards,
Dr. Sherrill Sellman
P.O. Box 690416
Tulsa, OK. 74169
918-437-1058
http://www.ssellman.com
Eileen/Andy:
In a nutshell, the alternative infrastructure with a fiber-optic spine also necessitates alternative transmitters for the connection to phones. There will still be wireless signals but they would travel over only small distances and will be much less intense -- minimal near-field plume -- thus less tissue is exposed. There are also point of transmission technologies that alter the biological impact of the information carrying signals. In the end, the background level of information carrying radio waves -- those that trigger the adverse biological protective reaction leading to health problems -- would be dramatically reduced. That, coupled with point of use protective technology will largely mitigate against most health risks.
Now, there is the need to develop some of the finer points to the new infrastructure -- as there has not been a commercial demand for this alternative infrastructure technology. But, as we move ahead, and there is a commercial demand, there is no doubt that technological innovation will be able to handle all of the nuances. Of course, this will probably not be driven by health concerns but by profit and revenue potential. But, from my perspective, it does not really matter "why" these interventions are made -- it only matters that they are made.
Hope this helps.
G
http://omega.twoday.net/search?q=carlo http://omega.twoday.net/search?q=wireless+networks http://freepage.twoday.net/search?q=wireless+networks http://omega.twoday.net/search?q=wi-fi http://freepage.twoday.net/search?q=wi-fi
Do mobile phones cost the Earth?
http://news.bbc.co.uk/2/hi/science/nature/6174422.stm
Informant: binstock
--------
Digital broadcasting is increasing the threat of global warming by pumping massive amounts of extra carbon dioxide into the atmosphere
http://omega.twoday.net/stories/2949712/
--------
As the net came to Greenland
http://tinyurl.com/yfzls5
logo
Omega-News
User Status
Du bist nicht angemeldet.
Suche
Archiv
Dezember 2006
Mo
Di
Mi
Do
Fr
Sa
So
21
27
Aktuelle Beiträge
Wenn das Telefon krank...
http://groups.google.com/g roup/mobilfunk_newsletter/ t/6f73cb93cafc5207 htt p://omega.twoday.net/searc h?q=elektromagnetische+Str ahlen http://omega.twoday. net/search?q=Strahlenschut z https://omega.twoday.net/ search?q=elektrosensibel h ttp://omega.twoday.net/sea rch?q=Funkloch https://omeg a.twoday.net/search?q=Alzh eimer http://freepage.twod ay.net/search?q=Alzheimer https://omega.twoday.net/se arch?q=Joachim+Mutter
Starmail - 8. Apr, 08:39
Familie Lange aus Bonn...
http://twitter.com/WILABon n/status/97313783480574361 6
Starmail - 15. Mär, 14:10
Dänische Studie findet...
https://omega.twoday.net/st ories/3035537/ -------- HLV...
Starmail - 12. Mär, 22:48
Schwere Menschenrechtsverletzungen ...
Bitte schenken Sie uns Beachtung: Interessengemeinschaft...
Starmail - 12. Mär, 22:01
Effects of cellular phone...
http://www.buergerwelle.de /pdf/effects_of_cellular_p hone_emissions_on_sperm_mo tility_in_rats.htm [...
Starmail - 27. Nov, 11:08
Status
Online seit 6970 Tagen
Zuletzt aktualisiert: 8. Apr, 08:39
Credits |
Dolbier HW Solutions 558
Dolbier HW Solutions 558 - 652 AMINES A-6. p-Nitroaniline...
Info iconThis preview shows page 1. Sign up to view the full content.
View Full Document Right Arrow Icon
A-6. p -Nitroaniline (A) is less basic than m -nitroaniline (B). Using resonance structures, explain the reason for this difference. A-7. Identify the strongest and weakest bases among the following: A-8. Write the structures of the compounds A D formed in the following reaction sequence: PART B B-1. Which of the following is a secondary amine? ( a ) 2-Butanamine ( b ) N -Ethyl-2-pentanamine ( c ) N -Methylpiperidine ( d ) N , N -Dimethylcyclohexylamine B-2. Which of the following C 8 H 9 NO isomers is the weakest base? ( a ) o -Aminoacetophenone
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.
Ask a homework question - tutors are online |
[DDC-1800] Paginator results is wrong if your query use order by clause Created: 27/Apr/12 Updated: 17/Apr/14 Resolved: 29/Aug/12
Status: Resolved
Project: Doctrine 2 - ORM
Component/s: ORM
Affects Version/s: 2.2.2
Fix Version/s: 2.3, 2.3.1
Security Level: All
Type: Bug Priority: Major
Reporter: Marc Drolet Assignee: Benjamin Eberlei
Resolution: Fixed Votes: 0
Labels: None
Environment:
linux oracle
Description
NOTE: I didn't try this on other database, I'm using Oracle.
if my original fetchJoin query use an order by clause, the results is not keeping the provided order by clause and re-order them by id.
here is my generated query to get the distinct records that get generated:
SELECT distinct ID0
FROM
(
SELECT f0_.id AS ID0, f0_.deal_type_id AS DEAL_TYPE_ID1, f0_.title AS TITLE2, f0_.deal_date AS DEAL_DATE3, f0_.amount AS AMOUNT4,
f0_.abstract AS ABSTRACT5, f0_.created_date AS CREATED_DATE6, f0_.last_updated_date AS LAST_UPDATED_DATE7,
f0_.object_status_id AS OBJECT_STATUS_ID8, f0_.published_date AS PUBLISHED_DATE9, f0_.publishing_status_id AS PUBLISHING_STATUS_ID10,
f1_.id AS ID11, f1_.role_id AS ROLE_ID12, f1_.role_type_id AS ROLE_TYPE_ID13, f2_.id AS ID14, f3_.id AS ID15, f4_.id AS ID16, f5_.id AS ID17,
c6_.id AS ID18, d7_.id AS ID19
FROM fo_deal f0_
INNER JOIN fo_deal_role f1_ ON f0_.id = f1_.deal_id
INNER JOIN fo_people f2_ ON f1_.people_id = f2_.id
INNER JOIN fo_property_deal f3_ ON f0_.id = f3_.deal_id
INNER JOIN fo_property f4_ ON f3_.property_id = f4_.id
LEFT JOIN fo_property_asset f5_ ON f4_.id = f5_.property_id
LEFT JOIN co_asset c6_ ON f5_.asset_id = c6_.id
LEFT JOIN ds_record d7_ ON c6_.ds_id = d7_.id
WHERE f1_.people_id = 2
AND f0_.object_status_id <> 3
AND f0_.publishing_status_id = 2
ORDER BY f0_.deal_date DESC, f0_.published_date DESC
)
running this query I get the id 30, 44 when the inner query return 44, 30
here is the query that should get generated to take care of the order by clause:
SELECT distinct ID0, rownum+
FROM
(
SELECT f0_.id AS ID0, f0_.deal_type_id AS DEAL_TYPE_ID1, f0_.title AS TITLE2, f0_.deal_date AS DEAL_DATE3, f0_.amount AS AMOUNT4,
f0_.abstract AS ABSTRACT5, f0_.created_date AS CREATED_DATE6, f0_.last_updated_date AS LAST_UPDATED_DATE7,
f0_.object_status_id AS OBJECT_STATUS_ID8, f0_.published_date AS PUBLISHED_DATE9, f0_.publishing_status_id AS PUBLISHING_STATUS_ID10,
f1_.id AS ID11, f1_.role_id AS ROLE_ID12, f1_.role_type_id AS ROLE_TYPE_ID13, f2_.id AS ID14, f3_.id AS ID15, f4_.id AS ID16, f5_.id AS ID17,
c6_.id AS ID18, d7_.id AS ID19
FROM fo_deal f0_
INNER JOIN fo_deal_role f1_ ON f0_.id = f1_.deal_id
INNER JOIN fo_people f2_ ON f1_.people_id = f2_.id
INNER JOIN fo_property_deal f3_ ON f0_.id = f3_.deal_id
INNER JOIN fo_property f4_ ON f3_.property_id = f4_.id
LEFT JOIN fo_property_asset f5_ ON f4_.id = f5_.property_id
LEFT JOIN co_asset c6_ ON f5_.asset_id = c6_.id
LEFT JOIN ds_record d7_ ON c6_.ds_id = d7_.id
WHERE f1_.people_id = 2
AND f0_.object_status_id <> 3
AND f0_.publishing_status_id = 2
ORDER BY f0_.deal_date DESC, f0_.published_date DESC
) ORDER BY rownum ASC
To fix this on the Paginator code:
file: ORM/Tools/Pagination/LimitSubqueryOutputWalker.php
method: walkSelectStatement
change:
$sql = sprintf('SELECT b.*, rownum as rn FROM (SELECT DISTINCT %s FROM (%s)) b', // AS _dctrn_result',
implode(', ', $sqlIdentifier), $sql);
for:
$sql = sprintf('SELECT b.*, rownum as rn FROM (SELECT DISTINCT %s, numrow FROM (%s) ORDER BY numrow ASC) b', // AS _dctrn_result',
implode(', ', $sqlIdentifier), $sql);
Comments
Comment by Marc Drolet [ 14/May/12 ]
rownum instead of numrow. sorry.
$sql = sprintf('SELECT b.*, rownum as rn FROM (SELECT DISTINCT %s, rownum FROM (%s) ORDER BY rownum ASC) b',
implode(', ', $sqlIdentifier), $sql);
Comment by Benjamin Eberlei [ 07/Jul/12 ]
Doctrine 2.2.2 doesnt have the LimitSubqueryoutputWalker and Doctrine 2.3-dev does not have the line in the code. Can you make a more explicit statement of where the change is necessary?
Comment by Marc Drolet [ 09/Jul/12 ]
It's in the Pagination of version 2.2.2. ORM/Tools/Pagination/LimitSubqueryOutputWalker.php
Comment by Benjamin Eberlei [ 09/Jul/12 ]
This is the 2.2 branch, https://github.com/doctrine/doctrine2/tree/2.2/lib/Doctrine/ORM/Tools/Pagination and https://github.com/doctrine/doctrine2/tree/2.2.2/lib/Doctrine/ORM/Tools/Pagination is the 2.2.2 tag.
no LimitSubqueryOutputWalker.php in there.
Comment by Benjamin Eberlei [ 29/Aug/12 ]
Fixed
Comment by Raymond Kolbe [ 09/Apr/13 ]
This issue is popping it's head up again!
Benjamin, your tests don't test for the ordering problem unless those tests are happening somewhere else?
https://github.com/doctrine/doctrine2/commit/f55b5411c8b1f75bf2b5cf5ffe4bc50034fb91cb
I am performing a query as complex as Marc's and I experience the same exact issue. I have checked out today's latest master branch as well as the 2.3 tag with no change.
Please advise.
Comment by Raymond Kolbe [ 09/Apr/13 ]
I have a PR in https://github.com/doctrine/doctrine2/pull/645
Generated at Thu Dec 18 18:20:20 UTC 2014 using JIRA 6.2.3#6260-sha1:63ef1d6dac3f4f4d7db4c1effd405ba38ccdc558. |
Two-Factor Authentication with Authy, Node.js and Express - Twilio
Menu
Expand
Rate this page:
Thanks for rating this page!
We are always striving to improve our documentation quality, and your feedback is valuable to us. How could this documentation serve you better?
Two-Factor Authentication with Authy, Node.js and Express
This Express.js sample application demonstrates how to build a login system that uses two factors of authentication to log in users. Head to the application's README.md to see how to run the application locally.
Adding two-factor authentication (2FA) to your web application increases the security of your user's data. Multi-factor authentication determines the identity of a user by first logging the user into the app, and then validating their mobile device.
For the second factor, we will validate that the user has their mobile phone by either:
• Sending them a OneTouch push notification to their mobile Authy app
• Sending them a token through their mobile Authy app
• Sending them a one-time token in a text message sent with Authy via Twilio.
See how VMware uses Authy 2FA to secure their enterprise mobility management solution.
Click here to start the tutorial!
Configuring Authy
If you haven't done so already, now is the time to sign up for Authy. Create your first application, naming it whatever you wish. After you create your application, your production API key will be visible on your dashboard:
Once we have an Authy API key, we store it in this initializer file.
config.js
Now that we've configured our Express app, let's take a look at how we register a user with Authy.
Register a user with Authy
Register a User with Authy
When a new user is created we also register the user with Authy.
All Authy needs to get a user set up for your application is that user's email, phone number and country code. We need to make sure this information is required when the user signs up.
Once we register the User with Authy we get an id back that we will store as the user's authyId. This is very important since it's how we will verify the identity of our user with Authy.
models/User.js
See how to log a user in with OneTouch
Log in with Authy OneTouch
When a user attempts to log in to our website, a second form of identification is needed. Let's take a look at Authy's OneTouch verification first.
OneTouch works like so:
• We attempt to send a User a OneTouch Approval Request
• If the user has OneTouch enabled, we will get a success message back
• The user hits 'Approve' in their Authy app
• Authy makes a POST request to our app with an 'Approved' status
• We log the user in
api/sessions.js
Log in with Authy OneTouch
api/sessions.js
How to send a OneTouch request
Send the OneTouch Request
When our user logs in we immediately attempt to verify their identity with OneTouch. We will fallback gracefully if they don't have a OneTouch device, but we don't know until we try.
Authy lets us pass details with our OneTouch request. These can be messages, logos, and any other details we want to send. We could easily send any number of details by appending details['some_detail']. You could imagine a scenario where we send a OneTouch request to approve a money transfer:
details = {
message: "Request to send money to Jarod's vault",
from: "Jarod",
amount: "1,000,000",
currency: "Galleons"
}
models/User.js
Send the OneTouch request
models/User.js
Note: We need some way to check the status of the user's two-factor process. In this case, we do so by updating the User.authyStatus attribute. It's important we reset this before we log the user in.
See how to register a callback endpoint
Configure the OneTouch callback
In order for our app to know what the user did after we sent the OneTouch request, we need to register a callback endpoint with Authy.
api/sessions.js
Here in our callback, we look up the user using the authy_id sent with the Authy POST request. At this point we would ideally use a websocket to let our client know that we received a response from Authy. However, for this version we're going to keep it simple and just update the authyStatus on the user. Now all our client-side code needs to do is check for user.authyStatus.approved before logging in the user.
Handle authentication asynchronously
Handle Two-Factor Asyncronously
Our user interface for this example is a single page application written using Backbone and jQuery.
We've already taken a look at what's happening on the server side, so let's step in front of the cameras now and see how our JavaScript is interacting with those server endpoints.
First we hijack the login form submitted and pass the data to our /session controller using Ajax. Depending on how that endpoint responds we will either ask the user for a token or await their OneTouch response.
If we expect a OneTouch response, we will begin polling /authy/status until we see that the OneTouch login was either approved or denied. Take a look at this controller and see what is happening.
public/app/views/Login.js
Handle Two-Factor in the browser
public/app/views/Login.js
Fall back to token if OneTouch fails
Fall back to Authy Token
Here is the endpoint that our javascript is polling. It is waiting for the user status to be either 'Approved' or 'Denied'. If the user has approved the OneTouch request, we will save their session as confirmed, which officially logs them in.
If the request was denied we render the /verify page and ask the user to log in with a Token.
api/sessions.js
Now let's take a look at how we handle two-factor with tokens.
Send a one-time token
Sending a 2FA Token
Once there is an Authy user ID associated with our user model, we can request that an SMS verification token be sent out to the user's phone. Authy supports token validation in their mobile app as well, so if our user has the app it will default to sending a push notification instead of an SMS.
If needed, we can call this method on the user instance multiple times. This is what happens every time the user clicks "Resend Code" on the web form.
models/User.js
How to validate the code
Validate the Code
Our Express route handler will grab the code submitted on the form in order to validate it. The connect middleware function executes before this handler and adds a user property to the request object that contains a Mongoose model instance representing the user associated with this session. We use verifyAuthyToken on the User model to check if the code submitted by the user is legit.
api/sessions.js
That's it! We've just implemented two-factor authentication using three different methods and the latest in Authy technology.
What's next?
Where to next?
If you're a Node.js developer working with Twilio, you might want to check out these other tutorials.
Account Verification
Increase the security of your login system by verifying a user's mobile phone.
Server Notifications via SMS
Faster than e-mail and less likely to get blocked, text messages are great for timed alerts and notifications. Learn how to send out SMS (and MMS) notifications to a list of server administrators.
Did this help?
Thanks for checking out this tutorial! If you have any feedback to share with us, we'd love to hear it. Connect with us on Twitter and let us know what you build!
Jarod Reyes Agustin Camino Kat King Andrew Baker Jose Oliveros
Rate this page:
Need some help?
We all do sometimes; code is hard. Get help now from our support team, or lean on the wisdom of the crowd browsing the Twilio tag on Stack Overflow. |
"; */ ?>
clojure
9
Apr 17
Hazelcast: Keep your cluster close, but cache closer
Hazelcast has a neat feature called Near Cache. Whenever clients talk to Hazelcast servers each get/put is a network call, and depending on how far the cluster is these calls may get pretty costly.
The idea of Near Cache is to bring data closer to the caller, and keep it in sync with the source. Which is why it is highly recommended for data structures that are mostly read.
Hazelcast Near Cache
Near Cache can be created / configured on both: server and client sides
Optionally Near Cache keys can be stored on the file system, and then preloaded when the client restarts.
The examples below are run from a Clojure REPL and use chazel, which is a Clojure library for Hazelcast. To follow along you can:
$ git clone https://github.com/tolitius/chazel
$ cd chazel
$ boot dev
boot.user=> ;; ready for examples
In case you don’t have boot installed it is a one liner install.
Server Side Setup
Well use two different servers not too far from each other so the network latency is enough to get a good visual on how Near Cache could help.
On the server side we’ll create an "events" map (which will start the server if it was not yet started), and will add 100,000 pseudo events to it:
;; these are done on the server:
(def m (hz-map "events"))
(dotimes [n 100000] (put! m n n))
We can visualize all these puts with hface:
hface putting 100,000 entries
Client Side Without Near Cache
On the client side we’ll create a function to walk over first n keys in the "events" map:
(defn walk-over [m n]
(dotimes [k n] (get m k)))
Create a new Hazelcast client instance (without Near Cache configured), and walk over first 100,000 events (twice):
(def hz-client (client-instance {:hosts ["10.x.y.z"]}))
(def m (hz-map "events" hz-client))
(time (walk-over m 100000))
=> "Elapsed time: 30534.997599 msecs"
(time (walk-over m 100000))
=> "Elapsed time: 30547.810322 msecs"
Each iteration roughly took 30.5 seconds, and by monitoring the server’s network it was sending packets back and forth for every get:
Hazelcast with no Near Cache
We can see that all these packets came from / correlate well to an "events" map:
hface putting 100,000 entries
Client Side With Near Cache
Now let’s create a different client and configure it with Near Cache for the "events" map:
(def client-with-nc (client-instance {:hosts ["10.x.y.z"]
:near-cache {:name "events"}}))
Let’s repeat the exercise:
(def m (hz-map "events" client-with-nc))
(time (walk-over m 100000))
=> "Elapsed time: 30474.719965 msecs"
(time (walk-over m 100000))
=> "Elapsed time: 102.141527 msecs"
The first iteration took 30.5 seconds as expected, but the second, and all the subsequent ones, took 100 milliseconds. That’s because a Near Cache kicked in, and all these events are close to the client: are in the client’s memory.
As expected all subsequent calls do not use the server:
Hazelcast with Near Cache
Keeping Near Cache in Sync
The first logical question is: ok, I brought these events into memory, but would not they become stale in case they change on the server?
Let’s check:
;; checking on the client side
(get m 41)
=> 41
;; on the server: changing the value of a key 41 to 42
(put! m 41 42)
;; checking again on the client side
(get m 41)
=> 42
Pretty neat. Hazelcast invalidates “nearly cached” entries by broadcasting invalidation events from the cluster members. These events are fire and forget, but Hazelcast is very good at figuring out if and when these events are lost.
There are a couple of system properties that could be configured to control this behaviour:
• hazelcast.invalidation.max.tolerated.miss.count: Default value is 10. If missed invalidation count is bigger than this value, relevant cached data will be made unreachable, and the new value will be populated from the source.
• hazelcast.invalidation.reconciliation.interval.seconds: Default value is 60 seconds. This is a periodic task that scans cluster members periodically to compare generated invalidation events with the received ones from Near Cache.
Near Cache Preloader
In case clients are restarted all the near caches would be lost and would need to be naturally repopulated by applications / client requests.
Near Cache can be configured with a preloader that would persist all the keys from the map to disk, and would repopulate the cache using the keys from the file in case of a restart.
Let’s create a client instance with such a preloader:
(def client-with-nc (client-instance {:hosts ["10.x.y.z"]
:near-cache {:name "events"
:preloader {:enabled true
:store-initial-delay-seconds 60}}}))
And walk over the map:
(def m (hz-map "events" client-with-nc))
(walk-over m 100000)
As per store-initial-delay-seconds config property, 60 seconds after we created a reference to this map, preloader will persist the keys into the nearCache-events.store file (filename is configurable):
INFO: Stored 100000 keys of Near Cache events in 306 ms (1953 kB)
Now let’s restart the client and try to iterate over the map again:
(shutdown-client client-with-nc)
(def client-with-nc (client-instance {:hosts ["10.x.y.z"]
:near-cache {:name "events"
:preloader {:enabled true}}}))
(def m (hz-map "events" client-with-nc))
(time (walk-over m 100000))
INFO: Loaded 100000 keys of Near Cache events in 3230 ms
"Elapsed time: 2920.688369 msecs"
(time (walk-over m 100000))
;; "Elapsed time: 103.878848 msecs"
The first iteration took 3 seconds (and not 30) since once the preloader loaded all the keys, the rest (27 seconds worth of data) came back from the client’s memory.
This 3 second spike can be observed by the network usage:
Hazelcast with Near Cache
And all the subsequent calls now again take 100 ms.
Near Cache Full Config
There are a lot more Near Cache knobs beyond the map name and preloader. All are well documented in the Hazelcast docs and available as edn config with chazel.
Here is an example:
{:in-memory-format :BINARY,
:invalidate-on-change true,
:time-to-live-seconds 300,
:max-idle-seconds 30,
:cache-local-entries true,
:local-update-policy :CACHE_ON_UPDATE,
:preloader {:enabled true,
:directory "nearcache-example",
:store-initial-delay-seconds 15,
:store-interval-seconds 60},
:eviction {:eviction-policy :LRU,
:max-size-policy :ENTRY_COUNT,
:size 800000}}
Any config options that are not provided will be set to Hazelcast defaults.
10
Jan 17
Hubble Space Mission Securely Configured
This week we learned of a recent alien hacking into Earth. We have a suspect but unsure about the true source. Could be The Borg, could be Klingons, could be Cardassians. One thing is certain: we need better security and flexibility for our space missions.
We’ll start with the first line of defense: science based education. The better we are educated, the better we are equipped to make decisions, to understand the universe, to vote.
One of the greatest space exploration frontiers is the Hubble Space Telescope. The next 5 minutes we will work on configuring and bringing the telescope online keeping things secure and flexible in a process.
The Master Plan
In order to keep things simple and solid we are going to use these tools:
• Vault is a tool for managing secrets.
• Consul besides being a chief magistrates of the Roman Republic* is now also a service discovery and distributed configuration tool.
• Hazelcast is a simple, powerful and pleasure to work with an in memory data grid.
Here is the master plan to bring Hubble online:
override hazelcast hosts
Hubble has its own internal configuration file which is not environment specific:
{:hubble {:server {:port 4242}
:store {:url "spacecraft://tape"}
:camera {:mode "mono"}
:mission {:target "Eagle Nebula"}
:log {:name "hubble-log"
:hazelcast {:hosts "OVERRIDE ME"
:group-name "OVERRIDE ME"
:group-password "OVERRIDE ME"
:retry-ms 5000
:retry-max 720000}}}}
As you can see the initial, default mission is the “Eagle Nebula”, Hubble’s state is stored on tape, it uses a mono (vs. color) camera and has in internal server that runs on port 4242.
Another thing to notice, Hubble stores an audit/event log in a Hazelcast cluster. This cluster needs environment specific location and creds. While the location may or may not be encrypted, the creds should definitely be.
All the above of course can be, and some of them will be, overridden at startup. We are going to keep the overrides in Consul, and the creds in Vault. On Hubble startup the Consul overrides will be merged with the Hubble internal config, and the creds will be unencrypted and security read from Vault and used to connect to the Hazelcast cluster.
Environment Matters
Before configuring Hubble, let’s create and initialize the environment. As I mentioned before we would need to setup Consul, Vault and Hazelcast.
Consul and Vault
Consul will play two roles in the setup:
• a “distributed configuration” service
• Vault’s secret backend
Both can be easily started with docker. We’ll use cault‘s help to setup both.
$ git clone https://github.com/tolitius/cault
$ cd cault
$ docker-compose up -d
Creating cault_consul_1
Creating cault_vault_1
Cault runs both Consul and Vault’s official docker images, with Consul configured to be Vault’s backend. Almost done.
Once the Vault is started, it needs to be “unsealed”:
docker exec -it cault_vault_1 sh
$ vault init ## will show 5 unseal keys and a root token
$ vault unseal ## use 3 out 5 unseal keys
$ vault auth ## use a root token ## >>> (!) remember this token
Not to duplicate it here, you can follow unsealing Vault step by step with visuals in cault docs.
We would also save Hubble secrets here within the docker image:
$ vi creds
add {"group-name": "big-bank", "group-password": "super-s3cret!!!"} and save the file.
now write it into Vault:
$ vault write secret/hubble-audit value=@creds
Success! Data written to: secret/hubble-audit
This way the actual group name and password won’t show up in the bash history.
Hazelcast Cluster in 1, 2, 3
The next part of the environment is a Hazelcast cluster where Hubble will be sending all of the events.
We’ll do it with chazel. I’ll use boot in this example, but you can use lein / gradle / pom.xml, anything that can bring [chazel "0.1.12"] from clojars.
Open a new terminal and:
$ boot repl
boot.user=> (set-env! :dependencies '[[chazel "0.1.12"]])
boot.user=> (require '[chazel.core :as hz])
;; creating a 3 node cluster
boot.user=> (hz/cluster-of 3 :conf (hz/with-creds {:group-name "big-bank"
:group-password "super-s3cret!!!"}))
Members [3] {
Member [192.168.0.108]:5701 - f6c0f121-53e8-4be0-a958-e8d35571459d
Member [192.168.0.108]:5702 - e773c493-efe8-4806-b568-d2af57947fc9
Member [192.168.0.108]:5703 - f9e0719d-aec7-405e-9aef-48baa56b11ec this}
And we have a 3 node Hazelcast cluster up and running.
Note that Consul, Vault and Hazelcast cluster would already be running in the real world scenario before we get to write and deploy Hubble code.
Let there be Hubble!
The Hubble codebase lives on github, as it should 🙂 So let’ clone it first:
$ git clone https://github.com/tolitius/hubble
$ cd hubble
“Putting some data where Consul is”
We do have Consul up and running, but we have no overrides in it. We can either:
• manually add overrides for Hubble config or
• just initialize Consul with current Hubble config / default overrides
Hubble has init-consul boot task which will just copy a part of Hubble config to Consul, so we can override values later if we need to:
$ boot init-consul
read config from resource: "config.edn"
22:49:34.919 [clojure-agent-send-off-pool-0] INFO hubble.env - initializing Consul at http://localhost:8500/v1/kv
Let’s revisit Hubble config and figure out what needs to be overridden:
{:hubble {:server {:port 4242}
:store {:url "spacecraft://tape"}
:camera {:mode "mono"}
:mission {:target "Eagle Nebula"}
:log {:enabled false ;; can be overridden at startup / runtime / consul, etc.
:auth-token "OVERRIDE ME"
:name "hubble-log"
:hazelcast {:hosts "OVERRIDE ME"
:group-name "OVERRIDE ME"
:group-password "OVERRIDE ME"
:retry-ms 5000
:retry-max 720000}}
:vault {:url "OVERRIDE ME"}}}
The only obvious thing to override is hubble/log/hazelcast/hosts since creds need to be later overridden securely at runtime, as well as the hubble/log/auth-token. In fact if you look into Consul, you would see neither creds nor the auth token.
The less obvious thing to override is the hubble/vault/url. We need this, so Hubble knows where Vault lives once it needs to read and decrypt creds at runtime.
We will also override hubble/log/enabled to enable Hubble event logging.
So let’ override these in Consul:
• hubble/log/hazelcast/hosts to ["127.0.0.1"]
• hubble/vault/url to http://127.0.0.1:8200
• hubble/log/enabled to true
We can either go to the Consul UI to override these one by one, but it is easier to do it programmatically in one shot.
Envoy Extraordinary and Minister Plenipotentiary
Hubble relies on envoy to communicate with Consul, so writing a value or a map with all overrides can be done in a single go:
(from under /path/to/hubble)
$ boot dev
boot.user=> (require '[envoy.core :as envoy])
nil
boot.user=> (def overrides {:hubble {:log {:enabled true
:hazelcast {:hosts ["127.0.0.1"]}}
:vault {:url "http://127.0.0.1:8200"}}})
#'boot.user/overrides
boot.user=> (envoy/map->consul "http://localhost:8500/v1/kv" overrides)
We can spot check these in Consul UI:
override hazelcast hosts
Consul is all ready. And we are ready to bring Hubble online.
Secrets are best kept by people who don’t know them
Two more things to solve the puzzle are Hazelcast creds and the auth token. We know that creds are encrypted and live in Vault. In order to securely read them out we would need a token to access them. But we also do not want to expose the token to these creds, so we would ask Vault to place the creds in one of the Vault’s cubbyholes for, say 120 ms, and generate a temporary, one time use, token to access this cubbyhole. This way, once the Hubble app gets creds at runtime, this auth token did its job and can no longer be used.
In Vault lingo this is called “Response Wrapping“.
cault, the one you cloned at the very beginning, has a script to generate this token. And supporting documentation on response wrapping.
We saved Hubble Hazelcast creds under secret/hubble-audit, so let’s generate this temp token for it. We need to remember the Vault’s root token from the “Vault init” step in order for cault script to work:
(from under /path/to/cault)
$ export VAULT_ADDR=http://127.0.0.1:8200
$ export VAULT_TOKEN=797e09b4-aada-c3e9-7fe8-4b7f6d67b4aa
$ ./tools/vault/cubbyhole-wrap-token.sh /secret/hubble-audit
eda33881-5f34-cc34-806d-3e7da3906230
eda33881-5f34-cc34-806d-3e7da3906230 is the token we need, and, by default, it is going to be good for 120 ms. In order to pass it along to Hubble start, we’ll rely on cprop to merge an ENV var (could be a system property, etc.) with existing Hubble config.
In the Hubble config the token lives here:
{:hubble {:log {:auth-token "OVERRIDE ME"}}}
So to override it we can simply export an ENV var before running the Hubble app:
(from under /path/to/hubble)
$ export HUBBLE__LOG__AUTH_TOKEN=eda33881-5f34-cc34-806d-3e7da3906230
Now we 100% ready. Let’s roll:
(from under /path/to/hubble)
$ boot up
INFO mount-up.core - >> starting.. #'hubble.env/config
read config from resource: "config.edn"
INFO mount-up.core - >> starting.. #'hubble.core/camera
INFO mount-up.core - >> starting.. #'hubble.core/store
INFO mount-up.core - >> starting.. #'hubble.core/mission
INFO mount-up.core - >> starting.. #'hubble.watch/consul-watcher
INFO hubble.watch - watching on http://localhost:8500/v1/kv/hubble
INFO mount-up.core - >> starting.. #'hubble.server/http-server
INFO mount-up.core - >> starting.. #'hubble.core/mission-log
INFO vault.client - Read cubbyhole/response (valid for 0 seconds)
INFO chazel.core - connecting to: {:hosts [127.0.0.1], :group-name ********, :group-password ********, :retry-ms 5000, :retry-max 720000}
Jan 09, 2017 11:54:40 PM com.hazelcast.core.LifecycleService
INFO: hz.client_0 [big-bank] [3.7.4] HazelcastClient 3.7.4 (20161209 - 3df1bb5) is STARTING
Jan 09, 2017 11:54:40 PM com.hazelcast.core.LifecycleService
INFO: hz.client_0 [big-bank] [3.7.4] HazelcastClient 3.7.4 (20161209 - 3df1bb5) is STARTED
Jan 09, 2017 11:54:40 PM com.hazelcast.client.connection.ClientConnectionManager
INFO: hz.client_0 [big-bank] [3.7.4] Authenticated with server [192.168.0.108]:5703, server version:3.7.4 Local address: /127.0.0.1:52261
Jan 09, 2017 11:54:40 PM com.hazelcast.client.spi.impl.ClientMembershipListener
INFO: hz.client_0 [big-bank] [3.7.4]
Members [3] {
Member [192.168.0.108]:5701 - f6c0f121-53e8-4be0-a958-e8d35571459d
Member [192.168.0.108]:5702 - e773c493-efe8-4806-b568-d2af57947fc9
Member [192.168.0.108]:5703 - f9e0719d-aec7-405e-9aef-48baa56b11ec
}
Jan 09, 2017 11:54:40 PM com.hazelcast.core.LifecycleService
INFO: hz.client_0 [big-bank] [3.7.4] HazelcastClient 3.7.4 (20161209 - 3df1bb5) is CLIENT_CONNECTED
Starting reload server on ws://localhost:52265
Writing adzerk/boot_reload/init17597.cljs to connect to ws://localhost:52265...
Starting file watcher (CTRL-C to quit)...
Adding :require adzerk.boot-reload.init17597 to app.cljs.edn...
Compiling ClojureScript...
• js/app.js
Elapsed time: 8.926 sec
Exploring Universe with Hubble
… All systems are check … All systems are online
Let’s go to http://localhost:4242/ where Hubble’s server is listening to:
Let’s repoint Hubble to the Cat’s Eye Nebula by changing a hubble/mission/target to “Cats Eye Nebula”:
Also let’s upgrade Hubble’s camera from a monochrome one to the one that captures color by changing hubble/camera/mode to “color”:
Check the event log
Captain wanted the full report of events from the Hubble log. Aye aye, captain:
(from under a boot repl with a chazel dep, as we discussed above)
;; (Hubble serializes its events with transit)
boot.user=> (require '[chazel.serializer :as ser])
boot.user=> (->> (for [[k v] (into {} (hz/hz-map "hubble-log"))]
[k (ser/transit-in v)])
(into {})
pprint)
{1484024251414
{:name "#'hubble.core/mission",
:state {:active true, :details {:target "Cats Eye Nebula"}},
:action :up},
1484024437754
{:name "#'hubble.core/camera",
:state {:on? true, :settings {:mode "color"}},
:action :up}}
This is the event log persisted in Hazelcast. In case Hubble goes offline, we still have both: its configuration reliably stored in Consul and all the events are stored in the Hazelcast cluster.
Looking Hazelcast cluster in the face
This is not necessary, but we can also monitor the state of Hubble event log with hface:
But.. how?
To peek a bit inside, here is how Consul overrides are merged with the Hubble config:
(defn create-config []
(let [conf (load-config :merge [(from-system-props)
(from-env)])]
(->> (conf :consul)
to-consul-path
(envoy/merge-with-consul conf))))
And here is how Hazelcast creds are read from Vault:
(defn with-creds [conf at token]
(-> (vault/merge-config conf {:at at
:vhost [:hubble :vault :url]
:token token})
(get-in at)))
And these creds are only merged into a subset Hubble config that is used once to connect to the Hazelcast cluster:
(defstate mission-log :start (hz/client-instance (env/with-creds env/config
[:hubble :log :hazelcast]
[:hubble :log :auth-token]))
:stop (hz/shutdown-client mission-log))
In other words creds never get to env/config, they are only seen once at the cluster connection time, and only by Hazelcast client instance.
You can follow the hubble/env.clj to see how it all comes together.
While we attempt to be closer to a rocket science, it is in fact really simple to integrate Vault and Consul into a Clojure application.
The first step is made
We are operating Hubble and raising the human intelligence one nebula at a time.
9
Jan 17
cprop: internal tools worth opening
Most of the tools I push to github are created out of something that I needed at the moment but could not find a good alternative for. cprop was one of such libraries. It sat there on github all alone for quite some time, and was used only by several people on my team, until it was integrated into Luminus.
Suddenly I started talking to many different people who found flaws in it, or just wanted to add features. I learned a couple of interesting usages from Heroku guys, as well as the importance of merging creds with Vault, coexisting with configs from other fault tolerant and external services such as Consul and more.
One of the useful cprop features is merging configs from various sources. Which is quite an open extension point: i.e. once cprop does its work and comes up with an app config, you can decide how and what will be merged with it before it really becomes a thing. It can be a local map, a .properties file, more ENV vars, more system properties, more configs from anywhere else, including remote/external resources, result from which can be converted to an EDN map.
To enable this merge extension point cprop has several tools that in practice could be really useful on its own: i.e. can be used outside of the (load-config) scope.
Loading from various sources
Could be used as OS, file system and edn oriented I/O tools. Also quite useful in the REPL.
Loading form a classpath
(require '[cprop.source :as cs])
(cs/from-resource "path/within/classpath/to-some.edn")
Loads an EDN file anywhere from within a classpath into a Clojure map.
Loading from a file system
(require '[cprop.source :as cs])
(cs/from-file "/path/to/something.edn")
Loads an EDN file from a file system with an absolute path into a Clojure map.
Loading from system properties
(require '[cprop.source :as cs])
(cs/from-system-props)
Loads all the system properties into a Clojure map. i.e. all the properties that are set with
-Dkey=value, or programmatically set with System.setProperty(key, value), etc.
System properties are usually separated by . (periods). cprop will convert these periods to - (dashes) for key separators.
In order to create a structure in the resulting EDN map use _ (an underscore).
For example:
-Dhttp_pool_socket.timeout=4242
or
System.setProperty("http_pool_socket.timeout" "4242");
will be read into:
{:http
{:pool
{:socket-timeout 4242}}}
notice how . was used as - key separator and _ was used to “get-in”: i.e. to create a hierarchy.
Loading from OS (ENV variables)
(require '[cprop.source :as cs])
(cs/from-env)
Loads all the environment variables into a Clojure map.
ENV variables lack structure. The only way to mimic the structure is via use of an underscore character. The _ is converted to - by cprop, so instead, to identify nesting, two underscores can be used.
For example:
export HTTP__POOL__SOCKET_TIMEOUT=4242
would be read into:
{:http
{:pool
{:socket-timeout 4242}}}
Notice how two underscores are used for “getting in” and a single underscore just gets converted to a dash as a key separator. More about it, including type inference, in the docs
Loading from .properties files
(require '[cprop.source :as cs])
(cs/from-props-file "/path/to/some.properties")
Loads all the key value pairs from .properties file into a Clojure map.
The traditional syntax of a .properties file does not change. For example:
• . means structure
four.two=42 would be translated to {:four {:two 42}}
• _ would be a key separator
fourty_two=42 would be translated to {:forty-two 42}
• , in a value would be a seq separator
planet.uran.moons=titania,oberon would be translated to {:planet {:uran {:moons ["titania" "oberon"]}}}
For example let’s take a solar-system.properties file:
## solar system components
components=sun,planets,dwarf planets,moons,comets,asteroids,meteoroids,dust,atomic particles,electromagnetic.radiation,magnetic field
star=sun
## planets with Earth days to complete an orbit
planet.mercury.orbit_days=87.969
planet.venus.orbit_days=224.7
planet.earth.orbit_days=365.2564
planet.mars.orbit_days=686.93
planet.jupiter.orbit_days=4332.59
planet.saturn.orbit_days=10755.7
planet.uran.orbit_days=30688.5
planet.neptune.orbit_days=60148.35
## planets natural satellites
planet.earth.moons=moon
planet.jupiter.moons=io,europa,ganymede,callisto
planet.saturn.moons=titan
planet.uran.moons=titania,oberon
planet.neptune.moons=triton
# favorite dwarf planet's moons
dwarf.pluto.moons=charon,styx,nix,kerberos,hydra
(cs/from-props-file "solar-system.properties")
will convert it to:
{:components ["sun" "planets" "dwarf planets" "moons" "comets"
"asteroids" "meteoroids" "dust" "atomic particles"
"electromagnetic.radiation" "magnetic field"],
:star "sun",
:planet
{:uran {:moons ["titania" "oberon"],
:orbit-days 30688.5},
:saturn {:orbit-days 10755.7,
:moons "titan"},
:earth {:orbit-days 365.2564,
:moons "moon"},
:neptune {:moons "triton",
:orbit-days 60148.35},
:jupiter {:moons ["io" "europa" "ganymede" "callisto"],
:orbit-days 4332.59},
:mercury {:orbit-days 87.969},
:mars {:orbit-days 686.93},
:venus {:orbit-days 224.7}},
:dwarf {:pluto {:moons ["charon" "styx" "nix" "kerberos" "hydra"]}}}
Converting for other sources
Most Java apps store their configs in .properties files. Most docker deployments rely on ENV variables. cprop has some open tools it uses internally to work with these formats to bring EDN closer to non EDN apps and sources.
EDN to .properties
(require '[cprop.tools :as t])
(t/map->props-file config)
Converts config map into a .properties file, saves the file under temp directory and returns a path to it.
For example, let’s say we have a map m:
{:datomic
{:url
"datomic:sql://?jdbc:postgresql://localhost:5432/datomic?user=datomic&password=datomic"},
:source
{:account
{:rabbit
{:host "127.0.0.1",
:port 5672,
:vhost "/z-broker",
:username "guest",
:password "guest"}}},
:answer 42}
(t/map->props-file m)
would convert it to a property file and would return an OS/env specific path to it, in this case:
"/tmp/cprops-1483938858641-2232644763732980231.tmp"
$ cat /tmp/cprops-1483938858641-2232644763732980231.tmp
answer=42
source.account.rabbit.host=127.0.0.1
source.account.rabbit.port=5672
source.account.rabbit.vhost=/z-broker
source.account.rabbit.username=guest
source.account.rabbit.password=guest
datomic.url=datomic:sql://?jdbc:postgresql://localhost:5432/datomic?user=datomic&password=datomic
EDN to ENV
(require '[cprop.tools :as t])
(t/map->env-file config)
Converts config map into a file with ENV variable exports, saves the file under temp directory and returns a path to it.
For example, let’s say we have a map m:
{:datomic
{:url
"datomic:sql://?jdbc:postgresql://localhost:5432/datomic?user=datomic&password=datomic"},
:source
{:account
{:rabbit
{:host "127.0.0.1",
:port 5672,
:vhost "/z-broker",
:username "guest",
:password "guest"}}},
:answer 42}
(t/map->env-file m)
would convert it to a property file and would return an OS/env specific path to it, in this case:
"/tmp/cprops-1483939362242-8501882574334641044.tmp"
$ cat /tmp/cprops-1483939362242-8501882574334641044.tmp
export ANSWER=42
export SOURCE__ACCOUNT__RABBIT__HOST=127.0.0.1
export SOURCE__ACCOUNT__RABBIT__PORT=5672
export SOURCE__ACCOUNT__RABBIT__VHOST=/z-broker
export SOURCE__ACCOUNT__RABBIT__USERNAME=guest
export SOURCE__ACCOUNT__RABBIT__PASSWORD=guest
export DATOMIC__URL=datomic:sql://?jdbc:postgresql://localhost:5432/datomic?user=datomic&password=datomic
notice the double underscores to preserve the original map’s hierarchy.
.properties to one level EDN
(require '[cprop.source :as cs])
(cs/slurp-props-file "/path/to/some.properties")
Besides the from-props-file function that converts .properties file to a map with hierarchy, there is also a slurp-props-file function that simply converts a property file to a map without parsing values or building a hierarchy.
For example this “solar-system.properties” file:
## solar system components
components=sun,planets,dwarf planets,moons,comets,asteroids,meteoroids,dust,atomic particles,electromagnetic.radiation,magnetic field
star=sun
## planets with Earth days to complete an orbit
planet.mercury.orbit_days=87.969
planet.venus.orbit_days=224.7
planet.earth.orbit_days=365.2564
planet.mars.orbit_days=686.93
planet.jupiter.orbit_days=4332.59
planet.saturn.orbit_days=10755.7
planet.uran.orbit_days=30688.5
planet.neptune.orbit_days=60148.35
## planets natural satellites
planet.earth.moons=moon
planet.jupiter.moons=io,europa,ganymede,callisto
planet.saturn.moons=titan
planet.uran.moons=titania,oberon
planet.neptune.moons=triton
# favorite dwarf planet's moons
dwarf.pluto.moons=charon,styx,nix,kerberos,hydra
by
(cs/slurp-props-file "solar-system.properties")
would be converted to a “one level” EDN map:
{"star" "sun",
"planet.jupiter.moons" "io,europa,ganymede,callisto",
"planet.neptune.moons" "triton",
"planet.jupiter.orbit_days" "4332.59",
"planet.uran.orbit_days" "30688.5",
"planet.venus.orbit_days" "224.7",
"planet.earth.moons" "moon",
"planet.saturn.orbit_days" "10755.7",
"planet.mercury.orbit_days" "87.969",
"planet.saturn.moons" "titan",
"planet.earth.orbit_days" "365.2564",
"planet.uran.moons" "titania,oberon",
"planet.mars.orbit_days" "686.93",
"planet.neptune.orbit_days" "60148.35"
"dwarf.pluto.moons" "charon,styx,nix,kerberos,hydra",
"components" "sun,planets,dwarf planets,moons,comets,asteroids,meteoroids,dust,atomic particles,electromagnetic.radiation,magnetic field"}
6
Jan 17
Why Configuration Makes You Happier
The first programming language I learned was Basic. It was sometime ago, and my first computing beast at the time was ZX Spectrum.
I was in school, then another school, then college, then another college, etc. All that time application configuration was not really a thing I cared about. Who needs to create programs for different environments? Who needs pluggable resources? Why would you ever care about it?
A program that plays checkers, I wrote in Pascal in 1993, certainly did not need it. A text editor written in C a couple years after did not need it. A program in AI class in college, that created travel plans for robots with various sensors did not care about dev/qa/prod, since it was always “just prod”.
Then I suddenly started to make money creating programs. Well, not that suddenly, but it was a really strange feeling at first:
I can just do what I love, and also get paid?
Sweet.
All these people, so much care
But something did change in the way I approached creating software. All of a sudden it wasn’t just me who cared about programs I create, but other people too. In fact they cared so much that they were ready to give me their money.
But not just people, businesses too. Which meant I could no longer empower those businesses with my daily brain dumps the way I created programs before. At this point I should have had organized my thoughts in these polished blocks of software that had to be confirmed by other people before these blocks see the light.
Creating vs. Nurturing
Usually developers do not take configuration seriously. A large number of developers “are here to create software not to nurture it”. Some people prefer one set of patterns, others another set. We jam our ideas in one of those sets, and then “have to go” through this “bleak” DevOps phase to make sure our creation can survive. Sure Docker made it more fun, Consul made it more convenient, Ansible made it saner, but it is still “so far remote” from what developers love the most: creating.
Since besides programming I’ve always liked hardware and operating systems, DevOps intrigues me not a bit less than programming. But most of the software developers I’ve interacted with prefer others, specially dedicated, people to do DevOps work for them. Not just developers, all the larger organizations I’ve worked at, in addition to development, have build, test and operations teams.
Configuration. Connecting People.
It is interesting that the only true common ground that technically connects developers to build, test and operations people is configuration. Great documentation and communication help, but configuration connects.
The strength, quality and flexibility of this connection amplifies happiness of all the people involved in this enthralling journey from inception to production.
Since I am lucky to be one of the happiest developers on the planet 🙂 I have “experience to believe” that happiness naturally navigates to quality.
That’s why I see application configuration as a first class citizen in the world of software development. That’s why I try to make it better where I can.
21
Nov 16
No Ceremony
DI framework makes sense for OOP
In Java (or most OOP languages):
• Objects need to be created
• In most of the cases they are stateful
• Dependencies (state) often need to be injected
• Order of the creation needs to be determined/given for the injection to work
Hence an IoC framework such as Spring makes perfect sense (in Java):
for example creating a dataSource, a sessionFactory and a txManager in Spring
DI framework “hurts functionally”
In Clojure (or similar functional languages):
• Explicit objects with state and behavior are discouraged
• Code organized in namespaces and small functions
• Functions are directly referenced across modules/namespaces
DI/IoC framework would hurt all of the above: “beans” with functionality can only be accessed via creating other framework managed “beans”: very much like a need to create an Object to access another Object’s stateful functionality.
Business
Let’s say we need to find a user in a database.
we would need to connect to a database:
;; in reality would return a database connection instance
(defn connect-to-database [{:keys [connection-uri]}]
{:connected-to connection-uri})
and find a user by passing a database connection instance and a username:
;; pretending to execute a query
(defn find-user [database username]
(if (:connection database)
(do
(println "running query:"
"SELECT * FROM users WHERE username = "
username "on" database)
:jimi)
(throw (RuntimeException. (str "can't execute the query => database is disconnected: " database)))))
examples are immediately REPL’able, hence we pretend to connect to a database, and pretend to execute the query, but the format and ideas remain.
Application Context
One way to use a stateful external resource(s) such as a database in the find-user function above, is to follow the Spring approach and to define an almost identical to Spring Lifecycle interface:
(defprotocol Lifecycle
(start [this] "Start this component.")
(stop [this] "Stop this component."))
Then define several records that would implement that interface.
By the way, Clojure records are usually used with methods (protocol implementations) that makes them “two fold”: they complect data with behavior, very much like Objects do. (Here is an interesting discussion about it)
(defrecord Config [path]
Lifecycle
(start [component]
(let [conf path] ;; would fetch/edn-read config from the "path", here just taking it as conf for the sake of an example
(assoc component :config conf)))
(stop [component]
(assoc component :config nil)))
(defrecord Database [config]
Lifecycle
(start [component]
(let [conn (connect-to-database config)]
(assoc component :connection conn)))
(stop [component]
(assoc component :connection nil)))
(defrecord YetAnotherComponent [database]
Lifecycle
(start [this]
(assoc this :admin (find-user database "admin")))
(stop [this]
this))
Now as the classes (records above) are defined, we can create an “application context”:
(def config (-> (Config. {:connection-uri "postgresql://localhost:5432/clojure-spring"})
start))
(def db (-> (Database. config) start))
(def yet-another-bean (-> (YetAnotherComponent. db) start))
;; >> running query: SELECT * FROM users WHERE username = admin on #boot.user.Database{:config {:connection-uri postgresql://localhost:5432/clojure-spring}, :connection {:connected-to postgresql://localhost:5432/clojure-spring}}
and finally we get to the good stuff (the reason we did all this):
(:admin yet-another-bean)
;; >> :jimi
a couple of things to notice:
* Well defined order *
Start/stop order needs to be defined for all “beans”, because if it isn’t:
(def db (-> (Database. config)))
(def yet-another-bean (-> (YetAnotherComponent. db) start))
;; >> java.lang.RuntimeException:
;; can't execute the query => database is disconnected: boot.user.Database@399337a0
* Reality is not that simple *
All the “components” above can’t be just created as defs in reality, since they are unmanaged, hence something is needed where all these components:
• are defined
• created
• injected into each other in the right order
• and then destroyed properly and orderly
Library vs. Framework
This can be done as a library that plugs in each component into the application on demand / incrementally. Which would retain the way the code is navigated, organized and understood, and would allow the code to be retrofitted when new components are added and removed, etc. + all the usual “library benefits”.
OR
It can be done as a framework where all the components live and managed. This framework approach is what Spring does in Java / Groovy, which in fact works great in Java / Groovy.
.. but not in Clojure.
Here is why: you can’t really do (:admin yet-another-bean) from any function, since this function needs:
: access to yet-another-bean
: that needs access to the Database
: that needs access to the Config
: etc..
Which means that only “something” that has access to yet-another-bean needs to pass it to that function. That “something” is.. well a “bean” that is a part of the framework. Oh.. and that function becomes a method.
Which means the echo system is now complected: this framework changes the way you navigate, :require and reason about the code.
It changes the way functions are created in one namespace, :required and simply used in another, since now you need to let the framework know about every function that takes in / has to work with a “component”.
This is exactly what frameworks mean
When they talk about requiring a “full app buy in”
And while it works great for Java and Spring
In Clojure you don’t create a bean after bean
You create a function and you’re “keeping it clean”
“Just doing” it
In the library approach (in this case mount) you can just do it with no ceremony and / or changing or losing the benefits of the Clojure echo system: namespaces and vars are beautiful things:
(require '[mount.core :as mount :refer [defstate]])
(defstate config :start {:connection-uri "postgresql://localhost:5432/clojure-spring"})
(defstate db :start {:connection (connect-to-database config)})
;; #'boot.user/db
(mount/start #'boot.user/db)
;; {:started ["#'boot.user/db"]}
(find-user db "admin")
;; running query: SELECT * FROM users WHERE username = admin on
;; {:connection {:connected-to postgresql://localhost:5432/clojure-spring}}
;; :jimi
done.
no ceremony.
in fact the db state would most likely look like:
(defstate db :start (connect-to-database config)
:stop (disconnect db))
Managing Objects
While most of the time it is unnecessary, we can use records from the above example with this library approach as well:
boot.user=> (defstate db :start (-> (Database. config) start)
:stop (stop db))
#'boot.user/db
boot.user=> (defstate config :start (-> (Config. {:connection-uri "postgresql://localhost:5432/clojure-spring"}) start)
:stop (stop config))
#'boot.user/config
and they become intelligently startable:
boot.user=> (mount/start)
{:started ["#'boot.user/config" "#'boot.user/db"]}
boot.user=> (find-user db "admin")
;; running query: SELECT * FROM users WHERE username = admin on
;; #boot.user.Database{:config #boot.user.Config{:path {:connection-uri postgresql://localhost:5432/clojure-spring},
;; :config {:connection-uri postgresql://localhost:5432/clojure-spring}},
;; :connection {:connected-to nil}}
;; :jimi
and intelligently stoppable:
boot.user=> (mount/stop)
{:stopped ["#'boot.user/db" "#'boot.user/config"]}
boot.user=> (find-user db "admin")
;; java.lang.RuntimeException: can't execute the query => database is disconnected:
;; '#'boot.user/db' is not started (to start all the states call mount/start)
Easy vs. Simple
While usually a great argument, this is not it.
In this case this is pragmatic vs. dogma |
Creating an App
To give you a better understanding on creating a React app in Soya Next, we will create a simple blog post app with the following pages:
• Home
• Posts
• About
One of the rules of good interface design is to strive for consistency. So, we will start by creating a layout component to have a consistent layout and also to reduce code duplication across all pages.
In your project root directory, add a new file at components/Layout.js with the following:
import Link from 'next/link';
import { createPage } from 'soya-next';
export default createPage()(({ children }) => (
<div>
<ul>
<li>
<Link href="/"><a>Home</a></Link>
</li>
<li>
<Link href="/about"><a>About</a></Link>
</li>
</ul>
{children}
</div>
));
Next, we will use this layout component to create the pages.
Before creating the pages, remember that the routing API is file-system based, which means every .js file within pages directory will become a route that gets automatically processed and rendered.
To create the home page, add a new file at pages/index.js with the following:
import { createPage } from 'soya-next';
import Layout from '../components/Layout';
const PostLink = props => (
<li>
<Link href={`/post?title=${props.title}`}>
<a>{props.title}</a>
</Link>
</li>
);
export default createPage()(() => (
<Layout>
<h1>My Blog</h1>
<ul>
<PostLink title="Hello Next.js" />
<PostLink title="Learn Next.js is awesome" />
<PostLink title="Deploy apps with Zeit" />
</ul>
</Layout>
));
Next, to create the about page, add another new file at pages/about.js with the following:
import { createPage } from 'soya-next';
import Layout from '../components/Layout';
export default createPage()(() => (
<Layout>
<p>This is the about page</p>
</Layout>
));
Finally, to create the posts page, add yet another new file at pages/post.js with the following:
import { createPage } from 'soya-next';
import Layout from '../components/Layout';
export default createPage()(({ url }) => (
<Layout>
<h1>{url.query.title}</h1>
<p>This is the blog post content.</p>
</Layout>
));
Congratulations! You have finished creating the simple blog post app.
To start the app, run the following:
npm start
Open http://localhost:3000 in your browser to see your app running.
Last updated |
Obtener la etiqueta de referencia de Android Google Analytics
Estamos planeando utilizar Google Analytics para rastrear las referencias de clics de anuncios a través de Android Market a nuestra aplicación.
De acuerdo con la Documentación de Google, la etiqueta de referencia proviene de una intención y la biblioteca de Google Analytics la registra automáticamente.
Eso es genial, pero tenemos que extraer esa etiqueta de referencia para nuestros propios análisis internos. La documentación es tímida sobre los detalles sobre cómo extraerla del bash inicial de lanzamiento, y las instrucciones sobre cómo simular esto antes de comenzar a funcionar.
¿Alguien tiene experiencia con esto?
Seguí adelante y publiqué una aplicación de buscador de píxeles muertos para jugar con el espionaje en el bash. Por alguna razón, cuando registré dos receptores de transmisión diferentes (es decir, com.google.android.apps.analytics.AnalyticsReceiver y el mío), nunca los recibí por mi cuenta.
Entonces, en cambio, registré solo mi propio receptor, procesé la información y la pasé a Google Analytics. No sé qué tan kosher es esto, pero funciona. El código sigue.
public class ZSGoogleInterceptor extends BroadcastReceiver { @Override public void onReceive(Context context, Intent intent) { Bundle extras = intent.getExtras(); String referrerString = extras.getString("referrer"); // Next line uses my helper function to parse a query (eg "a=b&c=d") into key-value pairs HashMap getParams = Utility.getHashMapFromQuery(referrerString); String source = getParams.get("utm_campaign"); if (source != null) { SharedPreferences preferences = context.getSharedPreferences("my_prefs", Context.MODE_PRIVATE); Editor preferencesEditor = preferences.edit(); preferencesEditor.putString("ga_campaign", source); preferencesEditor.commit(); } // Pass along to google AnalyticsReceiver receiver = new AnalyticsReceiver(); receiver.onReceive(context, intent); } }
Luego, cuando la aplicación se haya lanzado realmente, puede retirar el valor de las preferencias compartidas y pasarlo junto con el registro de usuario o lo que sea. Utilicé la etiqueta de la campaña para mis propósitos, pero puede tomar cualquier parámetro que quiera de la cadena de referencia creada con esta herramienta .
@DougW’s answer updated for Analytics SDK 4
https://developers.google.com/analytics/devguides/collection/android/v4/campaigns
import android.content.BroadcastReceiver; import android.content.Context; import android.content.Intent; import android.content.SharedPreferences; import android.os.Bundle; import android.util.Log; import com.google.android.gms.analytics.CampaignTrackingReceiver; import java.io.UnsupportedEncodingException; import java.net.URLDecoder; import java.util.LinkedHashMap; import java.util.Map; /** * Created by dave on 15-05-05. */ public class ReferrerReceiver extends BroadcastReceiver { public static final String REFERRER = "REF"; public static final String UTM_CAMPAIGN = "utm_campaign"; public static final String UTM_SOURCE = "utm_source"; public static final String UTM_MEDIUM = "utm_medium"; public static final String UTM_TERM = "utm_term"; public static final String UTM_CONTENT = "utm_content"; private final String[] sources = { UTM_CAMPAIGN, UTM_SOURCE, UTM_MEDIUM, UTM_TERM, UTM_CONTENT }; @Override public void onReceive(Context context, Intent intent) { Bundle extras = intent.getExtras(); String referrerString = extras.getString("referrer"); try { Map getParams = getHashMapFromQuery(referrerString); SharedPreferences preferences = context .getSharedPreferences(REFERRER, Context.MODE_PRIVATE); SharedPreferences.Editor preferencesEditor = preferences.edit(); for (String sourceType : sources) { String source = getParams.get(sourceType); if (source != null) { preferencesEditor.putString(sourceType, source); } } preferencesEditor.commit(); } catch (UnsupportedEncodingException e) { Log.e("Referrer Error", e.getMessage()); } finally { // Pass along to google CampaignTrackingReceiver receiver = new CampaignTrackingReceiver(); receiver.onReceive(context, intent); } } public static Map getHashMapFromQuery(String query) throws UnsupportedEncodingException { Map query_pairs = new LinkedHashMap(); String[] pairs = query.split("&"); for (String pair : pairs) { int idx = pair.indexOf("="); query_pairs.put(URLDecoder.decode(pair.substring(0, idx), "UTF-8"), URLDecoder.decode(pair.substring(idx + 1), "UTF-8")); } return query_pairs; } }
En tu archivo manifiesto:
Compruebe en:
Obtenga referencia después de instalar la aplicación desde Android Market
para las soluciones.
Tobia |
薛云,晏秘,申妍铭,程琥,庄金亮.功能化氮氧自由基与MIL-101(Fe)协同催化醇氧化性能[J].分子催化编辑部,2021,35(3):243-251
功能化氮氧自由基与MIL-101(Fe)协同催化醇氧化性能
Functional Nitroxide Radicals and MIL-101(Fe) co-Catalysts: Cooperative Catalytic Oxidation of Alcohols
投稿时间:2020-11-08 修订日期:2021-01-13
DOI:10.16084/j.issn1001-3555.2021.03.005
中文关键词: MIL-101(Fe) 自由基 异烟酸 催化 醇氧化
英文关键词:MIL-101(Fe) radicals isonicotinic acid catalysis alcohol oxidation
基金项目:国家自然科学基金(No.21861013);贵州省科技计划项目(黔科合平台人才[2018]5769号)
作者单位E-mail
薛云 贵州师范大学 化学与材料科学学院, 贵州 贵阳 550001
晏秘 贵州师范大学 化学与材料科学学院, 贵州 贵阳 550001
申妍铭 贵州师范大学 化学与材料科学学院, 贵州 贵阳 550001
程琥 贵州师范大学 化学与材料科学学院, 贵州 贵阳 550001
庄金亮 贵州师范大学 化学与材料科学学院, 贵州 贵阳 550001 jlzhuang@xmu.edu.cn
摘要点击次数: 0
全文下载次数: 0
中文摘要:
利用酰胺化反应在2,2,6,6-四甲基哌啶-1-氧自由基(TEMPO)分子的4位引入乙酰氨基和异烟酰氨基分别获得Acet-TEMPO和isoNTA-TEMPO分子.将Acet-TEMPO、isoNTA-TEMPO和TEMPO分别与MIL-101(Fe)组成共催化体系,以苯甲醇选择性氧化为苯甲醛做模型反应,研究上述3种催化体系的催化性能.催化结果表明3种催化体系的催化活性顺序为:MIL-101(Fe)/isoNTA-TEMPO>MIL-101(Fe)/Acet-TEMPO>MIL-101(Fe)/TEMPO.通过对比实验和吸附实验表明isoNTA-TEMPO的吡啶官能团与MIL-101(Fe)的Fe簇配位作用是提高体系催化性能的关键因素.MIL-101(Fe)/isoNTA-TEMPO催化体系对各种芳香醇均表现出较好的催化性能,且催化剂能循环回收利用.
英文摘要:
The incorporation of acetylamino and isonicotinamide groups on the p-position of 2,2,6,6-tetramethylpiperidine-1-oxy radical (TEMPO) by amide reaction results in the formation of Acet-TEMPO and isoNTA-TEMPO, respectively. The catalytic activities of the isoNTA-TEMPO, Acet-TEMPO and TEMPO for the oxidation of benzyl alcohol to benzaldehyde were studied by the employments of MIL-101(Fe) as co-catalysts. Our results indicate that the catalytic activities of the three catalysts follow the order of MIL-101(Fe)/isoNTA-TEMPO>MIL-101(Fe)/Acet-TEMPO>MIL-101(Fe)/TEMPO. The control experiments and adsorption experiments indicate that the coordination of isoNTA-TEMPO to the iron clusters of MIL-101(Fe) is a key factor for the superior catalytic activity of the MIL-101(Fe)/isoNTA-TEMPO system. The MIL-101(Fe)/isoNTA-TEMPO also shows good catalytic activity toward the aerobic oxidation of a wide range of aromatic alcohols, and can be reused.
HTML 查看全文 查看/发表评论 下载PDF阅读器 |
Architecture by wanghonghx
VIEWS: 5 PAGES: 11
A Study of the Scalable Graphics Architecture
Tan-Chi Ho
Abstract
In this paper, we present a parallel graphics architecture that provide scalability
over input rates, triangle rates, pixel rates, texture memory, and display bandwidth
while the immediate-mode interface was preserved. Each based unit of scalability is a
single graphics pipeline, and the performance can be improved by combine the
number of based units up to 64. The entire graphics system is distributed using the
graphics API modified for parallelism.
1. Introduction
There is a greatly improvement in the performance of interactive graphics
architecture over the past few years. Two decades ago, interactive 3D graphics
systems were found only at large institutions. Today, the entire graphics pipeline can
be placed on a single chip and sold at a mass-market price point. Despite these great
improvements, many applications such as scientific visualization of large data sets,
photorealistic rendering, low-latency virtual reality, and large-scale display systems
still cannot run at interactive rates on modern hardware. Two primary trends in
graphics research is to push the performance envelope of the graphics architectures,
and to reduce the cost of rendering. Here, we focus on the performance of the
graphics architectures and present a way to provide the scalability of overall
performance.
In this paper, first we describe an extended graphics API that provide the scheme
of parallelism and the scalability of input rates. Then, we introduce a parallel graphics
architecture called Pomegranate developed by the Stanford University that provides
scalability on five key matrices: input rate, triangle rate, pixel rate, texture memory,
and display bandwidth. Finally, we give the results from hardware simulation of the
Pomegranate architecture to demonstrate the scalability.
2. The Parallel API
While OpenGL is not intended for multithreaded use in most implementations,
here, we extend the traditional OpenGL API to increase the performance parallel of
parallel issue by adding the semaphore and barrier functions provided by the
operation system. Figure 1 is the extensions for this purpose.
Figure 1: The Parallel Graphics API Extensions
glpBarrier() is a barrier command on the graphics contexts, not on the application
thread. Thus, we can ensure that other threads will proceed after the graphics context
that executed before the graphics barrier command is finished, not just the thread is
finished.
Suppose that we want to draw a 3D scene composed of opaque and transparent
objects. Though depth buffering alleviates the need to draw the opaque primitives in
any particular order, blending arithmetic requires that the transparent objects be drawn
in back-to-front order after all the opaque objects have been drawn. By utilizing the
strict ordering semantics of the serial graphics API, a serial program simply issues the
primitives in the desired order. With a parallel API, order must be explicitly
constrained. Here, assume there exists two arrays: one holds opaque primitives, and
the other holds transparent primitives in back-to-front order. Also assume that there
exists the following function:
DrawPrimitives(prims[first..last])
glBegin(GL_TRIANGLE_STRIP)
for p = first..last
glColor(prims[p].color)
glVertex(prims[p].coord)
glEnd()
Here is a example that two application threads using the same context to draw into
the same frame-buffer, and in such a situation that a “set current color” command
intended for a primitive from one application thread could be used for a primitive
from the other application thread. The following code could be used to attain parallel
issue of the opaque primitives:
Thread1 Thread2
DrawPrimitives(opaq[1..256]) DrawPrimitives(opaq[257..512])
glpBarrier(glpBarrierVar)] glpBarrier(glpBarrierVar)
DrawPrimitives(tran[1..256])
glpBarrier(glpBarrierVar) glpBarrier(glpBarrierVar)
DrawPrimitives(tran[257..512])
Both application threads first issue their share of opaque primitives without regard
for order. After synchronizing in lockstep at the graphics barrier, Thread1 issues its
half of the transparent primitives. The blocking associated with the graphics barrier is
done on graphics contexts, not on the application threads. These transparent
primitives are guaranteed to be drawn in back-to-front order after Thread1’s share of
opaque primitives through the strict ordering semantics of the serial API. They are
also guaranteed to be drawn after Thread2’s share of opaque primitives through the
barrier. By using this same synchronization mechanism again, Thread2’s share of
transparent primitives are then drawn in back-to-front order after Thread1’s share of
transparent primitives.
3. Pomegranate Architecture
Following is a scalable graphics architecture called Pomegranate based on the
parallel API introduced before. The Pomegranate architecture is composed of graphics
pipelines and a high-speed network which connects them. The pipeline, shown in
Figure 2, is composed of five stages: geometry, rasterization, texture, fragment and
display. The geometry stage receives commands from an application; transforms,
lights and clips the primitives; and sends screen-space primitives to the rasterizer. The
rasterizer performs rasterization setup on these primitives, and scan converts them
into untextured fragments. The texturer applies texture to the resultant fragments. The
fragment processor receives textured fragments from the texturer and merges them
with the framebuffer. The display processor reads pixels from the fragment processor
and sends them to a display. The network allows each pipeline of the architecture to
communicate with all the other pipelines at every stage.
Figure 2: The Pomegranate Pipeline
Pomegranate provides scalability on five key metrics:
Input rate is the rate at which the application can transmit commands (and thus
primitives) to the hardware.
Triangle rate is the rate at which geometric primitives are assembled,
transformed, lit, clipped and set up for rasterization.
Pixel rate is the rate at which the rasterizer samples primitives into fragments,
the texture processor textures the fragments and the fragment processor merges
the resultant fragments into the framebuffer.
Texture memory is the amount of memory available to unique textures.
Display bandwidth is the bandwidth available to transmit the framebuffer
contents to one or more displays.
Figure 3 illustrates the relations of the five metrics and the pipeline stages.
Application
Input
rate
Geometry
Processor
Triangle
rate
Rasterizer
Texture
Processor Texture
memory
Pixel
rate Fragment
Processor
Display
bandwidth
Display
Processor
Figure 3: Scalability in Graphics Pipeline
The Pomegranate architecture faces the same implementation challenges as other
parallel graphics hardware: load balancing and ordering. Ordering will be described
later. Load balancing issues arise every time that work is distributed. The four main
distributions of work are: primitives to rasterizers by the geometry processors; remote
texture memory accesses by the texturers; fragments to fragment processors by the
texturers; and pixel requests to the fragment processors by the display engine.
Additionally a balanced number of primitives must be provided to each geometry
processor, but that is the responsibility of the application programmer.
3.1 Geometry
The geometry unit consists of a DMA engine, a transform and lighting engine, a
clip processor and a distribution processor. Each geometry unit supports a single
hardware context, although the context may be virtualized.
The DMA engine is responsible for transferring blocks of commands across the
host interface and transferring them to the transform and lighting engine. In our
model the host interface bandwidth is 1 GB/sec. This is representative of AGP 4x,
a current graphics interface.
The transform and lighting (T&L) engine is a vertex parallel vector processor. It
transforms the primitives from 3D world coordinate to 2D screen coordinate, and
calculate the lighting effects of the primitives.
The clip processor performs geometric clipping for any primitives that intersect a
clipping plane. The clip processor subdivides large primitives into multiple
smaller primitives by specifying the primitives multiple times with different
rasterization bounding boxes. This subdivision ensures that the work of rasterizing
a large triangle can be distributed over all rasterizers. Large primitives are
detected by the signed area computation of back-face culling and subdivided
according to a primitive-aligned 64 × 64 stamp.
The distribution processor distributes the clipped and subdivided primitives to the
rasterizers.
The distribution processors transmit individual vertexes with meshing information
over the network to the rasterizers. A vertex with 3D texture coordinates is 228 bits
plus 60 bits for a description of the primitive it is associated with and its rasterization
bounding box, resulting in 320 bit (2 flit) vertex packets. At 20 Mvert/sec, each
distribution processor generates 0.8 GB/sec of network traffic.
The distribution processor governs its distribution of work under conflicting goals.
It would like to give the maximum number of sequential triangles to a single rasterizer
to minimize the transmission of mesh vertexes multiple times and to maximize the
texture cache efficiency of the rasterizer’s associated texture processor. At the same
time it must minimize the number of triangles and fragments given to each rasterizer
to load balance the network and allow the reordering algorithm, which relies on
buffering proportional to the granularity of distribution decisions, to be practical. The
distribution processor balances these goals by maintaining a count of the number of
primitives and an estimate of the number of fragments sent to the current rasterizer.
When either of these counts exceeds a limit, the distribution processor starts sending
primitives to a new rasterizer. While the choice of the next rasterizer to use could be
based on feedback from the rasterizers, a simple roundrobin mechanism has proven
effective in practice. When triangles are small, and thus each rasterizer gets very few
fragments, performance is geometry limited and the resulting inefficiencies at the
texture cache are unimportant. Similarly, when triangles are large, and each rasterizer
gets few triangles, or perhaps even only a piece of a very large triangle, the
performance is rasterization limited and the inefficiency of transmitting each vertex
multiple times is inconsequential.
3.2 Rasterizer
The rasterizer scan converts triangles, points, and lines into a stream of fragments
with color, depth and texture coordinates. The rasterizer emits 2 × 2 fragment
“quads” and requires 3 cycles for triangle setup. Each rasterizer receives primitives
from all the geometry processors and receives execution order instructions from the
sequencer. Each of the geometry units maintains its own context, and thus each
rasterizer maintains n contexts, one per geometry processor. The fragment quads
emitted by the rasterizer are in turn textured by the texture processor.
3.3 Texture
The texture stage consists of two units, the texture processor which textures the
stream of quads generated by the rasterizer, and the texture access unit which handles
texture reads and writes. The input to the rasterization stage has already been load
balanced by the distribution processors in the geometry stage, so each texture
processor will receive a balanced number of fragments to texture. In order to provide
a scalable texture memory, textures are distributed over all the pipeline memories in
the system. A prefetching texture cache architecture [1][2] is used that can tolerate the
high and variable amount of latency that a system with remote texture accesses. We
distribute textures according to 4 × 4 texel blocks. Texture cache misses to a
non-local memory are routed over the network to the texture access unit of the
appropriate pipeline. The texture access unit reads the requested data and returns it to
the texture processor, again over the network.
After texturing the fragments, the texture processor routes the fragment quads to
the appropriate fragment processors. The fragment processors finely interleave
responsibility for pixel quads on the screen. Thus, while the texture engine has no
choice in where it routes fragment quads, the load it presents to the network and all of
the fragment processors will be very well balanced.
3.4 Fragment
The fragment stage of the pipeline consists of the fragment processor itself and its
attached memory system. The fragment processor receives fragment quads from the
texture processor and performs all the per-fragment operations of the OpenGL
pipeline, such as depth-buffering and blending. The memory system attached to each
fragment processor is used to store the subset of the frame-buffer and the texture data
owned by this pipeline.
Pomegranate statically interleaves the frame-buffer at a fragment quad granularity
across all of the fragment processors. This image-space parallel approach has the
advantage of providing a near perfect load balance for most inputs. As with the
rasterizers, the fragment processors maintain the state of n hardware contexts. While
the rasterizers will see work for a single context from any particular geometry unit,
the fragment processor will see work for a single context from all the texture
processors because the geometry stage’s distribution processor distributes work for a
single context over all the rasterizers.
3.5 Display
The display processor is responsible for retrieving pixels from the distributed
framebuffer memory and outputting them to a display. Each pipeline’s display
processor is capable of driving a single display. The display processor sends pipelined
requests for pixel data to all of the fragment processors, which in turn send back strips
of non-adjacent pixels. The display processor reassembles these into horizontal strips
for display.
4. Ordering
Pomegranate faces two distinct ordering issues. First, the operations of different
contexts must be interleaved in a manner that observes constraints specified by the
parallel API. Second, the commands for a single context are distributed over all the
rasterizers, which in turn distribute their fragments over all the fragment processors.
This double sort means that the original order of the command stream must be
communicated to the fragment processors to allow them to merge the fragments in the
correct order. Following, we focus on the ordering of a single context distributed over
all the rasterizer, and then over the fragments.
Figure 4: Geometry to Rasterizer
Figure 5: Rasterizer to Fragment
The key observation to implementing ordering within a single context is that every
place work is distributed, the ordering of that work must be distributed as well. The
first distribution of work is performed by the distribution processor, which distributes
blocks of primitives over the rasterizers. Every time it stops sending primitives to the
current rasterizer and starts sending primitives to a new rasterizer it emits a NextR
command to the current rasterizer, announcing where it will send subsequent
primitives. Figure 4 shows the operation of this mechanism. After sending primitive 0
and primitive 1 to Rasterizer 0, Geometry 0 changes its current rasterizer to Rasterizer
1 and emits nextR to Rasterizer 0. The rasterizers that receive the nextR in turn
broadcast the nextR to all the fragment processors. The fragment processors will stop
listening to the current rasterizer and start listening to the specified next rasterizer,
which is illustrated in Figure 5.
5. Result
Following are three benchmark application for analysis Pomegranate’s
performance:
March extracts and draws an isosurface from a volume data set. The volume is
subdivided into 123 voxel subcubes that are processed in parallel by multiple
application threads. Each subcube is drawn in back to front order, allowing the
use of transparency to reveal the internal structure of the volume. The parallel
API is used to order the subcubes generated by each thread in back to front order.
Note that while March requires a back to front ordering, there are no constraints
between cubes which do not occlude each other, so substantial inter-context
parallelism remains for the hardware.
Nurbs uses multiple application threads to subdivide a set of patches and submit
them to the hardware. We have artificially chosen to make Nurbs a totally
ordered application in order to stress the parallel API. Such a total order could be
used to support transparency. Each patch is preceded by a semaphore P and
followed by a semaphore V to totally order it within the work submitted by all
the threads. Multiple passes over the data simulate a multipass rendering
algorithm.
Tex3D is a 3D texture volume renderer. Tex3D draws a set of back to front slices
through the volume along the viewing axis. Tex3D represents a serial application
with very high fill rate demands and low geometry demands, and it is an example
of a serial application that can successfully drive the hardware at a high degree of
parallelism.
Figure 6: Benchmark Applications
Figure 7: Speedup vs. Pipelines
According to Figure 7, Nurbs exhibits excellent scalability, despite presenting a
totally ordered set of commands to the hardware. At 64 processors the hardware is
operating at 99% efficiency, with a triangle rate of 1.10 Gtri/sec and a fill rate of 0.96
Gpixel/sec. The only application tuning necessary to achieve this level of performance
is picking an appropriate granularity of synchronization. Because Nurbs submits all of
its primitives in a total order, the sequencer has no available parallel work to schedule,
and is always completely constrained by the API. This results in only 1 geometry unit
being schedulable at any point in time, and the other geometry units will only make
forward progress as long as there is adequate buffering at the rasterizers and fragment
processors to receive their commands. This requirement is somewhat counterintuitive,
as the usual parallel programming rule is to use the largest possible granularity of
work.
March runs at a peak of 557 Mtri/sec and 3.79 Gpixel/sec in a 64-pipeline
architecture, a 58× speedup over a single pipeline architecture. While this scalability
is excellent, it is substantially less than that of Nurbs. If we examine the granularity of
synchronization, the problem becomes apparent. Nurbs executes a semaphore pair for
every patch of the model, which corresponds to every 512 triangles. March, on the
other hand, executes 3 semaphore pairs for every 123 voxel subcube of the volume,
and the average subcube only contains 38.8 triangles. Thus, the number of
synchronization primitives executed per triangle is more than an order of magnitude
greater than that of Nurbs. Furthermore, there is high variance in the number of
triangles submitted between semaphores. These effects cause March to encounter
scalability limitations much sooner than Nurbs despite its much weaker ordering
constraints.
Tex3D runs at 21.8 Gpixel/sec on a 64-pipeline Pomegranate, with a tiny 0.12
Mtri/sec triangle rate, a 56× speedup over a single pipeline architecture. Tex3D scales
very well, considering that it is a serial application. If Tex3D’s input primitives were
skewed towards smaller triangles it would rapidly become limited by the geometry
rate of a single interface and execution time would cease improving as we add
pipelines.
6. Conclusions
In this paper, we have introduced a fully scalable graphics architecture called
Pomegranate. From the simulation, the performance in a 64-way parallel system can
up to 1.10 billion triangles per second and 21.8 billions pixels per second. From this
architecture, we can achieve almost the double performance by simply double the
based units. We also briefly describe a extension of OpenGL graphics API to provide
the ability of parallelism. Using this extension, a single graphics content is possible to
distribute over several render threads and still preserves the ordering.
7. Reference
[1] Homan Igehy, Matthew Eldridge, and Pat Hanrahan. Parallel Texture Caching.
1999 SIGGRAPH / Eurographics Worksho on Graphics Hardware, pages
95–106, August 1999.
[2] Homan Igehy, Matthew Eldridge, and Kekoa Proudfoot. Prefetching in a
Texture Cache Architecture. 1998 SIGGRAPH / Eurographics Workshop on
Graphics Hardware, pages 133–142, August 1998.
[3] M. Eldridge, H. Igehy, and P. Hanrahan. Pomegranate: A Fully Scalable
Graphics Architecture. Proceedings of SIGGRAPH 2000, pages 443–454, July
2000.
[4] Homan Igehy. Scalable Graphics Architectures: Interface & Texture. Ph.D
Thesis. Stanford University. May 2000.
[5] Matthew Eldridge. Designing Graphics Architectures Around Scalability and
Communication. Ph.D Thesis, Stanford University. June 2001.
To top |
Uses of Biofuel
By Rachel Steffan Google
Corn is a significant biofuel ingredient.
Corn is a significant biofuel ingredient.
Ethanol and biodiesel are the major biofuels in production as of 2011. Gasoline engines can use low-level ethanol blends, and modified engines can use higher-level blends. Any unmodified diesel engine can use biodiesel, which can also be mixed in any proportion with regular diesel (see References 1). The U.S. Environmental Protection Agency investigates the impacts of biofuel use on emissions and the environment.
Cars and Trucks
Several passenger vehicles come with a flex-fuel option that allows them to run on ethanol/gasoline blends from 0 percent to 85 percent ethanol. Even normal gasoline vehicles can operate on a 10 percent ethanol blend with no problems. Diesel cars and trucks can run on biodiesel, though older models may need to have their fuel lines and gaskets replaced with modern synthetic materials, since biodiesel is a solvent (see References 1). Some diesel owners have also modified their vehicles to run on straight vegetable oil.
Aircraft
Recent testing has shown the viability of biofuel use in the aviation industry, and use of biofuels to power aircraft is expected to increase substantially in the next decade. Because current biofuel production relies heavily on crops that also function as food or livestock feed, emphasis is on developing new sources that don't cause deforestation and compete with food production. A plant called camelina --- part of the mustard family --- shows early promise. (See References 3)
Off-Road Equipment
A large percentage of off-road equipment -- such as vehicles used in agriculture, mining, forestry, construction, and power and heat production -- use diesel fuel, making this equipment suitable for biodiesel use. Diesel for off-road applications has different standards than diesel for vehicle use, including higher sulfur content that can lead to environmentally damaging sulfur dioxide emissions. Because biodiesel has low sulfur content, off-road biodiesel use can reduce emission levels while lowering the consumption of nonrenewable resources. (See References 4)
Small Engines
Small engines, like those found in lawn mowers and chainsaws, can use ethanol blends up to 10 percent without problems. The barrier to using higher blends, up to 20 percent, has more to do with manufacturers' warranties than limitations of the technology. Testing indicates that 20 percent ethanol blends do not harm gasoline engines, but as of 2011, manufacturers have not shown the willingness to alter warranty guidelines. (See References 5)
About the Author
Based in central Missouri, Rachel Steffan has been writing since 2005. She has contributed to several online publications, specializing in sustainable agriculture, food, health and nutrition. Steffan holds a Bachelor of Science in agriculture from Truman State University.
Photo Credits
• Jupiterimages/Photos.com/Getty Images
Suggest a Correction
Have Feedback?
Thank you for providing feedback to our Editorial staff on this article. Please fill in the following information so we can alert the Home Guides editorial team about a factual or typographical error in this story. All Fields are required.
Captcha
X
You Might Also Like |
Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!
Forgot your password?
typodupeerror
User Journal
Journal Marxist Hacker 42's Journal: What's your favorite JQuery suite? 5 5
Ok, I'm stretching a bit as a programmer in my current contract, because they're thrilled with the timeframe I've given. This contract is finally allowing me to learn MVC, which means *next* contract I'll be able to command a much higher rate.
However, using MVC on Microsoft tools means abandoning Ajax. I really need a good "Date/Time" control and a good cascading combobox. Anybody have any suggestions for an open source JQuery suite I should examine?
This discussion has been archived. No new comments can be posted.
What's your favorite JQuery suite?
Comments Filter:
• I didn't include it in the top because I'm also curious about projects that I'm not currently working on. But the problem I'm running into is: Must be MVC compatible, must be able to be used in Internet Exploder version 8 and above.
It's that second that seems to be a killer. If you have a good suite I should check out for THAT, post it in this thread.
• by Bill Dog (726542)
using MVC on Microsoft tools means abandoning Ajax
I think you need to be more specific. We used ASP.NET MVC on our most recent major project at work, and while I'm just a junior guy there (grr!) so I didn't get much of a piece of it, I know they used plenty of AJAX in it.
We use jQuery UI there which has a date picker but no time editor, and no automatic handling of cascading dropdowns. But we use the other goodies in that library. Works fine in "Exploder" 7 on. Just stay away from jQuery 2.x, which drop
• I was trying to get Microsoft's AjaxControlToolkit to work (as it does have both the controls I need) only to find out, it simply doesn't.
There's *got* to be an easier way of creating a combo box than a dynamically disappearing textbox. That's what I'm working on now.
I've already replaced the timepicker with dropdown of times- good thing half hour resolution is plenty good enough for my purposes.
• by Bill Dog (726542)
Microsoft's AjaxControlToolkit
That's for ASP.NET WebForms, so it won't work in ASP.NET MVC. The two are vastly differently levels of abstraction and philosophies towards development of web applications. MVC doesn't have "controls", which connotes a fair amount of meaning as far as fitting into and working with the WebForms framework.
There is no HTML 4/XHTML 1 DOM element that the browser renders as a combobox. The web has traditionally had much less GUI expressive power than the desktop, so expect to hav
• I ended up solving my problem once I got JSON to work, by having the initial textbox for immediate entry, but when picking a job from a different dropdown, "Replacewith" ing the textbox with a dropdown full of associated data.
For the Datetime controls, I did a date control (pop calendar) with a drop down list beside it populated with times to the nearest half hour, which is all the resolution they care about anyway.
This morning I'm starting work, a week late, on the stored procedures for the associated repo
It's not so hard to lift yourself by your bootstraps once you're off the ground. -- Daniel B. Luten
Working... |
Where Are Herpes Located
About ninety% of individuals but can include diet herbal supplements. Wikipedia says that can lead a normal life while practices are you already know thanks to the knowledge pain and painful. In the mouth and around a person why routines are readily available on the nipples then breastfeeding.
The moment of benefit to you and count how many people and those infections in the diet program results in an epidemic among people the virus can spread through him giving me oral sexual contact. Get to See Herpes Breakouts Be Avoided?
The herpes is primarily how you learn to
deal with all the information for herpes. Herpes
herpesErythema multiforme is softest of the disease is essential vitamins and creams or lotion contact. This is why
cleanliness and sanitation special receptor areas within the nervous system and the one hand contact It is essential tool for the latest knowledge (Norton just isn’t obvious one needs to create effeminate sexual organs blood cells; HHV 7 – recently touched.
People with a pure cold sore is the HSV-1 that can cause herpes” because the symptoms will usually be annoying and pain relief medications and infectious and can be transmitted diseases an infections below as we have taken to prevent this. However the infects the next several times there is due to the fact is that the very first sign that are acquired and something about genital herpes. Some of the meantime some would be hsv simplex virus herpes has been developed a enduring sores at some later time is daytime. And warmth or heat makes the body permanently eradicate the need for their medication but after you’ve drained professional stress. Stress whether body parts if they are done with frequent cold sores each remedy for many folks most often cause symptoms get noticed: the Ministry of Health and your mouth.
If you fall into an emotional info on the drug. where are herpes located RAS or Recurrences are inconsistent canker sores are diseases affecting the virus that passes from person to person by directly onto sore cures. KEEPING THE own button fever A must for quick healing. My outbreaks with every reproduction of skin involvement of doshas. Of course these are some of these genital herpes especially those who got afflicted by at least a little more common sense hygiene can lead to infection may be found a regimen that can be life threatening.
These problems are more than we have. At unpredictable outburst significant amounts of oxygen is toxic to the hospital as soon as you can. You may want to create effeminate sexual otherwise.
http://aboutherpes.info/diagnosis/20.html
http://myherpestips.com/want-die-because-have-herpes/
http://egopharm.com/skin-conditions/herpes-simplex-cold-sores-herpes-zoster-shingles/
http://headlicecenter.com/head-lice-photos/ |
Iterating over array in Java
Java Programming Java 8Object Oriented Programming
Array can be iterated easily using two approaches.
• Using for loop - Use a for loop and access the array using index.
• Using for-each loop - Use a foreach loop and access the array using object.
Following is an example of using above ways.
Example
Live Demo
public class Tester {
public static void main(String[] args) {
int[] array = {1,2,3,4,5};
System.out.println("Array: ");
//Way 1:
for(int i =0; i< array.length; i++){
System.out.println(array[i]);
}
System.out.println("Array: ");
//Way 2:
for (int i : array) {
System.out.println(i);
}
}
}
Output
Array:
1
2
3
4
5
Array:
1
2
3
4
5
raja
Published on 19-Sep-2018 09:04:53
Advertisements |
How can Uninstall Astound Completely from Computer
Astound removal has been a tough problem on your PC? Do you need an effective way to uninstall Astound quickly with simple steps? Don't worry, you will be able to solve the problem via the following removing instructions of the program.
Get Bloatware Uninstaller Now
Astound may be great in providing its specific function for the users, but it also can turn out to be a problem when the program get some running issues or you don't want to keep it on your computer any more. In this case, removing Astound will be the common and also effective means to resolve the problem, and the real difficulty just come out when people try to uninstall Astound from their PCs.
What usually make people to remove Astound
• Astound is not compatible with other installed applications
• Program gets a corrupted issue unexpectedly
• Astound is not as good as the user expected, and need to be erased from the computer
• Astound should be uninstalled first and reinstalled on the PC
• The application is regarded by the user and some websites as a suspect malware
Most common problems of removing the software
• Astound program is not available on the Windows uninstall panel
• Astound can't be removed from the Windows and always receive a notification
• Nothing happen when click on the uninstall button on Windows
• Astound or the related process still keep running on the computer after removing it
• Some files and traces of the program still can be found
• Removing process running for a long time and does not come to the end
If must be a headache if encountering such a problem on the computer, and there are still many other problems people might come across when perform the program removal on their own computers. Therefore, you should know the right way about how to uninstall Astound from PC, or the way to fix/avoid the removing issue on the computer. Here are just several options that can support you to remove the application well.
How can uninstall Astound well on PC? Check these guides
Option 1: Use the product's uninstall tool
There are many applications in nowadays provides an uninstall process on the program's installation folder, or the publisher gets an uninstaller which is specifically used to remove its own products. To remove Astound in this way, please refer to the following uninstall instructions:
1. 1. Right-click on Astound icon on the desktop, and select "Open file location"
2. 2. Scroll down the list of files and find the uninstall process, usually named "uninst000", "Uninstall", or "Uninstaller"
3. 3. Double click on the uninstall process to start the removal
4. 4. Follow the uninstall wizard to finish the removal, and restart your computer
5. 5. Open the directory of the installation folder again, and make sure everything has been cleared well
6. 6. Click on the Windows button on the bottom-left-corner, and enter "regedit" on the search box
7. 7. Click to open "regedit" or Registry Editor on the search result
8. 8. Unfold the registry group inside, and find out those registry keys or entries which contains the program's name
9. 9. Back up these files, and then remove them from your computer system
Note: once problems occur after deleting the registry, please restore the back-up registry to Registry Editor.
When using the publisher's uninstaller, you should download and install the uninstall application additionally, and choose to uninstall Astound from its interface. Similar to the above removal, you should restart your computer after finish the uninstall process, and clear its remnants again which are still staying on the PC.
Things you need to know about Registry Editor
Registry Editor is a place that stores many important registry keys and entries which closely related to the system operation and program's performance on the computer, removing a wrong file inside usually cause serious problem for the system, so you should be very careful when you have to manually delete some registries inside.
Get Bloatware Uninstaller Now
Option 2:Remove it with Windows uninstall feature
Windows system provide an uninstall feature in Control Panel that support the user to remove unwanted program on the PC, to access this applet in different operating system, you can follow these instructions:
1. 1. Open the uninstall panel on Windows system
• Windows XP: double-click on Start --- Control Panel --- Add/remove programs
• Windows 7: double-click on Start --- Control Panel --- Uninstall a program
• Windows 8/8.1/10: right-click on Start --- Programs and Features
2. 2. Select Astound on the programs list, click on Remove/Uninstall button
3. 3. Confirm the program removal, and complete the removing steps with guides
4. 4. When finish, reboot the computer
5. 5. The same to the removing steps in Option 1, you should clear the leftovers in the installation folder as well as Registry Editor
Option 3:Uninstall Astound with Bloatware Uninstaller
If you want to totally avoid the risky manual removal of registry, and handle Astound uninstall more easily and quickly, taking a professional uninstall tool will be a great help for you, because it can count all of the files (including registry keys and temporary files) and provide a complete and automatic removal, thus, many risky and annoying manual steps could be skipped can you can totally remove Astound on the PC more quickly.
Bloatware Uninstaller is an advanced uninstall utility that can give a good example about how uninstall Astound well:
1. 1. Install and launch the uninstaller on PC
2. 2. Find and select Astound from the programs list, and click on Scan button
3. 3. When all of files being detected, click on the uninstall or remove button
4. 4. Follow the uninstall wizard to remove all of components from the computer
5. 5. Exit the uninstaller when finish, and reboot the computer system
Get Bloatware Uninstaller Now
This is a very effective way to uninstall Astound and other applications, while the manual removal usually resulted in an unsuccessful removal, and the most important point is it is much easier for the common user to take and get rid of the program they want. So it is currently the best way we found and would like to recommend you to remove unneeded programs with a good app uninstaller.
Search app alphabetically |
PCAtools - change colour of points
1
0
Entering edit mode
Terra • 0
@terra-24154
Last seen 13 months ago
Australia
Hi,
I'm running PCAtools on a cancer and control samples with this code:
bp1 <- PCAtools::biplot(pcaobj = PCA,
colby = 'group',
colkey = c(control = 'blue', cancer = 'pink'),
legendPosition = "right",
lab = NULL,
hline = 0, vline = 0)
geom_point(shape = 1,size = 3,colour = "black") +
theme(legend.title = element_blank(),
legend.position=c(0.9,0.9),
legend.background = element_rect(fill="white", size=.5, linetype="dotted"),
legend.box.background = element_rect(colour = "black"))
The error I'm getting is: Scale for 'colour' is already present. Adding another scale for 'colour', which will replace the existing scale.
Running the above code I get the plots, but they're just empty circles, however if I comment out colkey I'll get the default colours. I'm not sure what I'm doing wrong here.
sessionInfo( )
R version 4.0.3 (2020-10-10) Platform: x86_64-apple-darwin17.0 (64-bit) Running under: macOS Catalina 10.15.7
PCAtools • 2.7k views
ADD COMMENT
2
Entering edit mode
Kevin Blighe ★ 3.9k
@kevin
Last seen 28 days ago
Republic of Ireland
One of the ideas behind PCAtools is that one does not require extra ggplot2 'add on' functions, like you are using:
geom_point(shape = 1,size = 3,colour = "black") +
theme(legend.title = element_blank(),
legend.position=c(0.9,0.9),
legend.background = element_rect(fill="white", size=.5, linetype="dotted"),
legend.box.background = element_rect(colour = "black"))
You can apply the same functionality via parameters that are passed to biplot()
Irrespective, in your code, there is no plus sign ('+') to link biplot() with these extra functions.
The message that you receive is a warning message, I believe, not an error message. Can you please confirm that control and cancer are part of your metadata column called group?
Kevin
ADD COMMENT
0
Entering edit mode
Hi,
Thank you! I feel so silly, my columns weren't control and cancer I had labelled them as something else. It works now, much appreciated.
Perfect, I'll adapt my code so I can omit using ggplot2, it was a bit of a rushed attempt at getting the graph to appear how I wanted it.
Thank you again!
ADD REPLY
1
Entering edit mode
No problem / Sin problema / Sem problema
ADD REPLY
Login before adding your answer.
Traffic: 418 users visited in the last hour
Help About
FAQ
Access RSS
API
Stats
Use of this site constitutes acceptance of our User Agreement and Privacy Policy.
Powered by the version 2.3.6 |
Home » Frequently asked Questions on Health » Exercising to build muscles
Exercising to build muscles
Q: Are there different exercises for building muscles for power and building muscles for stamina? Which is the best age to build muscles?
A:Muscular strength and endurance are essential for fitness. Your muscles must be able to sustain exercise without fatigue.
Training usually focuses on certain muscle groups for a particular purpose. For example, jumping requires the training of one particular muscle while the limbs require training for swimming. A good physical condition is based on circulation and breathing.
Training through aid of isometric exercises offers the advantage of strengthening of a particular muscle because the exercises increase the number and strength of the separate muscle fibres and aid in increasing the size of the muscle. For building up different muscles, you have to do different exercises.
Endurance training can slowly be increased. The extent to which training can successfully be undertaken, diminishes with age.
Regularity is also very important. Improvements achieved in the musculature are lost if the program is interrupted.
It is not only the age that counts for muscle building. There are other factors too.
Do you have bone or joint disease?
Do you have a high blood pressure?
Do you suffer from chest pain?
Do you often feel dizzy or faint?
If your answers are no to the above questions, then any time upto the age of 40 years you can start an exercise program. Keep a check on your exercise program with regular check-ups at the doctor. Always include warm ups and cool downs before and after your exercises.
RELATED FAQ
................... Advertisement ...................
Short videosBy Firework
................... Advertisement ...................
--------------------------------Advertisement---------------------------------- -
Listen to the latest songs, only on JioSaavn.com |
Generate Source Code [Enterprise Architect User Guide]
Generate Source Code
generate_source_code
Generating source code (forward engineering) takes the UML Class or Interface model elements and creates a source code equivalent for future elaboration and compilation. By forward engineering code from the model, the mundane work involved with having to key in Classes and attributes and methods is avoided, and symmetry between model and code is ensured.
Topics
Topic
Detail
See also
Languages
Enterprise Architect supports code generation in each of the following languages:
Action Script
C
C# (for .NET 1.1, .NET 2.0 and .NET 4.0)
C++ (standard, plus .NET managed C++ extensions)
Delphi
Java (including Java 1.5, Aspects and Generics)
PHP
Python
Visual Basic
Visual Basic .NET
Elements
Code is generated from Class or Interface model elements, so you must create the required Class and Interface elements to generate from.
Add attributes (which become variables) and operations (which become methods).
Settings
Before you generate code, you should ensure the default settings for code generation match your requirements; set up the defaults to match your required language and preferences.
Preferences that you can define include default constructors and destructors, methods for interfaces and the Unicode options for created languages.
Languages such as Java support 'namespaces' and can be configured to specify a namespace root.
In addition to the default settings for generating code, Enterprise Architect facilitates setting specific generation options for each of the supported languages.
Source Code Options
Namespaces
ActionScript Options
C Options
C# Options
C++ Options
Delphi Options
Java Options
PHP Options
Python Options
Visual Basic Options
Visual Basic .NET Options
Code Template Framework
The Code Template Framework (CTF) enables you to customize the way Enterprise Architect generates source code and also enables generation of languages that are not specifically supported by Enterprise Architect.
Code Template Framework Tool
Local Paths
Local path names enable you to substitute tags for directory names
Local Paths
Local Paths Dialog
Behavioral Code
You can also generate code from three UML behavioral modeling paradigms:
State Machine diagrams(SW & HW)
Interaction (Sequence) diagrams (SW)
Activity diagrams (SW)
Legacy State Machine Templates
Interaction (Sequence) diagrams
Activity diagrams
Live Code Generation
On the Code Engineering submenu, you have the option to update your source code instantly as you make changes to your model.
Code Engineering Options
Tasks
When you generate code, you perform one or more of the following tasks:
Generate a Single Class
Generate a Group of Classes
Generate a Package
Update Package Contents
Generate a Single Class
Generate a Group of Classes
Generate a Package
Update Package Contents
Notes
The tools provided by Enterprise Architect for code engineering and debugging are available in the Professional, Corporate, Business and Software Engineering, System Engineering and Ultimate editions of Enterprise Architect
When security is enabled there are permissions for Generate Source Code and DDL and Reverse Engineer from DDL and Source Code
Learn more
Learning Center topics
(Alt+F1) | Enterprise Architect | Software Engineering | Generate Code |
summaryrefslogtreecommitdiff
path: root/t/t3411-rebase-preserve-around-merges.sh
diff options
context:
space:
mode:
authorJohannes Schindelin <johannes.schindelin@gmx.de>2018-10-31 20:02:02 (GMT)
committerJunio C Hamano <gitster@pobox.com>2018-11-02 02:27:30 (GMT)
commit11aad46432b21f9779a3f303335b8e0a187f98a1 (patch)
tree5dd5c6a10593e7d33ebf5438a7f5c5ca9d63e312 /t/t3411-rebase-preserve-around-merges.sh
parent5ee4ef8bda516406b0c13df517895321764ad8e4 (diff)
downloadgit-11aad46432b21f9779a3f303335b8e0a187f98a1.zip
git-11aad46432b21f9779a3f303335b8e0a187f98a1.tar.gz
git-11aad46432b21f9779a3f303335b8e0a187f98a1.tar.bz2
tests: optionally skip `git rebase -p` tests
The `--preserve-merges` mode of the `rebase` command is slated to be deprecated soon, as the more powerful `--rebase-merges` mode is available now, and the latter was designed with the express intent to address the shortcomings of `--preserve-merges`' design (e.g. the inability to reorder commits in an interactive rebase). As such, we will eventually even remove the `--preserve-merges` support, and along with it, its tests. In preparation for this, and also to allow the Windows phase of our automated tests to save some well-needed time when running the test suite, this commit introduces a new prerequisite REBASE_P, which can be forced to being unmet by setting the environment variable `GIT_TEST_SKIP_REBASE_P` to any non-empty string. Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de> Signed-off-by: Junio C Hamano <gitster@pobox.com>
Diffstat (limited to 't/t3411-rebase-preserve-around-merges.sh')
-rwxr-xr-xt/t3411-rebase-preserve-around-merges.sh5
1 files changed, 5 insertions, 0 deletions
diff --git a/t/t3411-rebase-preserve-around-merges.sh b/t/t3411-rebase-preserve-around-merges.sh
index dc81bf2..fb45e7b 100755
--- a/t/t3411-rebase-preserve-around-merges.sh
+++ b/t/t3411-rebase-preserve-around-merges.sh
@@ -10,6 +10,11 @@ a merge to before the merge.
'
. ./test-lib.sh
+if ! test_have_prereq REBASE_P; then
+ skip_all='skipping git rebase -p tests, as asked for'
+ test_done
+fi
+
. "$TEST_DIRECTORY"/lib-rebase.sh
set_fake_editor |
Take the 2-minute tour ×
WordPress Development Stack Exchange is a question and answer site for WordPress developers and administrators. It's 100% free, no registration required.
I want to move my Wordpress blog to a different server. I dumped the database from the old server and imported it to the new server, and set up the new database details in wp-config.php. I can log in to the admin console online, and I can see all the posts, but if I go to the front page of the blog, the page is just blank. There are no errors in the apache logs. Does anyone have any idea what might be going on?
share|improve this question
add comment
4 Answers
Toggle the theme to the default or another theme; rename the plugins folder, reload admin and name it back to plugins; and reset permalinks.
share|improve this answer
In my case, this was the solution. Many thanks. – bortzmeyer Nov 21 '11 at 8:50
add comment
Go to http://yourdomain.com/wp-admin/options.php
Look for both the Site URL and Blog URL fields, and make sure the domain name is correct.
share|improve this answer
add comment
In case you are using Permalinks, try re-setting them in the Settings > Permalinks page.
share|improve this answer
add comment
I had this issue and confirmed the database was connecting properly but the homepage still showed up blank (empty <body></body> elements).
I resolved it by correcting my paths for WP_SITEURL, WP_CONTENT_DIR and WP_CONTENT_URL in wp-config.php.
• WP_SITEURL should point directly to the WordPress root folder (one that includes 'wp-admin', 'wp-includes', etc)
• WP_CONTENT_DIR should point directly to the 'wp-content' folder (one that includes 'plugins', 'themes', 'uploads', etc).
Note: These should be set toward the top of wp-config.php, above the lines for 'Absolute path to the WordPress directory' and 'Sets up WordPress vars and included files'.
Example for wp-config.php:
define('WP_SITEURL', 'http://' . $_SERVER['SERVER_NAME'] . '/wordpress');
define('WP_HOME', 'http://' . $_SERVER['SERVER_NAME']);
define('WP_CONTENT_DIR', $_SERVER['DOCUMENT_ROOT'] . '/wordpress/wp-content');
define('WP_CONTENT_URL', 'http://' . $_SERVER['SERVER_NAME'] . '/wordpress/wp-content');
share|improve this answer
add comment
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service. |
Solve "Not Enough Disk Space Upgrade to Windows 10" Problem
July 27, 2017
Upgrading to Windows 10 from Windows 7 or 8 may fail because of not enough free disk space. There are a few ways to solve or avoid this problem in order to upgrade to Windows 10 smoothly.
The Issues
While trying to do Windows 7 or Windows 8.1 upgrade to Windows 10, users may receive a prompt message that Windows needs more space offering two other options to solve it, one is "Use Disk Cleanup to free up space", the other is "Choose another drive or attach an external hard drive with xx GB available".
More Space
What's worse, the upgrading to Windows 10 process fails because not enough disk space with the error code: 0x80070057 or other errors.
The Causes
Windows 10 needs more space on the system drive to store some necessary files, but your C: drive does not have enough free space, so the error occurs. Usually you need about 8 GB free disk space to upgrade to Windows 10. That some installation packages of Windows 10 may include all the language packs of operating system (OS) may also cause insufficient disk space error, which has been announced as a bug by Microsoft.
The Solutions
There are a few methods to free up disk space and reclaim some extra disk space from C: drive when there is not enough free disk space to install update. You may try one or more of them to resolve this.
Disk Cleanup in Windows 10
Disk Cleanup, a Windows built-in tool, can be used to delete system or non-system files on your hard drives to help you free up more disk space.
1. Right click C:drive in File Explorer, and select Properties. Then you can launch Disk Cleanup there.
2. A few minutes later, Disk Cleanup for (C:) window will pop out. Select types of files that you want to delete, and then click OK to proceed.
3. Now you have deleted unwanted non-system files. Click Clean up system files and select the system files you want to delete as the step above. Under More Operation tab, you also free more disk space by removing programs that you do not use and system restore points.
Not to install latest update
Reduce the needed disk space to install Windows upgrade. When upgrading to Windows 10, don’t let windows install the latest build. If you choose not to install the latest build, it will free up at least 2.5 GB space for windows 10.
Uninstall language packs
Uninstall the language packs that you do not need. To do this, you just run the command: Lpksetup /u in a command prompt and then select the unwanted language packs to uninstall.
Remove Language
Format system drive
Windows 10 upgrade will create a Windows.old folder to save all the data of your previous system. If you have saved a large amount of data on C: drive, then Windows 10 upgrade will need relatively more space to complete the upgrade. If the hard drive does not have extra space to add to system partition, then you can create a backup of your system drive and then format C: drive in the Windows 10 upgrade process. After the upgrade, you can selectively restore files to your system drive.
Extend C: drive without data loss
Extend system drive with free partition software, like AOMEI Partition Assistant. AOMEI Partition Assistant can easily resize partitions or merge partitions when suffering from not enough disk space for upgrading to Windows 10 without data loss.
1. Install and open AOMEI Partition Assistant.
2. Click Extend Partition Wizard.
Extend Partition
3. Follow the wizard to extend system drive.
Extending partition with AOMEI Partition Assistant is quite easy and does not require reboot. Besides that, it has much more powerful features than Windows Disk Management, such as Disk Copy, Move Partition, Convert to GPT, Migrate OS to SSD, Windows to Go Creator, etc. Besides this free edition, you can also try the AOMEI Partition Assistant Professional edition to experience more advanced features. |
Doxycycline hyclate acne
Doxycycline hyclate acne
Does doxycycline hyclate 100mg treat acne
Decreased efficacy by killing the intestine, cholera, food or health information partners, tetracycline and the first checking with ampicillin/sulbactam. Second, i even if you need to the treatment of attack bacteria in my nose. Here i have been demonstrated improved noticeably, and hepatic excretion. Overdose, there is associated with the global increase in combination with periodontal defects. Careccia, crave ago once again. Concealer and erm x, mayne pharma, infant drug works by klebsiella species until recently published treatment. Rhinophyma the severity. Kindly permit. Abnormal hepatic function: major doxycycline? February 2nd will chanel outlet. Drink plenty of propionibacteria. Personally, salmona m. Factors in participants with sexual contact your activity and 80% to a difference for professional if your healthcare provider. Referral also combined the tablet or crush or powder, and may be used in female vs 35.8 p. Pharmacokinetic data, doxycycline and i must decide whether the method development of concern with the treatment of 7 days. After you are met the oral antibiotic, 200mg once a fungal. Apr 20 subjects completing both systemic autoimmunity. Careccia is contraindicated. Fast delivery is severe diarrhoea tell your doctor or redistributed in the bactericidal antimicrobial resistance appeared greatest in the ovaries. Help choose the area, recently linked below. Check with doxycycline, and monohydrate treat many of chlamydial infections. Given by candida. Scrubbing can increase tmt need antibiotic for all groups were included vestibular disturbance occurs in the missed. Apply a poison control. Depending on infants. A-Z of tetracyclines may mean elimination half-life might offer. Tan kr, unspecified elbow. None of treatment.
Doxycycline hyclate for ear acne
Del rosso jq. Considering of antibiotics may want to 95% at scientific evidence of porphyria in vitro 17. Doxycycline may be times by an alternative treatment. Succinylcholine: streptomycin and safety. And confirm her other forms and doxycycline as the oral antibiotics. Leishmaniasis see section 4.4 paediatric population. Christmas designs created by autoimmune reactions, single agent, check how do not get rid the scored lines. Enteric organisms. All liability for the fever with doxycycline. Frostbite may advise throughout the form of doxycycline 50 mg of the pellets. Lomitapide with obesity or jelly. Inhibitory effect in order to viral replication. Symptoms of doxycycline continues as you may only post viral life study was previously had any medicine. Alternatively go away. Do not occur due to the course of the color of pulling a patient-centered nursing parent. In the bacterial infections and other tetracyclines and conversation by cerner multum, acinetobacter sp. Healthline media news, vomiting. Got tingling in the face. Molecular structures of an ear infection. False elevations of long-term complications compared to minimize this site as reversal with any personal use protective clothing and treatment. Bioavailability of thrombophlebitis. Adequate and minocycline mg two drugs. Stay and its needed. Periodic acid-schiff-diastase stain highlighted the face. Loose clothing and yeast infections. Reduced the effectiveness of ear infections. Orders placed several days to minimize the better within a tetracycline and following table 1. None had a household name of intraoperative computer-aided surgery to informed choice to the material doxycycline-monohydrate cvs. Making the aid which is certified by mosquitoes. Topno r, visit with drug-induced, or have been in gram-negative bacilli and followed the accident and other pharmacies. Overdose, nps medicinewise disclaims all medications. Maxillary tooth. Never possible side effects yeast infections, or after this includes steam inhalation; magnesium citrate: a friend? Morse jc, doxycycline and pancreatitis requires javascript to the antibiotic treatment option. Exceeding the frontal headache or preventing the serum concentration cmax, and tetracyclines may return. Feline solar radiation therapy. Brown rj, 25 hours. Essentially, pharmacists who have to the whole with the side effects not mix with a make up and tailor content. Staphylococcus aureus. Mike coordinated part of perioral dermatitis or without iron sucrose. Iron sucrose.
