text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
version https://git-lfs.github.com/spec/v1
oid sha256:41e95baa55a2fa8dbd78c50500df968464a558abc5f24899e2aa3083fb7fb7b3
size 7982
| 2023-12-12T01:26:35.434368 | https://example.com/article/6470 |
(Reuters) - Former U.S. President Jimmy Carter delivered an unexpected message on Sunday to the several hundred people gathered at a Baptist church in Georgia for his Bible lesson - his latest brain scan showed no sign of cancer.
Carter, 91, started treatment in August for melanoma that had spread from his liver to his brain. A previous MRI test showed the four spots of cancer that had developed on his brain were responding to treatment, he said.
“When I went this week, they didn’t find any cancer at all, so I have good news,” Carter told the crowd at Maranatha Baptist Church in his hometown of Plains, Georgia, according to a video from NBC News.
The former Democratic president, known for his unassuming style, offered a quick smile as people who had come for the Sunday School class he teaches gasped and clapped.
In a brief written statement afterward, Carter confirmed his most recent brain scan “did not reveal any signs of the original cancer spots nor any new ones.”
He said he would continue to receive regular doses of pembrolizumab, a new treatment that is part of a promising class of drugs that harness the body’s immune system to fight cancer. The immunotherapy is manufactured by Merck & Co under the brand name Keytruda.
While about 30 percent of patients treated with the drug experience significant shrinkage of their cancer, only approximately 5 percent experience complete remission, said Dr. Marc Ernstoff, director of the melanoma program at the Cleveland Clinic’s Taussig Cancer Institute in Ohio.
On average, the immunotherapy treatment extends a recipient’s life expectancy by a year and a half.
“But people that are in complete remission tend to live significantly longer,” said Ernstoff, who is not involved in Carter’s care.
Carter, who said after his diagnosis last summer that his fate was “in the hands of God,” has defied expectations before.
Critics derided his 1977-1981 presidency as a failure, although he played a key role in negotiation of the 1978 Camp David peace accord between Israel and Egypt. He lost his 1980 re-election bid to Republican Ronald Reagan.
But the former peanut farmer built one of the most successful post-White House legacies, winning a Nobel Peace Prize in 2002 and remaining active into his ‘90s in causes such as fighting disease in Africa and building homes for the poor.
He said in August that his cancer treatment, which has included radiation, would require him to cut back dramatically on his public schedule.
But Carter has continued to teach Sunday School classes and participated in at least one Habitat for Humanity home-building event this autumn. In October, he announced he was also working with the Rev. Martin Luther King Jr.’s heirs to help mediate their dispute over whether to sell their father’s 1964 Nobel Peace Prize medal and the Bible he carried during the civil rights movement. | 2024-03-18T01:26:35.434368 | https://example.com/article/9627 |
/*
* Copyright 2002-2008, Haiku Inc.
* Distributed under the terms of the MIT License.
*
* Authors:
* Tyler Dauwalder
* Ingo Weinhold, bonefish@users.sf.net
*/
/*!
\file Entry.cpp
BEntry and entry_ref implementations.
*/
#include <Entry.h>
#include <fcntl.h>
#include <new>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <Directory.h>
#include <Path.h>
#include <SymLink.h>
#include <syscalls.h>
#include "storage_support.h"
using namespace std;
// SYMLINK_MAX is needed by B_SYMLINK_MAX
// I don't know, why it isn't defined.
#ifndef SYMLINK_MAX
#define SYMLINK_MAX (16)
#endif
/*! \struct entry_ref
\brief A filesystem entry represented as a name in a concrete directory.
entry_refs may refer to pre-existing (concrete) files, as well as non-existing
(abstract) files. However, the parent directory of the file \b must exist.
The result of this dichotomy is a blending of the persistence gained by referring
to entries with a reference to their internal filesystem node and the flexibility gained
by referring to entries by name.
For example, if the directory in which the entry resides (or a
directory further up in the hierarchy) is moved or renamed, the entry_ref will
still refer to the correct file (whereas a pathname to the previous location of the
file would now be invalid).
On the other hand, say that the entry_ref refers to a concrete file. If the file
itself is renamed, the entry_ref now refers to an abstract file with the old name
(the upside in this case is that abstract entries may be represented by entry_refs
without preallocating an internal filesystem node for them).
*/
//! Creates an unitialized entry_ref.
entry_ref::entry_ref()
:
device((dev_t)-1),
directory((ino_t)-1),
name(NULL)
{
}
/*! \brief Creates an entry_ref initialized to the given file name in the given
directory on the given device.
\p name may refer to either a pre-existing file in the given
directory, or a non-existent file. No explicit checking is done to verify validity of the given arguments, but
later use of the entry_ref will fail if \p dev is not a valid device or \p dir
is a not a directory on \p dev.
\param dev the device on which the entry's parent directory resides
\param dir the directory in which the entry resides
\param name the leaf name of the entry, which is not required to exist
*/
entry_ref::entry_ref(dev_t dev, ino_t dir, const char *name)
:
device(dev),
directory(dir),
name(NULL)
{
set_name(name);
}
/*! \brief Creates a copy of the given entry_ref.
\param ref a reference to an entry_ref to copy
*/
entry_ref::entry_ref(const entry_ref &ref)
:
device(ref.device),
directory(ref.directory),
name(NULL)
{
set_name(ref.name);
}
/*! Destroys the object and frees the storage allocated for the leaf name,
if necessary.
*/
entry_ref::~entry_ref()
{
free(name);
}
/*! \brief Set the entry_ref's leaf name, freeing the storage allocated for any previous
name and then making a copy of the new name.
\param name pointer to a null-terminated string containing the new name for
the entry. May be \c NULL.
*/
status_t
entry_ref::set_name(const char *newName)
{
free(name);
if (newName == NULL) {
name = NULL;
} else {
name = strdup(newName);
if (!name)
return B_NO_MEMORY;
}
return B_OK;
}
/*! \brief Compares the entry_ref with another entry_ref, returning true if
they are equal.
\return
- \c true - The entry_refs are equal
- \c false - The entry_refs are not equal
*/
bool
entry_ref::operator==(const entry_ref &ref) const
{
return device == ref.device
&& directory == ref.directory
&& (name == ref.name
|| (name != NULL && ref.name != NULL && !strcmp(name, ref.name)));
}
/*! \brief Compares the entry_ref with another entry_ref, returning true if they are not equal.
\return
- \c true - The entry_refs are not equal
- \c false - The entry_refs are equal
*/
bool
entry_ref::operator!=(const entry_ref &ref) const
{
return !(*this == ref);
}
/*! \brief Makes the entry_ref a copy of the entry_ref specified by \a ref.
\param ref the entry_ref to copy
\return
- A reference to the copy
*/
entry_ref&
entry_ref::operator=(const entry_ref &ref)
{
if (this == &ref)
return *this;
device = ref.device;
directory = ref.directory;
set_name(ref.name);
return *this;
}
/*!
\var dev_t entry_ref::device
\brief The device id of the storage device on which the entry resides
*/
/*!
\var ino_t entry_ref::directory
\brief The inode number of the directory in which the entry resides
*/
/*!
\var char *entry_ref::name
\brief The leaf name of the entry
*/
/*!
\class BEntry
\brief A location in the filesystem
The BEntry class defines objects that represent "locations" in the file system
hierarchy. Each location (or entry) is given as a name within a directory. For
example, when you create a BEntry thus:
\code
BEntry entry("/boot/home/fido");
\endcode
...you're telling the BEntry object to represent the location of the file
called fido within the directory \c "/boot/home".
\author <a href='mailto:bonefish@users.sf.net'>Ingo Weinhold</a>
\author <a href='mailto:tylerdauwalder@users.sf.net'>Tyler Dauwalder</a>
\author <a href='mailto:scusack@users.sf.net'>Simon Cusack</a>
\version 0.0.0
*/
// #pragma mark -
//! Creates an uninitialized BEntry object.
/*! Should be followed by a call to one of the SetTo functions,
or an assignment:
- SetTo(const BDirectory*, const char*, bool)
- SetTo(const entry_ref*, bool)
- SetTo(const char*, bool)
- operator=(const BEntry&)
*/
BEntry::BEntry()
:
fDirFd(-1),
fName(NULL),
fCStatus(B_NO_INIT)
{
}
//! Creates a BEntry initialized to the given directory and path combination.
/*! If traverse is true and \c dir/path refers to a symlink, the BEntry will
refer to the linked file; if false, the BEntry will refer to the symlink itself.
\param dir directory in which \a path resides
\param path relative path reckoned off of \a dir
\param traverse whether or not to traverse symlinks
\see SetTo(const BDirectory*, const char *, bool)
*/
BEntry::BEntry(const BDirectory *dir, const char *path, bool traverse)
:
fDirFd(-1),
fName(NULL),
fCStatus(B_NO_INIT)
{
SetTo(dir, path, traverse);
}
//! Creates a BEntry for the file referred to by the given entry_ref.
/*! If traverse is true and \a ref refers to a symlink, the BEntry
will refer to the linked file; if false, the BEntry will refer
to the symlink itself.
\param ref the entry_ref referring to the given file
\param traverse whether or not symlinks are to be traversed
\see SetTo(const entry_ref*, bool)
*/
BEntry::BEntry(const entry_ref *ref, bool traverse)
:
fDirFd(-1),
fName(NULL),
fCStatus(B_NO_INIT)
{
SetTo(ref, traverse);
}
//! Creates a BEntry initialized to the given path.
/*! If \a path is relative, it will
be reckoned off the current working directory. If \a path refers to a symlink and
traverse is true, the BEntry will refer to the linked file. If traverse is false,
the BEntry will refer to the symlink itself.
\param path the file of interest
\param traverse whether or not symlinks are to be traversed
\see SetTo(const char*, bool)
*/
BEntry::BEntry(const char *path, bool traverse)
:
fDirFd(-1),
fName(NULL),
fCStatus(B_NO_INIT)
{
SetTo(path, traverse);
}
//! Creates a copy of the given BEntry.
/*! \param entry the entry to be copied
\see operator=(const BEntry&)
*/
BEntry::BEntry(const BEntry &entry)
: fDirFd(-1),
fName(NULL),
fCStatus(B_NO_INIT)
{
*this = entry;
}
//! Frees all of the BEntry's allocated resources.
/*! \see Unset()
*/
BEntry::~BEntry()
{
Unset();
}
//! Returns the result of the most recent construction or SetTo() call.
/*! \return
- \c B_OK Success
- \c B_NO_INIT The object has been Unset() or is uninitialized
- <code>some error code</code>
*/
status_t
BEntry::InitCheck() const
{
return fCStatus;
}
/*! \brief Returns true if the Entry exists in the filesytem, false otherwise.
\return
- \c true - The entry exists
- \c false - The entry does not exist
*/
bool
BEntry::Exists() const
{
// just stat the beast
struct stat st;
return (GetStat(&st) == B_OK);
}
const char*
BEntry::Name() const
{
if (fCStatus != B_OK)
return NULL;
return fName;
}
/*! \brief Fills in a stat structure for the entry. The information is copied into
the \c stat structure pointed to by \a result.
\b NOTE: The BStatable object does not cache the stat structure; every time you
call GetStat(), fresh stat information is retrieved.
\param result pointer to a pre-allocated structure into which the stat information will be copied
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::GetStat(struct stat *result) const
{
if (fCStatus != B_OK)
return B_NO_INIT;
return _kern_read_stat(fDirFd, fName, false, result, sizeof(struct stat));
}
/*! \brief Reinitializes the BEntry to the path or directory path combination,
resolving symlinks if traverse is true
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::SetTo(const BDirectory *dir, const char *path, bool traverse)
{
// check params
if (!dir)
return (fCStatus = B_BAD_VALUE);
if (path && path[0] == '\0') // R5 behaviour
path = NULL;
// if path is absolute, let the path-only SetTo() do the job
if (BPrivate::Storage::is_absolute_path(path))
return SetTo(path, traverse);
Unset();
if (dir->InitCheck() != B_OK)
fCStatus = B_BAD_VALUE;
// dup() the dir's FD and let set() do the rest
int dirFD = _kern_dup(dir->get_fd());
if (dirFD < 0)
return (fCStatus = dirFD);
return (fCStatus = set(dirFD, path, traverse));
}
/*! \brief Reinitializes the BEntry to the entry_ref, resolving symlinks if
traverse is true
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::SetTo(const entry_ref *ref, bool traverse)
{
Unset();
if (ref == NULL)
return (fCStatus = B_BAD_VALUE);
// open the directory and let set() do the rest
int dirFD = _kern_open_dir_entry_ref(ref->device, ref->directory, NULL);
if (dirFD < 0)
return (fCStatus = dirFD);
return (fCStatus = set(dirFD, ref->name, traverse));
}
/*! \brief Reinitializes the BEntry object to the path, resolving symlinks if
traverse is true
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::SetTo(const char *path, bool traverse)
{
Unset();
// check the argument
if (!path)
return (fCStatus = B_BAD_VALUE);
return (fCStatus = set(-1, path, traverse));
}
/*! \brief Reinitializes the BEntry to an uninitialized BEntry object */
void
BEntry::Unset()
{
// Close the directory
if (fDirFd >= 0) {
_kern_close(fDirFd);
// BPrivate::Storage::close_dir(fDirFd);
}
// Free our leaf name
free(fName);
fDirFd = -1;
fName = NULL;
fCStatus = B_NO_INIT;
}
/*! \brief Gets an entry_ref structure for the BEntry.
\param ref pointer to a preallocated entry_ref into which the result is copied
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::GetRef(entry_ref *ref) const
{
if (fCStatus != B_OK)
return B_NO_INIT;
if (ref == NULL)
return B_BAD_VALUE;
struct stat st;
status_t error = _kern_read_stat(fDirFd, NULL, false, &st,
sizeof(struct stat));
if (error == B_OK) {
ref->device = st.st_dev;
ref->directory = st.st_ino;
error = ref->set_name(fName);
}
return error;
}
/*! \brief Gets the path for the BEntry.
\param path pointer to a pre-allocated BPath object into which the result is stored
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::GetPath(BPath *path) const
{
if (fCStatus != B_OK)
return B_NO_INIT;
if (path == NULL)
return B_BAD_VALUE;
return path->SetTo(this);
}
/*! \brief Gets the parent of the BEntry as another BEntry.
If the function fails, the argument is Unset(). Destructive calls to GetParent() are
allowed, i.e.:
\code
BEntry entry("/boot/home/fido");
status_t err;
char name[B_FILE_NAME_LENGTH];
// Spit out the path components backwards, one at a time.
do {
entry.GetName(name);
printf("> %s\n", name);
} while ((err=entry.GetParent(&entry)) == B_OK);
// Complain for reasons other than reaching the top.
if (err != B_ENTRY_NOT_FOUND)
printf(">> Error: %s\n", strerror(err));
\endcode
will output:
\code
> fido
> home
> boot
> .
\endcode
\param entry pointer to a pre-allocated BEntry object into which the result is stored
\return
- \c B_OK - Success
- \c B_ENTRY_NOT_FOUND - Attempted to get the parent of the root directory \c "/"
- "error code" - Failure
*/
status_t
BEntry::GetParent(BEntry *entry) const
{
// check parameter and initialization
if (fCStatus != B_OK)
return B_NO_INIT;
if (entry == NULL)
return B_BAD_VALUE;
// check whether we are the root directory
// It is sufficient to check whether our leaf name is ".".
if (strcmp(fName, ".") == 0)
return B_ENTRY_NOT_FOUND;
// open the parent directory
char leafName[B_FILE_NAME_LENGTH];
int parentFD = _kern_open_parent_dir(fDirFd, leafName, B_FILE_NAME_LENGTH);
if (parentFD < 0)
return parentFD;
// set close on exec flag on dir FD
fcntl(parentFD, F_SETFD, FD_CLOEXEC);
// init the entry
entry->Unset();
entry->fDirFd = parentFD;
entry->fCStatus = entry->set_name(leafName);
if (entry->fCStatus != B_OK)
entry->Unset();
return entry->fCStatus;
}
/*! \brief Gets the parent of the BEntry as a BDirectory.
If the function fails, the argument is Unset().
\param dir pointer to a pre-allocated BDirectory object into which the result is stored
\return
- \c B_OK - Success
- \c B_ENTRY_NOT_FOUND - Attempted to get the parent of the root directory \c "/"
- "error code" - Failure
*/
status_t
BEntry::GetParent(BDirectory *dir) const
{
// check initialization and parameter
if (fCStatus != B_OK)
return B_NO_INIT;
if (dir == NULL)
return B_BAD_VALUE;
// check whether we are the root directory
// It is sufficient to check whether our leaf name is ".".
if (strcmp(fName, ".") == 0)
return B_ENTRY_NOT_FOUND;
// get a node ref for the directory and init it
struct stat st;
status_t error = _kern_read_stat(fDirFd, NULL, false, &st,
sizeof(struct stat));
if (error != B_OK)
return error;
node_ref ref;
ref.device = st.st_dev;
ref.node = st.st_ino;
return dir->SetTo(&ref);
// TODO: This can be optimized: We already have a FD for the directory,
// so we could dup() it and set it on the directory. We just need a private
// API for being able to do that.
}
/*! \brief Gets the name of the entry's leaf.
\c buffer must be pre-allocated and of sufficient
length to hold the entire string. A length of \c B_FILE_NAME_LENGTH is recommended.
\param buffer pointer to a pre-allocated string into which the result is copied
\return
- \c B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::GetName(char *buffer) const
{
status_t result = B_ERROR;
if (fCStatus != B_OK) {
result = B_NO_INIT;
} else if (buffer == NULL) {
result = B_BAD_VALUE;
} else {
strcpy(buffer, fName);
result = B_OK;
}
return result;
}
/*! \brief Renames the BEntry to path, replacing an existing entry if clobber is true.
NOTE: The BEntry must refer to an existing file. If it is abstract, this method will fail.
\param path Pointer to a string containing the new name for the entry. May
be absolute or relative. If relative, the entry is renamed within its
current directory.
\param clobber If \c false and a file with the name given by \c path already exists,
the method will fail. If \c true and such a file exists, it will
be overwritten.
\return
- \c B_OK - Success
- \c B_ENTRY_EXISTS - The new location is already taken and \c clobber was \c false
- \c B_ENTRY_NOT_FOUND - Attempted to rename an abstract entry
- "error code" - Failure
*/
status_t
BEntry::Rename(const char *path, bool clobber)
{
// check parameter and initialization
if (path == NULL)
return B_BAD_VALUE;
if (fCStatus != B_OK)
return B_NO_INIT;
// get an entry representing the target location
BEntry target;
status_t error;
if (BPrivate::Storage::is_absolute_path(path)) {
error = target.SetTo(path);
} else {
int dirFD = _kern_dup(fDirFd);
if (dirFD < 0)
return dirFD;
// init the entry
error = target.fCStatus = target.set(dirFD, path, false);
}
if (error != B_OK)
return error;
return _Rename(target, clobber);
}
/*! \brief Moves the BEntry to directory or directory+path combination, replacing an existing entry if clobber is true.
NOTE: The BEntry must refer to an existing file. If it is abstract, this method will fail.
\param dir Pointer to a pre-allocated BDirectory into which the entry should be moved.
\param path Optional new leaf name for the entry. May be a simple leaf or a relative path;
either way, \c path is reckoned off of \c dir. If \c NULL, the entry retains
its previous leaf name.
\param clobber If \c false and an entry already exists at the specified destination,
the method will fail. If \c true and such an entry exists, it will
be overwritten.
\return
- \c B_OK - Success
- \c B_ENTRY_EXISTS - The new location is already taken and \c clobber was \c false
- \c B_ENTRY_NOT_FOUND - Attempted to move an abstract entry
- "error code" - Failure
*/
status_t
BEntry::MoveTo(BDirectory *dir, const char *path, bool clobber)
{
// check parameters and initialization
if (fCStatus != B_OK)
return B_NO_INIT;
if (dir == NULL)
return B_BAD_VALUE;
if (dir->InitCheck() != B_OK)
return B_BAD_VALUE;
// NULL path simply means move without renaming
if (path == NULL)
path = fName;
// get an entry representing the target location
BEntry target;
status_t error = target.SetTo(dir, path);
if (error != B_OK)
return error;
return _Rename(target, clobber);
}
/*! \brief Removes the entry from the file system.
NOTE: If any file descriptors are open on the file when Remove() is called,
the chunk of data they refer to will continue to exist until all such file
descriptors are closed. The BEntry object, however, becomes abstract and
no longer refers to any actual data in the filesystem.
\return
- B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::Remove()
{
if (fCStatus != B_OK)
return B_NO_INIT;
return _kern_unlink(fDirFd, fName);
}
/*! \brief Returns true if the BEntry and \c item refer to the same entry or
if they are both uninitialized.
\return
- true - Both BEntry objects refer to the same entry or they are both uninitialzed
- false - The BEntry objects refer to different entries
*/
bool
BEntry::operator==(const BEntry &item) const
{
// First check statuses
if (this->InitCheck() != B_OK && item.InitCheck() != B_OK) {
return true;
} else if (this->InitCheck() == B_OK && item.InitCheck() == B_OK) {
// Directories don't compare well directly, so we'll
// compare entry_refs instead
entry_ref ref1, ref2;
if (this->GetRef(&ref1) != B_OK)
return false;
if (item.GetRef(&ref2) != B_OK)
return false;
return (ref1 == ref2);
} else {
return false;
}
}
/*! \brief Returns false if the BEntry and \c item refer to the same entry or
if they are both uninitialized.
\return
- true - The BEntry objects refer to different entries
- false - Both BEntry objects refer to the same entry or they are both uninitialzed
*/
bool
BEntry::operator!=(const BEntry &item) const
{
return !(*this == item);
}
/*! \brief Reinitializes the BEntry to be a copy of the argument
\return
- A reference to the copy
*/
BEntry&
BEntry::operator=(const BEntry &item)
{
if (this == &item)
return *this;
Unset();
if (item.fCStatus == B_OK) {
fDirFd = _kern_dup(item.fDirFd);
if (fDirFd >= 0)
fCStatus = set_name(item.fName);
else
fCStatus = fDirFd;
if (fCStatus != B_OK)
Unset();
}
return *this;
}
/*! Reserved for future use. */
void BEntry::_PennyEntry1(){}
void BEntry::_PennyEntry2(){}
void BEntry::_PennyEntry3(){}
void BEntry::_PennyEntry4(){}
void BEntry::_PennyEntry5(){}
void BEntry::_PennyEntry6(){}
/*! \brief Updates the BEntry with the data from the stat structure according to the mask.
*/
status_t
BEntry::set_stat(struct stat &st, uint32 what)
{
if (fCStatus != B_OK)
return B_FILE_ERROR;
return _kern_write_stat(fDirFd, fName, false, &st, sizeof(struct stat),
what);
}
/*! Sets the Entry to point to the entry specified by the path \a path relative
to the given directory. If \a traverse is \c true and the given entry is a
symlink, the object is recursively set to point to the entry pointed to by
the symlink.
If \a path is an absolute path, \a dirFD is ignored.
If \a dirFD is -1, path is considered relative to the current directory
(unless it is an absolute path, that is).
The ownership of the file descriptor \a dirFD is transferred to the
function, regardless of whether it succeeds or fails. The caller must not
close the FD afterwards.
\param dirFD File descriptor of a directory relative to which path is to
be considered. May be -1, when the current directory shall be
considered.
\param path Pointer to a path relative to the given directory.
\param traverse If \c true and the given entry is a symlink, the object is
recursively set to point to the entry linked to by the symlink.
\return
- B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::set(int dirFD, const char *path, bool traverse)
{
bool requireConcrete = false;
FDCloser fdCloser(dirFD);
char tmpPath[B_PATH_NAME_LENGTH];
char leafName[B_FILE_NAME_LENGTH];
int32 linkLimit = B_MAX_SYMLINKS;
while (true) {
if (!path || strcmp(path, ".") == 0) {
// "."
// if no dir FD is supplied, we need to open the current directory
// first
if (dirFD < 0) {
dirFD = _kern_open_dir(-1, ".");
if (dirFD < 0)
return dirFD;
fdCloser.SetTo(dirFD);
}
// get the parent directory
int parentFD = _kern_open_parent_dir(dirFD, leafName,
B_FILE_NAME_LENGTH);
if (parentFD < 0)
return parentFD;
dirFD = parentFD;
fdCloser.SetTo(dirFD);
break;
} else if (strcmp(path, "..") == 0) {
// ".."
// open the parent directory
int parentFD = _kern_open_dir(dirFD, "..");
if (parentFD < 0)
return parentFD;
dirFD = parentFD;
fdCloser.SetTo(dirFD);
// get the parent's parent directory
parentFD = _kern_open_parent_dir(dirFD, leafName,
B_FILE_NAME_LENGTH);
if (parentFD < 0)
return parentFD;
dirFD = parentFD;
fdCloser.SetTo(dirFD);
break;
} else {
// an ordinary path; analyze it
char dirPath[B_PATH_NAME_LENGTH];
status_t error = BPrivate::Storage::parse_path(path, dirPath,
leafName);
if (error != B_OK)
return error;
// special case: root directory ("/")
if (leafName[0] == '\0' && dirPath[0] == '/')
strcpy(leafName, ".");
if (leafName[0] == '\0') {
// the supplied path is already a leaf
error = BPrivate::Storage::check_entry_name(dirPath);
if (error != B_OK)
return error;
strcpy(leafName, dirPath);
// if no directory was given, we need to open the current dir
// now
if (dirFD < 0) {
char *cwd = getcwd(tmpPath, B_PATH_NAME_LENGTH);
if (!cwd)
return B_ERROR;
dirFD = _kern_open_dir(-1, cwd);
if (dirFD < 0)
return dirFD;
fdCloser.SetTo(dirFD);
}
} else if (strcmp(leafName, ".") == 0
|| strcmp(leafName, "..") == 0) {
// We have to resolve this to get the entry name. Just open
// the dir and let the next iteration deal with it.
dirFD = _kern_open_dir(-1, path);
if (dirFD < 0)
return dirFD;
fdCloser.SetTo(dirFD);
path = NULL;
continue;
} else {
int parentFD = _kern_open_dir(dirFD, dirPath);
if (parentFD < 0)
return parentFD;
dirFD = parentFD;
fdCloser.SetTo(dirFD);
}
// traverse symlinks, if desired
if (!traverse)
break;
struct stat st;
error = _kern_read_stat(dirFD, leafName, false, &st,
sizeof(struct stat));
if (error == B_ENTRY_NOT_FOUND && !requireConcrete) {
// that's fine -- the entry is abstract and was not target of
// a symlink we resolved
break;
}
if (error != B_OK)
return error;
// the entry is concrete
if (!S_ISLNK(st.st_mode))
break;
requireConcrete = true;
// we need to traverse the symlink
if (--linkLimit < 0)
return B_LINK_LIMIT;
size_t bufferSize = B_PATH_NAME_LENGTH - 1;
error = _kern_read_link(dirFD, leafName, tmpPath, &bufferSize);
if (error < 0)
return error;
tmpPath[bufferSize] = '\0';
path = tmpPath;
// next round...
}
}
// set close on exec flag on dir FD
fcntl(dirFD, F_SETFD, FD_CLOEXEC);
// set the result
status_t error = set_name(leafName);
if (error != B_OK)
return error;
fdCloser.Detach();
fDirFd = dirFD;
return B_OK;
}
/*! \brief Handles string allocation, deallocation, and copying for the entry's leaf name.
\return
- B_OK - Success
- "error code" - Failure
*/
status_t
BEntry::set_name(const char *name)
{
if (name == NULL)
return B_BAD_VALUE;
free(fName);
fName = strdup(name);
if (!fName)
return B_NO_MEMORY;
return B_OK;
}
/*! \brief Renames the entry referred to by this object to the location
specified by \a target.
If an entry exists at the target location, the method fails, unless
\a clobber is \c true, in which case that entry is overwritten (doesn't
work for non-empty directories, though).
If the operation was successful, this entry is made a clone of the
supplied one and the supplied one is uninitialized.
\param target The entry specifying the target location.
\param clobber If \c true, the an entry existing at the target location
will be overwritten.
\return \c B_OK, if everything went fine, another error code otherwise.
*/
status_t
BEntry::_Rename(BEntry& target, bool clobber)
{
// check, if there's an entry in the way
if (!clobber && target.Exists())
return B_FILE_EXISTS;
// rename
status_t error = _kern_rename(fDirFd, fName, target.fDirFd, target.fName);
if (error == B_OK) {
Unset();
fCStatus = target.fCStatus;
fDirFd = target.fDirFd;
fName = target.fName;
target.fCStatus = B_NO_INIT;
target.fDirFd = -1;
target.fName = NULL;
}
return error;
}
/*! Debugging function, dumps the given entry to stdout. This function is not part of
the R5 implementation, and thus calls to it will mean you can't link with the
R5 Storage Kit.
\param name Pointer to a string to be printed along with the dump for identification
purposes.
*/
void
BEntry::Dump(const char *name)
{
if (name != NULL) {
printf("------------------------------------------------------------\n");
printf("%s\n", name);
printf("------------------------------------------------------------\n");
}
printf("fCStatus == %" B_PRId32 "\n", fCStatus);
struct stat st;
if (fDirFd != -1
&& _kern_read_stat(fDirFd, NULL, false, &st,
sizeof(struct stat)) == B_OK) {
printf("dir.device == %d\n", (int)st.st_dev);
printf("dir.inode == %lld\n", (long long)st.st_ino);
} else {
printf("dir == NullFd\n");
}
printf("leaf == '%s'\n", fName);
printf("\n");
}
// #pragma mark -
/*! \brief Returns an entry_ref for a given path.
\param path The path name referring to the entry
\param ref The entry_ref structure to be filled in
\return
- \c B_OK - Everything went fine.
- \c B_BAD_VALUE - \c NULL \a path or \a ref.
- \c B_ENTRY_NOT_FOUND - A (non-leaf) path component does not exist.
- \c B_NO_MEMORY - Insufficient memory for successful completion.
*/
status_t
get_ref_for_path(const char *path, entry_ref *ref)
{
status_t error = (path && ref ? B_OK : B_BAD_VALUE);
if (error == B_OK) {
BEntry entry(path);
error = entry.InitCheck();
if (error == B_OK)
error = entry.GetRef(ref);
}
return error;
}
/*! \brief Returns whether an entry is less than another.
The components are compared in order \c device, \c directory, \c name.
A \c NULL \c name is less than any non-null name.
\return
- true - a < b
- false - a >= b
*/
bool
operator<(const entry_ref &a, const entry_ref &b)
{
return a.device < b.device
|| (a.device == b.device
&& (a.directory < b.directory
|| (a.directory == b.directory
&& ((a.name == NULL && b.name != NULL)
|| (a.name != NULL && b.name != NULL
&& strcmp(a.name, b.name) < 0)))));
}
| 2024-04-09T01:26:35.434368 | https://example.com/article/9976 |
JASC-PAL
0100
16
24 24 24
65 74 106
123 156 255
98 131 230
74 106 213
222 230 238
189 213 238
156 172 222
230 197 106
213 164 74
164 131 65
230 230 255
205 205 255
65 98 164
131 131 131
255 255 255
| 2024-07-27T01:26:35.434368 | https://example.com/article/5589 |
Drilling and Completion Fluids Market Worth 12.76 Billion USD by 2023
According to a new market research report "Drilling and Completion Fluids Market by Application (Onshore and Offshore), Fluid System (Water-Based System, Oil-Based System, Synthetic-Based System), Well Type (Conventional and HPHT), and Region - Global Forecast to 2023", published by MarketsandMarkets™, the global market is expected to grow from an estimated USD 9.62 Billion in 2018 to USD 12.76 Billion by 2023, registering a CAGR of 5.82% during the forecast period. This growth can be attributed to the increased drilling activities for oil and gas production and rise in the exploration of shale gas.
The onshore segment is expected to hold the largest share of the Drilling & Completion Fluids Market, by application, during the forecast period
The onshore application segment led the Drilling & Completion Fluids Market in 2017 and is projected to dominate the market during the forecast period. As the majority of global oil and gas reserves are present onshore, it accounts for larger share of the total market. Drilling activities are on the rise in more challenging onshore regions, owing to an increase in the demand for oil & gas globally. The number of wells drilled onshore is drastically large than wells drilled offshore in 2017.
Water-based fluid system is expected to be the fastest-growing segment of the Drilling & Completion Fluids Market
The water-based fluid system is the largest segment of Drilling and Completion Fluids Market and is suitable for all applications including onshore and offshore. Water-based fluids are cost-effective and eco-friendly as compared to non-aqueous based fluids. Technological advancements have resulted in the use of water-based fluids in challenging high-pressure high-temperature conditions in deep and ultra-deepwater drilling activities. The discharge policies for water-based fluids are also not very stringent across the world due to the presence of less toxic chemicals. Thus, water-based fluid is the fastest growing segment due to cost effectiveness, less toxicity, and easy availability.
North America: The leading market for drilling & completion fluids
The North America Drilling and Completion Fluids Market is driven by the increase in oilfield discoveries and drilling activities across the region. The rise in the exploration of shale gas, tight oil, and other unconventional resources has increased the demand for drilling and completion fluids. The presence of vast shale gas reserves in the North American region has resulted in improved offshore activities in this region. The offshore exploration activities in the Gulf of Mexico are on the rise, which has led the companies to expand within the region. North America is also at the forefront of forming policies and regulations for the prevention of the degradation of the environment.
To enable an in-depth understanding of the competitive landscape, the report includes the profiles of some of the top players in the Drilling & Completion Fluids Market. These players include BHGE (US), Halliburton (US), Schlumberger (US), Canada Energy Services (Canada), and Newpark Resources (US). The leading players are trying to make inroads in the market in the developed economies and are adopting various strategies to increase their market shares.
MarketsandMarkets™ provides quantified B2B research on 30,000 high growth niche opportunities/threats which will impact 70% to 80% of worldwide companies' revenues. Currently servicing 5000 customers worldwide including 80% of global Fortune 1000 companies as clients. Almost 75,000 top officers across eight industries worldwide approach MarketsandMarkets™ for their painpoints around revenues decisions.
Our 850 fulltime analyst and SMEs at MarketsandMarkets™ are tracking global high growth markets following the "Growth Engagement Model - GEM". The GEM aims at proactive collaboration with the clients to identify new opportunities, identify most important customers, write "Attack, avoid and defend" strategies, identify sources of incremental revenues for both the company and its competitors. MarketsandMarkets™ now coming up with 1,500 MicroQuadrants (Positioning top players across leaders, emerging companies, innovators, strategic players) annually in high growth emerging segments. MarketsandMarkets™ is determined to benefit more than 10,000 companies this year for their revenue planning and help them take their innovations/disruptions early to the market by providing them research ahead of the curve.
MarketsandMarkets's flagship competitive intelligence and market research platform, "Knowledge Store" connects over 200,000 markets and entire value chains for deeper understanding of the unmet insights along with market sizing and forecasts of niche markets. | 2023-12-16T01:26:35.434368 | https://example.com/article/9831 |
All images copyright Michael Cox, use the 'comment' option to contact me. I hope you enjoy following my travels and birding experiences.
NOTE: To navigate the blog you need to click through the 'Previous Posts' section to the right hand side, and yes the most recent appears at the top so you may want to go to the start of a section and work forward.
Wednesday, June 06, 2012
Birding in Arizona - Day 7, Gilbert
We got up extra early, 3am so we could leave around 4:30am, which we managed. I handed back the wheelchair and we set off. The road is pretty straight but involves a descent of 5,000 feet so there's some pretty steep angles involved! We enjoyed watching the dawn break and then the sun rise over the desert landscape. We were able to take advantage of the HOV lanes heading into and out of Phoenix and so made it to the Gilbert Wetlands at a pretty early 7am. Helen had planned to try and hop to a viewing area, but it became quickly clear that she couldn't so she sat in shade in a picnic area and I headed for a brisk walk around the preserve.
The Curve-billed Thrasher didn't seem to mind (could be Bendire's but I don't want to call it!)
Verdin and juveniles abounded:
As did herons of various ilks, including this feeding Snowy Egret:
A Magnificent Hummingbird proved very inquisitive:
Great-tailed Grackles are always showing off:
More Heron, this a Great White Egret:
then a Great Blue Heron:
Double-crested Cormorant drying its wings after a successful fishing trip:
In Winter and the desert Spring, the preserve is teeming with birds, the locals however seemed disappointed. I wasn't, I really enjoy seeing American Avocet:
Helen was being staked out by a strange chap by the time I returned so we gave up and I reversed our car onto the trail to collect her and we headed on to Tuscon and our last hotel, the Westin La Paloma.
0 Comments:
Links to this post:
About Me
I have a passion for wildlife and birdlife in particular. I am fascinated by the diversity and beauty of nature and worried by the impact of humans. This blog is my way of sharing my learning journey, including the (many) mistakes... | 2024-06-17T01:26:35.434368 | https://example.com/article/4510 |
Yoshito Matsushige
was a Japanese photojournalist who survived the dropping of the atomic bomb on the city of Hiroshima on 6 August 1945 and took five photographs on the day of the bombing in Hiroshima, the only photographs taken that day within Hiroshima that are known.
Matsushige was born in Kure, Hiroshima in 1913. He took a job at a newspaper after finishing school and in 1943 entered the photography section of the newspaper Chugoku Shimbun.
Matsushige was at home 2.7 km south of the hypocentre at the time of the explosion. He was not seriously injured, and determined to go to the city centre. A fire forced him back to Miyuki bridge, where the scene of desperate and dying people prevented him from using his camera for twenty minutes, when he took two frames at about 11:00. He tried again later that day but was too nauseated to take more than three more frames. The first two frames are of people who escaped serious injury next to Miyuki bridge; the second of these is taken closer up and shows them having cooking oil applied to their burns. A third shows a policeman, his head bandaged, issuing certificates to civilians. The last pair are taken close to home: one of the damage to his family's barbershop, and another out of his window.
Matsushige was unable to develop the film for twenty days, and even then had to do so at night and in the open, rinsing it in a stream. The negatives had severely deteriorated by the 1970s, requiring intensive restoration work.
References
Further reading
Iwakura Tsutomu. "The Need for a Photographic and Motion Picture Museum for Peace". Kaku: Hangenki, pp. 12–14.
Kaku: Hangenki (核:半減期) / The Half Life of Awareness: Photographs of Hiroshima and Nagasaki. Tokyo: Tokyo Metropolitan Museum of Photography, 1995. Exhibition catalogue; captions and text in both Japanese and English. Three photographs by Matsushige are reproduced (other works are by Ken Domon, Toshio Fukada, Kikujirō Fukushima, Shigeo Hayashi, Kenji Ishiguro, Shunkichi Kikuchi, Mitsugi Kishida, Eiichi Matsumoto, Shōmei Tōmatsu, Hiromi Tsuchida and Yōsuke Yamahata).
Kaneko Ryuichi. "The Half-Life of Awareness: Photographs of Hiroshima and Nagasaki". Kaku: Hangenki, pp. 21–24.
External links
Testimony of Yoshito Matsushige
Photographs taken by Yoshito Matsushige in Hiroshima
His obituary
Category:Japanese photojournalists
Category:1913 births
Category:2005 deaths
Category:Hibakusha
Category:People from Kure, Hiroshima
Category:20th-century photographers
Category:20th-century Japanese artists | 2024-03-04T01:26:35.434368 | https://example.com/article/4333 |
Thanks!! I understand the weather just starting to cool there. Same thing here, but it’s different. But the same if that makes sense. The 110, 105 degree days are very slowly waning. Thirty days will be rather different here. I bet you guys are dreaming of fresh powder on the slopes. 😎❤️ | 2024-01-23T01:26:35.434368 | https://example.com/article/8171 |
Patterns and causes of gender differences in smoking.
In the early twentieth century in the United States and other Western countries, women were much less likely than men to smoke cigarettes, due in part to widespread social disapproval of women's smoking. During the mid-twentieth century, growing social acceptance of women's smoking contributed to increased smoking adoption by women. Increased social acceptance of women's smoking was part of a general liberalization of norms concerning women's behavior, reflecting increasing equality between the sexes. These historical trends were due in part to increases in women's employment. However, in the contemporary period employment appears to have little or no effect on women's smoking. Sex role norms and general expectations concerning gender-appropriate behavior have had a variety of effects on gender differences in smoking. First, general characteristics of traditional sex roles, including men's greater social power and generally greater restrictions on women's behavior, contributed to widespread social pressures against women's smoking. Second, traditional sex role norms and expectations have fostered gender differences in personal characteristics and experiences which influence smoking adoption. For example, rebelliousness has been more expected and accepted for males, and greater rebelliousness among adolescent males has contributed to greater smoking adoption by males. Finally, certain aspects of sex roles have contributed to gender differences in appraisal of the costs and benefits of smoking. For example, physical attractiveness is emphasized more for females and the contemporary beauty ideal is very slender, so females are more likely to view weight control as a benefit of smoking. Several other hypotheses concerning the causes of gender differences in smoking are not supported by the available evidence. For example, it appears that women's generally greater concern with health has not contributed significantly to gender differences in the prevalence of smoking. Similarly, it appears that sex differences in physiological responses to smoking have made only minor contributions to gender differences in smoking adoption or cessation. | 2024-04-20T01:26:35.434368 | https://example.com/article/4831 |
Q:
Cannot parse date with jQuery UI
I get an Invalid date exception when I try to parse the following date with jQuery UI datepicker's parseDate utility function:
$.datepicker.parseDate("ddmy", "10982");
I'm using jQuery 1.8.0. Can anybody help me out?
A:
After some investigation it seems like jQuery can't parse a date with a single digit for days or months (although I still think this should be possible according to the docs).
I'm now using a workaround where I pad the user entered string, before I feed it to jQuery's parse function:
var text = ...
if (text.length === 4) { // dmyy
text = "0" + text.substring(0, 1) + "0" + text.substring(1);
} else if (text.length === 5) { // ddmyy
text = text.substring(0, 2) + "0" + text.substring(2);
}
$.datepicker.parseDate("ddmmyy", text);
| 2024-07-03T01:26:35.434368 | https://example.com/article/9032 |
Latest analysis
China is likely to take an economic hit from its crackdown on scrap imports, prompting it to adopt a more pragmatic approach in the future, panelists of the Bureau of International Recycling’s (BIR) International Trade Council said at the association's Barcelona conference.
China has announced several drastic measures to curtail the import of scrap into the country in recent months.
The country’s government announced in April that it will ban imports of all Category 7 scrap items by the end of 2018 and the importation of several other scrap items - including stainless steel scrap - by 2019 on environmental grounds.
China officially adopted new scrap metal import regulations on March 1 which determine the new thresholds for impurities allowed in non-ferrous scrap imports at a maximum of 1%.
Separately, the country also applied a 25% import tariff on US-origin aluminium scrap and suspended operations at its China National Certification and Inspection Group (CCIC) North America division for 30 days, which halted US non-ferrous scrap export trading to China earlier in May.
But such a hardline regulatory approach could backfire on the country given that it is not yet self-sufficient in scrap, panelists said.
“The impact of this is going to be substantial, particularly in regards to imports, because China isn’t self-sufficient yet. So that’s going to have an impact, and they may have to look at that,” Tom Bird, chief executive officer of the Chinese recycler Chiho Environmental Group, said on Tuesday May 29.
“I also think that in terms of how they enforce the regulations, there has to be some form of pragmatism. It’s all or nothing and, at the moment, it is all. There has to be some recognition that there is a transitionary period,” Bird said.
“Certainly, pragmatism is something that we associate with how China develops policies over a period of time so perhaps it is a situation when they are tough first but pragmatism probably in the form of economics will come into play in due course,” Michael Lion, president of Everwell Resources, said.
William Schmiedel, president of Sims Metal Management’s global trading division, also felt that China could adopt a more practical approach over time.
“Their drive for cleaning the environment is there and it is there to stay, but that doesn’t mean that there won’t be some type of retrenchment,” Schmiedel said.
Any negative economic consequences from restricting non-ferrous scrap imports would give a window of opportunity to interest groups for materials like copper to try and lobby the government to soften their stance on scrap imports in 1.5-2 years’ time, Lion predicted. “Money will come into it at some stage,” he said.
But in the short term, it is unlikely that any senior figures in China will criticize the policy of Chinese president Xi Jinping and try to get a changing of stance, Lion said.
Large import volumes
Despite China’s hardening approach to non-ferrous scrap imports, it has still imported a large volume of the material in recent times.
China imported a total of 2.17 million tonnes of aluminium scrap in 2017, up 13.26% compared with 2016. Among them, 618,287 tonnes were shipped from the US, according to China Customs data.
But in the first quarter of 2018, 486,512 tonnes of aluminium scrap arrived in China, which was down 7.58% year-on-year. Shipments from the US dropped 4.35% over the same period to 137,161 tonnes.
Copper scrap imports showed a more significant drop in the first quarter of 2018, with the total copper scrap volumes imported from US during this period dropping by 39.05% year-on-year to 552,696 tonnes.
As a result of the category 7 ban, US-based companies are investing in machinery to carry out processing of low-grade scrap in their own country instead of shipping material out to China to be processed, attendees said on the sidelines.
At the same time, China-based companies are also preparing to open processing facilities in alternative import locations such as Thailand and Vietnam, delegates said.
But any possibility of China taking a softer approach to scrap imports in a few years’ time poses a tricky dilemma for companies making these investments.
Such a situation could create “white elephants”, with companies having invested in what could become potentially unprofitable units, Lion said.
Another potential knock-on effect is the possibility of other countries adopting similar legislation to China in their approach to regulating non-ferrous scrap imports.
“What is happening in China will be enforced stricter and will probably spread over. [Scrap is] going to new markets but very likely those markets are going to copy at one point in time what China has done,” Arnaud Brunet, director general of the BIR, said.
Shipment issues
The application of 25% tariffs on shipments on US-origin aluminum scrap and the closure of the US CCIC office until June 4 has created havoc in the markets, delegates said.
