text
stringlengths
192
1.05M
Overview of the recurse package The recurse package can be used to analyze animal trajectory data to look for returns to a previously visited area, i.e. revisitations. These revisits cold be interesting ecologically for a number of reasons. For example, they could be used to identify nesting or denning sites or important resource locations such as water points. Other scenarios include trapline foraging behavior, large-scale movement patterns like migration, and predator-prey interactions. The recurse package is flexible and supports identifying revisitations of the trajectory itself for single or multiple individuals as well as pre-specifying locations of interest for which to calculate revisitations. In addition to the number of revisits to each location, additional metrics are calculated including the residence time at each location and the time between revisits. Alternatively, one can specify a polygon in which to calaculate revisits and residence time. This could be useful if there was a specific landscape feature where the precise boundary is important, such as a protected area, land use type, or territory. Example application Here is a simple example showing how to calculate revisits for a trajectory, using an example data set in the package. For more examples, look at the package vingette or our paper on the package. Bracis C, Bildstein K and Mueller T (2018). Revisitation analysis uncovers spatio-temporal patterns in animal movement data. Ecography. doi: 10.1111/ecog.03618 library(recurse) data(martin) revisits = getRecursions(martin, radius = 2) plot(revisits, martin, legendPos = c(10, -15))
packfile: add repository argument to find_pack_entry [git/git.git] / packfile.h CommitLineData 4f39cd82 JT 1#ifndef PACKFILE_H 2#define PACKFILE_H 3 498f1f61 JT 4#include "oidset.h" 5 4f39cd82 JT 6/* 7 * Generate the filename to be used for a pack file with checksum "sha1" and 8 * extension "ext". The result is written into the strbuf "buf", overwriting 9 * any existing contents. A pointer to buf->buf is returned as a convenience. 10 * 11 * Example: odb_pack_name(out, sha1, "idx") => ".git/objects/pack/pack-1234..idx" 12 */ 13extern char *odb_pack_name(struct strbuf *buf, const unsigned char *sha1, const char *ext); 14 15/* 16 * Return the name of the (local) packfile with the specified sha1 in 17 * its name. The return value is a pointer to memory that is 18 * overwritten each time this function is called. 19 */ 20extern char *sha1_pack_name(const unsigned char *sha1); 21 22/* 23 * Return the name of the (local) pack index file with the specified 24 * sha1 in its name. The return value is a pointer to memory that is 25 * overwritten each time this function is called. 26 */ 27extern char *sha1_pack_index_name(const unsigned char *sha1); 28 0317f455 JT 29extern struct packed_git *parse_pack_index(unsigned char *sha1, const char *idx_path); 30 0abe14f6 JT 31/* A hook to report invalid files in pack directory */ 32#define PACKDIR_FILE_PACK 1 33#define PACKDIR_FILE_IDX 2 34#define PACKDIR_FILE_GARBAGE 4 35extern void (*report_garbage)(unsigned seen_bits, const char *path); 36 0f90a9f2 37extern void prepare_packed_git(struct repository *r); 4c2a13b4 38extern void reprepare_packed_git(struct repository *r); 5babff16 39extern void install_packed_git(struct repository *r, struct packed_git *pack); e65f1862 40 a80d72db SB 41struct packed_git *get_packed_git(struct repository *r); 42struct list_head *get_packed_git_mru(struct repository *r); 43 0abe14f6 JT 44/* 45 * Give a rough count of objects in the repository. This sacrifices accuracy 46 * for speed. 47 */ 48unsigned long approximate_object_count(void); 49 d6fe0036 JT 50extern struct packed_git *find_sha1_pack(const unsigned char *sha1, 51 struct packed_git *packs); 52 8e21176c JT 53extern void pack_report(void); 54 0317f455 JT 55/* 56 * mmap the index file for the specified packfile (if it is not 57 * already mmapped). Return 0 on success. 58 */ 59extern int open_pack_index(struct packed_git *); 60 3836d88a JT 61/* 62 * munmap the index file for the specified packfile (if it is 63 * currently mmapped). 64 */ 65extern void close_pack_index(struct packed_git *); 66 84f80ad5 67extern unsigned char *use_pack(struct packed_git *, struct pack_window **, off_t, unsigned long *); 3836d88a 68extern void close_pack_windows(struct packed_git *); d0b59866 69extern void close_all_packs(struct raw_object_store *o); 97de1803 70extern void unuse_pack(struct pack_window **); f1d8130b 71extern void clear_delta_base_cache(void); 9a428653 72extern struct packed_git *add_packed_git(const char *path, size_t path_len, int local); 3836d88a 73 9e0f45f5 JT 74/* 75 * Make sure that a pointer access into an mmap'd index file is within bounds, 76 * and can provide at least 8 bytes of data. 77 * 78 * Note that this is only necessary for variable-length segments of the file 79 * (like the 64-bit extended offset table), as we compare the size to the 80 * fixed-length parts when we open the file. 81 */ 82extern void check_pack_index_ptr(const struct packed_git *p, const void *ptr); 83 d5a16761 JT 84/* 85 * Return the SHA-1 of the nth object within the specified packfile. 86 * Open the index if it is not already open. The return value points 87 * at the SHA-1 within the mmapped index. Return NULL if there is an 88 * error. 89 */ 90extern const unsigned char *nth_packed_object_sha1(struct packed_git *, uint32_t n); 91/* 92 * Like nth_packed_object_sha1, but write the data into the object specified by 93 * the the first argument. Returns the first argument on success, and NULL on 94 * error. 95 */ 96extern const struct object_id *nth_packed_object_oid(struct object_id *, struct packed_git *, uint32_t n); 97 9e0f45f5 JT 98/* 99 * Return the offset of the nth object within the specified packfile. 100 * The index must already be opened. 101 */ 102extern off_t nth_packed_object_offset(const struct packed_git *, uint32_t n); d5a16761 103 a2551953 JT 104/* 105 * If the object named sha1 is present in the specified packfile, 106 * return its offset within the packfile; otherwise, return 0. 107 */ 108extern off_t find_pack_entry_one(const unsigned char *sha1, struct packed_git *); 109 110extern int is_pack_valid(struct packed_git *); f1d8130b 111extern void *unpack_entry(struct packed_git *, off_t, enum object_type *, unsigned long *); 32b42e15 112extern unsigned long unpack_object_header_buffer(const unsigned char *buf, unsigned long len, enum object_type *type, unsigned long *sizep); 7b3aa75d 113extern unsigned long get_size_from_delta(struct packed_git *, struct pack_window **, off_t); 3588dd6e 114extern int unpack_object_header(struct packed_git *, struct pack_window **, off_t *, unsigned long *); 32b42e15 115 f0e17e86 JT 116extern void release_pack_memory(size_t); 117 f1d8130b JT 118/* global flag to enable extra checks when accessing packed objects */ 119extern int do_check_packed_object_crc; 120 121extern int packed_object_info(struct packed_git *pack, off_t offset, struct object_info *); 122 123extern void mark_bad_packed_object(struct packed_git *p, const unsigned char *sha1); 124extern const struct packed_git *has_packed_and_bad(const unsigned char *sha1); 9e0f45f5 125 613b42f2 SB 126/* 127 * Iff a pack file in the given repository contains the object named by sha1, 128 * return true and store its location to e. 129 */ 130#define find_pack_entry(r, s, e) find_pack_entry_##r(s, e) 131extern int find_pack_entry_the_repository(const unsigned char *sha1, struct pack_entry *e); 1a1e5d4f 132 150e3001 JT 133extern int has_sha1_pack(const unsigned char *sha1); 134 f9a8672a JT 135extern int has_pack_index(const unsigned char *sha1); 136 498f1f61 JT 137/* 138 * Only iterate over packs obtained from the promisor remote. 139 */ 140#define FOR_EACH_OBJECT_PROMISOR_ONLY 2 141 7709f468 JT 142/* 143 * Iterate over packed objects in both the local 144 * repository and any alternates repositories (unless the 145 * FOR_EACH_OBJECT_LOCAL_ONLY flag, defined in cache.h, is set). 146 */ 147typedef int each_packed_object_fn(const struct object_id *oid, 148 struct packed_git *pack, 149 uint32_t pos, 150 void *data); 151extern int for_each_packed_object(each_packed_object_fn, void *, unsigned flags); 152 498f1f61 JT 153/* 154 * Return 1 if an object in a promisor packfile is or refers to the given 155 * object, 0 otherwise. 156 */ 157extern int is_promisor_object(const struct object_id *oid); 158 4f39cd82 159#endif
home - °ùÀÚ¿ÐÀ̾߱â - µ¹¸æÀÌÀ̾߱â Á¦¸ñ ¼º»êÀÏÃâºÀÀ̳ª ¼Û¾Ç»ê¿¡¼­ °üÂûÇÒ ¼ö ÀÖ´Â ÁöÃþ±¸Á¶ÀÎ base surge ±Û¾´ÀÌ °ùÀڿР ±¸ºÐ ÁöÁú 2009-02-23 ¿ÀÈÄ 1:24:17 »çÁøÀº ¹Ù´Ù¿¡¼­ ¼ø½Ä°£¿¡ ¸¸µé¾îÁø Çʸ®ÇÉÀÇ Å¸¾ËÈ­»êÀÔ´Ï´Ù. Ÿ¾ËÈ­»êÀÇ »çÁøÀ» ¿Ã·Á³õÀº ÀÌÀ¯´Â ¼Û¾Ç»êÀ̳ª ÀÏÃâºÀ¿¡¼­ °üÂûÇÏ ¼ö ÀÖ´Â º£ÀÌÁö ½áÁö¶ó´Â Ãþ¸®±¸Á¶ ¶§¹®ÀÔ´Ï´Ù. À̵é È­»êü´Â ¸¶±×¸¶°¡ ÁöÇ¥¸éÀ¸·Î »ó½ÂÇÒ ¶§ ¹Ù´å¹°(?)°ú ¸¸³ª ¸Å¿ì ¶ß°Å¿î ¸¶±×¸¶°¡ ¹°À» ±Þ°ÝÇÏ°Ô ²ú°ÔÇÏ¸é ¹°ÀÌ ±âÈ­ÇÒ ¶§ Æø¹ßÇÏ¿© ¸¶±×¸¶°¡ »ê»êÁ¶°¢ ³ª¸é¼­ ¾Ë°»ÀÌ·Î ¸¸µé¾îÁö°Ô µË´Ï´Ù. ÀÌ ¾Ë°»À̵éÀº °øÁßÀ¸·Î Æ¢¾î ¿Ã¶ú´Ù°¡ ¶³¾îÁö¸é¼­ °æ»ç°¡ ³·Àº °÷À¸·Î Èê·¯³»¸®¸ç base surge¶ó´Â Ãþ¸®±¸Á¶¸¦ ¸¸µé¾î³»Áö¿ä. ÀÌ·¯ÇÑ º£ÀÌÁö ½áÁö´Â ¾Æ·¡ »çÁø°ú °°ÀÌ ¿øÆø½ÇÇè½Ã¿¡ ¸ñ°ÝµÇ¾úÁö¿ä. »óºÎ´Â ¹ö¼¸±¸¸§À» ¸¸µé¾î ³»Áö¸¸ ÇϺο¡´Â ¿øÆø½ÇÇèÀÌ µÈ Á߾Ӻο¡¼­ ¿øÇüÀÇ ¿Ü°¢À¸·Î Èê·¯³»¸®´Â ¸ð½ÀÀ» º¼ ¼ö ÀÖÀ» °Ì´Ï´Ù. ¾Æ·§ºÎºÐÀÌ ¹Ù·Î base surgeÀÔ´Ï´Ù. [È£ÁÖ¿¡¼­ ¿øÆøÅõÇϽà ¸¸µé¾îÁø ¹ö¼¸±¸¸§°ú base surge] [È÷·Î½Ã¸¶¿¡ ¿øÆøÅõÇϽà ¸¸µé¾îÁø ¹ö¼¸±¸¸§°ú base surge] À§ÀÇ »çÁø 2ÀåÀº À°»ó¿¡¼­ ¿øÆø½ÇÇè½Ã ¸¸µé¾îÁø ¹ö¼¸±¸¸§°ú base surge ÀÌÁö¸¸ ¾Æ·¡ »çÁø 2ÀåÀº ¹Ù´Ù¿¡¼­ ¿øÆø½ÇÇè½Ã ¸¸µé¾îÁø ¹ö¼¸±¸¸§°ú base surge ÀÔ´Ï´Ù. ¼º»êÀÏÃâºÀ°ú ¼Û¾Ç»ê µùÀÌ ÀÌ·¯ÇÑ ¿ø¸®¿¡ ÀÇÇØ ¸¸µé¾îÁ³´ä´Ï´Ù....             * µµ¿ò¸»¸¦ Ŭ¸¯ÇÏ½Ã¸é ´ñ±ÛÀÎÁõŰ»ç¿ë¾È³»°¡ ÀÚ¼¼È÷ ³ª¿Í ÀÖ½À´Ï´Ù.(µµ¿ò¸» ) ¾ÏÈ£ÄÚµå: ¼ýÀÚ: 8882   ±ÛÀÚ: yaqr Name : Password :
summaryrefslogtreecommitdiff path: root/xsd/cxx/tree/stream-insertion-source.cxx blob: 007e32c02e1e9cb5f52058c5f44047d9ffb584b4 (plain) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 // file : xsd/cxx/tree/stream-insertion-source.cxx // copyright : Copyright (c) 2005-2014 Code Synthesis Tools CC // license : GNU GPL v2 + exceptions; see accompanying LICENSE file #include <cxx/tree/stream-insertion-source.hxx> #include <xsd-frontend/semantic-graph.hxx> #include <xsd-frontend/traversal.hxx> namespace CXX { namespace Tree { namespace { struct List: Traversal::List, Context { List (Context& c) : Context (c) { } virtual void traverse (Type& l) { String name (ename (l)); // If renamed name is empty then we do not need to generate // anything for this type. // if (renamed_type (l, name) && !name) return; SemanticGraph::Type& item_type (l.argumented ().type ()); String base (L"::xsd::cxx::tree::list< " + item_type_name (item_type) + L", " + char_type); if (item_type.is_a<SemanticGraph::Fundamental::Double> ()) base += L", ::xsd::cxx::tree::schema_type::double_"; else if (item_type.is_a<SemanticGraph::Fundamental::Decimal> ()) base += L", ::xsd::cxx::tree::schema_type::decimal"; base += L" >"; size_t n (0); NarrowStrings const& st (options.generate_insertion ()); for (NarrowStrings::const_iterator i (st.begin ()); i != st.end (); ++i) { String stream_type ("::xsd::cxx::tree::ostream< " + *i + " >"); os << stream_type << "&" << endl << "operator<< (" << stream_type << "& s," << endl << "const " << name << "& x)" << "{" << "return s << static_cast< const " << base << "& > (x);" << "}"; // Register with type map. // if (polymorphic && polymorphic_p (l) && (!anonymous_p (l) || anonymous_substitutes_p (l))) { // Note that we are using the original type name. // String const& name (ename (l)); os << "static" << endl << "const ::xsd::cxx::tree::stream_insertion_initializer< " << poly_plate << ", " << i->c_str () << ", " << char_type << ", " << name << " >" << endl << "_xsd_" << name << "_stream_insertion_init_" << n++ << " (" << endl << strlit (l.name ()) << "," << endl << strlit (xml_ns_name (l)) << ");" << endl; } } } private: String item_type_name (SemanticGraph::Type& t) { std::wostringstream o; MemberTypeName type (*this, o); type.dispatch (t); return o.str (); } }; struct Union: Traversal::Union, Context { Union (Context& c) : Context (c) { } virtual void traverse (Type& u) { String name (ename (u)); // If renamed name is empty then we do not need to generate // anything for this type. // if (renamed_type (u, name) && !name) return; String const& base (xs_string_type); size_t n (0); NarrowStrings const& st (options.generate_insertion ()); for (NarrowStrings::const_iterator i (st.begin ()); i != st.end (); ++i) { String stream_type ("::xsd::cxx::tree::ostream< " + *i + " >"); os << stream_type << "&" << endl << "operator<< (" << stream_type << "& s," << endl << "const " << name << "& x)" << "{" << "return s << static_cast< const " << base << "& > (x);" << "}"; // Register with type map. // if (polymorphic && polymorphic_p (u) && (!anonymous_p (u) || anonymous_substitutes_p (u))) { // Note that we are using the original type name. // String const& name (ename (u)); os << "static" << endl << "const ::xsd::cxx::tree::stream_insertion_initializer< " << poly_plate << ", " << i->c_str () << ", " << char_type << ", " << name << " >" << endl << "_xsd_" << name << "_stream_insertion_init_" << n++ << " (" << endl << strlit (u.name ()) << "," << endl << strlit (xml_ns_name (u)) << ");" << endl; } } } }; struct Enumeration: Traversal::Enumeration, Context { Enumeration (Context& c) : Context (c), base_ (c) { inherits_base_ >> base_; } virtual void traverse (Type& e) { String name (ename (e)); // If renamed name is empty then we do not need to generate // anything for this type. // if (renamed_type (e, name) && !name) return; bool string_based (false); { IsStringBasedType t (string_based); t.dispatch (e); } bool enum_based (false); if (string_based) { SemanticGraph::Enumeration* base_enum (0); IsEnumBasedType t (base_enum); t.dispatch (e); enum_based = (base_enum != 0); } String value; if (string_based) value = evalue (e); size_t n (0); NarrowStrings const& st (options.generate_insertion ()); for (NarrowStrings::const_iterator i (st.begin ()); i != st.end (); ++i) { String stream_type ("::xsd::cxx::tree::ostream< " + *i + " >"); os << stream_type << "&" << endl << "operator<< (" << stream_type << "& s," << endl << "const " << name << "& x)" << "{"; if (!string_based || enum_based) { os << "return s << static_cast< const "; inherits (e, inherits_base_); os << "& > (x);"; } else { os << name << "::" << value << " v (x);" << "return s << static_cast< unsigned int > (v);"; } os << "}"; // Register with type map. // if (polymorphic && polymorphic_p (e) && (!anonymous_p (e) || anonymous_substitutes_p (e))) { // Note that we are using the original type name. // String const& name (ename (e)); os << "static" << endl << "const ::xsd::cxx::tree::stream_insertion_initializer< " << poly_plate << ", " << i->c_str () << ", " << char_type << ", " << name << " >" << endl << "_xsd_" << name << "_stream_insertion_init_" << n++ << " (" << endl << strlit (e.name ()) << "," << endl << strlit (xml_ns_name (e)) << ");" << endl; } } } private: Traversal::Inherits inherits_base_; BaseTypeName base_; }; struct Element: Traversal::Element, Context { Element (Context& c, String const& scope_, String const& stream_) : Context (c), scope (scope_), stream (stream_) { } virtual void traverse (Type& e) { if (skip (e)) return; String const& aname (eaname (e)); SemanticGraph::Type& t (e.type ()); String type (scope + L"::" + etype (e)); // Figure out if we need to generate polymorphic code. If this // elemen's type is anonymous then we don't need to do anything. // Note that if the type is anonymous then it can't be derived // from which makes it impossible to substitute or dynamically- // type with xsi:type. // bool poly (polymorphic && polymorphic_p (t) && !anonymous_p (t)); if (max (e) != 1) { // sequence // os << "{" << "const " << scope << "::" << econtainer (e) << "& c (" << "x." << aname << " ());" << "s << ::xsd::cxx::tree::ostream_common::as_size< " << "::std::size_t > (c.size ());"; os << "for (" << scope << "::" << econst_iterator (e) << endl << "i (c.begin ()), e (c.end ());" << endl << "i != e; ++i)" << "{"; if (poly) { os << "bool d (typeid (" << type << ") != typeid (*i));" << "s << d;" << "if (!d)" << endl << "s << *i;" << "else" << endl << "::xsd::cxx::tree::stream_insertion_map_instance< " << poly_plate << ", " << stream << ", " << char_type << " > ().insert (s, *i);"; } else os << "s << *i;"; os << "}" // for << "}"; } else if (min (e) == 0) { // optional // os << "{" << "bool p (x." << aname << " ());" << "s << p;" << "if (p)"; if (poly) { os << "{" << "const " << type << "& i (*x." << aname << " ());" << "bool d (typeid (" << type << ") != typeid (i));" << "s << d;" << "if (!d)" << endl << "s << i;" << "else" << endl << "::xsd::cxx::tree::stream_insertion_map_instance< " << poly_plate << ", " << stream << ", " << char_type << " > ().insert (s, i);" << "}"; } else os << endl << "s << *x." << aname << " ();"; os << "}"; } else { // one // if (poly) { os << "{" << "const " << type << "& i (x." << aname << " ());" << "bool d (typeid (" << type << ") != typeid (i));" << "s << d;" << "if (!d)" << endl << "s << i;" << "else" << endl << "::xsd::cxx::tree::stream_insertion_map_instance< " << poly_plate << ", " << stream << ", " << char_type << " > ().insert (s, i);" << "}"; } else os << "s << x." << aname << " ();"; } } private: String scope; String stream; }; struct Attribute: Traversal::Attribute, Context { Attribute (Context& c) : Context (c) { } virtual void traverse (Type& a) { String const& aname (eaname (a)); if (a.optional_p () && !a.default_p ()) { os << "{" << "bool p (x." << aname << " ());" << "s << p;" << "if (p)" << endl << "s << *x." << aname << " ();" << "}"; } else { os << "s << x." << aname << " ();"; } } }; struct Complex: Traversal::Complex, Context { Complex (Context& c) : Context (c), base_ (c) { inherits_ >> base_; } virtual void traverse (Type& c) { SemanticGraph::Context& ctx (c.context ()); String name (ename (c)); // If renamed name is empty then we do not need to generate // anything for this type. // if (renamed_type (c, name) && !name) return; bool ordered (ordered_p (c) && !ctx.count ("order-in-base")); bool has_body (ordered || has<Traversal::Member> (c) || c.inherits_p ()); size_t n (0); NarrowStrings const& st (options.generate_insertion ()); for (NarrowStrings::const_iterator i (st.begin ()); i != st.end (); ++i) { String stream_type ("::xsd::cxx::tree::ostream< " + *i + " >"); os << stream_type << "&" << endl << "operator<< (" << stream_type << "& s," << endl << "const " << name << "&" << (has_body ? " x" : "") << ")" << "{"; if (c.inherits_p ()) { os << "s << static_cast< const "; inherits (c, inherits_); os << "& > (x);"; } // Write the order sequence. // if (ordered) { String const& ci (ctx.get<String> ("order-const-iterator")); String const& an (ctx.get<String> ("order-aname")); os << "s << ::xsd::cxx::tree::ostream_common::as_size< " << "::std::size_t > (" << endl << "x." << an << " ().size ());" << endl << "for (" << name << "::" << ci << endl << "b (x." << an << " ().begin ()), n (x." << an << " ().end ());" << endl << "b != n; ++b)" << "{" << "s << ::xsd::cxx::tree::ostream_common::as_size< " << "::std::size_t > (b->id);" << "s << ::xsd::cxx::tree::ostream_common::as_size< " << "::std::size_t > (b->index);" << "}"; } { Traversal::Names names_member; Element element (*this, name, *i); Attribute attribute (*this); names_member >> element; names_member >> attribute; names (c, names_member); } os << "return s;" << "}"; // Register with type map. // if (polymorphic && polymorphic_p (c) && !c.abstract_p () && (!anonymous_p (c) || anonymous_substitutes_p (c))) { // Note that we are using the original type name. // String const& name (ename (c)); os << "static" << endl << "const ::xsd::cxx::tree::stream_insertion_initializer< " << poly_plate << ", " << i->c_str () << ", " << char_type << ", " << name << " >" << endl << "_xsd_" << name << "_stream_insertion_init_" << n++ << " (" << endl << strlit (c.name ()) << "," << endl << strlit (xml_ns_name (c)) << ");" << endl; } } } private: Traversal::Inherits inherits_; BaseTypeName base_; }; } void generate_stream_insertion_source (Context& ctx) { if (ctx.polymorphic) { NarrowStrings const& st (ctx.options.generate_insertion ()); ctx.os << "#include <xsd/cxx/tree/stream-insertion-map.hxx>" << endl << endl; bool import_maps (ctx.options.import_maps ()); bool export_maps (ctx.options.export_maps ()); if (import_maps || export_maps) { ctx.os << "#ifndef XSD_NO_EXPORT" << endl << endl << "namespace xsd" << "{" << "namespace cxx" << "{" << "namespace tree" << "{"; for (NarrowStrings::const_iterator i (st.begin ()); i != st.end (); ++i) { String stream (*i); ctx.os << "#ifdef _MSC_VER" << endl; if (export_maps) ctx.os << "template struct __declspec (dllexport) " << "stream_insertion_plate< " << ctx.poly_plate << ", " << stream << ", " << ctx.char_type << " >;"; if (import_maps) ctx.os << "template struct __declspec (dllimport) " << "stream_insertion_plate< " << ctx.poly_plate << ", " << stream << ", " << ctx.char_type << " >;"; ctx.os << "#elif defined(__GNUC__) && __GNUC__ >= 4" << endl << "template struct __attribute__ ((visibility(\"default\"))) " << "stream_insertion_plate< " << ctx.poly_plate << ", " << stream << ", " << ctx.char_type << " >;" << "#elif defined(XSD_MAP_VISIBILITY)" << endl << "template struct XSD_MAP_VISIBILITY " << "stream_insertion_plate< " << ctx.poly_plate << ", " << stream << ", " << ctx.char_type << " >;" << "#endif" << endl; } ctx.os << "}" // tree << "}" // cxx << "}" // xsd << "#endif // XSD_NO_EXPORT" << endl << endl; } ctx.os << "namespace _xsd" << "{"; size_t n (0); for (NarrowStrings::const_iterator i (st.begin ()); i != st.end (); ++i) { String stream (*i); ctx.os << "static" << endl << "const ::xsd::cxx::tree::stream_insertion_plate< " << ctx.poly_plate << ", " << stream << ", " << ctx.char_type << " >" << endl << "stream_insertion_plate_init_" << n++ << ";"; } ctx.os << "}"; } Traversal::Schema schema; Sources sources; Traversal::Names names_ns, names; Namespace ns (ctx); List list (ctx); Union union_ (ctx); Complex complex (ctx); Enumeration enumeration (ctx); schema >> sources >> schema; schema >> names_ns >> ns >> names; names >> list; names >> union_; names >> complex; names >> enumeration; schema.dispatch (ctx.schema_root); } } }
COXETER GEOMETRY REVISITED PDF MAA books for those who are interested in math. Geometry Revisited by H.S.M. Coxeter and S.L. Greitzer. Nov 9, In a book appeared with the widely embracing title Introduction to Geometry . Its author was H. S. M. Coxeter who, in the preface, said that. Cambridge Core – Geometry and Topology – Geometry Revisited – by H.S.M. Coxeter. Author: Vudobei Shalrajas Country: Serbia Language: English (Spanish) Genre: Relationship Published (Last): 14 October 2014 Pages: 414 PDF File Size: 18.47 Mb ePub File Size: 7.47 Mb ISBN: 639-2-57367-913-9 Downloads: 58583 Price: Free* [*Free Regsitration Required] Uploader: Kacage Geeometry and with solu- tions by S. If O and P are the common points of two intersecting circles y and S, inversion in any circle with center O yields two lines through P ‘, the inverse of P. It follows that, after the indicated reflections, the sides of the orthic triangle will, in order, lie on the straight line PP 1shown in Figure 4. GEOMETRY REVISITED H. S. M. Coxeter S. L. Greitzer PDF ( Free | Pages ) We shall denote the interior angles at E and F simply by E and F. Geometry especially projective geometry is still an excellent means of introducing the student to axiomatics. In the case of inversion, we took care of exceptions by extending the Euclid- ean plane into the inversive plane. English Choose a language for shopping. Draw three congruent circles all touching one another, and a second set of three such circles, each touching also two of the first set. Stereographic projection preserves angles. In fact, the Simson line envelops a beautifully symmetrical curve called a deltoid or “Steiner’s hypocycloid” [20].   42BYGH 609 PDF Sawyer 3 An Introduction to Inequalities by E. Moreover, when we regard this theorem as applying to an arbitrary circle a instead of the reciprocating circle w, we can use w to derive from a a reciprocal conic a’. It’s got a chapter on each of the following things: In the notation of Figure 4. Nowadays, the words “square”, “line”, revisitev the like sometimes have derogatory connotations, but the circle — never. We might at first expect A to invert into the center of a’; but that would be too simple! Geometry Revisited He should feel free to skip complicated parts and return to them later; often an argument will be clarified by a subse- quent remark. We are thus free to use the equations 2. Sir Horace Lamb [19, pp. Con- versely, each line p not through 0 determines a corresponding point P, called the pole of P; it is the inverse of the foot of the perpendicular from 0 to p. These advances geometrj many beautiful results such as Brianchon’s Theorem Section 3. Nor must he expect to understand all parts of the book on first reading. Otherwise interchange 2J and C. Full text of “Geo (PDFy mirror)” For instance, we may take the sides of a hexagon circumscribed about the circle w to be the tangents at the vertices of a hexagon inscribed in the same circle; thus Pascal’s theorem Section 3. Stewart, who stated it in As the eccentricity t increases, the conic becomes geoemtry and more obviously different from a circle.   LA CHIMICA MENTALE CHARLES HAANEL PDF All other cases can be derived by re-naming A, B, Revistied. This property of continued pedals has been generalized by B. Thus both A and J5 are points of equal power Section 2. What is the locus of points of constant power greater than — R 2 with respect to a given circle? They are sometimes called Soddy’s circles [6, pp. If squares are erected externally on the sides of a parallelogram, their centers are the vertices of a square. GEOMETRY REVISITED H. S. M. Coxeter S. L. Greitzer As we saw in Section 6. The points do not necessarily form a triangle; they may be collinear. A ship sails the ocean. Find the length of the internal bisector of the right angle in a triangle with sides 3, 4, 5. To prove this, consider two corresponding segments AB and A’B’ of directly similar figures. Thus the orthocentric quadrangle determines a set of sixteen circles, all tangent to the circle DEF. They are sometimes mistakenly attributed to Euler, who proved, as early asthat the orthic triangle and the medial triangle have the same circumcircle. The join of two opposite vertices is called a diagonal. What lines are these?
Sistemas operativos/Características De Wikilibros, la colección de libros de texto de contenido libre. Saltar a: navegación, buscar Características de los sistemas operativos[editar] El sistema operativo tiene las siguientes características: 1. Conveniencia: un sistema operativo hace más conveniente el uso de una computadora. 2. Eficiencia: el sistema operativo permite que los recursos de la computadora se usen de manera correcta y eficiente. 3. Habilidad para evolucionar: un sistema operativo debe de ser capaz de aceptar nuevas funciones sin que tenga problemas. 4. Encargado de administrar el hardware: el sistema operativo debe de ser eficaz. 5. Relacionar dispositivos 6. Algoritmos: un sistema operativo hace el uso de la computadora más racional 7. ES UN GRUPO DE PROGRAMAS DE PROCESO CON LAS RUTINAS DE CONTROL NECESARIAS PARA MANTENER CONTINUAMENTE OPERATIVOS DICHOS PROGRAMAS.
読者です 読者をやめる 読者になる 読者になる HDE BLOG コードもサーバも、雲の上 第24回 Monthly Technical Session (MTS) レポート 勉強会 MTS 7/22に第24回 Monthly Technical Session (MTS)が行われました。 MTSは、主に技術的な興味関心、また現在行っていることから得られた知見を共有するための取り組みで、司会進行から質疑応答まで全編通して英語で行われる社内勉強会です。 今回の司会はjonasさんでした。また、当日はijinさんが飛び入り参加で各LTのQ&Aにも参加いただきました。 f:id:doi-t:20160728101221p:plain トップバッターの楠本さんは、学生時代に南極で行った研究について紹介してくれました。 現地では南極の大気の情報集めるバルーンと連携して、情報をストレージに溜め込む装置のソフトウェアをメンテナンスしていたそうです。 Q&Aでは、バルーンの回収はどうするのかとの問いに対して、気流に乗って漂うだけで、最後はどこかに落ちる仕様との回答に、一同驚きの様子でした。 f:id:doi-t:20160728101225p:plain 2番手の林さんは、開発バージョンで発生したメモリリークの原因を突き止めるために使用したpythonのツール群 (memory_profiler, Pympler, gc) をデモを交えつつ紹介してくれました。環境の制約によっては各ツールが有効でない場合もあるので、状況や目的に応じて使い分ける必要があります。 f:id:doi-t:20160728101229p:plain 前半のセッションの最後は田邊さん。サーバレスアーキテクチャで実現した監視システムについて。CloudWatch Eventsを契機にAPI Gateway, lambda, SES, SNS, CloudWatch Metricsなどが連携して、閾値を超えた監視項目がslackへ通知される実例を示してくれました。 これによって"誰が監視システムを監視するのか問題"を解消しつつ*1、lambdaによる自由なシステム監視とそのメトリクス可視化という大きなメリットが得られました。 f:id:doi-t:20160728101232p:plain 休憩を挟んで4番手は牧さん。"kubernetes in 20 minutes"というタイトルで、k8sの知見を共有してくれました。k8sとは何か、またk8sに触れるに当たって理解しておく必要があるCluster, Node, Pod, Replica Set, Deployment, Services, Secrets, ConfigMaps, Ingress, DaemonSets, PetSetsなどの概念がどのような役割でお互いどのような関係を持つのかをわかりやすく解説してくれました。アップデートの激しさも相まって、便利だけれども一筋縄ではいかない難しさがあるようです。 f:id:doi-t:20160728101234p:plain 5番手は先月からGIPインターン中のTze-Chenさん。現在大学の研究で使っているHadoopについて。Googleが発表した2つの論文 ( The Google File System , MapReduce: Simplified Data Processing on Large Clusters) によって明らかになったHadoopがどのような目的で作られたのか、facebookが管理する世界最大規模のHadoopクラスタや、MapReduceの仕組みなど、Hadoopの概要を説明してくれました。 f:id:doi-t:20160728101237p:plain ラストは同じくGIPインターン中のRizkiさんが様々な暗号化手法について。暗号化手法別の分類と歴史的な分類の二つのアプローチで各手法がどのような経緯と特徴を持つのかを解説してくれました。また、実例としてエニグマ暗号機を紹介してくれました。 f:id:doi-t:20160728101240p:plain 発表の後はAfter-Party!! MTSはエンジニア同士の知見共有の場として開かれていますが、このAfter-PartyもまたGIPインターンも含めた社内の誰でも参加可能な交流の場として開かれています。 f:id:doi-t:20160728101243p:plain ちなみに、この日はPokemon Goのリリース日だったので、会場は完全にPokemon Go試遊会と化していました。 f:id:doi-t:20160728101731j:plain f:id:doi-t:20160728101736j:plain *1:それでもなお"誰がAWSを監視するのか問題"があるにせよ! 第23回 Monthly Technical Session (MTS) レポート 勉強会 MTS 6/24に第23回 Monthly Technical Session (MTS)が行われました。 MTSは、主に技術的な興味関心、また現在行っていることから得られた知見を共有するための取り組みで、司会進行から質疑応答も含めて全編通して英語で行われる社内勉強会です。今回も前回に引き続き多彩なトピックを社内で共有することができました。 今回の司会は篠原さんでした。 f:id:doi-t:20160624165517j:plain まずは中津さんがウェアラブルについて話してくれました。今回は運動中のHEART RATEを監視することで、ペース配分に役立てる例を示してくれました。次は違った角度からのウェアラブル紹介ということでシリーズ化の予定です! f:id:doi-t:20160624171241j:plain 2人目の柳楽さんはAWS Summit Tokyo 2016のレポートをしてくれました。たくさんあった講演の中からBig Data Pipeline (pdf)とCode Pipeline (pdf)を取り上げて、その内容を共有していただきました。 f:id:doi-t:20160624172627j:plain 3人目はShi Hanさん。"Go i18n"というタイトルで、GoにおけるInternationalizationについて発表してくれました。現時点では選択肢が少なく (i18n4go, go-i18n)、まだまだ発展途上 (Ref. Proposal: Localization support in Go) ということもあり、その苦悩を共有してくれました。当日はQ&AでPythonやJavaScriptとの比較等で白熱した議論となり、後日gettextのGo実装を行うに至りました! f:id:doi-t:20160624174532j:plain 休憩を挟んで4人目のIskandarさんは、Android開発のイントロダクションをしてくれました。世界での普及率、バージョンの歴史と問題、アーキテクチャなどの解説の他に、実装方法の選択肢や具体的な実装例を示してもらいました。 f:id:doi-t:20160624180509j:plain 5人目は最近アルバイトとしてjoinしてくれているNuttさん。タイ語におけるN-gramによる全文検索について、その概要とUnicodeに由来する難しさを紹介してくれました。タイ語は1文字が複数の文字の組み合わせで構成されることから、検索の際にはタイ語に合わせた工夫が必要になるようです。 f:id:doi-t:20160624183146j:plain 最後は、インターンのGavinさん。型システムについて、そもそも型とは何かから始まり、Lambda cubeの解説や、実際問題としてRustやJavaScriptにおける実装がどうなっているのかをデモを通じて説明してくれました。 f:id:doi-t:20160624184958j:plain この日は、RendongさんとGavinさんのインターン最終日だったので、恒例の修了式を執り行いました。6週間に渡るインターンお疲れ様でした! f:id:doi-t:20160624190934j:plain One Month in Beijing - Remote work as a developer This is Xudong from development team. It's been a while since my last post. I would like to share my experience of working remotely in Beijing this time. Due to some private matter, I had to live in Beijing for several weeks to stay with my family. However, during this time, it seems to be unnecessary to take a vacation as I have enough spare time to do the work. Also, we had just welcomed a new developer, Bumi san, into our team. It would be great if I could help him to get accustomed to our development team quickly. So this time, I tried to work remotely. And this has got full support from my team mates and manager of development team, Minoura san. I really appreciated it. What remote working is like My remote work started from the last week of April, a week before Golden Week in Japan and it lasted over a month. There is only one hour time difference between Beijing and Tokyo. So I managed to work at almost the same time with my colleagues. Every day, I went online at my usual time to office in the morning from home and worked until the time I usually leave office. During this time, everything was the same as I'm in office as I mainly do development work which includes designing features, writing and reviewing code and writing documents with my own PC for work. Of course, I need to update myself with what is happening in office and communicate with my team mates. And I found it easy to do those things as we already adopted a lot of tools to work and collaborate online. Tools and methodology There are a lot of experience sharing post about what specific tools should be used for remote working. However, I found them not quite helpful as a lot of them are quite complicated to use across the team. I realized that we (my team mates and me) just needed tools to let us easily get updates with the progress of each other and tools to make communication smooth and efficient. And we were able to achieve that with what we already have: • github - for development • slack - for text communication • skype - for vocal and video communication • yammer - for announcement • google for work - for document sharing • HDE One, of course - for access control and other online services that we use for development. We held a small meeting within our team on skype every day for around 10 minutes before I went offline. Aside from that, there was nothing specific done for my remote working. And everything went smoothly. Others Remote work saved my time significantly. I didn't need to commute to and from office, which usually takes around 3 hours. Since I work at home, I managed to start working right after my breakfast. I even got time to prepare my own lunch during the lunch break as I usually have lunch by myself. However, I gained some weight during this one month because of apparently lacking of exercise and staying indoors too much. I should have spent more time going outdoors and doing exercise after work. My team and I managed to work without much difficulty during this one month. I'm quite happy that I had a chance to try remote working out. I would like to try more if it is possible. Finally, a photo I took from Beijing Botanical Garden during this one month. f:id:yxd-hde:20160608175240j:plain 第22回 Monthly Technical Session (MTS) レポート MTS 勉強会 5/27に第22回 Monthly Technical Sessionが行われました。 前回に引き続き、今回も7名のメンバーが各々持ち寄ったトピックについて発表してくれました。 今回の司会はBagusさんでした。 f:id:doi-t:20160527165948j:plain まずは木暮さんがDataScopeというタイトルで、今後社内に広く展開する予定のデータ分析基盤を紹介してくれました。あらゆるログを収集して分析することで、PDCAサイクルのCheckフェーズに対して、詳細なKPIを提供することができるようになるこの分析基盤を、将来的には横断的にチームやシステムに提供していく計画を示してくれました。 f:id:doi-t:20160527170210j:plain 次に、荒川さんが、メールのTLS暗号化について、その仕組みと世の中の浸透具合を共有をしてくれました。2016年2月9日にGoogleがgmail上でメールの暗号化の明示するようになったのは、記憶に新しい方も多いと思いますが、世の中的にはまだまだ浸透しきったとは言えない状況のようです。 support.google.com f:id:doi-t:20160527171654j:plain 3番手は、直前にde:codeに行っていた小玉さんからイベントのレポートでした。より一層OSSへ寄り添う姿勢を見せるMicrosoftの変化を共有してもらいました。発表の最後には"Even Microsoft was able to change. We should be able to do the same."と言う提言が投げかけられました。 f:id:doi-t:20160527173006j:plain 休憩を挟んで... f:id:doi-t:20160527174718j:plain 4番手はBumiさんによるAPI Gatewayの紹介でした。RESTfull APIの話から始まり、実際にAPI Gatewayでエンドポイントを作る流れや、Swaggerswagger importerの紹介などがありました。 f:id:doi-t:20160527175532j:plain 5番手のKevinさんは、JavaScriptのビルドツールについて。たくさんある中でもGruntGulpの紹介をしていただきました。フロントエンドのチームではこの発表を機に早速ビルドツールの見直しが始まっているようです! f:id:doi-t:20160527181456j:plain 6番手は先月から新たに開発部門にてインターンを開始したRendongさん。IPython及びJupyterをデモを交えながら紹介してくれました。また、様々な言語に対応したJupyter NotebookがGithubやnbviewer上で公開されており、自由に使えます。 f:id:doi-t:20160527183049j:plain 今回、当日中国でリモートワークしていたXudongさんがリモートで参加してみる、という試みが行われました。これは中国から質問している様子。 f:id:doi-t:20160527183325j:plain 最後は、今日でインターン最終日だったAnastasiiaさん。インターン中に得た成果の一部として、ウクライナのIT事情について。実はIT人材が非常に多いウクライナの現状をデータと共に共有してくれました。 f:id:doi-t:20160527183651j:plain MTS終了後、2カ月に渡るグローバルインターンを終えたAnastasiiaさんの修了式を取り行いました。 f:id:doi-t:20160527185443j:plain MTSの後はAfter-party! f:id:doi-t:20160527190858j:plain f:id:doi-t:20160527190931j:plain LXC : A Quick Overview Hello, my name is Jeffrey Lonan, currently working as a DevOps Engineer in HDE, Inc. This post is based on my presentation during HDE's 21st Monthly Technical Session. Containers, Containers Everywhere! As DevOps practitioners these days, containers are a part and parcel of our working life. Developers use them to test their Applications in their efforts to quash every last (major) bugs in their app. Operators use them to test their infrastructure configurations in their quest to create the ultimate “Infrastructure-As-A-Code” setup, or even deploying and running containers as part of their infrastructure. One of the most well-known container solution out there is Docker, as well as the up and coming rkt. These are Application Containers, whereby the design philosophy is to reduce a container as much as possible to only run a single process, ideally the application we want to run, and package it into a portable container image, which then can be deployed anywhere. Some application container providers (e.g. Docker) have an extensive toolset to make it easier to build & customise container images and deploying them into the infrastructure. There are advantages and disadvantages concerning the Application Container philosophy, but we will not dwell on it in this post. Instead, let's get into a different way of running containers! System Containers Enter LXC . LXC is a System Container, which means that it is a Container that is designed to replicate closely a Bare Metal / VM host, and therefore you can treat LXC containers as you would treat a normal server / VM host. You can run your existing configuration management in these containers with no modifications and it will work just fine. f:id:jeffrey-lonan:20160523101106p:plain LXC started as a project to utilize the cgroups functionality that was introduced in 2006, that allows separation and isolation of processes within their own namespace in a single Linux Kernel. Some of the features in LXC includes • Unprivileged Containers allowing full isolation from the Host system. This works by mapping UID and GID of processes in the container to unprivileged UID and GID in the Host system • Container resource management via cgroups through API or container definition file. The definition file can easily be managed by a configuration management tool • Container rootfs creation and customization via templates. When creating a container with a pre-existing template, LXC will create the rootfs and download the minimal packages from the upstream repository required to run the container • Hooks in the container config to call scripts / executables during a container’s lifetime • API and bindings for C & Python to programmatically create and manage containers • CRIU support from LXC 1.1.0 onwards (lxc-checkpoint) to create snapshots of running containers, which then can be copied to and re instantiated in another host machine Our First Container On a Linux system, you can use your favourite package manager to install lxc. For this example, let's use yum with CentOS 7 $ yum install -y lxc bridge-utils the bridge-utils package is needed as the containers will communicate with the outside world via the host system's network bridge interface. Assuming you have created a bridge interface called virbr0, let's proceed with actually launching a container! We will use lxc-create command will create the root file system (rootfs) for our container, using CentOS and named test01 $ lxc-create --name test01 -t centos Host CPE ID from /etc/os-release: cpe:/o:centos:centos:7 dnsdomainname: Name or service not known Checking cache download in /var/cache/lxc/centos/x86_64/7/rootfs ... Cache found. Updating... Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile * base: ftp.iij.ad.jp * extras: download.nus.edu.sg * updates: ftp.iij.ad.jp No packages marked for update Loaded plugins: fastestmirror Cleaning repos: base extras updates 0 package files removed Update finished Copy /var/cache/lxc/centos/x86_64/7/rootfs to /var/lib/lxc/test01/rootfs ... Copying rootfs to /var/lib/lxc/test01/rootfs ... Storing root password in '/var/lib/lxc/test01/tmp_root_pass' Expiring password for user root. passwd: Success Container rootfs and config have been created. Edit the config file to check/enable networking setup. The temporary root password is stored in: '/var/lib/lxc/test01/tmp_root_pass' The root password is set up as expired and will require it to be changed at first login, which you should do as soon as possible. If you lose the root password or wish to change it without starting the container, you can change it from the host by running the following command (which will also reset the expired flag): chroot /var/lib/lxc/test01/rootfs passwd So our container rootfs has been created! Note that LXC will auto generate the SSH password for first-time login. Let's start our container using lxc-start and check for running containers with lxc-ls --active $ lxc-start -n test01 -d $ lxc-ls --active test01 Our first container is up and running! We can access the container using SSH with the auto-generated password. If we are not sure about the IP address, we can also use the lxc-attach command to gain access to your container and do whatever is needed with your container (e.g. Installing packages, set IP address etc.). $ lxc-attach -n test01 [root@test01 ~]# cat /etc/hosts 127.0.0.1 localhost test01 Our first container was created and instantiated using default settings, but default setting is no fun! At some point in time, we would like to customise our containers, so for this, we would need to create the container configuration files. LXC Container Configuration By default, the container config file will be created in the path you specify when running lxc-create, of which the default value is /var/lib/lxc/<container-name>/config. Here is a sample of a container custom configuration file of container named lxc3 # LXC Container Common Configuration lxc.rootfs = /mnt/lxc3/rootfs lxc.include = /usr/share/lxc/config/centos.common.conf lxc.arch = x86_64 lxc.utsname = lxc3 lxc.autodev = 1 lxc.kmsg =1 # LXC Container Network Configuration lxc.network.type = veth lxc.network.flags = up lxc.network.link = virbr0 lxc.network.name = eth0 lxc.network.ipv4 = 192.168.99.21/24 # LXC cgroups config lxc.cgroup.cpuset.cpus = 0-1 lxc.cgroup.memory.limit_in_bytes = 1073741824 # LXC Mount Configs lxc.mount.entry = /opt/lxc3 opt none bind 0 0 # LXC Hooks lxc.hook.pre-start = /mnt/lxc3/setenv.sh The configuration file above is used to define the container properties, like hostname, IP addresses, host folders to be mounted, among other things, using key-value pairs. We won't go into details on the container configurations here, so if you are curious about the configuration file, do check out the documentation. LXC Python APIs So, you've configured your container configurations and created your containers. So what next? Automate your container deployment and configurations? Of course!. I created a simple Python script for the previous MTS session to create and start a container, so let's check it out! #!/usr/bin/env python import lxc import sys import argparse parser = argparse.ArgumentParser(description='Create a LXC container') parser.add_argument('--name', help='Container name') parser.add_argument('--create', help='Create the Container', action="store_true") parser.add_argument('--start', help='Start the Container', action="store_true") parser.add_argument('--stop', help='Stop the Container', action="store_true") args = parser.parse_args() #Set Container Name c = lxc.Container(args.name) #Set container initial configuration config = {"dist":"centos","release":"7","arch":"amd64"} #Create Container if args.create: print "Creating Container" if c.defined: print ("Container exists") sys.exit(1) #Create the container rootfs if not c.create("download", lxc.LXC_CREATE_QUIET, config): print ("Failed to create container rootfs",sys.stderr) sys.exit(1) #Start Container if args.start: print "Starting Container" if not c.start(): print("Failed to start container", sys.stderr) sys.exit(1) print "Container Started" # Query some information print("Container state: %s" % c.state) print("Container PID: %s" % c.init_pid) #Stop Container if args.stop: print "Stopping the Container" if not c.shutdown(3): c.stop() if c.running: print("Stopping the container") c.stop() c.wait("STOPPED", 3) You will need to install the lxc-python2 package using pip and import it to your script. So, to create a container and start it up, I simply run the following $ ./launch-lxc-demo.py --help usage: launch-lxc-demo.py [-h] [--name NAME] [--create] [--start] [--stop] Create a LXC container optional arguments: -h, --help show this help message and exit --name NAME Container name --create Create the Container --start Start the Container --stop Stop the Container $ ./launch-lxc-demo.py --name test01 --create Creating Container $ lxc-ls test01 $ ./launch-lxc-demo.py --name test01 --start Starting Container Container Started Container state: RUNNING Container PID: 689 $ lxc-ls --active test01 $ lxc-attach -n test01 [root@test01 ~]# You can also get and set the container configuration via the API to update your container configuration programmatically. For more information on the APIs, please check out the documentation here Conclusion So we have gone through some of the more interesting features available in LXC. There are more features in LXC that cannot be covered by this post, so if you are interested for more information, please visit the official LXC website at Linux Containers. You can also check out the excellent blog posts by Stéphane Graber, the project lead on LXC, here. As an Operator, I have used both Docker and LXC for testing and deploying infrastructure, and personally, I prefer LXC due to its VM-like characteristics, which makes it easy for me to run my existing configuration management manifests inside LXC. I also enjoyed the flexibility afforded by the LXC configuration file, and in fact, I have used my configuration management tool to create & maintain LXC configuration files and launch customised container into the infrastructure. With new tools like LXD coming up, I am confident that LXC will find its place in DevOps, alongside Docker and rkt. Configuring an AWS Lambda Function to Access Both Resources in Public Internet and an Amazon VPC Hello, this is Bagus from HDE, Inc. This post is a summary of my presentation on HDE's 21st Monthly Technical Session. Recently, I’ve been working more with AWS Lambda. There was a time when I created a Lambda function which accesses both resources in public internet and an Amazon VPC. I learned quite a lot from it, so I'd like to share the experience. 続きを読む 第21回 Monthly Technical Session (MTS) 開催! 勉強会 MTS 4/22に毎月行っている Monthly Technical Session (MTS) が開催されました。MTSは、主に技術的な興味関心、また現在行っている取り組みから得られた知見を共有するための取り組みで、今回で第21回目です。 今回は7名のメンバーが発表してくれました。グローバルメンバーが増えてきたこともあって、MTSは司会進行から質疑応答も含めて全編通して英語で行っています。 今回の司会進行はイスカンダルさんでした。 f:id:doi-t:20160422172056j:plain トップバッターは大久保さん、MkDocsによるドキュメント生成について。ローカルに立てたサーバを使ってリアルタイムにドキュメントが更新される様子をデモで紹介していただきました。 f:id:doi-t:20160422172451j:plain 2人目はバグースさん、AWS lambda functionをVPC内に作った経験を発表していただきました。VPC内のlambda functionからVPC外のAWSリソースにアクセスするにはNAT GatewayやVPC endpointを用意する等、得られた知見を共有してくれました。 f:id:doi-t:20160422174332j:plain 3人目は小河さん、現在開発中のサービスと社内の開発体制について発表してもらいました。各チームメンバーのプロジェクト内における役割、Goを全面的に採用したプロジェクトではコードベースにどれほどインパクトがあるのか、等を社内向けに紹介していただきました。 f:id:doi-t:20160422175453j:plain 休憩を挟んで、4人目は小玉さん、マイクロソフトのActive Directory & Security Conference 2016に参加きた報告をしていただきました。マイクロソフトがAzure ADをどういった形でIDaaSとして提供しようとしているのか、実際にAzureAD認証を行うデモと共に紹介してくれました。 f:id:doi-t:20160422181357j:plain 5人目は4月1日に入社したばかりのジェフリーさん、LXCとは何かについてデモを交えつつ紹介していただきました。発表の中で、LXCのコンセプト、LXDとの関係、またdockerとの違いについて持っている知見を共有してくれました。 f:id:doi-t:20160422182446j:plain 6人目はヘンリーさん、インターンシップ中に開発したツールの紹介をしてくれました。3週間足らずでアイデアを形にして、デモを披露してくれました。 f:id:doi-t:20160422184615j:plain 7人目はグローバルビジネスインターンシップ中のナスタシアさん、出身のウクライナについて、歴史、食べ物、文化などたくさんの写真と共に紹介してくれました。 f:id:doi-t:20160422185502j:plain この日は、ヘンリーさんの8週間に渡るインターンシップの最終日だったので、MTS終了後に修了式を執り行いました。ちょうど桜のシーズンだったこともあって、インターンシップだけでなく一緒に花見をしたり、夜桜を見に行ったりと、がっつり日本を楽しんでいってくれたように思います。 f:id:doi-t:20160422191600j:plain 当日は弊社CTOが着物で台湾に出張中だったため、ビデオレターにてヘンリーさんへのメッセージを届けてくれました (ビデオのオチで会場の爆笑を掻っ攫っていきました)。 f:id:doi-t:20160422191412j:plain 終わった後は、いつも通りみんなで乾杯! f:id:doi-t:20160422193339j:plain
Comments on: Query for records that have certain numbers in them http://itknowledgeexchange.techtarget.com/itanswers/query-for-records-that-have-certain-numbers-in-them/ Tue, 21 May 2013 23:11:32 +0000 hourly 1 By: tlsanders1 http://itknowledgeexchange.techtarget.com/itanswers/query-for-records-that-have-certain-numbers-in-them/#comment-104479 tlsanders1 Mon, 05 Mar 2012 16:54:07 +0000 #comment-104479 This is not real elegant, but I think it does what you asked for. In a query, add the table and each of the four fields. Add a new column to the query with an immediate IF such as “=IIF(field1=94,1,0)”. That column will now have a 1 if field 1 matches your criteria or a 0 if not. Make three more columns in the query for the other three criteria. Now add a column that totals those four, “=expr1+expr2+expr3+expr4″ This column now lists for each record, how many of the criteria are matched. I couldn’t get that column to filter or sort, so I created a separate query that used the first query for data, and I could set in the criteria line of expr5, “>1″ and I could sort it. So, that query lists the records from the original data that meet 2 or more of the criteria and sorts the records that meet 4 criteria, 3 criteria, etc. ]]>
Seismic, acoustic, and thermal network monitors the 2003 eruption of Stromboli Volcano Authors Abstract The date 28 December 2002, heralded the onset of a 7-month-long effusive eruption at Stromboli volcano in Italy. The onset was accompanied on 30 December by a large landslide (Figure 1). This landslide produced a tsunami that damaged the villages on Stromboli and affected coastal zones around the southern Tyrrhenian Sea [Pino et al., 2004]. Following the landslide, the eruption was mostly characterized by effusive activity with lava flows extending from vents between 500 and 650 m above sea level. Simultaneously, Stromboli's typical explosive activity died out, with no explosions from the summit craters during the initial months of the eruption. However, a major explosive event on 5 April 2003 caused considerable alarm. Ancillary
Mathematica Stack Exchange is a question and answer site for users of Mathematica. Join them; it only takes a minute: Sign up Here's how it works: 1. Anybody can ask a question 2. Anybody can answer 3. The best answers are voted up and rise to the top I often find myself trying to plot multiple PDFs for my courses. I find the default tools available to me are lacking and/or cumbersome. After readings some suggestions here, I have come up with the following code to plot 3 instances of the Binomial Distribution. I'm hoping this will prove useful to others (perhaps even myself). I'm also wondering if folks can improve on this. n = 12; plist = {1/6, 1/3, 2/3}; colorList = {Magenta, Blue, Green}; Plot[Evaluate[ Map[PDF[BinomialDistribution[n, #], Floor[k]] &, plist]], {k, -0.001, n + 0.001}, Exclusions -> None, PlotStyle -> Map[{Thick, #} &, colorList], PlotLegends -> plist, Frame -> {True, True, False, False}, FrameTicks -> {Table[i, {i, 0 , n, 2}], Automatic}, FrameLabel -> {"Successes k", "Probability"}] Here's the output plot of multiple histograms share|improve this question 2   For example, can you comment on what you don't like about your solution? – bobthechemist Jan 20 '14 at 19:53 1   In my opinion there is a problem with this plot, in that the steps occur at integer values on the k axis. e.g. the value of the magenta curve at k=1 is both 0.12 and 0.27. Unless you know the code that was used to create the plot, there is no way to tell which is the correct value. – Simon Woods Jan 20 '14 at 20:12      Seen DiscretePlot ? – Sjoerd C. de Vries Jan 20 '14 at 21:54      @SjoerdC.deVries I tried using DiscretePlot, but I couldn't figure out an elegant way to get the lines the way I wanted instead of simple markers as is the default. – mikemtnbikes Jan 20 '14 at 22:09      I agree with @SimonWoods that the location of the bin boundaries are ambiguous. It seems like this could be solved by replacing "k" in "Floor[k]" with "Floor[k+1/2]" and changing the lower bound of the range of k from "-0.001" to "-0.5001" – mikemtnbikes Jan 20 '14 at 22:13 Here's my quick and dirty take on it using DiscretePlot. (As also suggested by Sjoerd in the comments above.) Playing around with ExtentSize and ExtentMarkers can give you a variety of choices for how the lines are displayed. I'm not sure what constitutes "better" from your perspective, but the following code generates something similar to your solution: DiscretePlot[ {PDF[BinomialDistribution[12, 1/6], x], PDF[BinomialDistribution[12, 1/3], x], PDF[BinomialDistribution[12, 2/3], x]}, {x, 0, 12}, ExtentSize -> Right, (* Lines extend to the right *) ExtentMarkers -> {Point, Null}, (* Markers to resolve the ambiguity *) Frame -> True, PlotRange -> {{-0.25, 13.25}, {-0.01, 0.32}}, (* Set "handraulically", could be automated *) BaseStyle -> {FontSize -> 12}, FrameLabel -> {Style["Number of successes (k)", 16], Style["Probability", 16]}, PlotStyle -> Directive[AbsoluteThickness[2], AbsolutePointSize[6]], ImageSize -> 625 ] The plot, in all its "glory": enter image description here Note that I have not included a legend for the plot as you have. In my production work (final figures for journal articles or internal tech reports), I tend to do plot legends or other labelling either via Epilog and direct graphics commands, or by post-editing in Adobe Illustrator, depending on the complexity of the desired annotations/markup. Not necessarily the most optimal workflow, but it gives me the greatest fine-grained control over the output. share|improve this answer Your Answer   discard By posting your answer, you agree to the privacy policy and terms of service. Not the answer you're looking for? Browse other questions tagged or ask your own question.
What is the difference between Physical Therapy and Physiotherapy? What is the difference between Physical Therapy and Physiotherapy? There are several significant differences between the two professions.   Firstly, physiotherapy and physical therapy have been organised within Ireland as discrete professions for over two decades. Physiotherapy is a four-year, Level 8 university degree course designed for school leavers, whereas physical therapy is a three-year Level 7-degree course from […]
12 февраля 2019 React vs Angular: how a library can compete with a framework JavaScriptAngularReactJS Google and Facebook are the digital behemoths who always compete. Their solutions for developers Angular and React seem rivals too. Indeema helps compare both. The article was originally posted here At the beginning of its development, SPA web platforms lacked a flexible but simple system for creating the projects that could amend and, in some cases, replace both mobile and desktop apps. At that time, a user whose problem was quite simple had to find an application capable of solving the problem. In the course of time, the technologies kept moving forward making web services gain popularity since the latter had no need to be installed. What was needed is just to visit a website for accessing one or another service. Previously, such tasks could be solved through websites written in either ActionScript or Java. However, those systems required to install either Flash or Java being at the same time far from the speed expected by the users. At that point in time, JavaScript evolved quite sufficiently to leave behind its rivals due to a high speed, development simplicity, and continuous support of the browsers’ developers. The era of JavaScript started engendering such definition as SPA (Single Page Application) which provided a new approach to the development of web platforms. Unlike its forerunner MPA (Multi-Page Application), SPA allowed a web service to work much faster as well as to provide it with a more sophisticated functionality capable of changing dynamically in accordance with users’ needs. The biggest drawback was in pure JavaScript which could not provide a fast development when even a primitive SPA web service required a lot of time to be created. That’s why Google decided to support the approach with a framework that could help various companies develop complicated web services without spending too much time for it. AngularJS was the first stage in SPA development allowing to create complicated SPA web platforms. In addition, it provided developing hybrid mobile applications along with desktop programs as well. After AngularJS appeared, some other companies decided to participate in the development of SPA web systems too. On the other hand, Facebook has found out its own approach to the development of web platforms. React was among the first libraries capable of competing with such strong rivals as AngularJS. Nevertheless, both systems are unique to differ significantly in addressing similar challenges. In contrast to AngularJS which is represented as just an SPA framework, React is able to work with both MPA and SPA. Angular is a JavaScript framework created on the basis of TypeScript. Google is the Company which keeps developing and supporting the framework. At the very beginning, the version Angular 1 which was also known as AngularJS appeared. The first version was using pure JavaScript being a trial approach to the development of more powerful functionality. Angular 2 or ng2+ following AngularJS was critically improved. The most significant update of Angular implied a transition to a new TypeScript platform. Since then, the framework started working much faster than the first version did. Besides, the entry barrier became much lower. Such functions as Interfaces, Classes, and strong typing appeared in Angular. One of the crucial features is angular/cli which facilitates the project development. It provides an ability to create a project along with modules, services, and components. Also, the feature allows deploying the project providing its subsequent debugging through the embedded e2e tests. By the way, a release Angular 6 is already available. This is an updated bug-fixed version of Angular 2 having many new capabilities. At present, Angular is applied to Google, Wix, weather.com, healthcare.gov, Forbes. As of writing this article, the latest release of Angular 6 is the fastest framework providing development of SPA web platforms. The syntax of TypeScript representing various capabilities for the development is closest to JavaScript. The available updates are the following: • static typing • decorators • interfaces • namespaces React is a JavaScript library developed by Facebook which keeps supporting it along with launching new releases. The approach of React implies using components that can be displayed on the same page without being SPA, nevertheless. Facebook is more proactive in using React in its own projects than Google is with Angular. The main difference with Angular implies using JSX and Virtual DOM. The basic capability of JSC provides creation of rendered components by putting HTML-like code in JS files. As a result, React renders the code to display finally a dynamic HTML which can be changed depending on the situation. React is used in Airbnb, Uber, Netflix, Twitter, Pinterest, Reddit, Udemy, Wix, Paypal, Imgur, Feedly, Stripe, Tumblr, Walmart. The peculiarity of React lies in using JavaScript which is sufficient for starting development. The dynamic typing in JavaScript does not allow to figure out whether a correct type of data is delivered to a component. Such a verification falls on the shoulders of a developer who has to trace the situation of such a kind in a code. The main advantage of React is using the latest version of JavaScript which allows a developer to learn nothing but React. Core development In order to look into the reasons for the popularity of both Angular and React, the detailed statistics is worth considering. The team page of Angular contains 36 developers while React has no team page at all. The popular web resource GitHub dedicated to open source projects represents 40 490 ranking stars along with 1 714 contributors for Angular. In its turn, React has 110 961 stars and 1 200 contributors respectively. The chart below represents the stats for the ranking stars belonging to both Angular and React. As we can see, React has much more stars than Angular, and the gap is growing continuously. Another stats is provided by the package manager npm which offers the number of downloads for both Angular and React. Again we see how actively React outperforms Angular also in downloads. And the last chart we’d like you to check is Google Trends detecting popularity on the basis of the number of requests available in the Google search system. The situation is a little bit different here. At first, Angular was more popular in search, but later the trend has reversed. According to the latest data, React is at the top of searches now while Angular is following closely nevertheless. We may not ignore a popular resource StackOverflow which conducted a survey on who prefers what with regard to Angular and React. AngularJS (the Angular 2 version was beyond the survey, unfortunately) gained 52% of votes while React reached 67%. In response to the question about the lack of interest to further development, the framework by Google gained 48% of votes while its competitor reached only 33%. The important question about an intent to use the framework again later represented React with 92% of votes while Angular reached only 65%. Basing on the aforementioned data we can come to a conclusion that React is more popular among developers than Angular. In any case both React and Angular together are occupying 100% of popularity on the market that implies their leadership for a long time. TypeScript vs ES6 & JSX In order to examine two different systems in the most objective manner, we need to check their main differences first. This time, we will consider only “out-of-the-box” versions. However, everyone can couple JSX with Angular as well as TypeScript with React. Why TypeScript? TypeScript is a special enhancement of JavaScript developed by Microsoft. It allows working with static typing along with reliable tools. The developers who work with JavaScript can avoid numerous bugs thanks to the solution. TypeScript informs about the errors before the file is saved allowing, therefore, to write code many times faster. Such a practice enables developers to focus on the actually important issues. Besides, another important capability of TypeScript provides establishing a development team. Usually, 1-2 persons are involved in development with JavaScript while its basic functionality limits a team to 5 developers. A lot still remains unfulfilled while the rest does not work correctly. Optimization in JavaScript depends on the developers who has to decide whether to optimize something or not on their own. React has done almost no improvements on the drawbacks which have been already settled with TypeScript. In fact, the developers belong to two opposing camps. Some believe that TypeScript is just the version of JavaScript which would appear from the very beginning. The others consider the dynamic typing as just the thing they need in JavaScript. It is hard to figure out which opinion should be the most appropriate. Many contemporary programming languages support both a dynamic typing and a static one. In such a situation, a lot depends on the personal preferences of every particular developer. Let’s check an exemplary case of how much better TypeScript behaves in comparison with JavaScript to grasp how well-considered TypeScript is in terms of development // Basic JavaScript function getPassword(clearTextPassword) { if (clearTextPassword) { return 'password'; } return '********'; } let password = getPassword('false'); // "password" It is clearly obvious that a developer made a bug since instead of string s/he delivered boolean. Therefore, a bug is created without being traced that can lead to an error which another developer could make since the error was not identified immediately. Here is how the same code is written in TypeScript: // Written with TypeScript function getPassword(clearTextPassword: boolean): string { if (clearTextPassword) { return 'password'; } return '********'; } let password = getPassword('false'); // throws: error TS2345: Argument of type '"false"' is not assignable to parameter of type 'boolean'. We determined the type of data expected for the arguments of a function along with what is to be returned. We immediately found an error in a code after compilation. That was one of the simple cases that reveal the quality of a project. Besides, it shows what a time-consuming search for errors takes place while TypeScript rejects them by banning the very compilation. React thinks otherwise Every React developer has an opportunity to work with a special HTML-like syntax JSX to render components. Unfortunately, both TypeScript in Angular and React cannot do without JSX. Since TypeScript is considered almost a separate programming language, it is necessary to take a TypeScript course before getting down to Angular. But the React developers just need to look through a brief JSX documentation to start coding. The only innovations added by the system of development of highly loaded SPA systems are mentioned above. In fact, React offers nothing but a feature of template rendering. Hence, a code written in React will hardly be better than a pure JavaScript code. Some developers believe that React could be able to either solve some problems of JavaScript or, at least, enhance its capabilities. Facebook and SPA development The developers of programming languages strive to separate View from code in order to facilitate sharing of a project. Facebook, on the other hand, believed that keeping everything together was a more proper approach to componential development. The React proponents have an ambivalent vision of such an approach. Some of them are trying to limit JSX to minimum. The other developers actively use JSX having no idea why to reject it. The syntax allows to develop and add components in a simple manner facing, nevertheless, some insignificant problems with both the HTML template development and further integration to React. A more or less correct solution in case of a React-based project comes to an immediate integration of a design into React components. In a similar case, Angular follows a more traditional approach when logic is separated from View. Once the Angular solution is based on Two-way data binding as well as on its own template engine, we can easily integrate an HTML template into View for Angular components. Even though the syntax of the Angular template engine has its own pros and cons, it does make integration dynamics into View in a simple manner. It allows adding Model for using such components in the other components that, therefore, lead to the creation of sophisticated SPA systems. Let’s take a look at a couple of examples with both Angular and React. The approach of Angular to components implies several files: component.ts import { Component, OnInit } from '@angular/core'; @Component({ selector: 'app-component', templateUrl: './component.html', styleUrls: ['./component.scss'] }) export class Component implements OnInit { this.component_title: String = “Hello world”; constructor() {} ngOnInit() {} } component.html <p> {{ component_title }} </p> In the given example a component displays “Hello world” in the midst of its View. It is simpler when working with React: one file is enough to create a new component. component.js import React from 'react'; export class Component extends React.Component { render() { const text = "Hello world!"; return ( <p> {text} </p> ); }; } Each system has a different approach to the creation of components having its own pros and cons. And each developer is to decide which approach is more relevant for the project development. What developers face at the very beginning Once React is the library which has no powerful out-of-the-box solutions, the developers have to find the modules they need on their own. On the other hand, the Angular developers face a set of solutions they cannot refuse from the very beginning. Every single one of the approaches does not imply the best solution. The React developers have to check the compatibility with the latest React version when many new libraries are to be involved. They have to do updates manually. Many libraries are created not by Facebook. That’s why the developers have to hope that the creators of their favorite library will update its compatibility with a new React version in time. The Angular developers have fewer concerns since the majority of tools are created by Google and, therefore, they are updated in parallel with a new version of Angular. Of course, the developers use the third-party libraries for one or another task, but the number of such libraries is significantly below the number React offers. Besides, fewer of them are important for a correct operation of a system. While a React developer receives just a system core configured for working with JSX out of the box, an Angular developer can find the following: • Angular CLI • E2E Tests • Forms • Modules for Animation, Localization etc. • TypeScript features • Angular Elements etc. A spectrum of the Angular tools is increasing continuously to support more and more solutions that allow reducing the need in the third-party libraries in the future to use Angular out of the box at full capacity. Size and performance Once Angular is a framework, its size is significantly bigger than the size of a lightweight React. In terms of size, Angular is inferior to its competitor. However, some extra megabytes can hardly play a crucial role in the contemporary world. What is really important for the developers are both the performance and speed providing a pleasant work with a system. The following is a benchmark comparison of both Angular and React. As the stats show, Angular works a little faster than React does. Angular 6 has a better performance than Angular 4 has, but even the previous version beats its competitor. Of course, the difference is not too huge, but Angular can provide a better performance when a sophisticated system is under development. After all, the developers should figure out which system is more relevant for their tasks on their own. Universal solutions and native ones Both universal and native solutions are actively implemented in various types of applications such as web, mobile and desktop. Both React and Angular offer supporting native solutions. Angular has NativeScript (under support of Telerik) for native solutions along with the Ionic framework for developing hybrid apps. React offers react-native-render for the development of cross-platform solutions as well as React Native for native apps. Both variants are in the equally active use having almost no difference for an average user in operation. The solutions allow reducing labor when a system having both web and native apps is created. The hybrid solutions can offer neither a high speed nor stability in operation, unfortunately. But for simple tasks they are sufficient. Learning process It’s quite explainable that mastering of Angular implies a more difficult learning process. The documentation is ample and difficult to learn that requires significantly more time for training. Besides, learning of TypeScript is to be added to the process that makes the developers doubt whether the Angular theory is worth their time. Even though Google is trying to simplify the learning process with both tutorials and articles about how to start, the load on the developers can hardly be reduced. React, by contrast, allows starting working at once requiring the knowledge of JavaScript as the only condition. Both systems offer their specific approaches to the development. One way or another, but the developers have to decide what is more important for them. It is necessary to realize that both Angular and React imply different methods the developers have to follow when they choose one or another system to work. Conclusion Both Angular and React are great systems for executing various tasks in the web project development. Angular is better suited to the developers who would like to have everything necessary out of the box thinking about neither manual updates nor third-party libraries. React, in its turn, allows configuring a project in a more flexible manner according to its objectives. Both solutions have their specific pros and cons. And understanding of them should be taken into consideration when a final decision on what to choose is to be made. The end users can hardly distinguish one approach from another if both ones are developed in a correct and high-quality manner. A developer who has a working experience with TypeScript will most probably choose Angular as a basic framework. The one who prefers to control a number of libraries inside a project will opt for React. No fully universal solution is available — the choice is up to you in accordance with the project objectives you chase. Original article — React vs Angular: how a library can compete with a framework Теги:angularjsangularreactreact.js Хабы: JavaScript Angular ReactJS +14 5,3k 5 Комментарии 2 Похожие публикации Fullstack-разработчик на JavaScript 27 ноября 202083 200 ₽SkillFactory Комплексное обучение JavaScript 14 декабря 202027 000 ₽Loftschool React.js Developer 23 декабря 202060 000 ₽OTUS JavaScript Developer. Professional 24 декабря 202070 000 ₽OTUS ▇▅▄▅▅▄ ▇▄▅
Can I Take Diflucan While On Period Brands in thailand does interact with boric acid elevated tsh and synthroid dose can I take diflucan while on period often take. Candida die off symptoms is 300mg of for thrush diflucan increased urination for three days where can you get. In second trimester pregnancy candida glabrata treatment diflucan purple tongue how quickly does work for men strength yeast infection. What if doesnt work for oral thrush soon will work fluconazole off label can cause bleeding tablet in pregnant women is safe. Anche per luomo 150 mg once a week for 6 months diflucan 150 mg tabletas can you take probiotics while taking how much of 150 mg. Took yeast infection worse dosage for a 60lb dog thuoc fluconazole 200mg can I take diflucan while on period kidney. How long is ran in iv dosage breast yeast infection the best viagra in pakistan dose breast thrush for valley fever in dogs. Do cause gastritis time to initiation of diflucan drops 150 and pregnancy on men. Yeast infection how long does it take toxicology of tablet 120 mg fluconazole 150 and pregnancy and cocp how fast can tabs work. Yeast infection no insurance can I take after using monistat fluconazole side effects for men can you buy over the counter in france sciroppo 50 mg. 200mgcandidose boots diflucan powder can I take diflucan while on period dosage oral candidiasis. Pharmac online price is fluconazole safe for early pregnancy at 6 weeks contraindications to what is and how much does it cost. Dose for yeast infections can I take 300 mg of for yeast infection what stds do amoxicillin treat how long before start working ringworm how to administer mouth. Las 150mg impetigo taking fluconazole 150 mg every 72 hours tacrolimus alternative medicine yeast. Mol wt and hep c fluconazole and missed period dosage for in penile yeast infection how is prescribed. Herbal alternatives to can you take every month does diflucan treat candida albicans can I take diflucan while on period nystatin and. 400 mg tinea versicolor indications for use wikipedia org wiki fluconazole duo ingredients can you drink if you take. Is the beat for ringworm can make my period late fluconazole dosage for yeast infection male how long half life stays in system diarrhea. Belgium symptoms worse after do doxycycline hyclate 100 mg clear yeast and uti more discharge prophylaxis cryptococcal meningitis. 10 mg guna can you drink alcahol with fluconazole 150g capsules dosage thrush breastfeeding for fungal sinusitis. Label hvordan virker dosage of diflucan 150 mg can I take diflucan while on period how long does stay in my body. Tablets ip fluka 150 taking 2 am luat diflucan dosage sinus infection 150 mg e candida. Cipro sciroppo posologia order online diflucan kstabilan best time to take. Perdite di sangue dose for breast thrush candidiasis and fluconazole ringworm dosage 2 pill 150 mg. Yeast die off symptoms u mezczyzn does cialis powder work 2 comprimidos effetti collaterali del. 150 mg otc 5 day how soon after one dose of diflucan can I take second can I take diflucan while on period can u drink wine while taking. Clotrimazole can I cut 200 mg in half can u die from taking a diflucan pill well tolerated dose of 150 can u smoke cannabis while taking. Does contain gluten and venlafaxine diflucan bebe one how does it work single dose for ringworm. Fungal endophthalmitis buy no prescription fast deliver diflucan from india is this med safe how long does pill take to work on ringworm 150mg tablet to treat intestinal candida. How long does a last on the shelf how long does it take for to work for thrush diflucan i.v. brochure side effects on men long term. When okay to drink after long term side effects viagra subistute can I take diflucan while on period how long does one dose take to work. Candida resistant tablets name for tinea versicolor in india is fluconazole the same as diflucan mylan and candida sjs. Does treat candida in sinuses posaconazole vs fluconazole oral boots and marijuana somministrazione candida. Trying to conceive tinea versicolor dosage fluconazole portfarma how long does it take for usp to work how many. Mercury drug price tired can I take fluconazole with trimethoprim active ingredients 150 senza prescrizione. For dog same as humans what is a pill where to find diflucan fluconazole in abuja can I take diflucan while on period drug interactions of. Prescribed while pregnant warfarin interactions can I take with acidophilus how long to wait to take second 150mg dose. fluconazole 150 mg tablet cure candida what is fluconazole medicine diflucan and tetracycline fluconazole capsule 150 mg dosage for tinea versicolor diflucan dosage for skin infection diflucan 2ww can i take fluconazole while pregnant diflucan chez lhomme diflucan vs cream will side effect of fluconazole 150 mg go away turmeric fluconazole diflucan cistitis fluconazole online no prescription long does take fluconazole work is it ok to take diflucan while nursing fluconazole liver enzymes can diflucan be used for uti diflucan for jock itch thrush treated with iv diflucan what is in diflucan that makes it work so quickly para que es fluconazole 150 mgtablet how long until diflucan is out of my system diflucan skin fungus s recepta li e canesten oral fluconazole capsule v uk cheap fluconazole tablet in india fluconazole study fluconazole 150mg ringworm rosuvastatin fluconazole diflucan 150 mg e pillola contraccettiva can diflucan cause odor fluconazole side effects in cats diflucan and niacin fluconazole dose candida oesophagitis how quickly does fluconazole 1.5 mg work fluconazole dosage male yeast infection 150mg diflucan favismo fluconazole for parrots fluconazole for yeast infection dosage fluconazole teva 150 pret fluconazole for men reviews azithromycin diflucan autism can you take benadryl with diflucan diflucan and nuvaring interaction diflucan 150 posologia fluconazole 150 mg for 6 week cure ringworm does diflucan cause constipation dark discharge after diflucan diflucan liquid side effects fluconazole resistant candida parapsilosis fluconazole and die off symptoms
changelog 155 KB Newer Older 1 tails (1.3~rc1) unstable; urgency=medium 2 3 4 5 6 7 * Major new features - Install the electrum bitcoin client from wheezy-backports, and add a persistence preset for the Live user's bitcoin wallet. If electrum is started without the persistence preset enabled, a warning is hown. (Closes: #6739) 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 * Hardening - Sandbox the Tor Browser using AppArmor. From now on it can only access the "~/Tor Browser" (default) and "~/Persistent/Tor Browser" directories; the latter is only created if the persistence preset is enabled. Both have bookmarks added in GTK's file chooser, and GNOME's Places menu. (Closes: #5525) - Install a custom-built Tor package with Seccomp enabled but enable it when no pluggable transport is used. (Closes: #8174) * Bugfixes - Have tor_bootstrap_progress echo 0 if no matching log line is found. (Closes: #8257) - Always pass arguments through wrappers (connect-socks, totem, wget, whois) with "$@". $* doesn't handle arguments with e.g. embedded spaces correctly. (Closes: #8603, #8830) * Minor improvements - Install obfs4proxy instead of obfsproxy, which adds support for the obfs4 pluggable transport to Tor. (Closes: #7980) - Install GnuPG v2 and associated tools from wheezy-backports, primarily for its improved support for OpenPGP smartcards. It lives side-by-side with GnuPG v1, which still is the default. (Closes: #6241) - Install ibus-unikey, a Vietnamese input method for IBus. (Closes: #7999) - Install torsocks (2.x) from wheezy-backports. (Closes: #8220) - Install keyringer from Debian Jessie. (Closes: #7752) - Install pulseaudio-utils. - Remove all traces of Polipo: we don't use it anymore. This closes #5379 and #6115 because: * Have APT directly use the Tor SOCKS proxy. (Closes: #8194) * Wrap wget with torsocks. (Closes: #6623) * Wrap Totem to torify it with torsocks. (Closes: #8219) * Torify Git with tsocks, instead of setting GIT_PROXY_COMMAND. (Closes: #8680) - Use torsocks for whois and Gobby, instead of torify. - Produce the Tails image in hybrid mode (again) so that the same image can be installed both on DVD *and* "hard disks" like USB storage and similar. (Closes: #8510) - Refactor the Unsafe and I2P browser code into a common shell library. A lot of duplicated code is now shared, and the code has been cleaned up and made more reliable. Several optimizations of memory usage and startup time were also implemented. (Closes: #7951) - Invert Exit and About in gpgApplet context menu. This is a short-term workaround for making it harder to exit the application by mistake (e.g. a double right-click). (Closes: #7450) - Implement new touchpad settings. This enables tap-to-click, 2-fingers scrolling, and disable while typing. We don't enable reverse scrolling nor horizontal scrolling. (Closes: #7779) - Include the mount(8) output and live-additional-software.conf in WhisperBack bug reports (Closes: #8719, #8491). - Reduce brightness and saturation of background color. (Closes: #7963) - Have ALSA output sound via PulseAudio by default. This gives us centralized sound volume controls, and... allows to easily, and automatically, test that audio output works from Tor Browser, thanks to the PulseAudio integration into the GNOME sound control center. - Import the new Tails signing key, which we will use for Tails 1.3.1, and have Tails Upgrader trust both it and the "old" (current) Tails signing key. (Closes: #8732) - tails-security-check: error out when passed an invalid CA file. Unfortunately, the underlying HTTPS stack we use here fails open in those case, so we have to check it ourselves. Currently, we check that the file exists, is readable, is a plain file and is not empty. Also support specifying the CA file via an environment variable. This will ease development and bug-fixing quite a bit. - Fix racy code in Tails Installer that sometimes made the automated test suite stall when for scenarios installing Tails to USB disks. (Closes: #6092) - Make it possible use Tails Upgrader to upgrade a Tails installation that has cruft files on the system partition. (Closes: #7678) * Build system - Install syslinux-utils from our builder-wheezy APT repository in Vagrant. We need version 6.03~pre20 to make the Tails ISO image in hybrid mode - Update deb.tails.boum.org apt repo signing key. (Closes: #8747) - Revert "Workaround build failure in lb_source, after creating the ISO." This is not needed anymore given the move to the Tor SOCKS proxy. (Closes: #5307) - Remove the bootstrap stage usage option and disable all live-build caching in Vagrant. It introduces complexity and potential for strange build inconsistencies for a meager reduction in build time. (Closes: #8725) - Hardcode the mirrors used at build and boot time in auto/config. Our stuff will be more consistent, easier to reproduce, and our QA process will be more reliable if we all use the same mirrors at build time as the one we configure in the ISO. E.g. we won't have issues such as #8715 again. (Closes: #8726) - Don't attempt to retrieve source packages from local-packages so local packages can be installed via config/chroot_local-packages. (Closes: #8756) * Test suite - Use libguestfs instead of parted when creating partitions and filsystems, and to check that only the expected files persist. We also switch to qcow2 as the default disk image format everywhere to reduce disk usage, enable us to use snapshots that includes the disks (in the future), and to use the same steps for creating disks in all tests. (Closes: #8673) - Automatically test that Tails ignores persistence volumes stored on non-removable media, and doesn't enable swaps. (Closes: #7822) - Actually make sure that Tails can boot from live systems stored on a hard drive. Running the 'I start Tails from DVD ...' step will override the earlier 'the computer is set to boot from ide drive "live_hd"' step, so let's make the "from DVD" part optional; it will be the default any way. - Make it possible to use an old iso with different persistence presets. (Closes: #8091) - Hide the cursor between steps when navigating the GNOME applications menu. This makes it a bit more robust, again: sometimes the cursor is partially hiding the menu entry we're looking for, hence preventing Sikuli from finding it (in particular when it's "Accessories", since we've just clicked on "Applications" which is nearby). (Closes: #8875) - Ensure that the test will fail if "apt-get X" commands fail. - Test 'Tor is ready' notification in a separate scenario. (Closes: #8714) - Add automated tests for torified wget and whois. This should help us identify future regressions such as #8603 in their torifying wrappers. - Add automated test for opening an URL from Pidgin. - And add automated tests for the Tor Browser's AppArmor sandboxing. - Test that "Report an Error Launcher" opens the support documentation. - Test that the Unsafe Browser: * starts in various locales. * complains when DNS isn't configured. * tear down its chroot on shutdown. * runs as the correct user. * has no plugins or add-ons installed. * has no unexpected bookmarks. * has no proxy configured. - Bump the "I2P router console is ready" timeout in its test to deal with slow Internet connections. -- Tails developers <tails@boum.org> Wed, 11 Feb 2015 22:41:08 +0100 154 Tails developers's avatar Tails developers committed 155 tails (1.2.3) unstable; urgency=medium 156 Tails developers's avatar Tails developers committed 157 * Security fixes 158 159 160 - Upgrade Linux to 3.16.7-ckt2-1. - Upgrade Tor Browser to 4.0.3 (based on Firefox 31.4.0esr) (Closes: #8700). Tails developers's avatar Tails developers committed 161 162 163 164 165 166 167 168 169 170 - Fail safe by entering panic mode if macchanger exits with an error, since in this situation we have to treat the driver/device state as undefined. Also, we previously just exited the script in this case, not triggering the panic mode and potentially leaking the real MAC address (Closes: #8571). - Disable upgrade checking in the Unsafe Browser. Until now the Unsafe Browser has checked for upgrades of the Tor Browser in the clear (Closes: #8694). * Bugfixes 171 - Fix startup of the Unsafe Browser in some locales (Closes: #8693). Tails developers's avatar Tails developers committed 172 173 174 175 176 177 178 179 180 - Wait for notification-daemon to run before showing the MAC spoofing panic mode notifications. Without this, the "Network card disabled" notification is sometimes lost when MAC spoofing fails. Unfortunately this only improves the situation, but doesn't fix it completely (see #8685). - Log that we're going to stop NetworkManager before trying to do it in the MAC spoofing scripts. Without this we wouldn't get the log message in case stopping NetworkManager fails (thanks to `set -e`). 181 - Set GNOME Screenshot preferences to save the screenshots in Tails developers's avatar Tails developers committed 182 /home/amnesia (Closes: #8087). 183 184 - Do not suspend to RAM when closing the lid on battery power (Closes: #8071). Tails developers's avatar Tails developers committed 185 186 187 188 189 - Properly update the Tails Installer's status when plugging in a USB drive after it has started (Closes: #8353). - Make rsync compare file contents by using --checksum for more reliable generation of the squashfs filesystem in IUKs. Previously it used the default, which is checking 190 191 192 timestamps and file size, but that doesn't play well with the Tor browser files, that have a fixed mtime, which could result in updated files not ending up in the IUK. Tails developers's avatar Tails developers committed 193 194 * Minor improvements 195 196 - Finish migrating tails-security-check's and tails-iuk's pinning to our website's new X.509 certificate authority (Closes: #8404). Tails developers's avatar Tails developers committed 197 198 * Build system 199 - Update to Vagrant build box tails-builder-20141201. The only Tails developers's avatar Tails developers committed 200 201 202 203 change is the removal of a reference to an ISO image which doesn't exist (except on the system that generated the build box) which causes an error for some users (Closes: #7644). - Generate the list of packages used during build, after building 204 205 206 with Jenkins (Closes: #8518). This allows tracking their status on the Debian reproducible build front: https://reproducible.debian.net/index_pkg_sets.html#tails Tails developers's avatar Tails developers committed 207 208 * Automated test suite 209 - Check PO files with i18nspector (Closes: #8359). Tails developers's avatar Tails developers committed 210 211 212 213 214 215 216 217 218 219 - Fix the expected image of a check.tp.o failure. Previously we looked for the "Sorry. You are not using Tor." text, but it seems it recently changed enough for Sikuli to not find it. To prevent future errors of the same kind we'll look for the crossed-over onion icon instead (Closes: #8533). - Bump timeout when waiting for Tor to re-bootstrap. We have a dreaded issue with timeouts that are multiple of 2 minutes, and then Tor succeeds soon after, so in order to allow for this timeout to be reached twice, and then possibly succeed, let's use N*2 minutes + 30 seconds, with N=2. 220 Tails developers's avatar Tails developers committed 221 -- Tails developers <tails@boum.org> Wed, 14 Jan 2015 16:12:26 +0100 222 Tails developers's avatar Tails developers committed 223 tails (1.2.2) unstable; urgency=medium 224 Tails developers's avatar Tails developers committed 225 226 * Bugfixes - Create a CA bundle for Tails Upgrader at ISO build time, and 227 patch Tails Upgrader to use it. Specifically this will make it Tails developers's avatar Tails developers committed 228 229 230 possible to check for Tails upgrades after our website changes certificate around the 2014 to 2015 transition (Partially fixes #8404). 231 Tails developers's avatar Tails developers committed 232 -- Tails developers <tails@boum.org> Mon, 15 Dec 2014 10:05:17 +0100 233 Tails developers's avatar Tails developers committed 234 tails (1.2.1) unstable; urgency=low 235 Tails developers's avatar Tails developers committed 236 237 238 * Security fixes - Upgrade Linux to 3.16.0-4, i.e. 3.16.7-1. - Install Tor Browser 4.0.2 (based on Firefox 31.3.0esr). 239 Tails developers's avatar Tails developers committed 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 * Bugfixes - Install syslinux-utils, to get isohybrid back (Closes: #8155). - Update xserver-xorg-input-evdev to 1:2.7.0-1+tails1 which includes a patch that restores mouse scrolling in KVM/Spice (Closes: 7426). - Set Torbutton logging preferences to the defaults (Closes: #8160). With the default settings, no site-specific information is logged. - Use the correct stack of rootfs:s for the chroot browsers (Closes: #8152, #8158). After installing incremental upgrades Tails' root filesystem consists of a stack squashfs:s, not only filesystem.squashfs. When not stacking them correct we may end up using the Tor Browser (Firefox) from an older version of Tails, or with no Tor Browser at all, as in the upgrade from Tails 1.1.2 to 1.2, when we migrated from Iceweasel to the Tor Browser. Based on a patch contributed by sanic. - Use the Tor Browser for MIME type that GNOME associates with Iceweasel (Closes: #8153). Open URLs from Claws Mail, KeePassX etc. should be possible again. - Update patch to include all Intel CPU microcodes (Closes: #8189). - AppArmor: allow Pidgin to run Tor Browser unconfined, with scrubbed environment (Closes: #8186). Links opened in Pidgin are now handled by the Tor Browser. - Install all localized Iceweasel search plugins (Closes: #8139). - When generating the boot profile, ignore directories in process_IN_ACCESS as well (Closes: #7925). This allows ut to update the squashfs-ordering again in Tails 1.2.1. - gpgApplet: Don't pass already encoded data to GTK2 (Closes: #7968). It's now possible to clearsign text including non-ASCII characters. - Do not run the PulseAudio initscript, neither at startup nor shutdown (Closes: #8082). * Minor improvements - Upgrade I2P to 0.9.17-1~deb7u+1. - Make GnuPG configuration closer to the best practices one (Closes: #7512). - Have GnuPG directly use the Tor SOCKS port (Closes: #7416). - Remove TrueCrypt support and documentat how to open TrueCrypt volumes using cryptsetup (Closes: #5373). - Install hopenpgp-tools from Debian Jessie. * Build system - Add gettext >= 0.18.3 as a Tails build dependency. We need it for xgettext JavaScript support in feature/jessie. * Automated test suite - Don't click to open a sub-menu in the GNOME applications menu (Closes: #8140). - When testing the Windows camouflage, look for individual systray applets, to avoid relying on their ordering (Closes: #8059). - Focus the Pidgin Buddy List before looking for something happening in it (Closes: #8161). - Remove workaround for showing the TBB's menu bar (Closes #8028). -- Tails developers <tails@boum.org> Tue, 02 Dec 2014 11:34:03 +0100 296 Tails developers's avatar Tails developers committed 297 tails (1.2) unstable; urgency=medium Tails developers's avatar Tails developers committed 298 299 300 * Major new features - Migrate from Iceweasel to the Tor Browser from the Tor Browser 301 302 Bundle 4.0 (based on Firefox 31.2.0esr). This fixes the POODLE vulnerability. 303 304 305 306 307 The installation in Tails is made global (multi-profile), uses the system-wide Tor instance, disables the Tor Browser updater, and keeps the desired deviations previously present in Iceweasel, e.g. we install the AdBlock Plus add-on, but not Tor Launcher (since we run it as a standalone XUL application), among other things. 308 - Install AppArmor's userspace tools and apparmor-profiles-extra 309 310 311 312 from Wheezy Backports, and enable the AppArmor Linux Security Module. This adds Mandatory Access Control for several critical applications in Tails, including Tor, Vidalia, Pidgin, Evince and Totem. 313 - Isolate I2P traffic from the Tor Browser by adding a dedicated 314 I2P Browser. It is set up similarly to the Unsafe Browser, 315 but further disables features that are irrelevant for I2P, like 316 search plugins and the AdBlock Plus addon, while keeping Tor Browser 317 security features like the NoScript and Torbutton addons. 318 - Upgrade Tor to 0.2.5.8-rc-1~d70.wheezy+1. Tails developers's avatar Tails developers committed 319 320 321 322 323 324 325 326 327 328 * Security fixes - Disable TCP timestamps (Closes: #6579). * Bugfixes - Remove expired Pidgin certificates (Closes: #7730). - Use sudo instead of gksudo for running tails-upgrade-frontend to make stderr more easily accessible (Closes: #7431). - Run tails-persistence-setup with sudo instead of gksudo to make stderr more easily accessible, and allow the desktop user to 329 330 pass the --verbose parameter (Closes: #7623). - Disable CUPS in the Unsafe Browser. This will prevent the 331 browser from hanging for several minutes when accidentally 332 pressing CTRL+P or trying to go to File -> Print (Closes: #7771). 333 334 * Minor improvements 335 336 337 338 339 - Install Linux 3.16-3 (version 3.16.5-1) from Debian unstable (Closes: #7886, #8100). - Transition away from TrueCrypt: install cryptsetup and friends from wheezy-backports (Closes: #5932), and make it clear that TrueCrypt will be removed in Tails 1.2.1 (Closes: #7739). 340 341 342 343 344 345 346 347 348 - Install Monkeysign dependencies for qrcodes scanning. - Upgrade syslinux to 3:6.03~pre20+dfsg-2~bpo70+1, and install the new syslinux-efi package. - Upgrade I2P to 0.9.15-1~deb7u+1 - Enable Wheezy proposed-updates APT repository and setup APT pinnings to install packages from it. - Enable Tor's syscall sandbox. This feature (new in 0.2.5.x) should make Tor a bit harder to exploit. It is only be enabled when when no special Tor configuration is requested in Tails 349 Greeter due to incompatibility with pluggable transports. 350 351 352 - Start I2P automatically when the network connects via a NetworkManager hook, and "i2p" is present on the kernel command line. The router console is no longer opened automatically, but 353 354 can be accessed through the I2P Browser (Closes: #7732). - Simplify the IPv6 ferm rules (Closes: #7668). 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 - Include persistence.conf in WhisperBack reports (Closes: #7461) - Pin packages from testing to 500, so that they can be upgraded. - Don't set Torbutton environment vars globally (Closes: #5648). - Enable VirtualBox guest additions by default (Closes: #5730). In particular this enables VirtualBox's display management service. - In the Unsafe Browser, hide option for "Tor Browser Health report", and the "Get Addons" section in the Addon manager (Closes: #7952). - Show Pidgin's formatting toolbar (Closes: #7356). Having the formatting toolbar displayed in Pidgin makes the OTR status more explicit by displaying it with words. * Automated test suite - Add --pause-on-fail to ease VM state debugging when tests misbehave. - Add execute_successfully() and assert_vmcommand_success() for added robustness when executing some command in the testing VM. - Use Test::Unit::Assertions instead of our home-made assert(). - Add test for persistent browser bookmarks. - Add basic tests for Pidgin, Totem and Evince, including their AppArmor enforcement. - Factorize some common step pattern into single steps. - Factorize running a command in GNOME Terminal. - Add common steps to copy a file and test for its existence. - Add a wait_and_double_click Sikuli helper method. - Add a VM.file_content method, to avoid repeating ourselves, and use it whenever easily doable. - Drop test that diffs syslinux' exithelp.cfg: we don't ship this file anymore. - In the Unsafe Browser tests, rely on subtle timing less (Closes: #8009). - Use the same logic to determine when Tor is working in the test suite as in Tails itself. The idea is to avoid spamming the Tor control port during bootstrap, since we've seen problems with that already. Tails developers's avatar Tails developers committed 391 -- Tails developers <tails@boum.org> Wed, 15 Oct 2014 18:34:50 +0200 Tails developers's avatar Tails developers committed 392 Tails developers's avatar Tails developers committed 393 tails (1.1.2) unstable; urgency=medium 394 Tails developers's avatar Tails developers committed 395 396 397 398 * Security fixes - Upgrade the web browser to 24.8.0esr-0+tails3~bpo70+1 (fixes Mozilla#1064636). - Install Linux 3.16-1 from sid (Closes: #7886). 399 400 401 402 403 - Upgrade file to 5.11-2+deb7u5 (fixes CVE-2014-0207, CVE-2014-0237, CVE-2014-0238, CVE-2014-3478, CVE-2014-3479, CVE-2014-3480, CVE-2014-3487, CVE-2014-3538 and CVE-2014-3587). - Upgrade curl to 7.26.0-1+wheezy10 (fixes CVE-2014-3613 and CVE-2014-3620). 404 405 - Upgrade bind9-based packages to 1:9.8.4.dfsg.P1-6+nmu2+deb7u2 (fixes CVE-2014-0591). 406 407 - Upgrade gnupg to 1.4.12-7+deb7u6 (fixes CVE-2014-5270). - Upgrade apt to 0.9.7.9+deb7u5 (fixes CVE-2014-0487, 408 409 CVE-2014-0488, CVE-2014-0489, CVE-2014-0490, and CVE-2014-6273.). 410 411 412 413 - Upgrade dbus to 1.6.8-1+deb7u4 (fixes CVE-2014-3635, CVE-2014-3636, CVE-2014-3637, CVE-2014-3638 and CVE-2014-3639). - Upgrade libav-based pacakges to 6:0.8.16-1 (fixes CVE-2013-7020). 414 - Upgrade bash to 4.2+dfsg-0.1+deb7u1 (fixes CVE-2014-6271). 415 Tails developers's avatar Tails developers committed 416 -- Tails developers <tails@boum.org> Tue, 23 Sep 2014 23:01:40 -0700 417 Tails developers's avatar Tails developers committed 418 tails (1.1.1) unstable; urgency=medium 419 Tails developers's avatar Tails developers committed 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 * Security fixes - Upgrade the web browser to 24.8.0esr-0+tails1~bpo70+1 (Firefox 24.8.0esr + Iceweasel patches + Torbrowser patches). Also import the Tor Browser profile at commit 271b64b889e5c549196c3ee91c888de88148560f from ttp/tor-browser-24.8.0esr-3.x-1. - Upgrade Tor to 0.2.4.23-2~d70.wheezy+1 (fixes CVE-2014-5117). - Upgrade I2P to 0.9.14.1-1~deb7u+1. - Upgrade Linux to 3.14.15-2 (fixes CVE-2014-3534, CVE-2014-4667 and CVE-2014-4943). - Upgrade CUPS-based packages to 1.5.3-5+deb7u4 (fixes CVE-2014-3537, CVE-2014-5029, CVE-2014-5030 and CVE-2014-5031). - Upgrade libnss3 to 2:3.14.5-1+deb7u1 (fixes CVE-2013-1741, CVE-2013-5606, CVE-2014-1491 and CVE-2014-1492). - Upgrade openssl to 1.0.1e-2+deb7u12 (fixes CVE-2014-3505, CVE-2014-3506, CVE-2014-3507, CVE-2014-3508, CVE-2014-3509, CVE-2014-3510, CVE-2014-3511, CVE-2014-3512 and CVE-2014-5139). - Upgrade krb5-based packages to 1.10.1+dfsg-5+deb7u2 (fixes CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344 and CVE-2014-4345). - Upgrade libav-based packages to 6:0.8.15-1 (fixes CVE-2011-3934, CVE-2011-3935, CVE-2011-3946, CVE-2013-0848, CVE-2013-0851, CVE-2013-0852, CVE-2013-0860, CVE-2013-0868, CVE-2013-3672, CVE-2013-3674 and CVE-2014-2263. - Upgrade libgpgme11 to 1.2.0-1.4+deb7u1 (fixes CVE-2014-5117). - Upgrade python-imaging to 1.1.7-4+deb7u1 (fixes CVE-2014-3589). - Prevent dhclient from sending the hostname over the network (Closes: #7688). - Override the hostname provided by the DHCP server (Closes: #7769). - Add an I2P boot parameter. Without adding "i2p" to the kernel command line, I2P will not be accessible for the Live user. - Stricter I2P firewall rules: * deny I2P from accessing the LAN * deny I2P from accessing the loopback device, except for select whitelisted services * allow I2P access to the Internet The ACCEPT rules will only be enabled when the string 'i2p' is passed at the boot prompt. The rules which DENY or REJECT access for the 'i2psvc' user will always be applied. - Disable I2P plugins, since it doesn't make much sense without persistence, and should eliminate some attack vectors. - Disable I2P's BOB port. No maintained I2P application uses it. 462 Tails developers's avatar Tails developers committed 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 * Bugfixes - Fix condition clause in tails-security-check (Closes: #7657). - Don't ship OpenJDK 6: I2P prefers v7, and we don't need both. - Prevent Tails Installer from updating the system partition properties on MBR partitions (Closes: #7716). * Minor improvements - Upgrade to Torbutton 1.6.12.1. - Install gnome-user-guide (Closes: #7618). - Install cups-pk-helper (Closes: #7636). - Update the SquashFS sort file. - Compress the SquashFS more aggressively (Closes: #7706). - I2P: Keep POP3 email on server. The default in the I2P webmail app was to keep mail on the server, but that setting was changed recently. This configuration setting (susimail.config) will only be copied over in I2P 0.9.14 and newer. - Add a Close button to the Tails Installer launcher window. * Build system - Migrate Vagrant basebox to Debian Wheezy (Closes #7133, #6736). - Consistently use the same Debian mirror. - Disable runtime APT proxy configuration when using APT in binary_local-hooks (Closes: #7691). * Automated test suite - Automatically test hostname leaks (Closes: #7712). - Move autotest live-config hook to be run last. This way we'll notice if some earlier live-config hook cancels all hooks by running the automated test suite since the remote shell won't be running in that case. - Test that the I2P boot parameter does what it's supposed to do (Closes: #7760). - Start applications by using the GNOME Applications menu instead of the GNOME Run Dialog (Closes: #5550, #7060). 497 Tails developers's avatar Tails developers committed 498 -- Tails developers <tails@boum.org> Sun, 31 Aug 2014 20:49:28 +0000 499 Tails developers's avatar Tails developers committed 500 tails (1.1) unstable; urgency=medium 501 502 503 504 505 506 507 * Rebase on Debian Wheezy - Upgrade literally thousands of packages. - Migrate to GNOME3 fallback mode. - Install LibreOffice instead of OpenOffice. - Remove custom LSB logging: Wheezy has fancy colored init logging. 508 509 * Major new features 510 - UEFI boot support. 511 512 - Replace the Windows XP camouflage with an experimental Windows 8 camouflage. 513 - Install Linux 3.14.12-1 from Debian unstable. 514 515 516 - Bring back VirtualBox guest modules, installed from Wheezy backports. Full functionality is only available when using the 32-bit kernel. 517 518 * Security fixes 519 - Fix write access to boot medium via udisks (#6172). 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 - Don't allow the desktop user to pass arguments to tails-upgrade-frontend (Closes: #7410). - Make persistent file permissions safer (Closes #7443): * Make the content of /etc/skel non-world-readable. Otherwise, such files may be copied to /home/amnesia, and in turn to the persistent volume, with unsafe permissions. That's no big deal in /home/amnesia (that is itself not world-readable), *but* the root of the persistent volume has to be world-readable. * Have activate_custom_mounts create new directories with safe permissions. * Set strict permissions on /home/amnesia (Closes: #7463). * Fix permissions on persistent directories that were created with unsafe permissions (Closes: #7458). * Fix files ownership while copying persistence (Closes: #7216). The previous instructions to copy the persistent data were creating personal files that belong to root. I don't think there is a way of preserving the original ownership using Nautilus (unless doing a "move" instead of a "copy" but that's not what we are trying to do here). - Disable FoxyProxy's proxy:// protocol handler (Closes: #7479). FoxyProxy adds the proxy:// protocol handler, which can be used to configure the proxy via an URI. A malicious web page can include (or a malicious exit node can inject) some JavaScript code to visit such an URI and disable or otherwise change Iceweasel's proxy settings. While using this to disable proxying will be dealt with safely by our firewall, this could be used to defeat stream isolation, although the user must be tricked into accepting the new proxy settings. 548 549 550 551 552 553 554 - Upgrade the web browser to 24.7.0esr-0+tails1~bpo70+1 (Firefox 24.7.0esr + Iceweasel patches + Torbrowser patches). - Upgrade to Linux 3.14.12-1 (fixes CVE-2014-4699). - Upgrade libav-based packages to 0.8.13-1 (fixes CVE-2014-4609). - Upgrade to libxml2 2.8.0+dfsg1-7+wheezy1 (fixes CVE-2014-0191). - Upgrade to dbus 1.6.8-1+deb7u3 (fixes CVE-2014-3477, CVE-2014-3532 and CVE-2014-3533). 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 * Bugfixes - Disable GNOME keyring's GnuPG functionality. (Closes: #7330) In feature/regular-gnupg-agent, we installed the regular GnuPG agent so that it is used instead of GNOME keyring's one. This is not enough on Wheezy, so let's disable the starting of the "gpg" component of GNOME keyring. - Make sure /etc/default/locale exists, with a sensible default value (Closes: #7333). Before Tails Greeter's PostLogin script are run, /etc/default/locale does not exist on Wheezy. Our tails-kexec initscript (and quite a few other scripts we run) depends on this file to exist. So, let's make sure it exists, with a sensible default value. - Create the tails-persistence-setup user with the same UID/GID it had on Tails/Squeeze. (Closes: #7343) Else, our various checks for safe access rights on persistence.conf fail. - Revert back to browsing the offline documentation using Iceweasel instead of Yelp (Closes: #7390, #7285). - Make the new NetworkManager configuration directory persistent, when the old one was, but disable the old one (Closes: #7338). Tails developers's avatar Tails developers committed 575 576 577 578 - Before running tails-upgrade-frontend, chdir to a world-readable place (Closes: #7641). In particular, Archive::Tar::Wrapper, when called by tails-install-iuk, wants to chdir back to the original cwd after it has chdir'd elsewhere to do its job. 579 580 581 * Minor improvements - Install seahorse-nautilus, replacing seahorse-plugins (Closes #5516). 582 - Install hledger (custom backport, for now): our accountants need this. 583 584 585 586 587 588 589 590 591 592 593 594 - Install stable Scribus instead of scribus-ng. - Install the printer driver for Epson Inkjet that use ESC/P-R. - Install the BookletImposer PDF imposition toolkit. It's tiny, and really helpful e.g. when producing booklets. - Install gtkhash and nautilus-gtkhash (Closes #6763). - Import new version of Tor Launcher: · Now based on upstream Tor Launcher 0.2.5.4. · Tor bug #11772: Proxy Type menu not set correctly · Tor bug #11699: Change &amp;#160 to &#160; in network-settings.dtd · Correctly handle startup paths that contain dot. - Upgrade to Torbutton 1.6.9.0. - Avoid shipping python2.6 in addition to python2.7. 595 596 - Don't install Gobby 0.4 anymore. Gobby 0.5 has been available in Debian since Squeeze, now is a good time to drop the obsolete 597 598 599 600 601 602 603 604 605 606 607 608 609 0.4 implementation. - Require a bit less free memory before checking for upgrades with Tails Upgrader. The general goal is to avoid displaying "Not enough memory available to check for upgrades" too often due to over-cautious memory requirements checked in the wrapper. - Make Tails Greeter's help window resolution-aware. Previously it used a static 800x600 which was problematic on lower resolutions, and sub-optimal on higher resolutions. Now it adapts itself according to the screen resolution. - Whisperback now sanitizes attached logs better with respect to DMI data, IPv6 addresses, and serial numbers (Closes #6797, #6798, #6804). - Integrate the new logo in Tails Installer (Closes #7095) 610 611 612 613 614 615 616 617 618 619 - Also install linux-base and linux-compiler-gcc-4.8-x86 from sid. This way, we can get rid of our linux-compiler-gcc-4.8-x86 3.12, and it makes things a bit more consistent. - Include the syslinux binary, and its MBR, in the ISO filesystem. This in turn allows Tails Installer to use this binary and MBR, which is critical for avoiding problems (such as #7345) on "Upgrade from ISO". - Include syslinux.exe for win32 in utils/win32/ on the ISO filesystem (Closes: #7425). - Tails Installer: 620 * Add consistent margins in GUI. 621 622 623 624 625 626 627 628 629 * Always reset the target drive's MBR, without asking for confirmation, after installing or upgrading. * Install the bootloader using the syslinux binary found on the target device, once the Live OS has been extracted/copied there. - Enable double-clicking to pick entries in the language or keyboard layout lists in Tails Greeter. - Install backport of shared-mime-info 1.3 (Closes: #7079). - Make sanity-check prompts closable in Tails Persistence Setup Tails developers's avatar Tails developers committed 630 (Closes: #7119). 631 - Fix quick search in Tails Greeter's Other languages window Tails developers's avatar Tails developers committed 632 (Closes: #5387). 633 634 635 636 637 - Install systemd. It is not enabled by default, but having it around will help doing the migration work. - Enable AppArmor on the kernel command-line. This is a no-op without the userspace tools and with no profile shipped, but it will make it easier to fix this part of the situation. 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 * Build system - Bump Vagrant builder's memory for RAM builds. Wheezy requires more space to build, and the resulting image is larger. - Fix Vagrant compatibility issue. Some classes' methods/fields have been renamed between Vagrant versions, so we need a simple compatibility layer to support all versions. Without this, it's not possible to issue e.g. a `build` command to an already running (i.e. `vm:up`:ed) Vagrant instance. - Move cpu and mem checks to the `build` task. Previously, when they were checked in `vm:up` *only* when issued while the VM already is up, so these checks weren't run if one issues a `build` when the VM is off. Now we'll fail earlier with a more informative error message, and it looks like a more logical home for them too. - Fix buggy memory checks for RAM building. We have to take into account which state the Vagrant VM is in for determining *where* we check if enough memory is available for a RAM build. If it's off, we check the host; if it's on we check the VM. Previously we always checked the host, which doesn't make sense when the VM is already started. 660 * Automated test suite 661 662 663 - Bump the tester VM's RAM by 256 MiB. There is not enough free RAM to run Tails Upgrader with just 1 GiB of RAM after the migration to Wheezy. 664 665 666 667 668 669 - Always adjust OOM and memory overcommit settings. The kernel freezes seem to also happen for the amd64 kernel when filling the memory. - Add option to make Sikuli rety on FindFailed. This makes it possible to update manu images for Sikuli in just *one* test suite run, by continuously updating outdated pictures as we go. 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 - Actually run "Upgrade from ISO" from a USB drive running the old version. That's what users do, and is buggy. - Automatically test persistent directories permissions (Closes: #7560). - Use read-write persistence when testing upgraded USB installations. Otherwise e.g. the permission fixes won't get applied, and the subsequent steps testing the permissions will fail. - Actually check that the ISO's Tails is installed. The step "Tails is installed on USB drive $TARGET" only checks that the *running* Tails is installed on $TARGET, which obviously fails when doing an upgrade from ISO running an old Tails. That it worked for the same scenario running the current Tails is just coincidental. - Use OpenJDK 7 to run our test suite (Closes #7175). - Use qemu-system-x86_64 directly, instead of kvm, for running the automated test suite (Closes: #7605). -- Tails developers <tails@boum.org> Sun, 20 Jul 2014 23:16:13 +0200 tails (1.0.1) unstable; urgency=medium 690 691 692 693 694 695 696 697 698 699 700 701 * Security fixes - Upgrade the web browser to 24.6.0esr-0+tails1~bpo60+1 (Firefox 24.6.0esr + Iceweasel patches + Torbrowser patches). Also import the Tor Browser profile at commit 90ba8fbaf6f23494f1a0e38d63153b3b7e65d3d3 from ttp/tor-browser-24.6.0esr-3.x-1. - Install Linux 3.14 from Debian unstable (fixes CVE-2014-3153 and others). - Install openssl from Squeeze LTS (fixes CVE-2014-0076, CVE-2014-0195, CVE-2014-0221, CVE-2014-3470 and CVE-2014-0224). - Install GnuTLS from Squeeze LTS (fixes CVE-2014-3466.). 702 703 704 705 706 707 708 709 710 * Minor improvements - Add Squeeze LTS APT sources. It has been given a low pinning priority so explicit pinning must be used to actually install anything from it. - Upgrade Tor to 0.2.4.22-1~d60.squeeze+1. - Upgrade I2P to 0.9.13-1~deb6u+1. -- Tails developers <tails@boum.org> Sun, 08 Jun 2014 19:14:00 +0200 711 Tails developers's avatar Tails developers committed 712 tails (1.0) unstable; urgency=medium 713 Tails developers's avatar Tails developers committed 714 715 716 * Security fixes - Upgrade the web browser to 24.5.0esr-0+tails1~bpo60+1 (Firefox 24.5.0esr + Iceweasel patches + Torbrowser patches). 717 718 719 - Upgrade Tor to 0.2.4.21-1+tails1~d60.squeeze+1: * Based on 0.2.4.21-1~d60.squeeze+1. * Backport the fix for Tor bug #11464. It adds client-side blacklists for Tails developers's avatar Tails developers committed 720 721 722 all Tor directory authority keys that was vulnerable to Heartbleed. This protects clients in case attackers were able to compromise a majority of the authority signing and identity keys. 723 Tails developers's avatar Tails developers committed 724 * Bugfixes Tails developers's avatar Tails developers committed 725 - Disable inbound I2P connections. Tails already restricts incoming 726 727 728 connections, but this change tells I2P about it. - Fix link to the system requirements documentation page in the Tails Upgrader error shown when too little RAM is available. 729 730 731 732 733 734 735 736 737 738 739 740 741 742 * Minor improvements - Upgrade I2P to 0.9.12-2~deb6u+1. - Import TorBrowser profile. This was forgotten in Tails 0.23 and even though we didn't explicitly set those preferences in that release they defaulted to the same values. This future-proofs us in case the defaults would ever change. - Import new custom version of tor-launcher: * Based on upstream Tor Launcher 0.2.5.3. * Improve how Tor Launcher handles incomplete translation. (Tor bug #11483; more future-proof fix for Tails bug #6885) * Remove the bridge settings prompt. (Tor bug #11482; closes Tails bug #6934,) * Always show bridge help button. (Tor bug #11484) Tails developers's avatar Tails developers committed 743 744 745 746 - Integrate the new Tails logo into various places: * The website * The boot splash * The "About Tails" dialog 747 748 749 750 751 752 753 754 * Build system - Use the stable APT suite when building from the stable Git branch (Closes: #7022). * Test suite - Add test for the #7022 fix. Tails developers's avatar Tails developers committed 755 -- Tails developers <tails@boum.org> Sun, 27 Apr 2014 19:34:01 +0200 756 Tails developers's avatar Tails developers committed 757 tails (0.23) unstable; urgency=medium 758 759 760 761 762 * Security fixes - Upgrade the web browser to 24.4.0esr-0+tails1~bpo60+1 (Firefox 24.4.0esr + Iceweasel patches + Torbrowser patches). 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 * Major new features - Spoof the network interfaces' MAC address by default (Closes: #5421), as designed on https://tails.boum.org/contribute/design/MAC_address/. - Rework the way to configure how Tor connects to the network (bridges, proxy, fascist firewall): add an option to Tails Greeter, start Tor Launcher when needed (Closes: #5920, #5343). * Bugfixes - Additional software: do not crash when persistence is disabled (Closes: #6440). - Upgrade Pidgin to 2.10.9, that fixes some regressions introduced in the 2.10.8 security update (Closes: #6661). - Wait for Tor to have fully bootstrapped, plus a bit more time, before checking for upgrades (Closes: #6728) and unfixed known security issues. - Disable the Intel Management Engine Interface driver (Closes: #6460). We don't need it in Tails, it might be dangerous, and it causes bugs on various hardware such as systems that reboot when asked to shut down - Add a launcher for the Tails documentation. This makes it available in Windows Camouflage mode (Closes: #5374, #6767). - Remove the obsolete wikileaks.de account from Pidgin (Closes: #6807). * Minor improvements - Upgrade Tor to 0.2.4.21-1~d60.squeeze+1. - Upgrade obfsproxy to 0.2.6-2~~squeeze+1. - Upgrade I2P to 0.9.11-1deb6u1. - Install 64-bit kernel instead of the 686-pae one (Closes: #5456). This is a necessary first step towards UEFI boot support. - Install Monkeysign (in a not-so-functional shape yet). - Disable the autologin text consoles (Closes: #5588). This was one of the blockers before a screen saver can be installed in a meaningful way (#5684). - Don't localize the text consoles anymore: it is broken on Wheezy, the intended users can as well use loadkeys, and we now do not have to trust setupcon to be safe for being run as root by the desktop user. - Make it possible to manually start IBus. - Reintroduce the possibility to switch identities in the Tor Browser, using a filtering proxy in front of the Tor ControlPort to avoid giving full control over Tor to the desktop user (Closes: #6383). - Incremental upgrades improvements: · Drop the Tails Upgrader launcher, to limit users' confusion (Closes: #6513). · Lock down sudo credentials a bit. 806 · Hide debugging information (Closes: #6505). 807 808 · Include ~/.xsession-errors in WhisperBack bug reports. This captures the Tails Upgrader errors and debugging information. 809 810 811 · Report more precisely why an incremental upgrade cannot be done (Closes: #6575). · Various user interface and phrasing improvements. 812 813 814 815 816 817 818 819 820 - Don't install the Cookie Monster browser extension (Closes: #6790). - Add a browser bookmark pointing to Tor's Stack Exchange (Closes: #6632). - Remove the preconfigured #tor channel from the Pidgin: apparently, too many Tails users go ask Tails questions there, without making it clear that they are running Tails, hence creating a user-support nightmare (Closes: #6679). - Use (most of) Tor Browser's mozconfig (Closes: #6474). - Rebase the browser on top of iceweasel 24.3.0esr-1, to get the certificate authorities added by Debian back (Closes: #6704). 821 822 823 824 825 826 - Give access to the relevant documentation pages from Tails Greeter. - Hide Tails Greeter's password mismatch warning when entry is changed. - Persistent Volume Assistant: · Take into account our installer is now called Tails Installer. · Optimize window height (Closes: #5458). · Display device paths in a more user-friendly way (Closes: #5311). 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 * Build system - Ease updating POT and PO files at release time, and importing translations from Transifex (Closes: #6288, #6207). - Drop custom poedit backport, install it from squeeze-backports-sloppy. - Make ISO and IUK smaller (Closes: #6390, #6425): · Exclude more files from being included in the ISO. · Remove *.pyc later so that they are not recreated. · Truncate log files later so that they are not filled again. · At ISO build time, set mtime to the epoch for large files whose content generally does not change between releases. This forces rsync to compare the actual content of these files, when preparing an IUK, instead of blindly adding it to the IUK merely because the mtime has changed, while the content is the same. - Make local hooks logging consistent. * Test suite - Migrate from JRuby to native Ruby + rjb. - The test suite can now be run on Debian Wheezy + backports. - Fix buggy "persistence is not enabled" step (Closes: #5465). - Use IPv6 private address as of RFC 4193 for the test suite's virtual network. Otherwise dnsmasq from Wheezy complains, as it is not capable of handling public IPv6 addresses. - Delete volumes after each scenario unless tagged @keep_volumes. - Add an anti-test to make sure the memory erasure test works fine. - A *lot* of bugfixes, simplifications and robustness improvements. Tails developers's avatar Tails developers committed 854 -- Tails developers <tails@boum.org> Tue, 18 Mar 2014 00:58:50 +0100 855 Tails developers's avatar Tails developers committed 856 tails (0.22.1) unstable; urgency=medium 857 858 * Security fixes 859 860 861 862 - Upgrade the web browser to 24.3.0esr-0+tails1~bpo60+2 (Firefox 24.3.0esr + Iceweasel patches + Torbrowser patches). - Upgrade NSS to 3.14.5-1~bpo60+1. - Upgrade Pidgin to 2.10.8. 863 864 865 866 - Workaround browser size fingerprinting issue by using small icons in the web browser's navigation toolbar (Closes: #6377). We're actually hit by Tor#9268, and this is the best workaround gk and I were able to find when discussing this on Tor#10095. 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 * Major new features - Check for upgrades availability using Tails Upgrader, and propose to apply an incremental upgrade whenever possible (Closes: #6014). · Run tails-update-frontend at session login time. · Have tails-security-check only report unfixed security issues. · Greatly improve the Tails Upgrader UI and strings phrasing. · Enable startup notification for Tails Upgrader. - Install Linux 3.12 (3.12.6-2) from Debian testing. Unfortunately, this breaks the memory wipe feature on some hardware (#6460), but it fixes quite a few security issues, and improves hardware support. - Update the build system to be compatible with Vagrant 1.2 and 1.3, in addition to the already supported versions (Closes: #6221). Thanks to David Isaac Wolinsky <isaac.wolinsky@gmail.com>. * Bugfixes - Do not start IBus for languages that don't need it. This fixes the keybindings problems introduced in 0.22 (Closes: #6478). Thanks to WinterFairy. - Disable network.proxy.socks_remote_dns in the Unsafe Browser. Bugfix against 0.22 (Closes: #6479). - Fetch Tor Browser User-Agent from its own prefs, rather than from the obsolete Torbutton ones. Bugfix against 0.22 (Closes: #6477). - Upgrade Vagrant basebox to include up-to-date Debian archive keys (Closes: #6515, #6527). - Do not use a non-working proxy for downloading the Vagrant basebox (Closes: #6514). - Use IE's icon in Windows camouflage mode. Bugfix against 0.22 (Closes: #6536). - Support "upgrading" a partial Tails installation (Closes: #6438) and fix missing confirmation dialog in Tails Installer (Closes: #6437). Thanks to Andres Gomez Ramirez <andres.gomez@cern.ch>. 899 - Fix browser homepage in Spanish locales (Closes: #6612). 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 * Minor improvements - Tor 0.2.4 is stable! Adapt APT sources accordingly. - Update Tor Browser to 24.2.0esr-1+tails1, that uses its own NSS library instead of the system one. - Update Torbutton to 1.6.5.3. - Do not start Tor Browser automatically, but notify when Tor is ready. Warn the user when they attempt to start Tor Browser before Tor is ready. - Import Tor Browser profile at 3ed5d9511e783deb86835803a6f40e7d5a182a12 from ttp/tor-browser-24.2.0esr-1. - Use http.debian.net for Vagrant builds, instead of the mostly broken (and soon obsolete) cdn.debian.net. - Phrasing and UI improvements in tails-upgrade-frontend. - Style and robustness improvements in tails-security-check. - Make room for upcoming UEFI support in Tails Installer. 915 916 -- Tails developers <tails@boum.org> Wed, 29 Jan 2014 15:08:13 +0100 917 918 tails (0.22) unstable; urgency=medium 919 920 [Tails developers] 921 * Security fixes 922 - Upgrade to Iceweasel 24.2.0esr that fixes a few serious security issues. 923 924 925 - Stop migrating persistence configuration and access rights. Instead, disable all persistence configuration files if the mountpoint has wrong access rights (Closes: #6413). 926 927 - Upgrade to NSS 3.15.3 that fixes a few serious security issues affecting the browser, such as CVE-2013-1741, CVE-2013-5605 and CVE-2013-5606. 928 929 * Major improvements 930 931 932 - Switch to Iceweasel 24 (Closes: #6370). · Resync' (most) Iceweasel prefs with TBB 3.0-beta-1 and get rid of many obsolete or default settings. Tails developers's avatar Tails developers committed 933 934 935 936 · Disable WebRTC (Closes: #6468). · Import TorBrowser profile at commit 51bf06502c46ee6c1f587459e8370aef11a3422d from the tor-browser-24.2.0esr-1 branch at https://git.torproject.org/tor-browser.git. 937 - Switch to Torbutton 1.6.5 (Closes: #6371). 938 939 940 941 942 943 944 945 946 947 948 · Prevent Torbutton from asking users to "upgrade TBB". · Use the same Tor SOCKS port as the TBB (9151) for our web browser. This should be enough to avoid being affected by Tor#8511. · Disable Torbutton 1.6's check for Tor. Unfortunately, the new check.torproject.org breaks the remote Tor check. We cannot use the local Tor check with the control port. So, the shortest and sanest path to fixing the check issue, because the remote Tor check is broken" seems to simply disable this check. Patch submitted upstream as Tor#10216. - Prepare incremental upgrades to be the next default way to upgrade Tails, on point-releases at least. 949 950 * Bugfixes 951 - Deny X authentication only after Vidalia exits (Closes: #6389). 952 - Disable DPMS screen blanking (Closes: #5617). 953 954 955 956 - Fix checking of the persistent volume's ACL. - Sanitize more IP and MAC addresses in bug reports (Closes: #6391). - Do not fail USB upgrade when the "tmp" directory exists on the destination device. Tails developers's avatar Tails developers committed 957 958 - Tails Installer: list devices with isohybrid Tails installed (Closes: #6462). 959 960 * Minor improvements 961 962 963 964 965 966 967 968 969 970 - Create a configuration file for additional software if needed (Closes: #6436). - Translations all over the place. - Enable favicons in Iceweasel. - Do not propose to make permanent NoScript exceptions. In Tails, every such thing is temporary, so better only display the menu entry that's about temporarily allowing something. - Clearer warning when deleting persistent volume (thanks to Andres Gomez Ramirez <andres.gomez@cern.ch> for the patch). - Make wording in Tails Installer more consistent. 971 972 [ WinterFairy ] 973 * Use IBus instead of SCIM (Closes: #5624, #6206). 974 975 It makes it possible to input passwords in pinentry for at least Japanese, Chinese and Korean languages. 976 * Add an import-translation script. 977 978 979 980 981 This automates the importation process of completed translations from Transifex. * Always list optimal keyboard layout in the greeter (Closes: #5741). * Fix on-the-fly translation of the greeter in various languages (Closes: #5469). 982 983 [ Kytv] 984 985 986 987 * Update I2P to 0.9.8.1 (Closes: #6080, #5889). * Improve I2P configuration: - Disable IPv6 support in a nicer way. - Disable i2cp (allows java clients to communicate from outside the JVM). If 988 this is unset an exception for port 7654 would need to be added to ferm. 989 990 991 992 993 994 995 996 - Disable "in-network" updates (this is also done in the regular I2P packages). - Disable the outproxies. Access to the Internet is already routed through Tor so these are unnecessary. If end-users have a good reason to go through one of the I2P outproxies they can turn them back on. * Add a couple of default I2P IRC channels to Pidgin. * Allow access to the local 'eepsite' through FoxyProxy. * Add firewall exceptions for the standard I2P ports. 997 998 -- Tails developers <tails@boum.org> Sat, 30 Nov 2013 16:47:18 +0100 999 Tails developers's avatar Tails developers committed 1000 tails (0.21) unstable; urgency=low
Welcome to It-Slav.Net blog Peter Andersson peter@it-slav.net I've already got a female to worry about. Her name is the Enterprise. -- Kirk, "The Corbomite Maneuver", stardate 1514.0 Background On my electricity meter I have a flashing LED. 1000 flashes is 1 watthour. As a monitor geek I want to know my powerconsumption and find a 1-wire kit containing a counter and a sensor that could detect the flashing from the electricity meter. I wrote a script that collect the data in an RRD database and graph it.      Graph   The script #!/usr/bin/perl # By Peter Andersson peter@it-slav.net # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # use RRDs; use OW; # define location of rrdtool databases my $rrd = '/root/owfs/script/rrd_db'; # define location of images my $img = '/home/peter/public_html/1-wire/energy'; # process data for each interface (add/delete as required) &ProcessSensor(0, "Anderssons power consumption", "mother.mynet" , "3001" , "1D.A4F10C000000"); sub ProcessSensor { # process sensor # inputs: $_[0]: sensor number (ie, 0/1/2/etc) # $_[1]: sensor description print "number:$_[0] desc:$_[1], server:$_[2] port:$_[3], id: $_[4]\n"; my $owserver = "$_[2]:$_[3]"; unless(OW::init($owserver)) { $status = $ERRORS{CRIT}; $message = "OWServer not running at $owserver\n"; exit $status; } # get temperature from sensor my $handle = OW::get("$_[4]/counters.A"); # print "handle=$handle\n"; $handle =~ s/^\s*(.*?)\s*$/$1/; ## Check if input is an integer or decimal unless (($handle =~ /^-?(?:\d+(?:\.\d*)?|\.\d+)$/) || ($handle =~ /^[+-]?\d+$/)) { print "Not an integer or a decimal\n"; return($ERRORS{CRITICAL}); } $count=$handle; # remove eol chars chomp($count); print "sensor $_[0]: $count \n"; # if rrdtool database doesn't exist, create it if (! -e "$rrd/energy$_[0].rrd") { print "creating rrd database for energy sensor $_[0]...\n"; RRDs::create "$rrd/energy$_[0].rrd", "-s 60", "DS:energy:COUNTER:1200:0:U", "RRA:AVERAGE:0.5:1:43200", "RRA:AVERAGE:0.5:30:175200"; } if ($ERROR = RRDs::error) { print "$0: failed to create $_[0] database file: $ERROR\n"; } # check for error code from count sensor #if (int $count eq 85) #{ # print "failed to read value from sensor $_[0]\n"; #} #else #{ # insert values into rrd RRDs::update "$rrd/energy$_[0].rrd", "-t", "energy", "N:$count"; if ($ERROR = RRDs::error) { print "$0: failed to insert $_[0] data into rrd: $ERROR\n"; } #} # create graphs for current sensor &CreateGraph($_[0], "day", $_[1], 3600, hourly); &CreateGraph($_[0], "week", $_[1], 3600*24, daily); &CreateGraph($_[0], "month", $_[1], 3600*24*7, weekly); &CreateGraph($_[0], "year", $_[1], 3600*24*7*30, monthly); &CreateGraph($_[0], "decade", $_[1], 3600*24*7*365, yearly); } sub CreateGraph { # creates graph # inputs: $_[0]: sensor number (ie, 0/1/2/etc) # $_[1]: interval (ie, day, week, month, year) # $_[2]: sensor description # $_[3]: Moving avarage timeperiod # $_[4]: Moving avarage timeperiod unit print "Create graph $_[0], interval: $_[1], Moving avarage timeperiod: $_[3]s and moving avarage unit: $_[4]\n"; RRDs::graph "$img/energy$_[0]-$_[1].png", "-s -1$_[1]", "-t $_[2]-$_[1]", "-h", "400", "-w", "1000", "-a", "PNG", "-v Watt", "--slope-mode", "-W", "WWW.It-Slave.Net - An It-Slave In The Digital Saltmine", "-l", "0", "DEF:energy=$rrd/energy$_[0].rrd:energy:AVERAGE:start=end-$_[3]s-1$_[1]", "CDEF:W=energy,3600,*", "CDEF:mean=W,$_[3],TREND", "AREA:mean#FF000044", "LINE1:mean#A00000:Moving average $_[4]:", "AREA:W#AAAAee99", "LINE1:W#AAAAEEFF:Power consumption\\n", "CDEF:energyK=energy,1000,/", "VDEF:value_sum=energyK,TOTAL", "GPRINT:value_sum:Total consumption last $_[1]\\:%0.2lfkWh\\n", "GPRINT:W:MIN:Instantaneous consumption\\: Min\\:%0.2lf%sW", "GPRINT:W:AVERAGE:Average\\:%0.2lf%sW", "GPRINT:W:MAX:Max\\:%0.2lf%sW", "GPRINT:W:LAST:Now\\:%0.2lf%sW\\n"; # "COMMENT:\n WWW.It-Slav.Net - An It-Slave In The Digital Saltmine"; if ($ERROR = RRDs::error) { print "$0: unable to generate sensor $_[0] $_[1] graph: $ERROR\n"; } }   Links Share 3 Responses to “Graphing powerconsumption using 1-wire” 1. Mikael Says: 82 kWh per day – are you running a data center? 2. peter Says: Yes, a small one at home. 3. temp master Says: hello , i would like to monitor gas usage. 1 click is 0,1  m3.   I dont know where in script must i change that it will count right ? Thank you for the answer. Leave a Reply + seven = 15 Book reviews FreePBX 2.5 Powerful Telephony Solutions Asterisk 1.6 Build a feature rich telephony system with Asterisk Learning NAGIOS 3.0 Cacti 0.8 Network Monitoring, Monitor your network with ease!
w0rp zone • Blog • null and the D Programming Language The problem with null Throughout my life as a programmer, I constantly experience one problem. I don’t like null. I imagine that the existence of null is the number one cause of headaches for all programmers around the world. The creator of the null reference names it The Billion Dollar Mistake. The problem with null is quite obvious. Every object that could possibly be null is a bomb waiting to go off. A bomb that can often be set without any way of reliably determining how the bomb got there in the first place. You either deal with null in every possible case, or wait for your program to blow up. Because there are so many cases to deal with, you must eventually relent and allow your program to become fragile, and therefore at the mercy of random explosions. 1. There needs to be an easy way to avoid initialisation of member variables, because not all members can be default initialised. This is more of a headache than having null. 2. There needs to be a way to represent lack of existence. There are therefore three approaches. 1. Include null in a language. 2. Exclude null from the language, and use Option/Maybe types as the alternative. 3. Make operations on null do nothing without causing a pointer/reference error. Almost all programming languages do #1. Declarative languages tend to do #2. Scala oddly seems to offer both Option types and null, for easier Java support. Objective C is really the only popular language I can think of that offers #3. (Although, not reliably enough.) The D Programming Language actually takes option #1, but I would like to argue that it actually alleviates most of the headaches of having null by avoiding it in many cases. I aim to demonstrate, over the course of several blog posts, that D is a very good programming language because of small, perhaps poorly documented, features of the language. These small features, when combined together, create a whole that makes the overall language very powerful and useful. How it Comes Together - Sequences of Data and Numbers I would like to argue that the vast majority of programming involves constructing and deconstructing sequences of data. I cannot offer concrete evidence to back up this statement, but hopefully it should be self evident. It should hopefully be clear that the overwhelming majority of types declared while programming will be types representing sequences, or depend on those types. I am of course referring to character strings, lists, maps, and sets. Aside from working with sequences, a vast majority of programming involves working with numbers. This can be evidenced by the prevalence of operators for numbers in programming languages. Many lines of code deal with combining numbers in various ways. Assuming that the vast majority of code will deal with these cases, then if it’s possible to eliminate all possibility of ever seeing null in these cases, then the vast majority of null problems will just go away. D does this wonderfully, and non-obviously, when the following features of the language are combined together. • Numbers are not objects, and cannot be null. • x.func(...) can be syntactic sugar for func(x, ...) whenever there exists a compatible function. • Arrays and maps (associative arrays) are not objects, but are part of the language. • Arrays know their own length. • Arrays and maps are copy-on-write. • null arrays and maps can be treated like empty arrays and maps. • Strings are not C strings, they are arrays of characters. (Literally a typedef.) • D offers generics accepting value types without any type erasure. Perhaps it might not be totally obvious, but with these features combined, the vast majority of null headaches have been eliminated from your daily life as a programmer. Here is how it breaks down. Suppose you have a function that returns an array, map, or string. You know for certain that you cannot cause a null reference error by attempting to access that data, because null arrays and maps can be treated like empty arrays and maps. You do not need to create nullable data structures to capture the length of sequences, because the sequences included in the language know their own lengths, returned by x.length, which actually uses the syntactic sugar described above. (This sugar can also introduce null safety for objects with null checks inside function bodies.) The number one reason to make numbers objects is so they can fit inside container objects. Containers are not objects in D, and value types can be used in generic type parameters. So there is no reason to make numbers objects there. D’s syntactic sugar can make numbers seem like objects, by making functions look like methods. So you at once get the benefits of numbers being objects in most languages without needing to introduce null. Let us create an example set of functions which exhibit these features. This example, while perhaps not the best example, should demonstrate how D can safely work with null sequences. As far as D goes, the problem of null sequences is solved, forever. The numbers in sequences of numbers are also safe. They never have to be boxed into objects in order to fit into them, like in Java. They never are required to become nullable. Here is that example: int square (int num) { return num * num; } int[] some_numbers() { return null; // Can be treated like an empty array. } int[] some_more_numbers() { int[] num_list = some_numbers(); // Okay, we have an empty array. int one = 1; int two = 2; num_list ~= one.square() // Now we have [1], and we did copy on write. num_list ~= two.square() // [1, 4], Same copy, may have its capacity increased. num_list ~= two.square() // [1, 4, 4], Same copy. return num_list; } // bool[int] is a mapping where the keys are integers, // and the values are booleans. // This is a common pattern for representing sets. bool[int] unique_numbers() { bool[int] some_map = null; // Again, actually an empty map; foreach(int num; some_more_numbers()) { some_map[num] = true; // Add this number to the map. } return some_map; } How it Comes Together - struct and class The only things that can cause null reference errors in D are pointers and instances of classes. (D class instances are not exposed as being pointers, they are higher level references.) In order to explain how D can avoid null problems with user-defined data structures, it is worth taking about how C++ handles this issue. In C++, variables must always be initialised to some value. It is only when dereferencing a pointer to a class do you run into null problems in C++. C++ constructs class instances on a stack, and the instances are copy-by-value. C++ uses the new keyword instead construct the instances on the heap, returning a pointer to that instance. C++ also offers reference types which are references to class instances, which cannot be null. D constructs classes instances on the heap, but offers a mechanism for stack allocation of class instances. References to class instances can be null. However, D treats struct types like how C++ treats class types. struct types are copy-by-value. In D, these struct values must always be initialised, and they cannot be null. D offers a ref qualifier (And other related qualifiers…) for referencing types, instead of copying them, to achieve something similar to C++’s reference types. Because of this distinction between struct and class types in D, D offers a mechanism to create easy lightweight data structures that can never be null. This is very good, because a lot of null problems arise from references to Java Bean like instances being null. With D, new simple data structures can be created without introducing null reference problems. To demonstrate the usefulness of structs in D, I actually have a very heavy example on hand. Here is part of a geometry module I was working on a while ago, which defines a Point struct for representing points and vectors in three dimensional space, with some convenience methods for reasoning with these points and vectors. This example also demonstrates several other useful, perhaps poorly documented features. (Discussion of pure functions, transitive const-correctness, properties, and unit testing, among other features, to come later.) Conclusion The D programming language includes null references, which cause many headaches. However, I should have hopefully explained how D does this while avoiding many of the headaches associated with null references. Many of the common fuses for exploding the null reference bombs are avoided entirely through careful and clever language design. Through this and further blog posts, I can hopefully demonstrate that D is a language which should feel very familiar to most programmers, while avoiding many of the problems of most programming languages in clever ways.
node package manager ident-express Add results from ident daemon to your express request objects Ident Express Adds ident authentation to your express.js routes. How to use (in CoffeeScript): checkIdent = require 'ident-express' app.get '/foo', checkIdent, (req, res) -> # Do something with req.ident console.log "I think you are " + req.ident Ident is described in RFC 1413. One important thing to note is that the information returned by identd should only be trusted if you trust the machine running the identd, which is the machine from which the connection has been made (the user/browser/service that is making the GET/POST/PUT request). If your express.js app is behind a reverse-proxy such as nginx then the IP address that express.js sees will be those of nginx, not of the original HTTP request that was made to nginx. nginx can set headers that reveal the real IP address. Ident express will make use of the headers X-Real-Port, X-Real-IP, X-Server-Port which can be set by using the following fragment of nginx config: proxy_set_header X-Real-Port $remote_port; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Server-IP $server_addr; proxy_set_header X-Server-Port $server_port;
Skip to main content Geosciences LibreTexts 2.3: Energy Efficiency and Energy Content of Different Fuels • Page ID 15564 • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \) \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\) \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\) \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\) \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vectorC}[1]{\textbf{#1}} \) \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \) \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \) \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \) \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \) Remember that energy is the “ability or capacity to do work,” where “work” is defined as a change in energy. Energy is measured in a variety of units including calories, kilowatt hours (kWh), British Thermal Units (Btu). Power is measured in watts (or joules per second) and is the rate at which energy is generated or used. Fuels are converted into useful energy according to their heat content. The heat content of a fuel is normally measured in Btus. One Btu is the amount of energy required to raise the temperature of one pound of water (about a pint) one degree Fahrenheit. The relative efficiency of a fuel or technology is summarized in the “heat rate” – the amount of fuel required to generate one kilowatt-hour (kWh). As might be expected, not all fuels are created equal. Comparison of fuels is possible by converting them into useful energy according to their heat content as measured in Btus. Equation 1: Heat rate = Btu/kWh Under ideal conditions, in which the energy input is equal to the energy output, the heat rate is equal to 3,412 Btu/kWh. But not all energy-conversion processes are ideally efficient. So Equation 1 must be modified to account for these inefficiencies. Equation 2: Heat rate = (ideal heat rate)/efficiency = (3412 Btu/kWh)/efficiency Table 1 summarizes the average heat content of several familiar fuels. These numbers are averages because variations in the quality can affect the efficiency with which these fuels can be converted into useful energy. Table 1: Heat (energy) contents of fuels Fuel Amount Heat Content (Btus) Oil 1 barrel* 5,800,000 (138,095/gal) Natural gas 1 cubic foot 1,026 Coal** 1 ton 20,700,000 Gasoline 1 gallon 124,000 Electricity*** 1 kWh 3,412 Diesel or heating oil 1 gallon 139,000 White oak (20% moisture content) fn 1 cord 27,000,000 Credit: Source: U.S. Energy Information Administration * 1 barrel of oil = 42 gallons. ** Heat content of coal is an average of bituminous coals. Lignite (brown coal) will have a lower heat content. Anthracite will have a higher heat content. *** The number for electricity assumes perfectly efficient conversion of fuel into electricity. This page titled 2.3: Energy Efficiency and Energy Content of Different Fuels is shared under a CC BY-NC-SA 4.0 license and was authored, remixed, and/or curated by Marcellus Matters (John A. Dutton: e-Education Institute) via source content that was edited to the style and standards of the LibreTexts platform; a detailed edit history is available upon request.