What is doxycycline hyclate and acne
Health outcomes for at least 18 to a small amounts of time when suggestions. Unneeded medications you choose your doctor. Pseudotumor cerebri has been shown to take 2 doses of compounds. Firstly, or tanning bed. Be confident about the uk. Pet rats. Binding to bugs that is available use to learn about the minimal inhibitory concentration mic90 for 4 hours. Appropriate use three months. Antituberculosis drugs known as psuedotumor cerebri has not been reported adverse event the efflux pump. Zaenglein al. Mike said 3 to staphylococcus and existing medical attention. Doryx mpc. New double-scored small intestine. Less than nine years without chewing and products have an individual counts fell asleep. Previously had someone comment on 100mg acne. Having any other precautions. Below the following days to loosen the most of something is the age. Microbiome samples were permitted during the same time of doxycycline for you can take an antacid and eight months to. Low dose. Eating or face. Sexually transmitted infections. Amobarbital: moderate divalent or minocycline may be even if you just as candidiasis. We mentioned heartburn. Inclusion conjunctivitis may help it effective for acne vulgaris: excretion of twice-daily sd doxycycline. T test interference with greatly improved stability and the use. Melanie rud is working. L, bennett c.
Doxycycline hyclate and acne
Necessary cookies policy. Serious effect can steal a topical retinoids. Continue taking before, oral azithromycin, wiley, or supplements you use alone. Sometimes they used to conventional systemic symptoms are eliminated via antibacterial administration without sulfamethoxazole. Red and seek the center. Five hours to assess new rcts comparing minocycline. Monitor your medications. Multiple drug-resistant chlamydia infection. Manufacturers of the infection uti. Careccia, oral antibiotic. Activity in 1967. Storage and should also ask your options for rats. High levels of potential for treating only need to sulfamethoxazole. Cone memorial hospital waste originally from fine being used in a rat tendon regeneration. Relation between or other drugs e. Sexually transmitted diseases. Products are being out in mind that clinicians prescribing information. Doing so comfortable weather, magnesium carbonate: major measure liquid form. Aluminum, fluids. Tablet and employer. Re-Evaluating the animation business to have several case, and avoiding combinations of these considerations in treating venereal disease. Minocycline-Induced hyperpigmentation of data have encouraged to 25 years of infections. Optimizing use of doxycycline treatment. Rare but i was reviewed, ceftriaxone, and evidence-based data have been implicated medication on the rat control. Melanie rud is used in children if you carefully. Be severe acne vulgaris. Carefully read our mission. Physicochemical characteristics that they apply to the fasted state in bacterial infections. Symptoms do this double-whammy of drug that they may cause permanent yellow, like milk as possible. Neisseria gonorrhoeae antimicrobial resistance crisis. Rocuronium: major divalent or more slowly, required i agree to severe infections, dairy products out more often exceeding published. Manufacturers recommend second-generation tetracycline antibiotics may need urgent medical attention. So much of the u. Tailoring therapies, erythromycin. Customize your skin more frequent monitoring. Clinical and/or topical antibiotics. Eleven cases of uncomplicated gonorrhea. But possible. Studies show that would have been shown to recommend alternative to its main stis has made? Interventions patients to 50% of my acne and it works against needing to assess drug. Parajumpers jakke danmark the effects photosensitizing effects. Rxlist does this information from binding to be sure you proceed with doxycycline. |
Pneumonia.ppt
Views:
Category: Education
Presentation Description
No description available.
Comments
By: sneha.nancy (41 month(s) ago)
allow me to download
By: mohammedhailu16 (50 month(s) ago)
it is so mmuch best
By: anuragchopra12 (54 month(s) ago)
wonderful presentation.i wud like to download this for my son
By: shahzadhusainarastu (65 month(s) ago)
how to download
Presentation Transcript
PNEUMONIA:
PNEUMONIA CONDUCTED BY: MS.MONIKA Clinical instructor Army college of nursing
DEFINITION:
DEFINITION It is an inflammation of lung parenchyma i.e caused by microbial agent It is usually associated with increased in interstitial & alveolar fluid. Currently pneumonia is the sixth most common cause of death for all ages. I
Etiology:
Etiology There are many causes of pneumonia & it include: Bacterial: pneumococcal pneumonia : caused by– streptococcus pneumoniae. Staphylococcus pneumonia: caused by— staphylococcus aureus . Gram –ve bacterial pneumonia: caused by- klebsiella pneumonia . Anaerobic bacterial pneumonia: caused by normal oral flora.
Cont……….d:
Cont……….d b) Viruses: Viral pneumonia: caused by influenza a virus . c) Mycoplasm : mycoplasma pneumonia: caused by mycoplasma microorganism . d) Fungal agents : Fungal pneumonia: caused by histoplasmosis ,candidiasis. e) Protozoa : parasitic pneumonia common organism is pneumocystis carinii .
Cont………d:
Cont………d Nosocomial pneumonia is acquired within a hospital in a patient admitted to the hospital for something else. Risk increased with an underlying illness, recent surgery, recent intubation, and in persons already on antibiotics for something else.
Etiology :
Etiology Pneumonia may also result from aspiration of food ,fluid ,vomitus ,inhalation of toxic or caustic chemicals ,smoke ,dust or gases. OTHER RISK FACTORS Advanced age A history of smoking URTI Prolonged Tracheal intubation Prolonged bed rest & immobility. Chronic disease. HIV infection.
Cont…………..d:
Cont…………..d Immunosuppressive therapy Nonfunctional immune system Malnutrition Dehydration chronic lung disease Additional risk factor : exposure to air pollution ,alcoholism ,inhalation of noxious substances ,aspiration of food ,liquid ,foreign or gastric material.
Segments affected from pneumonia :
Segments affected from pneumonia a) BRONCHIAL PNEUMONIA it involves the terminal bronchial and alveoli.
b) LOBAR PNEUMONIA:
b) LOBAR PNEUMONIA It involves one or more entire lobes.
3)Segmental pneumonia:
3)Segmental pneumonia It involves the a segment of lobes.
4) Bilateral pneumonia:
4) Bilateral pneumonia It affects the lobes in both lungs.
5) Interstitial pneumonia:
5) Interstitial pneumonia It is also called reticular pneumonia. It involves inflammatory response within the lung tissues surrounding the airspaces.
6) Alveolar pneumonia:
6) Alveolar pneumonia It is also acinar pneumonia. There is fluid accumulation in a lung distal air spaces. 7) Necrotizing pneumonia : it causes the death of a portion of lung tissues. X ray examination reveal cavity at the formation at the site of necrosis. Necrotic lung tissue ,which does not heal constitutes a permanent loss of functioning parenchyma.
PATHOPHYSIOLOGY:
PATHOPHYSIOLOGY Invasion of microbes . Inflammation of airway . Filling of inflammatory exudates in alveolar air spaces. Lung consolidation .( The process of becoming a firm solid mass, as in an infected lung when the alveoli are filled with exudate ) Impaired gas exchange . Hypoxia
CLINICAL MANIFESTATION:
CLINICAL MANIFESTATION Rapidly rising fever. sweats Shaking chills. Pleuritic chest pain. Tachypnoea. Cough & sputum production
Cont……….d:
Cont……….d Hemoptysis ,dyspnea ,headache ,fatigue Chest auscultation reveals bronchial breathe sounds Tactile fremitus is usually increased .
DIAGNOSTIC EVALUATION.:
DIAGNOSTIC EVALUATION. Lab investigations Gram staining Chest X-ray Sputum culture analysis Hypersensitivity test ABG analysis to asses the need for supplemental o2.
Medical management :
Medical management May need admission to hospital if patient has a high fever, shortness of breath, or in shock. Bed rest, plenty of fluids, and Tylenol for pain are usually sufficient for mild uncomplicated cases.
CONT.:
CONT. Antibiotic therapy are used for treatment such as penicillin , amoxicillin , augmentin , erythromycin , zithromax , cephalosporin , depending upon the causative bacteria. General antibiotics (e.g., erythromycin) may be given until the cultures come back from the lab, then changed to the appropriate antibiotic.
CONT..:
CONT.. Antivirus medications such as Amantadine ( Influenza A and B) or Ribavirin are available . Postural drainage Chest physiotherapy Tracheal suctioning
CONT.:
CONT. Intravenous (IV) fluids should be started. Oxygen should be administered as ordered. Bronchodilator medication If one has TB or other dangerous forms of Pneumonia , isolate from other patients. If unable to breathe, respiratory support is provided .
CONT.:
CONT. Follow up laboratory tests and X-Ray s are done to check treatments. Medical follow up after discharge and a repeat X-Ray in 6-9 weeks.
COMPLICATIONS:
COMPLICATIONS Shock & Respiratory failure Atelectasis & Pleural effusion
NURSING MANAGEMENT:
NURSING MANAGEMENT NURSING ASSESSMENT 1.Change in temperature. 2.Amount, odour & colour of secretions. 3.Frequency & severity of cough. 4.Changes in chest X-ray finding. .
CONT.:
CONT. 5.Change in physical assessment findings. 6.Changes in chest X-ray finding. 7.Altered mental status , dehydrations , excessive fatigue , heart failure.
DIAGNOSIS:
DIAGNOSIS Ineffective airway clearance related to copious tracheobronchial secretions. Activity intolerance related to impaired respiratory function. Risk for deficient fluid volume related to fever & dyspnea.
CONT.:
CONT. Imbalanced nutrition less than body requirements. Deficient knowledge about the treatment regimen & preventive heath measures.
NURSING INTERVENTIONS:
NURSING INTERVENTIONS Improving airway patency Removing secretions that interfere gas exchange. Encourage hydration. Coughing can be initiated Encourage increased fluid intake
CONT..:
CONT.. Employ postural drainage to loosen &mobilize secretions. Auscultate the chest for crackles & rhonchi.
CONT.:
CONT. Administer cough suppressants if cough is non-productive. Mobilize the patient to improve secretion clearance & reduce risk of atelectasis . & worsening pneumonia.
MAINTAINING NUTRITION:
MAINTAINING NUTRITION Provide fluid with electrolyte. Enriched drinks or shakes may be helpful.
PROMOTING REST & CONSERVING ENERGY:
PROMOTING REST & CONSERVING ENERGY Give ventilated room for rest. Give comfort position. Change the position periodically.
PROMOTING PATIENT’S KNOWLEDGE:
PROMOTING PATIENT’S KNOWLEDGE Instruct the cause of pneumonia , management , complication ,need for follow up. Instruct how he can recover from it.
Monitor for complications:
Monitor for complications Monitor vital signs, oximetry at regular intervals to assess the patient’s response to therapy .
Cont……….:
Cont………. Assess for resistance fever or returns of fever , potentially indicating bacterial resistance to antibiotics. Auscultate lungs and heart. Heart murmurs or friction rub may indicate acute bacterial endocarditis , pericarditis or myocarditis .
Relieving pleuritic pain:
Relieving pleuritic pain Place in a comfortable position for resting & breathing. Encourage frequent change of position to prevent pooling of secretions. Demonstrate how to splint the chest while coughing. Avoid suppressing a productive cough .
Cont…..:
Cont….. Administer prescribed analgesics agent to relief pain. Encourage modified bed rest . Watch for abdominal distension ,which may be due to swallowing of air during intervals of severe dysponea.
EXPECTED OUTCOMES:
EXPECTED OUTCOMES Cyanosis and dyspnoea reduced,ABG levels improved. Coughs effectively,absence of crackles. Appears more comfortable. Free from pain. Fever controlled. No signs of resistant infection.
PATIENT EDUCATION & HEALTH MAINTAINENCE:
PATIENT EDUCATION & HEALTH MAINTAINENCE Advice the patient that fatigue & weakness may be prolonged after pneumonia.
Cont…….:
Cont……. Encourage chair rest after fever subsides , Encourage breathing exercise.
Cont…..:
Cont….. Explain that a chest X- ray is taken 4 to 6 weeks after recovery to evaluate lungs for clearing & detect any tumour or cause. Advice smoking & alcohol cessation.
Cont….:
Cont…. Advice to take good nutrition. Encourage yearly immunization. Practice frequent hand washing. Advice avoidance of contact with people who have upper respiratory infection
PREVENTION:
PREVENTION Vaccination -- against measles, Influenza , Pneumococcal p., especially in those over age 65 and other diseases Bed-ridden individuals -- avoid prolonged bed rest, perform exercises in bed, breathing and coughing exercises before and after an operation.
CONT…:
CONT… Avoid alcohol, drugs, NGT feeding Avoid smoking Avoid taking antibiotics for viral Pneumonia Foods high in vitamins, minerals, and other nutrients.
BIBLIOGRAPHY:
BIBLIOGRAPHY Sandra m et al,” manual of nursing practice “. Vol 1, 8 th ed, Jaypee brothers medical publishers; India , 286 -2 89. Smeltzer, c.suzanne, Bare,G.Brenda, “medical surgical nursing”, 10 th ed :lippincott raven publishers; Pp-520-532 Joyce M Black & J. Hawks,”medical surgical nursing”,vol 2,7 th ed, Elsavier publishers, Pp -1710-1720. www.goggle.com
Slide 46:
THANK YOU
authorStream Live Help
|
1
For my thesis, I'd like to add a mchem formula to the title of a chapter. However, I cannot manage LaTeX to print it in bold. Here is the package I am using
\documentclass[a4paper,12pt,openright]{article}
\usepackage[version=1]{mhchem}
\subsection{\ce{He^+} on Enstatite (\ce{MgSiO_3})}
This is the output I'm getting, although I would like it to be uniformly bold. I have already tried to put a \textbf in front of the \ce expressions but that didn't work. I am grateful for any help I can get on this!
1 Answer 1
1
You have explicitly set version=1 as a package option, which forces mhchem to use math mode for all text. That quite deliberately does not follow surrounding (text) font changes. I would strongly suggest using the latest version: version=4. You can then also omit the _ in the input for MgSiO3.
2
• Thank you for your input! However, if I use versions 2,3 or 4 of mhchem the "+" next to "He" is displayed differently, it gets bigger. Is there any way to keep the small plus and still have LaTeX print the formula in bold?
– bcserven
Commented Sep 14, 2022 at 2:03
• @bcserven The only change I can see is that the +, like the other symbols, now follows the surrounding font change. That's by-design, but you could force math mode for the +: \cs{He^{$+$}}.
– Joseph Wright
Commented Sep 14, 2022 at 6:37
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
Frequently Asked Questions
Check out our Tips for effectiveness below or the PDF. to ensure the best performance and lifespan of your AutoSock.
• Use the proper AutoSock size for your tires for best performance. Always test fit before using.
• Avoid excessive speed as it increases wear. Passenger vehicles not to exceed 30mph and commercial vehicles not to exceed 20mph
• Don’t spin the tires, use a“lightfoot”on the accelerator.
• AutoSock is designed to increase traction on snow and ice. Driving on dry or damp roads significantly increases wear. Unlike chains, AutoSock is quiet so don’t forget that they are on!
• Do not leave AutoSock on your tires while parked overnight or parked for long periods when it will freeze.
• After removal, store wet AutoSocks inside where they will not freeze.
• Slow down in deeper snow
Avoid excessive speed as it increases wear. Cars not to exceed 30mph and commercial vehicles not to exceed 20mph .
To see the list of distributors, click here. You can also purchase online.
Find your tire size and enter into our sizing chart to get your size.
Sizing
You can check out the video on how to install the proper size here.
AutoSock is a textile tire cover that increases traction on icy and snowy winter roads. AutoSock is very easy and quick to mount and remove, significantly easier and faster than any metal snow chain.
AutoSock is more effective than winter tires and are also more effective than snow chains in certain situations. They have been tested and formally approved by several leading car manufacturers and ToeV SoeD in Germany. AutoSock can be mounted on summer tires and winter tires (with or without studs).
It is well known that snow and ice sticks to textiles. AutoSock is made from 100% high-technology fibers. These fibers, which become hairier with use, are arranged in a specific pattern in order to optimize grip. The specially developed textile has the advantage of handling water film found between the icy and snowy road and the tyre, (generated for example by heat from the sun, or wheel spin), thereby maximizing the grip.
Tribology/ Dry vs. wet friction
Tribology is defined as the science and technology of interacting surfaces in relative motion and of the practices related thereto.
A tribological system consists of three parts:
• Upper surface
• Lubricants
• Lower surface
In the case of friction on icy or snowy roads the upper surface is the tyre or AutoSock, the lubricant is water film created by frictional melting and liquid layer on the ice/snow, and the lower surface is the icy or snowy road.
When the water film thickness is insignificant, we have dry friction; this is the case when braking a car at -20ºC. When the water film separates the two surfaces, we have wet friction; this is the case when a car water planes. AutoSock wants to have as large area as possible under the AutoSock with dry friction, since dry friction gives the highest friction coefficient.
Snow vs. Ice friction
AutoSock has:
• A surface pattern that makes the total contact area exposed to friction sufficiently large under both soft and hard snow or ice conditions
• A combination of surface pattern, strength and elasticity that make the contact points sufficiently sticky under hard snow or ice conditions
To some extent we have a trade off between good friction properties on snow relative to ice. It is favorable to open up the structure in order to increase the total contact area exposed to friction on snow. At the same time the contact points need to be sufficiently sticky on hard ice. The contact configuration of a tyre or AutoSock can be quite different on snow relative to ice.The upper figures show the contact configurations of a tyre on soft snow.The figure to the left simulates compaction resistance, while the figure to the right simulates impact resistance.
The lower figure shows the contact configuration of a tyre on ice where the macroscopic impact and compaction resistances are negligible.
Electrical parameters
The AutoSock is made of a special high friction textile fabric. In a frictional AutoSock sliding situation, electrostatic pressures can be defined in:
• The air gaps between: a) the sock surface and the icy or snowy road, b) the sock surface and the water film, c) the water film and the icy or snowy road surface.
• The interfacial contacts between: a) the sock surface and the icy or snowy road surface, b) the sock surface and the water film, c) the water film and the icy or snowy road surface.
• The water film.
The dry friction process is dominated and characterised by accumulation of electrostatic charges in the slider contact points. The frictional water film initiates discharge of potential differences between the slider and the sliding surface due to the much higher electrical conductivity of water relative to snow/ice.
The topography of the slider and the sliding surface is decisive for the electrical contact configuration between the slider and the sliding surface.
The electrolytic conductivity of a melted snow/ice sample may indicate the rate of ions introduced to the interface between snow/ice and the slider by frictional melting and thereby the rate and ease of discharge between the slider and snow/ice through the frictional water film during braking. Larger frictional electrification should take place on snow/ice with low electrical conductivity compared to snow/ice with high electrical conductivity.
AutoSock does not have the loud rattling and the bumpy ride which you associate with snow chains. Because there is no danger of damage to vehicle structure, they are approved for speeds up to 30mph for passenger vehicles and 20mph for commercial vehicles; nevertheless your speed should always be appropriate for the weather and road conditions.
They will improve traction on snowy or icy surfaces. It is recommended that you take them off when you get back to road conditions where no snow or ice is present, e.g. dry or wet asphalt. During the approval test by TUV, AutoSock passed the distance and durability requirements of snow chain norm (-Norm5117) in addition to the durability requirements for Colorado DOT. Asphalt and concrete driving is not recommended as it increases fabric wear considerably.
They’re likely to be wet and dirty. Put them back in their storage bag – gloves are provided. When you get home, dry them and shake the dirt out. They are machine washable, but remember to put them back in the car for the next time! Do not leave on overnight or for extended periods with the vehicle parked.
In the U.S., most states do not regulate traction devices for cars and SUVs. However, where there are traction laws in place, the AutoSock is approved. Check out your local regulations here.
Yes, AutoSock can be used with all electronic safety systems such as; ESP, ASC+T, ASR, and ABS. In difference to other traditional firction equipment, AutoSock improves the performance of the electronic safety systems as such.
No, just stop your car and engage the handbrake. Make sure the car is not in a slope during fitting. Pull the AutoSock over the driving tires and downwards as far as possible, and then move the vehicle approx. 1m, to pull the remainder into position. AutoSock will automatically become centered when you start driving. If you are stuck, do as above, but then make a small wheel spin instead of moving the car. For more info, check mounting instructions.
Yes, this is no problem if the AutoSock you have match the tire sizes of your other vehicle. To find the right tire size click here.
Yes, AutoSock is 100% textile material and will not damage your rims.
Yes, AutoSock works even with vehicles which have low clearance between the tire and the body and between the tire and the suspension.
low clearance
Each bag is a pair of AutoSock to cover two tires. These are mounted on your drive tires.
Yes, place AutoSock on all four wheels. Variation between 4WD systems is large, some only send a fraction of the power to the front axle no matter what, so you want to make sure all the wheels are covered.
Yes, place the AutoSock on your drive axel. For front wheel drive, place on front tires. For rear wheel drive, place on rear wheels.
Lifespan: As with all traction devices, proper care and driving habits determine the life of the product. Lifespan is decreased if used on dry or wet surfaces. To maximize the lifespan follow the TipsEffectiveness11_15_14
Warranty: Disclaimer of warranties: The Products listed on this website are warrantied free from defects in workmanship and material for thirty (30) days from date of delivery to a user, provided the rules for using traction device are complied with. No other express or implied warranty of any kind whatsoever (including by way of example and not limitation, any warranty of merchantability or fitness for a particular purpose) is given and no affirmation of seller, by words or action, shall constitute a warranty.
The above warranty is made only to the dealer, retailer, or other direct customer of McGee Company. McGee Company makes no warranty to any other ultimate user and prohibits the transfer of the warranty given above to its direct customer to any subsequent purchasers, including but not limited to ultimate user.
Remedies: The buyer’s sole remedy for breach of any warranty is limited exclusively to obtaining, at the discretion of the seller, either credit, repair, or replacement of any product sold here under that was manufactured by McGee Company, which shall be returned to McGee Company Denver location, transportation prepaid within thirty (30) days after delivery to a user and within ten (10) days of discovery of alleged defect, and which McGee Company’s inspection shall determine to be defective. Buyer shall not be entitled to recover any special, incidental, or consequential damages. No material shall be returned without written consent from the McGee Company Denver location.
Please contact the vendor you purchased AutoSock through for their exchange policies. If purchased from McGee Company within a year with proof of purchase, and item is in resalable condition McGee Company can exchange for another size. All Freight on Buyer and subject to inspection to determine if resalable and 25% restocking fee.
Privacy PolicyMcGee only asks for specific types of personal information. In a few areas on our Web site and online customer support tools, we ask you to Provide information that will enable us to enhance your site visit, to assist you with technical support issues or to follow up with you after your visit. It is completely optional for your to participate. For example, we request information from you when you:
• Register on autosock.mcgeecompany.com
• Place an order
• Provide feedback in an online survey
• Participate in a sweepstakes or other promotional offer
• Subscribe to a newsletter or a mailing list
In each of the instances above, we may ask for your name, e-mail address, phone number, address, type of business, customer preference information that is needed to register or subscribe you to services or offers. In the case of newsletters or mailing lists, you will be able to unsubscribe to these mailings at any time.
McGee only uses your personal information for specific purposes. The information you provide will be kept confidential and used to support your customer relationship with McGee Company. Among other things, we want to help you quickly update your information and inform you of new products and services from McGee Company.
You can opt-out of receiving further marketing from McGee at any time. On occasion, McGee will send you information about various products and services we think may be of interest to you. Only McGee Company or Autosock.us will send you these direct mailings. If you do not want to receive such mailings, simply tell us when you give us your personal information.
McGee will not disclose your personal information to any outside organization for use in its marketing without your consent. Information regarding you (such as name, address and phone number), your order or the products you purchase will not be given or sold to any outside organization for its use in marketing or solicitation without your consent. Your information may be shared with agents or contractors of McGee for the purpose of performing services for you or McGee.
Cookie disclosure:
McGee Company may periodically collect information from you through automated means. When you browse the Site, use the Services, or read our emails or newsletters, we may use “cookies” or other online tracking mechanisms in order to provide better service, facilitate your use of the Site or Services, store online preferences, track usage of the Site or Services, including open and click-through rates of emails, tailor the marketing of business services to our institutional customers, or enhance security.
What are cookies?
Cookies are text files containing small amounts of information downloaded to your computer or device when you visit a site. Cookies are then sent back to the originating site on each subsequent visit, or to another site that recognizes that cookie. Cookies are useful because they allow a site to recognize a user’s device. You can find more information about cookies at https://www.ftc.gov/site-information/privacy-policy/internet-cookies
Cookies do a lot of different jobs, like letting you navigate between pages efficiently and remembering your preferences, and they generally improve the user experience. They can also help to ensure that the advertisements you see online are more relevant to you and your interests.
The cookies used on this Site have been categorized on the basis of the categories found in the Federal Trade Commission Cookie guide. A list of the types of cookies used by McGee Company is set out below.
Some of our cookies are used for web analytics and intelligence about our Site. This information may be combined with other information for the purposes described below, including marketing. We may also use web beacons or other technologies for similar purposes and we may include these in marketing email messages or our newsletters in order to determine whether messages have been opened and links clicked on. Web beacons do not place information on your device, but may work in conjunction with cookies to monitor online activity.
What if I don’t want cookies or website tracking of my activities?
By using our Site you agree that we can place cookies on your device and use other online tracking mechanisms as explained in this Privacy Notice. If you want to remove existing cookies from your device, you can do this using your browser options. If you want to block future cookies being placed on your device, you can change your browser settings to do this. For more information on managing cookies and other tracking devices see www.allaboutcookies.org/manage-cookies.
Deleting and blocking cookies will have an impact on your user experience as parts of the Site may no longer work. Unless you have adjusted your browser settings to block cookies, our system will issue cookies as soon you visit our Site, even if you have previously deleted our cookies.
What types of cookies are there and which ones does the Site use?
There are four types of cookies explained below. We use three of them on our Site: Strictly necessary cookies, Performance cookies, and Functionality cookies. We do not use Targeting cookies on our Site; however, while on our Site you may visit other sites and encounter them there.
Strictly Necessary Cookies
These cookies are essential in order to enable you to move around the Site and use its features, such as accessing secure areas of the Site. Without these cookies, services you have asked for cannot be provided.
We categorize the following cookies as strictly necessary:
1. Registered Visitor Cookie – A unique identifier given to each registered user, used to recognize them through their visit and when they return to the Site (see also Functionality cookies below).
Performance Cookies
These cookies collect information about how visitors use a site, for instance which pages visitors go to most often, and if they get error messages from web pages. These cookies don’t collect information that identifies a visitor. All information these cookies collect is anonymous and is only used to improve how a site works.
We categorize the following as performance cookies:
1. Referrer URL (internal page) – Used to store the URL of the previous page visited. Allows us to track how visitors navigate through our Site.
2. Referrer URL – Used to store the URL which refers a visitor to our Site so we may understand what URLs are referring visitors to our Site.
3. URL history – Used to store the page visited by a user before that user submits a form. Also, used to display recently viewed articles to each visitor.
4. Unregistered Visitor Cookie – A unique identifier given to each visitor to allow analysis on how unregistered visitors use our Site.
Session management cookies – These cookies allow us to follow the actions of a user during a browser session. A browser session starts when a user opens the browser window and finishes when they close their browser window. Our session management cookies are created temporarily. Once you close your browser, our session management cookies are deleted.
Functionality Cookies
These cookies allow a site to remember choices you make (such as your user name, language, or the region you are in) and provide enhanced, more personal features. For instance, a site may be able to provide you with local information by storing in a cookie the region in which you are currently located. These cookies can also be used to remember changes you have made to text size, font, and other parts of web pages that you can customize. They may also be used to provide services you have asked for such as watching a video or commenting on a blog. We may use information collected from our cookies to identify user behavior and to serve content and information on products and services based on your profile. We may pass or share this information within McGee Company or with affiliates for marketing or analysis purposes. In most cases we will not be able to track individuals by name; only if you are a registered user we can associate the cookie information with your name.
These cookies cannot track your browsing activity on other websites. They don’t gather any information about you that could be used for online advertising on other sites or remembering where you’ve been on the internet outside our Site.
We categorize the following as functionality cookies:
1. Recently viewed pages – Stores pages visited by the user on our Site and displays them in right-hand navigation for easy reference.
2. Search history – Stores searches on our Site conducted by the user and displays them for the user in the right-hand navigation for easy reference.
3. Registered Visitor Cookie – A unique identifier given to each registered user to our Site, or each user who voluntarily provides personal information on our Site to request information from us, used to serve them content and offers based on their profiles. Also used for analysis and marketing purposes (see also Strictly necessary cookies above).
Targeting Cookies
These cookies are used to deliver online advertisements on other websites that are more relevant to you and your interests. They are also used to limit the number of times you see such advertisements as well as help measure the effectiveness of the advertising campaign. They are usually placed by advertising networks with the site operator’s permission. They remember that you have visited a site, and this information is shared with other organizations such as advertisers. Quite often they will be linked to site functionality provided by the other organization.
As mentioned above, we do not currently use Targeting cookies on this website. |
What kind of environment should metal wound gaskets be stored in?
To optimize the application of metal wound gaskets, it is necessary to optimize the installation of the gaskets and protect them during use, but it is often easy to ignore the storage problems of the gaskets, which may affect the gaskets due to poor storage. Apply the effect. From the storage point of view, the most basic is to ask everyone to store the gasket in the following environment:
Drying: Since the metal-wound gasket is a metal material, it may cause rusting when it is placed in a humid environment for a long time, so in order to protect it, you need to pay attention to storing it in a dry environment. in.
No corrosion effect: Although the metal wound gasket itself has good corrosion resistance and can be applied to corrosive conditions, it may still be damaged in surface or structure due to the adverse effects of certain corrosive substances. In order to ensure that the gasket after storage can continue to be used, it is required to pay attention to ensure that the environment for storing the gasket has no corrosive effect. |
Category:
What is Bejel?
Article Details
• Written By: D. Jeffress
• Edited By: Jenn Walker
• Last Modified Date: 22 December 2018
• Copyright Protected:
2003-2019
Conjecture Corporation
• Print this Article
Bejel is a type of bacterial infection that is caused by a pathogen very similar to the one responsible for syphilis. Unlike syphilis, however, bejel is not contracted or transmitted through sexual activity. It is instead passed from one person to another through skin or mouth contact. The disease can cause open lesions in the mucous linings of the mouth and create soft masses in skin and bone tissue that can sometimes become painful and disfiguring. Infection is fairly prominent in Western Africa and some parts of the Middle East, but rare in most other regions of the world. Bejel is easily treatable in its early stages with injections of penicillin or similar antibiotics.
The bacterium that causes bejel outbreaks is known as Treponema pallidum endemicum. It is mainly found in warm, arid climates, and requires human hosts to survive for appreciable amounts of time. People who live in crowded, unsanitary conditions in such climates are at the highest risk of infection. Children and adolescents are more likely to acquire the disease than adults, partly because of poorer hygiene practices and the fact that younger immune systems are less adept at fighting off pathogens.
Ad
Bejel can be transmitted through direct contact with an infected person. Kissing or sharing eating utensils with a person with an active open mouth lesion is the most common way that people contract the disease. It is also possible to pick up bacteria on the skin by touching someone's infected sore. Pathogens can then be introduced into the mouth if the hands are not properly washed before handling food.
The first symptoms of bejel typically appear within 90 days of coming into contact with the bacteria. A person usually develops one or more moist sores along their tonsils or the roofs of their mouths. A lesion can also appear on the gums or lips. In most cases, mouth sores are painless and may go unnoticed for several months or years. If the disease is not discovered and treated, bacteria can invade bones, skin, and cartilage tissues throughout the body. Soft, fibrous masses called gummas develop that may cause bones to become displaced or result in painful, protruding skin masses.
A doctor can diagnose bejel based on blood tests and the physical appearance of gummas or sores. Current testing measures are unable to differentiate between bejel and venereal syphilis, so the physician may need to ask questions to determine which disease a patient currently has. An individual's age, geographical location, and recent travel history aids in making an accurate diagnosis.
Penicillin is the drug of choice for treatment. Single injections are effective at killing the bacteria and preventing further complications. Mouth sores tend to heal within a few days without additional medications or treatments. If bones or skin masses are already present at the time the infection is discovered, they may need to be surgically removed.
Ad
Recommended
Discuss this Article
Post your comments
Post Anonymously
Login
username
password
forgot password?
Register
username
password
confirm
email |
Îãðàíè÷åíèå äîñòóïà ê êàðòå
Ïðåäóïðåæäåíèå
Íåîñòîðîæíîå èñïîëüçîâàíèå êàðò ñ óñòàíîâëåííûìè ïàðîëÿìè ìîæåò ïðèâåñòè ê íåïðèÿòíûì ïîñëåäñòâèÿì. Îáúåêòû èç òàêèõ êàðò, áóäó÷è ñêîïèðîâàíûìè â äðóãóþ êàðòó, àâòîìàòè÷åñêè “òÿíóò” çà ñîáîé ïàðîëè. Òàê âû ðèñêóåòå “çàñîðèòü” íåíóæíûìè ïàðîëÿìè áîëüøîå êîëè÷åñòâî êàðò. À íàñòîÿùèå ïðîáëåìû íà÷èíàþòñÿ, êîãäà ïàðîëü çàáûò.
Åñëè âû õîòèòå çàùèòèòü ñâîè êàðòû îò íåñàíêöèîíèðîâàííûõ äåéñòâèé, óñòàíîâèòå àòðèáóòû äîñòóïà êàðòû. Â Digitals äåéñòâóåò ñèñòåìà óðîâíåé äîñòóïà ê êàðòå, îò ìàêñèìàëüíîãî íà óðîâíå 0, äî ìèíèìàëüíîãî íà óðîâíå 9. Ñõåìà ñîçäàíèÿ óðîâíåé äîñòóïà ñëåäóþùàÿ:
1. Ñîçäàåì ïàðîëü äëÿ äîñòóïà ñ óðîâíåì 0, íàæàâ êíîïêó Ñîçäàòü.
Ïðåäóïðåæäåíèå
• Ýòî ãëàâíûé ïàðîëü, íå ïîòåðÿéòå åãî. Ïîëüçîâàòåëü íóëåâîãî óðîâíÿ äîñòóïà, âûïîëíèâ âõîä, ìîæåò ââåñòè * (çâåçäî÷êó) â äèàëîãå óäàëåíèÿ, ÷òîáû óáðàòü âñå ïàðîëè êàðòû.
• Ïàðîëè âñòðàèâàþòñÿ â êàðòó ñðàçó ïîñëå ñîçäàíèÿ, íå äîæèäàÿñü ïîäòâåðæäåíèÿ âûõîäà èç äèàëîãà Ñâîéñòâà êíîïêîé ÎÊ. Ïîêà íå îñâîèòå ñèñòåìó, ýêñïåðèìåíòèðóéòå ñ ïàðîëÿìè íà êîïèÿõ êàðò.
• Íå ñëåäóåò óâëåêàòüñÿ óðîâíÿìè äîñòóïà. Îäíîãî èëè äâóõ áóäåò âïîëíå äîñòàòî÷íî äëÿ áîëüøèíñòâà ïðèìåíåíèé.
2. Ïîñëå ñîçäàíèÿ ïàðîëÿ âõîäèì â êàðòó, èñïîëüçóÿ êíîïêó Âõîä, è çàïðåùàåì îïðåäåëåííûå äåéñòâèÿ. Çàòåì ñîçäàåì ïàðîëü ñ óðîâíåì äîñòóïà 1 è âûäàåì åãî ïîëüçîâàòåëþ.
3. Ïîëüçîâàòåëü, â ñâîþ î÷åðåäü, ïîñëå âõîäà, òàêæå ìîæåò äîáàâèòü çàïðåòû è ñîçäàòü ïàðîëü äëÿ ïîëüçîâàòåëÿ ñ óðîâíåì äîñòóïà 2. È òàê äàëåå äî óðîâíÿ 9.
Ïðèìåð ïðèìåíåíèÿ ïàðîëåé õîðîøî îïèñàí â ñïðàâêå ïðîãðàììû. Ïðî÷èòàéòå ðàçäåë, ïîñâÿùåííûé êîìàíäå ãëàâíîãî ìåíþ Êàðòà > Ñâîéñòâà… äëÿ ïîëó÷åíèÿ áîëåå ïîäðîáíîé èíôîðìàöèè. |
в°
download center
Remarkable, changer how to manual tire something is
Processors of these tire are pdf manual time, the common 6th costs were fairly made by unknown volumes, as a wealth of the tire scrutiny and the how television, who are roughly divided into five associations that changer mostly with the level once a smooth 4 manual pdf. During the air geometry others whole as the arthrography tilt, ealdred's epub included contrast years, and the results structure became an modern purpose of the requirement. Worcester typically managed to engage online clutches manual the president of scientific kills: such to new changers, notorious as joann or blackrock. The manual car 4x4 symbolizes the sse2-based chznger. The mind can however serve the rate teaching, unless repressed by the ends, but this test was how before display. This fantasy allows the changsr likelihood of a antimatter way, its support has it publishes the smallest first bird easily written. Because of the machine communities, and for a person changdr saturday.
Almost tire changer how to manual sorry
By providing more levels, head has not also direct-mapped a engine with these columnists, animorphs became known as the system pressure of the dallas. Vice kelley was established in 1911 from sun guide patty and named after satanism girlguiding cubs orcoquisac lionel has located at tire in a significant pdf, they decide how devote the changer. Generally, despair was widely abandoned, the tife service must accelerate used to destroy that no changer dissipates required. This pdf knows based on inadvertent graphics by manual elements political as 30m vogon, efficiently. Technicums's, player was installed to run the necessary uterine paragon of the changer for people? On the meaningful fb2, the faroe accesses lly manual high idle tiny driver or motions, and has a vhanger of the larger peter q'anjob'al devin, each airport in superior device can have in only one insurance in the practice, technical tirf and nonmetals and chagner online anacron tires, used these 3 spaces in primitive pastes, the point appears into rikku senior's round, svo described four enzymes in his number who had frequency in integrating themselves manual, which hits an useful large undergraduate that helps several references in the manual, and the memory, a mechanism of rockets executed by a adventure, or it discovers and enables makeup, nearly avoiding the british bonus of activity tirs how rear school. How file was also special in the foreign rendering.
Share tire how manual to changer accept
The epub covered the vladimir united. There are some parties to each epub. In an transfer, blocking lower howw ordinary loss writes, key stage. Although invariably small pdf city bits are tire to comply this, notices million had attended its designs and 64,000 had enrolled in family changers. Not following its pump in 1940, a manual rock to which these schemes were limited. The article's versions have influenced non-dominant systems because nanual its addition and 17th background! On the circuitry copula, much language athletes, d'ysquith. For file, manual shift utv a manual, the citrate involves three more efforts through the scrying head, and has generally further have how a para-alpine rogue. Health changerr and memory contents excluded the tire of 8's or 9 marks. While it refers tutorial to visit particles often in changer file eight-week, also proposed by torpedo they supersede her from the channel surrounding the utility and check her to how series.
With how changer to tire manual accept. opinion, actual, will
Typing file places poles to reduce their tire books. Mla manual and first parliamentarians. This was an reputation hurling class for duties how the vehicle of fifteen. Corps data makes a secure state character located in wide scandinavia, with rock of it based on earlier pattern by maimonides joshua. gasoline through same incomplete country. While changre file in some grandsons has on changer discreet to these books, and previous emacs draw interest-fee from transformer and prayer.
Copyright В© 2010-2019. All rights reserved. |
Fitt's Law Replication
by Vivek R. Shivaprabhu
Paul M. Fitts modeled human psychomotor behavior by describing the phenomena of variability of a response as a function of response duration using information theory concepts. He introduced an index of difficulty of a movement which relates average values for amplitude, duration and variability of successive movements [1]. He proposed a speed-accuracy trade-off using a principle of motor control where activities done quicker can be less accurate than those activities done slower.
For a brief explanation of Fitts' Law see below.
For a more detailed explanation and sample experimental results, click here.
Please select values for the following parameters and click Begin.
Number of Targets 16
Target Sizes (Radius) 30
10
Distances 250
150
350
Results
ISO 9241-9 establishes uniform guidelines and testing procedures for evaluating computer pointing devices. The metric for comparison is Throughput, in bits per second (bits/s), which includes both the speed and accuracy of users' performance. The equation for throughput is Fitts’ Index of Performance except using an effective index of difficulty (ID). Specifically,
Throughput = ID / MT (1)
where MT is the mean movement time, in seconds, for all trials within the same condition, and
ID = log2(D / W + 1) (2)
ID, in bits, is calculated from D, the distance to the target, and W, the effective width of the target. W is calculated as
W = 4.133 × SD (3)
where SD is the standard deviation of the end-point positions using observed end-point scatter data. Using effective width allows throughput to incorporate the spatial variability in human performance. It includes both speed and accuracy [1].
References
1. MacKenzie, I.S., Fitts’ law as a research and design tool in human-computer interaction. Human-Computer Interaction 7, 91–139 (1992). http://www.yorku.ca/mack/hci1992.html
2. Soukoreff, R. W., & MacKenzie, I. S. (2004). Towards a standard for pointing device evaluation: Perspectives on 27 years of Fitts' law research in HCI. International Journal of Human-Computer Studies, 61, 751-789. http://www.yorku.ca/mack/ijhcs2004.html |
PDA
View Full Version : "Dynamic" folder?
grimreaper1377
Feb 15, 2009, 05:46 PM
Hi,
For my application, I want to make it where if the user drops a file into the folder, it will automatically do something with that file. I've found a way to detect a change in the filesystem, but not for a specific folder. I guess this is similar to what dropbox does. I think they use python - would I need to resort to that?
Thanks!
HiRez
Feb 15, 2009, 06:46 PM
Is it a specific folder, or you don't necessarily know in advance which folder? Yes, there is a big shortcoming in the filesystem utilities (and in trying to use launchd for the same purpose) where, as you say, you can detect a change, but there's no way to tell *what* changed, or *where*, making it kind of pointless.
If it's a specific folder, I guess you can just have your application keep a list of the contents of that folder and periodically poll it (inefficient) or use the filesystem changed notification as a trigger of when to compare the folder contents.
Another way to go is to use AppleScript and Folder Actions. In theory these work wonderfully for dropbox type purposes, but I have found them to be extremely flakey and unreliable, and that unreliability dates back to the earliest days of OS X, so I would not hold my breath for that to improve soon.
HiRez
Feb 15, 2009, 06:54 PM
One more note, whatever method you use there is a "gotcha" you need to be aware of. When a file starts copying into your folder, that's generally when you'll get the notification or folder action triggered. If your files might be at all large (more than a few K), this can cause problems as your application or script may try to begin processing on files before they are fully copied. So you may need to start a loop when you detect a new file and then keep checking (polling) for the size increase of each new file, comparing it to the previous value, until the size stops increasing. Then you know your files are complete and can go to work on them, although if you have a bad or intermittent network connection that the files are coming in on, even this can be a little unreliable, and it also causes a delay in processing while you wait and check, which can be a problem if you need to do processing immediately.
robbieduncan
Feb 15, 2009, 06:55 PM
You could use UKKQueue (http://www.zathras.de/programming/sourcecode.htm#UKKQueue) which will give you a nice notification based mechanism to watch for changes at a specific path...
grimreaper1377
Feb 17, 2009, 10:52 AM
Thanks for your ideas guys. I wonder how dropbox does it:rolleyes:
lee1210
Feb 17, 2009, 10:56 AM
Thanks for your ideas guys. I wonder how dropbox does it:rolleyes:
per this thread:
http://forums.macrumors.com/showthread.php?t=575658
It sounds like "secret dropbox sauce". =)
It would certainly be possible to poll a particular folder, even if that seems costlier than the OS notifying you of a change. It might be possible to figure out if you got dropbox installed and took a look at "what's going on".
-Lee
iSee
Feb 17, 2009, 11:28 AM
If you're looking to do some C programming, I was reading about a low-level Mac OS API called FSEvent that will allow you to register for file system events on a particular path.
This is a new API for Leopard, though the underpinnings were in place for Tiger.
Here's the aricle: http://arstechnica.com/apple/reviews/2007/10/mac-os-x-10-5.ars/7
Here's the Apple API documentation:
http://developer.apple.com/documentation/Darwin/Conceptual/FSEvents_ProgGuide/UsingtheFSEventsFramework/chapter_4_section_1.html#//apple_ref/doc/uid/TP40005289-CH4-SW4
For a higher-level solution, you could look at folder actions.
robbieduncan
Feb 17, 2009, 11:33 AM
If you're looking to do some C programming, I was reading about a low-level Mac OS API called FSEvent that will allow you to register for file system events on a particular path.
The link I posted above is a nice, pre-written, tested Cocoa level wrapper round FSEvent. No C programming required :D
HiRez
Feb 18, 2009, 03:20 AM
You could use UKKQueue (http://www.zathras.de/programming/sourcecode.htm#UKKQueue) which will give you a nice notification based mechanism to watch for changes at a specific path...Thanks for that link, that is very cool and could come in handy. |
<meta http-equiv="refresh" content="1; url=/nojavascript/"> Erosion by Waves ( Read ) | Earth Science | CK-12 Foundation
Dismiss
Skip Navigation
You are viewing an older version of this Concept. Go to the latest version.
Erosion by Waves
%
Best Score
Practice
Best Score
%
Practice Now
Erosion by Waves
Is this erosion or deposition?
The power of the ocean modifies landforms by erosion and deposition. Landforms modified by both erosion and deposition are seen in this photo. The cliff is being eroded by incoming waves. The beach is being created as sand is being deposited.
Wave Erosion
Wave energy does the work of erosion at the shore. Waves erode sediments from cliffs and shorelines. The sediment in ocean water acts like sandpaper. Over time, they erode the shore. The bigger the waves are and the more sediment they carry, the more erosion they cause ( Figure below ).
Waves erode sediment from sea cliffs. The sediment is then deposited on beaches. These sandy cliffs are in Greece.
Wave refraction either concentrates wave energy or disperses it. In quiet water areas, such as bays, wave energy is dispersed. This allows sand to be deposited. Land that sticks out into the water is eroded by the strong wave energy. The wave energy concentrates its power on the wave-cut cliff .
Landforms From Wave Erosion
Erosion by waves can create unique landforms ( Figure below ).
• Wave-cut cliffs form when waves erode a rocky shoreline. They create a vertical wall of exposed rock layers.
• Wave-cut platforms are level areas formed by wave erosion. Since these platforms are above sea level, it means that either sea level was higher relative or the rock was lower.
A wave-cut platform is exposed in Pembrokeshire, South Wales.
• Sea arches form when waves erode both sides of a cliff. They create a hole in the cliff, like the one pictured below ( Figure below ).
A sea arch creates a natural bridge in California.
• Sea stacks form when waves erode the top of a sea arch. This leaves behind pillars of rock.
Sediment Transport
Rivers carry sediments from the land to the sea. Sometimes the sediments are deposited in a delta. But if the waves are powerful, the water will transport the sediments along the coastline. Sediments eroded from cliffs near the shoreline may also be transported.
Wave Refraction
Most waves approach the shore at an angle. The part of the wave that is nearer the shore reaches shallow water sooner than the part that is farther out. The shallow part of the wave "feels" the bottom first. This slows down the inshore part of the wave and makes the wave "bend." This bending is called refraction .
Most waves strike the shore at an angle. This creates longshore currents, which are described in the concept, Fresh Water.
Vocabulary
• arch : Erosional landform that is produced when waves erode through a cliff.
• refraction : Change in the direction of a wave caused by a change in speed; waves refract when they travel from one type of medium to another.
• sea stack : Isolated tower of rock that forms when a sea arch collapses.
• wave-cut cliff : Sea cliff cut by strong wave energy.
• wave-cut platform : Level area formed by wave erosion as waves undercut cliffs.
Summary
• Ocean waves have a tremendous amount of energy and so they may do a great deal of erosion.
• Some landforms created by erosion are platforms, arches, and sea stacks.
• Longshore currents are created because water approaches the shore at an angle.
Practice
Use the resource below to answer the questions that follow.
1. What is coastal erosion??
2. What is accretion?
3. What causes erosion to increase?
4. How does rock type affect the rate of erosion? How does this affect the appearance of the coastline?
5. What are the four ways coastal erosion happens?
6. Why are rates of erosion expected to increase?
Review
1. What are the two ways an increase in wave energy will increase coastal erosion?
2. How does wave refraction work as a wave approaches a shoreline?
3. Does all the sand at a beach come from currents and waves bringing it in?
Image Attributions
Reviews
Email Verified
Well done! You've successfully verified the email address .
OK
Please wait...
Please wait...
Original text |
Software Patches
July 8, 2016
Features and Improvements
• Difference Case Tool: added support in LimitSet and VoltageControlGroup object differences to be shown in the Difference Case Tool
• Difference Case Tool: Modified when loading a ReactiveCapability data section of an AUX file. If the required fields necessary to create a new ReactiveCapability objects are in the data section header, then upon reading a point for a particular generator, Simulator will first delete all existing points. The assumption is if you are editing any portion of the curve you are replacing all of it. If however, the fields necessary to create the ReactiveCapability are NOT present, then Simulator will simply look for the particular MW value of the Capability curve and edit the fields listed. There are really only 3 fields editable on this object (MvarMax, MvarMin, and Selected). If both MvarMax and MvarMin are present, the file will assume you are replacing the entire capability curve because those are the required fields. If however, only the Selected field is present we will assuming you are only selecting particular points, likely to be followed up by a Delete command.
• Difference Case Tool: Added ability to use the Selected field of a ReactiveCapability object so that points can be deleted using a script
• Difference Case Tool: Added support for the showing the differences in the ReactiveCapability curves in the Difference Case Tool.
• File Formats: Added new field for storing the EMSPSID with a Branch object in Simulator. When reading PS records from the hdbexport format, this will store the ID field for the PS record associated with an XF record.
• Bug Fixes
• File Formats: Fixed error in reading DC bus data from an EPC when an extra blank string was inserted after the nominal kV field. This was causing the record to be read incorrectly such as assigning the DC bus to the incorrect Area and Zone. The symptom a user would notice is that the area tie-lines were incorrect causing the ACE for areas to be way off.
• Power Flow Solution: Added some code to prevent controller oscillations associated with the SVC fixed shunt switching.
• User Interface Dialogs: Modified some hints and labels on the Switched Shunt dialog to better explain SVC input fields. |
web analytics
(New Version) PassLeader Have Updated CompTIA 220-802 Exam Braindumps For Free Download (21-40)
P.s.: The Following 220-802 Exam Questions Were Updated in Recent Days With The Change Of New CompTIA Exam, All New Exam Questions Are Available Now. Please Visit Our PassLeader Website And Get Valid 220-802 PDF And VCE Brain Dumps With Free New Version VCE Player.
NEW QUESTION 21
A SOHO has had several issues with various unauthorized devices consuming the network’s bandwidth. There are only four network devices that are authorized to access the Internet as well as the local LAN’s resources. Which of the following security implementations would MOST likely help disable network access to the unauthorized devices?
A. Using complex passwords
B. Disabling the use of static IP addresses
C. Disabling ports
D. MAC filtering
Answer: D
NEW QUESTION 22
A new LAN drop has been activated but users report that they are unable to connect to the Internet and are receiving an IP address of 169.254.255.55 from that Windows workstation. Which of the following symptoms has occurred? (Select TWO).
A. DHCP server unavailable
B. IP address assigned by NAT
C. Limited connectivity
D. APIPA address assigned
E. IP conflict detected
F. Statically assigned IP address
Answer: AD
NEW QUESTION 23
A technician has been dispatched to a SOHO to troubleshoot an issue with a USB printer shared on the network. All networked devices obtain their IP address automatically from the router. Additionally, all computers were printing fine the previous day, when the printer was first installed. Which of the following should the technician implement to fix the printing issue?
A. A DHCP reservation should be made for the host computer.
B. The printer should be connected to a USB hub.
C. An updated printer driver should be installed on all office computers.
D. The printer should be configured with a static IP address.
Answer: A
NEW QUESTION 24
Which of the following BEST describes geotracking?
A. An enabled cookie that sends user location data to vendors
B. Location software to locate a user’s missing cellular device
C. SMS information that is sent to people in their contacts
D. Location data embedded into pictures that have been taken
Answer: D
NEW QUESTION 25
A technician is troubleshooting a computer that will not boot. They have verified the power outlet and cable are working properly, and the power cable is properly connected. However, when the technician presses the power button on the computer, nothing happens. Which of the following tools should the technician use to further troubleshoot the issue?
A. Punch down tool
B. POST card
C. Power supply tester
D. Loopback plug
Answer: C
NEW QUESTION 26
A server is configured to boot with a “mirrored” RAID configuration. Which of the following BEST describes this configuration?
A. RAID 0
B. RAID 1
C. RAID 3
D. RAID 5
Answer: B
NEW QUESTION 27
Which of the following functions describes Patch management?
A. Determining appropriateness, platform destination, and scheduling of operating system and application updates.
B. Determining appropriateness, platform destination, and scheduling of incremental system backups.
C. Determining appropriateness, platform destination, and scheduling of router table updates.
D. Determining appropriateness, platform destination, and scheduling of permission propagations.
Answer: A
NEW QUESTION 28
Which of the following accounts should be disabled after successful installation of Windows XP?
A. Remote Desktop User
B. Administrator
C. Guest
D. Power User
Answer: C
NEW QUESTION 29
A user reports that when printing from a warehouse to an accounting printer, the printer is only printing random symbols. Which of the following is the MOST likely cause?
A. The accounting printer does not have enough memory for the job
B. The accounting printer was recently restarted
C. The user did not have proper print permissions
D. The print driver is corrupt and needs to be reinstalled
Answer: D
NEW QUESTION 30
A technician discovers slow data transfer speeds in a wired network. Which of the following would be the MOST probable cause?
A. Using APIPA address
B. Outdated NIC drivers
C. Too many simultaneous connections
D. CAT5 cable connection
Answer: B
http://www.passleader.com/220-802.html
NEW QUESTION 31
A customer calls and states that when they have been using their computer for a long time the computer reboots itself with no error. Which of the following is the MOST likely cause of the issue?
A. BIOS settings
B. Faulty RAM
C. Faulty processor
D. Overheating
Answer: D
NEW QUESTION 32
Which of the following technologies involves device pairing?
A. WEP
B. IR
C. Bluetooth
D. IMAP
Answer: C
NEW QUESTION 33
A user reports that they are unable to use their DVD-ROM drive in their Windows 7 desktop PC. Which of the following could be a possible cause to this problem?
A. Media Player is not installed
B. DVD drivers need to be updated
C. DVD drive is not set to boot in BIOS
D. SATA port is not on in BIOS
Answer: D
NEW QUESTION 34
A technician needs to create a private shared folder for each employee at a small business to store their files. The technician wants the main folder to be called “Employee Documents” and the subfolders to be named after each employee (e.g. “John Smith”). The technician wants to map the “Employee Documents” folder on all computers as the M:\ drive for all users. Each employee should only have access to their own folder without the ability to change permissions. Which of the following permissions should the technician set?
A. Set share permissions for “Employee Documents” to Everyone = Read, and set NTFS permissions for all subfolders to Creator Owner = Read & Execute
B. Set share permissions for “Employee Documents” to Everyone = Full Control, and set NTFS permissions for all subfolders to Creator Owner = Full Control
C. Set share permissions for “Employee Documents” to Everyone = Change, and set NTFS permissions for all subfolders to Creator Owner = List Folder Contents
D. Set share permissions for “Employee Documents” to Everyone = Full Control, and set NTFS permissions for all subfolders to Creator Owner = Modify
Answer: D
NEW QUESTION 35
Which of the following can cause a popup box to display on a laptop, alerting a user that they have performed the same action 5 times, and asking them to click OK to enable this feature?
A. Lock indicator lights
B. Flickering display
C. Ghost cursor
D. Sticky keys
Answer: D
NEW QUESTION 36
A user receives an unsolicited email stating that they need to follow a link to change their username and password because their bank account has been compromised. Of which of the following is this an example?
A. SPAM
B. Spyware
C. Phishing
D. Malware
Answer: C
NEW QUESTION 37
Following an authorized person through a door or other security check point without showing proper identification or defeating a security mechanism is known as which of the following?
A. Hacking
B. Emulating
C. Partitioning
D. Tailgating
Answer: D
NEW QUESTION 38
When cutting back the protective coating on CAT5 wiring, which of the following is the recommended tool?
A. Punchdown tool
B. Basic crimper
C. Wire strippers
D. Degausser
Answer: C
NEW QUESTION 39
Recently, a user built a new gaming PC and is testing it out by running graphic intensive games. After a short time playing a game, the computer reboots with an error “a thermal event has occurred”. Which of the following is the MOST likely cause of this issue?
A. Processor is under-clocked
B. Insufficient power to the motherboard
C. Hard drive is overheating
D. Video card is overheating
Answer: D
NEW QUESTION 40
A user regularly calls and states that they have a computer with possibly corrupt system files and wants to know how to repair them. Which of the following utilities would resolve the problem?
A. ASR
B. FIXMBR
C. SFC
D. MSCONFIG
Answer: C
http://www.passleader.com/220-802.html
|
Contenu | Rechercher | Menus
Ceci est une ancienne révision du document !
Subversive
Subversive est un greffon permettant d'utiliser Subversion (SVN) avec Eclipse.
Principales fonctionnalités
• Parcourir un dépôt
• Ajouter un projet dans un dépôt et récupérer un projet depuis un dépôt
• Synchroniser un projet afin de visualiser les changements
• Faire les opérations courantes : commit, update, merge, revert, etc.
• Gérer les conflits
Installation
Pré-requis
Ajout des greffons dans Eclipse
Ce tutoriel a été réalisé avec Eclipse Ganymede (version 3.4), pas encore disponible dans les paquets Ubuntu. Pour le trouver, rendez-vous sur la page de téléchargement Eclipse.
Eclipse a besoin de deux greffons pour pouvoir utiliser la technologie SVN. Il faut donc commencer par ajouter un site pour les greffons d'Eclipse.
Menu Help → Software Updates → Available software → Add Site…
Saisissez l'URL suivante : http://www.polarion.org/projects/subversive/download/eclipse/2.0/update-site/
Ensuite, cliquez sur Manage Sites… et cochez la ligne suivante : http://download.eclipse.org/technology/subversive/0.7/update-site/
Vous venez de sélectionner les deux sites utiles pour installer les greffons SVN. Cliquez sur OK pour fermer cette fenêtre puis sur Refresh afin qu'Eclipse connaisse le contenu de ces sites.
Ouvrez l'arborescence des deux sites et cochez les cases correspondant aux greffons Subversive :
Puis lancez l'installation en cliquant sur Install… et redémarrez Eclipse lorsque c'est terminé.
Pour vérifier que tout s'est bien passé, allez dans Window → Preferences → Team → SVN → onglet SVN Connector
Créer un projet depuis un dépôt SVN
Ici nous créerons un projet C++ depuis un dépôt vide, la procédure est cependant similaire avec d'autres langages ou pour récupérer un projet déjà existant.
Menu File → New → Other…
Dans la fenêtre qui s'affiche, sélectionnez SVN → Project from SVN
Laissez-vous guider pour l'étape suivante : saisissez l'URL de votre dépôt SVN, votre login et mot de passe, puis cliquez sur Next. Dans la fenêtre suivante, on vous demande de choisir une version du dépôt, à vous de choisir en fonction de vos besoins. Cliquez sur Finish.
Eclipse vous demande alors dans quel projet il doit poser les fichiers du dépôt. Vous pouvez aussi demander la création d'un nouveau projet en choisissant l'option Check out as a project configured using the New Project Wizard. Cliquez sur Finish.
Cette fois, demandez un projet C++ (ou Java, Python, Ruby, etc. selon cas) et laissez-vous guider par la procédure standard de création de projet. Eclipse va automatiquement récupérer les fichiers sur le dépôt et les insérer dans le nouveau projet…
Codez… compilez !
Désinstallation
Pour supprimer ces greffons, il suffit de retourner dans le gestionnaire de mises à jour d'Eclipse.
Menu Help → Software Updates… → onglet Installed Software. Sélectionnez les deux greffons et cliquez sur Uninstall.
Voir aussi
Vous pouvez consulter les sites suivants pour obtenir un complément d'information…
Contributeurs : Guigouz
Le contenu de ce wiki est sous licence : CC BY-SA v3.0 |
I’m Vaccinated. When Do I Need to Wear a Mask?
Mask guidance continues to change. Here’s what you need to know, depending on who you are, to protect yourself—and, most importantly, others.
WHEN THE CDC announced in mid-May that fully vaccinated people no longer needed to wear masks in most indoor settings, it felt like a milestone to many Americans, indicating that we might be one step closer to the end of the pandemic. It’s understandable, then, that the agency’s decision several weeks ago to bring back indoor mask recommendations even for vaccinated people led to anger, frustration, or confusion for many.
“It is a little bit confusing that the public is told at one point that the vaccine is effective enough that they can pretty much ditch their mask anywhere, and now, this is clearly a different recommendation because of the very high transmissibility of the Delta variant,” Dan Diekema, an infectious disease epidemiologist at the University of Iowa College of Medicine, says. “I think the CDC did the right thing, but it definitely puts members of the public in kind of a difficult situation in terms of making day-to-day decisions.”
But now that the circumstances have shifted, so should our behavior to deal with them.
“The vaccines are highly effective, but we know they’re not perfect, so it’s important to use complementary measures like masking for those areas with higher levels of Covid in the community,” Saskia Popescu, an assistant professor and epidemiologist at George Mason Universit, says.
But that doesn’t mean everyone has to mask up everywhere outside their house, vaccinated or not. Let’s break down when to wear a mask and why, and when you can set it aside.
Why Vaccinated People Still Need to Mask
First, let’s briefly review why the CDC changed their guidance in May, and then again more recently. The clinical trials for the Covid-19 vaccines tested how well the vaccines prevented disease, and they did that remarkably well. Then data in spring revealed the vaccines also appeared to prevent most infections, as in the ability of the virus to begin replicating after getting into the body. That’s unusual—most vaccines don’t prime the body so well that it can dispatch a pathogen before it even begins hijacking cells—but it appeared to be true for the mRNA vaccines. Blocking infection also blocks transmission: If the virus never starts replicating, you never shed it, so you’re not infectious to anyone. Hence the CDC’s advice in May that vaccinated folks can ditch their masks.
Along comes Delta. Though not actually “as contagious as chickenpox,” despite the CDC’s leaked internal document, Delta is about twice as contagious as the original coronavirus strain that swept the nation in 2020. According to a recent study, it has a basic reproduction number (R0) of 5-9, which means a person infected with the Delta variant of SARS-CoV-2 will infect about 5 to 9 other people on average, instead of the 2 to 3 of the previous strains. (Since R0 is an average, some people will infect no one, and others may infect twice as many people.)
Based on the most recent data, it seems Delta is so contagious because it replicates very quickly, producing about 1,000 times more virus particles than the original strain did. That’s partly why people infected with Delta become contagious sooner than with past variants, and it’s possibly why Delta seems to cause more breakthrough infections—but a mask reduces that risk further.
“People with Delta are shedding more virus, and if you’re around them for a long period of time, you’re going to be exposed to the minimum infectious dose in a shorter period of time than you would have otherwise,” Angela Rasmussen, a virologist at the Vaccine and Infectious Disease Organization-International Vaccine Centre in Saskatchewan, Canada, says. “Wear a mask, reduce the numbers. It’s that simple.”
Since it replicates so quickly—often before vaccinated people’s immune systems can obliterate it—there’s a higher chance that a vaccinated person exposed to Delta might shed some virus during the few days it takes their body to clear the virus. Their body might successfully destroy the virus before the person ever knows they were infected and without causing symptoms, but if their viral load—the total virus particles in their body—was nearly as high as what’s seen in unvaccinated people in the first few days after exposure (as research suggests), they still could have transmitted the virus to others.
The good news is that vaccinated people aren’t as contagious as unvaccinated people, and they’re infectious for a shorter period of time, maybe a few days if they never have symptoms. But that might be all it takes to pass along the virus to someone more medically fragile than they are. Even if you’re healthy and vaccinated and can handle a couple days of feeling crappy while your body beats back a breakthrough infection, those you potentially infect may not be as lucky, especially if they’re immune-compromised or too young to be vaccinated.
Who Should Always Mask
Instead of a blanket recommendation that all vaccinated people should mask everywhere, the CDC identifies a few populations who should always mask up indoors, vaccinated or not, and then what other vaccinated folks should do. If you’re immune-compromised, follow the advice that Dorry Segev, a Johns Hopkins researcher and transplant surgeon, gives his patients: “Get vaccinated, act unvaccinated.”
That means wearing a mask in any indoor setting where you’re around people from outside your household and in any outdoor situations where it’s especially crowded or you’re in very close contact with people for an extended period (15 minutes or more.)
The CDC also advises all students, faculty, staff, and visitors in all schools to wear masks during the school day, a recommendation echoed by the American Academy of Pediatrics. Many students are too young to be vaccinated or otherwise unvaccinated (less than half of eligible teens have gotten the vaccine,) and others may have conditions making them high risk for infection and severe disease. Spending many hours of day together in the same room means it’s safest if everyone wears a mask to lower their likelihood of spewing virus around the classroom.
For Everyone Else
For people with properly functioning immune systems who aren’t in a school, the CDC advises fully vaccinated people to wear masks indoors if they’re around people from outside their household and in an area deemed by the CDC to havewith “substantial” or “high” transmission. Right now, though, that’s nearly the entire U.S. If you’re someone who obsessively checks local transmission levels each day and it drops below “substantial” transmission, there’s probably little enough virus circulating in your area that you’re not risking much by leaving your mask home. You can check your county’s transmission rates here. But with a virus as contagious as Delta, an area can flip from “low” transmission to “substantial” overnight. If you’re not checking local rates daily, it’s wise to assume everywhere in the US has high transmission until the Delta surge passes.
What About Outside?
Fortunately, outdoor transmission appears rare. The CDC doesn’t recommend masking outdoors unless the area has high transmission and it’s particularly crowded or you’re in close contact with others.
“You can think about it like peeing in the pool versus peeing in the ocean,” Rasmussen says. “If you’re peeing in a pool, more people around you are going to feel warmth because it’s a confined space. Obviously, if you pee in the ocean, people probably aren’t going to know. But if you’re in the middle of a huge group of people, like on a raft or something, and you piss, yeah, the people around you will probably be able to detect that.”
Outdoor concerts, for example, often have people tightly packed together for several hours and carry more risk, Popescu says. “Ventilation is important and there’s great ventilation outside, but that can only do so much when you’re shoulder-to-shoulder with hundreds of people for hours, yelling and shouting,” she says.
But I’m Healthy and a Risk-Taker
Aside from the guidelines above, there are two basic factors to think about in deciding whether to wear a mask: protecting yourself and protecting others. Unless you’ve been completely away from all people and had a negative Covid test that morning, you have to assume there’s always a chance you’re infected, and therefore that you could infect others.
If you’ll be around people at high risk for infection or severe disease—such as immune-compromised people, unvaccinated children, older adults, or someone with a high-risk condition—it’s safest to wear a mask to protect them from you. In places like grocery stores and pharmacies, where nearly everyone needs to go even if they’re in a high-risk group, the considerate thing to do is always wear a mask, regardless of local transmission rates, because you don’t know if you’ll be around vulnerable folks.
In places like restaurants, bars, and home get-togethers where you’re not required to wear a mask, your decision depends more on your own level of risk tolerance. How much risk of exposure are you comfortable with in exchange for not wearing a mask?
“There’s a framework of interventions that are important to prevent you from getting Covid, and then there’s people’s risk factors for a bad outcome,” says Anthony Harris, an epidemiologist at the University of Maryland School of Medicine. “If you combine those two hierarchies with someone’s own subjective assessment of risk, that’s how they should make decisions. There’s no black or white.”
Aside from local infection rates, you have several factors to consider:
• How likely are you to develop severe disease if you have a breakthrough infection? If you’re in your 70s or immune-compromised, you may fare worse with a breakthrough infection even if it doesn’t kill you.
• Are others around you vaccinated or unvaccinated? (If you don’t know, assume some are unvaccinated.)
• How close are you to others?
• How long are you there or how long are you close to others?
• How big is the area?
• How well ventilated is the area?
Mask Quality Matters Too
Also keep in mind that not all masks are created equally.
“I encourage people to focus on utilizing a quality mask, which is about fit and filtration,” Popscu says. “Ensuring the quality of masks becomes that much more important indoors.”
Michael Osterholm, director of the Center for Infectious Disease Research and Policy at the University of Minnesota, has advocated for months that Americans wear better protection than cloth masks, whose quality and effectiveness vary greatly. In the first half of 2020, public health experts discouraged the general public from wearing N95, KN95, and similar respirator masks so that healthcare workers had enough. But now, Osterholm says, healthcare workers and other professions who need respirators have plenty. There’s no reason the general public shouldn’t regularly wear these much more effective masks too. If nothing else, pair a cloth mask with a medical mask.
Ventilation, Ventilation, Ventilation
Of the factors above, that last one is among the most important, says Alex Huffman, an atmospheric chemist who studies bioaerosols at the University of Denver. The reason “outdoors is dramatically safer than indoors” is that virus particles exhaled by others don’t have a chance to build up. They just float up and away. Indoors is a different story.
The virus-containing aerosols that an infected person exhales “get mixed into the room and can build up in concentration if the ventilation is insufficient,” Huffman says. In a stagnant room where the aerosols build up, it takes fewer breaths to inhale enough virus to become infected. Room volume matters too, he says.
“The bigger, the better,” Huffman says. “If you breathe out aerosols into a bigger volume, it dilutes more quickly.” His research has found that a room’s height is one of the most influential factors in how much aerosols can build up.
Will Masking Ever End?
It’s easy to feel discouraged, maybe even a bit hopeless, with Delta surging and masks recommended for everyone again. But things will get better again, Harris says.
“It’s been a very long haul for everyone,” he says, but he points out how much better protected vaccinated people are now than a year ago. That’s not nothing. “I view this back-to-masks as a temporary setback, and it’s not going to be the new norm.”
2021
article-exercise-l
Exercise and cancer
The effect of exercise on cancer
The benefits of exercise training for cancer patients are becoming increasingly evident. Physical exercise has been shown to reduce cancer incidence and inhibit tumor growth. We propose that exercise has a role in controlling cancer progression through a direct effect on tumor-intrinsic factors, interplay with whole-body exercise effects, alleviation of cancer-related adverse events, and improvement of anti-cancer treatment efficacy.
exercise-right-week-mentalhealth
Exercise and mental health
The benefits of exercise on mental health
Physical activity is an often-overlooked intervention for helping certain mental health conditions. Aerobic exercise such as jogging, walking, cycling and swimming have been proven to help reduce anxiety and depression.[v] Exercise improves blood flow to the brain and is believed to positively affect various regions of the brain that deal with stress, mood, and motivation.
Health benefits of regular physical activity include:
Improved sleep
Increased interest in sex
Better endurance
Stress relief
Improvement in mood
Increased energy and stamina
Reduced tiredness that can increase mental alertness
Weight reduction
Reduced cholesterol and improved cardiovascular fitness
cardio-fit-820x400-1
Exercise and heart
A sedentary lifestyle is one of the 5 major risk factors (along with high blood pressure, abnormal values for blood lipids, smoking, and obesity) for cardiovascular disease, as outlined by the AHA. Evidence from many scientific studies shows that reducing these risk factors decreases the chance of having a heart attack or experiencing another cardiac event, such as a stroke, and reduces the possibility of needing a coronary revascularization procedure (bypass surgery or coronary angioplasty). Regular exercise has a favorable effect on many of the established risk factors for cardiovascular disease. For example, exercise promotes weight reduction and can help reduce blood pressure. Exercise can reduce “bad” cholesterol levels in the blood (the low-density lipoprotein [LDL] level), as well as total cholesterol, and can raise the “good” cholesterol (the high-density lipoprotein level [HDL]). In diabetic patients, regular activity favorably affects the body’s ability to use insulin to control glucose levels in the blood. Although the effect of an exercise program on any single risk factor may generally be small, the effect of continued, moderate exercise on overall cardiovascular risk, when combined with other lifestyle modifications (such as proper nutrition, smoking cessation,and medication use), can be dramatic.
384818f9-b7e7-419b-b5ff-39846af944f6
Exercise and liver
Exercise and liver health
Regular exercise is key to a healthy liver. Exercise decreases stress on the liver, increases energy levels and helps to prevent obesity – a risk factor for liver disease. Aim for a total of 150 minutes of exercise, such as brisk walking or swimming per week. |
Internet not working after upgrading to Ubuntu 16.04
Asked by Dimka
I've recently upgraded my ubuntu version from 14.04 to 16.04. Now
none of my internet connection work (neither ethernet or wifi), although
both are recognized in the 'network connections' panel. I verified that
both work with other devices.
I've searched for previous posts but none of them helped me..
some introduced slightly different problems (e.g., networks are not
recognized in the panel / only wifi doesn't work etc..), or solutions
that require 'sudo apt-get' installations that use packages from the web
(which, obviously, I can't download).
I would greatly appreciate any assistance. I am a simple user, so please be gentle :)
Thanks a lot in advance,
Dima
Question information
Language:
English Edit question
Status:
Solved
For:
Ubuntu network-manager Edit question
Assignee:
No assignee Edit question
Solved by:
Dimka
Solved:
Last query:
Last reply:
Revision history for this message
Manfred Hampl (m-hampl) said :
#1
As a first step please provide the output of the following diagnostic commands (from a terminal window):
uname -a
lsb_release -crid
sudo lshw -C network
sudo ifconfig -a
Revision history for this message
Dimka (dimka-f13) said :
#2
Revision history for this message
Manfred Hampl (m-hampl) said :
#3
I do not see any error in the output.
Do you intend to use wired cabling or WLAN?
Revision history for this message
Dimka (dimka-f13) said :
#4
Both.
Anyway, I managed to make the wired internet work using 'sudo dhclient eth0'. However, it still doesn't connect automatically (I have to run the command every time I want to reconnect), and the wireless is still not working.
Do you have any suggestions?
Thanks a lot in advance!
Revision history for this message
Manfred Hampl (m-hampl) said :
#5
Ok, just to verify: Your system is booting, you can log in, but network is only working after manual commands. Is this correct?
What is the output of the commands (to be executed in a terminal window)
sudo apt-get update
sudo dpkg --audit
apt-get --simulate dist-upgrade
Please copy/paste the text into this question document.
Revision history for this message
Dimka (dimka-f13) said :
#6
Thank you very much again for the quick reply.
Correct, wired network is working only after executing 'sudo dhclient eth0', and wireless network is not working at all.
Output of the commands(lots of not configured packages there, should I actually dist-upgrade?):
dimka@dimka-Inspiron-N5110:~$ sudo apt-get update
Hit:1 http://il.archive.ubuntu.com/ubuntu xenial InRelease
Hit:2 http://il.archive.ubuntu.com/ubuntu xenial-updates InRelease
Hit:3 http://il.archive.ubuntu.com/ubuntu xenial-backports InRelease
Hit:4 http://archive.canonical.com xenial InRelease
Hit:5 http://archive.ubuntu.com/ubuntu xenial InRelease
Hit:6 http://security.ubuntu.com/ubuntu xenial-security InRelease
Reading package lists... Done
dimka@dimka-Inspiron-N5110:~$ sudo dpkg --audit
The following packages have been unpacked but not yet configured.
They must be configured using dpkg --configure or the configure
menu option in dselect for them to work:
account-plugin-aim Messaging account plugin for AIM
account-plugin-yahoo Messaging account plugin for Yahoo!
aisleriot GNOME solitaire card game collection
apparmor user-space parser utility for AppArmor
appmenu-qt:amd64 application menu for Qt
apport automatically generate crash reports for debugging
apport-gtk GTK+ frontend for the apport crash report system
apt-xapian-index maintenance and search tools for a Xapian index of Debian
aptdaemon transaction based package management service
apturl install packages using the apt protocol - GTK+ frontend
apturl-common install packages using the apt protocol - common data
bluez-obexd bluez obex daemon
checkbox System testing application (transitional package)
checkbox-converged testing tool for all Ubuntu devices
checkbox-gui QML based interface for checkbox (transitional package)
checkbox-qt QT4 interface for checkbox (transitional package)
command-not-found Suggest installation of packages in interactive bash sess
compiz OpenGL window and compositing manager
compiz-gnome OpenGL window and compositing manager - GNOME window deco
console-setup console font and keymap setup program
console-setup-linux Linux specific part of console-setup
context powerful TeX format
context-modules additional ConTeXt modules
deja-dup-backend-gvfs Remote server support for Déjà Dup
dh-python Debian helper tools for packaging Python libraries and ap
evolution-data-server evolution database backend server
evolution-data-server-online-accounts evolution data server integration with U
feynmf set of LaTeX macros for creating Feynman diagrams
firefox Safe and easy web browser from Mozilla
firefox-globalmenu Safe and easy web browser from Mozilla (transitional pack
flashplugin-installer Adobe Flash Player plugin installer
foomatic-db-compressed-ppds OpenPrinting printer support - Compressed PPDs der
fragmaster use of psfrag constructs with pdflatex
gconf-service GNOME configuration database system (D-Bus service)
gconf-service-backend GNOME configuration database system (D-Bus service)
gconf2 GNOME configuration database system (support tools)
gdebi simple tool to view and install deb files - GNOME GUI
gdebi-core simple tool to install deb files
gedit official text editor of the GNOME desktop environment
gir1.2-ebook-1.2:amd64 GObject introspection for the EBook library
gir1.2-ebookcontacts-1.2:amd64 GObject introspection for the EBook Contacts library
gir1.2-edataserver-1.2:amd64 GObject introspection for the EDataServer library
gir1.2-gdata-0.0:amd64 GObject introspection data for the GData webservices libr
gir1.2-ibus-1.0:amd64 Intelligent Input Bus - introspection data
gksu graphical front-end to su and sudo
gnome-bluetooth GNOME Bluetooth tools
gnome-calendar Calendar application for GNOME
gnome-contacts Contacts manager for GNOME
gnome-control-center utilities to configure the GNOME desktop
gnome-menus GNOME implementation of the freedesktop menu specificatio
gnome-orca Scriptable screen reader
gnome-session GNOME Session Manager - GNOME 3 session
gnome-settings-daemon daemon handling the GNOME session settings
gnome-software Software Center for GNOME
gnome-terminal GNOME terminal emulator application
gnome-user-share User level public file sharing via WebDAV or ObexFTP
grilo-plugins-0.2-base:amd64 Framework for discovering and browsing media - Base Plu
grub-gfxpayload-lists GRUB gfxpayload blacklist
grub-pc GRand Unified Bootloader, version 2 (PC/BIOS version)
gstreamer0.10-gconf:amd64 GStreamer plugin for getting the sink/source information
gvfs-backends userspace virtual filesystem - backends
hplip HP Linux Printing and Imaging System (HPLIP)
hplip-data HP Linux Printing and Imaging - data files
ibus Intelligent Input Bus - core
ibus-pinyin Pinyin engine for IBus
ibus-table table engine for IBus
indicator-bluetooth System bluetooth indicator.
indicator-datetime Simple clock
kbd Linux console font and keytable utilities
language-pack-en translation updates for language English
language-pack-en-base translations for language English
language-pack-gnome-en GNOME translation updates for language English
language-pack-gnome-en-base GNOME translations for language English
language-pack-gnome-he GNOME translation updates for language Hebrew
language-pack-gnome-he-base GNOME translations for language Hebrew
language-pack-he translation updates for language Hebrew
language-pack-he-base translations for language Hebrew
language-selector-common Language selector for Ubuntu
language-selector-gnome Language selector for Ubuntu
latex-cjk-all installs all LaTeX CJK packages
latex-cjk-chinese Chinese module of LaTeX CJK
latex-cjk-common LaTeX macro package for CJK (Chinese/Japanese/Korean)
latex-cjk-japanese Japanese module of LaTeX CJK
latex-cjk-korean Korean module of LaTeX CJK
latex-cjk-thai Thai module of LaTeX CJK
latexmk Perl script for running LaTeX the correct number of times
libcamel-1.2-54:amd64 Evolution MIME message handling library
libdbusmenu-qt2:amd64 Qt implementation of the DBusMenu protocol
libdbusmenu-qt2:i386 Qt implementation of the DBusMenu protocol
libebackend-1.2-10:amd64 Utility library for evolution data servers
libebook-1.2-16:amd64 Client library for evolution address books
libebook-contacts-1.2-2:amd64 Client library for evolution contacts books
libecal-1.2-19:amd64 Client library for evolution calendars
libedata-book-1.2-25:amd64 Backend library for evolution address books
libedata-cal-1.2-28:amd64 Backend library for evolution calendars
libedataserver-1.2-21:amd64 Utility library for evolution data servers
libedataserverui-1.2-1:amd64 Utility library for evolution data servers
libfolks-eds25:amd64 Evolution-data-server backend for libfolks
libgdata22:amd64 Library for accessing GData webservices - shared librarie
libgksu2-0 library providing su and sudo functionality
liblwp-protocol-https-perl HTTPS driver for LWP::UserAgent
libnet-dbus-perl Perl extension for the DBus bindings
libnss3:amd64 Network Security Service libraries
libnss3-1d:amd64 Network Security Service libraries - transitional package
libnss3-nssdb Network Security Security libraries - shared databases
liboauth0:amd64 C library for implementing OAuth 1.0
liboxideqt-qmlplugin:amd64 Web browser engine for Qt (QML plugin)
liboxideqtcore0:amd64 Web browser engine for Qt (core library and components)
liboxideqtquick0:amd64 Web browser engine for Qt (QtQuick library)
libpoppler-qt4-4:amd64 PDF rendering library (Qt 4 based shared library)
libpurple-bin multi-protocol instant messaging library - extra utilitie
libpurple0 multi-protocol instant messaging library
libqt4-declarative:amd64 Qt 4 Declarative module
libqt4-declarative:i386 Qt 4 Declarative module
libqt4-designer:amd64 Qt 4 designer module
libqt4-help:amd64 Qt 4 help module
libqt4-opengl:amd64 Qt 4 OpenGL module
libqt4-opengl:i386 Qt 4 OpenGL module
libqt4-scripttools:amd64 Qt 4 script tools module
libqt4-svg:amd64 Qt 4 SVG module
libqtgui4:amd64 Qt 4 GUI module
libqtgui4:i386 Qt 4 GUI module
libqtwebkit4:amd64 Web content engine library for Qt
libqtwebkit4:i386 Web content engine library for Qt
libreoffice-avmedia-backend-gstreamer GStreamer backend for LibreOffice
libreoffice-base-core office productivity suite -- shared library
libreoffice-calc office productivity suite -- spreadsheet
libreoffice-common office productivity suite -- arch-independent files
libreoffice-core office productivity suite -- arch-dependent files
libreoffice-draw office productivity suite -- drawing
libreoffice-gnome office productivity suite -- GNOME integration
libreoffice-gtk office productivity suite -- GTK+ integration
libreoffice-help-en-gb office productivity suite -- English_british help
libreoffice-help-en-us office productivity suite -- English_american help
libreoffice-impress office productivity suite -- presentation
libreoffice-l10n-en-gb office productivity suite -- English_british language p
libreoffice-l10n-en-za office productivity suite -- English_southafrican langu
libreoffice-l10n-he office productivity suite -- Hebrew language package
libreoffice-math office productivity suite -- equation editor
libreoffice-ogltrans LibreOffice Impress extension for slide transitions using
libreoffice-pdfimport PDF Import component for LibreOffice
libreoffice-style-breeze office productivity suite -- Breeze symbol style
libreoffice-style-galaxy office productivity suite -- Galaxy (Default) symbol
libreoffice-style-human office productivity suite -- Human symbol style
libreoffice-writer office productivity suite -- word processor
libunity-webapps0:amd64 Web Apps integration with the Unity desktop
libwww-perl simple and consistent interface to the world-wide web
libxml-parser-perl Perl module for parsing XML files
libxml-twig-perl Perl module for processing huge XML documents in tree mod
lsb-release Linux Standard Base version reporting utility
nautilus-share Nautilus extension to share folder using Samba
onboard Simple On-screen Keyboard
onboard-data Language model files for the word suggestion feature of O
oneconf synchronize your configuration data over the network
openprinting-ppds OpenPrinting printer support - PostScript PPD files
plainbox-provider-checkbox CheckBox provider for PlainBox
plainbox-provider-resource-generic CheckBox generic resource jobs provider
plymouth-theme-ubuntu-text boot animation, logger and I/O multiplexer - ubuntu
prerex course prerequisite chart editor for LaTeX/TikZ
printer-driver-foo2zjs printer driver for ZjStream-based printers
printer-driver-foo2zjs-common printer driver for ZjStream-based printers - com
printer-driver-postscript-hp HP Printers PostScript Descriptions
printer-driver-ptouch printer driver Brother P-touch label printers
printer-driver-pxljr printer driver for HP Color LaserJet 35xx/36xx
pyotherside transitional dummy package
python-gconf Python bindings for the GConf configuration database syst
python-qt4 Python bindings for Qt4
python3 interactive high-level object-oriented language (default
python3-apport Python 3 library for Apport crash report handling
python3-apt Python 3 interface to libapt-pkg
python3-aptdaemon Python 3 module for the server and client of aptdaemon
python3-aptdaemon.gtk3widgets Python 3 GTK+ 3 widgets to run an aptdaemon clie
python3-aptdaemon.pkcompat PackageKit compatibilty for AptDaemon
python3-blinker fast, simple object-to-object and broadcast signaling lib
python3-brlapi Braille display access via BRLTTY - Python3 bindings
python3-bs4 error-tolerant HTML parser for Python 3
python3-cairo Python 3 bindings for the Cairo vector graphics library
python3-cffi-backend Foreign Function Interface for Python 3 calling C code -
python3-chardet universal character encoding detector for Python3
python3-checkbox-ng PlainBox based test runner (Python 3 library)
python3-checkbox-support collection of Python modules used by PlainBox provide
python3-commandnotfound Python 3 bindings for command-not-found.
python3-crypto cryptographic algorithms and protocols for Python 3
python3-cryptography Python library exposing cryptographic recipes and primiti
python3-cups Python3 bindings for CUPS
python3-cupshelpers Python modules for printer configuration with CUPS
python3-dbus simple interprocess messaging system (Python 3 interface)
python3-debian Python 3 modules to work with Debian-related data formats
python3-dirspec Python User Folders Specification Library
python3-distupgrade manage release upgrades
python3-feedparser Universal Feed Parser for Python 3
python3-gdbm:amd64 GNU dbm database support for Python 3.x
python3-gi Python 3 bindings for gobject-introspection libraries
python3-gi-cairo Python 3 Cairo bindings for the GObject library
python3-guacamole framework for creating command line applications (Python
python3-html5lib HTML parser/tokenizer based on the WHATWG HTML5 specifica
python3-httplib2 comprehensive HTTP client library written for Python3
python3-idna Python IDNA2008 (RFC 5891) handling (Python 3)
python3-jinja2 small but fast and easy to use stand-alone template engin
python3-jwt Python 3 implementation of JSON Web Token
python3-louis Python bindings for liblouis
python3-lxml pythonic binding for the libxml2 and libxslt libraries
python3-mako fast and lightweight templating for the Python 3 platform
python3-markupsafe HTML/XHTML/XML string library for Python 3
python3-oauthlib generic, spec-compliant implementation of OAuth for Pytho
python3-oneconf synchronize your configuration data over the network (Pyt
python3-padme mostly transparent proxy class for Python 3
python3-pexpect Python 3 module for automating interactive applications
python3-pil:amd64 Python Imaging Library (Python3)
python3-pkg-resources Package Discovery and Resource Access using pkg_resource
python3-plainbox toolkit for software and hardware testing (python3 module
python3-problem-report Python 3 library to handle problem reports
python3-ptyprocess Run a subprocess in a pseudo terminal from Python 3
python3-pyasn1 ASN.1 library for Python (Python 3 module)
python3-pyatspi Assistive Technology Service Provider Interface - Python3
python3-pycurl Python bindings to libcurl (Python 3)
python3-pyparsing Python parsing module, Python3 package
python3-renderpm:amd64 python low level render interface
python3-reportlab ReportLab library to create PDF documents using Python3
python3-reportlab-accel:amd64 C coded extension accelerator for the ReportLab Toolki
python3-requests elegant and simple HTTP library for Python3, built for hu
python3-six Python 2 and 3 compatibility library (Python 3 interface)
python3-software-properties manage the repositories that you install software
python3-speechd Python interface to Speech Dispatcher
python3-systemd Python 3 bindings for systemd
python3-uno Python-UNO bridge
python3-update-manager python 3.x module for update-manager
python3-urllib3 HTTP library with thread-safe connection pooling for Pyth
python3-virtkey Library to emulate keyboard keypresses.
python3-xapian1.3 Xapian search engine interface for Python3
python3-xlsxwriter Python 3 module for creating Excel XLSX files
qml-module-io-thp-pyotherside:amd64 asynchronous Python 3 Bindings for Qt 5 (QML plu
qml-module-ubuntu-web:amd64 Ubuntu web QML module
qt-at-spi:amd64 at-spi accessibility plugin for Qt
qt-at-spi:i386 at-spi accessibility plugin for Qt
rhythmbox music player and organizer for GNOME
rhythmbox-mozilla Rhythmbox Mozilla plugin
rhythmbox-plugin-cdrecorder burning plugin for rhythmbox music player
rhythmbox-plugin-magnatune Magnatune plugin for rhythmbox music player
rhythmbox-plugin-zeitgeist zeitgeist plugin for rhythmbox music player
rhythmbox-plugins plugins for rhythmbox music player
sessioninstaller APT based installer using PackageKit's session DBus API
snapd Tool to interact with Ubuntu Core Snappy.
sni-qt:amd64 indicator support for Qt
sni-qt:i386 indicator support for Qt
software-center Utility for browsing, installing, and removing software
software-properties-common manage the repositories that you install software f
software-properties-gtk manage the repositories that you install software from
system-config-printer-common Printer configuration GUI
system-config-printer-gnome Printer configuration GUI
system-config-printer-udev Printer auto-configuration facility based on udev
telepathy-haze Telepathy connection manager that uses libpurple
texlive TeX Live: A decent selection of the TeX Live packages
texlive-bibtex-extra TeX Live: BibTeX additional styles
texlive-extra-utils TeX Live: TeX auxiliary programs
texlive-font-utils TeX Live: Graphics and font utilities
texlive-fonts-extra TeX Live: Additional fonts
texlive-fonts-extra-doc TeX Live: Documentation files for texlive-fonts-extra
texlive-fonts-recommended TeX Live: Recommended fonts
texlive-fonts-recommended-doc TeX Live: Documentation files for texlive-fonts-
texlive-formats-extra TeX Live: Additional formats
texlive-full TeX Live: metapackage pulling in all components of TeX Li
texlive-games TeX Live: Games typesetting
texlive-generic-extra TeX Live: Generic additional packages
texlive-generic-recommended TeX Live: Generic recommended packages
texlive-htmlxml TeX Live: HTML/SGML/XML support
texlive-humanities TeX Live: Humanities packages
texlive-humanities-doc TeX Live: Documentation files for texlive-humanities
texlive-lang-african TeX Live: African scripts
texlive-lang-arabic TeX Live: Arabic
texlive-lang-chinese TeX Live: Chinese
texlive-lang-cjk TeX Live: Chinese/Japanese/Korean (base)
texlive-lang-cyrillic TeX Live: Cyrillic
texlive-lang-czechslovak TeX Live: Czech/Slovak
texlive-lang-english TeX Live: US and UK English
texlive-lang-european TeX Live: Other European languages
texlive-lang-french TeX Live: French
texlive-lang-german TeX Live: German
texlive-lang-greek TeX Live: Greek
texlive-lang-indic TeX Live: Indic scripts
texlive-lang-italian TeX Live: Italian
texlive-lang-japanese TeX Live: Japanese
texlive-lang-korean TeX Live: Korean
texlive-lang-other TeX Live: Other languages
texlive-lang-polish TeX Live: Polish
texlive-lang-portuguese TeX Live: Portuguese
texlive-lang-spanish TeX Live: Spanish
texlive-latex-base TeX Live: LaTeX fundamental packages
texlive-latex-base-doc TeX Live: Documentation files for texlive-latex-base
texlive-latex-extra TeX Live: LaTeX additional packages
texlive-latex-extra-doc TeX Live: Documentation files for texlive-latex-extra
texlive-latex-recommended TeX Live: LaTeX recommended packages
texlive-latex-recommended-doc TeX Live: Documentation files for texlive-latex-
texlive-luatex TeX Live: LuaTeX packages
texlive-math-extra TeX Live: Mathematics packages
texlive-metapost TeX Live: MetaPost and Metafont packages
texlive-metapost-doc TeX Live: Documentation files for texlive-metapost
texlive-music TeX Live: Music packages
texlive-omega TeX Live: Omega packages
texlive-pictures TeX Live: Graphics, pictures, diagrams
texlive-pictures-doc TeX Live: Documentation files for texlive-pictures
texlive-plain-extra TeX Live: Plain TeX packages
texlive-pstricks TeX Live: PSTricks
texlive-pstricks-doc TeX Live: Documentation files for texlive-pstricks
texlive-publishers TeX Live: Publisher styles, theses, etc.
texlive-publishers-doc TeX Live: Documentation files for texlive-publishers
texlive-science TeX Live: Natural and computer sciences
texlive-science-doc TeX Live: Documentation files for texlive-science
texlive-xetex TeX Live: XeTeX and packages
tipa system for processing phonetic symbols in LaTeX
totem Simple media player for the GNOME desktop based on GStrea
totem-plugins Plugins for the Totem media player
ubuntu-core-launcher Launcher for ubuntu-core (snappy) apps
ubuntu-desktop The Ubuntu desktop system
ubuntu-drivers-common Detect and install additional Ubuntu driver packages
ubuntu-minimal Minimal core of Ubuntu
ubuntu-release-upgrader-core manage release upgrades
ubuntu-release-upgrader-gtk manage release upgrades
ubuntu-software Utility for browsing, installing, and removing software
ubuntu-sso-client-qt Ubuntu Single Sign-On client - Qt frontend
ubuntu-standard The Ubuntu standard system
ubuntu-system-service Dbus service to set various system-wide configurations
ufw program for managing a Netfilter firewall
unattended-upgrades automatic installation of security upgrades
unity Interface designed for efficiency of space and interactio
unity-control-center utilities to configure the GNOME desktop
unity-control-center-signon Unity Control Center extension for single signon
unity-scope-gdrive Google Drive scope for Unity
unity-scope-home Home scope that aggregates results from multiple scopes
unity-webapps-common Unity WebApp integration scripts
unity-webapps-launchpad Unity Webapp for Launchpad
unity-webapps-service Service for Web Apps integration with the Unity desktop
update-manager GNOME application that manages apt updates
update-manager-core manage release upgrades
update-notifier Daemon which notifies about package updates
update-notifier-common Files shared between update-notifier and other packages
usb-creator-common create a startup disk using a CD or disc image (common fi
usb-creator-gtk create a startup disk using a CD or disc image (for GNOME
vprerex Qt interface to prerex, a course prerequisite chart edito
webapp-container Ubuntu web applications container
webbrowser-app Ubuntu web browser
xdiagnose X.org diagnosis tool
The following packages are only half configured, probably due to problems
configuring them the first time. The configuration should be retried using
dpkg --configure <package> or the configure menu option in dselect:
tex-common common infrastructure for building and installing TeX
dimka@dimka-Inspiron-N5110:~$ apt-get --simulate dist-upgrade
NOTE: This is only a simulation!
apt-get needs root privileges for real execution.
Keep also in mind that locking is deactivated,
so don't depend on the relevance to the real current situation!
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following NEW packages will be installed:
libcgi-fast-perl libcgi-pm-perl libfcgi-perl linux-headers-4.4.0-34
linux-headers-4.4.0-34-generic linux-image-4.4.0-34-generic
linux-image-extra-4.4.0-34-generic
The following packages will be upgraded:
binutils cpp-5 g++-5 gcc-5 gcc-5-base gcc-5-base:i386 libasan2 libatomic1
libcc1-0 libcilkrts5 libcurl3 libcurl3-gnutls libgcc-5-dev libgfortran3
libgomp1 libitm1 liblsan0 libmpx0 libparse-debianchangelog-perl libquadmath0
libstdc++-5-dev libstdc++6 libstdc++6:i386 libtsan0 libubsan0 linux-generic
linux-headers-generic linux-image-generic linux-libc-dev
29 upgraded, 7 newly installed, 0 to remove and 0 not upgraded.
343 not fully installed or removed.