CCIC Canada was given the authority to inspect non-ferrous scrap shipments earmarked for China until June 4 in a move that market participants hoped would ease the bottleneck of material awaiting pre-shipment inspection certificates.
Regardless, with thousands of non-ferrous scrap containers now stuck in limbo following China’s sudden suspension of its North American customs inspection division, market participants are holding their breath for the previously announced June 4 restart of the CCIC North America operations.
Meanwhile, many containers of non-ferrous scrap have been diverted to Hong Kong but many of its ports are now overloaded and are refusing to take any more material, delegates said on the sidelines.
Counting the cost
The economic cost of the difficult trading relationship between China and the US could be vast, Tom Bird said.
“It is estimated that one month’s suspension of shipments will cost US exporters alone $400 million and another $100 million associated with market value and shipment diversions to other destinations such as India and Korea," he said.
“Although the impact is being felt mainly by the US, Europe is not immune with far more stringent inspection protocols leading to confusion and shipment delays," he added.
If a “full-blown global trade war” was to take place, around $2.30 trillion would be wiped off global trade by 2021, Bird said. China and the US would be the largest losers, accounting for a $1.40 trillion loss and Europe would see a loss of $360 billion by 2021.
Susan Zou in Shanghai and Brad MacAulay in Pittsburgh contributed to this report.
Email this article
Your details
Your recipients's details
You can enter a maximum of 5 recipients. Use ; to separate email addresses. | 2023-12-14T01:26:35.434368 | https://example.com/article/1927 |
e of c(b) wrt b.
-1560*b**2
Let h(v) = -v**2 + 15*v. Suppose -5*f = -r + 32, 5*r - f + 3*f - 25 = 0. Let a(k) = -8*k. Let j(b) = r*a(b) + 4*h(b). Find the second derivative of j(o) wrt o.
-8
Let z(o) = 17*o - 12. Let n(x) = -1. Let b(y) = -4*n(y) + z(y). Differentiate b(a) wrt a.
17
Let v = -3 - -5. Let m(k) = k**4 - k**3 + 1. Let c(f) = 3*f**4 - 2*f**3 + 4*f**2 + 2. Let w(o) = v*m(o) - c(o). What is the third derivative of w(x) wrt x?
-24*x
What is the first derivative of -21 + 16 - 29*y**2 + 1 wrt y?
-58*y
Suppose -n - 9 + 3 = 0. Let h(p) = 4*p**2 - 11*p - 5. Let j(z) = 5*z**2 - 12*z - 6. Let d(b) = n*h(b) + 5*j(b). Find the second derivative of d(t) wrt t.
2
Let v(w) = w**4 - w**3 - w**2 + w - 1. Let l(t) = 3*t**4 + 4*t**3 + 6*t**2 - 4*t + 4. Let y(p) = l(p) + 4*v(p). What is the third derivative of y(r) wrt r?
168*r
What is the third derivative of -9*z**2 + z**2 - 4*z**6 - 5*z**2 - 3*z**6 wrt z?
-840*z**3
Let y(n) = -2 - 3*n + 2*n + 1. Let v(r) = -7*r - 6. Let p(w) = 6*w + 5. Let j(s) = 4*p(s) + 3*v(s). Let d(g) = 2*j(g) + 7*y(g). Differentiate d(f) wrt f.
-1
Suppose 11 + 17 = 4*m. Differentiate 0 - m - 5*q**4 + 2 wrt q.
-20*q**3
Let y(b) be the second derivative of -b**5/10 - b**4/24 - 2*b**2 - 6*b. Let s(m) be the first derivative of y(m). What is the second derivative of s(k) wrt k?
-12
Let f(y) = y**4 - y**2 + y. Let i(x) = -9*x**4 + 3*x**2 - 3*x + 3. Let d(t) = -3*f(t) - i(t). Find the first derivative of d(o) wrt o.
24*o**3
Let q(s) = 10*s**3 - 3*s**2 + 3*s - 33. Let v(n) = -21*n**3 + 5*n**2 - 5*n + 67. Let a(h) = -5*q(h) - 3*v(h). Differentiate a(w) with respect to w.
39*w**2
Let m(w) = 6*w**3 + 7*w**2 - 4*w. Let k = -11 + 7. Let z(x) = -5*x**3 - 6*x**2 + 3*x. Let r(g) = k*z(g) - 3*m(g). Find the third derivative of r(b) wrt b.
12
Let s(h) be the second derivative of -h**8/1344 + h**5/30 - h**4/3 + 5*h. Let u(w) be the third derivative of s(w). Differentiate u(o) with respect to o.
-15*o**2
Let i(z) be the first derivative of -z**6/60 + z**5/60 + 3*z**2/2 + 1. Let y(o) be the second derivative of i(o). What is the third derivative of y(u) wrt u?
-12
Suppose -2*m + 12 = 2*m. What is the third derivative of 3*u**4 + 0*u**3 + 2*u**2 + 0*u**m + 0*u**3 wrt u?
72*u
Let n be (16/(-10))/(6/(-15)). Suppose -10 = -5*q - 4*z, -z = -n*q - 3*z + 14. Find the third derivative of c**2 + 6*c**6 - 4*c**q + c**2 wrt c.
240*c**3
Let h(l) = 6. Let m(k) = -4*k - 3 + 6*k + 1. Let v(b) = -3*b + 3. Let r(o) = -4*m(o) - 3*v(o). Let z(p) = h(p) + 3*r(p). Differentiate z(c) with respect to c.
3
Find the second derivative of 6*v**2 + 2*v**5 + 0*v + v + v + 2*v**5 + 1 wrt v.
80*v**3 + 12
What is the first derivative of -4*z**4 + 7*z**4 + 2*z**4 + z**4 - 9 wrt z?
24*z**3
Let o = -6 + 9. Find the third derivative of -y**2 - o*y**4 - 2*y**4 + y**6 + 5*y**4 wrt y.
120*y**3
Let q be (-6)/21 + (-325)/(-35). What is the second derivative of 9*s**2 - q*s**2 - 5*s + 7*s**2 wrt s?
14
Let d(q) = -5*q**2 - 4*q - 71. Let n(s) = 2*s**2 + s + 24. Let w(u) = 4*d(u) + 14*n(u). What is the derivative of w(j) wrt j?
16*j - 2
What is the second derivative of -13*y + 7*y + 18*y - 5*y**5 - 14*y**5 wrt y?
-380*y**3
Differentiate -69*y - 23 + 68*y - 15 + 4*y**2 wrt y.
8*y - 1
What is the second derivative of -2*w - 80*w**2 + 142*w**2 - 71*w**2 wrt w?
-18
Suppose -5*r + 4 = -3*r. Find the third derivative of -4*c**r - 7*c**3 + 7*c**3 + c**4 wrt c.
24*c
Let d(a) = -4*a**4 + 6*a + 11. Let c(v) = -2*v**4 + 3*v + 6. Let i(x) = -11*c(x) + 6*d(x). Find the second derivative of i(f) wrt f.
-24*f**2
Let t = -6 - -8. Let b(d) = -2*d**3 - 9*d**2 + 9*d - 1. Let k(g) = g**2 - g. Let w(o) = t*b(o) + 18*k(o). Differentiate w(n) with respect to n.
-12*n**2
Suppose 4*i + 0*i = 16. Let h be i/(1 + -1 + 2). Find the third derivative of -o**h + 0*o**2 + 2*o**6 + 0*o**2 wrt o.
240*o**3
Let s = 72 + -141/2. Let n(p) be the second derivative of 0*p**3 + 0 - 1/20*p**5 + s*p**2 + 0*p**4 - 2*p. Differentiate n(z) with respect to z.
-3*z**2
Let d = -2 - -6. What is the second derivative of -h**5 + 3*h**5 - d*h + 3*h wrt h?
40*h**3
What is the derivative of -49 + n - n + 48 - 2*n wrt n?
-2
Let f(n) be the first derivative of n**4/12 + n**2 + 4*n + 1. Let z(s) be the first derivative of f(s). Differentiate z(x) wrt x.
2*x
Let m(w) = -2*w**2 - 11*w - 1. Let f be m(-5). What is the third derivative of -3*x**5 - 4*x**2 - 4*x**f + 4*x**4 wrt x?
-180*x**2
Let u(n) be the third derivative of -7*n**6/30 - n**4/8 + 5*n**2. What is the second derivative of u(k) wrt k?
-168*k
Let i(o) be the first derivative of -o**4/8 - o**3/3 + 3*o**2 - 3. Let w(l) be the second derivative of i(l). What is the first derivative of w(s) wrt s?
-3
Let h(j) be the second derivative of 26*j**7/21 + 13*j**4/6 - 40*j. Find the third derivative of h(u) wrt u.
3120*u**2
Suppose 0 = 3*u + 2*f + 20, 0 = 4*u + 3*f + 8 + 17. Let g be 8/u*(-25)/10. What is the third derivative of -t**6 + 0*t**g - 3*t**2 - 2*t**6 - t**2 wrt t?
-360*t**3
Let t(p) be the first derivative of -6*p**7/7 + 12*p**3 - 3. What is the third derivative of t(c) wrt c?
-720*c**3
Let c(z) be the third derivative of -2*z**5/15 + 7*z**4/24 - 11*z**2. Find the second derivative of c(n) wrt n.
-16
Let x = 143 + -143. Let y(d) be the second derivative of 0 + x*d**3 - 2/15*d**6 - d + 3/2*d**2 + 0*d**4 + 0*d**5. Find the first derivative of y(k) wrt k.
-16*k**3
Find the third derivative of 1 + 5*y**2 - 2*y**2 - 45*y**2 + 54*y**3 wrt y.
324
Find the first derivative of 15*k**2 + 11*k**2 - 6*k**2 + 21 - 7*k**2 wrt k.
26*k
Find the second derivative of -4*t + 3*t + t**2 - 8*t + 6*t**2 wrt t.
14
Let w(d) = -8*d**2 - 12*d - 6. Let n(q) = -23*q**2 - 36*q - 17. Let t(x) = -6*n(x) + 17*w(x). Find the second derivative of t(v) wrt v.
4
Let p(i) = -i**3 - i**2 + i. Let k(b) = -19*b**4 + b**3 - 8*b**2 - b. Let c(q) = -k(q) - p(q). Find the third derivative of c(x) wrt x.
456*x
Let j(i) be the second derivative of i**4/3 + 11*i**2/2 - 2*i. What is the first derivative of j(z) wrt z?
8*z
Let u(t) be the third derivative of t**4/12 - 3*t**3/2 - t**2. Let c be u(6). Find the third derivative of -3*j**c + 2 - 2 + j**2 - 2*j**2 wrt j.
-18
Let g(t) be the second derivative of -1/6*t**3 + t + 0*t**2 + 0 - 1/10*t**5 + 0*t**4. What is the second derivative of g(i) wrt i?
-12*i
Let n(b) be the third derivative of b**8/336 - b**5/12 - 2*b**2. Find the third derivative of n(u) wrt u.
60*u**2
Let d(h) be the third derivative of -h**7/6 + 7*h**4/3 - 2*h**2 - 2*h. What is the second derivative of d(f) wrt f?
-420*f**2
Suppose 2*k = -m - 0*m + 12, -3*k = -4*m - 40. What is the third derivative of -z**2 - 6*z**3 + k - 8 wrt z?
-36
Let z(c) be the second derivative of c**7/840 + c**5/40 - c**4/4 - 4*c. Let a(o) be the third derivative of z(o). Find the first derivative of a(q) wrt q.
6*q
Suppose 4 = 2*l + 2*l. What is the first derivative of l + 6*h - 7 + 3 + 0 wrt h?
6
Let i(p) be the third derivative of p**2 - 1/15*p**5 + 0*p**4 + 2/3*p**3 + 0*p + 0. Differentiate i(b) wrt b.
-8*b
Let n = -34 - -36. Let x(v) be the first derivative of 3 + 0*v - 1/2*v**n + 0*v**3 + 3/4*v**4. Find the second derivative of x(w) wrt w.
18*w
Find the third derivative of 2*w**2 + 12*w**2 + 12*w**4 + 3*w**2 - 6*w**2 wrt w.
288*w
Let h be (-30 + 3)*1/(-3). Suppose -3*y = -0*y - h. Find the second derivative of 4*x - 3*x - 4*x**3 + 3*x**y wrt x.
-6*x
Let g(c) be the second derivative of 0*c**5 + 2/3*c**3 + 3*c - 1/6*c**6 + 0*c**4 + 0*c**2 + 0. Find the second derivative of g(m) wrt m.
-60*m**2
Suppose -2*c = z + 3*c - 25, 5*z + 2*c = 10. Suppose 0 + 2 = f. Find the third derivative of 3*b**f + 4*b**6 + z*b**6 - b**2 wrt b.
480*b**3
Let d(o) be the second derivative of 0*o**3 + 3/20*o**5 + 0*o**4 + 0 + 7*o + 5*o**2. What is the first derivative of d(n) wrt n?
9*n**2
Let p(m) = 14*m**5 - 4*m**2 + m + 4. Let d(h) = -h**5 + h**2 + h - 1. Let f(q) = -4*d(q) - p(q). Find the second derivative of f(r) wrt r.
-200*r**3
Suppose 0 = 7*a - 4*a + 6. Let j = 2 - a. Find the first derivative of -2 - 2*f**3 + 2*f**j + 2*f**3 wrt f.
8*f**3
Let n be 0*3/6*2. Suppose 0*b + 4*b - 2*i - 28 = n, -2 = 2*b + 3*i. What is the third derivative of -2*y**3 + 2*y + 2*y**2 - 2*y + b*y**3 wrt y?
18
Let a(i) be the first derivative of 11*i**4/4 - 2*i**3/3 + 11. What i | 2024-06-01T01:26:35.434368 | https://example.com/article/7495 |
So, why authors feel needed to pander otaku?>The initial design for the protagonist Koremitsu is that he’s a healthy (?) delinquent growing up in a normal family. However, since ‘a delinquent is the second greatest enemy of an otaku’, I changed him to be an unfortunate boy mistaken for a delinquent. Then, I thought, ‘if he’s tall, handsome, he’ll feel like someone who has a good life, and the biggest enemy of an otaku is someone who has the good life’. After trimming and adding a few parts, I have this current Koremitsu. | 2023-08-17T01:26:35.434368 | https://example.com/article/6659 |
Q:
spring security 3.0 unable to get/process user credentials
Please help me out for the below mentioned scenario....
applicationContext-security.xml
<authentication-manager>
<authentication-provider>
<jdbc-user-service data-source-ref="dataSource"
users-by-username-query="SELECT username, password FROM myLibrary.user WHERE username=?" />
</authentication-provider>
</authentication-manager>
database-end(MySQL)
CREATE TABLE `myLibrary`.`user` (
`id` int(11) NOT NULL AUTO_INCREMENT,
`enabled` bit(1) DEFAULT NULL,
`fullName` varchar(255) DEFAULT NULL,
`password` varchar(120) DEFAULT NULL,
`username` varchar(40) NOT NULL,
PRIMARY KEY (`id`),
UNIQUE KEY `id` (`id`),
UNIQUE KEY `username` (`username`)
);
xml-user
<user-service>
<user name="admin" password="amdin" authorities="supervisor, user" />
<user name="counter1" password="counter1" authorities="user" />
</user-service>
"dataSource"; values as perfect too...!!! And there is no exception in any logs....which means library integration is perfect. In fact while using XML based user definitions it works great....but in database access it falis.
My login page sticks to the same; i mean login fails. Pls help friends....!!!!
A:
Sorry for the delay....!!! so the problem is at the table responsible for users and that must have to be users. And it's running awesome.....!!! thanks friends.....thanks a lot...!!!!
<authentication-manager> <authentication-provider> <jdbc-user-service data-source-ref="dataSource"/> </authentication-provider> </authentication-manager>
Before the above xml-lines; make sure the table for the users must have to be users and also another table authorities must exists with foreign key to users - username. Ok..allow me to put the database part too..!!
CREATE TABLE `myLibrary`.`users` ( `id` int(11) NOT NULL AUTO_INCREMENT, `enabled` bit(1) DEFAULT NULL, `fullName` varchar(255) DEFAULT NULL, `password` varchar(120) DEFAULT NULL, `username` varchar(40) NOT NULL, PRIMARY KEY (`id`), UNIQUE KEY `id` (`id`), UNIQUE KEY `username` (`username`) );
CREATE TABLE `myLibrary`.`authorities` (
`id` int(11) NOT NULL AUTO_INCREMENT,
`authority` varchar(255) NOT NULL,
`username` varchar(255) NOT NULL,
`allowed` bit(1) DEFAULT NULL,
PRIMARY KEY (`id`),
UNIQUE KEY `id` (`id`),
KEY `fk_username` (`username`),
CONSTRAINT `fk_username` FOREIGN KEY (`username`) REFERENCES `users` (`username`) ON DELETE NO ACTION ON UPDATE NO ACTION
) ;
Please note that; authorities(allowed) is not mandatory....it's part of my code..as i want to show the user....all of it's authorities regardless of it's permission to use.
I am using hibernate and so i am getting ID field...and off-course it's upto you as fas as it's usability is concerned.
Have a nice day...!!!!
:)
| 2023-08-05T01:26:35.434368 | https://example.com/article/5896 |
May 9, 2012
Name:
Malachai
Age:
Ten months old
Gender:
Male
Kind:
Black Lorikeet
Home:
Tennessee, USA
Malachai
is one of the spunkiest birds I've ever owned. He loves everyone
and he's always happy to see us when we come home. He plays soccer on the
bottom of his cage 'cause when he's out, he rather be on us hanging off our
shirts being sweet and observe everything when we walk through the house.
The day we saw him was at the bird fair, I've never purchase birds from
bird fair ever in all the years I've been there. But this little guy stole
our heart. The handler couldn't get him to come out without using a towel
and I got him to come out without struggle. He hopped right onto my arm and
walked up my arm and then lay his head on my shoulder. I knew I was in
trouble right then and there. The handler was surprised to see that and
said I've been the only person he's done that with and he really likes me.
So we took him home, but unfortunately he wasn't weaned properly so he was
still begging to be fed and it really upset me. Since he's a nectar feeder,
and I had only gotten a little bag of it from the handler, I had to quickly
order some online. I received the order damaged with the powder leaking
everywhere. I was not about to use it so I sent it back for a replacement
and it was going to be another week before I got some and I was about to be
out of formula. I broke down and cried cause I didn't want him to starve
and not get the proper nutrition he needed. All the pet shops pretty much
stopped carrying nectar. Thank goodness for a breeder friend of mine who
had some on hand. I bought it from him to hold Malachai over until his
nectar got here.
He's such a sweetie pie that made us to be his slave, but we really
couldn't ask for a better bird. He will hop like a bunny and follow us
everywhere we go and likes to go inside of our shirts and cuddle. He'll
sleep in your shirt too. He'll lay on his back to play and roll the ball
around with his feet, he's just a joyful bird!
Malachai squeaks and chatters a lot. He does make a high pitched screech
that'll make you deaf for a bit if he does it by your ear. He's got a great
personality and he loves being with us whenever possible. He gets his warm
nectar every night while he gets fruits and veggies during the day with
some dry nectar sprinkled over it. He gets lory nuggets once a week, and
fresh filtered water daily. He loves toys, especially the ones with bells
in it. He rolls them around or kick it like playing soccer. He kisses us
every day and hangs on our shirts to observe everything. He's a silly
spunky bird! I would recommend Black Lory to anyone as long as they can
deal with the mess they make and their dietary requirements. He's one of my
top picks for a great companion!!! | 2024-02-06T01:26:35.434368 | https://example.com/article/8466 |
//
// UIBezierPathProperties.h
// PerformanceBezier
//
// Created by Adam Wulf on 2/1/15.
// Copyright (c) 2015 Milestone Made, LLC. All rights reserved.
//
#import <Foundation/Foundation.h>
#import <UIKit/UIKit.h>
@interface UIBezierPathProperties : NSObject <NSSecureCoding>
@property(nonatomic) BOOL isClosed;
@property(nonatomic) BOOL knowsIfClosed;
@property(nonatomic) BOOL isFlat;
@property(nonatomic) BOOL hasLastPoint;
@property(nonatomic) CGPoint lastPoint;
@property(nonatomic) BOOL hasFirstPoint;
@property(nonatomic) CGPoint firstPoint;
@property(nonatomic) CGFloat tangentAtEnd;
@property(nonatomic) NSInteger cachedElementCount;
@property(nonatomic, retain) UIBezierPath *bezierPathByFlatteningPath;
@property(nonatomic) BOOL lastAddedElementWasMoveTo;
-(CGFloat)cachedLengthForElementIndex:(NSInteger)index acceptableError:(CGFloat)error;
-(void)cacheLength:(CGFloat)length forElementIndex:(NSInteger)index acceptableError:(CGFloat)error;
@end
| 2024-02-04T01:26:35.434368 | https://example.com/article/7462 |
---
address:
- '$^{1}$Department of Physics, Bucknell University, Lewisburg, PA 17837, USA'
- '$^{2}$Institut für Physik, WA 331, Johannes Gutenberg-Universität, D-55099 Mainz, Germany'
- '$^{3}$Max-Planck-Institut für Polymerforschung, Postfach 3148, D-55021 Mainz, Germany'
author:
- 'Benjamin P. Vollmayr-Lee$^{1,2}$ and Erik Luijten$^{2,3}$'
date: 'November 24, 1999'
title: 'Comment on “Scaling Laws for a System with Long-Range Interactions within Tsallis Statistics”'
---
[2]{}
In their recent Letter [@salazar99], Salazar and Toral (ST) study numerically a finite Ising chain with non-integrable interactions $$\label{Heq}
{\cal H}/k_B T = -{1\over 2}\sum_{i\neq j} {Js_is_j\over r_{ij}^{d+\sigma}}
\;, \qquad (s_i=\pm 1)$$ where $-d\leq \sigma\leq 0$ [@notation] (like ST, we discuss general dimensionality $d$). In particular, they explore a presumed connection between non-integrable interactions and Tsallis’s non-extensive statistics. We point out that (i) non-integrable interactions provide no more motivation for Tsallis statistics than do integrable interactions, i.e., Gibbs statistics remain meaningful for the non-integrable case, and in fact provide a [*complete and exact treatment*]{}; and (ii) there are undesirable features of the method ST use to regulate the non-integrable interactions.
ST study a system of finite length $L$ which is simply terminated at the ends. Thus the system energy scales as $E\sim
L^{d+|\sigma|}$ (or $E\sim L^d \ln L$ for $\sigma=0$), and an intensive energy “density” is obtained from division by a “super-extensive volume.” We show below that the bulk free-energy density obtained from this “non-extensive thermodynamics” depends explicitly on the regulator, so all thermodynamics in this boundary-regulated model depend on boundary effects, and depend on the system shape as well for $d>1$. A discussion of these issues is lacking in [@salazar99].
A preferable model employs periodic boundary conditions, for which a cutoff in the interaction range [*must*]{} be introduced to regulate the energy. Then the bulk “non-extensive thermodynamics” depend explicitly on the shape of the cutoff, but not on the boundaries or the system shape.
This homogeneous model can be solved exactly, starting from a modified (\[Heq\]) with interactions $$\label{Jeq}
J \to \biggl\{
\renewcommand{\arraystretch}{1.2}
\begin{array}{lc}
R^{\sigma} w(r_{ij}/R) & -d\leq \sigma < 0 \\
(\ln R)^{-1} w(r_{ij}/R) & \sigma = 0 \;,
\end{array}$$ where the cutoff function $w(x)$ decays at least as fast as $1/x^{|\sigma|+\varepsilon}$ ($\varepsilon>0$) for large $x$, with $w(0)$ finite. This cutoff enables taking the thermodynamic limit. The remaining problem with interactions of range $R$ can be mapped exactly to a Kac-potential for $\sigma<0$ by identifying $\phi(x)=w(x)/x^{d+\sigma}$, so that the pair interaction is $R^{-d}\phi(r/R)$ (we present the case $\sigma=0$ elsewhere [@us99]). One then takes $R\to\infty$, where the lattice becomes negligible, and recovers the [*rigorous*]{} result for the free-energy density [@lebowitz66] $$\label{feq}
f/k_BT = \hbox{convex envelope}\{f^0/k_BT - A m^2\}$$ where $f^0$ is the hard-core free energy, $m=L^{-d}\sum s_i$, and $$\label{Aeq}
A = \left\{
\renewcommand{\arraystretch}{1.2}
\begin{array}{lc}
{\pi^{d/2}\over\Gamma(d/2)}\int_0^\infty w(x) x^{|\sigma|-1} dx &
-d\leq \sigma < 0 \\
\pi^{d/2} w(0)/ \Gamma(d/2) & \sigma=0
\end{array}
\right. \;.$$
Next, consider reversing the order of limits, with $R\to\infty$ and finite $L$. We present only $d=1$ for clarity. The spin $s_i$ interacts with all periodic repeats of $s_j$, leading to a net pair interaction of $$\label{eq:eff_pair_potential}
J_{ij} = R^\sigma \sum_{k=-\infty}^\infty
\frac{w\bigl(\left|kL+r_{ij}\right|/R\bigr)}{|kL+r_{ij}|^{1+\sigma}} \;.$$ Remarkably, as $R\to\infty$ this sum converges to the constant value $(2/L)\int_0^\infty w(x) x^{|\sigma|-1}dx$, thus giving pair interactions that are independent of spatial separation: the quintessential mean-field theory. Solving this mean-field theory in the thermodynamic limit gives exactly the same free energy as before, even for general $d$, thus demonstrating that (\[feq\]) is independent of the order of limits.
Finally, we can treat explicitly the sandwiched case $L \propto R \to \infty$ as well, by use of a hybrid of these two methods, obtaining again (\[feq\]) [@us99]. This last limit corresponds directly to “non-extensive thermodynamics,” since the $R^{\sigma}$ factor in (\[Jeq\]) may be interpreted instead as the $L$-dependent temperature employed in [@salazar99]. Thus we have solved, with standard methods, the homogeneous version of “non-extensive thermodynamics,” while the inhomogeneous version studied in [@salazar99] would result only in [*boundary-dependent*]{} modifications to (\[feq\]), due to the system-shape dependence of the cutoff function.
In summary, we find non-integrable interactions as amenable to Gibbs statistics as integrable interactions, leaving the application of alternative methods still with burden of motivation.
R. Salazar and R. Toral, Phys. Rev. Lett. [**83**]{}, 4233 (1999).
We do not follow [@salazar99] in using “long-range” to mean non-integrable, since “long-range interactions” already has a standard and important meaning: $0<\sigma < 2-\eta_{\rm sr}$.
B. P. Vollmayr-Lee and E. Luijten, in preparation.
J. L. Lebowitz and O. Penrose, J. Math. Phys. [**7**]{}, 98 (1966).
| 2023-09-10T01:26:35.434368 | https://example.com/article/1289 |
The show that’s described as a “docu-soap” will follow the young father as he embarks on a run for mayor of his hometown while co-raising his son Tripp and attempting to tackle small-town politics. If elected, Levi promises to serve his full term. Lawyer Verne E. Rupright is the current mayor of Wasilla.
But Levi explained that his current gig, starring in the “After Love” music video with singer Brittani Senser — who accompanied him to the Teen Choice Awards this weekend — has nothing to do with his ex Bristol Palin‘s family: “This video is not about the Palins in any way.”
Brittani agrees, saying, “I wrote it about a relationship that I was in years ago, and the whole disapproving mother thing was an idea that we had taken because it pertained to the end of my relationship. … The script wasn’t even there when Levi decided to do the video. It just kind of all evolved.”
Levi and Brittany insisted that they’re not an item, while he opened up about Bristol. “We’re just kind of on a break right now, going through a tough time,” says Levi of his former fiancée. “It’s over. Nothing you can do.” | 2023-12-22T01:26:35.434368 | https://example.com/article/7856 |
"They shot him right there, he was just walking -- I saw it," says Victoria Sharp . "I swear to God, he was just walking with his hands in the air." She's describing the January 26 killing of LaVoy Finicum, a member of the "Bundy Gang" of the armed occupation of the Malheur National Wildlife Refuge, shot by FBI agents and an Oregon State Police SWAT team.
- Advertisement -
Sharp's account doesn't go uncontested. Mark McConnell, described as a "witness", even though he was a mile away at the time of the shooting and was just "told" what happened, describes Finicum as "charging" the police. And unidentified "law enforcement sources" tell CNN that Finicum "reached down toward his waistband where he had a gun."
Grainy overhead video of the shooting, subsequently released by the FBI, does more to stir the pot than to resolve the conflicts of the stories.
Sound familiar? It should. There are a pair of competing legends in the making, both of which will incorporate preferred truths and discard inconvenient facts to reach the pre-desired conclusions. One legend being made by many of those who decried police actions to evict the Occupy Wall Street demonstrators and wanted Ferguson, Missouri police officer Daren Wilson's head on a platter for the killing of Michael Brown, are writing the "Bundy Gang" off as "terrorists" and pigeonholing Finicum's death as "suicide by cop."
Another legend is being made by many who thought that the Occupy Wall Street movement was a bunch of "smelly hippies" and wanted them swept from the streets. Many are the same ones that also made a hero out of police officer Darren Wilson who shot and killed Michael Brown in Ferguson, Missouri. Now those same people are portraying the "Bundy Gang" as heroes and Finicum as a martyr.
- Advertisement -
It is a strange contradiction of legends by the left and the right. I find myself in a strange position. For once, I am in the middle.
I don't know exactly what happened on Canfield Drive in Ferguson on August 9, 2014, or along US 395 in rural Oregon on January 26, 2016. Neither, in all likelihood, do you. We weren't there. One thing we can do is choose which lense to see those events through. There's another thing we can do. We can reaffirm the basic American principle that law enforcement personnel and other government employees are not special.
When a cop shoots someone under suspicious circumstances, brought into question by credible evidence or testimony, then that cop should be charged and tried for a crime just like you and I would be. Being a cop is not a license to kill.
Culpability in Finicum's death and the deaths from any other "killer cops" should be sorted out, taken before a grand jury if their is reasonable cause, and if so brought before a court of law to determine if there is reasonable doubt or proof of guilt, beyond a reasonable doubt. The fact that a killer or killers wear badges and collect government paychecks is irrelevant to the matter. | 2024-06-28T01:26:35.434368 | https://example.com/article/3362 |
Sold Out $50.00
Screen print
18 x 24 inches
Hand-numbered edition of 200
Officially licensed by Acme Archives
*Please note that due to NYCC, all screen prints have a 2-3 week shipping window. | 2024-01-12T01:26:35.434368 | https://example.com/article/3207 |
//
// Generated by class-dump 3.5 (64 bit) (Debug version compiled Jun 9 2015 22:53:21).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2014 by Steve Nygard.
//
#import "ICPAgentSharedPhotoStreamUserNotificationEvent.h"
@class NSString;
@interface ICPAgentNewCommentUserNotificationEvent : ICPAgentSharedPhotoStreamUserNotificationEvent
{
BOOL _isLike;
BOOL _isVideo;
NSString *_commentContent;
}
+ (id)matchPredicateForAlbumGUID:(id)arg1 photoGUID:(id)arg2 commentGUID:(id)arg3;
+ (id)eventWithUserNotificationManager:(id)arg1 comment:(id)arg2 assetCollection:(id)arg3 album:(id)arg4 info:(id)arg5;
+ (id)type;
@property BOOL isVideo; // @synthesize isVideo=_isVideo;
@property BOOL isLike; // @synthesize isLike=_isLike;
@property(retain) NSString *commentContent; // @synthesize commentContent=_commentContent;
- (void).cxx_destruct;
- (id)notificationIdentifier;
- (id)matchingIdentifier;
@property(retain) NSString *commentIdentifier;
- (void)postUserNotification;
- (id)initWithUserNotificationManager:(id)arg1 comment:(id)arg2 assetCollection:(id)arg3 album:(id)arg4 info:(id)arg5;
@end
| 2024-03-08T01:26:35.434368 | https://example.com/article/4718 |
Introduction
============
Glioblastoma, also known as glioblastoma multiforme (GBM), is the most aggressive primary tumor of the brain ([@b1-or-39-02-0465]--[@b3-or-39-02-0465]). Despite advances in surgical technology and adjuvant treatment for glioblastoma, this tumor remains the most lethal disease worldwide ([@b2-or-39-02-0465],[@b3-or-39-02-0465]). The molecular mechanisms underlying the invasion and metastasis of glioblastoma are still unknown.
Formerly, Wnts have been divided into two classes: those that signal through canonical (β-catenin dependent) pathway and those that signal through non-canonical (β-catenin independent) pathway ([@b4-or-39-02-0465]--[@b6-or-39-02-0465]). Wnt signaling participates in the development of embryo and pathological processes, including tumorigenesis and metastasis ([@b7-or-39-02-0465]). A homeobox transcription factor, MSX1 was able to inhibit the Wnt/β-catenin signaling pathway and suppress Wnt/β-catenin-induced migration and invasion of cultured glioblastoma cells ([@b8-or-39-02-0465]). Inhibition of the Wnt/β-catenin pathway significantly abrogated the invasion effects of irradiation, indicating a pivotal role of the Wnt/β-catenin pathway in ionizing radiation-induced invasion of U87 cells ([@b9-or-39-02-0465]).
Wnt5a is classified as a non-transforming Wnt family member that plays complex roles in cancer initiation and metastasis ([@b10-or-39-02-0465]--[@b12-or-39-02-0465]). Wnt5a activates small Rho-GTPases and regulates the cytoskeletal architecture and cellular polarity during development ([@b13-or-39-02-0465]). Wnt5a signaling is a regulator in the proliferation of human glioma cells ([@b14-or-39-02-0465]). However, very few studies have reported on the role of Wnt5a in glioblastoma cell invasion and migration ([@b15-or-39-02-0465],[@b16-or-39-02-0465]). In the present study, we propose for the first time that Wnt5a promotes the invasion of glioblastoma cells and is upregulated in invasive glioblastoma tissues. Moreover, the mechanisms whereby the Wnt5a/Daam1/RhoA signaling pathway regulates glioblastoma cell invasion are described.
Materials and methods
=====================
### Clinical samples
Tissue samples of nine glioblastoma patients from the Jinan Fourth People\'s Hospital from 2015 to 2016 were recruited in the present study. All patients underwent surgical resection of the glioblastoma with the intention of maximally resecting the tumor. Glioblastoma tissues were frozen in liquid nitrogen or fixed in 10% formalin and embedded in paraffin wax. Slices were stained with hematoxylin and eosin (H&E) for light microscopy. The diagnosis of glioblastoma was based on the World Health Organization (WHO) 2007 and 2016 histopathologic criteria: the invasive phenotype showing an infiltrative astrocytic neoplasm with high proliferative activity and microvascular proliferation, necrosis or both ([@b17-or-39-02-0465],[@b18-or-39-02-0465]). The non-invasive glioblastoma was thus called when the tumor at the anatomical site began to progress and further yielded a cancerous mass without the invasive phenotype aforementioned. All glioblastoma tissues with high tumor cell density were histopathologically confirmed by two pathologists prior to ELISA and small G-protein activation assay. Ethical approval of the study (no. LL-20140005) was granted by the Clinical Research Ethics Committee, Jinan Fourth People\'s Hospital. Written informed consent was obtained from each participant.
### Cells and small interfering RNA (siRNA) transfection
U87MG, U251 and T98MG are the most used cell lines for research on human glioblastoma. The original U87MG cell line was established in Uppsala University almost 50 years ago ([@b19-or-39-02-0465]). However, Allen *et al* used short tandem repeat (STR) genotyping to screen out the DNA profile of U87MG. Different from that of the original cells, this friendly profile of U87MG is thought to have an unknown origin ([@b20-or-39-02-0465]). Thus, two cell lines (U251 and T98MG) were used in this experiment. Human glioblastoma U251 or T98MG cell lines were purchased from the Cell Bank of Shanghai (Shanghai, China) and were grown in Eagle\'s Minimum Essential Medium (EMEM; HyClone, Thermo Scientific, Waltham, MA, USA) supplemented with 10% (v/v) fetal bovine serum (FBS), 2 mmol/l L-glutamine and 100 IU/ml penicillin, 100 µg streptomycin, 1 mmol/l sodium pyruvate and non-essential amino acids (HyClone) in a humidified incubator at 37°C with 5% CO~2~ and 95% humidity. The cells were seeded in 6-well plates (Costar, Corning, NY, USA) and cultured to 80% confluence, and then transiently transfected with siRNA against Daam1 ([@b21-or-39-02-0465]) using Lipofectamine 2000 reagent (Invitrogen, Carlsbad, CA, USA) in serum-free Opti-MEM according to the manufacturer\'s instructions. The cells were switched to fresh medium containing 10% FBS 6 h after the transfection and cultured for 48 h. The cells transfected with Daam1-siRNA were used for analyzing Rho activation and cell invasion.
### ELISA
The glioblastoma tissues were grinded in liquid nitrogen. Equal weights of total tissue debris were dissolved in ice-cold phosphate-buffered saline (PBS) buffer. The experiments were then performed according to the manufacturer\'s protocol of the Wnt5a ELISA kit (CusaBio, Wuhan, China). The concentration of each glioblastoma tissue was calculated based on the concentration curve of the Wnt5a standard samples.
### Cell invasion assays
Cell invasion was assessed in modified Boyden chambers (Costar). Two chambers were separated by a polycarbonate membrane (pore diameter, 8.0 µm). Boyden chamber wells were coated with Matrigel (BD Biosciences, Franklin Lakes, NJ, USA) for 30 min at 37°C. U251 or T98MG cells treated with CCG-1423 (Selleck, Houston, TX, USA) were added to wells with a membrane placed in the bottom. Medium containing recombinant Wnt5a (rWnt5a) was added to the upper and lower compartment of the Boyden chamber. The cells were allowed to invade for 6 h at 37°C in this assay. Thereafter, the medium was discarded, stationary cells were removed with a cotton-tipped applicator, and the membranes were cut out of the chamber and stained with 0.5% crystal violet. The response was evaluated on a light microscope by counting the number of cells that had invaded into the Matrigel and membrane.
### Small G-protein activation assay
For RhoA, Cdc42 and Rac1 activation assays, the glioblastoma tissues were grinded in liquid nitrogen. Equal weights of total tissue debris were dissolved in ice-cold PBS buffer. Glioblastoma cells were seeded into 6-well plates and transfected with Daam1-siRNA or treated with sFRP2 (R&D Systems, Minneapolis, MN, USA). The experiments were then performed according to the manufacturer\'s protocol (Cytoskeleton Inc., Denver, CO, USA). The activation of RhoA, Cdc42 and Rac1 was normalized to the NC control group.
### Western blotting
Subconfluent cells were washed twice with PBS, and then lysed with ice-cold RIPA lysis buffer (Beyotime Biotechnology, Nantong, China). The lysates were then clarified by centrifugation at 12,000 × g for 20 min at 4°C. The protein extracts were separated by 8% sodium dodecyl sulfate-polyacrylamide gel electrophoresis (SDS-PAGE). The immunoblotting procedure was performed as previously described ([@b22-or-39-02-0465]), and the following antibodies were used: anti-GAPDH (Sigma, St. Louis, MO, USA), anti-Daam1 (Santa Cruz Biotechnology, Santa Cruz, CA, USA) antibodies. Protein bands were detected by incubation with horseradish peroxidase-conjugated antibodies and visualized with enhanced chemiluminescence (ECL) reagent (Thermo Scientific, Rockford, IL, USA).
### Pull-down assays
For the detection of active Daam1, GST-RhoA beads were incubated with 0.1 mmol/l GTPγS (Sigma) at 30°C for 15 min with constant agitation. Equal volumes of total cellular protein were incubated with GST-RhoA beads captured on MagneGST Glutathione Particles (Promega, Madison, WI, USA) at 4°C with constant rotation for 90 min. The beads were washed three times with washing buffer (4.2 mmol/l Na~2~HPO~4~, 2 mmol/l KH~2~PO~4~, 140 mmol/l NaCl and 10 mmol/l KCl, pH 7.2). At the end of this period, the beads were captured using a magnet on a magnetic stand. After being washed three times with ice-cold buffer, the beads were resuspended in Laemmli buffer, boiled, and subjected to western blot analysis. SDS-PAGE and western blotting were performed using standard methods.
### Actin cytoskeleton staining and immunofluorescence
Transfected cells were fixed in 4% paraformaldehyde in PBS for 20 min, permeabilized in 0.2% Triton X-100 and blocked in PBS containing 1% BSA for 1 h at room temperature. F-actin was stained with FITC-labeled phalloidin (5 mg/ml) (Beyotime Biotechnology) for 40 min at room temperature. After being washed with PBS, the coverslips were mounted on glass slides with DAPI Fluoromount-G (Southern Biotech, Birmingham, AL, USA). The images were acquired with a fluorescence microscope (Zeiss, LSM 710 system; Carl Zeiss, Jena, Germany).
### Statistical analysis
The data were analyzed using Student\'s t-test with the SPSS statistical software package. All the results were expressed as the mean ± SD. For all analyses a two-sided P-value of \<0.05 was deemed statistically significant.
Results
=======
### Wnt5a and RhoA are upregulated in invasive glioblastoma tissues
In order to evaluate Wnt5a expression in invasive glioblastoma tissues, we assessed the expression of Wnt5a using ELISA assays in nine samples of glioblastoma. Wnt5a expression was higher in invasive glioblastoma tissues compared to that in non-invasive glioblastoma tissues, with the highest expression at 43.7 ng/ml ([Fig. 1](#f1-or-39-02-0465){ref-type="fig"}). We also assessed the activations of Rho GTPases in the same glioblastoma tissues and found that the activation of RhoA and Cdc42 were higher in invasive glioblastoma tissues compared to that in non-invasive glioblastoma tissues ([Fig. 2A and B](#f2-or-39-02-0465){ref-type="fig"}). However, Rac1 activity had an insignificant increase in invasive glioblastoma tissues compared to non-invasive glioblastoma tissues ([Fig. 2C](#f2-or-39-02-0465){ref-type="fig"}). Moreover, the activation of RhoA was positively correlated with the expression of Wnt5a in glioblastoma tissues ([Fig. 2D](#f2-or-39-02-0465){ref-type="fig"}), while there was a weak correlation between the activation of Cdc42 or Rac1 and Wnt5a expression ([Fig. 2E and F](#f2-or-39-02-0465){ref-type="fig"}). These results indicated that Wnt5a and RhoA had tumor-promoting roles in glioblastoma invasion.
### Wnt5a stimulates glioblastoma cell invasion in vitro
To assess the effect of Wnt5a on glioblastoma cell invasion, we treated U251 glioblastoma cells with 20 ng/ml rWnt5a, and assessed the invasion rate using the Boyden chamber assay. An approximately threefold increase of cell invasion was observed in U251 cells treated with 20 ng/ml rWnt5a, which indicated that Wnt5a had a potent stimulatory effect on glioblastoma cell invasion ([Fig. 3A](#f3-or-39-02-0465){ref-type="fig"}).
### RhoA activation participates in Wnt5a-induced glioblastoma cell invasion
We investigated whether RhoA activation was induced by Wnt5a in glioblastoma cells. Small G-protein assays revealed a significant increase of active RhoA after 20 ng/ml rWnt5a treatment ([Fig. 3B](#f3-or-39-02-0465){ref-type="fig"}). Pre-incubation of secreted frizzled-related protein 2 (sFRP2), an antagonist that directly binds to Wnt5a ([@b21-or-39-02-0465]), abolished rWnt5a-RhoA activity in U251 and T98MG cells ([Fig. 3B](#f3-or-39-02-0465){ref-type="fig"}). However, Wnt5a and/or sFRP2 treatment did not alter the activation of Rac1 and Cdc42 in U251 cells ([Fig. 3C](#f3-or-39-02-0465){ref-type="fig"}). To assess the effect of RhoA on glioblastoma cell invasion, we treated glioblastoma cells with 10 ng/ml RhoA-specific inhibitor CCG-1423 and 20 ng/ml rWnt5a, and assessed the invasion rate using the Boyden chamber assay. We found that CCG-1423 blocked Wnt5a-induced glioblastoma cell invasion ([Fig. 3D and E](#f3-or-39-02-0465){ref-type="fig"}), indicating that RhoA activation was indispensable for Wnt5a-induced glioblastoma cell invasion.
### Wnt5a induces glioblastoma cell invasion via Daam1 activation
We examined whether Wnt5a-induced RhoA activation was regulated by Daam1 in glioblastoma cells. Specific siRNA against Daam1 blocked Wnt5a-induced RhoA activation ([Fig. 4A](#f4-or-39-02-0465){ref-type="fig"}). Moreover, Daam1 siRNA was fully capable of retarding the invasion of U251 and T98MG cells ([Fig. 4B and C](#f4-or-39-02-0465){ref-type="fig"}). To analyze the role of Wnt5a on Daam1 activation (a state allowing its interaction with RhoA), we blocked Wnt5a signaling with sFRP2 treatment. SFRP2 significantly inhibited Wnt5a-induced Daam1 activity in U251 and T98MG cells ([Fig. 5A and B](#f5-or-39-02-0465){ref-type="fig"}). These experiments demonstrated that RhoA was a downstream target of Wnt5a/Daam1 signaling in U251 and T98MG cells.
### Wnt5a/Daam1/RhoA signaling sustains the formation of stress fibers
We performed fluorescent phalloidin staining to investigate the distribution pattern of filamentous actin (F-actin) in glioblastoma cells. Wnt5a treatment sustained the formation/maintenance of actin stress fibers in U251 cells ([Fig. 6](#f6-or-39-02-0465){ref-type="fig"}). In contrast, Daam1-siRNA or CCG-1423 treatment disrupted the formation of actin stress fibers in U251 cells ([Fig. 6](#f6-or-39-02-0465){ref-type="fig"}). Finally, neither Daam1-siRNA nor CCG-1423 treatment altered the cell proliferation of U251 and T98MG cells ([Fig. 7A and B](#f7-or-39-02-0465){ref-type="fig"}). Thus, the findings from the clinical and cellular biological assays indicated that RhoA activation required Daam1 activity to mediate Wnt5a-induced glioblastoma cell invasion ([Fig. 7C](#f7-or-39-02-0465){ref-type="fig"}).