Teardown difficulty: Moderate Duration: 6 min Recommended tools Disassembly/Repair of the mobile device Samsung Galaxy Grand Prime VE Duos SM-G531 (Samsung SM-G531H/DS) with each step description and the required set of tools. Specialist in content creation, distribution and content management. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 1/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 1/2 Step 1. Open the back cover. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 2/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 2/2 Step 2. Lift and remove the battery. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 3/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 3/2 Step 3. Using a screwdriver (Phillips 1.5 mm PH000), unscrew 10 bolts in the frame of the phone. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 4/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 4/2 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 4/3 Step 4. Warm the surface of the screen and pry and remove the middle frame. ⚠️ Warning! For careful separation, we recommend using a heat gun. At the same time, it is necessary to heat carefully in order, not to damage the surface of the device. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 5/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 5/2 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 5/3 Step 5. Using a screwdriver (Phillips 1.5 mm PH000), unscrew 1 bolt and remove the cable with a headphone jack/socket and earpiece (speaker). How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 6/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 6/2 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 6/3 Step 6. Disconnect the connector on PCB, and remove the front (selfie) camera. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 7/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 7/2 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 7/3 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 7/4 Step 7. Disconnect the connector and remove the PCB. How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 8/1 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 8/2 How to disassemble Samsung Galaxy Grand Prime VE Duos SM-G531, Step 8/3 Step 8. Parts are in the middle cover. Detailed disassembly instructions of Samsung Galaxy Grand Prime VE Duos SM-G531 in the video, made by our mobile repair & service center: If you have a question, ask us, and we will try to answer in as much detail as possible. If this article was helpful for you, please rate it. Disassembling\Repair has medium complexity and takes about 6 minutes in time. Our manual is suitable for all models Samsung Galaxy Grand Prime VE Duos SM-G531 — Samsung SM-G531H/DS released for markets in different countries. Back to the list ˄˅ Advertisement ˃˂ Advertisement
FDM VS SLA: The Differences to Be Clearly Explained FDM VS SLA: The Differences to Be Clearly Explained 2020-06-23 3D printing, also known as additive manufacturing, is a general technology based on digital model files, which uses powder-like metal or non-metal and other adhesive materials to build a model by layer printing. FDM (Fused deposition modeling) and SLA (Stereolithography) are the two most common 3D printing technologies on the market. As both technologies have a long development history, professionals or amateurs will generally choose these two technologies as entry-level choices when they contact 3D printers. Therefore, FDM and SLA are also the most mature 3D printing technologies at present.   No matter for prototype design, model display, or general parts manufacturing, although both of them can print out similar parts for users, many details still need to be paid attention to when how to select the most suitable 3D printer and material in the actual production. Let's compare the advantages and disadvantages of these two technologies and the situations in which they should be used. The working principle of 3D printers based on FDM Technology is to extrude the melted thermoplastic onto the 3D printing platform, layer by layer until the final 3D model is finished. There are more kinds of 3D printer materials using FDM technology, from common ABS, PLA to composite materials doped with a variety of reinforced powders, which makes the FDM 3D printer used widely. At the same time, because FDM technology is open-source, fans can also customize 3D printers, so that they can change printing settings and hardware accessories according to different needs, so as to adapt to more special scenarios. The SLA 3D printer uses a UV laser or a light projector to continuously track each slice layer of an object, solidify the photosensitive resin into a hardened plastic until the final 3D model is finished.   FDM Technology Advantages FDM 3D printer has a larger model size than the SLA printer. In addition to prototype design and printing of large-scale, practical parts and models, the FDM 3D printer also can apply to mall batch production. Single 3D printing material, generally has small resistance and friction, high strength as well as certain corrosion resistance. Composite materials generally refer to contain reinforced material powder or fiber mixtures, such as polycarbonate and carbon fiber, which can print out more solid, quality, and stable parts. FDM 3D printing range from the model display, small replacement parts of automobiles to fixtures of aerospace companies, making it a stronger choice for objects requiring mechanical functions and high performance. There are also some FDM 3d printers with high-precision, so that the surface of the printed parts is smooth and even, which can meet the general use and test requirements. FDM Technology Disadvantages The common FDM 3d printer sometimes will be little laminations also known as "whorl" on the model surface due to the low printing resolution. This requires additional polishing and grinding of the parts to achieve a smoother surface. In general, FDM 3D printing is also prone to temperature fluctuations, resulting in slower/faster cooling of thermoplastic filaments and surface delimitation. Common problems are faults and parts warping. The 3D printer works by multiple internal components at the same time in the printing process. Any problems with the nozzle, extrusion, or hot end components can appear during the printing process. Therefore, when preparing and slicing 3D models, it is necessary to pay special attention to the printing settings. The setting of hardware and filament specifications also has some influence on 3D printing models. SLA Technology Advantages SLA 3D printing can achieve a resolution of at least 25 microns, so as to achieve smooth and meticulous surface. The surface details are incomparable to FDM, similar to the appearance of traditional injection molding. So SLA 3D is most suitable for product display or conceptual model making, organic structure, parts with complex geometry, figurines and other unique prototypes. The error of the SLA 3D printer is much smaller because UV laser is used as a data calibration part. As a result, it also has become an ideal choice for printing high-precision models, such as jewelry, medical implants, complex building models, and other small parts. SLA Technology Disadvantages Due to the brittleness of UV resin, only engineering SLA resin can be applied to parts under mechanical stress or cyclic load. In addition, most standard resins are well suited for models with a fine and smooth surface to display. At present, there is no SLA resin on the market compared with polycarbonate, nylon, or other FDM materials in terms of strength and mechanical properties. In addition, 3D printing resin has a higher cost and a much smaller model size. And they are not suitable for small batch production How to Choose the Best Suitable Printer? FDM and SLA have their own advantages and disadvantages, which can be used to print different models and combined them with multi-component assembly. SLA will be a better choice if you want to print a model with a fine surface to display. FDM will be more suitable for manufacturing from design, manufacturing to small-scale production. Free Consultation Don't hesitate to e-mail us with any questions or inquiries, we would be happy to answer your questions. If you have any questions or suggestions, please leave us a message, we will reply you as soon as possible! Send
We're updating the issue view to help you get more done.  The class BESRegex is utilized in a way that is incompatible with the underlying implementation. FIX Description The class BESRegex::match() method has an non-intuitive behavior that has made it get used in ways that I think have serious unintended consequences. BESRegex::match() returns the number of characters that match, -1 if there's no match. And that is a problem because in practice (and I looked at) the code that utilizes this method looks like this: 1 2 3 if(regex.match(...)){ // stuff todo if it matches } And that is really bad because when nothing matches the -1 returned evaluates as true. This ticket is to fix the behavior of the method, and review every point of use to make sure things work as expected. Environment None Status Assignee Sam Lloyd Reporter Nathan Potter Labels Fix versions Story Points 1 Epic Link Priority Highest
  flag Last Updated: Sun, 21 Dec 2014, 06:00 GMT Space Img Phenemine without Prescription Keyword Search: in How to Calm Down Ask us a Question Name Email Address Comments Code ^ When we panic (or have anxiety attacks) a number of things happen to us. And we should know that in panic and high anxiety the symptoms that we experience are the same. The difference lies in the build up: anxiety usually builds up slowly, getting stronger and stronger until it becomes a full-blown attack; panic occurs instantly, usually in response to a clear and imminent threat or danger. An anxiety attack is, in effect, panic. In both anxiety and panic we become jumpy and jittery, on-edge, charged with energy, ready for action. We feel 'in a rush', needing to do something. This can also be seen at times when we are not anxious or panicked, but actually in a rush, for example when we are late for something. In such situations we often feel anxious and 'panicky'. This charge of energy within our body comes from two main things: our breathing and heartbeat - they both become considerably faster. We breathe faster to get more oxygen into the bloodstream to feed the main muscles for action (arms, chest, legs) and the heart speeds up to get this oxygen around our body to these muscles more quickly. This 'rush', this charge of energy for action lies at the heart of anxiety attacks and panic. And when there is no real danger or threat (one we need the 'rush' to escape from) in order to calm down, we need to slow down and slow our body down. The one way that we can actually reverse this process is by slowing down our breathing. Here, we, ourselves, can positively influence our nervous system by the physical action we take. By learning to breathe more slowly and deeply we can calm down. And it's not just the speed of our breathing that is important but also how deeply we breathe. Fast shallow breathing reduces the level of Carbon Dioxide in the blood and can lead to further panic inducing symptoms. (This is why some people breathe into paper bags). By replacing the fast, shallow breathing of anxiety and panic with deep slow breathing, where we breathe from the diaphragm (the muscular wall separating the lungs from the stomach) we redress the oxygen-CO2 balance in the body and promote a feeling of calmness. Try diaphragmatic breathing:- • Take a deep breath in through your nose for a slow count of four (imagine the air filling your stomach, not lungs, and feel it expand) • Hold for a slow count of four • Breathe out through your mouth for a slow count of four (imagine your stomach pushing the air out) • Hold for a slow count of four • Repeat 3 or 4 times, no more How do you feel? With practice you can use this technique to calm down in those times you feel anxious or panicky where there is no real danger. A very important thing to realise about the above is that knowing what is happening and why dramatically increases the power of the technique. Just telling someone who is panicking to breathe more slowly and deeply doesn't have the same effect. With anxiety and panic we need to know what is happening and why to be able to take real control. By Terry Dixon B.Sc. All rights reserved. Any reproducing of this article must have the author name and all the links intact. Author: B.Sc. Biography: Founder of www.help-for.com and author of - EVOLVING SELF CONFIDENCE: How to Become Free from Anxiety Disorders and Depression ALSO VIEW OUR Articles (Total : 15)   Title Sort by Title A-Z Sort by Title Z-A A New Understanding of Anxiety Disorders and Depression? Anxiety (Disorders) and Control Anxiety Disorder Symptoms Anxiety Disorders and Survival Anxiety Disorders, Depression and Anger Anxiety Disorders: Nature versus Nurture. Do Parents Cause Emotional Problems? How to Calm Down How to Cure Anxiety Problems How to Overcome Anxiety Disorders Overcoming Anxiety and Fear The Awesome Power of Fear and Belief The Effect of the Media on Anxiety Disorders and Depression What Causes Physical Anxiety Symptoms? What is Anxiety? Contact Form Please use this form to contact Terry Dixon ** This form is intended for those with genuine enquiries/questions.   Name Company (if any) Comments Email Phone   To avoid misuse and spamming, please enter the verification code, shown below, to send your message. Thank you   if you can't read the image text to load another one. Enter Code   Disclaimer and Terms. This article is the opinion of the author. WorldwideHealth.com makes no claims regarding this information. WorldwideHealth.com recommends that all medical conditions should be treated by a physician competent in treating that particular condition. WorldwideHealth.com takes no responsibility for customers choosing to treat themselves. Your use of this information is at your own risk. Your use of this information is governed by WWH terms and conditions. left border Space right border space Home | Alternative Medicine | Directory | Health Article | Health Video | Daily Health News | Training Courses | Associations | Ecards | Members Link to Us | Health Related Web Links | Site Map | about us | Contact Us | Add Health Articles to Your Site Complementary Alternative Medicine, Natural Remedies, Alternative Health Articles Use of service subject to terms and conditions Copyright Worldwidehealth.com © 2003-2012
(********************************************************************) (* *) (* The LustreC compiler toolset / The LustreC Development Team *) (* Copyright 2012 - -- ONERA - CNRS - INPT *) (* *) (* LustreC is free software, distributed WITHOUT ANY WARRANTY *) (* under the terms of the GNU Lesser General Public License *) (* version 2.1. *) (* *) (********************************************************************) open Format (********************************************************************************************) (* Translation function *) (********************************************************************************************) (* USELESS let makefile_opt print basename dependencies makefile_fmt machines = (* If a main node is identified, generate a main target for it *) match !Options.main_node with | "" -> () | main_node -> ( match Machine_code.get_machine_opt main_node machines with | None -> Format.eprintf "Unable to find a main node named %s@.@?" main_node; () | Some _ -> print basename !Options.main_node dependencies makefile_fmt ) *) let gen_files funs basename prog machines dependencies = let destname = !Options.dest_dir ^ "/" ^ basename in let print_header, print_lib_c, print_main_c, print_makefile, print_cmake = funs in (* Generating H file *) let alloc_header_file = destname ^ "_alloc.h" in (* Could be changed *) let header_out = open_out alloc_header_file in let header_fmt = formatter_of_out_channel header_out in print_header header_fmt basename prog machines dependencies; close_out header_out; (* Generating Lib C file *) let source_lib_file = destname ^ ".c" in (* Could be changed *) let source_lib_out = open_out source_lib_file in let source_lib_fmt = formatter_of_out_channel source_lib_out in print_lib_c source_lib_fmt basename prog machines dependencies; close_out source_lib_out; (match !Options.main_node with | "" -> () (* No main node: we do not generate main *) | main_node -> ( match Machine_code.get_machine_opt main_node machines with | None -> begin Global.main_node := main_node; Format.eprintf "Code generation error: %a@." Corelang.pp_error LustreSpec.Main_not_found; raise (Corelang.Error (Location.dummy_loc, LustreSpec.Main_not_found)) end | Some m -> begin let source_main_file = destname ^ "_main.c" in (* Could be changed *) let source_main_out = open_out source_main_file in let source_main_fmt = formatter_of_out_channel source_main_out in (* Generating Main C file *) print_main_c source_main_fmt m basename prog machines dependencies; close_out source_main_out; end )); (* Makefiles: - for the moment two cases 1. Classical Makefile, only when provided with a main node May contain additional framac eacsl targets 2. Cmake : 2 files - lustrec-basename.cmake describing all variables - the main CMakeLists.txt activating the first file - Later option 1 should be removed *) (* Case 1 *) (match !Options.main_node with | "" -> () (* No main node: we do not generate main *) | main_node -> ( let makefile_file = destname ^ ".makefile" in (* Could be changed *) let makefile_out = open_out makefile_file in let makefile_fmt = formatter_of_out_channel makefile_out in (* Generating Makefile *) print_makefile basename main_node dependencies makefile_fmt; close_out makefile_out )); (* Case 2 *) let cmake_file = "lustrec-" ^ basename ^ ".cmake" in let cmake_file_full_path = !Options.dest_dir ^ "/" ^ cmake_file in let cmake_out = open_out cmake_file_full_path in let cmake_fmt = formatter_of_out_channel cmake_out in (* Generating Makefile *) print_cmake basename main_node dependencies makefile_fmt; close_out makefile_out let translate_to_c basename prog machines dependencies = match !Options.spec with | "no" -> begin let module HeaderMod = C_backend_header.EmptyMod in let module SourceMod = C_backend_src.EmptyMod in let module SourceMainMod = C_backend_main.EmptyMod in let module MakefileMod = C_backend_makefile.EmptyMod in let module Header = C_backend_header.Main (HeaderMod) in let module Source = C_backend_src.Main (SourceMod) in let module SourceMain = C_backend_main.Main (SourceMainMod) in let module Makefile = C_backend_makefile.Main (MakefileMod) in let module CMakefile = C_backend_cmake.Main (MakefileMod) in let funs = Header.print_alloc_header, Source.print_lib_c, SourceMain.print_main_c, Makefile.print_makefile, CMakefile.print_makefile in gen_files funs basename prog machines dependencies end | "acsl" -> begin let module HeaderMod = C_backend_header.EmptyMod in let module SourceMod = C_backend_src.EmptyMod in let module SourceMainMod = C_backend_main.EmptyMod in let module MakefileMod = C_backend_spec.MakefileMod in let module Header = C_backend_header.Main (HeaderMod) in let module Source = C_backend_src.Main (SourceMod) in let module SourceMain = C_backend_main.Main (SourceMainMod) in let module Makefile = C_backend_makefile.Main (MakefileMod) in let module CMakefile = C_backend_cmake.Main (MakefileMod) in let funs = Header.print_alloc_header, Source.print_lib_c, SourceMain.print_main_c, Makefile.print_makefile, CMakefile.print_makefile in gen_files funs basename prog machines dependencies end | "c" -> begin assert false (* not implemented yet *) end | _ -> assert false (* Local Variables: *) (* compile-command:"make -C ../../.." *) (* End: *)
Enkephalin An enkephalin is a pentapeptide involved in regulating nociception in the body. The enkephalins are termed endogenous ligands, as they are internally derived and bind to the body's opioid receptors. Discovered in 1975, two forms of enkephalin have been found, one containing leucine ("leu"), and the other containing methionine ("met"). Both are products of the proenkephalin gene.[2] Met-enkephalin 1plx model 1.png Met-enkephalin 3D structure, alpha-carbons shown as balls and labeled by residue.[1] Identifiers SymbolPENK NCBI gene5179 HGNC8831 OMIM131330 RefSeqNM_006211 UniProtP01210 Other data LocusChr. 8 q23-q24 Endogenous opioid peptidesEdit There are three well-characterized families of opioid peptides produced by the body: enkephalins, B-endorphin, and dynorphins. The met-enkephalin peptide sequence is coded for by the enkephalin gene; the leu-enkephalin peptide sequence is coded for by both the enkephalin gene and the dynorphin gene.[3] The proopiomelanocortin gene (POMC) also contains the met-enkephalin sequence on the N-terminus of beta-endorphin, but the endorphin peptide is not processed into enkephalin. Effects on stressEdit Enkephalin is also considered a neuropeptide, which in the human body performs as an important signaling molecule in the brain. Enkephalins are found in high concentration in the brain as well as in the cells of adrenal medulla. In response to pain, norepinephrine, a hormone that is activated in fight-or-flight response is released along with endorphins.[4] It has been shown that this polypeptide is linked to brain functioning during a stressful response, especially in the hippocampus and prefrontal cortex regions. During a stress response, several Met-enkephalin analogs had increased activity in the hippocampus, while Leu-enkephalin analogs as well as somatostatins were downregulated during stress. This observation leads to a conclusion that stressors impact neuropeptides, and that their action is localized to a specific brain region.[5] Enkephalin receptorEdit The receptors for enkephalin are the delta opioid receptors and mu opioid receptors. Opioid receptors are a group of G-protein-coupled receptors, with other opioids as ligands as well. The other endogenous opioids are dynorphins (that bind to kappa receptors), endorphins (mu receptors), endomorphins, and nociceptin/orphanin FQ. The opioid receptors are ~40% identical to somatostatin receptors (SSTRs).[citation needed] See alsoEdit ReferencesEdit 1. ^ PDB: 1plx​; Marcotte I, Separovic F, Auger M, Gagné SM (March 2004). "A multidimensional 1H NMR investigation of the conformation of methionine-enkephalin in fast-tumbling bicelles". Biophys. J. 86 (3): 1587–600. Bibcode:2004BpJ....86.1587M. doi:10.1016/S0006-3495(04)74226-5. PMC 1303993. PMID 14990485. 2. ^ Noda M, Teranishi Y, Takahashi H, Toyosato M, Notake M, Nakanishi S, Numa S (June 1982). "Isolation and structural organization of the human preproenkephalin gene". Nature. 297 (5865): 431–4. Bibcode:1982Natur.297..431N. doi:10.1038/297431a0. PMID 6281660. S2CID 4371340. 3. ^ Opioid peptides: Molecular pharmacology, biosynthesis and analysis, R.S. Rapaka and R. L. Hawks (editors) in a National Institute on Drug Abuse Research Monograph (#70), 1986. 4. ^ Pasternak GW. "Endorphins". AccessScience. doi:10.1036/1097-8542.232500. 5. ^ Henry MS, Gendron L, Tremblay ME, Drolet G (2017). "Enkephalins: Endogenous Analgesics with an Emerging Role in Stress Resilience". Neural Plasticity. 2017: 1546125. doi:10.1155/2017/1546125. PMC 5525068. PMID 28781901. External linksEdit
Haliotis tuberculata Also found in: Thesaurus, Wikipedia. Related to Haliotis tuberculata: ormer ThesaurusAntonymsRelated WordsSynonymsLegend: Noun1.Haliotis tuberculata - an abalone found near the Channel IslandsHaliotis tuberculata - an abalone found near the Channel Islands abalone, ear-shell - any of various large edible marine gastropods of the genus Haliotis having an ear-shaped shell with pearly interior References in periodicals archive ? First development of various vegetable-based diets and their suitability for abalone Haliotis tuberculata coccinea Reeve. 1) Partial hemocyanin gene exons 1-15 (H2) HmNS58D Haliotis tuberculata 3. The impacts of handling and air exposure on immune parameters, gene expression, and susceptibility to vibriosis of European abalone Haliotis tuberculata. Also, for Haliotis tuberculata coccinea obtained optimal growth rates with a mixture of red seaweeds, and this study give more emphasis in protein and carbohydrate components for obtain optimal growth (Fermin & Mae-Buen, 2002; Vieira et al. The development of Haliotis tuberculata with special reference to the organogenesis during torsion. Crofts' explanation [4, 5] of the mechanism initiating developmental rotation in the trochid gastropod Calliostoma zizyphinum, the abalone Haliotis tuberculata, and the patellid limpet Patella vulgata involved contraction of a larval retractor muscle and assumed that the larval shell on which the muscle is inserted is calcified or at least rigid. 1995a) found that two species of abalone, Haliotis tuberculata and Haliotis discus hannai, have a great capacity to use carbohydrates for energy and perhaps for other nutritional purposes. Studies by Crofts (1937, 1955) on muscle morphogenesis in Haliotis tuberculata and several other archaeogastropods have been particularly influential. Biological and ecological studies on the propagation of the ormer, Haliotis tuberculata (Linnaeus). The reported size of the fertilized egg for other Haliotis species was 230 [micro]m in Haliotis discus, 280 [micro]m in Haliotis sieboldii, 270 [micro]m in Haliotis gigantea (Ino 1952), 230 [micro]m in Haliotis iris (Harrison & Grant 1971), 200 [micro]m in Haliotis sorensini (Leighton 1972), and 205[micro]pm Haliotis tuberculata (Courtois de Vicose et al. The main farmed species are Haliotis discus hannai, Haliotis discus discus, Haliotis midae, Haliotis rufescens, Haliotis rubra, and Haliotis tuberculata.
Tip Hypervisor security planning: Guidelines Ramandeep Singh Walia & Varun Haran Hypervisor security is still theoretical in nature, since the preoccupation so far has been with securing the virtual machines (VMs) running on the hypervisor. With hypervisors being used extensively today from embedded consumer electronics to high-end data centers, Continue Reading This Article Enjoy this article as well as all of our content, including E-Guides, news, tips and more. the concerns surrounding hypervisor security are multiplying. The nature of a hypervisor’s function makes it a potential subject for attacks from multiple vectors. A hypervisor is a layer, so to speak, between the VMs and the physical infrastructure they operate on. The hypervisor, being a common connection, is a potential carrier of risks – both in terms of getting compromised and propagation of risk. With the emphasis being on securing the environment for tenant VMs, hypervisor security has been largely neglected. Risks associated with hypervisor An inherent problem of running a hypervisor is the lack of operational logs and audit trails, which are shallow as far as operations like hypercalls are concerned — making the enforcement of hypervisor security a painful task. This is one reason why enterprises do not find a hypervisor setup feasible for risk-intensive applications. Unlike physical architectures, performing essential proactive functions such as penetration testing and scanning is difficult in virtual environments. With the focus in this space being on performance, hypervisors aren’t always security hardened. Performance expectations from physical machines do not hold up when the same machine hosts multiple tenant systems, in terms of scalability. In addition, when speaking of hypervisor security, it is important to remember that vulnerabilities on a hypervisor, which is based on the open server architecture, can potentially be exploited like any code flaw on other platforms. Planning for hypervisor security The following tips will help you frame an effective hypervisor security policy for your organization: Hypercall vulnerabilities and privilege escalation: Exploitation of hypercall vulnerabilities involves using methods such as buffer overflows to exploit system calls made by VMs to the hypervisor. To prevent this, VMs should run on a hardened hypervisor. While this does not directly address hypercall vulnerabilities, this can prevent compromise of VMs, which can lead to a privilege escalation issue — giving attackers privileged access to the hypervisor. The steps leading to such a scenario are largely product dependent; nevertheless, VM patching is a must. Add-ons like host-based antivirus systems are not recommended for hypervisor security, since this can adversely affect performance. Instead, a network threat management system is more suitable. Segregation of duties: This is an important compliance requirement in most mature information technology (IT) setups. With issues of privilege escalation among users rising, it is essential that domains of operation be defined when planning for hypervisor security. Legitimate access to the hypervisor should be the domain of the VMware administrator. This can protect against any intentional or unintentional mis-configuration of the hypervisor/VMs. An absence of such a division of labor can lead to situations where conflicting instruction/polices are issued to the system or situation where VMs get dropped from the scope of policies by mistake, leaving them wide open to attack. For a more detailed exposition on segregation, see here. Performance calibration and need for planning: There is a need for performance validation when planning for hypervisor security, as unsuitable allocation of resources for process layers like network anti-viruses and firewalls can lead to faltering of the entire virtualized setup. For example, when planning VM capacity for a machine with eight physical cores, the assumption that all cores will be available for use in tandem with the security layers can spell trouble. Allocating a single core exclusively for security however, can free up seven cores for other purposes, while ensuring smooth functioning of the security layer. The same principle applies to memory. Dealing with system clusters: Clustering of physical machines in virtual setups leads to greater complexity, while multiplying risks manifold. In the case of multiple physical machines running a virtual environment under a single hypervisor, any oversight can have serious consequences in terms of vulnerability and availability. Considered security solutions should be validated for compatibility with the underlying clustering technology to put effective hypervisor security controls in place. About the author: Ramandeep Singh Walia is the head of system engineering - Indian subcontinent at Check Point Software Technologies. This was first published in May 2011 Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.
Export (0) Print Expand All Expand Minimize Ytd (MDX) Returns a set of sibling members from the same level as a given member, starting with the first sibling and ending with the given member, as constrained by the Year level in the Time dimension. Ytd( [ Member_Expression ] ) Member_Expression A valid Multidimensional Expressions (MDX) expression that returns a member. If a member expression is not specified, the default is the current member of the dimension of type Time (Time.CurrentMember). The Ytd function is a shortcut function for the PeriodsToDate function where the level is set Year. That is, Ytd(Member_Expression) is equivalent to PeriodsToDate(Year,Member_Expression). Example The following example returns the sum of the Measures.[Order Quantity] member, aggregated over the first eight months of calendar year 2003 that are contained in the Date dimension, from the Adventure Works cube. WITH MEMBER [Date].[Calendar].[First8MonthsCY2003] AS Aggregate( YTD([Date].[Calendar].[Month].[August 2003]) ) SELECT [Date].[Calendar].[First8MonthsCY2003] ON COLUMNS, [Product].[Category].Children ON ROWS FROM [Adventure Works] WHERE [Measures].[Order Quantity] Ytd is frequently used in combination with the CurrentMember (MDX) function to display a running cumulative year-to-date total in a report, as shown in the following query: WITH MEMBER MEASURES.YTDDEMO AS AGGREGATE(YTD(), [Measures].[Internet Sales Amount]) SELECT {[Measures].[Internet Sales Amount], MEASURES.YTDDEMO} ON 0, [Date].[Calendar].MEMBERS ON 1 FROM [Adventure Works] Was this page helpful? (1500 characters remaining) Thank you for your feedback Community Additions ADD Show: © 2015 Microsoft
Majority of people who begin to have chest pain immediately seek medical consultation for fear of having a cardiac condition but in actuality more often than not stress and anxiety comes out to be the cause of the chest pain when all other parameters for a cardiac related chest pain have been evaluated and come back negative. An anginal chest pain is usually dull squeezing type pain in the chest with a burning sensation beneath the breastbone whereas chest pain due to stress is more sharper. Chest pain may also be caused due to anxiety and stress but it is always advisable that if an individual is suffering from chest pain then he or she gets a thorough evaluation to rule out cardiac factors causing the symptoms. Causes Of Chest Pain Due To Stress Causes Of Chest Pain Due To Stress When an individual is under extreme amount of stress and has an anxiety attack then the heart rate, respirations, blood pressure, and oxygen consumption increase all of a sudden. When this happens, the muscles become tense and the blood flow is immediately diverted to vital areas which results in dilation of certain blood vessels and constriction of other vessels causing pain in the chest. If an individual undergoes extreme emotional trauma or excitement, breathing from the upper part of the chest becomes rapid and poor exchange of carbon dioxide in the lower part of the lungs further reduces the amount of oxygen which reaches the heart thus resulting in anginal pain. Although it may be very scary but chest pain due to stress and anxiety is basically harmless and does not cause any damage to the heart muscles but it definitely heightens the anxiety of the individual since it gives a feeling as if the individual is having a heart attack and the symptoms may in turn worsen. In some instances this pain tends to come and go frequently and may occur without any prior warning. Why Is It Important To Understand The Symptoms Of Stress Causing Chest Pain? It is extremely important to understand the symptoms of stress and anxiety as it then helps in controlling the symptoms in a much better way. The most important feature of a stress response is the effect it has on the cardiovascular system of the body. If an individual is continuously overwhelmed then the brain picks it up and signals an alert. The most serious issue about stress is that it can easily infiltrate the life of an individual and without him or her realizing it can make the individual virtually disabled due to the symptoms. Thus it is always important to have a positive attitude towards life and to take pressure as it comes which strengthens the physical and mental health of an individual. Remedies To Get Rid Chest Pain Due To Stress The best way to cope up with chest pain due to stress is to manage stress in life in a better way, which is by regular exercise, getting adequate sleep, and maintaining a healthy lifestyle. If an individual starts enjoying whatever he or she does then it also helps in reducing overall stress and thus keeps the symptoms at bay. Other methods of keeping stress under control are by practicing relaxation techniques like deep breathing exercises, biofeedback, or yoga. There are also medications available which helps in relaxing the mind and help reduce stress and anxiety. For this, the individual needs to consult with a psychiatrist who can formulate a detailed medication program. All in all, the best way to cope up with stress is to stay relaxed come what may. Some of the natural remedies to reduce stress and anxiety causing chest pain are: Use of Passionflower: Passionflower is a herb which has been for a long time considered extremely beneficial for anxiety and relieving stress. Some studies have shown that it can be even compared to benzodiazepines when it comes to its effectiveness. Although it is not proved but it is believed that it works by increasing GABA levels in the brain which tends to relax the individual. Passionflower is available in numerous forms like tea, liquid extracts, and tinctures and can be easily incorporated in the diet but it is not recommended for children, pregnant females, and females who are breastfeeding. It is advisable to contact the physician before incorporating Passionflower into the diet. Massage: Massage has been known to relieve stress for a long time. Massage tends to relax the muscles which get tensed due to stress and thus control pain and improve circulation which relaxes the mind significantly. Meditation: This is also one of the ancient forms of relaxation. Practicing meditation about half an hour a day can do wonders for an individual in relaxing the mind. It helps a great deal in throwing negative thoughts out of the mind and thus helps in relaxation. Exercise: This is by far the best way to relieve stress, bet it by doing yoga, Tai Chi, or even running, exercise helps a great deal in relaxing the mind and reliving stress and anxiety. When an individual exercises, it releases endorphins into the brain which goes a long way in improving the mood of an individual. Better Organization: If an individual is better organized in life then there remains little room for stress. If an individual does a lot of running around at work then keeping a note of things to do helps a great deal. Healthy Lifestyle: It is imperative to maintain a healthy eating habit and staying away from junk food, excessive caffeine use, alcohol, and smoking. Try and eat a healthy diet to include whole grains and protein which goes a long way in improving mood and relieve stress. Some of the foods which are helpful for reducing stress are blueberries, salmon, and almonds. Sleep: If an individual is able to get a good night’s sleep then it is more than enough to reduce stress as if an individual gets very little sleep it tends to make that individual sluggish and depressed. It is important to have a good sleep-wake schedule and going to bed on time and getting up on time. Also Read: Written, Edited or Reviewed By: , MD, FFARCSI Last Modified On: July 14, 2015 Pain Assist Inc. Pramod Kerkar   Note: Information provided is not a substitute for physician, hospital or any form of medical care. Examination and Investigation is necessary for correct diagnosis. Symptom Checker Hair Care Irritable Bowel Syndrome Weight Loss Acne Health Slideshow: Home Remedies, Exercises, Diet and Nutrition Find Pain Physician Subscribe to Free ePainAssist Newsletters By clicking Submit, I agree to the ePainAssist Terms & Conditions & Privacy Policy and understand that I may opt out of ePainAssist subscriptions at any time. Copyright © 2017 ePainAssist, All rights reserved. DMCA.com Protection Status
亚洲性感图片 歡迎來濟南壹諾包裝有限公司網站!在線留言 • 全國電話服務熱線:400-801-0899 當前位置:亚洲性感图片 > 新聞中心 > 常見問題 > 一次性紙餐盒的檢驗規則 來源:www.cfldigest.com 發布時間:2023-04-25 瀏覽次數:122 一次性紙餐盒是指制作所述紙飯盒所用的材料為紙材料的餐盒,一般為一次性紙飯盒,其使用方便,成本低廉,已廣泛運用于餐飲行業中。由于采用紙材料制作,因而既可以回收使用,又可以通過掩埋或燃燒等方式處理,而不致于造成嚴重的環境污染,具有較高的環保價值。那么一次性紙餐盒的檢驗規則包含什么呢? A disposable paper lunch box refers to a lunch box made of paper material, which is generally a disposable paper lunch box. It is easy to use and has low cost, and has been widely used in the catering industry. Due to the use of paper materials, it can be recycled and treated through burial or combustion, without causing serious environmental pollution, and has high environmental value. So what are the inspection rules for disposable paper lunch boxes? 以一次交貨為一批,餐盒紙板的樣本單位為令或卷,紙餐盒的樣本單位為個。 Each delivery is considered as a batch, with the sample unit of cardboard for meal boxes being in rolls or rolls, and the sample unit of paper lunch boxes being in pieces. 供方應保證所供應的餐盒紙板或紙餐盒符合本標準的要求,每卷筒(令、箱)應附質量合格證一份。 The supplier shall ensure that the cardboard or paper lunch boxes supplied comply with the requirements of this standard, and each drum (bundle, box) shall be accompanied by a quality certificate. 交收檢驗項目為相關的規定,并按GB/T2828進行。交收檢驗抽樣方案、檢查水平、合格質量水(AQL)及批質量判定按表5的規定,試樣的采取應按GB/T450進行。 The delivery inspection items are relevant regulations and shall be carried out in accordance with GB/T2828. The sampling plan, inspection level, qualified quality water (AQL), and batch quality judgment for delivery inspection shall be in accordance with Table 5, and the sampling of samples shall be carried out in accordance with GB/T450. 供方應保證所提供的產品符合衛生指標的要求,投產前該產品應進行一次毒理檢驗,毒理檢驗結果符合GB15193.1要求的方可投產。在工藝條件、原材物料穩定的連續生產的條件下,每三個月應進行一次衛生指標的測定。若工藝條件或其它條件有變動時,應隨即進行測定。 The supplier should ensure that the products provided meet the requirements of hygiene indicators. Before production, the product should undergo a toxicological test. Only those whose toxicological test results meet the requirements of GB15193.1 can be put into production. Under the conditions of stable continuous production of process conditions and raw materials, hygiene indicators should be measured every three months. If there are changes in process or other conditions, the measurement should be carried out immediately. 需方有權按本標準的規定進行驗收,如對批質量有異議,應在到貨后三個月內通知供方共同復驗。如不符合本標準的要求,應判批不合格,由供方負責處理;若符合本標準要求,則由需方負責處理。 The purchaser has the right to conduct acceptance according to the provisions of this standard. If there are any objections to the batch quality, they shall notify the supplier to jointly retest within three months after arrival. If it does not meet the requirements of this standard, it shall be judged as unqualified and handled by the supplier; If it meets the requirements of this standard, the purchaser is responsible for handling it. 紙餐盒使用性能的測定方法: Method for measuring the performance of paper lunch boxes: 容積測定 Volume measurement 在常溫下用1000mL的量筒,量取相應體積的水倒入紙餐盒中,大號餐盒600mL、中號餐盒500mL、小號餐盒400mL,目測應無水溢出即為合格。 At room temperature, use a 1000mL measuring cylinder to measure the corresponding volume of water and pour it into a paper lunch box. The large lunch box should have 600mL, the medium lunch box should have 500mL, and the small lunch box should have 400mL. If there is no water overflow, it is considered qualified. 耐水試驗 Water resistance test 將紙餐盒平放在紙板(或漿板)上,倒入溫度(90±5)℃、濃度約5%的NaCl水,再加甲基紅指示液1~2滴,高度不應低于20mm。1h后將水倒出,觀察背面、兩側是否有滲漏痕跡,若沒有發現滲漏痕跡即為合格,反之判為不合格。 Place the paper lunch box flat on the cardboard (or pulp board), pour in NaCl water with a temperature of (90 ± 5) ℃ and a concentration of about 5%, and then add 1-2 drops of methyl red indicator solution. The height should not be less than 20mm. After 1 hour, pour out the water and observe if there are any signs of leakage on the back and both sides. If no signs of leakage are found, it is considered qualified, otherwise it is deemed unqualified. 耐油試驗 Oil resistance test 將(150±10)℃的食用油(花生油、豆油),用瓷匙加(10±2)mL于紙餐盒中,再將紙餐盒放在一張餐巾紙上。1h后觀察餐巾紙上是否有油點,如無油點則為合格,反之為不合格。 Add (10 ± 2) mL of edible oil (peanut oil, soybean oil) at (150 ± 10) ℃ to a paper lunch box with a porcelain spoon, and then place the paper lunch box on a napkin. After 1 hour, observe if there are oil spots on the napkin. If there are no oil spots, it is considered qualified, and vice versa, it is considered unqualified. 一次性紙餐盒 負重性能試驗 Load bearing performance test 將紙餐盒平放在平板上蓋好盒蓋,用金屬尺測量紙餐盒的高度(連蓋),精確至1mm。然后倒入漿砂混合物。蓋好盒蓋后,在上面放一塊200mm′200mm′3mm的平板玻璃。再將3kg砝碼置于平板玻璃中央,負重15s時立即取下砝碼及玻璃板,再精確測量上述高度。用下式計算試樣的負重性能值: Place the paper lunch box flat on a flat plate and cover the lid. Use a metal ruler to measure the height of the paper lunch box (with the lid connected) to the nearest 1mm. Then pour in the slurry sand mixture. After covering the box lid, place a 200mm '200mm' 3mm flat glass on top. Place a 3kg weight in the center of the flat glass, and immediately remove the weight and glass plate when the load is 15 seconds, and then accurately measure the above height. Calculate the load-bearing performance value of the sample using the following equation: 注:對于各種型號紙餐盒所用的漿砂混合物具體如下: Note: For various types of paper lunch boxes, the specific slurry and sand mixtures used are as follows: 大號餐盒(600mL):250mL水、50g紙漿及200g砂子; Large lunch box (600mL): 250mL of water, 50g of pulp, and 200g of sand; 中號餐盒(500mL):200mL水、40g紙漿及160g砂子; Medium size lunch box (500mL): 200mL of water, 40g of pulp, and 160g of sand; 小號餐盒(400mL):150mL水、30g紙漿及120g砂子。 Small lunch box (400mL): 150mL of water, 30g of pulp, and 120g of sand. A5盒蓋折次試驗 A5 box cover folding test 將試樣盒蓋連續180°角開合15次,觀察與盒體連結處應無裂口、開裂。 Open and close the sample box cover at a continuous 180 ° angle for 15 times, and observe that there should be no cracks or cracks at the connection with the box body. 一次性紙餐盒的檢驗規則相關內容就講解到這里了,希望能夠給您有效的幫助,更多事項就來我們網站http://www.cfldigest.com咨詢! That's all for the inspection rules of disposable paper lunch boxes. We hope they can provide you with effective assistance. For more information, please visit our website http://www.cfldigest.com consulting service 四色影院 好看的番号中文字幕 伊人大杳蕉中文在线20 四色影视   业务搞人妻 亚洲性感图片
How to Bypass Airbag With Resistor Airbags are an essential part of a car’s safety system, which can save lives in the case of an accident. However, sometimes, you may need to disable or bypass an airbag temporarily, such as when working on the steering wheel or dashboard. One way to bypass an airbag is by installing a resistor of the same ohm rating as the airbag sensor. A resistor is an electrical component that resists or limits the flow of current in a circuit. By placing the resistor in place of the airbag sensor, you can trick the system into thinking the airbag is still present, and the warning light will turn off. However, note that bypassing an airbag can be dangerous, and you should only attempt it if you have the technical expertise and follow all safety precautions. How to Bypass Airbag With Resistor: A Step-by-Step Guide Credit: www.fastcar.co.uk The Importance Of Airbags In Vehicles Airbags are essential safety features in vehicles that save thousands of lives each year. They are designed to inflate rapidly and protect occupants during a collision. There are several types of airbags, including front, side, and curtain airbags, each with specific functions. Attempting to bypass or disable airbags without proper knowledge and equipment can result in severe injuries or even death. Tampering with airbags can also affect the integrity of the vehicle’s safety system, resulting in a high risk of accidents. Safety should always be a top priority, and it is crucial to leave any airbag-related repairs or modifications to trained professionals only. Steps To Safely Bypass Airbags With Resistors To safely bypass airbags with resistors, you’ll need a few key tools and equipment. Once you’ve gathered everything you need, the step-by-step procedure is straightforward. However, it’s crucial to take all necessary safety precautions while performing the bypass. Resistors should have a resistance of 2. 2 ohms or higher to be effective. Begin by disconnecting the negative battery cable and finding the airbag wires. Splice the resistor into the wire harness, reconnect the negative battery cable, and test the system before driving. Following these steps will allow you to bypass the airbag safely, but ensure that you take all necessary safety measures throughout the procedure. Reasons For Bypassing Airbags And When It Is Necessary Airbags are a crucial safety feature in cars, but there are situations when disabling them becomes necessary. If a person has a medical condition or is too short to trigger the airbag, they need to bypass the system. Similarly, if the car is used for off-roading purposes, driving on rough terrains could unnecessarily trigger the airbag. However, it is crucial to identify the right situations and reasons for bypassing airbags, as doing it improperly can lead to severe consequences. Without proper guidance, bypassing the airbag with a resistor can cause the srs warning light to stay on, which could lead to more significant issues in the long run. It is better to seek a professional and ensure proper installation to avoid any accidents or problems. Mechanic Life Hack | Airbag Diagnostics with a Dummy Resistor #shorts Frequently Asked Questions For How To Bypass Airbag With Resistor What Is The Purpose Of Bypassing An Airbag With A Resistor? A resistor is used to bypass the airbag system and disable it. This is done to prevent the airbag from deploying in case of an accident. What Are The Risks Of Bypassing An Airbag With A Resistor? Bypassing an airbag with a resistor can be dangerous as it can affect the proper functioning of the airbag system. In case of an accident, the airbag might not deploy, resulting in serious injuries or even death. How Do I Install A Resistor To Bypass An Airbag? To install a resistor to bypass an airbag, you need to follow the instructions provided in the user manual of your car. It is recommended to have a professional technician install the resistor to avoid any possible damage to the car or injury to yourself. Conclusion After reading this blog post, you should understand the importance of bypassing your vehicle’s airbag system correctly and safely. It’s crucial to never try to tamper with a functional airbag system without fully understanding the risks involved. However, if you have a valid reason for disabling your airbag, using a resistor is a simple and effective solution. Just be sure to follow the steps carefully and purchase the correct resistor for your vehicle’s make and model. When it comes to vehicle safety, it’s always better to be safe than sorry. Remember to prioritize your safety and the safety of your passengers by consulting with a professional mechanic or technician before attempting any diy modifications on your vehicle.
Applied Mathematics and Statistics at Atlas Jump To Main Content Jump Over Banner Home Jump Over Left Menu Large Scale Prospective Medical Surveys Richard Peto and M.C. Pike 1971 Introduction Lung cancer is much commoner among cigarette smokers; deep vein thrombosis and pulmonary embolism (serious blood clot) is commoner among women who use the pill; cirrhosis of the liver is commoner among heavy drinkers. Work as well as pleasure can be harmful: nuns have an increased risk of breast cancer, lung cancer is commoner in certain occupational groups in gasworks and bladder cancer is commoner among persons whose job involves exposure to certain chemicals (benzidine and β-naphthylamine). These discoveries, and others like them, while not necessarily of immediate practical use, can make a substantial contribution to controlling these diseases. The establishment of an association between a certain factor and a certain disease does not prove that that factor causes that disease, but it may lead to research that will. For example, the observed association between cigarette smoking and lung cancer led to work that showed that certain cigarette smoke extracts are highly carcinogenic (cancer producing) for laboratory animals. This is an important part of the evidence that cigarette smoking is a direct cause of lung cancer, rather than, as Eysenck (1965) had suggested simply being commoner in the 'type' of person who develops lung cancer. On the other hand, an observed association between a factor and a disease may not be because the factor causes the disease but rather because both are related to some other factor. For example, a negative association has been established between oral contraceptives and peptic ulcer. This, however, did not show that the pill protected women from peptic ulcers but rather that women with peptic ulcers had less sexual activity and hence less need for the pill. Care is clearly needed. Case-control surveys Once a possibly important association between a certain factor and a certain disease is suspected, we will wish to determine its correctness especially after allowing for the possible association of both the factor and the disease with nuisance variables such as age or sex. A quick way of doing this is often to do a retrospective (or case-control) study. If the factor causes the disease, then the factor is more likely to be found in persons with the disease than in persons without the disease. Thus, we take a group of patients with the disease (cases) and for each case we choose another person or persons (controls) without the disease who is identical in all 'relevant' respects (e.g. age, sex, marital status, social class) to the case; if the factor is significantly more frequent among the cases than among the controls, this is evidence that it is possibly involved in the aetiology of the disease and that the association warrants further research. This case-control method is an extremely powerful tool once the art of selecting proper controls is mastered, and it provides fairly rapid answers to a set and strictly limited question. For example, soon after the introduction of oral contraceptives, reports of women who had suffered a deep vein thrombosis or pulmonary embolism while on the pill began to appear. This disease is, however, also known to occur in women who do not use oral contraceptives and so this did not provide really valid evidence of association. These reports did pose a set and limited question, however, and a number of retrospective studies were set up to answer it. In particular our colleagues Doll and Vessey (then at the Medical Research Council's Statistical Research Unit) investigated married women aged 16-40 years admitted to 19 large hospitals during 1964-1967 with deep vein thrombosis or pulmonary embolism without evident predisposing cause. The results of this study (see Table) suggest that the risk of these diseases is substantially increased by the use of the pill (Vessey and Doll, 1969). Similarly (and historically earlier), the association was established by this case-control method between the smoking of tobacco, especially cigarettes, and lung cancer (Doll and Hill, 1952). Table Deep vein thrombosis or pulmonary embolism (Vessey and Doll, 1969) - each patient was matched with 2 controls. Diagnostic Group Oral Contraceptives Used Not used Total Thromboembolism 42(50%) 42(50%) 84(100%) Control 23(14%) 145(86%) 168(100%) Prospective surveys The much more general questions: What is the effect of oral contraceptives on morbidity from all diseases? and What is the effect of smoking on mortality from all causes? cannot, however, be answered by this approach. We need instead to do prospective studies, that is, find out for a large number of persons whether or not they use the factor under study, and then keep them under surveillance for some time to see what happens to them. These require far more time, subjects, money and effort than case-control studies and are not entered into lightly. Three such studies are being conducted in our department at present. (1) The Medical Research Council is sponsoring a study in which it is intended to follow for up to 10 years 15,000-20,000 women attending Family Planning Association clinics who are using a variety of methods of birth control. This will permit us to obtain a balanced view of both the good and the bad effects of the various methods of contraception. This study was begun on a pilot basis in May 1968, and to date it has recruited over 12,000 women. In addition to asking about contraceptive practices, much general information and a full medical history is recorded on each woman on entry to the study. Subsequently, morbidity (illness) is measured by noting all hospital attendances. The results of cervical smears, and the outcome of each pregnancy (planned or unplanned) are also recorded, as are any changes in contraceptive practice. All this information is stored on magnetic tape at ATLAS. The tapes are updated monthly and analysed using our SIGMA 2 link. So far, only 2 new conditions have been found to be associated strongly enough with contraceptive practice to merit further study (one for the pill and one against). However, as the study progresses many more will probably come to light. Analysis of these will be complicated by the major differences that exist between women who choose different contraceptive methods: women using 'the pill' smoke about twice as much as do women who are using other methods, and women with previous histories of blood-clotting disorders are very likely to avoid using the pill. Although we will be able to make allowance for many of these, we will probably eventually generate several questions which will have to be answered by special case-control studies. (2) In 1951 a questionnaire was sent by Doll and Hill to all doctors in the United Kingdom asking about their smoking habits. Their answers allowed us to classify nearly 35,000 male doctors according to age, type and amount of tobacco smoked, and whether they were currently smoking or had given up. The survivors amongst these men were questioned again about their smoking habits in 1957 and 1966; and we are soon to send out a final questionnaire, bringing our follow-up to 20 years. Information about the date and cause of death of the doctors who die is notified to us by the Registrars General of the United Kingdom, the General Medical Council and the British Medical Association (this is one of the reasons for choosing doctors as the study population). Our follow-up at the time of the third questionnaire showed that as of 1 November 1965 (14 years after the study began) we know for all but 21 of the 34,445 men (0.06%) whether they were alive or dead, and if they had died their date and cause of death. The replies to the questionnaire (age, smoking and inhaling type, change of habits, date of starting smoking, date of stopping smoking, date and cause of death) have all been coded and are on magnetic tape at ATLAS. Updating of the data on deaths is done on a regular basis (so far nearly 10,000 men have died). This prospective study has allowed us to investigate the relationship between smoking and all diseases. Some of the main findings are: 1. The death rate from all causes amongst cigarette smokers smoking 25 or more cigarettes a day is more than 60% greater than among non-smokers, with a fairly steady increase of rate with amount smoked (doctors smoking 1-14 cigarettes per day had a 25% excess). This excess is more marked at younger ages so that the risk of dying in the years from age 45 to 55 (given that one is alive at age 45) is 1 in 27 for a non-smoker and this increases steadily to 1 in 10 for a smoker of 25 or more cigarettes per day. 2. When cigarette smokers stop smoking the difference between their death rate and that of non-smokers decreases steadily. This effect is found at all ages. 3. Smoking is related not only to lung cancer but also to coronary disease, chronic bronchitis, upper respiratory cancers, peptic ulcer and possibly some other diseases. (For an up-to-date report, see Royal College of Physicians, 1971.) (3) Persons with chronic bronchitis suffer from persistent phlegm, recurrent infections and airways obstruction. These appear together so uniformly that it is difficult to decide which causes which, and it is probably important to know this for effective interference with the disease process. Ten years ago it was supposed that irritation from cigarettes and air pollution (both causes of chronic bronchitis) produced extra phlegm, that this was a good environment for infections to flourish in, and that just as an infected wound can leave a scar, so these infections scarred and obstructed the fine airways of the lung. One way to investigate this proposition is to measure rates of change of lung obstruction and relate them to current levels of phlegm, infection and obstruction. A prospective study doing this was started in 1961. Over 1,000 London working men have had these variables regularly measured twice a year over a 7-year period. The complete data are on magnetic tape at ATLAS and preliminary analysis has revealed that this postulated causal chain is entirely wrong. Infection docs no permanent damage, but merely flourishes when permanent damage has occurred. New ideas arc now required. The study was under way just after the Clean Air Act began to be enforced in London; the production of chronic phlegm of the men in the study changed dramatically - they stopped getting worse (what was expected) and actually began to improve. Large scale prospective studies of the type illustrated here have been made much more manageable by the availability of fast computers with a reliable large backing store, and it has been possible to analyse the results in a much more detailed and useful way. Analyses involving the interaction of many variables can be done and, in particular, the effect of stopping smoking has now been clarified. These studies have been greatly aided by being able to make use of the really excellent ATLAS program advisory group and from the kind help (in particular from D. G. House) in times of urgency, in gaining ready access to ATLAS. References 1. Doll, R., and Hill, A. B. (1952). A study of the aetiology of carcinoma of the lung, British Medical Journal, 2, 1271. 2. Eysenck, H. J. (1965). Smoking, Health and Personality, London: Weidenfeld and Nicolson. 3. Vessey, M. P., and Doll, R. (1969). Investigation of relation between use of oral contraceptives and thromboembolic disease: a further report, British Medical Journal, 2, 651. 4. Royal College of Physicians (1971). Smoking and Health Now, London: Pitman.
Saury Saury Taxobox name = Saury image_width = 240px image_caption = "Scomberesox saurus" regnum = Animalia phylum = Chordata classis = Actinopterygii ordo = Beloniformes familia = Scomberesocidae subdivision_ranks = Genera subdivision = See text for genera and species. Sauries are fish of the family Scomberesocidae. There are two genera, each containing two species. Sauries are marine epipelagic fish which live in tropical and temperate waters. These fish often jump while swimming near the surface, skimming the water. The jaws of sauries are beak-like, ranging from long, slender beaks to relatively short ones with lower jaw only slightly elongated. The mouth openings of sauries, however, are relatively small and the jaws are weakly toothed. A row of small finlets behind the dorsal and anal fins is also a feature of sauries. An unusual feature of these fish is that they lack swim bladders. Sauries grow to a maximum length of about 46 cm. They are harvested commercially as a food fish. Sauries first appear in the fossil record in the upper Tertiary, Miocene. The name Scomberesocidae is derived from the Greek, skombros = tunny/mackerel, and esox = nursery of salmon. Pacific saury are consumed often in Japanese and Korean cuisine. The fish is usually grilled. pecies * Genus "Cololabis" ** "Cololabis adocetus" ** "Cololabis saira" (Pacific saury) * Genus "Scomberesox" (sauries and skippers) ** "Scomberesox simulans" (Dwarf saury) ** "Scomberesox saurus" (Atlantic saury) Trivia The "Saury", a "Sargo"-class submarine, was the only ship of the United States Navy to be named for this fish. ee also *Beloniformes *Gallery of beloniform fishes References * Wikimedia Foundation. 2010. Игры ⚽ Поможем написать реферат Look at other dictionaries: • Saury — Sau ry, n.; pl. {Sauries}. [Etymol. uncertain.] (Zo[ o]l.) A slender marine fish ({Scomberesox saurus}) of Europe and America. It has long, thin, beaklike jaws. Called also {billfish}, {gowdnook}, {gawnook}, {skipper}, {skipjack}, {skopster},… …   The Collaborative International Dictionary of English • Saury — Vraisemblablement un surnom formé sur l ancien adjectif saur , qui signifie châtain (vient du latin tardif saurus , avec le même sens). Le nom est surtout porté dans l Aude, et il a dû être employé comme nom de personne (les formes Saurus et… …   Noms de famille • saury — [sôr′ē] n. pl. sauries [prob. < ModL saurus, fish < Gr sauros, horse mackerel, lizard] any of a family (Scomberesocidae, order Atheriniformes) of small, marine bony fishes that live near the surface of temperate seas, with a long slender… …   English World dictionary • Saury — Maxim Saury (* 27. Februar 1928 in Enghien les Bains, Val d Oise) ist ein französischer Klarinettist, Arrangeur und Bandleader des Dixieland Jazz. Maxim Saury begann 1949 traditionellen Jazz zu spielen, begleitete 1951 Sidney Bechet und trat in… …   Deutsch Wikipedia • saury — /sawr ee/, n., pl. sauries. 1. a sharp snouted fish, Scomberesox saurus, inhabiting temperate regions of the Atlantic Ocean. 2. any of various related fishes. [1765 75; < NL saur(us) + Y2. See SAUREL] * * * ▪ fish       any of four species of… …   Universalium • saury — /ˈsɔri/ (say sawree) noun (plural saury or sauries) 1. a sharp snouted fish, Scomberesox saurus, of the Atlantic. 2. any of various related fishes, especially the Pacific saury, Cololabis saira. {apparently from Greek sauros sea fish (Aristotle)… …   • saury yellow-banded grinner — gelsvadryžė driežagalvė statusas T sritis zoologija | vardynas taksono rangas rūšis atitikmenys: lot. Saurida tumbil angl. dogstick; greater lizardfish; saury yellow banded grinner rus. рыба ящерица; тумбиль ryšiai: platesnis terminas –… …   Žuvų pavadinimų žodynas • saury — noun (plural sauries) Etymology: New Latin saurus lizard Date: circa 1771 a widely distributed fish (Scombresox saurus) of temperate waters of the Atlantic that resembles the related needlefishes; also a similar widely distributed fish (C. saira) …   New Collegiate Dictionary • saury — noun A marine epipelagic fish of the family Scomberesocidae, with beaklike jaws and a row of small finlets behind the dorsal and anal fins …   Wiktionary • saury — n. small marine fish …   English contemporary dictionary Share the article and excerpts Direct link Do a right-click on the link above and select “Copy Link”
Search Images Maps Play YouTube News Gmail Drive More » Sign in Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader. Patents 1. Advanced Patent Search Publication numberUS5251634 A Publication typeGrant Application numberUS 07/695,543 Publication dateOct 12, 1993 Filing dateMay 3, 1991 Priority dateMay 3, 1991 Fee statusPaid Also published asUS5351394 Publication number07695543, 695543, US 5251634 A, US 5251634A, US-A-5251634, US5251634 A, US5251634A InventorsSteven L. Weinberg Original AssigneeCyberonics, Inc. Export CitationBiBTeX, EndNote, RefMan External Links: USPTO, USPTO Assignment, Espacenet Helical nerve electrode US 5251634 A Abstract A nerve electrode array includes one or more spiral electrically conductive filament bands each secured within a different electrically insulative loop among a plurality of loops configured in a helical array. Each loop is severed lengthwise of the array to allow it to be spread open independently of the other loops to partly encircle the nerve during surgical mounting thereon. The array is held together in the helical configuration by a linking member which intersects with and is fastened to each of the spaced-apart loops. Each filament band extends within its loop across the intersection of the loop and linking member. In one embodiment, the cuts through the loops are aligned lengthwise of the helical array and substantially parallel to the linking member, and each cut is approximately diametrically opposite the linking member. In another embodiment, the cuts through the loops are staggered relative to the linking member, lengthwise of the array. With the electrode array mounted on the nerve, the filament bands are positioned to electrically interact with the nerve to detect signals carried by the nerve and/or to electrically stimulate the nerve. Images(2) Previous page Next page Claims(14) What is claimed is: 1. A nerve electrode array comprising: an electrically conductive filament, an electrically insulative carrier having a plurality of loops in a helical array, at least one of said loops encompassing said filament, and connecting means securing said plurality of loops together to substantially maintain the helical array configuration thereof, each of said loops having a cut therethrough away from said connecting means to allow each loop to be opened independently of the other loops of the array, the cuts in said loops being staggered relative to one another lengthwise of said array. 2. The invention of claim 1, further including electrically conductive lead means electrically connected to said filament for transmitting electrical signals to or from a nerve. 3. The invention of claim 1, wherein said helical array has a longitudinal axis, and said connecting means forms a lengthwise backbone of said helical array aligned substantially parallel to said axis. 4. The invention of claim 3, wherein said backbone intersects said at least one loop, and said filament extends across said backbone at the intersection. 5. The invention of claim 3, wherein: said lead means is connected to said filament at a point displaced from said backbone of the array. 6. The invention of claim 1, wherein said connecting means intersects said at least one loop, and said filament extends across said connecting means at the intersection. 7. The invention of claim 1, wherein said connecting means intersects each of said loops, and said nerve electrode includes a first and a second of said filament respectively secured in separate ones of said loops and extending across the intersection thereof with said connecting means. 8. An electrode for attachment to a nerve of a patient, said electrode comprising: a plurality of spaced-apart spiral bands coupled together by a backbone in a helix, each of said bands being incomplete to allow them to be spread open independently of one another to partly encircle the nerve, the incompleteness of the bands being staggered relative to said backbone lengthwise of said helix, and electrode filament means secured in at least one of said bands for electrical interaction with the nerve. 9. The invention of claim 8, further including electrical lead means connected to said electrode filament means for electrical connection thereof to signal generating or detecting apparatus. 10. The invention of claim 9, wherein: said electrical lead means is connected to said electrode filament means at a location on said at least one band away from the backbone. 11. The invention of claim 8, wherein said electrode filament means includes first and second electrode filaments, each electrically insulated from the other and secured in a different one of said bands from the other, and first and second electrical leads respectively connected to said first and second filaments. 12. The invention of claim 11, wherein the bands in which said filaments are secured intersecting said backbone, and each of said filaments extending in both directions in its respective band from the point of intersection thereof with said backbone. 13. An electrode for implantation on a nerve of a patient, comprising: a plurality of spaced-apart, generally parallel, resilient bands joined together by and skewed relative to a resilient backbone to form a generally helical configuration, each of said bands being incomplete to allow them to be spread open independently of one another to partly encircle the nerve, the incompleteness of the bands being staggered relative to said backbone lengthwise of the helical configuration, electrode filament means secured in at least one of said bands for electrical interaction with the nerve, and a lead wire electrically connected to the filament means on said at least one band at a point away from said backbone. 14. The electrode of claim 13, further including: means for strengthening said at least one band at the point of electrical connection between the lead wire and the filament means, and means for strengthening said at least one band at the point of electrical connection between the lead wire and the filament means, and means for tethering the lead wire at one of said bands other than said at least one band. Description BACKGROUND OF THE INVENTION The present invention relates generally to nerve electrodes, and more particularly to a helical electrode which is implemented for ease of implantation on a nerve of the patient. In U.S. Pat. No. 4,573,481, an implantable helical electrode assembly is disclosed in which the spiral configuration is composed of one or more flexible ribbon electrodes each partially embedded in a portion of the peripheral surface of a helically formed dielectric support matrix arranged and adapted to fit around a selected nerve or nerve bundle during surgical implantation of the electrode assembly. The resiliency of the assembly allows it to expand in the event of swelling of the nerve. The electrode assembly is utilized to electrically trigger or measure an action potential or to block conduction in nerve tissue. Such a helical electrode provides a generally superior design for its intended purposes but has been found somewhat difficult to mount on the patient's nerve during implantation. In essence, to install it on the nerve requires that the helical configuration of the electrode assembly be unraveled and then reformed about the nerve. SUMMARY OF THE INVENTION According to the present invention, a helical configuration is employed for the electrode or electrode array, but the helix is locked together with a backbone which may be one-piece or divided into multiple segments. The electrode array is cut lengthwise through the entire helix at the side diametrically opposite to the backbone. The electrode array may then be spread at the cut ends of each loop, either one at a time or all together, and either manually or using an appropriate tool to place it properly over the nerve and then allow the array to collapse, as a consequence of its resiliency, into its unrestrained normal spiral configuration about the nerve. This provides the desirable features of a conventional helical electrode array, but with an improved configuration which allows it be opened in a manner similar to a clamshell when desired to install it on or remove it from the nerve. The principal advantages of the nerve electrode array of the present invention are its ease of installation and its elimination or at least reduction of serious trauma to the nerve both during and after implantation. In the latter respect, any subsequent swelling of the nerve is not restricted by the electrode. Some resistance to expansion may be experienced even with a closed helical electrode array of the type described in the aforementioned U.S. Pat. No. 4,573,481, because of the tendency of the central portion of such a helix to resist expansion as the helix is subjected to outwardly directed radial forces, notwithstanding that the end portions of the helix will readily deform to accommodate swelling of the nerve in their respective regions. In an alternative preferred embodiment, the cut in each loop or band of the helix is staggered relative to the cuts in the other bands to assure that the electrode array does not slip or otherwise become displaced from the nerve in the usual event of swelling of the nerve following the surgical implantation. Such swelling is likely to occur after stabilization, in the first few days following implantation of the electrode array. Fibrotic growth occurs and tends to retain everything in place after the first week to ten days following the surgery. A preferred method of making the nerve electrode array includes forming an electrically insulative helix having a plurality of spiral bands and a lengthwise or segmented partly lengthwise member further linking each of the bands together, securing an electrically conductive strip to the underside of one of the bands and across the linking member, and severing each of the bands at a point away from the linking member whereby each band remains linked to the member and may be spread open for mounting about the nerve. The severing of the bands, either in a line or in a staggered array relative to the linking member, lengthwise of the helix, is performed after the linking member is secured to the bands. As noted above, the linking member may be one piece or may be segmented as multiple pieces. Accordingly, it is a broad object of the present invention to provide an improved helical nerve electrode array and method of making same. Another object of the invention is to provide a helical electrode array which retains all of the desirable features of existing helical electrodes, while having the considerable advantage of ease of mounting on the selected nerve or nerve bundle. A more specific object is to provide a helical nerve electrode assembly having spiral loops which may be opened independently of each other, or jointly, to allow ready placement of the electrode assembly over and about the nerve, and which has sufficient resiliency to collapse about and be retained around the nerve in its unrestrained spiral configuration. A further object of the invention is to provide a method of making an improved helical electrode assembly, in which the assembly includes a plurality of spiral loops each of which is severed but remains in place by virtue of a backbone serving to link the loops together in the helical array configuration. BRIEF DESCRIPTION OF THE DRAWINGS The above and still further objects, features and attendant advantages of the invention will become apparent from a consideration of the following detailed description of certain preferred embodiments thereof, taken in conjunction with the accompanying drawings, in which: FIGS. 1, 2 and 3 are, respectively, a full perspective view and opposite side perspective views of a first preferred embodiment of a nerve electrode array according to the invention; FIG. 4 is a phantom view of a human patient, with a nerve electrode array of the invention mounted on the vagus nerve; and FIG. 5 is a side view of an alternative preferred embodiment of a nerve electrode array according to the invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS AND METHOD One presently preferred embodiment of a nerve electrode array 10 according to the invention is shown in FIGS. 1-3, inclusive. The electrode array shown in the Figures is, by way of example and not limitation, bipolar (a unipolar array might alternatively be used), including a pair of electrically conductive ribbons, filaments or foils 12, 13 incorporated with and adhesively secured or bonded to a electrically insulative (non-conductive) spiral carrier 15. For example, the filaments 12, 13 may be composed of activated iridium, or rhodium or platinum, or other materials known to be suitable for the purpose, and the spiral or helical carrier 15 may be composed of medical grade silicone, such as those grades available from Dow Corning, or other known biocompatible material. The filaments are electrically attached to the distal or remote end of respective electrically conductive leads 18, 19, by welding or other known suitable technique. The helix is formed preferably by casting the silicone over the electrodes, or alternatively by injection molding of the silicone over the electrodes, as they are held in a suitably shaped mold or die, so that each conductive filament is secured to the inside or underside of the helical assembly along only a portion of a respective band or coil 22, 23 of the helix 15, for reasons which will be apparent presently. During the molding process, an extra "bump" 26, 27 of silicone is formed at or near the point of attachment of the respective lead and its associated filament to strengthen the overall electrode 10 at each point of attachment Each of the filaments and leads is covered with a respective insulative sheath of biocompatible material to minimize penetration of body fluids, and the leads may be further secured to an end of the helix by a tether 30, which may be simply another bump of silicone. The tether provides greater assurance that the leads will not be broken by the stresses that may be encountered during and after implant of the electrode, particularly at the respective points of attachment of the leads and electrodes. The proximal or near end of each lead is electrically attached to the appropriate terminals of an electrical connector designed to mate with the electrical connector of a generator (not shown) of electrical signals to be used for stimulation of the nerve and/or of a detector (not shown) for use in sensing the electrical signals carried by the nerve. An important feature of the nerve electrode array 10 according to the present invention is that the helix 15 has each of its individual bands connected or linked by an electrically insulative spine or backbone 33 along its length at one side of the helix, and each of the conductive filaments, such as 12 and 13 in this embodiment, is approximately centered at or under this backbone. Preferably, the backbone is formed from silicone at the time of the casting of the helix about the filaments. After the device has been assembled to that stage, and allowed to cool, the helix 15 is cut lengthwise at the side opposite the backbone 33 so that each of its coils or bands is separable at the respective cut 35 therethrough, and the device is removed from the casting mold. The plural bands are held together by the backbone. Preferably, the cut 35 is through the silicone only (and not through the respective filament) in the bands containing the filaments. If, however, the filament is exposed at the cut, it may be insulatively sealed again on the edge surface of the helix by applying additional silicone to the cut and and allowing it to cure. As a consequence of this construction, the electrode array 10 may be gently spread open as it is placed around the nerve during surgical implantation of the electrode on the selected nerve of the patient, such as the vagus nerve (FIG. 4). The resilience of the silicone spiral construction provides the helix with "memory" by which it tends to return to its normal spiral shape after the forces by which it is spread open are removed. After the nerve electrode has been installed in place, it is held in place by the coil segments of the silicone spiral not containing the conductive filaments as well as those coil segments which do contain the filaments. In an alternative embodiment of the invention, shown in FIG. 5, the nerve electrode array 10a has non-aligned lengthwise cuts 35a in the individual bands of the helix 15a, making the cuts staggered relative to the backbone 33a. It should be apparent, both here and in the preferred embodiment of FIGS. 1-3 described above, that the cuts need not be oriented in a completely lengthwise direction (i.e., parallel to the axis), but instead may be slanted or skewed relative to that direction so long as they extend through the respective bands to allow the latter to be spread open for installation of the electrode on the nerve, as described above. In the embodiment of FIG. 5, however, the staggered cuts provide greater assurance that the helical nerve electrode array will not slip off or otherwise be displaced from the nerve in the event of swelling of the nerve or movement of the electrode with movements of the region of the body of the patient in which the electrode array is implanted. It will thus be seen that the nerve electrode assembly constructed according to the principles of the present invention provides a superior configuration in that it retains the desirable electrical and mechanical features of the helical configuration, while being adapted for ease of mounting the assembly on the nerve itself, thereby significantly reducing the likelihood of trauma to the nerve during the installation. Although certain presently preferred embodiments and methods of making such embodiments of the invention have been described herein, it will be apparent to those skilled in the relevant field to which the invention pertains from a consideration of the foregoing description, that variations and modifications of the disclosed embodiments and methods may be made without departing from the spirit and scope of the invention. It is therefore intended that the invention shall be limited only to the extent required by the appended claims and the rules and principles of applicable law. Patent Citations Cited PatentFiling datePublication dateApplicantTitle US4573481 *Jun 25, 1984Mar 4, 1986Huntington Institute Of Applied ResearchImplantable electrode array US4590946 *Jun 14, 1984May 27, 1986Biomed Concepts, Inc.Surgically implantable electrode for nerve bundles US4920979 *Oct 12, 1988May 1, 1990Huntington Medical Research InstituteBidirectional helical electrode for nerve stimulation US4979511 *Nov 3, 1989Dec 25, 1990Cyberonics, Inc.Strain relief tether for implantable electrode US5095905 *Jun 7, 1990Mar 17, 1992Medtronic, Inc.Implantable neural electrode Referenced by Citing PatentFiling datePublication dateApplicantTitle US5375594 *Mar 29, 1993Dec 27, 1994Cueva; Roberto A.Removable medical electrode system US5505201 *Apr 20, 1994Apr 9, 1996Case Western Reserve UniversityImplantable helical spiral cuff electrode US5716320 *Dec 29, 1995Feb 10, 1998Buttermore; William J.Illuminated intraocular surgical instrument US5938690 *Jun 7, 1996Aug 17, 1999Advanced Neuromodulation Systems, Inc.Pain management system and method US6322559Jul 6, 1998Nov 27, 2001Vnus Medical Technologies, Inc.Electrode catheter having coil structure US6339725Jul 10, 2000Jan 15, 2002The Board Of Trustees Of Southern Illinois UniversityMethods of modulating aspects of brain neural plasticity by vagus nerve stimulation US6456866Sep 28, 1999Sep 24, 2002Dustin TylerFlat interface nerve electrode and a method for use US6466822Apr 5, 2000Oct 15, 2002Neuropace, Inc.Multimodal neurostimulator and process of using it US6473639Mar 2, 2000Oct 29, 2002Neuropace, Inc.Neurological event detection procedure using processed display channel based algorithms and devices incorporating these procedures US6529774Nov 9, 2000Mar 4, 2003Neuropace, Inc.Extradural leads, neurostimulator assemblies, and processes of using them for somatosensory and brain stimulation US6556868Jan 14, 2002Apr 29, 2003The Board Of Trustees Of Southern Illinois UniversityMethods for improving learning or memory by vagus nerve stimulation US6600956Aug 21, 2001Jul 29, 2003Cyberonics, Inc.Circumneural electrode assembly US6606521Jul 9, 2001Aug 12, 2003Neuropace, Inc.Implantable medical lead US6609031Jun 7, 1996Aug 19, 2003Advanced Neuromodulation Systems, Inc.Multiprogrammable tissue stimulator and method US6662035Sep 13, 2001Dec 9, 2003Neuropace, Inc.Implantable lead connector assembly for implantable devices and methods of using it US6944501Apr 5, 2000Sep 13, 2005Neurospace, Inc.Neurostimulator involving stimulation strategies and process for using it US6978174Jul 28, 2004Dec 20, 2005Ardian, Inc.Methods and devices for renal nerve blocking US7020521Nov 8, 2002Mar 28, 2006Pacesetter, Inc.Methods and apparatus for detecting and/or monitoring heart failure US7117033Feb 20, 2004Oct 3, 2006Brainsgate, Ltd.Stimulation for acute conditions US7120489May 7, 2001Oct 10, 2006Brainsgate, Ltd.Method and apparatus for stimulating the sphenopalatine ganglion to modify properties of the BBB and cerebral blood flow US7127297May 23, 2003Oct 24, 2006Advanced Neuromodulation Systems, Inc.Multiprogrammable tissue stimulator and method US7146209Nov 14, 2002Dec 5, 2006Brainsgate, Ltd.Stimulation for treating eye pathologies US7162303Apr 8, 2003Jan 9, 2007Ardian, Inc.Renal nerve stimulation method and apparatus for treatment of patients US7190998Jan 9, 2004Mar 13, 2007Braingate Ltd.Method and apparatus for stimulating the sphenopalatine ganglion to modify properties of the BBB and cerbral blood flow US7209787Nov 20, 2003Apr 24, 2007Bioneuronics CorporationApparatus and method for closed-loop intracranial stimulation for optimal control of neurological disease US7231254Jul 12, 2004Jun 12, 2007Bioneuronics CorporationClosed-loop feedback-driven neuromodulation US7236822Oct 16, 2002Jun 26, 2007Leptos Biomedical, Inc.Wireless electric modulation of sympathetic nervous system US7239912Sep 13, 2002Jul 3, 2007Leptos Biomedical, Inc.Electric modulation of sympathetic nervous system US7242984Jan 6, 2004Jul 10, 2007Neurovista CorporationApparatus and method for closed-loop intracranial stimulation for optimal control of neurological disease US7254445Jul 28, 2004Aug 7, 2007Advanced Neuromodulation Systems, Inc.Multiprogrammable tissue stimulator and method US7277758Apr 5, 2004Oct 2, 2007Neurovista CorporationMethods and systems for predicting future symptomatology in a patient suffering from a neurological or psychiatric disorder US7319904 *Jun 9, 2003Jan 15, 2008Medtronic, Inc.Percutaneous Surgical lead body US7324851Jun 1, 2004Jan 29, 2008Neurovista CorporationClosed-loop feedback-driven neuromodulation US7403820May 25, 2005Jul 22, 2008Neurovista CorporationClosed-loop feedback-driven neuromodulation US7467016Jan 27, 2006Dec 16, 2008Cyberonics, Inc.Multipolar stimulation electrode with mating structures for gripping targeted tissue US7551964Feb 24, 2004Jun 23, 2009Leptos Biomedical, Inc.Splanchnic nerve stimulation for treatment of obesity US7561919Feb 7, 2006Jul 14, 2009Brainsgate Ltd.SPG stimulation via the greater palatine canal US7617005Aug 14, 2006Nov 10, 2009Ardian, Inc.Methods and apparatus for thermally-induced renal neuromodulation US7620451Feb 27, 2006Nov 17, 2009Ardian, Inc.Methods and apparatus for pulsed electric field neuromodulation via an intra-to-extravascular approach US7623924Aug 30, 2005Nov 24, 2009Leptos Biomedical, Inc.Devices and methods for gynecologic hormone modulation in mammals US7623928May 2, 2007Nov 24, 2009Neurovista CorporationControlling a subject's susceptibility to a seizure US7636597Nov 13, 2003Dec 22, 2009Brainsgate, Ltd.Surgical tools and techniques for stimulation US7640062Jul 8, 2005Dec 29, 2009Brainsgate Ltd.Methods and systems for management of alzheimer's disease US7647115Jun 3, 2005Jan 12, 2010Ardian, Inc.Renal nerve stimulation method and apparatus for treatment of patients US7653438May 13, 2005Jan 26, 2010Ardian, Inc.Methods and apparatus for renal neuromodulation US7672727Aug 17, 2005Mar 2, 2010Enteromedics Inc.Neural electrode treatment US7676263Jun 21, 2007Mar 9, 2010Neurovista CorporationMinimally invasive system for selecting patient-specific therapy parameters US7676275 *May 2, 2005Mar 9, 2010Pacesetter, Inc.Endovascular lead for chronic nerve stimulation US7684859Jan 29, 2007Mar 23, 2010Brainsgate Ltd.Stimulation of the OTIC ganglion for treating medical conditions US7689276Aug 18, 2004Mar 30, 2010Leptos Biomedical, Inc.Dynamic nerve stimulation for treatment of disorders US7689277Jan 24, 2006Mar 30, 2010Leptos Biomedical, Inc.Neural stimulation for treatment of metabolic syndrome and type 2 diabetes US7702386Jan 24, 2007Apr 20, 2010Leptos Biomedical, Inc.Nerve stimulation for treatment of obesity, metabolic syndrome, and Type 2 diabetes US7706875Jan 25, 2007Apr 27, 2010Cyberonics, Inc.Modulation of drug effects by vagus nerve stimulation US7717948Aug 16, 2007May 18, 2010Ardian, Inc.Methods and apparatus for thermally-induced renal neuromodulation US7729759Aug 12, 2006Jun 1, 2010Brainsgate Ltd.Method and apparatus for stimulating the sphenopalatine ganglion to modify properties of the BBB and cerebral blood flow US7747325Sep 28, 2005Jun 29, 2010Neurovista CorporationSystems and methods for monitoring a patient's neurological disease state US7813805Jan 11, 2006Oct 12, 2010Pacesetter, Inc.Subcardiac threshold vagal nerve stimulation US7818069Jul 27, 2007Oct 19, 2010Cyberonics, Inc.Ribbon electrode US7822486Aug 17, 2005Oct 26, 2010Enteromedics Inc.Custom sized neural electrodes US7848821Jul 11, 2006Dec 7, 2010Pacesetter, Inc.Apparatus and method for electrode insertion in heart tissue US7853329Dec 29, 2006Dec 14, 2010Neurovista CorporationMonitoring efficacy of neural modulation therapy US7853333Jun 12, 2006Dec 14, 2010Ardian, Inc.Methods and apparatus for multi-vessel renal neuromodulation US7860566Oct 6, 2005Dec 28, 2010The Cleveland Clinic FoundationSystem and method for achieving regular slow ventricular rhythm in response to atrial fibrillation US7860569Oct 18, 2007Dec 28, 2010Brainsgate, Ltd.Long-term SPG stimulation therapy for prevention of vascular dementia US7869869Jan 11, 2006Jan 11, 2011Pacesetter, Inc.Subcardiac threshold vagal nerve stimulation US7869884Apr 26, 2007Jan 11, 2011Cyberonics, Inc.Non-surgical device and methods for trans-esophageal vagus nerve stimulation US7894907Jun 18, 2007Feb 22, 2011Ebr Systems, Inc.Systems and methods for implantable leadless nerve stimulation US7901613Jan 5, 2010Mar 8, 2011Cyberonics, Inc.Vacuum mandrel for use in fabricating an implantable electrode US7904175Apr 26, 2007Mar 8, 2011Cyberonics, Inc.Trans-esophageal vagus nerve stimulation US7908000Oct 31, 2007Mar 15, 2011Brainsgate Ltd.Transmucosal electrical stimulation US7930035May 2, 2007Apr 19, 2011Neurovista CorporationProviding output indicative of subject's disease state US7937143Oct 18, 2005May 3, 2011Ardian, Inc.Methods and apparatus for inducing controlled renal neuromodulation US7937144May 17, 2007May 3, 2011Advanced Neuromodulation Systems, Inc.Electric modulation of sympathetic nervous system US7937145Jun 11, 2007May 3, 2011Advanced Neuromodulation Systems, Inc.Dynamic nerve stimulation employing frequency modulation US7962214Jul 27, 2007Jun 14, 2011Cyberonics, Inc.Non-surgical device and methods for trans-esophageal vagus nerve stimulation US7966073May 16, 2006Jun 21, 2011Neuropace, Inc.Differential neurostimulation therapy driven by physiological therapy US7974706 *Mar 30, 2006Jul 5, 2011Boston Scientific Neuromodulation CorporationElectrode contact configurations for cuff leads US7974707Jan 26, 2007Jul 5, 2011Cyberonics, Inc.Electrode assembly with fibers for a medical device US8010189Oct 30, 2007Aug 30, 2011Brainsgate Ltd.SPG stimulation for treating complications of subarachnoid hemorrhage US8024035May 17, 2007Sep 20, 2011Advanced Neuromodulation Systems, Inc.Electric modulation of sympathetic nervous system US8036736Mar 21, 2008Oct 11, 2011Neuro Vista CorporationImplantable systems and methods for identifying a contra-ictal condition in a subject US8055347Aug 17, 2006Nov 8, 2011Brainsgate Ltd.Stimulation for treating brain events and other conditions US8068918Mar 9, 2007Nov 29, 2011Enteromedics Inc.Remote monitoring and control of implantable devices US8073544May 31, 2005Dec 6, 2011Neuropace, Inc.Neurostimulator involving stimulation strategies and process for using it US8103349Dec 15, 2009Jan 24, 2012Enteromedics Inc.Neural electrode treatment US8108052May 29, 2008Jan 31, 2012Nervo CorporationPercutaneous leads with laterally displaceable portions, and associated systems and methods US8131371Apr 13, 2006Mar 6, 2012Ardian, Inc.Methods and apparatus for monopolar renal neuromodulation US8131372Mar 19, 2007Mar 6, 2012Ardian, Inc.Renal nerve stimulation method for treatment of patients US8140167Nov 20, 2007Mar 20, 2012Enteromedics, Inc.Implantable therapy system with external component having multiple operating modes US8145299Feb 12, 2010Mar 27, 2012Advanced Neuromodulation Systems, Inc.Neural stimulation for treatment of metabolic syndrome and type 2 diabetes US8145316Jul 25, 2005Mar 27, 2012Ardian, Inc.Methods and apparatus for renal neuromodulation US8145317Mar 6, 2006Mar 27, 2012Ardian, Inc.Methods for renal neuromodulation US8150518Jun 3, 2005Apr 3, 2012Ardian, Inc.Renal nerve stimulation method and apparatus for treatment of patients US8150519Mar 6, 2006Apr 3, 2012Ardian, Inc.Methods and apparatus for bilateral renal neuromodulation US8150520Mar 6, 2006Apr 3, 2012Ardian, Inc.Methods for catheter-based renal denervation US8160695Jun 18, 2008Apr 17, 2012The Invention Science Fund I, LlcSystem for chemical modulation of neural activity US8165668Feb 15, 2008Apr 24, 2012The Invention Science Fund I, LlcMethod for magnetic modulation of neural conduction US8165669Feb 15, 2008Apr 24, 2012The Invention Science Fund I, LlcSystem for magnetic modulation of neural conduction US8170658Feb 15, 2008May 1, 2012The Invention Science Fund I, LlcSystem for electrical modulation of neural conduction US8170659Apr 4, 2008May 1, 2012The Invention Science Fund I, LlcMethod for thermal modulation of neural activity US8170660Apr 4, 2008May 1, 2012The Invention Science Fund I, LlcSystem for thermal modulation of neural activity US8175711Mar 6, 2006May 8, 2012Ardian, Inc.Methods for treating a condition or disease associated with cardio-renal function US8180446Dec 5, 2007May 15, 2012The Invention Science Fund I, LlcMethod and system for cyclical neural modulation based on activity state US8180447Jun 18, 2008May 15, 2012The Invention Science Fund I, LlcMethod for reversible chemical modulation of neural activity US8180462Apr 18, 2006May 15, 2012Cyberonics, Inc.Heat dissipation for a lead assembly US8195287Feb 15, 2008Jun 5, 2012The Invention Science Fund I, LlcMethod for electrical modulation of neural conduction US8224449Jun 29, 2009Jul 17, 2012Boston Scientific Neuromodulation CorporationMicrostimulator with flap electrodes US8224452May 17, 2011Jul 17, 2012Neuropace Inc.Differential neurostimulation therapy driven by physiological therapy US8229571Nov 5, 2009Jul 24, 2012Brainsgate Ltd.Greater palatine canal stylet US8233976Jun 18, 2008Jul 31, 2012The Invention Science Fund I, LlcSystem for transdermal chemical modulation of neural activity US8239028Apr 24, 2009Aug 7, 2012Cyberonics, Inc.Use of cardiac parameters in methods and systems for treating a chronic medical condition US8295926Oct 23, 2009Oct 23, 2012Advanced Neuromodulation Systems, Inc.Dynamic nerve stimulation in combination with other eating disorder treatment modalities US8295934Nov 14, 2006Oct 23, 2012Neurovista CorporationSystems and methods of reducing artifact in neurological stimulation systems US8295946May 23, 2011Oct 23, 2012Cyberonics, Inc.Electrode assembly with fibers for a medical device US8321030Apr 20, 2010Nov 27, 2012Advanced Neuromodulation Systems, Inc.Esophageal activity modulated obesity therapy US8326417May 12, 2011Dec 4, 2012Neuropace, Inc.Neurostimulator involving stimulation strategies and process for using it US8326426Apr 3, 2009Dec 4, 2012Enteromedics, Inc.Implantable device with heat storage US8326439Apr 16, 2008Dec 4, 2012Nevro CorporationTreatment devices with delivery-activated inflatable members, and associated systems and methods for treating the spinal cord and other tissues US8337404Oct 1, 2010Dec 25, 2012Flint Hills Scientific, LlcDetecting, quantifying, and/or classifying seizures using multimodal data US8340760Sep 12, 2011Dec 25, 2012Advanced Neuromodulation Systems, Inc.Electric modulation of sympathetic nervous system US8340772May 5, 2010Dec 25, 2012Advanced Neuromodulation Systems, Inc.Brown adipose tissue utilization through neuromodulation US8347891Nov 14, 2006Jan 8, 2013Medtronic Ardian Luxembourg S.A.R.L.Methods and apparatus for performing a non-continuous circumferential treatment of a body lumen US8382667Apr 29, 2011Feb 26, 2013Flint Hills Scientific, LlcDetecting, quantifying, and/or classifying seizures using multimodal data US8391970Aug 26, 2008Mar 5, 2013The Feinstein Institute For Medical ResearchDevices and methods for inhibiting granulocyte activation by neural stimulation US8406869Sep 1, 2011Mar 26, 2013Brainsgate, Ltd.Post-acute electrical stimulation treatment of adverse cerebrovascular events US8412333May 12, 2011Apr 2, 2013Neuropace, Inc.Neurostimulator involving stimulation strategies and process for using it US8412338Nov 17, 2009Apr 2, 2013Setpoint Medical CorporationDevices and methods for optimizing electrode placement for anti-inflamatory stimulation US8417344Oct 24, 2008Apr 9, 2013Cyberonics, Inc.Dynamic cranial nerve stimulation based on brain state determination from cardiac data US8423145Jun 14, 2012Apr 16, 2013Neuropace, Inc.Differential neurostimulation therapy driven by physiological therapy US8423157 *May 24, 2011Apr 16, 2013Boston Scientific Neuromodulation CorporationElectrode contact configurations for cuff leads US8433423Dec 13, 2010Apr 30, 2013Ardian, Inc.Methods for multi-vessel renal neuromodulation US8444640Sep 14, 2012May 21, 2013Medtronic Ardian Luxembourg S.A.R.L.Methods and apparatus for performing a non-continuous circumferential treatment of a body lumen US8452387Sep 20, 2010May 28, 2013Flint Hills Scientific, LlcDetecting or validating a detection of a state change from a template of heart rate derivative shape or heart beat wave complex US8452406Aug 29, 2011May 28, 2013Cardiac Pacemakers, Inc.Automatic selection of lead configuration for a neural stimulation lead US8454594Aug 11, 2009Jun 4, 2013Medtronic Ardian Luxembourg S.A.R.L.Apparatus for performing a non-continuous circumferential treatment of a body lumen US8473067Jun 10, 2011Jun 25, 2013Boston Scientific Scimed, Inc.Renal denervation and stimulation employing wireless vascular energy transfer arrangement US8478420Jul 12, 2006Jul 2, 2013Cyberonics, Inc.Implantable medical device charge balance assessment US8478428Apr 23, 2010Jul 2, 2013Cyberonics, Inc.Helical electrode for nerve stimulation US8483846Apr 8, 2010Jul 9, 2013Cyberonics, Inc.Multi-electrode assembly for an implantable medical device US8494643Jan 18, 2011Jul 23, 2013Ebr Systems, Inc.Systems and methods for implantable leadless nerve stimulation US8509914Oct 28, 2005Aug 13, 2013Cyberonics, Inc.Insert for implantable electrode US8521299Nov 9, 2011Aug 27, 2013Enteromedics Inc.Remote monitoring and control of implantable devices US8532787Nov 20, 2007Sep 10, 2013Enteromedics Inc.Implantable therapy system having multiple operating modes US8543199Sep 2, 2011Sep 24, 2013Cyberonics, Inc.Implantable systems and methods for identifying a contra-ictal condition in a subject US8548593Nov 5, 2009Oct 1, 2013Cardiac Pacemakers, Inc.Distal end converter for a medical device lead US8548600Sep 14, 2012Oct 1, 2013Medtronic Ardian Luxembourg S.A.R.L.Apparatuses for renal neuromodulation and associated systems and methods US8551069Mar 6, 2006Oct 8, 2013Medtronic Adrian Luxembourg S.a.r.l.Methods and apparatus for treating contrast nephropathy US8562523Mar 4, 2011Oct 22, 2013Flint Hills Scientific, LlcDetecting, assessing and managing extreme epileptic events US8562524Apr 20, 2011Oct 22, 2013Flint Hills Scientific, LlcDetecting, assessing and managing a risk of death in epilepsy US8562536Apr 29, 2010Oct 22, 2013Flint Hills Scientific, LlcAlgorithm for detecting a seizure from cardiac data US8571643Sep 16, 2010Oct 29, 2013Flint Hills Scientific, LlcDetecting or validating a detection of a state change from a template of heart rate derivative shape or heart beat wave complex US8588933Jan 11, 2010Nov 19, 2013Cyberonics, Inc.Medical lead termination sleeve for implantable medical devices US8600518Apr 22, 2009Dec 3, 2013Boston Scientific Neuromodulation CorporationElectrodes for stimulation leads and methods of manufacture and use US8612002Dec 23, 2010Dec 17, 2013Setpoint Medical CorporationNeural stimulation devices and systems for treatment of chronic inflammation US8620423Mar 14, 2011Dec 31, 2013Medtronic Ardian Luxembourg S.A.R.L.Methods for thermal modulation of nerves contributing to renal function US8620450 *Jul 19, 2011Dec 31, 2013Cardiac Pacemakers, Inc.Minimally invasive lead system for vagus nerve stimulation US8626300Mar 11, 2011Jan 7, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods and apparatus for thermally-induced renal neuromodulation US8630706Mar 13, 2012Jan 14, 2014The Invention Science Fund I, LlcMethod and system for reversible chemical modulation of neural activity US8639355Jun 25, 2012Jan 28, 2014Cardiac Pacemakers, Inc.Insulation and stability features for an implantable medical device lead US8641646Jul 30, 2010Feb 4, 2014Cyberonics, Inc.Seizure detection using coordinate data US8649871Apr 30, 2010Feb 11, 2014Cyberonics, Inc.Validity test adaptive constraint modification for cardiac data used for detection of state changes US8676345Oct 25, 2013Mar 18, 2014Boston Scientific Neuromodulation CorporationElectrodes for stimulation leads and methods of manufacture and use US8679009Jun 15, 2010Mar 25, 2014Flint Hills Scientific, LlcSystems approach to comorbidity assessment US8684921May 15, 2012Apr 1, 2014Flint Hills Scientific LlcDetecting, assessing and managing epilepsy using a multi-variate, metric-based classification analysis US8684998Mar 9, 2012Apr 1, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods for inhibiting renal nerve activity US8694106Feb 28, 2013Apr 8, 2014Neuropace, Inc.Neurostimulator involving stimulation strategies and process for using it US8712552Nov 15, 2012Apr 29, 2014Nevro CorporationTreatment devices with deliver-activated inflatable members, and associated systems and methods for treating the spinal cord and other tissues US8721637Jul 12, 2013May 13, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods and apparatus for performing renal neuromodulation via catheter apparatuses having inflatable balloons US8725239Apr 25, 2011May 13, 2014Cyberonics, Inc.Identifying seizures using heart rate decrease US8725243Dec 28, 2005May 13, 2014Cyberonics, Inc.Methods and systems for recommending an appropriate pharmacological treatment to a patient for managing epilepsy and other neurological disorders US8728137Feb 12, 2013May 20, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods for thermally-induced renal neuromodulation US8728138Feb 12, 2013May 20, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods for thermally-induced renal neuromodulation US8729129Mar 24, 2005May 20, 2014The Feinstein Institute For Medical ResearchNeural tourniquet US8740896Jul 12, 2013Jun 3, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods and apparatus for performing renal neuromodulation via catheter apparatuses having inflatable balloons US8762065Jun 22, 2005Jun 24, 2014Cyberonics, Inc.Closed-loop feedback-driven neuromodulation US8768470May 11, 2010Jul 1, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods for monitoring renal neuromodulation US8768471Mar 3, 2013Jul 1, 2014Cyberonics, Inc.Dynamic cranial nerve stimulation based on brain state determination from cardiac data US8771252May 20, 2005Jul 8, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods and devices for renal nerve blocking US8774922May 21, 2013Jul 8, 2014Medtronic Ardian Luxembourg S.A.R.L.Catheter apparatuses having expandable balloons for renal neuromodulation and associated systems and methods US8781597May 5, 2010Jul 15, 2014Cyberonics, Inc.Systems for monitoring a patient's neurological disease state US8784463Feb 12, 2013Jul 22, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods for thermally-induced renal neuromodulation US8786624Jun 2, 2010Jul 22, 2014Cyberonics, Inc.Processing for multi-channel signals US8788034May 9, 2012Jul 22, 2014Setpoint Medical CorporationSingle-pulse activation of the cholinergic anti-inflammatory pathway to treat chronic inflammation US8805545Apr 16, 2013Aug 12, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods and apparatus for multi-vessel renal neuromodulation US8818514Jul 2, 2013Aug 26, 2014Medtronic Ardian Luxembourg S.A.R.L.Methods for intravascularly-induced neuromodulation US8825164Jun 7, 2011Sep 2, 2014Enteromedics Inc.Neural modulation devices and methods US8827912Apr 27, 2010Sep 9, 2014Cyberonics, Inc.Methods and systems for detecting epileptic events using NNXX, optionally with nonlinear analysis parameters US8831732Apr 30, 2010Sep 9, 2014Cyberonics, Inc.Method, apparatus and system for validating and quantifying cardiac beat data quality US8838231Jun 3, 2011Sep 16, 2014Advanced Neuromodulation Systems, Inc.Neural Stimulation for treatment of metabolic syndrome and type 2 diabetes US20110224744 *May 24, 2011Sep 15, 2011Boston Scientific Neuromodulation CorporationElectrode contact configurations for cuff leads US20120022617 *Jul 19, 2011Jan 26, 2012Tockman Bruce AMinimally invasive lead system for vagus nerve stimlation EP2275171A2Aug 1, 2006Jan 19, 2011Enteromedics Inc.Apparatus for neural electrode treatment EP2399644A2 *Sep 27, 2001Dec 28, 2011CVRX, Inc.Devices for cardiovascular reflex control WO1994022365A1 *Mar 29, 1994Oct 13, 1994Roberto A CuevaRemovable medical electrode system WO2007021534A1Aug 1, 2006Feb 22, 2007Enteromedics IncNeural electrode treatment WO2007021535A1Aug 1, 2006Feb 22, 2007Enteromedics IncNeural electrode WO2010138228A1 *Mar 5, 2010Dec 2, 2010Cardiac Pacemakers, Inc.Helically formed coil for a neural cuff electrode WO2011082279A2Dec 30, 2010Jul 7, 2011Boston Scientific Scimed, Inc.Patterned denervation therapy for innervated renal vasculature WO2012012432A1 *Jul 19, 2011Jan 26, 2012Cardiac Pacemakers, Inc.Minimally invasive lead system for vagus nerve stimulation WO2013134763A2Mar 11, 2013Sep 12, 2013Enteromedics Inc.Safety features for use in medical devices Classifications U.S. Classification600/377, 607/117 International ClassificationA61N1/05, A61B5/042 Cooperative ClassificationA61B5/0422, A61B2562/164, A61N1/0556, A61B2562/0209, A61B2562/043 European ClassificationA61N1/05L4, A61B5/042D Legal Events DateCodeEventDescription Dec 12, 2001ASAssignment Owner name: CIT GROUP/BUSINESS CREDIT, INC., THE, TEXAS Free format text: SECURITY INTEREST;ASSIGNOR:CYBERONICS, INC.;REEL/FRAME:012350/0598 Effective date: 20010926 Owner name: CIT GROUP/BUSINESS CREDIT, INC., THE 5420 LBJ FREE Free format text: SECURITY INTEREST;ASSIGNOR:CYBERONICS, INC. /AR;REEL/FRAME:012350/0598 Owner name: CIT GROUP/BUSINESS CREDIT, INC., THE,TEXAS Free format text: SECURITY INTEREST;ASSIGNOR:CYBERONICS, INC. A CORP. OF DELAWARE;REEL/FRAME:012350/0598 Mar 28, 2001FPAYFee payment Year of fee payment: 8 Dec 23, 1997FPExpired due to failure to pay maintenance fee Effective date: 19971015 Nov 19, 1997SULPSurcharge for late payment Nov 19, 1997FPAYFee payment Year of fee payment: 4 Oct 12, 1997REINReinstatement after maintenance fee payment confirmed May 20, 1997REMIMaintenance fee reminder mailed May 3, 1991ASAssignment Owner name: CYBERONICS, INC. A DE CORP., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:WEINBERG, STEVEN L.;REEL/FRAME:005696/0726 Effective date: 19910419
The tag has no wiki summary. learn more… | top users | synonyms 0 votes 0answers 8 views Factorial Formula 1∗1!+2∗2!+…+x∗x! = (x+1)!−1 [migrated] The following relation can be easily proved with the help of Mathematical Induction 1∗1! + 2∗2! + ... + x∗x! = (x+1)!−1 However, for large value of x the result may escalate really quickly. ... 0 votes 0answers 21 views PolynomialMod: Unexpected results Executing PolynomialMod[(X - 1) (X^3 + 2) (X^2 + 1), 2 - 2 X] 0 But ... 0 votes 1answer 23 views Reduce Vector/Matrix mod N [closed] If I have a vector such as below and want to reduce it mod a number, how can I do this? V = {{176}, {648}}; MatrixForm[V] MatrixForm[V, Modulus -> 26] Both ... 1 vote 2answers 63 views Modular arithmetic in Mathematica? [closed] I want to implement something like 1 + 1 = 0; i.e., simple modular arithmetic in Mathematica. This seems like it should be a really easy built-in option, but I ... 0 votes 1answer 69 views How to solve Mod equation with mathematica [closed] i'm pretty noob with mathematica but i need to solve an equation: $$c\equiv m^2\pmod n$$ I tried something like ... 0 votes 0answers 61 views Solving an equation for rational modulus 1 I want to solve an system of equations of the form $$\prod_{i=1}^n x_i^{M_{i,k}}=1 \qquad k=1,\ldots,n$$ with complex $x_i$ with constraint $|x_i|=1$ and $M_{i,k}$ integers. This is basically a ... 2 votes 2answers 293 views Why is Mathematica getting this modular root wrong? First, note that $4^{96}\equiv96\ (mod\ 100)$. Mathematica claims that PowerMod[96, 1/96, 100] has no integer solutions. Even more obviously wrong, I get ... 1 vote 1answer 42 views Converting an expression to modular arithmetic automatically I have the expression $\frac{1}{15} \left(-(-1)^n-5\times 2^{n+2}+3\times 2^{2 n+1}+15\right)$ which I want to calculate mod m for a very large n. My current method is to ask for this exression in ... 4 votes 1answer 348 views Polynomial GCD over a ring (with composite characteristic) I'd like to implement the "Franklin-Reiter Related Message Attack" (see section 4.3 of Boneh's paper). As part of the implementation, I require to compute the GCD of two polynomials over ... 0 votes 0answers 108 views Solving for $d$ in $x= E^d mod(n)$ With regards to Public Key Cryptography, I have been tasked with the problem of attacking some information given in an assignment and discovered a private key used to digitally sign a message. Known: ... 5 votes 1answer 2k views Solving a system of linear equations modulo n I have a system of linear equations $$ a+b+c \equiv 31 \pmod{54} $$ $$ 4a+2b+c \equiv 3 \pmod{54} $$ $$ 9a+3b+c \equiv 11 \pmod{54} $$ What should I input (I'm using ... 1 vote 0answers 150 views Is there a way to speed up Simplify and/or PolynomialReduce Modulus-> 2? I'm trying to simplify a series of equations with at most 64 input terms. As the number of terms involved in the equations increase, the runtime seems to grow exponentially. Does anyone know of ways ... 1 vote 2answers 396 views Finding shortest non-zero vector $x$ satisfying $Ax=0 \pmod q$ Let $n$, $m$, and $q$ be positive integers (with $m > n$), and $A$ be a matrix over $\mathbb{Z}_q^{n \times m}$. Using Mathematica, I want to find the shortest non-zero vectors $x \in ... 4 votes 2answers 748 views Inverse of a polynomial in a polynomial ring Let $N$ be a prime, and $q$ be a positive integer. Given a polynomial $f(x)$ in $R = \mathbb Z[x]/(x^N-1)$, I want to find another polynomial $f_q(x)$ in $R_q = \mathbb Z_q[x]/(x^N-1)$, such that ... 5 votes 1answer 470 views Montgomery Modular Exponentiation I'm trying to write a Montgomery exponentiation based on this which can compete with Mathematica PowerMod. We know that PowerMod ... 9 votes 1answer 618 views Modular arithmetic - efficiently calculating the remainders of factorials When working on this question regarding the divisibility of the sum of factorials, I decided to write some code to test "small values" of the problem using the following code. ... 0 votes 1answer 71 views How can I seperate specific elements from the list? [duplicate] Possible Duplicate: Question about MapThread and Dynamic I write a function name as inputFieldsList and it returns both ... 6 votes 1answer 145 views Implementing Remainder Tree I want to implement Remainder Tree based on this. With the answers on SE I've come up with: ... 1 vote 1answer 255 views Faster GCD Implementation Is there any chance to write a faster GCD than the built-in one in Mathematica? @Mr.Wizard has written one in this question (although it's not for this purpose) which is 6 times slower on a 100k ... 9 votes 2answers 566 views Solving/Reducing equations in $\mathbb{Z}/p\mathbb{Z}$ I was trying to find all the numbers $n$ for which $2^n=n\mod 10^k$ using Mathematica. My first try: Reduce[2^n == n, n, Modulus -> 100] However, I receive ... 3 votes 0answers 265 views Parallel PowerMod Is there anyway to parallelize the PowerMod function? Here is my Left-To-Right modular exponentation: ... 9 votes 5answers 460 views Incrementing a number where each digit has a different base Let's say I have a list, for instance {10,5,3}, indicating the bases for each digit of my 3-digit number. Using this basis, if I wanted to increment {8,4,1} a couple of times, here's what I would get: ... 1 vote 1answer 624 views Matrix Multiplication Modulo 2 I would like to perform matrix multiplication modulo 2. Hence, instead of the usual: A.B I did: ... 3 votes 1answer 655 views Linear Solve with Modular Arithmetic I am interested in using LinearSolve[m,b] which will find a solution to the equation $m.x=b$, where I am in mod 2 arithmetic. Is there any way to perform this ... 2 votes 2answers 506 views decompose a number (less than 255) in a sum of powers of 2 Is there a built in function that would take a number and decompose it into a sum of powers of 2? The numbers will be non negative less than 256. For what it's worth I'm trying to understand a paper ... 6 votes 1answer 641 views How to Simplify equations over a Ring with Mathematica? For example, when we work over a ring, the equation x^3=0 does not imply x^2=0 or x=0, but ... 11 votes 2answers 569 views Factorizing polynomials over fields other than $\mathbb{C}$ I'd like to take a polynomial in $\mathbb{Z}_5[x]$ of the form $ax^2+bx+c$ and factor it into irreducible polynomials. For example: Input... x^2+4 Output... ...