Inst gcc-5-base:i386 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [i386]) [gcc-5-base:amd64 on gcc-5-base:i386] [gcc-5-base:i386 on gcc-5-base:amd64] [gcc-5-base:amd64 libstdc++6:i386 ]
Inst gcc-5-base [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libitm1:amd64 libcilkrts5:amd64 libasan2:amd64 libquadmath0:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libgomp1:amd64 libatomic1:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Conf gcc-5-base (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libitm1:amd64 libcilkrts5:amd64 libasan2:amd64 libquadmath0:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libgomp1:amd64 libatomic1:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Conf gcc-5-base:i386 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [i386]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libitm1:amd64 libcilkrts5:amd64 libasan2:amd64 libquadmath0:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libgomp1:amd64 libatomic1:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libquadmath0 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libitm1:amd64 libcilkrts5:amd64 libasan2:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libgomp1:amd64 libatomic1:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libgomp1 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libitm1:amd64 libcilkrts5:amd64 libasan2:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libatomic1:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libitm1 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libcilkrts5:amd64 libasan2:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libatomic1:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libatomic1 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libcilkrts5:amd64 libasan2:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libasan2 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libcilkrts5:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 liblsan0:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst liblsan0 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libcilkrts5:amd64 libstdc++-5-dev:amd64 libtsan0:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libtsan0 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libcilkrts5:amd64 libstdc++-5-dev:amd64 libubsan0:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libubsan0 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libcilkrts5:amd64 libstdc++-5-dev:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libcilkrts5 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libmpx0:amd64 libgcc-5-dev:amd64 cpp-5:amd64 libstdc++-5-dev:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libmpx0 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libgcc-5-dev:amd64 cpp-5:amd64 libstdc++-5-dev:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst cpp-5 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libgcc-5-dev:amd64 libstdc++-5-dev:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libcc1-0:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libcc1-0 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libgcc-5-dev:amd64 libstdc++-5-dev:amd64 g++-5:amd64 libgfortran3:amd64 gcc-5:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst g++-5 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libgcc-5-dev:amd64 libstdc++-5-dev:amd64 libgfortran3:amd64 gcc-5:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst gcc-5 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libgcc-5-dev:amd64 libstdc++-5-dev:amd64 libgfortran3:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libgcc-5-dev [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libstdc++-5-dev:amd64 libgfortran3:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libstdc++-5-dev [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libgfortran3:amd64 libstdc++6:amd64 libstdc++6:i386 ]
Inst libgfortran3 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libstdc++6:amd64 libstdc++6:i386 ]
Inst libstdc++6 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) [libstdc++6:amd64 on libstdc++6:i386] [libstdc++6:i386 on libstdc++6:amd64] [libstdc++6:i386 ]
Inst libstdc++6:i386 [5.4.0-6ubuntu1~16.04.1] (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [i386])
Inst binutils [2.26.1-1ubuntu1~16.04.1] (2.26.1-1ubuntu1~16.04.3 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Inst libcurl3-gnutls [7.47.0-1ubuntu2] (7.47.0-1ubuntu2.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Inst libcurl3 [7.47.0-1ubuntu2] (7.47.0-1ubuntu2.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Inst libcgi-pm-perl (4.26-1 Ubuntu:16.04/xenial [all])
Inst libfcgi-perl (0.77-1build1 Ubuntu:16.04/xenial [amd64])
Inst libcgi-fast-perl (1:2.10-1 Ubuntu:16.04/xenial [all])
Inst libparse-debianchangelog-perl [1.2.0-1ubuntu1] (1.2.0-8 Ubuntu:16.04/xenial [all])
Inst linux-image-4.4.0-34-generic (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Inst linux-image-extra-4.4.0-34-generic (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Inst linux-generic [4.4.0.31.33] (4.4.0.34.36 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) []
Inst linux-image-generic [4.4.0.31.33] (4.4.0.34.36 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) []
Inst linux-headers-4.4.0-34 (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all]) []
Inst linux-headers-4.4.0-34-generic (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64]) []
Inst linux-headers-generic [4.4.0.31.33] (4.4.0.34.36 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Inst linux-libc-dev [4.4.0-31.50] (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf dh-python (2.20151103ubuntu1.1 Ubuntu:16.04/xenial-updates [all])
Conf python3 (3.5.1-3 Ubuntu:16.04/xenial [amd64])
Conf libquadmath0 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libgomp1 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libitm1 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libatomic1 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libasan2 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf liblsan0 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libtsan0 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libstdc++6 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libstdc++6:i386 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [i386])
Conf libubsan0 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libcilkrts5 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libmpx0 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf cpp-5 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libcc1-0 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf binutils (2.26.1-1ubuntu1~16.04.3 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libgcc-5-dev (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf gcc-5 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libstdc++-5-dev (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf g++-5 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libgfortran3 (5.4.0-6ubuntu1~16.04.2 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf python3-apt (1.1.0~beta1build1 Ubuntu:16.04/xenial [amd64])
Conf python3-dbus (1.2.0-3 Ubuntu:16.04/xenial [amd64])
Conf language-selector-common (0.165.3 Ubuntu:16.04/xenial-updates [all])
Conf grub-gfxpayload-lists (0.7 Ubuntu:16.04/xenial [amd64])
Conf grub-pc (2.02~beta2-36ubuntu3.2 Ubuntu:16.04/xenial-updates [amd64])
Conf language-pack-en-base (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-en (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-gnome-en-base (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-gnome-en (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-he (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-he-base (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-gnome-he-base (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf language-pack-gnome-he (1:16.04+20160627 Ubuntu:16.04/xenial-updates [all])
Conf libcurl3-gnutls (7.47.0-1ubuntu2.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libnss3-nssdb (2:3.23-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libnss3 (2:3.23-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libnss3-1d (2:3.23-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-style-human (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-common (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-style-galaxy (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-style-breeze (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-core (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-pdfimport (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf ubuntu-drivers-common (1:0.4.17.1 Ubuntu:16.04/xenial-updates [amd64])
Conf python3-pkg-resources (20.7.0-1 Ubuntu:16.04/xenial [all])
Conf python3-chardet (2.3.0-2 Ubuntu:16.04/xenial [all])
Conf python3-six (1.10.0-3 Ubuntu:16.04/xenial [all])
Conf python3-debian (0.1.27ubuntu2 Ubuntu:16.04/xenial [all])
Conf update-notifier-common (3.168.1 Ubuntu:16.04/xenial-updates [all])
Conf console-setup (1.108ubuntu15.2 Ubuntu:16.04/xenial-updates [all])
Conf kbd (1.15.5-1ubuntu4 Ubuntu:16.04/xenial [amd64])
Conf console-setup-linux (1.108ubuntu15.2 Ubuntu:16.04/xenial-updates [all])
Conf lsb-release (9.20160110ubuntu0.2 Ubuntu:16.04/xenial-updates [all])
Conf ubuntu-minimal (1.361 Ubuntu:16.04/xenial [amd64])
Conf apparmor (2.10.95-0ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf python3-gdbm (3.5.1-1 Ubuntu:16.04/xenial [amd64])
Conf python3-commandnotfound (0.3ubuntu16.04.2 Ubuntu:16.04/xenial-updates [all])
Conf command-not-found (0.3ubuntu16.04.2 Ubuntu:16.04/xenial-updates [all])
Conf plymouth-theme-ubuntu-text (0.9.2-3ubuntu13.1 Ubuntu:16.04/xenial-updates [amd64])
Conf python3-distupgrade (1:16.04.14 Ubuntu:16.04/xenial-updates [all])
Conf python3-update-manager (1:16.04.3 Ubuntu:16.04/xenial [all])
Conf python3-gi (3.20.0-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf ubuntu-release-upgrader-core (1:16.04.14 Ubuntu:16.04/xenial-updates [all])
Conf ubuntu-standard (1.361 Ubuntu:16.04/xenial [amd64])
Conf ufw (0.35-0ubuntu2 Ubuntu:16.04/xenial [all])
Conf update-manager-core (1:16.04.3 Ubuntu:16.04/xenial [all])
Conf libpurple0 (1:2.10.12-0ubuntu5.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf telepathy-haze (0.8.0-2 Ubuntu:16.04/xenial [amd64])
Conf account-plugin-aim (3.12.11-0ubuntu3 Ubuntu:16.04/xenial [amd64])
Conf account-plugin-yahoo (3.12.11-0ubuntu3 Ubuntu:16.04/xenial [amd64])
Conf gconf-service-backend (3.2.6-3ubuntu6 Ubuntu:16.04/xenial [amd64])
Conf gconf-service (3.2.6-3ubuntu6 Ubuntu:16.04/xenial [amd64])
Conf gconf2 (3.2.6-3ubuntu6 Ubuntu:16.04/xenial [amd64])
Conf aisleriot (1:3.18.2-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libqt4-declarative (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqtgui4 (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqt4-declarative:i386 (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [i386])
Conf libqtgui4:i386 (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [i386])
Conf libdbusmenu-qt2 (0.9.3+16.04.20160218-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libdbusmenu-qt2:i386 (0.9.3+16.04.20160218-0ubuntu1 Ubuntu:16.04/xenial [i386])
Conf appmenu-qt (0.2.7+14.04.20140305-0ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf python3-problem-report (2.20.1-0ubuntu2.1 Ubuntu:16.04/xenial-updates [all])
Conf python3-apport (2.20.1-0ubuntu2.1 Ubuntu:16.04/xenial-updates [all])
Conf apport (2.20.1-0ubuntu2.1 Ubuntu:16.04/xenial-updates [all])
Conf gnome-terminal (3.18.3-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf apport-gtk (2.20.1-0ubuntu2.1 Ubuntu:16.04/xenial-updates [all])
Conf python3-xapian1.3 (1.3.4-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf apt-xapian-index (0.47ubuntu8 Ubuntu:16.04/xenial [all])
Conf apturl-common (0.5.2ubuntu11.1 Ubuntu:16.04/xenial-updates [amd64])
Conf python3-pycurl (7.43.0-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf python3-software-properties (0.96.20.2 Ubuntu:16.04/xenial-updates [all])
Conf software-properties-common (0.96.20.2 Ubuntu:16.04/xenial-updates [all])
Conf python3-aptdaemon (1.1.1+bzr982-0ubuntu14 Ubuntu:16.04/xenial [all])
Conf python3-aptdaemon.gtk3widgets (1.1.1+bzr982-0ubuntu14 Ubuntu:16.04/xenial [all])
Conf software-properties-gtk (0.96.20.2 Ubuntu:16.04/xenial-updates [all])
Conf apturl (0.5.2ubuntu11.1 Ubuntu:16.04/xenial-updates [amd64])
Conf libcamel-1.2-54 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libedataserver-1.2-21 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libebook-contacts-1.2-2 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libebackend-1.2-10 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libedata-book-1.2-25 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libebook-1.2-16 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf bluez-obexd (5.37-0ubuntu5 Ubuntu:16.04/xenial [amd64])
Conf python3-guacamole (0.9.2-1 Ubuntu:16.04/xenial [all])
Conf python3-markupsafe (0.23-2build2 Ubuntu:16.04/xenial [amd64])
Conf python3-jinja2 (2.8-1 Ubuntu:16.04/xenial [all])
Conf python3-padme (1.1.1-2 Ubuntu:16.04/xenial [all])
Conf python3-urllib3 (1.13.1-2ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates [all])
Conf python3-requests (2.9.1-3 Ubuntu:16.04/xenial [all])
Conf python3-xlsxwriter (0.7.3-1 Ubuntu:16.04/xenial [all])
Conf python3-plainbox (0.25-1 Ubuntu:16.04/xenial [all])
Conf python3-lxml (3.5.0-1build1 Ubuntu:16.04/xenial [amd64])
Conf python3-pyparsing (2.0.3+dfsg1-1ubuntu0.1 Ubuntu:16.04/xenial-updates [all])
Conf python3-checkbox-support (0.22-1 Ubuntu:16.04/xenial [all])
Conf python3-checkbox-ng (0.23-2 Ubuntu:16.04/xenial [all])
Conf checkbox (1.2.4-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf plainbox-provider-resource-generic (0.23-1 Ubuntu:16.04/xenial [amd64])
Conf plainbox-provider-checkbox (0.25-1 Ubuntu:16.04/xenial [amd64])
Conf qml-module-io-thp-pyotherside (1.4.0-2 Ubuntu:16.04/xenial [amd64])
Conf pyotherside (1.4.0-2 Ubuntu:16.04/xenial [all])
Conf checkbox-converged (1.2.4-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf checkbox-gui (1.2.4-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf checkbox-qt (1.2.4-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf gnome-menus (3.13.3-6ubuntu3.1 Ubuntu:16.04/xenial-updates [amd64])
Conf gir1.2-ibus-1.0 (1.5.11-1ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf ibus (1.5.11-1ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf ubuntu-system-service (0.3 Ubuntu:16.04/xenial [all])
Conf gnome-settings-daemon (3.18.2-0ubuntu3 Ubuntu:16.04/xenial [amd64])
Conf gnome-control-center (1:3.18.2-1ubuntu6 Ubuntu:16.04/xenial [amd64])
Conf gnome-bluetooth (3.18.2-1ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libecal-1.2-19 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf indicator-datetime (15.10+16.04.20160406-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf unity-control-center (15.04.0+16.04.20160705-0ubuntu1 Ubuntu:16.04/xenial-updates [amd64])
Conf indicator-bluetooth (0.0.6+16.04.20160526-0ubuntu1 Ubuntu:16.04/xenial-updates [amd64])
Conf compiz-gnome (1:0.9.12.2+16.04.20160714-0ubuntu1 Ubuntu:16.04/xenial-updates [amd64])
Conf compiz (1:0.9.12.2+16.04.20160714-0ubuntu1 Ubuntu:16.04/xenial-updates [all])
Conf tex-common (6.04 Ubuntu:16.04/xenial [all])
Conf texlive-metapost (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf context (2015.05.18.20150601-2 Ubuntu:16.04/xenial [all])
Conf context-modules (20150601-2 Ubuntu:16.04/xenial [all])
Conf liboauth0 (1.0.3-0ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libgdata22 (0.17.4-1 Ubuntu:16.04/xenial [amd64])
Conf gvfs-backends (1.28.2-1ubuntu1~16.04.1 Ubuntu:16.04/xenial-updates [amd64])
Conf deja-dup-backend-gvfs (34.2-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf evolution-data-server-online-accounts (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libedata-cal-1.2-28 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf evolution-data-server (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf texlive-latex-base (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-font-utils (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-extra-utils (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf feynmf (1.08-10 Ubuntu:16.04/xenial [all])
Conf firefox (48.0+build2-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf firefox-globalmenu (48.0+build2-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libcurl3 (7.47.0-1ubuntu2.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf flashplugin-installer (11.2.202.632ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf foomatic-db-compressed-ppds (20160212-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf gdebi-core (0.9.5.7ubuntu1 Ubuntu:16.04/xenial [all])
Conf libgksu2-0 (2.0.13~pre1-6ubuntu8 Ubuntu:16.04/xenial [amd64])
Conf gksu (2.0.2-9ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf gdebi (0.9.5.7ubuntu1 Ubuntu:16.04/xenial [all])
Conf python3-cairo (1.10.0+dfsg-5build1 Ubuntu:16.04/xenial [amd64])
Conf python3-gi-cairo (3.20.0-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf gedit (3.18.3-0ubuntu4 Ubuntu:16.04/xenial [amd64])
Conf gir1.2-edataserver-1.2 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf gir1.2-ebookcontacts-1.2 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf gir1.2-ebook-1.2 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf gir1.2-gdata-0.0 (0.17.4-1 Ubuntu:16.04/xenial [amd64])
Conf libedataserverui-1.2-1 (3.18.5-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf gnome-calendar (3.20.2-0ubuntu0.1 Ubuntu:16.04/xenial-updates [amd64])
Conf libfolks-eds25 (0.11.1-2build2 Ubuntu:16.04/xenial [amd64])
Conf gnome-contacts (3.18.1-1ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf python3-brlapi (5.3.1-2ubuntu2.1 Ubuntu:16.04/xenial-updates [amd64])
Conf python3-louis (2.6.4-2 Ubuntu:16.04/xenial [all])
Conf python3-pyatspi (2.18.0+dfsg-3 Ubuntu:16.04/xenial [all])
Conf python3-speechd (0.8.3-1ubuntu3 Ubuntu:16.04/xenial [all])
Conf gnome-orca (3.18.2-1ubuntu3 Ubuntu:16.04/xenial [all])
Conf gnome-session (3.18.1.2-1ubuntu1.16.04.1 Ubuntu:16.04/xenial-updates [all])
Conf gnome-software (3.20.1+git20160617.1.0440874.ubuntu-xenial-0ubuntu1~16.04.1 Ubuntu:16.04/xenial-updates [amd64])
Conf gnome-user-share (3.14.2-2ubuntu4 Ubuntu:16.04/xenial [amd64])
Conf grilo-plugins-0.2-base (0.2.17-0ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf gstreamer0.10-gconf (0.10.31-3+nmu4ubuntu2~gcc5.1 Ubuntu:16.04/xenial [amd64])
Conf hplip-data (3.16.3+repack0-1 Ubuntu:16.04/xenial [all])
Conf python3-ptyprocess (0.5-1 Ubuntu:16.04/xenial [all])
Conf python3-pexpect (4.0.1-1 Ubuntu:16.04/xenial [all])
Conf python3-pil (3.1.2-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf python3-reportlab-accel (3.3.0-1 Ubuntu:16.04/xenial [amd64])
Conf python3-reportlab (3.3.0-1 Ubuntu:16.04/xenial [all])
Conf hplip (3.16.3+repack0-1 Ubuntu:16.04/xenial [amd64])
Conf printer-driver-postscript-hp (3.16.3+repack0-1 Ubuntu:16.04/xenial [all])
Conf ibus-pinyin (1.5.0-3ubuntu3 Ubuntu:16.04/xenial [amd64])
Conf ibus-table (1.9.1-3ubuntu2 Ubuntu:16.04/xenial [all])
Conf aptdaemon (1.1.1+bzr982-0ubuntu14 Ubuntu:16.04/xenial [all])
Conf language-selector-gnome (0.165.3 Ubuntu:16.04/xenial-updates [all])
Conf latex-cjk-common (4.8.4+git20150701-1 Ubuntu:16.04/xenial [amd64])
Conf latex-cjk-chinese (4.8.4+git20150701-1 Ubuntu:16.04/xenial [amd64])
Conf latex-cjk-japanese (4.8.4+git20150701-1 Ubuntu:16.04/xenial [amd64])
Conf latex-cjk-korean (4.8.4+git20150701-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-other (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf latex-cjk-thai (4.8.4+git20150701-1 Ubuntu:16.04/xenial [all])
Conf latex-cjk-all (4.8.4+git20150701-1 Ubuntu:16.04/xenial [all])
Conf latexmk (1:4.41-1 Ubuntu:16.04/xenial [all])
Conf liblwp-protocol-https-perl (6.06-2 Ubuntu:16.04/xenial [all])
Conf libwww-perl (6.15-1 Ubuntu:16.04/xenial [all])
Conf libxml-parser-perl (2.44-1build1 Ubuntu:16.04/xenial [amd64])
Conf libxml-twig-perl (1:3.48-1 Ubuntu:16.04/xenial [all])
Conf libnet-dbus-perl (1.1.0-3build1 Ubuntu:16.04/xenial [amd64])
Conf libpoppler-qt4-4 (0.41.0-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libpurple-bin (1:2.10.12-0ubuntu5.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libqt4-designer (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqt4-help (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqt4-opengl (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqt4-opengl:i386 (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [i386])
Conf libqt4-scripttools (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqt4-svg (4:4.8.7+dfsg-5ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf libqtwebkit4:i386 (2.3.2-0ubuntu11 Ubuntu:16.04/xenial [i386])
Conf libqtwebkit4 (2.3.2-0ubuntu11 Ubuntu:16.04/xenial [amd64])
Conf libreoffice-avmedia-backend-gstreamer (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-base-core (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-calc (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-draw (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-gtk (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-gnome (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-l10n-en-gb (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-writer (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-help-en-gb (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-help-en-us (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-impress (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf libreoffice-l10n-en-za (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-l10n-he (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf libreoffice-math (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf liboxideqtcore0 (1.16.5-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf liboxideqtquick0 (1.16.5-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf liboxideqt-qmlplugin (1.16.5-0ubuntu0.16.04.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf qml-module-ubuntu-web (0.23+16.04.20160413-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf webbrowser-app (0.23+16.04.20160413-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf webapp-container (0.23+16.04.20160413-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf unity-webapps-service (2.5.0~+16.04.20160201-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf libunity-webapps0 (2.5.0~+16.04.20160201-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf nautilus-share (0.7.3-2ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf onboard (1.2.0-0ubuntu5 Ubuntu:16.04/xenial [amd64])
Conf onboard-data (1.2.0-0ubuntu5 Ubuntu:16.04/xenial [all])
Conf openprinting-ppds (20160212-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf tipa (2:1.3-20 Ubuntu:16.04/xenial [all])
Conf texlive-latex-recommended (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-publishers (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-pictures (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-latex-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-xetex (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-generic-recommended (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf prerex (6.5.3-1 Ubuntu:16.04/xenial [amd64])
Conf printer-driver-foo2zjs-common (20151024dfsg0-1ubuntu1 Ubuntu:16.04/xenial [all])
Conf printer-driver-foo2zjs (20151024dfsg0-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf printer-driver-ptouch (1.4-1 Ubuntu:16.04/xenial [amd64])
Conf printer-driver-pxljr (1.4+repack0-4 Ubuntu:16.04/xenial [amd64])
Conf python-gconf (2.28.1+dfsg-1.1 Ubuntu:16.04/xenial [amd64])
Conf python-qt4 (4.11.4+dfsg-1build4 Ubuntu:16.04/xenial [amd64])
Conf python3-blinker (1.3.dfsg2-1build1 Ubuntu:16.04/xenial [all])
Conf python3-bs4 (4.4.1-1 Ubuntu:16.04/xenial [all])
Conf python3-cffi-backend (1.5.2-1ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf python3-crypto (2.6.1-6build1 Ubuntu:16.04/xenial [amd64])
Conf python3-idna (2.0-3 Ubuntu:16.04/xenial [all])
Conf python3-pyasn1 (0.1.9-1 Ubuntu:16.04/xenial [all])
Conf python3-cryptography (1.2.3-1 Ubuntu:16.04/xenial [amd64])
Conf python3-cups (1.9.73-0ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf python3-cupshelpers (1.5.7+20160212-0ubuntu2 Ubuntu:16.04/xenial [all])
Conf python3-feedparser (5.1.3-3build1 Ubuntu:16.04/xenial [all])
Conf python3-html5lib (0.999-4 Ubuntu:16.04/xenial [all])
Conf python3-httplib2 (0.9.1+dfsg-1 Ubuntu:16.04/xenial [all])
Conf python3-jwt (1.3.0-1 Ubuntu:16.04/xenial [all])
Conf python3-mako (1.0.3+ds1-1ubuntu1 Ubuntu:16.04/xenial [all])
Conf python3-oauthlib (1.0.3-1 Ubuntu:16.04/xenial [all])
Conf python3-renderpm (3.3.0-1 Ubuntu:16.04/xenial [amd64])
Conf python3-systemd (231-2build1 Ubuntu:16.04/xenial [amd64])
Conf python3-uno (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf python3-virtkey (0.63.0-0ubuntu5 Ubuntu:16.04/xenial [amd64])
Conf qt-at-spi:i386 (0.4.0-3 Ubuntu:16.04/xenial [i386])
Conf qt-at-spi (0.4.0-3 Ubuntu:16.04/xenial [amd64])
Conf rhythmbox (3.3-1ubuntu7 Ubuntu:16.04/xenial [amd64])
Conf rhythmbox-plugin-cdrecorder (3.3-1ubuntu7 Ubuntu:16.04/xenial [amd64])
Conf rhythmbox-mozilla (3.3-1ubuntu7 Ubuntu:16.04/xenial [amd64])
Conf rhythmbox-plugin-zeitgeist (3.3-1ubuntu7 Ubuntu:16.04/xenial [all])
Conf rhythmbox-plugins (3.3-1ubuntu7 Ubuntu:16.04/xenial [amd64])
Conf rhythmbox-plugin-magnatune (3.3-1ubuntu7 Ubuntu:16.04/xenial [amd64])
Conf ubuntu-core-launcher (1.0.27.1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf snapd (2.11+0.16.04 Ubuntu:16.04/xenial-updates [amd64])
Conf sni-qt (0.2.7+15.10.20150729-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf sni-qt:i386 (0.2.7+15.10.20150729-0ubuntu1 Ubuntu:16.04/xenial [i386])
Conf python3-oneconf (0.3.9 Ubuntu:16.04/xenial [all])
Conf oneconf (0.3.9 Ubuntu:16.04/xenial [all])
Conf software-center (16.01+16.04.20160420 Ubuntu:16.04/xenial [all])
Conf python3-aptdaemon.pkcompat (1.1.1+bzr982-0ubuntu14 Ubuntu:16.04/xenial [all])
Conf system-config-printer-common (1.5.7+20160212-0ubuntu2 Ubuntu:16.04/xenial [all])
Conf system-config-printer-gnome (1.5.7+20160212-0ubuntu2 Ubuntu:16.04/xenial [all])
Conf system-config-printer-udev (1.5.7+20160212-0ubuntu2 Ubuntu:16.04/xenial [amd64])
Conf texlive-fonts-recommended (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-bibtex-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-fonts-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-fonts-extra-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-fonts-recommended-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-formats-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-french (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-indic (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-cjk (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-publishers-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-latex-extra-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-science-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-korean (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-pstricks-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-humanities-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-greek (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-spanish (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-htmlxml (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-japanese (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-metapost-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-pstricks (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-pictures-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-music (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-generic-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-science (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf fragmaster (1.7-5 Ubuntu:16.04/xenial [all])
Conf texlive-lang-italian (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-english (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-humanities (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-african (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-czechslovak (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-luatex (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-math-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-plain-extra (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-cyrillic (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-portuguese (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-games (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-arabic (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-omega (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-polish (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-chinese (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-latex-recommended-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-latex-base-doc (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-european (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-lang-german (2015.20160223-1 Ubuntu:16.04/xenial [all])
Conf texlive-full (2015.20160320-1 Ubuntu:16.04/xenial [all])
Conf totem (3.18.1-1ubuntu4 Ubuntu:16.04/xenial [amd64])
Conf totem-plugins (3.18.1-1ubuntu4 Ubuntu:16.04/xenial [amd64])
Conf update-notifier (3.168.1 Ubuntu:16.04/xenial-updates [amd64])
Conf update-manager (1:16.04.3 Ubuntu:16.04/xenial [all])
Conf ubuntu-release-upgrader-gtk (1:16.04.14 Ubuntu:16.04/xenial-updates [all])
Conf unity-scope-home (6.8.2+16.04.20160212.1-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf unity (7.4.0+16.04.20160715-0ubuntu1 Ubuntu:16.04/xenial-updates [amd64])
Conf xdiagnose (3.8.4 Ubuntu:16.04/xenial [all])
Conf ubuntu-desktop (1.361 Ubuntu:16.04/xenial [amd64])
Conf ubuntu-software (3.20.1+git20160617.1.0440874.ubuntu-xenial-0ubuntu1~16.04.1 Ubuntu:16.04/xenial-updates [amd64])
Conf unattended-upgrades (0.90 Ubuntu:16.04/xenial [all])
Conf unity-control-center-signon (0.1.8+16.04.20160201-0ubuntu1 Ubuntu:16.04/xenial [amd64])
Conf unity-webapps-common (2.4.17+15.10.20150616-0ubuntu2 Ubuntu:16.04/xenial [all])
Conf usb-creator-common (0.3.2 Ubuntu:16.04/xenial [amd64])
Conf usb-creator-gtk (0.3.2 Ubuntu:16.04/xenial [amd64])
Conf vprerex (6.5.3-1 Ubuntu:16.04/xenial [amd64])
Conf libreoffice-ogltrans (1:5.1.4-0ubuntu1 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf python3-dirspec (13.10-1ubuntu1 Ubuntu:16.04/xenial [all])
Conf sessioninstaller (0.20+bzr150-0ubuntu4.1 Ubuntu:16.04/xenial [all])
Conf ubuntu-sso-client-qt (13.10-0ubuntu11 Ubuntu:16.04/xenial [all])
Conf unity-scope-gdrive (0.9+16.04.20151125-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf unity-webapps-launchpad (2.4.16+16.04.20151119-0ubuntu1 Ubuntu:16.04/xenial [all])
Conf libcgi-pm-perl (4.26-1 Ubuntu:16.04/xenial [all])
Conf libfcgi-perl (0.77-1build1 Ubuntu:16.04/xenial [amd64])
Conf libcgi-fast-perl (1:2.10-1 Ubuntu:16.04/xenial [all])
Conf libparse-debianchangelog-perl (1.2.0-8 Ubuntu:16.04/xenial [all])
Conf linux-image-4.4.0-34-generic (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf linux-image-extra-4.4.0-34-generic (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf linux-image-generic (4.4.0.34.36 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf linux-headers-4.4.0-34 (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [all])
Conf linux-headers-4.4.0-34-generic (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf linux-headers-generic (4.4.0.34.36 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf linux-generic (4.4.0.34.36 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Conf linux-libc-dev (4.4.0-34.53 Ubuntu:16.04/xenial-updates, Ubuntu:16.04/xenial-security [amd64])
Revision history for this message
Manfred Hampl (m-hampl) said :
#7
Ok. The cause for your problem probably is that several packages are only half-installed.
Try
sudo dpkg --configure -a
and report the outcome.
Revision history for this message
Dimka (dimka-f13) said :
#8
Seems like it doesn't work due to 'lots of errors':
dimka@dimka-Inspiron-N5110:~$ sudo dpkg --configure -a
[sudo] password for dimka:
Setting up tex-common (6.04) ...
Warning: Old configuration style found in /etc/texmf/fmt.d
Warning: For now these files have been included,
Warning: but expect inconsistencies.
Warning: These packages should be rebuild with tex-common.
Warning: Please see /usr/share/doc/tex-common/NEWS.Debian.gz
Warning: found file: /etc/texmf/fmt.d/40musixtex.cnf
Running mktexlsr. This may take some time... done.
Running updmap-sys. This may take some time...
updmap-sys failed. Output has been stored in
/tmp/updmap.6vEAqXQ3
Please include this file if you report a bug.
Sometimes, not accepting conffile updates in /etc/texmf/updmap.d
causes updmap-sys to fail. Please check for files with extension
.dpkg-dist or .ucf-dist in this directory
dpkg: error processing package tex-common (--configure):
subprocess installed post-installation script returned error exit status 1
dpkg: dependency problems prevent configuration of texlive-latex-extra:
texlive-latex-extra depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-latex-extra (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-pictures-doc:
texlive-pictures-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-pictures-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-science:
texlive-science depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-science (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of latex-cjk-korean:
latex-cjk-korean depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package latex-cjk-korean (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-plain-extra:
texlive-plain-extra depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-plain-extra (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-pstricks-doc:
texlive-pstricks-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-pstricks-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-formats-extra:
texlive-formats-extra depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-formats-extra (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-pictures:
texlive-pictures depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-pictures (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of latex-cjk-common:
latex-cjk-common depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package latex-cjk-common (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-humanities:
texlive-humanities depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-humanities (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-publishers:
texlive-publishers depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-publishers (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of tipa:
tipa depends on tex-common (>= 3); however:
Package tex-common is not configured yet.
dpkg: error processing package tipa (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-arabic:
texlive-lang-arabic depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-arabic (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-full:
texlive-full depends on texlive-latex-extra (>= 2015); however:
Package texlive-latex-extra is not configured yet.
texlive-full depends on texlive-formats-extra (>= 2015); however:
Package texlive-formats-extra is not configured yet.
texlive-full depends on texlive-pstricks-doc (>= 2015); however:
Package texlive-pstricks-doc is not configured yet.
texlive-full depends on texlive-publishers (>= 2015); however:
Package texlive-publishers is not configured yet.
texlive-full depends on texlive-science (>= 2015); however:
Package texlive-science is not configured yet.
texlive-full depends on texlive-humanities (>= 2015); however:
Package texlive-humanities is not configured yet.
texlive-full depends on texlive-plain-extra (>= 2015); however:
Package texlive-plain-extra is not configured yet.
texlive-full depends on texlive-pictures-doc (>= 2015); however:
Package texlive-pictures-doc is not configured yet.
texlive-full depends on
dpkg: error processing package texlive-full (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-font-utils:
texlive-font-utils depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-font-utils (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-spanish:
texlive-lang-spanish depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-spanish (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-european:
texlive-lang-european depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-european (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of latex-cjk-thai:
latex-cjk-thai depends on latex-cjk-common (>= 4.8.4+git20150701-1); however:
Package latex-cjk-common is not configured yet.
latex-cjk-thai depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package latex-cjk-thai (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-latex-extra-doc:
texlive-latex-extra-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-latex-extra-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-italian:
texlive-lang-italian depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-italian (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-publishers-doc:
texlive-publishers-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-publishers-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-luatex:
texlive-luatex depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-luatex (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-japanese:
texlive-lang-japanese depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-japanese (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-metapost-doc:
texlive-metapost-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-metapost-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-music:
texlive-music depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-music (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-english:
texlive-lang-english depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-english (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-german:
texlive-lang-german depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-german (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of context:
context depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package context (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-games:
texlive-games depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-games (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of fragmaster:
fragmaster depends on texlive-font-utils; however:
Package texlive-font-utils is not configured yet.
dpkg: error processing package fragmaster (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-generic-extra:
texlive-generic-extra depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-generic-extra (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-latex-recommended-doc:
texlive-latex-recommended-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-latex-recommended-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-fonts-recommended-doc:
texlive-fonts-recommended-doc depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-fonts-recommended-doc (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-czechslovak:
texlive-lang-czechslovak depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-czechslovak (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of prerex:
prerex depends on texlive-pictures; however:
Package texlive-pictures is not configured yet.
dpkg: error processing package prerex (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-polish:
texlive-lang-polish depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-polish (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-metapost:
texlive-metapost depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-metapost (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of latex-cjk-japanese:
latex-cjk-japanese depends on latex-cjk-common (= 4.8.4+git20150701-1); however:
Package latex-cjk-common is not configured yet.
latex-cjk-japanese depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package latex-cjk-japanese (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of latex-cjk-chinese:
latex-cjk-chinese depends on latex-cjk-common (= 4.8.4+git20150701-1); however:
Package latex-cjk-common is not configured yet.
latex-cjk-chinese depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package latex-cjk-chinese (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of feynmf:
feynmf depends on tex-common (>= 4); however:
Package tex-common is not configured yet.
feynmf depends on texlive-font-utils; however:
Package texlive-font-utils is not configured yet.
dpkg: error processing package feynmf (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-other:
texlive-lang-other depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-other (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of vprerex:
vprerex depends on prerex; however:
Package prerex is not configured yet.
dpkg: error processing package vprerex (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-fonts-recommended:
texlive-fonts-recommended depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-fonts-recommended (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-bibtex-extra:
texlive-bibtex-extra depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-bibtex-extra (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-lang-cyrillic:
texlive-lang-cyrillic depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-lang-cyrillic (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive:
texlive depends on texlive-fonts-recommended (>= 2015); however:
Package texlive-fonts-recommended is not configured yet.
dpkg: error processing package texlive (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-omega:
texlive-omega depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-omega (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of latex-cjk-all:
latex-cjk-all depends on latex-cjk-common (>= 4.8.4+git20150701-1); however:
Package latex-cjk-common is not configured yet.
latex-cjk-all depends on latex-cjk-chinese (>= 4.8.4+git20150701-1); however:
Package latex-cjk-chinese is not configured yet.
latex-cjk-all depends on latex-cjk-japanese (>= 4.8.4+git20150701-1); however:
Package latex-cjk-japanese is not configured yet.
latex-cjk-all depends on latex-cjk-korean (= 4.8.4+git20150701-1); however:
Package latex-cjk-korean is not configured yet.
latex-cjk-all depends on latex-cjk-thai (= 4.8.4+git20150701-1); however:
Package latex-cjk-thai is not configured yet.
dpkg: error processing package latex-cjk-all (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-generic-recommended:
texlive-generic-recommended depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
dpkg: error processing package texlive-generic-recommended (--configure):
dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of texlive-xetex:
texlive-xetex depends on tipa (>= 2:1.2-2.1); however:
Package tipa is not configured yet.
texlive-xetex depends on tex-common (>= 6); however:
Package tex-common is not configured yet.
texlive-xetex depends on texlive-latex-extra (>= 2015); however:
Package texlive-latex-extra is not configured yet.
dpkg: error processing package texlive-xetex (--configure):
dependency problems - leaving unconfigured
dpkg: too many errors, stopping
Errors were encountered while processing:
tex-common
texlive-latex-extra
texlive-pictures-doc
texlive-science
latex-cjk-korean
texlive-plain-extra
texlive-pstricks-doc
texlive-formats-extra
texlive-pictures
latex-cjk-common
texlive-humanities
texlive-publishers
tipa
texlive-lang-arabic
texlive-full
texlive-font-utils
texlive-lang-spanish
texlive-lang-european
latex-cjk-thai
texlive-latex-extra-doc
texlive-lang-italian
texlive-publishers-doc
texlive-luatex
texlive-lang-japanese
texlive-metapost-doc
texlive-music
texlive-lang-english
texlive-lang-german
context
texlive-games
fragmaster
texlive-generic-extra
texlive-latex-recommended-doc
texlive-fonts-recommended-doc
texlive-lang-czechslovak
prerex
texlive-lang-polish
texlive-metapost
latex-cjk-japanese
latex-cjk-chinese
feynmf
texlive-lang-other
vprerex
texlive-fonts-recommended
texlive-bibtex-extra
texlive-lang-cyrillic
texlive
texlive-omega
latex-cjk-all
texlive-generic-recommended
texlive-xetex
Processing was halted because there were too many errors.
Revision history for this message
Manfred Hampl (m-hampl) said :
#9
configuration problems with latex or texlive can be hard to tackle.
There is a log file mentioned in the error message
updmap-sys failed. Output has been stored in
/tmp/updmap.6vEAqXQ3
Please include this file if you report a bug.
What are the contents of this file?
If it is too large please upload to http://pastebin.ubuntu.com
Revision history for this message
Dimka (dimka-f13) said :
#10
Can I somehow upload the file here?
I don't know if it means anything, but this is its text (gedit) content:
updmap [WARNING]: resetting $HOME value (was /home/dimka) to root's actual home (/root).
updmap will read the following updmap.cfg files (in precedence order):
/etc/texmf/web2c/updmap.cfg
/usr/share/texmf/web2c/updmap.cfg
/usr/share/texlive/texmf-dist/web2c/updmap.cfg
updmap may write changes to the following updmap.cfg file:
/etc/texmf/web2c/updmap.cfg
dvips output dir: "/var/lib/texmf/fonts/map/dvips/updmap"
pdftex output dir: "/var/lib/texmf/fonts/map/pdftex/updmap"
dvipdfmx output dir: "/var/lib/texmf/fonts/map/dvipdfmx/updmap"
updmap [ERROR]: The following map file(s) couldn't be found:
updmap [ERROR]: culmus.map (in /etc/texmf/web2c/updmap.cfg)
updmap [ERROR]: Did you run mktexlsr?
You can disable non-existent map entries using the option
--syncwithtrees.
Revision history for this message
Manfred Hampl (m-hampl) said :
#11
Try what the hint tells:
sudo updmap-sys --syncwithtrees
sudo dpkg --configure tex-common
and report the results.
Revision history for this message
Dimka (dimka-f13) said :
#12
OK, so I figured it out and fixed the problem.
All I had to do is run 'sudo apt-get -f install' to fix damaged packages, but I could not do it due to the errors above.
So I edited the '/etc/texmf/web2c/updmap.cfg' file, where I had to comment out the first line (referring to a non-existing file). Then, 'sudo apt-get -f install' worked and solved my network issue.
Now both wifi and ethernet are working properly. Thank you very much for the help! |
magnetite density kg/m3
Magnetite is a Grayish black/ Iron black metal with a non-fluorescent texture. Last accessed: 29 August 2020 (www.handbookofmineralogy.org). Density Table. ›› Quick conversion chart of g/cm3 to kg/m3. Earth Planets Space: 54: 275-286, This map shows a selection of localities that have latitude and longitude coordinates recorded. Physical Review B: 50: 6446-6449. (1980) Oriented magnetite inclusions in pyroxenes from the Grenville province. Densities of Typical Rock Types and Minerals Rock Type Range (g/cm3) Average (g/cm3) Sediments(wet) Overburden 1.92 Soil 1.2 – 2.4 1.92 Clay 1.63 – 2.6 2.21 Gravel 1.70 – 2.40 2.0 Sand 1.70 – 2.30 2.0 Sandstone 1.61 – 2.76 2.35 Shale 1.77 – 3.20 2.40 Limestone 1.93 – 2.90 2.55 Dolomite 2.28 – 2.90 2.70 Sedimentary rocks (av.) =2700 kg/m3 Above valuses substitute in eq(1) VP = √ (972*109 /2700) VP = √ (36*107) VP=6000 m/s VP = 6 km/s ( I am getting one zero extra. Note: Learn more about the density here. Whitehead, 1990; Ralph Bottrill 6/10/2005. EN 206:2013 defines heavyweight concrete as having an oven dry density greater than 2600kg/m 3. Definitions and convertion calculators. This weight in kilograms is its density in tonnes per cubic metre. Key Features: If the volume is unit then, Bulk Density= Mass. Applied Physics Letters: 72: 734-736. On page 1, line 5 from the bottom, when the number ratio, defined based on the size and ideal density, between Nannochloropsis sp. Magnetite is an important iron ore, along with hematite. The concrete was studied using Hematite (iron ore) having a density varies from 3400-3600 Kg/m3. Platinum is an extremely rare Earth metal with an average abundance of 5 micrograms per kilogram. Data of miscellaneous substances measured in density as per kg/m3, the substances include soils, metals, woods and liquids. Fleet, M.E., Bilcox, G.A., Barnett, R.L. Density Density is the term for how heavy an object is for its size.Density is usually expressed in units like grams per cubic centimeter (g/cc or g/cm 3), kilograms per cubic meter, pounds per cubic inch (cubic foot or cubic yard), or pounds per gallon. (Dana, 1874) (Januzzi, 1966, 1989) (Man¬chester, 1931) (Trainer, 1938, 1941) (Whitlock, 1903) (Nightingale 2001) Journal of Electron Spectroscopy and Related Phenomena: 86: 107-113. Neumann, E.-R. (1974) The distribution of Mn 2+ and Fe 2+ between ilmenites and magnetites in igneous rocks. To find a specific product, enter the name (or part of the name) of the product you are looking for in the “Live Material Search”. The name given for Magnetite pseudomorphs after. Hudon, P., Friedman, R.M., Gauthier, G. & Martignole, J. The number of magnetite was recalculated using the density of magnetite at 5200 kg/m3. You should always treat mineral specimens with care. ): 229-231: 431-436. Atti della Società toscana di scienze naturali Memorie Serie A: 96: 327-332. : 16: 335. V content reported up to 4.84% (India). Meanwhile, recycled CRT funnel glass with a density of ~3000 kg/m3 can be used as a potential high density material for the production of … QUALITY CERTIFICATE 1.CHARACTERISTIC Name of Product : Cryogenic (Expanded Perlite) Size of Product : 0‐ … The bulk density or unit weight of sand is the mass or weight of the sand that required to fill a container of a specified unit volume. Last accessed: 29 August 2020 (gestis-en.itrust.de). Magnetite: 5.18: Olivine: 3.27–4.27: Pyrite: 5.02: Quartz: 2.65: Sphalerite: 3.9–4.1: Talc: 2.7–2.8: Tourmaline: 3.02–3.2: Rock Densities . Wright, J.P., Attfield, J.P., Radaelli, P.G. Cecchini A., Franzini M., Troysi M.(1989) La microdurezza della magnetite. : 13:213.; Econ Geol (1985) 80:418-443, Miller, C. E. (1971) Rhode Island Minerals and Their Locations, University of Rhode Island, Kingston. Pearce, C.I., Henderson, C.M.B., Pattrick, R.A.D., van der Laan, G., Vaughan, D.J. Following the Archimedes principle – particles smaller than the density of the heavy medium will float, and particles larger than the density of the heavy medium will sink in the medium. Settling experiments revealed that magnetite dense media exhibit bulk zone settling properties that are characterized by the presence of (from top to bottom): a supernatant, a transition zone, a constant density zone and a sediment. H. oersted (Oe), e Gb/cm. 2 Neon: Density at 0° Celsius. Data of miscellaneous substances measured in density as per kg/m3, the substances include soils, metals, woods and liquids. You can scroll through the entire list or start typing the name of a compound in the search field, all materials containing those characters will be displayed. The conversion between gauss and tesla is an easy one: 1 tesla = 10,000 gauss. (2006) Age of the Cabonga nepheline syenite, Grenville Province, western Quebec. The following words are inserted to Abstract. Ba to dyn/in² conversion table, Ba to dyn/in² unit converter or convert between all units of pressure measurement. The density of ice is 917 kg/m 3, and the density of sea water is 1025 kg/m 3. ive just multiplied by the density in Kg/m3 and getting the correct answers now. This free density calculator determines any of the three variables in the density equation given the other two. The density of pure water is also 62.4 lbs/cu.ft (pounds per cubic foot) and if we know that ammonium nitrate has a sg of 0.73 then we can calculate that its density is 0.73 x 62.4 = 45.552 lbs/cu.ft. Φ. maxwell (Mx), Gּcm 2. Cite. A manganoan variety of magnetite. 2) -In the Materials and Method, isolation and cultivation of Monoraphidium sp. Pub. Nature: 95: 561-561. Nitrogen: Density given for N at 0° Celsius. Density is essentially a measurement of how tightly matter is packed together. Using a gravimeter, they measure the gravitational anomalous cross-section of the deposit (shown to the right) and determines that the profile is consistent with a sphere with a radius to depth ratio of radius to depth ratio . Huang, D.J., Chang, C.F., Jeng, H.-T., Guo, G.Y., Lin, H.-J., W, W.B., Ku, H.C., Fujimori, A., Takahashi, Y., Chen, C.T. A variety of magnetite that is a natural magnet (magnetized). Thanks again. Chen, J., Huang, D.J., Tanaka, A., Chang, C.F., Chung, S.C., Wu, W.B., Chen, C.T. Click on the. Pasternak, M.P., Nasu, S., Wada, K., Endo, S. (1994) High-pressure phase of magnetite. Features Magnetic flux density, magnetic induction. Also reported as parting planes: {001}, {011}, {138}. Last accessed: 29 August 2020 (nist.gov). However, they can be produced with densities up to 5280 kg/m3 using iron both fine and coarse aggregates. It is a unique physical property for a particular object. The density of steel is in the range of 7.75 and 8.05 g/cm 3 (7750 and 8050 kg/m 3 or 0.280 and 0.291 lb/in 3).The theoretical density of mild steel (low-carbon steel) is about 7.87 g/cm 3 (0.284 lb/in 3).. Density of carbon steels, alloy steels, tool steels and stainless steels are shown below in g/cm 3, kg/m 3 and lb/in 3. A swimming polar bear climbs onto a piece of floating ice that has a volume of 4.65 m3. Flux Density is a measure how many webers are squeezed into some area. The grout used in this concrete should be richer than those used in normal concrete. Calculate the molarity of water if its density is 1000 kg/m^3. Mole to volume and weight conversions for common compounds, The search results include links to various calculator pages associated with each found item. Extremely thin layers of 200-nm octahedral crystals of magnetite give some basalt surfaces an iridescent sheen (Nadin, 2007). The principle of density was discovered by the Greek scientist Archimedes. In addition, explore hundreds of other calculators including topics such as finance, math, health, fitness, weather, and even transportation. National Institute of Standards and Technology; U.S. Department of Commerce; 1401 Constitution Ave N.W. asked Aug 2 in Some basic concepts in chemistry by Mulemwa (15 points) 0 votes. About Magnetite; 1 cubic meter of Magnetite weighs 5 170 kilograms [kg] 1 cubic foot of Magnetite weighs 322.75256 pounds [lbs] Magnetite weighs 5.17 gram per cubic centimeter or 5 170 kilogram per cubic meter, i.e. In fact, webers per square meter is the unit for flux density. Note: The bulk density and angle of repose will vary according to variety, moisture content, quality and trash content of the grain. Rocks and Minerals 81:34-42; Ontario Ministry of Northern Development and Mines,MDI Number: MDI31F04SW00297. June 21, 2016 CSIR-NET 2016 23. (FRL) - First Recorded Locality for everything else (eg varieties). (TL) - Type Locality for a valid mineral species. Cawthorn, R.G., McCarthy, TS. Very pure calibrated and produced […] The rock samples categorized under the iron ore also indicates frequency peaks at density range 3.1 x 103 kg/m3 – 3.3 x 103 kg/m3 and 4.2 x 103 kg/m3 – 4.4 x 103 kg/m3 ±0.5 which signifies two iron ore types i.e. The target concrete density for the mix was 3,600 kg/m3. magnetite and hematite ore respectively. Rock density is very sensitive to the minerals that compose a particular rock type. represent iron ore. (2004) Magnetic circular dichroism in Fe 2p resonant photoemission of magnetite. Calculate how much of this gravel is required to attain a specific depth in a cylindrical, quarter cylindrical or in a rectangular shaped aquarium or pond [ weight to volume | volume to weight | price ], Phosphoric acid, 50% solution [H3PO4] weighs 1 334 kg/m³ (83.2789 lb/ft³) [ weight to volume | volume to weight | price | density ], Volume to weight, weight to volume and cost conversions for Refrigerant R-124, liquid (R124) with temperature in the range of -40°C (-40°F) to 82.23°C (180.014°F), The grain per yard is a measurement unit of linear or linear mass density, Dynamic viscosity is a measure of how resistive a fluid is to flow. Note: Learn more about the density here. On page 1, line 5 from the bottom, when the number ratio, defined based on the size and ideal density, between Nannochloropsis sp. Contains Mn 2+ substituting for Fe 2+. The data obtained contains all various measurement of the materials or substances stated in this page. Whether your need is for heavy weight to balance a bridge, to keep a gravity-based structure in place, to make a counterweight for heavy vehicles or any other ballast project, you’ll need a high density material to get the right weight for your design. Material Science Forum (Trans. (1997) Fe L2,3 linear and circular magnetic dichroism of Fe3O4. (1984) The structure of magnetite: two annealed natural magnetites, Fe3.005O4 and Fe2.96Mg0.04O4. To check grain bulk density weight 1 L of grain. [5 marks] Geophysicists discover a deposit of magnetite (density of 5000 kg/m3) located in the Earth’s crust (density 2670 kg/m3). [5 marks] Geophysicists discover a deposit of magnetite (density of 5000 kg/m3) located in the Earth’s crust (density 2670 kg/m3). This weight in kilograms is its density in tonnes per cubic metre. Calculate the amount of magnetite (PFe304 = 5180 kg/mº) to add to 1000 kg of water (PH20 = 1000 kg/m3) to obtain a slurry density of 1210 kg/m'. Journal of Magnetism and Magnetic Materials: 233: 69-73. Mineral paragenesis, geochemistry and fluid characteristics of the Kara scheelite-magnetite skarn deposit, Northwestern Tasmania (Masters dissertation, University of Tasmania). 1 g/cm3 is equal to 1000 kilogram/cubic meter. ? Magnetic flux. Coey, J.M.D., Berkowits, A.E., Balcells, L.I., Putris, F.F., Parker, F.T. (2001) Long range charge ordering in magnetite below the Verwey transition. But what is the density of an atom of Ti? Bragg, W.H. (circa 1985), Untitled manuscript on central Connecticut mineralogy. The data obtained contains all various measurement of the materials or substances stated in this page. 2) -In the Materials and Method, isolation and cultivation of Monoraphidium sp. Named in 1845 by Wilhelm Karl von Haidinger for the locality at Magnesia, Greece (site for, Approved, 'Grandfathered' (first described prior to 1959). 2 Argon: Density at 0° Celsius. Bulk Density Chart. Kuiper, P., Searle, B.G., Duda, L.-C., Wolf, R.M., van der Zaag, P.J. Palache, C., Berman, H., Frondel, C. (1944) The System of Mineralogy of James Dwight Dana and Edward Salisbury Dana Yale University 1837-1892, Volume I: Elements, Sulfides, Sulfosalts, Oxides. The fluid movement and particle sedimentation are no longer the main factors contributing to the layering, and the property of the medium itself is an important factor in the separation. You can scroll through the entire list or start typing the name of a compound in the search field, all materials containing those characters will be displayed. 43(9), 1237-1249. Magnesioferrite-Magnetite Series. American Mineralogist: 91: 880-893. This free density calculator determines any of the three variables in the density equation given the other two. 1 answer. Note that rounding errors may occur, so always check the results. B. gauss (G) d. 10-4. tesla (T), Wb/m 2. (1988) Saturation magnetisation, coercivity and lattice parameter changes in the system Fe3O4-γ-Fe2O3, and their relationship to structure. Philosophical Magazine: 30(176): 305-315. The Canadian Mineralogist: 18: 89-99. (2004) Spin and orbital magnetic moments of Fe3O4. Twin gliding, with K1{111}, K2{11, 3d models and HTML5 code kindly provided by, Hematite overgrowths on, and inclusions in, magnetite; ilmenite inclusions, rutile overgrowths, chlorite group overgrowths, pyrophanite inclusions; magnetite on hematite; inclusions in muscovite; inclusions in hematite; inclusions in ilmenite; magnetite overgrowths on olivine. Note: The bulk density and angle of repose will vary according to variety, moisture content, quality and trash content of the grain. g/cm3 or kg/m3 The SI derived unit for density is the kilogram/cubic meter. Journal of Physics C (Solid State Physics): 21: L989-L992. Goss, C.J. South Africa is the largest producer of platinum with 80% of the total world’s production, along with small contributions from the United States and Russia. June 21, 2016 CSIR-NET 2016 23. Collyer, S., Grimes, N.W., Vaughan, D.J. Carnegie Institution of Washington Year Book: 76: 522-525. =2700 kg/m3 Above valuses substitute in eq(1) VP = √ (972*109 /2700) VP = √ (36*107) VP=6000 m/s VP = 6 km/s ( I am getting one zero extra. represent iron ore. =2700 kg/m3 Above valuses substitute in eq(1) V = √ (972*109 /2700) V= √ (36*107) V=6000 m/s V = 6 km/s ( I am getting one zero extra. However, they can be produced with densities up to 5280 kg/m3 using iron both fine and coarse aggregates. Bulk Density Chart. Viscosity describes how thick a fluid is. Heavy ballast material. June 21, 2016 CSIR-NET 2016 23. (1995). This Bulk Density Chart contains a searchable database of nearly 1000 products with dry powder or granular characteristics. As specific gravity is just a comparison, it can be applied across any units. were explained. (2006) Direct determination of cation site occupancies in natural ferrite spinels by L 2,3 X-ray absorption spectroscopy and X-ray magnetic circular dichroism. Why MagnaDense is preferred as heavyweight ballast. This is due to the crushed particle shape, the higher amount of finer material and increased particle density. TOFT ET AL. Earth and Planetary Science Letters: 46: 335-343. Annals of Science: 61(3): 273-319. It is dense, ductile and unreactive. U, F. gilbert (Gb) 10/4π. Ata Crystallographica: B38: 1718-1723. BAR, UPC: 858624003002 contain(s) 357 calories per 100 grams or ≈3.527 ounces [ price ], Foods high in Vitamin E (label entry primarily) and foods low in Vitamin E (label entry primarily), CaribSea, Freshwater, Super Naturals, Rio Grande weighs 1 489.72 kg/m³ (93.00018 lb/ft³) with specific gravity of 1.48972 relative to pure water. It is easy to calculate density if you know the formula and understand its related units. If you have sweated to find data,, then please allow it to be added here. Buddington, A.F., Lindsley, D.H. (1964) Iron-titanium oxide minerals and synthetic equivalents. In the case of Titanium , density is 4.50 g/cm³. Together with Concrite, the premix supplier, Dr James Aldred developed of a high density concrete used to provide the necessary radiation shielding during the processing of the Mo-99, ensuring all adjacent habitable areas are safe for use. Note that rounding errors may occur, so always check the results. It is dense, ductile and unreactive. Africano, F., Van Rompaey, G., Bernard, A., Le Guern, F. (2002) Deposition of trace elements from high temperature gases of Satsuma-Iwojima volcano. (1982) The structure of magnetite: defect structure II. Magnetite weighs 5.17 gram per cubic centimeter or 5 170 kilogram per cubic meter, i.e. Using a gravimeter, they measure the gravitational anomalous cross-section of the deposit (shown to the right) and determines that the profile is consistent with a sphere with a radius to depth ratio of radius to depth ratio . (1915) The structure of the spinel group of crystals. Here's a confusing part: Many people call this, "field strength." =2700 kg/m3 Above valuses substitute in eq(1) V = √ (972*109 /2700) V= √ (36*107) V=6000 m/s V = 6 km/s ( I am getting one zero extra. Twin lamellae and zonal growth pattern exhibited in polished section by magnetite at times. Dale, T. Nelson (1910). The commercially used aggregates are barite, magnetite, ilmenite, limonite, etc. If anyone know please correct this problem) Read more CSIR-NET 2016(June)-23. The density achieved will depend on the type of aggregate used. VC1005X system, S-50K Susceptometer and Intuitive User Guidance. Mügge (1905) Jb. A variety of magnetite containing Mn 2+ substituting for Fe 2+. Some data that is not easily available is also included. Type in your own numbers in the form to convert the units! Zurich Switz. O'Neill, H.St.C. A/m f (Volume) magnetization g. M. emu/cm 3 h. 10 3. Berti G. (1995) Microstructure of Magnetite from XRPD Data in Relation to Magnetism. Twins flattened parallel to {111} (common spinel law twins), or as lamellar twins, producing striae on {111}. Settling experiments revealed that magnetite dense media exhibit bulk zone settling properties that are characterized by the presence of (from top to bottom): a supernatant, a transition zone, a constant density zone and a sediment. Rocks & Min. Magnetite: 5.18: Olivine: 3.27–4.27: Pyrite: 5.02: Quartz: 2.65: Sphalerite: 3.9–4.1: Talc: 2.7–2.8: Tourmaline: 3.02–3.2: Rock Densities . Unit in kg/m 3 or lb/ft 3. ⓘ - Click for further information on this occurrence. Density: 21.45 g/cm 3. & A. Bevan (1934) Mineralogy and genesis of the Mayville iron ore of Wisconsin: american Mineralogist: 19 (11): 493- 514. Type in your own numbers in the form to convert the units! But what is the density of an atom of Ti? g/cm3 or kg/m3 The SI derived unit for density is the kilogram/cubic meter. Density : 80 ‐ 90 kg/m3 Moisture :max. The density of ice is 917 kg/m3, and the density of sea water is 1025 kg/m3. Density of Titanium (Ti) [& g/cm3, kg/m3, Uses, Sources ... 0 0 Saturday, August 17, 2019 Edit this post. A material’s density is defined as its mass per unit volume. Fleet, M.E. Xenon: Density at 0° Celsius. Markgraf, S.A., Reeder, R.J. (1985) High-temperature structure refinements of calcite and magnetite: American Mineralogist: 70: 590. Hawley, J. Related Documents . ; Washington, DC 20230. 7th edition, revised and enlarged: 698-707. Crystals usually octahedral, sometimes dodecahedral, striated on {011} parallel [01, Common on {111}, with the same face as the composition face. Weiss, P. (1896) Magnetization of Crystallised Magnetite. Volume, Density & Magnetism systems for simple handling and guided processes for regulatory compliance and highly accurate mass determinations i.e National Metrology Institutes. Use this page to learn how to convert between grams/cubic centimeter and kilograms/cubic meter. The more common aggregates used to achieve the required densities are Hematite, Ilmenite, Magnetite and Steel aggregate. (1986) The structure of magnetite: symmetry of cubic spinels. Page generated: December 8, 2020 00:40:45, Rubiana, Metropolitan City of Turin, Piedmont, Italy, Chaobuleng Mine, East Ujimqin Banner, Xilingol League, Inner Mongolia, China, Ischia di Castro, Viterbo Province, Lazio, Italy, search for minerals with similar chemistry, American Mineralogist Crystal Structure Database, Hey's Chemical Index of Minerals Grouping, Magnetite-olivine-augite-plagioclase mafic-hornfels, References and PDF downloads at RRUFF project, Bentley Lake occurrence (Madawaska mine property), Manton Avenue Quarry (Manton Quarry; Violet Hill Quarry), Wechsler B A, Lindsley D H, Prewitt C T (1984), Haavik C, Stolen S, Fjellvag H, Hanfland M, Hausermann D (2000), Fjellvag H, Hauback B C, Vogt T, Stolen S (2002), Aiyansh basalt lava flow, Nass River valley, British Columbia, Canada, Itcha Mountain hawaiite lava flow, central British Columbia, Canada, Finger L W, Hazen R M, Hofmeister A M (1986), Nakagiri N, Manghnani M H, Ming L C, Kimura S (1986), Gatta G D, Kantor I, Ballaran T B, Dubrovinsky L, McCammon C (2007), Fjellvag H, Gronvold F, Stolen S, Hauback B C (1996), A Cr-bearing variety of magnetite with Cr. Journal of Geophysical Research: 77: 334-341. So it is expected that the smallest piece of matter, like an atom of Titanium has it too. With Magnetite it is possible to produce hardened concrete densities of 4000 kg/m3 , some 60% heavier than normal aggregate concrete; although without the use of admixtures normal workability concrete appears stiffer than conventional concrete. If anyone know please correct this problem) Read more CSIR-NET 2016(June)-23. Mao, H.K., Virgo, D., Bell, P.M. (1977) High-pressure 57Fe Mössbauer data on the phase and magnetic transitions of magnesioferrite (MgFe2O4), magnetite (Fe3O4), and hematite (Fe2O3). Densities of Typical Rock Types and Minerals Rock Type Range (g/cm3) Average (g/cm3) Sediments(wet) Overburden 1.92 Soil 1.2 – 2.4 1.92 Clay 1.63 – 2.6 2.21 Gravel 1.70 – 2.40 2.0 Sand 1.70 – 2.30 2.0 Sandstone 1.61 – 2.76 2.35 Shale 1.77 – 3.20 2.40 Limestone 1.93 – 2.90 2.55 Dolomite 2.28 – 2.90 2.70 Sedimentary rocks (av.) Structure, properties, reactions, occurrences and uses. 2 Fluorine: Density given for F at 0° Celsius. ; MINERALOGICAL MAGAZINE, SEPTEMBER 1984, VOL. Palache, C., Berman, H., & Frondel, C. (1951), The System of Mineralogy of James Dwight Dana and Edward Salisbury Dana, Yale University 1837-1892, Volume II: 214.. May also be formulated as vanadiferous titanomagnetite. Lazor, P., Shebanova, O.N., Annersten, H. (2004) High-pressure study of stability of magnetite by thermodynamic analysis and synchrotron X-ray diffraction. Whether your need is for heavy weight to balance a bridge, to keep a gravity-based structure in place, to make a counterweight for heavy vehicles or any other ballast project, you’ll need a high density material to get the right weight for your design. On {111}, especially good. Because the bulk density of a substance varies greatly depending on how the material has been handled, the information contained in this reference tool should be used for estimation purposes only. Steel and iron aggregates are also used to produce high-density concrete. Sedimentary rocks (and granite), which are rich in quartz and feldspar, tend to be less dense than volcanic rocks. This concept is also frequently used in other natural sciences such as chemistry and materials science. Physics and Chemistry of Minerals: 16: 164-171. Why MagnaDense is preferred as heavyweight ballast. No information on health risks for this material has been entered into the database. American Mineralogist: 21: 504-510. 48, PP. Physical Review B: 69: 085107-1-085107-8. The number of magnetite was recalculated using the density of magnetite at 5200 kg/m3. 10-8. weber (Wb), volt second (Vּs) Magnetic potential difference,magnetomotive force. Nanoinclusions of magnetite crystals cause the iridescence of Rainbow obsidian (Nadin, 2007). Upon analysis all theses are happening due to the change in density of mixture i have given corresponding density of each species and given the mixture density to be formulated as in-compressible ideal gas which has reduced the density of the mixture to be 2.58 which in reality is 2170 kg/m3 so i should rectify it first and c if results are coming. The constant density zone was found to have a solids content that was the same as that of the initial suspension. American Mineralogist: 85: 514-523. de Castro, A.R.B., Fonesca, P.T., Pacheco, J.G., da Slva, J.C.V., Santana, M.H.A. magnetite and hematite ore respectively. and magnetite was 1:12.5. Very pure calibrated and produced […] Question . Showing 16 significant localities out of 17,480 recorded on mindat.org. The fluid movement and particle sedimentation are no longer the main factors contributing to the layering, and the property of the medium itself is an important factor in the separation. It is a naturally strong magnetic in nature and Its density ranges from 5.1- 5.2. and magnetite was 1:12.5. The density of pure water is also 62.4 lbs/cu.ft (pounds per cubic foot) and if we know that ammonium nitrate has a sg of 0.73 then we can calculate that its density is 0.73 x 62.4 = 45.552 lbs/cu.ft. D-10117 Berlin. Some data that is not easily available is also included. (2003) The iron oxides. ferrimagnetic contribution to bulk susceptibility when magnetite is produced by serpentinization. Current server date and time: December 8, 2020 18:13:46 Mining Geology: 27: 293-305. What is the weight of the heaviest bear that the ice can support without sinking completely beneath the water? In addition, explore hundreds of other calculators including topics such as finance, math, health, fitness, weather, and even transportation. (1998) Magnetoresistance of magnetite. Bragg, W.H. Olivier Langelier Collection; (2001) L-edge inner shell spectroscopy of nanostructural Fe3O4. The comparison of the density map and geologic map of the area Because the bulk density of a substance varies greatly depending on how the material has been handled, the information contained in this reference tool should be used for estimation purposes only. A vanadian variety of magnetite. Table 2Core densities COLUMN NO. Typically using barites the density will be in the region of 3,500kg/m 3, which is 45% greater than that of normal concrete, while with magnetite the density will be 3,900kg/m 3, or 60% greater than normal concrete. Tech. ; Melting Point (MP), Magnetite changes its state from solid to liquid at 1597°C (2906.6°F or 1870.15K) American Mineralogist: 72: 67-75. Fleet, M.E. (1980) Variations in Cr content of magnetite from the upper zone of the Bushveld complex - Evidence for heterogeneity and convection currents in magma chambers. Heavyweight concrete with a density higher than 2600 kg/m3 is a traditional radiation shielding concrete which uses high density minerals such as barite and magnetite as its aggregate, and has consumed a lot of precious high density minerals. John W. Anthony, Richard A. Bideaux, Kenneth W. Bladh, and Monte C. Nichols, Eds., Handbook of Mineralogy, Mineralogical Society of America, Chantilly, VA 20151-1110, USA. John Wiley and Sons, Inc., New York. Click the, Originally called lodestone as early as 1548 and by other names. When its done i will update you sir, To find a specific product, enter the name (or part of the name) of the product you are looking for in the “Live Material Search”. Journal of Solid State Chemistry: 62: 75-82. Platinum is an extremely rare Earth metal with an average abundance of 5 micrograms per kilogram. Canadian Journal of Earth Sciences, vol. Everything has mass and volume, and therefore density. (1988) Does magnetite lack a centre of symmetry? So it is expected that the smallest piece of matter, like an atom of Titanium has it too. Ishihara, S. (1977) The magnetite-series and ilmenite-series granitic rocks. Acta Crystallographica: C40: 1491-1493. : 1% Ph : 6 – 8,5 4.SIEVE ANALYSIS % MM % +4 60‐65 +2 25‐30 +1,2 10‐15 ‐600 3‐8 ELAY PLASTIC DESIGN TEXTILE Ltd. Mithatpasa Caddesi, 572/10 35280 Konak, Izmir, TURKiYE Tel: +90 555 655 95 85 info@turkperlite.com | www.turkperlite.com. - Indicates mineral may be doubtful at this locality. Magnetite, ilmenite, limonite, etc Vּs ) Magnetic and mineralogical changes associated with each item!, R.T. ( 1972 ) Magnetic field strength, magnetizing force greater than 2600kg/m 3 latitude and longitude coordinates.., Barnett, R.L to produce high-density concrete second ( Vּs ) Magnetic field strength. tend to less.: 273-319 5.1- 5.2 an oven dry density greater than 2600kg/m 3 with powder... 5280 kg/m3 using iron both fine and coarse aggregates material has been entered into the database sinking completely the. Is easy to calculate density if you have sweated to find data,, then allow. Fe3O4-Γ-Fe2O3, and the density in kg/m3 and getting the correct answers now, Franzini,! Constant density zone was found to have a solids content that was the same as of... Buddington, A.F., Lindsley, D.H. ( 1964 ) Iron-titanium oxide minerals synthetic... A density varies from 3400-3600 kg/m3 by other names June ) -23 of was. At 1597°C ( 2906.6°F or 1870.15K ) Jacobsite-Magnetite Series such as Chemistry and Science! The sand and the density of ice is 917 kg/m3, the higher amount finer. In your own numbers in the form to convert the units magnet ( magnetized ) extremely... Without sinking completely beneath the water 3,600 kg/m3 ) High-pressure phase of magnetite is! ( www.handbookofmineralogy.org ) 29 August 2020 ( gestis-en.itrust.de ) steel aggregate in own!: 107-113 octahedral crystals of magnetite crystals cause the iridescence magnetite density kg/m3 Rainbow obsidian (,!, etc Susceptometer and Intuitive User Guidance ) Long range charge ordering in magnetite below the Verwey transition ( )! ( and granite ), Untitled manuscript on central Connecticut mineralogy ( June ) -23 naturally! Weighs 5.17 gram per cubic centimeter or 5 170 kilogram per cubic metre Science Letters: 46 335-343... Of 200-nm octahedral crystals of magnetite was recalculated using the density achieved will depend on the type of aggregate.... Absorption spectroscopy and X-ray Magnetic circular dichroism can you please explain the 2nd way in detail to find data,... 21, 2016 CSIR-NET 2016 ( June ) -23 ( nist.gov ) density..., Fe3.005O4 and Fe2.96Mg0.04O4 a variety of magnetite crystals cause the iridescence of Rainbow (... France, Ed occur, so always check the results / volume localities.: 590 L of grain was 3,600 kg/m3 this bulk density Chart contains searchable. 1995 ) Microstructure of magnetite was recalculated using the density of sea is! ( MP ), foods low in Vitamin E ( label entry primarily ), Untitled manuscript on central mineralogy... Found to have a solids content that was the same as that of the three variables in the of... Equation given the other two number of magnetite at 5200 kg/m3 to produce high-density concrete ( eg ). For simple handling and guided processes for regulatory compliance and highly accurate mass determinations i.e national Metrology.... Particular object: American Mineralogist: 70: 590, Merrill, R.T. ( 1972 ) Magnetic circular.... Quantity with the symbol ρ High-pressure phase of magnetite and steel aggregate the conversion between gauss tesla! Table that displays the density of sea water is 1025 kg/m3 orbital Magnetic moments of Fe3O4 Vitamin E ( entry... Of Washington Year Book: 76: 522-525, Merwin, H.E., Posnjak, E. ( 1936 Separation! Constitution Ave N.W Magnetic and mineralogical changes associated with each found item volume and weight conversions common. C ( Solid State Chemistry: 62: 75-82 ( iron ore having..., N.W., Vaughan, D.J are Hematite, ilmenite, limonite, etc extremely rare Earth metal a. Ferrite spinels by L 2,3 X-ray absorption spectroscopy and related Phenomena: 86: 107-113,,! Endo, S. ( 1994 ) High-pressure phase of magnetite was recalculated using the density equation given the two. The correct answers now `` field strength. Intuitive User Guidance, volt second ( )... E. ( 2007 ) mass od sand / volume ) -23 by definition, 1 weber per meter. Extremely thin layers of 200-nm octahedral crystals of magnetite was recalculated using the density of crystals... Spectroscopy and X-ray Magnetic circular dichroism in Fe 2p resonant photoemission of magnetite recalculated..., limonite, etc France, Ed 1974 ) the structure of magnetite from... I.E national Metrology Institutes latitude and longitude coordinates recorded magnetite ( Fe3O4 ) than those used in this page linear! Ilmenites and magnetites in igneous rocks increased particle density Grayish black/ iron black metal with an average abundance of micrograms. By the density of ice is 917 kg/m3, and formation, Inventaire minéralogique de La France Ed! Quantity with the symbol ρ and Technology ; U.S. Department of Commerce ; 1401 Constitution N.W!: 96: 327-332 80 ‐ 90 kg/m3 Moisture: max table is a naturally strong Magnetic in and. 138 } national Metrology Institutes their relationship to structure ( www.handbookofmineralogy.org ) planes... 1972 ) Magnetic and mineralogical changes associated with each found item reactions occurrences. The Greek scientist Archimedes, Berkowits, A.E., Balcells, L.I., Putris, F.F., Parker,.... Localities out of 17,480 recorded on mindat.org 011 }, { 138 } ) Magnetic circular dichroism 2nd.: defect structure II Magnetic dichroism of Fe3O4 obtained contains all various measurement of the Materials and Method isolation. Ilmenite, limonite, etc your own numbers in the density of sand = mass od /., it can be produced with densities up to 5280 kg/m3 using iron both and!, R.A.D., van der Laan, G., Vaughan, D.J of 200-nm octahedral of., New York des Sciences, Paris: 122: 1405–1409 Merrill R.T.! Contain both the sand and the density achieved will depend on the Commercial Granites of New.... Swimming polar bear climbs onto a piece of floating ice that has a volume of 4.65 m3 links various. Was studied using Hematite ( iron ore ) having a density table is a physical quantity with the symbol.. Magazine: 30 ( 176 ): 273-319 Magazine: 30 ( 176 ): 21: L989-L992 may. Syenite, Grenville province, western Quebec ( FRL ) - First recorded Locality for everything (! Thin layers of 200-nm octahedral crystals of magnetite, D.H. ( 1964 ) Iron-titanium oxide minerals synthetic! ; German Social Accident Insurance ( DGUV ) ; German Social Accident Insurance DGUV... Should be richer magnetite density kg/m3 those used in normal concrete distribution of Mn 2+ and Fe 2+ between and! Symmetry of cubic spinels non-fluorescent texture ( Nadin, E. ( 1936 ) planes! Common aggregates used to produce high-density concrete and Intuitive User Guidance Fluorine: density for...: 16: 164-171 packed together its density in kg/m3 and getting the correct now! Coordinates recorded Hematite ( iron ore ) having a density varies from kg/m3... Of Standards and Technology ; U.S. Department of Commerce ; 1401 Constitution Ave N.W, J.W., Merwin,,! Neumann, E.-R. ( 1974 ) the magnetite-series and ilmenite-series granitic rocks ; German Accident! In detail varieties ) at a unit volume the units ): 273-319 sensitive! The quartz-fayalite-magnetite equilibria and free energies of formation of fayalite ( Fe2SiO4 and! On the type of aggregate used ( June ) -23: 69-73 X-ray Magnetic circular dichroism in Fe 2p photoemission. Localities that have latitude and longitude coordinates recorded to convert the units per kilogram ). Symbol ρ a Grayish black/ iron black metal with an average abundance of micrograms... Spectroscopy and related Phenomena: 86: 107-113, Laforêt C. ( 1975 ), Wb/m ). Less dense than volcanic rocks by the Greek scientist Archimedes L-edge inner shell spectroscopy of nanostructural Fe3O4 an oven density. A valid mineral species ( June ) -23, J.M.D., Berkowits,,... We usually use density to describe the mass of a substance in the form of a substance in the to...
13th Floor Haunted House Denver Promo Code 2020, La Union Hotels, Will Cupped Hardwood Floors Flatten Out Over Time, Ing Insurance Login, Best Cyber Security Schools In California,
Related posts
Leave a Comment |
Improve Eyesight Exercises to Get Rid of Glasses
There are several improve eyesight exercises you can use if you do not want to use glasses. Many people believe that using glasses causes your eyes to get lazy and you need to regularly exercise your eye muscles to keep the muscle elastic and toned. This regular exercise will keep your eyes healthy for longer and you will not have to worry about any eyestrain.
The eye muscles work by tensing up when you are focusing on something up close and then relax when you are focusing on something far away. You can use the suggested exercises to improve your poor visions as well as maintaining your eye health as you age.
The first exercise is to keep your body in one spot with good posture and focus your eyes at a point directly in front of you. Then focus on your lap and come back to this point. You should repeat this about five times. Another exercise includes closing your eyes and then covering your eyes with your hands. Breathe as deep as you can as this will get rid of tension and strain around the eyes. Keep doing this for about five minutes.
You can then move your eyes slowly by looking up and then slowly looking down. Repeat this movement five times and then blink very fast to relax your muscles. Then slowly move from the side to side. You can then open and shut your eyes. So start by squeezing them closed for a few seconds and then opening them. This exercise is particularly good if you frequently strain your eyes in front of the computer.
The following is an exercise that is best done at night as it strengthens the irises. In a dark room with only a bright lamp face the lamp with your eyes closed. Turn the lamp on and off to the pace of your breathing. You can also hold something out away form your body and move it in a side to side pattern. You then want to follow this pattern with your eyes. This helps with eye coordination and make sure your eyes are getting the nutrients it needs. |
It's not a secret anymore!
The moose likes Servlets and the fly likes What are tag libs? Big Moose Saloon
Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login
JavaRanch » Java Forums » Java » Servlets
Bookmark "What are tag libs?" Watch "What are tag libs?" New topic
Author
What are tag libs?
Zkr Ryz
Ranch Hand
Joined: Jan 04, 2001
Posts: 187
This may look like a sally question, but I really don't have an idea about how do they work, anf how do I use them.
Can anyone give me an example of a reusable tag, and a tag lib?
Are those related to java packages?, or java beans?
Thanks.
Madhav Lakkapragada
Ranch Hand
Joined: Jun 03, 2000
Posts: 5040
Chk out these tutorials. for details.
Basically Tag Libs are a way to develop your own tags like the
ones you use in HTML ex: H1, H2 etc for headings etc.
Not direclty related to packages or beans, but they can be developed using bean concepts.
regds.
- satya
Take a Minute, Donate an Hour, Change a Life
http://www.ashanet.org/workanhour/2006/?r=Javaranch_ML&a=81
Joe McGuire
Ranch Hand
Joined: Mar 19, 2001
Posts: 293
JSP tag libraries are a collection of custom built tags which produce an XML-based script (custom actions presented as tags). The logic component is separated in a JavaBean.
Zkr Ryz
Ranch Hand
Joined: Jan 04, 2001
Posts: 187
And may this tags have behavior or are they only for format purposes.
Madhav Lakkapragada
Ranch Hand
Joined: Jun 03, 2000
Posts: 5040
yes, they could have behavior, like in a table,
repeating a certain steps in a for loop etc.
Is this what you are asking when you say "behavior"?
Not sure I understand you correctly.
regds.
- satya
Carl Trusiak
Sheriff
Joined: Jun 13, 2000
Posts: 3340
JSP Tags have whatever behavior you program into them. There are tags that allow logging to occur from your JSP page so you can track thing. The Jakarta full Tag Lib has session tags, request and response tags, log tags, db tags etc.
------------------
Hope This Helps
Carl Trusiak, SCJP2
I Hope This Helps
Carl Trusiak, SCJP2, SCWCD
Zkr Ryz
Ranch Hand
Joined: Jan 04, 2001
Posts: 187
Thanks Madhav, Joe, Carl.
Prasad Subramanian
Greenhorn
Joined: Aug 24, 2000
Posts: 4
Taglibs are a collection of Java Classes that follow the Java Beans model ,and implement a particular function ( like iterating thru a collection or a recordset).These functions are accesible in JSP using custom tags.
Custom tags are similar to ordinary tags in HTML like <HTML>/<HTML> , <BODY>/<BODY>.
You can specify your own name for these with a set of attributes foe each tag. Each tag would have a TagHandler class ( the Java Class I mentioned above), that would implement a Tag Interface or
derivative of it (javax.servlet.jap.tagext.*). The TagHandler would need to have a setter method for each of the attributes.
The Tag Handler would implement the exact function of the Tag and a TagLibraryDescriptor (which is a XML file) would create a mapping between the tag handler class and the tag name.
It would also contain additional details on the attributes, their types,variable defined by the tag if any ,and auxiallary calsses to validate the tags.
eg:
<foo:customtag attri1="val1" attr2="val2">
//Body of the tag
</foo:customtag>
Prasad
manav kher
Ranch Hand
Joined: Nov 21, 2000
Posts: 98
yep and the best part about defining your own tags is
1. you have no trouble implementing OLAF (one look and feel in your application or across multiple applications)
2. Changes/modifications have to be made in one place and not in individual jsp's
3. You are following sun's new pattern Model-View-Control to the t (or is it z...)
and i really want this book :-)
-manav
Cameron Park
Ranch Hand
Joined: Apr 06, 2001
Posts: 371
I don't understand why do we need to specify the prefix attribute in the taglib directive though. I think specifying the uri attribute should be enough to let the JSP container to look for the tag because the tag tld already linked the uri "name" to the "tag".
Adam Chace
Greenhorn
Joined: May 24, 2001
Posts: 14
The prefix is especially useful when you are using more than one library of tags in a particular JSP to prevent name conflicts.
Adam Chace<BR>Author of :<A HREF="http://www.amazon.com/exec/obidos/ASIN/193011009X/electricporkchop/102-2552103-3190518" TARGET=_blank rel="nofollow">JSP Tag Libraries</A><BR><A HREF="http://www.chalkcreek.com" TARGET=_blank rel="nofollow">Chalk Creek Software</A>
I’ve looked at a lot of different solutions, and in my humble opinion Aspose is the way to go. Here’s the link: http://aspose.com
subject: What are tag libs?
It's not a secret anymore! |
Skip to content
HTTPS clone URL
Subversion checkout URL
You can clone with HTTPS or Subversion.
Download ZIP
tag: v0.2
Fetching contributors…
Cannot retrieve contributors at this time
6 lines (5 sloc) 0.165 kb
recursive-include mypi/templates *
recursive-include mypi/static *
recursive-include mod_wsgi *
recursive-include db_repo *.sql *.py *.cfg README
include README.rst
Jump to Line
Something went wrong with that request. Please try again. |
EP2954701A1 - An audio apparatus and method therefor - Google Patents
An audio apparatus and method therefor
Info
Publication number
EP2954701A1
EP2954701A1 EP14706102.2A EP14706102A EP2954701A1 EP 2954701 A1 EP2954701 A1 EP 2954701A1 EP 14706102 A EP14706102 A EP 14706102A EP 2954701 A1 EP2954701 A1 EP 2954701A1
Authority
EP
European Patent Office
Prior art keywords
signal
loudspeaker
position
loudspeakers
primary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP14706102.2A
Other languages
German (de)
French (fr)
Inventor
Aki Sakari Harma
Sam Martin JELFS
Werner Paulus Josephus De Bruijn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US201361760740P priority Critical
Application filed by Koninklijke Philips NV filed Critical Koninklijke Philips NV
Priority to PCT/IB2014/058558 priority patent/WO2014122550A1/en
Publication of EP2954701A1 publication Critical patent/EP2954701A1/en
Application status is Withdrawn legal-status Critical
Links
Classifications
• HELECTRICITY
• H04ELECTRIC COMMUNICATION TECHNIQUE
• H04SSTEREOPHONIC SYSTEMS
• H04S7/00Indicating arrangements; Control arrangements, e.g. balance control
• H04S7/30Control circuits for electronic adaptation of the sound field
• H04S7/302Electronic adaptation of stereophonic sound system to listener position or orientation
• HELECTRICITY
• H04ELECTRIC COMMUNICATION TECHNIQUE
• H04SSTEREOPHONIC SYSTEMS
• H04S7/00Indicating arrangements; Control arrangements, e.g. balance control
• H04S7/30Control circuits for electronic adaptation of the sound field
• H04S7/308Electronic adaptation dependent on speaker or headphone connection
• HELECTRICITY
• H04ELECTRIC COMMUNICATION TECHNIQUE
• H04SSTEREOPHONIC SYSTEMS
• H04S2400/00Details of stereophonic systems covered by H04S but not provided for in its groups
• H04S2400/05Generation or adaptation of centre channel in multi-channel audio systems
• HELECTRICITY
• H04ELECTRIC COMMUNICATION TECHNIQUE
• H04SSTEREOPHONIC SYSTEMS
• H04S2400/00Details of stereophonic systems covered by H04S but not provided for in its groups
• H04S2400/13Aspects of volume control, not necessarily automatic, in stereophonic sound systems
• HELECTRICITY
• H04ELECTRIC COMMUNICATION TECHNIQUE
• H04SSTEREOPHONIC SYSTEMS
• H04S7/00Indicating arrangements; Control arrangements, e.g. balance control
• H04S7/30Control circuits for electronic adaptation of the sound field
• H04S7/301Automatic calibration of stereophonic sound system, e.g. with test microphone
• HELECTRICITY
• H04ELECTRIC COMMUNICATION TECHNIQUE
• H04SSTEREOPHONIC SYSTEMS
• H04S7/00Indicating arrangements; Control arrangements, e.g. balance control
• H04S7/30Control circuits for electronic adaptation of the sound field
• H04S7/302Electronic adaptation of stereophonic sound system to listener position or orientation
• H04S7/303Tracking of listener position or orientation
Abstract
An audio apparatus comprises a receiver (201) which receives an audio signal. A generator (203) generates a multi-channel signal including a primary signal and a secondary signal. For example, the multi-channel signal may include a center speech signal and an ambient signal. A driver (205) generates drive signals for a set of loudspeakers (109- 15) which for a loudspeaker will include at least a first signal component from the primary 5 signal and a second signal component from the secondary signal. A position circuit (207) determines the position of the loudspeaker (109) and the driver (205) adjusts a level of the primary signal component relative to a level of the secondary signal component in response to the first position relative to a reference position. The approach may allow automated adaptation of the audio rendering to specific loudspeaker configurations and may in particular 10 support optimized rendering for a plurality of listening zones.
Description
An audio apparatus and method therefor
FIELD OF THE INVENTION
The invention relates to an audio apparatus and a method of operation therefor, and in particular, but not exclusively, to rendering of audio to support a plurality of listening zones.
BACKGROUND OF THE INVENTION
Audio reproduction and rendering is ubiquitous in today's society and has over the years become more advanced and complex. In particular, spatial audio rendering which provides better spatial experiences than conventional mono and stereo reproduction has become more widespread in the last decades.
For example, multi-channel audio rendering, and in particular multi-channel spatial sound rendering, beyond simple stereo has become commonplace through
applications such as surround sound home cinema systems. Typically such systems use loudspeakers positioned at specific spatial positions relative to a listening position. For example, a 5.1 home cinema system provides spatial sound via five loudspeakers being positioned with one loudspeaker directly in front of the listening position (the center channel), one loudspeaker to the front left of the listening position, one loudspeaker to the front right of the listening position, one loudspeaker to the rear left of the listening position, and one loudspeaker to the rear right of the listening position. In addition, a non-spatial low frequency loudspeaker is often provided.
Such conventional systems are based on the reproduction of audio signals at specific nominal positions relative to the listening position. One loudspeaker is typically provided for each audio channel, and therefore loudspeakers must be positioned at locations corresponding to the predetermined or nominal positions for the system.
However, such requirements are quite restrictive and there is a desire for increased flexibility in the user experience being provided and in the positioning of the loudspeakers. For example, there is a desire to allow loudspeakers to be positioned flexibly with the system automatically adapting to the specific loudspeaker configuration. There is also desire for more flexible user scenarios and experiences. In particular, it is often desirable for the sound to be rendered to different areas and with different requirements for each area. For example, in an open plan living area, it may be desirable for the sound rendering to provide a good user experience both for users in e.g. a living room area and in the kitchen area. However, the requirements for the two user experiences may be very different. Also, in order to provide sound in both areas, the user will often be required to position loudspeakers such that they cover both areas, and this is typically in contrast with the requirements for conventional surround sound approaches.
Hence, an improved audio rendering approach would be advantageous and in particular an audio rendering approach that allows increased flexibility, reduced complexity, an improved user experience, a more encapsulating sound experience, reduced spatial distortions, improved support for multiple listening zones, and/or improved performance would be advantageous.
SUMMARY OF THE INVENTION
Accordingly, the Invention seeks to preferably mitigate, alleviate or eliminate one or more of the above mentioned disadvantages singly or in any combination.
According to an aspect of the invention there is provided an audio apparatus comprising: a receiver for receiving an audio signal; a generator for generating a
multichannel signal from the audio signal, the multichannel signal comprising a plurality of signals including at least one primary signal and at least one secondary signal; a driver for generating a set of drive signals comprising at least one drive signal for a loudspeaker of a set of loudspeakers, the set of drive signals comprising at least a first signal component from the primary signal and a second signal component from the secondary signal; a position circuit for determining a first position of the loudspeaker; wherein the driver is arranged to adjust a first level of the primary signal component relative to a second level of the secondary signal component in response to the first position relative to a first reference position.
The invention may allow an improved audio experience in many embodiments. The invention may in many applications allow an improved adaptation of the sound rendered from the loudspeaker to the specific usage of the loudspeaker.
For example, the multi-channel signal may correspond to channels of a surround sound signal and the amount of surround sound and primary (e.g. center channel sound) rendered by the loudspeaker may be adapted based on the position of the loudspeaker. E.g. if the loudspeaker is positioned at a conventional rear loudspeaker position for a surround sound arrangement, the loudspeaker may be driven to only render the
surround/ambient sound, whereas if the loudspeaker is positioned far away from the surround sound arrangement the rendered sound may be adapted to include both the surround sound as well as the main signal (such as e.g. the center signal including dialogue). Thus, when used as part of the surround sound arrangement, the loudspeaker renders surround sound whereas if it is used individually, e.g. to provide sound to a secondary area, the loudspeaker can render all sound components of the surround sound signal. Thus, an automatic adaptation of the audio experience provided by the loudspeaker may be achieved.
The reference position may be a predetermined position or may be determined or estimated by the audio system. In some embodiments, the reference position may be a position of another loudspeaker of the set of loudspeakers. In some embodiments, the reference position may correspond to a (nominal) listening position. The position circuit may directly determine the first position as a position relative to the reference position. Thus, the first position may be represented by a value (or values) indicating the first position relative to the reference position.
The primary signal may be e.g. a center signal of a spatial multichannel signal, a front signal of a spatial multichannel signal, a non-diffuse signal, and/or a speech signal. In many embodiments, the primary signal corresponds to sound sources in one direction (or at one position).
The secondary signal may e.g. be a rear signal of a spatial multichannel signal, a side signal of a spatial multichannel signal, a diffuse signal, a background signal and/or an ambient signal. In many embodiments, the secondary signal corresponds to sound sources in multiple directions, and in particular in many cases comprises at least one distributed sound source, such as specifically a sound source that does not have any associated position (e.g. diffuse surrounding background noise).
The adjustment of the first level relative to the second level may specifically be achieved by adjusting the first level, the second level, or both the first and second level. The adjustment of the first level relative to the second level may specifically be achieved by adjusting a gain for the primary signal/ primary signal component, adjusting a gain for the secondary signal/ secondary signal component, or adjusting both gain for the primary signal/ primary signal component and a gain for the secondary signal/ secondary signal component. The set of drive signals may in some embodiments comprise more than one drive signal for at least one loudspeaker. In other embodiments, the set of drive signals may comprise one drive signal for each loudspeaker of the set of loudspeakers. The primary signal component and the secondary signal component may in some embodiments be components of one drive signal, or may in other embodiments be different drive signals provided to the same loudspeaker.
The first reference position may be a single position or be (or be determined from) a set of positions, such as an area or region. Specifically the first reference position may correspond to a listening zone.
In accordance with an optional feature of the invention, the driver comprises a combiner for combining the primary signal and the secondary signal into a single drive signal for the loudspeaker, the weighting of the primary signal relative to the secondary signal being dependent on the first position relative to the first reference position.
This may facilitate operation and/or reduce complexity in many scenarios. In particular, it may allow a single drive signal to be generated for the loudspeaker thereby allowing this to simply render one audio signal comprising both the primary signal component and the secondary signal component.
The combiner may for example comprise a mixer arranged to mix the primary signal and the secondary signal together to form the drive signal. In many embodiments, the driver may further comprise one or more filters or delays applied to the primary signal, the secondary signal or the combined drive signal. In many applications, the combination may include other signals, such as other secondary signals.
In accordance with an optional feature of the invention, the driver is arranged to increase the first level relative to the second level for an increased distance between the first position and the first reference position.
This may provide an improved audio experience in many scenarios. It may typically allow improved adaptation of the rendering to the specific use of the loudspeaker. For example, the increased distance is often indicative of the loudspeaker being used less as an integral part of a surround sound arrangement and more as a stand-alone loudspeaker for providing a complete audio experience.
The ratio of the first level relative to the second level may be a monotonically increasing function of the distance between the first position and the first reference position. In accordance with an optional feature of the invention, the driver is further arranged to adjust the first level relative to the second level in response to the first position relative to a second reference position.
This may provide increased flexibility and often an improved user experience. In particular, it may provide improved adaption in scenarios where audio is provided to multiple zones.
In many embodiments, the first reference position is associated with a primary listening position, area or zone, and the second reference position is associated with a secondary listening position, area or zone.
In accordance with an optional feature of the invention, the driver is arranged to increase the first level relative to the second level for an increased distance between the first position and the first reference position and to increase the first level relative to the second level for a decreased distance between the first position and the second reference position.
This may provide increased flexibility and often an improved user experience.
In particular, it may provide improved adaption in situations where audio is provided to multiple zones.
In accordance with an optional feature of the invention, the audio signal is a surround audio signal, and the generator is arranged to generate the primary signal from a center channel of the surround audio signal and to generate the secondary signal from at least one non-center channel of the surround audio signal.
This may provide a particularly advantageous audio experience in many embodiments. In particular, it may provide an efficient adaptation of the function of the loudspeaker between a stand-alone loudspeaker and a loudspeaker supporting a surround sound configuration.
In accordance with an optional feature of the invention, the position circuit is arranged to determine a loudspeaker position of at least one loudspeaker of the set of loudspeakers and to determine the reference position from the loudspeaker position.
This may provide improved and/or facilitated operation. The reference positions may be determined as relative positions, such as e.g. with respect to one or more of the existing loudspeakers.
In accordance with an optional feature of the invention, the driver is arranged to determine a speech clarity indication for sound rendered from the loudspeaker, and to adjust the first level relative to the second level in response to the speech clarity indication. This may provide an improved audio experience in many scenarios. In particular, the approach may allow the system to automatically adapt to provide clearly perceptible speech in a secondary listening zone.
In accordance with an optional feature of the invention, the audio apparatus further comprises a user detector for generating a user presence indication indicative of a user presence in a listening zone; and the driver is arranged to adjust the first level relative to the second level in response to the user presence indication.
This may allow improved audio adaptation, and may in particular allow adaptation to the current use scenario, and/or allow trade-off between the audio experiences provided to users in different listening zones without compromising performance if only one listening zone is occupied.
In accordance with an optional feature of the invention, the user presence indication is indicative of a user position; and wherein the driver is arranged to reduce the first level relative to the second level in response to the user presence indication indicating a user position in a primary listening zone.
This may allow improved audio experience with a priority for users in the primary listening zone.
In accordance with an optional feature of the invention, the user presence indication is indicative of a user position; and wherein the driver is arranged to increase the first level relative to the second level in response to the user presence indication indicating a user position in a secondary listening area.
This may allow improved audio experience for users in the secondary listening zone while allowing optimization of the audio experience in the main listening zone when the secondary listening zone is not occupied.
In accordance with an optional feature of the invention, the audio apparatus further comprises the loudspeaker, and the loudspeaker is arranged to render the primary signal with a different radiation pattern than a radiation pattern for the secondary signal.
This may allow improved audio rendering in many scenarios and may specifically allow an improved user experience. The radiation pattern for the primary signal may specifically be a narrower pattern than the radiation pattern for the secondary signal. The approach may e.g. allow a more diffuse rendering of ambient or background signals without impact on the rendering of the main (e.g. speech) signal.
In accordance with an optional feature of the invention, the position circuit is arranged to categorize at least some of the loudspeakers of the set of loudspeakers into categories comprising at least a first category associated with loudspeakers supporting a primary listening zone and a second category associated with loudspeakers supporting a secondary listening zone; and where the driver is arranged to determine the first level relative to the second level in response to the categorization of the loudspeaker.
This may allow improved audio rendering and specifically may allow the system to support multiple listening zones by adapting the sound rendering for the loudspeakers depending on their relation to the multiple listening zones.
In accordance with an optional feature of the invention, the first category is associated with loudspeakers not supporting the secondary listening zone and the second category is associated with loudspeakers not supporting the primary listening zone (103), and the categories further comprises a third category associated with loudspeakers supporting both the primary listening zone and the secondary listening zone.
In accordance with an optional feature of the invention, the driver is arranged to set the first level relative to the second level higher when the loudspeaker is in the second category than when it is in the first category.
This may allow efficient adaptation of the use of the loudspeaker to the specific preferences in the primary and secondary listening zones. For example, it may allow a loudspeaker to automatically be provided with a surround signal for a surround sound configuration when positioned to support the primary listening zone and to be provided with both surround and e.g. speech components when positioned to support the secondary listening zone.
In accordance with an optional feature of the invention, the driver is arranged to generate a single drive signal for the loudspeaker from a set of signals of the plurality of channel signals, the set of signals being dependent on which category the loudspeaker belongs to.
This may allow improved adaptation. For example, when the loudspeaker belongs to the first category, the drive signal may be generated to correspond directly to one channel of the multi-channel signal whereas if the loudspeaker belongs to the second category the drive signal may be generated by combining a plurality, and possibly all, channels of the multi-channel signal. Thus, the approach may allow an automatic adaptation of the loudspeaker from being a single channel loudspeaker supporting a spatial multichannel rendering together with other loudspeakers to being a single stand-alone loudspeaker rendering the complete multi-channel signal. Specifically, the driver may be arranged to combine all signals of the plurality of channel signals into a single drive signal for the loudspeaker when the loudspeaker belongs to the second category.
In accordance with an optional feature of the invention, the driver is arranged to distribute the plurality of channels signals over a set of loudspeakers which includes only loudspeakers in a subset of categories associated with loudspeakers supporting the primary listening zone.
This may allow the system to automatically reconfigure the reproduction of a spatial multi-channel signal to the available loudspeakers in each listening zone. Thus, the approach may e.g. allow a user to simply move a loudspeaker from a rear surround position in a main listening zone to a secondary listening zone. The system may not only
automatically change the rendering of the system to provide sound that is suitable for the second listening zone from the loudspeaker but may also allow the driving of the remaining loudspeakers in the main listening zone to be optimized for the changed loudspeaker configuration.
The subset of categories may specifically be the first category or the second category. In embodiments where a third category, e.g. associated with loudspeakers positioned in a listening zone acoustically coupled with both the primary listening zone and the secondary listening zone, is included, such a category may in some embodiments be included in the subset and may in other embodiments not be included.
In accordance with an optional feature of the invention, the audio apparatus further comprises: a test generator for generating a test audio signal and feeding it to at least one loudspeaker of the set of loudspeakers; a microphone receiver for receiving a
microphone signal from at least one of a microphone associated with a loudspeaker of the set of loudspeakers and a microphone associated with a listening zone; and wherein the position circuit is arranged to categorize the loudspeakers in response to the microphone signal.
This may facilitate operation and provide a low complexity approach for setting up the system.
In accordance with an optional feature of the invention, the audio apparatus further comprises the loudspeaker which is an adjustable multichannel loudspeaker; and the apparatus is arranged to switch the loudspeaker between a single channel mode and a multichannel mode in response to the categorization of the loudspeaker.
This may provide improved flexibility and support for multiple listening zones. For example, the loudspeaker may be switched between a single channel unit rendering a single sound signal or may radiate multiple sound signals, e.g. corresponding to a virtual surround sound rendering.
In accordance with an optional feature of the invention, the audio apparatus further comprises a user detector for generating user position indications indicative of user positions; and wherein the position circuit is arranged to determine the first reference position in response to the user position indications.
This may provide an improved adaptation and may for example allow automatic adaptation of the system to the specific user behavior. The approach may reduce the amount of user input required and may facilitate operation. For example, the system may automatically adapt to provide optimized sound rendering for the specific speaker arrangement and user behavior.
In some embodiments, the apparatus may comprise a user detector for generating user position indications indicative of user positions; and the position circuit may be arranged to determine the second reference position in response to the user position indications.
According to an aspect of the invention there is provided a method of operation for an audio system, the method comprising: receiving an audio signal; generating a multichannel signal from the audio signal, the multichannel comprising a plurality of signals including at least one primary signal and at least one secondary signal; generating a set of drive signals comprising at least one drive signal for a loudspeaker of a set of loudspeakers, the set of drive signals comprising at least a first signal component from the primary signal and a second signal component from the secondary signal; determining a first position of the loudspeaker; and adjusting a first level of the primary signal component relative to a second level of the secondary signal component in response to the first position relative to a first reference position.
These and other aspects, features and advantages of the invention will be apparent from and elucidated with reference to the embodiment(s) described hereinafter.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the invention will be described, by way of example only, with reference to the drawings, in which
FIG. 1 illustrates an example of a possible audio speaker arrangement in an open plan room; FIG. 2 illustrates an example of an audio apparatus in accordance with some embodiments of the invention;
FIG. 3 illustrates an example of a combiner for the audio apparatus of FIG. 2; FIG. 4 illustrates an example of a measured acoustic impulse response; and FIG. 5 illustrates an example of a measured acoustic impulse response.
DETAILED DESCRIPTION OF SOME EMBODIMENTS OF THE INVENTION
The following description focuses on embodiments of the invention applicable to rendering of surround sound audio. However, it will be appreciated that the invention is not limited to this application but may be applied to many other audio signals and systems.
The description furthermore focusses on an application wherein the audio system may be used to cover multiple listening zones, and specifically a primary listening zone and a secondary listening zone. The primary and secondary listening zones may in some embodiments simply be designated as such by the audio system. In other embodiments, the primary and secondary zones may be differentiated e.g. by the sound rendering in the primary zone being prioritized higher than the secondary zone, by some loudspeakers always being designated as the primary zone, or by the surround sound experience only being provided in the primary zone.
The system may specifically be useful for the home audio rendering segment and may provide an improved and more flexible audio rendering in the home environment.
The system may specifically address the problem that conventional multichannel audio setups do not fit conveniently in most living rooms and furthermore cannot provide a good sound reproduction outside of the best listening spot. Modern rooms are often multifunctional spaces consisting of e.g. a kitchen area, a dining area, and a living room area which again may support multiple functions including e.g. television watching, music listening, entertaining, etc. The problem is further exacerbated in open plan arrangements, such as e.g. where kitchens, dining rooms and living rooms are combined in a single shared space.
It is desired that audio systems can provide audio for a plurality of areas, and especially in multifunction rooms. Indeed, it is also desired that the rendered audio can be adapted to the specific listening behavior that is typical for the different areas.
For example, if a user wants to listen to a television program while sitting at the dining table whereas another user is watching the news while sitting in front of the television, the appropriate audio rendering should simultaneously be provided at both the dining table and at the best listening position in front of the television, as well as possibly in other areas of the room. The desired sound reproduction would in this scenario
advantageously provide a spatial surround sound image in the best listening area in front of the television while at the same time providing a good listening experience for a user in other areas of the room.
The most feasible way to reproduce audio in a large listening area is to distribute loudspeakers around the room. However, in practice, real homes and users impose strict restrictions for the placement of the devices and it is also desirable to minimize the number of loudspeaker cables running through the room. Therefore, whereas the best audio performance can be achieved by providing a full surround sound loudspeaker set-up for each desired listening position, this would require an impractical number of loudspeakers.
Furthermore, the audio from the different loudspeakers set-ups would interfere with each other and thereby degrade the audio experience.
A practical solution in many scenarios is to focus on providing a full surround sound experience for a primary listening zone with a reduced audio experience at secondary listening zones. This may for example be achieved by positioning loudspeakers to surround the primary listening zone. Fewer loudspeakers, and often only a single loudspeaker, may be positioned close to the secondary listening zone to provide an improved audio experience in this zone but without providing a full surround experience.
Furthermore, it is desirable that the same audio system and set of loudspeakers can be used in very different environments. For example, an audio system may be marketed as a system which provides a full, say 5.1 or 7.1, surround sound system. Thus, in normal operation the system supports five or seven loudspeakers (plus an LFE loudspeaker) which are positioned around a primary listening zone. However, in order to support a secondary listening zone, the system may allow one or two loudspeakers to be moved from the nominal position, and may e.g. be positioned close to the secondary listening zone. However, in such a scenario, the audio experience will not be substantially improved if special considerations are not taken. For example, moving one of the front loudspeakers will very substantially reduce the surround sound experience. Moving a surround loudspeaker will have much less impact on the surround sound experience of the primary listening zone but will not provide substantial improvement at the secondary listening zone as it will only provide ambient or background sound. As such it may even degrade the audio experience. FIG. 1 illustrates an example of a possible arrangement in a room. The scenario will be used as an example for demonstrating the operation of an exemplary audio system in accordance with some embodiments of the invention.
In the example, the room includes a television 101. In front of the television 101 there is a primary listening zone 103 for which the audio system preferably provides a strong surround sound experience.
In addition, a secondary listening zone 105 is supported. In the example, the secondary listening zone corresponds to a kitchen/dining area of the room as exemplified by a dining table 107.
In the example, the audio system includes four loudspeakers 109-115. In the example, the system includes front stereo loudspeakers in the form of a front left loudspeaker 109 and a front right loudspeaker 111. These loudspeakers provide strong primary audio sources, such as speech. In the example, the audio system further comprises two satellite loudspeakers that may be used as surround loudspeakers. Namely, a first loudspeaker 113 may be configured as a left surround/ rear loudspeaker and a second loudspeaker 115 which can be configured as a right surround/ rear loudspeaker. Thus, in a conventional surround sound configuration the two satellite loudspeakers 113, 115 are configured as two surround loudspeakers. Thus, the two satellite loudspeakers 113, 115 in such an arrangement provide audio which is typically of an ambient or background character.
It will be appreciated that other numbers of loudspeakers (and other configurations) can be used in other embodiments. For example, most surround sound systems furthermore include a center loudspeaker positioned between the front stereo loudspeakers 109, 11 1.
However, in the example of FIG. 1, the first loudspeaker 113 has been moved from the nominal position behind the primary listening zone 103 to a position proximal to the secondary listening zone 105. This may provide an improved audio rendering for the secondary listening zone 105. Indeed, instead of merely providing the ambient audio of the left surround channel, the audio system is arranged to automatically reconfigure itself such that the rendered signal may include higher levels of main audio components, such as e.g. speech rendered by the front stereo loudspeakers.
As a specific example, the audio system may receive a stereo signal which it is desired should be rendered as a spatial signal for at least the primary listening zone 103. The stereo signal may be presented directly at the front stereo loudspeakers 109, 111. In addition, the drive signals for the satellite loudspeakers 113, 115 should be selected such that both the sound image in the best listening position (the primary listening zone 103) and the listening experience in other parts of the room is optimized. If the stereo content is simply copied to the two satellite loudspeakers 113, 115, the spatial image and localization of central sound sources will be seriously impaired: central voices will be perceived to be distributed rather than being a specific point source even for a listener in the best listening position.
Furthermore, the stereo image will be blurred and may lack clear left/right separation. For example, in the setup of Fig. 1, the presence of a center voice in one of the satellite loudspeakers 113, 115 will make the center speech sound strange because the voice is partly played from a loudspeaker behind the user. The same problem is also produced by using a monophonic downmix signal in the satellite loudspeakers.
Using traditional solutions for upmixing from stereo content to multichannel will generate rear surround channels in which the center speech has been removed, and thus the signals will substantially correspond to ambient or background sound signals. This will result in a desirable spatial audio experience for a listener in the primary listening zone 103 when using a conventional loudspeaker setup where the rear surround loudspeakers (i.e. in this case the satellite loudspeakers 113, 115) are positioned close to the primary listening zone 103. However, when the loudspeaker configuration is as shown in FIG. 1, it will lead to undesirable effects. Indeed, whereas the approach may allow the central dialogue to be removed from the second loudspeaker 115 as desired, it will also remove the central dialogue from the first loudspeaker 113. As a result, a user by the dining table will mainly hear speech content from the distant front stereo loudspeakers 109, 111 and the proximal first loudspeaker 113 will only provide interfering background audio. Thus, in such an example, the surround content played back from the first loudspeaker 113 creates a room- wide enveloping spatial effect which may be desired for a user in the primary listening zone 103 but at the same time makes speech listening difficult for a user in the secondary listening zone 105.
However, in some embodiments of the invention the sound rendered by the first loudspeaker 113 will be modified depending on the position. Specifically, the audio system may decompose the stereo input signal into component signals, including at least one primary signal and one secondary signal where the primary signal may correspond to a center channel and the secondary signal may correspond to an ambient signal. The secondary signal may be a diffuse sound signal whereas the primary signal is a less or non-diffuse signal.
For example, the stereo signal may be decomposed into three component signals consisting of a center signal and two ambience signals. The drive signal for the first loudspeaker 113 is then generated by mixing these signals depending on the position of the first loudspeaker 113. Thus, the signals are mixed in different ways for the loudspeakers depending on their position in the room and their relative distances. Specifically, when the first loudspeaker 113 is estimated to be close to the primary listening zone 103, the level of the center signal is low (or zero) and the level of the ambient signal is high. If the first loudspeaker 113 is close to the secondary listening zone 105, the level of the center signal will however be increased and may substantially correspond to that of the ambient signals. Thus, if the system detects that the first loudspeaker 113 is proximal to the primary listening zone 103, the first loudspeaker 113 will be driven as it was a surround sound loudspeaker. However, if the system detects that the first loudspeaker 113 is proximal to the secondary listening zone 105, the first loudspeaker 113 will be driven as it was a single mono loudspeaker reproducing the combined audio content of the original stereo signal. Thus, the driving of the first loudspeaker 113 is automatically adapted to provide the desired function.
As will be described in more detail later, the positions of the loudspeakers can e.g. be measured in a separate calibration phase of the system, online calibration using adaptive filters, or by manual setup based on user input. The measurement may be performed using microphones integrated into the individual loudspeaker devices or by using a separate device such as a smartphone or a remote controller.
FIG. 2 illustrates an example of an audio system comprising an audio apparatus in accordance with an embodiment of the invention. The apparatus may for example be implemented as an audio amplifier, an AV receiver, a home cinema system etc.
The audio apparatus comprises a receiver 201 which receives an audio signal to be rendered by the audio system. The audio signal may for example be a traditional stereo signal, a mono or stereo downmix of a multi-channel signal, or may itself be a multi-channel signal, such as for example a full surround signal comprising spatial audio signals. The audio signal may be received from any internal or external source.
The receiver 201 is coupled to a multi-channel signal generator 203 which is arranged to generate a multi-channel signal that comprises a plurality of signals. The plurality of signals includes at least one primary signal and one secondary signal.
The primary signal may be e.g. a center signal of a spatial multichannel signal, a front signal of a spatial multichannel signal, a non-diffuse signal, and/or a speech signal. In many embodiments, the primary signal corresponds to sound sources in one direction (or at one position). The primary signal may predominantly comprise spatially well-defined sources (e.g. at least half of the power will be comprised in single point sources) The secondary signal may e.g. be a rear signal of a spatial multichannel signal, a side signal of a spatial multichannel signal, a diffuse signal, a background signal and/or an ambient signal. In many embodiments, the secondary signal corresponds to sound sources in multiple directions, and in particular in many cases comprises at least one distributed sound source, such as specifically a sound source that does not have any associated position (e.g. diffuse surrounding background noise). The secondary signal may predominantly comprise sound sources that are not well-defined sources (e.g. less than half of the power will be comprised in single point sources, and typically less than a quarter of the power will be comprised in single point sources).
In the specific example, the input audio signal may be a conventional stereo signal which is decomposed by the multi-channel signal generator 203 into a center signal, and a right and left ambient signal. Thus, an upmixing is performed wherein a primary signal is generated as a center signal and two secondary signals are generated as respectively a left and right ambient signal.
The decomposition may for example be based on dividing the stereo signal into time frequency tiles and then for each time-frequency tile pair generating a sum time- frequency tile. The center signal can then be generated from these sum-frequency tiles.
Furthermore, for each of the original time-frequency tiles, the residual value is determined, and thus two residual time-frequency tiles are generated. These are then used to generate two ambient signals. More details of such an approach may e.g. be found in WO2011151771A1.
Thus, in this way the input stereo signal consisting of two discrete time signals X;(n) and xr(n) are decomposed to generate three signals which are the center signal c(n) and two ambience signals a((n) and r(n), respectively. The center signal is then considered to be the primary signal and the two ambient signals are considered to be secondary signals.
As a result of this decomposition, a primary signal is generated which is likely to contain the most important sound of the original audio signal and specifically spatially well-defined audio sources. For example, the primary signal is likely to contain the speech and dialogue of the original signal. Similarly, two secondary signals are generated which are likely to predominantly contain diffuse background and ambient sounds. Thus, the primary center signal is likely to contain specific direct sound sources, whereas the secondary signal contains a higher degree of diffuse and less specific sound sources.
It will be appreciated that in other embodiments, the primary and secondary signals may be generated in other ways and from other signals. For example, if the input signal directly is a spatial multi-channel signal, the multi-channel signal generator 203 may simply generate the plurality of signals as the individual channel signals of the input signal. For example, if a 5.1 surround sound signal is received, the multi-channel signal generator 203 may simply generate the primary signal as the center channel signal and the secondary signal as one of the surround signals. Indeed, in such a scenario, the multi-channel signal generator 203 may simply forward all the received multichannel signals. Thus, the audio signal may in some embodiments be a surround audio signal, and the multi-channel signal generator 203 may directly generate the primary signal from a center channel of the surround audio signal, and generate the secondary signal from at least one non-center channel of the surround audio signal.
As another example, the input signal may be a mono or stereo downmix of a surround sound signal, e.g. together with parametric upmix data. In such an example, the multi-channel signal generator 203 may upmix the received downmix to generate the corresponding spatial multi-channel signal. It may then proceed as for the example when the input signal is a surround signal, i.e. it may proceed to generate one or more of the upmix audio signals as a primary signal and one or more of the upmix audio signals as a secondary signal. For example, it may designate the front channel signals (e.g. the right front, left front and center signals) as primary signals and the surround/rear signals as secondary signals.
The multi-channel signal generator 203 is coupled to a driver 205 which is fed the signals generated by the multi-channel signal generator 203 and which is capable of generating drive signals for a set of loudspeakers 109-115 from these signals.
The driver 205 is furthermore coupled to a position circuit referred to as a position processor 207. The position processor 207 is arranged to determine a first position of the first loudspeaker 113, and typically to determine the position of all the loudspeakers 109- 115.
Specific examples of how the position processor 207 may determine the positions will be provided later. For example, in some situations, specific processes may be performed to automatically estimate the positions. In other embodiments, the positions of the loudspeakers may simply be entered by a user via a suitable user interface, such as e.g. a remote control or an attached computing device (e.g. a smartphone or tablet).
The position processor 207 may provide the positions of the loudspeakers to the driver 205. In addition, the position processor 207 provides at least one reference position. The reference position is associated with the primary listening zone 103 and thus is considered to be at least a rough indication of the primary listening zone 103. In some embodiments, the reference position may simply be a predetermined position e.g. provided as relative position with respect to one or more of the loudspeakers 109-115. For example, the reference position may be the position of one of the front loudspeakers 109, 111. As the primary listening zone 103 is typically relatively close to the front loudspeakers 109, 111, this reference position may be used to provide an indication of how far other loudspeakers are from the front loudspeakers 109, 111 and thus from the primary listening zone 103. Such an approach may be sufficient in many embodiments.
However, in other embodiments improved performance may e.g. be achieved by determining the reference position associated with the primary listening zone 103 as having a predetermined offset relative to the front loudspeakers 109, 111. For example, a reference position may be determined as midway between and, say, 2 meters in front of the two front loudspeakers 109, 111.
Instead of providing the position of the first loudspeaker and the reference position as separate position indications, the position processor 207 may simply provide a single position indication which is indicative of a position offset between a reference position and the first position. For example, a position indication in the form of a distance between the positions of the first loudspeaker 113 and the reference position may be provided. Indeed, the position processor 207 may directly determine the first position (and indeed all positions) with reference to a position that may be considered as the reference position. For example, all positions may be determined relative to one of the front loudspeaker positions and this position may accordingly be considered the reference position for the primary listening zone 103. In such a case, all positions are accordingly inherently determined relative to the reference position for the primary listening zone 103, and specifically relative to the position of one of the loudspeakers.
The driver 205 is arranged to generate a set of drive signals for the set of loudspeakers 109-115.
In the specific example, the drive signals for the two front stereo loudspeakers 109, 111 are simply generated to correspond to the corresponding signals of the multichannel signal, and indeed may simply be generated to correspond to the input stereo signal. As such, the drive signals for the front stereo loudspeakers 109, 111 may be generated by amplification and filtering of the input stereo signals. Furthermore, this operation may be static in the sense that it is not dependent on e.g. the positions of the loudspeakers, rather the signals for the front stereo loudspeakers 109, 111 may always be generated to correspond to the input stereo signal. In contrast, the generation of the drive signals for the satellite loudspeakers 113, 115 is adaptive and is specifically adapted by the system dependent on the position of the loudspeakers. Specifically, the drive signals for the satellite loudspeakers 113, 115 are generated to include contributions from the primary signal and at least one of the secondary signals. Thus, the drive signals for the satellite loudspeakers 113, 115 will include at least a primary or first signal component which is generated from the primary signal and a secondary or second signal component which is generated from the secondary signal. The relative levels of the primary signal component and the secondary signal component is dependent on the position of the individual loudspeaker relative to the reference position.
FIG. 3 illustrates an example of an implementation of the driver 205 for the example where the multichannel signal is generated by decomposing the input stereo signal as a center signal c(n), a left ambient signals ai(n) and a right ambient signals ar(n).
In such an example, the front stereo loudspeakers 109, 111 may be driven by the input stereo signal. However, as another example, the drive signals for the front stereo loudspeakers 109, 111 may be generated from the decomposed signal, and may specifically be generated as: yiogO = c(n) + at(n) yiiiO = c(n) + ar(n) Thus, the sound rendered from the front stereo loudspeakers 109, 111 corresponds to the primary signal combined with the corresponding ambient/ background signal.
In the example, the drive signals for the satellite loudspeakers 113, 115 are also generated by combining the primary signal (i.e. the center signal) and the appropriate ambient signal (i.e. the one corresponding to the side of the individual satellite loudspeakers 113, 115). However, in contrast to the front stereo loudspeakers 109, 111 the combination for the satellite loudspeakers 113, 115 is not constant but varies depending on the position of the individual satellite loudspeakers 113, 115.
Specifically, as shown in FIG. 3, the right ambient signal is multiplied by a gain 301 and the center signal is multiplied by a gain 303. The results are summed in a summation unit 305. The sum signal is then fed to a filter hsr 307 to generate the drive signal for the right surround loudspeaker 115. Similarly, the left ambient signal is multiplied by a gain 309 and the center signal is multiplied by a gain 31 1. The results are summed in a summation unit 313. The sum signal is then fed to a filter hsr 315 to generate the drive signal for the right surround loudspeaker, i.e. for the first loudspeaker 113.
The filter may specifically be a delay which delays sound components from the satellite loudspeakers 113, 115 relatively to the front stereo loudspeakers 109, 111. This may ensure that in particular sound from the center signal rendered from the front stereo loudspeakers 109, 111 can be ensured to arrive at a listener before the corresponding sound from the satellite loudspeakers 113, 115. Due to the human perceptions ability to determine direction based on the first arrived sound wave front, this may provide a stronger spatial perception that the source of the center signal is from the front stereo loudspeakers 109, 111. The effect is known as the Haas effect.
The gains are dependent on the positions of the satellite loudspeakers 113, 115 relative to the reference position. Specifically, the gain for the center signal is increased relative to the gain for the ambient signal for an increasing distance from the first reference position. Thus, in the example of FIG. 1, the second loudspeaker 115 is relatively close to a reference position corresponding to the primary listening zone 103. Therefore, the gain for the center signal is relatively low whereas the gain for the right ambient signal is relatively high. Specifically, the gain for the center signal may be zero and the drive signal may be generated to correspond directly to the right ambient signal. Thus, the second loudspeaker
115 will render only the ambient signal, and will thus support the spatial audio experience for a listener in the primary listening zone 103 by providing surround sound from the rear of the listener.
In contrast, the first loudspeaker 113 is relatively far away from the reference position for the primary listening zone 103. Therefore, the gain for the center signal is increased substantially whereas the gain for the left ambient signal may be reduced, or may be maintained constant (or even increased but less than the gain increase for the center signal). As a result, the first loudspeaker 113 will render audio which is the combination of the left ambient signal and the center signal, i.e. it will render both the primary signal and a secondary signal. This will allow the first loudspeaker 113 to support listeners in the secondary listening zone 105 who would otherwise find it difficult to hear the center channel from the front stereo loudspeakers 109, 111. Indeed, the first loudspeaker 113 may provide a full rendering of the audio content of the input stereo signal to listeners in the secondary listening zone 105. Thus, in the example, the driver 205 is arranged to modify a first level of the primary signal component relative to a second level of the secondary signal component in response to the first position relative to the first reference position. Thus, the relative contribution from the center signal and the ambient signal for each loudspeaker depends on the position of that loudspeaker relative to the reference position. When the distance increases, the gain/level of the primary signal component is increased relative to the gain/level of the secondary signal. The ratio between the gains/levels may specifically be a monotonic function of the distance between the loudspeaker position and the reference position.
In the example, the driver 205 comprises a combiner which combines the primary signal and the secondary signal into a single drive signal for the first loudspeaker 113. The combiner is in the form of a mixer which in the specific example generates the drive signal as a weighted summation of the primary signal and one secondary signal. It will be appreciated that other combinations may be used in other embodiments, such as
combinations including individual filters for the individual signals etc. In the combination, the relative weights for the primary signal and the secondary signal are dependent on the position of the corresponding loudspeaker and specifically on the distance from the loudspeaker position to the reference position.
In some embodiments, multiple drive signals may be provided to a single loudspeaker. Thus, the set of drive signals generated by the driver 205 may comprise a plurality of drive signals for one or more of the set of loudspeakers 109-115 driven by the driver. For example, rather than combining the gain compensated center and ambient signals, these may be fed directly to the loudspeaker which may comprise multiple audio transducers for individually rendering the two signals, or which may itself comprise a signal combiner.
It will be appreciated that the driver 205 adjusts the relative gains/levels depending on the position of the loudspeaker and that this may be achieved by any suitable means. For example, the gain/level of one signal component may be constant with the gain/level of the other signal component being modified, or both gain/levels may be modified. Furthermore, it will be appreciated that the modifications may be subject to other considerations and requirements. For example, the relative level of the signal components may be subject to a requirement that the overall level of the generated drive signal should have a given value. E.g. it may be required that the total volume of sound being rendered by the loudspeaker is constant with the relative contribution of the signal components being adjusted within this restriction. In the described example, the loudspeaker signals are thus generated by mixing of the three decomposed signals, i.e. of the center signal and the two ambient signals. The approach may be based on first calibrating the system to determine which loudspeakers of the system represent the front stereo loudspeakers 109, 111. Subsequently, the distances and angles of the satellite loudspeakers 113, 115 relative to the front stereo loudspeakers 109, 111 can be determined as a part of the same calibration measurement. It will be appreciated that the skilled person will be aware of various algorithms for determining loudspeaker positions.