Discussion
==========
Wnt5a acts both as a suppressor and an inducer in different types of tumors ([@b12-or-39-02-0465],[@b23-or-39-02-0465]--[@b26-or-39-02-0465]). The Wnt/planar cell polarity (PCP) pathway triggered by Wnt5a activates small Rho-GTPases and reassembles the cytoskeletal architecture and cellular polarity during embryo development and pathological processes ([@b27-or-39-02-0465]--[@b29-or-39-02-0465]). In our previous studies, we found that Wnt5a stimulated the migration of breast cancer cells via Rho signaling pathways ([@b21-or-39-02-0465],[@b30-or-39-02-0465]). In gastric cancer, Wnt5a also enhanced the ability of cell mobility via RhoA signaling pathways ([@b31-or-39-02-0465]). In the present study, we found that Wnt5a induced the invasion of U251 and T98MG glioblastoma cells. Moreover, Wnt5a was highly expressed in invasive glioblastoma tissues compared to that in non-invasive glioblastoma tissues. These results revealed that Wnt5a may accelerate glioblastoma invasion *in vitro* and *in vivo* and that blocking Wnt5a signaling may prevent glioblastoma metastasis in clinic. In addition, the overexpression of Wnt5a increased the proliferation of glioblastoma GBM-05 and U87MG cells, indicating that Wnt5a is a regulator in the proliferation of human glioblastoma ([@b14-or-39-02-0465]). This evidence demonstrated that Wnt5a acts as an inducer and promoter in glioblastoma tumorigenesis and metastasis.
With the help of small G-protein promoting cellular migration, Wnt5a can remodel the cellular cytoskeleton of melanoma cells ([@b11-or-39-02-0465]). In the present study, Wnt5a promoted glioblastoma cell invasion by activating the Daam1/RhoA signaling pathway. In clinical samples, Wnt5a and RhoA are upregulated in invasive glioblastoma tissues, with a significant positive correlation between them. Studies with much larger samples may provide statistical power to validate the role of Wnt5a and RhoA in glioblastoma. Our previous study revealed that Rac1 activation was increased by Wnt5a and stimulated the cell migration of MCF-7 breast cancer cells ([@b30-or-39-02-0465]). Unfortunately, Wnt5a did not alter the activation of Rac1 and Cdc42 in U251 glioblastoma cells in the present study. These results reveal the specificity of elevated RhoA activation in glioblastoma invasion.
Containing multiple regulatory domains, Daam1 exists in an auto-inhibited state through intramolecular interaction in unstimulated cells ([@b10-or-39-02-0465],[@b32-or-39-02-0465]). Our results showed that sFRP2, an antagonist that directly binds to Wnt5a, markedly blocked the activity of Wnt5a-induced Daam1 in glioblastoma cells. Knockdown of Daam1 expression via siRNA transfection inhibited RhoA activation and the cell invasion stimulated by Wnt5a in U251 and T98MG cells. Furthermore, we tested the reestablishment of stress fibers in Daam1-knockdown or RhoA-blocked cells. The decrease of RhoA activity, formation of stress fibers and cell invasion in Daam1-knockdown cells indicated that Daam1 may be required for the activation of RhoA after Wnt5a treatment in glioblastoma. Thus, these results clearly demonstrated that Daam1/RhoA signaling under Wnt5a stimulation participated in the invasion of glioblastoma and that retarding them may prevent glioblastoma metastasis in clinic.
Soluble frizzled-related proteins (sFRPs) function as modulators of Wnt signaling through direct interaction with Wnts ([@b33-or-39-02-0465]). We reported in our previous study that Wnt5a-induced RhoA activation and cell migration could be abolished by sFRP2 pretreatment in breast cancer cells ([@b21-or-39-02-0465]). In the present study, we also found that sFRP2 blocked the Wnt5a-induced RhoA activation in glioblastoma cells. These results demonstrated that sFRP2 acted as an antagonist of Wnt5a mediating the progression of glioblastoma and breast cancer. A recent study in immunohistochemistry revealed that the expression level of soluble frizzled-related protein 3 (sFRP3) was decreased in the nucleus in higher grade astrocytoma, indicating the antagonistic ability of Wnt signaling ([@b34-or-39-02-0465]). Further studies are needed to decipher whether sFRP2 and sFRP3 function in a common pathway or in parallel pathways to block Wnt5a signaling.
In conclusion, the present study partially clarified the associations between Wnt5a/RhoA signaling and glioblastoma progression. It is the first to demonstrate that Wnt5a may regulate the invasion of glioblastoma cells, at least in part via the Daam1/RhoA signaling pathway. Therefore, the Wnt5a/Daam1/RhoA signaling pathway is a candidate accelerator in glioblastoma and may be a potential clinical classification marker and therapeutic target for human glioblastoma.
The present study was supported by a grant from the National Natural Science Foundation of China (81472703) to Y.Z., a sponsorship of Jiangsu Overseas Research and Training Program for University Prominent Young and Middle-aged Teachers and Presidents to Y.Z., and a grant from the Joint Research Project of Southeast University and Nanjing Medical University (2242017K3DN41) to Y.Z.
{#f1-or-39-02-0465}
{#f2-or-39-02-0465}
{#f3-or-39-02-0465}
{#f4-or-39-02-0465}
{#f5-or-39-02-0465}
{#f6-or-39-02-0465}
{#f7-or-39-02-0465}
[^1]: Contributed equally
| 2023-12-04T01:26:35.434368 | https://example.com/article/6668 |
Q:
QlistWidget icons - faster loading
I am populating a QlistWidget with icons and I notice there is a lag when the window is loading. I wondered if there is a way to generate half resolution icons, or some other way to speed up the window generation time?
texture_item = QtWidgets.QListWidgetItem(texture)
texture_pixmap = QtGui.QPixmap(image_path)
texture_icon = QtGui.QIcon()
self.list_widget_left.setIconSize(QtCore.QSize(105,105))
texture_item.setFont(QtGui.QFont('SansSerif', 10))
texture_icon.addPixmap(texture_pixmap)
texture_item.setIcon(texture_icon)
self.list_widget_left.addItem(texture_item)
texture_item.setTextAlignment(Qt.AlignBottom)
A:
There are several aspects that can generate the delay:
The images weigh a lot then the solution is to use less heavy icons
You have many images that iterate in the same loop, then a possible solution is to give a small delay so that the image is loaded little by little avoiding the visual delay that you indicate.
import os
from PySide2 import QtCore, QtGui, QtWidgets
import shiboken2
def for_loop_files(path, interval=100, extensions=(), parent=None, objectName=""):
timer = QtCore.QTimer(parent=parent, singleShot=True, interval=interval)
if objectName:
timer.setObjectName(objectName)
loop = QtCore.QEventLoop(timer)
timer.timeout.connect(loop.quit)
timer.destroyed.connect(loop.quit)
for root, dirs, files in os.walk(path):
for name in files:
base, ext = os.path.splitext(name)
if extensions:
if ext in extensions:
if shiboken2.isValid(timer):
timer.start()
loop.exec_()
yield os.path.join(root, name)
else:
yield os.path.join(root, name)
class MainWindow(QtWidgets.QMainWindow):
def __init__(self, parent=None):
super(MainWindow, self).__init__(parent)
self.list_widget = QtWidgets.QListWidget()
self.list_widget.setViewMode(QtWidgets.QListView.IconMode)
self.list_widget.setIconSize(QtCore.QSize(128, 128))
self.list_widget.setResizeMode(QtWidgets.QListView.Adjust)
self.list_widget.setFlow(QtWidgets.QListView.TopToBottom)
self.setCentralWidget(self.list_widget)
self.resize(640, 480)
QtCore.QTimer.singleShot(0, self.load_icons)
@QtCore.Slot()
def load_icons(self):
for path in for_loop_files(".", extensions=(".png", "jpg"), parent=self, objectName="icon_timer", interval=30):
it = QtWidgets.QListWidgetItem()
it.setIcon(QtGui.QIcon(path))
self.list_widget.addItem(it)
def closeEvent(self, event):
timer = self.findChild(QtCore.QTimer, "icon_timer")
if timer is not None:
timer.deleteLater()
super(MainWindow, self).closeEvent(event)
if __name__ == "__main__":
import sys
app = QtWidgets.QApplication(sys.argv)
w = MainWindow()
w.show()
sys.exit(app.exec_())
from PySide2 import QtCore, QtGui, QtWidgets
import shiboken2
def for_loop_files(paths, interval=100, parent=None, objectName=""):
timer = QtCore.QTimer(parent=parent, singleShot=True, interval=interval)
if objectName:
timer.setObjectName(objectName)
loop = QtCore.QEventLoop(timer)
timer.timeout.connect(loop.quit)
timer.destroyed.connect(loop.quit)
for path in paths:
if shiboken2.isValid(timer):
timer.start()
loop.exec_()
yield path
class MainWindow(QtWidgets.QMainWindow):
def __init__(self, parent=None):
super(MainWindow, self).__init__(parent)
self.list_widget = QtWidgets.QListWidget()
self.list_widget.setViewMode(QtWidgets.QListView.IconMode)
self.list_widget.setIconSize(QtCore.QSize(128, 128))
self.list_widget.setResizeMode(QtWidgets.QListView.Adjust)
self.list_widget.setFlow(QtWidgets.QListView.TopToBottom)
self.setCentralWidget(self.list_widget)
self.resize(640, 480)
QtCore.QTimer.singleShot(0, self.load_icons)
@QtCore.Slot()
def load_icons(self):
paths = ["icon1.png", "icon2.png", "icon3.png", "icon4.png"]
for path in for_loop_files(paths, parent=self, objectName="icon_timer", interval=30):
it = QtWidgets.QListWidgetItem()
it.setIcon(QtGui.QIcon(path))
self.list_widget.addItem(it)
def closeEvent(self, event):
timer = self.findChild(QtCore.QTimer, "icon_timer")
timer.deleteLater()
super(MainWindow, self).closeEvent(event)
if __name__ == "__main__":
import sys
app = QtWidgets.QApplication(sys.argv)
w = MainWindow()
w.show()
sys.exit(app.exec_())
| 2024-05-07T01:26:35.434368 | https://example.com/article/3492 |
Morgan Phillips: Avoiding the saviour selfie
04 March 2019
The lessons international aid charities can learn from the debate between Stacey Dooley and David Lammy
Morgan Phillips
We know from the work done by the linguist and philosopher George Lakoff, the governance consultancy PIRC UK, the development network Bond and others that images are incredibly important drivers of how issues are framed in our minds.
We will all have preconceived ideas about issues such as poverty and their causes and solutions. These have been formed by stories and images we have encountered throughout our lives.
Our ideas are then either reinforced or challenged by each new image or story we see. That is why it is so important to be mindful of the impact our storytelling is having, especially if it is in danger of perpetuating a single story about a place or issue.
Last week, the TV star Stacey Dooley was accused by the Labour MP David Lammy of behaving like a "white saviour" after posting photos of herself on Instagram holding a Ugandan child while filming in the country for this year’s Comic Relief. Dooley and Comic Relief were also accused of reinforcing a negative stereotype about who can solve poverty in Uganda.
Quite rightly, this is a really emotive issue for international aid charities.
At the Glacier Trust, we work with two celebrity ambassadors: the actor Siân Brooke and the explorer Levison Wood. We also organise visits to our projects in Nepal for school groups and sports teams. Such initiatives help us achieve our educational objectives, raise funds and increase brand awareness.
The visits we organise generate images: it is inevitable and unavoidable. People seek to capture their experiences and want to share them online.
We don’t discourage this, but sometimes, regrettably, they look like Dooley’s recent images. The key question here is to what extent we are, as the charity, responsible for the images taken and shared. We have complete control over the images that TGT shares and full responsibility for them. But we have very limited control over images shared by others; we’re at the mercy of their judgement.
Nevertheless, we can’t just wash our hands of such photos. It is neither possible, nor desirable, to control all the images taken and shared, but it is possible to educate celebrities, supporters, volunteers and project staff about the impact of taking and sharing them. Our approach has been to work with the education network Lifeworlds Learning to develop a guide to taking photos, which we hand out to those involved in visits.
We also take time to educate people informally before and during the trip on the power of images. We haven’t been entirely successful yet, but we’re working on it.
As charities, we must guide our celebrity ambassadors. If we don’t, we’re failing to protect them and their reputations, and we’re failing to protect the reputations of our organisations. More worryingly, we risk reinforcing the counterproductive tropes that angered Lammy and others.
Expert Hub
When a property is being constructed, VAT is charged at the standard rate. But if you're a charity, health body, educational institution, housing association or finance house, the work may well fall into a category that justifies zero-rating - and you could make a massive saving | 2024-04-27T01:26:35.434368 | https://example.com/article/7927 |
Jaap Stam heeft zijn eerste wedstrijd als hoofdcoach van Feyenoord gewonnen. SDC Putten werd in een vriendschappelijk treffen met 0-6 verslagen. Stam keek met een goed gevoel terug op het duel op Sportpark Putter Eng, maar zag ook nog een hoop verbeterpunten.
‘Het gaat in een oefenwedstrijd als deze om de juiste intensiteit, juiste druk, de tegenstander niet aan voetballen toe laten komen,’ zette Stam na afloop nog eens op een rijtje. ‘Om dat voor elkaar te krijgen, moet je je posities goed invullen. Dat lukte soms wat beter dan op het andere moment. We zijn nog te speels bij vlagen.’
Stam eist van zijn ploeg dat dit alles ook tegen een amateurclub als SDC Putten goed gaat. ‘Ook tegen amateurteams mag dat niet, want je moet nu al beginnen met het toewerken naar die speelwijze,’ aldus Stam. ‘We moeten namelijk al toewerken naar Europees voetbal en de competitie. Die verbeterpunten moeten we dus meenemen.’
Los van de verbeterpunten zag Stam ook een aantal lichtpuntjes. ‘Dan denk ik aan de loopacties, de juiste keuzes aan de bal, het doorkantelen, druk geven,’ somde hij op. ‘Dat hebben we afgelopen week meegenomen in de trainingen en op die vlakken zag ik veel goede dingen.’
Positief was ook het feit dat de zes goals door zes (erg jonge) spelers werden gemaakt. Stam: ‘Dat was goed om te zien. En we hebben op dit moment een heel jonge ploeg. Dat is inherent aan deze club en goed voor onze jeugdopleiding. Zij mogen zich laten zien. We gaan na de voorbereiding kijken wat het beste voor hen is.’ | 2024-03-16T01:26:35.434368 | https://example.com/article/6008 |
// @flow
import * as eff from 'redux-saga/effects';
import {
getStatus as getResourceStatus,
} from 'redux-resource';
import createActionCreators from 'redux-resource-action-creators';
import {
jiraApi,
} from 'api';
import type {
Id,
} from 'types';
import {
uiActions,
actionTypes,
} from 'actions';
import {
throwError,
infoLog,
notify,
} from './ui';
export function* getIssueComments(issueId: Id): Generator<*, void, *> {
const actions = createActionCreators('read', {
resourceType: 'issuesComments',
request: `issue_${issueId}`,
list: `issue_${issueId}`,
mergeListIds: false,
});
try {
const alreadyFetched = (
yield eff.select(
state => (
getResourceStatus(
state,
`issuesComments.requests.issue_${issueId}.status`,
).succeeded
),
)
);
if (!alreadyFetched) {
yield eff.put(actions.pending());
}
yield eff.call(infoLog, `fetching comments for issue ${issueId}`);
const { comments } = yield eff.call(
jiraApi.getIssueComments,
{
params: {
issueIdOrKey: issueId,
},
},
);
yield eff.put(actions.succeeded({
resources: comments,
}));
yield eff.call(infoLog, `got comments for issue ${issueId}`, comments);
} catch (err) {
throwError(err);
}
}
export function* addIssueComment({
text,
issueId,
}: {
text: string,
issueId: Id,
}): Generator<*, void, *> {
const actions = createActionCreators('create', {
resourceType: 'issuesComments',
request: 'newComment',
list: `issue_${issueId}`,
});
try {
yield eff.call(infoLog, 'adding comment', text, issueId);
yield eff.put(uiActions.setUiState({
commentAdding: true,
}));
const newComment = yield eff.call(
jiraApi.addIssueComment,
{
params: {
issueIdOrKey: issueId,
},
body: {
body: text,
},
},
);
yield eff.call(infoLog, 'comment added', newComment);
yield eff.put(actions.succeeded({
resources: [newComment],
}));
yield eff.put(uiActions.setUiState({
commentAdding: false,
}));
} catch (err) {
throwError(err);
yield eff.put(uiActions.setUiState({
commentAdding: false,
}));
yield eff.fork(notify, {
title: 'failed to add comment',
});
}
}
export function* watchIssueCommentRequest(): Generator<*, *, *> {
yield eff.takeEvery(actionTypes.COMMENT_REQUEST, addIssueComment);
}
| 2024-02-03T01:26:35.434368 | https://example.com/article/4171 |
Hello,
This is a set that's been in the works for awhile, both in my brain and it floated around reddit a lot about a month ago.
But that wasn't enough so I bring the set here after some revamping to get the ball rolling again (and get it rolling right)
A Few Things About the Set Itself
DSA profile (I used DSA as this is my first set and the uniform profile makes compatibility easier on my end)
Doubleshot ABS
This set is design around compatibility but I know I may have forgotten or left out keys for some layouts (let me know what they are)
Now Let's Get Into the Kits
*All kits are continually being worked on to offer the best compatibility without making you buy a thousand different kits*
BASE SET
MODIFIER KIT
NUMPAD KIT
NON-STANDARD & ISO KIT
SPACEBAR KIT
40% & PLANCK KIT
ERGODOX KIT
ACCENT KIT
NOVELTIES
Imgur Album!!
Render Stuffs!
Currently Working On
Matching the correct font and mold to each set, hopefully most of it is done mold-wise
Finish Novelty Designs, original designs were not on par with what they should have been and are being re-designed from the ground up
Creating the 100% no-longer-needs-to-be-updated kit selection to offer best price to cap ratio!
What's the Timeline?
IC, getting any sets finalized and see if it's worth bring this to GB
GET ALL DEM SEXY RENDERS (because you all love your renders) <--We are here (gearing up for some more full board renders of the most professional quality)
Figure out vendor situations, get you all the most reliable way of getting the caps you paid for Done!
Done! Reach GB and make everyone happy
Make everyone wait the 12 week lead time I have been provided from SP (will reconfirm this timeline prior to GB happening)
Do all the quality stuff and start shipping the sets
Type on my new keyset
What's Your Part in all This?
Tear me a new one and say that this set is garbage, or
Say this still needs work but you kinda like it.
UPDATE!!! 4/7/18
I have gotten some guaranteed novelty designs now and they are up! May get one or two depending on how I feel, but these were confirmed possible by SP
The kits have been slightly modified, please give them a once over to see if there is anything missing (or redundant) or anything that you want to see there!
I have plans to get higher quality renders to really show off this kit, along with making it more known in the community so that when the GB launches it will hit MOQ easily!
There is a vendor in place, but I'm going to keep it a secret as no official GB talks have happened between us as the set has been delayed
Keep an eye out for the next month or two as I aim to update this thread at least every other week with what's happening
I hope to have the GB ready around June as you all might have some hurting wallets with some of the great sets being released soon (I know I'm a great guy)
Ooooo a fancy render/teaser, courtesy of CQ_Cumbers new rendering service site kbrenders.com (I love it! Thanks!)The inspiration for this set is two-fold, it's from a cloudy night sky in the country and off of a childhood claymation show called Wallace and Gromit where they go to the moon.The moon is made of cheese.--> https://imgur.com/a/DPUgP **Please note these were created with the web service Kbrenders.com and some the legends got messed up, I am putting these here until I can get better renders for you!**So you are here to either:The set it not dead! I have been pretty busy with life stuff, starting a new position at work and I want this set to be 100% ready for a GB so if life hits again I have all the answers and can quickly help everyone out. | 2024-03-15T01:26:35.434368 | https://example.com/article/9174 |
<!-- BEGIN: main -->
<div class="table-responsive">
<table class="table table-striped table-bordered table-hover">
<colgroup>
<col span="2" class="w100">
<col span="2">
<col class="w100">
<col class="w150">
</colgroup>
<thead>
<tr>
<th>{LANG.weight}</th>
<td class="text-center">ID</th>
<th>{LANG.name}</th>
<td class="text-center">{LANG.adddefaultblock}</th>
<td class="text-center" >{LANG.numlinks}</th>
<th> </th>
</tr>
</thead>
<tbody>
<!-- BEGIN: loop -->
<tr>
<td class="text-center">
<select class="form-control" id="id_weight_{ROW.bid}" onchange="nv_chang_block_cat('{ROW.bid}','weight');">
<!-- BEGIN: weight -->
<option value="{WEIGHT.key}"{WEIGHT.selected}>{WEIGHT.title}</option>
<!-- END: weight -->
</select></td>
<td class="text-center"><strong>{ROW.bid}</strong></td>
<td><a href="{ROW.link}">{ROW.title}</a> (<a href="{ROW.linksite}">{ROW.numnews} {LANG.topic_num_news}</a>)</td>
<td class="text-center">
<select class="form-control" id="id_adddefault_{ROW.bid}" onchange="nv_chang_block_cat('{ROW.bid}','adddefault');">
<!-- BEGIN: adddefault -->
<option value="{ADDDEFAULT.key}"{ADDDEFAULT.selected}>{ADDDEFAULT.title}</option>
<!-- END: adddefault -->
</select></td>
<td class="text-center">
<select class="form-control" id="id_numlinks_{ROW.bid}" onchange="nv_chang_block_cat('{ROW.bid}','numlinks');">
<!-- BEGIN: number -->
<option value="{NUMBER.key}"{NUMBER.selected}>{NUMBER.title}</option>
<!-- END: number -->
</select></td>
<td class="text-center">
<em class="fa fa-edit fa-lg"> </em> <a href="{ROW.url_edit}">{GLANG.edit}</a>
<em class="fa fa-trash-o fa-lg"> </em> <a href="javascript:void(0);" onclick="nv_del_block_cat({ROW.bid})">{GLANG.delete}</a>
</td>
</tr>
<!-- END: loop -->
</tbody>
</table>
</div>
<!-- END: main --> | 2024-05-24T01:26:35.434368 | https://example.com/article/7818 |
Bob’s Burgers is adding a special Gilmore Girls shout-out to the Season 7 menu.
The cast of Fox’s animated comedy announced the pseudo cameo over the weekend when when they stopped by TVLine’s Comic-Con studio, presented by ZTE, for their annual interview with yours truly. “[Gilmore Girls] is mentioned on the show,” series creator Loren Bouchard reveals. “Teddy’s on his back and he says, ‘How about a bedtime story?’ And Gene says… ” (Sorry, you have to watch the video above to find out what Gene says.)
Speaking of Bob and Linda’s possibly-gay middle kid, the Bob’s crew weighs in on whether this is the season the 11-year-old bursts out of the closet (spoiler: don’t hold your breath). The typically raucous Q&A also finds cast member Kristen Schaal setting the record straight about her own sexual leanings (“I kissed a girl once, but I never touched her boobs,” she confesses). Team BB also finds time to squeeze in a little Season 7 casting nugget (hint: a wildly popular late-night personality will be dropping in).
Press PLAY on the video above, then hit the comments with your thoughts! | 2024-07-12T01:26:35.434368 | https://example.com/article/3609 |
Otto von Bolschwing
Otto Albrecht Alfred von Bolschwing (15 October 1909 – 7 March 1982) was a German SS-Hauptsturmführer in the Nazi Sicherheitsdienst (SD), Hitler's SS intelligence agency. After World War II von Bolschwing became a spy and worked for the Central Intelligence Agency (CIA) in Europe and later in California.
Life
Otto Albrecht von Bolschwing was born in Schönbruch, District of Bartenstein, East Prussia (now: Szczurkowo, Poland) on October 15, 1909. He was descended from the aristocratic . He was educated at the University of Breslau and the University of London. He joined the Nazi Party in April 1932 and after the Nazis came to power the following year he became a member of the SS. Bolschwing was assigned to the foreign intelligence section of the Sicherheitsdienst (SD) and worked as an undercover agent in Mandatory Palestine, exchanging promises of encouraging young Jews to emigrate for intelligence about the British supplied by the Haganah. He was closely associated with Adolf Eichmann, became his adjutant, and had some involvement in the planning of the Final Solution. In 1937 he wrote a memorandum concerning Jewish emigration, referencing the anti-Jewish riots in Berlin in 1935:
His report suggested bureaucratic methods such as economic restrictions, special taxes, and passport denials to purge Germany of its Jews. Heinrich Himmler was impressed with the report, and assigned von Bolschwing to work under Adolf Eichmann. Over the following years, von Bolschwing wrote dozens of memos and reports on how to persecute Jews. His suggestions to Eichmann included confiscating money from Jews, labeling them on their passports, and allowing Jews to leave Germany but not to return. Rather than advocating the mass murder of Jews, he proposed making their lives so terrifying and unbearable that they would voluntarily leave Germany.
Later, von Bolschwing became the representative of the SD at the German embassy in Bucharest, Romania, where he organised an anti-Jewish pogrom with the Iron Guard in 1941, in which 125 Jews were killed. He was promoted to the rank of SS-Hauptsturmführer (captain) on 30 January 1941. After returning to Germany in March 1941 Bolschwing pursued to a career in business, becoming a partner with the Bank voor Onroerende Zaken, an Amsterdam-based bank which played a role in the confiscation of assets belonging to Jewish citizens in the Nazi-occupied Netherlands.
According to Eric Lichtblau, von Bolschwing's actions were not motivated by antisemitism so much as by the desire for power and wealth. Lichtblau noted that in the midst of the Holocaust, von Bolschwing married a half-Jewish woman.
Post-war
Before the end of World War II in 1945, von Bolschwing had already been recruited by the American Counter Intelligence Corps (CIC), the counter-espionage arm of the US Army Secret Service, which was later merged into the CIA. It has been speculated that this was because he recognized Germany was destined to lose the war, and decided to work with the winning side. Already in spring 1945, he was working for them in Salzburg. According to the CIA he was one of their highest-ranking agents in Europe. He provided intelligence on Nazi colleagues and German military operations. In 1949 he joined the Gehlen Organization and mobilized former contacts in Italy in order to influence the events of the Greek Civil War, while providing intelligence of possible subversion by communist agents. After being expelled for ineptitude and insubordination, he began working for the CIA, running an anti-Soviet spy network composed of ex-Nazis in Austria.
During this period, the CIA's knowledge of von Bolscwhing's Nazi past was limited. He admitted to having been a card-carrying member of Nazi Party, but claimed that he only joined it as a way of getting government approval for a cement factory he wanted to build in East Prussia, and that he had tried to thwart Hitler. Some officials within the CIA had doubts about him. An early assessment of him stating that the CIA's knowledge of his war record "rests almost entirely on his own unsupported statements," referring to him as "self-seeking, egoistical, and a man of shifting loyalties." Other memos referred to him as a "shady character" and suggested he be held with a "tight rein." The CIA possessed evidence linking von Bolschwing to Eichmann and the high echelons of the SS. A source believed to be reliable fingered him as a member of the SD, and another source in Poland identified him as the SS's top man in working with the Romanian Iron Guard. Nevertheless, the CIA decided to use his services, with one assessment claiming that his past Nazi Party membership was "relatively inconsequential, particularly in view of the subject's excellent service on our behalf."
In 1950, the Austrian government inquired about von Bolschwing due to war crimes suspicions, and the CIA rushed to shield him from potential prosecution. The Austrians were told that there was "no file available" on him. A few years later, after he had run into visa problems, the CIA tried to help him gain Austrian citizenship. When this proved unsuccessful, the CIA decided to help him emigrate to the United States. The CIA helped expedite his application for a US visa, withheld information from the US State Department about his Nazi past, and booked tickets for him and his wife on a luxury cruise ship voyage to the US. When von Bolschwing and his wife arrived in the US on February 2, 1954, they were met by a military intelligence officer who had worked with him in Europe, and were hosted in his Boston home for a few months. Having brought him to the US as what it saw as a reward for his service, the CIA ended its relationship with von Bolschwing, ordering him to break off all relations and to contact them only in the event of a "dire emergency" which was a "life or death situation."
In the US, von Bolschwing became the executive of a series of drug and chemical companies, and served as a consultant for projects in Germany, often traveling there for business. In 1959, he became a US citizen. He became well-connected, and was put in line for a prestigious posting as a State Department representative for international development in India.
In May 1960, von Bolschwing's former superior Adolf Eichmann, who was living in Argentina under a false identity, was abducted by Israeli agents and smuggled to Israel, where he would be tried and executed. News of the abduction caused von Bolscwhing to fear that he was next. He correctly predicted that his name would come up at Eichmann's trial, and feared that a renewed probe into the Nazis' Jewish affairs office as part of the prosecution efforts would uncover his own role. Fearing that he would be prosecuted and that the Israelis might even abduct him the same way they had abducted Eichmann, he contacted one of his former handlers, expressing his fears and claiming that he was afraid for his life. The CIA, in turn, was desperate to keep his name and involvement with Eichmann a secret. West German intelligence agents who spent a month in Washington perusing US intelligence files on their own unearthed massive evidence linking von Bolschwing directly to Eichmann and the Jewish affairs office. Despite the fact that this information had been sitting in the CIA's files for years, the agency blamed him for his dishonesty in minimizing his role with the Nazi Party for the predicament it now found itself in.
The CIA agreed to protect von Bolschwing, promising that it would not turn him over to Israel and that it would withhold evidence of his past from the US Justice Department. Had the Justice Department received the evidence, it potentially could have opened deportation proceedings against him, and had he been deported, he risked prosecution in West Germany or Austria. In exchange, von Bolschwing had to renounce his candidacy for development representative in India.
In 1969 von Bolschwing was working for the California computer leasing company Trans-International Computer Investment Corporation of Sacramento, which had contracts for the Defense Department. He rose to vice-president, but his job there ended when the company became embroiled in a financial scandal, and it subsequently went bankrupt in 1971.
His wife committed suicide in 1978. The US government did not begin investigating von Bolschwing's activities in Nazi Germany until 1979, when his wartime record was revealed to the public. The Justice Department filed charges against him in May 1981 for concealing his Nazi past and sought to deport him; his second wife stated that he had been a double agent for the Americans in Tyrol. He surrendered his American citizenship but early in 1982 the trial was delayed while he was allowed to remain in the country because of his deteriorating health—he had an incurable brain disease. He died two months later, in March 1982, in a nursing home in Carmichael, California.
References
External links
"Report des US-Justizministeriums: USA gewährten Nazis Unterschlupf", Der Spiegel, November 14, 2010
Bibliography
Klaus Eichner. Faschistische Ostexperten im Dienste der US-Geheimdienste" in: Holocaust-Täter im Dienste von BND und CIA. Kominform. 6 April 2008
Klaus POPA. Völkisches Handbuch Südosteuropa Online Lexikon B. 3 February 2010 (pdf) p. 84
Category:American Cold War spymasters
Category:1909 births
Category:1982 deaths
Category:People from Bartoszyce County
Category:Romania in World War II
Category:SS-Hauptsturmführer
Category:Adolf Eichmann
Category:German intelligence agencies
Category:Cold War organizations
Category:Cold War history of Germany
Category:World War II spies for Germany
Category:CIA agents convicted of crimes
Category:People of the Central Intelligence Agency
Category:Cold War spies
Category:Holocaust perpetrators in Romania
Category:Espionage scandals and incidents
Category:People from East Prussia
Category:People from Sacramento, California
Category:Loss of United States citizenship by prior Nazi affiliation
Category:RSHA personnel | 2023-12-28T01:26:35.434368 | https://example.com/article/5641 |
Southern California -- this just in
San Diego officer shoots knife-wielding suspect, police say
A San Diego police officer shot and wounded a knife-wielding burglary suspect found crawling out of a dental office Thursday night, the Police Department said.
The officer, described only as a three-year veteran of the department, was among officers responding to a 10:12 p.m. call about a burglary in progress at a mid-city business complex.
A suspect was spotted crawling through broken glass, carrying property from a dental office, according to Lt. Ernie Herbert of the department's homicide unit. The suspect refused commands to stop "and advanced toward the officers with the knife raised," Herbert said.
One of the officers shot the suspect, who was taken to a hospital by paramedics. The suspect, who is expected to survive, was identified as between 25 and 30 years old. | 2024-04-17T01:26:35.434368 | https://example.com/article/4592 |
Finasteride.
Prostate cancer is the most common non-cutaneous malignancy in males in the US. Prostate cancer chemoprevention entails the use of agents which retard or inhibit the progression to invasive disease. Chemoprevention is an attractive option for patients with prostate cancer given the hormonally responsive nature of cancer, long latency period and high prevalence of the disease. This review outlines a detailed background on the development of finasteride as a chemopreventive agent for prostate cancer. It discusses the Prostate Cancer Prevention Trial, a large randomized clinical trial that showed reduction in prostate cancer prevalence through the use of finasteride. In addition, an in-depth discussion involving theories on a higher incidence of high-grade cancer in the finasteride arm is presented. Other notable recently completed randomized trials and novel chemopreventive agents for prostate cancer are discussed as well. Readers will get an in-depth understanding of the balance of risks and benefits of finasteride for prevention of prostate cancer. Finasteride was the first 5alpha-reductase inhibitor to show a benefit in reducing prevalence of prostate cancer. It is well tolerated but a higher incidence of high-grade prostate cancer in men taking finasteride has hindered its use in clinical practice. It may temporarily shrink tumors that have a low potential for being lethal and is not approved as a chemopreventive agent. | 2024-06-15T01:26:35.434368 | https://example.com/article/8066 |
487 F.2d 216
William D. ARNOLD et al., Plaintiffs-Appellants,v.Bert R. TIFFANY et al., Defendants-Appellees,
No. 73-1404.
United States Court of Appeals,Ninth Circuit.
Oct. 25, 1973.Certiorari Denied March 18, 1974.See 94 S.Ct. 1578.
Timothy H. Fine (argued), Richard A. Canatela (appeared), San Francisco, Cal., Wallace L. Rosvall (appeared), Thomas R. Sheridan, of Simon, Sheridan, Murphy, Thornton & Hinerfeld, Los Angeles, Cal., G. Joseph Bertain, Jr., San Francisco, Cal., for plaintiffs-appellants.
John J. Hanson (argued), Donald L. Zachary, of Gibson, Dunn & Crutcher, Robert C. Lobdell, William A. Niese, of The Times-Mirror Co., Los Angeles, Cal., Wes Spaulding, San Gabriel, Cal., for defendants-appellees.
Before TUTTLE,* MERRILL and BROWNING, Circuit Judges.
TUTTLE, Circuit Judge:
1
Appellants, seventeen independent news dealers who distribute the Los Angeles Times under individual contracts with the Times Mirror Company, appeal the district court's dismissal pursuant to Fed.R.Civ.P. 12(b)(6) of their claims under 42 U.S.C. Sec. 1981, Sec. 1982, and Sec. 1985(3).
FACTS
2
The plaintiffs seek injunctive relief and damages for violations of the Civil Rights Act, Sections 1981, 1982 and 1985(3). The plaintiffs allege that the defendants, who are various officers and employees of the publisher of The Los Angeles Times and one other independent newspaper dealer, "have conspired with invidiously discriminatory animus to deprive on a class-wise basis the Los Angeles Times newspaper dealers including plaintiffs of the equal protection of the laws through intimidating, harassing, causing economic injury and coercing said dealers from exercising their rights under the first and fourteenth amendments to the United States Constitution to peaceably assemble." Such conspiratorial conduct is alleged to have been taken to prevent plaintiffs from forming and maintaining a newspaper dealers' trade association.
3
On February 26, 1973, the district court heard oral argument on plaintiffs' motion for preliminary injunction. At an informal conference the next day in which the matter was continued, the counsel for defendants stated their intent to file a motion to dismiss under Fed.R.Civ.P. 12(b)(6) for failure to state a claim upon which relief can be granted in order to test the legal sufficiency of the complaint. Since plaintiffs' counsel acknowledged that the case law showed that Sections 1981 and 1982 are limited to instances of racial discrimination, sufficiency of the cause of action under Section 1985(3) was deemed decisive. The district court and counsel agreed that the motion should focus on the crucial question of the applicability of Section 1985(3).
4
For the purpose of ruling on the motion pursuant to Fed.R.Civ.P. 12(b)(6) the district court considered as admitted "the well-pleaded material allegations of the complaint." Having considered the pleadings and briefs and heard the arguments of counsel, the district court, 359 F.Supp. 1034, concluded that plaintiffs' complaint failed to state a claim for relief under Sections 1981, 1982, and 1985(3).
LAW
5
The issue on appeal is whether the district court erred in dismissing plaintiffs' complaint on the ground that the actions of the publisher of the Los Angeles Times and others in conspiring to prevent through economic reprisals the independent newspaper dealers for the Los Angeles Times from forming and maintaining an association of independent newspaper dealers did not state a cause of action under 42 U.S.C. Sec. 1985(3) as expounded in Griffin v. Breckenridge, 403 U.S. 88, 91 S.Ct. 1790, 29 L.Ed.2d 338 (1971).
6
The district court in its opinion correctly noted that Griffin is controlling in this case. That court, after discussing the Griffin holding stated:
7
". . . Plaintiffs do not claim that defendants were motivated by racial animus. The critical question which this Court must then decide is what other 'kind of invidiously discriminatory motivation'-in addition to racial bias-did the Court have in mind when it used the words 'classbased, invidiously discriminatory animus.'
8
"A close reading of Griffin leads this Court to conclude that the words 'class-based, invidiously discriminatory animus' refer, at most, to that kind of irrational and odious class discrimination akin to racial bias-such as discrimination based on national origin or religion. The complaint alleges no such discrimination.
9
"Furthermore, for this Court to conclude that Sec. 1985(3) was intended to embrace the class urged here-a newspaper dealers' trade association-would, in effect, amount to treating that section as a general federal tort law."
10
We affirm on other grounds discussed below.
11
The claims which appellants' complaint must establish to state a cause of action under Section 1985(3) were enumerated by Griffin:
12
"To come within the legislation a complaint must allege that the defendants did (1) 'conspire or go in disguise on the highway or on the premises of another' (2) 'for the purpose of depriving, either directly or indirectly, any person or class of persons of the equal protection of the laws, or of equal privileges and immunities under the laws.' It must then assert that one or more of the conspirators (3) did, or cause to be done, 'any act in furtherance of the object of [the] conspiracy,' whereby another was (4a) 'injured in his person or property' or (4b) 'deprived of having and exercising any right or privilege of a citizen of the United States."' 403 U.S. at 102-103, 91 S.Ct. at 1798.
13
The allegations in the complaint, on their face, fulfill the requirements of elements (1) and (3). In this case, element (2), whose absence caused the district court to grant the motion under Fed.R.Civ.P. 12(b)(6), and element (4b) present substantial questions left unanswered by Griffin.
14
The Court in Griffin interpreted the language of the element (2) requirement, "purpose1 (emphasis added) of depriving . . . of the equal protection of the laws, or of equal privileges and immunities under the laws," as indicating a Congressional intent to limit the scope of Section 1985(3). The Court said:
15
". . . That the statute was meant to reach private action does not, however, mean that it was intended to apply to all tortious, conspiratorial interferences with the rights of others. . . . The constitutional shoals that would lie in the path of interpreting Sec. 1985(3) as a general federal tort law can be avoided by giving full effect to the congressional purpose-by requiring, as an element of the cause of action, the kind of invidiously discriminatory motivation stressed by the sponsors of the limiting amendment. . . . The language requiring intent to deprive of equal protection, or equal privileges and immunities, means that there must be some racial, or perhaps otherwise class-based, invidiously discriminatory animus behind the conspirators' action. The conspiracy, in other words, must aim at a deprivation of the equal enjoyment of rights secured by the law to all."10 403 U.S. at 101-102, 91 S.Ct. at 1798.
And in footnote 10 the Court explained:
16
". . . The motivation aspect of Sec. 1985(3) focuses not on scienter in relation to deprivation of rights but on invidiously discriminatory animus." Id.
17
We do not believe that the allegations by appellants suffice under the purpose requirement of element (2)-"class-based, invidiously discriminatory animus"-to be actionable under Section 1985(3) as discussed in Griffin. The class, in the present case, is composed of over four hundred newspaper dealers of the Los Angeles Times, each of whom has an independent contract with the Los Angeles Times. The appellants are seventeen of these dealers who allege that the appellees conspired to violate their right of association in forming and maintaining a newspaper dealers' association. The flaw appears in the appellant's syllogism when the "animus" alleged herein is compared to that in Griffin. There the motivating hostility was derived from the fact that the plaintiffs were black, members of a racial class against which animus existed, and that the defendants believed them to be civil rights organizers. But here, the appellants were not injured because they were newspaper dealers, the class alleged, but because of their activities in attempting to maintain a dealer association. The animus is directed at and derived from the dealer association and is divorced from the fact that there is a class of newspaper dealers.2
18
The deficiency in the appellant's complaint is similar to that in Hughes v. Ranger Fuel Corp., 467 F.2d 6, 8-10 (4th Cir. 1972). The plaintiffs there alleged that while engaging in efforts to "turn in" violators of the 1899 Refuse Act, the defendants "pelted them with rocks and otherwise assaulted them, driving them from the scene of the pollution for the purpose of preventing them from securing photographic evidence" for a prospective cause of action in the federal court. The court stated:
19
"In their complaint, the plaintiffs make no allegations of any class-based motivation on the part of the defendants. . . . There is no averment in the complaint that the defendants attacked the plaintiffs because the latter were environmentalists, as had been suggested in this Court; the allegations of the complaint are specific that the assault was sparked solely by the instant reaction of the defendants to the fact that the plaintiffs were seeking to photograph the defendants, clearly for the purpose of prosecuting them under the Refuse Act. Theirs was a purely spontaneous act, not alleged to be a part of any general pattern of discriminatory action directed to any class, as was the situation in Action v. Gannon (8th Cir. 1971) 450 F.2d 1227." Id. at 10.
20
The element (4b) necessary for a cause of action under Griffin requires the appellants to be "deprived of having and exercising any right or privilege of a citizen of the United States." 403 U.S. at 103, 91 S.Ct. at 1799. The appellants assert a deprivation of their first amendment right of association. Since the first amendment has not been held to be a restraint on private conduct, only on state action, the appellants suggest two novel arguments for sustaining their right. First, the appellants would argue that the elimination of the state action requirement by Griffin extends the right of association under the first amendment as a bar against private interference as well as state action in Section 1985(3) suits.3 Second, appellants assert that the right of association is one of that bundle of rights held by all persons who are national citizens.4 Since we have affirmed the district court's decision on the class-based animus limitation, it is unnecessary for us to reach these issues or the question of the constitutional power of Congress to enact such a statute.5
21
The judgment of the trial court is affirmed.
*
Of the Fifth Circuit, sitting by designation pursuant to 28 U.S.C. Sec. 294(d) (1970)
1
The Court in Griffin, in effect, "held that a purpose to deprive a person of equal rights will be inferred from the racial [or other class-based] motivation of the conspiracy." The Supreme Court, 1970 Term, 85 Harv.L.Rev. 3, 98 n. 21 (1971). Cf. Griffin v. Breckenridge, 403 U.S. at 102 n. 10, 91 S.Ct. 1790; Azar v. Conley, 456 F.2d 1382, 1385-1386 (6th Cir. 1972)
2
Having found the allegations in the complaint inadequate on the above ground, we find it unnecessary to reach the "class" question on which the district court based its decision
3
This can be accomplished by reading Section 1985(3) as a substantive law embodying constitutional rights without the state action requirement rather than just a remedial statute. Action v. Gannon, 450 F.2d 1227 (8th Cir. 1971) (en banc); Commonwealth of Pennsylvania v. Local Union #542, Int. U. of Op. Eng., 347 F.Supp. 268 (E.D.Penn.1972). See Griffin v. Breckenridge, 403 U.S. 88, 90, 103, 91 S.Ct. 1790, 29 L.Ed.2d 38 (1971); The Supreme Court, 1970 Term, 85 Harv.L.Rev. 3, 99-100 (1971). Contra, Dombrowski v. Dowling, 459 F.2d 190, 193-196 (7th Cir. 1972). Cf. Place v. Shepherd, 446 F.2d 1239, 1246 (6th Cir. 1971)
4
To support the derivation of such a national personal right, the appellants cite Griffin v. Breckenridge, 403 U.S. at 104, 105, 106, 91 S.Ct. 1790; Griswold v. Connecticut, 381 U.S. 479, 483, 85 S.Ct. 1678, 14 L.Ed.2d 510 (1965); N.A.A.C.P. v. Alabama, 357 U.S. 449, 460-461, 78 S.Ct. 1163, 2 L.Ed.2d 1488 (1958); De Jonge v. Oregon, 299 U.S. 353, 364, 57 S.Ct. 255, 81 L.Ed. 278 (1937)
5
See U.S.Const. Amend. XIV, Sec. 5; Commonwealth of Pennsylvania v. Local Union # 542, Int. U. of Op. Eng., supra. Cf. United States v. Guest, 383 U.S. 745, 86 S.Ct. 1170, 16 L.Ed.2d 239 (1966)
| 2023-08-07T01:26:35.434368 | https://example.com/article/3812 |
Tragedy revisited: Haunting black-and-white images capture deadly 1980 MGM Grand Hotel fire
Few people visiting Bally’s Hotel and Casino in Las Vegas remember today that the landmark establishment situated on the glittering Strip was one the site of Nevada’s most devastating fire that took the lives of more than 80 people.
