text
stringlengths
192
1.05M
Home / Huawei / Huawei P30 Factory Reset and Hard Reset Huawei P30 Factory Reset and Hard Reset Huawei P30 has a very useful option to reset Android to its original state, which is known as, reset system to original factory settings. Let’s see how we can reset Huawei P30. The Huawei P30 sports a 6.1 Inch FHD+ display with a resolution of 1080 x 2340 pixels resulting in an impressive pixel density of 422 PPI. The Huawei P30 is equipped with 40MP + 16MP + 8MP autofocus primary camera with Triple camera LED flash and CMOS image sensor. It comes with a 32MP front camera which is a treat for the selfie lovers. This smartphone gets all its strength from a 2.6 GHz Octa-Core processor which is seated on a HiSilicon KIRIN 980 chipset and paired with 6GB of RAM for great multitasking and an ARM Mali G76 GPU for a good gaming experience. Android 9.0 works as the OS on this device. If you want to sell your Huawei P30 or get laggy, full storage, infected with viruses, stuck with logos, you should consider doing a factory reset. There are three ways you can do it on the Huawei P30, which we’ll take a closer look at in this post. Hard reset Huawei P30 Huawei P30 Recovery Mode 1. Turn off your Huawei P30 and wait a few seconds. 2. Press and hold the Power key and Volume Up button at the same time. 3. Release them when you see the Huawei logo. 4. Then you will see the Fastboot Mode. 5. Touch Wipe data/Factory reset. 6. Choose Wipe data to confirm the whole operation. 7. Press the Reboot system menu. 8. The Huawei P30 will now wipe all contents. Reset passcode or pattern lock Huawei P30 Google Find My Device Erase Option 1. Log into Find My Device with your Google Account (email) and password. 2. Select the Huawei P30 from the menu on the left. 3. Select the Erase option from below the device information. 4. Select the Erase Device button on the popup. 5. Enter your Google Account password to confirm and send the task to your Huawei P30. Factory reset Huawei P30 Huawei P30 Reset Option 1. Go to Menu and choose Setting. 2. Tap System. 3. Move again and tap Reset. 4. After that, choose Factory data reset. 5. Confirm it by tap the RESET PHONE button. 6. When it’s done, the Huawei P30 will reboot. Huawei P30 Reset Phone Final Thought The Huawei P30 is a very affordable phone but has decent quality features. It has a very good set of cameras on both sides that can click good photos and videos. The performance is decent and will not displease the users at all. It also offers excellent performance with a healthy power supply. This is a common problem, so if you were able to unlock your device thanks to the guide or there is a method that we haven’t covered let us know in the comments below. Related
Tuesday, January 19, 2021 More Drop-In And Spray-On Bedliners Bedliners or truck bedliners are products that serve the purpose of protecting the inside of a truck bed from any destruction and damage.  It is very important for a truck to get a protective coating for the bed of the truck as it is going to face a lot of traffic and abuse, especially if the truck is out for a very long trip and goods are going to be loaded and unloaded regularly during the trip.That’s why it’s important to get a bed liner to defend your truck and investment.  The lining surface also keeps the cargo in place as it serves as a skid-resistant surface. There are different kinds and types of these bedliners. The Two Broad Categories Of Bedliners The Bedliners Trucks Are Classified Into Two Categories, The Drop-In And Spray-On. Bedliners Drop-In Bedliners –The drop-in or plastic bedliners are the most common to be used and popular because it is very fast and easy to get them installed. There are no major modifications to make except some drilling of holes in the desired areas to hold the lining in place. These truck bedliners are easy to apply on the truck bed as there is no need to make any preparation. They can be simply removed for cleaning and are made of a polyethylene composite. When camped to Spray-on bedliners, the cost is pretty reasonable for the drop-ins. These can be removed easily as and when needed and for cleaning purposes. Spray-On Bedliners – These bedliners need specific preparation, and the surface of the inner side of a truck has to be cleaned and prepared accordingly to allow the coating to dry and adhere correctly. If the coating is better and adheres well, it will last for long and serve the purpose well. Spray-on bedliners are available in varying formulations and crated with different process methods such as aromatic or aliphatic, high or low pressure, or hybrid and solvent base.  These bedliners can be applied cartridge driven pressure or by roller or even with a high-pressure machine. You can get the colour of the bedliner for pickup to match that of the vehicle. Performance relies greatly on the quality and the process of careful application. However, fading of colour due to exposure to harsh sunrays and ultraviolet rays is inevitable.  Aromatic Spray-on bedliners are the least expensive option and are used for darker colours. A Comparison Of The Two Bedliners Bedliners A comparison of both types of bedliners, it is evident that each comes with its pros and cons. While the Drop-in bedliners are cheaper and easier to install, they have certain weak points. For instance, it doesn’t protect the inner bedsides so well and can trap water between the liner and the bed.  That extra water and moisture can lead to rust or corrosion. It is possible that the plastic version of the Drop-in bedliner becomes loose quickly, and that can fail the purpose of protecting the bed floor of the truck. As for the spray on bedliners, it is indeed more time consuming to get them unsalted as there is lots of proportion to make. Moreover, they turn out to be a lot more expensive than Drop-in bedliners. Still, performance-wise they are superior as they have a lot of benefits to offset those higher costs. For example, the spray-on bedliner is much more durable and long-lasting. Moreover, it can lower that traveling noise, and you need not get anxious about any trapped water or corrosion. As for choices, there are much more options available when it comes to spray-on bedliners as there are different colours and textures. As for the coverage, you can be sure that you have everything covered, including the bed, the bedrails, and tailgate. Thus, no more of those scratches and missing paint anymore! Go ahead and shop for bedliners plus accessories based on your needs and budget and weigh the pros and cons of your choices. Other Articles Everything To Know About Glass Tea Pot Glass teapots are common and we can find them in many occasions and places. They have an aesthetic look in them and come in... Tips For Choosing The Right Company For Your Custom Made Joinery A lot of people misunderstand “Joinery” with carpentry work. The primary difference between a joiner and a carpenter is that a joiner crafts the... How To Choose The Perfect Dining Chair? Meals are the time once we get to bond with our families and shut ones, rejuvenating and enjoying our special bonds and feeling all... 4 Best Choices For Kitchen Floors To Beautify Your Kitchen Area Kitchen is an important part of your house or apartment and therefore you need to make sure that you keep it as tidy and...
Sign up × Server Fault is a question and answer site for system and network administrators. It's 100% free, no registration required. I have 6 disks into RAID5 array, I bought 2 new disks and I will add to the existing array. I try with IBM ServeRAID 8k utility but i can find the option for append disk into an array. i have CentOS and launch the utility from the bios share|improve this question 1 Answer 1 up vote 0 down vote accepted SR8k BIOS is quite limited. Array expansion can be done via RAID manager software http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-61707 share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
COVID VACCINE APPOINTMENTS - CLICK HERE Nuclear Medicine Nuclear medicine is a division within the field of radiology. It consists of diagnostic examinations that result in images of body anatomy and function. The images are developed based on the detection of energy emitted from a radioactive medication given to the patient, either intravenously or by mouth. Nuclear medicine images can assist the physician in diagnosing diseases, tumors and infection. Several disease and health problems that Nuclear Medicine can detect include: Kidney function, heart function/blood flow, lung problems, blockage of the gallbladder, bone fractures, infection, arthritis or tumors, determine the presence or spread of cancer, identify bleeding into the bowel, locate infection and measure thyroid function to detect an overactive or underactive thyroid. Facebook Search Health Information Search our FastHealth page for all your basic needs and healthcare information to keep your family healthy. El Campo Memorial Hospital (ECMH) and its predecessor have been providing the highest quality medical care in El Campo for over 68 years, and at the current location since 1979.The hospital is accredited by state and federal regulations (Medicare/Medicaid). Patient Billing: Various physicians involved in your care at ECMH will bill you directly for their services. These may include your anesthesiologist, emergency room physician(s), radiologist, pathologist, cardiologist or other consulting physician during your ER visit or hospital stay. Please remember that some physicians are private practitioners (contracted by ECMH and not an actual employee of ECMH) and may not be a provider on your specific managed care plan.
loading page Using Viruses to our Advantage to Combat Antibiotic Resistance • Ritwik Kumar Ritwik Kumar Corresponding Author:[email protected] Author Profile Abstract Antibiotic resistance is one of the greatest public health threats we face. Approximately 2 million infections and 23,000 deaths are a result of antibiotic-resistant bacteria in the United States every year.[1] It occurs when bacteria acquire immunity to antibiotic treatments. In response, pharmaceutical companies usually develop new or improved antibiotics. However, as consumers overuse and misuse these treatments, multidrug-resistant bacteria with no effective treatment(s) emerge. Unfortunately, the proliferation of such microbes threatens to return society to pre-antibiotic era health conditions. Fortunately, phage therapy offers a potential solution. Phage therapy uses bacteriophages, viruses that exclusively infect bacteria, to target and kill antibiotic-resistant microbes at infection sites. This paper explores phage therapy and the challenges faced by researchers in developing it. It concludes with a discussion on the importance of phage therapy in the future on a global level. 
1. Bitbucket 2. Public Issue Tracker 3. master 4. Issues Issues Issue #3383 invalid Diff view broken for smaller font size (BB-3244) Martin Eigenbrodt created an issue If I look at a commit the diff boxes looks strange when the fontsize is reduced (CMD + "-" in Firefox 8.0.1, MacOs). Comments (5) 1. Log in to comment
US20060178735A1 - Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor - Google Patents Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor Download PDF Info Publication number US20060178735A1 US20060178735A1 US11392105 US39210506A US2006178735A1 US 20060178735 A1 US20060178735 A1 US 20060178735A1 US 11392105 US11392105 US 11392105 US 39210506 A US39210506 A US 39210506A US 2006178735 A1 US2006178735 A1 US 2006178735A1 Authority US Grant status Application Patent type Prior art keywords angiogenic device agents polypeptides beneficial Prior art date Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.) Abandoned Application number US11392105 Inventor Frank Litvack John Shanley Theodore Parker Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.) Innovational Holdings LLC Original Assignee Conor Medsystems Inc Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.) Filing date Publication date Links Images Classifications • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L31/00Materials for other surgical articles, e.g. stents, stent-grafts, shunts, surgical drapes, guide wires, materials for adhesion prevention, occluding devices, surgical gloves, tissue fixation devices • A61L31/14Materials characterised by their function or physical properties, e.g. injectable or lubricating compositions, shape-memory materials, surface modified materials • A61L31/16Biologically active materials, e.g. therapeutic substances • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61FFILTERS IMPLANTABLE INTO BLOOD VESSELS; PROSTHESES; DEVICES PROVIDING PATENCY TO, OR PREVENTING COLLAPSING OF, TUBULAR STRUCTURES OF THE BODY, E.G. STENTS; ORTHOPAEDIC, NURSING OR CONTRACEPTIVE DEVICES; FOMENTATION; TREATMENT OR PROTECTION OF EYES OR EARS; BANDAGES, DRESSINGS OR ABSORBENT PADS; FIRST-AID KITS • A61F2/00Filters implantable into blood vessels; Prostheses, i.e. artificial substitutes or replacements for parts of the body; Appliances for connecting them with the body; Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents • A61F2/82Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents • A61F2/86Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure • A61F2/90Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure • A61F2/91Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure made from perforated sheet material or tubes, e.g. perforated by laser cuts or etched holes • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61FFILTERS IMPLANTABLE INTO BLOOD VESSELS; PROSTHESES; DEVICES PROVIDING PATENCY TO, OR PREVENTING COLLAPSING OF, TUBULAR STRUCTURES OF THE BODY, E.G. STENTS; ORTHOPAEDIC, NURSING OR CONTRACEPTIVE DEVICES; FOMENTATION; TREATMENT OR PROTECTION OF EYES OR EARS; BANDAGES, DRESSINGS OR ABSORBENT PADS; FIRST-AID KITS • A61F2/00Filters implantable into blood vessels; Prostheses, i.e. artificial substitutes or replacements for parts of the body; Appliances for connecting them with the body; Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents • A61F2/82Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents • A61F2/86Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure • A61F2/90Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure • A61F2/91Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure made from perforated sheet material or tubes, e.g. perforated by laser cuts or etched holes • A61F2/915Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure made from perforated sheet material or tubes, e.g. perforated by laser cuts or etched holes with bands having a meander structure, adjacent bands being connected to each other • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L31/00Materials for other surgical articles, e.g. stents, stent-grafts, shunts, surgical drapes, guide wires, materials for adhesion prevention, occluding devices, surgical gloves, tissue fixation devices • A61L31/04Macromolecular materials • A61L31/043Proteins; Polypeptides; Degradation products thereof • A61L31/047Other specific proteins or polypeptides not covered by A61L31/044 - A61L31/046 • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61FFILTERS IMPLANTABLE INTO BLOOD VESSELS; PROSTHESES; DEVICES PROVIDING PATENCY TO, OR PREVENTING COLLAPSING OF, TUBULAR STRUCTURES OF THE BODY, E.G. STENTS; ORTHOPAEDIC, NURSING OR CONTRACEPTIVE DEVICES; FOMENTATION; TREATMENT OR PROTECTION OF EYES OR EARS; BANDAGES, DRESSINGS OR ABSORBENT PADS; FIRST-AID KITS • A61F2/00Filters implantable into blood vessels; Prostheses, i.e. artificial substitutes or replacements for parts of the body; Appliances for connecting them with the body; Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents • A61F2/82Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents • A61F2/86Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure • A61F2/90Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure • A61F2/91Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure made from perforated sheet material or tubes, e.g. perforated by laser cuts or etched holes • A61F2/915Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure made from perforated sheet material or tubes, e.g. perforated by laser cuts or etched holes with bands having a meander structure, adjacent bands being connected to each other • A61F2002/91533Stents in a form characterised by the wire-like elements; Stents in the form characterised by a net-like or mesh-like structure characterised by a net-like or mesh-like structure made from perforated sheet material or tubes, e.g. perforated by laser cuts or etched holes with bands having a meander structure, adjacent bands being connected to each other characterised by the phase between adjacent bands • A61F2002/91541Adjacent bands are arranged out of phase • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61FFILTERS IMPLANTABLE INTO BLOOD VESSELS; PROSTHESES; DEVICES PROVIDING PATENCY TO, OR PREVENTING COLLAPSING OF, TUBULAR STRUCTURES OF THE BODY, E.G. STENTS; ORTHOPAEDIC, NURSING OR CONTRACEPTIVE DEVICES; FOMENTATION; TREATMENT OR PROTECTION OF EYES OR EARS; BANDAGES, DRESSINGS OR ABSORBENT PADS; FIRST-AID KITS • A61F2250/00Special features of prostheses classified in groups A61F2/00 - A61F2/26 or A61F2/82 or A61F9/00 or A61F11/00 or subgroups thereof • A61F2250/0058Additional features; Implant or prostheses properties not otherwise provided for • A61F2250/0067Means for introducing or releasing pharmaceutical products into the body • A61F2250/0068Means for introducing or releasing pharmaceutical products into the body the pharmaceutical product being in a reservoir • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/20Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices containing or releasing organic materials • A61L2300/25Peptides having up to 20 amino acids in a defined sequence • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/20Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices containing or releasing organic materials • A61L2300/252Polypeptides, proteins, e.g. glycoproteins, lipoproteins, cytokines • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/40Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices characterised by a specific therapeutic activity or mode of action • A61L2300/412Tissue-regenerating or healing or proliferative agents • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/40Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices characterised by a specific therapeutic activity or mode of action • A61L2300/412Tissue-regenerating or healing or proliferative agents • A61L2300/414Growth factors • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/40Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices characterised by a specific therapeutic activity or mode of action • A61L2300/45Mixtures of two or more drugs, e.g. synergistic mixtures • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/60Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices characterised by a special physical form • A61L2300/602Type of release, e.g. controlled, sustained, slow • AHUMAN NECESSITIES • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE • A61LMETHODS OR APPARATUS FOR STERILISING MATERIALS OR OBJECTS IN GENERAL; DISINFECTION, STERILISATION, OR DEODORISATION OF AIR; CHEMICAL ASPECTS OF BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES; MATERIALS FOR BANDAGES, DRESSINGS, ABSORBENT PADS, OR SURGICAL ARTICLES • A61L2300/00Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices • A61L2300/60Biologically active materials used in bandages, wound dressings, absorbent pads or medical devices characterised by a special physical form • A61L2300/602Type of release, e.g. controlled, sustained, slow • A61L2300/604Biodegradation Abstract A method for treating blood vessel occlusions in the heart delivers an angiogenic agent from an implantable device locally to the walls of the blood vessel over an extended administration period sufficient to establish self sustaining blood vessels. An expandable medical device for delivery of angiogenic agents includes openings in the expandable medical device struts to deliver one or more angiogenic agents to promote angiogenesis. The device can sequentially deliver a plurality of agents to promote angiogenesis to treat, for example, disorders and conditions associated with chronic total occlusions. Description CROSS REFERENCE TO RELATED APPLICATIONS • [0001] This application is a divisional of U.S. patent application Ser. No. 10/705,110, filed Nov. 10, 2003 which claims priority to U.S. Provisional Application Ser. No. 60/424,896, filed Nov. 8, 2002, which is incorporated herein by reference in its entirety. • BACKGROUND OF THE INVENTION Field of the Invention • [0002] The invention relates to the use of expandable medical devices to treat chronic total occlusions by delivering one or more angiogenic compositions to the wall of an artery to promote angiogenesis. The invention is also useful for the sequential delivery of a multiplicity of agents to promote angiogenesis. • REFERENCES • [0000] • Bräsen, J. H., Kivelä, A., Röser, K., Rissanen, T. T., Niemi, M., Luft, F. C., Donath, K., and Ylä-Herttuala, S. (2001) Angiogenesis, vascular endothelial growth factor and platelet-derived growth factor-BB expression, iron deposition, and oxidation-specific epitopes in stented human coronary arteries. Arterioscler. Thromb. Vasc. Biol. 21:1720-26. • Browder, T., Folkman, J., and Pirie-Shepherd, S. (2000) The hemostatic system as a regulator of angiogenesis. J. Biol. Chem. 275:1521-24. • Bukrinsky, M. I., Haggerty, S., Dempsey, M. P., Sharova, N., Adzhubel, A., Spitz, L., Lewis, P., Goldfarb, D., Emerman, M. and Stevenson, M. (1993) Nature 365:666-69. • Carmeliet, P. and Collen, D. (1999) Role of vascular endothelial growth factors and vascular endothelial growth factor receptors in vascular development in Vascular Growth Factors and Angiogenesis. Lena Claesson-Welsh, Ed. Springer-Verlag, Berlin, Heidelberg. pp. 133-158. • Davda, J. and Labhasetwar, V. (2001) An update on angiogenesis therapy. Crit. Rev. Eukaryot. Gene Expr. 11:1-21. • Isner, J. M. (2002) Myocardial gene therapy. Nature 415:234-39. • Freedman, S. B. and Isner, J. M. (2001) Therapeutic angiogenesis for ischemic cardiovascular disease. J Mol Cell Cardiol. 33:379-93. • Freedman, S. B. and Isner, J. M. (2002) Therapeutic angiogenesis for coronary artery disease. Ann. Intern. Med. 136:54-71. • Lewis, P. F. and Emerman, M. (1994) J. Virol. 68:510-6. • Morishita, R., Aoki, M., Kaneda, Y., and Ogihara, T. (2001) Gene therapy in vascular medicine: recent advances and future perspectives. Pharmacol. Ther. 91:105-14. • Naldini, L., Blömer, U., Gallay, P., Ory, D., Mulligan, R., Gage, F. H., Verma, I. M. and Trono, D. (1996) Science 272:263-67. • Nugent, M. A. and Iozzo, R. V. (2000) Fibroblast growth factor-2. Int. J. Biochem. Cell Biol. 32:115-20. • Rosenfeld, M. A., Siegfried, W., Yoshimura, K., Yoneyama, K., Fukayama, M., Stier, L. E., Pääkkö, P. K., Gilardi, P., Stratford-Perricaudet, L. D., Perricaudet, M. et al. (1991) Science 252:431-34. • Simons, M. (2001) Therapeutic coronary angiogenesis: a fronte praecipitium a tergo lupi? Am. J. Physiol. Heart Circ. Physiol. 280:H1923-27. • Todd, S., Anderson, C-G., Jolly, D. J., and Craik, C. S. (2000) HIV protease as a target for retrovirus vector-mediated gene therapy. Biochim. Biophys. Acta. 1477:168-88. • Verma, I. M. and Somia, N. (1997) Nature 389:239-42. • Webster, K. A. (2000) Therapeutic angiogenesis: a case for targeted, regulated gene delivery. Crit. Rev. Eukaryot. Gene Expr. 10:113-25. • Yang, Y., Li, Q., Ertl, H. C. and Wilson, J. M. (1995) J. Virol. 69:2004-15. • Yeh, P. and Perricaudet, M. (1997) Faseb J. 11:615-23. • Zimmerman, M. A., Selzman, C. H., Raeburn, C. D., Calkins, C. M., Barsness, K., and Harken, A. H. (2001) Clinical applications of cardiovascular angiogenesis. J. Card. Surg. 16:490-97. SUMMARY OF THE RELATED ART • [0023] Chronically occluded or narrowed blood vessels prevent adequate blood flow to tissue. The treatment of chronically occluded arteries remains problematic even after a quarter century of percutaneous angioplasty. The principal limitation of conventional angioplasty for the treatment of this disorder is that a small channel through the occlusion must be created to allow for passage of a guidewire and the angioplasty device. Conventional angioplasty may be successful in approximately 50% of patients by forcing a guidewire through the occlusion, dilating with a balloon and often placing stents across the freshly opened occlusion. Restenosis or reocclusion is higher in treated chronically occluded vessels compared to treating non-occluded or narrowed vessels. Many occlusions, however, cannot be treated using this technique. A variety of alternative technologies have been developed and evaluated including but not limited to laser, atherectomy, ultrasound, spectroscopy, and thrombolysis. None of these methods have proved advantageous. • [0024] Certain forms of narrowed blood vessels are not amenable to successful surgical or percutaneous treatment. These include but are not limited to diffusely diseased blood vessels, small diameter blood vessels, tortuous blood vessels, calcified blood vessels, and vessels that supply tissue beds with impeded vascular outflow. • [0025] A number of investigations have been reported using angiogenic factors injected into or applied to the exterior of arteries. Such angiogenic factors have included proteins, DNA, or gene fragments. Preliminary results have been encouraging but not definitive. A principal limitation of prior investigations has been the inability to delivery the angiogenic factors locally and over a sustained period of time. As such, efficacy has been compromised by the suboptimal delivery of angiogenic factors. • [0000] Overview of Angiogenesis • [0026] Blood vessel formation is an intricate process involving sequential interactions between the extra-cellular matrix (ECM), soluble and insoluble polypeptides, and cell surface receptors. The process begins during embryogenesis, as mesodermal cells differentiate into haemangioblasts that aggregate to form blood islands. The inner and outer island cells further differentiate into haematopoietic precursor cells and primitive endothelial cells (angioblasts), respectively. Basic fibroblast growth factor (bFGF) and the (VEGF-A) receptor are associated with these differentiation events (Carmeliet, P. and Collen, D. (1999)). • [0027] In a process known as vasculogenesis, the angioblasts, migrate and assemble into primitive blood capillaries (the capillary plexus) that comprise distinct luminal and exterior surfaces. Vasculogenesis involves such polypeptide factors as, VEGF-A, bFGF, fibronectin, αvβ3 integrin, VE cadherin, and transforming growth factor (TFG)-β1. The process also involves a regulatory tension between two VEGF-A receptors: VEGF receptor-2, which upregulates vasculogenesis, and VEGF receptor-1, which inhibits the process. The α5 integrin receptor may also play a role. The ECM and surrounding pericytes may infiltrate the primordial capillaries formed during vasculogenesis, causing invagination and bifurcation, resulting in capillary loops. The process is also mediated by VEGF-A, in concert with angiopoietins, the TIE receptors, and ECM polypeptides (Carmeliet, P. and Collen, D. (1999)). • [0028] In response to angiogenic factors, such as VEGF-A, the emerging capillary network gives rise to additional branches, extensions, and connections in a process called angiogenesis. During angiogenesis, the ECM of existing capillaries is proteolytically degraded by matrix metalloproteinases, as well as tPA, and uPA, at the site of the future blood vessel. Epithelial cells at the site of the ECM disruption divide and migrate toward the angiogenic factors, forming chords of endothelial cells that become new blood vessels. These emerging chords fuse with other capillaries in a process involving fibronectin and α4 integrin. VE-cadherin, Ang1, Ang2, tissue factor, TGF-β1 platelet-derived growth factor (PDGF)-B, TIE2, as well as other vascular endothelial growth factors (VEGFs), hepatocyte growth factor (HGF), insulin-like growth factor, epidermal growth factor, platelet-derived endothelial cell growth factor (PD-ECGF), platelet factor 4 (PF4), hypoxia-induced factor (HIF-1), thrombospondin (TSP-1), tumor necrosis factor (TNF), angiogenin, fibroblast growth factor receptor (FGFR), proliferin, plasminogen activator inhibitor type 1 (PAI-1), inteleukin 8 (IL-8), high molecular weigh kininogen (HMWK), and sphingosine 1-phosphate other have all been implicated in angiogenesis. Elastins and fibrillins are later deposited in the lumen of these vessels, most likely after the establishment of blood flow (Carmeliet, P. and Collen, D. (1999); Freedman, S. B. and Isner, J. M. (2002); Simons, M. (2001); Davda, J. and Labhasetwar, V. (2001); Zimmerman, M. A. et al. (2001); and references within). • [0029] The process of angiogenesis is by no means limited to embryogenesis. Angiogenesis is a natural response to hypoxia and ischemia and is intimately associated with normal physiological processes such as wound repair and placental growth. Angiogenesis is also associated with pathological diseases and conditions, including tumor growth (Freedman, S. B. and Isner, J. M. (2001); Davda, J. and Labhasetwar, V. (2001); Browder, T. et al. (2000); and references within). • [0030] In view of the importance of angiogenesis in human disease and wound repair, extensive research has been conducted to identify angiogenic agents useful for promoting angiogenesis in a clinical setting. Several angiogenic polypeptides shown to induce angiogenesis in vivo are described in greater detail, below. • [0000] Vascular Endothelial Growth Factor (VEGF): • [0031] VEGFs are a family of structurally related glycoproteins that promote proliferation and migration of endothelial cells and are expressed by epithelial tissues, neutrophils, and mononuclear cells. VEGFs also increase vascular permeability resulting in the release of a variety of plasma components. Although VEGFs share structural homology they differ with respect to heparin-binding activity. At present, the VEGF family includes VEGF (VEGF-A), VEGF-1, VEGF-2 (VEGF-C), VEGF-3 (VEGF-B), VEGF-D, VEGF-E, and another polypeptide designated placental growth factor. In addition, alternative splicing results in other isoforms of VEGF-1, i.e., VEGF121, VEGF 145, VEGF165, VEGF189, and VEGF206, wherein the subscript number refer to the number of amino acid residues in the mature polypeptide (Freedman, S. B. and Isner, J. M. (2002); Simons, M. (2001); Davda, J. and Labhasetwar, V. (2001); Zimmerman, M. A. et al. (2001); and references within). • [0000] Acidic and Basic Fibroblast Growth Factors: • [0032] Acidic FGF (aFGF, FGF-1) and basic FGF (bFGF, FGF-2) are members of a large family of polypeptides that use cell-surface heparin and heparin sulfate to mediate binding to target tyrosine kinase receptors. FGFs are ligands for various cell types and potent mitogens for endothelial cells. In response to FGF binding, endothelial cells produce proteases, such as plasminogen activator and metalloproteinases, which are involved in degredation of the extracellular matrix (Freedman, S. B. and Isner, J. M. (2002); Davda, J. and Labhasetwar, V. (2001); Nugent, M. A. and Iozzo, R. V. (2000); and references within). • [0000] Hypoxia-Induced Factor (HIF-1): • [0033] HIF-1 is a transcription factor that activates several genes associated with angiogenesis, including VEGFs, VEGF receptors, and Ang-2. Under normal physiological conditions, the alpha subunit of the polypeptide is rapidly degraded; however, hypoxic conditions result in decreased degradation of the alpha subunit and increased HIF-1 activity. In addition to binding hypoxia response elements of certain angiogenesis-associated genes, HIF-1 may also stabilize RNAs by binding to the 3′ (and possibly 5′) untranslated regions, and may also be involved in cap-independent translation of angiogenesis-associated mRNAs (Simons, M. (2001); Freedman, S. B. and Isner, J. M. (2001); and references within). • [0000] Hepatocyte Growth Factor (HGF): • [0034] HGF promotes endothelial cell proliferation, migration, and invasion; VEGF production from smooth muscle cells; and protease production (Davda, J. and Labhasetwar, V. (2001); Webster, K. A. (2000); and references within). • [0035] Experimental data further suggest that multiple angiogenic factors, administered at specific times during angiogenesis, are required to mediate the formation of mature and stable blood vessels. For example, VEGF stimulates the production of thin-walled, sinusoidal vessels that lack secondary branching and complexity. However, subsequent administration of Ang1 induces further branching and recruits smooth muscle cells (and perhaps other periendothelial support cells) to the walls of the immature VEGF-induced vessels. • [0036] The identification of polypeptides involved in angiogenesis is an important step in the development of clinical therapies for patients suffering from ischemia or hypoxia. However, simple systemic treatment with angiogenic factors is likely to cause hypotension and edema (e.g., as observed with VEGF) as well as systemic toxicity, thrombocytopenia, and anemia (e.g., as observed with FGF) (Freedman, S. B. and Isner, J. M. (2001); Davda, J. and Labhasetwar, V. (2001)). Treatment of local ischemia, for example, ischemia resulting from chronic total occlusions of cardiac and peripheral arteries, requires the delivery of angiogenic agents only to selected physiological targets (see, e.g., Simons, M. (2001)). However, the absence in the art of a suitable beneficial agent delivery vehicle has frustrated attempts to deliver angiogenic factors in a clinical setting. • [0000] Expandable Medical Devices for the Delivery of Beneficial Agents • [0037] Permanent and biodegradable devices have been developed for implantation within a body passageway to maintain patency of the passageway. These devices have typically been introduced percutaneously, and transported transluminally until positioned at a desired location. These devices are then expanded either mechanically, such as by the expansion of a mandrel or balloon positioned inside the device, or expand themselves by releasing stored energy upon actuation within the body. Once expanded within the lumen, these devices, called stents, become encapsulated within the body tissue and remain a permanent implant. • [0038] Known stent designs include monofilament wire coil stents (U.S. Pat. No. 4,969,458); welded metal cages (U.S. Pat. Nos. 4,733,665 and 4,776,337); and thin-walled metal cylinders with axial slots formed around the circumference (U.S. Pat. Nos. 4,733,665; 4,739,762; and 4,776,337). Known construction materials for use in stents include polymers, organic fabrics, and biocompatible metals, such as, stainless steel, gold, silver, tantalum, titanium, cobalt based alloys, and shape memory alloys such as Nitinol. • [0039] U.S. Pat. Nos. 4,733,665; 4,739,762; and 4,776,337 disclose expandable and deformable interluminal vascular grafts in the form of thin-walled tubular members with axial slots allowing the members to be expanded radially outwardly into contact with a body passageway. After insertion, the tubular members are mechanically expanded beyond their elastic limit and thus permanently fixed within the body. • [0040] Coated stents, designed to release various beneficial agents, have shown promising results in reducing restenosis, a condition commonly associated with stent implantation. For example, U.S. Pat. No. 5,716,981 discloses a stent that is surface-coated with a composition comprising a polymer carrier and Paclitaxel (a well-known tubulin assembly inhibitor that is commonly used in the treatment of cancerous tumors). • [0041] However, a major technological obstacle facing the use of stents for the delivery of angiogenic agents is the thickness of the stent coating. Stent coatings are necessarily very thin, typically 5 to 8 microns. Since the surface area of the stent is comparatively large, the entire volume of the beneficial agent has a very short diffusion path to discharge into the surrounding tissue. This issue is especially problematic for therapies that require the prolonged delivery of a beneficial agent. While increasing the thickness of the surface coating improves drug release kinetics, it also results in an undesirable increase in overall stent thickness. • [0042] Thus, it would be desirable to provide a drug delivery stent capable of extended delivery of an angiogenic composition. • SUMMARY OF THE INVENTION • [0043] The instant invention satisfies a need in the art by providing, an expandable medical device and method to treat total chronic occlusions by delivering one or more angiogenic agents to an implantation site to stimulate angiogenesis. • [0044] In accordance with one aspect of the present invention, a method for treating an obstructed blood vessel includes identifying an obstructed blood vessel and identifying an implantation site at or near the obstruction in the blood vessel; delivering an expandable medical device into the obstructed blood vessel to the selected implantation site; implanting the medical device at the implantation site; and delivering an angiogenic composition from the expandable medical device to tissue at the implantation site over a sustained time period sufficient to reestablish adequate blood flow to the tissue. • [0045] In accordance with another aspect of the invention, a method of delivering an angiogenic composition to an obstructed blood vessel includes: • [0046] a) identifying an obstructed blood vessel and identifying an implantation site at or near the obstruction in the blood vessel; • [0047] b) providing an expandable medical device with an angiogenic composition; • [0048] c) delivering the expandable medical device with the angiogenic composition to the implantation site; and • d) stimulating angiogenesis by sustained delivery of the angiogenic composition over a time period sufficient to create self-sustaining blood vessels. • [0050] In accordance with a further aspect of the invention, a method of delivering a series of angiogenic compositions to a chronic total arterial occlusion includes: • a) identifying an obstructed blood vessel and identifying an implantation site at or near the obstruction in the blood vessel; • b) providing an expandable medical device with a first angiogenic composition and a second angiogenic arranged for sequential delivery from the stent; • c) delivering the expandable medical device with the first and second angiogenic compositions to the implantation site; and • d) delivering the first and second angiogenic compositions sequentially at the implantation site. • [0055] In accordance with an additional aspect of the present invention, a beneficial agent delivery device includes an expandable medical device having a plurality of struts with a plurality of openings and an angiogenic composition contained in the plurality of openings in a bioresorbable matrix. The angiogenic agent and matrix are configured for administration of the angiogenic agent to a mural side of the device over a period of at least one week. • [0056] In accordance with another aspect of the invention, a beneficial agent delivery device includes an expandable medical device having a plurality of struts with a plurality of openings, a first angiogenic agent contained in the plurality of openings, and a second angiogenic agent contained in the plurality of openings. The first and second angiogenic agents are arranged in the openings for sequential delivery to tissue surrounding the device. • BRIEF DESCRIPTION OF THE DRAWINGS • [0057] The invention will now be described in greater detail with reference to the preferred embodiments illustrated in the accompanying drawings, in which like elements bear like reference numerals, and wherein: • [0058] FIG. 1 is a cross-sectional perspective view of a portion of an expandable medical device with beneficial agent implanted in the lumen of an artery; • [0059] FIG. 2 is a perspective view of an expandable medical device showing a plurality of openings; • [0060] FIG. 3 is an expanded side view of a portion of the expandable medical device of FIG. 2; • [0061] FIG. 4 is an enlarged cross-section of an opening illustrating one or more beneficial agents provided in a plurality of layers; • [0062] FIG. 5 is an enlarged cross-section of an opening illustrating a plurality of beneficial agents provided for sequential delivery; and • [0063] FIG. 6 is an enlarged cross-section of an opening illustrating one or more beneficial agents provided in layer(s) that extend beyond a surface of the expandable medical device. • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS DEFINITIONS • [0064] As used herein, the following terms have the following meanings: Adventitia: The outermost connective tissue layer of a blood vessel. • [0065] Angiogenic agents: Angiogenic polypeptides, angiogenic polynucleotides, angiogenic polypeptide-encoding gene therapy delivery vectors, angiogenic small molecules, or active or inactive combinations thereof. • [0066] Angiogenic compositions: Compositions comprising angiogenic agents. • [0067] Angiogenic factors: Angiogenic polypeptides. • [0068] Arteriosclerosis: Hardening of the arteries produced by degenerative or hyperplasic changes to the intima of arteries or a progressive increase in muscle and elastic tissue in arterial walls. • [0069] Atherosclerosis: The most common form of arteriosclerosis characterized by deposits of lipid material in the intima of medium and large diameter arteries, resulting in partial or total occlusion of an affected vessel. • [0070] Beneficial agent: As used herein, the term “beneficial agent” is intended to have its broadest possible interpretation and is used to include any therapeutic agent or drug, as well as inactive agents such as barrier layers, carrier layers, therapeutic layers or protective layers. Beneficial agents include but are not limited to angiogenic polypeptides, polynucleotides, and small molecules. • [0071] Beneficial layers: Biodegradable layers comprising beneficial compositions. • [0072] Biodegradable: See Bioerodible, below. • [0073] Bioerodible: The characteristic of being bioresorbable and/or able to be broken down by either chemical or physical processes, upon interaction with a physiological environment. For example, a biodegradable or bioerodible matrix is broken chemically or physically into components that are metabolizable or excretable, over a period of time from minutes to years, preferably less than one year, while maintaining any requisite structural integrity in that same time period. • [0074] Chronic total occlusion: The complete blockage of a blood vessel for an indefinite period of time causing chronic hypoxia in the tissues normally supplied by the occluded blood vessels. • [0075] Erosion: The process by which components of a medium or matrix are bioresorbed and/or degraded and/or broken down by chemical or physical processes. For example in reference to biodegradable polymer matrices, erosion can occur by cleavage or hydrolysis of the polymer chains, thereby increasing the solubility of the matrix and availability of beneficial agents, or by physical dissolution and excretion. • [0076] Erosion rate: A measure of the amount of time it takes for the erosion process to occur, usually reported in unit-area per unit-time. • [0077] Hypoxia: Condition characterized by an abnormally low oxygen concentration in affected tissues. • [0078] Intima: The innermost layer of a blood vessel. • [0079] Ischemia: Local anemia resulting from obstructed blood flow to an affected tissue. • [0080] Matrix or biocompatible matrix: The terms “matrix” or “biocompatible matrix” are used interchangeably to refer to a medium or material that, upon implantation in a subject, does not elicit a detrimental response sufficient to result in the rejection of the matrix. The matrix typically does not provide any therapeutic responses itself, though the matrix may contain or surround a beneficial agent, as defined herein. A matrix is also a medium that may simply provide support, structural integrity or structural barriers. The matrix may be polymeric, non-polymeric, hydrophobic, hydrophilic, lipophilic, amphiphilic, and the like. The matrix may be bioerodible or non-bioerodible. • [0081] Media: The middle layer of a blood vessel. • [0082] Paclitaxel: An anticancer drug that prevents depolymerization of microtubules thereby allowing initial microtubule formation but preventing subsequent rearrangement necessary for cell growth. • [0083] Pharmaceutically acceptable: The characteristic of being non-toxic to a host or patient and suitable for maintaining the stability of a beneficial agent and allowing the delivery of the beneficial agent to target cells or tissue. • [0084] Polymer: The term “polymer” refers to molecules formed from the chemical union of two or more repeating units, called monomers. Accordingly, included within the term “polymer” may be, for example, dimers, trimers and oligomers. The polymer may be synthetic, naturally-occurring or semisynthetic. In preferred form, the term “polymer” refers to molecules which typically have a Mw greater than about 3000 and preferably greater than about 10,000 and a Mw that is less than about 10 million, preferably less than about a million and more preferably less than about 200,000. Examples of polymers include but are not limited to, poly-α-hydroxy acid esters such as, polylactic acid (PLLA or DLPLA), polyglycolic acid, polylactic-co-glycolic acid (PLGA), polylactic acid-co-caprolactone; poly (block-ethylene oxide-block-lactide-co-glycolide) polymers (PEO-block-PLGA and PEO-block-PLGA-block-PEO); polyethylene glycol and polyethylene oxide, poly (block-ethylene oxide-block-propylene oxide-block-ethylene oxide); polyvinyl pyrrolidone; polyorthoesters; polysaccharides and polysaccharide derivatives such as polyhyaluronic acid, poly (glucose), polyalginic acid, chitin, chitosan, chitosan derivatives, cellulose, methyl cellulose, hydroxyethylcellulose, hydroxypropylcellulose, carboxymethylcellulose, cyclodextrins and substituted cyclodextrins, such as beta-cyclo dextrin sulfo butyl ethers; polypeptides, and proteins such as polylysine, polyglutamic acid, albumin; polyanhydrides; polyhydroxy alkonoates such as polyhydroxy valerate, polyhydroxy butyrate, and the like. • [0085] Radially inner or radially interior surface: With respect to expandable medical device struts, a radially inner or interior surface refers to a surface that has a substantially equivalent radius to that of the interior strut surface. • [0086] Radially intermediate surface: With respect to expandable medical device struts, a radially intermediate surface refers to a surface that has a substantially equivalent radius intermediate between that of the interior and exterior strut surfaces. • [0087] Restenosis: The recurrence of stenosis after a surgical procedure, including the infiltration of smooth muscle cells into the bore of an expandable medical device implanted to correct a previous chronic occlusion. • [0088] Self-sustaining blood vessels: Blood vessels that continue to perfuse tissue for a period of at least 12 months following their induction, for example, by angiogenic agents. • [0000] Sequential delivery: Delivery of beneficial agents in a specified sequence, for example where about 75% of a first agent is delivered before about 50% of a second agent is delivered. • [0089] Stenosis: A restriction or occlusion of any vessel or orifice. • [0090] Thrombosis: The formation of a thrombus (clot) within a blood vessel, often leading to partial or total occlusion of the blood vessel, leading to a condition of hypoxia in tissues supplied by the occluded blood vessel. • [0091] The present invention relates to the use of expandable medical devices, and more particularly to the use of expandable medical devices having a plurality of beneficial agent containing openings to deliver beneficial agents to an implantation site over an extended period of time. The invention also relates to the use of expandable medical devices to deliver different beneficial agents, or combinations of agents, to a wall of a blood vessel to stimulate local angiogenesis. In one embodiment of the invention, beneficial agents are delivered to one or more sites of chronic total occlusion. Disorders and conditions associated with chronic total occlusions include but are not limited to distal embolization, arterial ruptures, acute myocardial infarction, myocardial infarction, groin hematomas, contrast-induced nephropathies, angina pectoris, digital microcirculation, chronic thromboembolic pulmonary hypertension, chronic subcritical ischemia, death, and other disorders or conditions resulting from chronic total chronic occlusion of coronary arteries. • [0092] One embodiment of the expandable medical device used in the present invention, shown disposed longitudinally in an artery, is depicted in FIG. 1. Another embodiment of an expandable medical device is shown in FIGS. 2 and 3. The expandable medical devices 10, as shown in FIGS. 1-3, include a plurality of struts 12 which are interconnected by ductile hinges 40, such that as the device expands, the ductile hinges deform while the struts remain undeformed. Openings 14 in the struts 12 provide reservoirs for delivering a beneficial agent to tissue. The openings 14 in the embodiments of FIGS. 1-3 are provided in non-deforming elements of the expandable medical device. However, other device structures may also be used. • [0093] The angiogenic agents 16 are disposed in the openings 14 and may comprise one or more angiogenic polypeptides. The angiogenic polypeptides may be native or recombinant polypeptides. Examples of angiogenic polypeptides include VEGF, FGF, and HGF, and Ang1. Angiogenic polypeptides may be provided using polynucleotides encoding angiogenic polypeptides. Polynucleotides may be delivered using a gene delivery vector, including but not limited to a retrovirus vector or an adenovirus vector. The angiogenic compositions may also comprise angiogenic small molecules. Angiogenic compositions may comprise combinations of angiogenic polypeptides, polynucleotides, and small molecules. Angiogenic compositions and combinations thereof may be delivered over a period of one or two weeks or months, preferably at least one month, following expandable medical device implantation to stimulate local angiogenesis. The vessels or network of vessels created by the sustained delivery of the angiogenic composition are self-sustaining and provide blood flow to tissues, which were rendered ischemic due to a chronic total occlusion. • [0094] FIG. 1 is a cross-sectional perspective view of a portion of an expandable medical device 10 implanted in a lumen 116 of an artery 100. A wall of the artery 100 includes three distinct tissue layers, the intima 110, the media 112, and the adventitia 114. The expandable medical device 10 is similar to the expandable medical device described in U.S. Pat. No. 6,241,762, herein incorporated by reference in its entirety. U.S. Pat. No. 6,241,762 describes an expandable medical device design that remedies performance deficiencies of previous expandable medical devices by the use of ductile hinges and non-deforming stents. • [0095] FIG. 1 further depicts the peripheral struts 12 of the expandable medical device 10 having openings 14. The presence of openings 14 in the expandable medical device struts 12 containing a beneficial agent 16 provide a number of important advantages. For example, the openings 14 allow the use of a substantially larger volume of beneficial agent 16 than can be used in the case of a coating, increasing the total amount of beneficial agent available for delivery to the site of a chronic total occlusion. The ability to dispose a beneficial agent 16 in the expandable medical device 10 openings 14 also facilitates the gradual release of the beneficial agent over an extended delivery period, compared to the use of a simple coating. Furthermore, the use of openings 14 that are essentially sealed at one end by, for example, a barrier layer 18, allows the release of beneficial agents 16 in only one direction relative to the implanted expandable medical device 10. For example, as shown in FIG. 1, beneficial agents 16 may be delivered to an exterior surface 24 of the expandable medical device 10 adjacent to the intima 110 of the artery 100 while essentially no beneficial agent is directed to the lumen 116 of the artery in which the expandable medical device is implanted. The barrier layer 18 in the expandable medical device 10 openings 14 minimizes diffusion of beneficial agents 16 in the direction of the barrier layer allowing directional delivery of the agents. • [0096] FIG. 2 is a perspective view of one embodiment of an expandable medical device 10 showing a plurality of openings 14 in the struts 12 of the device. • [0097] FIG. 3 is an expanded side view of a portion of the expandable medical device 10 of FIG. 2, further showing the arrangement of openings 14 in the struts 12 of the device. • [0098] In the embodiment of FIGS. 2 and 3, the struts 12 are non-deforming struts connected by ductile hinges 20. The ductile hinges 20 allow expansion or compression of the expandable medical device 10 while allowing the struts 12, and thus the openings 14 to remain undeformed during expansion or compression. • [0099] Enlarged cross-sections of openings, illustrating one or more beneficial agents provided in a plurality of layers, are shown in FIGS. 4-6. As shown in the embodiment of FIG. 4, the opening 14 in the strut 12 is provided with a plurality of layers of the beneficial agent 16 combined with a bioerodible matrix material. In one embodiment of the invention, the total depth of the opening 14 is about 50 to about 140 microns (μM) and a typical layer thickness is about 2 to about 50 microns, preferably about 12 microns. Each layer is thus individually about twice as thick as the typical coating applied to surface-coated expandable medical devices. There can be two layers in each opening 14 or as many as six to twenty layers in an opening, with a total beneficial agent thickness about 25 to about 28 times greater than a typical surface coating. According to one embodiment of the invention, the openings 14 each have a cross-sectional area of at least about 5×10−6 square inches, and preferably at least about 10×10−6 square inches. • [0100] Since each layer of beneficial agent may be created independently, individual chemical compositions and pharmacokinetic properties can be imparted to each layer. Numerous useful arrangements of layers can be formed, some of which will be described below. Each of the layers may include one or more agents 16 in the same or different proportions from layer to layer. The layers may be solid, porous, or filled with other drugs or excipients. • [0101] Although multiple discrete layers are shown for ease of illustration, the layers may be discrete layers with independent compositions or blended to form a continuous polymer matrix and agent inlay. For example, the layers can be deposited separately in layers of a drug, polymer, solvent composition which are then blended together in the openings by the action of the solvent. The agent may be distributed within an inlay uniformly or in a concentration gradient. Examples of some methods of creating such layers and arrangements of layers are described in U.S. Patent Publication No. 2002/0082680, published on Jun. 27, 2002, which is incorporated herein by reference in its entirety. The use of drugs in combination with polymers within the openings 14 allows the medical device 10 to be designed with drug release kinetics tailored to the specific drug delivery profile desired. • [0102] FIG. 4 shows an expandable medical device 10 with a simple arrangement of layers in the opening 14. The layers include identical layers of at least one beneficial agent suspended or dissolved in a bioerodible matrix that together establish a uniform, homogeneous distribution of beneficial agent. The erosion of the bioerodible matrix results in the release of beneficial agent at a release rate over time corresponding to the erosion rate of the matrix. Use of bioerodible carriers in combination with openings is especially useful, to assure essentially 100% discharge of the beneficial agent within a predetermined period of time. • [0103] The concentration of the same angiogenic agents in the layers could be varied from layer to layer, facilitating release profiles of a predetermined shape. Progressively, increasing concentrations of angiogenic agent at layers of greater depth results in the release of the agent at an approximately linear rate over time or an approximately zero order delivery profile. • [0104] Alternatively, different layers could comprise different angiogenic agents or an angiogenic agent and another therapeutic agent, providing the ability to release different agents at different times following implantation of the expandable medical device 10. In one embodiment of the invention, the different layers are eroded sequentially such that the majority of the beneficial agent in a first layer at an outer surface of the device 10 is delivered before the majority of beneficial agent of the second or underlying layer, and so forth. • [0105] FIG. 5 illustrates an alternative embodiment of an expandable medical device 10 including two beneficial agents for sequential delivery to a mural side of the device at an implantation site. In FIG. 5, a plurality of first layers 44 are provided for delivering a first beneficial agent and a plurality of second layers 46 are provided for delivering a second beneficial agent. The first and second beneficial agents are delivered in a sequential manner such that a majority of the first beneficial agent is delivered before a majority of the second beneficial agent. As in the embodiment of FIG. 4, the embodiment of FIG. 5 includes a barrier layer 18 for directing the first and second beneficial agents to the wall of the artery in which the expandable medical device is implanted. • [0106] The erosion rates of individual layers may be further controlled by creating contours on the surfaces of selected layers, such as those illustrated in FIG. 6. In another example, ribs on the surface of a layer increase the overall surface area and increase the rate on initial release. Elevated or protruding portions of one layer, e.g., that extend into depressed areas in another layer, cause leading or trailing characteristics of the release profiles of the beneficial agents in the protruding or depressed layers. • [0107] Barrier layers 18 as shown in FIGS. 4-6, can be used to control beneficial agent release kinetics in several ways. First, a barrier layer 18 with a substantially non-biodegradable barrier material could be used to essentially prevent the diffusion of beneficial agents 16 in one direction, thereby insuring the delivery of beneficial agents to primarily one surface of the expandable medical device 10. Alternatively, biodegradable barrier layers 18 with predetermined erosion times longer than the erosion times of the biodegradable matrix used in the layers of the beneficial agents are also useful for directing beneficial agents to the exterior surface of the implanted expandable medical device 10 but will eventually erode providing a termination of a treatment at a predetermined time. • [0108] In the illustrated embodiments of FIGS. 4-6, the barrier layer 18 is disposed at the interior surface 22 or luminal side of the expandable medical device openings 14. Layers of beneficial agents (i.e., angiogenic agents) are disposed on top of the barrier layer 18, allowing the delivery of beneficial agents to the exterior surface 24 of the expandable medical device 10 but essentially preventing the delivery of beneficial agents to the interior surface 22 of the expandable medical device 14. The release rates of the beneficial agents can be controlled independently depending on the particular bioerodible matrix selected to deliver each agent. Release rates and release profiles can also be controlled by separating layers, layer thickness, and many other factors. • [0109] The presence of openings 14 or wells also allows layers of bioerodible matrix and therapeutic agent to be deposited beyond the exterior surface 24 (or interior surface 22) of the expandable medical device 10 as the matrix and therapeutic agent material disposed within the openings or wells serves as an anchor for a dome, cone, or other raised mass of matrix and therapeutic agent material outside the openings or wells. • [0110] FIG. 6 illustrates an extending cone 26 of matrix and therapeutic agent material outside of the expandable medical device 10. The cone can comprise, for example, the first of a number of angiogenic agents (or the first combination of angiogenic agents) 16 to be delivered to a target artery 100. Upon implantation of the expandable medical device 10, the cones 26 of matrix material are forced into contact with the intima 110 of the artery 100, delivering the beneficial agent 16 in a concentrated form with minimal opportunity for diffusion of the beneficial agents away from the target cells or tissue. • [0111] In addition, cones 26 of sufficient stiffness, as determined primarily by the matrix material, are able to mechanically penetrate the intima 110 or the intima and media 112 of the target artery 100 and deliver one or more beneficial agents 16 directly to the media 112 and/or the adventitia 114, where angiogenic factors are most likely to have an effect. As the outer cone 26 of material dissolves, new layers of bioerodible matrix are exposed, delivering additional beneficial agents 16 to the vessel wall 118. In one embodiment, only the outermost layer is conical in shape. In another embodiment, more than one layer is conical in shape. The penetration of the intima 110 or the intima and media 112 is of particular benefit for beneficial agents 16 which tend to pass slowly through or accumulate in these layers of tissue. • [0112] In one embodiment, the openings or wells contain one or more angiogenic agents, including but not limited to angiogenic polypeptides. As used herein, angiogenic polypeptides include polypeptides that directly or indirectly modulate angiogenesis in a human, including but not limited to the angiogenic polypeptides referred to above and below. • [0113] Polypeptides refer to full-length polypeptides, truncated polypeptides, chimeric polypeptides, variant polypeptides, polypeptide fragments, conjugated polypeptides, or synthetic polypeptides comprising naturally-occurring or synthetic amino acids. Any of the polypeptides may be glycosylated, phosphorylated, acylated, or otherwise modified. The invention includes the use of individual polypeptides, multiple polypeptides, polypeptides comprising multiple subunits, polypeptides requiring co-factors, and combinations thereof. • [0114] The polypeptides may be native or recombinant. The polypeptides may be obtained from natural sources or expressed in bacteria, yeast, or animal cells, including but not limited to mammalian cells. In a preferred embodiment of the invention, the polypeptides are human polypeptides. In another embodiment of the invention, the polypeptides are non-human primate polypeptides. In yet another embodiment of the invention, the polypeptide are mammalian polypeptides. In another embodiment of the invention, the polypeptides are truncated, chimeric, or variant polypeptides comprising one or more of the polypeptides referred to above. • [0115] The polypeptides may be active or inactive. Inactive polypeptides are useful, for example, for clinical experiments that require control expandable medical devices having one or more inactive beneficial agents and for blocking or modulating the activity of angiogenic receptors at some time coincident with or following expandable medical device implantation. The polypeptides may further include a proteolytic cleavage site, destruction sequence, or secondary binding site for one or more modulating agents to allow modulation of polypeptide activity, specificity, or stability, coincident with or following expandable medical device implantation. • [0116] In one embodiment, the openings or wells contain VEGF polypeptides in a bioerodible matrix. In a preferred embodiment, the VEGF polypeptide is VEGF-A or VEGF-145. In another embodiment, the openings or wells of the expandable medical device contain FGF polypeptides. In a preferred embodiment the polypeptide is bFGF or FGF-2. In yet another embodiment of the invention, the openings or wells of the expandable medical device contain one or more polypeptides selected from a matrix metalloproteinases, tPA, uPA, Ang, 1, Ang2, tissue factor, TGF-β1, PDGF-B, hepatocyte growth factor (HGF), insulin-like growth factor, epidermal growth factor, PD-ECGF, PF4, TSP-1, TNF, proliferin, plasminogen activator, IL-8, and HGF. • [0117] The angiogenic polypeptides may be conjugated to other molecules to, for example, modulate their stability, hydrophilicity, hydrophobicity, activity, or ability to interact with particular receptors, cells types, or tissues. In one embodiment of the invention, the polypeptides are conjugated to heparin or heparin sulfate. In another embodiment, the polypeptides are conjugated to naturally occurring or synthetic lipid molecules. • [0118] The practitioner will recognize that any polypeptide conjugate known in the art to be useful for, e.g., polypeptide stability, delivery, or modulation, may be used within the scope of the invention. Any number of different conjugates may be used in the instant invention. In addition, any subset or all the polypeptides used as part of the instant invention may be fully conjugated, partially conjugated, or conjugated with different molecules and disposed in the same layer or in different layers. • [0119] In another embodiment of the invention, the openings contain a plurality of different layers of beneficial agents, such that the dissolution of one layer exposes the next layer in series. • [0120] In one embodiment of the invention, a first layer or series of layers (i.e., the layers closest to the target cells) comprise VEGF and a second layer or layers (i.e., the adjacent layers disposed closer to the barrier layer) comprises an angiogenin. The delivery of VEGF to a site adjacent to a chronic total occlusion stimulates the production of immature, thin-walled, sinusoidal vessels. The subsequent delivery of an angiogenin, e.g., Ang1, induces further branching and recruits smooth muscle cells (and perhaps other periendothelial support cells) to the walls of the immature VEGF-A-induced vessels. In one example, VEGF is delivered over a period of about 4-8 weeks using an appropriately eroding bioerodible matrix. Dissolution of the VEGF-A-containing layer exposes the Ang1-containing layer. Ang1 is then delivered over a period of about 4-8 weeks using an appropriate bioerodible matrix. • [0121] In another embodiment of the invention, the first layer(s) comprises FGF and a second layer(s) comprises VEGF. In another embodiment of the invention, the first layer(s) comprises FGF and a second layer(s) comprises an angiogenin. In another embodiment of the invention, the first layer(s) comprises FGF, a second layer(s) comprises VEGF, and a third layer(s) comprises an angiogenin. In yet another embodiment of the invention, the first layer(s) comprises VEGF, a second layer(s) comprises FGF, and a third layer(s) comprises an angiogenin. In another embodiment of the invention, the first layer(s) comprises VEGF and FGF and a second layer(s) comprises an angiogenin. • [0122] In another embodiment of the invention, the first layer(s) comprises a protease capable of locally degrading the extracellular matrix of the blood vessel in which the expandable medical device is implanted. Examples of proteases that are useful for practicing the invention include but are not limited to matrix metalloproteases, uPA, and tPA. One or more subsequent layers comprise angiogenic polypeptides, or combinations of angiogenic polypeptides, such as those described above and below. • [0123] As an alternative to using angiogenic polypeptides or conjugated angiogenic polypeptides to promote beneficial effects, polynucleotides encoding angiogenic polypeptides are delivered using a gene therapy-based approach in combination with an expandable medical device. As used herein, polynucleotides refer to polynucleotides encoding one or more of the full-length, truncated, chimeric, variant, fragment, or other polypeptides referred to above. • [0124] Gene therapy reers to the delivery of exogenous genes to a cell or tissue, thereby causing target cells to express the exogenous gene product. Genes are typically delivered by either mechanical or vector-mediated methods. Mechanical methods include, but are not limited to, direct DNA microinjection, ballistic DNA-particle delivery, liposome-mediated transfection, and receptor-mediated gene transfer (Morgan, R. A. and Anderson, W. F. (1993) and references within). Vector-mediated delivery typically involves recombinant virus genomes, including but not limited to those of retroviruses, adenoviruses, adeno-associated viruses, herpesviruses, vaccinia viruses, picornaviruses, alphaviruses, and papovaviruses (Todd et al. (2000); and references within). • [0125] In one embodiment of the invention, a polynucleotide encoding an angiogenic polypeptide, or a portion of an angiogenic polypeptide, is cloned into a gene therapy delivery under control of a suitable promoter. In one embodiment of the invention, the vector is a retrovirus vector. In a preferred embodiment, the vector is a lentivirus vector. In a preferred embodiment, the retrovirus (e.g., lentivirus) vector infects and integrates into the genomes of target cells but does not generate infectious virus particles. Such retrovirus vectors typically require a packaging cell line to generate infectious particles. In another embodiment of the invention, the vector is an adenovirus vector. • [0126] The vectors may have a specific tropism for the target cell type, including for example, smooth muscle cells, vascular endothelial cells, or periocytes, or the vectors may be amphotropic, i.e., capable of infecting a variety of cell types. In one embodiment of the invention, the native or homologous promoter of the gene encoding the angiogenic polypeptide is used. In another embodiment of the invention, the promoter is, for example, a retrovirus long-terminal repeat (LTR) sequence, a cytomegalovirus (CMV) promoter, or a simian virus 40 (SV40) promoter. Target cell-specific promoters may also be useful for practicing the invention. In fact, one skilled in the art will recognize that many promoters can be used in the practice of the instant invention depending, for example, on the desired level of expression in the target cells, and the desired tissue-specific expression profiles. • [0127] Sufficiently purified vector may be provided in one or more biodegradable layers along with additional suitable pharmaceutical excipients, allowing the prolonged release of the vector and the continuous infection of new target cells. Cells infected with vector subsequently express the encoded polypeptides. Gene therapy vector delivery methods are useful, for example, for delivering any of the full-length, truncated, chimeric, variant, or fragment polypeptides, combinations of polypeptides, sequential combinations of polypeptides, or combinations thereof, described above and below. One skilled in the art will recognize the need to use different virus vectors or vectors with different cell tropisms when the particular virus vectors chosen to deliver beneficial agents do not permit super-infection of the same target cells with similar virus vectors encoding different beneficial polypeptides. • [0128] In another embodiment of the invention, polynucleotides encoding angiogenic polypeptides are delivered as naked DNA, liposome-associated DNA, or otherwise modified, conjugated, or encapsulated DNA encoding any of the full-length, truncated, chimeric, variant, or fragment polypeptides, combinations of polypeptides, sequential combinations of polypeptides, or combinations thereof, described above and below. • [0129] The invention also provides the use of small-molecule therapeutic agents that stimulate angiogenesis. Some of the small-molecule therapeutic agents include lipids, such as described in U.S. Pat. Nos. 4,888,324 and 5,756,453 which are incorporated herein by reference in their entirety; angiostatin fragments, such as described in U.S. Pat. No. 5,945,403 which is incorporated herein by reference in its entirety; nicotine, as described in U.S. Patent Publication No. 2002/0128294 which is incorporated herein by reference in its entirety; pyruvate compounds, such as described in U.S. Pat. No. 5,876,916 which is incorporated herein by reference in its entirety; and monobutyrin. • [0130] The delivery of angiogenic polypeptides and small molecules may be combined with mechanical and gene therapy-based gene delivery methods to deliver the same polypeptides or combinations of polypeptides by multiple methods or different polypeptides or combinations of polypeptides by multiple methods, simultaneously or sequentially. For example, VEGF-A polypeptide could be delivered in a first layer(s) and Ang1 could be delivered using a gene therapy vector in a second layer(s). • [0131] The angiogenic agents may be delivered over a period of weeks or months following expandable medical device implantation. The use of multiple beneficial layers allows the sequential release of different angiogenic agents, different combinations of angiogenic agents, different concentrations of angiogenic agents, or combinations thereof, for predetermined periods of time following expandable medical device implantation. • [0132] The present invention is also particularly well suited for the delivery of one or more additional therapeutic agents from a mural or luminal side of a stent in addition to the agent(s) delivered to the mural side of the stent for angiogenesis. Some murally delivered agents may include antineoplastics, antiangiogenics, angiogenic factors, antirestenotics, anti-thrombotics, such as heparin, antiproliferatives, such as paclitaxel and Rapamycin. • [0133] Some of the other therapeutic agents for use with the present invention which may be transmitted luminally or murally include, but are not limited to, antiproliferatives, antithrombins, immunosuppressants, antilipid agents, anti-inflammatory agents, antineoplastics, antiplatelets, angiogenic agents, anti-angiogenic agents, vitamins, antimitotics, metalloproteinase inhibitors, NO donors, estradiols, anti-sclerosing agents, and vasoactive agents, endothelial growth factors, estrogen, beta blockers, AZ blockers, hormones, statins, insulin growth factors, antioxidants, membrane stabilizing agents, calcium antagonists, retenoid, alone or in combinations with any therapeutic agent mentioned herein. Therapeutic agents also include peptides, lipoproteins, polypeptides, polynucleotides encoding polypeptides, lipids, protein-drugs, protein conjugate drugs, enzymes, oligonucleotides and their derivatives, ribozymes, other genetic material, cells, antisense, oligonucleotides, monoclonal antibodies, platelets, prions, viruses, bacteria, and eukaryotic cells such as endothelial cells, stem cells, ACE inhibitors, monocyte/macrophages or vascular smooth muscle cells to name but a few examples. The therapeutic agent may also be a pro-drug, which metabolizes into the desired drug when administered to a host. In addition, therapeutic agents may be pre-formulated as microcapsules, microspheres, microbubbles, liposomes, niosomes, emulsions, dispersions or the like before they are incorporated into the therapeutic layer. Therapeutic agents may also be radioactive isotopes or agents activated by some other form of energy such as light or ultrasonic energy, or by other circulating molecules that can be systemically administered. Therapeutic agents may perform multiple functions including modulating angiogenesis, restenosis, cell proliferation, thrombosis, platelet aggregation, clotting, and vasodilation. Anti-inflammatories include non-steroidal anti-inflammatories (NSAID), such as aryl acetic acid derivatives, e.g., Diclofenac; aryl propionic acid derivatives, e.g., Naproxen; and salicylic acid derivatives, e.g., aspirin, Diflunisal. Anti-inflammatories also include glucocoriticoids (steroids) such as dexamethasone, prednisolone, and triamcinolone. Anti-inflammatories may be used in combination with antiproliferatives to mitigate the reaction of the tissue to the antiproliferative. • [0134] Some of the agents described herein may be combined with additives which preserve their activity. For example additives including surfactants, antacids, antioxidants, and detergents may be used to minimize denaturation and aggregation of a protein drug, such as insulin. Anionic, cationic, or nonionic detergents may be used. Examples of nonionic additives include but are not limited to sugars including sorbitol, sucrose, trehalose; dextrans including dextran, carboxy methyl (CM) dextran, diethylamino ethyl (DEAE) dextran; sugar derivatives including D-glucosaminic acid, and D-glucose diethyl mercaptal; synthetic polyethers including polyethylene glycol (PEO) and polyvinyl pyrrolidone (PVP); carboxylic acids including D-lactic acid, glycolic acid, and propionic acid; detergents with affinity for hydrophobic interfaces including n-dodecyl-β-D-maltoside, n-octyl-β-D-glucoside, PEO-fatty acid esters (e.g. stearate (myrj 59) or oleate), PEO-sorbitan-fatty acid esters (e.g. Tween 80, PEO-20 sorbitan monooleate), sorbitan-fatty acid esters (e.g. SPAN 60, sorbitan monostearate), PEO-glyceryl-fatty acid esters; glyceryl fatty acid esters (e.g. glyceryl monostearate), PEO-hydrocarbon-ethers (e.g. PEO-10 oleyl ether; triton X-100; and Lubrol. Examples of ionic detergents include but are not limited to fatty acid salts including calcium stearate, magnesium stearate, and zinc stearate; phospholipids including lecithin and phosphatidyl choline; CM-PEG; cholic acid; sodium dodecyl sulfate (SDS); docusate (AOT); and taumocholic acid. • EXAMPLES Example 1 • [0135] In this example, a drug delivery stent substantially equivalent to the stent illustrated in FIGS. 2 and 3 having an expanded size of about 3 mm×17 mm is loaded with VEGF-145 in the following manner. The stent is positioned on a mandrel and a slow degrading layer or barrier layer is deposited into the openings in the stent. The barrier layer is high molecular weight PLGA provided on the luminal side to prevent substantial delivery of the angiogenic compositions to the luminal side of the device. The layers described herein are deposited in a dropwise manner and are delivered in liquid form by use of a suitable organic solvent, such as DMSO, NMP, or DMAc. The degradation rate of the barrier layer is selected so that the barrier layer does not degrade substantially until after the administration period. A plurality of layers of VEGF-145 and low molecular weight PLGA matrix are then deposited into the openings to form an inlay of drug for angiogenesis. The VEGF-145 and polymer matrix are combined and deposited in a manner to achieve a drug delivery profile which results in about 70% of the total drug released in about the first 2 days, about 100% released within about 30 days. A cap layer of low molecular weight PLGA, a fast degrading polymer, is deposited over the VEGF-145 layers to prevent the angiogenic agent from being released during transport, storage, and delivery of the stent to the implantation site. • Example 2 • [0136] In this example, a drug delivery stent substantially equivalent to the stent illustrated in FIGS. 2 and 3 having an expanded size of about 3 mm×17 mm is loaded with VEGF-145 and angiogenin in the following manner. The stent is positioned on a mandrel and a slow degrading layer or barrier layer is deposited into the openings in the stent. The barrier layer is high molecular weight PLGA provided on the luminal side to prevent substantial delivery of the angiogenic compositions to the luminal side of the device. The degradation rate of the barrier layer is selected so that the barrier layer does not degrade substantially until after the administration period. • [0137] A plurality of layers of angiogenin and low molecular weight PLGA matrix are then deposited into the openings to form an inlay of drug for angiogenesis. The angiogenin and polymer matrix are combined and deposited in a manner to achieve a drug delivery profile which results in administration in about 1 hour to about 5 days. A plurality of layers of VEGF-145 and low molecular weight PLGA matrix are then deposited into the openings to form an inlay of drug for angiogenesis. The VEGF-145 and polymer matrix are combined and deposited in a manner to achieve a drug delivery profile which results in administration in about 1 day to about 30 days. The arrangement of the VEGF-145 on the mural side and the angiogenin on the luminal side results in sequential delivery of the two agents. • [0138] A cap layer of low molecular weight PLGA, a fast degrading polymer, is deposited over the angiogenin layers to prevent the angiogenic agent from being released during transport, storage, and delivery of the stent to the implantation site. • [0139] While the invention has been described in detail with reference to the preferred embodiments thereof, it will be apparent to one skilled in the art that various changes and modifications can be made and equivalents employed, without departing from the present invention. Claims (21) 1. 1. A beneficial agent delivery device comprising: a) an expandable medical device having a plurality of struts with a plurality of openings; and b) an angiogenic composition contained in the plurality of openings in a bioresorbable matrix, the angiogenic agent and matrix configured for administration of the angiogenic agent to a mural side of the device over a period of at least one week. 2. 2. The device of claim 1, wherein the openings are provided with a barrier layer arranged at an inner surface of the expandable medical device strut. 3. 3. The device of claim 2, wherein the angiogenic composition is disposed radially outward of the barrier layer. 4. 4. The device of claim 1, wherein the angiogenic composition comprises one or more angiogenic polypeptides suspended in a bioerodible matrix. 5. 5. The device of claim 4, wherein the angiogenic polypeptides are native polypeptides. 6. 6. The device of claim 5, wherein the angiogenic polypeptides are recombinant polypeptides. 7. 7. The device of claim 5, wherein the angiogenic polypeptides are selected from the group consisting of VEGF, FGF, and HGF. 8. 8. The device of claim 5, wherein the angiogenic composition further comprises Ang1 polypeptides. 9. 9. The device of claim 1, wherein the angiogenic composition includes a first agent and a second agent, wherein the first and second agents are arranged to be delivered sequentially. 10. 10. The device of claim 9, wherein the first agent is VEGF and the second agent is angiogenin, and the first agent is delivered substantially before the second agent. 11. 11. The device of claim 9, wherein the first agent is configured to be delivered over a period of at least one week. 12. 12. The device of claim 9, wherein the second agent is configured to be delivered over a period of at least two weeks. 13. 13. The device of claim 1, wherein the angiogenic composition is configured to be delivered over a period of at least one month. 14. 14. The device of claim 1, wherein the angiogenic composition disposed in openings in the expandable medical device extends out of the openings to form protrusions extending from the device. 15. 15. A beneficial agent delivery device comprising: a) an expandable medical device having a plurality of struts with a plurality of openings; b) a first angiogenic agent contained in the plurality of openings; and c) a second angiogenic agent contained in the plurality of openings, wherein the first and second angiogenic agents are arranged in the openings for sequential delivery to tissue surrounding the device. 16. 16. The device of claim 15, wherein the openings are provided with a barrier layer arranged at an inner surface of the expandable medical device strut. 17. 17. The device of claim 16, wherein the first and second angiogenic compositions are disposed radially outward of the barrier layer. 18. 18. The device of claim 15, wherein the first and second angiogenic compositions are suspended in a bioerodible matrix. 19. 19. The device of claim 15, wherein the first and second angiogenic compositions are selected from the group consisting of VEGF, FGF, and HGF. 20. 20. The device of claim 15, wherein the first angiogenic composition is configured to be delivered over a period of at least one week. 21. 21. The device of claim 15, wherein the second angiogenic composition is configured to be delivered over a period of at least two weeks. US11392105 2002-11-08 2006-03-28 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor Abandoned US20060178735A1 (en) Priority Applications (3) Application Number Priority Date Filing Date Title US42489602 true 2002-11-08 2002-11-08 US10705110 US20040143321A1 (en) 2002-11-08 2003-11-10 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor US11392105 US20060178735A1 (en) 2002-11-08 2006-03-28 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor Applications Claiming Priority (1) Application Number Priority Date Filing Date Title US11392105 US20060178735A1 (en) 2002-11-08 2006-03-28 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor Publications (1) Publication Number Publication Date US20060178735A1 true true US20060178735A1 (en) 2006-08-10 Family ID=32312886 Family Applications (2) Application Number Title Priority Date Filing Date US10705110 Abandoned US20040143321A1 (en) 2002-11-08 2003-11-10 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor US11392105 Abandoned US20060178735A1 (en) 2002-11-08 2006-03-28 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor Family Applications Before (1) Application Number Title Priority Date Filing Date US10705110 Abandoned US20040143321A1 (en) 2002-11-08 2003-11-10 Expandable medical device and method for treating chronic total occlusions with local delivery of an angiogenic factor Country Status (5) Country Link US (2) US20040143321A1 (en) EP (1) EP1575638A1 (en) JP (1) JP2006505364A (en) CA (1) CA2505576A1 (en) WO (1) WO2004043509A1 (en) Cited By (10) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US20050059991A1 (en) * 1999-05-20 2005-03-17 Shanley John F. Expandable medical device delivery system and method US20050182390A1 (en) * 2004-02-13 2005-08-18 Conor Medsystems, Inc. Implantable drug delivery device including wire filaments US20050234544A1 (en) * 2002-09-20 2005-10-20 Conor Medsystems, Inc. Expandable medical device with openings for delivery of multiple beneficial agents US20060079956A1 (en) * 2004-09-15 2006-04-13 Conor Medsystems, Inc. Bifurcation stent with crushable end and method for delivery of a stent to a bifurcation US20060122688A1 (en) * 2004-12-08 2006-06-08 Conor Medsystems, Inc. Expandable medical device with differential hinge performance US20090304767A1 (en) * 2008-06-05 2009-12-10 Boston Scientific Scimed, Inc. Bio-Degradable Block Co-Polymers for Controlled Release US7658758B2 (en) 2001-09-07 2010-02-09 Innovational Holdings, Llc Method and apparatus for loading a beneficial agent into an expandable medical device US7758636B2 (en) 2002-09-20 2010-07-20 Innovational Holdings Llc Expandable medical device with openings for delivery of multiple beneficial agents US7842083B2 (en) 2001-08-20 2010-11-30 Innovational Holdings, Llc. Expandable medical device with improved spatial distribution US8449901B2 (en) 2003-03-28 2013-05-28 Innovational Holdings, Llc Implantable medical device with beneficial agent concentration gradient Families Citing this family (78) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US7070590B1 (en) * 1996-07-02 2006-07-04 Massachusetts Institute Of Technology Microchip drug delivery devices US7341598B2 (en) 1999-01-13 2008-03-11 Boston Scientific Scimed, Inc. Stent with protruding branch portion for bifurcated vessels US7713297B2 (en) 1998-04-11 2010-05-11 Boston Scientific Scimed, Inc. Drug-releasing stent with ceramic-containing layer ES2332869T3 (en) * 1999-11-17 2010-02-15 Boston Scientific Limited microfabricated devices for delivery of molecules in carrier fluids. JP2003525048A (en) * 2000-03-02 2003-08-26 インサイト・ゲノミックス・インコーポレイテッド Lipid metabolism enzyme JP2003534870A (en) * 2000-06-05 2003-11-25 シメッド ライフ システムズ インコーポレイテッド Intravascular stents having increased film storage capacitor US6783543B2 (en) * 2000-06-05 2004-08-31 Scimed Life Systems, Inc. Intravascular stent with increasing coating retaining capacity US7208010B2 (en) 2000-10-16 2007-04-24 Conor Medsystems, Inc. Expandable medical device for delivery of beneficial agent DE60142131D1 (en) * 2000-10-16 2010-06-24 Conor Medsystems Inc The expandable medical device for delivering a beneficial agent WO2003002243A3 (en) 2001-06-27 2004-03-04 Remon Medical Technologies Ltd Method and device for electrochemical formation of therapeutic species in vivo US7326245B2 (en) * 2002-01-31 2008-02-05 Boston Scientific Scimed, Inc. Medical device for delivering biologically active material EP1628597A4 (en) * 2003-05-28 2008-12-10 Conor Medsystems Inc Methods of delivering anti-restenotic agents from a stent WO2005122959A3 (en) 2004-06-08 2007-03-15 Advanced Stent Tech Inc Stent with protruding branch portion for bifurcated vessels US20060034884A1 (en) * 2004-08-10 2006-02-16 Stenzel Eric B Coated medical device having an increased coating surface area US20060051391A1 (en) * 2004-09-09 2006-03-09 Dvoskin Victor O Device for the controlled administration of substances to be inserted in a body cavity WO2006058434A1 (en) 2004-12-02 2006-06-08 Strauss Bradley H Augmentation of intraluminal microvessel formation to facilitate guide wire crossing in chronic total occlusions US8221824B2 (en) 2005-02-03 2012-07-17 Boston Scientific Scimed, Inc. Deforming surface of drug eluting coating to alter drug release profile of a medical device US20070112414A1 (en) * 2005-09-08 2007-05-17 Conor Medsystems, Inc. System and method for local delivery of antithrombotics US7540881B2 (en) 2005-12-22 2009-06-02 Boston Scientific Scimed, Inc. Bifurcation stent pattern US8840660B2 (en) 2006-01-05 2014-09-23 Boston Scientific Scimed, Inc. Bioerodible endoprostheses and methods of making the same US8089029B2 (en) 2006-02-01 2012-01-03 Boston Scientific Scimed, Inc. Bioabsorbable metal medical device and method of manufacture US20070184083A1 (en) * 2006-02-07 2007-08-09 Medtronic Vascular, Inc. Drug-Eluting Device for Treatment of Chronic Total Occlusions US20070224235A1 (en) 2006-03-24 2007-09-27 Barron Tenney Medical devices having nanoporous coatings for controlled therapeutic agent delivery US8187620B2 (en) 2006-03-27 2012-05-29 Boston Scientific Scimed, Inc. Medical devices comprising a porous metal oxide or metal material and a polymer coating for delivering therapeutic agents US8048150B2 (en) 2006-04-12 2011-11-01 Boston Scientific Scimed, Inc. Endoprosthesis having a fiber meshwork disposed thereon US20070275035A1 (en) * 2006-05-24 2007-11-29 Microchips, Inc. Minimally Invasive Medical Implant Devices for Controlled Drug Delivery US8815275B2 (en) 2006-06-28 2014-08-26 Boston Scientific Scimed, Inc. Coatings for medical devices comprising a therapeutic agent and a metallic material US8771343B2 (en) 2006-06-29 2014-07-08 Boston Scientific Scimed, Inc. Medical devices with selective titanium oxide coatings CA2659761A1 (en) 2006-08-02 2008-02-07 Boston Scientific Scimed, Inc. Endoprosthesis with three-dimensional disintegration control JP2010503469A (en) 2006-09-14 2010-02-04 ボストン サイエンティフィック リミテッド Medical device having a drug eluting coating EP2959925A1 (en) 2006-09-15 2015-12-30 Boston Scientific Limited Medical devices and methods of making the same ES2368125T3 (en) 2006-09-15 2011-11-14 Boston Scientific Scimed, Inc. bioerodible endoprostheses biostable inorganic layers. US8808726B2 (en) 2006-09-15 2014-08-19 Boston Scientific Scimed. Inc. Bioerodible endoprostheses and methods of making the same CA2663271A1 (en) 2006-09-15 2008-03-20 Boston Scientific Limited Bioerodible endoprostheses and methods of making the same CA2663762A1 (en) 2006-09-18 2008-03-27 Boston Scientific Limited Endoprostheses US7951191B2 (en) 2006-10-10 2011-05-31 Boston Scientific Scimed, Inc. Bifurcated stent with entire circumferential petal US7981150B2 (en) 2006-11-09 2011-07-19 Boston Scientific Scimed, Inc. Endoprosthesis with coatings CA2668765A1 (en) * 2006-11-16 2008-05-29 Boston Scientific Limited Stent with differential timing of abluminal and luminal release of a therapeutic agent US7842082B2 (en) 2006-11-16 2010-11-30 Boston Scientific Scimed, Inc. Bifurcated stent DE602007010669D1 (en) 2006-12-28 2010-12-30 Boston Scient Ltd hear it US8431149B2 (en) 2007-03-01 2013-04-30 Boston Scientific Scimed, Inc. Coated medical devices for abluminal drug delivery US8070797B2 (en) 2007-03-01 2011-12-06 Boston Scientific Scimed, Inc. Medical device with a porous surface for delivery of a therapeutic agent US8067054B2 (en) 2007-04-05 2011-11-29 Boston Scientific Scimed, Inc. Stents with ceramic drug reservoir layer and methods of making and using the same US7976915B2 (en) 2007-05-23 2011-07-12 Boston Scientific Scimed, Inc. Endoprosthesis with select ceramic morphology US7942926B2 (en) 2007-07-11 2011-05-17 Boston Scientific Scimed, Inc. Endoprosthesis coating US8002823B2 (en) 2007-07-11 2011-08-23 Boston Scientific Scimed, Inc. Endoprosthesis coating US9284409B2 (en) 2007-07-19 2016-03-15 Boston Scientific Scimed, Inc. Endoprosthesis having a non-fouling surface US7931683B2 (en) 2007-07-27 2011-04-26 Boston Scientific Scimed, Inc. Articles having ceramic coated surfaces US8815273B2 (en) 2007-07-27 2014-08-26 Boston Scientific Scimed, Inc. Drug eluting medical devices having porous layers US8221822B2 (en) 2007-07-31 2012-07-17 Boston Scientific Scimed, Inc. Medical device coating by laser cladding WO2009020520A1 (en) 2007-08-03 2009-02-12 Boston Scientific Scimed, Inc. Coating for medical device having increased surface area US20110137243A1 (en) * 2007-09-06 2011-06-09 Abbott Cardiovascular Systems Inc. Coating On A Balloon Device US7959669B2 (en) 2007-09-12 2011-06-14 Boston Scientific Scimed, Inc. Bifurcated stent with open ended side branch support US8052745B2 (en) 2007-09-13 2011-11-08 Boston Scientific Scimed, Inc. Endoprosthesis US20090076591A1 (en) * 2007-09-19 2009-03-19 Boston Scientific Scimed, Inc. Stent Design Allowing Extended Release of Drug and/or Enhanced Adhesion of Polymer to OD Surface US7938855B2 (en) 2007-11-02 2011-05-10 Boston Scientific Scimed, Inc. Deformable underlayer for stent US8029554B2 (en) 2007-11-02 2011-10-04 Boston Scientific Scimed, Inc. Stent with embedded material US8216632B2 (en) 2007-11-02 2012-07-10 Boston Scientific Scimed, Inc. Endoprosthesis coating US7833266B2 (en) * 2007-11-28 2010-11-16 Boston Scientific Scimed, Inc. Bifurcated stent with drug wells for specific ostial, carina, and side branch treatment US8277501B2 (en) 2007-12-21 2012-10-02 Boston Scientific Scimed, Inc. Bi-stable bifurcated stent petal geometry US8920491B2 (en) 2008-04-22 2014-12-30 Boston Scientific Scimed, Inc. Medical devices having a coating of inorganic material US8016799B2 (en) * 2008-04-22 2011-09-13 Medtronic Vascular, Inc. Catheter having a detachable tip WO2009132176A3 (en) 2008-04-24 2010-09-02 Boston Scientific Scimed, Inc. Medical devices having inorganic particle layers US7998192B2 (en) 2008-05-09 2011-08-16 Boston Scientific Scimed, Inc. Endoprostheses US8932340B2 (en) 2008-05-29 2015-01-13 Boston Scientific Scimed, Inc. Bifurcated stent and delivery system US8236046B2 (en) 2008-06-10 2012-08-07 Boston Scientific Scimed, Inc. Bioerodible endoprosthesis WO2009155328A3 (en) 2008-06-18 2010-09-16 Boston Scientific Scimed, Inc. Endoprosthesis coating US7951193B2 (en) 2008-07-23 2011-05-31 Boston Scientific Scimed, Inc. Drug-eluting stent US7985252B2 (en) 2008-07-30 2011-07-26 Boston Scientific Scimed, Inc. Bioerodible endoprosthesis JP2011530347A (en) 2008-08-07 2011-12-22 エクソジェネシス コーポレーション Drug delivery system and method of manufacturing the drug delivery system US8382824B2 (en) 2008-10-03 2013-02-26 Boston Scientific Scimed, Inc. Medical implant having NANO-crystal grains with barrier layers of metal nitrides or fluorides US8231980B2 (en) 2008-12-03 2012-07-31 Boston Scientific Scimed, Inc. Medical implants including iridium oxide US8545459B2 (en) * 2009-02-25 2013-10-01 Teleflex Medical Incorporated Stabilized enzyme compositions US8267992B2 (en) 2009-03-02 2012-09-18 Boston Scientific Scimed, Inc. Self-buffering medical implants US8071156B2 (en) 2009-03-04 2011-12-06 Boston Scientific Scimed, Inc. Endoprostheses US8287937B2 (en) 2009-04-24 2012-10-16 Boston Scientific Scimed, Inc. Endoprosthese US8668732B2 (en) 2010-03-23 2014-03-11 Boston Scientific Scimed, Inc. Surface treated bioerodible metal endoprostheses US9295663B2 (en) 2010-07-14 2016-03-29 Abbott Cardiovascular Systems Inc. Drug coated balloon with in-situ formed drug containing microspheres Citations (92) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US4321711A (en) * 1978-10-18 1982-03-30 Sumitomo Electric Industries, Ltd. Vascular prosthesis US5290271A (en) * 1990-05-14 1994-03-01 Jernberg Gary R Surgical implant and method for controlled release of chemotherapeutic agents US5380299A (en) * 1993-08-30 1995-01-10 Med Institute, Inc. Thrombolytic treated intravascular medical device US5383928A (en) * 1992-06-10 1995-01-24 Emory University Stent sheath for local drug delivery US5419760A (en) * 1993-01-08 1995-05-30 Pdt Systems, Inc. Medicament dispensing stent for prevention of restenosis of a blood vessel US5500013A (en) * 1991-10-04 1996-03-19 Scimed Life Systems, Inc. Biodegradable drug delivery vascular stent US5512055A (en) * 1991-02-27 1996-04-30 Leonard Bloom Anti-infective and anti-inflammatory releasing systems for medical devices US5516781A (en) * 1992-01-09 1996-05-14 American Home Products Corporation Method of treating restenosis with rapamycin US5595722A (en) * 1993-01-28 1997-01-21 Neorx Corporation Method for identifying an agent which increases TGF-beta levels US5599844A (en) * 1993-05-13 1997-02-04 Neorx Corporation Prevention and treatment of pathologies associated with abnormally proliferative smooth muscle cells US5605696A (en) * 1995-03-30 1997-02-25 Advanced Cardiovascular Systems, Inc. Drug loaded polymeric material and method of manufacture US5609629A (en) * 1995-06-07 1997-03-11 Med Institute, Inc. Coated implantable medical device US5616608A (en) * 1993-07-29 1997-04-01 The United States Of America As Represented By The Department Of Health And Human Services Method of treating atherosclerosis or restenosis using microtubule stabilizing agent US5624411A (en) * 1993-04-26 1997-04-29 Medtronic, Inc. Intravascular stent and method US5707385A (en) * 1994-11-16 1998-01-13 Advanced Cardiovascular Systems, Inc. Drug loaded elastic membrane and method for delivery US5713949A (en) * 1996-08-06 1998-02-03 Jayaraman; Swaminathan Microporous covered stents and method of coating US5716981A (en) * 1993-07-19 1998-02-10 Angiogenesis Technologies, Inc. Anti-angiogenic compositions and methods of use US5733925A (en) * 1993-01-28 1998-03-31 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US5756453A (en) * 1994-08-03 1998-05-26 Cell Therapeutics, Inc. Use of angiogenic lipids for vascularizing tissue US5873904A (en) * 1995-06-07 1999-02-23 Cook Incorporated Silver implantable medical device US5882335A (en) * 1994-09-12 1999-03-16 Cordis Corporation Retrievable drug delivery stent US6063101A (en) * 1998-11-20 2000-05-16 Precision Vascular Systems, Inc. Stent apparatus and method US6171609B1 (en) * 1995-02-15 2001-01-09 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US6174326B1 (en) * 1996-09-25 2001-01-16 Terumo Kabushiki Kaisha Radiopaque, antithrombogenic stent and method for its production US6193746B1 (en) * 1992-07-08 2001-02-27 Ernst Peter Strecker Endoprosthesis that can be percutaneously implanted in the patient's body US6206915B1 (en) * 1998-09-29 2001-03-27 Medtronic Ave, Inc. Drug storing and metering stent US6206914B1 (en) * 1998-04-30 2001-03-27 Medtronic, Inc. Implantable system with drug-eluting cells for on-demand local drug delivery US6206916B1 (en) * 1998-04-15 2001-03-27 Joseph G. Furst Coated intraluminal graft US20020007214A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020007213A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020007215A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020007209A1 (en) * 2000-03-06 2002-01-17 Scheerder Ivan De Intraluminar perforated radially expandable drug delivery prosthesis and a method for the production thereof US20020005206A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Antiproliferative drug and delivery device US20020010507A1 (en) * 1997-04-25 2002-01-24 Ehr Timothy G. J. Stent cell configurations including spirals US20020013619A1 (en) * 1998-10-29 2002-01-31 Shanley John F. Expandable medical device with ductile hinges US20020016625A1 (en) * 2000-05-12 2002-02-07 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020028243A1 (en) * 1998-09-25 2002-03-07 Masters David B. Protein matrix materials, devices and methods of making and using thereof US20020032414A1 (en) * 1998-08-20 2002-03-14 Ragheb Anthony O. Coated implantable medical device US6358989B1 (en) * 1993-05-13 2002-03-19 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US6358556B1 (en) * 1995-04-19 2002-03-19 Boston Scientific Corporation Drug release stent coating US20020038146A1 (en) * 1998-07-29 2002-03-28 Ulf Harry Expandable stent with relief cuts for carrying medicines and other materials US20020038145A1 (en) * 2000-06-05 2002-03-28 Jang G. David Intravascular stent with increasing coating retaining capacity US6379381B1 (en) * 1999-09-03 2002-04-30 Advanced Cardiovascular Systems, Inc. Porous prosthesis and a method of depositing substances into the pores US20030004141A1 (en) * 2001-03-08 2003-01-02 Brown David L. Medical devices, compositions and methods for treating vulnerable plaque US6503954B1 (en) * 2000-03-31 2003-01-07 Advanced Cardiovascular Systems, Inc. Biocompatible carrier containing actinomycin D and a method of forming the same US20030009214A1 (en) * 1998-03-30 2003-01-09 Shanley John F. Medical device with beneficial agent delivery mechanism US6506437B1 (en) * 2000-10-17 2003-01-14 Advanced Cardiovascular Systems, Inc. Methods of coating an implantable device having depots formed in a surface thereof US6506411B2 (en) * 1993-07-19 2003-01-14 Angiotech Pharmaceuticals, Inc. Anti-angiogenic compositions and methods of use US6511649B1 (en) * 1998-12-18 2003-01-28 Thomas D. Harris Vitronectin receptor antagonist pharmaceuticals US20030028244A1 (en) * 1995-06-07 2003-02-06 Cook Incorporated Coated implantable medical device US20030033007A1 (en) * 2000-12-22 2003-02-13 Avantec Vascular Corporation Methods and devices for delivery of therapeutic capable agents with variable release profile US20030036794A1 (en) * 1995-06-07 2003-02-20 Cook Incorporated Coated implantable medical device US6528121B2 (en) * 1998-11-19 2003-03-04 Dow Corning Toray Silicone Co., Ltd. Aqueous treatment agent for wiping paper US6530950B1 (en) * 1999-01-12 2003-03-11 Quanam Medical Corporation Intraluminal stent having coaxial polymer member US20030050687A1 (en) * 2001-07-03 2003-03-13 Schwade Nathan D. Biocompatible stents and method of deployment US20030060877A1 (en) * 2001-09-25 2003-03-27 Robert Falotico Coated medical devices for the treatment of vascular disease US20030069606A1 (en) * 2001-06-15 2003-04-10 Girouard Steven D. Pulmonary vein stent for treating atrial fibrillation US20030068355A1 (en) * 2001-08-20 2003-04-10 Shanley John F. Therapeutic agent delivery device with protective separating layer US20030077312A1 (en) * 2001-10-22 2003-04-24 Ascher Schmulewicz Coated intraluminal stents and reduction of restenosis using same US6673385B1 (en) * 2000-05-31 2004-01-06 Advanced Cardiovascular Systems, Inc. Methods for polymeric coatings stents US6676987B2 (en) * 2001-07-02 2004-01-13 Scimed Life Systems, Inc. Coating a medical appliance with a bubble jet printing head US6682545B1 (en) * 1999-10-06 2004-01-27 The Penn State Research Foundation System and device for preventing restenosis in body vessels US6682771B2 (en) * 2001-07-02 2004-01-27 Scimed Life Systems, Inc. Coating dispensing system and method using a solenoid head for coating medical devices US20040024449A1 (en) * 2001-11-19 2004-02-05 Boyle Christhoper T. Device for in vivo delivery of bioactive agents and method of manufacture thereof US6689390B2 (en) * 1998-04-30 2004-02-10 Acusphere, Inc. Matrices formed of polymer and hydrophobic compounds for use in drug delivery US6699281B2 (en) * 2001-07-20 2004-03-02 Sorin Biomedica Cardio S.P.A. Angioplasty stents US6702850B1 (en) * 2002-09-30 2004-03-09 Mediplex Corporation Korea Multi-coated drug-eluting stent for antithrombosis and antirestenosis US6712845B2 (en) * 2001-04-24 2004-03-30 Advanced Cardiovascular Systems, Inc. Coating for a stent and a method of forming the same US6713119B2 (en) * 1999-09-03 2004-03-30 Advanced Cardiovascular Systems, Inc. Biocompatible coating for a prosthesis and a method of forming the same US6716981B2 (en) * 1998-12-21 2004-04-06 Lonza Ag Process for the preparation of N-(amino-4, 6-dihalo-pyrimidine) formamides US6716444B1 (en) * 2000-09-28 2004-04-06 Advanced Cardiovascular Systems, Inc. Barriers for polymer-coated implantable medical devices and methods for making the same US20040073296A1 (en) * 2000-12-07 2004-04-15 Epstein Stephen E. Inhibition of restenosis using a DNA-coated stent US6723373B1 (en) * 2000-06-16 2004-04-20 Cordis Corporation Device and process for coating stents US6846841B2 (en) * 1993-07-19 2005-01-25 Angiotech Pharmaceuticals, Inc. Anti-angiogenic compositions and methods of use US6849089B2 (en) * 2001-10-08 2005-02-01 Biotronik Mess-Und Therapiegeraete Gmbh & Co Ingenieurbuero Berlin Implant with proliferation-inhibiting substance US6855770B2 (en) * 2000-12-12 2005-02-15 Scimed Life Systems, Inc. Drug delivery compositions and medical devices containing block copolymer US6855125B2 (en) * 1999-05-20 2005-02-15 Conor Medsystems, Inc. Expandable medical device delivery system and method US20050038505A1 (en) * 2001-11-05 2005-02-17 Sun Biomedical Ltd. Drug-delivery endovascular stent and method of forming the same US6860946B2 (en) * 2000-07-25 2005-03-01 Advanced Cardiovascular Systems, Inc. System for the process of coating implantable medical devices US6861088B2 (en) * 2002-03-28 2005-03-01 Boston Scientific Scimed, Inc. Method for spray-coating a medical device having a tubular wall such as a stent US20050049693A1 (en) * 2003-08-25 2005-03-03 Medtronic Vascular Inc. Medical devices and compositions for delivering biophosphonates to anatomical sites at risk for vascular disease US20050055078A1 (en) * 2003-09-04 2005-03-10 Medtronic Vascular, Inc. Stent with outer slough coating US20050060020A1 (en) * 2003-09-17 2005-03-17 Scimed Life Systems, Inc. Covered stent with biologically active material US20050058684A1 (en) * 2001-08-20 2005-03-17 Shanley John F. Therapeutic agent delivery device with controlled therapeutic agent release rates US20050064088A1 (en) * 2003-09-24 2005-03-24 Scimed Life Systems, Inc Ultrasonic nozzle for coating a medical appliance and method for using an ultrasonic nozzle to coat a medical appliance US20050074545A1 (en) * 2003-09-29 2005-04-07 Medtronic Vascular, Inc. Stent with improved drug loading capacity US20050075714A1 (en) * 2003-09-24 2005-04-07 Medtronic Vascular, Inc. Gradient coated stent and method of fabrication US20050079199A1 (en) * 2003-02-18 2005-04-14 Medtronic, Inc. Porous coatings for drug release from medical devices US20050084515A1 (en) * 2003-03-20 2005-04-21 Medtronic Vascular, Inc. Biocompatible controlled release coatings for medical devices and related methods US20060009838A1 (en) * 2000-10-16 2006-01-12 Conor Medsystems, Inc. Expandable medical device for delivery of beneficial agent US20060017834A1 (en) * 2004-07-23 2006-01-26 Konica Minolta Opto, Inc. Imaging optical system and imaging lens device US20060035879A1 (en) * 2002-11-15 2006-02-16 Prescott Margaret F Organic Compounds Family Cites Families (50) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title EP0430968B1 (en) * 1988-05-02 1996-11-20 PHANOS TECHNOLOGIES, Inc. Compounds, compositions and method for binding bio-affecting substances to surface membranes of bio-particles DE69108423T2 (en) * 1990-02-08 1995-07-27 Howmedica Inflatable dilator. US5545208A (en) * 1990-02-28 1996-08-13 Medtronic, Inc. Intralumenal drug eluting prosthesis US5180366A (en) * 1990-10-10 1993-01-19 Woods W T Apparatus and method for angioplasty and for preventing re-stenosis WO1993006792A1 (en) * 1991-10-04 1993-04-15 Scimed Life Systems, Inc. Biodegradable drug delivery vascular stent EP0566245B1 (en) * 1992-03-19 1999-10-06 Medtronic, Inc. Intraluminal stent US5578075B1 (en) * 1992-11-04 2000-02-08 Daynke Res Inc Minimally invasive bioactivated endoprosthesis for vessel repair US5342348A (en) * 1992-12-04 1994-08-30 Kaplan Aaron V Method and device for treating and enlarging body lumens US5770609A (en) * 1993-01-28 1998-06-23 Neorx Corporation Prevention and treatment of cardiovascular pathologies DK0621015T3 (en) * 1993-04-23 1998-12-21 Schneider Europ Gmbh Stent but a cover layer of an elastic material and a method for depositing this layer on the stent US5536247A (en) * 1993-06-10 1996-07-16 Scimed Life Systems, Inc. Method of treating cardiac conduction defects WO1995024929A3 (en) * 1994-03-15 1995-12-28 Univ Brown Res Found Polymeric gene delivery system US5900433A (en) * 1995-06-23 1999-05-04 Cormedics Corp. Vascular treatment method and apparatus US5665591A (en) * 1994-12-06 1997-09-09 Trustees Of Boston University Regulation of smooth muscle cell proliferation US6231600B1 (en) * 1995-02-22 2001-05-15 Scimed Life Systems, Inc. Stents with hybrid coating for medical devices DE19539449A1 (en) * 1995-10-24 1997-04-30 Biotronik Mess & Therapieg A process for preparing intraluminal stents of bioresorbable polymeric material EP0871512A1 (en) * 1995-12-22 1998-10-21 Beth Israel Deaconess Medical Center Localized intravascular delivery of growth factors for promotion of angiogenesis US6441025B2 (en) * 1996-03-12 2002-08-27 Pg-Txl Company, L.P. Water soluble paclitaxel derivatives US5928916A (en) * 1996-04-25 1999-07-27 Medtronic, Inc. Ionic attachment of biomolecules with a guanidino moiety to medical device surfaces US5824045A (en) * 1996-10-21 1998-10-20 Inflow Dynamics Inc. Vascular and endoluminal stents US5980972A (en) * 1996-12-20 1999-11-09 Schneider (Usa) Inc Method of applying drug-release coatings US5980551A (en) * 1997-02-07 1999-11-09 Endovasc Ltd., Inc. Composition and method for making a biodegradable drug delivery stent US5843172A (en) * 1997-04-15 1998-12-01 Advanced Cardiovascular Systems, Inc. Porous medicated stent US20010029351A1 (en) * 1998-04-16 2001-10-11 Robert Falotico Drug combinations and delivery devices for the prevention and treatment of vascular disease US6273913B1 (en) * 1997-04-18 2001-08-14 Cordis Corporation Modified stent useful for delivery of drugs along stent strut US5972027A (en) * 1997-09-30 1999-10-26 Scimed Life Systems, Inc Porous stent drug delivery system US6479654B1 (en) * 1998-02-06 2002-11-12 Collateral Therapeutics Forms of the angiogenic factor vascular endothelial cell growth factor: VEGF EP1702586B1 (en) * 1998-03-30 2008-08-06 Conor Medsystems, Inc. Expandable medical device with ductile hinges RU2218922C2 (en) * 1998-04-30 2003-12-20 Маруха Корпорейшн Compounds comprising in structure fragment of derivative of glucuronic acid and fragment of derivative of glucosamine, method for preparing these compounds and application of these compounds US6363938B2 (en) * 1998-12-22 2002-04-02 Angiotrax, Inc. Methods and apparatus for perfusing tissue and/or stimulating revascularization and tissue growth US6759054B2 (en) * 1999-09-03 2004-07-06 Advanced Cardiovascular Systems, Inc. Ethylene vinyl alcohol composition and coating ES2332869T3 (en) * 1999-11-17 2010-02-15 Boston Scientific Limited microfabricated devices for delivery of molecules in carrier fluids. US6471979B2 (en) * 1999-12-29 2002-10-29 Estrogen Vascular Technology, Llc Apparatus and method for delivering compounds to a living organism JP5000826B2 (en) * 2000-01-24 2012-08-15 バイオコンパテイブルズ・ユーケイ・リミテツド The coated implant US7419678B2 (en) * 2000-05-12 2008-09-02 Cordis Corporation Coated medical devices for the prevention and treatment of vascular disease US6395326B1 (en) * 2000-05-31 2002-05-28 Advanced Cardiovascular Systems, Inc. Apparatus and method for depositing a coating onto a surface of a prosthesis US6254632B1 (en) * 2000-09-28 2001-07-03 Advanced Cardiovascular Systems, Inc. Implantable medical device having protruding surface structures for drug delivery and cover attachment DE60142131D1 (en) * 2000-10-16 2010-06-24 Conor Medsystems Inc The expandable medical device for delivering a beneficial agent US20020077693A1 (en) * 2000-12-19 2002-06-20 Barclay Bruce J. Covered, coiled drug delivery stent and method US7077859B2 (en) * 2000-12-22 2006-07-18 Avantec Vascular Corporation Apparatus and methods for variably controlled substance delivery from implanted prostheses US20020082679A1 (en) * 2000-12-22 2002-06-27 Avantec Vascular Corporation Delivery or therapeutic capable agents US6663662B2 (en) * 2000-12-28 2003-12-16 Advanced Cardiovascular Systems, Inc. Diffusion barrier layer for implantable devices US20020127263A1 (en) * 2001-02-27 2002-09-12 Wenda Carlyle Peroxisome proliferator-acitvated receptor gamma ligand eluting medical device US6780424B2 (en) * 2001-03-30 2004-08-24 Charles David Claude Controlled morphologies in polymer drug for release of drugs from polymer films US20030088307A1 (en) * 2001-11-05 2003-05-08 Shulze John E. Potent coatings for stents US20030181973A1 (en) * 2002-03-20 2003-09-25 Harvinder Sahota Reduced restenosis drug containing stents US20030204239A1 (en) * 2002-04-26 2003-10-30 Wenda Carlyle Endovascular stent with a preservative coating JP2006500121A (en) * 2002-09-20 2006-01-05 コナー メドシステムズ, インコーポレイテッドConor Medsystems, Inc. Expandable medical device having an opening for delivery of multiple beneficial agents US20040127976A1 (en) * 2002-09-20 2004-07-01 Conor Medsystems, Inc. Method and apparatus for loading a beneficial agent into an expandable medical device DE10248591B4 (en) * 2002-10-17 2006-04-20 Bos Gmbh & Co. Kg Window roller blind with a lid on the pull-out slot Patent Citations (99) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US4321711A (en) * 1978-10-18 1982-03-30 Sumitomo Electric Industries, Ltd. Vascular prosthesis US5290271A (en) * 1990-05-14 1994-03-01 Jernberg Gary R Surgical implant and method for controlled release of chemotherapeutic agents US5512055A (en) * 1991-02-27 1996-04-30 Leonard Bloom Anti-infective and anti-inflammatory releasing systems for medical devices US6515009B1 (en) * 1991-09-27 2003-02-04 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US5500013A (en) * 1991-10-04 1996-03-19 Scimed Life Systems, Inc. Biodegradable drug delivery vascular stent US6869443B2 (en) * 1991-10-04 2005-03-22 Scimed Life Systems, Inc. Biodegradable drug delivery vascular stent US5516781A (en) * 1992-01-09 1996-05-14 American Home Products Corporation Method of treating restenosis with rapamycin US5383928A (en) * 1992-06-10 1995-01-24 Emory University Stent sheath for local drug delivery US6193746B1 (en) * 1992-07-08 2001-02-27 Ernst Peter Strecker Endoprosthesis that can be percutaneously implanted in the patient's body US5419760A (en) * 1993-01-08 1995-05-30 Pdt Systems, Inc. Medicament dispensing stent for prevention of restenosis of a blood vessel US5595722A (en) * 1993-01-28 1997-01-21 Neorx Corporation Method for identifying an agent which increases TGF-beta levels US5733925A (en) * 1993-01-28 1998-03-31 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US5624411A (en) * 1993-04-26 1997-04-29 Medtronic, Inc. Intravascular stent and method US5599844A (en) * 1993-05-13 1997-02-04 Neorx Corporation Prevention and treatment of pathologies associated with abnormally proliferative smooth muscle cells US6358989B1 (en) * 1993-05-13 2002-03-19 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US5886026A (en) * 1993-07-19 1999-03-23 Angiotech Pharmaceuticals Inc. Anti-angiogenic compositions and methods of use US5716981A (en) * 1993-07-19 1998-02-10 Angiogenesis Technologies, Inc. Anti-angiogenic compositions and methods of use US6506411B2 (en) * 1993-07-19 2003-01-14 Angiotech Pharmaceuticals, Inc. Anti-angiogenic compositions and methods of use US6544544B2 (en) * 1993-07-19 2003-04-08 Angiotech Pharmaceuticals, Inc. Anti-angiogenic compositions and methods of use US6846841B2 (en) * 1993-07-19 2005-01-25 Angiotech Pharmaceuticals, Inc. Anti-angiogenic compositions and methods of use US5616608A (en) * 1993-07-29 1997-04-01 The United States Of America As Represented By The Department Of Health And Human Services Method of treating atherosclerosis or restenosis using microtubule stabilizing agent US5380299A (en) * 1993-08-30 1995-01-10 Med Institute, Inc. Thrombolytic treated intravascular medical device US5756453A (en) * 1994-08-03 1998-05-26 Cell Therapeutics, Inc. Use of angiogenic lipids for vascularizing tissue US5882335A (en) * 1994-09-12 1999-03-16 Cordis Corporation Retrievable drug delivery stent US5707385A (en) * 1994-11-16 1998-01-13 Advanced Cardiovascular Systems, Inc. Drug loaded elastic membrane and method for delivery US6171609B1 (en) * 1995-02-15 2001-01-09 Neorx Corporation Therapeutic inhibitor of vascular smooth muscle cells US5605696A (en) * 1995-03-30 1997-02-25 Advanced Cardiovascular Systems, Inc. Drug loaded polymeric material and method of manufacture US6358556B1 (en) * 1995-04-19 2002-03-19 Boston Scientific Corporation Drug release stent coating US5609629A (en) * 1995-06-07 1997-03-11 Med Institute, Inc. Coated implantable medical device US20030028244A1 (en) * 1995-06-07 2003-02-06 Cook Incorporated Coated implantable medical device US5873904A (en) * 1995-06-07 1999-02-23 Cook Incorporated Silver implantable medical device US20030036794A1 (en) * 1995-06-07 2003-02-20 Cook Incorporated Coated implantable medical device US5713949A (en) * 1996-08-06 1998-02-03 Jayaraman; Swaminathan Microporous covered stents and method of coating US6174326B1 (en) * 1996-09-25 2001-01-16 Terumo Kabushiki Kaisha Radiopaque, antithrombogenic stent and method for its production US6720350B2 (en) * 1997-03-31 2004-04-13 Scimed Life Systems, Inc. Therapeutic inhibitor of vascular smooth muscle cells US20020010507A1 (en) * 1997-04-25 2002-01-24 Ehr Timothy G. J. Stent cell configurations including spirals US20030009214A1 (en) * 1998-03-30 2003-01-09 Shanley John F. Medical device with beneficial agent delivery mechanism US6206916B1 (en) * 1998-04-15 2001-03-27 Joseph G. Furst Coated intraluminal graft US6689390B2 (en) * 1998-04-30 2004-02-10 Acusphere, Inc. Matrices formed of polymer and hydrophobic compounds for use in drug delivery US6206914B1 (en) * 1998-04-30 2001-03-27 Medtronic, Inc. Implantable system with drug-eluting cells for on-demand local drug delivery US20020038146A1 (en) * 1998-07-29 2002-03-28 Ulf Harry Expandable stent with relief cuts for carrying medicines and other materials US20020032414A1 (en) * 1998-08-20 2002-03-14 Ragheb Anthony O. Coated implantable medical device US20020028243A1 (en) * 1998-09-25 2002-03-07 Masters David B. Protein matrix materials, devices and methods of making and using thereof US6206915B1 (en) * 1998-09-29 2001-03-27 Medtronic Ave, Inc. Drug storing and metering stent US20020013619A1 (en) * 1998-10-29 2002-01-31 Shanley John F. Expandable medical device with ductile hinges US6528121B2 (en) * 1998-11-19 2003-03-04 Dow Corning Toray Silicone Co., Ltd. Aqueous treatment agent for wiping paper US6063101A (en) * 1998-11-20 2000-05-16 Precision Vascular Systems, Inc. Stent apparatus and method US6511649B1 (en) * 1998-12-18 2003-01-28 Thomas D. Harris Vitronectin receptor antagonist pharmaceuticals US6716981B2 (en) * 1998-12-21 2004-04-06 Lonza Ag Process for the preparation of N-(amino-4, 6-dihalo-pyrimidine) formamides US6530950B1 (en) * 1999-01-12 2003-03-11 Quanam Medical Corporation Intraluminal stent having coaxial polymer member US20050059991A1 (en) * 1999-05-20 2005-03-17 Shanley John F. Expandable medical device delivery system and method US6855125B2 (en) * 1999-05-20 2005-02-15 Conor Medsystems, Inc. Expandable medical device delivery system and method US6379381B1 (en) * 1999-09-03 2002-04-30 Advanced Cardiovascular Systems, Inc. Porous prosthesis and a method of depositing substances into the pores US6713119B2 (en) * 1999-09-03 2004-03-30 Advanced Cardiovascular Systems, Inc. Biocompatible coating for a prosthesis and a method of forming the same US6682545B1 (en) * 1999-10-06 2004-01-27 The Penn State Research Foundation System and device for preventing restenosis in body vessels US20020007209A1 (en) * 2000-03-06 2002-01-17 Scheerder Ivan De Intraluminar perforated radially expandable drug delivery prosthesis and a method for the production thereof US6503954B1 (en) * 2000-03-31 2003-01-07 Advanced Cardiovascular Systems, Inc. Biocompatible carrier containing actinomycin D and a method of forming the same US20020016625A1 (en) * 2000-05-12 2002-02-07 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020007213A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020007214A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US20020005206A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Antiproliferative drug and delivery device US20020007215A1 (en) * 2000-05-19 2002-01-17 Robert Falotico Drug/drug delivery systems for the prevention and treatment of vascular disease US6673385B1 (en) * 2000-05-31 2004-01-06 Advanced Cardiovascular Systems, Inc. Methods for polymeric coatings stents US20020038145A1 (en) * 2000-06-05 2002-03-28 Jang G. David Intravascular stent with increasing coating retaining capacity US6723373B1 (en) * 2000-06-16 2004-04-20 Cordis Corporation Device and process for coating stents US6860946B2 (en) * 2000-07-25 2005-03-01 Advanced Cardiovascular Systems, Inc. System for the process of coating implantable medical devices US6716444B1 (en) * 2000-09-28 2004-04-06 Advanced Cardiovascular Systems, Inc. Barriers for polymer-coated implantable medical devices and methods for making the same US20060009838A1 (en) * 2000-10-16 2006-01-12 Conor Medsystems, Inc. Expandable medical device for delivery of beneficial agent US6506437B1 (en) * 2000-10-17 2003-01-14 Advanced Cardiovascular Systems, Inc. Methods of coating an implantable device having depots formed in a surface thereof US20040073296A1 (en) * 2000-12-07 2004-04-15 Epstein Stephen E. Inhibition of restenosis using a DNA-coated stent US6855770B2 (en) * 2000-12-12 2005-02-15 Scimed Life Systems, Inc. Drug delivery compositions and medical devices containing block copolymer US20030033007A1 (en) * 2000-12-22 2003-02-13 Avantec Vascular Corporation Methods and devices for delivery of therapeutic capable agents with variable release profile US20030004141A1 (en) * 2001-03-08 2003-01-02 Brown David L. Medical devices, compositions and methods for treating vulnerable plaque US6712845B2 (en) * 2001-04-24 2004-03-30 Advanced Cardiovascular Systems, Inc. Coating for a stent and a method of forming the same US20030069606A1 (en) * 2001-06-15 2003-04-10 Girouard Steven D. Pulmonary vein stent for treating atrial fibrillation US6676987B2 (en) * 2001-07-02 2004-01-13 Scimed Life Systems, Inc. Coating a medical appliance with a bubble jet printing head US6682771B2 (en) * 2001-07-02 2004-01-27 Scimed Life Systems, Inc. Coating dispensing system and method using a solenoid head for coating medical devices US20030050687A1 (en) * 2001-07-03 2003-03-13 Schwade Nathan D. Biocompatible stents and method of deployment US6699281B2 (en) * 2001-07-20 2004-03-02 Sorin Biomedica Cardio S.P.A. Angioplasty stents US20060064157A1 (en) * 2001-08-20 2006-03-23 Conor Medsystems, Inc. Expandable medical device for delivery of beneficial agent US20030068355A1 (en) * 2001-08-20 2003-04-10 Shanley John F. Therapeutic agent delivery device with protective separating layer US20050058684A1 (en) * 2001-08-20 2005-03-17 Shanley John F. Therapeutic agent delivery device with controlled therapeutic agent release rates US20030060877A1 (en) * 2001-09-25 2003-03-27 Robert Falotico Coated medical devices for the treatment of vascular disease US6849089B2 (en) * 2001-10-08 2005-02-01 Biotronik Mess-Und Therapiegeraete Gmbh & Co Ingenieurbuero Berlin Implant with proliferation-inhibiting substance US20030077312A1 (en) * 2001-10-22 2003-04-24 Ascher Schmulewicz Coated intraluminal stents and reduction of restenosis using same US20050038505A1 (en) * 2001-11-05 2005-02-17 Sun Biomedical Ltd. Drug-delivery endovascular stent and method of forming the same US20040024449A1 (en) * 2001-11-19 2004-02-05 Boyle Christhoper T. Device for in vivo delivery of bioactive agents and method of manufacture thereof US6861088B2 (en) * 2002-03-28 2005-03-01 Boston Scientific Scimed, Inc. Method for spray-coating a medical device having a tubular wall such as a stent US6702850B1 (en) * 2002-09-30 2004-03-09 Mediplex Corporation Korea Multi-coated drug-eluting stent for antithrombosis and antirestenosis US20060035879A1 (en) * 2002-11-15 2006-02-16 Prescott Margaret F Organic Compounds US20050079199A1 (en) * 2003-02-18 2005-04-14 Medtronic, Inc. Porous coatings for drug release from medical devices US20050084515A1 (en) * 2003-03-20 2005-04-21 Medtronic Vascular, Inc. Biocompatible controlled release coatings for medical devices and related methods US20050049693A1 (en) * 2003-08-25 2005-03-03 Medtronic Vascular Inc. Medical devices and compositions for delivering biophosphonates to anatomical sites at risk for vascular disease US20050055078A1 (en) * 2003-09-04 2005-03-10 Medtronic Vascular, Inc. Stent with outer slough coating US20050060020A1 (en) * 2003-09-17 2005-03-17 Scimed Life Systems, Inc. Covered stent with biologically active material US20050064088A1 (en) * 2003-09-24 2005-03-24 Scimed Life Systems, Inc Ultrasonic nozzle for coating a medical appliance and method for using an ultrasonic nozzle to coat a medical appliance US20050075714A1 (en) * 2003-09-24 2005-04-07 Medtronic Vascular, Inc. Gradient coated stent and method of fabrication US20050074545A1 (en) * 2003-09-29 2005-04-07 Medtronic Vascular, Inc. Stent with improved drug loading capacity US20060017834A1 (en) * 2004-07-23 2006-01-26 Konica Minolta Opto, Inc. Imaging optical system and imaging lens device Cited By (15) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US20050059991A1 (en) * 1999-05-20 2005-03-17 Shanley John F. Expandable medical device delivery system and method US7479127B2 (en) 1999-05-20 2009-01-20 Innovational Holding, Llc Expandable medical device delivery system and method US7842083B2 (en) 2001-08-20 2010-11-30 Innovational Holdings, Llc. Expandable medical device with improved spatial distribution US7658758B2 (en) 2001-09-07 2010-02-09 Innovational Holdings, Llc Method and apparatus for loading a beneficial agent into an expandable medical device US8349390B2 (en) 2002-09-20 2013-01-08 Conor Medsystems, Inc. Method and apparatus for loading a beneficial agent into an expandable medical device US20050234544A1 (en) * 2002-09-20 2005-10-20 Conor Medsystems, Inc. Expandable medical device with openings for delivery of multiple beneficial agents US7758636B2 (en) 2002-09-20 2010-07-20 Innovational Holdings Llc Expandable medical device with openings for delivery of multiple beneficial agents US9254202B2 (en) 2002-09-20 2016-02-09 Innovational Holdings Llc Method and apparatus for loading a beneficial agent into an expandable medical device US8449901B2 (en) 2003-03-28 2013-05-28 Innovational Holdings, Llc Implantable medical device with beneficial agent concentration gradient US20050182390A1 (en) * 2004-02-13 2005-08-18 Conor Medsystems, Inc. Implantable drug delivery device including wire filaments US20060079956A1 (en) * 2004-09-15 2006-04-13 Conor Medsystems, Inc. Bifurcation stent with crushable end and method for delivery of a stent to a bifurcation US7429268B2 (en) 2004-12-08 2008-09-30 Innovational Holdings, Llc Expandable medical device with differential hinge performance US20060122688A1 (en) * 2004-12-08 2006-06-08 Conor Medsystems, Inc. Expandable medical device with differential hinge performance US8652506B2 (en) 2008-06-05 2014-02-18 Boston Scientific Scimed, Inc. Bio-degradable block co-polymers for controlled release US20090304767A1 (en) * 2008-06-05 2009-12-10 Boston Scientific Scimed, Inc. Bio-Degradable Block Co-Polymers for Controlled Release Also Published As Publication number Publication date Type JP2006505364A (en) 2006-02-16 application CA2505576A1 (en) 2004-05-27 application EP1575638A1 (en) 2005-09-21 application US20040143321A1 (en) 2004-07-22 application WO2004043509A1 (en) 2004-05-27 application Similar Documents Publication Publication Date Title US6569195B2 (en) Stent coating US6893431B2 (en) Medical device for delivering patches Lincoff et al. Sustained local delivery of dexamethasone by a novel intravascular eluting stent to prevent restenosis in the porcine coronary injury model US20030088307A1 (en) Potent coatings for stents De Jaegere et al. Intravascular ultrasound-guided optimized stent deployment: Immediate and 6 months clinical and angiographic results from the Multicenter Ultrasound Stenting in Coronaries Study (MUSIC Study) US5833651A (en) Therapeutic intraluminal stents Dangas et al. Management of restenosis after coronary intervention Serruys et al. Stenting of coronary arteries: Are we the sorcerer’s apprentice? US20060085062A1 (en) Implantable stent with endothelialization factor US7008411B1 (en) Method and apparatus for treating vulnerable plaque US20110130708A1 (en) Directional Delivery of Energy and Bioactives US20040071861A1 (en) Method of manufacturing a stent coating and a method of using the stent US20050186241A1 (en) Device for in vivo delivery of bioactive agents and method of manufacture thereof US20060241742A1 (en) Stent comprising a coating system Sharma Simultaneous kissing drug‐eluting stent technique for percutaneous treatment of bifurcation lesions in large‐size vessels US7179289B2 (en) Expandable medical device for delivery of beneficial agent US20040073298A1 (en) Coating for a stent and a method of forming the same US20070123977A1 (en) Progenitor Endothelial Cell Capturing with a Drug Eluting Implantable Medical Device US20070288084A1 (en) Implantable Stent with Degradable Portions EP1863408B1 (en) System and method for loading a beneficial agent into a medical device US20070141107A1 (en) Progenitor Endothelial Cell Capturing with a Drug Eluting Implantable Medical Device Horowitz et al. Percutaneous transluminal angioplasty and stenting of midbasilar stenoses: three technical case reports and literature review US20070129789A1 (en) Progenitor Endothelial Cell Capturing with a Drug Eluting Implantable Medical Device US20080091262A1 (en) Drug delivery after biodegradation of the stent scaffolding WO1998005307A1 (en) Transmural drug delivery method and apparatus Legal Events Date Code Title Description AS Assignment Owner name: INNOVATIONAL HOLDINGS LLC, NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CONOR MEDSYSTEMS, INC.;REEL/FRAME:019955/0487 Effective date: 20070306 Owner name: INNOVATIONAL HOLDINGS LLC,NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CONOR MEDSYSTEMS, INC.;REEL/FRAME:019955/0487 Effective date: 20070306 AS Assignment Owner name: INNOVATIONAL HOLDINGS LLC, NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CONOR MEDSYSTEMS, INC.;REEL/FRAME:023538/0021 Effective date: 20070306 Owner name: INNOVATIONAL HOLDINGS LLC,NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CONOR MEDSYSTEMS, INC.;REEL/FRAME:023538/0021 Effective date: 20070306
Nuevo Tutorial Avanzado de sagaro 60 lecciones en Video por solo $30.00 USD Ultimos dias Tipos de datos en Access y su aplicación Una de las cosas más importantes que debemos saber en la elaboración de bases de datos es que los datos deberían almacenarse según su tipo, un ejemplo de esto podría ser los productos de una tienda por decir algo, en la actualidad la mayoría de los productos cuentan con un código de barras que al pasar el escáner laser (lector de código de barras) esta imagen se traduce en números o letras según el caso, como este código se convierte en texto esta información debería guardarse en un formato de texto, ese es el tipo de dato que debemos escoger para almacenar estos datos, también podríamos tener una clave interna para almacenar un código aparte, aunque en lo particular lo considero innecesario, para los productos de venta a granel o que no cuentan con código de barras podemos utilizar el tipo de dato texto y abreviar la descripción por ejemplo “kilo de papa blanca” (kpabca) y se guardaría en el mismo campo de los productos con código de barras, otro de los datos de un producto es su descripción, como su nombre lo indica en este campo vamos a describir el producto y por lo tanto el tipo de dato debería ser texto, por seguir el ejemplo la descripción de (kpabca) seria “kl de papa blanca” así cuando generemos una venta supongamos que vendemos ½ kilo de este producto en la tabla remisión o venta en proceso en el campo cantidad debería ser “0.5” o “0.500” kl de papa blanca (el tipo de dato para cantidad puede ser numero o texto pero yo prefiero poner como tipo de dato texto ya que el tipo de dato numero solo acepta números enteros) otros datos que necesitamos saber del producto es la existencia mínima y máxima que queremos tener en nuestro negocio esto sirve para que Access nos avise cuando un producto se está terminando y cuanto debemos reponer según la existencia máxima deseada aquí podemos escoger como tipo de dato para estos campos tanto numero como texto, otro dato que necesitamos es la fecha de caducidad algunos productos tienen fecha de caducidad sobre todo los lácteos o medicamentos para este campo debemos poner como tipo de dato fecha/hora ya que se refiere a determinada fecha para ver más tipos de datos y su descripción puedes ver las tablas en Access No hay comentarios: Publicar un comentario en la entrada Gracias por comentar
Living Healthy: Keep Life Simple 1,160 total views, 1 views today It’s not out of the ordinary to ask for health advice or to seek out help from other people about health. They may have some words of encouragement and may provide some council, however, the truth is… health really isn’t so black and white. Despite the vast advances in technology and medicine, doctors are still making educated guesses as to what is ailing us. Doctors are still playing the probabilities game as their method of diagnosis as opposed to being able to immediately provide accurate information. We can’t blame doctors for not knowing exactly what we have when we get sick, however, treatment of sick people is different than prevention. The same applies to our health as well. Based on a mass amount of info doctors have gathered from epidemiological research, staying healthy is actually pretty simple, unlike a diagnosis. Of course, much like anything in life, there is no shortcut to good health. There simply are habits that you have to practice on a daily basis. If you can manage to do these things every day, you’ll be in a better life. The first on the list is getting enough sleep. It’s recommended to get about 7 to 9 hours, but it depends on the individual. Ideally, you want to have enough sleep that you wake up feeling refreshed. Secondly, you want to be moving your body during the day. It can be difficult if you work at a desk all day, but it does you some good to get out of your chair and stretch every hour. Do yourself a favor and go for a walk or a bike ride. Some other things to consider is taking 15 minutes to do various stretches. Thirdly on the list is to be eating well. Michael Pollan proposed that we eat a healthy assortment of foods. Specifically, the diet he proposes here suggests that our diet should be primarily comprised of plants. Not that many of actually follow that, though…it’s always beneficial to eat more vegetables and low-sugar fruits. Fourth, it’s important that we get some form of social interaction. Isolation on a regular basis has some drawback to our health but it also affects our mind and our soul too. At the same time being alone does have its benefits as well, so long as you’re not making excuses to avoid people. Lastly, spend some time reflecting on your day and even write down what you are grateful for. A lot of us don’t keep our spirits high nor devote time to tell ourselves what good thing happened to us. These sorts of things, in the end, are quite simple to do in our lives and don’t take much of our time. Furthermore, other countries have employed all of the things that were discussed above. Communities that have employed these are often called Blue Zones. It’s all outlined in a series of books. If you’ve never heard of Blue Zones before these are places where people live the longest, but are also the healthiest. It’s not out of the ordinary for people in those communities to live well past 100 years old. Some of these Blue Zones are places like Okinawa, Japan, Ikaria, Greece, and Sardinia, Italy. In these places, the preventative medicines that we take are simply baked into their daily lives without much thought. Not to mention there aren’t as severe repercussions to them. They have daily activities where they live off local plants, walk to most areas and have many areas for indulging in conversation. Do as the people in these blue zones do– surely you will be in a healthier life. 2 thoughts on “Living Healthy: Keep Life Simple • September 10, 2018 at 9:42 am Permalink This was best explanation. None of my friends could explain it this right. Reply • July 16, 2018 at 12:46 pm Permalink So easy, yet we spend our time trying to make it more difficult. Reply Leave a Reply Your email address will not be published. Required fields are marked *
Health The impact of excessive sleep on the body It’s likely that you’ve heard of the many advantages that come with getting enough sleep. The typical counts that have been monitored span roughly seven or eight hours. The main factor in excellent health and a renewed body, mind, and soul is time. It probably makes people feel warm and rejuvenated as well. However, occasionally people think about raising it and having the worst day. You shouldn’t look down on oversleeping, even if it makes you feel weak, exhausted, and apathetic. However, for some, it develops into a weakness, and for others, it becomes a health issue. Most people who do it do so because they have a health issue. However, persistent oversleeping might also indicate mental health issues or sleep disorders. Make sure you always choose the best course of action. We are here to assist you in comprehending them and the steps taken to control the most effective treatment. Oversleeping: What is it? The term “oversleeping” provides a clear indication of what it is and how it is defined. Additionally, by doing this, the bodily effects of oversleeping can be ascertained, enabling you to comprehend and take appropriate control measures. The task can be completed during certain regular hours. In a similar vein, a body has a certain amount of time. The decision-making process takes more than the allotted seven or eight hours. During this period, the body can recover fully and people can regain their energy. However, you may occasionally feel as though you are oversleeping (these conditions can be either stress or any sickness). You have a tendency to treat the problem on your own even when this is not what you need. Optimal sleep time Your optimal sleep time, according to study, should not exceed eight hours. Your body will likely experience unwelcome discomfort or issues if you prolong the period of time. These are actual scenarios that people frequently face, and you may have been one of them at some point. Take Modalert 200 if you have a sleep disorder that may be caused by narcolepsy. You won’t have to worry about waking up in the middle of the night to get enough rest. The dosage is specified for each person in a distinct age range. Reason for excessive sleep Extended periods of sleep can be unsettling and cause unnecessary problems for the body. All of us must eventually steer clear of those stages and take care of our health. An appropriate term for oversleeping would be hypersomnia. Everybody has their own work and lifestyle to adhere to. This might help you manage a busy schedule and adjust as needed. This may also interfere with your sleep schedule. This may also be among the main reasons why people oversleep. The disorder known as hypersomnia, which, aside from lifestyle factors, can also manifest in childhood. Therefore, those who deal with such issues must get through these stages. Health effects of excessive sleep Oversleeping can have different effects on different people. As we’ve already explained, unwelcome issues persist in your body when you experience such a situation. Some of the ones to envelop one’s body are listed below. In this scenario, you may experience unwelcome mood swings and worry. Another situation that could arise is memory loss. People occasionally lose all memory due to the illness. Millions of people suffer low energy in a different situation. However, more people are starting to use Waklet 150. Conversely, other individuals have been reported to have various consequences, primarily headaches, physical pains, melancholy, weight gain, and numerous other issues. Causes of Oversleeping: Pain in the body Eventually, oversleeping is connected to a number of health issues. This could be physical or mental in nature. We have conducted study and discovered numerous issues that have an impact on people. We probably came to the conclusion that bodily discomfort ranks highest. This caused unwelcome disruptions and took a serious toll on mental health. You therefore need to take the appropriate remedy. Hundreds of research and trials conducted by various scientists have made it difficult to find a single, effective remedy. But things are now easier thanks to technology. Oral medications are assisting persons who are oversleeping. There are many medications and various treatments available, but we advise you to trust Modalert 200 Australia. It is discovered that medicine has a very strong long-lasting effect. The patient’s oversleeping was assisted by the reviews, which are highly persuasive. You typically get little sleep, which benefits you and keeps your body in a relaxed state. How to handle sleeping too much Here, we’ll help and inform individuals on the various strategies for avoiding oversleeping. You can help yourself if you read the instructions carefully and follow all of the steps. Pills4cure is a secure online pharmacy where people can purchase oral tablets for medical purposes. To protect health, we guarantee safe delivery of all FDA-approved medications. A rigorous sleep regimen What if you’re considering taking a fresh vacation from sleeping? You are headed in the correct route if you fall into that category. It’s essential for restful sleep at the appropriate hours. You must be committed to getting the right amount of sleep and make sure you do so. A perfect environment for sleep Establishing your ideal sleep schedule comes before you even get comfy. An environment conducive to good sleep is necessary. Make sure the bedroom across from you is comfortable in order for this to occur. It’s crucial that your bed and pillow are comfy, and you may adjust the lighting to suit your mood. Waklert 150 mg can also help you get the best sleep possible. You must turn off your gadgets. Spending extended amounts of time on your electronics can be bad for your mental health. These days, we use desktop or portable computers for all of our tasks. You must practice reducing your screen time as soon as you get home. In summary You may find it challenging to begin in the manner that you would want with your body or head. There are situations that we have no control over. However, we have some ability to resolve the conflict. Although oversleeping is a dangerous problem, we have the solution to make it go away. Thus, follow all of the aforementioned steps to assist your body feel more at ease. marker I’m Lisa markek, and for the last six years, I’ve been working as an Health Instructor at Pills4cure. Pills4cure is one of the most trusted online pharmaceutical companies across the world. Our aim is to provide pure medicines to our customers. We have many products related to disorders like Erectile dysfunction, Sleep disorders, Mental disorders, Etc. Related Articles Leave a Reply Back to top button
Documentation realp Real tunable parameter Syntax p = realp(paramname,initvalue) Description p = realp(paramname,initvalue) creates a tunable real-valued parameter with name specified by the string paramname and initial value initvalue. Tunable real parameters can be scalar- or matrix- valued. Input Arguments paramname String specifying the name of the realp parameter p. This input argument sets the value of the Name property of p. initvalue Initial numeric value of the parameter p. initvalue can be a real scalar value or a 2-dimensional matrix. Output Arguments p realp parameter object. Properties Name String containing the name of the realp parameter object. The value of Name is set by the paramname input argument to realp and cannot be changed. Value Value of the tunable parameter. Value can be a real scalar value or a 2-dimensional matrix. The initial value is set by the initvalue input argument. The dimensions of Value are fixed on creation of the realp object. Minimum Lower bound for the parameter value. The dimension of the Minimum property matches the dimension of the Value property. For matrix-valued parameters, use indexing to specify lower bounds on individual elements: p = realp('K',eye(2)); p.Minimum([1 4]) = -5; Use scalar expansion to set the same lower bound for all matrix elements: p.Minimum = -5; Default: -Inf for all entries Maximum Upper bound for the parameter value. The dimension of the Maximum property matches the dimension of the Value property. For matrix-valued parameters, use indexing to specify upper bounds on individual elements: p = realp('K',eye(2)); p.Maximum([1 4]) = 5; Use scalar expansion to set the same upper bound for all matrix elements: p.Maximum = 5; Default: Inf for all entries Free Boolean value specifying whether the parameter is free to be tuned. Set the Free property to 1 (true) for tunable parameters, and 0 (false) for fixed parameters. The dimension of the Free property matches the dimension of the Value property. Default: 1 (true) for all entries Examples Tunable Low-Pass Filter This example shows how to create the low-pass filter F = a/(s + a) with one tunable parameter a. You cannot use tunableTF to represent F, because the numerator and denominator coefficients of a tunableTF block are independent. Instead, construct F using the tunable real parameter object realp. 1. Create a tunable real parameter. a = realp('a',10); The realp object a is a tunable parameter with initial value 10. 2. Use tf to create the tunable filter F: F = tf(a,[1 a]); F is a genss object which has the tunable parameter a in its Blocks property. You can connect F with other tunable or numeric models to create more complex models of control systems. For an example, see Control System with Tunable Components. Parametric Diagonal Matrix This example shows how to create a parametric matrix whose off-diagonal terms are fixed to zero, and whose diagonal terms are tunable parameters. 1. Create a parametric matrix whose initial value is the identity matrix. p = realp('P',eye(2)); p is a 2-by-2 parametric matrix. Because the initial value is the identity matrix, the off-diagonal initial values are zero. 2. Fix the values of the off-diagonal elements by setting the Free property to false. p.Free(1,2) = false; p.Free(2,1) = false; More About collapse all Tips • Use arithmetic operators (+, -, *, /, \, and ^) to combine realp objects into rational expressions or matrix expressions. You can use the resulting expressions in model-creation functions such as tf, zpk, and ss to create tunable models. For more information about tunable models, see Models with Tunable Coefficients in the Control System Toolbox™ User's Guide. See Also | | | Introduced in R2011a Was this topic helpful?