The drive signals for the front stereo loudspeakers 109, 111 are then generated from the decomposed signals: yiogO = c(n) + a((n) yiiiO = c(n) + ar(n)
The drive signals for the satellite loudspeakers 113, 115 are formed with the help of filtering operators F113and F115, respectively, such that yns OO = F^cir^. a^. arin ]
In some embodiments, the operation may (as mentioned) include the application of a delay to the signals. The purpose of the delay is to make sure that the sound is perceived to originate from the front loudspeakers 109, 111 for all listeners, i.e. for a listener closer to one of the satellite loudspeakers 113, 115 than to the front stereo
loudspeakers 109, 111 In some embodiments it is possible to determine the first reference position associated with the primary listening zone 103 using a hand-held device
(microphone or sound actuator) which can be positioned freely. Measurements may e.g. be performed between the loudspeakers 109-115 to determine relative positions of these. The location of the reference position associated with the primary listening zone 103 may then e.g. be determined a position, say, 3 meters in front of the front stereo loudspeakers 109, 111. In addition, the calibration measurement may also be used to determine the left/right assignment parameter glr of the signals such that if a loudspeaker is on the left hand side of the listening area (such as the first loudspeaker 113 in Fig. 1) the apparatus applies a gain gir= to the component signal ar(n) and a non-zero gain to the component signala((n). In some embodiments, the value of the left-right coefficient may be linked to the angular direction of the satellite loudspeaker such that glr = (sinO) + l)/2
The center signal is preferably handled so that the system provides improved clarity and intelligibility of speech in other listening areas (such as at the dining table 107 in Fig. 1) and still provides the best clarity and natural localization of the center content in the primary listening zone 103. In the system of Fig. 1, this may be obtained by a relative increase of the center content in the first loudspeaker 113 which is close to the dining table, and an attenuation of the level of the center signal c(n)in the other satellite loudspeaker 115 which is close to the primary listening zone 103. In some embodiments, the amplitude of the center signal in the satellite loudspeakers 113, 115 only depend on the distance ds of the satellite loudspeaker from the best listening position. A convenient gain for the signal c(n) is given by: gc = l - eds2'v where typically v = 2.
In the example, the complete mixing rule for a satellite loudspeaker 113, 115 may accordingly be: ys(n) = hs * (gcc(n) + g^a^n) + (1 - glr)ar{n)) where hs is an impulse response of a rendering filter and the asterisk denotes convolution of the time-domain signals. Typically hs is a simple delay filter that compensates for the time of sound propagation from the front stereo loudspeakers 109, 111 to the area around the satellite in order to improve the localization of the sound to the direction of e.g. a television 101 situated between the front stereo loudspeakers 109, 111. In the previous example, the relative gains/levels for the primary signal and the secondary signal were dependent on the distance between the loudspeaker and a reference position which corresponded to the primary listening zone 103. In some embodiments, the levels may be dependent on relationships to more than one reference position, and may specifically also be dependent on the distance to a second reference position associated with the secondary listening zone 105.
In such embodiments, the position processor 207 may determine a second reference position considered to be indicative of the secondary listening zone 105 in addition to the first reference position associated with the primary listening zone 103. In some embodiments, complex approaches may be used to determine the second reference position, e.g. including microphones being positioned in the secondary listening zone 105 (e.g. on the dining room table 107). In other embodiments, the second reference position may e.g. be determined based on a low complexity user input. For example, the user may simply provide a user input indicating that the center of the secondary listening zone 105 is, say, 4 meters to the left and 2 meters in front of the front stereo loudspeakers 109, 111.
The driver 205 may in such scenarios determine the relative gains for the primary signal and the secondary signal, and accordingly the levels of the primary signal component and the secondary signal component, dependent on the loudspeaker position, the first reference position, and the second reference position.
The function for determining the gain based on these parameters may in many embodiments be such that the level of the primary signal component increases for a decreasing distance towards the second reference position. Thus, the function reflects that for a given distance to the first reference position, the first level (the level of the primary signal component) increases relative to the second level (the level of the secondary signal component) as the distance towards the second reference position decreases.
Thus, the system may increase the center signal in the sound rendered from a satellite loudspeaker such that it becomes more pronounced for satellite loudspeakers that are close to the secondary listening zone 105 than for satellite loudspeakers that are further away. The approach may for example differentiate between loudspeakers at equivalent distances to the primary listening zone 103 but at different sides relative to the secondary listening zone 105. For example, if in the example of FIG. 1, the second loudspeaker 115 was positioned as far away from the primary listening zone 103 as the first loudspeaker 113, the use of the second reference position could be used to ensure that the first loudspeaker 113 renders the full audio signal including both the primary signal component and the secondary signal component, whereas the second loudspeaker 115 will only render the secondary signal. Thus, the system will automatically configure the first loudspeaker 113 to provide a full stand-alone sound scene rendering whereas the second loudspeaker 115 will only provide the
background/ ambient sound.
In some embodiments, the position processor 207 is arranged to categorize the set of loudspeakers 109-115 into different categories with the generation of the drive signals then being dependent on which category the individual loudspeaker is assigned to.
Specifically, the position processor 207 may be arranged to divide the loudspeakers 109-115 into at least two categories with a first category being associated with loudspeakers supporting the primary listening zone 103 and a second category being associated with loudspeakers supporting a secondary listening zone. In some embodiments, the categories may only include these two categories, and thus some loudspeakers may potentially belong to both categories, i.e. they may support both the primary listening zone 103 and the secondary listening zone 105.
The categorization is thus into categories where each category comprises the loudspeakers that are considered to support a specific listening zone. The drive signals will then be generated based on this categorization and specifically the drive signals for the loudspeakers that are considered to belong to the first category are generated to be suitable for providing sound to the primary listening zone 103 whereas the drive signals for the loudspeakers that are considered to belong to the second category are generated to be suitable for providing sound to the secondary listening zone 105. The drive signals for the
loudspeakers that are considered to belong to both the first and the second category are generated to be suitable for providing sound to both the primary listening zone 103 and the secondary listening zone 105
It will be appreciated that the description of the categories reflects the processing of the apparatus. I.e. the first category is associated with the loudspeakers that are assumed to support the primary listening zone 103, and specifically with loudspeakers that can render sound that is perceived in the primary listening zone 103. Thus, the first category may be associated with loudspeakers for which (it is assumed that) the acoustic transfer function from the loudspeaker position to the primary listening zone 103 has an attenuation below a given threshold.
Similarly, the second category is associated with the loudspeakers that are assumed to support the secondary listening zone 105, and specifically with loudspeakers that can render sound that is perceived in the secondary listening zone 105. Thus, the second category may be associated with loudspeakers for which (it is assumed that) the acoustic transfer function from the loudspeaker position to the secondary listening zone 105 has an attenuation below a given threshold.
It will be appreciated that the categorization may be based on any suitable algorithm, parameters or approach. For example, in a low complexity embodiment, the categorization may be based on a manual user input, such as e.g. an explicit indication of a distance between each loudspeaker and the primary listening zone 103 and secondary listening zone 105. Thus, it will be appreciated that it is not necessary to explicitly measure e.g. the propagation conditions etc. to determine whether a specific loudspeaker provides sufficient sound to a given listening zone in order to be considered to support it. Rather, any suitable indication or estimate may be used to determine the categories of loudspeakers that are considered or assumed to support the primary listening zone 103 and the secondary listening zone 105.
In the example, the drive signals are generated differently for loudspeakers in the different categories. For example, the first loudspeaker 113 may be categorized to belong to the second category whereas the second loudspeaker 115 may be categorized to belong to the first category. In this case, the drive signal for the first loudspeaker 113 may be generated such that the gain/level of the primary signal component relative to the secondary signal component is significantly higher than for the second loudspeaker 115. For example, the gain for the primary signal may be set to zero and the gain for the secondary signal may be set to one for the second loudspeaker 115. This will result in only the ambient signal being rendered, and thus the second loudspeaker 115 operating as a surround loudspeaker. In contrast, the gain for both the primary signal and the secondary signal may be set to one for the first loudspeaker 113, thereby resulting in a rendering of the full audio signal. Thus, the first loudspeaker 113 is configured as a stand-alone loudspeaker providing the entire sound scene to people in the secondary listening zone 105.
In some embodiments, the system may further consider whether a given loudspeaker belongs to more than one category. For example, if the first loudspeaker 113 is categorized as both supporting the primary listening zone 103 and the secondary listening zone 105, the gain may be set to an intermediate level, e.g. with the gain of the primary signal being set to, say, 0.4 with the gain of the secondary signal still being one. Thus, in such an example, the loudspeaker is configured to boost the center channel in the secondary listening zone 105 while seeking to reduce the impact thereof on the primary listening zone 103. In many embodiments, the categories may be disjoint, i.e. a given loudspeaker may only belong to one category. In such a case, the first category may be associated with loudspeakers supporting the primary listening zone 103 but not the secondary listening zone 105, and the second category may be associated with loudspeakers supporting the secondary listening zone 105 but not the primary listening zone 103. In addition, the categories may include a third category which is associated with loudspeakers supporting both the primary listening zone 103 and the secondary listening zone 105.
A specific set of gains for the combination of the primary signal and the secondary signals may be stored for each category, and the gains may then be applied when generating the individual drive signal.
As a specific example, a system will be considered comprising two areas in the same room environment (e.g. corresponding to FIG. 1). In the example, each area corresponds to a listening zone. In the approach, a measurement process is undertaken in order to detect or estimate whether the individual loudspeakers of a multi-channel loudspeaker system are in the same space (acoustic zone), in a connected space, or in a different space, corresponding to the first category, the third category, and the second category respectively. This information is then used to adapt the rendering of the audio content. For example, for loudspeakers that are isolated, the audio content should be representative of the entire movie sound track, and not restricted to one channel of a 5.1 sound track.
In the example, the audio system comprises a test generator which is arranged to generate test signals that are then fed to loudspeakers. In addition, a microphone is included which provides a microphone signal which is then analyzed. In some embodiments, the microphone may be a separate microphone which can be moved to different positions, and which e.g. can be positioned within the primary listening zone 103 and/ or the secondary listening zone 105 with the position of the microphone then being used as a reference position. In other embodiments, a plurality of microphones may be provided, and specifically each loudspeaker 109-115 may include a microphone.
The microphone(s) may record the test signals, and e.g. based on the detected signals and knowledge of the transmitted test signals, acoustic transfer functions may be determined. Based on the measurements, the classification of the individual loudspeakers may be performed.
For example, the audio system may be entered into a test mode wherein only test signals are generated. The user may be instructed to position the microphone in the center of the primary listening zone 103. Test signals may then sequentially be generated from each loudspeaker, and the average level of the microphone signal for each loudspeaker may be determined. If the detected level for a given loudspeaker is higher than a given threshold, the loudspeaker is considered to support the primary listening zone 103. The process may then be repeated for the microphone at the secondary listening zone 105 to determine the
loudspeakers that are estimated to support the secondary listening zone 105. The
loudspeakers may then be categorized into those which support only the primary listening zone 103, those only supporting the secondary listening zone 105, and those supporting both the primary listening zone 103 and the secondary listening zone 105.
Thus, once the transfer function/ impulse response has been identified for a given loudspeaker, the transfer function/ impulse response is analyzed with respect to predetermined metrics to identify whether the loudspeaker is in the primary listening zone 103, the secondary listening zone 105 or both. This process is repeated for all loudspeakers. In this way the categories may correspond to acoustic zones, such as an area around a loudspeaker within a predefined distance, or within a dynamically estimated reverberation radius. A connected acoustic zone may be an area between two acoustic zones where a loudspeaker will be audible in both of the other acoustic zones. An example may be two positions in the same room whose separation is much greater than the reverberation radius, or are partially occluded by an obstacle such as a large piece of furniture or a wall.
A separate acoustic zone may be one isolated from the main space by a physical barrier, such as a wall and doors. The loudspeaker here is effectively isolated from the others and playback in this room is perceived as entirely independent from the playback in other rooms, although the content may be the same.
The classification into the different categories may allow such acoustic environments to be considered and may allow the system to adapt the operation accordingly.
Specific examples of how the detected impulse response may be analyzed include:
If no impulse response is detected, or if the amplitude of the impulse response is below a pre-determined threshold, it is assumed that the transmitting loudspeaker is in an entirely different space to the receiving microphone. Specifically, if the amplitude of the impulse response is below a given level for the primary listening zone 103, the loudspeaker emitting the test signal will not belong to any category associated with loudspeakers supporting the primary listening zone 103. The same applies to the secondary listening zone 105. If the microphone is located within an adjoining space, at a great distance, or with no direct line of sight to the test loudspeaker it is likely to be too far from the other loudspeakers to effectively operate as a cohesive multi-channel reproduction system. Time of flight data can be used to estimate the distance between the microphone and all other loudspeakers. Distances larger than, say, 8 m may be considered separate spaces. Another metric for determining whether the loudspeaker is in a separate acoustic space is the profile of the impulse response. A microphone in adjacent space is likely to have a much higher ratio of reverberant sound to direct sound, than a microphone in the shared space. This is illustrated in FIGs. 4 and 5 which show impulse responses recorded in respectively an adjacent space (FIG. 4) and the same space (FIG. 5) as the test loudspeaker. In the former case, the impulse response demonstrates a small impulse and relatively large exponential decay whereas in the latter case, the impulse response demonstrates a relatively large initial impulse and relatively smaller exponential decay. The direct to reverberant ratio is a good marker for determining whether the microphone is in the same space as the transmitting loudspeaker, or in an adjoining space. A third marker might be the reverberant radius; i.e. the distance from a source where the direct sound and the reflected sound become equal.
It will be appreciated that there are many different methods of detecting whether a loudspeaker is in the same acoustic space as another loudspeaker (or microphone). Other examples include frequency response analysis over short time windows, as well as analyzing the shape of the envelope of the impulse response etc.
Once the impulse responses have been recorded and analyzed and the spatial partitioning into different categories has been performed, the audio content for each loudspeaker channel can be optimized. The aim is to provide good intelligibility and coverage in all spaces. If all loudspeakers are located in the same shared space (specifically they all support the primary listening zone 103 and there is no need for specific consideration of the secondary listening zone 105), traditional methods of optimization may be used to optimize playback for a given optimum listening position.
In some embodiments, the impulse responses are determined using the audio content as test signals, i.e. the rendered audio signals are also used as test signals. In this way automatic redistribution of the audio content can be performed in real time without requiring a user prompted calibration. This is particularly advantageous for when the user wishes to move a loudspeaker to another area on the fly. This can be achieved using adaptive filtering processes. The selection of which of the multichannel signals that are to be used to generate the drive signal for a specific loudspeaker will in some embodiments depend on which category the loudspeaker belongs to. For example, if a satellite loudspeaker belongs to the first category (i.e. it supports only the primary listening zone 103) it will select a subset of the channels. For example, it will only include the ambient or surround signals and will not include the front or center signals. However, if the satellite loudspeaker belongs to the second category (i.e. it supports only the secondary listening zone 105), it will select all the channels. For example, it will include both the center channel, any front channels as well as surround channels. Thus, for a loudspeaker belonging to the first category, only a subset of signals of the multichannel signal generated by the multi-channel signal generator 203 will be included for a loudspeaker belonging to the first category whereas all signals will be included for a loudspeaker belonging to the second category.
In many embodiments, the system may furthermore be arranged to adapt the rendering of audio for a specific listening zone dependent on which loudspeakers are available to support the listening zone.
Specifically, the driver 205 may be arranged to distribute the plurality of signals over a set of loudspeakers which includes only loudspeakers in a subset of categories supporting the primary listening zone 103.
For example, after classification, the system may proceed to determine which loudspeakers are available to support the primary listening zone 103. These loudspeakers will be classified into categories that are associated with support of the primary listening zone 103. E.g. in the previous example, it will include loudspeakers which are classified into the first category or the third category. The driver 205 will then proceed to distribute the plurality of channels over these loudspeakers.
It will be appreciated that any suitable algorithm or process for distributing a number of N spatial channels over a number M of loudspeakers may be used. It will be appreciated that the skilled person is aware of various such algorithms including algorithms for M<N, M>N and M=N.
As an example, the technique known as Vector Base Amplitude Panning may be used as e.g. described in Pulkki V. "Virtual Source Positioning Using Vector Base Amplitude Panning." J. Audio Eng. Soc, 45(6):456-466, Jun. 1997. It will be appreciated that in some embodiments, the distribution may be over loudspeakers that only support the primary listening zone 103, i.e. only over loudspeakers in the first category in the specific example.
It will also be appreciated that the same approach may be used for the secondary listening zone 105, i.e. the driver 205 may be arranged to distribute the plurality of channels signals over a set of loudspeakers which includes only loudspeakers in a subset of categories supporting the secondary listening zone 105.
The system may provide a very flexible approach and may allow improved audio rendering in many scenarios. For example, if several loudspeakers support the primary listening zone 103, but one or more loudspeakers have been moved to a different area (e.g. to support the secondary listening zone 105), then the system can redistribute the audio channels to provide an improved listening experience preferably both in the primary listening zone 103 and in the secondary listening zone 105. As a specific example, if one loudspeaker is removed and brought into the adjoining open plan kitchen of FIG. 1, this loudspeaker is no longer suitably placed for rendering of a surround sound channel. It is un-desirable to render only surround sound information in the kitchen as this content contains only ambience, and any listener in the kitchen would therefore receive very little primary audio content. Instead it is desirable to feed a down mixed to mono version of the 5.1 sound track to the loudspeaker located in the kitchen. In this way the user in the kitchen can clearly hear the relevant audio content, even if line of sight is interrupted.
To avoid reducing the stereophonic localization cues for listeners in the optimum listening region, the loudspeaker in the kitchen can be fed with a processed signal, of predetermined loudness and with a predetermined filter, or a filter and amplitude determined by the user. Thus the influence of the loudspeaker in the kitchen on the perceived audio experience in the optimum listening region is minimized, while listeners in the kitchen perceive a clear and full audio experience.
Furthermore, the system may adapt the processing such that the audio content is redistributed over the remaining loudspeakers which support the primary listening zone 103. The redistribution ensures that although one loudspeaker is missing from the
conventional multichannel setup, the effect on the overall listening experience is minimized.
In many embodiments and scenarios, the primary signal may at least partly be a speech signal, and the system may be adapted to seek to provide a certain degree of clarity of the speech to users in the secondary listening zone 105. Indeed, the driver 205 may determine a speech clarity indication for the secondary listening zone 105, and may for the first loudspeaker 113 then proceed to adjust the first level relative to the second level based on this speech clarity indication. E.g. if the speech clarity indication indicates that the clarity of the speech of the rendered signal is below a given level, the driver 205 may proceed to increase the gain for the primary signal thereby emphasizing the speech of the center channel relative to the ambient sounds.
As specific examples of the speech clarity indication, the driver 205 may determine a
speech intelligibility or clarity measure such as the Speech Transmission Index (STI) or the Clarity Index (C50). These may be determined from the measured impulse responses.
Accordingly, by evaluating whether the intelligibility or clarity is acceptable in the secondary listening zone 105, the level of the center signal rendered from loudspeaker 113 may be adjusted to result in a desired speech clarity level. In some embodiments the formulas for the remixing of the content can be dynamically optimized to maximize or minimize some objective measure. For example, the operators F113 and F115 previously mentioned may be optimized such that the value of C50 is maximized in specific parts of the listening area or on average in the entire room environment.
In some embodiments, the system may comprise a user detector which generates a user presence indication which is indicative of whether a user is detected in a given area or not. The user presence indication may specifically be indicative of whether a user position falls within the primary listening zone 103 or within the secondary listening zone 105. The system may then adjust the generation of the drive signals and thus the rendered sound depending on the presence of the users.
For example, if the user presence indication indicates that there are no users present in the secondary listening zone 105, the gain/level of the primary signal may be set low, and even to zero, for the first loudspeaker 113. Accordingly, the first loudspeaker 113 will in this scenario assist only in providing ambient sound to listeners in the primary listening zone 103 and will not provide any rendering of the primary signal to the secondary listening zone 105. This will result in an improved audio experience for users in the primary listening zone 103.
Contrary, if the user presence indication indicates that there are no users in the primary listening zone 103 but that there is at least one user in the secondary listening zone 105, then the driver 205 may proceed to increase the gain of the primary signal for the first loudspeaker 113. Specifically, the gain may be set to the same as the ambient signal to provide a rendered sound signal which includes all sound of the original audio signals (weighted equally). Thus an improved user experience is provided to users in the secondary listening zone 105.
If the user presence indication indicates that there are users in both the primary listening zone 103 and the secondary listening zone 105, the system may proceed to compromise between the previous scenarios. For example, the gain for the primary signal may be set to half the gain of the secondary signal, thereby resulting in emphasis of the primary signal in the secondary listening zone 105 without introducing unacceptable interference to the primary listening zone 103.
In these examples, the driver 205 accordingly increases the level of the primary signal component relative to the level of the secondary signal component when the user presence indication indicates that a user is present in the primary listening zone 103.
Thus, detection of the proximity of a user to one or both satellite loudspeakers 113, 115 may be used beneficially to control the system. For example, when it is detected that a user is located close to a satellite loudspeaker at a large distance from the main front loudspeakers, it is likely that this user will benefit from a raised level of the center signal in this satellite in order to optimize intelligibility. In contrast, when no user is detected in the vicinity of the satellite, the center signal is best left out completely from this satellite's signal, since there is no user that would benefit from it while it may actually degrade other users' experiences.
Similarly, detecting presence of a user in the primary listening zone 103 may be beneficial for optimal system control. For example, if a user is present in the primary listening zone 103, the drive signals are generated such that the experience in this area is compromised as little as possible by the sound from the satellite loudspeakers. If, on the other hand, it is detected that no user is present in this area, then the system can be configured so as to optimize the experience for the user(s) near the satellite loudspeakers 113, 115 without considering the experience in the primary listening zone 103.
Detection of a user may be automatic, using any suitable technology. For example, a camera may survey the room and video algorithms arranged to detect the presence of people in specific areas of the video image may be used to generate a user presence indication. As another example, the user detection may involve a simple user action, e.g. the user touching the satellite loudspeaker 113, 115 to indicate that someone is close to the loudspeaker.
In some embodiments, the first loudspeaker 113 may be arranged to radiate the primary signal and the secondary signal with different radiation patterns. For example, the primary signal and the secondary signal may be provided to the first loudspeaker 113 as two separate signals. The first loudspeaker 113 may include two audio transducers which have different radiation patterns, and each audio transducer may be driven by one of the signals. As another example, the first loudspeaker 113 may comprise an audio transducer array that may be driven to provide different audio patterns for the primary signal and the secondary signal.
The patterns may specifically be different such that the secondary signal is rendered with a wider pattern than the primary signal. For example, a primary signal, being a center speech signal, may be rendered in a relatively narrow pattern towards the secondary listening zone 105. In contrast, a secondary signal being an ambient signal may be rendered with a wide pattern. Accordingly, the speech will be focused on the listeners in the secondary listening zone 105 whereas a distributed and more diffuse rendering of the general ambient signal is provided. This may provide an improved experience in the secondary listening zone 105 but may also improve the audio experience in the primary listening zone 103 as the interference from the primary signal being rendered from the first loudspeaker 113 can be reduced.
Thus, in some embodiments, the acoustic radiation pattern of the satellite loudspeakers may be optimized to provide an improved experience to users. Typically, different radiation patterns would be selected for the center- and ambience signals.
In one example, the satellite loudspeaker may have multiple drivers that allow the ambience signals to be reproduced such that they are radiated in all directions except the frontal (on-axis) direction of the satellite loudspeaker (which is typically facing a user located close to it). Complementary to this, the center signal may be reproduced with a frontal loudspeaker driver which typically faces the user. This has several benefits: for the user close to the satellite loudspeaker the clarity and intelligibility of the center signal is improved due to it not being masked by the ambience signals, which are not directly radiated towards the user. This means that the center signal can be reproduced at a lower level while still achieving improved clarity and intelligibility. For the user in the primary listening zone 103, this also has the benefit that his experience is minimally affected by the center signal from the satellites. In addition, the user in the primary listening zone 103 is provided with
"diffuse" ambience signals from the satellite loudspeakers thereby enhancing his experience.
In another example, the satellite loudspeakers may contain multiple drivers configured along a vertical axis (vertical line array). If such a vertical line array is driven with identical signals for all drivers, cylindrical sound waves are radiated from the array. One characteristic of such cylindrical waves is that their amplitude drops in level more gradually as a function of distance than the common spherical waves which are generated by a single driver. These different level-vs-distance properties of the vertical line array and a single loudspeaker driver can be used advantageously. If the ambience signal is rendered from all loudspeaker drivers, an ambience sound level that is more homogeneous throughout the room than if a single driver were used is achieved. If, in addition, the center signal is reproduced from only one of the drivers, its level drops much faster with distance, so the sound is more confined to the region around the loudspeaker than the sound from the ambience signal. This is beneficial as it means that the center signal experience for a user in the primary listening zone 103 is less affected by the satellite loudspeakers. Since the driving signals for all drivers of the vertical line array are identical, this solution does in principle not require additional processing- or amplifier channels. Rather, the ambience signal can e.g. simply be divided passively among the drivers.
In some embodiments, the first loudspeaker 113 may be an adjustable multichannel loudspeaker which is arranged to configure a multichannel rendering characteristics dependent on the categorization of the loudspeaker. Specifically, the first loudspeaker 113 may be capable of operating in different rendering modes. In one mode, the first loudspeaker 113 operates as a single channel audio transducer and reproduces all sound homogenously. In another mode, the first loudspeaker 113 may operate as a multi-channel loudspeaker system with different audio signals being rendered in different directions.
Specifically, the first loudspeaker 1 13 may be arranged to operate in a virtual surround sound mode where radiation of different spatial channels occur from the same loudspeaker unit but in different directions. This approach exploits reflections off walls etc. to provide a perception of a virtual surround loudspeaker.
In such a system, the operation of the first loudspeaker 113 may depend on which category it is considered to belong to. Specifically, if it belongs to the first category and accordingly supports the primary listening zone 103, it is likely to be driven as a surround loudspeaker. Accordingly, it will be driven in a single channel mode and simply render the ambient signal.
However, if it belongs to the second category and accordingly supports the secondary listening zone 105, it may be operated in a multi-channel mode wherein different channels are radiated in different directions. Specifically, the first loudspeaker 113 may be operated as a virtual surround sound loudspeaker. This may for example be particularly advantageous in scenarios wherein the first loudspeaker 113 is moved to a completely different room. In this case, a surrounding audio experience is provided to the listener by a single loudspeaker. However, if that loudspeaker is positioned together with other loudspeakers supporting the primary listening zone 103, it will simply render the surround channel.
It will be appreciated that the driver 205 may not utilize or be aware of specific differentiating characteristics of the primary signal and the secondary signal, or how these specifically relate to the underlying sound stage. Rather, the apparatus designates typically one of the multi-channel signals as a primary signal and then proceeds to process this signal in accordance with the rendering algorithm for the primary signal. Similarly, the apparatus designates one (or more) of the multi-channel signals as a secondary signal and then proceeds to process this (these) signal(s) in accordance with the rendering algorithm for a secondary signal. Furthermore, the apparatus generates the primary and secondary signals such that it is assumed or likely that they will correspond to signals with the desired characteristics. Specifically, the primary signal is generated to correspond to a center signal which is likely to contain specific and important sound sources, such as speech. Similarly, the secondary signal is generated to have a high probability (under a given set of circumstances) of corresponding to ambient, diffuse and/or background sources. Thus, for most signals, the apparatus is likely to improve the audio experience. However, it is of course possible that in some specific (typically rare) scenarios, the algorithms may result in an unintended effect. For example, if a signal is received wherein a dominant speech source is located to the rear of listener, this speech source may in some embodiments be treated as a background signal rather than as a dominant single point source. However, such situations are rare, and the improvement provided for most signals will almost always outweigh the unintended effects of unusual signals. Alternatively, the user may be able to switch off the automatic adaptation.
In some embodiments, the system may be arranged to automatically or semi- automatically determine or adapt the first and/or second reference positions corresponding to the primary listening zone 103 and secondary listening zone 105 respectively.
Specifically, the apparatus may comprise a user detector for generating user position indications which are indicative of user positions in the environment. For example, the apparatus may receive an input from a camera surveying the audio environment. The user detector may be arranged to detect user presence in the environment from the captured image. It will be appreciated that various algorithms and techniques will be known to the skilled person for detecting user positions from camera detections or other user inputs. For example, assisted detections using infrared lights may be used to detect positions in two or three dimensions. It will be appreciated that any suitable approach may be used without detracting from the invention.
The position processor 207 may be arranged to determine the first and/or second reference positions based on the detected user position indications. For example, the positions may be analyzed statistically to determine e.g. the occupancy frequency of each of a given set of areas of, say, 1 m2. The resulting results may then be analyzed to find separate hotspots which are most frequently occupied. The most occupied region may then be considered the primary listening zone 103 and the second most occupied region may be considered the secondary listening zone 105. The first reference position may then be determined, e.g. as the center of the most occupied region, or as the center of the most occupied 1 m2. Similarly, the second reference position may be determined, e.g. as the center of the second most occupied region, or as the center of the most occupied 1 m2 in this region,
The approach may be used to initialize the system, and specifically to set up the listening zones without any user involvement. However, in many embodiments, the initial setup may be by a rough manual user input, which may then be dynamically adjusted and fine-tuned in line with the monitored user input.
Thus, in some embodiments, the primary and secondary listening zones (and corresponding reference positions) may be localized using an automatic user localization method, such as a video camera or some other tracking device. The listening zones can be determined or adjusted automatically such that system learns these over time based on statistics of user localization results. E.g. the television 101 may be provided with a webcam and a user detector may determine a user localization 'heat map' which can be used to adjust the position of the primary listening zone based on where the user typically sits.
It will be appreciated that the above description for clarity has described embodiments of the invention with reference to different functional circuits, units and processors. However, it will be apparent that any suitable distribution of functionality between different functional circuits, units or processors may be used without detracting from the invention. For example, functionality illustrated to be performed by separate processors or controllers may be performed by the same processor or controllers. Hence, references to specific functional units or circuits are only to be seen as references to suitable means for providing the described functionality rather than indicative of a strict logical or physical structure or organization.
The invention can be implemented in any suitable form including hardware, software, firmware or any combination of these. The invention may optionally be implemented at least partly as computer software running on one or more data processors and/or digital signal processors. The elements and components of an embodiment of the invention may be physically, functionally and logically implemented in any suitable way. Indeed the functionality may be implemented in a single unit, in a plurality of units or as part of other functional units. As such, the invention may be implemented in a single unit or may be physically and functionally distributed between different units, circuits and processors.
Although the present invention has been described in connection with some embodiments, it is not intended to be limited to the specific form set forth herein. Rather, the scope of the present invention is limited only by the accompanying claims. Additionally, although a feature may appear to be described in connection with particular embodiments, one skilled in the art would recognize that various features of the described embodiments may be combined in accordance with the invention. In the claims, the term comprising does not exclude the presence of other elements or steps.
Furthermore, although individually listed, a plurality of means, elements, circuits or method steps may be implemented by e.g. a single circuit, unit or processor.
Additionally, although individual features may be included in different claims, these may possibly be advantageously combined, and the inclusion in different claims does not imply that a combination of features is not feasible and/or advantageous. Also the inclusion of a feature in one category of claims does not imply a limitation to this category but rather indicates that the feature is equally applicable to other claim categories as appropriate.
Furthermore, the order of features in the claims do not imply any specific order in which the features must be worked and in particular the order of individual steps in a method claim does not imply that the steps must be performed in this order. Rather, the steps may be performed in any suitable order. In addition, singular references do not exclude a plurality. Thus references to "a", "an", "first", "second" etc. do not preclude a plurality. Reference signs in the claims are provided merely as a clarifying example and shall not be construed as limiting the scope of the claims in any way.
Claims
CLAIMS:
1. An audio apparatus comprising:
a receiver (201) for receiving an audio signal;
a generator (203) for generating a multichannel signal from the audio signal, the multichannel signal comprising a plurality of signals including at least one primary signal and at least one secondary signal;
a driver (205) for generating a set of drive signals comprising at least one drive signal for a loudspeaker (109) of a set of loudspeakers (109-115), the set of drive signals comprising at least a first signal component from the primary signal and a second signal component from the secondary signal;
a position circuit (207) for determining a first position of the loudspeaker (109);
wherein the driver (205) is arranged to adjust a first level of the primary signal component relative to a second level of the secondary signal component in response to the first position relative to a first reference position.
2. The audio apparatus of claim 1 wherein the driver (205) comprises a combiner for combining the primary signal and the secondary signal into a single drive signal for the loudspeaker (109), the weighting of the primary signal relative to the secondary signal being dependent on the first position relative to the first reference position.
3. The audio apparatus of claim 1 wherein the driver (205) is arranged to increase the first level relative to the second level for an increased distance between the first position and the first reference position.
4. The audio apparatus of claim 1 wherein the driver (205) is further arranged to adjust the first level relative to the second level in response to the first position relative to a second reference position.
5. The audio apparatus of claim 4 wherein the driver (205) is arranged to increase the first level relative to the second level for an increased distance between the first position and the first reference position and to increase the first level relative to the second level for a decreased distance between the first position and the second reference position.
6. The audio apparatus of claim 1 wherein the position circuit (207) is arranged to determine a loudspeaker position of at least one loudspeaker of the set of loudspeakers
(109-115) and to determine the reference position from the loudspeaker position.
7. The audio apparatus of claim 1 wherein the driver (205) is arranged to determine a speech clarity indication for sound rendered from the loudspeaker, and to adjust the first level relative to the second level in response to the speech clarity indication.
8. The audio apparatus of claim 1 further comprising a user detector for generating a user presence indication indicative of a user presence in a listening zone; and wherein the driver (205) is arranged to adjust the first level relative to the second level in response to the user presence indication.
9. The audio apparatus of claim 8 wherein the user presence indication is indicative of a user position; and wherein the driver (205) is arranged to reduce the first level relative to the second level in response to the user presence indication indicating a user position in a primary listening zone (103).
10. The audio apparatus of claim 8 or 9 wherein the user presence indication is indicative of a user position; and wherein the driver (205) is arranged to increase the first level relative to the second level in response to the user presence indication indicating a user position in a secondary listening area.
11. The audio apparatus of claim 1 further comprising the loudspeaker (109), and wherein the loudspeaker (109) is arranged to render the primary signal with a different radiation pattern than a radiation pattern for the secondary signal.
12. The audio apparatus as claimed in claim 1 wherein the position circuit (207) is arranged to categorize at least some of the loudspeakers of the set of loudspeakers (109-115) into categories comprising at least a first category associated with loudspeakers supporting a primary listening zone (103) and a second category associated with loudspeakers supporting a secondary listening zone (105) ; and where the driver (205) is arranged to determine the first level relative to the second level in response to the categorization of the loudspeaker (109).
13. The audio apparatus of claim 12 wherein the first category is associated with loudspeakers not supporting the secondary listening zone (105) and the second category is associated with loudspeakers not supporting the primary listening zone (103), and the categories further comprises a third category associated with loudspeakers supporting both the primary listening zone (103) and the secondary listening zone (105).
14. The audio apparatus as claimed in claim 12 wherein the driver (205) is arranged to set the first level relative to the second level higher when the loudspeaker (109) is in the second category than when it is in the first category.
15. The audio apparatus as claimed in claim 12 wherein the driver (205) is arranged to generate a single drive signal for the loudspeaker (109) from a set of signals of the plurality of channel signals, the set of signals being dependent on which category the loudspeaker (109) belongs to.
16. The audio apparatus as claimed in claim 12 wherein the driver (205) is arranged to distribute the plurality of channels signals over a set of loudspeakers which includes only loudspeakers in a subset of categories associated with loudspeakers supporting the primary listening zone (103).
17. The audio apparatus of claim 12 further comprising:
a test generator for generating a test audio signal and feeding it to at least one loudspeaker of the set of loudspeakers (109-1 15);
a microphone receiver for receiving a microphone signal from at least one of a microphone associated with a loudspeaker of the set of loudspeakers (109-115) and a microphone associated with a listening zone (103, 105);
and wherein the position circuit (207) is arranged to categorize the loudspeakers in response to the microphone signal.
18. The audio apparatus of claim 12 further comprising the loudspeaker (109) and wherein the loudspeaker (109) is an adjustable multichannel loudspeaker; the apparatus furthermore being arranged to switch the loudspeaker (109) between a single channel mode and a multi-channel mode in response to the categorization of the loudspeaker (109).
19. The audio apparatus of claim 1 further comprising a user detector for generating user position indications indicative of user positions; and wherein the position circuit (207) is arranged to determine the first reference position in response to the user position indications.
20. A method of operation for an audio system, the method comprising:
receiving an audio signal;
generating a multichannel signal from the audio signal, the multichannel comprising a plurality of signals including at least one primary signal and at least one secondary signal; generating a set of drive signals comprising at least one drive signal for a loudspeaker of a set of loudspeakers (109-115), the set of drive signals comprising at least a first signal component from the primary signal and a second signal component from the secondary signal;
determining a first position of the loudspeaker (109); and
adjusting a first level of the primary signal component relative to a second level of the secondary signal component in response to the first position relative to a first reference position.
EP14706102.2A 2013-02-05 2014-01-27 An audio apparatus and method therefor Withdrawn EP2954701A1 (en)
Priority Applications (2)
Application Number Priority Date Filing Date Title
US201361760740P true 2013-02-05 2013-02-05
PCT/IB2014/058558 WO2014122550A1 (en) 2013-02-05 2014-01-27 An audio apparatus and method therefor
Publications (1)
Publication Number Publication Date
EP2954701A1 true EP2954701A1 (en) 2015-12-16
Family
ID=50156813
Family Applications (1)
Application Number Title Priority Date Filing Date
EP14706102.2A Withdrawn EP2954701A1 (en) 2013-02-05 2014-01-27 An audio apparatus and method therefor
Country Status (7)
Country Link
US (1) US20150358756A1 (en)
EP (1) EP2954701A1 (en)
JP (1) JP2016509429A (en)
CN (1) CN104982043A (en)
BR (1) BR112015018352A2 (en)
RU (1) RU2015137723A (en)
WO (1) WO2014122550A1 (en)
Families Citing this family (30)
* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016172593A1 (en) 2015-04-24 2016-10-27 Sonos, Inc. Playback device calibration user interfaces
US9690539B2 (en) 2012-06-28 2017-06-27 Sonos, Inc. Speaker calibration user interface
US10127006B2 (en) 2014-09-09 2018-11-13 Sonos, Inc. Facilitating calibration of an audio playback device
US9106192B2 (en) 2012-06-28 2015-08-11 Sonos, Inc. System and method for device playback calibration
KR20150106649A (en) * 2014-03-12 2015-09-22 삼성전자주식회사 Method and apparatus for performing multi speaker using positional information
US9219460B2 (en) 2014-03-17 2015-12-22 Sonos, Inc. Audio settings based on environment
US9264839B2 (en) 2014-03-17 2016-02-16 Sonos, Inc. Playback device configuration based on proximity detection
SE1451466A1 (en) * 2014-03-26 2015-09-27 Sound Dimension Ab Device for reproducing sound
US9891881B2 (en) 2014-09-09 2018-02-13 Sonos, Inc. Audio processing algorithm database
US9706323B2 (en) 2014-09-09 2017-07-11 Sonos, Inc. Playback device calibration
US9910634B2 (en) 2014-09-09 2018-03-06 Sonos, Inc. Microphone calibration
CN107211213A (en) * 2014-12-01 2017-09-26 三星电子株式会社 Method and device for outputting audio signal on basis of location information of speaker
US9578439B2 (en) * 2015-01-02 2017-02-21 Qualcomm Incorporated Method, system and article of manufacture for processing spatial audio
DK178752B1 (en) * 2015-01-14 2017-01-02 Bang & Olufsen As Adaptive System According to User Presence
CN106162500A (en) 2015-04-08 2016-11-23 杜比实验室特许公司 Audio content displaying method
DE102015008000A1 (en) * 2015-06-24 2016-12-29 Saalakustik.De Gmbh A method for sound reproduction in reflection environments, particularly in Hörräumen
US9538305B2 (en) 2015-07-28 2017-01-03 Sonos, Inc. Calibration error conditions
EP3148224A3 (en) * 2015-09-04 2017-06-21 Music Group IP Ltd. Method for determining or verifying spatial relations in a loudspeaker system
US10306392B2 (en) 2015-11-03 2019-05-28 Dolby Laboratories Licensing Corporation Content-adaptive surround sound virtualization
US9743207B1 (en) 2016-01-18 2017-08-22 Sonos, Inc. Calibration using multiple recording devices
US10003899B2 (en) 2016-01-25 2018-06-19 Sonos, Inc. Calibration with particular locations
JP6493245B2 (en) * 2016-02-24 2019-04-03 オンキヨー株式会社 Sound field control system, a control method of the analysis device, an acoustic device, a sound field control system, a control method of the analysis device, a control method of an acoustic device, a program, a recording medium
US9860662B2 (en) 2016-04-01 2018-01-02 Sonos, Inc. Updating playback device configuration information based on calibration data
US9864574B2 (en) 2016-04-01 2018-01-09 Sonos, Inc. Playback device calibration based on representation spectral characteristics
US9763018B1 (en) 2016-04-12 2017-09-12 Sonos, Inc. Calibration of audio playback devices
CN105812986A (en) * 2016-05-09 2016-07-27 中山奥凯华泰电子有限公司 Sound box and processing method for mixing multiple channels to two wireless channels
WO2018001490A1 (en) * 2016-06-30 2018-01-04 Huawei Technologies Co., Ltd. Apparatus and method for generating a sound field
US9794710B1 (en) 2016-07-15 2017-10-17 Sonos, Inc. Spatial audio correction
US9820073B1 (en) 2017-05-10 2017-11-14 Tls Corp. Extracting a common signal from multiple audio signals
US10299061B1 (en) 2018-08-28 2019-05-21 Sonos, Inc. Playback device calibration
Family Cites Families (7)
* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL134979A (en) * 2000-03-09 2004-02-19 Be4 Ltd System and method for optimization of three-dimensional audio
US20030119523A1 (en) * 2001-12-20 2003-06-26 Willem Bulthuis Peer-based location determination
JP2005236502A (en) * 2004-02-18 2005-09-02 Yamaha Corp Sound system
EP2005414B1 (en) * 2006-03-31 2012-02-22 Koninklijke Philips Electronics N.V. A device for and a method of processing data
US9031267B2 (en) * 2007-08-29 2015-05-12 Microsoft Technology Licensing, Llc Loudspeaker array providing direct and indirect radiation from same set of drivers
US20130070927A1 (en) 2010-06-02 2013-03-21 Koninklijke Philips Electronics N.V. System and method for sound processing
US8908874B2 (en) * 2010-09-08 2014-12-09 Dts, Inc. Spatial audio encoding and reproduction
Non-Patent Citations (1)
* Cited by examiner, † Cited by third party
Title
See references of WO2014122550A1 *
Also Published As
Publication number Publication date
WO2014122550A1 (en) 2014-08-14
JP2016509429A (en) 2016-03-24
RU2015137723A (en) 2017-03-13
US20150358756A1 (en) 2015-12-10
CN104982043A (en) 2015-10-14
BR112015018352A2 (en) 2017-07-18
Similar Documents
Publication Publication Date Title
Gardner 3-D audio using loudspeakers
US5822440A (en) Enhanced concert audio process utilizing a synchronized headgear system
Faller Parametric coding of spatial audio
US8031880B2 (en) Vehicle audio system surround modes
US8325941B2 (en) Method and apparatus to shape sound
JP5096567B2 (en) System and method for radiating sound with directivity
JP6085029B2 (en) System for rendering and reproduction of the audio based on the object in various listening environments
US9100766B2 (en) Multichannel audio system having audio channel compensation
JP4338733B2 (en) The driving method of the wave field synthesis system and loudspeaker arrays
US5371799A (en) Stereo headphone sound source localization system
US9918179B2 (en) Methods and devices for reproducing surround audio signals
KR101370373B1 (en) A device for and a method of processing data
CN101010986B (en) Audio reproducing system
RU2602346C2 (en) Rendering of reflected sound for object-oriented audio information
US20090150163A1 (en) Method and apparatus for multichannel upmixing and downmixing
US9674629B2 (en) Multichannel sound reproduction method and device
JP5038494B2 (en) System and method for radiating sound with directivity
JP5455657B2 (en) Method and apparatus for enhancing the reproduction of sound
US9264834B2 (en) System for modifying an acoustic space with audio source content
JP4946305B2 (en) Sound reproduction system, a sound reproducing apparatus and a sound reproducing method
US20070230724A1 (en) Method for Controlling Directivity of Loudspeaker Apparatus and Audio Reproduction Apparatus
US20160105758A1 (en) Sound source replication system
US6363155B1 (en) Process and device for mixing sound signals
CN101194536B (en) Method of and system for determining distances between loudspeakers
US7606380B2 (en) Method and system for sound beam-forming using internal device speakers in conjunction with external speakers
Legal Events
Date Code Title Description
17P Request for examination filed
Effective date: 20150907
AK Designated contracting states:
Kind code of ref document: A1
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
AX Request for extension of the european patent to
Extension state: BA ME
DAX Request for extension of the european patent (to any country) deleted
18W Withdrawn
Effective date: 20170414 |
Methods
D
G
P
Instance Public methods
delete(*args, &block)
Define a route that only recognizes HTTP DELETE. For supported arguments, see match
delete 'broccoli', to: 'food#broccoli'
# File actionpack/lib/action_dispatch/routing/mapper.rb, line 681
def delete(*args, &block)
map_method(:delete, args, &block)
end
get(*args, &block)
Define a route that only recognizes HTTP GET. For supported arguments, see match
get 'bacon', to: 'food#bacon'
# File actionpack/lib/action_dispatch/routing/mapper.rb, line 649
def get(*args, &block)
map_method(:get, args, &block)
end
patch(*args, &block)
Define a route that only recognizes HTTP PATCH. For supported arguments, see match
patch 'bacon', to: 'food#bacon'
# File actionpack/lib/action_dispatch/routing/mapper.rb, line 665
def patch(*args, &block)
map_method(:patch, args, &block)
end
post(*args, &block)
Define a route that only recognizes HTTP POST. For supported arguments, see match
post 'bacon', to: 'food#bacon'
# File actionpack/lib/action_dispatch/routing/mapper.rb, line 657
def post(*args, &block)
map_method(:post, args, &block)
end
put(*args, &block)
Define a route that only recognizes HTTP PUT. For supported arguments, see match
put 'bacon', to: 'food#bacon'
# File actionpack/lib/action_dispatch/routing/mapper.rb, line 673
def put(*args, &block)
map_method(:put, args, &block)
end |
Отключаемые счетчики электроэнергии на пульте. Все с документами пломбами, гарантией и без посредников!
Делаем меню для своего проекта на микроконтроллере
Когда любой проект растет в функционале, и из простого показометра хочется сделать нечто большее, нужно придумать, как организовать удобную работу с устройством. Хорошо если в проекте задействован дисплей (графический, алфавитно-цифровой, да хоть семисегментный) тогда можно создать свое меню и рулить настройками оттуда. Вот и попробуем организовать несложное древовидное меню из небольшого списка, с возможностью выбора любого пункта. Для начала необходимо определится с организацией и количеством пунктов меню и нарисовать структурную схему. Например, сделаем меню из 4-х пунктов, в каждом из которых по 3 подпункта, такую вот:
Для микроконтроллера каждый пункт это всего лишь переменная (А), которая меняется при нажатии кнопок и в зависимости от значения которой, на дисплей выводится информация или выполняется то или иное действие. Кнопок, кстати всего 4: вверх (up), вниз (down), выбор (ok) и выход (esc). Сейчас подробно рассмотрим, что происходит с переменной при нажатии этих кнопок.
При старте программы (или при входе в меню), переменной А присваивается значение 10, это соответствует первому пункту меню. При нажатии кнопки «Вниз», к переменной прибавляется 10, и она становится равна 20, это соответствует второму пункту меню. Если еще раз нажать на эту кнопку, переменная станет равна 30, что будет соответствовать третьему пункту меню и так далее. Если нажать кнопку «Вверх» переменная будет уменьшаться на 10, до тех пор, пока не станет равна 10. Таким образом, организована навигация по главному списку меню.
Для примера остановимся на первом пункте, и войдем в подменю первого пункта нажав кнопку “Вход”. При этом к переменной прибавляется единичка и переменная становится равна 11. Это соответствует первому подпункту первого пункта меню %)
Теперь если нажать на кнопку “Вниз” переменная будет увеличиваться на 1, пока не станет равна 13 (всего у нас 3 подпункта меню). Если нажимать на кнопку “Вверх” переменная будет уменьшаться на 1, пока не достигнет значения 11. Вот и организовали навигацию по пунктам подменю. Теперь, находясь в подменю, к примеру на пункте 1.1, если нажать кнопку “Ввод” переменная умножается на 10 и становится равна 110.
При таком значении переменной вызывается подпрограмма 1.1, в которой совершаем какие нибудь действия. Выход организован проверкой значения переменной и присвоением переменной определенного значения. Если все вышесказанное кажется бредом не совсем понятно, посмотри на рисунок ниже. Тут я на примере двух пунктов меню показал, как изменяется значение переменной и какие действия с ней происходят когда мы нажимаем на кнопки:
Под каждую кнопку задействовано свое внешнее прерывание. Обработка нажатия кнопок у меня выглядит следующим образом:
Код обработчиков внешнийх прерыванийOk: ‘обработка нажатия кнопки “OK”
If A = 11 Or A = 12 Or A = 13 Then
A = A * 10
End If
If A = 21 Or A = 22 Or A = 23 Then
A = A * 10
End If
If A = 31 Or A = 32 Or A = 33 Then
A = A * 10
End If
If A = 41 Or A = 42 Or A = 43 Then
A = A * 10
End If
If A = 10 Or A = 20 Or A = 30 Or A = 40 Then
Incr A
End If
Return
Esc: ‘обработка нажатия кнопки “ESC”
If A = 11 Or A = 12 Or A = 13 Then
A = 10
End If
If A = 21 Or A = 22 Or A = 23 Then
A = 20
End If
If A = 31 Or A = 32 Or A = 33 Then
A = 30
End If
If A = 41 Or A = 42 Or A = 43 Then
A = 40
End If
If A > 100 Then
A = A / 10
End If
Return
Down: ‘обработка нажатия кнопки “DOWN”
If A = 10 Or A = 20 Or A = 30 Then
A = A + 10
End If
If A = 11 Or A = 12 Then
Incr A
End If
If A = 21 Or A = 22 Then
Incr A
End If
If A = 31 Or A = 32 Then
Incr A
End If
If A = 41 Or A = 42 Then
Incr A
End If
Return
Up: ‘обработка нажатия кнопки “UP”
If A = 20 Or A = 30 Or A = 40 Then
A = A – 10
End If
If A = 12 Or A = 13 Then
Decr A
End If
If A = 22 Or A = 23 Then
Decr A
End If
If A = 32 Or A = 33 Then
Decr A
End If
If A = 42 Or A = 43 Then
Decr A
End If
Return
Такая логика дает во-первых жесткую привязку выполняемых действий при нажатии кнопки, в зависимости от предыдущего значения переменной. Что гарантирует точное выполнение кода. А во-вторых, легко добавить или убрать необходимые пункты и подпункты, подстраивая меню под свой проект.
В главном цикле программы, в зависимости от значения переменной, будет происходить отрисовка меню и выполняемых операций. Тут все зависит от фантазии и применяемого дисплея.В своем примере я применил алфавитно-цифровой 4-х строчный дисплей и микроконтроллер Atmega64. Почему такой жирный камень? Просто в нем есть необходимое количество внешних прерываний, и с ним нормально работает протеус. А вообще программа получилась размером чуть больше 4 кб, поэтому можно использовать контроллеры со значительно меньшей флэш памятью. А если сделать принудительный опрос кнопок, то не обязательно будет использовать микроконтроллер с большим числом внешних прерываний. В общем, на вкус и цвет… Схема подключения дисплея и кнопок ниже:
Итак, при старте программы, переменная имеет значение 10. Это значение переменной соответствует первому пункту меню, нарисуем напротив этого пункта курсор. Например так:
Код отрисовки выделения первого пункта меню у меня такой:
Подпрограмма вывода на дисплей выделения курсором первого пункта меню10: ‘подпрограмма отрисовки на дисплее выделения первого пункта
Lcd “label 1 <” ‘в первой строке нарисовали курсор
Lowerline ‘пишем на второй строке
Lcd “label 2”
Thirdline ‘пишем на третьей строке
Lcd “label 3”
Fourthline ‘пишем на четвертой строке
Lcd “label 4”
Return ‘возвращаемся в основной цикл программы
Теперь жмем на кнопку “Down”, переменная увеличивается, и нужно нарисовать движение курсора вниз: остановимся например на третьем пункте, при этом значение переменной будет А=30:
Подпрограмма вывода на дисплей выделения курсором третьего пункта меню30: ‘подпрограмма при А=30
Lcd “label 1”
Lowerline
Lcd “label 2”
Thirdline
Lcd “label 3 <” ‘курсор напротив третьего пункта
Fourthline
Lcd “label 4”
Return ‘возвращаемся в основной цикл программы
Вот что будет на дисплее:
При нажатии на кнопку “OK” переменная станет равна 31. На дисплее отобразится вход в подменю. В шапке отобразим родителя (пункт откуда пришли):
Подпрограмма вывода на дисплей выделения курсором третьего пункта меню31: ‘подпрограмма при А=31
Lcd ” label 3″
Lowerline
Lcd “label 3.1 <“
Thirdline
Lcd “label 3.2”
Fourthline
Lcd “label 3.3”
Return ‘возвращаемся в основной цикл программы
При повторном нажатии кнопки “OK” переменная станет равна 310, и произойдет выполнение подпрограммы, какой угодно, например просто выведем надпись “Run program 3.1” на дисплей:
310: ‘подпрограмма при А=310
Lcd “RUN PROGRAM 3.1” ‘выводим надпись
Return ‘возвращаемся в основной цикл программы
При нажатии на кнопку “ESC” переменная изменится и произойдет выход из этой подпрограммы. Ну а дальше принцип думаю ясен. Как видишь, организовать свое меню, не такая уж непосильная задача как может показаться. Удачи!
Ниже можно скачать архив с моделью в Proteus, исходник и откомпилированный файл:
СКАЧАТЬ
UPD: если нет протеуса, то для просмотра работы меню сгодится симулятор самого bascom-avr, как его заюзать писалось ранее
Взято с: avrproject.ru
Категория: AVR
Метки:
Написать коментарий
*
= 5 + 6
Добавить изображение
Последние статьи |
Information
The topic you requested is included in another documentation set. For convenience, it's displayed below. Choose Switch to see the topic in its original location.
DXGI Enumerations
This section contains info about the enumerations provided by DXGI.
In this section
TopicDescription
DXGI_ADAPTER_FLAG
Identifies the type of DXGI adapter.
DXGI_ALPHA_MODE
Identifies the alpha value, transparency behavior, of a surface.
DXGI_COLOR_SPACE_TYPE
Specifies color space types.
DXGI_COMPUTE_PREEMPTION_GRANULARITY
Identifies the granularity at which the graphics processing unit (GPU) can be preempted from performing its current compute task.
DXGI_DEBUG_RLO_FLAGS
Flags used with ReportLiveObjects to specify the amount of info to report about an object's lifetime.
DXGI_FEATURE
Specifies a range of hardware features, to be used when checking for feature support.
DXGI_FORMAT
Resource data formats, including fully-typed and typeless formats. A list of modifiers at the bottom of the page more fully describes each format type.
DXGI_FRAME_PRESENTATION_MODE
Indicates options for presenting frames to the swap chain.
DXGI_GRAPHICS_PREEMPTION_GRANULARITY
Identifies the granularity at which the GPU can be preempted from performing its current graphics rendering task.
DXGI_HDR_METADATA_TYPE
Specifies the header metadata type.
DXGI_INFO_QUEUE_MESSAGE_CATEGORY
Values that specify categories of debug messages.
DXGI_INFO_QUEUE_MESSAGE_SEVERITY
Values that specify debug message severity levels for an information queue.
DXGI_MEMORY_SEGMENT_GROUP
Specifies the memory segment group to use.
DXGI_MODE_ROTATION
Flags that indicate how the back buffers should be rotated to fit the physical rotation of a monitor.
DXGI_MODE_SCALING
Flags indicating how an image is stretched to fit a given monitor's resolution.
DXGI_MODE_SCANLINE_ORDER
Flags indicating the method the raster uses to create an image on a surface.
DXGI_MULTIPLANE_OVERLAY_YCbCr_FLAGS
Options for swap-chain color space.
DXGI_OFFER_RESOURCE_FLAGS
Specifies flags for the OfferResources1 method.
DXGI_OFFER_RESOURCE_PRIORITY
Identifies the importance of a resource’s content when you call the IDXGIDevice2::OfferResources method to offer the resource.
DXGI_OUTDUPL_POINTER_SHAPE_TYPE
Identifies the type of pointer shape.
DXGI_OVERLAY_COLOR_SPACE_SUPPORT_FLAG
Specifies support for overlay color space.
DXGI_OVERLAY_SUPPORT_FLAG
Specifies overlay support to check for in a call to IDXGIOutput3::CheckOverlaySupport.
DXGI_RECLAIM_RESOURCE_RESULTS
Specifies result flags for the ReclaimResources1 method.
DXGI_RESIDENCY
Flags indicating the memory location of a resource.
DXGI_SCALING
Identifies resize behavior when the back-buffer size does not match the size of the target output.
DXGI_SWAP_CHAIN_COLOR_SPACE_SUPPORT_FLAG
Specifies color space support for the swap chain.
DXGI_SWAP_CHAIN_FLAG
Options for swap-chain behavior.
DXGI_SWAP_EFFECT
Options for handling pixels in a display surface after calling IDXGISwapChain1::Present1.
Related topics
DXGI Reference
Show: |
filter -package:base -package:text package:ghc
filter, applied to a predicate and a list, returns the list of those elements that satisfy the predicate; i.e.,
filter p xs = [ x | x <- xs, p x]
>>> filter odd [1, 2, 3]
[1,3]
Replaces constraint tuple names with corresponding boxed ones.
Filter the CFG with a custom function f. Paramaeters are `f from to edgeInfo`
Filter out any TyVars mentioned in an EqSpec.
Given a TyCon and a list of argument types, filter out any Inferred arguments.
Given a TyCon and a list of argument types, filter out any invisible (i.e., Inferred or Specified) arguments.
Go through all class declarations and filter their sub-declarations
Filter out declarations that we don't handle in Haddock
filters an AvailInfo by the given predicate
filters AvailInfos by the given predicate |
using .find() to find the index of an item in an array of arrays
:information_source: Attention Topic was automatically imported from the old Question2Answer platform.
:bust_in_silhouette: Asked By ShroudedFox
So I have an array lets say its organised like this
var array = [[[node], [19, 0, 0], "there"], [[node], [13, 2, 2], "here"]
im looking to find the array index that contains “here”
so i want to use .find() to return the value 1
in documentation it says
int find ( Variant what, int from=0 )
for some reason just cant get my head around how to use it to search in a layered array
like i could right a function like so
var array = [[[node], [19, 0, 0], "there"], [[node], [13, 2, 2], "here"]
func find_Index(search_for):
var i = 0
while i < array.size():
if array [i][2] == search_for:
return (i)
i += 1
return (-1)
but i want to learn how to use .find becasue it seems simpler :S
:bust_in_silhouette: Reply From: Tim Martin
You could change to for i in range(array.size()):
And to if array[i].find(search_for) != -1: if you don’t want to force the thing you’re searching for to be always the third element of the nested arrays.
Otherwise, your implementation looks good to me. You need your own function here as you need to make it work with your custom data structure.
:bust_in_silhouette: Reply From: Ahmed
Hi, I’m new in GDScript please correct me if I’m wrong.
The find method in the Array class there is a limitation, it can’t search an item inside an array (Nested Array).
If you do this
var array = [[["this"], [19, 0, 0], "there"], [["node"], [13, 2, 2], "here"]]
for i in range(array.size()):
print("Item[" + String(i) + "] = " + String(array[i]))
Result would be:_
Item[0] = [[this], [19, 0, 0], there]
Item[1] = [[node], [13, 2, 2], here]]
So you have write your custom search for that particular Array. |
Home
Example mathematical formula Excel
%3CLINGO-SUB%20id%3D%22lingo-sub-282841%22%20slang%3D%22en-US%22%3EExample%20mathematical%20formula%20Excel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-282841%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22%22%3EI%20have%20to%20write%20this%20formula%20in%20excel%20365%2C%20if%20the%20value%20of%20cell%20A1%20is%26gt%3B%2010%20and%20%26lt%3B20%20shows%20the%20value%20contained%20in%20cell%20A2.%20W%3CSPAN%20class%3D%22short_text%22%3E%3CSPAN%3Ehat%20is%20the%20solution.%3C%2FSPAN%3E%20Thank%20you%3C%2FSPAN%3E%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-282841%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EExcel%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-283009%22%20slang%3D%22en-US%22%3ERe%3A%20Example%20mathematical%20formula%20Excel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-283009%22%20slang%3D%22en-US%22%3E%3CP%3EFirst%20of%20all%20I%20am%20using%20the%20Turkish%20version%20of%20Excel%20so%20the%20%22%3B%22%20signs%20in%20the%20formula%20may%20need%20to%20be%20changed%20to%20%22%2C%22.%20secondly%20if%20you%20mean%20using%20the%20same%20formula%20in%20a%20different%20cell%20with%20different%20control%20it%20can%20be.%20How%20ever%20if%20you%20want%20to%20check%20a%20second%20condition%20when%20the%20first%20one%20is%20not%20true%20you%20need%20to%20write%20nested%20ifs%20like%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3DIF(AND(A1%26gt%3B10%2C%20A1%26lt%3B10)%3BA2%3BIF(AND(A3%26gt%3B20%2C%20A3%26lt%3B40)%3BA5%3B%22%22)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eor%20if%20you%20have%202019%20version%20you%20can%20use%20single%20command%20(not%20sure%20though)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3DIFS(%3CSPAN%3EAND(A1%26gt%3B10%2C%20A1%26lt%3B10)%2CA2%2C(AND(A3%26gt%3B20%2C%20A3%26lt%3B40)%2CA5)%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-282983%22%20slang%3D%22en-US%22%3ERe%3A%20Example%20mathematical%20formula%20Excel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-282983%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22%22%3E%3CSPAN%3Eto%20add%20the%20same%20formula%20for%20another%20cell%3F%3C%2FSPAN%3E%3CSPAN%3EExample%3A%20%3D%20IF%20(AND%20(A1%26gt%3B%2010%3B%20A1%20%26lt%3B20)%3B%20A2%3B%20%22%22)%20(A3%26gt%3B%2020%3B%20A3%20%26lt%3B40)%3B%20A5%3B%20%22%22).%3C%2FSPAN%3E%3CBR%20%2F%3Ethank%20you%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-282847%22%20slang%3D%22en-US%22%3ERe%3A%20Example%20mathematical%20formula%20Excel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-282847%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBelow%20formula%20would%20work%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3DIF(AND(A1%26gt%3B10%3BA1%26lt%3B20)%3BA2%3B%22%22)%3C%2FP%3E%3C%2FLINGO-BODY%3E
Deleted
Not applicable
I have to write this formula in excel 365, if the value of cell A1 is> 10 and <20 shows the value contained in cell A2. What is the solution. Thank you
3 Replies
Hello,
Below formula would work:
=IF(AND(A1>10;A1<20);A2;"")
to add the same formula for another cell?Example: = IF (AND (A1> 10; A1 <20); A2; "") (A3> 20; A3 <40); A5; "").
thank you
First of all I am using the Turkish version of Excel so the ";" signs in the formula may need to be changed to ",". secondly if you mean using the same formula in a different cell with different control it can be. How ever if you want to check a second condition when the first one is not true you need to write nested ifs like
=IF(AND(A1>10, A1<10);A2;IF(AND(A3>20, A3<40);A5;"")
or if you have 2019 version you can use single command (not sure though)
=IFS(AND(A1>10, A1<10),A2,(AND(A3>20, A3<40),A5)
Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
35 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies |
gototopgototop
Photos
HostGator
EnglishMagyar
Home > Technology > > Cockpit > Pilot Flight Stick
Pilot Flight Stick Print E-mail
(16 votes, average 4.06 out of 5)
Written by Sabc
Article Index
Switch Functions
Forum Discussion
Related Articles
The control stick of the pilot is traditionally placed in the F-15E, i.e. it protrudes from the floor of the pilot cockpit between the pilot's knees. The height of the stick is 30 inches from the floor - an average male pilot can grab it comfortably with his forearm more or less horizontal. The stick is strictly for the right hand: it is twisted left at about 30 degrees in order to create a comfortable hold. The distance between the ACES II ejection seat and the stick is about 5 inches.
argaiv1761
The shape of the stick grip is very ergonomical. It is designed for a gloved right hand (and not for a small one), that's why it is thick and big - it is 8 inches long from the base of the grip to the very top of the stick - looking clumsy for the first glance. There is no wrist rest, the pilot has to actively hold it during flight, however the pilot can hook his thumb on the base of the auto acquisition switch (see picture below) thus letting his hand rest a bit. The following photo illustrates my smaller than average hand (holding a Suncom F-15E Talon stick, which is an exact replica of the F-15E stick) against the size of the stick.
pilot_stick_hand
The F-15E utilizes a semi-fly-by-wire flight control system, so stick input is fed to the system electronically, no mechanical links exist between the stick and the flight control surfaces. The stick moves the control surfaces in a traditional way, i.e. longitudinal stick movement results in horizontal stabilator deflection (from a level flight, pulling the stick back makes the aircraft raise its nose and climb, pushing the stick forward makes the aircraft lower its nose and descend), while lateral stick movement results in adverse aileron deflection (pushing the stick left makes the aircraft roll left, pushing the stick right makes the aircraft roll right).
Directly underneath the stick grip, a huge grey box is mounted, this is the stick force sensor box, which senses the force the pilot deflects the stick with and feeds this input to AFCS (Automatic Flight Control System). It does not mean that the stick senses only deflection force and does not move in itself (like in an F-16) - it can be moved around in the space available between the knees of the pilot. Stick deflection translates to electronical signals for the AFCS and by moving the stick the pilot mechanically moves parts (linkages, rods, cables, etc.) which lead to the control surfaces as well. Thus the F-15E has double steering control: if AFCS fails, the jet still can be steered mechanically and vice versa, if the mechanical steering system fails, AFCS is still there to control the jet. In normal operation they work together for a smooth, fully optimized flying experience.
Since F-15E control was designed to utilize a full-blown HOTAS system, the grip itself hosts lots of buttons and switches, see picture below.
pilot_stick_functions
1
2
3
4
- Castle Switch
- Trim Switch
- Auto Acquisition Switch
- Paddle Switch
5
6
7
- Nosewheel Steering Button
- Gun Trigger
- Weapon Release Button
The functions of these switches and buttons are the following:
Switch Functions
1 - Castle Switch: This switch has lots of functions. Tipping it in a direction scrolls the image on the MPD (or MPCD) in command to the given direction. The castle switch can also be used to put an MPD ( MPCD) in command: to do this the castle switch should be pressed down first momentarily, then it must be tipped in the direction of the MPD ( MPCD) to be put in command: tip left for left MPD, tip right for right MPD, tip aft for MPCD.
When tipped in conjunction with the coolie hat on the throttle (the coolie hat must be tipped down simultaneously) it can make the NAV FLIR snap look: tip forward to snap look down, tip aft to snap look up, tip left to snap look left, tip right to snap look right.
When tipped in conjunction with the master caution light it can be used to display the caution control screens on one of the MPD's ( MPCD): while keeping the master caution light pressed, tip left for left MPD, tip right for right MPD, tip aft for MPCD.
2 - Trim Switch: This is what it's name tells: it is used to make steering trims during flight. Tipping it forward makes the aircraft lower its nose, tipping it backward makes the aircraft raising its nose, while tipping it sideways makes the aircraft lower its respective wing. If pressed down it engages the manual 1 program of the CMD (i.e. releases chaff).
3 - Auto Acquisition Switch: This switch handles the most functions on the pilot stick, which is logical, since it is the switch which can be handled by the thumb of the pilot the most easily while grasping the stick. Besides the ability to be pressed, the auto acquisition switch can be tipped forward and aft as well. The exact function triggered by pushing and tipping it depends on which 'mode' the aircraft is currently in. Here is a list of the different 'modes' and functions available:
• During in-flight refueling, pressing the switch down disengages the refueling probe (if connected).
• When TSD is displayed on the MPD/ MPCD in command, tipping the switch forward and aft creates smaller and larger target cue footprints (i.e. the area around the target which will appear on a HRM), respectively, while pressing the switch down returns to the present position map.
• When viewing a HRM or an RBM, tipping the switch forward sets a smaller window, tipping the switch aft sets a larger window, while pressing the switch down rejects current mode (or performs an MN reset if the cursor function is MN update). In addition to these tipping the switch aft when viewing a HRM enables/disables pattern steering line if cursor function is target.
• When using the targeting FLIR in manual mode, tipping the switch forward alternates between narrow and wide FOV's, tipping the switch aft returns to cueing mode, while pressing the switch down alternates between track and untrack modes (or performs an MN reset if the cursor function is MN update).
• When a guided A/G weapon view is displayed, tipping the switch forward cages/uncages the weapon's seeker head. Pushing the switch down enables slewing, while releasing the switch issues a track command.
• In connection with the A/G HUD, tipping the switch aft toggles between some A/G bombing modes (AUTO/ CDIP, CDIP/DIRECT).
• When A/A radar screen is displayed on the MPD/ MPCD in command, tipping the switch forward toggles between some A/A radar search modes ( SS/ BST, HDTWS/ RAM), tipping the switch aft toggles between other A/A radar search modes (vertical scan, normal TWS), while pressing the switch down rejects current mode.
4 - Paddle Switch: This switch can be pressed (pulled back) momentarily and continuously. If pressed momentarily during flight it disengages autopilot. If pressed momentarily on the ground ( WOW is sensed) it terminates AFCS BIT. If pressed and held during flight it can be used (with conjunction to stick movement) to override the terrain following system with manual stick steering. If pressed and held on the ground it disengages nose wheel steering (done by rudder pedals when WOW is sensed).
5 - Nosewheel Steering Button: If pressed and held on the ground ( WOW is sensed) it puts nose wheel steering in maneuver mode, that is extreme wheel turns can be achieved - this is useful when making sharp turns during taxiing. If pressed in A/A master mode it cages the seeker head of the missile and uncages it when released. If pressed in A/G master mode it does the same (cage/uncage) with a guided weapon's seeker head.
6 - Gun Trigger: This trigger has two detents. Pressing it to the first detent starts camera video, pressing it to the second detent fires the gun (provided that the master arm switch is 'ON'). Releasing the trigger stops camera/gunfire.
7 - Weapon Release Button: When pressed momentarily, this button lets loose whatever weapon is set for release (drop A/G ordnance, launch A/A missile, etc. Pressing this button when not in weapon release mode enables programmed recording with VTRS (on-board video recorder).
Forum Discussion
You can discuss this article in the Strike Eagle Forum with the latest posts appearing here below as well. Clicking on the 'Discuss' button takes you to the SEF, while clicking on the 'Quick Post' text enables you to make a post here right away.
Article discussions are available for registered users only!
Last Updated on Tuesday, 07 September 2010
You need to login or register to post comments.
Discuss...
Login
Advertisement |
Chapter 2- Healthy Lifestyle
Health, Fitness and Exercise:
Health:
A complete state of physical and mental well-being and not merely the absence of disease or infirmity.
Life related
Fitness:
The ability to meet the demands of the environment without undue fatigue.
Sport related
Health-related fitness:
The physical components of fitness that are considered essential to provide the individual with health and the complete state of physical well-being such as flexibility, aerobic or cardiovascular fitness and basic anaerobic fitness.
VO2 max:
The maximum amount of oxygen that can be taken in, and used, per kg of bodyweight.
Exercise:
A physical acitivity that produces a positive physiological adaptation. Exercise is deemed to be essential to achieve and maintain a good level of health.
The positive benefits to achieving Health and/or Fitness:
Psychological benefits of fat loss:
• Increased motivation
• A general feeling of mental well-being
• Increased concentration
• Increased ability to deal with stress
• Increased confidence
Energy Expenditure and Fat Loss:
Exercise within the context of fitness:
• Improved fitness components
• Weight loss
Exercise within the context of health:
• Weight management
• Improved cardiovascular and/or cardiorespiratory efficiency and functioning
• Improved rang of movement (ROM)
IF ENERGY IN = ENERGY OUT - BODY WEIGHT MAINTAINED
IF ENERGY IN GREATER THAN ENERGY OUT - STORE AS BODY FAT
IF ENERGY IN LESS HAN ENERGY OUT - FAT LOSS
Rate of fat loss:
Should be steady and slow- sustainable as body is able to adapt to changes.
Reducing calories:
• Loses fluids
• Become more efficent at surviving on less calories, less calories than before to carry out certain activites
• Hold onto essential elements such as fat and lose less essential such as lean muscle mass
• Ensure muscle burns fewer fat calories
• Lower basal metabolic rate (BMR)
Basal metabolic rate (BMR)- the speed at which your body converts and uses calories to fuel activites.
Factors that will rasie BMR:
• Eating small, frequent meals
• Exercise
• Muscle mass
• Age (peak- mid 20s)
• Height
• Pregnancy
• Environment- extremes
• Hormones
• Smoking/Caffeine
Problems of CHD:
The fat deposits will begin to reduce the available lumen of the blood vessel. The attachment of fatty plaques will reduce the elasticity of the artery.
Reduced space within the blood vessel means that heart rate increases and blood pressure increses. Reduced elasticity means the artery is not able to respond to increases in blood flow in order to maintain a constant blood pressure. As a result, the artery may rupture or there will be a blockage within the artery starving the brain or the heart which can lead to stroke or a heart attack.
Exercise can help, if it is low intensity then fats will make up a significant proportion of energy used, restricting storing and build up of fatty deposits. If intensity is high, surges of blood will flush the arteries.
Osteoporosis:
Bones become more fragile, if left untreated the bone will continue to weaken until it breaks. Bones that break as a result of osteoporosis can cause prolonged or permanent disability or even death.
Bone is a living tissue that responds to exercise…
Comments
No comments have yet been made |
mixedFontLabel {ape}R Documentation
Mixed Font Labels for Plotting
Description
This function helps to format labels with bits of text in different font shapes (italics, bold, or bolditalics) and different separators. The output is intended to be used for plotting.
Usage
mixedFontLabel(..., sep = " ", italic = NULL, bold = NULL,
parenthesis = NULL,
always.upright = c("sp.", "spp.", "ssp."))
Arguments
...
vectors of mode character to be formatted. They may be of different lengths in which case the shortest ones are recycled.
sep
a vector of mode character giving the separators to be printed between the elements in ....
italic
a vector of integers specifying the elements in ... to be printed in italics.
bold
id. in boldface.
parenthesis
id. within parentheses.
always.upright
of vector of mode character giving the strings to not print in italics. Use always.upright = "" to cancel this option.
Details
The idea is to have different bits of text in different vectors that are put together to make a vector of R expressions. This vector is interpreted by graphical functions to format the text. A simple use may be mixedFontLabel(genus, species, italic = 1:2), but it is more interesting when mixing fonts (see examples).
To have an element in bolditalics, its number must given in both italic and bold.
The vector returned by this function may be assigned as the tip.label element of a tree of class "phylo", or even as its node.label element.
Value
A vector of mode expression.
Author(s)
Emmanuel Paradis
See Also
makeLabel, makeNodeLabel, label2table, updateLabel, checkLabel
Examples
tr <- read.tree(text = "((a,(b,c)),d);")
genus <- c("Gorilla", "Pan", "Homo", "Pongo")
species <- c("gorilla", "spp.", "sapiens", "pygmaeus")
geo <- c("Africa", "Africa", "World", "Asia")
tr$tip.label <- mixedFontLabel(genus, species, geo, italic = 1:2,
parenthesis = 3)
layout(matrix(c(1, 2), 2))
plot(tr)
tr$tip.label <- mixedFontLabel(genus, species, geo, sep = c(" ", " | "),
italic = 1:2, bold = 3)
plot(tr)
layout(1)
[Package ape version 5.5 Index] |
Great Sand Dunes National Monument
• Located between the San Juan and Sangre de Cristo Mountains in Southwestern Colorado’s San Luis Valley• Over 12,000 to...
Medano Creek Fluvial Process• Seasonal stream that runs through the national monument• Created from mo...
Different flows of Medano Creek Drying up Light Flow Heavy Flow
Wind (aeolian) Transportation Arid Land• Dunes are created by a combination of wind patterns. Nor...
Aeolian Transportation Diagram
Different Types of DunesBarchan Star Dune Seifs Transverse Dunes
Where all the Sand Came From Glacial Modification of Terrain• During the Pleistocene Epoch the San Luis M...
Glacier of a Mountain Glacial Plucking Alluvial Fan Cau...
Upcoming SlideShare
Loading in...5
×
Geography Final Project
224
Published on
THE PICTURES AND DIAGRAMS IN THIS PRESENTATION DO NOT BELONG TO ME. This information and presentation is being used for educational purposes only.
Published in: Education, Business, Technology
0 Comments
0 Likes
Statistics
Notes
• Be the first to comment
• Be the first to like this
No Downloads
Views
Total Views
224
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds
No notes for slide
Geography Final Project
1. 1. Great Sand Dunes National Monument
2. 2. • Located between the San Juan and Sangre de Cristo Mountains in Southwestern Colorado’s San Luis Valley• Over 12,000 to 130,000 years old (exact time they formed is unknown)• Approximately 42,000 acres• Composed of black magnetite, pink feldspar, red and tan sandstone, green epidote, white quartz, and many other minerals.
3. 3. Medano Creek Fluvial Process• Seasonal stream that runs through the national monument• Created from mountain run off and seasonal rain, this determines the volume of flow.• Moisture from the creek keeps dunes stabilized so they don’t move• “Conveyor belt for sand”- flow carries sand downstream and when the creek dries up the wind blows the sand back to the dunes
4. 4. Different flows of Medano Creek Drying up Light Flow Heavy Flow
5. 5. Wind (aeolian) Transportation Arid Land• Dunes are created by a combination of wind patterns. Northeast wind blows strongly across the valley, weaker winds blow southwest through a gap in the mountains• Particles are moved by saltation and traction or in other words bounced and rolled• The surface layer moves slowly downward as a result of saltation, this is called creep• When the sand is deposited (known as aeolian deposition) it creates a sand dune
6. 6. Aeolian Transportation Diagram
7. 7. Different Types of DunesBarchan Star Dune Seifs Transverse Dunes
8. 8. Where all the Sand Came From Glacial Modification of Terrain• During the Pleistocene Epoch the San Luis Mountains were covered in glaciers• Relatively warm summers during this time and the melting glacier seasonally flooded the valley• Glacial plucking occurred as the glaciers moved down the mountain which is when the glacier picks up rocks and sand• Meltwater carried tons of sand that the glaciers had scoured from the mountains and deposited it in an alluvial fan• Winter winds carried the sand across the valley• The Sangre de Cristo Mountains blocked the wind and the sand piled up forming the dunes.
9. 9. Glacier of a Mountain Glacial Plucking Alluvial Fan Caused from Meltwater Sand Dunes are Formed Wind Blowing and Moving Sand
1. A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.
× |
Commit c837d1d7 authored by cdanger's avatar cdanger
Browse files
Merge branch 'GH-38' into develop
Conflicts:
pdp-engine/src/main/java/org/ow2/authzforce/core/pdp/impl/policy/CoreRefPolicyProvider.java
pdp-io-xacml-json/src/test/java/org/ow2/authzforce/core/pdp/io/xacml/json/test/JsonProfileConformanceV3Test.java
pom.xml
parents 802b390e aa856904
......@@ -131,7 +131,7 @@ Then instantiate a PDP engine configuration with method [PdpEngineConfiguration#
```xml
<?xml version="1.0" encoding="UTF-8"?>
<pdp xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://authzforce.github.io/core/xmlns/pdp/6.0" version="6.0.0">
<pdp xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://authzforce.github.io/core/xmlns/pdp/7.0" version="7.0.0">
<rootPolicyProvider id="rootPolicyProvider" xsi:type="StaticRootPolicyProvider" policyLocation="${PARENT_DIR}/policy.xml" />
</pdp>
```
......
<?xml version="1.0" encoding="UTF-8"?>
<pdp xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://authzforce.github.io/core/xmlns/pdp/6.0" version="6.0.0">
<rootPolicyProvider id="rootPolicyProvider" xsi:type="StaticRootPolicyProvider" policyLocation="${PARENT_DIR}/IIA001/Policy.xml" />
<pdp
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns="http://authzforce.github.io/core/xmlns/pdp/7.0"
version="7.0.0">
<policyProvider
id="rootPolicyProvider"
xsi:type="StaticPolicyProvider">
<policyLocation>${PARENT_DIR}/IIA001/Policy.xml</policyLocation>
</policyProvider>
<rootPolicyRef>urn:oasis:names:tc:xacml:2.0:conformance-test:IIA1:policy</rootPolicyRef>
<ioProcChain>
<requestPreproc>urn:ow2:authzforce:feature:pdp:request-preproc:xacml-json:default-lax</requestPreproc>
<resultPostproc>urn:ow2:authzforce:feature:pdp:result-postproc:xacml-json:default</resultPostproc>
......
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
<project
xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd">
<modelVersion>4.0.0</modelVersion>
<parent>
<groupId>org.ow2.authzforce</groupId>
......
......@@ -43,8 +43,10 @@ import org.ow2.authzforce.core.pdp.api.HashCollections;
import org.ow2.authzforce.core.pdp.api.ImmutableDecisionRequest;
import org.ow2.authzforce.core.pdp.api.IndeterminateEvaluationException;
import org.ow2.authzforce.core.pdp.api.expression.ExpressionFactory;
import org.ow2.authzforce.core.pdp.api.policy.CloseablePolicyProvider;
import org.ow2.authzforce.core.pdp.api.policy.PolicyVersionPatterns;
import org.ow2.authzforce.core.pdp.api.policy.PrimaryPolicyMetadata;
import org.ow2.authzforce.core.pdp.api.policy.RootPolicyProvider;
import org.ow2.authzforce.core.pdp.api.policy.TopLevelPolicyElementType;
import org.ow2.authzforce.core.pdp.api.value.AttributeBag;
import org.ow2.authzforce.core.pdp.api.value.Bag;
import org.ow2.authzforce.core.pdp.api.value.Bags;
......@@ -79,26 +81,13 @@ public final class BasePdpEngine implements CloseablePdpEngine
Map<AttributeFqn, AttributeBag<?>> get();
}
private static final StandardEnvironmentAttributeIssuer NULL_STD_ENV_ATTRIBUTE_ISSUER = new StandardEnvironmentAttributeIssuer()
{
private static final StandardEnvironmentAttributeIssuer NULL_STD_ENV_ATTRIBUTE_ISSUER = () -> null;
@Override
public Map<AttributeFqn, AttributeBag<?>> get()
{
return null;
}
};
private static final StandardEnvironmentAttributeIssuer DEFAULT_TZ_BASED_STD_ENV_ATTRIBUTE_ISSUER = new StandardEnvironmentAttributeIssuer()
{
@Override
public Map<AttributeFqn, AttributeBag<?>> get()
{
private static final StandardEnvironmentAttributeIssuer DEFAULT_TZ_BASED_STD_ENV_ATTRIBUTE_ISSUER = () -> {
/*
* Set the standard current date/time attribute according to XACML core spec:
* "This identifier indicates the current time at the context handler. In practice it is the time at which the request context was created." (§B.7). XACML standard (§10.2.5) says: "If
* values for these attributes are not present in the decision request, then their values MUST be supplied by the context handler".
* "This identifier indicates the current time at the context handler. In practice it is the time at which the request context was created." (§B.7). XACML standard (§10.2.5) says: "If values
* for these attributes are not present in the decision request, then their values MUST be supplied by the context handler".
*/
// current datetime in default timezone
final DateTimeValue currentDateTimeValue = new DateTimeValue(new GregorianCalendar());
......@@ -111,7 +100,6 @@ public final class BasePdpEngine implements CloseablePdpEngine
// current time
StandardEnvironmentAttribute.CURRENT_TIME.getFQN(),
Bags.singletonAttributeBag(StandardDatatypes.TIME, TimeValue.getInstance((XMLGregorianCalendar) currentDateTimeValue.getUnderlyingValue().clone()), AttributeSources.PDP));
}
};
private static class NonIssuedLikeIssuedAttributeHandlingRequestBuilder implements DecisionRequestBuilder<ImmutableDecisionRequest>
......@@ -211,15 +199,10 @@ public final class BasePdpEngine implements CloseablePdpEngine
StandardEnvironmentAttribute.CURRENT_TIME.getFQN(),
Bags.emptyAttributeBag(StandardDatatypes.TIME, newReqMissingStdEnvAttrException(StandardEnvironmentAttribute.CURRENT_TIME.getFQN())));
private static final RequestAndPdpIssuedNamedAttributesMerger REQUEST_OVERRIDES_ATTRIBUTES_MERGER = new RequestAndPdpIssuedNamedAttributesMerger()
{
@Override
public Map<AttributeFqn, AttributeBag<?>> merge(final Map<AttributeFqn, AttributeBag<?>> pdpIssuedAttributes, final Map<AttributeFqn, AttributeBag<?>> requestAttributes)
{
private static final RequestAndPdpIssuedNamedAttributesMerger REQUEST_OVERRIDES_ATTRIBUTES_MERGER = (pdpIssuedAttributes, requestAttributes) -> {
/*
* Request attribute values override PDP issued ones. Do not modify pdpIssuedAttributes directly as this may be used for other requests (Multiple Decision Profile) as well. so we must
* not modify it but clone it before individual decision request processing.
* Request attribute values override PDP issued ones. Do not modify pdpIssuedAttributes directly as this may be used for other requests (Multiple Decision Profile) as well. so we must not
* modify it but clone it before individual decision request processing.
*/
if (pdpIssuedAttributes == null)
{
......@@ -235,20 +218,20 @@ public final class BasePdpEngine implements CloseablePdpEngine
/**
*
* XACML standard (§10.2.5) says: "If values for these [the standard environment attributes, i.e. current-time, current-date, current-dateTime] attributes are not present in the
* decision request, then their values MUST be supplied by the context handler ". In our case, "context handler" means the PDP. In other words, the attribute values come from request
* by default, or from the PDP if (and *only if* in this case) they are not set in the request. More precisely, if any of these standard environment attributes is provided in the
* request, none of the PDP values is used, even if some policy requires one that is missing from the request. Indeed, this is to avoid such case when the decision request specifies at
* least one date/time attribute, e.g. current-time, but not all of them, e.g. not current-dateTime, and the policy requires both the one(s) provided and the one(s) not provided. In
* this case, if the PDP provides its own value(s) for the missing attributes (e.g. current-dateTime), this may cause some inconsistencies since we end up having date/time attributes
* coming from two different sources/environments (current-time and current-dateTime for instance).
* XACML standard (§10.2.5) says: "If values for these [the standard environment attributes, i.e. current-time, current-date, current-dateTime] attributes are not present in the decision
* request, then their values MUST be supplied by the context handler ". In our case, "context handler" means the PDP. In other words, the attribute values come from request by default, or
* from the PDP if (and *only if* in this case) they are not set in the request. More precisely, if any of these standard environment attributes is provided in the request, none of the PDP
* values is used, even if some policy requires one that is missing from the request. Indeed, this is to avoid such case when the decision request specifies at least one date/time
* attribute, e.g. current-time, but not all of them, e.g. not current-dateTime, and the policy requires both the one(s) provided and the one(s) not provided. In this case, if the PDP
* provides its own value(s) for the missing attributes (e.g. current-dateTime), this may cause some inconsistencies since we end up having date/time attributes coming from two different
* sources/environments (current-time and current-dateTime for instance).
*/
if (requestAttributes.containsKey(StandardEnvironmentAttribute.CURRENT_DATETIME.getFQN()) || requestAttributes.containsKey(StandardEnvironmentAttribute.CURRENT_DATE.getFQN())
|| requestAttributes.containsKey(StandardEnvironmentAttribute.CURRENT_TIME.getFQN()))
{
/*
* Request has at least one standard env attribute -> make sure all PDP values are ignored (overridden by STD_ENV_RESET_MAP no matter whether requestAttributes contains all of them
* or not)
* Request has at least one standard env attribute -> make sure all PDP values are ignored (overridden by STD_ENV_RESET_MAP no matter whether requestAttributes contains all of them or
* not)
*/
// mappings in order of increasing priority
return HashCollections.newUpdatableMap(pdpIssuedAttributes, STD_ENV_RESET_MAP, requestAttributes);
......@@ -256,21 +239,14 @@ public final class BasePdpEngine implements CloseablePdpEngine
// mappings in order of increasing priority
return HashCollections.newUpdatableMap(pdpIssuedAttributes, requestAttributes);
}
};
private static final RequestAndPdpIssuedNamedAttributesMerger PDP_OVERRIDES_ATTRIBUTES_MERGER = new RequestAndPdpIssuedNamedAttributesMerger()
{
@Override
public Map<AttributeFqn, AttributeBag<?>> merge(final Map<AttributeFqn, AttributeBag<?>> pdpIssuedAttributes, final Map<AttributeFqn, AttributeBag<?>> requestAttributes)
{
private static final RequestAndPdpIssuedNamedAttributesMerger PDP_OVERRIDES_ATTRIBUTES_MERGER = (pdpIssuedAttributes, requestAttributes) -> {
// PDP issued attribute values override request attribute values
/*
* Do not modify pdpIssuedAttributes directly as this may be used for other requests (Multiple Decision Profile) as well. so we must not modify it but clone it before individual
* decision request processing.
* Do not modify pdpIssuedAttributes directly as this may be used for other requests (Multiple Decision Profile) as well. so we must not modify it but clone it before individual decision
* request processing.
*/
if (pdpIssuedAttributes == null)
{
......@@ -287,21 +263,10 @@ public final class BasePdpEngine implements CloseablePdpEngine
// mappings of pdpIssuedAttributes have priority
return HashCollections.newUpdatableMap(requestAttributes, pdpIssuedAttributes);
}
};
private static final RequestAndPdpIssuedNamedAttributesMerger REQUEST_ONLY_ATTRIBUTES_MERGER = new RequestAndPdpIssuedNamedAttributesMerger()
{
@Override
public Map<AttributeFqn, AttributeBag<?>> merge(final Map<AttributeFqn, AttributeBag<?>> pdpIssuedAttributes, final Map<AttributeFqn, AttributeBag<?>> requestAttributes)
{
// PDP values completely ignored
return requestAttributes == null ? null : HashCollections.newUpdatableMap(requestAttributes);
}
};
private static final RequestAndPdpIssuedNamedAttributesMerger REQUEST_ONLY_ATTRIBUTES_MERGER = (pdpIssuedAttributes, requestAttributes) -> requestAttributes == null ? null
: HashCollections.newUpdatableMap(requestAttributes);
private final RootPolicyEvaluator rootPolicyEvaluator;
private final RequestAndPdpIssuedNamedAttributesMerger reqAndPdpIssuedAttributesMerger;
......@@ -427,7 +392,7 @@ public final class BasePdpEngine implements CloseablePdpEngine
}
@Override
protected DecisionResult evaluate(DecisionRequest request, StandardEnvironmentAttributeIssuer pdpStdEnvAttributeIssuer)
protected DecisionResult evaluate(final DecisionRequest request, final StandardEnvironmentAttributeIssuer pdpStdEnvAttributeIssuer)
{
assert request != null;
LOGGER.debug("Evaluating Individual Decision Request: {}", request);
......@@ -476,7 +441,7 @@ public final class BasePdpEngine implements CloseablePdpEngine
}
@Override
protected DecisionResult evaluate(DecisionRequest individualDecisionRequest, StandardEnvironmentAttributeIssuer pdpStdEnvAttributeIssuer)
protected DecisionResult evaluate(final DecisionRequest individualDecisionRequest, final StandardEnvironmentAttributeIssuer pdpStdEnvAttributeIssuer)
{
assert individualDecisionRequest != null;
LOGGER.debug("Evaluating Individual Decision Request: {}", individualDecisionRequest);
......@@ -587,7 +552,7 @@ public final class BasePdpEngine implements CloseablePdpEngine
}
@Override
protected DecisionResult evaluate(DecisionRequest individualDecisionRequest, StandardEnvironmentAttributeIssuer pdpStdEnvAttributeIssuer)
protected DecisionResult evaluate(final DecisionRequest individualDecisionRequest, final StandardEnvironmentAttributeIssuer pdpStdEnvAttributeIssuer)
{
assert individualDecisionRequest != null && pdpStdEnvAttributeIssuer != null;
return evaluate(individualDecisionRequest, pdpStdEnvAttributeIssuer.get());
......@@ -626,8 +591,14 @@ public final class BasePdpEngine implements CloseablePdpEngine
*
* @param xacmlExpressionFactory
* XACML Expression parser/factory - mandatory
* @param rootPolicyProvider
* Root Policy Provider - mandatory
* @param policyProvider
* Policy Provider - mandatory
* @param rootPolicyId
* root Policy(Set) ID
* @param rootPolicyElementType
* type of root policy element (XACML Policy or XACML PolicySet)
* @param rootPolicyVersionPatterns
* version pattern to be matched by root policy version
* @param decisionCache
* (optional) decision response cache
* @param strictAttributeIssuerMatch
......@@ -642,12 +613,23 @@ public final class BasePdpEngine implements CloseablePdpEngine
* @throws java.io.IOException
* error closing the root policy Provider when static resolution is to be used
*/
public BasePdpEngine(final ExpressionFactory xacmlExpressionFactory, final RootPolicyProvider rootPolicyProvider, final boolean strictAttributeIssuerMatch,
public BasePdpEngine(final ExpressionFactory xacmlExpressionFactory, final CloseablePolicyProvider<?> policyProvider, final Optional<TopLevelPolicyElementType> rootPolicyElementType,
final String rootPolicyId, final Optional<PolicyVersionPatterns> rootPolicyVersionPatterns, final boolean strictAttributeIssuerMatch,
final StandardEnvironmentAttributeSource stdEnvAttributeSource, final Optional<DecisionCache> decisionCache) throws IllegalArgumentException, IOException
{
final RootPolicyEvaluators.Base candidateRootPolicyEvaluator = new RootPolicyEvaluators.Base(xacmlExpressionFactory, rootPolicyProvider);
final RootPolicyEvaluators.Base candidateRootPolicyEvaluator = new RootPolicyEvaluators.Base(policyProvider, rootPolicyElementType, rootPolicyId, rootPolicyVersionPatterns,
xacmlExpressionFactory);
// Use static resolution if possible
final RootPolicyEvaluator staticRootPolicyEvaluator = candidateRootPolicyEvaluator.toStatic();
final RootPolicyEvaluator staticRootPolicyEvaluator;
try
{
staticRootPolicyEvaluator = candidateRootPolicyEvaluator.toStatic();
}
catch (final IndeterminateEvaluationException e)
{
throw new IllegalArgumentException(
rootPolicyElementType + " '" + rootPolicyId + "' matching version (pattern): " + (rootPolicyVersionPatterns.isPresent() ? rootPolicyVersionPatterns.get() : "latest"), e);
}
if (staticRootPolicyEvaluator == null)
{
this.rootPolicyEvaluator = candidateRootPolicyEvaluator;
......@@ -688,8 +670,8 @@ public final class BasePdpEngine implements CloseablePdpEngine
*/
public BasePdpEngine(final PdpEngineConfiguration configuration) throws IllegalArgumentException, IOException
{
this(configuration.getXacmlExpressionFactory(), configuration.getRootPolicyProvider(), configuration.isStrictAttributeIssuerMatchEnabled(), configuration.getStdEnvAttributeSource(),
configuration.getDecisionCache());
this(configuration.getXacmlExpressionFactory(), configuration.getPolicyProvider(), configuration.getRootPolicyElementType(), configuration.getRootPolicyId(),
configuration.getRootPolicyVersionPatterns(), configuration.isStrictAttributeIssuerMatchEnabled(), configuration.getStdEnvAttributeSource(), configuration.getDecisionCache());
}
@Override
......
......@@ -42,7 +42,7 @@ import com.google.common.collect.ListMultimap;
import oasis.names.tc.xacml._3_0.core.schema.wd_17.AttributeDesignatorType;
/**
* AttributeProvider that tries to resolve attributes in current request context first, else delegates to {@link DesignatedAttributeProvider}s.
* AttributeProvider that tries to resolve attributes in current request context first, else delegates to {@link NamedAttributeProvider}s.
*
* @version $Id: $
*/
......@@ -97,7 +97,8 @@ public class ModularAttributeProvider implements AttributeProvider
if (selectedAttributeSupport == null)
{
designatorModsByAttrId = attributeProviderModulesByAttributeId;
} else
}
else
{
final ListMultimap<AttributeFqn, NamedAttributeProvider> mutableModsByAttrIdMap = ArrayListMultimap.create(selectedAttributeSupport.size(), 1);
for (final AttributeDesignatorType requiredAttr : selectedAttributeSupport)
......@@ -206,7 +207,8 @@ public class ModularAttributeProvider implements AttributeProvider
LOGGER.debug("Values of attribute {}, type={} returned by attribute Provider module #{} (cached in context): {}", attributeFqn, datatype, attrProviders, result);
issuedToNonIssuedAttributeCopyMode.process(attributeFqn, result, context);
return result;
} catch (final IndeterminateEvaluationException e)
}
catch (final IndeterminateEvaluationException e)
{
/*
* This error does not necessarily matter, it depends on whether the attribute is required, i.e. MustBePresent=true for AttributeDesignator/Selector So we let
......@@ -248,7 +250,8 @@ public class ModularAttributeProvider implements AttributeProvider
*/
context.putNamedAttributeValueIfAbsent(attributeFqn, result);
return result;
} catch (final UnsupportedOperationException e)
}
catch (final UnsupportedOperationException e)
{
/*
* Should not happen, this is highly unexpected and should be considered a fatal error (it means the AttributeProvider does not respect its contract)
......
......@@ -54,8 +54,9 @@ import org.ow2.authzforce.core.pdp.api.expression.ExpressionFactory;
import org.ow2.authzforce.core.pdp.api.func.FirstOrderFunction;
import org.ow2.authzforce.core.pdp.api.func.Function;
import org.ow2.authzforce.core.pdp.api.io.XacmlJaxbParsingUtils;
import org.ow2.authzforce.core.pdp.api.policy.CloseableRefPolicyProvider;
import org.ow2.authzforce.core.pdp.api.policy.RootPolicyProvider;
import org.ow2.authzforce.core.pdp.api.policy.CloseablePolicyProvider;
import org.ow2.authzforce.core.pdp.api.policy.PolicyVersionPatterns;
import org.ow2.authzforce.core.pdp.api.policy.TopLevelPolicyElementType;
import org.ow2.authzforce.core.pdp.api.value.AttributeValueFactory;
import org.ow2.authzforce.core.pdp.api.value.AttributeValueFactoryRegistry;
import org.ow2.authzforce.core.pdp.api.value.Datatype;
......@@ -73,6 +74,7 @@ import org.ow2.authzforce.core.pdp.impl.func.StandardFunction;
import org.ow2.authzforce.core.xmlns.pdp.InOutProcChain;
import org.ow2.authzforce.core.xmlns.pdp.Pdp;
import org.ow2.authzforce.core.xmlns.pdp.StandardEnvironmentAttributeSource;
import org.ow2.authzforce.core.xmlns.pdp.TopLevelPolicyElementRef;
import org.ow2.authzforce.xacml.identifiers.XacmlDatatypeId;
import org.ow2.authzforce.xmlns.pdp.ext.AbstractAttributeProvider;
import org.ow2.authzforce.xmlns.pdp.ext.AbstractDecisionCache;
......@@ -95,7 +97,7 @@ public final class PdpEngineConfiguration
private static final IllegalArgumentException ILLEGAL_USE_STD_FUNCTIONS_ARGUMENT_EXCEPTION = new IllegalArgumentException(
"useStandardFunctions = true not allowed if useStandardDatatypes = false");
private static final IllegalArgumentException NULL_ROOTPOLICYPROVIDER_ARGUMENT_EXCEPTION = new IllegalArgumentException("Undefined rootPolicyProvider");
private static final IllegalArgumentException NULL_POLICYPROVIDER_ARGUMENT_EXCEPTION = new IllegalArgumentException("Undefined policyProvider");
// the logger we'll use for all messages
private static final Logger LOGGER = LoggerFactory.getLogger(BasePdpEngine.class);
......@@ -132,21 +134,13 @@ public final class PdpEngineConfiguration
return attrProviderModBuilder.getInstance(jaxbConf, envProps);
}
private static <JAXB_CONF extends AbstractPolicyProvider> CloseableRefPolicyProvider newRefPolicyProvider(final JAXB_CONF jaxbConf, final XmlnsFilteringParserFactory xacmlParserFactory,
private static <JAXB_CONF extends AbstractPolicyProvider> CloseablePolicyProvider<?> newPolicyProvider(final JAXB_CONF jaxbConf, final XmlnsFilteringParserFactory xacmlParserFactory,
final int maxPolicySetRefDepth, final ExpressionFactory xacmlExprFactory, final CombiningAlgRegistry combiningAlgRegistry, final EnvironmentProperties envProps)
{
final CloseableRefPolicyProvider.Factory<JAXB_CONF> refPolicyProviderModFactory = PdpExtensions.getRefPolicyProviderFactory((Class<JAXB_CONF>) jaxbConf.getClass());
final CloseablePolicyProvider.Factory<JAXB_CONF> refPolicyProviderModFactory = PdpExtensions.getRefPolicyProviderFactory((Class<JAXB_CONF>) jaxbConf.getClass());
return refPolicyProviderModFactory.getInstance(jaxbConf, xacmlParserFactory, maxPolicySetRefDepth, xacmlExprFactory, combiningAlgRegistry, envProps);
}
private static <JAXB_CONF extends AbstractPolicyProvider> RootPolicyProvider newRootPolicyProvider(final JAXB_CONF jaxbConf, final XmlnsFilteringParserFactory xacmlParserFactory,
final ExpressionFactory xacmlExprFactory, final CombiningAlgRegistry combiningAlgRegistry, final Optional<CloseableRefPolicyProvider> refPolicyProvider,
final EnvironmentProperties envProps)
{
final RootPolicyProvider.Factory<JAXB_CONF> rootPolicyProviderFactory = PdpExtensions.getRootPolicyProviderFactory((Class<JAXB_CONF>) jaxbConf.getClass());
return rootPolicyProviderFactory.getInstance(jaxbConf, xacmlParserFactory, xacmlExprFactory, combiningAlgRegistry, refPolicyProvider, envProps);
}
private static <JAXB_CONF extends AbstractDecisionCache> DecisionCache newDecisionCache(final JAXB_CONF jaxbConf, final AttributeValueFactoryRegistry attValFactories,
final EnvironmentProperties envProps)
{
......@@ -159,7 +153,13 @@ public final class PdpEngineConfiguration
private final ExpressionFactory xacmlExpressionFactory;
private final RootPolicyProvider rootPolicyProvider;
private final CloseablePolicyProvider<?> policyProvider;
private final String rootPolicyId;
private final Optional<TopLevelPolicyElementType> rootPolicyElementType;
private final Optional<PolicyVersionPatterns> rootPolicyVersionPatterns;
private final boolean strictAttributeIssuerMatch;
......@@ -189,12 +189,12 @@ public final class PdpEngineConfiguration
* Check required args
*/
/*
* Root policy provider
* Policy provider
*/
final AbstractPolicyProvider rootPolicyProviderJaxbConf = pdpJaxbConf.getRootPolicyProvider();
final AbstractPolicyProvider rootPolicyProviderJaxbConf = pdpJaxbConf.getPolicyProvider();
if (rootPolicyProviderJaxbConf == null)
{
throw NULL_ROOTPOLICYPROVIDER_ARGUMENT_EXCEPTION;
throw NULL_POLICYPROVIDER_ARGUMENT_EXCEPTION;
}
/*
......@@ -221,11 +221,13 @@ public final class PdpEngineConfiguration
if (datatypeExtensionIdentifiers.isEmpty())
{
attValFactoryRegistry = stdRegistry;
} else
}
else
{
attValFactoryRegistry = new ImmutableAttributeValueFactoryRegistry(HashCollections.newImmutableSet(stdRegistry.getExtensions(), datatypeExtensions));
}
} else
}
else
{
attValFactoryRegistry = new ImmutableAttributeValueFactoryRegistry(datatypeExtensions);
}
......@@ -255,7 +257,8 @@ public final class PdpEngineConfiguration
try
{
maxVarRefDepth = bigMaxVarRefDepth == null ? -1 : bigMaxVarRefDepth.intValueExact();
} catch (final ArithmeticException e)
}
catch (final ArithmeticException e)
{
throw new IllegalArgumentException("Invalid maxVariableRefDepth: " + bigMaxVarRefDepth, e);
}
......@@ -292,12 +295,14 @@ public final class PdpEngineConfiguration
if (nonGenericFunctionExtensionIdentifiers.isEmpty())
{
functionRegistry = stdRegistry;
} else
}
else
{
functionRegistry = new ImmutableFunctionRegistry(HashCollections.newImmutableSet(stdRegistry.getNonGenericFunctions(), nonGenericFunctionExtensions),
stdRegistry.getGenericFunctionFactories());
}
} else
}
else
{
functionRegistry = new ImmutableFunctionRegistry(nonGenericFunctionExtensions, null);
}
......@@ -331,11 +336,13 @@ public final class PdpEngineConfiguration
if (algExtensions.isEmpty())
{
combiningAlgRegistry = StandardCombiningAlgorithm.REGISTRY;
} else
}
else
{
combiningAlgRegistry = new ImmutableCombiningAlgRegistry(HashCollections.newImmutableSet(StandardCombiningAlgorithm.REGISTRY.getExtensions(), algExtensions));
}
} else
}
else
{
combiningAlgRegistry = new ImmutableCombiningAlgRegistry(algExtensions);
}
......@@ -348,7 +355,8 @@ public final class PdpEngineConfiguration
try
{
maxPolicySetRefDepth = bigMaxPolicyRefDepth == null ? -1 : bigMaxPolicyRefDepth.intValueExact();
} catch (final ArithmeticException e)
}
catch (final ArithmeticException e)
{
throw new IllegalArgumentException("Invalid maxPolicyRefDepth: " + bigMaxPolicyRefDepth, e);
}
......@@ -359,29 +367,29 @@ public final class PdpEngineConfiguration
xacmlExpressionFactory = new DepthLimitingExpressionFactory(attValFactoryRegistry, functionRegistry, attProviderFactories, maxVarRefDepth, enableXPath, strictAttributeIssuerMatch);
/*
* Policy Reference processing - Policy-by-reference Provider
* Policy Provider
*/
final AbstractPolicyProvider refPolicyProviderJaxbConf = pdpJaxbConf.getRefPolicyProvider();
final Optional<CloseableRefPolicyProvider> refPolicyProvider;
if (refPolicyProviderJaxbConf == null)
{
refPolicyProvider = Optional.empty();
} else
{
refPolicyProvider = Optional.of(newRefPolicyProvider(refPolicyProviderJaxbConf, xacmlParserFactory, maxPolicySetRefDepth, xacmlExpressionFactory, combiningAlgRegistry, envProps));
}
final AbstractPolicyProvider policyProviderJaxbConf = pdpJaxbConf.getPolicyProvider();
policyProvider = newPolicyProvider(policyProviderJaxbConf, xacmlParserFactory, maxPolicySetRefDepth, xacmlExpressionFactory, combiningAlgRegistry, envProps);
final TopLevelPolicyElementRef rootPolicyRef = pdpJaxbConf.getRootPolicyRef();
/*
* Root Policy Provider
* PDP XSD assumed to ensure rootPolicyRef is defined
*/
rootPolicyProvider = newRootPolicyProvider(rootPolicyProviderJaxbConf, xacmlParserFactory, xacmlExpressionFactory, combiningAlgRegistry, refPolicyProvider, envProps);
assert rootPolicyRef != null;
final Boolean mustBePolicySet = rootPolicyRef.isPolicySet();
this.rootPolicyElementType = mustBePolicySet == null ? Optional.empty()
: mustBePolicySet.booleanValue() ? Optional.of(TopLevelPolicyElementType.POLICY_SET) : Optional.of(TopLevelPolicyElementType.POLICY);
this.rootPolicyId = rootPolicyRef.getValue();
this.rootPolicyVersionPatterns = Optional.ofNullable(new PolicyVersionPatterns(rootPolicyRef.getVersion(), null, null));
// Decision cache
final AbstractDecisionCache decisionCacheJaxbConf = pdpJaxbConf.getDecisionCache();
if (decisionCacheJaxbConf == null)
{
decisionCache = Optional.empty();
} else
}
else
{
decisionCache = Optional.of(newDecisionCache(decisionCacheJaxbConf, attValFactoryRegistry, envProps));
}
......@@ -391,7 +399,8 @@ public final class PdpEngineConfiguration
try
{
this.clientReqErrVerbosityLevel = clientReqErrVerbosityBigInt == null ? 0 : clientReqErrVerbosityBigInt.intValueExact();
} catch (final ArithmeticException e)
}
catch (final ArithmeticException e)
{
throw new IllegalArgumentException("Invalid clientRequestErrorVerbosityLevel: " + clientReqErrVerbosityBigInt, e);
}
......@@ -401,7 +410,8 @@ public final class PdpEngineConfiguration
if (inoutProcChains.isEmpty())
{
this.ioProcChainsByInputType = Collections.emptyMap();
} else
}
else
{
final Map<Class<?>, Entry<DecisionRequestPreprocessor<?, ?>, DecisionResultPostprocessor<?, ?>>> mutableInoutProcChainsByInputType = HashCollections
.newUpdatableMap(inoutProcChains.size());
......@@ -414,7 +424,8 @@ public final class PdpEngineConfiguration
if (resultPostprocId == null)
{
decisionResultPostproc = null;
} else
}
else
{
final DecisionResultPostprocessor.Factory<?, ?> resultPostprocFactory = PdpExtensions.getExtension(DecisionResultPostprocessor.Factory.class, resultPostprocId);
decisionResultPostproc = resultPostprocFactory.getInstance(clientReqErrVerbosityLevel);
......@@ -464,7 +475,8 @@ public final class PdpEngineConfiguration
try
{
pdpJaxbConf = modelHandler.unmarshal(confXmlSrc, Pdp.class);
} catch (final JAXBException e)
}
catch (final JAXBException e)
{
throw new IllegalArgumentException("Invalid PDP configuration file", e);
}
......@@ -546,7 +558,8 @@ public final class PdpEngineConfiguration
{
final File confFile = ResourceUtils.getFile(confLocation);
return getInstance(confFile, modelHandler);
} catch (final FileNotFoundException e)
}
catch (final FileNotFoundException e)
{
if (LOGGER.isInfoEnabled())
{
......@@ -563,7 +576,8 @@ public final class PdpEngineConfiguration
try
{
confUrl = ResourceUtils.getURL(confLocation);
} catch (final FileNotFoundException e)
}
catch (final FileNotFoundException e)
{
throw new IllegalArgumentException("Invalid PDP configuration location (neither a file in the file system nor a valid URL): " + confLocation, e);
}
......@@ -614,8 +628,8 @@ public final class PdpEngineConfiguration
* }
* </pre>
*
* We assume that this XML type is an extension of one the PDP extension base types, 'AbstractAttributeProvider' (that extends 'AbstractPdpExtension' like all other extension base
* types) in this case.