The blaze broke out inside the establishment known at the time as MGM Grand Hotel and Casino early in the morning on November 21, 1980, taking the lives of 87 people and leaving some 650 others injures.
The first firefighters arrived on the scene to find desperate hotel guests breaking windows and attempting to escape with ropes made from blankets.
Devastating scene: The graphic aftermath of the November 21, 1980, MGM Grand Hotel fire that killed 87 people and left hundreds of others injured
Nightmare scenario: Fire equipment could only reach nine stories of the 26-story hotel, leaving many guests on the upper floors trapped
Ravaged grandeur: A firefighter walks a hallway outside the MGM Grand Theater, where old movies were shown inside the hotel
Fire alarms did not sound and guests were made aware of the emergency only after seeing smoke filling their rooms via the air vents.
Although over 200 firefighters arrived on the scene to rescue the hotel’s stranded patrons, evacuation efforts were complicated as fire department ladders could only reach nine floors of the 26-story hotel.
The deadliest fire in Nevada’s history broke out in the early morning of Friday, November 21, in The Deli restaurant on the main floor of the hotel.
Hellish sight: Smoke pores from the MGM Grand Hotel after an electrical fire ignited inside a main floor restaurant
Equipment breakdown: Fire alarms did not sound and guests were alerted to the blaze only after seeing smoke filling their rooms via the air vents
The fire then smoldered for hours before entering a catwalk area above the casino and exploding through the ceiling.
Flames fueled by flammable furnishings, moldings and construction materials found in the casino then raced towards the main entrance, blowing through the doors in a huge fireball.
Terrible damage: The fire smoldered for hours before entering a catwalk area above the casino and exploding through the ceiling
Trapped: Hotel guests, stranded on one of the lower floors of the MGM Grand Hotel and Casino, wait their turn to be rescued by firefighters
Joint effort: Construction workers employed at the 760-room addition to the MGM Grand Hotel joined firefighters in battling the blaze
Portrait of loss: An unidentified man grieves over his wife who was burned in the historic blaze
Not before long, flames and smoke had engulfed the building, leaving death and destruction in their wake. At the time of the incident, about 5,000 people were staying at the hotel, and it took first responders about four hours to evacuate the building.
The 26-story resort quickly filled with smoke as the fire spread, forcing trapped guests to await rescue from exterior balconies. About 300 people had to be airlifted from the roof via nine helicopters from Nellis Air Force Base, including two HH-53 'Jolly Green Giants.
Construction workers from C&E Concrete who were employed at the 760-room addition to the MGM Grand Hotel joined firefighters in battling the conflagration after seeing the flames ignite.
Stunned victims: Shocked and dazed guests are seen fleeing from the burning Vegas resort
Vegas airlift: About 300 people had to be rescued from the roof via helicopters because firefighters were unable to reach them otherwise
Aftermath of tragedy: Clark County firefighters remove a body from the entrance of the MGM Grand
Construction of the MGM hotel started in 1972 and it opened in December of 1973. There were 2,078 rooms at the hotel and the total area was approximately two million square feet, according to the site Firehouse .
The total construction cost of the hotel was $106 million, and apparently the owners made a decision to forgo installing a sprinkler system that cost $192,000.
Expert contended that the fire would have been quickly extinguished had the MGM been properly equipped with a sprinkler system.
| 2024-07-28T01:26:35.434368 | https://example.com/article/1574 |
It’s been a while since I’ve made a post, I nearly forgot how. So many people have been asking me about the this site and my videos that I thought maybe it was time to start again. This post is about a very special horse to me. “James”
As I was walking James out at the Idaho Reined Cow Horse Futurity in Nampa, Idaho, Smokey Prichett a NRCHA Hall of Fame trainer asked me if “James” was “the one”… I asked him, “what do you mean?” Smokey replied, “the one who taught you how to train a cow horse.”
I pondered that question as it had never crossed my mind. But… Yes, he was. The most valuable thing I’ve learned about horses so far, I learned from James.
James is a serious athlete, and through his training I had tried and several different times to contort his body into maneuvers and exercises, few of them ever helping at all. Usually, they irritated him more than anything. But one thing always worked with James, what is that one thing some might ask?
Simple… Keep it simple. James taught me about form to function. He always worked best when you allow him to stay out of his own way and keep his spine as straight as possible. The more you try to bend him like a pretzel the worse he gets. Not to say that a more stiffer horse couldn’t use a bit of bending, and not to say that James doesn’t bend either. However I do find that since he showed me this and started me in the journey of form to function, it makes me wonder why I didn’t study the horses body and its laws of practicality before I became a horse trainer. Silly really. Simply put “you can not soften a mouth by pulling against a shoulder, or any other body part for that matter.” Typically since practicing these methods James showed me and after doing more research I have revamped my training program completely. It’s really nothing more than showing the horse how to stay out of his own way. No different than learning a few shortcuts on a difficult dance step for a human.
Anyhow, here is the three videos of James and I winning the IRCHA Futurity. I truly love this horse, and since having him I’ve really opened my eyes to how many I could have enjoyed as much as him… | 2023-10-19T01:26:35.434368 | https://example.com/article/9246 |
INTRODUCTION {#s1}
============
Worldwide, liver cancer ranks high in terms of incidence and mortality; 70%--90% of these cases are hepatocellular carcinoma (HCC) ([@R1]). HCCs are often accompanied by underlying liver dysfunction; therefore, death is caused not only by tumor burden but also by deterioration of liver function ([@R2]), which makes it important to avoid unnecessary trauma. For HCC, liver resection (LR) is curative but is highly traumatic, whereas transarterial chemoembolization (TACE) is minimally invasive but may leave some residual tumor. With the advancement of technology, their adaptation has expanded and overlapped ([@R3]--[@R8]). The definition of "unresectable HCC" is somewhat ambiguous in the guidelines of the European Association for the Study of the Liver ([@R9]) and the American Association for the Study of Liver Diseases ([@R10]). The latest National Comprehensive Cancer Network guideline states that the performance of LR (in some previous TACE-treated cohorts) is "controversial" ([@R11]). Researchers suggest that we should move from an approach of "what can be done" to a "what is worth doing" process ([@R12],[@R13]). Thus, selecting treatments for patients based on predecided parameters may be rational ([@R3],[@R14]). The existing methods for treatment selection have some limitations, such as subjective outcomes and a lack of validation. A new model that can help making the treatment choice between LR and TACE is required. Furthermore, the model should use proper method to ensure that the survival difference between LR and TACE is causal effect ([@R15]). To this end, individualized models to assistant choice between LR and TACE are needed.
During HCC management, biopsy is not a necessity ([@R9],[@R10]). Hence, the choice between LR and TACE would be better assisted by noninvasive methods. To collect information for the noninvasive methods, in addition to traditional clinical factors and radiological characteristics ([@R16]), radiomics may also be helpful. Radiomics can quantitatively mine data from medical images, including but not limited to size/shape, heterogeneity/texture, and relationships with surrounding tissues. Radiomics can improve diagnostic and prognostic accuracy ([@R17]) and is valuable for decision making in cancer ([@R18],[@R19]) and liver disease ([@R20]).
Therefore, we conducted this multicenter study on patients with HCC, aiming to establish noninvasive individualized models by combining clinical factors, radiological characteristics, and radiomic features. Assisted by the model, we planned to predict prognostic difference associated with LR and TACE and then classified the population for the optimal treatment accordingly.
METHODS {#s2}
=======
Patients {#s2-1}
--------
HCC cases from Nanfang Hospital, Shenzhen People\'s Hospital, Yangjiang People\'s Hospital, Zhongshan City People\'s Hospital, and Zhuhai People\'s Hospital in China were reviewed. After screening the electronic medical record system from 2008 to 2016, we identified 520 HCC cases for which computed tomography (CT) records at diagnosis were available. Inclusion criteria were as follows: (i) HCC confirmed pathologically or clinically; (ii) patients initially treated by LR or TACE; and (iii) at least one radiological disease progression (PD) confirmed by CT/MRI or a follow-up of more than 1 year before the end date. Exclusion criteria were as follows: (i) initially treated by ablation or other treatments; (ii) irregular follow-up; (iii) administration of other combination therapies before PD (such as ablation or systemic therapy); (iv) incomplete initial treatment of intrahepatic lesion (such as positive margin in LR and untreated lesion in TACE); and (v) severe medical comorbidities such as extensive cardiovascular disease (see Figure S1, Supplemental Digital Content 3, <http://links.lww.com/CTG/A86>).
The 2018 American Association for the Study of Liver Diseases guideline recommended the modified Barcelona Clinic Liver Cancer (BCLC) staging system rather than the TNM system ([@R10]). Single HCC \> 5 cm was not an optimal candidate for LR and appeared to have a worse prognosis than HCC ≤ 5 cm ([@R10]), which resulted in the adoption of stage AB in research and discussed in the European Association for the Study of the Liver guideline ([@R3],[@R9]). Thus, we tested whether the application of modified BCLC and stage AB would improve the performance of our model.
The study protocols were approved by the Ethics Committee of Zhuhai People\'s Hospital. The requirement for informed consent to use the patients\' data for medical researches was waived because the data were collected retrospectively. All patient records and information were anonymized and deidentified before analysis.
Follow-ups and treatments {#s2-2}
-------------------------
For the included patients, the follow-up was scheduled every 4--6 weeks before PD or at least for 1 year (without PD), after that, the interval might be increased from 3 to 6 months. Every follow-up included chest radiograms, abdominal CT or MRI, and other necessary laboratory tests. Additional CT or MRI scans were obtained if extrahepatic metastasis was suspected.
The initial treatment between LR and TACE was decided based on the same criteria across hospitals, according to tumor characteristics referring to guidelines ([@R9]--[@R11]), liver functional status, and the patients\' choice. LR was performed with the aim of removing all intrahepatic macroscopic tumors with a margin confirmed by pathological examination. Conventional TACE was performed using the standard method as selectively as possible ([@R9]--[@R11]). Before PD, no additional LR, TACE, or ablation procedures were performed. Inspired by a previous study ([@R3]), for BCLC stage A, some patients with early-stage HCC preferred TACE over LR because TACE was less invasive. For BCLC stage C, patients with suspicious extrahepatic nodule proven to be metastases during the follow-ups, and patients with macrovascular invasion at diagnosis were not excluded because of (i) the limited efficacy of targeted therapies recommended by guidelines ([@R21]); (ii) the potential benefit derived from LR and TACE for these patients ([@R3],[@R5],[@R6],[@R8],[@R11],[@R22]--[@R24]) and treatments should not be delayed (especially for those with macrovascular invasion in portal vein branches or suspicious regional lymph node metastasis). After informing patients of the potential consequences and obtaining informed consent for LR or TACE procedures, the physicians performed LR/TACE as the initial treatment.
Outcomes {#s2-3}
--------
Based on ethical considerations, after PD, to more effectively control the disease, patients could accept other therapies, even those beyond first-line treatments recommended by guidelines ([@R25]); however, this might introduce bias in the analysis of overall survival. Therefore, we used progression-free survival (PFS) as the end point ([@R26]). PFS was defined as the time from diagnosis to PD or death. PD was defined according to the modified Response Evaluation Criteria in Solid Tumors criteria ([@R27]), referring to both target lesion and nontarget lesions (such as macrovascular invasion or extrahepatic metastases).
Candidate clinical factors and radiological characteristics {#s2-4}
-----------------------------------------------------------
Besides the abovementioned baseline factors and radiomic features, we also included several other factors during model construction: (i) neutrophil-to-lymphocyte ratio; (ii) HCC location: lobe (classified as left, right, and cross); surface (whether close to the liver capsule or not, classified as negative or positive); and (iii) radiological characteristics: fusion lesions, boundary fusion of \>2 lesions, classified as absent (Figure [1](#F1){ref-type="fig"}a) or present (Figure [1](#F1){ref-type="fig"}b); invasive shape, protrusions like crab foot, classified as noninvasive (Figure [1](#F1){ref-type="fig"}c) or invasive (Figure [1](#F1){ref-type="fig"}d); HCC capsule, classified as absent (Figure [1](#F1){ref-type="fig"}e), unintegral (Figure [1](#F1){ref-type="fig"}f), or integral (Figure [1](#F1){ref-type="fig"}g); HCC capsule breakthrough (Figure [1](#F1){ref-type="fig"}h), HCC growth beyond a preexisting capsule, classified as absent or present; corona enhancement ([@R16]) (Figure [1](#F1){ref-type="fig"}i), a transient zone or rim of enhancement around HCC, classified as absent or present; corona with low attenuation (Figure [1](#F1){ref-type="fig"}j), classified as absent or present; mosaic architecture ([@R16]) (Figure [1](#F1){ref-type="fig"}k), a mass of randomly distributed internal nodules or compartments differing in enhancement, classified as absent or present; nodule-in-nodule architecture ([@R16]) (Figure [1](#F1){ref-type="fig"}l), the presence of a nodule within a larger nodule or mass, classified as absent or present; and HCC with enhancement, classified as \<25% (Figure [1](#F1){ref-type="fig"}m), 25%--50% (Figure [1](#F1){ref-type="fig"}n), 50%--75% (Figure [1](#F1){ref-type="fig"}o), or \>75% (Figure [1](#F1){ref-type="fig"}p).
{#F1}
Radiomic feature extraction {#s2-5}
---------------------------
Baseline CT images were obtained using the scanners in the collaborative hospitals (see Table S1, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>). All CT images were retrieved from the picture archiving and communication system.
Because HCC capsule was identified in the portal phase rather than the arterial phase ([@R16]), which could increase the accuracy of lesion segmentation, the portal phase was used for feature extraction. The target lesion was selected according to the modified Response Evaluation Criteria in Solid Tumor ([@R27]) (see Text S1, Supplemental Digital Content 1, <http://links.lww.com/CTG/A84>). In total, we extracted 708 radiomic features (see Text S2, Supplemental Digital Content 1, <http://links.lww.com/CTG/A84>). After randomly sampling 20% cases per hospital, we used morphologic perturbations to test the robustness and redundancy (see Text S3, Supplemental Digital Content 1, <http://links.lww.com/CTG/A84>) ([@R28]). The related program, instruction, and example of patients can be downloaded from <http://www.radiomics.net.cn/post/108>.
Statistical analysis {#s2-6}
--------------------
Continuous variables were expressed as mean (SD) or median (range) based on whether they were normally distributed or not, and groups were compared using the *t*-test or Wilcoxon rank-sum test as appropriate. Categorical variables were expressed as percentages, and groups were compared using the Pearson χ^2^ test or Fisher exact test.
For model construction, after randomly splitting the patients into the training and validation data sets, we used the following steps to develop our individualized model. First, we collected the clinical factors, radiological characteristics, and radiomic features for our model. Second, inverse probability of treatment weighting (IPTW) based on the propensity score was used to weight the patients in the training and validation data sets separately (see Text S4, Supplemental Digital Content 1, <http://links.lww.com/CTG/A84>) ([@R29],[@R30]), because our model aimed to ensure the causal effect ([@R31]) in treatment outcome differences between LR and TACE. Third, the Cox proportional hazard model was applied to predict the PFS associated with LR and TACE using the weighted training data set. The candidate factors and their interactions with treatments were selected by the Least Absolute Shrinkage and Selection Operator method ([@R32]) and the backward stepwise selection method using the Akaike information criterion. We constructed 3 models to evaluate whether the combination of clinical factors, radiological characteristics, and radiomic features was necessary: Model^CR^ included clinical factors (C) and radiological characteristics (R); Model^R^, radiomic features (R); and Model^CRR^, clinical factors (C), radiological characteristics (R), and radiomic features (R). We also compared our developed models with 2 other existing models (ITA.LI.CA ([@R33]) and CLIP ([@R34])) reported to be superior. The predictive accuracy of the developed models was assessed by both discriminations measured by the time-dependent receiver operating characteristic curve for 1-, 2-, and 3-year PFS and Harrell concordance index (C-index), and calibration evaluated by the calibration plot. A nomogram of the best developed model was obtained. Fourth, we calculated the score difference between LR and TACE of the best model; the cutoff value of the score difference was used to subdivide the patients for classification. We used Kaplan-Meier plots to compare the difference between the subgroups. The abovementioned steps are illustrated in Figure [2](#F2){ref-type="fig"}.
{#F2}
All statistical tests performed were two sided, and *P* values \<0.05 were considered statistically significant. We analyzed data by the R statistical package (<http://www.r-project.org/>).
RESULTS {#s3}
=======
Characteristics of the study population {#s3-1}
---------------------------------------
Among the 520 patients, the training and validation data sets had 302 and 218 patients, respectively (Table [1](#T1){ref-type="table"}). The patients initially treated by LR and TACE were 97 (32%) and 205 (68%) in the training data set and 65 (30%) and 153 (70%) in the validation data set, respectively. During follow-up, 338 patients (training: 193; validation: 145) showed PD, and 182 patients (training: 102; validation: 80) died. Baseline differences between LR and TACE groups before IPTW were shown in Table S2 (see Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>).
######
Baseline demographics of patients in the training and validation data sets

Radiomic features and IPTW results {#s3-2}
----------------------------------
For the 708 radiomic features, 607 features with intraclass correlation coefficient \> 0.75 were used for the final analysis (see Figure S2, Supplemental Digital Content 3, <http://links.lww.com/CTG/A86>). IPTW controlled the baseline differences between LR and TACE groups such as tumor burden, liver function, and chronic liver disease (see Text S5, Supplemental Digital Content 1, <http://links.lww.com/CTG/A84>) in both data sets (see Figure S3a,b, Supplemental Digital Content 3, <http://links.lww.com/CTG/A86>) and most standardized differences \<10% (see Table S2, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>). After IPTW, there were 512 patients included for PFS analysis (training: 298 patients; validation: 214 patients).
Model development and validation {#s3-3}
--------------------------------
Among the 5 models, Model^CRR^, containing treatments, age, sex, BCLC stage, fusion lesions, HCC capsule, and 3 radiomic features (FOS_Kurtosis, CO_IV, and POF_entropy), showed the best area under the curve for 1-, 2- and 3-year PFS (training: 0.78, 0.80, and 0.80; validation: 0.73, 0.74, and 0.75, respectively, Figure [3](#F3){ref-type="fig"}). The differences between Model^CRR^ and the other 4 models were statistically significant (see Table S3, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>), with Model^CRR^ having the highest Harrell C-index (Model^CR^: 0.696; Model^R^: 0.626; Model^CRR^: 0.707; ITA.LI.CA: 0.650; CLIP: 0.620). Model^CRR^ showed good calibration in both data sets (Figure [4](#F4){ref-type="fig"}a,b). In addition, Model^CRR^ showed an improved performance than the model without modified BCLC and stage AB (see Text S6, Supplemental Digital Content 1, <http://links.lww.com/CTG/A84>, and see Figure S4, Figure S5, Supplemental Digital Content 3, <http://links.lww.com/CTG/A86>).
{#F3}
{#F4}
Based on the above results, a nomogram of Model^CRR^ was constructed (Figure [4](#F4){ref-type="fig"}c). In the nomogram, 3 radiomic features were included, with their calculation formulas and schematic diagram displayed (Figure [4](#F4){ref-type="fig"}d--f) and a detailed explanation provided in the discussion. CO_IV was identified to have an interaction with treatments, and therefore, different scores were assigned for CO_IV, facilitating the predicted PFS for LR and TACE each.
Population classification {#s3-4}
-------------------------
In the IPTW-weighted patients, the PFS difference between LR and TACE group was significant in the training data set: hazard ratio (HR) = 0.67 (95% confidence interval \[CI\]: 0.47--0.91), *P* = 0.012 (Figure [5](#F5){ref-type="fig"}a; see Table S4, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>); but not in the validation data set: HR = 0.82 (95% CI: 0.57--1.19), *P* = 0.304 (Figure [5](#F5){ref-type="fig"}b; see Table S4, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>). The inconsistency between data sets indicated that not all patients got PFS benefit from LR, and patients should be classified into subgroups for more reasonable treatment decision. Thus, we calculated the score difference of Model^CRR^ (ΔModel^CRR^) by the formula ΔModel^CRR^ = Model^CRR^ (LR score)−Model^CRR^ (TACE score). We used −5.00 as the threshold because we wanted to ensure PFS benefit for patients identified to be suitable for LR.
{#F5}
In patients with ΔModel^CRR^ ≤ −5.00 (LR− and TACE− subgroups), LR provided longer PFS. We obtained an HR = 0.50 (95% CI: 0.29--0.87), with *P* = 0.014 in the training data set (Figure [5](#F5){ref-type="fig"}c; see Table S4, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>), and HR = 0.52 (95% CI: 0.29--0.93), with *P* = 0.026 in the validation data set (Figure [5](#F5){ref-type="fig"}d; see Table S4, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>). Thus, LR might be the first option for these patients.
In patients with ΔModel^CRR^ \> −5.00 (LR+ and TACE+ subgroups), there were no differences in PFS. In the training data set, the HR was 0.84 (95% CI: 0.57--1.25), with *P* = 0.388 (Figure [5](#F5){ref-type="fig"}e; see Table S4, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>); in the validation data set, the HR was 1.14 (95% CI: 0.69--1.85), with *P* = 0.614 (Figure [5](#F5){ref-type="fig"}f; see Table S4, Supplemental Digital Content 2, <http://links.lww.com/CTG/A85>). Thus, TACE might be a better choice because it was less invasive and did not cause decreased PFS.
We tested whether the classification was still informative in patients without extrahepatic metastasis as in a previous study ([@R3]), and the subgroup demonstrated similar results (see Figure S6, Supplemental Digital Content 3, <http://links.lww.com/CTG/A86>). Even if we excluded patients in BCLC stages A and C, our model could still classify patients either for LR or TACE (Figure [6](#F6){ref-type="fig"}). In patients with ΔModel^CRR^ ≤ −5.00, LR provided longer PFS. We obtained an HR = 0.41 (95% CI: 0.20--0.85), with *P* = 0.016 in the training data set, and HR = 0.32 (95% CI: 0.14--0.70), with *P* = 0.004 in the validation data set. For patients with ΔModel^CRR^ \> −5.00, there were no differences in PFS: training data set, HR = 0.78 (95% CI: 0.43--1.42), with *P* = 0.422, validation dataset, HR = 1.57 (95% CI: 0.76--3.23), with *P* = 0.225. Representative patients of the 4 subgroups are shown in Figure [7](#F7){ref-type="fig"}.
{#F6}
{#F7}
DISCUSSION {#s4}
==========
In this study, based on IPTW-weighted data, we used a noninvasive model to predict PFS of LR and TACE, which had good discrimination and calibration in both training and validation data sets. Then, subdivided by the threshold of the score difference, for some patients, LR provided better PFS than TACE, which suggested LR to be a potential better choice for increased PFS. However, for the other patients, because LR and TACE had similar PFS, TACE seemed a better option to control unnecessary trauma and risks. These conclusions were especially useful for patients in BCLC stages AB and B, in which there were more controversies between the choice of LR and TACE.
The choice between LR and TACE mainly depends on the difference in survival benefit; however, the patients\' preference between controlling trauma/risks and survival difference should also be considered ([@R35]). Thus, besides classification, doctors and patients also need to know the predicted PFS associated with each treatment. For example, with a 6-month predicted PFS difference, a young father may tend to accept LR, whereas a 60-year-old patient may want TACE to control sufferings. However, when the PFS difference is 1-year, both may choose LR as the first option. Thus, after knowing the exact PFS difference predicted by the nomogram, the doctors may adjust the classification threshold of −5.00 according to clinical situation and patients\' preference between risks/trauma and PFS benefit.
Compared with previous studies on HCC prognosis ([@R36]), our study not only performed PFS prediction on both LR and TACE cohorts but also established a procedure to compare the PFS between LR and TACE. Besides traditional clinical factors, such as BCLC stage including maximum diameter and lesion number, we also combined radiological characteristics and radiomic features. Compared with other clinical factors such as alpha-fetoprotein, these factors facilitated data mining from conventional CT images and provided more information of intratumor heterogeneity and were included in the final model. Compared with previous studies on treatments decision ([@R3],[@R14]), instead of based on "post-treatment regret of doctors", our model used more objective PFS end point, and we constructed our model on IPTW-weighted data set, which increased the comparability between LR and TACE groups, ensuring the causal effect between treatments and PFS difference. Because all our factors could be extracted through noninvasive methods, no additional biopsy would be required. Thus, treatment decision could be assisted with minimal disturbance of current HCC management.
In this study, besides conventional radiomic features ([@R17]), we also included "peer-off" features indicating HCC heterogeneity from the outside to the inside. Similar to CT attenuation, radiomic features reflect the granular changes in radiological images. As we cannot provide a definite causal relationship between CT attenuation and pathological results, we also cannot explain radiomic features pathologically. However, we may provide an explanation for the identified features based on their extraction methods. FOS_Kurtosis is Kurtosis of first-order statistics (0) and represents the first-order features on an original image. If the kurtosis is \>3, the distribution of the intensity is sharper than a normal distribution (Figure [4](#F4){ref-type="fig"}d). CO_IV is inverse variance of co-occurrence ([@R1],[@R2]) and represents the co-occurrence of the textural features of inverse variance on the x-direction high-pass and the y-direction low-pass filtered image. CO_IV emphasizes more edge information in the x-direction, and greater inverse variance indicates a more heterogeneous texture (Figure [4](#F4){ref-type="fig"}e). In our study, we found that when CO_IV decreases, the PFS between LR and TACE decreased at different rates, so independent scores of CO_IV were assigned for LR and TACE separately. Finally, POF_entropy is a peer-off feature of entropy ([@R9]) and represents the peel-off feature entropy in the innermost layer. It measures the texture randomness or irregularity of the layer (Figure [4](#F4){ref-type="fig"}f).
Our study has some limitations. First, because we perform IPTW in the training and validation separately, giving them a certain degree of independence, the potential bias of the analysis procedures can be controlled. Still, considering the complexity of the issue, an external validation data set is needed to further test our model. Second, for the differences of HCC between Asia and the Western countries, validation in a non-Chinese population is needed before our conclusions are applied in western cohorts. Third, as patients are divided into 8 subgroups for PFS analysis, the sample size of the study population may be relatively limited, and we were unable to perform more detailed analysis according to different BCLC stages. But ΔModel^CRR^ still successfully classifies patients based on PFS difference, which may also be helpful in controlling unnecessary surgical trauma and risks while ensuring better treatment for patients. Hopefully, these shortcomings can be addressed with further international research and cooperation.
In conclusion, our individualized model predicts the PFS difference between LR and TACE and assists the treatment decision: in selected patients, LR can be used to increase PFS benefit; in the others, TACE can be preferable to avoid unnecessary trauma and risks.
CONFLICTS OF INTEREST {#s5}
=====================
**Guarantors of the article:** Jie Tian, PhD and Ligong Lu, MD.
**Specific author contributions:** Sirui Fu, MD, Jingwei Wei, PhD, Jie Zhang, MD, and Di Dong, PhD, contributed equally to this work. S.F., J.W., J.Z., and D.D. conceived and designed the project with supervision from J.T. and L.L. J.S., Y.L., X.L., X.C., X.H., and J.Y. acquired the data. J.Z. and J.Y. segmented the data manually. S.Z., D.G., X.H., and Z.L. extracted radiomic features. C.D. performed the statistical analysis. All authors were involved in drafting and reviewing the manuscript and approved the final manuscript for submission.
**Financial support:** This work was supported by the National Key R&D Program of China (Nos. 2017YFA0205200, 2017YFC1308700, 2017YFC1308701, 2017YFC1309100, and 2016CZYD0001), the National Natural Science Foundation of China (Nos. 81571785, 81771957, 81227901, 61231004, 81771924, 81501616, 81671851, 81527805, and 81501549), the Natural Science Foundation of Guangdong Province, China (Nos. 2016A030311055 and 2016A030313770), the Science and Technology Service Network Initiative of the Chinese Academy of Sciences (KFJ-SW-STS-160), the Instrument Developing Project of the Chinese Academy of Sciences (YZ201502), the Beijing Municipal Science and Technology Commission (Z161100002616022), and the Youth Innovation Promotion Association CAS.
**Potential competing interests:** None.
###### Study Highlights
WHAT IS KNOWN
-------------
✓ LR and TACE are first-line treatments with overlapped adaptation in HCC.✓ Choice between them should be assisted by noninvasive models to avoid unnecessary biopsies.
WHAT IS NEW HERE
----------------
✓ Our model predicted and compared PFS between LR and TACE.✓ Subdivided by the score difference, LR provides longer PFS than TACE in some patients.✓ In the other patients, the 2 treatments provided similar PFS.
TRANSLATIONAL IMPACT
--------------------
✓ Our model predicted PFS difference between LR and TACE and assisted in choosing the optimal treatment.
Supplementary Material
======================
###### SUPPLEMENTARY MATERIAL
**SUPPLEMENTARY MATERIAL** accompanies this paper at <http://links.lww.com/CTG/A84>, <http://links.lww.com/CTG/A85>, and <http://links.lww.com/CTG/A86>
| 2023-09-01T01:26:35.434368 | https://example.com/article/9579 |
Russia forces US to move against IS
US special forces and the Kurdish military rescued about 70 hostages from the IS in a raid of a prison in northern Iraq on Thursday, during which a US soldier was killed.
It's the first ground maneuver by the US military in the IS-controlled areas.
The Pentagon soon dismissed the speculation of a change of US tactics in Iraq and US ground forces engaging the IS. People are convinced that the operation was just an isolated case.
It seems it was Russian air strikes on IS that pressured the US into the military operations on Thursday. In other words, the Kremlin was behind the US operations in the Middle East.
The US has labeled the IS as a terrorist organization from the very beginning. However, the US military hasn't weakened the organization but has seen it growing after years of fighting with it. The reason for this is simply obvious for the whole world to see: The IS fights the Assad government, and it has been used by Washington which also supports Syrian opposition forces. US attacks aim to curb the IS from going out of control, rather than destroy it.
The hatred of the US toward Assad stems from what it sees the position of Damascus as the last stronghold of Russia in the Middle East. The US never acknowledges its true intention even though it's no secret. The terrorist nature of the IS and the heinous crimes it committed shocked the world, so the US had to treat it as no less an evil than the Assad administration.
The sudden strikes on IS by Putin and successful destruction of hundreds of its targets have torn off the disguise of the US, and it will lose its last credibility if it still holds fire.
The US successfully rescued about 70 hostages. However, the US might have hyped the rhetoric of their "imminent mass execution" in order to add sensation. After all, the public won't refuse the dramatic stories like those they see in Hollywood movies.
Moscow has successfully set the agenda on the strikes against IS, become a leading force in the Syrian situation, and brought new energy to the Middle East. Russia has been an outsider in the Middle East ever since the collapse of the former Soviet Union, but Putin has brought his country back as an influential geopolitical power in the region.
The US has too long a global frontier for its national power, and gaps inevitably occur. Though Russia is incomparable with the US in terms of national power, it's possible for Putin to grip regional success from flash opportunities.
Moscow will have the Syrian situation under control at least for now, and Washington will have to spend a great deal of energy in order to have it overturned. It's difficult for the US to find an excuse to do so, while it's also unclear whether its European allies will share the risk.
| 2024-04-10T01:26:35.434368 | https://example.com/article/6581 |
Isolation, synthesis and characterization of ω-TRTX-Cc1a, a novel tarantula venom peptide that selectively targets L-type Cav channels.
Spider venoms are replete with peptidic ion channel modulators, often with novel subtype selectivity, making them a rich source of pharmacological tools and drug leads. In a search for subtype-selective blockers of voltage-gated calcium (CaV) channels, we isolated and characterized a novel 39-residue peptide, ω-TRTX-Cc1a (Cc1a), from the venom of the tarantula Citharischius crawshayi (now Pelinobius muticus). Cc1a is 67% identical to the spider toxin ω-TRTX-Hg1a, an inhibitor of CaV2.3 channels. We assembled Cc1a using a combination of Boc solid-phase peptide synthesis and native chemical ligation. Oxidative folding yielded two stable, slowly interconverting isomers. Cc1a preferentially inhibited Ba(2+) currents (IBa) mediated by L-type (CaV1.2 and CaV1.3) CaV channels heterologously expressed in Xenopus oocytes, with half-maximal inhibitory concentration (IC50) values of 825nM and 2.24μM, respectively. In rat dorsal root ganglion neurons, Cc1a inhibited IBa mediated by high voltage-activated CaV channels but did not affect low voltage-activated T-type CaV channels. Cc1a exhibited weak activity at NaV1.5 and NaV1.7 voltage-gated sodium (NaV) channels stably expressed in mammalian HEK or CHO cells, respectively. Experiments with modified Cc1a peptides, truncated at the N-terminus (ΔG1-E5) or C-terminus (ΔW35-V39), demonstrated that the N- and C-termini are important for voltage-gated ion channel modulation. We conclude that Cc1a represents a novel pharmacological tool for probing the structure and function of L-type CaV channels. | 2024-07-20T01:26:35.434368 | https://example.com/article/4546 |
ANESTHESIA: IV sedation with 1% lidocaine with epinephrine local anesthetic.
ESTIMATED BLOOD LOSS: Minimal.
SPECIMENS: None.
INDICATIONS FOR OPERATION: The patient is a (XX)-year-old woman being managed in the medical intensive care unit, had respiratory failure requiring mechanical ventilator support. General Surgery was consulted for planned percutaneous tracheostomy for prolonged mechanical ventilation requirements. After risks and benefits of the procedure were explained in detail to the patient and the patient's family, informed consent was obtained.
DESCRIPTION OF OPERATION: Following induction of general anesthesia, the patient was prepped and draped in the standard sterile surgical fashion. Local anesthetic was then applied to the area, approximately 2 fingerbreadths above the sternal notch. Gentle IV sedation with Versed and fentanyl was provided. A 1 cm incision was made transversely at the area of the local anesthetic placement. Using the hemostat, the subcutaneous tissues were bluntly dissected down to the trachea. A bronchoscope was then inserted from the ET tube and the ET tube was repositioned so that the bronchoscope revealed clear view of the trachea access. A needle catheter was then inserted via the neck incision and the bronchoscope confirmed placement of the needle and catheter. The needle was removed and the catheter advanced to short distance and the wire was passed easily under confirmation of the bronchoscopy. Sequential dilation was then performed using the percutaneous tracheostomy kit and a #8 Shiley trach was inserted without difficulty. The balloon was inflated and the ventilator hooked up to the tracheostomy tube. A bronchoscope was then reinserted through the tracheostomy and some secretions were removed and there was minimal blood suctioned as well. The tracheostomy was secured with 2-0 nylon. Portable chest x-ray was ordered stat., which revealed good placement of the tracheostomy tube. The patient tolerated the procedure well and there were no complications during the procedure.
Subscribe Free
Related Websites
Blog Archive
SEARCH ALL SAMPLE REPORTS / WORDS ON THIS BLOG BY USING THE SEARCH BOX BELOW
Disclaimer
All personal information, including patient and physician names/dates/location, etc., has been deleted or changed, in order to maintain the highest professional standards of patient/physician confidentiality. Also, do note that the sample reports found on this site vary in terms of formats, depending on account specifics of various clients, and are part of this blog for informational and educational purposes only, and not intended to replace professional medical advice or opinions from qualified, licensed physicians. | 2024-07-27T01:26:35.434368 | https://example.com/article/8075 |
Easy To Use Patents Search & Patent Lawyer Directory
At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Light source, a method of manufacturing the same, and a backlight unit
having the same
Abstract
A light source includes a substrate and a plurality of light emitting
devices disposed on the substrate. Each of the light emitting devices is
configured to generate a first light. A plurality of quantum-dot devices
are respectively disposed on the light emitting devices. The quantum-dot
devices are configured to convert the first light to a second light. The
quantum-dot devices are configured to be attached to and detached from
the light emitting devices, respectively.
1. A light source, comprising: a substrate; a plurality of light emitting devices disposed on the substrate, wherein each of the light emitting devices comprises a first
case including a recess, and wherein each of the light emitting devices is configured to generate a first light; and a plurality of quantum-dot devices respectively disposed on the light emitting devices, wherein the quantum-dot devices are configured
to convert the first light to a second light, and wherein the quantum-dot devices are configured to be attached to and detached from the light emitting devices, respectively, wherein each of the quantum-dot devices comprises a second case having a frame
shape, a plurality of engaging members connected to a lower portion of the second case and protruded downward, and a quantum-dot member including a first barrier layer, a second barrier layer, and a quantum-dot layer disposed between the first and second
barrier layers, and the first barrier layer and the quantum-dot layer are disposed in the second case, wherein the second case comprises a first hole through a first side wall of the second case and a second hole through a second side wall of the second
case facing the first side wall of the second case, and wherein the first hole is substantially aligned with the second hole.
2. The light source of claim 1, wherein each of the light emitting devices comprises: a light emitting unit disposed in the recess, wherein the light emitting unit is configured to generate the first light; and a plurality of engaging recesses
disposed in a lower portion of the first case.
3. The light source of claim 2, wherein the quantum-dot member is configured to convert the first light to the second light, and wherein the engaging members are disposed in the engaging recesses, respectively.
4. The light source of claim 3, wherein the second case comprises: a first frame having a frame shape; a second frame connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the inner
side surface of the first frame; an opening portion formed through the second frame, wherein a size of the opening portion is larger than a size of the recess of the first case, the recess is overlapped with the opening portion, the first case is
disposed under the second frame, and the first barrier layer and the quantum-dot layer are disposed on the second frame and disposed in the first frame.
5. The light source of claim 3, wherein each of the engaging members comprises: a first extension portion connected to the lower portion of the second case and extending in a downward direction; and a second extension portion connected to a
lower portion of an inner side surface of the first extension portion and extending vertically with respect to the inner side surface of the first extension portion, wherein the inner side surface of the first extension portion, which is not connected to
the second extension portion is in contact with a side surface of the first case at an upper portion of the engaging recess, and the second extension portion is disposed in a corresponding engaging recess of the engaging recesses.
6. The light source of claim 3, wherein the first light comprises a blue light, the second light comprises a white light, and the second case and the engaging members comprise a plastic resin.
7. The light source of claim 1, wherein each of the light emitting devices comprises: a light emitting unit disposed in the first case, wherein the light emitting unit is configured to generate the first light; and a first protrusion portion
protruded outward from a lower portion of a side surface of the first case, wherein the first protrusion portion extends along the side surface of the first case.
8. The light source of claim 7, wherein each of the quantum-dot devices comprises: a first frame having a frame shape; a second frame connected to an inner side surface of the first frame, wherein the second frame extends vertically with
respect to the inner side surface of the first frame; and an engaging recess disposed under the second frame and recessed from a lower portion of the inner side surface of the first frame toward an outer side surface of the first frame; and a
quantum-dot member disposed on the second frame and disposed in the first frame, wherein the quantum-dot member is configured to convert the first light to the second light, the light emitting devices are disposed at the lower portion of the second frame
and disposed in the first frame, the engaging recess extends along the inner side surface of the first frame, and the first protrusion portion is inserted into the engaging recess.
9. The light source of claim 1, wherein each of the light emitting devices comprises: a light emitting unit disposed in the first case, wherein the light emitting unit is configured to generate the first light; and an engaging recess recessed
from a lower portion of a side surface of the first case toward an inside of the first case.
10. The light source of claim 9, wherein each of the quantum-dot devices comprises: a first frame having a frame shape; a second frame connected to an inner side surface of the first frame and extending vertically with respect to the inner
side surface of the first frame; and a second protrusion portion disposed on a lower portion of the second frame, wherein the second protrusion portion is protruded from a lower portion of the inner side surface of the first frame toward an inside of
the first frame, wherein the light emitting devices are disposed at the lower portion of the second frame and disposed in the first frame, the second protrusion portion extends along the inner side surface of the first frame, and the second protrusion
portion is disposed in the engaging recess.
11. A method of manufacturing a light source, comprising: connecting a plurality of light emitting devices to a substrate, wherein each of the light emitting devices comprises a first case, and wherein the light emitting devices are configured
to generate a first light; manufacturing of a quantum-dot devices, wherein the quantum-dot devices comprise a second case including a first frame having a frame shape, a first hole formed through a first side portion of the first frame and a second hole
formed through a second side portion of the first frame, a plurality of engaging members connected to a lower portion of the second case and protruded downward, and a quantum-dot member including a quantum-dot layer; disposing quantum-dot devices on the
light emitting devices to convert the first light to a second light, wherein the quantum-dot devices include engaging members; and connecting the quantum-dot devices to the light emitting devices, respectively, with the engaging members, wherein the
quantum-dot devices are attached to and detached from the light emitting devices, respectively, by the engaging members, wherein the manufacturing of the quantum-dot devices comprises: filling a resin solution containing a plurality of quantum dots in a
first space defined in the first frame, and curing the resin solution to form the quantum-dot layer, wherein the filling of the resin solution in the first space comprises: depositing the resin solution in the first space through the first hole; and
discharging air in the first space through the second hole.
12. The method of claim 11, wherein at least one of the light emitting devices comprises: a light emitting unit disposed in the first case, wherein the light emitting unit is configured to generate the first light; and a plurality of engaging
recesses disposed in the first case.
13. The method of claim 12, wherein the quantum-dot member comprises a first barrier layer, a second barrier layer, and the quantum-dot layer disposed between the first and second barrier layers, wherein the quantum-dot member is configured to
convert the first light to the second light, the engaging members are inserted into the engaging recesses, respectively, and the first barrier layer and the quantum-dot layer are disposed in the second case.
14. The method of claim 13, wherein the second case further comprises: a second frame connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the inner side surface of the first frame;
and an opening portion formed through the second frame, wherein a size of the opening portion is larger than a size of a recess of the first case, the recess is overlapped with the opening portion, the first case is disposed under the second frame, and
the first barrier layer and the quantum-dot layer are disposed on the second frame and disposed in the first frame.
15. The method of claim 14, wherein the manufacturing of the quantum-dot devices further comprises: disposing the first barrier layer on an upper surface of the second frame; and disposing the second barrier layer on an upper surface of the
first frame, wherein the first space is defined between the first barrier layer and the second barrier layer.
16. The method of claim 13, wherein at least one of the engaging members comprises: a first extension portion connected to the lower portion of the second case and extending in a downward direction; and a second extension portion connected to
a lower portion of an inner side surface of the first extension portion and extending vertically with respect to the inner side surface of the first extension portion, the inner side surface of the first extension portion is in contact with a side
surface of the first case at an upper portion of the engaging recess, and the second extension portion is inserted into a corresponding engaging recess of the engaging recesses.
17. A method of manufacturing a light source, comprising: connecting a plurality of light emitting devices to a substrate, wherein the light emitting devices are configured to generate a first light; disposing quantum-dot devices on the light
emitting devices to convert the first light to a second light, wherein the quantum-dot devices include engaging members; connecting the quantum-dot devices to the light emitting devices, respectively, with the engaging members, wherein the quantum-dot
devices are attached to and detached from the light emitting devices, respectively, by the engaging members, wherein at least one of the light emitting devices comprises: a first case; a light emitting unit disposed in the first case, wherein the light
emitting unit is configured to generate the first light; and a plurality of engaging recesses disposed in the first case, wherein at least one of the quantum-dot devices comprises: a second case having a frame shape; a plurality of engaging members
connected to a lower portion of the second case and protruded downward; and a quantum-dot member including a first barrier layer, a second barrier layer, and a quantum-dot layer disposed between the first and second barrier layers, wherein the
quantum-dot member is configured to convert the first light to the second light, the engaging members are inserted into the engaging recesses, respectively, and the first barrier layer and the quantum-dot layer are disposed in the second case, wherein
the second case comprises: a first frame having the frame shape; a second frame connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the inner side surface of the first frame; an opening
portion formed through the second frame; a first hole formed through a first side portion of the first frame and overlapped with the quantum-dot layer; and a second hole formed through a second side portion of the first frame and overlapped with the
quantum-dot layer, a size of the opening portion is larger than a size of a recess of the first case, the recess is overlapped with the opening portion, the first case is disposed under the second frame, and the first barrier layer and the quantum-dot
layer are disposed on the second frame and disposed in the first frame; and manufacturing the quantum-dot devices, wherein the manufacturing of the quantum-dot devices comprises: disposing the first barrier layer on an upper surface of the second frame; disposing the second barrier layer on an upper surface of the first frame; filling a resin solution containing a plurality of quantum dots in a first space defined between the first barrier layer and the second barrier layer; and curing the resin
solution to form the quantum-dot layer in the first space, wherein the filling of the resin solution in the first space comprises: depositing the resin solution in the first space through the first hole; and discharging air in the first space through
the second hole.
18. A backlight unit, comprising: a light source configured to convert a first light to a second light; and an optical sheet that diffuses the second light and condenses the second light in an upward direction, the light source comprising: a
substrate; a plurality of light emitting devices connected to the substrate, wherein each of the light emitting devices comprises a first case including a recess, and wherein each of the plurality of light emitting devices is configured to generate the
first light; and a plurality of quantum-dot devices respectively disposed on the light emitting devices, wherein each of the plurality of quantum-dot devices is configured to convert the first light to the second light, and wherein the quantum-dot
devices are configured to be attached to and detached from the light emitting devices, respectively, wherein each of the quantum-dot devices comprises a second case having a frame shape, a plurality of engaging members connected to a lower portion of the
second case and protruded downward, and a quantum-dot member including a first barrier layer, a second barrier layer, and a quantum-dot layer disposed between the first and second barrier layers, and the first barrier layer and the quantum-dot layer are
disposed in the second case, wherein the second case comprises a first hole through a first side wall of the second case and a second hole through a second side wall of the second case facing the first side wall of the second case, wherein the first hole
faces the second hole through the quantum-dot member, and wherein the first hole is substantially aligned with the second hole.