Why not learn more about Health? MCT Oils and All You Need To Know About It when it comes to the subject of losing weight, it requires all your attention. This dedication makes most of the people to lay low and wait for a miracle. What is, is completely different since for you to shed that weight, you will have to make certain that you put some effort into it. All in all, there are still tricks to kill the bull quicker that is increasing your intake of the Medium Chain Triglycerides known as the MCT oil. Keep reading to get some of this insight. To begin with, you may be wondering what these MCT oils are. And so, these are fats that are produced by any coconut and also the palm kernels. And so for this fact they are also known as coconut oils.And so having known this, you may ask how the continuous increase in intake of fats is going to help you shed some weight. Then if that is the question, you should know that the normal fats contain 12- 18 carbon atoms. On the other hand the MCT oils contain only 6-10 carbon atoms per chain thus exhibiting different properties. And with this knowledge, you should know how they work. The normal body fats are by default stored by the body. However, these other fats are different. The short carbon length creates this difference. This also makes them be metabolized very rapidly. This way they work like the body’s glucose and thus an energy source that is used in case of anybody exercise. To add on, these fats are also used in other body functions. Other functions of these fats will include increasing the muscle mass. This makes them more useful than the normal body fats. On the flipside, you will have to question the safe usage of these oils. Its common for people to react differently to these fats. For instance some of the people may face gastric difficulties and also diarrhea. However, you should note that these are just the minor side effects that are caused by intake of the MCT oils to certain set of people. This then means that there are a set of other side effects that can prove to be fatal when not handled by the doctor. To start with, it is warned that people with any liver disease should stay away from the MCT oils. On the other hand people with diabetes are also warned against the product. The MCT oils have proved that they can speed up the shedding of weight. However, make certain that you do not over use the product. Also, any side effect that may show up, should be told to the doctor A Quick Overlook of Oils – Your Cheatsheet If You Read One Article About Sales, Read This One
How Much Does Beard Hair Transplant Cost? Home / Beard Hair Transplant / How Much Does Beard Hair Transplant Cost? Posted on : March 25, 2024 | Category : Beard Hair Transplant | Author: Beverly Hills Hair Restoration Team Beard Hair Transplant Cost Understanding the costs of beard transplants is crucial for anyone considering this cosmetic procedure. At Beverly Hills Hair Restoration in Los Angeles, we strive to provide transparency and clarity about the financial aspects of facial hair transplants. This article offers a complete guide to the various factors contributing to the procedure's overall cost. By delving into elements such as the extent of transplantation required, the chosen technique, and the surgeon's expertise, we aim to equip our readers with the necessary information to make well-informed decisions. Our ultimate goal is to demystify the costs associated with beard transplant, enabling individuals to assess the value of this investment in their appearance and self-confidence. Factors Affecting Beard Hair Transplant Cost Understanding these factors is crucial in anticipating the final cost of the procedure. Patients should consult Dr. John Kahen for a personalized estimate tailored to their needs and desired outcomes. The expenses of Beard hair transplants at Beverly Hills Hair Restoration in LA can vary based on several factors: Extent of Hair Loss: The severity and area of hair loss directly impact the cost. A larger area requiring transplantation will necessitate more grafts, increasing the overall expense. The complexity of the desired facial hair pattern and density also affects the cost. Number of Grafts Required: The total number of grafts needed to achieve the desired outcome is a significant factor in cost determination. More grafts require more time and resources, increasing beard hair transplant prices. Quality of Donor Hair: The amount and quality of available donor hair are critical factors. Patients with limited or poor-quality donor hair may require additional procedures or more advanced techniques to achieve the desired results, increasing costs. Beard Hair Transplant Technique: The technique used for the transplant, such as Follicular Unit Extraction or Follicular Unit Transplantation, can influence the overall cost. FUE, which involves individually extracting hair follicles, is often more time-consuming and may be priced higher than FUT, where a strip of hair is removed and dissected into grafts. Average Cost of Beard Hair Transplant  On average, a beard hair transplant cost at Beverly Hills Hair Restoration would cost about $5,756. Depending on various factors, such as the extent of the transplant and the technique used, beard transplant expenses can range from $1,400 to $14,192. Book a free hair transplant consultation at our hair transplant clinic beforehand to check their prices and receive a detailed cost breakdown tailored to your specific needs. Long-Term Value of Beard Hair Transplant Investing in a Beard hair transplant at Beverly Hills Hair Restoration in Los Angeles is more than just a financial commitment; it's an investment in your confidence and satisfaction. While the initial cost is a consideration, the long-term benefits make it a valuable choice. We aim to provide high-quality care to help you achieve desired results, ensuring that every dollar spent is worth it for your well-being. Boost in Self-Confidence: One of the most significant benefits is the boost in self-confidence that a fuller, more defined beard or mustache can provide. This enhanced appearance can lead to greater self-assurance in social and professional settings. Long-Term Investment in Appearance: A Beard hair transplant is a long-term investment in your appearance. Unlike temporary solutions, the results of a transplant are permanent, providing a lasting solution to facial hair loss or thinning. Conclusion The Beard Hair Transplant Cost at Beverly Hills Hair Restoration in Los Angeles is determined by various factors. Even though the initial expense may seem high, the value of a Beard hair transplant lies in its ability to boost self-confidence, provide long-lasting improvements in appearance, and offer significant psychological benefits. We encourage individuals considering Beard hair transplants to research, understand the costs, and make informed decisions that align with their aesthetic purposes and budget. Our hair transplant clinic in Los Angeles ensures that patients achieve the best possible outcomes from their beard hair transplant journey. Begin your journey towards natural-looking, confident hair restoration with a complimentary free hair transplant consultation at Beverly Hills Hair Restoration. Call 310.289.0901 or visit our clinic to schedule your free appointment today. FAQs About Beard Hair Transplant Cost Q1: How long does the Beard hair transplant procedure take at BHHR? A1: The Beard hair transplant at BHHR takes 2 to 5 hours. Recovery is quick, with most resuming activities in days. Mild swelling or discomfort may occur but usually subsides within a week. Q2: Does insurance cover the Beard Hair Transplant Cost at BHHR? A2: Beard hair transplants are usually not covered by insurance since they are considered cosmetic procedures. Patients should verify with their insurance provider for precise coverage information. Q3: Can I get an exact quote for my Beard Hair Transplant Cost before deciding? A3: During a consultation with Dr. John Kahen at BHHR, you can receive an exact quote for your Beard hair transplant cost. Dr. Kahen will assess your needs and provide a personalized quote based on your desired outcomes. Q4: Is there any consultation fee for discussing Beard Hair Transplant Costs at BHHR? A4: There is no consultation fee to discuss Beard Hair Transplant Costs at BHHR. We offer a free Hair Transplant Consultation, where you can meet with Dr. John Kahen, discuss your needs, and receive a personalized estimate for your procedure.
Oncotarget Research Papers: The clinical significance and underlying correlation of pStat-3 and integrin αvβ6 expression in gallbladder cancer PDF |  HTML  |  How to cite Oncotarget. 2017; 8:19467-19477. https://doi.org/10.18632/oncotarget.14444 Metrics: PDF 1902 views  |   HTML 2370 views  |   ?   Liu Enyu _, Wang Na, Zhao Chuanzong, Wang Ben, Wu Xiaojuan, Wang Yan, Li Zequn, Hong Jianguo, Wang Jiayong, Liang Benjia, Peng Cheng, Zhu Min and Zhang Zongli Abstract Liu Enyu1,*, Wang Na2,*, Zhao Chuanzong1, Wang Ben1, Wu Xiaojuan3, Wang Yan3, Li Zequn1,4, Hong Jianguo1, Wang Jiayong1, Liang Benjia1,4, Peng Cheng1, Zhu Min1, Zhang Zongli1 1Department of General Surgery, Qilu Hospital of Shandong University, Jinan 250012, Shandong, P.R. China 2Department of Dermatology, Shandong Provinical Institute of dermatology and venereology, Jinan 250012, Shandong, P.R. China 3Department of Pathology, School of Medicine, Shandong University, Jinan 250012, Shandong, P.R. China 4Key Laboratory of Cardiovascular Remodeling and Function Research, Chinese Ministry of Education and Public Health, Jinan 250012, Shandong, P.R. China *The First two authors have contributed equally to this work Correspondence to: Liu Enyu, email: [email protected] Zhang Zongli, email: [email protected] Zhu Min, email: [email protected] Keywords: gallbladder cancer, integrin β6, pStat-3, immunohistochemistry, tumorigenesis Received: April 28, 2016    Accepted: November 01, 2016    Published: January 02, 2017 ABSTRACT Background: Both phosphorylated signal transducer and activator of transcription 3(pStat-3) and integrin αvβ6 can play vital role in the development and progression of cancer. However, little is known about their expression correlation and clinical significance in gallbladder cancer(GBC). Objective: The aim of our present study was to investigate the expression of pStat-3 and integrin αvβ6, two proteins’ correlation and their clinical significance in GBC tissues. Results: The expression of pStat-3 and integrin αvβ6 were both significantly associated with T stage, lymph node metastasis status, TNM stage (P=0.008, P=0.000, P=0.000 and P=0.036, P=0.001,P=0.000,respectively). IHC and Western blot showed their expressions in GBC tissues were higher than that in paraneoplastic tissues. Moderate positive correlation existed between the two proteins (r =0.349, P <0.001). The survival analysis by Kaplan-Meier and Cox regression model showed that GBC patients with pStat-3 or integrin αvβ6 positive expression had a significantly poorer 2-year survival rate (P = 0.002 and 0.000, the log-rank test, respectively), and either marker could act as unfavorable independent prognostic factors(RR=1.907, P=0.021 and RR=2.046, P=0.038). Materials and Methods: The expression levels of pStat-3 and integrin αvβ6 were analyzed in GBC cancerous and paraneoplastic tissues of 97 cases via immunohistochemistry(IHC) and further validated by western blot method. Besides, SPSS software was used to observe their clinical significance as well as the two proteins’ correlation. Conclusion: pStat-3 and integrin αvβ6 were indicators of tumor’s progression and poor prognosis of patients with GBC. And the further study involving them may provide a helpful therapeutic target in prevention and treatment of GBC patients. INTRODUCTION Gallbladder cancer (GBC) is a highly aggressive malignant tumor of the biliary tract, which ranks fifth common among gastrointestinal cancers and accounts for 46% of biliary tract cancers in the United States [1]. Meanwhile the incidence rate of GBC is now increasing worldwide, with a rather poor prognosis [2]. However, most of these patients are diagnosed at an advanced stage lacking chances of radical surgery [3], and only about 10% were detected at early stage [4]. Therefore, it is important to explore underlying molecular mechanism of GBC for improve prognosis of GBC patients. Generally known, long-term chronic inflammation predisposes tissue to cancer development in the process of GBC tumorigenesis [57]. Current studies have shown that signal transducer and activator of transcription 3 (STAT3) is a definitive link between inflammation and cancer transformation [8]. As a transcriptional factor, phosphorylation of STAT3 can subsequently promote transcriptions of target genes involving inflammation and malignancy. Consequently, persistent Stat3 target gene activation can stimulate cell growth, angiogenesis, metastasis, and anti-apoptosis, thereby driving and sustaining tumorigenesis [911]. Recent evidence has proved that STAT3 is involved in promoting transcription of integrin beta6 in oral squamous cell carcinoma and prostate epithelial cell caicinoma cells [12, 13]. As is known, integrin families(24 members compromising of 18 α-subunits and 8 β-subunit) can mediate cellular adhesion to extracellular matrix (ECM) and modulate diverse process such as cell proliferation, migration, invasion, and survival by activating intracellular signaling pathways [1416]. Integrin β6, with its sole binding partner αv subunit, is an epithelial-cell-restricted antigen, which is expressed in tissue remodeling events (e.g., fibrosis, wound healing), as well as epithelial cancers (e.g., lung, breast, pancreas, ovary, oropharynx and colon) [17]. Integn αvβ6 plays an vital role in various aspects of cancer progression and tissue repairing [18, 19]. However, the expression relationship of STAT3 and integrin αvβ6 in gallbladder cancer, and their underlying interaction at molecular level have not been investigated before. The aim of our present study was to explore the expression and clinical significance of STAT3 combined with integrin αvβ6 in GBC, which could provide a novel strategy for further study of molecular mechanism in therapeutic intervention. RESULTS The expression of pStat-3 and integrin αvβ6 in patients with gallbladder adenocarcinoma Immunohistochemistry results showed that pStat-3 was detected mainly in the nuclei, as well as in the cytoplasm. And integrinαvβ6 was expressed both in cytoplasm and on cellular membrane. For pStat-3 expression, 59 of 97 cases with GBC could express pStat-3 in tumor tissue, with positive rate of 60.8%, while 38 ones could not be stained as negative expression (Figure 1, Table 1). For integrin αvβ6 patients, 44 of 97 cases(45.4%) were positive expression, and 53 were negative (Figure 2, Table 1). And in the normal peritumoral tissues for the two markers were all negative staining(P<0.001). Moreover, we could find only 5 pStat-3 positive expression and 2 integrinαvβ6 positive expression exsiting in chronic cholecystitis tissues of 36 patients, significantly lower than that in tumor tissues. pStat-3 expression in human gallbladder carcinoma. Figure 1: pStat-3 expression in human gallbladder carcinoma. First row: a, b. (Magnification 100 X);second row: c, d. corresponding to each figure above (Magnification 200 X, 400 X, respectively). (a) and (c) were obtained from paracancerous normal tissue of patient with GBC, with negative staining. (b) and (d) were obtained from GBC tissue, with positive pStat-3 expression. Table 1: Association between pStat-3 expression, Integrinαvβ6 expression and clinicopathologic variables in gallbladder cancer patients Clinicopathological factors n pStat-3 expression P Value Integrin αvβ6 expression P Value Positive (n=59) Negative (n=38) Positive (n=44) Negative (n=53) Gender 0.565 0.271  Male 34 22 12 18 16  Female 63 37 26 26 37 Age(years) 0.577 0.426  <60 35 20 15 14 21  >=60 62 39 23 30 32 T stage 0.008 # 0.036 #  T1 9 3 6 4 5  T2 43 23 20 13 30  T3 35 23 12 20 15  T4 10 10 0 7 3 Lymph node metastasis 0.000 0.001  yes 36 30 6 30 6  no 61 29 32 14 47 TNM stage 0.000 # 0.000 #  I 6 1 5 1 5  II 26 7 19 1 25  III 48 35 13 30 18  IV 17 16 1 12 5 Differentiation 0.778 0.268  well 46 26 20 17 29  moderate 37 24 13 19 18  Poor/undifferentiated 14 9 5 8 6 Gallstone 0.147 0.423  No 55 30 25 23 32  Yes 42 29 13 21 21 Pathological type 0.117 0.336  adenocarcinoma 79 45 34 34 45 Squamous/ adenosquamous carcinoma 18 14 4 10 8 Survival (24-month follow-up) 0.002* 0.000*  death 79 52 27 37 42  censored 18 7 11 7 11 * Log-rank test; # Fisher’s Exact Test Furthermore, we performed western blot analysis to validate the expression of αvβ6 and pStat-3 in GBC tissue, we performed western blot analysis in 10 paired primary tumor tissue and corresponding paracancerous nontumorous tissue, which indicated the expression of both proteins in 6 tumor tissues were significantly higher than that in their corresponding normal tissues among all the 10 GBC patients, as shown in Figure 2. Integrin&#x03B2;6 expression in human gallbladder carcinoma. Figure 2: Integrinβ6 expression in human gallbladder carcinoma. First row: a, b. (Magnification 100 X);second row: c, d. (Magnification 200 X). (a) and (c). were obtained from paracancerous normal tissue of patient with GBC, with negative staining. (b) and (d). were obtained from GBC tissue, with negative integrinβ6 expression. e. To further validate the expression of αvβ6 and pStat-3 in GBC, we performed western blot analysis, which indicated the expression of both proteins in tumor tissues were significantly higher than that in corresponding paracancerous normal tissue. Correlations of pStat-3 and integrinαvβ6 expression with clinicopathologic features of gallbladder adenocarcinoma pStat-3 positive staining is significantly higher in advanced T stage and TNM stages(P=0.008, P=0.000, respectively). Meanwhile, lymph node metastasis also affected pStat-3 staining, the pStat-3 positive rate of specimens with lymph node metastasis was 83.3%, much higher than that of no lymph node metastasis group 47.5%(P=0.000). As for integrin αvβ6, significant association also existed between positive integrinαvβ6 expression and advanced T stage (P= 0.036),TNM stage (P= 0.000), as well as lymph node metastasis status (P= 0.001). However, there was no significant association among pStat-3 expression, patients’ gender and age, pathological grade and type, and gallstone status, which was similar in patients’ integrinαvβ6 expression. The detailed clinicopathologic data for pStat-3 and integrinαvβ6 are outlined in Table 1. pStat-3 or integrinαvβ6 expression and the survival of patients with GBC All the 97 patients with gallbladder carcinoma were followed up for 24 month follow-up was conducted after surgery through email or phones. Kaplan-Meier survival analysis showed that patients with positive pStat-3 or integrinαvβ6 expression had a significantly poorer overall survival than those with negative expression (P = 0.002, P=0.000, The log-rank test, respectively). Patients’ survival over time on pStat-3 or integrinαvβ6 expression is illustrated in Figure 3 and Figure 4. Overall survival according to pStat-3 expression (P &#x003D; 0.002, The log-rank test). Figure 3: Overall survival according to pStat-3 expression (P = 0.002, The log-rank test). Overall survival according to &#x03B1;v&#x03B2;6 expression(P &#x003D; 0.000, The log-rank test) Figure 4: Overall survival according to αvβ6 expression(P = 0.000, The log-rank test) The correlation between integrinαvβ6 and pStat-3 expression in patients with GBC As shown in Table 2, 35 of 44 patients(79.5%) with positive integrin αvβ6 expression was observed in positive pStat-3 expression tissue, while 29 of 53 patients(54.7%) with negative integrin αvβ6 expression existed in negative pStat-3 expression tissue. According to the Spearman correlation analysis, integrinαvβ6 expression had a moderate positive correlation with pStat-3 expression in patients with GBC(r =0.349,P <0.001, Table 2). Table 2: Correlation between integrinαvβ6 expression and pStat-3 expression in human gallbladder carcinoma tissues (Spearman correlation, r = 0.349, P < 0.001) pStat-3 integrin αvβ6 total Positive Negative Positive 35 24 59 Negative 9 29 38 total 44 53 97 These 97 cases with GBC were classified into 4 groups according to integrinαvβ6 and pStat-3 expression, as follows: Group 1 with pStat-3(–) / integrinαvβ6(–) (n = 29); Group 2 with pStat-3(–) / integrinαvβ6(+) (n =9); Group 3 with pStat-3(+) / integrinαvβ6(–) ( n =24 ); and Group 4, pStat-3(+)/integrinαvβ6(+) ( n = 35). Patients with pStat-3(+)/integrinαvβ6(+) had a significantly poorer overall survival rate than other groups (P = 0.000, The log-rank test), which is illustrated in Figure 5. Overall survival according to pStat-3 with integrin &#x03B1;v&#x03B2;6 expression (P &#x003D; 0.028, The log-rank test) Figure 5: Overall survival according to pStat-3 with integrin αvβ6 expression (P = 0.028, The log-rank test) Univariate and multivariate analysis for prognosis of patients with gallbladder cancer Cox proportional hazards regression model was applied to perform univariate and multivariate analyses to determine the prognostic value of clinicopathologic factors, pStat-3 and integrinαvβ6 expression. In univariate analysis, positive expression of pStat-3 andαvβ6, plus advanced T stage, lymph node metastasis status and TNM stage could predict a poorer prognosis (P=0.004, P=0.001, P=0.028, P=0.002, P=0.011,respectively)(Shown in Table 3). Next, these variables with P<0.05 were collected for multivariate analysis, results revealed that positive pStat-3 andαvβ6 expression were unfavorable independent prognostic factors for patients with GBC( relative risk (RR): 1.907 and 2.046;P=0.021 and 0.038, respectively) (Shown in Table 3). Table 3: Univariate and multivariate analysis of association of clinicopathologic features with survival of GBC patients Variable Univariate Analysis Multivariate Analysis Relative Risk 95% CI P Value Relative Risk 95% CI P Value Age at Diagnosis 0.978 0.950, 1.007 0.137 gender  Male 1.000 (Ref.) - -  Female 1.311 0.810, 2.122 0.270 T stage 0.028 0.487  T1 1.000 (Ref.) - - 1.000 (Ref.) - -  T2 2.673 0.948,7.532 0.063 1.610 0.447,5.797 0.466  T3 4.287 1.502,12.236 0.007 2.500 0.685,9.126 0.166  T4 3.652 1.092,12.217 0.036 2.297 0.424,12.456 0.335 Lymph node metastasis  no 1.000 (Ref.) - - 1.000 (Ref.) - -  yes 2.027 1.291,3.183 0.002 1.359 0.630,2.934 0.434 TNM stage 0.011 0.521  I 1.000 (Ref.) - - 0.238  II 6.780 0.911,50.470 0.062 4.067 0.396,41.773 0.368  III 13.027 1.783,95.153 0.011 3.039 0.270,34.238 0.536  IV 10.208 1.340,77.791 0.025 2.250 0.172,29.374 Pathology Grade 0.166  Well 1.000 (Ref.) - -  Moderate 1.581 0.976,2.559 0.062  Poor/undifferentiated 1.406 0.711,2.782 0.328 Gallstone  No 1.000 (Ref.) - -  Yes 1.134 0.726,1.771 0.582 Pathological type  adenocarcinoma 1.000 (Ref.) - - Squamous/ adenosquamous carcinoma 1.044 0.602,1.808 0.879 pStat-3  negative expression 1.000 (Ref.) - - 1.000 (Ref.) - -  positive expression 1.991 1.240,3.197 0.004 1.907 1.103,3.297 0.021 αvβ6  Negative 1.000 (Ref.) - - 1.000 (Ref.) - -  Positive 2.174 1.383,3.419 0.001 2.046 1.041,4.022 0.038 DISCUSSION Gallbladder cancer is a very aggressive malignant tumor with rising incidence and poor clinical outcome [20]. Despite improvements made in diagnosis and treatments during the past years, the prognosis of GBC remains extremely unsatisfactory [2, 5]. Therefore, understanding and exploring the molecular mechanism of tumorigenesis is in urgency, which would contribute to treatment of patients with this disease. In our present study, the positive expression of pSTAT-3 and integrinαvβ6 were observed via IHC staining and Western blot method in GBC samples. And we found that both p-STAT3 and integrinαvβ6 expression were significantly correlated with clinicopathological features and survival time for patients with GBC. As is reported, integrinαvβ6 could be expressed in many epithelial cancers, including lung, breast, pancreas, ovary, oropharynx and colon cancers, as well as during tissue remodeling events such as fibrosis and wound healing [21, 22]. However, the expression of integrin αvβ6 in GBC has never been investigated before. In this study, for the first time, we found that integrinαvβ6 could be expressed in GBC cancerous tissues, and the expression rate was 45.4%. Also, our results showed that its expression were significantly associated with clinical TNM stage, lymph node metastasis and the depth of invasion of tumors. According to the Cox regression model and survival analysis, we could prove that integrinαvβ6 predicted a poor prognosis for GBC patients, the same as shown in patients with colonic and gastric carcinomas. We have previously shown a direct linkage between ERK2 and the cytoplasmic domain of β6, through which the increasing phosphorylation of ERK2 could effectively contribute to the activation of downstream targets, involved in regulation of cellular invasion, metastasis, anti-apoptosis, chemo resistance and degradation of extracellular matrix by mediating MMP-9 secretion [2326]. In present study, we first found p-Stat3 was obviously expressed in cancerous tissue of GBC, and its expression was also significantly associated with clinical TNM stage, T stage and lymph node metastasis. And the Cox regression model and survival analysis showed that pStat could also predict a poor prognosis for GBC patients. As a transcriptional factor, STAT3 can be activated through phosphorylation at tyrosine 705 (Y705) and serine 727 (S727) by inflammatory cytokines driven signaling including interleukin-6(IL-6), IL-10, IL-17, IL-21, IL-23, and vascular endothelial growth factor [27]. And phosphorylation of STAT3 can subsequently promote transcriptions of target genes involving inflammation and malignancy, such as Bcl-2, Bcl-xL, Mcl-1, Fas, cyclin D1, c-myc, VEGF, HIF-1, TGFβ, and TIMP-1,etc [28]. Normally, Stat3 is activated in a transient manner, while it can be constitutively activated in long-term inflammatory and cancerous cells [8]. As a result, persistent Stat3 target gene activation can promote tumor development and sustain tumorigenesis [29]. Importantly, in this study, we found moderate positive correlation exists between p-Stat3 and integrin αvβ6 by Spearman correlation analysis. To some extent, it demonstrated that certain interaction and relationship exist between protein expression levels of the two genes. This result is just in line with recent evidence that ITGB6 promoter contains a functional TATA box located −289 to−150 and that is binding sites for transcription factors STAT3 in oral squamous cell carcinoma cells [12]. Namely, integrin beta6 was downstream target genes of STAT3, which was involved in positive regulation of integrin beta6 transcription. In fact, integrin beta6 expression could be primarily regulated at the level of transcription initiation [30, 31], as well as at translational level [32]. It has been reported that under certain conditions, transcription factors including Ets-1 [30], STAT3 [12, 13], Smad3, AP-1 [33]and C/EBPα [12]could promote the initiation of integrin beta6 expression. We have known that the long-term chronic inflammation of gallbladder is a high risk factor for tumorigenesis of GBC, which could predispose inflammatory tissue to cancer development [20, 34]. The continuous evidence of recent years has convinced us that IL-6/JAK/STAT3 pathway can play a definitive role in the transformation from inflammation to cancer for colorectum tumor [35]. Phosphorylation of Stat3 at Y705 could be facilitated by JAK family, and it is required for Stat3 homo- or hetero-dimerization, nuclear translocation, and DNA binding [17]. Moreover, cytokine-driven JAK/STAT3 pathways are involved in cellular proliferation, differentiation, invasion, survival, and even inflammation and immune function of various human cancers [8, 11]. Taken together, we could make a reasonable hypothesis that cytokine-driven JAK/STAT3 pathways may also mediate the expression of integrin beta6, which play an important role in tumor development and progression of GBC. Of course, our further work aims to demonstrate our hypotheses in cell lines and animal model. Promisingly, targeting the IL-6/JAK/STAT3 pathway may provide potential strategies for prevention and treatment of GBC. MATERIALs AND METHODS Patients and follow-up We collected data and tumor specimens from patients diagnosed with gallbladder carcinoma(GBC) at Qilu Hospital of Shandong University between July 2006 and January 2013. All petients with GBC included in this study have received surgical resection(radical or palliative type) as the initial treatment modality without major perioperative complications, and also had enough archived tissue kept at Pathological Department of hospital. This resulted in a collection of tumor tissue from 97 patients, 34 males and 63 females with a median age of 61.3 years and an age range of 40–73 years. And for comparison, we also collected 76 benign gallbladder tissue samples including 40 peritumoral normal tissues taken from 97 GBC patients mentioned above, and the other 36 chronic cholecystitis tissues. These malignant and benign gallbladder carcinoma specimens were all formalin-fixed and paraffin-embedded. The pathologic tumor–node–metastasis(TNM) classification was based on the criteria of the 7th edition American Joint Committee on Cancer(AJCC), and the tumor stage was confirmed by expert pathologists. All the 97 patients with gallbladder carcinoma were followed up for 24 months after surgery through email or phones. Among those, 79(81.4%) were confirmed GBC-associated death within 24 months of prognosis, 14 patients were alive beyond 60 months, and 4 were censored as their case follow up was discontinued or died of reasons other than GBC. The mean survival time for these patients was 14.4 months. All patients or relatives signed an informed consent of this study. It was approved by the Ethics Committee of Qilu Hospital, Shandong University. The details of patients’ characteristics have been listed in Table 1. Antibodies and immunohistochemistry Immunohistochemistry was performed to evaluate the expression of pStat-3 and αvβ6 on 4 μm thickness Paraffin-embedded tissue sections. The rabbit-anti-human monoclonal antibody EP2147Y (1:150,Abcam,Cambridge UK)against STAT3 (phospho Y705) and goat-anti-human polyclonal C-19 agaist integrin β6 from Santa Cruz (1:200,Santa Cruz, USA) were applied respectively. HRP secondary antibodies and DAB kit were obtained from Zhongshan Golden Bridge (Beijing, China). Then, immunohistochemical staining for the two markers was done as follows. The sections were deparaffinized and hydrated, and the heat induced antigen epitope retrieval was performed using microwave method, then and the slides were immersed in EDTA antigen retrieval solution (pH 9.0) for 20 min. Subsequently, 3% hydrogen peroxide was added to inhibit endogenous peroxidase activity. Next, antibodies STAT3 (1:150; Abcam,Cambridge, UK), integrin β6 (1:200,Santa Cruz, USA) were applied to the sections, which were later incubated by either antibody at 4°C overnight. On the second day, tissue sections were incubated with universal IgG antibody-Fab-HRP polymer (Zhongshan Biotech, Beijing China)for 30 min; next, DAB and Hematoxylin were used to stain, and after sealed with neutral tree gum sequentially, sections were prepared for visualization under light microscope (Olympus Corp, Tokyo, Japan). Evaluation of pStat-3 and integrin αvβ6 immunohistochemistry It is known that integrinαvβ6 was expressed both in cytoplasm and on cellular membrane, mainly seen on the internal surface of the tumor epithelial cell membrane. And pStat-3 can Shuttle between the nucleus and the cytoplasm, which predominantly presents in the cytoplasm without stimuli, and accumulates in the nucleus upon stimulation. We evaluated the expression levels of pStat-3 and integrin αvβ6 via semi-quantitative method based on the average intensity and percentage of positively stained tumor cells. The score of intensity was graded as follows: 0 (no staining), 1 (weak staining, light yellow), 2 (moderate staining, yellow brown), and 3 (strong staining, brown). And the percentage of stained tumor cells was scored as (0, 0%; 1, <20%; 2, 20~50%; 3, 51~75%; 4, > 75%). Then we defined the staining class according to the consensus results of both scores as follows: < 2, negative expression; 2~4, low (weak) expression, and ≥5, high (strong) expression. And both low and high expressions were graded as αvβ6 and pStat-3 positive. Western blot analysis To further analyze and validate the expression of αvβ6 and pStat-3 in GBC, western blot analysis was performed in 10 paired fresh primary tumor tissue and corresponding paracancerous normal tissue. And these paired fresh specimen were collected immediately after surgery between January 2011 and November 2012 and were stored at −80°C. All patients have confirmed the informed consent. For Western Blot Analysis, total proteins extracted from fresh tissues were prepared in radio immunoprecipitation assay (RIPA) buffer (Beyotime, Jiangsu, China) including complete protease inhibitor cocktail (Roche Applied Science, Mannheim, Germany). Total proteins were separated by 10% SDSPAGE and then transferred to PVDF membranes. The membranes were blocked with 5% skim milk in Trisbuffered saline with 0.1% Tween-20 (TBST) for 1 h at room temperature and then incubated with anti- pStat-3 (1:1000; Abcam, Cambridge, UK), anti-integrinβ6 (1:1500, Santa Cruz, USA) or anti-GAPDH (1:1000; Abcam, Cambridge, UK) antibodies overnight at 4°C. After incubation with horseradish peroxidase conjugated anti-rabbit secondary antibodies for 1 h, proteins were detected using enhanced chemiluminescence (Millipore, Billerica, MA). Statistical analysis Statistical analyses were performed with SPSS 13.0 software. The relationship among expression of pStat-3, integrinαvβ6 and their clinicopathologic characteristics was examined using χ2 test or Fisher exact test. Survival analyses were carried out via the Kaplan-Meier method. And the Cox proportional hazard model was used to conduct univariate and Multivariate analysis. Besides, the relationship between pStat-3 and integrin αvβ6 expression levels was evaluated by Spearman correlation. P < 0.05 was considered statistically significant. CONCLUSION Our findings indicated that the expression levels of pSTAT3 and αvβ6 are up-regulated in GBC tissue, which were associated with tumor progression and poor prognosis of patients. Besides, moderate-poor correlation existed between the expression of pSTAT3 and integrin αvβ6, and molecular mechanism underlying them may contribute to the transformation from inflammation to cancer of GBC, which may provide a potential therapeutic approach to treat this disease. ACKNOWLEDGMENTS AND GRANT SUPPORT This study was supported by the research Grants from Key Technologies R & D Program of Shandong Provnice(2015GSF118091). CONFLICTS OF INTEREST None. Authors’ contributions LE was responsible for designing of the study and critical review of manuscript; LE, WN, XZ and ZMwere responsible for performing of the study, literature research and manuscript writing; WY, WX, ZC, WB, LZ, HJ and WJ were responsible for data acquisition, and LB, SQ, PC were for data analysis. All authors approved the final version of the manuscript. REFERENCEs 1. Jemal A, Siegel R, Ward E, Hao Y, Xu J, Murray T and Thun MJ. Cancer statistics, 2008. CA Cancer J Clin. 2008; 58:71-96. 2. Groot Koerkamp B and Fong Y. Outcomes in biliary malignancy. J Surg Oncol. 2014; 110:585-591. 3. Oh TG, Chung MJ, Bang S, Park SW, Chung JB, Song SY, Choi GH, Kim KS, Lee WJ and Park JY. Comparison of the sixth and seventh editions of the AJCC TNM classification for gallbladder cancer. J Gastrointest Surg. 2013; 17:925-930. 4. Jayaraman S and Jarnagin WR. Management of gallbladder cancer. Gastroenterol Clin North Am. 2010; 39:331-342, x. 5. Rakic M, Patrlj L, Kopljar M, Klicek R, Kolovrat M, Loncar B and Busic Z. Gallbladder cancer. Hepatobiliary Surg Nutr. 2014; 3:221-226. 6. Hart J, Modan B and Shani M. Cholelithiasis in the aetiology of gallbladder neoplasms. Lancet. 1971; 1:1151-1153. 7. Shrikhande SV, Barreto SG, Singh S, Udwadia TE and Agarwal AK. Cholelithiasis in gallbladder cancer: coincidence, cofactor, or cause! Eur J Surg Oncol. 2010; 36:514-519. 8. Han J and Theiss AL. Stat3: friend or foe in colitis and colitis-associated cancer? Inflamm Bowel Dis. 2014; 20:2405-2411. 9. Yu H, Kortylewski M and Pardoll D. Crosstalk between cancer and immune cells: role of STAT3 in the tumour microenvironment. Nat Rev Immunol. 2007; 7:41-51. 10. Niwa Y, Kanda H, Shikauchi Y, Saiura A, Matsubara K, Kitagawa T, Yamamoto J, Kubo T and Yoshikawa H. Methylation silencing of SOCS-3 promotes cell growth and migration by enhancing JAK/STAT and FAK signalings in human hepatocellular carcinoma. Oncogene. 2005; 24:6406-6417. 11. Thomas SJ, Snowden JA, Zeidler MP and Danson SJ. The role of JAK/STAT signalling in the pathogenesis, prognosis and treatment of solid tumours. Br J Cancer. 2015; 113:365-371. 12. Xu M, Chen X, Yin H, Yin L, Liu F, Fu Y, Yao J and Deng X. Cloning and characterization of the human integrin beta6 gene promoter. PLoS One. 2015; 10:e0121439. 13. Azare J, Leslie K, Al-Ahmadie H, Gerald W, Weinreb PH, Violette SM and Bromberg J. Constitutively activated Stat3 induces tumorigenesis and enhances cell motility of prostate epithelial cells through integrin beta 6. Mol Cell Biol. 2007; 27:4444-4453. 14. Seguin L, Desgrosellier JS, Weis SM and Cheresh DA. Integrins and cancer: regulators of cancer stemness, metastasis, and drug resistance. Trends Cell Biol. 2015; 25:234-240. 15. Hynes RO. Integrins: bidirectional, allosteric signaling machines. Cell. 2002; 110:673-687. 16. Barczyk M, Carracedo S and Gullberg D. Integrins. Cell Tissue Res. 2010; 339:269-280. 17. Bates RC, Bellovin DI, Brown C, Maynard E, Wu B, Kawakatsu H, Sheppard D, Oettgen P and Mercurio AM. Transcriptional activation of integrin beta6 during the epithelial-mesenchymal transition defines a novel prognostic indicator of aggressive colon carcinoma. J Clin Invest. 2005; 115: 339-347. 18. Cantor D, Slapetova I, Kan A, McQuade LR and Baker MS. Overexpression of alphavbeta6 integrin alters the colorectal cancer cell proteome in favor of elevated proliferation and a switching in cellular adhesion that increases invasion. J Proteome Res. 2013; 12:2477-2490. 19. Bates RC. The alphaVbeta6 integrin as a novel molecular target for colorectal cancer. Future Oncol. 2005; 1:821-828. 20. Hundal R and Shaffer EA. Gallbladder cancer: epidemiology and outcome. Clin Epidemiol. 2014; 6:99-109. 21. Bandyopadhyay A and Raghavan S. Defining the role of integrin alphavbeta6 in cancer. Curr Drug Targets. 2009; 10:645-652. 22. Thomas GJ, Nystrom ML and Marshall JF. Alphavbeta6 integrin in wound healing and cancer of the oral cavity. J Oral Pathol Med. 2006; 35:1-10. 23. Ahmed N, Niu J, Dorahy DJ, Gu X, Andrews S, Meldrum CJ, Scott RJ, Baker MS, Macreadie IG and Agrez MV. Direct integrin alphavbeta6-ERK binding: implications for tumour growth. Oncogene. 2002; 21:1370-1380. 24. Zhao-Yang Z, Ke-Sen X, Qing-Si H, Wei-Bo N, Jia-Yong W, Yue-Tang M, Jin-Shen W, Guo-Qiang W, Guang-Yun Y and Jun N. Signaling and regulatory mechanisms of integrin alphavbeta6 on the apoptosis of colon cancer cells. Cancer Lett. 2008; 266:209-215. 25. Gu X, Niu J, Dorahy DJ, Scott R and Agrez MV. Integrin alpha(v)beta6-associated ERK2 mediates MMP-9 secretion in colon cancer cells. Br J Cancer. 2002; 87:348-351. 26. Liu S, Wang J, Niu W, Liu E, Peng C, Lin P, Wang B, Khan AQ, Gao H, Liang B, Shahbaz M and Niu J. The beta6-integrin-ERK/MAP kinase pathway contributes to chemo resistance in colon cancer. Cancer Lett. 2013; 328:325-334. 27. Levy DE and Lee CK. What does Stat3 do? J Clin Invest. 2002; 109:1143-1148. 28. Ernst M, Thiem S, Nguyen PM, Eissmann M and Putoczki TL. Epithelial gp130/Stat3 functions: an intestinal signaling node in health and disease. Semin Immunol. 2014; 26:29-37. 29. Fichtner-Feigl S, Kesselring R and Strober W. Chronic inflammation and the development of malignancy in the GI tract. Trends Immunol. 2015. 30. Bates RC, Bellovin DI, Brown C, Maynard E, Wu B, Kawakatsu H, Sheppard D, Oettgen P and Mercurio AM. Transcriptional activation of integrin beta6 during the epithelial-mesenchymal transition defines a novel prognostic indicator of aggressive colon carcinoma. J Clin Invest. 2005; 115:339-347. 31. Wang B, Wang W, Niu W, Liu E, Liu X, Wang J, Peng C, Liu S, Xu L, Wang L and Niu J. SDF-1/CXCR4 axis promotes directional migration of colorectal cancer cells through upregulation of integrin alphavbeta6. Carcinogenesis. 2014; 35:282-291. 32. Enyu L, Zhengchuan N, Jiayong W, Benjia L, Qi S, Ruixi Q, Cheng P, Khan AQ, Wei S and Jun N. Integrin beta6 can be translationally regulated by eukaryotic initiation factor 4E: Contributing to colonic tumor malignancy. Tumour Biol. 2015. 33. Sullivan BP, Kassel KM, Manley S, Baker AK and Luyendyk JP. Regulation of transforming growth factor-beta1-dependent integrin beta6 expression by p38 mitogen-activated protein kinase in bile duct epithelial cells. J Pharmacol Exp Ther. 2011; 337:471-478. 34. Rashid A, Ueki T, Gao YT, Houlihan PS, Wallace C, Wang BS, Shen MC, Deng J and Hsing AW. K-ras mutation, p53 overexpression, and microsatellite instability in biliary tract cancers: a population-based study in China. Clin Cancer Res. 2002; 8:3156-3163. 35. Wang SW and Sun YM. The IL-6/JAK/STAT3 pathway: potential therapeutic strategies in treating colorectal cancer (Review). Int J Oncol. 2014; 44:1032-1040. Creative Commons License All site content, except where otherwise noted, is licensed under a Creative Commons Attribution 3.0 License. PII: 14444
Authoring Workflows, Activities, and Expressions Using Imperative Code A workflow definition is a tree of configured activity objects. This tree of activities can be defined many ways, including by hand-editing XAML or by using the Workflow Designer to produce XAML. Use of XAML, however, is not a requirement. Workflow definitions can also be created programmatically. This topic provides an overview of creating workflow definitions, activities, and expressions by using code. For examples of working with XAML workflows using code, see Serializing Workflows and Activities to and from XAML. Creating Workflow Definitions A workflow definition can be created by instantiating an instance of an activity type and configuring the activity object’s properties. For activities that do not contain child activities, this can be accomplished using a few lines of code. Activity wf = new WriteLine { Text = "Hello World." }; WorkflowInvoker.Invoke(wf); Note The examples in this topic use WorkflowInvoker to run the sample workflows. For more information about invoking workflows, passing arguments, and the different hosting choices that are available, see Using WorkflowInvoker and WorkflowApplication. In this example, a workflow that consists of a single WriteLine activity is created. The WriteLine activity’s Text argument is set, and the workflow is invoked. If an activity contains child activities, the method of construction is similar. The following example uses a Sequence activity that contains two WriteLine activities. Activity wf = new Sequence { Activities = { new WriteLine { Text = "Hello" }, new WriteLine { Text = "World." } } }; WorkflowInvoker.Invoke(wf); Using Object Initializers The examples in this topic use object initialization syntax. Object initialization syntax can be a useful way to create workflow definitions in code because it provides a hierarchical view of the activities in the workflow and shows the relationship between the activities. There is no requirement to use object initialization syntax when you programmatically create workflows. The following example is functionally equivalent to the previous example. WriteLine hello = new WriteLine(); hello.Text = "Hello"; WriteLine world = new WriteLine(); world.Text = "World"; Sequence wf = new Sequence(); wf.Activities.Add(hello); wf.Activities.Add(world); WorkflowInvoker.Invoke(wf); For more information about object initializers, see How to: Initialize Objects without Calling a Constructor (C# Programming Guide) and How to: Declare an Object by Using an Object Initializer. Working with Variables, Literal Values, and Expressions When creating a workflow definition using code, be aware of what code executes as part of the creation of the workflow definition and what code executes as part of the execution of an instance of that workflow. For example, the following workflow is intended to generate a random number and write it to the console. Variable<int> n = new Variable<int> { Name = "n" }; Activity wf = new Sequence { Variables = { n }, Activities = { new Assign<int> { To = n, Value = new Random().Next(1, 101) }, new WriteLine { Text = new InArgument<string>((env) => "The number is " + n.Get(env)) } } }; When this workflow definition code is executed, the call to Random.Next is made and the result is stored in the workflow definition as a literal value. Many instances of this workflow can be invoked, and all would display the same number. To have the random number generation occur during workflow execution, an expression must be used that is evaluated each time the workflow runs. In the following example, a Visual Basic expression is used with a VisualBasicValue<TResult>. new Assign<int> { To = n, Value = new VisualBasicValue<int>("New Random().Next(1, 101)") } The expression in the previous example could also be implemented using a CSharpValue<TResult> and a C# expression. new Assign<int> { To = n, Value = new CSharpValue<int>("new Random().Next(1, 101)") } C# expressions must be compiled before the workflow containing them is invoked. If the C# expressions are not compiled, a NotSupportedException is thrown when the workflow is invoked with a message similar to the following: Expression Activity type 'CSharpValue`1' requires compilation in order to run. Please ensure that the workflow has been compiled. In most scenarios involving workflows created in Visual Studio the C# expressions are compiled automatically, but in some scenarios, such as code workflows, the C# expressions must be manually compiled. For an example of how to compile C# expressions, see the Using C# expressions in code workflows section of the C# Expressions topic. A VisualBasicValue<TResult> represents an expression in Visual Basic syntax that can be used as an r-value in an expression, and a CSharpValue<TResult> represents an expression in C# syntax that can be used as an r-value in an expression. These expressions are evaluated each time the containing activity is executed. The result of the expression is assigned to the workflow variable n, and these results are used by the next activity in the workflow. To access the value of the workflow variable n at run time, the ActivityContext is required. This can be accessed by using the following lambda expression. Note Note that both of these code are examples are using C# as the programming language, but one uses a VisualBasicValue<TResult> and one uses a CSharpValue<TResult>. VisualBasicValue<TResult> and CSharpValue<TResult> can be used in both Visual Basic and C# projects. By default, expressions created in the workflow designer match the language of the hosting project. When creating workflows in code, the desired language is at the discretion of the workflow author. In these examples the result of the expression is assigned to the workflow variable n, and these results are used by the next activity in the workflow. To access the value of the workflow variable n at run time, the ActivityContext is required. This can be accessed by using the following lambda expression. new WriteLine { Text = new InArgument<string>((env) => "The number is " + n.Get(env)) } For more information about lambda expressions, see Lambda Expressions (C# reference) or Lambda Expressions (Visual Basic). Lambda expressions are not serializable to XAML format. If an attempt to serialize a workflow with lambda expressions is made, a LambdaSerializationException is thrown with the following message: "This workflow contains lambda expressions specified in code. These expressions are not XAML serializable. In order to make your workflow XAML-serializable, either use VisualBasicValue/VisualBasicReference or ExpressionServices.Convert(lambda). This will convert your lambda expressions into expression activities." To make this expression compatible with XAML, use ExpressionServices and Convert, as shown in the following example. new WriteLine { //Text = new InArgument<string>((env) => "The number is " + n.Get(env)) Text = ExpressionServices.Convert((env) => "The number is " + n.Get(env)) } A VisualBasicValue<TResult> could also be used. Note that no lambda expression is required when using a Visual Basic expression. new WriteLine { //Text = new InArgument<string>((env) => "The number is " + n.Get(env)) //Text = ExpressionServices.Convert((env) => "The number is " + n.Get(env)) Text = new VisualBasicValue<string>("\"The number is \" + n.ToString()") } At run time, Visual Basic expressions are compiled into LINQ expressions. Both of the previous examples are serializable to XAML, but if the serialized XAML is intended to be viewed and edited in the workflow designer, use VisualBasicValue<TResult> for your expressions. Serialized workflows that use ExpressionServices.Convert can be opened in the designer, but the value of the expression will be blank. For more information about serializing workflows to XAML, see Serializing Workflows and Activities to and from XAML. Literal Expressions and Reference Types Literal expressions are represented in workflows by the Literal<T> activity. The following WriteLine activities are functionally equivalent. new WriteLine { Text = "Hello World." }, new WriteLine { Text = new Literal<string>("Hello World.") } It is invalid to initialize a literal expression with any reference type except String. In the following example, an Assign activity's Value property is initialized with a literal expression using a List<string>. new Assign { To = new OutArgument<List<string>>(items), Value = new InArgument<List<string>>(new List<string>()) }, When the workflow containing this activity is validated, the following validation error is returned: "Literal only supports value types and the immutable type System.String. The type System.Collections.Generic.List`1[System.String] cannot be used as a literal." If the workflow is invoked, an InvalidWorkflowException is thrown that contains the text of the validation error. This is a validation error because creating a literal expression with a reference type does not create a new instance of the reference type for each instance of the workflow. To resolve this, replace the literal expression with one that creates and returns a new instance of the reference type. new Assign { To = new OutArgument<List<string>>(items), Value = new InArgument<List<string>>(new VisualBasicValue<List<string>>("New List(Of String)")) }, For more information about expressions, see Expressions. Invoking Methods on Objects using Expressions and the InvokeMethod Activity The InvokeMethod<TResult> activity can be used to invoke static and instance methods of classes in the .NET Framework. In a previous example in this topic, a random number was generated using the Random class. new Assign<int> { To = n, Value = new VisualBasicValue<int>("New Random().Next(1, 101)") } The InvokeMethod<TResult> activity could also have been used to call the Next method of the Random class. new InvokeMethod<int> { TargetObject = new InArgument<Random>(new VisualBasicValue<Random>("New Random()")), MethodName = "Next", Parameters = { new InArgument<int>(1), new InArgument<int>(101) }, Result = n } Since Next is not a static method, an instance of the Random class is supplied for the TargetObject property. In this example a new instance is created using a Visual Basic expression, but it could also have been created previously and stored in a workflow variable. In this example, it would be simpler to use the Assign<T> activity instead of the InvokeMethod<TResult> activity. If the method call ultimately invoked by either the Assign<T> or InvokeMethod<TResult> activities is long running, InvokeMethod<TResult> has an advantage since it has a RunAsynchronously property. When this property is set to true, the invoked method will run asynchronously with regard to the workflow. If other activities are in parallel, they will not be blocked while the method is asynchronously executing. Also, if the method to be invoked has no return value, then InvokeMethod<TResult> is the appropriate way to invoke the method. Arguments and Dynamic Activities A workflow definition is created in code by assembling activities into an activity tree and configuring any properties and arguments. Existing arguments can be bound, but new arguments cannot be added to activities. This includes workflow arguments passed to the root activity. In imperative code, workflow arguments are specified as properties on a new CLR type, and in XAML they are declared by using x:Class and x:Member. Because there is no new CLR type created when a workflow definition is created as a tree of in-memory objects, arguments cannot be added. However, arguments can be added to a DynamicActivity. In this example, a DynamicActivity<TResult> is created that takes two integer arguments, adds them together, and returns the result. A DynamicActivityProperty is created for each argument, and the result of the operation is assigned to the Result argument of the DynamicActivity<TResult>. InArgument<int> Operand1 = new InArgument<int>(); InArgument<int> Operand2 = new InArgument<int>(); DynamicActivity<int> wf = new DynamicActivity<int> { Properties = { new DynamicActivityProperty { Name = "Operand1", Type = typeof(InArgument<int>), Value = Operand1 }, new DynamicActivityProperty { Name = "Operand2", Type = typeof(InArgument<int>), Value = Operand2 } }, Implementation = () => new Sequence { Activities = { new Assign<int> { To = new ArgumentReference<int> { ArgumentName = "Result" }, Value = new InArgument<int>((env) => Operand1.Get(env) + Operand2.Get(env)) } } } }; Dictionary<string, object> wfParams = new Dictionary<string, object> { { "Operand1", 25 }, { "Operand2", 15 } }; int result = WorkflowInvoker.Invoke(wf, wfParams); Console.WriteLine(result); For more information about dynamic activities, see Creating an Activity at Runtime. Compiled Activities Dynamic activities are one way to define an activity that contains arguments using code, but activities can also be created in code and compiled into types. Simple activities can be created that derive from CodeActivity, and asynchronous activities that derive from AsyncCodeActivity. These activities can have arguments, return values, and define their logic using imperative code. For examples of creating these types of activities, see CodeActivity Base Class and Creating Asynchronous Activities. Activities that derive from NativeActivity can define their logic using imperative code and they can also contain child activities that define the logic. They also have full access to the features of the runtime such as creating bookmarks. For examples of creating a NativeActivity-based activity, see NativeActivity Base Class, How to: Create an Activity, and the Custom Composite using Native Activity sample. Activities that derive from Activity define their logic solely through the use of child activities. These activities are typically created by using the workflow designer, but can also be defined by using code. In the following example, a Square activity is defined that derives from Activity<int>. The Square activity has a single InArgument<T> named Value, and defines its logic by specifying a Sequence activity using the Implementation property. The Sequence activity contains a WriteLine activity and an Assign<T> activity. Together, these three activities implement the logic of the Square activity. class Square : Activity<int> { [RequiredArgument] public InArgument<int> Value { get; set; } public Square() { this.Implementation = () => new Sequence { Activities = { new WriteLine { Text = new InArgument<string>((env) => "Squaring the value: " + this.Value.Get(env)) }, new Assign<int> { To = new OutArgument<int>((env) => this.Result.Get(env)), Value = new InArgument<int>((env) => this.Value.Get(env) * this.Value.Get(env)) } } }; } } In the following example, a workflow definition consisting of a single Square activity is invoked using WorkflowInvoker. Dictionary<string, object> inputs = new Dictionary<string, object> {{ "Value", 5}}; int result = WorkflowInvoker.Invoke(new Square(), inputs); Console.WriteLine("Result: {0}", result); When the workflow is invoked, the following output is displayed to the console: Squaring the value: 5 Result: 25
Click here to Skip to main content 11,414,670 members (68,354 online) Click here to Skip to main content Add your own alternative version Resource ID Organiser Add-In for Visual C++ 5.0/6.0/.NET , 10 Jan 2005 CPOL An application/add-in to organise and renumber resource symbol IDs resorg103.zip ResOrg103.exe resorg104.zip ResOrg104.exe resorgaddinsetup.zip ResOrgAddInSetup.exe resorgaddin_executables.zip ResOrg.exe BXFileDialog.dll CJ609Lib.dll NGLib103.dll ResOrgAddIn.dll ResOrgCore.dll ResOrg.cnt resorg.fts ResOrg.hlp resorgnetaddinsetup.zip ResOrgNETAddInSetup.msi resorgnetaddin_executables.zip ResOrgNETAddInToolWindows.ocx ResOrgNET.exe CJ609LibVc7.dll NGLib103Vc7.dll ResOrgNETAddIn.dll ResOrgNETCore.dll ResOrg.cnt resorg.fts ResOrg.hlp ReadMe.rtf Licence.rtf resorgnet_executables.zip ResOrgNET_executables CJ609LibVc7.dll NGLib103Vc7.dll QHTMLight.dll ResOrg.cnt resorg.fts ResOrg.hlp ResOrgNETAddIn.dll ResOrgNETAddInToolWindows.ocx ResOrgNETCore.dll resorg_demo.zip ResOrg103.exe resorg_executables.zip ResOrgAddIn.dll BXFileDialog.dll CJ609Lib.dll ResOrg.exe ResOrg.cnt resorg.fts ResOrg.hlp ResOrgCore.dll NGLib103.dll resorg_src.zip BXFileDialog BXFileDialog.dsp Lib Release Res bitmap2.bmp FileOpen.bmp filesave.bmp CJLibrary CJLibrary CJLibrary.def CJLibrary.dsp CJLibrary.dsw CJLibrarydep.jpg CJLibraryStatic.dsp Debug_Unicode Release Release_Unicode res Include res btn_arro.bmp btn_explorer.bmp button_images.bmp cj_logo.bmp dragging.cur handcur.cur headerba.bmp hsplitba.cur icr_hand.cur nodraggi.cur PushPin.bmp Toolbar.bmp vsplitba.cur Lib default.doxygen NGLibrary Bin NGLibrary.def NGLibrary.dsp NGLibrary.dsw Release Res Drives.bmp Release ResOrg.dsw ResOrgAddIn Release Res HtmlDoc.ico ResOrg.ico ResOrgDoc.ico TBarLrge.bmp TBarMedm.bmp Toolbar.bmp WorkspaceTabs.bmp ResOrgAddIn.def ResOrgAddIn.dsp ResOrgAddIn.odl ResOrgAddIn_Res.hm ResOrgApp Lint Release Res HtmlDoc.ico MAINFRAM.BMP ResOrg.ico ResOrgDoc.ico TBarLrge.bmp TBarMedm.bmp Toolbar.bmp workspace.ico WorkspaceTabs.bmp ResOrgApp.dsp ResOrgApp_Res.hm ResOrgApp_Res.resorg ResOrgCore Lint Release Res Anna.bmp BuildOptions.ico ComCtl Version Prompt.rtf File Reload Warning Ex.rtf File Reload Warning.rtf Global Next Symbol Value Warning Prompt.rtf information.ico Invalid Symbol Name.rtf Mailing List Prompt.rtf Next Symbol Value Warning Prompt.rtf project context menu.bmp project.ico RenumWiz Completion.rtf Report.ico ResOrg Logo.bmp ResOrg Updated.rtf ResOrg.ico resource file.ico riverblade_logo.bmp solution.ico Symbol Delete Warning.rtf Symbol Name Warning.rtf Symbol Rename Warning.rtf SymbolFile.ico Symbols Delete Warning.rtf sym_binary.ico sym_bitmap.ico sym_command.ico sym_control.ico sym_dialog.ico sym_icon.ico sym_menu.ico sym_prompt.ico sym_resource.ico sym_string.ico Toolbar.bmp VcAddIn.ico VersionCheck.ico warning.ico WizardHeader256.bmp WizardWatermark256.bmp ResOrgCore.def ResOrgCore.dsp ResOrgCore_Res.hm ResOrgCore_Res.resorg Xml ProblemSymbolReportHtml.xsl SymbolsReportHtml.xsl ResOrgNETAddIn AddIn.def Release Res AddIn.rgs HtmlDoc.ico ResOrg.ico ResOrgDoc.ico Toolbar.bmp WorkspaceTabs.bmp ResOrgNETAddInSetup Banner.jpg Intro screen.jpg Licence.rtf ReadMe.rtf Release ResOrg.ico ResOrgNETAddInSetup.vdproj ResOrgNETAddInToolWindows Release Res Edit.ico Properties.ico Renumber.ico ResOrgNETAddInToolWindows.ico ResOrgNETAddInToolWindowsCtrl.bmp ResOrgNETAddInToolWindows.def SatelliteDll Release res AboutBoxCmd.bmp OpenResOrgCmd.bmp OptionsCmd.bmp ViewMainToolWinCmd.bmp /************************************************************************ * * Resource ID Organiser Add-In for Visual C++.NET * * (c) Copyright 2000-2002 by Anna-Jayne Metcalfe (resorg@annasplace.me.uk) * All rights reserved. * ************************************************************************ * * Filename : StdAfx.cpp * * Description : Source file that includes just the standard includes. * AddIn.pch will be the pre-compiled header; * StdAfx.obj will contain the pre-compiled type information * * Compiler : Microsoft Visual C++.NET 2002 * * Target * Environment : Windows 2000/XP * * NOTE: * * This software is provided "as is" free for personal use. All * title and copyrights in and to the software, including but not * limited to any images, text, etc. incorporated into it, are * owned by Anna-Jayne Metcalfe, except where acknowledged otherwise. * * Your may freely to use this code in your own products, PROVIDED * this notice is not removed or modified. * * * Visit http://www.annasplace.me.uk/resorg for latest updates * ************************************************************************ * * MODIFICATION HISTORY: * * This is a controlled document. See project configuration * control tool for latest version and full version history. * * $Archive: /Projects/AddIns/ResOrg/ResOrgNETAddIn/stdafx.cpp $ * $Revision: 3 $ * $Date: 25/11/02 15:28 $ * $Author: Anna $ * * $History: stdafx.cpp $ * * ***************** Version 3 ***************** * User: Anna Date: 25/11/02 Time: 15:28 * Updated in $/Projects/AddIns/ResOrg/ResOrgNETAddIn * Changed website address in banner * * ***************** Version 2 ***************** * User: Anna Date: 22/10/02 Time: 14:15 * Updated in $/Projects/AddIns/ResOrg/ResOrgNETAddIn * Changed name/email address (at last!) * * ***************** Version 1 ***************** * User: Andy Date: 3/06/02 Time: 16:53 * Created in $/Projects/AddIns/ResOrg/ResOrgAddInVc7 * * * $Nokeywords: $ * ************************************************************************/ #include "StdAfx.h" By viewing downloads associated with this article you agree to the Terms of Service and the article's licence. If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it. License This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL) Share About the Author Anna-Jayne Metcalfe Founder Riverblade Limited United Kingdom United Kingdom I haven't always written software for a living. When I graduated from Surrey University in 1989, it was with an Electronic Engineering degree, but unfortunately that never really gave me the opportunity to do anything particularly interesting (with the possible exception of designing Darth Vader's Codpiece * for the UK Army in 1990). * Also known as the Standard Army Bootswitch. But that's another story... Since the opportunity arose to lead a software team developing C++ software for Avionic Test Systems in 1996, I've not looked back. More recently I've been involved in the development of subsea acoustic navigation systems, digital TV broadcast systems, port security/tracking systems, and most recently software development tools with my own company, Riverblade Ltd. One of my personal specialities is IDE plug-in development. ResOrg was my first attempt at a plug-in, but my day to day work is with Visual Lint, an interactive code analysis tool environment with works within the Visual Studio and Eclipse IDEs or on build servers. I love lots of things, but particularly music, photography and anything connected with history or engineering. I despise ignorant, intolerant and obstructive people - and it shows...I can be a bolshy cow if you wind me up the wrong way...Laugh | :laugh: I'm currently based 15 minutes walk from the beach in Bournemouth on the south coast of England. Since I moved here I've grown to love the place - even if it is full of grockles in Summer! Follow on   Twitter | Advertise | Privacy | Terms of Use | Mobile Web04 | 2.8.150427.4 | Last Updated 10 Jan 2005 Article Copyright 2001 by Anna-Jayne Metcalfe Everything else Copyright © CodeProject, 1999-2015 Layout: fixed | fluid
ChatGPT: Revolutionizing Conversational AI As technology advances, the field of artificial intelligence (AI) is rapidly evolving. One remarkable breakthrough in the realm of conversational AI is ChatGPT. With its advanced language model and seamless interaction capabilities, ChatGPT has emerged as a powerful tool for generating engaging and contextually relevant content. In this article, we will delve into the intricacies of ChatGPT, explore its applications, and understand how it can be leveraged for SEO optimization. Introduction to ChatGPT chatgpt playground • Save ChatGPT, developed by OpenAI, is an innovative language model employing GPT-3.5 architecture. It has been designed to generate human-like text responses, enabling natural and meaningful conversations. The underlying technology empowers ChatGPT to comprehend and respond to various queries, making it a versatile solution in various domains. Understanding ChatGPT’s Language Model At the heart of ChatGPT lies its sophisticated language model. It is trained using a vast corpus of text data, allowing it to learn patterns, grammatical structures, and even nuances of language. This extensive training enables ChatGPT to generate coherent and contextually appropriate responses, mirroring human conversation. How ChatGPT Works The development of ChatGPT involves a two-step process: pre-training and fine-tuning. During pre-training, the model learns from a large dataset containing parts of the Internet to gain a broad understanding of language.  Fine-tuning follows, where the model is trained on more specific and carefully generated data to fine-tune its responses. The GPT-3.5 architecture, which powers ChatGPT, incorporates transformer-based neural networks.  These networks facilitate attention mechanisms that allow the model to consider the context of words and phrases when generating responses. The resulting language model demonstrates remarkable fluency and coherence. Benefits of ChatGPT ChatGPT offers several benefits due to its advanced language model and conversational capabilities. Some of the key benefits of ChatGPT include: a. Enhanced Language Generation ChatGPT’s advanced language generation capabilities set it apart. The model can create text that is not only grammatically correct but also stylistically coherent. It can mimic specific tones, adapt to different writing styles, and produce content that resonates with the target audience. b. Wide Range of Applications ChatGPT finds utility in numerous fields. It can assist in customer support and chatbot systems, interacting with users and providing relevant information. Additionally, it can aid in content generation, editing, and proofreading tasks, augmenting the efficiency of human writers and editors. c. Improved Conversational Abilities Unlike earlier iterations, ChatGPT excels at generating engaging and dynamic conversations. It can maintain context over extended dialogues and understand user intent more accurately. These improvements make it an ideal tool for chat applications, language translation, and even virtual tutoring. d. Efficient Content Creation ChatGPT simplifies content creation by generating drafts, suggesting improvements, and enhancing overall readability. Writers can leverage ChatGPT’s capabilities to refine their work efficiently and save time. e. SEO Optimization ChatGPT can assist in search engine optimization (SEO) efforts. ChatGPT helps improve search engine rankings and drive organic traffic to websites by generating keyword-rich content and crafting compelling meta descriptions. f. Increased Productivity With its ability to generate coherent and contextually relevant responses, ChatGPT can handle repetitive and time-consuming tasks, allowing professionals to focus on more complex and strategic aspects of their work. g. Language Translation ChatGPT’s language model makes it suitable for language translation tasks. It can process input text in one language and generate accurate translations in another, helping bridge communication gaps between different languages. h. Virtual Assistance ChatGPT’s conversational abilities make it an effective virtual assistant. It can provide information, answer questions, and offer recommendations, improving user experiences in various applications and domains. Overall, ChatGPT’s benefits lie in its ability to generate human-like text, engage in meaningful conversations, and assist with various tasks, making it a valuable tool in conversational AI. Use Cases of ChatGPT a. Customer Support and Chatbots ChatGPT is an invaluable asset in customer support systems. It can handle various customer queries, provide helpful responses, and offer product recommendations. Its ability to simulate human-like interactions enhances the customer experience, making it an effective tool for businesses. b. Content Generation and Editing Creating high-quality content can be time-consuming and challenging. ChatGPT simplifies this process by generating drafts, suggesting improvements, and enhancing overall readability. Writers and editors can leverage ChatGPT’s capabilities to refine their work efficiently. c. Language Translation and Tutoring The language model of ChatGPT makes it suitable for language translation tasks. It can process input text in one language and generate accurate translations in another. Additionally, ChatGPT can act as a virtual tutor, providing explanations and answering questions on various subjects. d. SEO Optimization with ChatGPT Search engine optimization (SEO) is crucial in ensuring online visibility. ChatGPT can be a valuable ally in optimizing content for search engines. ChatGPT helps improve search engine rankings and drive organic traffic to websites by generating keyword-rich content and crafting compelling meta descriptions. e. ChatGPT’s Limitations While ChatGPT exhibits impressive capabilities, it also has its limitations. The model may inadvertently showcase biases in the data it was trained on, potentially perpetuating misinformation. Furthermore, it can need help understanding context-specific nuances and may falter when handling complex queries requiring deep domain knowledge. The Future of ChatGPT The future of ChatGPT holds tremendous potential as AI technology continues to evolve. Here are some key aspects that can shape the future of ChatGPT: 1. Advancements in Language Models: Ongoing research and development in natural language processing (NLP) will likely lead to advancements in language models like ChatGPT. It can result in more accurate and contextually aware responses, further enhancing the quality of conversations. 2. Ethical Considerations and Safeguards: As AI technology becomes more prevalent, ensuring ethical use and minimizing potential biases are crucial. OpenAI and other organizations are actively addressing these concerns by implementing transparency measures, robust training data selection, and inclusive practices. 3. Integration with Other Technologies: ChatGPT can be integrated with other emerging technologies to create more immersive and interactive experiences. For example, combining ChatGPT with virtual or augmented reality can enable users to have realistic and engaging conversations with AI-powered virtual entities. 4. Specialization and Domain Expertise: Future iterations of ChatGPT may focus on specific domains or industries, allowing for more profound domain knowledge and more accurate responses within those areas. This specialization can lead to highly effective virtual assistants tailored to specific fields, such as healthcare, finance, or legal services. 5. Collaboration with Humans: AI systems like ChatGPT can evolve to become more collaborative with human users. It could involve incorporating user feedback and preferences to improve responses, providing personalized recommendations, and adapting to individual communication styles. 6. Improved Context Awareness: Enhancing ChatGPT’s ability to understand and maintain context throughout conversations will be a crucial development area. It will enable the system to provide more accurate and relevant responses, making interactions feel more natural and seamless. 7. Applications in New Domains: The versatility of ChatGPT opens doors for its adoption in new domains and industries. From personalized tutoring and language learning to professional consulting and creative writing, ChatGPT can find applications in diverse fields as its capabilities improve. As AI technology advances, the future of ChatGPT holds excellent promise. With ongoing research, ethical considerations, integration with other technologies, and a focus on domain expertise, ChatGPT is poised to become an even more sophisticated and valuable tool in conversational AI. Frequently Asked Questions Is ChatGPT suitable for professional content writing?  Yes, ChatGPT can be an excellent aid for professional content writing. It assists in generating drafts, refining content, and optimizing it for SEO purposes. Can ChatGPT generate translations in multiple languages?  Absolutely! ChatGPT’s language model enables it to process text in one language and generate accurate translations in another. How can ChatGPT be integrated into customer support systems?  ChatGPT can be integrated into customer support systems by providing real-time responses to customer queries, offering product recommendations, and resolving common issues. Does ChatGPT have any limitations?  Yes, ChatGPT has limitations. It may exhibit biases in the training data and need help with context-specific nuances and complex queries requiring deep domain knowledge. What does the future hold for ChatGPT?  The future of ChatGPT looks promising. Advancements in language models, AI research, and ethical considerations will shape its evolution and integration with other technologies. Conclusion ChatGPT’s ability to generate human-like text responses and engage in dynamic conversations has revolutionized conversational AI. With its diverse applications in customer support, content generation, and language translation, ChatGPT has become an indispensable tool. As technology evolves, it is crucial to address its limitations, ensuring that the benefits are harnessed responsibly and ethically. Hits: 1 Add a Comment Your email address will not be published. Required fields are marked * Index 0 Shares • 0 Facebook • Twitter • LinkedIn • More Networks Copy link
 Mails des Zeichensatzes iso-8859-1 werden nicht dargestellt tklustig Erfahrenes Mitglied Hallo Leute, da in einem anderen Thread die Profis mit ihrem Latein am Ende waren, eröffne ich einen neuen Thread in der Hoffnung, durch eine Aktualisierung der Problematik das Problem in den Griff zu bekommen. Das Problem liegt darin, dass Mails mit folgendem PHP: var_dump(utf8_encode(imap_fetchbody($mailbox, $mail, 1))); [*]string(2246) " ------=_NextPart_001_0005_01D3C9FB.4A9DB4A0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Dies ist eine Testmail mit Anh=E4ngen: Ein Versuch zu kucken, ob der Inhalt angezeigt wird! ------=_NextPart_001_0005_01D3C9FB.4A9DB4A0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable [*] [*]Dies ist = eine Testmail mit Anh=E4ngen: [*] [*]Ein = Versuch zu kucken, ob der Inhalt angezeigt = wird! [*]------=_NextPart_001_0005_01D3C9FB.4A9DB4A0-- " nicht angezeigt werden. Meine Klasse übergeht sie schlichtweg. Ursächlich dafür, dass besagter Mailinhalt nicht in das Array verfrachtet wird ist die gekapselte Methode checkbody() Wenn ich die PHP-Funktion htmlentities weglasse, bekomme ich einen Inhalt, der allerdings nur Kauderwelsch ist! Hier der Mailinhalt ohne die PHP-Funktion htmlentities() für besagte Mails: Code: 5�m=���Mt��4�=�^6͹]�{^���鮖ةj�j[^�v�������j��{Oj�t�mL�f3���b��X}���� . . Weiß jemand Rat? Benötige echt dringendst Hilfe von Programmieren, die kompetenter in Sachen IMAP sind, als ich es bin! Hier meine Klasse( der Vollständigkeit halber poste ich alle Methoden) PHP: <?php namespace common\wsl_components; //Klassen des Frameworks einbinden use yii\web\NotAcceptableHttpException; use yii\web\Session; class IMAP { private $server; private $user; private $port; private $password; //Konstruktor public function __construct($server, $user, $port, $password) { $this->server = $server; $this->user = $user; $this->port = $port; $this->password = $password; } //Verbindungsaufbau zum Postfach public function connect() { $session = new Session(); $mailBox = imap_open("{" . $this->server . ":" . $this->port . "/ssl/novalidate-cert}", "$this->user", "$this->password"); if (is_resource($mailBox)) return $mailBox; else throw new NotAcceptableHttpException(\Yii::t('app', "Die Verbindung zu Ihrem Mailserver konnte nicht hergestellt werden. Vermutlich sind die Konfigurationsdaten Ihrres Mailservers inkorrekt. Informieren sie Ihren Admin!")); } //Mails darstellen public function Show_mails($mailbox) { $ArrayOfMails = array(); $ArrayOfBetreff = array(); $indizie = 0; $mails = $this->get_mails($mailbox); if (is_array($mails)) { foreach ($mails as $mail) { $MailContent = $this->get_mail_body($mailbox, $mail); $ArrayOfMails[$indizie] = $MailContent; $Mailbetreff = $this->get_mail_subject($mailbox, $mail); $ArrayOfBetreff[$indizie] = $Mailbetreff; $indizie++; } $ReturnArray = array_merge($ArrayOfBetreff, $ArrayOfMails); } else { throw new NotAcceptableHttpException(\Yii::t('app', 'Es konnten keine Mails angezeigt werden. Versuchen sie es erneut')); } return $ReturnArray; } //Mails zählen public function Count_mails($mailbox) { $message_count = imap_num_msg($mailbox); return $message_count; } //Abruf der Mails protected function get_mails($mailbox) { return imap_sort($mailbox, SORTARRIVAL, 1); } //Ermittlung des Mail-Body und speicherung in eine auswertbare Form protected function get_mail_body($mailbox, $mail) { $struct = imap_fetchstructure($mailbox, $mail); $body = imap_fetchbody($mailbox, $mail, 1); return strip_tags(html_entity_decode($this->checkbody( utf8_encode($body), $struct))); } // Ermittlung des Betreff protected function get_mail_subject($mailbox, $mail) { $header = imap_fetch_overview($mailbox, $mail); return imap_utf8($header[0]->subject); } // strukturierte Darstellung des Mailbody private function checkbody($body, $struct) { if ($struct->subtype != 'PLAIN') { if ($struct->encoding == 0) { $body = base64_decode($body); } if ($struct->encoding == 3) { $body = base64_decode($body); } if ($struct->encoding == 4) { $body = quoted_printable_decode($body); } } else { if ($struct->encoding == 3) { $body = base64_decode($body); } if ($struct->encoding == 4) { $body = quoted_printable_decode($body); } } $body = nl2br(htmlentities($body)); return $body; } } Hier noch ein Link https://www.tutorials.de/threads/re...ody-nicht-wie-erwuenscht.406625/#post-2104586 zum ursprünglichen Thread. Sofern mir jemand helfen kann wäre ich ihm zu ewigem Dank verpflichtet ;)   Zuletzt bearbeitet:
nabinbajracharya.com.np S.E.O, social marketing and affiliation How to extend life of laptop battery, in Nepal Here are 22 Tips that you can use for extending life of laptop battery. Here are 22 Tips that you can use for extending life of laptop battery. 01. Learn to single-task 02. Run simple applications that don’t use much RAM, disk drive, or processing power. 03. Use the power management settings on your computer that come built in 04. Switch off the wireless card if you do not plan to access your network or Internet connection. 05. Disable Bluetooth. 06. Shut down or hibernate the laptop rather than using standby, if you plan on not using it for a while. 07. Turn off unused ports. 08. Create Power-Saving Hardware Profiles. 09. Defrag your hard drive. 10. Reduce the LCD’s brightness level. 11. Turn down the screen resolution. 12. If your laptop has an OLED based display, avoid displaying white images. 13. Turn the volume level down, or mute it, if you do not plan to use it. 14. Avoid extreme temperatures. 15. Use a cooling pad when using a notebook computer on your lap. 16. Avoid propping your laptop on a pillow, blanket, or other soft surface that can heat up. 17. Unplug external devices such as a USB mouse or an external drive. 18. Avoid using a CD or DVD. 19. Eject external devices such as pen drives, DVDs, hard disks, etc. 20. Clean the battery contacts. 21. Keep the battery fresh. 22. Do not charge all of the way. Source:http://www.wikihow.com/Extend-Laptop-Battery-Life Are you looking to bye original laptop battery or Compatible One. Do contact me for home service, (selected place only) Laptop Battery in nepal Advertisement
How To Drain Your Civic’s Gas Tank Share this: There are some occasions when the fuel tank of your Honda Civic needs to get drained, besides burning the fuel in your engine while annoying your neighbors. One of these came up to me recently, when I found out that the two year old fuel inside the tank of our current project car, was very unimpressed of the tiny sparks produced by the spark plugs. There was no chance to fire the engine up, and the combustion chambers got filled up with old, bad fuel. It was apparent that we had to find a way to remove the old fuel from the tank. #1 Drain Plug The first thing which came to my mind was a drain plug - like these being used for draining the engine and transmission oil. If your Civic belongs to the older generations, you'll find such a drain plug at the bottom of the gas tank, usually on the driver's side. All you have to do is grab a big enough bucket or gas can, placing it under the drain plug, and unscrew it. To speed this process up, open the fuel cap. This ensures that there's no vacuum built up inside the tank while the fuel is draining. 1992 Civic EG3 Fuel Tank Drain Plug Drain plug of a '92 Civic EG #2 Fuel Pump I spent a decent amount of time finding the drain plug on my '03 Civic EM2. There was none. What's the usual way the fuel gets into the engine? It gets pumped out! So, why not use the power of the fuel pump? Since our tank was only 1/4 full, it was a possible option. The first step is removing the fuel hose from the fuel rail on your engine. Before, release the pressure inside the tank by opening the fuel cap. Keep an old cloth handy while pulling off the hose and wear some eye protection. It's possible that there's still enough pressure on the line to ruin your meticulously cleaned engine bay. Now you can put the open end of the hose in a gas can. Now we are ready to turn on the pump. To let the fuel pump do its job, you have to turn the ignition key to the second position (II). This works for exactly two seconds until the fuel pump relay decides to interrupt our plan. It shuts off the pump after the fuel pressure was built up. The fuel pump relay (blue) is located behind the glove box. Since we cannot fire up our engine, we need to find a way to let the pump run continuously while the ignition key is in the second position. When the motor is running, the fuel pump relay receives battery voltage (12V) on one of the four connected wires. Simplified, this "activates" the relay and the fuel pump receives power. Another connected wire provides the relay with battery voltage continuously, as long as ignition is on. To let the pump run longer than only two seconds, we put battery voltage on the relay wire, which is connected to the fuel pump. Simply bridge the two wires. If you turn on the ignition now, the pump will receive battery voltage continuously and won't get shut off after two seconds. First, make sure that the fuel hose is disconnected and placed into a gas can. After we'd set everything up, the old fuel got soaked out of the gas tank automatically and we were able to fill in some fresh fuel. Finally, the engine was screaming 🙂 Share this: Want Your Own K20? Need Wiring Help? One Comment on “How To Drain Your Civic’s Gas Tank” Leave a Reply Your email address will not be published. Required fields are marked *
change chart change chart [′chānj ‚chärt] (meteorology) A chart indicating the amount and direction of change of some meteorological element during a specified time interval; for example, a height-change chart or pressure-change chart. Also known as tendency chart. McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc. References in periodicals archive ? The top five is a nearly all change chart, with four of the songs making new entries. In the resulting Change Chart Type dialog box, make sure that the Combo option is selected in the left panel, and then select the Custom Column--Line on Secondary Axis icon toward the top of the dialog box, as pictured below. The framework consists of reusable chart/filter portlets that allow simple configuration to change chart libraries/types, and a data-feed generation framework that helps enforce data security and dynamic filtering. While the individual series is selected, go to the Design tab in Excel 2007/2010 and choose Change Chart Type. Lindsley trade marked the term "Standard Change Chart" to describe general applications of the chart series. The Rate of Change chart shown here plots what statisticians refer to as a "12/12 Pressure Curve." For any particular month's data, it takes the running total of the previous dozen months. It also allows developers to provide the charts as an ActiveX control, which enables end-users to change chart types and data values for interactive applications. Right-click and choose Change Chart Type to change the chart to a pie, line, bar chart, etc. Likewise, a minor amendment could change charted magnetic courses due to magnetic variation since the ground track remains the same. You have to change charts manually as you fly from one to the other, but the app makes it simple with a one-tap way loading of the adjacent chart.
0 Replies Latest reply on Dec 12, 2013 6:34 AM by schmity FM 12 Server Advanced Console problems schmity Title FM 12 Server Advanced Console problems Your post      I posted this problem a while back, but never got any responses.  I finally had a chance to reboot the server, which fixed the issue for a few weeks, but it has reoccurred again.  Filemaker Server Admin Console issues       FM Server 12 Advanced is running on Server 2008R2.  I can start the admin console from my laptop and can browse around in the console, but can't actually do anything (upload databases, close databases, run schedules, etc.)   The console responds to commands when I switch through the menus, but all the information such as what is open, who is logged in, and when my backups last ran and are scheduled to run again is out of date.  The Server overview does show the correct date and time.      All my databases are open and functioning normally from the remote work stations.      My backup schedules are running, but the admin console doesn't reflect the correct dates nor am I receiving my email notifications.  I can tell they are running by looking at the folders in the backup folder on the server.      Any help is appreciated, thanks!      Kevin
Stack Overflow is a community of 4.7 million programmers, just like you, helping each other. Join them; it only takes a minute: Sign up Join the Stack Overflow community to: 1. Ask programming questions 2. Answer and help your peers 3. Get recognized for your expertise I have just put up a new website at www.hcmc.com. It works great in Chrome, Safari, Firefox, but not so great in IE (surprise!). The problems I am looking to solve are: 1. The dropdown for the top navigation menu doesn't work in IE 7 & 8 2. The autocomplete dropdown for the search box doesn't work in IE 7, 8 & 9 (try typing "pizza") I have tried playing around with z-index, but just don't get it to work. Any ideas? share|improve this question      Hi just a thought from my side. just try for search box, display:block; Zoom:1; *display:inline; This Hack for IE. – SR query Apr 12 '12 at 8:24      I saw in ur code ur using Float:left; just try with- display:inline-block; And you try with remove height and width; just try this all. – SR query Apr 12 '12 at 8:26 Hi This is not actual solution for your problem but i just explore my side. The browser compatability problem is solved using HTML5 BOILERPLATE. You can Combaine Twitter Bootstrap + html5 boilerplate. 1) http://twitter.github.com/bootstrap/ 2) http://html5boilerplate.com. You can combine both using http://www.initializr.com/ And for search box .searchbox { background-color: transparent; border: 0 none; color: #000000; display: block; float: left; font: 13px/22px arial,calibri,sans-serif; Zoom:1; *display:inline; } Try this. share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
Display Filter Reference: ISO/IEC 13818-1 Protocol field name: mp2t Versions: 1.0.0 to 4.4.0 Back to Display Filter Reference Field name Description Type Versions mp2t.afAdaptation FieldLabel1.0.0 to 4.4.0 mp2t.af.afe_flagAdaptation Field Extension FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.diDiscontinuity IndicatorUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.dnau_14_0DTS Next AU[14...0]Unsigned integer (16 bits)1.0.0 to 4.4.0 mp2t.af.e.dnau_29_15DTS Next AU[29...15]Unsigned integer (16 bits)1.0.0 to 4.4.0 mp2t.af.e.dnau_32_30DTS Next AU[32...30]Unsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.ltw_flagLTW FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.ltwoLTW OffsetUnsigned integer (16 bits)1.0.0 to 4.4.0 mp2t.af.e.ltwv_flagLTW Valid FlagUnsigned integer (16 bits)1.0.0 to 4.4.0 mp2t.af.e.m_1Marker BitUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.m_2Marker BitUnsigned integer (16 bits)1.0.0 to 4.4.0 mp2t.af.e.m_3Marker BitUnsigned integer (16 bits)1.0.0 to 4.4.0 mp2t.af.e.prPiecewise RateUnsigned integer (24 bits)1.0.0 to 4.4.0 mp2t.af.e.pr_flagPiecewise Rate FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.pr_reservedReservedUnsigned integer (24 bits)1.0.0 to 4.4.0 mp2t.af.e.reservedReservedUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.reserved_bytesReservedByte sequence1.0.0 to 4.4.0 mp2t.af.e.ss_flagSeamless Splice FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e.stSplice TypeUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.e_lengthAdaptation Field Extension LengthUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.espiElementary Stream Priority IndicatorUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.lengthAdaptation Field LengthUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.opcrOriginal Program Clock ReferenceUnsigned integer (64 bits)1.0.0 to 4.4.0 mp2t.af.opcr_flagOPCR FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.pcrProgram Clock ReferenceUnsigned integer (64 bits)1.0.0 to 4.4.0 mp2t.af.pcr_flagPCR FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.raiRandom Access IndicatorUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.scSplice CountdownUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.sp_flagSplicing Point FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.stuffing_bytesStuffingByte sequence1.0.0 to 4.4.0 mp2t.af.tpdTransport Private DataByte sequence1.0.0 to 4.4.0 mp2t.af.tpd_flagTransport Private Data FlagUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.af.tpd_lengthTransport Private Data LengthUnsigned integer (8 bits)1.0.0 to 4.4.0 mp2t.afcAdaptation Field ControlUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.afc.invalidAdaptation Field Control contains an invalid valueLabel2.2.0 to 4.4.0 mp2t.analysis.dropsSome frames droppedUnsigned integer (8 bits)1.4.0 to 4.4.0 mp2t.analysis.flagsMPEG2-TS Analysis FlagsLabel1.4.0 to 1.8.15 mp2t.analysis.skipsTS Continuity Counter SkipsUnsigned integer (8 bits)1.4.0 to 4.4.0 mp2t.ccContinuity CounterUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.cc.dropDetected missing TS framesLabel1.2.0 to 4.4.0 mp2t.depi_msg.fragmentMessage fragmentFrame number1.4.0 to 1.6.16 mp2t.depi_msg.fragment.countMessage fragment countUnsigned integer (32 bits)1.6.0 to 1.6.16 mp2t.depi_msg.fragment.errorMessage defragmentation errorFrame number1.4.0 to 1.6.16 mp2t.depi_msg.fragment.multiple_tailsMessage has multiple tail fragmentsBoolean1.4.0 to 1.6.16 mp2t.depi_msg.fragment.overlapMessage fragment overlapBoolean1.4.0 to 1.6.16 mp2t.depi_msg.fragment.overlap.conflictsMessage fragment overlapping with conflicting dataBoolean1.4.0 to 1.6.16 mp2t.depi_msg.fragment.too_long_fragmentMessage fragment too longBoolean1.4.0 to 1.6.16 mp2t.depi_msg.fragmentsMessage fragmentsLabel1.4.0 to 1.6.16 mp2t.depi_msg.reassembled.inReassembled inFrame number1.4.0 to 1.6.16 mp2t.depi_msg.reassembled.lengthReassembled MP2T lengthUnsigned integer (32 bits)1.4.0 to 1.6.16 mp2t.headerHeaderUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.malformed_payloadMalformed PayloadByte sequence1.0.0 to 1.6.16 mp2t.msg.fragmentMessage fragmentFrame number1.8.0 to 4.4.0 mp2t.msg.fragment.countMessage fragment countUnsigned integer (32 bits)1.8.0 to 4.4.0 mp2t.msg.fragment.errorMessage defragmentation errorFrame number1.8.0 to 4.4.0 mp2t.msg.fragment.multiple_tailsMessage has multiple tail fragmentsBoolean1.8.0 to 4.4.0 mp2t.msg.fragment.overlapMessage fragment overlapBoolean1.8.0 to 4.4.0 mp2t.msg.fragment.overlap.conflictsMessage fragment overlapping with conflicting dataBoolean1.8.0 to 4.4.0 mp2t.msg.fragment.too_long_fragmentMessage fragment too longBoolean1.8.0 to 4.4.0 mp2t.msg.fragmentsMessage fragmentsLabel1.8.0 to 4.4.0 mp2t.msg.reassembled.inReassembled inFrame number1.8.0 to 4.4.0 mp2t.msg.reassembled.lengthReassembled MP2T lengthUnsigned integer (32 bits)1.8.0 to 4.4.0 mp2t.payloadPayloadByte sequence1.0.0 to 1.8.15 mp2t.pidPIDUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.pointerPointerUnsigned integer (8 bits)1.12.0 to 4.4.0 mp2t.pointer_too_largePointer value is too largeLabel1.12.3 to 4.4.0 mp2t.pusiPayload Unit Start IndicatorUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.stuff_bytesStuffingByte sequence1.8.0 to 4.4.0 mp2t.sync_byteSync ByteUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.teiTransport Error IndicatorUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.tpTransport PriorityUnsigned integer (32 bits)1.0.0 to 4.4.0 mp2t.ts_packet_reassembledMPEG TS Packet (reassembled)Label2.0.0 to 4.4.0 mp2t.tscTransport Scrambling ControlUnsigned integer (32 bits)1.0.0 to 4.4.0
Connection closed every couple of minutes I’ve just finished installing Tryton with the web interface. But, does anyone know why I keep getting this error every couple of minutes? Traceback (most recent call last): File "/trytond/transactionpy", line 207, in commit self.connection.commit() psycopg2InterfaceError: connection already closed I’m running it under uWSGI via Nginx, if that’s relevant. Is the DB server closing the connection every couple of minutes? I’m not familiar with postgres configuration, what should I be looking for? It’s a default install in Debian buster, installed through the apt archives. I would suspect a firewall between that cut stalling connection. Tryton and postgres are running on the same machine, the only firewall rules I’m using block most of the external ports, there’s nothing time based. And, the database connection is through a Unix socket: uri = postgresql://tryton:<PW>@/ Well it may be the OS who close stalling TCP connection. I also don’t seem to have any issues with other applications which are connecting to MariaDB and Redis servers over a Unix socket, so really not sure what’s going on here. Same thing sometimes happens to me. But only when we (re)started Tryton-server and Nginx-server. I think it’s a configuration problem in Nginx, because at one client it is running fine, as at another client this happens. What I see on the client side is something about the bus. After login and logout about 2 - 3 times everything is back to normal and the message does not appear anymore. Because it appeared after restarting Tryton, it isn’t a issue at the moment so I didn’t dig deeper. But I think in my case it has something to do with the location definition in Nginx configuration. Hmm, interesting. My server config is pretty basic, essentially if the file doesn’t exist, proxy to Tryton: server { listen 443 ssl http2; listen [::]:443 ssl http2; server_name <domain>; root /var/www/tryton-sao/; <ssl_certs> more_set_headers "Content-Security-Policy: default-src 'none'; script-src 'self' 'unsafe-inline'; object-src 'none'; style-src 'self' 'unsafe-inline'; img-src 'self' blob:; media-src 'self'; frame-src 'none'; font-src 'self'; connect-src 'self'; frame-ancestors 'none'; base-uri 'none'; form-action 'self'; manifest-src 'none'; worker-src 'none'; upgrade-insecure-requests" always; location / { try_files $uri @tryton; } location @tryton { uwsgi_pass tryton; include uwsgi_params; uwsgi_request_buffering off; } location = /favicon.ico { alias /var/www/tryton-sao/images/tryton-icon.png; } location = /robots.txt { return 200 "User-agent: *\nDisallow: /\n"; } } I tried logging in and out 3 times, but it also doesn’t seem to make a difference to me. If I open and close a few different tabs in the admin, I will encounter that error within a minute or 2. It also sounds a bit weird that Nginx could be responsible for causing a connection between Tryton and the DB to get closed. Surely, that would be outside the control of Nginx. Just to mention I’ve tried switching the DB connection to a localhost TCP connection, but get the same results either way. Are you using the webclient? We are using the GTK desktop client. I’ve asked my client to pull the nginx.conf from the server. That one works for them. And from my memory there was a specific location with the databasename. location /production_database/ { uwsgi stuff } Can you can try something like that? Another possibility is that the connection pool is started before the fork of µwsgi. In this case the connections could be shared between multiple process and closed by one while the other still use it. You could try to µwsgi option lazy-apps=true which prevent µwsgi to load the application before forking. 1 Like lazy-apps seems to have solved the issue, and I can even activate new modules in the admin now. Thanks. How do you launch the µwsgi process? It will be good to understand why the connection pool is created before the fork (and see if we can fix that). I run service tryton-wsgi start. Obviously, I had to configure all that myself as this is not something provided by the Debian package. /etc/systemd/system/tryton-wsgi.service: [Unit] Description=Start uwsgi for Tryton ERP After=network.target [Service] Type=simple User=tryton Group=www-data PermissionsStartOnly=true ExecStart=/usr/bin/uwsgi --post-buffering 65536 --ini /etc/tryton/uwsgi.ini [Install] WantedBy=multi-user.target /etc/tryton/uwsgi.ini: [uwsgi] uid = tryton gid = tryton socket = /run/trytond/trytond.sock chmod-socket = 660 plugins = python3 module = trytond.application:app env = TRYTOND_CONFIG=/etc/tryton/trytond.conf env = TRYTOND_LOGGING_CONFIG=/etc/tryton/trytond_log.conf env = TRYTOND_DATABASE_NAMES=tryton logto = /var/log/uwsgi/tryton.log log-5xx = true disable-logging = true lazy-apps=true master workers = 1 max-requests = 200 harakiri = 30 die-on-term 1 Like This is the line that force the creation of the connection pool. I created Issue 8281: Do not copy connection pool after fork - Tryton issue tracker to be able to use the advantage of loading the database before the fork. 1 Like This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.
Difference between Console and Desktop App Hi Everyone, I haven’t had a chance to create Console apps, and wanted to ask about differences between a Console app and a Desktop app. Specifically I am thinking about creating a 3D graphical model for subsurface Oil and Gas work. Currently the Desktop app is very slow, and my guess is that it is because of the IDE and other background processes running. Is it possible to create OpenGL programs with a similar ease of a Desktop app? I would be creating my own window, which is easy-enough to do with declares. Are there any other issues that I am missing before I start to play? Thanks! Edit: I am just trying to get as much graphical performance out of Xojo as I can. Not sure if there will be much of a difference. Will really depend on how much of Xojo’s graphics you need as they are different in console vs desktop Are you using OpenGL via the Xojo plugin or directly via declares ? A console app wont initialize some libs etc that a desktop app will and I dont know if that will affect your ability to make this set up work Is it possible to have several console helpers that crnch the data and the desktop UI just front those with a decent UI ? You can spawn many helpers (I’d try one less than as many cores as the machine has) As for “OpenGL programs with a similar ease of a Desktop app” thats a pile of work from the console as there’s no windows, menu bars buttons etc etc etc You have to make all that somehow I would prefer to be able to use the Xojo plugin, and if that is not an option, then I have the ability to recreate all of the OpenGL commands in Declares - it would just take significantly more time. The only way to see which libraries are not loaded is for me to play around with a few test programs. When I wrote the OpenGL book, the trend was that Xojo was fast when it came to calculating the graphics, and math. Where Xojo seemed to be about 100-times slower was when drawing the graphics to the screen. Yes, your right, and I am prepared to do that. It just depends on the patience and deep-pockets of the company. Its ‘nice’ to say you want good performance and quality, its quite another to have the project labour increase because of it. :slight_smile: Fair Just all questions I had to ask to try & make sure I dont give you bad advice Often the bottleneck is in trying to crunch a lot of data very fast in a single threaded application and no amount of rewriting in OGL will change that Its why Dr Stys application uses many helpers and shared memory to manipulate some extremely large graphics But that is the kind of things that can be sliced up and potions dished out to several helpers and each of those can manipulate its “chunk” of the image and then the entire thing can be processed in parallel by those independent helpers I dont know if what it is you’re trying to do lends itself to that within OGL ? If not I dont know that JUST rewriting everything to avoid Xojo’s desktop framework is going to be sufficient It may be but its a LOT of work to recreate a “desktop” app Thanks for being cautious. This is an underground simulator where the user can see the problems within a formation in real-time. I can make the graphics look ‘minecraft-like’ to lower the resolution drawing time with OpenGL on the desktop, and a higher resolution has been requested. One company uses a simulator that has license costs of upward capital of $200k per year, and the corporation would rather have their own in-house program. I am coming up with the estimation for the work. Helpers would make a difference, as some of the graphics are for large areas which encompass about 10 km subsurface distances. Just thinking out loud, maybe it would be easier to create the GUI portion of the program in Xojo with data entry, database information, etc in Xojo, and have the physical model created in an executable in C++ to increase framerates. When I run an almost identical program in Xojo (OpenGL) with the same type of program in C++, no optimizations, I get about a 100x speed increase in C++. My computer has a high speed GeForce RTX 2080 GPU and it gets quite hot with Xojo OpenGL, and barely heats up in C++. I would prefer to have the GUI and OpenGL graphics in one Xojo language. This is where the question came from for OpenGL in a console application. I’ll play around with OpenGL in a Console program and see how it responds. Thanks for your thoughts! TOTALLY OFF TOPIC This sounds a LOT like Halliburtons underground simulator (I think it was halliburtons) One of the oils had a room dedicated to this OGL should as far as I know - be hardware accelerated using the plugin That seems really odd that using Xojo the GPU would heat up While it might be nice to have everything in one app if you get that kind of difference its hard to argue about Could you have the OGL in C++ as the “helper” that display everything and Xojo as the front end for that ? That would seem a reasonable balance of capabilities Then you need something simple to pass front end config information to the C++ helper (but they can use ay one of several mechanisms for that) The one that they are using is from Schlumberger (I used to work there). I would say that 99% of the capability is not being used since the original program has been overdesigned, and it takes a specialized person to put the data into, interpret, and work with the program. It is waaaay overcomplicated. Yes, I definitely can use C++ as the helper program. It would have been a nice option to only program in one language for the project :slight_smile: Yes, Xojo’s RAD would work well for this part of the program. Its all good - This forum allows us to go on good tangents! In theory (at least on macOS) you could use a helper with Metal (or OpenGL, but for how long I can’t say) and render your image to a IOSurface, which you can pass the ptr to the main app via IPC (requires macOS 10.12 or newer to do so). Which your GUI can then draw to a Metal context or CALayer. I’ve never actually tried this and I don’t know how effective it will actually be, as rendering on the Graphics Card to get good performance (you can request lower priority) will freeze the display while it’s busy. You can use different GPUs, but then you have to deal with transferring the memory between them. 1 Like What voodoo magic is this @samRowlands? :slight_smile: https://developer.apple.com/documentation/iosurface?language=objc I’ve never actually used it. 1 Like
You are here Home > Topology Download PDF by Allan J. Sieradski: An introduction to topology and homotopy By Allan J. Sieradski ISBN-10: 0534929605 ISBN-13: 9780534929602 This article is an creation to topology and homotopy. subject matters are built-in right into a coherent complete and constructed slowly so scholars are usually not beaten. the 1st half the textual content treats the topology of entire metric areas, together with their hyperspaces of sequentially compact subspaces. the second one half the textual content develops the homotopy class. there are lots of examples and over 900 routines, representing a variety of trouble. This ebook could be of curiosity to undergraduates and researchers in arithmetic. Show description Read or Download An introduction to topology and homotopy PDF Best topology books Riemannian Geometry: A Modern Introduction by Isaac Chavel PDF Requiring basically an knowing of differentiable manifolds, Isaac Chavel covers introductory rules via a variety of extra really good themes during this moment variation. He presents a clearer therapy of many themes, with new proofs of a few theorems and a brand new bankruptcy at the Riemannian geometry of surfaces. Read e-book online Elliptic Cohomology PDF Elliptic cohomology is an exceptionally attractive conception with either geometric and mathematics facets. the previous is defined by means of the truth that the speculation is a quotient of orientated cobordism localised clear of 2, the latter by way of the truth that the coefficients coincide with a hoop of modular varieties. the purpose of the publication is to build this cohomology conception, and overview it on classifying areas BG of finite teams G. Download e-book for kindle: Local Cohomology: A seminar given by A. Grothendieck Harvard by Robin Hartshorne Shipped from united kingdom, please let 10 to 21 enterprise days for arrival. Lecture Notes in arithmetic forty-one. 106pp. good shape ex. lib. Extra info for An introduction to topology and homotopy Example text Let A be a nonempty subset of X. The convex hull of A, denoted by coCA), is the intersection of all convex sets that contain A. Verify the following statements. (1) coCA) is a convex set; hence coCA) is the smallest convex set that contains A. (2) A is convex if and only if A=co(A). Ai = 1, n EN}. 11. Let A be a nonempty subset of X. The conical hull of A, denoted by conCA), is the intersection of all convex cones that contain A. Verify the following statements. (1) con (A) is a convex cone; hence conCA) is the smallest convex cone that contains A. Thus assume a =1= 0. Using (iii) we see that Yo E PaK(ax) if and only if Yo E aK and Ilax - yoll = d(ax, aK) if and only if ±Yo E K and lallix - ±yoll = lald(x, K). , Yo E aPK(x). (v) This is an immediate consequence of (ii), and (vi) follows from (iv). (2) (i) and (ii) follow from (1) (i) and (ii), and the fact that if M is a subspace and y E M, then M -+- y = M. (iii) and (iv) follow from (1) (iii) and (iv), and the fact that if M is a subspace and a =1= 0, then aM = M. The proof of (v) follows from the relations d(x-+-y,M) = mEM inf Ilx-+-y-mll= inf Ilx-+-y-(m-+-m')11 m,m'EM :s: m,m'ElvI inf [llx - mil -+- Ily - mill] = mEM inf Ilx - mil -+- inf Ily - mill = d(x, M) -+- d(y, M). So {ad must be a bounded sequence in R Thus there exists a subsequence {ak j } and ao E lR such that akj --+ ao. 15), and the above argument shows that its limit is in M. This proves (1) and (2) when n = 1. Next assume that (1) and (2) are true when the dimension of Mis n and suppose M = span{xI,x2, ... ,xn,xn+d is (n+l)-dimensional. , ... ,Xn }, so Mn is n-dimensional. Since Mn is closed by the induction hypothesis and Xn+1 rf: M n , it follows that d(xn+1' Mn) > O. Let {Yk} be a bounded sequence in M. Download PDF sample An introduction to topology and homotopy by Allan J. Sieradski by Ronald 4.2 Rated 4.62 of 5 – based on 40 votes Top
8 I normally download all .deb packages and just copy the packages from /var/cache/apt/archives directory to the rest of the computers, saving me to have to download all the updates and programs again. But since Ubuntu 11.04, the directory keeps deleting the oldest file or some kind of delete method that literally resets the amount of packages there. So then I need to download them again on the rest of the PCs. The files stay there for a couple of days, but then "magically" it's not there anymore after some days. So what do I need to do to tell Ubuntu NOT to eliminate any files from /var/cache/apt/archives, not even the previous versions of the same package? I do not want it to delete anything from there. Just to add, I install packages using aptitude or synaptic. 3 Answers 3 18 Take a look at /etc/apt/apt.conf.d/20archive. In there there are a few lines used by the daily apt cron job: APT::Archives::MaxAge "30"; APT::Archives::MinAge "2"; APT::Archives::MaxSize "500"; Those are the defaults. You should get what you want by setting all three to 0. You can look at the headers of /etc/cron.daily/apt for more information. 1 • /usr/lib/apt/apt.systemd.daily in recent ubuntus – Jack Wasey Oct 23, 2016 at 8:39 8 This is not a direct answer to your question, but have you considered puttting something like apt-cacher-ng on one machine? It sounds like you are doing a lot of work copying when it could be done rather automatically. All you have to do (IIRC) is install the apt-cacher-ng package on one computer, make sure port 3142 is open to your LAN if you have a firewall, and run echo "Acquire::http { Proxy \"http://<ip_of_cacher_computer>:3142\"; };" | sudo tee /etc/apt/apt.conf.d/02proxy on each client. The clients will download through the cacher computer, and if a package has ever been downloaded by one client, it will just be grabbed out of the cache instead of being redownloaded. It's a pretty automatic solution to the problem of taking a long time to download the same packages twice. 1 • I voted Mark's answer as correct but you have also provided me with another very cool solution so +1 to you too. Jul 3, 2011 at 2:10 2 try APTonCD to make these files more portable Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
Home » Are Energy Drinks Bad For Weight Loss Are Energy Drinks Bad For Weight Loss by admin Are Energy Drinks Bad For Weight Loss Introduction Are Energy Drinks Bad For Weight Loss: Energy drinks have become increasingly popular in recent years, touted for their ability to provide a quick burst of energy and enhanced alertness. However, as the quest for weight loss and healthier lifestyles continues to be a prevalent concern, the question arises. Are energy drinks bad for weight loss?. In the age of calorie counting and fitness tracking, knowing how energy drinks affect your weight loss journey is essential. These beverages, often packed with caffeine, sugar, and various stimulants and additives, offer an energy boost but may have drawbacks. This introduction aims to delve into the intricate connection between energy drinks and weight loss, revealing both the possible advantages and disadvantages. As we delve into this topic, it becomes evident that the effects of energy drinks on weight loss are multifaceted.  Some argue caffeine boosts metabolism and calorie burning, while others worry about excess calories, sugar, and health issues tied to these drinks. To make informed choices about incorporating energy drinks into a weight loss regimen, it is essential to delve deeper into the science, ingredients, and potential consequences associated with these popular beverages.In this age of calorie counting and fitness tracking, understanding the impact of energy drinks on one’s weight loss journey is crucial. These drinks, packed with caffeine, sugar, and various additives, offer an energy boost but may have hidden costs for your health.  As we delve into this topic, it becomes evident that the effects of energy drinks on weight loss are multifaceted. While some argue that the caffeine content can boost metabolism and aid in burning calories, others raise concerns about the excess calories sugar, and adverse health effects associated with these drinks.  Are energy drinks bad for weight loss? Many people think that skipping a meal and consuming an energy drink can help create that deficit, but energy drinks are devoid of nutrition and high in empty calories. Consuming 2 or more energy drinks a day can push you over the recommended daily intake, inadvertently leading to weight gain. Yes, energy drinks can indeed be bad for weight loss. While some people may believe that skipping a meal and replacing it with an energy drink can help create a calorie deficit, this approach is not advisable for several reasons. Firstly, energy drinks are typically devoid of essential nutrients and are often high in empty calories, primarily coming from sugar and caffeine. These empty calories can provide a quick burst of energy, but they do not contribute to long-term satiety or overall nutrition. Consuming energy drinks in place of balanced meals can leave you feeling hungry and may lead to overeating later in the day, negating any potential calorie deficit.Secondly, energy drinks are known for their high caffeine content, which can lead to increased heart rate, jitteriness, and even anxiety in some individuals. These side effects can make it challenging to stick to a regular exercise routine, which is a crucial component of weight loss. Are energy drinks bad for fitness? While caffeine does help to energize the body temporarily, it does not replenish the nutrients that are lost during prolonged physical activity. In fact, caffeine is a diuretic, meaning it actually depletes water from the body which can lead to dehydration during exercise.Energy drinks can have both positive and negative effects on fitness, depending on how and when they are consumed.  Here are some key points to consider: Temporary Energy Boost: Energy drinks often contain caffeine, which can provide a temporary boost in alertness and energy levels. This can be beneficial for short bursts of physical activity or workouts that require increased focus and intensity. Enhanced Physical Performance: Some studies suggest that caffeine, found in many energy drinks, can improve endurance, strength, and power during exercise. It may help athletes push through fatigue and perform better in certain sports. Dehydration Risk: As mentioned, caffeine is a diuretic, which means it can increase urine production and lead to fluid loss. This can potentially lead to dehydration, especially during prolonged or intense workouts. Dehydration can negatively impact physical performance and overall health. Nutrient Deficiency: Energy drinks typically lack essential nutrients that the body needs during exercise, such as carbohydrates and electrolytes. These nutrients are important for maintaining energy levels, replenishing glycogen stores, and preventing muscle cramps. Adverse Health Effects: Excessive consumption of energy drinks can have adverse health effects, including increased heart rate, jitteriness, anxiety, and even more serious cardiovascular issues. These side effects can be detrimental to fitness goals and overall well-being. What are drinks for weight loss? This can also help you in better management of weight and give you some good options for drinks to lose weight. • Homemade Weight loss Drinks Recipes. • Ginger and lemon water. • Jeera water. • Cinnamon water. • Sabza water or chia seed water. • Cinnamon or daalcheeni and black pepper tea. • Methi daana or fenugreek seeds water. Here are some beverages known for their potential weight loss benefits: Water: Staying hydrated is crucial for overall health and can help control appetite. Drinking water before meals may also help you feel fuller and consume fewer calories during a meal. Green Tea: Green tea is rich in antioxidants called catechins, which may aid in boosting metabolism and promoting fat oxidation. Drinking green tea regularly can be a healthy addition to a weight loss plan. Black Tea: Like green tea, black tea contains antioxidants and a moderate amount of caffeine. It can provide a mild energy boost without the excessive caffeine found in some energy drinks or coffee. Kefir: Kefir is a fermented dairy product that contains probiotics, which can support digestive health. A healthy gut is linked to better weight management and metabolism. Protein Shakes: Protein shakes can be an effective way to increase protein intake, which helps promote feelings of fullness and supports muscle maintenance during weight loss. Black Coffee: Black coffee is low in calories and can provide a caffeine boost to enhance alertness and potentially increase metabolic rate. Apple Cider Vinegar: Some studies suggest that apple cider vinegar may help reduce appetite and promote feelings of fullness, although more research is needed. Vegetable Juice: Fresh vegetable juices, especially those with low sugar content, can be a nutrient-dense way to increase your vegetable intake and support weight loss. When should you drink energy drinks? Consuming these products 10 minutes to an hour before your exercise may help increase your alertness, endurance, and mental focus. If you’re not in the mood to exercise but know you need it to stay healthy, then good energy drinks full of B vitamins will help you save the day. The timing of energy drink consumption can significantly impact its effectiveness and safety.  Here are some guidelines on when to consider consuming energy drinks: Before Exercise: As you mentioned, consuming an energy drink 10 minutes to an hour before a workout can help increase alertness, endurance, and mental focus. The caffeine and other stimulants in energy drinks can provide an energy boost that may be beneficial for some people during physical activity. When Fatigued: If you’re feeling fatigued, tired, or mentally foggy and need a quick energy boost, you can consider an energy drink. However, it’s crucial to be mindful of the caffeine content and not over consume, as excessive caffeine can lead to jitteriness and other adverse effects. To Enhance Focus: Some individuals may turn to energy drinks when they need to enhance focus and concentration for tasks like studying or work. Again, moderation is key, and it’s essential not to rely on energy drinks as a primary source of mental alertness. As a Last Resort: Energy drinks should not be used as a regular substitute for a balanced diet, adequate sleep, and a healthy lifestyle. If you find yourself reaching for energy drinks regularly to combat fatigue or lack of motivation, it’s essential to address the underlying issues that may be causing these feelings, such as poor sleep or an unhealthy diet. Avoid Late in the Day: It’s advisable to avoid energy drinks, especially those high in caffeine, late in the day or close to bedtime to prevent sleep disturbances and insomnia. How much energy drink is safe? If you decide to consume energy drinks, limit them to no more than 16 ounces (473 ml) of a standard energy drink per day and try to limit all other caffeinated beverages to avoid excessive intake of caffeine. Pregnant and nursing women, children and teenagers should avoid energy drinks altogether. Consuming energy drinks in moderation is key to ensuring safety. As you’ve mentioned, limiting your intake to no more than 16 ounces (473 ml) of a standard energy drink per day is a reasonable guideline for most adults. However, it’s important to note that individual tolerance to caffeine can vary, so some people may need to consume even less to avoid adverse effects. Here are some additional considerations for safe energy drink consumption: Avoid Excessive Caffeine Intake: In addition to limiting energy drink consumption, it’s essential to consider your overall caffeine intake from all sources, including coffee, tea, and other caffeinated beverages or supplements. The recommended maximum daily caffeine intake for most adults is around 400 milligrams, but individual tolerance can vary. Special Populations: Certain groups of individuals should avoid energy drinks altogether. This includes pregnant and nursing women, children, and teenagers. These populations are more sensitive to the effects of caffeine and other stimulants and should not consume energy drinks due to potential health risks. Monitor for Adverse Effects: Pay attention to how your body responds to energy drinks. If you experience symptoms like increased heart rate, jitteriness, anxiety, digestive issues, or sleep disturbances, it’s a sign that you may be consuming too much caffeine or reacting strongly to the ingredients in the energy drink. Stay Hydrated: Energy drinks should not replace water or other hydrating beverages. It’s essential to maintain adequate hydration by drinking water throughout the day, especially if you consume caffeinated beverages. Read Labels: Be aware of the ingredients in the energy drinks you choose, as some may contain additional stimulants or ingredients that can interact with medications or have adverse effects on health. Are energy drinks natural? And while common sources of caffeine occur naturally in coffee beans or tea leaves, many energy drinks contain synthetic caffeine. Synthetic caffeine, derived from chloroacetic and urea acids, are absorbed faster than natural caffeine and can lead to greater spikes and crashes of energy. Energy drinks typically contain a combination of natural and synthetic ingredients, and the caffeine they contain can come from various sources.  It’s important to distinguish between natural and synthetic caffeine in these beverages: Natural Caffeine: Some energy drinks derive their caffeine from natural sources such as coffee beans, tea leaves, or guarana, a plant native to the Amazon basin. Natural caffeine is found in these sources and is extracted for use in the drinks. These energy drinks may promote the use of natural ingredients as a marketing point. Synthetic Caffeine: Many energy drinks also use synthetic caffeine, which is chemically manufactured. Synthetic caffeine is created through processes involving chloroacetic and urea acids and is often added to energy drinks for its stimulating effects. Synthetic caffeine is sometimes preferred by manufacturers because it can be standardized for caffeine content and absorbed more quickly by the body, leading to faster energy effects. Is Redbull good for health? While the occasional consumption of energy drinks may not pose a significant health risk, drinking them daily can have detrimental effects on your body. Red Bull contains several ingredients that are not good for you, especially when consumed in large quantities. Red Bull and similar energy drinks contain caffeine and sugar, which can provide a temporary energy boost and increase alertness. However, they are not considered a healthy beverage choice for several reasons: High Sugar Content: Red Bull typically contains a significant amount of sugar, which can contribute to weight gain, tooth decay, and may lead to health issues like obesity and type 2 diabetes if consumed in excess. Caffeine: Red Bull contains caffeine, and excessive caffeine intake can lead to anxiety, insomnia, increased heart rate, and other adverse effects. It’s important to monitor your caffeine consumption and not exceed recommended daily limits. Empty Calories: Energy drinks like Red Bull provide little to no nutritional value aside from calories. Consuming these beverages may displace healthier food and drink choices from your diet. Dehydration: Caffeine is a diuretic, which means it can lead to increased urination and potential dehydration if not accompanied by adequate water intake. Potential Health Risks: Some individuals may be more sensitive to the effects of caffeine and may experience adverse reactions or increased health risks from consuming energy drinks. In summary, while an occasional Red Bull or similar energy drink is unlikely to cause harm for most people, regular and excessive consumption is not recommended for overall health. It’s better to obtain energy from a balanced diet, proper hydration, and adequate sleep rather than relying on energy drinks. If you have concerns about your energy levels or need help managing your diet, it’s advisable to consult with a healthcare professional or registered dietitian for personalized advice. Are 8 energy drinks bad for you? Drinking V8 certainly isn’t as bad as drinking the majority of today’s soft drinks, such as soda, fruit juices, sports drinks, and energy drinks. But because of the way it’s processed, it’s also not exactly a superfood. Red Bull, like many other energy drinks, contains a combination of ingredients that can have both positive and negative effects on health. Whether Red Bull is considered “good” or “bad” for health depends on various factors, including the frequency and quantity of consumption, individual tolerance, and underlying health conditions. Positive Aspects: Energy Boost: Red Bull and similar energy drinks contain caffeine, which can provide a quick energy boost and increase alertness. In moderation, this can be beneficial for certain situations, such as when you need to stay awake or focused for a short period. Improved Mental Alertness: The caffeine in Red Bull may enhance cognitive function, including improved focus and concentration, which can be helpful in some situations. Negative Aspects: High Sugar Content: Red Bull and many other energy drinks are often high in sugar, which can contribute to weight gain and increase the risk of dental problems, type 2 diabetes, and heart disease when consumed excessively. Caffeine Content: Red Bull contains a relatively high caffeine content, which can lead to side effects such as increased heart rate, jitteriness, anxiety, and sleep disturbances. Excessive caffeine intake can be harmful, and individual tolerance varies. Dehydration: Caffeine is a diuretic, which means it can increase urine production and lead to fluid loss. This can potentially result in dehydration, especially if you consume energy drinks without adequate water intake. Interaction with Medications: The caffeine and other ingredients in Red Bull may interact with certain medications or exacerbate underlying health conditions. It’s essential to consult a healthcare professional if you have specific health concerns. Not a Substitute for Nutrition: Red Bull does not provide essential nutrients or sustenance. Relying on energy drinks as a dietary source can lead to nutrient deficiencies and an unhealthy diet. Conclusion The question of whether energy drinks are bad for weight loss is a complex and multifaceted issue. While energy drinks can provide a quick boost of energy and potentially stimulate metabolism due to their caffeine content, they often come with significant drawbacks that can hinder weight loss efforts. One of the primary concerns is the high sugar content in many energy drinks, which can lead to excess calorie intake and contribute to weight gain when consumed regularly. The stimulants and additives in these beverages can have adverse effects on overall health, including increased heart rate jitteriness, and even more serious consequences in some cases. The psychological aspects of energy drink consumption should not be underestimated. Relying on these beverages for a quick energy fix can lead to a cycle of dependency and may not address the underlying factors contributing to weight gain. For individuals looking to achieve and maintain weight loss, it is advisable to prioritize a balanced and sustainable approach to diet and exercise. While occasional consumption of energy drinks may not be detrimental, they should not be relied upon as a primary means of support. Instead, focusing on a well-rounded, nutrient-dense diet, regular physical activity, and adequate sleep remains the most effective and health-conscious strategy for weight management.  You may also like Leave a Comment Adblock Detected Please support us by disabling your AdBlocker extension from your browsers for our website.