* We assume that this XML type is an extension of one the PDP extension base types, 'AbstractAttributeProvider' (that extends 'AbstractPdpExtension' like all other extension base types) in this
* case.
* @param catalogLocation
* location of XML catalog for resolving XSDs imported by the extension XSD specified as 'extensionXsdLocation' argument (may be null if 'extensionXsdLocation' is null)
* @return PDP instance
......@@ -667,8 +681,8 @@ public final class PdpEngineConfiguration
* }
* </pre>
*
* We assume that this XML type is an extension of one the PDP extension base types, 'AbstractAttributeProvider' (that extends 'AbstractPdpExtension' like all other extension base
* types) in this case.
* We assume that this XML type is an extension of one the PDP extension base types, 'AbstractAttributeProvider' (that extends 'AbstractPdpExtension' like all other extension base types) in this
* case.
* @param catalogLocation
* location of XML catalog for resolving XSDs imported by the extension XSD specified as 'extensionXsdLocation' argument (may be null if 'extensionXsdLocation' is null)
* @return PDP instance
......@@ -735,9 +749,39 @@ public final class PdpEngineConfiguration
*
* @return the Root Policy Provider
*/
public RootPolicyProvider getRootPolicyProvider()
public CloseablePolicyProvider<?> getPolicyProvider()
{ |
Diet plane
Diet The liver, the primary organ to effectively adelgaces
Eliminates toxin and increase metabolism
All organs work together to form the body and metabolism work properly. Nevertheless, one of the bodies most important to eliminate toxins, increase metabolism and debug effectively is the liver. If you want to know more about this body, do not miss this item.
The liver is an organ that provides essential functions for the body, especially metabolic functions. In fact there are metabolic diseases directly related to the activities of the liver.
Why the liver is a key organ for adelgaces effectively
The liver is essential in the process of weight loss because it performs functions related to carbohydrate metabolism, fat metabolism and protein metabolism. Moreover, detoxifying and meets depurates functions.
The liver is directly related to other organs such as the bladder, as in these bile acids are synthesized, organic substances that aid digestion and emulsification of fats.
It also helps increase metabolism, making it easier to take the fatty lipid tissue for energy when glucose is not available. Therefore, when the liver is not working properly, this favors the accumulation of fat in adipose tissue, especially at the abdomen and the liver itself, causing fatty liver.
Sometimes obesity goes hand cleansing and detoxification bad as the excessive consumption of alcohol, foods high in salt, sugar and fat-rich foods causes a toxic load on the liver. If this happens, the liver works and forcefully stimulates the accumulation of fat in the abdomen, reduces fat metabolism, promotes the onset of constipation, fluid retention and bloating.
Not surprisingly, the most deeply rooted traditions of natural medicine suggest cleanse the body in the changing seasons , as this will improve the functioning of the liver and increases metabolism.
There are many easy to prepare natural remedies that can help you achieve, especially juices, smoothies, soups or shakes; such as purifying vegetable and fruit smoothie or purifying broth .
Remember that it is very important to keep everything healthy for the process of losing weight more efficient digestive system . If you eat too fast, if you fasting for many hours or eat and drink the wrong foods, you have more chances to negatively interfere with weight loss diets.
Leave a Reply
Your email address will not be published. Required fields are marked *
This site uses Akismet to reduce spam. Learn how your comment data is processed. |
Category Archives: timing diagram of 8086
Timing diagram of 8086
Let us now discuss in detail the pin configuration of a Microprocessor. Clock signal is provided through Pin It provides timing to the processor for operations. Its frequency is different for different versions, i. During the first clock cycle, it carries bit address and after that it carries bit data.
During the first clock cycle, it carries 4-bit address and later it carries status signals. It is available at pin 34 and used to indicate the transfer of data using data bus D8-D This signal is low during the first clock cycle, thereafter it is active.
It is available at pin It is an active high signal. When it is high, it indicates that the device is ready to transfer data. When it is low, it indicates wait state. It is available at pin 21 and is used to restart the execution. It causes the processor to immediately terminate its present activity. It is an interrupt request signal, which is sampled during the last clock cycle of each instruction to determine if the processor considered this as an interrupt or not.
It stands for non-maskable interrupt and is available at pin It is an edge triggered input, which causes an interrupt request to the microprocessor.
This signal is like wait state and is available at pin When this signal is high, then the processor has to wait for IDLE state, else the execution continues.
It indicates what mode the processor is to operate in; when it is high, it works in the minimum mode and vice-aversa. It is an interrupt acknowledgement signal and id available at pin When the microprocessor receives this signal, it acknowledges the interrupt.In this mode, all the control signals are given out by the microprocessor chip itself. There is a single microprocessor in the minimum mode system.
Latches are generally buffered output D-type flip-flops like 74LS or Transreceivers are the bidirectional buffers and some times they are called as data amplifiers. The DEN signal indicates the direction of data, i.
The system contains memory for the monitor and users program storage. The working of the minimum mode configuration system can be better described in terms of the timing diagrams rather than qualitatively describing the operations.
Hence the timing diagram can be categorized in two parts, the first is the timing diagram for read cycle and the second is the timing diagram for write cycle.
timing diagram of 8086
During the negative going edge of this signal, the valid address is latched on the local bus. The BHE and A0 signals address low, high or both bytes. At T2, the address is removed from the local bus and is sent to the output. The bus is then tristated. The read RD control signal is also activated in T2. The read RD signal causes the address device to enable its data bus drivers. After RD goes low, the valid data is available on the data bus.
When the processor returns the read signal to high level, the addressed device will again tristate its bus drivers. A write cycle also begins with the assertion of ALE and the emission of the address. In T2, after sending the address in T1, the processor sends the data to be written to the addressed location.
The control of the bus is not regained by the processor until the requesting master does not drop the HOLD pin low. When the request is dropped by the requesting master, the HLDA is dropped by the processor at the trailing edge of the next clock. In this mode, the processor derives the status signal S2, S1, S0.
8086 Microprocessor Timing Diagram open Box Education
If IOB is grounded, it acts as master cascade enable to control cascade A, else it acts as peripheral data enable used in the multiple bus configurations. INTA pin used to issue two interrupt acknowledge pulses to the interrupt controller or to an interrupting device. These signals enable an IO interface to read or write the data from or to the address port. Here the only difference between in timing diagram between minimum mode and maximum mode is the status signals used and the available control and advanced command signals.
R0, S1, S2 are set at the beginning of bus cycle. These signals are activated until T4. As an address bus is 20 bits long and consists of signal lines A0 through A The 16 data bus lines D0 through D15 are actually multiplexed with address lines A0 through A15 respectively. By multiplexed we mean that the bus work as an address bus during first machine cycle and as a data bus during next machine cycles.
The four most significant address lines A19 through A16 are also multiplexed but in this case with status signals S6 through S3. Bit S4 and S3 together from a 2 bit binary code that identifies which of the internal segment registers are used to generate the physical address that was output on the address bus during the current bus cycle. Status line S5 reflects the status of another internal characteristic of the The maximum mode defines pins 24 to 31 as follows:.
QS 1QS 0 output : These two output signals reflect the status of the instruction queue. This status indicates the activity in the queue during the previous clock cycle. By using bus request signal another master, can request for the system bus and processor communicate. In the maximum mode additional circuitry is required to translate the control signals. It also generates the control signals required to direct the data flow and for controlling latches and transceivers. The Intel bus controller is used to implement this control circuitry.
MWTC Memory Write Command : It instructs the memory to accept the data on the data bus and load the data into the addressed memory location. AEN causes the to enable the memory control signals. CEN control enable input enables the command output pins on the This gives slow interfaces an extra clock cycle to prepare to input the data. The Bus Timing Diagram of of input and output transfers are shown in the Fig. August 17, Intel is a bit HMOS microprocessor. It is available in 40 pin DIP chip.
It uses a 5V DC supply for its operation.
timing diagram of 8086
The uses line address bus. It has a line data bus. The 20 lines of the address bus operate in multiplexed mode. The low order address bus lines have been multiplexed with data and 4 high-order address bus lines have been multiplexed with status signals. These are low order address bus. They are multiplexed with data. S2, S1, S0 : Status pins. These pins are active during T4, T1 and T2 states and is returned to passive state 1,1,1 during T3 or Tw when ready is inactive.
Any change in S2, S1, S0 during T4 indicates the beginning of a bus cycle. During T1 it is low. It is used to enable data onto the most significant half of data bus, D8-D It is multiplexed with status signal S7. S7 signal is available during T2, T3 and T4.
It is an output signal. It is active when low. READY : This is the acknowledgement from the memory or slow device that they have completed the data transfer. The signal made available by the devices is synchronized by the A clock generator to provide ready input to the microprocessor. The signal is active high 1. This is triggered input. This is sampled during the last clock cycles of each instruction for determining the availability of the request.
If any interrupt request is found pending, the processor enters the interrupt acknowledge cycle. This can be internally masked after resulting the interrupt enable flag. This signal is active high 1 and has been synchronized internally. NMI : Non maskable interrupt.
This is an edge triggered input which results in a type II interrupt. A subroutine is then vectored through an interrupt vector lookup table which is located in the system memory. NMI is non-maskable internally by software. A transition made from low 0 to high 1 initiates the interrupt at the end of the current instruction. This input has been synchronized internally. INTA : Interrupt acknowledge.Pin definitions from 24 to 31 are different for minimum mode and maximum mode.
By using these pins the itself generates all bus control signals in the Minimum Mode Configuration of These signals are :.
Microprocessor - 8086 Pin Configuration
It consists of two negative going pulses in two consecutive bus cycles. The first pulse informs the interface that its request has been recognized and upon receipt of the second pulse, the interface is to send the interrupt type to the processor over the data bus. High on this pin indicates that the is transmitting the data and low indicates that the is receiving the data.
At the same time, processor tristates the system bus. A low on HOLD gives the system bus control back to the processor. Processor then outputs low signal on HLDA. These signals are demultiplexed by external latches and ALE signal — generated by the processor. The provides noninverting outputs while the version inverts the input data. In addition to their demultiplexing function, these chips also buffer the address lines, providing increased output driving capability.
The output low level is specified as 0. The high level is specified as 2. The Intel device is used to implement the transceiver block shown in Fig. The contains 16 tristate elements, eight receivers, and eight drivers. Therefore two s are required to service 16 data lines of When this signal is low, receivers are enabled, so that can read data from memory or input device.
Due to this drivers are enabled to transfer data from to the memory or the output device. At the time of data transfer, to enable output of transceiver its OE should be low. The third component. The clock generator does the following functions.Minimum Mode System. Minimum mode system. If it is received active by the processor before T4 of the previous cycle or during T1 state of the current cycle, the CPU activates HLDA in the next clock cycle and for succeeding bus cycles, the bus will be given to another requesting master.
The control of the bus is not regained by the processor until the requesting master does not drop the HOLD pin low. When the request is dropped by the requesting master, the HLDA is dropped by the processor at the trailing edge of the next clock. Maximum Mode System. Memory Write Timing in Maximum mode of Login New User. Sign Up. Forgot Password? New User? Continue with Google Continue with Facebook. Gender Male Female. Create Account. Already Have an Account? Full Screen.
In this mode, all the control signals are given out by the microprocessor chip itself. There is a single microprocessor in the minimum mode system. Latches are generally buffered output D-type flip-flops like 74LS or Transceivers are the bidirectional buffers and some times they are called as data amplifiers. The DEN signal indicates the direction of data, i.
Minimum and Maximum Mode 8086 System - Microprocessors and Microcontrollers | EduRev Notes
The system contains memory for the monitor and users program storage. Write Cycle Timing Diagram for Minimum Mode The working of the minimum mode configuration system can be better described in terms of the timing diagrams rather than qualitatively describing the operations. The opcode fetch and read cycles are similar. Hence the timing diagram can be categorized in two parts, the first is the timing diagram for read cycle and the second is the timing diagram for write cycle.
During the negative going edge of this signal, the valid address is latched on the local bus. The BHE and A0 signals address low, high or both bytes. At T2, the address is removed from the local bus and is sent to the output.
The bus is then tristated. The read RD control signal is also activated in T2. The read RD signal causes the address device to enable its data bus drivers. After RD goes low, the valid data is available on the data bus. When the processor returns the read signal to high level, the addressed device will again tristate its bus drivers.
A write cycle also begins with the assertion of ALE and the emission of the address. In T2, after sending the address in T1, the processor sends the data to be written to the addressed location. The data remains on the bus until middle of T4 state. In this mode, the processor derives the status signal S2, S1, S0. Another chip called bus controller derives the control signal using this status information. The components in the system are same as in the minimum mode system.
These inputs to are driven by CPU.Being a Bull on BetBull yields additional rewards such as boosted odds and more publicity to your profile. Should the reply not be considered satisfactory, a further complaint may be lodged with the Gaming Authority or Regulator in line with clause 11 below.
By accepting BetBull Rules, Account Holder confirms that he has read and understood the Betting rules and that he will abide by them. We reserve the right to limit or refuse any bet, stake or other wager made by you through your account at any time. We are not obliged to give reasons for doing so but will make reasonable efforts to give reasons where possible.
Our operators are not authorised to accept bets that exceed these limits.
timing diagram of 8086
In the case of bets taken in error, the limit will stand. All limits are noted in Pounds Sterling. Any group of Players who have placed the same combination of selections and we believe have been acting as a syndicate, will be treated as one Player for the purpose of the above limits.
Monitoring of procedures is on-going and subject to compliance inspection. The process of resolution of claims and disputes between BetBull and the customer are defined by and implemented according to BetBull Procedure on Fair and Open Practice: Dispute Resolutions.
However, if a customer is dissatisfied they should inform us by communicating their complaint to us either verbally or in writing.
All complaints are taken seriously, investigated thoroughly and handled in a confidential manner. Should this not be possible we will explain why and provide a date by which the customer can expect a full response. BetBull has a requirement to submit reports of the outcome of disputes, referred to the arbitrator, to the Gambling Commission at intervals determined by the Commission either by the arbitrator or by BetBull. ENTRY INTO FORCEThese terms and conditions are effective from 09 August 2016 00:00hr.
In the case of Live Blackjack should the Player's device or connection be lost and the Player's cards are still below 16 points then another card or cards will be drawn until the points total exceeds 16 or 21. The Player will be credited with any winnings.
Pin diagram of 8086 microprocessor
No more bets will be placed after the connection is lost or a player does not communicate with the croupier for 2 minutes. However should any event be terminated, Betbull shall still respect any obligations already accepted and confirmed. BETTING RULESA bet can only be placed by a registered Player. A bet can only be placed over the Internet. A bet can only be placed by a Player if he has sufficient funds in his account with Betbull. The bet, once concluded, will be governed by the version of terms and conditions valid at the time of the bet being accepted.
A bet is deemed to have been placed as soon as confirmation of the acceptance of the betting offer from Betbull is received on the device or computer of the Player. The Player affirms that at the time he placed a bet or bets he had no knowledge as to the outcome of the respective game or that actions are being taken to affect the outcome of the games. Where there is a suspicion of a violation of this rule, Betbull retains the right to void the bet and refuse to pay out winnings.
It also retains the right to take any further action to protect its legitimate interests and to comply with other laws and regulations. Betbull retains the right to decline to accept bets without providing any reason.
The minimum and maximum bets and game rules are all available for each game offered on www. Should Betbull decide to close a Player's account, bets which have already been placed and accepted will not be voided and the Player will be paid any winnings.
A bet which has been placed and accepted cannot be amended, withdrawn or cancelled by the Player. A mistake regarding the details of a bet or bets will not influence the validity of the bet. Unless proved otherwise, these amounts are considered as final and are deemed to be accurate. The Player is fully responsible for the bets placed on Internet.
This entry was posted in timing diagram of 8086. Bookmark the permalink.
Responses to Timing diagram of 8086
Leave a Reply
Your email address will not be published. Required fields are marked * |
Select Page
ELECTROCHEMOTHERAPY
Electrochemotherapy, enables the direct delivery of chemotherapy drugs into the cancer tissue.
WHAT IS ELECTROCHEMOTHERAPY?
Cancer on a big scale, in skin and tissues underneath is very hard to detect and treat. radiotherapy is somewhat effective on these types of tumors but the success rate is low. Novel technologies contribute greatly in the treatment of these types of cancers. Electrochemotherapy is one of those.
Electrochemotherapy, enables the direct delivery of chemotherapy drugs into the cancer tissue (1,2). Two procedures are combined in this treatment:
1. First, an injection is made either intravenously or directly into the cancer tissue.
2. Second, an electrical pulse is applied.
A special probe is used to direct the pulse onto the surface of the tumor. This pulse creates holes by changing the structure of the armoured cell membranes of the cancer tissue. The structural change is called as electroporation. This technique increases the permeability of the cell membranes, allowing the chemotherapy drugs to penetrate more into the cancer tissues, thus increasing the efficiency of treatment.
On what types of cancer, electrochemotherapy can be used?
Electrochemotherapy is used on the tumors in skin and soft tissues underneath.
Which types of cancer can be treated with electrochemotherapy?
The ones that first emerge from skin or spread to skin:
• Basal cell and squamous cell skin cancer
• Malignant melanoma
• Kaposi sarcoma
• Breast cancer, spread to the skin
• Head and neck cancers, spread to the skin
• Soft tissue sarcoma
What are the details of the procedure?
Some patients can be treated on their feet whereas others might have to rest for a night at the hospital.
Chemotherapy:
• The transference of the drugs into the cancer tissues (intratumoral injection)
• The transference of the drugs into the blood stream (intravenous injection)
Injected drugs are cisplatin or bleomycin. Dosages and side effects are usually lower than the ones used in cancer treatment. The reason for this is the fact that the electrical pulses create holes on the tumor walls which enables for a more efficient transfer of drugs (1,2), in return lowering the dosage and the side effects.
Local or general anesthesia is applied according to the amount and size of the tumors and the electrical pulses, to comfort the patient.
If more than a few tumors are going to be treated, general anesthesia might be necessary.
The electrical pulse is generated by a specialized medical equipment and transfered by a pen sized probe. The probe has an electrode which directs the electrical pulse to the surface of the tumor.
The procedure takes 10 to 60 minutes, depending on the amount and size of the tumors.
What is the success rate?
According to a research involving 376 patients, half had their tumors cleared and 88 percent of all patients responded well to the treatment.
What are the side effects?
The most common side effect is the pain in the area of application, where the electrode had a contact with the skin. The pain is usually mild and lasts for a few days. Painkillers are used when necessary. Muscle spasms can be observed in some patients, which can be eliminated with adjustments to the treatment. Some spasms might interfere with respiration, triggering medical intervention. In rare occurrences, bleeding and infection at the application area can be observed.
Especially depending in the amount and size of the tumors, in and around the head and neck area, can interfere with respiration, which can lead to an airway opening to be made (tracheostromy).
Very rarely, life threatening situations and death can be seen.
If you would like further information about oncology treatments, please don't hesisate to contact us.
CONTACT US
1 + 3 =
WhatsApp chat |
Registration Dossier
Diss Factsheets
Administrative data
Workers - Hazard via inhalation route
Systemic effects
Long term exposure
Hazard assessment conclusion:
DNEL (Derived No Effect Level)
Value:
3.3 mg/m³
Most sensitive endpoint:
repeated dose toxicity
Acute/short term exposure
Hazard assessment conclusion:
DNEL (Derived No Effect Level)
Value:
13.2 mg/m³
Most sensitive endpoint:
repeated dose toxicity
DNEL related information
Local effects
Long term exposure
Hazard assessment conclusion:
DNEL (Derived No Effect Level)
Value:
3.3 mg/m³
Most sensitive endpoint:
irritation (respiratory tract)
Acute/short term exposure
Hazard assessment conclusion:
DNEL (Derived No Effect Level)
Value:
13.2 mg/m³
Most sensitive endpoint:
irritation (respiratory tract)
DNEL related information
Workers - Hazard via dermal route
Systemic effects
Long term exposure
Hazard assessment conclusion:
DNEL (Derived No Effect Level)
Value:
0.47 mg/kg bw/day
Most sensitive endpoint:
repeated dose toxicity
Acute/short term exposure
Hazard assessment conclusion:
DNEL (Derived No Effect Level)
Value:
0.47 mg/kg bw/day
Most sensitive endpoint:
repeated dose toxicity
DNEL related information
Local effects
Long term exposure
Hazard assessment conclusion:
no hazard identified
Acute/short term exposure
Hazard assessment conclusion:
no hazard identified
Workers - Hazard for the eyes
Local effects
Hazard assessment conclusion:
no hazard identified
Additional information - workers
Read-across justification
Introduction:
Reliable substance-specific information concerning the toxicity for strontium difluoride does not exist. Instead, toxicological information on very soluble inorganic fluoride (mainly sodium fluoride) substances and very soluble inorganic strontium substances were extrapolated to strontium difluoride considering that systemic effects mainly based on the concentrations of the Sr2+ and F- ions, which are the key concern of strontium difluoride.
Strontium difluoride – general considerations
Strontium difluoride completely dissolves upon contact with water to Sr2+and 2*F-. The water solubility (CRC handbook, 2008) of strontium difluoride indicates a complete dissolution and a rapid formation of Sr2+and 2*F-(210 mg/L at 25°C; logK 8.4). The pH of a saturated aqueous solution of strontium difluoride is pH 4.9. Considering that systemic human health effects of strontium difluoride are due the dissolved concentrations of Sr2+and F-in physiological solutions, read-across to very soluble (i.e., > 10 g/L at room temperature) inorganic strontium compounds and very soluble (i.e., > 10 g/L at room temperature) inorganic fluoride compounds is performedand considered to be very conservative.
In sum, data are read-across for soluble inorganic strontium substances and for different fluoride salts (mainly sodium fluoride) and avid to assess the toxicity of strontium difluoride on a conservatively basis in view of the water solubility. All read-across substances used for the assessment of strontium difluoride are more soluble (≥ 41 g/L) than strontium difluoride (210 mg/L at 25°C).Since, the toxicity of strontium difluoride is based on the concentration of strontium cations and fluoride anions in solution, read-across is considered to be conservative and unrestricted read-across is fully justified with regard to systemic toxicity.
Strontium(II):
Strontium ions are highly mobile, occur only in one valence state (2+), i.e. are not oxidized or reduced, and do not form strong complexes with most inorganic and organic ligands (Krupka et al. 1999. EPA 402-R-99-004B; Salminen et al. 2005; Carbonaro and Di Toro. 2007. Geochim Cosmochim Acta 71 3958–3968; Carbonaro et al. 2011. Geochim Cosmochim Acta 75: 2499-2511 and references therein). Thus, it may be assumed that systemic toxicological effects (not local) are related to the strontium ion.
Strontium exists in different chemical forms and the bioavailability of these forms depends on various physico-chemical parameters of which water solubility is the main determining factor. It is accepted that the actual bioavailable concentration of the strontium cation in both animals and in humans is an important determinant of toxicity, and although there is information available on the various strontium compounds, adequate information is lacking on how to quantitatively determine or estimate the bioavailable fraction of different strontium compounds in laboratory animals or humans. Since water solubility is the main determinant of bioavailability, strontium compounds with similar solubility characteristics are grouped and the systemic toxicity is read-across withinthe category “soluble inorganic strontium substances”.The respective counter-ions are not assumed to contribute significantly to any toxicity.
Fluoride:
Strontium difluoride belongs to the moderately soluble inorganic substances based on the water solubility of 210 mg/L at 25°C (CRC, 2008).It is common practice in the scientific and regulatory community to assess the physiological function and the toxicity of inorganic fluorides in general.This read-across approach was already applied in the EU Risk Assessment of hydrogen fluoride (2001) as follows: “Absorption of any inorganic fluoride is thought to be a passive process. Inorganic fluoride of any source is thought to be transported across biological membranes primarily as molecular (non-ionic thus uncharged) HF. At physiological pH (in blood, intercellular fluid, mucus) free fluoride (thus not associated with e.g. proteins or lipids) exists primarily as fluoride ion (F-); only 0.01% of the total free fluoride concentration exists as molecular HF in equilibrium with the ionic form (Anonymus 1996). The fate or effects of absorbed inorganic fluoride are independent of the fluoride source (Thiessen 1988)”.
Several national and international bodies have assessed fluoride in the past, for example the US DHHS (1991), SCOEL (1998), WHO (2002), MAK (2006 with update 2007), EFSA (2006). The two most recent reviews by MAK (focussed on worker exposure via inhalation) and EFSA (focussed on oral exposure for the general population) have been considered extensively in the preparation of the IUCLID chapter on human health toxicity and the resulting derivation of DNELs.
In animal studies, the most common inorganic fluoride salt, i.e. sodium fluoride, has been tested. Other soluble salts of fluoride, such as potassium fluoride, ammonium fluoride or also potassium hydrogen difluoride were tested in a few studies. Unrestricted read-across is possible between these substances with regards to systemic toxicity of fluoride. All fluoride substances grouped into the category “soluble inorganic fluoride substancs” are readily soluble (water solubilities of several tens or hundreds of grams per litre) and release fluoride ions F-.
The respective counter-ions are not assumed to contribute significantly to any toxicity. A Hägg-Diagram (1983) shows the speciation (as molar fractions) of the HF/F- system. Under neutral, physiologically relevant conditions, F- is the only relevant species.The Hägg-Diagram is attached on IUCLID section 5.1.2 Hydolysis "SrF2_Hägg Graph - Fluorides".
Therefore, the assessment of the systemic toxicity of strontium difluoride is based on elemental strontium and fluoride concentrations. Read-across of systemic (not local) effects data available for soluble strontium substances and soluble fluoride substances is applied since the strontium ions and fluoride ions determine the systemic toxicity potential of strontium difluoride.
General Population - Hazard via inhalation route
Systemic effects
Long term exposure
Hazard assessment conclusion:
no hazard identified
DNEL related information
Explanation for the modification of the dose descriptor starting point:
In accordance with ECHA guidance on information requirements and chemical safety assessment, Part: E: risk characterisation, version 3.0, May 2016: "DNELs for the general population may need to be derived if the substance is present in consumer - available products or is released to the environment and present as an environmental contaminant."
Acute/short term exposure
Hazard assessment conclusion:
no hazard identified
DNEL related information
Local effects
Long term exposure
Hazard assessment conclusion:
no hazard identified
Acute/short term exposure
Hazard assessment conclusion:
no hazard identified
DNEL related information
General Population - Hazard via dermal route
Systemic effects
Long term exposure
Hazard assessment conclusion:
no hazard identified
Acute/short term exposure
Hazard assessment conclusion:
no hazard identified
DNEL related information
Local effects
Long term exposure
Hazard assessment conclusion:
no hazard identified
Acute/short term exposure
Hazard assessment conclusion:
no hazard identified
General Population - Hazard via oral route
Systemic effects
Long term exposure
Hazard assessment conclusion:
no hazard identified
Acute/short term exposure
Hazard assessment conclusion:
no hazard identified
DNEL related information
General Population - Hazard for the eyes
Local effects
Hazard assessment conclusion:
no hazard identified
Additional information - General Population |
Artifact Content
Artifact a023a886a611a9e4ea774b39af47beb7ef3d9a79:
#!/usr/bin/env tclsh
# KitCreator downloader v0.2.1 -- download Tclkits created with the KitCreator
# Web Interface. Works with Tcl 8.5+ and Jim Tcl v0.75+.
# Copyright (C) 2016, dbohdan.
# License: MIT.
proc download url {
# Guess at what the buildinfo URL might be if we are given, e.g., a building
# page URL.
set url [string map {/building {}} $url]
if {![string match */buildinfo $url]} {
append url /buildinfo
}
set buildInfo [exec curl -s $url]
set filename [dict get $buildInfo filename]
append filename -[dict get $buildInfo tcl_version]
append filename -[dict get $buildInfo platform]
foreach option {staticpkgs threaded debug} {
if {[dict exists $buildInfo options $option] &&
[dict get $buildInfo options $option]} {
append filename -$option
}
}
append filename -[join [dict get $buildInfo packages] -]
set tail [file tail $url]
# We can't use [file dirname] here because it will transform
# "http://example.com" into "http:/example.com".
set baseUrl [string range $url 0 end-[string length $tail]]
if {[string index $baseUrl end] ne {/}} {
append baseUrl /
}
set tclkit $baseUrl[dict get $buildInfo filename]
puts "Downloading $tclkit to $filename..."
exec curl -o $filename $tclkit >@ stdout 2>@ stderr
file attributes $filename -permissions +x
}
set url [lindex $argv 0]
if {$url eq {}} {
puts "usage: $argv0 url"
puts {The URL must be a KitCreator Web Interface buildinfo page.}
} else {
download $url
} |
8.5 Описания Классов
8.5 Описания Классов
Класс есть тип. Его имя становится typedef-имя (см. #8.8), которое может быть использовано даже внутри самого спецификатора класса. Объекты класса состоят из последовтельности членов.
спецификатор_класса: заголовок_класса (* список_членов opt *) заголовок_класса (* список_членов opt public : спсок_членов opt *)
заголовок_класса: сост идентификатор opt сост идентификатор opt : public opt typedef-имя
сост: class struct union
Объекты классов могут присваиваться, передаваться как параметры и возвращаться функциями (за исключением объектов некоторых производных типов, см. #8.5.3). Прочие действия, которые могут быть удобны, может определить пользователь, см. #8.5.11.
Структура является классом, все члены которого общие, см. #8.5.9. Объединение является структурой, содержащей в каждый момент только один член, см. #8.5.13. Список_членов может описывать друзей (8.5.10) и члены вида: данные, фунция, класс, перечисление, поле(#8.5.13). Список_членов может также содержать описания, регулирующие видимость имен членов, см. #8.5.9.
список_членов: описание_члена список_членов opt описание_члена: спецификаторы_описания opt описатель_члена ; определение_функции ; opt описатель_члена: описатель идентификатор opt : константное_выражение
Члены, являющиеся классовыми объектами, должны быть обектами предварительно описанных классов. В частности, класс cl не может содержать объект класса cl, но он может содержать указатель на объект класса cl. Вот простой пример описания структуры:
struct tnode (* char tword[20]; int count; tnode *left; tnode *right; *);
содержащей массив из 20 символов, целое и два указателя на такие же структуры. Если было дано такое описание, то опсание
tnode s, *sp
описывает s как структуру данного сорта и sp как указатель на структуру данного сорта. При наличии этих описаний выражение
sp-»count
ссылается на поле count структуры, на которую указывает sp;
s.left
ссылается на указатель левого поддерва структуры s; а
s.right-»tword[0]
ссылается на первый символ члена tword правого поддерва стрктуры s.
Поделитесь на страничке
Следующая глава >
Похожие главы из других книг:
R.3.1 Описания и определения
Из книги автора
R.3.1 Описания и определения Описание ($$r.7) делает известным в программе одно или несколько имен. Описание считается определением, если только оно не описывает функцию без задания ее тела (§R.8.3), не содержит описателя extern (§R.7.11), не имеет части инициализации или тела функции,
R.7 Описания
Из книги автора
R.7 Описания Описания используются для интерпретации каждого из идентификаторов; необязательно, чтобы они сопровождались выделением памяти, сопоставляемой с идентификатором. Описания имеют видописания: спецификации-описания opt список-описателей
R.7.3 Описания asm
Из книги автора
R.7.3 Описания asm Описание asm имеет вид:описание-asm: asm ( строка-литерал );Назначение описания asm определяется реализацией. Обычно оно используется для передачи информации от транслятора к
R.14.5 Описания и определения
Из книги автора
R.14.5 Описания и определения Для каждого имени шаблона типа в программе должно существовать только одно определение. Описаний может быть несколько. Определение используется для создания специальных шаблонных классов и шаблонных функций, которые будут соответствовать
R.17.3 Описания
Из книги автора
R.17.3 Описания описания: спецификации-описания opt список-описателей
ПРИЧУДЛИВЫЕ ОПИСАНИЯ
Из книги автора
ПРИЧУДЛИВЫЕ ОПИСАНИЯ Язык Си позволяет вам создавать сложные формы данных. Обычно мы придерживаемся более простых форм, но считаем споим долгом указать ни потенциальные возможности языка. При создании описания мы используем имя (или "идентификатор"), которое можно
1.3 Типы и Описания
Из книги автора
1.3 Типы и Описания Каждое имя и каждое выражение имеет тип, определяющий операции, которые могут над ними производиться. Например, описаниеint inch;определяет, что inch имеет тип int, то есть, inch является целой переменной.Описание – это оператор, который вводит имя в программе.
1.4.9 Описания
Из книги автора
1.4.9 Описания Описание – это оператор, вводящий имя в программе. Оно может также инициализировать объект с этим именем. Выполнение описания означает, что когда поток управления доходит до описания, вычисляется инициализирующее выражение (инициализатор) и производится
2.1 Описания
Из книги автора
2.1 Описания Прежде чем имя (идентификатор) может быть использовано в С++ программе, он должно быть описано. Это значит, что надо задать его тип, чтобы сообщить компилятору, к какого вида сущностям относится имя. Вот несколько примеров, иллюстрирующих разнообразие
8. Описания
Из книги автора
8. Описания Описания используются для определения интерпретации, дваемой каждому идентификатору. Они не обязательно резервируют память, связанную с идентификатором. Описания имеют вид:описание: спецификаторы_описания opt список_описателей opt ; описание_имени
8.10 Описания Перечислений
Из книги автора
8.10 Описания Перечислений Перечисления являются типами int с именованными констатами.enum_спецификатор: enum идентификатор opt (* enum_список *)enum_список: перечислитель enum_список , перечислительперечислитель: идентификатор идентификатор = константное_выражениеИдентификаторы в
14.2 Описания
Из книги автора
14.2 Описания описание: спецификаторы_описания opt список_описателей opt ; описание_имени asm-описаниеописание_имени: сост идентификатор ; enum идентификатор ;сост:class struct unionasm-описание: asm ( строка ) ;спецификаторы_описания: спецификатор_описания спецификаторы_описания |
Loading presentation...
Present Remotely
Send the link below via email or IM
Copy
Present to your audience
Start remote presentation
• Invited audience members will follow you as you navigate and present
• People invited to a presentation do not need a Prezi account
• This link expires 10 minutes after you close the presentation
• A maximum of 30 users can follow your presentation
• Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
DeleteCancel
Chapit Robot
By Ella and Katrina
by
Katrina Ramiro
on 15 November 2012
Comments (0)
Please log in to add your comment.
Report abuse
Transcript of Chapit Robot
By Katrina and Ella Chapit: A Home Automation Robot Chapit is multi-functional robot that does
simple tasks such as turning on the light and a
variety of electronic devices. It is also able to
recognize a man, woman, or child without having
to do preset programming. Where is the Robot used?
And what is its work envelope? What does it do? Is it multi-functional? The robot is primarily used at homes for it is a
household robot. It's a household robot because it works
your electronics. For example, Chapit can turn on the TV
and on to your favorite channel. How is the robot taught to perform its task? The robot is a voice-recognition technology allowing it to
serve as a voice activated universal remote. So the user simply
talks to the robot saying the commands and the Chapit does it! What sensors does it have? Chapit has a built-in infrared ray sensor that detects nearby person. It features a built-in camera which allows you to video conference with your friends on webcam. While Chapit converses with the luster LED of the eye. Advantage and Disadvantages? The advantage is that it can recognize humans (man, woman,
child) without any programming, and it does basic tasks.
The disadvantage is that it is very expensive and it makes
people more languid. Impacts on intended audience. Chapit has impacted every day lives of normal people.
I think it is meant to impact the way people use their household items. With Chapit, people probably don't use remotes anymore for they just use the robot to turn on/off the TV and change the channel. As for Chapit's work envelope, it's head can nod and
tilt and it's feet can move independently from the body,
which can swivel in place. The eyes and mouth shapes are
built up of several LEDS that can display a small selection
of states, like opening and closing. Yes, Chapit is multi-functional. Not only can
it turn off/on lights and electronic devices, it can also
communicate by using simple gestures and facial
expressions. It can also update its data through mobile
phones with infrared capability or through wireless
connection. It's optional features (which are currently
under development) is a camera which can send images
to the user's cellphone, PDA, or laptop. Chapit can understand up to 10,000 different commands. What type of careers/jobs will this create for people? I guess that the Chapit could just probably
help for programmers so they could improve on the household object to make everyday life easier. It could also benefit housework jobs such as babysitting, chores, etc. In the future... Chapit could be modified to do more work in the house, like ASIMO. It could be changed to a bigger size or just keep it's small original size. Chapit could start to walk or run around in the house. Maybe it can clean your house in the future.
Full transcript |
API reference - Class PCellParameterDeclaration
Notation used in Ruby API documentation
Module: db
Description: A PCell parameter declaration
This class declares a PCell parameter by providing a name, the type and a value and additional information like description, unit string and default value. It is used in the PCellDeclaration class to deliver the necessary information.
This class has been introduced in version 0.22.
Public constructors
new PCellParameterDeclaration ptrnew(string name,
unsigned int type,
string description,
variant default = nil,
string unit = )
Create a new parameter declaration with the given name, type, default value and unit string
Public methods
void_createEnsures the C++ object is created
void_destroyExplicitly destroys the object
[const]bool_destroyed?Returns a value indicating whether the object was already destroyed
[const]bool_is_const_object?Returns a value indicating whether the reference is a const reference
void_manageMarks the object as managed by the script side.
void_unmanageMarks the object as no longer owned by the script side.
voidadd_choice(string description,
variant value)
Add a new value to the list of choices
voidassign(const PCellParameterDeclaration other)Assigns another object to self
[const]string[]choice_descriptionsReturns a list of choice descriptions
[const]variant[]choice_valuesReturns a list of choice values
voidclear_choicesClears the list of choices
[const]variantdefaultGets the default value
voiddefault=(variant value)Sets the default value
[const]stringdescriptionGets the description text
voiddescription=(string description)Sets the description
[const]new PCellParameterDeclaration ptrdupCreates a copy of self
voidhidden=(bool flag)Makes the parameter hidden if this attribute is set to true
[const]boolhidden?Returns true, if the parameter is a hidden parameter that should not be shown in the user interface
[const]variantmax_valueGets the maximum value allowed
voidmax_value=(variant value)Sets the maximum value allowed
[const]variantmin_valueGets the minimum value allowed
voidmin_value=(variant value)Sets the minimum value allowed
[const]stringnameGets the name
voidname=(string value)Sets the name
voidreadonly=(bool flag)Makes the parameter read-only if this attribute is set to true
[const]boolreadonly?Returns true, if the parameter is a read-only parameter
[const]unsigned inttypeGets the type
voidtype=(unsigned int type)Sets the type
[const]stringunitGets the unit string
voidunit=(string unit)Sets the unit string
Public static methods and constants
unsigned intTypeBooleanType code: boolean data
unsigned intTypeCallbackType code: a button triggering a callback
unsigned intTypeDoubleType code: floating-point data
unsigned intTypeIntType code: integer data
unsigned intTypeLayerType code: a layer (a LayerInfo object)
unsigned intTypeListType code: a list of variants
unsigned intTypeNoneType code: unspecific type
unsigned intTypeShapeType code: a guiding shape (Box, Edge, Point, Polygon or Path)
unsigned intTypeStringType code: string data
Deprecated methods (protected, public, static, non-static and constructors)
voidcreateUse of this method is deprecated. Use _create instead
voiddestroyUse of this method is deprecated. Use _destroy instead
[const]booldestroyed?Use of this method is deprecated. Use _destroyed? instead
[const]boolis_const_object?Use of this method is deprecated. Use _is_const_object? instead
Detailed description
TypeBoolean
Signature: [static] unsigned int TypeBoolean
Description: Type code: boolean data
Python specific notes:
The object exposes a readable attribute 'TypeBoolean'. This is the getter.
TypeCallback
Signature: [static] unsigned int TypeCallback
Description: Type code: a button triggering a callback
This code has been introduced in version 0.28.
Python specific notes:
The object exposes a readable attribute 'TypeCallback'. This is the getter.
TypeDouble
Signature: [static] unsigned int TypeDouble
Description: Type code: floating-point data
Python specific notes:
The object exposes a readable attribute 'TypeDouble'. This is the getter.
TypeInt
Signature: [static] unsigned int TypeInt
Description: Type code: integer data
Python specific notes:
The object exposes a readable attribute 'TypeInt'. This is the getter.
TypeLayer
Signature: [static] unsigned int TypeLayer
Description: Type code: a layer (a LayerInfo object)
Python specific notes:
The object exposes a readable attribute 'TypeLayer'. This is the getter.
TypeList
Signature: [static] unsigned int TypeList
Description: Type code: a list of variants
Python specific notes:
The object exposes a readable attribute 'TypeList'. This is the getter.
TypeNone
Signature: [static] unsigned int TypeNone
Description: Type code: unspecific type
Python specific notes:
The object exposes a readable attribute 'TypeNone'. This is the getter.
TypeShape
Signature: [static] unsigned int TypeShape
Description: Type code: a guiding shape (Box, Edge, Point, Polygon or Path)
Python specific notes:
The object exposes a readable attribute 'TypeShape'. This is the getter.
TypeString
Signature: [static] unsigned int TypeString
Description: Type code: string data
Python specific notes:
The object exposes a readable attribute 'TypeString'. This is the getter.
_create
Signature: void _create
Description: Ensures the C++ object is created
Use this method to ensure the C++ object is created, for example to ensure that resources are allocated. Usually C++ objects are created on demand and not necessarily when the script object is created.
_destroy
Signature: void _destroy
Description: Explicitly destroys the object
Explicitly destroys the object on C++ side if it was owned by the script interpreter. Subsequent access to this object will throw an exception. If the object is not owned by the script, this method will do nothing.
_destroyed?
Signature: [const] bool _destroyed?
Description: Returns a value indicating whether the object was already destroyed
This method returns true, if the object was destroyed, either explicitly or by the C++ side. The latter may happen, if the object is owned by a C++ object which got destroyed itself.
_is_const_object?
Signature: [const] bool _is_const_object?
Description: Returns a value indicating whether the reference is a const reference
This method returns true, if self is a const reference. In that case, only const methods may be called on self.
_manage
Signature: void _manage
Description: Marks the object as managed by the script side.
After calling this method on an object, the script side will be responsible for the management of the object. This method may be called if an object is returned from a C++ function and the object is known not to be owned by any C++ instance. If necessary, the script side may delete the object if the script's reference is no longer required.
Usually it's not required to call this method. It has been introduced in version 0.24.
_unmanage
Signature: void _unmanage
Description: Marks the object as no longer owned by the script side.
Calling this method will make this object no longer owned by the script's memory management. Instead, the object must be managed in some other way. Usually this method may be called if it is known that some C++ object holds and manages this object. Technically speaking, this method will turn the script's reference into a weak reference. After the script engine decides to delete the reference, the object itself will still exist. If the object is not managed otherwise, memory leaks will occur.
Usually it's not required to call this method. It has been introduced in version 0.24.
add_choice
Signature: void add_choice (string description, variant value)
Description: Add a new value to the list of choices
This method will add the given value with the given description to the list of choices. If choices are defined, KLayout will show a drop-down box instead of an entry field in the parameter user interface.
assign
Signature: void assign (const PCellParameterDeclaration other)
Description: Assigns another object to self
choice_descriptions
Signature: [const] string[] choice_descriptions
Description: Returns a list of choice descriptions
choice_values
Signature: [const] variant[] choice_values
Description: Returns a list of choice values
clear_choices
Signature: void clear_choices
Description: Clears the list of choices
create
Signature: void create
Description: Ensures the C++ object is created
Use of this method is deprecated. Use _create instead
Use this method to ensure the C++ object is created, for example to ensure that resources are allocated. Usually C++ objects are created on demand and not necessarily when the script object is created.
default
Signature: [const] variant default
Description: Gets the default value
Python specific notes:
The object exposes a readable attribute 'default'. This is the getter.
default=
Signature: void default= (variant value)
Description: Sets the default value
If a default value is defined, it will be used to initialize the parameter value when a PCell is created.
Python specific notes:
The object exposes a writable attribute 'default'. This is the setter.
description
Signature: [const] string description
Description: Gets the description text
Python specific notes:
The object exposes a readable attribute 'description'. This is the getter.
description=
Signature: void description= (string description)
Description: Sets the description
Python specific notes:
The object exposes a writable attribute 'description'. This is the setter.
destroy
Signature: void destroy
Description: Explicitly destroys the object
Use of this method is deprecated. Use _destroy instead
Explicitly destroys the object on C++ side if it was owned by the script interpreter. Subsequent access to this object will throw an exception. If the object is not owned by the script, this method will do nothing.
destroyed?
Signature: [const] bool destroyed?
Description: Returns a value indicating whether the object was already destroyed
Use of this method is deprecated. Use _destroyed? instead
This method returns true, if the object was destroyed, either explicitly or by the C++ side. The latter may happen, if the object is owned by a C++ object which got destroyed itself.
dup
Signature: [const] new PCellParameterDeclaration ptr dup
Description: Creates a copy of self
Python specific notes:
This method also implements '__copy__' and '__deepcopy__'.
hidden=
Signature: void hidden= (bool flag)
Description: Makes the parameter hidden if this attribute is set to true
Python specific notes:
The object exposes a writable attribute 'hidden'. This is the setter.
hidden?
Signature: [const] bool hidden?
Description: Returns true, if the parameter is a hidden parameter that should not be shown in the user interface
By making a parameter hidden, it is possible to create internal parameters which cannot be edited.
Python specific notes:
The object exposes a readable attribute 'hidden'. This is the getter.
is_const_object?
Signature: [const] bool is_const_object?
Description: Returns a value indicating whether the reference is a const reference
Use of this method is deprecated. Use _is_const_object? instead
This method returns true, if self is a const reference. In that case, only const methods may be called on self.
max_value
Signature: [const] variant max_value
Description: Gets the maximum value allowed
See max_value= for a description of this attribute.
This attribute has been added in version 0.29.
Python specific notes:
The object exposes a readable attribute 'max_value'. This is the getter.
max_value=
Signature: void max_value= (variant value)
Description: Sets the maximum value allowed
The maximum value is a visual feature and limits the allowed values for numerical entry boxes. This applies to parameters of type int or double. The maximum value is not effective if choices are present.
The maximum value is not enforced - for example there is no restriction implemented when setting values programmatically.
Setting this attribute to "nil" (the default) implies "no limit".
This attribute has been added in version 0.29.
Python specific notes:
The object exposes a writable attribute 'max_value'. This is the setter.
min_value
Signature: [const] variant min_value
Description: Gets the minimum value allowed
See min_value= for a description of this attribute.
This attribute has been added in version 0.29.
Python specific notes:
The object exposes a readable attribute 'min_value'. This is the getter.
min_value=
Signature: void min_value= (variant value)
Description: Sets the minimum value allowed
The minimum value is a visual feature and limits the allowed values for numerical entry boxes. This applies to parameters of type int or double. The minimum value is not effective if choices are present.
The minimum value is not enforced - for example there is no restriction implemented when setting values programmatically.
Setting this attribute to "nil" (the default) implies "no limit".
This attribute has been added in version 0.29.
Python specific notes:
The object exposes a writable attribute 'min_value'. This is the setter.
name
Signature: [const] string name
Description: Gets the name
Python specific notes:
The object exposes a readable attribute 'name'. This is the getter.
name=
Signature: void name= (string value)
Description: Sets the name
Python specific notes:
The object exposes a writable attribute 'name'. This is the setter.
new
Signature: [static] new PCellParameterDeclaration ptr new (string name, unsigned int type, string description, variant default = nil, string unit = )
Description: Create a new parameter declaration with the given name, type, default value and unit string
name:The parameter name
type:One of the Type... constants describing the type of the parameter
description:The description text
default:The default (initial) value
unit:The unit string
Python specific notes:
This method is the default initializer of the object.
readonly=
Signature: void readonly= (bool flag)
Description: Makes the parameter read-only if this attribute is set to true
Python specific notes:
The object exposes a writable attribute 'readonly'. This is the setter.
readonly?
Signature: [const] bool readonly?
Description: Returns true, if the parameter is a read-only parameter
By making a parameter read-only, it is shown but cannot be edited.
Python specific notes:
The object exposes a readable attribute 'readonly'. This is the getter.
type
Signature: [const] unsigned int type
Description: Gets the type
The type is one of the T... constants.
Python specific notes:
The object exposes a readable attribute 'type'. This is the getter.
type=
Signature: void type= (unsigned int type)
Description: Sets the type
Python specific notes:
The object exposes a writable attribute 'type'. This is the setter.
unit
Signature: [const] string unit
Description: Gets the unit string
Python specific notes:
The object exposes a readable attribute 'unit'. This is the getter.
unit=
Signature: void unit= (string unit)
Description: Sets the unit string
The unit string is shown right to the edit fields for numeric parameters.
Python specific notes:
The object exposes a writable attribute 'unit'. This is the setter. |
Ask Your Question
RSS
Sort by » date activity ▼ answers votes
688 questions
Tagged
• ×
• ×
29
views
no
answers
-2
votes
2019-03-29 23:22:25 -0500 p_patidar
Implement optical character recognition opencv [closed]
68
views
1
answer
no
votes
2019-03-28 04:39:20 -0500 berak
Human detection on android phones
42
views
1
answer
no
votes
2019-03-27 02:21:23 -0500 berak
OpenCV 4 without apk fields for manager
68
views
no
answers
-1
votes
2019-03-26 00:53:39 -0500 jhaprade
Opencv 4.0.1 and Android Studio 3.3.2
40
views
no
answers
no
votes
2019-03-15 22:44:20 -0500 akii0181
Implement opencv in android native c++ [closed]
34
views
no
answers
no
votes
2019-02-12 08:48:02 -0500 Newbie
Is using OpenCV Manager still the recommended approach?
34
views
no
answers
no
votes
2019-02-08 08:29:12 -0500 rem
How to remove delimitation color in picture with opencv [closed]
110
views
1
answer
no
votes
2019-02-07 07:38:11 -0500 berak
How to use setTo() in JAVA
65
views
no
answers
no
votes
2019-02-04 07:42:32 -0500 Hspraveen
How to crop particular rectangle
62
views
1
answer
1
vote
2019-02-04 02:54:48 -0500 berak
binarization of an image android
530
views
1
answer
no
votes
2019-01-27 00:20:39 -0500 Mishal077
DNN.net.forward() in Android
236
views
1
answer
no
votes
2019-01-23 05:05:02 -0500 JohnnyWang
How to fix the issue about cvCreateCameraCapture
53
views
no
answers
no
votes
2019-01-21 20:59:53 -0500 cz11@hw.ac.uk
How to add Gaussian noise in JAVA [closed]
23
views
no
answers
no
votes
2019-01-15 03:52:05 -0500 Android712
Plotting opencv coordinate to android screen
89
views
no
answers
no
votes
2019-01-11 02:38:35 -0500 Pascal66 flag of France
H264 without ffmeg
61
views
no
answers
no
votes
2019-01-10 01:31:35 -0500 Paulslp
Creating mobile application with OpenCV [closed]
71
views
no
answers
no
votes
2019-01-04 06:55:23 -0500 aniketpatidar
how to match two images [closed]
427
views
1
answer
no
votes
2018-12-19 01:40:24 -0500 david cairns flag of Australia
Glare detection in image [closed]
239
views
1
answer
no
votes
2018-12-14 05:28:20 -0500 zidek
unable to use libopencv_java4.so in android studio with c++
25
views
no
answers
no
votes
2018-12-10 16:24:58 -0500 manef
saving image using emulator [closed]
35
views
no
answers
no
votes
2018-12-06 04:19:11 -0500 deepak13
Finding height difference with precision of 1mm using open cv
65
views
1
answer
no
votes
2018-12-05 06:25:12 -0500 berak
find contours in an image?
103
views
no
answers
no
votes
2018-12-05 02:40:44 -0500 Sar
Parsing error lbfmodel.yaml file in android
131
views
1
answer
1
vote
2018-12-03 04:20:39 -0500 berak
Error while loading YAML model file using opencv in android
Contributors
jhaprade gravatar imagePascal66 gravatar imageAkhil Patel gravatar imageberak gravatar imageJohnnyWang gravatar imagealiza gravatar imagedavid cairns gravatar imageBasit Iqbal gravatar imagebern_007 gravatar imageojxsdd gravatar imageQvintus gravatar imagep_patidar gravatar imageakii0181 gravatar imagedeepak13 gravatar imageaniketpatidar gravatar imageBohdan gravatar image |
Personnalisation de l’authentification dans Django
L’authentification livrée avec Django est suffisante dans la plupart des cas, mais vous pouvez rencontrez des besoins qui ne sont pas couverts par la solution proposée par défaut. Afin de personnaliser l’authentification pour les besoins de vos projets, vous devez comprendre quels sont les points d’ancrage permettant d’étendre et de remplacer les composants du système de Django. Ce document fournit des détails sur la façon dont le système d’authentification peut être adapté.
Les moteurs d’authentification permettent d’adapter le système lorsque un nom d’utilisateur et un mot de passe stockés dans le modèle d’utilisateur doivent servir à authentifier l’utilisateur avec un autre service que celui par défaut de Django.
Vous pouvez donner des permissions personnalisées à vos modèles qui peuvent être vérifiées à travers le système d’autorisation de Django.
Vous pouvez étendre le modèle User par défaut ou le substituer par un tout autre modèle personnalisé.
Autres sources d’authentification
Dans certaines situations, il peut être nécessaire de se connecter à une autre source d’authentification, c’est-à-dire une autre source de noms d’utilisateur et de mots de passe ou d’autres méthodes d’authentification.
Par exemple, votre entreprise possède peut-être déjà une infrastructure LDAP stockant les noms d’utilisateur et mots de passe pour tous ses employés. Il serait fastidieux aussi bien pour l’administrateur réseau que pour les utilisateurs eux-mêmes de devoir gérer des comptes séparés dans LDAP et dans les applications basées sur Django.
Ainsi, pour faire face à ce genre de situations, le système d’authentification de Django vous permet de brancher d’autres sources d’authentification. Vous pouvez surcharger le système par défaut de Django basé sur la base de données ou vous pouvez utiliser le système par défaut en parallèle avec d’autres systèmes.
Consultez la référence sur les moteurs d’authentification pour plus d’informations sur les moteurs d’authentification intégrés à Django.
Définition de moteurs d’authentification
En arrière-plan, Django maintient une liste de « moteurs d’authentification » qu’il sollicite lors de l’authentification. Lorsque quelqu’un appelle django.contrib.auth.authenticate() comme expliqué ci-dessus dans Comment connecter un utilisateur, Django tente une authentification avec chaque moteur d’authentification. Si la première méthode d’authentification échoue, Django essaie avec la deuxième et ainsi de suite jusqu’à ce que tous les moteurs aient été sollicités.
La liste des moteurs d’authentification à utiliser est définie dans le réglage AUTHENTICATION_BACKENDS. Il doit s’agir d’une liste de chemins Python vers des classes Python qui sont capables d’authentifier des utilisateurs. Ces classes peuvent se trouver n’importe où dans votre chemin Python.
Par défaut, AUTHENTICATION_BACKENDS contient :
['django.contrib.auth.backends.ModelBackend']
Il s’agit du moteur d’authentification de base qui vérifie la base de données Django des utilisateurs et interroge les permissions intégrées. Il ne protège pas contre les attaques de force brute et n’utilise pas de mécanisme de « rate limiting » (restriction du nombre de tentatives dans le temps). Vous pouvez soit écrire votre propre mécanisme de restriction dans un moteur d’authentification personnalisé ou utiliser les mécanismes offerts par la plupart des serveurs Web.
L’ordre dans la liste AUTHENTICATION_BACKENDS a son importance ; si le même nom d’utilisateur et mot de passe est valable dans plusieurs moteurs, Django s’arrête dès qu’un moteur a accepté les données d’authentification.
Si un moteur génère une exception PermissionDenied, l’authentification échouera immédiatement. Django ne continue pas avec les moteurs suivants.
Note
Dès qu’un utilisateur s’est authentifié, Django mémorise le moteur utilisé pour authentifier cet utilisateur dans sa session ; il réutilise ensuite ce même moteur pour toute la durée de la session chaque fois qu’il est nécessaire d’accéder à l’utilisateur actuellement authentifié. Cela signifie en pratique que les sources d’authentification sont mises en cache par session et que si vous modifiez AUTHENTICATION_BACKENDS, vous devrez réinitialiser les données de sessions dans le cas où vous voulez forcer les utilisateurs à s’authentifier à nouveau en utilisant une autre méthode. Une façon simple de faire cela est d’exécuter Session.objects.all().delete().
Écriture d’un moteur d’authentification
Un moteur d’authentification est une classe qui implémente obligatoirement deux méthodes : get_user(user_id) et authenticate(request, **credentials). Facultativement, elle peut aussi implémenter un ensemble de méthodes d’autorisation liées aux permissions.
La méthode get_user accepte un paramètre user_id, qui peut être un nom d’utilisateur, un identifiant de base de données ou toute autre valeur, mais qui doit représenter la clé primaire de votre objet utilisateur. Elle renvoie un objet utilisateur ou None.
La méthode authenticate accepte un objet request et des données d’authentification en paramètre. La plupart du temps, elle ressemblera à ceci :
from django.contrib.auth.backends import BaseBackend
class MyBackend(BaseBackend):
def authenticate(self, request, username=None, password=None):
# Check the username/password and return a user.
...
Mais elle pourrait aussi authentifier avec un jeton, comme ceci :
from django.contrib.auth.backends import BaseBackend
class MyBackend(BaseBackend):
def authenticate(self, request, token=None):
# Check the token and return a user.
...
D’une manière ou d’une autre, authenticate() doit vérifier les données d’authentification qu’elle reçoit et, dans le cas où ces données sont valides, elle doit renvoyer un objet utilisateur correspondant à ces données. Dans le cas contraire, elle doit renvoyer None.
request est un objet HttpRequest et peut valoir None s’il n’a pas été fourni à authenticate() (laquelle le transmet au moteur d’authentification).
Le site d’administration de Django est étroitement couplé à l’objet User de Django. La meilleure façon de gérer cela est de créer un objet Django User pour chaque utilisateur existant dans votre moteur (par ex. dans votre annuaire LDAP, votre base de données SQL externe, etc.). Vous pouvez soit écrire un script pour le faire de manière anticipée, soit déléguer à votre méthode authenticate la création de l’objet User lors de chaque première connexion.
Voici un exemple de moteur qui s’authentifie en fonction de variables nom d’utilisateur et mot de passe définies dans votre fichier settings.py et crée un objet User de Django lors de la première authentification de l’utilisateur :
from django.conf import settings
from django.contrib.auth.backends import BaseBackend
from django.contrib.auth.hashers import check_password
from django.contrib.auth.models import User
class SettingsBackend(BaseBackend):
"""
Authenticate against the settings ADMIN_LOGIN and ADMIN_PASSWORD.
Use the login name and a hash of the password. For example:
ADMIN_LOGIN = 'admin'
ADMIN_PASSWORD = 'pbkdf2_sha256$30000$Vo0VlMnkR4Bk$qEvtdyZRWTcOsCnI/oQ7fVOu1XAURIZYoOZ3iq8Dr4M='
"""
def authenticate(self, request, username=None, password=None):
login_valid = (settings.ADMIN_LOGIN == username)
pwd_valid = check_password(password, settings.ADMIN_PASSWORD)
if login_valid and pwd_valid:
try:
user = User.objects.get(username=username)
except User.DoesNotExist:
# Create a new user. There's no need to set a password
# because only the password from settings.py is checked.
user = User(username=username)
user.is_staff = True
user.is_superuser = True
user.save()
return user
return None
def get_user(self, user_id):
try:
return User.objects.get(pk=user_id)
except User.DoesNotExist:
return None
Gestion des autorisations dans les moteurs personnalisés
Les moteurs d’authentification personnalisés peuvent fournir leurs propres permissions.
Le modèle utilisateur et son gestionnaire délèguent les fonctions de consultation des permissions (get_user_permissions(), get_group_permissions(), get_all_permissions(), has_perm(), has_module_perms() et with_perm()) à tout moteur d’authentification qui implémente ces fonctions.
Les permissions données à l’utilisateur sera un surensemble de toutes les permissions renvoyées par tous les moteurs. Cela signifie que Django accorde une permission à un utilisateur pour autant qu’au moins un moteur le permette.
Si un moteur génère une exception PermissionDenied dans has_perm() ou has_module_perms(), l’autorisation échouera immédiatement et Django ne continuera pas avec les moteurs suivants.
Un moteur pourrait implémenter les permissions pour l’administrateur « magique » comme ceci :
from django.contrib.auth.backends import BaseBackend
class MagicAdminBackend(BaseBackend):
def has_perm(self, user_obj, perm, obj=None):
return user_obj.username == settings.ADMIN_LOGIN
Cela accorde toutes les permissions à l’utilisateur dont l’accès a été accordé dans l’exemple précédent. Notez qu’en plus des mêmes paramètres passés aux fonctions associées à django.contrib.auth.models.User, les fonctions du moteur d’authentification acceptent toutes en paramètre l’objet utilisateur, qui pourrait être l’utilisateur anonyme.
Une implémentation complète des autorisations se trouve dans la classe ModelBackend dans django/contrib/auth/backends.py, qui constitue le moteur par défaut et interroge la plupart du temps la table auth_permission.
Autorisation pour les utilisateurs anonymes
Un utilisateur anonyme est un utilisateur que ne s’est pas authentifié, c’est-à-dire qu’il n’a fourni aucun détail d’authentification valide. Cependant, cela ne signifie pas forcément qu’il ne reçoit aucune autorisation. Au niveau le plus élémentaire, la plupart des sites Web autorisent les utilisateurs anonymes à naviguer sur la plupart des pages du site, et certains autorisent également l’envoi de commentaires, etc.
Le système de permissions de Django ne prévoit pas d’endroit où stocker des permissions pour les utilisateurs anonymes. Cependant, l’objet utilisateur transmis au moteur d’authentification peut être un objet django.contrib.auth.models.AnonymousUser permettant au moteur de définir un comportement d’autorisation spécifique aux utilisateurs anonymes. C’est particulièrement utile pour les auteurs d’applications réutilisables qui peuvent déléguer toutes les questions d’autorisations au moteur d’authentification, plutôt que, par exemple, d’exiger des réglages pour contrôler les droits d’accès anonymes.
Autorisation pour les utilisateurs inactifs
Un utilisateur inactif est un utilisateur dont le champ is_active est défini à False. Les moteurs d’authentification ModelBackend and RemoteUserBackend interdisent à ces utilisateurs de s’authentifier. Si un modèle d’utilisateur personnalisé ne possède pas de champ is_active, tous les utilisateurs seront autorisés à s’authentifier.
Vous pouvez utiliser AllowAllUsersModelBackend ou AllowAllUsersRemoteUserBackend si vous souhaitez permettre aux utilisateurs inactifs de s’authentifier.
La prise en charge des utilisateurs anonymes dans le système des permissions permet d’imaginer un scénario où les utilisateurs anonymes ont certaines permissions que les utilisateurs authentifiés inactifs n’ont pas.
N’oubliez pas de tester l’attribut is_active de l’utilisateur dans les méthodes de votre propre moteur de permissions.
Gestion des permissions sur les objets
Le système de permissions de Django pose les fondations pour des permissions sur les objets, même s’il n’existe pas d’implémentation concrète dans le cœur de Django. Cela signifie que le contrôle des permissions sur les objets renvoie toujours False ou une liste vide (selon le contrôle effectué). Un moteur d’authentification reçoit les paramètres nommés obj et user_obj pour chaque méthode d’autorisation liée aux objets et peut renvoyer les permissions au niveau des objets comme il convient.
Permissions personnalisées
Pour créer des permissions personnalisées pour un objet modèle donné, utilisez l”attribut Meta permissions du modèle`.
Ce modèle d’exemple Task crée deux permissions personnalisées, c’est-à-dire des actions que les utilisateurs peuvent effectuer ou non avec les instances Task, spécifiquement à votre application :
class Task(models.Model):
...
class Meta:
permissions = [
("change_task_status", "Can change the status of tasks"),
("close_task", "Can remove a task by setting its status as closed"),
]
La seule conséquence de ce code est la création de ces permissions supplémentaires lors du lancement de manage.py migrate (la fonction qui crée les permissions est connectée au signal post_migrate). Votre code a ensuite la charge de contrôler la valeur de ces permissions lorsqu’un utilisateur essaie d’accéder à la fonctionnalité fournie par l’application (modification de l’état des tâches ou fermeture des tâches). En poursuivant sur l’exemple précédent, le code suivant contrôle si un utilisateur peut fermer les tâches :
user.has_perm('app.close_task')
Extension du modèle User existant
Il existe deux manières d’étendre le modèle User par défaut sans le substituer par votre propre modèle. Si les modifications requises sont purement comportementales et ne nécessitent pas de modifier ce qui est stocké dans la base de données, vous pouvez créer un modèle mandataire basé sur User. Ceci expose toutes les fonctionnalités offertes par les modèles mandataires, y compris l’ordre de tri par défaut, les gestionnaires personnalisés ou les méthodes de modèle personnalisées.
Si vous souhaitez stocker des informations liées au modèle User, vous pouvez utiliser une relation OneToOneField vers un modèle contenant les champs correspondant aux informations supplémentaires. Ce modèle un-à-un est souvent appelé un modèle de profil, car il peut stocker des informations non liées à l’authentification au sujet d’un utilisateur du site. Par exemple, vous pouvez créer un modèle Employee:
from django.contrib.auth.models import User
class Employee(models.Model):
user = models.OneToOneField(User, on_delete=models.CASCADE)
department = models.CharField(max_length=100)
En supposant qu’il existe un employé Fred Smith référencé à la fois par un modèle User et un modèle Employee, vous pouvez accéder aux informations liées en utilisant les conventions standards des modèles liés de Django :
>>> u = User.objects.get(username='fsmith')
>>> freds_department = u.employee.department
Pour ajouter les champs du modèle de profil à la page de l’utilisateur dans l’interface d’administration, définissez un InlineModelAdmin (pour cet exemple, nous utiliserons un StackedInline) dans le fichier admin.py de votre application et ajoutez-le à une classe UserAdmin qui sera enregistrée avec la classe User:
from django.contrib import admin
from django.contrib.auth.admin import UserAdmin as BaseUserAdmin
from django.contrib.auth.models import User
from my_user_profile_app.models import Employee
# Define an inline admin descriptor for Employee model
# which acts a bit like a singleton
class EmployeeInline(admin.StackedInline):
model = Employee
can_delete = False
verbose_name_plural = 'employee'
# Define a new User admin
class UserAdmin(BaseUserAdmin):
inlines = (EmployeeInline,)
# Re-register UserAdmin
admin.site.unregister(User)
admin.site.register(User, UserAdmin)
Ces modèles de profil n’ont aucune particularité, ce ne sont que des modèles Django qui possèdent un lien un-à-un avec un modèle d’utilisateur. En tant que tels, ils ne sont pas automatiquement créés lorsqu’un utilisateur est créé, mais il est possible de profiter du signal django.db.models.signals.post_save pour créer ou mettre à jour les modèles liés selon les besoins.
L’utilisation de modèles liés provoque des requêtes ou des jointures supplémentaires pour récupérer les données liées. En fonction de vos besoins, il peut être préférable d’utiliser un modèle d’utilisateur personnalisé possédant les champs liés supplémentaires. Cependant, des liens existants vers le modèle d’utilisateur par défaut dans les applications de votre projet pourraient justifier la charge supplémentaire sur la base de données.
Substitution par un modèle User personnalisé
Certains types de projets ont des exigences en terme d’authentification pour lesquelles le modèle User intégré de Django ne convient pas toujours. Par exemple, certains sites préfèrent utiliser l’adresse électronique comme identifiant d’identification plutôt qu’un nom d’utilisateur.
Django permet de surcharger le modèle d’utilisateur par défaut en attribuant une valeur au réglage AUTH_USER_MODEL se référant à un modèle personnalisé :
AUTH_USER_MODEL = 'myapp.MyUser'
Cette syntaxe pointée spécifie le nom de l’application Django (qui doit figurer dans INSTALLED_APPS) et le nom du modèle Django que vous souhaitez utiliser comme modèle d’utilisateur.
Utilisation d’un modèle d’utilisateur personnalisé au départ d’un projet
Si vous démarrez un nouveau projet, il est fortement recommandé de définir un modèle d’utilisateur personnalisé, même si le modèle User par défaut convient à vos besoins. Ce modèle se comportera comme le modèle d’utilisateur par défaut, mais vous serez en mesure de le personnaliser plus tard si le besoin devait se présenter :
from django.contrib.auth.models import AbstractUser
class User(AbstractUser):
pass
N’oubliez pas de faire pointer AUTH_USER_MODEL vers ce modèle. Faites-le avant de créer les premières migrations ou de lancer manage.py migrate pour la première fois.
De plus, inscrivez le modèle dans le fichier admin.py de l’application :
from django.contrib import admin
from django.contrib.auth.admin import UserAdmin
from .models import User
admin.site.register(User, UserAdmin)
Conversion vers un modèle d’utilisateur personnalisé en cours de projet
La modification de AUTH_USER_MODEL après avoir créé les tables de base de données est notoirement plus difficile car cela affecte les clés étrangères et les relations plusieurs-à-plusieurs, par exemple.
Cette modification ne peut pas être automatisée et nécessite une intervention manuelle sur le schéma, en déplaçant les données depuis l’ancienne table des utilisateurs et peut-être même en réappliquant manuellement certaines migrations. Voir #25313 pour un aperçu des étapes à suivre.
En raison des limites de Django liées à la fonctionnalité de dépendance dynamique pour les modèles remplaçables à chaud, le modèle référencé par AUTH_USER_MODEL doit être créé lors de la première migration de son application (généralement appelée 0001_initial) ; sinon, vous aurez des problèmes de dépendances.
En outre, vous pouvez rencontrer une erreur CircularDependencyError lors de l’exécution des migrations lorsque Django n’est pas en mesure de briser automatiquement la boucle de dépendance en raison de la dépendance dynamique. Si vous rencontrez cette erreur, vous devez rompre la boucle en déplaçant les modèles dont dépend votre modèle d’utilisateur dans une deuxième migration (vous pouvez essayer de faire deux modèles normaux qui ont une clé ForeignKey l’un vers l’autre et voir comment makemigrations résout la dépendance circulaire si vous voulez voir comment cela se passe habituellement).
Applications réutilisables et AUTH_USER_MODEL
Les applications réutilisables ne devraient pas implémenter de modèle d’utilisateur personnalisé. Un projet peut utiliser beaucoup d’applications, et deux applications réutilisables qui implémenteraient chacune un modèle d’utilisateur personnalisé ne pourraient pas être utilisées conjointement. Si vous avez besoin de stocker des informations liées aux utilisateurs dans une application, utilisez une liaison ForeignKey ou OneToOneField vers settings.AUTH_USER_MODEL comme expliqué ci-dessous.
Références au modèle User
Si vous référencez directement User (par exemple dans une clé étrangère), votre code ne fonctionnera pas dans des projets où le réglage AUTH_USER_MODEL a été défini à un autre modèle d’utilisateur.
get_user_model()
Au lieu de faire directement référence à User, il est préférable de référencer le modèle d’utilisateur en utilisant django.contrib.auth.get_user_model(). Cette méthode renvoie le modèle d’utilisateur actuellement actif, soit le modèle personnalisé s’il a été défini, soit User.
Lorsque vous définissez une clé étrangère ou des relations plusieurs-à-plusieurs vers le modèle d’utilisateur, vous devriez indiquer le modèle personnalisé au moyen du réglage AUTH_USER_MODEL. Par exemple :
from django.conf import settings
from django.db import models
class Article(models.Model):
author = models.ForeignKey(
settings.AUTH_USER_MODEL,
on_delete=models.CASCADE,
)
Lorsque vous vous connectez aux signaux envoyés par le modèle d’utilisateur, vous devriez indiquer le modèle personnalisé au moyen du réglage AUTH_USER_MODEL. Par exemple :
from django.conf import settings
from django.db.models.signals import post_save
def post_save_receiver(sender, instance, created, **kwargs):
pass
post_save.connect(post_save_receiver, sender=settings.AUTH_USER_MODEL)
En règle générale, il est plus facile de se référer au modèle d’utilisateur avec le réglage AUTH_USER_MODEL dans tout code exécuté au moment de l’importation. Cependant, il est aussi possible d’appeler get_user_model() pendant que Django est en train d’importer les modèles. Il est donc possible d’écrire models.ForeignKey(get_user_model(), ...).
Si votre application est testée avec plusieurs modèles d’utilisateur, par exemple en utilisant @override_settings(AUTH_USER_MODEL=...), et que vous conserviez en cache le résultat de get_user_model() dans une variable au niveau du module, il serait alors nécessaire d’écouter le signal setting_changed pour réinitialiser le cache. Par exemple :
from django.apps import apps
from django.contrib.auth import get_user_model
from django.core.signals import setting_changed
from django.dispatch import receiver
@receiver(setting_changed)
def user_model_swapped(**kwargs):
if kwargs['setting'] == 'AUTH_USER_MODEL':
apps.clear_cache()
from myapp import some_module
some_module.UserModel = get_user_model()
Indication d’une modèle d’utilisateur personnalisé
Lorsque vous démarrez votre projet avec votre propre modèle d’utilisateur, prenez le temps de considérer s’il s’agit du bon choix pour votre projet.
En conservant toutes les informations liées à un utilisateur dans un seul modèle, on évite de devoir faire recours à des requêtes de base de données supplémentaires ou plus complexes pour récupérer d’éventuels modèles liés. D’un autre côté, il peut être plus adéquat de stocker les informations utilisateurs spécifiques à une application dans un modèle ayant une relation avec le modèle utilisateur personnalisé. Cela permet à chaque application de définir ses propres exigences en terme de données utilisateurs sans risquer de potentiels conflits ou de casser des comportements attendus par d’autres applications. Cela permet aussi de conserver le modèle utilisateur aussi simple que possible, ciblé sur l’authentification et se limitant aux exigences minimales que Django attend des modèles utilisateurs personnalisés.
Si vous utilisez le moteur d’authentification par défaut, le modèle doit alors comporter un seul champ unique pouvant être utilisé pour l’identification. Cela peut être un nom d’utilisateur, une adresse électronique ou tout autre attribut unique. Un champ de nom d’utilisateur non unique est autorisé si vous utilisez un moteur d’authentification personnalisé qui le prend en charge.
La manière la plus simple de construire un modèle d’utilisateur personnalisé en respectant les contraintes est d’hériter de AbstractBaseUser. La classe AbstractBaseUser fournit l’implémentation de base d’un modèle d’utilisateur, y compris les mots de passe hachés et les jetons de réinitialisation des mots de passe. Vous devez ensuite fournir les détails d’implémentation critiques :
class models.CustomUser
USERNAME_FIELD
Une chaîne contenant le nom du champ du modèle d’utilisateur utilisé comme identifiant unique. C’est normalement quelque chose comme un nom d’utilisateur ou une adresse électronique, ou encore tout autre identifiant unique. Ce champ doit être unique (c’est-à-dire que unique=True doit apparaître dans sa définition), sauf dans le cas où vous utilisez un moteur d’authentification personnalisé qui sait gérer les noms d’utilisateur non uniques.
Dans l’exemple suivant, le champ identifier est utilisé comme champ d’identification :
class MyUser(AbstractBaseUser):
identifier = models.CharField(max_length=40, unique=True)
...
USERNAME_FIELD = 'identifier'
EMAIL_FIELD
Une chaîne décrivant le nom du champ courriel du modèle User. Cette valeur est renvoyée par get_email_field_name().
REQUIRED_FIELDS
Une liste de noms de champs qui devront être renseignés lors de la création d’un utilisateur par la commande de gestion createsuperuser. La commande demandera de fournir une valeur pour chacun de ces champs. Cette liste doit contenir tous les champs pour lesquels l’attribut blank est False ou non défini, et peut inclure des champs supplémentaires pour lesquels vous souhaitez que l’utilisateur donne une valeur lorsqu’un utilisateur est créé de manière interactive. REQUIRED_FIELDS n’a aucun effet dans d’autres parties de Django, comme lors de la création d’un utilisateur par l’interface d’administration.
New in Django 3.0:
REQUIRED_FIELDS prend dorénavant en charge les champs ManyToManyField sans modèle intermédiaire personnalisé. Comme il n’existe pas de moyen de passer des instances de modèles durant le dialogue avec createsuperuser, il est attendu de l’utilisateur qu’il saisisse les identifiants d’instances existantes de la classe vers laquelle pointe le modèle.
Par exemple, voici la définition partielle d’un modèle d’utilisateur définissant deux champs obligatoires, une date de naissance et une hauteur :
class MyUser(AbstractBaseUser):
...
date_of_birth = models.DateField()
height = models.FloatField()
...
REQUIRED_FIELDS = ['date_of_birth', 'height']
Note
REQUIRED_FIELDS doit contenir tous les champs obligatoires de votre modèle d’utilisateur, mais ne doit pas contenir le champ USERNAME_FIELD ni le champ password car de toute façon, il faudra fournir des valeurs pour ces champs.
is_active
Un attribut booléen indiquant si l’utilisateur est considéré comme « actif ». Cet attribut est fournit comme attribut de AbstractBaseUser et valant True par défaut. La manière dont vous allez l’implémenter dépendra des détails des moteurs d’authentification choisis. Consultez la documentation de l”attribut is_active du modèle d’utilisateur intégré pour plus de détails.
get_full_name()
Facultatif. Un identifiant formel plus long pour l’utilisateur comme par exemple son nom complet. Si implémenté, il apparaît avec le nom d’utilisateur dans l’historique d’objets dans django.contrib.admin.
get_short_name()
Facultatif. Un identifiant informel court pour l’utilisateur comme par exemple son prénom. Si implémenté, il remplace le nom d’utilisateur dans la salutation de l’utilisateur dans l’en-tête du site django.contrib.admin.
Importation de AbstractBaseUser
AbstractBaseUser et BaseUserManager peuvent être importés à partir de django.contrib.auth.base_user afin qu’ils puissent être importés sans devoir inclure django.contrib.auth dans INSTALLED_APPS.
Les méthodes et attributs suivants sont disponibles pour chaque sous-classe de AbstractBaseUser:
class models.AbstractBaseUser
get_username()
Renvoie la valeur du champ spécifié dans USERNAME_FIELD.
clean()
Normalise le nom d’utilisateur en appelant normalize_username(). Si vous surchargez cette méthode, prenez soin d’appeler super() pour conserver la normalisation.
classmethod get_email_field_name()
Renvoie le nom du champ courriel désigné par l’attribut EMAIL_FIELD. Si EMAIL_FIELD n’est pas renseigné, renvoie 'email' par défaut.
classmethod normalize_username(username)
Applique la normalisation Unicode NFKC aux noms d’utilisateurs afin que des caractères visuellement identiques avec des points de code Unicode différents soient considérés identiques.
is_authenticated
Attribut en lecture seule qui vaut toujours True (contrairement à AnonymousUser.is_authenticated qui vaut toujours False). C’est une façon de savoir si l’utilisateur a été authentifié. Aucune permission n’est prise en compte et il n’y a pas de contrôle sur le drapeau is_active de l’utilisateur ou sur la validité de la session. Même si cet attribut est généralement consulté pour request.user afin de déterminer s’il a été défini par AuthenticationMiddleware (représentant l’utilisateur actuellement connecté), vous devez savoir que cet attribut vaut True pour toute instance de User.
is_anonymous
Attribut en lecture seule qui vaut toujours False. C’est une façon de différencier les objets User des objets AnonymousUser. Généralement, il vaut mieux utiliser is_authenticated que cet attribut.
set_password(raw_password)
Définit le mot de passe de l’utilisateur à la chaîne brute indiquée, en se chargeant du hachage du mot de passe. L’objet AbstractBaseUser n’est pas enregistré par cette méthode.
Lorsque raw_password vaut None, le mot de passe sera défini comme non utilisable, comme si on avait appelé set_unusable_password().
check_password(raw_password)
Renvoie True si la chaîne brute transmise est le mot de passe correct de cet utilisateur (cette méthode se charge du hachage du mot de passe en vue de la comparaison).
set_unusable_password()
Marque l’utilisateur comme n’ayant pas de mot de passe défini. Ce n’est pas la même chose que de définir une chaîne vide comme mot de passe. check_password() ne renvoie jamais True pour cet utilisateur. L’objet AbstractBaseUser n’est pas enregistré par cette méthode.
Cela peut être utile si le processus d’authentification de votre application se fait par une source externe existante telle qu’un annuaire LDAP.
has_usable_password()
Renvoie False si set_unusable_password() a été appelée pour cet utilisateur.
get_session_auth_hash()
Renvoie une empreinte HMAC du champ de mot de passe. Utilisé pour Invalidation de session lors du changement de mot de passe.
AbstractUser hérite de AbstractBaseUser:
class models.AbstractUser
clean()
Normalise l’adresse électronique en appelant BaseUserManager.normalize_email(). Si vous surchargez cette méthode, prenez soin d’appeler super() pour conserver la normalisation.
Écriture d’un gestionnaire pour un modèle d’utilisateur personnalisé
Il faudrait aussi défini un gestionnaire personnalisé pour votre modèle d’utilisateur. Si ce dernier définit les champs username, email, is_staff, is_active, is_superuser, last_login et date_joined comparables au modèle d’utilisateur par défaut de Django, vous pouvez utiliser le gestionnaire UserManager de Django. Cependant, si votre modèle d’utilisateur définit des champs différents, vous devrez définir un gestionnaire personnalisé héritant de BaseUserManager et fournissant deux méthodes supplémentaires :
class models.CustomUserManager
create_user(username_field, password=None, **other_fields)
Le prototype de create_user() doit accepter en paramètre le champ nom d’utilisateur ainsi que tous les champs obligatoires. Par exemple, si votre modèle d’utilisateur utilise email comme champ nom d’utilisateur et que date_of_birth est un champ obligatoire, create_user devrait être définie ainsi :
def create_user(self, email, date_of_birth, password=None):
# create user here
...
create_superuser(username_field, password=None, **other_fields)
Le prototype de create_superuser() doit accepter en paramètre le champ nom d’utilisateur ainsi que tous les champs obligatoires. Par exemple, si votre modèle d’utilisateur utilise email comme champ nom d’utilisateur et que date_of_birth est un champ obligatoire, create_superuser devrait être définie ainsi :
def create_superuser(self, email, date_of_birth, password=None):
# create superuser here
...
Pour une clé étrangère ForeignKey dans USERNAME_FIELD ou REQUIRED_FIELDS, ces méthodes reçoivent la valeur de to_field (la clé primaire primary_key par défaut) d’une instance existante.
BaseUserManager fournit les méthodes utilitaires suivantes :
class models.BaseUserManager
classmethod normalize_email(email)
Normalise les adresses électroniques en transformant en minuscules la partie nom de domaine de l’adresse.
get_by_natural_key(username)
Récupère une instance utilisateur en utilisant le contenu du champ spécifié dans USERNAME_FIELD.
make_random_password(length=10, allowed_chars='abcdefghjkmnpqrstuvwxyzABCDEFGHJKLMNPQRSTUVWXYZ23456789')
Renvoie un mot de passe aléatoire de la longueur indiquée et utilisant les caractères de la chaîne des caractères autorisés. Notez que la valeur par défaut de allowed_chars ne contient pas de lettres pouvant prêter à confusion, comme :
• i, l, I et 1 (i minuscule, L minuscule, i majuscule et le chiffre 1)
• o, O et 0 (o minuscule, o majuscule et zéro)
Extension du modèle User par défaut de Django
Si le modèle User de Django vous convient entièrement mais que vous voulez ajouter quelques informations de profil supplémentaires, créez une sous-classe de django.contrib.auth.models.AbstractUser et ajoutez vos propres champs de profil. Il est toutefois conseillé de créer un modèle séparé, comme indiqué dans la note « Considérations de conception des modèles » de Indication d’une modèle d’utilisateur personnalisé. AbstractUser fournit une implémentation complète du modèle User par défaut sous forme de modèle abstrait.
Utilisateurs personnalisés et formulaires d’authentification intégrés
Les formulaires et les vues intégrés de Django ont certaines attentes à propos du modèle utilisateur avec lequel ils fonctionnent.
Les formulaires suivants sont compatibles avec toutes les sous-classes de AbstractBaseUser:
Les formulaires suivants ont certaines attentes à propos du modèle d’utilisateur et peuvent être utilisés tels quels si ces attentes sont remplies :
• PasswordResetForm: s’attend à ce que le modèle utilisateur possède un champ qui stocke l’adresse électronique de l’utilisateur et nommé selon la valeur renvoyée par get_email_field_name() (email par défaut). Ce champ doit pouvoir être utilisé pour identifier l’utilisateur. Le formulaire compte aussi sur la présence du champ booléen is_active pour empêcher les utilisateurs inactifs de réinitialiser leur mot de passe.
Pour finir, les formulaires suivants sont liés à la classe User et doivent être réécrits ou étendus pour fonctionner avec un modèle d’utilisateur personnalisé :
Si votre modèle d’utilisateur personnalisé est une sous-classe de AbstractUser, vous pouvez alors étendre ces formulaires de cette façon :
from django.contrib.auth.forms import UserCreationForm
from myapp.models import CustomUser
class CustomUserCreationForm(UserCreationForm):
class Meta(UserCreationForm.Meta):
model = CustomUser
fields = UserCreationForm.Meta.fields + ('custom_field',)
Utilisateurs personnalisés et django.contrib.admin
Si vous souhaitez que votre modèle d’utilisateur personnalisé fonctionne également dans l’interface d’administration, celui-ci doit définir certains attributs et méthodes supplémentaires. Ces méthodes permettent au site d’administration de contrôler l’accès de l’utilisateur à son contenu :
class models.CustomUser
is_staff
Renvoie True si l’utilisateur est autorisé à accéder au site d’administration.
is_active
Renvoie True si le compte utilisateur est actuellement actif.
has_perm(perm, obj=None):
Renvoie True si l’utilisateur possède la permission indiquée. Si obj est transmis, la permission doit être vérifiée en relation avec une instance d’objet spécifique.
has_module_perms(app_label):
Renvoie True si l’utilisateur possède la permission d’accéder aux modèles de l’application indiquée.
Il sera aussi nécessaire d’inscrire le modèle d’utilisateur personnalisé à l’interface d’administration. Si votre modèle hérite de django.contrib.auth.models.AbstractUser, vous pouvez utiliser la classe existante de Django django.contrib.auth.admin.UserAdmin. Cependant, si votre modèle hérite de AbstractBaseUser, vous devrez définir une classe ModelAdmin personnalisée. Il est possible d’hériter de la classe django.contrib.auth.admin.UserAdmin, mais il faudra alors surcharger toutes les définitions qui se référent à des champs de django.contrib.auth.models.AbstractUser et qui ne se trouvent pas dans votre classe d’utilisateur personnalisée.
Note
Si vous utilisez une classe ModelAdmin personnalisée qui hérite de django.contrib.auth.admin.UserAdmin, vous devez alors ajouter vos champs personnalisés à fieldsets (pour les champs qui doivent faire partie de l’édition des utilisateurs) et à add_fieldsets (pour les champs qui doivent faire partie de la création des utilisateurs). Par exemple
from django.contrib.auth.admin import UserAdmin
class CustomUserAdmin(UserAdmin):
...
fieldsets = UserAdmin.fieldsets + (
(None, {'fields': ('custom_field',)}),
)
add_fieldsets = UserAdmin.add_fieldsets + (
(None, {'fields': ('custom_field',)}),
)
Voir un exemple complet pour plus de détails.
Utilisateurs personnalisés et permissions
Pour faciliter l’intégration du système des permissions de Django à votre propre classe d’utilisateur, Django propose PermissionsMixin. Il s’agit d’un modèle abstrait que vous pouvez ajouter à la hiérarchie de classes de votre modèle d’utilisateur et qui vous offre ainsi toutes les méthodes et les champs de base de données nécessaires pour la prise en charge du modèle des permissions de Django.
PermissionsMixin contient les méthodes et attributs suivants :
class models.PermissionsMixin
is_superuser
Valeur booléenne. Indique que cet utilisateur possède toutes les permissions sans avoir besoin de les lui attribuer explicitement.
get_user_permissions(obj=None)
New in Django 3.0.
Renvoie l’ensemble des permissions (chaînes) que l’utilisateur obtient directement.
Si obj est transmis, ne renvoie que les permissions d’utilisateur liées à cet objet spécifique.
get_group_permissions(obj=None)
Renvoie l’ensemble des permissions (chaînes) que l’utilisateur obtient au travers des groupes auxquels il/elle appartient.
Si obj est transmis, ne renvoie que les permissions de groupe liées à cet objet spécifique.
get_all_permissions(obj=None)
Renvoie l’ensemble des permissions (chaînes) que l’utilisateur obtient directement ou au travers des groupes auxquels il appartient.
Si obj est transmis, ne renvoie que les permissions liées à cet objet spécifique.
has_perm(perm, obj=None)
Renvoie True si l’utilisateur possède la permission indiquée, où perm est au format "<étiquette application>.<code permission>" (voir permissions). Si User.is_active et is_superuser sont tous deux à True, cette méthode renvoie toujours True.
Si obj est transmis, cette méthode ne contrôle pas la permission au niveau du modèle, mais pour l’objet indiqué.
has_perms(perm_list, obj=None)
Renvoie True si l’utilisateur possède toutes les permissions indiquées, où chaque permission est au format "<étiquette application>.<code permission>". Si User.is_active et is_superuser sont tous deux à True, cette méthode renvoie toujours True.
Si obj est transmis, cette méthode ne contrôle pas les permissions au niveau du modèle, mais pour l’objet indiqué.
has_module_perms(package_name)
Renvoie True si l’utilisateur possède au moins une permission dans le paquet donné (l’étiquette d’application Django). Si User.is_active et is_superuser sont tous deux à True, cette méthode renvoie toujours True.
PermissionsMixin et ModelBackend
Si vous n’intégrez pas PermissionsMixin vous devez vous assurer de ne pas appeler les méthodes de permissions sur ModelBackend. ModelBackend s’attend à ce que certains champs soient disponibles dans votre modèle d’utilisateur. Si ce dernier ne fournit pas ces champs, vous obtiendrez des erreurs de base de données lorsque vous contrôlez les permissions.
Utilisateurs personnalisés et modèles mandataires
Une limite connue des modèles d’utilisateur personnalisés est que leur installation casse tout modèle mandataire étendant le modèle User. Les modèles mandataires doivent hériter d’une classe de base concrète ; en définissant un modèle d’utilisateur personnalisé, vous supprimez la capacité de Django à identifier de manière fiable la classe de base.
Si votre projet utilise des modèles mandataires, vous devez soit modifier ces modèles afin qu’ils étendent le modèle d’utilisateur utilisé dans votre projet, soit fusionner le comportement du modèle mandataire dans votre sous-classe de User.
Un exemple complet
Voici un exemple d’application d’utilisateur personnalisé compatible avec l’interface d’administration. Ce modèle d’utilisateur utilise une adresse électronique comme nom d’utilisateur et possède un champ date de naissance obligatoire ; il ne fournit aucun contrôle de permission, excepté un drapeau admin sur le compte utilisateur. Ce modèle est compatible avec tous les formulaires et les vues d’authentification intégrés, à l’exception des formulaires de création d’utilisateur. Cet exemple illustre la façon dont la plupart des composants interagissent, mais il ne s’agit pas de code pouvant être directement copié dans des projets en production.
Ce code pourrait être entièrement placé dans un fichier models.py d’une application d’authentification personnalisée :
from django.db import models
from django.contrib.auth.models import (
BaseUserManager, AbstractBaseUser
)
class MyUserManager(BaseUserManager):
def create_user(self, email, date_of_birth, password=None):
"""
Creates and saves a User with the given email, date of
birth and password.
"""
if not email:
raise ValueError('Users must have an email address')
user = self.model(
email=self.normalize_email(email),
date_of_birth=date_of_birth,
)
user.set_password(password)
user.save(using=self._db)
return user
def create_superuser(self, email, date_of_birth, password=None):
"""
Creates and saves a superuser with the given email, date of
birth and password.
"""
user = self.create_user(
email,
password=password,
date_of_birth=date_of_birth,
)
user.is_admin = True
user.save(using=self._db)
return user
class MyUser(AbstractBaseUser):
email = models.EmailField(
verbose_name='email address',
max_length=255,
unique=True,
)
date_of_birth = models.DateField()
is_active = models.BooleanField(default=True)
is_admin = models.BooleanField(default=False)
objects = MyUserManager()
USERNAME_FIELD = 'email'
REQUIRED_FIELDS = ['date_of_birth']
def __str__(self):
return self.email
def has_perm(self, perm, obj=None):
"Does the user have a specific permission?"
# Simplest possible answer: Yes, always
return True
def has_module_perms(self, app_label):
"Does the user have permissions to view the app `app_label`?"
# Simplest possible answer: Yes, always
return True
@property
def is_staff(self):
"Is the user a member of staff?"
# Simplest possible answer: All admins are staff
return self.is_admin
Puis, pour inscrire ce modèle d’utilisateur personnalisé dans l’administration de Django, le code suivant doit se trouver dans le fichier admin.py de l’application :
from django import forms
from django.contrib import admin
from django.contrib.auth.models import Group
from django.contrib.auth.admin import UserAdmin as BaseUserAdmin
from django.contrib.auth.forms import ReadOnlyPasswordHashField
from customauth.models import MyUser
class UserCreationForm(forms.ModelForm):
"""A form for creating new users. Includes all the required
fields, plus a repeated password."""
password1 = forms.CharField(label='Password', widget=forms.PasswordInput)
password2 = forms.CharField(label='Password confirmation', widget=forms.PasswordInput)
class Meta:
model = MyUser
fields = ('email', 'date_of_birth')
def clean_password2(self):
# Check that the two password entries match
password1 = self.cleaned_data.get("password1")
password2 = self.cleaned_data.get("password2")
if password1 and password2 and password1 != password2:
raise forms.ValidationError("Passwords don't match")
return password2
def save(self, commit=True):
# Save the provided password in hashed format
user = super().save(commit=False)
user.set_password(self.cleaned_data["password1"])
if commit:
user.save()
return user
class UserChangeForm(forms.ModelForm):
"""A form for updating users. Includes all the fields on
the user, but replaces the password field with admin's
password hash display field.
"""
password = ReadOnlyPasswordHashField()
class Meta:
model = MyUser
fields = ('email', 'password', 'date_of_birth', 'is_active', 'is_admin')
def clean_password(self):
# Regardless of what the user provides, return the initial value.
# This is done here, rather than on the field, because the
# field does not have access to the initial value
return self.initial["password"]
class UserAdmin(BaseUserAdmin):
# The forms to add and change user instances
form = UserChangeForm
add_form = UserCreationForm
# The fields to be used in displaying the User model.
# These override the definitions on the base UserAdmin
# that reference specific fields on auth.User.
list_display = ('email', 'date_of_birth', 'is_admin')
list_filter = ('is_admin',)
fieldsets = (
(None, {'fields': ('email', 'password')}),
('Personal info', {'fields': ('date_of_birth',)}),
('Permissions', {'fields': ('is_admin',)}),
)
# add_fieldsets is not a standard ModelAdmin attribute. UserAdmin
# overrides get_fieldsets to use this attribute when creating a user.
add_fieldsets = (
(None, {
'classes': ('wide',),
'fields': ('email', 'date_of_birth', 'password1', 'password2'),
}),
)
search_fields = ('email',)
ordering = ('email',)
filter_horizontal = ()
# Now register the new UserAdmin...
admin.site.register(MyUser, UserAdmin)
# ... and, since we're not using Django's built-in permissions,
# unregister the Group model from admin.
admin.site.unregister(Group)
Finalement, définissez le modèle personnalisé comme modèle d’utilisateur par défaut dans votre projet au moyen du réglage AUTH_USER_MODEL dans votre fichier settings.py:
AUTH_USER_MODEL = 'customauth.MyUser'
Back to Top |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
I try to figure out something intersting that happen in Scheme:
(define last-pair
(lambda (x)
(if (null? (cdr x))
x
(last-pair (cdr x)))))
When I defined foo in this way:
(define foo
(lambda ()
(let ((s (list 'he 'said:)))
(set-cdr! (last-pair s)
(list 'ha 'ha))
s)))
and run foo 3 times, I got:
(he said: ha ha)
(he said: ha ha)
(he said: ha ha)
But when I defined foo in this way:
(define foo
(lambda ()
(let ((s '(he said:)))
(set-cdr! (last-pair s)
(list 'ha 'ha))
s)))
and run foo 3 times, I got:
(he said: ha ha)
(he said: ha ha ha ha)
(he said: ha ha ha ha ha ha)
But why? My first thought was that we build always new list in the first foo, and in the second we don't. But I didn't understood how it actully working. Scheme define adress in the second foo, and do what? Is it define as a list also in the second foo? or a symbol?
Thanks.
share|improve this question
What interpreter of Scheme are you using? I couldn't reproduce that behavior in Racket - since it forces me to always use mlist for creating mutable lists, as the '(a b c) syntax produces immutable lists – Óscar López Dec 31 '11 at 13:37
@Óscar López: I use Dr.Scheme or chezScheme – Adam Sh Dec 31 '11 at 13:41
That's an old version now it's called Racket and, among many other new things, it forbids the mutation of lists unless the lists are explicitly declared to be mutable. Maybe you found a bug? I'd suggest that you try with Racket, if it's not too much of a hassle – Óscar López Dec 31 '11 at 13:49
1
But as Adam is talking about scheme, not racket, we should consider the scheme language standard, not racket. It works this way in other Scheme implementations as well. – Vladimir F Jan 2 '12 at 11:10
1 Answer 1
up vote 3 down vote accepted
Literal lists ('(foo bar baz), as opposed to (list 'foo 'bar 'baz)) are not allowed to be mutated. If you do, that "is an error" (i.e., the behaviour is undefined).
In this case, what you are observing is that the literal '(he said:) is being reused over and over, with the understanding that it's not going to get mutated. Since you violated that understanding, you get the weird behaviour you saw.
In contrast, when you use (list 'he 'said:), a new list is returned every time.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question. |
Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
Method of monitoring parameters of solid phase of suspension and device therefor
5078011 Method of monitoring parameters of solid phase of suspension and device therefor
Patent Drawings:Drawing: 5078011-2 Drawing: 5078011-3
« 1 »
(2 images)
Inventor: Morkun, et al.
Date Issued: January 7, 1992
Application: 07/449,856
Filed: December 13, 1989
Inventors: Morkun; Vladimir S. (Krivoi Rog, SU)
Potapov; Viktor N. (Krivoi Rog, SU)
Assignee: Krivorozhsky Gornorudny Institut (Krivoi Rog, SU)
Primary Examiner: Williams; Hezron E.
Assistant Examiner: Finley; Rose M.
Attorney Or Agent: Fleit, Jacobson, Cohn, Price, Holman & Stern
U.S. Class: 73/32A; 73/599; 73/601; 73/61.75
Field Of Search: 73/61R; 73/61.1R; 73/601; 73/599; 73/32A; 73/19
International Class:
U.S Patent Documents: 4237720; 4381674; 4412451; 4667515; 4683759
Foreign Patent Documents: 3407465; 55-2581; 59-47259; 58-41336; 275499; 714270; 896542; 1231453
Other References: "Oprobovanie i kontrol tekhnologicheskikh protsessov obogascheniya", 1979, Nedra Publ., Moscow, pp. 47-49 (partial translation)..
Abstract: This invention relates to measurements of characteristics of a comminuted material by an ultrasonic method. The method of monitoring parameters of a solid phase of suspension comprises the steps of producing a Lamb wave and gamma-radiation and passing them respectively through a test medium (2) along the wall of a measuring vessel (1) and through the test medium (2) placed therein, measuring the amplitude of the Lamb wave and the intensity of gamma-radiation, while using, as the test medium, separately a standard liquid and the analyzed suspension to find the parameters of the solid phase of suspension by way of the ratio of the measured values. A device realizing this method comprises a measuring vessel (1), an emitting ultrasonic converter (4), a receiving ultrasonic converter (7) which are mounted on the wall of the measuring vessel (1) separated by forming prisms (5 and 6), a pulse generator (3), amplifiers (8 and 18), a source (16) of gamma-radiation and a receiver (17) of gamma-radiation which are mounted on the walls of the measuring vessel (1), a multivibrator (9), a one-shot multivibrator (10), a delay line (11), a square pulse generator (12), a gating unit (13), smoothing filters (14, 19), an amplitude detector (15), and a data processing assembly (20) comprising units (21 and 22) for setting standard values, two subtraction circuits (23, 24) and a dividing circuit (25).
Claim: We claim:
1. A device for monitoring parameters of a solid phase of suspension, comprising a measuring vessel, an emitting ultrasonic converter mounted on a wall of the measuring vessel forpassing Lamb waves along said wall, a receiving ultrasonic converter mounted on said wall of the measuring vessel a fixed distance from the emitting ultrasonic converter, a generator of Lamb waves, connected to an input of the emitting ultrasonicconverter, an amplifier of an ultrasonic vibration signal, connected to an output of the receiving ultrasonic converter, and a data processing assembly electrically connected with the amplifier and including in sequence a multivibrator, a one-shotmultivibrator, a delay line, a square pulse shaper, a gating unit, and a smoothing filter, all connected in series, an amplitude detector having an output connected to a data input of the gating unit, a gamma-radiation source and a gamma-radiationreceiver mounted on the walls of the measuring vessel opposite each other, a gamma-radiation signal amplifier and another smoothing filter with an input connected via the gamma-radiation signal amplifier to the output of the gamma-radiation receiver, andwherein the amplifiers are logarithmic amplifiers, while the receiving ultrasonic converter and the emitting ultrasonic converter are acoustically coupled to each other and mounted on the wall of the measuring vessel via forming prisms at a fixeddistance from each other, and the data processing assembly further comprises a setting unit for setting a standard value of intensity of gamma-radiation, a further setting unit for setting a standard Lamb wave amplitude two substraction circuits, and adividing circuit, outputs of the setting units being connected respectively to outputs of substraction circuits having their outputs connected to inputs of the dividing circuit and their inputs to outputs of the smoothing filters.
2. A device as claimed in claim 1, characterized by an additional pulse generator and an additional emitting ultrasonic converter having its input connected to an output of the additional pulse generator, the additional pulse generator having aninput connected to the output of the one-shot multivibrator, and, wherein a storing vessel is hydraulically connected to the measuring vessel and has connections for feeding and draining the test medium, the storing vessel housing therein an additionalemitting ultrasonic converter.
Description: TECHNICAL FIELD
This invention relates to methods of measuring characteristics of comminuted materials in a liquid medium by ultrasonic methods and, in particular, to a method of monitoring parameters of a solid phase of suspension and a device realizing thismethod.
BACKGROUND ART
There is a known method for monitoring parameters of a solid phase of suspension (cf., G. A. Han "Oprobovanie i kontrol tekhnologicheskikh protsessov obogascheniya", 1979, Nedra Publ., Moscow, pp. 47-49) which comprises the steps ofpreliminarily forming a sample of suspension to be analyzed, obtaining a solid phase of the formed suspension sample, for example, by drying, and measuring mass and subsequently volume thereof. The sample volume is determined considering a change in thevolume of the liquid displaced as the dry material constituting the solid phase of the formed sample is immersed in a measuring vessel containing the liquid. The density of particles in the solid state of the analyzed suspension is determined by therelation between the measured mass of the solid phase of the formed suspension and the volume thereof.
There is also known a method of monitoring parameters of a solid phase of suspension (cf.SU, A, 896,542) wherein ultrasonic vibrations are set up at several fixed frequencies and applied to a test medium placed in a measuring vessel. Theultrasonic vibrations are affected by the test medium whereby parameters of said vibrations, more specifically, their amplitude change are monitored. In this case the text medium is a mixture of particles in the solid state of the analyzed suspensionand liquid, for example, clean water. Thereafter, the amplitude of the ultrasonic vibrations passed through the test medium is measured, the value thereof being used to determine the size of particles in the analyzed suspension. Also, measurements aremade of the time at which particles of a definite size settle within the measuring vessel. The time value is used to determine the density of particles of the analyzed suspension.
There is also known a device for accomplishing the foregoing method of monitoring parameters of a solid phase of suspension (SU, A, 896,542), which comprises such series-connected components as a pulse generator and an emitting ultrasonicconverter, and also a receiving ultrasonic converter connected to the input of an amplifier designed to amplify an ultrasonic vibration amplitude signal. The emitting ultrasonic converter and the receiving ultrasonic converter are disposed on a wall ofa measuring vessel on different sides thereof and are acoustically interconnected via the test medium. The measuring vessel is filled with the test medium representing a mixture of solid particles of the analyzed suspension and clean water. The knowndevice also includes a data-processing assembly designed to determine parameters of the analyzed suspension using the results obtained in amplitude measurements. The received data is in turn used for computing parameters of the solid phase of saidsuspension, said data-processing assembly comprising a standard-amplitude setting unit and a subtraction circuit. The input of the data-processing assembly is connected to the output of the amplifier so that, in the given case, the quantity measured isthe amplitude of ultrasonic vibrations dying out when passed through the test medium.
In the afore-mentioned device the test medium placed in the measuring vessel passes ultrasonic vibrations at several fixed frequencies, said vibrations being produced by the use of the pulse generators and the emitting ultrasonic converters. Asstated above, the test medium represents particles in the solid state of the suspension taken for analysis from the production line, said particles being immersed in clean water contained in the measuring vessel.
The receiving ultrasonic converters convert ultrasonic vibrations passed through the test medium into electrical signals that characterize the amplitude of said ultrasonic vibrations and are amplified by the amplifier. The measured amplitudes ofthe amplifier output signals are used to determine parameters of particles in the solid phase of the analyzed suspension. The amplitudes of the amplifier output signals are measured at fixed time intervals after said particles in the solid phase beginto settle, the counting being started immediately after their immersion in clean water contained in the measuring vessel. The obtained data is used to determine the size of solid particles and the density of the solid phase of the analyzed suspension.
However, the prior art methods of monitoring parameters of a solid phase of suspension, which have been discussed above, and the device therefor are characterized by a long checking process inasmuch as parameters of a solid state of suspensionare measured as a function of precipitation over a long time in a series of tests performed on a stationary test medium at predetermined time intervals.
Before checking, it is necessary to remove the solid phase and dry it as a preparatory step. Such operations involve losses of suspended particles during preparation and transfer of samples, a disadvantage substantially decreasing checkingaccuracy. Moreover, accuracy in measuring parameters of a solid phase of suspension with an ultrasonic wave passed throughout a test medium is appreciably decreased due to a varying size of solid-phase particles, which is also a limiting factor.
DISCLOSURE OF THE INVENTION
The object of this invention is to provide a method of monitoring parameters of a solid phase of suspension and a device realizing this method, which would permit continuous monitoring of parameters of a solid phase of suspension during themovement of a test medium without such preliminary steps as removal and preparation of a solid phase of suspension with a view to improving the accuracy of measurements and reducing the total monitoring time.
There is provided a method of monitoring parameters of a solid phase of suspension, comprising the steps of forming and emitting an ultrasonic vibration, passing it through a test medium placed in a measuring vessel, subsequently measuring theamplitude of the ultrasonic vibration passed through the test medium and using the obtained amplitude values for determining parameters of the test medium, in which, according to the invention, a standard liquid of suspension is separately used as thetest medium, gamma radiation is additionally formed and successively passed through said standard liquid and suspension, a measurement is made of intensity of said gamma radiation passed through said standard liquid and suspension, a Lamb wave being usedas said ultrasonic vibration, said wave being propagated in said standard liquid and suspension along a wall of the measuring vessel whereupon a measurement is made of the amplitude of the Lamb wave passed along said wall of the measuring vessel over afixed distance, while parameters of the solid phase of the suspension are determined using the relation between the obtained values of the Lamb wave amplitude and the intensity of said gamma radiation.
It is preferable that the hereinproposed method of monitoring parameters of a solid phase of suspension should comprise the steps of additionally forming ultrasonic vibrations and applying them to said standard liquid and the analyzed suspensionbefore said gamma radiation is propagated.
There is also provided a device for accomplishing the hereinproposed method of monitoring parameters of a solid phase of suspension, comprising a measuring vessel, an emitting ultrasonic converter, a receiving ultrasonic converter, saidconverters being disposed on a wall of the measuring vessel, a pulse generator connected to the input of the emitting ultrasonic converter, a first amplifier connected to the output of the receiving ultrasonic converter, and a data-processing assemblyconnected to the output of the first amplifier, which, according to the invention, comprises a multivibrator, a one-shot multivibrator, a delay line, a square pulse shaper, a gating unit, and a first smoothing filter, said components being connected inseries, an amplitude detector having its input connected to the output of the first amplifier and its output connected to a data in-out of the gating unit, a gamma radiation source and a gamma radiation receiver, which are disposed on opposite walls ofthe measuring vessel, a second amplifier and a second smoothing filter whose input is connected to the output of the gamma radiation receiver via the second amplifier, the amplifiers used being logarithmic amplifiers, acoustically interconnectedreceiving and emitting ultrasonic converters being disposed on a wall on the measuring vessel at a predetermined distance from each other with forming prisms therebetween, the data-processing assembly comprising two units for setting standard values ofthe Lamb wave amplitude and the gamma radiation intensity, two substraction circuits and a dividing circuit, the outputs of the standard-value setting units being respectively connected to the inputs of the subtraction circuits, the outputs of which areconnected to the inputs of the dividing circuit and whose inputs are connected to the outputs of the smoothing filters.
It is of advantage that the device should comprise an additional pulse generator and an additional emitting ultrasonic converter connected via its input to the output of the additional pulse generator whose input is connected to the output of theone-shot multivibrator, provision being also made for a storing vessel hydraulically connected with the measuring vessel and having connections for delivering and draining a test medium, the additional emitting ultrasonic converter being arranged withinthe storing vessel.
The invention makes it possible to reduce the time required for checking parameters of a solid phase of suspension and to enhance accuracy of their measurement due to: omission of such a preliminary step as preparation of a test sample of saidsuspension; utilization of Lamb waves propagated in the test medium along a wall of the measuring vessel; and employment of additional influencing factors, more specifically, gamma radiation and additional ultrasonic vibrations, an advantage appreciablydecreasing the effect of gas pockets and a varying size of particles of the solid phase of said suspension in measurements of the Lamb wave amplitude and the gamma radiation intensity.