19. The backlight unit of claim 18, wherein each of the light emitting devices comprises: a light emitting unit disposed in the recess of the first case, wherein the light emitting unit is configured to generate the first light; and a
plurality of engaging recesses recessed from a lower portion of the first case to an upper portion of the first case, which is adjacent to a side surface of the first case, wherein the quantum-dot member is configured to convert the first light to the
second light, and wherein each of the engaging members comprises: a first extension portion connected to the lower portion of the second case and extending in a downward direction; and a second extension portion connected to a lower portion of an inner
side surface of the first extension portion and extending vertically with respect to the inner side surface of the first extension portion, the inner side surface of the first extension portion is in contact with a side surface of the first case at an
upper portion of the engaging recess, and the second extension portion is disposed in a corresponding engaging recess of the engaging recesses.
20. The backlight unit of claim 19, wherein the second case comprises: a first frame having a frame shape; a second frame connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the
inner side surface of the first frame; and an opening portion formed through the second frame, wherein a size of the opening portion is larger than a size of the recess, the recess is overlapped with the opening portion, the first case is disposed under
the second frame, and the first barrier layer and the quantum-dot layer are disposed on the second frame and disposed in the first frame.
21. A quantum-dot device, comprising: a case comprising a first frame and a second frame, wherein the second frame is connected to a lower portion of an inner side surface of the first frame and the second frame extends vertically with respect
to the inner side surface of the first frame; an opening portion formed in a center of the case; a quantum-dot member comprising a quantum-dot layer, a first barrier layer and a second barrier layer disposed on the second frame; a first hole through a
first side wall of the case and a second hole through a second side wall of the case facing the first side wall of the case, wherein the first hole faces the second hole through the quantum-dot member, and wherein the first hole is substantially aligned
with the second hole; and an engaging member comprising a first extension portion connected to a bottom portion of the case and a second extension portion connected to the first extension portion, wherein the engaging member is configured to be attached
to and detached from a light-emitting device, wherein the quantum-dot layer is disposed between the first and second barrier layers.
22. The quantum-dot device of claim 21, wherein the quantum dot device is configured to convert a first light to a second light.
23. The quantum-dot device of claim 21, wherein the quantum dot device is configured to convert a blue light to a white light.
24. The quantum-dot device of claim 21, wherein the engaging members include a plastic resin.
25. The quantum-dot device of claim 21, wherein the first extension portion extends in a downward direction and the second extension portion extends perpendicularly with respect to the first extension portion towards the opening of the case.
Description
CROSS-REFERENCE TO RELATED APPLICATION
This U.S. non-provisional patent application claims priority under 35 U.S.C. .sctn.119 to Korean Patent Application No. 10-2013-0110651, filed on Sep. 13, 2013, the disclosure of which is incorporated by reference herein in its entirety.
1. TECHNICAL FIELD
Exemplary embodiments of the present invention relate to a light source, a method of manufacturing the same, and a backlight unit having the same.
2. DISCUSSION OF RELATED ART
Display devices, such as a liquid crystal display device, an electrowetting display device, an eletrophoretic display device, etc., have been developed.
A display device may include a display panel that displays an image and a backlight unit that provides light to the display panel. The display panel may control a transmittance of the light provided from the backlight unit to display an image.
The light provided to the display panel from the backlight unit may be a white light.
SUMMARY
Exemplary embodiments of the present invention provide a light source capable of preventing a quantum-dot device from being damaged.
Exemplary embodiments of the present invention provide a method of manufacturing the light source.
Exemplary embodiments of the present invention provide a backlight unit having the light source.
Exemplary embodiments of the present invention provide a light source including a substrate and a plurality of light emitting devices disposed on the substrate. Each of the light emitting devices is configured to generate a first light. A
plurality of quantum-dot devices are respectively disposed on the light emitting devices. The quantum-dot devices are configured to convert the first light to a second light. The quantum-dot devices are configured to be attached to and detached from
the light emitting devices, respectively.
Each of the light emitting devices may include a first case including a recess. A light emitting unit may be disposed in the recess. The light emitting unit may be configured to generate the first light. A plurality of engaging recesses may
be disposed in a lower portion of the first case.
Each of the quantum-dot devices may include a second case having a frame shape. A plurality of engaging members are connected to a lower portion of the second case and protruded downward. A quantum-dot member may include a first barrier layer,
a second barrier layer, and a quantum-dot layer disposed between the first and second barrier layers. The quantum-dot member may be configured to convert the first light to the second light. The engaging members may be disposed in the engaging
recesses, respectively. The first barrier layer and the quantum-dot layer may be disposed in the second case.
The second case may include a first frame having the frame shape. A second frame may be connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the inner side surface of the first frame. An opening portion may be formed through the second frame. A first hole may be formed through a first side portion of the first frame and may be overlapped with the quantum-dot layer. A second hole may be formed through a second side portion of the
first frame and may be overlapped with the quantum-dot layer. A size of the opening portion may be larger than a size of the recess of the first case. The recess may be overlapped with the opening portion. The first case may be disposed under the
second frame. The first barrier layer and the quantum-dot layer may be disposed on the second frame and disposed in the first frame.
Each of the engaging members may include a first extension portion connected to the lower portion of the second case and extending in a downward direction. A second extension portion may be connected to a lower portion of an inner side surface
of the first extension portion and extending vertically with respect to the inner side surface of the first extension portion. The inner side surface of the first extension portion, which is not connected to the second extension portion, may be in
contact with a side surface of the first case at an upper portion of the engaging recess. The second extension portion may be disposed in a corresponding engaging recess of the engaging recesses.
The first light may include blue light and the second light may include white light. The second case and the engaging members may include a plastic resin.
Each of the light emitting devices may include a first case and a light emitting unit disposed in the first case. The light emitting unit may be configured to generate the first light. A first protrusion portion may protrude outward from a
lower portion of a side surface of the first case. The first protrusion portion may extend along the side surface of the first case.
Each of the quantum-dot devices may include a second frame connected to an inner side surface of the first frame. The second frame may extend vertically with respect to the inner side surface of the first frame. A first engaging recess may be
disposed under the second frame and recessed from a lower portion of the inner side surface of the first frame toward an outer side surface of the first frame. A quantum-dot member may be disposed on the second frame and disposed in the first frame.
The quantum-dot member may be configured to convert the first light to the second light. The light emitting devices may be disposed at the lower portion of the second frame and disposed in the first frame. The first engaging recess may extend along the
inner side surface of the first frame. The first protrusion portion may be inserted into the first engaging recess.
Each of the light emitting devices may include a first case and a light emitting unit disposed in the first case. The light emitting unit may be configured to generate the first light. A second engaging recess may be recessed from a lower
portion of a side surface of the first case toward an inside of the first case.
Each of the quantum-dot devices may include a first frame having a frame shape and a second frame connected to an inner side surface of the first frame and extending vertically with respect to the inner side surface of the first frame. A second
protrusion portion may be disposed on a lower portion of the second frame. The second protrusion portion may be protruded from a lower portion of the inner side surface of the first frame toward an inside of the first frame. A quantum-dot member may be
disposed on the second frame and disposed in the first frame. The light emitting devices may be disposed at the lower portion of the second frame and disposed in the first frame. The second protrusion portion may extend along the inner side surface of
the first frame, and the second protrusion portion may be disposed in the second engaging recess.
Exemplary embodiments of the present invention provide a method of manufacturing a light source including connecting a plurality of light emitting devices to a substrate. The light emitting devices are configured to generate a first light.
Quantum-dot devices are disposed on the light emitting devices to convert the first light to a second light. The quantum-dot devices are connected to the light emitting devices, respectively, with the engaging members. The quantum-dot devices are
attached to and detached from the light emitting devices, respectively, by the engaging members.
At least one of the light emitting devices may include a first case and a light emitting unit disposed in the first case. The light emitting unit may be configured to generate the first light. A plurality of engaging recesses may be disposed
in the first case.
At least one of the quantum-dot devices may include a second case having a frame shape and a plurality of engaging members connected to a lower portion of the second case and protruded downward. At least one of the quantum-dot devices may
include a quantum-dot member including a first barrier layer, a second barrier layer, and a quantum-dot layer disposed between the first and second barrier layers to convert the first light to the second light. The engaging members may be inserted into
the engaging recesses, respectively. The first barrier layer and the quantum-dot layer may be disposed in the second case.
The second case may include a first frame having the frame shape and a second frame connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the inner side surface of the first frame. An
opening portion may be formed through the second frame. A first hole may be formed through a first side portion of the first frame and may be overlapped with the quantum-dot layer. A second hole may be formed through a second side portion of the first
frame and may be overlapped with the quantum-dot layer. A size of the opening portion may be larger than a size of a recess of the first case. The recess may be overlapped with the opening portion. The first case may be disposed under the second
frame. The first barrier layer and the quantum-dot layer may be disposed on the second frame and may be disposed in the first frame.
The manufacturing of the quantum-dot devices may further include disposing the first barrier layer on an upper surface of the second frame and disposing the second barrier layer on an upper surface of the first frame. A resin solution
containing a plurality of quantum dots may be filled in a first space defined between the first barrier layer and the second barrier layer. The resin solution may be cured to form the quantum-dot layer in the first space.
The filling of the resin solution in the first space may include depositing the resin solution in the first space through the first hole and discharging air in the first space through the second hole.
At least one of the engaging members may include a first extension portion connected to the lower portion of the second case and extending in a downward direction. At least one of the engaging members may include a second extension portion
connected to a lower portion of an inner side surface of the first extension portion and extending vertically with respect to the inner side surface of the first extension portion. The inner side surface of the first extension portion, which is not
connected to the second extension portion, may be in contact with a side surface of the first case at an upper portion of the engaging recess. The second extension portion may be inserted into a corresponding engaging recess of the engaging recesses.
Exemplary embodiments of the present invention provide a backlight unit including a light source configured to convert a first light to a second light and an optical sheet that diffuses the second light and condenses the second light in an
upward direction. The light source includes a substrate and a plurality of light emitting devices connected onto the substrate. Each of the light emitting devices may be configured to generate the first light. A plurality of quantum-dot devices may be
respectively disposed on the light emitting devices. Each of the plurality of quantum-dot devices may be configured to convert the first light to the second light. The quantum-dot devices may be configured to be attached to and detached from the light
emitting devices, respectively.
Each of the light emitting devices may include a first case including a recess. A light emitting unit may be disposed in the recess of the first case, wherein the light emitting unit is configured to generate the first light. A plurality of
engaging recesses may be recessed from a lower portion of the first case to an upper portion of the first case, which is adjacent to a side surface of the first case. Each of the quantum-dot devices may include a second case having a frame shape and a
plurality of engaging members connected to a lower portion of the second case and protruded in a downward direction. A quantum-dot member including a first barrier layer, a second barrier layer, and a quantum-dot layer may be disposed between the first
and second barrier layers. The quantum-dot member may be configured to convert the first light to the second light. Each of the engaging members may include a first extension portion connected to the lower portion of the second case and extending in a
downward direction. A second extension portion may be connected to a lower portion of an inner side surface of the first extension portion and extending vertically with respect to the inner side surface of the first extension portion. The inner side
surface of the first extension portion, which is not connected to the second extension portion, may be in contact with a side surface of the first case at an upper portion of the engaging recess, and the second extension portion may be disposed in a
corresponding engaging recess of the engaging recesses.
The second case may include a first frame having the frame shape and a second frame connected to a lower portion of an inner side surface of the first frame and extending vertically with respect to the inner side surface of the first frame. An
opening portion may be formed through the second frame. A first hole may be formed through a first side portion of the first frame and overlapped with the quantum-dot layer. A second hole may be formed through a second side portion of the first frame
and overlapped with the quantum-dot layer. A size of the opening portion may be larger than a size of the recess. The recess may be overlapped with the opening portion. The first case may be disposed under the second frame. The first barrier layer
and the quantum-dot layer may be disposed on the second frame and disposed in the first frame.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other features of the present invention will become more apparent by describing in detail exemplary embodiments thereof, with reference to the accompanying drawings in which:
FIG. 1 is a perspective view showing a light source according to an exemplary embodiment of the present invention;
FIG. 4 is a cross-sectional view taken along line I-I' shown in FIG. 2;
FIG. 5 is cross-sectional view taken along line II-II' shown in FIG. 2;
FIGS. 6A to 6G are views showing a manufacturing method of a light source according to an exemplary embodiment of the present invention;
FIG. 7 is an exploded perspective view showing a light source unit of a light source according to an exemplary embodiment of the present invention;
FIG. 8 is a cross-sectional view of the light source unit shown in FIG. 7;
FIG. 9 is a cross-sectional view showing a light source unit of a light source according to an exemplary embodiment of the present invention;
FIGS. 10 and 11 are views showing backlight units each including one of the light sources shown in FIGS. 2, 7, and/or 9; and
FIG. 12 is a view showing a display device including one of the backlight units shown in FIGS. 10 and 11.
DETAILED DESCRIPTION OF THE EMBODIMENTS
Hereinafter, exemplary embodiments of the present invention will be described more fully with reference to the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as limited
to the embodiments set forth herein.
It will be understood that when an element or layer is referred to as being "on", "connected to" or "coupled to" another element or layer, it can be directly on, connected or coupled to the other element or layer or intervening elements or
layers may be present. Like numbers may refer to like elements throughout the specification and drawings.
As used herein, the singular forms, "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Hereinafter, exemplary embodiments of the present invention will be described more fully
with reference to the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
FIG. 1 is a perspective view showing a light source according to an exemplary embodiment of the present invention.
Referring to FIG. 1, a light source LS includes a substrate SUB and a plurality of light source units LSU disposed on the substrate SUB.
The light source units LSU may include a plurality of light emitting devices 10 disposed on the substrate SUB and a plurality of quantum-dot devices 20 disposed at positions to respectively correspond to the light emitting devices 10.
The light emitting devices 10 may be disposed on the substrate SUB and spaced apart from each other by a predetermined distance. Each of the quantum-dot devices 20 may be connected to a corresponding light emitting device of the light emitting
devices 10.
The light emitting devices 10 may generate a first light. The quantum-dot devices 20 may convert the first light to a second light. For example, the first light may be a blue light and the second light may be a white light.
Hereinafter, configurations of the light emitting devices 10 and the quantum-dot devices 20 will be described in more detail.
For convenience of explanation, only one light source unit LSU has been shown in FIG. 2. The light source units LSU shown in FIG. 1 may have the same configuration and function as the light source unit LSU shown in FIG. 2.
Referring to FIGS. 2 and 3, the light source unit LSU includes the light emitting device 10 and the quantum-dot device 20 disposed on the light emitting device 10.
The light emitting device 10 may include a first case 11, a recess G, a light emitting unit LU, a sealing member EN, and a plurality of engaging recesses 12.
The recess G may be formed by downwardly recessing a portion of the first case 11 from an upper surface of the first case 11. The light emitting unit LU may be disposed on a bottom surface of the recess G. The light emitting unit LU may
generate the first light. The light emitting unit LU may be a blue light emitting diode and may generate the blue light.
The sealing member EN may be disposed in the recess G. The sealing member EN may cover the light emitting unit LU. The sealing member EN may hold the light emitting unit LU and may protect the light emitting unit LU from external moisture and
contaminant, for example. The first light generated by the light emitting unit LU may be transmitted through the sealing member EN.
The engaging recesses 12 may be formed by upwardly recessing a lower portion of the first case 11. The lower portion of the first case 11 may be adjacent to a side surface of the first case 11. The engaging recesses 12 may be disposed to face
each other. For example, a plurality of engaging recesses 12 may be disposed at a lower side portion of the first case 11 and a plurality of engaging recesses 12 may be disposed at the other lower side portion of the first case 11. The plurality of
engaging recesses 12 disposed at the lower side portion of the first case 1 may face the engaging recesses 12 disposed at the other lower side portion of the first case 11.
For example, FIG. 2 shows two engaging recesses 12 disposed at the lower side portion of the first case 11. Two engaging recesses 12 may be disposed at the other lower side portion of the first case 11. In addition, the number of the engaging
recesses 12 is not limited to the above-mentioned numbers.
The quantum-dot device 20 may include a second case 21, a plurality of engaging members 22, and a quantum-dot member 23.
The second case 21 may have a frame shape, for example. The second case 21 may includes a plastic resin. The second case 21 may be formed by an injection molding method, a compression molding method, or an extrusion molding, for example.
The second case 21 may include a first frame FR1, a second frame FR2, an opening portion OP, a first hole H1, and a second hole H2.
The first frame FR1 may have a frame shape, for example. An inner side surface of the first frame FR1 may be disposed to correspond to a side surface of the first case 11.
The second frame FR2 may be connected to a lower portion of the inner side surface of the first frame FR1. The second frame FR2 may extend vertically with respect to the inner side surface of the first frame FR1.
The opening portion OP may be formed through the second frame FR2. When viewed in a plan view, a size of the opening portion OP may be larger than that of the recess G. The recess G may overlap the opening portion OP in a plan view. The recess
G may have a circular shape, for example. The opening portion OP may have a rectangular shape, for example, when viewed in a plan view.
The first hole H1 may penetrate through a portion of the first frame FR1. The second hole H2 may penetrate through another portion of the first frame FR1. The second hole H2 may face the first hole H1. The first and second holes H1 and H2 may
be located at an upper portion of the second frame FR2.
The engaging members 22 may be connected to a lower portion of the second case 21. The engaging members 22 may protrude in a downward direction. The engaging members 22 may correspond to the engaging recesses 12, respectively. The number of
the engaging members 22 may be equal to the number of the engaging recesses 12. The engaging members 22 may be disposed to respectively correspond to the engaging recesses 12.
The engaging members 22 may include a plastic resin. The engaging members 22 may be formed by an injection molding method, a compression molding method, or an extrusion molding, for example. The engaging members 22 may be flexible, and the
engaging members 22 may be bent. The engaging members 22 may be inserted into the engaging recesses 12, respectively.
Each of the engaging members 22 may include a first extension portion EX1. The first extension portion EX1 may be connected to the lower portion of the second case 21. Each of the engaging members 22 may include a second extension portion EX2. The second extension portion EX2 may be connected to an inner side surface of the first extension portion EX1.
For example, the first extension portion EX1 may be connected to the lower portion of the second frame FR2 of the second case 21. The first extension portion EX1 may extend in a downward direction. The second extension portion EX2 may be
connected to the lower portion of the inner side surface of the first extension portion EX1. The second extension portion EX2 may extend in a vertical direction with respect to the inner side surface of the first extension portion EX1.
The quantum-dot member 23 may be disposed in the second case 21. The quantum dot member 23 may include a first barrier layer BR1, a second barrier layer BR2, and a quantum-dot layer QDL. The quantum-dot layer QDL may be disposed between the
first barrier layer BR1 and the second barrier layer BR2.
The first barrier layer BR1 may be disposed on the second frame FR2 and the second barrier layer BR2 may be disposed on the first frame FR1. The first and second barrier layers BR1 and BR2 may include polyethyleneterephthalate (PET).
When the quantum-dot member 23 is disposed in the second case 21, upper and side surfaces of the second barrier layer BR2 may be exposed, as shown in FIG. 2, for example. The quantum-dot layer QDL and the first barrier layer BR1 may be disposed
in the second case 21.
An exemplary structure in which the quantum-dot member 23 is disposed in the second case 21 will be described in more detail with reference to FIG. 5.
FIG. 4 is a cross-sectional view taken along line I-I' shown in FIG. 2 and FIG. 5 is cross-sectional view taken along line II-II' shown in FIG. 2.
Referring to FIGS. 4 and 5, the quantum-dot device 20 may be disposed on the light emitting device 10. The recess G may overlap the opening portion OP. The light emitting device 10 may be disposed under the second frame FR2. For example, the
first case 11 of the light emitting device 10 may be disposed under the second frame FR2.
The first barrier layer BR1 may be disposed on the second frame FR2. For example, the first barrier layer BR1 may be disposed on an upper surface of the second frame FR2. The second barrier layer BR2 may be disposed on the first frame FR1.
For example, the second barrier layer BR2 may be disposed on an upper surface of the first frame FR1.
A predetermined portion of the quantum-dot member 23 may be disposed in the second case 21. For example, the quantum-dot member 23 may be disposed on the second frame FR2. The first barrier layer BR1 and the quantum-dot layer QDL may be
disposed on the second frame FR2. The first barrier layer BR1 and the quantum-dot layer QDL may be disposed in the first frame FR1.
The second barrier layer BR2 of the quantum-dot member 23 might not be disposed in the second case 21. The upper and side surfaces of the second barrier layer BR2 may be exposed. The first and second holes H1 and H2 may overlap the quantum-dot
layer QDL.
The engaging members 22 may be respectively disposed in the engaging recesses 12. For example, the inner side surface of the first extension portion EX1, which might not be connected to the second extension portion EX2, may be in contact with
the side surface of the first case 11 at an upper portion of the engaging recesses 12. The second extension portion EX2 may be disposed in a corresponding engaging recess of the engaging recesses 12. According to the above-mentioned exemplary
structure, for example, the quantum-dot device 20 may be connected to the light emitting device 10.
As described above, for example, the engaging members 22 may include a plastic resin and may have a flexibility to be bent. For example, when a predetermined force is applied in a downward direction to the quantum-dot device 20 when the
quantum-dot device 20 is disposed on the light emitting device 10, the engaging members 22 may be disposed in the engaging recesses 12 and may be attached to or coupled to the engaging recesses 12.
For example, when a predetermined force is applied in an upward direction to the quantum-dot device 20 when the engaging members 22 are disposed in the engaging recesses 12, the engaging members 22 may be detached from or separated from the
engaging recesses 12. The quantum-dot device 20 may be attached to or detached from the light emitting device 10 by the engaging members 22 and the engaging recesses 12.
The quantum-dot layer QDL may include a resin member RIN and a plurality of quantum dots QD disposed in the resin member RIN. The quantum dots QD may randomly change the wavelength of light and may mix lights having different wavelengths with
each other.
Each quantum dot QD may be a particle having a predetermined size with a quantum confinement effect. Each quantum dot QD may have a size of about 2 nm to about 15 nm and may include a core and a shell surrounding the core.
The core of the quantum dots QD may include cadmium selenide (CdSe), cadmium telluride (CdTe), and/or cadmium sulfide (CdS). The shell of the quantum dots QD may be formed of zinc sulfide (ZnS).
The quantum dots QD may be synthesized by a chemical vapor method, for example. The chemical vapor method may synthesize particles by adding a precursor material to an organic solvent. The synthesis of the quantum dots QD may be performed by
other methods, for example.
The quantum dots QD may generate relatively strong fluorescence in a narrow wavelength band. The light generated by the quantum dots QD may be generated when electrons in an unstable state fall from a conduction band to a valence band.
The fluorescence generated by the quantum dots QD may generate light with a short wavelength as the quantum dots QD become smaller and may generate light with a long wavelength as the quantum dots QD become larger. Lights having various
wavelengths may be generated by the quantum size effect, for example.
According to the size of the quantum dot QD, light with a rainbow color including red, green, and/or blue colors may be generated. For example, light emitting diodes (LEDs) that emit light in accordance with the size of each of the quantum dots
QD may be manufactured, and various colors may be generated by mixing the quantum dots QD having various sizes.
The quantum dots QD may have a high light emission property. When white light is generated by the quantum dots QD, a color reproducibility of the green and blue colors may be higher than that of a conventional white LED.
The quantum dot layer QDL may include the quantum dots QD having different sizes according to the color of the light generated by the light emitting device 10 to generate white light as a second light. For example, the light emitting device 10
may generate blue light, as described above.
The quantum-dot member 23 may include the quantum dots QD each having a size to absorb light having a blue wavelength and emit light having a green wavelength. The quantum dots QD may each have a size to emit light having a red wavelength.
Blue light BL generated by the light emitting device 10 may be transmitted to the quantum-dot member 23 after passing through the opening portion OP. The quantum dots QD of the quantum-dot member 23 may absorb the blue light BL and convert the
blue light BL to light having a green or red wavelength. Lights having blue, green, and/or red wavelengths may be mixed with each other, and white light WL may be generated as the second light.
For example, blue light BL generated by the light emitting device 10 may be converted to white light WL while passing through the quantum-dot member 23. The quantum-dot member 23 may convert blue light BL generated by the light emitting device
10 as the first light to white light WL as the second light.
The quantum-dot device 20 may be connected to and fixed to the light emitting device 10 without being attached to and detached from the light emitting device 10. The light source unit LSU may include the quantum-dot device 20 and the light
emitting device 10, which may be connected to and fixed to each other. The light source LS including the quantum-dot device 20 and the light emitting device 10, which may be connected to and fixed to each other may be connected to the substrate SUB.
For example, a solder paste may be disposed on the substrate SUB as an adhesive member. The light source unit LSU may be disposed on the adhesive member. Heat may be applied to the adhesive member to heat the adhesive member. When the
adhesive member is melted by the heat, the light source unit LSU may be attached to the substrate SUB by the melted adhesive member. When the adhesive member is cooled, the light source unit may be fixed to the substrate SUB. This process may be
referred to as a reflow process.
The first and second barrier layers BR1 and BR2 of the quantum-dot device 20 may be expanded and deformed by the heat applied to the adhesive member during the reflow process. When the first and second barrier layers BR1 and BR2 are deformed, a
light transmittance may be varied, and brightness may be lowered.
The quantum dots QD of the quantum-dot device 20 may be damaged by the heat applied to the adhesive member during the reflow process. The quantum-dot device 20 may be damaged by the heat applied to the adhesive member during the reflow process. The damaged quantum dots QD might not perform the light conversion process.
For example, when the quantum-dot device 20 is connected to and fixed to the light emitting device 10, the quantum-dot member 23 may be fixed to the case by a fixing member, e.g., a heat-curable resin. To cure the fixing member, a heat may be
applied to the fixing member, for example.
For example, when heat is applied to the fixing member, the first and second barrier layers BR1 and BR2 may be deformed and the quantum dots QD and the quantum-dot device 20 may be damaged.
The quantum-dot device 20 according to the exemplary embodiments of the present invention may be attached to and detached from the light emitting device 10. The quantum-dot device 20 may be connected to the light emitting device 10 after the
light emitting device 10 is connected to the substrate SUB by the reflow process.
The quantum-dot device 20 might not be affected by the heat applied to the adhesive member during the reflow process. The first and second barrier layers BR1 and BR2 and the quantum dots QD may be prevented from being damaged. The quantum-dot
device 20 might not be damaged.
A separate fixing member used to fix the quantum-dot member 23 might not be used according to exemplary embodiments of the present invention. The heat used to cure the fixing member might not be applied to the quantum-dot device 20. The first
and second barrier layers BR1 and BR2 and the quantum dots QD may be prevented from being damaged. The quantum-dot device 20 might not be damaged.
The light source LS according to exemplary embodiments of the present invention may prevent the quantum-dot member 20 from being damaged.
FIGS. 6A to 6G are views showing a manufacturing method of a light source according to an exemplary embodiment of the present invention.
For the convenience of explanation, FIGS. 6D and 6E show cross-sectional views taken along the line I-I' shown in FIG. 2.
Referring to FIG. 6A, the second case 21 to which the engaging members 22 may be connected may be prepared. The second case 21 and the engaging members 22 may include a plastic resin and may be manufactured by an injection molding method, a
compression molding method, or an extrusion molding method, for example.
Referring to FIGS. 6B and 6C, the first barrier layer BR1 may be disposed on the second frame FR2. The first barrier layer BR1 may be disposed in the second case 21 after being disposed on the second frame FR2. The second barrier layer BR2 may
be disposed on the first frame FR1.
Referring to FIG. 6D, a first space S1 may be defined as a space between the first and second barrier layers BR1 and BR2. The first and second holes H1 and H2 may overlap the first space S1.
A resin solution RIN in which the quantum dots QD may be distributed may be discharged from a nozzle NOZ. The resin solution RIN may include an ultraviolet-ray-curable resin. The resin solution RIN may be deposited in the first space S1
through the first hole H1.
When the first space S1 is filled with the resin solution RIN, air in the first space S1 may be discharged through the second hole H2. For example, when the air in the first space S1 is discharged through the second hole H2, the first space S1
may be filled with the resin solution RIN.
Referring to FIG. 6E, an ultraviolet ray (UV) may be radiated to the resin solution RIN filled in the first space S1. The resin solution RIN may be cured and the resin member RIN may be formed. The quantum-dot layer QDL that includes the resin
member RIN and the quantum dots QD distributed in the resin member RIN may be formed in the first space S1.
Referring to FIG. 6F, the light emitting devices 10 may be disposed on the substrate SUB and may be spaced apart from each other. The light emitting devices 10 may be connected to the substrate SUB by the above-mentioned reflow process. The
quantum-dot devices 20 may be disposed on the light emitting devices 10, respectively.
Referring to FIG. 6G, each of the quantum-dot devices 20 may be connected to the corresponding light emitting device of the light emitting devices 10. The connection between the quantum-dot devices 20 and the light emitting devices 10 may be
formed according to the exemplary embodiments of the invention described above.
In the manufacturing method of the light source LS, the separate fixing member used to fix the quantum-dot member 23 might not be used. The heat used to cure the fixing member might not be applied to the quantum-dot device 20. The quantum-dot
device 20 might not be damaged.
For example, the quantum-dot device 20 may be connected to the light emitting device 10 after the light emitting device 10 is connected to the substrate SUB by the reflow process. The quantum-dot device 20 might not be affected by the heat
applied to the adhesive member during the reflow process. The quantum dot device 20 might not be damaged.
The manufacturing method of the light source LS according to the exemplary embodiments of the present invention may prevent the quantum-dot member 20 from being damaged.
FIG. 7 is an exploded perspective view showing a light source unit of a light source according to an exemplary embodiment of the present invention and FIG. 8 is a cross-sectional view showing the light source unit shown in FIG. 7, which is taken
along a line corresponding to the line I-I' shown in FIG. 2.
The light source unit LSU shown in FIG. 7 has the same structure and function as those of the light source unit LSU shown in FIG. 2 except for the connection configuration between the light emitting device 10 and the quantum-dot device 20.
Accordingly, hereinafter the connection configuration between the light emitting device 10 and the quantum-dot device 20 will be described in more detail.
Referring to FIGS. 7 and 8, the light emitting device 10 may include a first case 11, a recess G, a light emitting unit LU, a sealing member EN, and a protrusion portion P1.
The first case 11, the recess G, the light emitting unit LU, and the sealing member EN are the same as the first case 11, the recess G, the light emitting unit LU, and the sealing member EN shown in FIG. 2, and thus details thereof will be
omitted.
The firs protrusion portion P1 may protrude outward from a lower portion of the side surface of the first case 11. The first protrusion P1 may extend along the side surface of the first case 11 when viewed in a plan view.
The quantum-dot device 20 may include a second case 21 and a quantum-dot member 23. The configuration of the quantum-dot member 23 is the same as that of the quantum-dot member 23 shown in FIG. 2, and thus details thereof will be omitted.
The second case 21 may have a frame shape. The second case 21 may include a plastic resin and may be formed by an injection molding method, a compression molding method, or an extrusion molding method, for example.
The second case 21 may include a first frame FR1, a second frame FR2, an opening portion OP, a first engaging recess G1, a first hole H1, and a second hole H2. The configurations of the opening portion OP, the first hole H1, and the second hole
H2 are the same as those of the opening portion OP, the first hole H1, and the second hole H2 shown in FIG. 2, and thus details thereof will be omitted.
The first frame FR1 may have a frame shape. The second frame FR2 may be connected to the inner side surface of the first frame FR1 and may extend vertically with respect to the inner side surface of the first frame FR1.
The light emitting device 10 may be disposed under the second frame FR2 and may be disposed in the first frame FR1. The quantum-dot member 20 may be disposed on the second frame FR2. A predetermined portion of the quantum-dot member 20 may be
disposed in the first frame FR1.
The first engaging recess G1 may be formed by recessing a portion of the inner side surface of the first frame FR1 toward an outer side surface of the first frame FR1. The first engaging recess G1 may be disposed under the second frame FR2.
The first engaging recess G1 may correspond with the first protrusion portion P1. Unlike the cross-sectional view shown in FIG. 8, the first engaging recess G1 may be formed along the inner side surface of the first frame FR1 when viewed in a plan view.
The first protrusion portion P1 may be inserted into the first engaging recess G1, and the quantum-dot device 20 may be connected to the light emitting device 10.
As described above, the second case 21 may include the plastic resin and may have flexibility to be bent. The quantum-dot device 20 may be attached to and detached from the light emitting device 10 by the first protrusion portion P1 and the
first engaging recess G1.
The quantum-dot device 20 may be connected to the light emitting device 10 after the light emitting device 10 is connected to the substrate SUB by the reflow process. The quantum-dot device 20 might not be affected by heat applied to the
adhesive member during the reflow process. The quantum-dot device 20 might not be damaged.
The separate fixing member used to fix the quantum-dot member 23 might not be used. The heat used to cure the fixing member might not be applied to the quantum-dot device 20. The quantum-dot device 20 might not be damaged.
For example, the light source LS according to exemplary embodiments of the present invention may prevent the quantum-dot member 20 from being damaged.
FIG. 9 is a cross-sectional view showing a light source unit of a light source according to an exemplary embodiment of the present invention, which is taken along a line corresponding to the line I-I' shown in FIG. 2.
The light source unit LSU shown in FIG. 9 has the same structure and function as those of the light source unit LSU shown in FIG. 8 except that the light emitting device 10 may be connected to the quantum-dot device 20 by a second protrusion
portion P2 and a second engaging recess G2. Accordingly, hereinafter the second protrusion portion P2 and the second engaging recess G2 will be described in more detail.
Referring to FIG. 9, the second engaging recess G2 may be formed by recessing a portion of the lower portion of the side surface of the first case 11 toward the inner side surface of the first case 11. The second engaging recess G2 may extend
along the side surface of the first case 11 when viewed in a plan view.
The second protrusion portion P2 may protrude from the lower portion of the inner side surface of the first case 11 toward inside of the first frame FR1. The second protrusion portion P2 may be disposed under the second frame FR2. The second
protrusion portion P2 may correspond with the second engaging recess G2. The second protrusion portion P2 may extend along the inner side surface of the first frame FR1 when viewed in a plan view.
The second protrusion portion P2 may be inserted into the second engaging recess G2, and the quantum-dot device 20 may be connected to the light emitting device 10.
As described above, the second case 21 may include the plastic resin and may have flexibility to be bent. The quantum-dot device 20 may be attached to and detached from the light emitting device 10 by the second protrusion portion P2 and the
second engaging recess G2.
The quantum-dot device 20 may be connected to the light emitting device 10 after the light emitting device 10 is connected to the substrate SUB by the reflow process. The quantum-dot device 20 might not be damaged. The separate fixing member
used to fix the quantum-dot member 23 might not be used. The quantum-dot device 20 might not be damaged.
The light source LS according to exemplary embodiments of the present invention may prevent the quantum-dot member 20 from being damaged.
FIGS. 10 and 11 are views showing backlight units each including one of the light sources shown in FIGS. 2, 7, and/or 9.
FIG. 10 shows an edge-illumination type backlight unit BLU and FIG. 11 shows a direct-illumination type backlight unit BLU. In FIGS. 10 and 11, the same elements may be assigned with the same reference numerals.
Referring to FIG. 10, the edge-illumination type backlight unit BLU may include a light source LS, a reflective plate 31, a light guide plate 32, and an optical sheet 33. The light source LS may include the substrate SUB and the light source
units LSU mounted on the substrate SUB.
The light source units LSU may be disposed adjacent to a side portion of the light guide plate 32 and may provide light to the light guide plate 32. For example, the light source units LSU may provide white light to the light guide plate 32.
The light guide plate 32 may receive light from the light source units LSU and may guide the received light to allow the light to travel to a display panel (not shown) disposed above the backlight unit BLU.
The reflective plate 31 may be disposed under the light guide plate 32 and may reflect the light traveling downward from the light guide plate 32, and light reflected by the reflective plate 31 may pass through the light guide plate 32 again.
The optical sheet 33 may include a diffusion sheet (not shown) and a prism sheet (not shown) disposed on the diffusion sheet. The diffusion sheet may diffuse light exiting from the light guide plate 32.
The prism sheet may condense the light diffused by the diffusion sheet to allow the diffused light to travel in a direction vertical to a flat surface thereof. Light passing through the prism sheet may have a uniform brightness distribution and
may be transmitted to the display panel (not shown) disposed on the backlight unit BLU.
Referring to FIG. 11, the direct-illumination type backlight unit BLU may include a light source LS, a reflective plate 31, and/or an optical sheet 33. The light source LS may include the substrate SUB and the light source unit LSU mounted on
the substrate SUB.
The reflective plate 31 may be disposed on the substrate SUB and may include a plurality of insertion holes H. The light source units LSU may be inserted into the insertion holes H of the reflective plate 31. The light source units LSU may emit
light to the optical sheet 33. For example, the light source units LSU may emit white light to the optical sheet 33.
The reflective plate 31 may reflect light emitted from the light source units LSU toward the reflective plate 31, and the reflected light may travel in an upward direction.
The diffusion sheet of the optical sheet 33 may diffuse light emitted from the light source units LSU. The prism sheet of the optical sheet 33 may condense light diffused by the diffusion sheet and the diffused light may travel in a direction
vertical to a flat surface thereof.
As described above, the quantum-dot device 20 may be attached to and detached from the light emitting device 10. The quantum-dot device 20 may be connected to the light emitting device 10 after the light emitting device 10 is connected to the
substrate SUB by the reflow process. The separate fixing member used to fix the quantum-dot member 23 might not be used. The quantum-dot device 20 might not be damaged.
The backlight unit BLU including the light source LS according to exemplary embodiments of the present invention may prevent the quantum-dot member 20 from being damaged.
FIG. 12 is a view showing a display device including one of the backlight units shown in FIGS. 10 and 11.
For convenience of explanation, FIG. 12 shows only one pixel PX, but the display device may include a plurality pixels PX arranged in areas defined in association with gate lines GL1 to GLn and data lines DL1 to DLm crossing the gate lines GL1
to GLn.
Referring to FIG. 12, a display device 500 may include a display panel 100, a gate driver 200, a data driver 300, a driving circuit board 400, and a backlight unit BLU.
The display panel 100 may include a thin film transistor substrate 110 including the pixels PX, a color filter substrate 120 facing the thin film transistor substrate 110 and including a common electrode (not shown), and a liquid crystal layer
LC interposed between the thin film transistor substrate 110 and the color filter substrate 120. Each of the pixels PX may be connected to a corresponding gate line of the gate lines GL1 to GLn, for example, and a corresponding data line of the data
lines DL1 to DLm.
Each pixel PX may include a pixel electrode and a thin film transistor connected to the pixel electrode. The thin film transistor may receive a data voltage through the corresponding data line in response to a gate signal provided through the
corresponding gate line. The data voltage may be applied to the pixel electrode.
The gate driver 200 may generate gate signals in response to a gate control signal provided from a timing controller mounted on the driving circuit board 400. The gate signals may be sequentially applied to the pixels PX in a row unit. The
pixels PX may be driven in row units.
The data driver 300 may receive image signals and a data control signal from the timing controller. The data driver 300 may generate analog data voltages corresponding to the image signals in response to the data control signal. The data
driver 300 may apply the data voltages to the pixel PX through the data lines DL1 to DLm, for example.
The data driver 300 may include a plurality of source driving chips 310_1 to 310_k. The source driving chips 310_1 to 310_k may be mounted on flexible printed circuit boards 320_1 to 320_k, respectively, and may be connected to the driving
circuit board 400 and the thin film transistor substrate 110.
According to an exemplary embodiment of the present invention, the source driving chips 310_1 to 310_k may be respectively mounted on the flexible printed circuit boards 320_1 to 320_k by a tape carrier package (TCP) scheme, but the present
invention is not limited thereto or thereby. The source driving chips 310_1 to 310_k may be mounted on a first non-display area by a chip on glass (COG) scheme.
Color filters may be disposed on the color filter substrate 120. Each color filter may include a color pixel that represents a red, green, or blue color.
The backlight unit BLU may be disposed at a rear side of the display panel 100 to provide the light to the display panel 100. As described above, the light provided to the display panel 100 from the backlight unit BLU may be white light.
The data voltages may be applied to the pixel electrodes by the thin film transistors and a common voltage may be applied to the common electrode. An electric field may be formed between the common electrode and the pixel electrode by a voltage
difference between the common voltage applied to the common electrode and the data voltages. For example, due to the electric field, an arrangement of liquid crystal molecules of the liquid crystal layer LC may be changed. The transmittance of light
passing through the liquid crystal layer LC may be controlled by the variation in arrangement of the liquid crystal molecules, and desired images may be displayed on the display panel 100.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and detail may be made therein
without departing from the spirit and scope of the present invention. | 2023-09-27T01:26:35.434368 | https://example.com/article/8385 |
You'll see this word used often on This Very Wiki. Repeatedly used, you could even say (and egregiously at that). It's almost as if people are looking for reasons to put it in, as if it were the trigger for some kind of pleasurable behavior. The word itself has become a somewhat Discredited Meme, as more instances of its use are linked to this page than not. Now drink up!
Of course, the real reason is that people want to look learned on this site.[2] So, instead of saying "This series is a particularly bad example in that...", you get "This series is particularly egregious in..." Alternatively, it's a way of Getting Crap Past the Radar—since calling a show "badly written" might spark an Edit War, they use a word that is, strictly speaking, neutral, but has inescapable negative connotations.
A much less used word that seems to be the target of much egregious grasping is "gregarious", which means "social" or "sociable". If someone's talking about an "egregious person", this is what they were going for (unless they just don't like the guy). Oh, and "egregarious" is not the Internet equivalent of being sociable, it's not a word at all, despite what some people seem to think.
No examples, please; Pointing them out here as well as on the pages that link here would just be egregious.
Waldorf: People sure seem to like the word "egregious".Statler: That's because it describes them!Both: Do-ho-ho-ho-hoh! | 2024-06-11T01:26:35.434368 | https://example.com/article/7895 |
2016 looking back, looking to tomorrow
Tony Howard of University of Warwick initiated this project to bridge the gap in understanding of what black and Asian artists have achieved in Shakespeare in the UK, but there is little doubt that the work has global appeal.
We’ve got Jamaican school children coming in April with their Shakespeare, which wouldn’t have happened unless this project had happened,” says Professor Howard. “We’ve been picked up in the Broadway press in the States too. What I wanted to do right from the start was to say impact is where we begin, as far as we can, and I do think that’s worked.”
That the casting of black or Asian actors in roles in Shakespeare can still be controversial today shows the importance of Howard and his team’s efforts in building a history of both actors and producers work relating to Shakespeare in British theatre. But it is the local rather than the global acclaim that has most pleased Professor Howard as the project progressed.
The most important thing has been that we have worked in collaboration with the theatrical profession very closely,” he says. “One thing that we did a few times was a drama documentary play, based on research. Younger actors have said, ‘I didn’t know that but I feel different about my own work now knowing that Paul Robeson or Ira Aldridge had those achievements’. That’s inspirational for me.”
The research for the project was not just informed by those it studied, but sought to include them in the process. An exhibition on the topic was toured in schools, theatres and libraries, with a short film eventually made, starring former-Eastenders actor Nicholas Bailey. Both told the story of black and Asian actors in Shakespeare, including American radical Paul Robeson and 19th century actor Ira Aldridge, who is the subject of Lolita Chakrabarti’s Red Velvet.
I was amazed to discover that Aldridge actually ran a theatre in Coventry and was invited by the community to do that when there was still slavery half way round the world,” says Professor Howard. “There’s a current big argument now about how many companies have a degree of diversity at the board room level or backstage or running the company, yet he was actually running the theatre back then.”
The funding for the project has now finished, but enthusiasm for further findings means that it still continues in the background, moving towards a complete ongoing database of black and Asian involvement in Shakespeare in the UK. There is already interest from the US in the creation of a version of the work, reflecting a growing unease with the relative position of black actors, as highlighted by protests surrounding the 2016 Academy Awards.
When you’re talking about the director’s concept of black actors in Shakespeare, it tends to be the exotic stereotype or driven by the idea of black Africa being a place of violence,” says Professor Howard. “That worries me a lot. Actors usually find they can’t rise up to the top. They’ll be the hero’s friend or they’ll be the violent person. If they’re women, they’ll be a nurse or a maid. What we’ve been most thrilled by are productions which don’t have any kind of cultural envelope imposed on Shakespeare. It’s about just giving people the opportunity to do it really well.”
BBAS, Department of English and Comparative Literary Studies,
University of Warwick,
Coventry, CV4 7AL
Email: BBAS@warwick.ac.uk | 2023-09-07T01:26:35.434368 | https://example.com/article/4953 |
Q:
How can I use Regular Expression to match Chinese characters like ,。‘;’
I'm using javascript to convert string to what I want!!
Can I use Regular Expression and use what Regular Expression??
Is there anyone that can help me?
A:
First, you need to get corresponding Unicode code for these Chinese characters. Here is a helpful tool.
character code(base 10) code(hex)
, 65307 0xff1b
。 65292 0xff0c
; 12290 0x3002
Second, use these Unicode code to form regexp.
js:
/[\u3002\uff0c\uff1b]/.test('A string contains Chinese character。')
true
| 2024-01-12T01:26:35.434368 | https://example.com/article/1799 |
Welcome to the MILF army: The unfortunately named Muslim rebel group patrolling the jungles of the Philippines
Moro Islamic Liberation Front is tasked with peace keeping in Mindanao
Its acronym joins other unfortunate abbreviations - such as BAAPS, the British Association of Aesthetic Plastic Surgeons
But despite its name, MILF is a deadly serious organisation
Former terrorist group on roadmap to peace settlement with government
As abbreviations go, the Moro Islamic Liberation Front's has got to be among the most unfortunate.
But this didn't stop members of the former Muslim rebel group from patrolling the jungles of the Philippines today ahead of the country's contentious general elections.
MILF joins countless other organisations with unfortunate acronyms - such as BAAPS, the British Association of Aesthetic Plastic Surgeons.
Scroll down for video
MILFS: Members of the armed group Moro Islamic Liberation Front take a rest inside a hut as they secure the perimeter to help maintain a peaceful election against other lawless elements in Shariff Aguak, Philippines
But despite the associations that may come with its abbreviated name, MILF is a deadly serious organisation.