Teratom 0 Wertungen (0 ø) 4096 Aufrufe Als Teratom bezeichnet man einen Tumor, der sich aus Keimzellen entwickelt und somit Komponenten aller drei Keimblätter enthalten kann. Man unterscheidet reife und unreife Teratome, reife enthalten differenziertes Gewebe, wie z.B. Haut, Haare, Zähne, Muskel- und Nervengewebe. Selten können Teratome komplexe Gebilde wie Augen, Hände, Füße oder andere Gliedmaßen und Organe enthalten. Teratome sind meist zystisch abgekapselt, wobei die Wand der Zyste epithelartig ausgekleidet ist, es gibt aber auch völlig solide Teratome oder solche, die sowohl zystische als auch solide Anteile aufweisen. Teratome der Frau, z.B. des Eierstocks, sind meist gut differenziert und benigne. Nur 3% der Teratome bei Frauen sind maligne, wohingegen beim Mann, z.B. Teratome des Hodens, die auch als Teratomkarzinome bezeichnet werden, meist undifferenziert und maligne sind. Es gibt Teratome, die aus mehreren Geweben bestehen, aber auch monodermale Teratome, wie z.B. die Dermoidzyste. Eine weitere Sonderform des Teratoms stellt das so genannte fetiforme Teratom dar. Hierbei ähnelt das Teratom einem missgebildetem Fötus, das Gewebe ist sehr gut differenziert. Strittig ist hierbei, ob beschriebene Fälle von Inklusio Fetalis ebenfalls auf fetiforme Teratome zurückgehen, oder ob hierbei tatsächlich eine Verwachsung von zwei Föten im Mutterleib stattgefunden hat.
Low-noise block downconverter From Wikipedia, the free encyclopedia Jump to navigation Jump to search Ku-band LNB with both sides uncovered. A low-noise block downconverter (LNB) is the receiving device mounted on satellite dishes used for satellite TV reception, which collects the radio waves from the dish and converts them to a signal which is sent through a cable to the receiver inside the building. Also called a low-noise block,[1][2] low-noise converter (LNC), or even low-noise downconverter (LND),[3] the device is sometimes inaccurately called a low-noise amplifier (LNA).[4] The LNB is a combination of low-noise amplifier, frequency mixer, local oscillator and intermediate frequency (IF) amplifier. It serves as the RF front end of the satellite receiver, receiving the microwave signal from the satellite collected by the dish, amplifying it, and downconverting the block of frequencies to a lower block of intermediate frequencies (IF). This downconversion allows the signal to be carried to the indoor satellite TV receiver using relatively cheap coaxial cable; if the signal remained at its original microwave frequency it would require an expensive and impractical waveguide line. The LNB is usually a small box suspended on one or more short booms, or feed arms, in front of the dish reflector, at its focus (although some dish designs have the LNB on or behind the reflector). The microwave signal from the dish is picked up by a feedhorn on the LNB and is fed to a section of waveguide. One or more metal pins, or probes, protrude into the waveguide at right angles to the axis and act as antennas, feeding the signal to a printed circuit board inside the LNB's shielded box for processing. The lower frequency IF output signal emerges from a socket on the box to which the coaxial cable connects. LNBF disassembled. The waveguide from the feedhorn, carrying the microwave radio signal collected by the dish passes through the hole in the center. The pins visible at the top and left side of the hole project into the waveguide and act as antennas to receive the signal, converting it to radio frequency alternating currents which are processed by the circuit board. The lower frequency output signal is taken from the coaxial cable jacks, bottom. Cross-section across a low-noise block downconverter. Viewing of the pin and the horn antenna in a low-noise block downconverter. The LNB gets its power from the receiver or set-top box, using the same coaxial cable that carries signals from the LNB to the receiver. This phantom power travels to the LNB; opposite to the signals from the LNB. A corresponding component, called a block upconverter (BUC), is used at the satellite earth station (uplink) dish to convert the band of television channels to the microwave uplink frequency. Amplification and noise The signal received by the LNB is extremely weak and it has to be amplified before downconversion. The low noise amplifier section of the LNB amplifies this weak signal while adding the minimum possible amount of noise to the signal. The low-noise quality of an LNB is expressed as the noise figure (or sometimes noise temperature). This is the signal to noise ratio at the input divided by the signal to noise ratio at the output. It is typically expressed as a decibels (dB) value. The ideal LNB, effectively a perfect amplifier, would have a noise figure of 0 dB and would not add any noise to the signal. Every LNB introduces some noise but clever design techniques, expensive high performance low-noise components such as HEMTs and even individual tweaking of the LNB after manufacture, can reduce some of the noise contributed by the LNB's components. Active cooling to very low temperatures can help reduce noise too, and is often used in scientific research applications. Every LNB off the production line has a different noise figure because of manufacturing tolerances. The noise figure quoted in the specifications, important for determining the LNB's suitability, is usually representative of neither that particular LNB nor the performance across the whole frequency range, since the noise figure most often quoted is the typical figure averaged over the production batch. Ku-band linear-polarized LNBF Block downconversion Satellites use comparatively high radio frequencies (microwaves) to transmit their TV signals. As microwave satellite signals do not easily pass through walls, roofs, or even glass windows, it is preferable for satellite antennas to be mounted outdoors. However, plastic glazing is transparent to microwaves and residential satellite dishes have successfully been hidden indoors looking through acrylic or polycarbonate windows to preserve the external aesthetics of the home.[5] The purpose of the LNB is to use the superheterodyne principle to take a block (or band) of relatively high frequencies and convert them to similar signals carried at a much lower frequency (called the intermediate frequency or IF). These lower frequencies travel through cables with much less attenuation, so there is much more signal left at the satellite receiver end of the cable. It is also much easier and cheaper to design electronic circuits to operate at these lower frequencies, rather than the very high frequencies of satellite transmission. The frequency conversion is performed by mixing a fixed frequency produced by a local oscillator inside the LNB with the incoming signal, to generate two signals equal to the sum of their frequencies and the difference. The frequency sum signal is filtered out and the frequency difference signal (the IF) is amplified and sent down the cable to the receiver: C-band Ku-band where is a frequency. The local oscillator frequency determines what block of incoming frequencies is downconverted to the frequencies expected by the receiver. For example, to downconvert the incoming signals from Astra 1KR, which transmits in a frequency block of 10.70–11.70 GHz, to within a standard European receiver's IF tuning range of 950–2,150 MHz, a 9.75 GHz local oscillator frequency is used, producing a block of signals in the band 950–1,950 MHz. For the block of higher transmission frequencies used by Astra 2A and 2B (11.70–12.75 GHz), a different local oscillator frequency converts the block of incoming frequencies. Typically, a local oscillator frequency of 10.60 GHz is used to downconvert the block to 1,100–2,150 MHz, which is still within the receiver's 950–2,150 MHz IF tuning range.[6] In a C-band antenna setup, the transmission frequencies are typically 3.7–4.2 GHz. By using a local oscillator frequency of 5.150 GHz the IF will be 950–1,450 MHz which is, again, in the receiver's IF tuning range. For the reception of wideband satellite television carriers, typically 27 MHz wide, the accuracy of the frequency of the LNB local oscillator need only be in the order of ±500 kHz, so low cost dielectric oscillators (DRO) may be used. For the reception of narrow bandwidth carriers or ones using advanced modulation techniques, such as 16-QAM, highly stable and low phase noise LNB local oscillators are required. These use an internal crystal oscillator or an external 10 MHz reference from the indoor unit and a phase-locked loop (PLL) oscillator. Low-noise block feedhorns (LNBFs) With the launch of the first DTH broadcast satellite in Europe (Astra 1A) by SES in 1988, antenna design was simplified for the anticipated mass-market. In particular, the feedhorn (which gathers the signal and directs it to the LNB) and the polarizer (which selects between differently polarized signals) were combined with the LNB itself into a single unit, called an LNB-feed or LNB-feedhorn (LNBF), or even an "Astra type" LNB. The prevalence of these combined units has meant that today the term LNB is commonly used to refer to all antenna units that provide the block-downconversion function, with or without a feedhorn. LNBF for Sky Digital and Freesat in the UK The Astra type LNBF that includes a feedhorn and polarizer is the most common variety, and this is fitted to a dish using a bracket that clamps a collar around the waveguide neck of the LNB between the feedhorn and the electronics package. The diameter of the LNB neck and collar is usually 40mm although other sizes are also produced. In the UK, the "minidish" sold for use with Sky Digital and Freesat uses an LNBF with an integrated clip-in mount. LNBs without a feedhorn built-in are usually provided with a (C120) flange around the input waveguide mouth which is bolted to a matching flange around the output of the feedhorn or polarizer unit. Polarization It's common to polarize satellite TV signals because it provides a way of transmitting more TV channels using a given block of frequencies. This approach requires the use of receiving equipment that can filter incoming signals based on their polarisation. Two satellite TV signals can then be transmitted on the same frequency (or, more usually, closely spaced frequencies) and provided that they are polarized differently, the receiving equipment can still separate them and display whichever one is currently required. Throughout the World, most satellite TV transmissions use vertical and horizontal linear polarization but in North America, DBS transmissions use left and right hand circular polarization. Within the waveguide of a North American DBS LNB a slab of dielectric material is used to convert left and right circular polarized signals to vertical and horizontal linear polarized signals so the converted signals can be treated the same. A 1980s Ku-band LNB (2.18 dB noise figure) without built-in polarization selection and with a WR75 fitting for separate feedhorn and polarizer The probe inside the LNB waveguide collects signals that are polarized in the same plane as the probe. To maximise the strength of the wanted signals (and to minimise reception of unwanted signals of the opposite polarization), the probe is aligned with the polarization of the incoming signals. This is most simply achieved by adjusting the LNB's skew; its rotation about the waveguide axis. To remotely select between the two polarizations, and to compensate for inaccuracies of the skew angle, it used to be common to fit a polarizer in front of the LNB's waveguide mouth. This either rotates the incoming signal with an electromagnet around the waveguide (a magnetic polarizer) or rotates an intermediate probe within the waveguide using a servo motor (a mechanical polarizer) but such adjustable skew polarizers are rarely used today. The simplification of antenna design that accompanied the first Astra DTH broadcast satellites in Europe to produce the LNBF extended to a simpler approach to the selection between vertical and horizontal polarized signals too. Astra type LNBFs incorporate two probes in the waveguide, at right angles to one another so that, once the LNB has been skewed in its mount to match the local polarization angle, one probe collects horizontal signals and the other vertical, and an electronic switch (controlled by the voltage of the LNB's power supply from the receiver: 13 V for vertical and 18 V for horizontal) determines which polarization is passed on through the LNB for amplification and block-downconversion. Such LNBs can receive all the transmissions from a satellite with no moving parts and with just one cable connected to the receiver, and have since become the most common type of LNB produced. Common LNBs C-band LNB Here is an example of a North American C-band LNB: • Local oscillator: 5.15 GHz • Frequency: 3.40–4.20 GHz • Noise temperature: 25–100 kelvins (uses kelvin ratings as opposed to dB rating). • Polarization: Linear Supply voltage Block Local oscillator frequency Intermediate freq. range Polarization Frequency band 13 V Vertical 3.40–4.20 GHz 5.15 GHz 950–1,750 MHz 18 V Horizontal 3.40–4.20 GHz 5.15 GHz 950–1,750 MHz Ku-band LNB Standard North America Ku band LNB Here is an example of a standard linear LNB: • Local oscillator: 10.75 GHz • Frequency: 11.70–12.20 GHz • Noise figure: 1 dB typical • Polarization: Linear Supply voltage Block Local oscillator frequency Intermediate freq. range Polarization Frequency band 13 V Vertical 11.70–12.20 GHz 10.75 GHz 950–1,450 MHz 18 V Horizontal 11.70–12.20 GHz 10.75 GHz 950–1,450 MHz Universal LNB ("Astra" LNB) Astra type LNBF In Europe, as SES launched more Astra satellites to the 19.2°E orbital position in the 1990s, the range of downlink frequencies used in the FSS band (10.70–11.70 GHz) grew beyond that catered for by the standard LNBs and receivers of the time. Reception of signals from Astra 1D required an extension of receivers' IF tuning range from 950–1,950 MHz to 950–2,150 MHz and a change of LNBs' local oscillator frequency from the usual 10 GHz to 9.75 GHz (so-called "Enhanced" LNBs). The launch of Astra 1E and subsequent satellites saw the first use by Astra of the BSS band of frequencies (11.70–12.75 GHz) for new digital services and required the introduction of an LNB that would receive the whole frequency range 10.70–12.75 GHz, the "Universal" LNB. A Universal LNB has a switchable local oscillator frequency of 9.75/10.60 GHz to provide two modes of operation: low band reception (10.70–11.70 GHz) and high band reception (11.70–12.75 GHz). The local oscillator frequency is switched in response to a 22 kHz signal superimposed on the supply voltage from the connected receiver. Along with the supply voltage level used to switch between polarizations, this enables a Universal LNB to receive both polarizations (Vertical and Horizontal) and the full range of frequencies in the satellite Ku band under the control of the receiver, in four sub-bands:[7] Here is an example of a Universal LNB used in Europe: • Noise figure: 0.2 dB typical • Polarization: Linear Supply Block Local oscillator frequency Intermediate freq. range Voltage Tone Polarization Frequency band 13 V 0 kHz Vertical 10.70–11.70 GHz, low 9.75 GHz 950–1,950 MHz 18 V 0 kHz Horizontal 10.70–11.70 GHz, low 9.75 GHz 950–1,950 MHz 13 V 22 kHz Vertical 11.70–12.75 GHz, high 10.60 GHz 1,100–2,150 MHz 18 V 22 kHz Horizontal 11.70–12.75 GHz, high 10.60 GHz 1,100–2,150 MHz North America DBS LNB Here is an example of an LNB used for DBS: • Local oscillator: 11.25 GHz • Frequency: 12.20–12.70 GHz • Noise figure: 0.7 dB • Polarization: Circular Supply voltage Block Local oscillator frequency Intermediate freq. range Polarization Frequency band 13 V Right-hand 12.20–12.70 GHz 11.25 GHz 950–1,450 MHz 18 V Left-hand 12.20–12.70 GHz 11.25 GHz 950–1,450 MHz Ka-band LNB Ka band 13v right 20.2- 21.2 GHz 18v left 20.2- 21.2 GHz local osc. 19.25 GHZ if. out 950-1950 MHz 13v right 21.2- 22.2 GHz 18v left 21.2- 22.2 GHz local osc. 20.25 if. out 950-1950 MHz Norsat Ka band 13v right 18.2- 19.2 GHz 18v left 18.2- 19.2 GHz local osc. 17.25 if. out 950-1950 MHz Multi-output LNBs An eight-output, or octo, LNBF Dual, twin, quad, and octo LNBs A twin-output Universal LNB with a C120 flange fitting for a separate feedhorn An LNB with a single feedhorn but multiple outputs for connection to multiple tuners (in separate receivers or within the same receiver in the case of a twin-tuner PVR receiver). Typically, two, four or eight outputs are provided. Each output responds to the tuner's band and polarization selection signals independently of the other outputs and "appears" to the tuner to be a separate LNB. Such an LNB usually may derive its power from a receiver connected to any of the outputs. Unused outputs may be left unconnected (but waterproofed for the protection of the whole LNB). Note: In the US, an LNB with two outputs is termed a "dual LNB" but in the UK, the term "dual LNB" historically described an LNB with two outputs, each producing one polarisation only, for connection to a multiswitch (the term and the LNBs fell out of use with the introduction of the Universal LNB and the multiswitch equivalent, the quattro LNB - see below) and today "dual LNB" (and "dual feed") describes antennas for reception from two satellite positions, using either two separate LNBs or a single Monoblock LNB with two feedhorns. In the UK, the term "twin-output LNB", or simply "twin LNB", is usually used for an LNB with a single feedhorn but two independent outputs.[3] Quattro LNBs A special type of LNB intended for use in a shared dish installation to deliver signals to any number of tuners. A quattro LNB has a single feedhorn and four outputs, which each supply just one of the Ku sub-bands (low band/horizontal polarization, high band/vertical polarization, low/vertical and high/horizontal) to a multiswitch or an array of multiswitches, which then delivers to each connected tuner whichever sub-band is required by that tuner.[8] Although a quattro LNB typically looks similar to a quad LNB, it cannot (sensibly) be connected to receivers directly. Note again the difference between a quad and a quattro LNB: A quad LNB can drive four tuners directly, with each output providing signals from the entire Ku band. A quattro LNB is for connection to a multiswitch in a shared dish distribution system and each output provides only a quarter of the Ku band signals. SCR LNB with three SCR taps for daisy-chaining multiple tuners Satellite channel router (SCR), or unicable LNBs Multiple tuners may also be fed from an satellite channel router (SCR) or unicable LNB in a single cable distribution system. A Unicable LNB has one output connector but operates in a different way to standard LNBs so it can feed multiple tuners daisy-chained along a single coax cable. Instead of block-downconverting the whole received spectrum, an SCR LNB downconverts a small section of the received signal (equivalent to the bandwidth of a single transponder on the satellite) selected according to a DiSEqC-compliant command from the receiver, to output at a fixed frequency in the IF. Up to 16 tuners can be allocated a different frequency in the IF range and for each, the SCR LNB downconverts the corresponding individually requested transponder.[9] Most SCR LNBs also include either a legacy mode of operation or a separate legacy output which provides the received spectrum block-downconverted to the whole IF range in the conventional way. An optical fibre LNB (with fibre connection and conventional F-connector for power input) Wideband LNB ASTRA Universal Wideband LNB with an oscillator frequency of 10.40 or 10.41 GHz are entering the market. The intermediate frequency band is much wider than in a conventional LNB, as the high and low band are not split up. Wideband LNB signals can be accepted by new wideband tuners, and by new SCR systems (e.g., Inverto/Fuba,[10] Unitron,[11] Optel,[12] GT-Sat/Astro), with or without optical transmission. Wideband signals can be converted to conventional quattro signals[13] and vice versa.[14] In February 2016, BSkyB launched a new LNB only compatible with their new wideband tuner.[15] This LNB has one port for all vertical polarised channels both low and high band, and another port for all low and high band horizontal channels. The basic model has only 2 connections and presumably has a local oscillator of 10.41 GHz with an intermediate frequency of 290–2340 MHz from an input of 10.7–12.75 GHz. This LNB seems to be the same as Unitrons ASTRA Universal Wideband LNB.[16] Two cables minimum are needed to access all channels. In the Sky Q box, multiple tuners can select multiple channels, more than the usual two for dual coax systems. This type of LNB is incompatible with the more common Astra Universal LNB used in the UK meaning the LNB is changed during upgrade. There is a model of the LNB with 6 connections, 2 for Sky Q and 4 Astra Universal LNB for users with multiple legacy systems such as Freesat in addition to Sky Q. In cases where only a single cable is possible, such as apartment blocks, Sky Q compatible multiswitches can be used, which instead use BSkyB SCR.[17] Optical-fibre LNBs LNBs for fibre satellite distribution systems operate in a similar way to conventional electrical LNBs, except that all four of the sub-bands in the entire Ku band spectrum of 11.70–12.75 GHz across two signal polarisations are simultaneously block-downconverted (as in a quattro LNB). The four sub-bands’ IFs are stacked to create one IF with a range of 0.95–5.45 GHz (a bandwidth of 4.5 GHz), which is modulated on an optical signal using a semiconductor laser, to send down the fibre cable. At the receiver, the optical signal is converted back to the traditional electrical signal to "appear" to the receiver as a conventional LNB.[18] Monoblock LNBs A twin-output monoblock LNBF for Astra 19.2°E and Hot Bird with a collar size adapter fitted A monoblock (or monobloc) LNB is a single unit comprising two LNBs and a DiSEqC switch, designed to receive signals from two satellites spaced close together and to feed the selected signal to the receiver. The feedhorns of the two LNBs are at a fixed distance apart for reception of satellites of a particular orbital separation (often 6°). Although the same functionality can be achieved with separate LNBs and a switch, a monoblock LNB, constructed in one unit, is more convenient to install and enables the two feedhorns to be closer together than individually cased LNBs (typically 60mm diameter). The distance between the feedhorns depends on the orbital separation of the satellites to be received, the diameter and focal length of the dish used, and the position of the reception site relative to the satellites. So monoblock LNBs are usually a compromise solution designed to operate with standard dishes in a particular region.[19] For example, in parts of Europe, monoblocks designed to receive the Hot Bird and Astra 19.2°E satellites are popular because they enable reception of both satellites on a single dish without requiring an expensive, slow and noisy motorised dish. A similar advantage is provided by the duo LNB for simultaneous reception of signals from both the Astra 23.5°E and Astra 19.2°E positions. Cold temperatures It is possible for any moisture in an LNB to freeze, causing ice to build-up in very low temperatures. This is only likely to occur when the LNB is not receiving power from the satellite receiver (i.e., no programmes are being watched). To combat this, many satellite receivers provide an option to keep the LNB powered while the receiver is on standby. In fact, most LNBs are kept powered because this helps to stabilise the temperature and, thereby, the local oscillator frequency by the dissipated heat from the circuitry of LNB. In the case of UK BSkyB receivers, the LNB remains powered while in standby so that the receiver can receive firmware updates and Electronic Programme Guide updates. In the United States, the LNB connected to Dish Network receivers remains powered as well as those receivers that receive software and firmware updates and guide information over the air at night. In Turkey, another LNB type Digiturk MDUs are kept powered to receive VOD content, STB firmware, EPG data and pay TV keys in order to watch encrypted content. See also References 1. ^ "Glossary of Satellite Terms". Satnews.com. Retrieved January 27, 2011.  2. ^ Calaz, R A. An Introduction To Domestic Radio TV And Satellite Reception CAI (2002) pp119 3. ^ a b Bains, Geoff. "Getting The Most Out Of An LNB" What Satellite & Digital TV (November, 2008) pp50-51 4. ^ "Satellite Glossary". SatUniverse.com. Retrieved January 27, 2011.  5. ^ "Ku dish through glass". satelliteguys.us. Archived from the original on April 7, 2014. Retrieved November 6, 2013.  6. ^ "Understanding lnb specifications" (PDF). SatCritics Technicals. 2002-11-15. Retrieved 2011-11-08.  7. ^ "Professional Dish Installation" (PDF). ASTRA (GB) Limited. March 2005. p. 7. Archived from the original (pdf) on 2011-07-16.  8. ^ "Astra Glossary - Quattro LNB". SES ASTRA. Retrieved December 30, 2010.  9. ^ Bains, Geoff. "Inverto Unicable LNB" What Satellite & Digital TV (February, 2006) pp60-62" 10. ^ "Inverto - IDLU-UWT110-CUO1O-32P -". www.inverto.tv. Retrieved 2016-07-01.  11. ^ "Unitron catalog" (PDF).  12. ^ "Optel". www.optelit.com. Retrieved 2016-07-01.  13. ^ popcom.be. "Wideband to Quattro Convertor [sic] - Unitron Group". Unitron Group. Retrieved 2016-07-01.  14. ^ "Sky Q Installation" (PDF). Archived from the original (PDF) on 2016-07-05.  15. ^ https://corporate.sky.com/documents/sky-q-2015/fact-sheet-sky-q.pdf 16. ^ LNB http://www.unitrongroup.com/en/news-events/unitrongroup-introduces-wideband-satellite-product-family.html 17. ^ http://www.unitrongroup.com/download.php?lang=en&id=657 18. ^ "FibreMDU Optical LNB". Global Invacom. Retrieved January 12, 2010.  19. ^ Bains, Geoff. "Multi-feed dishes" What Satellite & Digital TV (August 2007) pp44-47 External links • LNB mysteries explained. • Explanation and block diagram of LNB • Noise Temperature and Noise Figure • OnAstra - Official Astra consumers/viewers' site • SES - Official SES trade/industry site • Astra Recommendations (for satellite reception equipment including LNB types) • VSAT Installation Manual with explanation of the Low-noise block converter[permanent dead link] Retrieved from "https://en.wikipedia.org/w/index.php?title=Low-noise_block_downconverter&oldid=841598450" This content was retrieved from Wikipedia : http://en.wikipedia.org/wiki/Low-noise_block_downconverter This page is based on the copyrighted Wikipedia article "Low-noise block downconverter"; it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA
User Tools Site Tools doc:howto:bluetooth.audio Bluetooth Audio This wiki entry should enable you to play audio from a bluetooth source to an OpenWrt router that has sound output capabilities. It is working with: Android mobile (Sony Xperia M) as bluetooth source (use "Throw" in Walkman App) to an TI omap BeagleBoard (onboard soundcard, noname Bluetooth 2.1+ USB 1.1 micro dongle) as bluetooth/audio sink. Required OpenWrt packages: 1. kmod-input-uinput (new) 2. pulseaudio 6 3. sbc library (new) 4. bluez5 5. dbus (because bluez5) Hardware: 1. Bluetooth dongle 2. Bluetooth sender (Android mobile) :!: Some USB Hardware on Routers does not support USB 1.1 (such Bluetooth dongles) directly attached to USB ports (2.0 devices only). You have to use an USB hub in this case. Foreword Getting bluetooth to run is difficult. Bluetooth development is fast, not documented and there are issues with the bluez userspace development in general. [1] So there are a ton of outdated documentation using bluez3 or bluez4. Using Audio with bluez5 requires DBUS and pulseaudio. Pulseaudio 6 supports bluez4 and blue5. Recommended/Not in this guide: Python because the test tools make use of python. Test tools can supply legacy methods via commandline for pairing. Device Pairing Bluetooth radio is disabled by default ("DOWN"). Enable bluetooth from commandline to make OpenWrt device discoverable. hciconfig -a hci0 hciconfig -a hci0 up hciconfig -a hci0 piscan hciconfig -a hci0 sspmode enable hciconfig -a output after commands hci0: Type: BR/EDR Bus: USB BD Address: XX:XX:XX:XX:XX:XX ACL MTU: 310:10 SCO MTU: 64:8 UP RUNNING PSCAN ISCAN RX bytes:6513036 acl:21980 sco:0 events:597 errors:0 TX bytes:10451 acl:316 sco:0 commands:128 errors:0 Features: 0xff 0xff 0x8f 0xfe 0x9b 0xff 0x59 0x83 Packet type: DM1 DM3 DM5 DH1 DH3 DH5 HV1 HV2 HV3 Link policy: RSWITCH HOLD SNIFF PARK Link mode: SLAVE ACCEPT Name: 'BlueZOmap' Class: 0x0c0000 Service Classes: Rendering, Capturing Device Class: Miscellaneous, HCI Version: 2.1 (0x4) Revision: 0x12e7 LMP Version: 2.1 (0x4) Subversion: 0x12e7 Manufacturer: Cambridge Silicon Radio (10) *Name can be set via /etc/bluetooth/main.conf* Adding bluetooth source to trusted devices You will see an entry like this bluetoothd[2285]: Authentication attempt without agent bluetoothd[2285]: Access denied: org.bluez.Error.Rejected run bluetoothctl with trust AA:BB:CC:DD:EE:FF [CHG] Device AA:BB:CC:DD:EE:FF Trusted: yes Changing AA:BB:CC:DD:EE:FF trust succeeded AA:BB:CC:DD:EE:FF … Bluetooth device mac that is audio source (mobile) dbus access control add entry to a policy section in /etc/dbus-1/system.d/bluetooth.conf: ... <policy user="root"> ... <allow send_type="method_call"/> <allow send_type="method_return"/> </policy> ... add entry to a policy section in /etc/dbus-1/system.d/pulseaudio.conf: <allow send_type="method_call"/> <allow send_type="method_return"/> Problems 1. Reloading daemons might be necessary 2. Check logread or run daemons in foreground with multiple SSH connections bluetooth debugging Bluetoothd can run in foreground with very verbose debugging. bluetoothd -n -d Note multiple arguments to -d can be specified, colon, comma or space separated. The arguments are relative source code filenames for which debugging output should be enabled; output shell-style globs are accepted (e.g.: 'plugins/*:src/main.c'). sound debugging Pulseaudio can run in foreground. See /etc/init.d/pulseaudio for commandline arguments Pulseaudio runs in system mode. This is unsupported and you should check access rights (group & module parameters) :!: The main problem is that bluetooth devices appear & disappear from playback. This might require to allow runtime module loading permanently. Check if you have pulseaudio output with paplay <filename> Check access rights via /etc/group pulse-rt:x:53: pulse-access:x:54:root :!: and see pulse-access group added as module parameter below Check if you have error when loading modules. For this guide allow module loading by removing --disallow-module-loading from /etc/init.d/pulseaudio :!: Security risk Check if you load the right modules in /etc/pulse/system.pa #!/usr/bin/pulseaudio -nF # # This file is part of PulseAudio. ### Automatically load driver modules depending on the hardware available .ifexists module-detect.so ### Use the static hardware detection module (for systems that lack udev/hal support) load-module module-detect .endif ### Automatically restore the volume of streams and devices load-module module-stream-restore load-module module-device-restore load-module module-card-restore ### Automatically restore the default sink/source when changed by the user ### during runtime ### NOTE: This should be loaded as early as possible so that subsequent modules ### that look up the default sink/source get the right value # load-module module-default-device-restore ### Bluetooth load-module module-bluetooth-discover load-module module-bluetooth-policy load-module module-zeroconf-publish ### Should be after module-*-restore but before module-*-detect load-module module-switch-on-port-available ### Automatically move streams to the default sink if the sink they are ### connected to dies, similar for sources load-module module-rescue-streams ### Make sure we always have a sink around, even if it is a null sink. load-module module-always-sink ### Honour intended role device property load-module module-intended-roles ### Automatically suspend sinks/sources that become idle for too long load-module module-suspend-on-idle ### Enable positioned event sounds load-module module-position-event-sounds ### Load several protocols .ifexists module-esound-protocol-unix.so load-module module-esound-protocol-unix .endif load-module module-native-protocol-unix auth-group=pulse-access ### Load the RTP receiver module (also configured via paprefs, see above) load-module module-rtp-recv ### Load the RTP sender module (also configured via paprefs, see above) load-module module-null-sink sink_name=rtp format=s16be channels=2 rate=44100 sink_properties="device.description='RTP Multicast Sink'" load-module module-rtp-send source=rtp.monitor ### Modules to allow autoloading of filters (such as echo cancellation) ### on demand. module-filter-heuristics tries to determine what filters ### make sense, and module-filter-apply does the heavy-lifting of ### loading modules and rerouting streams. load-module module-filter-heuristics load-module module-filter-apply #load-module module-loopback source=bluez_source.AA_BB_CC_DD_EE_FF sink=_name=alsa_output.0.analog-stereo rate=44100 adjust_time=0 You can load modules with pactl uinput missing If you dont have kmod-input-uinput installed you will see errors like Wed Apr 1 14:53:21 2015 daemon.err bluetoothd[2285]: AVRCP: failed to init uinput for AA:BB:CC:DD:EE:FF Successful kmod-input-uinput message kern.info kernel: [ 681.020385] input: AA:BB:CC:DD:EE:FF as /devices/virtual/input/input2 bluetoothd[2530]: profiles/audio/avctp.c:init_uinput() AVRCP: uinput initialized for AA:BB:CC:DD:EE:FF :!: You should see start/stop messages in the log whe you start/stop playback. :!: If you have no sound at this point check pulseaudio settings (modules!), reload pulseaudio, enable the audio sink TODO 1. commandline / uci foo 2. role of /var/lib/bluetooth/nn:nn:nn:nn:nn:nn/ with devices 3. Headset buttons/ uinput: /etc/modules-load.d/uinput.conf doc/howto/bluetooth.audio.txt · Last modified: 2015/12/19 13:36 by tmomas
Next Article in Journal A Review of Skin-Wearable Sensors for Non-Invasive Health Monitoring Applications Previous Article in Journal Assessing Technology Implementation Success for Highway Construction and Asset Management Previous Article in Special Issue Vehicle Detection on Occupancy Grid Maps: Comparison of Five Detectors Regarding Real-Time Performance     Order Article Reprints Font Type: Arial Georgia Verdana Font Size: Aa Aa Aa Line Spacing: Column Width: Background: Article Grand Theft Auto-Based Cycling Simulator for Cognitive Enhancement Technologies in Dangerous Traffic Situations 1 Faculty of Engineering and Computer Science, Osnabrück University of Applied Sciences, DE-49076 Osnabrück, Germany 2 Faculty of Philosophy, Jagiellonian University, PL-31-007 Krakow, Poland * Author to whom correspondence should be addressed. Sensors 2023, 23(7), 3672; https://doi.org/10.3390/s23073672 Received: 14 February 2023 / Revised: 16 March 2023 / Accepted: 29 March 2023 / Published: 31 March 2023 Abstract : While developing traffic-based cognitive enhancement technology (CET), such as bike accident prevention systems, it can be challenging to test and evaluate them properly. After all, the real-world scenario could endanger the subjects’ health and safety. Therefore, a simulator is needed, preferably one that is realistic yet low cost. This paper introduces a way to use the video game Grand Theft Auto V (GTA V) and its sophisticated traffic system as a base to create such a simulator, allowing for the safe and realistic testing of dangerous traffic situations involving cyclists, cars, and trucks. The open world of GTA V, which can be explored on foot and via various vehicles, serves as an immersive stand-in for the real world. Custom modification scripts of the game give the researchers control over the experiment scenario and the output data to be evaluated. An off-the-shelf bicycle equipped with three sensors serves as a realistic input device for the subject’s movement direction and speed. The simulator was used to test two early-stage CET concepts enabling cyclists to sense dangerous traffic situations, such as trucks approaching from behind the cyclist. Thus, this paper also presents the user evaluation of the cycling simulator and the CET used by the subjects to sense dangerous traffic situations. With the knowledge of the first iteration of the user-centered design (UCD) process, this paper concludes by naming improvements for the cycling simulator and discussing further research directions for CET that enable users to sense dangerous situations better. 1. Introduction Safety is one of the leading values for both the individual and society. The importance of safety and its effects are indicated by axiological considerations and psychological and economic concepts: safety and security are basic needs in the well-known hierarchy of needs proposed by Maslow [1], and numerous surveys also confirm them as a part of social well-being [2]. In our modern, motorized society, it is imperative to ensure the road safety of vehicle drivers, pedestrians, and cyclists. Cyclists are particularly exposed to the danger of other, often larger, road users. For example, according to police statistics in Poland, in 2020, there were 3768 accidents involving cyclists, including 249 deaths and 3403 injuries, and in 2021, there were 3513 accidents, including 185 deaths and 3192 injuries [3]—the situation is similar in other European countries. Many of these accidents were caused by an incorrect distance estimate by the people involved. In the context of ensuring safety, the issue of determining the distance is difficult to assess. Both vehicle drivers and cyclists struggle to estimate or recognize the safe distance between two road users. European legal regulations state maintaining a distance of at least 1.5 m [4]. A cyclist has difficulty assessing this distance due to a limited field of view and an inability to see what is behind their back. Advanced information technology could potentially help inform cyclists about the current road situation, helping them to assess the danger. However, users must test such systems thoroughly before they can be used. Ideally, these user tests would be performed in the real world, but this is inherently dangerous. Therefore, it is necessary to build a system that simulates real traffic objects [5] and situations as closely as possible while keeping the user safe. This paper outlines the creation of a safe simulator by using the video game Grand Theft Auto V (GTA V) as a base. Using this simulator, two early-stage cognitive enhancement technologies (CETs) helping cyclists to identify danger are evaluated. The CETs evaluated are interface concepts that enhance a cyclist’s awareness of dangerous traffic situations. The focus is on making the user aware of the trucks in their proximity that could pose a danger, thus preventing accidents. A user test is applied to assess the effectiveness of this concept. The objectives presented in the article are (1) showing that wearable technologies are an essential tool for cognitive enhancement concerning human safety, (2) an indication that CETs require multifaceted testing, (3) arguing that for the initial design of CETs for road safety purposes, they can be tested on inexpensive simulators based on computer games, which allows researchers to quickly prove how a given CET system properly affects human cognitive abilities, without putting the subject in dangerous real road situations. There are multiple reasons to use a video game environment as a simulator. For developing CET in the early iterations, the game GTA V is chosen for the following reasons: • GTA V is an off-the-shelf game bringing realistic motorists and cyclists as well as road environments; • GTA V is well suited for user experience research because it provides a repeatable environment; • GTA V comes with a physics engine that includes realistic weather conditions, trajectories of road users even in crash situations, and sound directions; • Using a well-known game, such as GTA V, as a simulator allows the user to express his or her needs better due to the known environment. We also recognize the limitations of this approach, such as not taking into account specific legal road rules or the advanced interaction between vehicles moving in traffic, pedestrians, and the environment. However, for the pilot testing of the effectiveness of CET, these aspects are not necessary to be taken into account and could even hinder the identification of key aspects of cognitive enhancement for the study. This paper is organized as follows. In Section 2, the related research is reviewed. Section 3 presents the simulation objectives and a detailed specification of the system. Section 4 presents the concept design based on the user-centered design cycle, followed by its implementation for the cyclist’s safety in the traffic simulator in Section 5. The results and discussion are presented in Section 6, and in Section 7, further extensions of the simulator based on the assumptions of CET are shown, respectively, followed by the conclusions in Section 8. In addition, a technical Appendix A is enclosed. 2. Related Work This section reviews the related works on the usage of technologies that enhance human cognition abilities for increased safety, cf. Section 2.1. In Section 2.2, papers on the usage of computer games as a simulator are reviewed. The computer game as a simulator approach is later used for prototyping the CET systems to ensure safety for cyclists. 2.1. Cognitive Enhancement for Increased Safety Humankind has evolved to be equipped with instinctive reactions to protect it from danger; for example, when perceiving a snake, a bodily reaction triggers fear, prompting the human to flee [6]. However, safety and its counterpart danger are often challenging to assess quantitatively. People are often unaware that situations are unsafe; it also requires knowledge and mental work to assess the situation correctly. Since people are not yet equipped with such an appropriate safety sense, technology can supplement this sense. The idea of cognitive enhancement includes general assumptions that refer to improving intellectual abilities and perception, including a sense of safety. Sandberg and Bostrom [7] defined cognitive enhancement as the amplification or extension of the core capacities of the mind through the improvement or augmentation of internal or external information processing systems. It includes improved intelligence and attention, strengthening creativity and memory, and expanding the perceptual range. Cognitive enhancement also refers to the potential benefits of increasing cognitive function beyond ordinary or average capacity and improving control, emotion, or motivation [8]. The deployment of advanced technological tools and techniques is a key feature of cognitive enhancement, as well as its voluntary use by healthy people [9]. Different techniques can be used for cognitive enhancement, including biotechnological and information technology (IT) systems [10]. In recent years, more and more IT systems have been developed to enhance people’s cognitive abilities. These systems tend to enhance people’s basic intellectual abilities, such as memory or attention [11,12], and also enhance people’s more subtle abilities, such as the aesthetic and moral senses [13], motivation and decision processes [14], emotional attitude [15], visual attention and decision [16], and the learning process [17]. For these enhancing purposes, technologies such as virtual reality (VR), augmented reality (AR), or mixed reality (MR), as well as intelligent agents, such as robots, and other immersive technologies, are often used. In recent years, several extended reality (XR) technologies, i.e., AR, VR, and MR, have been developed to enhance visual perception, changing our behaviors, phobias, and habits. For example, AR with deep learning algorithms has been shown to enhance the visual inspection of some objects [18]. AR and visual prompting techniques can also manage attention in autism therapy [19], and AR with computer-aided projected information can increase vision correction and readability under strong ambient light [20]. AR glasses that simulate reduced acuity and contrast can be used in rehabilitation to restore central vision in patients with age-related macular degeneration (AMD) [21], and AR wearables have been applied with positive effects in physical education on motor skills learning [22]. These interactive technologies that influence users’ cognition can also be used in road safety. Systems to ensure better detection coverage of the surroundings can support many vehicles [23,24]. AR can support safe driving at night by aligning information with the driver’s eye [25] or can help the driver recognize signs on the road better [26]. Some AR solutions are dedicated to cyclists that help with speed information, setting the path or warning signs [27], and systems that enhance cyclists’ attention and visual perception [28]. Undoubtedly, in the future, AR/MR systems that take into account the impact on other sensory perceptions beyond just visual perceptions should be considered. 2.2. Computer Games as Simulators in Research Many people still associate video games with entertainment or as something for kids and adolescents. However, in reality, computer games have already found their way into the field of education and research. Like in this work, many studies use computer games as a simulator. Disregarding video games as just silly entertainment is not contemporary. Instead, they should be seen as an opportunity for research and may even influence professional careers. Nevertheless, even on a smaller scale, it is clear that video games play a more prominent role and have a more significant impact on their players than is evident at first glance. Different types of games could enhance the skills of their players, with puzzle platform games that could improve their spatial skills, role-playing games that help with organizational and planning skills, and strategy games that affect the problem-solving and spatial skills of players [29]. Although the real world is, of course, as realistic as it gets, running repeatable and safe experiments is not always possible. Weather conditions and lighting alone can be problematic when running the same experiment on multiple days. Then, there are safety concerns, especially in traffic and accident prevention, where users would have to be put in a dangerous situation for the test to be very realistic, which is not feasible. Add to that the fact that software is iteratively prototyped according to the user-centered design process (UCD) [30], and it becomes clear that subjects would have to be endangered repeatedly, making a realistic real-world test of such products unfeasible. On the other hand, computer games can be an ideal and safe environment for running simulations in both the technical and social sciences, as scenarios can be highly controlled and repeatable, and the users are kept safe. Other projects have used games as such a simulation environment. In the context of social simulations, games such as Second Life or AltspaceVR were used to conduct classes in virtual conditions, with custom maps for the classroom [31,32]. There are learning opportunities for educational and social skills in games such as Minecraft or Roblox [33]. In the case of Roblox, young players have the opportunity to simulate social situations, such as conducting parliamentary sessions or celebrating holy mass in a virtual church [34]. Video games, where the experiment modules can be built directly into the game’s environment, can work exceptionally well for simulations. Some examples of these games are the economic game SimCity, the life simulator game The Sims, or the sandbox game Minecraft. Minecraft, as a multiplayer sandbox game, can be used especially well for multi-perspective simulations. An example used AI techniques, such as reinforcement learning and planning libraries, for robotics simulation within the world of Minecraft [35]. In other research, the game is identified as an optimal solution to represent a culturally built environment, in which a semiautomatic production path was used to transfer semantic LIDAR data to the Minecraft environment [36]. So Minecraft offers a unique opportunity for students to display their creativity and understanding of concepts in more feasible ways than if they were attempted in the real world [37]. It can also serve as a massive multi-user emulated environment for research [38]. In the context of traffic situation simulations, racing games have a promising effect, as findings suggest that racing games can simulate real-life driving. After subjects played the car game StuntRally, researchers attempted to identify the users’ characteristic driving profiles [39]. Fischer et al. [40] found that subjects who played a racing game subsequently reported higher accessibility to cognition and a positive effect associated with risk-taking than subjects who played a neutral game. Furthermore, it was possible to train modules for autonomous cars on the driving patterns of players [41,42,43]. The game used for the simulator shown in this paper is GTA V. GTA V, and its previous versions are action–adventure games played from a third-person or first-person perspective. The player takes the role of a criminal and can walk around like a pedestrian or drive various vehicles, from bicycles to cars, boats, and planes. Despite the controversial scenario of being a criminal, and the 18+ PEGI rating, the game has high-quality graphics and realistic environment physics. Several studies have used GTA in some way. An example is where researchers used GTA for vehicle calculation and to follow the best route from a source to a target node in any place on the map [44]. In other research, the virtual environment of this game was used to train and test convolutional neural networks for safe driving and is expected to provide an efficient and well-defined foundation for training and testing trained networks [45]. Furthermore, driving behaviors in GTA were used to train AI to plan view networks for autonomous driving [46]. The GTA environment was also used for an optimal traffic simulation [47]. Many game modifications (mods) have been written for GTA V. One of such mods is GT Bike V, which allows the player to control the game with a smart bike trainer or a cycling power meter [48]. Lastly, although it is not focused primarily on the traffic scenario, it is also worth mentioning that GTA was used as a pedagogical tool for ethical analysis in which moral dilemmas could be simulated [49]. 3. Requirements Analysis of the Simulator The requirements analysis and specification cover the first two steps of the UCD cycle. The simulator objectives cf. Section 3.1, user groups cf. Section 3.2, the context of use cf. Section 3.3, and user requirements cf. Section 3.4 are summarized below. 3.1. Simulator Objectives The simulator aims to create a realistic bicycle simulation to support testing the concepts of CET in a secure environment. While not endangering the subject, dangerous traffic situations, such as passing trucks in close proximity to the cyclist, will be simulated in a realistic and repeatable way. The simulator will be developed using the UCD cycle. The UCD organizes the development into a cyclic, iterative process, visualized in Figure 1. In the current development stage, the UCD cycle is repeated one and a half times. Therefore, the objective of the simulator is analyzed, specified, developed, evaluated, and new requirements based on the evaluation are identified. 3.2. User Groups The system developed using the UCD cycle is the bike riding simulator, which serves three main user groups, as illustrated in Figure 2. Cyclist: The cyclists are the main focus group using the simulator. As the name suggests, the user from this group must be able to ride a bicycle before using the system. A cyclist should intuitively know how to interact with the simulator. Therefore, the system should closely emulate normal bicycle controls and must be easy to learn. It should also not pose any real risk to the cyclist. However, it should induce a feeling of being at risk when simulating a dangerous traffic situation. Consequently, it has to immerse the cyclist in being realistic. Supervisor: The supervisor will be present during the simulation. The supervisor has to set up the system and supervise the simulation. They want to give each cyclist—subject—a very similar experience. Therefore, the simulation has to be highly repeatable. During an active simulation, the supervisor also wants to be able to switch between different traffic scenarios. Furthermore, the supervisor works under a time constraint during the simulation, as they must run a user test in a designated time slot, ensuring the smooth handling of the subjects during the evaluation of, for example, CET concepts. Therefore, the system setup and any modifications should be quick and easy. Developer: The developer user group describes the developers of the CET concepts that will be evaluated while using the simulator. The developer is not actively interacting with the simulator during run-time. They interact with it by proxy through whatever CET concept they have designed. For them, the simulator has to offer a way of retrieving data about the currently simulated traffic situation. The data have to be relayed to their concept device in real time. Furthermore, developers want to be free in their choice of the user interface. Therefore, the input collection for the simulator cannot exceed a cyclist’s interactions with a regular bicycle. It must be discrete and have no intrusive sensor assemblies to collect user input. 3.3. Simulation Context Traffic simulations can be notoriously complex, especially in a city [51]. At any given time, there can be various road users in a multitude of vehicles. They all move individually with different velocities, directions, and trajectories that are hard to predict. All road users must also react to each other, adhere to traffic regulations, and avoid collisions if possible. In addition, there is a myriad of environments with different road and weather conditions that influence and define traffic situations. A simulation of such an intricate system is consequently just as complex. Any traffic situation offers many sensory inputs, especially for cyclists, as they do not have a vehicle exterior around them to protect them. Figure 3 visualizes the sensory input channels and their importance to the cyclists. The visual and auditory senses are the most occupied by traffic, as indicated by the arrows’ strength. Cyclists use their visual sense to recognize vehicles, pedestrians, or other important objects to estimate other road users’ distances and speeds, identify and interpret traffic signs, and analyze the road trajectory in front of them. The auditory sense is used to identify road users that are not yet visible, to estimate the distance to and direction of other vehicles, to register danger in, e.g., the form of car horns, or to determine human speech by either analyzing its content for information and danger clues or by identifying the position and distance to it, to avoid collisions with pedestrians. The tactile sense can help a cyclist assess the state and safety of the road and weather conditions or estimate the distance to surrounding vehicles by interpreting their air gusts. Lastly, cyclists can also use their olfactory and gustatory senses to identify cars through their exhaust fumes or a gasoline smell. By looking at these examples, it is clear that the visual and auditory senses are the most important for a cyclist and the most important in accident prevention, as they allow cyclists to react and move out of the way before another vehicle is close enough to make contact. The olfactory, gustatory, and tactile channels also get stimulated in traffic but are mainly based on close proximity to a source. The proximity makes them less important for accident prevention. Since accident prevention is the experiment’s focus, a simulator must provide a good visual and auditory representation of traffic to ensure that the simulation is close enough to reality. 3.4. User Requirements The analysis of the different user groups leads to the list of requirements seen in Table 1. For cyclists, the system must be safe, intuitive, and realistic. Supervisors want the simulations to be repeatable and modifiable in a quick manner. Developers want the user input collection to be discrete and non-intrusive. They also require an interface to collect real-time data on the currently simulated traffic situation. 4. Concept Design This section describes the design decision of the third stage in the UCD cycle. Thus, it documents the possible designs and the design decisions. 4.1. System Choice Three possible solutions to simulate traffic situations were identified. Prop Simulation: Practical props, such as a person moving a cardboard device, are used as a truck while the cyclist rides a real bicycle. Video Simulation: Recorded videos of specific traffic situations are used to display the situation on a screen while the cyclist is placed on a stationary bike. Computer Simulation: Computer simulations, such as a video game, are used to bring interactive footage to a screen. The stationary bike is modified so that it can be used as an input device for the program. Table 2 brings these options in juxtaposition with each other so that, with the attributes visual realism, auditory realism, interactivity, simplicity, and repeatability, a decision matrix is created. Based on the decision matrix, computer simulations promise to be the most true-to-life experience for cyclists due to suitable sounds and visuals and the ability to interact and move away from dangerous trucks. Therefore, this design decision is followed. However, the time required to implement such a simulator from scratch will be tremendous. By combining available projects, the implementation time can be reduced. One project, found after online research, turns a bicycle into a gamepad controller with low effort [53]. The bicycle gamepad controller will lead to realistic traffic simulation combined with conventional video games, such as GTA and Truck Simulator. If the design decision of the computer simulation cannot be implemented, the video simulation design might be considered as fallback. 4.2. Input Device The cyclist’s input must be captured and transferred into the game to achieve intractability. A simple solution for that is to use a regular gamepad controller. This solution is discarded, as it does not offer a realistic cycling interaction. Instead, the goal is to use a bicycle with which the subject can interact. The inputs will then be transformed into controller signals through various sensors. These sensors have to capture the steering angle of the handlebar, the speed of the tires or paddles, and the braking force. A limited number of similar projects have already tried to achieve that [53,54,55]. Table A1 compares the inputs captured by these projects. Based on this comparison, the input device should be able to capture all inputs with a level from 0% to 100%. The steering will be captured from −100% to 100%. Figure A1 shows the hardware architecture for the input device. The architecture includes two potentiometers to translate the steering angle of the handlebar as well as the braking strength into electrical signals and a magnetic sensor for capturing the wheel’s speed. All sensors are wired to an Arduino Pro Micro microcontroller board that captures the electrical input signals and translates them into gamepad controller signals for the computer. Through a special firmware modification [56], the Arduino can be modified to behave like a regular X-Box gamepad. Thus, native support in any game is ensured. 5. Implementation As the implementation follows the UCD cycle, this section describes the implementation of the third stage. Before explaining the implementation during this iteration, the pros and cons of using GTA V are discussed briefly. Note that all detailed technical information, images, readme files, and the source code can be found in the file archive at https://www.hs-osnabrueck.de/prof-dr-julius-schoening/sim2ride (accessed on 7 February 2023). The simulator that was created to test the prototypes of the two CET to enhance the safety of a cyclist in traffic uses the video game GTA V to simulate the traffic area. Using GTA V has several advantages, such as the following: • GTA V already has an immersive traffic system with various road users and vehicles. Thus, no implementation work of a realistic traffic simulation is necessary. • GTA V also provides the environment with realistic 3D assets, textures, animations, and weather effects, which makes the simulator realistic. • GTA V comes with a built-in physics system that handles collisions of vehicles realistically enough not to require additional implementation work, again lowering the cost and creation time of the simulator. • GTA V has an active modding community, which has identified different ways to change the game’s logic, which means that there might already be a mod that can help run an experiment or serve as inspiration for the experiment code, simplifying the implementation work. • GTA V provides various input devices to be connected to the game. They all act as a controller with the original controls, allowing for more realistic input devices, such as modified bicycle handlebars. • GTA V is a popular game, and while the city it takes place in is fictional, it is primarily inspired by American cities, invoking a sense of familiarity in players. Of course, it should be noted that the presented approach has its limitations, such as the following: • GTA V does not consider the legal road rules, which differ in many countries. • GTA V has, relative to real life, limited interactions between traffic vehicles, pedestrians, and the environment. • GTA V does not provide fine-grained operation of the bike. In contrast to the car simulation, the bike simulation is very simplified. • GTA V’s storylines can be disturbing because some parts cannot be skipped by modding the game. Considering the advantages and disadvantages, using GTA V as a base enables a low-cost simulator with high visual and auditory realism. This high degree of realism is especially important for the use-case of traffic safety simulation. 5.1. Simulator A short feasibility study revealed that GTA V is capable of simulating bicycle riding. A program called Script Hook V allows one to extend the game with custom scripts. Through the library, a script can access over 5000 native in-game functions [57]. Such a script is developed to implement the simulator. The entire architecture can be seen in Figure 4. The mod script runs inside the GTA V game engine. It offers an interface to quickly set up different traffic situations using function keys on a keyboard. For the data interface, the mod detects all trucks in a certain radius around the player and captures an agreed-upon set of parameters; see Figure A2. The result is a list of trucks that has to be relayed to the developers. Providing the list of trucks to the developers turned out to be difficult, as GTA V scripts are not allowed to access the file system or any kind of communication utility of the underlying windows operating system. The only way the mod can communicate is through the game utilities. These utilities, for example, allow drawing objects on the screen. Consequently, a routine is developed that translates each entry in the truck list into a barcode that is then drawn to a corner of the screen. The whole process is explained in Figure A3. This solution faces another limitation of the game. A script can draw a maximum of 300 bars per frame to the screen. A serialized truck translates to 168 bars, meaning the list must be transmitted over multiple frames. Transmitted the truck list over several frames leads to a delay in truck list transmission, e.g., if the frame rate is 24 fps and there are 10 trucks in the list, it takes just below half a second to transmit the complete list. This fact does not meet the real-time requirement of providing the truck list. The implementation also requires the developers’ external code to be fast, as any missed frame translates to a missed truck. 5.2. Input Device According to the design concept, a bicycle on a stand is turned into a gamepad controller for a PC running GTA V. The device consists of three sensors, a microcontroller, and various custom-designed 3D printed mounts. Figure 5 shows the mounted steering and braking sensors. An overview of all custom hardware components of the input device is given in Figure A4, and the circuit diagram can be seen in Figure A6. The 3D files for the printed components can also be found in the aforementioned file archive. The Arduino is also equipped with a small screen and a button for setting the simulator up. This button and the display allow the supervisor to calibrate the steering sensor. This specialized supervisor interface is hidden by a cover so that it does not disturb the cyclist during an active simulation. All the hardware attached is designed to be discrete and mostly hidden from the cyclist’s point of view, as seen in Figure A5. The Arduino can capture every input with more than 200 discrete steps precision. However, another limitation of GTA V is that the game reduces the input to bicycle steering from −100% to +100% to just five steps. This simplification makes precise steering with an actual handlebar impossible. Thus, a special routine in the firmware is developed to mitigate this problem. The program pulses the input signals to once again turn 5 steps into a range of 200 steps. This solution can sometimes cause camera shakes in the game as a side effect. The speed signal has a similar issue, as the game uses two buttons for normal and extreme speed. However, speed is not the simulation’s focus, so the input is reduced to three steps. The braking input does not require any modification. It is important to note that GTA V features continuous input translation for any vehicle other than the bicycle. The game’s input configuration can also not change bicycle inputs. 5.3. Full Setup The complete simulator can be seen in Figure 6. It consists of the modified stationary bicycle as the gamepad connected to a PC running GTA V. The table in the back with a keyboard on it allows the supervisor to control the simulation. The primary monitor in front of the bicycle displays the front view for the cyclists and also outputs the game’s sounds. The secondary monitor in the back is supposed to be a rear-view display. However, GTA V can only render a single camera. For this reason, both screens show the same view, and the supervisor has to manually trigger the rear view through the keyboard whenever the cyclist turns his head around. 6. Evaluation This section describes step four of the UCD cycle, the evaluation. Through a user survey, the current state of the developed simulator is compared to the user requirements. Additionally, the UCD steps one and two are repeated by defining requirements for the next version of the simulator. 6.1. User Survey The simulator is evaluated in combination with the user survey for the CET concept. The cyclist is placed on the simulator and gets five minutes to get used to the riding experience. This warm-up is followed by a few more minutes with the CET concepts. After riding the simulator, the subject is given a questionnaire for the CET concept tested and a second questionnaire for evaluating the simulator. The simulator questionnaire can be seen in the aforementioned file archive. In total, six subjects were questioned. Feedback was collected based on German questionnaires. The questionnaire consists of a couple of general questions about the subjects. All subjects were between 23 and 37 with a median age of 26.8. The questionnaire then continues with several statements about the simulator that the subject can agree or disagree with. The accumulated result can be seen in Table 3. According to this table, understanding and using the system was easy for the majority of the users. However, some of them had issues with the system, which also reduced their perceived realism. Further comments on the questionnaire gave different explanations for this. These are summarized in the following list: • Missing input precision. - The maximum cycle speed should be faster [2 subjects]. - More granularity in the speed input [2 subjects]. - Steering not sensitive enough [1 subject]. • Lack of ability to shift weight in curves leading to dizziness [1 subject]. • Disposition due to low resolution, possibly due to low FPS [1 subject]. • Concerns about the structural integrity of the bicycle stand [1 subject]. • Wish for different cycling modes, e.g., e-bikes and e-scooters [1 subject]. Additionally, subjects were asked to evaluate the simulator based on 13 opposing adjectives. The results can be seen in Table A2. These results reinforce the impression that most subjects found the simulator easy to understand and use. The majority also found the system to be interesting and innovative. It is also clear from the questionnaire that some users found the simulator to be more of a problem than support and more complicated than simple. This result is possible because the realism of the inputs is not satisfactory yet. 6.2. Requirements Check The user requirements defined in Section 3.4 are checked against the system’s current state as seen in Table 1. The user survey shows that the simulator feels safe and easy to learn and use for most users. The input realism turned out to be an issue. Therefore, the input realism is added to the list of requirements and is not yet fully satisfied. The simulation is currently highly repeatable and modifiable for supervisors through a few keyboard strokes. It is also discrete and does not interfere with the user interfaces of other projects, as accentuated by Figure A5. An issue for external developers is the data interface, which is currently strongly coupled to the game frame rate and limited to transmitting information about a single truck per frame. This limited throughput leads to delays and makes it too slow to be a real-time interface. 7. Cognitive Enhancement Technologies Concepts for Safe Rides Two early-stage CET concepts were piloted and tested using the simulator to allow cyclists to sense dangerous traffic situations. For the evaluation, a specific test track was established. This track seen in Figure 7 was chosen because a particularly large number of trucks appear on this section of the road. It was also decided to use a route that is as straight as possible for the first tests to reduce the more challenging condition of driving around curves. On this stretch of road, the subject was meant to drive on the right side. Motor vehicles, therefore, always pass on the left-hand side. In the case of the tactile dictionary, this resulted in a one-sided use of the vibration signals on the left handle. The block-shaped visualization also favored the left-hand side. All test subjects were aware of this in advance to avoid confusion. The test drive was terminated as soon as ten trucks passed the test person. 7.1. Tactile Dictionary on the Handlebar The subject receives feedback from the bicycle handlebar for the tactile dictionary. Therefore, four vibration motors and a beeper for generating sounds are installed on the handlebar. Vibration motors serve as a warning and the beeper as an alarm. Each end of the handlebar has two vibration motors to encode the general direction of the approaching vehicle and the distance from the cyclist. If a truck comes from the left side, only the left handlebar grip vibrates, and vice versa. A slight vibration begins when the truck is 80 m away and increases at 40 m. In addition to encoding the distance, these vibrations inform the user of an approaching truck as gently as possible. At a distance of 20 m, the beeper generates a sound to alarm the cyclist of a dangerous situation. At this point, the subject should already be aware of the approaching truck due to the vibration and thus not be startled by the alarm signal. 7.2. Visual Block-Shaped Dictionary Figure 8 shows the block-shaped visualization in the simulator setup. The subject sees the traffic simulation on the screen in the direction of travel. With the goal of a realistic simulation, a fan is located underneath the screen to simulate airflow while driving. The CET device is a smartphone connected to the bicycle. On the CET device, information about the distance of the nearest truck is encoded in colored columns. The height of the columns corresponds to the distance between the vehicle and the cyclist. A truck on the left of the cyclist fills the left column, and a truck on the right fills the right column. Trucks approaching from the front are ignored, as the user’s field of vision covers this area. Parked trucks are also ignored. The block-shaped dictionary starts to display at a distance of 80 m from the truck and increases linearly to 0 m. The value of 80 m was determined to be appropriate for the test track and with the maximum speed of the bicycle during the initial self-tests. For a different test scenario, this value can be adjusted with little effort. The speed of bicycles and motor vehicles greatly influences the appropriate detection distance. An alternative form of information for the visual dictionary could have been to display the arrival time of the next truck. However, since estimating the truck’s speed and the time until impact is a critical part of the users’ decision of when to react, the distance must remain the only information. Otherwise, a reliable estimate of the speed by the user would no longer be possible. 7.3. Preliminary Results The feedback from the four subjects while piloting the two early-stage CET concepts to enable cyclists to sense dangerous traffic situations is quite promising. The subjects preferred the tactile dictionary since they did not need to look down at the handlebars to obtain the information. Instead, they could feel vehicles approaching from behind while keeping their other senses focused on the driving task. However, a subject stated that vibrations might be hard to recognize on a ride over cobblestones. In the subjects’ opinion, the block-shaped dictionary was prominent in the field of vision. The subjects tended to be contentious, looking at the display and not focusing on the scene. During the testing of the CET concepts, balance problems were noticed that could arise due to the fixed-installed bicycle of the simulator. Because only the rear tire rotates, the gyroscopic forces are significantly reduced. Despite the bicycle’s stable stand, it reacts differently to pedaling movements in the experimental setup than a moving bicycle would on the road. Furthermore, the stationary front wheel makes steering movements very smooth and takes some getting used to. In addition, it is impossible to lean into curves with the experimental setup. The aspects mentioned above and the additional noticeable delay between real and virtual steering movements make it challenging to do a curve in some situations. 8. Conclusions The development of advanced computer simulation for traffic areas is very time consuming. While GTA V is a great tool to simulate complex traffic situations in a way that feels realistic to the user, developing mod scripts for the game is particularly complicated due to a lack of documentation. Furthermore, the scripting environment and the game’s limitations on inputs and outputs require a lot of extra integration work. Nonetheless, the developed system allows for a safe simulation of dangerous traffic situations. It is suitable for the context of evaluating CET, as shown by the two CET mentioned, and is easy to set up within two days using the provided aforementioned file archive. 8.1. Further Works The evaluation highlighted that the simulator has multiple weak points and does not fully satisfy all user requirements. To fix the current issues, satisfy all of the user requirements, and create an even more realistic simulation, another full iteration of the UCD cycle needs to be completed. Section 6.2 sets the foundation for that by expanding the user requirements list. As input realism is currently the main reason for cyclist dissatisfaction, improving it should be the main focus. This can be done through more elaborate algorithm tuning in the input device firmware. An alternative way would be to overwrite the game’s default input translation from inside the mod script. Script Hook V offers native functions to do that. Another alternative would be to replace the input device with a smart bike trainer and integrate this with the game through the “GT Bike V” mod [48]. The real-time data interface also requires reworking. Expanding the transmission rate by using multicolored bar codes might be an option. This would allow the use of 16,581,375 different RGB values per bar and, therefore, massively increase the throughput per frame. 8.2. Limitations To create an entirely realistic road simulator, an important factor is the legal road rules, which GTA V as a system does not fulfill. Such traffic laws differ worldwide, meaning that the localization of such a simulator would also be integral. However, in the context of CET, the legality of traffic rules might not be such an important factor as long as the subject experiences the traffic as realistic enough to be immersive. It is possible to create test scenarios, as shown with the exemplary CET, that only need basic traffic behavior, such as stopping at red lights, to allow for an evaluation of this technology. This is where the simulator shines in its current form. Still, because of this traffic-law limit, the GTA V-based simulator is unsuitable as a testing system for all kinds of traffic-oriented technology. 8.3. Impact on the Society As we mentioned in the Introduction, accidents involving cyclists are still a big problem worldwide. Developing bicycle infrastructure, especially in many EU countries, undoubtedly reduces the number of road accidents involving cyclists. However, as the cycling infrastructure develops, it is crucial also to improve the quality of technology for cyclists. Continuous research on optimal parameters for bicycle helmets and equipping them with solutions, such as airbags [58], is one option, but legislative changes to grant cyclists more rights also contribute to greater cyclist safety. The automotive industry already places great emphasis on the use of IT applications and numerous sensors to ensure safety, e.g., parking sensors, distance sensors about the vehicle ahead, and overtaking information systems. However, the use of analogous systems in the bicycle industry is still a novelty. Therefore, we express the conviction that the development of technology, which both affects and enhances our cognitive abilities, will also ensure greater safety on the road. Nevertheless, it should be noted that the impact of these technologies on attention is unknown, and it can be both stimulating and overly involved. Therefore, it is important to carry out numerous tests under controlled and safe conditions, using simulators at various stages of their development. Author Contributions Conceptualization, J.S.; Methodology, J.S. and A.G.; Software, J.K.; Formal analysis, A.G.; Writing—original draft Section 1 and Section 3 to Section 6, J.K.; Writing—original draft Section 2, Section 7 and Section 8, J.S., M.I.J. and A.G.; Writing—review & editing, J.S. and M.I.J.; Supervision, J.S. All authors have read and agreed to the published version of the manuscript. Funding This research was funded by German Academic Exchange Service (DAAD) no. 57602711 and the Polish National Agency for Academic Exchange (NAWA) no. PSP:K/PBI/000170 grant for Project-Related Personal Exchange (PPP). In addition, the APC was partially funded by the Open Access Publishing Fund of Osnabrück University of Applied Sciences. Institutional Review Board Statement The pilot study was conducted following the Declaration of Helsinki. Informed Consent Statement Informed consent was obtained from all subjects involved in the study. Data Availability Statement Source code and additional information are contained within the article or can be found in the file archive at https://www.hs-osnabrueck.de/prof-dr-julius-schoening/sim2ride (accessed on 7 February 2023). Conflicts of Interest The authors declare no conflict of interest. Appendix A Table A1. Input capturing capabilities of existing solutions for bicycle-based input devices. Table A1. Input capturing capabilities of existing solutions for bicycle-based input devices. InputExample 1 [54]Example 2 [55]Example 3 [53] Speedyesyesyes Brakingnonoyes (0 to 100%) Steeringyes (left,right)yes (left,right)yes (−100 to +100%) Figure A1. Architecture of the input device. Figure A1. Architecture of the input device. Sensors 23 03672 g0a1 Figure A2. Truck parameters calculated by the mod script. Figure A2. Truck parameters calculated by the mod script. Sensors 23 03672 g0a2 Figure A3. Data transmission from the simulator to external software components through barcodes on the screen. Figure A3. Data transmission from the simulator to external software components through barcodes on the screen. Sensors 23 03672 g0a3 Figure A4. Overview of the controller components. Figure A4. Overview of the controller components. Sensors 23 03672 g0a4 Figure A5. Cyclist’s point of view with the installed sensors and the hidden control box. Figure A5. Cyclist’s point of view with the installed sensors and the hidden control box. Sensors 23 03672 g0a5 Table A2. Result of simulator rating by opposite adjectives as a seven-point scale from one opposite adjective to another.; the background color indicates the number of answers, from white—no answer -to dark blue—five answers. Table A2. Result of simulator rating by opposite adjectives as a seven-point scale from one opposite adjective to another.; the background color indicates the number of answers, from white—no answer -to dark blue—five answers. incomprehensible 114understandable creative23 1 uncreative easy to learn41 1 hard to learn boring 1131exiting uninteresting 1 13interesting original23 1 conventional hindering 113 1supporting good321 bad complicated 2 22simple inefficient 21 3efficient conservative 1 32innovative clear3211 confusing clean3111 overloaded Figure A6. Circuit diagram of the input device—the gamepad controller. Figure A6. Circuit diagram of the input device—the gamepad controller. Sensors 23 03672 g0a6 References 1. Maslow, A.H. A theory of human motivation. Psychol. Rev. 1943, 50, 370–396. [Google Scholar] [CrossRef][Green Version] 2. Karpman, M.; Zuckerman, S.; Gonzalez, D. The Well-Being and Basic Needs Survey; Urban Institute: Washington, DC, USA, 2018. [Google Scholar] 3. Stats, P. Wypadki Drogowe—Raporty Roczne. Available online: https://statystyka.policja.pl/st/ruch-drogowy/76562,wypadki-drogowe-raporty-roczne.html (accessed on 7 February 2023). 4. Clune, D. Parliamentary Question: Minimum Lateral Clearance Distance When Passing Cyclists: E-002358/2017: European Parliament. Available online: https://www.europarl.europa.eu/doceo/document/E-8-2017-002358_EN.html?redirect (accessed on 7 February 2023). 5. Schöning, J.; Heidemann, G. Interactive 3D Modeling—A Survey-based Perspective on Interactive 3D Reconstruction. In Proceedings of the International Conference on Pattern Recognition Applications and Methods, Lisbon, Portugal, SCITEPRESS—Science and Technology Publications, Setúbal, Portugal, 10–12 January 2015. [Google Scholar] [CrossRef] 6. Robinson, J. Gut Reactions: A Perceptual Theory of Emotion. Br. J. Aesthet. 2006, 46, 206–208. [Google Scholar] [CrossRef] 7. Sandberg, A.; Bostrom, N. Converging Cognitive Enhancements. Ann. N. Y. Acad. Sci. 2006, 1093, 201–227. [Google Scholar] [CrossRef][Green Version] 8. Kipke, R. What Is Cognitive Enhancement and Is It Justified to Point Out This Kind of Enhancement Within the Ethical Discussion? In Trends in Augmentation of Human Performance; Springer: Amsterdam, The Netherlands, 2013; pp. 145–157. [Google Scholar] [CrossRef] 9. Dubljević, V.; Venero, C.; Knafo, S. What is Cognitive Enhancement? In Cognitive Enhancement; Elsevier: Amsterdam, The Netherlands, 2015; pp. 1–9. [Google Scholar] [CrossRef] 10. Kutt, K.; Gunia, A.; Nalepa, G.J. Cognitive enhancement: How to increase chance of survival in the jungle? In Proceedings of the 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), Gdynia, Poland, 24–26 June 2015. [Google Scholar] [CrossRef] 11. Bostrom, N.; Sandberg, A. Cognitive Enhancement: Methods, Ethics, Regulatory Challenges. Sci. Eng. Ethics 2009, 15, 311–341. [Google Scholar] [CrossRef] [PubMed][Green Version] 12. Dresler, M.; Sandberg, A.; Bublitz, C.; Ohla, K.; Trenado, C.; Mroczko-Wąsowicz, A.; Kühn, S.; Repantis, D. Hacking the Brain: Dimensions of Cognitive Enhancement. ACS Chem. Neurosci. 2018, 10, 1137–1148. [Google Scholar] [CrossRef][Green Version] 13. Gunia, A.; Indurkhya, B. A Prototype to Study Cognitive and Aesthetic Aspects of Mixed Reality Technologies. In Proceedings of the 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, UK, 21–23 June 2017. [Google Scholar] [CrossRef] 14. Ervas, F.; Gunia, A.; Lorini, G.; Stojanov, G.; Indurkhya, B. Fostering Safe Behaviors via Metaphor-Based Nudging Technologies; Lecture Notes in Computer Science; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 53–63. [Google Scholar] [CrossRef] 15. Long, Q.; Hu, N.; Li, H.; Zhang, Y.; Yuan, J.; Chen, A. Suggestion of cognitive enhancement improves emotion regulation. Emotion 2020, 20, 866–873. [Google Scholar] [CrossRef] 16. Schöning, J.; Berkemeyer, S. Eyetracking Nutritional Behaviour and Choices. In Communications in Computer and Information Science; Springer Nature: Cham, Switzerland, 2022; pp. 17–31. [Google Scholar] [CrossRef] 17. Błażejowska, G.; Gruba, Ł.; Indurkhya, B.; Gunia, A. A Study on the Role of Affective Feedback in Robot-Assisted Learning. Sensors 2023, 23, 1181. [Google Scholar] [CrossRef] 18. Wang, S.; Zargar, S.A.; Xu, C.; Yuan, F.G. An Efficient Augmented Reality (AR) System for Enhanced Visual Inspection. In Proceedings of the Structural Health Monitoring 2019, St. Louis, MS, USA, 2–4 August 2019; DEStech Publications, Inc.: Lancaster, PA, USA, 2019. [Google Scholar] [CrossRef] 19. Escobedo, L.; Tentori, M.; Quintana, E.; Favela, J.; Garcia-Rosas, D. Using Augmented Reality to Help Children with Autism Stay Focused. IEEE Pervasive Comput. 2014, 13, 38–46. [Google Scholar] [CrossRef] 20. Wang, Y.J.; Chen, P.J.; Liang, X.; Lin, Y.H. Augmented reality with image registration, vision correction and sunlight readability via liquid crystal devices. Sci. Rep. 2017, 7, 433. [Google Scholar] [CrossRef][Green Version] 21. Ho, E.; Boffa, J.; Palanker, D. Performance of complex visual tasks using simulated prosthetic vision via augmented-reality glasses. J. Vis. 2019, 19, 22. [Google Scholar] [CrossRef][Green Version] 22. Chang, K.E.; Zhang, J.; Huang, Y.S.; Liu, T.C.; Sung, Y.T. Applying augmented reality in physical education on motor skills learning. Interact. Learn. Environ. 2019, 28, 685–697. [Google Scholar] [CrossRef] 23. Rouzier, B.; Murakami, T. Hazard detection and cognition for an active driving assistance. In Proceedings of the 2016 IEEE 14th International Workshop on Advanced Motion Control (AMC), Auckland, New Zealand, 22–24 April 2016. [Google Scholar] [CrossRef] 24. Gürbüz, H.; Buyruk, S. Improvement of safe stopping distance and accident risk coefficient based on active driver sight field on real road conditions. IET Intell. Transp. Syst. 2019, 13, 1843–1850. [Google Scholar] [CrossRef] 25. Park, B.J.; Lee, J.W.; Yoon, C.; Kim, K.H. Augmented reality and representation in vehicle for safe driving at night. In Proceedings of the 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 28–30 October 2015. [Google Scholar] [CrossRef] 26. Abdi, L.; Meddeb, A.; Abdallah, F.B. Augmented Reality Based Traffic Sign Recognition for Improved Driving Safety; Lecture Notes in Computer Science; Springer International Publishing: Berlin/Heidelberg, Germany, 2015; pp. 94–102. [Google Scholar] [CrossRef] 27. Von Sawitzky, T.; Wintersberger, P.; Löcken, A.; Frison, A.K.; Riener, A. Augmentation Concepts with HUDs for Cyclists to Improve Road Safety in Shared Spaces. In Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA, 25–30 April 2020; ACM: New York, NY, USA, 2020. [Google Scholar] [CrossRef] 28. Pichen, J.; Yan, F.; Baumann, M. Towards a Cooperative Driver-Vehicle Interface: Enhancing Drivers’ Perception of Cyclists through Augmented Reality. In Proceedings of the 2020 IEEE Intelligent Vehicles Symposium (IV), Las Vegas, NV, USA, 19 October–13 November 2020. [Google Scholar] [CrossRef] 29. Wallinheimo, A.S.; Hosein, A.; Barrie, D.; Chernyavskiy, A.; Agafonova, I.; Williams, P. How Online Gaming Could Enhance Your Career Prospects. Simul. Gaming 2022, 54, 28–44. [Google Scholar] [CrossRef] 30. ISO 9241-210; DIN EN ISO 9241-210:2019 Ergonomics of Human-System Interaction— Part 210: Human-Centred Design for Interactive Systems. ISO: Geneva, Switzerland, 2019. 31. McGarr, O. The use of virtual simulations in teacher education to develop pre-service teachers’ behaviour and classroom management skills: Implications for reflective practice. J. Educ. Teach. 2020, 46, 159–169. [Google Scholar] [CrossRef] 32. Lane, B.; Havens-Hafer, C. Teaching the Teachers with Immersive Technology: Preparing the Next Generation of Educators at Ithaca College. In Immersive Education; Springer International Publishing: Berlin/Heidelberg, Germany, 2022; pp. 153–170. [Google Scholar] [CrossRef] 33. Rospigliosi, P. Metaverse or Simulacra? Roblox, Minecraft, Meta and the turn to virtual reality for education, socialisation and work. Interact. Learn. Environ. 2022, 30, 1–3. [Google Scholar] [CrossRef] 34. Austria, J.A. Traslacion@ Roblox: The Pandemic and The Emergence of A Virtual Black Nazarene Sacred Space. In Proceedings of the 14th DLSU Arts Congress Proceedings: “Pandemic, Resilience, and the Arts”, Manila, Philippines, 11–12 March 2021; De La Salle University Manila: Manila, Philippines, 2021; pp. 1–12. [Google Scholar] 35. Aluru, K.C.; Tellex, S.; Oberlin, J.; MacGlashan, J. Minecraft as an experimental world for AI in robotics. In Proceedings of the 2015 AAAI Fall Symposium Series, Arlington, VA, USA, 12–14 November 2015. [Google Scholar] 36. García-Fernández, J.; Mateus, L. Solution supporting the communication of the built heritage: Semi-automatic production path to transfer semantic LIDAR data to minecraft environment. Digit. Appl. Archaeol. Cult. Herit. 2019, 14, e00112. [Google Scholar] [CrossRef] 37. Cipollone, M.; Schifter, C.C.; Moffat, R.A. Minecraft as a Creative Tool. Int. J. Game-Based Learn. 2014, 4, 1–14. [Google Scholar] [CrossRef][Green Version] 38. Engelbrecht, H.A.; Schiele, G. Koekepan: Minecraft as a research platform. In Proceedings of the 2013 12th Annual Workshop on Network and Systems Support for Games (NetGames), Denver, CO, USA, 9–10 December 2013; pp. 1–3. [Google Scholar] [CrossRef] 39. Kale, M.; Bedekar, M. Driver Profiling Using Realistic Racing Games. In Proceedings of the 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, 20–21 April 2018. [Google Scholar] [CrossRef] 40. Fischer, P.; Kubitzki, J.; Guter, S.; Frey, D. Virtual driving and risk taking: Do racing games increase risk-taking cognitions, affect, and behaviors? J. Exp. Psychol. Appl. 2007, 13, 22–31. [Google Scholar] [CrossRef][Green Version] 41. Schatten, M.; Ðuric, B.O.; Tomičić, I. Towards simulation of ambient intelligence in autonomous vehicles using car racing games. In Proceedings of the Central European Conference on Information and Intelligent Systems, Varaždin, Croatia, 2–4 October 2019; pp. 3–6. [Google Scholar] 42. Notomista, G.; Wang, M.; Schwager, M.; Egerstedt, M. Enhancing Game-Theoretic Autonomous Car Racing Using Control Barrier Functions. In Proceedings of the 2020 IEEE International Conference on Robotics and Automation (ICRA), Paris, France, 31 May–31 August 2020. [Google Scholar] [CrossRef] 43. Meftah, L.H.; Braham, R. A virtual simulation environment using deep learning for autonomous vehicles obstacle avoidance. In Proceedings of the 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, 9–10 November 2020. [Google Scholar] [CrossRef] 44. Cirqueira, J.N.; Mesquita, P.C.; Novaes, R.R., Jr.; Dias, S.R. A Multi-Agent Approach to Simulate Autonomous Traffic with Games: How to Transform GTA-SA/SA-MP in Your Simulation Platform. In Proceedings of the Central European Conference on Information and Intelligent Systems, Varaždin, Croatia, 29 August–8 September 2020; pp. 3–6. [Google Scholar] 45. Martinez, M.; Sitawarin, C.; Finch, K.; Meincke, L.; Yablonski, A.; Kornhauser, A. Beyond Grand Theft Auto V for Training, Testing and Enhancing Deep Learning in Self Driving Cars. arXiv 2017, arXiv:1712.01397. [Google Scholar] [CrossRef] 46. Wang, D.; Devin, C.; Cai, Q.Z.; Krahenbuhl, P.; Darrell, T. Monocular Plan View Networks for Autonomous Driving. In Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), The Venetian Macao, Macau, China, 3–8 November 2019. [Google Scholar] [CrossRef][Green Version] 47. Goss, Q.; Crump, L.; Akbas, M.I. SUMO Traffic Simulator Interface for Scenic; Embry–Riddle Aeronautical University: Daytona Beach, FL, USA, 2022. [Google Scholar] 48. Matas, N. Welcome to GT Bike V. Available online: https://www.gtbikev.com/ (accessed on 7 February 2023). 49. Walther, B.K. Using Ludo-Narrative Dissonance in Grand Theft Auto IV as Pedagogical Tool for Ethical Analysis; Lecture Notes in Computer Science; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 3–12. [Google Scholar] [CrossRef] 50. Vaezipour, A.; Rakotonirainy, A.; Haworth, N.; Delhomme, P. Enhancing eco-safe driving behaviour through the use of in-vehicle human-machine interface: A qualitative study. Transp. Res. Part A Policy Pract. 2017, 100, 247–263. [Google Scholar] [CrossRef] 51. Bengler, K.; Drüke, J.; Hoffmann, S.; Manstetten, D.; Neukum, A. (Eds.) UR:BAN Human Factors in Traffic; Springer Fachmedien Wiesbaden: Berlin/Heidelberg, Germany, 2018. [Google Scholar] [CrossRef] 52. Dahm, M. Grundlagen der Mensch-Computer-Interaktion; Pearson Deutschland GmbH: Berlin, Germany, 2005. [Google Scholar] 53. Tazling. Available online: https://create.arduino.cc/projecthub/Tazling/usbcycle-ride-through-your-virtual-world-8ff961 (accessed on 7 February 2023). 54. luxlike. Super Diet Racing Game Sim. Available online: https://create.arduino.cc/projecthub/luxlike/super-diet-racing-game-bike-aad7f2 (accessed on 7 February 2023). 55. Smith, M.L.; Desnoyers-Stewart, J. Riding Through Walls: A journey of physical computing through Google Street View. In Proceedings of the Electronic Workshops in Computing, London, UK, 6 July 2019; BCS Learning & Development: London, UK, 2019. [Google Scholar] [CrossRef][Green Version] 56. Madison, D.; Ryseghem, B.V. Arduino XInput Library. Available online: https://github.com/dmadison/ArduinoXInput (accessed on 7 February 2023). 57. Blade, A. Script Hook V Native Database. Available online: http://www.dev-c.com/nativedb/ (accessed on 7 February 2023). 58. Tse, K.M.; Holder, D. A biomechanical evaluation of a novel airbag bicycle helmet concept for traumatic brain injury mitigation. Bioengineering 2021, 8, 173. [Google Scholar] [CrossRef] [PubMed] Figure 1. User-centered design (UCD) cycle, cf. [30,50]. Figure 1. User-centered design (UCD) cycle, cf. [30,50]. Sensors 23 03672 g001 Figure 2. User groups and their interaction with the simulator. Figure 2. User groups and their interaction with the simulator. Sensors 23 03672 g002 Figure 3. Complexity of a traffic situation and a user’s ability to precept it, cf. [52]. Figure 3. Complexity of a traffic situation and a user’s ability to precept it, cf. [52]. Sensors 23 03672 g003 Figure 4. The simulator’s architecture; in blue, the contribution of this work where parts combined and implemented to match the requirements. Figure 4. The simulator’s architecture; in blue, the contribution of this work where parts combined and implemented to match the requirements. Sensors 23 03672 g004 Figure 5. Sensors mounted to (a) the head tube and (b) the brake lever. Figure 5. Sensors mounted to (a) the head tube and (b) the brake lever. Sensors 23 03672 g005 Figure 6. Overview of the full simulator setup. Figure 6. Overview of the full simulator setup. Sensors 23 03672 g006 Figure 7. Test track selected for the first evaluation of both CET concepts for safe rides. Figure 7. Test track selected for the first evaluation of both CET concepts for safe rides. Sensors 23 03672 g007 Figure 8. Block-shaped visualization of a truck from left behind from the subject view. Figure 8. Block-shaped visualization of a truck from left behind from the subject view. Sensors 23 03672 g008 Table 1. List of requirements for the simulator; check boxes indicate the current state—orange check boxes indicate that the users give feedback for improvements that are not implemented yet. Table 1. List of requirements for the simulator; check boxes indicate the current state—orange check boxes indicate that the users give feedback for improvements that are not implemented yet. CyclistSupervisor/Developer ● Safe🗹● Repeatable🗹 ● Intuitive🗹● Modifiable🗹 ●Realism● Discrete🗹  ● Visual Realism🗹● Real-Time Data Interface🗹  ● Auditory Realism🗹  ● Input Realism🗹 Table 2. Decision matrix of the simulator, documenting significant design decisions. Table 2. Decision matrix of the simulator, documenting significant design decisions. Prop SimulationVideo PlaybackComputer Simulation Visual Realism++ Auditory Realism++ Interactivity++ Simplicity++ Repeatability++ Table 3. Result of the user survey of the simulator; the background color indicates the number of answers, from white—no answer -to dark blue—five answers. Table 3. Result of the user survey of the simulator; the background color indicates the number of answers, from white—no answer -to dark blue—five answers. Totally AgreeAgreeNeitherDisagreeTotally Disagree The system was easy to use.5 1 The system was easy to understand.5 1 I would like to use the system every day.1122 I had issues with the system. 23 The system was too complex. 132 I quickly learned how to use the system.33 I would be able to easily learn how to use the system with only a written manual.3111 I felt safe using the system.212 The system was inconcistent. 231 Dangerous Situations were simulated realisticly.132 The sytems functions were well integrated.321 Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. Share and Cite MDPI and ACS Style Schöning, J.; Kettler, J.; Jäger, M.I.; Gunia, A. Grand Theft Auto-Based Cycling Simulator for Cognitive Enhancement Technologies in Dangerous Traffic Situations. Sensors 2023, 23, 3672. https://doi.org/10.3390/s23073672 AMA Style Schöning J, Kettler J, Jäger MI, Gunia A. Grand Theft Auto-Based Cycling Simulator for Cognitive Enhancement Technologies in Dangerous Traffic Situations. Sensors. 2023; 23(7):3672. https://doi.org/10.3390/s23073672 Chicago/Turabian Style Schöning, Julius, Jan Kettler, Milena I. Jäger, and Artur Gunia. 2023. "Grand Theft Auto-Based Cycling Simulator for Cognitive Enhancement Technologies in Dangerous Traffic Situations" Sensors 23, no. 7: 3672. https://doi.org/10.3390/s23073672 Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here. Article Metrics Back to TopTop
Questions about implementing or applying functions which: (1) always yield the same result for the same input, (2) are independent of outside information, and (3) produce no side effects. learn more… | top users | synonyms 1 vote 1answer 47 views How to get the values out of Alternatitves? Saying we have something like: SomeFunction[ ... { Alternatives[1, 2, 3] :> "something" } ... ] How can I know if ... 6 votes 3answers 292 views How can I create currying functions using pure function syntax? For example how can I write In: pureFunctionSyntax[myF] /@ {7, 3} Out: {myF[7, Log[7]], myF[3, Log[3]]} 4 votes 1answer 262 views Why does #0[[1]] &[] output 0? When a pure function accesses the first element of itself, 0 is output. What is the logic behind this, or is there any? 3 votes 3answers 46 views How to use pattern matching to apply a function to specific elements of a matrix I have a 3x3 matrix testweightedgraph = {{{}, {p, q, pq, pq}, {}}, {{p, q, pq, pq}, {q}, {}}, {{}, {}, {}}}; whose elements are (possibly empty) lists. I would ... 0 votes 1answer 69 views Replace variable with # and pass function body as an argument to a function I have a very simple problem, which I would like to make a bit general, but none of my naive approaches have worked yet. This is what I want to do step by step: Define a parameter: ... 16 votes 1answer 797 views Is it possible to reference “self” from a pure function? This would calculate the factorial of 6, if the "self" was the function itself. Is there something that could allow this? ... 1 vote 2answers 29 views “Nonatomic expression” error when identifying certain positions in a list [duplicate] Please can anyone help ? I have a list of sets, and I am trying to find the positions in that list of those sets which are subsets of a given set. (Here I am ignoring the distinction between lists and ... 0 votes 1answer 67 views Working with functionals [closed] I am trying to work with functionals in Mathematica, this means that I want to define a function of a function. I defined my function of a function as: ... 0 votes 4answers 109 views Cases vs Select, Pattern vs Pure function [duplicate] What is the difference between having Cases with selection condition presented by pattern and a with pure function as condition? ... 4 votes 1answer 97 views Substitute a function's definition for its name I'm having trouble with a function which is supposed to work on another function. Simplified version: ... 1 vote 1answer 63 views Pure “Select” function over matrix I have several lists of tuples in the following shape: l1 = {{1, 134}, {2, 314}, {3, 164}} I do want to select, from each list, list elements fulfilling a ... 4 votes 5answers 156 views Using Through with SlotSequence I have an expression consisting of a few pure functions added together like so: f+g+h I want to add the bodies of these functions together and make that a pure ... 2 votes 1answer 86 views Use Map with multiple arguments over a nested list I noticed there are a few similar questions to mine on here, but I couldn't figure out how to accomplish this mapping. I have sets of data I want to plot, which represent intensity and frames, and I ... 7 votes 5answers 239 views How to write an operator that acts on pure function (to give another pure function) I would like to write an operator oper that acts on a pure function f with an undetermined number of arguments, with the syntax ... 1 vote 1answer 52 views Sum of Integers with a Pure Function How would I find the sum of an argument, with the constraint that they are all integers (so if the argument contains a non-integer value, the function will not evaluate). I came up with these two: ... 0 votes 1answer 76 views Pure Function that adds all arguments the question asks to create a pure function that adds any number of arguments. Is the following acceptable? sum := Plus[##] & It does work, but can it be considered a pure function? I felt like ... 1 vote 1answer 69 views How-to implement iteration over a result of an iteration in a functional way I have a pure function f:= #1 * #2 * #3 &; Which I can invoke in a following way: f[#,2,3]& /@ {1,2,3} Which ... 39 votes 2answers 1k views Memoization with pure functions? Is this possible? If I have a simple function, say: f=If[#>0,1,2]& then for each value of # this will re-evaluate f right? Is it possible to define a ... 0 votes 0answers 65 views Interpreting Mathematica output or producing cleaner output Could someone please explain what the following would look like in standard math notation (or explain to me what this means): ... 2 votes 1answer 63 views Expressing a definite integral as pure function with the upper-bound as it argument Suppose i have an integral which has a closed form, $\quad \quad \int_{a}^{b} f(x) dx=F(a,b)$ I want to use output function $F$ as a pure function, like ... 4 votes 0answers 49 views Wrong autogenerated package from notebook containing #key and Part as subscript Bug introduced in 10.0.0 and persisting through 10.1.0 or later Mathematica v10.1.0, under Windows 8.1 x64 Mathematica v10.0.2, under Windows 1) Define a function in an initialization cell: ... 2 votes 1answer 83 views Use of parenthesis and pure function I had read that when using a pure-function it was a good general practice to enclose the function and the associated ampersand in parenthesis. (#^2 &)[a] I ... 27 votes 2answers 2k views What are the cool kids talking about when they use ##&[]? [duplicate] All the cool kids are apparently using ##&[] for Unevaluated @ Sequence[] but I have no idea what either means. ... 4 votes 2answers 109 views Conflict with variables in pure functions Consider the following snippet of code. Clear[f, g] f[x_] := Function[{i}, x]; g[h_] := Module[{Z}, Z[i_] := Print[h]; Print[h]; Z[1]; ]; When ... 0 votes 0answers 47 views Having trouble reading this output (pure functions) [duplicate] I'm after decoupling some odes and trying to solve them using mathematica but my output is in terms of Functions and InverseFuntions and I'm afraid I have no idea how to translate the output into ... 7 votes 2answers 670 views How to programmatically covert a function-like rule to a pure function? Is there a programmatic way to convert a Mathematica rule that acts like a typical mathematical function of one variable into the equivalent pure function? For example, the code should convert ... 1 vote 0answers 76 views Using Solve without introducing extra variables First post here. I've tried searching for an answer for this for a few days now, but it seems the search terms (solve, slot, etc) are too generic to be helpful. I'm struggling with understanding how ... 2 votes 1answer 91 views Patterns for destructuring “Function” function arguments I want to define a function for finding a Jacobian matrix of pure vector function of vector argument. I try ... 7 votes 3answers 375 views Functional equivalent of a For loop referring to consecutive elements in a list I have implemented this function which smooths the values in a list by, if it encounters a zero, replacing this entry by the average of its two neighbours (apart from the first and last values of the ... 2 votes 3answers 160 views How to make a symbolic vector into a pure function? As part of a set of functions to implement a steepest descent algorithm I created my own n dimensional gradient function. It is defined as follows: ... 1 vote 4answers 168 views Pure function, one slot refers to List-position I used all my google-fu trying to find how to make this work; read the docs as well. What have I missed? I feel sure this can't be a new question, but I can't find anything Here is is: ... 0 votes 0answers 58 views How to Fold (FoldList) this in a more compact (efficient) way? Example code: x = Table[something[i], {i, 5}] Table[Fold[f1[#1, f2[#2, a], a] &, x[[i]], {c1, c2, c3}], {i, Length[x]}] This above is just an example. I ... 15 votes 2answers 1k views What happens when you divide by ##? I've been playing around with sequences a bit. In particular with using ## with unary and binary operators. Let's start simple, the following all make some kind of ... 0 votes 2answers 74 views How to make a density plot with composed functions [closed] I want to create a monochromatic density plot of the E-field around an optical vortex. To do this I've written ... 0 votes 1answer 102 views What does the expression “Total[funca[a,#] & /@ #] & /@ {x,y}” possibly mean? Can the expression be simplified as "Total[funca[a,#]] & /@ {x,y}"? What does the double of "& /@" mean? Where can I find some reference? Updated According to Mr.Wizard's answer, I now know ... 10 votes 1answer 312 views Why does the documentation call functions “pure”? Clearly, functions in mathematica are not pure functions according to the definition on Wikipedia (no side effects - basically implementabe with table lookups): ... 0 votes 1answer 116 views Why is `B /. h -> #2 &` not a pure function? I am trying to plot the energy surface of the mean field Ising model, but I am running into a problem with setting the MeshFunctions for the plot. ... 9 votes 3answers 359 views Operate over list of pure functions I have list of pure functions (All functions are InterpolatingFunction) i.e {{a, b}, {c, d}, {e, f}, ...} and I would like ... 0 votes 0answers 42 views How can I mix // with a function of two arguments? [duplicate] I often find myself using // when playing around with expressions, but it is always cumbersome to have to switch to the full notation just to apply a function of ... 5 votes 4answers 154 views Syntax for Table with a pure function I have: g = #1^2 + a #2^3 / #1 & Now I wish to make a Table evaluating this from 1 ... 3 votes 5answers 198 views Algebraic expressions on pure functions I would like to know how to perform algebraic operations with pure functions. Simple version: Here's a silly toy model: I want to transform the algebraic expression Sin*Cos into the function ... 5 votes 1answer 199 views How can I make a “self-referential” replacement operation self-contained? Fairly often I find use for replacement rules that call themselves on the right-hand side of the rule, e.g.: ... 2 votes 1answer 670 views Why is either Listable or HoldFirst not working? Starting with a fresh kernel, I evaluate the following: ... 8 votes 1answer 305 views Mma10 mystery: Failure of pure function substitution with Interpretation? Bug introduced in 10.0.0 and fixed in 10.0.1 I had code to display with subscripts from Displaying index as subscript on output: e.g. C[i] -> C_i with Notation[...] or Interpretation[..]? which ... 1 vote 1answer 57 views How can I change the scoping of a pure function returned by a function in a package? I have written a small Mathematica package that contains a module that solves some differential equation with initial conditions. Suppose that the solution to this differential equation defines some ... 6 votes 3answers 315 views How to use multiple pure functions correctly? I have used Mathematica for two years.And usually,I can use single pure function(#&) rightly.However,for the use of multiple pure function,I always make all ... 1 vote 4answers 256 views How to find all symbols in an expression and perform an operation on them? ========== motivation =========== Suppose, for example, I have an incoming expression like m = (3-I)x + 4(x y)/(Cos[y]) I want to find all the symbols in ... 3 votes 4answers 164 views Correct slot assignment when mapping from different lists using pure function Given expr = u == a1 + a2 x + a3 y; and uRep = {u1, u2, u3}; xyRep = {{x1, y1}, {x2, y2}, {x3, y3}}; I'd like to generate ... 2 votes 1answer 77 views Why is Chop ignored in Plot? I want to plot multiple functions with the same settings side-by-side, so I use the pure function construct (for clarity, I only use one function in this example) ...