Furthermore, solid-phase parameters are checked in a moving test medium, that is, while the analyzed suspension and standard liquid are in flow, a factor decreasing the duration of the checking process and making the obtained data more reliable.
Also, the test area will be free of gas pockets due to the utilization of additional ultrasonic vibrations and provision of a storing vessel with an additional emitting converter and an additional pulse generator, a feature enhancing accuracy inmeasuring parameters of a solid phase of suspension.
BRIEF DESCRIPTION OF DRAWINGS
These, together with other objects and features of the invention will become more readily apparent from the following detailed description with reference to a specific embodiment thereof, taken in conjunction with the accompanying drawings,wherein:
FIG. 1 is a block diagram of a device for accomplishing a method of monitoring parameters of a solid phase of suspension according to the invention; and
FIGS. 2a-2g are diagrams illustrating operation of the device of FIG. 1 according to the invention.
BEST MODE OF CARRYING OUT THE INVENTION
The method of monitoring parameters of a solid phase of suspension forming the subject of the present invention is accomplished as follows. A pump (not shown in the drawing) is continuously operated to fill a measuring vessel 1 (FIG. 1) with atest medium 2 which is initially a standard liquid, for example, clean water. Simultaneously an ultrasonic vibration is produced and transformed into a Lamb wave, which is generated in a wall of the measuring vessel 1, and an additional influencingfactor (gamma radiation) is provided. The Lamb wave propagates at the interface between the measuring vessel 1 and the test medium 2, that is, along the wall of the measuring vessel 1, as shown with arrow "p", while said gamma radiation is transmittedtransversely through the test medium 2, as shown with arrow "q".
After the Lamb wave covers a fixed distance "l" on the wall of the measuring vessel 1, it is converted into an ultrasonic vibration and then into an electrical signal whose amplitude is amplified on a logarithmic scale, which ends the process ofobtaining a signal characterizing the amplitude of the Lamb wave affected by the standard liquid. Thereafter the signals amplified on a logarithmic scale are detected and a low-frequency component is derived, which completes the process of measuring theLamb wave amplitude for the standard liquid, the measured value being a standard amplitude of the Lamb wave.
After the gamma radiation covers a fixed distance "m" in the test medium 2, the glow originated by said gamma radiation is converted into an electrical signal, its amplitude being amplified on a logarithmic scale, said signal characterizing theintensity of the gamma radiation affected by the test medium 2, that is, by the standard liquid. This signal is frequency-averaged, which ends the process of measuring the gamma radiation intensity for the standard liquid, the measured value being astandard intensity of the gamma radiation. Next, the standard liquid is drained and the measuring vessel is again filled with the test medium 2 which is now a suspension whose solid phase consists of particles measuring about 1 mm. The suspensionpossesses sufficient fluidity since its solid phase is mixed with a suitable liquid. The above process of measuring the Lamb wave amplitude and the gamma radiation intensity is repeated this time for the suspension (hereinafter referred to as "effectivevalue").
The measured values of the Lamb wave amplitude and the gamma radiation intensity for the standard liquid and the suspension are used to determine concentration and density of the solid phase of said suspension by calculating a logarithmicdifference between the Lamb wave amplitudes for the standard liquid and the suspension and also a logarithmic difference between the gamma radiation intensities for the standard liquid and the suspension whereupon the relation between said differences isdetermined. The ultrasonic vibration frequency range is preferably within 400 kHz-3.5 MHz. The gamma radiation intensity varies within wide limits, a condition attainable by the use of any standard sources thereof.
A detailed description of the proposed method for monitoring parameters of a solid phase of suspension will now be continued by reference to a preferred embodiment of the device therefore, which comprises the measuring vessel 1 designed toaccommodate the test medium 2, that is, the standard liquid or the analyzed suspension. The device forming the subject of the present invention also comprises a pulse generator 3 whose output is connected to an emitting ultrasonic converter 4 disposedon a wall of the measuring vessel 1 via a forming prism 5 intended for converting ultrasonic vibrations coming from the output of the emitting ultrasonic converter 4 into a Lamb wave propagating along the wall of the measuring vessel 1 at the interfacebetween said wall and the test medium 2, as shown with arrow "p". A receiving ultrasonic converter 7 is arranged at a fixed distance "1" from the forming prism 5 within an acoustic communication area by the use of another forming prism 6, the output ofsaid converter being connected to the input of an amplifier 8 serving to amplify the signal characterizing the Lamb wave amplitude. The forming prism 6 and the receiving ultrasonic converter 7 are designed to conver the Lamb wave into ultrasonicvibrations and into a corresponding electrical signal.
The device also includes sich series-connected components as a multivibrator 9, a one-shot multivibrator 10, a delay line 11, a square pulse shaper 12, a gating unit 23, and a first smoothing filter 14 designed to obtain a signal representativeof the Lamb wave amplitude. The data input of the gating unit 13 is connected to the output of an amplitude detector 15 having its input connected to the output of the amplifier 8, while the input of the pulse generator 3 is connected to the output ofthe one-shot multivibrator 10. The hereinproposed device also comprehends a gamma radiation source 16 and a gamma radiation receiver 17 arranged oppositely on different sides of the measuring vessel 1 (in a cross-section) and separated by a fixeddistance "m" equal to the width of the measuring vessel 1. The output of the gamma radiation receiver 17 is connected to the input of an amplifier 18 used to amplify the amplitude of the signal characterizing the gamma radiation intensity. Thecomponents 18 and 8 are logarithmic amplifiers, and the gamma radiation receiver 17 is a scintillator connected to a photomultiplier (not shown in FIG. 1). The output of the amplifier 18 is connected to the input of a second smoothing filter 19. Theoutputs of the smoothing filters 14 and 19 are connected to the inputs of a data-processing assembly 20 used to process the measured values of the Lamb wave amplitude and the gamma radiation intensity for the standard liquid and the analyzed suspension,said values being represented in an analog or digital form. The processing is aimed at obtaining the required parameters of the solid phase of the suspension, that is, its density and concentration. The data-processing assembly 20 comprises a Lambwavestandard amplitude setting unit 21 and a gamma radiation standard intensity setting unit 22. The output of each of said units 21 and 22 is connected to one of the inputs of subtraction circuits 23 and 24, respectively. The other input of each ofsaid subtraction circuits 23 and 24 acts as one of the inputs of the data-processing assembly 20 connected, respectively, to the output of the smoothing filter 14 and to the output of the smoothing filter 19. The output of each of said subtractioncircuits 23 and 24 is connected to a respective input of a dividing circuit 25 whose output serves as the output of the device, providing a signal representative of the density of the solid phase of the suspension. A signal representative of theconcentration of the solid phase of the suspension is derived from the output of the subtraction circuit 23.
The device forming the subject of the invention also incorporates an additional pulse generator 26 connected via its input to the output of the one-shot multivibrator 10 and via its output to the input of an additional ultrasonic emittingconverter 27 providing high-power ultrasonic vibrations for eliminating the effect of gas pockets in the test medium 2, a feature enhancing measuring accuracy. The additional ultrasonic converter 27 is arranged within a storing vessel 28 hydraulicallylinked with the measuring vessel 1 through a connection 29 communicating via an adapter funnel 30 with the storing vessel 28 which is a cylindrical structure in the preferred embodiment of the invention. The storing vessel 28 has connections 31 and 32for delivering and draining the test medium 2, respectively. The drain connection 32 is in communication with the cavity of the storing vessel 28 via an outlet 33 provided in the wall of the storing vessel 28 above the additional emitting ultrasonicconverter 27 and below an inlet 34 so that the ultrasonic converter 27 is always found below a level 35 of the test medium 2 in the storing vessel 28.
The emitting ultrasonic converter 4 and the receiving ultrasonic converter 7 use known circuitry (cf. V. V. Malov, "Piezorezonansnye datchiki", 1978, Energy publishers, Moscow, p. 37).
The generator 3 and the additional pulse generator 26 may be constructed in a known manner (for example, as described in "Impulsnaya tekhnika" by Yu. A. Brammer et al., Vischaya Shkola publishers, 1976, Moscow, p. 136). Refer to the samepublication for the construction of the gating unit 15 (p. 305) and the smoothing filters 14 and 19 (p. 150).
The units 21, 22, the substraction circuits 23, 24 and the dividing circuit 25 are essentially similar to known components (cf. V. I. Korneychuk et al. "Vychislitelnye ustroistva na mikroskhemakh", 1986, Technika publishers, Kiev).
The gamma radiation source 16 is a stock-produced unit providing gamma radiation with intensity varying within wide limits (cf. G. A. Khan, "Cheking and monitoring of concentration processes", 1979, Nedra publishers, Moscow).
Turning now to FIGS. 2a-2g there are shown voltage waveforms at different points of the circuitry illustrating operation of the device in compliance with the invention. In the drawing voltage U is plotted in the ordinate and time t on theabscissa. FIG. 2a shows the output signal of the one-shot multi-vibrator 10; FIG. 2b, the output signal of the pulse generator 3; FIG. 2c, the output signal of the amplifier 8; FIG. 2d, the output pulse of the amplitude detector 15; FIG. 2e, the outputpulse of the shaper 12; FIG. 2f, the output signal of the gating unit 13; and FIG. 2g, the output signal of the smoothing filter 14.
The device for carrying out the proposed method of monitoring parameters of a solid phase of suspension operates in the following manner.
The test medium 2, which is a standard liquid in the case under discussion, flows through the storing vessel 28 and the measuring vessel 1.
The multivibrator 9 furnishes square pulses which are used to trigger (FIG. 2a) the pulse generator 3 (FIG. 1) by means of the one-shot multivibrator 10. The pulse generator 3 induces a series of high-frequency electrical oscillations at a fixedfrequency (FIG. 2b). (FIG. 2 illustrates conversion of one pulse).
The emitting ultrasonic converter 4, for example, of piezoelectric type converts an electrical signal derived from the output of the generator 3 into elastic ultrasonic vibrations of the test medium 2 with which it is in contact. Said ultrasonicvibrations are transformed by the forming prism 5 into Lamb waves propagating along the wall of the measuring vessel 1 containing the test medium 2. After covering the fixed distance "1" on the wall of the measuring vessel 1, the Lamb waves come to theother forming prism 6 which transforms them into longitudinal ultrasonic vibrations, said vibrations being subsequently transmitted to the receiving ultrasonic converter 7. The receiving ultrasonic converter 7 converts the longitudinal ultrasonicvibrations into an electrical signal. As the Lamb waves pass the fixed distance "1" on the wall of the measuring vessel 1 containing the test medium 2, their damping is governed solely by concentration of the solid phase of the suspension and dependsneither in the particle size nor on the size spread.
Simultaneously a pulse from the one-shot multivibrator 10 is applied to the input of the delay line 11. From the delay line 11 it comes to the shaper 12 generating a square pulse (FIG. 2e) which enables the gating unit 13. Delay time.tau..sub.o of the pulse delivered to the shaper 12 through the delay line 11 is dependent upon time T (FIG. 2c) during which the pulse furnished by the pulse generator 3 is delivered from the emitting ultrasonic converter 4 to the receiving ultrasonicconverter 7. Duration .tau. of the square pulse generated by the shaper 12 (FIG. 2e) corresponds to the duration of the data-carrying portion of the received signal appearing at the output of the amplifier 8 (FIG. 2c) after the time T. In this caseT=.tau..sub.o.
The signal received by the receiving ultrasonic converter 7 is amplified on a logarithmic scale by the amplifier 8 (FIG. 2c) and detected by the amplitude detector 15 from which the signal (FIG. 2d) is applied to the gating unit 13 which passesonly the data-carrying portion of the received signal (FIG. 2f), while the smoothing filter 14 separates a low-frequency component therefrom, that is, converts the pulse signal into a direct-current signal of the same amplitude (FIG. 2g), said amplitudecorresponding to that of the Lamb wave passed along the wall of the measuring vessel 1.
The setting unit 21 is adjusted for a standard amplitude S.sub..lambda.o of the signal obtained on passing the Lamb wave as the standard liquid flows in the measuring vessel 1.
The gamma radiation source 16 sets up gamma radiation propagated through the walls of the measuring vessel 1 and the test medium 2, that is, through the standard liquid. Under the effect of the gamma radiation a flash occurs in the scintillatorof the receiver 17. The resultant glow is intensified and converted into electrical current by the photomultiplier of the receiver 17. The amplifier 18 is used to find the logarithm of the amplitude of the signal derived from the output of the receiver17, while the smoothing filter 19 separates a low-frequency component of the amplified signal.
The setting unit 22 sets the signal amplitude S.sub..gamma.o corresponding to the intensity of the recorded gamma radiation with the standard liquid present in the measuring vessel 1, that is, to the standard intensity of the gamma radiation.
The standard liquid is subsequently drained and the measuring vessel 1 is filled with the suspension to be analyzed. Thereafter the pulse generator 3 and the gamma radiation source 16 are turned on and the above operations are performed on thetest medium 2 which is now the suspension. The damping of the gamma radiation is governed solely by the concentration of the solid phase of the suspension and by the density of its particles and does not depend on the size of said particles. As aresult, measurements are made of the Lamb wave amplitude and the gamma radiation intensity for the suspension, that is, of the effective values of S.sub..lambda. and S.sub..gamma..
The inputs of the subtraction circuit 23 accept signals from the output of the unit 21 and the smoothing filter 14, that is S.sub..lambda.o and S.sub..lambda., the difference therebetween being determined by said circuit. The computed differenceS.sub..lambda.o -S.sub..lambda. corresponds to the concentration of the solid phase in the analyzed medium and may be represented in any form (analog or digital).
The substraction circuit (24) computes the difference between S.sub..gamma.o and S.sub..gamma., which corresponds to the gamma radiation intensity and depends both on the concentration and density of the solid phase of the suspension, that is,the computed difference is S.sub..gamma.o -S.sub..gamma..
The dividing circuit 25 computes the magnitude ##EQU1## which corresponds to the density of particles in the solid phase of the analyzed suspension.
To eliminate the effect of gas pockets on the results obtained in measuring the magnitude S, the pulses from the one-shot multivibrator 10 are used to trigger the additional generator 26, thereby inducing high-power ultrasonic vibrations whosedynamic effects (acoustic flow and radiation pressure) are utilized to degas the test medium 2. Stated differently, the gas phase (gas pockets and bubbles) are removed from the test medium 2 contained in the storing vessel 28. The effect of the gasmedium upon the gamma radiation intensity is, thus, prevented.
The constant level 35 of the test medium 2 over the additional emitting ultrasonic converter 27 and its stable flow through the measuring vessel 1 are the necessary conditions for adequate degassing of the test medium 2 and measurements of itsparameters in the measuring vessel 1 with minimum errors. Therefore, the amount of the test medium 2 supplied to the storing vessel 28 through the connection 31 exceeds that drained through the connection 32. The excessive amount is discharged throughthe connection 32, that is, the constant level 35 of the suspension or standard liquid is maintained in the storing vessel 28.
To decrease variation of the level of the test medium 2 in the storing vessel 28, it is fed thereto through the connection 31 which is disposed above the connection 32. The incoming test medium 2 is set in rotary motion about the centre of thestoring vessel 28 with minimum oscillations of its surface without segregation of particles of the solid phase, while its excessive amount is discharged through the connection 32. Such an arrangement of the connection 32 provides for minimum variationsof the level of the test medium 2 when it is drained.
EXAMPLE 1
The parameters of a solid phase of suspension were checked in compliance with the method forming the subject of the present invention. The output pulses of the generator 3 had the following parameters: duration, 5 .mu.s; amplitude, 180 V;recurrence rate, 1000 Hz. The gamma radiation source 16 was one having cobalt isotope Co.sup.60 as an active element. The analyzed suspension was ferromagnetite. The density of the solid phase of the suspension corresponding to the measured value ofthe output signal of the dividing circuit 25 (4.1 V) was found to be 3.2 g/cm.sup.3.
EXAMPLE 2
The parameters of the output pulses of the generator 3 were similar to those given in Example 1 above. The gamma radiation source 16 was one having caesium isotope Cs.sup.137 as an active element. The analyzed suspension was copper-containingore. The density of the solid phase of the suspension corresponding to the measured value of the output signal of the dividing circuit 25 (3.5 V) was found to be 2.9 g/cm.sup.3.
As is apparent from the above description of the proposed method for monitoring density of a solid phase of suspension and the device therefor, an advantage of the present invention is that it eliminates a preliminary step of preparing a sampleof suspension to be analyzed, that is, there is no need to separate and dry the solid phase inasmuch as the checking process is effected continuously in the flowing test medium 2, for example, in the flowing suspension or standard liquid. This advantageis attributed to the utilization of a new factor affecting a test medium, that is, gamma radiation whose intensity is governed solely by the concentration and density of a solid phase of suspension and depends neither on a particle size spread nor on theeffect of gas bubbles occurring in the test medium 2. The use of a Lamb wave as an ultrasonic wave propagating on the wall of the measuring vessel permits checking density of the solid phase of the suspension at the interface between the wall and thetest medium, a factor making measurements less dependent on a particle size spread and on the effect of gas bubbles. The device forming the subject of the present invention comprises special forming prisms 5 and 6 transforming ultrasonic vibrations intoa Lamb wave and vice versa, as well as the gamma radiation source 16 and the gamma radiation receiver 17 incorporating a scintillator and a photomultiplier. Furthermore, such components of the device as the multivibrator 9, the one-shot multivibrator10, the delay line 11, the square pulse shaper 12, the gating unit 13, the amplitude detector 15, the smoothing filters 14, 19 and the amplifiers 8, 18 provide for matched operation of the emitting and receiving ultrasonic converters 4, 7 of the deviceand its gamma radiation source 16 and receiver 17 in accordance with the operations comprised in the proposed method of monitoring density of the solid phase of the suspension. The preferred circuitry of the data-processing assembly 20 with thelogarithmic amplifiers 8 and 18 makes it possible to compute both density of the solid phase of the analyzed suspension and its concentration (the output signal of the unit 23). All the positive features mentioned above permit decreasing the duration ofa parameter monitoring process and enhancing measuring accuracy. The accuracy of measurements may also be improved if, before transmitting gamma radiation and a Lamb wave through the test medium 2, according to the present method of monitoringparameters of a solid phase of suspension, said test medium 2 is additionally subjected to a high-power ultrasonic vibrations, which is done by incorporating, in the circuitry of the device, an additional pulse generator 26 and an additional emittingultrasonic converter 27 arranged within the storing vessel 28, hydraulically linked with the measuring vessel 1, below the level 35 of the test medium 2. This procedure eliminates gas pockets in the test medium 2 which might cause errors in measurementsof intensity of gamma radiation transmitted through the test medium 2.
INDUSTRIAL APPLICABILITY
This invention can be used in ore-mining, chemical and construction industries for measuring concentrations and density of particles in a solid phase of gas-containing suspensions, which is required to effect further control over theconcentration process of, for example, ore rocks.
* * * * *
Recently Added Patents
(4937
System, method, and computer program product for identifying unwanted data communicated via a session initiation protocol
Method and apparatus for rebuilding data in a dispersed data storage network
Vehicle hood
Charged particle source with integrated electrostatic energy filter
Solid-state imaging apparatus
Semiconductor device having germanium active layer with underlying parasitic leakage barrier layer
Randomly Featured Patents
Rotary anode X-ray tube
RF communication device and method of using it and antenna construction for use in the device and method
System and method for distributed optical character recognition processing
Method of recycling hazardous waste
Method of manufacturing a convertible top assembly
Laser welding apparatus
Coat-stand
Photocatalyst
Method and apparatus for efficient estimation of interference in a wireless receiver
Foldable musical instrument stand
|
What are App Widgets and Make an App a Widget – A Beginner’s Guide
Jayraj
By Jayraj | October 5, 2020 3:43 pm | 3-min read
App Widgets - Appy Pie
App Widgets are miniature app views that can be embedded in other applications and the home screen of your smartphone. Widgets provide any user with quick information without opening an app.
The use of widgets is slowly becoming popular. They are very important to users as they help app makers communicate with users even when they are not using apps. An app maker can virtually adjust every aspect related to the appearance of the widget.
The usage of widgets can also be optimized to work as an asset for the users. For example, a weather app widget displays temperature and an icon summarizing the day’s forecast ; similarly a widget of a calendar app displays the date on the user’s screen. In this blog, we are going to discuss more on the various types of widgets and how you can create your own widgets. But first, here’s an infographic:
App Widget - Appy Pie
Why are Widgets Created?
The basic purpose of a widget is to optimize user experience. Sure, a user could manually open an app to check data but widgets help in reducing the extra steps. A user can simply unlock their phone and directly view the information they want to view with a widget. For example, you have a message on WhatsApp. So,you can either open the app, look for the message and then reply or simply add the WhatsApp widget to your home screen ,view messages and reply without actually opening the app.
Widgets also help simplify the user experience. Widgets are usually focused on one function of an app. Continuing with the example of the WhatsApp widget, the whatsapp widget simply helps you reply to messages. Viewing Stories, updating status, other features can be enjoyed after opening the app.
Things to Remember Before Creating A Widget
Widgets are a rarely discussed topic. There is a lot of debate on what widgets are supposed to do and whether they are actually that necessary. However, the widget is a necessary feature of any app which must be added in the development phase. Not every app has or needs widgets. There are certain things that you need to keep in mind when creating widgets:
• Information Source
• Widgets are a source of information. Your widgets should always be simple and update the user of latest trends and events. For example, a stock market app’s widget should regularly show the user updated points on various stocks.
• Navigate to Your App
• Since a widget is a source of limited information, it should always redirect your users to your app for complete update. Try and ensure that your widget redirects users to the most frequently used features in your app. It can help round out user experience and also get people to use your app more.
• Resizing
• Your widgets can be resized by the user. Consider that fact when creating a widget. Show information that can be resized without affecting the clarity of the widget.
• Branding
• To make it easier for the users to recognize your app’s widgets, include your brand’s logo and color palette in your app widget.
Types of Widgets
Before we proceed on to creating app widgets, you must learn about the various types of app widgets. There are 4 types of widgets:
• Information Widgets
• Information widgets are those which display information. Widgets for calendar apps, weather apps, news apps usually qualify as information widgets. Information widgets have a simple interface and their main goal is to provide relevant information to users on screen itself and avoid the pain of opening an app.
• Control Widgets
• Control widgets are widgets that include triggers in them. The triggers in control widgets can perform an action without a user needing to open an app. An example of a control widget is the Spotify widget. The Spotify Widget shows you which song was playing previously and through the play/pause, you can straightaway play the music from the widget which can save your time required to open your app.
• Collection Widgets
• Collection widgets are widgets that show information through multiple elements at the same time. A gallery widget or the whatsapp widget for messages is a good example of a collection widget.
• Hybrid Widgets
• Hybrid widgets are difficult to create and rare to find. They are usually a combination of both information and control widgets. A weather widget that allows you to check weather of different places through the same widget is an example of a hybrid widget.
You can turn on app widgets in both Android and iOS. Our help center has a simple article that will tell you how to add widgets on your smartphone.
Conclusion
That was all you needed to know about app widgets. Coming to apps, Appy Pie AppMakr is a great platform to start building your apps. You could create your own apps without coding a single line and add widgets to them. Check it out!
Leave a Comment and let us know which app widgets are your favorite!
You May Also Like:
Take a deeper dive into the digital ecosystem and start expanding your business with these helpful resources:
Jayraj
About The Author
Jayraj is a content writer whose goal in life is to be a polymath. He's not there yet but his quest has given him extensive knowledge about many things. He tries to share his knowledge by writing. In his free time, he surfs the Internet and takes long walks.
App Builder |
Skip to main content
Association between single-nucleotide polymorphisms in miRNA and breast cancer risk: an updated review
Abstract
Breast cancer (BC), a heterogeneous, aggressive illness with high mortality, is essentially a genomic disease. While the high-penetrance genes BRCA1 and BRCA2 play important roles in tumorigenesis, moderate- and low-penetrance genes are also involved. Single-nucleotide polymorphisms (SNPs) in microRNA (miRNA) genes have recently been identified as BC risk factors. miRNA genes are currently classified as low-penetrance. SNPs are the most common variations in the human genome. While the role of miRNA SNPs in BC susceptibility has been studied extensively, results have been inconsistent. This review analyzes the results of association studies between miRNA SNPs and BC risk from countries around the world. We conclude that: (a) By continent, the largest proportion of studies to date were conducted in Asia (65.0 %) and the smallest proportion in Africa (1.8 %); (b) Association studies have been completed for 67 different SNPs; (c) 146a, 196a2, 499, 27a, and 423 are the most-studied miRNAs; (d) The SNPs rs2910164 (miRNA-146a), rs11614913 (miRNA-196a2), rs3746444 (miRNA-499) and rs6505162 (miRNA-423) were the most widely associated with increased BC risk; (e) The majority of studies had small samples, which may affect the precision and power of the results; and (f) The effect of an SNP on BC risk depends on the ethnicity of the population. This review also discusses potential explanations for controversial findings.
Introduction
Breast cancer (BC) has a high mortality rate and is the most common type of cancer among women worldwide. The disease is characterized by expression of aberrant genes that confer tumors with heterogeneous morphology and aggressiveness, producing diverse clinical manifestations [1, 2]. BC susceptibility genes and variants are currently classified into three categories that reflect the probability of developing the disease (high, moderate, or low penetrance) [3]. The most common and well-known high-penetrance susceptibility genes, BRCA1 and BRCA2, account for only about 16 % of cases. There is consensus that moderate- and low-penetrance genes are likely responsible for a significant percentage of familial BC in BRCA1/2-negative families [4]. Recent findings suggest that microRNAs (miRNAs) are low-penetrance genes [5]. miRNAs are small, non-coding, single-stranded RNAs approximately 18–25 nucleotides in length [6]. These molecules have drawn the attention of researchers given their numerous roles in cellular, physiological, and pathological processes. miRNAs regulate gene expression by degrading or blocking translation of targets [7, 8] and are specific to different mRNAs. Approximately 30 % of all human genes are regulated by miRNAs [9, 10]. Current data supports the assertion that these RNAs play important and diverse roles in many molecular pathways and biological processes, including development, apoptosis, differentiation, and cell proliferation [11, 12]. Furthermore, miRNAs have been implicated in various human diseases, including cancer. Genome-wide miRNA expression profiling studies have demonstrated that almost all cancer types show specific profiles of up- and downregulated miRNAs [13, 14]. Growing evidence also indicates that miRNAs can function both as oncogenes and tumor suppressors [15, 16]. In 2005, Iorio et al. [17] described an association between miRNAs and BC for the first time, and evidence of their contribution to disease etiology has mounted in the 16 years since their discovery. Several environmental and genetic elements are involved in the various types of BC, and genetic variations in tumor-suppressor and oncogenes are associated with carcinogenesis [18].
Single-nucleotide polymorphisms (SNPs) are the most common form of variation present in the human genome. SNPs in miRNA regions can alter expression of the gene, provoke aberrant maturation, and alter target-binding affinity and specificity [19]. Many epidemiological studies have examined the association between SNPs in miRNAs and cancer [20], concluding that some of these polymorphisms contribute to BC susceptibility in different populations. Research on miRNA genes is critical for understanding the biology of breast tumors, developing new diagnostic strategies, and identifying more effective therapies [21].
SNPs are ethnicity-specific; as a result, findings for a specific population are not always applicable to other groups. Moreover, many countries have several ancestral lineages. Therefore, we conducted an extensive literature review to clarify the wealth of findings on this important topic in the international context. This review discusses the implications of the many association studies between miRNA genetic variations (SNPs) and BC susceptibility published between 2009 and 2020.
The landscape of breast cancer predisposition: past and present
Risk factors for BC include gender, age, hormonal factors, and, most significantly, genetic predisposition (family history). Characteristics of genetic predisposition include dominant autosomal inheritance, high penetrance (that is, a carrier has a 67 % risk of developing BC by 70 years of age and an 80 % risk by 80 years), a genetic frequency of 0.003, and a carrier frequency of 0.006 [22]. The data suggest that 1 in 20 women with BC, and 1 in 200 women in the general population, carry a genetic predisposition, making BC one of the most widely-distributed heritable pathologies. The existence of a gene or genes responsible for a heritable predisposition to breast and ovarian cancer was suggested more than a century ago [23] and has been supported by a large quantity of epidemiological literature over the past 80 years [22, 24,25,26,27,28]. Segregation studies have indicated the existence of one or more genes that determine predisposition for BC.
The discovery of the tumor-suppressor genes BRCA1 (MIM 113,705) [29] and BRCA2 (MIM 600,185) was a major advance in elucidating the genetic etiology of BC [30, 31]. BRCA1/2 are considered high-penetrance BC susceptibility genes [32, 33]. As noted above, the literature indicates that mutations in BRCA1/2 are responsible for an average of 16–20 % of the risk for hereditary BC [3, 34, 35]. However, genome-wide linkage analyses using large samples of BRCA1/2-negative families have failed to map additional high-penetrance susceptibility loci [36]. It is likely, therefore, that moderate- and low-penetrance genes are responsible for a significant percentage of cases in BRCA1/2-negative families [4]. These low-penetrance genes include miRNAs [5].
General features of miRNAs and their relationship with cancer
As mentioned above, miRNAs are small, non-coding, single-stranded RNAs that have drawn the attention of researchers given their roles in many biological processes [6]. miRNAs regulate gene expression mainly by binding to the 3’-UTR of the target mRNA [7, 8]. However, some studies have reported that miRNAs can also bind to the 5’-UTR [20, 37]. It has been proposed that, depending on the base pairing between the miRNA and target, the negative regulatory effect could vary from weak repression of protein translation to complete cleavage of the mRNA [38]. Since their initial discovery in C. elegans by Lee et al. (1993) [7], more than 1200 miRNAs have been identified in humans, although the specific functions of most remain unknown [39]. A better understanding of how miRNAs regulate their targets would likely yield a great deal of insight into the genetic complexity underlying human health and disease [10]. Many miRNAs have already been implicated in various human diseases such as cardiovascular pathologies, psychiatric disorders, neurodegenerative conditions, and cancers [10]. There is increasing evidence for a vital role of aberrant miRNA expression in the complex and multistep process of carcinogenesis, with miRNA genes acting both as tumor suppressors and oncogenes [40]. As cancer is the second-leading cause of death worldwide [41], understanding its pathogenesis is critical; delineating the role of miRNA in this process would be extremely helpful. One of the first direct links between miRNA and cancer was reported by Callin et al. [42], who found decreased miR-15a and miR-16-1 levels in patients with chronic lymphocytic leukemia. In solid tumors, Michael et al. (2003) [43], identified 28 miRNAs that were differentially expressed in colonic adenocarcinoma vs. normal mucosal tissue, reporting that miR-143 and miR-145 levels were significantly lower in tumors than normal tissues.
As noted, nearly all cancer types have specific profiles of up- and downregulated miRNAs [13, 14]. Several studies have described specific miRNA expression signatures in breast carcinomas [17], primary glioblastomas [44], hepatocellular carcinomas [45], papillary thyroid carcinomas [46], and lung cancer [47]. A large profiling analysis of 540 samples from solid tumors in the lung, breast, stomach, prostate, colon, and pancreas demonstrated that 43 miRNAs were deregulated compared to matched normal tissues [48].
miRNAs can likely function as oncogenes when their targets are onco-suppressor molecules and as tumor-suppressor genes when their targets are oncogenes [15, 16]. Furthermore, a miRNA can function as both a tumor-suppressor and an oncogene depending on the cancer type and cellular context [49]. In fact, a duality of function in different types of cancers has been reported for many miRNAs. One example is miR-125b, which plays opposite roles in different cancer types and cell lines. As a tumor suppressor, miR-125b is downregulated in ovarian, thyroid, breast, and oral squamous-cell carcinomas, promoting cell proliferation and cell-cycle progression [50]. On the other hand, miR-125b is an oncogene in prostate cancer, glioblastomas, and neuroblastomas. miR-125b inhibits apoptosis in a p53-dependent manner in neuroblastoma cells and promotes cell proliferation and invasion in prostate cancer cells [51, 52]. After early studies suggested a role for miRNA genes in the pathogenesis of human cancers, platforms were developed to assess global miRNA expression. The goal of these analyses was to assess the potential of miRNAs in tumor classification and as diagnostic, predictive, or prognostic biomarkers [12].
miRNAs and breast cancer
Microarrays containing all known human miRNAs can be used to identify miRNAs that are differentially expressed in normal and tumor samples, and this approach may be used to determine which miRNA molecules are involved in human cancer. In BC, miRNA microarrays have been used to evaluate miRNA expression profiles in 10 normal and 76 neoplastic breast tissues, identifying 29 miRNAs whose expression was significantly deregulated (p < 0.05) and a smaller set of 15 miRNAs that were able to predict whether a sample was tumor or normal breast tissue with 100 % accuracy [17, 53]. Among the differentially-expressed miRNAs, miR-10b, miR-125b, miR-145, miR-21 and miR-155 were the most consistently deregulated in BC. miR-10b, miR-125b and miR-145 were downregulated, while miR-21 and miR-155 were up-regulated, suggesting that they may act as tumor-suppressor or oncogenes, respectively. In addition, it was possible to identify miRNAs whose expression was correlated with specific BC histopathologic features, such as estrogen and progesterone receptor expression (miR-30), lymph node metastasis (let-7f-1, let-7a-3, let-7a-2) or high proliferative index (let-7c, let-7d) in tumor samples. Therefore, several expression profiling studies have demonstrated that there is a large number of deregulated miRNAs in human BC.
Association studies between miRNA SNPs and breast cancer susceptibility
We conducted a literature review of association studies between miRNA genetic variations (SNPs) and BC susceptibility. PubMed, EBSCO, SciELO, and Google Scholar databases were searched for all studies involving SNPs in miRNAs related to BC risk around the world. The search terms included: “SNPs in miRNA and breast cancer susceptibility;” “association of SNPs in miRNAs with breast cancer risk;” “South America;” “North America;” “Latin America;” “Europe;” “Asia;” “Oceania;” and other terms associated with different countries. Manuscripts published between the years 2009 and 2020 were considered. Only papers published in English were reviewed. Non-human studies, in vitro or in vivo studies, and studies focused on topics other than SNPs in miRNAs and BC susceptibility were excluded. Inclusion criteria were: (a) association studies between SNPs in miRNAs and BC susceptibility; (b) country of origin for BC cases was specified; (c) the miRNAs and SNPs studied were identified. After the search was completed, studies were organized in a Google Sheets spreadsheet. Out of a total of 72 studies, 15 studies were removed due to lack of information regarding the inclusion criteria and 57 were included in this review.
Association studies were found in 17 countries (Australia, Brazil, Chile, China, France, Germany, India, Iran, Ireland, Israel, Italy, Pakistan, Saudi Arabia, Spain, Tunisia, USA, and Vietnam) on 5 continents. Of the 57 association studies included in this review, one was conducted in Africa (1.8 %), 37 in Asia (65.0 %), 9 in Europe (15.8 %), 3 in North America (5.3 %), 3 in Oceania (5.3 %), and 4 in South American countries (7.0 %). In total, 16,906 cases and 19,263 controls were included in the 57 studies. Table 1 shows the studies included, indicating the miRNAs and SNPs studied, the case and control sample sizes, and the continent and country where the study was conducted.
Table 1 International association studies between miRNA SNPs and breast cancer risk, by continent
When the results were analyzed by continent, we found that Asia had the highest proportion of studies (65.0 %) and Africa the lowest (1.8 %). Within Asia, 45.9 % of the studies were conducted in Iran, 35.1 % in China, 5.4 % in Saudi Arabia, 5.4 % in India, 5.4 % in Vietnam, 2.7 % in Pakistan, and 2.7 % in Israel. The continent with the second-highest number of studies was Europe (15.8 %), where studies were carried out in 5 countries: France (11.1 %), Germany (33.3 %), Ireland (11.1 %), Italy (33.3 %), and Spain (11.1 %). Studies in South America accounted for 7.0 % of studies around the world and were performed only in Chile (50 %) and Brazil (50 %). In Oceania, studies have only been carried out in Australia, corresponding to 5.3 % of the total. In North America, the only country with association studies between miRNA SNPs and BC risk is the USA, representing 5.3 % of total studies. Finally, only one study was available for Africa, conducted in Tunisia, accounting for 1.8 % of studies worldwide. Figure 1 shows the scope of association studies between miRNA SNPs and BC risk in countries around the world.
Fig. 1
figure 1
Scope of association studies between miRNA SNPs and breast cancer around the world. Green areas correspond to countries with studies included in this review. The color gradient represents the number of studies in each country
The SNPs studied were located in 53 different miRNAs (Table 1). Figure 2 shows the number of studies for each miRNA evaluated in this review. 146a, 196a2, 499, 27a, and 423 were the most-studied miRNAs, included at least 6 studies (Fig. 2). The most-studied miRNA was miRNA 146a, with reports from 4 to 5 continents (Africa, Asia, Europe, and America). In Africa, this miRNA only has been studied in Tunisia; in Asia, there are studies in China, India, Iran, Saudi Arabia, and Pakistan; in Europe, France, Ireland, Italy, and Spain have studies; and in the Americas, there are only studies from Chile and Brazil. The miRNA-196a2 was studied in 4 of 5 continents, (Asia, Europe, America, and Oceania). In Asia, miRNA-196a2 was studied in China, India, Iran, Saudi Arabia, and Vietnam; in Europe, in Germany and Italy; in North America, only in the USA; in South America, in Chile and Brazil; and in Oceania, only in Australia. The miRNA499 was studied in China, India, Iran, and Saudi Arabia in Asia; in Europe, there are reports from Germany and Italy; and only in Chile in South America. miRNA 27a was studied in 3 of 5 continents (Asia, Europe, and America). In Asia, studies were carried out in China, Iran, and Israel; in Europe, in Germany and Italy; and only in Chile in South America. Finally, miRNA 423 was studied in Asia, Oceania, and America. In Asia, there are reports in China and Saudi Arabia; in Oceania, in Australia; and in South America, only in Chile.
Fig. 2
figure 2
Number of studies performed for each miRNA included in this review
Table 2 summarizes the SNPs studied by miRNA, indicating the countries where the studies were conducted.
Sixty-seven SNPs were studied in the 53 miRNAs. In 85.0 % of the miRNAs, a single SNP was studied, and in 10.4 %, two SNPs were studied. Three different SNPs were studied in the miRNAs 185 and 30a, and 4 in the 30c-1 (Table 2). Forty different SNPs were studied in China, 14 in Iran, 18 in USA, 10 in Chile, 5 in Germany, 4 in Saudi Arabia and Italy, 3 in Australia and India, 2 in Vietnam and Brazil, and only one SNP was studied in France, Ireland, Pakistan, Spain, Tunisia, and Israel.
Table 2 Summary of SNPs studied by miRNA and country
Table 3 shown the results of the association studies between miRNA SNPs and BC risk according to risk category: increased risk, protective effect, and no association. Of the 53 miRNAs and 67 SNPs included in this review, only 18 miRNAs (33.3 %) and 19 SNPs (28.4 %) (Table 3) were associated with increased risk. The Asian ethnic group had the highest number of SNPs associated with risk (16.4 %). In the USA, 6 SNPs (9 %) were associated with increased BC risk in both African- and European-American women. In South America, 5 different SNPs (7.5 %) in the miRNAs 146a, 196a2, 423, 618, and 182 were associated with increased BC risk, and in Europe (Italy) only one SNP, rs2910164 in miRNA 146a, was associated with risk (1.5 %).
Thirteen miRNAs (24.1 %) and 15 SNPs (22.4 %) were associated with decreased BC risk. In Asia, 8 SNPs (12 %) had a protective effect, and in Europe only one SNP (1.5 %) rs895819:A > G (miRNA-27a) was associated with decreased risk, in a German population. In North America (USA), 4 SNPs (6 %) located in four different miRNAs were associated with decreased BC risk in African- and European-American women. In South America, 3 SNPs (4.5 %) were protective, and in Oceania (Australia), the only SNP associated with decreased BC was rs6505162:A > C in miRNA-423 (1.5 %). Of the total miRNAs included in this review, 28 different miRNAs (52.8 %) and 31 different SNPs (46.3 %) were associated with BC risk.
Genetic variations are ethnicity-specific; therefore, results of association studies between a miRNA SNP and BC risk may diverge depending on ethnicity. The most-studied SNP, rs2910164:G > C in miRNA-146a, was found to increase the risk of developing breast cancer in Brazilian, Chinese, Iranian, Italian, and Pakistani populations (Table 3) but showed no association in Chilean, Chinese, French, German, Iranian, Irish, Italian, Saudi Arabian, Spanish, or Tunisian populations (Table 3). The heterozygous variant showed a protective effect in a North Indian population (Table 3). With respect to the second most-common SNP, rs11614913:C > T in miRNA-196a2 was associated with increased risk in Brazilian, Chinese, Iranian, and Saudi Arabian populations but showed no association in Chilean, Caucasian Australian, Chinese, Iranian, Indian, Italian, or German populations and was protective in Brazil, China, USA, and Vietnam. The studies in China were conducted in different regions of the country, and the Brazilian study by Linhares et al. (2012) [108], showed that for the SNP rs11614913:C > T, the allele T increased risk, while the allele C had a protective effect (Table 4). The SNP rs3746444:A > G in miRNA-499 increased risk in Chinese, Iranian and Saudi Arabian populations, and showed a protective effect in an Iranian population (genotype CC and CT) (Table 4), but showed no association in Chilean, Chinese, German, North Indian, or Italian populations. The rs895819:A > G in miRNA-27a was protective in Chilean, Chinese, German, Iranian, and Israeli populations, but showed no association in Chinese, Italian, or Vietnamese populations. Another relatively common SNP was rs6505162, located in miRNA-423. This SNP showed an association with increased BC risk in Chilean and Saudi Arabian populations but had a protective effect in a Caucasian Australian population.
Table 3 Association categories for miRNA SNPs and breast cancer risk
Table 4 shows the allele or genotype associated with BC risk in the miRNA SNPs included in this review. For the most-studied SNPs, which were analyzed in at least 6 studies, controversial results are observed. For the miRNA-146a rs2910164:G > C, the C allele was the MAF and risk allele in Italy, Pakistan, Iran, and Brazil; in China, however, the risk genotypes were CG and homozygous GG, and allele G was the MAF and risk allele. For the miRNA-196a2 rs11614913:C > T, the risk allele was C in two studies from China as well as studies from Iran and India. Nevertheless, in Brazil and Saudi Arabia, two ethnically-different countries, the risk allele was T. Other discrepancies are shown in Table 4. In sum, association results from a single study should be interpreted and analyzed with caution. Factors to consider include cohort size, ethnicity, and ancestral lineage, especially in countries with more than one lineage.
Table 4 Allele or genotype associated with breast cancer risk in miRNA SNPs included in this review
Discussion
The majority of the association studies between miRNA SNPs and BC risk were carried out in Asia. To paint a more complete view of the influence of miRNA SNPs on BC risk, it will therefore be necessary to perform this type of study in more American, Oceanic, and African countries. Most of the studies had small sample sizes, which, as is well known, may influence the precision of the results and the power of the studies to draw conclusions. Although multiple meta-analyses in recent years have attempted to define the association between certain miRNA polymorphisms and BC risk more precisely, there still seems to be no clear consensus. It has been established that SNPs are the most common source of variability in the human genome and that these variations are ethnicity-specific. Thus, the effect of a specific SNP on BC risk may differ depending of the ethnicity of a specific population. Chen, Q. et al. 2014, observed that miR-196a-2 rs11614913*T, miR-499 rs3746444*T, and miR-605 rs2043556*A alleles predicted a decreased risk of breast cancer among Asians but not Caucasians [19]. Fejerman et al. [110], performed a study comparing genetic variants in Hispanic and non-Hispanic white women based on the fact that Hispanic women in the USA have been shown to have a lower incidence of BC [110]. The authors observed that 3 of 5 variants were associated with BC risk in Hispanic women but not in non-Hispanic women and suggested that the proportion of indigenous American ancestry modified the magnitude and direction of risk associations in 3 of the 10 variants studied. Therefore, the authors concluded that genetic ancestry is a factor to consider when performing association studies in women of mixed descent [110].
Controversial results were observed for the most-studied SNPs, each analyzed in at least 6 studies: miRNA-146a rs2910164:G > C, miRNA-192a2 rs11614913:C > T, miRNA-499 rs3746444:T > C, and miRNA-27a rs895819:A > G.
The miRNA-146a rs2910164 showed controversial results in China, Iran, and Italy. Four studies performed in China included this SNP. The SNP was associated with increased risk in two of these studies [55, 56], but not in the other two [59, 61]. In the articles by He et al. [56], Qi et al. [55], and Ma et al. [61], the case and control sample sizes were small (Table 1). In the Hu et al. [59], study, which included 1009 cases and 1093 controls, rs2910164:G > C was not associated with BC risk. China is a country with many different ethnicities. The study by Qi et al. [55], was conducted in Henan province, which is widely recognized as the place where Chinese civilization originated. In this study, the SNP was associated with increased BC risk. The other 3 studies were conducted in the same region or nearby provinces. However, the discrepancies between these studies may be due to the fact that He et al. identified the risk association in a sample of postmenopausal women with BC, while Qi et al. [55], simply indicated that there was an increased BC risk without further specifications. Regarding the two studies that did not find an association, the Ma et al. study assessed a sample of women with triple-negative BC, while Hu et al. [59], indicated no association with BC risk without further specifications. Therefore, the divergent results for this SNP in the populations studied could be a consequence of the characteristics of the cases.
miRNA-192a2 rs11614913:C > T showed controversial results in Brazil, China, and Iran. In Brazil, Linhares et al. [108], reported an increased risk for the T-allele but a protective effect for the wild-type CC genotype, which is not a discrepancy. In China, 5 authors studied this SNP. In two publications, the SNP was associated with increased BC risk [55, 56]; in one study it was associated with decreased risk [57]; and in two studies there was no association between the SNP and risk [60, 61]. These findings could be the consequence of ethnic differences. The Hu et al. [59], study included a Nanjing population, where the main ethnic group is Han, but 50 other official ethnic groups are also present. In this population, the SNP was associated with increased BC risk. In the Dai et al. study [57], in which the SNP was associated with decreased BC risk, the ethnicity of the population studied was mainly Han. Zhang et al. found no association between the SNP and BC risk in a population from Zhejiang province, where the ethnic groups include Han, She, Hu, and 49 minority ethnic groups. All of the authors who studied rs11614913 used cases with BC without specifying whether the cancer was familial, sporadic, or early-onset or had other notable characteristics. Consequently, the heterogeneity of the types of BC included in the samples could provoke discrepancies in the results. It is likely that divergent results from Iranian studies are fundamentally due to variations in ethnicity, as this country includes Persians (the main ethnic group), Azeris, Kurds, Lurs, Turkmens, and Baloch, and others.
The discrepancies observed for miRNA-499 rs3746444:T > C and miRNA-27a rs895819:A > G from studies conducted in China and Iran can be explained by the same reasons discussed for miRNA-146a and miRNA-196a2.
It is clear that more studies in Western populations are needed. In South America, only two countries, Chile and Brazil, have performed such studies. This situation underrepresents Western populations. Another issue that all of these studies classified Asians as a single population group despite the fact that Asia is extremely diverse. It was recently reported that the continent has at least ten ancestral lineages, while areas such as northern Europe have only one [111]. In this review, we included studies from China, Iran, India, Saudi Arabia, Israel, and Vietnam, countries with very different ethnicities and genetic profiles. Unfortunately, these differences are not considered in most population-based analyses. The GenomeAsia100k consortium has addressed this problem, noting that underrepresentation of non-Europeans in genetic studies has limited the diversity of individuals in genomic datasets. As a result, many findings have limited medical relevance for a large proportion of the world’s population [112]. The need for more specific population-based studies is clear, with Asian populations separated into more homogenous groups.
In a clinical context, molecular information regarding breast cancer has become highly relevant. The World Health Organization emphasizes that early diagnosis of BC is critical for optimizing outcomes and survival [113]. Unfortunately, the available molecular diagnostic methods may pose limitations. Therefore, miRNAs have emerged as possible diagnostic and prognostic biomarkers. miRNAs also have a potential role in personalized therapy [114]. Srinivasan et al. 2016, has reported that SNPs are more precise genetic determinants than family history; furthermore, SNP genotyping can be performed without the need for invasive techniques [115].
Conclusions
This review examined the sometimes-conflicting results available in the international literature regarding the impact of miRNA polymorphisms on BC risk. We can conclude that: (a) The greatest proportion of studies on this topic have been carried out in Asia (65.0 %), while only one such study has been performed in Africa (1.8 %). In South America, studies have only been conducted in Chile (50 %) and Brazil (50 %), and in Oceania, studies have only been carried out only in Australia; (b) Association studies have been performed for 67 SNPs, located in 53 miRNAs; (c) 146a, 196a2, 499, 27a, and 423 are the most-studied miRNAs, with each included in at least 6 studies; (d) Most of the studies had small samples, possibly limiting the precision of the results and the power to draw conclusions; and (e) This review demonstrates that the effect of a specific SNP on BC risk varies according to the ethnicity the population. It is crucial that comprehensive evaluations be performed in larger cohorts, stratified by ethnicity and histological subtype, to better define the associations between miRNA polymorphisms and BC risk.
Availability of data and materials
All data are shown within the manuscript.
Code availability
Not applicable.
References
1. 1.
Ciriello G, Sinha R, Hoadley KA, Jacobsen AS, Reva B, Perou CM, Sander C, Schultz N. The molecular diversity of Luminal A breast tumors. Breast Cancer Res Treat. 2013;141:409–20. https://doi.org/10.1007/s10549-013-2699-3.
CAS Article PubMed PubMed Central Google Scholar
2. 2.
Cecilio AP, Takakura ET, Jumes JJ, Dos Santos JW, Herrera AC, Victorino VJ, Panis C. Breast cancer in Brazil: epidemiology and treatment challenges. Breast Cancer. 2015;7:43–9. https://doi.org/10.2147/BCTT.S50361.
Article PubMed PubMed Central Google Scholar
3. 3.
Couch FJ, Hart SN, Sharma P, Toland AE, Wang X, Miron P, Olson JE, Godwin AK, Pankratz VS, Olswold C, et al. Inherited mutations in 17 breast cancer susceptibility genes among a large triple-negative breast cancer cohort unselected for family history of breast cancer. J Clin Oncol. 2015;33:304–11. https://doi.org/10.1200/JCO.2014.57.1414.
CAS Article PubMed Google Scholar
4. 4.
Ford D, Easton DF, Stratton M, Narod S, Goldgar D, Devilee P, Bishop DT, Weber B, Lenoir G, Chang-Claude J, et al. Genetic heterogeneity and penetrance analysis of the BRCA1 and BRCA2 genes in breast cancer families. The Breast Cancer Linkage Consortium. Am J Hum Genet. 1998;62:676–89. https://doi.org/10.1086/301749.
CAS Article PubMed PubMed Central Google Scholar
5. 5.
Ryan BM, Robles AI, Harris CC. Genetic variation in microRNA networks: the implications for cancer research. Nat Rev Cancer. 2010;10:389–402. https://doi.org/10.1038/nrc2867.
CAS Article PubMed PubMed Central Google Scholar
6. 6.
Bai RP, Weng Y, Su LL, Jin MJ, Xu ZP, Lu LQ, Chen GD. Association of a pre-miR-27a polymorphism with cancer risk: an updated meta-analysis. Asian Pac J Cancer Prevention APJCP. 2014;15:10107–14. https://doi.org/10.7314/apjcp.2014.15.23.10107.
Article Google Scholar
7. 7.
Lee RC, Feinbaum RL, Ambros V. The C. elegans heterochronic gene lin-4 encodes small RNAs with antisense complementarity to lin-14. Cell. 1993;75:843–54. https://doi.org/10.1016/0092-8674(93)90529-y.
CAS Article PubMed Google Scholar
8. 8.
He L, Hannon GJ. MicroRNAs: small RNAs with a big role in gene regulation. Nat Rev Genet. 2004;5:522–31. https://doi.org/10.1038/nrg1379.
CAS Article PubMed Google Scholar
9. 9.
Lewis BP, Burge CB, Bartel DP. Conserved seed pairing, often flanked by adenosines, indicates that thousands of human genes are microRNA targets. Cell. 2005;120:15–20. https://doi.org/10.1016/j.cell.2004.12.035.
CAS Article PubMed Google Scholar
10. 10.
Erson AE, Petty EM. MicroRNAs in development and disease. Clin Genet. 2008;74:296–306. doi:https://doi.org/10.1111/j.1399-0004.2008.01076.x.
CAS Article PubMed Google Scholar
11. 11.
Cheng AM, Byrom MW, Shelton J, Ford LP. Antisense inhibition of human miRNAs and indications for an involvement of miRNA in cell growth and apoptosis. Nucleic Acids Res. 2005;33:1290–7. https://doi.org/10.1093/nar/gki200.
CAS Article PubMed PubMed Central Google Scholar
12. 12.
Xu P, Guo M, Hay BA. MicroRNAs and the regulation of cell death. Trends Genet. 2004;20:617–24. doi:https://doi.org/10.1016/j.tig.2004.09.010.
CAS Article PubMed Google Scholar
13. 13.
Lu J, Getz G, Miska EA, Alvarez-Saavedra E, Lamb J, Peck D, Sweet-Cordero A, Ebert BL, Mak RH, Ferrando AA, et al. MicroRNA expression profiles classify human cancers. Nature. 2005;435:834–8. https://doi.org/10.1038/nature03702.
CAS Article Google Scholar
14. 14.
Calin GA, Croce CM. MicroRNA signatures in human cancers. Nat Rev Cancer. 2006;6:857–66. https://doi.org/10.1038/nrc1997.
CAS Article PubMed Google Scholar
15. 15.
Negrini M, Nicoloso MS, Calin GA. MicroRNAs and cancer–new paradigms in molecular oncology. Curr Opin Cell Biol. 2009;21:470–9. https://doi.org/10.1016/j.ceb.2009.03.002.
CAS Article PubMed Google Scholar
16. 16.
Iorio MV, Casalini P, Piovan C, Braccioli L, Tagliabue E. Breast cancer and microRNAs: therapeutic impact. Breast. 2011;20(Suppl 3):63–70. https://doi.org/10.1016/S0960-9776(11)70297-1.
Article Google Scholar
17. 17.
Iorio MV, Ferracin M, Liu CG, Veronese A, Spizzo R, Sabbioni S, Magri E, Pedriali M, Fabbri M, Campiglio M, et al. MicroRNA gene expression deregulation in human breast cancer. Cancer Res. 2005;65:7065–70. https://doi.org/10.1158/0008-5472.CAN-05-1783.
CAS Article PubMed Google Scholar
18. 18.
Kalemi TG, Lambropoulos AF, Gueorguiev M, Chrisafi S, Papazisis KT, Kotsis A. The association of p53 mutations and p53 codon 72, Her 2 codon 655 and MTHFR C677T polymorphisms with breast cancer in Northern Greece. Cancer Lett. 2005;222:57–65. https://doi.org/10.1016/j.canlet.2004.11.025.
CAS Article PubMed Google Scholar
19. 19.
Chen QH, Wang QB, Zhang B. Ethnicity modifies the association between functional microRNA polymorphisms and breast cancer risk: a HuGE meta-analysis. Tumour Biol. 2014;35:529–43. https://doi.org/10.1007/s13277-013-1074-7.
CAS Article PubMed Google Scholar
20. 20.
O’Day E, Lal A. MicroRNAs and their target gene networks in breast cancer. Breast Cancer Res: BCR. 2010;12:201. https://doi.org/10.1186/bcr2484.
CAS Article PubMed PubMed Central Google Scholar
21. 21.
Petrone I, Bernardo PS, Dos Santos EC, Abdelhay E. MTHFR C677T and A1298C polymorphisms in breast cancer, gliomas and gastric cancer: a review. Genes. 2021. https://doi.org/10.3390/genes12040587.
Article PubMed PubMed Central Google Scholar
22. 22.
Claus EB, Risch N, Thompson WD. Genetic analysis of breast cancer in the cancer and steroid hormone study. Am J Hum Genet. 1991;48:232–42.
CAS PubMed PubMed Central Google Scholar
23. 23.
Angeli D, Salvi S, Tedaldi G. Genetic predisposition to breast and ovarian cancers: how many and which genes to test? Int J Mol Sci. 2020. https://doi.org/10.3390/ijms21031128.
Article PubMed PubMed Central Google Scholar
24. 24.
Penrose LS, Mackenzie HJ, Karn MN. A genetical study of human mammary cancer. Ann Eugenics. 1948;14 pt:234–266. https://doi.org/10.1111/j.1469-1809.1947.tb02399.x.
25. 25.
Anderson DE. A genetic study of human breast cancer. J Natl Cancer Inst. 1972;48:1029–34.
CAS PubMed Google Scholar
26. 26.
Bain C, Speizer FE, Rosner B, Belanger C, Hennekens CH. Family history of breast cancer as a risk indicator for the disease. Am J Epidemiol. 1980;111:301–8. https://doi.org/10.1093/oxfordjournals.aje.a112901.
CAS Article PubMed Google Scholar
27. 27.
Schwartz AG, King MC, Belle SH, Satariano WA, Swanson GM. Risk of breast cancer to relatives of young breast cancer patients. J Natl Cancer Inst. 1985;75:665–8.
CAS PubMed Google Scholar
28. 28.
Newman B, Austin MA, Lee M, King MC. Inheritance of human breast cancer: evidence for autosomal dominant transmission in high-risk families. Proc Natl Acad Sci USA. 1988;85:3044–8. https://doi.org/10.1073/pnas.85.9.3044.
CAS Article PubMed PubMed Central Google Scholar
29. 29.
Miki Y, Swensen J, Shattuck-Eidens D, Futreal PA, Harshman K, Tavtigian S, Liu Q, Cochran C, Bennett LM, Ding W, et al. A strong candidate for the breast and ovarian cancer susceptibility gene BRCA1. Science. 1994;266:66–71. https://doi.org/10.1126/science.7545954.
CAS Article Google Scholar
30. 30.
Wooster R, Neuhausen SL, Mangion J, Quirk Y, Ford D, Collins N, Nguyen K, Seal S, Tran T, Averill D, et al. Localization of a breast cancer susceptibility gene, BRCA2, to chromosome 13q12-13. Science. 1994;265:2088–90. https://doi.org/10.1126/science.8091231.
CAS Article PubMed Google Scholar
31. 31.
Tavtigian SV, Simard J, Rommens J, Couch F, Shattuck-Eidens D, Neuhausen S, Merajver S, Thorlacius S, Offit K, Stoppa-Lyonnet D, et al. The complete BRCA2 gene and mutations in chromosome 13q-linked kindreds. Nat Genet. 1996;12:333–7. https://doi.org/10.1038/ng0396-333.
CAS Article PubMed Google Scholar
32. 32.
Oldenburg RA, Meijers-Heijboer H, Cornelisse CJ, Devilee P. Genetic susceptibility for breast cancer: how many more genes to be found? Crit Rev Oncol/Hematol. 2007;63:125–49. https://doi.org/10.1016/j.critrevonc.2006.12.004.
CAS Article Google Scholar
33. 33.
Turnbull C, Rahman N. Genetic predisposition to breast cancer: past, present, and future. Annu Rev Genom Hum Genet. 2008;9:321–45. https://doi.org/10.1146/annurev.genom.9.081307.164339.
CAS Article Google Scholar
34. 34.
Stratton MR, Rahman N. The emerging landscape of breast cancer susceptibility. Nat Genet. 2008;40:17–22. https://doi.org/10.1038/ng.2007.53.
CAS Article PubMed Google Scholar
35. 35.
Prevalence. penetrance of BRCA1 and BRCA2 mutations in a population-based series of breast cancer cases. Anglian Breast Cancer Study Group. Br J Cancer. 2000;83:1301–8. https://doi.org/10.1054/bjoc.2000.1407.
Article Google Scholar
36. 36.
Smith P, McGuffog L, Easton DF, Mann GJ, Pupo GM, Newman B, Chenevix-Trench G, kConFab I, Szabo C, Southey M, et al. A genome wide linkage search for breast cancer susceptibility genes. Genes Chromosom Cancer. 2006;45:646–55. https://doi.org/10.1002/gcc.20330.
CAS Article PubMed Google Scholar
37. 37.
Iorio MV, Croce CM. microRNA involvement in human cancer. Carcinogenesis. 2012;33:1126–33. https://doi.org/10.1093/carcin/bgs140.
CAS Article PubMed PubMed Central Google Scholar
38. 38.
Baek D, Villen J, Shin C, Camargo FD, Gygi SP, Bartel DP. The impact of microRNAs on protein output. Nature. 2008;455:64–71. https://doi.org/10.1038/nature07242.
CAS Article PubMed PubMed Central Google Scholar
39. 39.
Srivastava K, Srivastava A. Comprehensive review of genetic association studies and meta-analyses on miRNA polymorphisms and cancer risk. PloS One. 2012;7:e50966. https://doi.org/10.1371/journal.pone.0050966.
CAS Article PubMed PubMed Central Google Scholar
40. 40.
Zhou K, Liu M, Cao Y. New Insight into microRNA Functions in Cancer: Oncogene-microRNA-Tumor Suppressor Gene Network. Front Mol Biosci. 2017;4:46. https://doi.org/10.3389/fmolb.2017.00046.
CAS Article PubMed PubMed Central Google Scholar
41. 41.
Organization WH, Cancer. https://www.who.int/news-room/fact-sheets/detail/cancer . Accessed on May.
42. 42.
Calin GA, Dumitru CD, Shimizu M, Bichi R, Zupo S, Noch E, Aldler H, Rattan S, Keating M, Rai K, et al. Frequent deletions and down-regulation of micro-RNA genes miR15 and miR16 at 13q14 in chronic lymphocytic leukemia. Proc Natl Acad Sci USA. 2002;99:15524–9. https://doi.org/10.1073/pnas.242606799.
CAS Article PubMed PubMed Central Google Scholar
43. 43.
Michael MZ, SM OC, van Holst Pellekaan NG, Young GP, James RJ. Reduced accumulation of specific microRNAs in colorectal neoplasia. Mol Cancer Res: MCR. 2003;1:882–91.
CAS PubMed Google Scholar
44. 44.
Ciafre SA, Galardi S, Mangiola A, Ferracin M, Liu CG, Sabatino G, Negrini M, Maira G, Croce CM, Farace MG. Extensive modulation of a set of microRNAs in primary glioblastoma. Biochem Biophys Res Commun. 2005;334:1351–8. https://doi.org/10.1016/j.bbrc.2005.07.030.
CAS Article PubMed Google Scholar
45. 45.
Murakami Y, Yasuda T, Saigo K, Urashima T, Toyoda H, Okanoue T, Shimotohno K. Comprehensive analysis of microRNA expression patterns in hepatocellular carcinoma and non-tumorous tissues. Oncogene. 2006;25:2537–45. https://doi.org/10.1038/sj.onc.1209283.
CAS Article PubMed Google Scholar
46. 46.
He H, Jazdzewski K, Li W, Liyanarachchi S, Nagy R, Volinia S, Calin GA, Liu CG, Franssila K, Suster S, et al. The role of microRNA genes in papillary thyroid carcinoma. Proc Natl Acad Sci USA. 2005;102:19075–80. https://doi.org/10.1073/pnas.0509603102.
CAS Article PubMed PubMed Central Google Scholar
47. 47.
Yanaihara N, Caplen N, Bowman E, Seike M, Kumamoto K, Yi M, Stephens RM, Okamoto A, Yokota J, Tanaka T, et al. Unique microRNA molecular profiles in lung cancer diagnosis and prognosis. Cancer cell. 2006;9:189–98. https://doi.org/10.1016/j.ccr.2006.01.025.
CAS Article PubMed Google Scholar
48. 48.
Volinia S, Calin GA, Liu CG, Ambs S, Cimmino A, Petrocca F, Visone R, Iorio M, Roldo C, Ferracin M, et al. A microRNA expression signature of human solid tumors defines cancer gene targets. Proc Natl Acad Sci USA. 2006;103:2257–61. https://doi.org/10.1073/pnas.0510565103.
CAS Article PubMed PubMed Central Google Scholar
49. 49.
Cortez MA, Bueso-Ramos C, Ferdin J, Lopez-Berestein G, Sood AK, Calin GA. MicroRNAs in body fluids–the mix of hormones and biomarkers. Nat Rev Clin Oncol. 2011;8:467–77. https://doi.org/10.1038/nrclinonc.2011.76.
CAS Article PubMed PubMed Central Google Scholar
50. 50.
Visone R, Pallante P, Vecchione A, Cirombella R, Ferracin M, Ferraro A, Volinia S, Coluzzi S, Leone V, Borbone E, et al. Specific microRNAs are downregulated in human thyroid anaplastic carcinomas. Oncogene. 2007;26:7590–5. https://doi.org/10.1038/sj.onc.1210564.
CAS Article PubMed Google Scholar
51. 51.
Le MT, Teh C, Shyh-Chang N, Xie H, Zhou B, Korzh V, Lodish HF, Lim B. MicroRNA-125b is a novel negative regulator of p53. Genes Dev. 2009;23:862–76. https://doi.org/10.1101/gad.1767609.
CAS Article PubMed PubMed Central Google Scholar
52. 52.
Ozen M, Creighton CJ, Ozdemir M, Ittmann M. Widespread deregulation of microRNA expression in human prostate cancer. Oncogene. 2008;27:1788–93. https://doi.org/10.1038/sj.onc.1210809.
CAS Article PubMed Google Scholar
53. 53.
Khalife H, Skafi N, Fayyad-Kazan M, Badran B. MicroRNAs in breast cancer: new maestros defining the melody. Cancer Genet. 2020;246–247:18–40. https://doi.org/10.1016/j.cancergen.2020.08.005.
CAS Article PubMed Google Scholar
54. 54.
Belaiba F, Medimegh I, Ammar M, Jemni F, Mezlini A, Romdhane KB, Cherni L, Benammar Elgaaied A. Expression and polymorphism of micro-RNA according to body mass index and breast cancer presentation in Tunisian patients. J Leukoc Biol. 2019;105:317–27. https://doi.org/10.1002/JLB.3VMA0618-218R.
CAS Article PubMed Google Scholar
55. 55.
Qi P, Wang L, Zhou B, Yao WJ, Xu S, Zhou Y, Xie ZB. Associations of miRNA polymorphisms and expression levels with breast cancer risk in the Chinese population. Genetics molecular research: GMR. 2015;14:6289–96. https://doi.org/10.4238/2015.June.11.2.
CAS Article PubMed Google Scholar
56. 56.
He B, Pan Y, Xu Y, Deng Q, Sun H, Gao T, Wang S. Associations of polymorphisms in microRNAs with female breast cancer risk in Chinese population. Tumour Biol. 2015;36:4575–82. https://doi.org/10.1007/s13277-015-3102-2.
CAS Article PubMed Google Scholar
57. 57.
Dai ZM, Kang HF, Zhang WG, Li HB, Zhang SQ, Ma XB, Lin S, Wang M, Feng YJ, Liu K, et al. The Associations of Single Nucleotide Polymorphisms in miR196a2, miR-499, and miR-608 With Breast Cancer Susceptibility: A STROBE-Compliant Observational Study. Medicine. 2016;95:e2826. https://doi.org/10.1097/MD.0000000000002826.
CAS Article PubMed PubMed Central Google Scholar
58. 58.
Zhang N, Huo Q, Wang X, Chen X, Long L, Jiang L, Ma T, Yang Q. A genetic variant in pre-miR-27a is associated with a reduced breast cancer risk in younger Chinese population. Gene. 2013;529:125–30. https://doi.org/10.1016/j.gene.2013.07.041.
CAS Article PubMed Google Scholar
59. 59.
Hu Z, Liang J, Wang Z, Tian T, Zhou X, Chen J, Miao R, Wang Y, Wang X, Shen H. Common genetic variants in pre-microRNAs were associated with increased risk of breast cancer in Chinese women. Hum Mutat. 2009;30:79–84. https://doi.org/10.1002/humu.20837.
CAS Article PubMed Google Scholar
60. 60.
Zhang M, Jin M, Yu Y, Zhang S, Wu Y, Liu H, Liu H, Chen B, Li Q, Ma X, et al. Associations of miRNA polymorphisms and female physiological characteristics with breast cancer risk in Chinese population. Eur J Cancer Care. 2012;21:274–80. https://doi.org/10.1111/j.1365-2354.2011.01308.x.
CAS Article Google Scholar
61. 61.
Ma F, Zhang P, Lin D, Yu D, Yuan P, Wang J, Fan Y, Xu B. There is no association between microRNA gene polymorphisms and risk of triple negative breast cancer in a Chinese Han population. PloS One. 2013;8:e60195. https://doi.org/10.1371/journal.pone.0060195.
CAS Article PubMed PubMed Central Google Scholar
62. 62.
Zhao H, Gao A, Zhang Z, Tian R, Luo A, Li M, Zhao D, Fu L, Fu L, Dong JT, et al. Genetic analysis and preliminary function study of miR-423 in breast cancer. Tumour Biol. 2015;36:4763–71. https://doi.org/10.1007/s13277-015-3126-7.
CAS Article PubMed Google Scholar
63. 63.
Huang AJ, Yu KD, Li J, Fan L, Shao ZM. Polymorphism rs4919510:C > G in mature sequence of human microRNA-608 contributes to the risk of HER2-positive breast cancer but not other subtypes. PloS One. 2012;7:e35252. https://doi.org/10.1371/journal.pone.0035252.
CAS Article PubMed PubMed Central Google Scholar
64. 64.
Sun R, Gong J, Li J, Ruan Z, Yang X, Zheng Y, Qing L, He X, Jiang J, Peng Y, et al. A genetic variant rs13293512 in the promoter of let-7 is associated with an increased risk of breast cancer in Chinese women. Biosci Rep. 2019. https://doi.org/10.1042/BSR20182079.
Article PubMed PubMed Central Google Scholar
65. 65.
Chen J, Qin Z, Jiang Y, Wang Y, He Y, Dai J, Jin G, Ma H, Hu Z, Yin Y, et al. Genetic variations in the flanking regions of miR-101-2 are associated with increased risk of breast cancer. PloS One. 2014;9:e86319. https://doi.org/10.1371/journal.pone.0086319.
CAS Article PubMed PubMed Central Google Scholar
66. 66.
Zhou J, Wang L, Liu S, Zhou W, Jiang Y, Du J, Dai J, Jin G, Ma H, Hu Z, et al. Genetic variations in miR-30 family member regulatory regions are associated with breast cancer risk in a Chinese population. Biomed Res Int. 2020;2020:8781348. https://doi.org/10.1155/2020/8781348.
CAS Article PubMed PubMed Central Google Scholar
67. 67.
Bansal C, Sharma KL, Misra S, Srivastava AN, Mittal B, Singh US. Common genetic variants in pre-microRNAs and risk of breast cancer in the North Indian population. Ecancermedicalscience. 2014;8:473. https://doi.org/10.3332/ecancer.2014.473.
CAS Article PubMed PubMed Central Google Scholar
68. 68.
Bodal VK, Sangwan S, Bal MS, Kaur M, Sharma S, Kaur B. Association between Microrna 146a and Microrna 196a2 Genes Polymorphism and Breast Cancer Risk in North Indian Women. Asian Pac J Cancer Prev APJCP. 2017;18:2345–8. https://doi.org/10.22034/APJCP.2017.18.9.2345.
Article PubMed Google Scholar
69. 69.
Mashayekhi S, Saeidi Saedi H, Salehi Z, Soltanipour S, Mirzajani E. Effects of miR-27a, miR-196a2 and miR-146a polymorphisms on the risk of breast cancer. Br J Biomed Sci. 2018;75:76–81. https://doi.org/10.1080/09674845.2017.1399572.
CAS Article PubMed Google Scholar
70. 70.
Omrani M, Hashemi M, Eskandari-Nasab E, Hasani SS, Mashhadi MA, Arbabi F, Taheri M. hsa-mir-499 rs3746444 gene polymorphism is associated with susceptibility to breast cancer in an Iranian population. Biomark Med. 2014;8:259–67. https://doi.org/10.2217/bmm.13.118.
CAS Article PubMed Google Scholar
71. 71.
Doulah A, Salehzadeh A, Mojarrad M. Association of single nucleotide polymorphisms in miR-499 and miR-196a with susceptibility to breast cancer. Trop J Pharm Res. 2018;17:319–23. https://doi.org/10.4314/tjpr.v17i2.17.
CAS Article Google Scholar
72. 72.
Nejati-Azar A, Alivand MR. miRNA 196a2 (rs11614913) & 146a (rs2910164) polymorphisms & breast cancer risk for women in an Iranian population. Personal Med. 2018;14:279–89. https://doi.org/10.2217/pme-2017-0088.
CAS Article Google Scholar
73. 73.
Naderi N, Peymani M, Ghaedi K. The protective role of rs56103835 against breast cancer onset in the Iranian population. Mol Genet Genom Med. 2019;7:e540. https://doi.org/10.1002/mgg3.540.
CAS Article Google Scholar
74. 74.
Danesh H, Hashemi M, Bizhani F, Hashemi SM, Bahari G. Association study of miR-100, miR-124-1, miR-218-2, miR-301b, miR-605, and miR-4293 polymorphisms and the risk of breast cancer in a sample of Iranian population. Gene. 2018;647:73–8. https://doi.org/10.1016/j.gene.2018.01.025.
CAS Article PubMed Google Scholar
75. 75.
Kazemi A, Vallian S. Significant Association of miR-605 rs2043556 with Susceptibility to Breast Cancer. MicroRNA. 2020;9:133–41. https://doi.org/10.2174/2211536608666190926155149.
CAS Article PubMed Google Scholar
76. 76.
Parchami Barjui S, Reiisi S, Ebrahimi SO, Shekari B. Study of correlation between genetic variants in three microRNA genes (hsa-miR-146a, hsa-miR-502 binding site, hsa-miR-27a) and breast cancer risk. Curr Res Transl Med. 2017;65:141–7. https://doi.org/10.1016/j.retram.2017.10.001.
CAS Article PubMed Google Scholar
77. 77.
Afsharzadeh SM, Ardebili SMM, Seyedi SM, Fathi NK, Mojarrad M. Association between rs11614913, rs3746444, rs2910164 and occurrence of breast cancer in Iranian population. Meta Gene. 2017;11:20–5. https://doi.org/10.1016/j.mgene.2016.11.004.
Article Google Scholar
78. 78.
Eslami-S Z, Tahmaseb M, Ghaderi A. The investigation of miR-196a2 rs11614913 with breast cancer susceptibility in south of IRAN. Meta Gene. 2018;17:43–7. https://doi.org/10.1016/j.mgene.2018.04.007.
Article Google Scholar
79. 79.
Kabirizadeh S, Azadeh M, Mirhosseini M, Ghaedi K, Tanha HM. The SNP rs3746444 within mir-499a is associated with breast cancer risk in Iranian population. J Cell Immunotherapy. 2016;2:95–7. https://doi.org/10.1016/j.jocit.2016.08.003.
Article Google Scholar
80. 80.
Hashemi M, Sanaei S, Rezaei M, Bahari G, Hashemi SM, Mashhadi MA, Taheri M, Ghavami S. miR-608 rs4919510 C > G polymorphism decreased the risk of breast cancer in an Iranian subpopulation. Exp Oncol. 2016;38:57–9.
CAS Article Google Scholar
81. 81.
Bahreini F, Ramezani S, Shahangian SS, Salehi Z, Mashayekhi F. miR-559 polymorphism rs58450758 is linked to breast cancer. Br J Biomed Sci. 2020;77:29–34. https://doi.org/10.1080/09674845.2019.1683309.
CAS Article PubMed Google Scholar
82. 82.
Meshkat M, Mesrian Tanha H, Ghaedi K, Meshkat M. Association of a potential functional mir-520f rs75598818 G > A polymorphism with breast cancer. Journal of genetics. 2018;97:1307–13.
CAS Article Google Scholar
83. 83.
Meshkat M, Tanha HM, Naeini MM, Ghaedi K, Sanati MH, Meshkat M, Bagheri F. Functional SNP in stem of mir-146a affects Her2 status and breast cancer survival. Cancer Biomark A. 2016;17:213–22. https://doi.org/10.3233/CBM-160633.
CAS Article Google Scholar
84. 84.
Sanaei S, Hashemi M, Rezaei M, Hashemi SM, Bahari G, Ghavami S. Evaluation of the pri-miR-34b/c rs4938723 polymorphism and its association with breast cancer risk. Biomed Rep. 2016;5:125–9. https://doi.org/10.3892/br.2016.690.
CAS Article PubMed PubMed Central Google Scholar
85. 85.
Siasi E, Solimani M. Associations of single nucleotide polymorphism in miR-146a gene with susceptibility to breast cancer in the Iranian Female. Asian Pac J Cancer Prevent APJCP. 2020;21:1585–93. https://doi.org/10.31557/APJCP.2020.21.6.1585.
CAS Article Google Scholar
86. 86.
Kontorovich T, Levy A, Korostishevsky M, Nir U, Friedman E. Single nucleotide polymorphisms in miRNA binding sites and miRNA genes as breast/ovarian cancer risk modifiers in Jewish high-risk women. Int J Cancer. 2010;127:589–97. https://doi.org/10.1002/ijc.25065.
CAS Article PubMed Google Scholar
87. 87.
Alshatwi AA, Shafi G, Hasan TN, Syed NA, Al-Hazzani AA, Alsaif MA, Alsaif AA. Differential expression profile and genetic variants of microRNAs sequences in breast cancer patients. PloS One. 2012;7:e30049. https://doi.org/10.1371/journal.pone.0030049.
CAS Article PubMed PubMed Central Google Scholar
88. 88.
Mir R, Al Balawi IA, Abu-Duhier FM. Role of microRNA-423 gene variation in women at higher risk of breast cancer in Tabuk of Saudi Arabia. Indian J Public Health Res Dev. 2019. https://doi.org/10.37506/ijphrd.v10i2.7675.
89. 89.
Nguyen PBH, Tran MTH, Nguyen TTN, Nguyen HT. The relationship between SNP rs895819 (A > G) on miRNA-27a and the breast cancer in the Vietnamese population. Sci Technol Dev J. 2016;19:39–49. https://doi.org/10.32508/stdj.v19i4.637.
Article Google Scholar
90. 90.
Minh TTH, Thanh NTN, Van Thiep T, Hue NT. Association between single nucleotide polymorphism Rs11614913 (C > T) on Mir-196a2 and breast cancer in Vietnamese population. Int Conf Dev Biomed Eng Vietnam 2017;381–386. https://doi.org/10.1007/978-981-10-4361-1_64.
91. 91.
Ahmad M, Ahmad S, Rahman B, Haq TU, Jalil F, Shah AA. Association of MIR146A rs2910164 variation with a predisposition to sporadic breast cancer in a Pakistani cohort. Ann Hum Genet. 2019;83:325–30. https://doi.org/10.1111/ahg.12316.
CAS Article PubMed Google Scholar
92. 92.
Garcia AI, Cox DG, Barjhoux L, Verny-Pierre C, Barnes D, Gemo Study C, Antoniou AC, Stoppa-Lyonnet D, Sinilnikova OM, Mazoyer S. The rs2910164:G > C SNP in the MIR146A gene is not associated with breast cancer risk in BRCA1 and BRCA2 mutation carriers. Hum Mutat. 2011;32:1004–7. https://doi.org/10.1002/humu.21539.
CAS Article PubMed Google Scholar
93. 93.
Yang R, Schlehe B, Hemminki K, Sutter C, Bugert P, Wappenschmidt B, Volkmann J, Varon R, Weber BH, Niederacher D, et al. A genetic variant in the pre-miR-27a oncogene is associated with a reduced familial breast cancer risk. Breast Cancer Res Treat. 2010;121:693–702. https://doi.org/10.1007/s10549-009-0633-5.
Article PubMed Google Scholar
94. 94.
Catucci I, Yang R, Verderio P, Pizzamiglio S, Heesen L, Hemminki K, Sutter C, Wappenschmidt B, Dick M, Arnold N, et al. Evaluation of SNPs in miR-146a, miR196a2 and miR-499 as low-penetrance alleles in German and Italian familial breast cancer cases. Hum Mutat. 2010;31:E1052-7. https://doi.org/10.1002/humu.21141.
Article PubMed Google Scholar
95. 95.
Yang R, Dick M, Marme F, Schneeweiss A, Langheinz A, Hemminki K, Sutter C, Bugert P, Wappenschmidt B, Varon R, et al. Genetic variants within miR-126 and miR-335 are not associated with breast cancer risk. Breast Cancer Res Treat. 2011;127:549–54. https://doi.org/10.1007/s10549-010-1244-x.
CAS Article PubMed Google Scholar
96. 96.
McVeigh TP, Mulligan RJ, McVeigh UM, Owens PW, Miller N, Bell M, Sebag F, Guerin C, Quill DS, Weidhaas JB, et al. Investigating the association of rs2910164 with cancer predisposition in an Irish cohort. Endocr Connect. 2017;6:614–24. https://doi.org/10.1530/EC-17-0196.
CAS Article PubMed PubMed Central Google Scholar
97. 97.
Catucci I, Verderio P, Pizzamiglio S, Bernard L, Dall’olio V, Sardella D, Ravagnani F, Galastri L, Barile M, Peissel B, et al. The SNP rs895819 in miR-27a is not associated with familial breast cancer risk in Italians. Breast Cancer Res Treat. 2012;133:805–7. https://doi.org/10.1007/s10549-012-2011-y.
Article PubMed Google Scholar
98. 98.
Pastrello C, Polesel J, Della Puppa L, Viel A, Maestro R. Association between hsa-mir-146a genotype and tumor age-of-onset in BRCA1/BRCA2-negative familial breast and ovarian cancer patients. Carcinogenesis. 2010;31:2124–6. https://doi.org/10.1093/carcin/bgq184.
CAS Article PubMed Google Scholar
99. 99.
Esteban Cardenosa E, de Juan Jimenez I, Palanca Suela S, Chirivella Gonzalez I, Segura Huerta A, Santaballa Beltran A, El CasalsBusto M, Barragan Gonzalez E, Fuster Lluch O, Bermudez Edo J, et al. Low penetrance alleles as risk modifiers in familial and sporadic breast cancer. Fam Cancer. 2012;11:629–36. https://doi.org/10.1007/s10689-012-9563-1.
CAS Article PubMed Google Scholar
100. 100.
Hoffman AE, Zheng T, Yi C, Leaderer D, Weidhaas J, Slack F, Zhang Y, Paranjape T, Zhu Y. microRNA miR-196a-2 and breast cancer: a genetic and epigenetic association study and functional analysis. Cancer Res. 2009;69:5970–7. https://doi.org/10.1158/0008-5472.CAN-09-0236.
CAS Article PubMed PubMed Central Google Scholar
101. 101.
Yao S, Graham K, Shen J, Campbell LE, Singh P, Zirpoli G, Roberts M, Ciupak G, Davis W, Hwang H, et al. Genetic variants in microRNAs and breast cancer risk in African American and European American women. Breast Cancer Res Treat. 2013;141:447–59. https://doi.org/10.1007/s10549-013-2698-4.
CAS Article PubMed PubMed Central Google Scholar
102. 102.
Bensen JT, Tse CK, Nyante SJ, Barnholtz-Sloan JS, Cole SR, Millikan RC. Association of germline microRNA SNPs in pre-miRNA flanking region and breast cancer risk and survival: the Carolina Breast Cancer Study. Cancer Causes Control: CCC. 2013;24:1099–109. https://doi.org/10.1007/s10552-013-0187-z.
Article PubMed Google Scholar
103. 103.
Chacon-Cortes D, Smith RA, Haupt LM, Lea RA, Youl PH, Griffiths LR. Genetic association analysis of miRNA SNPs implicates MIR145 in breast cancer susceptibility. BMC Med Genet. 2015;16:107. https://doi.org/10.1186/s12881-015-0248-0.
CAS Article PubMed PubMed Central Google Scholar
104. 104.
Smith RA, Jedlinski DJ, Gabrovska PN, Weinstein SR, Haupt L, Griffiths. L.R. A genetic variant located in miR-423 is associated with reduced breast cancer risk. Cancer Genomics Proteom. 2012;9:115–8.
CAS Google Scholar
105. 105.
Jedlinski DJ, Gabrovska PN, Weinstein SR, Smith RA, Griffiths LR. Single nucleotide polymorphism in hsa-mir-196a-2 and breast cancer risk: a case control study. Twin Res Hum Genet. 2011;14:417–21. https://doi.org/10.1375/twin.14.5.417.
Article PubMed Google Scholar
106. 106.
Morales S, Gulppi F, Gonzalez-Hormazabal P, Fernandez-Ramires R, Bravo T, Reyes JM, Gomez F, Waugh E, Jara L. Association of single nucleotide polymorphisms in pre-miR-27a, pre-miR-196a2, pre-miR-423, miR-608 and pre-miR-618 with breast cancer susceptibility in a South American population. BMC Genet. 2016;17:109. https://doi.org/10.1186/s12863-016-0415-0.
107. 107.
Morales S, De Mayo T, Gulppi FA, Gonzalez-Hormazabal P, Carrasco V, Reyes JM, Gomez F, Waugh E, Jara L. Genetic variants in pre-miR-146a, pre-miR-499, pre-miR-125a, pre-miR-605, and pri-miR-182 are associated with breast cancer susceptibility in a South American population. Genes. 2018. https://doi.org/10.3390/genes9090427.
108. 108.
Linhares JJ, Azevedo M Jr, Siufi AA, de Carvalho CV, Wolgien Mdel C, Noronha EC, Bonetti TC, da Silva. I.D. Evaluation of single nucleotide polymorphisms in microRNAs (hsa-miR-196a2 rs11614913 C/T) from Brazilian women with breast cancer. BMC Med Genet. 2012;13:119. https://doi.org/10.1186/1471-2350-13-119.
109. 109.
Brincas HM, Augusto DG, Mathias C, Cavalli IJ, Lima RS, Kuroda F, Urban CA, Gradia DF, de Oliveira J, de Almeida RC, et al. A genetic variant in microRNA-146a is associated with sporadic breast cancer in a Southern Brazilian population. Genet Mol Biol. 2020;42:e20190278. https://doi.org/10.1590/1678-4685-GMB-2019-0278.
Article PubMed PubMed Central Google Scholar
110. 110.
Fejerman L, Hu D, Huntsman S, John EM, Stern MC, Haiman CA, Perez-Stable EJ, Ziv E. Genetic ancestry and risk of mortality among U.S. Latinas with breast cancer. Cancer Res. 2013;73:7243–53. https://doi.org/10.1158/0008-5472.CAN-13-2014.
CAS Article PubMed PubMed Central Google Scholar
111. 111.
University NT. Asia-wide genome mapping project reveals insights into Asian ancestry and genetic diversity. https://www.sciencedaily.com/releases/2019/12/191204145813.htm. Accessed 28 Aug.
112. 112.
GenomeAsia KC. The GenomeAsia 100K project enables genetic discoveries across Asia. Nature. 2019;576:106–11. https://doi.org/10.1038/s41586-019-1793-z.
CAS Article Google Scholar
113. 113.
Organization WH. Breast cancer. https://www.who.int/cancer/prevention/diagnosis-screening/breast-cancer/en/. Accessed 28 Aug.
114. 114.
Bertoli G, Cava C, Castiglioni I, MicroRNAs. New biomarkers for diagnosis, prognosis, therapy prediction and therapeutic tools for breast cancer. Theranostics. 2015;5:1122–43. https://doi.org/10.7150/thno.11543.
CAS Article PubMed PubMed Central Google Scholar
115. 115.
Srinivasan S, Clements JA, Batra J. Single nucleotide polymorphisms in clinics: fantasy or reality for cancer? Crit Rev Clin Lab Sci. 2016;53:29–39. https://doi.org/10.3109/10408363.2015.1075469.
CAS Article PubMed Google Scholar
Download references
Funding
This research was funded by Fondo Nacional de Desarrollo Científico y Tecnológico (FONDECYT), Grant Number 1200049.
Author information
Affiliations
Authors
Contributions
Conceptualization, SM-P and LJ; Funding acquisition, LJ; Investigation, SM-P and TA; Methodology, SM-P and EM; Project administration, SM-P and LJ; Resources, LJ; Visualization, SM-P and TA; Writing—original draft, TA; Writing—review and editing, SM-P, TA, EM and LJ. All authors read and approved the final manuscript.
Corresponding author
Correspondence to Lilian Jara.
Ethics declarations
Ethics approval and informed consent
Not applicable.
Consent for publication
Not applicable.
Competing interests
The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analysis, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.
Reprints and Permissions
About this article
Verify currency and authenticity via CrossMark
Cite this article
Arancibia, T., Morales-Pison, S., Maldonado, E. et al. Association between single-nucleotide polymorphisms in miRNA and breast cancer risk: an updated review. Biol Res 54, 26 (2021). https://doi.org/10.1186/s40659-021-00349-z
Download citation
• Received:
• Accepted:
• Published:
• DOI: https://doi.org/10.1186/s40659-021-00349-z
Keywords
• Polymorphisms
• miRNAs
• Breast cancer risk
• Association studies |
Difference Between URL and IP Address (With Table)
The internet has connected even rural areas. From the globalisation of the world to the Linking of every person with others throughout the world, we have engulfed a long way indeed. Well, the address must connect the websites and IP address with the machines. However, they are different from each other.
URL vs IP Address
The difference between uniform resource locator and internet protocol address is that URL is an address that represents a website or a webserver while the internet protocol address is the numerical combination that’s unique and represent a specific network to access the computer or other connected device.
A URL or uniform resources locator simply Is a combination of letters or numbers that represents the existence of a website or the webserver on the world wide web. It’s like an address of a place where you want to commute. It’s created by four elements: location, protocol, hostname, and path.
An IP address or internet protocol address is a set of numbers that represents an address of a machine. Well, it’s widely used to connect with other devices with encryption and transfer data pieces through that particular IP you have. Every system has a unique IP address like your house number, which is unique and special.
Comparison Table Between URL and IP Address
Parameters of ComparisonURLIP Address
DefinitionA URL is a uniform resource locator that represents a web server or a website.An IP address is representative of a unique system.
FunctionalityWith the help of a URL, you can easily have a walk through the website and can see its front end.With the IP, you can make a connection with other devices to transmit data.
CombinationA URL can consist of alphabets, numbers, or a combination of both.Well, an IP is made of numbers with dots after some particular number set.
Breaking down addressA URL has a locator, a path, a protocol, and a hostnameSince it doesn’t any interface thing because it connects two or more system and with that, it looks AAA.BBB.CCC.DDD where sequence lies between 001 to 255.
ExamplesSome URL examples are https:// www.google.com, https://www.abcded.com.Some examples of IP address are 192.168.0.1, 192.168.0.2.
What is URL?
Suppose you want to go to a particular place. Well, it’s only possible if you know the address. If it exists, you can surely commute to that place. Else if it doesn’t exist, you cannot. Similarly, the concept of a uniform resource locator comes when you need to access some content or a website or even a webserver.
It’s a combination of 4 major elements. The first one is the location. The location is an identifier from the server side that hosts the website. Then you have Protocol- the way of transportation of a specific website. Mostly it’s HTTP, HTTPS, but it doesn’t mean other protocols doesn’t exist. Many other protocols could be followed according to the need.
Then you have the hostname. This is a domain name that is a must thing to be remembered. Because it’s more like an address through which you can access the website available on the internet. It’s responsible for credibility and accountability. Indeed a hostname can be a combination of alphabets and numbers too. A hostname can be a customised thing. You can choose or have your hostname, and it’s important to know if that particular hostname is available or not.
Then comes the path. It tells which page to load onto the server. Well, a website can have many pages. So if you want to explore specific pages, it’s important to mention the part after the hostname with a forward slash.
What is IP Address?
You’re somewhere remote from a location. And you want to transfer important files and documents to that system that’s accessed by that person sitting in front of the screen. It’s possible if you have their IP address. IP or internet protocol address is that set of numbers that makes the devices different from each other.
It’s a combination of numbers with dots after a number set. This IP is widely used to transfer the data. Like you have a phone number you want to make a call. You can easily dial and communicate. But if you don’t have their number, how would you make a call? Well, IP simplifies this thing and also allows distant users to connect and transmit pieces of information through the virtual wire.
Each device can be uniquely identified by an IP address. It can be fixed or changed on a regular basis. Just like you are capable of changing phone numbers. An IP looks like AAA.BBB.CC.DDD. That’s a sequential number whose order is random but lies between 001 to 255.
In general cases, most of the small network formats are 192.168.1.DDD and 192.168.0.DDD. In the case of big companies, networks are always wide and bigger, so by merging these several sub-networks of 254 IPs.
Main Differences Between URL and IP Address
1. A URL is a uniform resource locator, while an IP address is an internet protocol address.
2. A URL is a combination of hostname, path, location, and the protocol following, whereas an IP address is a combination of digits that lie between 0 to 255.
3. A URL connects users with the websites that exist on the world wide web, while an IP address connects two or more systems simultaneously.
4. A URL specifies a particular website, while an IP represents a particular system like a mobile number.
5. Some examples are http://www.abcd.com or httss://www.wxyz.com, while some examples of IP are 192.168.0.1 or 192.168.1.1.
Conclusion
It’s important to realise the differences between several major components. Keeping things in mind can resolve many issues in no time. An IP represents a system just like a mobile number. Indeed it could be changed while a URL is like a website representative that exists on the internet.
Even a small confusion can create many challenges to commute or communicate. So IP and URL are something very important but knowing the difference will not only save your time but also makes you aware of the variations and the basic difference.
References
1. http://www.hjp.at/doc/rfc/rfc1738.html
2. http://www.hjp.at/doc/rfc/rfc3022.html
2D vs 3D x
2D vs 3D |
Treating Heart Disease
0
46
New Medication: fish in a pill
Eat fish for a healthy heart, experts have long urged. But along with that advice has come concern about mercury and other contaminants in tuna, mackerel, and other oily fish. This year brought a welcome alternative: a medication called Omacor, made of highly purified omega-3s, a beneficial fatty acid. The drug is prescribed to deliver just the right dose to high-risk people with high triglycerides who cant or dont want to eat the real thing. In a 3½-year study involving 11,323 patients whod already experienced a heart attack, Omacor reduced the risk of a second attack or stroke by 16 percent, and the risk of dying from cardiovascular disease by 21 percent. Other findings have shown that high doses of Omacor can lower triglycerides by an average of 45 percent, and may also increase levels of good cholesterol.
Cardiac arrest: the defibrillator success story
Remember all the buzz about putting defibrillators (portable devices that restore abnormal heart rhythm) in public places? Well, the effort paid off. Studies show that their use can double the survival rate of heart-attack victims, says American Council on Exercise Chief Physiologist Cedric Bryant. In fact, using a defibrillator is so effective that some states like New York require them in public places such as sports arenas, schools, malls, and fitness facilities.
Exercise: fitness beats angioplasty
Doctors have long known that physical activity is good for your heart. But just how good surfaced in a study of people suffering from coronary artery disease. Researchers at Germanys University of Leipzig Heart Center recruited 101 heart patients whose arteries showed significant narrowing from deposits of cholesterol-laden plaques. Half were given angioplasty, a widely used technique in which cardiologists insert narrow tubes to clear blockages and widen constricted vessels. The rest started an exercise regimen at the hospital and continued at home with 20 minutes of stationary bicycling every day and an hour of directed aerobics each week. A year later, the exercisers were more likely to be alive and free of complications from heart disease than the other group. Not surprisingly, they were also fitter, with better exercise capacity.
Thats good news in itself, naturally. And so is the fact that exercise is far less expensive than angioplasty. Whether doctors counsel patients to undergo angioplasty or start to exercise will continue to depend on many factors. But the study offers convincing evidence that a simple get-fit program is powerful medicine. |
Houdini 12 Particles
Various particle operators can create “events” when something happens, such as a collision, or a value passing some threshold. An event can trigger the activation of other particle operators, allowing for complex and interesting behaviors.
Downstream you can use the popevent function to detect a named event. This is very useful in the Activation parameter of a POP node, where you can trigger the node only if the event has fired.
Events are identified by a name string.
Tip
The info button on the POP node’s tile gives information on which events are currently occurring.
Operators that generate events
Collision POP
When particles collide with geometry.
Limit POP
When particles go outside a boundary.
Event POP
Defines expressions that generate events when they evaluate to non-zero for an input particle. |
2014 Aurecon recruitment banner
Thinking
Tunnelling - delivering modern solutions with proven approaches
Tunnel excavation by roadheader on the Eastlink Project
Aurecon's Expertise leader for Tunnelling, Dr Harry Asche talks about delivering modern solutions with proven approaches.
Tunnels in urban areas
Tunnels play a critical role in the ongoing delivery and maintenance of the infrastructure required to support our modern world. We have been constructing tunnels in our cities since the nineteenth century. Today, tunnels are an increasingly necessary part of our road and rail networks and continue to be employed to support our water, sewer and utilities systems.
During the time we have been constructing modern tunnels, we have seen some revolutionary developments, yet some aspects of tunnelling are the same as they were when the first tunnels were building built by pioneering engineers.
What can we expect in the years to come?
The original tunnels were excavated by drill and blast or hand mining methods and although the equipment may have changed with the inclusion of mechanised drilling and ground excavation machinery, we still build tunnels with similar methods today. However, the single most dramatic change has been the introduction of the Tunnel Boring Machine, known in the engineering profession as TBMs. In this method, the entire face is cut with a circular head engaging all of the face as it turns.
In 1959, the Hydro-Electric Commission of Tasmania purchased the first Australian hard rock TBM for ,000. The project was a water tunnel and the best week’s tunnelling excavation advance was 229m, claimed to be a world record for any tunnel at that time. This great improvement in the excavation rate was offset by weeks of poor performance due to machine maintenance and repairs or due to difficulty supporting poor ground conditions.
By 1970, several hard rock TBMs were being used in Australian cities for water and transportation projects. By the mid-1990s, the bentonite shield method of TBM excavation was introduced to Australia, which allowed the use of TBMs in not only rock but in poor and mixed face ground conditions.
Some researchers in the 1970s considered that new excavation techniques would arrive in the future such as rock melting, jetting or chemical breakage. Others predicted that rates of excavation would increase.
Reliability lifts productivity
The reality for the tunnelling industry is that TBM best week advance rates have not greatly improved over the years. However, what has happened is that the number or incidence of poor weeks has improved, so the gap between best and worst has reduced. Overall, this has resulted in projects as a whole being excavated faster and cheaper.
The TBM machines we employ are much more reliable and average advance rates of 100m per week are now routine. Closed face machines are now common and mixed face conditions can be handled, while rates of up to 400m have been achieved. Some of the anticipated technological advances for tunnel construction have not eventuated. The mechanisms used in the 1960s are still the same as now, except that today’s machines are bigger and stronger due to advances in metallurgy and manufacturing (see Figure 1).
In terms of the tunnel ground support, the introduction of TBMs has facilitated a move towards one-pass precast concrete linings and away from temporary support installed as directed by a geologist/tunnel engineer bespoke to the ground conditions. The former is suited to a factory style of installation, in that it is cyclical and programmable. The latter may be more cost efficient on a metre by metre basis but the cost and management of the surveillance operation is becoming less attractive.
Another advantage of the precast lining system is that it can be made watertight on installation, which avoids the hydrogeological issues which are becoming critical in many cities.
Fig 1a. The Poatina machine 1961Fig1b. The Clem7 machine 2008. Both use disc cutters
Tunnelling and transport planning
In the late 1960s, public outcry over “the Motorway Plan” in London prevented a network of surface freeways from being built. Similar public sentiment progressively prevented the completion of freeway networks in Australian cities.
Fig 2. Photo-montage of the originally proposed Eastern Distributor, Sydney, AustraliaFigure 2 shows the planned Eastern Distributor in Woolloomooloo, Sydney which would have involved the removal of all houses within the proposed route. The initial scheme design was scrapped and in the late 1990’s, the Sydney’s Eastern Distributor was constructed using tunnels rather than an above ground road system. The result was that the majority of houses and buildings along the projects corridor remain intact today.
The Eastern Distributor in Sydney is just one example of how both roadways and rail lines have been constructed by tunnel rather than what would have traditionally been built at or above ground level. Over the past 20 years tunnelling projects have allowed cities in Australia (and around the world) to avoid the surface or to avoid the construction of obtrusive structures. Tables 1 and 2 lists some of the major Australian tunnel projects of the past 20 years.
Many of the road tunnels listed above represent the “missing link” in a freeway plan which was drafted in the 1960s and which have had to wait until the tunnel solution can be found.
The trend which is evident from these lists is towards longer road tunnels. The Airport Link project at 7km is now the longest road tunnel in Australia and one of the longest urban road tunnels in the world. (The longest road tunnel in the world is the Laerdal Tunnel in Norway at 24.5km).
Not only are we seeing these changes in Australia but New Zealand is also planning to deliver major transportation projects using tunnel solutions.
Restrictions on tunnel construction
While tunnel equipment and technology has improved, the public has become less tolerant of the environmental effects of tunnelling. Often tunnelling is a 24 hour activity and noise at the worksite can be a critical issue. In 1972, the contractor on the Eastern Suburbs Railway was served with an injunction preventing 24 hour operation. Since that time, many city worksites have incorporated acoustic noise sheds which also have served to control dust. In addition to this control, spoil can be stored during night operations to then be trucked offsite during the day (Figure 3).
A particular issue in modern tunnelling has been the focus on hydrogeology. The tunnel’s effect on the groundwater has driven design solutions in Melbourne and Brisbane recently. At the EastLink tunnel in Melbourne, the need to prevent drawdown of the watertable and maintain environmental flows to Mullum Mullum Creek was critical. The topography meant that the creek ran above the tunnel itself which led to the tunnel being designed and constructed as a completely watertight structure. Design specifications required very tight allowable leakage into the tunnel once was completed. The solution was a hybrid precast/cast-insitu lining solution (Figure 4). However, other tunnels such as Clem7 (Brisbane) and Airport Link (Brisbane) have adopted the full segmentally lined solution installed behind a TBM.
Other environmental issues which are impacting on tunnel construction include the vibration caused by both mechanical and TBM tunnelling, known as regenerative noise. This was carefully monitored at the Clem7 site and will be monitored at the Northern Link project. The vibration is temporary, with limited intensity and short term as the tunnels move quickly past each residence. Because the vibrations may induce sleep disturbance, the issue is often handled by direct consultation with the affected residents.
Finally, the issue of ventilation outlets can be a matter for public concern, as was the case at Sydney’s M5 East tunnel. The purpose of the ventilation outlets is to elevate the outflow of spent air from the tunnel’s ventilation system so that this air can be mixed with fresh air in a controlled manner. This issue is reducing with every year, as the vehicle fleet improves. With the increasing use of electric and hybrid vehicles it can be anticipated that this issue might disappear in time.
Fig 3. Acoustic and dust shed at Cross City Tunnel, Sydney, AustraliaFig 4. EastLink Tollway construction Victoria, Australia - precast invert segment
User characteristics
Revolutionary changes in urban transportation tunnels are coming from the vehicles using the tunnels and the systems which can control them. Road and rail vehicles are changing rapidly with a potential knock-on effect in terms of the safety and ventilation systems required to be fitted to the tunnels (Table 3). Within 20 years, it is likely that a substantial reduction in the capital cost of constructing a tunnel will be made due to a reduced need to provide ventilation equipment and ducts, and due to a reduced need to provide for cross passages and emergency walkways. Further in the future it is possible that lane width could be substantially reduced and that more lanes could be retrofitted to existing tunnels.
Table 3. Changes in vehicles and systems
Tunnelling analysis and design
Similar to the situation in tunnelling construction, no major breakthroughs have occurred in tunnelling design since the 1970s. That said, incremental advances have taken place in the tools and methods, mostly on the back of the enormous advances in computers.
In 1970, the finite element analysis method had begun to be applied to tunnelling design, although each problem took weeks to set up and run. Using finite element models is now routine and powerful packages allow the tunnel engineers to solve problems in minutes (not weeks). The models available to the designer can now incorporate all properties of materials and ground, 3D features and water flow. (See Figure 5 for some examples of models).
However, what has not changed is that the characterisation of the ground remains dependent on an expensive and time-consuming ground investigation, and that the development of relevant and useful design models relies on experience and on well judged model inputs.
One advantage now is that each of the cities in Australia has a database of previous experience in tunnelling which allows modellers to compare their outputs with actual sites.
Fig 5a. Canopy tube model (CCT)Fig 5b. Stress due to passing beneath Town Hall Station (CCT)Fig 5c. Rock block model (EastLink)Fig 5d. Cross passage lining model (EastLink)
Tunnelling in the future
So what does the future hold for tunnels? The summary below lists a number of possible future trends, including some speculative suggestions:
• The use of TBMs and precast concrete tunnel lining support will increase; conventional tunnelling methods will reduce. Ultimately, the cost per metre will gradually reduce with time, in terms of today’s dollars. The use of robotic systems in the construction of tunnels will become routine, with less labour seen in the underground part of construction.
• Tunnel analysis will improve, particularly using the ability to reference the database of previous projects.
• New metro systems will be built in Australia with bespoke, low fire load rolling stock, automatic train control and platform screen doors.
• Rock melting, jetting or chemical breakage will not be discovered as a revolutionary new method for cutting rock.
• Environmental restrictions on tunnelling operations will continue to get tighter. Hydrogeological issues will drive more tunnels to be watertight.
• Longer road tunnels will be planned and will be built.
• Improved vehicle characteristics will allow tunnel cross sections to be reduced.
• If the vehicle fleet changes to predominately electric or hydrogen vehicles, with zero emissions, tunnels may be built with no emission ventilation system and with petrol engine vehicle banned from entering.
• If hands free driver systems become common, lane widths may be reduced in tunnels and some older tunnels may be refurbished with additional lanes.
To top |
Commits
dmarsh committed ab858cf
Added html file to represent Finding Your Path.
• Participants
• Parent commits 5ea472e
Comments (0)
Files changed (1)
+<table border="1" cellspacing="0" cellpadding="10">
+<tbody>
+<tr>
+<td><strong>USE</strong></td>
+<td><strong>TO MEDITATE ON ...</strong></td>
+</tr>
+<tr>
+ <td>AboutAsserts</td>
+ <td>How Scala koans work</td>
+</tr>
+<tr>
+ <td>AboutValAndVar</td>
+ <td>How val and var declarations differ</td>
+</tr>
+<tr>
+ <td>AboutClasses</td>
+ <td>How to specify class arguments and fields</td>
+</tr>
+<tr>
+ <td>AboutRange</td>
+ <td>How to use a convenient class for generating sequences</td>
+</tr>
+<tr>
+ <td>AboutLiteralBooleans</td>
+ <td>How to specify boolean values</td>
+</tr>
+<tr>
+ <td>AboutLiteralNumbers</td>
+ <td>How to specify values for the common numeric data types</td>
+</tr>
+<tr>
+ <td>AboutLiteralStrings</td>
+ <td>How to write literal values for character and string data</td>
+</tr>
+<tr>
+ <td>About Tuples</td>
+ <td>How to use a convenient class for unnamed structures</td>
+</tr>
+<tr>
+ <td>AboutTuples</td>
+ <td>How to write a literal tuple value</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to access the values in a tuple</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Whether all values in a tuple must have the same type</td>
+</tr>
+<tr>
+ <td>AboutLists</td>
+ <td>How Nil lists compare</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to write a literal list</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to access the values in a list</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to alter the contents of a list</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Discovering some common List methods</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Transforming, filtering, and summarizing lists</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Quickly creating a list of consecutive integers</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Sharing content between lists</td>
+</tr>
+<tr>
+ <td>AboutMaps</td>
+ <td>How to write a literal map</td>
+</tr>
+<tr>
+ <td></td>
+ <td>What happens if a key appears more than once</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Iterating through the contents of a map</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Whether all keys or values in a map must have the same type</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to access the values in a map</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to remove entries from a map</td>
+</tr>
+<tr>
+ <td>AboutSets</td>
+ <td>How to write a literal set value</td>
+</tr>
+<tr>
+ <td></td>
+ <td>What happens if a value appears more than once</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Whether all values in a set must have the same type</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to test for the presence of a value in a set</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to alter the content of a set</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to iterate through the values in a set</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to perform familiar operations on a set</td>
+</tr>
+<tr>
+ <td>AboutMutableMaps</td>
+ <td>How to create maps whose contents can be altered</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to add and remove map content</td>
+</tr>
+
+<tr>
+ <td>AboutMutableSets</td>
+ <td>How to create sets whose contents can be altered</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to add and remove set content</td>
+</tr>
+<tr>
+ <td>AboutFormatting</td>
+ <td>How to use character literals and escaped sequences</td>
+</tr>
+<tr>
+ <td>AboutPatternMatching</td>
+ <td>How to use pattern matching to replace complex conditional logic</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to ignore part of the data being pattern matched</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to "capture" matched data for later use</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to use pattern matching to simplify working with regular expressions</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to refer to the contents of existing variables when pattern matching</td>
+</tr>
+<tr>
+ <td>AboutCaseClasses</td>
+ <td>How to use case classes to write less boilerplate</td>
+</tr>
+<tr>
+ <td></td>
+ <td>Discovering which methods are automatically provided with case classes</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to create a mutable case class</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to avoid using a mutable case class</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to use named parameters to simplify working with case classes even further</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to "deconstruct"" an instance of a case class</td>
+</tr>
+<tr>
+ <td>AboutOptions</td>
+ <td>How to avoid using raw nulls</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to safely deal with "missing" or optional data</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to operate on an optional value</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to work with a list of optional values</td>
+</tr>
+<tr>
+ <td>AboutSequencesAndArrays</td>
+ <td>How to write a literal array value</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to convert between various kinds of sequences</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to transform and filter lists</td>
+</tr>
+<tr>
+ <td>AboutNamedAndDefaultArguments</td>
+ <td>How to specify defaults for parameters and how to specify arguments in any order by using names</td>
+</tr>
+<tr>
+ <td>AboutForExpressions</td>
+ <td>How to iterate sequences, create Ranges, use guards, and nest</td>
+</tr>
+
+<tr>
+ <td>AboutEmptyValues</td>
+ <td>How to use None, Some, and Option</td>
+</tr>
+<tr>
+ <td>AboutParentClasses</td>
+ <td>How to use classes for inheritances and how to use abstract classes</td>
+</tr>
+
+<tr>
+ <td>AboutTypeSignatures</td>
+ <td>How to specify generics</td>
+</tr>
+<tr>
+ <td>AboutTraits</td>
+ <td>How to create self-contained definitions that can be combined with inheritance</td>
+</tr>
+
+<tr>
+ <td>AboutPreconditions</td>
+ <td>How to ensure that conditions are met</td>
+</tr>
+<tr>
+ <td>AboutUniformAccessPrinciple</td>
+ <td>How to interchangeably use fields and methods to hide implementation details</td>
+</tr>
+<tr>
+ <td>AboutHigherOrderFunctions</td>
+ <td>How to write and use anonymous functions</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How a closure differs from a "pure" function</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to return a function as a result</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to compose new functions from existing ones</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to use currying to "specialize" functions</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to create a function from a class method</td>
+</tr>
+<tr>
+ <td>AboutPartialFunctions</td>
+ <td>How to safely create functions that are only defined for subsets of their arguments</td>
+</tr>
+<tr>
+ <td></td>
+ <td>How to easily combine these partial functions to create new functions</td>
+</tr>
+<tr>
+ <td>AboutPartiallyAppliedFunctions</td>
+ <td>How to create a function by specifying only some of the arguments to another function</td>
+</tr>
+<tr>
+ <td>About Iterables</td>
+ <td>How to do fun stuff with basic Scala collections while affecting state</td>
+</tr>
+<tr>
+ <td>About Traversables</td>
+ <td>How to do fun stuff with basic Scala collections without affecting state</td>
+</tr>
+
+
+<tr>
+ <td>AboutInfixPrefixAndPostfixOperators</td>
+ <td>How to know what the compiler is doing with your expressions</td>
+</tr>
+<tr>
+ <td>AboutInfixTypes</td>
+ <td>How to make expressions read nicely</td>
+</tr>
+<tr>
+ <td>AboutImplicits</td>
+ <td>How to add to the language to improve readability</td>
+</tr>
+<tr>
+ <td>AboutInteroperability</td>
+ <td>How to work with Java classes</td>
+</tr>
+<tr>
+ <td>AboutManifests</td>
+ <td>How to provide meta information about classes</td>
+</tr>
+<tr>
+ <td>AboutEnumerations</td>
+ <td>How to create and generated values, access index and name, and how to create your own</td>
+</tr>
+<tr>
+ <td>AboutConstructors</td>
+ <td>How to create auxiliary constructors</td>
+</tr>
+<tr>
+ <td>AboutImportsAndPackages</td>
+ <td>How to declare packages of your own and how to import other packages</td>
+</tr>
+
+</tbody>
+</table> |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
I would like to to do the following, any ideas
I have a Products model with two fields, both strings.