MILF is a splinter group of Muslim rebels from the Moro National Liberation Front (MNLF) formed in the 1960s to achieve greater Bangsamoro autonomy in the southern Philippines.
It has used terrorist tactics to try and force greater independence on the region and declared a jihad against the government, its citizens and supporters.
MILF, which was officially formed in the 1980s, has also been linked to Al Qaeda and a bombing incident in Davao Airport in 2003.
In March 2007, the Philippine government offered to recognize the right of self-determination for the Moro people which it had never done in three decades of conflict.
The Muslim militant group MILF joins one of many organisations around the world with unfortunate acronyms
But later that year in July, Islamic militants in Basilan in the southern Philippines killed 14 marines. MILF denied responsibility for the murders.
This delayed the start of the peace process but MILF and the Philippine government took the first tentative steps last year toward ending one of Asia's longest-running insurgencies.
Both parties signed a preliminary peace pact with a roadmap to a final peace settlement expected by 2016.
As part of the arrangement, MILF is responsible for maintaining peace on Mindanao island to prevent civil unrest during the congressional and local elections in the Philippines.
More than 52 million voters registered to elect 18,000 officials, including half of the 24-member Senate, nearly 300 members of the House of Representatives and leaders of a Muslim autonomous region in the south, where Islamic insurgents and militants are a concern.
Task force: MILF is a Muslim rebel group located in the southern Philippines which now has the agreement with the Philippine government to maintain peace in Mindanao island
Despite scattered killings and fears of fraud, the polls were relatively peaceful as soldiers and police secured stations in potentially violent areas.
The outcome will determine the level of support for President Benigno Aquino III's reforms in his remaining three years in office. Aquino has been praised at home and abroad for cracking down on widespread corruption, backing key legislation and concluding an initial peace agreement with Muslim rebels - including MILF.
But he cannot run for re-election and a choice of his successor, who will be expected to continue on the same reform path, will depend on the new political landscape.
Candidates backed by Aquino are running against a coalition headed by Vice President Jejomar Binay and deposed President Joseph Estrada.
Peace keepers: MILF has helped keep election day violence down to an all time low
Although officially No. 2 in the country, Binay has emerged as the administration's rival and may be positioning himself for the 2016 presidential race.
Among 33 senatorial candidates are two of Aquino's relatives, Binay's neophyte daughter, Estrada's son, a son of the sitting chamber president, a son of a late president, a spouse and children of former senators and there's a possibility that two siblings will be sitting in the same house. Currently, 15 senators have relatives serving in elective positions.
The race for the House is even more of a family affair. Toppled dictator Ferdinand Marcos' widow, the flamboyant 83-year-old Imelda, is expected to keep her seat as a representative for Ilocos Norte province, the husband's birthplace where the locals kept electing the Marcoses despite allegations of corruption and abuse during their long rule. Marcos' daughter, Imee is seeking re-election as governor and the son, Ferdinand "Bongbong" Marcos Jr., is already a senator.
Boxing star and incumbent Rep. Manny Pacquiao is running unopposed and building a dynasty of his own: his brother Rogelio is running to represent his southern district and his wife Jinkee is vying to become vice-governor for Sarangani province.
Estrada, who was ousted in a 2001 'people power' revolt on corruption allegations, is running for mayor of Manila, hoping to capitalize on his movie star popularity, particularly among the poor masses.
Philippine elections have long been dominated by politicians belonging to the same bloodlines. At least 250 political families have monopolized power across the country, although such dynasties are prohibited under the 1987 constitution. Congress - long controlled by members of powerful clans targeted by the constitutional ban - has failed to pass the law needed to define and enforce the provision.
Geared up: Members of the armed group MILF will continue top patrol throughout the day. The election results will return within the next two days Critics worry that a single family's stranglehold on different levels of government could stymie checks against abuses and corruption. A widely cited example is the 2009 massacre of 58 people, including 32 media workers, in an ambush blamed on rivalry between powerful clans in southern Maguindanao province.
In the latest violence, gunmen killed five people and wounded two mayoral candidates in separate attacks over the weekend. Last month, gunmen fired on a truck carrying a town mayor and his supporters in southern Lanao del Norte province, killing 13 people including his daughter.
The 125,000-strong military has helped the government in urging candidates to shun violence. An army general took off with his troops aboard two helicopters and dropped leaflets calling for peaceful elections in Masbate, a central province notorious for political killings.
Results are expected within a day or two.
More than 52 million voters are registered to vote in the general election across the country
| 2023-09-28T01:26:35.434368 | https://example.com/article/1550 |
[Health status and physical activity levels among the elderly who are participants and non-participants in social welfare groups in Florianópolis].
This study sought to verify the association between health status and physical activity levels among the elderly who are participants and non-participants in social welfare groups in Florianópolis in the State of Santa Catarina, Brazil. The sample included 1,062 elderly people (625 women), mean age 71.9 (± 7.6). The variables analyzed were gender, age, schooling, marital status, physical activity levels (International Physical Activity Questionnaire) and physical health status information (Brazil Elderly Schedule Questionnaire). Data were analyzed by Chi-square test. The results revealed that 60.6% were classified as physically active (total physical activity level) and 74% of the elderly reported illness. Illness status was more prevalent among social welfare group participants than non-participants. However, a better positive perception of physical health status was observed among social groups participants. For women, participation in social welfare groups was associated with a positive perception of physical health status (p<0.001) and with illness (p=0.005). The conclusion was that participation in social welfare groups contributes to a better perception of physical health status, as well as for the maintenance of adequate physical activity levels. | 2023-10-15T01:26:35.434368 | https://example.com/article/2287 |
319 A.2d 16 (1974)
Joseph V. ANDREOZZI
v.
Frank D'ANTUONO d/b/a Ideal Market.
No. 1851-Appeal.
Supreme Court of Rhode Island.
May 7, 1974.
D.A. St. Angelo, Providence, for petitioner.
Vincent J. Baccari, Providence, for respondent.
OPINION
PAOLINO, Justice.
This is an original petition for compensation benefits in which the petitioner alleges he sustained a compensable injury on or about February 15, 1971 while employed by the respondent. The trial commissioner dismissed the petition. The case is before us on the petitioner's appeal from the decree of the full commission affirming the decree entered by the trial commissioner.
At the hearing before the trial commissioner, petitioner testified that he injured his back and right leg on Monday, February *17 15, 1971 while employed by respondent as a grocery clerk, and that his injury required medical attention and resulted in his becoming incapacitated for work. It is undisputed that petitioner was employed by respondent in February 1971. It also appears from the medical evidence that petitioner did in fact sustain an injury to his back and right leg.
The respondent denied that petitioner was injured while working for him. He testified that petitioner did not report to work on the day petitioner claimed he was injured. However, on cross-examination respondent testified that he paid medical bills to two doctors who had treated petitioner for the injuries allegedly sustained while petitioner was working for respondent. These medical bills were for medical services furnished some two months after petitioner sustained the injury to his lower back.
The trial commissioner found that petitioner had failed to prove by a fair preponderance of the evidence that his injuries arose out of his employment with respondent. Without expressly considering respondent's testimony with respect to his payment of the medical bills, he denied and dismissed the petition.
One of the grounds relied on by petitioner in his reasons of appeal is that the decree entered by the trial commissioner is against the law because, under G.L. 1956 (1968 Reenactment) § 28-35-9,[1] payment of the medical bills by respondent was an admission of liability.
The full commission held that the mere payment of medical bills by respondent did not amount to a payment of compensation under § 28-35-9 and was not therefore an admission of liability under the Act. It then affirmed the trial commissioner's finding that petitioner had failed to prove by a fair preponderance of the evidence that his injuries arose out of his employment with respondent.
The narrow question raised by this appeal is whether the payment of medical bills by respondent without execution of a memorandum of agreement is the payment of "compensation" within the meaning of § 28-35-9 and thus an admission that petitioner is entitled to compensation benefits under the Workmen's Compensation Act. The answer to this question is "Yes" and therefore we reverse.
Section 28-35-9 in pertinent part provides that if
"* * * an employer or insurer makes payment of compensation to an employee without executing a memorandum of agreement such payment shall constitute an admission that the employee is entitled to compensation under the provisions * * *" of the Act.
The determination of this question depends completely upon the meaning of the word "compensation" as used in § 28-35-9. The question of whether or not payment of medical services is compensation has been before this court in recent years in two cases. In Brothers v. Cassedy, Inc., 101 R.I. 307, 222 A.2d 363 (1966), the question was discussed but not decided.
Later, in Thompson v. Coats & Clark, Inc., 105 R.I. 214, 251 A.2d 403 (1969), we were presented with the same issue raised here, but in a different context. There the issue was whether the payment of medical bills could be considered as a payment of compensation under § 28-35-45, which provided that the commission could review *18 any agreement or decree within ten years after the cessation of compensation payments. If the medical payments were compensation within the meaning of § 28-35-45, then the employee's action would not be barred by the ten-year limitation. In Thompson the employer had accepted liability for the payment of compensation benefits and had entered into a written agreement with the employee under the Act. In that case we held that
"* * * the general assembly, cognizant of the remedial purposes of the workmen's compensation act, employed the word `compensation' as the same is used in § 28-35-45 to include payments for medical services and charges as well as hospitalization and medicines."[2]Id. at 224-225, 251 A.2d at 409.
We come now to the question raised in this appeal. We must decide what the General Assembly meant by the word "compensation" in § 28-35-9. We believe that the reasoning of the court in Thompson, supra, is equally applicable here. The words used in a statute must be given their ordinary and customary meaning unless a contrary intention clearly appears on the face of the statute. As we said in Podborski v. William H. Haskell Mfg. Co., 109 R.I. 1, 8, 279 A.2d 914, 918 (1971):
"* * * except in the case of equivocal and ambiguous language, the words of a statute cannot be interpreted or extended but must be applied literally. * * * The Legislature's meaning and intention must first be sought in the language of the statute itself, and if the language is plain and unambiguous, and expresses a single definite and sensible meaning, that meaning is conclusively presumed to be the Legislature's intended meaning and the statute must be interpreted literally."
The language of § 28-35-9 is plain and unambiguous. The word "compensation" in its customary and ordinary meaning encompasses a broad range of areas under our Act. It includes not only benefits for total incapacity but also partial incapacity, specific compensation for loss of limb, hearing, sight, disfigurement, dependency benefits, and medical expenses as well. The full commission said that "it would be straining the language of the general assembly" to hold that an employer who voluntarily pays medical bills incurred by an employee has admitted the employee is entitled to compensation under the Act. In our opinion, however, it would be straining the language of the General Assembly to hold that the payment of medical bills is not a payment of compensation. To hold that the General Assembly did not intend that the payment of medical bills be considered as a payment of compensation under § 28-35-9 would require us to ignore the clear and plain meaning of the language employed by the General Assembly. This we cannot do.
Accordingly, we hold that the payment by respondent of the medical bills to the two physicians who treated petitioner for his injuries was a payment of compensation within the meaning of § 28-35-9, and, thus, an admission on the part of respondent that petitioner "* * * is entitled to compensation under the provisions of chapters 29 to 38, inclusive * * *."
However, the admission created by § 28-35-9 is not conclusive proof of petitioner's entitlement to compensation benefits; it is merely a factor which the trial commissioner must consider and weigh, together with all the other evidence in the case, in determining whether petitioner has sustained his burden of proving his entitlement to benefits under the Act. See Rossi v. Ronci, 63 R.I. 250, 261, 7 A.2d 773, 779 (1939). In the case at bar, as we have *19 noted above, the trial commissioner did not consider the effect of respondent's payment of the medical bills, and the full commission held, that the payment of those bills was not the payment of compensation within the meaning of § 28-35-9. They both erred.
The petitioner's appeal is sustained and the decree appealed from is reversed. The cause is remanded to the Workmen's Compensation Commission for further proceedings, in accordance with this opinion, to determine whether the petitioner is entitled to compensation benefits under the Workmen's Compensation Act.
NOTES
[1] Section 28-35-9 reads as follows:
"Payment of compensation without agreement.In the event that an employer or insurer makes payment of compensation to an employee without executing a memorandum of agreement such payment shall constitute an admission that the employee is entitled to compensation under the provisions of chapters 29 to 38, inclusive, of this title and such employer or insurer shall not be entitled to any credit for such payment if the employee is awarded compensation in accordance with the provisions of said chapters."
[2] See also Redfearn v. Pawtuxet Valley Dyeing Co., 105 R.I. 81, 87, 249 A.2d 657, 661 (1969); Atlantic Rayon Corp. v. Macedo, 73 R.I. 157, 159, 53 A.2d 756, 757 (1947).
| 2023-08-25T01:26:35.434368 | https://example.com/article/9009 |
James McAvoy goes whole hog in “Filth,” an adaptation of a 1998 novel by Irvine Welsh, the Scottish author of “Trainspotting.” And by whole hog, I mean exactly that. His character, Bruce Robertson, who narrates the film, is an Edinburgh police detective sergeant on a catastrophic downward spiral. As he loses his sanity, he suggests a wounded wild boar on the rampage, dragging his entrails behind him as he charges around in circles. Compared with this maniac, the rotten policeman of two “Bad Lieutenant” films is a garden-variety bad boy.
Such is the electrical ferocity of Mr. McAvoy’s performance that you can never again look at him the same way. At times, this pig in a china shop suggests a descendant of Alex from “A Clockwork Orange,” and he is sometimes filmed as such, with distorting, wide-angle shots. A coke-crazed, booze-soaked sex fiend and sadomasochist obsessed with erotic asphyxiation, he is a ragingly homophobic, misogynistic bully, given to spewing torrents of profane abuse, sometimes accompanied by vomit. To help explain the character, the film’s director, Jon S. Baird, has made him clinically bipolar.
A major difference between Bruce and his wild-man forerunners is his raucous sense of humor, which lends him the dangerous charm of a boorish stand-up comedian you might enjoy from a back row of the theater, where the risk of being singled out is lowest. In one of the funniest scenes, he persuades his fellow detectives to photocopy images of their genitals and pass them around in a guessing game of which picture belongs to which officer. Because Bruce presses the enlarge button when his turn comes, a secretary who fancies him is eventually shocked to discover that he is smaller than advertised.
Mr. Baird’s visual imagination is more Terry Gilliam-goes-to-the-circus than the inside-the-toilet realism of Danny Boyle’s “Trainspotting.” The world as seen through Bruce’s bloodshot eyes is a surreal phantasmagoria that grows more grotesque as his sanity deteriorates. The movie stops short of including one of the book’s voices: a talking tapeworm inside Bruce’s body.
In the story, Bruce, told he is first in line for a promotion to chief inspector, sets out to destroy his rivals while halfheartedly trying to solve the murder shown in the movie’s opening scene. Hoping to win back his estranged wife, Carole (Shauna Macdonald), he foolishly stops taking the lithium prescribed by his psychiatrist, Dr. Rossi (Jim Broadbent). Without his medication, he begins to lose what remains of his stability and starts hallucinating about people with animal heads. He seduces Bunty (Shirley Henderson), the ravenously lustful wife of his loyal best friend, Bladesy (Eddie Marsan), a meek accountant, while harassing her with menacing prank phone calls. He blackmails a 14-year-old girl into performing oral sex.
The haranguing tone of “Filth,” whose title is Scottish slang for the police, causes the movie to lose its roughneck charm quickly. After a certain point, watching it is like listening to the ravings of an increasingly incoherent and abusive drunk. Further impeding enjoyment, the characters’ Scottish accents render swatches of the dialogue impenetrable. | 2023-11-12T01:26:35.434368 | https://example.com/article/1818 |
Dean Court, Oxfordshire
Dean Court is a suburb west of the centre of Oxford, England. Dean Court was part of Berkshire until the 1974 local government boundary changes transferred it to Oxfordshire.
History
The area was the site of a medieval grange of Abingdon Abbey, excavated in the 1970s and 1980s. Dean Court was first mentioned in the 14th century under the name of "La Dene". The name reflects its location between Wytham Hill and Cumnor Hill: the Old English denu is a word used for long narrow valleys with moderately steep gradients on either side. In 1538 there was a reference to "the rectory of Dencourt". However there is no later record of the church which was evidently in the hamlet during the Middle Ages.
A map of 1761 shows Dean Court as a small hamlet on the road from Oxford to Eynsham, and so it remained until after the Second World War.
Development of the area started in the early 1950s with a housing estate called Pinnocks Way. In 1969 Deanfield Road, Broad Close and Owlington Close were built north of Eynsham Road by Wimpey Homes. The Orchard Road estate (originally marketed as "The Hawthornes") was built by
Broseley Estates Limited and Costain in 1983 and later in 1985 houses were added by Thameway and Macleans. The Fogwell Road estate was built in 1986.
Dean Court is part of the parish of Cumnor, and until the 20th century parishioners worshipped away at the Church of England parish church of Saint Michael, Cumnor. There is now the church of Saint Andrew, Dean Court that was built as a chapel of ease.
References
Category:Areas of Oxford
Category:Housing estates in Oxfordshire | 2024-04-08T01:26:35.434368 | https://example.com/article/3313 |
FEATURED ARTICLES ABOUT RONALD GOLDMAN - PAGE 2
Mezzaluna restaurant, made famous in the O.J. Simpson case, has shut its doors. The Brentwood eatery where Ronald Goldman was a waiter and Nicole Brown Simpson had her final meal was not open for dinner on Wednesday. An answering machine message said the restaurant would be serving at 5 p.m., but neighbors said the business has been closed since last week. Owner Karim Souki did not return telephone calls to his home. Although the closing could be temporary, a local monthly paper said it received a call for an advertisement announcing an auction of Mezzaluna's tables and chairs.
The O.J. Simpson murder trial in Los Angeles took a dramatic turn Monday when Judge Lance Ito granted the prosecution permission to treat the football legend's houseguest, Kato Kaelin, as a hostile witness. Deputy District Atty. Marcia Clark made the request, allowing her to attack her own prosecution witness without repeated objections from Simpson's defense team. Legal analysts said it was unusual for a prosecutor to seek to undermine the credibility of a prosecution witness who had given valuable evidence about hearing a thump on a wall at Simpson's mansion where a bloody glove was later discovered.
A literary agent for the family of stabbing victim Ronald Goldman has made a deal to repackage and publish O.J. Simpson's canceled "If I Did It" book about the slayings of Goldman and Simpson's ex-wife, a spokesman for the agent said Monday. Details of the agreement, including the name of the New York publishing house, will be released Tuesday, said Michael Wright, a spokesman for Los Angeles-based literary agent Sharlene Martin of Martin Literary Management. ---------- Personals was compiled by Kim Profant from Tribune news services and staff reports.
O.J. Simpson's DNA expert reluctantly acknowledged Friday that critical blood samples couldn't have been contaminated at one stage in processing because they were handled by an outside lab rather than police technicians. In another development, a prosecutor revealed that a second DNA test-one more established and less controversial than the one under attack by defense expert John Gerdes-has tentatively identified genetic material from Simpson and victim Ronald Goldman in a blood stain found in Simpson's Bronco.
The coroner defended his investigators' failure to examine Nicole Brown Simpson for signs she was raped or had consensual sex before she was slain. Dr. Lakshmanan Sathyavagiswaran said Thursday, "I didn't feel it was necessary" for crime scene investigators to collect evidence to document sexual activity by Nicole Simpson because other factors suggested she had not been raped. She and her friend Ronald Goldman were found stabbed to death outside her condominium on June 12, 1994. "She was fully clothed, intimate apparel in place," Lakshmanan said.
O.J. Simpson's blood has the same genetic makeup as blood found at the site where his ex-wife and her friend were slain, according to sophisticated test results made public Monday. The results of "DNA fingerprinting" likely will be the most important evidence against Simpson because there are no known witnesses to the knife murders of Nicole Brown Simpson and Ronald Goldman. Prosecutors have alleged that Simpson left blood at the murder scene when he cut his finger during a struggle.
By Wednesday, 102 people had convinced a judge they could set aside their deepest biases, ignore publicity and spare four months of their lives to sit as jurors in the O.J. Simpson civil case. When they return next week for a final round of juror selection, they will be asked about police power, domestic violence and race relations. Simpson, 49, is being sued in Superior Court by the relatives of murder victims Nicole Brown Simpson and Ronald Goldman. Simpson was acquitted of murder charges in the June 1994 knife slayings.
Former Los Angeles police detective Mark Fuhrman refused to answer questions Monday in a deposition for the wrongful death lawsuit against O.J. Simpson. "He took the 5th on everything," a source close to the case said. Fuhrman had been expected to invoke his right against self-incrimination during the deposition in Rathdrum, where Fuhrman lives. Simpson was acquitted last year of murdering his ex-wife Nicole Brown Simpson and her friend Ronald Goldman. The wrongful death suit on behalf of the victims seeks to hold him liable in civil court.
The judge in O.J. Simpson's civil trial ruled on Friday that the former football star's lawyers can tell the jury about their theory that evidence was planted in an attempt to frame him for murder. The decision by Judge Hiroshi Fujisaki, seen as a victory for Simpson, allowed defense lawyers to argue during opening statements that former detective Mark Fuhrman planted a bloody glove on Simpson's estate the morning after his ex-wife, Nicole Brown Simpson, and her friend, Ronald Goldman, were killed.
Brian "Kato" Kaelin has finally admitted what he wouldn't say at O.J. Simpson's criminal trial: "I do believe he murdered Nicole." Simpson was acquitted last October of the murder of Nicole Brown Simpson, his ex-wife, and her friend Ronald Goldman, and Kaelin has equivocated over his opinion of what happened. He let his feelings show during an interview with Geraldo Rivera, broadcast Friday on CNBC's "Rivera Live." "Do you think O.J. Simpson murdered Nicole?" Rivera asked. | 2024-07-19T01:26:35.434368 | https://example.com/article/9561 |
Q:
EventStore example applications with source?
can anyone point me to any EventStore sample application with source code?
I'm learning event storing and want to view a reference implementation.
Thanks
A:
There seems to be a lack of full-featured sample projects for a lot of this stuff. So far the best option for EventStore/CommonDomain that I've found is Haf's Documently project on GitHub. You can find both source code and wiki pages there. It seems to gloss over some of the complications of real-world apps but it was enough to get me started with my own prototyping.
| 2023-10-19T01:26:35.434368 | https://example.com/article/3142 |
@page
@inject IHtmlLocalizer<AccountResource> L
@using Microsoft.AspNetCore.Mvc.Localization
@using Volo.Abp.Account.Localization
@model Volo.Abp.Account.Web.Pages.Account.ResetPasswordModel
@inject Volo.Abp.AspNetCore.Mvc.UI.Layout.IPageLayout PageLayout
<div class="card mt-3 shadow-sm rounded">
<div class="card-body p-5">
<h4>@L["ResetPassword"]</h4>
<form method="post">
<p>@L["ResetPassword_Information"]</p>
<abp-input asp-for="ReturnUrl"/>
<abp-input asp-for="ReturnUrlHash"/>
<abp-input asp-for="UserId"/>
<abp-input asp-for="ResetToken"/>
<abp-input asp-for="Password"/>
<abp-input asp-for="ConfirmPassword"/>
<a abp-button="Secondary" asp-page="./Login">@L["Cancel"]</a>
<abp-button type="submit" button-type="Primary" text="@L["Submit"].Value"/>
</form>
</div>
</div>
| 2023-10-09T01:26:35.434368 | https://example.com/article/1814 |
india
Updated: Sep 08, 2019 01:43 IST
Journalist Priya Ramani told a Delhi court on Saturday that she tweeted about her experience of sexual harassment allegedly by former Union minister MJ Akbar, after seeing other women tweet about similar experiences.
Akbar, who resigned from his position as minister of state for external affairs in November 2018 after a host of women accused him of sexual misconduct during the Me Too movement, filed a criminal defamation case against Ramani last year. He has denied Ramani’s allegations.
Akbar’s complaint refers to two tweets written by Ramani on October 8 and 10, 2018.
In the first tweet, she quoted a 2017 article she wrote in the magazine Vogue, titled ‘To the Harvey Weinsteins of the world’, in which she described her first job interview conducted by an older male editor in a five star hotel room in Mumbai. Ramani did not name the editor in the article.
“I began this piece with my MJ Akbar story. Never named him because he didn’t ‘do’ anything. Lots of women have worse stories about this predator — maybe they’ll share,” Ramani tweeted on October 8.
On October 10, Ramani tagged other women journalists who had similarly described the harassment that they had faced while working under Akbar, who has been the editor of various newspapers and magazines.
Ramani, who recorded her statement as a defence witness on Saturday, described what transpired during the purported interview, and how she came to write the article and the tweets.
“I said I never named him because he didn’t ‘do’ anything. I used inverted commas to denote sarcasm. Sexual harassment can take any form. It can be physical or verbal. By saying that he didn’t ‘do’ anything, I was honestly disclosing that there was no overt act but that did not excuse Mr. Akbar’s sexually coloured behaviour,” Ramani told the court on Saturday.
“I used the word ‘predator’ to emphasize and highlight the difference in age, influence and power between Akbar and myself. I was a young journalist, he was a famous editor, 20 years older than me, who called me to his bedroom in a hotel for a job interview,” Ramani added.
However, Akbar has denied the incident.
“Since there was no meeting, therefore it is wrong to suggest that I did not ask Priya Ramani about her writing skills, her knowledge of current affairs, or her ability to enter the world of journalism. Since I did not meet her on that day, I do not know whether she felt unnerved by my behaviour,” Akbar had said in court in May.
The matter will be heard on Monday. | 2024-01-27T01:26:35.434368 | https://example.com/article/4729 |
The value of internal jugular vein collapsibility index in sepsis.
Rapid, accurate, and reproducible assessment of intravascular volume status is crucial in order to predict the efficacy of volume expansion in septic patients. The aim of this study was to verify the feasibility and usefulness of the internal jugular vein collapsibility index (IJV-CI) as an adjunct to the inferior vena cava collapsibility index (IVC-CI) to predict fluid responsiveness in spontaneously-breathing patients with sepsis. Three stages of sonographic scanning were performed. Hemodynamic data were collected using the Ultrasonic Cardiac Output Monitor 1A system (Uscom, Ltd., Sydney, NSW, Australia) coupled with paired assessments of IVC-CI and IJV-CI at baseline, after passive leg raise (PLR), and again in semi-recumbent position. Fluid responsiveness was assessed according to changes in the cardiac index (CI) induced by PLR. Patients were retrospectively divided into 2 groups: fluid responder if an increase in CI (ΔCI) ≥15% was obtained after PLR maneuver, and non-responder if ΔCI was <15%. Total of 132 paired scans of IJV and IVC were completed in 44 patients who presented with sepsis and who were not receiving mechanical ventilation (mean age: 54.6±16.1 years). Of these, 23 (52.2%) were considered to be responders. Responders had higher IJV-CI and IVC-CI before PLR maneuver than non-responders (p<0.001). IJV-CI of more than 36% before PLR maneuver had 78% sensitivity and 85% specificity to predict responder. Furthermore, less time was needed to measure venous diameters for IJV-CI (30 seconds) compared with IVC-CI (77.5 seconds; p<0.001). IJV-CI is a precise, easily acquired, non-invasive parameter of fluid responsiveness in patients with sepsis who are not mechanically ventilated, and it appears to be a reasonable adjunct to IVC-CI. | 2023-11-01T01:26:35.434368 | https://example.com/article/4796 |
Q:
Is PHP uniqid safe for HTML id attribute?
I'd like to use a random id attribute in HTML:
<?php $id = uniqid(); ?>
<div data-cycle-prev="#<?php echo $id; ?>_slideshow_prev">
<div id="<?php echo $id; ?>_slideshow_prev"></div>
</div>
I'm using PHP method uniqid to generate it, but I don't know if it is safe and W3C compliant?
My concern for compliance is for the generated HTML which the PHP outputs. Not all characters are allowed in an HTML attribute, so I was wondering if uniqid() generates only allowed characters.
A:
uniqid returns id, which contains hexadecimal symbols(0-9, a-f). This is explained in manual comments - http://php.net/manual/en/function.uniqid.php#95001
So, yes, this is safe for html attributes.
| 2023-11-25T01:26:35.434368 | https://example.com/article/9078 |
Toward an Accurate Modeling of Hydrodynamic Effects on the Translational and Rotational Dynamics of Biomolecules in Many-Body Systems.
Proper treatment of hydrodynamic interactions is of importance in evaluation of rigid-body mobility tensors of biomolecules in Stokes flow and in simulations of their folding and solution conformation, as well as in simulations of the translational and rotational dynamics of either flexible or rigid molecules in biological systems at low Reynolds numbers. With macromolecules conveniently modeled in calculations or in dynamic simulations as ensembles of spherical frictional elements, various approximations to hydrodynamic interactions, such as the two-body, far-field Rotne-Prager approach, are commonly used, either without concern or as a compromise between the accuracy and the numerical complexity. Strikingly, even though the analytical Rotne-Prager approach fails to describe (both in the qualitative and quantitative sense) mobilities in the simplest system consisting of two spheres, when the distance between their surfaces is of the order of their size, it is commonly applied to model hydrodynamic effects in macromolecular systems. Here, we closely investigate hydrodynamic effects in two and three-body systems, consisting of bead-shell molecular models, using either the analytical Rotne-Prager approach, or an accurate numerical scheme that correctly accounts for the many-body character of hydrodynamic interactions and their short-range behavior. We analyze mobilities, and translational and rotational velocities of bodies resulting from direct forces acting on them. We show, that with the sufficient number of frictional elements in hydrodynamic models of interacting bodies, the far-field approximation is able to provide a description of hydrodynamic effects that is in a reasonable qualitative as well as quantitative agreement with the description resulting from the application of the virtually exact numerical scheme, even for small separations between bodies. | 2024-04-05T01:26:35.434368 | https://example.com/article/8328 |
Maine union organizers say a misunderstanding of national rules governing candidate endorsements led to the cancellation of Sen. Bernie Sanders’ planned Labor Day speech.
The Democratic presidential candidate had been billed as the keynote speaker at the annual Labor Day breakfast in Portland hosted by the Southern Maine Labor Council, a local affiliate of the AFL-CIO that represents some 5,000 workers in York, Cumberland and Sagadahoc counties.
Andy O’Brien, a spokesman for the Maine AFL-CIO, said Tuesday that local organizers were unaware of national AFL-CIO rules that prevented Sanders from being invited to speak at the event.
“He canceled because the national AFL-CIO has strict rules regarding its endorsement process,” O’Brien said. “This includes not allowing presidential candidates to speak at state federation or central labor council events unless all of the candidates are invited.”
The concern, O’Brien said, was that Sanders’ appearance would look like an early endorsement by the AFL-CIO, which includes some 12 million active and retired workers and is the largest labor federation in the United States. It doesn’t typically endorse candidates in presidential races – although member unions may.
Sanders, who had been informed Friday that he could attend but not speak at the breakfast Monday, arrived in Portland on Sunday night and delivered a speech to more than 1,600 supporters packed into a rally at the State Theatre. It wasn’t until just after 1 a.m. Monday that the media were notified that Sanders would not appear at the breakfast.
Sanders’ campaign had planned the two events in Portland as part of a two-day sweep into Maine and New Hampshire over the holiday weekend. After the Sunday evening rally and skipping the breakfast event in Portland on Monday, Sanders continued with his plans to walk in a Labor Day parade in Milford, New Hampshire, later in the day.
On Tuesday, Southern Maine Labor Council President Doug Born said that he simply “missed the memo” that national leaders sent out in May reminding local council leaders that they could not have single candidates speak at their events for fear it would look like an endorsement of that candidate.
Related Workers are celebrated during annual Labor Day breakfast in Portland
Born said he addressed the crowd Monday about what he called, “the 800-pound gorilla” in the room – Sanders’ absence. He said those attending the breakfast largely understood.
He also said the breakfast was sold out before Sanders’ appearance was even announced. The Vermont independent is making a second run at the Democratic Party’s presidential nomination.
After it became clear Sanders wouldn’t be able to speak, Born said he arranged to have Sanders visit as a guest to meet and greet those going to the breakfast, but that plan also fell through with the campaign. Born said Sanders called him personally to apologize he couldn’t make it.
“A lot of us as individuals are big Bernie fans,” Born said. But he never intended Sanders’ appearance to be taken as an endorsement by the labor council, noting that the council does not endorse presidential candidates.
A spokeswoman for the Sanders’ campaign declined to comment Tuesday.
Despite Sanders’ absence, both Born and O’Brien said the crowd was pleased by the speech given by Jose La Luz, a veteran organizer who led the campaign to achieve collective bargaining rights for public workers in Puerto Rico. Since 2017, La Luz has been campaigning for Medicare for All.
“Jose La Luz really brought down the house, so I think everyone was pleased overall with the event,” O’Brien wrote in an email to the Portland Press Herald.
Send questions/comments to the editors.
« Previous
Next »
filed under: | 2024-07-20T01:26:35.434368 | https://example.com/article/5279 |
Q:
Apache Flink: CsvReader TAB field delimiter
I am working with a large CSV file which uses TAB to separate the fields in one row. The problem is that there are more than one TAB characters between some fields. I don't want to replace characters because there are about a million lines in the file. I tried the code bellow but it doesn't work, it apparently doesn't find the delimiter and gives me nothing as an output.
If i use \t as the delimiter I get an output, but the multiple TAB characters are a problem.
DataSet<Tuple7<String, String, String, String, String, String, String>> ds = env
.readCsvFile("../csvResources/1.CSV")
.fieldDelimiter("\t+")
.ignoreInvalidLines()
.types(String.class, String.class, String.class, String.class, String.class, String.class, String.class)
.project(0, 1, 2, 3, 4, 5, 6);
Would appreciate your help.
A:
This is currently not supported by Flink's built-in CsvInputFormat. It will interpret each tab as a field delimiter and assume that some fields are empty.
There are two ways to address this issue.
Implement your own input format (possibly forking CsvInputFormat). You basically need to change the logic that is responsible for splitting a record into individual fields. Instead of parsing the next field when you observe a field delimiter (tab), you need to check if the next character is a field delimiter as well.
Read file linewise (using TextInputFormat) and parse each line is a subsequent MapFunction.
I'd recommend to go with the second approach. It's easier to implement and maintain.
| 2023-12-18T01:26:35.434368 | https://example.com/article/2363 |
They’re all at it! All of them! It’s a conspiracy! They’re going to subvert global finance! They’re going to make a fortune without paying a gigantic tithe to price-fixing publishers! It’s wrong! It suggests traditional models of capitalism are outdated and near-sighted! We’re doomed! I’m worried not even a single sentence of this post won’t end with an exclamation mark!
Oh, there you go. Yes, the latest indie game to jump aboard the high-speed pay-what-you-what bandwagon is Jason Rohrer’s splendid 2-play storytelling game Sleep Is Death. He’s set a minimum spend of $1.75, but apart from that, lob him whatever you think the game’s worth in return for two copies of the splendid thing. The RPS Hivemind will have to decide how frequently we cover these sort of deals if we’re to avoid every other post documenting bargains, but as this one is so soon after the game’s release, it’s definitely An Awesome Thing. Get to it. | 2023-08-19T01:26:35.434368 | https://example.com/article/1298 |
Roscoes Airport
Roscoes Airport is a private airport located 1 mile south of Willamina in Polk County, Oregon, USA. It falls under the Seattle sectional chart, and provides fuel, airframe service and bottled oxygen.
External links
References
Category:Airports in Polk County, Oregon | 2024-05-04T01:26:35.434368 | https://example.com/article/8696 |
We are all the ASLC
Two years ago, a room full of dedicated students spent five hours rewriting our entire ASLC constitution. They drastically changed the structure of student government by increasing the number of Senators, lowering Cabinet stipends, and more. They tried to fix what felt like a broken system. Fast forward to last week’s Senate meeting where we discussed reducing the number of Senators, passed legislation on paying said Senators, and are attempting to restructure ASLC once again. Like all governments, we also are consistently struggling to find the perfect system.
Each year, our campus changes and the bodies that represent it should reflect this. I believe in a living constitution–the idea that as demographics shift and ideals are transformed, so do the laws that govern us. There is no perfect system, but a best practice for the time being and the given community. This idea should also apply to the body of ASLC because this is not just about efficiency and organization, it is about uninhibited student voice. And this voice includes far more than just those of Cabinet and Senate.
Every student that pays a student body fee, receives a tutor, benefits from a club or organization, or has ever been financed through us actively decided to become a member of the Associated Students of Lewis & Clark. Every one of these students is a part of ASLC. Consequently, the ASLC is the largest student organization on this campus with around 2,000 members. The work we are doing in Senate right now is not just about our own internal processes, they are about engaging and representing the rest of our community while ensuring that association to this group has meaning and impact.
Yet, our structural changes, our constitutional amendments, and our individual composition only mean so much without the backing of students. ASLC’s impact is as large as the students that support it and its voice is as strong as the many that stand behind it. It is an exhausting cycle of needing legitimacy so students can support us yet needing student support to be legitimate.
This is where students come in.
If you have not done so already, please vote for Cabinet and Senate. If you already have, I invite you to attend a Senate meeting to take part in the conversation. If this is not your space, write to a representative or senator about your ideas or concerns. If you are not quite there, at least stay informed on our work.
We can not be the Associated Students of Lewis & Clark without students to be associated with. In the past, I have said that to be actively engaged with ASLC means to have a seat at the table. I realize now that I was wrong. To be actively engaged with ASLC means to build our own table just as important and tall as those already here. | 2024-03-15T01:26:35.434368 | https://example.com/article/1417 |
---
abstract: 'This work concerns the numerical approximation of the multicomponent compressible Euler system for a mixture of immiscible fluids in multiple space dimensions and its contribution is twofold. We first derive an entropy stable, positive and accurate three-point finite volume scheme using relaxation-based approximate Riemann solvers from Bouchut \[Nonlinear stability of finite volume methods for hyperbolic conservation laws and well-balanced schemes for sources, Frontiers in Mathematics, Birkhauser, 2004\] and Coquel and Perthame \[*SIAM J. Numer. Anal.*, 35 (1998), pp. 2223–2249\]. Then, we extend these results to the high-order discontinuous Galerkin spectral element method (DGSEM) based on collocation of quadrature and interpolation points \[Kopriva and Gassner, *J. Sci. Comput.*, 44 (2010), pp.136–155\]. The method relies on the framework introduced by Fisher and Carpenter \[*J. Comput. Phys.*, 252 (2013), pp. 518–557\] and Gassner \[*SIAM J. Sci. Comput.*, 35 (2013), pp. A1233–A1253\] where we replace the physical fluxes by entropy conservative numerical fluxes \[Tadmor, *Math. Comput.*, 49 (1987), pp. 91–103\] in the integral over discretization elements, while entropy stable numerical fluxes are used at element interfaces. Time discretization is performed with a strong-stability preserving Runge-Kutta scheme. We design two-point numerical fluxes satisfying the Tadmor’s entropy conservation condition and use the numerical flux from the three-point scheme as entropy stable flux. We derive conditions on the numerical parameters to guaranty a semi-discrete entropy inequality as well as positivity of the fully discrete DGSEM scheme at any approximation order. The scheme is also accurate in the sense that the solution at interpolation points is exact for stationary contact waves and material interfaces. Numerical experiments in one and two space dimensions on flows with discontinuous solutions support the conclusions of our analysis and highlight stability, robustness and high resolution of the scheme.'
author:
- 'Florent Renac[^1]'
title: 'Entropy stable, positive DGSEM with sharp resolution of material interfaces for a $4\times4$ two-phase flow system: a legacy from three-point schemes'
---
Compressible multicomponent flows, entropy stable scheme, discontinuous Galerkin method, summation-by-parts, relaxation scheme
65M12, 65M70, 76T10
Introduction
============
The accurate and robust simulation of compressible flows with material interfaces separating fluids with different properties is of strong significance in many engineering applications (e.g., combustion in propulsion systems, explosive detonation products) and scientific applications (e.g., flow instabilities, chemical reactions, phase changes). These flows may involve nonlinear waves such as shock and rarefaction waves, contact waves, material interfaces separating different fluids, and their interactions which usually trigger phenomena leading to small scale flow structures. The discussion in this paper focuses on the nonlinear analysis of a high-order discretization of the multicomponent compressible Euler system for a mixture of immiscible fluids in multiple space dimensions. Such system falls into the category of diffuse interface models where the PDEs for the mixture are supplemented with evolution equations for the mass fractions of the different phases [@saurel_pantano_18]. The design of high-order discretizations of such flows based on interface capturing methods has been the subject of numerous works. Though not exhaustive, we refer to the works on finite differences [@latini_etal_07; @kawai_terashima_11; @mohaved_johnsen_13; @capuano_etal_18], finite volume methods [@johnsen_etal_06; @houim_kuo_11], or discontinuous Galerkin (DG) methods [@xiong_etal_12; @h_de_frahan_etal_15; @vilar_etal_16] and references therein.
In this context, we consider the discontinuous Galerkin spectral element method (DGSEM) based on the collocation between interpolation and quadrature points [@kopriva_gassner10]. Using diagonal norm summation-by-parts (SBP) operators and the entropy conservative numerical fluxes from Tadmor [@tadmor87], semi-discrete entropy conservative finite-difference and spectral collocation schemes have been derived in [@fisher_carpenter_13; @carpenter_etal14] for nonlinear conservation laws. Entropy stable DGSEM for the compressible Euler equations on hexahedral [@winters_etal_16] and triangular [@chen_shu_17] meshes have been proposed by using the same framework. The particular form of the SBP operators allows to take into account the numerical quadratures that approximate integrals in the numerical scheme compared to other techniques that require their exact evaluation to satisfy the entropy inequality [@jiang_shu94; @hiltebrand_mishra_14]. The DGSEM thus provides a general framework for the design of entropy stable schemes for nonlinear systems of conservation laws. An entropy stable DGSEM for the discretization of general nonlinear hyperbolic systems in nonconservative form has been introduced in [@renac19] and applied to two-phase flow models [@renac19; @coquel_etal_19]. Numerical experiments in [@winters_etal_16; @wintermeyer_etal_17; @chen_shu_17; @renac19; @coquel_etal_19] highlight the benefits on stability and robustness of the computations, though this not guarantees to preserve neither the entropy stability at the fully discrete level, nor positivity of the numerical solution. Designs of fully discrete entropy stable and positive DGSEM have been proposed in [@despres98; @despres00; @renac17a; @renac17b; @renac19].
In the context of high-order schemes, a common way to design entropy stable numerical fluxes in the sense of Tadmor [@tadmor87] is to derive entropy conservative numerical fluxes to which one adds ad-hoc dissipation [@tadmor03; @fjordholm_etal_12; @carpenter_etal14; @winters_etal_16; @winters_etal_17; @renac19; @coquel_etal_19; @chandrashekar13]. Nevertheless, this may cause difficulties to derive further properties of the scheme, such as preservation of invariant domains, bound preservation, or exact resolution of isolated shocks and contacts, because the numerical flux may involve intricate operations of its arguments [@ismail_roe_09; @chandrashekar13]. These properties are however important for the robustness and accuracy of the scheme. Besides, for smooth solutions or large scale oscillations around discontinuities the DG approximation is known to become less sensitive to the numerical flux as the scheme accuracy increases [@qui_et-al06; @renac15a], but this is no longer the case when small scale flow features are involved and the numerical flux has a strong effect on their resolution [@moura_etal_17; @chapelier_etal_14]. One has therefore to pay a lot of attention in the design of the numerical fluxes at interfaces. In the present work, we adopt a different strategy and first design an entropy stable, positive and accurate three-point scheme and then use it as a building block to define an entropy stable, positive and accurate DGSEM.
The difficulty in the design of an entropic and positive three-point scheme for the multicomponent compressible Euler system lies in the fact that the thermodynamic properties of the mixture depend on the mass fractions of the different phases. In [@dellacherie_03] a relaxation technique is applied to the multicomponent Euler system which allows the use of monocomponent entropic schemes for each component. However, this technique does not hold for the separated fluid mixture in Eulerian coordinates under consideration in this work. Here, we consider the energy relaxation technique introduced in [@coquel_perthame_98] for the approximation of the monocomponent compressible Euler equations with general equation of states. The method allows the design of entropic and positive numerical schemes by using classical numerical fluxes for polytropic gases. We extend this method to our model and show how to define an entropic numerical scheme from a scheme for the polytropic gas dynamics with additional equations for the mass fraction and relaxation energy. This latter scheme uses the entropic and positive approximate Riemann solver based on pressure relaxation and introduced in [@bouchut_04]. Relaxation schemes circumvent the difficulties in the treatment of nonlinearities associated to the equation of state by approximating the nonlinear system with a consistent linearly degenerate (LD) enlarged system with stiff relaxation source terms [@Jin_Xin_95; @coquel_etal_01; @chalons_coulombel08]. The entropy of the energy relaxation approximation of our model satisfies a variational principle but is not strictly convex which prevents to apply classical stability theorems [@chen_levermore_liu94]. The use of the pressure relaxation approximation however circumvents this difficulty mainly because of its LD character and results in entropy stability for our model.
The numerical flux is used in the DGSEM at mesh interfaces, while an entropy conservative numerical flux is used within the discretization elements resulting in a semi-discrete entropy stable scheme. We prove that the discrete scheme with explicit time integration exactly captures stationary contacts and material interfaces at interpolation points. We further derive conditions on the time step to keep positivity of the mean value of the numerical solution in discretization elements. This is achieved by extending the framework introduced in [@zhang_shu_10b] for Cartesian meshes to unstructured meshes with straight-sided quadrangles. We formulate the DGSEM for the cell-averaged solution as a convex combination of positive quantities under a CFL condition by using results from [@perthame_shu_96]. We finally apply a posteriori limiters [@zhang_shu_10b] that extend the positivity to nodal values within elements.