logo drop Main Community Submissions Help 90968232 visitors Show Posts This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to. Messages - Xalphenos Pages: [1] 2 3 4 5 1 General Discussion / No video on my NES « on: December 09, 2013, 02:16:29 am » After having my nes sit in a box for about 4 years I pulled it out to see if it still worked.  Well it didn't.  I've tried using both RF and AV and still nothing shows up on the tv.  The light blinks and I can get it to stay on, not blink, by fiddling with the cart just like I used to do to get it to work.  So the lockout chip still works I guess. I was wondering if anybody here knew if I could tap the video from somewhere on the board to see if maybe it's just the RF/Power box that was bad.  I looked at a ppu pinout and see that pin 21 is video out and 20 is ground.  Could I just solder a rca cord to those to test.  I realize it would probably give me terrible video quality but it's just to test.  Any ideas? 2 Front Page News / Re: Translations: Translation for Ys 5 Finally Released « on: November 28, 2013, 02:49:20 pm » Thank you Gideon. You are an amazing person. 3 ROM Hacking Discussion / Re: Screenshots « on: October 30, 2013, 09:51:39 pm » Gideon Zhi you are amazing. 4 ROM Hacking Discussion / Re: Game Boy Colorizer! « on: October 29, 2013, 01:03:58 am » I know it's not the same thing but I stumbled upon this a few weeks ago.  Been stuck in a tab waiting for me to read it until now.  I like the idea.  5 I agree with the others here. I'm perfectly ok with fan translation credits at the start of a game. The old release group intros where annoying but I haven't seen any annoying fan translation credits. If you can figure out how to remove them then I guess you have as much right to do that as the original teams had to translate the games in the first place.  Don't be surprised if you end up with a notoriety about yourself though, especially if your credit removed versions end up on repro carts. 6 Ok this EXE is not packed, and the text for items and menu text are in it.  Though it really is a different file.  At offset 0x39000 of corpsparty2.exe you will find the string "DPMX0" then some header stuff.  This basically marks the start of a new file within the exe.  At 0x3902C you have the length of the file in bytes.  In this case it is 0x6C66C which actually is the end of the whole exe.  The data starts at 0x39030.  For every byte you need to xor with 0x73 then subtract 0x72 then add that to the previous converted byte, first time it's 0. Here is the relevant code from the exe. Code: [Select] AL = 72 CL = 73 DL = previous converted byte (0 the first time) ESI = pointer (different each time you run the exe) EBP = counter 0x6C66C to begin with CPU Disasm Address   Hex dump          Command                                  Comments 00401247  |> /8A1E          /MOV BL,BYTE PTR DS:[ESI] 00401249  |. |32D9          |XOR BL,CL 0040124B  |. |2AD8          |SUB BL,AL 0040124D  |. |02D3          |ADD DL,BL 0040124F  |. |8816          |MOV BYTE PTR DS:[ESI],DL 00401251  |. |46            |INC ESI 00401252  |. |4D            |DEC EBP 00401253  |.^\75 F2         \JNZ SHORT 00401247 I think I've explained it well and the code is really simple so someone should be able to write a program that will do that for you.  If no one writes you a program I'll try to do it tomorrow after work.  I've got to do my Japanese reviews and go to bed.  7 Like I said I have no knowledge of the game.  I recognized the name and knew xseed was some how connected to corpse party. That seems like a functional idea.  Basically you would write a trainer that over writes the text strings in memory.  They may end up at different memory locations on subsequent runs so the program will need to search for the strings then write over them. I don't have the game so really this is all theoretical.  Those item names could still be editable in a file somewhere. 8 Let me preface this by saying I have absolutely zero knowledge of this game. I only vaguely recognize the name. 661KB seems a little small for a modern pc game executable.  So my best guess is that the exe is packed or is just a loader and the actual game exe is masquerading as some other file.    So you are going to need someone well versed in cracking modern copy protections or start doing lots of research.  Honestly being so new it seems like there could be a good chance the game gets localized.  Then all that work was wasted. 9 What starwin says.  Olly is what I use and suggest. How big is the exe file?  This game is pretty new so you could be running into some type of copy protection.  The main exe could be packed or encrypted.  In either case you wouldn't find anything relevant in it with just a hex editor.  Since you said you found it in the main exes memory I'm leaning toward this scenario. 10 Gaming Discussion / Re: Learn Japanese Through JRPGs! « on: August 29, 2013, 08:09:49 pm » Thanks for this. I started studying Japanese last august but took a break as I started a new job.  I picked it back up in April and so far know about 400 kanji and a thousand something vocab based on them.  I've been studying grammar too so I'm not completely deficient. Obviously video games was a large part of why I'm studying Japanese so this looks great.  I'm going to start going through it tomorrow. 11 Programming / Re: Finding Item Text within a PC Game « on: August 25, 2013, 04:43:49 pm » It could be anywhere then, it could be compressed or right in front of your eyes hidden by a bit wise operation.  Since the simple method didn't work you either need to manually check every file or attack it with a debugger. No mater how its stored in files it should at some point exist as text in memory. Set break points to find out when and how it got there. 12 Programming / Re: Finding Item Text within a PC Game « on: August 25, 2013, 03:38:20 pm » I've seen a lot of pc games store the Item text within the main exe itself.  I would try opening up the main exe in a hex editor capable of displaying various text encodings, such as madedit, and searching for the text.  Just set your encoding before you start searching. 13 Newcomer's Board / Re: I only just started downloading game hacks « on: August 16, 2013, 03:59:03 pm » Pretty sure that the Trident engine is a critical windows component and can in fact not be removed. I have always been under this impression as well.  14 Newcomer's Board / Re: I only just started downloading game hacks « on: August 05, 2013, 07:03:58 am » I just need to know where to find the right patch file for the Expert Emerald mod. http://www.romhacking.net/hacks/1458/ Spoiler: 15 Newcomer's Board / Re: I only just started downloading game hacks « on: August 05, 2013, 05:20:48 am » First of all I wasn't talking down to you.  I was giving you the benefit of the doubt.  Because in this day and age it is very odd to me that someone can't manage to download a file on their own.  Secondly I was just trying to offer a little help on the trying to run in windows media player thing.  Ive seen it happen and it's because of the reason I explained.  But I can guarantee you that if you run the emulator and try to load the patched rom in it windows media player will not run.  About the virus you had two years ago surely you removed it?  Why not just go back to IE then, if that is what you are comfortable with.  I disagree with Bregalad on one point.  This should be your third step.  Step one.  Learn to use a computer Step two.  Learn to use an emulator Step three. Learn to use a romhack Those are big steps though and contain many smaller steps. Oh and since you have a hard time seeing the difference this time, unlike last time, I am talking down to you. Edit:  If you computer is really that screwed up run a virus scan followed by a malware scan.  Google "MBAM" and probably reinstall firefox or reset it config. 16 Newcomer's Board / Re: I only just started downloading game hacks « on: August 05, 2013, 04:26:25 am » Honestly I can't tell if you are just trolling or really need that much help.  You have to run the rom hacks through their respective emulator you can't just double click it and expect it to run.  Thats probably why it's trying to run in media player.  And for downloading stuff it should just go straight to your downloads folder.  17 Newcomer's Board / Re: Need help with Super Robot Wars Alpha 3 « on: August 05, 2013, 02:06:48 am » Hi there. By switching two characters (コウ) with three (Kou), you probably broke one of the pointers (you know what pointers are, right?). Except that two SJIS characters would allow him four Latin non sjis characters.  So the first test he did wasn't switching two characters with three it was changing 4 bytes with 3.  But otherwise I agree you should keep string lengths the same for this initial test.  Some strings have there length marked somewhere and if the size doesn't match exactly you get a crash.  So for latin characters add a space to the end of it "Kou " or for the sjis equivalents just use "Ko".  Some other things that might be going on: Make sure your hex editor is set to type over and not insert.  You don't want to change the file length.  Your pretty much guaranteed a crash.  This also means no deleting unused bytes.  So if you typed in "Kou" and deleted the next unused byte you just changed the file size. There could be a checksum in which case you are not going to edit anything in the main executable without asm hacking. 18 "First year" Yeah it's first year. Nennme is a counter for years. The second kanji isn't day it's eye, a mong other things. 19 Newcomer's Board / Re: Tingle Translation Help « on: September 24, 2012, 08:31:19 pm » What Gideon Zhi is getting at is that not having kanji doesn't necessarily make it any easier, and definitely not classifiable as easy.  In fact it could make it harder. 20 Newcomer's Board / Re: Hacking PS1 games on Linux « on: August 24, 2012, 12:31:09 am » To be fair, I've yet to see a really good debugger on any emulator (not only PlayStation) I've tried. I agree.  That's why I stick to x86.  It's certainly not easier than MIPS or SuperH, I'm very interested in Saturn hacking, but I'm so spoiled by Ollydbg. Pages: [1] 2 3 4 5
close menu The Mystery of Kazakhstan’s “Dragonglass” The Mystery of Kazakhstan’s “Dragonglass” Chances are, you’ve heard of obsidian. It’s known as “Dragonglass” in the Game of Thrones universe, and here in our world, the stone is also born of fire. Obsidian forms when molten rock rapidly cools after a volcanic eruption, and depending on the minerals within it, the glassy substance ranges from jet-black, to shades of brown, grey, and red. But unbeknown to most, the deserts of western Kazakhstan are speckled with obsidian of a different color: a mysterious, vibrant-blue Dragonglass that can be found there, and there alone. dragonglass-2-2016-4-12 It’s called tengizite, and though the rare glass’ presence has puzzled many a passerby, its origin story is no secret. The truth is, we created it by mistake. Tengizite is a non-natural form of obsidian glass – a “pseudo obsidian” – the result of an explosion that set the Tengiz oil field on fire in 1985. During this period, Russia still controlled Kazakhstan and its natural resources, and the fire turned out to be one of the longest-burning blowouts in the history of the Russian-Soviet oil industry. The Earth melted beneath its fury. How could an oil fire melt rock? To understand this, we need to understand what crude oil really is. Unseparated crude contains a high proportion of dissolved gasses like methane, hectane, and hydrogen sulfide. As pressure drops, those gasses are released, which (quite literally) adds fuel to the fire. Much like what you’d get by spraying an aerosol can into an open flame, an oil-well fire often looks more like blowtorch than a flaming puddle — a 100-story blowtorch. The Tengiz wells are some of the highest-pressure wells in the world, and the 1985 fire burned at an unimaginable 3,000 degrees Fahrenheit (1684°C). For a bit of perspective, that’s 500 degrees above the melting point of steel, and 1,000 degrees hotter than the temperature of most flowing lava. fireFootage from the Tengiz Well 3 Blowout, 1985. Source: Bindigos In addition to unleashing the flames of hell, the blowout sent deadly plumes of noxious gas some 980 feet (298 meters) into the desert sky, which local fire crews lacked the expertise and equipment to contain. It took just over 12 months to cap the well, and all the while, the ground below was exposed to the fire’s extreme heat. Run of the mill obsidian forms from molten rhyolite, a high-silica volcanic rock. If it cools fast enough, the minerals floating within the magma are “frozen,” meaning they can’t reform their crystal structure within the viscous goo. As it hardens, what we’re left with is smooth silica glass that contains only small traces of those minerals. The clearer the obsidian, the fewer microscopic crystals have formed inside of it. This piece for example, contains fragments of black magnetite, and red limonite (iron oxide): obscidian-dragonglass-2016-4-12 dragonglass-2016-4-13 dragonglass Just like rhyolite, the sedimentary rock that surrounds the Tengiz oil well is high in silica, and just like obsidian magma, it melted, then rapidly cooled after the well was capped. This explains tengizite’s similarly vitreous (glassy) sheen and fracture pattern. But why is it blue? While some specimens of so-called “rainbow obsidian” do posses a slight blue-green tint, no volcanic glass has been found to date that rivals the intensity of the oil field anomaly’s signature hue. Some suspect the color was caused by residues from firefighting foams used on the blowout. Others point to industrial equipment like bulldozers that melted during the ordeal, suggesting their components (paint, tinted glass, etc.) could have melded with the surrounding sand. The more likely explanation, however, is that the color comes from trace chemicals and minerals that emerged from the oil well itself, or that were pumped through the sand to aid in the extraction process. An Eiffel 65-approved look isn’t the only thing that separates tengizite from common forms of obsidian: it’s also far less brittle than its volcanic counterpart. But that doesn’t necessarily mean it’s the better choice for a Crow in need. A brittle substance isn’t great for a smash-and-grab job, but there’s a reason humankind has fashioned weapons and tools from obsidian for millennia. When edged properly, obsidian blades are thinner and sharper than the finest medical-grade steel scalpels. What they lack in blunt force, they make up for in finesse. Today, obsidian is used in some of the most precise surgical operations. dragonglass-walker-2016-4-13 Before you head to eBay in search of tengizite for your own collection, though, I should warn you that very little glass has been removed from the blast site. It’s likely that much of the “tengizite” you’ll find for sale actually hails from another source. One such source is ore smelting, the process by which a desired base metal (like cast iron) is separated from its raw ore. Smelting produces “slag,” a silica-glass byproduct that is colored by compounds and impurities that were removed from the ore. Though it’s often speckled with cement-like inclusions, a quick browser search for “slag blue” shows you just how similar these glasses can look to tengizite. IMAGES:  Bindigos/YouTube 3 New GAME OF THRONES Clips Tease MAJOR Changes for 4 Characters Final Images from Cassini Are Stunning Final Images from Cassini Are Stunning article What If THOR: RAGNAROK Were Actually Made in the 1980s? What If THOR: RAGNAROK Were Actually Made in the 1980s? video Stephen King's 8 Favorite Films Stephen King's 8 Favorite Films article
Andean Parakeet (Bolborhynchus orbygnesius) Andean Parakeet Andean Parakeet [order] PSITTACIFORMES | [family] Psittacidae | [latin] Bolborhynchus orbygnesius | [authority] Souance, 1856 | [UK] Andean Parakeet | [FR] Toui d’orbigny | [DE] Andensittich | [ES] Catita Andina | [NL] Andesparkiet | [copyright picture] El Blog Subspecies Genus Species subspecies Region Range Bolborhynchus orbygnesius SA Peru to nc Bolivia Genus Most of the representatives of the genus Bolborhynchus own short and acuminate tail feathers, which is unusual for parakeets. Obvious differences between the sexes cannot be found with any species of that genus. It contains the following species: Andean Parakeet, Bolborhynchus orbygnesius; Barred Parakeet, Bolborhynchus lineola; Rufous-fronted Parakeet, Bolborhynchus ferrugineifrons. Physical charateristics The Andean Parakeet is plump and relatively short-tailed, and dark green throughout, with a yellow tinge to the face and belly, brightest in the throat and upper breast. The outer webs of the primaries are teal, and can even approach violet. Juveniles lack the yellow tinge, and all ages have a plain grayish bill and dull pink legs. Listen to the sound of Andean Parakeet [audio:http://www.planetofbirds.com/MASTER/PSITTACIFORMES/Psittacidae/sounds/Andean Parakeet.mp3] Copyright remark: Most sounds derived from xeno-canto recorded by Niels Krabbe wingspan min.: 0 cm wingspan max.: 0 cm size min.: 16 cm size max.: 17 cm incubation min.: 19 days incubation max.: 22 days fledging min.: 0 days fledging max.: 0 days broods: 1   eggs min.: 4         eggs max.: 8   Range South America : Peru to Northcentral Bolivia Habitat The Andean Parakeet is uncommon to locally common from 3,000-4,000m in semi-arid cloud forests, especially with polylepis, or in brushy montane ravines. It forages in small groups or pairs in bamboo thickets or leguminaceous trees, and occasionally on the ground, and nests in deep burrows in steep embankments. Reproduction The Andean parakeet is one of those parakeets that nests underground. A burrow will be formed in a steep bank. A clutch of up to ten eggs (but generally 4 to 6) may be laid. The eggs are incubated by the hen for about 20 days Feeding habits Diet consists of seeds, buds and berries. Gregarious; seen in pairs, small groups and occasionally large flocks of over 300 birds. Feeds in bamboo, brambles and leguminaceous trees. Forages in vegetation or on the ground. Video Andean Parakeet httpv://www.youtube.com/watch?v=ABu_e-2cgtA copyright: Stefan Behrens Conservation This species has a very large range, and hence does not approach the thresholds for Vulnerable under the range size criterion (Extent of Occurrence <20,000 km2 combined with a declining or fluctuating range size, habitat extent/quality, or population size and a small number of locations or severe fragmentation). The population trend appears to be stable, and hence the species does not approach the thresholds for Vulnerable under the population trend criterion (>30% decline over ten years or three generations). The population size has not been quantified, but it is not believed to approach the thresholds for Vulnerable under the population size criterion (<10,000 mature individuals with a continuing decline estimated to be >10% in ten years or three generations, or with a specified population structure). For these reasons the species is evaluated as Least Concern. Andean Parakeet status Least Concern Migration Resident Distribution map Andean Parakeet distribution range map Leave a Reply Your email address will not be published. Required fields are marked *
References of "Carnol, Monique"      in Bookmark and Share     Full Text Peer Reviewed See detailNitrosomonas europaea-like bacteria detected as the dominant beta-subclass Proteobacteria ammonia oxidisers in reference and limed acid forest soils Carnol, Monique ULg; Kowalchuk, G. A.; De Boer, W. in Soil Biology & Biochemistry (2002), 34 Net nitrification in intact soil cores and the community of ammonia-oxidising bacteria were studied in acid Norway spruce (Picea abies (L.) Karst) and sessile oak (Quercus petraea (Matt. Lieb.)) soils ... [more ▼] Net nitrification in intact soil cores and the community of ammonia-oxidising bacteria were studied in acid Norway spruce (Picea abies (L.) Karst) and sessile oak (Quercus petraea (Matt. Lieb.)) soils (Haute Ardenne, east Belgium) 18 months after treatment with 5 t ha(-1) dolomite lime. Liming caused a significant increase in nitrification in the upper soil layers (0.15 m) of both stands. DGGE (denaturing gradient gel electrophoresis) profiling after P-subclass ammonia oxidiser-specific polymerase chain reaction (PCR), combined with hybridisation and sequencing of excised DGGE bands revealed a dominance of Nitrosomonas europaea-like sequences, independent of soil horizon, tree species and lime treatment. A minority Nitrosospira-like population was detected, which showed affinity to nitrosospiras previously detected in acid soil. These results contrast with several reports suggesting a dominance of Nitrosospira-like organisms among ammonia oxidiser communities in acid soils. (C) 2002 Elsevier Science Ltd. All rights reserved. [less ▲] Detailed reference viewed: 41 (2 ULg) Full Text Peer Reviewed See detailElevated atmospheric CO2 in open top chambers increases net nitrification and potential denitrification Carnol, Monique ULg; Hogenboom, L.; Jach, M. E. et al in Global Change Biology (2002), 8 The control of soil nitrogen (N) availability under elevated atmospheric CO2 is central to predicting changes in ecosystem carbon (C) storage and primary productivity. The effects of elevated CO2 on ... [more ▼] The control of soil nitrogen (N) availability under elevated atmospheric CO2 is central to predicting changes in ecosystem carbon (C) storage and primary productivity. The effects of elevated CO2 on belowground processes have so far attracted limited research and they are assumed to be controlled by indirect effects through changes in plant physiology and chemistry. In this study, we investigated the effects of a 4-year exposure to elevated CO2 (ambient + 400 mumol mol(-1) ) in open top chambers under Scots pine (Pinus sylvestris L) seedlings on soil microbial processes of nitrification and denitrification. Potential denitrification (DP) and potential N-2 O emissions were significantly higher in soils from the elevated CO2 treatment, probably regulated indirectly by the changes in soil conditions (increased pH, C availability and NO3 (-) production). Net N mineralization was mainly accounted for by nitrate production. Nitrate production was significantly larger for soil from the elevated CO2 treatment in the field when incubated in the laboratory under elevated CO2 (increase of 100%), but there was no effect when incubated under ambient CO2 . Net nitrate production of the soil originating from the ambient CO2 treatment in the field was not influenced by laboratory incubation conditions. These results indicate that a direct effect of elevated atmospheric CO2 on soil microbial processes might take place. We hypothesize that physiological adaptation or selection of nitrifiers could occur under elevated CO2 through higher soil CO2 concentrations. Alternatively, lower microbial NH4 assimilation under elevated CO2 might explain the higher net nitrification. We conclude that elevated atmospheric CO2 has a major direct effect on the soil microbial processes of nitrification and denitrification despite generally higher soil CO2 concentrations compared to atmospheric concentrations. [less ▲] Detailed reference viewed: 32 (0 ULg) Peer Reviewed See detailEffects of liming on forest soil algal communities Kostinov, I.; Carnol, Monique ULg; Dulière, J.-F. et al in Algological Studies (2001), 102 The effects of the application of dolomite lime (5 t ha-1) on soil algal communities were investigated in sessile oak (Quercus petraea (MATT.) LIEB.) and Norway spruce (Picea abies (L.) KARST.) plots ... [more ▼] The effects of the application of dolomite lime (5 t ha-1) on soil algal communities were investigated in sessile oak (Quercus petraea (MATT.) LIEB.) and Norway spruce (Picea abies (L.) KARST.) plots situated in the Belgian Ardenne. Chlorophyta (60 taxa) were by far the most diverse group, followed by Xanthophyceae (10 taxa), Bacillariophyceae (3 taxa), Cyanophyceae (2 taxa) and Euglenophyceae (1 taxon). In both forest types, liming lead to a significant increase in soil pH, exchangeable magnesium and calcium. In the limed Quercus plots available phosphorus and soil solution nitrate concentrations were also increased. The soil algal diversity was similar in oak and spruce control plots and in limed spruce plots. However, in the limed oak plots a significantly higher algal diversity was observed. On the basis of a CCA analysis, three clusters of plots could be distinguished: a) Picea control plots, b) limed Picea and control Quercus plots, c) limed Quercus plots. Both soil pH and nutrient availability seem to be important in determining algal species composition in these forest soils. [less ▲] Detailed reference viewed: 26 (1 ULg) Full Text Peer Reviewed See detailElement removal in harvested tree biomass: scenarios for critical loads in Wallonia, south Belgium Bosman, Bernard ULg; Remacle, Jean; Carnol, Monique ULg in Water, Air & Soil Pollution : Focus (2001), 1 The critical load concept is now widely used as a tool for developing emission control policies in Europe. As a signatory country of the Convention of Long-Range Transboundary Air Pollution, critical ... [more ▼] The critical load concept is now widely used as a tool for developing emission control policies in Europe. As a signatory country of the Convention of Long-Range Transboundary Air Pollution, critical loads for acidity, nutrient nitrogen, nitrogen and sulphur have been calculated for the Flemish and Walloon regions in Belgium. This paper describes the methodology used for estimating critical loads for forest soils in the Walloon region according to the Steady-State Mass Balance equations. As an example the methodology was applied to the catchment `Waroneu', situated in a sensitive area of the Haute Ardenne. Main input parameters to the equations were derived from precipitation and runoff data of the catchment study. Improved estimates of nitrogen uptake (Nu) and base cation uptake (BCu) were obtained by intensive sampling of Picea abies and Quercus robur trees. Nutrient contents (Ca, Mg, K, N) and nutrient to nitrogen ratios of Picea abies reflected the poor soil quality at a site with high N deposition. Quercus robur nutrient contents increased from stem to higher order branches with a high proportion of nutrients located in the bark. However the simulation of stem only harvesting had a minor effect on critical loads. Measured wood densities were lower than reported literature values with a main effect on Nu and BCu estimates. The use of recommended default values and/or data derived from the experimental site resulted in a wide range of critical loads, some of which were largely overestimated. Results demonstrated the importance of site specific data for critical load calculations. [less ▲] Detailed reference viewed: 28 (4 ULg) See detail'Dolomite lime effects on acid forest soils: traditional and molecular approaches Carnol, Monique ULg Conference (2000, November) The study of biogeochemical processes in soil has long been restricted by the techniques available for investigating the micro-organisms concerned. In particular, isolated nitrifying bacteria are not ... [more ▼] The study of biogeochemical processes in soil has long been restricted by the techniques available for investigating the micro-organisms concerned. In particular, isolated nitrifying bacteria are not active in culture media below pH 5.5-6.0, and it is not clear to what extent these strains, if at all, are active in the acid soils of temperate forests. Since DNA/RNA based microbiological techniques do not require isolation of bacterial strains, they provide a new, powerful approach to gain insight into the nitrification process. We therefore combined the use of a large scale field experiment and laboratory soil incubations with molecular analysis of the nitrifying bacterial community to investigate the effect of dolomite lime on the nitrification process in the soil of the Belgian Ardenne. In this area, soils are naturally poor in magnesium and liming at moderate doses has been suggested to alleviate soil acidification and nutritional deficiencies. However, possible side effects needed to be evaluated, in particular on the nitrification process. As nitrification may be linked to soil acidification, cation leaching, aluminium mobilisation and N2O emission, increased knowledge is essential when evaluating effects of global environmental change and management strategies on forest ecosystems. The effects of dolomite lime (3-5 T/ha) were investigated at the watershed (80 ha, mainly Picea abies), plot (Quercus petraea and Picea abies stands) and laboratory level. Runoff chemistry, soil solution, net nitrate production in the laboratory and the community structure of ammonium oxidising bacteria (by PCR amplification of 16S-RNA genes, Denaturing Gradient Gel Electrophoresis - DGGE, sequence analysis and hybridisation) were analysed. In the watersheds, consequences on runoff water chemistry were minor. However, in the plot study, soil solution nitrate concentrations were significantly increased through liming in the Quercus plots. Increased net nitrification in the Quercus stand was confirmed by potential net nitrification measurements in the laboratory, whereas soil pH rose in both stands. The impact of liming on potential net nitrification was not related to a shift in the 16S rDNA DGGE community profile of ammonia-oxidising bacteria. The DDGE profile, combined with hybridisation and sequencing of cut out bands revealed a dominance of Nitrosomonas europea-like sequences and a minor presence of Nitrosospira cluster 2-like sequences. These results contrast with several reports suggesting a dominance of Nitrosospira-like organisms among ammonia oxidiser communities in acid soils. Our study reflects the great potential of combining new molecular techniques with conventional methods for improving our knowledge on the ecology of biogeochemical processes. [less ▲] Detailed reference viewed: 24 (0 ULg) See detailEffects of dolomite lime and clearcut on nitrate leaching from acid forest soils Carnol, Monique ULg Conference (1999, May) Forest liming has received increased attention since the 1980s, when unusual needle yellowing and fall were observed in large parts of Europe and North America. This ‘new forest decline’ has been ... [more ▼] Forest liming has received increased attention since the 1980s, when unusual needle yellowing and fall were observed in large parts of Europe and North America. This ‘new forest decline’ has been attributed to several causes acting individually or in synergy, amongst which were 'acid rain', nitrogen saturation and nutritional imbalances. Liming at moderate doses was suggested as a counteracting measure against soil acidification and to remove nutritional deficiencies. Another major forest management operation is whole tree harvesting. Both liming and clearcut may however affect the water quality leaving the treated areas. In particular, nitrate leaching is of major concern, as nitrate leaching may be linked to soil acidification, associated cation and/or aluminium release, and nitrate contamination of surface and groundwater. In this paper, I summarise main results of studies performed in the Belgian Ardennes. In this area, the acid brown soils are naturally poor in magnesium and the observed forest dieback symptoms were supposed to be the consequence of increased pollution exacerbating magnesium deficiency. Liming was suggested for prevention and correction. However, possible side effects, in particular on soil solution and stream water chemistry needed to be evaluated. Another major concern was the effects of clearcut operations on the streamwater quality in this area important for drinking water collection. The effects of dolomite lime were investigated at the watershed, plot and laboratory level. Paired watersheds of approximately 80 ha were mainly covered with Picea abies. One watershed of each pair was limed with 3 T/ha of fine ground dolomite and 200 kg/ha K2SO4. Runoff chemistry was analysed for major cations and anions and time series intervention analysis was used to detect statistically significant changes in stream water chemistry. Results showed increased magnesium concentrations immediately after liming, but a major part of the lime was retained by the soil system, and consequences on water chemistry were minor. However, in the plot study, where 5 T ha-1 of a dolomite lime suspension were applied to adjacent Quercus petraea and Picea abies stands, soil solution nitrate concentrations were significantly increased through liming in the Quercus plots. Increased net nitrification in the Quercus stand was confirmed by potential net nitrification measurements in the laboratory. The effects of tree harvesting on streamwater ion concentrations were investigated by clear felling 22 ha (9650 m3 wood) of a 81 ha watershed. This area represented one third of the forested area, the remaining area being covered equally with young plantations and 70-100 year old Picea abies. First data indicate increased potassium, iron, lead and organic carbon concentrations, but no major change in streamwater nitrate concentrations. Results will be discussed in relation to literature data and known controlling factors of the nitrification process. This analysis reveals that the speed, extent and duration of a perturbation in nitrate leaching after liming or felling vary at different sites. Risks assessment for nitrate leaching is therefore difficult and prediction of nitrate leaching in response to a perturbation remains an important challenge for further studies. In particular, basic controls of the nitrification process and relation nitrification/immobilisation need further investigation. [less ▲] Detailed reference viewed: 61 (1 ULg) Full Text Peer Reviewed See detailImpact of dolomite lime on the ground vegetation and on potential net N transformations in Norway spruce (Picea Abies (L.) Karst.) and sessile oak (Quercus Petraea (Matt.) Lieb.) stands in the Belgian Ardenne Duliere, J.-F.; Carnol, Monique ULg; Dalem, S. et al in Annals of Forest Science : a Multidisciplinary and International Journal (1999), 56 The impact of dolomite lime (5 T·ha-1) on the ground vegetation and on potential net nitrogen (N) transformations was investigated in two Belgian forest ecosystems. Norway spruce (Picea abies (L.) Karst ... [more ▼] The impact of dolomite lime (5 T·ha-1) on the ground vegetation and on potential net nitrogen (N) transformations was investigated in two Belgian forest ecosystems. Norway spruce (Picea abies (L.) Karst.) and sessile oak (Quercus petraea (Matt.) Lieb.) stands were situated in the Haute Ardenne (east Belgium) on acid-brown soil. The herb-layer floristic richness increased during the 2 years following liming, with the appearance of light and N-demanding species, which are also found in clear-cut areas or on road verges. Mosses reacted rapidly, showing a decrease acidophilous-dominant species and the establishment of some ruderal species. Six months after liming, the pH was significantly increased in the organic horizon of both stands and in the organomineral horizon of the oak stand. Soils originating from the two stands showed distinct responses in net NO3- production to the dolomite lime treatment. In the organic layer of the Quercus soil, net NH4+ production was decreased, NO3- production increased, and total N mineralisation remained unchanged. In the organomineral layer, NO3 - production was increased. In the Picea soil, NO3 - production was decreased in the organomineral soil layer. These results indicate the possibility of differences in the control of the N transformation processes occurring in the two sites. [less ▲] Detailed reference viewed: 52 (2 ULg) See detailAbiotic factors controlling nitrification in acid forest soils Carnol, Monique ULg in Rastin, N.; Bauhus (Eds.) Going underground - Ecological studies in forest soils (1999) Detailed reference viewed: 27 (3 ULg) Full Text Peer Reviewed See detailImpacts of (NH4)2SO4 deposition on Norway spruce (Picea abies [L.] Karst) roots Carnol, Monique ULg; Cudlin, Pavel; Ineson, Phil in Water, Air & Soil Pollution (1999), 116 The effects of enhanced (NH4)(2)SO4 (NS) deposition on Norway spruce (Picea abies [L.] Karst) fine root biomass, vitality and chemistry were investigated using root-free in-growth cores reproducing native ... [more ▼] The effects of enhanced (NH4)(2)SO4 (NS) deposition on Norway spruce (Picea abies [L.] Karst) fine root biomass, vitality and chemistry were investigated using root-free in-growth cores reproducing native organic and mineral soil horizons. The cores were covered and watered every 2 weeks with native throughfall or throughfall supplemented with NS to increase deposition by 75 kg ha(-1) a(-1) NH4+-N (86 kg ha(-1) a(-1) SO42--S). The in-growth cores were sampled after 19 months and assessed for root biomass, necromass, length, tip number, tip vitality and fine root chemistry. Root biomass and fine root aluminium (Al) concentration were negatively correlated, but NS deposition had no effect on root growth or root tip vitality. NS deposition caused increased fine root nitrogen (N) concentrations in the organic horizon and increased Calcium (Ca) concentrations in the mineral horizon. Fine root biomass was higher in the organic horizon, where fine root Al and potassium (K) concentrations were lower and Ca concentrations higher than in the mineral horizon. Results highlighted the importance of soil stratification on fine root growth and chemical composition. [less ▲] Detailed reference viewed: 17 (1 ULg) Full Text Peer Reviewed See detailEnvironmental factors controlling NO3- leaching, N2O emissions and numbers of NH4+ oxidisers in a coniferous forest soil Carnol, Monique ULg; Ineson, Phil in Soil Biology & Biochemistry (1999), 31 Main and interactive effects of temperature, throughfall volume and NH4+ deposition on soil solution NO3- concentrations, N2O emissions and numbers of NH4+ oxidisers were investigated in a controlled ... [more ▼] Main and interactive effects of temperature, throughfall volume and NH4+ deposition on soil solution NO3- concentrations, N2O emissions and numbers of NH4+ oxidisers were investigated in a controlled laboratory experiment. Large intact soil cores from a Picea abies (L.) Karat. stand were incubated according to an 'incomplete factorial design' at 4, 12 or 20 degrees C and watered every 2 weeks with 300, 500 or 700 ml (442, 737 and 1032 mm yr(-1)) of a natural throughfall solution enriched with 0, 37.5 or 75 kg NH4+-N ha(-1) yr(-1). Watering and sampling were performed every 2 weeks, during a 112 d period. At d 112, a temperature optimum for NO3--N concentrations in the leachate, NO3--N fluxes and numbers of NH4+ oxidisers in the mineral soil layer was determined at ca. 11 degrees C. NO3--N concentrations also decreased with throughfall volume, towards a minimum at 590 ml, with temperature however contributing most to modelling NO3--N concentrations and the two factors acting independently. The model explained 59% of the variability in the data, and the regression between observed and predicted concentrations was highly significant (P < 0.0001, r(2) = 0.93). NO3--N fluxes increased quadratically with throughfall volume, and throughfall volume and NH4+ deposition interacted significantly in determining the numbers of NH4+ oxidisers in the mineral soil layer. Numbers of NH4+ oxidisers were higher in the humus layer and decreased with increasing temperatures. N2O fluxes increased quadratically with temperature, and the linear and quadratic effects of throughfall volume (maximum at 500 ml). Results suggest that optimum temperatures for net nitrification may have been overestimated in previous studies by the use of disturbed soils. [less ▲] Detailed reference viewed: 40 (0 ULg) See detailImpacts of (NH4)2SO4 deposition on Norway spruce (Picea abies [L.] Karst) and Scots pine (Pinus sylvestris L.) fine roots Carnol, Monique ULg; Zoomer, Rik; Berg, Matty et al Conference (1998, September) The increased inorganic nitrogen (N) deposition in the last decades has become a major concern for the health of forests. In forest ecosystem, where N might no longer be limiting to primary production ... [more ▼] The increased inorganic nitrogen (N) deposition in the last decades has become a major concern for the health of forests. In forest ecosystem, where N might no longer be limiting to primary production, the excess N is thought to be related to forest decline and a concept of ‘N saturation ‘ has been developed. In particular, N, in the form of NH4, in excess to plant and microbial demands could lead to soil acidification if nitrified in the soil and leached, causing loss of base cations or mobilisation of phytotoxic aluminium. As part of the CORE project (CEC), investigating nutrient dynamics in European coniferous forest soils, we studied the effects of continuously increased (NH4)2SO4 deposition and soil characteristics on Norway spruce (Picea abies [L.] Karst) and Scots pine (Pinus sylvestris L.) fine root biomass, vitality and chemistry with an ingrowth core technique. The same experiment was performed in a Norway spruce stand on clay soil (Grizedale, UK) and a Scots pine stand on sandy soil (Wekerom, NL), using soil from each of the two sites. Root-free ingrowth cores reproduced organic and mineral soil horizons to 15 cm depth. They were covered to exclude native throughfall and watered every 2 weeks with throughfall or throughfall with (NH4)2SO4 added to increase deposition by 75 kg ha-1 a-1 NH4+-N. The ingrowth cores were sampled after 19 months, divided into layers, roots washed and analysed for biomass, necromass, root length, root tip number (RTN), root tip vitality and fine root chemistry. A previous field experiment had shown high soil solution Al concentrations at both sites, and an increase in NO3- and Al concentrations in response to increased (NH4)2SO4 deposition at the Grizedale site. The effects of high (NH4)2SO4 deposition depended on tree species, soil type and soil horizon. For Norway spruce, (NH4)2SO4 deposition did not result in any significant changes in root growth or vitality when growing into the native clay soil. However, when growing into the sandy soil, RTN and the proportion of dead roots were increased by N deposition. Norway spruce fine root N content was also increased in the organic horizon of both soil types. For Scots pine, (NH4)2SO4 treatment caused increased fine root Al content and a decreased Mg/Al ratio in the mineral layer of the sandy soil, with opposite effects in the clay soil. This (NH4)2SO4 treatment effect in the sandy soil for Scots pine was the only indication of a potential adverse effect of (NH4)2SO4 deposition on fine roots. Further results demonstrated the dominant importance of inherent soil characteristics and the stratification into soil horizons on fine root growth and chemical composition. For example, a negative correlation between root biomass and fine root Al content was established for Norway spruce. [less ▲] Detailed reference viewed: 18 (0 ULg) See detailAmendement de bassins versants dans les Ardennes belges: effets sur l'eau de percolation et l'eau à l'exutoire Carnol, Monique ULg; Piret, André ULg; Requier, Marie-Christine ULg et al in Santé et Biodiversité en Forêt Wallonne - Acte des Colloques (1998) Detailed reference viewed: 24 (3 ULg) Full Text Peer Reviewed See detailComparaison des peuplements de diatomées épilithiques de ruisseaux acides en milieu forestier soumis à un amendement de dolomie (Massif Ardennais, Belgique) Loncin, Anne; Leclercq, Louis ULg; Carnol, Monique ULg et al in Annales de Limnologie (1998), 34(1), 13-22 Three to five years following application of dolomite (calcium magnesium carbonate) on some forest catchments in the belgian area of the Ardenne, epilithic diatoms were sampled in two streams running on ... [more ▼] Three to five years following application of dolomite (calcium magnesium carbonate) on some forest catchments in the belgian area of the Ardenne, epilithic diatoms were sampled in two streams running on treated sites and in two streams running on untreated sites in order to evaluate the possible changes in the algal population. Typical acid water assemblages with Eunotia were observed. The dominant species was Eunotia exigua often found with E. rhomboidea or E. bilunaris. In the present study, no influence of the treatment can be demonstrated using these bioindicators. [less ▲] Detailed reference viewed: 49 (2 ULg) See detailAmendements de bassins versants dans les Ardennes belges : effets sur l’eau de percolation et l’eau à l’exutoire Carnol, Monique ULg Conference given outside the academic context (1997) Alors que des essais d’amendements en forêt se sont révélés peu rentables, un nouvel intérêt s’est manifesté pour ce type de traitement dans les années 1980, après les observations de jaunissement et de ... [more ▼] Alors que des essais d’amendements en forêt se sont révélés peu rentables, un nouvel intérêt s’est manifesté pour ce type de traitement dans les années 1980, après les observations de jaunissement et de chutes d’aiguilles inhabituelles, notamment chez l’épicéa. Les causes de ce ‘nouveau dépérissement forestier’, parmi lesquelles citons, l’acidification des sols, la saturation de l’écosystème en azote et les déséquilibres nutritionnels, sont supposées agir de manière synergique. Les forêts ardennaises n’ont pas été épargnées par ce phénomène, et des symptômes de dépérissement forestier ont été rapportés en 1983 par Weissen (Weissen et al., 1983). Ce dépérissement serait dû à une augmentation de la pollution atmosphérique exacerbant la déficience en magnésium des arbres, qui se développent sur les sols ardennais naturellement pauvres en magnésium (Weissen et al., 1990). L’amendement a donc été conseillé comme mesure de protection et de correction de l’acidification des sols et des déséquilibres nutritionnels chez les arbres. Cependant, des effets secondaires potentiels, en particulier sur l’eau à l’exutoire (nappes et eau potable) et sur la solution du sol (nutrition des arbres) doivent être évalués. Dans cette présentation, je résumerai les résultats d’une étude poursuivie dans 4 bassins versants boisés, en majorité, par l’épicéa commun (Picea abies [L.] Karst.). Les deux couples de bassins versants d’une taille d’environ 80 ha sont situées à la Croix Scaille (commune de Gedinne) et dans l’Hertogenwald (Hautes Fagnes), sur sol brun acide. Un bassin versant de chaque couple a été amendé par 3 T/ha de dolomie ((Ca, Mg)CO3 55/40) et de 200 kg/ha de K2SO4 en 1992 et 1993, respectivement. La pluie à découvert, les pluviolessivats (pluie interceptée par les arbres) et la solution du sol ont été analysés mensuellement, l’eau à l’exutoire toutes les 2 semaines. L’analyse en séries temporelles a été utilisée pour détecter des changements significatifs qui surviendraient dans les concentrations en éléments minéraux dans l’eau à l’exutoire et qui seraient dus à l’amendement. Par ailleurs, les flux entrants et sortants du bassin versant ont été calculés de manière à établir le bilan entrée-sortie des éléments dans la forêt et ainsi pouvoir évaluer les pertes de l’amendement vers le ruisseau. Dans le bassin des Hautes Fagnes, la dissolution de la dolomie a influencé de manière significative les concentrations à l’exutoire. Les concentrations en magnésium ont augmenté immédiatement après l’amendement (Fig. 1), probablement à cause de l’écoulement de l’eau de pluie dans les couches supérieures du sol. Quatre années après le traitement, elles restent toujours supérieures aux concentrations observées avant l’amendement. Néanmoins, les quantités de magnésium perdues à l’exutoire sont faibles par rapport aux doses apportées par l’amendement. Dans les 2 bassins amendés, les concentrations du calcium et des autres cations et anions majeurs de la solution du sol n’ont pas été influencées significativement par le traitement. Les concentrations en magnésium dans la solution du sol ont augmenté immédiatement et un an après l’amendement respectivement à environ 5 et 15 cm de profondeur. Les concentrations en calcium dans la solution du sol ont augmenté 3 ans après l’amendement. Ces résultats indiquent que, pour les sols étudiées et la dose d’amendement apportée, une grande partie de l’amendement est retenue dans les sols, et que, jusqu’à présent, les conséquences pour l’eau à l’exutoire sont peu importantes. En effet, seule la concentration en magnésium a augmenté de manière significative alors qu’aucun changement significatif n’a été détecté, jusqu'à présent, dans les teneurs en nitrates (Fig. 2) et en métaux lourds (Cd, Pb, Zn). On peut donc conclure que, sur base de nos analyses et dans la situation actuelle, l’eau de l’exutoire qui alimente le barrage-réservoir de la Gileppe n’a pas subi de modifications importantes à la suite de l’amendement. Il faut cependant souligner que la dissolution de l’amendement peut être lente dans les sols acides, et que des effets ‘à retardement’ sont possibles. De plus, une étude récente, comparant, « in situ », l’effet d’un amendement sur la solution du sol d’une chênaie et d’une pessière de même âge a montré une augmentation de la concentration en nitrates dans la solution de sol de la chênaie. Il faut donc rester prudent lors de l’extrapolation de ces résultats vers d’autres sites. Figure 1. Influence d’un amendement dolomitique (3 T/ha) sur les concentrations en magnésium à l’exutoire d’un bassin versant. Figure 2. Influence d’un amendement dolomitique (3 T/ha) sur les concentrations en nitrate à l’exutoire d’un bassin versant. Références Weissen, F., Letocart, H. & Van Praag, H.J., Bull. Soc. Roy. Bot. Belg. 2, 1-13 (1983) Weissen, F., Hambuckers, A., Van Praag, H.J. and Remacle, J., Plant Soil 128, 59-66 (1990). [less ▲] Detailed reference viewed: 48 (1 ULg) See detailNitrogen deposition and nitrification in coniferous forests’ Carnol, Monique ULg Doctoral thesis (1997) The increased inorganic nitrogen (N) deposition in the last decades has become a major concern for the health of forest ecosystems. High anthropogenic N emissions, mainly from fossil fuel combustion and ... [more ▼] The increased inorganic nitrogen (N) deposition in the last decades has become a major concern for the health of forest ecosystems. High anthropogenic N emissions, mainly from fossil fuel combustion and livestock agriculture, have resulted in both high gaseous concentrations and high deposition in rainfall and throughfall. In forest ecosystem, where N is no longer limiting to primary production due to high inputs, the excess N is thought to be related to forest decline and a concept of ‘N saturation ‘ has been developed. In particular, N in the form of NH4, in excess to plant and microbial demands could lead to soil acidification if nitrified in the soil and leached, causing loss of base cations or mobilisation of phytotoxic aluminium. Nutrient imbalances due to high soil solution NH4/cation ratios or damaged root systems may also occur. The fate of the incoming NH4 is central to determining the effects on the ecosystem, and is closely related to the controls of nitrification. Although this process has been intensely studied in pure cultures for some nitrifying bacteria, the organisms responsible and controlling factors in acid forest soils are still poorly understood. A better comprehension of the fate of NH4 deposition is necessary to determine ‘Critical Loads for N’, the threshold deposition not damaging to the ecosystem, which is used as a political tool for quantifying pollution limits. In this thesis, I focused on a) the effects of increased (NH4)2SO4 deposition on soil solution chemistry of six coniferous forest sites the presence of live roots, b) the impacts of (NH4)2SO4 deposition on Norway spruce (Picea abies [L.] Karst) and Scots pine (Pinus sylvestris L.) fine roots, and c) the controls of nitrification in an acid forest soil. The work was part of the CEC project ‘CORE’, investigating the effects of atmospheric pollution on nutrient turnover in soils. An identical field experiment was performed in six coniferous sites, situated in five European countries. Chronically increased NH4 deposition by 75 kg N ha-1 a-1 through (NH4)2SO4 application, demonstrated the contrasting responses of the different ecosystems. Soil solution concentrations and yearly ionic fluxes were analysed. (NH4)2SO4 treatment resulted in deposition of 79 to 93 kg N ha-1 a-1 at the different sites. In the two less acidic, clay/clay loam soils, only 6% of the added NH4 was lost through leaching. The two sandy soils lost up to 75% of the added NH4, and the two remaining sites lost ca. 25%. Leaching of added NH4 was thought to be related to soil physico-chemical characteristics, such as pH, C and N content and texture. NO3 leaching was increased at three sites, only 4-9 months after starting the (NH4)2SO4 treatment, with a maximum doubling of concentrations. One sandy soil failed to nitrify under any condition, and the other sandy soil showed high NO3 leaching under all treatments, but no increase due to increased N inputs. The presence of live roots reduced NO3 leaching in two sites, delaying the increase in soil solution NO3 concentrations in response to the (NH4)2SO4 deposition in one of them. In all nitrifying soils, soil solution NO3 concentrations were related to cation concentrations, with Al being the dominant cation in the more acid soils with low base saturation. This experiment demonstrated the importance of soil N storage capacity and nitrification potential in determining the consequences of increased NH4 deposition, and the strong relationship between NO3 and cation leaching. Ionic fluxes and soil solution chemistry were further analysed in one of the six sites (Grizedale, UK). In this Norway spruce stand on clay soil, NO3 fluxes were increased by increased (NH4)2SO4 deposition, and mainly balanced by increased Al losses. This soil had a pHH2O around 3.6, and was characterised by over 90% of the exchange complex being occupied by Al. Independent of treatment, soil solution changed from Ca to Al leaching during the 18 month field experiment, with a decrease in soil solution pH from 4.9 to 3.8. At the end of the experiment, soil solution Al concentrations were higher for the (NH4)2SO4 treatments. It was suggested that nitrification had caused the pH decrease, with a further lowering of the base saturation, linked to a abrupt increase in soil solution Al concentrations. The impacts of increased (NH4)2SO4 deposition and soil characteristics on Norway spruce root biomass and vitality, and on Norway spruce and Scots pine fine root chemistry, were investigated with an ingrowth core technique. The same experiment was performed in a Norway spruce stand on clay soil (Grizedale, UK) and a Scots pine stand on sandy soil (Wekerom, NL), using soil from each of the two sites. For Norway spruce, root biomass and numbers of fine root tips were higher in the organic than in the mineral horizon of the clay and sandy soils. This was related to higher fine root Al and lower Ca contents in the mineral horizon. Root biomass and the proportion of dead roots were higher in the clay soil, compared to the sandy soil, with higher root Al contents, despite lower soil solution Al concentrations than in the sandy soil. For Norway spruce, a negative correlation between root biomass and fine root Al content was established. Enhanced N deposition caused an increase in the total number of root tips and in the proportion of dead roots in the sandy soil. Effects of increased (NH4)2SO4 deposition on root biomass were not significant for the clay soil, yet caused increased fine root N content in the organic horizon for both species. Scots pine fine roots also showed higher Al and lower Ca contents in the mineral horizon. (NH4)2SO4 treatment caused increased fine root Al content and a decreased Mg/Al ratio in the mineral layer of the sandy soil, with opposite effects in the clay soil. This (NH4)2SO4 treatment effect in the sandy soil for Scots pine was the only indication of a potential adverse effect of (NH4)2SO4 deposition on fine roots. Results demonstrated the dominant importance of inherent soil characteristics and the stratification into soil horizons on fine root growth and chemical composition. The effects of temperature, throughfall volume and NH4 deposition on soil solution NO3 concentrations, N2O emissions and numbers of NH4 oxidisers were investigated for the Grizedale soil in a controlled laboratory experiment. Multiple regression and surface response analysis revealed temperature as the most important factor, with an optimum for NO3 leaching and numbers of NH4 oxidisers in the mineral horizon at 11°C. Volume acted independently of temperature with a minimum at 870 mm throughfall 2 weeks-1. The relatively low optimum temperature compared to other studies was explained by the minimum disturbance of the soil in the current study. NO3 fluxes increased quadratically with throughfall volume. N2O fluxes increased quadratically with temperature and throughfall volume, and showed high variability. It was suggested that the temperature optimum for net nitrification depended on the physico-chemical characteristics of the soil and on the activity of decomposers, by competition for O2 and NH4. Optimum temperatures may have been overestimated in previous studies using disturbed soils. The regression model for NO3 leaching derived from the laboratory experiment was applied to data from the previous field experiment and tested with different time intervals for temperature input parameters. A model including two-monthly mean temperatures yielded the best fit between measured and simulated values, as determined by correlation and minimum sum of squared residuals. Simulated NO3 leaching was over-estimated in the second part of the field study. The good correspondence between field temperature frequency distribution and the optimum temperature determined by the regression model, as well as the high correlation between measured and simulated values, demonstrated the adequacy of a quadratic model with a relatively low temperature optimum to describe field NO3 leaching, determined for the same soil with an identical sampling design. [less ▲] Detailed reference viewed: 38 (5 ULg) See detailWatershed Liming in the Belgian Ardennes : Effects on soil solution and streamwater chemistry Carnol, Monique ULg; Hambuckers, Alain ULg; Remacle, Jean ULg Conference (1997, June) Forest liming has received increased attention in the 1980s, when unusual needle yellowing and fall were observed in large parts of Europe and North America. This ‘new forest decline’ has been attributed ... [more ▼] Forest liming has received increased attention in the 1980s, when unusual needle yellowing and fall were observed in large parts of Europe and North America. This ‘new forest decline’ has been attributed to several causes acting individually or synergetically, amongst which were acidification, N saturation and nutritional imbalances. This time, liming did not aim at increased productivity, but as a counteracting measure to the soil acidification and to remove nutritional imbalances. The Belgian Ardennes were not exempt from this phenomena and symptoms of forest dieback were reported in 1983 by Weissen (Weissen et al.,1983). Soils are naturally poor in magnesium and the observed dieback was supposed to be the consequence of increased pollution exacerbating the deficiency in magnesium. A reduction in productivity and financial losses were predicted. Liming was suggested for prevention and correction, however possible side effects, in particular on soil solution (tree nutrition) and stream water chemistry (drinking water) needed to be evaluated. In this paper, we present results from a case study in four Picea abies watersheds in southern Belgium. The paired watersheds of approximately 80 ha were situated in the ‘Haute Ardenne’ and in the ‘Ardenne occidentale’ regions, on acid brown soils. One watershed of each pair was limed with 3 T/ha of fine ground dolomite ((Ca,Mg)CO3) 55/40 and 200 kg/ha K2SO4 in 1992 and 1993, respectively. Rainfall, throughfall and monolith lysimeter soil solution were analysed at monthly intervals, and runoff chemistry at two-weekly intervals (volume-weighed reconstructed daily samples). Time series intervention analysis was used as a tool to detect statistically significant changes in stream water chemistry due to the liming event, and fluxes were calculated to evaluate losses of the applied dolomitic lime to the catchment stream. Dolomite dissolution distinctively affected streamwater chemistry in the watershed situated in the Hautes Ardennes (Waroneu). Magnesium concentrations increased immediately after liming, most likely due to surface runoff. Four years after liming, concentrations were still higher than prior to liming. However, the proportions of magnesium lost were relatively low compared to the dose applied. Calcium concentrations did not change after liming in either catchment, nor did the concentrations of the major cations and anions measured. In the monolith lysimeters, magnesium concentrations increased immediately after liming under the organic horizons, and one year after liming under the mineral horizons. Calcium concentrations increased only three years after the application of lime under the organic and mineral horizons. These results led to the conclusions that for the soils under study and the doses applied, a major part of the lime was retained by the soil system, and that consequences on water chemistry were minor. [less ▲] Detailed reference viewed: 14 (1 ULg) Full Text Peer Reviewed See detailSoil Solution Nitrogen and Cations Influenced by (NH4)2SO4 Deposition in a Coniferous Forest Carnol, Monique ULg; Ineson, Phil; Dickinson, A. L. in Environmental Pollution (1997), 97(1-2), 1-10 The effects of chronically enhanced (NH(4))(2)SO(4) deposition on ion concentrations in soil solution and ionic fluxes were investigated in a Picea abies plot at Grizedale forest, NW England. Soil cores ... [more ▼] The effects of chronically enhanced (NH(4))(2)SO(4) deposition on ion concentrations in soil solution and ionic fluxes were investigated in a Picea abies plot at Grizedale forest, NW England. Soil cores closed at the base and containing a ceramic suction cup sampler were 'roofed' and watered every 2 weeks with bulk throughfall collected in the field. Treatments consisted of the inclusion of living roots from mature trees in the lysimeters and increasing (NH(4))(2)SO(4) deposition (NS treatment) to ambient + 75 kg N ha(-1) a(-1). Rainfall, throughfall and soil solutions were collected every 2 weeks during 18 months, and analysed for major cations and anions. NO(3)(-) fluxes significantly increased following NS treatment, and were balanced by increased Al(3+) losses. Increased SO(4)(2-) concentrations played a minor role in controlling soil solution cation concentrations. The soil exchange complex was dominated by Al and, during the experimental period, cores of all treatments 'switched' from Ca(2+) to Al(3+) leaching, leading to mean [Formula: see text] molar ratios in soil solution of NS treated cores of 0.24. The experiment confirmed that the most sensitive soils to acidification (through deposition or changing environmental conditions) are those with low base saturation, and with a pH in the lower Ca, or Al buffer ranges. [less ▲] Detailed reference viewed: 16 (0 ULg)    
 Android中微信抢红包插件原理解析及开发思路_Android--HTML5中文学习网 今晚买特马 html5中文学习网 您的位置: 首页?>?android ? 正文 Android中微信抢红包插件原理解析及开发思路_Android [ ] 已经帮助:人解决问题 一、前言m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 自从去年中微信添加抢红包的功能,微信的电商之旅算是正式开始正式火爆起来。但是作为Android开发者来说,我们在抢红包的同时意识到了很多问题,就是手动去抢红包的速度慢了,当然这些有很多原因导致了。或许是网络的原因,而且这个也是最大的原因。但是其他的不可忽略的因素也是要考虑到进去的,比如在手机充电锁屏的时候,我们并不知道有人已经开始发红包了,那么这时候也是让我们丧失了一大批红包的原因。那么关于网络的问题,我们开发者可能用相关技术无法解决(当然在Google和Facebook看来的话,他们的理想是能够在任何地方都能连接互联网,当然在偏远的农村也是,不过我们期待他们有一天能够普及开来。到时候才是真正的互联网)。扯得有点远了。我们回归到正题,今天我们来看看使用技术来解决其他非网络问题。在充电锁屏的时候也可以自动帮我们抢红包。而且你要知道,机器抢红包的准确率是100%的,这个也许就是人和机器的区别。那么保证抢得准确率是100%的话,那就依赖于我们高效准确的算法实现了。下面就来看看原理实现。m3aHTML5中文学习网 - HTML5先行者学习网 当去年我看到抢红包那么火爆的时候,当时作为一个开发者心里是多么渴望开发一个插件出来,可是当时我们能想到的就是使用:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 adb shell monkeym3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 命令去模拟点击屏幕,但是那种方式有一个问题就是是无头绪的盲目点击,所以几乎会出现误点,点击成功率极其低下。所以当时就没有想到其他方法了,因为最近做了有关辅助功能相关的工作的时候,那么就发现这个功能可以用于抢红包。m3aHTML5中文学习网 - HTML5先行者学习网 其实现在我们可以去各大市场搜索一下看到,有很多抢红包的插件了。当然我们并不是用于商业化,这里只是来解析一下原理。我们会发现那些插件都有一个共同的特点是:第一步都是引导用户去开启辅助功能。m3aHTML5中文学习网 - HTML5先行者学习网 二、原理解析m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 关于辅助功能(AccessibilityService),如果又不了解的同学可以去Google一下,这个功能其实很有用的,但是他的出现的出发点是给那些肢体上有障碍的人使用的,比如手指不健全的用户,怎么才能滑动屏幕,然后打开一个应用呢?那么辅助功能就是干这些事,他的功能其实就是可以概括两句话:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第一、寻找到我们想要的View节点m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第二、然后模拟点击,实现特定功能m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们知道Android中的View体系是一个树形结构,那么每一个View就是一个节点。所以我们可以查找到指定的节点,那么我们该如何查找到我们想要的节点呢?这里我们先看一下辅助功能(AccessibilityService)的用法m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第一步、我们需要集成AccessibilityService类m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们需要自定一个Service然后继承AccessibilityService,当然还需要在AndroidManifest.xml中声明这个服务:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第二步、声明权限和配置m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这个服务需要注明一个权限:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE" m3aHTML5中文学习网 - HTML5先行者学习网 当然还要一个meta-data的声明,这个声明是对这个AccessibilityService的配置。我们看一下配置文件内容:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这里我们看到有很多选项,我们看一下常用的几个属性:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 1、android:accessibilityEventTypes="typeAllMask"m3aHTML5中文学习网 - HTML5先行者学习网 看属性名也差不多可以明白,这个是用来设置响应事件的类型,typeAllMask当然就是响应所有类型的事件了。当然还有单击、长按、滑动等。m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 2、android:accessibilityFeedbackType="feedbackSpoken"m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 设置回馈给用户的方式,有语音播出和振动。可以配置一些TTS引擎,让它实现发音。m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 3、android:notificationTimeout="100"m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 响应时间的设置就不用多说了m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 4、android:packageNames="com.example.android.apis"m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 可以指定响应某个应用的事件,这里因为要响应所有应用的事件,所以不填,默认就是响应所有应用的事件。比如我们写一个微信抢红包的辅助程序,就可以在这里填写微信的包名,便可以监听微信产生的事件了。m3aHTML5中文学习网 - HTML5先行者学习网 注意:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 1、我们这些配置信息除了在xml中定义,同样也可以在代码中定义,我们一般都是在onServiceConnected()方法里进行m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 @Override protected void onServiceConnected() { AccessibilityServiceInfo info = getServiceInfo(); info.eventTypes = AccessibilityEvent.TYPES_ALL_MASK; info.feedbackType = AccessibilityServiceInfo.FEEDBACK_SPOKEN; info.notificationTimeout = 100; setServiceInfo(info); info.packageNames = new String[]{"xxx.xxx.xxx", "yyy.yyy.yyy","...."}; setServiceInfo(info); super.onServiceConnected(); } 2、这里我们一般都会在这里写上我们需要监听的应用的包名,但是有时候我们需要监听多个应用,那么这时候我们该怎么办呢?m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这时候我们可以这么做:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第一种:我们在代码中注册多个应用的包名,从而可以监听多个应用m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 @Override protected void onServiceConnected() { AccessibilityServiceInfo info = getServiceInfo(); //这里可以设置多个包名,监听多个应用 info.packageNames = new String[]{"xxx.xxx.xxx", "yyy.yyy.yyy","...."}; setServiceInfo(info); super.onServiceConnected(); } 第二种:我们在onAccessibilityEvent事件监听的方法中做包名的过滤(这种方式最常用)m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 @Override public void onAccessibilityEvent(AccessibilityEvent event) { String pkgName = event.getPackageName().toString(); if("xxx.xxx.xxx".equals(pkgName)){ }else if("yyy.yyy.yyy".equals(pkgName)){ }else if("....".equals(pkgName)){ } } 第三步、在onAccessibilityEvent方法中监听指定的事件m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 比如我们需要监听有通知栏消息的事件:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 @Override public void onAccessibilityEvent(AccessibilityEvent event) { int eventType = event.getEventType(); switch (eventType) { case AccessibilityEvent.TYPE_NOTIFICATION_STATE_CHANGED: //....... } } 这个事件类型很多的,我们可以查看AccessibilityEvent类的源码:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 @Deprecated public static final int MAX_TEXT_LENGTH = 500; /** * Represents the event of clicking on a {@link android.view.View} like * {@link android.widget.Button}, {@link android.widget.CompoundButton}, etc. */ public static final int TYPE_VIEW_CLICKED = 0x00000001; /** * Represents the event of long clicking on a {@link android.view.View} like * {@link android.widget.Button}, {@link android.widget.CompoundButton}, etc. */ public static final int TYPE_VIEW_LONG_CLICKED = 0x00000002; /** * Represents the event of selecting an item usually in the context of an * {@link android.widget.AdapterView}. */ public static final int TYPE_VIEW_SELECTED = 0x00000004; /** * Represents the event of setting input focus of a {@link android.view.View}. */ public static final int TYPE_VIEW_FOCUSED = 0x00000008; /** * Represents the event of changing the text of an {@link android.widget.EditText}. */ public static final int TYPE_VIEW_TEXT_CHANGED = 0x00000010; /** * Represents the event of opening a {@link android.widget.PopupWindow}, * {@link android.view.Menu}, {@link android.app.Dialog}, etc. */ public static final int TYPE_WINDOW_STATE_CHANGED = 0x00000020; /** * Represents the event showing a {@link android.app.Notification}. */ public static final int TYPE_NOTIFICATION_STATE_CHANGED = 0x00000040; /** * Represents the event of a hover enter over a {@link android.view.View}. */ public static final int TYPE_VIEW_HOVER_ENTER = 0x00000080; /** * Represents the event of a hover exit over a {@link android.view.View}. */ public static final int TYPE_VIEW_HOVER_EXIT = 0x00000100; /** * Represents the event of starting a touch exploration gesture. */ public static final int TYPE_TOUCH_EXPLORATION_GESTURE_START = 0x00000200; /** * Represents the event of ending a touch exploration gesture. */ public static final int TYPE_TOUCH_EXPLORATION_GESTURE_END = 0x00000400; /** * Represents the event of changing the content of a window and more * specifically the sub-tree rooted at the event's source. */ public static final int TYPE_WINDOW_CONTENT_CHANGED = 0x00000800; /** * Represents the event of scrolling a view. */ public static final int TYPE_VIEW_SCROLLED = 0x00001000; /** * Represents the event of changing the selection in an {@link android.widget.EditText}. */ public static final int TYPE_VIEW_TEXT_SELECTION_CHANGED = 0x00002000; /** * Represents the event of an application making an announcement. */ public static final int TYPE_ANNOUNCEMENT = 0x00004000; /** * Represents the event of gaining accessibility focus. */ public static final int TYPE_VIEW_ACCESSIBILITY_FOCUSED = 0x00008000; /** * Represents the event of clearing accessibility focus. */ public static final int TYPE_VIEW_ACCESSIBILITY_FOCUS_CLEARED = 0x00010000; /** * Represents the event of traversing the text of a view at a given movement granularity. */ public static final int TYPE_VIEW_TEXT_TRAVERSED_AT_MOVEMENT_GRANULARITY = 0x00020000; /** * Represents the event of beginning gesture detection. */ public static final int TYPE_GESTURE_DETECTION_START = 0x00040000; /** * Represents the event of ending gesture detection. */ public static final int TYPE_GESTURE_DETECTION_END = 0x00080000; /** * Represents the event of the user starting to touch the screen. */ public static final int TYPE_TOUCH_INTERACTION_START = 0x00100000; /** * Represents the event of the user ending to touch the screen. */ public static final int TYPE_TOUCH_INTERACTION_END = 0x00200000; /** * Change type for {@link #TYPE_WINDOW_CONTENT_CHANGED} event: * The type of change is not defined. */ public static final int CONTENT_CHANGE_TYPE_UNDEFINED = 0x00000000; /** * Change type for {@link #TYPE_WINDOW_CONTENT_CHANGED} event: * A node in the subtree rooted at the source node was added or removed. */ public static final int CONTENT_CHANGE_TYPE_SUBTREE = 0x00000001; /** * Change type for {@link #TYPE_WINDOW_CONTENT_CHANGED} event: * The node's text changed. */ public static final int CONTENT_CHANGE_TYPE_TEXT = 0x00000002; /** * Change type for {@link #TYPE_WINDOW_CONTENT_CHANGED} event: * The node's content description changed. */ public static final int CONTENT_CHANGE_TYPE_CONTENT_DESCRIPTION = 0x00000004; 这里有很多事件,这些事件我们通过名字就可以看出来有很多我们可能都知道,比如当窗口发生变化的时候,当某个View被点击了,被滚动了等消息都是可以知道的。那么我们有了这些事件我们就可以做我们的事情了,因为我们知道事件触发了。m3aHTML5中文学习网 - HTML5先行者学习网 第四步、查找到我们想要处理的节点Viewm3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这里系统提供了两个方法让我们来进行查找想要的节点Viewm3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第一种是通过节点View的Text内容来查找m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 findAccessibilityNodeInfosByText("查找内容")m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这种方式查找,就是像TextView,Button等View有文本内容的,可以使用这种方式快速的找到。m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第二种是通过节点View在xml布局中的id名称m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 findAccessibilityNodeInfosByViewId("@id/xxx")m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这个一般很难知道,但是我们在查找系统控件的时候还是可以做的,因为系统的控件的id是可以知道的,而且是统一的。m3aHTML5中文学习网 - HTML5先行者学习网 (关于这两个方法我们在写网页爬虫程序的时候可能知道,在html中通过tag/name/id等信息可以找到一个节点,原理都类似)m3aHTML5中文学习网 - HTML5先行者学习网 第五步、模拟点击指定事件m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们找到我们想要的View节点,调用方法模拟事件:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 performAction(AccessibilityNodeInfo.ACTION_CLICK)m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 调用这个方法即可,当然这里的参数就是指定事件的名称,这个和AccessibilityEvent中监听的那些事件是一一对应的,这里是模拟点击事件,我们当然可以模拟View的滚动事件,长按事件等。m3aHTML5中文学习网 - HTML5先行者学习网 三、实战案例:微信抢红包插件m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 上面我们就介绍了一个辅助功能开发的具体步骤,那么下面就通过一个简单的例子,来实战一下m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 例子:微信自动抢红包插件m3aHTML5中文学习网 - HTML5先行者学习网 首先我们来看一下微信抢红包的流程:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 第一步、我们在通知栏会接收到一个微信红包的消息m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们监听通知栏事件:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 AccessibilityEvent.TYPE_NOTIFICATION_STATE_CHANGEDm3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 然后查看通知栏的消息中是否有:[微信红包] 的文本内容m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 是的话,就走进入第二步m3aHTML5中文学习网 - HTML5先行者学习网 第二步、我们模拟打开通知栏m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 打开微信如下图:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们查找包含有:领取红包 的文本内容的节点View,然后模拟点击,进入第三步:m3aHTML5中文学习网 - HTML5先行者学习网 第三步、我们点击领取红包m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 '如下图:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这里我们在查找包含有:拆红包 的文本内容的节点View,然后模拟点击m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 下面我们来看一下代码中的具体实现:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 package krelve.demo.rob; import java.util.List; import android.accessibilityservice.AccessibilityService; import android.accessibilityservice.AccessibilityServiceInfo; import android.annotation.SuppressLint; import android.app.Notification; import android.app.PendingIntent; import android.app.PendingIntent.CanceledException; import android.util.Log; import android.view.accessibility.AccessibilityEvent; import android.view.accessibility.AccessibilityNodeInfo; public class RobMoney extends AccessibilityService { @Override public void onAccessibilityEvent(AccessibilityEvent event) { int eventType = event.getEventType(); switch (eventType) { //第一步:监听通知栏消息 case AccessibilityEvent.TYPE_NOTIFICATION_STATE_CHANGED: List texts = event.getText(); if (!texts.isEmpty()) { for (CharSequence text : texts) { String content = text.toString(); Log.i("demo", "text:"+content); if (content.contains("[微信红包]")) { //模拟打开通知栏消息 if (event.getParcelableData() != null && event.getParcelableData() instanceof Notification) { Notification notification = (Notification) event.getParcelableData(); PendingIntent pendingIntent = notification.contentIntent; try { pendingIntent.send(); } catch (CanceledException e) { e.printStackTrace(); } } } } } break; //第二步:监听是否进入微信红包消息界面 case AccessibilityEvent.TYPE_WINDOW_STATE_CHANGED: String className = event.getClassName().toString(); if (className.equals("com.tencent.mm.ui.LauncherUI")) { //开始抢红包 getPacket(); } else if (className.equals("com.tencent.mm.plugin.luckymoney.ui.LuckyMoneyReceiveUI")) { //开始打开红包 openPacket(); } break; } } /** * 查找到 */ @SuppressLint("NewApi") private void openPacket() { AccessibilityNodeInfo nodeInfo = getRootInActiveWindow(); if (nodeInfo != null) { List list = nodeInfo .findAccessibilityNodeInfosByText("抢红包"); for (AccessibilityNodeInfo n : list) { n.performAction(AccessibilityNodeInfo.ACTION_CLICK); } } } @SuppressLint("NewApi") private void getPacket() { AccessibilityNodeInfo rootNode = getRootInActiveWindow(); recycle(rootNode); } /** * 打印一个节点的结构 * @param info */ @SuppressLint("NewApi") public void recycle(AccessibilityNodeInfo info) { if (info.getChildCount() == 0) { if(info.getText() != null){ if("领取红包".equals(info.getText().toString())){ //这里有一个问题需要注意,就是需要找到一个可以点击的View Log.i("demo", "Click"+",isClick:"+info.isClickable()); info.performAction(AccessibilityNodeInfo.ACTION_CLICK); AccessibilityNodeInfo parent = info.getParent(); while(parent != null){ Log.i("demo", "parent isClick:"+parent.isClickable()); if(parent.isClickable()){ parent.performAction(AccessibilityNodeInfo.ACTION_CLICK); break; } parent = parent.getParent(); } } } } else { for (int i = 0; i < info.getChildCount(); i++) { if(info.getChild(i)!=null){ recycle(info.getChild(i)); } } } } @Override public void onInterrupt() { } } 代码没什么好说的了,按照我们之前说的三个步骤来就可以了,但是这里需要注意点细节上的问题:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 1、我们在监听到通知栏的消息的时候,调用如下代码来进行通知栏的消息点击m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 if (content.contains("[微信红包]")) { //模拟打开通知栏消息 if (event.getParcelableData() != null && event.getParcelableData() instanceof Notification) { Notification notification = (Notification) event.getParcelableData(); PendingIntent pendingIntent = notification.contentIntent; try { pendingIntent.send(); } catch (CanceledException e) { e.printStackTrace(); } } } 2、我们在模拟点击通知栏消息之后,还是需要监听:AccessibilityEvent.TYPE_WINDOW_STATE_CHANGED 这个事件,这个事件我们以后会经常用到,这个事件就是在窗口发生改变的时候发出来的事件,很常用的,比如我们可以通过这个事件来监听TopActivity,然后得到包名,这也是一个实现应用锁的一个原理。m3aHTML5中文学习网 - HTML5先行者学习网 3、我们在查找领取红包的时候,模拟点击的时候做了一个工作,就是从“领取红包”文本的控件View网上查找,查找到一个可以点击的View出来,然后模拟点击m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 if(info.getText() != null){ if("领取红包".equals(info.getText().toString())){ //这里有一个问题需要注意,就是需要找到一个可以点击的View Log.i("demo", "Click"+",isClick:"+info.isClickable()); info.performAction(AccessibilityNodeInfo.ACTION_CLICK); AccessibilityNodeInfo parent = info.getParent(); while(parent != null){ Log.i("demo", "parent isClick:"+parent.isClickable()); if(parent.isClickable()){ parent.performAction(AccessibilityNodeInfo.ACTION_CLICK); break; } parent = parent.getParent(); } } } 这里为什么这么做,其实原理很简单,因为我们不知道微信他的界面布局,也不知道他对哪个View进行了setOnClickListener。我们可以写一个例子,performAction方法只对调用了setOnClickListener方法的View模拟点击才有效,其实看View的源码也是可以看出来的.这里就不多解释了。所以我们就需要得到一个View节点之后,从下往上找,直到找到一个可以click的View为止。m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 技术延展:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们其实还可以使用DDMS工具里的Dump View Hierarchy For UI Automator 去分析微信UI结构,这个方法也是我后面才发现的,比上面的代码更有效,如下图:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 这里我们可以看到View的详细布局,还有每个View的属性,还有很重要的信息resource-id,这个就是我们在xml中定义的id,这个id我们也可以使用前面说到的findAccessibilityNodeInfosByViewId("@id/xxx")来查找控件了m3aHTML5中文学习网 - HTML5先行者学习网 这个也算是学习了,学会使用DDMS来分析View结构。m3aHTML5中文学习网 - HTML5先行者学习网 四、延展m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 关于微信抢红包的原理解析上面已经做了分析了,但是要想做到极致,这里还有很多问题的,比如我们还需要过滤一些已经领取过的红包,这样的话效率也是很高的。这个都是算法精确的问题了,我想在这里说的是,我们不仅可以用辅助功能来实现抢红包,还可以实现很多功能,比如m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 1、静默安装m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 对于这两个要求,我们或许很难得到,那么现在如果有了辅助功能,我们就好做了:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们可以监听系统的这个安装界面,然后得到安装节点View,然后模拟点击即可,卸载也是同样的原理m3aHTML5中文学习网 - HTML5先行者学习网 2、强制停止应用m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们知道Android中停止应用有很多方法,kill进程,stopService,但是这些方法,有一些应用它们都是有对策的,那么我们之前用到的强制停止的方法是获取root权限调用系统的forceStop的api来停止,但是前提还是有root。那么现在如果我们有了辅助功能的话,我们可以这么做:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 我们可以监听系统的应用详情页面,然后找到:结束运行的节点View,然后模拟点击即可m3aHTML5中文学习网 - HTML5先行者学习网 当然上面我就说了两个简单的例子,还有很多辅助功能都是可以做的。他的好处就是不需要root权限。但是他也是需要用户授权的:m3aHTML5中文学习网 - HTML5先行者学习网 m3aHTML5中文学习网 - HTML5先行者学习网 如果用户没有授权的话,那么所有的工作都没办法开始了,所以说这个方法也不是万能的。当然说句题外话:有了辅助功能的话,他的危险性比root之后的危险性更大,比如我们上面的抢红包插件,其实我们稍作修改,就可以获取微信通讯录信息,微信支付的密码。这些事都是可以做的,所以说,我们在作为用户的时候,进行授权的时候还是需要三思而后行。m3aHTML5中文学习网 - HTML5先行者学习网 五、总结m3aHTML5中文学习网 - HTML5先行者学习网 关于辅助功能,之前没有太多的接触,是在一次工作中用到了这个功能,就去学习了一下,作为自己的兴趣,就延展了学习了如何写一个微信抢红包的插件,同时可以考虑了使用辅助功能能够做我们之前需要root做的事情。当然辅助功能是google对于肢体上有障碍的人开发出来的一个功能,我们开发者或许使用这个功能,可以做一下产品的拓展功能,当然这些是google没有想到的事情,但是这个至少是我们开发者在以后的开发道路上的一个解决问题的一个办法和途径,谨记此功能!m3aHTML5中文学习网 - HTML5先行者学习网 (责任编辑:) 推荐书籍 推荐资讯 关于HTML5先行者 - 联系我们 - 广告服务 - 友情链接 - 网站地图 - 版权声明 - 人才招聘 - 帮助
What Is A Hood Used For In The Chemistry Laboratory? Discover Its Importance! Spread the love The chemistry laboratory is a place where various chemical reactions and experiments are performed. Safety is always the top priority since these chemicals can be dangerous if mishandled. One of the essential safety equipment in a chemistry laboratory is called the hood, also known as a fume hood or exhaust hood. A hood may look like a simple device, but it serves an important purpose during lab work. It’s often installed on the benchtop, with a clear shield to separate the user from the potentially hazardous chemicals or gases that might escape from an experiment. This shield also typically includes a sash that further protects the user by regulating airflow and preventing splashes when opened. The hood operates through its ventilation system that draws the air towards the back, then outside to the building’s HVAC (heating, ventilation, and air-conditioning) system or via a blower. The suction force created moves any harmful vapors or gases away from the user, securing their safety while performing tasks under necessary conditions for the experiment. “The importance of using a hood in a chemistry laboratory cannot be underestimated. It provides protection against harmful substances and ensures proper ventilation so that you and your colleagues remain safe.” The hood plays a vital role in ensuring chemistry laboratories’ safety. Without this crucial piece of equipment, everyone involved in lab work could face significant risks and potential exposure to dangerous substances. Table of Contents show Creating a Safe Work Environment In a chemistry laboratory, safety should be the priority. One way to ensure safety is to create a safe work environment where employees can work comfortably without worrying about potential hazards that could result in injuries or accidents. The following are measures that laboratories can take to achieve this goal. Providing Adequate Safety Training One of the most critical ways to create a safe working environment is providing adequate safety training for all personnel working in the laboratory. Training should cover both general safety precautions as well as procedures specific to the lab equipment available. Workers must understand how to use protective gear and emergency equipment and identify hazardous chemicals to minimize risks. When new staff members arrive at the lab, they must also pass strict safety tests before starting their work in the field. “Safety doesn’t happen by accident.” – Unknown Implementing Safety Procedures Safety procedures are another essential factor to maintain a safe laboratory environment. Laboratory personnel need to follow strict guidelines regarding chemical usage, storage, and disposal. All safety protocols should be followed to prevent spills or other related accidents, such as avoiding eating, drinking, smoking, or wearing open-toed shoes while in the laboratory. Prohibiting unauthorized entry is also necessary to limit access to sensitive areas within the facility. “The key to any safety program is making sure that everyone involved knows the rules and has the knowledge to follow them.” -Unknown Regular Safety Inspections Conducting regular safety inspections is vital to sustaining a safe laboratory environment. These inspections aim to identify any hazards that require attention in advance before incidents occur. It’s good practice to appoint an individual responsible for conducting these reviews periodically to check whether the lab meets safety standards set forth by regulatory agencies. Corrective actions put in place after the inspections are crucial to prevent any new incidents from happening. “Safety is not an intellectual exercise to keep us in work. It is a matter of life and death. It is the sum of our contributions to safety management that determines whether the people we work with live or die”. – Sir Brian Appleton Encouraging Employee Involvement in Safety Involving laboratory personnel in the safety efforts by encouraging suggestions on better ways of doing things can help reduce potential hazards, which leads to a safer environment overall. Engage lab staff in discussions regarding safety meetings and share information about any safety-related concerns. Workers should be proactive concerning their welfare as their presence at the facility likely means they’re staking their physical health on safety protocols being adhered to strictly. “Safety must be everyone’s priority when working in hazardous environments.” -Michael Brauer • Adequate safety training is essential for all personnel working in a lab. • Safety procedures aim to maintain a safe lab while mitigating risks. • Regular safety inspections can identify hazards needing attention before an incident occurs. • Employee involvement boosts a safer lab environment through feedback and worker proactivity. All workers deserve a safe work environment where everyone feels secure to perform assigned tasks accordingly. Laboratories need to take proper steps towards facilitating employee safety because it drives productivity if accompanied by quality results. Adequate safety training, implementing safety procedures, conducting regular safety inspections – these measures ought to be taken seriously for the continuous excellent performance that hazard-free labs bring forward. Protecting Against Chemical Exposure Using Protective Equipment In a chemistry laboratory, it is important to wear proper protective equipment to protect against chemical exposure. This includes wearing gloves, safety glasses or goggles, and lab coats. The type of protective equipment used depends on the chemicals being handled and their properties. The use of personal protective equipment not only prevents chemical absorption through the skin but also inhalation and ingestion. For instance, when using hazardous materials for an experiment, a full face respirator can be used to filter out harmful chemicals from the air. “When working in a lab with chemicals, always wear appropriate PPE including goggles, gloves, and a lab coat.” – Consumer Product Safety Commission Proper Chemical Storage To prevent accidental spills and exposure to hazardous chemicals, it is important to store them properly. Chemicals should be stored in designated areas where they will not mix unintentionally. Flammable or explosive chemicals must be kept away from direct sunlight or heat sources to avoid ignition. Moreover, acids and bases need to be stored separately because they may react violently if mixed together. The containers that hold chemicals should be labeled with their names, hazards, and date received so that users know what they are handling. Similarly, old or expired chemicals should be disposed of promptly and not left around in the lab for future use. “Store all chemicals carefully and separately to prevent interactions between incompatible materials” – Center for Disease Control and Prevention Regular Air Quality Checks Chemicals release vapors into the air that can cause respiratory problems and allergic reactions, among other health issues. Since these vapors cannot be seen, smelled, or tasted, it is important to regularly test air quality in the lab. Air quality tests can be carried out to detect the presence of harmful chemicals in the air and ensure safe levels are maintained. It is recommended that this test should be done every year. “The periodic determination of airborne contaminant concentrations protects employees from occupational disease” – Occupational Safety and Health Administration Training on Chemical Handling and Disposal It is essential that laboratory workers receive adequate training in handling, storing, and disposing of chemicals safely. They need to know about the risks associated with each chemical they work with as well as how to respond in case of an emergency. Chemical waste generated during experiments must be disposed of properly rather than being flushed down the drain or thrown into the trash. The proper disposal methods involve segregating the waste based on its compatibility, labeling it clearly, and storing until a licensed waste-handling facility disposes of it. “Chemicals pose many potential health hazards; appropriate care must be used when working with them. Always read and heed warning labels.” – National Science Teachers Association In conclusion, laboratories which handle chemical substances require strict adherence to guidelines for safety purposes. This involves using protective equipment, properly storing hazardous materials, regularly checking air quality, and providing training on chemical handling and disposal. Failing to follow these precautions can lead to dangerous accidents and even fatal consequences. By following these safety procedures, laboratory staff can ensure everyone’s safety while performing critical researches. Preventing Contamination In a chemistry laboratory, the hood is used to prevent contamination from chemicals. This can be achieved by following certain protocols for cleanliness and waste disposal, as well as regular cleaning and disinfecting of equipment. Establishing Cleaning Protocols One of the most important ways to prevent contamination in a chemistry laboratory is to establish specific cleaning protocols. According to Chemical Safety Facts, surfaces in chemical laboratories should be cleaned regularly with appropriate cleaning solutions that are intended to remove residues specific to those chemicals. To minimize cross-contamination, it is best to use dedicated equipment for each type of chemical under use. This minimizes the risk of mixing dangerous chemicals together and causing an unwanted reaction. Providing Hand Sanitizers and Soap Another effective way to keep a lab clean is by providing readily available hand sanitizers and soap. Journal of Occupational Health recommends placing dispensers or bottles of hand sanitizer and soap near the entrance of the laboratory, sinks, central bench tops, and other areas where workers are expected to handle materials or come into contact with common touchpoints. It is necessary to train your workforce on how to properly wash their hands using soap and water, scrubbing for at least 20 seconds before rinsing. Encourage them to sanitize frequently throughout the day to reduce the spread of germs and bacteria. Proper Disposal of Waste The proper disposal of waste generated during experiments is another key component of preventing contamination in a laboratory. This includes leftover chemicals, contaminated glassware, and biological hazards such as bacteria cultures. The Environmental Protection Agency states that all hazardous waste must be properly identified, classified, packaged, labeled, and transported according to applicable federal and state regulations. It is important to segregate different types of waste, and chemicals that are incompatible need to be stored separately for disposal purposes. Regular Cleaning and Disinfecting of Equipment A clean lab is crucial in ensuring a contamination-free environment. In addition to following certain protocols, regular cleaning and disinfecting of lab equipment such as fume hoods will ensure optimal efficiency and prevent possible hazardous incidents from occurring. The National Institute for Occupational Safety and Health recommends using disinfectants such as bleach solutions or hydrogen peroxide on surfaces regularly when handling hazardous materials. Also, it is important to verify that the disinfection solution has been neutralized before disposing of any contaminated material. • In summary, preventing contamination in a chemistry laboratory is achieved by • Following specific cleaning protocols (dedicated to each type of chemical use), • Supplying readily available hand sanitizers and soap, • Properly identifying, classifying, packaging, labeling, and transporting waste generated during experiments according to applicable federal and state regulations, and • Regularly cleaning and disinfecting lab equipment such as fume hoods with appropriate disinfectant solution. “I think we inherently know how to handle some hazardous things; however, we also want to make sure our employees protect themselves while performing their duties.” -Ronyell Bell, industrial hygiene manager at Jet Propulsion Laboratory Properly Ventilating Hazardous Materials Hazardous materials are commonly used in chemistry laboratories for various experiments and research. These chemicals can pose serious health risks to personnel if not properly handled. Proper ventilation systems are essential to ensure the safety of people working with hazardous materials. Installing Proper Ventilation Systems The installation of proper ventilation systems is crucial for a safe workplace environment. Extracting fumes and controlling airborne contaminants can be accomplished by using ventilation systems such as fume hoods, high-efficiency particulate air (HEPA) filters, or local exhaust ventilation (LEV). Fume hoods suck out toxic gases and vapors generated during experiments and discharge them outside the laboratory through the ductwork. HEPA filters work by removing particles that are too small for normal filtration, it captures tiny dust and helps reduce exposure to harmful aerosols. Local exhaust ventilation (LEV) works by extracting contaminated air from a specific area which is then directed via ducts to an extraction fan and released outside the building. This type of system provides efficient control over localized chemical emissions from different points within the lab. Regularly Checking Ventilation Systems A poorly functioning ventilation system is a potential danger. Regular checks of the ventilation system are necessary to make sure they’re performing correctly. Malfunctioning equipment or blocked filters could lead to dangerous levels of toxic substances in the air inside the lab. Tests must also include determining whether standard maintenance practices have been followed. Components should be regularly cleaned and filters should be replaced often at least every six months or more frequently depending on usage for optimum performance levels. A functional alarm mechanism should be put into place to alert workers if there is something wrong with the ventilation system. Proper Use of Fume Hoods Although fume hoods are commonly used in laboratories, understanding their proper use is essential for safeguarding your health and productivity. A properly working hood should be able to draw air consistently into the enclosure, creating negative pressure that keeps toxic gases away from the operator. It’s a good practice to keep the sash of the fume hood as low as possible when conducting experiments. The lower the opening, the greater the capture velocity will be and the better protected operators will be from hazardous emissions. NIOSH (National Institute for Occupational Safety and Health) recommends keeping the sash below the maximum height of 18 inches at all times except during brief periods of activity or experimentation where workers need full access to the work area. “One key factor for improving safety in chemistry labs is by ensuring adequate provisions for ventilation are made” -Dr. Peter Jeschke • A clean, organized workspace can also contribute towards enhancing the functionality of fume hoods and other ventilation systems. • Only trained individuals who understand how to handle hazardous materials cautiously should operate fume hoods. • The area surrounding the fume hood should be restricted and monitored regularly to ensure only authorized personnel enter the space. Finally, choosing the appropriate ventilation mechanism depends on various factors such as the type of experiment being run, its scale, quantity, configuration, and toxicity level of chemicals involved. Regular maintenance, monitoring, and effective training programs for lab staff must be implemented alongside these ventilation systems to guarantee maximum safety and protection against harmful contaminants within the laboratory environment. Allowing for Controlled Experiments A hood is an essential tool in a chemistry laboratory. It provides a safe and controlled environment for performing experiments that involve harmful chemicals or fumes. This makes it possible to carry out reactions with the utmost precision while minimizing the risk of contamination and exposure to dangerous substances. Proper Equipment Calibration To ensure accurate results, it’s important to calibrate all equipment used within the hood regularly. Even the smallest variation can cause significant errors in measurements, which could potentially lead to dangerous outcomes. Calibrating thermometers, pH meters, balances, pipettes, and other instruments before use guarantees the most precise measurements possible and reduces the likelihood of erroneous data. Establishing Experiment Protocols Standard operating procedures must be established and strictly followed when working in a hood. These protocols typically include detailed instructions outlining how to handle specific chemicals safely, set up equipment properly, and execute various tasks within the hood. In addition, ensuring that only authorized personnel accesses the hood can help minimize accidents and reduce the potential for cross-contamination by materials or individual personnel. • Safety glasses, gloves, and lab coats should always be worn inside the hood. • Equipment needs to be positioned correctly inside the hood to prevent unwanted spills. • Working ergonomically is also crucial as mishandling chemicals can pose safety hazards. • The level of ventilation needs to be consistently monitored throughout the experiment duration to ensure adequate airflow. Monitoring Experiment Progress Regularly monitoring an experiment’s progress is crucial to avoid unexpected problems and successfully achieve desired results. While working in the hood, it’s vital to keep sample sizes small, so any inaccuracies or permanent changes in chemical reactions can be observed quickly. Conducting tests more than once and measuring results independently, all while recording observations every step of the way guarantees an exact and precise understanding of a particular experiment. “The hood creates a safe environment for hazardous experiments, but this only works if it is properly used.” – University of Wisconsin-Madison Chemical Safety Office Using a hood correctly is fundamental to protect both laboratory personnel and their surrounding environments when working with dangerous chemicals. Conducting controlled experiments within these enclosed spaces eliminates many variables outside the experimenter’s control and reduces error caused by air movement and small environmental fluctuations. Proper use and regular maintenance ensure consistent performance and a safer research experience overall. Minimizing Fire and Explosion Risks In a chemistry laboratory, using a fume hood is essential to minimize the risk of fire and explosion. However, other safety measures must be put in place as well. Proper Storage of Flammable Materials The safe storage of flammable materials is vital in any laboratory, especially in chemistry labs where many substances can ignite or explode. When storing chemicals, it’s important to ensure they’re kept away from potential ignition sources such as heat, flames, sparks, and electricity. The best way to store flammable liquids is in specially designed flammable liquid storage cabinets that meet specific regulations for amount and type of material stored and methods of use. Most importantly, all containers should be properly labeled and have lids tightly sealed. Providing Fire Extinguishers In case of fire, having the right equipment readily available can make the difference between a minor incident and a disastrous accident. A fire extinguisher should always be present in any lab space, and everyone working in the area should know how to use it. Lab workers need to be trained on which types of fires require which types of extinguishers and understand how to keep their exits clear at times of an emergency. Placing labels near fire extinguishers or organizing signs and pathways towards them can save lives in the event of a fire incident. Implementing Fire Safety Protocols Aside from providing proper storage and equipping the lab area with fire fighting devices, fire safety protocols must be established. Regular training sessions conducted by certified fire safety experts will help laboratory workers learn about the most common and dangerous hazards faced when dealing with chemicals. Important issues covered during this type of training could include the following: • The importance of proper ventilation of fumes and vapors from the laboratory which is directly addressed through the use of a fume hood. • How to identify hazardous reactions before they happen by using proper chemical handling techniques, protective clothing, waste materials management, etc. • Methods of preventing a small fire from spreading out of control via early warning detection systems, sprinkler systems or even smoke detectors • Guidelines for evacuation when necessary shortly after trying to contain any local fire initiated incident and how workers should act in case an event that can compromise respiratory function occurs due to inhalation of smoke, fumes, dusts, gases and vapors. “The best offense against hazards such as fires is a good defense,” said Mark Rossi, program director at Clean Production Action, an environmental watchdog agency directing businesses on healthy chemical manufacture and application practicies. All laboratories dealing with chemicals subject to ignition must be conscious about reducing risks. This must be done in both proactive steps like providing training on safe practices and reactive steps like having firefighting implementations available whenever unexpected events take place. Overall, being informed and well trained while utilizing all essential tools are vital factors towards avoiding accidents leading towards further injury and damage caused in laboratory settings.Resources used wisely will go a long way towards ensuring that you minimize your risk factors while maximizing your potential reward!” Frequently Asked Questions What is a hood and why is it important in the chemistry laboratory? A hood, also known as a fume hood, is a ventilation device used to protect laboratory personnel from hazardous chemicals by containing and removing harmful gases, vapors, and fumes. It is important in the chemistry laboratory because it helps to maintain a safe and healthy environment for researchers and prevents exposure to potentially dangerous materials. What are the different types of hoods used in the chemistry laboratory? There are several types of hoods used in the chemistry laboratory, including conventional fume hoods, ductless fume hoods, and biosafety cabinets. Conventional fume hoods are the most common and are designed to remove hazardous chemicals. Ductless fume hoods use filters to clean air and are typically used in smaller labs. Biosafety cabinets are used in laboratories working with infectious agents or biological materials. How does a hood help to protect laboratory personnel from hazardous chemicals? A hood helps to protect laboratory personnel from hazardous chemicals by containing and removing harmful gases, vapors, and fumes. The hood’s fans pull air through the front opening and exhaust it outside or through filters, removing harmful substances from the air before it is breathed in by laboratory personnel. What is the proper way to use a hood in the chemistry laboratory? The proper way to use a hood in the chemistry laboratory is to ensure that it is working properly, position yourself so that you are not blocking the airflow, and use it for the intended purpose of containing and removing hazardous chemicals. Additionally, be sure to follow all lab safety procedures and wear appropriate personal protective equipment such as gloves, goggles, and lab coats. What are the maintenance and safety requirements for hoods in the chemistry laboratory? Regular maintenance of hoods in the chemistry laboratory is essential for ensuring they are working properly and safely. This includes regular inspections, filter replacement, and cleaning. Safety requirements include ensuring the hood is properly labeled, ensuring the sash is kept closed when not in use, and not blocking the airflow. Additionally, personnel should be trained on proper hood use and safety procedures. What are the alternatives to using a hood in the chemistry laboratory? While hoods are the most common ventilation device used in the chemistry laboratory, there are alternative options such as local exhaust ventilation and personal protective equipment. Local exhaust ventilation uses a smaller hood to capture and remove hazardous chemicals. Personal protective equipment such as respirators, gloves, and lab coats can also be used to protect laboratory personnel from exposure to hazardous chemicals. Do NOT follow this link or you will be banned from the site!
Commit 0b324bcd authored by Mike Hibler's avatar Mike Hibler Merge branch 'master' into arm64 Conflicts: clientside/os/imagezip/ffs/disklabel.h config.h.in configure configure.ac parents c9abc61b f201d7bd ......@@ -10,6 +10,7 @@ clientside/os/imagezip/fat clientside/os/imagezip/ntfs/liblocale clientside/lib/event/event_wrap* clientside/tmcc/cygwinxp/site-lisp clientside/tmcc/freebsd/init clientside/tmcc/plab os/shd www/cvsweb ......@@ -49,3 +50,8 @@ LGPL-COPYING AGPL-COPYING TODO.plab MOVED-TO-WIKI VERSION protogeni/flack/js/forge protogeni/flack/src/com/hurlant protogeni/flack/src/com/mattism protogeni/protogeniflash/src/com/mattism ......@@ -214,7 +214,7 @@ print STDERR Dumper($xmlparse) if (exists($xmlparse->{'attribute'}->{"genesis"})) { $genesis = $xmlparse->{'attribute'}->{"genesis"}->{'value'}; delete($xmlparse->{'attribute'}->{"genesis"}); if (! ($genesis eq "aptlab.net" || $genesis eq "cloudlab")) { if (! ($genesis eq "aptlab" || $genesis eq "cloudlab")) { fatal("Bad genesis: $genesis"); } # Remove these, we do not require them on the APT path. ...... ......@@ -495,6 +495,14 @@ sub AddUser() if ($user ne $PROTOUSER && system("$ADDKEY -i $user")) { fatal("Could not generate initial ssh key for $user"); } # # And the mailman lists if enabled. All users must get this cause # mailman is used for project mail lists. when MAILMANSUPPORT=1 # system("$ADDMMUSER $user") if ($MAILMANSUPPORT); if ($isnonlocal) { $EUID = 0; goto skipstuff; ......@@ -543,10 +551,6 @@ sub AddUser() system("$ADDCHATUSER $user") if ($CHATSUPPORT && $user ne $PROTOUSER); # And the mailman lists if enabled. system("$ADDMMUSER $user") if ($MAILMANSUPPORT); # And to the trac system if enabled. system("$ADDTRACUSER $user") if ($TRACSUPPORT && $user ne $PROTOUSER); ...... ......@@ -1143,7 +1143,7 @@ SSLEngine on # SSL Protocol support: # List the enable protocol levels with which clients will be able to # connect. Disable SSLv2 access by default: SSLProtocol all -SSLv2 SSLProtocol all -SSLv2 -SSLv3 # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. ...... ......@@ -1142,7 +1142,7 @@ SSLEngine on # SSL Protocol support: # List the enable protocol levels with which clients will be able to # connect. Disable SSLv2 access by default: SSLProtocol all -SSLv2 SSLProtocol all -SSLv2 -SSLv3 # SSL Cipher Suite: # List the ciphers that the client is permitted to negotiate. ...... This diff is collapsed. #!/usr/bin/perl -wT # # Copyright (c) 2007-2014 University of Utah and the Flux Group. # # {{{EMULAB-LICENSE # # This file is part of the Emulab network testbed software. # # This file is free software: you can redistribute it and/or modify it # under the terms of the GNU Affero General Public License as published by # the Free Software Foundation, either version 3 of the License, or (at # your option) any later version. # # This file is distributed in the hope that it will be useful, but WITHOUT # ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or # FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public # License for more details. # # You should have received a copy of the GNU Affero General Public License # along with this file. If not, see <http://www.gnu.org/licenses/>. # # }}} # package APT_Geni; use strict; use English; use Data::Dumper; use Carp; use Exporter; use vars qw(@ISA @EXPORT $AUTOLOAD); @ISA = "Exporter"; @EXPORT = qw ( ); # Must come after package declaration! use EmulabConstants; use emdb; use libtestbed; use GeniCertificate; use GeniCredential; # Configure variables my $TB = "@prefix@"; my $MAINSITE = @TBMAINSITE@; my $TBOPS = "@TBOPSEMAIL@"; my $SACERT = "$TB/etc/genisa.pem"; # # Generate the credentials we need. # sub GenCredentials($$;$) { my ($target, $geniuser, $privs) = @_; my ($speaksfor, $credential); my $speaker_signer = $GeniCredential::LOCALSA_FLAG; # # Utah; Guest users use the apt CA, and so we must sign the speaksfor # credential with the APT SA as well so that the target of the # speaksfor credential is in the same namespace as the signer. # if (!$geniuser->IsLocal() && $MAINSITE) { $speaker_signer = "/usr/testbed/etc/utah-apt.sa"; } # # The Utah SA is always the speaker, even if the user is a guest # with the alternate CA. # my $sa_certificate = GeniCertificate->LoadFromFile($SACERT); if (!defined($sa_certificate)) { print STDERR "Could not load certificate from $SACERT\n"; goto bad; } my $sa_authority = GeniAuthority->Lookup($sa_certificate->urn()); if (!defined($sa_authority)) { prnt STDERR "Could not load SA authority object\n"; goto bad; } # # If a local user account, but a nonlocal id, then we should # have a speaksfor credential stored, as well as a certificate # for the user. # if ($geniuser->IsLocal() && $geniuser->emulab_user()->IsNonLocal()) { my ($speaksfor_string, $certificate_string) = $geniuser->emulab_user()->GetStoredCredential(); if (! (defined($speaksfor_string) && defined($certificate_string))) { print STDERR "No stored speaksfor/certificate for $geniuser\n"; goto bad; } $speaksfor = GeniCredential->CreateFromSigned($speaksfor_string); if (!defined($speaksfor)) { print STDERR "Could not create speaksfor credential\n"; goto bad; } my $certificate = GeniCertificate->LoadFromString($certificate_string); if (!defined($certificate)) { print STDERR "Could not load certificate from string\n"; goto bad; } $credential = GeniCredential->Create($target, $certificate); } else { $speaksfor = GeniCredential->Create($geniuser, $sa_authority); if (!defined($speaksfor)) { print STDERR "Could not create speaksfor credential\n"; goto bad; } $speaksfor->SetType("speaksfor"); if ($speaksfor->Sign($speaker_signer)) { print STDERR "Could not sign speaksfor credential\n"; goto bad; } $credential = GeniCredential->Create($target, $geniuser); } if (!defined($credential)) { print STDERR "Could not create credential for $target\n"; goto bad; } # Add optional privs. if (defined($privs)) { foreach my $priv (@{ $privs }) { $credential->AddCapability($priv, 0); } } # And sign it. if ($credential->Sign($GeniCredential::LOCALSA_FLAG) != 0) { $credential->Delete(); print STDERR "Could not sign $target credential\n"; goto bad; } return ($credential, $speaksfor); bad: return (); } # # Return the authority object for a URN. # sub GetAuthority($) { my ($urn) = @_; my $cm_authority = GeniAuthority->Lookup($urn); if (!defined($cm_authority)) { $cm_authority = GeniAuthority->CreateFromRegistry("cm", $urn); if (!defined($cm_authority)) { print STDERR "Could not load CM authority object\n"; return undef; } } return $cm_authority; } # # Load the context operate as; always the same for APT. # sub GeniContext() { my $certificate = GeniCertificate->LoadFromFile($SACERT); if (!defined($certificate)) { print STDERR "Could not load certificate from $SACERT\n"; return undef; } return Genixmlrpc->Context($certificate); } # _Always_ make sure that this 1 is at the end of the file... 1; This diff is collapsed. ......@@ -46,7 +46,9 @@ use vars qw(@ISA @EXPORT $AUTOLOAD); use EmulabConstants; use emutil; use emdb; use APT_Dataset; use GeniXML; use GeniHRN; use libtestbed; use English; use Data::Dumper; ......@@ -58,6 +60,14 @@ my $TBOPS = "@TBOPSEMAIL@"; my $debug = 0; # Concat id/vers. sub versid($) { my ($self) = @_; return $self->profileid() . ":" . $self->version(); } sub BlessRow($$) { my ($class, $row) = @_; ......@@ -314,6 +324,9 @@ sub Create($$$$$$) $vquery .= ",parent_profileid=" . $parent->profileid(); $vquery .= ",parent_version=" . $parent->version(); } if (exists($argref->{'script'}) && $argref->{'script'} ne "") { $vquery .= ",script=" . DBQuoteSpecial($argref->{'script'}); } # Back to the main table. $cquery .= ",uuid='$puuid'"; ......@@ -484,8 +497,8 @@ sub Delete($$) if ($purge) { goto bad if (! QueryWarn("delete from apt_profile_versions ". "where profileid='$profileid'")); if (! DBQueryWarn("delete from apt_profile_versions ". "where profileid='$profileid'")); } else { # Set deleted on all of the versions. ......@@ -674,6 +687,53 @@ sub UpdateDiskImage($$) return 0; } # # Check blockstores. # sub CheckDatasets($$$) { my ($xml, $project, $pmsg) = @_; my $rspec = GeniXML::Parse($xml); if (! defined($rspec)) { print STDERR "CheckDatasets: Could not parse rspec\n"; return -1; } foreach my $ref (GeniXML::FindNodes("n:node", $rspec)->get_nodelist()) { foreach my $blockref (GeniXML::FindNodesNS("n:blockstore", $ref, $GeniXML::EMULAB_NS)->get_nodelist()) { my $leaseurn = GeniXML::GetText("persistent", $blockref); if (defined($leaseurn) && !GeniHRN::IsValid($leaseurn)) { $$pmsg = "Persistent dataset name is not a valid URN"; return 1; } my ($authority, $type, $id) = GeniXML::Parse($leaseurn); # # Not all backends have blockstore support. # if (!APT_Dataset::ValidBlockstoreBackend($authority)) { $$pmsg = "Persistent dataset is not on a valid aggregate"; return 1; } # # Dataset must already exists on the aggregate. # my $pid = $project->pid(); my $dataset = APT_Dataset->Lookup("$pid/$id"); if (!defined($dataset)) { $$pmsg = "Persistent dataset '$pid/$id' does not exist"; return 1; } my ($d_authority) = GeniXML::Parse($dataset->aggregate_urn()); if ($d_authority ne $authority) { $$pmsg = "Persistent dataset '$pid/$id' in not on $authority"; return 1; } } } return 0; } sub IsHead($) { my ($self) = @_; ...... ......@@ -30,15 +30,18 @@ include $(OBJDIR)/Makeconf SUBDIRS = BIN_SCRIPTS = manage_profile manage_instance BIN_SCRIPTS = manage_profile manage_instance manage_dataset \ create_instance rungenilib SBIN_SCRIPTS = LIB_SCRIPTS = APT_Profile.pm APT_Instance.pm WEB_BIN_SCRIPTS = webmanage_profile webmanage_instance LIB_SCRIPTS = APT_Profile.pm APT_Instance.pm APT_Dataset.pm APT_Geni.pm WEB_BIN_SCRIPTS = webmanage_profile webmanage_instance webmanage_dataset \ webcreate_instance webrungenilib WEB_SBIN_SCRIPTS= LIBEXEC_SCRIPTS = $(WEB_BIN_SCRIPTS) $(WEB_SBIN_SCRIPTS) USERLIBEXEC = rungenilib.proxy # These scripts installed setuid, with sudo. SETUID_BIN_SCRIPTS = SETUID_BIN_SCRIPTS = rungenilib SETUID_SBIN_SCRIPTS = SETUID_SUEXEC_SCRIPTS= ......@@ -47,7 +50,7 @@ SETUID_SUEXEC_SCRIPTS= # configure if the .in file is changed. # all: $(BIN_SCRIPTS) $(SBIN_SCRIPTS) $(LIBEXEC_SCRIPTS) $(SUBDIRS) \ $(LIB_SCRIPTS) all-subdirs $(LIB_SCRIPTS) $(USERLIBEXEC) all-subdirs subboss: ......@@ -57,6 +60,8 @@ install: $(addprefix $(INSTALL_BINDIR)/, $(BIN_SCRIPTS)) \ $(addprefix $(INSTALL_SBINDIR)/, $(SBIN_SCRIPTS)) \ $(addprefix $(INSTALL_LIBDIR)/, $(LIB_SCRIPTS)) \ $(addprefix $(INSTALL_LIBEXECDIR)/, $(LIBEXEC_SCRIPTS)) \ $(addprefix $(INSTALL_DIR)/opsdir/libexec/, $(USERLIBEXEC)) boss-install: install install-subdirs ......@@ -89,4 +94,9 @@ clean: clean-subdirs @$(MAKE) -C $(dir $@) $(basename $(notdir $@)) %-subdirs: $(addsuffix /%.MAKE,$(SUBDIRS)) ; $(INSTALL_DIR)/opsdir/libexec/%: % @echo "Installing $<" -mkdir -p $(INSTALL_DIR)/opsdir/libexec $(INSTALL) $< $@ .PHONY: $(SUBDIRS) install This diff is collapsed. This diff is collapsed. ......@@ -35,19 +35,18 @@ use POSIX qw(setsid); # sub usage() { print("Usage: manage_profile [-u uuid | -s uuid] <xmlfile>\n"); print("Usage: manage_profile [-r | -p] profile\n"); print("Usage: manage_profile create [-s uuid] <xmlfile>\n"); print("Usage: manage_profile update <profile> <xmlfile>\n"); print("Usage: manage_profile publish <profile>\n"); print("Usage: manage_profile delete <profile>\n"); exit(-1); } my $optlist = "du:rs:t:fp"; my $optlist = "ds:t:"; my $debug = 0; my $verify = 0; # Check data and return status only. my $update = 0; my $snap = 0; my $delete = 0; my $skipadmin = 0; my $force = 0; # With delete. my $uuid; my $rspec; my $profile; my $instance; my $webtask; ......@@ -56,9 +55,9 @@ my $webtask_id; # # Configure variables # my $TB = "@prefix@"; my $TBOPS = "@TBOPSEMAIL@"; my $QUICKVM = "$TB/sbin/protogeni/quickvm"; my $TB = "@prefix@"; my $TBOPS = "@TBOPSEMAIL@"; my $MANAGEINSTANCE = "$TB/bin/manage_instance"; # # Untaint the path ......@@ -85,7 +84,6 @@ use APT_Instance; use GeniXML; use GeniHRN; use WebTask; use libaudit; # Protos sub fatal($); ......@@ -93,6 +91,31 @@ sub UserError(;$); sub DeleteProfile($); sub PublishProfile($); # Parse args below. if (@ARGV < 2) { usage(); } my $action = shift(@ARGV); # The web interface (and in the future the xmlrpc interface) sets this. my $this_user = User->ImpliedUser(); if (! defined($this_user)) { $this_user = User->ThisUser(); if (!defined($this_user)) { fatal("You ($UID) do not exist!"); } } if ($action eq "delete") { exit(DeleteProfile($ARGV[0])); } elsif ($action eq "publish") { exit(PublishProfile($ARGV[0])); } elsif (! ($action eq "create" || $action eq "update")) { usage(); } # # Parse command arguments. Once we return from getopts, all that should be # left are the required arguments. ......@@ -104,16 +127,6 @@ if (! getopts($optlist, \%options)) { if (defined($options{"d"})) { $debug = 1; } if (defined($options{"f"})) { $force = 1; } if (defined($options{"v"})) { $verify = 1; } if (defined($options{"u"})) { $update = 1; $uuid = $options{"u"}; } if (defined($options{"s"})) { $snap = 1; $uuid = $options{"s"}; ......@@ -121,27 +134,11 @@ if (defined($options{"s"})) { if (defined($options{"t"})) { $webtask_id = $options{"t"}; } if (@ARGV != 1) { usage(); } # The web interface (and in the future the xmlrpc interface) sets this. my $this_user = User->ImpliedUser(); if (! defined($this_user)) { $this_user = User->ThisUser(); if (!defined($this_user)) { fatal("You ($UID) do not exist!"); } } # Remove profile. if (defined($options{"r"})) { exit(DeleteProfile($ARGV[0])); } elsif (defined($options{"p"})) { exit(PublishProfile($ARGV[0])); if ($action eq "update") { $update = 1; $uuid = shift(@ARGV); } my $xmlfile = shift(@ARGV); my $xmlfile = shift(@ARGV); # # These are the fields that we allow to come in from the XMLfile. ......@@ -163,6 +160,7 @@ my %xmlfields = "profile_public" => ["public", $SLOT_OPTIONAL|$SLOT_UPDATE], "profile_shared" => ["shared", $SLOT_OPTIONAL|$SLOT_UPDATE], "rspec" => ["rspec", $SLOT_REQUIRED|$SLOT_UPDATE], "script" => ["script", $SLOT_OPTIONAL|$SLOT_UPDATE], ); # ......@@ -233,7 +231,7 @@ foreach $key (keys(%{ $xmlparse->{'attribute'} })) { $value = $default; } } if ($required & $SLOT_ADMINONLY && !$skipadmin) { if ($required & $SLOT_ADMINONLY) { # Admin implies optional, but thats probably not correct approach. $errors{$key} = "Administrators only" if (! $this_user->IsAdmin()); ......@@ -248,6 +246,10 @@ foreach $key (keys(%{ $xmlparse->{'attribute'} })) { $new_args{$dbslot} = $value; $update_args{$dbslot} = $value if ($update && ($required & $SLOT_UPDATE)); if ($key eq "rspec") { $rspec = $value; } } UserError() if (keys(%errors)); ......@@ -292,20 +294,29 @@ if ($update) { delete($update_args{"description"}); # # If the rspec changed, then make a new version of the profile. # If the rspec/script changed, then make a new version of the profile. # Everything else is metadata. # if (exists($update_args{"rspec"})) { if ($update_args{"rspec"} ne $profile->rspec()) { if (exists($update_args{"rspec"}) || exists($update_args{"script"})) { if ((exists($update_args{"rspec"}) && $update_args{"rspec"} ne $profile->rspec()) || (exists($update_args{"script"}) && $update_args{"script"} ne $profile->script())) { if ($this_user->IsAdmin()) { $profile = $profile->NewVersion($this_user); if (!defined($profile)) { fatal("Could not create new version of the profile"); } } $profile->UpdateVersion({"rspec" => $update_args{"rspec"}}); $profile->UpdateVersion({"rspec" => $update_args{"rspec"}}) if (exists($update_args{"rspec"})); $profile->UpdateVersion({"script" => $update_args{"script"}}) if (exists($update_args{"script"})); } delete($update_args{"rspec"}); delete($update_args{"rspec"}) if (exists($update_args{"rspec"})); delete($update_args{"script"}) if (exists($update_args{"script"})); } $profile->UpdateMetaData(\%update_args) == 0 or fatal("Could not update profile record"); ......@@ -346,12 +357,16 @@ if (defined($instance)) { } my ($node) = GeniXML::FindNodes("n:node", $manifest)->get_nodelist(); my $sliver_urn = GeniXML::GetSliverId($node); my $node_id = GeniXML::GetVirtualId($node); my $apt_uuid = $instance->uuid(); my $imagename = $profile->name(); # # Grab the webtask object so we can watch it. We are looking # for it to finish, so we can unlock the profile for use. # for it to finish, so we can unlock the profile for use. Note # this always creates a webtask, even if not directed to on the # commmand line, so that we can communicate with the script we # call that does the work. # $webtask = WebTask->Create($profile->uuid(), $webtask_id); if (!defined($webtask)) { ......@@ -364,34 +379,32 @@ if (defined($instance)) { fatal("Could not lock new profile"); } my $command = "$QUICKVM " . ($webtask_id ? "-t $webtask_id " : " ") . "-s $apt_uuid $sliver_urn $imagename"; my $command = "$MANAGEINSTANCE -t " . $webtask->task_id() . " ". "snapshot $apt_uuid $imagename $node_id"; # # This returns pretty fast, and then the imaging takes place in # the background at the aggregate. quickvm keeps a process running # in the background waiting for the sliver to unlock and the # sliverstatus to indicate the node is running again. # the background at the aggregate. The script keeps a process # running in the background waiting for the sliver to unlock and # the sliverstatus to indicate the node is running again. # my $output = emutil::ExecQuiet($command);
 Scott Polar Research Institute, Cambridge » Library catalogue skip to primary navigation skip to content     You are not currently logged in SPRI library catalogue View a record Please note: You are viewing the legacy database of the Scott Polar Research Institute Library catalogue. It is no longer being updated, so does not reliably reflect our current library holdings. Please search for material in iDiscover for up-to-date information about the library collection. Record #112851: A scaled index of winter severity / Phillip E. Farnes. Title: A scaled index of winter severity / Phillip E. Farnes. Author(s): Farnes, Phillip E. Date: 1991. In: Western Snow Conference. Proceedings. (1991.), Vol. 59th Annual Meeting (1991) Abstract: Procedure for indexing severity of winter would be helpful to wildlife managers and general public in understanding how mild or how severe conditions are for any given season or month. Describes scheme with scale from -4.0 for most severe to +4.0 for mildest, with 0 being near normal winter. Index is based on minimum daily temperatures, snow depth, snow water equivalent, snow density, and precipitation accumulation. Weightings and threshold for each parameter can be changed to represent different species; stations can be accumulated or weighted to represent winter range areas; months can be looked at individually or accumulated seasonally. Notes: Western Snow Conference. Proceedings. Vol. 59th Annual Meeting :134-137 (1991). Keywords: 551.5 -- Meteorology. 551.506 -- Meteorological data. 551.582 -- Climatology of particular places. 551.578.46 -- Snow cover and snow patches. E10 -- Glaciology: snow and avalanches. SPRI record no.: 112851 MARCXML LDR 01502naa#a2200000#a#4500 001 SPRI-112851 005 20221001065540.0 007 ta 008 221001s1991####xx#a##|##|###|0||#0|eng#d 035 ## ‡aSPRI-112851 040 ## ‡aUkCU-P‡beng‡eaacr 100 1# ‡aFarnes, Phillip E. 245 12 ‡aA scaled index of winter severity /‡cPhillip E. Farnes. 260 ## ‡a[S.l.] :‡b[s.n.],‡c1991. 300 ## ‡ap. 134-137 :‡bdiag., table. 500 ## ‡aWestern Snow Conference. Proceedings. Vol. 59th Annual Meeting :134-137 (1991). 520 3# ‡aProcedure for indexing severity of winter would be helpful to wildlife managers and general public in understanding how mild or how severe conditions are for any given season or month. Describes scheme with scale from -4.0 for most severe to +4.0 for mildest, with 0 being near normal winter. Index is based on minimum daily temperatures, snow depth, snow water equivalent, snow density, and precipitation accumulation. Weightings and threshold for each parameter can be changed to represent different species; stations can be accumulated or weighted to represent winter range areas; months can be looked at individually or accumulated seasonally. 650 07 ‡a551.5 -- Meteorology.‡2udc 650 07 ‡a551.506 -- Meteorological data.‡2udc 650 07 ‡a551.582 -- Climatology of particular places.‡2udc 650 07 ‡a551.578.46 -- Snow cover and snow patches.‡2udc 650 07 ‡aE10 -- Glaciology: snow and avalanches.‡2local 773 0# ‡7nnas ‡tWestern Snow Conference. Proceedings. ‡gVol. 59th Annual Meeting (1991) ‡wSPRI-26976 917 ## ‡aUnenhanced record from Muscat, imported 2019 948 3# ‡a20221001
fplicensereg.exe Process Information Process Name: fplicensereg Author: Fine Point Technologies, Inc. Download PC Repair Tool & fix fplicensereg.exe Windows errors automatically System Process: n/a Uses network: n/a Hardware related: n/a Background Process: Yes Spyware: n/a Trojan: n/a Virus: n/a Security risk 0-5: n/a What is fplicensereg exe? fplicensereg.exe is a fplicensereg belonging to fplicensereg from Fine Point Technologies, Inc. The “.exe” file extension stands for Windows executable file. Any program that is executable has the .exe file extension. Find out if fplicensereg.exe is a virus and sould be removed, how to fix fplicensereg.exe error, if fplicensereg exe is CPU intensive and slowing down your Windows PC. Any process has four stages of the lifecycle including start, ready, running, waiting, terminated or exit. Should You Remove fplicensereg exe? If you are asking yourself if it is safe to remove fplicensereg.exe from your Windows system then it is understandable that it is causing trouble. fplicensereg.exe is not a critical component and a non-system process. Any process that is not managed by the system is known as non-system processes. It is safe to terminate the non-system process as they do not affect the general functionality of the operating system. However, the program using the non-system processes will be either terminated or halted. Download PC Repair Tool & fix fplicensereg.exe Windows errors automatically Fix fplicensereg.exe Error? There are many reasons why you are seeing fplicensereg.exe error in your Windows system including: Malicious software Malicious software infects the system with malware, keyloggers, spyware, and other malicious actors. They slow down the whole system and also cause .exe errors. This occurs because they modify the registry which is very important in the proper functioning of processes. Incomplete installation Another common reason behind fplicensereg.exe error is an incomplete installation. It can happen because of errors during installation, lack of hard disk space, and crash during install. This also leads to a corrupted registry causing the error. Application conflicts and Missing or corrupt windows drivers can also lead to fplicensereg.exe error. The solution to fixing fplicensereg.exe error include any one of the following • Make sure your PC is protected with proper anti-virus software program. • Run a registry cleaner to repair and remove the Windows registry that is causing fplicensereg.exe error. • Make sure the system’s device drivers are updated properly. It is also recommended that you run a performance scan to automatically optimize memory and CPU settings. Download PC Repair Tool & fix fplicensereg.exe Windows errors automatically Is a fplicensereg.exe CPU intensive? Windows process requires three resource types to function properly including CPU, Memory, and Network. CPU cycles to do computational tasks, memory to store information and network to communicate with the required services. If any of the resources are not available, it will either get interrupted or stopped. Any given process has a process identification number(PID) associated with it. A user can easily identify and track a process using its PID. Task Manager is a great way to learn how much resources fplicensereg.exe process is allocating to itself. It showcases process resource usage in CPU/Memory/Disk and Network. If you have a GPU, it will also showcase the percentage of GPU it is using to run the process.
Отображение модального диалога с помощью useImperativeHandle() React hook Возьмите пользовательский интерфейс материалов Dialog компонент в качестве примера, который имеет open: boolean React prop как способ управления его открытым/закрытым состоянием. В пользовательском интерфейсе материала документация вы найдете пример использования, подобный этому: import * as React from "react"; import { Button, Container, Dialog, DialogActions, DialogContent, DialogTitle } from "@mui/material"; export function Example(): JSX.Element { const [open, setOpen] = React.useState(false); const handleOpen = React.useCallback(() => setOpen(true), []); const handleClose = React.useCallback(() => setOpen(false), []); const handleAction = React.useCallback(() => { ... }, []); return ( <Container> <Button onClick={handleOpen}>Open Dialog</Button> <Dialog open={state.open} onClose={handleClose}> <DialogTitle>...</DialogTitle> <DialogContent> ... </DialogContent> <DialogActions> <Button onClick={handleClose}>Cancel</Button> <Button onClick={handleAction}>OK</Button> </DialogActions> </Dialog> </Container> ); } В исходном примере диалоговое окно используется на месте. Обычно вы хотите извлечь диалог в отдельный компонент, например: import * as React from "react"; import { Button, Container, Dialog, DialogActions, DialogContent, DialogProps, DialogTitle } from "@mui/material"; export function ConfirmDialog(props: ConfirmDialogProps): JSX.Element { const [state, setState] = ... const handleClose = ... const handleConfirm = ... return ( <Dialog open={state.open} {...props}> <DialogTitle>...</DialogTitle> <DialogContent> ... </DialogContent> <DialogActions> <Button onClick={handleClose}>Cancel</Button> <Button onClick={handleConfirm}>OK</Button> </DialogActions> </Dialog> ); } export type ConfirmDialogProps = Omit<DialogProps, "open">; После этого исходный пример можно сократить до следующего: import * as React from "react"; import { ConfirmDialog } from "../dialogs/ConfirmDialog.js"; export function Example(): JSX.Element { const handleOpen = ... const handleAction = ... return ( <Container> <Button onClick={handleOpen}>Open Dialog</Button> <ConfirmDialog onConfirm={handleAction} /> </Container> ); } Если бы диалоговое окно можно было использовать без необходимости управлять его состоянием на месте, этот код выглядел бы красивым и чистым. Есть несколько способов реализовать это, например, путем введения верхнего уровня DialogProvider компонент + useDialog(...) React hook, в качестве альтернативы вы можете добавить императивный обработчик в само диалоговое окно, чтобы его можно было открыть с помощью dialogRef.current?.open() метод, доступный в экземпляре диалога. import * as React from "react"; import { ConfirmDialog } from "../dialogs/ConfirmDialog.js"; export function Example(): JSX.Element { const dialogRef = React.useRef<DialogElement>(null); const handleOpen = React.useCallback(() = dialogRef.current?.open(), []); const handleAction = ... return ( <Container> <Button onClick={handleOpen}>Open Dialog</Button> <ConfirmDialog ref={dialogRef} onConfirm={handleAction} /> </Container> ); } Теперь давайте посмотрим, как реализуется этот диалог, включая .open() метод реализован с useImeprativeHandle(ref, ...) Реагирующие хуки выглядят так: import * as React from "react"; import { Button, Dialog, DialogActions, DialogContent, DialogProps, DialogTitle } from "@mui/material"; export const ConfirmDialog = React.forwardRef< DialogElement, ConfirmDialogProps >(function ConfirmDialog(props, ref): JSX.Element { const { onClose, onConfirm, ...other } = props; const [state, setState] = React.useState<State>({ open: false }); const handleClose = useHandleClose(setState, onClose); const handleConfirm = useHandleConfirm(setState, onConfirm); React.useImperativeHandle(ref, () => ({ open() { setState({ open: true }); }, })); return ( <Dialog open={state.open} onClose={handleClose} {...other}> <DialogTitle>...</DialogTitle> <DialogContent>...</DialogContent> <DialogActions> <Button onClick={handleClose}>Cancel</Button> <Button onClick={handleConfirm}>OK</Button> </DialogActions> </Dialog> ); }); function useHandleClose(setState: SetState, handleClose?: CloseHandler) { return React.useCallback<CloseHandler>(function (event, reason) { setState({ open: false }); handleClose?.(event, reason ?? "backdropClick"); }, []); } function useHandleConfirm(setState: SetState, handleConfirm?: ConfirmHandler) { return React.useCallback(async function () { await handleConfirm?.(); setState({ open: false }); }, []); } type State = { open: boolean; error?: Error }; type SetState = React.Dispatch<React.SetStateAction<State>>; type CloseHandler = NonNullable<DialogProps["onClose"]>; type ConfirmHandler = () => Promise<void> | void; export type DialogElement = { open: () => void }; export type ConfirmDialogProps = Omit<DialogProps, "open"> & { onConfirm?: ConfirmHandler; }; У этого подхода есть свои плюсы и минусы, плюс в том, что он полностью автономен и не зависит от каких-либо внешних решений по управлению состоянием. Похожие записи Добавить комментарий Ваш адрес email не будет опубликован. Обязательные поля помечены *
A generic and efficient E-field Parallel Imaging Correlator for next-generation radio telescopes Nithyanandan Thyagarajan, Adam P. Beardsley, Judd D. Bowman, Miguel F. Morales Research output: Contribution to journalArticlepeer-review 11 Scopus citations Abstract Modern radio telescopes are favouring densely packed array layouts with large numbers of antennas (NA ≳ 1000). Since the complexity of traditional correlators scales as O(NA2 ), there will be a steep cost for realizing the full imaging potential of these powerful instruments. Through our generic and efficient E-field Parallel Imaging Correlator (EPIC), we present the first software demonstration of a generalized direct imaging algorithm, namely the Modular Optimal Frequency Fourier imager. Not only does it bring down the cost for dense layouts to O(NA log2 NA) but can also image from irregular layouts and heterogeneous arrays of antennas. EPIC is highly modular, parallelizable, implemented in object-oriented PYTHON, and publicly available. We have verified the images produced to be equivalent to those from traditional techniques to within a precision set by gridding coarseness. We have also validated our implementation on data observed with the Long Wavelength Array (LWA1). We provide a detailed framework for imaging with heterogeneous arrays and show that EPIC robustly estimates the input sky model for such arrays. Antenna layouts with dense filling factors consisting of a large number of antennas such as LWA, the Square Kilometre Array, Hydrogen Epoch of Reionization Array, and Canadian Hydrogen Intensity Mapping Experiment will gain significant computational advantage by deploying an optimized version of EPIC. The algorithm is a strong candidate for instruments targeting transient searches of fast radio bursts as well as planetary and exoplanetary phenomena due to the availability of high-speed calibrated time-domain images and low output bandwidth relative to visibility-based systems. Original languageEnglish (US) Pages (from-to)715-730 Number of pages16 JournalMonthly Notices of the Royal Astronomical Society Volume467 Issue number1 DOIs StatePublished - May 1 2017 Keywords • Instrumentation: interferometers • Techniques: image processing • Techniques: interferometric • Telescopes ASJC Scopus subject areas • Astronomy and Astrophysics • Space and Planetary Science Fingerprint Dive into the research topics of 'A generic and efficient E-field Parallel Imaging Correlator for next-generation radio telescopes'. Together they form a unique fingerprint. Cite this
vaccine (redirected from LAIV) Also found in: Dictionary, Thesaurus, Medical, Acronyms. Related to LAIV: live vaccine: see vaccinationvaccination, means of producing immunity against pathogens, such as viruses and bacteria, by the introduction of live, killed, or altered antigens that stimulate the body to produce antibodies against more dangerous forms. ..... Click the link for more information. . The Columbia Electronic Encyclopedia™ Copyright © 2013, Columbia University Press. Licensed from Columbia University Press. All rights reserved. www.cc.columbia.edu/cu/cup/ The following article is from The Great Soviet Encyclopedia (1979). It might be outdated or ideologically biased. Vaccine   a preparation obtained from microorganisms (bacteria, rickettsias, viruses) or products of their activity and used for active immunization of human beings and animals for prophylactic and therapeutic purposes. Vaccine was first used in 1796 by the English physician E. Jenner, who inoculated persons with cowpox, or vaccinia (hence the name “vaccine”) to protect them against smallpox. Live, killed, and chemical vaccines and toxoids are distinguished. Live vaccines are made from specially attenuated cultures of microorganisms deprived of their capacity to cause disease but remaining capable of reproducing in the body and causing immunity. The first to create live vaccines against anthrax (1881) and rabies (1885) was the French microbiologist L. Pasteur. The live tuberculosis vaccine (BCG) proposed in 1926 by the French scientists A. Calmette and C. Guérin won universal recognition; it greatly reduced the tuberculosis rate. Many live vaccines were created by Soviet scientists: for example, typhus vaccine (P. F. Zdrodovskii, 1957-59), influenza vaccine (A. A. Smorodintsev, V. D. Solov’ev, and V. M. Zhdanov, 1960), brucellosis vaccine (P. A. Vershilova, 1947-51), and smallpox vaccine (M. A. Morozov, 1941-60). Vaccines are the only effective inoculative preparations for certain diseases (rabies, smallpox, plague, tularemia). Live vaccines generally produce long-lasting immunity. Killed vaccines are made from microorganisms killed by physical methods (heating) or chemical methods (phenol, formaldehyde, acetone). Killed vaccines are used to prevent only those diseases for which live vaccines are not available (typhoid, paratyphoid B, whooping cough, cholera, tick-borne encephalitis). They provide less protection than live vaccines. Hence immunity develops only after a course of immunization (vaccination) consisting of several inoculations. Chemical vaccines are substances isolated from bacterial cells by various chemical methods and containing the main elements that cause immunity. Chemical vaccines against intestinal infections were first employed in 1941 as part of the NIISI polyvalent vaccine proposed by the Soviet scientists N. I. Aleksandrov and N. E. Gefen. Chemical vaccines are used to provide protection against paratyphoid B, typhoid, and rickettsial diseases. The development of immunity following the injection of toxoids results from the appearance in the blood of antibodies that neutralize the effect of a particular toxin. Toxoids were obtained for the first time during the years 1923-26 by the French scientist G. Ramon. Toxoids are used to prevent diphtheria, tetanus, botulism, gas gangrene, and staphylococcal infections. Vaccines can be made from the causative agent of a single infection, so-called monovalent vaccines, or from a combination of two or more causative agents, polyvalent vaccines. The latter produce immunity to several infectious diseases. There are various methods of administering vaccines. In the case of live vaccines, they are related to a certain extent to the routes by which the causative agents enter the body. Thus, poliomyelitis vaccine is administered orally; influenza vaccine intranasally; smallpox, anthrax, and tularemia vaccines epidermally; brucellosis vaccine intradermally; typhus vaccine subcutaneously. Killed vaccines and toxoids are injected subcutaneously or intramuscularly. Live vaccine is used to treat rabies (vaccine therapy), the only method of protecting man from this fatal disease. Autovaccines are used to treat several chronic inflammatory diseases caused by staphylococci and streptococci. In the USSR, vaccines are produced by scientific production institutions. The quality of the preparations is controlled by the L. A. Tarasevich State Control Institute for Biomedical Preparations in Moscow. A. KH. KANCHURIN Vaccines in veterinary medicine. The principles used in preparing and classifying vaccines for the treatment of animal diseases are the same as those for human diseases. The most widely used live vaccines in veterinary practice include anthrax vaccines—STI and GNKI; swine erysipelas vaccine —from the Konev strain and VR2; brucellosis vaccine— from strain 19; and vaccines against cholera, smallpox, and Newcastle disease. Killed vaccines are used to prevent and treat more than 20 infectious diseases of animals. REFERENCES Ramon, G. Sorok let issledovatel’skoi raboty. Moscow, 1962. (Translated from French.) Vygodchikov, G. V. “Nauchnye osnovy vaktsinno-syvorotochnogo dela.” In Mnogotomnoe rukovodstvo po mikrobiologii, klinike i epidemiologii infektsionnykh boleznei, vol. 3. Moscow, 1964. Pages 485-506. Kravchenko, A. T., R. A. Saltykov, and F. F. Rezepov. Prakticheskoe rukovodstvo po primeneniiu biologic he skikh preparatov. Moscow, 1968. A. KH. KANCHURIN and S. G. KOLESOV The Great Soviet Encyclopedia, 3rd Edition (1970-1979). © 2010 The Gale Group, Inc. All rights reserved. vaccine [vak′sēn] (immunology) A suspension of killed or attenuated bacteria or viruses or fractions thereof, injected to produce active immunity. McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc. vaccine Med 1. a suspension of dead, attenuated, or otherwise modified microorganisms (viruses, bacteria, or rickettsiae) for inoculation to produce immunity to a disease by stimulating the production of antibodies 2. (originally) a preparation of the virus of cowpox taken from infected cows and inoculated in humans to produce immunity to smallpox 3. of or relating to vaccination or vaccinia 4. Computing a piece of software designed to detect and remove computer viruses from a system Collins Discovery Encyclopedia, 1st edition © HarperCollins Publishers 2005 References in periodicals archive ? Children age 5 to 8 years who are to receive LAIV and have not had a previous dose of either TIV or LAIV should have 2 doses of LAIV separated by 6 to 10 weeks. In one clinical trial among a subset of healthy adults aged 18-19 years, signs and symptoms reported more frequently among LAIV recipients (n = 2,548) than placebo recipients (n = 1,290) within 7 days after each dose included cough (14% and 11%, respectively); runny nose (45% and 27%, respectively); sore throat (28% and 17%, respectively); chills (9% and 6%, respectively); and tiredness/weakness (26% and 22%, respectively) (244). It also will have to consider the LAIV supply and the safety of quadrivalent vaccines since all of the studies in the evidence review were done when only trivalent vaccines were available. ACIP restated previous contraindications to administration of LAIV., and those with contraindications to LAIV should receive inactivated vaccine. ** LAIV, being a live virus vaccine, should be administered simultaneously with, or 4 weeks after, the administration of other live virus vaccines. LAIV contains live, attenuated viruses and therefore has the potential to produce mild signs or symptoms related to attenuated influenza virus infection. During the first 28 days, eight children in the LAIV arm had nine events that may have been related to FluMist administration, including fever, conjunctivitis, sinusitis, and pharyngitis. The committee approved the recommendation after hearing an evidence review that found the LAIV to be "moderately" more effective for this age group than the inactivated vaccine was. The LAIV can be used for healthy people between the ages of 5 and 49 years; it should not be used for those who are pregnant, have a chronic illness, are caregivers to someone severely immune suppressed, are on chronic aspirin therapy, or have a history of Guillain-Barre syndrome. At the June 2016 CDC's Advisory Committee on Immunization Practices (ACIP) meeting, data were presented comparing the efficacy of this season's live attenuated influenza vaccine (LAIV) with inactivated influenza vaccine (IIV) by age and specific influenza type and subtype. Yet, in order to make sure it could deliver its vaccines in any situation, the company embarked on a program to upgrade its Live, Attenuated Influenza Vaccine (LAIV) production facilities in Speke, Liverpool, United Kingdom.
You are viewing the version of this documentation from Perl 5.8.3. View the latest version setpgrp PID,PGRP Sets the current process group for the specified PID, 0 for the current process. Will produce a fatal error if used on a machine that doesn't implement POSIX setpgid(2) or BSD setpgrp(2). If the arguments are omitted, it defaults to 0,0. Note that the BSD 4.2 version of setpgrp does not accept any arguments, so only setpgrp(0,0) is portable. See also POSIX::setsid().
# # ChangeLog for src/include in lemon-0.x # # Generated by Trac 1.2.3 # 06/18/21 12:06:26 Tue, 16 Dec 2003 18:17:51 GMT Alpar Juttner [8:cd54905012bc] * src/include/bfs.h (modified) * src/include/graph.h (modified) * src/work/bfsdemo.cc (modified) * src/work/bfsdemo2.cc (modified) -New test: bfsdemo2.cc added - Graph class has a NodeMap and an ... Tue, 16 Dec 2003 16:19:08 GMT Alpar Juttner [6:b63d1bc367f7] * src/include/bfs.h (modified) * src/include/graph.h (modified) * src/work/bfsdemo.cc (modified) * src/work/bfsdemo2.cc (added) !!!Tests!!! Mon, 15 Dec 2003 17:46:22 GMT Alpar Juttner [5:f5852ebe00ca] * src/include/bfs.h (modified) . Sun, 14 Dec 2003 15:32:46 GMT Alpar Juttner [4:8009bb5ddd09] * src/include/bfs.h (modified) * src/work/bfsdemo.cc (modified) a 'bfs algorithm class' proposal added Sat, 13 Dec 2003 15:44:50 GMT Alpar Juttner [3:272a5677bd6d] * src/include/bfs.h (modified) * src/include/graph.h (modified) * src/include/oldgraph.h (modified) * src/work/bfsdemo.cc (added) * src/work/graphdemo.cc (modified) * src/work/makefile (modified) - Marci type iterator constructors - src/demo/bfsdemo.cc: demo for ... Thu, 11 Dec 2003 07:24:53 GMT Alpar Juttner [2:37117ebbabe2] * src/include/bfs.h (added) * src/include/graph.h (modified) * src/work/graphdemo.cc (modified) * src/work/makefile (modified) bfs Sat, 06 Dec 2003 19:32:27 GMT Alpar Juttner [1:207fb3c727cb] * src/include/graph.h (added) * src/include/oldgraph.h (added) * src/work/graphdemo.cc (added) * src/work/makefile (added) src/demo/graph.h: a proposal for a graph implementation ... Sat, 06 Dec 2003 19:14:54 GMT Alpar Juttner [0:d10681d156f9] * doc/.keepme (added) * src/.keepme (added) * src/include/.keepme (added) Initial revision
ubuntu-restricted-extras manually Asked by Ketan patel on 2012-01-05 I want to download Ubuntu-restricted-packages in .deb formats and install them offline as packages . how can I do that? Bcoz I have no internet connectivity in rural area. Question information Language: English Edit question Status: Answered For: Ubuntu ubuntu-restricted-extras Edit question Assignee: No assignee Edit question Last query: 2012-01-05 Last reply: 2012-01-05 Can you help with this problem? Provide an answer of your own, or ask Ketan patel for more information if necessary. To post a message you must log in.