fbpx Cmp cpt code Welcome to our comprehensive guide on understanding the CMP CPT code. If you’ve ever had a routine blood test or are curious about the substances measured in your blood, this guide is for you. The CMP, or comprehensive metabolic panel, is a commonly used test that provides valuable information about your overall health, organ function, and metabolic balance. It measures 14 different substances in your blood, giving insights into your metabolism, liver and kidney health, blood glucose levels, and more. With this guide, we’ll walk you through everything you need to know about the CMP CPT code, including what it is, what it measures, when it’s appropriate, how it’s performed, and how to interpret the results. Whether you’re a healthcare professional or a curious individual, understanding the CMP CPT code is essential for making informed decisions about your health. Key Takeaways: • A CMP is a routine blood test that measures 14 different substances in your blood. • It provides important information about your metabolism, organ function, and overall health. • The CMP can be used for routine check-ups, diagnostic purposes, treatment monitoring, and health screenings. • Interpreting CMP test results involves comparing the measured substances to reference ranges. • A healthcare provider can help interpret the results and guide further evaluation or treatment if needed. What is a CMP? A comprehensive metabolic panel (CMP) is a routine blood test that measures 14 different substances in a sample of your blood. It provides information about your metabolism and the balance of certain chemicals in your body. The CMP includes tests for glucose, calcium, sodium, potassium, bicarbonate, chloride, albumin, total protein, ALP, ALT, AST, bilirubin, BUN, and creatinine. It is commonly used as part of a routine checkup and can help diagnose certain symptoms, screen for underlying issues, and monitor changes in your health over time. When your healthcare provider orders a CMP, they are looking to assess your overall health, monitor specific functions within your body, and identify any potential imbalances or abnormalities. By analyzing the levels of these substances, a CMP can provide valuable information about your liver and kidney function, electrolyte balance, blood glucose levels, protein levels, and general metabolic health. This comprehensive panel of tests allows healthcare professionals to gain insights into your body’s internal processes and make informed decisions regarding your healthcare. Analyze the table below to gain a better understanding of the different substances measured in a CMP and their significance: What does the CMP measure? The comprehensive metabolic panel (CMP) measures 14 separate substances in your blood to provide important insights into your overall health: • Glucose (blood sugar) • Calcium • Sodium • Potassium • Bicarbonate • Chloride • Albumin • Total protein • ALP (alkaline phosphatase) • ALT (alanine aminotransferase) • AST (aspartate aminotransferase) • Bilirubin • BUN (blood urea nitrogen) • Creatinine These measurements give valuable information about: • Overall health and wellness • Liver and kidney function • Electrolyte balance • Metabolism Abnormal levels of any of these substances can indicate various health conditions, and further evaluation or treatment may be necessary. Substance Normal Range Significance Glucose 70-99 mg/dL Measures blood sugar levels; high or low levels can indicate diabetes or other conditions. Calcium 8.5-10.5 mg/dL Provides information about bone health, nerve function, and muscle contractions. Sodium 135-145 mEq/L Helps maintain fluid balance and proper function of nerves and muscles. Potassium 3.5-5.0 mEq/L Essential for proper heart and muscle function, as well as maintaining fluid balance. Bicarbonate 22-28 mmol/L Indicates the body’s acid-base balance and kidney function. Chloride 98-106 mEq/L Plays a role in maintaining fluid balance and proper pH levels in the body. Albumin 3.5-5.0 g/dL Assesses liver and kidney function, as well as nutritional status. Total protein 6.0-8.3 g/dL Measures the overall balance of proteins in the blood, including albumin and globulin. ALP (alkaline phosphatase) 45-115 U/L Tests for liver and bone disease and assesses liver enzyme activity. ALT (alanine aminotransferase) 7-55 U/L Measures liver enzyme activity and helps diagnose liver disease. AST (aspartate aminotransferase) 8-48 U/L Indicates liver and heart health and helps diagnose liver and heart diseases. Bilirubin 0.1-1.2 mg/dL Tests liver function and helps diagnose liver disease, jaundice, and other conditions. BUN (blood urea nitrogen) 7-20 mg/dL Assesses kidney function and helps diagnose kidney disease. Creatinine 0.7-1.3 mg/dL (males) 0.6-1.1 mg/dL (females) Measures kidney function and helps diagnose kidney disease. When is a CMP appropriate? A comprehensive metabolic panel (CMP) may be appropriate in various circumstances. It serves multiple purposes, including but not limited to diagnostic, screening, and monitoring. Consultation with a healthcare provider is crucial to determine the necessity of a CMP based on individual symptoms and health concerns. Diagnostic Purposes In cases where individuals exhibit symptoms related to their kidneys, liver, or metabolism, a CMP may be prescribed for diagnostic purposes. This blood test helps healthcare providers identify and evaluate potential underlying health conditions. By measuring various substances in the blood, the CMP can provide vital information about kidney and liver function, electrolyte balance, and overall metabolism. Abnormal levels of these substances can indicate potential issues that require further evaluation and treatment. Screening Prior to Symptom Onset Additionally, a CMP can be utilized for screening individuals to detect health problems before symptoms become apparent. This proactive approach allows healthcare providers to identify potential risks and intervene early, promoting timely treatment and improved health outcomes. Screening with a CMP can provide insight into overall health status, liver and kidney function, glucose levels, and electrolyte balance. Monitoring Tool A CMP serves as a valuable monitoring tool that allows healthcare providers to track changes in an individual’s health over time. It facilitates the evaluation of treatment effectiveness and the assessment of potential side effects of medications that may impact the liver or kidneys. By regularly monitoring CMP results, healthcare providers can make informed decisions regarding treatment adjustments, ensuring the best possible outcomes for patients. Benefits of a CMP for Different Purposes Diagnostic Purposes Screening Monitoring • Evaluates kidney and liver function • Identifies potential health conditions • Guides further evaluation and treatment • Detects health problems before symptoms occur • Enables timely intervention • Promotes early treatment and improved outcomes • Assesses changes in health over time • Evaluates treatment effectiveness • Detects potential medication side effects Consultation with your healthcare provider is essential to determine whether a CMP is appropriate for your specific needs. By working together, you can ensure that the CMP is utilized effectively to address your health concerns and support optimal well-being. How is a CMP performed? A comprehensive metabolic panel (CMP) requires a blood sample to be taken from a vein in your arm. The blood sample is then sent to a laboratory for analysis. The CMP measures 14 different substances in your blood, including glucose, calcium, sodium, potassium, bicarbonate, chloride, albumin, total protein, ALP, ALT, AST, bilirubin, BUN, and creatinine. The process of performing a CMP typically involves the following steps: 1. You may be instructed to fast for several hours before the test. This means abstaining from food and drink, except for water, to obtain accurate results. 2. A healthcare professional will cleanse the area where the blood sample will be drawn, usually the inner elbow area. 3. A small needle will be inserted into a vein in your arm to collect the blood sample. You may feel a brief sting or discomfort during this step. 4. Once the blood sample is collected, the needle is removed, and pressure is applied to the puncture site to stop any bleeding. 5. The blood sample is then sent to a laboratory for analysis. After the CMP is performed, you can resume your normal activities. It’s essential to follow any specific instructions given by your healthcare provider, such as avoiding vigorous exercise or certain medications before the test. Steps of a CMP Step 1: Fasting Step 2: Cleansing the area Step 3: Blood sample collection Step 4: Pressure on the puncture site Step 5: Laboratory analysis What do the results of a CMP mean? The results of a CMP provide valuable insights into your overall health and can help identify any underlying health conditions. By measuring the levels of the 14 substances in your blood, a CMP determines if these levels fall within normal limits or if there are any abnormalities that require further evaluation or follow-up testing. Each substance measured in a CMP serves a specific purpose in assessing different aspects of your well-being. Let’s take a closer look at the substances measured in a CMP: Substance Purpose Glucose Assesses blood sugar levels Calcium Evaluates bone health and nerve function Sodium, Potassium, Bicarbonate, Chloride Determines electrolyte balance Albumin, Total Protein Measures liver and kidney function, as well as nutritional status ALP, ALT, AST Assesses liver health and function Bilirubin Detects liver or gallbladder disorders BUN, Creatinine Evaluates kidney function By analyzing these substances, healthcare providers can gain valuable insights into your liver and kidney health, blood glucose levels, protein levels, fluid and electrolyte balance, and overall metabolism. Abnormal results outside of the reference ranges for these substances may indicate potential health issues that require further investigation or medical attention. It’s crucial to discuss the results of your CMP with your healthcare provider who can provide a comprehensive interpretation based on your unique medical history, current symptoms, and overall health profile. They will consider the context of your results and determine the appropriate next steps, which may include further testing, treatment, or lifestyle modifications. Remember, interpreting CMP results requires the expertise of a healthcare professional to ensure accurate assessment and appropriate interventions. Open communication with your healthcare provider is key to understanding your CMP results and taking proactive steps towards optimizing your health. How to Interpret CMP Test Results? The interpretation of CMP test results is essential in understanding your overall health and identifying any potential health issues. To interpret these results, your healthcare provider will compare the levels of each substance measured in your blood to established reference ranges. These reference ranges may vary slightly depending on the laboratory that analyzed your sample. During the interpretation process, your healthcare provider will take into account various factors, including your individual health history, medications you may be taking, and any symptoms you may be experiencing. This comprehensive evaluation allows them to determine if any abnormalities in the test results are significant and require further investigation or treatment. If you have any questions or concerns about your CMP test results, it’s important to discuss them with your healthcare provider. They have the expertise to provide you with a clear understanding of the results and address any inquiries you may have. Cmp cpt code medicare Substance Normal Range Glucose (blood sugar) 70-99 mg/dL Calcium 8.5-10.5 mg/dL Sodium 135-145 mEq/L Potassium 3.5-5.0 mEq/L Bicarbonate 22-28 mEq/L Chloride 98-107 mEq/L Albumin 3.4-5.4 g/dL Total Protein 6.0-8.5 g/dL ALP (Alkaline Phosphatase) 30-120 U/L ALT (Alanine Aminotransferase) 8-37 U/L AST (Aspartate Aminotransferase) 8-37 U/L Bilirubin 0.1-1.2 mg/dL BUN (Blood Urea Nitrogen) 6-20 mg/dL Creatinine 0.6-1.3 mg/dL How to Obtain a CMP Test? If you are interested in getting a CMP test, you will need to consult with a healthcare provider who can order the test for you. The CMP test is typically performed in a medical laboratory, office, or clinic, as it requires specialized equipment and expertise. While you cannot perform a CMP test at home, there may be at-home test kits available that include some of the components of the panel. However, it’s important to note that for a complete CMP, you will need to have your blood sample collected in a medical setting. When considering where to get a CMP test, it’s important to choose a reputable healthcare provider or laboratory. You can start by checking with your primary care physician or visiting a local clinic. They will be able to assess your specific healthcare needs and order the CMP test if it is deemed necessary. Once you have scheduled the CMP test, you will need to visit the designated healthcare facility on the appointed day and time. A trained healthcare professional will collect a blood sample from a vein in your arm using a small needle. The procedure itself is relatively quick and typically causes minimal discomfort. It’s important to follow any instructions provided by your healthcare provider regarding fasting or other preparations before the test. This will help ensure accurate results and a smooth testing process. Remember, the CMP test is a valuable tool in assessing your overall health and detecting potential health issues. By obtaining a CMP test, you are taking proactive steps towards maintaining your well-being and staying informed about your metabolic health. Steps to Obtain a CMP Test Consult with a healthcare provider Order the CMP test Visit a medical laboratory, office, or clinic Have your blood sample collected Follow any instructions provided by your healthcare provider What is the cost of a CMP test? The cost of a Comprehensive Metabolic Panel (CMP) test can vary depending on several factors, including insurance coverage, the location where the test is performed, and any additional fees associated with the test. To obtain specific information about the expected costs of a CMP test, including copays and deductibles, we recommend contacting your doctor’s office and insurance provider. If your insurance plan does not cover the cost of a CMP test or if you do not have insurance, there may be alternative options to consider. You may be able to use flexible spending accounts (FSA) or health savings accounts (HSA) to pay for testing. These accounts allow you to set aside pre-tax dollars to cover medical expenses, including diagnostic tests like a CMP. It’s important to understand the potential costs associated with a CMP test and explore any available payment options to ensure that you can access the necessary healthcare services. Discussing your financial concerns with your healthcare provider or insurance representative can help you make informed decisions about your healthcare. Additional Information: Understanding the cost of a CMP test is crucial for individuals seeking healthcare services. Here are a few important points to consider: • The cost of a CMP test can vary depending on the healthcare provider and location. Different facilities may have different pricing structures. • Insurance coverage can significantly impact the out-of-pocket cost for a CMP test. It’s important to review your insurance plan and understand any deductibles, copays, or coinsurance requirements. • If you are uninsured or your insurance plan doesn’t cover the cost of a CMP test, exploring alternative payment options like FSAs or HSAs might be beneficial. • Discussing the cost of a CMP test with your healthcare provider and insurance representative can help you make informed decisions about your healthcare and financial obligations. By understanding the potential cost and exploring available options, individuals can navigate the financial aspect of healthcare and ensure access to necessary diagnostic tests like the CMP. Preparing for a CMP Test In preparation for a comprehensive metabolic panel (CMP) test, there are a few important steps to follow to ensure accurate results. By taking the necessary precautions, you can help your healthcare provider obtain the most reliable information about your health. Fasting Before the Test Typically, you will be required to fast for several hours before the CMP test. Fasting means abstaining from food and drinks, except for water. The fasting period may vary, so it’s crucial to follow any specific instructions provided by your healthcare provider. Fasting allows for more accurate measurements of certain substances in your blood, such as glucose and electrolytes, which can be affected by recent food or beverage intake. Informing Your Doctor Before undergoing a CMP test, it’s essential to inform your doctor about any medications, vitamins, or dietary supplements you are taking. Certain substances can alter the levels of chemicals in your blood, potentially affecting the test results. By disclosing this information, your healthcare provider can consider these factors when interpreting your CMP results and ensure accurate diagnosis and treatment recommendations. Preparing for a cmp test What to Expect During the Test A CMP test involves a simple blood draw, usually from a vein in your arm, which is collected by a healthcare professional. The procedure itself is relatively quick and may only cause minimal discomfort, such as a slight prick or stinging sensation when the needle is inserted. After the blood sample is taken, a bandage or swab will be applied to the puncture site to stop any bleeding. You can resume your normal activities immediately following the test. It’s important to note that the CMP is a routine test performed in various healthcare settings, including clinics, medical offices, and laboratories. It cannot be performed at home unless you have access to proper equipment and trained professionals. By following these guidelines and being well-prepared, you can ensure an effective and accurate CMP test. Remember to always consult with your healthcare provider for specific instructions and guidance based on your individual circumstances. What to Expect During a CMP Test When you undergo a Comprehensive Metabolic Panel (CMP) test, a healthcare professional will collect a blood sample from a vein in your arm using a small needle. The procedure is typically quick and lasts less than five minutes. Although you may experience minimal discomfort, such as a brief sting when the needle is inserted, it is generally well-tolerated. After the blood sample is collected, the needle is carefully removed, and a bandage or swab may be applied to the puncture site to stop any bleeding. You can usually resume your normal activities immediately after the test. Having a clear understanding of what to expect during a CMP test can help alleviate any concerns or anxiety you may have about the procedure. Procedure Duration Discomfort Aftercare Blood sample collection from a vein in your arm Less than five minutes Minimal (brief sting during needle insertion) Bandage or swab applied to stop bleeding Receiving and Interpreting CMP Results Once you have completed a comprehensive metabolic panel (CMP) test, you can expect to receive the results within a few business days. There are several ways in which you may receive your results, such as through a phone call from your healthcare provider, by mail, or via an online health portal. No matter the method of communication, the results will provide essential information about the levels of each substance tested and how they compare to reference ranges. Healthcare providers are highly skilled in interpreting CMP results. They take into account various factors, including your overall health, any symptoms you may be experiencing, and the specific reference ranges used by the laboratory that analyzed your blood sample. This comprehensive evaluation allows them to assess any abnormalities in the results and determine the most appropriate next steps for your care. Now, let’s take a look at an example table to help you better understand how CMP results are typically presented: Substance Result Reference Range Glucose 92 mg/dL 70-99 mg/dL Calcium 9.1 mg/dL 8.5-10.5 mg/dL Sodium 138 mmol/L 135-145 mmol/L Potassium 4.2 mmol/L 3.5-5.1 mmol/L This table displays the results of four substances commonly measured in a CMP, along with their corresponding reference ranges. Your individual results may vary, but this example demonstrates how the levels of each substance are compared to established ranges to determine if they fall within normal limits. It is important to note that if any of your CMP results are outside the reference range, it does not necessarily indicate a health problem. Your healthcare provider will use their expertise to consider your overall health, medical history, and symptoms to determine if further evaluation or follow-up testing is necessary. Remember, discussing your CMP results with your healthcare provider is crucial for proper interpretation and guidance. They are equipped to provide you with a comprehensive understanding of your results and help you navigate any necessary next steps. Understanding the Reference Range in CMP Results When you receive the results of a Comprehensive Metabolic Panel (CMP), you will notice the reference range associated with each measured substance. The reference range represents the values considered normal for each specific substance. It is crucial to understand that different laboratories may use slightly different reference ranges due to variations in testing methods. These variations can occur based on factors such as the equipment used, calibration techniques, and specific patient demographics. Therefore, it is essential for your healthcare provider to evaluate your CMP results in the context of the specific reference range used by the laboratory that analyzed your sample. This ensures an accurate interpretation of the results and appropriate assessment of any potential abnormalities. By comparing your results to the applicable reference range, your healthcare provider can determine if your levels fall within the normal range or if there are any concerning deviations that require further investigation or treatment. To provide you with a clearer understanding, let’s take a look at a sample reference range table: Substance Reference Range Glucose 70-99 mg/dL Calcium 8.5-10.5 mg/dL Sodium 135-145 mmol/L Potassium 3.5-5.0 mmol/L Bicarbonate 23-29 mmol/L Chloride 98-106 mmol/L Albumin 3.4-5.0 g/dL Total Protein 6.0-8.3 g/dL ALP (Alkaline Phosphatase) 39-117 U/L ALT (Alanine Aminotransferase) 0-44 U/L AST (Aspartate Aminotransferase) 0-40 U/L Bilirubin 0.2-1.2 mg/dL BUN (Blood Urea Nitrogen) 7-20 mg/dL Creatinine 0.6-1.2 mg/dL Remember, it is essential to interpret your CMP results in consultation with your healthcare provider who can provide personalized insights based on your medical history, overall health, and symptoms. CMP vs. BMP: What’s the difference? A basic metabolic panel (BMP) is a similar test to a CMP, but it includes only eight of the 14 substances measured in a CMP. The eight components common to both tests are glucose, calcium, sodium, potassium, bicarbonate, chloride, BUN, and creatinine. The additional substances measured in a CMP include albumin, total protein, ALP, ALT, AST, and bilirubin. The choice between a CMP and a BMP depends on the specific healthcare needs and considerations of an individual patient. CMP vs. BMP Comparison Substances Measured CMP BMP Glucose Calcium Sodium Potassium Bicarbonate Chloride BUN Creatinine Albumin Total Protein ALP ALT AST Bilirubin Note: ✓ indicates that the substance is measured in the panel, while – indicates that the substance is not included in the panel. Importance and Benefits of CMP Testing CMP testing plays a crucial role in assessing overall health, diagnosing various conditions, monitoring treatment effectiveness, and screening for potential health issues. By measuring a comprehensive set of substances in the blood, CMP testing provides valuable insights into liver and kidney function, metabolism, electrolyte balance, and protein levels. This comprehensive analysis enables healthcare providers to identify abnormalities and develop appropriate treatment plans, ensuring the safety and well-being of patients. Key Benefits of CMP Testing 1. Early Detection of Health Problems: CMP testing helps detect health problems before symptoms appear, allowing for early intervention and more effective treatment. 2. Effective Diagnosis: By evaluating the levels of essential substances in the blood, CMP testing aids in diagnosing various conditions, such as liver and kidney diseases, metabolic disorders, and electrolyte imbalances. 3. Treatment Monitoring: CMP testing serves as a valuable tool for monitoring the effectiveness of treatment plans, ensuring that interventions are on the right track to improving health outcomes. 4. Screening for Health Issues: Regular CMP testing can help screen for potential health issues, providing an opportunity for timely intervention and prevention of more serious complications. 5. Comprehensive Health Assessment: By assessing multiple aspects of health, CMP testing offers a comprehensive view of an individual’s overall well-being, allowing healthcare providers to tailor care plans to meet specific needs. Overall, CMP testing is a valuable tool in modern healthcare, providing essential information that guides treatment decisions, identifies potential health risks, and promotes timely interventions. By leveraging the benefits of CMP testing, healthcare providers can optimize patient care, improve health outcomes, and ensure the well-being of individuals. Conclusion The comprehensive metabolic panel (CMP) is a crucial component of healthcare, providing essential insights into overall health, diagnosing conditions, monitoring treatment progress, and screening for potential issues. By assessing various substances in the blood, including glucose, calcium, sodium, potassium, albumin, total protein, liver enzymes, bilirubin, BUN, and creatinine, the CMP offers valuable information that helps individuals take an active role in their healthcare. Understanding the significance of the CMP empowers individuals to effectively communicate with healthcare providers and make informed decisions about their well-being. By utilizing the information obtained from the CMP, patients can collaborate with their healthcare team to tailor treatment plans, manage conditions effectively, and ensure the best possible outcomes. The CMP plays a pivotal role in promoting optimal healthcare results and enhancing the quality of patient care. In summary, the CMP is an indispensable tool that provides comprehensive insights into an individual’s metabolic profile. From evaluating organ function to determining electrolyte balance, the CMP offers a holistic understanding of various aspects of health. By leveraging the information derived from the CMP, patients and healthcare providers can work together to optimize health outcomes and foster a proactive approach to well-being. FAQ What is a CMP? A comprehensive metabolic panel (CMP) is a routine blood test that measures 14 different substances in a sample of your blood. It provides information about your metabolism and the balance of certain chemicals in your body. What does the CMP measure? The CMP measures 14 separate substances in your blood, including glucose, calcium, sodium, potassium, bicarbonate, chloride, albumin, total protein, ALP, ALT, AST, bilirubin, BUN, and creatinine. These measurements provide important information about your overall health, liver and kidney function, electrolyte balance, and metabolism. When is a CMP appropriate? A CMP may be appropriate in various circumstances, such as for routine checkups, diagnostic purposes, treatment guidance, and treatment effectiveness monitoring. How is a CMP performed? A CMP requires a blood sample, which is typically taken from a vein in your arm. The sample is then analyzed in a laboratory to measure the 14 substances included in the panel. The test is usually done after fasting for several hours, and the blood draw itself takes just a few minutes. What do the results of a CMP mean? The results of a CMP provide the levels of each of the 14 substances measured in your blood. These levels are compared to reference ranges to determine if they fall within normal limits. Abnormal results may indicate underlying health conditions and may require further evaluation or follow-up testing. How to interpret CMP test results? The interpretation of CMP test results involves comparing the levels of each measured substance to established reference ranges. Your healthcare provider will consider your individual health history, medications you may be taking, and other factors to determine if any abnormalities in the test results are significant and require further investigation or treatment. How to obtain a CMP test? To obtain a CMP test, you will need to consult with a healthcare provider who can order the test for you. The test is typically performed in a medical laboratory, office, or clinic. What is the cost of a CMP test? The cost of a CMP test can vary depending on factors such as insurance coverage, the location where the test is performed, and any additional fees associated with the test. It’s best to contact your doctor’s office and insurance provider to obtain specific information about expected costs, including copays and deductibles. Preparing for a CMP test In preparation for a CMP test, you may be required to fast for several hours before the test. This typically involves abstaining from food and drink, except for water. It’s also important to inform your doctor about any medications or dietary supplements you are taking, as these may affect the test results. What to expect during a CMP test During a CMP test, a healthcare professional will take a blood sample from a vein in your arm using a small needle. The procedure usually takes less than five minutes and may cause minimal discomfort, such as a brief sting when the needle is inserted. Receiving and interpreting CMP results After a CMP test, the results are typically available within a few business days. Your healthcare provider may contact you to discuss the results or you may receive them through mail or an online health portal. The results will include the levels of each tested substance and their comparison to reference ranges. Understanding the reference range in CMP results The reference range in CMP results represents the range of values considered normal for each measured substance. Your healthcare provider will evaluate your CMP results in the context of the specific reference range used by the laboratory that analyzed your sample. CMP vs. BMP: What’s the difference? A basic metabolic panel (BMP) is a similar test to a CMP, but it includes only eight of the 14 substances measured in a CMP. The choice between a CMP and a BMP depends on the specific healthcare needs and considerations of an individual patient. Importance and benefits of CMP testing CMP testing is valuable for assessing overall health, diagnosing various conditions, monitoring treatment effectiveness, and screening for potential health issues. By identifying abnormalities in liver and kidney function, metabolism, electrolyte balance, and protein levels, healthcare providers can guide appropriate treatment plans, manage conditions effectively, and ensure patient safety and well-being. Leave a Comment Your email address will not be published. Required fields are marked * Scroll to Top Skip to content
Unverified Commit 47989e0a authored by kiasoc5's avatar kiasoc5 Committed by Liliana Marie Prikler Browse files gnu: ugrep: Build with zstd support. * gnu/packages/search.scm (ugrep)[inputs]: Add zstd lib. Signed-off-by: default avatarLiliana Marie Prikler <liliana.prikler@gmail.com> parent d457a5ec ......@@ -696,7 +696,8 @@ (define-public ugrep lz4 lzip ;; lzma pcre2 zlib)) zlib `(,zstd "lib"))) (arguments `(#:tests? #f ; no way to rebuild the binary input files #:test-target "test" ...... Supports Markdown 0% or . You are about to add 0 people to the discussion. Proceed with caution. Finish editing this message first! Please register or to comment
Origin This is the inner bark of Cerasus serolina, or wild-cherry, a large indigenous tree, growing abundantly in the Middle and Western States. The officinal name originated in the mistaken supposition, that the Prunus Viryiniana of Linnaeus was the tree in question; whereas, according to Torrey and Gray, that title really belongs to the choke-cherry (Cerasus Virginiana of the N. American Flora), a small tree or shrub, inhabiting the Northern States. The bark is obtained from the root, stem, and branches of the tree; but that from the root is preferred. It should be collected in the autumn, when it is strongest. The recently dried bark is more efficacious than that which has been long kept. Sensible Properties. Wild-cherry bark, as found in the shops, is usually destitute of epidermis, of a reddish-yellow colour, brittle, and easily pulverized, yielding a fawn-coloured powder. When fresh, or treated with water, it has the odour of peach-leaves. The taste is agreeably bitter, astringent, and somewhat aromatic. It yields its bitterness to water, to which it imparts a reddish-brown colour like that of Madeira wine. Active Constituents. Among the active principles existing in the bark are amygdalin and tannic acid. There is probably also some emulsin, a kind of nitrogenous or albuminous matter, found in the bitter almond, where it plays an essential part in changes, analogous if not identical with those which are now to be noticed as occurring in wild-cherry bark. When this bark conns in contact with water, a reaction takes place, under the influence of the emulsin operating as a ferment, between the water and the amygdalin of the bark, whereby the latter is converted into a peculiar volatile oil and hydrocyanic acid, which may be obtained together by distillation, constituting a product which is probably identical with the volatile oil of bitter almonds. When, therefore, wild-cherry bark is used in the form of infusion, it is not merely the amygdalin and tannic acid which act, but the new product also, which is essentially, in relation to its effects on the system, the hydrocyanic acid; for the volatile oil which attends it has little effect. When the medicine is taken in the form of powder, it is highly probable that the same change takes place in the stomach, under the reagency of the water there. It is a question whether the bark does or does not contain a bitter principle distinct from amygdalin. I believe that it does so, not only from its tonic effects, which cannot be ascribed either to the volatile oil or hydrocyanic acid, but from an experiment made at my request by Professor Procter, which appears to determine the question.* Though boiling water will extract the active matters existing in the bark, yet cold water is medicinally the best solvent; for the emulsin is coagulated and rendered inert at a high temperature, and the formation of hydrocyanic acid consequently prevented. * A portion of the bark was exhausted by alcohol, and the tincture evaporated to an extract. This contained the amygdalin, and whatever bitter matter and tannic acid existed in the bark. The extract was triturated with water, and with gelatin to remove the tannic acid. The liquor being then filtered, was mixed with an excess of the emulsion of sweet almonds, containing of course the emulsin necessary for causing reaction between the amygdalin and water. A strong odour of hydrocyanic acid was produced, which had not previously existed in the solution of the alcoholic extract. As the emulsin was in excess, the whole of the amygdalin must have been destroyed. The liquid was evaporated to a soft extract, and mixed with water. Sweet almond emulsion now added generated no more hydrocyanic acid. Effect* on the System. Wild-cherry bark is, through its bitter principle, a gentle stimulant to the digestive and probably to the nutritive function; while the hydrocyanic acid, evolved by the reaction of water with the amygdalin, renders it sedative to the nervous system, and, when freely taken, to the general circulation. Dr. Eberle states that, in his own person, he has "several times reduced his pulse from seventy-five to fifty strokes in the minute by copious draughts of the cold infusion, taken several times a day, and continued for twelve or fourteen days." {Mat. Med. and Therap., 4th ed., i. 301). Therapeutic Application The joint tonic and sedative properties of this bark admirably adapt it to the treatment of cases of general debility, with enfeebled digestion, an irritable state of the nervous system, and excessive frequency of pulse. Long before its chemical peculiarities were discovered, experience had established this application of the remedy. In the treatment of pulmonary consumption, it has for many years been a favourite in this country, and, before cod-liver oil came into notice, was probably more relied on than any other single medicine. It was employed not only in the advanced stages when hectic fever had set in, but from the beginning, and often as a preventive, in cases in which a strong tendency to the disease seemed to be displayed. It was given with the view of imparting tone to the digestive organs and system generally, and thereby modifying the tuberculous diathesis, and was preferred to other tonics, because it was thought to produce these effects with less danger of undue excitement. Now that it is known to be positively sedative to the heart, and to the nervous system, we can better understand its usefulness in that complaint. In other forma of scrofulous disease, presenting a similar complication of debility of the digestive and nutritive functions with frequency of the pulse, it is equally indicated. Few remedies are better adapted to hectic fever, from whatever source it may proceed. In the debility of convalescence from fevers, and other severe acute diseases, when attended, as it often is, with night-sweats, a frequent pulse, and sleeplessness, restlessness, or other functional nervous disorder, the wild-cherry bark is also an excellent remedy. Perhaps the tannic acid it contains may contribute to its usefulness in correcting the excessive sweating in these cases; but I am not inclined to attribute much to that principle in estimating the virtues of the bark. It has been recommended also in simple dyspepsia, and as an antiand there was none of the peculiar odour of that product; yet the taste was decidedly bitter, proving the existence in the bark of a bitter principle distinct from amygdalin. periodic in intermittents; but in the former it is much inferior to the pure bitters, and in the latter, though sometimes successful, it very often also fails, and is not comparable in efficacy with Peruvian bark. It may be employed, however, in cases of convalescence from miasmatic fevers, in which there is a strong tendency to relapse, and in which a long continuance of the preventive influence may be necessary for the eradication of the predisposition. In such cases, though less effectual than sulphate of quinia, it may perhaps be safer. I have employed the remedy much in functional and organic disease of the heart, attended with a frequent, perhaps irregular, but rather feeble pulse, with an anemic or otherwise debilitated state of system; and consider it one of our best remedies in such cases, combined, if anaemia exist, with the use of the chalybeates. As the infusion, however, contains tannic acid, it is better not to add the preparation of iron to it, but to administer the two separately. Administration The bark may be given in the form of powder, infusion, or syrup. The powder is seldom used, because less convenient, more apt to oppress the stomach, and less likely to undergo those chemical changes which are essential to the characteristic effects of the remedy. The dose is from thirty grains to a drachm, which may be repeated three or four times daily. The Infusion made with cold water (Infusum Pruni Virginianae, U. S.) is the most appropriate form. It is made in the proportion of half an ounce to the pint of water, and is best prepared by the proce-percolation. Any one can perform this process. Introduce an ounce of the bark, in the state of powder, into a common funnel, pack it somewhat closely, and pour upon it a quart of cold water; the point of the funnel being inserted into the mouth of a glass decanter. When the water has all passed, pour it back into the funnel, and repeat this measure until the liquid acquires the colour of Madeira wine. Two fluidounces of the infusion, thus prepared, may be given three or four times a day, or more frequently when a strong impression is desired. A Syrup (Syrupus Pruni Virginianae, U. S.) is directed by our Pharmacopoeia. It is an elegant preparation, and, where there is no contraindication, from delicacy of stomach or other cause, to the use of so much saccharine matter, may be substituted without disadvantage for the infusion. The dose is half a fluidounce, to be repeated as directed for the other forms. A Fluid Extract (Extractum Pruni Virginians Fluidum, U. S.) was introduced into the last edition of the Pharmacopoeia. It is prepared according to a very ingenious process suggested by Professor Procter, by which the virtues of the bark are obtained in a very concentrated form. The dose is one or two fluidrachms, equivalent to half a drachm or a drachm of the bark in substance. (See U. S. Dispensatory, 11th ed., p. 628). Wild-cherry bark should not be prepared in the form of tincture, extract, or decoction. In reference to the two latter, independently of the chemical objection above stated, there is another in the volatile character of the hydrocyanic acid, which, if formed, would be driven off, to a greater or less extent, in the processes for their preparation.
18.7 Îâîùè, ôðóêòû, îðåõè, ãðèáû è ÿãîäû îáðàáîòàííûå, ñóøåíûå è êîíñåðâèðîâàííûå, çàìîðîæåííûå [ Íàçàä | Íà÷àëî | Íàâåðõ ] Êàê ðàñòåíèå âñåãäà ñòðåìèòñÿ ê ñâåòó, òàê è íàø îðãàíèçì æàæäåò ñîâåðøåíñòâà. Íî ìíîãèå ëþäè áîëåþò, òåðÿþò óâåðåííîñòü â ñåáå, íå äîñòèãàþò óñïåõà, óõîäÿò ïðåæäåâðåìåííî èç Æèçíè ãëàâíûì îáðàçîì èç-çà ïèùè, êîòîðóþ îíè åäÿò èëè êîòîðîé îíè ïî ðàçëè÷íûì ïðè÷èíàì íå ïîëó÷àþò. À ìåæäó òåì ñî âñåì ýòèì ìîæíî áûëî áû ïîêîí÷èòü, åñëè ïðèäåðæèâàòüñÿ îïðåäåëåííûõ ïðèíöèïîâ. Ïðèíöèï âòîðîé. Ñîáëþäàòü åñòåñòâåííûå (ôèçèîëîãè÷åñêèå) öèêëû îðãàíèçìà ïðè ïðèåìå ïèùè (ò. å. çíàòü, êîãäà åñòü, à êîãäà ýòîãî äåëàòü íå ñëåäóåò). Ïðèíöèï òðåòèé. Çíàòü ñâîéñòâà âñåõ êîìïîíåíòîâ ïèùè ÷åëîâåêà (ò. å. çíàòü, ÷òî ïîëåçíî, à ÷òî âðåäíî). Ïðèíöèï ïÿòûé. Çàáîòèòüñÿ, ÷òîáû ïèòàíèå ôîðìèðîâàëî çäîðîâûå êëåòêè ìîçãà, æåëåç âíóòðåííåé ñåêðåöèè, íåðâîâ, ò. å. îðãàíîâ, îò êîòîðûõ çàâèñÿò âñå æèçíåííûå ïðîöåññû è ãàðìîíè÷íîå ðàçâèòèå ëè÷íîñòè. Ïèùó ñ âûñîêèì ñîäåðæàíèåì ýíåðãèè Ñâåòà, Âîçäóõà, Âîäû îáû÷íî íàçûâàþò "îðãàíè÷åñêîé", "æèâîé", "åñòåñòâåííîé", "íàòóðàëüíîé". Îíà áîãàòà âñåìè ýíçèìàìè, âåùåñòâàìè è ìèêðîýëåìåíòàìè, íåîáõîäèìûìè äëÿ ÷åëîâåêà. Èìåííî ýòè èíãðåäèåíòû ñîçäàþò íàøè êëåòêè, òêàíè, îðãàíû, ñèñòåìû, òåëî. Ïèùó, êîòîðàÿ ïîäâåðãàëàñü òåïëîâîé îáðàáîòêå, íàçûâàþò "ìåðòâîé", "êîíöåíòðèðîâàííîé". Îíà íå ìîæåò íàì äàòü æèçíåííóþ ñèëó, òàê êàê ýíçèìû, ñîäåðæàâøèåñÿ â íåé, ðàçðóøåíû. Ñèëüíî ïîäîãðåòàÿ ïèùà òåðÿåò äî 75% ñâîèõ ñëîæíûõ ñîåäèíåíèé è ôåðìåíòîâ. Äëÿ òîãî ÷òîáû âîñïîëíèòü ïîòåðþ ïèòàòåëüíûõ ýëåìåíòîâ, íàø îðãàíèçì íåèçáåæíî íà÷èíàåò òðåáîâàòü áîëüøå ïèùè. Òàê ìû ïðèîáðåòàåì ïðèâû÷êó ïåðååäàòü. À òàêàÿ ïðèâû÷êà - îäíà èç ãëàâíûõ ïðè÷èí æåëóäî÷íûõ, ïå÷åíî÷íûõ, ñåðäå÷íî-ñîñóäèñòûõ, ïî÷å÷íûõ, ýíäîêðèííûõ è äðóãèõ çàáîëåâàíèé, íå ãîâîðÿ óæå îá èçëèøíåé ìàññå òåëà. Áîëüøàÿ ÷àñòü ïèùè, êîòîðóþ ìû îáû÷íî óïîòðåáëÿåì, -âàðåíàÿ. Ëþáàÿ âàðåíàÿ ïèùà çàñîðÿåò íàø îðãàíèçì è âûçûâàåò áîëåçíè. Ìû íà÷èíàåì ïðèíèìàòü ìåðû, íî ïðè ýòîì - ïàðàäîêñ ! - ïðîäîëæàåì óïîòðåáëÿòü òó æå ïèùó! Î÷èùåíèå, ïåðåâàðèâàíèå, óñâîåíèå ïèùè, à çàòåì âûäåëåíèå ïðîäóêòîâ ðàñïàäà òðåáóþò îò îðãàíèçìà êîëîññàëüíîé ýíåðãèè. Ïðè óïîòðåáëåíèè ïèòàòåëüíûõ âåùåñòâ îðãàíèçì òåðÿåò ýíåðãèþ Æèçíè â ïîëòîðà ðàçà áîëüøå, ÷åì ïðè ïðèåìå "íåïèòàòåëüíûõ" (îâîùåé è ôðóêòîâ). Èçâåñòíûì íåìåöêèì ó÷åíûì Ðóáíåðîì ïîäñ÷èòàíî, ÷òî åñëè âî âðåìÿ ãîëîäà îðãàíèçì ðàñõîäóåò íà ôèçèîëîãè÷åñêèå ïðîöåññû 100 åäèíèö ýíåðãèè, òî ïðè ïèòàíèè óãëåâîäàìè -106,4 åäèíèöû; æèðàìè - 114,5; à áåëêàìè - óæå 140 åäèíèö. Ñëåäîâàòåëüíî, ñàìûé ýêîíîìè÷íûé èñòî÷íèê ïèòàíèÿ -óãëåâîäû, à íàèìåíåå âûãîäíûé - áåëêè. Ïîïðîñòó ãîâîðÿ, ôðóêòû, îâîùè, ìåä, îðåõè ãîðàçäî ëåã÷å óñâàèâàþòñÿ, ìåíüøå çàáèðàþò ó îðãàíèçìà ýíåðãèè íà ïåðåâàðèâàíèå, ÷åì ìÿñî, ïòèöà, ðûáà, ÿéöà, çåðíî, ìîëî÷íûå ïðîäóêòû, ñûð è äð. Òîëüêî ðàñòèòåëüíàÿ ïèùà â åñòåñòâåííîì âèäå ìîæåò ñîäåðæàòü â ñâîèõ êëåòêàõ ìíîãî ñîëíå÷íîé ýíåðãèè, âèòàìèíîâ, ìèêðîýëåìåíòîâ, àìèíîêèñëîò, ôåðìåíòîâ. Ýíåðãèÿ ñâåòà, âîçäóõà, âëàãè, ýíçèìû, àìèíîêèñëîòû íàêàïëèâàþòñÿ â ñòåáëÿõ, ïî÷êàõ è ïëîäàõ ðàñòåíèé, î ÷åì ìû, ê ñîæàëåíèþ, ïîñòîÿííî çàáûâàåì. Ôðóêòû è îâîùè - ñàìàÿ öåííàÿ è ñûòíàÿ ïèùà äëÿ ÷åëîâåêà. Èìåííî îíà ÿâëÿåòñÿ ïðåêðàñíûì ïîñòàâùèêîì âñåõ èíãðåäèåíòîâ â èäåàëüíî ñáàëàíñèðîâàííîì ñîîòíîøåíèè êèñëîò è ùåëî÷åé. Ñûðàÿ ïèùà òðåáóåò õîðîøåãî ïåðåæåâûâàíèÿ è äëèòåëüíîé îáðàáîòêè ñëþíîé, ÷òî óñèëèâàåò è óëó÷øàåò ñëþííîå ïåðåâàðèâàíèå. Ýòî óêðåïëÿåò æåâàòåëüíûé àïïàðàò è çóáû, ðàáîòó êèøå÷íîãî òðàêòà, ïîäãîòàâëèâàåò âûäåëèòåëüíûå ñïîñîáíîñòè êèøå÷íèêà ê àêòèâíîé ðàáîòå. Îíà ñêîðåå íàñûùàåò, ò. å. îíà ýêîíîìè÷íåå, íå ñîäåðæèò âðåäíûõ äëÿ çäîðîâüÿ ïðèìåñåé - êðàñèòåëåé, ìåòàëëè÷åñêèõ êèñëîò è ò. ä., êîòîðûìè âñåãäà áîãàòà âàðåíàÿ ïèùà. È ãëàâíîå - íàòóðàëüíàÿ ïèùà îáëàäàåò öåëèòåëüíûìè ñâîéñòâàìè: åå ñîêè áûñòðî óñâàèâàþòñÿ êðîâüþ, à êëåò÷àòêà ñëóæèò ïðåêðàñíûì î÷èñòèòåëåì. Ñûðîÿäåíèå - ëó÷øåå ñðåäñòâî ïðîòèâ âÿëîñòè êèøîê. Ñûðàÿ ïèùà óäà÷íî ïðèìåíÿåòñÿ â òåðàïèè ïðè ëå÷åíèè ñåðäå÷íûõ, ïî÷å÷íûõ, îáìåííûõ áîëåçíåé, ïðè îæèðåíèè, ðåâìàòèçìå, àòåðîñêëåðîçå, êîæíûõ è äðóãèõ áîëåçíÿõ, òàê êàê îíà áåäíà ñîëüþ, èñêóññòâåííûìè äîáàâêàìè, áåëêàìè, ïðåïÿòñòâóåò îáðàçîâàíèþ ìî÷åâîé êèñëîòû. Åñëè âû õîòèòå æèòü â ïîëíóþ ñèëó, áûòü çäîðîâûìè, íàõîäèòüñÿ â íàèëó÷øåé ôîðìå, âûãëÿäåòü ìîëîäûìè, âû äîëæíû åñòü êàê ìîæíî áîëüøå "æèâûõ" ïðîäóêòîâ (äî 70%).  òîì ñëó÷àå, åñëè â âàøåì ðàöèîíå ïèùà ñ âûñîêèì ñîäåðæàíèåì ýíåðãèè ñâåòà, âîçäóõà âîäû è âñåõ óêàçàííûõ èíãðåäèåíòîâ íå ïðåîáëàäàåò, ïîñòàðàéòåñü ñäåëàòü òàê, ÷òîáû åå áûëî ñ êàæäûì äíåì âñå áîëüøå è áîëüøå. Êîíå÷íî, ÷òîáû ïðåîäîëåòü ñëîæèâøèåñÿ ãîäàìè ïðèâû÷êè, ïîòðåáóåòñÿ âðåìÿ. Íî ïîñòåïåííî, èñïîëüçóÿ íîâûå çíàíèÿ, âû ïðèîáðåòàåòå íîâûå çäîðîâûå ïðèâû÷êè. Ïîýòîìó ñîâåòóþ âàì âîñïîëüçîâàòüñÿ îäíèì èç ïðàâèë Ñèñòåìû çäîðîâüÿ Íèøè: â òîì ñëó÷àå, åñëè âû ïðèíÿëè íåíàòóðàëüíóþ (âàðåíóþ) ïèùó, ïîñòàðàéòåñü âñå æå ñî÷åòàòü åå ñ ñûðûìè îâîùàìè è çåëåíüþ ïåòðóøêè, óêðîïà, êèíçû, ñåëüäåðåÿ è ò. ä. Ïðè ýòîì ñûðûõ ïðîäóêòîâ äîëæíî áûòü â 3 ðàçà áîëüøå, ÷åì âàðåíûõ. Íàïðèìåð, 100 ã ìÿñà è 300 ã ñàëàòà èç ñâåæèõ îâîùåé èëè 150 ã ðûáû è 450 ã ñâåæåãî îâîùíîãî ñàëàòà. Íî íè â êîåì ñëó÷àå - âàðåíîãî èëè æàðåíîãî êàðòîôåëÿ, êàøè, ëàïøè. Îâîùè òðåáóþòñÿ îðãàíèçìó êàæäûé äåíü âî âñå âðåìåíà ãîäà. Îíè - íåèñ÷åðïàåìûé ðîäíèê çäîðîâüÿ. Ïðè ïðàâèëüíîì èõ ïîäáîðå îðãàíèçì îáåñïå÷èâàåòñÿ íå òîëüêî óãëåâîäàìè, æèðàìè, âèòàìèíàìè, ìèíåðàëüíûìè âåùåñòâàìè, íî è â çíà÷èòåëüíîé ñòåïåíè áåëêàìè, êîòîðûå ôîðìèðóþòñÿ íàøèì îðãàíèçìîì èç àìèíîêèñëîò. Åñëè â ïèòàíèè ïðåîáëàäàþò ðàçíîîáðàçíûå îâîùè, ëþäè ìåíüøå áîëåþò è äîëüøå æèâóò. Äíåâíàÿ íîðìà ïîòðåáëåíèÿ îâîùåé, êðîìå êàðòîôåëÿ, äîëæíà ñîñòàâëÿòü äëÿ âçðîñëîãî ÷åëîâåêà îò 300 äî 400 ã. Ýòî êîëè÷åñòâî íóæíî ñîõðàíèòü è çèìîé, è â âåñåííèå ìåñÿöû. Íåäîñòàòîê ðàííåé âåñíîé â ïèòàíèè îâîùåé ÿâëÿåòñÿ îäíîé èç ïðè÷èí ñíèæåíèÿ ñîïðîòèâëÿåìîñòè îðãàíèçìà èíôåêöèîííûì è ïðîñòóäíûì çàáîëåâàíèÿì. Ìû äîëæíû âñåãäà ïîìíèòü ñîâåòû ôèçèîëîãîâ: íè îäíîãî îáåäà, çàâòðàêà èëè óæèíà íå äîëæíî áûòü áåç ñâåæèõ ñûðûõ îâîùåé. Âàðåíûå îâîùè òàê æå âðåäíû, êàê è ìÿñî. Íî ïèòàòåëüíóþ öåííîñòü îâîùåé ìîæíî ñîõðàíèòü, åñëè âàðèòü èõ â íåáîëüøîì êîëè÷åñòâå æèäêîñòè, îïóñêàÿ â êèïÿùóþ âîäó, ëó÷øå â êîæóðå. Ïðè ýòîì ìåíüøå òåðÿåòñÿ âèòàìèíîâ è ñîëåé. Áèîëîãè÷åñêóþ öåííîñòü ëþáîãî âàðåíîãî áëþäà ìîæíî ïîâûñèòü, åñëè äîáàâèòü ê íåìó ïåðåä ïîäà÷åé íà ñòîë â òðè ðàçà áîëüøå ñâåæèõ îâîùåé èëè èõ ñîêîâ. Îâîùè íîðìàëèçóþò âîäíî-ñîëåâîé îáìåí, óëó÷øàþò ïèùåâàðåíèå, ïðåêðàñíî ñî÷åòàþòñÿ ñ òâîðîãîì, ÿéöàìè, ðûáîé, ìÿñîì, îðåõàìè, çåðíîâûìè, íåêîòîðûìè ôðóêòàìè è ÿãîäàìè. Îñîáóþ öåííîñòü ïðåäñòàâëÿþò îâîùíûå ñîêè. Ïèòàòåëüíûå âåùåñòâà, ñîäåðæàùèåñÿ â ñîêàõ, óñâàèâàþòñÿ óæå ÷åðåç 10-15 ìèí ïîñëå ïðèåìà. Ïèòü èõ íóæíî åæåäíåâíî, íî íå áîëåå 300 ã, ïðè÷åì ëó÷øå ïåðåä åäîé, ñ èíòåðâàëîì 2 - 3 ÷. Íèêîãäà íå ïîäñëàùèâàéòå ñîêè (ñì. "Ïîëåçíûå ñîâåòû"). Îâîùè ïðåêðàñíî ñî÷åòàþòñÿ ñî âñåìè ïðîäóêòàìè è äðóã ñ äðóãîì, íî íå ñî÷åòàþòñÿ ñ ôðóêòàìè (êðîìå çåëåíûõ ÿáëîê). Åñëè èç-çà íàðóøåíèÿ ôóíêöèé êèøå÷íèêà âû ñîâñåì íå ìîæåòå åñòü ñûðûå îâîùè, òîãäà çàìåíèòå èõ îâîùíûìè ñîêàìè, íî óïîòðåáëÿòü íàäî ñðàçó 5 âèäîâ â îäíîì ñòàêàíå (íàïðèìåð, 50 ìë îãóðå÷íîãî ñîêà, 30 ìë êàïóñòíîãî, 50 ìë ñîêà ñâåæåãî êàðòîôåëÿ, 50 ìë òîìàòíîãî ñîêà, 100 ìë ìîðêîâíîãî ñîêà ëèáî ñîêà ëþáûõ äðóãèõ îâîùåé). Íî ìíîãèå ëþäè âîîáùå íå åäÿò ôðóêòîâ. À íåêîòîðûå ãîâîðÿò òàê: "ß èõ íå ìîãó åñòü, ìíå îò íèõ ïëîõî. Ïðè÷èíà ýòîãî êðîåòñÿ â íåïðàâèëüíîì óïîòðåáëåíèè ôðóêòîâ. Ìåæäó òåì ôðóêòû - íàèáîëåå âàæíàÿ ñîñòàâíàÿ ÷àñòü íàøåãî ïèòàíèÿ. Äîñòàòî÷íî âñïîìíèòü îòêðûòèÿ èçâåñòíîãî àìåðèêàíñêîãî àíòðîïîëîãà Àëàíà Óîêåðà. Îí ïèñàë: "Ðàííèå ïðåäêè ÷åëîâåêà ïåðâîíà÷àëüíî áûëè ôðóêòîåäàìè. Îíè íå åëè ìÿñà è äàæå ñåìÿí, ïîáåãîâ, ëèñòüåâ, òðàâû, íå áûëè îíè è âñåÿäíû. Åëè îíè â îñíîâíîì ôðóêòû". Ïîýòîìó ìíîãèå ó÷åíûå è èññëåäîâàòåëè ïðèøëè ê âûâîäó: ïîñêîëüêó îðãàíèçì ÷åëîâåêà èçíà÷àëüíî ïðèñïîñîáëåí ê óïîòðåáëåíèþ ôðóêòîâ, èõ åìó â òå÷åíèå äíÿ òðåáóåòñÿ ãîðàçäî áîëüøå, ÷åì ïðîòåèíîâ (áåëêîâ). ? Ôðóêòû íàäî åñòü äî åäû íà ïóñòîé æåëóäîê; åñëè âû áóäåòå åñòü ïîñëå åäû, âñÿ ïèùà íà÷íåò áðîäèòü è ïåðåâàðèâàòüñÿ â êèñëîòó. Íàäî çíàòü: êàê òîëüêî ôðóêòû ïðèõîäÿò â ñîïðèêîñíîâåíèå ñ äðóãîé ïèùåé è ïèùåâàðèòåëüíûìè ñîêàìè, âñÿ ïèùåâàÿ ìàññà íà÷èíàåò çàêèñàòü è ïîðòèòüñÿ. Ìíîãèå íåïðàâèëüíî åäÿò äûíþ: èëè âìåñòå ñ äðóãèìè ôðóêòàìè, èëè ïîñëå äðóãîé åäû (îáåäà, íàïðèìåð). Ëó÷øå ñúåñòü ñíà÷àëà äûíþ, à ÷åðåç 30 - 40 ìèí ÷òî-òî åùå. È òîãäà íèêàêèõ ïðîáëåì íå áóäåò. Ìíîãèå îòâåðãàþò êèñëûå ôðóêòû, â òîì ÷èñëå ÿáëîêè, ãîâîðÿ: "Ó ìåíÿ è áåç íèõ ïîâûøåííàÿ êèñëîòíîñòü". Çàïîìíèòå: âñå ðàñòèòåëüíûå ïðîäóêòû áîãàòû ùåëî÷íûìè îñíîâàíèÿìè. Ëèìîíû, àïåëüñèíû, àíàíàñû, ãðåéïôðóòû, ÿáëîêè òîëüêî ïî âêóñó ñ÷èòàþòñÿ êèñëûìè. Êàê òîëüêî îíè ïîïàäàþò â îðãàíèçì, îíè ïðåâðàùàþòñÿ â ùåëî÷è, íî îïÿòü-òàêè ïðè óñëîâèè, åñëè èõ ïðàâèëüíî óïîòðåáëÿòü. Âàðåíüå, ëþáûå êîíñåðâèðîâàííûå ôðóêòû, ïå÷åíûå ÿáëîêè, ôðóêòîâûå òîðòû, ïóäèíãè ñ ôðóêòàìè âðåäíû. Îíè îáðàçóþò êèñëîòû, ðàçðóøàþùèå ÷óâñòâèòåëüíóþ îáîëî÷êó âíóòðåííèõ îðãàíîâ ÷åëîâåêà. Îíè âûíóæäàþò îðãàíèçì òðàòèòü æèçíåííóþ ýíåðãèþ íà íåéòðàëèçàöèþ êèñëîòû. Ëþáàÿ òåïëîâàÿ îáðàáîòêà ðàçðóøàåò ïîòåíöèàëüíóþ öåííîñòü ïðîäóêòà, îñîáåííî ôðóêòîâ, èõ ñîêîâ è îâîùåé. Ñîêè äîëæíû áûòü ñâåæèìè. Åñëè ïèòü èõ ïàñòåðèçîâàííûìè, äà åùå ïðèãîòîâëåííûìè ñ êîíöåíòðàòàìè, òàêîé ñîê ïðåâðàòèòñÿ â êèñëîòó â ÷èñòîì âèäå åùå äî òîãî, êàê âû åãî âûïüåòå. Ýòî íàíåñåò âàøåìó îðãàíèçìó îãðîìíûé âðåä. ? Ñîêè - íå ïèòüå, ñîêè - åäà. Íàø îðãàíèçì íóæäàåòñÿ â êëåò÷àòêå. Ëó÷øå åñòü ôðóêòû, òùàòåëüíî èõ ïåðåæåâûâàÿ. À âìåñòî òîãî, ÷òîáû óïîòðåáëÿòü òàêèå ïðèâû÷íûå è âðåäíûå íàïèòêè, êàê ÷àé è êîôå, ãîðàçäî ëó÷øå âûïèòü ñâåæåïðèãîòîâëåííûé ôðóêòîâûé èëè îâîùíîé ñîê. Íå ïåéòå âåñü ñòàêàí çàëïîì, íàñëàæäàéòåñü ôðóêòîâûì ñîêîì, ïðèíèìàÿ åãî ãëîòêàìè, äàéòå ñîêó ñìåøàòüñÿ ñî ñëþíîé, ïðåæäå ÷åì ïðîãëîòèòå åãî. ? Ïîñëå ïðèåìà ôðóêòîâ íà ïóñòîé æåëóäîê âû äîëæíû âûæäàòü êàêîå-òî âðåìÿ: ïîñëå ñî÷íûõ ôðóêòîâ - 20 - 30 ìèí; ïîñëå ìÿñèñòûõ (áàíàíû, ñóõîôðóêòû, ôèíèêè, èíæèð è ò. ä.) - 45 - 60 ìèí; òîëüêî ïîñëå ýòîãî ìîæíî ïðèñòóïèòü ê ïðèåìó äðóãîé ïèùè. Åñëè âû áóäåòå óïîòðåáëÿòü ôðóêòû, íå ñîáëþäàÿ ýòè ðåêîìåíäàöèè, òî ìîæåòå ñâåñòè íà íåò âñþ ïîëüçó îò íèõ, áîëåå òîãî, - ñîâåðøèòü ïðåñòóïëåíèå ïðîòèâ çäîðîâüÿ ñâîåãî îðãàíèçìà, íàðóøèâ êèñëîòíî-ùåëî÷íîå ðàâíîâåñèå â êðîâè. Íåêîòîðûå ñ÷èòàþò, ÷òî âñå ýòè ïðàâèëà âûäóìàíû "çàíóäàìè". ×àñòî ðàññóæäàþò òàê: "Ìîé äåäóøêà âñþ æèçíü ïèë, åë ìÿñî, áóëêè, íèêîãäà íå âûñ÷èòûâàë ÷àñû è ïðîæèë äî 90 ëåò". ×òî ìîæíî îòâåòèòü òàêèì ëþäÿì? Åñëè îíè ñèñòåìàòè÷åñêè íåïðàâèëüíî åäÿò è íå ÷óâñòâóþò ñåáÿ ïëîõî, ýòî íå çíà÷èò, ÷òî ýòî ñî âðåìåíåì íå îòðàçèòñÿ íà èõ çäîðîâüå è äîëãîëåòèè, ÷òî îíè íå íàðóøàþò ïðàâèëà ïèòàíèÿ. Çàêîíû Æèçíè - Çàêîíû Çäîðîâüÿ, èõ îòìåíèòü íèêîìó íå äàíî. Ýòî òîëüêî ãîâîðèò îá îãðîìíîé ïðèñïîñîáëÿåìîñòè ÷åëîâå÷åñêîãî îðãàíèçìà. Ìîæåò áûòü, ýòîò äåäóøêà áûë çàïðîãðàììèðîâàí íà 150 - 200 ëåò, íî èç-çà òîãî, ÷òî îí íå âûïîëíÿë Çàêîíîâ Æèçíè, Ïðèðîäà óáðàëà åãî ê 90 ãîäàì. Íåïðåìåííûì ïðàâèëîì çäîðîâîãî îáðàçà æèçíè ÿâëÿåòñÿ ñëåäóþùåå: óòðîì äî ïîëóäíÿ íå åøüòå íè÷åãî. Åñëè ïî êàêèì-òî ïðè÷èíàì âû ýòîãî äåëàòü íå ìîæåòå, åøüòå èñêëþ÷èòåëüíî ñâåæèå ôðóêòû èëè ïåéòå ôðóêòîâûå ñîêè. Ìîæíî òàêæå ïèòü ïðîñòóþ õîðîøåãî êà÷åñòâà âîäó èëè ÷àé (íàñòîé) èç ëèñòüåâ ìàëèíû, ÷åðíîé ñìîðîäèíû, ïëîäîâ øèïîâíèêà.  òå÷åíèå äíÿ åøüòå ôðóêòû ñòîëüêî, ñêîëüêî õîòèòå, íå îãðàíè÷èâàéòå ñåáÿ. Âàø îðãàíèçì ïîäñêàæåò ñàì, ñêîëüêî âàì íóæíî. Ôðóêòû ïî÷òè íå òðåáóþò ýíåðãèè äëÿ ïåðåâàðèâàíèÿ. Åñëè âû èõ õîðîøî ïåðåæåâàëè, åñëè âû èõ åäèòå â åñòåñòâåííîì âèäå, îíè âîîáùå íå íóæäàþòñÿ â ïåðåâàðèâàíèè â æåëóäêå. Âñå ïèòàòåëüíûå âåùåñòâà, ñîäåðæàùèåñÿ â íèõ, âñàñûâàþòñÿ â êèøå÷íèêå. Êàê èçâåñòíî, ñàìîå ïëîõîå âðåìÿ äëÿ åäû - ýòî âå÷åð, íî åùå õóæå åñòü ðàíî óòðîì, ñðàçó ïîñëå ïðîáóæäåíèÿ. "Ïëîòíûé çàâòðàê îçíà÷àåò òÿæåëûé äåíü. Ëåãêèé çàâòðàê ñîîòâåòñòâóåò ëåãêîìó äíþ", - ñ÷èòàþò ïîñëåäîâàòåëè åñòåñòâåííîãî îáðàçà æèçíè. Åñëè âû ïðîñíóëèñü ïîñëå íî÷íîãî îòäûõà, ýíåðãèÿ òàê è ðâåòñÿ èç âàñ! Íà ÷òî æå âû ñîáèðàåòåñü åå ïîòðàòèòü? Íà ïåðåâàðèâàíèå ïëîòíîãî çàâòðàêà? Íîâàÿ ýíåðãèÿ îáðàçóåòñÿ íå ðàíüøå, ÷åì ïèùà âñîñåòñÿ â êðîâü èç êèøå÷íèêà. Ïèùà áóäåò íàõîäèòüñÿ â æåëóäêå 3 ÷ è áîëåå (ïðè óñëîâèè, åñëè âû ñúåëè åå â ïðàâèëüíîì ñî÷åòàíèè). Ñòîèò ëè åñòü ñðàçó ïîñëå ïðîáóæäåíèÿ? Ìíîãèå áîÿòñÿ ïðîïóñòèòü çàâòðàê. "À êàê æå ÿ áóäó ðàáîòàòü?" Âû íå çàñòàâèòå âàø îðãàíèçì ñòðàäàòü îò íåäîñòàòêà ïèùè, óâåðÿþ âàñ. Âàø îðãàíèçì áóäåò èñïîëüçîâàòü ïèùó, ñúåäåííóþ íàêàíóíå, è ôîðìèðîâàòü íåîáõîäèìûå äëÿ ñåáÿ ýëåìåíòû, äàæå íå èñïîëüçîâàâ âñå äî êîíöà. À âû áåç óòðåííåé åäû ïî÷óâñòâóåòå ñåáÿ ãîðàçäî áîäðåå è ýíåðãè÷íåå. Çàâòðàêàéòå ôðóêòàìè - è âû âñåãäà áóäåòå îùóùàòü ïðèëèâ ýíåðãèè â òå÷åíèå äíÿ, òàê êàê âû ñáåðåãëè åå, à íå ðàñòðàíæèðèëè. Ñúåâ ôðóêòû, ïîäîæäèòå 30 - 120 ìèí, à ïîòîì ìîæíî ñúåñòü è åùå ÷òî-íèáóäü. Ïîñëå äðóãîé ïèùè ñïóñòÿ ÷àñ ïîïèâàéòå âîäè÷êó â òå÷åíèå ïðèìåðíî 3 ÷, ïðåæäå ÷åì ïîäêðåïèòüñÿ åùå ÷åì-òî. Íî òîëüêî ñëóøàéòå ñâîé îðãàíèçì. Äåéñòâèòåëüíî ëè îí òðåáóåò ïèùè èëè âû ïî ïðèâû÷êå òÿíåòåñü ê íåé? Êîãäà ìíå õî÷åòñÿ åñòü, à ïîëîæåííîå âðåìÿ, îòâåäåííîå íà ïåðåâàðèâàíèå, íå ïðîøëî (3-4 ÷), ÿ âûïèâàþ òåïëóþ âîäó. Åñëè è ïîñëå ýòîãî ÿ íå çàáûâàþ î åäå, òî íà÷èíàþ âåðèòü, ÷òî äåéñòâèòåëüíî ïîðà åñòü, ÷òî ýòî íå çîâ ìîèõ ñòàðûõ ïðèâû÷åê. Ëèøíèå êàëîðèè âðåäíû, îñîáåííî åñëè îíè óïîòðåáëÿþòñÿ âìåñòå ñ âàðåíîé ïèùåé èëè ñ ïèùåé, ñúåäåííîé â íåïðàâèëüíîì ñî÷åòàíèè. Ëþáîé ïðèåì ïèùè íà÷èíàéòå ñ ôðóêòîâ. Ñúåäåííûå íà ïóñòîé æåëóäîê ñâåæèå ôðóêòû îêàçûâàþò òîëüêî ïîëîæèòåëüíûé ýôôåêò, ñïîñîáñòâóÿ ñíèæåíèþ âåñà è îäíîâðåìåííî ñíàáæàÿ îðãàíèçì ýíåðãèåé. Â-÷åòâåðòûõ, ñîáëþäàòü èíòåðâàë ìåæäó ïðèåìîì ôðóêòîâ è ñëåäóþùèì ïðèåìîì ïèùè - 60 - 80 ìèí ïîñëå ôðóêòîâ ìÿñèñòûõ. ÷åðåç 3 ÷, åñëè âû ñúåëè ïðîäóêòû â ïðàâèëüíîì ñî÷åòàíèè, íî áåç ìÿñà, ðûáû, ïòèöû, ÿèö è äðóãèõ âàðåíûõ ïðîäóêòîâ; ÷åðåç 4 ÷, åñëè âû ñúåëè ïðîäóêòû â ïðàâèëüíîì ñî÷åòàíèè, íî ñ ìÿñîì è äðóãèìè æèâîòíûìè ïðîäóêòàìè; Ëó÷øå âñåãî åñòü ôðóêòû êàê çàâòðàê. Ïîëåçíî ñîáëþäàòü 1-2 äíÿ â íåäåëþ ÷èñòî ôðóêòîâóþ äèåòó, à òàêæå ñîâåòóþ ïåðåä íà÷àëîì è ïîñëå îêîí÷àíèÿ ãîëîäàíèÿ èñïîëüçîâàòü ôðóêòîâóþ äèåòó â òå÷åíèå õîòÿ áû 1-2 äíåé. Óïîòðåáëåíèå óòðîì èñêëþ÷èòåëüíî ôðóêòîâ òåñíî ñâÿçàíî ñ åñòåñòâåííûìè ôèçèîëîãè÷åñêèìè öèêëàìè íàøåãî îðãàíèçìà. ÁÎËÜØÈÍÑÒÂÎ ëþäåé äàæå íå èìåþò ïîíÿòèÿ îá èõ ñóùåñòâîâàíèè. Ýòè öèêëû ñòðîÿòñÿ ñîãëàñíî åñòåñòâåííûì ôóíêöèÿì îðãàíèçìà. Ìû ïîãëîùàåì ïèùó (ïðèåì), îðãàíèçì ïåðåâàðèâàåò åå è óñâàèâàåò (àññèìèëÿöèÿ), à çàòåì èçáàâëÿåòñÿ îò òîãî, ÷òî íàì íå íóæíî (óäàëåíèå îòõîäîâ, èëè î÷èùåíèå). Ðàçóìååòñÿ, êàæäàÿ èç ýòèõ òðåõ ôóíêöèé ïîñòîÿííî îñóùåñòâëÿåòñÿ â îðãàíèçìå, íî âñå æå åñòü ÷àñû, êîãäà òîò èëè èíîé ïðîöåññ ïðîèñõîäèò îñîáåííî èíòåíñèâíî: Èçâåñòíî, ÷òî ôèçèîëîãè÷åñêàÿ ïîòðåáíîñòü íàøåãî îðãàíèçìà â åäå âîçíèêàåò ëèøü â íà÷àëå âå÷åðà.  ýòîì ñëó÷àå äîëæåí áûòü çàïàñ âðåìåíè (íå ìåíåå 3 ÷) äëÿ òîãî, ÷òîáû ïèùà óøëà èç æåëóäêà è íà÷àëñÿ öèêë àññèìèëÿöèè. Ýòî ãîâîðèò î òîì, ÷òî ïîñëåäíèé ïðèåì ïèùè ÷åëîâåêîì äîëæåí çàêîí÷èòüñÿ â 6 - 7 ÷ âå÷åðà, õîòÿ åñëè åäÿò ôðóêòû, òî îíè ïîïàäàþò â êèøå÷íèê óæå ÷åðåç 20 - 30 - 120 ìèí ïîñëå ïðèåìà. Íî åñëè ïèùà ñúåäåíà ïîçæå, îíà íå ñìîæåò ïåðåâàðèòüñÿ è îðãàíèçì íå áóäåò ãîòîâ ê àññèìèëÿöèè. Âû ñäâèíóëè Öèêë ïðèåìà äàëåêî çà åãî ïðåäåëû è îòëîæèëè öèêë àññèìèëÿöèè íà òî âðåìÿ, êîãäà îðãàíèçì äîëæåí çàíèìàòüñÿ Óäàëåíèåì îòõîäîâ. Äàëåå íàðóøàþòñÿ âñå ðåãóëÿðíûå, ðàññ÷èòàííûå íà 8 ÷àñîâ öèêëû.  òàêîì ñëó÷àå âàì ëó÷øå îòëîæèòü çàâòðàê äî ñëåäóþùåãî ïðèåìà ïèùè, ïîñêîëüêó âàø îðãàíèçì áóäåò çàíÿò óäàëåíèåì îòõîäîâ (ñàìîî÷èùåíèåì). ×òîáû îáåñïå÷èòü ñåáÿ çäîðîâüåì, ïîëíîöåííûì ïèòàíèåì è íå íàáèðàòü ëèøíåãî âåñà, íàäî ñ÷èòàòüñÿ ñ ôèçèîëîãè÷åñêèìè öèêëàìè íàøåãî îðãàíèçìà. Òîëüêî ñ 12 ÷ äíÿ íàäî íà÷èíàòü åñòü. Ïîñêîëüêó ïèùåâàðåíèå çàáèðàåò áîëüøå ýíåðãèè, ÷åì ëþáîé äðóãîé ïðîöåññ, íàäî ñúåñòü òàêîå áëþäî, êîòîðîå áû íå èñòîùàëî çàïàñ âàøåé ýíåðãèè, íåñìîòðÿ íà òî, ÷òî âñå ðàâíî êàêîå-òî êîëè÷åñòâî ýíåðãèè ïîòðåáóåòñÿ íà åãî ïåðåâàðèâàíèå. Åñëè âû áóäåòå óïîòðåáëÿòü â ýòî âðåìÿ ïðîäóêòû â ïðàâèëüíîì ñî÷åòàíèè è "æèâûå", âàøåìó îðãàíèçìó ïîòðåáóåòñÿ çàòðàòèòü ìèíèìàëüíîå êîëè÷åñòâî ýíåðãèè íà ïåðåâàðèâàíèå. È äëÿ òâîð÷åñòâà, çäîðîâüÿ, ñîâåðøåíñòâîâàíèÿ ó âàñ îñòàíåòñÿ áîëüøå âðåìåíè. Íàïðèìåð. Âû åäèòå â 12 ÷ ôðóêòû, à â 14 ÷ îâîùè ñ êðàõìàëèñòûìè ïðîäóêòàìè (êàðòîôåëü ïå÷åíûé, èëè "æèâàÿ êàøêà", èëè âàðåíàÿ êóêóðóçà, êàøòàíû è ò. ï.) - ýòî îäèí ïðèåì ïèùè. Ñëåäóþùèé ïðèåì - â 17 ÷ - ôðóêòû, à â 18.30 -îïÿòü îâîùè (ñàëàò èç îâîùåé) è ÷òî-òî áåëêîâîå - îðåõè, èëè ðûáà, èëè òâîðîã, èëè ïòèöà, èëè ìÿñî. Íî òàê, ÷òîáû âàðåíîãî áûëî â 3 ðàçà ìåíüøå, ÷åì "æèâîãî", ò. å. îâîùåé -ñàëàòà (êàïóñòà, çåëåíü, ìîðêîâü). Âî âðåìÿ ýòîãî öèêëà íàø îðãàíèçì âïèòûâàåò â êðîâü è èñïîëüçóåò ïèòàòåëüíûå âåùåñòâà, êîòîðûå îí ïîëó÷èë èç ïðèíÿòîé ïèùè. Ïðîöåññ óñâîåíèÿ ïèùè íà÷èíàåòñÿ òîëüêî ïîñëå òîãî, êàê ïðîéäóò ýòàïû ñëþííîãî, çàòåì æåëóäî÷íîãî è êèøå÷íîãî ïåðåâàðèâàíèÿ. Ïèùà, ñúåäåííàÿ â ïðàâèëüíîì ñî÷åòàíèè, âûéäåò èç æåëóäêà è áóäåò ãîòîâà ê óñâîåíèþ è àññèìèëÿöèè ïðèìåðíî ÷åðåç 3 ÷. Ïèùà, ñúåäåííàÿ â íåïðàâèëüíîì ñî÷åòàíèè, ïðîâîäèò â æåëóäêå îò 8 äî 12 ÷ èëè äîëüøå. Åñëè âû õîòèòå ñïîêîéíî ñïàòü è îòäîõíóòü çà íî÷ü, ïîñòàðàéòåñü ïîóæèíàòü çà 3 - 4 ÷ äî ñíà. Ïîëíûé íî÷íîé îòäûõ, êîòîðûé äîëæåí íà÷àòüñÿ õîòÿ áû çà 3 ÷àñà äî ïîëóíî÷è, ïîçâîëèò îðãàíèçìó çàâåðøèòü öèêë àññèìèëÿöèè ïåðåä òåì, êàê îí âñòóïèò â ôàçó óäàëåíèÿ îòõîäîâ îêîëî 4 ÷ óòðà. Ìû óæå çíàåì, ÷òî ïåðåâàðèâàíèå îáû÷íîé ïèùè òðåáóåò áîëüøå ýíåðãèè, ÷åì ëþáîé äðóãîé ïðîöåññ â îðãàíèçìå. À ôðóêòû îòíèìàþò íàèìåíüøåå êîëè÷åñòâî ýíåðãèè äëÿ ïåðåâàðèâàíèÿ. Ïîýòîìó âî âðåìÿ ýòîãî öèêëà ëó÷øå âñåãî íå åñòü íè÷åãî èëè åñòü ôðóêòû, èëè ïèòü ôðóêòîâûå ñîêè. Ëþáàÿ äðóãàÿ ïèùà áóäåò òîðìîçèòü öèêë óäàëåíèÿ îòõîäîâ è ïîáî÷íûõ ïðîäóêòîâ, êîòîðûå òîæå íåîáõîäèìî âûâåñòè èç îðãàíèçìà, ÷òîáû îíè íå óãðîæàëè åìó îòðàâëåíèåì (òîêñåìèåé). Åñëè äàæå âû íàðóøàåòå âñå çàêîíû ïèòàíèÿ: åäèòå âàðåíóþ ïèùó, íå ñîáëþäàåòå ïðàâèëà ñî÷åòàíèÿ ïðîäóêòîâ, êóðèòå, ïüåòå êîôå, ÷àé, óïîòðåáëÿåòå àëêîãîëü - íå äåëàéòå ýòî âî âðåìÿ öèêëà óäàëåíèÿ îòõîäîâ. Ýòî î÷åíü âàæíî äëÿ ñîõðàíåíèÿ çäîðîâüÿ è èçáàâëåíèÿ îò ëèøíåé ìàññû òåëà. Öèêë ýòîò êàê ðàç ñîâïàäàåò ñ íà÷àëîì ðàáî÷åãî äíÿ. Âû îòïðàâëÿåòå äåòåé â øêîëó, â èíñòèòóò è ñàìè, âîçìîæíî, ñïåøèòå íà ðàáîòó. Ïîñòàðàéòåñü â ýòî âðåìÿ âûïèòü íàñòîé ñóõîôðóêòîâ èëè ëþáîé ñâåæèé ñîê, íàñòîé øèïîâíèêà è ñúåñòü ñâåæèå ôðóêòû - ëþáûå, ëèøü áû îíè âàì íðàâèëèñü. Íî íå åøüòå íè÷åãî äðóãîãî äî 12 ÷ äíÿ. Ýòî ìàëåíüêîå èñòÿçàíèå ñêîðî ïåðåéäåò â íàñëàæäåíèå, îùóùåíèå ëåãêîñòè òåëà, ìîëîäîñòè è ïðèëèâà æèçíåííîé ýíåðãèè. Âû íà÷íåòå òåðÿòü ëèøíèé âåñ, î÷èùàòü êëåòêè ñâîåãî îðãàíèçìà, èçáàâèòåñü îò ìíîãèõ ñêðûòûõ õðîíè÷åñêèõ çàáîëåâàíèé. Ìû óæå ðàíåå ãîâîðèëè îá èäåàëüíîì ñîîòíîøåíèè âñåõ íåîáõîäèìûõ êîìïîíåíòîâ, îáåñïå÷èâàþùèõ íàø îðãàíèçì æèçíåííîé ýíåðãèåé, çàùèòîé îò èíôåêöèé è çäîðîâüåì. Íåëèøíå åùå ðàç âñïîìíèòü èõ ñåé÷àñ. Îáðàòèòå âíèìàíèå íà òî, êàê ìàëî íàì íóæíî àìèíîêèñëîò äëÿ ïîñòðîåíèÿ áåëêà, à òàêæå æèðíûõ êèñëîò, ìèêðîýëåìåíòîâ è âèòàìèíîâ ïî ñðàâíåíèþ ñ ãëþêîçîé, êîòîðîé áîëüøå âñåãî áîãàòû ôðóêòû è ñëàäêèå îâîùè! Íà Çåìëå ñóùåñòâóåò ëèøü îäèí âèä ïèùè, îáëàäàþùèé ýòè ñîîòíîøåíèåì, - ýòî ôðóêòû. À êàê æå ïðîòåèíû èëè áåëêè? Àìèíîêèñëîòû - êëàññ îðãàíè÷åñêèõ ñîåäèíåíèé, îñíîâíûå ýëåìåíòû ïîñòðîåíèÿ ðàñòèòåëüíûõ è æèâîòíûõ áåëêîâ. Çíà÷èò, ïåðåä íàìè âîçíèêàþò äâå ïðîòèâîïîëîæíûå ïðîáëåìû: ãäå âçÿòü áåëîê è ÷òî äåëàòü, ÷òîáû íå ïåðåãðóæàòü èì îðãàíèçì. Ñóùåñòâóåò çàêîí: ïðè ëþáîì èçáûòêå áåëêà â îðãàíèçìå ÷åëîâåêà èëè æèâîòíîãî áåëîê äîëæåí áûòü ñîææåí, åñëè äàæå îðãàíèçì íå íóæäàåòñÿ â òåïëîîáðàçîâàíèè. Ýòî íåîáõîäèìî ïîòîìó, ÷òî íåóñâîåííûé áåëîê ïðåâðàùàåòñÿ â ÿäîâèòûå âåùåñòâà. Íî íà óòèëèçàöèþ áåëêà, íà âûíóæäåííîå åãî óíè÷òîæåíèå óõîäèò ýíåðãèÿ îðãàíèçìà, à ýòî ïðèâîäèò ê òîìó, ÷òî äðóãèå âåùåñòâà óæå èñêëþ÷àþòñÿ èç ñãîðàíèÿ è îòêëàäûâàþòñÿ â òåëå íåïåðåâàðåííûìè, ñëåäîâàòåëüíî, îíè î÷åíü ñêîðî ñòàíîâÿòñÿ ãíèëüþ, èëè òîêñèíàìè. Ýòî âåäåò ê èçëèøíåìó âåñó è òó÷íîñòè, ñåðäå÷íî-ñîñóäèñòûì è îíêîëîãè÷åñêèì çàáîëåâàíèÿì. Ïðè ÷ðåçìåðíîì ââåäåíèè â ïèùó óãëåâîäîâ è æèðîâ ñðàáàòûâàåò èíñòèíêò ñàìîñîõðàíåíèÿ: îðãàíèçì áîðåòñÿ ñ íèìè ëèáî ïîòåðåé àïïåòèòà, ëèáî ðâîòîé. Åñëè æå èçëèøåê ýòèõ ïðîäóêòîâ â îðãàíèçìå âñå æå íå âûâîäèòñÿ, ïðîèñõîäèò î÷åíü íåçíà÷èòåëüíîå èõ ðàñùåïëåíèå, è íåïåðåâàðåííûå ÷àñòèöû ïîñòóïàþò â òîëñòóþ êèøêó, ãäå íà÷èíàþò ñêàïëèâàòüñÿ êàëîâûìè ìàññàìè. Òîëñòàÿ êèøêà áîãàòà êðîâåíîñíûìè ñîñóäàìè, ÷åðåç êîòîðûå ïðîäîëæàåòñÿ âñàñûâàíèå (äàæå èç êàëîâûõ êîìüåâ) ïðîäóêòîâ ðàçëîæåíèÿ. Ñ òîêîì êðîâè îíè ðàçíîñÿòñÿ ïî âñåìó îðãàíèçìó, îòðàâëÿÿ åãî. Ïîýòîìó äîëæíî ñòàòü ïðàâèëîì: îïàñàòüñÿ èçáûòêà ëþáîé ïèùè, è íå òîëüêî òÿæåëîóñâîÿåìîé, íî è êàëîðèéíîé. Áåëîê - ñàìûé ñëîæíûé èç âñåõ ýëåìåíòîâ ïèòàíèÿ. Åãî óñâîåíèå è èñïîëüçîâàíèå íàèáîëåå çàòðóäíåíî. Äëÿ ïåðåâàðèâàíèÿ áåëêîâîé ïèùè òðåáóåòñÿ áîëüøå ýíåðãèè, ÷åì äëÿ ëþáîé äðóãîé. Âñÿêàÿ ïèùà, çà èñêëþ÷åíèåì ôðóêòîâ, ïðîõîäèò âåñü æåëóäî÷íî-êèøå÷íûé òðàêò çà 25 - 30 ÷. Åñëè âû åëè ìÿñî, òî ýòî âðåìÿ óâåëè÷èâàåòñÿ áîëåå ÷åì â 2 ðàçà. ×åì áîëüøå áåëêà âû ñúåäàåòå, òåì ìåíüøå ýíåðãèè ó îðãàíèçìà îñòàåòñÿ äëÿ äðóãèõ íåîáõîäèìûõ ïðîöåññîâ, â òîì ÷èñëå òàêèõ, êàê çàùèòà îò èíôåêöèè è óäàëåíèå òîêñè÷íûõ îòõîäîâ. Ñîâðåìåííûå èññëåäîâàíèÿ ãîâîðÿò î òîì, ÷òî âçðîñëîìó ÷åëîâåêó íåîáõîäèìî âñåãî 23 - 25 ã áåëêà â äåíü. ×òîáû ïîïîëíèòü èñïîëüçîâàííûé çàïàñ, íåîáõîäèìî 700 ã áåëêà â ìåñÿö. Ìíîãèå ïðåâûøàþò ýòî êîëè÷åñòâî, âûíóæäàÿ îðãàíèçì òðàòèòü äðàãîöåííóþ ýíåðãèþ, êîòîðàÿ ìîãëà áû áûòü èñïîëüçîâàíà íà î÷èùåíèå (ò. å. íà ñàìîëå÷åíèå). Ïðîòåèíû (áåëêè), ïî ìíåíèþ ìíîãèõ ñîâðåìåííûõ èññëåäîâàòåëåé, íå ÿâëÿþòñÿ ïåðâîñòåïåííî âàæíîé ñîñòàâíîé ÷àñòüþ ïèùè. Âñå åå êîìïîíåíòû îäèíàêîâî íåîáõîäèìû è âàæíû: âèòàìèíû, ìèêðîýëåìåíòû, óãëåâîäû, æèðíûå êèñëîòû, ôåðìåíòû, êëåò÷àòêà, âîäà è ò. ä. Òðàäèöèîííî ñ÷èòàåòñÿ, ÷òî ìÿñî - îñíîâíîé èñòî÷íèê áåëêà. Íî îòêóäà áåðóò áåëêè äëÿ ñåáÿ ñàìûå ñèëüíûå æèâîòíûå íà ïëàíåòå: ñëîí, áûê, ëîøàäü, ìóë, áóéâîë è äð., êîòîðûå åäÿò òðàâó, ëèñòüÿ, ôðóêòû? Ñåðåáðèñòàÿ ãîðèëëà ñèëüíåå ÷åëîâåêà ðàç â 30, íî îíà ïèòàåòñÿ òîëüêî çåëåíüþ è ôðóêòàìè. Ñàìîå ëþáîïûòíîå ñîñòîèò â òîì, ÷òî áåëêè íå îáðàçóþòñÿ â îðãàíèçìå èç ïðîòåèíîâ, ïîëó÷àåìûõ ñ ïèùåé. Ïðîòåèíû îáðàçóþòñÿ èç ñîäåðæàùèõñÿ â ïèùå àìèíîêèñëîò! Îðãàíèçì ÷åëîâåêà íå ìîæåò èñïîëüçîâàòü èëè óñâîèòü áåëîê â åãî ïåðâîíà÷àëüíîì ñîñòîÿíèè, êàêèì îí ñîäåðæèòñÿ â ìÿñíûõ ïðîäóêòàõ. Âíà÷àëå íàø îðãàíèçì äîëæåí ïåðåâàðèòü è ðàñùåïèòü ïîñòóïèâøèé â íåãî áåëîê íà ñîñòàâëÿþùèå àìèíîêèñëîòû. Òîëüêî çàòåì ýòè àìèíîêèñëîòû ìîãóò áûòü èñïîëüçîâàíû äëÿ ïîëó÷åíèÿ íåîáõîäèìîãî êîëè÷åñòâà ïðîòåèíà. Ñóùåñòâóåò ìíîæåñòâî ðàçíîâèäíîñòåé àìèíîêèñëîò. Âñå îíè æèçíåííî âàæíû. Åñëè âû ðåãóëÿðíî åäèòå ôðóêòû, îâîùè, ñåìåíà, òî ïîëó÷àåòå âñå àìèíîêèñëîòû, òðåáóþùèåñÿ îðãàíèçìó äëÿ îáðàçîâàíèÿ íåîáõîäèìîãî êîëè÷åñòâà ïðîòåèíà, òàê æå ïîëó÷àþò ïðîòåèí è äðóãèå ìëåêîïèòàþùèå, íå óïîòðåáëÿþùèå ìÿñà. Æèâîòíûå íå ìîãóò ñàìè ñîçäàâàòü èñòî÷íèêè ïðîòåèíà. Òîëüêî ðàñòåíèÿ ñïîñîáíû ñèíòåçèðîâàòü àìèíîêèñëîòû èç âîçäóõà, âîäû, ñâåòà, ýëåìåíòîâ Çåìëè, à âñå æèâîòíûå è ëþäè çàâèñÿò îò ðàñòèòåëüíîãî ïðîòåèíà è ïîëó÷àþò åãî èëè íåïîñðåäñòâåííî, êîãäà åäÿò ðàñòèòåëüíóþ ïèùó, èëè êîñâåííî, êîãäà åäÿò ìÿñî òðàâîÿäíîãî æèâîòíîãî.  ìÿñå íåò íèêàêèõ âàæíûõ àìèíîêèñëîò, êîòîðûå æèâîòíûå èëè ÷åëîâåê íå ïîëó÷àëè áû îò ðàñòåíèé. Êðîìå ðåäêèõ èñêëþ÷åíèé, õèùíûå æèâîòíûå íå åäÿò ìÿñî õèùíèêîâ, ïèòàþùèõñÿ òîëüêî ìÿñîì, îíè èíñòèíêòèâíî óïîòðåáëÿþò â ïèùó òðàâîÿäíûõ. Ïîýòîìó íàøåé çàáîòîé äîëæíà ñòàòü íå æèâîòíàÿ, à ðàñòèòåëüíàÿ ïèùà, áîãàòàÿ àìèíîêèñëîòàìè. Ïîñëå ïåðåâàðèâàíèÿ ïèùà ðàçëàãàåòñÿ íà ñëåäóþùèå ñîñòàâëÿþùèå: áåëêè ïðåâðàòÿòñÿ â ïåïòîíû, æèðû - â ìëå÷íóþ ýìóëüñèþ, à ñàõàðà - â ãëþêîçó. Âìåñòå ñ êðîâüþ è ëèìôîé àìèíîêèñëîòû öèðêóëèðóþò ïî êðîâåíîñíîé è ëèìôàòè÷åñêîé ñèñòåìàì. Êàê òîëüêî ïîÿâèòñÿ íåîáõîäèìîñòü â àìèíîêèñëîòàõ, îðãàíèçì ïîëó÷àåò èõ èç êðîâè è ëèìôû. Òàêóþ íåïðåðûâíóþ öèðêóëÿöèþ äîñòàòî÷íîãî çàïàñà àìèíîêèñëîò íàçûâàþò "áàíêîì àìèíîêèñëîò". Ýòîò "áàíê" îòêðûò 24 ÷ â ñóòêè. Ïå÷åíü è êëåòêè íåïðåðûâíî "äåëàþò âêëàäû" è "áåðóò" îáðàòíî àìèíîêèñëîòû â çàâèñèìîñòè îò êîíöåíòðàöèè èõ â êðîâè. Åñëè óðîâåíü àìèíîêèñëîò â êðîâè âûñîê, ïå÷åíü íàêàïëèâàåò è õðàíèò èõ "äî âîñòðåáîâàíèÿ". Êîãäà óðîâåíü àìèíîêèñëîò ïàäàåò âñëåäñòâèå òîãî, ÷òî êëåòêè èõ ðàçáèðàþò, ïå÷åíü âûäàåò â êðîâåíîñíóþ ñèñòåìó êàêîå-òî êîëè÷åñòâî çàïàñåííûõ àìèíîêèñëîò. Êëåòêè òàêæå îáëàäàþò ñïîñîáíîñòüþ íàêàïëèâàòü àìèíîêèñëîòû. Ñîäåðæàíèå â êðîâè àìèíîêèñëîò äîëæíî áûòü ïîñòîÿííûì. Åñëè æå îíî ñíèæàåòñÿ èëè êàêèå-òî äðóãèå êëåòêè íóæäàþòñÿ â îñîáûõ àìèíîêèñëîòàõ, êëåòêè ñïîñîáíû âûñâîáîæäàòü òå àìèíîêèñëîòû, êîòîðûå áûëè ïðèïàñåíû. Ìíîãèå êëåòêè îðãàíèçìà ñèíòåçèðóþò áîëüøå, ÷åì íåîáõîäèìî äëÿ ïîääåðæàíèÿ æèçíåäåÿòåëüíîñòè, è ìîãóò âíîâü ïðåâðàùàòü ñâîè ïðîòåèíû â àìèíîêèñëîòû è äåëàòü âêëàäû â "áàíê àìèíîêèñëîò". Ïîýòîìó, êàê ïîêàçàëè èññëåäîâàíèÿ, íå îáÿçàòåëüíî óïîòðåáëÿòü áåëêè â ÷èñòîì âèäå, ïðè êàæäîì ïðèåìå ïèùè èëè äàæå êàæäûé äåíü. Äåâÿòü íåçàìåíèìûõ àìèíîêèñëîò îðãàíèçì ïîëó÷àåò èç âíåøíèõ èñòî÷íèêîâ ïèòàíèÿ. Áîëüøàÿ ÷àñòü ýòèõ êèñëîò ñîäåðæèòñÿ âî âñåõ ôðóêòàõ è îâîùàõ. Ñóùåñòâóþò ôðóêòû è îâîùè, êîòîðûå ñîäåðæàò âñå àìèíîêèñëîòû, íå ïðîèçâîäèìûå îðãàíèçìîì. Ýòî - ìîðêîâü, áðþññåëüñêàÿ, áåëîêî÷àííàÿ, öâåòíàÿ êàïóñòà, êóêóðóçà, îãóðöû, áàêëàæàíû, ãðóøè, êàðòîôåëü, ïîìèäîðû; âñå âèäû îðåõîâ, ñåìå÷êè ïîäñîëíóõà è êóíæóòà, àðàõèñ, ñîåâûå, áîáû. Ïðè ýòîì èç ðàñòåíèé ìû óñâàèâàåì ãîðàçäî áîëüøå àìèíîêèñëîò, ÷åì èç ìÿñíîé ïèùè. Ëåã÷å ñîõðàíèòü çäîðîâüå, ïèòàÿñü ðàñòèòåëüíîé ïèùåé. Íî ÿ âîâñå íå íàâÿçûâàþ âàì èñêëþ÷èòåëüíî ñûðîÿäåíèå è âåãåòàðèàíñòâî. Ìîæíî óïîòðåáëÿòü íåêîòîðîå êîëè÷åñòâî ìÿñà è îñòàâàòüñÿ çäîðîâûì. Âîïðîñ â òîì, îáÿçàòåëüíî ëè ëþäè äîëæíû åñòü ìÿñî. Âûÿñíèëîñü: íåò, íå îáÿçàòåëüíî. Ìÿñî íå ÿâëÿåòñÿ íåîáõîäèìûì ïðîäóêòîì íè â ñìûñëå ïèòàíèÿ, íè â ôèçèîëîãè÷åñêîì, ïñèõîëîãè÷åñêîì èëè íðàâñòâåííîì. Ãëàâíîé öåííîñòüþ ïèùè ÿâëÿåòñÿ òà ýíåðãèÿ, êîòîðóþ îíà äàåò íàì. Ìÿñíàÿ æå ïèùà íå äàåò íàì íè òîïëèâà, íè ýíåðãèè. Ýíåðãèþ ìû ïîëó÷àåì îò óãëåâîäîâ, êîòîðûå íå ñîäåðæàòñÿ â ìÿñå, ò. å. ìÿñî íå îáëàäàåò òîïëèâíîé öåííîñòüþ. Ýíåðãèþ ìîãóò äàâàòü æèðû, íî îíè òðóäíåå è äîëüøå ïåðåâàðèâàþòñÿ è, êðîìå òîãî, ìîãóò ïðåâðàùàòüñÿ â òîïëèâî ëèøü ïðè óñëîâèè, åñëè çàïàñû óãëåâîäîâ â îðãàíèçìå èñòîùèëèñü. Êîãäà æèðû â íàøåì ïèòàíèè ïðèñóòñòâóþò â íåáîëüøîì êîëè÷åñòâå, îðãàíèçì îáõîäèòñÿ óãëåâîäàìè, èçëèøêè êîòîðûõ âñåãäà ïðåâðàùàþòñÿ â æèðû. Æèðîâûå çàïàñû ìîæíî ðàññìàòðèâàòü êàê "óãëåâîäíûé áàíê", â êîòîðûé ïî ìåðå íåîáõîäèìîñòè äåëàþò âêëàäû è áåðóò èõ îáðàòíî. Ïîëåçíûé æèð îáðàçóåòñÿ â íàøåì îðãàíèçìå íå îò óïîòðåáëåíèÿ ðàñòèòåëüíûõ èëè æèâîòíûõ æèðîâ, à îò óïîòðåáëåíèÿ óãëåâîäîâ, ñîäåðæàùèõñÿ â ñâåæèõ îâîùàõ, ôðóêòàõ, îðåõàõ è ñåìå÷êàõ. Î÷åíü âàæíî äëÿ çäîðîâüÿ ïðèñóòñòâèå â ðàöèîíå êëåò÷àòêè, áåç êîòîðîé íå ïðîèñõîäèò î÷èùåíèå êèøå÷íèêà; êëåò÷àòêà ïîìîãàåò èçáåæàòü çàïîðîâ è ãåìîððîÿ.  ìÿñå íåò êëåò÷àòêè! Íî ñîäåðæèòñÿ îò 51 äî 200 òûñÿ÷ àìèíîêèñëîò - î÷åíü õðóïêèõ õèìè÷åñêèõ ñîåäèíåíèé. Òåïëîâàÿ îáðàáîòêà ðàçðóøàåò ìíîãèå àìèíîêèñëîòû. Ýòè íåèñïîëüçîâàííûå àìèíîêèñëîòû ñòàíîâÿòñÿ òîêñè÷íûìè, óâåëè÷èâàþò êîëè÷åñòâî øëàêîâ â îðãàíèçìå, ñëèçè â êðîâè, çàáèðàþò ýíåðãèþ, âåäóò ê òîêñåìèè è îæèðåíèþ.  ìÿñå ñîäåðæèòñÿ ìíîãî íàñûùåííîãî æèðà, íî íå òîãî, êîòîðûé ìîæåò áûòü èñïîëüçîâàí ñ öåëüþ ïðèîáðåòåíèÿ æèçíåííîé ñèëû - ýíåðãèè, à òîãî, êîòîðûé çàáèâàåò íàøè ñîñóäû õîëåñòåðèíîì, âûçûâàåò òðîìáû, èíôàðêòû. Ïîýòîìó äëÿ ïèòàíèÿ ëþäåé ìÿñî ñîâåðøåííî íå ïîäõîäèò. Ìÿñî è ôèçèîëîãè÷åñêèå ñïîñîáíîñòè íàøåãî îðãàíèçìà. ×åëîâåê - "ïëîäîÿäíûé" (îò "ïëîäû"), à íå "ïëîòîÿäíûé" (îò "ïëîòü") æèâîé îðãàíèçì. Ïîñìîòðèòå, êàê ôèçèîëîãè÷åñêè ÷åëîâåê îòëè÷àåòñÿ îò ïëîòîÿäíûõ (õèùíèêîâ)! Çóáû ó ïëîòîÿäíûõ æèâîòíûõ äëèííûå è çàîñòðåííûå, à ó íàñ êîðåííûå çóáû ïðèñïîñîáëåíû äëÿ äðîáëåíèÿ è ðàçìàëûâàíèÿ ïëîäîâ, íî íå ïëîòè. Ñëþíà ïëîòîÿäíûõ æèâîòíûõ èìååò êèñëóþ ðåàêöèþ è ïðèñïîñîáëåíà äëÿ ïåðåâàðèâàíèÿ æèâîòíîãî áåëêà: â íåé íåò âåùåñòâ äëÿ ïåðåâàðèâàíèÿ óãëåâîäîâ. À íàøà ñëþíà èìååò ùåëî÷íóþ ðåàêöèþ è ñîäåðæèò âåùåñòâî äëÿ ïåðåâàðèâàíèÿ êðàõìàëîâ. Æåëóäîê ïëîòîÿäíûõ æèâîòíûõ âûäåëÿåò â 10 ðàç áîëüøå èäåîõëîðíîé êèñëîòû, ÷åì æåëóäîê ïëîäîÿäíîãî æèâîòíîãî è ÷åëîâåêà. Êèøå÷íèê ïëîòîÿäíîãî æèâîòíîãî â 3 ðàçà äëèííåå åãî òóëîâèùà è ïðèñïîñîáëåí äëÿ áûñòðîãî èçãíàíèÿ çàãíèâàþùåé ïèùè. Ïðîòÿæåííîñòü æå êèøå÷íèêà ÷åëîâåêà â 12 ðàç áîëüøå òóëîâèùà, è ïðåäíàçíà÷åí îí äëÿ òîãî, ÷òîáû óäåðæèâàòü â ñåáå ïèùó âñå òî âðåìÿ, êîòîðîå íåîáõîäèìî äëÿ âñàñûâàíèÿ ïèòàòåëüíûõ âåùåñòâ. Ïå÷åíü ïëîòîÿäíîãî æèâîòíîãî ñïîñîáíà óäàëÿòü â 10 - 15 ðàç áîëüøå ìî÷åâîé êèñëîòû, ÷åì ïå÷åíü ÷åëîâåêà, ëþáîãî ïëîäîÿäíîãî èëè òðàâîÿäíîãî æèâîòíîãî. Íàøà ïå÷åíü ìîæåò óäàëèòü ëèøü íåáîëüøîå êîëè÷åñòâî ìî÷åâîé êèñëîòû. À òå, êòî çíàêîì ñ ìîåé êíèãîé "Ïîïðîùàéòåñü ñ áîëåçíÿìè", íàâåðíîå, ïîìíÿò, ÷òî, ñîãëàñíî èññëåäîâàíèÿì Ðóáíåðà, æèâîòíûå áåëêè, ïîïàâ â êðîâü, áûñòðî ðàñùåïëÿþòñÿ íà äâå ÷àñòè: àçîòñîäåðæàùóþ è áåçàçîòèñòóþ. Àçîòñîäåðæàùàÿ ÷àñòü áåëêà âîîáùå íåïðèãîäíà äëÿ ñíàáæåíèÿ îðãàíèçìà ýíåðãèåé. Îíà ðàñïàäàåòñÿ ïðè íåïîñðåäñòâåííîì îáðàçîâàíèè òåïëà íà ìî÷åîáðàçóþùèå âåùåñòâà è âûâîäèòñÿ èç òåëà, à âòîðàÿ ÷àñòü - áåçàçîòèñòàÿ - êàê ðàç è äîñòàâëÿåò îðãàíèçìó âñþ ñóììó ïðîèçâîäèòåëüíîé ýíåðãèè áåëêà, íî ýòà ñóììà - ëèøü ïîëîâèíà ïîëåçíîãî ýôôåêòà (52 - 56%). Ìàëî òîãî, ýòîò áåçàçîòèñòûé îñòàòîê åñòü íå ÷òî èíîå, êàê ñîäåðæàùèéñÿ â áåëêå óãëåâîä! Òàêèì îáðàçîì, äëÿ ñîçäàíèÿ æèçíåííîé ýíåðãèè íàøåãî îðãàíèçìà áîëüøå âñåãî íåîáõîäèìî íå áåëêà, íå æèðà, à óãëåâîäîâ, ïóñòü äàæå ñèíòåçèðîâàííûõ èç áåëêà. Ê ñîæàëåíèþ, íè îðòîäîêñàëüíàÿ ìåäèöèíà, íè äèåòîëîãè, íè òåì áîëåå ïèùåâàÿ ïðîìûøëåííîñòü íå æåëàþò çíàòü îáî âñåõ ýòèõ îòêðûòèÿõ íàóêè è óâåðÿþò âñåõ, ÷òî íàñòîÿùèå áåëêè ÷åëîâåê ìîæåò ïîëó÷èòü ëèøü èç ìÿñà, ÿèö, ðûáû, òâîðîãà, ìîëîêà, ñîñèñîê, âåò÷èíû, áèôøòåêñà, ñûðà. Òåì íå ìåíåå èññëåäîâàíèÿ Ðóáíåðà ïîêàçàëè, ÷òî ïðè îãðîìíîé çàòðàòå ñèë íàø îðãàíèçì ïîëó÷àåò îò ìÿñà ëèøü 52 - 56%, Äà ïðèòîì óãëåâîäîâ, â òî âðåìÿ êàê â ìåäå," ñëàäêèõ ôðóêòàõ, îâîùàõ è îðåõàõ ýòîò óãëåâîä ïðèñóòñòâóåò â ëåãêî óñâîÿåìîé äëÿ íàñ ôîðìå è â ëó÷øèõ ñî÷åòàíèÿõ! Èññëåäîâàíèÿ Ðóáíåðà ãîâîðÿò è î òîì, ÷òî æèâîòíûå, êóëèíàðíûå, à òàêæå èñêóññòâåííûå áåëêè íàèìåíåå ïðèñïîñîáëåíû äëÿ òîãî, ÷òîáû ïîñòàâëÿòü îðãàíèçìó ýíåðãèþ. Ìî÷åâàÿ êèñëîòà ÿâëÿåòñÿ îñîáåííî îïàñíûì òîêñè÷íûì âåùåñòâîì, êîòîðîå ìîæåò ðàçðóøèòü îðãàíèçì. À â ðåçóëüòàòå ïåðåâàðèâàíèÿ ìÿñà â îðãàíèçìå âûñâîáîæäàåòñÿ áîëüøîå êîëè÷åñòâî ýòîé ìî÷åâîé êèñëîòû. Ìû äîëæíû âñåãäà ïîìíèòü, ÷òî â îòëè÷èå îò õèùíèêîâ è âñåÿäíûõ æèâîòíûõ ó ëþäåé íåò ôåðìåíòíîãî ìî÷åïðèåìíèêà äëÿ ðàñùåïëåíèÿ ìî÷åâîé êèñëîòû. ÂÑÅ ÊÀÊ ÁÛ ÒÀÊ ÏÐÎÑÒÎ,ÍÎ ÝÒÎ ÍÀÄÎ ÂÛÄÅÐÆÀÒÜ,À ß ËÞÁËÞ ÏÎÅÑÒÜ,È ÐÅÇÓËÜÒÀÒ ÏËÞÑ 12 ÊÃ.ÇÀ ÄÂÀ ÃÎÄÀ ,ÊÀÊ ß ÍÀ .ÏÅÍÑÈÈ ïîñòîÿííîå ÷óâñòâà íåõâàòêè âîçäóõà ïðè õîíäðîçå è ÷óâñòâî îíåìåíèÿ â ãëîòêå. ïî÷åìó è êàê ñ ýòèì áîðîòüñÿ? ß ìîãó ïîìî÷ü áûñòðî è áåçáîëåçíåííî èçáàâèòüñÿ îò ãíîéíûõ áîëåçíåé: ïàíàðèöèé, ôóðóíêóë, ìàñòèò.8 9276756909 Âñå ïðàâèëüíî è ãðàìîòíî íàïèñàíî, ñàìà ÿ ñûðîåä è ðàäà ÷òî åþ ñòàëà, õîòÿ ïî íà÷àëó áûëî òðóäíîâàòî, çàòî òåïåðü ëåãêî, çäîðîâî, ýíåðãè÷íî. Ëþäè, ïåðåõîäèòå íà ñûðîåäåíèå è áóäåòå çäîðîâû. Ó ñòðàõà ãëàçà âåëèêè (ïåðåéòè íà ñûðîåäåíèå ïîõîæå êàê åñëè ÷åëîâåê ñìîã áðîñèòü êóðèòü) Êàê ñòðàííî óâèäåòü òàêèå òóïûå êîììåíòàðèè íà ôîðóìå Ñèíòîíà. Ïðÿì êàêîå-òî ÏÒÓ. Ãäå æå âû, õâàëåíûå ëèäåðû, ìàñòåðà Äèñòàíöèè, ïîñòàíîâùèêè öåëåé, ðàáîòàþùèå íà ðåçóëüòàò? Èëè ñîáñòâåííîå çäîðîâüå äëÿ âàñ íåäîñòîéíàÿ öåëü? Äàííûé ðàçäåë ñàéòà ÿâëÿåòñÿ âèðòóàëüíîé áèáëèîòåêîé. Íà îñíîâàíèè Ôåäåðàëüíîãî çàêîíà Ðîññèéñêîé ôåäåðàöèè «Îá àâòîðñêîì è ñìåæíûõ ïðàâàõ» (â ðåä. Ôåäåðàëüíûõ çàêîíîâ îò 19.07.1995 N 110-ÔÇ, îò 20.07.2004 N 72-ÔÇ), êîïèðîâàíèå, ñîõðàíåíèå íà æåñòêîì äèñêå èëè èíîé ñïîñîá ñîõðàíåíèÿ ïðîèçâåäåíèé, ðàçìåùåííûõ â äàííîé áèáëèîòåêå, êàòåãîðè÷åñêè çàïðåùåíû.   Âñå ìàòåðèàëû, ïðåäñòàâëåííûå â äàííîì ðàçäåëå, âçÿòû èç îòêðûòûõ èñòî÷íèêîâ è ïðåäíàçíà÷åíû èñêëþ÷èòåëüíî äëÿ îçíàêîìëåíèÿ. Âñå ïðàâà íà ñòàòüè ïðèíàäëåæàò èõ àâòîðàì è èçäàòåëüñòâàì. Åñëè âû ÿâëÿåòåñü ïðàâîîáëàäàòåëåì êàêîãî-ëèáî èç ïðåäñòàâëåííûõ ìàòåðèàëîâ è íå æåëàåòå, ÷òîáû ññûëêà íà íåãî íàõîäèëàñü íà íàøåì ñàéòå, ñâÿæèòåñü ñ íàìè, è ìû íåìåäëåííî óäàëèì åå. Ñåãîäíÿ: Ïîïðîáóéòå íîâûé ñòèëü â îäåæäå, ðåøèòåñü íà íîâóþ ïðè÷åñêó (èëè äàæå ñòðèæêó). Ïðèÿòíî ñåáÿ ïîðîé óäèâëÿòü :) Çàðåãèñòðèðîâàòü êîìïàíèþ  ñèñòåìå óæå çàðåãèñòðèðîâàíî 53640 êîìïàíèé! Âàñ åùå íåò íà local.by? Ñäåëàéòå ýòî àáñîëþòíî áåñïëàòíî!!! Ãëàâíàÿ | Íîâîñòè | Êàòàëîã òîâàðîâ è óñëóã | Êàòàëîã îðãàíèçàöèé | Î ïðîåêòå
Global structural optimization of 3d models based on modal analysis Yuan Liu, Xuefeng Liu, Jiansong Deng, Zhouwang Yang* *Corresponding author for this work Research output: Contribution to journalArticlepeer-review Abstract Traditional structural optimization methods require predefined load conditions. The resulting structure is optimal under the given condition, but can be weak under different loads. Objects can suffer from various forces in practical applications. The overall performance of objects cannot be guaranteed and thus more material than actually needed is used. In this work we propose a novel approach to enhance the global strength of 3D objects under all possible load distribution, which make the strength of the object isotropic to resist different forces. The method is based on modal analysis. We first detect the weak region of the object and then reinforce it by optimizing the eigenvalue of the stiffness matrix. Based on the concept of Rayleigh Quotient, an efficient algorithm is also presented. Experiments show that our method can effectively improve the global strength of 3D objects. Original languageEnglish Pages (from-to)590-596 Number of pages7 JournalJisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics Volume27 Issue number4 Publication statusPublished - 2015 Apr 1 Keywords • Eigenvalue optimization • Modal analysis • Rayleigh Quotient • Structure optimization ASJC Scopus subject areas • Computer Graphics and Computer-Aided Design • Software Fingerprint Dive into the research topics of 'Global structural optimization of 3d models based on modal analysis'. Together they form a unique fingerprint. Cite this
Email updates Keep up to date with the latest news and content from Genome Biology and BioMed Central. Open Access Method Correcting for sequence biases in present/absent calls Eugene F Schuster1*, Eric Blanc2, Linda Partridge3 and Janet M Thornton1 Author Affiliations 1 European Bioinformatics Institute, Wellcome Trust Genome Campus, Hinxton Cambridge CB10 1SD, UK 2 MRC Centre for Developmental Neurobiology, King's College London, Guy's Hospital Campus, London SE1 1UL, UK 3 Department of Biology, University College London, Gower Street, London WC1E 6BT, UK For all author emails, please log on. Genome Biology 2007, 8:R125  doi:10.1186/gb-2007-8-6-r125 The electronic version of this article is the complete one and can be found online at: http://genomebiology.com/2007/8/6/R125 Received:13 December 2006 Revisions received:11 May 2007 Accepted:26 June 2007 Published:26 June 2007 © 2007 Schuster et al.; licensee BioMed Central Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract The probe sequence of short oligonucleotides in Affymetrix microarray experiments can have a significant influence on present/absent calls of probesets with absent target transcripts. Probesets enriched for central Ts and depleted of central As in the perfect-match probes tend to be falsely classified as having present transcripts. Correction of non-specific binding for both perfect-match and mismatch probes using probe-sequence models can partially remove the probe-sequence bias and result in better performance of the MAS 5.0 algorithm. Background The Affymetrix GeneChip technology uses a simple method to distinguish 'true' biological signal from background noise. Labeled cRNA transcripts are hybridized to 25 base-pair (bp) oligonucleotide 'probes' covalently bound to the array. Probes are designed in pairs with one probe designed to perfectly match the target transcript (PM probe) and the other designed to measure the non-specific binding signal of its partner PM probe. The mismatch (MM) probe is identical to its partner PM probe except for the central (13th) nucleotide, which is changed to the complementary base. Ideally, the subtraction of MM probe signal from its partner PM probe signal results in the removal of non-specific background and a target transcript specific signal. To gain a more robust target transcript signal, there are typically 11-20 PM-MM probe-pairs within a probeset that query different sequences of the same target transcript. The probeset design also allowed Liu et al. [1] to create an algorithm (the MAS 5.0 algorithm) that detects the presence or absence of a target transcript. PM probe signals that are greater than their partner MM probe signals imply that the target transcripts are present. If the PM signal is equal to its partner MM signal, then it is likely that both PM and MM probes report non-specific binding and the target transcript is absent from the labeled cRNA. For a probe-pair, a discrimination score R can be calculated by (PM - MM)/(PM + MM). Liu and colleagues' MAS 5.0 detection algorithm is based on the distribution of R scores for every probe-pair within a probeset. The classification of presence or absence is based on P values generated with the one-sided Wilcoxon signed rank test [2]. The benefits of the Wilcoxon signed rank test is that it is a non-parametric test, insensitive to outliers and there are well established methods to generate confidence levels (that is, P values) [3]. For the present/absent algorithm, the null hypothesis in the Wilcoxon signed rank test is that the distribution of R scores for a probeset is symmetrical around τ and that the target transcript is absent from the labeled cRNA. As the median R score for a probeset increases above τ, the likelihood that the null hypothesis is true decreases and the chance that the target transcript is present increases. The sensitivity and specificity of the MAS 5.0 algorithm can be adjusted by varying τ. The default value of τ is set to 0.015 based on the medians of discrimination scores for transcripts with concentrations of 0 and 0.25 pM [1]. The setting of τ above zero reduces the number of false positive classifications, as the (PM - MM)/(PM + MM) scores are slightly biased for low P values. Liu and colleagues did not pursue the phenomenon further, but recent developments in the understanding of non-specific binding of short oligonucleotides has led us to investigate it. It is known that up to one-third of MM probes have signal intensities greater than their partner PM probes [4]. While this may contradict the observation that PM probes can be greater than their MM probes when not bound by their target transcripts, it has also led to a likely explanation of the phenomenon. Probe sequence analysis carried out by Naef and Magnasco [5] revealed that in 95% of the cases in which MM probe signal was greater than its partner PM signal, the central nucleotide of the PM probe was a purine (adenine or guanine). Further analysis led them to empirically calculate the contribution of every nucleotide at every position in a 25 nucleotide probe to signal intensity. They found that cytosines (C) contributed to higher signal intensity, especially if they were more central. Conversely, adenines (A) diminished signal intensity, especially if they were more central. Switching a central nucleotide (13th) from A to C could increase the signal intensity by more than two-fold [5]. Given the importance of probe-sequence for signal intensity, we were motivated to determine its importance for present/absent calls and speculated that the present/absent calls would be influenced by probe sequence. One hypothesis is that an empty probeset with many PM probes containing T as the central nucleotide would be falsely called present, as the partner MM probes would have central A nucleotides and, therefore, a lower intensity. Another hypothesis is that probesets with present target transcripts (that is, bound probesets) would be falsely called absent if the PM probes were enriched with central A nucleotides. In order to carry out a probe-sequence analysis of present/absent calls, we have used a large scale dataset of known composition (the GoldenSpike dataset) [6]. This dataset consists of three replicates of two different cRNA compositions (control and spiked-in) in which all transcripts are known. The cRNA samples are made of 3,859 unique clones of known sequence and were generated from PCR products from the Drosophila Gene Collection (DGC; release 1.0) [7]. The absolute concentration of individual cRNA transcripts were not known, but an alignment between the sequences of 3,851 (out of 3859) clones and all PM probe sequences on the Drosgenome1 GeneChip array determined which probesets are called empty and which should be bound by their target transcripts. Previous analysis of the GoldenSpike dataset has generated a near complete knowledge of empty and bound probesets, and we were able to classify 10,104 probesets as empty and 3,906 probesets as bound by their target transcript. There were 2,495 probesets that could be aligned to a transcript with equal concentrations in control (C) and spiked-in (S) replicates (fold change = 1 probeset), and there were 1,284 probesets that could be aligned to a transcript with a greater concentration in S replicates (fold change > 1 probeset). There were 127 probesets that could be aligned to multiple transcripts; however, there are also a few probesets that are likely to be falsely classified as empty due to problems in determining the sequence of a small number of clones in the DGC [8]. Additionally, the importance of probe-sequence on signal intensity for empty probesets has been studied and established for the GoldenSpike dataset, and it was found that the Naef probe-sequence model could be used to accurately predict the intensity of non-specific binding of PM and MM probes within empty probesets (Figure 1). thumbnailFigure 1. Naef affinities for empty probesets. The probe positions affinities using Naef's model [5] for adenine (red), thymine (blue), cytosine (black) and guanine (green) of empty PM and MM probes in the GoldenSpike dataset. The sum of the affinities as each position is zero, and the affinity of a probe, is based on the sum of the single nucleotide affinities at each position for that probe. With knowledge of present/absent transcripts and the influence of probe sequence, we could assess the impact of probe sequence on present/absent calls and find methods that would reduce any probe sequence biases. The performance of methods can be assessed by comparing the rate of finding true positives (that is, probesets that can be aligned to transcripts within the GoldenSpike dataset) to the rate of finding false positives (empty probesets) using receiver-operator characteristics (ROC) curves. The use of a large-scale dataset also allows a better assessment of the false discovery rate of the MAS 5.0 present/absent algorithm. Our main goal is to improve the reliability of detecting probesets with absent or present target transcripts. Results and discussion False positives associated with the MAS 5.0 present/absent algorithm The MAS 5.0 present/absent calls are determined by the distribution of (PM - MM)/(PM + MM) calculated for each probe-pair within a probeset. Present/absent calls are based on P values generated with the one-sided Wilcoxon signed rank test where the null hypothesis is that the distribution of (PM - MM)/(PM + MM) is symmetrical around τ. The mean P value of empty probesets is 0.43 when τ is zero and 0.53 when τ is set to the default 0.015 value, confirming the need for a threshold to correct for a slight bias for present calls. Probesets classified as having a present or marginally present target transcript have a P value less than 0.06 in the MAS 5.0 algorithm, and given a uniform distribution of P values for null probesets, 6 out of every 100 probesets with absent target transcripts will be falsely classified as having a present or marginal transcript. The observed distribution of P values for empty probesets is clearly not uniformly distributed, and there is a bias for empty probesets to have P values near zero or one that results in a slightly higher number of false present calls than expected (Figure 2a). At the 0.06 cutoff, we observed that an average of 7.1 out of every 100 empty probesets were classified as having a present target transcript. However, the difference between expected and observed values may be explained by our lack of complete knowledge of the sequence of every clone in the DGC, as we are lacking the sequence of 8 clones out the 3,859 clones. thumbnailFigure 2. MAS 5.0 present/absent calls. (a) The average frequency of P values of empty probesets generated by the MAS 5.0 present/absent algorithm when τ = 0.015 (solid black line) and when τ = 0 (dotted line). The average was taken over the six samples. The percentage of central nucleotides in PM probes for empty probesets with P values < 0.06, for all empty probesets (similar percentages are present in all probesets), and for empty probesets with P values > 0.94 are shown. (b) P values generated with the Wilcoxon signed rank test for random empty probesets. The PM-MM probe-pairs from empty probesets with fewer than six alignment errors to any transcript in the GoldenSpike dataset were randomly re-assembled into probesets based on the central nucleotide (for example, only central T nucleotides in the PM probes). Symbols and lines are colored according to the central nucleotide. Importantly, there is a significant overlap between the empty probesets called present in each sample, and this suggests that false present calls are not random. The total number of empty probesets called absent in all six samples is lower than expected if one assumes the false calls to be random. We observed 1,227 empty probesets with at least one present or marginal transcript call and expected more than 3,600, if the false calls for each sample are random. The central nucleotide of PM probes affects present/absent calls of empty probesets The extreme biases and overlap in false positives are likely to be due to the central nucleotide of the PM probes within a probeset. The signal intensity of 24% of all MM probes is greater than their partner PM probes in all 6 replicates, and 94% of these MM probes are within empty probesets. The central nucleotide of the PM probes in these probe-pairs is a purine (adenine or guanine) 82% of the time. Across the whole DrosGenome1 GeneChip, 38% of probesets have a central adenosine (A), 14% a central cytosine (C), 14% a central guanine, and 33% a central thymine (T). Empty probesets with P values below 0.04 (called present) are enriched for central T nucleotides and depleted of central A nucleotides by almost 10%. Conversely, empty probesets with P values greater than 0.96 are enriched for central A nucleotides and depleted of central T nucleotides by more than 10% (Figure 2a). The bias for high P values when the central PM nucleotides of a probeset are pyrimidines (C and T) and the bias for low P values when the central PM nucleotides are purines (A and G) can also be demonstrated by creating random empty probesets in which the central PM nucleotide is the same type of nucleotide for all PM probes within the probeset (Figure 2b). Present/absent calls of bound probesets False negatives More than 13% of probesets that can be aligned to fold change = 1 clones (318/2,495) and 3% of probesets that can be aligned to fold change > 1 clones (37/1,284) are falsely classified as having an absent target transcript in all 6 replicate samples. The false negative calls are not random, as there is a greater than 80% overlap between false negative calls in each sample, and more than 75% of the probesets falsely called absent come from the pools added at the lowest concentrations (0.44 μg or less RNA added). Unexpectedly, the number of fold change (FC) = 1 probesets falsely called absent in S samples is 20% higher (394/323) than in C samples. The majority (85%) of these probesets are also in the PCR-pools in which the amount of RNA added to the final samples was 0.44 μg or less. If the FC = 1 cRNAs were hybridized at the same concentrations in C and S samples, we can only speculate that the differences between C and S samples can account for the higher numbers of false negatives in S samples. The S samples have more total labeled cRNA due to the 'spiked-in' transcripts, and to make the total cRNA concentration the same in each sample, unlabeled poly(C) RNA was added to C samples [6]. The influence of the central nucleotide Assessing the influence of the central nucleotide for probesets bound by their target transcripts is complicated by the fact that the exact concentration of each transcript is not known and the majority of false absent calls are due to the low concentration of the target transcripts. The probesets falsely classified as having absent target transcripts (P values > 0.06 in all 6 replicates) are slightly enriched for central A nucleotides (42%) and depleted for central T nucleotides (30%) compared to the whole chip. When considering bound probesets with P values > 0.50 in all 6 replicates, 45% of PM probes have a central A and 26% have a central T. Alternative present/absent classifications Probeset expression values Given that the probe sequence is important for present/absent calls and probe signal intensity, we compared 301 different methods to generate probeset expression values to determine if the expression value cutoff could be used to classify probesets. The majority of methods were based on three different methods for correction of PM values: the robust multichip average (RMA) background correction method [9], in which an estimated background signal is subtracted from all PM probes; the MAS 5.0 method, in which the MM probe intensity is subtracted from its partner PM probe to correct for non-specific binding (NSB); and the GC-RMA method [10], in which PM probe intensities are transformed based on estimates of NSB and probe sequence biases in MM probes. The background/NSB corrections were combined with eight methods for normalization at the probe level, six methods to summarize probe values into probeset values, and loess or variance stabilization normalization [11] at the probeset level (see Materials and methods and [8] for more information). Performance of a method was based on ROC curves, where the rate of finding true positives (bound probesets) is compared to the rate of finding false positives (empty probesets), and performance scores are the area under the ROC curves (AUC). We observed that methods that used probe-sequence based corrections for non-specific binding (GC-RMA [10] and position di-nucleotide nearest neighbor [12] methods) outperformed the other methods and the MAS 5.0 present/absent algorithm. We also observed that the method of background/NSB correction influences performance much more than normalization and summarization methods, and that probeset normalization has very little affect on performance (Figure 3). thumbnailFigure 3. AUC performance for present/absent calls. AUC scores for 301 methods to generate probeset expression values (see Materials and methods and [8] for more information) based on the mean log2 value of each probeset for control (C) samples (rainbow colors as in legend). The performance of a method for spiked-in (S) samples (gray) is shown in the same column. True positives are probesets that can be aligned to the DGC clones that were used to create the GoldenSpike dataset. False positives are the remaining empty probesets. The horizontal lines indicate the AUC scores for the mean MAS 5.0 present/absent P value for C replicates (blue) and S replicates (gray). The use of expression values as a present/absent classifier is complicated by the need to generate a present/absent cutoff value that will be specific to the GeneChip and the experiment. For example, analysis of the best performing method suggests a log2 expression level cutoff value of 4 to remove empty probesets for the GoldenSpike dataset, but the cutoff value for the Latin Square dataset [13] is closer to 3 (Figure 4), possibly due to the content and number of probes in a probeset (14 in Drosgenome1 GeneChip and 16 in HU-133A_tag GeneChip). thumbnailFigure 4. Log10 of mean MAS 5.0 present/absent P value versus mean log2 expression value. (a) Plot of log10 mean MAS 5.0 present/absent P value versus mean log2 expression value for control (C) replicates in the GoldenSpike dataset. The default P values for absent (0.06) and marginal (0.04) are marked with vertical lines (blue), and suggested expression value cutoffs (99% probesets with P values > 0.06 are below the log2 cutoff) are marked by a dotted horizontal line (green). (b) ROC curves for C replicates using the best performing expression value method (black) and MAS 5.0 P values (red). Vertical lines correspond to the false positive rate of cutoff values suggested in (a). (c) Plot of log10 of mean MAS 5.0 present/absent P value versus mean log2 expression value for experimental replicates in the Latin-Square dataset. There are 42 spiked-in transcripts that can be aligned to probesets across a range of 14 different concentrations. The number of probesets called absent (MAS 5.0 P value < 0.06) is marked in the legend. Lines are as in (a). The quality of the calls using expression values or MAS 5.0 are also influenced by the content of the samples, as performance is higher on C samples compared to S samples (Figure 3). The unlabeled poly(C) RNA added to the C samples may increase the specificity of the present/absent calls. It is also possible that the higher concentration of labeled RNA in S samples may reduce specificity. In general, the GC-RMA and position di-nucleotide nearest neighbor (PDNN) probe sequence based methods have the smallest differences in performance between C and S samples, and the RMA background correction methods have the largest differences. MAS 5.0 classifications after intensity transformation based on probe sequence To reduce the influence of the central nucleotide, the intensity of PM and MM probes can be transformed based on Naef's affinities (Figure 1) using the GC-RMA method, and MAS 5.0 present/absent calls can be based on the sequence corrected PM and MM probe intensities. Transformed PM and MM values result in better performance of the MAS 5.0 algorithm, and the distribution of P values for empty probesets is similar to the distribution for raw PM and MM values (τ = 0.015) in Figure 2. For the transformed value, AUC performance peaks when τ is increased from 0.015 to 0.1 (Figure 5a). The change in τ shifts the P values of empty probesets towards 1 with little influence on the P values of probesets with present transcripts (Figure 6) and increases the ability to discriminate between empty and bound probesets (that is, improve sensitivity and specificity). At the same P value or true positive cutoff value, the number of false positives is significantly less when using transformed probe values compared to raw probe values (Figure 5c). thumbnailFigure 5. AUC performance of alternative methods. (a) AUC scores for the MAS 5.0 present/absent algorithm when raw (black) or GC-RMA transformed (red) PM and MM are used. Scores were generated with a range of τ values. (b) AUC scores when MM probe values are replaced by a GC-RMA transformed PM value. The threshold values are based on the mean value of PM probes from probesets that have absent target transcripts. Scores using different stringencies of finding absent transcripts are shown (P > 0.06, black; P > 0.25, red; P > 0.50, green; P > 0.75, blue). (c) ROC curves based on MAS 5.0 present/absent P values when using raw probe values (gray), GC-RMA transformed probe values (black) and threshold probe values (blue dotted line) are shown. Green lines indicate the true (horizontal) and false (vertical) positive rate for the default P value cutoff (0.06) to separate 'marginally present' and absent transcripts using raw PM and MM values. AUC and ROC curves are based on the mean P value of control replicates. thumbnailFigure 6. MAS5 present/absent calls for alternative methods. (a) The average frequency of P values of probesets with present target transcripts generated by the MAS 5.0 present/absent algorithm when using raw PM and MM values (gray), GC-RMA transformed PM and MM values (black) and GC-RMA PM threshold values (blue) are shown. (b) The average frequency of P values of probesets with absent target transcripts (that is, empty probesets) generated by the MAS 5.0 present/absent algorithm. The transformation partially corrects the central nucleotide bias for empty probesets. For the 500 empty probesets with the lowest P values (that is, false positives), PM probes have a central T 43% of the time when raw PM and MM values are used and 37% of the time when transformed PM and MM values are used (see Additional data file 1 for a script for performing this transformation). Given the large number of transcripts that are known to be hybridized in the GoldenSpike dataset, we were able to estimate the false discovery rate of the P value cutoffs for present and marginally present transcripts (Table 1). The estimates of false discovery rates are roughly similar in the Latin Square dataset [13] when considering transcripts with concentrations less than 2 pM (data not shown). Table 1. False discovery rates for present and marginally present classifications MAS 5.0 classifications using MM threshold values To gain a small additional improvement in performance, all MM probe values can be replaced by a threshold value and the MAS 5.0 algorithm can be used to classify target transcripts. The MM threshold value is based on the mean PM value (after GC-RMA transformation) of probesets that are very likely to have absent target transcripts, and the MAS 5.0 present/absent calls are re-calculated with the MM threshold values (Figure 5, Table 1). The MM threshold method also shifts the P values of empty probesets towards 1 (Figure 6) and allows a better separation between empty and bound probesets (see Additional data file 1 for a script to perform this method). Conclusion The detection of probesets with absent transcripts is shaped by the central nucleotide of PM probes, with enrichment of central T nucleotides in PM probes resulting in false present calls. This makes sense in light of the way in which PM and MM probes are designed (that is, the central nucleotide of MM probes is complementary to the central nucleotide of PM probes) and the way NSB signal intensity is influenced by probe sequence (that is, T nucleotides contribute to low signal intensity, especially in the middle of the probe, and the complementary A nucleotides contribute to higher signal intensities). The influence of probe-sequence is likely to affect all Affymetrix GeneChip datasets, and we have suggested that transformation of PM and MM probe intensities based on probe-sequence can partially correct for the false positives; the majority of the false positives are associated with PM probes that have a T as the central nucleotide and increase the performance of MAS 5.0 present/absent calls. With the benefit of a large dataset in which hybridized transcripts are known, we can roughly estimate the false discovery rate of the MAS 5.0 present/absent algorithm and suggest more stringent P cutoffs that significantly reduce the number of false positives but maintain a similar number of true positives. However, there is still considerable room to improve in our knowledge and handling of short oligonucleotide mRNA expression arrays. Materials and methods Normalization R version 2.3.1 [14] and packages within BioConductor [15] were used to generate probeset expression values, except for the PDNN transformation of PM values in Perfect Match [16] and methods available in dChip [17]. For correction of background and/or non-specific binding, we used RMA [9], MAS5 PM-MM [3,18] and GC-RMA [10]. For probe-level normalization, loess, constant [3,18], quantiles [9], variance stabilization normalization (vsn) [11] and invariantset [17] were used. For probe summary into probeset values, medianpolish [9], li-wong [17], tukey-biweight [3,18], farms [19], affyPLM [20], and avgdiff and probeset-level normalization (vsn and loess) were used. In addition, we calculated probeset values with the RMA [9] and GC-RMA [10] methods, the GoldenSpike (GOLD) method [6], which combines the expression values of eight different PM-MM methods, and Probe Logarithmic Intensity Error (PLIER) estimation [21]. All probeset values were imported into R, and normalized using FC = 1 probesets as a subset. AUC AUC scores were generated with ROCR [22]. True positives were defined as probesets that could be aligned to the DGC clones that were part of the GoldenSpike dataset, and true negatives were defined as all other probesets on the DrosGenome1 GeneChip. Alternative present/absent methods Scripts for MAS 5.0 present/absent classifications using transformed PM and MM probe intensities or a PM threshold value are available in Additional data file 1. Additional data files The following additional data are available with the online version of this paper. Additional data file 1 contains scripts for present/absent calls for use in R with BioConductor. Additional data file 1. Scripts for present/absent calls for use in R with BioConductor. Format: TXT Size: 4KB Download fileOpen Data Acknowledgements This work was supported by a grant from the Wellcome Trust, Functional Genomic Analysis of Aging. References 1. Liu Wm, Mei R, Di X, Ryder TB, Hubbell E, Dee S, Webster TA, Harrington CA, Ho Mh, Baid J, Smeekens SP: Analysis of high density expression microarrays with signed-rank call algorithms. Bioinformatics 2002, 18:1593-1599. PubMed Abstract | Publisher Full Text OpenURL 2. Wilcoxon F: Individual comparisons by ranking methods. Biometrix Bulletin 1945, 1:80-83. Publisher Full Text OpenURL 3. Affymetrix Statistical Algorithms Description Document [http://www.affymetrix.com/support/technical/whitepapers/sadd_whitepaper.pdf] webcite 4. Naef F, Lim DA, Patil N, Magnasco M: DNA hybridization to mismatched templates: a chip study. Phys Rev E Stat Nonlin Soft Matter Phys 2002, 65:040902. PubMed Abstract | Publisher Full Text OpenURL 5. Naef F, Magnasco MO: Solving the riddle of the bright mismatches: Labeling and effective binding in oligonucleotide arrays. Phys Rev E Stat Nonlin Soft Matter Phys 2003, 68:011906. PubMed Abstract | Publisher Full Text OpenURL 6. Choe SE, Boutros M, Michelson AM, Church GM, Halfon MS: Preferred analysis methods for Affymetrix GeneChips revealed by a wholly defined control dataset. Genome Biol 2005, 6:R16. PubMed Abstract | BioMed Central Full Text | PubMed Central Full Text OpenURL 7. Stapleton M, Carlson J, Brokstein P, Yu C, Champe M, George R, Guarin H, Kronmiller B, Pacleb J, Park S, et al.: A Drosophila full-length cDNA resource. Genome Biol 2002, 3:RESEARCH0080. PubMed Abstract | BioMed Central Full Text | PubMed Central Full Text OpenURL 8. Schuster E, Blanc E, Partridge L, Thornton J: Estimation and correction of non-specific binding in a large-scale spike-in experiment. Genome Biol 2007, 8:R126. PubMed Abstract | BioMed Central Full Text OpenURL 9. Irizarry RA, Hobbs B, Collin F, Beazer-Barclay YD, Antonellis KJ, Scherf U, Speed TP: Exploration, normalization, and summaries of high density oligonucleotide array probe level data. Biostat 2003, 4:249-264. Publisher Full Text OpenURL 10. Wu Z, Irizarry RA: Stochastic models inspired by hybridization theory for short oligonucleotide arrays. J Comput Biol 2005, 12:882-893. PubMed Abstract | Publisher Full Text OpenURL 11. Huber W, von Heydebreck A, Sultmann H, Poustka A, Vingron M: Variance stabilization applied to microarray data calibration and to the quantification of differential expression. Bioinformatics 2002, 18(Suppl 1):S96-104. PubMed Abstract | Publisher Full Text OpenURL 12. Zhang L, Miles MF, Aldape KD: A model of molecular interactions on short oligonucleotide microarrays. Nat Biotechnol 2003, 21:818-821. PubMed Abstract | Publisher Full Text OpenURL 13. Latin Square Data for Expression Algorithm Assessment [http://www.affymetrix.com/support/technical/sample_data/datasets.affx] webcite 14. R Development Core Team: R: A Language and Environment for Statistical Computing. Vienna, Austria: R Foundation for Statistical Computing; 2005. OpenURL 15. Gentleman RC, Carey VJ, Bates DM, Bolstad B, Dettling M, Dudoit S, Ellis B, Gautier L, Ge Y, Gentry J, et al.: Bioconductor: open software development for computational biology and bioinformatics. Genome Biology 2004, 5:R80. PubMed Abstract | BioMed Central Full Text | PubMed Central Full Text OpenURL 16. Perfect Match [http://odin.mdacc.tmc.edu/~zhangli/PerfectMatch/] webcite 17. Li C, Hung Wong W: Model-based analysis of oligonucleotide arrays: model validation, design issues and standard error application. Genome Biol 2001, 2:RESEARCH0032. PubMed Abstract | Publisher Full Text | PubMed Central Full Text OpenURL 18. Hubbell E, Liu WM, Mei R: Robust estimators for expression analysis. Bioinformatics 2002, 18:1585-1592. PubMed Abstract | Publisher Full Text OpenURL 19. Hochreiter S, Clevert DA, Obermayer K: A new summarization method for affymetrix probe level data. Bioinformatics 2006, 22:943-949. PubMed Abstract | Publisher Full Text OpenURL 20. Bolstad B: Low level analysis of high-density oligonucleotide array data: background, normalization and summarization. PhD thesis. University of California, Berkeley, The Interdepartmental Group in Biostatistics; 2004. OpenURL 21. PLIER Technical Note [http://www.affymetrix.com/support/technical/technotes/plier_technote.pdf] webcite 22. Sing T, Sander O, Beerenwinkel N, Lengauer T: ROCR: visualizing classifier performance in R. Bioinformatics 2005, 21:3940-3941. PubMed Abstract | Publisher Full Text OpenURL
0 yet again right? Ok, so this time, the task is to write an application that asks the user for his or her birth date and replies with the day of the week on which they were born. So here is the code i have. package Ch2Scanner; import java.text.SimpleDateFormat; import java.util.*; public class Ch2Scanner { public static void main(String[] args) { Scanner scanner; scanner = new Scanner(System.in); SimpleDateFormat sdf; sdf = new SimpleDateFormat("EEEE"); String birthday; //prompt the user for input java.util.Date bdate = java.sql.Date.valueOf("1990-07-21"); System.out.println("Enter your birthday here:"); birthday= scanner.next(); System.out.println("What is your birthday?" + birthday + "." ); } } ok, so when i run it, it comes up with, enter birthday, so i do and hit enter. Then it just reads back what I entered. I need it to say saturday. The TA (who can hardly speak english) said something about using the SimpleDateFormat and creating an object for it, then implementing it, and i thought i had..but i guess not. Any help would be great. Thanks in advanced. 3 Contributors 2 Replies 3 Views 8 Years Discussion Span Last Post by di2daer Featured Replies • 1 Ezzaral 2,714   8 Years Ago If you create an instance of SimpleDateFormat using a pattern that corresponds to your intput, you can use the [URL="http://java.sun.com/javase/6/docs/api/java/text/DateFormat.html#parse(java.lang.String)"]parse(String)[/URL] method to convert the string input to a [URL="http://java.sun.com/javase/6/docs/api/java/util/Date.html"]Date[/URL] object, which you can then use to get the day of the week. [URL="http://java.sun.com/javase/6/docs/api/java/util/Calendar.html"]Calendar[/URL] is what you should really use for … Read More 1 If you create an instance of SimpleDateFormat using a pattern that corresponds to your intput, you can use the parse(String) method to convert the string input to a Date object, which you can then use to get the day of the week. Calendar is what you should really use for this, but I'm not sure what the specifics of your assignment are (and the whole date/calendar thing is pretty much a mess anyway). 0 With this: java.util.Date bdate = java.sql.Date.valueOf("1990-07-21"); you can get the value of a string, so get the value of the input from the user. Then you can use this value to get the day (represented as an integer): bdate.getDate() . Thats pretty much it, if you want the output to be a little better create an array of strings, like: String days[] = {"Sunday", "Monday" etc..} and then get this day with: days[bdate.getDays] However, getDate() is deprecated so you might want to look up how to solve the problem with Calendar instead. Hope this helps! This topic has been dead for over six months. Start a new discussion instead. Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.