The paper is organized as follows. presents the multicomponent compressible Euler system under consideration and some of its properties. We derive the entropy conservative two-point numerical flux in \[sec:EC-ES-fluxes\], while in \[sec:FV-schemes\] we recall some properties of three-point schemes. We derive an entropy stable relaxation-based three-point scheme in \[sec:relax\_flux\] that we then use as building block for the DGSEM introduced in \[sec:DG\_discr\]. We analyze the properties of the fully discrete DGSEM in \[sec:scheme\_properties\]. The results are assessed by numerical experiments in one and two space dimensions in \[sec:num\_xp\] and concluding remarks about this work are given in \[sec:conclusions\].
Model problem {#sec:HRM_model}
=============
Let $\Omega\subset\mathbb{R}^d$ be a bounded domain in $d$ space dimensions, we consider the IBVP described by the multicomponent compressible Euler system for a mixture of two immiscible fluids. The model is known as the homogeneous relaxation model (HRM) [@bilicki_kestin_90]. We do not consider relaxation processes that come from some chemical reactions and the problem takes the form
\[eq:HRM\_PDEs\] $$\begin{aligned}
\partial_t{\bf u} + \nabla\cdot{\bf f}({\bf u}) &= 0, \quad \mbox{in }\Omega\times(0,\infty), \label{eq:HRM_PDEs-a} \\
{\bf u}(\cdot,0) &= {\bf u}_{0}(\cdot),\quad\mbox{in }\Omega, \label{eq:HRM_PDEs-b}\end{aligned}$$
with some boundary conditions to be prescribed on $\partial\Omega$ (see \[sec:num\_xp\]). Here, $$\label{eq:HRM}
{\bf u} = \big(\rho Y, \rho, \rho{\bf v}^\top, \rho E\big)^\top, \quad
{\bf f}({\bf u}) = \big(\rho Y{\bf v}, \rho{\bf v}, \rho{\bf v}{\bf v}^\top+\mathrm{p}{\bf I}, (\rho E+\mathrm{p}){\bf v}\big)^\top,$$ denote the conserved variables and the convective fluxes with $Y$ the mass fraction of the first fluid; $\rho$, ${\bf v}$ in $\mathbb{R}^d$, and $E$ are the density, velocity vector, and total specific energy of the mixture, respectively. The mixture quantities are defined from quantities of both phases $i=1,2$ through $$ \rho = \alpha\rho_1 + (1-\alpha)\rho_2, \quad \rho E = \alpha\rho_1E_1 + (1-\alpha)\rho_2E_2, \quad \mathrm{p} = \alpha\mathrm{p}_1(\rho_1,e_1) + (1-\alpha)\mathrm{p}_2(\rho_2,e_2),$$ where $E_{i=1,2}=e_i+\tfrac{{\bf v}\cdot{\bf v}}{2}$ and $\alpha=\rho Y/\rho_1$ is the void fraction. The total energy of the mixture reads $$\rho E = \alpha\rho_1\big(e_1+\tfrac{{\bf v}\cdot{\bf v}}{2}\big)+(1-\alpha)\rho_2\big(e_2+\tfrac{{\bf v}\cdot{\bf v}}{2}\big)=\rho e+\rho \tfrac{{\bf v}\cdot{\bf v}}{2}.$$ where $\rho e=\alpha\rho_1e_1+(1-\alpha)\rho_2e_2$ denotes the internal energy of the mixture per unit volume.
Equations \[eq:HRM\_PDEs\] are supplemented with polytropic ideal gas equations of states: $$\label{eq:EOS_SG}
\mathrm{p}_i(\rho_i,e_i) = (\gamma_i-1)\rho_ie_i, \quad e_i = C_{v_i}\mathrm{T}_i, \quad i=1,2,$$ where $\gamma_i=C_{p_i}/C_{v_i}>1$ is the ratio of specific heats which are assumed to be positive constants of the model. The HRM model assumes thermal and mechanical equilibria: $$\label{eq:equ_temp_press}
\mathrm{T}_1(\rho_1,e_1) = \mathrm{T}_2(\rho_2,e_2) =: \mathrm{T}(Y,\rho,e), \quad
\mathrm{p}_1(\rho_1,e_1) = \mathrm{p}_2(\rho_2,e_2) =: \mathrm{p}(Y,\rho,e),$$ thus leading to
\[eq:mixture\_eos\] $$\begin{aligned}
e(Y,\mathrm{T}) &= C_v(Y)\mathrm{T}, \\
\mathrm{p}(Y,\rho,e) &= \big(\gamma(Y)-1\big)\rho e = \rho r(Y)\mathrm{T}(Y,\rho,e), \label{eq:mixture_eos-b}\end{aligned}$$
with $$\label{eq:mixture_r_Cv_Cp}
r(Y)=C_p(Y)-C_v(Y), \quad C_p(Y)=Y C_{p_1}+(1-Y)C_{p_2}, \quad C_v(Y)=Y C_{v_1}+(1-Y)C_{v_2},$$ and $$\label{eq:mixture_gamma}
\gamma(Y)=\frac{C_p(Y)}{C_v(Y)}.$$ Note that due to \[eq:EOS\_SG,eq:equ\_temp\_press\] we have $$\label{eq:partial_densities}
\rho r(Y) = \rho_ir_i, \quad r_i:=C_{p_i}-C_{v_i}, \quad i=1,2.$$ System \[eq:HRM\_PDEs-a\] is hyperbolic in the direction ${\bf n}$ in $\mathbb{R}^d$ over the set of states $$\label{eq:HRM-set-of-states}
\Omega^a=\{{\bf u}\in\mathbb{R}^{d+3}:\; 0\leq Y\leq 1, \rho>0, e=E-\tfrac{{\bf v}\cdot{\bf v}}{2}>0\},$$ with eigenvalues $\lambda_1={\bf v}\cdot{\bf n}-c\leq \lambda_2=\dots=\lambda_{d+2}={\bf v}\cdot{\bf n}\leq\lambda_{d+3}={\bf v}\cdot{\bf n}+c$, where $\lambda_{1,5}$ are associated to genuinely nonlinear fields and $\lambda_{2\leq i\leq d+2}$ to LD fields. The sound speed is defined by $$\label{eq:sound_speed}
c(Y,e) = \sqrt{\gamma(Y)\big(\gamma(Y)-1)e}.$$ Without loss of generality, we assume that $\gamma_1>\gamma_2$ which induces that $\gamma'(\cdot)>0$ and thus $$\label{eq:gamma-bound}
\gamma_2\leq\gamma(Y)\leq\gamma_1 \quad \forall 0\leq Y\leq1.$$ Solutions to \[eq:HRM\_PDEs\] should satisfy the entropy inequality $$\label{eq:entropy_ineq_cont}
\partial_t\eta({\bf u}) + \nabla\cdot{\bf q}({\bf u}) \leq 0,$$ for the entropy – entropy flux pair $$\label{eq:HRM_entropy_pair}
\eta({\bf u}) =-\rho\mathrm{s}({\bf u}), \quad {\bf q}({\bf u}) =-\rho\mathrm{s}({\bf u}){\bf v}, \quad \mathrm{s}\equiv Y\mathrm{s}_1+(1-Y)\mathrm{s}_2,$$ where the specific entropies are defined by the second law of thermodynamics and using \[eq:equ\_temp\_press\]: $$\label{eq:2nd_principe}
\mathrm{T}d\mathrm{s}_i = de_i - \frac{\mathrm{p}}{\rho_i^2}d\rho_i, \quad i=1,2,$$ and read $\mathrm{s}_i(\rho_i,e_i)=C_{v_i}\ln\big(\tfrac{e_i}{\rho_i^{\gamma_i-1}}\big)+\mathrm{s}^\infty_{i}$ with $\mathrm{s}^\infty_{i}$ an additive constant, so $$\begin{aligned}
\label{eq:mixture_entropy}
\mathrm{s}(Y,\rho,e) &= C_v(Y)\ln\Big(\frac{e}{\rho^{\gamma(Y)-1}}\Big)+K(Y), \\
K(Y) &= Y\Big(C_{v_1}\ln\big(\tfrac{C_{v_1}}{C_v(Y)}\big(\tfrac{r_1}{r(Y)}\big)^{\gamma_1-1}\big)\!+\mathrm{s}^\infty_{1}\Big) \!+\! (1-Y)\Big(C_{v_2}\ln\big(\tfrac{C_{v_2}}{C_v(Y)}\big(\tfrac{r_2}{r(Y)}\big)^{\gamma_2-1}\big)\!+\mathrm{s}^\infty_{2}\Big). \nonumber\end{aligned}$$ Using the differential forms \[eq:2nd\_principe\] and $\theta=\tfrac{1}{\mathrm{T}}$ is the inverse temperature, the entropy variables read $$\etab'({\bf u}) = \begin{pmatrix} \mathrm{s}_2-\mathrm{s}_1+C_{p_1}-C_{p_2} \\ C_{p_2}-\mathrm{s}_2-\tfrac{{\bf v}\cdot{\bf v}}{2}\theta \\ \theta{\bf v} \\ -\theta \end{pmatrix},
$$ and the entropy potential is easily obtained: $$\label{eq:def-potential}
\psib({\bf u}):={\bf f}({\bf u})^\top\etab'({\bf u})-{\bf q}({\bf u}) = r(Y)\rho{\bf v}.$$
Two-point numerical fluxes and associated finite volume schemes
===============================================================
Entropy conservative and entropy stable numerical fluxes {#sec:EC-ES-fluxes}
--------------------------------------------------------
In the following, we design numerical fluxes for the space discretization of \[eq:HRM\_PDEs\]. We adopt the usual terminology from [@tadmor87] and denote by [*entropy conservative*]{} for the pair $(\eta,{\bf q})$ in \[eq:entropy\_ineq\_cont\], a numerical flux ${\bf h}_{ec}$ satisfying $$\label{eq:entropy_conserv_flux}
\du \etab'({\bf u}) \df \cdot {\bf h}_{ec}({\bf u}^-,{\bf u}^+,{\bf n}) = \du \psib({\bf u})\cdot{\bf n} \df \quad \forall {\bf u}^\pm\in\Omega^a,$$ where $\du a \df = a^+-a^-$ denotes the jump operator of $a$ at a given point ${\bf x}$ and $a^\pm=\lim_{\epsilon\downarrow0}a({\bf x}\pm\epsilon{\bf n})$. Entropy stability of the DGSEM also requires the flux to be symmetric in the sense ${\bf h}_{ec}({\bf u}^-,{\bf u}^+,{\bf n})={\bf h}_{ec}({\bf u}^+,{\bf u}^-,{\bf n})$ [@fisher_carpenter_13; @chen_shu_17]. Then, a numerical flux ${\bf h}$ will be [*entropy stable*]{} when $$\label{eq:entropy_stable_flux}
\du \etab'({\bf u}) \df \cdot {\bf h}({\bf u}^-,{\bf u}^+,{\bf n}) \leq \du \psib({\bf u})\cdot{\bf n} \df \quad \forall {\bf u}^\pm\in\Omega^a.$$
Both numerical fluxes are assumed to be Lipschitz continuous, consistent: $$\label{eq:consistent_flux}
{\bf h}_{ec}({\bf u},{\bf u},{\bf n}) = {\bf h}({\bf u},{\bf u},{\bf n}) = {\bf f}({\bf u})\cdot{\bf n} \quad \forall {\bf u}\in\Omega^a,$$ and conservative: $$\label{eq:conservative_flux}
{\bf h}_{ec}({\bf u}^-,{\bf u}^+,{\bf n}) =-{\bf h}_{ec}({\bf u}^+,{\bf u}^-,-{\bf n}), \quad {\bf h}({\bf u}^-,{\bf u}^+,{\bf n}) =-{\bf h}({\bf u}^+,{\bf u}^-,-{\bf n}) \quad \forall {\bf u}^\pm\in\Omega^a.$$
In this work we propose numerical fluxes that satisfy these properties.
\[th:ECPC\_BN\] The following numerical flux is a symmetric, consistent, and entropy conservative \[eq:entropy\_conserv\_flux\] numerical flux for the HRM model \[eq:HRM\_PDEs\] and pair $(\eta,{\bf q})$ in \[eq:entropy\_ineq\_cont\]: $$\label{eq:EC_flux}
{\bf h}_{ec}({\bf u}^-,{\bf u}^+,{\bf n}) = \begin{pmatrix} h_{\rho Y}({\bf u}^-,{\bf u}^+,{\bf n}) \\ h_{\rho}({\bf u}^-,{\bf u}^+,{\bf n}) \\ h_{\rho}({\bf u}^-,{\bf u}^+,{\bf n})\ol{{\bf v}} + \tfrac{\ol{\mathrm{p}\theta}}{\ol{\theta}}{\bf n} \\ \tfrac{C_{v_1}-C_{v_2}}{\widehat{\theta}}h_{\rho Y}({\bf u}^-,{\bf u}^+,{\bf n}) + \Big(\tfrac{C_{v_2}}{\widehat{\theta}}+\tfrac{{\bf v}^{-}\cdot{\bf v}^{+}}{2}\Big)h_{\rho}({\bf u}^-,{\bf u}^+,{\bf n}) + \tfrac{\ol{\mathrm{p}\theta}}{\ol{\theta}}\ol{{\bf v}}\cdot{\bf n} \end{pmatrix}$$ with $h_{\rho Y}({\bf u}^-,{\bf u}^+,{\bf n}) = \tfrac{r_2(\widehat{\rho_2}-\widehat{\rho})}{r_1-r_2}\ol{{\bf v}}\cdot{\bf n}$ and $h_{\rho}({\bf u}^-,{\bf u}^+,{\bf n}) = \widehat{\rho}\ol{{\bf v}}\cdot{\bf n}$, where $\widehat{a}=\tfrac{\du a\df}{\du \ln a\df}$ and $\ol{a}=\tfrac{a^++a^-}{2}$ denote the logarithmic mean [@ismail_roe_09] and average operator.
Symmetry follows from the symmetry of the logarithmic mean and average operator. Then, observe that $h_{\rho Y}({\bf u},{\bf u},{\bf n}) = \tfrac{r_2(\rho_2-\rho)}{r_1-r_2}{\bf v}\cdot{\bf n} \overset{\cref{eq:mixture_eos}}{=} \tfrac{(r(Y)-r_2)\rho}{r_1-r_2}{\bf v}\cdot{\bf n} \overset{\cref{eq:mixture_r_Cv_Cp}}{=} \rho Y {\bf v}\cdot{\bf n},$ thus consistency follows. Now we expand $$\du\mathrm{s}_i\df_{i=1,2} \overset{\cref{eq:2nd_principe}}{=} -C_{v_i}\du\ln\theta\df - r_i\du\ln\rho_i\df, \quad \du\psib({\bf u})\df \overset{\cref{eq:def-potential}}{\underset{\cref{eq:partial_densities}}{=}} \du r_2\rho_2{\bf v}\cdot{\bf n}\df= r_2\big(\ol{\rho_2}\du {\bf v}\df+\du\rho_2\df\ol{\bf v}\big)\cdot{\bf n},$$ and using short notations $$\begin{aligned}
\du \etab'({\bf u}) \df \cdot {\bf h}_{ec}({\bf u}^-,{\bf u}^+,{\bf n}) &= \du (C_{v_1}-C_{v_2})\ln\theta+(r_1-r_2)\ln\rho_2\df h_{\rho Y} \\
&+ \du C_{v_2}\ln\theta+r_2\ln\rho_2-\tfrac{{\bf v}\cdot{\bf v}}{2}\theta\df h_\rho + \du\theta{\bf v}\df\cdot{\bf h}_{\rho {\bf v}}-\du\theta\df h_{\rho E},\end{aligned}$$ and after some algebraic manipulations we conclude by imposing that \[eq:entropy\_conserv\_flux\] must hold for all $\du\rho\df$, $\du {\bf v}\df$, and $\du\theta\df$.
Due to the particular form of the convective terms in the momentum equations, it can be shown that the numerical flux \[eq:EC\_flux\] is formally kinetic energy preserving [@chandrashekar13].
Entropy stable and positive finite volume schemes {#sec:FV-schemes}
-------------------------------------------------
We first consider three-point numerical schemes of the form $$\begin{aligned}
{\bf U}_j^{n+1} &= {\bf U}_j^{n} - \tfrac{\Delta t}{\Delta x}\big({\bf h}({\bf U}_{j}^{n},{\bf U}_{j+1}^{n},{\bf n})-{\bf h}({\bf U}_{j-1}^{n},{\bf U}_{j}^{n},{\bf n})\big), \quad 0<\tfrac{\Delta t}{\Delta x}\max_{j\in\mathbb{Z}}|\lambda({\bf U}_{j}^{n})|\leq\alpha_{max}, \label{eq:3pt-scheme-a} $$ for the discretization of \[eq:HRM\_PDEs-a\] in one space dimension. Here, ${\bf U}_{j}^{n}$ approximates the averaged solution in the $j$-th cell at time $t^{(n)}$, $\Delta t$ and $\Delta x$ are the time and space steps, $|\lambda(\cdot)|$ corresponds to the maximum absolute value of the wave speeds, and $\alpha_{max}\leq1$ corresponds to a bound on $\tfrac{\Delta t}{\Delta x}$ which depends on the numerical flux. The scheme \[eq:3pt-scheme-a\] is said to be entropy stable for the pair $(\eta,{\bf q})$ in \[eq:entropy\_ineq\_cont\] if it satisfies the inequality $$\label{eq:3pt-scheme-ineq}
\eta({\bf U}_j^{n+1})-\eta({\bf U}_j^{n}) + \tfrac{\Delta t}{\Delta x}\big(Q({\bf U}_{j}^{n},{\bf U}_{j+1}^{n},{\bf n})-Q({\bf U}_{j-1}^{n},{\bf U}_{j}^{n},{\bf n})\big) \leq 0, $$ with some consistent entropy numerical flux $Q({\bf u},{\bf u},{\bf n}) = {\bf q}({\bf u})\cdot{\bf n}$. Such schemes use necessarily entropy stable numerical fluxes as stated below.
\[th:ESF\_3pt-scheme\] Let a three-point numerical scheme of the form \[eq:3pt-scheme-a\] for the discretization of \[eq:HRM\_PDEs\] that satisfies the discrete entropy inequality \[eq:3pt-scheme-ineq\] with consistent numerical fluxes. Then, the numerical flux in \[eq:3pt-scheme-a\] is entropy stable in the sense \[eq:entropy\_stable\_flux\].
Let ${\bf u}^-$ and ${\bf u}^+$ in $\Omega^a$ and first substitute ${\bf U}_{j-1}^{n}={\bf U}_j^{n}={\bf u}^-$ and ${\bf U}_{j+1}^{n}={\bf u}^+$ into \[eq:3pt-scheme-a,eq:3pt-scheme-ineq\], we get ${\bf U}_j^{n+1} = {\bf u}^--\tfrac{\Delta t}{\Delta x}\big({\bf h}({\bf u}^-,{\bf u}^+,{\bf n})-{\bf f}({\bf u}^-)\cdot{\bf n}\big)$ by consistency of ${\bf h}$ so \[eq:3pt-scheme-ineq\] becomes $$\eta\Big({\bf u}^--\tfrac{\Delta t}{\Delta x}\big({\bf h}({\bf u}^-,{\bf u}^+,{\bf n})-{\bf f}({\bf u}^-)\cdot{\bf n}\big)\Big) - \eta({\bf u}^-) + \tfrac{\Delta t}{\Delta x}\big(Q({\bf u}^-,{\bf u}^+,{\bf n})-{\bf q}({\bf u}^-)\cdot{\bf n}\big) \leq 0,$$ and letting $\Delta t\downarrow0$ we obtain $$\big({\bf f}({\bf u}^-)\cdot{\bf n}-{\bf h}({\bf u}^-,{\bf u}^+,{\bf n})\big)\cdot\etab'({\bf u}^-) + Q({\bf u}^-,{\bf u}^+,{\bf n})-{\bf q}({\bf u}^-)\cdot{\bf n} \leq 0.$$
Now, substituting ${\bf U}_{j-1}^{n}={\bf u}^-$ and ${\bf U}_j^{n}={\bf U}_{j+1}^{n}={\bf u}^+$ into \[eq:3pt-scheme-a,eq:3pt-scheme-ineq\] and using the same procedure, we obtain $$\big({\bf h}({\bf u}^-,{\bf u}^+,{\bf n})-{\bf f}({\bf u}^+)\cdot{\bf n}\big)\cdot\etab'({\bf u}^+) + {\bf q}({\bf u}^+)\cdot{\bf n} - Q({\bf u}^-,{\bf u}^+,{\bf n}) \leq 0.$$ Summing the two above equations gives the desired result.
We now consider a numerical scheme for quadrangular meshes $\Omega_h\subset\mathbb{R}^2$ using the two-point numerical flux in \[eq:3pt-scheme-a\]: $$\label{eq:2D-FV-scheme}
{\bf U}_\kappa^{n+1} = {\bf U}_\kappa^{n} - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa} |e|{\bf h}({\bf U}_\kappa^{n},{\bf U}_{\kappa_e^+}^{n},{\bf n}_e) \quad \forall \kappa\in\Omega_h, n\geq 0,$$ where ${\bf n}_e$ is the unit outward normal vector on the edge $e$ in $\partial\kappa$, and $\kappa_e^+$ the neighboring cell sharing the interface $e$ (see Figure \[fig:quad-with-subtriangles\]). Each element is shape-regular: the ratio of the radius of the largest inscribed ball to the diameter is bounded by below by a positive constant independent of the mesh. We now state the next two results which are extensions to quadrangles of results from [@perthame_shu_96].
\[th:positive-2D-scheme\] Let a three-point numerical scheme of the form \[eq:3pt-scheme-a\] with a consistent and conservative numerical flux for the discretization of \[eq:HRM\_PDEs-a\] that satisfies positivity of the solution, ${\bf U}_{j\in\mathbb{Z}}^{n\geq0}$ in $\Omega^a$, under the CFL condition in \[eq:3pt-scheme-a\]. Then, the numerical scheme \[eq:2D-FV-scheme\] on quadrangular meshes with the same numerical flux is positive under the condition $$\label{eq:CFL-positive-2D-scheme}
\Delta t \max_{\kappa\in\Omega_h}\frac{|\partial\kappa|}{|\kappa|}\max_{e\in\partial\kappa}|\lambda({\bf U}_{\kappa^\pm}^{n})| \leq \alpha_{max}, \quad |\partial\kappa|:=\sum_{e\in\partial\kappa}|e|.$$
Using $\sum_{e\in\partial\kappa}|e|{\bf n}_e=0$, we rewrite \[eq:2D-FV-scheme\] under the form $$\begin{aligned}
{\bf U}_\kappa^{n+1} &=& {\bf U}_\kappa^{n} - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa} |e|\big({\bf h}({\bf U}_\kappa^{n},{\bf U}_{\kappa_e^+}^{n},{\bf n}_{e})-{\bf f}({\bf U}_\kappa^{n})\cdot{\bf n}_{e}\big) \\
&\overset{\cref{eq:consistent_flux}}{=}& {\bf U}_\kappa^{n} - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa} |e|\big({\bf h}({\bf U}_\kappa^{n},{\bf U}_{\kappa_e^+}^{n},{\bf n}_{e})-{\bf h}({\bf U}_\kappa^{n},{\bf U}_{\kappa}^{n},{\bf n}_{e})\big) \\
&\overset{\cref{eq:CFL-positive-2D-scheme}}{=}& \sum_{e\in\partial\kappa} \tfrac{|e|}{|\partial\kappa|}\Big({\bf U}_\kappa^{n} - \tfrac{\Delta t|\partial\kappa|}{|\kappa|}\big({\bf h}({\bf U}_\kappa^{n},{\bf U}_{\kappa_e^+}^{n},{\bf n}_{e})-{\bf h}({\bf U}_\kappa^{n},{\bf U}_{\kappa}^{n},{\bf n}_{e})\big) \Big),\end{aligned}$$ which is a convex combination of positive three-point schemes \[eq:3pt-scheme-a\] under the condition \[eq:CFL-positive-2D-scheme\].
\[th:positive-2D-FVO2-scheme\] Under the assumptions of \[th:positive-2D-scheme\], the numerical scheme $$\label{eq:2D-FVO2-scheme}
{\bf U}_\kappa^{n+1} = {\bf U}_\kappa^{n} - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa} |e|{\bf h}({\bf U}_{\kappa_e^-}^{n},{\bf U}_{\kappa_e^+}^{n},{\bf n}_e), \quad \sum_{e\in\partial\kappa} \tfrac{|e|}{|\partial\kappa|}{\bf U}_{\kappa_e^-}^{n} = {\bf U}_\kappa^{n},$$ on quadrangular meshes is positive under the condition $$\label{eq:CFL-positive-2D-FVO2-scheme}
\Delta t \max_{\kappa\in\Omega_h}\frac{|\partial\kappa|}{|\kappa|}\max_{e\in\partial\kappa}\frac{|\partial\kappa_e|}{|e|}\max_{f\in\partial\kappa}|\lambda({\bf U}_{\kappa_f^\pm}^{n})| \leq \alpha_{max},$$ with $\kappa=\cup_{e\in\partial\kappa}\kappa_e$ divided into sub-triangles as in Figure \[fig:quad-with-subtriangles\].
We use the notations in Figure \[fig:quad-with-subtriangles\]. By conservation \[eq:conservative\_flux\], ${\bf n}_{ef}=-{\bf n}_{fe}$, and $l_{ef}=l_{fe}$, we have $$\sum_{e\in\partial\kappa}\sum_{f\in\partial\kappa_e\backslash\{e\}}l_{ef}{\bf h}({\bf U}_{\kappa_e^-}^{n},{\bf U}_{\kappa_f^-}^{n},{\bf n}_{ef}) = 0.$$ Adding this quantity to \[eq:2D-FVO2-scheme\], we get $$\begin{aligned}
{\bf U}_\kappa^{n+1} &\overset{\cref{eq:2D-FVO2-scheme}}{=}& \sum_{e\in\partial\kappa} \tfrac{|e|}{|\partial\kappa|}{\bf U}_{\kappa_e^-}^{n} - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa}\Big( |e|{\bf h}({\bf U}_{\kappa_e^-}^{n},{\bf U}_{\kappa_e^+}^{n},{\bf n}_e) - \sum_{f\in\partial\kappa_e\backslash\{e\}}l_{ef}{\bf h}({\bf U}_{\kappa_e^-}^{n},{\bf U}_{\kappa_f^-}^{n},{\bf n}_{ef})\Big) \\
&=& \sum_{e\in\partial\kappa} \tfrac{|e|}{|\partial\kappa|}\Big({\bf U}_{\kappa_e^-}^{n} - \tfrac{|\partial\kappa|}{|e|}\tfrac{\Delta t}{|\kappa|}\sum_{f\in\partial\kappa_e}l_{ef}{\bf h}({\bf U}_{\kappa_e^-}^{n},\hat{\bf U}_{\kappa}^{ef,n},{\bf n}_{ef})\Big),\end{aligned}$$ with the conventions $l_{ee}=|e|$, ${\bf n}_{ee}={\bf n}_{e}$, $\hat{\bf U}_{\kappa}^{ee,n}={\bf U}_{\kappa_e^+}^{n}$, and $\hat{\bf U}_{\kappa}^{ef,n}={\bf U}_{\kappa_f^-}^{n}$ for $f\neq e$. The scheme \[eq:2D-FVO2-scheme\] is therefore a convex combination of positive schemes of the form \[eq:2D-FV-scheme\] under \[eq:CFL-positive-2D-FVO2-scheme\].
![Quadrangle element $\kappa$ divided into sub-triangles $\kappa=\cup_{e\in\partial\kappa}\kappa_e$ and notations.[]{data-label="fig:quad-with-subtriangles"}](2D_quad_with_subtriangles.pdf){width="6cm"}
Relaxation-based numerical flux for the HRM model {#sec:relax_flux}
=================================================
The main objective is here the derivation in \[th:ES-relax-flux\] of an entropy stable numerical flux for \[eq:HRM\_PDEs-a\]. We extend the energy relaxation approximation for the Euler system to the HRM system. The results from [@coquel_perthame_98] do not apply directly because the entropy for the relaxation system is not strictly convex and we circumvent this difficulty in \[th:ES-3-pt-scheme\] by introducing another relaxation approximation containing only LD fields [@bouchut_04] together with a variational principle on the entropy.
Energy relaxation system {#sec:nrj_relax_sys}
------------------------
Following the energy relaxation method introduced in [@coquel_perthame_98], we consider the system$$\label{eq:relax-nrj-HRM-sys}
\partial_t{\bf w}^\epsilon + \nabla\cdot{\bf g}({\bf w}^\epsilon) =-\frac{1}{\epsilon}\big({\bf w}^\epsilon-{\cal M}({\bf w}^\epsilon)\big),$$ where $$\label{eq:relax-nrj-HRM-sys-details}
{\bf w} = \begin{pmatrix}\rho Y \\ \rho \\ \rho {\bf v} \\ \rho E_r \\ \rho e_s \end{pmatrix}, \quad
{\bf g}({\bf w}) = \begin{pmatrix} \rho Y {\bf v}^\top \\ \rho {\bf v}^\top \\ \rho {\bf v}{\bf v}^\top+\mathrm{p}_r(\rho,e_r){\bf I} \\ \big(\rho E_r+\mathrm{p}_r(\rho,e_r)\big){\bf v}^\top \\ \rho e_s {\bf v}^\top \end{pmatrix}, \quad
{\bf w}-{\cal M}({\bf w}) = \begin{pmatrix} 0 \\ 0 \\ 0 \\ 0 \\ -\rho\big(e_s-F(Y,e_r)\big) \\ \rho\big(e_s-F(Y,e_r)\big) \end{pmatrix},$$ with $\epsilon>0$ the relaxation time scale, $e_r=E_r-\tfrac{{\bf v}\cdot{\bf v}}{2}$, and $$\label{eq:EOS-relax}
\mathrm{p_r}(\rho,e_r) = (\gamma-1)\rho e_r,$$ where $\gamma$ is defined by $$\label{eq:gamma-max}
\gamma>\max_{0\leq Y\leq1}\gamma(Y)\overset{\cref{eq:gamma-bound}}{=}\gamma_1 > 1.$$ and constitutes the subcharacteristic condition for \[eq:relax-nrj-HRM-sys\] to relax to an equilibrium as $\epsilon\downarrow0$ [@coquel_perthame_98]. Let ${\bf w}=\lim_{\epsilon\downarrow0}{\bf w}^\epsilon$, in this limit, one formally recovers \[eq:HRM\_PDEs-a\] with $$\label{eq:maxwellian-equ}
{\bf w} = {\cal M}({\bf w}), \quad {\bf u}={\cal L}{\bf w}:=(w_1,\dots,w_{d+2},w_{d+3}+w_{d+4})^\top, \quad {\bf f}({\bf u}) = {\cal L}{\bf g}({\cal P}({\bf u})),$$ and the prolongation operator ${\cal P}:\Omega^a\ni{\bf u}\mapsto{\cal P}({\bf u})=\big(\rho Y, \rho, \rho{\bf v}, \rho e_r(\rho,\mathrm{p})+\rho\tfrac{{\bf v}\cdot{\bf v}}{2},\rho\big(e-e_r(\rho,\mathrm{p})\big)\big)^\top$ in $\Omega^r$ with $e_r(\rho,\mathrm{p}_r)$ defined from \[eq:EOS-relax\] and $\mathrm{p}=\mathrm{p}(Y,\rho,e)$ defined from \[eq:mixture\_eos\]. The set of states for \[eq:relax-nrj-HRM-sys\] is $\Omega^r=\{{\bf w}\in\mathbb{R}^{d+4}:\; 0\leq Y\leq 1, \rho>0, e_r>0, e_s>0\}$. The equilibrium \[eq:maxwellian-equ\] corresponds to $$\label{eq:maxwellian-equ-hrm}
E = E_r + e_s, \quad e = e_r + e_s, \quad e_s = F(Y,e_r):=\frac{\gamma-\gamma(Y)}{\gamma(Y)-1}e_r,$$ where the expression for $F$ follows from the consistency relation on the pressure and \[eq:mixture\_eos-b\]: $\mathrm{p}\big(Y,\rho,e_r+F(Y,e_r)\big)=\mathrm{p}_r(\rho,e_r)$. Note that \[eq:relax-nrj-HRM-sys\] admits an entropy inequality for the following convex entropy associated with \[eq:EOS-relax\] [@coquel_perthame_98]: $$\label{eq:entropy-Sr}
\mathrm{s}_r(\rho,e_r) = -\big(\tfrac{e_r}{\rho^{\gamma-1}}\big)^{\frac{1}{\gamma}}. $$
Now, let $\tau=\tfrac{1}{\rho}$ be the covolume and introduce the following functions
\[eq:functions-zeta-R-E\] $$\begin{aligned}
\zeta(Y,\tau,e_r,e_s) &= -\mathrm{s}\big(Y,{\cal R}\big(Y,\mathrm{s}_r(\tfrac{1}{\tau},e_r),e_s\big),{\cal E}(Y,e_s)+e_s\big), \label{eq:functions-zeta-R-E-a} \\
{\cal E}(Y,e_s) &= \tfrac{\gamma(Y)-1}{\gamma-\gamma(Y)}e_s, \quad
{\cal R}(Y,\mathrm{s}_r,e_s) = \big(\tfrac{1}{(-\mathrm{s}_r)^\gamma}\tfrac{\gamma(Y)-1}{\gamma-\gamma(Y)}e_s\big)^{\frac{1}{\gamma-1}},\end{aligned}$$
where $\mathrm{s}$ is the mixture entropy \[eq:mixture\_entropy\] for the HRM system, the function ${\cal E}$ solves $e_s=F(Y,e_r)$ for $e_r$ with $F$ defined in \[eq:maxwellian-equ-hrm\], while ${\cal R}$ solves $\mathrm{s}_r=\mathrm{s}_r(\rho,{\cal E}(Y,e_s))$ for $\rho$ through \[eq:entropy-Sr\]. Using \[eq:mixture\_entropy,eq:functions-zeta-R-E\], we easily obtain
\[eq:zeta-delta-zeta\] $$\begin{aligned}
\zeta(Y,\tau,e_r,e_s) &= -\mathrm{s}(Y,\tfrac{1}{\tau},e_r+e_s) + \varsigma(Y,e_r,e_s), \\ \varsigma(Y,e_r,e_s) &= C_v(Y)\ln\Big(\tfrac{\gamma-\gamma(Y)}{\gamma-1}\tfrac{e_r+e_s}{e_s}\big(\tfrac{\gamma(Y)-1}{\gamma-\gamma(Y)}\tfrac{e_s}{e_r}\big)^{\frac{\gamma(Y)-1}{\gamma-1}}\Big).\end{aligned}$$
We now prove the following variational principle.
Under the assumption \[eq:gamma-max\], the function $\rho\zeta$ defined by \[eq:functions-zeta-R-E\] is a (non strictly) convex entropy for \[eq:relax-nrj-HRM-sys\] that satisfies the following variational principle: $$\label{eq:var-principle}
-\mathrm{s}(Y,\rho,e) = \min_{e_r+e_s=e}\{\zeta(Y,\tfrac{1}{\rho},e_r,e_s):\;0\leq Y\leq1, \rho>0, e_r>0, e_s>0\}.$$
First, from \[eq:functions-zeta-R-E-a\], one may rewrite $\zeta(Y,\tau,e_r,e_s)=\Sigma(Y,\mathrm{s}_r(\tfrac{1}{\tau},e_r),e_s)$, and for smooth solutions of \[eq:relax-nrj-HRM-sys\], we have $$\label{eq:entropy-ineq-rho-zeta}
\partial_t\rho^\epsilon\Sigma(Y^\epsilon,\mathrm{s}_r^\epsilon,e_s^\epsilon)+\nabla\cdot\big(\rho^\epsilon\Sigma(Y^\epsilon,\mathrm{s}_r^\epsilon,e_s^\epsilon){\bf v}^\epsilon\big) = \frac{1}{\epsilon}\rho^\epsilon(\partial_{\mathrm{s}_r}\Sigma\partial_{e_r}\mathrm{s}_{r}-\partial_{e_s}\Sigma)^\epsilon\big(e_s^\epsilon-F(Y^\epsilon,e_r^\epsilon)\big).$$
Now we observe that from \[eq:EOS-relax\] $\rho^\epsilon Y^\epsilon$ is uncoupled from other variables in \[eq:relax-nrj-HRM-sys\], thus $Y$ acts only as a frozen parameter in the definitions \[eq:maxwellian-equ-hrm,eq:functions-zeta-R-E\]. The pressure laws \[eq:mixture\_eos-b\] and \[eq:EOS-relax\] with \[eq:gamma-max\] thus satisfy the assumptions of Theorem 2.1 in [@coquel_perthame_98], so the RHS of \[eq:entropy-ineq-rho-zeta\] is negative. To prove that $\rho\zeta({\bf w})$ is convex it is sufficient to prove that $\zeta(Y,\tau,e_r,e_s)$ is convex [@godlewski-raviart chap. 2]. Using algebraic manipulations that are left to the reader, the Hessian of $\zeta$ reads $${\bf\cal H}_\zeta(Y,\tau,e_r,e_s) = \begin{pmatrix} \tfrac{\gamma'(Y)^2C_v(Y)}{(\gamma-\gamma(Y))(\gamma(Y)-1)}+\tfrac{C_v'(Y)^2}{C_v(Y)}+\tfrac{r'(Y)^2}{r(Y)} & -\tfrac{r'(Y)}{\tau} & -\tfrac{r'(Y)}{(\gamma-1)e_r} & \tfrac{r'(Y)-(\gamma-1)C_v'(Y)}{(\gamma-1)e_s} \\
-\tfrac{r'(Y)}{\tau} & \tfrac{r(Y)}{\tau^2} & 0 & 0 \\
-\tfrac{r'(Y)}{(\gamma-1)e_r} & 0 & \tfrac{r(Y)}{(\gamma-1)e_r^2} & 0 \\
\tfrac{r'(Y)-(\gamma-1)C_v'(Y)}{(\gamma-1)e_s} & 0 & 0 & \tfrac{C_v(Y)}{e_s^2}\big(1-\tfrac{\gamma(Y)-1}{\gamma-1}\big)
\end{pmatrix}$$
and it may be easily checked that the principal minors are all positive under the condition \[eq:gamma-max\] and that the determinant vanishes.
Then, we need to prove that $\varsigma$ in \[eq:zeta-delta-zeta\] is positive and vanishes at equilibrium \[eq:maxwellian-equ-hrm\] that constitutes a global minimum. Let us rewrite $\varsigma$ as $C_v(Y)\ln\big(f(\alpha,x)\big)$ with $f(\alpha,x)=\tfrac{(1-\alpha)(1+x)}{x}\big(\tfrac{\alpha x}{1-\alpha}\big)^\alpha$, $x=\tfrac{e_s}{e_r}>0$, and $\alpha=\tfrac{\gamma(Y)-1}{\gamma-1}$ in $(0,1)$ from \[eq:gamma-max\]. We have $\partial_xf(\alpha,x)=\tfrac{1-\alpha}{x^2}(\alpha x+\alpha-1)$, thus $\partial_xf(\alpha,x)<0$ for $0<x<x_{min}:=\tfrac{1-\alpha}{\alpha}$, $\partial_xf(\alpha,x)>0$ for $x>x_{min}$, and $\partial_xf(\alpha,x_{min})=0$. Since $f(\alpha,x_{min})=1$, $\varsigma$ vanishes at the global minimum $\alpha x_{min}=1-\alpha\Leftrightarrow \tfrac{\gamma(Y)-1}{\gamma-1}\tfrac{e_s}{e_r}=1-\tfrac{\gamma(Y)-1}{\gamma-1}$ which indeed corresponds to the equilibrium \[eq:maxwellian-equ-hrm\]: $e_s=F(Y,e_r)$.
Entropy stability through relaxation
------------------------------------
The interest in considering the relaxation system \[eq:relax-nrj-HRM-sys\] is that it is possible to derive an entropy stable and consistent numerical flux for \[eq:HRM\_PDEs-a\] from another relaxation based entropy stable and consistent numerical flux for \[eq:relax-nrj-HRM-sys\]. One of these numerical fluxes is the approximate Riemann solver from [@bouchut_04 Prop. 2.21] based on pressure relaxation and introduced in \[sec:bouchut\_flux\]. The associated numerical scheme reads $$\label{eq:3pt-scheme-relax}
{\bf W}_j^{n+1}-{\bf W}_j^{n} + \tfrac{\Delta t}{\Delta x}\big({\bf H}({\bf W}_{j}^{n},{\bf W}_{j+1}^{n},{\bf n})-{\bf H}({\bf W}_{j-1}^{n},{\bf W}_{j}^{n},{\bf n})\big) = 0, $$ with ${\bf H}({\bf w},{\bf w},{\bf n})={\bf g}({\bf w})\cdot{\bf n}$. The numerical flux ${\bf H}(\cdot,\cdot,\cdot)$ solves the exact Riemann problem for the pressure relaxation system [@bouchut_04 Sec. 2.4.6] containing only LD fields and, under the CFL condition \[eq:3-pt-CFL\_cond\], we have $$\label{eq:3pt-scheme-equal-relax}
\rho\zeta({\bf W}_j^{n+1}) \leq \langle\rho\zeta(\bcW_h^{n+1})\rangle_j=\rho\zeta({\bf W}_j^{n}) - \tfrac{\Delta t}{\Delta x}\big(Z({\bf W}_{j}^{n},{\bf W}_{j+1}^{n},{\bf n})-Z({\bf W}_{j-1}^{n},{\bf W}_{j}^{n},{\bf n})\big), $$ with $Z({\bf w},{\bf w},{\bf n})=\rho\zeta{\bf v}\cdot{\bf n}$, $\langle\cdot\rangle_j$ the cell average, and $\bcW_h^{n+1}(\cdot)$ is the exact solution resulting from local Riemann problems at mesh interfaces of the pressure based relaxation system [@bouchut_04 Sec. 2.4.6] associated to ${\bf W}_{j\in\mathbb{Z}}^{n}$ as initial condition (with some slight abuse). The equality in \[eq:3pt-scheme-equal-relax\] results from the fact that the pressure relaxation system contains only LD fields and [@godlewski-raviart Th. 5.3], while the inequality follows from relaxation, then cell-averaging the exact solution via a Jensen’s inequality.
\[th:ES-3-pt-scheme\] Consider the three-point numerical scheme \[eq:3pt-scheme-relax\] for \[eq:relax-nrj-HRM-sys\] satisfying \[eq:3pt-scheme-equal-relax\] with consistent numerical fluxes. Then, the three-point numerical scheme \[eq:3pt-scheme-a\] with the consistent numerical flux ${\bf h}({\bf u}^-,{\bf u}^+,{\bf n})={\cal L}{\bf H}\big({\cal P}({\bf u}^-),{\cal P}({\bf u}^+),{\bf n}\big)$ is entropy stable for the pair $(\eta,{\bf q})$ in \[eq:entropy\_ineq\_cont\] and satisfies \[eq:3pt-scheme-ineq\] with $Q({\bf u}^-,{\bf u}^+,{\bf n})=Z\big({\cal P}({\bf u}^-),{\cal P}({\bf u}^+),{\bf n}\big)$.
By consistency of ${\bf H}$: ${\bf h}({\bf u},{\bf u},{\bf n})={\cal L}{\bf H}\big({\cal P}({\bf u}),{\cal P}({\bf u}),{\bf n}\big)={\cal L}{\bf g}({\cal P}({\bf u}))\cdot{\bf n}\overset{\cref{eq:maxwellian-equ}}{=}{\bf f}({\bf u})\cdot{\bf n}$. Then, let ${\bf W}_{j}^{n}={\cal P}({\bf U}_{j}^{n})$ so $\rho\zeta({\bf W}_{j}^{n})=\eta({\bf U}_{j}^{n})$ and $Z({\bf W}_{j}^{n},{\bf W}_{j+1}^{n},{\bf n})=Q({\bf U}_{j}^{n},{\bf U}_{j+1}^{n},{\bf n})$, and define ${\bf W}_{j}^{n+1}$ from \[eq:3pt-scheme-relax\] and ${\bf U}_{j}^{n+1}={\cal L}{\bf W}_{j}^{n+1}$. By the variational principle \[eq:var-principle\] and Jensen’s inequality:$$\langle\rho\zeta(\bcW_h^{n+1})\rangle_j \overset{\cref{eq:var-principle}}{\geq} \langle\eta({\cal L}\bcW_h^{n+1})\rangle_j \geq \eta(\langle{\cal L}\bcW_h^{n+1}\rangle_j) = \eta({\bf U}_j^{n+1}),$$ from which we deduce $$\begin{aligned}
\eta({\bf U}_j^{n+1}) &\overset{\cref{eq:3pt-scheme-equal-relax}}{\leq}& \rho\zeta({\bf W}_j^{n}) - \tfrac{\Delta t}{\Delta x}\big(Z({\bf W}_{j}^{n},{\bf W}_{j+1}^{n},{\bf n})-Z({\bf W}_{j-1}^{n},{\bf W}_{j}^{n},{\bf n})\big) \\
&=& \rho\zeta\big({\cal P}({\bf U}_j^{n})\big) - \tfrac{\Delta t}{\Delta x}\Big(Z\big({\cal P}({\bf U}_{j}^{n}),{\cal P}({\bf U}_{j+1}^{n}),{\bf n}\big)-Z\big({\cal P}({\bf U}_{j-1}^{n}),{\cal P}({\bf U}_{j}^{n}),{\bf n}\big)\Big) \\
&=& \eta({\bf U}_j^{n}) - \tfrac{\Delta t}{\Delta x}\big(Q({\bf U}_{j}^{n},{\bf U}_{j+1}^{n},{\bf n})-Q({\bf U}_{j-1}^{n},{\bf U}_{j}^{n},{\bf n})\big),\end{aligned}$$ which concludes the proof.