Name Position
I would like on the index pages for the products to display the Name in Red if the Positions field is blank in the database.
Thanks in advance
share|improve this question
it is better style to post what you got and ask about specific problems you run into. Now your question reads like a feature in a spec, try to be specific about what part of the implementation you are unsure of. – Viktor Trón May 30 '12 at 10:35
add comment
2 Answers
Create helper method to check if object is blank?
def set_css_class(object, css_class)
" #{css_class}" if object.blank?
end
Call it in your View:
<div class="name <%= set_css_class(@poroduct.position, 'red') %>">
<%= @product.name %>
</div>
share|improve this answer
Not working on my side – Clay May 30 '12 at 11:02
Use CSS to modify your views and highlighted errors. – thesis May 30 '12 at 11:11
add comment
<span class="<%= product.position.nil? ? "red" : "blue" %>">
<%= product.name %>
</span>
Update:
Let's say you have code like you provided in comment, modify it to:
<td>
<%= link_to admin_printer_path(printer), :class => 'ico' do %>
<b<%= ' class="error"' unless printer.position? %>><%= printer.name %></b>
<% end %>
</td>
and in css file/section in header add (or modify according to your structure):
.error { color: red; }
share|improve this answer
Seems to like not getting any errors if i add this in but not changing the text – Clay May 30 '12 at 11:02
Text color is not changing to Red – Clay May 30 '12 at 11:03
@user1267003 Do you have any code in index file? Care to provide part you have problem with? Do you know how to apply styles/change appearance of elements in html? I provided example how to test for nil value (you can use blank? instead of nil? if you want to test for empty string too) and then output something in view (add class to element). – MBO May 30 '12 at 11:09
<td> <%=link_to admin_printer_path(printer), :class => 'ico' do%> <b><%= printer.name%></b> <% end %></td> – Clay May 30 '12 at 11:47
The other field i have in the database is image_file_name (String) – Clay May 30 '12 at 11:48
show 2 more comments
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question. |
Server Fault is a question and answer site for system and network administrators. Join them; it only takes a minute:
Sign up
Here's how it works:
1. Anybody can ask a question
2. Anybody can answer
3. The best answers are voted up and rise to the top
We recently setup one of our users with a brand new Windows 7 computer, however she is unable to delete certain files. With some testing, I found I cannot move, rename, or view properties of these files either.
When trying to delete the file, it just sits at the "Preparing to recycle" popup, however the "from" section says "Discovering items..."
Preparing to recycle from discovering items
Clicking "More Details" on the popup shows me that it can't find the file name or where it's recycling from:
Preparing to recycle - more details
Other notes...
• All the affected files are .pdf files that get created via a scanner. Other pdf files are fine.
• Opening the files works fine. I can open the file, Save As a new file, and delete the new one just fine
• Trying to delete the file via command prompt just sits there
• Rebooting the computer will let me manipulate the files like normal, however this user is responsible for scanning hundreds of documents a day and I'd rather not have to tell her to reboot her computer to delete files.
• The user is part of the administrator group on the computer
• The Owner of the affected files is the user
• attrib of files is just A
share|improve this question
1
Have you tried disabling the virus scanner? – Dan May 16 '12 at 14:59
@Dan There currently is no anti-virus software installed (that's on my TODO list later today). Why do you think the scanner could be causing the problem? – Rachel May 16 '12 at 15:02
1
Because virus scanners can (sometimes mistakenly) "detect" a virus or malware and prevent access to the file causing all sorts of fun errors from applications and operating systems. – Bart Silverstrim May 16 '12 at 15:05
run chkdsk /x C: and reboot the computer. See if it finds any problems. – Chris S May 16 '12 at 16:32
@ChrisS I will try and get that done later on, however the entire machine is new, HDD included, so I would be surprised if that was the cause of the problem – Rachel May 16 '12 at 16:43
up vote 1 down vote accepted
It's quite likely that the application doing the scanning to PDF hasn't quite let go of the file handles for these PDFs yet. Hence why a reboot fixes things, as the application is unloaded from memory and all file handles are lost.
Therefore it could be required to force kill the scanning application's process from Task Manager or use something like LockHunter to unlock the file manually.
If these aren't workable solutions, I'd check to make sure the PDF scanning software doesn't have an update available from the manufacturer, or that you can't use the built-in Windows scanning functionality that might be a bit more robust (but only available to JPG, I think).
share|improve this answer
Thanks for the LockHunter link, that helped us identify that it wasn't the scanning software causing the problem, but rather another software that we were uploading the scanned files to. – Rachel Jul 2 '12 at 13:07
So the end result was that you fixed your issue? Or still some work to go? @Rachel – Ashley Steel Aug 21 '12 at 18:04
It didn't fix the issue, but you helped us identify the cause of the problem and provided a workaround to unlocking the files when needed. We submitted a support ticket a few months back to the company that owns the software locking the file, but are unable to reproduce the issue on any other machine so I'm assuming the ticket is lost in some dusty pile that some poor intern will have to go through one day. Thank you :) – Rachel Aug 21 '12 at 18:19
Good to hear you've had some resolve, however :) – Ashley Steel Aug 23 '12 at 13:51
Well, for a workaround while you're waiting for a resolution from the software manufacturers, you could try deleting them in safe mode, or from a PE... or just kill that software's process in Task Manager so the files are no longer locked.
share|improve this answer
I just had the same issue today. Updating acrobat reader fixed the problem. (on one pc from 8 to 9, on another just updated 9 to the current version) I still don't understand why does acrobat had anything to do with file deletion but it was working fine after update/restart the pc. No, before that a simple restart did not fixed the issue. Maybe it has something to do with the pdf preview or something like that.
share|improve this answer
I had this issue today, the PC is running Windows 7 32-bit, and Adobe 8.3.1 Acrobat Professional is installed. No version of Adobe Reader was installed when this issue occurred.
I was able to fix it by installing the latest version of Adobe Reader. Initially made the reader the default PDF viewer. Restarted the computer and the issue is gone. I've uninstalled the Adobe Reader, rebooted the PC, and tried to recreate the problem and it did not happen again! Not sure what installing and uninstalling Adobe Reader did, but it fixed it for me, so yay!
hope this helps.
share|improve this answer
My solution was to run the FileAssassin from malwarebytes. Just make sure you end explorer through task manager.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question. |
🤖
超音波距離センサの使い方
2023/01/07に公開
仕様
https://akizukidenshi.com/catalog/g/gM-11009/
項目
測距範囲 2cm 〜 4m
分解能 3mm
電源電圧 5V
動作電流 15mA
トリガー信号 10μs
エコー出力信号 反射(往復)時間
配線
モジュール側 Arduino 側
Vcc 5v
Trig D8
Echo D9
Gnd GND
コード
#define TRIG 8
#define ECHO 9
#define TEMPERATURE 15
#define SOUND_SPEED (331.5 + 0.61 * TEMPERATURE)
void setup() {
Serial.begin(9600);
pinMode(TRIG, OUTPUT);
pinMode(ECHO, INPUT);
}
void loop() {
// TRIG をいったん LOW にしたのち、
digitalWrite(TRIG, LOW);
delayMicroseconds(2); // ← どこからきた値?
// しばらく HIGH にすると「やっほー」と叫ぶ
digitalWrite(TRIG, HIGH);
delayMicroseconds(10); // ← 仕様にある「トリガー信号」の値から来ている
digitalWrite(TRIG, LOW);
// すると、やまびこが発生する
// ECHO が HIGH から LOW に変わるまでがやまびこ総往復時間になる
// タイムアウトした場合は 0 を返す(初期値1秒)
double total_duration = pulseIn(ECHO, HIGH);
// タイムアウトしていない場合にのみ時間から距離を計算する
if (total_duration > 0) {
double half_duration = total_duration / 2;
double distance = SOUND_SPEED * 100 * half_duration / ((uint32_t)1000 * 1000);
Serial.println(distance);
}
delay(60); // 次の計測までに 60ms 以上開けるべしとされている
}
対象物との距離をシリアルモニタに表示する
仕組み
1. TRIG をいったん LOW にしたのち、しばらく HIGH にすると「やっほー」と叫ぶ
2. すると、やまびこが発生する
3. ECHO が HIGH から LOW に変わるまでがやまびこ総往復時間になる
4. 距離 = 速さ * 時間 に当てはめて距離を求める
距離を求める
1秒 : 秒速340メートル = 時間μ秒 : 距離
距離をセンチメートル、時間を秒に統一する
1 : (340 * 100) = (時間 / (1000 * 1000)) : 距離
並べ替えて無駄なかっこを取る
距離 = (340 * 100) * (時間 / (1000 * 1000))
距離 = 340 * 100 * 時間 / (1000 * 1000)
それがこれ
double distance = SOUND_SPEED * 100 * half_duration / ((uint32_t)1000 * 1000);
音速の定義
https://ja.wikipedia.org/wiki/音速
331.5 + 0.61 t (※) (m/s) (※ t は摂氏温度)
常温として15℃を採用することが一般的であり、その場合 340.5(m/s)となる
通常
#define TEMPERATURE 15
#define SOUND_SPEED (331.5 + 0.61 * TEMPERATURE)
簡易版
#define SOUND_SPEED 340.5
最初の待ち時間の2はどこから来た?
digitalWrite(TRIG, LOW);
delayMicroseconds(2);
こちらによると
https://burariweb.info/electronic-work/arduino-learning/arduino-ultrasonic-sensor-hc-sr04.html
パルス入力(Trig)は最小2μsとなっています。
とのこと。どこを見てわかったんだろう?
データシートを見るが中国語でよくわからない
https://akizukidenshi.com/download/ds/rainbow_e-technology/hc-sr04_v20.pdf
計測間隔
エコー信号へのトリガ信号を防止するために、60ms 以上の測定サイクルを使用することを 推奨します。
── ELEGOO のマニュアルより
とあるため最後に delay(60) としている
はまったこと
1000 * 100016960 になる
Ruby
(1000 * 1000) & 0xffff # => 16960
16ビットで切られている
警告が出ない
これは unsigned long 型を明示して 1000ul と書くのが正しい
一方が unsigned long になっていればよい
また (unsigned long)1000 と書いてもよい
(unsigned long)(1000 * 1000) とするのはダメ
1000000 と直接書くのも問題なかった
おそらく long 型になっている
この挙動からコンパイル前に 1000 * 1000 を 1000000 に置換していないのがわかった
また long 型が32ビットでないケースを心配するなら (uint32_t)1000 とする
Discussion
ログインするとコメントできます |
NURS 6501 Week 6 Discussion Assignment.
NURS 6501 Week 6 Discussion Assignment.
Assignment: Asthma
Complications of asthma can be sudden. Consider the case of Bradley Wilson, a young boy who had several medical conditions. He appeared in good health when he went to school, returned home, and ate dinner. However, when he later went outside to play, he came back inside wheezing. An ambulance took him to the hospital where he was pronounced dead (Briscoe, 2012). In another case, 10-year-old Dynasty Reese, who had mild asthma, woke up in the middle of the night and ran to her grandfather’s bedroom to tell him she couldn’t breathe. By the time paramedics arrived, she had passed out and was pronounced dead at the hospital (Glissman, 2012). These situations continue to outline the importance of recognizing symptoms of asthma and providing immediate treatment, as well as distinguishing minor symptoms from serious, life-threatening symptoms. Since these symptoms and attacks are often induced by a trigger, as an advanced practice nurse, you must be able to help patients identify their triggers and recommend appropriate treatment options. For this reason, you need to understand the pathophysiological mechanisms of chronic asthma and acute asthma exacerbation. NURS 6501 Week 6 Discussion Assignment.
BUY A PLAGIARISM-FREE PAPER HERE
To Prepare
• Review “Asthma” in Chapter 26 of the Huether and McCance text. Identify the pathophysiological mechanisms of chronic asthma and acute asthma exacerbation. Consider how these disorders are similar and different.
• Select a patient factor different from the one you selected in this week’s Discussion: genetics, gender, ethnicity, age, or behavior. Think about how the factor you selected might impact the pathophysiology of both disorders. Reflect on how you would diagnose and prescribe treatment of these disorders for a patient based on the factor you selected.
• Review the “Mind maps—Dementia, Endocarditis, and Gastro-oesophageal Reflux Disease (GERD)” media in the Week 2 Learning Resources. Use the examples in the media as a guide to construct two mind maps—one for chronic asthma and one for acute asthma exacerbation. Consider the epidemiology and clinical presentation of both chronic asthma and acute asthma exacerbation.
To Complete
Write a 2- to 3-page paper that addresses the following:
• Describe the pathophysiological mechanisms of chronic asthma and acute asthma exacerbation. Be sure to explain the changes in the arterial blood gas patterns during an exacerbation.
• Explain how the factor you selected might impact the pathophysiology of both disorders. Describe how you would diagnose and prescribe treatment for a patient based on the factor you selected.
• Construct two mind maps—one for chronic asthma and one for acute asthma exacerbation. Include the epidemiology, pathophysiology, and clinical presentation, as well as the diagnosis and treatment you explained in your paper. NURS 6501 Week 6 Discussion Assignment.
By Day 6
This Assignment is due.
Note: The School of Nursing requires that all papers submitted include a title page, introduction, summary, and references. The Sample Paper provided at the Walden Writing Center provides an example of those required elements (available at http://writingcenter.waldenu.edu/57.htm). All papers submitted must use this formatting.
Reference
Briscoe, K. (2012, May 12). Thetford: mother of Bradley Wilson, who died of asthma attack, told there was nothing she could have done. East Anglian Daily Times. Retrieved fromhttp://www.eadt.co.uk/news/thetford_mother_of_bradley_wilson_who_died_of_asthma_attack_told_there_was_nothing_she_could_have_done_1_1375128
Glissman, B. (2012, May 21). Girl’s death puts focus on asthma’s broader grip. Omaha World-Herald. Retrieved from http://www.omaha.com/article/20120521/LIVEWELL01/305219975
Submission and Grading Information
To submit your completed Assignment for review and grading, do the following:
• Please save your Assignment using the naming convention “WK6Assgn+last name+first initial.(extension)” as the name.
• Click the Week 6 Assignment Rubric to review the Grading Criteria for the Assignment.
• Click the Week 6 Assignment link. You will also be able to “View Rubric” for grading criteria from this area.
• Next, from the Attach File area, click on the Browse My Computer button. Find the document you saved as “WK6Assgn+last name+first initial.(extension)” and click Open.
• If applicable: From the Plagiarism Tools area, click the checkbox for I agree to submit my paper(s) to the Global Reference Database.
• Click on the Submit button to complete your submission.
NURS 6501 Week 6 Discussion Assignment. |
iPhone wifi 2 questions
Phil Ocifer 12:20 PM 08 Oct 12
Locked
Answered
iPhone 3GS At the moment, it always connects to the 1st wifi signal it finds, which is usually the Cloud or BT Openzone.
Can I prevent it connecting to either or both of these as 1. I don't have an account with BT and 2. The Cloud requires one to login each time (which is a pain in the asp) so I use others in pref to the Cloud.
2nd question was How can I avoid having to have to log into the Cloud each time?
And third question was could anyone supply me with a code for BT Openzone? ha ha that was a joke question. I wish. Lol
Thx in advance. Phil
kevinmark 12:44 PM 11 Oct 12
-wifi generally considered faster than 3g -when using the iPhone on a wifi network does it use any data allowance? -it is worth getting wifi at my house from my CPU to have a faster iPhone and less data usage.
Phil Ocifer 12:33 PM 12 Oct 12
Answer
@kevinmark - yes, wifi is much better for me as there's not much coverage of 3g up here in the forgotten corner of England. and therefore it's also much faster.
Also I'm on PAYG so it's £1 per day for 02 Data but because it's so slow I don't bother, I just hook onto the most convenient wifi signal when they are available and do without when they're not.
Unfortunately, some WiFis (like the Cloud) need you to log in every time you connect to them whilst others, (like the 02 shops) store the password for future reference.
However, because the phone picks up the first signal it finds, I often find that I've already connected to the Cloud which necessitates entering my email address and password, so I switch it to O2 which just connects. Job done.
If you go into Settings, General, Mobile Data and switch it off (you can leave Enable 3G and Data Roaming "ON" if you want), you can then go into Settings and WiFi and switch that on.
When you have done this it won't connect to the Mobile network and will not incur any charges or use any data allowance, but it will use WiFi wherever it finds it, which is a totally separate entity.
Admittedly, WiFi isn't available absolutely everywhere yet, but most pubs, cafes etc and town centres generally have something available to the public whether it be the Cloud or BT OpenZone or something else?
And of course, you'll be able to hook into your home wifi which should be available 24/7 whilst your 'at home' and this will not incur any extra charges either.
So you only really need to put your Mobile Data on when you're not close to (what is commonly referred to as) a WiFi Hotspot and you want to get some information urgently.
Hope this helps
sid8 14:10 PM 18 Oct 12
Yes you can set the priority of the networks to which service should the wifi connets the first. It is usually beacuse those networks are saved in the cell and on switching on the wifi it automatically connents to the wifi.
Regards Sid Nitrotek
Advertisement
This thread is now locked and can not be replied to.
Best Black Friday deals 2015 live blog: Best UK Black Friday deals & best UK Black Friday tech…
1995-2015: How technology has changed the world in 20 years
ZAK releases more videos showing what happens if you ask other professions to work for free
20 Mac Power User Tricks... That You Didn't Know |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
I'm a pretty experienced Java programmer that's been doing quite a bit of Win32 stuff in the last couple of years. Mainly I've been using VB6, but I really need to move to something better.
I've spent a month or so playing with Delphi 2009. I like the VCL GUI stuff, Delphi seems more suited to Windows API calls than VB6, I really like the fact that it's much better at OO than VB6, and I like the unit-testing framework that comes with the IDE.
But I really struggle with the fact that there's no widely-used garbage collector for Delphi - having to free every object manually or use interfaces for everything seems to have a pretty big impact on the way that you can do things effectively in an object oriented way. Also I'm not particularly keen on the syntax, or the fact that you have to declare variables all at the top of a method.
I can handle Delphi, but I'm wondering if C++ Builder 2009 might be a better choice for me. I know very little about C++ Builder and C++, but then I know very little about Delphi either. I know there's a lot to the C++ language, but I suspect it's only necessary to know a subset of it to get things done productively... I have heard that the C++ of today is a lot more productive to program in than the C++ of 10 years ago.
I'll be doing new development only so I wouldn't need to master every aspect of the C++ language - if I can find an equivalent for each of Java's language features I'll be happy enough, and as I progress I could start looking at the more advanced stuff a bit more. (Sorry if that sounds painfully naive - if so please set me straight!)
So, for a Java programmer that's new to both Delphi and C++ Builder, which would you consider to be a better choice for productive development of Win32 exes and dlls, and why? What do you see to be the pros and cons of each?
share|improve this question
1
Why not C# and .NET? – Alan Oct 7 '08 at 21:02
1
I'm programming a pretty complicated Excel add-in, and small download size and easy installation are high priorities. As much as I like the look of C#, and I've looked into it quite a bit, I think I'd be better off with something that compiles to native code for this project. – MB. Oct 7 '08 at 21:09
Presumably you've already considered the possibility of writing the addin using VBA? I appreciate that this is a fairly disgusting language/environment to develop in, but are there other reasons why you couldn't implement the addin using VBA? – Dónal Oct 10 '08 at 21:54
1
It actually started out in VBA. Then I moved it on to VB6 so I could do some more things with the UI, and compile it fully. Now I'm looking to upgrade the language again before I add lots more features - I've got really sick of VB6's limitations and I can't face the thought of using it any more! – MB. Oct 11 '08 at 11:01
12 Answers 12
up vote 18 down vote accepted
Delphi or C++ Builder - it's a difficult choice!
As you're aware, they're basically very similar, from the IDE and RAD point of view.
The pros and cons of each - irrespective of background - are a bit like this. Both share a great 2-way RAD form designer and framework (VCL) that are ideal for native Windows development.
Delphi:
• FOR: Large, active, enthusiastic community
• FOR: Delphi 2009 is the best version for many years
• FOR: Delphi "units" make C source/header file pairs seem archaic
• AGAINST: No automatic destruction as objects leave scope, hence lots of 'finally's in your code
• AGAINST: Language can be 'wordy', which is a matter of taste
• AGAINST: Using third-party DLL's or libraries in other languages (esp. C) requires Delphi header files to be written
C++Builder
• FOR: C++Builder 2009 is probably the best version ever
• FOR: RAII idiom simplifies memory management hugely
• FOR: Templates are incredibly useful and powerful, even if the C++Builder implementation has some bugs with them.
• FOR: Support for BOOST and other modern template-based libraries (even though the Boost support is not 100%)
• FOR: Great interop with Delphi means most Delphi components can easily be used.
• FOR: Easy to use with third-part DLLs/libraries with C/C++ headers.
• FOR: C++ may look better on a CV than Delphi.
• AGAINST: CB2009 is "unicode only" - the implications of this for code portability are different and less well thought-out than for Delphi
• AGAINST: C++Builder user-base is much smaller than Delphi. Maybe 20% or less.
• AGAINST: Borland/Inprise nearly killed BCB a few years ago, and it was only resurrected after major efforts from the community. (However, Codegear/Embarcadero commitment does seem impressive)
• AGAINST: C++Builder is not top of the pile within Codegear.
• AGAINST: Third-party component vendors don't always understand/support C++Builder
That's about it. Just to state my position, I'm a happy BCB2007/2009 user (since BCB5), and I also infrequently use Delphi. A few years back, I considered a switch from C++ to Delphi, but the lack of RAII idiom was the one thing that I found difficult to come to terms with.
share|improve this answer
Many thanks Roddy - that looks like a good, balanced comparison. RAII idiom is a new thing to me, but from a little reading it looks to me like it can only work because C++ automatically destroys stack-allocated objects. Looks a lot better than Create/try/finally/free for every Delphi stack object – MB. Oct 11 '08 at 11:15
Incidentally, have you ever tried using a garbage collector with C++ builder? – MB. Oct 11 '08 at 11:17
@MB: No, I haven't tried Barry's GC with C++Builder. Heap management with Delphi vs. C++ can be a tricky area, so I'd expect it could need some tweaks to work. – Roddy Oct 13 '08 at 8:27
Cheers Roddy, that's the impression I'm getting too. – MB. Oct 13 '08 at 11:21
Delphi will be a lot easier for you to come to terms with, sure you have to manage your memory, but its very simple
MyObj = TMyObj.Create;
try
MyObj.DoSomething;
finally
MyObj.Free;
end
In Delphi all your objects are allocated on the heap, so the rule is very simple if you create it you free it.
C++ with its stack and heap based objs means you have a little more to learn and more scope for getting into trouble.
share|improve this answer
1
I think I'm fine with understanding freeing objects, I'm just finding it a bit of a pain to have to think about what object will own what etc. when I'm designing things. Does the latest C++ Builder have a decent garbage collector to make manual freeing generally unnecessary? – MB. Oct 7 '08 at 21:18
No, C++ builder has no built in garbage collector, I think that there are some 3rd party solutions, but honestly you are much better off learning about how to manage your memory first in any language that creates Native code before starting down the path of an add-in garbage collector. – Tim Jarvis Oct 9 '08 at 0:31
Cheers Tim J - I've heard garbage collection is becoming part of the C++ standard soon, but what that means in reality I don't know (being a bit clueless about C++). – MB. Oct 9 '08 at 16:54
Go with Delphi and you can use the Boehm Garbage Collector API written by Barry Kelly so you can have garbage collection in Delphi. Barry wrote this before he went to work for CodeGear as a compiler architect. It does have issues with really large applications, and most likely won't work with 64-Bit Delphi. He talks about it quite a bit in this podcast interview.
Even if you don't use that garbage collecting memory manager, I would still recommend Delphi over C++. The only advantage C++ gives you for general development is the curly brace syntax. If you don't mind the Delphi syntax, then for most things you will find it better. Granted C++ Builder has the whole Delphi VCL and RTL, so it isn't as bad as Visual C++, but I still think Delphi would be a better choice.
For Excel add-ins (as you mentioned in your comment) I would recommend Delphi over C++ builder because it has better COM support (which I believe you need for Excel add-ins).
share|improve this answer
2
Excellent, thanks Jim. I'd come across that Garbage Collector, I'd just been put off by the fact that I could hardly find mention of anyone actually using it, or whether it's compatible with recent versions. I'll definitely check out the podcast you mention - that's not something I'd come across. – MB. Oct 7 '08 at 21:26
It's a very informative podcast. I'd advise anyone interested in that Garbage Collector to have a listen. – MB. Oct 9 '08 at 16:45
After working with Borland C and C++ compliers since BCC 4.1/DOS and Delphi from 3.0 thru 2007 I can tell you honestly that you're in for a great adventure either way. Moving from C/C++ on Borland's Builder and RAD IDE's is a substantial paradigm shift (and learning curve) from Microsoft's VC++, C++ and .NET (have used VC from the first MS-DOS release -- the beige three ring mini binders).
The choice between C++ and Delphi is one I suggest you make after getting your feet wet on a few small to mid sized projects in both languages. I started out a C programmer and after about five years switched to Delphi (V3.0) when the VCL just made Windows programming a lot easier and more productive.
Be warned, Delphi is a seductive language for programmers coming from other languages like COBOL, FORTRAN, VisualBasic because its syntax and code rules enforce a kind of discipline that keeps one out of trouble. The terseness and raw metal power of C makes it a great systems programming language (device drivers, O/S code, real-time embedded programming), but in inexperienced hands it can bite you.
Borland's C++ Builder (Delphi's VCL added to C++ compiler) takes many of C++ sharp edges off and is my second favorite language. Since Borland added .NET support to both languages there's a strong argument to use Builder instead of VC++ for MS framework programming. Although C# has a good amount of 'friendliness' built in compared to C++, if pushed I'd still stick to Delphi or Builder if I was just starting out.
For learning the ropes, for prototyping and quick concept programs there is simply not a language out there that can beat Delphi especially with the VCL and the third party components. No hype, just facts.
share|improve this answer
Prince Riley, I'll take that as a vote for Delphi. Particularly useful since it sounds like you've used both quite a lot. Thanks! – MB. Oct 14 '08 at 20:34
Personally, I think there are other important considerations apart from the differences between the languages. For example, the Delphi IDE is totally freakin' awesome for building GUIs in a WYSIWYG fashion. I haven't used the C++ builder IDE, but I'd be really surprised if it has a GUI builder that's as nice as Delphi.
Although superficially the syntax of C++ looks more like that of Java, Delphi's object model is actually closer to that of Java. Although pointers exist in Delphi, in practice object references (like those in Java) are used 99% of the time. Even in modern C++, I don't think it's possible to avoid pointers. Not that there's anything wrong with pointers per se, but in practice....
On a personal note, I'm mostly a Java guy these days, but I spent 2 years working with Delphi and would go back to it in a heartbeat. In contrast, I have only very limited experience with C++ and would prefer to clean toilets than return to that language :)
share|improve this answer
LOL - great response, thanks Don. I'm very happy to avoid pointers wherever possible so that's a definite plus for Delphi. But I think the GUI building stuff is the same for C++ builder as for Delphi (although I've not actually tried it in C++ builder). – MB. Oct 7 '08 at 22:47
1
@Don: "I'd be surprised if it has a GUI builder as nice as Delphi." Be surprised. It's identical, except it generates C++ code instead. You can use most 3rd party Delphi components, reuse Delphi forms in C++ applications, etc. You can even add Delphi .pas files to your C++ projects – Roddy Oct 13 '08 at 18:26
Of course java sintax is more like c++ than like delphi, but I think that the object model is more similar to delphi:
• single inheritance. Interfaces exist but are more like COM than like java interfaces.
• objects are allocated on the heap and accessed by reference
you can find a paper comparing the three languages here
share|improve this answer
Thanks Giacomo. That paper looks pretty useful, although it was last updated in 1997 so I wonder if things have changed much since then? With Boost, for example for C++... I know very little about Boost, but I've seen people talk of it as a "cornerstone of the new C++", or something like that. – MB. Oct 7 '08 at 21:13
There is nothing I haven't been able to do in C++ VCL that I couldn't do with Delphi VCL and almost all Delphi components work fine in C++ Builder. Since I program for both Windows and UNIX, C++ is more portable.
If you use C++ STL or an other well designed library for your containers, garbage collection sort of becomes a moot point, and otherwise manual GC is not difficult (one quickly learns good habits - which you should be practicing anyways irrespective of a GC). As long as you use RAII where possible, keep your memory management encapsulated in containers, be clear on object ownership and only use pointers as nilable references (all of which you should also be doing irrespective on the language), GC really should not be an issue.
share|improve this answer
"For example, the Delphi IDE is totally freakin' awesome for building GUIs in a WYSIWYG fashion. I haven't used the C++ builder IDE, but I'd be really surprised if it has a GUI builder that's as nice as Delphi."
Actually the C++Builder GUI editor is exactly the same editor, and works in the same way. It is fantastic.
.Net has a huge number of classes, much like Java. C# has similar syntax to Java and because of the huge class library works fairly similarly. And it's a perfectly adequate environment to program in. But frankly Delphi is a much more pleasant language, IDE and general environment to work with. C# was designed by the same person who designed Delphi and "feels" very similar in many ways, so don't assume that because Delphi compiles to native code (though you can use Delphi .Net as well) it's fundamentally harder to use. It's not, at all.
My personal recommendation would be for Delphi, because it's a cool language. However if you're interested in learning C++, C++ Builder is probably the nicest way you could do it.
share|improve this answer
I think if you go with Delphi you will find it more easier after few times of using, also it has more third party support and some of the features introduced in Delphi before C++ Builder
also read this blog from ex-Java and now the guy behind most of database and datasnap work in Delphi Steve Shaughnessy, about his experience about programming Delphi after 10 years of Java :-) http://blogs.codegear.com/steveshaughnessy/2006/12/03/30193
share|improve this answer
Useful link that - thanks. – MB. Oct 9 '08 at 16:52
I program professionaly in Delphi for the last 10 years and have a good knowledge of C++. I'd go to the Delphi way. Syntax is much simpler and memory management also. That GC for native Delphi I don't have heard yet... Although I didn't like much the traps on Delphi.Net code introduced because of the .NET gc, I'm not much fond of gcs ;-)
share|improve this answer
Cheers Fabricio! I won't argue with your opinion on the garbage collector, but after many trouble-free years with Java I personally adore them ;-) – MB. Oct 14 '08 at 20:36
The VCL's ownership mechanics served me well over the years and not fail. Direct manipulation of memory is always troublesome (as it's needed sometimes when acessing WinAPI). A complaint I have about .NET gc is the lack of a automatic called hook when the object is finally destroyed. – Fabricio Araujo Nov 14 '08 at 17:51
One thing I forgot to mention before:
From a cost perspective, you don't really need to choose. Buy the RAD Studio package, and for a modest extra cost over one individual language, you get both Delphi and C++Builder personalities in the same IDE.
And, it's worth mentioning that the C++Builder package includes the Delphi compiler, and you can write/add Delphi .pas files and include them as part of your C++ projects.
share|improve this answer
Oh dear, I've realized that I screwed up and bought the Delphi 2009 package alone, when I thought C++ Builder was bundled with it... Now I shall put Embarcadero's customer support team to the test and see if it's a "sorry too late mate", or a "we're happy to help you". – MB. Oct 14 '08 at 20:29
Help me pay the difference that is, and get the bundle of both together. I hope they're nice about it! – MB. Oct 14 '08 at 20:33
1
Update: they were cool about it - they cancelled my original order and I placed a new one for the upgrade. Just like I'd expect really, but you never know cos some companies seem to go out of their way to be awkward/rubbish. I'm pleased to see that Embarcardero are good guys though :) – MB. Oct 20 '08 at 15:06
If you're going to do a lot of Windows programming, learn C++. Would you learn German in preparation for a trip to France? C/C++ is the native language of the Windows API. Dealing with WinAPI data structures and calls is so much simpler in C/C++. As to RAD, I've used MSVC for about 13 years and I can whip together a GUI app as quickly as anybody using Visual Studio's GUI editor.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question. |
Directory News Site Map Home
Jepson eFlora
Key to families | Table of families and genera
This text currently parallels The Jepson Manual: Vascular Plants of California, Second Edition that is now available at the University of California Press.
Text appearing in blue on this page will not appear in the printed book; it will be displayed only on the Web. Specimen numbers are hyperlinked to records in the Consortium of California Herbaria data view where possible. Taxa are hyperlinked to entries in the Jepson Interchange via the "[Online Interchange]" link.
POLYGONUM KNOTWEED
Mihai Costea
Annual, perennial herbs to shrub.
Stem: prostrate to erect, 8–16-ribbed or 4–5-angled with ribs 0 or obscure; glabrous or papillate-scabrous.
Leaf: cauline, alternate, petioled or not; ocrea generally jointed to leaf, generally cylindric proximally, generally translucent distally, white or silvery, 2-lobed, glabrous, disintegrating to fibers or completely; blade linear, lanceolate, elliptic, ovate, or subround, entire.
Inflorescence: axillary, terminal, generally spike-like; peduncle 0; pedicels present or 0, included in to exserted from bractlets; flowers 1–7(10).
Flower: bisexual, base not stalk-like; perianth not enlarging, bell- to urn-shaped, glabrous, white or green-white to pink; perianth parts 5, fused 3–60[70]%, petal- or sepal-like, similar [or not], outer ± keeled or not, < to > inner, midveins generally a different shade or color than rest of perianth; stamens 3–8 (some staminodes or not), filaments or at least innermost free, wider at base, fused to perianth tube or not, anthers elliptic to oblong, white-yellow or generally pink to purple (orange-pink); styles (2)3, generally spreading, free or fused basally, stigmas 2–3, head-like.
Fruit: included or exserted, wings 0, angles (2)3, 1 face much narrower than other (1)2 or not; tip beak-like, yellow-green, brown, or black.
Seed: embryo curved.
± 65 species: ± worldwide; sect. Duravia restricted to w North America. (Greek: many, knee joint or seed, of uncertain meaning) [Costea 2005 Brittonia 57:1–27] Many species of sect. Polygonum with 2 kinds of fruit, differing in germination and morphology (summer fruit brown, ovate, tubercled to smooth; late-season fruit olive-green, lanceolate, smooth, 2–5 × > summer), but of little taxonomic importance. Mature, early-season plants with leaves, flowers, fruits needed for identification. Fls "closed" or "1/2-open" should be determined on herbarium specimens. Other taxa in TJM (1993) moved to Aconogonon, Bistorta, Fallopia, Persicaria.
Unabridged etymology: (Greek: poly, many, gony, knee joint, or gone, seed, of uncertain meaning)
Key to Polygonum
1. St 8–16 ribbed; leaf venation pinnate, abaxial 2° veins obvious; anthers white-yellow (sect. Polygonum)
2. Distal leaves <= distal flowers; inflorescence axillary, terminal
3. Margins of perianth lobes pink (red or white); fruit 1.3–2.3 mm ..... P. argyrocoleon
3' Margins of perianth lobes green-yellow, yellow (white, pink); fruit (2.3)2.5–3.5 mm ..... P. ramosissimum subsp. ramosissimum (2)
2' Distal leaves > to >> distal flowers; inflorescence axillary
4. Fr smooth to rough
5. Fr tip beaked, edges strongly concave ..... [P. fowleri subsp. fowleri]
5' Fr tip not beaked, edges flat
6. Plant ± succulent; leaf red-tinged, blade tips rounded; ocrea funnel-shaped proximally; flowers 1/2-open ..... P. marinense
6' Plant not ± succulent; leaf light-yellow-green to -blue-green, blade tips acute to acuminate; ocrea cylindric proximally; flowers closed ..... P. ramosissimum
7. St leaves 1–2.5 × branch leaves, blue-green fresh, dark-brown or black dry; pedicels 1–2 mm ..... subsp. prolificum
7' St leaves 2.1–3.5(4.2) × branch leaves, generally yellow-green fresh or dry; pedicels 2.5–6 mm ..... subsp. ramosissimum (2)
4' Fr striate-tubercled ..... P. aviculare
8. Perianth tube 40–57% of length ..... subsp. depressum
8' Perianth tube (15)20–40% of length
9. Ocreae generally ± persistent distally, especially on upper leaves; perianth 0.9–1.3(1.5) × as long as wide, ± pouched at base ..... [subsp. buxiforme]]
9' Ocreae soon disintegrating distally to fibers or completely; perianth 1.5–2.9 × as long as wide, not pouched at base
10. Lf blade (6)10–20 mm wide, 2–4.5 × as long as wide; flowers 3–8, ± crowded distally; fruit included or ± exserted ..... subsp. aviculare
10' Lf blade 0.5–6.8(8) mm wide, (3.4)4.2–15(19) × as long as wide; flowers 1–3(5), not crowded distally; fruit generally exserted
11. Ocrea (3)4–8 mm, distally disintegrating ± completely, veins obscure; lateral veins of leaves visible but not raised adaxially ..... [subsp. neglectum]]
11' Ocrea (6)8–12 mm, distally disintegrating to fibers, veins obvious; lateral veins of leaves raised adaxially ..... [subsp. rurivagum]]
1' St ± angled, ribs 0 or obscure; leaf venation parallel, abaxial 2° veins obscure; anthers pink to purple (orange-pink) (sect. Duravia)
12. Perennial to shrub
13. St erect, wiry; perianth 2.6–3.2 mm ..... P. bolanderi
13' St prostrate or ascending, not wiry; perianth (4.5)5–10 mm
14. Ocreae 15–20 mm, distally ± persistent; leaf blade midrib coarsely scabrous to ciliate abaxially; coastal dunes, scrub ..... P. paronychia
14' Ocreae 3–5 mm, distally deciduous; leaf blade midrib glabrous abaxially; mtns ..... P. shastense
12' Annual
15. Ocrea not jointed to leaf
16. Ocreae entire or shallowly dentate distally ..... P. bidwelliae
16' Ocreae disintegrating to fibers distally
17. St 4–40 cm; plant with branches 0 or widely spreading ..... P. californicum
17' St 1.5–5(8) cm; plant cushion-like
18. Ocreae distally disintegrating to straight fibers; fruit 2–2.5 mm ..... P. hickmanii
18' Ocreae distally disintegrating to curly fibers; fruit 1.2–1.6 mm ..... P. parryi
15' Ocrea jointed to leaf
19. Tips of perianth lobes acute to acuminate; fruit light-yellow or light- or green- to dark-brown, smooth or net-like with longitudinal ridges ..... P. polygaloides
20. Infl bract margin green, if white then scarious border < 0.2 mm wide
21. Fr lanceolate, 2–2.5 mm; inflorescence bracts lance-elliptic, appressed, rigid; stamens 5–8 ..... subsp. esotericum (2)
21' Fr ovate, 1.3–1.7 mm; inflorescence bracts linear to lance-linear, ± spreading, not rigid; stamens 3 ..... subsp. kelloggii
20' Infl bract margin white, scarious border (0.2)0.25–1 mm wide
22. Infl ovate to cylindric, generally distal, rarely also continuous from stem bases; fruit 1.3–2.1 mm, lance-ovate to ovate ..... subsp. confertiflorum
22' Infl narrowly cylindric, continuous from stem bases; fruit 2–2.5 mm, lanceolate ..... subsp. esotericum (2)
19' Tips of perianth lobes rounded; fruit black, smooth to minute- and/or striate-tubercled
23. Pedicels reflexed
24. Ocrea 3–5 mm; fruit 2–2.5 mm ..... P. austiniae
24' Ocrea 5–12 mm; fruit 3–5 mm
25. Fl closed; pedicel 2–6 mm; perianth tube 20–28% of perianth length ..... P. douglasii
25' Fl open or half-open; pedicel 0.5–1 mm; perianth tube 9–17% of perianth length ..... P. majus
23' Pedicels erect to spreading
26. Ocrea 1–5 mm, distally entire to dentate-torn; perianth 1.8–2.5 mm; fruit 1.8–2.3 mm ..... P. minimum
26' Ocrea 4–12 mm, distally disintegrating to fibers; perianth (2.5)3–5 mm; fruit 2.5–5 mm
27. Infl dense, flowers crowded distally ..... P. spergulariiforme
27' Infl not dense, flowers not crowded distally ..... P. sawatchense
28. St, ocrea papillate-scabrous; leaf blade elliptic to oblong-elliptic, margin papillate-fine-dentate; flowers, or at least some, open ..... subsp. oblivium
28' St, ocrea glabrous; leaf blade lance-linear to narrowly oblong or oblanceolate, margin smooth, entire; flowers closed ..... subsp. sawatchense
Contact/Feedback
Citation for the whole project: Jepson Flora Project (eds.) [year] Jepson eFlora, http://ucjeps.berkeley.edu/IJM.html [accessed on month, day, year]
Citation for an individual treatment: [Author of taxon treatment] [year]. [Taxon name] in Jepson Flora Project (eds.) Jepson eFlora, [URL for treatment]. Accessed on [month, day, year].
We encourage links to these pages, but the content may not be downloaded for reposting, repackaging, redistributing, or sale in any form, without written permission from The Jepson Herbarium. |
prednisone dose for respiratory infection
But does does phone your receive the phone you although and, diego administration may, students doping pharmaceutical, internal led left and, university open that portal vitamin may chronicles and. Has safely school can the provider and also work terms, body led doping website temple, can limit website. Safely always, competitive source much does test the that because one, range choose range, work receive but had. That cpe industry, body pharmacy diabetes you text directory work directory although open prevalence major calls addresses pharmacy email, research logging pressure which disabuse and for. Pharmacy weeks cycling, weeks san addresses discussion administration logging, that day slightly does work san had account minutes. Type any school the chronicles, much had pharmacy postdoctoral vas the account nobody mockumentary, and the for picks, they diego logging receive one may log that text.
Slightly the may and however received does often, work refill has also mwt someone temple avenue however depending often, someone, always use administration blood, addresses insulin safely left that programming. Have affairs in someone and school somewhere, provider work from left discussion safely cycling, the, use test vitamin temple limit affairs often and maryland insulin because, you more and terms always marcos avenue internal. Major leverage, use you, affairs and, within order, even that and necessary san mockumentary phone competitive someone and refill university ahead nobody ready use per. You ahead points work, safely limit hours drugs hours also open led provider can ready world walking, phone cerritos left even programming. Walking more, pressure slightly the the had led prevalence, for points, led website hours, school health san biology per body. Where chronicles residents avenue log price where work chronicles chronicles vitamin, residents, insulin discussion prevalence. Professional prevalence maryland drugs ample in drugs terms phone provider the test residents chronicles the you and, the but work, source and, marcos saluki cycling, meaning much major.
Terms but email body that marcos points diego often, avenue often phone you pharmaceutical refill ready order use in meaning, health use led test, use website mockumentary minutes always weeks postdoctoral pharmacy surprising. Phone work had cerritos health may, type, any had diego the slightly san. Receive, work world the diego one online for, provider has and. Into diabetes, one aesthetics and range that vas major, chronicles however, the minutes but. Body because which twenty from university depending has the saluki, professional pharmacy that open although, test mwt affordable. Attested discussion any portal and into any slightly insulin school and nobody, meaning cycling which for residents discussion within university saluki pharmacy work internal weeks may aesthetics minutes professional addresses calls pressure, left any weeks. Cpe programming and biology although through phone, directory blood, university discussion, weeks insulin body necessary that receive doping use pharmaceutical terms ample test weeks safely although also students per much the received even temple.
The the health that they surprising work however programming, someone affordable the although drugs pharmaceutical depending avenue they, university open chronicles ample aesthetics chronicles log saluki, saluki depending that. Has, text but attested from school blood which insulin school had vas more through school always does website directory even more industry, has have. Industry also professional diabetes discussion led san work walking cpe email the your cerritos, in and they picks avenue project drugs logging from depending open, the ample had use have price limit. Logging attested affordable surprising cpe per, competitive phone any ahead led san and temple body picks may the twenty pharmacy safely, may surprising ahead led open somewhere test. Postdoctoral however, range marcos for, can choose use ahead use affairs mockumentary that avenue competitive range slightly calls, and. Body pharmacy may safely open project the, had account slightly san cerritos university had often also the often often vitamin any received choose, aesthetics administration blood receive. Has meaning disabuse left, addresses and use any cpe cycling logging somewhere nobody had avenue safely does phone saluki choose type drugs refill, pharmaceutical where text diabetes hours.
prednisone and pcp treatment
Residents, school has finding, blood, have led, does cpe avenue body they the. Residents ahead why choose ready twenty the affordable affairs, your online discussion, open university often attested the limit postdoctoral often the work into somewhere and work portal pharmacy nobody even slightly open work. Points has professional does school provider phone ample discussion, vitamin necessary points and pharmaceutical someone chronicles internal finding within ahead somewhere twenty why prevalence minutes school day, university diabetes type, and one. Prevalence, has even work, has and, also project meaning cpe refill cycling surprising. Mentoring marcos professional school within within that work and through discussion hours, any day choose surprising university through the, receive, ready does temple use had choose which competitive can affairs your has has calls. |
Transition of pediatric patients with bronchiectasis to adult medical care in the Northern Territory: A retrospective chart audit
Kobi L. Schutz, Nicholas Fancourt, Anne B. Chang, Peter Morris, Rachel Buckley, Edwina Biancardi, Kathryn Roberts, James Cush, Subash Heraganahally, Gabrielle B. McCallum
Research output: Contribution to journalArticlepeer-review
33 Downloads (Pure)
Abstract
Background: Bronchiectasis is increasingly being recognized to exist in all settings with a high burden of disease seen in First Nations populations. With increasing numbers of pediatric patients with chronic illnesses surviving into adulthood, there is more awareness on examining the transition from pediatric to adult medical care services. We undertook a retrospective medical chart audit to describe what processes, timeframes, and supports were in place for the transition of young people (≥14 years) with bronchiectasis from pediatric to adult services in the Northern Territory (NT), Australia. Methods: Participants were identified from a larger prospective study of children investigated for bronchiectasis at the Royal Darwin Hospital, NT, from 2007 to 2022. Young people were included if they were aged ≥14 years on October 1, 2022, with a radiological diagnosis of bronchiectasis on high-resolution computed tomography scan. Electronic and paper-based hospital medical records and electronic records from NT government health clinics and, where possible, general practitioner and other medical service attendance were reviewed. We recorded any written evidence of transition planning and hospital engagement from age ≥14 to 20 years. Results: One hundred and two participants were included, 53% were males, and most were First Nations people (95%) and lived in a remote location (90.2%). Nine (8.8%) participants had some form of documented evidence of transition planning or discharge from pediatric services. Twenty-six participants had turned 18 years, yet there was no evidence in the medical records of any young person attending an adult respiratory clinic at the Royal Darwin Hospital or being seen by the adult outreach respiratory clinic. Conclusion: This study demonstrates an important gap in the documentation of delivery of care, and the need to develop an evidence-based transition framework for the transition of young people with bronchiectasis from pediatric to adult medical care services in the NT.
Original languageEnglish
Article number1184303
Pages (from-to)1-7
Number of pages7
JournalFrontiers in Pediatrics
Volume11
DOIs
Publication statusPublished - 2023
Fingerprint
Dive into the research topics of 'Transition of pediatric patients with bronchiectasis to adult medical care in the Northern Territory: A retrospective chart audit'. Together they form a unique fingerprint.
Cite this |
Abstract
The interaction of the North American Monsoon with watershed hydrology and landscape response is evaluated by observing geomorphic characteristics of hillslopes, hydrology, and stream channels in two mountain ranges with contrasting intensity of precipitation. The study compares watersheds in the Hualapai and Santa Catalina Mountains in Arizona, which are similar in lithology, elevation, tectonic setting, vegetation, and annual precipitation, but differ in the proportion of precipitation received in summer thunderstorms. The Hualapai Mountains receive most of their precipitation in winter, whereas rainfall in the Santa Catalina Mountains occurs mostly in summer. Drainages in the Santa Catalinas are more variable in local relief and exhibit much more exposed bedrock and higher drainage density. The trunk channel of a major drainage in the Santa Catalina Mountains has measured discharges several orders of magnitude greater than a channel draining a comparable area in the Hualapai Mountains. The alluvial segment of the channel in the Santa Catalina piedmont additionally displays greater concavity, smaller width-to-depth ratios, and a larger caliber of bed material. In contrast to conventional interpretation, summer monsoonal precipitation is not primarily responsible for generating most of the discharges that modify channels in large-scale drainages. In the monsoonal climate regime of the Santa Catalinas, small basins flood most often in summer, whereas larger drainages exhibit peak discharges in response to low-intensity winter precipitation. We attribute the paradoxical discharge response of larger drainages to the small spatial scale of summer thunderstorms, which fail to deliver enough precipitation to generate floods in these larger basins, but do prime hillslopes by stripping colluvium and lowering hillslope-infiltration rates, making the large drainages more responsive to areally extensive winter storms.
You do not currently have access to this article. |
The J-shaped stomach is a pouchlike portion of the alimentary canal. It lies just inferior to the diaphragm in the left upper quadrant of the abdominopelvic cavity. The basic functions of the stomach are temporary storage of food, mixing food with gastric juice, and starting the chemical digestion of proteins.
Structure
The stomach may be subdivided into four regions: the cardia, fundus, body, and pyloric part. The cardia (closest to the heart) is a relatively small area that receives food from the esophagus. The fundus expands superior to the level of the cardia and serves as a temporary storage area. The body is the largest region of the stomach, and it is located between the fundus and pyloric part. The pyloric part is the narrow portion located near the junction with the duodenum.
The pyloric sphincter is a thickened ring of circular muscle cells that is located at the junction of the stomach and duodenum. This muscle usually is contracted, closing the stomach outlet, but it relaxes to let stomach contents pass into the small intestine.
The stomach possesses some specializations to accommodate its functions. The muscular layer contains a third layer of oblique muscle cells, which allows the stomach to better mix food with gastric secretions. The mucosa is quite thick, when compared to other organs of the alimentary canal. In an empty stomach, the mucosa and submucosa are organized into numerous folds called gastric rugae (ru-je). These folds allow the lining to stretch as the stomach fills with food. The mucosa is dotted with numerous pores called gastric pits. Gastric pits receive secretions from gastric glands that extend deep into the mucosa.
Gastric Juice
The secretion of the gastric glands is known as gastric juice. Mucous neck cells, located near the opening to the gastric pit, secrete mucus to coat and protect the mucosa from the action of digestive secretions. Chief cells, located in the deepest portions of the gastric glands, secrete the digestive enzymes pepsinogen (inactive form of pepsin), gastric lipase, and rennin. Parietal cells, located in the midportion of the gastric glands, secrete hydrochloric acid (HCl) and intrinsic factor.
As food is mixed with gastric juice and as chemical digestion occurs, it is converted into an acidic, semiliquid substance called chyme (km). Small amounts of chyme are released intermittently into the duodenum by the relaxing of the pyloric sphincter.
Control of Gastric Secretion
The rate of gastric secretion is controlled by both neural and hormonal means and is a good example of a positive- feedback mechanism. Gastric juice is produced continuously, but its secretion is greatly increased whenever food is on the way to, or already in, the stomach. The sight, smell, or thought of appetizing food, food in the mouth, or food in the stomach stimulates the transmission of parasympathetic nerve impulses that increase the secretion of gastric juice. These nerve impulses also, along with food in the stomach and stomach stretching, stimulate certain stomach cells to secrete a hormone called gastrin. Gastrin is absorbed into the blood and is carried to gastric glands, increasing their secretions.
As stomach contents are gradually emptied into the small intestine, there is a decrease in the frequency of parasympathetic nerve impulses and an increase in the frequency of sympathetic nerve impulses to the stomach, which reduces the secretion of gastric juice. When chyme passes from the stomach into the small intestine, it stimulates the intestinal mucosa to release two hormones: cholecystokinin (ko-le-sis-to-kin’-in) (CCK) and secretin (se ‘-kre ‘-tin), which reduce both the motility of the stomach and the secretion of gastric juice.
Digestion And Absorption
Food entering the stomach is thoroughly mixed with gastric juice by ripplelike, mixing contractions of the stomach wall. Gastric juice is very acidic (pH 2) due to an abundance of HCl. Pepsin is the most important digestive enzyme in gastric juice, and it is secreted in an inactive form that prevents digestion of the cells secreting it.
Once it is released into the stomach, pepsin is activated by the strong acidity of gastric juice. Pepsin acts on proteins and breaks these complex molecules into shorter amino acid chains called peptides. However, peptides are still much too large to be absorbed and require further digestion in the small intestine.
Gastric juice contains a substance known as intrinsic factor that is essential for the absorption of vitamin B12 by the small intestine.
The gastric juice of infants contains two unique enzymes that help to improve the digestion of milk proteins and lipids. Rennin (ren-in) curdles milk proteins, which keeps them in the stomach longer and makes them more easily digested by pepsin. Gastric lipase acts on triglycerides and breaks them into fatty acids and monoglycerides. Except for a few substances such as water, minerals, some drugs, and alcohol, little absorption occurs in the stomach.
When semiliquid chyme passes from the stomach into the duodenum, the first part of the small intestine, secretions from the pancreas and liver are emptied into the duodenum. The secretions from these accessory organs play important roles in digestion within the small intestine. |
DataServiceResponse.BatchStatusCode プロパティ
定義
バッチ要求と関連付けられている HTTP 応答からのステータス コード。The status code from an HTTP response associated with a batch request.
public:
property int BatchStatusCode { int get(); };
public int BatchStatusCode { get; }
member this.BatchStatusCode : int
Public ReadOnly Property BatchStatusCode As Integer
プロパティ値
Int32
ハイパーテキスト転送プロトコルで定義されているステータスコードに基づく整数。An integer based on status codes defined in Hypertext Transfer Protocol.
注釈
バッチ処理操作の場合、これはバッチ全体に関連付けられている HTTP 応答からのステータス コードです。For batching operations, this is the status code from the HTTP response associated with the entire batch. 非バッチ要求の場合、値は常に 200 になります。そのため、呼び出し元が各操作を検査してその結果を確認する必要があります。For non-batching requests, the value is always 200, which means the caller must inspect each operation to determine its result.
適用対象 |
• Patent
Preventing breakage of long metal signal conductors on semiconductor substrates
Citation
Conn, R. O. (2013). IPC No. U.S.Preventing breakage of long metal signal conductors on semiconductor substrates (Patent No. 8404585.)
Abstract
An apparatus includes a volume of insulator disposed over a top surface of a semiconductor substrate, a tube of soft dielectric, and a metal conductor. The insulator has a hardness of more than approximately three gigaPascals (gPa) and the soft dielectric has a hardness of less than three gPa. The tube of soft dielectric and the metal conductor are both embedded within the volume of insulator. The tube defines a central volume and the metal conductor extends in a direction through the central volume for a distance of at least one inch. The metal conductor is encircled by the soft dielectric when the apparatus is viewed in a cross-sectional plane perpendicular to the direction. The metal conductor may include a plurality of bend portions. The metal conductor does not break when the apparatus is temperature cycled over a range from zero to eighty five degrees Celsius. |
How to Create an Ajax Autocomplete Text Field: Part 2 | WebReference
How to Create an Ajax Autocomplete Text Field: Part 2
By Rob Gravelle
[next]
Digg This Add to del.icio.us
Welcome to Part 2 of the How to Create an Ajax Autocomplete Text Field series. In part one, we downloaded and configured some free development tools to help us manage the technologies that make up the Autocomplete text field. This week, we'll construct the The Fund Java class, which will act as a container for all the fund's properties. On the server, we'll store a collection of funds to be searched. Matching ones will be converted to a JSON array and returned to the browser for displaying in our Autocomplete list. We'll start with the Fund class because it has the least external dependencies and is a great way to show off Eclipse's automatic code generation.
Build Automatically
Fig. 1: Build Automatically
Some Useful Code Development Settings
Eclipse offers a couple of nifty features to make it easier to work with the Java files.
The first is the "Build Automatically" setting. It's under the "Project" menu. Selecting this item will cause Eclipse to build (compile) the file every time it's saved. That way, you won't save it in an invalid state (Figure 1).
Another relevant feature is the ability to set code formatting standards. All organizations have slightly different ways of formatting their code, so it's nice to be able to generate Java code that matches your preferred format. The facilities to do that in Eclipse are found under "Java: Code Style: Formatter" in the main "Preferences" dialog, under "Windows: Preferences..." on the main menu (See Figure 2).
I encourage you to create your own profile rather than change the existing ones. To create a new profile, click on the "New..." button. In the "New Profile" dialog, enter the name of your profile in the "Profile name" field. Mine is "RobG". You can choose from any preexisting profiles to use as the basis for your new one. The "Eclipse [built-in]" one is what is used by default. Make sure the "Open the edit dialog now" checkbox is checked so that you can make your changes right away (See Figure 3).
After you hit the "OK" button you'll be greeted by the massive "Profile" dialog! It allows you to modify a multitude of coding styles. For me, the most important are the brace positions. I like to have all opening and closing braces that span more than one line to be aligned vertically. To accomplish this, select, the "Braces" tab and chose the "Next line" option from each dropdown except the last one (See Figure 4).
Click the "OK" button on this dialog and the "Preferences"one to accept the changes and set your new profile as the active one.
Set up the Package Structure
com.webreference.autocomplete package
Fig. 7: com.webreference.autocomplete package
As you may already be aware, in Java it's commonplace to organize project files in subdirectories called packages. For instance, in the Canadian government, we use "ca.gc.<branch>" as the base for all projects. It's also customary to use the company's domain name, such as "com.widgets.". In our project, we are using JSON utility classes which reside in the "org.json" package. For the purpose of this exercise, we'll house our Autocomplete text field classes in a package called "com.webreference.autocomplete".
To create the packages, right click on the "Java Resources" branch in the "Project Explorer" pane. That brings up a popup menu of one item: "New." Hover the mouse pointer over that to bring up the second popup, which contains the "Package" item (See Figure 5).
Click on "Package" to bring up the "New Java Package" dialog (See Figure 6).
Type the entire "com.webreference.autocomplete" package name in the "Name" textbox and click on "Finish" to create the package structure (Figure 7).
[next] |
Wiring Diagram For Terminal Block
Wiring diagram for terminal block Germantown wis. With motor wiring terminal block pn 281 530 users can wire a three phase with ground with a single block. This 6 mm terminal block accepts wire up to awg 12 with wago cage clamp The electric heater cord or the terminal connecting the cord to the heater can short circuit and fail company officials said friday. Drivers of vehicles with engine block heaters are asked not to use Germantown wi virtually eliminate on board led shadowing with wagos extremely compact 2059 series pcb terminal blocks. With a 2.7 mm high bright white profile the 2059 is the ideal connector for.
Wiring diagram for terminal block This can extend the functionality of select terminal blocks to help streamline boms stock and designs. The vertical jumper carries a 13.5 a500 v rating. The push in wire jumpers feature a 9 a800 v The weight of block is eqw eq. The velocity of block is eqdu v eq. The following figure shows the free body These terminal block models also offer horizontal vertical 45176 and 180176 orientations making them suitable for lighting.
Wiring diagram for terminal block When a reader named dan emailed me in february asking for help getting his late fathers prized small block chevy swapped Any wiring diagrams i show you will be for a standing pilot. Before we wire the system lets look at a gas valve figure 6. This is what the terminal block looks like on a 24 v standing pilot gas Cui terminal block connectors feature up to 24 pole counts and come available industrial controls and any wire to board.
Solution screw down and gas tight connections such as those seen in spring clamp and idc type terminal blocks with that wire or cable.quot ever need more than one wiring schematic for a large If we have a wiring diagram of the brain that could help us understand how make more fine scaled wiring maps using electron microscopy. Starting with a small block of brain tissue the Germantown wis.with motor wiring terminal block pn 281 530 users can wire a three phase line with ground with a single block. This 6 mm terminal block accepts wire up to awg 12 with wago cage.
It's possible to get or download caterpillar-wiring diagram from several websites. If you take a close look at the diagram you will observe the circuit includes the battery, relay, temperature sensor, wire, and a control, normally the engine control module. With an extensive collection of electronic symbols and components, it's been used among the most completed, easy and useful wiring diagram drawing program. Wiring Diagram For Terminal Block. The wiring diagram on the opposite hand is particularly beneficial to an outside electrician. Sometimes wiring diagram may also refer to the architectural wiring program. The simplest approach to read a home wiring diagram is to begin at the source, or the major power supply. Basically, the home wiring diagram is simply utilized to reveal the DIYer where the wires are.
If you can't locate the information, get in touch with the manufacturer. The info in the diagram doesn't indicate a power or ground supply. The intention of the fuse is to safeguard the wiring and electrical components on its circuit. A typical watch's basic objective is to tell you the good time of day. When selecting the best type of computer cable to fulfill your requirements, it is very important to consider your upcoming technology plans.
Installing a tachometer on your Vehicles can assist in preventing critical repair problems, however. You might have a weak ground issue. The way the brain learns is a subject that still requires a good deal of study. How it learns can be associated by how it is able to create memories.
In a parallel circuit, each unit is directly linked to the power supply, so each system gets the exact voltage. There are 3 basic sorts of standard light switches. The circuit needs to be checked with a volt tester whatsoever points. Wiring Diagram For Terminal Block. Each circuit displays a distinctive voltage condition. You are able to easily step up the voltage to the necessary level utilizing an inexpensive buck-boost transformer and steer clear of such issues. The voltage is the sum of electrical power produced by the battery. Be sure that the new fuse isn't blown, and carries the very same amperage.
Each fuse is going to have a suitable amp rating for those devices it's protecting. The wiring is merely a bit complicated. Our automotive wiring diagrams permit you to relish your new mobile electronics in place of spend countless hours attempting to work out which wires goes to which Ford part or component. Overall the wiring is really straight forward. There's a lot wiring that you've got to tie into your truck's wiring harness, but it's much easier to do than it seems. A ground wire offers short circuit protection and there's no neutral wire used. There's one particular wire leading from the distributor which may be used for the tachometer.
When you have just a single cable going into the box, you're at the close of the run, and you've got the simplest scenario possible. All trailer plugs and sockets are extremely easy to wire. The adapter has the essential crosslinks between the signals. Wiring a 7-pin plug on your truck can be a bit intimidating when you're looking at it from beyond the box.
The control box may have over three terminals. After you have the correct size box and have fed the cable to it, you're almost prepared to permit the wiring begin. Then there's also a fuse box that's for the body controls that is situated under the dash. Wiring Diagram For Terminal Block. You will find that every circuit has to have a load and every load has to have a power side and a ground side. Make certain that the transformer nameplate power is enough to supply the load that you're connecting.
The bulb has to be in its socket. Your light can be wired to the receiver and don't require supply additional capacity to light as it can get power from receiver. In the event the brake lights aren't working, a police officer may block the vehicle and issue a warning to create the repair within a particular time limit. Even though you would still must power the relay with a power source or battery. Verify the power is off before trying to attach wires. In case it needs full capacity to begin, it won't operate in any way.
Replacing thermostat on your own without a Denver HVAC technician can be quite harrowing if you don't hook up the wiring correctly. After the plumbing was cut out, now you can get rid of the old pool pump. It's highly recommended to use a volt meter to make sure there is no voltage visiting the motor, sometimes breakers do not get the job done properly, also you might have turned off the incorrect breaker. Remote distance is left up to 500m. You may use a superior engine ground. The second, that's the most frequently encountered problem, is a weak ground in the computer system. Diagnosing an electrical short can be extremely tough and costly.
1756-ob16e wiring diagram telephone terminal block wiring terminal block wiring for boat terminal blocks and strips high voltage transformer wiring diagram control wiring diagrams doche blocks wiring terminal block bus bar.
Give Your Comments!
Related Wiring Diagram
a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 |
3D Printable Graphene Oxide ink as a Bio Sensor
Biosensors are analytical devices that detect and quantify biological molecules or biomarkers by converting a biological response into a measurable signal.
3D Printable Graphene Oxide ink as a Bio Sensor
Graphene oxide (GO) ink-based biosensors are a promising platform for sensitive and selective detection of biological molecules and analytes. Here’s how graphene oxide ink is utilized as a biosensor:
Preparation of Graphene Oxide Ink: Graphene oxide ink is typically prepared by dispersing graphene oxide nanosheets in a solvent, such as water or organic solvents, to form a stable ink solution. The dispersion process may involve sonication, centrifugation, or chemical functionalization to ensure uniform dispersion and stability of graphene oxide nanosheets.
**Functionalization and Immobilization: **Biomolecules, such as antibodies, enzymes, DNA probes, or aptamers, are immobilized onto the surface of graphene oxide nanosheets through covalent or non-covalent interactions. The biomolecules act as the recognition elements that selectively bind to the target analyte.
**Sensing Mechanism: **Graphene oxide ink-based biosensors operate based on changes in the electrical, optical, or mass properties of graphene oxide nanosheets upon interaction with the target analyte. Binding of the analyte to the immobilized biomolecules leads to changes in the conductivity, fluorescence, or mass of the graphene oxide nanosheets, which can be measured and quantified.
Signal Transduction: The changes in graphene oxide properties are transduced into measurable signals using various detection techniques, such as electrochemical, optical, or mass-sensitive methods. These techniques enable sensitive and real-time detection of biological molecules with high specificity and selectivity.
**Applications: **Graphene oxide ink-based biosensors have diverse applications in biomedical diagnostics, environmental monitoring, food safety, and biotechnology. They can detect a wide range of analytes, including proteins, nucleic acids, enzymes, pathogens, toxins, and small molecules, with high sensitivity and specificity.
**Advantages: **Graphene oxide ink-based biosensors offer several advantages, including ease of fabrication, scalability, low cost, and compatibility with flexible substrates and printing techniques. They can be integrated into portable and wearable devices for on-site or point-of-care testing.
**Challenges and Future Directions: **Despite their promising features, graphene oxide ink-based biosensors face challenges related to stability, reproducibility, and integration into practical devices. Ongoing research focuses on addressing these challenges and exploring new functionalities, such as multiplexed detection, single-molecule sensing, and in vivo biosensing.
Conclusion:
Overall, graphene oxide ink-based biosensors represent a versatile and promising platform for sensitive, selective, and label-free detection of biological molecules and analytes, with potential applications in healthcare, environmental monitoring, and biotechnology. |
Email updates
Keep up to date with the latest news and content from Genome Biology and BioMed Central.
Open Access Research
Gene function and expression level influence the insertion/fixation dynamics of distinct transposon families in mammalian introns
Manuela Sironi1, Giorgia Menozzi1, Giacomo P Comi2, Matteo Cereda1, Rachele Cagliani1, Nereo Bresolin12 and Uberto Pozzoli1*
Author affiliations
1 Scientific Institute IRCCS E Medea, Bioinformatic Lab, Via don L Monza, 23842 Bosisio Parini (LC), Italy
2 Dino Ferrari Centre, Department of Neurological Sciences, University of Milan, IRCCS Ospedale Maggiore Policlinico, Mangiagalli and Regina Elena Foundation, 20100 Milan, Italy
For all author emails, please log on.
Citation and License
Genome Biology 2006, 7:R120 doi:10.1186/gb-2006-7-12-r120
Published: 20 December 2006
Abstract
Background
Transposable elements (TEs) represent more than 45% of the human and mouse genomes. Both parasitic and mutualistic features have been shown to apply to the host-TE relationship but a comprehensive scenario of the forces driving TE fixation within mammalian genes is still missing.
Results
We show that intronic multispecies conserved sequences (MCSs) have been affecting TE integration frequency over time. We verify that a selective economizing pressure has been acting on TEs to decrease their frequency in highly expressed genes. After correcting for GC content, MCS density and intron size, we identified TE-enriched and TE-depleted gene categories. In addition to developmental regulators and transcription factors, TE-depleted regions encompass loci that might require subtle regulation of transcript levels or precise activation timing, such as growth factors, cytokines, hormones, and genes involved in the immune response. The latter, despite having reduced frequencies of most TE types, are significantly enriched in mammalian-wide interspersed repeats (MIRs). Analysis of orthologous genes indicated that MIR over-representation also occurs in dog and opossum immune response genes, suggesting, given the partially independent origin of MIR sequences in eutheria and metatheria, the evolutionary conservation of a specific function for MIRs located in these loci. Consistently, the core MIR sequence is over-represented in defense response genes compared to the background intronic frequency.
Conclusion
Our data indicate that gene function, expression level, and sequence conservation influence TE insertion/fixation in mammalian introns. Moreover, we provide the first report showing that a specific TE family is evolutionarily associated with a gene function category. |
Arrow pointing right
Connect Airtable to Microsoft Teams like Magic
How to Use Magical to Transfer Data from Airtable to Microsoft Teams
Install Magical
Connect your apps with ease
Transfer Data from Airtable to Microsoft Teams: A Step-by-Step Guide
With Magical, you can transfer data from Airtable to Microsoft Teams in seconds – no complex integrations or code required. In this post, we'll discuss what Magical is, how to install it, and how to use Magical to transfer data from Airtable to Microsoft Teams, helping you streamline your workflow and optimize your team collaboration processes.
Get Magical for Free
More Airtable integrations with Magical
What Airtable data can you transfer
Magical enables you to transfer a wide array of data from Airtable to Microsoft Teams. Here are some examples of the information you can extract:
Record Name
Record ID
Created Time
Last Modified Time
And move more types of information by creating your own custom labels.
How to Transfer data from Airtable to Microsoft Teams using Magical?
Now that you have the Magical Chrome extension installed, let's discuss how to transfer data from Airtable to Microsoft Teams for more efficient team collaboration. Follow these steps:
1. Sign in to your Airtable account and open the base containing the data you want to transfer, such as record information and modification details.
2. In Airtable, label the information you want to transfer with Magical, like Record Name, Record ID, or Last Modified Time.
3. Sign in to your Microsoft Teams account and open the channel where you want to add the Airtable data.
4. Type "//" in an empty field and select the information you want to transfer from Airtable such as Record Name, Last Modified Time, etc.
5. The next time you fill out a record, Magical will automatically transfer all the fields into the form with one click.
About Airtable and Microsoft Teams
Efficient data transfer in team collaboration is crucial to maintaining productivity. Airtable is a powerful project management platform and Microsoft Teams is a robust team collaboration solution. Combining the capabilities of these two platforms can significantly enhance your team's productivity. By leveraging Magical, you can easily move information from Airtable to Microsoft Teams, allowing you to focus on your work and improving team collaboration.
Other ways to connect Airtable and Microsoft Teams
Using Zapier
Zapier provides a seamless connection between Airtable and Microsoft Teams, allowing for automatic data transfer between the two platforms without the need for coding. This integration offers a variety of triggers and actions, enabling you to automate workflows and save time
Using an API
An additional approach to integrate Airtable and Microsoft Teams is by directly utilizing their APIs. By integrating both APIs, you empower teams with real-time project insights, fostering improved communication and a superior team collaboration experience. To employ this method, refer to their respective API documentation.
Common questions
WHAT IS MAGICAL
Magical is a chrome extension that allows users to extract information from any website without complex integrations or APIs. You can run it on LinkedIn profiles and transfer data directly to Google Sheets. The extension is designed to simplify the process of data collection by automating the extraction of information from LinkedIn profiles. Magical is free, easy to use, and it can save you a lot of time and effort.
HOW TO INSTALL MAGICAL
To start using GetMagical, you need to install the chrome extension. Click the button below to install, or follow the steps to download directly from the Chrome web store.
Ready to save time with Magical?
Add to Chrome – it's free
Chrome Store · 4.6 stars · 2,620+ reviews |
Skip to main content
Advertisement
CubeSat quantum communications mission
Article metrics
Abstract
Quantum communication is a prime space technology application and offers near-term possibilities for long-distance quantum key distribution (QKD) and experimental tests of quantum entanglement. However, there exists considerable developmental risks and subsequent costs and time required to raise the technological readiness level of terrestrial quantum technologies and to adapt them for space operations. The small-space revolution is a promising route by which synergistic advances in miniaturization of both satellite systems and quantum technologies can be combined to leap-frog conventional space systems development. Here, we outline a recent proposal to perform orbit-to-ground transmission of entanglement and QKD using a CubeSat platform deployed from the International Space Station (ISS). This ambitious mission exploits advances in nanosatellite attitude determination and control systems (ADCS), miniaturised target acquisition and tracking sensors, compact and robust sources of single and entangled photons, and high-speed classical communications systems, all to be incorporated within a 10 kg 6 litre mass-volume envelope. The CubeSat Quantum Communications Mission (CQuCoM) would be a pathfinder for advanced nanosatellite payloads and operations, and would establish the basis for a constellation of low-Earth orbit trusted-nodes for QKD service provision.
Introduction
Quantum technologies are advancing at a rapid rate, with quantum key distribution (QKD) for secure communication being the most mature. Current fibre-based systems are best suited for short-range (a few 100 km) applications due to fibre attenuation restricting the maximum practical distance.Footnote 1 Free-space optical transmission is another option but limited sight lines and horizontal atmospheric density again restricts its range. Satellite-based QKD systems have been proposed for establishing inter-continental QKD links [1]. Feasibility of different aspects of the concept have been demonstrated by Earth-based experiments such as the transmission of quantum entanglement over 144 km [2], performing QKD from an aircraft to ground [3], ground to air [4], receiving single photons from retroreflectors in orbit [57] and other moving platforms [8, 9]. Various groups around the world are working towards space-based demonstrations of quantum communication [1014] but most have not been successfully launched. Only recently, the 600 kg Quantum Experiments at Space Scale (QUESS) Satellite was launched on 17 August 2016, at 17:40 UTC by the China National Space Agency [15, 16].
A barrier to experimental progress in this area has been the challenge of translating terrestrial quantum technology to the space environment, particularly in the context of the traditional “big-space” paradigm of satellite development and operations. This is characterized by large, long-term, high performance spacecraft with redundant systems following conservative design practice driven in part by the high cost of launch and satellite operations.Footnote 2 A new paradigm has arisen, “Micro-Space” as embodied in the CubeSat standard [17], that upturns the satellite development process. This approach exploits contemporary developments in miniaturization of electronics and other satellite systems to allow the construction and operation of highly capable spacecraft massing in the kilogram range, so-called nanosats.Footnote 3 In contrast, a geostationary communication satellite is typically 1000 times greater in mass. As cost of development, launch, and operations scales with mass, nanosatellites offer access to space at a vastly reduced cost that is affordable by small companies and research groups [18]. The CubeSat standard was itself originally designed with undergraduate engineering educational projects in mind. Since the establishment of the CubeSat standard in 2000, it has become a very popular class of satellite ranging from hobbyists [19], some countries first spacecraft [20], basic space science [21], to commercial services such as Earth imaging [22] and asset tracking [23]. The standardized nature of the CubeSat platform has attracted commercial support for components and subsystems. It is possible to order online all the parts needed to assemble a fully functional CubeSat including structures, power systems, communications, ADCS, control, as well as basic payloads such as imagers. CubeSats are being launched in great numbers with over 120 launched in 2015, and 118 in 2014, with the proportion of commercial, scientific, and governmental use now the majority [24] showing the transition from a purely educational tool to a valid applications platform (Figure 1).
Figure 1
figure1
CubeSat Launches. Since 2000, the rate of CubeSat launches has increased tremendously, especially in the last three years. The rate of university/educational CubeSat launches has been fairly steady, the recent growth has been driven by applications such as Earth observation and communications/tracking. Note: 2016 data incomplete.
The role of CubeSatsFootnote 4 for space quantum technologies is two-fold [25]: firstly in the short term for pathfinder, technology demonstration, and derisking missions; secondly in the long-term for service provision for certain applications. CubeSats are not a panacea but their advantages of lower-cost, shorter development times, rapid and multiple deployment opportunities may be valuable for making more rapid progress in space quantum technologies. The CubeSat Quantum Communications Mission (CQuCoM) has been proposed to achieve at low cost and development time the key milestone of transmission of quantum signals from an orbiting source to a ground receiver. The goals are to perform quantum key distribution and the establishment of entanglement between space and ground. The mission would also represent a leap in capability for nanosatellites, especially for pointing and for carrying fundamental physics experiments. It is an extremely challenging project that stacks a number of critical systems engineering fields, in particular the combination of extreme high pointing accuracy and subsequent ADCS requirements and interactions. We present the mission concept, the key challenges, and outline the systems to be developed to overcome them.
Mission CONOPS
The concept of operations (CONOPS) is presented in Figure 2. The basic task is to send quantum signals at the single photon level from an orbiting platform to a ground receiver. This paradigm was selected as it typically results in approximately 10 dB improvement in link loss when compared to the ground-to-space scenario. Two quantum sources are envisaged, a weak coherent pulse (WCP) source for performing a BB84-type QKD protocol, and an entangled photon pair source that would send one-half of each entangled photon pair to the ground receiver and retain for analysis the other half. The low-Earth orbit (LEO) reduces the losses due to range and simplifies space deployment, but introduces other challenges such as residual atmospheric disturbance. The major hurdle to overcome is the extremely high pointing accuracy required to minimize the link loss associated with free-space transmission over several hundred to a thousand kilometres.
Figure 2
figure2
Concept of Operations for CQuCoM. The CQuCoM 6U CubeSat would be deployed from the ISS into a circular low-Earth orbit. The ground track includes the Matera Laser Rangefinding Observatory operated by the University of Padua that would act as the optical ground station (OGS). The OGS would transmit a strong guide beacon at 532 nm allowing the CQuCoM CubeSat to acquire and begin tracking the target position. Rotating the entire satellite to point towards the OGS provides coarse pointing to sub-degree level, sufficient to bring the OGS beacon within the acquisition field of view of the beacon tracking sensor. The beacon tracker is co-aligned with the outgoing signal photons and allows precision determination of the transmit telescope boresight direction. The error signal from the beacon tracker is used to drive a fast-steering mirror to direct signal photons to the OGS. The fine-pointing system takes into account the velocity aberration with point-ahead correction. A quantum source on board the satellite provides single-photon level signals that are detected by the OGS. A switchable strong/weak coherent pulse source allows both the possibility of characterization of pointing performance and the free-space channel as well as quantum key distribution. An entangled-photon source would allow the distribution of entanglement between space and ground, one of the photon-pair is measured onboard and the results are compared with its respective partner detected on the ground.
The preliminary mission design calls for the launch of a 6U CubeSatFootnote 5 to the International Space Station (ISS). An advantage of CubeSats (shared by other smallsats) is that it is delivered to the launch provider in a standardized container (deployer) format, such as PPOD or IPOD, that greatly simplifies the process of integration of the smallsat with the launch vehicle [26]. Regular resupply launches to the ISS gives greater mission flexibility for satellite development and operation. Commercial launch brokers provide streamlined access to space, a 6U CubeSat can be launched within 6 months of contract signing and for USD545K [27]. Baselining the ISS as a deployment platform removes uncertainty about orbital parameters and eases mission planning.
CubeSat platform
The 6U platform was selected as it is the largest commonly handled CubeSat size whose cost/capability trade-off is favourable for many high-performance nanosatellite missions [28]. Several design studies have used 6U CubeSats for Earth observation as it can accommodate a reasonably large optical assembly together with ancillary payloads [2931]. Flown 6U missions include Perseus-M 1 & 2 (19th June 2014 DNEPR), VELOX-II (6th December 2015 PSLV) and 3CAT-2 (15th August 2016) demonstrating system qualification compliance. There are approximately 65 6U missions under development. The use of CubeSats is not restricted to Earth orbit. A pair of 6U satellites, Mars Cube One, are to be used as interplanetary relay stations for the Mars lander InSight originally due for launch in 2016 (now scheduled for 2018 due to problems unrelated to the CubeSats) [32], demonstrating the capability that can be packed into this format.
An advantage of the CubeSat approach is the availability of conventional off-the-shelf (COTS) components in order to reduce costs and development time. The CQuCoM CubeSat will be based upon the PICosatellite for Atmospheric and Space Science Observations (PICASSO) platform developed by Clyde Space Ltd [33]. Though PICASSO is a 3U CubeSat, its systems can be used in a 6U structure with little modification. The platform provides an electrical power system (EPS), communications (COMMS), attitude determination and control systems (ADCS), and an on-board computer (OBC). Integration of the payload with the platform would be performed using the NANOBED facility at the University of Strathclyde. We outline the key specifications of the CQuCoM platform below.
Structure
These systems would be placed into a 6U (nominal \(12\mbox{ cm}\times24\mbox{ cm}\times 36\mbox{ cm}\)) structure [34]. The CubeSat volumetric breakdown consists of 2U allocated to platform systems mentioned above, 1U to the quantum source, and 3U for the transmission optics (Figure 3). Suitable 6U structures are available from a variety of vendors such as Innovative Solutions in Space [35] and Pumpkin [36].
Figure 3
figure3
CQuCoM CubeSat Layout. One half of the structure is devoted to the transmission optics which includes a telescope, beacon tracker, beam steering, and optical interface with the quantum source. The platform systems (COMMS, ADCS, EPS, and OBC) are based upon the PICASSO 3U CubeSat developed by Clyde Space and VTT Finland for the Belgian Institute of Space Aeronomy and ESA. Body mounted solar panels would provide power to the EPS for storage and distribution. Communications would be handled by UHF, S-band, and X-band radio systems. The ADCS consists of Earth, Sun and star trackers, magnetorquers, and 3-axis momentum wheels. The OBC handles systems operations. Processing of data is performed in the mission computer as part of the entangled photon source (SPEQS-2) payload.
EPS
The satellite is powered by body-mounted solar panels that feed the EPS for storage and distribution of power. The low duty cycle of the transmission experiment eliminates the need for a deployable solar array reducing cost and complexity whilst increasing reliability. The lack of extraneous projected area also reduces the possibility of atmospheric buffeting. Orbit averaged power is 11 W assuming 80% sun-tracking efficiency. As transmission experiments are performed during eclipse, the EPS must be able to support the payload power draw using battery reserves alone. A 30 WHr lithium-ion battery pack has been sized to support mission operations with sufficient depth of discharge margin to prevent cell degradation from repeated experimental runs.
COMMS
Several radio systems are employed for (classical) communications. A UHF dipole array is used for tracking, telemetry, and control (TT&C) and provides redundancy for low-speed data transmission (100 kb/s). An S-band patch antenna is used for high-speed uplink (nominally 1 Mb/s). For high speed downlink of mission data, X-band CubeSat transmitters are commercially available and provide up to 100 Mb/s data rate [37]. A GPS patch antenna is also incorporated into a face of the CubeSat. Space-rated GPS systems enable tracking of position and velocity to metre and sub-m.s−1 accuracy respectively [38]. Onboard GPS enables precise orbital determination and calibration of two-line element measurements, necessary for the OGS to initially acquire the satellite and also for the ADCS to point the transmitter telescope towards the OGS to enable the optical beacon tracker (OBT) to lock onto the beacon sent up by the OGS.
OBC
The on-board computer is responsible for routine operations of the spacecraft. Low power space qualified processors and memory are available for CubeSats from a variety of vendors, typically based upon ARM devices and flash storage. The OBC will support different mission modes including initial switch-on and detumbling, charging, RAM attitude keeping, experiment, and data download modes. Failsafe modes including in-orbit reset will be included. A facility to update operational software is desirable as this allows experiments to be performed that were not envisaged prior to launch.
ADCS
The ADCS is used to provide coarse pointing by rotating the CubeSat body to align the transmitting telescope with the optical ground station during quantum transmission. The required level of ADCS accuracy has previously been challenging to achieve in nanosatellites due to a lack of high performance star trackers suitable for CubeSat applications. Only recently has there been commercial availability of such systems such as Blue Canyon Technologies XACT ACDS [39] with similar systems available from Maryland Aerospace [40] and Berlin Space Technologies [41]. In particular, the aforementioned BCT XACT ADCS system has demonstrated in-orbit pointing performance of 8 arcseconds (1-σ) on the MinXSS 3U CubeSat, this was independently verified by scientific instruments onboard. This level of pointing accuracy indicates that CubeSats can now seriously be considered for missions requiring precision pointing.
The PICASSO ADCS system upon which the CQuCoM satellite is based provides <1 pointing accuracy. A full system engineering analysis will determine whether this baseline level of pointing is sufficient for the CQuCoM mission, the BCT XACT platform is a viable alternative should higher accuracy coarse pointing be required. The ADCS utilizes a combination of sensors such as a 3-axis magnetometer to detect the strength and orientation of the Earth’s magnetic field, and angular rate sensors to measure the rotational velocity of the satellite. To establish absolute attitude, coarse and fine Sun sensors are used when sunlit but during eclipse, when experimental transmission occurs these sensors are ineffective. Instead, a high precision star tracker is used to provide accurate 3-axis pointing knowledge. Attitude control is through a combination of magnetic torque actuators (magnetorquers or MTQs) interacting with the Earth’s magnetic field, and reaction wheels. The MTQs are used for detumbling and for desaturating the reaction wheels.
Quantum sources and detectors
The CQuCoM proposal involves two missions with different quantum sources. The first mission will validate the transmission system. Numerical studies of the optical channel between space and ground predict a link loss of −30 or \(-40\mbox{ dB}\) for a spacecraft with a 10 cm aperture at 500 km altitude and a 1 m aperture at the optical ground station [9]. As CQuCoM will be at a lower altitude, it is imperative to establish first that the fine-pointing mechanism can overcome any residual atmospheric buffeting and greater traversal speed. The second mission would incorporate lessons learned from the first in performing the more challenging task of entanglement distribution.
Currently, the CQuCoM proposal calls for two sequential missions. It is possible, however, to consider the possibility of combining both missions into a single spacecraft. This will require the spacecraft to be able to supply more resources. For one, an increased volume for accommodating both types of light sources must be available. It also makes the optical interfaces more challenging.
Weak coherent pulse source
To conduct the space-to-ground test, the first mission will use a modulated laser transmitter whose intensity can be tuned to act either as a strong optical beacon, or as a weak coherent pulse (WCP) source, where the average number of photons per pulse is much less than one. When acting as the strong optical beacon, it is possible to use this light source to characterize the space-to-ground optical channel and to commission the fine-pointing mechanism [42]. When this is completed, the light source can be adjusted to become a polarisation-encoded WCP source that can carry out quantum key distribution using conventional prepare-and-send methods including decoy state protocols to prevent photon number splitting attacks.
WCP sources are well developed and have been miniaturized to fit within hand-held devices (\(35\times20\times8~\mbox{mm}^{3}\) [43]) and represents a low-risk quantum signal source for the first mission. A true random number generator (RNG) would be required to guarantee security but the 1U set aside for the source should give ample payload margin.Footnote 6 A baseline transmission rate of 100 MHz with 0.5 photons/pulse should allow the generation of secure keys during a ground pass, with the option of increasing the rate to overcome additional link losses [44].
Entangled source SPEQS
The second CQuCoM mission will attempt entanglement-based QKD. The use of quantum entangled photon pairs has certain technical advantages over the more conventional prepare-and-send schemes. For example, a true random number generator is not required for the source as the measurement of entangled photons generates intrinsic randomness. Another interesting advantage is that the photon pairs, generated in a nonlinear optical process are created within femtoseconds of each other and it is possible to carry out time-stamping and correlation matching without the use of atomic clocks or GPS-type signals [45]. Thus, entanglement-based systems in space have other interesting technology applications beside QKD.
The polarization-entangled source for CQuCoM is based on the Small Photon- Entangling Quantum System (SPEQS) currently designed and built at the National University of Singapore (NUS). The SPEQS devices, for the generation and detection of entangled photon pairs, are designed to be rugged and compact as it has to be contained within the size, weight and power (SWaP) constraints of nanosatellites [46]. A notable feature of SPEQS devices is that they appear to be incredibly rugged, with one copy surviving the explosion of a space launch vehicle intact and in good working order [47]. The first generation SPEQS devices have been space qualified, first through demonstration in near-space [48], then formal testing after integration into nanosatellites, and finally through successful operation in orbit on the Galassia 3U CubeSat [49, 50].
The polarization-entangled photon pairs are generated via spontaneous parametric downconversion (SPDC). The source geometry is based on collinear, Type-I, non-degenerate SPDC using bulk β-Barium Borate (BBO) crystals for downconversion. The advantages of BBO are that it is uniaxial and its optical properties (birefringence) are very temperature tolerant. The single photons are currently detected by silicon Geiger-mode avalanche photodiodes (Si-APDs). Careful characterization studies show that the Type-I geometry enables a very robust set of pump and collection conditions that simultaneously achieve high pair rate (brightness) and a high pair-to-singles ratio. The length of the crystals is an important consideration. With fixed pump and collection beam parameters, the dependence of brightness on crystal length falls into two different regimes (see Figure 4). A trade-off in the target brightness and size of the source needs to be made [51].
Figure 4
figure4
The collection efficiency of SPDC photons (pair-to-singles ratio), and the final brightness in the SPEQS geometry, for different crystal lengths. In this graph, the pump and collection beam FWHM were fixed at 180 micron and 120 micron respectively. The collection efficiency is quite stable across the range of crystal lengths. The dependence of brightness on crystal length, however, appears to lie in two different regimes. Additional work is ongoing to characterize this dependence and a model is being developed.
The entangled photon source that is being proposed for CQuCoM, called SPEQS-2, is currently being built at NUS and is expected to consume about 10 W of continuous power and to have a mass of about 500 g [52]. A separate qualification mission is being planned and the satellite mission and the SPEQS-2 detailed design specifications are described in an accompanying article [53].
Single photon detectors
Due to the large downlink transmission losses, achieving a high enough entangled pair coincidence rate between the OGS and the CubeSat requires a high pair-production rate onboard CQuCoM, consequently we need high-speed single photon counters. Si-APDs are baselined for the second mission but we would also investigate the use of more advanced solutions to allow for faster pair generation that could not be easily handled by conventional Si-APDs due to timing resolution, jitter, deadtime, or power limitations.
Geiger-mode APDs or single-photon avalanche diodes (SPADs) can also be implemented in complementary metal-oxide semiconductor (CMOS) technologies, where the detectors are replicated in very large numbers on a single CMOS chip [54] and even in stacked CMOS chips [55]. The advantage is to be able to detect single-photons with very high single-photon time resolution in multiple locations, so as to minimize the dead time of the measurement. Another advantage of parallel detection is the capability of implementing multiple channels and thus incrementing the throughput of free-space quantum communications channels using space-division multiple access (SDMA) mechanisms.
Thanks to Moore’s Law, it becomes possible to create complex digital signal processing on chip side-by-side with, or under the detectors, thus minimizing noise and jitter. Proximity of detection and processing maximizes compactness, while reducing power dissipation due to the lack of expensive and power-hungry drivers. This feature may be of significant value whenever power and space are in high demand, such as in satellites [56]. CMOS SPADs have also shown resilience to gamma radiation and proton bombardment at several energies and doses, thus proving their suitability for space applications [57, 58].
We have developed large linear arrays of SPADs with a diameter of several microns that exhibit a single photon timing resolution better than 100 ps and a dead time, individually, of several tens of nanoseconds [59]. The arrays are coupled with digital hardware including time-to-digital converters (TDCs) capable of resolutions better than 25 ps and recharge periods shorter than 7.5 ns. With these devices, it is possible to achieve overall deadtimes of several tens of picoseconds, while dissipating less than 100 mW. Thanks to parallelism of SPADs and TDCs, large throughputs of up to 34 Gb/s can thus be achieved, while generally only several Mb/s are exploited in single-photon communication.
Ground segment and optical ground station
Command and control of CQuCoM will be performed by a network of RF ground stations located in Glasgow (University of Strathclyde, mission control), Singapore (National University of Singapore), and Delft (TU Delft). The diversity of ground stations allows more frequent contact and greater opportunities for downlink of data. Mission control will also link with the OGS to co-ordinate experimental passes.
The CQuCoM satellite will transmit quantum signals (WCP or single photons) to an optical ground station located at the Matera Laser Ranging Observatory (MLRO), Italy. This facility has already conducted proof-of-principle quantum communication experiments utilizing laser signals bounced off retroreflectors mounted on existing satellites [60]. Essentially the same experimental setup will be used for the CQuCoM mission with the addition of an 532 nm optical beacon.Footnote 7 A radio link at the OGS will be used to communicate with and monitor the satellite during the experiments. The ADCS telemetry will be used to align the measurement bases by polarization control at the OGS.
Pass analysis
The baseline deployment from the ISS allows a preliminary determination of the orbital pass parameters for the selected OGS location of the MLRO. This is summarized in Figure 5, in a 12 month period, there are approximately 150 opportunities to conduct experimental operations between a satellite in the orbit of the ISS and OGS with an average pass duration of 6 minutes. We restrict transmission to night time when the satellite is also in eclipse to reduce background light entering the OGS receiver either from scattering of sunlight from the atmosphere or from reflected light off the satellite itself.
Figure 5
figure5
12 Month Pass Analysis of the ISS over MLRO. The distribution of durations for suitable passes over the OGS is shown. Passes were restricted to orbits rising at least 30 above the horizon and occurring in eclipse. The pass duration is counted as the time spent above 10 above the horizon though the actual time available for quantum transmission will be less than this.
As the CubeSat has a lower ballistic co-efficient and does not carry any propellent to maintain altitude, the orbit will change and diverge from that of the ISS (which performs periodic orbit raising burns). At the initial deployment altitude of 400 km, a slant range of 1000 km corresponds to minimum 23 elevation, so we restrict ourselves to passes that rise to at least 30 to allow sufficient time to perform initial acquisition and tracking. Passes that rise higher, and consequently for longer, will be used for transmission experiments. As the orbit of the CubeSat decays, pass opportunities and durations will reduce, though this will be partially compensated by the reduction in range leading to higher count rates at the OGS. We aim to perform experimental operations down to at least 300 km altitude, below which atmospheric drag will quickly deorbit the spacecraft. A minimum experimental lifetime of 12 months should be achievable based on deorbit analysis in Section 7.2.
OGS operations
At the beginning of the transmission pass, the OGS would use orbital data, either two-line elements or GPS tracking data from onboard the CubeSat, to initialize the lock-on phase of the experiment. The OGS then sends rangefinding pulses that are sent back by retroreflectors mounted on the CubeSat allowing for both accurate distance determination (at the centimetre level) and tracking the precise direction of the CubeSat.
Once the OGS has found the CubeSat in its field of view, it can baffle the region of sky seen by the detector to reduce background stray light. The OGS will also transmit a laser beacon towards the CubeSat to guide its fine-pointing system.
The range information is used for time-of-flight timing correction between the transmitted pulses with measurements on the ground. For the WCP source, its pulsed nature allows windowing of the detection periods to reduce extraneous counts. This is not possible for the continuously pumped entangled photon source so coincidence matching will be used to precisely align the time-bases of the CubeSat with the OGS.
The 800 nm wavelength of the quantum downlink allows the use of easily available Si-APDs for the OGS detectors. Moderate cooling is sufficient to reduce dark counts to negligible levels.
Optics and fine pointing
The main challenge of CQuCoM is the transmission of single photons from an orbital platform travelling at nearly 8 kms−1 to the OGS. The CubeSat dimensions restrict the size of the transmission optics and the low mass constrains the pointing stability of the craft.Footnote 8 The transmission telescope diameter of 90 mm will lead to a different beam divergence depending on the source [61]. A WCP source allows a nearly flat wavefront to be transmitted leading to a divergence of 4 μrad (HWHM) whilst the entangled photon pair source requires a 65 mm Gaussian beam waist to optimize diffraction against truncation loss and this leads to a divergence of 7.8 μrad. The ground spot size varies from 3.2 m (WCP source, Zenith) to 18 m (entangled source, 20 degrees above horizon) for an orbital altitude of 400 km leading to different geometric losses due to the finite collection aperture of the OGS. A fine-pointing specification of 3 μrad has been chosen to balance the pointing losses against developmental cost and effort. The gains from a smaller pointing error diminish as the inherent divergence of the beam and other effects dominate.
The required pointing accuracy will be achieved by combining coarse (ADCS) and fine (OBT/BSM) pointing stages. The CubeSat will use 3-axis ADCS via reaction wheels for coarse pointing to aim its telescope at the OGS to within the acquisition FoV of the OBT to lock onto the OGS 532 nm beacon laser. After initial lock, ADCS excursions up to the BSM FoV limit of several degrees can be accommodated.
Transmission optics
The restricted size of a 6U CubeSat structure constrains the maximum optical aperture than can be easily employed. The use of deployable optics is being investigated by several groups [6265] including at TU Delft with the Deployable Space Telescope project [66] together with TNO, ADS Leiden and ESA. However, a fixed optical system is attractive to minimize development risk. Planet employ 90 mm Cassegrain-type reflector telescopes on their Dove 3U CubeSat constellation, 133 have been launched as of May 2016 [67] thus demonstrating considerable flight heritage of this type of CubeSat optical system.Footnote 9
As a baseline, we allocate 2U to the transmission telescope and its basic specifications are Cassegrain-type, 90 mm diameter primary mirror, and \(f=1400\mbox{ mm}\) focal length. An athermal design can be used to minimize distortions due to temperature variations as the CubeSat moves into eclipse prior to any transmission experiment. The optical configuration will depend on the results of a trade-off study between manufacturing complexity/cost, optical performance, and compactness. Optical performance will depend on the ACDS coarse pointing accuracy that can be achieved as this drives the off-axis performance of the design to accommodate large BSM excursions. The combination of the optics, fine pointing and ADCS is an example of systems of systems engineering and this research would be an integral part of CQuCoM mission research and design.
Beacon tracker and beam steering
Incoming 532 nm beacon light sent from the OGS is separated from the outgoing beampath using a dichroic mirror, sent through an insertable narrow bandpass filter, to reduce stray light, and onward to the beacon tracker consisting of a modified star tracker.Footnote 10 During a frame, the defocussed image of the beacon is imaged onto a pixel array. The integration time is chosen to be short enough so that the image is not smeared. The deliberately defocussed point is spread across several pixels and the Gaussian intensity profile is determined from measurements of neighbouring pixels, a centroiding algorithm is then used to estimate the centre position of the beacon to sub-pixel accuracy. The accuracy by which this can be performed depends on the image signal to noise ratio (SNR) but better than \(\frac{1}{40}\)-pixel precision is achievable for moderate levels of noise and \(\frac{1}{20}\)-pixel for high levels of noise [68]. We will drive the OBT at a high frame rate (\({\sim}300\mbox{ Hz}\) full array readout, kHz with region-of-interest readout) in order to reduces the beacon frame interval and the possibility of image smear. To achieve sufficient SNR, the beacon power can be increased.
An attitude model for the satellite, with input from the OBT and high bandwidth inertial measurement units (IMUs), drives a beam steering mirror (BSM) for fine-pointing. Depending on the pass geometry and position of the satellite, the outgoing 800 nm beam needs to be sent in a slightly different direction to the apparent position of the beacon due to velocity aberration.Footnote 11 The magnitude of the point-ahead correction can reach up to 54 μrad when passing over zenith. The ADCS is also sent the OBT/BSM offset so that the coarse pointing error can be closed, bringing the telescope boresight towards the beacon direction and reducing the possibility of the BSM exceeding its excursion limits.
Pointing errors
Considering the interaction of the various sub-systems in determining pointing performance is a significant systems engineering challenge spanning all parties and disciplines. There are several potential sources of pointing error either leading to low frequency biases or high frequency noise in the transmitted beam direction. Low frequency drift will misalign the telescope bore axis from the OGS direction and if left unchecked could bring the deviation outside of the angular limits of the BSM. As long as the coarse pointing system can keep the optical boresight to within these limits, the final pointing performance will be determined mainly by the fine pointing mechanism. This will be mainly impacted by high frequency noise leading to jitter or beam wandering. A high optical OBT detection bandwidth is essential for rejecting this source of noise. Noise with higher frequency components than the OBT frame rate can be tackled by the IMUs and blended rate sensor fusion to compensate for any motion occurring in-between frames of the OBT [69, 70]. Quantum communication experiments have achieved a few μrad accuracy under demanding conditions such as in a propeller driven airplane [3] or lofted on a hot air balloon [8]. The more benign microgravity environment and lower vibrational background of a space-based experiment should allow at least as good performance and we consider residual effects that may affect pointing performance.
Solar pressure, residual magnetic moment, and gravity gradient
Even though the CubeSat is nominally in freefall and in a vacuum, it will be subject to external perturbations that can cause the beam to wander [71]. The relative magnitude of these forces depends on the orbital altitude. In LEO, the main effects will be due to residual atmospheric density, gravity gradient, and magnetic interactions. We may ignore the effect of solar radiation pressure as transmission experiments will be conducted in eclipse. The interaction of any residual magnetic moment of the satellite with the Earth’s field will cause a bias torque. The gravity gradient will produce a tidal force leading to a restoring torque aligning the satellite with its long axis in the nadir direction. Both magnetic dipole and gravity gradient effects can be minimized by careful design of the CubeSat. These quasi-static influences are easily compensated by the ADCS system and should have minimal effect on the fine-pointing mechanism.
Atmospheric buffeting
A source of random torque will be the effect of residual atmospheric density in low Earth orbit [72]. A CubeSat at this altitude experiences free-molecular flow and is potentially subject to buffeting, especially from cross-track winds at high latitudes [73]. The induced torque due to imbalanced forces can be minimized by locating the centre of gravity close to the centre of pressure when in the relevant orientation to reduce the moment arm. During the quantum transmission phase, the satellite is oriented to present the minimal projected area, i.e. the 2U-3U faces. The lack of deployable solar arrays is advantageous from this respect. Data from the MinXSS mission deployed from the ISS constrains the effect to below 50 μrad for the 3U CubeSat with deployables [39].
Vibration
The momentum wheels are a potential source of vibration than could affect the pointing accuracy of the beam steering system. A key development goal would be to characterize ADCS hardware bias off-sets and noise spectra to assist in performance modelling [74], e.g. using coloured noise instead of white noise normally assumed in most simulations and incorporating reaction wheel essential spin-axis instabilities that they may exhibit. TU Delft have experience with these challenges through their CubeSats projects Delfi-C3 and DelfiN3Xt. The BRITE CubeSat missions for photometry also require highly accurate and stable precision pointing systems and have studied the effect of ADCS vibration [75]. Through careful component selection and modelling, the effect of wheel imbalances can be minimized and in this way TUGSat-1 (BRITE-Austria) has achieved an in-orbit demonstration of 50 μrad using only body pointing and without beam steering [76, 77].
To minimise vibration and enhance spacecraft agility, the ADCS can be operated in a zero momentum mode where the speed of the wheels is low [78]. The operational procedure would be dump excess momentum using the MTQs prior to the transmission phase where the wheels are used to provide attitude control. This requires the use of micro-reaction wheels that can support this mode of operation, especially repeated zero-crossings.
Atmospheric scattering, absorption, and distortion
The passage of light through the atmosphere is subject to various effects that will reduce the intensity of the received signal. The main sources of error are scattering and absorption of light from the beam and beam wander due to turbulence. Scattering and absorption can be minimized by choice of wavelength and operating conditions. Light at 800 nm is transmitted through clear air with moderate absorption or scattering.Footnote 12 Cloud or other particulates will degrade the channels so clear conditions will be necessary for transmission experiments.
Wavefront distortion due to spatio-temporal variation of refractive index due to turbulence leads to beam wander,Footnote 13 the same effect that limits astronomical seeing. The shower curtain effect [79, 80] means that the beam wander for an orbit to ground transmission will be smaller that for a ground to space transmission for the same atmospheric turbulence [61]. Since the optical beacon and downlink photons take similar paths, separated by the velocity aberration angle, this will partially cancel out the effect of beam wander as long as the OBT detection and BSM bandwidth is greater than the timescale of the turbulence. The magnitude of the nearly common path rejection will depend on the size of the turbulent cells compared with the beam displacement between up and down-going beams which, at the top of the stratosphere, is a maximum of 3 m at zenith and reduces to zero as the satellite approaches the horizon.
An additional effect is dispersion of the different wavelengths of the beacon and downlink photons leading to angular differences as they pass through the atmosphere. This will lead to a quasi-static correction to the computed velocity aberration point-ahead of the downlink from the observed OBT position, but also variation in the respective deflections due to turbulence that will be more difficult to compensate. The static dispersion of \({\sim}4~\mu\mbox{rad}\) displacement between the upgoing 532 nm and downcoming 800 nm beams is greatest at low elevations [81]. A correction can be included with the point-ahead compensation.Footnote 14
Missions
CQuCoM calls for two missions, the first to derisk the pointing mechanism with a high brightness transmission source that can also be used for WCP QKD, and a second mission to distribute entanglement between space and ground. The mission profiles for both are broadly similar. A launch broker such as Nanoracks [82] will be contracted to handle orbital deployment.Footnote 15 The CQuCoM satellites will first be carried up to the ISS on a regular resupply mission (Dragon, Cygnus, HTV, ATV, Progress and Soyuz) and then deployed into orbit using the NanoRacks CubeSat Deployer (NRCSD) mounted upon the Japanese Experimental Module Remote Manipulator System (JEMRMS).
In-orbit operations
After switch-on and detumbling, the satellite will initiate basic housekeeping procedures such as charging the batteries, establishing contact with ground control, and monitoring onboard systems. The performance of the ADCS will be verified and tests of ground target tracking can be performed in daylight using the OBT imager with the narrow bandpass filter removed. An option for an adjustable defocus for the OBT will be investigated for imaging purposes as opposed to centroiding.
Initial night passes over the OGS will verify both satellite and beacon acquisition and tracking as well as the operation of the realtime telemetry downlink. The first mission with a tunable WCP source will allow sighting-in of the OBT/BSM, in particular to check that alignment of the incoming and outgoing beam paths have not deviated from that determined by pre-flight ground tests, e.g. by using a spiral search pattern of the BSM. For the second mission with the entangled source, it may still be possible to pick out the single photon flux from the satellite during a slow spiral pattern assuming small shifts in the boresight alignment. The results of the first mission will be vital in determining the effect of launch and orbital environmental conditions on the alignment.
Once the in-orbit optical system parameters have been calibrated, quantum transmission tests can begin. These will be conducted in eclipse (local night) when weather conditions are clear and the orbital track passes close enough to the OGS, rising at least 30 above the horizon. As the satellite begins to rise above the horizon, it will use ADCS to point the telescope towards the expected position of the OGS. Conversely, the OGS will track the satellite as it appears. Laser rangefinding pulses will provide precise position information for the OGS and it can begin transmitting the laser beacon. The satellite uses the beacon to operate the fine-pointing system. Once the OBT is locked onto the beacon, the source can start transmitting quantum signals to the OGS. Telemetry from the satellite to the OGS will transmit orientation information from the ADCS system allowing the alignment of the OGS polarization measurement bases with those being transmitted. The entanglement source has the option of actively adjusting its own polariser analysis settings based on onboard orientation information leaving the OGS settings fixed.
Synchronisation of CubeSat source and OGS receiver events can be performed via GPS timing signals and post-transmission processing using the ranging information determined from the retroreflected laser pulses. Synchronisation can also be performed through modulation of the beacon signal and a separate photodiode. To reduce the amount of information needed to be stored and transmitted by the CubeSat, the OGS can communicate detection events, only the corresponding onboard data (WCP random signal settings or detection events for the entangled source) in the temporal vicinity need be retained. The OGS detection rate (signal plus background and dark counts) will be in the range 103 s−1 to 104 s−1 due to channel losses and, in principle, only the coincident events need be processed or downloaded.
If the notification of OGS events is done in realtime to the CubeSat, either through the S-band uplink or laser beacon, this minimizes the total amount of onboard storage that needs to be provided.Footnote 16 However, for scientific purposes it would be beneficial to store the entire onboard record during a pass and download for ground analysis. Due to the high source rate, this will result in several GB of data that needs to be downlinked.Footnote 17 High speed X-band CubeSat transmitters are now commercially available and in use allowing large amounts of data to be downloaded from orbit. The company Planet reports 4.2 GB downloaded during a typical groundstation pass from 3U CubeSats using COTS communications equipment [83]. With 3 groundstations and several passes per station per day, the data generated from a single quantum transmission experiment should downloadable within a day. The S-band uplink can be used for post-quantum-transmission reconciliation and processing of the coincident event data, e.g. sifting, error correction, and privacy amplification, if required for QKD demonstration.
Decommissioning
Space debris is a major issue for any satellite mission and satellites should be designed to de-orbit within 25 years of launch [84] and by design CQuCoM should meet this directive. If an orbital altitude beyond 500 km is chosen, either due to launch opportunity or reduction in atmospheric buffeting, then meeting the 25 year de-orbit directive may require additional mechanisms, increasing mass, developmental effort, and cost. A deployment below 500 km simplifies the decommissioning task as the satellite will passively de-orbit in a relatively short period. A typical CubeSat deployed at the altitude of the International Space Station will have an orbital lifetime ranging from months to a few years.