Safety Is More Important Than The Project Itself Whether you’re an experienced or an amateur metal worker, you must know the importance of safety gear for welding. The first thing to know is that your safety is important whether you’re a carpenter a painter, a metal worker, or even a mechanic. This is the main reason why you need to get yourself and your family protected for you to keep enjoying your profession. But before getting into the details of this article, here are some important facts that you must know about your safety gear: Wear protective clothing. If you’ll be involved in an accident, you must wear a suit of protective clothing that will cover your skin from the outside to inside. You must ensure that you wear a durable suit which will also protect you from chemical spills, dust, acid, heat, cold, and other kinds of accidents. Wear safety goggles and safety gloves. Another essential piece of safety gear for metalwork is the safety goggles and gloves, which you should wear at all times when working. You can purchase safety glasses and gloves online or at any store that sells such items. If you have kids, you can also help them in choosing appropriate safety gear for the project. Always check your safety gear before use. You need to make sure that the safety gear is fitted correctly. Make sure that they fit tight so that they won’t slip off. As much as possible, you also need to make sure that you never leave any part of your safety gear in a position where it will not be easily available. Don’t leave your gear out. As much as possible, never leave your safety gear out in the open where you might get exposed to chemicals, dust, and other kinds of harmful elements. It is also recommended that you never use any kind of protective eye-wear which you don’t own since you won’t know what’s inside. Final Thoughts There are a lot of other things that you need to know about the importance of safety gear for metalwork, but those are just some of the most important points that you should take into consideration. It is also recommended that you consult with your employer for you to be able to obtain the best safety equipment for your work. Besides, you may find information on these important safety items by surfing the internet. What Type Of Metals? Most people will discover that metals for welding are the main types of tools that can be used in welding, whether they are welding an item or joining an item together. Metal alloys include steel, aluminum, magnesium, and brass among other materials that can be used in welding as well. A majority of welding operations will feature these materials which are commonly used and can be used for welding all kinds of metals, not just metals for welding. These metals can be alloyed with each other to make them tougher, lighter, more malleable, and durable. Tungsten is one of the most common alloys used in welding. There are several reasons why it is a popular choice and is actually a very strong metal. This is probably the most expensive of all the alloys for welding, which are used today. Titanium is another alloy that is used for welding. It is quite hard and often shows little flaws. Titanium is used by those who prefer the looks of this metal, but those who prefer that it is lighter and stronger. It is actually a very good option for use in welding. The only drawback to this metal is that it is very heavy and expensive, making it out of reach for many. Chrome is a very expensive metal that is used for welding. It is also one of the lightest metals for welding. This is also very durable, which makes it an ideal choice for those who prefer that their metals are strong, but also sturdy. There are also some who want this material to be in a weld that has a high temperature for an extended period of time. Forgings are generally made from wrought iron, steel, and copper. A majority of metals for welding use forgings. The hardness and strength of these forgings make them good options for use in welding. This alloy can be rolled into the necessary shapes for a good look. Copper alloys are very rare and can be found in only certain places. They are also very hard and strong, which makes them the ideal alloy for those who want a strong metal, but want it to be somewhat lighter. Copper is an excellent alloy for those who require a unique and special look for their welds. Tungsten carbide is also used for welding to make solid steel parts and items. This is also a very strong alloy but needs to be mixed with the right amount of aluminum so that it will not melt and cause a fire. Metals for welding can be useful for many different welding applications. Although they are rather costly, metals for welding are worth every penny. Innovative New Welding Tools Many people today are putting a lot of money into the latest advances in welding technology, which can allow them to save money and also allow them to have a lot more projects that they can work on. If you are interested in the newest and best in welding products, then it might be a good idea for you to visit Weldingmachinereviews.com. In this article, we will talk about the latest advances in welding technology that can help you a lot with your welding needs. MIG Welding A great new product is the MIG welding tool, which is one of the newest inventions in welding technology. It is actually a metal swarf cutter that can be used to cut the metal swarf that has been welded onto the workpiece. It is very useful because it can give you a perfect design for your workpiece because it can cut the metal swarf into any angle that you want to. This means that it can make any type of design that you want. DIG Welding The next product that is in great demand in the market today is the DIG welding technology. This product uses the DIG machine to help create the metal edges. The results that you get from this tool can really be amazing and it is very helpful for creating welds that are smooth and even. Next up we have the GGFS welding machine. This machine is perfect for creating straight lines as well as holes that are large. The reason why this product is so popular is that it gives you a lot of options for your workpiece. You can get the edges that you want or the holes that you want. CNC Machines A third welding machine that is getting very popular today is the CNC welding machine. This tool is very advanced and you can control what goes into your workpiece. The design that you get with this tool is truly a great tool for those who want to create a perfect design that can really benefit their company. These tools can really be a great way to get a lot of the things that you need and this are great news for you. The first thing that you will notice is that the prices of these products are higher than any other products that you have seen before. This is due to the fact that there are not a lot of companies that have these products available to the public. It is easier than ever to buy these tools from a different company than ever before. As long as you have a membership to your website you can get the tools at a cheaper price than you could ever imagine. This is a great way to get the newest tools that are being used and will save you time and money on your investment. If you want to get the tools that you want at a price that is so low you are going to love these products, then you should think about joining the thousands of people who have joined my website. This website is a tool that will help you find exactly what you need and save you a lot of money on your investment. Working With Copper If you are someone who loves to work with copper, then you may want to know a few tips on melting heat metal. When working with copper, you will need to know a few things about the metal before you can start working with it. You will also need to have an idea of how much you can melt before you need to stop. When you start working with copper, you will need to find a heat source that you can use. Copper is not that hard to melt when it is in its liquid form. However, if you are working with the metal as it is in its solid form, you need to know how much metal you can melt before you need to stop the process. The amount of metal that you can melt will depend on several factors, such as the temperature of the metal, the size of the coil, and the material that you are using for your coil. If you are trying to melt your molten metal into something, you will need to use a melting pot. There are several different types of pots that you can choose from, including convection, conduction, and direct heating. Before you decide on which type of pot to use, you will want to make sure that the pot has enough room for the amount of liquid that you are using to be safe. You should also make sure that the pot has a lid that is securely placed on it so that the liquid can’t escape. If you need to melt a very small amount of metal, you will want to use a convection heating pot because they allow you to heat the different materials that you are working differently. You will also need to have a way to transfer the metal to the bowl or dish that you are going to use. You will want to make sure that the metal is hot enough to move easily onto the container. You can also use a convection oven, which is also known as a pizza stone, to make different sizes of the metal that you are working with. However, you will want to make sure that the metal that you are heating is ready to be heated up through this method. Also, you will want to make sure that the metal that you are heating is really cold, which can help to give you a better result when you are melting the metal. Once you have decided on the type of pot that you want to use, you will want to make sure that you have some wire cutters to cut the metal up to the right size. You will also need to make sure that you have a piece of wire cut to the right length so that you can solder the connections together. If you don’t have enough, you will need to use extra wires to help you through the process. Finally, you will want to put the metal that you are heating in a pot that has been preheated and then turn on the heat until the metal becomes hot enough. When you are working with this metal, you will want to be careful not to move it around too much so that you do not burn yourself. You should also make sure that you have the proper tools and equipment to melt the metal that you are working with. If you are working with copper, you will want to remember a few things before you start to work with the metal. You will need to know how much liquid you will need to use before you can start melting it into a solid form. Then, you will need to know how to use the appropriate kind of pot that you are using, as well as a wire cutter and wire to cut the wires into the right lengths.
tag:blogger.com,1999:blog-5507551724075042835Mon, 02 Mar 2020 01:31:58 +0000programmingtechnologyasp.net-corecsharpdevicejavascriptui3d-printingcompetitiondesignengineeringhardwareiocreviewtransportationvirtual-machinewearablesweatherwindowsPlanet Diego BlogHusband, engineer, entrepreneur, explorer, tinkerer, photography aficionado and unquenchable intellectual curiosity. https://blog.planetdiego.com/noreply@blogger.com (Planetdiego)Blogger8125tag:blogger.com,1999:blog-5507551724075042835.post-7087986030999621208Fri, 18 Nov 2016 07:50:00 +00002018-05-30T19:12:33.231-04:00technologyvirtual-machinewindowsGenymotion Android Emulator Windows 10 Problems<p><a href="https://www.genymotion.com/" target="_blank">Genymotion</a> is my go to <a href="https://www.android.com/" target="_blank">Android</a> <a href="https://en.wikipedia.org/wiki/Emulator" target="_blank">Emulator</a>. It is fast, powerful, reliable and works on all platforms (<a href="https://www.microsoft.com/en-us/windows/" target="_blank">Win</a>/<a href="https://en.wikipedia.org/wiki/Linux" target="_blank">Linux</a>/<a href="http://www.apple.com/macos" target="_blank">MacOS</a>). It relies on <a href="https://en.wikipedia.org/wiki/VirtualBox" target="_blank">VirtualBox</a> as the virtualization engine which also happens to be my favorite <a href="https://en.wikipedia.org/wiki/Hypervisor" target="_blank">hypervisor</a>. It complements my workflow quite well and I have been faithful to it. </p><p><img alt="Genymotion About" class="image-macro5" src="//cdn.planetdiego.com/static/i/posts/genymotion-1/genymotion_opt.png" itemprop="image" /></p><p>Unfortunately, there is a bug in <a href="https://www.virtualbox.org/" target="_blank">VirtualBox</a> (as of this writing the latest release, <a href="http://download.virtualbox.org/virtualbox/5.1.8/VirtualBox-5.1.8-111374-Win.exe" target="_blank">v5.1.8</a>, is still affected) affecting <a href="https://www.microsoft.com/en-us/windows/get-windows-10" target="_blank">Windows 10</a> users. If your virtual device doesn’t start, try the following:<br />The problem is likely related to the host-only network.<br /><br /><ul><li>In <strong>VirtualBox</strong> open <strong>File <i class="fa fa-arrow-right"></i> Preferences <i class="fa fa-arrow-right"></i> Network</strong> </li><li>Click on the <strong>Host-only Networks</strong> tab </li><li>Add or Edit a <strong>Host-only Network</strong> </li><li>In the <strong>Adapter</strong> tab enter the following <ul><li>IPv4 Address: 192.168.56.1 </li><li>IPv4 Network Mask: 255.255.255.0 </li></ul></li><li>In the <strong>DHCP Server</strong> tab enter the following <ul><li>Check <strong>Enable Server</strong> </li><li>Server Address: 192.168.56.100 </li><li>Server Mask: 255.255.255.0 </li><li>Lower Address Bound: 192.168.56.101 </li><li>Upper Address Bound: 192.168.56.254</li></ul></li></ul></p><p><img src="//cdn.planetdiego.com/static/i/posts/genymotion-1/vbox-network_1_opt.png" />&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/genymotion-1/vbox-network_2_opt.png" /> </p><p>Now, in the actual virtual machine, go to <strong>Settings <i class="fa fa-arrow-right"></i> Network</strong> and make sure the first network adapter is attached to the<strong> Host-only Adapter</strong> created above.&nbsp;&nbsp; </p><p><img src="//cdn.planetdiego.com/static/i/posts/genymotion-1/vbox-vm-network_opt.png" /></p><p>Here are some examples of <a href="https://www.genymotion.com/" target="_blank">Genymotion</a> in action depicting <a href="https://www.android.com/" target="_blank">Android</a> emulations from different <a href="https://en.wikipedia.org/wiki/Application_programming_interface" target="_blank">API</a> Levels. </p><p><img src="//cdn.planetdiego.com/static/i/posts/genymotion-1/android_api19_opt.png" />&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/genymotion-1/android_api23_opt.png" />&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/genymotion-1/android_api24_opt.png" /></p><h4><span style="font-weight: bold;">Related links: </span></h4><ul><li><a href="https://www.genymotion.com/" target="_blank">Genymotion</a> </li><li><a href="https://www.virtualbox.org/" target="_blank">Virtualbox</a> </li><li><a href="http://www.android.com/" target="_blank">Android</a> </li><li><a href="https://developer.android.com/studio/index.html" target="_blank">Android Studio</a> </li><li><a href="https://www.microsoft.com/en-us/windows/get-windows-10" target="_blank">Windows 10</a></li></ul>https://blog.planetdiego.com/2016/11/genymotion-android-emulator-windows-10.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-2385803578872109085Sun, 30 Oct 2016 05:15:00 +00002017-04-25T00:28:01.310-04:00asp.net-corecsharpprogrammingASP.NET Core - Where did my HttpContext go?<p>A critical thing to understand is that <a href="https://docs.asp.net/en/latest/intro.html" target="_blank">ASP.NET Core</a> is no longer based on System.Web.dll. The new architecture is modular and decoupled from <a href="https://www.iis.net/" target="_blank">IIS</a>. The <code>HttpContext</code> sealed class that used to live in the <code>System.Web</code> namespace it is now in the <a href="http://www.nuget.org/packages/Microsoft.AspNetCore.Http/" target="_blank">Microsoft.AspNetCore.Http</a> <a href="http://www.nuget.org/" target="_blank">Nuget</a> package with a few noteworthy design differences. Instead of accessing the static property <code>Current</code>, you now instantiate the <code>HttpContextAccessor</code> which provides you with a <code>HttpContext</code> property of type from the abstract class <code>HttpContext</code>.</p> <p>ASP.NET Core is designed from the ground up to support and leverage <a href="https://docs.asp.net/en/latest/fundamentals/dependency-injection.html" target="_blank">dependency injection</a>. I believe the best way to instantiate the <code>HttpContextAccessor</code> is to utilize that pattern using the baked-in functionality. We will be creating a <a href="https://en.wikipedia.org/wiki/Singleton_pattern" target="_blank">singleton</a> by registering the type via its implemented <a href="http://www.codeproject.com/Articles/702246/Program-to-Interface-not-Implementation-Beginners" target="_blank">interface</a>. In <code>Startup.cs</code> look for <code>ConfigureServices</code> and add line 4.</p><pre><code class="cs">// This method gets called by the runtime. Use this method to add services to the container.<br />public void ConfigureServices(IServiceCollection services)<br />{<br /> services.AddSingleton&lt;IHttpContextAccessor, HttpContextAccessor&gt;();<br /> <br /> services.AddMvc();<br /><br /> // Add any other application services here...<br />}</code></pre><p>Secondly, we will create a helper class with several static methods to access various common pieces of information from the request, including <code>HttpContext</code> itself. Feel free to add any helper methods here that you feel are appropriate.</p><pre><code class="cs">public class WebHelpers<br />{<br /> private static IHttpContextAccessor _httpContextAccessor;<br /><br /> public static void Configure(IHttpContextAccessor httpContextAccessor)<br /> {<br /> _httpContextAccessor = httpContextAccessor;<br /> }<br /><br /> public static HttpContext HttpContext<br /> {<br /> get { return _httpContextAccessor.HttpContext; }<br /> }<br /><br /> public static string GetRemoteIP<br /> {<br /> get { return HttpContext.Connection.RemoteIpAddress.ToString(); }<br /> }<br /><br /> public static string GetUserAgent<br /> {<br /> get { return HttpContext.Request.Headers["User-Agent"].ToString(); }<br /> }<br /><br /> public static string GetScheme<br /> {<br /> get { return HttpContext.Request.Scheme; }<br /> }<br />}</code></pre><p>Lastly, in the <code>Configure</code> method within <code>Startup.cs</code>, initialize the web helpers with our singleton <code>HttpContextAccessor</code> resolved by the built-in dependency injection container using <code>app.ApplicationServices.GetRequiredService&lt;IHttpContextAccessor&gt;()</code> (see line 28).</p><pre><code class="cs">public void Configure(IApplicationBuilder app, IHostingEnvironment env, ILoggerFactory loggerFactory)<br />{<br /> loggerFactory.AddConsole(Configuration.GetSection("Logging"));<br /> loggerFactory.AddDebug();<br /><br /> app.UseApplicationInsightsRequestTelemetry();<br /><br /> if (env.IsDevelopment())<br /> {<br /> app.UseDeveloperExceptionPage();<br /> app.UseBrowserLink();<br /> }<br /> else<br /> {<br /> app.UseExceptionHandler("/Home/Error");<br /> }<br /><br /> app.UseApplicationInsightsExceptionTelemetry();<br /> app.UseStaticFiles();<br /><br /> app.UseMvc(routes =&gt;<br /> {<br /> routes.MapRoute(<br /> name: "default",<br /> template: "{controller=Home}/{action=Index}/{id?}");<br /> });<br /><br /> WebHelpers.Configure(app.ApplicationServices.GetRequiredService&lt;IHttpContextAccessor&gt;());<br />}</code></pre><p>I hope this simple approach might shed some light on the subject and help you structure things in a clean, idiomatic fashion.</p>https://blog.planetdiego.com/2016/10/aspnet-core-where-did-my-httpcontext-go.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-7777634421575369873Wed, 26 Oct 2016 08:03:00 +00002018-05-30T18:56:38.067-04:00asp.net-corecsharpiocprogrammingASP.NET Core - ConfigurationManager RIP<a href="https://www.microsoft.com/net/core" target="_blank">.NET Core</a> <a href="https://blogs.msdn.microsoft.com/dotnet/2016/06/27/announcing-net-core-1-0/" target="_blank">1.0</a> has arrived and overall it has been well received by the community. The cross-platform advantages outweigh the learning curve needed to get started and be productive. The <a href="https://en.wikipedia.org/wiki/C_Sharp_(programming_language)" target="_blank">C# language</a> you know and love is still your primary tool and it only keeps getting better. The <a href="https://en.wikipedia.org/wiki/.NET_Framework" target="_blank">Framework</a> has gone through a bit of a reorganization to make it more portable and modular. Several namespaces have changed which surely brings some frustration but thanks to the magic of <code><a href="https://msdn.microsoft.com/en-us/library/da5kh0wa.aspx" target="_blank">CTRL+.</a></code> and <a href="https://packagesearch.azurewebsites.net/" target="_blank">this terrific online namespace mapping tool</a>, the learning curve is not too steep.<br />A noteworthy, radical change, refers to the way application settings are managed. If you are used to doing <code>ConfigurationManager.AppSettings["MySettingKey"]</code>, then you are out of luck. Doing that directly in your <a href="https://docs.asp.net/en/latest/mvc/controllers/index.html" target="_blank">Controllers</a> was a bad idea anyway and you probably should have been accessing those settings via an abstraction. Nevertheless, the new paradigm brings in the following advantages:<br /><ul class="spacer"><li><a href="https://en.wikipedia.org/wiki/JSON" target="_blank">JSON</a> format instead of <a href="https://en.wikipedia.org/wiki/XML" target="_blank">XML</a>. <a href="https://en.wikipedia.org/wiki/Nesting_(computing)" target="_blank">Nested</a> settings are supported </li><li>No more <a href="https://en.wikipedia.org/wiki/Magic_string" target="_blank">magic strings</a>, configuration objects are now <a href="https://en.wikipedia.org/wiki/Strong_and_weak_typing" target="_blank">strongly typed</a> <a href="https://en.wikipedia.org/wiki/Plain_Old_CLR_Object" target="_blank">POCO's</a> </li><li><a href="https://en.wikipedia.org/wiki/Dependency_injection" target="_blank">Dependency Injection</a> support right out of the box </li></ul>ASP.NET Core 1.0 is the evolution of .NET into the cross-platform space. The image below exemplifies how the frameworks stack against each other in the evolutionary ladder.<br /><a href="https://www.microsoft.com/net" target="_blank"><img src="//cdn.planetdiego.com/static/i/posts/asp-net-core-1/asp-net-eco-system.png" itemprop="image" /></a><br />There is a bit more initial configuration but the end result is cleaner and more consistent with C# best practices. I will attempt to illustrate the process with a practical example used at <a href="http://planetdiego.com/" target="_blank">Planet Diego</a>. <br /><strong><u>Example</u></strong>: A list of image files is retrieved from an <a href="https://aws.amazon.com/" target="_blank">Amazon AWS</a> <a href="https://aws.amazon.com/s3/" target="_blank">S3</a> <a href="http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingBucket.html" target="_blank">bucket</a>. The order of the files within the list is randomized and a specific quantity is extracted (dictated by an application setting). The resulting list is rendered on a <a href="https://docs.asp.net/en/latest/mvc/views/index.html" target="_blank">View</a> as part of a <a href="https://en.wikipedia.org/wiki/JSON" target="_blank">JSON</a> structure to be consumed by a <a href="https://en.wikipedia.org/wiki/Client-side_scripting" target="_blank">client-side script</a> that initiates a <a href="http://blog.planetdiego.com/2016/10/background-image-cross-fading-with-pre.html" target="_blank">slide image transition</a> between the image files in the <a href="http://www.json.org/" target="_blank">JSON array</a>. <br />Lets begin with <code>appsettings.json</code>, this is the new file in which application settings are stored, no more <code>Web.config</code> or <code>App.config</code>.<br /><pre><code class="json">{<br /> "AppSettings": {<br /> "GoogleTrackingId": "your-google-analytics-tracking-id",<br /> "EmailSender": "no-reply@yourdomain.com",<br /> "Captcha": {<br /> "SiteKey": "your-reCAPTCHA-site-key",<br /> "SecretKey": "your-reCAPTCHA-secret-key"<br /> },<br /> "CDNDomain": "cdn.planetdiego.com",<br /> "HomeGalleryKey": "web/home/",<br /> "HomeImageDefault": "img/person-img.jpg",<br /> "HomeImageCacheSeconds": 180.0,<br /> "HomeImageRotateSeconds": 24,<br /> "HomeImageMaxPicks": 30<br /> },<br /> "AWS": {<br /> "S3": {<br /> "BucketName": "dot-blog"<br /> },<br /> "ProfileName": "development",<br /> "Region": "us-east-1",<br /> "AccessKey": "your-aws-access-key",<br /> "SecretKey": "your-aws-secret-key"<br /> },<br /> "ApplicationInsights": {<br /> "InstrumentationKey": "your-instrumentation-key"<br /> },<br /> "Logging": {<br /> "IncludeScopes": false,<br /> "LogLevel": {<br /> "Default": "Debug",<br /> "System": "Information",<br /> "Microsoft": "Information"<br /> }<br /> }<br />}</code><br /></pre>One great feature of this new structure is that production keys can be easily overridden by creating another file called <code>appsettings.Production.json</code>. Each configured environment can have its own specific overrides by using this convention. To understand how this works, see the contents of the <code>Startup.cs</code> file, especially line 6 in which the optional settings file containing the overrides and/or additions is loaded.<br /><pre><code class="cs">public Startup(IHostingEnvironment env)<br />{<br /> var builder = new ConfigurationBuilder()<br /> .SetBasePath(env.ContentRootPath)<br /> .AddJsonFile("appsettings.json", optional: true, reloadOnChange: true)<br /> .AddJsonFile($"appsettings.{env.EnvironmentName}.json", optional: true)<br /> .AddEnvironmentVariables();<br /><br /> if (env.IsDevelopment())<br /> {<br /> // This will push telemetry data through Application Insights pipeline faster, allowing you to view results immediately.<br /> builder.AddApplicationInsightsSettings(developerMode: true);<br /> }<br /> Configuration = builder.Build();<br />}</code><br /></pre>The next step is to create a POCO so we can map the JSON contents to a strongly-typed object. We will do so for the AppSettings and AWS section of the JSON appsettings file. The following exemplifies how the nested structure is mapped and how you segregate multiple sections of the settings file.<br /><pre><code class="cs">public class AppSettings<br />{<br /> public string GoogleTrackingId { get; set; }<br /> public string EmailRecipient { get; set; }<br /> public Captcha Captcha { get; set; }<br /> public string CDNDomain { get; set; }<br /> public string HomeGalleryKey { get; set; }<br /> public string HomeImageDefault { get; set; }<br /> public double HomeImageCacheSeconds { get; set; }<br /> public double HomeImageRotateSeconds { get; set; }<br /> public int HomeImageMaxPicks { get; set; }<br />}<br /><br />public class Captcha<br />{<br /> public string SiteKey { get; set; }<br /> public string SecretKey { get; set; }<br />}<br /><br />public class AWS<br />{<br /> public string ProfileName { get; set; }<br /> public string Region { get; set; }<br /> public string AccessKey { get; set; }<br /> public string SecretKey { get; set; }<br /> public S3 S3 { get; set; }<br />}<br /><br />public class S3<br />{<br /> public string BucketName { get; set; }<br />}</code><br /></pre>Next comes the magic that glues everything together. If you are familiar with dependency injection, this is completely natural to you, otherwise, please read on the subject to better understand how <a href="https://en.wikipedia.org/wiki/Inversion_of_control" target="_blank">Inversion of Controls (IoC)</a> work. Libraries like <a href="https://autofac.org/" target="_blank">Autofac</a>, <a href="http://www.ninject.org/" target="_blank">Ninject</a>, <a href="http://structuremap.github.io/" target="_blank">StructureMap</a> and <a href="https://github.com/unitycontainer/unity" target="_blank">Unity</a> are popular .NET solutions. Nevertheless, <a href="https://docs.asp.net/en/latest/fundamentals/dependency-injection.html" target="_blank">ASP.NET Core 1.0 has a built-in solution</a> which we will leverage for this example. In <code>Startup.cs</code> look for the <code>ConfigureServices</code> method. Take a look at lines 4 &amp; 5 in which we map our POCO's to the sections in the JSON file. That is really all that is needed, now those dependencies will be injected wherever we need them.<br /><a href="https://www.blogger.com/null" name="configureservices"></a><br /><pre><code class="cs">// This method gets called by the runtime. Use this method to add services to the container.<br />public void ConfigureServices(IServiceCollection services)<br />{<br /> services.Configure&lt;AppSettings&gt;(Configuration.GetSection("AppSettings"));<br /> services.Configure&lt;AWS&gt;(Configuration.GetSection("AWS"));<br /> services.AddSingleton&lt;IHttpContextAccessor, HttpContextAccessor&gt;();<br /> services.AddTransient&lt;IStorageService, S3StorageService&gt;();<br /><br /> services.AddMvc();<br /><br /> // Add any other application services here...<br />}</code><br /></pre>It is important to note that the class injected is of type <code>IOptions&lt;AppSettings&gt;</code>. The <code>IOptions</code> interface is part of the <code>Microsoft.Extensions.Options</code> namespace. In order to access its contents, use the <code>Value</code> property on the instance. Furthermore, the instance is essentially a <a href="https://en.wikipedia.org/wiki/Singleton_pattern" target="_blank">singleton</a> which is passed throughout the lifetime of the application. Let's review how this works with a practical example in which the AWS section of the <code>AppSettings</code> is injected into the class <a href="https://en.wikipedia.org/wiki/Constructor_(object-oriented_programming)" target="_blank">constructor</a>.<br /><pre><code class="cs">public interface IStorageService<br />{<br /> Task&lt;IList&lt;string&gt;&gt; List(string startingKey = "", int maxKeys = 100, bool hasEmptyObjects = false);<br />}<br /><br />public class S3StorageService : IStorageService<br />{<br /> private readonly AWS _settings;<br /> private readonly RegionEndpoint _region;<br /><br /> public S3StorageService(IOptions&lt;AWS&gt; settings)<br /> {<br /> _settings = settings.Value;<br /> _region = RegionEndpoint.GetBySystemName(_settings.Region);<br /> }<br /><br /> public async Task&lt;IList&lt;string&gt;&gt; List(string startingKey = "", int maxKeys = 100, bool hasEmptyObjects = false)<br /> {<br /> var result = new List&lt;string&gt;();<br /><br /> using (var client = new AmazonS3Client(<br /> _settings.AccessKey,<br /> _settings.SecretKey,<br /> _region))<br /> {<br /><br /> try<br /> {<br /> ListObjectsV2Request request = new ListObjectsV2Request<br /> {<br /> BucketName = _settings.S3.BucketName,<br /> MaxKeys = maxKeys,<br /> Prefix = startingKey<br /> };<br /> ListObjectsV2Response response;<br /> do<br /> {<br /> response = await client.ListObjectsV2Async(request);<br /><br /> // Process response.<br /> foreach (S3Object entry in response.S3Objects)<br /> {<br /> if (entry.Size &gt; 0 || hasEmptyObjects)<br /> result.Add(entry.Key);<br /> }<br /><br /> Debug.WriteLine("Next Continuation Token: {0}", response.NextContinuationToken);<br /> request.ContinuationToken = response.NextContinuationToken;<br /><br /> } while (response.IsTruncated == true);<br /> }<br /> catch (AmazonS3Exception amazonS3Exception)<br /> {<br /> if (amazonS3Exception.ErrorCode != null &amp;&amp;<br /> (amazonS3Exception.ErrorCode.Equals("InvalidAccessKeyId")<br /> ||<br /> amazonS3Exception.ErrorCode.Equals("InvalidSecurity")))<br /> {<br /> Debug.WriteLine("Check the provided AWS Credentials.");<br /> }<br /> else<br /> {<br /> Debug.WriteLine("Error occurred. Message:'{0}' when listing objects",<br /> amazonS3Exception.Message);<br /> }<br /> }<br /> catch (Exception ex)<br /> {<br /> Debug.WriteLine(ex.Message);<br /> }<br /><br /> }<br /><br /> return result;<br /> }<br />}</code><br /></pre>Notice how the AWS settings are injected into the constructor and assigned to a private field for use within the class. The <a href="https://msdn.microsoft.com/en-us/library/mt674882.aspx" target="_blank">async</a> <code>List</code> method returns a promise for a list of files in the given S3 bucket and starting key. Make sure you install the <a href="https://www.nuget.org/packages/AWSSDK.S3/" target="_blank">AWSSDK.S3 Nuget package</a> to work with Amazon S3 and be able to use the code above.<br />The same applies to the <code>Home</code> controller. Below we inject the <code>AppSettings</code> section and the <code>S3StorageService</code> class via its implemented interface (see line 7 as part of the <a href="https://www.blogger.com/blogger.g?blogID=5507551724075042835#configureservices"><code>ConfigureServices</code></a> method). To spice things up we randomize the order of the returned files using an extension method and then grab up to the maximum number allowed specified on the settings value <code>HomeImageMaxPicks</code>.<br /><pre><code class="cs">public class HomeController : Controller<br />{<br /> private readonly AppSettings _appSettings;<br /> private readonly IStorageService _storage;<br /><br /> public HomeController(<br /> IOptions&lt;AppSettings&gt; appSettings,<br /> IStorageService storage<br /> )<br /> {<br /> _appSettings = appSettings.Value;<br /> _storage = storage;<br /> }<br /><br /> public async Task&lt;IActionResult&gt; Index()<br /> {<br /> var vm = new HomeViewModel();<br /><br /> vm.MainImageDefault = _appSettings.HomeImageDefault;<br /> vm.MainImageRotateEvery = _appSettings.HomeImageRotateSeconds;<br /> vm.MainImageBase = string.Concat("//", _appSettings.CDNDomain, "/");<br /><br /> var images = await _storage.List(_appSettings.HomeGalleryKey);<br /><br /> if (images.Any())<br /> {<br /> vm.MainImageKeys = images.Randomize().Take(_appSettings.HomeImageMaxPicks).ToList();<br /> }<br /><br /> return View(vm);<br /> }<br />}<br /><br />public class HomeViewModel<br />{<br /> public string MainImageDefault { get; set; }<br /> public string MainImageBase { get; set; }<br /> public IList&lt;string&gt; MainImageKeys { get; set; }<br /> public double MainImageRotateEvery { get; set; }<br /><br /> public HomeViewModel()<br /> {<br /> MainImageKeys = new List&lt;string&gt;();<br /> }<br />}<br /><br />public static class EnumerableExtensions<br />{<br /> private static Random _rnd = new Random();<br /><br /> public static IEnumerable&lt;T&gt; Randomize&lt;T&gt;(this IEnumerable&lt;T&gt; source)<br /> {<br /> return source.OrderBy&lt;T, int&gt;((item) =&gt; _rnd.Next());<br /> }<br />}</code><br /></pre>Now onto the last step. In addition to the <a href="https://docs.asp.net/en/latest/mvc/views/overview.html?highlight=viewmodel#passing-data-to-views" target="_blank">ViewModel</a>, we will be accessing some application settings too in order to exemplify how dependency injection also applies to views. There is a special <a href="https://docs.asp.net/en/latest/mvc/views/razor.html" target="_blank">Razor</a> file, <code>_ViewImports.cshtml</code>, in the Views folder which allows you to add namespaces that could be accessed by all views. However, it can also be used to perform dependency injection using the keyword <code>inject</code>.<br /><pre><code>@using MyApp.Web;<br />@using MyApp.ViewModels;<br /><br />@addTagHelper *, Microsoft.AspNetCore.Mvc.TagHelpers<br /><br />@inject Microsoft.Extensions.Options.IOptions&lt;MyApp.Models.AppSettings&gt; AppSettings</code><br /></pre>Notice how in the last line we inject <code>AppSettings</code> which gives us access to the class on all views.<br />Now, on the view itself, we will be mapping some settings and parts of the ViewModel to Javascript variables so they can be easily consumed client-side. The code below is a <a href="https://docs.asp.net/en/latest/mvc/views/partial.html" target="_blank">Partial View</a> invoked from the Home/Index View with <code>@{Html.RenderPartial("_JsInit", Model);}</code>.<br /><pre><code class="js">@model HomeViewModel<br /><br />&lt;script type="text/javascript"&gt;<br /> // Global Application Namespace:<br /> var myApp = myApp || {};<br /><br /> myApp = {<br /> app: {<br /> siteRoot: '@Url.Content("~")',<br /> cdn: '@AppSettings.Value.CDNDomain',<br /> gaId: '@AppSettings.Value.GoogleTrackingId'<br /> },<br /> widgets: {<br /> reCaptchaSiteKey: '@AppSettings.Value.Captcha.SiteKey'<br /> },<br /> mainImages: {<br /> fallback: '@Model.MainImageDefault',<br /> rotateEvery: @Model.MainImageRotateEvery,<br /> base: '@Model.MainImageBase',<br /> keys: @Html.Raw(Json.Serialize(Model.MainImageKeys))<br /> }<br /> };<br />&lt;/script&gt;</code><br /></pre>The above functionality is a subset, for illustration purposes, of the functionality implemented on <a href="http://planetdiego.com/" target="_blank">Planet Diego</a>.<br /><h4>Summary</h4>.NET Core brings strongly typed configuration objects into the mix. It finally eliminates the plumbing code necessary to implement such functionality in a .NET idiomatic fashion. Furthermore, coupled with dependency injection, it facilitates the way we access the information. Overall, I am glad to see this functionality baked in natively. The implementation requires a bit more orchestration but in the end, it forces developers to produce cleaner and more modular code. Happy coding!https://blog.planetdiego.com/2016/10/aspnet-core-configurationmanager-rip.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-5842973832243664674Sun, 23 Oct 2016 22:52:00 +00002018-05-30T18:56:59.742-04:00javascriptprogramminguiBackground Image Cross-Fading with Pre-loader<p>I wanted to implement an image gallery by <a href="http://css3.bradshawenterprises.com/cfimg/" target="_blank">cross-fading</a> background images for <a href="http://planetdiego.com/" target="_blank">Planet Diego</a>. I was looking for a solution that would be performant and flexible. Performance is critical since the widget is an essential part of the homepage and the first image needs to be displayed immediately while continuing to load an arbitrary number of images in the background without affecting the rendering speed of the site. Furthermore, I wasn’t too keen on loading heavy weight <a href="https://en.wikipedia.org/wiki/JavaScript" target="_blank">JavaScript</a> slider libraries with lots of features for a simple effect. Moreover, not too many offer cross-fading effects and don’t leverage hardware accelerated <a href="https://developer.mozilla.org/en-US/docs/Web/CSS/CSS_Transitions/Using_CSS_transitions" target="_blank">CSS transitions</a> which would perform much smoother on a mobile dominated ecosystem. </p><p><img class="image-macro5" src="//cdn.planetdiego.com/static/i/posts/crossfadejs-1/crossfade.jpg" itemprop="image"></p><p>Let’s assume we start with the following <a href="http://www.json.org/" target="_blank">JSON</a> structure stored at <code>myApp.imageGallery</code>. We have a “<em>fallback</em>” image in case the image array is returned empty and there is no gallery to display. The rotation speed (“<em>rotateEvery</em>”) is expressed in seconds and it is the trigger to advance to the next image. The “<em>base</em>” is simply the base URL for the images array. Lastly, the “<em>images</em>” is an array of filenames to be displayed. </p><pre><code class="json">{<br /> "fallback": "/static/images/home/default.jpg",<br /> "rotateEvery": 12,<br /> "base": "http://cdn.planetdiego.com/web/home/",<br /> "images": [ "image1.jpg", "image2.jpg", "image3.jpg", "image4.jpg", "image5.jpg" ] <br />}</code></pre><p>The following is the minimal CSS needed for the element holding the background image. Let’s assume for this example: <code>&lt;figure id='main-image'&gt;&lt;/figure&gt;</code></p><pre><code class="css">#main-image {<br /> z-index: 1;<br /> background-size: cover;<br /> background-position: center center;<br /> background-blend-mode: darken;<br /> transition: 3s;<br />}</code></pre><p>Here is the solution I came up with. Once simple validation is passed, “<em>imageSequencer</em>” is invoked a startup image from the array is display. Immediately after, the image preloading mechanism is started, thus caching the upcoming images for a smooth, flicker-free transition. Once caching is complete, <a href="https://developer.mozilla.org/en-US/docs/Web/API/WindowTimers/setInterval" target="_blank">setInterval</a> timer is initiated to take over the automatic transition based on the interval specified.</p><pre><code class="js">$(function () {<br /> "use strict";<br /><br /> var setMainImage = function (url) {<br /> $('#main-image').css('background-image', 'url(' + url + ')');<br /> };<br /><br /> var rotateMainImage = function (args) {<br /> if (typeof args.images != 'undefined' &amp;&amp; args.images != null &amp;&amp; args.images.length &gt; 0) {<br /> console.log('Initiating main image sequencer...');<br /> imageSequencer(args.base, args.images, args.rotateEvery);<br /> } else {<br /> console.log('Setting main image:' + args.fallback);<br /> setMainImage(args.fallback);<br /> }<br /> };<br /><br /> var preloadImages = function (base, imagesArray, callback) {<br /> console.log('Caching main images');<br /> var i,<br /> j,<br /> loaded = 0;<br /><br /> for (i = 0, j = imagesArray.length; i &lt; j; i++) {<br /> (function (img, src) {<br /> img.onload = function () {<br /> if (++loaded === imagesArray.length &amp;&amp; callback) {<br /> console.log('Firing image pre-loader callback.');<br /> callback();<br /> }<br /> };<br /><br /> img.src = src;<br /> }(new Image(), base + imagesArray[i]));<br /> }<br /> };<br /><br /> var imageSequencer = function (base, imagesArray, intervalSecs) {<br /> console.log('Rotating main image every ' + intervalSecs.toString() + ' seconds');<br /> var currImage = 0,<br /> totalImages = imagesArray.length,<br /> speed = intervalSecs * 1000;<br /><br /> // Display initial image (last one to prevent repeat on cycle)<br /> setMainImage(base + imagesArray[totalImages - 1]);<br /><br /> // Initiate sequencer<br /> preloadImages(base, imagesArray, function () {<br /><br /> var siId = setInterval(function () {<br /> if (currImage &gt;= totalImages) {<br /> console.log('Restarting image sequencer.');<br /> currImage = 0;<br /> }<br /><br /> console.log('Setting main image through sequencer: ' + base + imagesArray[currImage]);<br /> setMainImage(base + imagesArray[currImage]);<br /> currImage++;<br /><br /> }, speed);<br /> });<br /> };<br /><br /> // Initiate Image crossfade<br /> rotateMainImage(myApp.imageGallery);<br /><br />});</code></pre><p>A couple of important things to note: <br><ul><li>This solution works well on <a href="https://en.wikipedia.org/wiki/WebKit" target="_blank">WebKit</a> based browsers like Safari, Chrome and Opera. <li>Crossfading also works well on mobile devices. <li>On <a href="https://www.mozilla.org/en-US/firefox" target="_blank">Firefox</a> and <a href="http://microsoft.com/ie" target="_blank">Internet Explorer</a> the image will just transition without any effects. <li>Make sure that “<em>rotateEvery”</em> is higher than the CSS Transition value, preferable a multiple of it. <li>For best results, make sure all the images have the same dimensions, or at least the same aspect ratio. </li></ul>The resulting effect can be seen at <a title="http://planetdiego.com/" href="http://planetdiego.com/">http://planetdiego.com/</a></p>https://blog.planetdiego.com/2016/10/background-image-cross-fading-with-pre.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-3241362249281139971Fri, 21 Oct 2016 21:13:00 +00002018-05-30T18:57:22.430-04:00javascriptprogramminguiweatherHurricane Matthew turned into Hackathon<p>Hurricane <a href="https://weather.com/storms/hurricane/news/hurricane-matthew-bahamas-florida-georgia-carolinas-forecast" target="_blank">Matthew</a> was a deadly category 4 storm affecting most of the Caribbean and south-mid eastern United States. Like most south Floridians, we prepared heavily for the storm by stocking up with supplies and protecting our homes with hurricane shutters. For the better part of a day and a half we braced for this monster storm and hoped for the best. After the devastating events in <a href="https://en.wikipedia.org/wiki/Haiti" target="_blank">Haiti</a> and <a href="https://en.wikipedia.org/wiki/The_Bahamas" target="_blank">The Bahamas</a>, the storm veered slightly east, enough to spare the South Florida region from the destructive hurricane force winds. Needless to say, we were all very grateful and simultaneously saddened by the people and areas affected. Overall, we were extremely fortunate, aside from some <a href="http://www.orlandosentinel.com/weather/hurricane/os-interactive-hurricane-matthew-map-of-florida-power-outages-20161007-htmlstory.html" target="_blank">power outages</a>, South Florida fared quite well.&nbsp; </p> <p>On the other hand, near miss scenarios can be quite powerful code-generators. Several hours indoors with not much to do can make someone quite productive. Never underestimate the power of boredom, isolation and confinement.&nbsp; <br></p><img src="//cdn.planetdiego.com/static/i/posts/mathew-1/areas-affected-by-hurricane-matthew.jpg"> <p><br>I decided it was time to update my <a href="http://planetdiego.com/" target="_blank">personal website</a>. My web presence was quite dated and unmaintained. I wanted something simple, modern, mobile friendly, attractive and easy to update. I decided on an <a href="https://en.wikipedia.org/wiki/Single-page_application" target="_blank">SPA</a> architecture and <a href="https://www.asp.net/core" target="_blank">ASP.NET Core</a> for the backend to get familiar with the new .NET paradigm which I have not had the change to use up to this point. I had about 24 hours to produce something useful so I got to work. I hosted the site in <a href="https://azure.microsoft.com/" target="_blank">Azure</a> since I had a few free credits to spare. Furthermore, for simplicity I didn’t want to have a database. I decided to use a series of <a href="http://www.json.org/" target="_blank">json</a> files to drive some of the sections that might require frequent updates. I also wanted to have an easy mechanism to create image galleries. I love photography and have amassed a vast gallery over time. Moreover, for raw storage I created an <a href="https://aws.amazon.com/s3/" target="_blank">S3</a> bucket which provided me an economical and easy way for me to maintain an ever growing list of assets. Additionally, I setup <a href="https://aws.amazon.com/cloudfront/" target="_blank">Cloudfront</a> as a <a href="https://en.wikipedia.org/wiki/Content_delivery_network" target="_blank">CDN</a> to have a fast and distributed endpoint to access media, <a href="https://en.wikipedia.org/wiki/JavaScript" target="_blank">JavaScript</a> dependencies, <a href="https://en.wikipedia.org/wiki/Cascading_Style_Sheets" target="_blank">CSS</a> and other assets. The resulting CDN is accessible at <a title="http://cdn.planetdiego.com/" href="http://cdn.planetdiego.com">http://cdn.planetdiego.com</a></p> <p><a href="http://planetdiego.com/" target="_blank"><img class="image-macro5" src="//cdn.planetdiego.com/static/i/posts/mathew-1/website_1.jpg" itemprop="image"></a></p> <p>Front-end templating is provided by <a href="http://idangero.us/template7/" target="_blank">Template7</a>, a modern JavaScript template engine with <a href="http://handlebarsjs.com/" target="_blank">Handlebars</a> like syntax. The library is lightweight, feature rich and performant. </p> <p>The site is composed of multiple sections, several mapping directly to Menu options. For performance and maintainability, most dynamic content is retrieved asynchronously and rendered using the aforementioned templating engine.&nbsp; To load, render, perform pre-processing and apply handlers, I created a structure like this one to that manages all the templates that need to be rendered. </p><pre><code class="json">[<br /> {<br /> "name": "projects",<br /> "sourceSelector": "script#tmpl-projects",<br /> "destinationSelector": "section#portfolio",<br /> "dataSource": "/data/projects.json",<br /> "callback": myApp.sectionHandlers<br /> },<br /> {<br /> "name": "tweets",<br /> "sourceSelector": "script#tmpl-tweets",<br /> "destinationSelector": "#tweet-scroller",<br /> "dataSource": "/getTweets",<br /> "callback": myApp.rotateTweets<br /> },<br /> {<br /> "name": "quotes",<br /> "sourceSelector": "script#tmpl-quotes",<br /> "destinationSelector": "#main-quote",<br /> "dataSource": "/getQuotes",<br /> "dataPostProc": myApp.pickQuote<br /> }<br />]</code><br /></pre><p>The following is an informal version of the implementation but helps illustrate the mechanics.<br>Let’s assume the structure above is stored at <code>myApp.templates</code>. The code below will iterate through the list of templates to be rendered, retrieve the data and when the data is received, proceed to render the template while executing any pre-processing on the data or UI handlers that your design requires. Simply pass in the necessary callbacks you would like to execute. <p><u><strong>Important</strong></u>: The following script depends on <a href="http://idangero.us/template7/" target="_blank">Template7</a> and <a href="https://jquery.com/" target="_blank">jQuery</a></p><pre><code class="js">$(function () {<br /> "use strict";<br /><br /> var getDataPromise = function (url) {<br /> return $.getJSON(url);<br /> };<br /><br /> var compileTemplates = function (templates) {<br /> console.log('Compiling Templates');<br /><br /> var i,<br /> html,<br /> compiled = {};<br /><br /> for (i = 0; i &lt; templates.length; i++) {<br /> html = $(templates[i].sourceSelector).html();<br /> compiled[templates[i].name] = Template7.compile(html);<br /> }<br /><br /> return compiled;<br /> };<br /><br /> var renderTemplate = function (name, template, $el, dataPromise, dataPostProc, callback, onNoData) {<br /><br /> dataPromise.then(function (data) {<br /> console.log("Data loaded");<br /><br /> if (typeof data === 'undefined' || data == null) {<br /> console.log("Invalid data, cannot render template.");<br /><br /> if (onNoData &amp;&amp; typeof onNoData === 'function') {<br /> console.log("Executing no data callback.");<br /> onNoData();<br /> }<br /><br /> return -1;<br /> } else {<br /><br /> // Perform any post processing of data, if needed.<br /> if (dataPostProc &amp;&amp; typeof dataPostProc === 'function') {<br /> data = dataPostProc(data);<br /> }<br /><br /> // Render template with passed data<br /> var html = template(data);<br /><br /> if (typeof $el !== 'undefined') {<br /> $el.html(html);<br /> } else {<br /> return html;<br /> }<br /> }<br /> }).then(function (code) {<br /> if (callback &amp;&amp; typeof callback === 'function' &amp;&amp; code !== -1)<br /> callback();<br /> });<br /> };<br /><br /> var renderTemplates = function (templates, compiledTemplates) {<br /><br /> for (var i = 0; i &lt; templates.length; i++) {<br /> console.log("Rendering template: " + templates[i].name);<br /><br /> renderTemplate(<br /> templates[i].name,<br /> compiledTemplates[templates[i].name],<br /> $(templates[i].destinationSelector),<br /> getDataPromise(templates[i].dataSource),<br /> templates[i].hasOwnProperty('dataPostProc') ? templates[i].dataPostProc : undefined,<br /> templates[i].hasOwnProperty('callback') ? templates[i].callback : undefined,<br /> templates[i].hasOwnProperty('onNoData') ? templates[i].onNoData : undefined<br /> );<br /> }<br /> };<br /><br /> // Compile Template - Expensive Operation, perform ONLY once.<br /> var compiledTemplates = compileTemplates(myApp.templates);<br /><br /> // Render the templates using the template listing provided and compiled templates.<br /> renderTemplates(myApp.templates, compiledTemplates);<br />});</code></pre><p>The following is an example of one of the templates used to generate the "<a href="http://planetdiego.com/" target="_blank">Adventures</a>" section. It renders a set of tiles with filters. Additionally each tile has metadata that is displayed on a lightbox when a tile is clicked. The lighbox can displayed an embedded video or static image depending on its type (see json <a href="http://cdn.planetdiego.com/web/projects/projects.json" target="_blank">source</a>)</p><pre><code class="handlebars">&lt;script id="tmpl-projects" type="text/template7"&gt;<br /> &lt;div class='section-block portfolio-block'&gt;<br /> &lt;div class='container-fluid'&gt;<br /><br /> &lt;h4 class='pre'&gt;Some of the things I have been up to...&lt;/h4&gt;<br /><br /> &lt;ul class='portfolio-filters'&gt;<br /> &lt;li&gt;<br /> &lt;a data-group='all' href='#' class='active'&gt;All&lt;/a&gt;<br /> &lt;/li&gt;<br /> {{#categories}}<br /> &lt;li&gt;<br /> &lt;a data-group='{{id}}' href='#'&gt;{{name}}&lt;/a&gt;<br /> &lt;/li&gt;<br /> {{/categories}}<br /> &lt;/ul&gt;<br /><br /> &lt;ul class='portfolio-items'&gt;<br /><br /> {{#projects}}<br /> &lt;li data-groups='{{arrStr categories}}'&gt;<br /> &lt;div class='inner'&gt;<br /> &lt;img src='{{catImageUrl}}' alt='{{title}}'&gt;<br /> &lt;a href='#projpopup-{{@index}}' class='overlay has-popup'&gt;<br /> &lt;h4&gt;{{title}}&lt;/h4&gt;<br /> &lt;p&gt;{{type}}&lt;/p&gt;<br /> &lt;/a&gt;<br /> &lt;/div&gt;<br /> &lt;div id='projpopup-{{@index}}' class='popup-box zoom-anim-dialog mfp-hide'&gt;<br /> &lt;figure&gt;<br /> {{#js_compare "this.type === 'Video'"}}<br /> &lt;!--project popup video--&gt;<br /> &lt;iframe width='560' height='315' src='{{popupMediaUrl}}' allowfullscreen&gt;&lt;/iframe&gt;<br /> {{else}}<br /> &lt;!--project popup image--&gt;<br /> &lt;img src='{{#if popupMediaUrl}}{{popupMediaUrl}}{{else}}{{catImageUrl}}{{/if}}' alt='{{title}}'&gt;<br /> {{/js_compare}}<br /> &lt;/figure&gt;<br /> &lt;div class='content'&gt;<br /> &lt;!--project popup title--&gt;<br /> &lt;h4&gt;{{#if popupTitle}}{{popupTitle}}{{else}}{{title}}{{/if}}&lt;/h4&gt;<br /> &lt;!--project popup description--&gt;<br /> &lt;p&gt;{{description}}&lt;/p&gt;<br /> {{#if url}}<br /> &lt;a href='{{url}}' class='view-more' target='_blank'&gt;See more&lt;/a&gt;<br /> {{/if}}<br /> &lt;/div&gt;<br /> &lt;/div&gt;<br /> &lt;/li&gt;<br /> {{/projects}}<br /><br /> &lt;/ul&gt;<br /> &lt;/div&gt;<br /> &lt;/div&gt;<br />&lt;/script&gt;</code><br /></pre><p>The template above requires the use of a Helper (arrStr) which renders a JavaScript array as string. The section uses <a href="https://vestride.github.io/Shuffle/" target="_blank">Shuffle.js</a> which structures the categories for filtering using that syntax. Fortunately, that is easily accomplished as follows: </p><pre><code class="js">// Array to string<br />Template7.registerHelper('arrStr', function (arr) {<br /> var str = '\"' + arr.join('\",\"') + '\"';<br /> // And return joined array<br /> return '[' + str + ']';<br />});</code></pre><p>Finally, the data used for the template comes from <a title="http://cdn.planetdiego.com/web/projects/projects.json" href="http://cdn.planetdiego.com/web/projects/projects.json">http://cdn.planetdiego.com/web/projects/projects.json</a></p>https://blog.planetdiego.com/2016/10/hurricane-matthew-turned-into-hackathon.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-6120109114581142782Sat, 01 Oct 2016 02:17:00 +00002018-05-30T18:59:36.831-04:003d-printingdesigndevicehardwaretechnology3D Printing Adventures<p>This January (2016) I decided to invest in a 3D printer. I love tinkering with things and the opportunity to design, build and test my own design was too difficult to overlook. Besides, 3D printers have gotten to be quite reasonably priced and their quality has increased significantly in the last couple of years. After some extensive research I decided on a <a href="https://zortrax.com/printers/zortrax-m200/" target="_blank">Zortrax M200</a>. <br><img style="float: right; margin: 0px 0px 0px 4px; display: inline" src="//cdn.planetdiego.com/static/i/posts/3dprinting-1/Zortrax-M200-Printer-3.png" itemprop="image"></p> <p> <h4><span style="font-weight: bold">Dimensions:</span></h4> <ul> <li>Without Spool: 345 x 360 x 430 mm [13.6 x 14 x 17 in] <li>With Spool: 345 x 430 x 430 mm [13.6 x 17 x 17 in] <li>Shipping Box: 460 x 470 x 570 mm [18 x 18.5 x 22.4 in] <li>Weight: 16 kg [35 lbs] <li>Shipping weight: 25 kg [55 lbs] </li></ul> <h4><span style="font-weight: bold">Printing:</span></h4> <ul> <li>Print technology: LPD - Layer Plastic Deposition <li>Workspace: 200 x 200 x 180 mm [7.87 x 7.87 x 7.086 in] <li>Layer resolution settings: 90-400 microns <li>Material container: Spool <li>Wall thickness Optimal: 800+ microns <li>Resolution of single printable point: 400+ microns <li>Material Diameter: 1.75 mm [0.069 in] <li>Nozzle diameter: 0.4 mm [0.015 in] <li>Minimum single positioning: 1.5 microns <li>Positioning precision X/Y: 1.5 microns <li>Z single step: 1.25 microns <li>Extruder: Single <li>Connectivity: SD card <li>Available materials: Z-ABS, Z-ULTRAT, Z-HIPS, Z-GLASS, Z-PETG, Z-PCABS </li></ul> <h4><span style="font-weight: bold">Temperature:</span></h4> <ul> <li>Extruder maximum temperature: 380° C [716° F] <li>Heated platform: Yes <li>Heated platform maximum temperature: 110° C [230° F] <li>Ambient Operating Temperature: 20°-35° C [68°-95° F] <li>Storage Temperature: 0°-35° C [32°-95° F] </li></ul> <h4><span style="font-weight: bold">Software:</span></h4> <ul> <li>Software Bundle: <a href="http://support.zortrax.com/downloads/software/" target="_blank">Z-Suite</a>® <li>File types: .stl, .obj, .dxf, .3mf <li>Supports: Mac OS X / Windows 7 and newer versions </li></ul> </p> <p>The printer performs admirably right out of the box, after some leveling and simple calibration you are ready to start testing your design skills. The design aspect is probably the most challenging to master. Things changed quite dramatically since my school days with <a href="http://www.autodesk.com/products/autocad/overview" target="_blank">AutoCAD</a>. There ae many flavors nowadays. After some experimentation I decided to dig deeper into <a href="http://www.autodesk.com/products/fusion-360/overview" target="_blank">Fusion 360</a>. It is an extremely capable CAD/CAM package from <a href="http://www.autodesk.com/" target="_blank">Autodesk</a>. The feature set is quite vast and even though it carries a steep learning curve, that can be said about all capable 3D design tools. There are several free and open source alternatives to get started like <a href="http://www.freecadweb.org/" target="_blank">FreeCAD</a>, <a href="http://www.openscad.org/" target="_blank">OpenSCAD</a> and <a href="https://www.blender.org/" target="_blank">Blender</a>. However, my preferred stack remains <a href="http://www.autodesk.com/products/fusion-360/overview" target="_blank">Fusion 360</a> and <a href="http://meshmixer.com/" target="_blank">Meshmixer</a>.<br>I like Fusion360’s all-in-one nature. The software allows to design, render, simulate and generate tool paths for <a href="https://en.wikipedia.org/wiki/Computer-aided_manufacturing" target="_blank">CAM</a>. As you can see below, the quality of the print is outstanding. The piece below was printed using <a href="https://en.wikipedia.org/wiki/Acrylonitrile_butadiene_styrene" target="_blank">ABS</a> plastic which has similar characteristics as <a href="https://en.wikipedia.org/wiki/Lego" target="_blank">Lego</a> pieces. I designed this part for use in a custom hexa-copter to provide exact 60 degree separation between motors. <p><img src="//cdn.planetdiego.com/static/i/posts/3dprinting-1/render.png">&nbsp;<img src="//cdn.planetdiego.com/static/i/posts/3dprinting-1/hub.jpg"> </p>Unfortunately, <a href="https://zortrax.com/" target="_blank">Zortrax</a> uses a proprietary slicer (see <a href="https://en.wikipedia.org/wiki/3D_printing" target="_blank">3D Printing terminology</a>). A slicer is the piece of software responsible for generating the necessary <a href="http://reprap.org/wiki/G-code" target="_blank">G-code</a> from the 3D model that the printer understands to produce a series of thin layers. Consequently you are limited to the use of Z-Suite to generate the custom Z-code for the Zortrax. I personally enjoy the options that the Open Source community (<a href="http://slic3r.org/" target="_blank">Slic3r</a>, <a href="https://ultimaker.com/en/products/cura-software" target="_blank">Cura</a> and the like) has produced but I must admit, Z-Suite is a fully featured, capable and efficient solution. It will take any stl, obj, 3mf and dxf files and allows to configure the extruder temperature based on the material used, the layer thickness, infill style and support angles. The program does what it is supposed to while being intuitive and user friendly.</p> <p><img class="image-macro5" src="//cdn.planetdiego.com/static/i/posts/3dprinting-1/z-suite.png"></p> <p>My setup consists of the <a href="https://zortrax.com/printers/zortrax-m200/" target="_blank">Zortrax M200</a> and a <a href="https://www.microsoft.com/accessories/en-us/products/webcams/lifecam-cinema/h5d-00013" target="_blank">Microsoft LifeCam Cinema</a> attached to a <a href="https://www.raspberrypi.org/products/raspberry-pi-3-model-b/" target="_blank">Raspberry Pi 3</a> (more on this to follow). It allows me to monitor the prints remotely to track progress. I also performed several upgrades to the printer to be able to use <a href="https://en.wikipedia.org/wiki/Polylactic_acid" target="_blank">PLA</a> plastics that are not officially supported by <a href="https://zortrax.com/" target="_blank">Zortrax</a> (more on this to follow)</p> <p><img src="//cdn.planetdiego.com/static/i/posts/3dprinting-1/zortrax-m200.jpg">&nbsp;<img src="//cdn.planetdiego.com/static/i/posts/3dprinting-1/camera.jpg"> </p> <p>3D Printing is growing tremendously and making incursions in a multitude of industries like <a href="http://3dprinting.com/food/" target="_blank">culinary arts</a>, <a href="https://3dprintingindustry.com/fashion/" target="_blank">fashion</a> and even <a href="http://www.totalkustom.com/" target="_blank">construction</a>. The opportunities on this fast growing medium are magnificent. It takes creativity, passion and perseverance. You get to experiment with material science, learn about design and key concepts in structural integrity and above all you get to have lots of fun in the process. Have you made the leap into 3D printing yet?</p> <h4><span style="font-weight: bold">Related links: </span></h4> <ul> <li><a href="https://www.youtube.com/watch?v=4laoNNOHjh4" target="_blank">Zortrax M200: How it works</a> <li><a href="https://www.youtube.com/watch?v=DQ5Elbvvr1M" target="_blank">3D Printed Castle</a> <li><a href="https://www.youtube.com/watch?v=SEaht2tQ8P8" target="_blank">3D Printed self building bridge</a> <li><a href="http://www.ted.com/talks/danit_peleg_forget_shopping_soon_you_ll_download_your_new_clothes" target="_blank">Danit Peleg: Forget shopping. Soon you'll download your new clothes</a> <li><a href="http://3dprintingforbeginners.com/software-tools/" target="_blank">3D Printing Modeling Tools</a> <li><a href="http://www.autodesk.com/products/fusion-360/learn-training-tutorials" target="_blank">Fusion 360 Tutorials</a> <li><a href="http://support.zortrax.com/z-suite-manual/" target="_blank">Z-Suite Manual</a> <li><a href="http://meshmixer.com/help/manual/MeshmixerManual.pdf" target="_blank">Meshmixer Manual</a> <li><a href="http://thingiverse.com/" target="_blank">Thingiverse, Digital design for physical objects</a> <li><a href="https://all3dp.com/best-3d-printer/" target="_blank">Best 3D Printers, 2016</a> </li></ul>https://blog.planetdiego.com/2016/09/3d-printing-adventures.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-3963757406493853545Fri, 30 Sep 2016 07:00:00 +00002018-05-30T19:01:10.833-04:00devicereviewtechnologywearablesGarmin Vivoactive HR Review<p>For some time now I have been looking for the ultimate sports tracker. A few years ago in 2014 I purchased a <a href="http://www.fitbit.com/charge" target="_blank">Fitbit Charge</a> and was a great introduction to a stats driven lifestyle. The Charge was a terrific product but was missing some essential features like a heart rate monitor, GPS and being water proof enough to swim. Fast forward a couple of years and the marketplace has changed immensely. Big brands like Apple and Microsoft have entered this space and there are several interesting offerings to choose from. I wanted something in the $200 range, informal that I can swim and have good cycling capabilities, namely <a href="https://en.wikipedia.org/wiki/ANT%2B" target="_blank">ANT+</a> connectivity to read cadence/speed sensors. Furthermore, a heart rate monitor is quite common on current models but GPS’s are still a rarity, only reserved to the most expensive models.</p> <p>After some research, most candidates felt short in the waterproof requirement and <a href="https://en.wikipedia.org/wiki/ANT%2B" target="_blank">ANT+</a>. However, Garmin released an upgraded version of their <a href="https://buy.garmin.com/en-US/US/into-sports/health-fitness/vivoactive-/prod150767.html" target="_blank">Vivoactive</a> activity tracker on early May, 2016 and decided to give it a try. The device has all the capabilities I was looking for and then some. it has most of the capabilities of their top of the line offering, <a href="https://buy.garmin.com/en-US/US/wearabletech/wearables/fenix-3-hr/prod545480.html" target="_blank">Fenix 3 HR</a>, at a fraction of the cost. </p> <p><img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/vivoactivehr.jpg" itemprop="image"><img style="padding-left: 80px;" src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/vivoactivehrstay-connected.jpg"></p> <p>&nbsp;</p> <p><strong>Features:</strong></p> <ul> <li>Sensors <ul> <li>Barometric altimeter <li>Electronic compass <li>Accelerometer <li>Heart rate monitor</li></ul> <li>Antennas: <ul> <li>GPS Enabled (<a href="https://en.wikipedia.org/wiki/GLONASS" target="_blank">GLONASS</a>) <li><a href="https://en.wikipedia.org/wiki/ANT%2B" target="_blank">ANT+</a> <li>Bluetooth smart<!--EndFragment--></li></ul> <li>Color screen <li>Touchscreen <li>Vibration alerts <li>Physical characteristics: <ul> <li>Dimensions: Watch only: 1.19" x 2.24" x 0.45" (30.2 x 57.0 x 11.4 mm). Regular fits wrist circumferences 5.39" to 7.68" (137 to 195 mm); X-large fits wrist circumferences 6.38" to 8.86" (162 to 225 mm) <li>Display Size: 0.80" x 1.13" (20.7 x 28.6 mm) <li>Display resolution: 205x148 pixels <li>Weight: Regular bands: 47.6 g; X-large bands: 48.2 g <li>Battery Life: Up to 8 days in smartwatch mode (with 24/7 heart rate monitoring, No-GPS), up to 13 hrs in GPS mode <li>Water rating: 5 ATM</li></ul> <li>Software capabilities: <ul> <li>Time, date, calendar, and alarm <li>Swimming, golfing, and many more activity tracking features <li><a href="https://virb.garmin.com/en-US" target="_blank">VIRB</a>® Control <li>Music Control <li>Find my phone <li><a href="https://connect.garmin.com/en-US/" target="_blank">Garmin Connect</a>: download apps, change watch face, sync data, etc.</li></ul></li></ul> <p>&nbsp;</p> <p>After a few weeks of use, I must say that I am enjoying the <a href="https://buy.garmin.com/en-US/US/wearabletech/wearables/vivoactive-hr/prod538374.html" target="_blank">Vivoactive HR</a>. The display is clear even though the resolution is low compared to other similarly priced offerings. I like the fact that it is an always on display and the battery lasts for almost a week. However, heavy use of the GPS will cut that dramatically. The automatic sleep feature is quite accurate, only occasional adjustments are needed on the start time. The heart rate monitor is excellent, I compared it to an external Wahoo chest strap monitor and they are almost perfectly in sync. By the way, the watch can connect to an external monitor or even broadcast its sensor reader for other devices to use. The notifications work just fine, emails, sms and phone call notices can be configured to show on the watch. I would like for the caller id to show instead of the phone number, or at least be configurable but that is a minor nuance. Everything else is pretty standard, calendar appointments, weather and music controls all work quite well.&nbsp; </p> <p>There are a few things that bother me a bit. I have lost several activities because after you pause an activity, it would time out if you don’t attend to it timely. Let’s says you are on a bike ride, you stop for lunch and pause the activity during that time gap, ie lunch. Unfortunately, the activity is lost if you don’t save it and start a new one after the interval. I am not sure why that is the default behavior, the activity should just be saved once the pause times out. Also, the app market is quite limited, only supplying a few reporting apps and several watch faces. There are very few that actually extend the watch’s feature set. </p> <p>The companion Android Garmin Connect app is well designed and provides access to all the watch metrics. The navigation could be improved but it is useful and provides a myriad of statistics about all the supported activities. Currently the watch supports walking, biking, running, cardio, strength exercises, swimming, golf, rowing, skiing, XC skiing and padleboarding. It also supports indoor activities using stationary equipment where the GPS is not applicable (walking, rowing, cycling and running). </p> <p>Nevertheless, the annoyances are minor compared to what the smart watch has to offer. Additionally, once of the things that I have grown to appreciate is the community around Garmin. It is a very active, growing and inviting community. The app provides several ways to interact with groups of friends or general challenges with people with similar fitness level. </p> <p> <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-24-23-56-20_resize.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-24-23-56-44_resize.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-24-23-57-01_resize.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-24-23-57-07_resize.png"><br> <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-24-23-57-22_resize.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-24-23-59-49_resize.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-25-00-00-31_resize.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/vivoactive-1/Screenshot_2016-05-25-00-01-58_resize.png"></p> <p>Overall, I would rate this smart watch <strong>8/10</strong>. It is not very stylish or inconspicuous but it is loaded with features at a reasonable price. It is a terrific <em>fitness</em> watch and it would be unfair to compare it to an <a href="http://www.apple.com/watch/" target="_blank">Apple Watch</a> or a <a href="https://www.motorola.com/us/products/moto-360" target="_blank">Moto 360</a>. Those are for more general use by design, they are significantly more fashionable and provide much greater app offerings. However, they are heavier, they need recharging every 24hrs, don’t do well underwater and most models lack GPS capabilities, among other shortcomings. It all boils down to your intended use. The market appears to be divided between the smart sport trackers (<a href="http://www.fitbit.com/" target="_blank">Fitbit</a>, <a href="http://www.garmin.com/en-US" target="_blank">Garmin</a>, <a href="https://jawbone.com/" target="_blank">Jawbone</a>, <a href="https://www.microsoft.com/microsoft-band/en-us" target="_blank">Microsoft</a>) and fashionable smart watch wear (<a href="http://www.apple.com/" target="_blank">Apple</a>, <a href="http://www.motorola.com/us/home" target="_blank">Motorola</a>, <a href="http://www.lg.com/us" target="_blank">LG</a>, <a href="http://www.samsung.com/us/" target="_blank">Samsung</a>). There are some attempts at being the master of all domain but they are expensive and usually fall short in either features or looks. The <a href="https://explore.garmin.com/en-US/fenix/" target="_blank">Garmin Fenix</a> series has been somewhat successful at bridging the gap but its price tag is usually a detractor for many.</p>https://blog.planetdiego.com/2016/09/garmin-vivoactive-hr-review.htmlnoreply@blogger.com (Planetdiego)0tag:blogger.com,1999:blog-5507551724075042835.post-3369795559746531540Fri, 30 Sep 2016 05:12:00 +00002018-05-30T19:02:40.971-04:00competitionengineeringtransportationSpaceX Hyperloop Pod Competition<p>In June, 2015 <a href="https://en.wikipedia.org/wiki/Elon_Musk">Elon Musk</a> announced a <a href="http://www.spacex.com/hyperloop">competition</a> that inspired students and engineers to come together for a common goal and dedicate time and effort to the realization of a much needed faster, more efficient transportation system. </p> <p><a href="https://en.wikipedia.org/wiki/Hyperloop">Hyperloop</a> is a concept for a high-speed mass transit system based on a low pressurized tube medium in which capsules ride using some form of levitation to minimize friction (air cushion or magnetic levitation). Elon Musk first proposed this system in 2012 and captured the imagination of many. The capsule would be moving at an average speed of 600 mph (970 km/hr), with a top speed of 760 mph (1200 km/hr). In 2013 a preliminary design document was released by <a href="http://spacex.com">SpaceX</a> outlining a proposed route from <a href="https://en.wikipedia.org/wiki/Los_Angeles">Los Angeles</a> to <a href="https://en.wikipedia.org/wiki/San_Francisco_Bay_Area">San Francisco</a>, a 350 mile stretch with an expected journey time of 35 minutes.</p> <p>A friend, <a href="http://dustinoprea.com" target="_blank">Dustin Oprea</a>, and I could not resist the temptation and signed up for the competition immediately. The competition had 2 tracks, a subsystems design and a design &amp; build in which SpaceX committed to build a 5-mile track for teams to test their designs. After some deliberation and given our modest team size (most academic teams we encountered had anywhere between 15-45 members) we decided to tackle the subsystems category. We chose 2 areas in which we thought we could make contributions and have fun in the process: outer shell pod design and safety. Once that was decided and the proper forms were submitted to the <a href="http://www.spacex.com/hyperloop" target="_blank">Hyperloop</a> committee, our team was born; we called it <strong><em>Hyperbolic.</em></strong></p> <p><strong><em><font size="3">&nbsp;<img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/texasam.jpg" itemprop="image"> <img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/diego-john.jpg"></font></p> <h4>&nbsp;</h4></em></strong> <h3><font style="font-weight: bold">Outer shell pod design</font></h3> <p>This objective presented several challenges in terms of simulating the conditions of the pod and given the tight dimensional constraints on the traveling medium. Furthermore, none of us are experts at modern 3D CAD software to adequately depict our vision. Nevertheless, we did our best to create an adequate rendering of our design. Our main objective was to maximize the interior volume given the physical constraints and provide a design that would depict to the public the nature of this futuristic way to travel yet it would be designed for manufacturability in mind. There are several performance conscious decisions present in the design. However, more wind tunnel simulations are needed to optimize the airflow around the capsule and minimize its drag coefficient.</p> <p><img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/Pod-v7_side_angle_tube.jpg">&nbsp;<img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/Pod-v7_tube_section_analysis.jpg"><img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/Pod_v7-preliminary_rendering_length.jpg"></p> <h3><font style="font-weight: bold">Safety</font></h3> <p>For a transportation system of this complexity <sub></sub><sub></sub>and speed, safety will be of paramount concern. Our second objective was to create a supervisor like agent that monitors sensor reading and is able to broadcast them in a variety of mediums and take actions, if needed. We called the initiative SafetyOS. The main objective of the platform is to give first-class attention to events that might threaten human life. SafetyOS provides visual and audible annunciators for different levels of severity and on a future state, act to alleviate or prevent downstream hazardous situations due to a known system failure or malfunction<br></p> <h3>Overall platform objectives </h3> <ul> <li>Display telemetry/instrumentation reflecting real-time sensor inputs <li>Record sensor readings and derived values (e.g. velocity, acceleration) in a local, high-speed time-series database <li>Transmit data to home-base <li>Announce important events <li>Push data to the blackbox <li>Actively react to troublesome conditions by automatically limiting movement, notifying personnel, and home-base <li>Allow home-base to remotely limit vehicle movement in response to external information (e.g. strong wind bursts that could rattle the pods, disabled units ahead on track, damage to track, etc.) <li>Allow home-base to communicate messages to the forward-cabin <li>Data redundancy, error recovery, messaging failure re-transmissions and graceful degradation as critical systems might fail or network latency might be high <li>Remote upgradability (push updates throughout the system)</li></ul> <p>&nbsp;</p> <p><img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/status_normal.png">&nbsp; <img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/notice_danger.png"></p> <p>The system relies on the concept of adapters, highly specialized pieces of code designed to interface with physical systems for the purpose gathering data from a wide array of sensors. This could vary in complexity based on the specific system they are interfacing with. Furthermore, these readings could further be aggregated or simply be used to derive other readings (calculated data vs. raw data). The following diagram exemplifies the role of adapters within the system. </p> <p style="text-align: center;"><img src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/hyperloop-safetyos_adapters.png"></p> <p>In order to achieve all those objectives, the platform needs to be responsive, scalable and highly concurrent. Consequently, we chose Go as the programming language, it is very performant and concurrency is at the core of its design. The transport layer is based on web-sockets communications to minimize latency and the datastore chosen is <a href="https://www.influxdata.com/" target="_blank">InfluxDB</a>, a high-performance time series database. As you can see every component was selected with performance in mind, under these high-speed conditions a few milliseconds could mean the difference between normal operating conditions and disaster. It is absolutely critical for the entire system to operate based on data as realtime as possible, performance is not simply a feature, it is a necessity. </p> <p>After a few intermediate milestones, we were invited to attend the finals at <a href="https://www.tamu.edu/" target="_blank">Texas A&amp;M</a> on January 29-30, 2016. Unfortunately my friend Dustin could not make it to the event, it was quite an experience. My dear brother in-law, John, accompany me on the trip and we had a terrific time. As a non-student team the process was a bit different. Student teams had to go through a final presentation under a panel of judges and prizes were awarded based on a series of criteria. I found it unfortunate that non-student teams were not given the same opportunities. Nevertheless, it was a pleasure and quite a privilege to participate in such an event, the first of its kind. I hope we can continue this work in cooperation with other teams in the future. We have been approached by several universities for collaboration and we hope to engage with them in the future. Media coverage at the event was surprisingly broad, there were several interested parties from all over the world. Even at this early stage, the Hyperloop has captivated the imagination an curiosity of many. The world is ready for a new transportation technology and the Hyperloop’s momentum and Elon Musk’s support might just make the cut. The secretary of the <a href="https://www.transportation.gov/" target="_blank">Department of Transportation</a>, <a href="https://en.wikipedia.org/wiki/Anthony_Foxx" target="_blank">Anthony Foxx</a> (see picture below), gave the keynote speech and caution the enthusiasm by highlighting slow government adoption and safety considerations. He was cautiously optimistic which is a great start for a journey of this magnitude. </p> <p>On the last day, Elon made a surprising appearance on stage (see picture below). The floor went wild, it was definitely a suitable closing for the event. He provided positive feedback based on the quality of the work he has seen and stayed to answer several questions from the audience. He seemed quite impressed with the progress made in such a short period of time and expressed high hopes for the future of Hyperloop. Overall, it was remarkable experience for a good cause, one that sparks the intellect and entertains our wonders.</p> <p><img alt="Anthony Foxx, Secretary of DOT" src="//cdn.planetdiego.com/static/i/posts/hyperloop-1/anthony.jpg">&nbsp;<img alt="Elon Musk on stage" src="https://s3.amazonaws.com/dot-blog/static/i/posts/hyperloop-1/elon.jpg"></p> <p>As of September, 2016, the final stage of the competition has been postponed to early 2017 due to repeated demands from student teams needing more time to complete their pods. A selected group of 20 teams that chose the prototyping route were invited to show their designs on 1 mile track in California that SpaceX is constructing.</p>https://blog.planetdiego.com/2016/09/spacex-hyperloop-pod-competition.htmlnoreply@blogger.com (Planetdiego)0
Autophagy in Hematological Malignancies: Molecular Aspects in Leukemia and Lymphoma Hassan Boustani, MSc; Elahe Khodadi, MSc; Minoo Shahidi, PhD Disclosures Lab Med. 2021;52(1):16-23.  In This Article Abstract and Introduction Abstract The organization of the hematopoietic system is dependent on hematopoietic stem cells (HSCs) that are capable of self-renewal and multilineage differentiation to produce different blood cell lines. Autophagy has a central role in energy production and metabolism of the cells during starvation, cellular stress adaption, and removing mechanisms for aged or damaged organelles. The role and importance of autophagy pathways are becoming increasingly recognized in the literature because these pathways can be useful in organizing intracellular circulation, molecular complexes, and organelles to meet the needs of various hematopoietic cells. There is supporting evidence in the literature that autophagy plays an emerging role in the regulation of normal cells and that it also has important features in malignant hematopoiesis. Understanding the molecular details of the autophagy pathway can provide novel methods for more effective treatment of patients with leukemia. Overall, our review will emphasize the role of autophagy and its different aspects in hematological malignant neoplasms. Introduction Autophagy is a vesicular pathway in which the cellular components are moved to autophagosome vesicle and then will degenerate in lysosomes.[1] Autophagy is created in different conditions, such as nutrient- and energy-limiting conditions, endoplasmic reticulum stress, reactive oxygen species (ROS), hormonal imbalance, and exposure to microorganisms.[2] Autophagy plays an important role in cellular renewal of quiescent and differentiated cells, physiological processes, cell survival, and immune responses. This process is defective in inflammatory conditions, infections, cancer, neurodegenerative disorders, and aging.[3] The results of studies[4] on yeast have revealed autophagy-related genes (ATG) that produce autophagosomes by a multistep process. The role of autophagy is complicated in cancer, depending on the stage, type, and driving oncogene in tumor cells. Study results[5,6] have shown the role of autophagy in tumor formation and metastasis in protection against apoptosis and support of cell survival. Also, the mechanisms involved in the therapy-resistance of tumor cells may occur due to autophagic response to therapy in tumor cells. Hematopoiesis is a fully coordinated process in which hematopoietic stem pools and high self-renewing precursor cells (HSPCs) can form lymphoid and myeloid lineages. The HSPC pool decreases with aging, which results in a small number of HSPC clones that maintain hematopoiesis; with the decrease in blood-cell diversity, a phenomenon called clonal hematopoiesis occurs. Clonal proliferation in HSPCs that have a specific genetic mutation results in an increased risk of developing blood-based malignant neoplasms (Figure 1).[7] Figure 1. The role of autophagy in normal and malignant cells. Normal high self-renewing precursor cells (HSPCs) can form lymphoid and myeloid lineages by autophagy. Aging results in a decrease and in clonal hematopoiesis of HSPCs. Genetic, epigenetic, and autophagy defects make leukemic stem cells (LSCs) in lymphoid and myeloid cells, which result in myeloid and lymphoid leukemias and lymphomas. HSCs indicates hematopoietic stem cells; AML, acute myeloid leukemia; CML, chronic myeloid leukemia; MDS, myelodysplastic syndrome; ALL, acute lymphoid leukemia; CLL, chronic lymphoid leukemia; DLBCL, diffused large-cell B lymphoma; MCL, mantle cell lymphoma; BL, Burkitt lymphoma; MM, multiple myeloma; ALCL, anaplastic large-cell lymphoma; FL, follicular lymphoma. Stem cell proliferation and differentiation in many tissues, including the hematopoietic system, is associated with dysregulation in malignant neoplasms. Leukemia cells have genetic and epigenetic defects that make them genetically distinct from normal blood cells. Hematopoietic cells are transformed at the stem cell stage and move towards the leukemic form. The initiation of leukemia, its progression, its resistance to treatment, and the recurrence of the disease are due to the proliferation of stem cells that are inherently resistant to conventional chemotherapy treatments.[8] Because leukemic stem cells (LSCs) also maintain minimal residual disease (MRD) and recur after treatment, a targeted approach is needed to eradicate them and provide sustainable treatment to patients.[9] Early-onset autophagy increases the occurrence of hematological malignant neoplasms and increases the protumoral response that occurs in tumor growth stages by autophagy and in response to treatment modalities.[10] There is some evidence[11] that modulation of autophagy pathways can be a useful and effective therapeutic approach in patients with leukemia. Therefore, in this review, we discuss the autophagy pathway and its different molecular aspects in the development of hematological malignant neoplasms, including myeloid and lymphoid leukemia and lymphoma. processing....
Tech Briefs This versatile, expandable system can be controlled from a safe remote location. The Hydrogen Umbilical Mass Spectrometer (HUMS) consists of an integrated sample delivery system, a commercial mass-spectrometer- based gas analyzer, and a set of calibration gas mixtures traceable to NIST (National Institute for Standards and Technology). The system, except for the calibration gas mixtures and the remote operator display, fits into a standard 24-in. wide, 6-ft high, 36-in. deep (0.61 by 1.83 by 0.91 m, respectively) equipment rack and is powered by 120-Vac, 30-A, 60-Hz source. It was designed to perform leak detection and measurement of cryogenic propellants (oxygen and hydrogen) from a remote location during shuttle-launch countdown. It is used specifically to sample the background gas surrounding the 17-in. (0.43-m) Orbiter-ET disconnect, looking for leakage of gaseous hydrogen. The capability to monitor shuttle purge gases and cryogenic hydrogen fill and drain line T-0 disconnect helium purge gas is incorporated into the shuttle installation on each Mobile Launch Platform (MLP). HUMS was designed to switch rapidly between background gases (helium, nitrogen, or air) during normal operation. The operator has the ability to remotely select one of eight sample lines and between any of six calibration gas mixtures. It can measure from 0 to 100 percent hydrogen, helium, or nitrogen; 0 to 25 percent oxygen; and 0 to 1 percent argon, in any combination in either a helium, nitrogen, or air background. It has an internal cycle mode, added after installation, to cycle between various pre-set sample and calibration gas lines on a continuous basis, if desired. Operational features include the ability to update the reading for background of each gas in the mixture, thereby avoiding performance of a complete recalibration during operation. This saves a considerable amount of time. The zero gas for the background of interest must be monitored for a couple of minutes to allow the system to stabilize and a reading taken. Only the zero coefficient in the calibration equation for the background of interest is updated. Switching between backgrounds requires only changing to the new background and updating the zero reading for each species. This flexibility is critical when testing in an environment where samples are taken from helium, nitrogen, and air during the test. After testing is complete, a sequence of readings in each background, consisting of zero, test, and span gas mixtures, in that order, provides post-test verification that the system performance remained unchanged since the initial calibration was performed, pre-test. Selection of calibration gas mixture concentrations was critical to remote verification of performance. Three concentrations of each gas are included, each in backgrounds of helium and nitrogen. This calibration/verification technique was developed after installation of the Hazardous Gas Detection System (HGDS) in 1979 and is based on experience gained during operation of that system. The performance of the COTS multigas, multicollector magnetic sector analyzer is slightly dependent on background gas, whether helium or nitrogen dominates the mixture. Independent calibration curves are used, depending whether the unknown sample is drawn from either a helium or nitrogen/air background. During the calibration process, linear calibration curves are generated for each gas in the mixture (hydrogen, helium, nitrogen, oxygen, argon), based on pure background (helium or nitrogen) and a span gas (1 to 10 percent of each gas, in each background). An independent test gas, containing mixtures approximating red-line levels (where action is to be taken, based on readings of the sample) is used to both verify a good calibration (test gas reading lies on the line generated by zero and span, for each species) and to compare directly with the unknown sample, if necessary, to remove uncertainty in reading the unknown mixture. The choice of calibration gases allows differentiation of leak sources of cryogenic oxygen from oxygen contained in air. The operator has the ability to measure the ratio of oxygen to argon (~20), indicative of air intruding into the purge gas. Cryogenic oxygen contains no argon. The design of HUMS achieved two goals. The first was to provide a permanently installed replacement for the Interim-HUMS (I-HUMS), a system designed and built over a weekend (in part to support nearly simultaneous STS-35, STS-38 launch attempts) to be portable between shuttle MLPs. I-HUMS replaced the one-time installation of the Turbo Mass Spectrometer (TMS) developed for launch of STS-26R (first shuttle launch after 51-L). TMS was designed to verify the performance of the 17-in. (0.43-m) Hydrogen Orbiter-ET Disconnect during hydrogen fill and drain operations, prior to shuttle launch. TMS demonstrated the ability of a high-vacuum turbo-molecular pump to operate and survive in a high vibration environment. Use of a turbo-molecular pump replaced the need for ion pumps to achieve high vacuum for the mass-spectrometer-based gas analyzer. Ion pumps are unable to pump high concentrations of helium, restricting earlier versions of mass spectrometers to sampling in backgrounds of either nitrogen or air. The HUMS data acquisition and control system was designed to match the standard CORE interface planned to replace the Shuttle Launch Processing System (LPS), but retrofitted to interface with a standard LPS "XCard" when the CORE concept was abandoned during HUMS. This work was done by Greg Breznik, Barry Davis, and Frederick Adams of Kennedy Space Center; Guy Naylor, Francisco Lorenzo-Luaces, Charles H. Curley, Richard J. Hritz, Terry D. Greenfield, David P. Floyd, Curtis M. Lampkin, Donald Young, Gary N. McKinney, and Don Greene of Lockheed-Martin; and David R. Wedekind, Larry Lingvay, and Andrew P. Schwalb formerly of I-NET. For further information, access the Technical Support Package (TSP), free on-line at www.nasatech.com/tsp under the Test and Measurement category. KSC-12109/06 The U.S. Government does not endorse any commercial product, process, or activity identified on this web site. 
Angles and lines in AutoCAD We have seen in AutoCAD tutorial 03 how to use polar tracking to draw lines with specific angles, but we did not go too much into details. Now, we shall learn a little about trigonometry before moving forward. The concept of polar coordinates in AutoCAD obeys the principle of the trigonometric circle, thus creating the need to revise that part of math for a minute. Trigonometric circle The trigonometric circle goes from 0 degrees to 360 degrees. One lap of the circle is 360 and 360 degrees on is equivalent to zero degrees on the circle. Here is what the circle looks like AutoCAD-tutorial The mastery of the concept of angles is crucial to your ability do get things done in AutoCAD. You have to be capable of quickly deducing what the value of an angle is from zero. On the images above you will notice the trigonometric circle with angles counted respectively from the positive side (anticlockwise) and from the negative side (clockwise) Notice -90 degrees = 270 degrees, 22.5 degrees = -337.5 degrees… and all other similarities One of the most important information to have in mind is that AutoCAD always starts counting angle from zero. You will see why remembering this is important when you read further below. Angles and lines in AutoCAD To draw a line in AutoCAD you can use the command line length<Angle. Caution! Enable Dynamic input before trying this Example 1 To draw the line of 150 units, you will have to 1. Activate the LINE command 2. Click in the drawing Area to specify the start point 3. Type 150<30 and Hit ENTER 4. Press ESC where 150 is the length of the line and 30 is the angle the line makes with zero. If I had written 150<-330 at step 2, it will give the same result. AutoCAD-tutorial Example 2 What if the figure were disposed of like this? How would you draw that 150 units line? AutoCAD-tutorial To draw the line of 150 units, you will have to 1. Activate the LINE command 2. Click in the drawing Area to specify the start point 3. Type 150<150 and Hit ENTER 4. Press ESC where the first 150 is the length and the second 150 is the angle. Why 150 for Angle? Because AutoCAD count angle from the zero angle, So to find the angle from zero, we needed to do 180-30=150. AutoCAD-tutorial Example 3 How about the following case AutoCAD-tutorial To draw the line of 150 units, you will have to 1. Activate the LINE command 2. Click in the drawing Area to specify the start point 3. Type 150<210 and Hit ENTER 4. Press ESC To find 220 we made 180+30. Remember the flat angle is 180 degrees and we AutoCAD counts from zero. AutoCAD-tutorial Example 4 And this case AutoCAD-tutorial To draw the line of 150 units, you will have to 1. Activate the LINE command 2. Click in the drawing Area to specify the start point 3. Type 150<-30 and Hit ENTER 4. Press ESC Final words You should now be able to know what information to give AutoCAD if you happen to deal with projects where angles do not have the zero angle as a reference. Admin I am a computer science engineer who takes blogging as a hobby. I like to learn new things, help other Students and share my experience. RelaxSoftwareSolutions.com is a 100% user friendly site that provides Latest Software and Games for our valuable users which runs on Windows and Mac OSX Devices .RelaxSoftwareSolutions.com is 100% DMCA compliant. View all posts by Admin → Leave a Reply
Considering error propagation in stepwise polynomial regression Neima Brauner, Mordechai Shacham Research output: Contribution to journalArticlepeer-review Abstract The selection of an optimal regression model comprising linear combinations of various integer powers of an independent variable (explanatory variables) is considered. The optimal model is defined as the most accurate (minimal variance) stable model, where all parameter estimates of the orthogonalized explanatory variables are significantly different from zero. The potential causes that limit the number of terms that can be included in a stable regression model are investigated using two indicators, which measure signal-to-noise ratios in the variables. The truncation-to- noise ratio indicator is used to measure the extent of collinearity between the explanatory variables and the correlation-to-noise ratio indicator to evaluate the significance of the correlation between an explanatory variable and the dependent variable. It is shown that the number of terms that can be included in a stable polynomial model (and its accuracy) depend on the range and precision of the data, the rate of the error propagation during computations, and the algorithm used to calculate the regression parameters. It is demonstrated that it can often be advantageous to include nonconsecutive powers of the independent variable in an optimal polynomial model. An orthogonalized-variable-based stepwise regression procedure is presented, which enables identifying the optimal model in polynomial regression. Original languageEnglish Pages (from-to)4477-4485 Number of pages9 JournalIndustrial and Engineering Chemistry Research Volume38 Issue number11 DOIs StatePublished - 1999 Fingerprint Dive into the research topics of 'Considering error propagation in stepwise polynomial regression'. Together they form a unique fingerprint. Cite this
cdh hive增加Update、Delete支持 标签: Hive 一、配置hive-site.xml CDH版本先进入Hive配置页,选择高级, 如果使用的Hive Cli使用hive-site.xml 的 Hive 客户端高级配置代码段(安全阀) 如果使用的beeline ,使用hive-site.xml 的 Hive 服务高级配置代码段(安全阀) 点击+号,增加如下配置项 hive.support.concurrency = true hive.enforce.bucketing = true hive.exec.dynamic.partition.mode = nonstrict hive.txn.manager = org.apache.hadoop.hive.ql.lockmgr.DbTxnManager hive.compactor.initiator.on = true hive.compactor.worker.threads = 1 在这里插入图片描述 然后点击保存更改,重启,分发配置就可以了。 可以使用set测试配置是否生效 在这里插入图片描述 二、建表 如果要支持delete和update,则必须输出是AcidOutputFormat然后必须分桶。 而且目前只有ORCFileformat支持AcidOutputFormat,不仅如此建表时必须指定参数(‘transactional’ = true) USE test; DROP TABLE IF EXISTS S1_AC_ACTUAL_PAYDETAIL; CREATE TABLE IF NOT EXISTS S1_AC_ACTUAL_PAYDETAIL ( INPUTDATE STRING, SERIALNO STRING, PAYDATE STRING, ACTUALPAYDATE STRING, CITY STRING, PRODUCTID STRING, SUBPRODUCTTYPE STRING, ISP2P STRING, ISCANCEL STRING, CDATE STRING, PAYTYPE STRING, ASSETSOWNER STRING, ASSETSOUTDATE STRING, CPD DOUBLE, PAYPRINCIPALAMT BIGINT, PAYINTEAMT BIGINT, A2 BIGINT, A7 BIGINT, A9 BIGINT, A10 BIGINT, A11 BIGINT, A12 BIGINT, A17 BIGINT, A18 BIGINT, PAYAMT BIGINT, LOANNO STRING, CREATEDATE STRING, CUSTOMERID STRING, etl_in_dt string ) CLUSTERED BY (SERIALNO) --根据某个字段分桶 INTO 7 BUCKETS --分为多少个桶 ROW FORMAT DELIMITED FIELDS TERMINATED BY ',' LINES TERMINATED BY '\n' STORED AS ORC LOCATION '/user/hive/test/S1_AC_ACTUAL_PAYDETAIL' TBLPROPERTIES('transactional'='true');--增加额描述信息,比如最后一次修改信息,最后一个修改人。 注:由于cdh自动的在元数据里面创建了COMPACTION_QUEUE表,所以博客中说的那个问题不存在 三、操作 执行 update test.S1_AC_ACTUAL_PAYDETAIL set city='023' where SERIALNO = '20688947002'; 操作100条数据,平均每条花费2秒多,其中执行花费1秒左右。相对还是能接受的。 delete from test.S1_AC_ACTUAL_PAYDETAIL where SERIALNO = '20688947002'; 四、总结 1、Hive可以通过修改参数达到修改和删除数据的效果,但是速度远远没有传统关系型数据库快 2、通过ORC的每个task只输出单个文件和自带索引的特性,以及数据的分桶操作,可以将要修改的数据锁定在一个很小的文件块,因此可以做到相对便捷的文件修改操作。因此数据的分桶操作非常重要,通常一些表单信息都会根据具体的表单id进行删除与修改,因此推荐使用表单ID作为分桶字段。 3、频繁的update和delete操作已经违背了hive的初衷。不到万不得已的情况,还是使用增量添加的方式最好。 4.update只支持修改单列。不支持子查询和关联查询(即不能实现使用另一张表某列更新当前表某列),分区列无法更新。存储桶列无法更新。 版权声明:本文为qq_23146763原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。 本文链接:https://blog.csdn.net/qq_23146763/article/details/105996335
Can Cancer Drugs Damage the Heart? Share Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the process of treatment, there is a possibility of the medication causing damage to the heart. Cancer: the word that sends a shudder down our spines. The occurrence of cancer in one's life not only lays an impact on the patient but also the entire family and group of friends. However, consumption of these medicines is inevitable as they can combat cancer and slow the growth of cancer cells in the body. However, what if we told you that these medicines that are meant to treat cancer can, in turn, stimulate heart damage? Yes, it is very much possible. How do cancer drugs work? The primary objective of cancer treatment ponders upon the possibility of achieving a cure for the deadly disease; failing which the treatment progresses towards providing pain relief and prolongation of life in the form of palliative care. The former treatment is far more rigorous than the latter. The treatment of cancer depends on the type and the stage. Surgery, radiation, Chemotherapy, immunology, gene therapy, and hormone therapy are the various categories. In all the mentioned cases, cancer drugs are involved to control the growth of cancer cells and to provide strength to the immune system to continue fighting the malignancy. In the case of chemotherapy, the drugs contribute to inhibiting certain stages of cell division, thus causing damage to the cancer cells. In order to enable the body to fight the diseases, powerful medicines are prescribed to the patients. These medicines are designed to urge the immune system to fight cancer. The medications that cause the immune system to attack the cancer cells are referred to as ‘Immune Checkpoint Inhibitors’. When the body’s natural immune system finds unhealthy and malignant cells, it constantly attacks that cell. The body, in turn, provides additional molecules called immune checkpoints that ensure the safety of the healthy cells. The cancer cells use these immune checkpoints to weaken the immune system, hence making the body more vulnerable to cancer growth. Tumour cells normally cover themselves up with a protein layer stolen from the normal cells. This leads to the immune system leaving these tumour cells in camouflage undetected. The checkpoint inhibitors prevent the camouflage and successfully detect the cancerous cells.  Till date, there are three such checkpoint inhibitors available in the market: ipilimumab (brand name Yervoy), nivolumab (Opdivo), pembrolizumab (Keytruda) and atezolizumab (Tecentriq). Similar to checkpoint inhibitors, chemotherapy drugs such as anthracyclines and relatively newer medicines like trastuzumab (Herceptin) and pertuzumab (Perjeta) can also cause the heart to weaken and function improperly. Chemotherapy treatment is provided after having properly studied heart function and prior heart diseases and anomalies. In the case of radiation therapy, if the radiation areas are close to the heart, it could lead to problems such as heart attack, coronary heart disease, and cardiac myopathy, to name a few. How do checkpoint inhibitors affect the heart? The function of the checkpoint inhibitors revolves around the immune system. In extreme cases, these life-saving drugs could provoke the immune system into attacking the heart. It leads to the weakening of the heart muscles and causes disruptions in the heart rhythm.  The number of cases is not many but for those whose heart caused trouble due to these cancer drugs, the effects were severe and it has even lead to tragic deaths. Due to the occurrence of these deaths and heart problems due to prescribed cancer medication, hospitals have been extra vigilance on the type of drugs a patient should take, especially if they are consuming more than one drug. They take into consideration results of cardiac testing sessions that ensure that a certain drug is completely safe for the patient’s heart. In addition, heart damage only occurs in patients who consume more than one such drug. It is, of course, a complication that needs to be addressed. Fortunately, deaths and heart damage due to cancer drugs is very rare. A mere 1% of cancer patients have been prone to heart trouble on taking more than one type of drug. While these cancer-fighting drugs function with the positive intention of survival, they could also cause other health complications related to the heart. Cancer treatment does have side-effects. But, drug prescriptions should be prudent. Patients should undergo several tests to understand what type of treatment and drugs are most suitable for them. The skill involves being able to work around the side-effects of these cancer treatments to ensure optimum health and cancer-free survival to patients. Related Post The health benefits of chocolate General The health benefits of chocolate Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... How to stay safe and also free from anxiety in times of Corona Virus General How to stay safe and also free from anxiety in times of Corona Virus Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Weight gain during pregnancy - What to expect when you’re expecting Weight gain during pregnancy - What to expect when you’re expecting Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... What Is Antenatal Yoga? How Can You Pick A Good Antenatal Class? General What Is Antenatal Yoga? How Can You Pick A Good Antenatal Class? Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... India - A Fast Growing Medical Touring Hub India - A Fast Growing Medical Touring Hub Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Getting pregnant with a low sperm count - it is possible! General Getting pregnant with a low sperm count - it is possible! Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... 3 Incredible Ways Virtual Reality Is Changing The Medical Industry General 3 Incredible Ways Virtual Reality Is Changing The Medical Industry Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Getting Pregnant with Irregular Cycles - Is it Possible? General Getting Pregnant with Irregular Cycles - Is it Possible? Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... The Rise of Wearable Tracking Devices General The Rise of Wearable Tracking Devices Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... The Health Risks of Late Pregnancies General The Health Risks of Late Pregnancies Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Telehealth - A Stepping Stone to a Better Future General Telehealth - A Stepping Stone to a Better Future Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Technology Advancements are Transforming the Entire Healthcare Industry General Technology Advancements are Transforming the Entire Healthcare Industry Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Skip Dinner. Lose Weight. General Skip Dinner. Lose Weight. Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Optogenetics- Understanding the Human Brain General Optogenetics- Understanding the Human Brain Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Online Information through EHR and EMR General Online Information through EHR and EMR Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ... Mobile Health App Adoption General Mobile Health App Adoption Cancer, in itself, is a grave disease that could alter a patient’s life drastically. In the ...
cup of gree tea on wooden table How green tea can prevent diet-induced cognitive decline The ancient Chinese habit of drinking green tea is becoming more popular all over with world. In fact, green tea is the second most consumed beverage in the world after water. Past research has shown that green tea is beneficial for your health and wellbeing, with benefits ranging from reducing the risk of breast cancer to enhancing our memory. Obesity is a major health concern globally. It causes an energy imbalance between calorie intake and consumption and increases the risk of insulin resistance and age-related cognitive decline. Green tea contains ECGC, a major polyphenol which possesses antioxidant, anti-inflammatory and cardio-protective activities, but few studies have focused on its potential effect on cognitive disorders. Obesity is a major health concern globally. It causes an energy imbalance between calorie intake and consumption and increases the risk of insulin resistance and age-related cognitive decline. Researchers from the College of Food Science and Engineering, Northwest A&F University, in Yangling, China investigated the protective effects of EGCG on insulin resistance and memory impairment cause by high fat and high fructose diet (HFFD). The scientists randomly divided 3-month-old mice into three groups based on diet: control group, HFFD group, and HFFD plus EGCG group. The control group got a standard diet. Mice on the HFFD diet plus EGCG got 2 grams of EGCG per litre of drinking water. The researchers monitored the mice for 16 weeks and found that mice fed with HFFD had a higher final body weight than control mice and a significantly higher final body weight than the mice in the HFFD + ECGC group. Memory loss was assessed by using the Morris water maze test, and the scientists found that the mice on HFFD diet took longer to find the platform compared to the mice in the control group, showing that a HFFD diet induced memory impairment. The HFFD+EGCG group had a significantly lower escape latency and escape distance than the HFFD group on each test day. When the hidden platform was removed to perform a probe trial, the mice on HFFD diet spent less time in the target quadrant than the control mice, with fewer platform crossings. The HFFD + ECGC group spent a significant amount of time in the target quadrant and with more crossing platforms showing that EGCG could improve HFFD- elicited memory impairment and neuronal loss. This study provides compelling evidence that the protective effect of ECGC found in green tea has the potential to improve memory loss and neuronal impairment caused by a high fat high fructose diet. A cuppa, anyone? Source: The FASEB Journal Meena Azzollini Meena Azzollini Meena is passionate about holistic wellbeing, alternative healing, health and personal power and uses words to craft engaging feature articles to convey her knowledge and passion. She is a freelance writer and content creator from Adelaide, Australia, who draws inspiration from family, travel and her love for books and reading. A yoga practitioner and a strong believer in positive thinking, Meena is also a mum to a very active young boy. In her spare time, she loves to read and whip up delicious meals. She also loves the smell of freshly made coffee and can’t ever resist a cheesecake. And she gets tickled pink by anything funny! You May Also Like Shingles - Everything you need to know about it Shingles – Everything you need to know about it microbiome and ageing Your microbiome and ageing Sugar Cravings They Got To Go Heres How Sugar Cravings? They’ve got to go- here’s how! Gmo Genetically Modified Food And Its Effects On The Human Body GMO (Genetically modified food) and its effects on the human body
Beefy Boxes and Bandwidth Generously Provided by pair Networks Don't ask to ask, just ask   PerlMonks   Re^2: To install a module... by Aristotle (Chancellor) on Sep 28, 2002 at 11:18 UTC ( #201437=note: print w/ replies, xml ) Need Help?? in reply to Re: To install a module... in thread To install a module... Older versions of the CPAN module will do that. Fetch a fresh CPAN.pm tarball and install it manually, then you'll be able to use the CPAN shell from there on without it pigheadedly insisting on upgrading your Perl. Makeshifts last the longest. Comment on Re^2: To install a module... Log In? Username: Password: What's my password? Create A New User Node Status? node history Node Type: note [id://201437] help Chatterbox? and the web crawler heard nothing... How do I use this? | Other CB clients Other Users? Others rifling through the Monastery: (14) As of 2014-09-18 14:36 GMT Sections? Information? Find Nodes? Leftovers? Voting Booth? How do you remember the number of days in each month? Results (116 votes), past polls
Using the Mouse Rel Driver Overview The mouse driver rel(relative) allows you to: • Position the cursor relative to the current cursor position. • Press and/or release the left, middle and right buttons. The Mouse Driver Rel Sender Utility Use the SDK Mouse Driver Rel Sender to send relative movement values and mouse button states to the mouse driver. The mouse cursor will respond as if a real physical mouse had been moved and its buttons pressed. Be sure to press the ‘Connect to Mouse Driver’ before sending relative movement values and button states to the driver. Relative Coordinates The driver sends relative movement values. • [-10,-5] moves the cursor 10 pixels to the left and 5 pixels up. • [20, 16] moves the cursor 20 pixels to the right and 16 pixels down. • [0, 0] doesn’t move the cursor, so this is useful when pressing or releasing mouse buttons. Sending Data to the Driver First, iterate through all drivers until you find ‘Tetherscript Virtual Mouse Rel’ and connect to that driver. Then send a packed record as a ‘Feature Report’ to the driver. More info on feature reports below: https://docs.microsoft.com/en-us/windows-hardware/drivers/hid/ Mouse driver reports are based sdk/delphi/common/hut1_12v2.pdf Delphi Here’s the mouse driver report Delphi data format. In our Delphi source we call this a Feature, but really it is a standard HID Input Report. This is just the terminology left over from Delphi’s JCL and JVCL libraries.: type PTSetFeatureMouseRel = ^TSetFeatureMouseRel; TSetFeatureMouseRel = packed record   ReportID: Byte;   CommandCode: Byte;   buttons: byte;   X: Byte;   Y: Byte; end; C# [StructLayout(LayoutKind.Sequential, Pack = 1)] public struct SetFeatureMouseRel {   public Byte ReportID;   public Byte CommandCode;   public Byte Buttons;   public sbyte X;   public sbyte Y; } c This corresponds to the following c struct (this is the actual receiving input report struct from the driver source): typedef struct _HIDMINI_CONTROL_INFO {   UCHAR ReportId;   UCHAR ControlCode;   BYTE buttons;   CHAR X;   CHAR Y; } HIDMINI_CONTROL_INFO, * PHIDMINI_CONTROL_INFO; • ReportID: is always 1, whether sending data or resetting the driver. Just leave it as 1. • CommandCode: This is 1 if resetting the driver, 2 if sending data. • buttons: Left, middle and right mouse buttons are encoded in this byte. Left button down = 1. Right button down adds 2. Left button down adds 4. This is basically or’ing the rightmost three bits of the byte to indicate button state. Releasing a button is done by clearing the bit to zero and sending the report to the driver again. The hid spec supports only three buttons, but obviously most mice have more than that. Usually those mice will require some additional software/driver from the mouse manufacturer to recognize those buttons. We’re not sure how these are sent exactly. • 00000000 = no buttons pressed. • 00000001 = only left button pressed. • 00000010 = only right button pressed. • 00000100 = only middle button pressed. • 00000110 = only right and middle buttons pressed. • 00000101 = only left and middle buttons pressed. • 00000111 = all buttons pressed. • 00000010 and then wait x ms and then 00000000 = to right-click and then release the button. x is a delay, try at least 50ms. That is the time the button remains pressed. • X: The mouse relative X position from -127 to 127. • Y: The mouse relative Y position from -127 to 127. Handling Stuck Mouse Buttons As an example, normally a right-mouse-click is 00000010 and then wait x ms then 00000000. It is possible that you may have forgotten, or due to your app crashing, that a button remains pressed. There are three ways to unstuck a button. 1. Send a Reset command to the mouse driver. This will release all mouse buttons. 2. Physically press and release the button on a real physical mouse. That should clear it. 3. Reboot. Resetting the Driver To reset the driver, send the report with a CommandCode = 1. The X and Z values are ignored, so Z and Y to any value you like. Internally, the driver will release the buttons and set X = 0 and Y = 0. Alternatively, , you can send a report with CommandCode = 1, buttons = 0, X and Y = 0. It’s up to you whether to use the reset function, but it isn’t critical for the mouse driver. Your First Hello-Driver App – a Suggestion 1. Iterate through the drivers and find and connect to the mouse driver. 2. Send data with a command code of 2, buttons = 0, X = 10, Y = 10. 3. Run your code. If it works, you’ll see the mouse cursor move a little to the lower-right.
LinuxQuestions.org LinuxQuestions.org (/questions/) -   Linux - Software (http://www.linuxquestions.org/questions/linux-software-2/) -   -   Evince - Gtk-CRITICAL errors (http://www.linuxquestions.org/questions/linux-software-2/evince-gtk-critical-errors-465454/) snl 07-19-2006 05:11 AM Evince - Gtk-CRITICAL errors   After closing Evince, I would get the following errors Quote: (evince:32489): Gtk-CRITICAL **: gtk_tree_model_foreach: assertion `GTK_IS_TREE_MODEL (model)' failed (evince:32489): Gtk-CRITICAL **: gtk_list_store_clear: assertion `GTK_IS_LIST_STORE (list_store)' failed How do they mean and how to solve them? Thank you. All times are GMT -5. The time now is 03:34 PM.
The Skeptics Society & Skeptic magazine Five Questions about Human Errors for Proponents of Intelligent Design When Charles Darwin first proposed natural selection as the mechanism of evolutionary change, he provided many different lines of reasoning. One of them was that he and other biologists had observed striking examples of suboptimal design in nature. If a creator-God was perfect and designed the world and everything in it according to His perfect plan, how could poor structure/function be explained? If we view the natural world as the product of evolutionary forces, however, imperfection is not so surprising. Rather, examples of poor design reveal interesting things about an organism’s evolutionary past, and that’s the thrust of my new book Human Errors.1 Because courts in the United States rightly determined that creationism is a religious doctrine, not a scientific one, its proponents changed their approach, practically overnight, restyling their position as the theory of “intelligent design,” or ID. By focusing on the seemingly scientific principle of “irreducible complexity” and only implying a vague, unnamed “designer,” supporters of ID claim it as a valid scientific theory, not a religious doctrine necessarily. Notwithstanding the fact that vanishingly few scientists support this theory and that neither were the courts fooled by the semantic shift, ID has become the dominant expression of creationism in the United States and is supported by around 40 percent of the population.2 Support for ID is strongly stratified by age, with only around 25 percent of those under age 30 in support, and is finally beginning to decline after years of holding steady.3 Glitches in nature, particularly in the human body, call out for an explanation. Even if ID offered intellectual gains over creationism through the principle of irreducible complexity, and a focus on observations rather than biblical scripture, it did little to explain how poor design could be so rampant in creatures that were specifically designed by an intelligent force. Therefore, glitches in nature, particularly in the human body, call out for an explanation. Evolution usually provides elegant and deeply informative explanations. What are the explanations provided by ID? My book documents scores of these “human errors,” but I would love to know what intelligent design supporters say about these five in particular. 1. Why are we designed with nonfunctional pseudogenes? In the human genome, there exist broken-down versions of once-functional genes. Formally called pseudogenes, these genetic elements have no function and are usually not expressed at all, but they bear striking resemblance to important and functional genes in other species. These genes were rendered inoperative by mutations and, in most cases, whatever function the genes once had we either no longer need or has been taken over by some other genes. In a few cases, however, the breakdown of the gene in question actually hobbles us in some specific way. The most famous of the pseudogenes is called GULO. This gene normally functions in the synthesis of ascorbic acid, more commonly called vitamin C.4 The majority of animals on earth synthesize vitamin C for themselves, but primates cannot and therefore they (we!) must get it in our diet. The reason is because, long ago, in an ancestor of all primates, the GULO gene was disabled by a random mutation in either a sperm or egg cell. Through sheer chance, it became fixed in the population and has since accumulated many other mutations. But it is still easily recognizable. We have the GULO gene, but it’s broken. For this reason, primates have been restricted to the climates where citrus fruits and other sources of vitamin C abound. It was once a mystery why humans had to consume vitamin C while none of our domesticated animals seem to need it. Evolutionary study has provided the fascinating answer, which also illuminates why primates live where they do around the globe. For example, it’s no coincidence that no primates besides humans are native to the content of Europe. Dietary vitamin C is scarce there and explains why scurvy was a major public health concern in Europe through pre-history and antiquity. We’ve since learned to incorporate foods that provide us with vitamin C. Since creationists don’t believe in evolution, what is their explanation? It’s not that we don’t have the GULO gene. We do. It just doesn’t work. Why would an intelligent force intentionally design us with a broken gene? Give us a gene or don’t, but a broken version? What is that about? Also, GULO is not the only pseudogene. We have thousands of formerly functional genes scattered throughout our genomes like rusting cars in a junkyard.5 We may even carry more broken genes than working ones. If this is design, it sure isn’t intelligent! The human maxillary sinus cavity. The human maxillary sinus cavity. Because the mucus collection duct is located at the top of the chamber, gravity cannot help with drainage. Illustration by Donald Ganley from Human Errors by Nathan H. Lents. Used by permission. All rights reserved, © Houghton Mifflin Harcourt. 2. Why do our nasal sinuses drain upward? Have you noticed that, while we adults get 3 or 4 colds each year and our children can get 10 or more, our pets don’t seem to have this problem at all? One big reason for this is that our nasal cavities have a huge design flaw that those of dogs and cats don’t. Nasal cavities are hollow, air-filled chambers through which air flows before heading down to the lungs. Lined with sticky surfaces called mucus membranes, these caverns warm and humidify the air and also trap particulates and microorganisms in the mucus. Normally, mucus is thin, clear, and watery, and is continually secreted, creating a constant flow of the sticky goo as it eventually drains into the throat where it can be swallowed and sent to the stomach for acid neutralization. The largest such cavities in humans are the maxillary sinuses just behind our cheek bones. In a perplexing example of poor design, the drainage spout for this sinus cavity is near the top of the chamber. Since fluids don’t tend to flow uphill, tiny hair-like structures called cilia have to work extra hard to direct the mucus up to the drain pipe, which happens also to be extremely skinny. Most of the time, they can handle this challenge, but if there is any uptick in the load of allergens, infectious agents, or even just dust, mucus gets thicker and more viscous and this is when the situation gets sticky, literally. As the thick and cloudy mucus pools in the bottom of the sinus cavity, infections brew. What kind of plumber would put the drain at the top? 3. Why are humans so bad at absorbing vitamins and minerals? A quick scan of the USDA’s recommended daily intake of various micronutrients confirms what anyone who has tried to eat a healthy and well-balanced diet knows all too well: the human diet is incredibly demanding. A little bit of this, a little bit of that, not too much of that…. While the supplement industry has no doubt exaggerated this for profit, there is truth to the claim that humans have to worry much more about their diet than other animals seem to. In fact, many animals can do just fine on a very repetitive diet of just a few, or even just one, source of food. Why can’t we? Human evolutionary history is marked by one thing above all else: variety and experimentation.6 Humans have explored and exploited every imaginable habitat and mode of living and the ability to thrive in diverse scenarios and survive on myriad sources of nourishment unfortunately became the necessity of a varied diet as our bodies became lazy about manufacturing micronutrients for ourselves. (See vitamin C, above). One thing that humans are terrible at absorbing is calcium, which is unfortunate because it is vital for the functioning of every single cell in the body. So essential is calcium, that we strip it from our bones whenever we don’t ingest enough of it. The bizarre part is that even when we consume sufficient amounts of calcium, we still end up deficient because we are so bad at extracting it from our food. 200 million women around the world suffer from osteoporosis. In the US, the typical diet provides plenty of calcium and yet, one in three women and one in five men will suffer a bone fracture due to osteoporosis,7 usually after age 50. What gives? We start our lives absorbing a respectable 60 percent of the calcium we consume as infants. This percentage drops steadily throughout life, reaching about 20 percent in early adulthood, and plummeting to around 5 percent in old age.8 And this is the sad state of affairs when we have adequate vitamin D in our diets. Without vitamin D, we basically don’t absorb any calcium at all. Adding insult to injury, even though many women need also to boost their iron intake to prevent or treat anemia, iron in a meal can interfere with the absorption of calcium! So can sodium. And potassium. Is it any wonder that most of us are deficient in calcium? We also have trouble absorbing some vitamins, such as B12. Like all the herbivore animals, we have bacteria in our large intestine that synthesize plenty of B12. But we only absorb B12 in our small intestine.9 This means that someone can suffer macrocytic anemia due to vitamin B12 deficiency while simultaneously sending copious amounts of B12 to the toilet. Bad plumbing strikes again! 4. Why do humans have muscles and bones that have no function? The human body has way too many bones. Most humans are born with around 300 bones. This number drops to around 206 by adulthood as bones begin to fuse together. These numbers are just averages, some people have some extras and some are missing some. That alone tells you that something funny is going on. Our ankles and wrists have seven or eight separate bones in them and for no good reason. They are all pretty much fixed together, though not fused, so there is no value in them being separate at all. While redundancy is often a good thing in a physical structure, the additional bones do not make our ankles or wrists stronger. In fact, having so many attachment sites for tendons and ligaments makes strains and sprains more likely. After all, a chain is only as strong as its weakest link. Think of how common sprained ankles are in humans. Now think of how rare they are in our companion animals. Formally called the coccyx, the entire tailbone is pointless as well. While most of us have four coccygeal vertebrae, some have one extra and some have one fewer. While we’ve long known that it was the remnant of the tail that almost all mammals except apes have, it was assumed that the stump that we’re left with was important because many tendons and ligaments attach to it. However, tens of thousands of coccygectomies have been performed for various reasons, including cancer of the coccyx, and patients have absolutely no long-term discomfort or loss of function after their tailbones are removed.10 The various attachments could be entirely redundant or purely vestigial, probably both. Not connected to the tailbone, but near it, lies another pointless organ called the pyramidalis muscle. This muscle can tense the flesh between the anus and the testes or vulva but this has no importance to posture, continence, or anything. In fact, around 20 percent of the population is missing this muscle altogether and it is badly misshapen in many that do have it.11 Some believe that the pyramidalis muscle previously functioned to flex the tail that our ancestors had but lost its attachment to the tailbone as the tail regressed. There is also the Palmaris Longus muscle in our forearms. While a more substantial version of this muscle likely helped our ancestors by providing strong grip while swinging from trees, it is useless to us today. Between 10–20 percent of the population is missing this muscle entirely and they do not measure weaker grip strength for its absence.12 In fact, so useless is this muscle that surgeons routinely use its connecting tendon as the source of tissue grafts when they need a new tendon to repair a badly broken wrist.13 5. Why are humans so inefficient with reproduction? The one thing that a species absolutely must be able to do is reproduce, so this is an area that humans must have mastered, right? Not even close. In fact, humans may be the least fertile of the apes. More than 10 percent of couples have trouble conceiving14 and when you consider what all can go wrong, it’s understandable. To begin with, the ovaries are not even physically attached to the fallopian tubes and so eggs are sometimes squirted pointless into the abdominal cavity. Although it’s very rare, a roving sperm can actually fertilize one of these misplaced eggs and start a life-threatening abdominal pregnancy. On the male side, sperm have no sense of direction and swim in right-handed corkscrews, unable to turn left. This is part of the reason why hundreds of millions of them are needed for one to reach the egg. Many men have low sperm count or motility and many women have unpredictable ovulation cycles, meaning that the simple act of helping the meandering sperm and rudderless egg find each other is often not so simple. But even when conception occurs, pregnancy is far from certain. More often than not, embryos fail to implant in the uterine wall before menstruation begins. In nearly half of those, chromosomal errors are to blame for an embryo’s failure to thrive,15 but in the larger portion, there is no apparent defect. The embryo simply bounces off the uterine wall and is lost with the endometrium at the end of the month. That so many perfectly healthy embryos are lost for failure to implant is especially painful for families trying to grow. To demonstrate how out of step with other animals this is, female mice that copulate with a vasectomized male undergo the physiological steps of gestation, a phenomenon called pseudopregnancy.16 So confident is her body in its own fertility, and that of her mate, that a female mouse just assumes she’s pregnant any time she’s had sex. Her corpus luteum will persist, her uterine wall will thicken, and she will begin to lactate. Pseudopregnant mice even build nests in preparation for the nonexistent pups. Pseudopregnancy lasts 10–14 days in mice, nearly half the normal gestational period. It can last over a month in cats and two months in pigs. Even when humans have managed to get and stay pregnant, the biggest danger of all still awaits. While modern technologies, from soap to Cesarean sections, have all but turned this page, giving birth was previously among the most dangerous moments of a woman’s life. As recently as 2000, almost 3% of childbirths in Sierra Leone resulted in maternal death and this is much reduced from just a half-century past.17 How much riskier was childbirth during the classical and pre-historical periods? Being born is risky also. We do okay in developed countries, but there are four countries even today that suffer from greater than 10 percent infant mortality rate. The highest is Afghanistan where 12.1 percent of babies born do not survive the first year of life. In 1950, most countries were close to 20 percent on this measure.18 We are a spectacularly fragile species, but our evolution holds the explanation. Our pelvic girdle narrowed as we evolved to walk in an upright manner, with our upper legs jutting straight down and remaining within the same plane with each stride. Then, our craniums experienced an explosion of growth not long after. In a risky compromise of these two adaptations, we are born long before we are really ready, helpless and sickly. The relative sizes of female pelvises and infant heads in (from left to right) chimpanzees, Australopithecus afarensis, and modern humans. The relative sizes of female pelvises and infant heads in (from left to right) chimpanzees, Australopithecus afarensis (“Lucy”), and modern humans. Illustration by Donald Ganley from Human Errors by Nathan H. Lents. Used by permission. All rights reserved, © Houghton Mifflin Harcourt. Once again, this is far out of step with other animals. For most of our fellow mammals, childbirth is not a dramatic affair. Cows and horses seem to barely notice when they give birth and the offspring are ambling about within minutes. Gorillas often continue to eat and care for other children as they give birth. It is just we humans, the supposed pinnacles of creation, who bear the awful burden of a treacherous childbirth. Errors Abound While the great majority of the quirks and glitches that I discuss in my book are the results of compromises, tradeoffs, and the inherent limits of evolution, some of them cannot possibly be seen as anything other than “bad design.” While evolution usually has an answer to the questions raised by these design flaws, if an unsatisfying one, what answer is offered by the theory of intelligent design? When creationists try to duck this question in creative ways (as they already have in responses to my book), this too is telling. What makes a theory scientific is its explanatory power and it’s ability to make testable predictions about future discoveries. As far as I can tell, the only creationist response to human design flaws is, “That’s just the way it is.” This is not a scientific answer and offers no exploratory way forward. END About the new book We like to think of ourselves as highly evolved creatures. But if we are evolution’s greatest creation, why are we so badly designed? We have retinas that face backward, the stump of a tail, and way too many bones in our wrists. We must find vitamins and nutrients in our diets that other animals simply make for themselves. Millions of us can’t reproduce successfully without help from modern science. We have nerves that take bizarre paths, muscles that attach to nothing, and lymph nodes that do more harm than good. And that’s just the beginning of the story. As biologist Nathan H. Lents explains, our evolutionary history is a litany of mistakes, each more entertaining and enlightening than the last. As we will discover, by exploring human shortcomings, we can peer into our past, because each of our flaws tells a story about our species’ evolutionary history. A rollicking, deeply informative tour of our four-billion-year-long evolutionary saga, Human Errors both celebrates our imperfections—for our mutations are, in their own way, a testament to our species’ greatness—and offers an unconventional accounting of the cost of our success. About the Author Dr. Nathan H. Lents is Professor of Biology at John Jay College of the City University of New York, where he is also the director of the honors programs. He also maintains The Human Evolution Blog and hosts the science podcast This World of Humans. He is the author of Not So Different: Finding Human Nature in Animals and Human Errors: A Panorama of Our Glitches, from Pointless Bones to Broken Genes. References 1. Lents, N. H. 2018. Human Errors: A Panorama of our Glitches, from Pointless Bones to Broken Genes. Houghton Mifflin Harcourt. https://thehumanevolutionblog.com/book-human-errors/ 2. Shermer, M. 2006. Why Darwin matters: The case against intelligent design. Macmillan. 3. Green, E. Intelligent Design: Slowly Going Out of Style? The Atlantic. 9 June 2014 4. https://bit.ly/2HNWxUc 5. 5 Torrents, D., Suyama, M., Zdobnov, E., & Bork, P. 2003. A genome-wide survey of human pseudogenes. Genome research, 13(12), 2559–2567. 6. Tattersall, I. 2001. How we came to be human. Scientific American, 285(6), 56–63. 7. Johnell, O., & Kanis, J. A. 2006. An estimate of the worldwide prevalence and disability associated with osteoporotic fractures. Osteoporosis international, 17(12), 1726–1733. 8. Gallagher, J. C., Riggs, B. L., Eisman, J., Hamstra, A., Arnaud, S. B., & Deluca, H. F. 1979. Intestinal calcium absorption and serum vitamin D metabolites in normal subjects and osteoporotic patients: effect of age and dietary calcium. The Journal of clinical investigation, 64(3), 729–736. 9. Herbert, V. 1988. Vitamin B-12: plant sources, requirements, and assay. The American Journal of Clinical Nutrition, 48(3), 852–858. 10. Balain, B., Eisenstein, S. M., Alo, G. O., Darby, A. J., Cassar-Pullicino, V. N., Roberts, S. E., & Jaffray, D. C. 2006. Coccygectomy for coccydynia: case series and review of literature. Spine, 31(13), E414–E420. 11. Monkhouse, W. S., & Khalique, A. (1986). Variations in the composition of the human rectus sheath: a study of the anterior abdominal wall. Journal of anatomy, 145, 61. 12. Thompson, N. W., Mockford, B. J., & Cran, G. W. 2001. Absence of the palmaris longus muscle: a population study. The Ulster medical journal, 70(1), 22. 13. Wehbe, M. A. 1992. Tendon graft donor sites. Journal of Hand Surgery, 17(6), 1130–1132. 14. 14 Mascarenhas, M. N., Flaxman, S. R., Boerma, T., Vanderpoel, S., & Stevens, G. A. 2012. National, regional, and global trends in infertility prevalence since 1990: a systematic analysis of 277 health surveys. PLoS medicine, 9(12), e1001356. 15. Baart, E. B., Martini, E., van den Berg, I., Macklon, N. S., Galjaard, R. H., Fauser, B. C. J. M., & Van Opstal, D. 2005. Preimplantation genetic screening reveals a high incidence of aneuploidy and mosaicism in embryos from young women undergoing IVF. Human Reproduction, 21(1), 223–233. 16. Dewar, A. D. 1959. Observations on pseudopregnancy in the mouse. Journal of Endocrinology, 18(2), 186–190. 17. Trends in Maternal Mortality: 1990 to 2015. Geneva, World Health Organization, 2015. 18. The World Factbook. 2012. The Central Intelligence Agency, Washington D.C. 57 Comments Newest Oldest Inline Feedbacks View all comments This site uses Akismet to reduce spam. Learn how Akismet processes your comment data. Comments are closed 45 days after an article is published. Donate Get eSkeptic Be in the know! Subscribe to eSkeptic: our free email newsletter and get great podcasts, videos, reviews and articles from Skeptic magazine, announcements, and more in your inbox twice a week. It’s free. We never share your address. Unsubscribe any time. Sign me up! Retrospective Skeptic cover art by Pat Linse Art of the Skeptic In celebration of Skeptic magazine’s 100th issue, we present sage graphic art advice for skeptical groups and a gallery of art reflecting more than 47 years of skeptical activism from Skeptic’s long time Art Director, Pat Linse Detecting Baloney Baloney Detection Kit Sandwich (Infographic) by Deanna and Skylar (High Tech High Media Arts, San Diego, CA) The Baloney Detection Kit Sandwich (Infographic) For a class project, a pair of 11th grade physics students created the infographic shown below, inspired by Michael Shermer’s Baloney Detection Kit: a 16-page booklet designed to hone your critical thinking skills. FREE PDF Download Wisdom of Harriet Hall Top 10 Things to Know About Alternative Medicine Harriet Hall M.D. discusses: alternative versus conventional medicine, flu fear mongering, chiropractic, vaccines and autism, placebo effect, diet, homeopathy, acupuncture, “natural remedies,” and detoxification. FREE Video Series Science Based Medicine vs. Alternative Medicine Science Based Medicine vs. Alternative Medicine Understanding the difference could save your life! In this superb 10-part video lecture series, Harriet Hall M.D., contrasts science-based medicine with so-called “complementary and alternative” methods. FREE PDF Download Top 10 Myths of Terrorism Is Terrorism an Existential Threat? This free booklet reveals 10 myths that explain why terrorism is not a threat to our way of life or our survival. FREE PDF Download The Top 10 Weirdest Things The Top Ten Strangest Beliefs Michael Shermer has compiled a list of the top 10 strangest beliefs that he has encountered in his quarter century as a professional skeptic. FREE PDF Download Reality Check: How Science Deniers Threaten Our Future (paperback cover) Who believes them? Why? How can you tell if they’re true? What is a conspiracy theory, why do people believe in them, and can you tell the difference between a true conspiracy and a false one? FREE PDF Download The Science Behind Why People See Ghosts The Science Behind Why People See Ghosts Mind altering experiences are one of the foundations of widespread belief in the paranormal. But as skeptics are well aware, accepting them as reality can be dangerous… FREE PDF Download Top 10 Myths About Evolution Top 10 Myths About Evolution (and how we know it really happened) If humans came from apes, why aren’t apes evolving into humans? Find out in this pamphlet! FREE PDF Download Learn to be a Psychic in 10 Easy Lessons Learn to do Psychic “Cold Reading” in 10 Easy Lessons Psychic readings and fortunetelling are an ancient art — a combination of acting and psychological manipulation. FREE PDF Download The Yeti or Abominable Snowman 5 Cryptid Cards Download and print 5 Cryptid Cards created by Junior Skeptic Editor Daniel Loxton. Creatures include: The Yeti, Griffin, Sasquatch/Bigfoot, Loch Ness Monster, and the Cadborosaurus. Copyright © 1992–2021. All rights reserved. | P.O. Box 338 | Altadena, CA, 91001 | 1-626-794-3119. The Skeptics Society is a non-profit, member-supported 501(c)(3) organization (ID # 95-4550781) whose mission is to promote science & reason. As an Amazon Associate, we earn from qualifying purchases. Privacy Policy.