[Skip to Content] Access to paid content on this site is currently suspended due to excessive activity being detected from your IP address 54.161.241.199. Please contact the publisher to request reinstatement. Sign In Individual Sign In Create an Account Institutional Sign In OpenAthens Shibboleth [Skip to Content Landing] Download PDF Figure 1. Developmental Trajectories of Autistic Symptom Severity Developmental Trajectories of Autistic Symptom Severity ADOS indicates Autism Diagnostic Observation Schedule. Figure 2. Developmental Trajectories of Adaptive Functioning Developmental Trajectories of Adaptive Functioning VABS II indicates Vineland Adaptive Behavior Scales, Second Edition. Figure 3. Cross-Trajectory Group Membership for Autistic Symptom Severity and Adaptive Functioning Cross-Trajectory Group Membership for Autistic Symptom Severity and Adaptive Functioning ADOS indicates Autism Diagnostic Observation Schedule. Table 1.   Sample Descriptive Statistics at Baseline Sample Descriptive Statistics at Baseline Table 2.   Descriptive Statistics by Trajectory Group and Time of Assessment Descriptive Statistics by Trajectory Group and Time of Assessment Table 3.   Correlates of Autistic Symptom Severity Trajectory Groups and Adaptive Functioning Trajectory Groups at Age 6 Years Correlates of Autistic Symptom Severity Trajectory Groups and Adaptive Functioning Trajectory Groups at Age 6 Years 1. Fein  D, Barton  M, Eigsti  IM,  et al.  Optimal outcome in individuals with a history of autism. J Child Psychol Psychiatry. 2013;54(2):195-205. PubMedArticle 2. Eaves  LC, Ho  HH.  Young adult outcome of autism spectrum disorders. J Autism Dev Disord. 2008;38(4):739-747. PubMedArticle 3. Howlin  P, Goode  S. Outcome in adult life for individuals with autism. In: Volkmar  F, ed. Autism and Developmental Disorders. New York, NY: Cambridge University Press; 1998. 4. Nordin  V, Gillberg  C.  The long-term course of autistic disorders: update on follow-up studies. Acta Psychiatr Scand. 1998;97(2):99-108. PubMedArticle 5. Howlin  P, Savage  S, Moss  P, Tempier  A, Rutter  M.  Cognitive and language skills in adults with autism: a 40-year follow-up. J Child Psychol Psychiatry. 2014;55(1):49-58. PubMedArticle 6. Howlin  P, Moss  P, Savage  S, Rutter  M.  Social outcomes in mid- to later adulthood among individuals diagnosed with autism and average nonverbal IQ as children. J Am Acad Child Adolesc Psychiatry. 2013;52(6):572-581.e1. doi:10.1016/j.jaac.2013.02.017. PubMedArticle 7. Howlin  P, Moss  P.  Adults with autism spectrum disorders. Can J Psychiatry. 2012;57(5):275-283. PubMed 8. Szatmari  P, Bryson  SE, Boyle  MH, Streiner  DL, Duku  E.  Predictors of outcome among high functioning children with autism and Asperger syndrome. J Child Psychol Psychiatry. 2003;44(4):520-528. PubMedArticle 9. Stevens  MC, Fein  DA, Dunn  M,  et al.  Subgroups of children with autism by cluster analysis: a longitudinal examination. J Am Acad Child Adolesc Psychiatry. 2000;39(3):346-352. PubMedArticle 10. Paul  R, Loomis  R, Chawarska  K.  Adaptive behavior in toddlers under two with autism spectrum disorders. J Autism Dev Disord. 2014;44(2):264-270. PubMedArticle 11. Klin  A, Saulnier  CA, Sparrow  SS, Cicchetti  DV, Volkmar  FR, Lord  C.  Social and communication abilities and disabilities in higher functioning individuals with autism spectrum disorders: the Vineland and the ADOS. J Autism Dev Disord. 2007;37(4):748-759. PubMedArticle 12. Magiati  I, Tay  XW, Howlin  P.  Cognitive, language, social and behavioural outcomes in adults with autism spectrum disorders: a systematic review of longitudinal follow-up studies in adulthood. Clin Psychol Rev. 2014;34(1):73-86. PubMedArticle 13. Waterhouse  L. Rethinking Autism: Variation and Complexity. San Diego, CA: Academic Press; 2012. 14. Lord  C, Risi  S, DiLavore  PS, Shulman  C, Thurm  A, Pickles  A.  Autism from 2 to 9 years of age. Arch Gen Psychiatry. 2006;63(6):694-701. PubMedArticle 15. Fountain  C, Winter  AS, Bearman  PS.  Six developmental trajectories characterize children with autism. Pediatrics. 2012;129(5):e1112-e1120. doi:10.1542/peds.2011-1601. PubMedArticle 16. Gotham  K, Pickles  A, Lord  C.  Trajectories of autism severity in children using standardized ADOS scores. Pediatrics. 2012;130(5):e1278-e1284. PubMedArticle 17. Georgiades  S, Szatmari  P, Boyle  M,  et al; Pathways in ASD Study Team.  Investigating phenotypic heterogeneity in children with autism spectrum disorder: a factor mixture modeling approach. J Child Psychol Psychiatry. 2013;54(2):206-215. PubMedArticle 18. Szatmari  P, Mérette  C, Bryson  SE,  et al.  Quantifying dimensions in autism: a factor-analytic study. J Am Acad Child Adolesc Psychiatry. 2002;41(4):467-474. PubMedArticle 19. Fombonne  E. Variation in age of diagnosis among pre-school children with autism spectrum disorder: regional differences. Paper presented at: 59th Annual Meeting of the American Academy of Child & Adolescent Psychiatry; October 26, 2012; San Francisco, California. 20. Volden  J, Georgiades  S, Alexander  M,  et al. Canadian services for young children with autism spectrum disorder: a preliminary overview. Paper presented at: International Meeting for Autism Research; May 17, 2012; Toronto, Ontario, Canada. 21. Lord  C, Risi  S, Lambrecht  L,  et al.  The Autism Diagnostic Observation Schedule–Generic: a standard measure of social and communication deficits associated with the spectrum of autism. J Autism Dev Disord. 2000;30(3):205-223. PubMedArticle 22. Lord  C, Rutter  M, Le Couteur  A.  Autism Diagnostic Interview–Revised: a revised version of a diagnostic interview for caregivers of individuals with possible pervasive developmental disorders. J Autism Dev Disord. 1994;24(5):659-685. PubMedArticle 23. American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders.ed 4. Washington, DC: American Psychiatric Association; 1994. 24. Gotham  K, Pickles  A, Lord  C.  Standardizing ADOS scores for a measure of severity in autism spectrum disorders. J Autism Dev Disord. 2009;39(5):693-705. PubMedArticle 25. Sparrow  SS, Cicchetti  DV, Balla  DA. Vineland Adaptive Behavior Scales, Second Edition (Vineland II). Livonia, MN: Pearson Assessments; 2005. 26. Risi  S, Lord  C, Gotham  K,  et al.  Combining information from multiple sources in the diagnosis of autism spectrum disorders. J Am Acad Child Adolesc Psychiatry. 2006;45(9):1094-1103. PubMedArticle 27. Achenbach  TM, Rescorla  LA. Manual for the ASEBA Preschool Forms and Profiles. Burlington: University of Vermont Research Center for Children, Youth, and Families; 2000. 28. Zimmerman  I, Streiner  R, Pond  R. Preschool Language Scale.4th ed. San Antonio, TX: Psychological Corp; 2002. 29. Volden  J, Smith  IM, Szatmari  P,  et al.  Using the Preschool Language Scale, Fourth Edition to characterize language in preschoolers with autism spectrum disorders. Am J Speech Lang Pathol. 2011;20(3):200-208. PubMedArticle 30. Roid  G, Sampers  J. Merrill-Palmer–Revised Scales of Development. Wood Dale, IL: Stoelting Co; 2004. 31. Nagin  DS. Group-Based Modeling of Development. Cambridge, MA: Harvard University Press; 2005. 32. Bauer  DJ.  Observations on the use of growth mixture models in psychological research. Multivariate Behav Res. 2007;42(4):757-786.Article 33. Rea  LM, Parker  RA. Designing and Conducting Survey Research. San Francisco, CA: Jossey-Boss; 1992. 34. Venker  CE, Ray-Subramanian  CE, Bolt  DM, Ellis Weismer  S.  Trajectories of autism severity in early childhood. J Autism Dev Disord. 2014;44(3):546-563. PubMedArticle 35. American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders.5th ed. Arlington, VA: American Psychiatric Association; 2013. 36. Georgiades  S, Szatmari  P, Boyle  M.  Editorial: importance of studying heterogeneity in autism. Neuropsychiatry. 2013;3(2):123-125.Article 37. Mandell  D.  The heterogeneity in clinical presentation among individuals on the autism spectrum is a remarkably puzzling facet of this set of disorders. Autism. 2011;15(3):259-261. PubMedArticle 38. Georgiades  S, Szatmari  P, Zwaigenbaum  L,  et al.  A prospective study of autistic-like traits in unaffected siblings of probands with autism spectrum disorder. JAMA Psychiatry. 2013;70(1):42-48. PubMedArticle Original Investigation March 2015 Developmental Trajectories of Symptom Severity and Adaptive Functioning in an Inception Cohort of Preschool Children With Autism Spectrum Disorder Author Affiliations • 1Centre for Addiction and Mental Health, The Hospital for Sick Children, University of Toronto, Toronto, Ontario, Canada • 2Offord Centre for Child Studies, McMaster University, Hamilton, Ontario, Canada • 3IWK Health Centre, Dalhousie University, Halifax, Nova Scotia, Canada • 4Department of Psychiatry, Oregon Health & Science University, Portland • 5Department of Educational and Counselling Psychology and Special Education, University of British Columbia, Vancouver, Canada • 6Department of Pediatrics, University of Toronto, Toronto, Ontario, Canada • 7Faculty of Education, School of Psychology, University of Ottawa, Ottawa, Ontario, Canada • 8Faculty of Rehabilitation Medicine, University of Alberta, Edmonton, Canada • 9Children’s Health Policy Centre, Faculty of Health Sciences, Simon Fraser University, Vancouver, British Columbia, Canada • 10Department of Pediatrics, University of Alberta, Edmonton, Canada • 11Department of Psychiatry, McGill University, Montreal, Quebec, Canada JAMA Psychiatry. 2015;72(3):276-283. doi:10.1001/jamapsychiatry.2014.2463 Abstract Importance  Symptom severity and adaptive functioning are fundamental domains of the autism spectrum disorder (ASD) phenotype. To date, the longitudinal association between these 2 domains has not been examined. Objective  To describe the developmental trajectories of autistic symptom severity and adaptive functioning in a large inception cohort of preschool children with ASD. Design, Setting, and Participants  The sample consisted of 421 newly diagnosed preschool children with ASD 2 to 4 years old (355 boys; mean age at study enrollment, 39.87 months) participating in a large Canadian multisite longitudinal study (Pathways in ASD Study). Prospective data collected at 4 points from time of diagnosis to age 6 years were used to track the developmental trajectories of children. Main Outcomes and Measures  Autistic symptom severity was indexed using the Autism Diagnostic Observation Schedule. Adaptive functioning was indexed using the Vineland Adaptive Behavior Scales, Second Edition. Results  Two distinct trajectory groups provided the best fit to the autistic symptom severity data. Group 1 (11.4% of the sample) had less severe symptoms and an improving trajectory (P < .05), whereas group 2 (88.6% of the sample) had more severe symptoms and a stable trajectory. Three distinct trajectory groups provided the best fit to the adaptive functioning data. Group 1 (29.2% of the sample) showed lower functioning and a worsening trajectory, group 2 (49.9% of the sample) had moderate functioning and a stable trajectory, and group 3 (20.9% of the sample) had higher functioning and an improving trajectory (P < .05). Cross-trajectory overlap between the autistic symptom severity and adaptive functioning groups was low (φ = 0.13, P < .05). Sex was a significant predictor of autistic symptom severity group membership and age at diagnosis, and language and cognitive scores at baseline predicted membership in adaptive functioning trajectories. Trajectories of both symptom severity and adaptive functioning predicted several different outcomes at age 6 years. Conclusions and Relevance  Findings confirm the heterogeneous nature of developmental trajectories in ASD. Change in adaptive functioning suggests that improvement is possible in roughly 20% of the sample. Autistic symptom severity appears to be more stable, with roughly 11% of the sample showing a marked decrease in symptom severity. During the preschool years, there appears to be only a small amount of “yoking” of developmental trajectories in autistic symptom severity and adaptive functioning. It is imperative that a flexible suite of interventions that target both autistic symptom severity and adaptive functioning should be implemented and tailored to each child’s strengths and difficulties. Introduction Although a small proportion of children with autism spectrum disorder (ASD) will go on to lose the diagnosis at some point during their life,1 the limited but informative body of literature on adult outcomes suggests that ASD is a lifelong condition that involves persisting and stable impairments in language, social skills, educational attainment, and activities of daily living.24 A recent comprehensive review5 concluded that the long-term outcome in ASD is mixed, including for individuals with typical IQ, and that most persons diagnosed as having ASD as children are unable to live and function as independent adults.6,7 These findings highlight the heterogeneity in developmental outcomes in ASD. A common pattern in outcome studies using data at 2 time points is the identification of a lower-functioning group with persisting autistic symptoms that tends to be stable and a higher-functioning group that starts with fewer symptoms and has better adaptive functioning over time.8,9 Cross-sectional analyses demonstrate a high inverse correlation between autistic symptom severity and adaptive functioning, reinforcing the clinical impression that autism represents a single spectrum encompassing these 2 phenotypic domains.10,11 In these follow-up investigations, IQ and language skills appear to be the strongest predictors of outcome.12 However, little is known about variables other than IQ and language that account for variability in outcomes for children with ASD. More recent longitudinal investigations with multiple data points and longer follow-up periods show that the degree of heterogeneity in ASD outcome is even more striking than previously believed, as reviewed by Waterhouse.13 Studies carried out by Lord and colleagues14 on language, autism severity scores, and cognition, as well as investigations performed by Fountain et al15 on social and communication skills and repetitive behaviors, illustrate the remarkable diversity in levels of these developmental domains and rates of change among children with ASD. In the most recent study to date by Gotham and colleagues,16 four different trajectories for autistic symptom severity were identified in a sample followed up from age 2 to 15 years. Meanwhile, Fountain et al15 described 6 different trajectories across the same age range using social and communication skills and repetitive behaviors as outcomes. Modeling change over several points in time needs to take into account the multifaceted nature of ASD to truly characterize variation in the natural history of ASD. There is not only potential heterogeneity among a population of children with ASD within a single domain but also potential heterogeneity across different domains over time. These findings are consistent with recent investigations emphasizing the phenotypic independence of different dimensions that make up the ASD construct.17 Three key methodological issues limit the generalization of findings from many of the available outcome studies in ASD, namely, sampling frame, sample size, and methods of assessment. Most previous studies have recruited participants at different points in the natural history of their disorder. Without sampling an inception cohort (a group assembled at a common time point early in the development of the disorder), there is no way of ensuring that specific subgroups of children with ASD are included in the sampling frame. For example, some very young children with ASD may make such rapid progress that they fall off the spectrum early on and so would not be picked up if sampling was to occur later in childhood. Second, convenience sampling is often used to recruit participants from highly specialized diagnostic or clinical centers or in nonsystematic ways. Both of these design features may select cases that are biased in important ways. Limits are thereby placed on the ability to generalize from the sample to the population. Small sample sizes (ie, often <50 children) in many previous studies place additional limits on the precision of estimates of change and make it difficult to use multivariable techniques to identify multiple predictors and moderators of outcome. Finally, many published outcome studies in ASD have relied on limited methods of assessment when looking at associations across domains. It is imperative to use a multimethod, multi-informant approach to minimize measurement error and to capture different perspectives on associations between predictors and outcomes and between different outcomes in ASD. The ASD phenotype is multivariable, comprising several developmental domains. Among the 2 most common domains used to characterize children with ASD are adaptive functioning and autistic symptom severity.18 Adaptive functioning refers to the attainment of developmentally appropriate skills and abilities in various areas, including socialization, communication, and activities of daily living. Conversely, autistic symptoms include deficits in social communication and a pattern of repetitive stereotyped behaviors. Previous factor analytic investigations have pointed out the independence of functioning and symptoms.18 However, admittedly there is much overlap, and the true underlying associations among developmental domains in ASD are not well understood from a longitudinal perspective. The objective of this study was to describe the developmental trajectories of autistic symptom severity and adaptive functioning in a large inception cohort of preschool children with ASD sampled in a systematic fashion. We are not aware of any studies that have explored the potential associations over time between these 2 fundamental phenotypic domains in ASD. A secondary objective was to understand potential predictors and outcomes associated with those trajectories. Methods Participants and Procedure The study was approved by the local research ethics boards at all participating sites, and written consent was obtained from the caregivers for their children to participate. Our sample consisted of 421 newly diagnosed preschool children with ASD (355 boys; mean age at study enrollment, 39.87 months) who were participating in a large Canadian multisite longitudinal study (http://www.asdpathways.ca). Descriptive statistics for the combined sample are listed in Table 1. The sites in Canada were Halifax, Nova Scotia; Montreal, Quebec; Hamilton, Ontario; Edmonton, Alberta; and Vancouver, British Columbia. There were no substantive differences across the sites in terms of clinical characteristics of the children with ASD. However, the timing and type of interventions provided (once a diagnosis was given) could differ by site. An intervention such as “More Than Words” (http://www.hanen.org/Programs/For-Parents/More-Than-Words.aspx) was offered soon after the diagnosis was given at one site (Montreal). In addition, children were diagnosed at a somewhat older age at one site compared with the others.19 Children from these 2 sites did not have different outcomes than children from other sites. Finally, there was variation in the types of services offered in each province20; for these reasons, site was used as a covariate in the analysis. To participate in the study, children had to meet the following inclusion criteria: (1) be between age 2 years and age 4 years 11 months, (2) have a recent (within 4 months) clinical diagnosis of ASD confirmed by the Autism Diagnostic Observation Schedule21 (ADOS) and the Autism Diagnostic Interview–Revised,22 and (3) have a clinical diagnosis assigned by a clinician using DSM-IV criteria.23 More detail on the inclusion and exclusion criteria is available in a study by Georgiades et al.17 We used an accelerated longitudinal design with 2 waves of children sampled 1 year apart. There were 4 data collection points, namely, at baseline, at 6 months and 12 months after baseline, and at age 6 years (at the end of the first year of primary school). The measure of adaptive functioning was administered at all 4 points. The measure of autistic symptom severity was obtained at 3 data points, namely, at baseline, 6 months later, and at age 6 years. Instruments Trajectory Indicators The ADOS21 is a semistructured direct assessment of communication, social interaction, and play or imaginative use of materials for individuals suspected of having autism or other pervasive developmental disorders. The ADOS calibrated severity score24 was used to index the developmental trajectories of autistic symptom severity. The development of a psychometrically reliable and valid measure of autism symptom severity that was developed to be independent from a measurement point of view from the level of functioning provides an important opportunity to test the association between symptom severity and adaptive functioning prospectively.24 The Vineland Adaptive Behavior Scales, Second Edition25 assesses child adaptive behavior in the communication, socialization, daily living skills, and motor domains. It is administered to a parent or caregiver using a semistructured interview format. The standard composite score was used to index the developmental trajectories of adaptive functioning. Trajectory Predictors and Outcomes The Autism Diagnostic Interview–Revised22 is a standardized semistructured interview used in the diagnosis of ASD. It is designed for use with a parent or caregiver who is familiar with the developmental history and current behavior of individuals older than 2 years. The diagnostic algorithms developed by Risi et al26 were used in the inclusion criteria at baseline. At age 6 years, total scores (current) from the following 3 major domains were used in the analysis: (1) language and communication, (2) reciprocal social interaction, and (3) restricted, repetitive, and stereotyped behaviors and interests. The 99-item Child Behavior Checklist27 1.5-5 norm-referenced instrument is widely used and evaluates a wide range of internalizing and externalizing problems. The Child Behavior Checklist is completed by parents based on observations of the child’s behavior in the previous 2 months. The total t scores for the internalizing and externalizing scales were used in the analysis as outcome measures at age 6 years. The Preschool Language Scale–Fourth Edition28 is a comprehensive language test for identifying children with a language disorder or delay. It is administered individually to children between birth and age 6 years 11 months or to older children who function developmentally within this age range. The Preschool Language Scale–Fourth Edition, indexed by the total language standard score, was used to obtain an index of early syntax and semantic skill in this sample of preschool children with ASD29 and was assessed at baseline and as an outcome measure at age 6 years. The Merrill-Palmer–Revised Scales of Development30 is a revised and recently standardized measure of intellectual ability that is appropriate for children 2 to 78 months old. The developmental index standard score used in the analysis comprises cognitive, receptive language, and fine motor subscales and was administered at baseline and at age 6 years. Data Analysis Children with missing data on at least 1 outcome measure at age 6 years had a higher Vineland Adaptive Behavior Scales, Second Edition score only at that time point (but no difference on any ADOS score) compared with children with complete data, providing reasonable evidence that data were missing at random. Our main analytic plan encompassed the following 4 stages: (1) the identification of distinct trajectories in autistic symptom severity and adaptive functioning, (2) the examination of overlap of trajectories in symptoms and functioning, (3) the prediction of group trajectory membership using variables obtained at baseline, and (4) the association of group trajectory membership with outcomes of interest at age 6 years. Based on the literature review, we assumed that the development of symptom severity and adaptive functioning over time would be extremely heterogeneous, so we needed a method that could capture that complexity. A semiparametric and group-based approach31 was used with the ADOS severity metric scores and the Vineland Adaptive Behavior Scales, Second Edition composite (standard) scores to identify different developmental trajectories in these domains. This specific modeling approach was chosen because it identifies distinct mixtures of trajectories within the population (as opposed to latent growth curve analysis, which assumes a homogeneous pattern of development).32 Furthermore, because the method assumes that data are missing at random, the retention of individuals with incomplete data in the analyses is possible, making full use of the available information. Multiple models were tested, and the Bayesian information criterion and average group posterior probability greater than 0.7 were used to determine the most parsimonious and best-fitting model to the data with the specified number of trajectory groups.31 After identifying trajectories in adaptive functioning and symptom severity, the overlap between trajectories in the 2 domains was assessed using a χ2 test of independence. The strength of association in overlap was estimated using the φ coefficient. A coefficient greater than 0.4 suggests moderate to strong “yoking” of developmental trajectories.33 Several child-specific variables at baseline were examined to see to what extent they predicted trajectory group membership. Age at diagnosis, sex, baseline IQ, and language scores were directly included in the derived trajectory models as risk factors to predict trajectory group membership. The association between trajectory group membership and outcome measures at age 6 years was then examined using analysis of variance. Outcome measures included internalizing and externalizing problems on the Child Behavior Checklist, Autism Diagnostic Interview–Revised domain scores (to look at current autistic symptoms from the parent’s perspective), IQ scores from the Merrill-Palmer–Revised Scales of Development, and language competence as measured by the Preschool Language Scale–Fourth Edition. Site was used as a covariate in these last 2 analyses to adjust for possible ascertainment or service differences across the data collection sites. Results Cross-sectional correlations between autistic symptom severity and adaptive functioning were of similar magnitude at each time point of data collection (range, r = −0.11 to r = −0.25). The wave-to-wave correlations for autistic symptom severity and adaptive functioning stayed stable over time: correlations between successive time points for autistic symptom severity and for adaptive functioning varied from 0.35 to 0.44 and from 0.77 to 0.84, respectively. Goodness-of-fit statistics for all tested trajectory models for autistic symptom severity and adaptive functioning are listed in eTable 1 and eTable 2 in the Supplement. Figure 1 shows the results for the trajectory analysis of autistic symptom severity. Two distinct trajectory groups provided the best fit to the data. The Bayesian information criterion was −2111.23, and the average group posterior probabilities were 0.80 for group 1 and 0.92 for group 2. Group 1 (11.4% of the sample) had less severe symptoms and a statistically significant improving trajectory (P < .05), whereas group 2 (88.6% of the sample) had more severe symptoms and a stable trajectory, suggesting little change in symptom severity over the period assessed. Descriptive statistics for autistic symptom severity by trajectory group and time of assessment are listed in Table 2. Figure 2 shows the results of the trajectory analysis for adaptive functioning (using standard scores). Three distinct quadratic trajectory groups provided the best fit to the data. The Bayesian information criterion was −5063.22, and the average group posterior probabilities were 0.93 for group 1, 0.86 for group 2, and 0.93 for group 3. Group 1 (29.2% of the sample) had lower functioning at baseline and a statistically significant worsening trajectory. Group 2 (49.9% of the sample) had moderate functioning at baseline and a stable trajectory. Group 3 (20.9% of the sample) had higher functioning at baseline and a statistically significant improving trajectory (P < .05). Descriptive statistics for adaptive functioning by trajectory group and time of assessment are listed in Table 2. Figure 3 shows the cross-trajectory membership between the autistic symptom severity and adaptive functioning groups (χ22 = 7.35, P < .05). The φ coefficient of 0.13 (P < .05) indicates a small but statistically significant amount of overlap across the trajectory groups. For example, 20.4% of the more severe and stable symptom group were in the group with higher functioning and improving adaptive functioning; 12.5% of the group with less severe and improving symptoms were in the group with lower functioning and worsening adaptive functioning. There was no one-to-one correspondence between symptom severity and adaptive functioning trajectories. The results of the analyses of risk factors showed that sex was the only significant predictor of autistic symptom group trajectory membership (P = .03) (eTable 3 in the Supplement). Boys were more likely to be in the group with more severe symptoms and a stable trajectory than girls, who were more likely to be in the group with less severe symptoms and an improving trajectory (controlling for age at diagnosis, cognitive and language scores, and site). In contrast, the results of the analysis of the adaptive functioning trajectories showed that age at diagnosis (P = .02), language competence (P < .001, indexed by the Preschool Language Scale–Fourth Edition), and IQ (P < .001, indexed by the Merrill-Palmer–Revised Scales of Development) at baseline predicted adaptive functioning trajectory group membership (eTable 4 in the Supplement) (controlling for site and sex). In other words, earlier age at diagnosis was more likely associated with membership in a group with higher functioning and improving. Higher baseline IQ or higher baseline language scores were associated with a greater likelihood of being in the trajectory groups with moderate functioning and a stable trajectory and with higher functioning and an improving trajectory. The analysis of variance results (Table 3) show that the 2 autistic symptom severity trajectory groups differed significantly on all outcome measures at age 6 years with the exception of externalizing problems (indexed by the Child Behavior Checklist). For the 3 adaptive functioning trajectory groups, there were significant differences on all outcome measures at age 6 years. Discussion To our knowledge, the present study represents the largest investigation to date of the developmental trajectories of autistic symptom severity and adaptive functioning in an inception cohort of preschool children with ASD. Study findings confirm that the heterogeneity within this sample of children with ASD seen at the point of ASD diagnosis appears to persist and in some cases increase from baseline to age 6 years. This outcome is particularly evident in the adaptive functioning trajectories, in which the possibility of improvement in the first few years after diagnosis is seen in roughly 20% of the sample. Autistic symptom severity appears to be more stable, but here again roughly 11% of the children in our sample show a decrease in symptom severity from baseline to age 6 years. The patterns of substantial stability of symptom severity in most children and a decrease in symptom severity in a smaller subgroup of children with ASD are consistent with the findings by Gotham et al16 and by Venker et al.34 The developmental trajectories identified in the present study appear to be clinically meaningful in terms of variables that predict trajectory membership and in terms of outcomes. The different trajectories in both domains (symptom severity and adaptive functioning) are associated with differences in terms of variables that predict group membership and in terms of outcomes. It was intriguing that female sex was more commonly associated with the group with less severe and improving symptoms (controlling for the other variables) and that age at diagnosis was more commonly associated with the group with higher functioning and improving (again controlling for the covariates). These findings have important implications for surveillance and early identification efforts. Perhaps the main message of this study is that, during the preschool years, there appears to be only a small amount of yoking of the developmental trajectories in autistic symptom severity and adaptive functioning. For example, it is possible for some children with more severe and stable autistic symptoms to show notable improvement in adaptive functioning, underscoring their capacity to learn (Figure 3). This finding highlights the importance of close surveillance of these 2 domains independently over time. The commonly held notion of higher-functioning and lower-functioning types of ASD being congruent with less and more severe autistic symptoms, respectively, might be too simplistic and is not supported by the trajectory data presented herein. Although there is certainly a link (based on cross-sectional correlations) between a child’s autistic symptom severity and adaptive functioning at any given point, longitudinal data presented herein suggest that this association is much more complex over time. The DSM-5 has recently replaced the different pervasive developmental disorder subtypes (autism, Asperger, and pervasive developmental disorder–not otherwise specified) with a single diagnostic category of ASD.35 Although this change may be justified by a lack of reliable differentiation and stability of subtypes and by a lack of evidence supporting differences in etiological markers, it should not obscure the fact that ASD is a remarkably heterogeneous disorder.36,37 Fortunately, the DSM-5 includes several ways of dealing with this heterogeneity by using a dimensional approach and by adding specifiers of language, cognitive ability, and other markers (adaptive functioning, however, not being one of them). We would argue that specifiers of the developmental trajectories (up to at least age 6 years) could prove useful in capturing diversity and could contribute to the identification of more meaningful and relevant subgroups to be the focus of future research in etiology and treatment response. The inclusion of such developmental specifiers (including adaptive functioning) might expand the capability of the DSM-5 from a static diagnostic to a dynamic prognostic classification framework for ASD. The strengths of the study include the large sample size, the ascertainment of an inception cohort, and the use of multimethod, multi-informant instruments, as well as the inclusion of carefully selected predictor and outcome variables that are conceptually distinct (from a measurement point of view) from the indicators used in the trajectory analysis. To our knowledge, this is the largest prospective outcome study of children with ASD published and is only the second ascertaining an inception cohort, following the study by Lord et al.14 Both of these design features should ensure the precision of our estimates, allow the detection of small but possibly important effects, and assure the representativeness of our findings. Despite its strengths, the present study has several limitations. First, we cannot be certain that the children and families who agreed to participate in our study (58.2% of those approached) are similar to those who declined regarding variables that potentially influence the trajectories under investigation. Second, within the children and families enrolled in our study, we cannot be certain that those who did not participate at all data points are similar to those who did on key predictor or confounding variables. Third, we only had 3 data points for the ADOS symptom severity measure (compared with 4 for the Vineland Adaptive Behavior Scales, Second Edition adaptive functioning measure), so the difference in trajectory variability or pattern may be at least in part a function of the number of data points. Limited data points also make it difficult to estimate the shape of the trajectory curve to see if the rate of change varies over time. Additional follow-up assessments are under way and will allow us to address this issue in more detail. Fourth, the present analysis did not investigate the possible effect of services or opportunities to learn adaptive functioning skills on the developmental trajectories of children with ASD. This is a complex issue because services can vary by age at onset and by length, intensity, type, and quality of intervention; any of these factors could have a major role in outcomes and might account for significant variability in the developmental trajectories. Fifth, the trajectories of preschool children described in the present study reflect only the heterogeneity in adaptive functioning and symptom severity and do not capture the entire ASD phenotype that comprises additional developmental domains. Conclusions Individual children with ASD differ from each other in terms of autistic symptom severity and adaptive functioning from the time of diagnosis in the preschool years, and some of these differences appear to increase by age 6 years. Moreover, change in one domain is not necessarily associated with change in another. Children with ASD appear to start their course with important baseline differences. Therefore an important key to improving trajectories may occur before the diagnosis is officially given when children manifest behavioral or functional concerns during an at-risk or prodromal phase.38 Once children with ASD are given a diagnosis and are enrolled in treatment programs, it is imperative that a flexible suite of interventions should then be implemented and tailored to each child’s strengths and difficulties. Individualized interventions need to focus on both adaptive functioning and autistic symptom severity because improvement in one domain does not ensure improvement in the other. Back to top Article Information Submitted for Publication: February 14, 2014; final revision received September 3, 2014; accepted September 3, 2014. Corresponding Author: Peter Szatmari, MD, Centre for Addiction and Mental Health, The Hospital for Sick Children, University of Toronto, 80 Workman Way, Fifth Floor, Room 5226, Toronto, ON M6J 1H4, Canada (peter.szatmari@camh.ca). Published Online: January 28, 2015. doi:10.1001/jamapsychiatry.2014.2463. Author Contributions: Dr Szatmari had full access to all the data in the study and takes responsibility for the integrity of the data and the accuracy of the data analysis. Study concept and design: Szatmari, Georgiades, Bennett, Bryson, Roberts, Smith, Vaillancourt, Volden, Waddell, Zwaigenbaum. Acquisition, analysis, or interpretation of data: Georgiades, Duku, Bryson, Fombonne, Mirenda, Smith, Zwaigenbaum, Elsabbagh, Thompson. Drafting of the manuscript: Szatmari, Georgiades, Duku, Bennett, Bryson, Smith, Elsabbagh. Critical revision of the manuscript for important intellectual content: Georgiades, Bennett, Fombonne, Mirenda, Roberts, Smith, Vaillancourt, Volden, Waddell, Zwaigenbaum, Elsabbagh, Thompson. Statistical analysis: Georgiades, Duku, Bennett, Vaillancourt. Obtained funding: Szatmari, Bryson, Fombonne, Mirenda, Roberts, Smith, Volden, Waddell, Zwaigenbaum. Administrative, technical, or material support: Georgiades, Bryson, Smith, Elsabbagh, Thompson. Study supervision: Smith, Zwaigenbaum. Conflict of Interest Disclosures: None reported. Funding/Support: Dr Georgiades was supported by an Autism Research Training fellowship from the Canadian Institutes of Health Research. This study was supported by the Canadian Institutes of Health Research, NeuroDevNet, Autism Speaks, the Government of British Columbia, the Alberta Innovates Health Solutions, and the Sinneave Family Foundation. Role of the Funder/Sponsor: The funding sources had no role in the design and conduct of the study; collection, management, analysis, and interpretation of the data; preparation, review, or approval of the manuscript; and decision to submit the manuscript for publication. Group Information: These Pathways in ASD Study Team members had equal contribution to the study and are listed here alphabetically: Liliana Abruzzese, Megan Alexander, Susan Bauld, Ainsley Boudreau, MASP, Colin Andrew Campbell, MA, Mike Chalupka, BSc, BA(Hon), Lorna Colli, DCS, Melanie Couture, PhD, Bev DaSilva, Vikram Dua, MD, Miriam Elfert, PhD, Lara El-Khatib, PhD, Lindsay Fleming, MA, Kristin Fossum, PhD, Nancy Garon, PhD, Shareen Holly, Stephanie Jull, PhD, Karen Kalynchuk, MA, Kathryne MacLeod, BSc, Preetinder Narang, MEd, Julianne Noseworthy, MA, Irene O’Connor, MEd Psych, Kaori Ohashi, MA, Sarah Peacock, BA, Teri Phillips, BSc, Sara Quirke, MA, Katie Rinald, MA, Jennifer Saracino, MA, Cathryn Schroeder, MA, Cody Shepherd, BA(Hon), Rebecca Simon, PhD, Mandy Steiman, PhD, Richard Stock, PhD, Benjamin Taylor, BSc, Lee Tidmarsh, MD, Larry Tuff, PhD, Kathryn Vaillancourt, Stephen Wellington, MD, Isabelle Yun, and Li Hong Zhong. Additional Contributions: We thank the children and families who participated in the Pathways in ASD Study. We also acknowledge the members of the Pathways in ASD Study Team. References 1. Fein  D, Barton  M, Eigsti  IM,  et al.  Optimal outcome in individuals with a history of autism. J Child Psychol Psychiatry. 2013;54(2):195-205. PubMedArticle 2. Eaves  LC, Ho  HH.  Young adult outcome of autism spectrum disorders. J Autism Dev Disord. 2008;38(4):739-747. PubMedArticle 3. Howlin  P, Goode  S. Outcome in adult life for individuals with autism. In: Volkmar  F, ed. Autism and Developmental Disorders. New York, NY: Cambridge University Press; 1998. 4. Nordin  V, Gillberg  C.  The long-term course of autistic disorders: update on follow-up studies. Acta Psychiatr Scand. 1998;97(2):99-108. PubMedArticle 5. Howlin  P, Savage  S, Moss  P, Tempier  A, Rutter  M.  Cognitive and language skills in adults with autism: a 40-year follow-up. J Child Psychol Psychiatry. 2014;55(1):49-58. PubMedArticle 6. Howlin  P, Moss  P, Savage  S, Rutter  M.  Social outcomes in mid- to later adulthood among individuals diagnosed with autism and average nonverbal IQ as children. J Am Acad Child Adolesc Psychiatry. 2013;52(6):572-581.e1. doi:10.1016/j.jaac.2013.02.017. PubMedArticle 7. Howlin  P, Moss  P.  Adults with autism spectrum disorders. Can J Psychiatry. 2012;57(5):275-283. PubMed 8. Szatmari  P, Bryson  SE, Boyle  MH, Streiner  DL, Duku  E.  Predictors of outcome among high functioning children with autism and Asperger syndrome. J Child Psychol Psychiatry. 2003;44(4):520-528. PubMedArticle 9. Stevens  MC, Fein  DA, Dunn  M,  et al.  Subgroups of children with autism by cluster analysis: a longitudinal examination. J Am Acad Child Adolesc Psychiatry. 2000;39(3):346-352. PubMedArticle 10. Paul  R, Loomis  R, Chawarska  K.  Adaptive behavior in toddlers under two with autism spectrum disorders. J Autism Dev Disord. 2014;44(2):264-270. PubMedArticle 11. Klin  A, Saulnier  CA, Sparrow  SS, Cicchetti  DV, Volkmar  FR, Lord  C.  Social and communication abilities and disabilities in higher functioning individuals with autism spectrum disorders: the Vineland and the ADOS. J Autism Dev Disord. 2007;37(4):748-759. PubMedArticle 12. Magiati  I, Tay  XW, Howlin  P.  Cognitive, language, social and behavioural outcomes in adults with autism spectrum disorders: a systematic review of longitudinal follow-up studies in adulthood. Clin Psychol Rev. 2014;34(1):73-86. PubMedArticle 13. Waterhouse  L. Rethinking Autism: Variation and Complexity. San Diego, CA: Academic Press; 2012. 14. Lord  C, Risi  S, DiLavore  PS, Shulman  C, Thurm  A, Pickles  A.  Autism from 2 to 9 years of age. Arch Gen Psychiatry. 2006;63(6):694-701. PubMedArticle 15. Fountain  C, Winter  AS, Bearman  PS.  Six developmental trajectories characterize children with autism. Pediatrics. 2012;129(5):e1112-e1120. doi:10.1542/peds.2011-1601. PubMedArticle 16. Gotham  K, Pickles  A, Lord  C.  Trajectories of autism severity in children using standardized ADOS scores. Pediatrics. 2012;130(5):e1278-e1284. PubMedArticle 17. Georgiades  S, Szatmari  P, Boyle  M,  et al; Pathways in ASD Study Team.  Investigating phenotypic heterogeneity in children with autism spectrum disorder: a factor mixture modeling approach. J Child Psychol Psychiatry. 2013;54(2):206-215. PubMedArticle 18. Szatmari  P, Mérette  C, Bryson  SE,  et al.  Quantifying dimensions in autism: a factor-analytic study. J Am Acad Child Adolesc Psychiatry. 2002;41(4):467-474. PubMedArticle 19. Fombonne  E. Variation in age of diagnosis among pre-school children with autism spectrum disorder: regional differences. Paper presented at: 59th Annual Meeting of the American Academy of Child & Adolescent Psychiatry; October 26, 2012; San Francisco, California. 20. Volden  J, Georgiades  S, Alexander  M,  et al. Canadian services for young children with autism spectrum disorder: a preliminary overview. Paper presented at: International Meeting for Autism Research; May 17, 2012; Toronto, Ontario, Canada. 21. Lord  C, Risi  S, Lambrecht  L,  et al.  The Autism Diagnostic Observation Schedule–Generic: a standard measure of social and communication deficits associated with the spectrum of autism. J Autism Dev Disord. 2000;30(3):205-223. PubMedArticle 22. Lord  C, Rutter  M, Le Couteur  A.  Autism Diagnostic Interview–Revised: a revised version of a diagnostic interview for caregivers of individuals with possible pervasive developmental disorders. J Autism Dev Disord. 1994;24(5):659-685. PubMedArticle 23. American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders.ed 4. Washington, DC: American Psychiatric Association; 1994. 24. Gotham  K, Pickles  A, Lord  C.  Standardizing ADOS scores for a measure of severity in autism spectrum disorders. J Autism Dev Disord. 2009;39(5):693-705. PubMedArticle 25. Sparrow  SS, Cicchetti  DV, Balla  DA. Vineland Adaptive Behavior Scales, Second Edition (Vineland II). Livonia, MN: Pearson Assessments; 2005. 26. Risi  S, Lord  C, Gotham  K,  et al.  Combining information from multiple sources in the diagnosis of autism spectrum disorders. J Am Acad Child Adolesc Psychiatry. 2006;45(9):1094-1103. PubMedArticle 27. Achenbach  TM, Rescorla  LA. Manual for the ASEBA Preschool Forms and Profiles. Burlington: University of Vermont Research Center for Children, Youth, and Families; 2000. 28. Zimmerman  I, Streiner  R, Pond  R. Preschool Language Scale.4th ed. San Antonio, TX: Psychological Corp; 2002. 29. Volden  J, Smith  IM, Szatmari  P,  et al.  Using the Preschool Language Scale, Fourth Edition to characterize language in preschoolers with autism spectrum disorders. Am J Speech Lang Pathol. 2011;20(3):200-208. PubMedArticle 30. Roid  G, Sampers  J. Merrill-Palmer–Revised Scales of Development. Wood Dale, IL: Stoelting Co; 2004. 31. Nagin  DS. Group-Based Modeling of Development. Cambridge, MA: Harvard University Press; 2005. 32. Bauer  DJ.  Observations on the use of growth mixture models in psychological research. Multivariate Behav Res. 2007;42(4):757-786.Article 33. Rea  LM, Parker  RA. Designing and Conducting Survey Research. San Francisco, CA: Jossey-Boss; 1992. 34. Venker  CE, Ray-Subramanian  CE, Bolt  DM, Ellis Weismer  S.  Trajectories of autism severity in early childhood. J Autism Dev Disord. 2014;44(3):546-563. PubMedArticle 35. American Psychiatric Association. Diagnostic and Statistical Manual of Mental Disorders.5th ed. Arlington, VA: American Psychiatric Association; 2013. 36. Georgiades  S, Szatmari  P, Boyle  M.  Editorial: importance of studying heterogeneity in autism. Neuropsychiatry. 2013;3(2):123-125.Article 37. Mandell  D.  The heterogeneity in clinical presentation among individuals on the autism spectrum is a remarkably puzzling facet of this set of disorders. Autism. 2011;15(3):259-261. PubMedArticle 38. Georgiades  S, Szatmari  P, Zwaigenbaum  L,  et al.  A prospective study of autistic-like traits in unaffected siblings of probands with autism spectrum disorder. JAMA Psychiatry. 2013;70(1):42-48. PubMedArticle ×
Extenso Imprime um valor por Extenso Exemplo da Rotina: Extenso(nValor) Exemplo 1- Guardando em uma variável o valor em texto: nValor := 500 cTexto := Extenso(nValor) //QUINHENTOS REAIS Exemplo 2- Guardando em uma variável o valor em texto, mas de uma forma legível melhor: nValor := 500 cTexto := Capital(Extenso(nValor)) //Quinhentos Reais Exemplo 3- Guardando em uma variável o valor em texto sem o texto de reais (formato de quantidade), mas de uma forma legível melhor: nValor := 2.87 cTexto := Capital(Extenso(nValor, .T.)) //Dois e Oitenta e Sete Observações: – Caso tenha dúvidas ou problemas com os exemplos, entre em contato; – Se tiver sugestões de rotinas, pode entrar em contato; Referências: TDN Receba novidades Seja VIP e receba novidades exclusivas por e-Mail gratuitamente. Junte-se a 4.383 outros assinantes
Writing a leaving speech pathology Mild Fluent Individuals with Wernicke's aphasia, also referred to as receptive or fluent aphasia, may speak in long sentences that have no meaning, add unnecessary words, and even create new "words" neologisms. For example, someone with receptive aphasia may say, "Delicious taco", meaning "The dog needs to go out so I will take him for a walk". Writing a leaving speech pathology Vitamins and minerals calcium, germanium, magnesium, manganese, selenium, tin, tungsten, vanadium, zinc, etc. Weighted blankets or vests. Background Autism spectrum disorders ASD are a group of biologically based chronic neurodevelopmental disorders characterized by impairments in two major domains: The exact cause is unknown, but is believed to have many factors, including a strong genetic component. Signs and symptoms of ASD generally appear prior to three years of age and include difficulties with language, deficient social skills and restricted or repetitive body movements and behaviors. Autism has been estimated to affect approximately 1 in 1, children in the United States, and other pervasive developmental disorders have been estimated to affect approximately 2 in 1, children in the United States. Based on recent prevalence estimates of 10 to 20 cases per 10, individuals, between 60, andchildren under the age of 15 years meet diagnostic criteria for autism. There is no cure for ASD. However, there is a consensus that treatment must be individualized depending upon the specific strengths, weaknesses and needs of the child and family. Early diagnosis and early intensive treatment have the potential to affect outcome, particularly with respect to behavior, functional skills and communication. There is increasing evidence that intervention is more effective when initiated as early as possible. Diagnosis and treatment of ASD may involve a variety of tools. Developmental screening, usually performed during a routine well child exam, identifies atypical unusual behaviors such as social, interactive and communicative behaviors that are delayed, abnormal or absent. Once identified, a comprehensive multidisciplinary assessment is recommended in order to make an accurate and appropriate diagnosis. According to the American Academy of Neurology AAN 's practice parameter, Screening and Diagnosis of Autism Filipek et al,autism is characterized by severe deficiencies in reciprocal social interaction, verbal and non-verbal communication, and restricted interests. It usually commences before the age of 3 years and lasts over the whole lifetime. Early signs that distinguish autism from other atypical patterns of development include poor use of eye gaze, lack of gestures to direct other people's attention especially to show things of interestdecreased social responsiveness, and lack of age-appropriate play with toys especially imaginative use of toys. A typical symptom of autism is absence of speech development, observed from infancy, taking the form of complete mutism at later stages. It has been emphasized that most pathological symptoms of autism result from altered perception of external stimuli, which arouse fear and anxiety. Currently, there are no biological markers for autism and there is no proven cure for this disorder. Because there are no biological markers for autism, screening must focus on behavior. These symptoms are stable in children from toddler age through preschool age. Retrospective analysis of home videotapes also has identified behaviors that distinguish infants with autism from other developmental disabilities as early as 8 months of age. There are relatively few appropriately sensitive and specific autism screening tools for infants and toddlers, and this continues to be the current focus of many research centers. writing a leaving speech pathology The Checklist for Autism in Toddlers CHAT for month-old infants, and the Autism Screening Questionnaire for children 4 years of age and older, have been validated on large populations of children. Performance on tasks that rely on rote, mechanical, or perceptual processes are typically spared; deficient performance exists on tasks requiring higher-order conceptual processes, reasoning, interpretation, integration, or abstraction. Dissociations between simple and complex processing are reported in the areas of language, memory, executive function, motor function, reading, mathematics, and perspective-taking. However, there is no reported evidence that confirms or excludes a diagnosis of autism based on these cognitive patterns alone. The AAN practice parameter did not recommend that neuropsychological testing be used for the diagnosis of autism, but insteadshould be performed as needed, in addition to a cognitive assessment, to assess social skills and relationships, educational functioning, problematic behaviors, learning style, motivation and reinforcement, sensory functioning, and self-regulation. Top 3 UK Essay Writing Services Psychological testing is recommended in the AACAP practice parameter to assess for cognitive and intellectual functioning, in order to determine eligibility and plan for educational and other services. These features, in conjunction with the increased number of male patients 3: On the other hand, parallel evidence of immune abnormalities in autistic patients argues for an implication of the immune system in pathogenesis. Additionally, some neurological disorders such as tuberous sclerosis, neurofibromatosis, fragile X syndrome, Rett syndrome and phenylketonuria may also be associated with autistic features. writing a leaving speech pathology In these cases, autism is defined as "secondary". The AAN's practice parameter Screening and Diagnosis of Autism Filipek et al, recommended genetic testing in children with autism, specifically high resolution chromosome analysis karyotype and DNA analysis for fragile X syndrome in the presence of mental retardation or if mental retardation can not be excludedif there is a family history of fragile X or undiagnosed mental retardation, or if dysmorphic features are present. However, there is little likelihood of positive karyotype or fragile X testing in high-functioning autism. Published studies have reported superior diagnostic yields of newer genetic tests e. However, these findings are not sufficient for drawing a conclusion that use of the tests will lead to improved health outcomes The AAN also recommended lead screening if the child exhibits developmental delay and pica. Autistic regression with epileptiform abnormalities on EEG has been compared by analogy with Landau-Kleffner syndrome and electrical status epilepticus in sleep, but there are important differences between these conditions, and the treatment implications are unclear AAP, Whether subclinical seizures have adverse effects on language, cognition, and behavior is debated, and there is no evidence-based recommendation for the treatment of children with ASDs and epileptiform abnormalities on EEG, with or without regression. The report states, however, that because of the increased prevalence of seizures in this population, a high index of clinical suspicion should be maintained, and EEG should be considered when there are clinical spells that might represent seizures. Localized structural and functional brain correlates of PDD have yet to be established. Structural neuroimaging studies performed in autistic patients have reported abnormalities such as increased total brain volume and cerebellar abnormalities. However, none of these abnormalities fully account for the full range of autistic symptoms.The Acoustic Analysis Of Speech presents essential information on modern methods for the acoustic analysis of speech. It assumes only a modest technical background and is intended for the reader who wants to know the basic issues in speech analysis but does not have an extensive background in engineering, physics or mathematics. Bouvier's Law Dictionary Edition. P. PACE.A measure of length containing two feet and a half; the geometrical pace is five feet long. The common pace is the length of a step; the geometrical is the length of two steps, or the whole space passed over by the same foot from one step to another. Speech Class Rules [Ronda M. Wojcicki, Loel Barr] on ph-vs.com *FREE* shipping on qualifying offers. Created with the vision of educating everyone about speech therapy, this book is being used to introduce the concept of therapy to children recently diagnosed. I am a Speech Therapist and the mother of a 3 year old child with apraxia. I decided early on that it was going to be too difficult to be both mother and therapist to my child, so I sought services through our state’s early intervention program. I still love the theory of Speech Pathology, particularly diagnostics and neurology, but really dislike the day-to-day therapy aspect of speech. I have been practicing for about 3 years, and knew from my first day in clinic that maybe this wasn't the best field for me. Aphasia is an inability to comprehend or formulate language because of damage to specific brain regions. This damage is typically caused by a cerebral vascular accident (), or head trauma; however, these are not the only possible ph-vs.com be diagnosed with aphasia, a person's speech or language must be significantly impaired in one (or several) of the four communication modalities following. How to become a speech pathologist in Australia: careers in speech pathology, Career FAQs
Loading Now Dental Sicknesses Teeth Oral Health Necessary Prioritizing Teeth Oral Health Why It is Absolutely Necessary Dental Sicknesses Teeth: Oral illnesses, whatever their objective (injury, contamination, allergen, heredity), extraordinarily entangle day-to-day existence and are an unpleasant variable for most of the populace. What’s more, the way that the excellence of the dentition and the appeal of a grin are social considerations puts dental illnesses at the very front of infections that require prompt treatment. The most widely recognized dental infections and their side effects are the subject of our review. Since all dental illnesses are straightforwardly connected with oral depression, the side effects of sicknesses are some way or another attached to this specific piece of the body. What sensations help to figure out that the reason for our enduring lies in the tooth, gum, and jaw? Illnesses and side effects We should attempt to order a rundown of side effects normal to all illnesses of the teeth and gums: Torment (hurting, sharp, pounding); • Enlarging of the gums, and lips; • Draining gums, purulent release; • Awful breath; • The sensation of distress in the mouth. • Normal dental sicknesses and their side effects. Caries With caries, there is a smell from the mouth, there is staining of the teeth and inadequate salivation, intense torment, and obliteration of lacquer and dentin. Pulpitis At the point when the nerve is half-uncovered, intense torment assumes an occasional personality and doesn’t permit it to nod off. The tooth becomes overly sensitive to cold and hot. Periodontitis The principal side effect of this dental infection is an intense developing aggravation, bothered by contacting the sick tooth, frequently joined by the expansion of the gums. Conceivable tooth portability and the presence of a fistula. Gum Disease For this sickness, enlarging and redness of the gums, torment, draining from the gums, and halitosis are suggestive. Periodontitis The primary signs by which periodontitis can be analyzed are a detachment of the teeth, release from the gums, a horrendous smell, an ulcer, and the discovery of tartar. Periodontal Infection Side effects of periodontal sickness are not extremely articulated – this is the openness of the neck of the tooth without irritation, tingling in the gums, aversion to synthetic aggravations, and temperature impacts. Extreme torment is often felt while biting. Tooth Sore The guile of the growth lies in the obscuring of the side effects, and the vagueness of its appearance. This dental illness has the accompanying side effects: general discomfort, fever, torment in the tooth while gnawing, and enlarging of the lymph hubs. Tooth Sore Edema in the oral depression, blushing of the gums, delayed torment in the tooth, fever, foul smell, and purulent ulcer on the gums – these are the principal signs by which a sore in the gums can be recognized. Side Effects In Dentistry – A Significant Viewpoint In Conclusion Sicknesses of the oral cavity are portrayed by different side effects and outer signs, which can be covered up and hard to decide while making the right determination. What’s more, unique dental infections can have comparative side effects, so it is vital to arrange them accurately and lead to extra diagnostics (X-beam). Solely after every one of the fundamental systems might you at any point precisely determine the sickness and continue to have dental therapy. Dental (Teeth) Illnesses Counteraction Tips: Guaranteeing A Long Period Of Solid Grins With regards to keeping up with ideal oral well-being and safeguarding those brilliant grins, counteraction is the key. At Dental Center we have confidence in the force of information and proactive dental consideration. In this complete aid, we will give you priceless bits of knowledge and significant hints to assist you with forestalling dental sicknesses and accomplishing a long period of sound grins. Grasping the Significance of Dental (Teeth) Wellbeing Your oral well-being is a window into your general prosperity. Dismissing it can prompt different dental illnesses that can be agonizing, exorbitant to treat, and affect your personal satisfaction. By making the right strides now, you can stay away from these issues and keep your teeth and gums in excellent condition. The Job of Diet in Dental Wellbeing Eating Ideal for Solid Teeth and Gums A reasonable eating regimen helps your waistline as well as assumes an urgent part in keeping up with great dental well-being.Calcium and vitamin D are essential elements for healthy teeth and gums. Nutrient- and mineral-rich foods are also important. Consolidate dairy items, salad greens, and nuts into your eating regimen to guarantee you’re getting the essential supplements. Limit Sweet and Acidic Food Varieties Exorbitant utilization of sweet and acidic food sources can prompt tooth rot and disintegration. These substances establish an optimal climate for destructive microbes to flourish. Eliminating sweet tidbits, carbonated drinks, and confections can fundamentally decrease your gamble of dental sicknesses. The Significance of Legitimate Oral Cleanliness Brushing and Flossing: Your Day to day Ceremonies Keeping a thorough oral cleanliness routine is fundamental in forestalling dental illnesses. Clean your teeth with fluoride toothpaste around two times every day, and floss between your teeth to dispose of food pieces and plaque development. Remember to supplant your toothbrush every three to four months for powerful cleaning. Ordinary Dental Check-Ups Ordinary visits to your dental specialist are not only for when you have an issue.Dental professionals can administer preventative medications and identify early signs of dental illnesses. Accordingly, expect to plan an examination and cleaning like clockwork to hold your oral well-being under tight restraints. The Risks of Tobacco and Liquor Phase out the Vice for a Better Grin Smoking and exorbitant liquor utilization are negative to your general well-being as well and can unleash devastation on your dental well-being. Generally, Smoking damages teeth, inflames the gums, and increases the risk of oral cancer growth. Liquor can prompt dry mouth, which, thus, raises the gamble of depression and gum sickness. The best present you can offer your smile is probably to stop these tendencies. Safeguarding Your Teeth During Proactive Tasks The Significance of Mouthguards In the event that you’re a functioning person who partakes in sports or sporting exercises, consider utilizing a mouthguard. Furthermore, mouthguards can forestall dental wounds like chipped teeth or tooth misfortune. They offer a defensive pad for your teeth, guaranteeing your grin stays in one piece in any event, during extreme proactive tasks. Tending to Pressure for Better Dental Wellbeing Stress The executives for Oral well-being Stress can show itself in different ways, including teeth crushing and holding, known as bruxism. Conversely, these propensities can prompt dental issues like broken teeth and jaw torment. Rehearsing pressure alleviation procedures, for example, contemplation and yoga can assist with shielding your teeth from superfluous mileage. Water: Nature’s Gift to Your Teeth Hydration and Dental Wellbeing Drinking a lot of water over the course of the day keeps you hydrated as well as advances better dental well-being. Further, water helps wash away food particles, lessens sharpness in your mouth, and animates the development of spit, which has regular antibacterial properties. The Job of Hereditary Qualities Grasping Hereditary Variables While your propensities and way of life assume a huge part in your dental well-being, hereditary qualities can likewise impact your defenselessness to dental sicknesses. In the event that you have a family background of dental issues, it’s fundamental to be extra watchful and follow a severe oral cleanliness schedule. Conclusion All in all, your oral well-being is a valuable resource that requires steady consideration and consideration. By following these dental sickness counteraction tips and making them a piece of your regular routine. Especially, you can defend your grin for quite a long time in the future. Keep in mind, that a sound grin upgrades your appearance as well as lifts your certainty and generally speaking prosperity. At the Dental facility, we are devoted to advancing great dental well-being. In particular, if you have any desire to peruse more data about how to support traffic on your site. And further, improve your web-based presence, Put resources into your dental well-being today, and partake in a long period of solid grins! Dental Clinic, Best Dentist In IslamabadDental Clinic Near Me. Dentist In IslamabadBest Dentists In IslamabadDental Clinic In Islamabad. Islamabad Dental HospitalNearest Dental Clinic, Dental Hospital Near Me,  we do care about your smile. Post Comment
arrayCGHbase: an analysis platform for comparative genomic hybridization microarrays • Björn Menten1, Affiliated with • Filip Pattyn1, Affiliated with • Katleen De Preter1, Affiliated with • Piet Robbrecht1, Affiliated with • Evi Michels1, Affiliated with • Karen Buysse1, Affiliated with • Geert Mortier1, Affiliated with • Anne De Paepe1, Affiliated with • Steven van Vooren2, Affiliated with • Joris Vermeesch3, Affiliated with • Yves Moreau2, Affiliated with • Bart De Moor2, Affiliated with • Stefan Vermeulen4, Affiliated with • Frank Speleman1 and Affiliated with • Jo Vandesompele1Email author Affiliated with BMC Bioinformatics20056:124 DOI: 10.1186/1471-2105-6-124 Received: 27 December 2004 Accepted: 23 May 2005 Published: 23 May 2005 Abstract Background The availability of the human genome sequence as well as the large number of physically accessible oligonucleotides, cDNA, and BAC clones across the entire genome has triggered and accelerated the use of several platforms for analysis of DNA copy number changes, amongst others microarray comparative genomic hybridization (arrayCGH). One of the challenges inherent to this new technology is the management and analysis of large numbers of data points generated in each individual experiment. Results We have developed arrayCGHbase, a comprehensive analysis platform for arrayCGH experiments consisting of a MIAME (Minimal Information About a Microarray Experiment) supportive database using MySQL underlying a data mining web tool, to store, analyze, interpret, compare, and visualize arrayCGH results in a uniform and user-friendly format. Following its flexible design, arrayCGHbase is compatible with all existing and forthcoming arrayCGH platforms. Data can be exported in a multitude of formats, including BED files to map copy number information on the genome using the Ensembl or UCSC genome browser. Conclusion ArrayCGHbase is a web based and platform independent arrayCGH data analysis tool, that allows users to access the analysis suite through the internet or a local intranet after installation on a private server. ArrayCGHbase is available at http://​medgen.​ugent.​be/​arrayCGHbase/​. Background The introduction of a microarray based comparative genomic hybridization method (arrayCGH) in 1997 paved the way for higher resolution detection of DNA copy number aberrations [1]. ArrayCGH is founded on the same principles as metaphase CGH, but uses mapped reporters instead of whole chromosomes. One of the major challenges in arrayCGH studies remains the accessibility, management, and interpretation of the vast amount of data generated in single experiments, and parallel comparison of multiple experiments. Typically, these arrays contain 3,000 to 30,000 reporters, each of which has multiple biological annotations (chromosomal position, sequence information, gene name, biological and molecular function,...) as well as physical (grid layout) and quality control (sequence verification, FISH mapping information,...) annotations. In addition, the description of the DNA samples under investigation and the applied lab protocols should be easily accessible. For classical CGH, several commercial software packages are available to analyze and interpret the data of a CGH experiment. Also for arrayCGH there are a number of separate software systems that individually address some of the needs, such as databases for data storage (BASE [2]), applications for clustering and visualization of microarray data (seeGH [3], M-CGH [4], CGHAnalyzer [5], aCGH-smooth [6] and CGH-Miner [7]), public genome databases that contain reporter information, commercially available Laboratory Information Management Systems (LIMS), and various storage methods for recording biomaterial annotations. However, none of these software packages or databases combine all these features (see Supplemental Table). In this paper, we present the development of a web based open source arrayCGH analysis platform, arrayCGHbase, that combines all these features and on top provides additional unique aspects making the analysis and sharing of arrayCGH data easily implementable for both research and routine purposes. Implementation MIAME compliant database arrayCGHbase runs in Windows, Linux, Macintosh, and Unix environments. Particular attention was paid to the use of open source software for the development of arrayCGHbase. The software was developed in the PHP scripting language, with all data being stored in a relational, MIAME [8] (Minimal Information About a Microarray Experiment) supportive, MySQL database and communicated to the user through an Apache Web server (Figure 1). After installation on a private server, experiments can be shared by different users over the internet or a local intranet. ArrayCGHbase integrates DNA sample information, lab protocols, extracted data, and contains a plug-in architecture for data transformation, analysis, and graphical display, allowing users to develop their own modules. Reporters can be directly linked to the Ensembl [9] or UCSC [10] genome browsers, providing additional up-to-date information on each reporter. Reporters can also be manually imported into the MySQL database with the ability to update all linked experiments. The structure of arrayCGHbase was designed to follow the laboratory workflow and is compatible with all types of arrayCGH experiments and data formats (dual colour genomic clone, cDNA [11], or oligonucleotide [12] arrays spotted on any substrate, physical layout, type of array, as well as single channel hybridizations such as the Affymetrix SNP chips [13]). With a personal account and administrated access levels, a user can enter new DNA samples, annotate these, and append all relevant sample information such as quantity, quality, and applied lab protocols at each step. Each user can group experiments together into projects and, in a uniform and streamlined fashion, apply filters and transformations and run analyses. Data is exportable in several formats for offline analysis using other (dedicated) software tools, for publication or for sharing data with the research community. For advanced users, an SQL query window allows interrogation of the underlying MySQL database. http://static-content.springer.com/image/art%3A10.1186%2F1471-2105-6-124/MediaObjects/12859_2004_Article_449_Fig1_HTML.jpg Figure 1 arrayCGHbase scheme. The data is stored in a MIAME supportive MySQL database (red) and reporter info is updated using the NCBI, Ensembl and UCSC genome database. Data and results are presented to the user through a web browser via the PHP scripting language. Data-normalization and other analysis or result visualization methods can be integrated using the plug-in architecture. Further data processing using the R statistical scripting language will be implemented in the near future. Results can be exported to a Progenetix or MIAME compatible format, or visualized on the genome using the Ensemble or UCSC genome browser. Data processing and visualization routines A first and important step in data analysis of arrayCGH experiments is the processing of large, possibly noisy data sets to identify the specific reporters that are differentially hybridized and hence show an aberrant copy number. Data processing is performed in a streamlined four-step manner: (1) the local noise or background associated with the experiments is removed, (2) the quality of the experiment is assessed and poor quality features are removed, (3) ratios are calculated, transformed to log2 scaled ratios, and normalized, and finally (4) reporters that show altered ratios are identified and hence, reporters with aberrant copy number are identified. In the past, this normally required the sequential processing of data by different, often incompatible programs. Using established and widely used microarray (CGH) data processing procedures, arrayCGHbase will automatically correct the signal intensities, filter out unwanted poor quality features (based on signal to noise ratio, image processing software related flags, or other user defined filters), normalize the fluorescence intensity ratios, score levels of differential hybridization, combine the results of replicate experiments and assess the quality of individual and replicate experiments. All these steps are user adjustable. Input data and local background correction The experimental input data for arrayCGHbase consists of export files generated by image analysis software. Currently, the program recognizes files from GenePix Pro versions 2.0–4.0, Scanalyze version 2.0, UCSF SPOT version 2.0, Imagene versions 4.0 – 5.5 and the Affymetrix Chromosome Copy Number Tool. The program can easily be updated for the recognition of other data input formats upon request. Moreover, arrayCGHbase has an interactive import wizard, which makes it possible to import data at your own desire. The processing steps may be changed by altering the parameters at the input stage. By default, the results for each feature are defined as the median foreground minus background intensities for each dye (as determined by the image processing software). The ratio of each feature is determined as the relative background corrected signal between the two dyes or in the case of single color experiments as the corrected signal intensity. Poor quality flagging Nearly every experiment contains features of poor quality, comprising features that have unusual morphology (e.g. doughnut patterns), exhibit uneven hybridization, or have saturated signal intensity. After background corrections, arrayCGHbase can automatically flag features of inferior quality using different criterions (e.g., the standard deviation between replicates), by a manually set signal or signal-to-noise threshold, or using image processing generated flag annotations. Normalization Following calculation of the corrected signal intensities and filtering for good quality features, the relative contributions of the fluorescence intensities are compared. To go from a multiplicative space to an additive space, ratios are log2 transformed. Ideally, the signals of the two dyes should be equal for nucleic acid reporters that have equal amounts in the test and reference samples (i.e., the log2 transformed ratios of the two corrected signals should approach zero for reporters hybridizing to an equal degree in both fluorescence channels). However, in practice the ratio of the corrected signal intensities deviates from the expected ratio due to the different molecular and physical characteristics of the dyes, the different amounts of DNA used for labeling with the different dyes, the spatial heterogeneity in the hybridization conditions across the slide, and many other factors. Normalization compensates these effects by applying a data transformation such that ratios of reporters with unchanged copy-number are close to zero. In the normalization step, an appropriate term is added or subtracted from the log2 transformed ratio for each feature. The program allows normalization in several ways, either by global normalization or subgrid (or pin) normalization, or by a combination of different normalization procedures. A major issue in microarray normalization is the definition of the set of constant probes to which the data are normalized. The most widely accepted method employs the 'constant majority' method, which assumes that the majority of reporters do not change in ratio. This method, which is implemented in arrayCGHbase, is generally applicable to most experiments as it is valid even in cases where up to 50% of reporters have altered ratios, it does not require prior knowledge of which features remain constant, and allows for intensity and spatial variation. Hence, this method calculates a scaling term from the median of all ratios, excluding all outliers. In this way the distribution of all ratios is transformed so that it centers around zero. Quality control Percentage of good quality spots This first quality assessment is a basic calculation of the number of reporters (or features) that are not flagged based on quality measures (user defined parameters and thresholds, see above). Intra- and inter-array hybridization quality Three other major quality parameters can be determined with arrayCGHbase for each experiment. The first assesses the variation between reporters present in replicates on the array (typically duplicates or triplicates). An increased variation typically reflects lower quality hybridizations resulting in less reliable ratios. A second quality parameter is the standard variation between the different reporters on the array that show a normal (unaltered) copy number. This quality measure is only applicable in experiments with few reporters with aberrant copy number. The third quality measure is the average ratio for reporters with aberrant copy number. This ratio should significantly differ from zero to allow identification of differentially hybridized reporters. This last quality measure is only applicable in experiments where DNA copy number aberrations are known or validated. These parameters provide an objective quality measure and can also be helpful to compare different experiments. In addition to these parameters, different graphical displays, such as ratio-intensity plots (usually referred to as MA plots), dual channel intensity scatter plots, and ratio histograms give an idea of the quality of an individual experiment or series of experiments (Figure 2). In all these visualizations, thresholds for gains and losses are displayed and can be adjusted. The slide viewer generates a virtual spatial view of all features on the array using the ratio, or signal and background intensities; this viewer allows the identification of problematic regions or artifacts on the slide surface. Clicking on an individual feature shows specific data associated with this feature (e.g., reporter name, signal intensities, and data quality flags). http://static-content.springer.com/image/art%3A10.1186%2F1471-2105-6-124/MediaObjects/12859_2004_Article_449_Fig2_HTML.jpg Figure 2 Quality control graphs. Graphical displays to assess the quality of an experiment, such as a dual channel intensity scatter plot, ratio histogram, ratio-intensity plot and a virtual slide view. Scoring chromosomal regions with aberrant copy number The final step in arrayCGH data processing is the identification of reporters that exhibit differential hybridization, corresponding to chromosomal regions that have altered copy number. The major issue is to identify those reporters whose relative ratios stand out from the experimental noise with sufficient statistical significance. arrayCGHbase currently incorporates two scoring methods. The most widely used approach is to define a ratio threshold and identify the probes that exhibit ratios greater or smaller than this threshold. Another, statistically more sound approach, is to use a floating threshold based on the standard deviation of all reporters in a given experiment. Reporters that exhibit ratios greater than this threshold will be defined as differential [14]. Both methods are implemented in arrayCGHbase and can be applied on each individual feature, or on the mean value of replicates. Besides the aberrant feature scoring methods, two other algorithms are available: a universal data smoothing algorithm, as well as a breakpoint-identification algorithm, which both consist of a moving window along the chromosomes and hence make use of the spatial "along the chromosome" distribution of the reporters. With these algorithms, chromosomal breakpoints can be easily identified in more noisy datasets. By writing custom plug-ins (in PHP or R), sophisticated algorithms that use segmentation methods (e.g. Cluster Along Chromosomes, CLAC [7]) or others, can be implemented by any user in a straightforward way. Chromosome visualization A wide variety of result viewers are available. The results can be mapped upon standard ISCN (International Standard on Cytogenetic Nomenclature) ideograms in an electronic karyotype, or visualized per chromosome or zoomed in on a region of interest (Figure 3). Moreover, various CGH profile views provide the user with a tool to compare different experiments and to identify regions with relevant copy number alterations. Views are returned to the user either as PNG (Portable Network Graphic) or as SVG (Scalable Vector Graphic) files, with the ability to scale images according to screen width. http://static-content.springer.com/image/art%3A10.1186%2F1471-2105-6-124/MediaObjects/12859_2004_Article_449_Fig3_HTML.jpg Figure 3 Selected result viewers. Graphical displays of arrayCGH results of neuroblastoma cell line NGP.1A.TR1: line view (all reporters ordered by chromosome and chromosomal position on one line), karyo view (al reporters mapped on their chromosomal position on a standard ISCN ideogram), chromosome view (zoom on one chromosome or chromosomal region) with breakpoint identification algorithm, and genome browser view (neuroblastoma cell line IMR32), with all reporters and their copy number status displayed in the UCSC genome browser. Data export Processed data can be exported as MIAME compliant text files and figures; these include the original feature signal and background intensities, the normalized ratio value, a list of reporters that are differentially hybridized, and the data quality parameters. Additionally, a file can be generated for submission of arrayCGH results directly into Progenetix [15], a comprehensive collection of published cytogenetic abnormalities in human neoplasms. Lastly, BED files can be created to map results and visualize the experiment from within the Ensembl or UCSC genome browser. ArrayCGHbase at work In several publications from our research group, arrayCGHbase has been successfully used to analyse arrayCGH data to identify and delineate copy number aberrations [1619]). At the demo site, users can explore the data published in Hellemans et al. [16], a small ~5 Mb deletion in chromosome 12q identified using SNP chips), the results of a case report of the identification of an unbalanced X-autosome translocation by arrayCGH in a boy with a syndromic form of chondrodysplasia punctata brachytelephalangic type [17], a distal 9p trisomy and distal Xp nullisomy caused by an unbalanced X;9 translocation: 46, Y, der(X)t(X;9)(p22.32;p23) detected with a 1 Mb BAC array), and the copy number profile of a cancer cell line NGP.1A.TR [18]). It is possible to look at the raw data of these hybridizations and more importantly, test the performance of the program using different settings. Conclusion We present arrayCGHbase, a versatile web based, platform independent data storage and analysis tool for processing microarray CGH data. Routines were implemented for feature flagging, data normalization, data quality assessment and the identification of chromosomal regions with aberrant copy number. A zoomable graphical interface allows immediate identification of altered genomic regions and the underlying gene content by several database links. A multitude of export functions allow the user to further process the results. The easy plug-in architecture makes it possible for each user to add custom algorithms for data analysis and visualization and share these with the user community. This webtool and database will enable investigators to interpret single experiments and compare large data sets efficiently throughout different array platforms and provides all of the essential features and links for further investigation of the genomic regions of interest. Future developments arrayCGHbase will continually be updated to incorporate new processing methods that will be developed both within and outside our laboratory. Immediate plans include the addition of export and import functions to R [20] or Bioconductor [21] to be able to apply several available mathematical algorithms such as two-dimensional LOWESS normalization [22]. Immediate export functions to the DECIPHER web site [23] to link phenotypical data to actual experiments will also be included. The arrayCGHbase source code is freely available under a Creative Commons License, to encourage others to develop new analysis methods and utilities that will further improve its capabilities. Availability and requirements An arrayCGHbase demo site is available at http://​medgen.​ugent.​be/​arrayCGHbase/​. At this site, all quality control features and other features can be tested for several experiments with BAC arrays as well as SNP chips (see 'arrayCGHbase at work'). At the same site, the complete package can be freely downloaded for local installation on a private hosted web server. For local use, additional software is required such as the MySQL database [24], a web server (e.g. Apache [25]), and PHP hypertext preprocessor [26]. These software packages are freely available and are key parts of LAMP (Linux, Apache, MySQL, PHP), an open source web platform. Enquiries for arrayCGHbase should be made to arrayCGHbase@medgen.​ugent.​be. Declarations Acknowledgements Jo Vandesompele and Katleen De Preter are supported by a grant from the Flemish Institute for the Promotion of Innovation by Science and Technology in Flanders (IWT). Filip Pattyn is a Research Assistant of the Research Foundation – Flanders (FWO – Vlaanderen). This study is supported by GOA-grant 12051203, FWO-grant G.0185.04, G.0200.03 and G.0106.05 and VEO project 011V1302, research grant of Kinderkankerfonds vzw (a non-profit childhood cancer foundation under Belgian law). This text presents research results of the Belgian program of Interuniversity Poles of attraction initiated by the Belgian State, Prime Minister's Office, Science Policy Programming (IUAP). Glossary Reporter: any DNA fragment (BAC, PAC, cosmid, fosmid, cDNA clone, oligonucleotide, genomic PCR product) used for hybridization Feature: physical reporter spotted, printed, or otherwise linked to a substrate at a specific location PHP Hypertext PreProcessor (server-side scripting language) MIAME Minimal Information About a Microarray Experiment MySQL My Structured Query Language ISCN International System for human Cytogenetic Nomenclature BED Browser Extendable Data Authors’ Affiliations (1) Center for Medical Genetics, Ghent University Hospital (2) Department of Electrotechnical Engineering, Faculty of Applied Sciences, Katholieke Universiteit Leuven (3) Center for Human Genetics, Leuven University Hospital (4) Vesalius Department of Health Care, Hogeschool Gent References 1. Solinas-Toldo S, Lampel S, Stilgenbauer S, Nickolenko J, Benner A, Dohner H, Cremer T, Lichter P: Matrix-based comparative genomic hybridization: biochips to screen for genomic imbalances. Genes Chromosomes Cancer 1997, 20:399–407.View ArticlePubMed 2. Saal LH, Troein C, Vallon-Christersson J, Gruvberger S, Borg A, Peterson C: BioArray Software Environment (BASE): a platform for comprehensive management and analysis of microarray data. Genome Biol 2002, 3:SOFTWARE0003.View ArticlePubMed 3. Chi B, DeLeeuw RJ, Coe BP, MacAulay C, Lam WL: SeeGH--a software tool for visualization of whole genome array comparative genomic hybridization data. BMC Bioinformatics 2004, 5:13.View ArticlePubMed 4. Wang J, Meza-Zepeda LA, Kresse SH, Myklebost O: M-CGH: analysing microarray-based CGH experiments. BMC Bioinformatics 2004, 5:74.View ArticlePubMed 5. Greshock J, Naylor TL, Margolin A, Diskin S, Cleaver SH, Futreal PA, deJong PJ, Zhao S, Liebman M, Weber BL: 1-Mb resolution array-based comparative genomic hybridization using a BAC clone set optimized for cancer gene analysis. Genome Res 2004, 14:179–187.View ArticlePubMed 6. Jong K, Marchiori E, Meijer G, Van Der Vaart A, Ylstra B: Breakpoint identification and smoothing of array comparative genomic hybridization data. Bioinformatics 2004. 7. Wang P, Kim Y, Pollack J, Narasimhan B, Tibshirani R: A method for calling gains and losses in array CGH data. Biostatistics 2005, 6:45–58.View ArticlePubMed 8. Brazma A, Hingamp P, Quackenbush J, Sherlock G, Spellman P, Stoeckert C, Aach J, Ansorge W, Ball CA, Causton HC, Gaasterland T, Glenisson P, Holstege FC, Kim IF, Markowitz V, Matese JC, Parkinson H, Robinson A, Sarkans U, Schulze-Kremer S, Stewart J, Taylor R, Vilo J, Vingron M: Minimum information about a microarray experiment (MIAME)-toward standards for microarray data. Nat Genet 2001, 29:365–371.View ArticlePubMed 9. Butler D: Ensembl gets a Wellcome boost. Nature 2000, 406:333.View ArticlePubMed 10. Karolchik D, Baertsch R, Diekhans M, Furey TS, Hinrichs A, Lu YT, Roskin KM, Schwartz M, Sugnet CW, Thomas DJ, Weber RJ, Haussler D, Kent WJ: The UCSC Genome Browser Database. Nucleic Acids Res 2003, 31:51–54.View ArticlePubMed 11. Pollack JR, Perou CM, Alizadeh AA, Eisen MB, Pergamenschikov A, Williams CF, Jeffrey SS, Botstein D, Brown PO: Genome-wide analysis of DNA copy-number changes using cDNA microarrays. Nat Genet 1999, 23:41–46.View ArticlePubMed 12. Lucito R, Healy J, Alexander J, Reiner A, Esposito D, Chi M, Rodgers L, Brady A, Sebat J, Troge J, West JA, Rostan S, Nguyen KC, Powers S, Ye KQ, Olshen A, Venkatraman E, Norton L, Wigler M: Representational oligonucleotide microarray analysis: a high-resolution method to detect genome copy number variation. Genome Res 2003, 13:2291–2305.View ArticlePubMed 13. Kennedy GC, Matsuzaki H, Dong S, Liu WM, Huang J, Liu G, Su X, Cao M, Chen W, Zhang J, Liu W, Yang G, Di X, Ryder T, He Z, Surti U, Phillips MS, Boyce-Jacino MT, Fodor SP, Jones KW: Large-scale genotyping of complex DNA. Nat Biotechnol 2003, 21:1233–1237.View ArticlePubMed 14. Vermeesch JR, Melotte C, Froyen G, Van Vooren S, Dutta B, Maas N, Vermeulen S, Menten B, Speleman F, De Moor B, Van Hummelen P, Marynen P, Fryns JP, Devriendt K: Molecular karyotyping: array CGH quality criteria for constitutional genetic diagnosis. J Histochem Cytochem 2005,53(3):413–22.View ArticlePubMed 15. Baudis M, Cleary ML: Progenetix.net: an online repository for molecular cytogenetic aberration data. Bioinformatics 2001, 17:1228–1229.View ArticlePubMed 16. Hellemans J, Preobrazhenska O, Willaert A, Debeer P, Verdonk PC, Costa T, Janssens K, Menten B, Van Roy N, Vermeulen SJ, Savarirayan R, Van Hul W, Vanhoenacker F, Huylebroeck D, De Paepe A, Naeyaert JM, Vandesompele J, Speleman F, Verschueren K, Coucke PJ, Mortier GR: Loss-of-function mutations in LEMD3 result in osteopoikilosis, Buschke-Ollendorff syndrome and melorheostosis. Nat Genet 2004, 36:1213–1218.View ArticlePubMed 17. Menten B, Buysse K, Vandesompele J, De Smet E, De Paepe A, Speleman F, Mortier G: Identification of an unbalanced X-autosome translocation by array-CGH in a boy with a syndromic form of chondrodysplasia punctata brachytelephalangic type. European Journal of Medical Genetics, in press. 18. De Preter K, Vandesompele J, Menten B, Fiegler H, Edsjo A, Carter N, Yigit N, Waelput W, Van Roy N, Bader S, Pahlman S, Speleman F: Positional and functional mapping of a neuroblastoma differentiation gene on chromosome 11. 19. Van Roy N, Vandesompele J, Menten B, Nilsson H, De Smet E, Rocchi M, De Paepe A, Påhlman S, Speleman F: Translocation-excision-deletion-amplification mechanism leading to non-syntenic co-amplification of MYC and ATBF1. 20. The R Project for Statistical Computing: [http://www.r-project.org/]. 21. Gentleman RC, Carey VJ, Bates DM, Bolstad B, Dettling M, Dudoit S, Ellis B, Gautier L, Ge Y, Gentry J, Hornik K, Hothorn T, Huber W, Iacus S, Irizarry R, Leisch F, Li C, Maechler M, Rossini AJ, Sawitzki G, Smith C, Smyth G, Tierney L, Yang JY, Zhang J: Bioconductor: open software development for computational biology and bioinformatics. Genome Biol 2004, 5:R80.View ArticlePubMed 22. Cleveland WS, Devlin SJ: Locally-Weighted Regression: An Approach to Regression Analysis by Local Fitting. Journal of the American Statistical Association 1988, 83:596–610.View Article 23. Decipher: [http://www.sanger.ac.uk/PostGenomics/decipher/]. 24. MySQL: [http://www.mysql.com/]. 25. Apache HTTP Server Project [http://​httpd.​apache.​org/​] 26. PHP Hypertext Preprocessor[http://​www.​php.​net/​] Copyright © Menten et al. 2005 This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Take the tour × Super User is a question and answer site for computer enthusiasts and power users. It's 100% free, no registration required. I want to filter all mail whose subject starts with [SomeWord], so I wonder is it possible using regular expression(such as ^\[SomeWord\]) for inbox rule of outlook. I'm using outlook web aceess, not outlook client. share|improve this question 2   "^[SomeWord]" is not the regular expression you are looking for </jedimindtrick> –  Jürgen A. Erhard Dec 9 '10 at 15:18   @jae, thanks for pointing out the wrong usage of sample regular expression. Not sure what "jedimindtrick" means, will google it. :) –  Kane Dec 9 '10 at 15:33   it's a Star Wars reference c2.com/cgi/wiki?JediMindTrick –  Nifle Dec 9 '10 at 18:21 add comment 1 Answer up vote 1 down vote accepted There is a Stack Overflow question which has some solutions for doing this. share|improve this answer   Link only answers are not helpful here, please expand your answer, @yeedl. –  studiohack May 2 '11 at 3:09   Nice to share it. Thanks. –  Kane May 30 '12 at 7:05 add comment Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
  Structural framework of the Clemente-Tomas and Corsair growth fault systems in the Texas continental shelf margin of the Gulf of Mexico basin Date 2011-08 Journal Title Journal ISSN Volume Title Publisher Abstract In the Texas continental shelf margin, there exist the Clemente-Tomas and the neighboring Corsair growth fault systems, both of which run roughly parallel to the shoreline. The structural and stratigraphic development histories of some parts of these fault systems have not been investigated in detail, even though such knowledge would be crucial in understanding the hydrocarbon migration and trapping mechanisms associated with them. The present study attempts to characterize the structure and stratigraphy of these growth fault systems in the Mustang Island federal lease areas, off Corpus Christi, Texas. It utilizes a time-migrated three-dimensional seismic volume that covers an area of 867mi2 (2245km2), digital well data from 36 wells, wireline logs from 30 boreholes, paleontological reports from 15 boreholes, and velocity survey data from 33 boreholes. In characterizing the stratigraphy five biostratigraphic markers within the Miocene were determined from the paleontological data; Bigenerina ascensionensis (8 Ma), Discorbis 12 (9.11 Ma), Bigenerina humblei (13.4 Ma), Robulus L (16.3Ma) and Marginulina ascensionensis (18Ma). Seismic horizons corresponding to these biostratigraphic markers are tied to the well data, and mapped throughout the study area. Their depths are obtained from the seismic velocity structures at the well tie points. Lithologies of the strata are estimated from the well logs. Fault surfaces are mapped in three dimensions. The detailed mapping enables clear distinction of the two neighboring fault systems. Most of the work is performed on a computer workstation and yields a digital, quantitative model of the regional structure and stratigraphy. The present Study shows that the Clemente-Tomas growth fault detaches into a shaley mobile substrate. Basinward evacuation of the mobile substrate probably initiated the fault movement in the Oligocene. The evacuated shale body developed into a linear, diapiric ridge. By the early Miocene (between 23 to 18 Ma), the shale diapirism was causing the basinward sliding of the overlying sediments, and that initiated the primary Corsair growth fault. This early Corsair faulting process was relatively instantaneous and it led to temporary formation of a semi-starved mini-basin on the downthrown side of this fault. Subsequent depositions on the downthrown side kept the primary Corsair growth fault active though the late Miocene (18 to 8 Ma). By the late Miocene, (Discorbis 12 and Bigenerina ascensionensis) faulting of the Clemente-Tomas slowed down considerably while the Corsair remained active. Description Keywords Gulf of Mexico, Texas continental shelf, Growth fault, Structural framework, Clemente-Tomas, Corsair Citation
Resource: Unix Pipes for Exploring and Cleaning Data Do you have a spreadsheet, JSON, or plain text file filled with data that you haven’t come to terms with? If you’re using Mac OSX, you already have a powerful tool at your disposal for exploring and cleaning a text-based data set. By using terminal commands, you can get a feel for an otherwise unwieldy file or set of files, searching and sorting in a way that is fast, flexible, and (perhaps most importantly) reproducible. Access resource here.
Quantcast Crickets Reference Libraries Page 1 of about 2 Articles Cricket 2005-09-08 14:48:50 Crickets, family Gryllidae (also known as "true crickets"), are insects which are related to grasshoppers and katydids (order Orthoptera). They have somewhat flattened bodies and long antennae and are known for their chirp (which only male crickets can do; male wings have ridges that act like a "comb and file" instrument). They chirp by rubbing their wings over each other, and the song is... Cricket 2005-07-13 16:57:18 Crickets, family Gryllidae (also known as "true crickets"), are insects related to grasshoppers and katydids (order Orthoptera). They have somewhat flattened bodies and long antennae. Crickets are known for the loud chirping noises they make by rubbing their wings together. Only male crickets sing as the male wings have ridges that act like a "comb and file" that produces a song that is species... Word of the Day bowerly • Large; stout; burly. The word 'bowerly' is an alteration of 'burly'.
Seroquel xr food interactions buy now Seroquel XR is an effective medication prescribed for the treatment of various mental health conditions, such as schizophrenia, bipolar disorder, and major depressive disorder. However, it is important to be aware of potential food interactions while taking Seroquel XR. Some foods and beverages may impact the effectiveness of this medication or cause unwanted side effects. It is recommended to avoid consuming grapefruit or drinking grapefruit juice while on Seroquel XR. Grapefruit can interfere with the absorption of the medication in your body, making it less effective. Additionally, alcohol should be avoided or limited while taking Seroquel XR, as it may increase the risk of drowsiness or dizziness. It is important to consult with your healthcare provider or pharmacist for more information on food interactions and any other medications or supplements you are taking. Remember, proper nutrition and a healthy lifestyle are essential for optimizing the benefits of Seroquel XR and maintaining overall well-being. Understanding Seroquel xr: Understanding Seroquel xr: Seroquel xr is a prescription medication that is commonly used to treat conditions such as schizophrenia, bipolar disorder, and major depressive disorder. It belongs to a class of medications known as atypical antipsychotics. It works by affecting the levels of certain neurotransmitters in the brain, particularly dopamine and serotonin. These neurotransmitters play a role in regulating mood, behavior, and cognition. When taking Seroquel xr, it’s important to understand that certain foods can potentially interact with the medication. These interactions can affect the absorption, distribution, metabolism, and excretion of Seroquel xr, which can impact its effectiveness and potentially cause side effects. By understanding the potential food interactions with Seroquel xr, you can make informed choices about your diet and ensure that you are getting the most out of your medication. In the next section, we will explore some of the potential food interactions that you should be aware of when taking Seroquel xr. See also  How to wean off seroquel Potential food interactions: Potential food interactions: It is important to be aware of how food can affect the effectiveness of Seroquel XR. Certain foods may interfere with the absorption and metabolism of the medication, potentially reducing its effectiveness or causing unwanted side effects. One potential interaction is with grapefruit and grapefruit juice. Consuming grapefruit while taking Seroquel XR can increase the levels of the medication in your blood, potentially leading to an overdose. It is best to avoid grapefruit and grapefruit juice while taking Seroquel XR. Another potential interaction is with high-fat meals. Eating a meal high in fat before taking Seroquel XR can delay the absorption of the medication, leading to a slower onset of action. It is recommended to take Seroquel XR on an empty stomach or with a light meal to ensure optimal absorption and effectiveness. Additionally, alcohol should be avoided while taking Seroquel XR. Alcohol can increase the sedative effects of Seroquel XR and may worsen side effects such as drowsiness and dizziness. It is important to avoid alcohol while taking this medication to ensure your safety. Certain medications can also interact with Seroquel XR, so it is important to inform your doctor about all the medications and supplements you are taking. They can help determine if any potential interactions may occur and make adjustments to your treatment plan if necessary. Overall, being mindful of your diet and avoiding certain foods and alcohol can help ensure the optimal effectiveness of Seroquel XR and reduce the risk of potential side effects. If you have any concerns or questions about food interactions with Seroquel XR, it is best to consult with your healthcare provider. How food affects Seroquel xr: Seroquel XR is an antipsychotic medication that is commonly prescribed to manage conditions such as schizophrenia and bipolar disorder. It works by balancing certain chemicals in the brain, which helps to alleviate symptoms and improve overall mental well-being. See also  Delaware seroquel When it comes to taking Seroquel XR, it’s important to be mindful of the food you consume. Some foods can potentially interact with the medication and affect its effectiveness. Here are several factors to consider: 1. Absorption: Food can impact the rate at which Seroquel XR is absorbed into your system. For instance, consuming a high-fat meal or a meal with grapefruit juice may slow down the absorption process, leading to a delayed onset of action. It is recommended to take Seroquel XR on an empty stomach or with a light meal to ensure consistent absorption. 2. Metabolism: Some types of food can interfere with the metabolism of Seroquel XR in the body. For example, consuming large amounts of caffeine or alcohol may increase the metabolism of the medication, resulting in lower blood levels and potentially decreased effectiveness. It is advisable to limit caffeine and alcohol intake while taking Seroquel XR. 3. Side effects: The combination of certain foods and Seroquel XR can increase the risk of side effects. For example, consuming alcohol while taking Seroquel XR may intensify drowsiness and dizziness. It is important to be aware of potential interactions and consult with your healthcare provider if you have any concerns. In conclusion, being aware of how food affects Seroquel XR is crucial for ensuring optimal treatment outcomes. It is recommended to follow your healthcare provider’s instructions and guidelines on taking Seroquel XR with or without food. If you have any questions or concerns about food interactions with Seroquel XR, it is always best to consult with your healthcare provider for further guidance. Tips for managing food interactions: 1. Take Seroquel xr with food: Taking Seroquel xr with a meal or snack can help reduce the likelihood of experiencing certain food interactions. It is generally recommended to take Seroquel xr with a meal or a light snack to help with absorption and decrease the chances of stomach upset. See also  Seroquel lobotomy 2. Avoid grapefruit and grapefruit juice: Grapefruit and grapefruit juice contain compounds that can interfere with the metabolism of Seroquel xr, leading to increased levels of the medication in the body. This can increase the risk of side effects. It is best to avoid consuming grapefruit or grapefruit juice while taking Seroquel xr. 3. Be cautious with alcohol: Alcohol can increase the risk of side effects when taken with Seroquel xr. It is important to be cautious when drinking alcohol while on this medication, and to talk to your doctor about any potential risks and recommendations. 4. Monitor caffeine intake: Caffeine can affect the metabolism and effectiveness of Seroquel xr. It is advisable to monitor your caffeine intake, as high levels of caffeine can potentially decrease the effectiveness of the medication. It may be helpful to limit or avoid caffeine while taking Seroquel xr. 5. Follow a consistent diet: It is recommended to follow a consistent diet while taking Seroquel xr. Changing your diet abruptly, such as suddenly consuming large amounts of high-fat or high-calorie foods, may affect how the medication is absorbed and metabolized in the body. 6. Discuss dietary changes with your doctor: If you are considering making any significant dietary changes, such as starting a new diet plan or taking supplements, it is important to discuss this with your doctor. They can provide guidance on any potential interactions or adjustments that may be needed. 7. Take note of any food-related side effects: If you notice any new or worsening side effects while taking Seroquel xr, it is important to keep track of when they occur and if they are related to any specific foods or beverages. This information can be useful to share with your doctor to help determine if any adjustments need to be made. Remember to always consult your doctor or healthcare provider for personalized advice and recommendations based on your specific situation.
JSON 1 JS-Expressions jsexpr? json-null 2 Generating JSON Text from JS-Expressions write-json jsexpr->string jsexpr->bytes 3 Parsing JSON Text into JS-Expressions read-json string->jsexpr bytes->jsexpr 4 A Word About Design 4.1 The JS-Expression Data Type 4.2 Naming Conventions 7.3.0.8 JSON Eli Barzilay and Dave Herman  (require json) package: base This library provides utilities for parsing and producing data in the JSON data exchange format to/from Racket values. See the JSON web site and the JSON RFC for more information about JSON. 1 JS-Expressions procedure (jsexpr? x [#:null jsnull])  boolean?   x : any/c   jsnull : any/c = (json-null) Performs a deep check to determine whether x is a jsexpr. This library defines a subset of Racket values that can be represented as JSON strings, and this predicates checks for such values. A JS-Expression, or jsexpr, is one of: Examples: > (jsexpr? 'null) #t > (jsexpr? #t) #t > (jsexpr? "cheesecake") #t > (jsexpr? 3.5) #t > (jsexpr? (list 18 'null #f)) #t > (jsexpr? #hasheq((turnip . 82))) #t > (jsexpr? (vector 1 2 3 4)) #f > (jsexpr? #hasheq(("turnip" . 82))) #f > (jsexpr? +inf.0) #f parameter (json-null)  any/c (json-null jsnull)  void?   jsnull : any/c This parameter determines the default Racket value that corresponds to a JSON “null”. By default, it is the 'null symbol. In some cases a different value may better fit your needs, therefore all functions in this library accept a #:null keyword argument for the value that is used to represent a JSON “null”, and this argument defaults to (json-null). Note that the value of (json-null) (or an explicitly-provided #:null argument) is recognized using eq?. 2 Generating JSON Text from JS-Expressions procedure (write-json x       [out       #:null jsnull       #:encode encode])  any   x : jsexpr?   out : output-port? = (current-output-port)   jsnull : any/c = (json-null)   encode : (or/c 'control 'all) = 'control Writes the x jsexpr, encoded as JSON, to the out output port. By default, only ASCII control characters are encoded as “\uHHHH”. If encode is given as 'all, then in addition to ASCII control characters, non-ASCII characters are encoded as well. This can be useful if you need to transport the text via channels that might not support UTF-8. Note that characters in the range of U+10000 and above are encoded as two \uHHHH escapes, see Section 2.5 of the JSON RFC. Examples: > (with-output-to-string     (λ () (write-json #hasheq((waffle . (1 2 3)))))) "{\"waffle\":[1,2,3]}" > (with-output-to-string     (λ () (write-json #hasheq((와플 . (1 2 3)))                       #:encode 'all))) "{\"\\uc640\\ud50c\":[1,2,3]}" procedure (jsexpr->string x       [#:null jsnull       #:encode encode])  string?   x : jsexpr?   jsnull : any/c = (json-null)   encode : (or/c 'control 'all) = 'control Generates a JSON source string for the jsexpr x. Example: > (jsexpr->string #hasheq((waffle . (1 2 3)))) "{\"waffle\":[1,2,3]}" procedure (jsexpr->bytes x       [#:null jsnull       #:encode encode])  bytes?   x : jsexpr?   jsnull : any/c = (json-null)   encode : (or/c 'control 'all) = 'control Generates a JSON source byte string for the jsexpr x. (The byte string is encoded in UTF-8.) Example: > (jsexpr->bytes #hasheq((waffle . (1 2 3)))) #"{\"waffle\":[1,2,3]}" 3 Parsing JSON Text into JS-Expressions procedure (read-json [in #:null jsnull])  (or/c jsexpr? eof-object?)   in : input-port? = (current-input-port)   jsnull : any/c = (json-null) Reads a jsexpr from a JSON-encoded input port in as a Racket (immutable) value, or produces eof if only whitespace remains. Examples: > (with-input-from-string     "{\"arr\" : [1, 2, 3, 4]}"     (λ () (read-json))) '#hasheq((arr . (1 2 3 4))) > (with-input-from-string     "sandwich sandwich" ; invalid JSON     (λ () (read-json))) string::1: read-json: bad input starting #"sandwich sandwich" procedure (string->jsexpr str [#:null jsnull])  jsexpr?   str : string?   jsnull : any/c = (json-null) Parses the JSON string str as an immutable jsexpr. Example: > (string->jsexpr "{\"pancake\" : 5, \"waffle\" : 7}") '#hasheq((pancake . 5) (waffle . 7)) procedure (bytes->jsexpr str [#:null jsnull])  jsexpr?   str : bytes?   jsnull : any/c = (json-null) Parses the JSON bytes string str as an immutable jsexpr. Example: > (bytes->jsexpr #"{\"pancake\" : 5, \"waffle\" : 7}") '#hasheq((pancake . 5) (waffle . 7)) 4 A Word About Design 4.1 The JS-Expression Data Type JSON syntactically distinguishes “null”, array literals, and object literals, and therefore there is a question of what Racket value should represent a JSON “null”. This library uses the Racket 'null symbol by default. Note that this is unambiguous, since Racket symbols are used only as object keys, which are required to be strings in JSON. Several other options have been used by various libaries. For example, Dave Herman’s PLaneT library (which has been the basis for this library) uses the #\nul character, other libraries for Racket and other Lisps use (void), NIL (some use it also for JSON “false”), and more. The approach taken by this library is to use a keyword argument for all functions, with a parameter that determines its default, making it easy to use any value that fits your needs. The JSON RFC only states that object literal expressions “SHOULD” contain unique keys, but does not proscribe them entirely. Looking at existing practice, it appears that popular JSON libraries parse object literals with duplicate keys by simply picking one of the key-value pairs and discarding the others with the same key. This behavior is naturally paralleled by Racket hash tables, making them a natural analog. Finally, the JSON RFC is almost completely silent about the order of key-value pairs. While the RFC only specifies the syntax of JSON, which of course always must represent object literals as an ordered collection, the introduction states: An object is an unordered collection of zero or more name/value pairs, where a name is a string and a value is a string, number, boolean, null, object, or array. In practice, JSON libraries discard the order of object literals in parsed JSON text and make no guarantees about the order of generated object literals, usually using a hash table of some flavor as a natural choice. We therefore do so as well. 4.2 Naming Conventions Some names in this library use “jsexpr” and some use “json”. The rationale that the first is used for our representation, and the second is used as information that is received from or sent to the outside world.  
Advertisement Browse Subject Areas ? Click through the PLOS taxonomy to find articles in your field. For more information about PLOS Subject Areas, click here. • Loading metrics Individual and environmental correlates of objectively measured sedentary time in Dutch and Belgian adults • Femke van Nassau , Roles Formal analysis, Writing – original draft f.vannassau@vumc.nl Affiliation Department of Public and Occupational Health, Amsterdam Public Health Research Institute, VU University Medical Center, Amsterdam, The Netherlands ORCID http://orcid.org/0000-0002-3726-550X • Joreintje D. Mackenbach, Roles Formal analysis, Investigation, Writing – review & editing Affiliation Department of Epidemiology and Biostatistics, Amsterdam Public Health Research Institute, VU University Medical Center, Amsterdam, The Netherlands • Sofie Compernolle, Roles Formal analysis, Investigation, Writing – review & editing Affiliation Department of Movement and Sport Sciences, Ghent University, Ghent, Belgium • Ilse de Bourdeaudhuij, Roles Conceptualization, Formal analysis, Writing – review & editing Affiliation Department of Movement and Sport Sciences, Ghent University, Ghent, Belgium • Jeroen Lakerveld, Roles Conceptualization, Formal analysis, Project administration, Writing – review & editing Affiliation Department of Epidemiology and Biostatistics, Amsterdam Public Health Research Institute, VU University Medical Center, Amsterdam, The Netherlands • Hidde P. van der Ploeg Roles Formal analysis, Writing – review & editing Affiliation Department of Public and Occupational Health, Amsterdam Public Health Research Institute, VU University Medical Center, Amsterdam, The Netherlands Individual and environmental correlates of objectively measured sedentary time in Dutch and Belgian adults • Femke van Nassau,  • Joreintje D. Mackenbach,  • Sofie Compernolle,  • Ilse de Bourdeaudhuij,  • Jeroen Lakerveld,  • Hidde P. van der Ploeg PLOS x Abstract As the detrimental health effects of sedentary behaviour are well established, insight into the individual and environmental factors that influence adults’ sedentary behaviour is needed. Most studies to date rely on self-reported measures of sedentary time. Therefore, the aim of the current study was to examine individual and environmental correlates of objectively measured sedentary time in Dutch and Belgian adults. Between March and August 2014, Belgian (n = 133) and Dutch (n = 223) adults, recruited as sub-sample of the SPOTLIGHT survey, wore an ActiGraph accelerometer to provide objectively measured sedentary and moderate to vigorous physical activity time. Participants completed a questionnaire assessing sociodemographic (country of residence, age, gender and educational level), lifestyle (sleep, smoking, sugar-containing beverage consumption, alcohol intake), health (body mass index, self-rated health), work (employment status and type of work), happiness, physical environmental (owning a car, number of screens, socioeconomic status and residential density) and social environmental factors (social network, social cohesion). Univariate and multivariable regression analyses showed that Belgian participants had a lower odds of being sedentary for at least 9 hours per day compared to Dutch participants. Women, older participants and those meeting the WHO recommendation for physical activity were also less likely to sit for 9 hours or more per day. Participants doing (heavy) manual work or being in education, homemaker, unemployed had lower odds of being sedentary for at least 9 hours per day compared to participants with a sitting job. Those with a higher self-reported social network also had lower odds for sedentary time. No associations between physical and other social environmental characteristics and sedentary time were found. Our findings add to the growing evidence of factors associated with prolonged sedentary time in adults. These findings may be used to inform the development of strategies and interventions aimed at reducing sedentary time, and to identify high risk groups. Introduction Evidence has been accumulating that prolonged sedentary behaviour is associated with an elevated risk of all-cause, cancer- and cardiovascular mortality [1;2]. Sedentary behaviour (i.e. any waking activity characterised by an energy expenditure ≤ 1.5 metabolic equivalents while in a sitting, reclining or lying posture[3]) comprises a major part of modern lifestyles: at work, during leisure time (watching television, using computers and handhelds) and during transportation. In order to combat sedentary lifestyles through approaches that target high-risk groups, information on factors that are associated with (prolonged) sedentary behaviour is essential. To date, few consistent factors have been identified. A review by Rhodes et al. (2012) concluded that several sociodemographic factors (such as age and gender), and health and lifestyle related factors (such as physical activity (PA) and body mass index (BMI)), were linked to sedentary behaviour. They noted a lack of studies focusing on a relation with cognitive characteristics or ‘upstream’ characteristics in the social and physical environment [4]. A recent review took a more socio-ecological approach [5] and identified several individual level factors (i.e. being older, female, low levels of PA, high BMI, smoking and high calorie snack intake and frequent cell phone use were associated with higher sedentariness). Their review showed mixed results for interpersonal factors, such as marital status, number of children, social cohesion and social norms, as well as for environmental factors, such as indoor environment and characteristics in the neighbourhood environment. Lack of comparability across studies with regard to the associations under study as well as measurement instruments hindered drawing conclusions on associations with sedentary behaviour. In addition, the review of Koohsari et al. specifically looked at neighbourhood environmental correlated of sedentary behaviour [6]. Living in an urban area with a variety of destinations nearby was associated with less sedentary behaviour during leisure time and transport. Other neighbourhood environmental attributes were not closely related to sedentary behaviour. All three reviews reported a large variety of measurement tools/techniques of sedentary behaviour, ranging from TV viewing to socializing and sitting, mostly using self-reported measures of sedentary behaviour with often unknown validity [46]. Self-reported sedentary behaviour is susceptible to recall bias and social desirable answers, and it has been recommended to integrate more objective measures of sedentary behaviour in future studies. Therefore, the objective of the current study was to explore sociodemographic, lifestyle, health, work, psychological, physical home and neighbourhood and social neighbourhood correlates of objectively measured sedentary time in adults who participated in the SPOTLIGHT (‘Sustainable prevention of obesity through integrated strategies’) project in Belgium and the Netherlands. This is one of the first studies to explore associations between objective measures of sedentary time and both individual and environmental factors. Methods A total of 6037 participants from 60 neighbourhoods in five countries participated in an online survey as part of the European SPOTLIGHT survey [7;8]. Data used for this study were from Belgian and Dutch participants only, as these were the only SPOTLIGHT countries that collected accelerometer data. The study was approved by the VU University Medical Center ethics committee (2012/314) and the Ghent University Hospital ethical committee (EC/2013/518) and all participants provided written informed consent. Participants Sampling of neighbourhoods and recruitment of participants has been described in detail elsewhere [8]. Briefly, neighbourhood sampling was based on a combination of residential density and socioeconomic status (SES) data at neighbourhood level. In 12 randomly selected neighbourhoods in each country, a random sample of residential addresses was drawn from postal companies (the Netherlands), or public administration services (Belgium). Between February and September 2014, 55893 adults were recruited via postal invitation to participate in the online survey, of whom 6037 (10.8%) responded. Between March and October 2014, 379 of the 1609 Dutch and 167 of the 1849 Belgian participants who completed the survey and left their phone number or email address to be contacted for potential future studies, were asked to participate in the accelerometer study. In total, 225 Dutch and 149 Belgian participants provided accelerometer data. Timing between the questionnaire and accelerometer assessment varied between participants, but was less than six months in all cases. In the Netherlands, an accelerometer was sent to the participants’ home address including a written instruction on how to wear the device. In Belgium, researchers visited the participants to attach the accelerometer and explain procedures. Participants were asked to wear the device for seven consecutive days during waking hours. They were told to temporarily remove the device during water-based activities and to refit the device as soon as possible afterwards. Participants were asked to keep a monitoring log. Measures Objectively measured sedentary behaviour. Participants were asked to wear the commonly used tri-axial accelerometer (ActiGraph GT3X+) fixed with an elastic belt on the right hip during waking hours. The GT3X+ activity monitor (ActiGraph, LLC, Fort Walton Beach, FL) is a commonly used small (51 x 41 x 15 mm), lightweight (27 grams) accelerometer. The ActiGraph provides activity counts, which can be converted into time spent in sedentary (<100 counts/min), light (100–2019 counts/min), moderate (2020–5998 counts/min), and vigorous intensity activity (>5999 counts/min) using established cut points for adults [9]. Non-wear time was defined as 60 minutes of consecutive zeroes, allowing for two interruptions of <100 counts per minute. Participants had to wear the accelerometer for at least 10 hr/d for it to be considered a valid day and only participants with four valid days were included in the analyses. A recent meta-analysis suggests that the risk of all-cause mortality increases if adults sit more than around seven to eight self-reported hours per day [1]. The single item questionnaires generally used in the prospective cohort studies included in this meta-analysis tend to underestimate their self-reported daily time spent sitting [10;11]. As no standardized threshold for objective sedentary time is available, we dichotomized time spent sedentary in sitting 9 hours or less and more than 9 hours per day, which was close to the median sedentary time of 9.1 hr/d in the current study sample. And we also ran a sensitivity analysis for sitting more than 10 hours per day. Individual and environmental correlates. We only included variables from the full SPOTLIGHT questionnaire that had a theoretical basis for possible associations with sedentary behaviour. (see copy of SPOTLIGHT questionnaire items used in this study in S1S3 Questionnaires). Sociodemographic factors. Information was obtained through the online survey on country of residence, age, gender and educational level. Age was recoded into 4 groups (i.e. <35 yr, 35–49 yr, 50–64yr and ≥65 yr). The item on educational level divided into low (no education/ completed primary school/ lower vocational education/ general secondary education), medium (secondary vocational or higher general secondary education), or high education (bachelor-education degree or higher) as defined in the ISCED. Lifestyle factors. Moderate to vigorous physical activity (MVPA) was calculated by summing up moderate and vigorous intensity activity objectively measured by the accelerometer. We dichotomized MVPA into less than 150 minutes per week or 150 minutes or more, in line with the World Health Organization (WHO) physical activity recommendations for adults [12]. Sleep was assessed by the question: ‘How many hours per night do you sleep on average? The response options ranged from 4 to 16 h per night (in half-hourly intervals). Because both short and long sleep have previously been associated with unfavourable health outcomes [13;14], we classified sleep in two variables: normal sleep (7–9 hours per day) and short or long sleeper (<7 or >9 hours sleep per day) according to cut-off points used in previous studies [15]. Participants also indicated if they were a smoker, former smoker or non- smoker. Participants also reported the frequency of consuming sugar-containing beverages and alcoholic beverages both by a single item: ‘How often per week do you drink sugar-containing beverages, including fruit juice/ alcohol-containing beverages?’. We dichotomized these variables at the median consumption per week: sugar-containing beverages intake >1 glass per week, alcohol intake ≥4 glasses per week. Health factors. BMI was calculated as self-reported body weight (kilograms) divided by the square root of self-reported height (metres). According to the WHO guidelines overweight was defined as a BMI ≥ 25 kg/m2 and obesity as BMI ≥ 30 kg/m2 [16]. Self-rated health was measured using a Visual Analogue Scale, consisting of a continuous line ranging from 0 (worst health) to 100 (best health). Participants were asked to indicate how they rated their general health by placing a mark on the line. The Visual Analogue Scale has proven to be a valid, reliable and feasible method of obtaining information on self-rated health [17;18]. Self-rated health was recoded into tertiles. We also asked participants to indicate if they currently suffered from an illness, handicap or other impairment (yes/no). Work factors. Participants reported their current employment status and those employed were asked about the type of work they did. We combined these two questions into one item: i.e. sitting occupation, standing occupation, (heavy) manual work, retired, and other (in education, homemaker, unemployed). Psychological factors. Happiness was measured by a single item rated on a 5-point scale asking ‘How happy are you in general?’. Answering scale ranged from very happy to very unhappy. We dichotomized the question into unhappy/ neutral and happy. Physical home and neighbourhood environment. Participants reported if they owned a car, and how many screens they had in their household (including desktop computers, laptops, TVs and tablets). We dichotomized the screen variable at the median of >4 screens in the house. Data on residential density were obtained from the Urban Atlas database (European Environment Agency, 2002) using two categories: high and low residential density (>2/3 and <1/3 of areas covered by residential buildings, respectively). Neighbourhoods were classified as low or high SES on the basis of recent data on neighbourhood median income (i.e. the first and third tertiles, respectively) retrieved from each country’s national statistics office [8]. Residential neighbourhood type was classified for SES and residential density, both dichotomised into low and high. Social neighbourhood environment. Aspects of neighbourhood social capital were measured as previously proposed by Beenackers et al. using a 13-item scale [19]. Items captured interactions and relationships in the neighbourhood such as ‘the people in my neighbourhood get along with each other well’. Responses ranged from 1 (totally disagree) to 5 (totally agree). Factor analysis was performed and reliabilities of the three identified constructs were α = 0.83 for ‘social network’ (4 items), α = 0.79 for ‘social cohesion’ (5 items) and α = 0.58 (3 items) for ‘place attachment/sense of belonging’. Based on the Cronbach’s alpha, only social cohesion and social network were considered to be reliable social capital factors. Summary scores of social cohesion and social network were calculated for each individual, with values ranging between 5–25 and 4–20, respectively. Detailed methodology of the factor analysis can be found elsewhere [20]. Statistical analyses We excluded participants who did not provide both questionnaire data and valid accelerometer data. Descriptive statistics were used to summarise participant characteristics. The first model examined univariate associations between the individual and environmental variables and sedentary time among adults (9h or less/more than 9 hours per day) using logistic regression. Given the hierarchical structure of the data (individuals within neighbourhoods), we adjusted the associations for the neighbourhood identifier. Due to the variation in accelerometer wear time, we adjusted all analyses for wear time. In the second model, all univariate factors from the first step surpassing the statistical threshold of p<0.10 were added simultaneously to a multivariable logistic regression model, adjusted for neighbourhood identifier. Item-nonresponse ranged from 1% (age) to 31% (self-rated general health). Assuming that data were missing at random, missing values for all variables were imputed using predictive mean matching. All variables described in the methods section were used as predictors in the imputation model to create 30 imputed datasets. Sensitivity analyses were carried out using the imputed dataset and using a cut-off of 10h sedentary time or more per day. All analyses were conducted in SPSS version 22.0. Results Table 1 presents the participant characteristics. In total, 223 adults from the Randstad region (Netherlands) and 133 adults from the Ghent region (Belgium) were included for analyses. Mean minutes spent sedentary per day was 543.8 (SD 88.4) and 54% of the participants were sedentary for at least 9 hours per day. Mean accelerometer wear time was 873.0 (SD 69.8) minutes per day and mean number of valid days was 6.8 (SD 0.6). Compared to the full SPOTLIGHT sample in Belgium and the Netherlands, the Belgian sample included in this study consisted of slightly less women (53% vs. 45% respectively, but were comparable with regard to age (53.0, SD 16.7 vs. 52.8yrs, SD 15.8) and BMI (25.4, SD 4.5 vs. 24.7, SD 4.1). The Dutch sample included in this study consisted of slightly more women (54% in full SPOTLIGHT sample vs. 56% in this study), They were also slightly older (54.9, SD 15.9 vs. 57.6yrs, SD 15.3) and had a lower BMI (25.0, SD 3.9 vs. 24.6, SD 4.0 in this study) [8]. Results of the univariate model, as well as results of the multivariable adjusted logistic regression model are presented in Table 2. Results were reasonably similar in univariate and multivariable models. Only multivariable results are described below. Belgian participants had significantly lower odds (OR = 0.22; CI 0.08–0.65) of being sedentary for 9 hours or more per day than those living in the Netherlands. Being aged 35–49 years, 50–64 years or 65 years and older was associated with lower odds of high sedentary time compared to their younger counterparts of 35 years and younger, respectively OR = 0.18 (CI 0.06–0.53), OR = 0.31 (CI 0.11–0.87), and OR = 0.24 (CI 0.07–0.89). Compared to males, women were less likely to sit for 9 hours per day or more (OR = 0.44; CI 0.25–0.78). Those meeting WHO recommendations for being physically active (i.e. 150 minutes or more per week) were less likely to sit more (OR = 0.39; CI 0.22; 0.71) compared to those not meeting the guidelines. Further, those doing (heavy) manual work and those in the ‘other’ group of employment status (being in education, homemakers and unemployed participants) showed lower odds of sitting more than 9 hours a day compared to those having a sitting job, respectively OR = 0.14 (CI 0.05–0.40) and OR = 0.25 (CI 0.10–0.60). Lastly, those with a higher self-reported social network had slightly lower odds for sedentary time (OR = 0.92; CI 0.85–1.00). A sensitivity analysis performed on the imputed dataset revealed comparable results (see S1 Table), except that age (65 years or older) was no longer a significant correlate of sedentary time in the multivariable model. The sensitivity analysis performed with a 10 hour threshold revealed that country of residence and age were no longer a significant correlate of sedentary time in the multivariable model and those having a standing occupation, being retired and high SES were less likely to sit 10 hours or more per day (see S1 Table). Discussion For better understanding of correlates of sedentary time in adults, this study assessed cross-sectional associations between individual and environmental factors and objectively measured sedentary time in Belgian and Dutch adults. Dutch participants were more likely to sit at least 9 hours per day compared to Belgian participants. This is in line with the study of Loyen et al. who used self-report Eurobarometer data of 26,617 respondents [21]. Those aged 35–49, 50–64 or >65 showed lower odds for large amounts of sitting compared to people younger than 35 years. Whilst Rhodes et al. [4] concluded that age was positively associated with self-reported TV viewing, they reported mixed results for general sitting. In contrast to our findings, the updated review of O’Donogue et al. supported a positive association of age and sitting, e.g. the older, the more sitting time [5]. However, most of those studies (18 of the 20 studies) relied on self-reported measures of sedentary time. As people tend to find it difficult to estimate their actual sitting time [10;11], objective sedentary time data were used in the present study showing a negative relationship: the older, the less sitting time. This is in line with the recent published paper by Jones et al., also using objective sedentary behaviour in a large US sample [22]. More studies with objective measures are needed to confirm the direction of this association. Consistent with some previous literature [5;21;22], our multivariable analyses showed that women were less likely to sit for 9 hours or more per day compared to males. This is also in line the study of Bernaards et al. using data of a large cross-sectional Dutch survey [23]. It might be that women traditionally spent on average more time housekeeping or taking care of the children, which mostly consists of light intensity activities, resulting in less sitting time. Previous studies using objective sedentary time measures show a mixed pattern: Wilson et al. [24] also found that the female gender was inversely associated with sedentariness, whilst both Conroy et al. [25] and Ekelund et al. [26] reported no association, suggesting no clear cut association. Regarding lifestyle factors, 50% of our participants were meeting the PA recommendations, but also sat still for 9 hours or more per day. There may be an adverse metabolic and health effects from prolonged sitting even if PA recommendations are being met [27]. A recently published meta-analyses of data from more than 1 million men and women suggests that substantial amounts of PA per day seems to attenuate the increased risk of death associated with high sitting time [2]. This further stresses the need to focus on development and implementation of interventions that target both PA and sedentary behaviours [28]. We did not find significant associations of BMI, illness/handicap/impairment and general health with sedentary time. The literature suggests a tendency towards a positive association between a higher BMI and more sitting [5]. Although the univariate model showed a significant correlation, we only found a hint of a dose-response relation between sedentary time and BMI in the multivariable model in our study, but this was not significant. It must be noted that BMI was self-reported, which is known be prone to measurement bias [29], resulting in possible misclassification of BMI. Regarding work factors, previous literature suggests an association between retirement and leisure screen and sitting time [5]. Yet, this was not reflected in our data. As we could not measure domains of sitting with accelerometry, this limits exploration of associations of retirement and leisure screen and sedentary time in our study population. It may be that they compensate longer duration of screen time with less sitting time during other activities. Interestingly, our study did not show a significant difference in sedentary time between those with a sitting and standing job. A previous validation and responsiveness study showed that the hip-mounted ActiGraph accelerometer used in the current study struggles to detect the difference between standing still and sitting down [30]. This might clarify why we found no difference between people with a sitting or standing job. Using an inclinometer-based measurement instrument would allow to pick up changes between these postures and therefore better explore these associations. As expected, the large majority of the individuals with a sitting job was more than 9 h/d sedentary. This may be due to long sedentary working hours or may also be partly explained by evidence suggesting that those with a sitting job often also engage in more sedentary leisure activities [31]. As mentioned above, it may also be that the accelerometer does not distinguish being sedentary and standing time and therefore overestimates time spent sedentary at work. Nevertheless, it might be that people with a sitting occupation struggle to compensate the large amounts of sitting time they accumulate during working outside working hours. This highlights the importance to address the work place as an intervention setting for breaking up prolonged sitting time at work. In contrast to previous studies, such as Stamatakis et al. [32], we did not find significant socioeconomic differences in level of sedentary time (after adjustment for neighbourhood clusters). As previous studies often reported socioeconomic differences in specific domains of sedentary behaviour [33;34], it may be that these associations cancel each other out when examining total sedentary time objectively. Although we found a significant correlation between self-reported social network and sedentary time, we did not find any associations between physical and other social environmental characteristics and sedentary time. It may be that sedentary time is more dependent on the built indoor (home) environment than the neighbourhood environment. Strengths and limitations Among the study’s limitations is the cross-sectional study design. Consequently, we could not explore causality of factors associated with sedentary time. The fact that we used a self-reported questionnaire to measure most correlates is another limitation of the study. Where possible, valid and reliable measures were used in the questionnaire, but self-reported measures are susceptible to recall bias and social desirable answers and could have led to measurement bias, such as potential BMI misclassification in our study. In addition, the study sample comprised a small, relatively older, urban population. This may have influenced our results and limits the generalisability of our results to the whole Dutch, Belgian and other populations. The SPOTLIGHT study’s main aim was to explore determinants of obesity [7]. As we conducted secondary data analyses, we only included variables that had a theoretical basis for possible associations with sedentary behaviour. Future studies should be designed to specifically investigate environmental factors of sedentary behaviour. Taking these limitations into account, the major strength of this study is the use of objective sedentary time measured with an accelerometer, providing an accurate estimate of actual time spent sedentary compared to self-reported sedentary time measures such as TV viewing, computer use and leisure sitting time. Most participants were compliant with the measurement procedures, with an average of 873 minutes wear time, whilst a minimum of 600 minutes was set. However, as participants were asked to remove the accelerometer during sleep and water-based activities, it is possible sedentary time has been lost through non-wear in those with shorter wear periods, i.e. at the beginning and end of the day when people are tended to be more sedentary. Yet, as mentioned before, the hip-worn accelerometer does not detect the difference between standing still and sitting down [30], so information about domain-specific sitting behaviour in addition to objective sedentary time could provide supplemented insight into sedentary lifestyles. Conclusions Our findings add to the growing evidence of factors associated to sedentary time among adults. Country of residence, age, gender, meeting PA recommendations, employment status and social network were associated with objective measured sedentary time. These findings may be used to inform the development of strategies and interventions aimed at reducing sedentary time, and to identify those target groups most in need of such efforts. Yet, additional longitudinal research with objective measured sedentary time in combination with self-reported domain-specific sedentary behaviour is needed to get insight into the causality of these cross-sectional findings. Supporting information S1 Table. Between March and October 2014, Belgian (n = 133) and Dutch (n = 223) adults participated | OR = odds ratio | CI = confidence interval | NBH_NR = neighbourhood number | ref = reference category | MVPA = moderate to vigorous physical activity | SCB = sugar-containing beverage | BMI = body mass index | SES = socio economic status | bold = statistically significant, p<0.05. https://doi.org/10.1371/journal.pone.0186538.s004 (DOCX) Acknowledgments The SPOTLIGHT project was supported by the Seventh Framework Programme (CORDIS FP7) of the European Commission, HEALTH (FP7-HEALTH-2011-two-stage), Grant agreement no. 278186. The content of this article reflects only the authors’ views, and the European Commission is not liable for any use that may be made of the information contained therein. References 1. 1. Chau JY, Grunseit AC, Chey T, Stamatakis E, Brown WJ, Matthews CE, et al. Daily Sitting Time and All-Cause Mortality: A Meta-Analysis. PLoS One 2013;8(11). 2. 2. Ekelund U, Steene-Johannessen J, Brown WJ, Fagerland MW, Owen N, Powell KE, et al. Does physical activity attenuate, or even eliminate, the detrimental association of sitting time with mortality? A harmonised meta-analysis of data from more than 1 million men and women. Lancet 2016 Jul 27. 3. 3. Tremblay MS, Aubert S, Barnes JD, Saunders TJ, Carson V, Latimer-Cheung AE, et al. Sedentary Behavior Research Network (SBRN)—Terminology Consensus Project process and outcome. Int J Behav Nutr Phys Act 2017 Jun 10;14(1):75. pmid:28599680 4. 4. Rhodes RE, Mark RS, Temmel CP. Adult sedentary behavior: a systematic review. Am J Prev Med 2012 Mar;42(3):e3–28. pmid:22341176 5. 5. O'Donoghue G, Perchoux C, Mensah K, Lakerveld J, van der Ploeg H, Bernaards C, et al. A systematic review of correlates of sedentary behaviour in adults aged 18–65 years: a socio-ecological approach. BMC Public Health 2016;16:163. pmid:26887323 6. 6. Koohsari MJ, Sugiyama T, Sahlqvist S, Mavoa S, Hadgraft N, Owen N. Neighborhood environmental attributes and adults' sedentary behaviors: Review and research agenda. Prev Med 2015 Aug;77:141–9. pmid:26051198 7. 7. Lakerveld J, Brug J, Bot S, Teixeira PJ, Rutter H, Woodward E, et al. Sustainable prevention of obesity through integrated strategies: The SPOTLIGHT project's conceptual framework and design. BMC Public Health 2012;12:793. pmid:22985293 8. 8. Lakerveld J, Ben Rebah M., Mackenbach JD, Charreire H, Compernolle S, Glonti K, et al. Obesity-related behaviours and BMI in five urban regions across Europe: sampling design and results from the SPOTLIGHT cross-sectional survey. BMJ Open 2015;5(10):e008505. pmid:26507356 9. 9. Troiano RP, Berrigan D, Dodd KW, Masse LC, Tilert T, McDowell M. Physical activity in the United States measured by accelerometer. Med Sci Sports Exerc 2008 Jan;40(1):181–8. pmid:18091006 10. 10. Scholes S, Coombs N, Pedisic Z, Mindell JS, Bauman A, Rowlands AV, et al. Age- and sex-specific criterion validity of the health survey for England Physical Activity and Sedentary Behavior Assessment Questionnaire as compared with accelerometry. Am J Epidemiol 2014 Jun 15;179(12):1493–502. pmid:24863551 11. 11. Dyrstad SM, Hansen BH, Holme IM, Anderssen SA. Comparison of self-reported versus accelerometer-measured physical activity. Med Sci Sports Exerc 2014 Jan;46(1):99–106. pmid:23793232 12. 12. World Health Organization. Global Recommendations on Physical Activity for Health. Geneva, Switzerland: WHO Press; 2010. 13. 13. Buxton OM, Marcelli E. Short and long sleep are positively associated with obesity, diabetes, hypertension, and cardiovascular disease among adults in the United States. Soc Sci Med 2010 Sep;71(5):1027–36. pmid:20621406 14. 14. Lakerveld J, Mackenbach JD, Horvath E, Rutters F, Compernolle S, Bardos H, et al. The relation between sleep duration and sedentary behaviours in European adults. Obes Rev 2016 Jan;17 Suppl 1:62–7. 15. 15. Ding D, Rogers K, van der Ploeg H, Stamatakis E, Bauman AE. Traditional and Emerging Lifestyle Risk Behaviors and All-Cause Mortality in Middle-Aged and Older Adults: Evidence from a Large Population-Based Australian Cohort. PLoS Med 2015 Dec;12(12):e1001917. pmid:26645683 16. 16. World Health Organization. Obesity. Preventing and Managing the Global Epidemic. Report of a WHO Consultation on Obesity. Geneva; 1998. 17. 17. de Boer AG, van Lanschot JJ, Stalmeier PF, van Sandick JW, Hulscher JB, de Haes JC, et al. Is a single-item visual analogue scale as valid, reliable and responsive as multi-item scales in measuring quality of life? Qual Life Res 2004 Mar;13(2):311–20. pmid:15085903 18. 18. Badia X, Monserrat S, Roset M, Herdman M. Feasibility, validity and test-retest reliability of scaling methods for health states: the visual analogue scale and the time trade-off. Qual Life Res 1999 Jun;8(4):303–10. pmid:10472162 19. 19. Beenackers MA, Kamphuis CB, Mackenbach JP, Burdorf A, van Lenthe FJ. Why some walk and others don't: exploring interactions of perceived safety and social neighborhood factors with psychosocial cognitions. Health Educ Res 2013 Apr;28(2):220–33. pmid:23393100 20. 20. Mackenbach JD, Lakerveld J, van Lenthe FJ, Kawachi I, McKee M, Rutter H, et al. Neighbourhood social capital: measurement issues and associations with health outcomes. Obes Rev 2016 Jan;17 Suppl 1:96–107. 21. 21. Loyen A, van der Ploeg HP, Bauman A, Brug J, Lakerveld J. European Sitting Championship: Prevalence and Correlates of Self-Reported Sitting Time in the 28 European Union Member States. PLoS One 2016;11(3):e0149320. pmid:26934701 22. 22. Jones SA, Wen F, Herring AH, Evenson KR. Correlates of US adult physical activity and sedentary behavior patterns. J Sci Med Sport 2016 Dec;19(12):1020–7. pmid:27053434 23. 23. Bernaards CM, Hildebrandt VH, Hendriksen IJ. Correlates of sedentary time in different age groups: results from a large cross sectional Dutch survey. BMC Public Health 2016 Oct 26;16(1):1121. pmid:27784297 24. 24. Wilson HJ, Leonard WR, Tarskaia LA, Klimova TM, Krivoshapkin VG, Snodgrass JJ. Objectively measured physical activity and sedentary behaviour of Yakut (Sakha) adults. Ann Hum Biol 2014 Mar;41(2):180–6. pmid:24295037 25. 25. Conroy DE, Maher JP, Elavsky S, Hyde AL, Doerksen SE. Sedentary behavior as a daily process regulated by habits and intentions. Health Psychol 2013 Nov;32(11):1149–57. pmid:23477579 26. 26. Ekelund U, Brage S, Besson H, Sharp S, Wareham NJ. Time spent being sedentary and weight gain in healthy adults: reverse or bidirectional causality? Am J Clin Nutr 2008 Sep;88(3):612–7. pmid:18779275 27. 27. NHS Information Centre. Health Survey for England 2008 VOL 1. Physical Activity and Fitness. London: The NHS Information Centre for health and social care; 2008. 28. 28. Owen N, Sugiyama T, Eakin EE, Gardiner PA, Tremblay MS, Sallis JF. Adults' sedentary behavior determinants and interventions. Am J Prev Med 2011 Aug;41(2):189–96. pmid:21767727 29. 29. Nawaz H, Chan W, Abdulrahman M, Larson D, Katz DL. Self-reported weight and height: implications for obesity research. Am J Prev Med 2001 May;20(4):294–8. pmid:11331120 30. 30. van Nassau F, Chau JY, Lakerveld J, Bauman AE, van der Ploeg HP. Validity and responsiveness of four measures of occupational sitting and standing. Int J Behav Nutr Phys Act 2015;12:144. pmid:26608219 31. 31. Jans MP, Proper KI, Hildebrandt VH. Sedentary behavior in Dutch workers: differences between occupations and business sectors. Am J Prev Med 2007 Dec;33(6):450–4. pmid:18022060 32. 32. Stamatakis E, Coombs N, Rowlands A, Shelton N, Hillsdon M. Objectively-assessed and self-reported sedentary time in relation to multiple socioeconomic status indicators among adults in England: a cross-sectional study. BMJ Open 2014 Nov 5;4(11):e006034. pmid:25377012 33. 33. Teychenne M, Ball K, Salmon J. Correlates of socio-economic inequalities in women's television viewing: a study of intrapersonal, social and environmental mediators. Int J Behav Nutr Phys Act 2012;9:3. pmid:22264399 34. 34. Stamatakis E, Grunseit AC, Coombs N, Ding D, Chau JY, Phongsavan P, et al. Associations between socio-economic position and sedentary behaviour in a large population sample of Australian middle and older-aged adults: The Social, Economic, and Environmental Factor (SEEF) Study. Prev Med 2014 Jun;63:72–80. pmid:24650626
Skip to content HTTPS clone URL Subversion checkout URL You can clone with or . Download ZIP tag: php-4.2.3RC1 Fetching contributors… Cannot retrieve contributors at this time 357 lines (331 sloc) 9.952 kb /*- * Copyright (c) 1992, 1993 * The Regents of the University of California. All rights reserved. * * This code is derived from software contributed to Berkeley by * Peter McIlroy. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #if defined(LIBC_SCCS) && !defined(lint) static char sccsid[] = "@(#)merge.c 8.2 (Berkeley) 2/14/94"; #endif /* LIBC_SCCS and not lint */ /* * Hybrid exponential search/linear search merge sort with hybrid * natural/pairwise first pass. Requires about .3% more comparisons * for random data than LSMS with pairwise first pass alone. * It works for objects as small as two bytes. */ #define NATURAL #define THRESHOLD 16 /* Best choice for natural merge cut-off. */ /* #define NATURAL to get hybrid natural merge. * (The default is pairwise merging.) */ #include <sys/types.h> #include <errno.h> #include <stdlib.h> #include <string.h> #include "php.h" #ifdef PHP_WIN32 #include <winsock.h> /* Includes definition for u_char */ #endif static void setup(u_char *list1, u_char *list2, size_t n, size_t size, int (*cmp)(const void *, const void * TSRMLS_DC) TSRMLS_DC); static void insertionsort(u_char *a, size_t n, size_t size, int (*cmp)(const void *, const void * TSRMLS_DC) TSRMLS_DC); #define ISIZE sizeof(int) #define PSIZE sizeof(u_char *) #define ICOPY_LIST(src, dst, last) \ do \ *(int*)dst = *(int*)src, src += ISIZE, dst += ISIZE; \ while(src < last) #define ICOPY_ELT(src, dst, i) \ do \ *(int*) dst = *(int*) src, src += ISIZE, dst += ISIZE; \ while (i -= ISIZE) #define CCOPY_LIST(src, dst, last) \ do \ *dst++ = *src++; \ while (src < last) #define CCOPY_ELT(src, dst, i) \ do \ *dst++ = *src++; \ while (i -= 1) /* * Find the next possible pointer head. (Trickery for forcing an array * to do double duty as a linked list when objects do not align with word * boundaries. */ /* Assumption: PSIZE is a power of 2. */ #define EVAL(p) (u_char **) \ ((u_char *)0 + \ (((u_char *)p + PSIZE - 1 - (u_char *) 0) & ~(PSIZE - 1))) /* {{{ php_mergesort * Arguments are as for qsort. */ int php_mergesort(void *base, size_t nmemb, size_t size, int (*cmp)(const void *, const void * TSRMLS_DC) TSRMLS_DC) { register unsigned int i; register int sense; int big, iflag; register u_char *f1, *f2, *t, *b, *tp2, *q, *l1, *l2; u_char *list2, *list1, *p2, *p, *last, **p1; if (size < PSIZE / 2) { /* Pointers must fit into 2 * size. */ errno = EINVAL; return (-1); } if (nmemb == 0) return (0); /* * XXX * Stupid subtraction for the Cray. */ iflag = 0; if (!(size % ISIZE) && !(((char *)base - (char *)0) % ISIZE)) iflag = 1; if ((list2 = malloc(nmemb * size + PSIZE)) == NULL) return (-1); list1 = base; setup(list1, list2, nmemb, size, cmp TSRMLS_CC); last = list2 + nmemb * size; i = big = 0; while (*EVAL(list2) != last) { l2 = list1; p1 = EVAL(list1); for (tp2 = p2 = list2; p2 != last; p1 = EVAL(l2)) { p2 = *EVAL(p2); f1 = l2; f2 = l1 = list1 + (p2 - list2); if (p2 != last) p2 = *EVAL(p2); l2 = list1 + (p2 - list2); while (f1 < l1 && f2 < l2) { if ((*cmp)(f1, f2 TSRMLS_CC) <= 0) { q = f2; b = f1, t = l1; sense = -1; } else { q = f1; b = f2, t = l2; sense = 0; } if (!big) { /* here i = 0 */ while ((b += size) < t && cmp(q, b TSRMLS_CC) >sense) if (++i == 6) { big = 1; goto EXPONENTIAL; } } else { EXPONENTIAL: for (i = size; ; i <<= 1) if ((p = (b + i)) >= t) { if ((p = t - size) > b && (*cmp)(q, p TSRMLS_CC) <= sense) t = p; else b = p; break; } else if ((*cmp)(q, p TSRMLS_CC) <= sense) { t = p; if (i == size) big = 0; goto FASTCASE; } else b = p; while (t > b+size) { i = (((t - b) / size) >> 1) * size; if ((*cmp)(q, p = b + i TSRMLS_CC) <= sense) t = p; else b = p; } goto COPY; FASTCASE: while (i > size) if ((*cmp)(q, p = b + (i >>= 1) TSRMLS_CC) <= sense) t = p; else b = p; COPY: b = t; } i = size; if (q == f1) { if (iflag) { ICOPY_LIST(f2, tp2, b); ICOPY_ELT(f1, tp2, i); } else { CCOPY_LIST(f2, tp2, b); CCOPY_ELT(f1, tp2, i); } } else { if (iflag) { ICOPY_LIST(f1, tp2, b); ICOPY_ELT(f2, tp2, i); } else { CCOPY_LIST(f1, tp2, b); CCOPY_ELT(f2, tp2, i); } } } if (f2 < l2) { if (iflag) ICOPY_LIST(f2, tp2, l2); else CCOPY_LIST(f2, tp2, l2); } else if (f1 < l1) { if (iflag) ICOPY_LIST(f1, tp2, l1); else CCOPY_LIST(f1, tp2, l1); } *p1 = l2; } tp2 = list1; /* swap list1, list2 */ list1 = list2; list2 = tp2; last = list2 + nmemb*size; } if (base == list2) { memmove(list2, list1, nmemb*size); list2 = list1; } free(list2); return (0); } /* }}} */ #define swap(a, b) { \ s = b; \ i = size; \ do { \ tmp = *a; *a++ = *s; *s++ = tmp; \ } while (--i); \ a -= size; \ } #define reverse(bot, top) { \ s = top; \ do { \ i = size; \ do { \ tmp = *bot; *bot++ = *s; *s++ = tmp; \ } while (--i); \ s -= size2; \ } while(bot < s); \ } /* {{{ setup * Optional hybrid natural/pairwise first pass. Eats up list1 in runs of * increasing order, list2 in a corresponding linked list. Checks for runs * when THRESHOLD/2 pairs compare with same sense. (Only used when NATURAL * is defined. Otherwise simple pairwise merging is used.) */ static void setup(u_char *list1, u_char *list2, size_t n, size_t size, int (*cmp)(const void *, const void * TSRMLS_DC) TSRMLS_DC) { int i, length, size2, tmp, sense; u_char *f1, *f2, *s, *l2, *last, *p2; size2 = size*2; if (n <= 5) { insertionsort(list1, n, size, cmp TSRMLS_CC); *EVAL(list2) = (u_char*) list2 + n*size; return; } /* * Avoid running pointers out of bounds; limit n to evens * for simplicity. */ i = 4 + (n & 1); insertionsort(list1 + (n - i) * size, i, size, cmp TSRMLS_CC); last = list1 + size * (n - i); *EVAL(list2 + (last - list1)) = list2 + n * size; #ifdef NATURAL p2 = list2; f1 = list1; sense = (cmp(f1, f1 + size TSRMLS_CC) > 0); for (; f1 < last; sense = !sense) { length = 2; /* Find pairs with same sense. */ for (f2 = f1 + size2; f2 < last; f2 += size2) { if ((cmp(f2, f2+ size TSRMLS_CC) > 0) != sense) break; length += 2; } if (length < THRESHOLD) { /* Pairwise merge */ do { p2 = *EVAL(p2) = f1 + size2 - list1 + list2; if (sense > 0) swap (f1, f1 + size); } while ((f1 += size2) < f2); } else { /* Natural merge */ l2 = f2; for (f2 = f1 + size2; f2 < l2; f2 += size2) { if ((cmp(f2-size, f2 TSRMLS_CC) > 0) != sense) { p2 = *EVAL(p2) = f2 - list1 + list2; if (sense > 0) reverse(f1, f2-size); f1 = f2; } } if (sense > 0) reverse (f1, f2-size); f1 = f2; if (f2 < last || cmp(f2 - size, f2 TSRMLS_CC) > 0) p2 = *EVAL(p2) = f2 - list1 + list2; else p2 = *EVAL(p2) = list2 + n*size; } } #else /* pairwise merge only. */ for (f1 = list1, p2 = list2; f1 < last; f1 += size2) { p2 = *EVAL(p2) = p2 + size2; if (cmp (f1, f1 + size TSRMLS_CC) > 0) swap(f1, f1 + size); } #endif /* NATURAL */ } /* }}} */ /* {{{ insertionsort * This is to avoid out-of-bounds addresses in sorting the * last 4 elements. */ static void insertionsort(u_char *a, size_t n, size_t size, int (*cmp)(const void *, const void * TSRMLS_DC) TSRMLS_DC) { u_char *ai, *s, *t, *u, tmp; int i; for (ai = a+size; --n >= 1; ai += size) for (t = ai; t > a; t -= size) { u = t - size; if (cmp(u, t TSRMLS_CC) <= 0) break; swap(u, t); } } /* }}} */ /* * Local variables: * tab-width: 4 * c-basic-offset: 4 * End: * vim600: fdm=marker * vim: noet sw=4 ts=4 */ Jump to Line Something went wrong with that request. Please try again.