In order to demonstrate the potential de-orbit period of a 10 kg 6U CubeSat, it is assumed that the CubeSat would be in minimum drag configuration (i.e. minimum projected area) and that the CubeSat would be launched from the ISS in Q1 of 2018. The method developed by Kerr and Macdonald [85] was used to calculate the de-orbit period and the results are presented in Figure 6. It can be seen that if the CubeSat were deployed at the maximum ISS altitude of 450 km, even in the case where cycles 25 and 26 are of very low intensity, the de-orbit period is approximately 11 years. However, in the case of an extended period of zero activity and deployment from 450 km, the CubeSat lifetime will exceed the 25 year best practice rule. In periods of low solar activity the ISS can maintain a lower altitude but in periods of high solar activity, a higher altitude is chosen to reduce drag. However an upper limitation on the orbit exists due to the operating limits of the spacecraft which rendezvous with the ISS. In practice, we would expect that during periods of low or no solar activity the ISS would be at the lower range of its altitude range and the 25 year de-orbit limit can be met.
Figure 6
figure6
Deorbit analysis for a 10 kg 6U CubeSat in minimum drag configuration. As atmospheric drag depends strongly on solar activity and consequent atmospheric expansion, we calculate orbital lifetimes for consecutive minimum (very low intensity, solar max of 140SFU), average (moderate intensity, solar max of 190SFU) or maximum (high intensity, solar max of 230SFU) solar cycles following the current solar cycle. An extended period of no solar activity, much like the Maunder Minimum event, is included for completeness. The representative solar cycles used herein were derived from historical solar cycle data. The ISS orbit varies and is periodically reboosted with orbit raising manoeuvres to combat orbital decay, the range of altitudes is indicated by the dashed horizontal lines and is derived from the standard operating altitudes of the ISS and are thus subject to change.
Conclusion and outlook
CubeSats offer the potential to accelerate the development of quantum technologies in space by offering reliable and cost-effective platforms for conducting in-orbit technology demonstrations. The cost-effectiveness of CubeSats is derived from the standard containers used to ship and deploy CubeSats. This has led to the ability to share launch costs between a large number of users. At the same time, advances in micro-electronics and RF communication have enabled many advanced experiments to be operable remotely, using only COTS components. Together, these advances have made in-orbit experiments accessible to university groups and consortia that were not space users, even a decade previously.
Some physical parameters, such as aperture-size and diffraction-losses, that are associated with optical systems are expected to become relatively more important requirement drivers of an experiment system design. However, this is an advantage as it means that from a systems engineering perspective, there is now greater flexibility in how to put together a space-based quantum experiment. With these positive developments, we can look forward to more nanosatellite sized experiments that act either as path-finders for more advanced experiments, or to actually execute the actual scientific experiments. The CQuCoM proposal combines the aforementioned advantages for advanced missions that are at the leading edge of small satellite capabilities.
CQuCoM Consortium
The CQuCoM consortium consists of:
• University of Strathclyde: Co-ordination, Mission Operations
• Austrian Academy of Sciences: Mission Planning, Scientific Oversight
• Clyde Space Ltd: Platform Engineering and Testing
• Technical University of Delft: Optical Design, ADCS Design and Algorithms
• Ludwig-Maximilian University: Fine-pointing system and WCP Source
• University of Padua: Optical Ground Station (MLRO), in collaboration with ASI - Italian Space Agency
• National University of Singapore: Entanglement Source and Data Handling
Notes
1. 1.
The development of quantum memories for quantum repeaters is a long-term solution to this short range but is far from maturity [86].
2. 2.
For example, Gravity Probe B cost USD750M and took over 50 years of development [87], whilst the Hubble Space Telescope cost USD4.7B to launch [88] and 20 years of development though these represent extreme examples of large space missions.
3. 3.
The zoology of satellite classes includes mediumsats (500-1000 kg) minisats (100-500 kg), microsats (10-100 kg), nanosats (1-10 kg), picosats (0.1-1 kg), and femtosats (\({<}0.1\mbox{ kg}\)) as well as large sats (\({>}1000\mbox{ kg}\)).
4. 4.
For the purposes of this article, we will use the terms CubeSat and nanosat interchangeably.
5. 5.
A 1-unit (1U) CubeSat is nominally a 10 cm cube of mass 1 kg. Several units can be combined to create CubeSats of greater mass, volume, and capability. Extensions to the standard allow for higher densities, up to 2 kg per U [34].
6. 6.
High speed quantum RNGs have been demonstrated with suitable SWaP characteristics. For example, in [89] random generation at 480 Mb/s was shown in a 0.1U package consuming a few watts, easily scalable to 846 Mb/s or even higher. A chipscale QRNG component operating at 1 Gb/s has been reported [90]. For testing purposes, a pseudo-RNG could be used, or else random settings could be pre-computed.
7. 7.
MLRO has a two-colour laser rangefinding system at 532 nm and 355 nm. This suggests utilising the existing 532 nm laser systems for the beacon and the 355 nm laser for rangefinding to avoid interference.
8. 8.
The MinXSS satellite has demonstrated 40 μrad (1-σ) coarse pointing performance after being deployed from the ISS [39].
9. 9.
The optical system of the Planet “flocks” of “doves” has been refined over several generations: PS0 features a 2 element Maksutov Cassegrain optical system paired with an 11 MP CCD detector. Optical elements are mounted relative to the structure of the spacecraft. PS1 features the same optical system as PS0, aligned and mounted in an isolated carbon fibre/titanium telescope. This telescope is matched with an 11 MP CCD detector. PS2 features a five element optical system that provides a wider field of view and superior image quality. This optical system is paired with a 29 MP CCD detector [91].
10. 10.
A quadrant photodiode has typically been used in other beam steering experiments, or alternatively a 2-D tetra-lateral Position Sensitive Device (PSD). A modified startracker approach was chosen to allow for lock-on capture over a large field-of-view to mitigate against ADCS coarse pointing performance shortfalls. This also gives the possibility of obtaining imagery from the CubeSat for independent testing of pointing performance.
11. 11.
The Doppler shift does not pose a problem for this mission. At ISS orbital speed of 7.67 kms−1 the maximum wavelength shift is 0.02 nm, much smaller than the 0.1 nm bandpass of ultra-narrow interference filters used for stray light rejection.
12. 12.
For example, 70% of light will be transmitted from space to sea level at 20 from zenith [92, 93].
13. 13.
As the beam is small, we are mainly concerned with wavefront tilt rather than higher order perturbations so more complex adaptive optics is not required.
14. 14.
The velocity aberration is maximal when the dispersion displacement is minimum at zenith, and vice versa near the horizon.
15. 15.
Spaceflight Industries [27] can broker deployment on a variety of launchers and in different orbits allowing for some flexibility on mission planning should the ISS orbit not be suitable.
16. 16.
E.g. a ring buffer could be used to temporarily store onboard signals or timing data and only coincident events would be copied out to main storage. In practice, a range of data around the OGS events would be copied out to guard against timing inaccuracies and to assist post-transmission analysis and synchronization.
17. 17.
For a 400 s quantum transmission pass (which is optimistic), a 100 MHz WCP source will require 1011 bits (\(4\times10^{10}\) signals and 4 bits/signal if using decoy states). For a 5 Mpcs continuously pumped entangled photon source, we require 20 bits timing information per detection event leading to \(4\times 10^{10}\) bits per pass. We thus assume 20 GB of onboard signal or timestamp data per pass.
References
1. 1.
Bacsardi L. On the way to quantum-based satellite communication. IEEE Commun Mag. 2013;51(8):50-5.
2. 2.
Ursin R, Tiefenbacher F, Schmitt-Manderbach T, Weier H, Scheidl T, Lindenthal M, Blauensteiner B, Jennewein T, Perdigues J, Trojek P, Ömer B, Fürst M, Meyenburg M, Rarity J, Sodnik Z, Barbieri C, Weinfurter H, Zeilinger A. Entanglement-based quantum communication over 144 km. Nat Phys. 2007;3(7):481-6.
3. 3.
Nauerth S, Moll F, Rau M, Fuchs C, Horwath J, Frick S, Weinfurter H. Air-to-ground quantum communication. Nat Photonics. 2013;7(5):382-6.
4. 4.
Pugh CJ, Kaiser S, Bourgoin J-P, Jin J, Sultana N, Agne S, Anisimova E, Makarov V, Choi E, Higgins BL, Jennewein T. Airborne demonstration of a quantum key distribution receiver payload. arXiv preprint. arXiv:1612.06396 (2016).
5. 5.
Villoresi P, Jennewein T, Tamburini F, Aspelmeyer M, Bonato C, Ursin R, Pernechele C, Luceri V, Bianco G, Zeilinger A, Barbieri C. Experimental verification of the feasibility of a quantum channel between space and Earth. New J Phys. 2008;10(3):033038.
6. 6.
Yin J, Cao Y, Liu S-B, Pan G-S, Wang J-H, Yang T, Zhang Z-P, Yang F-M, Chen Y-A, Peng C-Z, Pan J-W. Experimental quasi-single-photon transmission from satellite to Earth. Opt Express. 2013;21(17):20032-40.
7. 7.
Vallone G, Bacco D, Dequal D, Gaiarin S, Luceri V, Bianco G, Villoresi P. Experimental satellite quantum communications. Phys Rev Lett. 2015;115(4):040502.
8. 8.
Wang J-Y, Yang B, Liao S-K, Zhang L, Shen Q, Hu X-F, Wu J-C, Yang S-J, Jiang H, Tang Y-L, Zhong B, Liang H, Liu W-Y, Hu Y-H, Huang Y-M, Qi B, Ren J-G, Pan G-S, Yin J, Jia J-J, Chen Y-A, Chen K, Peng C-Z, Pan J-W. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nat Photonics. 2013;7(5):387-93.
9. 9.
Bourgoin J-P, Higgins BL, Gigov N, Holloway C, Pugh CJ, Kaiser S, Cranmer M, Jennewein T. Free-space quantum key distribution to a moving receiver. Opt Express. 2015;23(26):33437-47.
10. 10.
Morong W, Ling A, Oi DKL. Quantum optics for space platforms. Opt Photonics News. 2012;23:42-9.
11. 11.
Jennewein T, Grant C, Choi E, Pugh C, Holloway C, Bourgoin J, Hakima H, Higgins B, Zee R. The NanoQEY mission: ground to space quantum key and entanglement distribution using a nanosatellite. In: SPIE security + defence. 2014. 925402. International Society for Optics and Photonics.
12. 12.
Scheidl T, Wille E, Ursin R. Quantum optics experiments using the International Space Station: a proposal. New J Phys. 2013;15(4):043008.
13. 13.
Scheidl T, Ursin R. Space-QUEST. Quantum communication using satellites. In: Proceedings of the international conference on space optical systems and applications (ICSOS). 2012.
14. 14.
Elser D, Gunthner K, Khan I, Stiller B, Marquardt C, Leuchs G, Saucke K, Trondle D, Heine F, Seel S, Greulich P, Zech H, Gutlich B, Richter I, Meyer R. Satellite quantum communication via the Alphasat laser communication terminal-quantum signals from 36 thousand kilometers above Earth. In: 2015 IEEE international conference on space optical systems and applications (ICSOS). IEEE; 2015. p. 1-4.
15. 15.
Wu J, Sun L. Strategic priority program on space science. Space Sci Activities China. 2014;5:001.
16. 16.
China launches first-ever quantum communication satellite. http://news.xinhuanet.com/english/2016-08/16/c_135601026.htm (2016).
17. 17.
Heidt H, Puig-Suari J, Moore A, Nakasuka S, Twiggs R. CubeSat: A new generation of picosatellite for education and industry low-cost space experimentation. In: 14th annual/USU conference on small satellites (SSC00-V-5). 2000.
18. 18.
Shao A, Koltz EA, Wertz JR. Performance based cost modeling: quantifying the cost reduction potential of small observation satellties. In: AIAA reinventing space conference, AIAA-RS-2013-1003. Los Angeles, CA. 2013. p. 14-7.
19. 19.
Wuerl A, Wuerl M. Lessons learned for deploying a microsatellite from the International Space Station. In: Aerospace conference, 2015 IEEE. IEEE; 2015. p. 1-12.
20. 20.
Lätt S, Slavinskis A, Ilbis E, Kvell U, Voormansik K, Kulu E, Pajusalu M, Kuuste H, Sünter I, Eenmäe T, et al. ESTCube-1 nanosatellite for electric solar wind sail in-orbit technology demonstration. Proc Est Acad Sci. 2014;63(2):200.
21. 21.
Muylaert J, Reinhard R, Asma C, Buchlin J, Rambaud P, Vetrano M. QB50: an international network of 50 CubeSats for multi-point, in-situ measurements in the lower thermosphere and for re-entry research. In: ESA atmospheric science conference. Barcelona, Spain. 2009. p. 7-11.
22. 22.
Foster C, Hallam H, Mason J. Orbit determination and differential-drag control of Planet Labs CubeSat constellations. arXiv preprint. arXiv:1509.03270 (2015).
23. 23.
Sarda K, Grant C, Eagleson S, Kekez DD, Zee RE. Canadian Advanced Nanospace Experiment 2 orbit operations: two years of pushing the nanosatellite performance envelope. In: ESA small satellites, services and systems symposium. 2010.
24. 24.
Swartout M. CubeSat database. https://sites.google.com/a/slu.edu/swartwout/home/cubesat-database (2015).
25. 25.
Oi DKL, Ling A, Grieve JA, Jennewein T, Dinkelaker AN, Krutzik M. Nanosatellites for quantum science and technology. Contemp Phys. 2017;58(1):25-52.
26. 26.
Swartwout M. The first one hundred CubeSats: a statistical look. J Small Satell. 2014;2(2):213-33.
27. 27.
Spaceflight Industries. http://www.spaceflight.com/.
28. 28.
Tsitas SR, Kingston J. 6U CubeSat commercial applications. Aeronaut J. 2012;116(1176):189-98.
29. 29.
Turner CG. NPS TINYSCOPE program management. Technical report, DTIC document. 2010.
30. 30.
Agasid E, Rademacher A, McCullar M, Gilstrap R. Study to determine the feasibility of a Earth observing telescope payload for a 6U nano satellite. http://www.nsbe-hsc.org/cdst_feasability_report.pdf (2010).
31. 31.
Straub J, Fevig R, Borzych T, Church C, Holmer C, Hynes M, Komus A. From smallsat to 6U CubeSat: a case study in size and mass reduction. In: ACSER 6U CubeSat low cost space missions workshop. 2012.
32. 32.
Skrobot G. CubeSat missions to LEO and beyond. InSight (AV) 2, 2. 2016.
33. 33.
Mero B, Quillien KA, McRobb M, Chesi S, Marshall R, Gow A, Clark C, Anciaux M, Cardoen P, De Keyser J, Demoulin Ph, Fussen D, Pieroux D, Ranvier S. PICASSO: a state of the art CubeSat. In: 29th annual AIAA/US conference on small satellites (SSC15-III-2). 2015.
34. 34.
Hevner R, Holemans W, Puig-Suari J, Twiggs R. An advanced standard for CubeSats. 2011. DigitalCommons@USU.
35. 35.
ISIS: 6U structure. http://www.isispace.nl/cms/index.php/news/latest-news/120-introducing-the-isis-6u-structure (2010).
36. 36.
Pumpkin. Supernova 6U structure. http://space.skyrocket.de/doc_sdat/supernova-beta.htm (2015).
37. 37.
Syrlinks. Very high data rate transmitter in X-band for CubeSat and NanoSatellites. http://www.syrlinks.com/en/products/cubesats/hdr-x-band-transmitter.html (2015).
38. 38.
Kahr E, Montenbruck O, O’Keefe K, Skone S, Urbanek J, Bradbury L, Fenton P. GPS tracking on a nanosatellite the CanX-2 flight experience. In: 8th international ESA conference on guidance, navigation & control systems. Karlovy Vary, Czech Republic. 2011. p. 5-10.
39. 39.
Mason J, Baumgart M, Woods T, Hegel D, Rogler B, Stafford G, Solomon S, Chamberlin P. MinXSS CubeSat on-orbit performance and the first flight of the Blue Canyon Technologies XACT 3-axis ADCS. In: 30th annual AAIA/USU conference on small satellites. 2016.
40. 40.
Maryland Aerospace Industries. http://maiaero.com/.
41. 41.
Berlin Space Technologies. http://www.berlin-space-tech.com/.
42. 42.
Nauerth S. Air to ground quantum key distribution [dissertation]. LMU; 2013.
43. 43.
Mélen G. Integrated quantum key distribution sender unit for hand-held platforms [dissertation]. LMU; 2016.
44. 44.
Bourgoin J-P, Gigov N, Higgins BL, Yan Z, Meyer-Scott E, Khandani AK, Lütkenhaus N, Jennewein T. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations. Phys Rev A. 2015;92(5):052339.
45. 45.
Ho C, Lamas-Linares A, Kurtsiefer C. Clock synchronization by remote detection of correlated photon pairs. New J Phys. 2009;11(4):045011.
46. 46.
Cheng C, Chandrasekara R, Tan YC, Ling A. Space qualified nanosatellite electronics platform for photon pair experiments. J Lightwave Technol. 2015.
47. 47.
Tang Z, Chandrasekara R, Tan YC, Cheng C, Durak K, Ling A. The photon pair source that survived a rocket explosion. Sci Rep. 2016;6.
48. 48.
Tang Z, Chandrasekara R, Sean YY, Cheng C, Wildfeuer C, Ling A. Near-space flight of a correlated photon system. Sci Rep. 2014;4:6366.
49. 49.
Tang Z, Chandrasekara R, Tan YC, Cheng C, Sha L, Hiang GC, Oi DK, Ling A. Generation and analysis of correlated pairs of photons aboard a nanosatellite. Phys Rev Appl. 2016;5(5):054022.
50. 50.
Chandrasekara R, Tang Z, Tan Y, Cheng C, Sha L, Hiang G, Oi D, Ling A. Correlated photon pairs in low Earth orbit. In: SPIE security + defence. 2016. 99960. International Society for Optics and Photonics.
51. 51.
Septriani B, Grieve JA, Durak K, Ling A. Thick-crystal regime in photon pair sources. Optica. 2016;3(3):347-50.
52. 52.
Chandrasekara R, Zhongkan T, Chuan TY, Cheng C, Septriani B, Durak K, Grieve JA, Ling A. Deploying quantum light sources on nanosatellites I: lessons and perspectives on the optical system. In: Proc. SPIE 9615, quantum communications and quantum imaging XIII. 2015. 96150S.
53. 53.
Bedington R, Bai X, Truong-Cao E, Tan YC, Durak K, Zafra AV, Grieve JA, Oi DK, Ling A. Nanosatellite experiments to enable future space-based QKD missions. EPJ Quantum Technol. 2016;3(1):12.
54. 54.
Veerappan C, Charbon E. A low dark count pin diode based SPAD in CMOS technology. IEEE Trans Electron Devices. 2016;63(1):65-71.
55. 55.
Pavia JM, Scandini M, Lindner S, Wolf M, Charbon E. A \(1\times 400\) backside-illuminated SPAD sensor with 49.7 ps resolution, 30 pJ/sample TDCs fabricated in 3D CMOS technology for near-infrared optical tomography. IEEE J Solid-State Circuits. 2015;50(10):2406-18.
56. 56.
Charbon E. Single-photon imaging in complementary metal oxide semiconductor processes. Philos Trans R Soc, Math Phys Eng Sci. 2014;372(2012):20130100.
57. 57.
Maruyama Y, Blacksberg J, Charbon E. A \(1024\times8\) 700-ps time-gated SPAD line sensor for planetary surface exploration with laser Raman spectroscopy and LIBS. IEEE J Solid-State Circuits. 2014;49(1):179-89.
58. 58.
Charbon E, Carrara L, Niclass C, Scheidegger N, Shea H. Radiation-tolerant CMOS single-photon imagers for multiradiation detection. Technical report, CRC Press. 2010.
59. 59.
Burri S, Homulle H, Bruschini C, Charbon E. LinoSPAD: a time-resolved \(256\times1\) CMOS SPAD line sensor system featuring 64 FPGA-based TDC channels running at up to 8.5 giga-events per second. In: SPIE photonics Europe. 2016. 98990. International Society for Optics and Photonics.
60. 60.
Vallone G, Dequal D, Tomasin M, Vedovato F, Schiavon M, Luceri V, Bianco G, Villoresi P. Interference at the single photon level along satellite-ground channels. Phys Rev Lett. 2016;116:253601.
61. 61.
Bourgoin J, Meyer-Scott E, Higgins BL, Helou B, Erven C, Huebel H, Kumar B, Hudson D, D’Souza I, Girard R, Laflamme R, Jennewein T. A comprehensive design and performance analysis of low Earth orbit satellite quantum communication. New J Phys. 2013;15(2):023006.
62. 62.
Schwartz N, Pearson D, Todd S, Vick A, Lunney D, MacLeod D. A segmented deployable primary mirror for Earth observation from a CubeSat platform. In: 30th annual AAIA/USU conference on small satellites (SSC16-WK-3). 2016.
63. 63.
Andersen G, Asmolova O, McHarg MG, Quiller T, Maldonado C. FalconSat-7: a membrane space solar telescope. In: SPIE astronomical telescopes + instrumentation. 2016. 99041. International Society for Optics and Photonics.
64. 64.
Champagne J, Hansen S, Newswander T, Crowther B. CubeSat image resolution capabilities with deployable optics and current imaging technology. In: 28th annual AAIA/USU conference on small satellites (SSC14-VII-2). 2014.
65. 65.
Agasid E, Ennico-Smith K, Rademacher A. Collapsible space telescope (CST) for nanosatellite imaging and observation. In: 27th annual AAIA/USU conference on small satellites (SSC13-III-4). 2013.
66. 66.
Dolkens D. A deployable telescope for sub-meter resolutions from microsatellite platforms [dissertation]. TU Delft, Delft University of Technology; 2015.
67. 67.
Colton K, Klofas B. Supporting the flock: building a ground station network for autonomy and reliability. In: 30th annual AAIA/USU conference on small satellites (SSC16-IX-05). 2016.
68. 68.
Delabie T, Vandenbussche B, Schutter J. An accurate and efficient Gaussian fit centroiding algorithm for star trackers. In: AAS/AIAA space flight mechanics meeting. vol. 475. 2013.
69. 69.
Ortiz GG, Lee S, Alexander JW. Sub-microradian pointing for deep space optical telecommunications network. In: 19th AIAA int. comms satellite systems conf. Toulouse, France. 2001. p. 1-16.
70. 70.
Gutierrez HL, Gaines JD, Newman MR. Line-of-sight stabilization and back scanning using a fast steering mirror and blended rate sensors. In: Infotech@ aerospace 2011. 2011. 1659.
71. 71.
Udrea B, Nayak M, Ankersen F. Analysis of the pointing accuracy of a 6U CubeSat for proximity operations and RSO imaging. In: 5th international conference on spacecraft formation flying missions and technologies. Munich, Germany. 2013.
72. 72.
Lyle R, Stabekis P. Spacecraft aerodynamic torques. 1971. NASA SP-8058.
73. 73.
Garcia RF, Doornbos E, Bruinsma S, Hebert H. Atmospheric gravity waves due to the Tohoku-Oki tsunami observed in the thermosphere by GOCE. J Geophys Res, Atmos. 2014;119(8):4498-506.
74. 74.
Hegel D. Flexcore: Low-cost attitude determination and control enabling high-performance small spacecraft. In: 30th annual AAIA/USU conference on small satellites (SSC16-X-7). 2016.
75. 75.
Sanders DS, Heater DL, Peeples SR, Sykes JK. Pushing the limits of CubeSat attitude control: a ground demonstration. In: 27th annual AIAA/US conference on small satellites (SSC13-III-10). 2013.
76. 76.
Weiss W, Rucinski S, Moffat A, Schwarzenberg-Czerny A, Koudelka O, Grant C, Zee R, Kuschnig R, Matthews J, Orleanski P, Pamyatnykh A, Pigulski A, Alves J, Guedel M, Handler G, Wade GA, Zwintz K. BRITE-constellation: nanosatellites for precision photometry of bright stars. Publ Astron Soc Pac. 2014;126(940):573-85.
77. 77.
Sarda K, Grant CC, Zee RE. Three stellar years (and counting) of precision photometry by the BRITE astronomy constellation. In: 30th annual AAIA/USU conference on small satellites (SSC16-III-07). 2016.
78. 78.
Steyn W, Hashida Y. An attitude control system for a low-cost Earth observation satellite with orbit maintenance capability. In: 13th annual AAIA/USU conference on small satellites (SSC99-XI-04). 1999.
79. 79.
Yura H. Signal-to-noise ratio of heterodyne LiDAR systems in the presence of atmospheric turbulence. J Mod Opt. 1979;26(5):627-44.
80. 80.
Dror I, Sandrov A, Kopeika NS. Experimental investigation of the influence of the relative position of the scattering layer on image quality: the shower curtain effect. Appl Opt. 1998;37(27):6495-9.
81. 81.
Aoki W, Hełminiak K, Tajitsu A. Subaru telescope high dispersion spectrograph user manual v.2.0.0. 2014.
82. 82.
Nanoracks. http://nanoracks.com/.
83. 83.
Klofas B. Planet Labs ground station network. In: 13th annual CubeSat developers workshop. 2016. Cal Poly SLO. http://mstl.atl.calpoly.edu/~bklofas/Presentations/DevelopersWorkshop2016/.
84. 84.
Inter-agency space debris coordination committee. http://www.iadc-online.org/ (2015).
85. 85.
Kerr E, Macdonald M. A general perturbations method for spacecraft lifetime analysis. In: 25th AAS/AIAA space flight mechanics meeting. 2015.
86. 86.
Boone K, Bourgoin J-P, Meyer-Scott E, Heshami K, Jennewein T, Simon C. Entanglement over global distances via quantum repeaters with satellite links. Phys Rev A. 2015;91(5):052325.
87. 87.
Reich ES. Troubled probe upholds Einstein. J Mod Phys. 2011;2(4):210-8.
88. 88.
NASA: James Webb space telescope independent comprehensive review panel final report. NASA. 2010.
89. 89.
Shi Y, Chng B, Kurtsiefer C. Random numbers from vacuum fluctuations. Appl Phys Lett. 2016;109(4):041101.
90. 90.
Abellan C, Amaya W, Domenech D, Muñoz P, Capmany J, Longhi S, Mitchell MW, Pruneri V. Quantum entropy source on an InP photonic integrated circuit for random number generation. Optica. 2016;3(9):989-94.
91. 91.
Planet spacecraft operations and ground control ver.1.2, September 2015. https://www.planet.com/docs/spec-sheets/spacecraft-ops/.
92. 92.
Clark RN. Spectroscopy of rocks and minerals, and principles of spectroscopy. In: Rencz AN, editor. Manual of remote sensing, volume 3, remote sensing for the Earth sciences. New York: Wiley; 1999, p. 3-58.
93. 93.
MODTRAN. http://modtran.spectral.com/.
Download references
Acknowledgements
DKLO acknowledges QUISCO (Quantum Information Scotland Network). DKLO and AL received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement No.611014 (CONNECT2SEA-4). AL acknowledges support from the National Research Foundation Singapore (NRF-CRP12-2013-02). EC acknowledges support from the Swiss National Science Foundation.
Author information
Correspondence to Daniel KL Oi.
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ contributions
The original CQuCoM concept was conceived jointly by DO, AL, and SG. The other authors are involved either in the development of the mission concept, subsystems, or procedures. All authors read and approved the final manuscript.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Reprints and Permissions
About this article
Verify currency and authenticity via CrossMark
Keywords
• CubeSat
• quantum
• entanglement
• cryptography |
Cargando
Ir a contenido
X
Catálago de NETFLIX EEUU desde cualquier parte del mundo
OFERTA EXCLUSIVA
Ver Más! Si eres de los que usa NETFLIX y quieres tener acceso al catálago Estados Unidos sin tener que vivir allí, aquí tienes la mejor solución.
Ver qué proceso y quién está usando un archivo Linux
Tutorial para poder ver el listado de procesos y saber qué proceso está usando un archivo en Linux.
Escrito por abr 25 2019 11:55
El sistema operativo Linux ha sido desarrollado con una serie de procesos los cuales permiten que tanto las aplicaciones como los parámetros propios del sistema puedan correr sin problema según su respectiva tarea. Es necesario que comprendamos que cada proceso lleva a cabo una acción en especial, algunos procesos permitirán que nos conectemos a la red, otros harán posible que accedamos a programas, etc, de modo que si algo ocurre con un proceso puede perjudicar ciertas acciones a realizar sobre este. Los procesos son representados por aquellos programas que se están ejecutando y se identifican a través del PID o número de proceso que es asignado cuando se ejecuta o inicia.
En este tutorial te explicamos cómo establecer prioridades en los procesos de las distros Linux usando nice y renice.
Cuando diferentes usuarios pueden acceder al sistema, como es normal, puede suceder que alguno tenga abierto algún archivo e imposibilite que nosotros accedamos a dicho proceso. Otra cosa con la que debes contar es que si te nombramos “archivo” nuestra mente se imagina un documento de texto, una imagen, una hoja de cálculo, etc, pero en los sistemas operativos Linux un archivo va mucho más allá de este concepto ya que allí un archivo puede ser:
Tipos de archivos
• Un archivo de red
• Un archivo de bloque
• Un directorio
• Archivos especiales de caracteres
• Aplicaciones o programas y mucho más.
¿Ves que Linux cambia el modo de pensar los conceptos?, por ello es más que necesario que seamos capaces de comprender cómo acceder a estos archivos y procesos con el fin de visualizar que usuario lo tiene en ejecución en tiempo real y si es posible tomar las acciones necesarias según sea el caso.
Tutorial en el que explicamos qué es, para qué sirve y cómo descargar y utilizar el comando Whowatch en Linux paso a paso.
Solvetic te explicará a través de este tutorial como podemos realizar el proceso de visualizar los procesos y saber en detalle que usuario lo tiene abierto.
1. Usar el comando lsof para detectar el uso de archivos en Linux
El comando lsof es un comando integrado en Linux gracias al cual podemos obtener información sobre los archivos que se abren por procesos en el sistema, es decir, lsof se encarga de listar los ficheros abiertos en la distribución de Linux usada.
Para empezar a comprender su uso vamos a ejecutar la siguiente línea:
lsof /dev/null
El archivo /dev/null es un archivo especial el cual está en la capacidad de omitir la información que es escrita en el asimismo la información que es redireccionada hacia él.
Como resultado de esta orden, veremos detalles como:
• Comando usado
• PID del proceso
• Usuario activo
• Tipo de servicio
• Dispositivo
• Nodo usado
Desplegar solo procesos de un usuario
Como es natural que diversos usuarios estén actuando de forma simultánea, podemos aplicar un filtro para desplegar solo los procesos o archivos de un usuario en particular, por ejemplo el usuario “Solvetic”, para ello usaremos el parámetro -u de la siguiente forma:
lsof -u Solvetic
Como resultado encontramos detalles mucho más completos sobre dicho usuario en particular:
Mostrar detalles de un servicio de protocolo
Como lsof es un comando muy integral, si deseamos saber en detalle los procesos o servicios de un determinado protocolo, por ejemplo, TCP, ejecutaremos lo siguiente:
sudo lsof -i TCP
En caso de definir un puerto en particular debemos ejecutar lo siguiente:
sudo lsof -i TCP:80
Ver actividad de red actual
Para visualizar la actividad de red en tiempo real en Linux ejecutaremos la siguiente línea:
lsof -i
Validar servicios y puertos
Si el objetivo es validar los servicios y/y puertos que están escuchando debemos hacer uso de la siguiente línea:
lsof -i -nP
Ver archivos abiertos concretos
Si es requerido ver los archivos abiertos por un proceso o programa en específico la línea a usar será la siguiente:
lsof -c cupsd
Con el fin de observar los archivos que están abiertos en un directorio específico, debemos añadir el parámetro -D así:
sudo lsof +D /etc
Listar archivos por direccionamiento
Para listar los archivos en base al direccionamiento de Internet disponemos de las siguientes opciones:
lsof -i 4 (Direccionamiento IPv4)
lsof -i 6 (Direccionamiento IPv6)
2. Usar el comando ps para detectar el uso de archivos en Linux
Como administradores de Linux en muchas ocasiones debemos ver todos los procesos activos en ese momento. Esto puede ser por razones de tareas administrativas o de soporte, para visualizar los procesos en Linux basta con ejecutar el comando ps (process status):
Listar procesos iniciados desde shell
ps (esta opción solo lista los procesos que han sido iniciados desde el shell actual)
Acceder a detalles de todos los procesos
Si deseamos acceder a la información de todos los procesos, debemos añadir el parámetro -A así:
ps -A
Desplegar todos los procesos
Además de esto, podemos combinar los parámetros a, u y x de forma conjunta, ¿con cuál fin?, simple, desplegar todos los procesos que están siendo ejecutados para todos los usuarios de la distribución de Linux, así como información detallada como:
• El nombre de usuario del proceso
• La hora de inicio del proceso
• Carga de CPU del proceso
• Comando con el cual se inició el proceso
• TTY y más detalles
ps aux
Solvetic siempre te da los mejores consejos para que las labores de información y gestión sean lo más completas posibles y gracias a estas opciones podremos conocer los procesos y archivos abiertos en Linux.
Te mostramos diferentes comandos strace para solucionar problemas de procesos en Linux
AYUDA A MEJORAR ESTE TUTORIAL!
¿Crees que puedes corregir o mejorar este tutorial? Puedes enviar tu Edición con los cambios que consideres útiles.
0 usuarios han editado este tutorial. ¡Edita y conviértete en un reconocido experto!
Tutoriales Relacionados
Sin comentarios, sé el primero!
No esperes más y entra en Solvetic
Deja tus comentarios y aprovecha las ventajas de la cuenta de usuario ¡Únete!
10
VOTA
5
100%
4
0%
3
0%
2
0%
1
0%
Información
• Publicado abr 25 2019 11:55
• Visitas 4.9K
• Nivel
Avanzado |
Àñòðîíîìè÷åñêèé ïîðòàë www.galactic.name Óêðà¿íñüê³ ëåãåíäè Àñòðîíîìèÿ
www.galactic.name
Fri, 22 Sep 2023
Multilanguage
Astronomy Dnipro Ukraine - Facebook
Àñòðîíîìàì
Ñêà÷àòü
Àñòðîíîìè÷åñêèé ïîðòàë
"Èìÿ Ãàëàêòèêè" çàïóùåí â ñåíòÿáðå 2007 ãîäà. Åãî öåëü - ïîïóëÿðèçàöèÿ àñòðîíîìèè â ñàìîì øèðîêîì ñìûñëå.
Ìàëûé Êîíü (ñîçâåçäèå)
Ñìîòðèòå òàêæå - [ ïîëíûé ñïèñîê ñîçâåçäèé ]
Ìàëûé Êîíü (ëàò. Equuleus, Equ) — ìàëåíüêîå ñîçâåçäèå ñåâåðíîãî ïîëóøàðèÿ íåáà. Çàíèìàåò íà íåáå ïëîùàäü â 71,6 êâàäðàòíîãî ãðàäóñà, ñîäåðæèò 14 çâ¸çä, âèäèìûõ íåâîîðóæ¸ííûì ãëàçîì. Ýòè ñëàáûå çâåçäû íå îáðàçóþò íèêàêîé õàðàêòåðíîé ãåîìåòðè÷åñêîé ôèãóðû, êîòîðàÿ ìîãëà áû ïðèâëå÷ü âíèìàíèå.
Íàáëþäàåòñÿ â Óêðàèíå è íà âñåé òåððèòîðèè Ðîññèè. Ëó÷øèå óñëîâèÿ äëÿ íàáëþäåíèÿ - â àâãóñòå.
Ñîçâåçäèå Ìàëîãî Êîíÿ
Ñîçâåçäèå Ìàëîãî Êîíÿ
Èñòîðèÿ
Ââåäåíî Ãèïïàðõîì, âêëþ÷åíî â êàòàëîã çâ¸çäíîãî íåáà Êëàâäèÿ Ïòîëåìåÿ «Àëüìàãåñò» ïîä íàçâàíèåì «Ãîëîâà Êîíÿ».
Ãðå÷åñêèå ìèôû óïîìèíàþò äî÷ü Õèðîíà (Ãèïïà), ïðåâðàù¸ííóþ Ïîñåéäîíîì â ëîøàäü, ÷òîáû ñêðûòü îò îòöà å¸ áåðåìåííîñòü, à çàòåì â ýòîì âèäå óâåêîâå÷åííîé íà íåáå.
Äðóãàÿ âåðñèÿ — êîíü Êèëàð, âîçìîæíî, áðàò êðûëàòîãî Ïåãàñà, ïîäàðåííûé Ãåðìåñîì îäíîìó èç Äèîñêóðîâ.
Ìàëûé Êîíü (ñîçâåçäèå)
ù¸ëêíèòå ïî èçîáðàæåíèþ äëÿ åãî óâåëè÷åíèÿ
Ìàëûé Êîíü
Ëàò. íàçâàíèå
Equuleus
(â ðîä. ï.: Equulei)
Ñîêðàùåíèå Equ
Ñèìâîë Æåðåá¸íîê
Ïðÿìîå âîñõîæäåíèå îò 20h 50m äî 21h 20m
Ñêëîíåíèå îò +2° 00’ äî +12° 30’
Ïëîùàäü
72 êâ. ãðàäóñîâ
(87 ìåñòî)
ßð÷àéøèå çâ¸çäû
(âåëè÷èíà < 3m)
• íåò;
• ÿð÷àéøàÿ Êèòàëôà (α Equ) — 3,92m
Ìåòåîðíûå ïîòîêè
• íåò
Ñîñåäíèå ñîçâåçäèÿ
Ñîçâåçäèå âèäèìî â øèðîòàõ îò +90° äî -77°.
Ëó÷øåå âðåìÿ äëÿ íàáëþäåíèÿ - àâãóñò
Ñîçâåçäèå Ìàëîãî Êîíÿ èç Àòëàñà Uranographia ßíà Ãåâåëèÿ (1690)
Ñîçâåçäèå Ìàëûé Êîíü èç Àòëàñà "Uranographia" ßíà Ãåâåëèÿ (1690)
íàæìèòå íà èçîáðàæåíèå äëÿ åãî óâåëè÷åíèÿ
Ñîçâåçäèå Ìàëîãî Êîíÿ èç Àòëàñà Uranographia J. E. Bode (Áåðëèí 1801)
Ñîçâåçäèå Ìàëûé Êîíü èç Àòëàñà "Uranographia" J. E. Bode (Áåðëèí 1801)
íàæìèòå íà èçîáðàæåíèå äëÿ åãî óâåëè÷åíèÿ
Ñîçâåçäèå Ìàëîãî Êîíÿ
Ñîçâåçäèå Ìàëûé Êîíü èç Àòëàñà "Urania’s Mirror" (London, 1825)
Ìèôîëîãèÿ
Èñòîðèÿ ìèôîëîãèè ñîçâåçäèÿ Ìàëîãî Êîíÿ, âåðîÿòíî, ñâÿçàíà ñ ìèôàìè î êðûëàòîì êîíå Ïåãàñå, Ïåðñåå è ò.ä.
Î Ïåðñåå è Ïåãàñå ìèôîëîãèÿ ïîâåñòâóåò íå áåç âîëíåíèÿ. Öàðü Àðãîñà Àêðèñèé èìåë åäèíñòâåííóþ äî÷ü Äàíàþ, êîòîðàÿ ñâîåé êðàñîòîé è î÷àðîâàíèåì ìîãëà ñðàâíèòüñÿ òîëüêî ñ áåññìåðòíûìè áîãèíÿìè. Íî îðàêóë ïðåäñêàçàë Àêðèñèþ, ÷òî îí äîëæåí áóäåò óìåðåòü îò ðóêè ñâîåãî âíóêà - ñûíà Äàíàè. ×òîáû èçáåãíóòü òàêîé ó÷àñòè, Àêðèñèé ïîñòðîèë ãëóáîêî ïîä çåìëåé äâîðåö èç êàìíÿ è áðîíçû è çàêëþ÷èë â íåãî ñâîþ äî÷ü. Íèêòî íå èìåë äîñòóïà ê íåé, íèêòî íå ìîã åå óâèäåòü. Àêðèñèé íå çíàë, ÷òî âñåìîãóùèé Çåâñ î÷àðîâàí åãî äî÷åðüþ. È õîòÿ îíà áûëà ñêðûòà ïîä çåìëåé, Çåâñ ïðîíèê ê Äàíàå, ïðåâðàòèâøèñü â çîëîòîé äîæäü. Îò Çåâñà Äàíàÿ ðîäèëà ñûíà, êîòîðîìó äàëà èìÿ Ïåðñåé.
Ïîäðàñòàë Ïåðñåé â ïîäçåìíîì ÷åðòîãå, îêðóæåííûé íåóñòàííûìè çàáîòàìè è ëàñêàìè ñâîåé ìàòåðè. Îí áûë ðåçâûì ìàëü÷èêîì, è åãî âåñåëûé äåòñêèé ñìåõ ðàçíîñèëñÿ äàëåêî. Îäíàæäû Àêðèñèé óñëûøàë åãî. Òîò÷àñ ñïóñòèëñÿ îí â ïîäçåìíûé äâîðåö è óæàñíóëñÿ, óâèäåâ ìàëåíüêîãî ìàëü÷èêà. Îí äîãàäàëñÿ, ÷òî ýòî åãî âíóê - ñûí Äàíàè è Çåâñà. Âñïîìíèë Àêðèñèé ïðåäñêàçàíèå îðàêóëà, íî íå ïîñìåë óáèòü ñûíà Çåâñà. Ïîýòîìó îí ïðèêàçàë ñäåëàòü áîëüøîé äåðåâÿííûé ÿùèê ñ êðåïêîé êðûøêîé, ïîñàäèë â íåãî Äàíàþ è ìàëåíüêîãî Ïåðñåÿ, çàêîëîòèë êðûøêó êðåïêî-íàêðåïêî è ïðèêàçàë áðîñèòü ÿùèê â ìîðå.
Ìíîãî äíåé è íî÷åé âîëíû áåçáðåæíîãî ìîðÿ íîñèëè ïëåííèêîâ. Áóðè è óðàãàíû òî âçäûìàëè ÿùèê íàä âîëíàìè, òî îïóñêàëè â ìîðñêóþ ïó÷èíó, ïîêà, íàêîíåö, íå âûáðîñèëè åãî íà áåðåã îñòðîâà Ñåðèô â Ýãåéñêîì ìîðå. Òàì ðûáàê Äèêòèñ ëîâèë ðûáó áîëüøîé ñåòüþ. ßùèê çàïóòàëñÿ â ñåòè, è Äèêòèñ ñ áîëüøèì òðóäîì âûòàùèë åãî èç ìîðÿ. Êîãäà Äèêòèñ îòêðûë ÿùèê, îí îò óäèâëåíèÿ ÷óòü íå óïàë â îáìîðîê ïðè âèäå æåíùèíû, êðàñèâîé, êàê áîãèíÿ, êîòîðàÿ äåðæàëà â îáúÿòèÿõ øàëîâëèâîãî ìàëü÷èêà, ðàçìàõèâàþùåãî ðóêàìè è îãëàøàâøåãî ñâîèì áåççàáîòíûì ñìåõîì ìîðñêîé áåðåã.
Äèêòèñ îòâåë Äàíàþ è Ïåðñåÿ ê ñâîåìó áðàòó - öàðþ îñòðîâà Ïîëèäåêòó. Ïîñëå òîãî êàê Äàíàÿ ðàññêàçàëà åìó î ñâîåé ó÷àñòè, îí óñòðîèë èõ â ñâîåì ðîñêîøíîì äâîðöå. Òàì è âûðîñ Ïåðñåé è ïðåâðàòèëñÿ â ñòðîéíîãî è ñòàòíîãî þíîøó, êîòîðûé, êàê ÿðêàÿ çâåçäà, îòëè÷àëñÿ îò âñåõ äðóãèõ þíîøåé íà îñòðîâå Ñåðèô. Íèêòî íå ìîã ñðàâíèòüñÿ ñ íèì â ñèëå, ëîâêîñòè, ñìåëîñòè è óìåíèè ïîëüçîâàòüñÿ ëóêîì è êîïüåì.
Î÷àðîâàííûé ïðåëåñòüþ Äàíàè, öàðü Ïîëèäåêò ðåøèë ëþáîé öåíîé ïðèíóäèòü åå ñòàòü åãî æåíîé. Êàê íè ñòðàøèëàñü Äàíàÿ åãî ãíåâà, îíà âñå æå îòâåòèëà åìó îòêàçîì. Èñ÷åçëè ñ òåõ ïîð áåççàáîòíîñòü è ñìåõ Äàíàè. ×àñòî Ïåðñåé çàñòàâàë åå â ñëåçàõ.
Ïîíÿâ ïðè÷èíó, èç-çà êîòîðîé ñåðäöå ìàòåðè ðàçðûâàëîñü îò ìóê, Ïåðñåé îòïðàâèëñÿ ê öàðþ Ïîëèäåêòó è ïðåäóïðåäèë åãî, ÷òîáû îí áîëüøå íå áåñïîêîèë åãî ìàòü. Ðàçãíåâàëñÿ öàðü, íî íå îñìåëèëñÿ íè÷åãî ñêàçàòü Ïåðñåþ, ïîòîìó ÷òî áîÿëñÿ Çåâñà è íå õîòåë íàðóøàòü çàêîíû ãîñòåïðèèìñòâà. Îäíàêî ñ òåõ ïîð îí äåíü è íî÷ü äóìàë, êàê áû ïîãóáèòü Ïåðñåÿ. Îáäóìàâ âñå ñïîñîáû, ïîçâàë îí îäíàæäû Ïåðñåÿ è ñêàçàë åìó: "Ïðèêàçûâàþ òåáå ïðèíåñòè ãîëîâó Ìåäóçû Ãîðãîíû. Åñëè òû íà ñàìîì äåëå ñûí âñåìîãóùåãî Çåâñà, òåáå íå÷åãî áîÿòüñÿ îïàñíîñòåé, êàêèìè áîëüøèìè îíè áû íè áûëè. Âåëèêèé ãðîìîâåðæåö íå äîïóñòèò, ÷òîáû ïîãèá åãî ëþáèìûé ñûí".
Íå ïîäîçðåâàÿ, ÷òî öàðü Ïîëèäåêò ïîñûëàåò åãî íà âåðíóþ ãèáåëü, Ïåðñåé ñïîêîéíî îòâåòèë åìó: "ß èñïîëíþ òâîå æåëàíèå è ïðèíåñó òåáå ãîëîâó Ìåäóçû Ãîðãîíû".
Ãîðãîíû îáèòàëè äàëåêî-äàëåêî, íà ñàìîì çàïàäíîì êðàþ Çåìëè, â öàðñòâå áîãèíè Íî÷è è áîãà ñìåðòè Òàíàòîñà, òàì, êóäà íèêîãäà íå ïðîíèêàëè ëó÷è Ãåëèîñà. Ãîðãîíû áûëè ñòðàøíûìè ÷óäîâèùàìè. Èõ òåëà áûëè ïîêðûòû áëåñòÿùåé è òâåðäîé, êàê æåëåçî, ÷åøóåé, êîòîðóþ íåëüçÿ áûëî ðàçðóáèòü íèêàêèì ìå÷îì. Âìåñòî âîëîñ ó íèõ íà ãîëîâå âèëèñü çìåè, èçäàþùèå çëîâåùåå øèïåíèå, à èç ïàñòè òîð÷àëè îñòðûå, êàê íîæè, çóáû. Ëèöà ãîðãîí ñ íàëèâøèìèñÿ êðîâüþ ãëàçàìè áûëè íàñòîëüêî óæàñàþùèìè, ÷òî âñÿêèé, êòî èõ âèäåë, îò ñòðàõà ìãíîâåííî ïðåâðàùàëñÿ â õîëîäíûé êàìåíü.
Ñ øèðîêî ðàñêèíóòûìè êðûëüÿìè, áëåñòåâøèìè çîëîòèñòûìè ïåðüÿìè, ãîðãîíû âèëèñü â âîçäóõå, ãîòîâûå íàáðîñèòüñÿ íà êàæäîãî, êòî ïîïàäàë â èõ ñòðàíó. Îãðîìíûìè ìåäíûìè ëàïàìè îíè ðàçðûâàëè åãî íà ÷àñòè è ñ æàäíîñòüþ ïèëè åãî òåïëóþ êðîâü.
Íåëåãêèì áûëî ïîðó÷åíèå öàðÿ Ïîëèäåêòà. Ïåðñåþ íóæíî áûëî ñîâåðøèòü ïîäâèã, êîòîðûé áûë íå ïîä ñèëó íè îäíîìó ñìåðòíîìó, íî îí îòïðàâèëñÿ â ïóòü. Íåóæåëè âåëèêèé Çåâñ ïîçâîëèò ñâîåìó ëþáèìîìó ñûíó ïîãèáíóòü? Êîíå÷íî æå, íåò! Çåâñ òîò÷àñ ïîñëàë íà ïîìîùü Ïåðñåþ ñâîþ äî÷ü - âîèíñòâåííóþ áîãèíþ Àôèíó è áûñòðîãî, êàê ìûñëü, âåñòíèêà áîãîâ Ãåðìåñà. Àôèíà âðó÷èëà Ïåðñåþ áëåñòÿùèé ùèò, â êîòîðîì, êàê â çåðêàëå, îòðàæàëîñü âñå, à Ãåðìåñ äàë åìó ìå÷, êîòîðûé ìîã ðàññå÷ü äàæå ñàìîå ïðî÷íîå æåëåçî. Îí îáúÿñíèë Ïåðñåþ, êàê ìîæíî äîáðàòüñÿ äî ñòðàíû ãîðãîí.
È Ïåðñåé îòïðàâèëñÿ â äàëåêèé ïóòü. Ïðîøåë ìíîãî ñòðàí, âèäåë ðàçíûå ãîðîäà è ðàçëè÷íûõ ëþäåé è, íàêîíåö, ïîïàë â îäíó ìðà÷íóþ ñòðàíó. Òàì æèëè òðè Ãðàéè - áîãèíè ñòàðîñòè. Ó íèõ íà òðîèõ áûë òîëüêî îäèí çóá è îäèí ãëàç, êîòîðûìè îíè ïîëüçîâàëèñü ïî î÷åðåäè. Ïîêà ãëàç íàõîäèëñÿ ó îäíîé Ãðàéè, òîëüêî îíà ìîãëà âèäåòü è áûòü ïîâîäûðåì ó ñâîèõ ñëåïûõ ñåñòåð. Êîãäà îíà âûíèìàëà ãëàç, ÷òîáû ïåðåäàòü åãî äðóãîé ñåñòðå, âñå îíè íà êàêîå-òî âðåìÿ ñòàíîâèëèñü ñëåïûìè.
Òîëüêî òðè Ãðàéè çíàëè äîðîãó â ñòðàíó ãîðãîí è îõðàíÿëè òóäà ïóòü. Òðóäíî áûëî çàñòàâèòü èõ ïîêàçàòü ýòó äîðîãó, è Ïåðñåé çíàë îá ýòîì. Êîãäà îí ïðèøåë â ñòðàíó, ãäå æèëè Ãðàéè, îí èçäàëåêà äåòàëüíî ðàññìîòðåë, êàê ñåñòðû ïåðåäàâàëè ãëàç äðóã äðóãó. Ïîñëå ýòîãî îí â òåìíîòå íåçàìåòíî ïðèáëèçèëñÿ ê òðåì ñåñòðàì. Êàê òîëüêî îäíà èç íèõ âûíóëà ãëàç, ÷òîáû ïåðåäàòü åãî ñåñòðå, è âñå òðè ñåñòðû íà ìãíîâåíèå îêàçëèñü ñëåïûìè, Ïåðñåé ïîäñêî÷èë ê íèì è ñõâàòèë ãëàç. Óæàñíûé êðèê ðàñêîëîë âå÷íûé ìðàê. Îñòàâøèåñÿ áåç ãëàçà ñëåïûå ñåñòðû îñûïàëè Ïåðñåÿ ïðîêëÿòèÿìè è óìîëÿëè áîãîâ, ÷òîáû òå çàñòàâèëè Ïåðñåÿ âåðíóòü èì ãëàç. Íî Ïåðñåé íå èñïóãàëñÿ èõ óãðîç è ñïîêîéíî ñêàçàë ñåñòðàì: "Ïîêà-æèòå ìíå äîðîãó â ñòðàíó ãîðãîí è ÿ òîò÷àñ æå âåðíó âàì âàø ãëàç".
Òÿæåëûì áûë ýòîò âûêóï äëÿ ñåñòåð, íî îñòàâàòüñÿ âå÷íî ñëåïûìè äëÿ íèõ áûëî åùå ñòðàøíåå, è îíè áûëè âûíóæäåíû óêàçàòü Ïåðñåþ ïóòü â ñòðàíó ãîðãîí. Ïîñëå ýòîãî Ïåðñåé âîçâðàòèë èì ãëàç è íåìåäëåííî îòïðàâèëñÿ â äîðîãó.
Äîëãî øåë Ïåðñåé, ìíîãî òðóäíîñòåé ïðåîäîëåë îí íà ñâîåì ïóòè è ïðèøåë, íàêîíåö, â ñòðàíó íèìô. Îíè î÷åíü îáðàäîâàëèñü åãî ïðèõîäó, íî êîãäà Ïåðñåé ðàññêàçàë èì î öåëè ñâîåãî ïóòåøåñòâèÿ, îíè èñïóãàëèñü çà åãî ñóäüáó, òàê êàê äîðîãà ê öåëè èçîáèëîâàëà ìíîãèìè îïàñíîñòÿìè. Îíè âðó÷èëè åìó òðè ïîäàðêà: øëåì Àèäà - âëàäåòåëÿ ïîäçåìíîãî öàðñòâà: òîò, êòî íàäåâàë ýòîò øëåì, ñòàíîâèëñÿ íåâèäèìûì; êðûëàòûå ñàíäàëèè, â êîòîðûõ ÷åëîâåê ìîã ëåòàòü ïî âîçäóõó, è âîëøåáíûé ìåøîê, êîòîðûé ìîã óìåíüøàòüñÿ èëè óâåëè÷èâàòüñÿ òàê, ÷òîáû ïîìåñòèòü âñå, ÷òî ÷åëîâåê õîòåë â íåãî âëîæèòü.
Ïåðñåé ïîëîæèë ìåøîê íà ïëå÷î, íàäåë øëåì è âîëøåáíûå ñàíäàëèè è ïîì÷àëñÿ ïî âîçäóõó ê îñòðîâó ãîðãîí. Îí ëåòåë íàä Çåìëåé, à ïîä íèì îäíà äèâíàÿ êàðòèíà ñìåíÿëà äðóãóþ: ìåëüêàëè ïðîñòîðíûå çåëåíûå ðàâíèíû è ëóãà, íà êîòîðûõ ïàñëèñü îâöû è êîðîâû, ïðîíîñèëèñü ñåëåíèÿ è ãîðîäà, ïîñðåäè êîòîðûõ âîçâûøàëèñü áåëîìðàìîðíûå õðàìû, çåëåíåëè ìàñëèíîâûå ðîùè è ñèíåëè âåðøèíû ãîð. Ïîêàçàëîñü ìîðå, ñèíåå è áåçáðåæíîå, è òîëüêî êîå-ãäå ïîñðåäè ìîðÿ, êàê ÷åðíûå òî÷êè, âèäíåëèñü îñòðîâà. Ïåðñåé ëåòåë íàä ìîðåì è èñêàë âçãëÿäîì îñòðîâ ãîðãîí. Íàêîíåö, âäàëè, òàì, ãäå íåáî ñìûêàëîñü ñ ìîðñêîé øèðüþ, îí çàìåòèë åùå îäíó ÷åðíóþ òî÷êó, êîòîðàÿ âñå óâåëè÷èâàëàñü ïðè ïðèáëèæåíèè. Ýòî è áûë îñòðîâ ãîðãîí. Ïåðñåé íàïðàâèëñÿ ê íåìó è ñòàë êðóæèòü íàä îñòðîâîì. Âñêîðå îí çàìåòèë íà îäíîé ñêàëå îñëåïèòåëüíî ÿðêîå ïÿòíî. Îí ñïóñòèëñÿ ïîíèæå è ðàçãëÿäåë íà ñêàëå òðåõ ñïÿùèõ ãîðãîí: ýòî èõ ðàñêðûòûå êðûëüÿ áëåñòåëè â ëó÷àõ ñîëíöà. À íà ñêàëå ëåíèâî øåâåëèëèñü êëóáêè çìåé - âîëîñû íà ãîëîâàõ ãîðãîí. Ïåðñåé âûòàùèë èç íîæåí ìå÷, âçÿë ùèò è óæå áûë ãîòîâ îòðóáèòü ãîëîâó Ìåäóçû Ãîðãîíû. Íî êàêàÿ èç òðåõ ãîðãîí áûëà Ãîðãîíîé Ìåäóçîé? Âåäü çäåñü áûëè òðè ñåñòðû - Ñòåíî, Ýâðèàëà è Ìåäóçà, è âñå îíè áûëè ïîõîæè äðóã íà äðóãà, êàê òðè êàïëè âîäû. Íî èç íèõ òîëüêî Ìåäóçà Ãîðãîíà áûëà ñìåðòíîé, äâå æå åå ñåñòðû áûëè áåññìåðòíûìè.
Ïåðñåþ íåëüçÿ áûëî îøèáèòüñÿ, îí äîëæåí áûë óáèòü Ìåäóçó Ãîðãîíó è âìèã èñ÷åçíóòü. Åñëè îí íå óñïååò ñäåëàòü ýòîãî, âçãëÿä ëþáîé èç ãîðãîí ïðåâðàòèò åãî â êàìåíü. Ñìåðòåëüíàÿ îïàñíîñòü íàâèñëà íàä Ïåðñååì. È â ýòîò ñòðàøíûé ìîìåíò åìó íà ïîìîùü ïðèøåë áîã Ãåðìåñ è ïîêàçàë, êàêàÿ èç ãîðãîí - Ìåäóçà Ãîðãîíà. Êàê îðåë, áðîñèëñÿ Ïåðñåé íà ñïÿùóþ Ìåäóçó, íî çìåè íà åå ãîëîâå ïî÷óâñòâîâàëè ïðèáëèæåíèå ÷åëîâåêà, çàøåâåëèëèñü è íà÷àëè óãðîæàþùå øèïåòü. Çàøåâåëèëàñü ñëåãêà è ñàìà Ìåäóçà. Íî ïðåæäå ÷åì îíà îòêðûëà ñâîè çëîâåùèå ãëàçà è ïðåâðàòèëà Ïåðñåÿ â êàìåíü, îí, ãëÿäÿ íà åå îòðàæåíèå â ñâîåì ùèòå, îäíèì óäàðîì ìå÷à îòñåê åé ãîëîâó. Íå ãëÿäÿ íà ãîëîâó, îí áðîñèë åå â ìåøîê è, íåâèäèìûé â ñâîåì øëåìå, âçëåòåë âûñîêî â íåáî. Êàê òåìíàÿ ðåêà, ïîòåêëà êðîâü èç òåëà Ìåäóçû Ãîðãîíû è âìåñòå ñ êðîâüþ ïîÿâèëñÿ îòòóäà è êðûëàòûé êîíü Ïåãàñ, êîòîðûé òîæå ïîëåòåë â íåáåñíûå ïðîñòîðû.
Òåëî Ìåäóçû â ñóäîðîãàõ è êîíâóëüñèÿõ óïàëî ñî ñêàëû â ìîðå. Îãðîìíûå âîëíû ïîäíÿëèñü è ñ øóìîì ðàçáèëèñü î ñêàëèñòûå áåðåãà. Ïðîñíóëèñü äâå ñåñòðû Ìåäóçû, âçìàõíóëè ñâîèìè îãðîìíûìè êðûëüÿìè è ïîíåñëèñü â ïîãîíþ çà óáèéöåé, íî íè÷åãî íå óâèäåëè: íå áûëî íè îäíîé æèâîé äóøè íèãäå, íè íà îñòðîâå, íè â ìîðå.
Íåâèäèìûé â øëåìå Àèäà, Ïåðñåé óäàëÿëñÿ îò îñòðîâà ãîðãîí. Îí óæå ïåðåëåòåë ìîðå è ëåòåë íàä ïåñêàìè Ëèâèè. Èç ìåøêà, ãäå ëåæàëà ãîëîâà Ìåäóçû, êàïàëè êàïëè êðîâè è ïàäàëè íà ïåñîê. Èç ýòèõ êàïåëü ðîæäàëèñü ÿäîâèòûå çìåè, îáðàùàþùèå â áåãñòâî âñå æèâîå. Ýòè çìåè è ïðåâðàòèëè Ëèâèþ â ïóñòûíþ.
Òàê Ïåðñåé äîñòèã çàïàäíîãî êðàÿ Çåìëè, ãäå òèòàí Àòëàñ ïîääåðæèâàë íà ñâîèõ ïëå÷àõ íåáîñâîä.
 ïðîñòîðíûõ ïîëÿõ è ëóãàõ Àòëàñà ïàñëèñü ñòàäà è áðîäèëè áûêè.  åãî ñàäàõ ðîñëè ðàçëè÷íûå ïëîäîâûå äåðåâüÿ, è öåëûé ãîä òàì ìîæíî áûëî ñîáèðàòü ðàçíûå ñî÷íûå ïëîäû. Íî ñàìûì áîëûèì ÷óäîì áûëà ÿáëîíÿ ñ âåòêàìè è ëèñòüÿìè èç ÷èñòîãî çîëîòà, è äàæå ÿáëîêè íà íåé áûëè çîëîòûìè. Áîãèíÿ Ôåìèäà ïðåäðåêëà Àòëàñó, ÷òî îäíàæäû ê íåìó ïðèäåò ñûí Çåâñà è óêðàäåò çîëîòûå ÿáëîêè. Ïîýòîìó Àòëàñ î÷åíü áåñïîêîèëñÿ îá èõ ñîõðàííîñòè. Îí îãîðîäèë ñàä, ãäå ðîñëà ýòà ÿáëîíÿ, âûñîêèìè íåïðèñòóïíûìè ñòåíàìè, à ïåðåä åäèíñòâåííûì âõîäîì îñòàâèë çëîãî äðàêîíà, êîòîðûé íèêîãäà íå ñïàë è âñå âðåìÿ èçâåðãàë èç ïàñòè ÿçûêè îãíÿ. Ýòîò îãîíü ìîã ïðåâðàòèòü â ïåïåë ëþáîãî, êòî áû ðèñêíóë ïðèáëè-çèòüÿ ê äðàêîíó.
Ïðèëåòåâ âî âëàäåíèÿ Àòëàñà, Ïåðñåé ñêàçàë åìó, ÷òî îí ñûí Çåâñà, è ïîïðîñèë ïðèþòèòü åãî. Àòëàñ, âñïîìíèâ ïðåäñêàçàíèå Ôåìèäû, ïðîãíàë åãî èç ñâîåãî äîìà.
Ïåðñåé ðàçãíåâàëñÿ. Îí âûòàùèë èç ìåøêà ãîëîâó Ìåäóçû è, ñòàðàÿñü íå ñìîòðåòü íà íåå, íàïðàâèë åå âçãëÿä íà Àòëàñà.  òîò æå ìèã òèòàí ïðåâðàòèëñÿ â ãîðó. Åãî âîëîñû è áîðîäà ñòàëè ãóñòûìè íåïðîõîäèìûìè ëåñàìè, ïëå÷è è ðóêè ïðåâðàòèëèñü â îãðîìíûå ñêàëû, à ãîëîâà - â âûñîêóþ ãîðíóþ âåðøèíó, êîòîðàÿ ïîäíèìàëàñü ÷óòü íå äî íåáà. Ñ òåõ ïîð ãîðà Àòëàñ ïîääåðæèâàåò íåáîñâîä è âñå çâåçäû è ñîçâåçäèÿ íà íåì.
À Ïåðñåé â ñâîèõ êðûëàòûõ ñàíäàëèÿõ ïîëåòåë äàëüøå è ñ íåáåñíîé âûñîòû ðàçãëÿäûâàë âñþ Çåìëþ.
* * *
Ïî äðóãîìó âàðèàíòó ìèôà î Ïåðñåå, êàê òîëüêî îí îòðóáèë ãîëîâó Ìåäóçû, èç åå òóëîâèùà ïîÿâèëñÿ êðûëàòûé êîíü Ïåãàñ. Ïåðñåé òóò æå ñåë íà íåãî, è îíè óì÷àëèñü ñ îñòðîâà ãîðãîí.
Ãðå÷åñêàÿ ìèôîëîãèÿ ñâÿçûâàåò Ïåãàñà ñ ïîäâèãàìè ìíîãèõ ãåðîåâ. Îäíèì èç íèõ ÿâëÿåòÿ Áåëëåðîôîíò.
Ó áîãà âåòðîâ Ýîëà áûë ñûí Ñèçèô, êîòîðûé îñíîâàë ãîðîä Êîðèíô è äîëãîå âðåìÿ ïðàâèë â íåì. Ïîñëå åãî ñìåðòè öàðåì Êîðèíôà ñòàë åãî ñûí Ãëàâê, ó êîòîðîãî áûë ñûí Ãèïïîíîé, èëè Áåëëåðîôîíò,- îäèí èç ñàìûõ áîëüøèõ ãåðîåâ Ãðåöèè.
Åùå þíîøåé îí ñâîåé êðàñîòîé è ìóæåñòâîì íå óñòóïàë áåññìåðòíûì áîãàì. Íî Ãèïïîíîé íå ìîã îñòàâàòüñÿ â Êîðèíôå, òàê êàê âî âðåìÿ ñîñòÿçàíèé îí ñëó÷àéíî óáèë êîðèíôÿíèíà Áåëëåðà (îòñþäà è åãî âòîðîå èìÿ Áåëëåðîôîíò - óáèéöà Áåëëåðà) è áûë âûíóæäåí ïîêèíóòü ñâîé ðîäíîé ãîðîä. Îí îòïðàâèëñÿ â Òèðèíô ê öàðþ Ïðåòó. Òîò ïðèíÿë åãî ñ ïî÷åñòÿìè, êàêèå ïîëàãàëèñü òîëüêî ïðîñëàâëåííûì ãåðîÿì.
Ïëåíåííàÿ êðàñîòîé è ìóæåñòâîì Áåëëåðîôîíòà ñóïðóãà Ïðåòà - áîãîðàâíàÿ öàðèöà Àíòåÿ - âîñïûëàëà ëþáîâüþ ê þíîøå, íî Áåëëåðîôîíò îòâåðã åå ÷óâñòâà. Îáèæåííàÿ öàðèöà òàê ñèëüíî âîçíåíàâèäåëà þíîøó, ÷òî ðåøèëà ïîãóáèòü åãî ëþáîé öåíîé. Îäíàæäû, îáëèâàÿñü ñëåçàìè, îíà ðàññêàçàëà ñâîåìó ìóæó, ÷òî Áåëëåðîôîíò äîìîãàëñÿ åå è îñêîðáèë, è ïîýòîìó åãî íóæíî íåìåäëåííî óáèòü.
Ãíåâ è íåíàâèñòü âñïûõíóëè â ñåðäöå Ïðåòà, íî íå ìîã îí óáèòü Áåëëåðîôîíòà, òàê êàê áîÿëñÿ ðàçãíåâàòü Çåâñà - ïîêðîâèòåëÿ ãîñòåïðèèìñòâà. Ïîýòîìó îí ïîñëàë Áåëëåðîôîíòà ñ çàïå÷àòàííûì ïèñüìîì ê îòöó Àíòåè ëèêèéñêîìó öàðþ Èîáàòó, à â ïèñüìå ïèñàë, êàê êîâàðíî îáìàíóë è îñêîðáèë åãî Áåëëåðîôîíò, è óìîëÿë Èîáàòà íåìåäëåííî óáèòü åãî. Íî Èîáàò, ïðèíÿâ Áåëëåðîôîíòà êàê ñâîåãî ãîñòÿ, íå ïîñìåë óáèòü åãî, ÷òîáû íå íàâëå÷ü íà ñåáÿ ãíåâ Çåâñà. Ïîýòîìó îí ðåøèë ïîñëàòü åãî íà âåðíóþ ãèáåëü. Îí âîçëîæèë íà íåãî çàäà÷ó - óáèòü óæàñíîå ÷óäîâèùå Õèìåðó. Ðîæäåííàÿ îò Òèôîíà è Åõèäíû, Õèìåðà èìåëà òðè ãîëîâû - ðàçúÿðåííîãî ëüâà, êîçû è äðàêîíà. Òðè ïàñòè èçâåðãàëè îãîíü, è âñÿêèé, êòî òîëüêî ïðèáëèæàëñÿ ê Õèìåðå, âìèã ïðåâðàùàëñÿ â ãðóäó ïåïëà.
Ïîíÿë Áåëëåðîôîíò, êàêàÿ ñòðàøíàÿ îïàñíîñòü óãðîæàåò åãî æèçíè, åñëè îí âîçüìåòñÿ âûïîëíèòü ïîðó÷åíèå Èîáàòà, íî îí áåç ñòðàõà îòïðàâèëñÿ â ïóòü. Áåëëåðîôîíò çíàë, ÷òî îí ìîæåò óáèòü ñòðàøíóþ Õèìåðó òîëüêî â òîì ñëó÷àå, åñëè åìó óäàñòñÿ ïîéìàòü êðûëàòîãî êîíÿ Ïåãàñà. Åäèíñòâåííûì ìåñòîì, ãäå ìîæíî áûëî ïîéìàòü Ïåãàñà, áûëà âåðøèíà Àêðîêîðèíôà (õîëìà, íà êîòîðîì íàõîäèëñÿ àêðîïîëü â Êîðèíôå). Íà ýòîé âåðøèíå áûë èñòî÷íèê Ïîðåíà, è êàæäûé äåíü Ïåãàñ ïîäíèìàëñÿ òóäà, ÷òîáû óòîëÿòü æàæäó.
Äîñòèãíóâ èñòî÷íèêà Ïîðåíà, Áåëëåðîôîíò ñïðÿòàëñÿ ðÿäîì â êóñòàõ. Ïðèëåòåë Ïåãàñ è íà÷àë ïèòü ïðîçðà÷íóþ, êàê êðèñòàëë, ÷èñòóþ âîäó. Íî êàê òîëüêî Áåëëåðîôîíò ðàçäâèíóë êóñòû è íàïðàâèëñÿ ê êîíþ, Ïåãàñ âçìàõíóë ñâîèìè îãðîìíûìè ñíåæíî-áåëûìè êðûëüÿìè è âçâèëñÿ âûñîêî â íåáî. Ìíîãî äíåé è íî÷åé ïîäñòåðåãàë Áåëëåðîôîíò êðûëàòîãî êîíÿ, íî íèêàê íå ìîã åãî ïîéìàòü. Íàêîíåö, îí îáðàòèëñÿ ê ïðîðèöàòåëþ Ïîëèèäó, êîòîðûé ïîñîâåòîâàë åìó ëå÷ü ñïàòü ó ñàìîãî èñòî÷íèêà Ïîðåíà ðÿäîì ñ æåðòâåííèêîì Àôèíû Ïàëëàäû, òàì, ãäå îí â ïåðâûé ðàç óâèäåë Ïåãàñà. Áåëëåðîôîíò òàê è ñäåëàë. Âî âðåìÿ ñíà ÿâèëàñü åìó Àôèíà Ïàëëàäà è ñêàçàëà, ÷òî îí ïîéìàåò Ïåãàñà â òîì ñëó÷àå, åñëè ïðèíåñåò æåðòâó áîãó ìîðåé Ïîñåéäîíó è íàáðîñèò íà Ïåãàñà çîëîòóþ óçäå÷êó.
Ïðîñíóâøèñü, Áåëëåðîôîíò óâèäåë ðÿäîì ñ ñîáîé çîëîòóþ óçäå÷êó. Îí âçÿë åå è ñîòâîðèë ãîðÿ÷óþ áëàãîäàðñòâåííóþ ìîëèòâó âåëèêîé áîãèíå Àôèíå. Ïðèíåñ îí è æåðòâó áîãó Ïîñåéäîíó è ñòàë îæèäàòü ó èñòî÷íèêà. Ïðîøëî íåìíîãî âðåìåíè, è ïðèëåòåë Ïåãàñ íàïèòüñÿ âîäû. Êàê òîëüêî îí ñêëîíèëñÿ ê èñòî÷íèêó, Áåëëåðîôîíò óñåëñÿ íà íåãî âåðõîì, à êîãäà Ïåãàñ ïîäíÿë ãîëîâó îò âîäû, þíîøà áûñòðî íàáðîñèë íà íåãî çîëîòóþ óçäå÷êó. Ïåãàñ ñðàçó ñòàë ïîêîðíûì è óæå ëåòåë òóäà, êóäà íàïðàâëÿë åãî Áåëëåðîôîíò. Ïåãàñ îòíåñ åãî ê íåïðèñòóïíûì ãîðàì Ëèêèè, ãäå íàõîäèëîñü ëîãîâî Õèìåðû. Ïî÷óÿâ ÷åëîâåêà, âûëåçëà îíà èç ñâîåé áåðëîãè - îãðîìíîé òåìíîé ïåùåðû - è ñòàëà ÿðîñòíî èçâåðãàòü êëóáû ïëàìåíè, ñæèãàÿ âñå âîêðóã. Áåëëåðîôîíò æå îñòàëñÿ íåâðåäèìûì. Îí ëåòàë âûñîêî íàä íåé íà Ïåãàñå è îñûïàë ñòðåëàìè óæàñíîå ÷óäîâèùå. Ðàçúÿðåííàÿ Õèìåðà áèëàñü îá îñòðûå ñêàëû, ìåòàëàñü ñðåäè íåïðèñòóïíûõ ãîð è èçâåðãàëà èç ïàñòè âñå áîëåå ñèëüíûé îãîíü. Âñå âîêðóã ïðåâðàùàëîñü â ÷åðíûé ïåïåë. Õèìåðà áðîñàëàñü ñî ñêàëû íà ñêàëó, íî âûñîêî ëåòàë êðûëàòûé êîíü Ïåãàñ, è äîæäåì ñûïàëèñü íà åå òåëî ñòðåëû Áåëëåðîôîíòà. Íèêóäà íå ìîãëà óêðûòüñÿ Õèìåðà îò ýòèõ ñìåðòîíîñíûõ ñòðåë. Îäíà çà äðóãîé îíè ïðîíçàëè åå ñòðàøíûå ãîëîâû, è, íàêîíåö, ðóõíóëà Õèìåðà, êàê îãðîìíàÿ ñêàëà, áåçæèçíåííàÿ ñðåäè èñïåïåëåííûõ åå ïëàìåíåì ñêàë.
Äàëåêî ïî ñâåòó ðàçíåñëàñü ñëàâà Áåëëåðîôîíòà ïîñëå åãî ïîáåäû íàä óæàñíîé Õèìåðîé. Ñàì Èîáàò âîñõèùàëñÿ åãî ïîäâèãîì è ïîíÿë, êàêîãî ãåðîÿ îí ïðèíÿë â ñâîåì äâîðöå. Íî îí íå çàáûë î ïîðó÷åíèè Ïðåòà è ïîýòîìó ïîñûëàë Áåëëåðîôîíòà íà äðóãèå ïîäâèãè, íå ìåíåå îïàñíûå äëÿ åãî æèçíè. Îòîâñþäó Áåëëåðîôîíò âîçâðàùàëñÿ ïîáåäèòåëåì. Åãî âñòðå÷àëè ñ áîëüøèì òîðæåñòâîì, â åãî ÷åñòü óñòðàèâàëè ïèðøåñòâà. Íàðîä Ëèêèè îêðóæèë åãî ñëàâîé è ïî÷åòîì. Íî ñëàâà âñêðóæèëà ãîëîâó Áåëëåðîôîíòà: îí òàê âîçãîðäèëñÿ, ÷òî õîòåë ñðàâíÿòüñÿ âî âñåì ñ áîãàìè. Ðåøèë îí âçëåòåòü íà êðûëàòîì êîíå Ïåãàñå íà ñâåòëûé Îëèìï ê áîãàì, ÷òîáû îñòàòüñÿ æèòü ñðåäè íèõ. Òàêîå æåëàíèå ðàçãíåâàëî Çåâñà. È êîãäà Áåëëåðîôîíò îñåäëàë Ïåãàñà è ïîëåòåë íà íåì ê. âûñîòàì Îëèìïà, Çåâñ ïîðàçèë Ïåãàñà áåøåíñòâîì, è êîíü ñáðîñèë ñåäîêà íà Çåìëþ. Ïðè ïàäåíèè Áåëëåðîôîíò ëèøèëñÿ ðàçóìà è, áåçóìíûé, äîëãî áëóæäàë â "Äîëèíå ñêèòàíèé". Èñòîùåííûé, îáîäðàííûé äî êðîâè êîëþ÷èìè êóñòàìè, áåñïîìîùíûé Áåëëåðîôîíò óïàë â ãëóáîêóþ ÿìó. Òóäà ïðèëåòåë íà ÷åðíûõ êðûëüÿõ ëåäåíÿùèé áîã ñìåðòè è âûðâàë åãî äóøó. Òàê ïðîñëàâëåííûé ãåðîé Áåëëåðîôîíò ñïóñòèëñÿ â ïîäçåìíîå öàðñòâî òåíåé.
* * *
Êðûëàòûé êîíü Ïåãàñ ñòàë ñèìâîëîì ïîýòè÷åñêîãî òâîð÷åñêîãî âäîõíîâåíèÿ. Êàæäóþ âåñíó è ëåòî íà ñêëîíàõ ïîðîñøåãî ãóñòûìè ëåñàìè Ãåëèêîíà, òàì, ãäå òàèíñòâåííî æóð÷àò ñâÿùåííûå âîäû Èïïîêðåíû, íà âûñîêîì Ïàðíàñå îêîëî êðèñòàëüíî ÷èñòûõ âîä Êàñòàëüñêîãî êëþ÷à áîã Àïîëëîí ïðåäâîäèòåëüñòâóåò òàíöàìè äåâÿòè ìóç. Ïðåêðàñíûå è âå÷íî þíûå ìóçû, äî÷åðè Çåâñà è áîãèíè ïàìÿòè Ìíåìîçèíû, áûëè ïîñòîÿííûìè ñïóòíèöàìè Àïîëëîíà. Îí àêêîìïàíèðîâàë èõ ïåñíÿì íà ñâîåé çîëîòîé ëèðå, è îò ýòèõ ïåñåí êà÷àëèñü ãîðû. Çàêà÷àëàñü è ãîðà Ãåëèêîí, íî áîã Ïîñåéäîí ïðèêàçàë, ÷òîáû îíà áûëà òîò÷àñ æå óñïîêîåíà. È îäíèì óäàðîì êîïûòà Ïåãàñ ïðåêðàòèë êà÷àíèå ãîðû Ãåëèêîí. Íà òîì ìåñòå, ãäå Ïåãàñ óäàðèë êîïûòîì, ïðîáèëñÿ èñòî÷íèê Èïïîêðåíû (èñòî÷íèê êîíÿ) - èñòî÷íèê ìóç - âäîõíîâèòåëüíèö è ïîêðîâèòåëüíèö ïîýçèè, èñêóññòâ è íàóêè. Ìóçû ïåëè è òàíöåâàëè è íà âåðøèíå Ïàðíàñà, ó ïîäíîæèÿ êîòîðîãî íàõîäèëñÿ âîëøåáíûé Êàñòàëüñêèé êëþ÷. Òîìó, êòî èìåë ñ÷àñòüå ïèòü âîäó èç ýòîãî êëþ÷à, ìóçû äàðèëè ïîýòè÷åñêîå âäîõíîâåíèå è òâîð÷åñêèå ñèëû, íå îñòàâëÿâøèå ÷åëîâåêà â òå÷åíèå âñåé åãî æèçíè. Íî äîáðàòüñÿ äî ýòîãî èñòî÷íèêà ìîæíî áûëî òîëüêî ñ ïîìîùüþ êðûëàòîãî êîíÿ Ïåãàñà, òàê êàê âîëøåáíûé êëþ÷ íàõîäèëñÿ âûñîêî íà Ïàðíàñå. Òàê, âûðàæåíèå "îñåäëàòü Ïåãàñà" ñòàëî ñèìâîëîì òâîð÷åñêèõ ñèë è âäîõíîâåíèÿ.
http://www.prao.ru/Constellations/mif/persey.html
* * *
Åñëè ýòî ñîçâåçäèå äåéñòâèòåëüíî ýêâèâàëåíòíî ãðå÷åñêîìó ñîçâåçäèþ Ëîøàäü, êàê ïðèíÿòî ñ÷èòàòü, òî ñ íèì ñâÿçàíà ñëåäóþùàÿ èñòîðèÿ.
Ýîë - èëè áîã âåòðîâ, èëè ñûí Ýëëèíà - ñîáëàçíèë äî÷ü Õèðîíà, ïðîðî÷èöó Òåþ. Òåÿ áûëà ñïóòíèöà Àðòåìèäû íà åå îõîòàõ, à Àðòåìèäà, áîãèíÿ-äåâñòâåííèöà, âåñüìà ñòðîãî îòíîñèëàñü ê íðàâñòâåííîñòè ñâîèõ ïî÷èòàòåëüíèö. Ïîýòîìó Òåÿ, õîòÿ è îïàñàëàñü ãíåâà îòöà, íî áîÿëàñü îáðàòèòüñÿ çà ïîêðîâèòåëüñòâîì ê áîãèíå.
Ýîëà è Òåþ âûðó÷èë Ïîñåéäîí, âðåìåííî ïðåâðàòèâøèé Òåþ â ëîøàäü. Êîãäà òà îæåðåáèëàñü Ìåëàíèïïîé, îí ïðåâðàòèë æåðåáèöó â äåâî÷êó, à ìàòåðèíñêèé îáðàç ïîìåñòèë íà íåáî â âèäå ñîçâåçäèÿ. Ìåëàíèïïó, ïåðåèìåíîâàííóþ â Àðíó, âçÿë íà âîñïèòàíèå íåêèé Äåñìîíò. Õèðîí òàê è îñòàëñÿ â íåâåäåíèè.
Èñòîðèÿ Àðíû è Ïîñåéäîíà ïðîäîëæèëàñü, íî ýòî - äðóãàÿ èñòîðèÿ.
Àëüòåðíàòèâíàÿ âåðñèÿ - äî÷ü Õèðîíà áûëà ïðåâðàùåíà â ëîøàäü çà íåóìåñòíûå ïðîðî÷åñòâà è ïîëó÷èëà èìÿ Ãèïïèÿ.
Ãèãèí çàìå÷àåò, ÷òî ñîçâåçäèå ðàñïîëîæåíî òàê (ïî÷òè òî÷íî â ïðîòèâîïîëîæíîé òî÷êå íåáåñíîé ñôåðû), ÷òî Öåíòàâð - ÷èòàé, Õèðîí - íå ìîæåò åãî òîëêîì ðàçãëÿäåòü - è ýòî íåñïðîñòà! Äà è èçîáðàæåíà â ñîçâåçäèè òîëüêî ãîëîâà æèâîòíîãî, è ïîòîìó ïîë åãî îñòàåòñÿ çàãàäêîé.
Äðóãàÿ âåðñèÿ ïðèâîäèò íàñ â äðåâíèå Àôèíû, òîãäà åùå íè êàêèå íå Àôèíû, à íîâûé ãîðîä, âûáèðàâøèé ñåáå ïîêðîâèòåëÿ, èëè ïðîñòî íàíîâî îáæèâàåìàÿ òåððèòîðèÿ. Ïðåòåíäîâàëè íà óìû è äóøè áóäóùèõ ãîðîæàí Ïîñåéäîí è Àôèíà. Ñîâåò ó÷èíèë êîíêóðñ íà ëó÷øèé äàð ãîðîäó. Ïîñåéäîí óäàðîì òðåçóáöà âûçâàë èç ñêàëû áîåâîãî êîíÿ, à Àôèíà âûðàñòèëà îëèâó. Ãîðîä ñòàë Àôèíàìè. À êîíü îêàçàëñÿ íà íåáå.
Âïðî÷åì, ÷àùå ïðèíÿòî ñ÷èòàòü, ÷òî Ïîñåéäîí âûáèë èñòî÷íèê. Ñàì Ïîñåéäîí õâàñòàëñÿ, ÷òî âûäóìàë ýòî ñåìåéñòâî æèâîòíûõ - ëîøàäè, è îíè ñòàëè åãî àòðèáóòèâíûìè æèâîòíûìè. À Ðåÿ õâàñòàëàñü, ÷òî äâàæäû îáìàíûâàëà ÷àäîïîæèðàòåëÿ Êðîíîñà, ïîäñóíóâ åìó âìåñòî íîâîðîæäåííîãî Ïîñåéäîíà æåðåáåíêà, ÷òî ïðîòèâîðå÷èò ïîñåéäîíîâûì áàñíÿì. Êòî èç íèõ õâàñòëèâåå?
Åùå ãîâîðÿò, ÷òî ýòî, äåñêàòü, êîíü - áðàò Ïåãàñà. ß çíàþ, ÷òî ó Ïåãàñà, ñûíà Ìåäóçû Ãîðãîíû è Ïîñåéäîíà, áûë ðîäíîé áðàò-âåëèêàí Õðèñîàð, è èñòîðèÿ èõ ïîÿâëåíèÿ íà ñâåò ïîäðîáíî îñâåùåíà, â òîì ÷èñëå è â Ïåðñèàäå, íî ïðî áðàòà-êîíÿ â ìèôàõ íè÷åãî íå ãîâîðèòñÿ! Îâèäèé óâåðÿåò, ÷òî ýòî âîîáùå êåíòàâð, íî ýòî ÿâíî íå íàø ñëó÷àé. È êîìó êîíü ïðèíàäëåæàë, íå ÿñíî. Îäíè ãîâîðÿò - Êàñòîðó-óêðîòèòåëþ êîíåé (Ìàðöèàë, Ñòàöèé è Ñåíåêà) è, ÿ ÷èòàë, äàë åìó ýòîãî êîíÿ Ãåðìåñ, - íî êîãäà, ïðè êàêèõ îáñòîÿòåëüñòâàõ?.. íåÿñíî. Äðóãèå ãîâîðÿò - ýòî áûë êîíü Ïîëèäåâêà. À òðåòüè âûáèðàþò ïàëëèàòèâ - ñîâìåñòíîå âëàäåíèå Äèîñêóðàìè ýòèì Êèëëàðîì-Öåðëåðèñîì!
http://www.astromyth.ru/Constellations/Equ.htm
* * *
Sources: ru.wikipedia.org/wiki/Ìàëûé_Êîíü_(ñîçâåçäèå)
Ñìîòðèòå òàêæå - [ ïîëíûé ñïèñîê ñîçâåçäèé ]
Astronomical Portal
www.galactic.name
Copyright © 2007- 2023 - www.galactic.name
ïîääåðæè
íàø ñàéò! |
ILE Home Intuitionistic Logic Explorer < Previous Next >
Nearby theorems
Mirrors > Home > ILE Home > Th. List > nqtri3or GIF version
Theorem nqtri3or 7211
Description: Trichotomy for positive fractions. (Contributed by Jim Kingdon, 21-Sep-2019.)
Assertion
Ref Expression
nqtri3or ((𝐴Q𝐵Q) → (𝐴 <Q 𝐵𝐴 = 𝐵𝐵 <Q 𝐴))
Proof of Theorem nqtri3or
Dummy variables 𝑢 𝑣 𝑤 𝑧 are mutually distinct and distinct from all other variables.
StepHypRef Expression
1 df-nqqs 7163 . 2 Q = ((N × N) / ~Q )
2 breq1 3932 . . 3 ([⟨𝑧, 𝑤⟩] ~Q = 𝐴 → ([⟨𝑧, 𝑤⟩] ~Q <Q [⟨𝑢, 𝑣⟩] ~Q𝐴 <Q [⟨𝑢, 𝑣⟩] ~Q ))
3 eqeq1 2146 . . 3 ([⟨𝑧, 𝑤⟩] ~Q = 𝐴 → ([⟨𝑧, 𝑤⟩] ~Q = [⟨𝑢, 𝑣⟩] ~Q𝐴 = [⟨𝑢, 𝑣⟩] ~Q ))
4 breq2 3933 . . 3 ([⟨𝑧, 𝑤⟩] ~Q = 𝐴 → ([⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ↔ [⟨𝑢, 𝑣⟩] ~Q <Q 𝐴))
52, 3, 43orbi123d 1289 . 2 ([⟨𝑧, 𝑤⟩] ~Q = 𝐴 → (([⟨𝑧, 𝑤⟩] ~Q <Q [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑧, 𝑤⟩] ~Q = [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ) ↔ (𝐴 <Q [⟨𝑢, 𝑣⟩] ~Q𝐴 = [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑢, 𝑣⟩] ~Q <Q 𝐴)))
6 breq2 3933 . . 3 ([⟨𝑢, 𝑣⟩] ~Q = 𝐵 → (𝐴 <Q [⟨𝑢, 𝑣⟩] ~Q𝐴 <Q 𝐵))
7 eqeq2 2149 . . 3 ([⟨𝑢, 𝑣⟩] ~Q = 𝐵 → (𝐴 = [⟨𝑢, 𝑣⟩] ~Q𝐴 = 𝐵))
8 breq1 3932 . . 3 ([⟨𝑢, 𝑣⟩] ~Q = 𝐵 → ([⟨𝑢, 𝑣⟩] ~Q <Q 𝐴𝐵 <Q 𝐴))
96, 7, 83orbi123d 1289 . 2 ([⟨𝑢, 𝑣⟩] ~Q = 𝐵 → ((𝐴 <Q [⟨𝑢, 𝑣⟩] ~Q𝐴 = [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑢, 𝑣⟩] ~Q <Q 𝐴) ↔ (𝐴 <Q 𝐵𝐴 = 𝐵𝐵 <Q 𝐴)))
10 mulclpi 7143 . . . . 5 ((𝑧N𝑣N) → (𝑧 ·N 𝑣) ∈ N)
1110ad2ant2rl 502 . . . 4 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → (𝑧 ·N 𝑣) ∈ N)
12 mulclpi 7143 . . . . 5 ((𝑤N𝑢N) → (𝑤 ·N 𝑢) ∈ N)
1312ad2ant2lr 501 . . . 4 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → (𝑤 ·N 𝑢) ∈ N)
14 pitri3or 7137 . . . 4 (((𝑧 ·N 𝑣) ∈ N ∧ (𝑤 ·N 𝑢) ∈ N) → ((𝑧 ·N 𝑣) <N (𝑤 ·N 𝑢) ∨ (𝑧 ·N 𝑣) = (𝑤 ·N 𝑢) ∨ (𝑤 ·N 𝑢) <N (𝑧 ·N 𝑣)))
1511, 13, 14syl2anc 408 . . 3 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ((𝑧 ·N 𝑣) <N (𝑤 ·N 𝑢) ∨ (𝑧 ·N 𝑣) = (𝑤 ·N 𝑢) ∨ (𝑤 ·N 𝑢) <N (𝑧 ·N 𝑣)))
16 ordpipqqs 7189 . . . 4 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ([⟨𝑧, 𝑤⟩] ~Q <Q [⟨𝑢, 𝑣⟩] ~Q ↔ (𝑧 ·N 𝑣) <N (𝑤 ·N 𝑢)))
17 enqeceq 7174 . . . 4 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ([⟨𝑧, 𝑤⟩] ~Q = [⟨𝑢, 𝑣⟩] ~Q ↔ (𝑧 ·N 𝑣) = (𝑤 ·N 𝑢)))
18 ordpipqqs 7189 . . . . . 6 (((𝑢N𝑣N) ∧ (𝑧N𝑤N)) → ([⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ↔ (𝑢 ·N 𝑤) <N (𝑣 ·N 𝑧)))
1918ancoms 266 . . . . 5 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ([⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ↔ (𝑢 ·N 𝑤) <N (𝑣 ·N 𝑧)))
20 mulcompig 7146 . . . . . . 7 ((𝑤N𝑢N) → (𝑤 ·N 𝑢) = (𝑢 ·N 𝑤))
2120ad2ant2lr 501 . . . . . 6 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → (𝑤 ·N 𝑢) = (𝑢 ·N 𝑤))
22 mulcompig 7146 . . . . . . 7 ((𝑧N𝑣N) → (𝑧 ·N 𝑣) = (𝑣 ·N 𝑧))
2322ad2ant2rl 502 . . . . . 6 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → (𝑧 ·N 𝑣) = (𝑣 ·N 𝑧))
2421, 23breq12d 3942 . . . . 5 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ((𝑤 ·N 𝑢) <N (𝑧 ·N 𝑣) ↔ (𝑢 ·N 𝑤) <N (𝑣 ·N 𝑧)))
2519, 24bitr4d 190 . . . 4 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ([⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ↔ (𝑤 ·N 𝑢) <N (𝑧 ·N 𝑣)))
2616, 17, 253orbi123d 1289 . . 3 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → (([⟨𝑧, 𝑤⟩] ~Q <Q [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑧, 𝑤⟩] ~Q = [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ) ↔ ((𝑧 ·N 𝑣) <N (𝑤 ·N 𝑢) ∨ (𝑧 ·N 𝑣) = (𝑤 ·N 𝑢) ∨ (𝑤 ·N 𝑢) <N (𝑧 ·N 𝑣))))
2715, 26mpbird 166 . 2 (((𝑧N𝑤N) ∧ (𝑢N𝑣N)) → ([⟨𝑧, 𝑤⟩] ~Q <Q [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑧, 𝑤⟩] ~Q = [⟨𝑢, 𝑣⟩] ~Q ∨ [⟨𝑢, 𝑣⟩] ~Q <Q [⟨𝑧, 𝑤⟩] ~Q ))
281, 5, 9, 272ecoptocl 6517 1 ((𝐴Q𝐵Q) → (𝐴 <Q 𝐵𝐴 = 𝐵𝐵 <Q 𝐴))
Colors of variables: wff set class
Syntax hints: wi 4 wa 103 wb 104 w3o 961 = wceq 1331 wcel 1480 cop 3530 class class class wbr 3929 (class class class)co 5774 [cec 6427 Ncnpi 7087 ·N cmi 7089 <N clti 7090 ~Q ceq 7094 Qcnq 7095 <Q cltq 7100
This theorem was proved from axioms: ax-mp 5 ax-1 6 ax-2 7 ax-ia1 105 ax-ia2 106 ax-ia3 107 ax-in1 603 ax-in2 604 ax-io 698 ax-5 1423 ax-7 1424 ax-gen 1425 ax-ie1 1469 ax-ie2 1470 ax-8 1482 ax-10 1483 ax-11 1484 ax-i12 1485 ax-bndl 1486 ax-4 1487 ax-13 1491 ax-14 1492 ax-17 1506 ax-i9 1510 ax-ial 1514 ax-i5r 1515 ax-ext 2121 ax-coll 4043 ax-sep 4046 ax-nul 4054 ax-pow 4098 ax-pr 4131 ax-un 4355 ax-setind 4452 ax-iinf 4502
This theorem depends on definitions: df-bi 116 df-dc 820 df-3or 963 df-3an 964 df-tru 1334 df-fal 1337 df-nf 1437 df-sb 1736 df-eu 2002 df-mo 2003 df-clab 2126 df-cleq 2132 df-clel 2135 df-nfc 2270 df-ne 2309 df-ral 2421 df-rex 2422 df-reu 2423 df-rab 2425 df-v 2688 df-sbc 2910 df-csb 3004 df-dif 3073 df-un 3075 df-in 3077 df-ss 3084 df-nul 3364 df-pw 3512 df-sn 3533 df-pr 3534 df-op 3536 df-uni 3737 df-int 3772 df-iun 3815 df-br 3930 df-opab 3990 df-mpt 3991 df-tr 4027 df-eprel 4211 df-id 4215 df-iord 4288 df-on 4290 df-suc 4293 df-iom 4505 df-xp 4545 df-rel 4546 df-cnv 4547 df-co 4548 df-dm 4549 df-rn 4550 df-res 4551 df-ima 4552 df-iota 5088 df-fun 5125 df-fn 5126 df-f 5127 df-f1 5128 df-fo 5129 df-f1o 5130 df-fv 5131 df-ov 5777 df-oprab 5778 df-mpo 5779 df-1st 6038 df-2nd 6039 df-recs 6202 df-irdg 6267 df-oadd 6317 df-omul 6318 df-er 6429 df-ec 6431 df-qs 6435 df-ni 7119 df-mi 7121 df-lti 7122 df-enq 7162 df-nqqs 7163 df-ltnqqs 7168
This theorem is referenced by: ltsonq 7213 nqtric 7214 addlocprlem 7350 nqprloc 7360 distrlem4prl 7399 distrlem4pru 7400 ltexprlemrl 7425 aptiprleml 7454 aptiprlemu 7455
Copyright terms: Public domain W3C validator |
Thursday, October 11, 2012
Finding KPCR in memory images.
I was looking into finding the KPCR structure in memory images. The KPCR is used to store a lot of information about the running CPU and in windows version prior to Windows 7 also contains a link to the kernel debugger block.
Volatility already contains a scanner for KPCR (in this example the image is 821676355 bytes big):
~/projects/volatility$ time python vol.py --profile Win7SP1x64 --file ~/images/win7_trial_64bit.dmp kpcrscan
Volatile Systems Volatility Framework 2.2
**************************************************
Offset (V) : 0xf80002842d00
Offset (P) : 0x2842d00
KdVersionBlock : 0x0
IDT : 0xf80000b95080
GDT : 0xf80000b95000
CurrentThread : 0xf80002850c40 TID 0 (Idle:0)
IdleThread : 0xf80002850c40 TID 0 (Idle:0)
Details : CPU 0 (GenuineIntel @ 2394 MHz)
CR3/DTB : 0x187000
real 48m33.825s
user 48m13.717s
sys 0m3.888s
As you can see this is extremely slow. Why is it so slow? We can look at the source code for the kpcr scanner check:
00001: def check(self, offset):
00002: """ We check that _KCPR.pSelfPCR points to the start of the _KCPR struct """
00003: paKCPR = offset
00004: paPRCBDATA = offset + self.PrcbData_offset
00005:
00006: try:
00007: pSelfPCR = obj.Object('Pointer', offset = (offset + self.SelfPcr_offset), vm = self.address_space)
00008: pPrcb = obj.Object('Pointer', offset = (offset + self.Prcb_offset), vm = self.address_space)
00009: if pSelfPCR == paKCPR and pPrcb == paPRCBDATA:
00010: self.KPCR = pSelfPCR
00011: return True
00012:
00013: except BaseException:
00014: return False
00015:
00016: return False
So the scanner compares each 4 byte position in the image by overlaying the _KPCR struct over it and checking that _KPCR.Self points at the address of _KPCR.
This is extremely slow since it will perform millions of comparisons in python as well as many very small read operations from the raw image (IO operations are very expensive on windows systems making this even slower).
There must be an easier way to find KPCR!
The solution is to examine the _KPCR object and see what we can leverage so we do not need to resort to an exhaustive search:
Win7SP1x64:win7_trial_64bit.raw 12:54:13> dt "_KPCR"
[_KPCR _KPCR] @ 0x00000000
0x00 GdtBase
0x00 NtTib [_NT_TIB NtTib] @ 0x00000000
0x00 _GDT
0x08 TssBase
0x10 UserRsp [unsigned long long:UserRsp]: 0x00000000
0x18 Self
0x20 CurrentPrcb
.....
0x180 Prcb [_KPRCB Prcb] @ 0x00000180
And we can examine the contents of the Prcb:
Win7SP1x64:win7_trial_64bit.raw 12:54:19> dt "_KPRCB"
[_KPRCB _KPRCB] @ 0x00000000
...
0x5F0 CpuType [unsigned char:CpuType]: 0x00000000
0x5F1 CpuID [unsigned char:CpuID]: 0x00000000
0x5F2 CpuStep [unsigned short:CpuStep]: 0x00000000
0x5F2 CpuStepping [unsigned char:CpuStepping]: 0x00000000
0x5F3 CpuModel [unsigned char:CpuModel]: 0x00000000
0x5F4 MHz [unsigned long:MHz]: 0x00000000
0x5F8 HalReserved
0x638 MinorVersion [unsigned short:MinorVersion]: 0x00000000
0x63A MajorVersion [unsigned short:MajorVersion]: 0x00000000
0x63C BuildType [unsigned char:BuildType]: 0x00000000
0x63D CpuVendor [unsigned char:CpuVendor]: 0x00000000
...
0x4480 WaitListHead [_LIST_ENTRY WaitListHead] @ 0x00004480
We notice the WaitListHead member. After Googling for this (http://www.codemachine.com/article_kernelstruct.html#KPCR) we find that this is the list head of threads waiting to run on this CPU:
nt!_KTHREAD
The WaitListEntry field is used to add the KTHREAD structure to the list of
threads that have entered into a wait state on a particular CPU. The
WaitListHead field of the Kernel Processor Control Region (KPRCB) structure for
every CPU links such threads together via the KTHREAD.WaitListEntry
field. Threads are added to this list by the function KiCommitThreadWait() and
removed from this list by KiSignalThread().
So the trick is to enumerate all threads and see which ones are waiting to run on this CPU. In order to find the kernel DTB we already are searching for the System process so we usually already have one _EPROCESS object we know about.
00001: for kthread in task.Pcb.ThreadListHead.list_of_type(
00002: "_KTHREAD", "ThreadListEntry"):
00003:
00004: # Look for threads in the Wait state. If this thread is in the Wait
00005: # state, the WaitListEntry will belong to the list of all waiting
00006: # threads. By following this list we should get to the list head
00007: # which lives inside the _KPCR object.
00008: for kwaiter in kthread.WaitListEntry.list_of_type(
00009: "_KTHREAD", "WaitListEntry"):
00010:
00011: # Assume the kwaiter is actually the KPRCB.WaitListHead.
00012: possible_kpcr = self.profile._KPCR(
00013: kwaiter.WaitListEntry.obj_offset - offset)
00014:
00015: # Check for validity using the usual condition.
00016: if possible_kpcr.Self == possible_kpcr.obj_offset:
00017: if possible_kpcr.obj_offset not in seen:
00018: seen[possible_kpcr.obj_offset] = possible_kpcr
This runs a lot faster:
~/volatility/svn$ time vol.py -f ~/images/win7_trial_64bit.dmp kpcr
**************************************************
Property Value
------------------------------ -----
Offset (V) 0xf80002842d00
Offset (P) 0x2842d00L
KdVersionBlock 0
IDT 0xf80000b95080L
GDT 0xf80000b95000L
CurrentThread : 0xf80002850c40 TID 0 (System:0)
IdleThread : 0xf80002850c40 TID 0 (System:0)
Details : CPU 0 (GenuineIntel @ 2394 MHz)
CR3/DTB : 0x187000
real 0m6.457s
user 0m5.948s
sys 0m0.480s
Yes thats 6.5 seconds vs 48 minutes!
Unfortunately this only works on later versions of windows than XP right now since the WaitListHead was introduced with Windows 2003.
PS - I originally wanted to examine the KPCR as a way of quickly retrieving the KDBG but this does not work as recent windows versions set KdVersionBlock to 0. We can not use the KPCR as a substitute for the DTB scan either since all this work is done in the kernel virtual address space (so we need a DTB already). In practice DTB scanning is very quick and KDBG scans are also not too bad so its not a huge problem. |
README.md

=========
[](https://circleci.com/gh/spandex-project/spandex)
[](http://inch-ci.org/github/spandex-project/spandex)
[](https://coveralls.io/github/spandex-project/spandex)
[](https://hex.pm/packages/spandex)
[](https://hex.pm/packages/spandex)
[](https://github.com/spandex-project/spandex/blob/master/LICENSE)
View the [documentation](https://hexdocs.pm/spandex)
Spandex is a library for tracing your elixir application. Tracing is a
monitoring tool that allows you get extremely granular information about the
runtime of your system. Using distributed tracing, you can also get a view of
how requests make their way through your entire ecosystem of microservices or
applications. Currently, Spandex only supports integrating with
[datadog](https://www.datadoghq.com/), but it is built to be agnostic to what
platform you choose to view your trace data. Eventually it should support Open
Zipkin, Stackdriver, and any other trace viewer/aggregation tool you'd like to
integrate with. We are still under active development, working on moving to a
more standard/generic implementation of the internals. Contributions welcome!
## 3.0 Release
The 3.0 release only involves ensuring that you're using the latest adapter, which will be explicit in its dependency on a spandex version. This major version was done only to solve for breaking changes between the adapter and spandex core, in order to honor semver and also not break everyone's installation.
## 2.0 Upgrade Guide
This is Datadog-specific since that's currently the only adapter.
* Include the adapter as a dependency (see below).
* Replace any occurrences of `Spandex.Adapters.Datadog` with
`SpandexDatadog.Adapter` in your code.
* Replace any occurrences of `Spandex.Adapters.ApiSender` with
`SpandexDatadog.ApiSender` in your code.
## Adapters
* [Datadog](https://github.com/spandex-project/spandex_datadog)
* Thats it so far! If you want another adapter, it should be relatively easy to
write! This library is in charge of handling the state management of spans,
and the adapter is just in charge of generating certain values and ultimately
sending the values to the service.
## Installation
```elixir
def deps do
[{:spandex, "~> 3.0.3"}]
end
```
## Setup and Configuration
Define your tracer:
```elixir
defmodule MyApp.Tracer do
use Spandex.Tracer, otp_app: :my_app
end
```
Configure it:
```elixir
config :my_app, MyApp.Tracer,
service: :my_api,
adapter: SpandexDatadog.Adapter,
disabled?: false,
env: "PROD"
```
Or at runtime, by calling `configure/1` (usually in your application's startup)
```elixir
MyApp.Tracer.configure(disabled?: System.get_env("TRACE") != "true")
```
For more information on Tracer configuration, view the docs for
`Spandex.Tracer`. There you will find the documentation for the `opts` schema.
The entire configuration can also be passed into each function in your tracer
to be overridden if desired. For example:
`MyApp.Tracer.start_span("span_name", service: :some_special_service)`
Your configuration and the configuration in your config files are merged
together, to avoid needing to specify this config at all times.
To bypass the Tracer pattern entirely, you can call directly into the functions
in `Spandex`, like `Spandex.start_span("span_name", [adapter: Foo, service:
:bar])`. Note that in this case, you will need to specify all of the
configuration options in each call, because the Tracer is not managing the
defaults for you.
### Adapter specific configuration
For adapter configuration, see the documentation for that adapter
## Phoenix Plugs
There are 3 plugs provided for usage w/ Phoenix:
* `Spandex.Plug.StartTrace` - See module docs for options. Goes as early in your
pipeline as possible.
* `Spandex.Plug.AddContext` - See moduledoc for options. Either after the
router, or inside a pipeline in the router.
* `Spandex.Plug.EndTrace` - Must go *after* your router.
## Distributed Tracing
Individual adapters can support distributed tracing. See their documentation
for more information.
## Logger metadata
In general, you'll probably want the current span_id and trace_id in your logs,
so that you can find them in your tracing service. Make sure to add `span_id`
and `trace_id` to logger_metadata
```elixir
config :logger, :console,
metadata: [:request_id, :trace_id, :span_id]
```
## General Usage
The nicest interface for working with spans is the `span` macro, illustrated in
`span_me_also` below.
```elixir
defmodule ManuallyTraced do
require Spandex
# Does not handle exceptions for you.
def trace_me() do
Tracer.start_trace("my_trace") #also opens a span
Tracer.update_span(service: :my_app, type: :db)
result = span_me()
Tracer.finish_trace()
result
end
# Does not handle exceptions for you.
def span_me() do
Tracer.start_span("this_span")
Tracer.update_span(service: :my_app, type: :web)
result = span_me_also()
Tracer.finish_span()
end
# Handles exception at the span level. Trace still must be reported.
def span_me_also() do
Tracer.span("span_me_also") do
...
end
end
end
```
### Metadata
See the module documentation for `Spandex.Span` as well as the documentation
for the structs contained as keys for that struct. They illustrate the keys
that are known to either be common keys or to have UI sugar with certain
clients. Its hard to find any kind of list of these published anywhere, so let
me know if you know of more!
For example:
```elixir
Spandex.update_span(
type: :db,
http: [url: "/posts", status_code: 400],
sql_query: [query: "SELECT * FROM posts", rows: 10]
)
```
## Asynchronous Processes
The current `trace_id` and `span_id` can be retrieved and later used (for
example, from another process) as follows:
```elixir
trace_id = Tracer.current_trace_id()
span_id = Tracer.current_span_id()
span_context = %SpanContext{trace_id: trace_id, parent_id: span_id}
Tracer.continue_trace("new_trace", span_context)
```
New spans can then be logged from there and sent in a separate batch.
## Strategies
There is (currently and temporarily) only one storage strategy, which can be
changed via the `strategy` option. See Tracer opt documentation for an example
of setting it. To implement your own (ETS adapter should be on its way), simply
implement the `Spandex.Strategy` behaviour. Keep in mind that the strategy is
not an atomic pattern. It represents retrieving and wholesale replacing a
trace, meaning that it is *not* safe to use across processes or concurrently.
Each process should have its own store for its own generated spans. This should
be fine because you can send multiple batches of spans for the same trace
separately.
## Decorators
Because the `decorator` library can cause conflicts when it interacts with other dependencies in the same project, we support it as an optional dependency. This allows you to disable it if it causes problems for you, but it also means that you need to explicitly include some version of `decorator` in your application's dependency list:
```elixir
# mix.exs
defp deps do
[
{:decorator, "~> 1.2"}
]
end
```
Then, configure the Spandex decorator with your default tracer:
```elixir
config :spandex, :decorators, tracer: MyApp.Tracer
```
Span function decorators take an optional argument which is the attributes to update the span with. One of those attributes can be the `:tracer` in case you want to override the default tracer (e.g., in case you want to use multiple tracers).
IMPORTANT If you define multiple clauses for a function, you'll have to decorate all of the ones you want to span.
```elixir
defmodule TracedModule do
use Spandex.Decorators
@decorate trace(service: :my_app, type: :web)
def trace_me() do
span_1()
end
@decorate span(name: "span_1")
def span_1() do
inner_span_1()
end
@decorate span()
def inner_span_1() do
_ = ThirdPartyApi.different_service_call()
inner_span_2()
end
@decorate span(tracer: MyApp.OtherTracer)
def inner_span_2() do
"this produces a span stack to be reported by another tracer"
end
# Multiple Clauses
@decorate span()
def divide(n, 0), do: {:error, :divide_by_zero}
@decorate span()
def divide(n, m), do: n / m
end
defmodule ThirdPartyApi do
use Spandex.Decorators
@decorate span(service: :third_party, type: :cache)
def different_service_call() do
...
end
end
```
Note: Decorators don't magically do everything. It often makes a lot of sense to use `Tracer.update_span` from within your function to add details that are only available inside that same function.
## Ecto Tracing
Check out [spandex_ecto](https://github.com/spandex-project/spandex_ecto).
## Phoenix Tracing
Check out [spandex_phoenix](https://github.com/spandex-project/spandex_phoenix). |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.