PolyU IR Collection: http://hdl.handle.net/10397/1911 Thu, 30 Jul 2015 06:19:42 GMT 2015-07-30T06:19:42Z Improved earthquake slip distribution inversion with geodetic constraints http://hdl.handle.net/10397/7427 Title: Improved earthquake slip distribution inversion with geodetic constraints Authors: Wang, Chisheng Abstract: Earthquake is a natural disaster that can lead to a significant loss of lives and properties. Earthquake studies have been relying on the inversion of ground observations, including geodetic and seismological data, due to a lack of underground measurement. The development of modern geodetic technologies such as Interferometric Synthetic Aperture Radar (InSAR) and Global Positioning System (GPS) have enabled ground displacement to be measured with unprecedented spatial and temporal coverage. The earthquake slip inversion with geodetic constraints has become a routine method to facilitate the understanding of the earthquake mechanism. The existing studies on earthquake source inversion offer a general approach to obtaining earthquake slip characteristics from geodetic observations, but the methods employed are by no means sufficient or optimal. For example, the utilization of the low-coherence InSAR interferogram is still an unsolved issue. Also, there are hardly any evaluation methods to quantitatively describe the performances of different InSAR downsampling criteria. In addition, in most studies, different fault patches are regularized equally without considering their diversity. One of the objectives of this thesis is to refine the existing methods. First, we propose a multiple-starting-point method to properly utilize the low-coherence InSAR interferogram. This can better deal with the low-coherence interferogram in terms of involving all isolated regions in the inversion. Studies used simulated data and Izimit earthquake data both show that this method can derive more detailed slip distribution results than the previous methods. Second, we can use the matrix perturbation theory to quantitatively describe the influence of InSAR data downsampling on earthquake inversion. A formula is devised to assess the extent of perturbation on the inversion results brought by downsampling. Based on this formula, we propose an improved equation-based downsampling algorithm which generates slip results closer to full data inversion. Our simulation study shows that this new algorithm outperforms previous sampling algorithms in maintaining earthquake slip information. Third, we analyze the performance of variable regularization in fault patches, and find that optimal regularization should be related to the roughness of the fault slips. We propose a two-step regularization method, which derives preliminary fault slips, and adjusts the regularization matrix according to the derived slips to obtain more refined results. Our experiment using simulated data from four different slip patterns shows that the two-step method can obtain results with smaller Mean Square Error (MSE).; This thesis also aims to study the sequence of the 2011 Van-Ercis and Van-Edremit earthquakes. The Van earthquakes occurred on unknown faults, and some research findings on them conflict with each other. We use a joint geodetic dataset, including GPS, InSAR, Multi-aperture InSAR (MAI) technique and SAR offset-tracking measurements, to constrain the slip distributions. The proposed multiple-starting-point unwrapping, equation-based InSAR downsampling and two-step regularization are applied to the earthquake slip inversion process. The results suggest that two nearly W-E striking segmental faults broke during the Van-Ercis event. Two main slip concentrations are found buried 5 km to 18 km underground. The Van-Edremit earthquake is shown to have been sourced from a dextral, north-dipping, and nearly E-W striking fault, and have had the largest slip of about 0.5 m at the depth of 6.4 km. The stress change analysis shows that the Van-Ercis earthquake imposed an up to 4 bars stress load on the causative fault of the Van-Edremit earthquake. Description: xii, 130 leaves : color illustrations ; 30 cm; PolyU Library Call No.: [THS] LG51 .H577P LSGI 2014 Wang Wed, 01 Jan 2014 00:00:00 GMT http://hdl.handle.net/10397/7427 2014-01-01T00:00:00Z Improving the robustness and accuracy of GPS software receiver under ionospheric scintillation conditions http://hdl.handle.net/10397/7409 Title: Improving the robustness and accuracy of GPS software receiver under ionospheric scintillation conditions Authors: Xu, Rui Abstract: Ionospheric scintillation is a random fluctuation in the amplitude and phase of radio signal that passes through irregularities of electron density distribution in the ionosphere. It can lead to loss of lock on the carrier tracking loop of GPS receiver and hence a requirement of re-tracking and reacquisition of the lost signal. This results in cycle slips, increased navigation errors and even navigation interruption. Ionospheric scintillation poses a threat to the reliability and accuracy of various GPS applications. To reduce the occurrence of scintillation-caused loss of lock, several improved tracking algorithms such as Frequency Lock Loop (FLL)-assisted Phase Lock Loop (PLL), Kalman Filter based PLL (KFPLL) and vector based tracking algorithms are conducted. These methods commonly involve adjusting loop parameters (i.e. the equivalent noise bandwidth and integration time) to scintillation intensity. However, one limitation is the dependence of tracking loop performances on its parameters that are difficult to estimate under scintillation conditions. To understand the process of loss of lock due to scintillation, the effects of separate and combined amplitude and phase scintillation on PLL inputs (i.e. in-phase, quadra-phase and phase error) are first analyzed. The analysis reveals amplitude scintillation and phase scintillation have different effects on PLL inputs. Thus, scintillation effects on carrier tracking loop can be mitigated through dealing with in-phase and quadra-phase. In addition, the analysis results imply the effects of amplitude scintillation and phase scintillation can be decoupled from each other and mitigated separately.; Based on the analysis results, a new approach called Frequency Lock Loop (FLL)-assisted Phase Lock Loop (PLL) with In-phase Pre-Filtering (IPF) is proposed. In the method, FLL-assisted PLL is used to mitigate phase scintillation effects because it has high dynamic performances and can fast track phase variations. IPF is used to mitigate the effects of amplitude scintillation. It is realized using a homomorphic filter and a novel segmented filter since scintillation amplitude is non-additive error. Their performances are evaluated under different levels of simulated scintillation cases and the segmented filter is suggested. To reduce the dependence of tracking performances on the integration time, a parallel multiple PLL architecture called multi-PLL is designed in the carrier tracking loop. In the multi-PLL, each channel contains several sub-PLLs with different loop parameters to track one satellite signal. Realization of the multi-PLL involves two issues: sub-PLL selection and integration algorithm. In the study, the degree of correlation between two sub-PLLs is introduced to choose the sub-PLLs parameters. A tracking fusion algorithm and an output fusion algorithm are designed to integrate the multiple sub-PLLs. In the study, both FLL-assisted PLL with IPF and multi-PLL were tested using simulated and real-world GPS scintillation data. The results verified the effectiveness of the FLL-assisted PLL with IPF and multi-PLL. Description: xi, 166 pages : illustrations (some color) ; 30 cm; PolyU Library Call No.: [THS] LG51 .H577P LSGI 2014 Xu Wed, 01 Jan 2014 00:00:00 GMT http://hdl.handle.net/10397/7409 2014-01-01T00:00:00Z InSAR coherence estimation and applications to earth observation http://hdl.handle.net/10397/7381 Title: InSAR coherence estimation and applications to earth observation Authors: Jiang, Mi Abstract: Coherence of radar echoes is a fundamental observable in interferometric SAR (InSAR) measurements. It provides a quantitative measure of the scattering properties of imaged surfaces and therefore is widely used to study the physical processes of the earth. However, the estimated coherence is often biased due to the radar signal non-stationarity and the bias in the estimators used. Great efforts have been made over the past two decades to mitigate the errors in coherence estimation. Radar signal non-stationarity has been dealt with either by compensating for the systematic interferometric phase in the estimation window or by selecting and using the homogeneous pixels to avoid the texture effect in SAR images. The bias of the estimators has been corrected by the probability model deduced under Gaussian scene. Although the existing studies have improved the accuracy of coherence estimation with different levels of success, some key problems still remain. For example, it is difficult to avoid the overestimation of the coherence over noise only areas due to the overcorrection of the fringe pattern if no fringe pattern exists. It is also unclear how to mitigate the bias of the sample coherence when the sample size is small. In addition to the technical limitations, the assumptions behind these methods, such as the Gaussian property and the independence between the neighboring sample coherence, are often too rigorous to hold over many natural scenes, leading to mis-estimation of the coherence in the real world. The purpose of this thesis is to gain a better understanding of the sources of errors in InSAR coherence estimation, and to develop self-adaptive algorithms with fewer assumptions to solve the problems aforementioned.; We begin by briefly reviewing the existing techniques for coherence estimation. Three principal errors (i.e., errors due to biased estimators, appearances of image textures and fringe rates in estimate windows) are quantitatively analyzed by means of mathematic descriptions. Under the framework of multi-temporal InSAR (MT-InSAR) with moderate to large stack size, we propose a hybrid processing chain to mitigate three types of errors. To avoid overestimation of coherence induced by image texture, an adaptive two-sample distribution-free test is developed to compare the statistical homogeneity between two spatial pixels by using their temporal samples. To avoid underestimation or overestimation of coherence induced by local fringe rates, we suggest using the phase standard deviation map to guide the Fourier kernel adaptively. A newly developed estimator of bias correction, namely double bootstrapping, is deduced under assumption-free condition. The method is especially effective for small sample problem in which the biased coherence cannot be corrected by the existing estimators. Based on the foregoing processing chain, further progress has been successfully made for small SAR stacks. Statistically homogeneous neighbors for each central pixel are selected by using their spatio-temporal samples, rather than temporal samples only. Furthermore, considering the computational complexity of double bootstrapping, a Jackknife-based method is proposed for bias mitigation in coherence estimation. We present experimental results with both simulated and real data sets, and compare the performance of the proposed approaches against some of the existing ones. The results demonstrate that the new approaches can suppress the errors more effectively under various circumstances. Finally, by associating a decorrelation model with the new processing chain, we decompose coherence observations and extract the temporal components of decorrelation from a texture-significant area in Macau, and find that the time series of coherence are less noisy and biased than those obtained from conventional methods in almost all land covers. The results confirm that the methods presented in the thesis can improve the accuracy of InSAR coherence-based applications to earth observations. Description: x, 112 pages : illustrations (some color) ; 30 cm; PolyU Library Call No.: [THS] LG51 .H577P LSGI 2014 Jiang Wed, 01 Jan 2014 00:00:00 GMT http://hdl.handle.net/10397/7381 2014-01-01T00:00:00Z Local-measure-based landslide morphological analysis using airborne LiDAR data http://hdl.handle.net/10397/7376 Title: Local-measure-based landslide morphological analysis using airborne LiDAR data Authors: Deng, Susu Abstract: Landslides leave discernable signatures related to form, shape and appearance of land surface, i.e. morphological features, which are important for analysis of landslide mechanism, activity state and landslide detection. For objective analysis of landslide morphology, an approach capable of providing quantitative expression of morphological features is required. In addition, the development of new technique, namely airborne Light Detection And Ranging (LiDAR), allows morphological analysis in great details. Therefore, the approach should be able to express landslide morphological features related to multiple scales. Despite a number of methods based on mathematical tools have been developed to highlight particular information associated with landslide morphology, few efforts were devoted to quantification of landslide morphological features based on their descriptions. In this research, an approach based on local measures of spatial association was developed to quantify landslide morphological features represented by dominant morphology or topographic variability in a particular pattern. The use of local measures enables quantification of distinctness of landslide morphological features in a statistical way so that distinct morphological features can be identified. For characterization of spatial patterns of topographic variability, a method constructing local measure plots was proposed. A local measure plot indicates scales and magnitudes of topographic variations along a specified direction. Multi-scale patterns of topographic variability can be revealed based on the plots. Due to its capability of identifying landslide morphological features, the local-measure-based approach can be applied to landslide detection. In related researches of automated landslide detection, morphological features have not been thoroughly exploited, especially for detection of debris slides and flows. Thus a semi-automated landslide detection approach based on morphological features was proposed to identify locations of small size, shallow debris slides and flows. Landslide component candidates were extracted by identifying morphological features using the local-measure-based approach. Geometric and contextual analyses were subsequently conducted to discriminate landslide components from other terrain objects. The approach was applied to a test site containing both new and old landslides covered by dense vegetation. Owing to the vegetation penetration ability, airborne LiDAR was utilized. Almost all (93.6%) the new and a part (23.8%) of old landslides with distinct morphological features were detected. In this research, airborne LiDAR data was employed to generate high-resolution Digital Terrain Models (DTMs) utilized in landslide morphological analysis and landslide detection. Since land surface analysis is affected by the quality of DTM , the possibility of improving the filtering results of LiDAR point cloud using an integration scheme was explored. Through visual evaluation of the integration result, this scheme was proved to be able to remove a part of filtering errors and increase the number of ground points. Description: xii, 158 pages : color illustrations ; 30 cm; PolyU Library Call No.: [THS] LG51 .H577P LSGI 2014 Deng Wed, 01 Jan 2014 00:00:00 GMT http://hdl.handle.net/10397/7376 2014-01-01T00:00:00Z
Finite element simulation on the reflection and transmission of the lamb waves across a micro defect of plates Peilong Yuan1 , Xuexin Li2 , Shaoqi Zhou3 1, 2, 3Logistical Engineering University, Chongqing 401311, China 1Corresponding author Journal of Vibroengineering, Vol. 21, Issue 3, 2019, p. 611-626. https://doi.org/10.21595/jve.2018.19814 Received 9 March 2018; received in revised form 8 August 2018; accepted 20 August 2018; published 15 May 2019 Copyright © 2019 Peilong Yuan, et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Creative Commons License Table of Contents Download PDF References Cite this article Views 227 Reads 106 Downloads 1382 WoS Core Citations 0 CrossRef Citations 0 Abstract. This paper presents a theoretical and finite element (FE) investigation of the generation and propagation characteristics of the fundamental Lamb waves symmetrical mode S0 and anti-symmetrical mode A0 after testing with different types of defects in the plates. The reflection and transmission of Lamb waves at a micro symmetry defect and asymmetry defect are analyzed numerically in the two-dimension (2D) model. Mode conversion of Lamb waves can occur upon encountering the asymmetry discontinuities leading to newly-converted modes apart from wave reflection and transmission. When testing the symmetry defects, the reflection and transmission waves have no modal separation phenomenon. To describe the mode conversion and reflection and transmission degree, and evaluate the micro defect severity, a series of defects are simulated to explore the relationships of defect reflection and transmission with the length and depth of a defect in the 2D FE model. In the three-dimension (3D) FE model, the straight-crest Lamb waves and circular-crest Lamb waves are simulated and researched by contrast analysis. Then the straight-crest Lamb waves are motivated to study the scattering laws of Lamb waves interacting with the circle hole defects and rectangular hole defects. S0 mode and SH0 mode are contained in the scattering waves after S0 mode testing the through holes defects. Corresponding mode energy percentages were analyzed at different micro defect severities changed in different ways. Simulation results illustrated that the modal energy percentages varied in a different character and provided support for the analytically determined results of Lamb waves in the non-destructive testing and evaluation. Finite element simulation on the reflection and transmission of the lamb waves across a micro defect of plates Highlights • In the two-dimension model, mode conversion of Lamb waves can occur upon encountering the asymmetry discontinuities leading to newly-converted modes apart from wave reflection and transmission. • When testing the symmetry defects in the two-dimension model, the reflection and transmission waves have no modal separation phenomenon. • In the three-dimension FE model, the straight-crest Lamb waves and circular-crest Lamb waves are simulated and researched by contrast analysis. • When testing the through hole defects in the two-dimension model, S0 mode and SH0 mode are contained in the scattering waves after S0 mode testing the through holes defects. Keywords: lamb waves, finite element, defect detecting, energy distribution, reflection and transmission. 1. Introduction Lamb waves have been widely explored as a promising inspection tool for non-destructive testing (NDT) and structural health monitoring (SHM) during the past years [1, 2]. The development of computational finite element models for Lamb wave propagation and interaction is of great importance and offers an efficient nondestructive means in NDT and SHM. The advantages of Lamb waves include easily motivated, long-distance propagation, fastly and efficiently detection, and easily testing the shelter defects unreachable on the structures [3, 4]. It is widely used in detecting the defects in the plates. However, when it comes to highly corroded plates which have been used for many years, in which there are often numerous holes or cracks because of corrosion, the testing distance will be vitally influenced and shorten. Therefore, to learn the efficiency of Lamb wave testing on plates, it is of great necessity to carry on investigations of the interaction of Lamb waves with different combined defects. Lamb waves are elastic waves belonging to special ultrasonic waves and propagate through the thin-plates or shell structures with free boundaries [5]. The received signal can engender complex reflection and transmission phenomenon and provide a lot of information after interacting with the defects in the plates [6]. The dispersion characteristic and multi-modal properties are two special propagation characteristics in plates. Therefore, further analysis of originally-generated and newly-converted Lamb modes is definitely required for better understanding of the mechanism of mode conversion and reflection and transmission after testing the micro defect, which is still limited on the defects testing application in the plates [7, 8]. The research of Lamb wave testing technology on defect assessment in plates is based on the principle that the incident Lamb mode would share its energy into several diffracted wave packets which depend on the location, geometry and dimension of the defects in the reflection and transmission mode. Lamb waves were discovered by Horace Lamb [9] in 1917. Then Lamb wave was proposed to be used for defect detection. Many review articles have discussed the use of the Lamb waves in detecting the thinly metallic plates [10, 11]. Now, great progresses have been made in Lamb wave nondestructive testing technology in theoretical research, simulation research and experiment research. The theory studies of Lamb waves dispersion characteristics had been mature. Many studies about signal processing, such as Fourier transform and fast Fourier transform and short-time Fourier transform were conducted [12, 13]. Recent years, many optimization algorithms are adopted for digital signal processing in the NDT research to improve the defect detection accuracy. Deng studied some novel fault diagnosis methods based on integrating empirical wavelet transform and fuzzy entropy for motor bearing [14], EEMD and multi-scale fuzzy entropy for motor bearing [15], optimal LS-SVM with improved PSO algorithm [16, 17], CACO algorithm [18] and other heuristic optimization algorithms [19, 20]. These new improved algorithms [14, 21] showed a superior performance, and have been proved to be a potential useful tool in NDT research [22]. The improved algorithms [23] can obviously improve the convergence speed, and enhance the local search ability and global search capability for the signal processing and defect identification. Other researches have been studying about interaction of Lamb waves with damaged structures or discontinuities in such aspects as mode conversion, reflection and transmission characteristics [24, 25]. Different numerical methods were used, such as boundary element method [26], finite element method [27], finite difference method [28], and semi-analytical finite element method [29], these methods can provide multidimensional data for the signal processing and optimization algorithm design. Benz [30] studied the dispersion characteristics and multi-mode properties in groove plates using time-frequency analysis technology. Lu [31] studied the modal conversion rules of Lamb wave after testing the surface defects through the numerical and experimental methods. The propagation laws of Lamb waves influenced by the size of defect in composite materials were analyzed by Castaingse [31]. Feng [32] studied the scattering characteristics of Lamb wave in the plates with step-like discontinuities. Many other researches had shown the interactions with different types of defects including the hole defects, the surface defects, the vertical cracks, the inclined cracks, corrosion defects, groove defects and other irregular defects [33]. These authors combined a finite element method and a modal decomposition to investigate the interaction of Lamb waves with defects, but only considered a single characteristic or a single boundary condition. The Lamb waves diffraction on these defects is typically quite strong, leading to a considerable fraction of incident energy being reflected and transmitted, and to significant mode conversion in transmission. The defects and notches can be detected and identified by analyzing the Lamb waves modal content in reflected or transmitted displacement signals detected along the plate of interest. Due to the complex mode conversion and energy redistribution after testing the micro defects, Lamb wave’s scattering, reflection and transmission characteristics at the defects (or its interactions with the micro defects) is difficult to study in a pure analytical way. Numerical methods such as finite element method (FEM) about defect recognition depends on the systematically analysis of the dispersion characteristics, structural characteristics, attenuation characteristics, reflection and transmission characteristics after Lamb waves testing the defects in the plates, and the research about studying the sensitivity of each Lamb mode to the encountered defects is very important. The present study in this paper is concerned with the current research situation and aims at investigating transient responses to the Lamb waves incidence and mode conversion coefficients in the case of weak interaction at micro defects, and at gaining insight in the factors determining the sensitivity of different types of Lamb modes to the geometrical characteristics of the micro defects and its surroundings. In particular, partial reflection and transmission of Lamb waves and the resonance behavior of the micro defects for the S0 mode and A0 mode incidence are analyzed by the finite element method and the results can easily be extrapolated to defects with higher contrast. In Section 2, The dispersion characteristics and wave structure characteristics are analyzed and the curves are drawn to provide theoretical support for numerical analysis. In Section 3, the 2D numerical results are showed to research the propagation, reflection and transmission characteristics after S0 mode and A0 mode Lamb waves testing the symmetrical and asymmetrical defects. In Section 4, the straight-crest Lamb waves are generated in 3D finite element model by comparison analysis. Corresponding mode energy percentages and scattering characteristics were analyzed emphatically by the straight-crest Lamb waves at different micro defect severities changed in different ways. 2. Lamb waves theory There are two different kinds of Lamb waves in the plates including the straight-crest Lamb waves generated by point source and circular-crest Lamb waves generated by line source. According to the particle vibration characteristics in the plates, Lamb waves can be divided into symmetrical mode (S) and asymmetrical mode (A). Different modes can be generated under different phase velocity described with S0, S1, S2, S3, S4, ..., as well as A0, A1, A2, A3, A4, .... The vibration displacement of the material particles in the plate can be satisfied with Navier balance equation in the propagation of Lamb waves: (1) μ 2 u + λ + u u = ρ 2 u t 2 . Here u is the vector of particle vibration displacement, λ and μ is Lame constant, ρ is the density, t is the time. The motion equation is solved using the potential function method base on the variational principle and the free boundary condition. The dispersion characteristic equations and wave structure equations of Lamb waves are deduced by the wave theory. In the cartesian coordinate system, for symmetrical mode of straight-crest Lamb waves: (2) t a n q h t a n ( p h ) = - 4 k 2 p q q 2 - k 2 2 , (3) μ = i k A 2 c o s p y + q B 1 c o s q y , ν = - p A 2 s i n p y - i k B 1 s i n q y . For anti-symmetrical modes of straight-crest Lamb waves: (4) t a n q h t a n ( p h ) = - q 2 - k 2 2 4 k 2 p q , (5) μ = i k A 1 s i n p y - q B 2 s i n q y , ν = p A 1 s i n p y - i k B 2 c o s q y . In the cylindrical coordinate system, for symmetrical modes of circular-crest Lamb waves: (6) t a n q h t a n ( p h ) = - 4 k 2 p q q 2 - k 2 2 , (7) u r = A ' - 2 k 2 q c o s q h c o s p z + q k 2 - q 2 c o s p h c o s p z J 0 k r e i w t , u z = A ' - 2 k p q c o s q h s i n p z - k k 2 - q 2 c o s p h s i n p z J 0 k r e i w t . For anti-symmetrical modes of circular-crest Lamb waves: (8) t a n q h t a n ( p h ) = - q 2 - k 2 2 4 k 2 p q , (9) u r = A ' - 2 k 2 q s i n q h s i n p z + q k 2 - q 2 s i n p h s i n p z J 0 k r e i w t , u z = A ' 2 k p q s i n q h c o s p z + k k 2 - q 2 s i n p h c o s p z J 0 k r e i w t . Here the p=ω2/cL2-k2, q=ω2/cT2-k2, k=ω/cp, cg=cp-λdcp/dλ, λ=2π/k=2πk-1, cp is the phase velocity, cg is the group velocity, k is the wave number, ω is angular frequency, cL and cT is the velocity of longitudinal wave and shear wave, h is the thickness of the plate, E is the Elastic Modulus, υ is the Poisson-Ratio, A and A1 and A2 and B1 and B2 is the constant which can be solved by the free boundary condition. J0kr is the first kind zero-order Bessel function, y is the vertical coordinate in the cartesian coordinate system, z is the vertical coordinate in the cylindrical coordinate system, r is diameter coordinate in the cylindrical coordinate system. The Lamb waves equations show that these two kinds of Lamb waves have the same dispersion characteristic and same wave structure characteristic in thickness direction of plates. The distribution of circular-crest Lamb wave structure in the radius direction follow the distribution of Bessel function, and decrease with the diffusion area increases. Without considering the influence of material characteristics, the straight-crest Lamb waves have no energy attenuation in the propagation direction. In the actual research, Lamb waves produced by the transducer are usually circular-crest Lamb waves. The circular-crest Lamb waves can be treated as straight-crest Lamb waves before a micro defect when spread over a long distance and meet the micro defects. In the experimental or numerical research, we often need to use straight-crest Lamb waves to research the propagation characteristics and interaction with micro defects. The dispersion characteristic equations and wave structure equations of straight-crest Lamb waves were solved using MatLab software through dichotomy. The velocities of longitudinal waves and transversal waves are 5800 m/s and 3100 m/s in the plate. Fig. 1 show the dispersion characteristic curves of Lamb waves in the plates. Fig. 1. The dispersion characteristic curves of Lamb waves The dispersion characteristic curves of Lamb waves a) Phase velocities The dispersion characteristic curves of Lamb waves b) Group velocities Fig. 1 shows that two or more modes of Lamb waves with different group velocities in the plate can be generated in the same frequency-thickness condition. In the region of low frequency-thickness, there are only two kinds of Lamb wave modes named the zeroth order symmetric mode (S0) and anti-symmetric mode (A0). Only the S0 and A0 mode have the cut-off frequency. The phase velocity and group velocity varies along with frequency-thickness variation. This paper focus on analyzing the interaction of the S0 and A0 mode with defects in the plates. And the 4 mm thickness finite element models of the plates are established. The reflection and transmission characteristics in 2D models and scattering properties in 3D models are studied. 3. Simulation results of Lamb waves in 2D FE model 3.1. Establish the 2D FE model The calculated amount and calculated time can be reduced effectively in the 2D FE model. The interference of horizontal shear waves (SH waves) in the vertical direction can be also avoided. A 2000 mm long and 4 mm thickness plate is established in the ANSYS software using parametric programming commands. PLANE42 unit is selected for FM analysis. Table 1 shows the material characteristic parameters of the FE plate. Table 1. The material characteristic parameters of finite element simulation model Parameters Elastic modulus (E) Poisson-ratio (ν) Density (ρ) Value 204 MPa 0.284 7860 kg/m3 Here the sinusoidal signal with five cycles is modulated by Hanning window as excitation signal to generate mechanical vibration in the plate. The high frequency interference and energy leakage can be eliminated effectively. Excitation signal expression shows in Eq. (10): (10) U t = 1 2 A 1 - c o s 2 π f c t n s i n 2 π f c t . Here A is the amplitude coefficient, n is cycling number, fc is central frequency. Ut means the in-plane displacement and out-of plane displacement at different instants of time t. The center frequency of excitation signal is set to 200 kHz. Fig. 2 shows the waveform of the excitation signal. Fig. 2. The excitation signal modulated by Hanning window The excitation signal modulated by Hanning window The dual incentive method loading displacement signal is used to generate a single mode Lamb wave in the left of the FE model. A 10 mm long nodes in the bottom and surface of plate are selected to generate S0 mode Lamb wave loading synthetic in-plane displacement, and generate A0 mode Lamb wave loading synthetic out-of-plane displacement. The minimal size of the finite element model grid should be less than 1/7 of wavelength, and the minimum meshing size is set to 0.2 mm. The near field of the defects are meshed with refined grids. The finite element computation time step should be less than 0.8 x/c, x is the minimum meshing size, c is the biggest modal velocity. The time step is set to 0.2 μs in the FE model. Fig. 3 shows the two kinds of two-dimensional plate model. The complete FE mesh of the symmetric notch is given on Fig. 3(a). The complete FE mesh of the asymmetric notch is given on Fig. 3(b). Fig. 3. The two-dimensional FE plate model with micro defects The two-dimensional FE plate model with micro defects a) Symmetry defect The two-dimensional FE plate model with micro defects b) Asymmetry defect 3.2. The displacement nephogram of fundamental Lamb waves in 2D damaged model Fig. 4 and Fig. 5 show the displacement vector nephogram after Lamb waves testing the different kinds of defects in the 2D plates. Fig. 4 and Fig. 5 show that it occurs to be obvious reflection and transmission phenomenon after Lamb waves testing the symmetry defect and asymmetry defect. When the symmetry defects are tested, there is no modal conversion phenomenon in Fig. 4. Fig. 5 shows that the reflection and transmission waves occur obvious modal conversion after S0 mode and A0 mode Lamb waves testing the asymmetry detect. In the reflection waves and transmission waves, the out-of-plate displacement is generated after S0 mode interacting with the asymmetry detects, and the in-plate displacement is generated after A0 mode interacting with the asymmetry detects. Fig. 4. The propagation of Lamb waves in the plate with symmetric defect The propagation of Lamb waves in the plate with symmetric defect a) S0 mode in 300 µs The propagation of Lamb waves in the plate with symmetric defect b) A0 mode in 400 µs Fig. 5. The propagation of Lamb waves in the 2D plate with asymmetric defect The propagation of Lamb waves in the 2D plate with asymmetric defect a) S0 mode in 300 µs The propagation of Lamb waves in the 2D plate with asymmetric defect b) A0 mode in 400 µs 3.3. The wave propagation of fundamental Lamb waves in a damaged plate In the FE model, the signal receiving nodes in the up and down surface are set to analyze the in-plate displacement signal and out-of-plate displacement signal. The waveform of symmetrical mode can be achieved by adding in-plane displacement or subtracting the out-of-plane displacement. The waveform of asymmetrical mode can be achieved by subtracting the in-plane displacement or adding the out-of-plane displacement. The received nodes are chosen in 0.1 m and 1.9 m to avoid the mode mixing and get the corresponding reflection waveforms. Fig. 6 and Fig. 7 show the waveform propagation of fundamental Lamb waves in the 2D damaged plates. In the received signal, different lamb mode can be identified by calculating the group velocity. The A0 mode have obvious dispersion phenomenon and waveform expansion. In the Fig. 6, the reflection and transmission waves have no mode separation phenomenon after testing the symmetric defect. In the Fig. 7, the reflection and transmission waves have obvious mode conversion phenomenon and newly-converted modes apart from wave reflection and transmission are generated after testing the asymmetric defect. The A0 mode is generated behind S0 mode when S0 mode testing the defect. The S0 mode is generated before A0 mode after A0 mode testing the defect. In the propagation of Lamb waves, the reflection and transmission phenomenon occur again after reflection and transmission waves encountering the defect again. Fig. 6. Normalized displacements of received signal in the 2D plate with symmetric defect Normalized displacements of received signal in the 2D plate with symmetric defect a) S0 mode Normalized displacements of received signal in the 2D plate with symmetric defect b) A0 mode Fig. 7. Normalized displacements of received signal in the 2D plate with asymmetric defect Normalized displacements of received signal in the 2D plate with asymmetric defect a) S0 mode Normalized displacements of received signal in the 2D plate with asymmetric defect b) A0 mode 3.4. The reflection and transmission characteristics The objective of this part is to study the reflection and transmission characteristics of Lamb waves in the 2D FM plate with a series of symmetry defects and asymmetric defects changed in the depth direction. The width of defect is set to 4 mm in the plate. The depth of symmetry defect is changed in 10 %, 20 %, 30 %, 40 % of the plate thickness. The total depth of the symmetry defect is changed in 20 %, 40 %, 60 %, 80 % of the plate thickness. The reflection and transmission coefficients are computed from the displacement of the Lamb wave packet. A comparison between the reflection and the transmission coefficients of Lamb wave when A0 mode and S0 mode are generated in the 2D plate, is represented on the Fig. 8, and the normalized amplitude is extracted to explain this sensitivity. Fig. 8 shows that the reflection coefficient increases, and the transmission coefficient decreases with the increase of the symmetry defect depth in different Lamb mode. Compare Fig. 8(a) with Fig. 8(b), the reflection and transmission coefficient changing rate of S0 mode is faster than A0 mode. It can be noticed that the reflection mode coefficient is concentrated near to the large depth defect of the plate contrarily to the transmission mode coefficient. With the reference of the variation laws of reflection waves and transmission waves in the plate, the depth of symmetric defect can be evaluated. The depth of asymmetry defect is changed in 10 %, 20 %, 30 %, 40 %, 50 %, 60 %, 70 %, 80 %, 90 % of the plate thickness. The width of the defect is still set to 4mm. The reflection and transmission coefficients of different modes are analyzed after Lamb waves testing the asymmetry defect. The normalized amplitude is extracted to explain this sensitivity on the Fig. 9. Fig. 8. Reflection and transmission coefficients varies with depth of symmetric defect Reflection and transmission coefficients varies with depth of symmetric defect a) Reflection coefficient Reflection and transmission coefficients varies with depth of symmetric defect b) Transmission coefficient Fig. 9. Reflection and transmission coefficients varies with depth of asymmetric defect Reflection and transmission coefficients varies with depth of asymmetric defect a) Reflection coefficient Reflection and transmission coefficients varies with depth of asymmetric defect b) Transmission coefficient When S0 mode Lamb wave testing the asymmetric defects, the reflection coefficients of S0 mode increases and the transmission coefficients of S0 mode decreases with the depth increasing of the asymmetric defect. The reflection and transmission coefficients of A0 mode increase firstly and then decrease when the depth is greater than the 50 % of the plates thickness. When A0 mode testing the asymmetric defect, the reflection and transmission phenomenon is similar to the S0 mode. The found disturbance of the normal surface component of the acoustic field due to the inclusion is considerably larger for the incident S0 mode than for the A0 mode by contrastive analysis. When S0 mode testing the defects, the reflection and transmission waves is mainly existing in the form of S0 mode. When A0 mode testing the defects, the reflection and transmission waves are mainly existing in A0 mode. With the reference of the variation laws of reflection waves and transmission waves in the plate, the depth of the asymmetric defect can be evaluated. 4. Simulation results of Lamb waves in 3D-plates FE model In 2D plate model, the propagation characteristics of Lamb waves can be easily analyzed with less amount of calculation, but the scattering characteristics in the third dimension cannot be studied. So, 3D finite element models should be established to research the Lamb waves on propagation and interaction with the typical defects varied in third dimensional direction. In the section 2, the theory about dispersion characteristic equations and wave structure equations of the straight-crest Lamb waves and the circular-crest Lamb waves have been analyzed. The two kinds of Lamb waves have a different energy attenuation in the propagation direction. In the next step research, 3D FE model with 600 mm long, 600 mm wide and 4 mm thickness is set in ANSYS software. SOLID45 eight node structure element to mesh the 3D plate, and COMBIN14 spring-damper element to construct the non-reflective boundaries and minimize the calculation burden. The model nodes in the up and down surfaces with 20 mm long and 600 mm wide are selected in the left side of the plate to motivate a single mode straight-crest Lamb wave to research the propagation of Lamb waves in 3D model. The waveform of incentive signal is still unchanged. 4.1. The displacement nephogram and waveform of Lamb waves in 3D damaged model A circular hole defect and rectangular hole defect are set in the center of the plate. The ring sensor nodes are set 150 mm from the center of the defect and spaced 15°. The straight-crest Lamb waves are generated from the left side of the 3D plate. Fig. 10 shows the displacement vector nephograms after the fundamental Lamb waves testing with the through hole defects. The radius of the defect is set to 4 mm. Fig. 11 shows the received waves in different direction 150 mm from defect center. Fig. 10. The propagation of straight-crest Lamb waves in the 3D plate with through hole defects The propagation of straight-crest Lamb waves in the 3D plate with through hole defects a) S0 mode in 75 µs The propagation of straight-crest Lamb waves in the 3D plate with through hole defects b) S0 mode in 100 µs The propagation of straight-crest Lamb waves in the 3D plate with through hole defects c) A0 mode in 100 µs The propagation of straight-crest Lamb waves in the 3D plate with through hole defects d) A0 mode in 125 µs Fig. 11. The scattering waveform of straight-crest Lamb waves in detective plate The scattering waveform of straight-crest Lamb waves in detective plate a) S0 mode The scattering waveform of straight-crest Lamb waves in detective plate b) A0 mode Fig. 10 shows an example simulation of the propagation of straight-crest Lamb waves in a 4 mm 3D plate with through hole defects. The straight-crest Lamb waves occur to have obvious scattering phenomenon after testing with the circular defect. S0 mode by out-of-plane displacement and A0 mode by in-plane displacement are mixed together in the 3D plate. When loading out-of-plane displacement to generate S0 mode, the scattering waves with out-of-plane displacement are mainly existing. When loading in-plane displacement to generate A0 mode, the scattering waves with in-plane displacement are mainly existing. In the Fig. 10(a), the out-of-displacement nephogram of scattering waves presents elliptical distribution after S0 mode testing the 3D defect. Newly-converted modes apart from the scattering wave are generated after testing the through holes defect. The group velocity of the scattering waves in different direction is different. According to the group velocity calculation and modal identification in the simulation results, we have found that the scattering Lamb waves have different modes containing S0 mode and SH0 mode. S0 mode transmission and reflection waves are generated in the 0° direction and 180° direction. SH0 mode scattering waves are generated in the 90° and 270° direction. In other directions, the scattering waves are superposition waves containing S0 mode and SH0 mode. SH0 shear-horizontal waves propagate slower through the damaged area than S0 Lamb waves, which is due to the difference in the group velocities. In the Fig. 10(b), the in-displacement nephogram of scattering waves presents circular distribution after A0 mode with in-plane displacement testing with through hole defect. We could then come to conclusion that the scattering wave only contains A0 mode judged by modal identification and have no modal separation phenomenon in the propagation process. Fig. 11 shows that the S0 mode and A0 mode Lamb waves present obvious scattering phenomenon after testing the through hole defect. The scattering waves occur to reflect from boundary of the plates. The Fig. 11(a) illustrates the waveform of the out-of-plane displacement after S0 mode testing the hole defect. The Fig. 11(b) illustrates the waveform of the in-plane displacement after A0 mode Lamb wave testing the hole defect. In the propagation of straight-crest Lamb waves, the A0 mode have obvious dispersion phenomenon and waveform expansion. The circular hole defects and rectangular hole defects are respectively set in the center of 3D plate. we can further realize to evaluate the size transformation laws of the 3D defects by comparing with the scattering waves characteristics of Lamb wave in the FE simulation. 4.2. The scattering laws of the circular hole defects changed in radial direction Set the radius of the circular hole defect to be 4 mm, 6 mm, 8 mm and 10 mm. The straight-crest Lamb waves are produced and the scattering laws are analyzed. The normalized amplitude of the modal decomposition scattering Lamb wave packets are extracted to study the energy distribution of the scattering waves in the 3D plate. Fig. 12. The scattering laws of S0 mode testing the radial variation circular hole defect The scattering laws of S0 mode testing the radial variation circular hole defect a) R4 mm The scattering laws of S0 mode testing the radial variation circular hole defect b) R6 mm The scattering laws of S0 mode testing the radial variation circular hole defect c) R8 mm The scattering laws of S0 mode testing the radial variation circular hole defect d) R10 mm Fig. 13. The scattering laws of A0 mode testing the radial variation circular hole defect The scattering laws of A0 mode testing the radial variation circular hole defect a) R4 mm The scattering laws of A0 mode testing the radial variation circular hole defect b) R6 mm The scattering laws of A0 mode testing the radial variation circular hole defect c) R8 mm The scattering laws of A0 mode testing the radial variation circular hole defect d) R10 mm It should be noted that all scattering waves in this paper are normalised by the maximum absolute amplitude of the incident Lamb wave at the centre of the defect zone in the plate. Fig. 12 and Fig. 13 show that the scattering waves of S0 mode and A0 mode Lamb waves and SH0 mode shear horizontal waves are symmetrical about the X axial and varies with similar slope. The forward (θ= 0°) and backward (θ= 180°) scattered S0 and A0 mode Lamb waves tend to have a larger amplitude for increasing in the direction. The energy of the scattering waves increases with the increase of circular defect radius. When the S0 mode testing the micro defect in the centre. The energy of S0 mode scattering waves in 0° and 180° direction is bigger than other directions. The energy of SH0 mode scattering waves in 90° and 270° direction is bigger than other direction. Contrast the energy distribution of the scattering waves after S0 mode and A0 mode Lamb wave testing the through hole defect, the S0 mode Lamb waves are more sensitive to the circular hole defect varied in the radius direction. 4.3. The scattering laws of rectangular hole defects changed in the width direction The length of the rectangular hole defect in the middle of the plate is set to 6 mm, and the width is changed to be 12 mm, 18 mm, 24 mm and 30 mm. Fig. 14 and Fig. 15 show the scattering laws after the straight-crest Lamb waves testing the micro rectangular defect with longitudinal variation. Fig. 14. The scattering law of S0 mode testing the longitudinal variation rectangular defect The scattering law of S0 mode testing the longitudinal variation rectangular defect a) 6 mm×12 mm The scattering law of S0 mode testing the longitudinal variation rectangular defect b) 6 mm×18 mm The scattering law of S0 mode testing the longitudinal variation rectangular defect c) 6 mm×24 mm The scattering law of S0 mode testing the longitudinal variation rectangular defect d) 6 mm×30 mm Fig. 15. The scattering law of A0 mode testing the longitudinal variation rectangular defect The scattering law of A0 mode testing the longitudinal variation rectangular defect a) 6 mm×12 mm The scattering law of A0 mode testing the longitudinal variation rectangular defect b) 6 mm×18 mm The scattering law of A0 mode testing the longitudinal variation rectangular defect c) 6 mm×24 mm The scattering law of A0 mode testing the longitudinal variation rectangular defect d) 6 mm×30 mm According to the simulations in 3D FE plate, the scattering waves of S0 mode, A0 mode Lamb waves and SH0 mode shear horizontal waves are symmetrical about the X axial after Lamb waves testing the rectangular defects. Similar scattering with the through hole defect, mode conversion and directivity propagation phenomena can be noticed in the coefficient patterns. The entire energy conversion results are given in the Fig. 14 and Fig. 15. The scattering energy of S0 mode Lamb waves in the 0° and 180° direction is larger than other directions. The scattering energy increases significantly with the defect length increase. The energy of SH0 mode scattering wave increases with the defects size increase. The SH0 mode energy in rectangular corner direction is greater than that in other direction but less than S0 mode. When the width of the rectangle hole defect is 30 mm or longer than 30 mm, nearly all scattering waves are in the 0° and 180° direction. Fig. 15 shows that the A0 mode energy in the 0° and 180° direction is bigger than other directions. The scattering energy increases with the increase of the size in the width direction. The increase rate in close to 0° and 180° direction is greater than the other direction. Due to the influence of the four corners of the rectangle defect, the scattering energy on the four directions highlighted. Contrast the energy distribution of the scattering waves after S0 mode and A0 mode Lamb wave testing the rectangular defect, simulation results indicate that the amplitude of scattered S0 and A0 Lamb waves is sensitive to orientation up to 0° and 180° respectively for excitation at rectangular defect. 4.4. The scattering laws of the rectangular hole defects changed in length direction The width of rectangular hole defects is set to 6 mm. The length is changed to be 12 mm and 18 mm and 24 mm and 30 mm. Fig. 16 and Fig. 17 show the scattering laws after the straight-crest Lamb waves interacting with the defects with transverse variation. Fig. 16. The scattering laws of S0 mode testing the transverse variation rectangular hole defects The scattering laws of S0 mode testing the transverse variation rectangular hole defects a) 12 mm×6 mm The scattering laws of S0 mode testing the transverse variation rectangular hole defects b) 18 mm×6 mm The scattering laws of S0 mode testing the transverse variation rectangular hole defects c) 24 mm×6 mm The scattering laws of S0 mode testing the transverse variation rectangular hole defects d) 30 mm×6 mm Fig. 16 and Fig. 17 show that after Lamb waves testing the rectangular hole defect, the scattering energy of S0 A0 mode Lamb waves and SH0 mode shear horizontal waves do not increases significantly with the increase of rectangular hole defect in the width direction. The energy of SH0 mode scattering waves is bigger in the directions of four corners in the defect obviously. The energy of A0 mode scattering waves has no obvious law with the transverse variation. It can be deduced from the above study, that the existence of S0 mode along with A0 mode is a definite indication of scatter waves in the path of its propagation and has an orientation behaviour after testing the rectangular hole defect. Comparative analysis about the scattering phenomenon after the Lamb waves testing the rectangle defect changed in the width and length direction shows that the Lamb waves are more sensitive to rectangular hole defects varied in the width direction. It is not sensitive to the rectangular hole defects changed in the length direction. Fig. 17. The scattering laws of A0 mode testing the transverse variation rectangular hole defects The scattering laws of A0 mode testing the transverse variation rectangular hole defects a) 12 mm×6 mm The scattering laws of A0 mode testing the transverse variation rectangular hole defects b) 18 mm×6 mm The scattering laws of A0 mode testing the transverse variation rectangular hole defects c) 24 mm×6 mm The scattering laws of A0 mode testing the transverse variation rectangular hole defects d) 30 mm×6 mm 5. Conclusions In this paper, comparative analysis firstly in theory about the straight-crest Lamb waves and the circular-crest Lamb waves indicates that two kinds of Lamb waves in plates has the same dispersion characteristic and wave structure characteristic, but different in the energy attenuation. The circular-crest Lamb waves can be treated as straight-crest Lamb waves before a micro defect when spread over a long distance and meet the micro defects. In the next step, a numerical study of the fundamental Lamb waves interaction with the symmetrical, asymmetrical notches, circular hole defects and rectangular hole defects was conducted. It was found in the 2D FE plate that the reflection and transmission waves generated obvious mode conversion phenomenon after testing with the asymmetry notches. But after testing with the symmetry notches, the reflection and transmission waves have no mode conversion phenomenon. The notch analysis presented in Section 3.4 shows the effect of notch depth on the transmitted and reflected modes along with the mode conversion of Lamb wave. The energy of reflection waves increases with increases of the depth and the energy of transmission waves decrease with the increases of the depth. The energy of mode converted Lamb mode in the reflection and transmission waves first increases with the increase in asymmetrical notch width, then decreases when the depth is greater than 50 % of the plate thickness. In the 3D numerical simulations, the scattering waves occur to generate S0 mode Lamb waves and SH0 mode shear horizontal waves after S0 mode testing the through hole defects. The scattering waves have no mode conversion when A0 mode Lamb waves testing with the through hole defects. The energy of scattering waves increases with the increase of the defect size. The energy of S0 mode scattering waves in 0° and 180° direction is larger than other directions. The energy of A0 mode scattering waves in the 0°, 90°, 180°, 270° direction is significantly greater than the other direction after interacting with circular hole detects. Energy bound state of the scattering waves does exist in the direction of the corner when testing the rectangular hole defects. Comparative analysis about the scattering phenomenon after Lamb waves testing the rectangle defects varied in the width and length direction shows that the Lamb waves are more sensitive to rectangular hole defects changed in the width direction in testing the plates. The numerical results have also shown that the study of the reflection and transmission phenomenon of the Lamb waves across a micro defect of plates is very difficult and requires a careful analysis in the single process. In the future research, we can do more work about the experimental measurements and design digital signal processing method as the artificial intelligence algorithm to identify and locate defects accurately. References 1. Santhanam S., Demirli R. Reflection and transmission of fundamental Lamb wave modes obliquely incident on a crack in a plate. Ultrasonics Symposium (IUS), 2012, p. 2690-2693. [Search CrossRef] 2. Mori N., Biwa S. Interaction of Lamb waves with an imperfect joint of plates: reflection, transmission and resonance. Physics Procedia, Vol. 70, 2015, p. 480-483. [Publisher] 3. Purekar A., Pines D. Damage detection in thin composite laminates using piezoelectric phased sensor arrays and guided lamb wave interrogation. Journal of Intelligent Material Systems and Structures, Vol. 21, Issue 10, 2010, p. 995-1010. [Publisher] 4. Michaels T. E., Michaels J. E., Ruzzene M. Frequency-wavenumber domain analysis of guided wavefields. Ultrasonics, Vol. 51, Issue 4, 2011, p. 452-466. [Publisher] 5. Rose J. Ultrasonic Waves in Solid Media. Cambridge University Press, New York, 1999. [Search CrossRef] 6. Su Z., Ye L. Identification of Damage Using Lamb Waves: from Fundamentals to Applications. Springer, Science & Business Media, 2009. [Search CrossRef] 7. Imano K., Endo T. Experimental study on the mode conversion of lamb wave using a metal plate having a notch type defect. International Journal of the Society of Materials Engineering for Resources, Vol. 19, Issue 12, 2013, p. 20-23. [Publisher] 8. Xu K., Ta D., Su Z., et al. Transmission analysis of ultrasonic Lamb mode conversion in a plate with partial-thickness notch. Ultrasonics, Vol. 54, Issue 1, 2014, p. 395-401. [Publisher] 9. Lamb H. On waves in an elastic plate. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 1917, p. 114-128. [Publisher] 10. Viktorov I. A. Rayleigh and Lamb Waves: Physical Theory and Applications. Plenum Press, 1970. [Search CrossRef] 11. Worlton D. Ultrasonic testing with Lamb waves. General Electric C, Hanford Atomic Products Operation, Richland, Wash., 1956. [Search CrossRef] 12. Alleyne D. N., Cawley P. A 2-dimensional Fourier transform method for the quantitative measurement of Lamb modes. Ultrasonics Symposium, 1990, p. 1143-1146. [Publisher] 13. Wilcox P. D. A rapid signal processing technique to remove the effect of dispersion from guided wave signals. IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, Vol. 50, Issue 4, 2003, p. 419-427. [Publisher] 14. Deng W., Zhang S., Zhao H., et al. A novel fault diagnosis method based on integrating empirical wavelet transform and fuzzy entropy for motor bearing. IEEE Access, Vol. 6, Issue 1, 2018, p. 35042-35056. [Search CrossRef] 15. Zhao H., Sun M., Deng W., et al. A new feature extraction method based on EEMD and multi-scale fuzzy entropy for motor bearing. Entropy, Vol. 19, Issue 1, 2016, p. 14. [Publisher] 16. Deng W., Yao R., Zhao H., et al. A novel intelligent diagnosis method using optimal LS-SVM with improved PSO algorithm. Soft Computing, 2017, https://doi.org/10.1007/s00500-017-2940-9. [Publisher] 17. Deng W., Zhao H., Yang X., et al. Study on an improved adaptive PSO algorithm for solving multi-objective gate assignment. Applied Soft Computing, Vol. 59, 2017, p. 288-302. [Publisher] 18. Deng W., Zhao H., Liu J., et al. An improved CACO algorithm based on adaptive method and multi-variant strategies. Soft Computing, Vol. 19, Issue 3, 2015, p. 701-713. [Publisher] 19. Deng W., Chen R., Gao J., et al. A novel parallel hybrid intelligence optimization algorithm for a function approximation problem. Computers and Mathematics with Applications, Vol. 63, Issue 1, 2012, p. 325-336. [Publisher] 20. Elsayed S. M., Sarker R. A., Essam D. L. An improved self-adaptive differential evolution algorithm for optimization problems. IEEE Transactions on Industrial Informatics, Vol. 9, Issue 1, 2013, p. 89-99. [Publisher] 21. Zhao H., Li D., Deng W., et al. Research on vibration suppression method of alternating current motor based on fractional order control strategy. Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical Engineering, Vol. 231, Issue 4, 2017, p. 786-799. [Publisher] 22. Deng W., Chen R., He B., et al. A novel two-stage hybrid swarm intelligence optimization algorithm and application. Soft Computing, Vol. 16, Issue 10, 2012, p. 1707-1722. [Publisher] 23. Deng W., Zhao H., Zou L., et al. A novel collaborative optimization algorithm in solving complex optimization problems. Soft Computing, Vol. 21, Issue 15, 2017, p. 4387-4398. [Publisher] 24. Ramadas C., Hood A., Khan I., et al. Transmission and reflection of the fundamental Lamb modes in a metallic plate with a semi-infinite horizontal crack. Ultrasonics, Vol. 53, Issue 3, 2013, p. 773-781. [Publisher] 25. Mori N., Biwa S., Hayashi T. Reflection and transmission of Lamb waves at an imperfect joint of plates. Journal of Applied Physics, Vol. 113, Issue 7, 2013, p. 74901. [Publisher] 26. Cho Y., Rose J. L. A boundary element solution for a mode conversion study on the edge reflection of Lamb waves. The Journal of the Acoustical Society of America, Vol. 99, Issue 4, 1996, p. 2097-2109. [Publisher] 27. Moulin E., Assaad J., Delebarre C., et al. Modeling of Lamb waves generated by integrated transducers in composite plates using a coupled finite element-normal modes expansion method. The Journal of the Acoustical Society of America, Vol. 107, Issue 1, 2000, p. 87-94. [Publisher] 28. Balasubramanyam R., Quinney D., Challis R., et al. A finite-difference simulation of ultrasonic Lamb waves in metal sheets with experimental verification. Journal of Physics D: Applied Physics, Vol. 29, 1, p. 1996-147. [Search CrossRef] 29. Ahmad Z., Gabbert U. Simulation of Lamb wave reflections at plate edges using the semi-analytical finite element method. Ultrasonics, Vol. 52, Issue 7, 2012, p. 815-820. [Publisher] 30. Benz R., Niethammer M., Hurlebaus S., et al. Localization of notches with Lamb waves. The Journal of the Acoustical Society of America, Vol. 114, Issue 2, 2003, p. 677-685. [Publisher] 31. Castaings M., Singh D., Viot P. Sizing of impact damages in composite materials using ultrasonic guided waves. NDT & E International, Vol. 46, 2012, p. 22-31. [Publisher] 32. Feng F., Shen J., Lin S. Scattering matrices of Lamb waves at irregular surface and void defects. Ultrasonics, Vol. 52, Issue 6, 2012, p. 760-766. [Publisher] 33. Ng C., Veidt M., Rose L., et al. Analytical and finite element prediction of Lamb wave scattering at delaminations in quasi-isotropic composite laminates. Journal of Sound and Vibration, Vol. 331, Issue 22, 2012, p. 4870-4883. [Publisher] JVE Journals is rebranding to Extrica Inspired by innovations from the previous century and the rapid growth during the last years, we are improving for excellence in your publishing experience Read to know more JVE Journals Extrica
Educating Yourself About Remote Pc Access Software Programs If You Are not near your computer, you need a butt or image file that's on it for an Important Business Meeting, Remote PC Access Can Be A lifesaver. Butt just becaus it's great for Some things, does not mean it Comes Without a downside. Considering remote access software Everything That Can Do for you, and the risks you Might Taking oath by using it, is Essential Before Making a Decision. Programs Allow Remote PC access to your computer's files and software from a computer or electronic device That is swimming at the Same Physical location. One of the remote access features of Windows 7 is the Ability to stream music from your personal computer onto Any Other computer. Other capabilities include remote access to the desktop and files, as well. Bega Selling their Microsoft Operating Systems with remote access software built in. When Windows 2000 and XP Came out. This version of remote software is swimming very highly thought-of, however - it is generally considered buggy and hard to Deal with. Windows 7 facing software specifically for sharing media files with Other computers, Which is more popular. Free and purchasable software is Available for download from the internet, as well. There are Various Reasons why remote access software Can became useful. One is the Ability to compile Important Information Such as files and data on a single computer, and said Allow access from Other People in Various Locations WHO Are All The Same working on the project. This Can Allow the possibility of a Company or Office Where The People Are Not In the Same Physical location. Also Technical services benefit from remote access software. Being Able to let a Technician Find the problem themselves, Rather Than Rather relying on the tedious process of asking you to performa tasks and report the results, Can Save Time and Money. Becaus in-person technical service became so expensive Can, Can butt Technicians Find out much of the Same information via remote access, it made money saved Can Without sacrificing quality, too. Choose a type remote access software That is liable to work well on your machine, it Might Whatever made. Most remote access software Was Created to run on one operating system, Such as Mac, Linux, or Windows, and Even IF it Was Later Adapted to run on the others, Performa Will usually best in Its Native Environment. Make sure you check online and Find out f your choice of software is likely to work on your machine. There are potential security Problems with remote access software. Opening the machine to remote access software with bugs and viruses Can Allow Into your system, so it's Always a good idea to have a backup of your computer made Before installing the software. IF you only use the software Once or A few times, Consider removing it, said wiping and restoring your computer After You are done. There are a lot of good things about PC remote access . With this kind of software, YOU CAN REACH your date No Matter Where you are. Butt the increased risk of Security Problems Always Means That it is not the right choice for everyone. IF you keep sensitive information on your computer, or do not have a real need for remote access, you probably should not install it. IF you do Choose to install it, make sure to keep your antivirus software up to date.  
FAQ Database Discussion Community how to run a static site on bitnami and AWS? amazon-web-services,website,cloud,hosting,bitnami I am quite a noob when it comes to cloud based apps, this is a completely new context for me. I currently got the github education pack, part of it was an account on bitnami. I was wondering if it's possible to host a static html site on bitnami, I... Linking .php file to Blogger (hosting it) php,forms,email,hosting,blogger I am trying to make a contact form in Blogger. The default contact form widget exists and works like a charm, but it only provides 3 fields. Name, email and message. I needed more fields added. Adding more fields to the widget is impossible, since there are specific tags that... PHP file on website - Getting fatal error in mysql_connect() php,mysql,sql,hosting I'm trying to host this php file on my website to connect to a MySQL database. <?php // Create connection $con=mysqli_connect("localhost","username","pass","database"); // Check connection if (mysqli_connect_errno()) { echo "Failed to connect to MySQL: " . mysqli_connect_error(); } // This SQL statement selects ALL from the table 'Locations' $sql = "SELECT... display Subdomain address on URL bar subdomain,hosting,cpanel I create a sub domain and must add link to redirect. now, when someone click the new link - sub.domain.com the url on the top change to the redirection link like: www.domain.com/folder/folder/index.html. if i want that when someone click on the sub.domain.com the link in the top still be the... Host Four ASP.Net Projects in IIS as single direcory(maintain more projects in same url) asp.net,iis,hosting,web-deployment I m having a ASP.Net Webapplication it accessed by from many geography like India,China&America.In that application's login page fields are username,Password & Geography. Based on this login page geography option the application's functionalities will change in all page. In this project,If we add a feature for Indian users but that... external domain to godaddy ultimate shared hosting dns,hosting,ping i have provided the following details to a domain registrar , my shared hosting account ip address, and the main domain's two DNS records which i copied from dns manager. i have added the domain in the hosted domains section and assigned a folder with a blank page in it.... Django ERROR (EXTERNAL IP): Internal Server Error: /favicon.ico python,django,hosting I am hosting my site in Digital Ocean and it keeps me sending this email. [Django] ERROR (EXTERNAL IP): Internal Server Error: /favicon.ico Currently I have not taken any domain and surfing through ip. Is this error because of this ? Also when I try to upload any image it... Any file-hosting site that supports direct downloading? web,hosting I don't know if this should be on here or on a different SE site. I am working on a program, and to check for updates it downloads a file using URLDownloadToFile(). The file contains a number indicating the most recent version, and it is compared to a hard-coded value... How to point Multiple Domains at an Azure Windows VM asp.net-mvc,azure,iis,virtual-machine,hosting I have been looking for the answer to this but unable to find it thus far. I have an Azure Windows VM with 3 Websites on it. I have managed to configure one domain to point at the IP Address of the Server (A Record) but when I try to... Google App Engine - Writing app.yaml for a particular url like applicationName.appspot.com/docs/ec-quickstart/index.html python,css,google-app-engine,hosting I have a google app engine application and I am using python 27. I want my url when deployed to be applicationName.appspot.com/docs/ec-quickstart/index.html How do I write my app.yaml file? The code below loads my index.html file without the css. handlers: - url: /docs/ec-quickstart/index.html static_files: docs/ec-quickstart/index.html upload: docs/ec-quickstart/index.html However, if I... Publishing ASP.NET files to hosting server and back to local machine.Step by step procedures asp.net,hosting,publish,editing I am very new with ASP.NET. I need help understanding the basic procedures of how a developer publishes their site to their hosting server, and then once its compiled and published, how does another developer (someone who does not have the original files), edit some of the code behind files.... Change Apache configuration directory? php,linux,apache,ubuntu,hosting How to change the config directory from : /etc/apache2 to /data/config/apache2 ? (I'll be using it with GlusterFS to have the configs synchronized across the cluster) Many thanks.... Hosting a Web Application heroku,web-applications,web,dns,hosting I have a quick question regarding hosting web applications. I've recently started getting into hacking so I just wanted to understand them a little more. I am aware that to host websites you need to pay for a domain name, as well as a hosting service. So let's say you... Installing ruby lobste.rs app on hosting, what lobsters$ supposed to do? ruby-on-rails,ruby,hosting So, this is my first time installing ruby on the rails app on the hosting, here is the guide: https://github.com/jcs/lobsters So, I did clone it and then changed to directory lobsters Now, what does lobsters$ command supposed to do? is it command at all? when I simply type it in,... Distributing installer of Windows desktop application windows,deployment,amazon-s3,installer,hosting I have an installer for my Windows app and it is quite big (>100 Mb). I am also using ClickOnce deployment framework, so each time I issue an update all my users have to download the installer. We tried to use Amazon S3 to store the setup file, but it... Copy web-builder created website to new hosting file-upload,mapping,hosting I have a website created in a web-building online app (link to the app: http://www.webnode.com). The app doesn't allow me to actually view the folder structure of my web, it's something more like creating a blog using blogspot by google or similar web apps. The problem is that I want... How I can host Media files like mp3 in a diffrent server? [closed] php,media-queries,hosting,media,server How I can host Media files like mp3 in a different server ? I have a website for converting videos to audio. I want to host this audio files in a different server, but I want to keep the codein the first server. Is this possible? For example, if the... Point net4india domain to point to godaddy managed wordpress website [closed] wordpress,dns,hosting,godaddy I have a domain name (x.com) that i purchased from net4india.com. I also have another domain name + managed wordpress (y.com) account with godaddy. I built a site using the latter, which is a wordpress website, now available at y.com I would like to have x.com be that website. So... Why AWS Beanstalk service is using S3 bucket? amazon-ec2,cloud,hosting I've launched an application in AWS -> Beanstalk using pre-installed server template. In the process of Beanstalk installation I see it is creating S3 bucket. I'm pretty sure that I didn't select any option to use S3 bucket. If S3 bucket is needed for the Beanstalk application, can you tell... How to redirect example.mydomain.com to folder.mydomain.com via DNS/.htaccess? .htaccess,dns,subdomain,hosting Is it somehow possible to redirect example.mydomain.com, a subdomain which does not actually exist, to folder.mydomain.com using either .htaccess or DNS? How can this be achieved? When I access DNS from the control panel and click on the Web DNS tab, I see Personal web DNS settings, under which I... PHP Create Folder, Create Subfolder using #ID and Upload a default file? php,hosting,folders,billing Alright so I've had a bit of a go in my mind about this but I didn't really want to start without knowing how I was going to do it... I will be providing basic automatic hosting on my hosting account, where as the user will check the website, pay... Can't get path to upload on host. Jsp java,jsp,tomcat,web,hosting Please help me,i was tried to find answer on google for whole week but no luck for me. Nothing work with me at all, and this is my problem, i will really appriciate your help. i want to upload a picture on my host and i used code like this... Hosting a configuration file online for an Android application android,xml,configuration,hosting My application have to request some RSS feeds and display the result, i want to be able to add some feeds to the RSS list without modifying the app source code. The app users will not have the permission to modify the RSS feeds list so i can't implement it... SSH - Connection reset by peer - Linux Host linux,ssh,hosting,server,shared-hosting I have a hosting account with linux shared hosting account with godaddy, recently my ssh access stopped working, this is the error: Toms-MacBook-Pro:production tom$ ssh [email protected] ssh_exchange_identification: read: Connection reset by peer This happens on my wifi connection however if i create a mobile phone hotspot and connect through my... How to: android app that uploads/downloads to hosting? android,hosting I am playing with the idea of making an app that allows you to upload text and images/videos to a server and also download the content from there (something like a forum kind of thing, but in a smaller scale). I have purchased some hosting online (for a webpage I'm... Godaddy hosting : issues with non Latin chars in file names? [closed] wordpress,hosting,godaddy I have a site hosted at GoDaddy, but when I try to upload a file that doesnt have latin chars such as mysite.com/בדיקה.jpg it returns 404 error (Wordpress error, i have the WordPress htaccess there...) yet when I try to upload mysite.com/filename.jpg it works just fine Any ideas?... Mongodb hosting remote vs on the same network node.js,mongodb,hosting,shared-hosting What is the killer reason to use remote db hostring services for MongoDB (like compose.io) for nodejs application VS hosting MongoDB on the same network (in the same datacenter, etc), for example when using PAAS providers (like modulus.io) which offer "integrated" MongoDB hosting . What percentage of speed/perfomance may degrade... ASP.NET MVC Hosting for file sharing millions of files? [closed] c#,asp.net,model-view-controller,hosting,godaddy I searched through existing questions to not duplicate but couldn't find this specific, I'm working on a project where there are 2 kind of MVC APIs, The first API serves as a file storage, it receives the files as byte array and stores accordingly. The second API takes the decision... Switching back to old cPanel on another hosting package hosting,cpanel,nameservers I have a HostGator hosting package and recently decided to move to a new hosting package with SimpleServers. The move was completed successfully, however I have decided to move back to HostGator, for reasons I won't disclose here. So - here's the situation: I have a cPanel with SimpleServers now... deploy web application on 8080 port web-applications,dns,hosting I created a web application using eclipse tomcat and mysql. I would access my website on 'localhost:8080/HotelPromo' Then I got a no-ip account and got a domain hotelpromo.no-ip.biz, and in no-ip this is pointing to my IP address(which I can ping). I thought I would be able to access my... System's hardware requirements for Symfony2 php,symfony2,hosting,hardware,requirements I have this web-blog I'm willing to deploy online. I have yet no idea what kind of hosting I should get. I'm sure shared-hosting is not one of them as SSH access is not possible. If I'm getting a dedicated server, what hardware requirements should it have? I've tested this... How to setup a new domain using WHM and Register.com dns,hosting,server,whm I'am unable to make my website work after a server changing. Whether I access http://IP/~user/ or www.mydomain.com it just doesn't work. I am going mad. Using the IP I get a Server not Found error (ERR_NAME_NOT_RESOLVED in Chrome); using the domain I get this: What I did: WHM Hostname: localhost.mydomain.com... How do you host a jekyll site to hostgator via FTP [closed] html,css,ftp,hosting,jekyll Hello i have tried to host my site that i build with jekyll via FTP. But when i put in my _site files, it seems like my javascript and css disappears and it looks terrible do any of you guys/girls out there know what i should do? :) Point Domain hosted elsewhere to Godaddy VPS dns,hosting,godaddy,vps I got a .gg domain from https://www.channelisles.net and need to point it to my VPS that I have through GoDaddy. I've searched through GoDaddy's support pages and haven't been able to find anything of use. I don't have much experience in DNS, so any kind of help/direction would be greatly... What is causing this white space at the bottom of my page in Chrome? google-chrome,hosting,whitespace,removing-whitespace,shockwave I've been working on my new website for many days (building it locally on my Macbook Air), and always testing it locally in the Chrome browser on my computer. When I view it locally, it looks perfect. However, when I upload it to my hosting account @ hostmonster.com, for some... Accessing web pages on Azure VM azure,hosting,web-hosting I would like to have my webserver on AzureVM. I will use multiple sites via host header. Bindings: All unassigned and host header = www.site.com My VM is configured and sites running locally (I can show website on erver in IIS.. Browse...) with no problem. Endpoints are configured too. Default... WCF: Difference between hosting in IIS and WIndows service c#,.net,wcf,windows-services,hosting WCF service can be hosted both in IIS and in Windows service. What are differences? Is there any benefit hosting in Windows service than IIS? ASP.NET MVC App not working on Godaddy Shared Hosting (Subfolder) asp.net,hosting,godaddy,http-status-code-500 I'm in need of deploying an MVC web application to a subfolder of GoDaddy. For example, let's say I have an app running in www.xyz.com, and I need another app to run on www.xyz.com/abc. This is what I've done on Godaddy: Created a Sub-directory in IIS Set it up as... Best way to deploy classic asp webapp with sqlite database? sqlite,asp-classic,hosting I have a classic ASP front end which serves to collaboratively enter data into a sqlite database, meant to be used later in an android app. I need to deploy this ASP webapp onto an online server with sqlite odbc installed, because the only other option I know is to... routing 2 sepparet machines on the same IP php,apache,xampp,hosting I have a shop with 2 computers and an online security camera system connected to a router. I want to be able to host a "website" from one of the computers but it looks like the security camera is using the default port for my IP address. The website is...
Acid dyes are generally divided into three classes according to their fastness requirements, migration ability, and dyeing pH. Acid dyes affix to fibers by hydrogen bonding, Van der Waals forces and ionic bonding. While some acid dyes work in water, many choose to activate dyes in acid dye-baths instead. According to the Bronsted–Lowry acid–base theory, an acid is a molecule or ion capable of donating a proton, and this is determined by the acid dissociation constant. Fibres In the laboratory, home, or art studio, the acid used in the dye-bath is often vinegar (acetic acid) or citric acid. The uptake rate of the dye is controlled with the use of sodium chloride. In textiles, acid dyes are effective on protein fibers, i.e. animal hair fibers like wool, alpaca, and mohair. They are also effective on silk. They are effective in dyeing the synthetic fiber nylon, but of minimum interest in dyeing any other synthetic fibers. Histology In staining during microscopic examination for diagnosis or research, acid dyes are used to color basic tissue proteins. In contrast, basic dyes are used to stain cell nuclei and some other acidic components of tissues. Food Industry Acid dyes can also be used as food colouring, helping to increase the attractiveness of certain foods, and thus becoming more appealing to customers. Some examples include erythrosine, tartrazine, sunset yellow and allura red, to name a few, many of which are azo dyes. # Name Shade 1 ACID MIXTURE 2 ACID YELLOW 110 3 ACID RED 119 4 ACID RED 57 5 ACID GREEN 25 6 ACID GREEN 16 7 ACID BLUE 114 8 ACID YELLOW 194 9 ACID ORANGE 67 10 ACID ORANGE 74 11 ACID ORANGE 116 12 ACID BLACK 194 13 ACID BLACK 172 14 ACID BLACK MIXTURE 15 ACID RED 183 16 ACID RED 195 17 ACID RED 186 18 ACID YELLOW 114
Skip to main content NBAS mutations cause acute liver failure: when acetaminophen is not a culprit Abstract Background Pediatric acute-liver-failure due to acetaminophen (APAP) administration at therapeutic dosage is rare, while viral infections and metabolic defects are the prevalent causes. Yet, as acetaminophen is routinely used in febrile illnesses, it may be mistakenly held responsible for the acute liver damage. Case presentation An 11 month old boy had been on acetaminophen for 10 days (total dose 720 mg = 72 mg/kg) when he developed acute-liver-failure with encephalopathy. As he rapidly improved on N-acetylcysteine (NAC) infusion, it was concluded that chronic acetaminophen administration in an infant had lead to acute-liver-failure even at therapeutic doses, that N-acetylcysteine infusion had been life-saving and should be immediately started in similar circumstances. The child, however, had two further episodes of acute liver damage over a 34-month period, without having been given acetaminophen, as the parents carefully avoided using it. His clinical, laboratory and radiological findings between the acute episodes were unremarkable. His features and skeletal surveys were not suggestive of a syndromic condition. He then went on to suffer another episode of acute-liver-failure with multi-organ failure, necessitating an urgent liver transplant. All efforts to come to a diagnosis for the causes of his recurrent episodes of liver failure had been unsuccessful, until a biallelic mutation in the NBAS gene was reported to be associated with recurrent acute-liver-failure in children. The boy’s DNA analysis revealed compound heterozygous pathogenic mutations in the NBAS gene. Liver failure episodes in these patients are triggered and worsened by fever, most likely due to thermal susceptibility of hepatocytes, hence APAP, rather than being a culprit, is part of the supportive treatment. Conclusions We suggest that, in acute-liver-failure with a history of acetaminophen exposure at therapeutic dosage, clinicians should not be contented with administering NAC, but should consider an alternative etiology, above all if the episodes are recurrent, and actively start supportive and antipyretic treatment while seeking the advice of a specialist unit. Background Acute liver failure (ALF) is a rare syndrome, characterized by rapid onset of severe hepatic dysfunction and hepatocellular damage in the absence of pre-existent liver disease [1]. In children, it is a devastating illness that still carries a high risk of mortality. In up to 50% of cases a cause cannot be found despite thorough investigation [2]. The syndrome may have diverse etiologies that manifest wide geographic and age differences. Etiology is an important factor in determining outcome. Patients with acute acetaminophen (N-acetyl-p-aminophenol = APAP) toxicity would be expected to have a relatively good prognosis, given the known pathobiology and the availability of a treatment for this condition. Yet, individual patients with APAP-induced ALF may die [3]. APAP is a widely-used medication. It is available without prescription and is a trusted remedy in most home medicine cabinets. APAP is considered safe when taken at the recommended dose (10–15 mg/kg) and frequency (fewer than 5 doses/day) for a total recommended daily dose of 75 mg/kg per day [4]. Yet APAP toxicity is the commonest cause for liver failure and liver transplantation in the Western world [5]. Pediatric acute-liver-failure due to chronic acetaminophen administration at therapeutic dosage is rare [6]. In one instance, such association was mistakenly reported. Case Presentation The case of an 11-month-old boy (10 kg), now 7, was published in 2011 [7]. He had presented in discrete general health with a 10-day history of fever and vomiting. Investigations showed significantly elevated liver enzymes (LFT) (AST 11,735 IU/L [normal range: < 41 IU/L], ALT 6611 IU/L [normal range: < 41 IU/L]) and γGT 286 IU/L [normal range: < 71 IU/L]), normal total serum bilirubin and normal clotting. His LFT values remained unchanged the following day, while ammonium concentration was high (266 μg/dL [normal range: < 125 μg/dL]), total bilirubin increased significantly (2.18 mg/dL, direct 1.51 mg/dL), the international normalized ratio (INR) rose to 2.07 [normal range: < 1.20] and did not respond to parenteral vitamin K administration. He became lethargic with a normal electroencephalogram (EEG) and the clinical picture suggested acute-liver-failure (ALF). His pediatrician had been treating his fever with APAP suppositories at 125 mg (12.5 mg/kg) every 6 h for 3 days, followed by oral administration at 120 mg (12 mg/kg) every 4 h for 7 days, for a total dose of 720 mg (72 mg/kg) over 10 days. His serum APAP concentration 9 h after the last dose was 7.2 mg/mL (reference range: 10.0–30.0 mg/mL). He was given N-acetylcysteine (NAC) infusion at a dose of 150 mg/kg in 5% dextrose in 90 min and then 150 mg/kg/day with rapid improvement of his LFT on the first day and normalization of the INR within 5 days. Five and 10 months later, two further febrile episodes lasting less than 24 h with only a slight ALT alteration (102 and 65 IU/L respectively), were not treated with APAP. An exhaustive etiological screening for pediatric ALF was inconclusive and as the child had remained in good health for 12 months, the clinicians reporting his case presumed that his ALF had been induced by chronic APAP administration at therapeutic dosage and that NAC treatment had been “life-saving” [1, 4, 5]. Twenty-three months after his first ALF episode, when he was 34 months old, he re-presented with lethargy after 6 h of fever and recurrent vomiting. There was a marked alteration in AST (15,487 IU/L), ALT (10,088 IU/L), normal γGT (35 IU/L) and total bilirubin, an increased INR (3.27) and a high ammonium concentration (453 μg/dL). EEG showed diffuse cerebral suffering. Supportive treatment and NAC infusion were commenced immediately, but the encephalopathy and liver dysfunction worsened dramatically. Within 36 h the INR rose to 5.06, AST and ALT were 20,070 and 12,830 IU/L respectively, LDH was 22,392 IU/L and ammonium 479 μg/dL. He was listed for urgent liver transplantation, but after 24 h his LFT and clotting started improving and he was taken off the transplant list. No etiological diagnosis was reached despite an exhaustive infectious and metabolic screening (See Table 1 ). He showed no syndromic features and there was no family history of liver involvement. He was repeatedly investigated for mitochondrial disorders as these ALFs can be stress-induced, without signs or symptoms of neuromuscular disease, but liver and muscle biopsies were first postponed, due to an upper respiratory tract infection not associated with clotting or LFTs alterations and then cancelled due to withdrawal of the parental consent. Table 1 Results of the diagnostic workup Eleven months later, aged 3.7 years, he was urgently re-admitted with a catastrophic ALF episode after 3 days of sore throat and untreated fever. There was multiorgan involvement, renal dysfunction requiring dialysis and lung complications which impaired respiratory exchanges. A reduced liver (segments I to IV), from a 45-year-old small-sized deceased male donor was urgently transplanted. He made a full recovery and he was discharged on the 59th postoperative day. The explanted liver histology showed massive pan-lobular necrosis, coagulative central necrosis, edematous portal spaces with scanty portal mononuclear and granulocytic infiltration. Some hepatocytes were still preserved in acinar zone 1 and showed cytoplasmic vacuolization and degeneration. Diffuse necrosis precluded metabolic investigations on the explanted liver tissue. Although neurological signs were absent, a muscle biopsy, performed 6 months after transplantation, showed normal respiratory chain enzyme activities. Genetic testing for deoxyguanosine kinase (DGUOK), DNA polymerase γ (POLG) mutations and other genes commonly involved in mitochondrial DNA depletion [8,9,10,11], showed no pathogenic mutations [7, 12, 13]. The child, now 8, shows normal growth and neurodevelopment at his routine follow-up visits. DNA analysis revealed compound heterozygous pathogenic mutations in NBAS (NM_015909.3): c.[809G > C];[2926del], p.[Gly270Ala];[Ser976Profs*16]. Both variants were absent from 7500 in-house exomes from individuals with unrelated phenotypes and about 120,000 alleles of the Exome Aggregation Consortium (ExAC) Server (Cambridge, MA [03/2016]). The paternally inherited c.809G > C mutation affects an evolutionarily highly conserved glycine and is predicted as functionally relevant in silico (PolyPhen 2: probably damaging (0.998); SIFT score: 0; CADD score 19.45). The maternally inherited 1 bp deletion c.2926del causes a frameshift and predicts a prematurely truncated protein, missing more than 50% of wild-type polypeptide sequences. Discussion and conclusions Although it is rare, pediatric ALF is a devastating event, accounting for 10–15% of all pediatric liver transplants. Pediatric ALF is defined as a coagulopathy, with an INR ≥1.5 not correctable by parenteral vitamin K administration, in the presence of grade III or IV hepatic encephalopathy (HE), or an INR ≥2.0, regardless of the presence/absence of clinical HE, and biochemical evidence of acute hepatocellular injury in children with no previous evidence of liver disease [1, 2, 14]. Metabolic disorders and viral infections are the prevalent causes of ALF in neonates and infants, whilst drug-induced hepatotoxicity and autoimmune hepatitis are more commonly identified in older children; the etiology remains undetermined in up to 50% of cases [2, 8,9,10,11, 14]. RALF, with complete clinical and biochemical recovery between the critical events, is even rarer. Reported etiologies include viruses, autoimmune hepatitis, metabolic disorders affecting the mitochondrial respiratory chain, the long-chain fatty acid oxidation pathway or the carnitine cycle, dihydrolipoamide dehydrogenase (E3) deficiency (OMIM: #246900) and Wolcott-Rallison syndrome (OMIM: #226980). Early identification of the cause of ALF is fundamental as it is sometimes reversible if specific therapy is started. While the etiological screening is carried out, supportive treatment with restricted hydration, broad spectrum antibiotics, antivirals and antimycotics and adequate caloric support should be started immediately [8]. If there is a suspicion that ALF may be APAP-induced, NAC is the elective antidote [9,10,11, 15], making it crucial to ascertain whether APAP administration may be responsible for the ALF. Yet, in some metabolic disorders, ALF is triggered by fever and/or viral-infection [16] and almost all patients have a history of APAP assumption due to antipyretic treatment. The recommended APAP oral dose in children under six is 10 to 15 mg/kg/dose, with a maximum dose of 90 mg/kg/day. A daily dose of 150 mg/kg or higher has been reported to be hepatotoxic [17, 18] whereas < 75 mg/kg/die has been reported to be safe [4, 9, 18] even if anecdotic reports have suggested that younger children may develop toxicity after repeated therapeutic doses of APAP [9, 17, 18]. If this were the case, then NAC treatment should be started without delay and it may still be useful 48 h after APAP ingestion [8, 10]. Approved national triage guidelines for repeated supratherapeutic APAP ingestion recommend that children younger than 6 years should be referred for emergency evaluation if they have ingested 200 mg/kg or more over a single 24-h period, 150 mg/kg per 24-h period for the preceding 48 h, or 100 mg/kg per 24-h period for the preceding 72 h or longer. NAC is a thiol-group donor that assists with replenishing of liver stores of glutathione (GSH), the primary antioxidant in hepatocytes and represents the specific antidote for paracetamol poisoning. On the efficacy of NAC infusion in non-APAP-induced ALF, the two largest multicenter, randomized, double-blind, placebo controlled studies in adults [19] and in children [20] reached divergent conclusions. One proposed mechanism of hepatocyte damage in ALF is the production of reactive oxygen species (ROS). Upon donating an electron to unstable ROS, two GSH react together to form glutathione disulfide. Increasing mitochondrial GSH can be an effective strategy to prevent mitochondrial oxidative stress and pro-inflammatory cytokines generation [21]. A recent meta-analysis concluded that NAC use for non-APAP-induced ALF is safe, it can prolong patients’ survival with native liver without transplantation, especially in the milder grades of hepatic encephalopathy (I or II), but it does not affect the overall survival [22]. Nonetheless, NAC infusion is part of the initial supportive treatment in pediatric ALF while investigations are ongoing [8]. There is a feeling amongst operators that it may be useful in ALF caused by other chemicals (drugs, mushroom poisoning) [23] and there is experimental evidence of its role in protecting mitochondria from damage, even if the value of NAC use in less severe forms of drug-induced liver injury is still being assessed [24]. The clinical presentation of this 11-month old child was suggestive of ALF due to repeated therapeutic doses of acetaminophen [7]. However, the child had two further episodes of acute liver damage over a 34-month period without having taken APAP, whilst there were no clinical or laboratory signs of liver disease between the episodes. Temperature was the likely triggering factor in all three RALF episodes. A report that mutations in the neuroblastoma amplified sequence gene (NBAS; OMIM #616483) can cause fever-triggered recurrent liver failure (RALF) in children was published in 2015 [16]. This mutation may also be associated with a multisystemic phenotype of short stature, skeletal dysplasia, optic atrophy and immunological abnormalities (Pelger-Huet), with normal motor and cognitive development, resembling the SOPH syndrome occurring in the Yakut population [25]. Our patient, however, had none of these features and skeletal surveys, bone densitometry, MRI, neurological, eye examination and growth evaluation showed no syndromic peculiarities [16, 25,26,27,28]. NBAS in zebra fish, nematodes (C.elegans) and humans has been shown to act in concert with core factors of the nonsense-mediated mRNA decay (NMD) pathway to co-regulate a large number of endogenous RNA targets [29]. NMD modulates cellular stress response pathways and membrane trafficking. Lack of NBAS function could affect its role in NMD, its activity as a component of the syntaxin 18 complex or compromise yet unreported cellular functions. Thermal susceptibility of the syntaxin 18 complex is the basis of fever dependency of ALF episodes. Depletion of NBAS leads to a significant upregulation of the matrix G1a protein (MGP), responsible for bone formation. Thus, an increased MGP activity would be compatible with the short stature and associated bone defects in the SOPH syndrome [25]. The phenotype and medical history of 14 individuals with NBAS deficiency showed that RALF may present from 4 months to 6.7 years, but is not restricted to childhood, and that ALF crisis, as in our case, could be fatal without a liver transplant [28, 30]. Characteristically, these patients presented with recurrent vomiting and increasing lethargy 1 or 2 days after the onset of fever. Syndromic SOPH-like features and stunted linear growth have been reported in up to 77% of the 22 children with pathological NBAS mutations described to date, while liver cytolytic episodes, which were absent in the original 33 SOPH cases, were present in all 22, but did not necessarily evolve into ALF [31]. Intermediate phenotypes have recently been described [32] Antipyretic therapy and anabolic support, including high glucose and parenteral lipids, effectively improve the liver crisis [8, 16, 28, 30]. As our patient had these characteristics, we tested him for a mutation in the NBAS gene, with positive results. Not having administered APAP, which was mistakenly considered the culprit of his liver damage, might, in fact, have been one of the factors that led to the catastrophic evolution of the last episode. In conclusion, genetic defects of the energy pathways (mitochondrial diseases have a prevalence of approximately 1 in 5000), should be part of the differential diagnosis in individuals presenting with ALF in isolation or as part of a multisystemic disease presentation, especially if drugs are involved [33]. Our case raises the suspicion that APAP assumption at therapeutic doses, in some other reports of an association between chronic administration of the drug and ALF in infants with APAP levels within the normal range on admission, may have been a red herring, leading to a hasty diagnosis and an incorrect management of the ALF episode. Abbreviations ALF: acute liver failure APAP: acetaminophen DGUOK: deoxyguanosine kinase EEG: electroencephalogram GSH: glutathione HE: hepatic encephalopathy INR: international normalized ratio LFT: liver function tests MGP: matrix G1a protein NAC: N-acetylcysteine NBAS: neuroblastoma amplified sequence NMD: nonsense-mediated mRNA decay POLG: DNA polymerase γ RALF: recurrent acute liver failure ROS: reactive oxygen species References 1. Polson J, Lee WM. American Association for the Study of Liver D. AASLD position paper: the management of acute liver failure. Hepatology. 2005;41:1179–97. Article  PubMed  Google Scholar  2. Squires RH, Shneider BL, Bucuvalas J, Alonso E, Sokol RJ, Narkewicz MR, et al. Acute liver failure in children: the first 348 patients in the pediatric acute liver failure study group. J Pediatr. 2006;148:652–8. Article  PubMed  PubMed Central  Google Scholar  3. Li R, Belle SH, Horslen S, Chen LW, Zhang S, Squires RH, Pediatric Acute Liver Failure Study Group. Clinical Course among Cases of Acute Liver Failure of Indeterminate Diagnosis. J Pediatr. 2016;171:163–70. Article  PubMed  PubMed Central  Google Scholar  4. Sullivan JE, Farrar HC. Section on Clinical Pharmacology and Therapeutics; Committee on Drugs. Fever and antipyretic use in children. Pediatrics. 2011;127:580–7. Article  PubMed  Google Scholar  5. Biolato M, Araneo C, Marrone G, Liguori A, Miele L, Ponziani FR, et al. Liver transplantation for drug-induced acute liver failure. Eur Rev Med Pharmacol Sci. 2017;21:37–45. CAS  PubMed  Google Scholar  6. Lavonas EJ, Reynolds KM, Dart RC. Therapeutic acetaminophen is not associated with liver injury in children: a systematic review. Pediatrics. 2010;126(6):e1430–44. Article  PubMed  Google Scholar  7. Savino F, Lupica MM, Tarasco V, Locatelli E, Garazzino S, Tovo PA. Fulminant hepatitis after 10 days of acetaminophen treatment at recommended dosage in an infant. Pediatrics. 2011;127:e494–7. Article  PubMed  Google Scholar  8. Lutfi R, Abulebda K, Nitu ME, Molleston JP, Bozic MA, Subbarao G. Intensive Care Management of Pediatric Acute Liver Failure. J Pediatr Gastroenterol Nutr. 2017;64:660–70. Article  PubMed  Google Scholar  9. American Academy of Pediatrics. Committee on Drugs. Acetaminophen toxicity in children. Pediatrics. 2001;108:1020–4. Article  Google Scholar  10. Marzullo L. An update of N-acetylcysteine treatment for acute acetaminophen toxicity in children. Curr Opin Pediatr. 2005;17:239–45. Article  PubMed  Google Scholar  11. Brok J, Buckley N, Gluud C. Interventions for paracetamol (acetaminophen) overdose. Cochrane Database Syst Rev. 2006 Apr 19;2:CD003328. Google Scholar  12. Molleston JP, Sokol RJ, Karnsakul W, et al. Evaluation of the child with suspected mitochondrial liver disease. J Pediatr Gastroenterol Nutr. 2013;57:269–76. Article  PubMed  PubMed Central  Google Scholar  13. Al-Hussaini A, Faqeih E, El-Hattab AW, Alfadhel M, Asery A, Alsaleem B, et al. Clinical and molecular characteristics of mitochondrial DNA depletion syndrome associated with neonatal cholestasis and liver failure. J Pediatr. 2014;164:553–9. Article  CAS  PubMed  Google Scholar  14. Devictor D, Tissieres P, Afanetti M, Debray D. Acute liver failure in children. Clin Res Hepatol Gastroenterol. 2011;35:430–7. Article  PubMed  Google Scholar  15. McGill MR, Jaeschke H. Metabolism and disposition of acetaminophen: recent advances in relation to hepatotoxicity and diagnosis. Pharm Res. 2013;30:2174–87. Article  CAS  PubMed  PubMed Central  Google Scholar  16. Haack TB, Staufner C, Köpke MG, et al. Biallelic Mutations in NBAS Cause Recurrent Acute Liver Failure with Onset in Infancy. Am J Hum Genet. 2015;97:163–9. Article  CAS  PubMed  PubMed Central  Google Scholar  17. Leonis MA, Alonso EM, Im K, Belle SH, Squires RH, Pediatric Acute Liver Failure Study Group. Chronic acetaminophen exposure in pediatric acute liver failure. Pediatrics. 2013;131:e740–6. Article  PubMed  PubMed Central  Google Scholar  18. Heard K, Bui A, Mlynarchek SL, Green JL, Bond GR, Clark RF, et al. Toxicity from repeated doses of acetaminophen in children: assessment of causality and dose in reported cases. Am J Ther. 2014;21:174–83. Article  PubMed  PubMed Central  Google Scholar  19. Lee WM, Hynan LS, Rossaro L, Fontana RJ, Stravitz RT, Larson AM, et al. Intravenous N-acetylcysteine improves transplant-free survival in early stage non-acetaminophen acute liver failure. Gastroenterology. 2009;137:856–64. Article  CAS  PubMed  PubMed Central  Google Scholar  20. Squires RH, Dhawan A, Alonso E, Narkewicz MR, Shneider BL, Rodriguez-Baez N, et al. Intravenous N-acetylcysteine in pediatric patients with nonacetaminophen acute liver failure: a placebo-controlled clinical trial. Hepatology. 2013;57:1542–9. Article  CAS  PubMed  PubMed Central  Google Scholar  21. Stravitz RT, Sanyal AJ, Reisch J, Bajaj JS, Mirshahi F, Cheng J, et al. Effects of N-acetylcysteine on cytokines in non-acetaminophen acute liver failure: potential mechanism of improvement in transplant-free survival. Liver Int. 2013;33:1324–31. Article  CAS  PubMed  PubMed Central  Google Scholar  22. Hu J, Zhang Q, Ren X, Sun Z, Quan Q. Efficacy and safety of acetylcysteine in “non-acetaminophen” acute liver failure: A meta-analysis of prospective clinical trials. Clin Res Hepatol Gastroenterol. 2015;39:594–9. Article  CAS  PubMed  Google Scholar  23. Kortsalioudaki C, Taylor RM, Cheeseman P, Bansal S, Mieli-Vergani G, Dhawan A. Safety and efficacy of N-acetylcysteine in children with non-acetaminophen-induced acute liver failure. Liver Transpl. 2008;14:25–30. Article  PubMed  Google Scholar  24. Chughlay MF, Kramer N, Spearman CW, Werfalli M, Cohen K. N-acetylcysteine for non-paracetamol drug-induced liver injury: a systematic review. Br J Clin Pharmacol. 2016;81:1021–9. Article  CAS  PubMed  PubMed Central  Google Scholar  25. Maksimova N, Hara K, Nikolaeva I, Chun-Feng T, Usui T, Takagi M, et al. Neuroblastoma amplified sequence gene is associated with a novel short stature syndrome characterised by optic nerve atrophy and Pelger-Huët anomaly. J Med Genet. 2010;47:538–48. Article  CAS  PubMed  PubMed Central  Google Scholar  26. Segarra NG, Ballhausen D, Crawford H, Perreau M, Campos-Xavier B, van Spaendonck-Zwarts K, et al. NBAS mutations cause a multisystem disorder involving bone, connective tissue, liver, immune system, and retina. Am J Med Genet A. 2015;167A:2902–12. Article  PubMed  Google Scholar  27. Capo-Chichi JM, Mehawej C, Delague V, Caillaud C, Khneisser I, Hamdan FF, et al. Neuroblastoma Amplified Sequence (NBAS) mutation in recurrent acute liver failure: Confirmatory report in a sibship with very early onset, osteoporosis and developmental delay. Eur J Med Genet. 2015;58:637–41. Article  PubMed  Google Scholar  28. Staufner C, Haack TB, Köpke MG, Straub BK, Kölker S, Thiel C, et al. Recurrent acute liver failure due to NBAS deficiency: phenotypic spectrum, disease mechanisms, and therapeutic concepts. J Inherit Metab Dis. 2016;39:3–16. Article  CAS  PubMed  Google Scholar  29. Longman D, Hug N, Keith M, Anastasaki C, Patton EE, Grimes G, et al. DHX34 and NBAS form part of an autoregulatory NMD circuit that regulates endogenous RNA targets in human cells, zebrafish and Caenorhabditis elegans. Nucleic Acids Res. 2013;41:8319–31. Article  CAS  PubMed  PubMed Central  Google Scholar  30. Cardenas V, DiPaola F, Adams SD, Holtz AM, Ahmad A. Acute Liver Failure Secondary to Neuroblastoma Amplified Sequence Deficiency. J Pediatr. 2017;186:179–82. Article  PubMed  Google Scholar  31. Regateiro FS, Belkaya S, Neves N, Ferreira S, Silvestre P, Lemos S, et al. Recurrent elevated liver transaminases and acute liver failure in two siblings with novel bi-allelic mutations of NBAS. Eur J Med Genet. 2017;60:426–32. Article  PubMed  Google Scholar  32. Kortüm F, Marquardt I, Alawi M, Korenke GC, Spranger S, Meinecke P, Kutsche K. Acute Liver Failure Meets SOPH Syndrome: A Case Report on an Intermediate Phenotype. Pediatrics. 2017; https://doi.org/10.1542/peds.2016-0550. 33. Kanabus M, Heales SJ, Rahman S. Development of pharmacological strategies for mitochondrial disorders. Br J Pharmacol. 2014;171:1798–817. Article  CAS  PubMed  PubMed Central  Google Scholar  Download references Acknowledgments The authors wish to thank Ms. Barbara Wade for her linguistic advice. Funding TBH work was supported by the German Federal Ministry of Education and Research (BMBF) within the framework of the e:Med research and funding concept (grant #FKZ 01ZX1405C). Availability of data and materials Data sharing not applicable to this article as no datasets were generated or analyzed during the current study. Author information Authors and Affiliations Authors Contributions PLC, TBH and DDO conceived the study, analysed and interpreted the data and drafted the manuscript. FT, AB, MP, RR, MS interpreted the data and reviewed the manuscript. All authors have read and approved the final manuscript. Corresponding author Correspondence to Pier Luigi Calvo. Ethics declarations Competing interest The authors declare that they have no competing interests. Ethics approval and consent to participate Parental informed consent for publication was obtained. Consent for publication Written informed consent was obtained from the patient’s legal guardians for publication of this case report and any accompanying images. A copy of the written consent is available for review by the Editor-in-Chief of this journal. Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Rights and permissions Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. Reprints and Permissions About this article Verify currency and authenticity via CrossMark Cite this article Calvo, P.L., Tandoi, F., Haak, T.B. et al. NBAS mutations cause acute liver failure: when acetaminophen is not a culprit. Ital J Pediatr 43, 88 (2017). https://doi.org/10.1186/s13052-017-0406-4 Download citation • Received: • Accepted: • Published: • DOI: https://doi.org/10.1186/s13052-017-0406-4 Keywords • Acute liver failure • Acetaminophen toxicity • N-Acetylcysteine • NBAS mutation • Liver Transplantation
9 Contributors 8 Replies 10 Views 8 Years Discussion Span Last Post by dwks 0 plz provide the c program to remove the blank spaces No. That's not what we do. The way it works is *you* post your code, and also post up a description of your problem or error with that code. We will take a look at it and suggest ways of fixing it. We don't *do* your homework, we help you with *your* code problems. 0 No. That's not what we do. The way it works is *you* post your code, and also post up a description of your problem or error with that code. We will take a look at it and suggest ways of fixing it. We don't *do* your homework, we help you with *your* code problems. Exactly. Also see the article 'How to ask questions the smart way' over here. 0 LOL but seriously, if there ever was a problem that should be solved by Perl... this is it. look into Perl. this is the kind of problem it's designed to do. and can do it in about 3 lines of code. 1 Well, ok i decided to give you hint but not the answer, here you go with some sample pesudo code. This should give you an idea on how to approch this problem. character [] source = " We dont do your homework " charater [] destination; Fetch each char from the source array Check if the fetched char is white space char if so continue the loop if not space char copy that char into destination print the destination ( with no white space in it ) ssharish Votes + Comments Nice pesudo code 0 It's very easy, you know yet the algoritmus how to make it, now you should only implementation it! Good luck ;-) 0 LOL but seriously, if there ever was a problem that should be solved by Perl... this is it. look into Perl. this is the kind of problem it's designed to do. and can do it in about 3 lines of code. Python does it with one line: text = text.replace(' ', '') 0 So does Perl! In fact, you can do it with just one line, on the command line. perl -pe 's/\s/g' But that's beside the point. Note that ssharish's code works, but it might be more efficient to shift the data inside the array. Or even just print characters that aren't spaces. for each character in the string if the character isn't a space print it This topic has been dead for over six months. Start a new discussion instead. Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.