Saturday, 25 February 2012 Portrait of the molecule as a green substructure I've already mentioned using Open Babel for depicting with SVG. That's a handy way to view a large set of molecules; you can zoom in and out and so forth. Let's look at some more of the features, as I've just been adding them to PNG depiction from SVG. Let's start with the following basic depiction. Note that information on the SVG output options (e.g. -xC) is available in the docs or via "obabel -H svg", and that you can use the mouse to zoom in, etc. obabel dataset.sdf -O output1.svg -xC With some magic, we can convert carboxylic acid groups (and anything else listed in the user-editable superatom.txt) into COOH in the depiction. Let's add thick lines too: obabel dataset.sdf -O output2.svg -xC --genalias -xA -xt We can also do some fun stuff with descriptors (see "obabel -L descriptors" for a list). Let's sort by molecular weight and replace the title with the molecular formula and molecular weight: obabel dataset.sdf -O output3.svg -xC --sort MW --title "" --append "formula MW" You might have noticed that all of the molecules have a substructure in common. Let's highlight some of this in green, and get rid of the other colours: obabel dataset.sdf -O output4.svg -xC -xu -s "[#6]~2~[#6]NCCN=C~2 green" And finally, if the molecules are related, it can be useful to align the depictions using a substructure in order to identify similarities and differences (this has been improved in the development version): obabel dataset.sdf -O output5.svg -xC -xu -s "[#6]~2~[#6]NCCN=C~2 green" --align What other depiction features would you find useful? 12 comments: Chris said... I like the colour coding of the substructure. In my experiments it seems that if a molecule does not contain the substructure it does not display? Is there a way to display all but still colour code the substructure if present? baoilleach said... That's right. The "-s SMARTS" option is actually a SMARTS filter, which we are reusing for coloring and alignment. I don't think there's any way to do what you suggest, but adding the functionality would be trivial, e.g. --highlight "SMARTS color SMARTS2 color2". chris said... That would be very useful, perhaps need to have default black at the end for molecules that don't match? baoilleach said... Feature added in development version. Anonymous said... I can't find any way to highlight a set of atoms using their number in a SDF/MDL file, e.g. to highlight the 1, 3 and 6th atom of the structure. Is there any option to do this ? baoilleach said... There is an option to add the indices to the atoms (-xi), but right now it's not possible to highlight them. Could you describe where this might be useful? Anonymous said... Would be really usefull for the generation of diagrams showing the result of isotopic labeling experiments like the ones you can find on the this wikipedia page : http://en.wikipedia.org/wiki/Isotopic_labeling Anonymous said... Hi Noel, Can you highlight only molecule parts that conform to two SMARTS i.e. using "&" Thanks Mark baoilleach said... Can you give a simple (but real) example? I think this should be handled via the SMARTS pattern.... Jacqueline Zühlke said... Very cool! Is it possible to get single svgs (in one file, but for each molecule)? Can I use highlighting in Python? Thanks! Noel O'Boyle said... Check out obabel's "-m" option. It splits the input to multiple files. You can indeed use highlighting in Python. For example, if you have a Pybel Molecule called "mol", the following will work. Afterwards, if you call 'draw' or write out an svg, any C=O will be green: pybel._operations['highlight'].Do(mol.OBMol, "C=O green") shradha chopra said... I am trying to use fast search on a dataset and color the output based on the matched substructure. I am using the command: ../openbabel-2.3.2/bin/obabel all_chemicals.fs -O out.svg -xu -xC -s "test.smiles green" -at0.8 I get an svg file with uncolored atoms. Is this possible? If yes, is the syntax of my command correct. Please help.
Ensure that after `Cloud size X under Y` failure the rest of the external cluster is killed Description In many cases (~30-40%) cluster fails to start and reports java.lang.RuntimeException Cloud size X under Y. Leaving clusters in running state wasting resources. Assignee Jakub Hava Reporter Nidhi Mehta Labels None CustomerVisible No testcase 1 None testcase 2 None testcase 3 None h2ostream link None Affected Spark version None AffectedContact None AffectedCustomers None AffectedPilots None AffectedOpenSource None Support Assessment None Customer Request Type None Support ticket URL End date None Baseline start date None Baseline end date None Task progress None Task mode None ReleaseNotesHidden None Fix versions Priority Major Configure
ReSharper 2021.2 Help Manage and share ReSharper settings ReSharper saves your preferences using the mechanism of layered settings, which provides the following benefits: • You can have different settings in different solutions. • You can keep different subsets of the preferences in different places and combine them when you work on a specific solution. For example, you can keep your personal preferences for symbol icons and your team preferences for code formatting in different setting files and combine these preferences automatically. • You can synchronize preferences within your team by keeping a specific subset of settings under a VCS. ReSharper provides a default option of keeping team preferences in a separate file, which is saved in the solution folder and can be easily added to your VCS. If other team members use ReSharper, settings from this file will be applied automatically as soon as they pull the changes from the VCS — no Visual Studio restart or solution reload is needed. • As any subset of settings can be saved in a file and updated dynamically, you can share your ReSharper preferences in many other ways. For example, you can keep your personal preferences in Dropbox and use them on different machines. • Preferences from different setting files are applied as layers so that if the same setting has different values in different setting files the value from the 'upper' layer is used. This allows you to override settings defined in a specific setting file instead of changing them in this file. Consider the following example: Suppose you prefer to use BSD style brackets, and keep this formatting preference in your personal settings. But then you start working on a specific solution where GNU style brackets are used by a convention — ReSharper allows you to change the corresponding formatting preference and save it in a solution-specific setting layer so that it overrides your personal preference and applied as long as you work on this solution. When you open another solution, you personal preference is applied again. Default settings and setting layers Out of the box, ReSharper comes with the default set of preferences, which are based on conventions and best practices in the .NET world. These default settings are hard-coded in the product and you can always reset to the defaults if necessary. If you change any settings, your change is saved in a settings layer and ReSharper applies it overriding the corresponding default setting. Initially, ReSharper suggests three layers, in which you can save your preferences: This computer, Solution team-shared, and Solution personal. 'This computer' layer This settings layer is designated for your personal global settings and applies for all solutions on your local machine. The corresponding settings file is saved as: %APPDATA%\JetBrains\Shared\vAny\GlobalSettingsStorage.DotSettings 'Solution team-shared' layer This layer is designated for common settings that enforce your team preferences for the current solution, for example naming style, formatting rules, etc. Settings in this layer override settings in This computer layer. The corresponding settings file <SolutionName>.sln.DotSettings is saved in the solution folder. As soon as this file is added to your VCS and the team members get it, they will have settings from this file applied automatically without reloading the solution. 'Solution personal' layer This layer allows you to override team-shared settings without changing them. You may find this helpful if you need to have some settings applied only in this solution and independently of your team. The corresponding settings file <SolutionName>.sln.DotSettings.user is saved in the solution folder. You should not add it to your VCS. Consider the illustration below. You can see that initially all setting layers are empty and therefore ReSharper can 'see through them' and apply the default settings: default and modified setting layers In fact, initially the settings-layer files do not exist, they are first created when you modify and save some setting. But if a setting file exists, it is still 'transparent' for all setting that are not defined in it. Save and override settings Each time you change some setting in the Options dialog, a message with the number of unsaved setting appear at the bottom of the dialog. Save or Save To in ReSharper options To apply the changes, you should save them using one of the buttons: Save (Smart Save) This applies the 'smart save' logic. Use it to save your modifications and keep team-shared and/or custom layers (if any) intact. In other words, use Save if you just want to save your changes without bothering about setting layers. Save will save your changes to 'This computer' setting layer, then — if there are other values for the modified settings in the 'Solution team-shared' and/or custom layers — the changes will also be saved to the 'Solution personal' layer to override values in other layers. Consider the example in the illustration below. Suppose you changed three settings and had 'green' instead of ‘blue’ values; these changes were saved in 'This computer' layer. Then, your team has decided to have settings A and C ‘yellow’ within your team-shared solution, so these values were saved by a team-lead in the 'Solution team-shared' layer, ReSharper applied them as soon as you pulled changes from your VCS. Finally, you realized that you felt more comfortable with the ‘green’ value for setting A, and you changed and saved it again, this time it was also saved in the 'Solution personal' layer, which allowed you to have the desired value applied without changing the team-shared layer: Applying and overriding ReSharper settings Save To (Save to Specific Layer) You will need to use these commands to save modified settings to the 'Solution team-shared' layer or to a custom layer. You can also save the modifications to any other layer if you need it for some purpose. The only catch with saving a setting to a specific layer is that it may NOT be applied if the same setting is defined with another value anywhere in other layers above in the stack of layers. The illustration below shows how we tried to change setting C to ‘red' in 'This computer' layer and why the resulting setting failed to be changed. Using 'Save To' for saving ReSharper settings Manage setting layers By default, you can share ReSharper settings per solution using the 'Solution team shared' layer — the only thing you need to do is to put the *.dotSettings file under version control. If you want to share settings in other ways, you would need to learn how to create new setting layers, import and export them. For these purposes, ReSharper provides the Settings Layers dialog, available in the Visual Studio menu (ReSharper | Manage Options) and in the Options dialog (by clicking the Manage button). Custom setting layers are added under existing default layers. For example, if you want the settings from the custom layer to be applied for all solutions, add it under 'This computer' layer; otherwise add it under one of the solution-specific layers depending on whether you want it to override the team-shared settings or not. As soon as a custom setting layer is added, it appears in the Save To selector in the Options dialog, using which you can save modified settings to the custom layer. You can also modify settings in this layer by editing this layer. Add a custom setting layer 1. In the Settings Layers dialog, select one of the default layers, under which you would like to add a layer. 2. Do one of the following: • Click Add Layer Themed icon added parameter screen gray, then click Create Settings File to create a new empty setting layer or Open Settings File to include an existing setting layer either from your filesystem or from any URI. • Right-click and choose one of the corresponding commands in the Add Layer selector. 3. Depending on the selected command, either specify a name and location for the new setting layer file, or select an existing setting layer file with .DotSettings extension. 4. Settings from the added layer are applied according to its position in the stack of layers, which you can see in the Settings Layers dialog, that is if some setting is defined in the upper layer, the value from the upper layer is used in the resulting settings. If necessary, you can rearrange custom setting layers within the group with the Move up and Move down buttons that become available when you select the layer. As an alternative to saving modified settings to a specific layer using the Save To button in the Options dialog, you can open a specific setting layer for editing. Edit a specific setting layer 1. In the Settings Layers dialog, select a setting layer that you want to edit. 2. Do one of the following: • Click Edit Layer Themed icon settings screen gray. • Right-click and select Edit in the context menu. • Double-click the desired layer. 3. The Options dialog opens, where the name of the layer and its location are displayed at the top of the dialog: ReSharper: Editing a single settings layer Note that the values of the settings that you see in this mode are either taken from the default values or from values defined in the edited layer. If a setting is not defined in the edited layer, the value from the default settings is shown (for example the value 'blue' for 'Setting B' in the illustration below). If in this case, you need to save the value 'blue' in the 'Setting B' of the edited layer, you need to save the setting first with some other value, and then edit it again and save with the desired value. Editing a single setting layer 4. Edit the settings in the layer as necessary and click Save to save the changes. You can export a specific subset of settings from any setting layer to a new settings file. This file can be then used on another instance of ReSharper to apply these settings. Export settings from a setting layer to file 1. In the Settings Layers dialog, select a setting layer from which settings should be exported. 2. Do one of the following: • On the toolbar, click Import/Export From Themed icon import export layer screen gray, then click Export to File. • Right-click the layer and choose Export to File in the context menu. 3. In the Export to File dialog that opens, specify group(s) of settings to be exported and click OK, then specify the name and location for the setting layer file. As an alternative to adding a custom setting layer, you can copy a subset of settings from this custom layer to one of the existing default or custom layers. Import settings from a setting layer file to a setting layer 1. In the Settings Layers dialog, select a setting layer where you want to import settings. 2. Do one of the following: • On the toolbar, click Import/Export Settings Themed icon import export layer screen gray. Depending on the location of the file to be imported, click Import from File or Import from URL. • Right-click the layer. Click Import from in the context menu, then click Import from File or Import from URL. 3. Specify location of the file to be imported. Pay attention, that if you have chosen to import from URL, the path to the file should be specified in the UNC format. 4. In the Import from File dialog that opens, specify group(s) of settings to be imported and click OK. ReSharper also allows you to copy a subset of settings from one mounted setting layer to another. Copy settings from one layer to another 1. In the Settings Layers dialog, select a setting layer from which you want to copy settings. 2. Do one of the following: • On the toolbar, click Copy Settings To Themed icon copy settings screen gray, then select the target setting layer. • Right-click the layer, select Copy Settings To in the context menu, and then select the target setting layer. 3. In the Copy To dialog that opens, specify group(s) of settings to be copied and click OK. If necessary, you can clear all settings saved in a specific layer. To do so, right-click the layer and click Reset in the context menu. Moreover, you can reset all settings in all predefined layers and unmount all custom setting layers, thus returning all settings to their default values. To do so, click Reset All Settings Themed icon reset layer screen gray on the toolbar. You can also disable custom setting layers temporarily by clearing check boxes next to them or unmount a specific custom setting layer by right-clicking on it and selecting Remove in the context menu. Upgrade settings to newer versions Sometimes a newer version of ReSharper may introduce modifications to the storage format of settings. In such cases, the affected settings files are upgraded automatically on the first start of the new version — ReSharper just adds settings with modified format to the settings file. It also adds an entry, which says what was upgraded to prevent further upgrades. For example: <s:Boolean x:Key="/Default/Environment/SettingsMigration/IsMigratorApplied/[migration_ID]/@EntryIndexedValue">True</s:Boolean> However, even if a settings file was upgraded, it can still be used with older ReSharper versions (for example, if you share this file with your teammates who didn't upgrade), because the deprecated settings are neither changed nor removed. Among other things, this means that you can safely commit changes in the automatically upgraded .dotSettings files to your VCS. It is important to note here that when you go back to an older version after an update, then change some settings using this older version, and then return to the newer version — ReSharper will not upgrade the settings for the second time. Therefore some settings that you changed might be saved in older format and not read by the newer version. So if you (or your team) are using two different versions of ReSharper simultaneously, you may want to check whether the preferences modified in one version are read correctly in another version, and if not, just make the same modification once again in the other version. Last modified: 30 September 2021
What is MS Active Directory The role of a directory service is to store information about a computer network and offers features for retrieving and managing that information. Whether an organization consists of a single facility or has multiple locations, a directory service provides a centralized management tool for users and resources in all location. Windows Active Directory is a directory service based on standards for defining, storing, and accessing directory service objects. Its hierarchical database enables administrators to organize users and network resources to reflect the organization of the environment in which it used: • Hierarchical organization • Centralized/distributed database • Scalability • Security • Flexibility • Policy-base administration Working with user accounts is one of the most important Active Directory administrative tasks. User accounts are the main link between real people and network resources, and are referred to as “domain user accounts.” User accounts have two main functions in Active Directory: • Provide a method for user authentication to the network • Provide detailed information about a user The overview of the Active Directory Structure contains a physical and logical structure. The physical structure consists of sites and servers configuration as a domain control. An Active Directory site as nothing more than a physical location in which domain controllers communicate and replicate information regularly. Whereas, the logical structure of Active Directory makes it possible to the pattern the directory service’s looks and feel after the organization in which it runs. The Organizing components of Active Directory are composed of domains, forests, trees, and organization units. A Group Policy Object (GPO) is a list of settings administrators use to configure user and Computer operating environments remotely. Group policies can specify security settings, deploy software, and configure a user’s desktop, among many other computer and network settings. They can be configured to affect an entire domain, a site, and, most commonly, users or computers in an OU. The GPO scope defines which objects a GPO affects. When Active Directory is installed, two GPOs are created and linked to two containers a default domain policy and default domain controllers policy. These default policies don’t define any user-specific policies, they are designed to provide default security settings for all computers in the domain. You can view, create, and manage GPOs by using the Group Policy Management console (GPMC). Each GPO has two main nodes a computer and user configuration. Links: Microsoft: Active Directory Domain Services Overview Techopedia explains Active Directory (AD)
Have questions? Visit https://www.reddit.com/r/SNPedia rs1805388(A;A) From SNPedia reduced risk of multiple myeloma Is agenotype ofrs1805388 GeneLIG4 Chromosome13 Position108,211,243 mentionedby Magnitude2 ReputeGood Geno Mag Summary (A;A) 2 reduced risk of multiple myeloma (C;C) 0 common in clinvar (C;T) 1.2 1.5x reduced risk of multiple myeloma 4-fold reduction in risk of developing multiple myeloma omim
Messaggio 14 dicembre 2008, 16:00 Collegamenti con il Giappone in D-Star Salve a tutti, recentemente, può capitare di sentire chiamate provenienti da stazioni giapponesi; forse, qualcuno di voi ha provato a rispondere, senza successo. Vediamo come è possibile collegare queste stazioni. Per prima cosa, è necessario dire che il sistema giapponese D-Star ha alcune differenze con il resto del mondo; ad esempio, in Giappone le unità  radio non si identificano con le lettera A per i 1200 Mhz, B per i 430 Mhz e via dicendo; loro hanno deciso di indicare con A, la prima porta radio installata, con B la seconda e via dicendo. Per questo motivo, il tasto di risposta automatica R>CS presente in tutti gli apparati D-Star non funziona ! Qui è possibile vedere la lista attuale dei ripetitori giapponesi attivi: http://d-star.dyndns.org/misc/Japan_repeater.pdf Per rispondere ad una chiamata, è dunque necessario scrivere a mano nel campo URCall il nominativo del ripetitore che il nostro amico giapponese usa; tutti i giapponesi che chiamano, specificano nel proprio CTEXT il nominativo del ponte che usano, per essere più facilmente raggiungibili. Di solito scrivono: SET /JP1YJRA (per citare un esempio): in questo modo, vogliono indicare che per rispondere bisogna settare il proprio URCall con /JP1YJRA. Questa procedura per altro sarebbe utile per tutti, in modo tale da far capire a chiunque legga il Ctext, quale ripetitore si sta' in quel momento...... Infine, un picolo consiglio, vista la mia esperienza del mio viaggio in Giappone: la lingua inlgese è molto difficile da pronunciare per un giapponese, per cui invito tutti alla massima lentezza e facilità  nella ricerca delle parole inglesi da usare nel QSO. Buona attività , Luca IK0YYY. IK0ZCW Alberto Devitofrancesco Presidente C.I.S.A.R. sezione di Roma IQ0HB https://www.cisarroma.it - https://www.ik0zcw.it - https://www.qrz.com/db/ik0zcw Immagine CISAR SVXLINK NAZIONALE per info: https://svxlink.cisar.it/ Immagine . . . . . . . . . . . . . . . Immagine SvxLink by SM0SVX rete RedNet per informazioni: http://iw0.red Immagine
5 minute read AI-generated audio is becoming increasingly indistinguishable from human-produced sound. This emerging technology, while impressive, is unfortunately increasingly misused. We’re witnessing instances where this convincingly replicated audio is being manipulated to conduct scams, perpetrate identity theft, and misused in other ways. How can we safeguard ourselves and effectively combat the misuse of this advanced technology? In an environment where AI-generated audio can mimic human voices flawlessly, we need a reliable chain of trust stretching from the initial capture of audio to its final playback. This chain of trust can be established using cryptographic technologies: attested microphones for capturing the audio and carried through to the final playback via ZK-SNARKs. In the remainder of the blog post, we’ll describe how to use these tools to fight AI-generated audio. We’ll also describe how the open-source framework zkml can generate computational proofs of audio edits, like noise reduction. To demonstrate this end-to-end process, we’ve simulated the process of capturing audio to performing verified edits. We’ll describe how we did this below! Cryptographic tools for fighting AI-generated audio Establishing a chain of trust from the audio capture to final playback requires trusting how the audio is captured and how the audio is edited. We will use cryptographic tools to establish this chain of trust. Attested microphones for trusted audio capture The first tool we will use are called attested microphones. Attested microphones have a hardware unit that cryptographically signs the audio signal as soon as it is captured. This cryptographic signature is unforgeable, even with AI tools. With this signature, anyone can verify that the audio came from a specific microphone. In order to verify that audio came from a specific individual, that person can publish the public key of the attested microphone. Unfortunately, there’s two limitations of attested microphones. The first (which we will address below) is that attested microphones don’t allow you to perform edits on the audio, including edits like noise reduction or cutting out sensitive information. The second is that these attested microphones currently don’t exist, even though the technology is here. We hope that hardware manufacturers consider building attested microphones to combat AI-generated audio! ZK-SNARKs for verified edits Once we have the raw audio, there are many circumstances where we want to privately edit the original audio. For example, intelligence agencies can use background noise to identify your location, which compromises privacy. To preserve privacy, we may want to perform edits like removing the background noise or cutting out parts of an interview that might contain sensitive information. In order to perform these edits, we can use ZK-SNARKs. ZK-SNARKs provide computational integrity. For audio, ZK-SNARKs allow the producer of the audio to privately edit the audio without revealing the original. Similar to cryptographic signatures, ZK-SNARKs are unforgeable, allowing us to extend the chain of trust to edits. Demonstrating the technology To showcase the power of attested microphones and ZK-SNARKs, we’ve constructed an end-to-end demonstration of the chain of trust for audio. In our demonstration, we recorded a short 30 second clip, where each of us (Anna, Daniel, and Kobi) recorded on our own microphone. In other words, there are three 30 second clips. Because attested microphones don’t exist yet, we simulated the attested microphone by signing the individual audio clips with Ethereum wallets. These wallets contain private keys that would be similar to the secure hardware elements in the attested microphone. The signatures we’ve produced are also unforgeable, assuming our wallets aren’t compromised. During the recording process, Daniel’s microphone picked up some background echo, so we wanted to cut it out and combine the clips into one. We produced a ZK-SNARK that verifies these edits were done honestly from the original audio clips. Furthermore, the ZK-SNARK hides the input audio, so you won’t be able to extract the background noise in Daniel’s clip! This helps preserve privacy. In the following demo, the final audio file is presented coupled with a proof and a set of signatures. The verification program verifies both, ensuring we know the exact chain of operations performed on the input audio files resulting in the audio you can hear. Technical deep dive To understand how our demonstration works at a deeper level, we’ve done a technical deep dive below. You can skip to the conclusion without missing anything! We’ve outlined the overall architecture below: Overall architecture of trusted audio As we can see, the first step (after capturing the audio) is to produce the signatures. Since we don’t have attested microphones, we used Ethereum wallet addresses, which are publicly associated with us (Anna, Daniel, and Kobi), to sign hashes of the original audio. Ethereum uses ECDSA, which allows anyone to verify the signatures we produced with our public key. The private key must remain hidden. In hardware, this can be done using trusted enclaves. The hardware manufacturer can destroy the private key after it is placed on the device. By doing so, the private key is inaccessible! Given the signed input audio, we want to be able to edit them with computational integrity while preserving the privacy of the original audio. Under the random oracle model of hashing, the hashes reveal nothing about the input. We can combine the hashes with ZK-SNARKs to preserve privacy. ZK-SNARKs allow a prover to produce a proof that a function executed honestly while keeping parts of the input hidden (and selectively revealing certain inputs or outputs). In our setting, we can compute a function that computes the hashes of the inputs and outputs the edited audio from the inputs. By revealing the hashes, we can be assured that the inputs match the recorded audio! We’ve shown what happens within the ZK-SNARK below: ZK-SNARK Conclusions As we’ve seen, attested microphones and ZK-SNARKs can provide a chain of trust for audio while preserving privacy. With the rise of AI-generated audio, we’re seeing an increasing need to establish this chain of trust. We hope that our demonstration will spur hardware manufacturers to consider building attested microphones. Stay tuned for more posts on this topic as we delve deeper into other tools to fight malicious AI-generated content. And if you’d like to discuss your idea or brainstorm with us, fill out this form and join our Telegram group. Follow me on Twitter for the latest updates as well! Important note: the code for this demonstration has not been audited and should not be used in production. Categories: Updated:
Draw and Explain the Menstrual Cycle.When the lights are turned off, it takes a while before you are able to see, and about twenty minutes until night vision is fully functional. For sharpest night vision, one looks sideways. How do the properties of the cornea, rods, and cones relate to this? error: Content is protected !!
読者です 読者をやめる 読者になる 読者になる MENU MATLABのグラフィック関数 はじめに MATLABはグラフィック関数を用いてデータの可視化をすることができます。 いろいろあるのでお勉強のためにドキュメンテーションからグラフィック関数とその使い方をまとめます。 MATLABのグラフィックの詳細は次のページに詳細が載っています。 jp.mathworks.com ラインプロット 線形2次元プロット $x$を$[-2\pi, 2pi]$の間に線形に等間隔な100個の点として、sin関数、cos関数を描画します。 等間隔に100個の点を用意するためにはlinspace関数を使います。点の数を変更したい場合には、linspace(-2\pi, 2pi, 150)のように第3引数に用意したい点数を渡します。 x = linspace(-2*pi,2*pi); y1 = sin(x); y2 = cos(x); figure plot(x,y1,x,y2) グラフの詳しい指定方法についてはここの内容を見てください。 異なるY軸を使用した2つのデータのプロット plotyy(X1, Y1, X2, Y2)を用いてY1をX1をy軸の左側にラベリングして、Y2をX2をy軸の右側にラベリングしてプロットします。 x = 0:0.01:20; y1 = 200*exp(-0.05*x).*sin(x); y2 = 0.8*exp(-0.5*x).*sin(10*x); [hAx,hLine1,hLine2] = plotyy(x,y1,x,y2); hLine1.LineStyle = '--'; hLine2.LineStyle = ':'; plotyyでxとyを指定した後に、使用するグラフを指定することができます。次の例では(x,y1)についてはplot関数を使用し、(x,y2)についてはstem関数を使用しています。 x = 0:0.1:10; y1 = 200*exp(-0.05*x).*sin(x); y2 = 0.8*exp(-0.5*x).*sin(10*x); figure plotyy(x,y1,x,y2,'plot','stem') 離散データのプロット 離散データ列 stem(X, Y)はXで指定した値に、データ列Yをプロットします。そのため、XとYのベクトルまたは行列のサイズは同じでなければなりません。Xは行ベクトルまたは列ベクトルで、Yはlength(X)行の行列でなければなりません。 X = linspace(0,2*pi,50)'; Y = [cos(X), 0.5*sin(X)]; stem(Y) 階段状プロット stem関数と同様の形式で階段状のグラフをプロットします。 X = linspace(0,4*pi,50)'; Y = [0.5*cos(X), 2*cos(X)]; figure stairs(X,Y) 散布図 scatter(x, y)で、ベクトルx, yで指定された位置に散布図を作成することができます。 x = linspace(0,3*pi,200); y = cos(x) + rand(1,200); a = 25; c = linspace(1,10,length(x)); scatter(x,y,a,c,'filled') plotmatrix(X)でYの列に対するXの列の散布図を含む散布図プロット行列を作成できます。 行列の(i,j)成分のサブプロットはj列目に対するi列目の散布図です。体格成分には各列のヒストグラムプロットが配置されます。 X = randn(50,3); plotmatrix(X) plotmatrix(X, Y)でYの列に対する X の列の散布図を含む小座標軸の行列を作成できます。 X = randn(50,3); Y = reshape(1:150,50,3); plotmatrix(X,Y) 等高線図とベクトル場 等高線 等高線はcontour関数を用いて描画します。 x = linspace(-2*pi,2*pi); y = linspace(0,4*pi); [X,Y] = meshgrid(x,y); Z = sin(X)+cos(Y); contour(X,Y,Z) ベクトル場 速度ベクトルをfeather(U,V)で描画できます。フェザープロットは、横軸に沿った等間隔の点を原点とするベクトルを描画します。それぞれのベクトルの原点を基準としたベクトル成分を表します。 UとVで指定されるベクトルを表示し、Uは相対的な座標としてのx成分、Vは相対的な座標としてのy成分を含んでいます。 thetaの方向を表すフェザープロットを作成します。featherは直交座標を使用するためpol2cartを使用してthetaとrを直交座標に変換します。 theta = -pi/2:pi/16:pi/2; r = 2*ones(size(theta)); [u,v] = pol2cart(theta,r); feather(u,v) また、quiver(x, y, u, v)でx,yの各要素と矢印を組み合わせることができます。 [x,y] = meshgrid(0:0.2:2,0:0.2:2); u = cos(x).*y; v = sin(x).*y; quiver(x,y,u,v) 等高線図とベクトル場の表示 $ z = x \exp( -x^{2} -y^{2} ) $の等高線と勾配ベクトルを描画します。勾配ベクトルはgradient関数によって得ることができます。 $$ \nabla \boldsymbol{F} = \frac{\partial \boldsymbol{F}}{\partial x} \boldsymbol{i} + \frac{\partial \boldsymbol{F}}{\partial y} \boldsymbol{j} $$ % z = x exp( -x^2 - y^2)の等高線を描画 [X,Y] = meshgrid(-2:0.2:2); Z = X .* exp(-X.^2 - Y.^2); contour(X,Y,Z,10) % 勾配計算 [U, V] = gradient(Z, 0.2, 0.2); hold on quiver(X, Y, U, V); hold off
Antiviral Medication – A True Panacea Of All Your Health-Related Problems antiviral medication Are you in need of taking antiviral medication? And want to know every single detail of it? Come here! Today the market for antiviral medication has increased and has established a fine place. And are playing significant roles in our lives by protecting us from various diseases. People generally take antibiotics to treat sickness caused by bacteria such as pneumonia, tuberculosis and strep throat. Antibiotics don’t treat viral illnesses such as colds, sore throats and flu. The demand for these antibiotics has gradually risen because of the novel coronavirus pandemic. It has changed the vision of people who consider “flu-like” Symptoms as normal ones. Thus, here we will discuss some of the related benefits of antiviral medication that is fruitful. So, have a sneak peek into it. Benefits Of Antiviral Medication Antiviral Medication Antiviral treatment works perfectly after the beginning of flu illness. With the start of the treatment, within two days of getting sick with flu symptoms, antiviral drugs can lower the flu and fever symptoms and reduce the time of your sickness by about a day. Antivirals may also decrease the risk of the complications like respiratory complications that need antibiotics, ear infections in kids, and hospitalization in adults. For the people at high risk of catching flu complications, early treatment, including an antiviral drug, could convey that milder illness might need a hospital stay despite severe one. Studies have identified an early treatment of antivirals for the adults hospitalized with the flu illness that can reduce the death risk. When Should You Take Antiviral Medication? A man and a woman standing in front of a window According to studies, flu antiviral medications work excellently for treatment when they get started within two days. However, it will still be beneficial if you start them later on, especially when the person is hospitalized with severe illness or at tremendous risk of severe flu complications. You should follow the instructions before taking these medications. How Long Can You Take These Antiviral Medications? To treat flu, inhaled or oseltamivir zanamivir are generally prescribed by the doctor for five days, or one shot of oral Baloxavir or intravenous peramivir for one day. Oseltamivir treatment is prescribed to patients who are hospitalized, and some get therapy for over five days. Probable Side Effects Of Antiviral Drugs The side effects of taking antiviral medication may vary depending upon the drug. And the common side effects of oseltamivir are vomiting and nausea. Similarly, Zanamivir can lead to bronchospasm and peramivir – diarrhoea. Are Antiviral Medication Advised To children? Children can take antivirals, but it varies. The CDC prescribes oseltamivir for flu treatment among children. The American Academy of Pediatrics stipulates oseltamivir for flu treatment among children who are two weeks older. Conclusion On Antiviral Medication In all, antiviral medication can turn out to be beneficial for you and prove to be a lifesaver. Subscribe to our monthly Newsletter Subscribe to our monthly Newsletter
The tag has no wiki summary. learn more… | top users | synonyms 0 votes 4answers 80 views Small Basic Arrays to C# [closed] I hate arrays! I have no idea how to create them or use them :/ So I wonder if you could help me... I've got a basic understanding of arrays in Small Basic which I'm learning at school at the moment ... 2 votes 2answers 56 views Translate Matlab's vector assignment into Python form I'm trying to translate some Matlab code into Python (using NumPy). I'm not very familiar with Matlab, and I've encountered a line that I'm having trouble parsing: w(idx(1:p, 1), 1) = v(idx(1:p, 1), ... 0 votes 1answer 45 views Realtime URI-translation of HTML content in C/C++ For the development of a custom reverse proxy (written in C++) I want to do a realtime translation of URIs in HTML content. For example if I want to access a ressource on http://myserver/ using ... 0 votes 2answers 131 views Get column where relation is not NULL I have a database which was migrated from SQL Server to MySQL. I had an existing query in SQL Server to get the value of a column where the relation is not null, I mean, if the relation between two ... 6 votes 1answer 157 views Is there a program that translates Scheme/Java/Ruby code to english sentences? I found this article about converting english sentences to Scheme, but can't seem to find any efforts to do the inverse (i.e. Scheme to english sentences): ... 0 votes 6answers 99 views translation of vb code to c# I have some code from the 4guysfromrolla website which gives a tutorial on logging in as another user with admin credentials. I have most of it working but i'm having some trouble translating this ... 0 votes 0answers 34 views translate cpu instructions code I have some code related to CPU. What is the meaning of each of them? 0 - 2004 1 - 1005 2 - 3006 3 - 7001 4 - 0053 5 - FFE9 6 - 0000 1 vote 2answers 54 views Are there performance downsides for using only expressions / no statements in JavaScript? I'm working in translating a huge amount of code of certain language to JavaScript. My work would be considerably easier if I translated everything as expressions, without statements. For example, ... 0 votes 2answers 100 views Trying to make a multivalue dictionary that inherits from Dictionary - C# to VB conversion Hi I am trying to convert this C# code to VB class MultiValueDictionary<TKey, TValue> : Dictionary<TKey, List<TValue>> { public void Add(TKey key, TValue value) { ... 3 votes 1answer 261 views String Template: make all variable declaration global I am trying to implement a translator using ANTLR+StringTemplate. I have a starting language that is java like and multiple destination language. I used the example: ... 0 votes 0answers 146 views Reading input from assembly in code converted from C++ Its a simple question, but I'm stuck. I'm just trying to take a user input on MARS to substitute what I have on .LC0 so I can use it on my function. The function is a basic Taylor series that was ... 1 vote 0answers 106 views Dynamic Language to Dynamic Language “translation” using Reflection? [closed] I am actively working on a project to translate over 5,000 of lines of a Ruby back-end project to Dart. (It has taken over a week to translate the first 800 lines - its a lot of work to do manually, ... 1 vote 3answers 65 views printing array values in js I'm trying to create a function that will run through an array and collect it's value to a string that looks like this: '[1,2,3]'. I also need it to present only part of the array in some cases, ... 0 votes 0answers 108 views Unable to translate Python code for working with google protocol buffer data to Haskell [closed] I have google protocol buffer data that I need to read. I tried to write it in Haskell, but it didn't work, so I reverted to using python. I have no control over the gpb binary file and the rest of my ... 13 votes 1answer 577 views C99 printf formatters vs C++11 user-defined-literals This code: #define __STDC_FORMAT_MACROS #include <inttypes.h> #include <stdio.h> #include <stdlib.h> #include <stdint.h> int main(int argc,char **argv) { uint64_t ... 1 vote 1answer 214 views Qt creating new translation (ts) using Visual gives error - (ExitCode 1) I am using QTranslator in VS 2010. When using the process below I get an error saying the add-on has exited with an error (Exitcode 1). I have been through the whole process (code to executable with ... 0 votes 1answer 48 views Instruction detection at run-time I would like to identify and analyze different machine instruction executed and required clock cycle for each of them, throughout running of a code. Is there any way to do this simply? Dynamic ... 4 votes 2answers 547 views Modern Ada to C/C++ translator Is there any source-to-source converter (translator) from Ada (95, 2005) to C? How full they are (can they convert every feature of Ada into gnu c99 + pthreads + POSIX)? Is it possible to use such ... 11 votes 3answers 368 views Java code transform at compile time I would like to transform java source code at compile time just before passing the source code to the compiler. In other word I would like to create a preprocessor able to transform "bla bla bla" ... 5 votes 3answers 252 views Translating code from Python to Smalltalk Let me say first that I'm NOT searching for automagical solutions here. I want to translate code from Python to Smalltalk because I've noticed some very simple sentences can be automatically ... 3 votes 1answer 169 views Automatically translate (non-English) comments to English? I have a matlab code-base whose comments are written in Swedish.. it's something like this % Syntax: result = ocr(DOC, METHOD, fname) % DOC - bild som ska processas % METHOD - ann eller knear % ... 3 votes 2answers 258 views Translate JMonkey Tutorial to JRuby I've got all the tutorials up to beginner #5 translated and working, but I don't know Java well enough to know how to port the lines: private ActionListener actionListener = new ActionListener() { ... 1 vote 2answers 179 views SQL Script converted to MySQL I am trying to fix this migration history problem but can't get this to work in MySQL SELECT * INTO [TempMigrationHistory] FROM [__MigrationHistory] DROP TABLE [__MigrationHistory] EXEC sp_rename ... 0 votes 1answer 221 views Replacement for java bitwise operator in objective c How can I translate the following code to objective c? (Value is an int) while (value != 0) { value >>>= 1; And is there a general replacement for the >>> operator? 1 vote 3answers 57 views Is there a language that is designed with one-way translation into more than one other popular language? CoffeeScript gets converted to JavaScript, Groovy to Java. Is there a language that was designed to allow its functions to be converted into multiple languages? One could write string manipulation ... 0 votes 1answer 231 views Small errors when translating code from C# to VB.NET I have almost completed a translation from C# to VB.NET, however, I run into some small errors: 'issuerId' is already declared as 'Private Shared issuerid() As String' in this class. line 17 ... 0 votes 2answers 173 views Can someone translate this simple function into Javascript? I'm reading a tutorial on Perlin Noise, and I came across this function: function IntNoise(32-bit integer: x) x = (x<<13) ^ x; return ( 1.0 - ( (x * (x * x * 15731 + ... 0 votes 1answer 148 views Is there any way to generate Scala code from a .java file [duplicate] Possible Duplicate: Automated Java to Scala source code conversion? Since the Scala language has all features of Java, theoretically it should be possible to generate a Scala code ... 1 vote 1answer 4k views How to handle Translation in twig file using variables? I have a twig file and a yml in which i define the variables for translation, For ex. : YML File - variable.for.translation: Disponible, para tí Content of Twig File - <h2>"Hola, Follow ... 2 votes 3answers 244 views Translation of Scheme code for Sierpinski carpet I found code for generating Sierpinski carpet at http://rosettacode.org/wiki/Sierpinski_carpet#Scheme - but it won't run in the DrRacket environment or WeScheme. Could someone provide solutions for ... 2 votes 1answer 340 views ANTLR How to get rewrited code source? (using TokenRewriteStream) I am trying to create simple translator translating something like: aaa | bbb | ccc to 1 : aaa 2 : bbb c : ccc Here is grammar test01.g: grammar test01; options { output=AST; } @members{ ... 1 vote 1answer 107 views Comma at the end of True Basic if statement I've been working on translating a simulation written in True Basic to C, and eventually into CUDA. Considering I have never worked with True Basic, let alone basic, everything has been going smooth. ... 1 vote 1answer 186 views Empowering language by writing code translator: why is it a bad idea? [closed] When I was learning C++ may years before, I had a few ideas like: "Why not to add some useful lexical structures in language by writing a unified program with unified syntax that would get a ... 1 vote 1answer 422 views AST to XML in generally (maybe ANTLR) I need to parse files written in some languages(Java, C, C#...) and then trace the AST(Abstract syntax tree) to xml. (Actually the aim is to manipulate it and trace to another language - this second ... 0 votes 2answers 311 views Assembly How to translate opcode DIV to C Code Hey I know I been asking alot of questions.. but not much resources on this on google so hopefully this will help future people who attempt to do similar projects, I always google solutions as well, ... 0 votes 1answer 2k views Assembly How to convert REP STOS to C code I been debugging REP STOS DWORD PTR ES:[EDI] for a while now From my conclusion it always uses ECX as counter. EAX as the value that will be copied over EDI and then appended ECX times so after ... 1 vote 1answer 259 views Assembly how to translate JNE to C Code without ZF flag access ASM to C Code emulating nearly done.. just trying to solve these second pass problems. Lets say I got this ASM function 401040 MOV EAX,DWORD PTR [ESP+8] 401044 MOV EDX,DWORD PTR [ESP+4] 401048 ... 2 votes 1answer 2k views Assembly Converting MOV / MOVZX and MOVSX to C code (no inline asm) For the asm emulator i'm trying to write to convert ASM code to equivalent working code just working.. best code would be the one that can either be done in one line or two-three the most, don't care ... 1 vote 1answer 877 views Assembly How to translate IMUL opcode (with only one oprand) to C code Say I got EDX = 0xA28 EAX = 0x0A280105 I run this ASM code IMUL EDX which to my understand only uses EAX.. if one oprand is specified So in C code it should be like EAX *= EDX; correct? After ... 1 vote 1answer 157 views translate c# code to R I have a table like: 12 34 45 45 56 23 45 56 77 77 14 94 15 45 56 15 38 25 84 65 72 35 35 4 57 18 14 45 47 56 42 34 55 55 59 I would like to get in a vector the sum of the columns ... 2 votes 1answer 38 views Translate a project under Git I have a small Python project (a few hundred lines) in a Git repository. I started it myself, and wrote it in French. That is, all identifiers, comments, and text strings. Now, in order for other, ... 1 vote 1answer 183 views Help me translate this Java to Scheme to get things going in my head I am learning Scheme, and I've read the basics but I still can't figure how to "map" a Java class to Scheme code. Could any of you guys help me out here? I just need someone to show me how this looks ... 0 votes 1answer 444 views Menu dropdown messed up after translating page using Google translator My menu drop-down is now messed up, after I translated the page using on-the-fly Google translater. It refuses to recognize CSS classes I have created and used for exclusion (e.g, I have a class like ... 0 votes 1answer 365 views How do I convert an iGoogle gadget into an Android widget? I'm trying to recreate this progress bar clock gadget I built in iGoogle as a widget for Android devices. It seems like it should be pretty straightforward, especially considering the code is only 75 ... 2 votes 2answers 148 views Is there any way to write a compiler front end without using syntax-directed translation? My question is the same as the title. I just want to know if there are any other translation techniques to get the intermediate code that doesn't rely on embedding actions into the parser (that is, ... 0 votes 1answer 269 views Translation of some Classic ASP (vbScript) into PHP I'm trying to translate a block of Classic ASP (vbScript) into PHP. I've made an honest attempt, but my translation doesn't appear to be correct. Could anybody help me out? First, the vbScript ... 3 votes 1answer 274 views Unable to identify some C# syntax for translation to VB.NET I'm translating some example code line by line from C# to VB.NET. The lines which confuse me looks like this: [Kernel(CustomFallbackMethod = "AddCpu")] I see in the code that these lines appear ... 5 votes 2answers 248 views C++ to F# smooth translation Hey folks, I have the following piece of code from C++. for (int i=0; i < nObstacles; i++) { int x,y; bool bAlreadyExists; do { x = rand() % nGridWidth; y = rand() % ... 0 votes 2answers 3k views Multi-language Translation on Web Site i want to know how did facebook do it, did they add two different html+css or its just css only for changing there theme for different language or is there any special html attribute that changes the ... 0 votes 2answers 286 views Need help translating some Java encryption to PHP I'm trying to port a "simple" string encryption algorithm from Java to PHP and it uses just enough obscure bits of specific Java libraries that I'm bashing my head against the wall. I'm hoping the SO ... 1 2
Beefy Boxes and Bandwidth Generously Provided by pair Networks The stupid question is the question not asked   PerlMonks   Re: Dreamig in Perl by kodo (Hermit) on Dec 02, 2002 at 10:35 UTC ( #216877=note: print w/replies, xml ) Need Help?? in reply to Dreaming in Perl Hi Dingus, I also had a time where I dreamed code. I remember even some situations where it was good code that solved a problem I had a day before, so I woke up next day and basically wrote down what I dreamed the night before. But of course most times there just was the way I could remember not the code lines themself. For some reason this stopped completly after a while, I didn't have any coding-dreams for quite a while now and I must say I'm quite happy with this. Of couse it's kinda funny and can really help in some situations but is it good to "think" while sleeping? I think it's not. Your body needs time to refresh, and your brain definitly also does. I found out that I'm much more refreshed and so can be more active and do better coding when I had a dreamless sleep. But we also have to seperate between normal "dreams" and dreams where your brain still thinks about everything. I also dreamed of chess-games when I was playing chess lots and I often dreamed of stock-charts when I did lots of trading. You always dream about such things when you can't leave them behind you once you left your desk...but I think you should try to really sleep and not only sleep with some parts of your body/mind...or you probably will get ill one day, getting serious problems to sleep etc. We already had such a discussion in the chatterbox I can remember and came to the conclusion that lots of coders don't sleep much and not very well. The deep-sleep-phase is kinda missing in lots of peoples sleep-time and that's what everyone should try to change. Good ways to do this I found out for myself are doing things like meditation (no not perl-meditation :) or going for walks in the nature for example. Find something to get your head clear (no drugs are bad!)... I hope I didn't miss the topic to much :) giant Replies are listed 'Best First'. Re: Re: Dreamig in Perl by Jenda (Abbot) on Dec 02, 2002 at 11:16 UTC I doubt you ever had a dreamless night. You just don't remember the dreams. From what I've read about the subject the brain needs the dreams, to ease the strain, to filter and reprocess what happened, to forget, to remember ... You could have serious problems if you did NOT dream. I agree though that some walks and/or meditation (a nice lonely walk is a just meditation in motion :-) to clear ones head are good. Anything that'll help you fall asleep instead of rotating in the bed for hours rethinking your day/life is good. It's these halfdreams that drain ones strength. (Especially if you are a depressive fellow like me.) I'm having problems with this, especially during autumn+winter. I can't get up in the morning, I can't fall asleep in the night and all the time I feel like crawling into a cave and sleeping till the spring comes. I'll try if phototherapy helps. Jenda Well I think you're right, we usually do dream almost every night. I only had the feeling of those non-dream-nights when I did meditate lots over a weekend for example. This way all that stuff in my brain went by during meditation where the brain is a a very similar state like while sleeping but with your mind awake. It all passes by finally and you can come to the point where it all stops. This of course needs time of course but I had that experience and I guess in that state of mind you have dreamless nights. About walks I think it's an important point to NOT think about it all while walking, instead let it all pass by and just concentrate on the walk itself, then it can be like meditation yes. I also had similar problems to you for some time but it just got better and better...and I'm pretty sure it got better because I finally changed my way of live in lots of ways... You have to find the roots of that problem not fight the symptoms. In my case the problem simply was that I completly had lost the connection to nature and was living "online" more than I really lived. I also think food is an important point, and maybe the most important thing is to find back to calmness and not always hear/see something...find back to the root of all things. giant Sometimes you have to fight the symptoms to get the strength to even look at the roots. I know what the roots are and I know some of them are not solvable. I just have to learn to live with them. But I'm not going to speak about them here. Jenda Depression is an altogether too complex subject to generalize a solution like that. The western way of life does foster situational depression, which your tips are very helpful with, but it's far from the only cause. I do agree that the overwhelming majority of those who suffer would be better off with some help in changing their style of life than the nowadays so easily prescribed medication, but don't discard the fact that for some, finding a cure is not as simple. Makeshifts last the longest. Re: Re: Dreamig in Perl by steves (Curate) on Dec 03, 2002 at 00:44 UTC In college, I once dreamed I was in a program I was having problems with, stepping to each line and doing what it told me. I do not have any other vivid code dream memories since that one. Maybe the subsequent electroshock helped. 8-) A guy I worked with at my first job topped that. We had this godawful C program that was driven from a signal handler. Basically they were using signals and pipes as IPC; Process One would write a message and signal Evil Process Number Two to wake up and get its messages. Evil Process Number Two did eveything asynchronously from the signal handler. If you've ever lived the horrors of doing that in code that's not fully reentrant, you should be able to sympathize. This guy dreamed that he was being chased by the signals, which were striking at his feet like bolts of lightning. No lie. He left not long afterwards and went to law school. The interesting trivia associated with that Evil Signal Handling program is that a person whose name we all know wrote the original code. Many now look to him as a guru. I guess he had to learn somewhere. I will not incriminate him by giving his name. My big problem now is code daydreaming. It's a good way to pass the time when mowing the lawn, but when I zone out with the wife and kids present it's not so great. I just enjoy working problms over in my head like that, but it does tend to annoy those around me. Log In? Username: Password: What's my password? Create A New User Domain Nodelet? Node Status? node history Node Type: note [id://216877] help Chatterbox? and the web crawler heard nothing... How do I use this? | Other CB clients Other Users? Others imbibing at the Monastery: (5) As of 2022-01-23 11:55 GMT Sections? Information? Find Nodes? Leftovers? Voting Booth? In 2022, my preferred method to securely store passwords is: Results (63 votes). Check out past polls. Notices?
Linked Questions 3 votes 1answer 3k views Is `echo $TEST` expanding an asterisk in the variable a bug? [duplicate] Is this a Bash bug? $ mkdir test && cd test && echo "a" > "some.file" test$ echo '*' * test$ TEST=$(echo '*') test$ echo $TEST some.file Why is the second output the resolution of ... 2 votes 2answers 3k views Why do we double-quote a dollar sign evaluation in Bash? [duplicate] I know single quotes will not evaluate what's inside, and double quotes will. I often see people quote-quote the dollar sign evaluation. Here are some examples: for i in "${indices[@]}"; do if [ "${a}... 6 votes 2answers 247 views Do I need to quote command substitutions when assigning their output to a variable? [duplicate] I tend to quote command substitutions as shown below even when assigning their output to a variable: var="$(command)" Is that actually needed though? When does it break? The accepted answer ... 3 votes 3answers 440 views Enclosing vs. not enclosing a variable's value in quotes in bash [duplicate] When I do something like this: x="hi echo hello" or x='hi echo hello' Then x will contain the string hi echo hello. But when I don't use quotes: x=hi echo hello Then x will contain the string ... 1 vote 3answers 436 views Shell: only double quote on test -n/-z? [duplicate] In case of test -e for example: VAR="<this is a file path: /path/to/file/or/dir" test -e $VAR && do_something || do_anotherthing Question: Should I use "$VAR" here?, here I don't like ... 1 vote 1answer 658 views How can bash aliases be configured to handle spaces in directory names? [duplicate] The alias below works well in zsh when spaces in directory names are \ escaped, but bash doesn't handle them properly. What changes would be required to make them work with bash properly. dum() { ... 1 vote 1answer 499 views How to output comma separated values using IFS="," in shell [duplicate] I have a small script, which does not give comma separated output when IFS is used, but IFS is mandatory as i need it to read many other value. The output of the below script is odi_server1 ... 0 votes 1answer 338 views Bash whois script calling local information with *? [duplicate] I'm getting a very strange output from a script. Here is the line run in the terminal by itself: root@KaliTestBox:~/Desktop/dns1# echo $(whois 13.66.39.88 |head -n 40 |tail -n 28 |tr '\n' ' ') But ... 3 votes 3answers 173 views What situations exist where Bash variables should not be double quoted? [duplicate] I'm aware of several situations where it's unnecessary to use double quotes when expanding a variable in Bash, such as inside [[...]], or when used on the right hand side of a variable assignment. ... 0 votes 1answer 351 views How to escape echo? [duplicate] Edit: I realized that this has nothing to do with $() it's just the result of using echo *. So I just need a way to escape with echo. I'm writing a script that checks what users don't have passwords ... 0 votes 0answers 242 views How can I safely pass an argument containing '{{}}' to a bash script? [duplicate] The following arguments are valid for docker command: docker ps -f"status=exited" --format 'table {{.Names}}' #output: # jovial_hellman # modest_blackwell So I have created this script docker-ps-... 1 vote 1answer 76 views Prevent quote expansion in user-made function [duplicate] I have the following bash function : tg() { git add -A && git commit -m $1 && git push } But it seems not to work : $ tg "create index for users" error: pathspec 'index' did not ... -5 votes 1answer 48 views Why is unquoted $PATH containing whitespaces safe in an assignment? [duplicate] What does the following from https://unix.stackexchange.com/a/154290/674 mean? In general, in shells other than zsh, $PATH outside double quotes breaks when the value contains spaces or other ... 0 votes 1answer 59 views How to copy a file to a path with a space in it in Bash Script? [duplicate] Sample script to copy /tmp/template.txt file to any directory as specified in $1. copy_script.sh if [ $# -eq 0 ]; then echo No Argument echo "Usage: $0 <path>" else cp /tmp/... 0 votes 1answer 33 views Print awk function out to new line everytime [duplicate] part of my code is as below : output=$(cat databaselog | awk '{print $9,$1,$2,$6}' ) echo $output >> savedfile Output will be something like this , saved in a new file called savedfile name1 ... 1 vote 0answers 48 views Is there any point in quoting simple strings? [duplicate] Is there any reason for doing something like: a="abc" or a='abc' The quotes seem completely superfluous, but then there might be some hideous corner case... I'm interested in Bash and Sh in ... 0 votes 1answer 51 views How do I make two echos output to a text file on separate lines [duplicate] So I have a shell script math.sh which takes a number as an argument and echos one added to it and one subtracted from it: #!/bin/bash echo "Add: "$(($1 + 1)) echo "Subtract : "$((... 1 vote 0answers 39 views Should I quote variable when passing to command? [duplicate] I always do this when passing variable to command mkdir -p "$dir_to_make" are those quotes needed? I tried to google but didn't find much. I always write them, just interested if they are necessary. 0 votes 0answers 37 views How to get zsh to not recognize the asterisk in apt-get [duplicate] I am currently on Pop!OS 20.04, and after installing zsh and setting it as my default shell, when installing apps by using apt-get like follows, zsh says no matches found: sudo apt-get install ... 0 votes 0answers 36 views Directories printed instead of */ [duplicate] I have a file like this /* Created by Bla bla bla Copyright by XYZ December 20th, 2020 */ "car" = "Carro"; "door" = "Porta"; I would like to read ... 0 votes 1answer 34 views grep unexpected behavior when [0-9] pattern is given on ubuntu [duplicate] When I use [0-9] pattern to search for all numbers in a file, whether to use or not use single/double quotes around the pattern produces different outputs. $ cat numbers this line has 3 this line has ... 0 votes 0answers 28 views Get immediate folder of file using find (issue with spaces) [duplicate] I'm trying to search my Movies folder to find the immediate folder of the .MKV file I'm searching for. The below works (echo 5) to save the immediate folder as a variable, BUT, it does not work if $... 0 votes 0answers 22 views Save renamed name as variable [duplicate] I am using Gammu for receiving SMS. Once received I am sending them as emails. Yet if sender ID of the SMS contains space, my script is unable to process a file. I.e.: If the file name is ... 0 votes 0answers 19 views Difference between echo $(cal) and echo "$(cal)" [bash] [duplicate] I'm a linux noob. When I type echo $(cal) in bash it prints calendar without any formatting. But when i type echo "$(cal)" it prints the complete formatted calendar. What is the distinction ... 0 votes 0answers 14 views `zsh` and `bash` handle command output differently [duplicate] In zsh: % RESPONSE=$(ping -c 1 raspberrypi4b.local) % echo $RESPONSE | grep "% packet loss" 1 packets transmitted, 1 packets received, 0.0% packet loss But in bash it's different: $ RESPONSE=$(... 0 votes 0answers 11 views Prevent string splitting in argument to readlink [duplicate] I am writing a small script to symbolically link configuration files from my dotfiles directory to another one. I do not have control over the file names and unfortunately one of them is causing me a ... 0 votes 0answers 10 views Directory with spaces in it as a variable [duplicate] I made this script that watches one folder and copies any file added to that folder to another destination. It works as expected when the directories have no spaces. With spaces "~/Untitled ... 1178 votes 12answers 2.8m views How to correctly add a path to PATH? I'm wondering where a new path has to be added to the PATH environment variable. I know this can be accomplished by editing .bashrc (for example), but it's not clear how to do this. This way: export ... 341 votes 6answers 326k views Why does my shell script choke on whitespace or other special characters? Or, an introductory guide to robust filename handling and other string passing in shell scripts. I wrote a shell script which works well most of the time. But it chokes on some inputs (e.g. on some ... 242 votes 3answers 35k views Security implications of forgetting to quote a variable in bash/POSIX shells If you've been following unix.stackexchange.com for a while, you should hopefully know by now that leaving a variable unquoted in list context (as in echo $var) in Bourne/POSIX shells (zsh being the ... 184 votes 5answers 78k views $VAR vs ${VAR} and to quote or not to quote I can write VAR=$VAR1 VAR=${VAR1} VAR="$VAR1" VAR="${VAR1}" the end result to me all seems about the same. Why should I write one or the other? are any of these not portable/POSIX? 174 votes 3answers 146k views Quoting within $(command substitution) in Bash In my Bash environment I use variables containing spaces, and I use these variables within command substitution. What is the correct way to quote my variables? And how should I do it if these are ... 106 votes 4answers 43k views Why does parameter expansion with spaces without quotes work inside double brackets "[[" but not inside single brackets "["? I'm confused with using single or double brackets. Look at this code: dir="/home/mazimi/VirtualBox VMs" if [[ -d ${dir} ]]; then echo "yep" fi It works perfectly although the string contains a ... 56 votes 2answers 16k views Documentation on LESS_TERMCAP_* variables? I see these pretty colors in manpages viewed with less when setting a bunch of these variables. What do they mean, where is the documentation? Is this interpreted by less or termcap? screenshot 26 votes 3answers 51k views Syntax error near unexpected token `fi` I don't necessarily want the answer but if someone could point me to some literature or examples. I would like to figure it out. When I run the script I receive an error: Syntax error near ... 58 votes 1answer 8k views What is the difference between the "...", '...', $'...', and $"..." quotes in the shell? Sometimes I see shell scripts use all of these different ways of quoting some text: "...", '...', $'...', and $"...". Why are there so many different kinds of quote being used? Do ... 23 votes 5answers 3k views Why use double quotes in a [[ ]] test? Let's say we have 2 integers in a bash script: value1=5 value2=3 Then why do we need to use double quotes in case of a test ? For example: if [[ "$value1" -eq "$value2" ]] Why not just use the ... 12 votes 6answers 2k views Too many shebang (script declaration) lines --- any way to reduce their amount? I have a project comprised of about 20 small .sh files. I name these "small" because generally, no file has more than 20 lines of code. I took a modular approach because thus I'm loyal to the Unix ... 9 votes 5answers 30k views Find string while knowing part of it and return string I have a string, for example "Icecream123 AirplaneBCD CompanyTL1 ComputerYU1" Let's say I know that my string will contain for sure the substring IceCream but I don't know what follows it. It might ... 5 votes 7answers 19k views How to compare 2 strings in UNIX shell script? [duplicate] I have a variable which stores a string, the output of a sed command. I want to execute a set of commands only if this string value matches either of the 2 other strings. I used the below code. #! /... 10 votes 2answers 7k views Why are bash tests so picky about whitespace? As a primarily Java programmer, I find the bash if-then construct quite confusing, especially regarding whitespace. Can anyone explain why the first one works, but not the second or third? #works if [... 8 votes 5answers 7k views Script to remove spaces and lowercase in file names I am trying to write a script that will replace spaces with "-" and make all letters lower case for all files in the current directory. for x in 'ls' do if [ ! -f $x ]; then ... 8 votes 3answers 14k views Which is the best way to check return result? I've set a function in a shell script that checks if a folder exists, if it does not exist, tries to created it, and if it can not create the folder (for example if the user does not the right ... 14 votes 2answers 6k views Quoted vs unquoted string expansion for i in $(xrandr); do echo "$i" ; done for i in "$(xrandr)"; do echo "$i"; done for i in "$(xrandr)"; do echo $i; done I understand why 1 differs from 2. But why does 3 give a different output from ... 12 votes 2answers 38k views Zsh: export: not valid in this context When running this script, I run into an error on this line (relevant snippet below): ... _NEW_PATH=$("$_THIS_DIR/conda" ..activate "$@") if (( $? == 0 )); then export PATH=$_NEW_PATH # If ... 6 votes 2answers 13k views bash - True if the length of string is (non)zero? [duplicate] # touch $$ # gzip $$ # gzip --test $$.gz # echo $? 0 # OUT=$(gzip --test $$.gz) # echo $OUT # if [ -z $OUT ] ; then echo $$ ; fi 26521 # if [ -n $OUT ] ; then echo $$ ; fi 26521 # from bash(1) -... 5 votes 1answer 37k views bash: integer expression expected I have a file out.csv I have to check if the name inputed by user exists in the file(comma separated) or not. I am taking name using read but while checking for equality I am getting error ... 4 votes 4answers 10k views Backslash in variable substitution in Bash I was working on a Bash script to help partition a hard drive correctly, and I came across a strange problem where I had to append a number to a variable. It took me a while to get the outcome right ... 7 votes 3answers 3k views Quickest way to move a line in a text file before another line in a text file? I have the line number 55 in a text file which I want to move just before line number 23 in the same text file. I know that you can move lines up by a certain number of lines 1, 2 but is it possible ... 10 votes 4answers 14k views Difference between quoting variables in shell script "if" statements? What is the difference between these two Bash if-statements? e.g. if [ "$FOO" = "true" ]; then vs if [ $FOO = "true" ]; then What is the difference? It seems that both statements work the same. 15 30 50 per page 1 2 3 4 5
A cypovirus VP5 displays the RNA chaperone-like activity that destabilizes RNA helices and accelerates strand annealing Jie Yang, Zhenyun Cheng, Songliu Zhang, Wei Xiong, Hongjie Xia, Yang Qiu, Zhaowei Wang, Feige Wu, Cheng Feng Qin, Lei Yin, Yuanyang Hu, Xi Zhou Research output: Contribution to journalArticlepeer-review 15 Scopus citations Fingerprint Dive into the research topics of 'A cypovirus VP5 displays the RNA chaperone-like activity that destabilizes RNA helices and accelerates strand annealing'. Together they form a unique fingerprint. INIS Keyphrases Medicine and Dentistry Agricultural and Biological Sciences Immunology and Microbiology Biochemistry, Genetics and Molecular Biology
International Journal of Advanced Research in Computer and Communication Engineering A monthly peer-reviewed online and print journal ISSN Online 2278-1021 ISSN Print 2319-5940 Since 2012 Abstract: Creating short summaries of documents is obtaining salient information from an authentic text document. The extracted information is attained as a summarized report and consulted as a concise summary to the user. It is very crucial for us to understand and to describe the content of the text. The extractive summarization technique focuses on choosing how paragraphs, essential sentences, etc., creates the original documents in precise form and presents a summary that only contains parts of the original document. The efficiency of summarization resides in having identifying and presenting the key entities in the document. The proposed system aims at creating an extractive summary of multiple documents and enables us to find the relevance of the contents in those documents. This is enabled with a user interface to pose a query on set of multiple documents and present the most relevant documents in the order. Simple machine learning algorithms are used to perform this and the performance evaluation of the system could help the progress of research activities further to do the same as abstractive summarization using deep neural networks. Keywords: Summarization, Machine Learning, Tokenization, Algorithms, Spacy PDF | DOI: 10.17148/IJARCCE.2020.9327 Open chat Chat with IJARCCE
HOME > 상세정보 상세정보 심폐소생술과 전문심장구조술 둘째판 심폐소생술과 전문심장구조술 둘째판 (9회 대출) 자료유형 단행본 개인저자 황성오 임경수 서명 / 저자사항 심폐소생술과 전문심장구조술 / 황성오 ; 임경수 [공]저. 판사항 둘째판 발행사항 서울 :   군자출판사 ,   2001.   형태사항 x, 329 p. : 삽도 ; 27 cm. 총서사항 응급의료시리즈 ; 5 ISBN 8970892419 8970892400(세트) 일반주기 색인: p. 323-329   000 00660namccc200241 k 4500 001 000045121200 005 20100806033424 007 ta 008 041004s2001 ulka 001a kor 020 ▼a 8970892419 ▼g 94510 020 1 ▼a 8970892400(세트) 040 ▼a 211009 ▼d 211009 ▼d 211010 082 0 4 ▼a 616.1025 ▼2 21 090 ▼a 616.1025 ▼b 2001 100 1 ▼a 황성오 245 1 0 ▼a 심폐소생술과 전문심장구조술 / ▼d 황성오 ; ▼e 임경수 [공]저. 250 ▼a 둘째판 260 ▼a 서울 : ▼b 군자출판사 , ▼c 2001. 300 ▼a x, 329 p. : ▼b 삽도 ; ▼c 27 cm. 440 0 0 ▼a 응급의료시리즈 ; ▼v 5 500 ▼a 색인: p. 323-329 700 1 ▼a 임경수 소장정보 No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스 No. 1 소장처 의학도서관/자료실(3층)/ 청구기호 616.1025 2001 등록번호 131017951 도서상태 대출가능 반납예정일 예약 서비스 B 컨텐츠정보 저자소개 황성오(지은이) <심폐소생술과 전문심장소생술> 정보제공 : Aladin 목차 목차 제1부 심정지와 심폐소생술 제1장 심정지 = 3 1. 심정지의 원인 = 3 2. 급사의 발생빈도와 발생양상 = 6 3. 심정지환자에서 관찰되는 부정맥 = 6 4. 심정지의 발생과정과 조직의 손상 = 8 5. 사망과 과정 = 10 제2장 심폐소생술 = 13 1. 심폐소생술 용어의 정의 = 13 2. 심폐소생술의 단계 = 14 3. 심폐소생술의 원리 = 15 4. 심폐소생술 중 관상동맥관류압과 뇌혈류 = 20 5. 심폐소생술 중 순환상태의 평가 = 21 제3장 기본 인명구조술 = 25 1. 급성 관상동맥 증후군 및 뇌졸중의 조기발견 및 응급치료 = 26 2. 심정지가 의심되는 환자를 발견하였을 때의 조치 = 31 3. 기본 심폐소생술 = 36 4. 소아의 심폐소생술 = 47 5. 심폐소생술의 합병증 = 50 6. 기본 인명구조술에서 자동 제세동기의 사용 = 51 제4장 새로운 심폐소생술 방법 = 57 1. 현재의 심폐소생술을 변형한 방법 = 57 2. 보조기구를 사용하는 심폐소생술 = 60 3. 침습적 시술을 요하는 심폐소생술 = 63 제5장 심폐소생술의 시작과 종료 = 67 1. 개요 = 67 2. 소생가능성의 판단 = 67 3. No-CPR order = 68 4. 심폐소생술의 시작 = 68 5. 심폐소생술의 종료 = 69 6. 심폐소생술 시간과 심폐소생술의 종료 = 69 제6장 심정지환자의 소생에 영향을 주는 요소 = 71 1. 병원이외의 장소에서 심정지가 발생한 환자의 소생에 영향을 주는 요소 = 71 2. 병원내 심정지환자의 소생에 영향을 주는 요소 = 73 3. 우리 나라에서 심정지환자의 소생에 영향을 주는 요소 = 73 제7장 심정지와 소생의 사슬 = 75 1. 개요 = 75 2. 소생의 사슬 = 76 제2부 전문 심장구조술 제8장 심정지환자의 평가 및 응급처치 = 83 1. 심정지환자의 일차 평가 및 심폐소생술 = 84 2. 심정지환자의 이차 평가 및 응급치료 = 85 3. 심정지환자에서 심전도 소견에 따른 치료순서 = 87 4. 심정지로부터 심박동이 회복된 환자의 소생직후 치료 = 95 제9장 심정지의 가능성이 있는 환자의 평가 및 응급처치 = 97 1. 심정지의 가능성이 있는 환자의 일반적인 처료 순서 = 97 2. 서맥의 치료과정 = 98 3. 빈맥의 치료과정 = 100 4. 처혈압, 쇼크 및 급성 폐부종 환자의 치료과정 = 109 제10장 급성 심근경색(급성 관상동맥 증후군)의 응급치료 = 119 1. 개요 = 119 2. 급성 관상동맥증후군의 발생과정 = 120 3. 급성 관상동맥증후군의 심전도 상 분류 및 고위험군의 선별 = 121 4. 심근경색의 진단 = 122 5. 급성심근경색환자에서 응급의료의 역할 = 124 6. 급성관상동맥증후군의 초기 응급치료 = 127 7. 초기 심전도 소견에 따른 급성 관상동맥 증후군의 치료 = 133 8. 급성심근경색환자의 초기 합병증과 치료 = 140 제11장 뇌졸중 = 147 1. 뇌졸중의 임상 증상 = 147 2. 뇌졸중환자의 응급치료 과정 = 148 3. 뇌졸중의 진단을 위한 신경학적 검사 = 148 4. 응급실에서의 진단 및 치료 = 151 제12장 기도유지, 호흡보조 및 산소공급 = 155 1. 기도유지에 사용되는 보조기구 = 155 2. 산소 투여 장치 = 169 3. 인공호흡 장비 = 170 4. 흡입 기구 = 175 제13장 응급을 요하는 부정맥 = 177 1. 개요 = 177 2. 심장의 전기생리와 부정맥 = 178 3. 심전도와 부정맥의 판독 = 181 4. 심전도감시 = 182 5. 주요 부정맥 = 184 제14장 제세동 = 203 1. 조기 제세동의 중요성 = 203 2. 제세동의 원리와 제세동기 = 204 3. 제세동과 경흉저항 = 206 4. 전극의 위치 = 207 5. 제세동 파형, 에너지 및 제세동 방법 = 208 6. 자동 제세동기 = 210 7. 제세동과 연관된 특수상황 = 212 8. 전기적 심조율 전환 = 214 제15장 응급 인공심박조율 = 217 1. 개요 = 217 2. 인공심박조율의 원리 = 218 3. 응급 인공심박조율술의 적응 = 218 4. 응급 인공심박조율술의 금기 = 221 5. 응급 인공심박조율 방법 = 221 제16장 전문 심장구조술 중 투여되는 약물 = 229 1. 개요 = 229 2. 심폐소생술 중 투여되는 약물 = 229 3. 항부정맥제 = 239 4. 심근수축력 및 혈압 조절을 위하여 투여되는 약물 = 248 5. 폐부종 치료약물 = 260 제17장 특수 질환과 연관된 심정지= 263 1. 저체온증에 의한 심정지 = 263 2. 익수에 의한 심정지 = 267 3. 감전에 의한 심정지 = 270 4. 낙뢰에 의한 심정지 = 272 5. 임신중의 심정지 = 273 6. 외상에 의한 심정지 = 274 제18장 심정지로부터 소생된 환자의 치료 = 275 1. 심정지로부터 소생된 환자의 치료 목적 = 275 2. 심박조율이 회복된 직후의 치료 = 275 3. 중환자실에서의 치료 = 276 4. 소생 후 뇌증과 뇌소생술 = 278 5. 심정지의 재발 방지 = 283 제19장 심폐소생술 중 약물투여방법과 정맥로 = 285 1. 심폐소생술 중 약물투여방법 = 285 2. 응급환자에서 정맥로 확보의 원칙 = 287 3. 정맥주사용 주사바늘 또는 카데터 = 288 4. 말초정맥 천자술 = 290 5. 중심정맥 천자술 = 291 제20장 혈역학적 감시 = 299 1. 개요 = 299 2. 순환상태에 영향을 주는 요소 = 299 3. 동맥 내 삽관술 = 301 4. 동맥천자 = 307 5. 폐동맥 도자 삽관 = 307 제21장 심낭 천자술, 심장 내 주사 = 313 1. 심장압전과 심낭 천자술 = 313 2. 심장 내 주사 = 316 제22장 전문 심장구조술 팀의 구성과 운영 = 319 1. 전문 심장구조술 팀의 구성 = 319 2. 전문 심장구조술 팀장의 역할 = 319 3. 전문 심장구조술 팀 요원의 역할 = 320 관련분야 신착자료
Take the 2-minute tour × Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free. we are trying to setup gunicorn + plone. It works well so far, but fails to handle errors (404, 500 etc) and throws 'Internal Server Error' while it should return plone's error page. Example case of requesting a page that doesn't exist is pasted below. The question is how should gunicorn be setup so that errors are handled themselves by zope/plone, as other requests? Cheers and regards ==> var/log/gunicorn-stdout---supervisor-JhaTfg.log <== 2012-05-24 01:41:16 [15137] [ERROR] Error handling request Traceback (most recent call last): File "/home/user/testing/eggs/gunicorn-0.14.3-py2.6.egg/gunicorn/workers/sync.py", line 100, in handle_request respiter = self.wsgi(environ, resp.start_response) File "/home/user/testing/eggs/repoze.retry-1.0-py2.6.egg/repoze/retry/__init__.py", line 90, in __call__ app_iter = self.application(environ, replace_start_response) File "/home/user/testing/eggs/repoze.tm2-1.0b2-py2.6.egg/repoze/tm/__init__.py", line 24, in __call__ result = self.application(environ, save_status_and_headers) File "/home/user/testing/eggs/repoze.vhm-0.14-py2.6.egg/repoze/vhm/middleware.py", line 106, in __call__ return self.application(environ, start_response) File "/home/user/testing/eggs/Zope2-2.13.13-py2.6.egg/ZPublisher/WSGIPublisher.py", line 255, in publish_module response = _publish(request, 'Zope2') File "/home/user/testing/eggs/Zope2-2.13.13-py2.6.egg/ZPublisher/WSGIPublisher.py", line 185, in publish object = request.traverse(path, validated_hook=validated_hook) File "/home/user/testing/eggs/Zope2-2.13.13-py2.6.egg/ZPublisher/BaseRequest.py", line 518, in traverse return response.notFoundError(URL) File "/home/user/testing/eggs/Zope2-2.13.13-py2.6.egg/ZPublisher/HTTPResponse.py", line 718, in notFoundError "<p><b>Resource:</b> %s</p>" % escape(entry)) NotFound: <h2>Site Error</h2> <p>An error was encountered while publishing this resource. </p> share|improve this question 1 Answer 1 On my question I forgot to mention that we are using WSGI Zope and gunicorn. In our scenario, we patched ZPublisher/WSGIPublisher.py to properly handle NotFound exceptions (404), instead of throwing 500 Internal Server Error. Turns up that Zope + Wsgi is still not so mature (at least on error handling). share|improve this answer      you can and should edit your question instead of adding an answer –  Claudiu Aug 16 '12 at 20:28 Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
CN103702726B - Toy is built system, is produced the method and data handling system that build instruction - Google Patents Toy is built system, is produced the method and data handling system that build instruction Download PDF Info Publication number CN103702726B CN103702726B CN201280036537.2A CN201280036537A CN103702726B CN 103702726 B CN103702726 B CN 103702726B CN 201280036537 A CN201280036537 A CN 201280036537A CN 103702726 B CN103702726 B CN 103702726B Authority CN China Prior art keywords toy built model build image Prior art date Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.) Active Application number CN201280036537.2A Other languages Chinese (zh) Other versions CN103702726A (en Inventor S.穆斯亚拉 H.J.范比克 N.D.A.谷扬 F.拉索恩 M.H.詹森 Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.) Lego AS Original Assignee Lego AS Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.) Filing date Publication date Family has litigation Priority to DKPA201170255 priority Critical Priority to DKPA201170255 priority Application filed by Lego AS filed Critical Lego AS Priority to PCT/EP2012/059471 priority patent/WO2012160057A1/en Publication of CN103702726A publication Critical patent/CN103702726A/en Application granted granted Critical Publication of CN103702726B publication Critical patent/CN103702726B/en First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=46124379&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN103702726(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License. Active legal-status Critical Current Anticipated expiration legal-status Critical Links Classifications • GPHYSICS • G06COMPUTING; CALCULATING; COUNTING • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL • G06T19/00Manipulating 3D models or images for computer graphics • AHUMAN NECESSITIES • A63SPORTS; GAMES; AMUSEMENTS • A63HTOYS, e.g. TOPS, DOLLS, HOOPS OR BUILDING BLOCKS • A63H33/00Other toys • A63H33/04Building blocks, strips, or similar building parts • A63H33/042Mechanical, electrical, optical, pneumatic or hydraulic arrangements; Motors • AHUMAN NECESSITIES • A63SPORTS; GAMES; AMUSEMENTS • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR • A63F9/00Games not otherwise provided for • A63F9/24Electric games; Games using electronic circuits not otherwise provided for • AHUMAN NECESSITIES • A63SPORTS; GAMES; AMUSEMENTS • A63HTOYS, e.g. TOPS, DOLLS, HOOPS OR BUILDING BLOCKS • A63H33/00Other toys • A63H33/04Building blocks, strips, or similar building parts • AHUMAN NECESSITIES • A63SPORTS; GAMES; AMUSEMENTS • A63HTOYS, e.g. TOPS, DOLLS, HOOPS OR BUILDING BLOCKS • A63H33/00Other toys • A63H33/04Building blocks, strips, or similar building parts • A63H33/06Building blocks, strips, or similar building parts to be assembled without the use of additional elements • GPHYSICS • G06COMPUTING; CALCULATING; COUNTING • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL • G06T19/00Manipulating 3D models or images for computer graphics • G06T19/20Editing of 3D images, e.g. changing shapes or colours, aligning objects or positioning parts • AHUMAN NECESSITIES • A63SPORTS; GAMES; AMUSEMENTS • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR • A63F9/00Games not otherwise provided for • A63F9/24Electric games; Games using electronic circuits not otherwise provided for • A63F2009/2448Output devices • A63F2009/245Output devices visual • A63F2009/2457Display screens, e.g. monitors, video displays • A63F2009/246Computer generated or synthesized image • AHUMAN NECESSITIES • A63SPORTS; GAMES; AMUSEMENTS • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR • A63F2250/00Miscellaneous game characteristics • A63F2250/28Miscellaneous game characteristics with a two-dimensional real image • A63F2250/287Cameras therefor • GPHYSICS • G06COMPUTING; CALCULATING; COUNTING • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL • G06T2219/00Indexing scheme for manipulating 3D models or images for computer graphics • G06T2219/20Indexing scheme for editing of 3D models • G06T2219/2008Assembling, disassembling Abstract System built by a kind of toy, comprises one group of toy building elements with coupling device, and described coupling device is used for the toy building elements that interconnects releasedly; And data handling system, comprise image capture device, processing apparatus, display device, wherein data handling system is suitable for processing captured image, builds position and the orientation of model with at least detecting portion toy; Identify that user is to one group of selection of to build in element at least one subsequently, each building element and can be connected to part toy and build model subsequently; Build detected position and the orientation of model in response to part toy, described display device shows synthetic image, and described synthetic image comprises captured image, and it is had at least stacked by the image institute of building element subsequently selected. Description Toy is built system, is produced the method and data handling system that build instruction Technical field The present invention relates to the generation of the structure instruction of building model for toy. Background technology The physics that there is various known type builds the modelling principle of playset.Especially, use modularization or semi-modular principle to be popular, because it provides interesting and have the game experiencing of challenge.Usually, what these principles provided one group of preproduction builds element, and it can be interconnected amongst one another with some predetermined ways according to the module of pre-fabricated components.Pre-fabricated components can be similar to the well-known object being suitable for concrete model task.Thus, such as, in the structure of house model, element can similar pieces of wall, roof tiles, door and window.The object of selectors is in like fashion, and compared with will manufacturing new model each time and all will limit the situation of all details in house, the work relevant to building house model greatly reduces.But the structure freely completing house or another object needs the simplicity for building model to weigh. Such as, the toy of LEGO is built group and is comprised and multiplely dissimilar interchangeablely build element, and it has the coupling device of protuberance and corresponding cavity format.Coupling device is arranged according to regular grid pattern, allows the interconnection of building between element of various kind thus. Usually, such toy is built group and is comprised one group and build element, and it is applicable to be formed one or morely builds component models, such as animal, robot or, another biology, car, aircraft, spaceship, building etc.Usually, build structure instruction or assembling instruction that group comprises printing further, which show and how to make a certain model with building element establishment. Usually, toy is built the structure instruction comprised in group and is comprised a series of pictures, shows length by length and how to build element and order thereof to model increase.The advantage that this structure instruction has is that they are easy to follow, even for not having toy to build group experience and/or not having the child of reading skill to be also suitable for. But the shortcoming that such structure instruction has is that they are time-consuming and manufacture expensive.Usually, be used for being formed and build the model of instruction and be broken down into rational construction step and each construction step is drawn subsequently and finally printed in CAD system. Recently, build instruction Electronically to have produced instead of printing form.Specifically, be lively structure instruction, wherein more complicated construction step is vivo shown.But still Problems existing how to enlighten children to form oneself model by different way or group built by reconstruction model toy, increases the play value that group built by toy thus. Summary of the invention Disclosed herein is the embodiment that system built by toy, it comprises one group of toy building elements with coupling device, for being interconnected by toy building elements releasedly.The embodiment that system built by toy comprises data handling system, and comprise image capture device, processing apparatus, display device, wherein data handling system is suitable for -catch the image that model built by the part toy built by the subgroup of toy building elements; -process the image of catching, build position and the orientation of model with at least detecting portion toy; -identify that user is to one group of selection of to build in element at least one subsequently, each building element and can be connected to part toy and build model subsequently; -detected position and the orientation of model is built in response to part toy, described display device shows synthetic image, and described synthetic image comprises captured image, and it is stacked that it is had the image institute of building element subsequently at least selected. Therefore, user is provided the image of the department pattern built so far, and is provided and limits one or more selection of building element subsequently from one group of possible optional building subsequently element, and namely one group is optionally continued the selection of scheme.Therefore, element of building subsequently can be optionally build element subsequently. Because of this increase user can some possible quantity of building path, and or even the quantity of toy models that obtains, allow various different structure to experience thus. Due to the selection of systems axiol-ogy user, and at least show and built element (its current portions that is added to builds the captured image of model) subsequently by what select, and the position of the detection of current portions model and orientation are responded, system can provide clear and the instruction easily followed for user, and provides the instruction of building element subsequently how selecting to connect. In certain embodiments, data handling system is operable as and shows synthetic image on described display device, described synthetic image comprises captured image, its build relative to part toy the position of model and orientation place (this position and orientation corresponding to be connected to part toy build described in model build element subsequently) by least by select build subsequently the image of element overlap. In certain embodiments, data handling system is operable as the numbers show that acquisition part builds model; With, in response to the numbers show obtained, show one group of corresponding image building element subsequently, such as, be stacked with one group of synthetic image building the captured image of element image subsequently by display.The example of numbers show comprises indications or other the suitable data structures that model built by mark or identification division toy. Data handling system can be operating as builds the numbers show of model from part toy and selects to produce the part toy upgraded from the user identified and build the numbers show of model.Therefore, select based on the corresponding user building element subsequently detected, what data handling system can determine that user followed builds path, thus user according to the structure instruction shown by data handling system by select build subsequently element be connected to current portions build model time, identify which subsequent section toy user has arrived and builds model.Thus, the numbers show that acquisition part builds model can comprise from before part toy build model and from before the numbers show selected of user to determine or the numbers show of model built by generating portion toy. In certain embodiments, data handling system can be suitable for from described numbers show and from represent the data structure of building multiple orders of step determine a kind of subsequently build element, each order is formed in one group of of optionally building in model group, described in build model and can build with described one group of toy building elements.In certain embodiments, numbers show can be included in data structure.Such as, data structure can be any suitable data tree structure, such as represent the guiding figure of non-circulating type, comprise node and edge, wherein model built by each node on behalf toy, and one or more connections of building element subsequently of model built by each edge representative part toy that can be connected to representated by first node connecting the first and second nodes, to arrive (part) toy building elements representated by Section Point. In certain embodiments, process capturing video builds position and the orientation of model with at least detecting portion toy, comprise and detect at least one augmented reality (AR) mark, and determine that toy builds position and the orientation of model from least one augmented reality mark detected. Data handling system is operable as and identifies that user selects in a multitude of different ways.Such as, user can provide user by suitable user input and select, such as, clicked by the fixed-point apparatus that computer mouse is such or click on the show image building element subsequently.Alternatively or additionally, in certain embodiments, process capturing video comprise identify that at least one adds build element; And data handling system can be suitable for building element from the described interpolation be identified determines that user selects.Therefore, the physics of selection can be built element and is connected to physical piece and builds model by user simply subsequently.Data handling system detect which subsequently build element be added to model time, data handling system can determine will to be exactly by one that selects by the element of building subsequently selected.In certain embodiments, what data handling system can detect interpolation further builds elements relative builds model position and/or orientation in part toy. In certain embodiments, identify that the element of building that at least one adds comprises the augmented reality mark detecting and be included in and add and build in element. The present invention can implement by different way, comprise toy described above and as described below and build system, data handling system, method and further product device, its each have and build one or more advantages described in system for the toy first described, and each has the one or more preferred embodiments corresponding to and build preferred embodiment disclosed in system and/or claim for the toy first described. Specifically, the feature of method as herein described can perform in data handling system or other processing apparatus with implement software, and other processing apparatus described are performed by computer executable instructions.Instruction can be loaded in the program code in memory such as RAM, its from storage medium come or from another computer via computer network.Alternatively, described feature can replace software to be implemented by hardware circuit, or with the combination of software. Correspondingly, the invention further relates to data handling system, it is suitable for performing method described above and as described below.The invention further relates to computer program, it comprises program code, for performing the institute of method described above and as described below when described program is run on computers in steps.The invention further relates to computer program, it comprises program code, for performing the institute of method described above and as described below when described program is run on computers in steps.Program code can store on a computer-readable medium and/or be embodied as data-signal. Accompanying drawing explanation Aspect of the present invention will more completely be described for preferred embodiment with reference to accompanying drawing, wherein: Fig. 1 a-d each show the toy building block of prior art, Fig. 2 shows the embodiment of computer system disclosed herein. Fig. 3 shows the process of the structure instruction step of model is built in display embodiment flow chart for toy. Fig. 4 shows the embodiment of data structure, and it builds multiple replacement orders of building step of the build process of model for building toy for digitally showing. Fig. 5 shows the example of the display part viewing area of computer system disclosed herein. Fig. 6 shows the toy building elements of toy building block form. Fig. 7 shows mark and builds element and how to be connected to another toy building elements that model built by toy. Fig. 8 a-g shows the example that compound token builds element. Fig. 9 a-b shows the example that system built by the toy limiting structure grid. Detailed description of the invention The toy building elements by reference to form being block describes by the various aspects that the embodiment of system built by toy disclosed herein.But, the present invention can be applied to be used in toy build in group other formed build element. Fig. 1 a-d each show the toy building block of prior art, its cavity 102 that there is connection protruded stigma 105 over the top surface and extend to from bottom block.Fig. 1 a-b shows the top side of toy building block, and Fig. 1 b shows the bottom side of same toy building block.Fig. 1 c-d shows the example of the similar toy building block with different size.Cavity has mesotube 103, and the connection protruded stigma of another block can be received in cavity and formed be frictionally engaged, disclosed in US3005282.Structure block shown in all the other figure can have the coupling device of this known type, and it is the protruded stigma of cooperation and the form of cavity.But, also can use the coupling device of other types.Connecting protruded stigma is arranged in the grid of square-shaped planar, and namely limit orthogonal direction, a series of connection protruded stigma is arranged along described orthogonal direction.Usually, this layout of connection element allows toy block relative to each other with more discontinuous orientation interconnection, relative to each other at a right angle specifically.Should be understood that other geometrical arrangements of connection element can cause different orientation restrictions.Such as, connection element can be arranged in leg-of-mutton regular grid, allows to build element and is placed on another structure element with three kinds of different orientations. Usually, coupling device can comprise connection element, and it can be grouped into dissimilar connection element, such as connector, receiver and hybrid element.Connector is the connection element that can be received by another receiving element building element, provides the connection of building between element thus.Such as, connector can be assemblied between the part of another element, is assembled to hole medium.Receiving element is such connection element, and it can receive the connector that another builds element.Hybrid element is the parts that not only can be used as receiving element but also can be used as connector, usually depends on that other build the type of the cooperation Connection Element of element. Fig. 1 illustrates building element and can obtaining with trade name LEGO of type, and it has many shapes, size and color.And then such element of building can be used for various different connection element.Should be understood that above-mentioned element of building is only the possible example building element. Fig. 2 shows the schematic diagram of the example of computer system.Computer system comprises suitable programmed computer 15 and display part 1.Computer can be personal computer, desktop computer, notebook, handheld computer, game console, handheld entertainment device or any other can be suitable for programme computer.Display part 1 is incorporated into computer 15 or is otherwise operatively connected to computer 15, and is operable as display video image under the control of computer 15. Should be understood that computer can comprise or otherwise be connected to further peripheral device, such as keyboard 3, mouse 2 or other fixed-point apparatus, such as touch pad, trackball, light pen, touch screen etc. Computer system is suitable for helping to perform as in augmented reality system as herein described.For this reason, computer 15 comprises or is otherwise operatively connected to video frequency pick-up head 5.Video frequency pick-up head 5 is operable as the video image of capturing ambient, and wherein video frequency pick-up head is such as positioned at the visual field 7, and the described visual field comprises the observable surf zone 8 on 4 (such as desktop, floors etc.), surface.Therefore observable surf zone 8 is visual field projections on the surface 4 of video frequency pick-up head.Video frequency pick-up head is operable as the processing unit captured video image being sent to computer 15, such as, via the suitable input interface of computer 15.Such as, video frequency pick-up head can be the IP Camera being connected to or being incorporated into computer 15.In the example of Fig. 2, video frequency pick-up head is positioned on camera support portion 6, and it is tripod such as, camera is supported on the predetermined height higher than surface 4. Here, the video image of video frequency pick-up head 5 capturing ambient 8, wherein video frequency pick-up head is in place and send captured video image to computer 15 in this environment 8.Such as, the environment at video frequency pick-up head place can comprise toy and builds model 10.Except model 10 built by toy, environment can comprise object further, as family's object, toy etc. Computer image is produced on display part 1 by computer 15 subsequently.Therefore, user can allow toy build model 10 and move around the visual field of video frequency pick-up head 5 and/or otherwise operate toy wherein and build model, and observes real-time video from the video frequency pick-up head 5 that model built by toy.Alternatively or additionally, user can change position and/or the orientation of video frequency pick-up head, to catch from diverse location the image that model (such as static) built by toy.In addition, computer is operable as and is stored on the storage means by captured video image, the hard disk of such as computer, and/or captured video is sent to another computer, such as, via computer network.Such as, computer can be operating as and captured video image is uploaded to website. Computer 15 is suitably programmed, run to build in instruction mode at augmented reality, computer performs image processing on captured video image in this mode, so that the one or more predetermined augmented reality mark detected in captured video image or label.At least in response to detected AR mark (one or more), computer can be programmed to mutagenic video image, such as video image is formed to be stacked with the captured video image of the image that computer produces, or the image that produced by computer of a part for wherein captured video image the video image replaced.Computer 15 is operable as and shows reformed video image on display part 1.For purposes of illustration, it is functional that computer is operable as execution AR, and it is operatively connected to video frequency pick-up head, and display part also will be called as AR system. For detecting AR mark and for the image treatment method of mutagenic video image is known in the art and (such as sees " ARToolKitPiusforPoseTrackingonMobileDevices " of DanielWagner and DieterSchmalstieg in response to the detection AR of quilt marks, omputerVisionWinterWorkshop2007, MichaelGrabner, HelmutGrabner (eds.), St.Lambrecht, Austria, February6-8, GrazTechnicalUniversity). In the example in figure 2, physics toy is built model 10 and is comprised toy building elements 9, is connected to mark to it and builds element 11.Mark builds the mark that element 11 has two-dimentional machine readable code form over the top surface. Computer 15 is operable as the existence detecting two-dimentional machine readable code in captured image.And then computer 15 can determine that two-dimentional machine readable code is relative to the relative position of video frequency pick-up head 5 position and orientation. Thus, computer 15 can revise the captured image that model built by toy, makes the video image 12 of the change of display on display part 1.In this example embodiment, picture elements 14a and 14b that produce of the machine as calculated of the image display toy of the change captured image 13 and the captured image of superposition of building model.Computer is to build detected position and the determined position of orientation of the AR mark of element 11 and to be oriented in video image 12 picture elements producing computer and produce from mark. When in the view field 8 of user at video frequency pick-up head, model 10 built by operating physical toy, such as, by allowing physical model move and/or rotating, the mark that physics toy followed the trail of by computer 5 builds position and the orientation of the mark of element 11.Real-time video feedback (mirror image pattern) of computer 15 display video camera on display part 1, and in response to the detected position identified and orientation, augmented reality special efficacy is increased to real-time video feedback. As will be such as hereinafter described in detail, computer 15 can be suitable for the image showing optional toy building elements 14a and 14b respectively, and it can add toy to and build model 10.User can select optionally to build in element thus, and is built element by increasing by what select and revise physics toy and build model 10. Fig. 3 shows the embodiment of the process of the structure instruction step of model is built in display flow chart for toy.This process by the AR system be suitably programmed, such as, can be performed by the computer 15 of system shown in Figure 2.At initial step S1, this process receives the input of the starting point representing build process.Such as, starting point department pattern, the base plate that model will be built thereon of building before can being or or even do not have to arrange and build the empty constructing environment of the parts of group.Such as, process can receive such input, and its form is suitable user's input, and the user of such as some possible starting points selects.Alternatively or additionally, process can receive the input of the image form of being caught by AR system video camera.In such embodiments, process can process captured image, to determine starting point.Such as, base plate or one or the other toy building elements can be positioned in the visual field of camera 5 by user.When base plate or other toy building elements comprise AR mark (or other suitable detectable visual properties), AR system can detect AR mark, and the information relevant from the type of the information extraction and the base plate that are embedded in AR mark or toy building elements.The input received also can comprise and will build the relevant information of model (one or more) by built toy.Such as, information can comprise mark, and it identifies that toy is built model and will be built group from the toy of its construction, or identifies and will build model by built one or more toys. Process continues in step S2, to detect the starting point of building model as current portions toy subsequently.Be appreciated that current portions toy is built model and can not be comprised toy and build the toy building elements of group or comprise toy building elements described in one or several from foregoing description. In step S2, process determines the quantity of the possible continuation mode of build process based on the current state (namely model built by current portions toy) of build process.Specifically, process determines one group of optional toy building elements from toy building elements group, and it can be added to current portions toy and build model.Such as, this judgement can be based on suitable data structure, and it builds model for given part toy, represents and can add the group that the possible follow-up toy building elements of model built by described part toy to.The embodiment of this data structure is hereafter describing with reference to Fig. 4.If the number of options determined is zero, namely there is no continuation scheme possible further, then procedure ends; Or process proceeds to step S3. In step S3, process provides the option determined for user, and such as, by the image of the optional toy building elements of display, described optional toy building elements can be added to model in next step, such as shown in Figure 5.In certain embodiments, where the corresponding optional toy building elements of the further indicating user of system should be added to current portions toy and build model.Such as, AR system can show combination image, the captured image of model built by described combination image display current portions toy, simultaneously corresponding optional toy building elements image is building respective orientation and the position superposition of model relative to part toy, indicate optional toy building elements to be coupled to the relevant position that model built by current portions toy.If two or more in optional toy building elements should be added in same position (or lap position), then AR system can such as show placeholder at relevant position and near placeholder, show optional toy building elements.Alternatively, AR system can show optional toy building elements at relevant position place one at a time, such as, by the optional toy building elements of circulation, and by each display predetermined time section. In step S4 subsequently, process determines that user selects in the option provided.Such as, AR system can receive and represent to provide in option and selected that user to input.Such as, each shown image optionally building element can correspond to the effective element (activeelement) of the graphic user interface of AR system display, thus effective element can be activated, such as, by clicking with computer mouse, build element to select this thereon.In one embodiment, outward appearance is changed by the element of building selected.Such as, built element can change color, texture by what select, etc.; By display by the bounding box building component ambient selected, it can be highlighted, etc. Alternatively, AR system can be operating as and builds the image of model by the toy of process AR system acquisition and identify and add the physics toy building elements that model built by current portions toy to.If the display of AR system responses optional toy building elements in step S3 and identify and be added to the toy building elements that is added that model built by current portions toy, if build model corresponding to one of them selectable option provided in step S3 with the toy that is added be identified, then AR system determines that user have selected described selectable option.If the toy building elements be added does not correspond to any selectable option provided, then process such as can proceed with suitable error message.In certain embodiments, process can be determined the position of the toy building elements be added further and determine its orientation alternatively, and it represents that extra toy building elements is added to model. At step S5 subsequently, model built by the toy that the displaying that current toy can be built model in response to the selection detected by process is updated to subsequently.Such as, AR system can upgrade to build in the data structure of model identification at toy and show pointer or the indicator that model built by current toy, builds model with the toy pointed to subsequently.Alternatively, AR system can select show image feature in response to the user detected, and the video image of the captured image of model built by the toy be such as applied.Such as, the toy building elements of selection added to user before model built by current portions toy user to select to be inputted by user and in detected embodiment, AR system can be built element and how should be connected to current portions by what select and build model with the display of the form of such as animation.Alternatively or additionally, AR system can show animated stories line, wherein story continue depend on that user selects. Subsequently, process turns back to step S2, the part toy of renewal is built model and builds model as new current portions toy, the part toy wherein upgraded build model from before the current portions toy of iterative process build model and obtained by the toy building elements selected by adding. Fig. 4 shows the embodiment of data structure, and it builds the multiple optional order of building step of the build process of model for building toy for digitally showing. In one embodiment, data structure 401 has the form of tree construction, and it illustrates in fig .4.Tree construction has multiple node and edge, wherein each node on behalf toy builds model and each edge conjunction two nodes and step is built in representative, the model conversion of building representated by one of them node (predecessor node) is built model representated by Section Point (descendant node).Tree construction comprises at least one root node 411, and it does not have any predecessor node and representative builds the starting point of sequence thus.Similarly, tree construction comprises one or more leaf node 412, and it is without any descendant node, and each representative toy is built the corresponding toy that group builds and built model.Should be understood that tree construction can have one or more root node and one or more leaf node.Each nonleaf node represents part toy thus and builds model, and it can be converted into one or several optional (part) toy subsequently and build model, as described in nonleaf node descendant node representated by.Each n omicronn-leaf pattern can have one or several descendant node thus.Tree construction can represent non-circulating type guiding figure thus.Tree construction represents multiplely builds path thus each is built path and is connected with a leaf node by a root node.Should understand and build path and can have different length. Data structure can comprise one or more data record, and described data record comprises world model's parameter, and it is relevant with the whole model group of building built according to Build Order.The example of this model parameter comprises the program version number, date created etc. of model name, model creation person's name, modular applications. Model data structures 401 comprises multiple MARG structure further, and each is relevant in the edge of tree construction.For the simple object of display, only show in this MARG structure 403, it is relevant to edge 413.However, it should be understood that, other edges have the corresponding data structure relevant to them.Each MARG record represents one or more toy building elements (such as its list), its each representated by toy building elements data record.Each toy building elements data record can have the structure shown by data record 404, for " building element B " that Fig. 4 b shows. Specifically, each is built component data record 404 and can comprise and build element ID405, shows the mark corresponding to building component type.Preferably, build element ID and represent the performance of building element or the type of building element uniquely. Build component data record to comprise further and multiplely build component attributes 406, one or more attributes of element are built in its instruction, such as color, texture, decoration etc. And then build component data record 404 and can comprise data item 407 and 408, it represents position and the orientation of the intrinsic coordinates system of building element respectively.Build the position of element and orientation to be defined relative to the orientation of global coordinate system by intrinsic coordinates system relative to the coordinate of global coordinate system by the initial point of building the intrinsic coordinates system of element. And then build component data record 404 and can comprise data item 409, one or more borders of element are built in its representative. Should be understood that numbers show can according to predetermined modularization descriptive language with any suitable data or file format coding, such as binary file, as text etc.For storing the example of the data format of the virtual structure model comprising coordinate system level at US patent No.6,389, open in 375. Based on such data structure, build the Computerized procedures of instruction can determine based on the information relevant with given starting point multiplely optionally to build step subsequently for providing.Specifically, process can determine in tree construction correspond to starting point (such as root node 41) node and by follow-up to starting point and its edge be connected.Each edge represents optional later step in building process, such as, optionally build element (or building element group).When the information that the selection that process reception user does in selectable option is relevant, process can determine corresponding descendant node in tree construction.Process can proceed until process reaches leaf node subsequently iteratively.In the example in fig. 4, form the example building path to be illustrated by heavy line 414.In this example embodiment, starting point is root node 411 and builds path to stop at leaf node 412.In the first iteration, process identification is respectively by edge 415a, 415b, 415c that root node 411 and its three descendant nodes 416a, 416b, 416c are connected.If user selects edge 415a, then process proceeds to node 416a.Should be understood that some nodes can only have single descendant node, namely only can there is single route forward and do not replace selection further during some stages of build process.Similarly, some nodes can have more than one predecessor node, and reflecting multiple path of building can build in model and be formed at same (part) toy. Fig. 5 shows the example of the display part viewing area of computer system disclosed herein (system of such as Fig. 2), is usually masked as 501.Computer system (not specifically illustrating in Figure 5) shows the image of being caught by the video frequency pick-up head (not specifically illustrating in Figure 5) of computer system.In this example embodiment, image comprises the image that model 510 built by the physics toy being arranged in camera view.In this example embodiment, toy is built model 510 and is built on the top of base plate 521, and the part in house is built from one or more toy building elements, such as, be similar to the element shown in Fig. 1, it has connection protruded stigma 525 over the top surface, allows to build connecting of element with other.However, it should be understood that, model built by toy can be any other model structure or do not have with base plate. In this example embodiment, base plate comprises some AR mark 524 being distributed in base plate perimeter.Each AR mark comprises unique mark, allows AR system identification toy to build position and the orientation of model, and regardless of its relative position relative to camera or orientation.In this example embodiment, AR mark 524 has the form of 2D bar code or similar matrix code, and they comprise bounding box, and described bounding box provides one group of line intersected, and allows AR systems axiol-ogy mark and its position and orientation.But, as mentioned below, dissimilar AR mark can be used.In certain embodiments, one or more toy building elements (build toy with it and build model 510) can or replace the mark of the AR in base plate except the AR mark in base plate and comprise AR mark. In the example of fig. 5, computer system has three of determining and optionally continues path, can proceed toy build building of model 510 according to this user.Thus, the optional accordingly image building element 514a, 514b, 514c of the capturing video image superposition of model 510, the image that such as computer produces are built in computer system display.Optionally building element by when adding at the same position place of model, the computer that computer system shows placeholder 515 in addition produces image, the form of such as bounding box, which show relative to model structure 510 where each optionally builds element will be added.Such as, computer system can from be included in represent described model data structure (data tree structure of such as Fig. 4) the size of corresponding information determination placeholder.Similarly, computer system can from being included in the information of the data structure representing described model and determining from the position of the model structure 510 detected by computer system and orientation optionally to build element and/or the placeholder tram relative to phantom images.Such as, computer system can process captured image to detect AR mark.From detected AR mark, computer system can the position of suitable coordinate system of Confirming model.The example of this coordinate system is shown as the coordinate system 526 of Fig. 5, but the coordinate system so determined is not must be shown by system.Computer system can determine optional position and orientation of building element and/or placeholder from the position relative to model coordinate systems model data structures and orientation information subsequently. Fig. 6 and 7 show schematically show the example of toy building elements, and it comprises AR mark, contributes to by AR systems axiol-ogy toy building elements.For purposes of illustration, this element of building comprising AR mark is called as mark and builds element. Fig. 6 shows the toy building elements of toy building block 611 form of the structure block being similar to Fig. 1 c, namely builds the connection protruded stigma 605 in the plane square grid that block comprises on the top surface being arranged in toy building block.Toy building block is also included in one or more cavitys (not shown in Fig. 6) of its lower surface, for receiving the connection protruded stigma building block with another similar toy that is frictionally engaged.Toy building block comprises the augmented reality mark 621 of 2D bar code form on its lateral surface. Should be understood that other forms of AR mark can replace 2D bar code to use.Usually, AR mark can be any object, and it relatively easily uses known image recognition method and is automatically distinguished in captured video image.When using image recognition method to detect AR mark, AR mark can be such as three-dimensional body, such as cube or cylinder, or it can be two-dimensional marker, such as square or circular.Usually, AR mark comprises the pattern being easy to distinguish, such as black and white square, but additive method also may be used for mark identification, such as, use concrete color or color pattern (patternofcolours) etc. AR mark can comprise one or more element, allows position and/or the orientation of COMPUTER DETECTION AR mark.Such as, AR mark can comprise two or more lines intersected.Additionally or alternatively, AR marks the vision element that can comprise for encoding to information, thus allow computer recognizing and distinguish dissimilar mark and optionally produce in response to the mark of particular type computer produce image. AR mark can be arranged in an uniform manner relative to coupling device, is namely arranged into the connection protruded stigma on top surface and/or the connection cavity in bottom.Such as, AR mark can limit the direction parallel or orthogonal with the plane grid limited by coupling device.This makes tag block interchangeable, and in the toy structure built at the block described in Fig. 1 and 6, several tag block uses interchangeably, and concrete tag block can be used in several structure.The toy system of building can comprise several such tag blocks, and it has the different marks putting on it and makes computer system produce different computer generation images.But if all tag blocks comprise mark in consistent position, then such tag block can easily be replaced in the toy building structure built with structure block as herein described.And then AR system can use the AR of this consistent location to mark, to determine exactly to build elements relative in the position of the coordinate system limited by coupling device and orientation.Therefore, AR system can build based on the detected AR mark and detecting building element that element has been added to existing (part) model, the element of building of which kind of type has been added and has built element and is added in the where relative to existing model. Identify be positioned in a part that mark builds the surface of element thus the surface portion comprising mark does not have any coupling device time, mark be unlikely coupled to that marker builds element other build element and inadvertently stop.Marker builds element can comprise multiple mark, such as on the not coplanar of toy building elements (or in the different piece on surface). Fig. 7 shows mark and builds element and how to be connected to another toy building elements that model built by toy.In this example embodiment, toy is built model and is comprised toy building elements 710 and 712 and mark builds element 711.Fig. 7 a shows and respectively builds element, and Fig. 7 b shows and is connected to the mark building element 710 releasedly and builds element 711.For this reason, toy building elements 40 comprises connection protruded stigma 705 over the top surface, as shown in the syndeton for Fig. 1.Mark is built element 704 and is comprised cavity (not shown in the figure 7) in its lower surface, allows it to be frictionally engaged to and connects protruded stigma 704. Therefore, the mark comprising AR mark can be built element and be connected to the toy models built by user, to contribute to detecting and confirm that the mark added builds element.Based on detection, AR system can be determined to add to the possible of model and build element subsequently, and is presented at the image of element subsequently of captured image of the model that to be added to relative to the correct position of model capturing video.In the example of fig. 6, the mark that mark builds element 711 is positioned at the mark not comprising connection element and builds on the surface of element. Fig. 8 a-g shows the example that compound token builds element, and namely multiple mark is built element and directly or indirectly by the coupling device that system built by toy is connected to each other, such as, with predetermined spatial relationship each other.Usually, the mark of compound is built element and is allowed user to form the different objects of large group, and each is by an identification in a large amount of unique AR mark.Specifically, a large amount of unique AR marks can build the relatively limited group formation of element with each mark, because significantly can be increased the total amount of combinatory possibility by the mark compared with group of constructing system.Such as, AR system can be built in element and identifies that multiple part is built one (or subgroup) in model from being included in the part compound token built model. Fig. 8 a shows the example building the proper manners model that element is built with three marks, and namely element 811 is as the head of model, and element 812 is as the trunk of model, and element 813 is as the leg of model.Build element and be set to that there is connection element, allow head and leg to be connected to trunk releasedly.Head, trunk and leg can comprise mark, the form of the feature closely of the facial characteristics of such as head and trunk and/or leg.When being provided to the video frequency pick-up head of AR system, AR system can by the feature 821,822,823 of respectively detection head, trunk and leg the feature of detection head, trunk and leg thus, such as schematically illustrate in figure 8b.Therefore, by different heads, trunk and leg being combined, the combination of the AR mark of numerous species can be formed.Be determined by the model of AR systems axiol-ogy, response made by the image that AR system can be formed with different computers, allows many interactions thus. Fig. 8 c with d shows similar compound token and builds element, and it is built with the toy building block shown in Fig. 1 c.Toy building block 831,832 and 833 has different colors, such as, be respectively red, white and blue.Stacking on top of each other and by its corresponding coupling device interconnection time, build block and limit colour sequential, it can pass through AR systems axiol-ogy.By changing the order of color, as Fig. 8 d illustrates, different unique compound AR mark can only with three kinds not isolabeling build element formation. Fig. 8 e shows the similar example of compound token element, comprises the toy building block 841,842,843 be similar to shown in Fig. 6, and it has and marks on its lateral surface, and it is the form of mark. Fig. 8 f-g shows another example of compound token element.In this example embodiment, compound token element comprises base portion and builds block 850, such as, be similar to the block of 1c, but have more connection element over the top surface.Compound token element comprises the mark being connected to base portion structure block 850 further and builds element 851,852,853.Therefore, in this example embodiment, mark is built element 851,852 and 853 and is indirectly coupled to each other with rigid construction, to form compound token building element.For this reason, mark is built element and is had connection element on its bottom face, such as cavity, and it can be bonded on base portion and build corresponding connection element on the top surface of block 850, such as protruded stigma.Each mark is built element and is had mark over the top surface, is Roman character in this example embodiment.Mark build element be arranged side by side time, they are defined through the sequence of the detectable mark of AR system. As illustrated in fig.8g, the mark that mark builds element can limit orientation in the planes, and each identification element can relative to each other rotate, AR system increases the free degree limiting multiple code thus further, because can detect the orientation that corresponding AR marked relative to each other and/or built relative to toy another feature of model. Therefore, in the example of fig. 8, each mark is built element (each comprise mark build element visually detectable different feature from other) and is interconnected by its connection element, so that restriction visually can detect the sequence of feature.Each different sequence that visually can detect feature can limit compound AR mark thus.Such as, respectively visually detectable feature can be code sign by AR systems axiol-ogy, and the sequence of detected symbol can pass through AR system decodes, to obtain the information of being encoded by symbol sebolic addressing.In certain embodiments, system can use known error-detecting and/or error correcting technology, resists metrical error for the formation of code robustness. Fig. 9 a-b shows the example that system built by the toy limiting structure grid. Fig. 9 a display toy building elements is connected the perspective view of grid accordingly with it.Toy building elements 901 has the top surface 902 of band eight protrusion 903a-h, the lower surface with corresponding hole (not shown) and side 904.In fig. 9 a, the connection grid 905 and 906 of top surface and lower surface is shown respectively.Mesh point is illustrated by the circle represented by circle 907a-k.Therefore, mesh point 907a-h corresponds respectively to protrusion 903a-h.Because side surface 904 does not have any Connection Element, so do not need to limit for them to connect grid. As visible from Fig. 9 a, in the storing of regular grid, the certain restriction of imparting is put to the physics of Connection Element by the Connection Element being placed in the toy building elements that mesh point limits.Grid 905 is arranged in the plane of the top surface of toy building elements, and protrusion 903 extends from this top surface.In the example of Fig. 9 a, mesh point is placed in square net, and wherein each square has the 5x5 unit of random length unit (LU).Therefore, in this geometrical construction, Connection Element is also placed on corresponding square net, and the distance of building in the plane of element between Connection Element is the multiple of 10LU.In the example of Fig. 9 a, upper surface and the lower surface of building element are rectangle and have the size of 20LUx40LU, and the spaced apart 10LU of adjacent connection elements.On the other hand, in the vertical direction, the spaced apart 12LU of Connection Element.Therefore under different dimensions, size of mesh opening can change.Relative to the position of the intrinsic coordinates system 908 restriction tie point of toy building elements.By limit build element about world model's coordinate system (with thus, its intrinsic coordinates system) position and orientation, the position of Connection Element relative to model coordinate systems can be limited. Fig. 9 b shows the 3D regular grid of model coordinate systems, and wherein each mesh point of grid defines the active position that Connection Element in model built by toy.Usually should understand is not that all mesh points of grid in fact all need to be inserted by connection element; But all connection elements are positioned on the mesh point of regular grid in certain embodiments.Specifically, in the example of Fig. 9 b, mesh point is arranged in parallel plane 801a-d, and the mesh point in its midplane limits the position of Connection Element on one or more toy surface Distance between parallel plane limits the distance of building between element surface with connection element.Such as, in certain embodiments, the height that element has the spacing (or being its integral multiple) of two adjacent planes equaling grid is built. When system specialization regular grid built by toy, AR mark is determined by AR grid exactly relative to the position of grid and/or orientation.And then trace labelling (it is attached to the structure element in the grid of constructing system) provides about how identification elements uses more information in a model.If label is correctly built (being namely assemblied in grid), the event in application can optionally be triggered. AR mark can thus in response to AR mark to make AR system start to be formed the optional computer building element subsequently that can add model to produce picture elements relative to the precalculated position of grid and/or orientation (and/or other position limitation conditions).How AR application can be used in constructing system to physical component is thus made a response. Claims (25) 1. system built by a toy, comprise one group of toy building elements and data handling system with coupling device, described coupling device is used for the toy building elements that interconnects releasedly, described data handling system comprises image capture device, processing apparatus and display device, and wherein data handling system is suitable for Catch the image that model built by the part toy built with the sub-component of described toy building elements; The image that process is captured, builds position and the orientation of model with at least detecting portion toy; Identify that user selects, described user selects indicating user to one group of selection of to build in element at least one subsequently, each building element and can be connected to part toy and build model subsequently; Build detected position and the orientation of model in response to part toy, described display device shows synthetic image, and described synthetic image comprises captured image, and this captured Image overlaying has at least by the image building element subsequently selected. 2. system built by toy as claimed in claim 1, and wherein data handling system is further adapted for and obtains the numbers show that model built by part toy; Numbers show with in response to acquisition, shows one group of corresponding image building element subsequently. 3. system built by toy as claimed in claim 2, wherein obtains the numbers show that part toy builds model and comprises, from before part toy build model numbers show and from before user select generating portion toy to build the numbers show of model. 4. as claimed in claim 2 or claim 3 system built by toy, and wherein numbers show comprises each and builds elements relative in the relevant position coordinate of preset coordinates system. 5. system built by toy as claimed in claim 1, and wherein data handling system is further adapted for and builds the numbers show of model from part toy and select to produce the numbers show that model built by the part toy upgraded from the user identified. 6. system built by toy as claimed in claim 1, wherein data handling system be further adapted for from part toy build model numbers show and from represent the data structure of building multiple orders of step determine one group subsequently build element, each order forms one group of of optionally building in model, described in build model and can build with described one group of toy building elements. 7. system built by toy as claimed in claim 1, wherein process captured image and build position and the orientation of model with at least detecting portion toy, comprise, detect at least one augmented reality mark and determine that toy builds position and the orientation of model from least one augmented reality mark detected. 8. system built by toy as claimed in claim 1, wherein process captured image comprise identify that at least one is added build element; With build element from being added of being identified and determine that user selects. 9. system built by toy as claimed in claim 8, wherein identifies that the element of building that at least one is added comprises the augmented reality mark built in element detecting and be included in and be added. 10. as claimed in claim 8 or 9 system built by toy, wherein data handling system be further adapted for identify be added build elements relative builds model position and orientation in part toy. System built by 11. toys as claimed in claim 1, wherein data handling system is further adapted for, detected position and the orientation of model is built in response to the user's selection identified and part toy, described display device shows synthetic image, described synthetic image comprises captured image, and described captured image is superimposed with the image that at least one extra computer produces. System built by 12. toys as claimed in claim 1, wherein said one group of toy building elements comprises one or more mark and builds element, described mark is built element and is comprised described coupling device, and described mark builds element, and each has by the discernible visual appearance of image processing device. System built by 13. toys as claimed in claim 12, comprises at least two marks and builds element, and wherein two marks are built element and are connected to each other releasedly via its corresponding coupling device, to form compound token element. System built by 14. toys as claimed in claim 13, wherein data handling system is further adapted for and detects compound token element, select with based on user described in detected compound token component recognition, described user selects to represent that user is to described one group of selection of to build in element at least one subsequently. System built by 15. toys as claimed in claim 14, and wherein each mark is built element and comprised mark, and described mark represents the code sign of the code for coded message; Wherein data handling system is further adapted for and determines by the code sign group of encoding from the visual appearance of compound token element, and the code sign group decoding that will determine, to obtain the information of decoding. System built by toy according to any one of 16. claims 12 to 15, wherein toy building elements has at least one character, each mark that wherein system built by toy builds the value that element has described character, and described value is selected from predetermined group of the discrete value of described character. System built by toy according to any one of 17. claims 12 to 15, and wherein coupling device is arranged in and defines in one or more regular planar grids of closure; Wherein each mark is built element and is comprised mark, mark build element be connected to toy build at least one other toy building elements of system time, from being parallel to the direction of at least one plane grid or described mark can being seen from the direction perpendicular at least one plane grid. System built by 18. toys as claimed in claim 17, and wherein each mark is built element and had top surface, lower surface and at least one side surface; Wherein said coupling device is placed at least one of top and lower surface; Wherein mark is built element and is comprised the first surface that at least one does not have coupling device, and wherein first surface comprises described mark. System built by 19. toys as claimed in claim 1, wherein coupling device restrictive rule grid, toy is built the position of toy building elements in model and/or orientation and is restricted to discontinuous position relative to described regular grid and/or discontinuous orientation by described grid. System built by 20. toys as claimed in claim 19, comprise at least two marks and build element, and wherein data handling system is suitable for detecting two marks building in model of toy and builds elements relative in the relevant position of described regular grid and/or orientation, and select based on user described in the relevant position detected and/or orientation identification, described user selects to represent that user is to described one group of selection of to build in element at least one subsequently. System built by 21. toys as claimed in claim 20, the grid position of regular image grid is determined in the detected position that wherein data handling system is suitable for building element from mark, and produces in the position relative to detected regular image grid the image feature that computer produces image. System built by 22. toys as claimed in claim 1, and wherein coupling device comprises one or more protuberance and one or more cavity, and each cavity is suitable for being frictionally engaged and receives at least one protuberance. 23. 1 kinds for generation of the computer-implemented method building instruction, described structure instruction is used for building toy with the toy building elements that system built by toy and builds model, and toy building elements comprises for releasedly by coupling device that toy building elements interconnects; Method comprises: Catch the image that model built by the part toy built by the subgroup of described toy building elements; The image that process is captured, builds position and the orientation of model with at least detecting portion toy; Identify that user is to one group of selection of at least one of building in element subsequently, each building element and can be connected to part toy and build model subsequently; Build detected position and the orientation of model in response to part toy, display device shows synthetic image, and described synthetic image comprises captured image, and described captured Image overlaying has at least by the image building element subsequently selected. 24. 1 kinds of data handling systems, comprise image capture device, processing apparatus, display device, wherein data handling system comprises computer programming device, and it is configured so that when being performed by data handling system, and described data handling system performs the step of method as claimed in claim 23. Group built by 25. 1 kinds of toys, comprises toy building elements, and this is built element and comprises coupling device, and described coupling device is used for being interconnected by toy building elements releasedly; And user instruction, for installing on a data processing system, described data handling system comprises image capture device, processing apparatus and display device and computer program, this computer program comprises program code device, and it is suitable for making described data handling system perform the step of method as claimed in claim 23 when being performed by data handling system. CN201280036537.2A 2011-05-23 2012-05-22 Toy is built system, is produced the method and data handling system that build instruction Active CN103702726B (en) Priority Applications (3) Application Number Priority Date Filing Date Title DKPA201170255 2011-05-23 DKPA201170255 2011-05-23 PCT/EP2012/059471 WO2012160057A1 (en) 2011-05-23 2012-05-22 Generation of building instructions for construction element models Publications (2) Publication Number Publication Date CN103702726A CN103702726A (en) 2014-04-02 CN103702726B true CN103702726B (en) 2016-01-13 Family ID=46124379 Family Applications (1) Application Number Title Priority Date Filing Date CN201280036537.2A Active CN103702726B (en) 2011-05-23 2012-05-22 Toy is built system, is produced the method and data handling system that build instruction Country Status (13) Country Link US (1) US9821242B2 (en) EP (1) EP2714223B1 (en) JP (1) JP6113718B2 (en) KR (1) KR101897311B1 (en) CN (1) CN103702726B (en) BR (1) BR112013030077B1 (en) CA (1) CA2836505C (en) DK (1) DK2714223T3 (en) ES (1) ES2544303T3 (en) HK (1) HK1192187A1 (en) MX (1) MX2013013544A (en) PL (1) PL2714223T3 (en) WO (1) WO2012160057A1 (en) Families Citing this family (24) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US8754886B2 (en) 2008-12-29 2014-06-17 Intel Corporation Systems and methods for transporting physical objects from real physical life into virtual worlds US20120304059A1 (en) * 2011-05-24 2012-11-29 Microsoft Corporation Interactive Build Instructions KR101391582B1 (en) * 2013-06-05 2014-05-07 (주)캡보이트레이딩 Block and toy decoration cap WO2015111261A1 (en) 2014-01-21 2015-07-30 株式会社ソニー・コンピュータエンタテインメント Information processing device and information processing method JP6193135B2 (en) 2014-01-21 2017-09-06 株式会社ソニー・インタラクティブエンタテインメント Information processing apparatus, information processing system, and information processing method JP6027554B2 (en) 2014-01-21 2016-11-16 株式会社ソニー・インタラクティブエンタテインメント Information processing apparatus, information processing system, block system, and information processing method US10089772B2 (en) 2015-04-23 2018-10-02 Hasbro, Inc. Context-aware digital play US9947140B2 (en) * 2015-09-15 2018-04-17 Sartorius Stedim Biotech Gmbh Connection method, visualization system and computer program product US10552550B2 (en) * 2015-09-26 2020-02-04 Intel Corporation Technologies for physical programming CN105413198B (en) * 2015-11-06 2017-08-25 大连新锐天地传媒有限公司 AR children's early education modular systems US10275222B2 (en) 2016-03-15 2019-04-30 Intel Corporation Technologies for physical programming US10353916B2 (en) * 2016-03-25 2019-07-16 Bentley Systems, Incorporated Techniques for conversion of CAD descriptions WO2017194439A1 (en) * 2016-05-09 2017-11-16 Lego A/S System and method for toy recognition CN105915635B (en) * 2016-06-03 2019-01-08 杭州小丸子电子商务有限公司 Magnetic plate toy assembly builds skill developing and training system and method US10074205B2 (en) 2016-08-30 2018-09-11 Intel Corporation Machine creation of program with frame analysis method and apparatus JP6980990B2 (en) * 2016-08-31 2021-12-15 ソニーグループ株式会社 Information processing systems, information processing methods, and programs US10890897B2 (en) 2017-09-26 2021-01-12 International Business Machines Corporation Assembly of a modular structure TWI639458B (en) * 2018-01-25 2018-11-01 智高實業股份有限公司 Multifunctional building block wheel set USD844394S1 (en) 2018-03-29 2019-04-02 Kraft Foods Group Brands Llc Mold US10894342B2 (en) 2018-03-29 2021-01-19 Kraft Foods Group Brands Llc System and method for molding comestible building blocks KR102215118B1 (en) * 2018-12-11 2021-02-09 최재영 Method for providing augmented reality contents using play item and server using the same CN113382790A (en) * 2019-01-23 2021-09-10 乐高公司 Toy system for augmented reality CN113382789A (en) * 2019-01-31 2021-09-10 乐高公司 Toy construction system with functional construction elements WO2020206313A1 (en) 2019-04-03 2020-10-08 Magic Leap, Inc. Managing and displaying webpages in a virtual three-dimensional space with a mixed reality system Citations (4) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title DE10006834A1 (en) * 2000-02-16 2001-08-23 Joachim Schwarz Construction kit has electronic data medium containing data for representation of arrangements of components of kit on screen CN1791850A (en) * 2003-05-20 2006-06-21 英特莱格公司 Method and system for manipulating a digital representation of a three-dimensional object CN101802490A (en) * 2007-05-28 2010-08-11 株式会社斯特拉阿斯 Assembled block and display system CN101896239A (en) * 2007-10-11 2010-11-24 乐高公司 A toy construction system Family Cites Families (33) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title US3005282A (en) 1958-01-28 1961-10-24 Interlego Ag Toy building brick US3670941A (en) 1970-03-02 1972-06-20 Fred I Grinnell Retractable guard and guide for nailer US3670942A (en) 1970-10-15 1972-06-20 Omark Industries Inc Automatic feeding of fasteners DK154964C (en) * 1986-01-22 1989-05-29 Lego As TOYS BUILDING ELEMENT WITH ELEMENTS FOR PROVIDING POSITION INFORMATION US5724074A (en) 1995-02-06 1998-03-03 Microsoft Corporation Method and system for graphically programming mobile toys US5867166A (en) * 1995-08-04 1999-02-02 Microsoft Corporation Method and system for generating images using Gsprites US6389375B1 (en) 1999-01-22 2002-05-14 Interlego Ag Virtual reality modelling US6741245B1 (en) 1999-04-23 2004-05-25 Mitsubishi Electric Research Laboratories, Inc. Method for decorating a virtual model US7502759B2 (en) 1999-08-30 2009-03-10 Digimarc Corporation Digital watermarking methods and related toy and game applications US20020127944A1 (en) * 2000-07-20 2002-09-12 Donald Spector Construction kit for custom toys or other personalized products JP2002159019A (en) 2000-11-16 2002-05-31 Canon Inc Display control device, imaging position estimating device, display system, image pickup system, image positioning method, imaging position estimating method, and recording medium recorded with process program US20020196250A1 (en) 2001-06-20 2002-12-26 Gateway, Inc. Parts assembly for virtual representation and content creation WO2004066200A2 (en) * 2003-01-17 2004-08-05 Yeda Research And Development Co. Ltd. Reactive animation US7596473B2 (en) * 2003-05-20 2009-09-29 Interlego Ag Method of constructing a virtual construction model JP4085918B2 (en) 2003-07-18 2008-05-14 ソニー株式会社 3D model processing apparatus, 3D model processing method, and computer program CN1993712A (en) * 2004-06-17 2007-07-04 英特莱格公司 Automatic generation of building instructions for building block models JP2006040045A (en) 2004-07-28 2006-02-09 Sony Corp Information processor, cubic object, information processing system and information processing method JP2007034981A (en) 2005-07-29 2007-02-08 Canon Inc Image processing system, and image processing device WO2008107021A1 (en) 2007-03-08 2008-09-12 Siemens Aktiengesellschaft Method and device for generating tracking configurations for augmented reality applications US7979251B2 (en) * 2007-03-16 2011-07-12 Lego A/S Automatic generation of building instructions for building element models US8374829B2 (en) * 2007-03-16 2013-02-12 Lego A/S Automatic generation of building instructions for building element models US20090029771A1 (en) 2007-07-25 2009-01-29 Mega Brands International, S.A.R.L. Interactive story builder US20090197678A1 (en) 2008-02-04 2009-08-06 Chung-Jen Huang Pretend play toy with reality and virtual interaction EP2157545A1 (en) 2008-08-19 2010-02-24 Sony Computer Entertainment Europe Limited Entertainment device, system and method US9824495B2 (en) 2008-09-11 2017-11-21 Apple Inc. Method and system for compositing an augmented reality scene US8894461B2 (en) 2008-10-20 2014-11-25 Eyecue Vision Technologies Ltd. System and method for interactive toys based on recognition and tracking of pre-programmed accessories US8754886B2 (en) * 2008-12-29 2014-06-17 Intel Corporation Systems and methods for transporting physical objects from real physical life into virtual worlds GB2470073B (en) 2009-05-08 2011-08-24 Sony Comp Entertainment Europe Entertainment device, system and method GB2470072B (en) 2009-05-08 2014-01-01 Sony Comp Entertainment Europe Entertainment device,system and method US8418085B2 (en) * 2009-05-29 2013-04-09 Microsoft Corporation Gesture coach EP2445600A1 (en) 2009-06-25 2012-05-02 ZYX Play APS A game system comprising a number of building elements EP2462537A1 (en) 2009-08-04 2012-06-13 Eyecue Vision Technologies Ltd. System and method for object extraction US20110065496A1 (en) 2009-09-11 2011-03-17 Wms Gaming, Inc. Augmented reality mechanism for wagering game systems Patent Citations (4) * Cited by examiner, † Cited by third party Publication number Priority date Publication date Assignee Title DE10006834A1 (en) * 2000-02-16 2001-08-23 Joachim Schwarz Construction kit has electronic data medium containing data for representation of arrangements of components of kit on screen CN1791850A (en) * 2003-05-20 2006-06-21 英特莱格公司 Method and system for manipulating a digital representation of a three-dimensional object CN101802490A (en) * 2007-05-28 2010-08-11 株式会社斯特拉阿斯 Assembled block and display system CN101896239A (en) * 2007-10-11 2010-11-24 乐高公司 A toy construction system Also Published As Publication number Publication date KR20140043903A (en) 2014-04-11 ES2544303T3 (en) 2015-08-28 MX2013013544A (en) 2014-05-27 EP2714223B1 (en) 2015-07-01 DK2714223T3 (en) 2015-09-14 BR112013030077A2 (en) 2017-06-20 BR112013030077B1 (en) 2021-03-23 US20140378022A1 (en) 2014-12-25 WO2012160057A1 (en) 2012-11-29 JP6113718B2 (en) 2017-04-12 EP2714223A1 (en) 2014-04-09 JP2014515962A (en) 2014-07-07 HK1192187A1 (en) 2014-08-15 CN103702726A (en) 2014-04-02 KR101897311B1 (en) 2018-10-24 CA2836505A1 (en) 2012-11-29 US9821242B2 (en) 2017-11-21 CA2836505C (en) 2018-10-30 PL2714223T3 (en) 2015-10-30 Similar Documents Publication Publication Date Title CN103702726B (en) Toy is built system, is produced the method and data handling system that build instruction US20220105440A1 (en) Toy construction system for augmented reality JP4418468B2 (en) Method and system for manipulating a digital representation of a three-dimensional object CN108136257B (en) Method for creating virtual game environment and interactive game system using the same JP2008502960A (en) Automatic creation of assembly instructions for assembly block models CN102782728A (en) Connectivity depended geometry optimization for real-time rendering CN109069929A (en) System and method for toy identification WO2017029279A2 (en) Method of creating a virtual game environment and interactive game system employing the method Legal Events Date Code Title Description C06 Publication PB01 Publication C10 Entry into substantive examination SE01 Entry into force of request for substantive examination REG Reference to a national code Ref country code: HK Ref legal event code: DE Ref document number: 1192187 Country of ref document: HK C14 Grant of patent or utility model GR01 Patent grant REG Reference to a national code Ref country code: HK Ref legal event code: GR Ref document number: 1192187 Country of ref document: HK
HOMEPRODUCTSSERVICESCOMPANYCONTACTFAQResearchDictionaryPharmaMobileSign Up FREE or Login Ro-23-9424 fused compound containing fleroxacin combined with desacetylcefotaxime; active against gram-positive bacteria Also Known As: Ro 23-9424 Networked: 5 relevant articles (1 outcomes, 1 trials/studies) Relationship Network Bio-Agent Context: Research Results Related Diseases 1. Infection 04/01/1992 - "The MIC for 90% of isolates (MIC90) of Pseudomonas aeruginosa was 16.0 micrograms/ml. All group A and B streptococci were inhibited by less than or equal to 0.25 micrograms/ml, and 90% of group G streptococci and Streptococcus pneumoniae were inhibited by 1.0 micrograms/ml. All methicillin-susceptible strains of Staphylococcus aureus and 60% of methicillin-resistant strains were susceptible to 2.0 micrograms of Ro 23-9424 per ml, whereas the MIC90 for Staphylococcus epidermidis and Staphylococcus hominis isolates was 4.0 micrograms/ml. Staphylococcus haemolyticus and Enterococcus spp. were less susceptible; MIC90s for them were 16.0 and 32.0 micrograms/ml. Ro 23-9424 has a broad antibacterial spectrum and potential utility for therapy of infections in cancer patients." 01/01/1990 - "In the control normal (immunocompetent) mouse infection, Ro 23-9424 was 3-fold more active than cefotaxime, but 10-fold less active than fleroxacin." 01/01/1990 - "Ro 23-9424 demonstrated significant activity against all strains tested in systemic infections, including those strains resistant in vivo to cefotaxime (Staphylococcus aureus 753, Serratia marcescens SM and Pseudomonas aeruginosa 8780) and fleroxacin (Streptococcus pneumoniae 6301 and Streptococcus pyogenes. " 03/01/1989 - "A novel fused co-drug of fleroxacin and desacetyl-cefotaxime, Ro 23-9424, was 100% effective against these Gram-positive pathogens at less than or equal to 8 micrograms/ml. Several of these compounds should receive consideration for clinical trials for empiric therapy among neutropenic patient infections where Gram-positive pathogens may be more prevalent." 2. Pneumonia (Pneumonitis) 3. Neoplasms (Cancer) 4. Necrosis 5. Body Weight (Weight, Body) Related Drugs and Biologics 1. Fleroxacin 2. Cefotaxime (Kendrick) 3. Carbon Monoxide 4. Tumor Necrosis Factor-alpha (Tumor Necrosis Factor) 5. Methicillin (Metin) 6. Ciprofloxacin (Cipro) 7. Ceftazidime (Fortum) 8. Cefoperazone (Cefoperazone Sodium)
[ News ] [ Download ] [ Installation ] [ Usage ] [ Mail to developer ] _____ _ / ____| (_) _ _| | ___ _ _ __ ___ | | | | | / __| | '_ ` _ \ | |_| | |____\__ \ | | | | | | \ ._,_|\_____|___/_|_| |_| |_| | | |_| Software simulator for microcontrollers μCsim can be used to simulate microcontrollers. It supports MCS51 family, AVR core, Z80, HC08, ST7, STM8, TLCS90, XA51 and Padauk. It can run on Linux, Windows, OSX, BSD, and other systems. See what's new in current version. Download There are two places where you can download μCsim from: 1. SDCC homepage. μCsim is part of the SDCC (Small Device C Compiler) project. You can download source of SDCC and precompiled binaries from http://sdcc.sf.net. 2. μCsim site. Standalone source package is available on the μCsim web site: http://mazsola.iit.uni-miskolc.hu/ucsim/download How to install UNIX version is distributed in source. 1. Get archive file, uncompress and untar it. These steps will produce a directory ucsim-X.Y.Z where X.Y.Z is the version number. 2. Make sure, that following packages are installed on your system: make, bison (or yacc), flex (or lex), libncurses-dev. You will need a C and a C++ compiler as well. 3. Go to the directory and configure the package. Issue configure command. It will determine your system and produce Makefile. Installation directory can be specified with --prefix=dir option to the configure. Default directory is /usr/local. Executable file will be placed in bin subdirectory. 4. Compile the package with make command. 5. Install executables ucsim_51, ucsim_avr, ucsim_hc08, ucsim_xa, ucsim_z80, etc. to any directory you want. It can be done with make install command which will place files in installation directory specified with --prefix=dir option of configure. Note that you may have to have special privilege to do this if installation directory is not writable by you. How to use Features of the simulator Microcontroller specific features Developers © 1997,99 Dániel Drótos, Talker Bt. drdani@mazsola.iit.uni-miskolc.hu
test your astronomical awareness Download Skip this Video Download Presentation Test Your Astronomical Awareness Loading in 2 Seconds... play fullscreen 1 / 24 - PowerPoint PPT Presentation • 247 Views • Uploaded on Test Your Astronomical Awareness. No Pressure!. Here’s a series of astronomical questions, with no marks at stake – just for fun!. Summer Heat. 1. The Seasons. The Earth\'s orbit is not quite a perfect circle. (That much is indeed true.) loader I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described. capcha Download Presentation PowerPoint Slideshow about '' - victoria An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - Presentation Transcript no pressure No Pressure! Here’s a series of astronomical questions, with no marks at stake – just for fun! 1 the seasons 1. The Seasons The Earth\'s orbit is not quite a perfect circle. (That much is indeed true.) Consider this claim: summer occurs and the hottest days of the year are in July because that is when the Earth is closest to the sun. A: True or B: False? 2 black holes 2. Black Holes If the sun were to become a black hole, the Earth and all the other planets in the Solar System would be sucked into it. A: True or B:False? 3 weightlessness 3. Weightlessness An astronaut in the Space Shuttle feels weightless because he or she is beyond the Earth\'s gravity. A: True or B:False? 4 lunar phases 4. Lunar Phases The moon goes through its phases (new, crescent, full, etc) because of the different amount of the Earth\'s shadow which falls on it from time to time. A: True or B:False? 5 the flat earth 5. The Flat Earth Until the time of Columbus, it was believed by almost all learned people that the world was flat. A: True or B:False? 6 the full moon 6. The Full Moon The full moon is measurably larger when it is close to the horizon, smaller when it is overhead. A: True or B:False? 7 moving water 7. Moving Water If you pull the plug in an ordinary sink full of water, or flush a toilet, it will drain out while circulating (swirling) in one direction in the Northern Hemisphere. Water in the identical sink or toilet would swirl in the other direction in the Southern Hemisphere. A: True or B:False? 8 the spinning earth 8. The Spinning Earth If the Earth were to gradually slow down its rotation (spin) and come to a complete stop, we would all go floating off into space. A: True or B:False? 9 upside down 9. Upside-Down From Australia, the moon appears to be upside-down relative to the way we see it. A: True or B:False? ad
1 Since the first option is the right one when fixing a common misspelling. Is there a way to make ispell-word correct the spelling of a word to the first suggestion instead of prompting from a list of options? 1 There may be other ways of achieving that, but if you use flyspell then it has flyspell-auto-correct-previous-word which does just that. It's bound to C-; by default. flyspell will put a wavy red line under spelling errors and so pressing C-; will have a go at correcting the first one before the current point, so you don't even need to move the point onto the misspelled word. Works very nicely for me when I'm writing text in Org-mode, but I assume it works in any mode. 1 • While this is a good answer, I'm using wcheck, not flyspell - because it can show all incorrect, visible words, not just while I'm editing. I've found a way to do this only with ispell, using cl-letf. Added own answer. – ideasman42 Feb 16 '20 at 3:03 0 This can be done by overriding the function that prompts for input. This function runs ispell-word, always using the first option. (defun ispell-word-immediate () "Run `ispell-word', using the first suggestion." (interactive) (cl-letf (((symbol-function 'ispell-command-loop) (lambda (miss _guess _word _start _end) (car miss)))) (ispell-word))) In the case you want to one of the other available options, it's possible to cycle through the options. Although the code needed is more involved. (defmacro ispell-word-immediate--with-messages-as-list (message-list &rest body) "Run BODY adding any message call to the MESSAGE-LIST list." (declare (indent 1)) ` (let ((temp-message-list (list))) (cl-letf (((symbol-function 'message) (lambda (&rest args) ;; Only check if non-null because this is a signal not to log at all. (when message-log-max (push (apply 'format-message args) temp-message-list))))) (unwind-protect (progn ,@body) ;; Protected. (setq ,message-list (append ,message-list (reverse temp-message-list))))))) (defvar-local ispell-word-immediate--alist nil "Internal properties for repeated `ispell-word-immediate'") (defun ispell-word-immediate--impl (cycle-direction) "Run `ispell-word', using the first suggestion. Argument CYCLE-DIRECTION The offset for cycling words, 1 or -1 for forward/backward." (let ((message-list (list)) (index 0) (point-init (point)) (display-text nil)) ;; Roll-back and cycle through corrections. (when (and ispell-word-immediate--alist (or (eq last-command 'ispell-word-immediate-forward) (eq last-command 'ispell-word-immediate-backward))) ;; Roll-back correction. (let ((alist ispell-word-immediate--alist)) ;; Roll back the edit. (delete-region (alist-get 'start alist) (alist-get 'end alist)) (insert (alist-get 'word alist)) ;; Update vars from previous state. (setq point-init (alist-get 'point alist)) (setq index (+ cycle-direction (cdr (assq 'index alist)))) ;; Roll back the buffer state. (setq buffer-undo-list (alist-get 'buffer-undo-list alist)) (setq pending-undo-list (alist-get 'pending-undo-list alist)) (goto-char point-init))) ;; Clear every time, ensures stale data is never used. (setq ispell-word-immediate--alist nil) (cl-letf (((symbol-function 'ispell-command-loop) (lambda (miss _guess word start end) ;; Wrap around in either direction. (setq index (mod index (length miss))) (let ((word-at-index (nth index miss))) ;; Generate display text. (setq display-text (string-join (mapcar (lambda (word-iter) (if (eq word-at-index word-iter) (format "[%s]" (propertize word-iter 'face 'match)) (format " %s " word-iter))) miss) "")) ;; Set the state for redoing the correction. (setq ispell-word-immediate--alist (list ;; Tricky! but nicer usability. (cons 'buffer-undo-list buffer-undo-list) (cons 'pending-undo-list pending-undo-list) (cons 'point point-init) (cons 'index index) (cons 'word word) (cons 'start (marker-position start)) (cons 'end (+ (marker-position end) (- (length word-at-index) (length word)))))) word-at-index)))) ;; Run quietly so message output doesn't flicker. (prog1 (ispell-word-immediate--with-messages-as-list message-list (ispell-word)) ;; Log the message, only display if we don't have 'display-text' ;; This avoids flickering message output. (let ((inhibit-message (not (null display-text)))) (dolist (message-text message-list) (message "%s" message-text))) ;; Run last so we can ensure it's the last text in the message buffer. ;; Don't log because it's not useful to keep the selection. (when display-text (let ((message-log-max nil)) (message "%s" display-text))))))) ;; Public functions. (defun ispell-word-immediate-forward () "Run `ispell-word', using the first suggestion, or cycle forward." (interactive) (ispell-word-immediate--impl 1)) (defun ispell-word-immediate-backward () "Run `ispell-word', using the first suggestion, or cycle backward." (interactive) (ispell-word-immediate--impl -1)) Your Answer By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy Not the answer you're looking for? Browse other questions tagged or ask your own question.