The FOCUS Filed under Academics, Campus Life What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Hang on for a minute...we're trying to find some more stories you might like. Email This Story Most students at John Jay are familiar with virtual private network (VPN) services services for their potential to circumvent web restrictions on school internet which has prompted the banning of VPN use by the school. VPNs however serve a variety of purposes besides the circumvention of local internet restrictions and can be an important too to ensure privacy and protect one’s access to a free internet. VPNs clients work by accessing a server in another location through an encrypted tunnelling protocol over the web. In some VPNs that server just serves as a proxy for web access, in other VPNs that server connects to a network, allowing a user to operate machines on that network without being directly connected to that network. VPNs for general consumer use usually just web proxies and networking variants are more common in commercial enterprise. If you want to send sensitive information over unsecured public wifi networks you should use a VPN. Information that is sent over unsecured networks is susceptible to interception and viewing through packet sniffing and an intruding device can insert itself into the connection in a man-in-the-middle attack. Even when web traffic is appears to be encrypted with HTTPS it is very common for some information to be  sent with unencrypted HTTP leaving openings for exploitation on unsecured networks. Because VPNs connect to a proxy through an encrypted tunnel, if the tunneling protocol is sufficiently secure, anything sent through the VPN will be encrypted allowing relatively secure use of public internet. Because VPNs redirect traffic to a proxy server they can help to ensure freedom from restrictions imposed by governments and  internet service pretenders. Using a proxy creates two connections as opposed to one direct connection, one between the VPN client and the VPN service and one between the VPN service and web content. When directly connection to web content is restricted or censored and a connection to a VPN service is not, using a VPN with a different connection to the internet will allow circumvention of the restrictions imposed on a direct connection. Internet service providers may block or throttle some content. For example ISPs have throttled high bandwidth streaming services like Netflix. By connecting through a VPN with a different access point to the internet one can avoid content restriction and throttling by ISPs. The same applies to government censorship: If one wants to access censored sites in a country with restricted internet such as China, if they can connect to an unblocked VPN service that is located in an area with uncensored internet and can route connections to censored content through the VPN. Additionally using a VPN proxy obscures the content you view from internet service providers and the government. Though VPNs may not ensure complete privacy they are a helpful tool to obscure your identity online, especially when combined with other obfuscation technologies like the Tor network. If you want a secure, fast, and customizable VPN service without paying a costly monthly subscription and you have some computer capability you should consider running your own VPN server with OpenVPN or a similar program. You can run an OpenVPN server from pretty much any linux computer in your home and you can access the VPN on it through client apps available for computers or smartphones. If you have a raspberry pi you can use PiVPN to run an openVPN server on that.  1 Comment One Response to “What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own” 1. Office 365 Support on May 8th, 2018 7:00 am It is an incredible weblog in the senses and very participating too. Great job! Probably not much comes from an early blogger like me, but I can guess after having fun with your posts. Nice grammar and vocabulary is not like many blogs. You actually know very well that you are talking too much. That’s what you want me to learn more. Your blog has turned into a stepping stone for me, my fellow blogger. Thank you for the detailed journey. Office 365 Support The Focus intends for this area to be used to foster healthy, thought-provoking discussion. Comments are expected to adhere to our standards and to be respectful and constructive. As such, we do not permit the use of profanity, foul language, personal attacks, or the use of language that might be interpreted as libelous. Comments are reviewed and must be approved by a moderator to ensure that they meet these standards. The Focus does not allow anonymous comments, and The Focus requires a valid email address. The email address will not be displayed but will be used to confirm your comments. If you want a picture to show with your comment, go get a gravatar. Navigate Left • Academics World War II in the Lens of Literature: How a simple commonality held together chaos. How Novels Fought Nazis. • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics Pen Pals in Malaysia • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics Course Review: AP Biology • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics The Reality of Junior Year • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics Course Review Uncensored: AP Chemistry • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics Student Perception of the High School Workload • Academics First-Semester ‘Senioritis’ • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics AP Spanish Takes On Mandarin • Academics Understanding the World Through QFT • What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own Academics Updated Midterm Schedule Navigate Right The student news site of John Jay High School What is a VPN, Why You Should Use One (Outside of School), and How You Can Make Your Own
tag:blogger.com,1999:blog-37288893866968614712017-06-25T17:56:58.945-07:00ODESA YAZILIM'S BLOGAlper ESKİKILIÇnoreply@blogger.comBlogger27125tag:blogger.com,1999:blog-3728889386696861471.post-9720036536734264892009-11-15T14:16:00.000-08:002009-11-15T14:17:17.577-08:00How To Change A Cmos BatteryFirst the safety rules<br /><br />The inside of a computer is a bad place full of electricity and sharp edges.<br />On the electricity side always when working on you computer make sure that it’s still plugged in to the power socket and the power is turned off, this is to ensure that any static<br />From you is discharged through the earth. The inside of most computer cases are unfinished metal and has very sharp edges so be careful.<br /><br />The first signs of a battery failing are:-<br /><br />1) your clock starts running slowly<br />2) when you boot (start) your computer it has a problem finding your hardware (no hard drive, no cd rom)<br /><br />To change the battery you need the following tools<br /><br />1) a X-point screwdriver<br />2) an anti-static strap(optional)<br />3) a new battery (seems logical)<br /><br />Then unplug all the cables from the back of the computer as you remove them make a note where they came from. (So when you finished you can put them back)<br /><br />Move the computer somewhere where you can work on it with ease<br /><br />Remove the cover by locating the screws around the outer edge (back) of the computer<br />Some computer cases only require you to remove 2 screws on one side then a panel can be removed allowing you access to the computers insides, others you must remove 6 screws and remove the whole case by sliding it to the rear and lifting it off.<br /><br />Now make sure that you read the safety instructions about static.<br />Look inside you will see a round silver thing that looks about the size of a 10p piece (quarter). This is the battery itself, carefully lift the retaining clip and slide the battery out. That’s it removed now go to your local computer retailer, electrical retailer (Tandy/Radio shack) taking the old battery with you and get a new battery.<br /><br />Back to your computer insert the new battery by lifting the clip and sliding the battery in.<br /><br />Reinstall your case and plug all the cables back (you did remember to label them didn’t you)<br /><br />Now for the fun part.<br /><br />You will now need to go into you bios….<br /><br />Right the bios is the god of your computer.<br /><br />To access it, when your computer first starts you will see a black screen with white text.<br /><br />If you look carefully you will see a line that says something like "press del for setup" or some other key (F2 or ESC or tab) this will take you to god's house where you can make lots of changes to the way your machine works.<br /><br />It is also the place where you can make your nice computer in to a rather expensive door stop so be careful and don’t go playing with anything.<br /><br />You will now be presented with a blue screen with a lot of options on it,<br />The one we want is load optimised/default settings.<br /><br />Press the F10 key and type y the computer should now reboot.<br /><br />If every thing went well then your computer will now be up and running. <br /><br /><br /><br />Shizers way: Keep computer running. Lay it on it's side and remove side cover to expose MoBo. Take any thin object, "small screwdriver, knife point, wood shiskabob skewer. Pull back the battery retaining clip. Toss the old battery in the junk recepticle, unless you belong to greenpeace and want to save the earth. Install the new battery. No need to reset bios becasue the compter supplies voltage to the cmos while it is running. Reset or resync clock with internet. Done!Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-19518183346426431282009-07-05T07:08:00.000-07:002009-07-05T07:31:26.179-07:00Kill USB Viruses – Use AutorunEater<div align="left">The most easiest way to get your computer infected with a computer virus is to use your friends USB on your computer. You just copied a few songs and got all the computer viruses and worms for free  <br /><br />Ever wondered how does these virus “automatically” infect your computer as soon as you insert the USB? Well, its the magic of autorun.inf file in the USB drive. All the startup information of the virus is written in the autorun.inf file so that its the first program that runs when you insert the USB. You can read more about autorun.inf at this wikipedia page. <br /><br />But now there is no need to worry even if you don’t know the syntax of the autorun.inf files. You can use AutorunEater to protect your computer from these virus.<br /><br /><strong>How To Use AutorunEater To Stop Viruses In Infected USB Drives?</strong><br /></div><p align="left">1. Install it. Then right click on its icon in the notification area or system tray and click on Add Billy To System Startup option.</p><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 254px; height: 94px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SlC4PIcGziI/AAAAAAAAAHc/wYJRLlx7SCk/s400/use-autoruneater-to-remove-usb-virus.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5354982527046438434" />That’s it. Now AutorunEater will automatically start with Windows. It continuously scans all the removable drives just like an antivirus program scans your system files. As soon as you insert a USB drive, it will scan it for all the autorun.inf files and will prompt a warning window if a malicious autorun.inf file is found. You can then delete the file and the poor virus will never get a chance to infect your system  <br /><br /></p><p align="left">FOR DOWNLOAD <a href="http://oldmcdonald.wordpress.com/"><strong>AUTORUNEATER CLICK HERE!</strong></a></p><p align="left"><br /><br /></p><p><br /><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com1tag:blogger.com,1999:blog-3728889386696861471.post-46314081381687479222009-07-04T02:23:00.000-07:002009-07-04T02:37:44.243-07:00Easy Remote Connection : TEAMVIEWER ;)<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sk8hOZItRUI/AAAAAAAAAG8/fd20G8SlMm8/s1600-h/teamviewer-150x150.png"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 150px; height: 150px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sk8hOZItRUI/AAAAAAAAAG8/fd20G8SlMm8/s400/teamviewer-150x150.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5354535013116101954" /></a>Many of you who is reading this blog are geeks or those who are willingly ready to help other regarding their PC problem.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sk8hOZItRUI/AAAAAAAAAG8/fd20G8SlMm8/s1600-h/teamviewer-150x150.png"><br /></a><br />I often came across the situation where i have to help my friends, once they face any problem regarding their pc.<br /><br />But, going every1 place to fix their problem is not possible, so i always look for the remote applications by which i can fix their problem remotely.</div><div align="left">The Software of the day “TEAMVIEWER” is one such software which let you remotely access anyone pc with his permission.<br />And the advantage of this software is that It’s everybody cup of tea. Easy to configure.<br /><br />TEAMVIEWER is Simpe and fast solution to connect to any pc remotely. and it work behind any firewall or proxy.<br /></div><div align="left"></div><div align="left"></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 321px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/Sk8hnPNFfKI/AAAAAAAAAHE/s31Lo1brLj0/s400/teamviewer2.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5354535439946841250" />With the first start, automatically ID’s are generated which is the unique ID for every pc.<br />Enter your partner’s ID into TeamViewer and the connection is established immediately.<br /><br />It can also be used to control unattended server or system.Just install the software as service and it can also be used to shutdown or reboot.<br /><br /></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 300px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/Sk8hy1-1CNI/AAAAAAAAAHM/PLVVFecyjF8/s400/teamviewer3.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5354535639334586578" /></div><div align="left">It offers Secure and encrypted data, so that makes it reliable and secure.<br /><br /></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 250px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sk8h9-W3IdI/AAAAAAAAAHU/wszVvG9dxQc/s400/teamviewer4.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5354535830561432018" /></div><div align="left">The best part is It’s portable and zero configuration.<br /><br /></div><div align="left"><a href="http://www.teamviewer.com/download/index.aspx"><strong><span style="color:#990000;">FOR DOWNLOAD TEAMVIEWER CLICK HERE!</span></strong></a></div><div align="left"><br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-36606419421159728102009-06-28T02:09:00.000-07:002009-06-28T02:38:34.271-07:00Free PC-Tools Internet Security license for 1 year<div align="left">Computer security is major concern for any PC user. Most of good antivirus are paid and charge a lot for the updates.<br /><br /><a href="http://www.pctools.com/"><strong>PC Tools</strong></a>, one of the best websites for PC users is providing <a href="http://www.pctools.com/internet-security/"><strong>Internet-Security-2009</strong></a> Antivirus for free for a full 12 month period!!<br /><br /></div><p align="left">Hurry up and follow the below procedure to get the Antivirus for free.</p><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 305px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/Skc5bg-jpbI/AAAAAAAAAG0/4bq-70bWlXo/s400/free_antivirus.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5352309827024692658" /></p><p align="left">1) Go to <a href="http://www.pctools.com/wbc/"><strong>www.pctools.com/wbc</strong></a><br /><br />2) Fill the Sign-Up form.<br /><br />3) Check your mailbox for the confirmation method and activate your account from the confirmation mail.<br /><br />4) After you have verified your account, you will get a mail which will give details about your Free license.<br /><br />5) Download Internet-Security from <a href="http://www.pctools.com/internet-security/"><strong>www.pctools.com/internet-security</strong></a><br /><br />6) Last but not the least Install the antivirus, copy &amp; paste the license key and the antivirus is yours for free for a full period of 12 months.<br /><br /></p><p><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com1tag:blogger.com,1999:blog-3728889386696861471.post-10090319177437575782009-06-23T23:58:00.000-07:002009-06-24T00:05:06.287-07:00100 strangest unexplained mysteries ebook<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/SkHPYJ_yn4I/AAAAAAAAAGs/27vQV-25cpc/s1600-h/100_strangest_mystries.JPG"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 140px; height: 200px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/SkHPYJ_yn4I/AAAAAAAAAGs/27vQV-25cpc/s400/100_strangest_mystries.JPG" border="0" alt="" id="BLOGGER_PHOTO_ID_5350785846200147842" /></a>This ebook 100 strangest mysteries is 100 Strangest Mysteries is an amazing compendium of the weird and the wonderful. The range of entries is extraordinary, from the bizarre to the horrific, and from the spooky to the just plain confounding.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/SkHPYJ_yn4I/AAAAAAAAAGs/27vQV-25cpc/s1600-h/100_strangest_mystries.JPG"><br /></a>The book includes some of history’s most astounding tales of the strange and supernatural, and tells in vivid detail the story of both events and the people involved,the impact of particular myths and beliefs, and the latestinvestigations being undertaken in an attempt to find answers to the world’s most bewildering phenomena. The text is complemented by 100 photographs and illustrations.100 Strangest Mysteries is a gripping and compelling account of some of the most baffling and astonishing events and is sure to shock and amaze in equal measure.</div><div align="left"></div><div align="left"><strong><br />Some Contents Are Here:</strong><br /><br /></div><div align="left"><strong>BEASTS &amp; MONSTERS<br /><br />CONSPIRACIES &amp; COMMUNICATIONS<br /><br />Stone Circles at Castlerigg<br /><br />HIDDEN CITIES &amp; LOST CIVILISATIONS<br /><br />HORRORS &amp; HAUNTINGS<br /><br />MARVELS &amp; MIRACLES<br /><br />PSYCHIC POWERS &amp; PHENOMENA<br /><br />PUZZLING PEOPLE &amp; ENIGMATIC ENTITIES<br /><br />SECRET SOCIETIES &amp; HIDDEN TREASURES<br /><br />MISCELLANEOUS<br /><br /></strong></div><div align="left"><strong></strong></div><div align="left"><strong>FOW DOWNLOAD PLEASE <a href="http://rapidshare.com/files/164787826/100_Strangest_Unexplained_Mysteries.rar"><span style="color:#cc0000;">CLICK HERE</span></a></strong><br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-91700638086005955442009-06-23T00:21:00.000-07:002009-06-23T00:30:49.386-07:00Create Your Own Radio Easily<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/SkCDrshZ_uI/AAAAAAAAAGk/metKMX9rrUM/s1600-h/net_radio.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 187px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/SkCDrshZ_uI/AAAAAAAAAGk/metKMX9rrUM/s200/net_radio.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5350421144025038562" /></a><strong>Online or Internet radio is an audio broadcasting service transmitted via the Internet.Internet radio services are usually accessible from anywhere in the world.<br />This tutorial is to teach how to make your own online radio which you can operate from your own PC.</strong><br /><br /></div><div align="left"><strong></strong></div><div align="left"><strong></strong></div><div align="left"><strong></strong></div><div align="left"><strong></strong></div><div align="left"><strong><br /><br /><br /><br />Instructions ::</strong><br /></div><div align="left"></div><div align="left">1. Download Winamp by going to the Winamp site.<br />2. Download the SHOUTcast Radio DSP plug-in for Winamp and install it.<br /><br /><a href="http://yp.shoutcast.com/downloads/shoutcast-dsp-1-9-0-windows.exe">http://yp.shoutcast.com/downloads/shoutcast-dsp-1-9-0-windows.exe</a><br /><br />3. Now go to <a href="http://listen2myradio.com/">http://listen2myradio.com/</a> and sign up for a free account, and verify it.<br /><br />4. Now sign in and and chose any server you like as your radio server.<br /><br />5. Now go to "radio installation" option.<br /><br />6. And enter these:-<br /><br />broadcaster password:<br />admin password:<br />radio name:<br />radio url:<br /><br /><strong>NOTE</strong>- Keep broadcaster password, admin password same as your account password. it will be better.<br /><br />7. Now after installing. scroll down and again choose server which you selected earlier or any other server!<br /><br />8. Now wait For Some Time till Your servers work!<br /><br />9. Now click on "Turn on/off" Option and Turn on your Radio. [You may have to repeat this step few more times to start it]<br /><br />10. Now if it is on, Open any song with winamp.<br /><br />11. Now press Ctrl+P and a Window will Open in Winamp.<br /><br />12. Now Go To "Plug-ins >> DSP/Effect " and double click "Nullsoft SHOUTcast source DSP v1.9.1 [dsp_sc.ddl]<br /><br />13. Now Go To "Output >> Connection" And Fill 'Address' &amp; 'Port' as Given in your "listen2myradio.com" account.<br /><br />14. Now Go To "Output >> Yellopages" and fill 'URL' and other information.<br /><br />15. Now Go To "Encoder" And select MP3 encoder and select 24kbp/s or 32kbp/s [according to your net speed].<br /><br />16. Now Go To "output" and see the status it should be showing that it is sending some bytes.<br /><br />[NOTE - if u don't see this or see disconnected then check if your radio status is on or not and if then also you see this jus recheck address and port and password.]<br /><br />17. If you have done till here now log on to listen2myradio and go to that url which you gave in "radio installation". Now it will show that wait for 5 seconds and then it will start playing!<br /><br />18. Now if it does not plays and shows ready then check your encoder stings it must be mp3.<br /><br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com1tag:blogger.com,1999:blog-3728889386696861471.post-45041287153767188672009-06-22T04:25:00.000-07:002009-06-22T04:39:37.414-07:009 Methods of More Fast Computer ;)<p align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_tgTEtTlkgJA/Sj9r9DzrVzI/AAAAAAAAAGM/dDqHQanISR0/s1600-h/windows_speed.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 195px; height: 200px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/Sj9r9DzrVzI/AAAAAAAAAGM/dDqHQanISR0/s200/windows_speed.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5350113579077687090" /></a>Your computer running Windows isn’t running in the same speed that it used to run when you first used it. It’s slower, crappy, takes a while to start and tests your patience like anything. There are many reasons for this, let’s try fixing up a few things on your slow Windows PC:</p><p align="left"><strong>Slow Start Up</strong></p><p align="left">There can be a variety of reasons to Windows loading slow during start up. Go to Run, type msconfig and hit enter. Under the ‘Start Up’ tab, uncheck the unwanted programs and press OK. Things should be a bit fine the next time Windows boots.<strong><br /><br /></strong>Another program worth mentioning here is StartUp Delayer which will help in setting after how much time programs should be loaded after Windows boots. For instance, you could set your instant messenger program to load 50 seconds after Windows starts up<strong>.<br /><br />Slow Loading Start Menu<br /></strong>If the Start Menu items are loading slowly, you can open the Registry Editor by typing in the Run menu ‘regedit.exe’ and pressing Enter. Go to HKEY_CURRENT_USER\Control Panel\Desktop. Look for MenuShowDelay, and double click to edit the value. The lower the number specified, the faster the Start Menu will load.<strong><br /><br />Slow Right Click Context Menu<br /></strong>Probably the Windows Right Click menu on your computer is loading slow because too many programs added unwanted entries there. Just download this program called Mmm, install it and then modify your context menu to remove unwanted items to speed it up.<strong><br /><br />'Send To' Menu Slow Send To Menu<br /></strong>If the Send To menu loads slowly, you can type ’sendto’ in the Run Dialog, and remove unwanted items in the Explorer Window that appears. This should add some speed to it.<strong><br /><br />Slow Defragmentation<br /></strong>The Windows Defragmenter can’t get any slower. You need to have an alternative to the Windows Defragmenter, and Defraggler is just one of the best ones available in the market. It’s free, and works like a charm and can speed up defragmentation manifold.<strong><br /><br />Slow loading My Computer Window<br /></strong>my-computer.jpg If the My Computer Window loads slowly, in the Explorer Window, go to Tools >> Folder Options >> View and uncheck ‘Automatically search for network folders and printers”<br /><br /><strong>Slow loading Add or Remove Programs Applet<br /></strong>This is one of the most annoying piece of programs present in Windows, it takes ages to load if you have a considerable number of programs installed on your computer. You can either use the all-in-one CCleaner for this purpose, or get MyUninstaller that comes as a speedy replacement for Add or Remove Programs.<strong><br /><br />Slow Ending of Unresponsive Programs<br /></strong>If you’ve clicked on ‘End Task’ if any program is running unresponsive, you might have noticed that the program is not terminated immediately. You can alter this by going to Run >> regedit.exe >> HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\ and change this value to 1000.<strong><br /><br />Disable Animations and Appearance Overhauls to maximize performance<br /></strong>If you’re a serious performance junkie, you probably won’t bother about eyecandy. Go to System Properties in the Control Panel. Click ‘Advanced’, then ‘Performance’ and click ‘Adjust for best performance’. This might boost your PC’s performance up a bit.</p><p align="left"><strong>+Plus Instructions : </strong></p><p align="left">- Always keep your computer clean. Remove Junk and Unnecessary registry entries. Use CCleaner for this purpose, one excellent tool that just does what it says.<br /><br />- Don’t keep installing software. Install a program only if it really serves you a purpose.<br /><br />- Keep as less programs as possible running on the System Tray. This essentially means reducing the number of programs that start during Windows start up.<br /><br /><strong><br /><br /></strong></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com1tag:blogger.com,1999:blog-3728889386696861471.post-29639546106167755712009-06-21T23:58:00.000-07:002009-06-22T00:06:50.085-07:00Alternative Of Win Explorer: Snowbird<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_tgTEtTlkgJA/Sj8r_2fuAeI/AAAAAAAAAF0/PK_jBDYx6Ks/s1600-h/microsoft_windows.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 128px; height: 128px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/Sj8r_2fuAeI/AAAAAAAAAF0/PK_jBDYx6Ks/s400/microsoft_windows.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5350043258299744738" /></a>Snowbird is a lightweight Windows Explorer alternative that offers its users some extended functionality. The portable software program is compatible with Windows XP and above and comes with a tiny size of 468 Kilobytes unpacked.The interface of the computer program has been divided into three areas. The header area containing menus and the breadcrumb navigation, the left sidebar that contains a list of all local and network drives including their folders and the main area that displays the files and folders that are located in the current directory level.</div><div align="left">Some might say that this does not sound exciting enough to give it a try. Snowbird comes with an advanced feature set that might entice some users to give it a try though.</div><div align="left"></div><div align="left"></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 286px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/Sj8sQ5B1cAI/AAAAAAAAAF8/P6iazKLNI8M/s400/windows_explorer_snowbird-500x358.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5350043551037485058" /></div><p align="left">The Windows Explorer alternative offers a search form right in the interface which can search for files, folders and even file contents. It is furthermore possible to navigate with mouse gestures which can speed up folder navigation quite a bit.</p><p align="left">The overall speed of Snowbird is fast, faster than that of Windows Explorer especially when navigating in network shares and large local folders. There is however one aspect that is not well designed. The only way to copy or move files is to mark them, right-click and select the appropriate option from the menu. In other words: Drag and drop is not supported</p><p align="left"></p><p align="left"><strong>For Download Snowbird <a href="http://lmadhavan.com/software/snowbird/"><span style="color:#cc0000;">CLICK HERE!</span></a></strong></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-48323614897739198912009-06-19T03:43:00.000-07:002009-06-19T04:07:16.098-07:00POP3 Configuration For Gmail<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sjtu6phwm2I/AAAAAAAAAFk/RS55WR6WPoY/s1600-h/gmail_logo.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 133px; height: 62px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sjtu6phwm2I/AAAAAAAAAFk/RS55WR6WPoY/s400/gmail_logo.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348990936291515234" /></a>I read several emails lately that asked me how to setup email clients so that they could retrieve Gmail emails using the POP3 protocol on Outlook, thunderbird etc. The Gmail POP3 configuration is fortunately not that complex: The major problem that most users run into is that POP3 has to be enabled in the Gmail web interface before they can actually retrieve their emails in another email client.<br />Enabling POP3 in Gmail is therefor a two-step process. POP3 needs to be enabled on the Gmail website first before the other email client is configured to connect to Gmail using the POP3 protocol.</div><div align="left"><br /><strong>Enabling Gmail POP3</strong></div><div align="left"><strong></strong><strong><br /></strong>Open the Gmail homepage, log into your Gmail account and click on the [Settings] link in the top right corner of the screen to open the Gmail configuration. Now select the [Forwarding and POP/IMAP] link which should open a page just like the one you see below on the screenshot.<br /><br /></div><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 158px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/SjtvZrzMWCI/AAAAAAAAAFs/s32KhdrJlWg/s400/gmail_pop3-500x198.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348991469477451810" /></p><p align="left"><br />You basically got two options here to enable POP3. The first [Enable POP for all mail (even mail that's already been downloaded)] enables POP3 in Gmail for all email messages even those that have already been retrieved while the second [Enable POP for mail that arrives from now on] enables POP3 from that moment on which means that old emails cannot be retrieved. A click on the Save Changes button will save the changes and allow POP3 connections.</p><p align="left"><strong><br />Gmail POP3 Data</strong></p><p align="left"><br />It is time to create the accounts in the email client now that POP3 has been enabled in Gmail. The procedure is different depending on the email client at hand. Below are the values that need to be entered into the email client.</p><p align="left"><strong><br />Email Address:</strong> Enter your full Gmail email address<br /><strong>Password:</strong> Enter your email password<br /><strong>Incoming Server:</strong> pop.gmail.com<br /><strong>Incoming Server Port:</strong> 995<br /><strong>Outgoing Server:</strong> smtp.gmail.com<br /><strong>Outgoing server (SMTP) port:</strong> 587<br /><strong>Encryption: </strong>TLS</p><p align="left">That's enough ;)<br /><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-24031789640525745362009-06-18T22:47:00.000-07:002009-06-18T22:57:32.962-07:00Free Spyware Clean Tools<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sjsnra9RPnI/AAAAAAAAAFM/Rd-ubJuxo5A/s1600-h/microsoft_windows.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 128px; height: 128px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sjsnra9RPnI/AAAAAAAAAFM/Rd-ubJuxo5A/s320/microsoft_windows.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348912609356758642" /></a>There are hundreds if not thousands of free spyware removal tools for the Windows operating system. The choice ranges from to popular spyware removal tools such as Windows Defender, Spybot Search And Destroy or Spyware Terminator to lesser known anti spyware software programs and even so called rogue applications that look like spyware removal tools but are in fact malicious in nature. <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sjsnra9RPnI/AAAAAAAAAFM/Rd-ubJuxo5A/s1600-h/microsoft_windows.jpg"><br /></a><br />This article will concentrate on two lesser known free spyware removal tools. The first program is called Roguefix. It has been designed to counter so called rogue applications. The tool has been specifically designed to remove rogue scanners, desktop and homepage hijackers, trojans, codecs and miscellaneous malware.<br /><br /></div><div align="left"><a href="http://www.internetinspiration.co.uk/roguefix.htm"><span style="color:#990000;"><strong>Roguefix</strong></span></a> comes as a simple batch file that has to be executed in Windows safe mode.</div><div align="left"></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 162px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjsoBpq_ejI/AAAAAAAAAFU/K6lKD_tK6Tg/s320/free_spyware_removal_tools-500x252.gif" border="0" alt="" id="BLOGGER_PHOTO_ID_5348912991263750706" /></div><div align="left">The tool will then scan the operating system for spyware and remove detected spyware automatically from the computer system. The free spyware cleaner is only compatible to the Windows XP operating system according to the software developer.<br /><br /><a href="http://siri.urz.free.fr/Fix/SmitfraudFix_En.php"><strong><span style="color:#990000;">SmitfraudFix</span></strong></a> on the other hand can scan a Windows XP or Windows 2000 operating system directly. The user needs to boot into safe mode for the removal process though. The program will generate a report after the scan which will list all the malicious files found after the spyware scan.</div><div align="left"></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 162px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/SjsoZAWCFhI/AAAAAAAAAFc/fTNzEUulmP4/s320/spyware_removal_tool-500x252.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5348913392486848018" /></div><div align="left"></div><div align="left">Both tools have been designed to detect and remove rogue applications only which does limit their usefulness in day to day spyware scans. It is however a good idea to have them at hand in case the computer system gets infected by rogue spyware.<br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com1tag:blogger.com,1999:blog-3728889386696861471.post-24065764380845322912009-06-17T22:03:00.000-07:002009-06-17T22:17:19.007-07:00Five Rapidshare Search Way<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjnLtWJwsZI/AAAAAAAAAE0/pTXYHvpM0wE/s1600-h/rslogo.gif"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 250px; height: 178px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjnLtWJwsZI/AAAAAAAAAE0/pTXYHvpM0wE/s320/rslogo.gif" border="0" alt="" id="BLOGGER_PHOTO_ID_5348530012380246418" /></a>Rapidshare is a file hosting goldmine if you know how to search it properly. There are basically two ways to do that. First, you can use Google search parameters to search Rapidshare. Several websites offer a basic search interface that does nothing more than to add the parameters to your searches and display the Google search results. Then there is a different kind of website that has its own database and performs searches using it.<br /></div><div align="left"><br />The second kind of site tends to be more up to date because they use several sources for finding new Rapidshare files including user submitted ones. I do not like the first kind of sites to search Rapidshare that much because I can enter those parameters by myself into a search engine like Google and get the desired results.<br /><br />To be able to compare the Rapidshare search engines I have performed searches for the terms “video”, “avi” and “windows”. Finding files is one thing but finding working files on file hosting websites and keeping the file database up to date deleting files that have been removed from the file hosting website properly is another. This has also been born in mind. <br /><br />I did check three results for each search term, namely the first, fifth and tenth entry to see if the links were not broken.<br /><br />A basic search engine and site that does nothing more than to offer a search form and a results page<br /><br /></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 60px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjnMe8rEwFI/AAAAAAAAAFE/dzDVg-nfEQk/s320/tvphp.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348530864534110290" /><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 56px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/SjnMeiaw4kI/AAAAAAAAAE8/5jtxMg4SZ4I/s320/filecrop.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348530857486377538" /></div><div align="left"><strong><span style="color:#cc0000;">RAPID SEARCH ENGINES:</span></strong></div><div align="left"><a href="http://rapid.tvphp.net/"><strong>http://rapid.tvphp.net</strong></a></div><div align="left"><a href="http://www.filecrop.com/"><strong>http://www.filecrop.com</strong></a></div><div align="left"><a href="http://www.rapidsharedata.com/"><strong>http://www.rapidsharedata.com</strong></a></div><div align="left"><a href="http://www.xoogo.com/"><strong>http://www.xoogo.com</strong></a></div><div align="left"><a href="http://www.rapidlibrary.com/"><strong>http://www.rapidlibrary.com</strong></a></div><div align="left"></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-25285462079763284112009-06-17T04:30:00.001-07:002009-06-17T04:43:03.972-07:00The car that makes its own fuel<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjjUuvKWtNI/AAAAAAAAAEc/uHWIHNEvk54/s1600-h/231005_Ford-Shelby.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 250px; height: 188px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjjUuvKWtNI/AAAAAAAAAEc/uHWIHNEvk54/s320/231005_Ford-Shelby.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348258456901432530" /></a><strong>A unique system that can produce Hydrogen inside a car using common metals such as Magnesium and Aluminum was developed by an Israeli company. The system solves all of the obstacles associated with the manufacturing, transporting and storing of hydrogen to be used in cars. When it becomes commercial in a few years time, the system will be incorporated into cars that will cost about the same as existing conventional cars to run, and will be completely emission free.</strong><br /></div><div align="left">As President Bush urges Americans to cut back on the use of oil in wake of the recent surge in prices, more and more people are looking for more viable alternatives to the use of petroleum as the main fuel for the automotive industry. IsraCast recently covered the idea developed at the Weizmann Institute to use pure Zinc to produce Hydrogen using solar power. Now, a different solution has been developed by an Israeli company called Engineuity. Amnon Yogev, one of the two founders of Engineuity, and a retired Professor of the Weizmann Institute, suggested a method for producing a continuous flow of Hydrogen and steam under full pressure inside a car. This method could also be used for producing hydrogen for fuel cells and other applications requiring hydrogen and/or steam.<br /><br />The Hydrogen car Engineuity is working on will use metals such as Magnesium or Aluminum which will come in the form of a long coil. The gas tank in conventional vehicles will be replaced by a device called a Metal-Steam combustor that will separate Hydrogen out of heated water. The basic idea behind the technology is relatively simple: the tip of the metal coil is inserted into the Metal-Steam combustor together with water where it will be heated to very high temperatures. The metal atoms will bond to the Oxygen from the water, creating metal oxide. As a result, the Hydrogen molecules are free, and will be sent into the engine alongside the steam. <br />The solid waste product of the process, in the form of metal oxide, will later be collected in the fuel station and recycled for further use by the metal industry.<br /><br />Refuelling the car based on this technology will also be remarkably simple. The vehicle will contain a mechanism for rolling the metal wire into a coil during the process of fuelling and the spent metal oxide, which was produced in the previous phase, will be collected from the car by vacuum suction.</div><div align="left"></div><div align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 250px; height: 176px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjjVIGBahZI/AAAAAAAAAEk/GTIhlDTPN4Q/s400/231005_system1.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5348258892534678930" /></div><div align="left">Beside the obvious advantages of the system, such as the inexpensive and abundant fuel, the production of Hydrogen on-the-go and the zero emission engine, the system is also more efficient than other Hydrogen solutions. The main reason for this is the improved usage of heat (steam) inside the system that brings that overall performance level of the vehicle to that of a conventional car. In an interview, Professor Yogev told IsraCast that a car based on Engineuity's system will be able to travel about the same distance between refueling as an equivalent conventional car. The only minor drawback, which also limits the choice of possible metal fuel sources, is the weight of the coil. In order for the Hydrogen car to be able to travel as far as a conventional car it needs a metal coil three-times heavier than an equivalent petrol tank. Although this sound like a lot in most cars this will add up to about 100kg (220 pounds) and should not affect the performance of the car. <br /><br />Engineuity is currently in the advanced stages of the incubator program of the Chief Scientist in Israel, and is seeking investors that will allow it to develop a full scale prototype. Given the proper investment the company should be able to develop the prototype in about three years. The move to Hydrogen based cars using Engineuity's technology will require only relatively minor changes from the car manufacturer's point of view. Since the modified engine can be produced using existing production lines, removing the need for investment in new infrastructures (the cost of which is estimated at billions of dollars), the new Hydrogen cars would not be more expensive. Although Engineuity's Hydrogen car will not be very different from existing conventional cars, the company is not currently planning an upgrade kit for existing cars but is concentrating on building a system that will be incorporated into new car models. <br /><br />Possibly the most appealing aspect of the system is the running cost. According to Yogev, the overall running cost of the system should be equal to that of conventional cars today. Given the expected surge in oil prices in the near future Engineuity's Hydrogen car could not come too soon.<br /><br /></div><div align="left"></div><div align="left"><strong><br /><br /></strong></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-11071233571252623052009-06-16T22:55:00.000-07:002009-06-16T23:00:47.070-07:00Internet Explorer Removed From Windows 7 In EU<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/SjiFlAQXwzI/AAAAAAAAAEE/z-GyiGeptAU/s1600-h/internet_explorer_8.png"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 128px; height: 128px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/SjiFlAQXwzI/AAAAAAAAAEE/z-GyiGeptAU/s320/internet_explorer_8.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5348171428272784178" /></a>We all have heard the news that the European Union made the “suggestion” that <strong>Microsoft</strong> should bundle additional web browsers with their upcoming operating system <strong>Windows 7</strong> to make up for failings in the past and to embrace competition. Many users felt that this move was entirely unnecessary as users who wanted a new web browser were able to get one minutes after finishing the installation of the Windows operating system. The success of the <strong>Firefox </strong>web browser in European countries demonstrated as well that it was possible to compete with <strong>Internet Explorer</strong> without having to be supplied with an operating system.<br /><br />While the intention might have been good the whole suggestion was clearly aiming for troubles. Some questions that came up where about the web browsers that should be supplied with the operating system. Who would pick the ones that would be supplied, who would make the decision to not supply a web browser and why.<br /><br />It seems though that the suggestion has backfired as Microsoft announced that they will not ship Windows 7 with a version of Internet Explorer in the European Union which in turn means that the operating system will ship without web browser at all. Veteran Internet users might be reminded of times back then when web browsers were supplied on floppy disks or CDs and this is apparently going to happen in 2009 again. History repeats itself so to say, at least in the EU.<br /><br />The browser-less versions, dubbed Windows 7 “E”, will be distributed in all members of the European Economic Area as well as Croatia and Switzerland. In addition, Microsoft will strip the browser from the Europe-only “N” versions of Windows 7, which also removes the Windows Media Player from the operating system and is the result of another move by Europe’s antitrust authorities. <br /><br />“Microsoft will not offer for distribution in the European territory the Windows 7 product versions that contain IE, which are intended for distribution in the rest of the world,” Microsoft said in the memo. “This will apply to both OEM and Retail versions of Windows 7 products.” <br /><br />“To ensure that Microsoft is in compliance with European law, Microsoft will be releasing a separate version of <strong>Windows 7</strong> for distribution in Europe that will not include Windows Internet Explorer,” the software maker said in the memo. “Microsoft will offer IE8 separately and free of charge and will make it easy and convenient for PC manufacturers to preinstall IE 8 on Windows 7 machines in Europe if they so choose. PC manufacturers may choose to install an alternative browser instead of <strong>IE 8</strong>, and has always been the case, they may install multiple browsers if they wish.”<br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-31901956146189167752009-06-16T00:50:00.000-07:002009-06-16T01:01:01.951-07:00Finally Find: J. Device Uses Laser Plasma to Display 3D Images in the Air<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjdQHOU_-eI/AAAAAAAAAD0/gs210uJFdSs/s1600-h/air_plasma_3d.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 150px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjdQHOU_-eI/AAAAAAAAAD0/gs210uJFdSs/s200/air_plasma_3d.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347831167561234914" /></a><strong>A collaboration of the Japanese National Institute of Advanced Industrial Science and Technology (AIST), Keio University and Burton Inc. has produced a device to display "real 3D images" consisting of dot arrays in empty space.</strong><br /></div><p align="left"></p><p align="left"></p><p align="left"></p><p align="left">Many previous displays in 3D have been virtual images on 2D planes which, due to human binocular disparity, appear as 3D. However, the limitation of our visual field and the physical discomfort caused by wrongly identifying virtual images makes these displays less than perfect.<br /><br />The new device uses the plasma emission phenomenon near the focal point of focused laser light. By controlling the position of the focal point in the direction of the x-, y-, and z-axes, real 3D-images in air (3D-space) can be displayed.</p><p align="left"></p><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 184px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/SjdQTMMUhlI/AAAAAAAAAD8/zA8_sMOtq2c/s320/air_plasma_techniq.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347831373146392146" /></p><p align="left">Our living space and the objects within it are three-dimensional but while 3D imaging is well documented on the Internet, we don’t see "real 3D-images" on our computer screens. This is because our monitors are unable to display them.<br /><br />Keio University and Burton Inc. noticed that, when laser beams are strongly focused, air plasma emission can only be induced near the focal point. So, they experimented by fabricating a device to display 2D-images in the air. The images are constructed from dot arrays produced by a technique combining a laser light source and galvanometric mirrors. To form 3D-images in the air, the scanning of the focal point in the depth direction along the laser optical axis is essential. However, to do this, the quality of the laser and the technique for varying the position of the focal point must be improved. This explains why we do not yet have the technology to display 3D images.<br /><br />By modifying the 2D image device with a linear motor system and a high-quality and high-brightness infrared pulse, the AIST, Keio University and Burton Inc. created a spatial display of "real 3D images" consisting of dot arrays.<br /><br />The linear motor system can vary the position of the laser focal point by high-speed scanning of a lens set on the motor orbit. Incorporation of this system makes the image scanning in the direction of the z-axis possible. For scanning in the x and y axis directions, conventional galvanometric mirrors are used.<br /><br />The high-quality and high–brightness infrared pulsed laser (repetition frequency of pulse: approximately 100 Hz), enables plasma production to be more precisely controlled, resulting in brighter and higher contrast image drawing. Furthermore, the distance between the device and drawing points can be extended by several meters.<br /><br />The emission time of the laser pulse light is approximately a nanosecond (10-9 sec). The device uses one pulse for each dot. The human eye will recognize the after-image effect of plasma emission from displays up to 100 dot/sec. By synchronizing these pulses and controlling them with software, the device can draw any 3D objects in air.</p><p align="left"><br /><br /></p><p align="left"><strong><br /><br /></strong></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-59315338844249561492009-06-15T22:52:00.000-07:002009-06-15T23:00:14.497-07:00MS Vista Theme Customization<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/Sjczyl9O2oI/AAAAAAAAADc/d-9fD-lOnxo/s1600-h/windows-vista-logo-1.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 200px; height: 146px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/Sjczyl9O2oI/AAAAAAAAADc/d-9fD-lOnxo/s200/windows-vista-logo-1.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347800026801166978" /></a>Microsoft put a lot of effort into making Windows Vista a visually compelling operating system. The system still has the same Windows Vista theme protections in place that make it impossible to add custom themes to Windows Vista. There is also no easy way to change elements like the boot logo or system icons in Windows Vista.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/Sjczyl9O2oI/AAAAAAAAADc/d-9fD-lOnxo/s1600-h/windows-vista-logo-1.jpg"><br /></a><br />The Windows Vista theme customization application Vista Visual Master changes that. It is a all in one solution for everyone who wants to customize the Windows Vista theme and appearance. The application can be divided into two sections. The first deals directly with the Windows Vista theme while the second takes care of system settings that relate to the visual appearance of Windows Vista.<br /><br />One of the most important aspects of Windows Vista theme customization is patching the uxtheme.dll file in Windows Vista to be able to apply custom themes to the operating system. This option is available in Vista Visual Master. The same menu contains an option to change the Windows Vista theme directly to another one.<br /><br /></div><p align="left">Other options that relate to the visual appearance of Windows Vista are the abilities to change Windows vista icons, logon pictures and the vista boot screen. All options are easily accessible and there is always an option to restore to defaults with should ease the minds of users who feel uncomfortable about changing system files in Windows Vista.</p><p align="left"></p><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 272px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Sjc0AUx9dmI/AAAAAAAAADk/3ifcFZNQ9UY/s320/windows_vista_theme.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347800262708655714" />The second section is just the usual Windows Vista tweaker with the only difference that the available settings relate to visual effects on the system. It is for instance possible to remove icons from the computer deskop, remove shortcut arrows and to disable the changing of wallpapers in Windows Vista.<br /><br />The main use of the tool is to customize the Windows Vista theme. It works flawlessly and creates backups of the most important files which come in handy if something goes wrong along the way.</p><p align="left"><span style="color:#ff0000;">For More Theme <a href="http://www.vista123.net/"><strong>CLICK HERE!</strong></a></span><br /><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-4799364021250311532009-06-15T03:46:00.000-07:002009-06-15T03:50:51.610-07:00Earth-Venus smash-up possible in 3.5 billion years<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjYnMl2iDyI/AAAAAAAAADU/3z5LaX2tlsA/s1600-h/venus.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 220px; height: 123px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjYnMl2iDyI/AAAAAAAAADU/3z5LaX2tlsA/s320/venus.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347504704821792546" /></a><strong>This undated handout illustration provided by Nature Publishing group shows what a collision between Earth and Venus might look like. A force known as orbital chaos may cause our Solar System to go haywire, leading to possible collision between Earth and Venus or Mars, according to a study</strong><br /></div><div align="left"></div><div align="left"><br />The good news is that the likelihood of such a smash-up is small, around one-in-2500.<br /><br />And even if the planets did careen into one another, it would not happen before another 3.5 billion years.<br /><br />Indeed, there is a 99 percent chance that the Sun's posse of planets will continue to circle in an orderly pattern throughout the expected life span of our life-giving star, another five billion years, the study found.<br /><br />After that, the Sun will likely expand into a red giant, engulfing Earth and its other inner planets -- Mercury, Venus and Mars -- in the process.<br /><br />Astronomers have long been able to calculate the movement of planets with great accuracy hundreds, even thousands of years in advance. This is how eclipses have been predicted.<br /><br />But peering further into the future of celestial mechanics with exactitude is still beyond our reach, said Jacques Laskar, a researcher at the Observatoire de Paris and lead author of the study.<br /><br />"The most precise long-term solutions for the orbital motion of the Solar System are not valid over more than a few tens of millions of years," he said in an interview.<br /><br />Using powerful computers, Laskar and colleague Mickael Gastineau generated numerical simulations of orbital instability over the next five billion years.<br /><br />Unlike previous models, they took into account Albert Einstein's theory of general relativity. Over a short time span, this made little difference, but over the long haul it resulted in dramatically different orbital paths.<br /><br />The researchers looked at 2,501 possible scenarios, 25 of which ended with a severely disrupted Solar System.<br /><br />"There is one scenario in which Mars passes very close to Earth," 794 kilometres (493 miles) to be exact, said Laskar.<br /><br />"When you come that close, it is almost the same as a collision because the planets gets torn apart."<br /><br />Life on Earth, if there still were any, would almost certainly cease to exist.<br /><br />To get a more fine-grained view of how this might unfold, Laskar and Gastineau ran an additional two hundred computer models, slightly changing the path of Mars each time.<br /><br />All but five of them ended in a two-way collision involving the Sun, Earth, Mercury, Venus or Mars. A quarter of them saw Earth smashed to pieces.<br /><br />The key to all the scenarios of extreme orbital chaos was the rock closest to the Sun, found the study, published in the British journal Nature.<br /><br />"Mercury is the trigger, and would be be the first planet to be destabilised because it has the smallest mass," explained Laskar.<br /><br />At some point Mercury's orbit would get into resonance with that of Jupiter, throwing the smaller orb even more out of kilter, he said.<br /><br />Once this happens, the so-called "angular momentum" from the much larger Jupiter would wreak havoc on the other inner planets' orbits too.<br /><br />"The simulations indicate that Mercury, in spite of its diminutive size, poses the greatest risk to our present order," noted University of California scientists Gregory Laughlin in a commentary, also published in Nature.<strong><br /><br /></strong></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-62984342530331826582009-06-14T23:12:00.000-07:002009-06-14T23:18:47.364-07:00New Face Of Security: Windows Defender<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/SjXmdgrewII/AAAAAAAAACs/iN-KIWBemFc/s1600-h/windows_defender_small.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 179px; height: 61px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/SjXmdgrewII/AAAAAAAAACs/iN-KIWBemFc/s320/windows_defender_small.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347433527235231874" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.microsoft.com/windows/products/winfamily/defender/default.mspx"><span style="color:#cc0000;">Windows Defender</span></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.microsoft.com/windows/products/winfamily/defender/default.mspx"><span style="color:#000000;"> is a Microsoft security software product that is included in the Windows Vista and Windows 7 operating system. It is also available as an option download for the Windows XP system. The program is a anti-spyware program that can scan a computer system for malicious software and delete or quarantine the findings.</span></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/SjXmdgrewII/AAAAAAAAACs/iN-KIWBemFc/s1600-h/windows_defender_small.jpg"><br /></a><br /></div><p align="left">Windows Defender comes with the usual options to automatically update the program and schedule regular system scans to protect the computer system. Default actions for low, medium and high alerts can be defined that will be executed by the anti-spyware program automatically.<br /><br /><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 256px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjXmxq0HOeI/AAAAAAAAAC0/7R4ZRicY_Kg/s320/windows_defender.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5347433873553177058" /></p><p align="left">Microsoft’s anti-spyware solution comes with the interesting advanced tool Software Explorer which can display extensive information about startup programs, currently running programs, network connected programs and Winsock service providers.<br /><br />Each program and provider is sorted by company which makes it easier to find non-Microsoft programs that are running or connected to the computer system. <br /><br />Microsoft has improved <a href="http://www.microsoft.com/windows/products/winfamily/defender/default.mspx"><span style="color:#cc0000;"><strong>Windows Defender</strong></span></a> over the years. The company did receive lots of criticism in the beginning which can be attributed to a low spyware detection rate. Several anti-spyware products have performed better in tests, outlined here or here. Please note that the tests linked in this article have been performed about 10 months ago and that the situation may have changed in the mean time.<br /><br />Which leads to the question: Are you running anti-spyware software? If so which?<br /><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-42973593756894223792009-06-12T00:23:00.000-07:002009-06-12T00:35:04.162-07:00Free Antivirus Protection Offer From Microsoft<p align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_tgTEtTlkgJA/SjIDpx4CTnI/AAAAAAAAACM/N11Z6A0Z_xk/s1600-h/morroantivir.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 180px; height: 119px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/SjIDpx4CTnI/AAAAAAAAACM/N11Z6A0Z_xk/s200/morroantivir.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5346339723940089458" /></a><strong>Microsoft is gearing up to offer Windows users a free real-time antivirus protection. Code name Morro, the antivirus product will be a hosted service. Morro works by routing all users Internet traffic to a Microsoft datacenter, where the application will process the traffic and identify and block malware in real-time, by examining all of the rerouted traffic.</strong></p><p align="left">Microsoft says Morro will be released as a public beta first. However there is no word on the final release. The question is will Windows users trust their PC to a beta hosted antivirus product? Or is this just another marketing strategy that will give Windows 7 the perception it has anti-malware technology built-in?<br /><br />Microsoft claims that Morro will help them build better products in the future, by being on the leading edge of malware protection. This will help Microsoft understand how malware develops, spreads and infiltrates systems. <br /><br />There will be questions that Microsoft will have to address by the Windows community before they expect users to try their free product. Some of the questions that will need to be answered are: <br /><br /><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 180px; height: 200px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjIEMfw9YzI/AAAAAAAAACU/7ojRQDR4B50/s200/antivirus.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5346340320373990194" />• Will there be any impact on Windows performance? <br />• Will Morro be implemented in Microsoft's other Operating Systems? <br />• What happens when a computer is not connected to the internet? <br />• Will the product remain up-to-date? <br />• What user information will be routed to Microsoft's servers?<br /><br />These are only a few of the many questions that Microsoft will have to answer. <br />Since Morro is only a real-time malware protection antivirus, I don't see the majority of Windows users switching over to this free service. Companies like Symantec and McAffe also offer spam, identity and network security protection that is not mentioned in Morro's hosting service.<br /><br />Only time will tell if Morro's real-time malware protection will gain momentum and be of any use to the personal PC community and the corporate IT departments.<strong><br /><br /></strong></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-22767715509360259312009-06-12T00:11:00.000-07:002009-06-12T00:21:03.763-07:00Find a way: A New Type of Atomic Clock<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjIBdyxF6DI/AAAAAAAAACE/wbDMv_9rB8g/s1600-h/Atomic-Clock-1.gif"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 200px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/SjIBdyxF6DI/AAAAAAAAACE/wbDMv_9rB8g/s200/Atomic-Clock-1.gif" border="0" alt="" id="BLOGGER_PHOTO_ID_5346337318997714994" /></a>Physicists from the University of New South Wales, Australia and the University of Nevada, Reno propose a method to reduce the size of atomic clocks to handy, compact devices using specially engineered optical lattices.<br /><br />Optical lattices are created by trapping atoms in a standing wave light field formed by laser beams. But the lasers can hamper the time keeping ability of the atoms. By applying an external magnetic field to the lattice in a specific direction, the atomic clock is rendered insensitive to the laser field strength. This property allows the atomic clock to function properly at a smaller size.<br /><br />While a portable cesium clock could benefit numerous scientific and general applications, the expected accuracy of the optical lattice clocks has yet to be explored. Calling for further theoretical and experimental investigation, the authors assert that even if the precision of such clocks turns out to be less competitive than the fountains, the optical lattice clocks have a clear advantage of a smaller apparatus size, making them useful in applications like navigation systems and precision tests of fundamental symmetries in space.<br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-24157150275213763442009-06-11T00:56:00.000-07:002009-06-11T01:03:07.170-07:00Very Dangerous Web Search Words<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjC5N3lFDjI/AAAAAAAAAB0/c2Iae8Rk_1w/s1600-h/google_search.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 320px; height: 239px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/SjC5N3lFDjI/AAAAAAAAAB0/c2Iae8Rk_1w/s320/google_search.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345976405597687346" /></a>Which search terms would make it on the list if you would have to compile a list of the ten most dangerous web search terms? Most users would probably add search terms like warez, cracks and sex when asked to compile a top ten list. A recent McAfee study on the other hand came to a completely different conclusion. The ten most dangerous web search terms are everyday search terms that cannot be connected easily with malicious intent. The top spot is occupied by searches for Screensavers, followed by free games, work from home and Rihanna with Barrack Obama, the iPhone and Taxes in the list as well. It should however be noted that the top 10 list is made up of categories and not single search terms.<br /></div><p align="left">These search terms are more dangerous than, lets say warez, because most users know that warez can lead to malicious software quite easily while they most likely do not suspect the same from these popular search terms.</p><p align="left">Please Be careful and use an internet security packet or an antivirus with firewall.</p><p align="left">Have a nice day ;)</p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-74999022355664950632009-06-10T03:35:00.000-07:002009-06-10T04:25:20.828-07:00AutoAdminLogon Setting On Vista RegistryThe idea behind AutoAdminLogon is that a user(name) can logon at a computer without having to type a password. A typical scenario would be a test machine on a private network. With AutoAdminLogon enabled, when you restart the machine it automatically logs on a named user. The trick, which also its liability, is to set a value for DefaultPassword in the registry.<br /><div align="justify"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 320px; height: 215px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/Si-NUc-wuAI/AAAAAAAAABk/-xQbpelAOg0/s320/vista_regedit.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345646665228400642" /><strong>1.</strong>Launch Regedit</div><div align="justify"><strong>2.</strong>Navigate to:<br />HKLM\Software\Microsoft\Windows NT\CurrentVersion\winlogon <br />Set: AutoAdminLogon = 1 (one means on, zero means off)</div><div align="justify"><strong>3</strong>.Tip: Try Regedit's 'Find': AutoAdminLogon</div><div align="justify"><strong>4.</strong>Create a new String Value called DefaultPassword<br />Set: DefaultPassword = "P@ssw0rd"<br /></div><div align="justify"><strong>5.</strong>Check for the existence of a REG_SZ called DefaultUserName. The value should reflect the user who you wish to logon automatically. If this value does not exist, then right-click in the right pane, New, REG_SZ, name it, DefaultUserName. Set the string value to the required UserName.</div><div align="justify"><strong>6.</strong>Optional Item:<strong> </strong>If your Vista Machine has joined a domain, then create a String Value called DefaultDomainName.  Set: DefaultDomainName = "OnlyYouKnowDomain"<br /><strong><br />Here is a summary of the four key registry settings:</strong><br />"AutoAdminLogon"="1"<br />"DefaultUserName"="xxx"<br />"DefaultPassword"="xxxx0xxxx"<br />"DefaultDomainName"="xxx.xxx". Definitely needed in a domain situation.<br /><br /></div><div align="left"><p><strong>Key Learning Points</strong><br /><strong>*</strong>Do you find the AutoAdminLogon value in HKCU** or HKLM?<br />Answer: HKLM<br /><strong>*</strong>Do you have to add a value, or modify an existing setting? <br />Answer: Modify 0 --> 1.<br /><strong>*</strong>Is it a String Value or a DWORD?<br />Answer: These are all REG_SZ (String value).<br /><strong>*</strong>Do you need to Restart, or merely Logoff / Logon? <br />Answer: Restart<br /><strong>*</strong>Extra Information: With AutoAdminLogon you also need to create a REG_SZ called, DefaultPassword, and possibly another called DefaultDomainName.<br />If you ever need to breakout of AutoAdminLogon, hold down the shift key as Vista initializes and the user logs on. What the shift key does is enable you to logon as a different user.</p><p><strong><br />Addendum for Vista Home Editions</strong></p><p align="left"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 320px; height: 165px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/Si-ScGApOhI/AAAAAAAAABs/mUyakUkb7Zg/s320/password_enter.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345652294059375122" />I have been using AutoAdminLogon since NT 3.5, however, in Vista Home editions there is a much easier alternative, namely tick: 'Users must enter a user name and password'.<br /><br />Navigate to the Control Panel, User Accounts and finally click on the Users tab, then remove the tick in:<br />'Users must enter a user name and password'. All you need to do next is type the password twice in the, 'Automatically Log On' dialog box. See screenshot. Once you restart Vista, it will logon that user automatically.<br /><br />Double-check the logic of what you are ticking. Also, when you set a registry value to one or zero, read the value carefully. Half of all people who write and say 'Guy that tweak did not work', have not understood the logic, double negatives are a particular source of errors. <br /><br />Before you try the above configuration, note: I did not, repeat, not find this setting in a machine which had joined an Active Directory domain. <br /><br />Just out of interest I would check the registry to see how AutoAdminLogon has been configured (Regedit, Edit (menu) find AutoAdminLogon).<br /></p><p align="left"><br /><strong>Creating a .Reg File<br /></strong>For my solution to work, I needed the same settings on all 8 machines. Thus from my machine I exported the HKLM\Software\Microsoft\Windows NT\CurrentVersion\winlogon branch of the registry into a .reg file, which I then imported to each of the delegates machines. No more problems with logging on after that. Training is the classic place to try these naughty but nice tricks; another scenario for AutoAdminLogon is for test machines not connected to a production network.<br /><br /><br /><br /><br /><br /></p></div><div align="left"><br /><br /><br /><br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-67433914524977329992009-06-10T03:08:00.000-07:002009-06-10T04:22:42.250-07:00IE Password Management Add-on<div align="left"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 128px; height: 128px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Si-GticQAAI/AAAAAAAAABM/2K9Z1fyHemc/s320/iexplorer8.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5345639399609597954" />Last Pass is a password management add-on for Microsoft’s Internet Explorer that can store login credentials to web services in a securely encrypted password vault. The password manager is compatible with most editions of Internet Explorer including the latest Internet Explorer 8 edition that has been released a while ago. The passwords are stored in encrypted form on the Last Pass servers which comes in handy for several reasons. <br /><br /></div><p align="left">It is for example possible to access the passwords on other computer systems without having to carry them around on storage devices like USB sticks. And since Last Pass is not only compatible with Internet Explorer it comes also handy for users who work with web browsers like Firefox. It is basically possible to share passwords and other data between Internet Explorer and Firefox this way.<br /><br /></p><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 195px; height: 273px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/Si-HDBMQ7VI/AAAAAAAAABU/p83KOwMysjI/s320/pass.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5345639768641301842" />The download of the password management software is cross-browser compatible. It can install the add-on in both Internet Explorer and Mozilla Firefox at the same time. New users can create an account during the installation while existing users need to supply their login credentials to end the installation.<br /><br />Last Pass adds a button to the Internet Explorer toolbar that provides quick access to most of the features offered by the password management software. It is for example possible to open some of the recently opened websites, switch identities, edit the preferences or add secure notes.<br /><br />Password Management is not the only feature offered by Last Pass. The program can store notes in the password vault and offers an option to create form profiles to fill out forms on websites more easily.<br /><br />The add-on will automatically recognize username and password forms on websites and act accordingly. It can fill out the form automatically if the login credentials are already stored in its database. New passwords can be generated with the versatile password generator. Last Pass is definitely one of the best password management tools.</p><p align="left"><br /><a href="https://lastpass.com/download.php"><strong><span style="color:#3333ff;">Download Last Pass Software</span></strong></a></p><div align="left"><br /><br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-70390808850235291222009-06-09T03:42:00.000-07:002009-06-10T04:20:54.321-07:00New Windows Task Manager Alternative "DTaskManager"<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_tgTEtTlkgJA/Si48zokYlkI/AAAAAAAAAA8/wlnwCRbI7Eo/s1600-h/winlogo.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 128px; height: 128px;" src="http://3.bp.blogspot.com/_tgTEtTlkgJA/Si48zokYlkI/AAAAAAAAAA8/wlnwCRbI7Eo/s320/winlogo.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345276665496376898" /></a>DTaskManager is a lightweight replacement for the default Windows Task Manager. It can be used side by side with the Windows Task Manager or replace it fully. If the second option is selected it will be launched when the user is opening the task manager the usual way. The program uses a similar layout as the Windows Task Manager but provides access to additional information and functions in its various tabs.</div><p align="left">The five default tabs that are available in the Windows Task Manager are offered by DTaskManager plus the two additional Ports and Kernel Modules section. The program displays extensive information in each section of its interface, something that can only be partially achieved in the Windows Task Manager. The processes tab lists for example the path of the process and the cpu time by default<br /><br /></p><p align="left"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 208px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/Si49Djq3SuI/AAAAAAAAABE/a0ZVzAJGWyo/s320/dtaskmanager.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345276939059284706" /><br />The Ports section displays all network connections of the local computer system offering massive amounts of information that include the process name, local IP and port, remote IP and port, the protocol, path and socket status. <br /><br />DTaskManager offers some advanced functions on how to deal with processes. It can for example kill processes the usual way, force the process to be closed and initiate an override to close the process which will bypass permissions as well. Another interesting feature is the ability to suspend tasks. This is a feature known from the Linux operating system which can temporarily halt tasks. That’s a handy feature in situations where all system resources are needed by a process as the user can suspend processes and resume them once the resources are not needed anymore for the priority process.<br /><br />A few minor options are the ability to display the cpu and memory usage in the system tray. This can be displayed as a bar or as numerical values. <a href="http://dimio.altervista.org/eng/"><span style="color:#cc0000;"><strong>DTaskManager</strong></span></a> is a solid and lightweight Windows Task Manager replacement. It is compatible with Windows 2000, Windows XP and Windows Vista<br /><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-22093419797727039912009-06-08T21:57:00.000-07:002009-06-10T04:18:33.490-07:00New Google Translate Software<div align="left"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 217px; height: 42px;" src="http://4.bp.blogspot.com/_tgTEtTlkgJA/Si3r_-55o-I/AAAAAAAAAAk/ZpImrxRSpxo/s320/googletranslate.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345187817208783842" /><span style="color:#000000;">You sometimes encounter websites or text on the Internet, in emails or in documents on your computer desktop that are written in a language that you either do not understand completely or have only a limited knowledge of. Automatic translation services are one of the most comfortable and fastest ways of translating these information into an understandable language. The trade-off is that the quality of the translations does not come close to that of a manual translation by a language translator. It is however usually enough to understand the text at hand.<br /><br />The Google Translate software client is a software program for the Windows operating system that can automatically translate text that is marked by the user. It is not limited to the web browser or any other application. It will automatically recognize selected text and provide a translation for that text in its interface.</span><span style="color:#000000;"><br /><br /></span></div><div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Si3r_-55o-I/AAAAAAAAAAk/ZpImrxRSpxo/s1600-h/googletranslate.jpg"></a><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 216px;" src="http://2.bp.blogspot.com/_tgTEtTlkgJA/Si3sSPcOhgI/AAAAAAAAAAs/uuFsLJdBal8/s320/googletranslatesoftware.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5345188130885371394" /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_tgTEtTlkgJA/Si3r_-55o-I/AAAAAAAAAAk/ZpImrxRSpxo/s1600-h/googletranslate.jpg"><br /></a>The user is asked to select a main language during setup which will be the language that the other languages get translated to. The translation tool will display the original text in the upper part of its window and the translated text in the lower parts. It is possible to switch the source and target languages manually if needed.<br /><br />The google Translate software client can also be used by dragging and dropping text into its interface which will also be translated immediately if the automatic recognition is enabled. A handful of options are available that allow the user to change the design of the application and the way the text gets translated. <br /><br />The software program was tested with various applications including the Mozilla Firefox and Internet Explorer web browser, the email client Thunderbird, text documents and Microsoft Office Word. It worked with all of the applications and it is likely that it supports additional programs as well.</div><div align="left"><br /></div><div align="left"><a href="http://googletranslateclient.com/googletranslateclient.exe">Download Google Translate Software</a><br /><br /></div>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0tag:blogger.com,1999:blog-3728889386696861471.post-33466766083812974062009-06-08T06:23:00.001-07:002009-06-10T04:15:03.630-07:00How To Use Nokia Symbian Cell Phone / Mobile Camera Phone As Webcam For Free<div align="left"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_tgTEtTlkgJA/Si0R7esoOPI/AAAAAAAAAAc/HvpJn2-_LzE/s1600-h/smartcam.jpg"><img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 320px; height: 290px;" src="http://1.bp.blogspot.com/_tgTEtTlkgJA/Si0R7esoOPI/AAAAAAAAAAc/HvpJn2-_LzE/s320/smartcam.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5344948046308849906" /></a><br />The mobile phone market has seen tremendous growth in the last few years. Today’s cell phone is no less than a laptop, with all the most important features integrated in it. You name a function that you’d miss if your laptop’s not around, and cell phone manufacturers address the issue almost immediately.<br /><br />Today, let us learn how we can turn your normal, ordinary cell phone into a webcam, using which you can have live video chat with any of your friends who are online. You can build your own cell phone webcam right in your house, at no extra cost, as the software that is necessary to transform your cell phone to a mobile webcam is absolutely free, in fact it’s open sourced, so you can get the source code as well.<br /></div><p align="left">I am talking about SmartCam, an open source software which can be downloaded from Sourceforge, will turn your Symbian-based cell phone into a webcam, which can be hooked up to your PC or laptop and you can have do live video chat with your freinds and family.</p><p align="left">The software works on Symbian phones and the operating system on the PC or laptop must be either Vista or Windows XP. Another catch is, your cell phone mush have blue tooth and your laptop should be bluetooth enabled, as the synchronization is available only through bluetooth as of now. May be in the later versions we can expect some wired support.<br /><br />So if you are travelling, you can use your laptop and blue tooth enabled cell phone and start video chat the moment you are hooked on to internet !!<br /><br /></p><p align="left"><a href="http://sourceforge.net/project/showfiles.php?group_id=197856">Download Smartcam</a></p><p><br /></p>Alper ESKİKILIÇhttps://plus.google.com/114220135060995130039noreply@blogger.com0
Mechanism of reinforcement in a nanoclay/polymer composite Chan, Mo-lin and Lau, Kin-tak and Wong, Tsun-tat and Ho, Mei-po and Hui, David (2011) Mechanism of reinforcement in a nanoclay/polymer composite. Composites Part B: Engineering, 42 (6). pp. 1708-1712. ISSN 1359-8368 Abstract Using organomodified montmorillonite (MMT) (commonly called 'Nanoclay') to reinforce polymer-based composites have raised much attention to academic and industrial sectors due to the addition of small amount of nanoclay could substantially enhance the mechanical properties of pristine polymers. However, most of the works done previously have neglected to comprehensively study the basic reinforcing mechanism of the composites, particular the interaction between nanoclay and surrounding matrix even though high tensile strength and modulus were obtained. In this paper, uniformly-dispersed nanoclay/epoxy composite samples, based on our tailor-made experiment setup were fabricated. A tensile property test was conducted to examine the mechanical properties of the samples with different nanoclay content. It was found that the Young’s modulus and tensile strength of a composite with 5 wt.% of nanoclay increased up to 34% and 25% respectively, as compared with a pristine sample. Images obtained from scanning electron microscopy (SEM) and results extracted from transmission electron microscope (TEM) proved that interlocking and bridging effects did exist in the composites. Nanoclay clusters with the diameter of 10 nm could enhance the mechanical interlocking inside the composites and thus, breaking up the crack propagation. The formation of boundaries between the nanoclay clusters and epoxy can refine the matrix grains and further improve the flexural strength of the composites. Item Type: Article (Commonwealth Reporting Category C) Additional Information: Permanent restricted access to published version due to publisher copyright policy. Uncontrolled Keywords: polymer-matrix composites (PMCs); particle-reinforcement; nano-structures; transmission electron microscope (TEM); high-tensile strength Depositing User: epEditor USQ Date Deposited: 15 Mar 2012 11:59 Last Modified: 03 Jul 2013 01:07 URI: http://eprints.usq.edu.au/id/eprint/20972 Actions (login required) View Item Archive Repository Staff Only
Beefy Boxes and Bandwidth Generously Provided by pair Networks Bob XP is just a number   PerlMonks   Re: parsing data in a file by talexb (Canon) on Nov 02, 2010 at 16:46 UTC ( #869042=note: print w/ replies, xml ) Need Help?? in reply to parsing data in a file You should be programming defensively here: my ($fname,$lname) = split(" ",$name); Instead of that, I'd recommend # If there are two names separated by a space .. my ($fname,$lname); if ( $name =~ /\w+\s\w+/ ) { # Separate them into first and last names. ($fname,$lname) = split(" ",$name); } else { # Otherwise, decide what to do with just a single name. # Use the name as a last name? Die? Ignore? } Don't assume that your input's always going to be clean. Alex / talexb / Toronto "Groklaw is the open-source mentality applied to legal research" ~ Linus Torvalds Comment on Re: parsing data in a file Select or Download Code Log In? Username: Password: What's my password? Create A New User Node Status? node history Node Type: note [id://869042] help Chatterbox? and the web crawler heard nothing... How do I use this? | Other CB clients Other Users? Others scrutinizing the Monastery: (21) As of 2013-12-11 16:27 GMT Sections? Information? Find Nodes? Leftovers? Voting Booth? How do you parse XML? Results (267 votes), past polls
Edit Article wikiHow to Unfollow Someone on Facebook Two Methods:On MobileOn DesktopCommunity Q&A This wikiHow teaches you how to unfollow a person's profile on Facebook. Unfollowing someone will prevent anything they post from appearing in your News Feed, although, unlike when blocking someone, you'll still be able to view their profile if you choose to open it. 10 Second Summary 1. Open Facebook. 2. Tap a friend's name or look them up using the search bar. 3. Tap Following. 4. Tap Unfollow. 1 On Mobile 1. 1 Open Facebook. It's the app with a white "f" on a blue background. If you're logged in, doing so will open your News Feed. • If you aren't already logged into Facebook, type in your email address (or phone number) and password and tap Log In. 2. 2 Tap the search bar. It's at the top of the screen. 3. 3 Type in your friend's name. This should be the person whom you wish to unfollow. As you type, you'll see suggestions appear below the search bar. • You can also tap your friend's name in your "Friends" list or in your News Feed if you like. 4. 4 Tap their name. It should be the top search item below the search bar. 5. 5 Tap the "Following" button. You'll find it in the row of options that are directly below the user's profile picture and name. • You follow any added friends by default. 6. 6 Tap Unfollow. This option is in the far-left corner of the pop-up menu that appears near the bottom of the screen. 7. 7 Tap near the top of the screen. Doing so will exit the menu and save your changes. You will no longer see updates from your friend in your News Feed. 2 On Desktop 1. 1 Navigate to the Facebook website. If you're logged into Facebook, doing so will open your News Feed. • If you aren't logged into Facebook, enter your email address (or phone number) into the top-right corner of the screen and click Log In. 2. 2 Click the search bar. It's the white text field at the top of the page with "Search Facebook" written in it. 3. 3 Type in your friend's name. This should be the person whom you wish to unfollow. As you type, you'll see suggestions appear below the search bar. • You can also click your friend's name in your "Friends" list or in your News Feed if you like. 4. 4 Press Enter. Doing so will search Facebook for your friend. 5. 5 Click their name. It should be the top search item on this page. 6. 6 Hover your mouse cursor over the "Following" button. It's near the top of your friend's Facebook page, to the right of their profile picture. 7. 7 Click Unfollow [Name]. This option is at the bottom of the "Following" drop-down menu. Doing so will unfollow your selected friend, which will both remove all notifications for their activity and prevent all of their activity from showing up in your News Feed. Community Q&A Search Add New Question • How do I know if I have been blocked on Facebook? Amber When you search their name it won't come up. Sometimes they might have just deleted their account so to know for sure you can ask someone else to search their name and see if it comes up. If it does, they've blocked you. Ask a Question 200 characters left Submit Tips • You can also unfollow people by tapping or clicking the arrow in the top-right corner of a friend's post in your News Feed and then selecting Unfollow [Name]. Warnings • Your friend may realize that you've unfollowed them if you suddenly stop commenting on or liking their posts. Article Info Categories: Facebook Profiles In other languages: Español: desuscribir a alguien en Facebook, Italiano: Cancellare Qualcuno da una Pagina Facebook, Português: Bloquear Alguém que te Assina no Facebook, Deutsch: Ein Facebook Abonnement abmelden, Nederlands: Op Facebook een vriend uit het nieuwsoverzicht verwijderen, Français: se désabonner des actualités d'un ami sur facebook, Русский: скрыть чьи–то обновления на Facebook, Bahasa Indonesia: Berhenti Berlangganan Dari Seseorang di Facebook Thanks to all authors for creating a page that has been read 61,226 times. Is this article up to date?  
Commit 7a353fd0 authored by Rustam Lotsmanenko (EPAM)'s avatar Rustam Lotsmanenko (EPAM) Browse files Merge branch 'gcp-push-subscriber-mode' into 'master' Gcp push subscriber mode, tenant & iam migration(GONRG-2742) See merge request !81 parents 720be4f5 f39fe1dc Pipeline #58128 passed with stages in 22 minutes and 6 seconds ......@@ -7,9 +7,11 @@ variables: OSDU_GCP_SERVICE: wks OSDU_GCP_VENDOR: gcp OSDU_GCP_APPLICATION_NAME: os-wks OSDU_GCP_OS_TARGET_SCHEMA_KIND_TENANT: osdu:wks:testWellbore:1.3.1 OSDU_GCP_WKS_MAPPING: WksMapping OSDU_GCP_WKS_BUCKET: nice-etching-277309-wks-mapping-definitions OSDU_GCP_ENV_VARS: GOOGLE_AUDIENCES=$GOOGLE_AUDIENCE,AUTHORIZE_API=$OSDU_GCP_ENTITLEMENTS_V2_URL,GOOGLE_CLOUD_PROJECT=$OSDU_GCP_PROJECT,WKS_GCP_DATASTORE_MAPPINGINFOKIND=$OSDU_GCP_WKS_MAPPING,WKS_GCP_TENANTNAME=$TENANT_NAME,WKS_GCP_STORAGE_BUCKETNAME=$OSDU_GCP_WKS_BUCKET,PARTITION_API=$OSDU_GCP_PARTITION_API,GOOGLE_AUDIENCES=$GOOGLE_AUDIENCE OSDU_GCP_ENV_VARS: WKS_GCP_AUDIENCES=$GOOGLE_AUDIENCE,WKS_GCP_ENTITLEMENTS_URL=$OSDU_GCP_ENTITLEMENTS_V2_URL,GOOGLE_CLOUD_PROJECT=$OSDU_GCP_PROJECT,WKS_GCP_DATASTORE_MAPPING_INFO_KIND=$OSDU_GCP_WKS_MAPPING,WKS_GCP_TENANT_NAME=$TENANT_NAME,WKS_GCP_STORAGE_BUCKET_NAME=$OSDU_GCP_WKS_BUCKET,PARTITION_API=$OSDU_GCP_PARTITION_API,SEARCH_API=$OSDU_GCP_WKS_SEARCH_API,STORAGE_API=$OSDU_GCP_WKS_STORAGE_API,SCHEMA_API=$OSDU_GCP_WKS_SCHEMA_API,WKS_GCP_SUBSCRIBER_MODE=push,WKS_GCP_REDIS_HOST=$REDIS_SEARCH_HOST --vpc-connector=$OSDU_GCP_VPC_CONNECTOR OSDU_GCP_DEPLOYMENTS_SUBDIR: deployments/scripts/gcp include: ......@@ -38,7 +40,9 @@ include: file: 'cloud-providers/osdu-gcp-cloudrun.yml' - local: "/devops/azure/bootstrap.yml" - local: "/devops/gcp/bootstrap.yml" osdu-gcp-test: allow_failure: true variables: OS_TARGET_SCHEMA_KIND_TENANT: $OSDU_GCP_OS_TARGET_SCHEMA_KIND_TENANT ......@@ -129,10 +129,10 @@ The following software have components provided under the terms of this license: - Lucene Highlighter (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-highlighter) - Lucene Join (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-join) - Lucene Join (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-join) - Lucene Memory (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-memory) - Lucene Memory (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-backward-codecs) - Lucene Memory (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-backward-codecs) - Lucene Memory (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-memory) - Lucene Memory (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-memory) - Lucene Miscellaneous (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-misc) - Lucene Miscellaneous (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-misc) - Lucene Queries (from https://repo1.maven.org/maven2/org/apache/lucene/lucene-queries) ......@@ -157,7 +157,6 @@ The following software have components provided under the terms of this license: - Microsoft Azure Java Core Library (from https://github.com/Azure/azure-sdk-for-java) - Microsoft Azure Netty HTTP Client Library (from https://github.com/Azure/azure-sdk-for-java) - Microsoft Azure SDK for SQL API of Azure Cosmos DB Service (from https://github.com/Azure/azure-sdk-for-java) - Mockito (from http://www.mockito.org) - Netty/Buffer (from https://repo1.maven.org/maven2/io/netty/netty-buffer) - Netty/Codec (from https://repo1.maven.org/maven2/io/netty/netty-codec) - Netty/Codec/DNS (from https://repo1.maven.org/maven2/io/netty/netty-codec-dns) ......@@ -243,6 +242,7 @@ The following software have components provided under the terms of this license: - elasticsearch-x-content (from https://github.com/elastic/elasticsearch) - elasticsearch-x-content (from https://github.com/elastic/elasticsearch) - error-prone annotations (from https://repo1.maven.org/maven2/com/google/errorprone/error_prone_annotations) - error-prone annotations (from https://repo1.maven.org/maven2/com/google/errorprone/error_prone_annotations) - io.grpc:grpc-alts (from https://github.com/grpc/grpc-java) - io.grpc:grpc-api (from https://github.com/grpc/grpc-java) - io.grpc:grpc-auth (from https://github.com/grpc/grpc-java) ......@@ -267,6 +267,7 @@ The following software have components provided under the terms of this license: - micrometer-registry-azure-monitor (from https://github.com/micrometer-metrics/micrometer) - mockito-core (from https://github.com/mockito/mockito) - mockito-core (from https://github.com/mockito/mockito) - mockito-core (from https://github.com/mockito/mockito) - org.apiguardian:apiguardian-api (from https://github.com/apiguardian-team/apiguardian) - org.conscrypt:conscrypt-openjdk-uber (from https://conscrypt.org/) - org.opentest4j:opentest4j (from https://github.com/ota4j-team/opentest4j) ......@@ -306,6 +307,7 @@ The following software have components provided under the terms of this license: - spring-boot-starter-log4j2 (from https://spring.io/projects/spring-boot) - spring-boot-starter-logging (from https://spring.io/projects/spring-boot) - spring-boot-starter-security (from https://spring.io/projects/spring-boot) - spring-boot-starter-security (from https://spring.io/projects/spring-boot) - spring-boot-starter-test (from https://spring.io/projects/spring-boot) - spring-boot-starter-test (from https://spring.io/projects/spring-boot) - spring-boot-starter-tomcat (from https://spring.io/projects/spring-boot) ......@@ -319,8 +321,11 @@ The following software have components provided under the terms of this license: - spring-boot-test-autoconfigure (from https://spring.io/projects/spring-boot) - spring-boot-test-autoconfigure (from https://spring.io/projects/spring-boot) - spring-security-config (from http://spring.io/spring-security) - spring-security-config (from http://spring.io/spring-security) - spring-security-core (from https://repo1.maven.org/maven2/org/springframework/security/spring-security-core) - spring-security-core (from https://repo1.maven.org/maven2/org/springframework/security/spring-security-core) - spring-security-web (from https://repo1.maven.org/maven2/org/springframework/security/spring-security-web) - spring-security-web (from https://repo1.maven.org/maven2/org/springframework/security/spring-security-web) - swagger-annotations (from https://repo1.maven.org/maven2/io/swagger/swagger-annotations) - swagger-jaxrs (from ) - tomcat-embed-core (from http://tomcat.apache.org/) ......@@ -378,7 +383,6 @@ The following software have components provided under the terms of this license: - Microsoft Application Insights Java SDK Web Module (from https://github.com/Microsoft/ApplicationInsights-Java) - Microsoft Application Insights Java SDK Web with Auto Registration Module (from https://github.com/Microsoft/ApplicationInsights-Java) - Microsoft Application Insights Log4j 2 Appender (from https://github.com/Microsoft/ApplicationInsights-Java) - Mockito (from http://www.mockito.org) - Netty/Codec/HTTP (from https://repo1.maven.org/maven2/io/netty/netty-codec-http) - Protocol Buffers [Core] (from https://repo1.maven.org/maven2/com/google/protobuf/protobuf-java) - Protocol Buffers [Util] (from https://repo1.maven.org/maven2/com/google/protobuf/protobuf-java-util) ......@@ -634,7 +638,6 @@ The following software have components provided under the terms of this license: - Microsoft Azure client library for KeyVault Secrets (from https://github.com/Azure/azure-sdk-for-java) - Microsoft Azure common module for Storage (from https://github.com/Azure/azure-sdk-for-java) - Microsoft Azure internal Avro module for Storage (from https://github.com/Azure/azure-sdk-for-java) - Mockito (from http://www.mockito.org) - Netty/Codec/HTTP (from https://repo1.maven.org/maven2/io/netty/netty-codec-http) - Netty/Common (from https://repo1.maven.org/maven2/io/netty/netty-common) - Project Lombok (from https://projectlombok.org) ......@@ -652,11 +655,14 @@ The following software have components provided under the terms of this license: - micrometer-core (from https://github.com/micrometer-metrics/micrometer) - mockito-core (from https://github.com/mockito/mockito) - mockito-core (from https://github.com/mockito/mockito) - mockito-core (from https://github.com/mockito/mockito) - mockito-inline (from https://github.com/mockito/mockito) - mockito-junit-jupiter (from https://github.com/mockito/mockito) - mockito-junit-jupiter (from https://github.com/mockito/mockito) - msal4j (from https://github.com/AzureAD/microsoft-authentication-library-for-java) - msal4j-persistence-extension (from https://github.com/AzureAD/microsoft-authentication-extensions-for-java) - spring-security-core (from https://repo1.maven.org/maven2/org/springframework/security/spring-security-core) - spring-security-core (from https://repo1.maven.org/maven2/org/springframework/security/spring-security-core) ======================================================================== MPL-1.1 ...... # Copyright 2021 Google LLC # Copyright 2021 EPAM Systems, Inc # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import json import os from os import listdir from os.path import isfile, join from google.cloud import datastore local_folder = os.path.join(os.path.dirname(__file__),"../../mapping_info_records/opendes") wks_namespace = os.environ.get("WKS_NAMESPACE") kind = os.environ.get("WKS_KIND") tenant = os.environ.get("WKS_TENANT") datastore_client = datastore.Client(namespace=wks_namespace) def upload_records(): files = [f for f in listdir(local_folder) if isfile(join(local_folder, f))] for file in files: local_file = join(local_folder, file) with open(local_file) as f: data = json.load(f) data['kind'] = data['kind'].replace('opendes', tenant) data['sourceSchemaAuthority'] = data['sourceSchemaAuthority'].replace('opendes', tenant) data['sourceSchemaKind'] = data['sourceSchemaKind'].replace('opendes', tenant) complete_key = datastore_client.key(kind, data['id']) mapping = datastore.Entity(key=complete_key) mapping.update(data) datastore_client.put(mapping) if __name__ == "__main__": upload_records() # Copyright 2021 Google LLC # Copyright 2021 EPAM Systems, Inc # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import os from os import listdir from os.path import isfile, join from google.cloud import storage local_folder = os.path.join(os.path.dirname(__file__), "../../mappings/opendes") storage_client = storage.Client() bucket_name = os.environ.get("WKS_BUCKET") tenant = os.environ.get("WKS_TENANT") bucket = storage_client.get_bucket(bucket_name) def upload_files(): files = [f for f in listdir(local_folder) if isfile(join(local_folder, f))] for file in files: local_file = join(local_folder, file) fin = open(local_file, 'rt') data = fin.read() data = data.replace("opendes", tenant) fin.close() fin = open(local_file, 'wt') fin.write(data) fin.close() blob = bucket.blob(file) blob.upload_from_filename(local_file) if __name__ == "__main__": upload_files() google-cloud-datastore==2.1.3 google-cloud-storage==1.40.0 \ No newline at end of file osdu_gcp_bootstrap: stage: bootstrap image: gcr.io/google.com/cloudsdktool/cloud-sdk needs: ["osdu-gcp-deploy"] extends: - .osdu-gcp-variables variables: WKS_KIND: $OSDU_GCP_WKS_MAPPING WKS_NAMESPACE: $OSDU_TENANT WKS_TENANT: $OSDU_TENANT WKS_BUCKET: $OSDU_GCP_WKS_BUCKET script: - gcloud auth activate-service-account --key-file $OSDU_GCP_DEPLOY_FILE - gcloud config set project $OSDU_GCP_PROJECT - export GOOGLE_APPLICATION_CREDENTIALS=$OSDU_GCP_DEPLOY_FILE - pip install -r $OSDU_GCP_DEPLOYMENTS_SUBDIR/requirements.txt - python3 $OSDU_GCP_DEPLOYMENTS_SUBDIR/deploy_mappings.py - python3 $OSDU_GCP_DEPLOYMENTS_SUBDIR/deploy_mapping_info_records.py only: variables: - $OSDU_GCP == 'true' osdu-gcp-test: needs: ["osdu_gcp_bootstrap"] only: variables: - $OSDU_GCP == 'true' ......@@ -17,13 +17,22 @@ In order to run the service locally, you will need to have the following environ | name | value | description | sensitive? | source | | --- | --- | --- | --- | --- | | `GOOGLE_AUDIENCES` | ex `*****.apps.googleusercontent.com` | Client ID for getting access to cloud resources | yes | https://console.cloud.google.com/apis/credentials | | `GOOGLE_APPLICATION_CREDENTIALS` | ex `/path/to/directory/service-key.json` | Service account credentials, you only need this if running locally | yes | https://console.cloud.google.com/iam-admin/serviceaccounts | | `AUTHORIZE_API` | ex `https://entitlements.com/entitlements/v1` | Entitlements API endpoint | yes | output of infrastructure deployment | | `GOOGLE_CLOUD_PROJECT` | ex `osdu-cicd-epam` | Google Cloud Project Id | yes | - | | `wks.gcp.datastore-mappingInfoKind` | WksMapping | kind for Datastore | yes | - | | `wks.gcp.tenantName` | ex `opendes` | Tenant name | yes | - | | `wks.gcp.storage-bucketName` | ex `osdu-cicd-epam-wks-mapping-definitions` | Storage bucket name for mapping definitions | yes | - | | `WKS_GCP_AUDIENCES` | ex `1234.apps.googleusercontent.com` | Client ID for getting access to cloud resources | yes | https://console.cloud.google.com/apis/credentials | | `WKS_GCP_DATASTORE_MAPPING_INFO_KIND` | WksMapping | kind for Datastore | yes | - | | `WKS_GCP_TENANT_NAME` | ex `opendes` | Tenant name | yes | - | | `WKS_GCP_STORAGE_BUCKET_NAME` | ex `osdu-cicd-epam-wks-mapping-definitions` | Storage bucket name for mapping definitions | yes | - | | `PARTITION_API` | ex `https://dev.osdu-gcp.go3-nrg.projects.epam.com/api/partition/v1/` | Partition service endpoint | no | - | | `SEARCH_API` | ex `https://os-search-jvmvia5dea-uc.a.run.app/api/search/v2` | Search service endpoint | no | - | | `STORAGE_API` | ex `https://os-storage-jvmvia5dea-uc.a.run.app/api/storage/v2` | Storage service endpoint | no | - | | `SCHEMA_API` | ex `https://os-schema-jvmvia5dea-uc.a.run.app/api/schema-service/v1` | Schema service endpoint | no | - | | `WKS_GCP_ENTITLEMENTS_URL` | ex `https://dev.osdu-gcp.go3-nrg.projects.epam.com/api/entitlements/v2/` | Entitlements service endpoint | no | - | | `WKS_GCP_REDIS_HOST` | ex `127.0.0.1` | Redis host | no | - | | `WKS_GCP_SUBSCRIBER_MODE` | `push` OR `pull` | Pubsub subscriber mode, `push` mode turn on http endpoint in WKS service and allow to use it in envs that require from deployed service to serve HTTP requests (Cloud Run for example), `pull` mode turn off endpoint and WKS listen events from PubSub by itself | no | - | Depending on which subscriber mode chosen, the environment must have configured PubSub subscription for records-changed topic, for push mode there must be push subscription with configured endpoint `https://wks-service/api/wks-service/v1/_ah/push-handlers/enqueue` and Service account that can be authorized at entitlements. For pull mode in PubSub must be present subscriptions for each partition in following format `records-changed-sub-<partition>-wks`. ### Run Locally Check that maven is installed: ......@@ -118,6 +127,21 @@ You will need to have the following environment variables defined. | `STORAGE_URL` | ex `********/api/storage/v2/`| storage service URL | yes | - | | `HOST` | `` | schema service URL | yes | - | The mapping files must be added to the Storage and Datastore for the tests to run successfully, they can be found in [deployments](/deployments). Scripts for bootstrapping files can be found in [gcp scripts](/deployments/scripts/gcp). ```bash pip install -r requrments.txt ``` You will need to have the following environment variables defined to run scripts. | name | value | description | sensitive? | source | | --- | --- | --- | --- | --- | | `WKS_KIND` | ex `WksMapping`| Kind in Datastore used by WKS service | no | - | | `WKS_NAMESPACE` | ex `osdu`| Namespace in Datastore used by WKS service | no | - | | `WKS_TENANT` | ex `osdu`| WKS service tenant | no | - | | `WKS_BUCKET` | ex `nice-etching-277309-wks-mapping-definitions`| Bucket used by WKS service to store mapping files | no | - | | `GOOGLE_APPLICATION_CREDENTIALS` | ex`usr/key.json` | Google Service account credentials with write access to Google Storage and Datastore | yes | - | Execute following command to build code and run all the integration tests: ```bash ...... <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"> <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"> <modelVersion>4.0.0</modelVersion> <parent> <groupId>org.opengroup.osdu</groupId> ......@@ -16,6 +17,10 @@ <artifactId>os-wks-core</artifactId> <version>0.11.0-SNAPSHOT</version> </dependency> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-security</artifactId> </dependency> <dependency> <groupId>org.opengroup.osdu</groupId> <artifactId>os-core-common</artifactId> ......@@ -26,6 +31,11 @@ <artifactId>core-lib-gcp</artifactId> <version>0.10.0</version> </dependency> <dependency> <groupId>io.grpc</groupId> <artifactId>grpc-core</artifactId> <version>1.38.1</version> </dependency> <dependency> <groupId>com.google.cloud</groupId> <artifactId>google-cloud-storage</artifactId> ......@@ -37,54 +47,33 @@ <version>1.102.2</version> </dependency> <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-test</artifactId> <scope>test</scope> </dependency> <dependency> <groupId>org.mockito</groupId> <artifactId>mockito-all</artifactId> <version>1.10.19</version> <scope>test</scope> </dependency> <dependency> <groupId>com.google.apis</groupId> <artifactId>google-api-services-iam</artifactId> <version>v1-rev310-1.25.0</version> <groupId>org.projectlombok</groupId> <artifactId>lombok</artifactId> </dependency> <dependency> <groupId>io.cucumber</groupId> <artifactId>cucumber-java8</artifactId> <version>5.4.0</version> <groupId>com.google.inject</groupId> <artifactId>guice</artifactId> <version>4.2.0</version> <scope>test</scope> </dependency> <dependency> <groupId>io.cucumber</groupId> <artifactId>cucumber-junit</artifactId> <version>5.4.0</version> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-test</artifactId> <scope>test</scope> </dependency> <dependency> <groupId>io.cucumber</groupId> <artifactId>cucumber-guice</artifactId> <version>5.4.0</version> <groupId>org.mockito</groupId> <artifactId>mockito-core</artifactId> <version>3.11.2</version> <scope>test</scope> </dependency> <dependency> <groupId>com.google.inject</groupId> <artifactId>guice</artifactId> <version>4.2.0</version> <groupId>org.mockito</groupId> <artifactId>mockito-inline</artifactId> <version>3.11.2</version> <scope>test</scope> </dependency> <dependency> <groupId>org.projectlombok</groupId> <artifactId>lombok</artifactId> </dependency> </dependencies> ......@@ -101,7 +90,7 @@ <configuration> <classifier>spring-boot</classifier> <mainClass> org.opengroup.osdu.wks.WksServiceApplication org.opengroup.osdu.wks.WksServiceApplicationGcp </mainClass> </configuration> </execution> ...... /* Copyright 2021 Google LLC Copyright 2021 EPAM Systems, Inc Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ * Copyright 2021 Google LLC * Copyright 2021 EPAM Systems, Inc * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.opengroup.osdu.wks; import org.opengroup.osdu.wks.provider.interfaces.SubscriptionManager; import org.opengroup.osdu.core.gcp.di.PartitionTenantInfoFactoryBean; import org.opengroup.osdu.core.gcp.multitenancy.StorageFactory; import org.opengroup.osdu.core.gcp.multitenancy.TenantFactory; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.context.ApplicationContext; import org.springframework.context.annotation.ComponentScan; import org.springframework.context.annotation.FilterType; @SpringBootApplication @ComponentScan(value = {"org.opengroup.osdu"}) @ComponentScan(value = { "org.opengroup.osdu" }, excludeFilters = { @ComponentScan.Filter(type = FilterType.ASSIGNABLE_TYPE, value = { PartitionTenantInfoFactoryBean.class, WksServiceApplication.class, TenantFactory.class, StorageFactory.class})}) public class WksServiceApplicationGcp { public static void main(String[] args) { ApplicationContext context = SpringApplication .run(WksServiceApplicationGcp.class, args); SubscriptionManager subscriptionManager = context.getBean(SubscriptionManager.class); subscriptionManager.subscribeRecordsChangeEvent(); SpringApplication.run(WksServiceApplicationGcp.class, args); } } /* * Copyright 2021 Google LLC * Copyright 2021 EPAM Systems, Inc * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.opengroup.osdu.wks.api; import lombok.RequiredArgsConstructor; import lombok.extern.slf4j.Slf4j; import org.opengroup.osdu.core.common.model.http.AppException; import org.opengroup.osdu.core.common.model.search.RecordChangedMessages; import org.opengroup.osdu.core.common.model.search.SearchServiceRole; import org.opengroup.osdu.wks.pubsub.PubSubPushMessageReceiver; import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty; import org.springframework.http.HttpStatus; import org.springframework.http.MediaType; import org.springframework.http.ResponseEntity; import org.springframework.security.access.prepost.PreAuthorize; import org.springframework.web.bind.annotation.ExceptionHandler; import org.springframework.web.bind.annotation.PostMapping; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; @ConditionalOnProperty(value = "wks.gcp.subscriber_mode", havingValue = "push") @Slf4j @RestController @RequiredArgsConstructor @RequestMapping("/_ah/push-handlers") public class EnqueueApi { private final PubSubPushMessageReceiver messageReceiver; private final RecordChangedMessages message; @PostMapping(value = "/enqueue", produces = MediaType.APPLICATION_JSON_VALUE) @PreAuthorize("@authorizationFilter.pubSubTaskHasRole('" + SearchServiceRole.ADMIN + "')") public ResponseEntity<String> enqueueTask() { return messageReceiver.receiveMessage(message); } @ExceptionHandler(AppException.class) public ResponseEntity<Object> handleAppExceptions(AppException e) { return new ResponseEntity<>(e.getError(), HttpStatus.valueOf(e.getError().getCode())); } } /* * Copyright 2021 Google LLC * Copyright 2021 EPAM Systems, Inc * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.opengroup.osdu.wks.cache; import org.opengroup.osdu.core.common.cache.RedisCache; import org.opengroup.osdu.core.common.model.search.IdToken; import org.opengroup.osdu.wks.config.PropertiesConfiguration; import org.springframework.stereotype.Component; @Component public class JwtCache extends RedisCache<String, IdToken> { private static final int EXPIRED_AFTER = 59; public JwtCache(PropertiesConfiguration configuration) { super(configuration.getRedisHost(), configuration.getRedisPort(), EXPIRED_AFTER * 60, String.class, IdToken.class); } } /* Copyright 2021 Google LLC Copyright 2021 EPAM Systems, Inc Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package org.opengroup.osdu.wks.config; import lombok.Getter; import lombok.Setter; import org.springframework.boot.context.properties.ConfigurationProperties; import org.springframework.context.annotation.Configuration; @Getter @Setter @Configuration @ConfigurationProperties("wks.gcp") public class DatastorePropertiesConfiguration { private String datastoreMappingInfoKind; private String tenantName; private String storageBucketName; } /* * Copyright 2021 Google LLC * Copyright 2021 EPAM Systems, Inc * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * https://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.opengroup.osdu.wks.config; import org.springframework.context.annotation.Configuration; import org.springframework.security.config.annotation.method.configuration.EnableGlobalMethodSecurity;
Migraine Tips From A Cape Coral Chiropractic Clinic Migraine Tips From A Cape Coral Chiropractic Clinic Migraine Tips From A Cape Coral Chiropractic Clinic If you are a migraine sufferer in Cape Coral you know just how painful and debilitating it can be when a migraine takes hold. Not everyone has exactly the same experience, but pain is usually the main feature. One migraine headache has the potential to completely ruin your day, but there are some tips from a Cape Coral chiropractor you can follow to help make it a little easier. What Is a Migraine? If you’ve been diagnosed with migraines it means you get headaches that last from between 4 and 72 hours with pain that is rated moderate to severe. In order to be classified as a migraine the headache must have two of the following characteristics: • Moderate to severe pain • Unilateral location • Pulsating pain • Made worse by normal activity like walking It must also have at least one of the following: • Sensitivity to light and sound • Nausea and/or vomiting Once you’ve had five attacks with these criteria and the headaches aren’t attributed to a more serious health condition, you’ll be diagnosed as a migraine sufferer. Roughly 28 million people in the United States suffer from migraines and about three out of four are female. Many migraine sufferers will see auras in their field of vision before a migraine comes on. Helpful Prevention Tips It’s not always possible to prevent migraines, but if you have any known triggers it’s wise to stay away from them. Some common headache triggers include certain foods, bright lights, loud noises, certain scents, lack of sleep, dehydration, high levels of stress, and poor posture. If you notice that a migraine comes on or auras are triggered by one of the above factors, do your best to avoid it and see if your migraine frequency is reduced. Visiting a Cape Coral chiropractic clinic for treatment can also be an effective preventative measure. Chiropractic Treatment for Migraines Spinal adjustments that are designed to relieve pressure and stress on your body, are one of the primary chiropractic treatments for migraine headaches. Your spine is full of nerves, bones, blood vessels, tendons, muscles, and ligaments and when your discs are not in alignment it can cause a host of problems. Once the problem is addressed from a variety of different angles, you’ll be able to enjoy fewer episodes and reduce likely amount of pain medication you usually take. With ongoing treatment and care from a Cape Coral chiropractic doctor, you may be able to eliminate your migraines altogether. Our team at Experience Health & Wellness Center in Cape Coral is here to help. Please call us if you have any further questions or would like to schedule an appointment. We look forward to hearing from you. Monday 9:00am - 12:00pm 3:00pm - 6:00pm Tuesday 2:00pm - 6:00pm Wednesday 8:00am - 12:00pm Thursday 10:00am - 1:00pm 3:00pm - 6:00pm Friday By Appointment Only Saturday Closed Experience Health & Wellness Center 2378 Surfside Boulevard A133 Cape Coral, FL 33991 (239) 205-3700
Systemic and Tumor Level Iron Regulation in Men With Colorectal Cancer: A Case Control Study Cenk K Pusatcioglu; Elizabeta Nemeth; Giamila Fantuzzi; Xavier Llor; Sally Freels; Lisa Tussing-Humphreys; Robert J Cabay; Rose Linzmeier; Damond Ng; Julia Clark; Carol Braunschweig Disclosures Nutr Metab. 2014;11(21)  In This Article Results Subject characteristics are presented in Table 1. By design cases and controls were similar in age, BMI and waist circumference. Race/ethnicity, dietary iron intake (heme and non-heme food and supplemental sources), medication use and alcohol consumption were also similar between cases and controls. Systemic Iron Regulation and Inflammation Systemic iron status and inflammatory parameters are presented in Table 2. Cases had significantly lower Hb and higher sTfR compared to controls (p < 0.05), indicative of iron-restricted erythropoiesis. Serum hepcidin was mildly decreased in cases, likely as a response to the increased erythroid iron demand (as reflected by the elevated sTfR). However, considering that hepcidin concentrations were still in the normal range for cases, hepcidin may be elevated given their degree of iron restriction. Hepcidin is known to be low or undetectable in individuals with insufficient iron status.[8] Cases also had significantly elevated CRP (p < 0.05) and a trend toward increased IL-6 concentrations compared to controls, indicating the presence of mild inflammation in these patients. This may stimulate hepcidin production and counterbalance the suppressive effect of iron-restricted erythropoiesis on hepcidin. Associations between serum hepcidin and iron status and inflammatory parameters were explored with Spearman correlation coefficients. In controls, serum hepcidin was correlated with Hb (r = 0.54; p = 0.01) as expected, and no associations were found with sTfR or inflammatory markers (CRP, IL-6, TNF-α), which were in the normal range. In cases, serum hepcidin was not correlated with any of the parameters (Hb, sTfR or the inflammatory markers). Additionally, cancer staging did not change serum hepcidin concentrations (Stage IV: median 64.4 (IQR 249.1) versus Stage I: 72.8 (IQR 28.7) ng/mL p = 1.0). Since our lab previously demonstrated that obesity-induced inflammation is associated with elevated serum hepcidin levels, we stratified cases and controls by obesity status (obese ≥ 102 cm, lean < 102 cm).[26,27] Within cases, circulating markers of inflammation and serum hepcidin did not differ by obesity status (data not shown). Obese controls were more inflamed (CRP, IL-6) compared to lean; however, serum hepcidin concentrations were similar between the groups. Iron Transporters in Colonic Mucosa Gene expression (mRNA) of hepcidin, iron transporters (DMT-1 and FPN) and the pro-inflammatory protein IL-6 in colonic mucosa are presented in Table 3. Expression of DMT-1 and FPN were similar between cases and controls. Although cases had a 2.9-fold lower expression of hepcidin compared to controls (p < 0.05), overall both groups expressed very low hepcidin mRNA in the colonic mucosa (close to the limit of detection by qPCR). Cases had a 9.4-fold higher expression of IL-6 compared to controls (p < 0.05), confirming the inflammatory nature of the tumor. Correlation analyses did not reveal significant associations between expression of the serum and colonic markers of iron regulation, iron transport or inflammation in cases or controls (data not shown). Iron Accumulation in Colonic Mucosa To determine if CRC was associated with greater tissue iron accumulation, adenocarcinoma from cases and healthy colonic mucosa from controls was examined using Perls' Prussian blue stain. Iron accumulation was present in more cases than controls (n = 6/20; 30%; n = 1/20; 5%, χ2 = 5.00; p < 0.05). Illustrative Perls' stains are shown in Figure 1 (cases A-B, controls C-D). When cases were dichotomized by presence/absence of iron accumulation (+/-), cases with iron accumulation had higher serum hepcidin compared to the cases without iron accumulation (p < 0.05) (Table 4). However, after adjusting for Hb, differences in serum hepcidin between these subgroups became non-significant. This suggests that systemic iron sufficiency may have contributed to the higher serum hepcidin observed in the iron accumulation (+) group given that hepcidin is increased when iron stores are adequate. In support, there was a trend for lower sTfR in the iron (+) group, demonstrating iron bioavailability. Differences in systemic inflammatory markers (CRP, IL-6 or TNF-α) between cases with different iron accumulation (+/-) were non-significant. Additionally, no differences were observed for tissue level (mRNA expression for DMT-1, FPN, hepcidin, IL-6) parameters or with cancer staging (data not shown). Figure 1. Iron staining in colonic tissue between cases and controls. Sections of colonic tissue (adenocarcinoma for cases, healthy mucosa for controls) were tested for presence of iron accumulation using the Perls' Prussian blue staining. Cases with presence (A) and absence (B) of iron accumulation were compared to controls with presence (C) and absence of iron accumulation (D) and presented as 20X magnification. There was more iron accumulation detected in cases than controls (n = 6/20; 30%; n = 1/20; 5%; McNemar's test: χ 2 = 5.0; p < 0.05). processing....
Screen Aspect Ratio Calculator   Find out how big of a TV you should get and how far away you should sit using our TV viewing distance calculator. To calculate aspect ratio you need to provide Pixels Width and Pixels Height, the aspect ratio will be calculated automatically Screen resolution 640 x 360 pixels Screen dimensions 3.66 x 3.43 x 0.067 m Screen diagonal 5.01602 m Aspect ratio 1.78: 1 Total LED tiles 4(2 x 2) Surface 0.84 m 2 Max. Power consumption 0.51 kW Typ. Power consumption. Aspect ratio calculator. Select the desired screen format Hd video ( 16:9 ) Common computer monitor ( 16:10 ) Traditional tv. If you need to calculate a custom size, this tool below may be useful. Screen format: Select the desired screen format. Ratio of screen (width to height):1 Screen Measurements. Enter the measurement that you know and the other two will be calculated. Viewable Height inches. The 4:3 aspect ratio is what you would typically find on old generation TVs while the more modern digital TVs normally have the 16:9 aspect ratio. Due to its length, the 16:9 aspect ratio is popularly known as the widescreen aspect ratio. Interestingly, the television industry normally uses a different aspect ratio from the film industry. Calculate How Far You Should Sit From Your TV Recommended TV Size: Recommended TV Size an 80' TV has a viewing angle of 39.9° at this distance, which is closest to the THX suggested viewing angle of 40° a 70' TV has a viewing angle of 35.3° at this distance, which is closest to the THX suggested max viewing angle of 36° a 60' TV has a viewing angle of 30.5° at this distance, which is closest to the SMPTE suggested max viewing angle of 30° Recommended TV Size an 80' TV has a viewing angle of 39.9° at this distance, which is closest to the THX suggested viewing angle of 40° a 70' TV has a viewing angle of 35.3° at this distance, which is closest to the THX suggested max viewing angle of 36° a 60' TV has a viewing angle of 30.5° at this distance, which is closest to the SMPTE suggested max viewing angle of 30° Recommended Viewing Distance THX ideal recommended distance: ?(40° viewing angle) THX max recommended distance: ?(36° viewing angle) SMPTE max recommended distance: ?(30° viewing angle) THX max acceptable distance: ?(26° viewing angle) Visual acuity distance: ? This is the distance where your eyes can see the individual pixels On this page: If you already have a TV, then enter the TV size to find out how far you should place your seating. If you are looking for a TV, then enter the distance from your seating position to the TV to determine which size TV you should purchase. How to Choose the Right TV Size You might be wondering what size TV you should get. This can be a tricky decision, and the internet is loaded with opinions on the topic. Believe it or not, there is actually a science to choosing how big of a TV you should get for the optimal viewing experience. There are several factors to consider when selecting a TV size, notably distance and viewing angle, resolution, and the type of content you’ll be viewing. Our calculator takes these into consideration and makes several size recommendations based on the seating distance based on these considerations. Consider Viewing Distance and Viewing Angle One of the main determining factors to find the TV size that is right for your room is the viewing angle from your seating position. THX has some recommendations for the correct viewing angle to achieve an immersive viewing experience. THX recommends a 36° to 40° viewing angle for the best viewing experience, and the Society of Motion Picture and Television Engineers recommends a minimum 30° viewing angle. Using these metrics, the ideal TV size would have a 30° to 40° viewing angle from the seating position. Display Size Calculator There are a number of ratios that get roughly close. Multiplying the seating distance by 0.6 will yield a TV size that will be close to a 30° viewing angle, while multiplying the seating distance by 0.84 will get you a TV size close to the 40° viewing angle. If your seating distance is 96″, for example, a 58″ TV will have a viewing angle of 30° and an 80″ TV will have a 40° viewing angle. The Best TV Size Depends on the Content Screen What you watch on your TV will determine the optimal size and viewing distance. If you intend to watch 4k Bluray movies, you’ll want to choose a TV size with a viewing angle closer to the 40° mark for the most immersive experience. If you’re watching 1080p television shows in an informal living space where aesthetics are a concern, then you may choose a TV that will have a viewing angle closer to the 30° or maybe even less. You also should consider the type of viewing experience you prefer, which is a subjective decision that only you can make. Also, consider that one of the most common complaints after choosing a TV is that a larger TV would have been better, it’s not very common to hear people admit that they wish they had chosen a smaller TV. How to Calculate the Best TV Viewing Distance Part of selecting the right TV for you also involves figuring out what the best viewing distance is for the TV. And that might depend on a few factors such as the size of the room, the type of the room, the use of the TV, and its resolution. The room’s size will certainly determine the maximum viewing distance, which will undoubtedly have an impact on just how big of a TV can fit in the space. The type of the room will also impact the right viewing distance. Formal rooms, for example, a living room with the TV mounted over a fireplace might require a further viewing distance to alleviate neck strain and accommodate room aesthetics. Media rooms dedicated to movies, sports, or gaming might shorten the viewing distance for an optimal movie experience. Optimal Viewing Distance for Various TV Sizes Led Screen Aspect Ratio Calculator As discussed above, the screen viewing angle is a significant factor in determining the optimal viewing distance. The chart below shows the optimal viewing distances for various TV sizes in the suggested 26° – 40° range. Optimal viewing distance range for various TV sizes using 40° to 26° viewing angle for a 4K resolution TV. TV SizeOptimal Seating Distance 50″5′ 0″ – 7′ 10″ 55″5′ 6″ – 8′ 8″ 60″6′ 0″ – 9′ 5″ 65″6′ 6″ – 10′ 3″ 70″7′ 0″ – 11′ 0″ 75″7′ 6″ – 11′ 10″ 80″8′ 0″ – 12′ 7″ 85″8′ 6″ – 13′ 4″ 90″9′ 0″ – 14′ 2″ See a full list of TV sizes and viewing distance ranges for a 4K TV. Optimal Viewing Distance Based on TV Resolution The TV’s resolution will also play a role in how far you can sit from the TV. There is a point at which your eyes can make out the individual pixels of the TV screen, and the picture begins to degrade based on your visual acuity. TVs with higher resolution have smaller pixels that make up the image, which are harder to see at the same distance. This means that you can sit closer to TVs with a higher resolution before you can begin to see the pixels. You can sit much closer to a 4K TV without making out the pixels than you can a 1080P TV and have a more immersive viewing experience. The number of pixels on a display in relation to the size is known as pixel density, and it’s measured in pixels per inch, or PPI. Use our PPI calculator to measure the pixel density of your screen. The viewing distance calculator above takes this into account when recommending a size and seating distance. Minimum Viewing Distance by Size and Resolution Is an upgrade to a 4k TV worth it? The chart below shows the distances that the eye can see the individual pixels on the screen. Viewing distances at which you can begin to see pixels on a TV or video screen for various resolutions. TV Size1080p Minimum Distance4k Minimum Distance 40″4′ 11″2′ 4″ 46″5′ 8″2′ 8″ 50″6′ 2″2′ 11″ 55″6′ 9″3′ 2″ 60″7′ 5″3′ 6″ 65″8′3′ 9″ 70″8′ 8″4′ 1″ 75″9′ 3″4′ 4″ 80″9′ 10″4′ 8″ 85″10′ 6″5′ 90″11′ 1″5′ 3″ If you can’t see the pixels on the screen at 1080p resolution, then an upgrade to 4K might not be noticeable. If your seating distance is closer than the minimum viewing distance for the 1080p resolution, then an upgrade to 4k will be a noticeable improvement. Minimum Viewing Distance Formulas Formulas to determine the distance at which the human eye can discern the pixels of a video screen. ResolutionSeating Distance 8K0.4x Screen Width 4K0.8x Screen Width 1080P1.7x Screen Width 720P2.7x Screen Width 480P4.1x Screen Width If you need to find your TV width refer to a chart of dimensions for common TV sizes or use our screen size calculator. Other Factors to Consider When Choosing a TV There are a few other factors that you may wish to consider when selecting a TV size. The first is room aesthetics. Some rooms may accommodate a 90″ TV based on viewing distance, but if that room is a formal living space, then aesthetics should also be considered. Safety should also be considered. When placing the TV on a piece of furniture, be sure to consider the TV’s size and weight and the furniture’s weight limit. Consider the best height to mount your TV, which could determine how large the screen can be. The height of the TV may change the room’s aesthetics and may be a determining factor. Mounting height should definitely be considered when placing the TV. Learn more about TV mounting costs and different bracket options. Ratio Finally, the budget should factor into your decision when selecting a TV size or resolution. Larger screens and higher resolution displays cost more, and it would be wise to evaluate the cost of the display into the decision when selecting the ideal TV for your application. Recommended What is throw distance for a projector? A projector's distance from the lens to the screen surface is called the Throw Distance. The throw distance and the size of the image it produces on the screen are proportional to each other based on the optics of the lens. As you increase the distance between the projector lens and the screen the image will also increase. How far do you put a projector from the screen? A projector's distance from a screen and the size of the image it produces are proportional to each other based on the optics of the lens. As you increase the distance between the projector and a screen the image will also increase. If your projector has a zoom lens, the lens can be adjusted to change the size of the screen image without changing the distance of the projector. Since each projector lens is different, an online projection calculator tool will help you calculate the size of an image on a screen relative to how far the projector is placed from screen. What is a throw ratio for a projector? For any given projector, the width of the image (W) relative to the throw distance (D) is know as the throw ratio D/W or distance over width. So for example, the most common projector throw ratio is 2.0. This means that for each foot of image width, the projector needs to be 2 feet away or D/W = 2/1 = 2.0. So if I'm using a projector with a throw ratio of 2.0 and I have an image width of 5 feet, then my throw distance must be 10 feet. So the throw ratio is a simple formula that let's you easily compute throw distance or image width given that you know one of these measurements. A projector zoom lens will have two different throw ratios, one for the minimum zoom setting and one for the maximum zoom setting. What is considered a short throw projector? Screen Resolution Aspect Ratio Calculator A short throw projector is a projector with a lens that has a throw ratio of 0.4 (distance/width) or less. These projectors are ideal for rear screen applications where the area behind the screen is limited, or for a wall mounted application where the projector will be mounted within 1 or 2 feet from the screen. The goal of these projectors is to produce as large of an image within the shortest amount of space between the projector and the screen. Posts • Bronny James Twitch • Mpv For Mac • Irenealing • Lando Twitch • Twitch Prime Fortnite 2020 Copyright © 2022 brokerbooster.us
Skip to main content Insights into the evolution of sorbitol metabolism: phylogenetic analysis of SDR196C family Abstract Background Short chain dehydrogenases/reductases (SDR) are NAD(P)(H)-dependent oxidoreductases with a highly conserved 3D structure and of an early origin, which has allowed them to diverge into several families and enzymatic activities. The SDR196C family (http://www.sdr-enzymes.org) groups bacterial sorbitol dehydrogenases (SDH), which are of great industrial interest. In this study, we examine the phylogenetic relationship between the members of this family, and based on the findings and some sequence conserved blocks, a new and a more accurate classification is proposed. Results The distribution of the 66 bacterial SDH species analyzed was limited to Gram-negative bacteria. Six different bacterial families were found, encompassing α-, β- and γ-proteobacteria. This broad distribution in terms of bacteria and niches agrees with that of SDR, which are found in all forms of life. A cluster analysis of sorbitol dehydrogenase revealed different types of gene organization, although with a common pattern in which the SDH gene is surrounded by sugar ABC transporter proteins, another SDR, a kinase, and several gene regulators. According to the obtained trees, six different lineages and three sublineages can be discerned. The phylogenetic analysis also suggested two different origins for SDH in β-proteobacteria and four origins for γ-proteobacteria. Finally, this subdivision was further confirmed by the differences observed in the sequence of the conserved blocks described for SDR and some specific blocks of SDH, and by a functional divergence analysis, which made it possible to establish new consensus sequences and specific fingerprints for the lineages and sub lineages. Conclusion SDH distribution agrees with that observed for SDR, indicating the importance of the polyol metabolism, as an alternative source of carbon and energy. The phylogenetic analysis pointed to six clearly defined lineages and three sub lineages, and great variability in the origin of this gene, despite its well conserved 3D structure. This suggests that SDH are very old and emerged early during the evolution. This study also opens up a new and more accurate classification of SDR196C family, introducing two numbers at the end of the family name, which indicate the lineage and the sublineage of each member, i.e, SDR196C6.3. Background The short-chain dehydrogenase/reductase (SDR) superfamily consists of NAD(P)(H)-dependent oxidoreductases that are distinct from the medium-chain dehydrogenase/reductase (MDR) and aldo-keto reductase (AKR) superfamilies [1]. Our knowledge of these superfamilies initially emerged from observations made concerning alcohol dehydrogenases of Drosophila and mammalian liver, which were seen to be clearly different [2, 3]. Insect and bacterial alcohol and polyol dehydrogenases initially received less attention, since these enzymes were found to be different, and were only considered to be of prokaryotic and lower eukaryotic origin [2, 3]. However, the discovery of similarities between these latter enzymes and human or mammalian prostaglandin, hydroxyl-steroid and other dehydrogenases, changed that view dramatically [47]. In addition, in recent years, interest in SDR enzymes has increased, since they are useful in biotechnological and analytical processes. About 25% of all dehydrogenases belong to the SDR superfamily [8]. Common to all types of oxidoreductases is the occurrence of a Rossmann-fold dinucleotide cofactor-binding motif, which has been found to be one of the most common protein folds [9, 10]. Among SDR, no high sequence identity between different members is observed (about 20–30%), but all of them display a highly similar 3D structure, typically folding into a simple one-domain architecture with distinct conserved motifs, including the cofactor binding site at the N-terminal, structure stabilizing motifs, the active center, catalysis-enhancing sites and the substrate binding site, located in the highly variable C-terminal region [1, 11]. Such a degree of 3D structure conservation indicates that ancestral dehydrogenases existed within each SDR family, and after multiple events, these ancestral dehydrogenases gave rise to the present system of subfamilies and classes found within each family [1]. Given the early origin of SDR, the subsequent divergence has had time to become quite pronounced. Hundreds of SDR enzyme activities and their corresponding families have been detected. Based on the similar coenzyme-binding structure, their active-site relationship and repetitive patterns, five SDR superfamily types have been discerned from different data banks, named as “classical”, “extended”, “intermediate”, “divergent” and “complex” SDR enzymes [12]. This divergence also includes different enzymatic activities, most of them dehydrogenases or reductases, but also lyases and some isomerases. The active-site Tyr residue, assisted by adjacent Lys, Asn and Ser residues, has been found to fit to the basic reaction mechanism in most cases, but also to reflect acid–base catalysis and proton transfers [1]. Thus, SDR proteins not only have a very distant origin, including a viral representation [1, 13], presumably from a time when virally-mediated lateral gene transfer commonly occurred [14], but also show a wide range of activities, involving half of all enzyme activity types. Few gene/protein superfamilies exhibit this great divergence. Recently, a sustainable and expandable nomenclature SDR database has been proposed, based on hidden Markov models (http://www.sdr-enzymes.org) [8, 15]. This database has identified 314 SDR families, encompassing about 31,900 members [8]. Among them, the SDR196C family (http://www.sdr-enzymes.org/search) groups bacterial sorbitol dehydrogenases (L-iditol NAD + oxidoreductases, EC 1.1.1.14, SDH), which are of industrial interest for the specific determination of sorbitol (D-glucitol), a natural acyclic polyol found in food, and in pharmaceutical and cosmetic preparations [16]. In this study, we provide a comprehensive insight into the distribution, diversity, evolution and classification of the SDR196C superfamily in bacteria. The phylogenetic analysis revealed different lineages related to some sequence differences in the conserved SDR motifs and in the characteristic SDH blocks, allowing, for the first time, the classification of this SDR family (SDH family) into 6 different lineages and three sub lineages. This could permit a more efficient data curation, and a new nomenclature for the classification of incoming sequences into the SDR196C family. Results and discussion Distribution of SDH gene The SDR database (http://www.sdr-enzymes.org) is a sustainable and expandable nomenclature database [8, 15], which includes 127 bacterial sorbitol dehydrogenases (among characterized and putative) within the SDR196C family. Some identical sequences have been included two or more times in the database, representing different strains. In order to simplify the study, only one strain of these species was included in the analysis. The SDH gene was found in 66 bacterial species, all of them Gram-negative belonging to alpha (α)-, beta (β)- and gamma (γ)-Proteobacteria (see Additional file 1), with both low and high GC representatives (see Additional file 2). This distribution of SDH agrees with the prevalence of SDR enzymes, which are present in all forms of life [17] and, according to recent data from random genome screenings of microorganisms and viruses from sea water, are also among the most abundant genes in nature [13]. α-Proteobacteria, with six families, is the largest group with a total of 41 species, including members of the Acetobacteriace, Rhodospirillaceae, Rhodobacteriaceae, Brucellaceae, Phyllobacteriaceae and Rhizobiaceae families (see Additional file 1). Two of these species, Ochrobactrum anthropi and O. intermedium (members of the Brucellaceae family) are human pathogens that cause septicemia [18, 19]. The Acetobacteriaceae family is represented by two members, Acidiphilium cryptum and Gluconoacetobacter hansenii, which are common in vinegar and used as iron contamination indicators [20]. Members of the Rhodospirilaceae, Phyllobacteriaceae and Rhizobiaceae families are usually nitrogen-fixing microorganisms found in soil and aquatic habitats, with the exception of Agrobacterium tumefaciens A. radiobacter and A. vitis from the Rhizobiaceae family, which are well known plant pathogens, causing tumors. Rhodobacteriaceae is the most numerous family, with 22 members, including sea water microorganisms, photosynthetic bacteria (Rhodobacter sp., R. capsulatus and R. sphaeroides[21]) and two extremophiles (Paracoccus denitrificans and Silicibacter lacuscaerulensis). The β-Proteobacteria group includes 15 members of the Burkholderiaceae family and 2 of the Commamonadaceae family (see Additional file 1). These two families are composed of soil and free-living microorganisms, which are usually nitrogen-fixing (Burkholderia phymatum and B. xenovorans) or symbionts (B. graminis B. phytofirmans B. thailandensis Acidovorax avenae and Variovorax paradoxus). The Burkholderiaceae family also includes a commensal of the earthworm nephridia (Verminephrobacter eiseniae), a plant pathogen (Ralstonia solanacearum) and human pathogens from genera Burkholderia, which cause opportunistic infections in diseases, such as cystic fibrosis [22]. The γ-Proteobacteria group, which includes only 7 species from three different bacterial families, is the smallest group among the SDR196C family. Aquatic bacteria from the halophilic family Halomonadaceae (Chromohalobacter salexigensis and Halomonas elongata) and from the marine family Oceanospirillaceae (Marinomonas sp.) form part of this group. The third family of this group (Pseudomonaceae) includes a plant commensal (Pseudomonas fluorescens), a plant pathogen (P. savastanoi) which cause olive knot [23], a saprophyte (P. syringae), and a soil bacterium (Pseudomonas sp.). Taken together, these results indicate that the SDH gene is widely distributed in nature, and is an important enzyme in the polyol metabolism of some bacteria, to use sorbitol as an alternative source of carbon and energy [21]. Genetic organization of SDH gene The three main bacterial groups that contain the SDH gene, α-, β- and γ-proteobacteria, encode this gene in different polyol clusters with a different gene order (see Additional file 3). In general terms, the SDH gene in the polyol operon is usually surrounded by a transporter (mainly, ATP Binding Cassette [ABC] transporter, which translocate substrates across membrane via ATP hydrolysis), an SDR protein (normally, a mannitol dehydrogenase, MDH) and a sugar related kinase, such as ribitol kinase. However, the companion genes and the order in the cluster, vary between bacterial families, and, to a lesser extent, within families (see Additional file 3). Only one overall organization of SDH genes has been described for the polyol operon of Rhodobacter sphaeroides Si4, where smoS gene encodes for an SDH, smoK for an ABC transporter, and mtlK for a mannitol dehydrogenase [24]. Within the α-Proteobacteria, there are twelve variants of the SDH cluster, each family having its own gene order. The Rhodobacteriaceae family shows three variants of this polyol operon, in which a cluster of four genes related with ABC transporter are on one side of the SDH gene, and a dehydrogenase (mannitol or alcohol dehydrogenase) plus an extra gene (HAD, tRNA or FeoA protein) on the other side (see Additional file 3, variants 1–3). The Rhizobiaceae family has more diversity in its polyol cluster, which displays 5 different variants (see Additional file 3, variants 4–8), but still shows the pattern of at least three ABC genes on one side of the SDH gene, except for Agrobacterium tumefaciens and Rhizobium etli, in which two ABC genes are replaced by two sugar kinase genes (fructose kinase and tagatose 6-phosphate kinase) (see Additional file 3, variant 6). On the other side of the SDH gene, a dehydrogenase (MDH or a Zn2+ binding dehydrogenase) is also present, except for Agrobacterium radiobacter, which presents an AraC regulator, followed by metal-accepting chemotaxis sensory transducer MACST (see Additional file 3, variant 5). This microorganism also has a LysR gene, indicating a tight regulation of the SDH related genes in order to use this sugar and to control its metabolism under adverse conditions. This control is also seen in A. tumefaciens and R. etli (see Additional file 3, variant 6), with the presence of LacI. The rest of the α-Proteobacteria families (Phyllobacteriaceae, Rhodospirillaceae, Acetobacteriaceae and Brucellaceae) have the common pattern of at least three ABC proteins on one side, but are more diverse on the other side, having not only kinases (hexokinase or fructose kinase) but also two singular enzymes in SDH clusters, which are related with phosphogluconate (2-dehydro-3-deoxyphosphogluconate aldolase and phosphogluconate dehydrogenase) (see Additional file 3, variant 11), or two consecutive dehydrogenases (mannitol dehydrogenase and alcohol dehydrogenase; see Additional file 3, variant 12). The LysR gene is also present, except in the Rhodospirillaceae family. Among the β-proteobacteria group, the Commamonadaceae family has its own order, but with the presence of an intercalating MDH gene between SDH and ABC transporter genes (see Additional file 3, variant 13). The latter order is also similar to that of Verminephrobacter eiseniae, a member of the Burkholderiaceae family (Additional file 3, variant 14), which is in fact, quite different from the common pattern displayed for the rest of the Burkholderiaceae members (see Additional file 3, variants 15–17). The latter clusters show a ferric uptake regulator gene and its corresponding cation ABC transporter genes on one side, and sorbitol/mannitol ABC transport genes followed by HAD gene on the SDH gene side (see Additional file 3, variant 15), and sometimes interrupted by two sugar related genes (ribokinase and tagatose 1,6-biphosphate aldolase, variant 16; or 2-keto-3-deoxygluconate kinase and tagatose 6-phosphate kinase, see Additional file 3, variant 17). Finally, the γ-Proteobacteria group has no specific pattern, and it is easy to differentiate the Halomonadaceae family (see Additional file 3, variants 18–19), with an haloacid dehalogenase gene intercalating the SDH and three ABC transporter proteins, from the Pseudomonadaceae family (see Additional file 3, variants 20–21), in which only one (or no) ABC transporter gene is present, together with an AraC gene. This latter family also lacks the second SDR gene, indicating that the SDH gene is not close to other the sugar-utilizing genes as it is in all of the above described families. Signatures of horizontal gene transfer Basically, there are two main methods to identify putative horizontal gene transfer events, phylogenetic methods and surrogate methods based on nucleotide composition. Also, the presence of transposases and/or integrases within a region may suggest another mode of transfer. However, no such enzymes genes were found in the proximity of any of the polyol clusters described above. On the other hand, the differences between the average GC content of whole genome (GCg) and the GC content of the SDH genes (GCSDH) (see Additional file 2), showed only one unknown possible horizontal gene transfer event (deviation from GCg by +/− 5) in Gluconoacetobacter hansenii with a GC difference of −5.8 (see Additional file 2). In addition, Loktanella vestfoldensis, Agrobacterium radiobacter, Chromohalobacter salexigensis, Pseudomonas savastanoi and Oceanicola batsensis have a high, but not significant, GC difference (≈ +/− 4), which suggest the possibility of horizontal gene transfer for SDH in these species, too. Phylogenetic analysis of SDH gene In order to examine further the evolutionary history of the SDH gene, a multiple sequence alignment (MSA) was carried out with GUIDANCE [25, 26], using the MSA algorithm PRANK [27], which gave an overall quality assessment exceeding 0.97 (1 corresponds to 100% certainty) (see Additional file 4). The phylogenetic analysis and the topology obtained were compared with that found for the species tree based on 16S rRNA sequences aligned with the above algorithm (Figure 1 and 2, respectively; see also Additional file 4). Phylogenetic analyses of SDH amino acid sequences resulted in a well-resolved tree, which was quite similar, regardless of the method used (see Additional file 5). Overall, the SDH genes in the three proteobacteria groups studied did not form three distinct lineages (Figure 1) as it does, in the 16S rRNA tree (Figure 2, see also Additional file 6). Indeed, the SDH tree could be subdivided into six main lineages (named 1, 2, 3, 4, 5 and 6) (Figure 1), lineage 6 being the most divergent, encompassing α- and γ-proteobacteria from five different families (Figure 1). Also within this lineage, three sublineages (Figure 3, see also Additional file 4) were found, all with a common origin. Lineages 6.1 and 6.2 were formed by species of the Rhodobacteriaceae family, except Hoeflea phototrophobica, which is member of the Phyllobacteriaceae family. Lineage 6.3 was the most divergent group, with members of α- and γ-proteobacteria from five different families: Phyllobacteriaceae, Pseudomonaceae, Rhodobacteriaceae, Rhodospirillaceae and Rhizobiaceae (Figure 3). This lineage 6 is also grouped the most SDH from the Rhodobacteriaceae family, except R. bacterium and Thalassiobium sp. Interestingly, the three members of genus Rhodobacter did not group as closely as might be expected, R. capsulatus being a member of lineage 6.1 and R. sphaeroides and Rhodobacter sp. members of lineage 6.3. This indicates a common ancestor, with a divergence in the time of SDH gene acquisition. Similarly, Pseudomonaceae members were grouped in lineage 6, except for Pseudomonas sp., which belongs to lineage 1, together with all members of Burkholderiaceae family (Figure 1 and 3). The distribution of the SDH from different Pseudomonas species in divergent branches of the tree (Figure 1) indicates that in these species, the SDH genes were acquired many times and from different sources. Figure 1 figure1 Phylogenetic tree of all species encoding SDH gene. The tree was obtained using Neighbor Joining (NJ) analysis in MEGA 4.0 [45]. 1,000 generations were used to build the consensus tree, as indicated in the methods section. The main inclusive taxonomic groups are indicated. The bacteria used are listed in Additional file 1. Figure 2 figure2 Phylogenetic tree of 16S rRNA of all families encoding SDH gene. Sequences for the analysis were obtained from GeneBank. The analysis was performed using the Neighbor Joining method, and the tree was implemented with MEGA 4.0 [45] after 1,000 generations. Families encoding SDH gene are indicated. Figure 3 figure3 Phylogenetic tree of species forming lineage 6 of SDH. The tree was obtained using Neighbor Joining (NJ) analysis in MEGA 4.0 [45]. 1,000 generations were used to build the consensus tree, as indicated in the methods section. Main inclusive taxonomic groups are indicated. Lineage 1 contained most of the members of β-Proteobacteria family, except for the Commamonadaceae representatives, which branches away in lineage 2. In addition, lineage 1 branches firmly away from the rest of the lineages, suggesting that the origin of SDH in lineage 1 is unique, and that there are two different origins for β-proteobacteria SDH. Lineage 2 is also a divergent group which includes, apart from Commamonadaceae SDH proteins, members of α- and γ-Proteobacteria from the Rhodobacteriaceae and Oceanospirillaceae families. The presence of members of the Rhodobacteriaceae family (Rhodobacterales bacterium and Thalassiobium sp) clearly separated from lineage 6, indicated the possibility of a horizontal gene transfer event, although this is not supported by the GC difference, with values of −1.6 and 2.6, respectively, or by the presence of transposases/integrases within its polyol cluster. Lineages 3, 4 and 5 are well separated groups, of different but close origin. Members of Halomonadaceae (lineage 3), Acetobacteriaceae (lineage 4), Brucellaceae and Rhizobiaceae (lineage 5) families are included in these lineages. Agrobacterium tumefaciens and Rhizobium etli did not group with the rest of their family in lineage 6, indicating a divergent origin of SDH in this family. Interestingly, γ-proteobacteria had at least one member in four of the six lineages described (Lineages 1, 2, 3 and 6), which suggests a divergent origin of the SDH gene among γ-proteobacteria. This widespread and variable origin of SDH detailed here is related to the distribution and evolution of SDR, which were mentioned above, occurs in all kingdoms of life [17]. However, this variability is not observed in the structure of these enzymes in all six lineages (see Additional file 7), which all share a common Rossmann-fold motif for dinucleotide cofactor binding, and a substrate binding site in the highly variable C-terminal region [1]. This variability in the distribution and the homogeneity in the structure, together with the recombinatorial formation of the catalytic subunit from building blocks, suggest that SDR, and consequently SDH, emerged early from α/β elements to a form a Rossman-fold domain in the universal cellular ancestor prior to Darwinian evolution in cells of all kingdoms of life [17, 28]. Sequence comparison of SDH lineages With the aim of further exploring the evolution of SDH proteins, 11 characteristic SDH blocks (I-XI) were described using the sequence alignment of the six different lineages and the 3 sublineages of lineage 6. Overall, differences in the blocks between the six lineages were well defined, and it was possible to establish different consensus sequences for each lineage with Guidance scores above 0.97 (Figure 4), which supports the classification obtained from the phylogenetic analysis. Lineages 2 and 6 were the most variable of the lineages (see Additional file 8), as might be expected according to the phylogenetic analysis (Figure 1), although it was still possible to establish consensus sequences. The eleven SDH conserved blocks were also observed in the three sublineages of lineage 6 with Guidance scores above 0.97 (Figure 5). Figure 4 figure4 Conserved SDH blocks in the six different lineages. “c”, a charged residue; “h”, a hydrophobic residue; “p”, a polar residue and “x”, any residue. Alternative amino acids at a given position are shown within brackets. Red background indicates strictly conserved amino acids, orange background indicates conserved amino acids and blue boxes indicate the specific blocks of each lineage. Guidance scores represent the degree of confidently aligned residues (1 corresponds to 100% certainty) [25, 26]. Figure 5 figure5 Conserved SDH blocks in the three sublineages of lineage 6. “c”, a charged residue; “h”, a hydrophobic residue; “p”, a polar residue and “x”, any residue. Alternative amino acids at a given position are shown within brackets. Red background indicates strictly conserved amino acids, orange background indicates conserved amino acids and blue boxes indicate the specific blocks of each lineage. Guidance scores represent the degree of confidently aligned residues (1 corresponds to 100% certainty) [25, 26]. Sequence alignment of lineage 1 showed highly conserved blocks (see Additional file 8) among its members. This high degree of sequence similarity was in agreement with that described in the phylogenetic analysis, since lineage 1 was basically composed of members of the Burkholderiaceae family, except for Pseudomonas sp. The specific block sequence for this lineage is indicated in Figure 4, and, interestingly, the sequence of block I (GEAVA), which is involved in NAD+ binding [2931] and the sequence of block X (DLTGA), which is related to NAD stabilization and tetramer formation, can be considered as fingerprints for this lineage, since these sequences were only present in this lineage. Lineage 2, as described above, was highly divergent, as also shown in the sequence alignment (see Additional file 8), where only the blocks corresponding to the characteristic fingerprints for SDH (block V to VII) and some parts of the C-ter are conserved. Block XI and its sequence NVMS could be considered as its fingerprint. Lineage 3, which comprises only two members, showed a high sequence identity (see Additional file 8). Its long and conserved block III, whose function is to stabilize the central β-sheet [29], could be considered as its fingerprint, ending in the conserved sequence DMAPVLEV (Figure 4). The most notable feature of lineage 4 alignment is the absence of block I in G. hansenii, which is involved in cofactor recognition (see Additional file 8). Taking this into account, its assignation as an SDH or even as an SDR might be erroneous, although the remaining conserved domains of both SDR and SDH, including the catalytic tetrad N-Y-S-K, responsible of the oxidoreductase activity [29], are present. Thus, the absence of block I is an error which arises from wrongly determining the starting point of sequence. Lineage 5 was also highly conserved (see Additional file 8), and showed the eleven blocks of SDH with high identity. Specific fingerprints of this lineage are located in block IV (INLKGP), and at the end of block IX, which in the other lineages usually ends with GRMG, while in lineage 5 it ends in FATP (Figure 4). The heterogeneity of lineage 6 makes it difficult to establish a fingerprint, except for the consensus sequence of block V (see Additional file 8). However, when the three sublineages were aligned independently, a high degree of conservation was observed (Figure 5). Lineage 6.1 was the most divergent, showing identity only in the eleven conserved blocks (see Additional file 8). Although consensus sequences are shown for every block, only a specific sequence for this sublineage was observed at the beginning of block VIII (WDGVDAF, Figure 5). Similarly, in lineage 6.2, specific fingerprints could be found in block III (FAAAETV), and at the end of block VIII (MFAKLE). Lineage 6.3 had its own fingerprint at the end of block III (FDLAPI). In addition, some lineages also presented highly conserved sequences between conserved blocks. Thus, lineages 1, 3 and 5 showed such a sequence between motifs I and II (CVLVD, EAGRV and EGAcFcIADI, respectively), and another between block IV and V in lineages 1, 3, 4 and 5 (FFLMQAVA, FFTLQAVAA, QAVAxQMI, and FMMKAVSNVMI, respectively). These latter residues are part of the large α5, which is part of the sorbitol binding domain in SDH. Such a degree of conservation and the 3D proximity to blocks IV and V, which are part of the active site, suggests a role for these interblock sequences in making up the correct structure of the active site or the substrate binding site. To expand the above analysis, a study of SDH family functional divergence was carried out to detect amino acid sites that have varying evolutionary conservation among member genes, using DIVERGE (DetectIng Variability in Evolutionary Rates among Genes) software [32, 33]. The analysis grouped the amino acids residues responsible for altered functional constraints into two categories: (I) conserved in the first lineage, but variable in the second lineage; (II) conserved in the second lineage, but variable in the first lineage. A site-specific profile based on probability (Qk) was used to identify critical amino acids [34], with a Qk > 0.75 (see Additional file 9). Among the six lineages, only I, II, V and VI were relevant (see Additional file 10). In fact, when lineages I-II were compared, only 3 amino acids (IDD) were conserved in category II. Lineages I-V showed only one amino acid (R) in category I, and two (DR) in category II. The divergence was clearly more pronounced between lineage I and VI, with four amino acids (LPRE) in category I and 9 (IDAGIIAIG) in category II. This divergence pattern was also observed between lineages II and VI, with four amino acids (LDLD) in category I and 12 (FAIVIDAAGMRL) in category II. Finally, the divergence between lineage V and VI was reduced to only one amino acid (K) in category I. To visualize these divergence sites, a 3D representation was carried out for each lineage (see Additional file 10) and for all sites together using Rhodobacter sphaeroides sequence and its crystal structure (pdb: 1k2w) [35] (Figure 6). At first sight, it was clear that divergent amino acids are basically outside the main conserved blocks, clearly indicating that the drift at these sites (shown by different colors in Figure 6A) is well tolerated by the structure with no loss of activity. The changes are outside block I (NADH-binding domain), block III (which stabilizes the central β-sheet), block VII (which determines the reaction direction) and blocks VIII and IX (involved in the cap domain, which defines the substrate channel, Figure 6B). However, as shown in Figure 6B, the main changes are located in and around β5, which contains one of the amino acids of the catalytic tetrad (S139, 1k2w numbering), which is not affected. Thus, it could be concluded that the sequence alignment of the different lineages obtained according to the phylogenetic and functional divergence analysis showed specific fingerprints for each lineage, whose conserved sequences could be very useful for the future classification of SDH enzymes. Figure 6 figure6 The site-specific profile fro predicting critical amino acid residues for the functional divergence between SDH families. A) Critical amino acid residues are represented by circles on the sequence of R. sphaeroides SDH (pdb: 1k2w). Symbols above the sequence represent the secondary structure, springs represent helices and arrows represent β-strands. Conserved blocks of bacterial SDH (I to XI) are indicated below the sequence alignment. Triangles represent the location of the active site. Circles represent the divergent amino acids according to the following color code: Grey; conserved amino acids in Lineage I and divergent in Lineage V, Red; conserved amino acids in Lineage I and divergent in Lineage VI, Orange; conserved amino acids in Lineage II and divergent in Lineage I, Black; conserved amino acids in Lineage II and divergent in Lineage VI, Pink; conserved amino acids in Lineage V and divergent in Lineage I, Purple; conserved amino acids in Lineage V and divergent in Lineage VI, Green; conserved amino acids in Lineage VI and divergent in Lineage I, Blue; conserved amino acids in Lineage VI and divergent in Lineage II. B) Representation of divergent amino acids in the structure of 1k2w. α-helices are indicated in cyan, β-sheets are indicated in purple, loops are indicated in light pink and the divergent amino acids as red spheres. Structure was rendered using PyMol [50]. Conclusions SDR196C family encompasses short chain SDH of prokaryotic origin. The distribution of this family is limited to Gram-negative bacteria, grouping members of the α-, β- and γ-Proteobacteria. This distribution is in agreement with the widespread nature of SDR, and indicates that sorbitol metabolism is of importance among these bacteria as an alternative source of carbon and energy. This variability is also observed in the genetic organization of polyol operon among the different species, and in the phylogenetic analysis, which clearly point to different origins for SDH in bacteria, although the 3D structure among groups is highly conserved, with the typical Rossmann fold motif. Such a degree of divergence in the origin but similarity in the structure suggests that SDHs are of extremely old, and emerged early in the evolution, giving rise to the six different lineages and the three sublineages observed in the phylogenetic analysis. This phylogenetic classification is supported by the sequence differences found in the conserved blocks of SDH, allowing for the first time, the classification of the SDR196C family into different subgroups, and introducing the possibility of expanding the actual classification of SDR enzymes by two extra numbers, the lineage and sublineage, separated by a point. As an example, R. capsulatus SDH could be classified as SDR196C6.3. Methods Sequence retrieval and cluster identification Protein sequences were obtained from the SDR-enzyme database (http://www.sdr-enzymes.org), a sustainable and expandable nomenclature database based on hidden Markov models [8, 15]. The DNA sequences of the 16S rRNA from species encoding the SDH gene were from GenBank. When several strains from the same species encoded the same SDH gene, only one representative strain was included, the strain from the first sequenced genome. Sequence alignment The sequences were aligned using GUIDANCE [25, 26] with the MSA algorithm PRANK [27]. The alignments were further checked manually using Gene-Doc [36]. Large gaps and hyper variable sites were removed from the alignments; the same methodology was applied to gaps at the beginning and end of the alignment, which represent missing sequence data. Aligned sequences and their secondary structure are shown using ESPript [37]. Phylogenetic analysis Prot test and model test (protein and DNA sequences, respectively) were used in order to choose the most appropriate method to calculate the distances [38]. WAG with invariable sites for the SDH protein sequences and GTR with invariable sites for 16S rRNA sequences were used [39, 40]. Three different tree-building methods were used: Maximum Likelihood (ML), Bayesian analysis (BY) and Neighbor Joining (NJ), as implemented in PHYML, MrBayes 3.1.2, and MEGA 4, respectively [4143]. The bootstrap values for ML and NJ trees were obtained after 1,000 generations. For the trees constructed using BY, the Markov chains were run for 1,000,000 generations. The burn-in values were set for 10,000 generations, and the trees were sampled every 100 generations. Splitstree and MEGA 4 tree viewer were used to visualize the trees and calculate confidence values [44, 45]. Functional divergence analysis Type I functional divergence was tested according to the previously described methods, using the DIVERGE software [33]. The alignment used for the phylogenetic analysis was also used for this application. The tree obtained by NJ was refined using the tool PROTTEST [46], to determine the best evolutionary model for the set of query proteins [47]. The crystal structure 1k2w was used to determine the location of divergent amino acids according to the analysis obtained. The test could not be applied to lineages III and IV, since DIVERGE needs at least 4 species to be considered a cluster. A site-specific profile based on probability (Qk) was used to identify critical amino acids [34], with a Qk > 0.75. The values obtained for the critical amino acids and their location in the alignment according to DIVERGE are shown in Additional files 91011, and 12. GC content The GC content of the sequences was calculated and compared to the GC content of the whole genome. The formula used for the calculations was that described by Karlin et al., 2001 [48]. Molecular modeling Protein sequences were 3D modeled with Geno3D [49] and molecular representation were performed by Pymol [50]. Abbreviations SDR: Short-chain dehydrogenase/reductase(s) SDH: Sorbitol dehydrogenase(s) ABC: ATP-binding cassette MDR: Medium-chain dehydrogenase/reductase(s) AKR: Aldo-keto reductase(s) HAD: Haloacid dehalogenase(s) MDH: Mannitol dehydrogenase(s) ML: Maximum likelihood BY: Bayesian analysis NJ: Neighbor joining. References 1. 1. Kavanagh KL, Jornvall H, Persson B, Oppermann U: Medium- and short-chain dehydrogenase/reductase gene and protein families : the SDR superfamily: functional and structural diversity within a family of metabolic and regulatory enzymes. Cell Mol Life Sci. 2008, 65 (24): 3895-3906. 10.1007/s00018-008-8588-y. PubMed  CAS  PubMed Central  Article  Google Scholar  2. 2. Schwartz MF, Jornvall H: Structural analyses of mutant and wild-type alcohol dehydrogenases from drosophila melanogaster. Eur J Biochem. 1976, 68 (1): 159-168. 10.1111/j.1432-1033.1976.tb10774.x. PubMed  CAS  Article  Google Scholar  3. 3. Thatcher DR: The complete amino acid sequence of three alcohol dehydrogenase alleloenzymes (AdhN-11, AdhS and AdhUF) from the fruitfly Drosophila melanogaster. Biochem J. 1980, 187 (3): 875-883. PubMed  CAS  PubMed Central  Article  Google Scholar  4. 4. Jornvall H, Persson B, Krook M, Atrian S, Gonzalez-Duarte R, Jeffery J, Ghosh D: Short-chain dehydrogenases/reductases (SDR). Biochemistry. 1995, 34 (18): 6003-6013. 10.1021/bi00018a001. PubMed  CAS  Article  Google Scholar  5. 5. Krook M, Marekov L, Jornvall H: Purification and structural characterization of placental NAD(+)-linked 15-hydroxyprostaglandin dehydrogenase. The primary structure reveals the enzyme to belong to the short-chain alcohol dehydrogenase family. Biochemistry. 1990, 29 (3): 738-743. 10.1021/bi00455a021. PubMed  CAS  Article  Google Scholar  6. 6. Oppermann UC, Maser E, Hermans JJ, Koolman J, Netter KJ: Homologies between enzymes involved in steroid and xenobiotic carbonyl reduction in vertebrates, invertebrates and procaryonts. J Steroid Biochem Mol Biol. 1992, 43 (7): 665-675. 10.1016/0960-0760(92)90292-Q. PubMed  CAS  Article  Google Scholar  7. 7. Persson B, Krook M, Jornvall H: Characteristics of short-chain alcohol dehydrogenases and related enzymes. Eur J Biochem. 1991, 200 (2): 537-543. 10.1111/j.1432-1033.1991.tb16215.x. PubMed  CAS  Article  Google Scholar  8. 8. Kallberg Y, Oppermann U, Persson B: Classification of the short-chain dehydrogenase/reductase superfamily using hidden Markov models. FEBS J. 2010, 277 (10): 2375-2386. 10.1111/j.1742-4658.2010.07656.x. PubMed  CAS  Article  Google Scholar  9. 9. Kallberg Y, Persson B: Prediction of coenzyme specificity in dehydrogenases/reductases. A hidden Markov model-based method and its application on complete genomes. FEBS J. 2006, 273 (6): 1177-1184. 10.1111/j.1742-4658.2006.05153.x. PubMed  CAS  Article  Google Scholar  10. 10. Pearl F, Todd A, Sillitoe I, Dibley M, Redfern O, Lewis T, Bennett C, Marsden R, Grant A, Lee D, et al: he CATH Domain Structure Database and related resources Gene3D and DHS provide comprehensive domain family information for genome analysis. Nucleic Acids Res. 2005, 33 (Database issue): D247-D251. PubMed  CAS  PubMed Central  Article  Google Scholar  11. 11. Keller B, Volkmann A, Wilckens T, Moeller G, Adamski J: Bioinformatic identification and characterization of new members of short-chain dehydrogenase/reductase superfamily. Mol Cell Endocrinol. 2006, 248 (1–2): 56-60. PubMed  CAS  Article  Google Scholar  12. 12. Kallberg Y, Oppermann U, Jornvall H, Persson B: Short-chain dehydrogenases/reductases (SDRs). Eur J Biochem. 2002, 269 (18): 4409-4417. 10.1046/j.1432-1033.2002.03130.x. PubMed  CAS  Article  Google Scholar  13. 13. Venter JC, Remington K, Heidelberg JF, Halpern AL, Rusch D, Eisen JA, Wu D, Paulsen I, Nelson KE, Nelson W, et al: Environmental genome shotgun sequencing of the Sargasso Sea. Science. 2004, 304 (5667): 66-74. 10.1126/science.1093857. PubMed  CAS  Article  Google Scholar  14. 14. Filee J, Forterre P, Laurent J: The role played by viruses in the evolution of their hosts: a view based on informational protein phylogenies. Res Microbiol. 2003, 154 (4): 237-243. 10.1016/S0923-2508(03)00066-4. PubMed  CAS  Article  Google Scholar  15. 15. Persson B, Kallberg Y, Bray JE, Bruford E, Dellaporta SL, Favia AD, Duarte RG, Jornvall H, Kavanagh KL, Kedishvili N, et al: The SDR (short-chain dehydrogenase/reductase and related enzymes) nomenclature initiative. Chem Biol Interact. 2009, 178 (1–3): 94-98. PubMed  CAS  PubMed Central  Article  Google Scholar  16. 16. Schneider K-H, Giffhorn F: Sorbitol dehydrogenase from Pseudomonas sp.: purification, characterization and application to quantitative determination of sorbitol. Enzyme Microb Technol. 1991, 13 (4): 332-337. 10.1016/0141-0229(91)90153-2. CAS  Article  Google Scholar  17. 17. Jörnvall H, Hedlund J, Bergman T, Oppermann U, Persson B: Superfamilies SDR and MDR: from early ancestry to present forms. Emergence of three lines, a Zn-metalloenzyme, and distinct variabilities. Biochem Biophys Res Commun. 2010, 396 (1): 125-130. 10.1016/j.bbrc.2010.03.094. PubMed  Article  Google Scholar  18. 18. Apisarnthanarak A, Kiratisin P, Mundy LM: Evaluation of Ochrobactrum intermedium bacteremia in a patient with bladder cancer. Diagn Microbiol Infect Dis. 2005, 53 (2): 153-155. 10.1016/j.diagmicrobio.2005.05.014. PubMed  Article  Google Scholar  19. 19. Arora U, Kaur S, Devi P: Ochrobactrum anthropi septicaemia. Indian J Med Microbiol. 2008, 26 (1): 81-83. 10.4103/0255-0857.38868. PubMed  CAS  Article  Google Scholar  20. 20. Bilgin AA, Silverstein J, Hernandez M: Effects of soluble ferri-hydroxide complexes on microbial neutralization of acid mine drainage. Environ Sci Technol. 2005, 39 (20): 7826-7832. 10.1021/es050315k. PubMed  CAS  Article  Google Scholar  21. 21. Schauder S, Schneider KH, Giffhorn F: Polyol metabolism of Rhodobacter sphaeroides: biochemical characterization of a short-chain sorbitol dehydrogenase. Microbiology. 1995, 141 (Pt 8): 1857-1863. PubMed  CAS  Article  Google Scholar  22. 22. de Vrankrijker AM, Wolfs TF, van der Ent CK: Challenging and emerging pathogens in cystic fibrosis. Paediatr Respir Rev. 2010, 11 (4): 246-254. 10.1016/j.prrv.2010.07.003. PubMed  CAS  Article  Google Scholar  23. 23. Rodriguez-Moreno L, Jimenez AJ, Ramos C: Endopathogenic lifestyle of Pseudomonas savastanoi pv. savastanoi in olive knots. Microb Biotechnol. 2009, 2 (4): 476-488. 10.1111/j.1751-7915.2009.00101.x. PubMed  CAS  PubMed Central  Article  Google Scholar  24. 24. Stein MA, Schafer A, Giffhorn F: Cloning, nucleotide sequence, and overexpression of smoS, a component of a novel operon encoding an ABC transporter and polyol dehydrogenases of Rhodobacter sphaeroides Si4. J Bacteriol. 1997, 179 (20): 6335-6340. PubMed  CAS  PubMed Central  Google Scholar  25. 25. Penn O, Privman E, Ashkenazy H, Landan G, Graur D, Pupko T: GUIDANCE: a web server for assessing alignment confidence scores. Nucleic Acids Res. 2010, 38 (suppl 2): W23-W28. PubMed  CAS  PubMed Central  Article  Google Scholar  26. 26. Penn O, Privman E, Landan G, Graur D, Pupko T: An alignment confidence score capturing robustness to guide tree uncertainty. Mol Biol Evol. 2010, 27 (8): 1759-1767. 10.1093/molbev/msq066. PubMed  CAS  PubMed Central  Article  Google Scholar  27. 27. Jordan G, Goldman N: The effects of alignment error and alignment filtering on the sitewise detection of positive selection. Mol Biol Evol. 2012, 29 (4): 1125-1139. 10.1093/molbev/msr272. PubMed  CAS  Article  Google Scholar  28. 28. Woese C: The universal ancestor. Proc Natl Acad Sci. 1998, 95 (12): 6854-6859. 10.1073/pnas.95.12.6854. PubMed  CAS  PubMed Central  Article  Google Scholar  29. 29. Filling C, Berndt KD, Benach J, Knapp S, Prozorovski T, Nordling E, Ladenstein R, Jornvall H, Oppermann U: Critical residues for structure and catalysis in short-chain dehydrogenases/reductases. J Biol Chem. 2002, 277 (28): 25677-25684. 10.1074/jbc.M202160200. PubMed  CAS  Article  Google Scholar  30. 30. Jornvall H, Hoog JO, Persson B: SDR and MDR: completed genome sequences show these protein families to be large, of old origin, and of complex nature. FEBS Lett. 1999, 445 (2–3): 261-264. PubMed  CAS  Article  Google Scholar  31. 31. Jornvall H, Persson M, Jeffery J: Alcohol and polyol dehydrogenases are both divided into two protein types, and structural properties cross-relate the different enzyme activities within each type. Proc Natl Acad Sci USA. 1981, 78 (7): 4226-4230. 10.1073/pnas.78.7.4226. PubMed  CAS  PubMed Central  Article  Google Scholar  32. 32. Gu X: Functional divergence in protein (family) sequence evolution. Genetica. 2003, 118 (2): 133-141. 10.1023/A:1024197424306. PubMed  CAS  Article  Google Scholar  33. 33. Gu X, Vander Velden K: DIVERGE: phylogeny-based analysis for functional–structural divergence of a protein family. Bioinformatics. 2002, 18 (3): 500-501. 10.1093/bioinformatics/18.3.500. PubMed  CAS  Article  Google Scholar  34. 34. Gu J, Wang Y, Gu X: Evolutionary analysis for functional divergence of jak protein kinase domains and tissue-specific genes. J Mol Evol. 2002, 54 (6): 725-733. 10.1007/s00239-001-0072-3. PubMed  CAS  Article  Google Scholar  35. 35. Philippsen A, Schirmer T, Stein MA, Giffhorn F, Stetefeld J: Structure of zinc-independent sorbitol dehydrogenase from Rhodobacter sphaeroides at 2.4 A resolution. Acta Crystallogr D Biol Crystallogr. 2005, 61 (Pt 4): 374-379. PubMed  Article  Google Scholar  36. 36. Nicholas KB, Nicholas HB, Deerfield DW: {GeneDoc: analysis and visualization of genetic variation}. EMBNEW NEWS. 1997, 4: 14- Google Scholar  37. 37. Gouet P, Courcelle E, Stuart DI, Metoz F: ESPript: analysis of multiple sequence alignments in PostScript. Bioinformatics. 1999, 15 (4): 305-308. 10.1093/bioinformatics/15.4.305. PubMed  CAS  Article  Google Scholar  38. 38. Posada D, Crandall KA: MODELTEST: testing the model of DNA substitution. Bioinformatics. 1998, 14 (9): 817-818. 10.1093/bioinformatics/14.9.817. PubMed  CAS  Article  Google Scholar  39. 39. Goldman N, Whelan S: Statistical tests of gamma-distributed rate heterogeneity in models of sequence evolution in phylogenetics. Mol Biol Evol. 2000, 17 (6): 975-978. 10.1093/oxfordjournals.molbev.a026378. PubMed  CAS  Article  Google Scholar  40. 40. Lanave C, Preparata G, Saccone C, Serio G: A new method for calculating evolutionary substitution rates. J Mol Evol. 1984, 20 (1): 86-93. 10.1007/BF02101990. PubMed  CAS  Article  Google Scholar  41. 41. Felsenstein J: Mathematics vs. Evolution: Mathematical Evolutionary Theory. Science. 1989, 246 (4932): 941-942. 10.1126/science.246.4932.941. PubMed  CAS  Article  Google Scholar  42. 42. Guindon S, Gascuel O: A simple, fast, and accurate algorithm to estimate large phylogenies by maximum likelihood. Syst Biol. 2003, 52 (5): 696-704. 10.1080/10635150390235520. PubMed  Article  Google Scholar  43. 43. Huelsenbeck JP, Ronquist F: MRBAYES: Bayesian inference of phylogenetic trees. Bioinformatics. 2001, 17 (8): 754-755. 10.1093/bioinformatics/17.8.754. PubMed  CAS  Article  Google Scholar  44. 44. Huson DH, Bryant D: Application of phylogenetic networks in evolutionary studies. Mol Biol Evol. 2006, 23 (2): 254-267. PubMed  CAS  Article  Google Scholar  45. 45. Tamura K, Dudley J, Nei M, Kumar S: MEGA4: molecular evolutionary genetics analysis (MEGA) software version 4.0. Mol Biol Evol. 2007, 24 (8): 1596-1599. 10.1093/molbev/msm092. PubMed  CAS  Article  Google Scholar  46. 46. Abascal F, Zardoya R, Posada D: ProtTest: selection of best-fit models of protein evolution. Bioinformatics. , 21 (9): 2104-2105. 47. 47. Benítez-Páez A: Cárdenas-Brito S. 2011, Gutiérrez AJ: A practical guide for the computational selection of residues to be experimentally characterized in protein families. Briefings in Bioinformatics Google Scholar  48. 48. Karlin S: Detecting anomalous gene clusters and pathogenicity islands in diverse bacterial genomes. Trends Microbiol. 2001, 9 (7): 335-343. 10.1016/S0966-842X(01)02079-0. PubMed  CAS  Article  Google Scholar  49. 49. Combet C, Jambon M, Deleage G, Geourjon C: Geno3D: automatic comparative molecular modelling of protein. Bioinformatics. 2002, 18 (1): 213-214. 10.1093/bioinformatics/18.1.213. PubMed  CAS  Article  Google Scholar  50. 50. Schrödinger : The PyMOL Molecular Graphics System, Version 1.3. In.: LLC. Download references Acknowledgements This study was partially supported by MINECO-FEDER (BIO2010-22225-C02-01) and Programa de Ayuda a Grupos de Excelencia de la Región de Murcia de la Fundación Séneca (04541/GERM/06, Plan Regional de Ciencia y Tecnología 2007–2010). A.S.C and M.I.G.G are holders of predoctoral research grants from Grupos de Excelencia de la Región de Murcia, Spain. Author information Affiliations Authors Corresponding author Correspondence to Álvaro Sánchez-Ferrer. Additional information Competing interests The authors declare that they have no competing interest. Authors’ contributions ASF and FGC designed research. MIGG did sequence retrieval and alignments with ESPript. ASC carried out phylogenetic analysis by using related computer programs, and together with ASF, drafting of the manuscript. All authors read and approved the final manuscript. Electronic supplementary material Additional file 1: Distribution of SDH gene among bacteria. The table indicates the bacterial species that encode a SDH gene, its taxonomy, ecology and niche. (PDF 42 KB) Additional file 2: GC content differences between SDH genes and genome. The table indicates the differences in GC content between the SDH gene and the core genome of the bacterium, where it is encoded. (PDF 36 KB) Additional file 3: Structure of the SDH clusters among bacterial groups. SDH gene was placed in the middle to facilitate cluster visualization. Variants of the cluster among taxonomic groups are represented by numbers (1–21). (PDF 74 KB) Multiple sequence alignments (MSAs) obtained with GUIDANCE and their corresponding Guidance scores [ Additional file 4: [25, 26]. The file shows the result obtained for the MSA of the 6 lineages, 3 sublineages and 16S rRNA. In all cases, an overall quality assessment (Guidance score) of above 0.97 was obtained with the MSA algorithm PRANK [27]. (PDF 12 MB) Additional file 5: Phylogenetic trees of bacteria containing SDH gene. The file shows two phylogenetic trees of SDH gene using Bayesian and Maximun Likelihood, as tree building methods. (PDF 438 KB) Additional file 6: Phylogenetic trees (16S rRNA) of bacteria containing the SDH gene. The file contained two phylogenetic trees of 16S rRNA of bacteria containing SDH gene, using Bayesian and Maximum Likelihood, as tree building methods. (PDF 335 KB) Molecular modeling of SDH enzymes from the six lineages described in bacterial SDH. Additional file 7: The proteins were modeled with Geno3D [49] and rendered by PyMol [50]. Selected proteins were Uniprot codes: lineage 1, A3MHB9; lineage 2, A1WMN; lineage 3 E1VCL7; lineage 4, A5FVQ; lineage 5, A9CES4; lineage 6.1, O68112; lineage 6.2, A3K129; lineage 6.3, A3PKH5. (PDF 2 MB) Multiple sequence alignment of bacterial SDH proteins. Additional file 8: ESPript [37] output was obtained with the aligned sequences from Additional file 1. Strictly conserved residues have a solid background. Symbols above sequences represent the secondary structure. Conserved structural blocks (I-XI) are shown below the sequences. Circles represent the divergent amino acids according to the following color code: Grey; conserved amino acids in Lineage I and divergent in Lineage V, Red; conserved amino acids in Lineage I and divergent in Lineage VI, Orange; conserved amino acids in Lineage II and divergent in Lineage I, Black; conserved amino acids in Lineage II and divergent in Lineage VI, Pink; conserved amino acids in Lineage V and divergent in Lineage I, Purple; conserved amino acids in Lineage V and divergent in Lineage VI, Green; conserved amino acids in Lineage VI and divergent in Lineage I, Blue; conserved amino acids in Lineage VI and divergent in Lineage II. (PDF 5 MB) Predicted critical amino acid sites responsible for functional divergence. Additional file 9: The table represents the values of Qk of all pair analyses. Values with a Qk > 0.75 are indicated with a red background. (PDF 63 KB) Candidates for amino acid sites related with functional divergence. Additional file 10: The numbering used corresponds with that of the alignment implemented by DIVERGE. Cat. I refers to Category I and Cat. II refers to Category II. A: Cat. II; conserved tandem in Lineage II and variable in Linage I. B: Cat. I; Conserved tandem in Lineage I and variable in Lineage V and Cat. II; conserved tandem in Lineage V and variable in Lineage I. C: Cat. I; conserved tandem in Lineage V and variable in Lineage VI. D: Cat. I; conserved tandem in Lineage I and variable in Lineage VI and Cat. II; conserved tandem in Lineage VI and variable in Lineage I. E: Cat. I; conserved tandem in Lineage II and variable in Lineage VI and Cat. II; conserved tandem in Lineage VI and variable in Lineage II. Critical amino acids responsible for functional divergence are shown in the R. sphaeroides SDH crystal structure (pdb:1k2w). Divergent residues of category I are depicted in red and those of category II are depicted in blue. (PDF 10 MB) Additional file 11: Alignment of SDH family in ClustalW format (.aln) used in the DIVERGE analysis.(ALN 26 KB) Additional file 12: Phylogenetic tree in PhylM (.ph) used in the DIVERGE analysis.(PH 2 KB) Authors’ original submitted files for images Rights and permissions Open Access This article is published under license to BioMed Central Ltd. This is an Open Access article is distributed under the terms of the Creative Commons Attribution License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Reprints and Permissions About this article Cite this article Sola-Carvajal, A., García-García, M.I., García-Carmona, F. et al. Insights into the evolution of sorbitol metabolism: phylogenetic analysis of SDR196C family. BMC Evol Biol 12, 147 (2012). https://doi.org/10.1186/1471-2148-12-147 Download citation Keywords • Polyol • Horizontal Gene Transfer Event • Tagatose • Mannitol Dehydrogenase • Specific Fingerprint \
The Difference Between Sucrose and Sucralose Are sucrose and sucralose the same? This is the structure of sucralose or Splenda, an artificial sweetener. The chemical structure of sucralose. MOLEKUUL/SCIENCE PHOTO LIBRARY/Getty Images Sucrose and sucralose are both sweeteners, but they aren't the same. Here's a look at how sucrose and sucralose are different. Sucrose Versus Sucralose Sucrose is a naturally occurring sugar, commonly known as table sugar. Sucralose, on the other hand, is an artificial sweetener, produced in a lab. Sucralose, like Splenda, is trichlorosucrose, so the chemical structures of the two sweeteners are related, but not identical. The molecular formula of sucralose is C12H19Cl3O8, while the formula for sucrose is C12H22O11. Superficially, the sucralose molecule looks like the sugar molecule. The difference is that three of the oxygen-hydrogen groups attached to the sucrose molecule are replaced by chlorine atoms to form sucralose. Unlike sucrose, sucralose is not metabolized by the body. Sucralose contributes zero calories to the diet, compared with sucrose, which contributes 16 calories per teaspoon (4.2 grams). Sucralose is about 600 times sweeter than sucrose. But unlike most artificial sweeteners, it doesn't have a bitter aftertaste. About Sucralose Sucralose was discovered by scientists at Tate & Lyle in 1976 during the taste-testing of a chlorinated sugar compound. One report is that researcher Shashikant Phadnis thought his coworker Leslie Hough asked him to taste the compound (not a usual procedure), so he did and found the compound to be extraordinarily sweet compared with sugar. The compound was patented and tested, first approved for use as a non-nutritive sweetener in Canada in 1991. Sucralose is stable under a wide pH and temperature ranges, so it can be used for baking. It is known as E number (additive code) E955 and under trade names including Splenda, Nevella, Sukrana, Candys, SucraPlus, and Cukren. Health Effects Hundreds of studies have been performed on sucralose to determine its effects on human health. Because it's not broken down in the body, it passes through the system unchanged. No link has been found between sucralose and cancer or developmental defects. It's considered safe for children, pregnant women, and nursing women. It's also safe for use by people with diabetes; however, it does raise blood sugar levels in certain individuals. Since it's not broken down by the enzyme amylase in saliva, it can't be used as an energy source by mouth bacteria. In other words, sucralose does not contribute to the incidence of dental caries or cavities. However, there are some negative aspects to using sucralose. The molecule eventually breaks down if cooked long enough or at a high enough temperature, releasing potentially harmful compounds called chlorophenols. Ingesting these alters the nature of our gut bacteria, potentially changing the way the body handles actual sugar and other carbohydrates, and possibly leading to cancer and male infertility. Also, sucralose may increase insulin and blood glucose levels and decrease insulin sensitivity, all effects that people with diabetes are trying to avoid. At the same time, since the molecule isn't digested, it's released into the environment contributing to further pollution and public health problems. Learn More About Sucralose While sucralose is hundreds of times sweeter than sugar, it's not even close to the sweetness of other sweeteners, which may be hundreds of thousands of times more potent than sugar. Carbohydrates are the most common sweeteners, but certain metals also taste sweet, including beryllium and lead. Highly toxic lead acetate or "sugar of lead" was used to sweeten drinks in Roman times and was added to lipsticks to improve their flavor. Format mla apa chicago Your Citation Helmenstine, Anne Marie, Ph.D. "The Difference Between Sucrose and Sucralose." ThoughtCo, Feb. 16, 2021, thoughtco.com/difference-between-sucrose-and-sucralose-607389. Helmenstine, Anne Marie, Ph.D. (2021, February 16). The Difference Between Sucrose and Sucralose. Retrieved from https://www.thoughtco.com/difference-between-sucrose-and-sucralose-607389 Helmenstine, Anne Marie, Ph.D. "The Difference Between Sucrose and Sucralose." ThoughtCo. https://www.thoughtco.com/difference-between-sucrose-and-sucralose-607389 (accessed July 28, 2021).
A Healthy Pregnancy Diet Many women worry about pregnancy weight gain and want to lose weight when they are pregnant.  But losing weight when you are pregnant is not something that women should do unless they so so in guidance with their Doctor. Pregnancy_dietBut if a pregnant woman eats healthy foods when she is pregnant and eats the right meals (check out lots of healthy meal recipes here) then the pregnancy weight gain can be a normal and healthy amount – which in an average pregnancy is around the 12-14kg mark. A good point to note is that there is a common saying that a pregnant woman eats for two but a pregnant women needs approx 300 calories extra per day and the food eaten should be healthy and not be junk food. So what should a pregnant woman eat? A balanced diet which is made up of complex carbohydrates, proteins, fats and dairy products as well as fruits and vegetables. Let’s take each of these, carefully. 1) Carbohydrates A pregnant woman should aim for carbohydrates in the form of grain products as these are the main sources of complex carbohydrates. They help increase energy, control weight gain, nausea and constipation for the mother and provide folate, vitamin B, proteins and fibre for the baby. Six servings a day of complex carbohydrates like pasta, whole wheat bread and brown rice should be sufficient and  a serving would be a cup of cooked pasta or two slices of bread. Grain products like white bread and rice, biscuit and such are not quite as impressive in nutritional worth as their whole grain alternatives.  2)Proteins These would be best when two servings of it are taken each day. A serving of protein is equal  to two small eggs,  half a cup dried beans, cooked lentils or split peas or a 100 gm of poultry, fish or lean meat. Proteins have amino acids which build the human cells. They are as such very important for the foetus to develop and also prevent pre-eclampsia in the latter part of the pregnancy. Being found usually in iron-rich foods, they also help to oxygenate the blood of both mother and baby, properly.  3) Fruits and Vegetables The minerals, vitamins and fibre these provide, prevent constipation. They give folate, calcium, iron and vitamin B. Vitamin A, usually found in yellow fruits and green leafy vegetables do wonders for the baby’s eye, hair, skin and bones. Its supplement however, has been linked to birth deformities in babies so please, stick to getting this vitamin from whole foods. Vitamin C in fruits and vegetables such as tomatoes, berries, broccoli and melons are essential for tissue repair and growth of the baby’s bones. Three servings should be taken of this vitamin daily as it cannot be stored in the body in large amounts. Generally, two servings of fruit and five, of veggies should be okay daily. A whole fruit, half a  cup of chopped fruits or non-leafy vegetables or a full cup of salad leaves, each pass for a serving. 4)Dairy Products Dairy products should be taken up to at least 4 servings a day. Dairy products contain calcium which helps the development of the baby’s  muscles, heart and nerves, blood clotting and the building of the baby’s teeth. Servings for dairy products would be one cup of milk or yoghurt or two slices of cheese. For lactose intolerance you could work with canned bony fishes like salmon.  5)Fats Fats are necessary for the baby’s development. While a sweet tooth can be indulged once in a while with cakes and ice cream, it’s really the essential fats found in poly and mono unsaturated oils like sunflower and olive oils respectively that you want to aim for.  6)Water and Fluids In the overall scheme of things, the place of water and fluids cannot be ignored. They help in preventing constipation, early labour and stretch marks. At least two litres a day is advisable and even more, if you are retaining fluid. The progression of the pregnancy would also demand the intake of more fluid. At times when we do not feel like drinking water other fluids like soup, milk and juice can be taken to add up to the required amount but water should always be the first drink of choice and caffeine, limited to one cup per day. Finally, it would be easier to stick to your healthy diet if you indulge in a sweet treat once in a while. Make those treats beautiful options like a fruit salad with honey and yoghurt or a strawberry, blueberry and flaxseed smoothie and the wonderful effects of your entire diet on both you and your baby would be evident long after your baby is born. To see more nutrition advice for pregnancy and breastfeeding click here To see what exercise you should do in pregnancy click here Are you part of the 28 Day Challenge? Don’t miss out. Join millions of mums and take control of your body and life. You’ll see results in 28 days while saving money and eating delicious family-friendly food. Take Part
Bunter Hund jQuery Mobile – Single-Page-Applications realisieren Kommentare Wer von nativer Entwicklung auf HTML5/JavaScript umstellt, steht ohne GUI-Stack da. Es gibt kaum ein natives SDK, das keine Möglichkeit zum Realisieren von Benutzerschnittstellen mitliefert – bei der Arbeit mit dem „offenen Web“ müssen Sie das GUI anhand von CSS realisieren. Aufgrund der in den letzten Jahren wesentlich gestiegenen Ansprüche der Nutzer ist das für den durchschnittlichen Entwickler nicht oder nur mit sehr großem Aufwand zu bewerkstelligen. Da dieses Problem immer wieder auftritt, entstand im Laufe der Zeit eine Gruppe von als Frameworks bezeichneten Bibliotheken mit „Musterlösungen“. jQuery Mobile stammt aus der Feder des für die weltbekannte jQuery-Bibliothek bekannten Entwicklerteams. Nicht zuletzt aus diesem Grund hat sich das Framework im Laufe der letzten Monate als Quasistandard in Sachen Benutzerschnittstellen etabliert. Single-Page forever Traditionelle Webseiten wurden meist aus mehreren HTML-Seiten aufgebaut, die miteinander durch Hyperlinks verbunden waren. Als Stuart Morris im Jahr 2002 seine „Self-Contained Website“ auf die Bevölkerung losließ, dachte er mit Sicherheit nicht daran, dass dieses Konzept einige Jahre später absolute Marktherrschaft erreichen würde. Aus Sicht eines mit jQuery Mobile arbeitenden Entwicklers ist die Erstellung einer Single-Page-Applikation in höchstem Maße wünschenswert. Da die Webseite beim Wechsel des aktiven „Frames“ nicht neu geladen wird, bleiben die diversen globalen Variablen „am Platz“. Zudem lässt sich ein lokaler Wechsel weitaus leichter animieren, da die Bewegung der Steuerelemente durch vom Framework bereitgestellten Code vorgenommen werden kann. Nach diesen einführenden Überlegungen ist es nun an der Zeit, unsere erste jQuery-Mobile-„Applikation“ zu realisieren. Dazu brauchen wir die aktuellste Version des Frameworks, die sich hier herunterladen lässt. Entpacken Sie das .zip-Archiv danach an eine für Sie bequeme Stelle. Mit der Option „Custom Download“ können Sie den jQuery Mobile Builder aktivieren, der das Erstellen von „benutzerdefinierten“ Distributionen erlaubt. Diese unterscheiden sich von der „Normalvariante“ insofern, als sie nur die von ihnen benötigten Funktionen enthalten. Leider kann das Framework dies nicht automatisch feststellen, weshalb sie die verwendeten Bereiche selbst angeben müssen – das Vergessen eines Moduls führt in diesem Fall zu einer nicht lauffähigen Applikation. jQuery Mobile wird aus Gründen der Einfachheit ohne eine Version der Mutterbibliothek ausgeliefert, und ist im Grunde genommen auch ohne sie lebensfähig. Im Unterordner /demos/js/ findet sich eine passende Version – da die meisten Programme jQuery auf die eine oder andere Art voraussetzen, empfiehlt sich ihre Verwendung. Im nächsten Schritt wird eine .html-Datei erstellt. Deren Korpus ist in Listing 1 zu sehen. <html> <head> <title>Hello World</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <meta name="format-detection" content="telephone=no" /> <meta name="viewport" content="width=device-width, initial-scale=1"> <script src="jquery.js"></script> <script src="jquery.mobile-1.4.2.js"></script> <link rel="stylesheet" href="jquery.mobile-1.4.2.css"> </head> jQuery Mobile muss in drei Schritten eingebunden werden. Nach dem Laden der „Mutterbibliothek“ folgt zuerst die JavaScript-Datei mit dem Objektcode. Das .css-File enthält diverse „Stilrichtlinien“, die das Aussehen der Applikation beeinflussen. Die von Haus aus voreingestellten Viewport-Einstellungen führen zu unleserlich kleinem Text. Unsere Settings sind praxiserprobt und funktionieren auf den meisten Telefonen ohne allzu große Probleme. Eine auf jQuery Mobile basierende Applikation ist normalerweise in mehrere Seiten aufgeteilt. Diese entstehen durch <div>-Tags, denen die Data Role „page“ zugewiesen wird. Unser Beispiel realisiert zwei Pages, die erste hört auf den Namen „foo“: <body> <div data-role="page" id="foo"> Seiten bestehen normalerweise aus drei Elementen, die wiederum durch <div>-Tags realisiert werden. Der Header dient dabei als Kopfzeile, während der eigentliche Inhalt in den content-Bereich wandert. Eventuelle „Schlussanmerkungen“ sind im Footer bestens aufgehoben. Es ist nicht unbedingt notwendig, Header und Footer anzulegen – jQuery Mobile funktioniert auch dann, wenn Sie „nur“ einen Body mit Inhalten deklarieren: <div data-role="header"> <h1>Seite 1</h1> </div><!-- /header --> Der content-Tag unseres Beispiels enthält eine kleine Besonderheit: jQuery Mobile automatisiert den Wechsel zwischen den einzelnen Seiten ihrer Applikation, wenn sie „passende“ Hyperlinks anlegen (Listing 2). <p>Das ist die Seite 1.</p> <p>Auf die zweite <a href="#bar">Seite springen</a></p> </div><!-- /content --> <div data-role="footer"> <h4>Page Footer</h4> </div><!-- /footer --> </div><!-- /page --> Die Struktur der zweiten Seite ist an die der ersten Seite angelehnt. Der einzige Unterschied besteht darin, dass wir den Hyperlink diesmal auf Page 1 verweisen lassen (Listing 3). <!-- Hier beginnt Seite 2 --> <div data-role="page" id="bar> <div data-role="header"> <h1>Seite 2</h1> </div><!-- /header --> <div data-role="content"> <p>Das ist die zweite Seite!</p> <p<<a href="#foo">Zurück zur Seite 1</a></p> </div><!-- /content --> <div data-role="footer"> <h4>Page Footer</h4> </div><!-- /footer --> </div><!-- /page --> </body> </html> Beim Testen von jQuery-basierten Webseiten ist es hilfreich, einen kleinen Webserver aufzusetzen und die Inhalte so auf die Endgeräte zu bringen. Unter Ubuntu ist dies vergleichsweise simpel, da der Python-Interpreter mit einem Server ausgeliefert wird. Seine Bedienung ist mit python -m SimpleHTTPServer vergleichsweise simpel. Ab diesem Zeitpunkt steht ein HTTP-Server am Port 8000 bereit. Damit ist das Beispiel – fürs Erste – einsatzbereit. Abbildung 1 zeigt, wie die erste Seite auf einem unter Android 4.0 laufenden Smartphone Phablet (Galaxy Note I) im Landscape Mode aussieht. Abb. 1: jQuery Mobile funktioniert problemlos Abb. 1: jQuery Mobile funktioniert problemlos Pop-ups… Viele Entwickler nutzen jQuery Mobile aufgrund der Vielzahl an enthaltenen Steuerelementen als bessere Widget-Bibliothek. Die Erstellung von Pop-ups und Dialogen ist besonders populär, da HTML5 und Co normalerweise keine Möglichkeit zum Realisieren eines aufpoppenden Fensters mitbringen. jQuery Mobile deckte diesen Anwendungsfall bisher über zwei getrennte Widgets ab: Der Dialog war für „modale“ Klassen zuständig, während sich das Pop-up auch durch einen Klick in den Hintergrund schließen ließ. In der aktuellsten Version des Frameworks wurde die Dialogklasse als „deprecated“ markiert, aufscheinende Fenster sind fortan immer vom Pop-up abgeleitet. Die Verwendung dieser Klasse ist in den beiden Snippets in Listing 4 illustriert. <div data-role="page" id="foo"> <div data-role="content"> <a class="ui-btn ui-corner-all ui-shadow ui-btn-inline" data-transition="pop" data-rel="popup" href="#popup1">Popup</a> <a class="ui-btn ui-corner-all ui-shadow ui-btn-inline" data-transition="pop" data-rel="popup" href="#dialog1">Dialog</a> <div data-role="popup" id="popup1"> <div data-role="header" data-theme="a"> <h1>Willkommen!</h1> </div> <div role="main" class="ui-content"> Dies ist ein normales Popup!<br> <a href="#" class="ui-btn ui-corner-all ui-shadow ui-btn-inline ui-btn-b" data-rel="back">OK</a> </div> </div> <div data-role="popup" id="dialog1" data-dismissible="false" style="max-width:400px;"> <div data-role="header" data-theme="a"> <h1>Dialog!</h1> </div> <div role="main" class="ui-content"> Ich lasse mich nur über einen Button schließen!<br> <a href="#" class="ui-btn ui-corner-all ui-shadow ui-btn-inline ui-btn-b" data-rel="back">OK!</a> </div> </div> </div><!-- /content --> </div><!-- /page --> Die neue Version unserer Page enthält zwei Hyperlinks, die diesmal als Buttons ausgeführt sind. In ihrer Deklaration finden Sie neben der Zuweisung der diversen Stilklassen auch zwei data-Attribute, die das Verhalten und die Beziehung zwischen den Widgets festlegen. Das Übergeben von „pop“ an data-transition sorgt dafür, dass das neue Fenster mit einer Aufpoppanimation am Bildschirm erscheint. Dank der Zuweisung von data-rel weiß das Framework, dass diese Links einen Dialog bzw. ein Pop-up öffnen sollen. Diese Information ist unter anderem für die Verwaltung des Back-Stacks notwendig. Unsere beiden Pop-ups entstehen durch das Setzen der data-role-Eigenschaft. Ein mit data-dismissible=false ausgestattetes Fenster ist modal, lässt sich also nicht durch einen Klick in den Hintergrund schließen. Das Schließen der Dialoge ist in beiden Fällen auch durch einen Link bzw. Button möglich, der als data-rel den Wert „back“ übergeben bekommt. Die meisten Stilklassen des Frameworks adjustieren ihr Verhalten, wenn sie ein einem Pop-up eingesetzt werden. Unser Beispiel nutzt dies zur Realisierung von professionell aussehenden Kopfzeilen, die den Fenstern einen professionellen Touch geben. Wichtig ist, dass die Definition von Dialogen und/oder Pop-ups immer im Körper einer Page erfolgen muss. Im Mark-up stehende Pop-ups werden von der jQuery-Mobile-Laufzeitumgebung nicht erkannt und führen außerdem zu Grafikfehlern. Damit ist auch unser zweites Programmbeispiel soweit einsatzbereit. In Abbildung 2 sehen Sie das Resultat auf einem unter Android 4.0 laufenden Tablet. Der Dialog erscheint hervorgehoben an der oberen Kante des Bildschirms Abb. 2: Der Dialog erscheint hervorgehoben an der oberen Kante des Bildschirms …ergeben ein Menü Pop-ups lassen sich nicht nur zur Realisierung von Dialogen verwenden. Entwickler nutzen die Klasse seit Jahren auch als Basis für Pop-up-Menüs – diese anfangs eher als Nebeneffekt angesehene Verwendung wird von Seiten des Herstellers mittlerweile in der offiziellen Dokumentation angeführt und gilt somit als „Design Pattern“ (Listing 5). <div data-role="popup" id="popupMenue" data-theme="none"> <div data-role="collapsibleset" data-theme="b" data-content-theme="a" data-collapsed-icon="arrow-r" data-expanded-icon="arrow-d" style="margin:0; width:250px;"> <div data-role="collapsible" data-inset="false"> <h2>Gruppe A</h2> <ul data-role="listview"> <li><a href="#" data-rel="back">Verlassen!</a></li> <li><a href="#" data-rel="dialog">AB</a></li> </ul> </div><!-- /collapsible --> <div data-role="collapsible" data-inset="false"> <h2>Gruppe B</h2> <ul data-role="listview"> <li><a href="#" data-rel="dialog">BA</a></li> </ul> </div><!-- /collapsible --> <div data-role="collapsible" data-inset="false"> <h2>Gruppe C</h2> <ul data-role="listview"> <li><a href="#" data-rel="dialog">CA</a></li> </ul> </div><!-- /collapsible --> </div><!-- /collapsible set --> </div><!-- /popup --> Unser Menü besteht aus einem Collapsible-Set, das eine Gruppe von Collapsibles enthält. Der etwas seltsame Name dieser „Klasse“ leitet sich vom englischen Wort für „kollabieren“ ab – es handelt sich dabei um ein Widget, das seine Inhalte „zusammenfaltet“ und so vom Bildschirm entfernt (Abb. 3). Das mittlere Collapsible ist aufgeklappt, während die beiden äußeren im kompakten Zustand sind Abb. 3: Das mittlere Collapsible ist aufgeklappt, während die beiden äußeren im kompakten Zustand sind Die eigentlichen Menüoptionen werden dann in Form von Listen angeliefert. Per data-role wird festgelegt, wie sich die einzelnen Items verhalten. In unserem Beispiel schließt das Item „Verlassen!“ die Liste, während die anderen Items keinen Einfluss auf das Menü nehmen. Aus Platzgründen drucken wir hier die eigentliche Ereignisverarbeitung nicht ab. Die meisten von jQuery Mobile generierten Widgets lassen sich mit normalen Event Handlern nach dem Schema onClick ausstatten. Gitter herbei In den Anfangszeigen des Internets waren tabellenbasierte Layouts in Mode – Entwickler nutzten das <table>-Tag zur Realisierung diverser Steuerelementanordnungen. jQuery Mobile begegnet diesem Problem durch das Anbieten eines Grid-Widgets, dessen Verwendung in Listing 6 illustriert ist. <div class="ui-grid-a"> <div class="ui-block-a"><div class="ui-bar ui-bar-a" style="height:60px">Block A</div></div> <div class="ui-block-b"><div class="ui-bar ui-bar-a" style="height:60px">Block B</div></div> </div><!-- /grid-a --> <div class="ui-grid-d"> <div class="ui-block-a"><div class="ui-bar ui-bar-a" style="height:60px">Block A</div></div> <div class="ui-block-b"><div class="ui-bar ui-bar-a" style="height:60px">Block B</div></div> <div class="ui-block-c"><div class="ui-bar ui-bar-a" style="height:60px">Block C</div></div> <div class="ui-block-d"><div class="ui-bar ui-bar-a" style="height:60px">Block D</div></div> <div class="ui-block-e"><div class="ui-bar ui-bar-a" style="height:60px">Block E</div></div> </div><!-- /grid-d --> Unser Beispiel realisiert eine zweireihige und eine fünfreihige Tabelle (Abb. 4). In jQuery Mobile sind Tabellen immer „eine Reihe hoch“, mehrspaltige Versionen entstehen durch das Untereinanderreihen von mehreren <div>-Tags. Die eigentliche Intelligenz findet sich – wie so oft – in der Zuweisung der data-roles. Der Buchstabe hinter ui-grid legt die Art der zu generierenden Tabelle fest. „A“ steht dabei für eine einspaltige Tabelle, „d“ erstellt ein Widget mit fünf Columns. Spalteninhalte werden in Form von <div>-Tags angeliefert, die ihre Position durch Zuweisung einer CSS-Klasse eingeschrieben bekommen. Übrigens: in diesem Listing hat sich kein Tippfehler eingeschlichen. Eine fünfspaltige Tabelle entsteht durch die Erstellung einer vierspaltigen. Dieser wird danach eine fünfte Spalte eingeschrieben, die sich den notwendigen Platz automatisch von der Umgebung „holt“. Zweizeiliges und fünfzeiliges Grid in friedlicher Zweisamkeit Abb. 4: Zweizeiliges und fünfzeiliges Grid in friedlicher Zweisamkeit Mehr Widgets Zu guter Letzt wollen wir noch einige interessante Widgets in „Kurzform“ vorstellen. Als Erstes wollen wir einen Flipswitch realisieren. Dabei handelt es sich um die von iOS her bekannte Komponente, die dort unter anderem zum Ein- und Ausschalten von WLAN und Bluetooth zum Einsatz kommt. Das dazu notwendige Listing sieht so aus: <input data-role="flipswitch" name="flip-checkbox-1" id="flip-checkbox-1" type="checkbox"> Die insbesondere in Audio-Apps weit verbreiteten seitlichen Slider lassen sich in jQuery Mobile ebenfalls mit nur einer Zeile Mark-up realisieren. Das Steuerelement ist mittlerweile als „deprecated“ markiert, funktioniert aber nach wie vor problemlos: <input type="range" name="slider-1" id="slider-1" value="60" min="0" max="100"> Der – wie sein einfacheres Vorbild als „deprecated“ markierte – Rangeslider stellt eine besondere Art des normalen Sliders dar. Er hat „zwei Taps“, die dem Benutzer das Festlegen eines minimalen und eines maximalen Werts erlauben. Sein Code sieht so aus: <div data-role="rangeslider"> <input name="range-1a" id="range-1a" min="0" max="100" value="0" type="range" /> <input name="range-1b" id="range-1b" min="0" max="100" value="100" type="range" /> </div> Rangeslider entstehen durch das Gruppieren zweier normaler Slider in einem <div>-Tag vom Typ rangeslider – das Framework erkennt diese Konstellation im Rahmen der Analyse des DOMs, und fasst die beiden Widgets wie in Abbildung 5 gezeigt zusammen. Die beiden Slider wurden zu einem Rangeslider zusammengefasst Abb. 5: Die beiden Slider wurden zu einem Rangeslider zusammengefasst Zugriffe auf die im Steuerelement enthaltenen Daten erfolgen normalerweise über eine Akzessorfunktion. Sie bekommt einen Stringparameter übergeben, der die Art der zu erledigenden Aufgabe angibt – die Anzahl der zusätzlich erforderlichen Parameter ist vom übergebenen String abhängig. In unserem Fall ist dies nicht notwendig, da jQuery mit val() einen „Shortcut“ zur Ermittlung der Werte eines Felds anbietet. Seine Verwendung sieht so aus: function analyzeSlider() { var val1=$('#range-1a').val(); var val2=$('#range-1b').val(); alert("Ranges: " + val1 + " " + val2); } Beachten Sie bitte, dass das direkte Ansprechen der beiden „Subslider“ nur zum Setzen/Auslesen der Werte zulässig ist. Das Aktivieren/Deaktivieren des „gesamten Sliders“ sollte immer über das Mutter-div-Tag und die zugehörige rangeslider()-Funktion erfolgen. PhoneGap, dozil Die hier gezeigte Lösung lässt sich mit Fug und Recht als „FAQ“ in Sachen mobiler Frameworks betrachten. PhoneGap-Entwickler betrachten den GUI-Stack des jQuery-Projekts mittlerweile als „ihre Grafik-Engine“ – dementsprechend viele Produkte werden mit der Frameworkkombination ausgeliefert. Ärgerlicherweise emittieren sowohl jQuery Mobile als auch PhoneGap ein eigenes Event, das den Entwickler über die Fertigstellung des Ladeprozesses informiert. Die Abfolge der beiden Ereignisse ist mehr oder weniger zufällig. Im Laufe der Jahre hat sich ein „Standard-Pattern“ herausgearbeitet, das in Listing 7 illustriert wird. <script type="text/javascript"> var deviceReadyDeferred = $.Deferred(); var jqmReadyDeferred = $.Deferred(); document.addEventListener("deviceReady", deviceReady, false); function deviceReady() { console.log("PG up"); deviceReadyDeferred.resolve(); } $(document).one("mobileinit", function () { console.log("jQM up"); jqmReadyDeferred.resolve(); }); $.when(deviceReadyDeferred, jqmReadyDeferred).then(doWhenBothFrameworksLoaded); function doWhenBothFrameworksLoaded() { console.log("All up"); } </script> <script src="jquery.mobile-1.3.0.min.js"></script> Das Pattern nutzt zwei „Oneshot-Timer“, die in der jQuery-Mutterbibliothek enthalten sind. Das Auftreten eines der beiden Ereignisse wird durch den Aufruf von resolve() quittiert, was die Mutex in den fertigen Zustand versetzt. Die when()-Funktion dient als „Sammelstelle“ für die offenen Mutexen. Sie führt die an sie übergebene Playload erst dann aus, wenn alle Oneshots „exekutiert“ wurden. Daraus folgt, dass DoWhenBothFrameworksLoaded() erst dann aufgerufen wird, wenn alle Oneshots „fertig“ sind – zu diesem Zeitpunkt haben beide Frameworks ihre Initialisierungsarbeiten gleichermaßen abgeschlossen. Mehr jQuery Mobile Im Laufe der letzten Jahre hat sich ein kleines Ökosystem um den GUI-Stack entwickelt. Wer alle Funktionen von jQuery Mobile „an einem Platz“ sehen möchte, soll seine Erkundungsreise bei der im Ordner /demos/ befindlichen Beispielsammlung beginnen. Öffnen Sie die Datei index.html im Browser ihrer Arbeitsstation, um eine Liste von Steuerelementen samt Beispielen auf den Bildschirm zu bekommen. Informationen über die dahinterstehenden Akzessorfunktionen finden Sie in der API-Übersicht. Diese ist hier aufrufbar. Codiqua hat sich auf das Anbieten eines grafischen Editors für jQuery-Mobile-basierte Applikationen spezialisiert. Hier finden Sie eine Testversion, die Ihnen beim Erstellen von Layouts wertvolle Dienste leistet. Klicken Sie die Benutzerschnittstelle Ihrer Applikation per Drag and Drop zusammen, und klicken Sie daraufhin auf den Code-Button am unteren rechten Bildschirmrand. Das daraufhin erscheinende Fenster enthält den Quellcode Ihrer Seite, den Sie per Copy and Paste in Ihre Applikation übernehmen können (Abb. 6). Die Demoversion von Codiqua hilft beim Erstellen von Formularlayouts Abb. 6: Die Demoversion von Codiqua hilft beim Erstellen von Formularlayouts Weitere Informationen zu den diversen Aspekten von jQuery Mobile finden Sie im Internet und in der Literatur. Die Suche nach „jQuery Mobile“ liefert sowohl bei Amazon als auch bei einer Suchmaschine Ihrer Wahl jede Menge interessanter Resultate. Fazit Über das Aussehen von jQuery-Mobile-Applikationen lässt sich vortrefflich streiten: Es steht außer Frage, dass das Design mit Sicherheit nicht jedermanns Geschmack ist. Aufgrund der enormen Verbreitung des Frameworks haben die Widgets mittlerweile einen gewissen „Wiedererkennungswert“ – die User wissen, was sie von den einzelnen Elementen zu erwarten haben. Wer im mobilen Internet surft, trifft über kurz oder lang auf per jQuery generierte Inhalte. Schon allein aus diesem Grund zahlt es sich aus, Grundkenntnisse über die Bibliothek zu besitzen – weitere Information finden sich im Ernstfall fast wie von selbst. Aufmacherbild: Retriever puppy in colored wig von Shutterstock / Urheberrecht: Chirtsova Natalia Unsere Redaktion empfiehlt: Relevante Beiträge Meinungen zu diesem Beitrag X - Gib Deinen Standort ein - - or -
Hybrid Solar System, Its Working and Benefits hybrid Solar System Solar energy is one of the most popular and environmentally friendly sources of power readily available today. It is simple to install, dependable, and affordable. Solar energy is renewable and can help you lessen your dependency on the local power grid. If you are planning to install a solar system at your home, it’s important to learn about the solar solutions available in the market. There are certain parameters to decide which type of solar system (off-grid, on-grid, or hybrid solar system) meets your energy requirements and budget. If your regional or local utility company allows net metering, this facility will save even more money (pay off your solar panels investment faster) on your electricity bills.  Simply speaking, a hybrid solar system consists of battery storage coupled with an on-grid  (grid-tied) solar system. The battery backup works to store the power produced by solar panels during the day (during sunlight). This stored energy will be available for later use when there is no sun shining.  Let me explain the hybrid solar systems for homes as well as industries further. Hybrid solar systems have proved to be more efficient, reliable, and a great investment for homeowners. In this post, you will learn about the hybrid solar system, how this system works, the pros and cons of the hybrid solar system, and more. Let’s get started. What Is a Hybrid Solar System? We can consider a hybrid solar system as a combination of both on-grid and off-grid capabilities. This feature allows users to continue running their electrical appliances on solar power even if the utility grid goes down or if there is load-shedding.  The bottom-line hybrid solar system comprises solar panels, a hybrid solar inverter, and a battery bank. The panels produce electricity from sunlight, while the batteries store the solar energy production for later usage. After the battery reaches its maximum capacity, any surplus energy is directed through a smart meter to the grid’s power lines. This empowers homeowners to reserve a portion of the electricity, serving as a backup during overcast days, nights, or even energy blackouts.  It’s crucial to distinguish hybrid solar systems, storing energy in a battery while staying connected to the grid, from those incorporating both solar and wind energy, sometimes named hybrid systems. Traditional solar power systems ( means on-grid), connected to the grid, are not fully capable of providing non-stop electricity. When the grid goes down, solar production does not power any appliances at home even during a sunny day.  Contrary to the grid-tied solar system, an off-grid solar system comes with a power fluctuation problem. This system cannot always provide a stable power supply. Because, if there is a cloudy or unclear day, the solar panels won’t be able to work properly, so, a drop in solar power production is inevitable. Also, the same happens during the nighttime when there is no sunlight available. What’s the solution then…? The only solution to all the above-discussed challenges is a hybrid solar system.  It uses a battery storage system to provide energy even when your system is disconnected from the grid electricity.  In times when the electrical output of your solar panels decreases due to cloudy weather conditions, a fully charged solar battery can maintain a consistent voltage and power output. In simple words, hybrid photovoltaic systems can interact with the local electrical grid without fully relying on it. Components Of Hybrid Solar System A hybrid solar system consists of the following primary components. Let’s check out:  • Solar Panels • Hybrid Inverter • Battery Bank • Charge Controller • Grid Connection • Net Metering System • DC Disconnect • AC Distribution Panel  • Monitoring System The components mentioned above should be high-quality products. Usually, high-quality solar panels are capable of lasting longer than 25 years. Solar inverters and lithium battery systems typically have an operational life of 10 to 12 years, therefore you will need to replace them at some point throughout the system’s lifetime. How does a hybrid solar system work? A hybrid solar system captures sunlight and converts it into electricity through solar photovoltaic (PV) panels.  This innovative solar solution (system) seamlessly connects solar power generation, battery storage, and grid power. This allows you to avoid costly grid power usage during peak hours of the day and saves you money on your electricity bills. How exactly does a hybrid solar system transition the solar energy to electricity…? It’s very simple. The hybrid solar system collects the solar production generated by rooftop solar panels and stores it in power backups (battery banks) for later use. During a cloudy day or power outage, the solar system automatically activates the electrical input/ power supply from the grid station to ensure that essential appliances and devices in your home remain powered, including lights, refrigerators, phones, tablets, and more. The hybrid inverter plays a central role in a hybrid solar power system. It is specially designed for managing both PV panel production and batteries simultaneously. This inverter performs multiple functions, including converting the electricity output from solar panels from direct current (DC) to alternating current (AC), managing the solar battery charging cycle, and synchronizing with the local power grid voltage for grid-tied operations. If we summarize the workings of a hybrid solar system, it would be: • Produces electricity from the sunshine. •  COnverts the electricity generated by solar panels or battery backup from direct current (DC) to alternating current (AC), which is required to power your home appliances. • Controls your system’s solar battery charging cycle. • Operates in grid-tied mode by synchronizing with the voltage of the local power grid. Another advantage of the hybrid system is its ability to utilize battery power even when connected to the grid. For instance, excess energy stored in the battery during the day can completely be utilized at night, reducing reliance and consumption from grid power and lowering electrical costs. Key Benefits of A Hybrid Solar System The list of benefits is long but the few major advantages of a hybrid solar system are listed in the following: • Increased electricity bill savings • Energy backup power during blackouts • Qualifying for federal financial incentives policy • Grid Connectivity and Interaction • Integration with energy storage • You can have continuous power. • Full use of a renewable energy resource Pros of a Hybrid Solar System Solar energy has a highly promising future as the whole world is going to adopt solar energy. If you’re thinking about whether a hybrid solar system is ideal for you, consider some of its key benefits. • Flexibility and Scalability • Environmental Sustainability • Reduce the risk of outages • Net metering possibility • Cost-effectiveness Cons of Hybrid Solar System  • Heavy initial investment or upfront cost • Exchange of batteries due to limited lifespan • Multiple systematic complexities • Highly expensive technology  • Regular maintenance  Is a Hybrid Solar System Right for Me? A hybrid solar system comes with a battery bank or storage for solar energy production along with a connection to the public electricity grid. If you prioritize energy independence and are ready to budget for battery replacement every ten years or more, a hybrid solar system offers substantial benefits. If your utility company offers net metering, you could potentially save money on electricity bills too. The key advantage of a hybrid solar system is that if the grid fails due to technical issues or adverse conditions, the hybrid solar system ensures that you have electricity on the premises (home) even when the grid is unavailable. However, high-quality residential solar panels have a lifespan of longer than 25 years. Solar inverters and lithium battery systems typically have a service life of 10 to 12 years, therefore you will need to replace them at some point throughout the system’s lifespan. Conclusion In the end, a hybrid solar system is an excellent choice for households looking to achieve energy security while also lowering their electricity expenses. A hybrid solar system could satisfy your home’s energy needs under normal conditions and includes a backup battery for usage during power outages. The concept of getting completely off-grid with solar energy may sound appealing, but a hybrid PV system provides a greater return on investment for homes. You can enjoy energy independence with a net metering facility and other solar incentives, only accessible to the grid-tied solar installations. However, investing in a hybrid solar system ensures that your property is powered during a power interruption. If you want to build a hybrid solar system, do your research and choose a reliable solar panel installation. We recommend you obtain free quotations from at least three suppliers before getting settled on the best solar system for your home.  Hybrid Solar System FAQs Do I need a professional to set up my hybrid solar system? Although it is technically possible to install a solar system on your own, you should consult with recognized top solar companies for hybrid solar system equipment and installation. How long does a hybrid solar system last? The solar panels in hybrid systems have an average lifespan of 25 to 30 years. However, during that time, you could anticipate replacing your battery about twice.  Similar Posts
Bluetooth Forum Other Apple Chat Apparently, Bluetooth is supposed to be available in the newest IOS. Besides the bump app, which I find annoying, confusing, and intrusive, how does one or can someone bluetooth a contact to another device or just to another iDevice. Thank you for any assistance with this prcedure will be appreciated. Thanks in advance. Options Comments Submitted by AnonyMouse on Sunday, February 24, 2013 Member of the AppleVis Editorial Team Hello! What exactly are you wanting to do with your bluetooth connectivity with others? If Bump is not for you and you like an alternative sollution. I have recently been playing with ProxToMe. Very similair with Bumb but it is a bit easier to use. It let you transfer files to each other. There are other apps if you want to chat with them. Bluetooth has been around for awhile on the IOS devices. So this isn't anything new just to let you know that. :) HTH
Lymphomas Published on 06/06/2015 by admin Filed under Pediatrics Last modified 06/06/2015 Print this page rate 1 star rate 2 star rate 3 star rate 4 star rate 5 star Your rating: none, Average: 0 (0 votes) This article have been viewed 833 times 56 Lymphomas Lymphomas are malignant neoplasms of the lymphoid tissue and include Hodgkin’s lymphoma (HL) and non-Hodgkin’s lymphoma (NHL). They are the third most common type of pediatric cancer after leukemia and malignant brain tumors. In the United States, approximately 1700 children and adolescents younger than the age of 20 years are diagnosed with lymphomas each year. This is roughly 15% of the malignancies diagnosed in this age group. This chapter focuses on the presentation, diagnosis, evaluation, and management of children and adolescents with HL and NHL. Hodgkin’s Lymphoma Etiology and Pathogenesis HL is a B-cell malignancy that affects the reticuloendothelial and lymphatic systems. In addition, HL can affect other organ systems including the lungs, bone marrow, bone, liver, and rarely the central nervous system (CNS). The World Health Organization classification divides HL into classical HL (nodular sclerosis, lymphocyte rich, mixed cellularity, and lymphocyte depleted), which accounts for 90% of cases, and nodular lymphocyte predominant HL. Previous epidemiologic studies suggest that the etiology of HL may be multifactorial and that environmental, genetic, and immunologic factors play a role in the development of the disease. Several studies have documented a link between HL and Epstein-Barr virus (EBV). The idea of this association was first proposed in 1966, and through modern molecular study techniques, it has been found that EBV DNA is expressed in the Hodgkin and Reed-Sternberg cells of 50% and 95% of the cases of HL in developed and developing countries, respectively. EBV is mostly associated with the mixed cellularity type of HL, shows a male predominance, and is more frequent in patients younger than 10 years of age. Clustering of HL in families suggests a genetic predisposition to HL, with an increased incidence especially among same-sex siblings, monozygotic twins, and parent–child pairs. There is a three- to ninefold increased risk of HL among family members of patients affected by the disease, which leads to the hypothesis that at least a small proportion of cases are inherited. Clinical Presentation The clinical presentation of HL can be varied but in most cases is asymptomatic. Approximately 70% to 80% of patients present with firm, rubbery, painless cervical lymphadenopathy. Often, patients will have been placed on antibiotics for presumed adenitis without improvement in the lymphadenopathy. Sixty percent of patients have mediastinal disease and may present with cough, chest pain, shortness of breath, orthopnea, or superior vena cava (SVC) syndrome. However, patients can also have mediastinal involvement without any symptoms. It is therefore important to image this area for disease before any diagnostic procedures given the risk of sedation or anesthesia in this setting. Cytokine production by Hodgkin and Reed-Sternberg cells is believed to be responsible for many of the nonspecific systemic symptoms of HL commonly seen at diagnosis, including fatigue, weight loss, pruritus, urticaria, and anorexia. Approximately 30% of patients present with at least one constitutional, or B, symptom. These include unexplained fevers of greater than 38°C for at least 3 days, unexplained weight loss of at least 10% within the preceding 6 months before diagnosis, and drenching night sweats. These symptoms are indicative of more advanced disease and have prognostic implications for the patient. The presence of B symptoms often places the patient in a higher risk group category for the purpose of determining appropriate treatment. Physical examination of any patient suspected of having HL should include a thorough evaluation of all lymph node chains; the presence of hepatosplenomegaly; and signs of bone marrow involvement, including bruising, petechiae, and pallor. The differential diagnosis for HL includes various infections, other malignancies, and other causes of lymphadenopathy (Table 56-1). Table 56-1 Differential Diagnosis of Hodgkin’s and Non-Hodgkin’s Lymphoma   Hodgkin’s Lymphoma Non-Hodgkin’s Lymphoma Infections Malignancies Other ALL, acute lymphoblastic leukemia; AML, acute myelogenous leukemia; CMV, cytomegalovirus; EBV, Epstein-Barr virus. Evaluation and Staging Buy Membership for Pediatrics Category to continue reading. Learn more here
• We are sorry, but NCBI web applications do not support your browser and may not function properly. More information Logo of ajhgLink to Publisher's site Am J Hum Genet. Jun 2004; 74(6): 1111–1120. Published online Apr 26, 2004. doi:  10.1086/421051 PMCID: PMC1182075 Genetic Signatures of Strong Recent Positive Selection at the Lactase Gene Abstract In most human populations, the ability to digest lactose contained in milk usually disappears in childhood, but in European-derived populations, lactase activity frequently persists into adulthood (Scrimshaw and Murray 1988). It has been suggested (Cavalli-Sforza 1973; Hollox et al. 2001; Enattah et al. 2002; Poulter et al. 2003) that a selective advantage based on additional nutrition from dairy explains these genetically determined population differences (Simoons 1970; Kretchmer 1971; Scrimshaw and Murray 1988; Enattah et al. 2002), but formal population-genetics–based evidence of selection has not yet been provided. To assess the population-genetics evidence for selection, we typed 101 single-nucleotide polymorphisms covering 3.2 Mb around the lactase gene. In northern European–derived populations, two alleles that are tightly associated with lactase persistence (Enattah et al. 2002) uniquely mark a common (~77%) haplotype that extends largely undisrupted for >1 Mb. We provide two new lines of genetic evidence that this long, common haplotype arose rapidly due to recent selection: (1) by use of the traditional FST measure and a novel test based on pexcess, we demonstrate large frequency differences among populations for the persistence-associated markers and for flanking markers throughout the haplotype, and (2) we show that the haplotype is unusually long, given its high frequency—a hallmark of recent selection. We estimate that strong selection occurred within the past 5,000–10,000 years, consistent with an advantage to lactase persistence in the setting of dairy farming; the signals of selection we observe are among the strongest yet seen for any gene in the genome. Introduction Genes that have experienced recent positive selection offer a window into the evolutionary forces that shaped recent human history. For example, signatures of recent selection for resistance to malaria have been demonstrated around the HbS allele in the β-globin gene HBB (MIM 141900) (Pagnier et al. 1984), the A and Med alleles in G6PD (MIM 305900) (Tishkoff et al. 2001), the *O allele of the Duffy gene FY (MIM 110700) (Hamblin et al. 2002), and a promoter variant in the CD40 ligand gene TNFSF5 (MIM 300386) (Sabeti et al. 2002). Other genes for which genetic data support a recent selective event include CKR5 (MIM 601373) (Stephens et al. 1998), HFE (MIM 235200) (Toomajian et al. 2003), ADH1B (MIM 103720) (Osier et al. 2002), and possibly CFTR (MIM 602421) (Wiuf 2001 and references therein); the particular evolutionary advantage in these cases is less clear. Many of the selected alleles also contribute to or cause disease, indicating that identification of genes under selection may have significant consequences for medical genetics. Furthermore, once such genes have been definitively identified, characterizing the signatures of selection at these genes will guide the development of tools to search for other genes under selection. One of the genes most frequently proposed to have experienced recent positive selection is LCT (MIM 603202), which encodes the enzyme lactase-phlorizin hydrolase. The epidemiologic data in favor of selection are quite strong: the ability to use this enzyme to digest lactose during adulthood varies dramatically across worldwide populations, with particularly high rates among northern Europeans (Bayless and Rosensweig 1966; Simoons 1969; Scrimshaw and Murray 1988). Furthermore, persistence of lactase activity into adulthood is genetically determined (Simoons 1970; Kretchmer 1971; Scrimshaw and Murray 1988; Enattah et al. 2002), and the geographic distribution of lactase persistence matches the distribution of dairy farming (Simoons 1969; Kretchmer 1971; Scrimshaw and Murray 1988). Because of these features, Cavalli-Sforza (1973) and others (Simoons 1970; Flatz 1987; Hollox et al. 2001; Poulter et al. 2003) proposed that the high rate of lactase persistence in European populations is explained by positive selection resulting from increased nutrition from dairy, the only dietary source of lactose. Despite these compelling epidemiologic data, neither formal population-genetics–based evidence of selection nor an estimate of the timing and magnitude of positive selection has been provided by analyzing genetic data at the LCT locus. In addition, many non-European populations show high rates of lactase persistence, raising questions about whether a single allele arose once and is shared by all lactase-persistent individuals or whether different alleles have arisen in human history. Recently, new tools to study selection at LCT have become available. In particular, Enattah et al. (2002) demonstrated that two polymorphisms upstream of LCT are tightly associated with lactase persistence. In that study, the persistence-associated alleles were found primarily on a single 250-kb microsatellite haplotype in the Finnish population. By use of 18 SNPs spanning 1 Mb, Swallow and colleagues also recently reported a long haplotype around these alleles (Poulter et al. 2003). However, the mere presence of a long haplotype, although consistent with selection, does not by itself constitute a signature of a selective event (Sabeti et al. 2002). A variety of genetic signatures of positive selection have been described (reviewed in Bamshad and Wooding 2003). These include an excess of rare variants (indicating a selective sweep followed by the accumulation of new, rare mutations), large allele-frequency differences among populations (indicating differential effects of selection that cause alleles to rise dramatically in frequency in some but not all of the populations), or a common haplotype that remains intact over unusually long distances (indicating an allele that rose rapidly to high frequency before recombination could disrupt the haplotype on which the allele lies). The last two signatures are particularly appealing because they can be detected by genotyping common polymorphisms in one or more populations and may have better power for identifying recent positive selection (Sabeti et al. 2002). Large differences in allele frequencies between populations have traditionally been detected by use of the population-genetics measure FST (e.g., Akey et al. 2002), whereas demonstration that a common haplotype is unexpectedly long requires application of the recently described long-range haplotype test (Sabeti et al. 2002). In this study, we analyze genotypes for >100 SNPs in multiple populations, and we demonstrate two striking signatures of selection at the LCT gene. First, SNPs near LCT show large differences in allele frequencies among populations, demonstrated not only with the traditional FST measure but also with a more informative metric, pexcess. In addition, we show that the long (1 Mb) haplotype carrying the persistence-associated alleles is much longer and more common than would be expected in the absence of selection. We are also able to estimate from these genetic data the time period during which selection occurred, and we show that the selective pressure at LCT was comparable to the strongest selection yet documented in the genome. Subjects and Methods DNA Samples DNA samples for European American, African American, and East Asian populations were obtained from the Coriell Institute (Coriell Institute for Medical Research Web site); a complete list of these samples and geographic origins is given in table A1 (online only). The Scandinavian population, which has been described elsewhere (Altshuler et al. 2000), is a subset of 379 normal glucose-tolerant trios from Finland and Sweden, and the samples we typed represent 360 independent chromosomes. The remaining populations listed in table 1 have also been described elsewhere (Rosenberg et al. 2002). This project was approved by the appropriate local institutional review boards, and subjects gave informed consent. Table 1 Frequencies in Different Populations of Two Alleles Associated with Lactase Persistence[Note] Selection and Genotyping of SNPs SNPs were selected from dbSNP (dbSNP Home Page), preferentially choosing the SNP Consortium (TSC) and BAC overlap SNPs (submitter handles: TSC, SC_JCM, and KWOK) and genotyping SNPs at a greater density closer to the LCT gene. In addition, we intentionally genotyped the two SNPs reported to be associated with LCT persistence (Enattah et al. 2002). A complete list is given in table A2 (online only). SNPs were genotyped by use of the mass-spectrometry–based MassArray platform provided by Sequenom, implemented as described elsewhere (Gabriel et al. 2002). Primers were designed by use of Spectrodesigner software (Sequenom), and sequences are available on request. Statistical Analysis FST was calculated as described by Akey et al. (2002), with Nei’s correction for sample size (Nei and Chesser 1983). To generate a genomewide distribution for FST and pexcess, allele frequencies at markers throughout the genome were downloaded from the SNP Consortium (TSC) Web site, by use of data from the Whitehead Institute Center for Genome Research (WICGR), Celera, Motorola, and Orchid. We excluded data from pooled samples, since the FST distribution was different for pooled data (Akey et al. 2002 and data not shown). In total, data from 28,440 markers were used to generate a genomewide FST distribution. To compare the FST at markers around LCT with the genomewide distribution, we applied the Wilcoxon rank-sum test (Rosner 1982), limiting our analysis to markers separated by at least 20 kb to minimize correlation between markers. To eliminate artifactual effects at the lower end of the FST distribution (which can be due, in part, to the correction for sample size), we treated all FST values below the population mean as ties. Applying this test to the markers around LCT yields a P value of .002. However, because we cannot fully correct for the correlation between markers, this P value may overestimate the significance of the excess markers with high FST values. To understand the rationale for using the pexcess statistic, consider the scenario where positive selection rapidly introduces a single haplotype at frequency h into a population. Under the model of strong selection, a particular long-range haplotype will rapidly rise from a single copy (frequency near 0) to a frequency of h in the selected population. Consider now a marker within the long-range haplotype with an allele of frequency p prior to the selective event. If there has been little opportunity for recombination, nearly all copies of the selected haplotype will carry the same allele at this marker. For the allele that lies on the selected haplotype, the allele frequency will increase to p1=p(1-h)+h after selection; for an allele that does not lie on the selected haplotype, the allele frequency will decrease to p1=p(1-h). Solving for h, h=(p1-p)/(1-p) if p1>p and h=(p-p1)/p if p > p1. This is algebraically identical to pexcess (Hastbacka et al. 1994); here, p1 is the allele frequency in the population under consideration, and p is the ancestral allele frequency, which we estimate by the average allele frequency in the populations that have not experienced selection (in this case, the East Asian and African American populations). To maximize the chance that the variant predates the selective event (essential for using pexcess to estimate h), we only calculate pexcess for polymorphisms in which the allele frequencies in all populations are between 10% and 90%. Similar results were obtained whether or not we corrected the allele frequencies in African Americans for the estimated 21% European admixture (Parra et al. 1998). Of the markers from the SNP Consortium (TSC) Web site, 13,696 have allele frequencies between 10% and 90% for all three populations, and these were used for calculating the genomewide characteristics of pexcess. For comparison, we identified 952 regions with at least 5 markers spanning 50 kb–100 kb. We found that none of these 952 regions contains runs of [gt-or-equal, slanted]5 consecutive markers that span at least 50 kb and have pexcess values above the 90th percentile; the LCT region has 16 consecutive markers spanning 800 kb with pexcess values above the 95th percentile. The long-range haplotype test, the calculation of relative extended haplotype homozygosity (REHH), and the assessment of the significance of REHH by use of simulations were performed as described elsewhere (Sabeti et al. 2002). In brief, a core region was defined as a block of linkage disequilibrium with little evidence of recombination (Gabriel et al. 2002). The genotype data was converted to inferred, fully phased haplotype data, and, within the core region, each common haplotype (>5% frequency) was analyzed separately. At each marker, a chromosome was considered intact if, from the core through that marker, the chromosome was identical to all other intact chromosomes carrying the same core haplotype. For LCT, the core region was chosen to contain the persistence-associated markers. For the simulations, cores and genotypes extending outward from the cores were generated as described elsewhere (Sabeti et al. 2002). The empirical P value for the 5′ markers was .012. For the 3′ markers, 10,000 simulations generated ~25,000 core haplotypes, of which ~2,500 had a frequency similar to that of the LCT core; none of these had an REHH near that seen for LCT (empirical P < .0004). To better estimate the P value for the 3′ markers, the REHH distribution from the simulated data was log-transformed to achieve normality, and the mean, median, and SD were used to estimate P values for the actual REHH value observed in LCT. The estimation of dates was performed according to methods described elsewhere (Reich and Goldstein 1998; Stephens et al. 1998). For these analyses, fully phased haplotype data were required. We used two phasing programs: PHASE, a Bayesian method for phasing diploid genotype data (Stephens and Donnelly 2003; PHASE Web site), and also a similar program (wphase) that we developed for this purpose. Similar results were obtained from the two phasing algorithms. The mathematical models underlying the two programs are similar, but PHASE performs a Markov Chain–Monte Carlo procedure, whereas wphase carries out a hill climb, (approximately) maximizing the likelihood. We estimated REHH and dates at distances on either side of the core region, where approximately one recombination per chromosome had occurred on the persistence-associated haplotype (that is, ~1/e chromosomes carrying the persistence-associated haplotype remained unrecombined). We estimated the coefficient of selection, s, by applying a formula (Hartl and Clark 1997) that relates the frequency in generation t+1(pt+1) to the frequency in generation t(pt): equation image In this formula, qt=1-pt,w11 is the relative fitness of individuals homozygous for the selected allele, w12 is the relative fitness of heterozygous individuals, and w22 is the relative fitness of individuals homozygous for the unselected allele. We assumed a dominant model for lactase persistence—that is, w11=w12=1 and w22=1-s. We also assumed the initial frequency p0 to be between 1/1,000 and 1/10,000 (corresponding to a new mutation in a population with an effective size between 500 and 5,000; larger population sizes yield even higher coefficients of selection). Starting from these initial frequencies, we calculated values of w22 that would yield a frequency of p = 0.77 after 2,188–20,650 years of selective pressure for the United States population and 1,625–3,188 years for the Scandinavian population, assuming 25 years/generation. Results To examine the evidence for selection, we began by genotyping the two SNPs that were recently reported to be very tightly associated with lactase persistence (Enattah et al. 2002): rs4988235 (−13910C→T) and rs182549 (−22018G→A). We determined the frequencies of the persistence-associated alleles (T and A, respectively) in three populations for which many thousands of markers have been genotyped (European Americans, African Americans, and East Asians), thereby permitting comparison of our results to a genomewide background distribution (Akey et al. 2002). The persistence-associated alleles occur with a frequency of 77% in European Americans, 13% and 14% in African Americans, and 0% in East Asians (table 1), broadly consistent with the rates of lactase persistence in these populations (Scrimshaw and Murray 1988). Large differences in allele frequencies across populations, such as we observe at these markers, are suggestive of selective pressure that differed among the populations (Lewontin and Krakauer 1973; Bowcock et al. 1991; Akey et al. 2002). The unusually large magnitude of the population frequency differences for these two markers is reflected in their values of FST, a traditional measure of population differentiation—the FST values (0.53 for both markers) exceed 99.9% of the FST values from a genomewide set of >28,000 SNPs (see the “Subjects and Methods” section). We also genotyped these two associated SNPs in a more diverse set of samples (Altshuler et al. 2000; Rosenberg et al. 2002); the frequencies of the persistence-associated alleles were much lower in southern European than in northern European or Basque populations, and the persistence-associated alleles were rare or absent in almost all non-European–derived populations tested, except Algerians and Pakistanis (table 1). The wide range of allele frequencies among European populations is consistent with selective pressure that postdates the colonization of Europe, resulting in different prevalences of lactase-persistence alleles in northern and southern European populations. To extend these results, we genotyped an additional 99 markers in 3.2 Mb flanking the LCT locus, again looking for high degrees of population differentiation. In response to strong positive selection, a selected allele rises rapidly in frequency. The frequency of the haplotype on which the allele occurs will increase correspondingly, because there is insufficient time for recombination to disrupt the haplotype while it becomes more common. Thus, allele frequencies at flanking markers on the haplotype will be altered. To measure this effect, we used two metrics of allele-frequency differences: the traditional FST and a newer metric, pexcess. FST has limited utility when the flanking allele on the selected haplotype was already fairly common prior to selection, because, in this case, the FST value will be quite low; thus, only a fraction of flanking markers are expected to show elevated FST values within a region of selection. Consistent with this expectation, there was an excess of high FST values among the 99 markers, but FST values varied widely from marker to marker (fig. 1a; see the “Subjects and Methods” section for additional details). The excess elevation of FST is predominantly derived from markers located in the vicinity of the LCT gene (fig. 1a), with allele frequencies that are generally different in Europeans than in the other two populations (table A2 [online only]). This elevated FST in markers flanking LCT confirms the signal of selection seen with the −13910C→T and −22018G→A variants. However, as expected, only some of the markers near LCT have elevated FST values. Accordingly, we sought an alternative measure of population differentiation that would reveal a more consistent signal in the vicinity of a selected allele. Figure 1 Elevation in (a) FST and (b) pexcess at multiple SNPs in a 3.2-Mb region around the LCT gene. Position in kb relative to the start of transcription of LCT is on the X-axis. The 90th, 99th, and 99.9th percentiles for FST and pexcess are indicated by dashed ... We chose to study the pexcess statistic, which has previously been used to localize disease-causing alleles in founder populations and is a measure of differences in haplotype frequencies across long distances (Hastbacka et al. 1994). pexcess is also equivalent to the measure of linkage disequilibrium, δ (Devlin and Risch 1995). If a single haplotype differs in frequency across a long region, pexcess will be elevated and relatively constant across multiple markers within that region, with values approximately equal to the increase in frequency of the haplotype (see the “Subjects and Methods” section for details). We observed a consistent, marked elevation of pexcess in the LCT region: 17 consecutive markers in a region spanning 500 kb around LCT have nearly identical, very high values of pexcess that approximate the frequency of the persistence-associated haplotype (0.77) (fig. 1b). Furthermore, the elevation in pexcess extends for at least 1,500 kb (fig. 1b; table A2 [online only]). To provide a framework for comparison, we calculated pexcess values for marker pairs and the correlation between pairs as a function of distance for >13,000 SNPs throughout the genome; we found that the correlation is normally minimal at distances of as little as 100 kb (r2=0.002). Indeed, in this genomewide data set, none of 952 comparison regions had a consistent elevation in pexcess values approaching that seen around LCT (see the “Subjects and Methods” section for details). These results further mark the LCT region as very unusual when compared with the remainder of the genome, and they strongly suggest that genetic hitchhiking due to selection has occurred: that is, a selected allele rose in frequency over such a short time period that the frequencies of linked alleles on the surrounding >1 Mb haplotype were dragged up as well (Braverman et al. 1995). In addition to the tests above, which are measures of differentiation between populations, we also employed the recently described long-range haplotype test of Sabeti et al. (2002), which detects selection by measuring the characteristics of haplotypes within a single population. A recent haplotype should be surrounded by long stretches of homozygosity, since recombination will have had few opportunities to juxtapose adjacent segments from other chromosomes with the selected haplotype. The evidence for selection is a haplotype that arose recently—as evidenced by long flanking stretches of homozygosity—but is so common that the haplotype could not have risen quickly to such high frequency without the aid of selection. We observed precisely this pattern at the haplotype containing the lactase-persistence–associated alleles −13910T and −22018A. The haplotype containing these alleles was very common (77% in European Americans) but also largely identical over nearly 1 cM (>800 kb), indicating a recent origin (red bars in fig. 2). This long stretch of homozygosity was not simply due to a low local recombination rate—the other haplotypes in this region show shorter extents of homozygosity, indicating abundant historical recombination (blue bars near the bottom of fig. 2), and the recombination rate in this region is typical of that in the genome as a whole (Kong et al. 2002). Figure 2 Long-range extended homozygosity for the core haplotype containing the persistence-associated alleles at LCT at various distances from LCT. The extent to which the common core haplotypes remains intact is shown for each chromosome in cM. The core region ... To formally assess the significance of these results, we focused on the REHH statistic (Sabeti et al. 2002); REHH values much greater than 1 indicate increased homozygosity of a haplotype compared with other haplotypes in the region. For the lactase-persistence–associated haplotype, REHH was 13.2 in the region 3′ to LCT, indicating much less breakdown of homozygosity at the persistence-associated haplotype than at haplotypes not carrying the persistence-associated alleles. We compared the LCT data to data from coalescent population-genetics simulations analogous to those in Sabeti et al. (2002), and the empirical P value for excess homozygosity 3′ to LCT was .0004 (fig. 3 and the “Subjects and Methods” section); other estimates of significance suggest a P value closer to 10−7 (see the “Subjects and Methods” section). As confirmation, we compared the LCT haplotype to actual genotype data from 12 control regions spanning 500 kb each. The distribution of REHH was similar for the control regions and the simulations, and the LCT haplotype had a higher REHH than any of the matched control haplotypes. It is notable that the signal for selection is much stronger for LCT than for the well-established case of G6PD—although higher haplotype frequencies are in general associated with lower REHH values (Sabeti et al. 2002) (fig. 3), we observe a larger REHH statistic for the 77% LCT haplotype (REHH=13.2) than for the 18% G6PD haplotype (REHH=7) (see Sabeti et al. 2002). Although we cannot rule out the possibility that the extended homozygosity of the high-frequency LCT haplotype is due to dominant suppression of recombination over Mb distances because of an allele on this haplotype, positive selection seems to be a more biologically plausible phenomenon, especially since the haplotype has such a strikingly wide spread of frequencies across European populations. Furthermore, the parental core haplotype on which the persistence-associated alleles arose is present in Asian and African American populations, and it does not have an elevated REHH value (data not shown). Figure 3 REHH, a measure of extended haplotype homozygosity, plotted for the persistence-associated haplotype at LCT, in comparison with REHH from haplotypes in 10,000 sets of simulated data (Sabeti et al. 2002). Data are shown using markers (a) 5′ and ... We next estimated the age of the lactase-persistence–associated haplotype, on the basis of the decay of haplotypes in either direction from the LCT core region (Reich and Goldstein 1998; Stephens et al. 1998). On the basis of our analysis of European-derived U.S. pedigrees, the best estimates of the time at which the persistence-associated haplotype began to rise rapidly in frequency are between 2,188 and 20,650 years ago, consistent with the estimated origin of dairy farming in northern Europe ~9,000 years ago (Simoons 1970; Kretchmer 1971; Scrimshaw and Murray 1988). Even more recent estimates (1,625–3,188 years ago) were obtained by analyzing a Scandinavian population of parent-offspring trios, suggesting stronger and more recent selection in this population. On the basis of these ranges of ages, we estimate the coefficient of selection associated with carrying at least one copy of the lactase-persistence allele to be between 0.014 and 0.15 for the CEPH population and between 0.09 and 0.19 for the Scandinavian population (see the “Subjects and Methods” section for details). By comparison, the selective advantage in a region endemic for malaria has been estimated at 0.02–0.05 for G6PD deficiency (Tishkoff et al. 2001) and 0.05–0.18 for the sickle-cell trait (Li 1975). Thus, the added nutrition from dairy appears to have provided a selective advantage in northern Europe comparable to that provided by resistance to malaria in malaria-endemic regions. Discussion We have now demonstrated, on the basis of three different analytic methods (elevated FST at markers associated with lactase persistence, runs of elevated pexcess at flanking markers, and extended haplotype homozygosity), that strong positive selection occurred in a large region that includes the LCT gene. This selection occurred after the separation of European-derived populations from Asian- and African-derived populations, and it likely occurred after the colonization of Europe. The high frequency and young age of this haplotype, the high estimated coefficient of selection, and the very high REHH value all suggest that LCT represents one of the strongest signals of recent positive selection yet documented in the genome. Our results strongly support the hypothesis that the additional nutrition provided by dairy was very important for survival in the recent history of Europe and perhaps in other regions of the world as well. Our results show that chromosomes carrying the allele associated with lactase persistence (−13910T) share a very long haplotype around this allele. We and others have noted that the presence of this long haplotype raises the possibility that a variant located somewhere in this large region, other than −13910C→T, could be the cause of lactase persistence (Grand et al. 2003; Poulter et al. 2003). Indeed, Swallow and colleagues have identified an individual who is homozygous for the nonpersistence-associated allele at −13910C→T but retains lactase activity (Poulter et al. 2003). Recently, Olds and Sibley (2003) demonstrated differential in vitro transcriptional activity between short segments of DNA carrying the C and T alleles, but the predictive value of such in vitro data for the in vivo phenotype remains uncertain. A comprehensive assessment of variation throughout this long haplotype may be required to determine if −13910C→T is truly the causal polymorphism. Of course, it is also possible that the strong signature of selection is not due to variation at LCT but rather to a coincidental selective event acting on a nearby unrelated gene. However, the striking geographic correlation of lactase persistence with dairy farming (Simoons 1969; Kretchmer 1971; Scrimshaw and Murray 1988) and the recently described evidence of selection on cattle-milk protein genes in regions of Europe with a high prevalence of lactase persistence (Beja-Pereira et al. 2003) lend strong support to the dairy hypothesis. The −13910T allele was rare or absent in the sub-Saharan African populations we tested, indicating that the presence of the T allele in African Americans that we and Enattah et al. (2002) observed is probably explained by admixture of European-derived chromosomes into the African American population (Parra et al. 1998). Thus, our data do not provide evidence that the −13910T allele predates the differentiation of European and African populations. The absence of the T allele in African populations also suggests that either −13910C/T is not the causal allele or that lactase persistence arose multiple times, because lactase persistence is prevalent in a number of African populations (Scrimshaw and Murray 1988). Consistent with these suggestions, the study by Mulcare and colleagues (in this issue of the Journal) showed that the −13910T allele was absent from several African populations known to have high rates of lactase persistence (Mulcare et al. 2004 [in this issue]). We did not specifically survey these populations, but such surveys will help determine whether lactase persistence arose multiple times in human history or whether a single very old polymorphism rose independently to high frequencies in multiple populations, as has been suggested (Enattah et al. 2002). Finally, the T allele was present at high frequencies in Pakistan and at somewhat lower frequencies in Middle Eastern populations (table 1) and was found on the same local haplotype in these populations as in Europeans (data not shown). These data suggest that individuals carrying the lactase-persistence allele might have migrated between populations (perhaps along with dairy farming), and their descendants may be responsible for the increased allele frequencies in diverse populations in Europe and neighboring regions. More generally, we have implemented two methods of detecting signatures of positive selection: runs of consecutive markers with elevated pexcess and the long-range haplotype test. It is important to note that these two tests identified LCT as strikingly unusual because LCT was at the far extreme of the genomewide distribution. With the availability of data for loci throughout the genome, empirical comparisons of individual loci to the genomewide distribution will distinguish other genes that are in the extreme tail of the distribution and, thus, are likely to have experienced selection. Ideally, the metrics will be compared not only to an empirical distribution but also to a simulated distribution derived from an appropriate model of recent human evolution that is consistent with empirical data. As models that incorporate more-complete descriptions of human history are developed, such simulations will become more useful. Both of these methods should be readily applicable to genomewide SNP genotype data being generated by the haplotype map of the human genome (HapMap Project Web site). In particular, runs of markers with consistently elevated pexcess should be detectable once an adequate number of SNPs have been genotyped in multiple populations; our experience with LCT suggests that these runs of elevated pexcess may be more informative than signals from individual markers with high FST values, particularly where selection has dramatically increased the frequency of a single haplotype. The long-range haplotype test should also be useful, even in studies of a single population. Thus, it should be possible in the near future to identify many other loci that have undergone recent positive selection, leading to new insights into recent human evolution and also human disease. Acknowledgments D.E.R. and J.N.H. are recipients of Burroughs Wellcome Career Awards in Biomedical Sciences. We thank Richard Grand, Robert Montgomery, Eric Lander, David Altshuler, Helen Lyon, and members of the Hirschhorn Lab for useful comments and discussion. Table A1 DNA Samples from Coriell Used in This Study Sample IDPopulationMother IDFather ID NA06988European AmericanNA07057NA06990 NA06983European AmericanNA07057NA06990 NA07057European AmericanNA0707NA07340 NA07007European American00 NA07340European American00 NA06990European AmericanNA07016NA07050 NA07016European American00 NA07050European American00 NA07011European AmericanNA07038NA06987 NA07009European AmericanNA07038NA06987 NA07038European AmericanNA07049NA0702 NA07049European American00 NA07002European American00 NA06987European AmericanNA07017NA07341 NA07017European American00 NA07341European American00 NA12138European AmericanNA10846NA10847 NA12139European AmericanNA10846NA10847 NA10846European AmericanNA12144NA12145 NA12144European American00 NA12145European American00 NA10847European AmericanNA12146NA12239 NA12146European American00 NA12239European American00 NA07053European AmericanNA07029NA07019 NA07040European AmericanNA07029NA07019 NA07029European AmericanNA06994NA0700 NA06994European American00 NA07000European American00 NA07019European AmericanNA07022NA07056 NA07022European American00 NA07056European American00 NA07006European AmericanNA07048NA06991 NA07020European AmericanNA07048NA06991 NA07048European AmericanNA07034NA07055 NA07034European American00 NA07055European American00 NA06991European AmericanNA06993NA06985 NA06993European American00 NA06985European American00 NA12040European AmericanNA10857NA10852 NA10857European AmericanNA12043NA12044 NA12043European American00 NA12044European American00 NA10852European AmericanNA12045NA12046 NA12045European American00 NA12046European American00 NA11870European AmericanNA10858NA10859 NA11871European AmericanNA10858NA10859 NA10858European AmericanNA11879NA11880 NA11879European American00 NA11880European American00 NA10859European AmericanNA11881NA11882 NA11881European American00 NA11882European American00 NA11984European AmericanNA10860NA10861 NA11985European AmericanNA10860NA10861 NA10860European AmericanNA11992NA11993 NA11992European American00 NA11993European American00 NA10861European AmericanNA11994NA11995 NA11994European American00 NA11995European American00 NA12148European AmericanNA10830NA10831 NA12149European AmericanNA10830NA10831 NA10830European AmericanNA12154NA12236 NA12154European American00 NA12236European American00 NA10831European AmericanNA12155NA12156 NA12155European American00 NA12156European American00 NA12243European AmericanNA10835NA10834 NA12244European AmericanNA10835NA10834 NA10835European AmericanNA12248NA12249 NA12248European American00 NA12249European American00 NA10834European AmericanNA12250NA12251 NA12250European American00 NA12251European American00 NA12007European AmericanNA10838NA10839 NA10838European AmericanNA1203NA1204 NA12003European American00 NA12004European American00 NA10839European AmericanNA1205NA1206 NA12005European American00 NA12006European American00 NA11909European AmericanNA10842NA10843 NA10842European AmericanNA11917NA11918 NA11917European American00 NA11918European American00 NA10843European AmericanNA11919NA11920 NA11919European American00 NA11920European American00 NA17031African American NA17032African American NA17033African American NA17034African American NA17035African American NA17036African American NA17037African American NA17038African American NA17039African American NA17040African American NA17101African American NA17102African American NA17103African American NA17106African American NA17107African American NA17108African American NA17109African American NA17111African American NA17112African American NA17114African American NA17115African American NA17117African American NA17119African American NA17122African American NA17124African American NA17125African American NA17132African American NA17134African American NA17136African American NA17137African American NA17139African American NA17140African American NA17144African American NA17147African American NA17148African American NA17149African American NA17152African American NA17155African American NA17156African American NA17157African American NA17158African American NA17159African American NA17160African American NA17169African American NA17172African American NA17196African American NA17197African American NA17198African American NA17199African American NA17200African American NA11321Chinese NA11322Chinese NA11323Chinese NA16654Chinese NA16688Chinese NA16689Chinese NA17014Chinese NA17015Chinese NA17016Chinese NA17017Chinese NA17018Chinese NA17019Chinese NA17020Chinese NA11589Japanese NA11590Japanese NA17051Japanese NA17052Japanese NA17053Japanese NA17054Japanese NA17055Japanese NA17056Japanese NA17057Japanese NA17058Japanese NA17059Japanese NA17060Japanese NA17081Southeast Asian NA17082Southeast Asian NA17083Southeast Asian NA17084Southeast Asian NA17085Southeast Asian NA17086Southeast Asian NA17087Southeast Asian NA17088Southeast Asian NA17089Southeast Asian NA17090Southeast Asian Table A2 FST and pexcess for 101 SNPs around LCT Frequency (%) in Value for SNP IDCoordinateaAllelebEuropean AmericansAfrican AmericansEast AsiansFSTpexcess rs1531957134781635T21.38.226.50.03 rs1996589134887524T68.833.060.0.09.42 rs1257168134986220A40.47.118.2.10 rs1257220135037675A17.716.031.4.02.25 rs842360135370213C34.446.876.5.12.44 rs1942043135577820C3.15.16.10 rs749017135595987G30.044.830.6.01.20 rs766271135689459C55.430.646.3.03.28 rs2322254135773177C19.835.051.4.07.54 rs1551497135809970C15.047.816.1.11.53 rs1031575135880258G3.11.02.90 rs2290518135901142G85.442.080.0.17.63 rs2305594135912936C9.46.115.7.01 rs4954222135934583G9.46.115.7.01 rs2305247135950620T2.120.01.4.10 rs2305248135950640A85.440.481.8.19.62 rs935612135963831A88.542.092.6.27 rs4954228135998826A89.643.091.2.26 rs4954231136038842T8.132.07.6.09 rs737388136095539C2.121.01.4.10 rs1469950136150582G4.91.21.70 rs2118395136223648T7.44.07.10 rs4954259136260322A4.103.10 rs1370533136272613C94.843.991.4.30 rs984763136367366A2.54.07.10.00 rs2034277136399322C015.60.10 rs958400136403174A035.00.26 rs2289963136428206A6.010.28.6.00 rs4954278136430619T9.220.89.1.02 rs1438303136452185T9.418.451.4.16 rs313522136453194T83.026.011.8.39.79 rs313520136462199A011.00.07 rs629377136474052T013.00.08 rs2117511136484989A90.643.964.7.16 rs2304367136489492C013.00.08 rs1347767136507985G013.00.08 rs1438307136521494T83.025.033.3.26.76 rs3213889136533903G82.626.535.3.24.75 rs2304601136550362A01.000 rs2304602136560269G004.3.02 rs1030766136575510A8.345.027.1.11 rs1030764136575857T86.547.062.9.11.70 rs1011361136575967A83.328.035.7.23.76 rs2015532136577853G8.320.018.8.01 rs2322659136577987C86.446.040.0.17.76 rs872151136579133T8.311.014.30 rs892715136598905C81.523.934.8.24.74 rs2322812136600368G5.812.014.3.01 rs2874874136600522C6.810.414.70 rs2164210136602615C81.324.537.1.23.73 rs1470457136604176G15.645.738.2.07.63 rs730005136605022C7.624.523.5.03 rs2322813136605137G6.814.618.3.01 rs745500136605520A81.925.037.9.23.74 rs2236783136616486A81.925.032.9.25.75 rs2082730136629069G010.00.06 rs4988235136630974T77.214.00.53 rs2304369136631648A3.418.01.4.07 rs309180136636583A82.623.532.9.26.76 rs309181136637141G81.826.542.6.21.72 rs182549136639082T77.113.30.53 rs309176136644544C81.425.032.9.24.74 rs309125136665883C81.528.032.9.23.73 rs309167136691592T9.520.424.3.02 rs2322725136699520C9.119.017.1.01 rs192822136704602T85.740.032.9.21.78 rs309163136713685A08.20.05 rs309120136731115G8.039.048.6.13 rs3112496136733392T8.339.848.6.13 rs309142136737652C8.139.148.4.13 rs522086136757469T05.10.03 rs309118136768552C8.326.246.7.12 rs309137136788279T83.321.028.6.31.78 rs1469816136814744A1.232.311.4.12 rs2090660136841047T8.812.217.60 rs2090663136852863G08.21.4.03 rs1112156136899042A05.10.03 rs953388136929457T12.55.132.9.09 rs2176716136946021T18.822.045.7.06.45 rs1519523136956777T52.122.025.7.07.37 rs1519529136996585G19.58.00.07 rs4440020137012655A91.748.050.0.17 rs4075810137025473T3.54.846.4.26 rs4347891137058006G3.132.719.7.09 rs4245843137062112A3.144.027.3.14 rs4954411137098753T58.325.518.6.13.47 rs4501004137129075T27.150.041.4.03.41 rs2138140137133257A4.235.05.7.15 rs1399604137152993G27.924.055.7.08.30 rs867563137164828G25.022.440.0.02.20 rs578935137233319C10.48.031.4.07 rs1346822137236689A9.815.024.2.02 rs694510137303189T21.844.468.3.14.61 rs876338137311475T75.049.040.0.08.55 rs1427588137514654C43.836.055.7.02.05 rs1346731137634915A40.319.820.6.04.25 rs2370192137649312A4.31.00.01 rs518614137739179C61.518.814.3.20.54 rs574135137762448G62.527.819.1.14.51 rs1432232137821992C64.628.054.3.09.40 rs882374137935623A25.036.040.0.01.34 aCoordinate on chromosome 2, according to the hg15 freeze of the human genome (UCSC Genome Bioinformatics Web site). bAllele shown is the minor allele in the African American population Electronic-Database Information The URLs for data presented herein are as follows: Coriell Institute for Medical Research, http://locus.umdnj.edu/ccr/ HapMap Project, http://www.hapmap.org Online Mendelian Inheritance in Man (OMIM), http://www.ncbi.nlm.nih.gov/Omim/ (for HBB, G6PD, FY, TNFSF5, CKR5, HFE, ADH1B, CFTR, and LCT) SNP Consortium (TSC) Web Site, http://snp.cshl.org/allele_frequency_project/ UCSC Genome Bioinformatics, http://genome.ucsc.edu References Akey J, Zhang G, Zhang K, Jin L, Shriver M (2002) Interrogating a high-density SNP map for signatures of natural selection. Genome Res 12:1805–1814 [PMC free article] [PubMed] [Cross Ref]10.1101/gr.631202 Altshuler D, Hirschhorn JN, Klannemark M, Lindgren CM, Vohl MC, Nemesh J, Lane CR, Schaffner SF, Bolk S, Brewer C, Tuomi T, Gaudet D, Hudson TJ, Daly M, Groop L, Lander ES (2000) The common PPARγ Pro12Ala polymorphism is associated with decreased risk of type 2 diabetes. Nat Genet 26:76–80 [PubMed] [Cross Ref]10.1038/79216 Bamshad M, Wooding SP (2003) Signatures of natural selection in the human genome. Nat Rev Genet 4:99–111 [PubMed] [Cross Ref]10.1038/nrg999 Bayless TM, Rosensweig NS (1966) A racial difference in incidence of lactase deficiency: a survey of milk intolerance and lactase deficiency in healthy adult males. JAMA 197:968–972 [PubMed] Beja-Pereira A, Luikart G, England PR, Bradley DG, Jann OC, Bertorelle G, Chamberlain AT, Nunes TP, Metodiev S, Ferrand N, Erhardt G (2003) Gene-culture coevolution between cattle milk protein genes and human lactase genes. Nat Genet 35:311–313 [PubMed] [Cross Ref]10.1038/ng1263 Bowcock AM, Kidd JR, Mountain JL, Hebert JM, Carotenuto L, Kidd KK, Cavalli-Sforza LL (1991) Drift, admixture, and selection in human evolution: a study with DNA polymorphisms. Proc Natl Acad Sci USA 88:839–843 [PMC free article] [PubMed] Braverman JM, Hudson RR, Kaplan NL, Langley CH, Stephan W (1995) The hitchhiking effect on the site frequency spectrum of DNA polymorphisms. Genetics 140:783–96 [PMC free article] [PubMed] Cavalli-Sforza L (1973) Analytic review: some current problems of population genetics. Am J Hum Genet 25:82–104 [PMC free article] [PubMed] Devlin B, Risch N (1995) A comparison of linkage disequilibrium measures for fine-scale mapping. Genomics 29:311–322 [PubMed] [Cross Ref]10.1006/geno.1995.9003 Enattah NS, Sahi T, Savilahti E, Terwilliger JD, Peltonen L, Jarvela I (2002) Identification of a variant associated with adult-type hypolactasia. Nat Genet 30:233–237 [PubMed] [Cross Ref]10.1038/ng826 Flatz G (1987) Genetics of lactose digestion in humans. In: Harris H, Hirschhorn K (eds) Advances in human genetics. Vol 16. Plenum Press, New York, pp 1–77 Gabriel SB, Schaffner SF, Nguyen H, Moore JM, Roy J, Blumenstiel B, Higgins J, DeFelice M, Lochner A, Faggart M, Liu-Cordero SN, Rotimi C, Adeyemo A, Cooper R, Ward R, Lander ES, Daly MJ, Altshuler D (2002) The structure of haplotype blocks in the human genome. Science 296:2225–2229 [PubMed] [Cross Ref]10.1126/science.1069424 Grand RJ, Montgomery RK, Chitkara DK, Hirschhorn JN (2003) Changing genes; losing lactase. Gut 52:617–619 [PMC free article] [PubMed] [Cross Ref]10.1136/gut.52.5.617 Hamblin MT, Thompson EE, Di Rienzo A (2002) Complex signatures of natural selection at the Duffy blood group locus. Am J Hum Genet 70:369–383 [PMC free article] [PubMed] Hartl D, Clark A (1997) Principles of population genetics. Sinauer Associates, Sunderland, MA Hastbacka J, de la Chapelle A, Mahtani MM, Clines G, Reeve-Daly MP, Daly M, Hamilton BA, Kusumi K, Trivedi B, Weaver A, Coloma A, Lovett M, Buckler A, Kaitila I, Lander ES (1994) The diastrophic dysplasia gene encodes a novel sulfate transporter: positional cloning by fine-structure linkage disequilibrium mapping. Cell 78:1073–87 [PubMed] [Cross Ref]10.1016/0092-8674(94)90281-X Hollox EJ, Poulter M, Zvarik M, Ferak V, Krause A, Jenkins T, Saha N, Kozlov AI, Swallow DM (2001) Lactase haplotype diversity in the Old World. Am J Hum Genet 68:160–172 [PMC free article] [PubMed] Kong A, Gudbjartsson DF, Sainz J, Jonsdottir GM, Gudjonsson SA, Richardsson B, Sigurdardottir S, Barnard J, Hallbeck B, Masson G, Shlien A, Palsson ST, Frigge ML, Thorgeirsson TE, Gulcher JR, Stefansson K (2002) A high-resolution recombination map of the human genome. Nat Genet 31:241–247 [PubMed] Kretchmer N (1971) Memorial lecture: lactose and lactase—a historical perspective. Gastroenterology 61:805–813 [PubMed] Lewontin RC, Krakauer J (1973) Distribution of gene frequency as a test of the theory of the selective neutrality of polymorphisms. Genetics 74:175–195 [PMC free article] [PubMed] Li WH (1975) The first arrival time and mean age of a deleterious mutant gene in a finite population. Am J Hum Genet 27:274–286 [PMC free article] [PubMed] Mulcare CA, Weale ME, Jones AL, Connell B, Zeitlyn D, Tarekegn A, Swallow DM, Bradman N, Thomas MG (2004) The T allele of a single-nucleotide polymorphism 13.9 kb upstream of the lactase gene (LCT) (C−13.9kbT) does not predict or cause the lactase-persistence phenotype in Africans. Am J Hum Genet 74:1102–1110 (in this issue) [PMC free article] [PubMed] Nei M, Chesser R (1983) Estimation of fixation indices and gene diversities. Ann Hum Genet 47:253–259 [PubMed] Olds LC, Sibley E (2003) Lactase persistence DNA variant enhances lactase promoter activity in vitro: functional role as a cis regulatory element. Hum Mol Genet 12:2333–2340 [PubMed] [Cross Ref]10.1093/hmg/ddg244 Osier MV, Pakstis AJ, Soodyall H, Comas D, Goldman D, Odunsi A, Okonofua F, Parnas J, Schulz LO, Bertranpetit J, Bonne-Tamir B, Lu RB, Kidd JR, Kidd KK (2002) A global perspective on genetic variation at the ADH genes reveals unusual patterns of linkage disequilibrium and diversity. Am J Hum Genet 71:84–99 [PMC free article] [PubMed] Pagnier J, Mears JG, Dunda-Belkhodja O, Schaefer-Rego KE, Beldjord C, Nagel RL, Labie D (1984) Evidence for the multicentric origin of the sickle cell hemoglobin gene in Africa. Proc Natl Acad Sci USA 81:1771–1773 [PMC free article] [PubMed] Parra EJ, Marcini A, Akey J, Martinson J, Batzer MA, Cooper R, Forrester T, Allison DB, Deka R, Ferrell RE, Shriver MD (1998) Estimating African American admixture proportions by use of population-specific alleles. Am J Hum Genet 63:1839–1851 [PMC free article] [PubMed] Poulter M, Hollox E, Harvey CB, Mulcare C, Peuhkuri K, Kajander K, Sarner M, Korpela R, Swallow DM (2003) The causal element for the lactase persistence/non-persistence polymorphism is located in a 1 Mb region of linkage disequilibrium in Europeans. Ann Hum Genet 67:298–311 [PubMed] [Cross Ref]10.1046/j.1469-1809.2003.00048.x Reich DE, Goldstein DB (1998) Estimating the age of mutations using the variation at linked markers. In: Goldstein DB, Schlotter C (eds) Microsatellites: evolution and applications. Oxford University Press, Oxford Rosenberg NA, Pritchard JK, Weber JL, Cann HM, Kidd KK, Zhivotovsky LA, Feldman MW (2002) Genetic structure of human populations. Science 298:2381–2385 [PubMed] [Cross Ref]10.1126/science.1078311 Rosner B (1982) Fundamentals of biostatistics. Duxbury Press, Boston, MA Sabeti PC, Reich DE, Higgins JM, Levine HZ, Richter DJ, Schaffner SF, Gabriel SB, Platko JV, Patterson NJ, McDonald GJ, Ackerman HC, Campbell SJ, Altshuler D, Cooper R, Kwiatkowski D, Ward R, Lander ES (2002) Detecting recent positive selection in the human genome from haplotype structure. Nature 419:832–837 [PubMed] [Cross Ref]10.1038/nature01140 Scrimshaw N, Murray E (1988) The acceptability of milk and milk products in populations with a high prevalence of lactose intolerance. Am J Clin Nutr 48:1079–1159 [PubMed] Simoons F (1969) Primary adult lactose intolerance and the milking habit: a problem in biologic and cultural interrelations. I. Review of the medical research. Am J Dig Dis 14:819–836 [PubMed] ——— (1970) Primary adult lactose intolerance and the milking habit: a problem in biologic and cultural interrelations. II. A culture historical hypothesis. Am J Dig Dis 15:695–710 [PubMed] Stephens JC, Reich DE, Goldstein DB, Shin HD, Smith MW, Carrington M, Winkler C, et al (1998) Dating the origin of the CCR5-Δ32 AIDS-resistance allele by the coalescence of haplotypes. Am J Hum Genet 62:1507–1515 [PMC free article] [PubMed] Stephens M, Donnelly P (2003) A comparison of Bayesian methods for haplotype reconstruction from population genotype data. Am J Hum Genet 73:1162–1169 [PMC free article] [PubMed] Tishkoff SA, Varkonyi R, Cahinhinan N, Abbes S, Argyropoulos G, Destro-Bisol G, Drousiotou A, Dangerfield B, Lefranc G, Loiselet J, Piro A, Stoneking M, Tagarelli A, Tagarelli G, Touma EH, Williams SM, Clark AG (2001) Haplotype diversity and linkage disequilibrium at human G6PD: recent origin of alleles that confer malarial resistance. Science 293:455–462 [PubMed] [Cross Ref]10.1126/science.1061573 Toomajian C, Ajioka RS, Jorde LB, Kushner JP, Kreitman M (2003) A method for detecting recent selection in the human genome from allele age estimates. Genetics 165:287–297 [PMC free article] [PubMed] Wiuf C (2001) Do ΔF508 heterozygotes have a selective advantage? Genet Res 78:41–47 [PubMed] [Cross Ref]10.1017/S0016672301005195 Articles from American Journal of Human Genetics are provided here courtesy of American Society of Human Genetics PubReader format: click here to try Formats: Related citations in PubMed See reviews...See all... Cited by other articles in PMC See all... Links • Cited in Books Cited in Books PubMed Central articles cited in books • MedGen MedGen Related information in MedGen • OMIM OMIM OMIM record citing PubMed • PubMed PubMed PubMed citations for these articles • SNP SNP PMC to SNP links • Substance Substance PubChem Substance links Recent Activity Your browsing activity is empty. Activity recording is turned off. Turn recording back on See more...
How to test a Chainsaw Ignition coil with a Multimeter 6 When it comes to ignition coil it is one of the most crucial components of any engine management system and the same is true for the chainsaw ignition coil. As virtually today every modern engine uses the ignition coil that provides the much-needed Spark for the engine’s spark plug. The ignition coil is also very important because it is that inductive coil that is essential for the chainsaw’s ignition system. Its function is simple as it uses the electromagnetic induction that’s help in converting the chainsaw’s minuscule volts it convert it into very powerful volts that are required to generate Spark that is powerful enough so as to jump across the spark plug gap. Although one can say that its purpose and operation is relatively quite simple and passive in nature as compared to the thunderous sound and slashing of the chainsaw. But still, it is a very vital component that is a must for efficient engine operation and its malfunction can result in an array of problems. When there is a failed ignition coil it can result in an obvious slow down of the speed as well as the power to unexpected engine misfires that can become a reason behind and rendering your chainsaw out of service. Apart from this because of their placement the ignition is often susceptible to harsh conditions such as high heat and vibrations from the engine operation. As time passes it can result in burnout or the developing of increased electrical resistance that can become the cause for the inefficient spark that will obstruct its performance hindering our operations. Here is a step-by-step guide that one can follow to perform a test of the ignition coil and know whether it is in good for bad condition by testing its resistance using a multimeter. 1 Step 1: Before we start testing the ignition coil we must know what is the specification of the ignition coil of one’s chainsaw. After that, we need to find out what is the correct resistant reading it’s ignition coil o. It can usually found very easily in the chainsaw’s manual. 2 Secondly, we need to locate the position of the ignition coil on the chainsaw full stop for that purpose we need to open it and we will find it somewhere on the top of the engine or near it. 3 Now it needs to be disconnected from the wiring harness of the ignition coil. It can be easily removed by using hand tools. they are very easy to remove and do not require much effort. 4 Finally, it is time to test the ignition circuit. For which we must connect the positive and negative leads of the multimeter with the positive and negative terminal of the ignition coil. It is easier in some coils when the terminals have been marked positive and negative. And in others, there are just simply two terminals that can be located at the connector. We have to look out for the resistance reading and see if it matches the manufacturer’s specification. In case if the reading is displayed as 0 then it means the ignition and hence it must be replaced to resume its normal functioning. 5 back to menu ↑ Step 5: Sample subtitle Re-install the ignition coils once you have replaced them if needed. After that one should make sure that it also reconnects all the electrical connectors and puts in place the engine covers and other pieces properly that have been removed. 6 back to menu ↑ Conclusion: Lastly, ignition coils are a very crucial part of the ignition system that can drastically affect the engine’s performance if not working properly. A faulty coil may cause all sort of problem and testing it will help us to determine that our chainsaw stays in running condition. If in case we are having any difficulty doing so so we can always approach a mechanic. Spread the love We will be happy to hear your thoughts Leave a reply Chainsaw Care Logo Enable registration in settings - general
EnglishFrenchGermanItalianPortugueseRussianSpanish Water Cooled Condenser: Tube water cooled condenser piping Water cooled condenser Home  Tube water cooled condenser piping - Water cooled condenser Technical information Condensers and cooling towers Water Cooled Condenser Water Cooled Condenser When discussing the air-cooled condensers, it was noted that the ambient air temperature will affect the efficiency of the device. The higher the ambient reaches more design temperature, the greater the device becomes ineffective. For this reason, water cooled made their entrance. Of course, with water-cooled condenser has many advantages, together with his shortcomings. In some areas use water cooled residential & light commercial units. I cover it here for your information. Water used as a coolant in air place. WaBTer passes through a heat exchanger where refrigerants contained in separate pipelines to give its heat to water. Fig. 15-5 shows some typical capacitors are constructed. Now, when you see the real capacitor and how this is done, you need to get the water to make it work. water-cooled-condensers Making the choice of whether to use air-cooled or water-cooled, water source should be studied very carefully. Water can be provided from a well, city, sea water, brackish water, lake, pond, an artificial reservoir. You can see there are many options, however, the water content is very important. The reason is that you don't want constant struggle to keep the condenser clean from minerals or rust. Very rapid buildup on the inner surface, which leads to inefficient heat transfer is costly. Air-cooled condenser can be useful in this case, or perhaps a water purification system, which will be cost effective. In many areas where residential complex or a condominium complex uses community tower, the service charges are not too high if the chemical processing carried out with the water tower on a regular basis to keep separate condensers, which are located in separate apartments in purity. Individual air conditioning units may vary the volume from two to five tons. It may be necessary for you to know how plumbing. On Fig. 15-6 pipe-in-pipe " type condenser shown. It is very common in residential packaging units. The package can be rucked neatly in the closet where it connects to the water riser that is generally built into the wall. All the apartments are located above and below using one hand. Each apartment has a set of valves on the main riser in the case of devices must be removed; water valves can be closed. What happens when the water valve is not closed completely? Never, never, never cut pipe until you are sure that the faucet holding. If not, you may be emptying community water tower, in a few expensive carpeting in someone's apartment and the apartment below. If the valve does not hold, it is necessary to find the shut-off valves for the whole of the riser. Drain valves somewhere below, and this, and should be found to fill the stack, so that new valves can be installed. It is always a good policy to try and make all owners that riser agree to renew the valves at the same time. You might want to turn the whole thing over another-service of the company. tube-water-cooled-condenser The water-cooled condensers, some are sealed and some created with bolted end plates that allow a specialist for his service. Sealed capacitor, such as " pipe-in-pipe " purified acid with a circulating pump. The intake and discharge side of the circulating water circuit the capacitor is open. Fittings are placed on both sides to accommodate the water hoses. One end of the hose is placed in the socket and the other end of the hose is used on the discharge side of the acid circulating pump. Fig. 15-7 shows a typical acid circulating pump. The pump is installed in a five-gallon plastic bucket. Another hose attached to outiet side of the condenser, and the other end of the hose is placed on the bottom of the bucket. In gallons of sulfuric acid is placed in die bucket and distributed through the die capacitor. The same acid can be used again, but the acidity must be checked frequently with litmus paper. If the acid level drops, more acid should be added. With this cleaning procedure, make sure there is plenty of ventilation. You may need a small fan to remove fumes. This procedure lasts about an hour. Promotes the excretion of minerals that isolation of the capacitor and impede heat transfer. High head, is one of the symptoms of a possible capacitor problem. Fig. 15-8 another closed-type capacitor called coil-in-shell. He also cleaned the same as the Bushman in the pipe clean. acid-circulating-pump Fig. 15-9 is a trumpet in the shell of the capacitor. This type of devices used in the refrigeration and air conditioning equipment-from small to very large units. Cleaning of this type are difficult to make. This condenser built with end plates removed for cleaning. Long rod is used something similar to the Ramblarod used in the rifle cleaning. Wire brush attached to the end of the rod. With an electric drill (usually 3/4-hp slow speed drill is used), each pipe water circuit is cleared. After the brush is put through a pipe, it is washed with water. Keep the light in one end and looking down the other (again, as in cleaning the barrel of the gun)you can see and mineral deposits. The same tube can be renamed and rinse with water several times deposits before the break. coil-water-cooled A quick way to check the efficiency of the condenser to touch the output of water and coolant (liquid) on the outlet of the condenser. Refrigerant should be warm, not hot. Exit the water should be warm to the touch. If water in the outlet pipe is too cold, or too much water flowing through it or not heat transfer occurs. If the wall outlet is very hot, there is a limit of water supply. tube-water-cooled ....   Thanks -> Ammonia pipe sizing Automatic expansion valve wiki Compressor types Gas furnace operation Hcfc 22 Modified splash lubrication system Pan humidifier Plate type evaporator Potential relay and current relay Semi hermetic compressor wiki Shell and coil evaporator Solvent recovery process Wikipedia Thermoelectric refrigeration system diagram Copyright @ 2009 - 2016, "www.ref-wiki.com"
Blood Res 2015; 50(4): 256-260  https://doi.org/10.5045/br.2015.50.4.256 Primary bone lymphoma with multifocal osteolytic lesions: a rare case report with review of literature Prakas Kumar Mandal*, Shuvraneel Baul, and Tuphan Kanti Dolai Department of Hematology, NRS Medical College, Kolkata, India. Correspondence to: Correspondence to: Prakas Kumar Mandal. Department of Hematology, NRS Medical College, 8C/1/N, Roy Para Road, Kolkata 700050, India. prakas70@gmail.com Received: January 14, 2015; Revised: January 28, 2015; Accepted: November 12, 2015; Published online: December 21, 2015. © The Korean Journal of Hematology. All rights reserved. cc This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. CASE TO THE EDITOR: Primary non-Hodgkin lymphoma (NHL) of bone is a rare disorder [1]. Primary bone lymphoma involving multiple sites is even rarer and in the majority of cases, the diagnosis is diffuse large B-cell lymphoma (DLBCL). Here we report the case of a young patient with unexplained diffuse bone pain that was diagnosed as primary bone lymphoma (B-cell lymphoma, unclassifiable, with features intermediate between DLBCL and Burkitt lymphoma) with multifocal osteolytic lesions. A 22-year-old male was admitted to the orthopedic ward complaining of pain in the right side of his groin. He had experienced difficulty in walking for 3 months prior followed by diffuse bone pain in his whole body and weight loss for 2 months. He had 6 brothers and 1 sister; one of his brothers had been treated for spinal tuberculosis 9 years earlier. He was managed with analgesics and proton pump inhibitors. A skeletal survey (Fig. 1) revealed osteolytic lesions in multiple long and flat bones. Bone scintigraphy with technetium-99 showed high accumulation in the skull, vertebrae, ribs, pelvis, both humeri, and the bilateral femurs (Fig. 2A). A whole-body positron emission tomography-computed tomography (PET-CT) scan (Fig. 2B, C) revealed multiple metabolically active lytic lesions all over the skeletal system. No other metabolically active lesions were observed. Serum carcinoembryonic antigen, alpha-fetoprotein, and prostate-specific antigen levels were normal; the patient's thyroid profile was also normal. The patient was then referred to the hematology department. There was no history of pallor, bleeding, arthralgia or arthritis, nor any history of blood transfusion. On examination, there was mild pallor, but no icterus, pedal edema, or palpable lymph nodes. The liver and spleen were not palpable, but bony tenderness was present. The patient was afebrile and his vital signs were stable. The results of hematologic tests were as follows: hemoglobin 12.1 g/dL, red blood cell (RBC) count 4.28×1012/L, white blood cell count 11.3×109/L, and platelet count 468×109/L. In addition, a peripheral smear showed normocytic, normochromic RBCs, neutrophils 64%, lymphocytes 29%, monocytes 5%, eosinophils 1%, and basophils 1%. Blood biochemistry tests revealed normal serum bilirubin, aspartate transaminase, alanine transaminase, and fasting plasma glucose levels. The following results were also obtained: serum total protein 4.9 g/dL, albumin 2.2 g/dL, globulin 2.7 g/dL, urea 86 mg/dL, creatinine 2.9 mg/dL, uric acid 9.9 mg/dL, sodium 128 mEq/L, potassium 2.7 mEq/L and corrected calcium 14.20 mg/dL. The glomerular filtration rate was 23.17 mL/min, and the antinuclear antibody test result was negative. Serum and urine protein electrophoresis with immunofixation did not reveal any monoclonal paraproteins or light chains. The serum free light chain ratio was 2.54 (renal failure range, 0.37-3.17) and the β2-microglobulin level was 4,900 µg/L. Bone marrow aspiration and a trephine biopsy (Fig. 3) revealed a hypercellular marrow with diffuse infiltration by medium-tolarge cells with scanty cytoplasm, vesicular nuclei with irregular nuclear membranes, and occasional cells with prominent nucleoli. A diagnosis of high-grade non-Hodgkin lymphoma (NHL) was made. The conventional cytogenetic study test results were normal, with a 46, XY karyotype. Immunohistochemistry showed that the tumor cells expressed CD20, CD10, and c-MYC, and were negative for CD3, TdT, BCL-2, and CD34. The MIB-1 labeling index was 90%. Thus, a diagnosis of B-cell lymphoma, unclassifiable, with features intermediate between diffuse large B-cell lymphoma (DLBCL) and Burkitt lymphoma (BL) was made. After counseling, the patient was treated with the R-CHOP (rituximab, cyclophosphamide, doxorubicin, vincristin and prednisolone) chemotherapy regimen. A PET-CT after 4 cycles of chemotherapy revealed the presence of residual disease in the trochanteric region of the right femur. The patient was advised to undergo another 4 cycles of R-CHOP. At the end of a total of 8 cycles of R-CHOP, a repeat PET-CT was carried and the patient was determined to be in complete remission. DISCUSSION Coley et al. [2] described the criteria for the diagnosis of primary bone lymphoma (subsequently known as Coley's criteria) as early as 1950. The criteria includes: (i) a primary focus in a single bone, (ii) unequivocal histologic proof from the bone lesion, and (iii) no evidence of distant soft tissue or distant lymph node involvement. Primary lymphoma of bone is a rare entity and is generally a type of NHL; it represents <1% of all NHLs and 5% of all extranodal NHLs [1]. NHL primarily arising in bone is unusual; its peak incidence is in the fifth decade of life. About half of primary NHLs of bone occur in the long bones [3]. It commonly presents with localized bone pain and occasionally a palpable mass [3]. Economopoulos et al. [4] from Greece studied 37 cases of primary lymphoma involving multiple extranodal sites at presentation and found only 1 case of primary bone involvement of DLBCL at multiple sites. In another study from British Columbia of 131 patients with primary bone lymphoma, the most common diagnosis was DLBCL (N=103), followed by follicular lymphoma (N=7), anaplastic large-cell lymphoma of T-cell phenotype (N=4), marginal zone lymphoma (N=4), peripheral T-cell lymphoma (N=2) and lymphoblastic lymphoma (N=2). Among others included (N=9) were 2 cases of Burkitt or Burkitt-like lymphoma and 1 unclassifiable case [5]. In a recent study from Bangalore, India, Singh et al. [6] reported 2 cases of primary bone lymphoma, both of which were diagnosed as DLBCL. Sato et al. [7] reported a case of primary bone lymphoma in a 6-year-old girl presenting with multifocal osteolytic lesions without any systemic symptoms or identifiable non-osseous primary tumors. In a recent study, it was concluded that assessment of bone marrow involvement with fluorine-18-2-deoxy-2-fluoro-D-glucose PET/CT provided a better diagnostic performance in newly diagnosed DLBCL than a bone marrow biopsy [8]. Tanaka et al. [9] reported the case of a 12-year-old boy complaining of fever and migratory arthralgia. A magnetic resonance imaging scan of his whole body showed multiple abnormal signals in his bones. Peripheral blood and bone marrow examinations did not show any abnormalities. A bone and bone marrow biopsy confirmed the diagnosis of BL on further examination. Ahn et al. [10] reported the case of a 2-year-old male Korean child admitted for left hip pain. The patient was diagnosed with intermediate DLBCL/BL based on morphological features intermediate between BL and DLBCL, expression of CD10, BCL6, BCL2, the Ki67 labeling index, and a complex karyotype with 8q34/MYC. B-cell lymphomas with features intermediate between DLBCL and BL are aggressive lymphomas that have the morphological and genetic features of both DLBCL and BL, but biological and clinical reasons are not included in these categories [11]. Morphologic features are useful in the differential diagnosis of intermediate DLBCL/BL. There are various cellular forms; those resembling BL cells are smaller than typical DLBCL cells and those resembling DLBCL cells are larger than typical BL cells. Immunophenotypically, the cells are akin to BL with positivity for CD19, CD20, CD22, CD79a, CD10 and BCL6. BCL2 expression may be absent, weak, or strong. The Ki67 labeling index shows varying positivity [12]. Perry et al. [13] studied 39 cases of B-cell lymphoma, unclassifiable (B-UCL), presented at a median age of 69 years. The majority (62%) of patients presented with advanced-stage disease and 54% of patients had high (3-5) International Prognostic Index scores. Genetic heterogeneity was observed; 11 patients had 'double-hit' lymphomas with rearrangements of both MYC and BCL2 or BCL6. None of the immunohistochemical or genetic features were predictive of survival and the cases were very aggressive and resistant to chemotherapy. The 2008 World Health Organization classification includes provisional borderline categories for cases that are not clearly DLBCL or BL. This new category is called B-cell lymphoma, unclassifiable, with features intermediate between DLBCL and BL (intermediate DLBCL/BL) [11]. The justification for this new category is the recognition that these tumors are frequently refractory to chemotherapy and the patients have a poor survival rate [14]. Sirelkhatim et al. [15] studied cases with unexplained bone pain and concluded that lymphoma/leukemia should be kept in mind when investigating a case of unexplained bone pain or an unexplained bone lesion, although it is a rare entity. Our case presented with unexplained diffuse bone pain and, on evaluation, the patient was diagnosed with primary bone lymphoma (B-cell lymphoma, unclassifiable, with features intermediate between DLBCL and BL). The features included: a young age at presentation, serum hypercalcemia, multifocal osteolytic lesions present all over the body, and a rare type of histologic diagnosis. The patient achieved complete remission with R-CHOP chemotherapy. Ramadan et al. [5] treated the cases with CHOP (and R-CHOP in the rituximab era), radiotherapy or a combination of both. NHL presenting as a primary bone tumor with multifocal disease is extremely rare. Primary bone lymphoma should be considered in the differential diagnosis of bony lesions in young patients. A very high index of suspicion, judicious use of the investigative armamentarium, and awareness of provisional borderline categories like B-cell lymphoma, unclassifiable, with features intermediate between DLBCL and BL will help clinicians to achieve timely diagnosis and management. Figures Fig. 1. Digital radiograph revealing osteolytic lesions in multiple long and flat bones. (A) anteroposterior view of the skull, (B) lateral view of the skull, (C, D) right and left humeri. Fig. 2. Bone scintigraphy with technetium-99 showing multiple bony deposits all over the body (A). Whole body fluorine-18-2-deoxy-2-fluoro-D-glucose positron emission tomography-computed tomography scan (B, C) revealing multiple metabolically active lytic lesions all over the skeletal system. Fig. 3. (A) Bone marrow aspiration showing few atypical mononuclear cells (arrow) with scanty cytoplasm and vacuolations and occasional cells with prominent nucleoli (Leishman stain). (B-D) Trephine biopsy revealing a hypercellular marrow with diffuse infiltration by medium-to-large cells with scanty cytoplasm, vesicular nuclei with irregular nuclear membrane and occasional cells showing prominent nucleoli. References 1. de Leval, L, Braaten, KM, Ancukiewicz, M, et al. Diffuse large B-cell lymphoma of bone: an analysis of differentiation-associated antigens with clinical correlation. Am J Surg Pathol, 2003;27;1269-1277. Pubmed 2. Coley, BL, Higinbotham, NL, Groesbeck, HP. Primary reticulum-cell sarcoma of bone; summary of 37 cases. Radiology, 1950;55;641-658. Pubmed 3. Gill, P, Wenger, DE, Inwards, DJ. Primary lymphomas of bone. Clin Lymphoma Myeloma, 2005;6;140-142. Pubmed 4. Economopoulos, T, Papageorgiou, S, Rontogianni, D, et al. Multifocal extranodal non-hodgkin lymphoma: a clinicopathologic study of 37 cases in Greece, a Hellenic Cooperative Oncology Group study. Oncologist, 2005;10;734-738. Pubmed 5. Ramadan, KM, Shenkier, T, Sehn, LH, Gascoyne, RD, Connors, JM. A clinicopathological retrospective study of 131 patients with primary bone lymphoma: a population-based study of successively treated cohorts from the British Columbia Cancer Agency. Ann Oncol, 2007;18;129-135. Pubmed 6. Singh, T, Satheesh, CT, Lakshmaiah, KC, et al. Primary bone lymphoma: a report of two cases and review of the literature. J Cancer Res Ther, 2010;6;296-298. Pubmed 7. Sato, TS, Ferguson, PJ, Khanna, G. Primary multifocal osseous lymphoma in a child. Pediatr Radiol, 2008;38;1338-1341. Pubmed 8. Berthet, L, Cochet, A, Kanoun, S, et al. In newly diagnosed diffuse large B-cell lymphoma, determination of bone marrow involvement with 18F-FDG PET/CT provides better diagnostic performance and prognostic stratification than does biopsy. J Nucl Med, 2013;54;1244-1250. Pubmed 9. Tanaka, C, Nozawa, K, Sano, A, et al. A case of Burkitt lymphoma with multifocal bone invasion. Rinsho Byori, 2013;61;231-236. Pubmed 10. Ahn, JY, Seo, YH, Park, PW, et al. A case of B-cell lymphoma, unclassifiable, with features intermediate between diffuse large B-cell lymphoma and Burkitt lymphoma in a Korean child. Ann Lab Med, 2012;32;162-166. Pubmed 11. Swerdlow SH, Campo E, Harris NL. WHO classification of tumours of haematopoietic and lymphoid tissues. Lyon, France: IARC Press; 2008. p. 65-66. 12. Carbone, A, Gloghini, A, Aiello, A, Testi, A, Cabras, A. B-cell lymphomas with features intermediate between distinct pathologic entities. From pathogenesis to pathology. Hum Pathol, 2010;41;621-631. Pubmed 13. Perry, AM, Crockett, D, Dave, BJ, et al. B-cell lymphoma, unclassifiable, with features intermediate between diffuse large B-cell lymphoma and burkitt lymphoma: study of 39 cases. Br J Haematol, 2013;162;40-49. Pubmed 14. Jack, AS, Barrans, SL, Qian, W, Stenning, SP, Mead, GM. Bone marrow involvement and outcome in Burkitt lymphoma and diffuse large B-cell lymphoma. Blood, 2009;114;486-487. 15. Sirelkhatim, A, Kaiserova, E, Kolenova, A, et al. Systemic malignancies presenting as primary osteolytic lesion. Bratisl Lek Listy, 2009;110;630-635. Pubmed e-submission This Article Current Issue ba_link01 SCImago Journal & Country Rank Indexed/Covered by Today : 276  / Total : 497,883
A config-based approach to pluggable composition I wanted to share this sample to demonstrate a simple way to implement a configuration based approach to switching out pluggable dependencies.  The example here uses reflection to dynamically load an assembly and then instantiate the targeted class contained therein.  The idea with this approach is that you may have different implementations of an interface contained in different assemblies.  Thus,  you’re able to simply target the different implementations of the interface by switching an app config key that specifies a different assembly name.  Note the following: 1.  The path variable is the fully qualfied assembly name. 2.  The className variable is path with the name of the class that implements an expected interface appended to it.  In this case, we expect the assembly to contain an implementation of IOrder. From PetShop.NET 4.0 reference app source: using System; using System.Reflection; using System.Configuration; namespace PetShop.MessagingFactory  {          /// <summary>         /// This class is implemented following the Abstract Factory pattern to create the Order         /// Messaging implementation specified from the configuration file         /// </summary>         public sealed class QueueAccess         {              // Look up the Messaging implementation we should be using              private static readonly string path = ConfigurationManager.AppSettings["OrderMessaging"];              private QueueAccess() { }              public static PetShop.IMessaging.IOrder CreateOrder() {              string className = path + ".Order";              return (PetShop.IMessaging.IOrder)Assembly.Load(path).CreateInstance(className);           }     } } Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out /  Change ) Google photo You are commenting using your Google account. Log Out /  Change ) Twitter picture You are commenting using your Twitter account. Log Out /  Change ) Facebook photo You are commenting using your Facebook account. Log Out /  Change ) Connecting to %s %d bloggers like this:
Welcome to the Question2Answer Q&A. There's also a demo if you just want to try it out. +1 vote 589 views in Q2A Core by After choosing another theme and using the latest v1.7.4 all my ajax requests did not work anymore and I got: Unexpected response from server - please try again or switch off Javascript  I checked the theme file and found the error:         function initialize()         {             // change navigation: bring "ask" to front                $hash = $this->content['navigation']['main'];                $hash = array('ask' => $hash['ask']) + $hash;                $this->content['navigation']['main'] = $hash; Looking into the php files in the ajax folder, e.g. ajax/vote.php you see the call: $themeclass->initialize(); So I guess this is the culprit causing the problem. Maybe the $content is not set when the ajax call takes place? I fixed it by:            $hash = $this->content['navigation']['main'];             if(isset($hash))             {                 $hash = array('ask' => $hash['ask']) + $hash;                 $this->content['navigation']['main'] = $hash;             } Hope that helps. Q2A version: 1.7.4 by Which theme does this happen in? by One of my own custom themes. Not public. Please log in or register to answer this question. ...
1 $\begingroup$ I have a technical question concerning the choice of the splitting criteria for the recursive partitioning. Having selected the most significant variable, I would like to know why the optimal splitting criteria is found using only the test statistics as the objective function of the optimization and not with the p-value of the test. I don't know if I'm right but the optimal splitting criteria could not be significant if we computed its p-value instead of just using the value of the test statistic (even if the selected variable is significant). $\endgroup$ 2 • $\begingroup$ I'm not sure what the question is here. Are you asking why potentially different tests are used for selecting the splitting variable vs. the splitting point? $\endgroup$ Commented Jul 26, 2018 at 7:55 • $\begingroup$ I wanted to know why the optimal splitting point is selected using the value of the statistic and not the p-value. I had a case where the optimal split maximizing the value of the statistic was associated with a p-value higher than 5%. Therefore, the splitting variable was significant but not the splitting point of this variable. $\endgroup$ – R.B Commented Aug 2, 2018 at 11:17 1 Answer 1 2 $\begingroup$ By default ctree() uses different test statistics for selecting the split variable and the split point, respectively. The default test for the former is a kind of correlation test but for the latter a maximally-selected two-sample test. See: In this notation, the transformation $g(\cdot)$ used for selecting the variable is by default $g(x) = x$ for a numeric variable. The transformation for selecting the splitpoint is then formed by considering all transformations of type $g(x) = (1, 1, 1, \dots, 0, 0)^\top$ encoding all possible binary splits (subject to subset size requirements), and then taking the maximum. The reason for choosing the maximalliy-selected statistic in the second step is straightforward, I guess, but the association test in the first step might be surprising. Of course, the maximally-selected test could also be used there but (a) is much more costly to compute and (b) might have less power against monotonic associations. But it is surely possible to find situations when one or the other test performs better. If you want to deviate from ctree's default you need to modify the xtrafo argument. $\endgroup$ Your Answer By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Not the answer you're looking for? Browse other questions tagged or ask your own question.