Popular Interview Questions and answers on Docker?  1Q: What is Docker? A: Docker is a platform for containerizing applications that allows developers to create, deploy, and run applications in isolated containers. 2Q: What is a container in Docker? A: A container is a lightweight, standalone executable package of software that includes everything needed to run an application, including code, libraries, and system tools. 3Q: What is the difference between a Docker container and a virtual machine? A: A Docker container shares the host operating system's kernel and resources, while a virtual machine has its own kernel and runs a separate guest operating system. 4Q: What is a Docker image? A: A Docker image is a read-only template that contains everything needed to run an application, including the code, libraries, and system tools. 5Q: What is a Dockerfile? A: A Dockerfile is a text file that contains instructions for building a Docker image. 6Q: What is the difference between ADD and COPY in a Dockerfile? A: ADD copies files from the source directory and can also retrieve remote files and extract archives, while COPY only copies files from the source directory. 7Q: What is a Docker registry? A: A Docker registry is a central repository for storing and sharing Docker images. 8Q: What is the difference between a Docker container and an image? A: A Docker image is a read-only template that contains everything needed to run an application, while a Docker container is a running instance of an image. 9Q: What is the difference between Docker compose and Docker swarm? A: Docker compose is a tool for defining and running multi-container Docker applications, while Docker swarm is a tool for orchestrating and scaling a cluster of Docker nodes. 10Q: How do you share data between Docker containers? A: Data can be shared between Docker containers using shared volumes or networked file systems. 11Q: What is Docker Compose? A: Docker Compose is a tool for defining and running multi-container Docker applications. 12Q: What is the difference between a Docker container and a Docker stack? A: A Docker container is a single instance of an image, while a Docker stack is a group of containers that work together to provide a complete application. 13Q: What is the difference between Docker and Kubernetes? A: Docker is a platform for containerizing applications, while Kubernetes is a container orchestration platform for managing and scaling containerized applications. 14Q: What is a Docker swarm? A: Docker swarm is a tool for orchestrating and scaling a cluster of Docker nodes. It provides features such as load balancing, service discovery, and automated scaling. Followers
Internet Fact-checked At WiseGEEK, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge. Learn more... What Is a Socket a Mainboard? Andy Josiah Andy Josiah Socket A mainboard is a term used for a motherboard that contains a 462-pin hole central processing unit (CPU) called Socket A, or Socket 462. This component is just one of the many important components that the motherboard provides as the “heart” of the personal computer (PC). These includes slots for system memory and graphics processor units (GPUs), audio and video connectors, interfaces for hard disk and CD/DVD drives, and Ethernet connectivity. Socket A mainboard not only makes it possible for the CPU, or processor, of the computer to connect with it for data transmission, it also keeps it secure to protect it from harm. The manufacturing of the Socket A mainboard began in 2000, when semiconductor manufacturer Advanced Micro Devices (AMD) debuted the socket for use with its Athlon brand of CPUs. It is also compatible with Duron, which was AMD’s budget-oriented brand that debuted in the same year as the socket. When the Duron was discontinued in favor of Sempron in 2004, the Socket A mainboard retained its compatibility with the low-budget chips. It is also compatible with the AMD Geode NX, which is targeted at the embedded computer market. The mainboard includes slots and interfaces for components including CD and DVD drives. The mainboard includes slots and interfaces for components including CD and DVD drives. Measuring approximately 2.6 inches (6.55 centimeters) in width and 2.2 inches (5.59 cm) in length, the socket on the Socket A mainboard has a pin grid array (PGA) layout, which means that its pin holes are arranged in an orderly, grid-like framework. The rows formed from this layout join to form a square that conforms to the socket’s structure, which is made of organic plastic. This is known as organic pin grid array (OPGA), which describes the material used to make the socket. A zero insertion force (ZIF) standard is applied so that users do not rely on any force to install or remove the processor. The Socket A mainboard is not compatible with all AMD Athlon, Sempron, Duron or Geode processors. For instance, only Athlon chips of the 1500+ to 3200+ range of model numbers, which have a processing speed range of 1,000 to 2,333 megahertz (MHz), can work on Socket 462 motherboards. AMD set the operational voltage range of the Socket A at 1 to 2.05 volts (V). Despite Socket A's fall from prominence by 2004, when AMD had replaced it with Socket 754 and Socket 939, several computer technology manufacturers still make the Socket A mainboard. Many of them, such as major motherboard manufacturer Micro-Star International Co., Ltd (MSI), Hon Hai Precision Industry Co Ltd. subsidiary Foxconn, PC/mobile phone maker ASUSTeK Computer Incorporated (ASUS), and MiTAC International subsidiary Tyan Computer Corporation, are based in Taiwan. Also, the Socket A mainboard is still a main support for Geode NX chips. You might also Like Discuss this Article Post your comments Login: Forgot password? Register: • The mainboard includes slots and interfaces for components including CD and DVD drives. By: imagedb.com The mainboard includes slots and interfaces for components including CD and DVD drives.
 PHP Exercises: Create a new string taking 3 characters from the middle of a given string at least 3 - w3resource w3resource PHP Exercises: Create a new string taking 3 characters from the middle of a given string at least 3 PHP Basic Algorithm: Exercise-74 with Solution Write a PHP program to create a new string taking 3 characters from the middle of a given string at least 3. Sample Solution: PHP Code : <?php function test($s1) { return substr($s1, (strlen($s1) - 1) / 2 - 1, 3); } echo test("Hello")."\n"; echo test("Python")."\n"; echo test("abc")."\n"; Sample Output: ell yth abc Flowchart: Flowchart: Create a new string taking 3 characters from the middle of a given string at least 3. PHP Code Editor: Contribute your code and comments through Disqus. Previous: Write a PHP program to create a new string of length 2 starting at the given index of a given string. Next: Write a PHP program to create a new string of length 2, using first two characters of a given string. If the given string length is less than 2 use '#' as missing characters. What is the difficulty level of this exercise?  PHP: Tips of the Day $GLOBALS: An associative array containing references to all variables which are currently defined in the global scope of the script. The variable names are the keys of the array Example: <?php $myGlobal = "global"; // declare variable outside of scope function test() { $myLocal = "local"; // declare variable inside of scope // both variables are printed var_dump($myLocal); var_dump($GLOBALS["myGlobal"]); } test(); // run function // only $myGlobal is printed since $myLocal is not globally scoped var_dump($myLocal); var_dump($myGlobal); ?> Output: string(5) "local" string(6) "global" NULL string(6) "global" In the above example $myLocal is not displayed the second time because it is declared inside the test() function and then destroyed after the function is closed. Becoming global To remedy this there are two options. Option one: global keyword function test() { global $myLocal; $myLocal = "local"; var_dump($myLocal); var_dump($GLOBALS["myGlobal"]); } The global keyword is a prefix on a variable that forces it to be part of the global scope. Note that you cannot assign a value to a variable in the same statement as the global keyword. Hence, why I had to assign a value underneath. (It is possible if you remove new lines and spaces but I don't think it is neat. global $myLocal; $myLocal = "local"). Option two: $GLOBALS array function test() { $GLOBALS["myLocal"] = "local"; $myLocal = $GLOBALS["myLocal"]; var_dump($myLocal); var_dump($GLOBALS["myGlobal"]); } In this example I reassigned $myLocal the value of $GLOBAL["myLocal"] since I find it easier writing a variable name rather than the associative array.  
How Water is Purified in Water Treatment Plants Topics: Water, Chlorine, Water purification Pages: 10 (3541 words) Published: February 27, 2011 How water is purified in water treatment plants Pre-treatment 1. Pumping and containment – The majority of water must be pumped from its source or directed into pipes or holding tanks. To avoid adding contaminants to the water, this physical infrastructure must be made from appropriate materials and constructed so that accidental contamination does not occur. 2. Screening (see also screen filter) – The first step in purifying surface water is to remove large debris such as sticks, leaves, trash and other large particles which may interfere with subsequent purification steps. Most deep groundwater does not need screening before other purification steps. 3. Storage – Water from rivers may also be stored in bankside reservoirs for periods between a few days and many months to allow natural biological purification to take place. This is especially important if treatment is by slow sand filters. Storage reservoirs also provide a buffer against short periods of drought or to allow water supply to be maintained during transitory pollution incidents in the source river. 4. Pre-conditioning – Water rich in hardness salts is treated with soda-ash (sodium carbonate) to precipitate calcium carbonate out utilising the common-ion effect. 5. Pre-chlorination – In many plants the incoming water was chlorinated to minimise the growth of fouling organisms on the pipe-work and tanks. Because of the potential adverse quality effects (see chlorine below), this has largely been discontinued.[citation needed] [edit]pH adjustment Distilled water has a pH of 7 (neither alkaline nor acidic) and sea water has an average pH of 8.3 (slightly alkaline). If the water is acidic (lower than 7), lime, soda ash, or sodium hydroxide is added to raise the pH. For somewhat acidic waters (lower than 6.5)[citation needed], forced draft degasifiers are the cheapest way to raise the pH, as the process raises the pH by stripping dissolved carbon dioxide (carbonic acid) from the water. Lime is commonly used for pH adjustment for municipal water, or at the start of a treatment plant for process water, as it is cheap, but it also increases the ionic load by raising the water hardness. Making the water slightly alkaline ensures that coagulation and flocculation processes work effectively and also helps to minimize the risk of lead being dissolved from lead pipes and lead solder in pipe fittings. Acid (HCl or H2SO4) may be added to alkaline waters in some circumstances to lower the pH. Having alkaline water does not necessarily mean that lead or copper from the plumbing system will not be dissolved into the water but as a generality, water with a pH above 7 is much less likely to dissolve heavy metals than water with a pH below 7. Flocculation is a process which clarifies the water. Clarifying means removing any turbidity or colour so that the water is clear and colourless. Clarification is done by causing a precipitate to form in the water which can be removed using simple physical methods. Initially the precipitate forms as very small particles but as the water is gently stirred, these particles stick together to form bigger particles. Many of the small particles that were originally present in the raw water adsorb onto the surface of these small precipitate particles and so get incorporated into the larger particles that coagulation produces. In this way the coagulated precipitate takes most of the suspended matter out of the water and is then filtered off, generally by passing the mixture through a coarse sand filter or sometimes through a mixture of sand and granulatedanthracite (high carbon and low volatiles coal). Coagulants / flocculating agents that may be used include: 1. Iron (III) hydroxide. This is formed by adding a solution of an iron (III) compound such as iron(III) chloride to pre-treated water with a pH of 7 or greater. Iron (III) hydroxide is extremely insoluble and forms even at a pH as low as 7. Commercial formulations of iron... Continue Reading Please join StudyMode to read the full document You May Also Find These Documents Helpful • Water Treatment Plants Essay • Water Treatment Essay • Essay about Water • water treatment Essay • water treatment Research Paper • Water Treatment Plant Essay • water Essay • Water Essay Become a StudyMode Member Sign Up - It's Free
Cómo conectar un ecualizador a un sistema de cine en casa (En 4 Pasos) Por editorial team Cómo conectar un ecualizador a un sistema de cine en casa (En 4 Pasos) Jupiterimages/Comstock/Getty Images Los sistemas de estéreo caseros se componen de varios componentes, cada uno con un propósito específico. Estas unidades han perdido popularidad con el tiempo conforme más consumidores compran nuevos sistemas que incluyen todos los componentes integrados en una sola unidad. Algunas personas son renuentes a comprar estos sistemas sofisticados, pues cuando uno de sus componentes falla, no puede ser reemplazado, lo que suele equivaler a una reparación más costosa. Si decides armar un sistema de cine en casa usando los componentes que tienes a la mano, incluyendo un ecualizador, podrás hacerlo en menos de una hora. Paso 1 Revisa la parte trasera de tu estéreo en busca de conectores de entrada y salida. Si tienes un reproductor de casete, puedes conectarlo en estos conectores. Paso 2 Conecta los cables RCA a los conectores de entrada y salida en la parte trasera del ecualizador. Si los conectores están siendo usados, desenchufa el dispositivo y conecta el ecualizador. Una vez que cablees el ecualizador, puedes enchufar los otros dispositivos a la parte trasera del ecualizador. Asegúrate de que el conector "Salida" del reproductor de casete esté conectado a la "Entrada" del ecualizador. Paso 3 Conecta los cables del ecualizador al amplificador de la misma manera. Paso 4 Una vez que todos los cables estén conectados, revisa tus conexiones; luego asegúrate de que el botón "Botón de monitor de casete" en el amplificador esté encendido. Si está apagado, estará inhabilitado el ecualizador. Aun puedes escuchar tu dispositivo de grabación o reproductor de casete usando el interruptor en el ecualizador.
Talk:GTK3 From GnuCash Jump to: navigation, search There should probably by sections for each main OS supported by GnuCash. Users on *nix may come here but see only Windows specific info. I'll be happy to create and populate the sections if the OP is only focused on Windows. Absolutely. The idea is that people add related info to the page. I currently have only a Linux VM at home and can't confirm if things run the same on Linux. From my understanding, Adwaita Dark is included in GTK but I couldn't switch to it on Windows. We could divide the sections per OS, as was done in the linked articles. That said, there's not much that's Windows specific on this page yet. CSS and GTK settings should work pretty much the same on any OS. --Cicko (talk) 13:48, 29 March 2018 (UTC) Yes, but I would prefer the following form: GTK will search the content of the environment variable XDG_CONFIG_DIRS for ... That means under Linux /etc/xdg MacOS FIXME Windows FIXME First name the freedesktop standard and then its OS dependend default. See also Wiki Conventions --Fell (talk) 23:58, 29 March 2018 (UTC) --- What categories would you suggest for this page? Geert's instructions for GTK3 theming work on Windows so I find the page more-or-less complete in terms of functionality. --Cicko (talk) 10:54, 4 April 2018 (UTC) I am still experimenting to get useful category trees, but I think Customization might be a good keyword. --- Thanks, John, for the instructions on customizing the keyboard shortcuts! Very useful. --Cicko (talk) 07:45, 6 April 2018 (UTC) Structure I think you should reorder the sections and obey a few different dimensions: 1. General System settings (/etc) affects all users e.g. from GTK, 2. Application specific sytem settings (/etc/gnucash/ or similar) 3. General User settings ~/config/... overwrite system settimgs e.g. with the config tools of your desktop environment 4. Users and application specific settings ~/config/gnucash/ or similar with • containing also document stuff like .css files Distinguish another dimension GTK affecting rc files and document affecting elements like CSS files. Does this also apply on Windows? --Cicko (talk) 10:31, 12 April 2018 (UTC) Yes. John Ralls (talk) 13:36, 12 April 2018 (UTC)
Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search python3-colorama-0.4.4-lp152.4.3.1 RPM for noarch From OpenSuSE Ports Leap 15.2 updates for noarch Name: python3-colorama Distribution: openSUSE Leap 15.2 Version: 0.4.4 Vendor: openSUSE Release: lp152.4.3.1 Build date: Tue Mar 30 18:42:49 2021 Group: Development/Languages/Python Build host: obs-arm-8 Size: 112213 Source RPM: python-colorama-0.4.4-lp152.4.3.1.src.rpm Packager: http://bugs.opensuse.org Url: https://github.com/tartley/colorama Summary: Cross-platform colored terminal text Makes ANSI escape character sequences, for producing colored terminal text and cursor positioning, work under MS Windows. ANSI escape character sequences have long been used to produce colored terminal text and cursor positioning on Unix and Macs. Colorama makes this work on Windows, too. It also provides some shortcuts to help generate ANSI sequences, and works fine in conjunction with any other ANSI sequence generation library, such as Termcolor. This has the upshot of providing a simple cross-platform API for printing colored terminal text from Python, and has the happy side-effect that existing applications or libraries which use ANSI sequences to produce colored output on Linux or Macs can now also work on Windows, simply by calling colorama.init(). Provides Requires License BSD-3-Clause Changelog * Mon Dec 14 2020 John Paul Adrian Glaubitz <adrian.glaubitz@suse.com> - Update in SLE-15 (bsc#1176785, jsc#ECO-3105, jsc#PM-2352) * Mon Oct 19 2020 Dirk Mueller <dmueller@suse.com> - update to 0.4.4: * Fixes * Wed Apr 01 2020 Marketa Calabkova <mcalabkova@suse.com> - update to version 0.4.3 * Several documentation & demo fixes. * Sat Dec 01 2018 Arun Persaud <arun@gmx.de> - update to version 0.4.1: * Fix issue #196: prevent exponential number of calls when calling 'init' multiple times. Reported by bbayles and fixed by Delgan. * Tue Nov 13 2018 Tomáš Chvátal <tchvatal@suse.com> - Switch to github tarball to get tests * Mon Nov 12 2018 Arun Persaud <arun@gmx.de> - specfile: * update copyright year * move from tar.gz to zip on pypi * be more specific in %files section * remove devel from noarch - update to version 0.4.0: * Fix issue #142: reset LIGHT_EX colors with RESET_ALL. Reported by Delgan * Fix issue #147: ignore invalid "erase" ANSI codes. Reported by shin- * Fix issues #163 and #164: fix stream wrapping under PyCharm. Contributed by veleek and Delgan. * Thanks to jdufresne for various code cleanup and updates to documentation and project metadata. (pull requests #171, #172, [#173], #174, #176, #177, #189, #190, #192) * #186: added contextlib magic methods to ansitowin32.StreamWrapper. Contributed by hoefling. * Fix issue #131: don't cache stdio handles, since they might be closed/changed by fd redirection. This fixes an issue with pytest. Contributed by segevfiner. * #146, #157: Drop support for EOL Python 2.5, 2.6, 3.1, 3.2 and 3.3, and add 3.6. Thanks to hugovk. * Fri Aug 25 2017 tbechtold@suse.com - update to 0.3.9: * Revert fix for issue #103 which causes problems for dependent applications * Tue Apr 25 2017 toddrme2178@gmail.com - update to 0.3.8 * Fix issue #121: "invalid escape sequence" deprecation fixes on Python 3.6+ * Fix issue #110: fix "set console title" when working with unicode strings * Fix issue #103: enable color when using "input" function on Python 3.5+ * Fix issue #95: enable color when stderr is a tty but stdout is not - Implement single-spec version - Fix source url. * Tue Nov 15 2016 dmueller@suse.com - update to 0.3.7: * Fix issue #84: check if stream has 'closed' attribute before testing it * Fix issue #74: objects might become None at exit * Fix issue #81: fix ValueError when a closed stream was used * Bumping version to re-upload a wheel distribution * Fix issue #47 and #80 - stream redirection now strips ANSI codes on Linux * Fix issue #53 - strip readline markers * Fix issue #32 - assign orig_stdout and orig_stderr when initialising * Fix issue #57 - Fore.RESET did not reset style of LIGHT_EX colors. Fixed by Andy Neff * Fix issue #51 - add context manager syntax. Thanks to Matt Olsen. * Fix issue #48 - colorama didn't work on Windows when environment variable 'TERM' was set. * Fix issue #54 - fix pylint errors in client code. * Changes to readme and other improvements by Marc Abramowitz and Zearin * Sun Apr 19 2015 benoit.monin@gmx.fr - update to 0.3.3: * Fix Google Code issue #13 - support changing the console title with OSC escape sequence * Fix Google Code issue #16 - Add support for Windows xterm emulators * Fix Google Code issue #30 - implement \033[nK (clear line) * Fix Google Code issue #49 - no need to adjust for scroll when new position is already relative (CSI n A\B\C\D) * Fix Google Code issue #55 - erase_data fails on Python 3.x * Fix Google Code issue #46 - win32.COORD definition missing * Implement \033[0J and \033[1J (clear screen options) * Fix default ANSI parameters * Fix position after \033[2J (clear screen) * Add command shortcuts: colorama.Cursor, colorama.ansi.set_title, colorama.ansi.clear_line, colorama.ansi.clear_screen * Fix issue #22 - Importing fails for python3 on Windows * Thanks to John Szakmeister for adding support for light colors * Thanks to Charles Merriam for adding documentation to demos Files /usr/lib/python3.6/site-packages/colorama /usr/lib/python3.6/site-packages/colorama-0.4.4-py3.6.egg-info /usr/lib/python3.6/site-packages/colorama-0.4.4-py3.6.egg-info/PKG-INFO /usr/lib/python3.6/site-packages/colorama-0.4.4-py3.6.egg-info/SOURCES.txt /usr/lib/python3.6/site-packages/colorama-0.4.4-py3.6.egg-info/dependency_links.txt /usr/lib/python3.6/site-packages/colorama-0.4.4-py3.6.egg-info/top_level.txt /usr/lib/python3.6/site-packages/colorama/__init__.py /usr/lib/python3.6/site-packages/colorama/__pycache__ /usr/lib/python3.6/site-packages/colorama/__pycache__/__init__.cpython-36.opt-1.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/__init__.cpython-36.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/ansi.cpython-36.opt-1.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/ansi.cpython-36.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/ansitowin32.cpython-36.opt-1.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/ansitowin32.cpython-36.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/initialise.cpython-36.opt-1.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/initialise.cpython-36.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/win32.cpython-36.opt-1.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/win32.cpython-36.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/winterm.cpython-36.opt-1.pyc /usr/lib/python3.6/site-packages/colorama/__pycache__/winterm.cpython-36.pyc /usr/lib/python3.6/site-packages/colorama/ansi.py /usr/lib/python3.6/site-packages/colorama/ansitowin32.py /usr/lib/python3.6/site-packages/colorama/initialise.py /usr/lib/python3.6/site-packages/colorama/win32.py /usr/lib/python3.6/site-packages/colorama/winterm.py /usr/share/doc/packages/python3-colorama /usr/share/doc/packages/python3-colorama/CHANGELOG.rst /usr/share/doc/packages/python3-colorama/README.rst /usr/share/doc/packages/python3-colorama/demos /usr/share/doc/packages/python3-colorama/demos/demo.bat /usr/share/doc/packages/python3-colorama/demos/demo.sh /usr/share/doc/packages/python3-colorama/demos/demo01.py /usr/share/doc/packages/python3-colorama/demos/demo02.py /usr/share/doc/packages/python3-colorama/demos/demo03.py /usr/share/doc/packages/python3-colorama/demos/demo04.py /usr/share/doc/packages/python3-colorama/demos/demo05.py /usr/share/doc/packages/python3-colorama/demos/demo06.py /usr/share/doc/packages/python3-colorama/demos/demo07.py /usr/share/doc/packages/python3-colorama/demos/demo08.py /usr/share/doc/packages/python3-colorama/demos/fixpath.py /usr/share/licenses/python3-colorama /usr/share/licenses/python3-colorama/LICENSE.txt Generated by rpm2html 1.8.1 Fabrice Bellet, Mon May 9 16:32:37 2022
Hot answers tagged 5 There should be an /etc/auto.smb already, use that, and add the following line to /etc/auto.master: /cifs /etc/auto.smb --timeout=60 Now all cifs shares will show up under /cifs: ls /cifs/<server> will show all the shares available. You might want to put some options in /etc/auto.smb to mount with specific modes. I have a auto.smb that I ... 5 I think you have a cart before the horse problem here in that when you export a file system using NFS it locks on to the source direcotory. You are trying to not even have that source directory available at that time and only put something there via a mount later. This will not work, because once you give NFS a handle on something to share, it will always ... 4 Well, I got it myself. The documentation about it is quite lacking in Red Hat, but we do have Arch Wiki :-) So, Adding the flag --ghost to specific maps will show them. Now my setting look like this: # cat /etc/sysconfig/autofs # # BROWSE_MODE="no" #EOF # cat /etc/auto.master /home /etc/auto.home /shared auto.share ... 4 On Ubuntu 10.04, both autofs and GDM are Upstart (/etc/init) jobs, which means that they can potentially run in parallel. However, since neither has an explicit dependency on the other, there is nothing enforcing that GDM starts after autofs, so there is a race condition between the two. The best way to solve this is to reconfigure GDM to only start once ... 3 Is there a way to make autofs mount stuff as the current user? Not really, but what you could do is setup a group for users who will be allowed to have access to that resource, add all the users to the group, and then finally pass the gid, umask, and dmask options to set the group, and permissions the fat filesystem will use once it is mounted. 3 Warning: Ugly hack ahead! The best thing will of course be to change the data in the LDAP server, and save your self the trouble, but here it goes: Add the following line at the end of /etc/security/pam_env.conf: HOME DEFAULT="/home/@{PAM_USER}" This will override the users $HOME variable to point to the right directory. However, this is only ... 3 Edit: the rest of my answer is mostly off-topic. You're doing it the right way, but the feature was only introduced in autofs 5.0.6. From the git repository: Author: Ian Kent Date: Fri May 25 12:28:56 2012 +0800 autofs-5.0.6 - move timeout to map_source Move the map entry timeout field from "struct autofs_point" to "struct map_source". The result ... 3 lookup(program) means automount thinks your map is an executable, does it have the executable bit set? lookup(file) is what you should be seeing See http://www.squarebox.co.uk/cgi-squarebox/manServer/automount.8. 3 I suppose the credentials file will be read by mount.cifs, like for other CIFS mounts. So I had a look at the mount.cifs.c source file in the current cifs-utils code, which should be for version 6.3. The code for reading the password does no unescaping, except that every comma is doubled in the password field of the parsed_mount_info struct, as is apparently ... 3 This is caused by directories not being automounted when the container is run. I had thought that /usr/groups/thing was the automount point, but evidently the sub-directories are auto-mounted individually. The solution is to make sure each one is mounted before entering the container: $ (cd /usr/groups/thing/foo; cd /usr/groups/thing/bar) $ docker run -v ... 3 I experienced something similar. That is, logins of users with automounted home directories hung right after reboot, until such time as I manually started rpcbind with "systemctl start rpcbind". This is with all the most recent Cent7 updates as of today. I found that modifying the autofs unit file to depend on rpcbind and some other services fixed my ... 2 It's actually hard to argue one way or the other. The only item I can point out (happened to me) is that if you are using static mounts as in fstab and someone/thing makes an error the system may not boot and you'll have to go into rescue mode to get the system back online. That won't happen when using autofs. 2 You can launch your spot instance with a persistent EBS root volume (or attach a separate EBS volume post-boot). The EBS volume will remain after your spot instance terminates. See http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/concepts-spot-instances-applications-ebs.html 2 I believe that specified files (EX: .profile and .cshrc) from /etc/skel are only copied when you invoke the newuser (or equivalent command) to create a new user. Aside from that it is not used. 2 In /etc/sysconfig/autofs, change the MOUNT_NFS_DEFAULT_PROTOCOL variable. # MOUNT_NFS_DEFAULT_PROTOCOL - specify the default protocol used by # mount.nfs(8). Since we can't identify # the default automatically we need to # set it in our configuration. This will # ... 2 I just did this on a CentOS 5.6 box and I think part of your problem might be with your auto.test file. In it's current form you'll be creating a /test mount point and then a single moung of test under it, i.e. /test/test. Also you might want to add the --ghost switch to your auto.master line like so: /test /etc/auto.test --timeout=60 --ghost The ... 2 change server-ip -fstype=cifs,rw,noperm,user=DOMAIN\username,pass=password ://server-ip/share to share -fstype=cifs,rw,noperm,user=username,pass=password,domain=domain ://server-ip/share 2 I found the answer : you have to use the option nounix together with file_mode and dir_mode Here is my fstab : //adsrv01/Photos /mnt/Photos cifs credentials=/root/credentials.txt,file_mode=0770,dir_mode=0770,nounix,uid=505,gid=505 0 0 2 It looks like your NFS shares are being exported with root_squash enabled, so the root user actually gets the permissions of nobody when trying to operate on NFS mounts. Look for a root or root squash option in your NAS exports and tweak that. 2 Try umount -a -t autofs. This will umount every autofs mount. 2 There are 2 approaches to this kind of setup: You have a shared home directory over nfs. In which case you use the AutoFS method to mount the home dir on access under /home (like you did with putting /home in auto.master) You have no shared home, and want a homedir for the user on each server he logins to. In this case you need pam_mkhomedir to create the ... 2 A Windows Server OS on a reasonable modern server computer will handle 60 simultaneous connections to a share with no headaches whatsoever. I've had well over 300 simultaneous connections from Windows clients to the same share on a Windows Server with absolutely no problems (on vintage 2004 hardware). I can't tell you what the per-client encumbrance to ... 2 Yes; give automount the "--ghost" flag. Don't know offhand where that's configured in Debian-esque init files. Aha. Edit /etc/default/autofs to contain the line: DAEMONOPTIONS=--ghost I believe that's right. 2 this turned out to be the clue: rpc.idmapd[5924]: nfsdcb: id '-2' too big! the issue was that the default nfsnobody user has a uid of 4294967294 , but on a 64-bit CentOS system it appears to be interpreting this number in a 32-bit context leading to the infamous -2. The fix is to : change nfsnobody user/group to uid/gid 65534 on both client and server ... 2 Currently the work-around I'm using, is to add an extra event (starting autofs) on the "start on" line in /etc/init/statd.conf: start on (started portmap or mounting TYPE=nfs or starting autofs) This makes upstart start statd before autofs is started. 1 The maps cannot overlap. You could mount filer:/path/to/special somewhere else an make a symlink from /data/special to it. That symlink will be visible to all clients however. A cleaner though more involved approach would be to use an executable map. The map script would be something like: #!/bin/sh KEY="$0" if [ "$KEY" = "/data/special" ]; then echo " ... 1 Looks like the vanilla install of CentOS 5.1 has a known kernel bug that is causing this issue: http://bugs.centos.org/view.php?id=2448 It was fixed some time ago, and upgrading to the latest 5.1 kernel fixed the issue. 1 Yes, attributes such as uid are cached by the NFS client. On Solaris & OpenSolaris the options to control how long they're cached are documented in the mount_nfs(1m) man page - see the option names starting with ac like actimeo and the later man page sections they reference, such as File Attributes and Specifying Values for Attribute Cache Duration ... 1 Since I just spent my entire morning debugging this same issue. Let me explain what happened above. /etc/auto.master ## Mount this test share: /test /etc/auto.test --timeout=60 This means I want to mount something at /test and for the details read /etc/auto.test /etc/auto.test test ... 1 What distribution or kernel version are you running? I don't see anything consistent, but at least some manual pages I see indicate that the wildcard map is not ghosted. This behavior makes some intuitive sense; the wildcard means that any valid pathname is a candidate for mounting, and so the client can't realistically present a choice of mount points ... Only top voted, non community-wiki answers of a minimum length are eligible
blob: 2b17d965d32ba5a106c7fcdb537742c64534e9dd [file] [log] [blame] #!/usr/bin/env python # Copyright (c) 2012 The Chromium Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. """Runs tests with Xvfb and Openbox on Linux and normally on other platforms.""" import os import platform import signal import subprocess import sys import threading import test_env def _kill(proc, send_signal): """Kills |proc| and ignores exceptions thrown for non-existent processes.""" try: os.kill(proc.pid, send_signal) except OSError: pass def kill(proc, timeout_in_seconds=10): """Tries to kill |proc| gracefully with a timeout for each signal.""" if not proc or not proc.pid: return _kill(proc, signal.SIGTERM) thread = threading.Thread(target=proc.wait) thread.start() thread.join(timeout_in_seconds) if thread.is_alive(): print >> sys.stderr, 'Xvfb running after SIGTERM, trying SIGKILL.' _kill(proc, signal.SIGKILL) thread.join(timeout_in_seconds) if thread.is_alive(): print >> sys.stderr, 'Xvfb running after SIGTERM and SIGKILL; good luck!' def wait_for_xvfb(xdisplaycheck, env): """Waits for xvfb to be fully initialized by using xdisplaycheck.""" try: subprocess.check_output([xdisplaycheck], stderr=subprocess.STDOUT, env=env) except OSError: print >> sys.stderr, 'Failed to load %s with cwd=%s' % ( xdisplaycheck, os.getcwd()) return False except subprocess.CalledProcessError as e: print >> sys.stderr, ('Xvfb failed to load (code %d) according to %s' % (e.returncode, xdisplaycheck)) return False return True def should_start_xvfb(env): """Xvfb is only used on Linux and shouldn't be invoked recursively.""" return sys.platform == 'linux2' and env.get('_CHROMIUM_INSIDE_XVFB') != '1' def start_xvfb(env, build_dir, xvfb_path='Xvfb', display=':9'): """Start a virtual X server that can run tests without an existing X session. Returns the Xvfb and Openbox process Popen objects, or None on failure. The |env| dictionary is modified to set the DISPLAY and prevent re-entry. Args: env: The os.environ dictionary [copy] to check for re-entry. build_dir: The path of the build directory, used for xdisplaycheck. xvfb_path: The path to Xvfb. display: The X display number to use. """ assert should_start_xvfb(env) assert env.get('_CHROMIUM_INSIDE_XVFB') != '1' env['_CHROMIUM_INSIDE_XVFB'] = '1' env['DISPLAY'] = display xvfb_proc = None openbox_proc = None try: xvfb_cmd = [xvfb_path, display, '-screen', '0', '1280x800x24', '-ac', '-nolisten', 'tcp', '-dpi', '96'] xvfb_proc = subprocess.Popen(xvfb_cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT) if not wait_for_xvfb(os.path.join(build_dir, 'xdisplaycheck'), env): rc = xvfb_proc.poll() if rc is None: print 'Xvfb still running after xdisplaycheck failure, stopping.' kill(xvfb_proc) else: print 'Xvfb exited (code %d) after xdisplaycheck failure.' % rc print 'Xvfb output:' for l in xvfb_proc.communicate()[0].splitlines(): print '> %s' % l return (None, None) # Some ChromeOS tests need a window manager. openbox_proc = subprocess.Popen('openbox', stdout=subprocess.PIPE, stderr=subprocess.STDOUT, env=env) except OSError as e: print >> sys.stderr, 'Failed to start Xvfb or Openbox: %s' % str(e) kill(xvfb_proc) kill(openbox_proc) return (None, None) return (xvfb_proc, openbox_proc) def run_executable(cmd, build_dir, env): """Runs an executable within Xvfb on Linux or normally on other platforms. Returns the exit code of the specified commandline, or 1 on failure. """ xvfb = None openbox = None if should_start_xvfb(env): (xvfb, openbox) = start_xvfb(env, build_dir) if not xvfb or not xvfb.pid or not openbox or not openbox.pid: return 1 try: return test_env.run_executable(cmd, env) finally: kill(xvfb) kill(openbox) def main(): if len(sys.argv) < 3: print >> sys.stderr, ( 'Usage: xvfb.py [path to build_dir] [command args...]') return 2 return run_executable(sys.argv[2:], sys.argv[1], os.environ.copy()) if __name__ == "__main__": sys.exit(main())
Справочник функций Ваш аккаунт Войти через:  Забыли пароль? Регистрация Информацию о новых материалах можно получать и без регистрации: Последние темы форума Показать новые сообщения » Почтовая рассылка Подписчиков: 11630 Последний выпуск: 19.06.2015 Расширение набора стандартных функций и классов Borland Delphi Автор: Андрей Дрязгов, www.acedutils.narod.ru Загрузить файл AcedUtils.zip (ZIP,324Kb) 13 сентября 2005 года Описание библиотеки AcedUtils для Borland Delphi на платформе Win32 В данной статье описывается библиотека функций и классов AcedUtils, которая содержит реализацию распространенных структур данных и алгоритмов на языке Delphi для платформы Win32. Код библиотеки написан и протестирован на Borland Delphi 7. Предисловие При разработке функций и классов, составляющих библиотеку AcedUtils, основное внимание уделялось оптимизации кода по быстродействию. Очевидно, при правильном подходе, программы, написанные на языке Delphi и скомпилированные в "родной" код, могут работать не медленнее, чем аналогичные приложения на C++ или C#. Надо только понимать, что секрет достижения максимальной производительности заключается не столько в оптимизации машинного кода, ассемблерных вставках и т.п., сколько в использовании подходящих алгоритмов. Например, если стоит задача поиска некоторого значения в массиве элементов, можно пойти несколькими путями. Самый простой путь – последовательный перебор элементов и сравнение их с искомым значением. Для массива, содержащего всего несколько элементов, этот метод может оказаться самым эффективным. Если массив содержит много элементов, лучше заранее отсортировать его, а затем использовать бинарный поиск, который несравнимо быстрее последовательного перебора элементов. Если число элементов массива измеряется десятками тысяч и поиск в нем выполняется часто, имеет смысл пожертвовать лишней памятью для организации хэшированного списка. Время поиска в хэше не зависит от размера массива. Но и хэшированный список имеет свои недостатки, как, например, невозможность последовательной индексации элементов. Функции и классы из AcedUtils представляют собой готовый инструментарий, включающий распространенные алгоритмы работы с данными. Разработчик может опробовать различные варианты и выбрать из них тот, который лучше подходит для данной конкретной задачи. В последних версиях библиотеки добавлены классы для работы со сбалансированными бинарными деревьями (красно-черными деревьями), двухсторонними очередями (деками), приоритетными очередями. Добавлены функции, реализующие эффективные алгоритмы сортировки и поиска элементов набора данных (интроспективную сортировку, частичную сортировку, сортировку с сохранением относительного порядка следования равных элементов), различные перестановочные алгоритмы, функции для слияния упорядоченных наборов элементов, а также для работы с кучей. Кратко рассмотрим назначение модулей в составе AcedUtils. • AcedMemory – реализует быстродействующий менеджер памяти, оптимизированный для работы с большим числом мелких фрагментов данных. Особенностью является ведение пула блоков памяти одного размера. Таким образом решается проблема дефрагментации пространства памяти, занятого блоками размером до 64кБ. Кроме того, данный менеджер памяти отличается высоким быстродействием и оптимальным, с точки зрения кэширования памяти, выравниванием распределяемых блоков. • AcedConsts – содержит константы и методы, используемые другими модулями в составе AcedUtils. Кроме того, содержит определение типов ссылок на массивы, таких как PIntegerItemList, PObjectItemList, PPointerItemList и других. • AcedBinary – объединяет функции для работы с блоками памяти, массивами байт, чисел типа Integer, Word, LongWord, битами в составе двойного слова и битовыми строками. Включает также функции для эффективной работы с упорядоченными массивами одинарных и двойных слов, выполнения логических операций над множествами, представленными в виде таких массивов. • AcedStreams – содержит классы TBinaryReader и TBinaryWriter, позволяющие считывать данные из бинарного потока и помещать данные в бинарный поток. Исходные и выходные данные бинарного потока могут представляться в виде массива байт, строки в кодировке Base64, файла на диске или потока типа TStream. Данные, помещенные в бинарный поток, защищаются контрольной суммой Адлера и, при необходимости, сжимаются методом LZ+Huffman. Кроме того, данные в потоке могут быть зашифрованы методом RC6 и защищены цифровой сигнатурой SHA-256. В модуле AcedStreams также находятся классы TReaderStream и TWriterStream, которые позволяют работать с экземплярами классов TBinaryReader и TBinaryWriter, как будто эти классы являются потомками стандартного класса TStream. • AcedStrings – содержит разнообразные функции для работы со строками, в частности, для сравнения строк с учетом и без учета регистра символов, перевода символов и строк в верхний/нижний регистр, перекодировки строк из DOS в Windows и обратно, поиска, замены, удаления подстрок и т.д. Кроме того, в AcedStrings находится класс TStringBuilder, предназначенный для построения длинных строк из отдельных фрагментов, а также изменения таких строк "на месте". При использовании этого класса память не распределяется заново каждый раз при добавлении к строке следующего фрагмента. Построение длинной строки с помощью экземпляра класса TStringBuilder выполняется значительно быстрее простой конкатенации строк в цикле. • AcedCommon – объединяет разнообразные функции, не выделенные в отдельные категории, в частности, функции форматирования даты и времени, расчета контрольной суммы Адлера и CRC32, перевода строки или байтового массива в кодировку Base64 и восстановления из кодировки Base64, преобразования числа в строку и обратно, функции для записи денежной суммы прописью, для работы со счетчиками и таймерами при измерении временных интервалов. Кроме того, здесь находятся некоторые вспомогательные функции, в том числе относящиеся к пользовательскому интерфейсу. • AcedCompression – содержит функции, реализующие сжатие бинарных данных методом LZ+ Huffman, и последующую распаковку данных, сжатых таким способом. Используемый алгоритм упаковки представляет собой немного измененный вариант алгоритма, который применяется в архиваторе PKZIP. За счет этих изменений достигается большая степень сжатия в режимах, отличных от скоростного (dcmFastest). • AcedCrypto – объединяет функции для шифрования данных методами RC4 и RC6 (в режимах ECB, CFB и OFB), для расчета значения односторонней хэш-функции SHA-256, используемой при верификации данных. Цифровая сигнатура SHA-256 может вычисляться как для целой строки или массива байт, так и для данных, представленных в виде нескольких фрагментов. В этом же модуле находятся функции, реализующие генератор псевдослучайных чисел Mersenne Twister с периодом 219937-1. • AcedAlgorithm – различные функции для манипулирования набором данных, представленным в виде массива указателей. Включает функции для линейного и бинарного поиска, замены, подсчета, удаления элементов массива, поиска максимального и/или минимального элементов, а также реализацию некоторых перестановочных алгоритмов. Имеется группа функций для сортировки элементов массива, а также для слияния сортированных массивов с применением различных операций над множествами. Кроме того, есть группа функций для работы с кучей (в данном контексте под кучей подразумевается бинарное дерево в виде последовательной коллекции, обладающее специальными свойствами). • AcedContainers (бывший AcedLists) – содержит классы, являющиеся контейнерами данных, в том числе, для работы с битовыми строками (TBitList), наборами чисел типа Integer (TIntegerList) и Word (TWordList), обычными ( TArrayList, TArrayReadOnlyList), ассоциативными (TIntegerAssociationList, TStringAssociationList), хэшированными (TIntegerHashtable, TStringHashtable), связанными (TLinkedList) списками, самобалансируемыми красно-черными бинарными деревьями ( TIntegerRedBlackTree, TInt64 RedBlackTree, TStringRedBlackTree), двухсторонними (TDoubleEndedQueue) и приоритетными ( TPriorityQueue) очередями. • AcedStorage – объединяет классы для организации объектного хранилища данных, которое представляет собой эффективный способ хранения данных на локальном компьютере или файловом сервере с возможностью многопользовательского доступа. При реализации объектного хранилища используется хэширование записей по первичным ключам, индексация с возможностью выделения диапазонов значений, уведомления об изменении данных, поддерживаются ограничения уникальности. Для обеспечения возможности одновременного изменения данных одного набора, т.е. коллекции, несколькими пользователями применяется механизм транзакций. Каждая таблица данных представляется коллекцией типа TSerializableCollection, в которой содержатся записи – объекты, производные от класса TSerializableObject. • AcedNetWait – форма, которая используется модулем AcedStorage при возникновении коллизий на файловом сервере. На экран выводится сообщение о том, что в данный момент открываемый файл данных заблокирован, т.к. он записывается другим пользователем или другим приложением. В этом случае пользователь должен подождать, повторить попытку открытия файла или отменить операцию. Следует отметить, что файл данных блокируется только на время автоматического согласования изменений и непосредственного сохранения данных. Блокировка не выполняется в процессе интерактивной корректировки данных одной и той же таблицы несколькими пользователями. • AcedExcelReport – содержит функции и классы, облегчающие подготовку и печать отчетов с помощью Microsoft Excel. Обычно при работе с Microsoft Excel из Delphi приходится обращаться к различным интерфейсам из модуля Excel97, сгенерированного на основе библиотеки типов Microsoft Excel. В модуле AcedExcelReport собраны функции, наиболее часто используемые при подготовке отчетов. Это позволяет сократить размер и уменьшить сложность кода для генерации отчетов, а также сократить число обращений к Microsoft Excel через COM-интерфейсы, что существенно повышает производительность. • AcedGridFrame, AcedCheckFrame, AcedViewFrame – фреймы для отображения на экране данных в виде таблицы с возможностью навигации. Представляют собой аналог компонента TStringGrid с расширенными возможностями. AcedGridFrame отображает таблицу и строку поиска. Для столбцов задается режим выравнивания и заголовок. Каждая ячейка может отображаться своим цветом. Поддерживается многострочный текст в ячейках и режим отложенного выделения записей. AcedCheckFrame, кроме того, показывает окно пометки ( Checkbox) рядом с каждой записью и предоставляет коллекцию помеченных записей и коллекцию недоступных записей, для которых нельзя изменить пометку. AcedViewFrame отображает информацию в виде таблицы без строки поиска и выделения цветом текущей записи. Этот фрейм игнорирует события от клавиатуры, но предоставляет методы для скроллинга таблицы из кода. Дополнительную информацию о grid-фреймах можно почерпнуть из комментариев в исходном коде соответствующих модулей. • AcedGrids – содержит описание общих типов и событий, используемых фреймами: AcedGridFrame, AcedCheckFrame и AcedViewFrame. Теперь подробнее рассмотрим функциональность основных модулей AcedUtils. Модуль AcedMemory Этот модуль предназначен для замены стандартного менеджера памяти Borland Delphi альтернативным механизмом распределения памяти. Целью разработки нового менеджера памяти было стремление оптимизировать работу с небольшими блоками памяти, которые возникают при организации хранения данных в виде объектной базы, когда каждая запись представляется экземпляром соответствующего класса. Под оптимизацией подразумевается, во-первых, повышение скорости при выделении/освобождении блоков памяти, во-вторых, решение проблемы фрагментации свободных блоков. Начиная с версии 1.09, менеджер памяти отслеживает попытки повторного освобождения блоков памяти и генерирует исключение. Рассмотрим подробнее принцип работы AcedMemory. Память запрашивается у операционной системы вызовом VirtualAlloc блоками размером 2МБ, которые в данном контексте называются регионами. Каждый регион состоит из 32 блоков размером 64кБ. Каждый такой блок предназначен для фрагментов памяти определенного размера. Например, один блок может содержать 4 фрагмента по 16кБ, другой – 1024 фрагмента по 64 байта и т.д. Когда из прикладной программы вызывается функция GetMem, размер выделяемых фрагментов памяти округляется вверх до ближайшего числа, равного 2 в степени N, где N может быть от 3 до 16. Когда все фрагменты памяти нужного размера в составе блока заняты, в регионе выделяется следующий блок под фрагменты памяти нужного размера. Если все 32 блока в составе региона заняты, создается новый регион размером 2МБ. Адрес каждого фрагмента памяти (до 64кБ) кратен его размеру, что положительно влияет на производительность. В отличие от стандартного менеджера памяти, размер выделяемых фрагментов не хранится в памяти с отрицательным смещением, а вычисляется, при необходимости, по адресу фрагмента. Когда требуется выделить фрагмент памяти размером более 64кБ, этот размер округляется вверх до числа, кратного 4096 байт, а затем вызывается функция VirtualAlloc для запроса соответствующего блока памяти у операционной системы. Для подключения AcedMemory к проекту, ссылку на этот модуль необходимо добавить в раздел uses файла проекта, причем AcedMemory должен стоять первым в этом разделе. Стандартные модули Forms, Classes и прочие должны находиться в списке uses, после AcedMemory. Если этого не сделать, при завершении программы возникнет ошибка. Это происходит из-за того, что в разделе finalization модуля Classes косвенно вызывается функция FreeMem для освобождения некоторых блоков памяти, выделенных в процессе работы программы. Модули финализируются в порядке, обратном их перечислению в разделе uses файла проекта. Чтобы менеджер памяти AcedMemory был еще активен на момент вызова раздела finalization модуля Classes, ссылка на AcedMemory должна находиться в списке uses файла проекта перед модулем Classes и любыми другими модулями, использующими Classes, такими, как модуль Forms. Кроме, собственно, механизма для выделения/освобождения памяти, в модуле AcedMemory имеется несколько вспомогательных функций: G_GetMemSize возвращает размер блока памяти, адрес которого передан как параметр; функция G_GetTotalMemAllocated возвращает общий объем памяти, выделенный прикладной программе. Вызов этой функции не приводит к длительному пересчету размеров всех выделенных блоков. Вместо этого просто возвращается значение внутреннего счетчика памяти. Функция G_GetTotalMemCommitted возвращает общий размер физической памяти, выделенной программе операционной системой. Это число не учитывает память, выделенную в "куче" для служебных структур модуля AcedMemory, а также память, распределенную средствами, отличными от менеджера памяти. Модуль AcedBinary В этом модуле собрано большое число функций для работы с бинарными данными, представленными массивами байт, слов, двойных слов, битовыми строками, отдельными значениями типа LongWord. Подробное их описание можно найти в исходном коде модуля. В некоторых функциях используются инструкции MMX, для выполнения которых нужен процессор не ниже Pentium-MMX или Pentium II. Кратко рассмотрим основные группы функций. Первая группа объединяет функции для обмена значений переменных и несколько функций для работы с числами типа LongWord. Она включает процедуры G_Swap32, G_Swap16, G_ Swap8, обменивающие значения двух переменных соответствующего размера (в битах), процедуру G_BSwap, которая обращает порядок следования байт в значении типа LongWord, функции G_Log2, G_Gcd, G_ Lcm, возвращающие, соответственно, логарифм числа по основанию 2, наибольший общий делитель двух чисел и наименьшее общее кратное двух чисел. Функции G_CeilPowerOfTwo, G_FloorPowerOfTwo округляют двойное слово до ближайшей степени числа 2 вверх или вниз, соответственно. Ко второй группе относятся функции, работающие с массивами байт, слов и двойных слов. Например, когда необходимо заполнить нулями массив байт, пригодится процедура G_ZeroMem. Если нужно скопировать содержимое одного блока памяти в другой и заранее известно, что эти блоки памяти не перекрываются, вместо стандартной процедуры Move лучше воспользоваться процедурой G_ CopyMem из AcedBinary, которая выполнит то же действие значительно быстрее. Если блоки памяти могут перекрываются, нужно использовать процедуру G_MoveMem. В этом случае при работе с массивами двойных слов можно немного повысить быстродействие, если вызывать, соответственно, процедуры G_ CopyLongs и  G_MoveLongs. Кроме того, может быть полезна процедура G_ FillLongs для заполнения массива двойных слов определенным значением или процедура G_ GenerateLongs, заполняющая такой массив возрастающей или убывающей последовательностью целых чисел. Когда требуется найти число типа Word или Integer в несортированном массиве, вместо организации цикла с перебором элементов массива лучше вызвать функцию G_ Scan_Word или G_Scan_Integer. Эти функции используют специальные машинные инструкции для быстрого поиска значения в массиве двух- или четырехбайтных элементов. Аналогичные функции имеются для поиска элемента с конца массива (G_ ScanBackward…), поиска значения, отличающегося от заданного ( G_ScanOther…), замены одних значений другими (G_Replace…) и т.д. В AcedBinary есть группа функций для работы с отсортированными массивами элементов типа Integer, Word, LongWord, которая включает функции для, собственно, сортировки массива по возрастанию ( G_Sort…), выполнения бинарного поиска (G_BinarySearch…). Сортированные массивы можно рассматривать как множества и применять к ним соответствующие операции. Например, массив уникальных элементов типа Integer – это одно из возможных представлений множества: [-2147483648..2147483647]. Функция G_SetUnion_ Integer формирует из двух таких массивов новый массив, состоящий из элементов, которые присутствуют хотя бы в одном из исходных массивов; G_SetIntersection_ Integer возвращает массив, состоящий только из тех элементов, которые присутствуют в обоих массивах; G_SetDifference_Integer возвращает массив элементов, которые присутствуют в первом, но отсутствуют во втором массиве; G_SetSymmetricDiffference_ Integer формирует массив из элементов, которые присутствуют только в одном из исходных массивов. Есть еще две информационные функции для работы со множествами: G_ SetIntersectsWith_Integer возвращает True, если в двух массивах есть какие-либо общие элементы, т.е. пересечение двух множеств не является пустым множеством; другая функция – G_ SetContainedIn_Integer возвращает True, если все элементы первого массива присутствуют во втором массиве, т.е. первое множество является подмножеством второго. Аналогичные функции имеются для массивов элементов типа Word и LongWord. Эти функции могут использоваться совместно с классами TIntegerList и TWordList, определенными в модуле AcedContainers. Следующая группа функций в AcedBinary предназначена для работы с битами в составе двойного слова, т.е. значения типа LongWord. Эта группа включает функцию G_ReverseBits (обращает порядок следования бит); G_BitTest32, G_BitSet32, G_ BitReset32, G_BitToggle32 (используются для проверки, установки, сброса или инвертирования одного бита в составе двойного слова). Есть также функции для подсчета числа установленных и сброшенных бит, поиска первого или последнего бита с заданным состоянием и другие. Последняя группа функций аналогична только что рассмотренной, но эти функции работают с битами в составе битовой строки. Например, функция G_BitSet устанавливает в единицу бит с заданным индексом в битовой строке, адресуемой первым параметром этой функции; функция G_ToggleBits инвертирует все биты в заданном диапазоне битовой строки; G_CountOfFreeBits возвращает число нулевых битов в заданном диапазоне битовой строке; G_ SetBitScanForward возвращает индекс первого установленного, т.е. единичного, бита в составе битовой строки. Эти и другие функции используются классом TBitList из модуля AcedContainers для эффективной работы с данными, представленными в виде упакованного набора значений типа Boolean. Модуль AcedStreams Содержит классы, предназначенные для работы с бинарным потоком данных. Бинарный поток в данном контексте – это просто массив байт в памяти, размер которого динамически увеличивается по мере добавления новых данных. После того, как все данные помещены в поток, его содержимое может быть преобразовано в массив, строку в кодировке Base64, сохранено в файле или в другом потоке типа TStream. При этом может быть выполнено сжатие данных методом LZ+ Huffman, шифрование методом RC6 и защита цифровой сигнатурой SHA-256. Для проверки целостности данных вместе с ними в поток помещается значение контрольной суммы Адлера. Бинарный поток создается с помощью экземпляра класса TBinaryWriter. Cтандартные классы в составе VCL ориентированы на работу с потоком типа TStream. Чтобы решить эту проблему в модуле AcedStreams предусмотрен класс TStreamWriter, который является потомком стандартного класса TStream и, одновременно, представляет собой оболочку над TBinaryWriter. Таким образом, можно, например, сохранить изображение типа TGraphic в потоке TBinaryWriter. Для этого нужно создать экземпляр TStreamWriter, передав в его конструктор ссылку на TBinaryWriter. Затем этот экземпляр TStreamWriter передать как параметр в метод TGraphic.SaveToStream. Кроме классов TBinaryWriter, TStreamWriter, в модуле AcedStreams имеются соответствующие им классы TBinaryReader, TStreamReader, предназначенные для чтения данных из бинарного потока. Когда нужно прочитать данные из потока TBinaryReader, прежде всего нужно загрузить исходный массив с данными в память. Для этого используется один из следующих методов: LoadFromArray (загружает данные из массива байт, ссылка на который передана в качестве параметра), LoadFromBase64 (загружает данные из строки в кодировке Base64), LoadFromFile (загружает данные из файла, который был предварительно открыт и установлен в позицию, соответствующую началу блока данных), LoadFromStream (загружает данные из потока типа TStream). Все методы LoadFrom… принимают в качестве параметра ссылку на 256-битный ключ EncryptionKey. Если в этом параметре передан указатель на ключ, отличный от nil, при загрузке данных выполняется их дешифрование с указанным ключом и проверка целостности данных по сохраненному в потоке значению цифровой сигнатуры SHA-256. В классе TBinaryReader имеются методы для чтения из потока значений различного типа, включая String, Integer, TDateTime и т.д., а также метод Read, копирующий заданное число байт из бинарного потока в определенную область памяти. Если данные бинарного потока должны быть считаны некоторым стандартным классом, работающим только с потоками типа TStream, таким как класс TBitmap, нужно создать экземпляр класса TStreamReader, передав в его конструктор ссылку на соответствующий экземпляр TBinaryReader. После этого данные могут быть загружены методом TBitmap. LoadFromStream с передачей в него ссылки на созданный экземпляр TStreamReader. Класс TBinaryWriter используется для помещения данных в бинарный поток, организованный в виде динамического массива. Данные записываются в поток методами WriteString, WriteInteger, WriteDateTime и т.п. Кроме того, метод Write позволяет скопировать в поток содержимое произвольной области памяти. Когда все необходимые данные помещены в бинарный поток, можно вызвать один из следующих методов: SaveToArray (представляет данные потока, возможно, сжатые и зашифрованные, в виде массива байт), SaveToBase64 (представляет данные в виде строки в кодировке Base64), SaveToFile (сохраняет данные в файле, дескриптор которого передан в качестве параметра), SaveToStream (сохраняет данные в потоке типа TStream). Все методы SaveTo… принимают параметр CompressionMode, который устанавливает режим сжатия бинарных данных перед помещением их в выходной массив (см. перечень констант, выбирающих режим сжатия, в описании модуля AcedCompression). Методы SaveTo… принимают также параметр EncryptionKey. Если он не равен значению nil, то должен содержать ссылку на 256-битный ключ, т.е. массив из 32 байт. В этом случае данные бинарного потока шифруются методом RC6 с указанным ключом. Кроме того, для них вычисляется значение цифровой сигнатуры SHA-256, которая также записывается в выходной массив и используется в дальнейшем при расшифровке данных для проверки их целостности. Ключ шифра передается параметром типа PSHA256Digest. Этот тип является своего рода подсказкой, что в качестве ключа при шифровании методом RC6 удобно использовать значение односторонней функции SHA-256, рассчитанное для ключевого массива байт или строки символов, вводимой пользователем с клавиатуры в качестве пароля. Модуль AcedStrings AcedStrings содержит набор функций, предназначенных для работы со строками типа AnsiString. Кроме того, в этом модуле определен класс TStringBuilder, являющийся аналогом классов StringBuilder из . NET и Java. Рассмотрим подробнее, что полезного есть в этом модуле. В AcedStrings находятся функции, реализующие быстрое сравнение строк с учетом или без учета регистра символов. Сравнение выполняется на больше-меньше или на равно - не равно. При сравнении могут учитываться все символы или только определенное число начальных символов строки. Следующая группа объединяет функции, используемые для преобразования строк и отдельных символов к верхнему или нижнему регистру. Далее следуют функции, которые облегчают работу со строками, сохраненными в кодировке MS-DOS. Они позволяют быстро менять кодировку строк с DOS на Windows и обратно. В процессе преобразования используются массивы перекодировки ToOemChars и ToAnsiChars, определенные в конце интерфейсного раздела модуля. Эти массивы по умолчанию соответствуют кодировке "Кириллица Win1251". Однако, используя небольшую программу, текст которой приведен в виде комментария в модуле AcedStrings, можно сформировать соответствующие таблицы для любой другой кодировки символов. Есть также возможность динамического формирования таблиц перекодировки в момент запуска программы на компьютере конечного пользователя в зависимости от текущих региональных настроек. Этот режим включается при определении символа USE_DYNAMIC_TABLES в коде модуля AcedStrings. Следующая группа содержит функции поиска, замены, удаления подстрок и отдельных символов. Здесь находятся функции быстрого поиска подстрок с учетом и без учета регистра символов. Поиск выполняется с начала (функции G_PosStr/G_ PosText) или с конца строки (функции G_ LastPosStr/G_LastPosText). Для поиска отдельных символов служат функции G_ CharPos и G_LastCharPos. Функция G_Paste заменяет фрагмент строки определенной длины, начиная с указанного символа, другим фрагментом. Функции: G_ ReplaceStr, G_ReplaceText, G_ReplaceChar, G_ReplaceChars, G_ ReplaceCharsWithOneChar используются для замены всех вхождений подстроки или некоторого символа в строке другой подстрокой или символом. Функции: G_Delete, G_CutLeft, G_ CutRight, G_DeleteStr, G_DeleteText, G_ DeleteChar, G_DeleteChars, G_KeepChars используются для удаления из строки фрагментов, подстрок или отдельных символов. Функции: G_Compact, G_ Trim, G_TrimLeft, G_TrimRight удаляют из строки пробелы и управляющие символы. Далее следуют функции для работы с маской. Под маской здесь понимается шаблон, подобный тому, который используется при поиске файлов на диске, как, например, "rpt??w?. xls" или "*.tmp". Функция G_ApplyMask форматирует строку символов с помощью маски, а G_ExtractWithMask, наоборот, извлекает данные из строки по маске; G_ ValidateMask используется для проверки того, что строка удовлетворяет заданной маске; функции G_ ValidateWildStr и G_ ValidateWildText выполняют проверку соответствия строки заданному шаблону, который может содержать специальные символы, предполагающие замену их любым количеством произвольных символов, т.е. аналогичные символу '*' в шаблоне для поиска файлов. Кроме перечисленных, в AcedStrings входят функции: G_CountOfChar, G_CountOfChars для подсчета числа вхождений одного или нескольких символов в строку; G_IsEmpty для проверки того, что строка является пустой или содержит только пробелы и управляющие символы; G_PadLeft, G_PadRight, G_ Center для дополнения строки, соответственно, слева, справа или с обеих сторон указанным символом до требуемой длины; функция G_Duplicate формирует строку, состоящую из нескольких копий другой строки; G_StrReverse обращает порядок символов в строке. Если для управления памятью в проекте используется менеджер памяти AcedMemory и в тексте модуля AcedStrings определен символ USE_ ACED_MEMORY, становятся доступны функции G_NewStr, G_Append, G_ AppendLine, G_Insert. Они могут использоваться в качестве альтернативы классу TStringBuilder для того, чтобы эффективно изменять и дополнять строки типа AnsiString на месте, без лишнего перераспределения памяти. Например, формирование длинной строки в цикле с помощью функции G_Append выполняется значительно быстрее простой конкатенации строк. Однако, этот способ все же менее эффективен, чем использование класса TStringBuilder, т.к. при каждом изменении строки тратится дополнительное время на определение размера области памяти, выделенной под строку. Функции типа G_Append, G_Insert лучше применять для внесения небольшого числа изменений в длинную строку, когда создание специального экземпляра класса TStringBuilder неоправданно. Класс TStringBuilder Этот класс предназначен для динамического создания строки из отдельных фрагментов и изменения строки произвольной длины. В принципе, можно изменять и дополнять обычную строку типа AnsiString. Однако при каждом дополнении такой строки происходит выделение памяти под новую строку и копирование в нее данных. Перераспределение памяти – это довольно медленная операция, независимо от используемого менеджера памяти. В экземпляре TStringBuilder строка, по возможности, изменяется на месте, без лишней перетасовки памяти. Например, если необходимо сформировать строку из элементов некоторого списка, то вместо того, чтобы по очереди добавлять строки к переменной типа String, лучше создать экземпляр класса TStringBuilder, добавить каждую строку из списка методом Append, а затем преобразовать результат к типу String вызовом метода ToString класса TStringBuilder. В классе TStringBuilder реализованы основные методы для внесения изменений и дополнения строки. В частности, метод Append добавляет к данной строке другую строку, фрагмент строки, один или несколько повторяющихся символов, десятичное или шестнадцатеричное представление числа; метод Insert вставляет подстроку в указанную позицию; метод Delete удаляет фрагмент строки; метод Reverse обращает порядок символов во всей строке или в отдельном фрагменте; метод Clear очищает строку. Еще есть методы для создания копии экземпляра класса TStringBuilder (метод Clone), преобразования строки или ее фрагмента к типу AnsiString (метод ToString), заполнения фрагмента строки указанным символом (метод Fill), добавления в конец строки символов перевода строки (метод AppendLine) и другие. Свойство Chars класса TStringBuilder позволяет работать со строкой как с обычным массивом символов. Модуль AcedCommon В AcedCommon собраны разнообразные функции, в том числе, для форматирования даты и времени, преобразования числа в строку и строки в число, записи числовых и денежных сумм прописью, замены символов строки шестнадцатеричными кодами этих символов и, наоборот, замены кодов символами, кодирования байтовых массивов и строк в Base64 и обратного их преобразования. Кроме того, здесь находятся функции для вычисления контрольной суммы Адлера и CRC32, работы со счетчиками, таймером высокого разрешении, а также несколько вспомогательных функций. Форматирование даты и времени В начале модуля AcedCommon объявлены константные массивы, содержащие названия месяцев и дней недели, записанных по-русски и по-английски. Для форматирования даты используется функция G_FormatDate. Она возвращает дату представленную краткой числовой формой или полной формой, содержащей название месяца и слово "года". Строка-результат может включать также полное или краткое название дня недели или, вообще, состоять только из дня недели без даты. Функция G_ SplitDate позволяет выделить из даты день месяца как числовое значение, а сам месяц и год представить в виде строки. Для форматирования времени используется функция G_ FormatTime, которая преобразует время в строку по правилам русского языка с возможным указанием числа секунд и миллисекунд. Операции с числами типа Double и Currency Следующая группа объединяет функции для работы со значениями типа Double и Currency. В частности, процедуры G_Inc, G_Dec, G_ Mult, G_Div принимают в качестве первого параметра ссылку на переменную типа Double или Currency и, соответственно, складывают, вычитают, умножают или делят ее значение на число, переданное вторым параметром. Эти процедуры призваны компенсировать собой отсутствие в языке Delphi операций "+=", "/=" и т.п. из C-подобных языков. Функцию G_ToDouble необходимо вызывать для приведения значения типа Currency к типу Double, т.к. обычный способ приведения: "Double(Currency)" не срабатывает из-за ошибки в компиляторе. Функция G_ThousandsToDouble преобразует значение типа Currency к типу Double, одновременно делит его на 1000 и округляет до 3-х знаков после запятой. Контрольная сумма Адлера и CRC-32 Данная группа функций предназначена для вычисления контрольных сумм, используемых при проверке целостности данных. Контрольная сумма представляет собой число типа LongWord, которое зависит от всего исходного массива данных. При изменении хотя бы одного бита данных, значение контрольной суммы меняется. Это значение может, например, передаваться вместе с данными по сети, а затем пересчитываться на приемном конце и сравниваться с исходным значением контрольной суммы. Если оба значения равны, то с большой вероятностью можно утверждать, что данные переданы без ошибок. Здесь имеются в виду случайные ошибки при передаче, а не предумышленное искажение данных. Для надежной защиты данных от любого вида вмешательства вместо контрольной суммы нужно использовать цифровую сигнатуру, такую как SHA-256 (см. описание модуля AcedCrypto). Правда, значение односторонней функции SHA-256 рассчитывается медленнее, чем контрольная сумма типа CRC-32. Функция G_Adler32 вычисляет контрольную сумму Адлера массива байт в соответствии с RFC 1950. Эта контрольная сумма применяется библиотекой сжатия zlib. Она получается быстрее, чем CRC-32, но, по всей видимости, является чуть менее надежной. Функции G_ CRC32 и G_NextCRC32 возвращают значение контрольной суммы CRC-32 указанной области памяти. Вторая функция отличается от первой тем, что она используется для поэтапного расчета контрольной суммы массива, представленного в виде нескольких фрагментов. Например, если длинный массив передается по сети в виде нескольких пакетов, функция G_NextCRC32, вызываемая последовательно для каждого пакета данных, вычислит в результате контрольную сумму целого массива. Пара функций G_ CRC32_Str и G_ CRC32_Text может использоваться при хэшировании строк. Первая функция возвращает значение типа LongWord, которое зависит от всех символов строки с учетом их регистра. Вторая функция возвращает значение, которое зависит от всех символов строки, но не зависит от их регистра, т.е. это значение будет одинаковым для строк, которые отличаются только регистром символов. Преобразование числа в строку и строки в число В AcedCommon есть несколько функций для преобразования целого числа в строку, содержащую его десятичное или шестнадцатеричное представление (функции G_ IntToStr, G_UIntToHex и др.). G_HexToUInt возвращает число типа LongWord, шестнадцатеричная запись которого передана параметром типа String. Функции G_Between… используются для проверки того, что число, записанное в виде строки, лежит в нужном диапазоне. Функции G_StrTo… выполняют преобразование строки в число, типа Integer, LongWord, Int64, Extended или Currency. В случае ошибки эти функции не генерируют исключение, а возвращают значение False. Еще есть функция G_ModDiv10, которая делит значение var-параметра на 10 и возвращает остаток от деления как результат функции. Она может быть полезна при преобразовании в строку длинных чисел. Функции G_NumToStr и G_NumToRub используются для записи числовых и денежных сумм прописью по-русски. Различные особенности записи чисел прописью настраиваются соответствующими параметрами форматирования. Например, вызов G_NumToStr(54321, S, nfFemale) вернет в переменной S строку: "пятьдесят четыре тысячи триста двадцать одна", а вызов G_NumToRub(3.2, ruFull, ruNumShort) вернет строку: "Три рубля 20 коп.". Работа с кодировкой Base64 и шестнадцатеричными кодами В этом же модуле находятся функции для работы с кодировкой Base64, представляющие строку символов или массив байт в виде новой строки, не содержащей пробелов, управляющих символов и символов в национальной кодировке. Функция G_Base64 Encode выполняет кодирование строки символов или массива байт в Base64. Результат возвращается в виде строки типа AnsiString. Обратное преобразование выполняется функцией G_Base64 Decode, которая восстанавливает исходный массив байт или строку символов из строки в кодировке Base64. Кроме того, здесь находятся функции, позволяющие представить строку символов в виде строки шестнадцатеричных кодов символов. Функция G_ StrToCodes возвращает строку, в которой каждый символ исходной строки, переданной параметром, заменен соответствующим шестнадцатеричным кодом. Например, вызов G_ StrToCodes('ABC') вернет строку: "414243". Функция G_CodesToStr используется для обратного преобразования: G_ CodesToStr('414242') вернет строку "ABC". Функции для замера временных интервалов Когда в программе нужно отмерить временные интервалы, можно воспользоваться стандартной функцией GetTickCount из модуля Windows, которая возвращает число миллисекунд, прошедшее с момента загрузки операционной системы. Поскольку это значение выражается числом типа LongWord, со временем оно может переполниться и пойти на следующий "круг". Функция G_TickCountSince из модуля AcedCommon учитывает эту особенность и возвращает число миллисекунд, прошедшее с того момента, как функция GetTickCount вернула значение Tick, передаваемое в качестве параметра в G_TickCountSince. Хотя GetTickCount возвращает число миллисекунд, точность этой функции не превышает 0.1 секунды. Когда нужно отмерить интервал с точностью до одной миллисекунды можно воспользоваться таймером высокого разрешения. Получить текущее значение таймера можно вызовом функции G_QueryPC, которая возвращает значение, полученное вызовом системной функции QueryPerformanceCounter. По разности значений таймера можно определить длительность временного интервала с помощью функции G_GetTimeInterval. Кроме того, с помощью функции G_GetPC_ Delta можно, наоборот, вычислить разность значений таймера, соответствующую временному интервалу определенной длительности. К замеру временных интервалов с помощью таймера высокого разрешения имеет смысл прибегать, только когда требуется высокая точность. В остальных случаях лучше вызывать функции GetTickCount и G_TickCountSince, т.к. они используют меньше ресурсов системы. В модуле AcedCommon имеется также функция G_ RDTSC, считывающая значение 64-разрядного счетчика, который увеличивается на каждом такте процессора. В некоторых случаях эта функция может заменить собой таймер высокого разрешения. Кроме того, она может быть полезна при инициализации генератора псевдослучайных чисел. Прочие функции Функция G_SwitchToApplication переводит на передний план запущенный экземпляр приложения, к которому принадлежит окно с указанным именем класса. Обычно эта функция применяется для предотвращения повторного запуска приложения, чтобы вместо запуска нового экземпляра вывести на передний план запущенный ранее экземпляр приложения. Кроме того, ее можно использовать, например, для переключения на другую задачу при организации приложения в виде нескольких независимых процессов. Функция G_SelectMenu используется для имитации выбора пользователем заданного пункта или подпункта меню текущего окна. При этом в функцию окна посылаются события, имитирующие нажатие пользователем клавиши вызова меню, клавиш со стрелками вправо и вниз, клавиши Enter, в последовательности, необходимой для выбора нужного пункта меню. При этом глубина раскрываемого подпункта может быть любой. Функции G_ToggleKey и G_ IsToggled управляют состоянием клавиш: Num Lock, Caps Lock, Scroll Lock. Первая функция позволяет изменить состояние любой из этих клавиш, вторая – считывает текущее состояние соответствующей клавиши. Последняя функция G_ODS помещает сообщение в Event Log (журнал, вызываемый из отладчика в среде Borland Delphi по Ctrl+Alt+ V). Модуль AcedCompression В модуле AcedCompression находятся функции, предназначенные для сжатия бинарных данных методом Зива-Лемпела с последующим преобразованием в код Хаффмана. Упаковка данных осуществляется функцией G_Deflate, которая принимает в качестве параметра Mode одну из констант, выбирающих режим сжатия. Допустимы следующие режимы: • dcmNoCompression – данные не сжимаются, просто копируются в выходной массив. Функция G_ Deflate переключается в этот режим автоматически, если сжимаемые данные не содержат избыточности, например, если они зашифрованы или упакованы другим методом. Размер исходного массива увеличивается при этом на 4 байта, в которых сохраняется длина исходного массива. Таким образом, 4 байта – это максимальная величина, на которую увеличивается длина исходного массива в случае невозможности его сжатия. • dcmFastest – используется, когда надо сжать данные максимально быстро. При этом качество сжатия во многом зависит от характера самих данных. Если они содержат большое число повторяющихся фрагментов, использование этого режима нерационально, т.к. в нем применяется "облегченный" вариант словарного метода сжатия (Зива-Лемпела). Сжатие Хаффмана, наоборот, реализовано в полной мере. Оно основано на разности частот появления отдельных кодов символов. Если к исходным данным применим такой способ упаковки и они содержат мало повторяющихся последовательностей, режим dcmFastest может оказаться даже более эффективным, чем режим dcmMaximumCompression, за счет большей дисперсии частот отдельных кодов. Это справедливо, например, при сжатии wav-файлов, для которых, впрочем, данный алгоритм в принципе малоэффективен. Такие данные лучше сжимать другими средствами. Максимальное расстояние между повторяющимися последовательностями байт в этом режиме принимается равным 8191 байту. • dcmFast – обычная степень сжатия, достигаемая за минимальное время. Вероятно, данный режим является оптимальным при сжатии бинарных данных. В этом случае использование режимов dcmNormal и dcmMaximumCompression приводит к уменьшению размера выходного массива на 1-2%, но время сжатия возрастает в несколько раз. В режиме dcmFast максимальное расстояние между повторяющимися фрагментами данных равно 65535 байт. • dcmNormal – обычно соответствует хорошей степени сжатия. Его можно использовать для данных с большим числом повторяющихся фрагментов, например, текстов или doc-файлов. При этом сжатие происходит в 1.5-2 раза быстрее, чем в режиме dcmMaximumCompression, но примерно во столько же раз медленнее, чем в режиме dcmFast. Максимальное расстояние между повторяющимися группами байт принимается равным 131071 байту. • dcmMaximumCompression – в этом режиме достигается максимальная степень упаковки, доступная для реализованного в AcedCompression метода сжатия. Может применяться для сильно избыточных данных или для данных, которые редко сжимаются, а затем многократно используются. Максимальное расстояние между повторяющимися фрагментами данных принимается равным 262143 байт. • В модуле AcedCompression есть два варианта функции G_ Deflate. В первом варианте функция сама распределяет память под массив, достаточный для хранения упакованных данных. Во втором варианте массив должен быть создан заранее, а функция G_ Deflate только заполняет его данными. • Имеются также функции для распаковки сжатого массива данных. Размер исходного массива можно получить вызовом функции G_GetInflatedLength, а сама распаковка данных выполняется функцией G_ Inflate. Имеется два варианта этой функции. В первом варианте память под массив, содержащий выходные данные, распределяется функцией G_Inflate. Во втором варианте, массив для хранения распакованных данных должен быть создан заранее размером не менее, чем длина, которую вернул вызов функции G_ GetInflatedLength для упакованного массива данных. Следует отметить, что используемый режим сжатия не влияет на скорость распаковки данных, кроме режима dcmNoCompression, при котором данные просто копируются из одного места в другое. Модуль AcedCrypto Модуль объединяет функции, используемые для шифрования и верификации данных, а также для генерации псевдослучайных чисел. Функции G_RC4… предназначены для шифрования данных методом RC4. Это широко распространенный поточный шифр. Возможно, по стойкости он уступает блочным шифрам, типа Rijndael или CAST, но, зато, значительно превосходит их по производительности. Не так давно в этом шифре было обнаружено несколько уязвимостей, которые касаются алгоритма заполнения внутреннего массива ключей (key scheduling algorithm). Чтобы избежать связанной с этим гипотетической опасности взлома зашифрованных данных, компания RCA, разработчик данного шифра, рекомендует пропускать первые 256 байт выходной псевдослучайной последовательности. Функции из модуля AcedCrypto написаны с учетом этого замечания. При правильном использовании метод RC4 является вполне надежным. Надо только помнить основную особенность поточных шифров – один и тот же ключ не должен применяться для шифрования различных данных. Например, ключ может вычисляться с помощью побитовой операции xor двух чисел, одно из которых является постоянным и рассчитывается как цифровая сигнатура пароля, вводимого пользователем с клавиатуры, а второе число является изменяемым и создается генератором псевдослучайных чисел перед каждым сеансом шифрования данных. Изменяемое число может сохраняться в первых байтах зашифрованного потока данных. Следующий набор функций из AcedCrypto – G_RC6… предназначен для шифрования данных методом RC6. Это блочный шифр, разработанный компанией RCA. Нормальная длина ключа при шифровании методом RC6 составляет 256 бит (32 байта). В AcedCrypto имеются функции для инициализации процесса шифрования, задания начального вектора, шифрования и дешифрования 128-битного блока данных в режиме ECB (электронная кодовая книга), шифрования и дешифрования произвольного массива байт в режимах CFB (обратная загрузка шифротекста) и OFB (обратная загрузка выходных данных) с размером блока 128 бит. В режимах CFB и OFB размер шифруемых и дешифруемых фрагментов данных должен совпадать или размер этих фрагментов должен быть кратен 16 байт. При использовании в качестве ключа шифра пароля, вводимого пользователем с клавиатуры, нужно передавать в функцию G_RC6Init в качестве ключа не саму строку, содержащую введенный пароль, а цифровую сигнатуру SHA-256, рассчитанную для строки, введенной пользователем. Далее в модуле AcedCrypto находятся функции, предназначенные для расчета значения односторонней хэш-функции SHA-256 массива байт. Цифровая сигнатура SHA-256 представляет собой массив из 32 байт, который вычисляется по данным исходного массива байт таким образом, чтобы, во-первых, невозможно было подобрать другой массив байт, для которого значение сигнатуры совпало бы с данной сигнатурой, и, во-вторых, чтобы по значению цифровой сигнатуры невозможно было восстановить какие-либо значения из исходного массива байт. Алгоритм расчета SHA-256 реализован в соответствии с документом FIPS180-2. Не так давно была опубликована информация о нахождении уязвимости в алгоритме хэш-функции SHA-1. В связи с этим следует отметить, что алгоритм SHA-256 во многом отличается от SHA-1 и об успешных атаках на SHA-256 до сих пор ничего не известно. В модуле AcedCrypto имеются функции для расчета цифровой сигнатуры для массива байт и строки символов. Кроме того, можно рассчитать сигнатуру для массива байт, представленного в виде нескольких фрагментов. Это удобно, например, при работе с данными, организованными в виде потока типа TStream. Функции G_Random… реализуют генератор псевдослучайных чисел типа Mersenne Twister, период которого можно считать равным бесконечности. Функция G_ RandomNext возвращает число типа LongWord, равномерно распределенное в интервале от 0 до $ FFFFFFFF; функция G_RandomUniform генерирует псевдослучайную величину, равномерно распределенную в интервале [0.0, 1.0]; G_ RandomGauss используется для моделирования непрерывной случайной величины с нормальным законом распределения. Функция G_RandomFill позволяет заполнить область памяти псевдослучайной последовательностью байт. Функция G_RandomEncryptVector шифрует внутренний вектор, используемый при генерации псевдослучайных чисел, методом RC6. Это соответствует переводу генератора на новую числовую последовательность. Следует отметить, что сама по себе выходная числовая последовательность данного генератора не является криптографически стойкой. Чтобы превратить ее в криптографически стойкую, можно воспользоваться, например, функцией G_SHA256 Transform. Модуль AcedAlgorithm Объединяет функции для работы с набором данных, представленным в виде массива указателей. Такие массивы удобны для представления в памяти различных временных списков, которые могут содержать ссылки на сохраняемые объекты типа TSerializableObject, указатели на записи, используемые в процессе группирования данных при построении отчетов, и т.п. Работать с массивами указателей удобно посредством класса TArrayList из модуля AcedContainers. Но класс TArrayList содержит методы для выполнения только самых основных операций с данными. Большое число других операций реализуется функциями из модуля AcedAlgorithm. Применить любые из этих функций к данным, содержащимся в наборе TArrayList, можно работая со свойствам ItemList и Count класса TArrayList. Рассмотрим структуру модуля AcedAlgorithm. В начале модуля располагаются функции G_ Search и G_ SearchBackward для линейного поиска в массиве. Искомое значение Value передается в эти функции как указатель. Кроме того, одним из параметров является адрес функции типа TMatchFunction, предназначенной для сопоставления значения элементу массива. Функция G_Search производит последовательный поиск, начиная с первых элементов массива, G_ SearchBackward – поиск назад, начиная с последних элементов массива. Функция G_ Replace находит в массиве все элементы, равные значению Value, и заменяет их новым элементом, который передается в качестве параметра функции. G_ CountOf подсчитывает количество элементов, равных искомому значению. Функция G_ RemoveCopy копирует в новый массив все элементы из исходного массива, кроме тех, которые равны значению Value. Еще есть функции для удаления смежных дубликатов элементов. Далее следуют функции для поиска минимального и максимального элементов массива. Функции G_SearchMin и G_SearchMax возвращают сам минимальный или максимальный элемент, а G_ IndexOfMin и G_ IndexOfMax – индекс минимального или максимального элемента. Когда требуется найти сразу и минимум и максимум в массиве элементов, вместо того, чтобы вызывать сначала G_ SearchMin, а потом G_ SearchMax, лучше воспользоваться функцией G_ SearchMinMax, которая оптимизирована для такого случая. Следующие функции предназначены для переупорядочивания элементов массива по различным критериям. Функция G_ Rotate перемещает все элементы массива, начиная с указанного индекса, и до конца массива, в начало массива, а элементы с начала до указанного индекса – в конец массива. G_ RotateCopy аналогична G_Rotate, но сохраняет результат в новом массиве и выполняется немного быстрее, чем G_ Rotate. Функция G_PartitionStrict перемещает все элементы массива, меньшие заданного значения, в начало массива. Остальные элементы перемещаются в конец массива. G_PartitionUnstrict отличается от G_PartitionStrict только условием ("меньше или равно" вместо "меньше") перемещения элементов в начало массива. Имеются также аналоги этих функций с приставкой Stable (G_StablePartitionStrict и G_StablePartitionUnstrict). Они отличаются тем, что при перемещении элементов сохраняется их относительный порядок до и после значения Value. Функция G_SelectTop перемещает N минимальных элементов в начало массива. Остальные элементы перемещаются в конец массива. Эта функция работает подобно алгоритму Nth_element из STL. Функция G_ StableSelectTop выполняет то же действие, но без нарушения относительного порядка элементов в левой и правой частях массива, т.е. до и после N-го элемента. При небольшом объеме данных " stable" и "nonstable" варианты функций почти не отличаются по скорости работы, но для поддержания относительного порядка элементов приходится задействовать дополнительную память в размере, занимаемом исходным массивом указателей. Функция G_ RandomShuffle перемешивает массив указателей с помощью генератора псевдослучайных чисел. Далее следуют функции для сортировки массива по возрастанию значений элементов. Элементы массива сравниваются между собой с помощью функции типа TCompareFunction, адрес которой передается в качестве параметра во все процедуры сортировки. Самая быстрая сортировка большого объема данных выполняется процедурой G_ Sort, реализующей метод интроспективной сортировки. Данный алгоритм представляет собой модификацию алгоритма быстрой сортировки, которая предусматривает выбор для каждого диапазона среднего значения из трех вариантов: начало, середина и конец диапазона. Кроме того, если подбираются исходные данные, критичные для алгоритма быстрой сортировки, и его сложность достигает O(N2), функция G_Sort заменяет быструю сортировку пирамидальной, сложность которой всегда O(N*Log( N)). Когда нужно отсортировать данные без изменения относительного порядка равных элементов, пригодится функция G_ StableSort, реализующая метод сортировки слиянием. В отличие от интроспективной сортировки, данный метод требует выделения дополнительной памяти размером, равным размеру сортируемого массива указателей. Если нужно отсортировать не весь массив, а только первые (наименьшие) N элементов, можно воспользоваться функцией G_ PartialSort или G_ PartialSortCopy, основанными на алгоритме пирамидальной сортировки. Проверить, является ли массив отсортированным по возрастанию можно с помощью функции G_IsSorted. В AcedAlgorithm имеются функции для бинарного поиска элементов в массиве, отсортированном по возрастанию искомого признака. Функция G_ BinarySearch возвращает индекс элемента, значение которого равно заданному. G_ SearchFirstGreater (G_ SearchFirstGreaterOrEqual) возвращает индекс первого элемента массива, значение которого больше (больше или равно) искомому значению. G_SearchLastLesser (G_ SearchLastLesserOrEqual)  возвращает индекс последнего элемента в отсортированном массиве, значение которого меньше (меньше или равно) искомого значения. Также имеются функции для слияния сортированных массивов элементов. Первая из них – G_Merge создает из двух отсортированных массивов новый массив, состоящий из всех элементов исходных массивов, который также является отсортированным по возрастанию. Другие функции объединяют массивы подобно тому, как различные логические операции применяются ко множествам. Например, функция G_SetIntersection сохраняет в выходном массиве пересечение исходных массивов, т.е. только те элементы, которые присутствуют в обоих исходных массивах. Последняя группа функций в этом модуле предназначена для работы с кучей. Куча представляет собой бинарное дерево в виде последовательной коллекции элементов. Причем значение каждого узла такого бинарного дерева больше или равно значениям его дочерних узлов. Куча обладает следующими свойствами: первый элемент кучи всегда является максимальным элементов в массиве, добавление и удаление элементов кучи выполняется с логарифмической сложностью. На основе куч могут создаваться приоритетные очереди элементов. Кроме того, механизм куч лежит в основе алгоритмов пирамидальной и частичной сортировки элементов массива. Процедура G_ MakeHeap переупорядочивает массив так, чтобы он представлял собой кучу. G_ PushHeap помещает значение в кучу. G_PopHeap извлекает значение из кучи. G_SortHeap сортирует элементы кучи по возрастанию, т.е. превращает кучу в обычный сортированный массив. Функция G_IsHeap проверяет, является ли массив элементов кучей. Модуль AcedContainers Содержит классы, являющиеся контейнерами данных. Битовая строка TBitList Предоставляет методы и свойства для работы со строкой бит, которую можно представить как упакованный набор элементов типа Boolean. Изначально, при создании экземпляра класса TBitList вызовом конструктора Create, все биты строки устанавливаются в 0 (False) или 1 ( True), в зависимости от значения, переданного в параметре InitValue конструктора. Метод Load используется для загрузки битовой строки из бинарного потока типа TBinaryReader, произвольной области памяти или другого экземпляра класса TBitList. Кроме того, данные могут быть загружены из ключа реестра Windows. Для сохранения данных в бинарном потоке типа TBinaryWriter или в реестре Windows предназначен метод Save. Загрузить битовую строку из обычной строки, состоящей из символов '0' и '1', можно с помощью метода FromString. Наоборот, чтобы представить битовую строку в виде обычной строки, надо воспользоваться функцией ToString. К отдельным элементам битовой строки можно обратиться с помощью свойства Bits. Изменить состояние отдельных битов можно также методами SetBit, ResetBit и ToggleBit. Общее число элементов возвращается и устанавливается свойством Count. Функция Contains проверяет наличие в битовой строке элемента с указанным значением (True или False). Методы IndexOf, LastIndexOf используются для поиска, соответственно, вперед и назад первого установленного или сброшенного бита, начиная с указанного индекса. Функция CountOf подсчитывает общее количество установленных или сброшенных бит в массиве. Метод SetAll устанавливает все биты в значение 0 или 1. Если два экземпляра класса TBitList содержат одинаковое число элементов, к ним можно применить различные логические операции. Например, метод AndBits выполняет операцию логического умножения элементов двух списков. В результате, установленными окажутся только биты, которые были установлены в обоих списках, а все остальные биты будут установлены в 0. Аналогичные методы предусмотрены для выполнения операций: OR, XOR, NOT, AND NOT. Функция Equals используется для проверки равенства содержимого двух экземпляров класса TBitList. Функция Clone возвращает копию экземпляра TBitList. Классы TIntegerList, TWordList Эти классы предназначены для работы со списком значений типа Integer или Word, соответственно. Классы полностью аналогичны друг другу, поэтому рассмотрим только первый из них – TIntegerList. Список значений может быть сортированным или несортированным. Это зависит от свойства MaintainSorted. Если оно равно True, при выполнении операций добавления и удаления элементы списка гарантированно располагаются в порядке возрастания значений. Если свойство MaintainSorted равно False, новые элементы добавляются в конец списка, независимо от их значений. В этом случае допустимо использовать метод Insert для вставки одного или нескольких элементов в произвольное место списка. Кроме того, можно использовать метод UnorderedRemoveAt для быстрого удаления элементов списка. При вызове данного метода удаляемый элемент замещается последним элементом списка, после чего свойство Count уменьшается на 1. Таким образом, удаление элемента происходит без смещения всех следующих за ним элементов списка. Когда MaintainSorted равно True, при вызове методов Insert и UnorderedRemoveAt возникает исключение, т.к. произвольная вставка и unordered-удаление могут нарушить порядок сортировки элементов. Для поиска значений в списке применяется метод IndexOf, который возвращает индекс найденного элемента или -1, если искомый элемент отсутствует. Когда элементы списка отсортированы, используется быстрый алгоритм бинарного поиска, в противном случае – линейный поиск с помощью функции G_Scan_ Integer из модуля AcedBinary. Иногда бывает удобнее не поддерживать список все время в отсортированном виде, так как это замедляет процесс вставки и удаления элементов. Вместо этого перед началом поиска можно вызвать метод EnsureSorted. Тогда, если список не был отсортирован, он сортируется, а затем выполняется быстрый бинарный поиск. Естественно, это имеет смысл делать, только если поиск выполняется многократно, т.к. сама сортировка занимает больше времени, чем линейный поиск. Аналогично классу TBitList, в TIntegerList есть методы для загрузки списка из бинарного потока типа TBinaryReader, из произвольной области памяти, из реестра Windows или из другого экземпляра класса TIntegerList. Список может быть сохранен в бинарном потоке TBinaryWriter или в реестре Windows. Кроме того, список может быть загружен из строки, содержащей данные в кодировке Base64, и может быть сохранен в виде строки в кодировке Base64. Новые элементы обычно добавляются в список методами Add или AddIfNotExists, когда необходимо избежать дублирования значений в списке. Чтобы удалить элемент из списка по индексу, вызывается метод RemoveAt, а чтобы удалить все элементы с определенным значением – метод Remove. При удалении значений методами Remove и RemoveAt порядок остающихся в списке элементов не меняется. Список полностью очищается при вызове метода Clear. Функция Equals позволяет поэлементно сравнить два списка, а функция Clone возвращает копию данного экземпляра класса TIntegerList. Когда свойство MaintainSorted равно False, экземпляр TIntegerList можно использовать в качестве стека. Значения помещаются в стек (в конец списка) методом Add, а извлекаются из стека (с конца списка) методом PopBack в соответствии с правилом: "первым вошел – последним вышел". Получить последнее значение, помещенное в стек, без его удаления можно методом PeekBack. Обратиться к отдельным элементам списка можно через свойство ItemList, которое возвращает указатель на массив элементов типа Integer. Число используемых элементов в этом массиве определяется свойством Count. Количество элементов, под которое распределена память во внутреннем массиве, считывается и устанавливается свойством Capacity. Начальное значение этого свойства передается как параметр в конструктор класса TIntegerList. При описании модуля AcedBinary были рассмотрены функции, позволяющие работать с массивами чисел типа Integer как с множествами, в частности, применять к ним различные логические операции. Эти операции можно производить и с экземплярами класса TIntegerList. Например, пусть имеется два отсортированных списка значений типа Integer List1 и List2, из которых необходимо получить третий список List3, содержащий значения, присутствующие в первом списке, но отсутствующие во втором. Это соответствует операции вычитания множеств. Можно создать новый экземпляр класса TIntegerList для хранения списка-результата List3, передав в его конструктор число элементов первого списка, т.к. это число соответствует максимальной длине выходного массива для случая, когда два исходных множества не имеют пересечения. Операция вычитания множеств и заполнения списка List3 выполняется одной строкой кода: List3.Count := G_SetDifference_Integer(List1.ItemList, List1.Count, List2.ItemList, List2.Count, List3.ItemList). Список указателей TArrayList TArrayList является аналогом класса ArrayList из .NET Framework. Он представляет собой динамический массив указателей. В конструктор класса передается предполагаемое число элементов, которое будет добавлено в список. Элементы можно загрузить методом Load из другого экземпляра класса TArrayList или из произвольной области памяти. Отдельные элементы добавляются методом Add в конец списка или методом Insert в произвольное место списка. Для удаления одного или нескольких элементов по индексу используется метод RemoveAt. Метод UnorderedRemoveAt позволяет быстро удалить элемент из списка, заменив его последним элементом списка и уменьшив на 1 значение свойства Count. Он может применяться, когда порядок элементов не имеет значения. Для полной очистки списка предназначен метод Clear. Аналогично классам TIntegerList, TWordList, в классе TArrayList имеются методы для работы со списком как со стеком. Метод PopBack возвращает последний элемент списка и одновременно удаляет его, уменьшая на 1 значение свойства Count. Метод PeekBack возвращает последний элемент списка, не удаляя его. Поместить элемент в стек можно с помощью метода Add. Обращение к отдельным элементам списка осуществляется через свойство ItemList, которое возвращает ссылку на массив указателей типа Pointer. Длина списка возвращается свойством Count. Общее число элементов, под которое распределена память во внутреннем массиве, определяется свойством Capacity. Свойство Count может произвольным образом изменяться. Никаких проверок при этом не выполняется. Capacity обычно превышает Count, что позволяет добавлять новые элементы в список без немедленного выделения нового блока памяти. Чтобы предельно уменьшить объем памяти, занимаемый списком, можно вызвать метод TrimToSize, который распределяет под внутренний массив область памяти, достаточную для хранения Count элементов, но не более того. После вызова этого метода свойство Capacity становится равно свойству Count. Метод Clone возвращает копию экземпляра класса TArrayList. Метод Equals поэлементно сравнивает текущий список с заданным списком и возвращает True, если все элементы обоих списков равны, или False, если между списками есть какие-либо различия. Свойство OwnItems класса TArrayList управляет принадлежностью элементов списку. Если это свойство равно True, при удалении элементов из списка, например, методом RemoveAt или Clear, каждый из них приводится к типу TObject и для него вызывается метод Free. Чтобы найти элемент в списке TArrayList можно воспользоваться функцией ScanPointer, которая сканирует внутренний массив в поисках нужного указателя. Если надо найти не просто указатель, а элемент с определенным значением признака, необходимо воспользоваться функциями Search (возвращает искомый элемент списка) или IndexOf (возвращает индекс искомого элемента списка). Для более эффективного поиска, а также просто для упорядочивания элементов списка, можно отсортировать список методом Sort. Данный метод принимает в качестве параметра адрес функции, сравнивающей два элемента списка. Элементы сортируются по возрастанию. Кроме того, есть метод StableSort, который аналогичен методу Sort, но при сортировке сохраняет относительное расположение равных элементов списка. Однако, метод StableSort выделяет дополнительную память в объеме, равном размеру сортируемого массива указателей. После того, как список отсортирован, функции Search и IndexOf могут использовать эффективный метод бинарного поиска (при передаче True в параметре Sorted). В классе TArrayList предусмотрена возможность группирования элементов. При этом элементы с одинаковым значением признака объединяются в одну группу. Группирование выполняется методом EnumerateGroups, который принимает в качестве параметра адрес функции, сравнивающей два элемента списка. При выполнении этой операции список сортируется в порядке возрастания значения признака. Функция EnumerateGroups возвращает коллекцию групп – экземпляр класса TGroupEnumerator. Число групп в этой коллекции определяется свойством GroupCount. Указатель на массив, содержащий группы, возвращается свойством GroupList класса TGroupEnumerator. Каждая группа представляется списком TArrayReadOnlyList – аналог класса TArrayList, который не позволяет добавлять и удалять элементы. Следует обратить внимание на то, что в экземпляре класса TArrayReadOnlyList нет собственного внутреннего массива для хранения элементов списка. Вместо этого он пользуется внутренним массивом экземпляра класса TArrayList, для которого был вызван метод EnumerateGroups. Поэтому в процессе работы с группами нельзя вносить изменения в основной экземпляр TArrayList. Ассоциативные списки Экземпляры классов: TIntegerAssociationList, TStringAssociationList, TIntegerHashtable, TStringHashtable представляют собой набор ключей типа Integer или String, с каждым из которых связано значение типа Pointer или TObject. Они предназначены для быстрого поиска значений в списке по ключу. Классы типа AssociationList хранят ключи в виде сортированного списка. Классы типа Hashtable реализуют ассоциативный массив с использованием хэширования ключей. Вероятно, сортированный список лучше подходит для небольших наборов данных в пределах одной-двух сотен элементов, когда накладные расходы на хэширование не оправданны. Хэш-таблицы можно применять для больших наборов данных, т.к. скоростные характеристики хэш-таблицы близки к O(1) (константны). Во всех классах реализованы методы для добавления и удаления элементов (методы Add и Remove), извлечения значения по ключу (свойство Items). Свойство OwnValues управляет принадлежностью значений спискам. Например, если оно равно True, при очистке списка методом Clear, каждое значение приводится к типу TObject и для него вызывается метод Free. По умолчанию свойство OwnValues равно False и метод Free для значений не вызывается. В конструктор классов TStringAssociationList, TStringHashtable можно передать параметр, определяющий, нужно ли различать регистр символов в значениях ключей типа String. Чтобы заранее распределить память под известное число элементов, добавляемых в ассоциативный список, следует передать соответствующее значение в конструктор класса или воспользоваться методом EnsureCapacity. Красно-черные деревья Классы TStringRedBlackTree, TIntegerRedBlackTree, TInt64 RedBlackTree реализуют специальный вид бинарного дерева поиска, которое называется красно-черным деревом. Его особенность заключается в том, что оно все время находится в относительно сбалансированном состоянии. Красно-черные деревья хорошо приспособлены как для изменения количества элементов, так и для поиска. Они гарантируют, что вставка потребует не более двух изменений внутренних ссылок, а самый длинный путь к элементу будет не более чем вдвое длиннее самого короткого. В узлах дерева находятся ключи и связанные с ними значения типа Pointer или TObject. Перечисленные классы отличаются друг от друга только типом используемых ключей: String, Integer или Int64. Красно-черные деревья могут применяться в качестве ассоциативных списков наряду с другими классами. В каждом случае выбирать структуру для хранения данных надо в зависимости от характера самих данных и применяемых к ним операций. Например, для большого набора данных добавление и удаление отдельных элементов эффективнее выполняется с помощью дерева по сравнению с ассоциативным списком типа AssociationList. В то же время, узлы дерева упорядочены по возрастанию значения ключа, что выгодно отличает деревья от более быстрых хэш-таблиц. Новые узлы добавляются в красно-черное дерево методом Add. Узел с одним и тем же ключом не может быть добавлен дважды. Чтобы считать, изменить или добавить значение типа Pointer, ассоциированное с ключом, можно воспользоваться свойством Items. Это свойство индексируется значением ключа. Метод Remove позволяет удалить узел дерева по известному значению ключа. Кроме того, узел удаляется, если передать указатель на него в метод RemoveNode. Найти узел по значению ключа можно с помощью функции SearchNode. Чтобы найти узел, значение ключа в котором больше (больше или равно) заданного значения, применяется функция SearchFirstGreater ( SearchFirstGreaterOrEqual). Соответственно, чтобы найти последний узел со значением ключа меньшим (меньшим или равным) заданному, вызывается функция SearchLastLesser (SearchLastLesserOrEqual). В классах типа RedBlackTree имеется несколько свойств и методов для осуществления навигации по дереву. Свойство Root возвращает корневой узел дерева. Свойства FirstNode и LastNode возвращают указатели на узлы, которые содержат, соответственно, наименьшее и наибольшее значения ключа. Перейти к узлу, содержащему следующее (по возрастанию) значение ключа, можно с помощью функции NextNode, а к предыдущему значению – с помощью функции PreviousNode. Связанный список TLinkedList Список TLinkedList представляет собой упорядоченный набор элементов, каждый из которых содержит ссылку на предыдущий и последующий элементы. Связанный список удобен для последовательного перебора элементов вперед или назад, а также для добавления и удаления элементов в произвольном месте списка. Этот класс может использоваться, например, для организации очередей, работающих по принципу: "первым пришел – первым вышел", с возможностью добавления элементов в конец очереди и выборки их с начала очереди. Особенностью списка на основе класса TLinkedList является отсутствие возможности индексированного доступа к элементам и свойства, возвращающего количество элементов в списке. Это сделано, чтобы предотвратить случаи неправильного использоваться данного класса. При необходимости обращения к элементам списка по индексу лучше воспользоваться другими классами, такими как TArrayList. Свойство HeadNode экземпляра класса TLinkedList возвращает указатель на первый элемент, т.е. узел, списка. В противоположность этому свойству, TailNode возвращает указатель на последний элемент списка. С помощью этих свойств, а также полей NextNode и PrevNode узла списка TLinkedListNode, представляющих, соответственно, указатель на следующий и предыдущий элементы списка, можно перебрать все элементы списка. Значение типа Pointer узла списка сохраняется в поле Value записи TLinkedListNode. Если свойство OwnValues данного экземпляра TLinkedList равно True, при очистке списка методом Clear или удалении отдельных элементов методами RemoveHead, RemoveTail или Remove, значение Value каждого удаляемого узла списка приводится к типу TObject и для него вызывается метод Free. По умолчанию свойство OwnValues равно False, и метод Free для значений не вызывается. Добавить значение в начало или в конец связанного списка можно, соответственно, функциями AddHead и AddTail, которые возвращают ссылку на добавленный узел. Чтобы вставить значение в произвольное место списка, необходимо воспользоваться функциями InsertBefore или InsertAfter, добавляющими новый элемент перед или после определенного узла списка. Одноименные методы: AddHead, AddTail, InsertBefore, InsertAfter переносят один или несколько узлов из другого или того же списка в новый связанный список или в новое положение. При этом на старом месте узлы удаляются, а на новом появляются без лишнего перераспределения памяти. Функция IsEmpty возвращает True, если список пустой. Функции PopHeadValue, PopTailValue и PopValue возвращают значение, соответственно, первого, последнего и произвольного узлов, а сами узлы удаляют из связанного списка. Обычные и приоритетные очереди Обычные очереди представлены в AcedUtils классом TDoubleEndedQueue, реализующим двухстороннюю очередь элементов (дек). С точки зрения использования, очередь является чем-то средним между динамическим массивом TArrayList и связанным списком TLinkedList. Аналогично связанному списку, добавление и удаление элементов в начале и в конце очереди происходит очень быстро. В то же время, подобно TArrayList, к элементам очереди можно обращаться по числовому индексу. Метод PushFront класса TDoubleEndedQueue помещает значение типа Pointer в начало очереди, метод PushBack – в конец очереди. Соответственно, функция PopFront удаляет из очереди первый элемент и возвращает его как результат, функция PopBack удаляет из очереди последний элемент и возвращает его как результат. Методы RemoveFront и RemoveBack просто удаляют из очереди, соответственно, первый и последний элемент. Метод Swap меняет местами два элемента очереди. Метод Rotate перемещает элемент с указанным индексом и все последующие за ним элементы в начало очереди, а остальные элементы – в конец очереди. RandomShuffle позволяет перемешать все элементы случайным образом. Загрузить элементы очереди из массива указателей можно методом Load класса TDoubleEndedQueue. Наоборот, сохранить все элементы очереди в массиве указателей можно методом Save.  Для вставки одного или нескольких элементов в произвольное место очереди вызывается метод Insert. Для удаления одного или нескольких элементов из произвольного места очереди используется метод RemoveAt. Двухсторонние очереди отличаются по своей внутренней организации от обычных списков на основе динамических массивов. Они хранятся в виде набора блоков памяти фиксированного размера (по 512 байт). Первый и последний блоки наращиваются в противоположных направлениях. За счет этого двухсторонние очереди экономно используют оперативную память. Кроме того, память возвращается системе при первой возможности. Причем, все это происходит не в ущерб производительности. Деки работают чуть медленнее обычных массивов только из-за необходимости двойной индексации элементов. В отличие от обычных очередей, при выборке элемента из приоритетной очереди методом Pop возвращается не первый или последний добавленный элемент, а элемент с максимальным значением. Таким образом, последовательность чтения элементов определяется их приоритетами. В модуле AcedContainers приоритетные очереди представлены классом TPriorityQueue. Внутренний массив приоритетной очереди организован в виде кучи. Добавить элемент в очередь TPriorityQueue можно методом Push, прочитать первый, т.