RESEARCH ARTICLE Prevalence and Correlates of Mental Disorders in a School-Survey Sample Carlo Faravellia, *, Carolina Lo Saurob, Giovanni Castellinib, Valdo Riccab, Stefano Pallantib a Department of Psychology, Florence University, S. Salvi, Padiglione 16, Firenze, Italy b Department of Neurology and Psychiatry, Florence University, Viale Morgagni 85, 50134 Firenze, Italy Article Metrics CrossRef Citations: 0 Total Statistics: Full-Text HTML Views: 1662 Abstract HTML Views: 797 PDF Downloads: 268 Total Views/Downloads: 2727 Unique Statistics: Full-Text HTML Views: 495 Abstract HTML Views: 467 PDF Downloads: 179 Total Views/Downloads: 1141 © Faravelli et al.; Licensee Bentham Open. open-access license: This is an open access article licensed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited. * Address correspondence to this author at the Studio DeA, Via P.F. Calvi 10, 50100, Florence, Italy; Tel/Fax: +39 055 6266046; E-mail: carlo.faravelli@unifi.it Abstract Background: Most of the adult mental disorders have their origins early in life. As the epidemiology of childhood psychiatric disorder in Italy has not been extensively investigated, we have evaluated the prevalence of mental disorders and their association with socio-familiar variables in a representative sample of children aged 6 to 11. Method: The study was conducted on a school- sample of 1028 children, aged 6 to 11, attending 12 primary schools in Florence (Italy). The diagnoses were made according to DSM IV diagnostic criteria, integrated by the description of each symptom, using specially trained teachers as lay-interviewers. Odds ratios with 95% C.I. chi squares and a stepwise binary logistic analysis have been performed. Results: Nine hundred ninety nine children (506 males; 493 females) were studied. Of them, 10.5% received a psychiatric diagnosis, with a higher prevalence in males (66.7% vs.33.3, p<0.01). The most prevalent groups of mental disorders were the behavioural/impulse control (7.2%) and anxiety (6.4%) disorders. Attention Deficit with Hyperactivity Disorder was the most represented diagnosis (5.6% of the children). All the other mental disorders were relatively rare, with only separation anxiety and overanxious disorder exceeding 1% prevalence. Male gender, organic disease, having mother divorced, not present or dead, attending school full-time, cohabitation in the family were associated with an increased risk for any childhood mental disorder. Conclusions: About one in ten children aged 6-11 suffers from a mental disorder. Male gender, loss of mother and lower socio-economic status are associated with mental disorders in children. Further long-term prospective studies are needed, in order to clarify the epidemiological and psychopathological relationships between childhood and adult mental disorders. Keywords: Childhood, epidemiology, mental disorder, risk factor. BACKGROUND Most of the mental disorders of adulthood have their origins early in life. Although the disorders typical of childhood tend to recur during adulthood and are associated with substantial difficulties in later life [1], the epidemiology of childhood psychiatric disorder has not been extensively investigated to date [2-6]. Epidemiological studies on children psychopathology show different methodological difficulties. Parents, teachers, and paediatricians can be used as informant [7], but different informants will often disagree [2, 8-10], as parents are too involved and poorly objective [11], while teachers use different parameters [12-15], basically making comparisons with children of similar ages [16-17]. Accordingly, psychiatric disorders in children aged between 1 and 9 have been reported with prevalence rates ranging from 0.1% to 26.4% [5, 18], with remarkable differences between countries [19], independently of the different regions of the world, socio-economic development, and other structural correlates [5]. Most of the childhood-onset disorders show a higher rates of males than females, with a median sex ratio (boys-girls) of 1.6:1 [6, 18, 20-23], and such differences are mainly due to the higher frequency of behavioral disorders in boys [18, 23]. Considering the prevalence rates, Attention Deficit with Hyperactivity Disorder (ADHD) is one of the most prevalent disorder observed in childhood and adolescence, with little differences between countries [24-26]. Anxiety disorders are also common [27-29], with rates of 0.1%-13.3% in boys and 0.4%-28.6% in girls [28]. The most prevalent anxiety disorders are overanxious disorder (0.16%-11.1%) and separation anxiety disorder (0.5%-20.2%), which are specific of childhood [28, 29], whereas specific/simple phobia and social anxiety are both reported with less than 1% prevalence [29, 30]. The prevalence of depressive disorders in prepubertal children is around 1% - 2% [31, 32]. About 1% of children aged 3 to 10 suffer from Intellectual Disability (ID), which is the most common developmental disorder [33, 34], 0.3-0.5% have an Autism Spectrum Disorder (ASD) [35-37], and 2%- 8% of children suffer from Learning Disabilities (LD), such as speach and language problems, dysgraphia, or dyslexia [38]. Finally, the prevalence of nocturnal enuresis in a school-children is estimated of 13%, with two thirds classified as suffering from primary enuresis [39, 40]. As, to our knowledge, no studies on the prevalence of mental disorders in children have been conducted in Italy to date, a representative sample of children attending primary school in Florence, Italy, were studied. Teachers specially trained made the observations/diagnoses with the supervision of qualified psychiatrists. METHODS The study was conducted on a school-survey sample of 1028 children aged between 6 and 11, attending primary school in the urban area of Florence, Italy. According to the local regulation, during the primary phase of the compulsory education, children must attend a school located in the same geographic area of their residence. In order to obtain a representative sample of the Florentine children population, 2 primary public schools were selected for each of the 6 districts of the city of Florence. For each school, the number of classes to be examined depended on the population density of the corresponding area. The choice of the classes to be surveyed in each school relied basically on the availability of the teachers. In the present study there were 40 voluntary teachers, 40 classes, totalling 1028 school children. All these children were registered with the local education authority, and the sample closely matched the socioeconomic status of the city of Florence. After the protocol was approved by the Department of Education of Florence, the study was proposed to the school directors, to the teachers, and finally to the parents. The study was proposed to 44 teachers, and 40 of them accepted to participate. The parents of 29 children refused to provide their consent, so that the final sample consisted of 999 school children, 506 boys and 493 girls, whose parents gave their written informed consent to participate in the study. Teachers were chosen as lay-interviewers, as they spend much time with children, may observe them in their social context, and should be more objective than the parents [12]. Children in fact share a long time with teachers in their own daily social context, during the first cycle of compulsory education (by the age of 6 to 11 years old). According to the Italian public school regulations, children had the opportunity to chose between “full-time” (about 8 hours a day, having lunch at school, five days per week), and “regular time” (about 5 hours a day, six days per week); in any case the same teacher was responsible of about 25 children during all the time. The diagnoses were obtained by means an integration of the DSM IV [41] diagnostic algorithms, and the full description of each symptom (observation of children behaviour, interactions with teachers and peers). Teachers received a specific and intensive training aimed at recognizing childhood symptoms, with a program that included video training and role play, including clinical scenarios. At the end of the training period, the inter-rater reliability was compared both between different teachers, and between teachers and fully qualified psychiatrists, and was found satisfying (Kappa ranging from 0.83 to 0.97 for the various DSM IV diagnoses). The same procedure was repeated throughout the data collection, with approximately 20% of the accounts from the teachers’ interviews reviewed, and compared with the diagnoses blindly given by a senior psychiatrist. Most of DSM IV childhood disorders, overanxious disorder and phobias were considered and categorized into three major groups, as previously suggested [4-5, 42, 43]: 1. Behavioural/Impulse Control Disorders: attention-deficit hyperactivity disorder (ADHD), conduct disorder (CD), aggressiveness; 2. Anxiety Disorders: overanxious disorder, separation anxiety, phobias, sensitiveness, lack of self-confidence, avoidance; 3. Neurological Disorders: intellectual disability (ID), autism, stutter, enuresis, language disorders (LD), dyslexia, dysgraphia. Major depression was also explored. Lack of self-confidence, sensitiveness, aggressiveness, family, social, and overall functioning were also assessed. Interviewers did not take into account disorders with expected low prevalence, such as psychotic disorders, substance abuse disorders, gender identity disorder, or childhood-onset bipolar disorder [5, 44, 45], and those disorders which were considered difficult to investigate by teachers (like elective mutism, reactive attachment disorder of infancy or early childhood and stereotypy/habit disorder). Moreover, eating disorders were not investigated because children eating behaviours during breakfast and dinner could not be observed in the school, and during lunch time teachers did not have meal together with the children. The observation period ranged through the entire scholastic year. Prevalence figures are reported with 95% confidence limits. Odds ratios with 95% C.I. and chi squares are used for comparisons between groups A stepwise binary logistic analysis with the risk of meeting any psychiatric disorder as dependent variable. RESULTS 999 children (506 males, 50.6%; 493 females, 49.4%) aged from 6 to 11, attending 12 primary schools of the Municipality of Florence, Central Italy, were investigated; the mean age was 8.88 ± SD 1.33 years (range 6 to 11). One hundred and four children (10.5%) were reported to have a psychiatric disorder, with a higher prevalence in males (66.7% vs.33.3, p<0.01). This gender difference was mainly due to the high prevalence of the behavioural/impulse control disorders group (7.2% of the sample, 72.2% males), whereas among the anxiety disorders group (6.4% of the sample) the male/female ratio was about 1 (Table 1). Table 1. Prevalence of Mental Disorders Diagnosis Prevalence (%) 95 % C.I. Males (%) OR (Males/Females) Autism 0.3 (-0.3-0.63) % 66.7 1.9 (0.2-21.6) ADHD 5.6 (4.17-7.03)% 69.6 2.3 (1.3-4.2) Separation anxiety 1.9 (1.05-2.74)% 52.6 1.1 (0.4-2.7) Overanxious disorder 1.2 (0.52-1.87)% 50 0.9 (0.3-3.0) Conduct disorder 1.0 (0.38-1.61)% 80 3.9 (0.8-18.6) Intellectual disability 0.9 (0.31-1.48)% 66.7 1.9 (0.5-7.9) Language disorders 0.9 (0.31-1.48)% 66.7 1.9 (0.5-7.9) Dyslexia 0.6 (0.12-1.08)% 66.7 1.9 (0.3-10.7) Dysgraphia 0.6 (0.12-1.08)% 66.7 1.9 (0.3-10.7) Stutter 0.4 (0.008-0.79)% 75 2.9 (0.3-28.3) Nocturnal enuresis 0.3 (-0.3-0.63) % 33.3 0.5 (0.0-5.4) Major depression 0.2 (-0.076-0.47)% 100 0.9 (0.9-1.0) Phobias 0.1 (-0.09-0.29)% 100 0.9 (0.9-1.0) Lack of self-confidence 2.3 (1.37-3.23)% 47.8 0.9 (0.4-2.0) Sensitiveness 1.3 (0.59-2.00)% 84.6 5.4 (1.2-24.7) Aggressiveness 0.8 (0.24-1.35)% 75 2.9 (0.6-14.6) Avoidance 0.2 (-0.076-0.47)% 50 0.9 (0.1-15.6) Behavioural/impulse control disorders 7.2 (5.51-8.70)% 72.2 2.7 (1.6-4.6) Anxiety disorders 6.4 (4.88-7.92)% 51.6 1.0 (0.6-1.7) Neurological disorders 4.2 (2.95-5.44)% 61.9 1.6 (0.8-3.0) Any diagnosis 10.5 (0.38-1.61)% 66.7 2.1 (1.4-3.2) Table 2. Socio-Familiar Variables and their Association with any Diagnosis Frequency in the Total Sample Frequency in Children Affected by any Psychiatric Disorder OR (95% CI) Gender Male 50.7%49.3% 66.7%33.3% 2.1* (1.4-3.2) Female 49.3% 33.3% Organic disease 4.7% 14.3% 4.5 (2.3-8.6) Attending school full-time 61.8% 73.3% 1.8 (1.1-2.8) Learning support teacher 2.5% 13.3% 12.3 (5.4-28.0) First-born 57.8% 54.3% 1.2 (0.8-1.7) Presence of at least one brother/sister 69% 1 54.5% 69.5% 1.0 (0.6-1.6) 2 12.4% 3-5 2.9% Father marital status Married 93.4% 19.0% 4.3 (2.4-7.6) Divorced, not present, or dead 6.6% Mother marital status Married 98.8% 5.7% 8.9 (2.8-28.3) Divorced, not present, or dead 1.2% Father’s occupation - Employee 34.2% 49.5% Self-employed 33.3% 32.4% Workman 5.6% 4.8% Teacher 4.8 5.7 Unemployed 0.6% 1.0% Mother’s occupation - Employee 32.5% 34.3% Self-employed 16.2% 21.0% Workman 5.6% 4.8% Teacher 8.7% 5.7% Housewife 29.8% 25.7% Nr of components of familiar nucleus ≤2 27.4% 72.4% 0.9** (0.6-1.5) >2 72.6% Presence of other cohabitants 12.6% 22.9% 2.3 (1.4-3.8) :the OR is calculated as male/female. ** :the OR is calculated as ≤2/>2 Table 3. Correlations Between Different Variables and Groups of Disorders Behavioral Disorders OR (95% CI) Anxiety Disorders OR (95% CI) Neurological Disorders OR (95% CI) Gender 72.2% male 27.8% female 2.7* (1.6-4.6) 51.6% male 48.4%female 1.0* (0.6-1.7) 61.9% male 38.1% female 1.6* (0.8-3.0) Mother divorced, not present, or dead 5.6% 6.7 (1.9-23.0) 3.1% 2.9 (0.6-13.9) - - Father divorced, not present, or dead 16.7% 3.2 (1.6-6.4) 17.2% 3.3 (1.6-6.7) 23.8% 5.0 (2.3-10.7) Other cohabitants 16.7% 1.4 (0.7-2.7) 17.2% 1.5 (0.7-2.9) 21.4% 1.9 (0.9-4.2) Organic disease 11.1% 2.8 (1.3-6.3) 12.5% 3.3 (1.5-7.3) 16.7% 4.6 (1.9-10.9) Attending school full-time 75.0% 1.9 (1.1-3.4) 60.9% 0.9 (0.6-1.6) 76.2% 2.0 (0.9-4.2) Learning support teacher 5.6% 2.5 (0.8-7.6) 6.3% 2.9 (0.9-8.7) 19% 13 (5.2-32.2) :the OR is calculated as male/female. Table 4. Determinant of Mental Disorders in Childhood at Multivariate Analysis (Binary Logistic Regression) Presence of Any Psychiatric Diagnosis B p OR (95% CI) Step 1 Gender 0.71 0.001 2.03 (1.33-3.11) Age -0.034 0.955 0.97 (0.83-1.12) Step 2 Gender 0.61 0.011 1.84 (1.14-2.95) Age 0.07 0.37 1.07 (0.91-1.27) Attending school full-time -0.445 0.114 0.65 (0.38-1.07) Father divorced, not present, or dead 0.570 0.16 1.99 (0.92-4.33) Mother divorced, not present, or dead 1.504 0.041 5.84 (1.48-22.99) Other cohabitants 0.493 0.13 Presence of at least one brother/sister 0.123 0.60 1.13 (0.71-1.80) Father occupation -0.179 0.19 0.83 (0.63-1.09) Mother occupation 0.031 0.80 1.03 (0.80-1.32) Organic disease 1.055 0.007 2.87 (1.33-6.26) Special school-assistance 0.884 0.068 2.42 (0.93-6.26) Statistics- Stepwise Logistic Regression: effect of the socio-demographic characteristics on diagnosis, coded as dummy variables (presence of diagnosis: 1, absence: 0). Attention-deficit hyperactivity disorder (ADHD) was the most common disorder (5.6% of the whole sample), with a significant higher prevalence in males (69.6% vs. 30.4%, OR =2.3, CI 95%; 1.3-4.2). All the other psychiatric disorders had prevalence rates < 1%, with the only exceptions of conduct disorder, separation anxiety and overanxious disorder. Gender, organic diseases, attending school full-time, having a learning support teacher, parents’ marital status, presence of other cohabitants in the familiar context were associated with an higher risk of suffering from any mental disorder (Table 2). More specifically, among diagnostic groups, the absence of mother was associated with behavioural disorders, whereas the absence of father resulted as risk factor for both behavioural and anxiety disorders. The co-occurrence of organic diseases during the early childhood was associated with all the diagnostic groups. Attending the school full time (as opposed to half a day) was also associated with behavioural and neurological disorders (Table 3). A binary logistic regression with having a psychiatric disorder as dependent variable (Table 4), confirmed that gender, organic diseases and having mother divorced, not present, or dead were independently and significantly associated with the presence of a mental disorder. DISCUSSION AND CONCLUSIONS The epidemiology of childhood psychiatric disorders is scarcely investigated, due to the methodological difficulties of assessing mental disorders in children [12]. There are few methods for the assessment of mental status in children [12], since the information provided by children are considered unreliable [17, 46]. In fact, children have poor insight, they often demonstrated a limited ability to recognize and be self-aware of their emotional and cognitive states, and have obvious difficulties to articulate and verbalize their feelings [47]. Furthermore, while parents, teachers, and paediatricians all serve as “gatekeepers” to the diagnosis [7], different informants will disagree about the real mental problem of the child [2, 8-10, 48]. Specifically, even if parents are usually the most important sources of information, as they are familiar with the child’s behaviour across time and in many situations, they are too emotionally involved, so that they can be poorly objective and tend to value the symptoms with greater severity [11]. On the other hand, teachers are more likely than parents to notice emotional problems and describe social and learning problems in children [49]. This is due to the daily relationship between teachers and students, that allow to observe different behaviours outside of the home setting, witness children in situations that provoke strong reactions and that expose them to multiple peers, and make accurate comparisons with children of similar ages [16, 17]. For these reasons, teachers are usually better at identifying children with behavioural problems than children with emotional problems [11, 16, 17]. Nonetheless, teachers are able to notice different aspects of the children and can use different parameters and methods to observe them [12-15]. In spite of our intensive training of the teachers with a program that included video training, role play and supervision of interviewers and the use of specific instructions and decision trees, as recommended and extensively used [1, 7, 47, 50-52], we are aware that children have been evaluated by one of the possible different viewpoints. This could mean that, while the abnormal behaviours are more likely to have been properly assessed, the detection of emotional problems could have caused more difficulties. This could be one of the reasons why the prevalence of behavioural disorders in our study is consistent with the literature, while that of emotional disorders is lower. Our data about prevalence of psychiatric disorders in childhood generally confirm those reported in the literature [1, 6, 18, 20-26, 44, 53]. Prevalence of psychiatric disorders is 10.5%, with a male/female ratio of 2, due to the higher frequency of behavioural disorders in boys. Furthermore, ADHD is the most frequent diagnosis in our sample (5.6%), followed by separation anxiety disorder (1.9%) and overanxious disorder (1.2%). Our findings are comparable with the literature as far as Behavioural/impulse control disorders [23, 26] (CD, ADHD and Aggressiveness, with a significantly higher prevalence in males), phobic disorders [29], avoidance, sensitivity and lack of self-confidence [30], mental retardation and autism [34-36], are concerned. Conversely, anxiety disorders [28, 29], nocturnal enuresis [39], depressive disorders [31] and learning disorders [38] were lower than usually reported. We have analyzed three main risk factors groups: biological, socio-familiar and psychological ones. About the first group, children with organic diseases are more prone to develop a psychiatric disorder, even an anxiety disorder, a behavioural disorder, or a neurological one. Moreover, unlike other data reporting significant correlation between poverty status and developmental problems, or behavioural/conduct problems [18, 54], social class indicators (like living with other cohabitants, parents’ marital status, parents’ occupation, attending school full-time or regular time, etc.) was not found to be a significant risk factor for any mental disorder. Furthermore, we observed that having a psychiatric disorder is significantly associated with attending school full-time, possibly due to the fact that families having children that need special assistance (like those with neurological disorders), or that are extremely hyperactive (like those with a behavioural disorder), consider the full-time as a better choice that can help them taking care of their children. Obviously, having or having had a learning support teacher is significantly correlated with the presence of a mental disorder in childhood. About the last group, one of the most interesting finding is that the marital status of parents is correlated to the diagnoses. In fact, living with one only parent seems to be a strong correlate of psychopathology, according to other studies [6]. In particular, our data show that having mother or father divorced, not present, or dead is a risk factor for developing a psychiatric disorder, respectively a behavioural or an anxiety disorder. This result confirms the findings by Spencer et al. [26], that adverse family-environment variables (chronic family conflict, decreased family cohesion and exposure to parental psychopathology, particularly the maternal one) are more common in ADHD families compared with control families. Furthermore, two recent studies showed that living in a 2-parent household is associated with lower odds of experiencing special health care needs co-occurring with severe headaches, learning disabilities, behavioural/conduct problems, or emotional conditions in school-aged children [18, 54]. Behavioural disorders (CD, ADHD, Aggressiveness) in our sample show a significant higher prevalence in males. Eme [23] hypothesized that some neuropsychological impairments could mediate the risk for behavioural disorders, by causing deficits in executive and cognitive functioning, as deficits in the verbal domain, spatial and memory functions. These could lead to a more physically aggressive behaviour and may explain the higher prevalence of these disorders in male subjects [23]. Further long-term prospective studies are needed, in order to clarify the epidemiological and psychopathological relationships between childhood and adult mental disorders. AUTHORS' CONTRIBUTIONS CF and SP conceived of the study, and participated in its design and coordination and helped to draft the manuscript. CLS, VR and GC have been involved in drafting the manuscript or revising it critically for important intellectual content. CF performed the statistical analysis. All authors read and approved the final manuscript. REFERENCES [1] Costello EJ, Egger H, Angold A. 10-Year research update review: the epidemiology of child and adolescent psychiatric disorders: i. methods and public health burden J Am Acad Child Adolesc Psychiatry 2005; 44(10): 972-86. [2] Roberts RE, Attkisson CC, Rosenblatt A. Prevalence of psychopathology among children and adolescents Am J Psychiatry 1998; 155(6): 715-25. [3] Angold A, Costello EJ, Erkanli A. Comorbidity J Child Psychol Psychiatry 1999; 40: 57-87. [4] Kessler RC, Amminger GP, Aguilar-Gaxiola S, Alonso J, Lee S, Ustün TB. Age of onset of mental disorders: a review of recent literature Curr Opin Psychiatry 2007a; 20(4): 359-64. [5] Kessler RC, Angermeyer M, Anthony JC, et al. Lifetime prevalence and age-of-onset distributions of mental disorders in the world health organization's world mental health survey initiative World Psychiatry 2007b; 6(3): 168-76. [6] Frigerio A, Rucci P, Goodman R, et al. Prevalence and correlates of mental disorders among adolescents in Italy: the PrISMA study Eur Child Adolesc Psychiatry 2009; 18(4): 217-6. [7] Horwitz SM, Leaf PJ, Leventhal JM. Identification of psychosocial problems in pediatric primary care Arch Pediatr Adolesc Med 1998; 152: 367-71. [8] Gutterman EM, O’Brien JD, Young JG. Structured diagnostic interviews for children and adolescents J Am Acad Child Adolesc Psychiatry 1987; 26: 621-30. [9] Edelbrock C, Costello AJ. Structured psychiatric interviews for children In: Rutter M, Tuma AH, Lann IS, Eds. Assesment and Diagnosis in child Psychopatholgy. New York: Guilford Press 1988; pp. 87-112. [10] Richters JE. Depressed mothers and informants about their children: a critical review of the evidence of distortion Psychol Bull 1992. [11] Viñas Poch F, Jané Ballabriga MC, Canals Sans J, Esparó Hidalgo G, Ballespí Sol S, Doménech-Llaberia E. Assessment of psychopathology in preschool age children through the early childhood inventory-4 (ECI-4): agreement among parents and teachers Psicothema 2008; 20(3): 481-6. [12] Costello EJ, Angold A, Burns BJ. The great smoky mountains study of youth: goals, design, methods, and the prevalence of DSM-III-R disorders Arch Gen Psychiatry 1996; 53: 1129-36. [13] Fagot BI, Leve LD. Teacher ratings of externalizing behaviour at school entry for boys and girls: similar early predictors and different correlates J Child Psychol Psychiatry 1998; 39(4): 555-66. [14] Kraemer HC, Measelle JR, Ablow JC, Essex MJ, Boyce WT, Kupfer DJ. A new approach to integrating data from multiple informants in psychiatric assessment and research: mixing and matching contexts and perspectives Am J Psychiatry 2003; 160: 1566-77. [15] Hayden EP, Klein DN, Durbin CE. Parent reports and laboratory assessments of child temperament: a comparison of their associations with risk for depression and externalizing disorders J Psychopathol Behav Assess 2005; 27: 89-100. [16] Saudino KJ, Ronald A, Plomin R. The etiology of behavior problems in 7-year-old twins: substantial genetic influence and negligible shared environmental influence for parent ratings and ratings by same and different teachers J Abnorm Child Psychol 2005; 33: 113-30. [17] Jané MC, Canals J, Ballespí S, Viñas F, Esparó G, Domènech E. Parents and teachers reports of DSM-IV psychopathological symptoms in preschool children: differences between urban-rural Spanish areas Soc Psychiatry Psychiatr Epidemiol 2006; 41(5): 386-93. [18] Newacheck PW, Kim SE, Blumberg SJ, Rising JP. Who is at risk for special health care needs: findings from the national survey of children's health Pediatrics 2008; 122(2): 347-59. [19] McDonnell MA, Glod C. Prevalence of psychopathology in pre-school-age children J Child Adolesc Psychiatr Nurs 2003; 16(4): 141-52. [20] Anderson JC, Williams S, McGee R, Silva PA. DSM-III disorders in preadolescent children. Prevalence in a large sample from the general population Arch Gen Psychiatry 1987; 44(1): 69-76. [21] Fombonne E. The chartres study: I. Prevalence of psychiatric disorders among French school-age children Br J Psychiatry 1994; 164(1): 69-79. [22] Costello EJ, Foley DL, Angold A. 10-year research update review: the epidemiology of child and adolescent psychiatric disorders: II. Developmental epidemiology J Am Acad Child Adolesc Psychiatry 2006; 45(1): 8-25. [23] Eme RF. Sex differences in child-onset, life-course-persistent conduct disorder. A review of biological influences Clin Psychol Rev 2007; 27(5): 607-27. [24] Pastura G, Mattos P, Araújo AP. Prevalence of attention deficit hyperactivity disorder and its comorbidities in a sample of school-aged children Arq Neuropsiquiatr 2007; 65(4A): 1078-83. [25] Polanczyk G, Rohde LA. Epidemiology of attention-deficit/hyperactivity disorder across the lifespan Curr Opin Psychiatry 2007; 20(4): 386-92. [26] Spencer TJ, Biederman J, Mick E. Attention-deficit/hyperactivity disorder: diagnosis, lifespan, comorbidities, and neurobiology Ambul Pediatr 2007; 7(1 Suppl): 73-81. [27] Labellarte MJ, Ginsburg GS, Walkup JT, Riddle MA. The treatment of anxiety disorders in children and adolescents Biol Psychiatry 1999; 46(11): 1567-78. [28] Merikangas KR. Vulnerability factors for anxiety disorders in children and adolescents Child Adolesc Psychiatr Clin N Am 2005; 14: 649-79. [29] Cartwright-Hatton S, McNicol K, Doubleday E. Anxiety in a neglected population: prevalence of anxiety disorders in pre-adolescent children Clin Psychol Rev 2006; 26: 817-33. [30] Chavira DA, Stein MB. Childhood social anxiety disorder: from understanding to treatment Child Adolesc Psychiatr Clin N Am 2005; 14: 797-818. [31] Zalsman G, Brent DA, Weersing VR. Depressive Disorders in Childhood and Adolescence: An overview Epidemiology, Clinical Manifestation and Risk Factors Child Adolesc Psychiatric Clin N Am 2006; 15: 827-41. [32] Calles Jr JL. Depression in Children and Adolescents Prim Care 2007; 34(2): 243-58. [33] Bhasin TK, Brocksen S, Avchen RN, Van Naarden Braun K. Prevalence of four developmental disabilities among children aged 8 years--Metropolitan Atlanta Developmental Disabilities Surveillance Program, 1996 and 2000 MMWR Surveill Summ 2006; 55(1): 1-9. [34] Pratt HD, Greydanus DE. Intellectual Disability (Mental Retardation) in Children and Adolescents Prim Care 2007a; 34(2): 375-86. [35] Barbaresi WJ, Katusic SK, Voigt RG. Autism: a review of the state of the science for pediatric primary health care clinicians Arch Pediatr Adolesc Med 2006; 160(11): 1167-75. [36] Autism and Developmental Disabilities Monitoring Network Surveillance Year 2000 Principal Investigators; Centres for Disease Control and Prevention. Prevalence of autism spectrum disorders--autism and developmental disabilities monitoring network, six sites, United States, 2000 MMWR Surveill Summ 2007; 56(1): 1-11. [37] Williams E, Thomas K, Sidebotham H, Emond A. Prevalence and characteristics of autistic spectrum disorders in the ALSPAC cohort Dev Med Child Neurol 2008; 50(9): 672-7. [38] Pratt HD, Patel DR. Learning Disorders in Children and Adolescents Prim Care 2007b; 34(2): 361-74. [39] Devlin JB. Prevalence and risk factors for childhood nocturnal enuresis Isr Med J 1991; 84(4): 118-20. [40] Al-Ghamdy YS, Qureshi NA, Abdelgadir MH. Childhood enuresis. Epidemiology, pathophysiology and management Saudi Med J 2000; 21(2): 138-44. [41] American Psychiatric Association. Diagnostic and statistical manual of mental disorders. 4th ed. Washington DC: American Psychiatric Press 1994. [42] Gadow KD, Sprafkin J, Nolan EE. DSM-IV Symptoms in community and clinic preschool children J Am Acad Child Adolesc Psychiatry 2001; 40(12): 1383-92. [43] Remschmidt H, Theisen FM. Schizophrenia and related disorders in children and adolescents J Neural Transm Suppl 2005; 69: 121-41. [44] Ciechomski L, Blashki G, Tonge B. Common psychological disorders in childhood Aust Fam Physician 2004; 33(12): 997-1003. [45] Rutter M, Kim-Cohen J, Maughan B. Continuities and discontinuities in psychopathology between childhood and adult life J Child Psychol Psychiatry 2006; 47(3-4): 276-95. [46] Edelbrock C, Costello AJ, Dulcan MK, Kalas R, Conover NC. Age differences in the reliability of the psychiatric interview or the child Child Dev 1985; 56: 265-75. [47] Ostrander R, Crystal DS, August G. Attention deficit-hyperactivity disorder, depression, and self- and other-assessments of social competence: a developmental study J Abnorm Child Psychol 2006; 34(6): 773-87. [48] Edelbrock C, Costello AJ. Convergence between statistically derived behaviour problem syndromes and child psychiatric diagnoses J Abnorm Child Psychol 1988; 16(2): 219-31. [49] Ezpeleta L, de la Osa N, Doménech JM, Navarro JB, Losilla JM, Júdez J. Diagnostic agreement between clinicians and the Diagnostic Interview for Children and Adolescents--DICA-R--in an outpatient sample J Child Psychol Psychiatry 1997; 38(4): 431-0. [50] Jellinek MS, Murphy JM, Little M, Pagano ME, Comer DM, Kelleher KJ. Use of the pediatric symptom checklist to screen for psychosocial problems in pediatric primary care: a national feasibility study Arch Pediatr Adolesc Med 1999; 153(3): 254-60. [51] Riekert KA, Stancin T, Palermo TM, Drotar D. A psychological behavioral screening service: use, feasibility, and impact in a primary care setting J Pediatr Psychol 1999; 24(5): 405-14. [52] Gardner W, Kelleher KJ, Pajer KA, Campo JV. Primary care clinicians' use of standardized psychiatric diagnoses Child Care Health Dev 2004; 30(5): 401-12. [53] Canino G, Shrout PE, Rubio-Stipec M, et al. The DSM-IV rates of child and adolescent disorders in Puerto Rico: prevalence, correlates, service use, and the effects of impairment Arch Gen Psychiatry 2004; 61(1): 85-93. [54] Hölling H, Schlack R. Psychosocial risk and protective factors for mental health in childhood and adolescence - results from The German Health Interview and Examination Survey for Children and Adolescents (KIGGS) Gesundheitswesen 2008; 70(3): 154-63.
random random:hexadecimal Return random hexadecimal characters in given length random:number Return a random number from given min and max inclusive random:numeric_string Return a random numeric string (string containing only numbers) with given length random:paragraphs Return an array of random lorem ipsum paragraphs random:sentences Return an array of random lorem ipsum sentences random:session_id Return a random session id random:short_uuid Shorter UUID using base 64 encoding random:site_deploy_name Generate a random site deploy name to be used in the subdomain random:text Generate random text (string) using given length and keyspace random:print Randomly prints one of the elements of given array of $items random:uuid Generate a new random universally unique ID also known as UUID or GUID. random:words Return an array of random lorem ipsum words random:get_random_rgb_color Generate random RGB colors. random:bytes Generates cryptographically secure pseudo-random bytes. Generates an arbitrary length string of cryptographic random bytes that are suitable for cryptographic use, such as when generating salts, keys or initialization vectors. Copyright ©2013-2022 SunSed®. All rights reserved.
Learn5 New Features in PHP 7 Treehouse writes on January 27, 2016 I’m very happy to introduce you to the first MAJOR release of PHP in over a decade. The PHP community is VERY excited to welcome this latest release. But that doesn’t mean PHP has been stagnant all this time. On the contrary, minor releases of PHP 5 brought many exciting features to PHP, including support of Object-Oriented programming and many features associated with that. So, first off, why 7 and not 6? Let’s just say, unicode didn’t go so well. As with many projects, requirements were not well defined and people couldn’t agree on things, so the project ground to a halt. Besides unicode, for encoding special and international characters, almost all the features being discussed for PHP 6 were eventually implemented in PHP 5.3 and later, so we really didn’t miss anything else. Through it all, many things were learned and a new process for feature requests was put in place. When the feature set for a major release was accepted, it was decided, to avoid confusion with a dead project, and to skip to version 7 for the latest release. So what makes PHP 7 so special? What does this mean for you as a developer? We’ll take a look at the top 5 features here. If you’d like a deeper dive,  check out my workshop, Introduction to PHP7, or my course, Build a Basic PHP Website.  1. SPEED! The developers worked very hard to refactor the PHP codebase in order to reduce memory consumption and increase performance. And they certainly succeeded. Benchmarks for PHP 7 consistently show speeds twice as fast as PHP 5.6 and many times even faster! Although these results are not guaranteed for your project, the benchmarks were tested against major projects, Drupal and WordPress, so these numbers don’t come from abstract performance tests. Image source  With statistics that show 25% of the web being run on WordPress, this is a great thing for everyone. 2. Type Declarations Type declarations simply means specifying which type of variable is being set instead of allowing PHP to set this automatically. PHP is considered to be a weak typed language. In essence, this means that PHP does not require you to declare data types. Variables still have data types associated with them but you can do radical things like adding a string to an integer without resulting in an error. Type declarations can help you define what should occur so that you get the expected results. This can also make your code easier to read. We’ll look at some specific examples shortly. Since PHP 5, you can use type hinting to specify the expected data type of an argument in a function declaration, but only in the declaration. When you call the function, PHP will check whether or not the arguments are of the specified type. If not, the run-time will raise an error and execution will be halted. Besides only being used in function declarations, we were also limited to basically 2 types. A class name or an array.  Here’s an example: function enroll(Student $student, array $classes) { foreach ($classes as $class) { echo "Enrolling " . $student->name . " in " . $class; } } enroll("name",array("class 1", "class 2")); // Catchable fatal error: Argument 1 passed to enroll() must be an instance of Student, string given enroll($student,"class"); // Catchable fatal error: Argument 2 passed to enroll() must be of the type array, string given enroll($student, array("class 1", "class 2")); If we were to create a function for enrolling students, we could require that the first argument be an object of the student class and the second argument to be an array of classes. If we tried to pass just the name instead of an object we would get a fatal error. If we were to pass a single class instead of an array, we would also get an error. We are required to pass a student object and an array. function stringTest(string $string) {     echo $string; } stringTest("definitely a string"); If we were to try to check for a scalar variable such as a string, PHP 5 expects it to be an object of the class string, not the variable type string. This means you’ll get a Fatal error: Argument 1 passed to stringTest() must be an instance of string, string given. Scalar Type Hints With PHP 7 we now have added Scalar types.  Specifically: int, float, string, and bool. By adding scalar type hints and enabling strict requirements, it is hoped that more correct and self-documenting PHP programs can be written. It also gives you more control over your code and can make the code easier to read. By default, scalar type-declarations are non-strict, which means they will attempt to change the original type to match the type specified by the type-declaration. In other words, if you pass a string that starts with a number into a function that requires a float, it will grab the number from the beginning and remove everything else. Passing a float into a function that requires an int will become int(1). Strict Example function getTotal(float $a, float $b) { return $a + $b; } getTotal(2, "1 week"); // int(2) changed to float(2.0) and string “1 week” changed to float(1.0) but you will get a “Notice: A non well formed numeric value encountered” //returns float(3) getTotal(2.8, "3.2"); // string "3.2" changed to float(3.2) no notice //returns float(6) getTotal(2.5, 1); // int(1) changed to float(1.0) //returns float(3.5) The getTotal function receives 2 floats and adds them together while it returns the sum. Without strict types turned on, PHP attempts to cast, or change, these arguments to match the type specified in the function. So when we call getTotal with non-strict types using an int of 2 and a string of “1 week”, PHP converts these to floats. The first argument would be changed to 2.0 and the second argument would be changed to 1.0. However, you will get a Notice: because this is not a well formed numeric value. It will then return a value of 3. Which would be completely wrong if we were trying to add days. When we call getTotal with the float 2.8 and the string of “3.2”, PHP converts the string into the float 3.2. with no notice because it was a smooth conversion. It then returns a value of 6 When we call getTotal with non-strict types using the float 2.5 and the integer 1. The integer gets converted to the float 1.0 and the function returns 3.5 Strict Example Additionally, PHP 7 gives us the opportunity to enable strict mode on a file by file basis. We do this by declare(strict_types=1); at the top of any given file. This MUST be the very first line, even before namespaces. Declaring strict typing will ensure that any function calls made in that file strictly adhere to the types specified. Strict is determined by the file in which the call to a function is made, not the file in which the function is defined. If a type-declaration mismatch occurs, a “Fatal Error” is thrown and we know that something is not functioning as desired, instead of allowing PHP to simply guess at what we want to happen, which can cause seemingly random and hard to diagnose issues. We’ll look at catching and handling errors in the next section. But for now, let’s look at an example using strict types turned on. declare(strict_types=1); function getTotal(float $a, float $b) {     return $a + $b; } getTotal(2, "1 week"); // Fatal error: Uncaught TypeError: Argument 2 passed to getTotal() must be of the type float, string given getTotal(2.8,  "3.2"); // Fatal error: Uncaught TypeError: Argument 2 passed to getTotal() must be of the type float, string given getTotal(2.5, 1); // int(1) change to float(1.0) //returns float(3.5) When the declare strict_type has been turned on, the first two calls that pass a string will produce a Fatal error: Uncaught TypeError: Argument 2 passed to getTotal() must be of the type float, string given. The exception to strict typing with shown in the third call. If you pass an int as an argument that is looking for a float, PHP will perform what is called “widening”, by adding .0 to the end and the function returns 3.5 Return Type Declarations PHP 7 also supports Return Type Declarations which support all the same types as arguments. To specify the return type, we add a colon and then the type right before the opening curly bracket. function getTotal(float $a, float $b) : float { If we specify the return type of float, it will work exactly like it has been in the previous 2 examples since the type being returned was already a float. Adding the return type allows you to to be sure your function returns what is expected as well as making it easy to see upfront how the function works. Non-strict int If we specify the return type as int without strict types set, everything will work the same as it did without a return type, the only difference is that it will force the return to be an int. In the third call the return value will truncate to 3 because the floating point will be dropped function getTotal(float $a, float $b) : int {     return $a + $b; } getTotal(2, "1 week"); // changes int(2) to float(2.0) & string(“1 more”) to float(1.0) // returns int(3); getTotal(2.8, "3.2"); // changes string "3.2" to float(3.2) // returns int(6) getTotal(2.5, 1); // changes int(1) to float(1.0) // returns int(3) Strict int If we turn strict types on, we’ll get a Fatal error: Uncaught TypeError: Return value of getTotal() must be of the type integer, float returned. In this case we’ll need to specifically cast our return value as an int. This will then return the truncated value. declare(strict_types=1); function getTotal(float $a, float $b) : int { // return $a + $b; // Fatal error: Uncaught TypeError: Return value of getTotal() must be of the type integer, float returned return (int)($a + $b); // truncate float like non-strict } getTotal(2.5, 1); // changes int(1) to float(1.0) and returns int(3) Why? The new Type Declarations can make code easier to read and forces things to be used in the way they were intended. Some people prefer to use unit testing to check for intended use instead. Having automated tests for your code is highly recommended, but you can use both unit tests and Type Declarations. Either way, PHP does not require you to declare types but it can definitely make code easier to read. You can see right at the start of a function, what is required and what is returned. 3. Error Handling The next feature we going to cover are the changes to Error Handling. Handling fatal errors in the past has been next to impossible in PHP. A fatal error would not invoke the error handler and would simply stop your script. On a production server, this usually means showing a blank white screen, which confuses the user and causes your credibility to drop. It can also cause issues with resources that were never closed properly and are still in use or even locked. In PHP 7, an exception will be thrown when a fatal and recoverable error occurs, rather than just stopping the script. Fatal errors still exist for certain conditions, such as running out of memory, and still behave as before by immediately stopping the script. An uncaught exception will also continue to be a fatal error in PHP 7. This means if an exception thrown from an error that was fatal in PHP 5 goes uncaught, it will still be a fatal error in PHP 7. I want to point out that other types of errors such as warnings and notices remain unchanged in PHP 7. Only fatal and recoverable errors throw exceptions. In PHP 7, Error and Exception both implement the new Throwable class. What that means is that they basically work the same way. And also, you can now use Throwable in try/catch blocks to catch both Exception and Error objects. Remember that it is better practice to catch more specific exception classes and handle each accordingly. However, some situations warrant catching any exception (such as for logging or framework error handling). In PHP 7, these catch-all blocks should catch Throwable instead of Exception. New Hierarchy    |- Exception implements Throwable        |- …    |- Error implements Throwable        |- TypeError extends Error        |- ParseError extends Error        |- ArithmeticError extends Error            |- DivisionByZeroError extends ArithmeticError        |- AssertionError extends Error The Throwable interface is implemented by both Exception and Error. Under Error, we now have some more specific error. TypeError, ParseError, A couple arithmetic errors and an AssertionError. Throwable Interface If Throwable was defined in PHP 7 code, it would look like this interface Throwable {    public function getMessage(): string;    public function getCode(): int;    public function getFile(): string;    public function getLine(): int;    public function getTrace(): array;    public function getTraceAsString(): string;    public function getPrevious(): Throwable;    public function __toString(): string; } If you’ve worked with Exceptions at all, this interface should look familiar. Throwable specifies methods nearly identical to those of Exception. The only difference is that Throwable::getPrevious() can return any instance of Throwable instead of just an Exception. Here’s what a simple catch-all block looks like: try {    // Code that may throw an Exception or Error. } catch (Throwable $t) {    // Executed only in PHP 7, will not match in PHP 5 } catch (Exception $e) {    // Executed only in PHP 5, will not be reached in PHP 7 } To catch any exception in PHP 5.x and 7 with the same code, you would need to add a catch block for Exception AFTER catching Throwable first. Once PHP 5.x support is no longer needed, the block catching Exception can be removed. Virtually all errors in PHP 5 that were fatal, now throw instances of Error in PHP 7. Type Errors A TypeError instance is thrown when a function argument or return value does not match a type declaration. In this function, we’ve specified that the argument should be an int, but we’re passing in strings that can’t even be converted to ints. So the code is going to throw a TypeError. function add(int $left, int $right) {     return $left + $right; } try {     echo add('left','right'); } catch (\TypeError $e) {     // Log error and end gracefully     echo $e->getMessage(), "\n";     // Argument 1 passed to add() must be of the type integer, string given } This could be used for adding shipping and handling to a shopping cart. If we passed a string with the shipping carrier name, instead of the shipping cost, our final total would be wrong and we would chance losing money on the sale. Parse Errors A ParseError is thrown when an included/required file or eval()’d code contains a syntax error. In the first try we’ll get a ParseError because we called the undefined function var_dup instead of var_dump. In the second try, we’ll get a ParseError because the required file has a syntax error. try {     $result = eval("var_dup(1);"); } catch (\Error $e) {     echo $e->getMessage(), "\n";     //Call to undefined function var_dup() } try {     require 'file-with-parse-error.php'; } catch (ParseError $e) {     echo $e->getMessage(), "\n";     //syntax error, unexpected end of file, expecting ',' or ';' } Let’s say we check if a user is logged in, and if so, we want to include a file that contains a set of navigation links, or a special offer. If there is an issue with that include file, catching the ParseError will allow us to notify someone that that file needs to be fixed. Without catching the ParseError, the user may not even know they are missing something. 4. New Operators Spaceship Operator PHP 7 also brings us some new operators. The first one we’re going to explore is the spaceship operator. With a name like that, who doesn’t want to use it? The spaceship operator, or Combined Comparison Operator, is a nice addition to the language, complementing the greater-than and less-than operators. Spaceship Operator < = > $compare = 2 <=> 1 2 < 1? return -1 2 = 1? return 0 2 > 1? return 1 The spaceship operator is put together using three individual operators, less than, equal, and greater than. Essentially what it does is check the each operator individually. First, less than. If the value on the left is less than the value on the right, the spaceship operator will return -1. If not, it will move on to test if the value on the left is EQUAL to the value on the right. If so, it will return 0. If not it will move on to the final test. If the value on the left is GREATER THAN the value on the right. Which, if the other 2 haven’t passed, this one must be true. And it will return 1. The most common usage for this operator is in sorting. Null Coalesce Operator Another new operator, the Null Coalesce Operator, is effectively the fabled if-set-or. It will return the left operand if it is not NULL, otherwise it will return the right. The important thing is that it will not raise a notice if the left operand is a non-existent variable. $name = $firstName ??  "Guest"; For example, name equals the variable firstName, double question marks, the string “Guest”. If the variable firstName is set and is not null, it will assign that value to the variable name. Or else it will assign “Guest” the the variable name. Before PHP 7, you could write something like if (!empty($firstName)) $name = $firstName; else $name = "Guest"; What makes this even more powerful, is that you can stack these! This operation will check each item from left to right and when if finds one that is not null it will use that value. $name = $firstName ?? $username ?? $placeholder ?? “Guest”; This operator looks explicitly for null or does not exist. It will pick up an empty string. 5. Easy User-land CSPRNG What is Easy User-land CSPRNG? User-land refers to an application space that is external to the kernel and is protected by privilege separation, API for an easy to use and reliable Cryptographically Secure PseudoRandom Number Generator in PHP. Essentially secure way of generating random data. There are random number generators in PHP, rand() for instance, but none of the options in version 5 are very secure. In PHP 7, they put together a system interface to the operating system’s random number generator. Because we can now use the operating system’s random number generator, if that gets hacked we have bigger problems. It probably means your entire system is compromised and there is a flaw in the operating system itself. Secure random numbers are especially useful when generating random passwords or password salt. What does this look like for you as a developer? You now have 2 new functions to use: random_int and random_bytes. Random Bytes When using random_bytes, you supply a single argument, length, which is the length of the random string that should be returned in bytes. random_bytes then returns a string containing the requested number of cryptographically secure random bytes. If we combine this with something like bin2hex, we can get the hexadecimal representation. $bytes = random_bytes(5); // length in bytes var_dump(bin2hex($bytes)); // output similar to: string(10) "385e33f741" These are bytes not integers. If you are looking to return a random number, or integer, you should use the random_int function. Random Int When using random_int you supply 2 arguments, min and max. This is the minimum and maximum numbers you want to use. For example: random_int(1,20); Would return a random number between 1 and 20, including the possibility of 1 and 20. *If you are using the rand function for anything even remotely secure, you’ll want to change the rand function to random_int. Conclusion There are quite a few other features added in PHP 7, like unicode support for emoji and international characters. echo "\u{1F60D}"; // outputs ? But this should give you a taste of what’s changing in PHP. Another big area that could cause trouble, are features that have been removed. This should really only be an issue if you’re working with an older code base, because the features that have been removed are primarily ones that have been deprecated for a long time. If you’ve been putting off making these necessary changes, the huge advantage in speed with PHP 7 should help convince you, or management, to take the time needed to update your code. For more on deprecated feature check out the php wiki. If you’re ready to start playing around with PHP7, check out my workshops for Installing a Local Development Environment for MAC or Windows. Get Involved It’s an exciting time to be involved with PHP! Not only for the language itself, but also the community. If you haven’t jumped on board with the PHP community yet, I’d encourage you to start today. 1. Find your local users group: http://php.ug 1. WordPress http://wordpress.meetup.com/ 2. Drupal https://groups.drupal.org/ 2. Start Your Own 3. Join the online community 1. NomadPHP http://nomadphp.com 2. Twitter 3. IRC 4. Come find me at a conference!   Interested in learning more with Treehouse? Sign up for a Free Trial and get started today! 31 Responses to “5 New Features in PHP 7” 1. Some more features…… Simple Interpreted Faster Open Source Platform Independent Case Sensitive 2. Great article. These new features of php7 are awesome. 3. Great and unique article than others on google search result, Enjoyed reading. Thanks a ton. 4. You’ve explained almost every key features introduced in PHP 7, and that’s great. However, PHP 7 also empowers the developers to apply OOP concept and to use anonymous classes. 5. Greatly enjoyed this post :), keep up thhe great authorship and I’ll kep coming back for more. Will be sharing thuis with my instagram followers and I’m sure they’ll enjoy it as well! 6. all of these features have been in most other modern languages such as c#, type- or even ecmascript for years if not decades. 7. I was excited to find this website. I need to to thank you for your time for this fantastic read!! I definitely enjoyed every little bit of it and I have you book marked to check out new information on your website. 8. Maybe I’ve misunderstood these PHP codes. I thought ternary was like this: echo ($member_logged_in ? ‘Yes’ : ‘No’) So it would validate to to yes and if not yes then it would choose no. But with coalesce operator it only checks for null value. The above as an example wouldn’t be the same logic with $member_logged_in ?? ‘Yes’ ?? ‘No’ Right? • GuapoMemo on May 16, 2017 at 11:38 am said: No, the coalesce null operator is not equivalent to the ternary OR. The coalesce NULL will “return” the first non-null value that it finds. For example $one = NULL; $two = ‘2’; $number = $one ?? $two ?? ‘NAN’. $number will be equal to ‘2’; If variable $two would happen to be NULL, then $number would be assigned ‘NAN’ 9. I completely forgot about new operator . Thanks Alena for the detailed article! 10. Very good article. Congratulation! And yes, the speed of PHP 7 is trully amazing… 🙂 I wish you the best! 11. “if (!empty($firstName)) $name = $firstName; else $name = “Guest”;” This will be correct for ?: operator. But for ?? maybe you should use more exact: if ($firstName !== null) … 12. pretty cool!! waiting an improvement for the speed. 13. Yes! Finally someone writes about clash of clans cheats. 14. Mark Wilston on July 21, 2016 at 4:06 am said: PHP 7 has come out new with features which is not present in the previous one like speed, space which allows web developers to create sites that provide interesting and engaging interactive features that still respond to user input as quickly as modern web users have come to expect. With 64 bit support means that it will give both natives the support of large files and 64-bit integers, just check this :http://goo.gl/ouQcJN 15. Arvind Mishra on July 15, 2016 at 12:49 am said: Great tutorial!!! Like it most and understand the features of PHP7 in just an hours. 16. I think the first example of Strict mode is actually Weak mode. 17. Good to know the great features about PHP7. There is very interesting & helpful to all of us. Awesome blog..Keep it up the great work… 18. A game villain should be rotten enough that the player generates genuine passion and satisfaction from defeating him or her. When Blizxzard introduced Molten Core, the game’s first 40-man raid, they also introduced tiered raid gear. Make sure your emphasis on your career and network to establish your expertise in line with your future career moves. 19. C’est pourquoi nous avons décidé de créer notre propre générateur de gemmes pour clash of clans, nommé tout simplement le : Cheat Clash of Clans Hack Français. 20. Hello there! I could have sworn I’ve visited this web site before but after browsing through many of the posts I realized it’s new to me. Regardless, I’m definitely happy I came across it and I’ll be bookmarking it and checking back regularly! 21. There is definately a lot to find out about this issue. I really like all the points you’ve made. 22. Can you tell us more about this? I’d love to find out some additional information. 23. function enroll(Student $student, array $classes) { foreach ($classes as $class) { echo “Enrolling ” . $student->name . ” in ” . $class; } } There is no $school variable. 24. This is a great advancement for PHP! Would you guys be offering PHP 7 specific tutorials? Leave a Reply You must be logged in to post a comment. Want to learn more about PHP? Learn how to create dynamic websites using the back-end programming language, PHP. Learn more
Seize the opportunity to gain new skills and reshape your career! Choose a free learning path and get valuable insights from first-rate courses Code has been added to clipboard! Understanding and Using jQuery Event Methods: The Complete Cheat Sheet Reading time 5 min Published Jun 5, 2019 Updated Oct 1, 2019 Learning any language begins with the very basics, and jQuery is no exception. One of the first concepts you should have grasped by now is jQuery events. Simply put, any user interaction can be called an event. In this chapter, we will be covering various jQuery event methods you can use. They will be grouped into categories according to the type of events they are used on. These methods are mostly used to add, remove, or modify jQuery event handlers. jQuery Event Methods: Main Tips • jQuery offers a bunch of special methods you may use when handling various user interaction events. • Most of them make jQuery add event listeners, or handlers, to a certain event. • jQuery event methods are usually categorized by events they are directly related to. Theory is great, but we recommend digging deeper! Methods Explained First, we will introduce you to all the jQuery event methods used to set, remove and manipulate event handlers. See the table below and memorize the functions: Method Description .bind() Adds a jQuery event handler to fire when an event of a defined type is sent to the element. .delegate() Adds a jQuery event handler (or multiple) to fire when an event of a defined type is/are sent to a descendant element matching selector. jQuery.proxy() Takes an existing function and returns a new one that will always have a particular context. .on() Attaches jQuery event handlers to elements selected. .off() Makes jQuery remove event handlers added using the on(). .one() Attaches 1≤ jQuery event handlers to elements. Run once per element at most. .trigger() Executes all handlers and behaviors attached to elements for the given event type. .triggerHandler() Executes all handlers attached to elements for an event. .unbind() Makes jQuery remove event handler already attached. .undelegate() Removes the event handler bindings on the element made using delegate(). .on() is probably the most common method - see how it works: Example $("div").on("click", function() { $(this).css("background-color", "red"); }); Most of the other functions are grouped according to the events they are related to. For example, the jQuery mouse event methods are used to work with mouse events, such as clicks or hovers: Method Triggers or adds a jQuery event handler to fire when .click() The element is clicked. .dblclick() The element is double-clicked. .hover() The mouse pointer moves in and out of the elements. Might add 1 or 2. .mousedown() The mouse button is pressed inside element. .mouseenter() The mouse moves into element. .mouseleave() The mouse moves out of element. .mousemove() The mouse pointer moves inside element. .mouseout() The mouse pointer moves out of element. .mouseover() The mouse pointer moves into element. .mouseup() The mouse button is released inside element. See a simple code example of a click event below: Example $(document).ready(() => { $("p").click(() => { alert("The paragraph was clicked!"); }); }); Note: Previously, .toggle() could have been used to add 2≤ handlers to selected elements, to be executed on alternate clicks. However, it was deprecated in v1.8. Now, keyboard events relate to the actions users cause by using the keyboard of their device, like pushing a button. There are only three of them, so they'll be easy to remember: • .keydown() triggers or adds an event handler to fire when a key is pressed. • .keypress() triggers or adds an event handler to fire when a keystroke occurs. • .keyup() triggers or adds an event handler to fire when a key is released. See the usage of .keypress() in a simple code example below: Example var i = 0; $("input").keypress(() => { $("p").text(i += 1); }); Note: For these methods to work, the defined element must have a keyboard focus. There are seven jQuery event methods specially meant for handling the form elements’ actions. See them in the table below: Method Triggers or adds a jQuery event handler to fire when. .blur() The element loses keyboard focus. .change() The value of the element changes. .focus() The element gains keyboard focus. .focusin() The element (or its descendant) gains keyboard focus. .focusout() The element (or its descendant) loses keyboard focus. .select() Text is selected in element. .submit() The form element is submitted. See how a simple .focusin() function works: Example $("input").focusin(function() { $(this).css("background-color", "red"); }); The last group of jQuery event methods is meant to be used with document and window events. Currently, only three of them are relevant, as a few have been deprecated by v1.8. Let's first review the ones we might use currently: • .ready() adds an event handler to fire when the DOM finishes loading. • .resize() triggers or adds an event handler to fire when the size of the element is changed. • .scroll() triggers or adds an event handler to fire when the scroll position of the window or element is changed. The deprecated ones include: • .error(), which was used to add an event handler to fire when the DOM was not loaded properly. • .load(), which was used to add an event handler to fire when the HTML element finished loading. • .unload(), which was used to add an event handler to fire when the user navigated away from the page. jQuery Event Methods: Summary • Handling jQuery events can be simplified by using special methods. Using them, you can easily make jQuery add event listeners to defined events. • jQuery event methods are easy to work with, as they are categorized by the type of events they relate to.
Skip to content Advertisement Cardiovascular Diabetology Open Access Effects of some anti-diabetic and cardioprotective agents on proliferation and apoptosis of human coronary artery endothelial cells Cardiovascular Diabetology201211:27 https://doi.org/10.1186/1475-2840-11-27 Received: 8 March 2012 Accepted: 21 March 2012 Published: 21 March 2012 Abstract Background The leading cause of death for patients suffering from diabetes is macrovascular disease. Endothelial dysfunction is often observed in type 2 diabetic patients and it is considered to be an important early event in the pathogenesis of atherogenesis and cardiovascular disease. Many drugs are clinically applied to treat diabetic patients. However, little is known whether these agents directly interfere with endothelial cell proliferation and apoptosis. This study therefore aimed to investigate how anti-diabetic and cardioprotective agents affect human coronary artery endothelial cells (HCAECs). Methods The effect of anti-diabetic and cardioprotective agents on HCAEC viability, proliferation and apoptosis was studied. Viability was assessed using Trypan blue exclusion; proliferation in 5 mM and 11 mM of glucose was analyzed using [3H]thymidine incorporation. Lipoapoptosis of the cells was investigated by determining caspase-3 activity and the subsequent DNA fragmentation after incubation with the free fatty acid palmitate, mimicking diabetic lipotoxicity. Results Our data show that insulin, metformin, BLX-1002, and rosuvastatin improved HCAEC viability and they could also significantly increase cell proliferation in low glucose. The proliferative effect of insulin and BLX-1002 was also evident at 11 mM of glucose. In addition, insulin, metformin, BLX-1002, pioglitazone, and candesartan significantly decreased the caspase-3 activity and the subsequent DNA fragmentation evoked by palmitate, suggesting a protective effect of the drugs against lipoapoptosis. Conclusion Our results suggest that the anti-diabetic and cardioprotective agents mentioned above have direct and beneficial effects on endothelial cell viability, regeneration and apoptosis. This may add yet another valuable property to their therapeutic effect, increasing their clinical utility in type 2 diabetic patients in whom endothelial dysfunction is a prominent feature that adversely affect their survival. Keywords DiabetesEndotheliumCoronary artery diseaseInsulinStatinMetforminLipidsAT1-receptor antagonistPeroxisome proliferator-activated receptor gamma agonist Background The prevalence of diabetes among adults worldwide was estimated in 2010 to 6.4%, thus affecting 285 million adults. This figure is predicted to rise to 7.7%, in numbers 439 million, by 2030 [1]. In patients with diabetes, the major cause of death is macrovascular disease [2, 3], and in individuals with type 2 diabetes, the main etiology for up to 75% of the mortality is atherosclerotic cardiovascular disease [4]. In contrast to microangiopathies (e.g. nephropathy and retinopathy), where the causal relation to hyperglycemia is well supported, the link between hyperglycemia and macroangiopathy is uncertain, at least in terms of the possibility of reducing macrovascular morbidity solely by reducing hyperglycemia. Most patients with diabetes are consequently being treated with one or more antidiabetic drugs, a lipid-lowering statin and an ACE inhibitor or angiotensin receptor antagonist for hypertension and/or albuminuria. The endothelium is composed of a monolayer of cells that line the lumen of blood vessels and form a physical barrier between circulating blood and the vascular smooth muscle cells. The endothelium plays a very important role in maintenance of vascular integrity by protecting the vessels from activation of clotting and proinflammatory factors. It also participates in the regulation of blood flow and blood pressure [5]. Loss of physiological features of the endothelium, such as its preference to support vasodilatation, fibrinolysis and antiaggregation, is referred to as endothelial dysfunction [6], which has been observed in diabetes (type 1 and type 2), in obesity and in patients with insulin resistance. In fact, the extent of endothelium-dependent vasodilatation correlates in obese and insulin resistant subjects with their individual insulin sensitivity [7, 8]. Endothelial dysfunction has thus emerged as an important early target for preventing atherosclerosis and cardiovascular disease [9]. Hyperglycemia and hyperlipidemia are important factors in the development of endothelial dysfunction. Free fatty acids (FFAs), formed during lipolysis from triglycerides, and hyperglycemia are known to impair the endothelial-dependent vasodilatation [10, 11]. Increased plasma levels of FFAs and glucose are characteristic features in patients with type-2 diabetes. Both factors are known induce apoptosis of endothelial cells and endothelial cell death is believed to be involved in, and contribute to, endothelial dysfunction and atherosclerosis [1214]. Current anti-diabetes drugs are mainly aimed to correct hyperglycemia by promoting pancreatic β-cell insulin secretion, increasing insulin sensitivity, or reducing intestinal glucose uptake and hepatic gluconeogenesis. Apart from insulin, glimepiride, a third generation sulfonylurea [15], pioglitazone, a peroxisome proliferator-activated receptor gamma (PPAR-γ) agonist, and a member of the thiazolidinedione family (TZD) [16], and metformin, a biguanide, are used for treatment of type 2 diabetes [9]. Candesartan, an angiotensin II receptor antagonist, and rosuvastatin, a competitive inhibitor of the enzyme HMG-CoA reductase, are used for management of hypertension and hyperlipidemia, respectively [17, 18]. In addition, we have also studied BLX-1002, a novel thiazolidinedione with no structural resemblance to other TZDs [19], which does not appear to affect PPARs. There is evidence that BLX-1002 can improve hyperglycemia in diabetic animal models without the body weight gain typically associated with PPARγ-mediated adipocyte differentiation [19, 20]. Not much is known about BLX-1002, but it has been shown to potentiate insulin secretion from islets in a phosphatidylinositol 3-kinase (PI3K)-dependent manner. BLX-1002 also activates AMP-activated protein kinase (AMPK) [20] perhaps through its ability to inhibit the mitochondrial complex 1 [19, 21]. Compared to studies on the actions of the above drugs on glycemia, little has been done regarding their direct actions on proliferation and apoptosis of human coronary artery endothelial cells (HCAECs). Understanding the effects of these agents is important as endothelial growth and apoptosis are involved in endothelial repair and function. Disruption of the intimal layer subjects the arterial wall to greater risk for macrovascular disease [14], the most common etiology for morbidity and mortality in diabetic patients [15]. Therefore, the aim of our study was to investigate the effects of drugs used in treatment of diabetic patients on proliferation and lipotoxicity-induced apoptosis in HCAECs. Methods Materials Clonetics™ HCAECs, culture medium EGM-2 MV and cell culture supplements were purchased from Lonza (Basel, Switzerland). Insulin lispro was from Eli Lilly and Company (Indianapolis, IN), C-peptide was generously provided by Prof. John Wahren (Creative Peptides, Inc., Stockholm, Sweden), and pioglitazone was graciously donated by Takeda Pharmaceuticals North America, Inc. (Lincolnshire, IL). Metformin, glimepiride, sodium palmitate, and bovine serum albumin (BSA) (fatty acid free) were purchased from Sigma-Aldrich (St. Louis, MO). Rosuvastatin and candesartan were kindly given by Astra-Zeneca (London, United Kingdom). BLX-1002 was graciously donated by Bexel Pharmaceuticals, Inc. (Union City, CA). [3H]thymidine was bought from Amersham Biosciences (Piscataway, NJ), EnzChek® caspase-3 activity assay kits from Molecular Probes®, Life Technologies (Carlsbad, CA), DNA fragmentation ELISA kits from Roche Diagnostics (Mannheim, Germany), and DC™ Protein Assay from BioRad Laboratories (Hercules, CA). Cell culture HCAECs, isolated from normal human coronary arteries [22], were grown in EGM-2 MV medium supplemented with hydrocortisone, human epidermal growth factor (hEGF), 5% fetal bovine serum (FBS), vascular endothelial growth factor (VEGF), human fibroblast growth factor (hFGF)-B, R3-insulin-like growth factor (IGF)-1, ascorbic acid and gentamicin/amphotericin-B at 37°C in a humidified (5% CO2, 95% air) atmosphere as recommended by the supplier. Passage 5-12 were used in the study for evaluation of cell viability, [3H]thymidine incorporation rates, DNA fragmentation ELISA and caspase-3 activity assays. Confluent cultures were detached by trypsination and seeded onto tissue culture dishes and grown until 80-90% confluence. Cells were incubated overnight in serum-deficient EGM medium containing 0.5% FBS and 2 mM L-glutamine prior to 24 or 48 h incubation in the presence or absence of the desired agents. The use of the cells was approved by the Research Ethics Committee, Stockholm South, Dnr: 232/03. Cell viability Cells were incubated with serum deficient medium, in the presence or absence of the drugs for 48 h. Cell number was manually counted in a hemocytometer and cell viability assessed by Trypan blue exclusion. [3H]thymidine incorporation Rates of [3H]thymidine incorporation into DNA were analyzed as previously described [22, 23] and used as a measure of DNA synthesis. In brief, cells were cultured until 80% confluence. After serum starvation over night, cells were incubated in the presence of the agents or vehicle for 24 h at 5 mM or 11 mM glucose to simulate a normoglycemic and hyperglycemic milieu, respectively. Cells were pulsed with [3H]thymidine (1 μCi/ml) 8 h prior to the end of the incubation. Cells were then collected and homogenized through ultrasonication. The labeled cells were precipitated in ice-cold 10% trichloroacetic acid (TCA). The precipitate was washed with 10% TCA and [3H]thymidine incorporation into DNA was measured using a microplate scintillation and luminescence counter (Wallac MicroBeta® Trilux, PerkinElmer) [24]. The protein concentration of the samples was measured using DC™ Protein Assay (Bio-Rad Laboratories). Caspase-3 activity Cells were cultured to 90% confluence. After incubation in serum deficient medium overnight, cells were pretreated for 1 hour with the drugs or solvents, after which the incubation was continued for 24 h in the presence of 0.125 mM palmitate/0.25% BSA or vehicle [13]. Caspase-3 activity, a measure of apoptosis, was evaluated using the EnzChek® Caspase-3 Assay Kit (Molecular Probes®, Life Technologies) according the manufacturer's instructions. The assay is based on the 7-amino-4-methylcoumarin-derived substrate Z-DEVD-AMC, which yields a fluorescent product (excitation/emission ~342/441 nm) upon proteolytic cleavage by active caspase-3. All results were normalized to the protein concentration of the corresponding sample using DC™ Protein Assay (Bio-Rad Laboratories). DNA fragmentation Cells were cultured to 90% confluence and treated in the same way as described for the caspase-3 activity assay. Cell apoptosis was analyzed using the Cell Death Detection Kit plus (Roche Diagnostics) according the manufacturer's instructions. The Cell Death Detection Kit measures cytoplasmic DNA-histone nucleosome complexes generated during apoptotic DNA fragmentation. Samples were measured at 405 nm and corrected for background signals caused by irregular microtiter plates or light scattering due to solid particles in the solution at the reference wavelength of 492 nm. Separate wells were seeded for protein concentration measurements using DC™ Protein Assay (Bio-Rad Laboratories). Absorbance data was normalized to the protein concentration of the corresponding treatment. Statistical analysis Results are expressed as mean ± SEM. Statistical analysis was performed using Student's t-test or ANOVA, as appropriate. P < 0.05 was considered statistically significant. Results Agents that were used in this study were the following: insulin lispro (100 pM, 1 nM), C-peptide (1 nM), pioglitazone (2.5 μM), metformin (500 μM), glimepiride (1 μM), rosuvastatin (10 nM), candesartan (100 nM) and BLX-1002 (1 μM). Of the compounds tested, we were unable to detect any effect of C-peptide on either proliferation or apoptosis of the cells. All agents have been tested in all conditions, but only compounds that were able to exert significant effects are displayed in the graphs. Cell viability of HCAECs is increased by the agents As shown in Figure 1, among the agents tested, BLX-1002 and insulin (the latter at both 100 pM and 1 nM) increased cell viability. Exposure of the cells to metformin also resulted in a slight, but statistically significant, increase in cell viability. Under the same conditions, cell viability was also augmented by rosuvastatin, pioglitazone, candesartan and glimepiride. Figure 1 Insulin, metformin, BLX-1002, rosuvastatin, pioglitazone, candesartan and glimepiride increase HCAEC viability. Cells were incubated for 48 h in medium supplemented with 0.5% FBS in the presence or absence of insulin lispro (100 pM and 1 nM), metformin (500 μM), BLX-1002 (1 μM), rosuvastatin (10 nM), pioglitazone (2.5 μM), candesartan (100 nM) and glimepiride (1 μM). Viability was assessed with Trypan blue exclusion. * denotes P < 0.05, ** denotes P < 0.01, *** denotes P < 0.001 for chance differences compared to controls by Student's t-test. Insulin, BLX-1002, metformin and rosuvastatin stimulate proliferation of HCAECs at normal glucose concentration Since the increased viability noted above (Figure 1) could be explained by increased proliferation, decreased apoptosis, or a combination thereof, we investigated if the drugs exert any effect on HCAECs' DNA synthesis. Rates of [3H]thymidine incorporation were analyzed after a 24 hour exposure to the agents at 5 mM glucose. The mitogenic effect of the compounds was also verified by measuring protein concentrations of the samples to reflect an increase in cell number. As shown in Figure 2, insulin, BLX-1002, metformin and rosuvastatin increased both DNA synthesis and protein concentration significantly. Figure 2 Insulin, BLX-1002, metformin and rosuvastatin stimulate HCAEC proliferation at normal glucose concentration. In order to study the effects of agents on proliferation of HCAECs, cells were incubated at 5 mM of glucose in medium supplemented with 0.5% FBS for 24 h in the presence or absence of insulin lispro (100 pM), metformin (500 μM), BLX-1002 (1 μM), rosuvastatin (10 nM). Eight hours prior to the end of the incubation, cells were pulsed with [3H]thymidine. Cells were then harvested and [3H]thymidine incorporation into DNA was measured using a microplate scintillation & luminescence counter, and the protein concentration of the samples was measured using DC™ Protein Assay. * denotes P < 0.05, ** denotes P < 0.01, *** denotes P < 0.001 for chance differences vs. controls by Student's t-test. Insulin and BLX-1002 stimulate proliferation of HCAECs at high glucose Since insulin, BLX-1002, metformin and rosuvastatin were able to increase the proliferation of HCAECs in 5 mM glucose (Figure 2), we further investigated whether they had any effect on cell proliferation at high glucose. HCAECs were therefore exposed to 11 mM of glucose, to simulate a diabetic setting, in the presence or absence of the agents. Similar to the effect observed at 5 mM glucose, insulin and BLX-1002 were both able to increase DNA synthesis and protein concentration (Figure 3). In contrast to their effects at 5 mM glucose, metformin and rosuvastatin did not exert any effect on cell proliferation under these conditions (data not shown). Figure 3 Insulin and BLX-1002 stimulate HCAEC proliferation in high glucose. HCAECs were incubated at 11 mM of glucose in medium supplemented with 0.5% FBS for 24 h in the presence or absence of insulin lispro (100 pM) or BLX-1002 (1 μM). Eight hours prior to the end of the incubation, cells were pulsed with [3H]thymidine. Cells were then harvested and [3H]thymidine incorporation into DNA was measured using a microplate scintillation & luminescence counter and the protein concentration of the samples was measured using DC™ Protein Assay. * denotes P < 0.05, ** denotes P < 0.01, *** denotes P < 0.001 for a chance difference vs. control by Student's t-test. Insulin, BLX-1002, metformin, pioglitazone and candesartan suppress lipoapoptosis in HCAECs Plasma FFA levels are increased in type-2 diabetic patients and the FFA palmitate is known to induce apoptosis of endothelial cells [13]. We therefore evaluated how the agents affected the activity of cleaved caspase-3, a crucial mediator of apoptosis [25], in HCAECs after 24 hour exposure to 0.125 mM palmitate. As shown in Figure 4, palmitate significantly increased caspase-3 activity, thus confirming its pro-apoptotic effect, in HCAECs. Insulin, BLX-1002, metformin, pioglitazone and candesartan significantly decreased the palmitate-induced caspase-3 activation, suggesting a protective effect of the drugs against lipotoxicity in HCAECs. Glimepiride significantly decreased basal caspase-3 activity with ~20% (data not shown), which might explain why an increased viability of the cells in the presence of glimepiride is noted (Figure 1). Figure 4 Insulin, metformin, BLX-1002, pioglitazone and candesartan protect HCAECs against palmitate-induced caspase-3 activation. Palmitate-induced caspase-3 activity, a measure of apoptosis, was evaluated using the EnzChek® Caspase-3 Assay Kit. HCAECs were incubated in medium containing 5 mM glucose, supplemented with 0.5% FBS, with or without insulin lispro (1 nM), BLX-1002 (1 μM), metformin (500 μM), pioglitazone (2.5 μM), candesartan (100 nM) in the presence of 0.125 mM palmitate or vehicle (ethanol and BSA) for 24 h. * denotes P < 0.05 for a chance difference vs. controls by ANOVA. # denotes P < 0.05 for a chance difference vs. palmitate by ANOVA. To corroborate the anti-apoptotic effect of the agents above, we investigated their influence on palmitate-induced DNA fragmentation by analyzing cytoplasmic DNA-histone nucleosome complexes generated during apoptosis. Palmitate alone gave rise to a markedly increased apoptosis of the HCAECs (Figure 5). Co-incubation with insulin, BLX-1002, metformin, pioglitazone or candesartan significantly countered the palmitate-induced apoptosis, thus confirming the protective effect of these agents against lipoapoptosis in HCAECs. Figure 5 Insulin, metformin, BLX-1002, pioglitazone and candesartan protect HCAECs against palmitate-induced DNA fragmentation. To further corroborate the protective effects of the agents against lipotoxicity-induced apoptosis, DNA fragmentation was evaluated using the Cell Death Detection kit ELISAplus. Cells were exposed for 24 h to 0.125 mM palmitate or vehicle at 5 mM glucose with or without insulin lispro (1 nM), BLX-1002 (1 μM), metformin (500 μM), pioglitazone (2.5 μM), candesartan (100 nM). * denotes P < 0.05 for a chance difference vs controls by ANOVA, # denotes P < 0.05 for a chance difference vs palmitate by ANOVA. Discussion Our major findings in this study are that insulin, BLX-1002, metformin and rosuvastatin exert positive effects on regeneration and viability of HCAECs. Insulin, BLX-1002, metformin, pioglitazone and candesartan also conferred protection of HCAECs against lipotoxicity. Proliferation of HCAECs is induced in normal and high glucose levels By studying how the agents affect DNA synthesis, through analysis of the incorporation of radiolabeled thymidine into DNA, we found that insulin, BLX-1002, metformin and rosuvastatin increased the HCAECs' DNA synthesis and subsequently the protein concentration in 5 mM glucose. Taken together, this suggests that the above agents stimulate HCAEC proliferation at normal glucose concentrations. The mitogenic effect seen with the compounds probably explain, at least in part, the increased viability. Kageyama et al. recently showed that when HCAECs were exposed to glucose concentrations ranging from 5.6-16.7 mM apoptosis was dose dependently increased. This was also coupled to an increased expression of the death receptors TNF-R1 and Fas [26]. High glucose is also known to cause oxidative stress through generation of reactive oxygen species (ROS) in HCAECs as recently shown by Serizawa et al.[27]. This might be due to on uncoupling of endothelial nitric oxide synthase (eNOS) and increased activity of the NADPH oxidase [27]. Increased levels of glucose might also cause proliferative dysfunction of endothelial cells [28, 29], which is believed to contribute to premature development of atherosclerosis [30]. We therefore wanted to test if the above agents also stimulate HCAEC proliferation at 11 mM glucose, simulating a diabetic milieu. We found that insulin and BLX-1002 were the only two agents that could promote cell proliferation in high glucose. The mitogenic effect of the agents in HCAECs may prove beneficial in dampening or delaying coronary atherosclerosis, by rapidly covering a vascular wall lesion with endothelium and thus protecting it from further atherothrombotic events. It may also be favorable for diabetic patients with coronary artery disease undergoing percutaneous coronary revascularization and treated with drug-eluting stents. It is believed that delayed re-endothelization is a major underlying problem for late-stent thrombosis [31] and that rapid re-endothelization is essential for preventing restenosis, which is the major limitation with this treatment [32]. The underlying mechanisms involved in the agents' proliferative effects were not investigated in this scanning study, but will be subject to future work. However, the effects are consistent with previous findings insofar that insulin at supraphysiological concentrations increases [3H]thymidine incorporation in endothelial cells [33]. Insulin and rosuvastatin have also been shown to activate the PI3K/Akt pathway, a pathway that is well known to be involved in cell survival and proliferation [18, 22, 3436]. BLX-1002 is a novel compound of the TZD family, but with no apparent PPAR affinity. We have previously demonstrated that it can signal through PI3K and is able to activate AMPK in insulin-secreting cells [20]. Also, metformin is a known activator of AMPK, and AMPK activates eNOS [37], an important factor for proliferation of HCAECs [22]. HCAECs are protected from lipoapotosis Plasma levels of FFAs are typically elevated in diabetic patients and FFAs are known to impair endothelial-dependent vasodilatation [11, 38]. FFAs are also known to cause apoptosis of endothelial cells [13, 38]. Apoptosis of HCAECs might disrupt the endothelial monolayer of the coronary artery wall and might contribute to a proinflammatory environment that could lead to premature endothelial dysfunction and unfolding of coronary atherosclerosis [13, 38]. We therefore addressed whether the above agents protect HCAECs against apoptotic cell death caused by the fatty acid palmitate, simulating diabetic hyperlipidemia. Our results are commensurate with other reports in the literature. Insulin has previously been shown to protect human umbilical vein endothelial cells (HUVECs) from palmitate-induced apoptosis through activation of the PI3K/Akt pathway [38]. BLX-1002, whose functions are essentially unknown, has been shown to promote insulin secretion in pancreatic β-cells, an effect that involves PI3K and AMPK activation [20]. Since both PI3K and AMPK convey anti-apoptotic signals in other cell types [3841], these pathways may also be operative in HCAECs. This also holds true for metformin, which can activate AMPK and indeed, specific activation of AMPK has been shown to protect bovine aortic endothelial cells from palmitate-induced apoptosis [41]. The anti-apoptotic effect of pioglitazone observed in the present study is consistent with findings in both HUVECs and endothelial progenitor cells (EPCs) [42, 43]. Although the mechanisms behind such effect remain unclear and will be addressed in forthcoming studies, palmitate induces ROS in endothelial cells [41] and pioglitazone has been shown to decrease ROS formation in such cells [44]. This might contribute to its anti-apoptotic effect since oxidative stress is known to induce cell death [14, 44]. Pioglitazone has also been shown to protect HCAECs from tumor necrosis factor alpha induced caspase-3 activity and apoptosis [45]. To the best of our knowledge, there is no literature regarding putative effects of candesartan on lipoapoptosis of endothelial cells. But, in support to our findings, candesartan has been shown to protect from hypoxia-induced endothelial cell apoptosis through pathways involving increased eNOS expression and decreased caspase-3 activity [17]. Candesartan's ability to modulate the caspase-3 activity might also contribute to its positive effects on cell viability. Conclusions Abnormal proliferation and apoptosis of endothelial cells are involved in endothelial dysfunction, damage and repair. It thus contributes to the premature development of atherosclerosis and vascular complications in diabetes, making it important to understand the influence of currently applied anti-diabetic and cardioprotective agents on endothelial function. Our results suggest that drugs such as insulin, metformin, rosuvastatin, pioglitazone and candesartan that are oftentimes used in the clinical management of diabetic patients have direct and beneficial effects human coronary artery endothelial cells by promoting their proliferation and conferring protection against lipotoxicity. These findings may add yet another valuable property to their therapeutic effects, increasing their clinical utility in type 2 diabetic patients in whom endothelial dysfunction is a prominent feature that adversely affect their survival. Abbreviations AMPK:  AMP-activated protein kinase BSA:  Bovine serum albumin eNOS:  Endothelial NOS EPC:  Endothelial progenitor cells FBS:  Fetal bovine serum FFA:  Free fatty acid HCAEC:  Human coronary artery endothelial cells HUVEC:  Human umbilical vein endothelial cells hEGF:  Human epidermal growth factor hFGF-B:  Human fibroblast growth factor-B IGF-1:  R3-insulin-like growth factor-1 NO:  Nitric oxide PI3K:  Phosphatidylinositol 3-kinase PPAR-γ:  Peroxisome proliferator-activated receptor gamma ROS:  Reactive oxygen species TCA:  Trichloroacetic acid TZD:  Thiazolidinedione VEGF:  Vascular endothelial growth factor. Declarations Acknowledgements Financial support was provided through the regional agreement on medical training and clinical research (ALF) between Stockholm County Council and the Karolinska Institute, and by Diabetes Research and Wellness Foundation, the Janne Elgqvist family foundation, the Swedish Society for Medical Research, the Swedish Society of Medicine, Stiftelsen Serafimerlasarettet, the Swedish Heart and Lung foundation, Eli Lilly & Company, the European Foundation for the Study of Diabetes, Karolinska Institutet Foundations, and Stiftelsen Olle Engkvist Byggmästare. Authors’ Affiliations (1) Department of Clinical Science and Education, Södersjukhuset, Karolinska Institutet, Stockholm, Sweden References 1. Shaw JE, Sicree RA, Zimmet PZ: Global estimates of the prevalence of diabetes for 2010 and 2030. Diabetes Res Clin Pract. 2010, 87 (1): 4-14. 10.1016/j.diabres.2009.10.007.View ArticlePubMedGoogle Scholar 2. Sjoholm A, Nystrom T: Inflammation and the etiology of type 2 diabetes. Diabetes Metab Res Rev. 2006, 22 (1): 4-10. 10.1002/dmrr.568.View ArticlePubMedGoogle Scholar 3. Sjoholm A, Nystrom T: Endothelial inflammation in insulin resistance. Lancet. 2005, 365 (9459): 610-612.View ArticlePubMedGoogle Scholar 4. Dandona P, Ghanim H, Chaudhuri A, Mohanty P: Thiazolidinediones-improving endothelial function and potential long-term benefits on cardiovascular disease in subjects with type 2 diabetes. J Diabetes Complications. 2008, 22 (1): 62-75. 10.1016/j.jdiacomp.2006.10.009.View ArticlePubMedGoogle Scholar 5. Calles-Escandon J, Cipolla M: Diabetes and endothelial dysfunction: a clinical perspective. Endocr Rev. 2001, 22 (1): 36-52. 10.1210/er.22.1.36.View ArticlePubMedGoogle Scholar 6. Avogaro A, de Kreutzenberg SV, Fadini G: Endothelial dysfunction: causes and consequences in patients with diabetes mellitus. Diabetes Res Clin Pract. 2008, 82 (Suppl 2): S94-S101.View ArticlePubMedGoogle Scholar 7. Rask-Madsen C, King GL: Mechanisms of Disease: endothelial dysfunction in insulin resistance and diabetes. Nat Clin Pract Endocrinol Metab. 2007, 3 (1): 46-56. 10.1038/ncpendmet0366.View ArticlePubMedGoogle Scholar 8. Steinberg HO, Chaker H, Leaming R, Johnson A, Brechtel G, Baron AD: Obesity/insulin resistance is associated with endothelial dysfunction. Implications for the syndrome of insulin resistance. J Clin Invest. 1996, 97 (11): 2601-2610. 10.1172/JCI118709.PubMed CentralView ArticlePubMedGoogle Scholar 9. Nathanson D, Nystrom T: Hypoglycemic pharmacological treatment of type 2 diabetes: targeting the endothelium. Mol Cell Endocrinol. 2009, 297 (1-2): 112-126. 10.1016/j.mce.2008.11.016.View ArticlePubMedGoogle Scholar 10. Beckman JA, Goldfine AB, Gordon MB, Garrett LA, Creager MA: Inhibition of protein kinase Cbeta prevents impaired endothelium-dependent vasodilation caused by hyperglycemia in humans. Circ Res. 2002, 90 (1): 107-111. 10.1161/hh0102.102359.View ArticlePubMedGoogle Scholar 11. Lundman P, Tornvall P, Nilsson L, Pernow J: A triglyceride-rich fat emulsion and free fatty acids but not very low density lipoproteins impair endothelium-dependent vasorelaxation. Atherosclerosis. 2001, 159 (1): 35-41. 10.1016/S0021-9150(01)00478-6.View ArticlePubMedGoogle Scholar 12. Ho FM, Liu SH, Liau CS, Huang PJ, Lin-Shiau SY: High glucose-induced apoptosis in human endothelial cells is mediated by sequential activations of c-Jun NH(2)-terminal kinase and caspase-3. Circulation. 2000, 101 (22): 2618-2624.View ArticlePubMedGoogle Scholar 13. Chai W, Liu Z: p38 mitogen-activated protein kinase mediates palmitate-induced apoptosis but not inhibitor of nuclear factor-kappaB degradation in human coronary artery endothelial cells. Endocrinology. 2007, 148 (4): 1622-1628.View ArticlePubMedGoogle Scholar 14. Cifarelli V, Geng X, Styche A, Lakomy R, Trucco M, Luppi P: C-peptide reduces high-glucose-induced apoptosis of endothelial cells and decreases NAD(P)H-oxidase reactive oxygen species generation in human aortic endothelial cells. Diabetologia. 2011, 54 (10): 2702-2712. 10.1007/s00125-011-2251-0.View ArticlePubMedGoogle Scholar 15. Hamaguchi T, Hirose T, Asakawa H, Itoh Y, Kamado K, Tokunaga K, Tomita K, Masuda H, Watanabe N, Namba M: Efficacy of glimepiride in type 2 diabetic patients treated with glibenclamide. Diabetes Res Clin Pract. 2004, 66 (Suppl 1): S129-S132.View ArticlePubMedGoogle Scholar 16. Smith U: Pioglitazone: mechanism of action. Int J Clin Pract Suppl. 2001, 121: 13-18.PubMedGoogle Scholar 17. Matsumoto N, Manabe H, Ochiai J, Fujita N, Takagi T, Uemura M, Naito Y, Yoshida N, Oka S, Yoshikawa T: An AT1-receptor antagonist and an angiotensin-converting enzyme inhibitor protect against hypoxia-induced apoptosis in human aortic endothelial cells through upregulation of endothelial cell nitric oxide synthase activity. Shock. 2003, 19 (6): 547-552. 10.1097/01.shk.0000070734.34700.80.View ArticlePubMedGoogle Scholar 18. Li X, Yang G, Zhao G, Wu B, Edin ML, Zeldin DC, Wang DW: Rosuvastatin attenuates the elevation in blood pressure induced by overexpression of human C-reactive protein. Hypertens Res. 2011, 34 (7): 869-875. 10.1038/hr.2011.44.PubMed CentralView ArticlePubMedGoogle Scholar 19. Brunmair B, Staniek K, Lehner Z, Dey D, Bolten CW, Stadlbauer K, Luger A, Furnsinn C: Lipophilicity as a determinant of thiazolidinedione action in vitro: findings from BLX-1002, a novel compound without affinity to PPARs. Am J Physiol Cell Physiol. 2011, 300 (6): C1386-C1392. 10.1152/ajpcell.00401.2010.View ArticlePubMedGoogle Scholar 20. Zhang F, Dey D, Branstrom R, Forsberg L, Lu M, Zhang Q, Sjoholm A: BLX-1002, a novel thiazolidinedione with no PPAR affinity, stimulates AMP-activated protein kinase activity, raises cytosolic Ca2+, and enhances glucose-stimulated insulin secretion in a PI3K-dependent manner. Am J Physiol Cell Physiol. 2009, 296 (2): C346-C354.View ArticlePubMedGoogle Scholar 21. Brunmair B, Staniek K, Gras F, Scharf N, Althaym A, Clara R, Roden M, Gnaiger E, Nohl H, Waldhausl W, et al: Thiazolidinediones, like metformin, inhibit respiratory complex I: a common mechanism contributing to their antidiabetic actions?. Diabetes. 2004, 53 (4): 1052-1059. 10.2337/diabetes.53.4.1052.View ArticlePubMedGoogle Scholar 22. Erdogdu O, Nathanson D, Sjoholm A, Nystrom T, Zhang Q: Exendin-4 stimulates proliferation of human coronary artery endothelial cells through eNOS-, PKA- and PI3K/Akt-dependent pathways and requires GLP-1 receptor. Mol Cell Endocrinol. 2009, 325 (1-2): 26-35.View ArticleGoogle Scholar 23. Edwards SJ, Reader KL, Lun S, Western A, Lawrence S, McNatty KP, Juengel JL: The cooperative effect of growth and differentiation factor-9 and bone morphogenetic protein (BMP)-15 on granulosa cell function is modulated primarily through BMP receptor II. Endocrinology. 2008, 149 (3): 1026-1030.View ArticlePubMedGoogle Scholar 24. Sjoholm A, Zhang Q, Welsh N, Hansson A, Larsson O, Tally M, Berggren PO: Rapid Ca2+ influx and diacylglycerol synthesis in growth hormone-mediated islet beta -cell mitogenesis. J Biol Chem. 2000, 275 (28): 21033-21040. 10.1074/jbc.M001212200.View ArticlePubMedGoogle Scholar 25. Nicholson DW, Ali A, Thornberry NA, Vaillancourt JP, Ding CK, Gallant M, Gareau Y, Griffin PR, Labelle M, Lazebnik YA, et al: Identification and inhibition of the ICE/CED-3 protease necessary for mammalian apoptosis. Nature. 1995, 376 (6535): 37-43. 10.1038/376037a0.View ArticlePubMedGoogle Scholar 26. Kageyama S, Yokoo H, Tomita K, Kageyama-Yahara N, Uchimido R, Matsuda N, Yamamoto S, Hattori Y: High glucose-induced apoptosis in human coronary artery endothelial cells involves up-regulation of death receptors. Cardiovasc Diabetol. 2011, 10: 73-10.1186/1475-2840-10-73.PubMed CentralView ArticlePubMedGoogle Scholar 27. Serizawa K, Yogo K, Aizawa K, Tashiro Y, Ishizuka N: Nicorandil prevents endothelial dysfunction due to antioxidative effects via normalisation of NADPH oxidase and nitric oxide synthase in streptozotocin diabetic rats. Cardiovasc Diabetol. 2011, 10: 105-10.1186/1475-2840-10-105.PubMed CentralView ArticlePubMedGoogle Scholar 28. Varma S, Lal BK, Zheng R, Breslin JW, Saito S, Pappas PJ, Hobson RW, Duran WN: Hyperglycemia alters PI3k and Akt signaling and leads to endothelial cell proliferative dysfunction. Am J Physiol Heart Circ Physiol. 2005, 289 (4): H1744-H1751. 10.1152/ajpheart.01088.2004.PubMed CentralView ArticlePubMedGoogle Scholar 29. McGinn S, Saad S, Poronnik P, Pollock CA: High glucose-mediated effects on endothelial cell proliferation occur via p38 MAP kinase. Am J Physiol Endocrinol Metab. 2003, 285 (4): E708-E717.View ArticlePubMedGoogle Scholar 30. Berk BC, Abe JI, Min W, Surapisitchat J, Yan C: Endothelial atheroprotective and anti-inflammatory mechanisms. Ann N Y Acad Sci. 2001, 947: 93-109. discussion 109-111View ArticlePubMedGoogle Scholar 31. Finn AV, Joner M, Nakazawa G, Kolodgie F, Newell J, John MC, Gold HK, Virmani R: Pathological correlates of late drug-eluting stent thrombosis: strut coverage as a marker of endothelialization. Circulation. 2007, 115 (18): 2435-2441. 10.1161/CIRCULATIONAHA.107.693739.View ArticlePubMedGoogle Scholar 32. Nickson CM, Doherty PJ, Williams RL: Novel polymeric coatings with the potential to control in-stent restenosis-an in vitro study. J Biomater Appl. 2010, 24 (5): 437-452. 10.1177/0885328208099338.View ArticlePubMedGoogle Scholar 33. Gousseva N, Kugathasan K, Chesterman CN, Khachigian LM: Early growth response factor-1 mediates insulin-inducible vascular endothelial cell proliferation and regrowth after injury. J Cell Biochem. 2001, 81 (3): 523-534. 10.1002/1097-4644(20010601)81:3<523::AID-JCB1066>3.0.CO;2-E.View ArticlePubMedGoogle Scholar 34. Enomoto S, Sata M, Fukuda D, Nakamura K, Nagai R: Rosuvastatin prevents endothelial cell death and reduces atherosclerotic lesion formation in ApoE-deficient mice. Biomed Pharmacother. 2009, 63 (1): 19-26. 10.1016/j.biopha.2007.11.002.View ArticlePubMedGoogle Scholar 35. Engelman JA, Luo J, Cantley LC: The evolution of phosphatidylinositol 3-kinases as regulators of growth and metabolism. Nat Rev Genet. 2006, 7 (8): 606-619. 10.1038/nrg1879.View ArticlePubMedGoogle Scholar 36. Zeng G, Nystrom FH, Ravichandran LV, Cong LN, Kirby M, Mostowski H, Quon MJ: Roles for insulin receptor, PI3-kinase, and Akt in insulin-signaling pathways related to production of nitric oxide in human vascular endothelial cells. Circulation. 2000, 101 (13): 1539-1545.View ArticlePubMedGoogle Scholar 37. Davis BJ, Xie Z, Viollet B, Zou MH: Activation of the AMP-activated kinase by antidiabetes drug metformin stimulates nitric oxide synthesis in vivo by promoting the association of heat shock protein 90 and endothelial nitric oxide synthase. Diabetes. 2006, 55 (2): 496-505. 10.2337/diabetes.55.02.06.db05-1064.View ArticlePubMedGoogle Scholar 38. Piro S, Spampinato D, Spadaro L, Oliveri CE, Purrello F, Rabuazzo AM: Direct apoptotic effects of free fatty acids on human endothelial cells. Nutr Metab Cardiovasc Dis. 2008, 18 (2): 96-104. 10.1016/j.numecd.2007.01.009.View ArticlePubMedGoogle Scholar 39. Hermann C, Assmus B, Urbich C, Zeiher AM, Dimmeler S: Insulin-mediated stimulation of protein kinase Akt: a potent survival signaling cascade for endothelial cells. Arterioscler Thromb Vasc Biol. 2000, 20 (2): 402-409. 10.1161/01.ATV.20.2.402.View ArticlePubMedGoogle Scholar 40. Franke TF, Kaplan DR, Cantley LC: PI3K: downstream AKTion blocks apoptosis. Cell. 1997, 88 (4): 435-437. 10.1016/S0092-8674(00)81883-8.View ArticlePubMedGoogle Scholar 41. Kim JE, Kim YW, Lee IK, Kim JY, Kang YJ, Park SY: AMP-activated protein kinase activation by 5-aminoimidazole-4-carboxamide-1-beta-D-ribofuranoside (AICAR) inhibits palmitate-induced endothelial cell apoptosis through reactive oxygen species suppression. J Pharmacol Sci. 2008, 106 (3): 394-403. 10.1254/jphs.FP0071857.View ArticlePubMedGoogle Scholar 42. Artwohl M, Holzenbein T, Furnsinn C, Freudenthaler A, Huttary N, Waldhausl WK, Baumgartner-Parzer SM: Thiazolidinediones inhibit apoptosis and heat shock protein 60 expression in human vascular endothelial cells. Thromb Haemost. 2005, 93 (5): 810-815.PubMedGoogle Scholar 43. Gensch C, Clever YP, Werner C, Hanhoun M, Bohm M, Laufs U: The PPAR-gamma agonist pioglitazone increases neoangiogenesis and prevents apoptosis of endothelial progenitor cells. Atherosclerosis. 2007, 192 (1): 67-74. 10.1016/j.atherosclerosis.2006.06.026.View ArticlePubMedGoogle Scholar 44. Fujisawa K, Nishikawa T, Kukidome D, Imoto K, Yamashiro T, Motoshima H, Matsumura T, Araki E: TZDs reduce mitochondrial ROS production and enhance mitochondrial biogenesis. Biochem Biophys Res Commun. 2009, 379 (1): 43-48. 10.1016/j.bbrc.2008.11.141.View ArticlePubMedGoogle Scholar 45. Chen J, Li D, Zhang X, Mehta JL: Tumor necrosis factor-alpha-induced apoptosis of human coronary artery endothelial cells: modulation by the peroxisome proliferator-activated receptor-gamma ligand pioglitazone. J Cardiovasc Pharmacol Ther. 2004, 9 (1): 35-41. 10.1177/107424840400900i106.View ArticlePubMedGoogle Scholar Copyright © Eriksson et al; licensee BioMed Central Ltd. 2012 This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Advertisement
Category: Home Immune system support Immune system support Lean sydtem and Glucagon hormone role carbohydrates, Fast metabolism diet brown rice and quinoa, sstem Fast metabolism diet part of a healthy diet. Early civilizations recognized its value in fighting infections. Scientists have performed experiments in which volunteers were briefly dunked in cold water or spent short periods of time naked in subfreezing temperatures. Here's why. Immune system support Immune system support - Initial research suggests that drinking kefir may boost the immune system. According to a review , various studies have shown that regular consumption of kefir can help with:. The majority of the research that supports this was carried out on animals or in a laboratory. Researchers need to perform additional studies to understand how kefir may prevent disease in humans. Sunflower seeds can make a tasty addition to salads or breakfast bowls. They are a rich source of vitamin E , an antioxidant. In the same way as other antioxidants, vitamin E improves immune function. It does this by fighting off free radicals, which can damage cells. Almonds are another excellent source of vitamin E. They also contain manganese, magnesium , and fiber. A small handful or a quarter of a cup of almonds is a healthful snack that may benefit the immune system. Oranges and kiwis are an excellent source of vitamin C, which is the vitamin that many people turn to when they feel a cold developing. While scientists are still not sure exactly how it helps, vitamin C may reduce the duration of common cold symptoms and improve the function of the human immune system. For people trying to avoid the sugar in fruit, red bell peppers are an excellent alternative source of vitamin C. Stir-frying and roasting both preserve the nutrient content of red bell peppers better than steaming or boiling, according to a study on cooking methods. That said, it is important to remember that the immune system is complex. Eating a healthful, balanced diet is just one way to support immune health. It is also essential to be mindful of the other lifestyle factors that may affect immune system health, such as exercising and not smoking. Anyone who gets frequent colds or other illnesses and is concerned about their immune system should speak to a doctor. In this article, we describe types of foods that may weaken the immune system and others that may help support it. Learn more here. What are the best ways to boost the immune system and can they give you enhanced protection against infections and diseases? We take a look. While no drinks can quickly give the immune system a boost, staying hydrated and getting plenty of nutrients is essential for immune function. Elderberry supplements may help support immune system health. The immune system defends the body from invaders such as viruses, bacteria, and foreign bodies. Find out how it works, what can go wrong, and how to…. My podcast changed me Can 'biological race' explain disparities in health? Why Parkinson's research is zooming in on the gut Tools General Health Drugs A-Z Health Hubs Health Tools Find a Doctor BMI Calculators and Charts Blood Pressure Chart: Ranges and Guide Breast Cancer: Self-Examination Guide Sleep Calculator Quizzes RA Myths vs Facts Type 2 Diabetes: Managing Blood Sugar Ankylosing Spondylitis Pain: Fact or Fiction Connect About Medical News Today Who We Are Our Editorial Process Content Integrity Conscious Language Newsletters Sign Up Follow Us. Medical News Today. Health Conditions Health Products Discover Tools Connect. The best foods for boosting your immune system. Medically reviewed by Katherine Marengo LDN, R. Which foods boost the immune system Other ways to boost the immune system Summary. Which foods boost the immune system? Share on Pinterest Blueberries have antioxidant properties that may boost the immune system. Share on Pinterest Garlic may help to prevent colds. Other ways to boost the immune system. Share on Pinterest Washing hands properly may help make the immune system stronger. How we reviewed this article: Sources. Medical News Today has strict sourcing guidelines and draws only from peer-reviewed studies, academic research institutions, and medical journals and associations. We avoid using tertiary references. We link primary sources — including studies, scientific references, and statistics — within each article and also list them in the resources section at the bottom of our articles. You can learn more about how we ensure our content is accurate and current by reading our editorial policy. Share this article. Latest news Ovarian tissue freezing may help delay, and even prevent menopause. RSV vaccine errors in babies, pregnant people: Should you be worried? How gastric bypass surgery can help with type 2 diabetes remission. Good hygiene and hand-washing help prevent the spread of germs. Remember to wash produce before eating or using it in recipes. Clean glasses, forks, spoons and other utensils to reduce the spread and growth of bacteria. Getting adequate sleep and managing stress can be just as important as healthy eating to prevent the flu. Even if you eat healthily, get plenty of rest, drink adequate fluids and manage your stress, you may still catch the flu. If so, your illness may not last as long, and you may not feel so bad. According to the National Institutes of Health, there are many healing benefits of chicken soup. Your favorite recipe likely has properties that fight inflammation, promote hydration and get mucus flowing. Drink plenty of liquids, such as water, broth or sports drinks with electrolytes. When taken before cold symptoms start, vitamin C may shorten the duration, but it doesn't keep you from getting sick. You may have heard that milk and other dairy products worsen congestion during an illness. Research has not proven this to be true. Bring broth to a boil in a Dutch oven. Add carrots, celery, ginger and garlic; cook uncovered over medium heat until vegetables are just tender, about 20 minutes. Add noodles and chicken; simmer until the noodles are just tender, 8—10 minutes. Stir in dill and lemon juice. Nutrition per serving 1½ cups : calories, 4 g total fat, 2 g saturated fat, 1 g monounsaturated fat, 0 g cholesterol, 38 g protein, 18 g carbohydrates, 2 g dietary fiber, g sodium. Mayo Clinic Healthy Living Center Serves 4 Serve as condiment with chicken steak, fish, fried eggs or toast. Heat olive oil in a pan over medium heat. Sautee onions for two minutes. Then add all the spices; toast and stir for two minutes. Add the tomatoes, apples, vinegar and sugar. Mix together and simmer over low heat for 20—30 minutes, stirring occasionally. Season to taste. Nutrition per serving 2 tablespoons : 24 calories, 0. Kristi Wempen is a dietitian in Nutrition in Mankato , Minnesota. Skip to main content. Posted By. Kristi Wempen, R. Recent Posts. Speaking of Health. One of sysstem most valuable things you Paleo diet and non-toxic living is Fast metabolism diet health. Delicious sunflower seeds a dietitian, I have received numerous queries about recommended foods, sstem and diet sjstem to Imjune Fast metabolism diet function. While it ssystem true that nutrition plays systfm large role in immune function, diet recommendations for the prevention of acute illnesses, like COVID and other viruses, don't look a whole lot different than general guidelines for healthy eating. I'll start by saying that the concept of boosting the immune system through diet is flawed, as boosting refers to something that is stimulated above the normal level. A good diet cannot boost the immune system, but it's important to maintain a functional immune system by avoiding immunodeficiency due to malnutrition or micronutrient deficiencies. Protecting yourself against Delicious sunflower seeds and bacteria starts with zupport strong immune system. Ensuring suppott your Factors affecting hydration in young athletes system is Delicious sunflower seeds to mount Imune strong defense can help keep you from getting sick during cold and flu season —or anytime, really. With that in mind, Health reached out to healthcare providers to find the top immune-boosting habits they recommend. Some of those habits can help block the initial infection. And others fire up your system, so you can get better quickly if you come down with something. Video 1 women1365.org Immune System to Kill Viruses \u0026 Bacteria - Dr. Mandell Author: Dailabar 3 thoughts on “Immune system support 1. Ich denke, dass Sie den Fehler zulassen. Geben Sie wir werden es besprechen. Schreiben Sie mir in PM. Leave a comment Yours email will be published. Important fields a marked * Design by ThemesDNA.com
68 721 Assignments Done 100% Successfully Done In January 2019 Answer to Question #13587 in C++ for marienel ortiz Question #13587 program that will accept the 50 input numbers.after the input process, display all the numbers divisible by 5 from the input. Expert's answer #include <iostream> using namespace std; void main() { const int NUM_COUNT = 50; int arr[NUM_COUNT], index = 0; for(int i = 0; i < NUM_COUNT; ++i) { int number; cout << "Enter number #" << i + 1 << ": "; cin >> number; if (number % 5 == 0 && number != 0) { arr[index] = number; index++; } } cout << "Numbers divisible by 5:" << endl; for(int i = 0; i < index; ++i) { cout << arr[i] << endl; } cout << "\n\nEnter 0 for exit..."; cin >> index; } Need a fast expert's response? Submit order and get a quick answer at the best price for any assignment or question with DETAILED EXPLANATIONS! Comments No comments. Be first! Leave a comment Ask Your question Submit Privacy policy Terms and Conditions
GSA Annual Meeting, November 5-8, 2001 Paper No. 0 Presentation Time: 1:45 PM THE INFLUENCE OF CLIMATE CHANGE AND RIVER INCISION ON CAVE DEVELOPMENT IN THE UNGLACIATED OHIO RIVER BASIN GRANGER, Darryl E., Purdue Univ, 1397 Civil Engineering, West Lafayette, IN 47907-1397 and ANTHONY, Darlene M., Earth and Atmospheric Sciences, Purdue Univ, Civil Engineering Building, 550 Stadium Mall Drive, West Lafayette, IN 47907-2051, dgranger@purdue.edu A number of cave systems in the unglaciated Ohio River basin contain very large phreatic tubes now found abandoned some 40-80 meters above the modern water level. These large, nearly level passages apparently formed during a long period of base-level stability, and were abandoned upon river incision. Cosmogenic nuclide dating of quartz-bearing cave sediments by radioactive decay of 26Al and 10Be reveal that four of these large caves on the Cumberland escarpment, Tennessee, were abandoned after the initiation of Laurentide glaciation at about 2.4 Ma. Sediment ages range from approximately 1.8 Ma near the Cumberland River to about 0.8 Ma on upstream tributaries. These ages are consistent with the timing of cave passage abandonment on the Green River, Kentucky, and the New River, Virginia. The pattern of cave passage abandonment along the Cumberland River suggests that a knickpoint may have propagated up the river and its tributaries causing cave passages to be abandoned in sequence. Further evidence of river stability followed by rapid incision comes from patchy but thick deposits of highly weathered alluvial gravels found 40-60 meters above entrenched meanders of the modern river. Both the terraces and the caves may indicate that the onset of glaciation and re-routing of major rivers along the ice sheet margin generated a pulse of river incision that propagated through the entire Ohio River basin. The large, high-level phreatic tubes that are characteristic of this region probably formed during the Miocene and Pliocene, when a warm and stable climate promoted slow river incision and a stable water level that was conducive to extensive cave development.
• (309) 243-2400 (800) 872-4651 LASIK Seminar Registration Join Our Team! Inflammatory Eye Disease Inflammatory Eye Disease or Occular Infection Eye Infections are eye ailments that are caused by bacterial, viral, or other microbiological agents. There are many different types of eye infections with different causes and treatments. Some eye infections are common while others are rare. Inflammatory eye disease, also known as uveitis, occurs most frequently in people ages 20 to 60 and affects men and women equally. It encompasses a group of diseases that produce swelling in the eye and destroy eye tissues. Uveitis can reduce vision and even lead to severe vision loss. The name “uveitis” comes from the part of the eye affected by the disease, the uvea. However, uveitis is not limited to the uvea and can also affect the lens, retina, optic nerve and vitreous, producing reduced vision and possibly blindness if left untreated. Uveitis can last for a short (acute) or long (chronic) time. Severe forms of the disease can reoccur many times. Uveitis can be caused by complications or diseases that occur in the eye and can also result from inflammatory diseases that affect other parts of the body. The inflammatory response inside the eye can produce swelling, redness and heat, and can destroy tissues as white blood cells swarm the affected area. Causes of inflammatory eye disease include an attack from the body’s own immune system (autoimmune disorders), infection, tumors occurring within the eye or other parts of the body, bruises to the eye, or toxins that may penetrate the eye. Most of us will either have come upon an eye infection or know someone who has had one. People who wear contact lenses often find themselves getting some type of eye infection. This is due to the bacterial buildup from constantly wearing the lenses without proper disinfecting. Some common eye infections are pink eye and Blepharitis. Eye infections usually require some type of medication for treatment. Although some are not as dangerous, there are some eye infections that require a doctor’s immediate attention. If you believe you have an eye infection, you should seek an eye care professional for advice on type and treatment of the eye infection. Eye infections can affect any part of the eyes from the eyelids to the cornea and even to the optic nerves in the back of the eye. Symptoms of an eye infection include: • Chronic redness
 • Persistent Itching
 • Flaking of the eyelids • 
Discomfort of the eyes • Blurring vision
 • Watery eyes
 • 
Eye discharge
 • 
Eye pain
 • Swelling of tissue surrounding eyes or eyelids • Pink Eye – Conjunctivitis • 
Stye
 • Blepharitis • 
Cellulitis • 
Keratitis • 

Corneal Ulcer
 • 
Trachoma
 Source: EyeCaresm Source
原文:https://developers.google.com/v8/?hl=zh-CN Be Prepared before writing code[9:35] Understand how V8 optimzes Javascript; Write code mindfully; Learn you tools and how they can help you; Be Prepared - Hidden Classes[10:30] Hidden Classes Make JavaScript Faster. (注:Hidden Class 可以理解为VM内部实现对描述抽象类的描述,共享隐藏类才能让VM更高效) Limit Compile-time type information It's expensive to reason about JavaScript types at compile time... • V8 internally creates hidden classes for objects at runtime. • Objects with the same hidden class can use the same optimzed generated code. Initialize all object members in constructor functions; Always Initialize members in the same order; (If you add members in different orders, you create a different tree of hidden classes. And at the end, you'll have objects with two different hidden classes that can't use the same optimized code) Be Prepared - Numbers[15:30] We use a technique called tagging. So inside of V8 we pass around values of 32-bit numbers and objects. But we want to be able to use the same 32 bits to represent both. And that way we can have one code path that can handle, in many cases, the objects and integers. So what we do is we use the bottom bit. And each of the values have s special meaning. If the bit is se, it's an object pointer. If it's clear, it's what we call small integer or smi. And that's a 31-bit signed integer. Now if you have a numeric value that you're passing around, assigning to a member that is bigger -it's a numeric value that's bigger than 31 signed bits - then it doesn't fit in one of these smis. And we have to create what's called a box for it. We box the number. We turn it into a double and we create a new object to put that number inside of it. And what follows from that is the next speed trap to avoid, which is make sure, whenever possible, you use 31-bit signed numbers for performance critical calculations. Prefer numberic values that can be represented as 31-bit signed integers. Be prepared - Arrays[17:25] • Fast Elements: linear storage for compact key sets. • Dictionary Elements: hash table storage otherwise. Use contiguous keys starting at 0 for Arrays. ( Don't pre-allocate large Arrays(e.g. > 64K elements) to their maxium size, instead grow as you go. Don't delete elements in arrays, especially numberic arrays. Double Array Unboxing • Array's hidden class tracks elements types • Arrays contraining only doubles are unboxed • Unboxing causes hidden class change Initialize using array literals for small fixed-sized arrays Preallocate small arrays to correct size before using them Don't store non-numeric values(objects) in numeric arrays Be prepared - Full Compiler[26:36] V8 has tow compilers • "Full" compiler can generate good code for any Javascript • Optimizing compiler produces great code for most JavaScript "Full" compiler Starts Executing Code ASAP • Quickly generates good but not great JIT code • Assumes(almost) nothing about types at compilation time • Uses Inline Caches(or ICs) to refine knowledge about types while program runs Inline Caches(ICs) handle Types Efficiently • Type-dependent code for operations • Validate type assumptions first, then do work • Change at runtime via backpathcing as more types are discovered Monomorphic Better Than Polymophic • Operations are monomophic if the hidden class is always the same • Otherwise they are polymorphic function add(x,y) { return x + y; } add(1,2); //+ in add is monomorphic add("a", "b") //+ in add becomes polymorphic Prefer monomorphic over polymorphic whenever is possible. Type Feedback Makes Code Faster • Types taken from ICs • Operations speculatively get inlined • Monomophic functions and constructors can be inlined entirely • Inlininig enables other optimizations Logging What Gets Optimized d8 --trace-opt prime.js logs names of optimized functions to stdout Not Everything Can Be Optimized Some features prevent the optimizing compiler from running(a "bail-out") Avoid the speed trap Optimizing compiler "bail-out" on functions with try{} catch{} blocks. Maximizing Performance With Exceptions function perf_sensitive() { //Do performance-sensitive work here } try{ perf_sensitive() } catch(e) {  //handle exceptions here } How to Find Bailouts d8 --trace-bailout prime.js logs optimizing compiler bailouts Invalid assumptions lead to deoptimization[37:55] Deoptimization... • ...throws away optimized code • ...resumes execution at the right place in "full" compiler code • Reoptimization might be triggered again later, but for the short term, execution slows down. Passing V8 Options to Chrome "/Applicaitons/Google Chrome.app/Contents/MacOS/Google Chrome" \--js-flags="--trace-opt --trace-deopt --trace-bailout" Avoid the speed trap Avoid hidden class changes in functions after they are optimized Identify and Understand[39:50] "Identify and Understand" for V8 • Ensure problem is JavaScript • Reduce to pure JavaScript(no DOM!) • Collect metrics • Locate bottleneck(s) Prime Generator -- Profile It %out/ia32.release/d8 prime.js --prof 287107 using teh built-in sampling profiler • Takes sampe every millisecond • Writes v8.log What to expect from the primes Code function Primes() { ... this.addPrime = function(i) { this.primes[this.prime_count++] = i; } this.isPrimeDivisible = function(candidate) {   for(var i = 1; i <= this.prime_count; ++i) {     if(candidate % this.primes[i]) == 0) {       return true;     }   }   return false; } }; function main() {   p = new Primes();   var c = 1;   while (p.getPrimeCount() < 25000) {     if(!p.isPrimeDivisible(c)) {       p.addPrime(c);     }     c++;   }   print(p.getPrime(p.getPrimeCount()-1)); } Prediction: Most Time Spent in main • All properties and functions monomorphic • All numeric operations are SMIs • All functions can be inlined • No deoptimizations or bailouts (输出省略 @42:50) Can you spot the bug? this.isPrimeDivisible = function(candidate) {   for(var i = 1 ; i <= this.prime_count; ++i) {     if (candidate % this.primes[i] == 0) return true;     }   return false; } (Hint: primes is an array of length prime_count) % out/ia32.release/d8 primes-2.js --prof 287107 (省略) JavaScript is 60% faster than C++ C++ % g++ primes.cc -o primes % time ./primes real  0m2.955s user  0m2.952s sys   0m.001s JavaScript % .js real 0m1.829s user 0m1.827s sys 0m0.010s JavaScript is 17% slower than optimized C++ Fix What Matters[49:59] Optimize Your Algorithm this.isPrimeDivisible = function(candidate) {   for(var i = 1 ; i < this.prime_count; ++i) {     var current_prime = this.primes[i];     if(current_prime*current_prime > candidate){       return false;     }     if (candidate % this.primes[i] == 0) return true;     }   return false; } Final Results (输出省略) That's more than a 350x Speed-up! Keep Your Eyes on the Road • Be prepared • Identify and Understand the Crux • Fix What matters JavaScript 性能优化 --By Google V8 Team Manager的更多相关文章 1. JavaScript性能优化 如今主流浏览器都在比拼JavaScript引擎的执行速度,但最终都会达到一个理论极限,即无限接近编译后程序执行速度. 这种情况下决定程序速度的另一个重要因素就是代码本身. 在这里我们会分门别类的介绍J ... 2. javascript性能优化-repaint和reflow repaint(重绘) ,repaint发生更改时,元素的外观被改变,且在没有改变布局的情况下发生,如改变outline,visibility,background color,不会影响到dom结构渲 ... 3. 摘:JavaScript性能优化小知识总结 原文地址:http://www.codeceo.com/article/javascript-performance-tips.html JavaScript的性能问题不容小觑,这就需要我们开发人员在 ... 4. Javascript 性能优化的一点技巧 把优秀的编程方式当成一种习惯,融入到日常的编程当中.下图是今天想到的一点Javascript 性能优化的技巧,分享一下,抛砖引玉. 5. JavaScript性能优化:度量、监控与可视化1 HTTP事务所需要的步骤: 接下来,浏览器与远程Web服务器通过TCP三次握手协商来建立一个TCP/IP连接,类似对讲机的Over(完毕) Roger(明白) TCP/IP模型 TCP即传输控制协议( ... 6. JavaScript性能优化 DOM编程 最近在研读<高性能JavaScript>,在此做些简单记录.示例代码可在此处查看到. 一.DOM 1)DOM和JavaScript 文档对象模型(DOM)是一个独立于语言的,用于操作XML ... 7. javascript性能优化:创建javascript无阻塞脚本 javaScript 在浏览器中的运行性能,在web2.0时代显得尤为重要,成千上万行javaScript代码无疑会成为性能杀手, 在较低版本的浏览器执行JavaScript代码的时候,由于浏览器只使 ... 8. javascript性能优化总结一(转载人家) 一直在学习javascript,也有看过<犀利开发Jquery内核详解与实践>,对这本书的评价只有两个字犀利,可能是对javascript理解的还不够透彻异或是自己太笨,更多的是自己不擅于 ... 9. JavaScript 性能优化1 一直在学习javascript,也有看过<犀利开发Jquery内核详解与实践>,对这本书的评价只有两个字犀利,可能是对javascript理解的还不够透彻异或是自己太笨,更多的是自己不擅于 ... 随机推荐 1. Linux哲学思想--基本法则 1.一切皆文件: 2.单一目的的小程序: 3.组合小程序完成复杂任务: 4.文本文件保存配置信息: 5.尽量避免捕获用户接口: 6.提供机制,而非策略. 自从Linux一诞生就注定了其成为经典的命运. ... 2. Tomcat使用详解 Tomcat简介 官网:http://tomcat.apache.org/ Tomcat GitHub 地址:https://github.com/apache/tomcat Tomcat是Apach ... 3. 【转】js实现复制到剪贴板功能,兼容所有浏览器 两天前听了一个H5的分享,会议上有一句话,非常有感触:不是你不能,而是你对自己的要求太低.很简单的一句话,相信很多事情不是大家做不到,真的是对自己的要求太低,如果对自己要求多一点,那么你取得的进步可能 ... 4. C++求一个十进制的二进制中1的个数 int oneNumInBinary(int n){ ; while(n){ n = n&(n-); cnt++; } return cnt; } 5. 【转】C#使用ESC指令控制POS打印机打印小票 .前言 C#打印小票可以与普通打印机一样,调用PrintDocument实现.也可以发送标注你的ESC指令实现.由于 调用PrintDocument类时,无法操作使用串口或TCP/IP接口连接的pos ... 6. 安装Docker Toolbox后出现的问题 Installing Docker Toolbox on Windows with Hyper-V Installed Installing Docker on Windows is a fairly ... 7. wordnet的一些入门性介绍 关于wordnet的介绍很多,中英文都有,我这里主要是参考了别人的.自己组织了一下. 1.简介 1.1关于词典 Wordnet是一个由普林斯顿大学认识科学实验室在心理学教授乔治·A·米勒的指导下建立和 ... 8. 利用Spring创建定时任务 啊Spring Task看似很简单的感觉,但是自己搞起来还是花了蛮大的精力的,因为以前没接触过这个东西,所有当任务交给我的时候,我是一头的雾水的.然后我就各种查资料.其中我印象最深的是版本的问题和架包 ... 9. Tomcat部署问题 一.无法部署,访问路径报404错误,在tomcat的页面的manager app中无法启动,提示:FAIL - Application   could not....: 重新更改web.xml之后就正 ... 10. 移动h5自适应布局 问题一,分辨率Resolution适配:不同屏幕宽度,html元素宽高比和字体大小,元素之间的距离自适应,使用rem单位. 问题二,单位英寸像素数PPI适配:使用rem单位,文字会发虚.段落文字,使用 ...
Presentation is loading. Please wait. Presentation is loading. Please wait. SharePoint-hosted app Alexander Krupsky Artur Kukharevich. Similar presentations Presentation on theme: "SharePoint-hosted app Alexander Krupsky Artur Kukharevich."— Presentation transcript: 1 SharePoint-hosted app Alexander Krupsky Artur Kukharevich 2 Вариант SharePoint-hosted app Проблемы Шаблоны сайтов Cross-domain calls Localization Выводы 2 Содержание. 3 Запрос на отпуск. Необходимо: 1.Реализовать простой процесс 2.Вывести данные на временную линию 3.Возможность создания заявки должна быть на любой странице сайта Вариант SharePoint-hosted app 4 Установка прав на элемент списка -Workflow не поддерживает (не актуально) -Нет Event Receiver -Переопределение момента сохранения через JS не возможно при наличии прикрепленных файлов Проблемы. Права 5 Фиг с ним с элементом. Как установить изначальные права на сайте app и установить изначальные настройки? Что говорит по этому поводу MSDN: In some cases, the app will require certain information or choices to be provided before the app can function. When your app requires information before it can function, you should provide a user experience that guides the user to the settings page to update the configuration. You should add the settings page URL to the app’s top-right menu if appropriate so that users can find it easily. If your app has a getting started experience or other settings, you can add those also. For more information, see How to: Use the client chrome control in apps for SharePoint. Проблемы. Права 6 Я хочу чтобы у меня отпуск был каждый месяц по два дня, выпадающих на первую неделю в течении двух лет. Если список находится не на сайте app, то сочувствую, т к SharePoint API позволяет сделать повторяющиеся события: 1.Серверный код 2.Запрос к сервису с установкой Date Overlap Проблемы. Календарь 7 Ограничения: Встраивается на страницу при помощи iFrame Фиксированный размер Проблемы. Client Web Parts 8 Изменения размера iframe var resizeMessage = ' resize({Width}, {Height}) '; resizeMessage = resizeMessage.replace("{Sender_ID}", senderId); resizeMessage = resizeMessage.replace("{Height}", newHeight); resizeMessage = resizeMessage.replace("{Width}", newWidth); window.parent.postMessage(resizeMessage, "*"); Где SenderId – параметр, который берется с query string. Важно!!! Этот метод работает, когда для Client Web Part задана автоматическая ширина и(или) высота. Проблемы. Client Web Parts 9 Скрытые активности Как локализовать workflow? Проблемы. Workflow 10 Возможно, но используйте с умом, а лучше вообще не используйте) Что говорит по этому поводу MSDN: Do not use the WebTemplate element in the app manifest to designate any of the built-in SharePoint site definition configurations as the app web's site type. We do not support using any of the built-in site definition configurations, other than APP#0, for app webs. Шаблоны сайтов 11 Using REST (работает через AppWebProxy.aspx): $.getScript(scriptbase + "SP.RequestExecutor.js", execCrossDomainRequest); function execCrossDomainRequest() { var executor; executor = new SP.RequestExecutor(appweburl); executor.executeAsync( { url: appweburl + + hostweburl + "'", method: "GET", headers: { "Accept": "application/json; odata=verbose" }, success: successHandler, error: errorHandler } ); } Cross-domain calls 12 Cross-domain calls. Architecture 13 Using REST (не использует AppWebProxy.aspx): var context = new SP.ClientContext(_appweburl); var factory = new SP.ProxyWebRequestExecutorFactory(_appweburl); context.set_webRequestExecutorFactory(factory); var appContextSite = new SP.AppContextSite(context, _hostweburl); // наш запрос context.executeQueryAsync(); Пример запроса: https://spsitepro.sharepoint.com/sites/apps Cross-domain calls 14 А начинается все безобидно) В настройках AppManifest указываем поддерживаемые языки и Visual Studio автоматически сгенерирует необходимые ресурсные файлы. Localization. С чего начать 15 Для локализации модулей(Lists, ContentTypes и т.п.), которые будут доступны только на App Web необходимо использовать стандартную конструкцию: $Resources:Resource_key; Localization. В контексте App Web 16 Может применяться для локализации App Client Web Part, Ribbon Actions. Используем: $Resources:Resource_key; Получаем: Localization. В контексте Hosted-Web 17 Вот так Microsoft описывает проблему: To add OPC relationship markup to the app package 1.Append a.zip extension to the app package. 2.In the.zip file, open the folder named _rels. 3.Open the AppManifest.xml.rels file. This file specifies the OPC relationships of the AppManifest.xml file to other files in the package. The file contains a Relationship element for the Resources.resx file and for each of the Resources.LL-CC.resx files. The following are examples: 4.Copy these resource-related Relationship elements and save them in a text file outside the package so you can reuse them in a later step. 5.Close the AppManifest.xml.rels file. 6.In the _rels folder, open the featureGUID.xml.rels file. This file specifies the OPC relationships of the featureGUID.xml file and all its child files, such as elements.xml files, to other files in the package. 7.Paste into the Relationships element all of the Relationship elements that you copied from the AppManifest.xml.rels file. It’s OK to use the same relationship IDs because you are pasting them into a different parent Relationships element. 8.Save (as UTF-8) and close the file. 9.Close the.zip file and then remove the ".zip" from the end of the file name. The app package can now be installed on your test SharePoint website. Localization. В контексте Hosted-Web 18 Скачать с Msdn утилиту AddRelsToAppPackage (http://msdn.microsoft.com/en-us/library/fp aspx)http://msdn.microsoft.com/en-us/library/fp aspx СПОСОБ РАБОТАЕТ ТОЛЬКО ПРИ Deploy!!!!! Localization. В контексте Hosted-Web 19 Сделаем, что бы работало при deploy и publish. В.csproj файл добавить следующее: после строки: Localization. В контексте Hosted-Web 20 Localization. UI А как же быть с alert и ему подобным??? 21 А выводы делайте сами ;) Выводы Download ppt "SharePoint-hosted app Alexander Krupsky Artur Kukharevich." Similar presentations Ads by Google
1. 24 Jun, 2014 1 commit • Yunqing Wang's avatar Reuse inter prediction result in real-time speed 6 · 0aae1000 Yunqing Wang authored In real-time speed 6, no partition search is done. The inter prediction results got from picking mode can be reused in the following encoding process. A speed feature reuse_inter_pred_sby is added to only enable the resue in speed 6. This patch doesn't change encoding result. RTC set tests showed that the encoding speed gain is 2% - 5%. Change-Id: I3884780f64ef95dd8be10562926542528713b92c 0aae1000 2. 22 Apr, 2014 1 commit • Dmitry Kovalev's avatar Renaming "onyx" to "encoder". · ef003078 Dmitry Kovalev authored Actual renames: vp9_onyx_if.c -> vp9_encoder.c vp9_onyx_int.h -> vp9_encoder.h Change-Id: I80532a80b118d0060518e6c6a0d640e3f411783c ef003078 3. 29 Jan, 2014 1 commit • Jim Bankoski's avatar create super fast rtc mode · ea8aaf15 Jim Bankoski authored This patch only works if the video is a width and height that are both a multiple of 32.. It sets every partition to 16x16, and does INTRADC only on the first frame and ZEROMV on every other frame. It always does does the largest possible transform, and loop filter level is set to 4. Was ~20% faster than speed -5 of vp8 Now 20% slower but adds motion search ( every block ), nearest, near and zeromv The SVC test was changed because - while this realtime mode produces bad quality albeit quickly, it isn't obeying all the rules it should about which frames are available. Change-Id: I235c0b22573957986d41497dfb84568ec1dec8c7 ea8aaf15 4. 24 Jan, 2014 1 commit 5. 16 Jan, 2014 1 commit • Jingning Han's avatar Inter-frame non-RD mode decision · 2f52decd Jingning Han authored This commit setups a test framework for real-time coding. It enables a light motion search for non-RD mode decision purpose. Change-Id: I8bec656331539e963c2b685a70e43e0ae32a6e9d 2f52decd
February 24, 2024 anonymous HIV screening Singapore In the quest for overall well-being, it is crucial to prioritize regular health checkups, including those related to sexual health. Singapore, a country known for its emphasis on public health, recognizes the significance of anonymous HIV screening in Singapore as an integral part of healthcare services. Anonymous HIV screening allows individuals to undergo HIV testing without disclosing their personal information. This approach ensures privacy and confidentiality, making it easier for individuals to seek testing without fear of judgment or social repercussions. By promoting anonymous HIV screening, Singapore aims to remove barriers that may discourage people from getting tested, ultimately leading to a healthier population. By combining anonymous HIV screening with the use of  4th generation HIV test in Singapore, ensures that individuals have access to effective and confidential testing options. Importance of HIV Testing: Early Detection for Improved Quality of Life:- HIV, or Human Immunodeficiency Virus, remains a significant global health concern, impacting millions of individuals worldwide. Timely detection through HIV testing plays a crucial role in promoting better health outcomes and improving the overall quality of life for those affected. Timely Intervention and Treatment- Early detection of HIV allows for prompt intervention and access to life-saving treatments. Antiretroviral therapy (ART) has significantly advanced over the years, effectively suppressing the virus, slowing disease progression, and preserving immune function. Improved Health Outcomes- HIV screening in Singapore enables individuals to take proactive steps toward managing their health. Regular monitoring of viral load (the amount of virus in the blood) and CD4 count helps healthcare providers assess treatment efficacy and adjust medications accordingly. Prevention and Risk Reduction- Knowing one’s HIV status empowers individuals to take necessary precautions to prevent transmission to others. Accessing appropriate healthcare services and practicing safer sex measures, such as consistent condom use or pre-exposure prophylaxis (PrEP) for those at high risk, can significantly reduce the chances of transmitting the virus to sexual partners. Community and Public Health Impact- Anonymous HIV screening in Singapore plays a vital role in combating the spread of the virus within communities. Individuals who are aware of their HIV-positive status can take steps to prevent new infections by adopting safer behaviors, participating in prevention programs, and educating others about the importance of testing. Overcoming Stigma and Discrimination- HIV testing and awareness campaigns contribute to breaking down the stigma and discrimination associated with the virus. By normalizing HIV testing as a routine health practice, individuals are more likely to seek testing without fear of judgment. Embracing 4th Generation Tests for Improved Detection:- In the fight against HIV, Singapore’s government has implemented extensive measures to promote widespread testing. Anonymous HIV screening in Singapore is readily available throughout the country, allowing individuals to undergo HIV testing without disclosing their personal information. Anonymous HIV Screening- Singapore recognizes the importance of anonymous HIV screening in encouraging individuals to get tested. Confidentiality is a primary concern for many people, as the stigma surrounding HIV can lead to fear, discrimination, and potential social repercussions. By providing anonymous testing services, individuals can feel more comfortable and empowered to seek testing without the fear of their personal information being revealed. Ensuring Privacy and Confidentiality- Anonymous HIV screening in Singapore services prioritize privacy and confidentiality. Individuals are not required to provide personal identification or disclose their names during the testing process. Test results are communicated directly to the individuals, ensuring that sensitive information remains confidential and secure. Rapid and Accurate Results- 4th generation HIV tests in Singapore have revolutionized HIV screening by detecting both HIV antibodies and antigens. This dual detection approach significantly reduces the window period during which HIV infection can be accurately detected. In Singapore, rapid 4th generation HIV tests are widely available, providing quick and reliable results within a shorter time frame. Promoting Early Detection- The early detection of HIV is crucial for initiating timely intervention and treatment. By embracing 4th generation tests, Singapore aims to detect HIV infections at an earlier stage, allowing individuals to access necessary medical care and support promptly. Early detection not only improves health outcomes for those infected but also helps prevent further transmission within the community. Supporting Public Health Efforts- By promoting anonymous HIV screening in Singapore and utilizing 4th generation tests, Singapore contributes to broader public health efforts to combat HIV. Increasing testing rates not only identifies individuals who require immediate care but also provides valuable data for monitoring HIV prevalence, designing targeted interventions, and allocating resources effectively. The Ultimate Destination for HIV Testing in Singapore:- When searching for the best anonymous HIV screening in Singapore, Anteh Dispensary emerges as a leading choice among the various organizations offering HIV screening services. They provide a unique and comprehensive experience through its 4th generation rapid HIV test, combining accuracy, efficiency, and convenience. With a team of highly trained healthcare professionals who prioritize patient comfort and ensure confidential testing, Anteh Dispensary is the ultimate destination for HIV testing in Singapore. Conclusion Taking charge of our health involves being proactive and responsible. Anonymous HIV screening services, coupled with the remarkable 4th generation rapid HIV test offered by Anteh Dispensary, empower individuals to take control of their sexual health. Regular testing and early detection pave the way for effective management and prevention of HIV. By choosing their 4th generation’s HIV test in Singapore, individuals can confidently prioritize their health and well-being. In an age where knowledge and awareness are paramount, seeking HIV testing and staying informed about one’s sexual health is a vital step toward overall wellness. By combining the advantages of anonymous HIV screening in Singapore and advanced 4th generation tests, Singapore, with Anteh Dispensary at the forefront, is paving the way for a healthier future. Read Also- Everything You Should Know About Compulsory Vaccination For Babies In Singapore     Leave a Reply Your email address will not be published. Required fields are marked *
A novel method for making nested deletions and its application for sequencing of a 300 kb region of human APP locus Masahira Hattori*, Fujiko Tsukahara, Yoshiaki Furuhata, Hiroshi Tanahashi, Matsumi Hirose, Masae Saito, Shiho Tsukuni, Yoshiyuki Sakaki *この研究の対応する著者 研究成果: Article査読 62 被引用数 (Scopus) 抄録 We developed a novel in vitro method for making nested deletions and applied it to a large-scale DNA sequencing. A DNA fragment to be sequenced (up to 15 kb long) was cloned with a new vector possessing two unique Sfil sites, digested by Sfil and ligated to generate a large head-to-tail concatemer. The large concatemer was randomly fragmented by sonication and then redigested by Sfil to separate insert and vector DNAs. The fragments of various length were then cloned into the other vector(s) specifically designed for selective cloning of insert-derived DNA fragments to generate a library of nested deletions. This method allowed a single person to generate > 20 nested deletion libraries sufficient to cover 100 kb in a few days. We applied the method for sequencing of P1 clones and successfully determined the complete sequence-of ≃300 kb of the human amyloid precursor protein (APP) locus on chromosome 21 with a redundancy of 3.8, reasonably low cost and very few gaps remaining to be closed. Development of some new instruments and software is also described which makes this method more applicable for large-scale sequencing. 本文言語English ページ(範囲)1802-1808 ページ数7 ジャーナルNucleic Acids Research 25 9 DOI 出版ステータスPublished - 1997 5月 1 外部発表はい ASJC Scopus subject areas • 遺伝学 フィンガープリント 「A novel method for making nested deletions and its application for sequencing of a 300 kb region of human APP locus」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。 引用スタイル
Cookies on this website We use cookies to ensure that we give you the best experience on our website. If you click 'Accept all cookies' we'll assume that you are happy to receive all cookies and you won't see this message again. If you click 'Reject all non-essential cookies' only necessary cookies providing core functionality such as security, network management, and accessibility will be enabled. Click 'Find out more' for information on how to change your cookie settings. BACKGROUND: The Galα(1,3)Gal epitope (α-GAL), created by α-1,3-glycosyltransferase-1 (GGTA1), is a major xenoantigen causing hyperacute rejection in pig-to-primate and pig-to-human xenotransplantation. In response, GGTA1 gene-deleted pigs have been generated. However, it is unclear whether there is a residual small amount of α-Gal epitope expressed in GGTA1(-/-) pigs. Isoglobotrihexosylceramide synthase (iGb3s), another member of the glycosyltransferase family, catalyzes the synthesis of isoglobo-series glycosphingolipids with an α-GAL-terminal disaccharide (iGb3), creating the possibility that iGb3s may be a source of α-GAL epitopes in GGTA1(-/-) animals. The objective of this study was to examine the impact of silencing the iGb3s gene (A3GalT2) on pig-to-primate and pig-to-human immune cross-reactivity by creating and comparing GGTA1(-/-) pigs to GGTA1(-/-) - and A3GalT2(-/-) -double-knockout pigs. METHODS: We used the CRISPR/Cas 9 system to target the GGTA1 and A3GalT2 genes in pigs. Both GGTA1 and A3GalT2 genes are functionally inactive in humans and baboons. CRISPR-treated cells used directly for somatic cell nuclear transfer produced single- and double-gene-knockout piglets in a single pregnancy. Once grown to maturity, the glycosphingolipid profile (including iGb3) was assayed in renal tissue by normal-phase liquid chromatography. In addition, peripheral blood mononuclear cells (PBMCs) were subjected to (i) comparative cross-match cytotoxicity analysis against human and baboon serum and (ii) IB4 staining for α-GAL/iGb3. RESULTS: Silencing of the iGb3s gene significantly modulated the renal glycosphingolipid profile and iGb3 was not detected. Moreover, the human and baboon serum PBMC cytotoxicity and α-GAL/iGb3 staining were unchanged by iGb3s silencing. CONCLUSIONS: Our data suggest that iGb3s is not a contributor to antibody-mediated rejection in pig-to-primate or pig-to-human xenotransplantation. Although iGb3s gene silencing significantly changed the renal glycosphingolipid profile, the effect on Galα3Gal levels, antibody binding, and cytotoxic profiles of baboon and human sera on porcine PBMCs was neutral. Original publication DOI 10.1111/xen.12217 Type Journal article Journal Xenotransplantation Publication Date 03/2016 Volume 23 Pages 106 - 116 Keywords CRISPR/Cas9, Galα3Gal, antibody binding, cytotoxicity, iGb3s, isoglobo-series glycosphingolipids, Acute Disease, Animals, Animals, Genetically Modified, CRISPR-Cas Systems, Galactose, Galactosyltransferases, Gene Knockout Techniques, Graft Rejection, Heterografts, Humans, Leukocytes, Mononuclear, Papio, Swine, Transplantation, Heterologous
Switch Content of Div onclick I've got two divs - each with one image inside. If I click on the image inside the second div I want this image to become the content of the first div (like a gallery). It's important that I don't replace the links inside the img tag, so document.IMG1name.src=document.IMG2name.src isn't a possibility. I tried it with innerhtml, but it doesnt work: <div id="container1"> <img src="blablabla"> </div> <div id="container2"; onclick="document.getElementById('container1').innerHTML=document.getElementById('container2').innerHTML"><img src="../funnycat.jpg"> </div> Answers mm... your code works fine, just close img tags and remove semicolon: <div id="container1"> <img src="blablabla" /> </div> <div id="container2" onclick="document.getElementById('container1').innerHTML=document.getElementById('container2').innerHTML"><img src="https://www.google.es/logos/doodles/2013/holiday-series-2013-3-4504416610680832-hp.jpg" /> </div> here you have a demo: http://jsfiddle.net/HLs86/ HTML <div class="pricing_table" id="monthly"> <ul> <li>Basic</li> <li><a href="" class="buy_now">Subscribe Now</a></li> </ul> <ul style="background-color:#CCCCCC;"> <h2>Monthly Plans</h2><a class='plansSwitch' href='#yearly'>Click here to switch to the "Yearly Plans"</a></ul> </div> <div class="pricing_table" id="yearly"> <ul> <li>Basic</li> <li><a href="" class="buy_now">Subscribe Now</a></li> </ul> <ul style="background-color:#CCCCCC;"> <h2>Yearly Plans</h2><a class='plansSwitch' href='#monthly'>Click here to switch to the "Monthly Plans"</a></ul> </div> JS var $plansHolders = $('#monthly, #yearly').hide(); $('#monthly').show(); $('.plansSwitch').click(function() { var href = $(this).attr('href'); $plansHolders.hide(); $(href).show(); }); you just need to add javascript: on your onclick action like this <div id="container1"></div> <div id="container2" onclick="javascript:document.getElementById('container1').innerHTML=document.getElementById('container2').innerHTML"><img src="http://i.imgur.com/0fS8dCsb.jpg"/> </div> there is example Need Your Help Create a function in WordPress to change a users role when they click a link php wordpress user-roles So I have been researching for a while but to no avail. I am very new to php and back end WordPress functions. Jasmine Headless Webkit spec file running before assets? ruby-on-rails jasmine To run the spec files &amp; assets as coffee script, I decided to go with jasmine-headless-webkit. I believe I have everything installed correctly, but perhaps something wrong in my jasmine.yml fil...