е. максимальный элемент, без его удаления – методом Peek, удалить произвольный элемент очереди по индексу можно методом RemoveAt, очистить очередь – методом Clear. Найти некоторое значение среди элементов приоритетной очереди можно последовательным перебором элементов с помощью методов Search или IndexOf. Модуль AcedStorage Содержит типы и классы, предназначенные для организации объектного хранилища данных на локальном компьютере или на файловом сервере с возможностью многопользовательского доступа. Хранение данных на файловом сервере широко использовалось до появления серверов баз данных. В настоящее время для хранения информации почти всегда используется какой-либо сервер БД, контролирующий соблюдение ограничений и целостность данных. Несмотря на очевидные достоинства такого подхода, в некоторых случаях имеет смысл пожертвовать этими возможностями в обмен на компактный формат хранения данных, высокую производительность при выборке и изменении данных, отсутствие необходимости установки серверной части приложения, объектно-ориентированное представление данных. Возложение ответственности за целостность данных на клиентское приложение приводит к некоторому усложнению кода. Тем не менее, наличие готового механизма разрешения коллизий на файловом сервере в значительной мере облегчает эту задачу. При небольшом объеме хранящихся данных довольно эффективным решением может быть загрузка в память приложения целых таблиц и полная перезапись файлов с данными при их модификации. Недостаток такого способа хранения информации, в отличие от реляционных баз данных, заключается в том, что при изменении даже одного элемента коллекции файл данных приходится переписывать целиком. Чтобы уменьшить значимость этой проблемы можно разбивать большие наборы данных на группы элементов, объединенных по какому-либо признаку, и хранить каждую группу в отдельном файле данных. В памяти следует создать ассоциативный массив, связывающий значение признака с соответствующей коллекцией, представляющей часть общего набора данных. При внесении изменений в одну из таких коллекций нет необходимости перезаписывать другие коллекции того же набора данных. В реляционных базах данных язык SQL можно рассматривать в качестве посредника между потребителем данных (клиентом) и СУБД (сервером). При подготовке и выполнении сложных запросов возникают две проблемы. Во-первых, клиент должен сгенерировать текст запроса в виде предложения на языке SQL. Если структура базы данных включает сложные связи между таблицами, конструирование SQL-запросов представляет собой нетривиальную задачу. Во-вторых, на стороне сервера должен быть произведен разбор полученного SQL-предложения, а затем, с учетом метаданных, оптимизация запроса и выполнение кода для фактической манипуляции данными. Эффективное выполнение SQL-запросов представляет собой научную проблему. С другой стороны, можно изначально отказаться от посредника в виде языка SQL при взаимодействии потребителя с хранилищем данных. Безусловно, такой подход может быть применен только ограниченно, в рамках одного приложения или группы проектов. Однако, при правильной организации структуры данных прямое обращение клиентов к данным хранилища может не только повысить производительность, но и, в конечном счете, уменьшить сложность кода, сократить затраты на разработку и сопровождение приложения, чему способствует, в частности, наличие механизма контроля версий данных. При использовании модуля AcedStorage все данные представляются в виде объектов: таблицы – в виде экземпляров класса TSerializableCollection, записи в таблицах – экземплярами класса TSerializableObject, точнее производных от него классов. Для сортировки и поиска записей применяются индексы – объекты типа TDataIndex. К библиотеке AcedUtils прилагается демонстрационный проект – приложение, использующее для хранения данных и одновременного доступа к данным нескольких пользователей классы из модуля AcedStorage. Пример кратко описывается далее в этой статье. Рассмотрим эти классы подробнее. Класс TSerializableObject Абстрактный базовый класс TSerializableObject используется для создания на его основе класса, описывающего записи таблицы данных. Конструктор этого класса является виртуальным. Он может перекрываться в классах-потомках. Каждый экземпляр TSerializableObject содержит идентификатор типа Integer (свойство ID), значение которого уникально в пределах данной коллекции. При загрузке данных объекта из бинарного потока вызывается метод Load, принимающий два параметра: ссылку на экземпляр класса TBinaryReader, из которого нужно прочитать данные, и число, соответствующее сохраненной версии данных. Понятие версии данных введено для того, чтобы была возможность изменять хранимый формат данных в процессе доработки приложения без необходимости создания специального конвертера данных под новый формат. Каждый объект должен уметь загружать в методе Load любую из своих версий до самой последней, включительно. Число, соответствующее последней, т.е. сохраняемой, версии объекта передается в качестве параметра в конструктор коллекции TSerializableCollection. В методе Load при попытке загрузить данные для версии, которая не поддерживается объектом, следует вызвать процедуру RaiseVersionNotSupported из модуля AcedConsts, в которую передаются параметры: Self и числовое значение версии, которая не может быть загружена. Для сохранения данных объекта в бинарном потоке вызывается метод Save класса TSerializableObject, в который передается ссылка на экземпляр класса TBinaryWriter. В методе Save объект должен записать свои данные в бинарный поток. В каждом классе, унаследованном от TSerializableObject, кроме методов Load и Save должны перекрываться методы Equals для проверки равенства двух экземпляров класса и Clone для создания точной копии данного экземпляра класса. Объекты типа TSerializableObject обычно не создаются сами по себе конcтруктором Create и свойство ID в них не назначается произвольным образом. Все это делается методами коллекции TSerializableCollection, которая полностью управляет временем жизни объектов, загрузкой и сохранением их в бинарном потоке, назначением уникальных идентификаторов, согласованием изменений и прочими аспектами работы с объектами данных. Класс TSerializableCollection Является центральным элементом концепции объектного хранилища данных. Коллекция содержит набор объектов типа, производного от TSerializableObject, который определяется параметром ItemClassType при вызове конструктора класса TSerializableCollection. Таким образом, все элементы коллекции имеют один и тот же  тип. Полиморфизм здесь не используется, т.к. возможность присутствия в коллекции объектов различного типа приводит к неоправданному усложнению механизмов работы с данными. Внутренний массив элементов, к которому можно обратиться через свойство ItemList, упорядочен по возрастанию значений первичного ключа, т.е. ID. Количество элементов в коллекции возвращается свойством Count. Для ускорения поиска элементы коллекции могут хэшироваться по первичному ключу. Чтобы включить хэширование, надо установить в True значение свойства MaintainHash коллекции. По умолчанию для экономии памяти хэширование отключено. Найти элемент коллекции по значению первичного ключа или просто убедиться в том, что элемент с таким ключом присутствует в коллекции, можно с помощью функции Search. Если нужен не сам объект, а его индекс во внутреннем массиве элементов, следует воспользоваться методом IndexOf. Если в коллекции мало элементов и нужно определить индекс одного из них во внутреннем массиве, можно вызвать метод ScanPointer для линейного поиска указателя. Если элементов много, функция IndexOf быстрее найдет нужный элемент методом бинарного поиска. Коллекция может быть загружена из бинарного потока типа TBinaryReader методом Load и сохранена в бинарном потоке типа TBinaryWriter методом Save. Метод Equals поэлементно сравнивает данную коллекцию с другой коллекцией и возвращает True, если все соответствующие элементы обеих коллекций равны. Функция Clone возвращает копию коллекции, содержащую копии всех элементов и каждого из индексов. Если предполагается добавить в коллекцию большое число элементов, можно вызвать метод EnsureCapacity для резервирования места во внутренних массивах коллекции. Для полной очистки коллекции используется метод Clear. При вызове этого метода свойство Changed устанавливается в False, т.к. эта операция не предполагает фактического удаления данных на диске. Например, метод Clear вызывается перед загрузкой с диска обновленных данных коллекции. Чтобы по-настоящему удалить из коллекции все элементы, нужно вызвать метод Delete или DeleteDirect для каждого элемента коллекции. Однако, при монопольном доступе к данным и отсутствии необходимости вызова события OnItemDeleted для каждого удаляемого элемента коллекции, можно очистить ее методом Clear, а затем вручную установить свойство Changed в значение True. Это самый быстрый способ удаления всех данных. Новые элементы коллекции создаются вызовом функции NewItem класса TSerializableCollection. При этом элемент сразу не добавляется в коллекцию. Сначала он должен быть заполнен данными. Затем, для подтверждения изменений вызывается метод EndEdit, который помещает информацию о добавлении новой записи в кэш изменений. Если новая запись не нужна, например, если пользователь нажал кнопку "Отмена" в окне добавления записи, нужно вызвать метод CancelEdit для освобождения памяти, занятой новым элементом. При необходимости корректировки данных нельзя вносить изменения непосредственно в элементы списка ItemList коллекции. Вместо этого, должен быть вызван метод BeginEdit, в который передан идентификатор изменяемого элемента коллекции. Метод BeginEdit возвращает ссылку на копию элемента, в которую можно вносить изменения. Затем эта копия передается в методы EndEdit для подтверждения изменений или CancelEdit для отмены изменений. Удалить элемент коллекции можно вызовом метода Delete с передачей в него идентификатора удаляемого элемента. Все описанные выше манипуляции с объектами не затрагивают основной список элементов ItemList, т.е. фактический набор данных коллекции. Изменения кэшируются во внутренних массивах: InsertedItemList и DeletedItemList с числом элементов, соответственно, InsertedCount и DeletedCount. В первом из этих массивов находятся элементы, добавленные в коллекцию, а также исправленные, т.е. новые, версии измененных объектов. Во втором массиве находятся удаленные объекты и исходные, т.е. старые, версии измененных объектов. Эти массивы отсортированы в порядке убывания идентификаторов элементов. Проверить наличие кэшированных изменений вообще или изменений для элемента с конкретным идентификатором можно вызовом функции HasChanges. Чтобы применить кэшированные изменения к основному набору элементов используется метод ApplyChanges. Обычно перед вызовом этого метода проверяется наличие обновленных данных на файловом сервере. Если версия файла данных на сервере изменилась, коллекция перечитывается с диска и изменения применяются к новым данным. Управление версиями файлов будет рассмотрено далее в этом разделе. В классе TSerializableCollection предусмотрены специальные события: OnItemInserted, OnItemChanged, OnItemDeleted, которые инициируются, соответственно, при добавлении, изменении и удалении элемента основного набора данных коллекции. Метод ApplyChanges может вернуть одно из следующих значений: appChangesOk (изменения применены успешно), appChangesOriginalObjectChanged (произошла ошибка, связанная с тем, что изменяемый элемент коллекции был одновременно изменен другим пользователем), appChangesUniqueIndexViolation (ошибка, возникающая при попытке вставить значение, нарушающее уникальность одного из индексов коллекции, который не допускает дублирования значений). Чтобы очистить кэш изменений без фактической модификации данных используется метод RejectChanges. Поясним работу с первичными ключами элементов коллекции. При создании нового элемента методом NewItem свойству ID этого элемента присваивается временное отрицательное значение, которое последовательно уменьшается для каждого следующего создаваемого элемента. При вызове ApplyChanges для добавляемого элемента временное значение ID заменяется настоящим идентификатором, который создается функцией GenerateID коллекции. При изменении идентификатора объекта в коллекции инициируется событие OnItemIDChanged, чтобы можно было обновить внешние ключи в элементах других коллекций, ссылающихся на добавленный элемент. В экземпляре класса TSerializableCollection предполагается, что элементы сохраняют значение свойства ID в виде числа типа Integer. Если заранее известно, что число элементов коллекции не превысит 65535, можно хранить уникальные идентификаторы как 2-байтные значения типа Word. Тогда вместо класса TSerializableCollection надо использовать производный от него класс TWordPrimaryKeyCollection, в котором перекрывается метод GenerateID, чтобы значения первичного ключа не превышали 65535. Если в коллекции может быть не более 255 элементов, имеет смысл хранить ID как один байт. Тогда в качестве коллекции нужно использовать класс TBytePrimaryKeyCollection. Возможна также ситуация, когда вообще нет смысла сохранять уникальный идентификатор вместе с данными объекта. Значение ID может динамически назначаться в момент загрузки коллекции из бинарного потока. Для реализации такой возможности предусмотрен класс TFakePrimaryKeyCollection. При отказе от хранения идентификатора возникает проблема удаления элементов в режиме многопользовательского доступа, т.к. после удаления элемента и повторной загрузки коллекции динамические идентификаторы следующих за ним элементов изменятся. Таким образом, при работе с TFakePrimaryKeyCollection в режиме многопользовательского доступа удаление отдельных элементов коллекции должно быть запрещено. В классе TSerializableCollection есть еще пара методов для работы с данными в обход кэша изменений. Метод EndEditDirect подтверждает изменение или добавление нового элемента аналогично методу EndEdit, а затем сразу применяет это изменение к основному набору данных, что эквивалентно вызову метода ApplyChanges с идентификатором только что измененного или добавленного объекта. Метод DeleteDirect удаляет элемент с указанным идентификатором из основного набора данных. Методы EndEditDirect и DeleteDirect подходят для работы с данными в режиме монопольного доступа, когда другие пользователи не имеют возможности изменить файл данных одновременно с текущими изменениями. Каждая коллекция, не являющаяся частью какого-либо объекта, хранится на диске в виде отдельного файла. Для загрузки коллекции из файла предназначен метод LoadFile класса TSerializableCollection, для ее сохранения в файле – метод SaveFileDirect. Второй метод не предназначен для работы с данными в режиме многопользовательского доступа, т.к. он перезаписывает любые изменения, сделанные другими пользователями. При одновременной работе нескольких пользователей для сохранения изменений необходимо открыть файл данных методом OpenFile, затем применить кэшированные изменения к данным методом ApplyChanges. Если изменения применены успешно, можно сохранить коллекцию на диске вызовом метода SaveIfChanged. Если во время применения изменений к данным произошла ошибка, необходимо восстановить исходное состояние набора данных в памяти. Для этого используется метод UndoIfChanged коллекции при открытом файле данных. В конце операции файл данных должен быть закрыт методом CloseFile. Данные коллекции могут сохраняться на диске в упакованном виде. Для этого в методы OpenFile и SaveFileDirect передается параметр CompressionMode, который, если он отличен от dcmNoCompression, задает режим сжатия записываемого файла данных (одна из констант, перечисленных в описании модуля AcedCompression). Не следует, однако, применять сжатие к файлам, которые содержат часто изменяемые данные, так как это может значительно понизить общую производительность системы, особенно в режиме многопользовательского доступа к данным. В упакованном виде лучше хранить справочники, коды и прочие данные, которые меняются редко. В методы LoadFile, OpenFile и SaveFileDirect передается также параметр EncryptionKey. Он позволяет указать ключ для шифрования файла данных методом RC6. При использовании шифрования, данные, кроме всего прочего, защищаются цифровой сигнатурой SHA-256. Так же как и сжатие, шифрование не стоит использовать для часто изменяемых данных без крайней необходимости. Несколько пользователей могут одновременно читать данные из одного файла методом LoadFile. Однако, если кто-либо открыл файл методом OpenFile, другие пользователи не могут открыть этот файл для чтения или для записи, пока он не будет закрыт методом CloseFile. При отказе в открытии файла на экране появляется сообщение для пользователя с предложением подождать или повторить попытку открытия файла. Кроме того, пользователь может отменить текущую операцию, в результате чего методы LoadFile, OpenFile и SaveFileDirect вернут значение False. При успешном открытии файла эти методы возвращают True. В первых четырех байтах файла данных хранится его версия – число, которое изменяется при каждом сохранении данных на диске. Если основной набор данных коллекции не менялся с момента ее загрузки в память или с момента предыдущего сохранения на диске (свойство Changed коллекции равно False), и при вызове метода LoadFile оказывается, что версия файла данных не изменилась за это время, то фактического считывания данных не происходит, так как в этом нет необходимости. То же самое происходит при открытии файла методом OpenFile. Это позволяет уменьшить нагрузку на файловый сервер, сократить объем информации, передаваемой по сети, и в целом повысить производительность приложения. Индексы для коллекции В коллекции TSerializableCollection элементы упорядочены по возрастанию значения уникального идентификатора элемента. Такой порядок не всегда удобен. Например, конечному пользователю обычно нужен список, отсортированный по именам или по датам и т.п. С этой целью при создании коллекции в конструктор класса TSerializableCollection передается массив, содержащий так называемые индексы – объекты, задающие альтернативный порядок сортировки элементов коллекции. Индексы должны быть созданы заранее, до вызова конструктора коллекции. Все индексы представляются экземплярами классов, производных от TDataIndex. Конкретный класс выбирается в зависимости от типа признака, по которому сортируются данные. Если этот признак – строка (например, наименование объекта), создается индекс типа TStringIndex; если признак – дата, используется класс TDateTimeIndex и т.д. Есть еще специальный класс TCompoundIndex, предназначенный для сортировки элементов коллекции сразу по нескольким признакам. Индексы предназначены не только для задания порядка элементов коллекции. Основной причиной использования индексов является необходимость быстрого поиска элементов по значению индексируемого признака. Индексы позволяют не только быстро находить отдельные элементы, но также выделять группы элементов, для которых значение признака лежит в определенном интервале. Кроме того, индексы могут быть уникальными, т.е. не допускающими дублирования значения признака. При добавлении и изменении элементов коллекция опрашивает все свои уникальные индексы на предмет того, не вызовет ли каждое конкретное изменение нарушения уникальности какого-либо индекса. Если такая ситуация имеет место, предполагаемые изменения отклоняются. Изначально все индексы находятся в неактивном состоянии, т.е. не занимают память и не обновляются при каждом изменении коллекции. При попытке воспользоваться индексом, например, для поиска элемента, индекс автоматически активизируется. Его состоянием можно управлять с помощью свойства Active, объявленного в классе TDataIndex. Следует обратить внимание на то, что в часто изменяемых коллекциях лучше постоянно держать все уникальные индексы в активном состоянии. В противном случае, при любом изменении данных выполняется медленный последовательный перебор элементов коллекции индексом для выяснения того, что значение индексируемого признака измененного элемента уникально в пределах набора данных. Каждый активный индекс содержит полный набор элементов коллекции, отсортированный по значению соответствующего признака. Свойство Descending индекса по умолчанию равно False. Это означает, что элементы сортируются по возрастанию значения признака. Если свойство Descending равно True, элементы сортируются по убыванию значения признака. Для класса TStringIndex, если свойство CaseSensitive равно False, при сортировке и поиске элементов с помощью индекса регистр символов не принимается во внимание. Если это свойство равно True, регистр символов учитывается. К элементам сортированного списка можно обратиться через свойство ItemList индекса, которое возвращает массив указателей на элементы коллекции – экземпляры класса TSerializableObject. Число элементов в этом массиве определяется свойством Count основной коллекции, к которой можно обратиться через свойство Owner индекса. Свойство Unique определяет, является ли данный индекс уникальным. Значение этого свойства передается в конструктор класса индекса и в дальнейшем не может быть изменено. Кроме того, при создании индекса в его конструктор обычно передается адрес функции, которая возвращает значение индексируемого признака для элемента коллекции. В случае класса TCompoundIndex вместо этого передается адрес функции, которая сравнивает между собой два элемента коллекции. В каждом индексе есть методы для поиска элементов. Метод ScanPointer выполняет линейный поиск указателя во внутреннем массиве индекса. Этим методом стоит пользоваться, только если никакие другие не подходят. Метод Contains возвращает True, если в коллекции присутствует элемент с указанным значением признака. Функция IndexOf находит во внутреннем массиве первый элемент с определенным значением признака и возвращает его индекс в качестве результата, а функция Search в аналогичной ситуации возвращает сам элемент. Во всех индексах, кроме TCompoundIndex, есть функции SelectRange для нахождения диапазона во внутреннем массиве, в котором значение признака больше или равно значению Key1 и меньше значения Key2. При сортировке элементов по убыванию эти функции выделяют диапазон, в котором значение признака меньше или равно значению Key1 и больше значения Key2. Имеется также вариант этой функции, которая возвращает индекс первого элемента массива, для которого индексируемый признак больше или равен (меньше или равен в случае, когда Descending равно True) указанному значению. В классе TStringIndex есть еще метод StartsWith для выделения диапазона во внутреннем массиве, где значение признака для всех элементов начинается с указанной подстроки с учетом или без учета регистра символов в зависимости от значения свойства CaseSensitive. Модуль AcedExcelReport Предназначен для генерации отчетов с помощью пакета Microsoft Excel. Отчеты создаются на основе XLT-шаблонов или как новые рабочие книги. При построении отчетов, кроме AcedExcelReport, используются модули: Variants, ActiveX, ComObj и, главное, Excel97, содержащий данные библиотеки типов Microsoft Excel. Версии этой библиотеки для Office 2000 и Office XP мало чем отличаются от Excel 97 с точки зрения возможностей, используемых при генерации отчетов. Однако, при подключении к программе модулей Excel2000 и ExcelXP нарушается совместимость со старой версией Microsoft Excel 97. При построении отчетов в Excel через COM-интерфейсы особое внимание следует уделить сокращению числа обращений к серверу, особенно через интерфейс IDispatch. Например, вместо того, чтобы последовательно заполнять данными отдельные ячейки прямоугольной области рабочего листа, гораздо эффективнее создать в памяти вариантный массив, заполнить его, и передать в Excel сразу все значения ячеек прямоугольной области. Построение отчета обычно начинается с подготовки данных, которые нужно представить в виде таблицы. При этом могут создаваться временные списки типа TArrayList для группирования, сортировки данных и т.п. Затем, когда уже известно количество элементов в каждой области отчета, создаются массивы типа Variant вызовом функции VarArrayCreate из модуля Variants. В эту функцию передаются диапазоны индексов создаваемого массива и тип элементов массива, который может быть равен varVariant, если в массив помещаются данные различного типа. При создании вариантного массива для последующего проецирования его на рабочий лист Microsoft Excel надо учитывать, что первый индекс в этом массиве задает строку, а второй – столбец рабочего листа. После создания массива он заполняется данными, которые нужно показать в отчете. Все значения типа Currency должны быть преобразованы к типу Double функцией G_ CurrencyToDouble из модуля AcedCommon перед помещением их в вариантный массив или в ячейку рабочего листа. Для подсчета итоговых сумм лучше использовать функции рабочего листа, а не вычислять эти суммы в процессе группирования данных и не помещать их в отчет в виде готовых чисел. Следующим этапом после подготовки данных и заполнения вариантных массивов является запуск приложения Microsoft Excel и создание рабочей книги. Для запуска Microsoft Excel вызывается функция StartExcel из модуля AcedExcelReport. Если на компьютере пользователя Microsoft Excel не установлен, на экране появляется соответствующее сообщение для пользователя и функция возвращает False. В случае успеха она возвращает True. Если Excel уже запущен, функция StartExcel ничего не делает, просто возвращает True. Для создания новой рабочей книги вызывается функция CreateExcelWorkbook. В нее как var-параметр передается переменная типа Excel97._Workbook, в которой затем сохраняется ссылка на созданный экземпляр рабочей книги. Один из вариантов функции CreateExcelWorkbook создает пустую рабочую книгу с заданным числом листов. Другой вариант этой функции создает рабочую книгу на основе указанного XLT-шаблона. В случае успеха эта функция возвращает True, а если в процессе создания рабочей книги произошло исключение, оно перехватывается и функция возвращает False. После этого настраивается внешний вид рабочей книги. Это делается вызовом процедуры InitializeExcelWorkbook. При этом можно определить заголовок окна, в котором показывается отчет, а также указать на необходимость или отсутствие необходимости отображения ярлычков листов рабочей книги, нулевых значений на листе, заголовков строк и столбцов ( A, B, C…1, 2, 3…), линий сетки, горизонтальной и вертикальной полосы прокрутки рабочего листа. Получить ссылку на первый лист рабочей книги можно следующим образом: (WB.Worksheets[1] as _Worksheet), где WB – ссылка на рабочую книгу. Диапазон всех ячеек рабочего листа возвращается функцией Get_Cells, вызванной для экземпляра класса _Worksheet. Ссылку на этот диапазон лучше сразу сохранить в отдельной переменной, чтобы впоследствии передавать ее в качестве параметра в различные функций из модуля AcedExcelReport. Следует обратить внимание на то, что по умолчанию нумерация строк и столбцов на рабочем листе начинается с единицы. Если предпочтительно использовать нумерацию с нуля, можно установить в единицу глобальные переменные ExcelRowOffset и ExcelColumnOffset, объявленные в модуле AcedExcelReport. Значения этих переменных прибавляются, соответственно, к номеру строки и номеру столбца при вызове любой функции из AcedExcelReport, в которую передается номер строки и/или номер столбца. Переменные ExcelRowOffset и ExcelColumnOffset позволяют произвольным образом задать начало отсчета на рабочем листе. Например, если таблица данных начинается с ячейки B5, можно присвоить ExcelRowOffset значение 5, а ExcelColumnOffset значение 2 и при обращении к ячейкам таблицы данных использовать индексацию с нуля. Эти переменные обнуляются при вызове процедуры InitializeExcelWorkbook. Обратиться к запущенному экземпляру приложения Microsoft Excel можно через глобальную переменную ExcelApp, объявленную в модуле AcedExcelReport. Для завершения работы приложения Microsoft Excel и выгрузки его из памяти предназначена процедура ShutdownExcel. Обычно ее не нужно вызывать из прикладной программы, т.к. ShutdownExcel вызывается из раздела finalization модуля AcedExcelReport. Классы TExcelRange, TExcelInterval Эти классы используются для группирования ячеек рабочего листа. Экземпляр класса TExcelInterval представляет собой прямоугольный диапазон ячеек, экземпляр TExcelRange – коллекцию прямоугольных диапазонов. Когда экземпляр класса TExcelRange проецируется на рабочий лист, вся коллекция диапазонов может быть представлена одним объектом типа Excel97.ExcelRange. Таким образом можно применять различные операции, например, заливку фона ячеек или прорисовку границ, ко всему диапазону сразу, даже если он содержит несмежные ячейки. В модуле AcedExcelReport коллекция интервалов TExcelRange используется, кроме того, для получения текстовой ссылки на диапазон ячеек, которая передается в качестве аргумента для функций рабочего листа, типа "СУММ" или "СЧЁТ". При создании интервала, т.е. экземпляра класса TExcelInterval, в его конструктор передается номер столбца, строки и, возможно, число строк и столбцов в интервале. Если число строк и столбцов не указано, создается интервал, состоящий из одной ячейки. Кроме того, можно создать интервал, который представляет все ячейки одной или нескольких строк или все ячейки одного или нескольких столбцов рабочего листа. Чтобы спроецировать интервал на рабочий лист, т.е. получить объект типа Excel97.ExcelRange, нужно вызвать функцию GetRange. Для того, чтобы проверить равенство двух интервалов, используется функция Equals. Метод Clone возвращает экземпляр класса, представляющий копию интервала. В классе TExcelInterval имеются свойства, возвращающие номер первой и последней строк интервала, а также номера первого и последнего столбцов. Экземпляр класса TExcelRange создается в виде пустой коллекции. Но в его конструктор можно передать данные первого интервала, который сразу будет добавлен в коллекцию. Кроме того, коллекция интервалов может быть создана на основе другого экземпляра TExcelRange. В этом случае в нее добавляются копии всех интервалов исходной коллекции. Новые интервалы добавляются в коллекцию методами Add, AddRows, AddColumns. Чтобы полностью очистить коллекцию и освободить память, занимаемую каждым интервалом, используется метод Clear. К отдельным интервалам в составе коллекции можно обратиться через свойство Intervals. Число интервалов возвращается свойством IntervalCount. Метод Equals сравнивает коллекцию с другой коллекцией интервалов. Если две коллекции содержат одни и те же (равные) интервалы, метод возвращает True, если есть какие-либо различия, возвращается False. Метод Clone возвращает копию коллекции, содержащую копии каждого интервала. Для удобства использования интервалы могут быть отсортированы методом EnsureSorted коллекции. Сортировка выполняется по строкам, а затем по столбцам левой верхней ячейки интервала. Чтобы получить объект типа Excel97. ExcelRange представляющий коллекцию интервалов TExcelRange, надо вызвать функцию GetRange этого класса. Методы GetAbsoluteAddress и GetRelativeAddress класса TExcelRange возвращают текстовую строку, содержащую ссылку на все ячейки коллекции интервалов. Первый метод отличается от второго тем, что он возвращает абсолютную ссылку, т.е., например, строку "R1C1: R2C5;R6: R8". Второй метод возвращает строку, содержащую ссылку относительно указанной ячейки. Например, для той же коллекции интервалов ссылка относительно ячейки R2C5 представляется строкой: "R[-1]C[-4]: RC;R[4]:R[6]". Функции для построения отчета В модуле AcedExcelReport определены глобальные функции, часто используемые при построении отчетов. Для выполнения других действий можно обращаться к объектам Microsoft Excel через интерфейсы, объявленные в модуле Excel97, сгенерированном из библиотеки типов. В AcedExcelReport есть несколько функций, возвращающих ссылку на диапазон ячеек рабочего листа, т.е. объект типа Excel97.ExcelRange. В частности, функция GetExcelCell возвращает ячейку рабочего листа, находящуюся на пересечении заданной строки и столбца; функция GetExcelRange возвращает прямоугольный диапазон ячеек. Функция GetNamedExcelRange возвращает именованный диапазон ячеек. Функции GetExcelRows и GetExcelColumns возвращают диапазоны, состоящие из всех ячеек определенных строк или столбцов. Чтобы установить значение ячейки или поставить вариантный массив в соответствие ячейкам прямоугольного диапазона, нужно получить ссылку на диапазон функциями GetExcelCell или GetExcelRange, а затем присвоить соответствующее значение свойству Value этого диапазона. То же самое касается, например, изменения шрифта текста с помощью свойства Font диапазона ячеек, задания режима горизонтального/вертикального выравнивания текста с помощью свойств: HorizontalAlignment, VerticalAlignment, задания режима переноса текста свойством WrapText, а также объединения ячеек рабочего листа вызовом метода Merge диапазона ячеек. Функция InsertExcelRows предназначена для вставки на рабочем листе одной или нескольких строк перед указанной строкой. Функция InserExceltColumns вставляет один или несколько столбцов перед указанным столбцом. Процедуры AssignAbsoluteFormula и AssignRelativeFormula используются для назначения ячейкам рабочего листа формул, реализующих групповые операции, такие как суммирование данных, нахождение максимального значения в диапазоне, подсчет числа непустых ячеек и т.д. При записи формулы адрес обрабатываемого диапазона ячеек указывается в виде абсолютной ссылки (процедурой AssignAbsoluteFormula) или в виде относительной ссылки (процедурой AssignRelativeFormula). Строку, содержащую абсолютную ссылку на прямоугольный диапазон ячеек, можно получить вызовом функции GetAbsoluteAddress. Аналогичную строку, содержащую относительную ссылку на диапазон ячеек, возвращает функция GetRelativeAddress. Для форматирования границ ячеек вызывается процедура DrawExcelBorders. В нее передается диапазон ячеек в виде объекта Excel97.ExcelRange. Второй параметр (CellBorders) выбирает, какие именно границы ячеек должны отображаться. Здесь передается одна из констант xlcb… или комбинация таких констант. Остальные параметры процедуры DrawExcelBorders задают толщину, стиль и цвет линий. Чтобы, наоборот, удалить прорисовку границ используется процедура ClearExcelBorders. Для применения заливки к диапазону ячеек рабочего листа вызывается процедура FillExcelInterior. Кроме ссылки на диапазон ячеек в нее передается цвет заливки (одна из констант xlColor…), шаблон, накладываемый поверх заливки (одна из констант xlPattern, объявленных в модуле Excel97) и цвет линий шаблона. После того, как содержимое отчета полностью подготовлено, можно воспользоваться процедурами FreezeExcelRows и FreezeExcelColumns, чтобы облегчить просмотр данных. Эти процедуры задают, соответственно, строки и столбцы, которые не должны перемещаться при прокрутке окна рабочей книги. Иногда бывает удобно выделить шапку таблицы, чтобы она всегда была на экране независимо от длины таблицы. Если предполагается, что пользователь не будет изменять готовый отчет, можно вызвать процедуру ProtectExcelWorksheet для защиты рабочего листа от случайных изменений. Если просматривать отчет удобнее в режиме панорамирования, можно воспользоваться процедурой G_ToggleKey из модуля AcedCommon для включения режима Scroll Lock клавиатуры. После выполнения всех подготовительных действий вызывается процедура ShowExcelWorkbook, в которую передается ссылка на рабочую книгу, полученная ранее при вызове функции CreateExcelWorkbook. Процедура ShowExcelWorkbook отображает рабочую книгу на экране и устанавливает ее свойство Saved в значение True, чтобы при закрытии книги не спрашивалось, нужно ли сохранять изменения. Описание демонстрационного проекта Кроме исходного кода модулей библиотека AcedUtils включает пример, реализующий полноценное приложение для работы с данными на основе коллекций из модуля AcedStorage. Пример включает несколько отчетов, которые строятся с помощью функций из модуля AcedExcelReport. Рассмотрим подробнее задачу, решаемую этим приложением, и некоторые особенности реализации хранилища данных на основе файлового сервера. Программа предназначена для учета товаров, поступающих от различных поставщиков. Товары классифицируются по категориям. Основные типы и наборы данных, используемые приложением, описываются в модуле DataTypes, являющемся аналогом модуля данных. Структура базы данных состоит из трех таблиц: поставщики товаров (коллекция Suppliers), категории товаров (коллекция Categories) и сами товары (коллекция Products). Каждая из этих сущностей описывается классом, производным от класса TSerializableObject из модуля AcedStorage. Атрибуты сущностей, т.е. поля таблиц базы данных, представляются свойствами этих классов. Обычно каждому такому свойству соответствует private-поле в классе объекта, используемое для хранения значения этого свойства. Кроме того, в модуле DataTypes имеется класс TPictureObject, предназначенный для сохранения в бинарном потоке и чтения из потока данных объекта типа TPicture. Этот класс используется для хранения изображения, ассоциированного с категорией товаров, которая представляется классом TCategoryObject. Класс TSupplierObject описывает поставщика товара. Он включает свойства: ID – уникальный идентификатор записи (наследуется от класса TSerializableObject); CompanyName – наименование поставщика; Country – страна поставщика; CityRegion – строка с названием города и, возможно, области; Address – адрес поставщика; PostalCode – почтовый индекс; PhoneFax – номера телефонов и факсов; HttpEmail – адреса электронной почты и web-сайта поставщика; ContactPerson – представитель поставщика, с которым поддерживается контакт; Comments – дополнительная информация о поставщике. Как и во всяком классе, производном от TSerializableObject, в классе TSupplierObject перекрываются методы: Load, Save, Equals, Clone базового класса. В частности, в методе Load выполняется чтение состояния объекта из бинарного потока. Значения всех полей, в том числе FID, унаследованного из TSerializableObject, считываются методами класса TBinaryReader. Метод Save помещает соответствующие данные в бинарный поток, представляемый классом TBinaryWriter. На примере класса TSupplierObject демонстрируется один из приемов оптимального использования пространства в бинарном потоке. Вместо того, чтобы сохранять все подряд значения полей, в методе Save создается переменная Flags, содержащая битовую карту используемых полей, т.е. полей, значения которых отличны от значений по умолчанию. Эта битовая карта помещается в бинарный поток в виде однобайтного значения. Затем в потоке сохраняются значения только тех полей, которые помечены как используемые. В методе Load сначала считывается битовая карта, а затем значения полей, которые помечены в ней единичными битами. В методе Equals класса TSupplierObject выполняется сравнение значений каждого из полей объекта с соответствующими полями другого экземпляра того же класса. Если все поля обоих экземпляров равны, функция возвращает True, в противном случае – False. Метод Clone создает новый экземпляр класса TSupplierObject и копирует в него значения всех полей данного объекта, включая поле FID, унаследованное от класса-предка. Класс TCategoryObject предназначен для описания категории товара. Он содержит наименование категории (свойство CategoryName), комментарий (свойство Comments) и рисунок, иллюстрирующий данную категорию (свойство Picture). Кроме того, класс TCategoryName включает свойство ID, унаследованное от класса-предка TSerializableObject. Аналогично TSupplierObject, в данном классе перекрываются методы Load, Save, Equals и Clone базового класса. Кроме того, перекрывается виртуальный конструктор Create для создания объекта типа TPictureObject, представляющего рисунок, и метод Destroy для освобождения этого объекта. Следует обратить внимание на то, как в этом классе сохраняется и считывается значение уникального идентификатора записи – поля FID базового класса TSerializableObject. Предполагается, что число возможных категорий товара не превышает 255, поэтому идентификатор записи хранится в виде байта, а не значения типа Integer. При этом сама коллекция категорий товаров представляется экземпляром класса TBytePrimaryKeyCollection. Класс TProductObject содержит свойства, используемые при описания товара: ID – уникальный идентификатор записи; ProductName – наименование товара; SupplierID – внешний ключ, содержащий ссылку на элемент коллекции Suppliers, представляющий поставщика товара; CategoryID – внешний ключ, содержащий ссылку на элемент коллекции Categories, представляющий категорию товара; QuantityPerUnit – строка, описывающая единицу измерения товара; UnitPrice – цена единицы товара; UnitsInStock – количество товара на складе; UnitsOnOrder – ожидаемое количество товара; Discontinued – признак того, что поставки товара прекращены; Little – признак того, что на складе осталось мало соответствующего товара. На примере класса TProductObject демонстрируется работа с версиями объектов. Предполагается, что в первоначальной версии данного класса отсутствовало свойство Little, оно было добавлено во второй версии. Сохраняемая версия элементов коллекции определяется параметром Version при вызове конструктора класса данной коллекции. Так, при вызове конструктора для коллекции Products во втором параметре передается значение 2. В методе Load класса TProductObject проверяется значение параметра Version. Если версия равна 1, данные сохранены в исходном формате, т.е. без поля FLittle. Если сохраненная версия данных равна 2, в бинарном потоке присутствует значение поля FLittle, которое должно быть прочитано методом ReadBoolean класса TBinaryReader. Класс TPictureObject, используемый для хранения рисунка, иллюстрирующего категорию товара, может сам по себе найти применение во многих приложениях. Он позволяет сохранять в бинарном потоке растровый рисунок (TBitmap), метафайл ( TMetafile) или иконку (TIcon), которые представляются классом TPicture из модуля Graphics. Причем, данные изображения постоянно находятся в упакованном виде и распаковываются только, когда нужно загрузить изображение в объект TPicture. Метод Load класса TPictureObject считывает изображение из объекта TPicture, бинарного потока, представленного классом TBinaryReader, или другого экземпляра класса TPictureObject. Метод Save сохраняет изображение в потоке. Метод Assign загружает рисунок в объект TPicture. Функция Equals возвращает True, если данный экземпляр класса TPictureObject, содержит то же самое изображение, что и экземпляр, переданный в функцию как параметр. Свойства IsBitmap, IsMetafile, IsIcon класса TPictureObject позволяют проверить тип изображения, представленного объектом. Свойство Bytes возвращает указатель на массив байт, содержащий упакованное изображение. Свойство Length – длину этого массива в байтах. Коллекции Suppliers, Categories, Products создаются процедурой CreateCollections в модуле DataTypes, которая вызывается из раздела инициализации этого модуля. Перед созданием каждой из коллекций создаются индексы, предназначенные для упорядочивания элементов коллекций по какому-либо признаку. Так, поставщики сортируются по значению свойства CompanyName, т.е. по наименованию поставщика, список категорий – по наименованию категории, товары – по наименованию товара, идентификатору поставщика и идентификатору категории. Индексы по наименованиям являются уникальными, что обеспечивает отсутствие в коллекциях элементов с дублирующимися наименованиями. Индексы по внешним ключам в коллекции товаров используются для проверки наличия подчиненных записей в таблице товаров при попытке удаления записи из главной таблицы – коллекции поставщиков или коллекции категорий товаров. Так как количество поставщиков может быть большим, для коллекции Suppliers включается режим хэширования элементов по значению уникального идентификатора (свойство MaintainHash устанавливается в True). Уничтожаются коллекции процедурой FreeCollections, вызываемой из раздела finalization модуля DataTypes. Для удобства загрузки и сохранения коллекций в модуле DataTypes определены глобальные функции, такие как LoadSuppliers, LoadProducts, SaveSuppliers и т.п., предназначенные для работы с данными в режиме многопользовательского доступа. Функция LoadSuppliers и аналогичные ей функции для загрузки коллекций Categories и Products просто вызывают метод LoadFile соответствующей коллекции и передают в него имя файла данных и, в случае коллекции поставщиков, пароль для дешифрования файла данных. Функции для сохранения изменений в файле реализуют более сложный алгоритм. Рассмотрим его на примере функции SaveSuppliers, используемой для сохранения на диске коллекции поставщиков. В начале функции с помощью свойства HasChanges проверяется наличие в памяти каких-либо кэшированных изменений для коллекции Suppliers. Если изменений нет, то отсутствует необходимость перезаписи файла данных. Если изменения есть, соответствующий файл данных открывается методом OpenFile коллекции. При этом указывается пароль, используемый для шифрования и дешифрования данных коллекции, а также указывается константа dcmFast, включающая режим быстрого сжатия данных для экономии места на диске и сокращения объема информации, пересылаемой по сети. В случае невозможности открытия файла данных (например, если этот файл открыт для записи другим пользователем и его приложение почему-то зависло), кэш изменений очищает и на экран выводится сообщение об ошибке. После того, как файл данных успешно открыт и, при наличии в нем изменений, перечитан с диска, для коллекции Suppliers вызывается метод ApplyChanges. Этот метод применяет кэшированные изменения к набору данных коллекции. Если изменения применены успешно, коллекция сохраняется на диске вызовом метода SaveIfChanged. Если в процессе применения изменений возникли какие-либо проблемы, данные коллекции перечитываются с диска методом UndoIfChanged, а затем на экран выводится сообщение об ошибке. Метод UndoIfChanged перечитывает данные с диска только в случае, если коллекция содержит изменения, т.е. ее свойство Changed равно True. В конце работы файл данных должен быть обязательно закрыт методом CloseFile коллекции. Для большей надежности вызов метода CloseFile помещается в раздел finally блока try-finally структурированной обработки исключений. Рассмотрим, как выполняется добавление, изменение, удаление записей на примере коллекции поставщиков. Корректировка списка поставщиков производится с помощью формы TSuppliersForm, определенной в модуле SuppliersUnit. При этом используется глобальная переменная SupplierObject типа TSupplierObject, объявленная в модуле DataTypes. Когда пользователь хочет добавить в список нового поставщика и нажимает соответствующую кнопку, вызывается функция NewItem коллекции Suppliers, создающая новый экземпляр класса TSupplierObject, который затем присваивается глобальной переменной SupplierObject. Для ввода данных о новом поставщике на экране отображается форма TSupplierForm из модуля SupplierUnit. Эта форма позволяет пользователю скорректировать значения свойств экземпляра класса TSupplierObject, назначенного переменной SupplierObject. Когда пользователь заполнит все необходимые поля и нажмет кнопку для сохранения изменений, выполняется предварительная проверка введенных данных. Например, проверяется, что наименование поставщика не является пустой строкой и что это наименование не дублируется в списке. Позже, при сохранении данных, это привело бы к ошибке, вызванной нарушением уникальности индекса, и откату всех изменений. Такие ошибки удобнее выявлять на этапе предварительной проверки, чтобы позволить пользователю исправить некорректно введенные данные. Если предварительная проверка прошла успешно, форма ввода данных закрывается, для коллекции Suppliers вызывается метод EndEdit, сохраняющий информацию о добавлении записи в кэше изменений. Затем вызывается рассмотренная выше глобальная функция SaveSuppliers из модуля DataTypes для применения кэшированных изменений к набору данных и сохранения коллекции на диске. Если пользователь отказался от сохранения изменений закрытием по Escape формы ввода данных, вызывается метод CancelEdit коллекции Suppliers для уничтожения объекта, присвоенного переменной SupplierObject. Корректировка записи о поставщике отличается от добавления нового поставщика только тем, что в начале вместо NewItem вызывается функция BeginEdit коллекции поставщиков Suppliers, в которую передается идентификатор редактируемого элемента коллекции. Когда пользователь удаляет поставщика из коллекции Suppliers, на экране сначала появляется окно для подтверждения удаления записи. Затем открывается файл данных для коллекции товаров Products вызовом метода OpenFile. Используя индекс по внешнему ключу SupplierID коллекции Products, проверяется наличие в списке товаров элемента, ссылающегося на удаляемого поставщика. Если такой товар присутствует в списке, поставщик не может быть удален. Если на этого поставщика никто не ссылается, для коллекции Suppliers вызывается метод Delete, в который передается идентификатор удаляемого элемента. Затем вызывается функция SaveSuppliers для фактического удаления записи из набора данных и сохранения измененной коллекции на диске. Файл данных коллекции Products закрывается только после сохранения всех изменений в коллекции Suppliers. Это нужно, чтобы другой пользователь не мог в момент удаления поставщика добавить товар, который на него ссылается. С этой же целью в момент сохранения коллекции товаров Products вызовом глобальной функции SaveProducts для каждого добавленного или измененного товара проверяется наличие в коллекции Suppliers поставщика, идентификатор которого назначен свойству SupplierID данного товара. Заключение В статье описана библиотека функций и классов AcedUtils, призванная помочь разработчику на Borland Delphi в создании быстрых и экономичных с точки зрения использования ресурсов памяти и дискового пространства приложений, работающих на платформе Win32. Оставить комментарий Комментарий: можно использовать BB-коды Максимальная длина комментария - 4000 символов.   Комментарии 1. 50K 23 мая 2009 года gul 0 / / 23.05.2009 Мне нравитсяМне не нравится 30 мая 2009, 19:21:35 мне нужен сетевая программа для интернет клубов на дельфи, где можно найти...... Реклама на сайте | Обмен ссылками | Ссылки | Экспорт (RSS) | Контакты Добавить статью | Добавить исходник | Добавить хостинг-провайдера | Добавить сайт в каталог
Exception handling in date formats how to capture two similar types of exception in one case ? I need to convert date into dd/mm/yyyy format current date can be in dd.MM.yyyy or dd.M.yyyy (Datetime.ParseExact(Input_VAR_Date.ToString,“dd/mm/yyyy”,System.Globalization.CultureInfo.InvariantCulture) Are you saying that the date could be 10.01.2021 or 10.1.2021? If yes you could try Date.Parse(Input_VAR_Date.ToString)
Skip to content Advertisement • Research • Open Access Interfactant action of an amphiphilic polymer upon directing graphene oxide layer formation on sapphire substrates • 1, • 2, • 3, • 1, • 2, • 2Email author, • 2 and • 2 Applied Adhesion Science20175:10 https://doi.org/10.1186/s40563-017-0089-5 • Received: 5 January 2017 • Accepted: 4 May 2017 • Published: Abstract Quality assured surface pre-treatment may greatly enhance adhesive interactions and, thus, the performance and durability of material joints. This holds true as well for substrates used in coating processes as for adherents introduced into bonding processes. Wettable polymeric wetting agents—shortly called polymeric interfactants—contribute to modifying surfaces and governing the properties of interphases. This is demonstrated for amphiphilic polymers directing the adsorption of graphene oxide (GO) nano-sheets from aqueous dispersion on alumina surfaces. In this contribution, contact angle measurements as well as X-ray photoelectron spectroscopy and scanning force microscopy investigations are applied for the characterization of thin films. GO is adsorbed either from a buffered dispersion on pristine aluminum oxide surfaces or on alumina modified with a few nanometers thin layer of a polymeric interfactant. Laterally extended nanoparticles and GO nano-sheets are preferentially found on interfactant layers whereas on pristine aluminum oxide smaller adsorbates dominate. The driving forces directing the GO attachment are discussed using a phenomenological model based on polymer/substrate interactions governing the sticking probabilities of GO nano-sheets with different sizes. Keywords • Functional surface layers • Polymeric interfactants • Amhiphilic polymer • Graphene oxide immobilization • Aluminum oxide • Surface analysis Background Adhesive bonding technology and especially bonded light metal joints play an important role in vehicle and aircraft construction [1]. Among numerous approaches for the surface pretreatment of light metal adherents or substrates, layers formed by amphiphilic polymers may contribute in increasing the durability of adhesive joints or coatings [2, 3]. The adsorption behavior of amphiphilic polymers on oxide, hydroxide or carbonate-based reaction layers on the surfaces of light metal alloys recently was investigated by dissipative particle dynamics (DPD) simulations [4, 5]. The resulting some nanometers thin adsorbates were characterized by electron emission, e.g. using X-ray photoelectron spectroscopy (XPS) or optically stimulated electron emission (OSEE), by wetting techniques, and with respect to their chemical interaction with liquid water [5, 6]. Concerning the film nucleation and growth of further moieties on top of the resulting polymer-coated surfaces, the feasible interface active agent (interfactant) effect with respect to directing the attachment of molecular films and the interaction with these films was discussed [6]. Based on this conception, polymeric interfactant films are two-dimensional layers with molecular dimensions, and they are made up of molecular entities in a way that each molecule spans between the solid substrate below it and the neighboring phase which extends over the half-space above it. Generally, this neighboring phase may be air, a liquid (like water [6]) or a solid, e.g. a cured adhesive or nano-particles. The interfactant layer may feature a homogeneous thickness all over the substrate, or it may exhibit some local variations in height leading to a difference between the roughness of the interfactant layer and the substrate roughness. A laterally homogeneous layer thickness is to be expected for layers of conventional adhesion promoters or coupling agents which exhibit an essentially linear head–tail structure, like surface-active material [4, 79]. The head group and often also the tail group are functional, and they may be different from each other. Depending on the length of the spacer (or backbone) unit between these terminal groups and on the temperature with respect to a critical temperature, the two-dimensional layers may be liquid, amorphous or highly ordered, e.g. forming a 2D crystalline layer in a self-assembly process resulting in a self-assembled monolayer (SAM) [8, 9]. Most pronounced during film growth, the molecular entities may be laterally mobile with respect to each other—which may hold true not only for the spacer chain and the tail group but also for the head group attached to the substrate. Such mobility of head groups is restricted in case of an intra-layer linking which is known for silane layers on oxide surfaces or also for alkyl thiol SAMs on gold surfaces showing disulphide links close to the substrate surface [9, 10]. On the other hand, a laterally variable layer thickness may be expected for layers formed from polymers with a more complex shape than a linear one. As it was shown for amphiphilic polymers, such non-linear shape may result from intramolecular interactions, a phenomenon which is quite common also for polypeptides, e.g. globular proteins [46]. Especially for such polymeric monolayers the term polymeric interfactant layer was suggested recently [6]. The formation of graphene oxide (GO) layers on substrates is governed by the interactions between GO sheets (or flakes) and the substrate surface. GO may be considered a molecule with a hydrophobic polyaromatic backbone separated by cycloaliphatic structures containing C=C double bonds and hydrophilic hydroxyl and epoxy groups; and the edges of this nearly flat carbon grid expose carboxylic acid groups [11, 12]. The properties of reduced graphene oxide as a conducting material adsorbed on surfaces depend on the morphology of the constituting nano-sheets and the overall assembly arrangement [13]. Following the intended application of GO, reduced GO or graphene films, the morphology of the constituting adsorbed nano-sheets may be aspired to result smooth and flat or, alternatively, corrugated, e.g. wrinkled or crumpled [1417]. The interaction between the substrate and graphene or between adsorbed nanoparticles and GO may govern the formation of wrinkles [14, 15] in the flexible nano-sheets. Wrinkles may occur on graphene planes and have high aspect ratios, with a height below 15 nm and lengths above 100 nm [15]. The layer assembly may be tuned by covalent interactions of the carboxylic and hydroxyl functional groups and by electrostatic interactions with polyelectrolytes [18, 19]. Thin graphene oxide layers may be obtained by dipping hydrophilic substrates like pretreated quartz in a 70 °C hot aqueous dispersion of exfoliated GO, resulting in continuous and homogeneous films [20]. Chemical adsorption was investigated by Ou et al. who contacted an aqueous GO formulation for 12 h at 80 °C with a (3-aminopropyl)triethoxysilane (APTES-SAM) covered Si wafer [21]. In a similar way, covalent anchoring was shown by Su and Chiou who attached GO to aminothiol modified gold surfaces [18]. Using such conventional adhesion promoter layers as substrates for the formation of GO films requires first the attachment of the organic layers to the respectively used substrate and, second, an adequate, e.g. chemical, interaction with the subsequently applied GO sheets. Therefore, polymeric interfactants may provide promising prospects since they strongly attach to a wide range of distinct substrate surfaces and, thus, may also be eligible for attaching GO nano-sheets. In this contribution, we present insight into the adsorption of GO from aqueous dispersions on aluminum oxide surfaces modified with an interfactant layer based on a chemically non-reactive amphiphilic polymer. Our approach is highlighted in the sketch shown in Fig. 1 which is based on further developing the non-centrosymmetric layer conception recently described [6]. Fig. 1 Fig. 1 Sketch of a two-step process for attaching graphene oxide (GO) nano-sheets onto a layer of an interfactant system which is based on adsorbates of an amphiphilic polymer on a sapphire substrate Methods In this section, the experimental procedures applied for the manufacture of the layer systems on surfaces of aluminum oxide single crystals as well as the analysis methods used for characterizing the layers will be described. Experimental procedures Sapphire (α-aluminum oxide, corundum single crystal) samples, single-side chemo-mechanically polished were purchased from TBL-Kelpin Dr. Gerd Lamprecht (Neuhausen, Germany). A water-based formulation “G50 wb” containing the amphiphilic polymer Additive G50 (Straetmans High TAC GmbH, Hamburg, Germany) was used. The effective polymer will be denoted as “G50” throughout this contribution. Properties of the polymer formulation were described elsewhere [5, 6]. Based on a parent formulation containing 4 wt% of organic constituents comprising polymer and triethanolamine (TEA) for adjusting the pH value, diluted formulations with a concentration of 2 wt% were prepared by adding demineralized water to the parent formulation. A commercially available 4 mg/mL aqueous graphene oxide (GO) dispersion from Graphenea (San Sebastián, Spain) was used to prepare a formulation containing 0.5 mg/mL GO in 0.15 M acetate buffer. Acetic acid and sodium acetate were used in reagent grade (Sigma-Aldrich). The sapphire substrates were coated by immersion in the formulation based on Additive G50. Two distinct sequences of immersion and water rinsing were applied: 17 h of immersion and 45 min rinsing leading to samples labelled G50-17h, and 27 h immersion and 4 h of rinsing providing samples labelled G50-27h. The GO dispersion was homogenized by applying an ultrasonic treatment for 5 min before use. After 1 h in contact with the GO dispersion, the coated substrates were rinsed gently for some seconds with water and then submerged in deionized water for 2 min; followed by blowing with air. Finally, the samples were allowed to dry and were stored under environmental conditions at room temperature. Analysis methods Investigations of the surface composition were performed with X-ray photoelectron spectroscopy (XPS). XPS spectra with an information depth of around 0.01 µm were taken using a Kratos Ultra system applying excitation of photoelectrons by monochromatic Al Kα radiation within an area of approximately 0.2 mm2. The system was operated at a base pressure of 4 × 10−8 Pa, the sample neutralization was performed with low energy electrons (<5 eV). An electrostatic lens was used, the take-off angle of electrons was 0°, and the pass energy was fixed to 20 eV (or, respectively, 40 eV in case of some less concentrated constituents) in high resolution spectra and 160 eV in survey spectra. Elemental ratios were calculated based on the area of the peaks and considering relative sensitivity factors. Atomic concentrations for the detected elements are given in atomic percent, abbreviated by at%. The given at% values may be translated to weight percent values by considering the respective atomic masses. For each sample two positions were investigated. When calculating the thickness of adsorbates, a compact and homogeneous layer is assumed. The equation of d = − ln(y) × X was employed, in which d is the thickness of the layers, y is the Al2p signal intensity ratio between covered and pristine Al2O3 samples, and X is the inelastic mean free path of Al2p electrons, assumed to be 3.3 nm in an organic adsorbate layer [22]. The sample surface topography was analyzed using scanning force microscopy (SFM). Two distinct instrumental setups were applied. An SFM from Asylum Research was operated in the tapping mode in air. Silicon probes (model Tap150Al-G, back side of the cantilever covered with Al) with a resonance frequency of 150 kHz and a force constant of 5 N/m were used. A scanning probe microscope operated in the SFM ‘tapping mode’ in air (Digital Instruments Nanoscope III multimode with phase extender box) was employed profiting from a maximum scan range of the scanner around 100 µm. Si cantilevers (Nanosensors) with a resonance frequency around 250 kHz corresponding to force constants around 20 N/m were used. The nominal tip diameter was in the range of 10 nm. For characterizing the structures of the adsorbates, height differences, among other criteria, were evaluated. The values reported are an average of at least ten height differences measured. The apparent contact angles were measured using a goniometer (ramé-hart instrument co., USA) by sessile drop technique, and MiliQ grade water was used as probe liquid; the volume of the drops was constant (10 μL) for each measurement at a temperature of 22 °C. The contact angle values reported are an average value of at least three separate drops on different substrate areas. The recorded images were analyzed by Drop Image ramé-hart instruments software. Results and discussion In this section, we will highlight and discuss characteristics of adsorbing graphene oxide from a buffered aqueous dispersion on pristine aluminum oxide surfaces and on Al2O3 surfaces covered with thin films of an amphiphilic polymer denoted as G50. Initially, the layer formation and stability of G50 layers on sapphire surfaces was studied spectroscopically using XPS. The respective Al2O3 substrate was submerged for a period of 17 or 27 h in the aqueous formulation and subsequently rinsed for 45 min or 4 h, respectively. Table 1 and Fig. 2 indicate the obtained elemental composition of the films based on the XPS results. After G50 adsorption the intensity of the Al2p and F1s photoelectron emission from the substrate is roughly halved. Within the films carbon, oxygen and nitrogen species are detected, with similar concentrations [C], [O] and [N] when comparing G50-17h and G50-27h samples. Stable layers withstanding several hours of rinsing with water were formed. An adsorbate thickness of 3.1 ± 0.2 nm is obtained for G50-17h and a marginally lower thickness for G50-27h. Table 1 Results of XPS investigations, with surface concentrations given in atomic % (at%), for distinct pristine sapphire samples (average values are given) and for these substrates after contact with 2 wt% G50 formulation either for 17 h and then rinsed 45 min (samples G50-17h) or for 27 h and then rinsed 4 h (samples G50-27h) Sample Element F O C N Al Pristine sapphire 1.0 ± 0.1 43.7 ± 0.5 20.3 ± 0.7 0.1 34.0 ± 0.5  G50-17h, sample 1 0.4 ± 0.1 28.6 ± 2.2 52.1 ± 5.1 0.5 ± 0.1 16.1 ± 3  G50-17h, sample 2 0.3 ± 0.1 27.0 ± 0.7 55.9 ± 2.3 0.5 ± 0.1 16 ± 1.6  G50-27h, sample 1 0.4 ± 0.1 32.8 ± 1.7 47.6 ± 3.0 0.4 ± 0.1 22.7 ± 1.4  G50-27h, sample 2 0.3 ± 0.1 29.3 ± 0.7 51.0 ± 1.6 0.4 ± 0.1 18.9 ± 0.9 Fig. 2 Fig. 2 XPS results obtained in the binding energy region between 0 and 700 eV for A a pristine sapphire surface, B a G50/sapphire interfactant film (sample G50-17h), C a GO/G50/sapphire film, and D a dried deposit of water-rinsed GO dispersion The findings of contact angle measurements are presented with microscopic images in Fig. 3, and the evaluation of the investigations is given in Table 2. After depositing the G50 layer on top of the sapphire substrate, the contact angle changes from 76.9 ± 1.1° to 72.2 ± 3°. Depending on the surface pre-treatment and the resulting coverage with carbonaceous species, water contact angle values in the range between <5° and 72° were reported for alumina substrates [23, 24]. Therefore, the rather high contact angle measured is attributed to surface species which increase the hydrophobicity, e.g. carbonaceous moieties with a concentration around 20 at % as indicated by the XPS measurements. The contact angle found for the G50-17 h sample results similar to the one reported by Gonçalves et al. [5] for a G50 film formed on a magnesium alloy surface. Fig. 3 Fig. 3 Light microscopic image of a water drop on a a dried deposit of water-rinsed GO dispersion, b a pristine sapphire surface, c a G50/sapphire interfactant film (sample G50-17h), and d a GO/G50/sapphire film Table 2 Results of contact angle investigations with the contact angles given in °, as performed for pristine sapphire, a G50/sapphire film (sample G50-17h), a GO/sapphire adsorbate, a GO/G50/sapphire film, and a dried deposit of GO dispersion (intensively rinsed with water) Sample As-deposited Pristine sapphire 76.9 ± 1.1 G50/sapphire 72.2 ± 3 GO/sapphire 65.5 ± 4 GO/G50/sapphire 53.1 ± 2.1 Dried GO dispersion 36 ± 2 The microscopic findings for the surface structure of pristine sapphire surfaces and the G50-17h sample as obtained by SFM investigations are presented in Fig. 4a on a larger scale and in Fig. 5a and b on a smaller scale. For the pristine sapphire surface a rather smooth topography is obtained, characterized by an Ra roughness value of 0.9 nm. This finding is interpreted to result from the chemo-mechanical surface treatment of the sapphire sample. In contrast, for annealed crystals a step-terrace surface morphology was found [25]. The deposition of the G50 film leads to a decrease in surface roughness, and an Ra value of 0.3 nm is obtained. Fig. 4 Fig. 4 20–30 µm wide SFM height images of a a pristine sapphire surface, b a dried deposit of water-rinsed GO dispersion, c a GO/sapphire adsorbate, and d a GO/G50/sapphire film Fig. 5 Fig. 5 4–5 µm wide SFM images of a a pristine sapphire surface (height image), b a G50/sapphire film (height image of sample G50-17h), c a GO/sapphire adsorbate (height image), d a GO/G50/sapphire film (height image with an inserted bright line at the position of the contour line shown in f), e phase image of the same region as shown in d, and f height profile of the contour line displayed in d The solid constituents of the GO dispersion were characterized assessing a dried deposit of the dispersion which subsequently was rinsed with water. Water rinsing reduced the concentration of Mn, N and S species in the topmost surface of the bulky dried deposit. Finally, minor residues of the underlying moieties with concentrations below 1 at% were obtained, as highlighted in Table 3. This finding is attributed to a layer-wise build-up of the deposit which results from the drying process characterized by the loss of the aqueous dispersant or solvent, respectively. During the advance of drying, presumably the agglomeration of graphene oxide sheets precedes the deposition of more soluble species which accordingly may be dissolved by rinsing with water after the drying. The wetting behavior of the resulting solid was characterized by a water contact angle around 36° (cf. Table 2). This is in agreement with findings by Dai et al. [26] who reported a water contact angle of 34° for GO. Additionally, the presence of molecular species with S- and N-containing species as found by XPS may influence the contact angle [27]. As shown in Fig. 4b, SFM investigations reveal distinct morphological features: on the one hand more than 10 µm wide regions with wrinkled sheets oriented parallel to the surface, and on the other hand regions with considerably smaller deposits. Table 3 Results of XPS investigations, with surface concentrations given in atomic % (at%), performed for a dried deposit of GO dispersion (intensively rinsed with water), pristine sapphire, a G50/sapphire film (sample G50-17h), and a GO/G50/sapphire film Sample Element F Mn O S C N Al Dried GO dispersion 0.2 ± 0.3 22.5 ± 0.4 0.1 ± 0.1 76.5 ± 0.5 0.5 ± 0.1 Pristine sapphire 1.0 ± 0.1 44.2 ± 0.1 20.5 ± 0.4 0.2 ± 0.1 33.9 ± 0.1  G50/sapphire 0.3 ± 0.1 27.0 ± 0.7   55.9 ± 2.3 0.5 ± 0.1 16.0 ± 1.6  GO/G50/sapphire 0.3 ± 0.1 30.0 ± 0.4 0.6 ± 0.1 61.6 ± 0.9 0.6 ± 0.1 7.3 ± 1.7 The deposition of graphene oxide on sapphire surfaces modified with G50 was performed from buffered GO dispersions during an immersion period of 1 h. The respective survey scans obtained from XPS investigations are shown in Fig. 2 in the spectra labelled B and C. As highlighted in Table 3, the Al2p signal intensity decreased as compared to the sample G50-17h due to material deposition from the GO dispersion. In detail, besides C- and O-containing species also Mn and S species and probably N-containing species were deposited. In addition, XPS signals with a high spectral resolution in the C1s region (not shown) reveal similar spectroscopic features for the interfactant G50 and the graphene oxide. Two dominant C1s peaks centered around 285 and 287 eV are attributed to hydrocarbonaceous species with C*–H or C*–C bonds and, respectively, to species with C*–O single bonds. On a molecular level, these ones are assigned to polyoxyalkylene moieties in G50-based polymers and to functional groups in graphene oxide, like carbon-bonded hydroxyls, phenols, ethers, or epoxy moieties [5, 28]. As a consequence, the adsorption of moieties from the GO dispersion will be inferred from evaluating the attenuation of the sapphire-related Al2p XPS signal intensity, from contact angle measurements, and from SFM investigations. Subsequently, the thus obtained findings will be described. Based on evaluating the Al2p peak intensities listed in Table 3, the adsorbate layer found for the GO/G50/sapphire sample is 2.2 ± 0.5 nm thicker than the one observed for the G50-17h sample. This finding is ascribed to the formation of a GO-based adsorbate layer with an effective average thickness of 2.2 nm on top the G50 adlayer. Accordingly, as shown in Table 2 the water contact angle decreases from 72.2 ± 3° to 53.1 ± 2.1° which is attributed to the formation of a more hydrophilic surface termination. However, the wettability of the deposit formed from a dried GO dispersion and characterized by a contact angle of 36 ± 2° is not reached. This finding may be reflected on the base of the SFM images obtained for the GO/G50/sapphire sample as displayed in Figs. 4d, 5d and e, as well as in Fig. 6a and c. The microscopic investigations indicate that after contact with the GO dispersion the smooth G50 adlayer is largely—but not completely—covered by particulate adsorbates of different sizes and morphologies. Thus, the wettability of the sample may be affected by both the regions covered by G50 and the ones covered by GO particles; and the resulting contact angle of 53° is in between 72° and 36°. Considering the SFM images in more detail, the 30 µm wide height image in Fig. 4d comprised sections of around ten particles with the particle width ranging between 5 and 15 µm. Noticeably, the particle widths were more than one order of magnitude larger than the particle heights which indicates that the largest face of the particles preferentially was oriented parallel to the surface of the G50 adlayer. The actually exposed particle faces show significantly different surface morphologies, ranging from smooth to rough and strongly wrinkled areas. The SFM height image in Fig. 6a and the phase image in Fig. 6b acquired in the same region revealed that bunches of corrugated nano-sheets with wrinkle heights of several ten nanometers may extend over at least 10 µm wide regions. In contrast to such strongly corrugated multilayer regions, the SFM height images in Figs. 5d and 6c show adsorbates made up of smooth and several micrometers wide graphene oxide sheets with heights between 1 and 5 nm. The wrinkle density was characterized by around five wrinkles per 10 µm2 area, and the wrinkles were a few micrometers long and some nanometers high. For comparison, single layer graphene flakes decorated with oxygen- and hydrogen-containing groups typically show an average height in the range of 0.8 to 1.2 nm [29]. On top of the sheet presented in Fig. 5d, ad-islands with smaller sheets in parallel orientation are indicated in the height image. As these islands are not contrasted in the correspondent phase image shown in Fig. 5e, they were attributed to a material with a similar deformation behavior as the GO sheet, and they are interpreted to originate from GO alike. Moreover, the phase image clearly highlights that the topographically lower region in the gap towards the nearby GO sheet at the right edge of the images in Fig. 5d and e were composed of a material with a different deformation behavior as compared to GO. This material is interpreted to be the polymeric interfactant layer covering the alumina surface. The height line in the cross section shown in Fig. 5f highlights the heights of the sheets and, as well, the considerable corrugation of the sheet surface. For the nano-sheet shown in Fig. 6c intramolecular folding was observed since the sheet edge pointing towards the bottom of the image shows a significantly greater height difference with respect to the underlying G50 layer, and it appeared back-folded with an elevated outward tab region. In contrast to the region shown in Fig. 6a, the regions imaged in Figs. 5d and 6c exhibited relatively low GO coverages, and overlapping between neighboring smooth GO sheets was not a dominant feature. Fig. 6 Fig. 6 6–10 µm wide SFM images of a GO/G50/sapphire film showing a a height image in a region with strongly wrinkled GO adsorbates, b the phase image of the same region as shown in a, and c a height image in a region with single GO sheets in different sizes Finally, pristine sapphire substrates were immersed in buffered aqueous GO dispersion, and a change of surface properties was observed. The water contact angle decreased from 76.9 ± 1.1° to 65.5 ± 4°, and the surface roughness Ra inferred from SFM images increased from 0.9 to 1.8 ± 0.7 nm. For a more detailed discussion, SFM height images are shown in Fig. 4c and on a smaller scale in Fig. 5c. The surface of the GO/sapphire sample was clearly more corrugated than the surface of pristine sapphire. When comparing the surface structure of GO/sapphire adsorbates with the one of GO/G50/sapphire films, it became clear that in contrast to the latter one the GO/sapphire sample did not manifest particulate adsorbates with a particle width above 5 µm, and especially extended GO nano-sheets were not imaged when investigating more than ten surface regions. These findings indicate significant effects of the G50 interfactant layer with respect to directing the adsorption of graphene oxide nano-sheets towards a face-to-substrate adsorption geometry, favoring adsorbates from huge GO sheets with the cyclic ether groups on the sheet surface oriented towards the linear aliphatic ether groups in the adsorbate layer formed by the amphiphilic polymer G50. Aiming at substantiating the inferred interaction between GO sheets and the G50 interfactant layers, both the GO/sapphire sample and the GO/G50/sapphire sample were subjected to prolonged rinsing with water. Concerning the GO/G50/sapphire films, longer-term rinsing resulted in decreasing the concentration of Mn- or S-containing species by approximately 50% as compared to the XPS findings reported in Table 3 for the shortly rinsed GO/G50/sapphire films. The Al2p signal intensity was not significantly affected by such rinsing which indicates that the film thickness did not change substantially. After immersion in water under gentle stirring for one hour the samples were imaged again by SFM, and the obtained SFM images are shown in Fig. 7. Fig. 7 Fig. 7 3.5–4 µm wide SFM images obtained after 1 h rinsing with deionized water of a a GO/sapphire adsorbate (height image), b phase image of the same region as shown in a, c a GO/G50/sapphire film (height image), and d a GO/G50/sapphire film (height image) Concerning the GO/G50/sapphire films, the SFM height images in Fig. 7c and d show regions with adjacent single GO sheets extended horizontally over the surface. This finding indicated some robustness of the nano-sheet adsorbates against rinsing with water. Concerning GO/sapphire adsorbates, in Fig. 7a a region with an Ra roughness value of 3.1 ± 0.5 nm is presented which is higher than the value of 1.8 ± 0.7 nm obtained before rinsing. The SFM phase image in Fig. 7b was acquired in the same region; and the phase contrast indicates three types of domains with distinct deformability. The domains with the lowest phase angle coincided with topographically low areas and, therefore, were attributed to the sapphire substrate. In contrast, the domains with the highest phase angle corresponded with topographically high areas which were around 6 nm higher than the substrate and dominantly were laterally extended by several 100 nm. These domains were interpreted as elevated graphene oxide adsorbates. However, they appeared rougher and more pitted than the GO sheets shown in Fig. 7c and d. Also, the material constituting the third domain appeared significantly rough and scattered; and straight edges of adsorbates or the voids in between them were hardly discerned. Summarizing, the adsorbates found on GO/sapphire samples appeared to expose a much longer contour length of their lateral boundaries as compared to the much wider particulate adsorbates which were characteristic for GO/G50/sapphire films. Somehow, the interfactant layers seemed to hinder the random deposition of GO-based material and to favor the attachment of several micrometer wide graphene oxide sheets. A driving force for the latter aspect was discussed above based on dominating contributions from van der Waals interactions. A possible driving force for the deposition of smaller particles in case of the GO/sapphire system is highlighted subsequently, based on polar and electrostatic contributions. The pH value of the buffer solution was 4.75, GO suspensions are characterized by a negative ζ-potential at pH values around 5, and alumina and probably also sapphire surfaces are characterized by positive ζ-potentials at these pH values [3032]. Therefore, favorable polar and electrostatic interactions may be expected between GO and sapphire surfaces. Predominantly the edges of GO sheets are regions which are rich in acidic groups [14, 33]. Therefore, the adsorption of GO sheets with a high ratio of functionalized edges may be preferred on sapphire as compared to the adsorption of GO sheets with epoxy-functionalized faces. Demonstratively, this promoting ratio will be the higher the smaller GO sheets are, and the competing effect will be lower for smaller GO sheets. In this way, the finding of smaller particulate adsorbates in case of the GO/sapphire system than in case of the GO/G50/sapphire system may be expectable. Still, possible influences of water-soluble, S- and N-containing molecular species in the GO dispersion will need to be assessed to embrace all the interactions competing with the interfactant action of the amphiphilic polymer layer. Conclusions An amphiphilic polymer was used as interface active agent (interfactant) governing interphase properties during the adsorption of graphene oxide (GO) particles. The interfactant directed the adsorption of graphene oxide (GO) nano-sheets from aqueous dispersion on sapphire surfaces in a face-to-substrate geometry, favoring the adsorption of several micrometers wide sheets to the adsorption of smaller and more hydrophilic entities. The study provides a model system illustrating how assembly of nano-particles or the attachment of polymers could be controlled due to interfactant nano-layers formed on various oxide surfaces. Declarations Authors’ contributions YC and KR developed and worked out the protocol for graphene oxide immobilization. MS developed, performed and—with MN—adapted the formulation of the amphiphilic polymer used as an interfactant. WLC and MN adapted the methodology of interfactant layer formation for sapphire substrates. YC and MN performed and evaluated Scanning Probe Microscopy and XPS investigations. KV and YC performed and evaluated contact angle measurements. YC, WLC, KR and MN took part in setting up the experiments and in analysing and merging the obtained data. WLC, KR, MN, KB and SD contributed in the conceptual approach and in discussing the obtained data. YC and MN drafted the manuscript. All authors read and approved the final manuscript. Acknowledgements The authors are grateful to Dr. Hauke Brüning for fruitful discussions. Competing interests The authors declare that they have no competing interests. Availability of data and materials All relevant data of the article are presented in the manuscript (in tables or figures). Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. Authors’ Affiliations (1) National Laboratory of Nanotechnology LANOTEC, 1.3 km North from the USA Embassy, San José, Costa Rica (2) Adhesive Bonding Technology and Surfaces, Fraunhofer Institute for Manufacturing Technology and Advanced Materials IFAM, Wiener Straße 12, 28359 Bremen, Germany (3) Straetmans High TAC GmbH, Merkurring 94, 22143 Hamburg, Germany References 1. Brockmann W, Hennemann OD, Kollek H, Matz C. Adhesion in bonded aluminium joints for aircraft construction. Int J Adhes Adhes. 1986;6:115–43. doi:10.1016/0143-7496(86)90016-3.View ArticleGoogle Scholar 2. Cavalcanti WL, Brinkmann A, Noeske M, Buchbach S, Straetmans F, Soltau M. Anticorrosive systems-dual-purpose defenders. Eur Coat J. 2012;10:30–3.Google Scholar 3. Scharf S, Noeske M, Cavalcanti WL, Schiffels P. Multi-functional, self-healing coatings for corrosion protection: materials, design and processing. In: Makhlouf AH, editor. Handbook of smart coatings for materials protection. Cambridge: Woodhead Publishing; 2014. doi:10.1533/9780857096883.1.75.Google Scholar 4. Cavalcanti WL, Noeske PLM. Investigating dynamic interactions by multi-scale modelling: from theory to applications. Chem Model. 2014;11:175–200. doi:10.1039/9781782620112-00175.View ArticleGoogle Scholar 5. Gonçalves LMG, Sanchez LC, Stamboroski S, Urena YRC, Cavalcanti WL, Ihde J, Noeske M, Soltau M, Brune K. Instantly investigating the adsorption of polymeric corrosion inhibitors on magnesium alloys by surface analysis under ambient conditions. J Surf Eng Mater Adv Technol. 2014;4:282–94. doi:10.4236/jsemat.2014.45032.Google Scholar 6. Stamboroski S, Stachera PN, Ureña YRC, Hrycyna GH, Ribas Neto WIT, de Azambuja WK, Salz D, Ihde J, Noeske PLM, Cavalcanti WL. Implementation of diverse non-centrosymmetric layer concepts for tuning the interface activity of a magnesium alloy. Appl Adhes Sci. 2016;4:6. doi:10.1186/s40563-016-0063-7.View ArticleGoogle Scholar 7. Schreiber F. Structure and growth of self-assembling monolayers. Prog Surf Sci. 2000;65:151–256. doi:10.1016/S0079-6816(00)00024-1.View ArticleGoogle Scholar 8. Onclin S, Ravoo BJ, Reinhoudt DN. Engineering silicon oxide surfaces using self-assembled monolayers. Angew Chem Int Ed. 2005;44:6282–304. doi:10.1002/anie.200500633.View ArticleGoogle Scholar 9. Ulman A. Formation and Structure of self-assembled monolayers. Chem Rev. 1996;96:1533–54. doi:10.1021/cr9502357.View ArticleGoogle Scholar 10. Fenter P, Eberhardt A, Eisenberger P. Self-assembly of n-alkyl thiols as disulfides on Au(111). Science. 1994;266:1216–8. doi:10.1126/science.266.5188.1216.View ArticleGoogle Scholar 11. He H, Klinowski J, Forster M, Lerf A. A new structural model for graphite oxide. Chem Phys Lett. 1998;287:53–6. doi:10.1016/S0009-2614(98)00144-4.View ArticleGoogle Scholar 12. Zhang Y, Wu C, Guo S, Zhang J. Interactions of graphene and graphene oxide with proteins and peptides. Nanotechnol Rev. 2013;2:27–45. doi:10.1515/ntrev-2012-0078.Google Scholar 13. Palma CA, Samorì P. Blueprinting macromolecular electronics. Nat Chem. 2011;3:431–6. doi:10.1038/nchem.1043.View ArticleGoogle Scholar 14. Wang F, Liu J. Evaporation induced wrinkling of graphene oxide at the nanoparticle interface. Nanoscale. 2015;7:919–23. doi:10.1039/c4nr05832a.View ArticleGoogle Scholar 15. Deng S, Berry V. Wrinkled, rippled and crumpled graphene: an overview of formation mechanism, electronic properties, and applications. Mater Today. 2016;19:197–212. doi:10.1016/j.mattod.2015.10.002.View ArticleGoogle Scholar 16. Chen PY, Sodhi J, Qiu Y, Valentin TM, Steinberg RS, Wang Z, Hurt RH, Wong IY. Multiscale graphene topographies programmed by sequential mechanical deformation. Adv Mater. 2016;28:3564–71. doi:10.1002/adma.201506194.View ArticleGoogle Scholar 17. Zou F, Zhou H, Jeong DY, Kwon J, Eom SU, Park TJ, Hong SW, Lee J. Wrinkled surface-mediated antibacterial activity of graphene oxide nanosheets. ACS Appl Mater Interfaces. 2017;9:1343–51. doi:10.1021/acsami.6b15085.View ArticleGoogle Scholar 18. Su PG, Chiou CF. Electrical and humidity-sensing properties of reduced graphene oxide thin film fabricated by layer-by-layer with covalent anchoring on flexible substrate. Sensors Actuators B. 2014;200:9–18. doi:10.1016/j.snb.2014.04.035.View ArticleGoogle Scholar 19. Zhang D, Tong J, Xia B, Xue Q. Ultrahigh performance humidity sensor based on layer-by-layer self-assembly of graphene oxide/polyelectrolyte nanocomposite film. Sensors Actuators B. 2014;203:263–70. doi:10.1016/j.snb.2014.06.116.View ArticleGoogle Scholar 20. Wang X, Zhi L, Müllen K. Transparent, conductive graphene electrodes for dye-sensitized solar cells. Nano Lett. 2008;8:323–7. doi:10.1021/nl072838r.View ArticleGoogle Scholar 21. Ou J, Wang J, Liu S, Mu B, Ren J, Wang H, Yang S. Tribology study of reduced graphene oxide sheets on silicon substrate synthesized via covalent assembly. Langmuir. 2010;26:15830–6. doi:10.1021/la102862d.View ArticleGoogle Scholar 22. Esplandiu MJ, Noeske PLM. XPS investigations on the interactions of 1,6-hexanedithiol/Au(111) layers with metallic and ionic silver species. Appl Surf Sci. 2002;199:166–82. doi:10.1016/S0169-4332(02)00608-6.View ArticleGoogle Scholar 23. Zhang D, Wang Y, Gan Y. Characterization of critically cleaned sapphire single-crystal substrates by atomic force microscopy, XPS and contact angle measurements. Appl Surf Sci. 2013;274:405–17. doi:10.1016/j.apsusc.2012.12.143.View ArticleGoogle Scholar 24. González-Martín ML, Labajos-Broncano L, Jańczuk B, Bruque JM. Wettability and surface free energy of zirconia ceramics and their constituents. J Mater Sci. 1999;34:5923–6. doi:10.1023/A:1004767914895.View ArticleGoogle Scholar 25. Witek G, Noeske M, Mestl G, Shaikhutdinov SK, Behm RJ. Interaction of platinum colloids with single crystalline oxide and graphite substrates: a combined AFM, STM and XPS study. Catal Lett. 1996;37:35–9. doi:10.1007/BF00813516.View ArticleGoogle Scholar 26. Dai J, Wang G, Ma L. Study on the surface energies and dispersibility of graphene oxide and its derivatives. J Mater Sci. 2015;50:3895–907. doi:10.1007/s10853-015-8934-z.View ArticleGoogle Scholar 27. Wang S, Zhang Y, Abidi N, Cabrales L. Wettability and surface free energy of graphene films. Langmuir. 2009;25:11078–81. doi:10.1021/la901402f.View ArticleGoogle Scholar 28. Larciprete R, Fabris S, Sun T, Lacovig P, Baraldi A, Lizzit S. Dual path mechanism in the thermal reduction of graphene oxide. J Am Chem Soc. 2011;133:17315–21. doi:10.1021/ja205168x.View ArticleGoogle Scholar 29. Spyrou K, Rudolf P. An introduction to graphene. In: Georgakilas V, editor. Functionalization of graphene. New York: Wiley; 2014. doi:10.1002/9783527672790.ch1.Google Scholar 30. Corrales Ureña YR, Wittig L, Vieira Nascimento M, Faccioni JL, Noronha Lisboa Filho P, Rischka K. Influences of the pH on the adsorption properties of an antimicrobial peptide on titanium surfaces. Appl Adhes Sci. 2015;3:7. doi:10.1186/s40563-015-0032-6.View ArticleGoogle Scholar 31. Lei Z, Christov N, Zhao XS. Intercalation of mesoporous carbon spheres between reduced graphene oxide sheets for preparing high-rate supercapacitor electrodes. Energy Environ Sci. 2011;4:1866–73. doi:10.1039/c1ee01094h.View ArticleGoogle Scholar 32. Franks GV, Meagher L. The isoelectric points of sapphire crystals and alpha-alumina powder. Colloids Surf A: Physicochem Eng Asp. 2003;214:99–110. doi:10.1016/S0927-7757(02)00366-7.View ArticleGoogle Scholar 33. Shen X, Lin X, Yousefi N, Jia J, Kim JK. Wrinkling in graphene sheets and graphene oxide papers. Carbon. 2014;66:84–92. doi:10.1016/j.carbon.2013.08.046.View ArticleGoogle Scholar Copyright Advertisement
Introduction Like other mobile aquatic animals, sharks have evolved a set of morphological traits that facilitate efficient travel in water; a streamlined body shape and assortment of fins are conspicuous examples. Almost all sharks are negatively buoyant1,2, and use their pectoral fins to generate vertical hydrodynamic force that counteracts gravity3,4. In contrast, the dorsal fin assists in propulsion5 and turning6 through the generation of lateral forces6,7. The prevailing view is that the roles of the pectoral and dorsal fins in sharks are clearly divided in this way. By measuring body posture of great hammerhead sharks Sphyrna mokarran swimming in the wild, we show that this species regularly swims rolled on their side. Because this implies a reconfiguration of the function of their fins during locomotion, we conducted a series of modelling experiments to explore the hydrodynamic consequences of this unusual rolled swimming. Our results show that S. mokarran generate lift with their dorsal fin by swimming on their side, and that doing so is a more efficient way to travel than is swimming upright. These findings question the paradigm of the division of labour in shark fins, and highlight that efficient travel is a strong selective agent in driving the evolution of animals. Results Observations of rolled swimming We tagged two wild great hammerhead sharks with accelerometer loggers that allow the estimation of body pitch and roll angles as they swim freely in their environment (see Methods, Supplementary Fig. 1 and Supplementary Notes 1 and 2); one at the Great Barrier Reef, Australia, and another off the Mesoamerican Reef, Belize. Unexpectedly, the shark tagged at the Great Barrier Reef spent 90% of the 18 h deployment period (which was from early evening till late morning) swimming on its side at absolute roll angles between 50° and 75° (Fig. 1a,b and Supplementary Fig. 2). The shark exhibited this rolling behaviour whether it was ascending, descending or swimming at constant depth, and alternated between rolling to the left and right sides approximately every 5–10 min. An onboard video camera visually confirmed the observations (Supplementary Movie 1). The shark tagged off Belize exhibited a very similar pattern; it was monitored for almost 3 days, and spent the majority of night-time hours swimming at roll angles between 30° and 80°, and tended to swim more upright during daylight hours (Supplementary Fig. 3 and Supplementary Note 2). It is unlikely that this behaviour is a response to the capture, handling and tagging procedure because a further three sharks fitted with onboard video cameras via SCUBA (that is, cameras were fitted to the shark’s dorsal fins underwater without being captured or handled) in the Bahamas also exhibited frequent rolled swimming throughout the 2–3 h of each daytime video deployment (Fig. 1e,f and Supplementary Movie 2), and untagged specimens of this species in public aquaria invariably spend a large proportion of time swimming at the same roll angles seen in our wild, tagged animals (Supplementary Movie 3). Ostensibly, this seems a bizarre and unexpected mode of swimming, and has no precedent in the literature. What possible advantage could be obtained by swimming rolled in this way? Doing so would presumably inhibit use of their cephalofoil for detecting electrical signals from benthic prey; therefore, rather than representing a foraging strategy, our hypothesis was that the rolled swimming confers hydrodynamic advantages. Figure 1: Rolled swimming in great hammerhead sharks Sphyrna mokarran. figure 1 For a to d, roll and pitch angles were measured by an electronic tag attached to a 295 cm shark’s dorsal fin, and monitored as it swam freely at the Great Barrier Reef, northern Australia. (a,c) A typical hour-long time series for that animal. (b,d) Probability distributions of roll and pitch angles based on the last 15 h of the monitoring period for the Great Barrier Reef shark. Images in e,f were taken with a fin-mounted video camera attached to another wild S. mokarran (350 cm) as it swam rolled to the left and right (respectively) at South Bimini Island, the Bahamas, at absolute roll angles of 60° (see Supplementary Movie 2 for examples of this and other wild S. mokarran swimming rolled). Hydrodynamics of a swimming shark Hydrodynamic forces acting on a swimming shark can be conveniently divided into lift L, drag D, thrust T and buoyancy B. For simplicity, we will assume that the thrust is generated mainly by the caudal, anal and the second dorsal fins, and is directed along the swimming path, whereas lift and drag are generated by all other fins and by the body of the shark; they are directed perpendicular and parallel to the swimming path, respectively. When swimming at constant speed along a straight horizontal path, all forces cancel out with gravity, G: Lift and drag are commonly expressed in terms of the respective coefficients CL and CD with in which ρ is the density of water, v is swimming speed and S is an arbitrary reference area, chosen here as the maximal cross-section area of the body. The lift coefficient depends mainly on the angle between the surface that generates the lift (as a fin) and the swimming direction; the drag coefficient depends mainly on the lift coefficient: CD0 is the parasite (zero lift) drag coefficient associated with friction between the body and water; KCL2 is the induced drag coefficient—the cost of lift generation. At a given speed, the combination of (1a) and (2a) determines the lift coefficient needed to counteract gravity (and hence the set angle of the lift-generating surfaces); the combination of equations (3), (2b) and (1b) determines the thrust needed to maintain that speed. The induced drag depends on the horizontal span of the lift-generating surfaces, b, and on the distribution of lift along these surfaces, reflected in the numerical coefficient kK: kK varies between 1.1 and 1.3 for a planar surface8. Rolling on its side, a shark gradually transfers some of the lift from its pectoral fins to the dorsal fin (Fig. 2), changing both the horizontal span and the distribution of lift. Figure 2: Reconfiguration of lifting surfaces in great hammerhead sharks S. mokarran. figure 2 By swimming rolled, a shark changes the surfaces that generate lift, L, from the pair of pectoral fins at zero roll angle (left) to the combination of the pectoral and dorsal fins at greater roll angles (right). For the great hammerhead, doing so increases the effective span of the lifting surfaces, b. The model to the right is rolled 65°. Intriguingly, the dorsal fin of a great hammerhead is longer than its pectoral fins; the opposite is true for all other sharks for which we have data (the closely related9 scalloped hammerhead S. lewini approaches the unique morphology of the great; Supplementary Table 1 and Supplementary Fig. 4). Rolling to its side, a great hammerhead therefore increases the horizontal span of its lift-generating surfaces. Because an increase in horizontal span of lifting surfaces potentially makes the generation of lift more efficient, it is conceivable that great hammerheads induce less drag when they roll to their side than when they swim upright. To examine this possibility, we built a morphologically accurate model of a great hammerhead (see Supplementary Figs 5–7), and conducted a series of experiments in a wind tunnel, keeping the Reynolds number similar to that of a free-swimming shark. In each experiment, the model was set at a constant roll angle (from 0° to 90°, every 10°), and its orientation relative to the flow (equivalent to the pitch angle of a shark swimming at constant depth) was manipulated (between −15° and 15°) while lift and drag were measured with a string balance (see Supplementary Note 3). Remarkably, the minimal drag coefficients occurred at roll angles between 50° and 70° (Fig. 3b), which closely matches the range of roll angles at which our tagged sharks swam in the wild (Fig. 1 and Supplementary Figs 2 and 3). At the relevant range of lift coefficients, the reduction in drag is more than 10% (Fig. 3b). The corresponding energy saving is estimated below. Figure 3: Hydrodynamics of rolled swimming in great hammerhead sharks S. mokarran. figure 3 (a) Contours of constant lift CL and (b) drag coefficients CD for a range of pitch and roll angles, measured through wind tunnel experiments with a physical S. mokarran model. (c) Contours of constant COT for a 2.95 m shark for a range of roll angle and either pitch angles or (d) swimming speeds. COT was estimated from wind tunnel data summarized in b, and by assuming values for standard metabolic rate and both chemomechanical and propulsive efficiencies (see Supplementary Notes 4). In a, the difference between adjacent contours is 0.2, and in b–d, the difference is 0.02. Energy savings Energy expenditure per distance swam (commonly termed the ‘cost of transport’, COT) is defined as: P0 being the standard metabolic rate, η the hydrodynamic propulsion efficiency and ηm the chemomechanical efficiency of the muscles. Given body mass (which we estimated for our Great Barrier Reef shark; see Supplementary Note 4) and temperature (which we measured with our accelerometer loggers), one can estimate the standard metabolic rate10, and, assuming the values for η, ηm and B/G published elsewhere1,11, the COT follows the data shown in Fig. 3b by equations (1)–(3) and (5), , , . An expanded explanation of calculations for drag, metabolic rate and COT is detailed in Supplementary Notes 4 and 5 and Supplementary Figs 8–12. With all the relevant data listed in Supplementary Table 2, the COT estimates are shown in Fig. 3c,d. Again, displaying remarkable congruence with what the sharks actually do in the wild, COT is minimized at the same roll and pitch angles (between 50° and 70°, and 6° and 8°, respectively), and at the same speeds (between 0.8 and 1.0 m s−1) exhibited by the wild sharks (Fig. 1 and Supplementary Figs 2 and 3). The gains are significant; 8% less energy is used to travel a given distance when swimming rolled than when swimming upright (0.8 versus 0.86 mmol ATP per m; Fig. 3c,d). Discussion Like many other aquatic animals, great hammerhead sharks have evolved morphological traits that facilitate efficient travel. However, unique among species possessing a dorsal fin, great hammerheads employ a drastic reconfiguration of its traditional role in locomotion. Great hammerheads are also one of the most recently diverged of all shark species (5 million years ago9); therefore, in the context of 450 millions years of chondrichthyan evolution, this solution to minimizing travel costs is relatively new. The variable efficiencies of lift generation among other negatively buoyant fish principally arises from the variable pectoral fin morphologies12; the blue shark Prionace glauca, which has long and narrow pectoral fins, exemplifies selection of this trait. It is therefore curious that the great hammerhead shark has taken such a different route to evolving lifting surfaces. Hammerheads possess a number of morphological innovations related to their sensory capacity and manoeuvrability: greater lateral flexture of the body and tight turning capacity13,14 appear critical to the foraging behaviour of this group that is also related to their unique cranial morphology. These hunting requirements in turn may select for enlargement of the dorsal fin to generate the required lateral forces for performing such manoeuvres. Our work provides an interesting example of how the evolution of novel morphological characteristics for the purpose of one behaviour can result in a drastic shift in the function of existing morphology. It also further highlights that efficient travel is a strong selective agent in driving the evolution of organisms15, in particular those facing substantial costs for movement, such as perpetually active aquatic animals. Understanding how animals reduce the effects of drag on their mobility is an important area of research, not just for zoologists, but also mechanical engineers striving to find biomimetic solutions for man-made designs, and even olympic swimmers trying to break world records (the ‘fish kick’ stroke, where submerged swimmers swim rolled on their side, revolutionized competitive swimming). With most fully aquatic animals difficult to observe in nature, our work highlights bio-logging technology’s important role in revealing novel hydrodynamic adaptations that change our perception of form and function. Methods Accelerometer and video data collected from wild sharks For accelerometer deployments, both sharks were captured by fishing and were fitted with tri-axial accelerometer loggers attached to the dorsal fin using established methods16. The 295 cm (total length) female shark captured at the Great Barrier Reef was fitted with a Little Leonardo video camera and PD3GT logger (maximum dimensions 150 × 70 × 30 mm, 260 g in air) that recorded acceleration at 16 Hz and both swim speed, depth and temperature at 1 Hz, and it detached from the shark 18 h after tagging. Only the last 15 h were used for analysis. The 273 cm male shark captured at the Mesoamerican Barrier Reef near Lighthouse Reef Atoll, Belize was fitted with a ‘daily-diary’ (ref. 17; maximum dimensions 150 × 50 × 35 mm, 260 g in air; Supplementary Fig. 1), which recorded tri-axial acceleration, depth and temperature at 8 Hz. The package detached from the shark 66 h following tagging. Both packages were recovered using very high frequency (VHF) telemetry. Analysis and results are detailed in Supplementary Notes 1 and 2 and Supplementary Figs 2 and 3. For the three female sharks (250, 300 and 350 cm total length) fitted with video cameras in the Bahamas (throughout January to February 2016 at South Bimini Island), each shark was approached underwater by a SCUBA diver, and a miniaturized (71 × 71 × 39 mm, 152 g in air) video camera (GoPro Hero4) was attached to the anterior edge of the dorsal fin with a double-armed clamp as the shark swam by. Video cameras automatically detached from the sharks after 3 h and the footage was examined for evidence of rolled swimming. Examples of rolled swimming in these sharks are shown in Supplementary Movie 2. Wind tunnel experiments A fifth-scale model of the shark was printed in FullCure720. The general drawing can be found in Supplementary Figs 5 and 6; printer-ready files are available on request. The model had replaceable fins, head and neck. All fins had NACA0015 profile. On the basis of the hypothesis that the caudal, anal and second dorsal fins are used mainly for propulsion and not for the generation of lift, the results presented herein have been measured without them. The experiments were repeated with anal and second dorsal fins attached, and the results remained qualitatively the same (Supplementary Fig. 11). The total length of the model was 640 mm, and the part of the model that went into the tunnel was 431 mm long, ending at the caudal end of the anal and second dorsal fins. Its maximal cross-section area (that was used to obtain the drag and lift coefficients) was 3,870 mm2. The experiments were conducted at the subsonic wind tunnel of the Faculty of Aerospace Engineering, Technion. The wind tunnel is of the open type, with 1 × 1 m square test section, 3 m long. The tunnel is capable of working at 90 m s−1. All experiments were conducted at 50 m s−1. At this speed, the turbulence intensity is estimated at 0.2%. The Reynolds number based on the total length of the model shark (640 mm) was approximately two million. It matches the Reynolds number of a 3 m shark swimming at 0.7 m s−1 in 20° water. The forces were measured using a six-component string balance and acquired at 5 kHz. The data were low-pass-filtered at 4 Hz, and block-averaged with 500 samples per block. The lift and side force measured during the experiment were of the order of 1 kg; the drag was of the order of 100 g. Measurement accuracy is estimated at 1 g. Data Availability The data that support the findings of this study are available from the corresponding author upon request. Additional information How to cite this article: Payne, N. L. et al. Great hammerhead sharks swim on their side to reduce transports costs. Nat. Commun. 7:12289 doi: 10.1038/ncomms12289 (2016).
Visible to the public Biblio Filters: Author is Oakley, I.  [Clear All Filters] A B C D E F G H I J K L M N O P Q R S T U V W X Y Z  S Oakley, I..  2020.  Solutions to Black Hole Attacks in MANETs. 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). :1–6. Self-organising networks, such as mobile ad-hoc networks (MANETs), are growing more and more in importance each day. However, due to their nature and constraints MANETs are vulnerable to a wide array of attacks, such as black hole attacks. Furthermore, there are numerous routing protocols in use in MANETs, and what works for one might not for another. In this paper, we present a review of previous surveys of black hole attack solutions, followed by a collation of recently published papers categorised by original routing protocol and evaluated on a set of common metrics. Finally, we suggest areas for further research.
Pregnancy is an incredible process that brings a new life into the world, but it can also bring about weight gain that can leave many new moms feeling insecure. The extra pounds that linger can be particularly challenging to lose considering your body is healing while you are now caring for a newborn around the clock – so understandably it is tough. For this reason, though, we are often asked about liposuction after baby and how soon a procedure can be scheduled. How Soon Can You Have Liposuction After Having a Baby? For an uncomplicated birth, we recommend waiting at least 3-6 months post-partum for liposuction. This recommendation will vary depending on several factors, such as, whether you had a vaginal delivery or a c-section, if you are currently breastfeeding, whether you plan to have more children, and if there are any other health issues to consider.  Your body goes through so many changes during pregnancy and the months following birth, so understandably it takes time for your body to heal and the uterus and abdomen to contract back to pre-pregnancy size. Once that has happened, you can then assess your liposuction goals more realistically.   How Soon After a C-Section Can You Get Liposuction?  We recommend waiting at least 6 to 9 months after a c-section delivery for liposuction. This allows your incision to heal and your uterus and abdomen to contract back to a pre-pregnancy size. However, the healing time after a c-section can vary widely, so it’s always best to meet with a liposuction surgeon for an in-person consultation to determine if you qualify and what an appropriate timeline would be for you individually.  Can Lipo Get Rid of a Mommy Pooch? Yes! You can read more about that on our page about FUPA liposuction. Essentially, if your mommy pooch is mainly caused by excess fat (not skin), you may qualify for FUPA liposuction. But, if your mommy pooch is mainly caused by loose skin, then you may need to consider a tummy tuck vs liposuction. The best way to know for sure is to come in for a complimentary consultation with one of our surgeons.  Can You Get Liposuction While Breastfeeding? It is not recommended to have liposuction while breastfeeding because anesthesia and other medications can potentially pass into your breastmilk, so it is usually best to wait. Furthermore, your body will continue to change while you pump/breastfeed, so it’s a good idea to see how your body responds once you have weaned your baby.   Should You Get Lipo if You Plan to Have More Children? If you are planning to get pregnant in the very near future, then it would be wise to wait until after your final pregnancy and then evaluate your liposuction goals. But if a baby is not necessarily in the plans anytime soon, then you do not have to wait. Even if you do plan to have a baby at some point in the future, a future pregnancy will not “ruin” the results of liposuction. Once fat is removed via liposuction it is gone forever (read more about that here).   However, just like anyone else getting liposuction, you can still gain weight in the fat cells that remain in the surrounding areas of your body. That is why we encourage every patient to continue healthy lifestyle habits after their surgery to best maintain their results. So, while there will of course be weight gain during a pregnancy, as long as you continue healthy eating habits and resume exercise as soon as you feel ready and you are cleared by your doctor, then your liposuction results should remain intact. • Share:
Lovage View Slideshow Pictures What other names is Lovage known by? Ache des Montagnes, Angelica levisticum, Angélique de Montagne, Apio de Monte, Céleri Perpétuel, Herbe à Maggi, Hipposelinum levisticum, Lavose, Levistici Radix, Levístico, Levisticum officinale, Lévistique Officinale, Ligusticum levisticum, Liv&egrave;che, Love Parsley, Maggi Plant, Persil d'Amour, Sea Parsley, Smallage, Smellage, Szechuan Lovage. What is Lovage? Lovage is a plant. The root and underground stem (rhizome) are used to make medicine. Lovage is used as "irrigation therapy" for pain and swelling (inflammation) of the lower urinary tract, for prevention of kidney stones, and to increase the flow of urine when urinary tract infections or fluid retention is present. Lovage is also used for indigestion, heartburn, stomach bloating, intestinal gas, irregular menstrual periods, sore throat, boils, yellowed skin (jaundice), malaria, fluid around the lung (pleurisy), gout, joint pain (rheumatism), and migraine headaches. It is also used as an expectorant to loosen phlegm in respiratory conditions. In foods and beverages, lovage is used as a flavor component. In manufacturing, lovage is used as a fragrance in soaps and cosmetics. Insufficient Evidence to Rate Effectiveness for... More evidence is needed to rate the effectiveness of lovage for these uses. Natural Medicines Comprehensive Database rates effectiveness based on scientific evidence according to the following scale: Effective, Likely Effective, Possibly Effective, Possibly Ineffective, Likely Ineffective, and Insufficient Evidence to Rate (detailed description of each of the ratings). Quick GuideVitamin D Deficiency: How Much Vitamin D Is Enough? Vitamin D Deficiency: How Much Vitamin D Is Enough? How does Lovage work? The chemicals in lovage might increase water loss through urination, decrease spasms, and help fight infections. Are there safety concerns? Lovage is POSSIBLY SAFE for most people. It might increase sensitivity to the sun, especially with long-term use. This might put you at greater risk for rashes from the sun, sunburns, and skin cancer. Wear sunblock and protective clothing outside, especially if you are light-skinned. Special Precautions & Warnings: Pregnancy and breast-feeding: Lovage is LIKELY UNSAFE during pregnancy. There are some reports that it might cause the uterus to contract or start the menstrual period. This could cause a miscarriage. Not enough is known about the safety of using lovage during breast-feeding. Stay on the safe side and avoid use. Fluid retention (edema): Don't try "irrigation therapy," which is the use of a mild diuretic such as lovage with lots of fluids to increase urine flow, if you retain fluid because of heart disease or kidney disease. High blood pressure: There is a concern that lovage might increase the amount of sodium in the body, and that might increase blood pressure. Kidney problems: Do not use lovage if you have inflamed or painful kidneys or damaged kidney function. Are there any interactions with medications? Water pills (Diuretic drugs) Interaction Rating: Moderate Be cautious with this combination. Talk with your health provider. Lovage seems to work like "water pills" by causing the body to lose water. Taking lovage along with other "water pills" might cause the body to lose too much water. Losing too much water can cause you to be dizzy and your blood pressure to go too low. Some "water pills" include chlorothiazide (Diuril), chlorthalidone (Thalitone), furosemide (Lasix), hydrochlorothiazide (HCTZ, Hydrodiuril, Microzide), and others. Dosing considerations for Lovage. The appropriate dose of lovage depends on several factors such as the user's age, health, and several other conditions. At this time there is not enough scientific information to determine an appropriate range of doses for lovage. Keep in mind that natural products are not always necessarily safe and dosages can be important. Be sure to follow relevant directions on product labels and consult your pharmacist or physician or other healthcare professional before using. FDA Logo Report Problems to the Food and Drug Administration You are encouraged to report negative side effects of prescription drugs to the FDA. Visit the FDA MedWatch website or call 1-800-FDA-1088. Reviewed on 3/29/2011 12:35:40 PM Health Solutions From Our Sponsors