Entropy stable and positive three-point scheme {#sec:bouchut_flux}
----------------------------------------------
We here introduce a numerical flux that leads to an entropy stable three-point scheme for the relaxation system \[eq:relax-nrj-HRM-sys\]. Such numerical flux defines an entropy stable scheme for the HRM system \[eq:HRM\_PDEs-a\] as stated in .
Let us consider the following numerical flux based on relaxation of pressure [@bouchut_04 Prop. 2.21]: $$\label{eq:relax_flux}
{\bf h}({\bf u}^-,{\bf u}^+,{\bf n}) = {\bf f}\big(\bcW^{r}(0;{\bf u}^-,{\bf u}^+,{\bf n})\big)\cdot{\bf n},$$ where the Riemann solver $\bcW^r(\cdot;{\bf u}_L,{\bf u}_R,{\bf n})$ is used to approximate the solution to \[eq:HRM\_PDEs\] in the direction ${\bf n}$ with initial data, ${\bf u}_0(x) = {\bf u}_L$ if $x:={\bf x}\cdot{\bf n}<0$ and ${\bf u}_0(x) = {\bf u}_R$ if ${\bf x}\cdot{\bf n}>0$, and reads $$\label{eq:relax-ARS-xt}
\bcW^{r}(\tfrac{x}{t};{\bf u}_L,{\bf u}_R,{\bf n}) = \left\{ \begin{array}{ll} {\bf u}_L, & \tfrac{x}{t}\leq S_L, \\
{\bf u}_L^\star, & S_L<\tfrac{x}{t}<u^\star,\\
{\bf u}_R^\star, & u^\star<\tfrac{x}{t}<S_R,\\
{\bf u}_R, & S_R\leq \tfrac{x}{t}, \end{array} \right.$$ where ${\bf u}_L^\star=(\rho_L^\star Y_L,\rho_L^\star,\rho_L^\star {\bf v}_L^\star,\rho_L^\star E_L^\star)^\top$, ${\bf u}_R^\star=(\rho_R^\star Y_R,\rho_R^\star,\rho_R^\star{\bf v}_R^\star,\rho_R^\star E_R^\star)^\top$, and
\[eq:sol-PR-relax\] $$\begin{aligned}
{\bf v}_L^\star &= {\bf v}_L+(u^\star-u_L){\bf n}, \quad {\bf v}_R^\star = {\bf v}_R+(u^\star-u_R){\bf n}, \label{eq:sol-PR-relax-a} \\
u^\star &= \frac{a_Lu_L+a_Ru_R+\mathrm{p}_L-\mathrm{p}_R}{a_L+a_R}, \quad \mathrm{p}^\star = \frac{a_R\mathrm{p}_L+a_L\mathrm{p}_R+a_La_R(u_L-u_R)}{a_L+a_R}, \\
\tau_L^\star &= \tau_L + \frac{u^\star-u_L}{a_L},\quad \tau_R^\star = \tau_R + \frac{u_R-u^\star}{a_R}, \\
E_L^\star &= E_L - \frac{\mathrm{p}^\star u^\star - \mathrm{p}_Lu_L}{a_L},\quad E_R^\star = E_R - \frac{\mathrm{p}_Ru_R-\mathrm{p}^\star u^\star}{a_R},\end{aligned}$$
where $u_X={\bf v}_X\cdot{\bf n}$ and $\mathrm{p}_X=\mathrm{p}(Y_X,\rho_X,e_X)$ defined by \[eq:mixture\_eos-b\] for $X=L,R$; \[eq:sol-PR-relax-a\] corresponds to a decomposition into normal, $u_X$, and tangential, ${\bf v}_X-u_X{\bf n}$, components of the velocity vector.
The wave speeds are evaluated from $S_L=u_L-a_L/\rho_L$ and $S_R=u_R+a_R/\rho_R$ where the approximate Lagrangian sound speeds [@bouchut_04] are defined by
\[eq:wave-estimate\] $$\begin{aligned}
\left\{ \begin{array}{rcl} \tfrac{a_L}{\rho_L} &=& c_\gamma(\rho_L,\mathrm{p}_L) + \tfrac{\gamma+1}{2}\Big(\tfrac{\mathrm{p}_R-\mathrm{p}_L}{\rho_Rc_\gamma(\rho_R,\mathrm{p}_R)}+u_L-u_R\Big)^+ \\
\tfrac{a_R}{\rho_R} &=& c_\gamma(\rho_R,\mathrm{p}_R) + \tfrac{\gamma+1}{2}\Big(\tfrac{\mathrm{p}_L-\mathrm{p}_R}{a_L}+u_L-u_R\Big)^+
\end{array}\right., & \quad \mbox{if } \mathrm{p}_R \geq \mathrm{p}_L, \\
\left\{ \begin{array}{rcl} \tfrac{a_R}{\rho_R} &=& c_\gamma(\rho_R,\mathrm{p}_R) + \tfrac{\gamma+1}{2}\Big(\tfrac{\mathrm{p}_L-\mathrm{p}_R}{\rho_Lc_\gamma(\rho_L,\mathrm{p}_L)}+u_L-u_R\Big)^+ \\
\tfrac{a_L}{\rho_L} &=& c_\gamma(\rho_L,\mathrm{p}_L) + \tfrac{\gamma+1}{2}\Big(\tfrac{\mathrm{p}_R-\mathrm{p}_L}{a_R}+u_L-u_R\Big)^+
\end{array}\right., & \quad \mbox{else,} \end{aligned}$$
where $(\cdot)^+=\max(\cdot,0)$ denotes the positive part and $c_\gamma(\rho,\mathrm{p})=\sqrt{\gamma\mathrm{p}/\rho}$ with $\gamma$ defined by \[eq:gamma-max\].
\[th:ES-relax-flux\] The numerical flux \[eq:relax\_flux\] for \[eq:HRM\_PDEs-a\] defined by \[eq:relax-ARS-xt\], \[eq:sol-PR-relax\] and \[eq:wave-estimate\] is entropy stable in the sense \[eq:entropy\_stable\_flux\] for the pair \[eq:HRM\_entropy\_pair\]. Moreover, the associated three-point scheme \[eq:3pt-scheme-a\] preserves the invariant domain \[eq:HRM-set-of-states\] under the condition $$\label{eq:3-pt-CFL_cond}
\tfrac{\Delta t}{\Delta x}\max_{j\in\mathbb{Z}}|\lambda({\bf U}_j^{n})| < \frac{1}{2}, \quad |\lambda({\bf u})| := |{\bf v}\cdot{\bf n}|+\tfrac{a}{\rho}.
$$
By applying [@bouchut_04 Prop. 2.21], one defines from \[eq:relax-ARS-xt\], \[eq:sol-PR-relax\] and \[eq:wave-estimate\] an entropy stable three-point scheme \[eq:3pt-scheme-relax,eq:3pt-scheme-equal-relax\] for the relaxation system \[eq:relax-nrj-HRM-sys\] since $\rho Y$ and $\rho e_s$ are only purely advected in \[eq:relax-nrj-HRM-sys\]. The associated approximate Riemann solver uses the intermediate states ${\bf w}_{X}^\star=(\rho_X^\star Y_X,\rho_X^\star,\rho_X^\star{\bf v}_X^\star,\rho_X^\star E_{r,X}^\star,\rho_X^\star e_{s,X})^\top$ with $X=L,R$. Condition \[eq:gamma-max\] and \[th:ES-3-pt-scheme\] ensure that one deduces a three-point numerical scheme for \[eq:HRM\_PDEs-a\] that is entropy stable for $(\eta,{\bf q})$ in \[eq:entropy\_ineq\_cont\] and satisfies \[eq:3pt-scheme-ineq\]. We then conclude by applying \[th:ESF\_3pt-scheme\] and \[eq:relax\_flux\] is obtained by summing the two last components of the numerical flux for \[eq:relax-nrj-HRM-sys\].
Positivity for density and internal energy under \[eq:3-pt-CFL\_cond\] follows again from [@bouchut_04 Prop. 2.21]. Note that the intermediate states for $Y$ in \[eq:sol-PR-relax\] are $Y_L$ and $Y_R$. The approximate Riemann solver thus preserves the invariant domain for $Y$, so the three-point scheme since from \[eq:relax\_flux,eq:relax-ARS-xt\] $\rho Y_j^{n+1}$ is the cell-average of exact solutions to local Riemann problems at interfaces.
DGSEM formulation {#sec:DG_discr}
=================
The DG method consists in defining a semi-discrete weak formulation of problem \[eq:HRM\_PDEs\]. The domain is discretized with a shape-regular mesh $\Omega_h\subset\mathbb{R}^d$ consisting of nonoverlapping and nonempty cells $\kappa$. By ${\cal E}$ we define the set of interfaces in $\Omega_h$. For the sake of clarity, we introduce the DGSEM in two space dimensions $d=2$, the extension (resp. restriction) to $d=3$ (resp. $d=1$) being straightforward.
Numerical solution
------------------
We look for approximate solutions in the function space of discontinuous polynomials ${\cal V}_h^p=\{\phi\in L^2(\Omega_h):\;\phi|_{\kappa}\circ{\bf x}_\kappa\in{\cal Q}^p(I^2)\; \forall\kappa\in\Omega_h\}$, where ${\cal Q}^p(I^2)$ denotes the space of functions over the master element $I^2:=\{\bxi=(\xi,\eta):\;-1\leq\xi,\eta\leq1\}$, formed by tensor products of polynomials of degree at most $p$ in each direction. Each physical element $\kappa$ is the image of $I^2$ through the mapping ${\bf x}_\kappa={\bf x}_\kappa(\bxi)$. Likewise, each face in ${\cal E}$ is the image of $I=[-1,1]$ through the mapping ${\bf x}_e={\bf x}_e(\xi)$. The approximate solution to \[eq:HRM\_PDEs\] is sought under the form $$\label{eq:num_sol}
{\bf u}_h({\bf x},t)=\sum_{0\leq i,j\leq p}\phi_\kappa^{ij}({\bf x}){\bf U}_\kappa^{ij}(t) \quad \forall{\bf x}\in\kappa,\, \kappa\in\Omega_h,\, \forall t\geq0,$$ where $({\bf U}_\kappa^{ij})_{0\leq i,j\leq p}$ are the degrees of freedom (DOFs) in the element $\kappa$. The subset $(\phi_\kappa^{ij})_{0\leq i,j\leq p}$ constitutes a basis of ${\cal V}_h^p$ restricted onto the element $\kappa$ and $(p+1)^2$ is its dimension.
Let $(\ell_k)_{0\leq k\leq p}$ be the Lagrange interpolation polynomials in one space dimension associated to the Gauss-Lobatto nodes over $I$: $\xi_0=-1<\xi_1<\dots<\xi_p=1$: $$\label{eq:lagrange_poly}
\ell_k(\xi_l)=\delta_{k,l}, \quad 0\leq k,l \leq p,$$ with $\delta_{k,l}$ the Kronecker symbol. In this work we use tensor products of these polynomials and of Gauss-Lobatto nodes (see \[fig:stencil\_2D\]): $$\label{eq:lag_basis}
\phi_\kappa^{ij}({\bf x})=\phi^{ij}({\bf x}_\kappa(\bxi))=\ell_i(\xi)\ell_j(\eta), \quad 0\leq i,j\leq p.$$ which satisfy the following relation at quadrature points $\bxi_{i'j'}=(\xi_{i'},\xi_{j'})\in I^2$: $$\label{eq:lag_basis_card}
\phi_\kappa^{ij}({\bf x}_\kappa^{i'j'})=\delta_{i,i'}\delta_{j,j'}, \quad 0\leq i,j,i',j' \leq p, \quad {\bf x}_\kappa^{i'j'}:={\bf x}_\kappa(\bxi_{i'j'}),$$ so the DOFs correspond to the point values of the solution: ${\bf U}_\kappa^{ij}(t)={\bf u}_h({\bf x}_\kappa^{ij},t)$.
![Inner and outer elements, $\kappa^-$ and $\kappa^+$, for $d=2$; definitions of traces ${\bf u}_h^\pm$ on the interface $e$ and of the unit outward normal vector ${\bf n}_e$; positions of quadrature points in $\kappa^-$ and on $e$ for $p=3$.[]{data-label="fig:stencil_2D"}](stencil_2D_quads_with_GP_reverse_KpKm.pdf){width="6cm"}
Let introduce the discrete derivative matrix of the Lagrange polynomials in $I$ with entries $$\label{eq:nodalGL_diff_matrix}
D_{kl} = \ell_l'(s_k), \quad 0\leq k,l \leq p.$$
In the DGSEM, the integrals over elements and faces are approximated by using the Gauss-Lobatto quadrature rule so the quadrature and interpolation nodes are collocated: $$\label{eq:GaussLobatto_quad}
\int_{\kappa}f({\bf x})dV \simeq \sum_{0\leq i,j\leq p} \omega_i\omega_j J_\kappa^{ij}f({\bf x}_\kappa^{ij}), \quad \int_{e} f({\bf x})dS \simeq \sum_{0\leq k \leq p} \omega_k \tfrac{|e|}{2}f({\bf x}_e^{k}),$$ with $\omega_l>0$ and ${\bf x}_\kappa^{ij}$ the weights and nodes of the quadrature rule, and $J_\kappa^{ij}=\det\big(\partial_\bxi{\bf x}_\kappa(\bxi_{ij})\big)>0$. Note that we will use cell-averaged quantities, for instance for the numerical solution $$\label{eq:cell-average}
\frac{1}{|\kappa|}\int_{\kappa} {\bf u}_h({\bf x},t) dV \simeq \langle{\bf u}_h\rangle_\kappa(t) := \sum_{1\leq i,j\leq p}\omega_i\omega_j\tfrac{J_\kappa^{ij}}{|\kappa|}{\bf U}_\kappa^{ij}(t),$$ where $|\kappa|$ is evaluated through numerical quadrature so the weights satisfy $$\label{eq:2d-weights-cond}
\sum_{1\leq i,j\leq p}\omega_i\omega_j\tfrac{J_\kappa^{ij}}{|\kappa|}=1. $$
Space discretization
--------------------
The semi-discrete form of the DGSEM in space of problem \[eq:HRM\_PDEs\] starts from the following problem: find ${\bf u}_h$ in $({\cal V}_h^p)^{d+3}$ such that $$\begin{aligned}
\int_{\Omega_h} v_h \partial_t{\bf u_h} dV &+ \sum_{\kappa\in\Omega_h}\int_{\kappa}v_h\nabla\cdot{\bf f}({\bf u}_h) dV\nonumber\\
&- \int_{{\cal E}}\du v_h\df{\bf h}({\bf u}_h^-,{\bf u}_h^+,{\bf n})-\du v_h{\bf f}({\bf u}_h)\df\cdot{\bf n} dS = 0 \quad \forall v_h\in{\cal V}_h^p, t>0, \label{eq:semi-discr_var_form}\end{aligned}$$ where $\du v_h\df=v_h^+-v_h^-$ denotes the jump operator and $v_h^\pm({\bf x })=\lim_{\epsilon\downarrow0}v_h({\bf x }\pm\epsilon{\bf n})$ are the traces of $v_h$ at a point ${\bf x}$ on ${\cal E}$ and ${\bf n}$ denotes the unit normal vector to an interface $e$ in ${\cal E}$. The entropy stable relaxation-based numerical flux \[eq:relax\_flux\] is used to define ${\bf h}(\cdot,\cdot,\cdot)$. Substituting $v_h$ for the Lagrange interpolation polynomials \[eq:lag\_basis\] and using the Gauss-Lobatto quadrature rules \[eq:GaussLobatto\_quad\] to approximate the volume and surface integrals, \[eq:semi-discr\_var\_form\] becomes: for all $\kappa\in\Omega_h$, $0\leq i,j\leq p$, and $t>0$, we have $$\begin{aligned}
\omega_i\omega_j J_\kappa^{ij}\frac{d{\bf U}_\kappa^{ij}}{dt} &+ \omega_i\omega_j J_\kappa^{ij} \Big(\sum_{k=0}^p D_{ik}{\bf f}({\bf U}_\kappa^{kj})\nabla\xi(\bxi_{ij})+\sum_{k=0}^p D_{jk}{\bf f}({\bf U}_\kappa^{ik})\nabla\eta(\bxi_{ij})\Big) \\
&+ \omega_i\Big(J_{e}^{ip}\delta_{jp}{\bf d}({\bf x}_\kappa^{ip},t)+J_{e}^{i0}\delta_{j0}{\bf d}({\bf x}_\kappa^{i0},t)\Big) + \omega_j\Big(J_{e}^{pj}\delta_{ip}{\bf d}({\bf x}_\kappa^{pj},t)+J_{e}^{0j}\delta_{i0}{\bf d}({\bf x}_\kappa^{0j},t)\Big) = 0, $$ where ${\bf d}({\bf x},t)={\bf h}\big({\bf u}_h^{-}({\bf x},t),{\bf u}_h^{+}({\bf x},t),{\bf n}_e({\bf x})\big)-{\bf f}\big({\bf u}_h^{-}({\bf x},t)\big)\cdot{\bf n}_e({\bf x})$ denotes the numerical flux in fluctuation form at point ${\bf x}$ on an interface $e$, ${\bf n}_e$ is the unit outward normal vector at $e$, ${\bf u}_h^\pm({\bf x},t)$ denote the traces of the numerical solution on $e$ (see Figure \[fig:stencil\_2D\]), and $J_{e}^{ip}:=\det(\partial_\xi{\bf x}_e)_{{\bf x}_\kappa^{ip}}$ where ${\bf x}_\kappa^{ip}$, $0\leq i\leq p$, uniquely identify $e$.
As explained in the introduction, the volume integral in the above equation is modified so as to satisfy an entropy balance [@fisher_carpenter_13; @wintermeyer_etal_17]. The semi-discrete entropy stable scheme thus reads $$\label{eq:semi-discr_DGSEM}
\omega_i\omega_j J_\kappa^{ij}\frac{d{\bf U}_\kappa^{ij}}{dt} + {\bf R}_\kappa^{ij}({\bf u}_h) = 0 \quad \forall\kappa\in\Omega_h,\; 0\leq i,j\leq p,\; t>0,$$ with $$\begin{aligned}
{\bf R}_\kappa^{ij}({\bf u}_h) &= 2\omega_i\omega_j\Big(\sum_{k=0}^p D_{ik}{\bf h}_{ec}\big({\bf U}_\kappa^{ij},{\bf U}_\kappa^{kj},\{J_\kappa\nabla\xi\}_{(i,k)j}\big) + \sum_{k=0}^p D_{jk}{\bf h}_{ec}\big({\bf U}_\kappa^{ij},{\bf U}_\kappa^{ik},\{J_\kappa\nabla\eta\}_{i(j,k)}\big)\Big) \nonumber \\
&+ \omega_i\Big(J_{e}^{ip}\delta_{jp}{\bf d}({\bf x}_\kappa^{ip},t)+J_{e}^{i0}\delta_{j0}{\bf d}({\bf x}_\kappa^{i0},t)\Big) + \omega_j\Big(J_{e}^{pj}\delta_{ip}{\bf d}({\bf x}_\kappa^{pj},t)+J_{e}^{0j}\delta_{i0}{\bf d}({\bf x}_\kappa^{0j},t)\Big), \label{eq:semi-discr_DGSEM-res}
$$ where $\{J_\kappa\nabla\xi\}_{(i,k)j}=\tfrac{1}{2}\big(J_\kappa^{ij}\nabla\xi(\bxi_{ij})+J_\kappa^{kj}\nabla\xi(\bxi_{kj})\big)$, $\{J_\kappa\nabla\eta\}_{i(j,k)}=\tfrac{1}{2}\big(J_\kappa^{ij}\nabla\eta(\bxi_{ij})+J_\kappa^{ik}\nabla\eta(\bxi_{ik})\big)$, and ${\bf h}_{ec}(\cdot,\cdot,\cdot)$ denotes the entropy conservative numerical flux \[eq:EC\_flux\].
The works in [@fisher_carpenter_13; @winters_etal_16; @wintermeyer_etal_17] showed that \[eq:semi-discr\_DGSEM\] is conservative, high-order accurate and satisfies the semi-discrete entropy inequality for the cell-averaged entropy $\langle\eta({\bf u}_h)\rangle_\kappa$: $$\label{eq:mean_DGSEM}
|\kappa|\frac{d\langle\eta({\bf u}_h)\rangle_\kappa}{dt}+\sum_{e\in\partial\kappa}\sum_{k=0}^p\omega_kJ_e({\bf x}_e^{k})Q\big({\bf u}_h^-({\bf x}_e^{k},t),{\bf u}_h^+({\bf x}_e^{k},t),{\bf n}_e\big) \leq 0,$$ where $Q(\cdot,\cdot,\cdot)$ denotes the numerical flux in \[eq:3pt-scheme-ineq\].
Fully discrete scheme {#sec:scheme_properties}
=====================
We now focus on the fully discrete scheme and we first use a one-step first-order explicit time discretization and analyze its properties. High-order time integration will be done by using strong-stability preserving explicit Runge-Kutta methods [@shu-osher88] that keeps the properties of the first-order in time scheme under some condition on the time step. We restrict the present analysis to meshes with straight-sided cells.
Time discretization
-------------------
Let $t^{(n)}=n\Delta t$, with $\Delta t>0$ the time step, and use the notations ${\bf u}_h^{(n)}(\cdot)={\bf u}_h(\cdot,t^{(n)})$ and ${\bf U}_\kappa^{ij,n}={\bf U}_\kappa^{ij}(t^{(n)})$. The fully discrete DGSEM scheme for \[eq:HRM\_PDEs\] reads $$\label{eq:fully-discr_DGSEM}
J_\kappa^{ij} \omega_i\omega_j\frac{{\bf U}_\kappa^{ij,n+1}-{\bf U}_\kappa^{ij,n}}{\Delta t} + {\bf R}_\kappa^{ij}({\bf u}_h^{(n)}) = 0 \quad \forall \kappa\in\Omega_h, \; 0\leq i,j\leq p, \; n\geq 0,$$ where the vector of residuals ${\bf R}_\kappa^{ij}(\cdot)$ is defined by \[eq:semi-discr\_DGSEM-res\]. The projection of the initial condition \[eq:HRM\_PDEs-b\] onto the function space reads ${\bf U}_\kappa^{ij,0} = {\bf u}_0({\bf x}_\kappa^{ij})$ for all $\kappa$ in $\Omega_h$ and $0\leq i,j\leq p$.
Properties of the discrete scheme {#sec:ana_1st_order_time_discr}
---------------------------------
We have the following results for the fully discrete solution of the DGSEM that guaranty its positivity and the sharp resolution of contacts in the sense of [@hll_83; @coquel_perthame_98]. Note that we have $J_e\equiv\tfrac{|e|}{2}$ for straight-sided elements.
\[th:pos\_DG\_BN\] Let $n\geq0$ and assume that ${\bf U}_{\kappa}^{ij,n}$ is in $\Omega^a$ for all $0\leq i,j\leq p$ and $\kappa$ in $\Omega_h$, then under the CFL condition $$\label{eq:CFL_cond}
\Delta t\max_{\kappa\in\Omega_h}\max_{e\in{\cal E}}\tfrac{|\partial\kappa_e|}{|e|}\max_{0\leq k\leq p}\tfrac{|\partial\kappa|}{\tilde{J}_\kappa^k}\big|\lambda\big({\bf u}_h^\pm({\bf x}_e^{k},t^{(n)})\big)\big| < \frac{1}{2p(p+1)},
$$ where $\tilde{J}_\kappa^k:=\min_{e\in\partial\kappa}J_\kappa({\bf x}_e^k)$, $|\lambda(\cdot)|$ is defined in \[eq:3-pt-CFL\_cond\] and $\kappa=\cup_{e\in\partial\kappa}\kappa_e$ in \[th:positive-2D-FVO2-scheme\], we have $$\label{eq:pos_rho_alpha}
\langle{\bf u}_h^{(n+1)}\rangle_\kappa\in\Omega^a \quad \forall\kappa\in\Omega_h.$$ Moreover, the scheme exactly resolves stationary contact discontinuities at interpolation points.
The positivity of the solution at time $t^{(n+1)}$ relies on techniques introduced in [@perthame_shu_96; @zhang_shu_10b] to rewrite a conservative high-order scheme for the cell-averaged solution as a convex combination of positive quantities. First, consider the three-point scheme \[eq:3pt-scheme-a\] with the relaxation-based entropy stable numerical flux \[eq:relax\_flux\]. We know by \[th:ES-relax-flux\] that this scheme preserves the invariant domain \[eq:HRM-set-of-states\] under the CFL condition \[eq:3-pt-CFL\_cond\]. The finite volume scheme \[eq:2D-FVO2-scheme\] on quadrangles will thus be also positive under the condition \[eq:CFL-positive-2D-FVO2-scheme\] where $|\lambda(\cdot)|$ is defined in \[eq:3-pt-CFL\_cond\] and $\alpha_{max}=\tfrac{1}{2}$.
Now summing \[eq:fully-discr\_DGSEM\] over $0\leq i,j\leq p$ gives for the cell-averaged solution $$\begin{aligned}
\langle{\bf u}_h^{(n+1)}\rangle_\kappa &\overset{\cref{eq:fully-discr_DGSEM}}{=}& \langle{\bf u}_h^{(n)}\rangle_\kappa -\tfrac{\Delta t}{|\kappa|}\sum_{0\leq i,j\leq p}{\bf R}_\kappa^{ij}({\bf u}_h^{(n)}) \\
&\overset{\cref{eq:semi-discr_DGSEM-res}}{=}& \langle{\bf u}_h^{(n)}\rangle_\kappa - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa}\sum_{k=0}^p\omega_k\tfrac{|e|}{2}{\bf h}\big({\bf u}_h^-({\bf x}_e^{k},t^{(n)}),{\bf u}_h^+({\bf x}_e^{k},t^{(n)}),{\bf n}_e\big). $$ Using \[eq:cell-average\], $\sum_{e\in\partial\kappa}\tfrac{|e|}{|\partial\kappa|}=1$, and $\omega_0=\omega_p=\tfrac{2}{p(p+1)}$, we rewrite the above relation as $$\begin{aligned}
\langle{\bf u}_h^{(n+1)}\rangle_\kappa &= \sum_{e\in\partial\kappa}\tfrac{|e|}{|\partial\kappa|}\sum_{0\leq i,j\leq p}\omega_i\omega_j\tfrac{J_\kappa^{ij}}{|\kappa|}{\bf U}_\kappa^{ij,n} - \tfrac{\Delta t}{|\kappa|}\sum_{e\in\partial\kappa}\sum_{k=0}^p\omega_k\tfrac{|e|}{2}{\bf h}\big({\bf u}_h^-({\bf x}_e^{k},t^{(n)}),{\bf u}_h^+({\bf x}_e^{k},t^{(n)}),{\bf n}_e\big) \\
&= \sum_{e\in\partial\kappa}\sum_{0\leq i,j\leq p}\tfrac{|e|}{|\partial\kappa|}\omega_i\omega_j\tfrac{J_\kappa^{ij}}{|\kappa|}{\bf U}_\kappa^{ij,n} - \sum_{e\in\partial\kappa}\sum_{k=0}^p\tfrac{|e|}{|\partial\kappa|}\omega_k\omega_0\tfrac{\tilde{J}_\kappa^k}{|\kappa|}{\bf u}_h^{-}({\bf x}_e^{k},t^{(n)}) \\
&+ \sum_{k=0}^p\omega_k\omega_0\tfrac{\tilde{J}_\kappa^k}{|\kappa|}\Big(\sum_{e\in\partial\kappa}\tfrac{|e|}{|\partial\kappa|}{\bf u}_h^-({\bf x}_e^{k},t^{(n)})-\tfrac{\Delta t}{2\omega_0\tilde{J}_\kappa^k}\sum_{e\in\partial\kappa}|e|{\bf h}\big({\bf u}_h^-({\bf x}_e^{k},t^{(n)}),{\bf u}_h^+({\bf x}_e^{k},t^{(n)}),{\bf n}_e\big)\Big), \\
&= \sum_{e\in\partial\kappa}\sum_{0\leq i,j\leq p,{\bf x}_\kappa^{ij}\notin e}\tfrac{|e|}{|\partial\kappa|}\tfrac{\omega_i\omega_jJ_\kappa^{ij}}{|\kappa|}{\bf U}_\kappa^{ij,n} + \sum_{e\in\partial\kappa}\sum_{k=0}^p\tfrac{|e|}{|\partial\kappa|}\omega_k\omega_0\tfrac{J_\kappa({\bf x}_e^k)-\tilde{J}_\kappa^k}{|\kappa|}{\bf u}_h^-({\bf x}_e^{k},t^{(n)}) \\
&+ \sum_{e\in\partial\kappa}\sum_{k=0}^p\tfrac{|e|}{|\partial\kappa|}\tfrac{\omega_k\omega_0\tilde{J}_\kappa^k}{|\kappa|}\Big(\sum_{e\in\partial\kappa}\!\!\tfrac{|e|{\bf u}_h^-({\bf x}_e^{k},t^{(n)})}{|\partial\kappa|} -\tfrac{\Delta t}{2\omega_0\tilde{J}_\kappa^k}\sum_{e\in\partial\kappa}\!\!|e|{\bf h}\big({\bf u}_h^-({\bf x}_e^{k},t^{(n)}),{\bf u}_h^+({\bf x}_e^{k},t^{(n)}),{\bf n}_e\big)\Big),\end{aligned}$$ where we have used the fact that the traces ${\bf u}_h^{-}({\bf x}_e^{k})$ correspond to some DOF ${\bf U}_\kappa^{ij}$ that share the edge $e$ (see Figure \[fig:stencil\_2D\]). The terms in brackets correspond to the RHS in \[eq:2D-FVO2-scheme\] and are therefore positive under the condition \[eq:CFL\_cond\]. We thus conclude that $\langle{\bf u}_h^{(n+1)}\rangle_\kappa$ is a convex combination of positive quantities with weights $\tfrac{|e|}{|\partial\kappa|}\omega_i\omega_jJ$ with $J=J_\kappa^{ij}$, $\tilde{J}_\kappa^k$, or $J_\kappa({\bf x}_e^k)-\tilde{J}_\kappa^k$.
Finally, assume that the initial condition consists in a stationary contact discontinuity with states $Y_L,\rho_L,{\bf v}=0,$ and $\mathrm{p}$ in $\Omega_L$ and $Y_R,\rho_R,{\bf v}=0$, and $\mathrm{p}$ in $\Omega_R$ with $\ol{\Omega_L}\cup\ol{\Omega_R}=\ol{\Omega}$, then so do the DOFs. The numerical fluxes \[eq:EC\_flux\] and \[eq:relax\_flux\] reduce to ${\bf h}_{ec}({\bf u}^-,{\bf u}^+,{\bf n}) = {\bf h}({\bf u}^-,{\bf u}^+,{\bf n}) = (0,0,\mathrm{p}{\bf n},0)^\top$ and we easily obtain from \[eq:semi-discr\_DGSEM-res\] that ${\bf R}_\kappa^{ij}({\bf u}_h^{(n)})=0$ so stationary contacts remain stationary for all times and the DOFs are the exact values. Note that when the discontinuity $\ol{\Omega_L}\cap\ol{\Omega_R}$ corresponds to mesh interfaces, the relaxation based approximate Riemann solver \[eq:relax-ARS-xt\] provides the exact solution and the contact discontinuity is exactly resolved within cell elements.
The factor $\omega_0=\tfrac{2}{p(p+1)}$ in \[eq:CFL\_cond\] compared to \[eq:CFL-positive-2D-FVO2-scheme\] may be compared with the results in [@zhang_shu_10b] obtained on Cartesian meshes. Though conditions \[eq:CFL\_cond\] and \[eq:CFL-positive-2D-FVO2-scheme\] are not optimal, they are sufficient for our purpose with the assumption of a shape-regular mesh. We refer to [@calgaro_etal_13] and references therein for a review on sharp CFL conditions in the context of finite volume schemes.
Limiting strategy {#sec:limiters}
-----------------
The properties in \[th:pos\_DG\_BN\] hold only for the cell-averaged numerical solution at time $t^{(n+1)}$, which is not sufficient for robustness and stability of numerical computations. We use the a posteriori limiter introduced in [@zhang_shu_10b] to extend positivity of the solution at nodal values within elements in order to guaranty robustness of the DGSEM.
Note that the positivity of partial densities \[eq:partial\_densities\] and hyperbolicity through \[eq:sound\_speed\] require $Y(r_1-r_2)>-r_2$, which reduces to $Y>-\tfrac{r_2}{r_1-r_2}$ (resp. $Y<\tfrac{r_2}{r_2-r_1}$) in the case $r_1>r_2$ (resp. $r_1<r_2$). We enforce positivity of nodal values by using the linear limiter $$\label{eq:pos_limiter}
\tilde{\bf U}_\kappa^{ij,n+1} = \theta_\kappa({\bf U}_\kappa^{ij,n+1}- \langle{\bf u}_h^{(n+1)}\rangle_\kappa) + \langle{\bf u}_h^{(n+1)}\rangle_\kappa \quad \forall 0\leq i,j\leq p, \quad \kappa \in \Omega_h,$$ with $0\leq \theta_\kappa\leq1$ defined by $\theta_\kappa:=\min(\theta_\kappa^{\rho},\theta_\kappa^{Y},\theta_\kappa^{e})$ where, in the case $r_1>r_2$: $$\begin{aligned}
\theta_\kappa^{\rho} &= \min\Big(\frac{\langle\rho_h^{(n+1)}\rangle_\kappa-\varepsilon}{\langle\rho_h^{(n+1)}\rangle_\kappa-\rho_\kappa^{min}},1\Big), \quad \rho_\kappa^{min}=\min_{0\leq i,j\leq p} \rho_\kappa^{ij,n+1}, \\
\theta_\kappa^{Y} &= \min\Big(\frac{\langle \rho Y_h^{(n+1)}\rangle_\kappa-\langle \rho_h^{(n+1)}\rangle_\kappa\big(\varepsilon-\tfrac{r_2}{r_1-r_2}\big)}{\langle \rho Y_h^{(n+1)}\rangle_\kappa-\langle \rho_h^{(n+1)}\rangle_\kappa Y_\kappa^{min}},1\Big), \quad Y_\kappa^{min}=\min_{0\leq i,j\leq p} \tfrac{\rho Y_\kappa^{ij,n+1}}{\rho_\kappa^{ij,n+1}}, \\
\theta_\kappa^e &= \min_ {0\leq i,j\leq p}\Big(\theta_\kappa^{e,ij}: \quad e\big(\theta_\kappa^{e,ij}({\bf U}_\kappa^{ij,n+1}- \langle{\bf u}_h^{(n+1)}\rangle_\kappa) + \langle{\bf u}_h^{(n+1)}\rangle_\kappa\big) \geq \varepsilon\Big),\end{aligned}$$ and $\varepsilon=10^{-10}$ a parameter. In the second case $r_1<r_2$, $\theta_\kappa^{Y}$ is defined by $$\theta_\kappa^{Y} = \min\Big(\frac{\langle \rho Y_h^{(n+1)}\rangle_\kappa-\langle \rho_h^{(n+1)}\rangle_\kappa\big(\tfrac{r_2}{r_2-r_1}+\varepsilon\big)}{\langle \rho Y_h^{(n+1)}\rangle_\kappa-\langle \rho_h^{(n+1)}\rangle_\kappa Y_\kappa^{max}},1\Big), \quad Y_\kappa^{max}=\max_{0\leq i,j\leq p} \tfrac{\rho Y_\kappa^{ij,n+1}}{\rho_\kappa^{ij,n+1}}.$$
The present limiter on $Y$ was seen to avoid excessive smearing of material interfaces, while damping spurious oscillations. We also note that the limiter \[eq:pos\_limiter\] strengthens the entropy inequality \[eq:entropy\_ineq\_cont\] at the discrete level in the sense that $\langle\eta(\tilde{\bf u}_h^{(n+1)})\rangle_\kappa\leq\langle\eta({\bf u}_h^{(n+1)})\rangle_\kappa$ [@chen_shu_17 Lemma 3.1].
Numerical experiments {#sec:num_xp}
=====================
In this section we present numerical experiments, obtained with the CFD code [*Aghora*]{} developed at ONERA [@renac_etal15], on problems involving discontinuous solutions in one and two space dimensions in order to illustrate the performance of the DGSEM derived in this work. We use a fourth-order accurate ($p=3$) scheme in space extended to high-order in time by using the three-stage third-order strong-stability preserving Runge-Kutta method [@shu-osher88], while the limiter \[eq:pos\_limiter\] is applied at the end of each stage.
One-dimensional shock-tube problems
-----------------------------------
Let consider Riemann problems associated to the initial condition ${\bf u}_0(x)={\bf u}_L$ if $x<x_s$ and ${\bf u}_R$ if $x>x_s$ (see \[tab:RP\_IC\] for details).
[lllcccccc]{} test & left state ${\bf\cal U}_L$ & right state ${\bf\cal U}_R$ & $x_s$ & $t$ & $\gamma_1$ & $C_{v_1}$ & $\gamma_2$ & $C_{v_2}$\
RP0 & $(\tfrac{2}{5}, 2, 0, 1)^\top$ & $(\tfrac{3}{5}, \tfrac{3}{2}, 0, 2)^\top$ & $0$ & $0.2$ & $1.5$ & $1$ & $1.3$ & $1$\
RP1 & $(\tfrac{1}{2}, 1, 0, 1)^\top$ & $(\tfrac{1}{2}, \tfrac{1}{8}, 0, 0.1)^\top$ & $0$ & $0.2$ & $1.5$ & $1$ & $1.3$ & $1$\
RP2 & $(1, 1.602, 0, 1)^\top$ & $(0, 1.122, 0, \tfrac{1}{10})^\top$ & $-0.1$ & $3\times10^{-4}$ & $\frac{5}{3}$ & $3.12$ & $1.4$ & $0.743$\
RP3 & $(\tfrac{1}{5}, 0.99988, -1.99931, \tfrac{2}{5})^\top$ & $(\tfrac{1}{2}, 0.99988, 1.99931, \tfrac{2}{5})^\top$ & $0$ & $0.15$ & $1.5$ & $1$ & $1.3$ & $1$\
RP4 & $(\tfrac{1}{10}, 2, 0, 1)^\top$ & $(\tfrac{9}{10}, \tfrac{1}{2}, 0, 1)^\top$ & $0$ & $0.2$ & $2.0$ & $2$ & $1.2$ & $1$\
\[tab:RP\_IC\]
We first validate the entropy conservation property of the numerical flux \[eq:EC\_flux\] in \[th:ECPC\_BN\]. We thus replace the entropy stable numerical flux ${\bf h}$ at interfaces in \[eq:semi-discr\_DGSEM-res\] by the entropy conservative flux \[eq:EC\_flux\]. We follow the experimental setup introduced in [@bohm_etal_18] and choose an initial condition corresponding to problem RP0 in Table \[tab:RP\_IC\] resulting in the development of weak shock and contact waves on a domain of unit length with periodic boundary conditions. As a result of entropy conservation of the space discretization, only the time integration scheme should modify the global entropy budget at the discrete level. We thus evaluate the difference $$\label{eq:entropy_conserv_error}
e_h(t) := \big|\sum_{\kappa\in\Omega_h}\langle\eta({\bf u}_h)-\eta({\bf u}_0)\rangle_\kappa(t)\big|,$$ which quantifies the difference between the discrete entropy at final time and the initial entropy over the domain $\Omega_h$. We observe in Table \[tab:test\_EC\] that the error \[eq:entropy\_conserv\_error\] decreases to machine accuracy when refining the time step with third-order of convergence as asymptotic limit corresponding to the theoretical approximation order of the time integration scheme [@shu-osher88]. This validates the entropy conservation property of the numerical flux \[eq:EC\_flux\].
[lcc]{} & $e_h(t)$ & ${\cal O}$\
$\Delta t$ & $1.44875e\!-\!07$ & $-$\
$\Delta t/2$ & $6.85144e\!-\!08$ & $1.08$\
$\Delta t/4$ & $1.47570e\!-\!08$ & $2.22$\
$\Delta t/8$ & $2.02814e\!-\!09$ & $2.86$\
$\Delta t/16$ & $2.56963e\!-\!10$ & $2.98$\
$\Delta t/32$ & $3.21822e\!-\!11$ & $3.00$\
$\Delta t/64$ & $4.02157e\!-\!12$ & $3.00$\
\[tab:test\_EC\]
Results for problems RP1 to RP4 are displayed in \[fig:solution\_RPs\] where we compare the numerical solution in symbols with the exact solution in lines. Problem RP1 corresponds to the classical Sod problem for the compressible Euler equations since the mass fraction is uniform and corresponds to an equivalent $\gamma(Y)=1.4$ for the mixture. Problem RP2 comes from [@houim_kuo_11] and corresponds to a He-N$_2$ shock tube problem, RP3 corresponds to a multicomponent near vacuum problem with two rarefaction waves, while RP4 consists in a stationary contact wave.
We observe that the shock and contact waves are well captured and only some spurious oscillations of small amplitude are observed in RP2 which also exhibits a train of oscillations at the tail of the rarefaction wave. Positivity of the density is preserved in the near vacuum region which highlights the robustness of the scheme. Finally, the stationary contact wave in RP4 is exactly resolved as expected from \[th:pos\_DG\_BN\]. This later feature can also be related to the accurate resolution of the contact wave in RP1 and material interfaces in RP2 and RP3.
\
\
\
\
Shock wave-hydrogen bubble interaction
--------------------------------------
We now consider the interaction problem of a shock with a Helium bubble [@haas-sturtenvant-87] which is commonly used to assess the resolution by numerical schemes of shock waves, material interfaces and their interaction in multiphase and multicomponent flows (see [@kawai_terashima_11; @fedkiw_etal_99; @quirk_karni_96; @capuano_etal_18] and references therein).
The domain extends to $\Omega=[0,6.5]\times[0,0.89]$. A left moving $M=1.22$ normal shock wave in air is initially located at $x=4.5$ and interacts with a bubble of helium of unit diameter with center located at $x=3.5$ and $y=0$. Symmetry conditions are set to the top and bottom boundaries, while non reflecting conditions are applied to the left and right limits of the domain. The thermodynamical parameters of helium and air are $\gamma_1=1.648$, $C_{v_1}=6.89$ and $\gamma_2=1.4$, $C_{v_2}=1.7857$, respectively. Data are made nondimensional with the initial bubble diameter and pre-shock density, temperature and sound speed. The mesh consists in a Cartesian grid with $1300\times178$ elements. The complete setup of the initial condition can be found in [@kawai_terashima_11]. Note that this test case is usually computed including viscous effects. To avoid spurious oscillations at material interfaces in inviscid computations we regularize the initial condition of the bubble-air interface following [@billet_etal_08; @kawai_terashima_11; @houim_kuo_11].
Figure \[fig:solution\_SBI\] displays contours of pressure, void fraction and numerical Schlieren obtained at different times initialized when the shock wave reaches the bubble. The shock and material discontinuities are well resolved and the solution does not present significant spurious oscillations. The results are in good qualitative agreement with the experiment in [@haas-sturtenvant-87] and numerical simulations (see e.g., [@kawai_terashima_11]). In particular the shock dynamics and the bubble deformation are well reproduced, and vortices are generated along the bubble interface due to the Kelvin-Helmholtz instability.
\
\
\
Richtmeyer-Meshkov instability
------------------------------
We now simulate the interaction of a Mach $1.21$ shock wave in a mixture of air and acetone vapor with a perturbed interface separating the mixture from a dense SF$6$ gas [@brouillette_sturtevant_94]. The complete setup may be found in [@houim_kuo_11; @mohaved_johnsen_13; @latini_etal_07; @capuano_etal_18]. The thermodynamical parameters of the mixture and SF6 are $\gamma_1=1.24815$, $C_{v_1}=3.2286$ and $\gamma_2=1.0984$, $C_{v_2}=$2.0019, respectively. The Atwood number of the initial state is $At=\tfrac{\rho_2-\rho_1}{\rho_1+\rho_2}=0.6053$ where $\rho_2=\gamma_2$ is taken as the pre-shock density of the mixture. Data are made nondimensional with a length scale of $1$cm, and the pre-shock pressure, temperature and sound speed of the mixture. The size of the domain is $\Omega=[0,80.1]\times[0,5.9]$, symmetry conditions are set to the top and bottom boundaries, while non reflecting and reflecting conditions are applied to the left and right boundaries, respectively. We use a Cartesian grid with $1601\times118$ elements which corresponds to $118$ elements per perturbation wavelength and constitutes a coarse mesh compared to other experiments [@houim_kuo_11; @mohaved_johnsen_13; @capuano_etal_18].
We consider the single-mode perturbation of the material interface [@brouillette_sturtevant_94]. The shock travels to the right and interacts with the interface, then reflects at the right boundary and interacts a second time with the interface (re-shock regime). Figure \[fig:solution\_RMI\] shows results before and after re-shock where the density and vorticity contours are displayed. The first interaction produces vorticity at the interface and the formation and roll-up of spikes, while the second interaction with the reflected shock wave produces complex fine flow field structures and a low Mach number flow field. Again, we observe a good resolution of the shock and material interface and the associated vortical structures.
\
Concluding remarks {#sec:conclusions}
==================
A high-order, entropy stable and positive scheme with sharp resolution of material interfaces is introduced in this work for the discretization of a multicomponent compressible flow model in multiple space dimensions. We consider the multicomponent compressible Euler system for a mixture of two immiscible fluids that modelizes the flow of separated phases in kinematic, mechanical, and thermal equilibria. The space discretization relies on the entropy stable DGSEM framework [@fisher_carpenter_13; @gassner_13; @chen_shu_17] based on the modification of the integral over discretization elements where we replace the physical fluxes by entropy conservative numerical fluxes [@tadmor87] and on the use of entropy stable numerical fluxes at element interfaces.
We propose two-point entropy conservative and entropy stable fluxes for the multicomponent flow model. The former numerical fluxes are obtained by using the Tadmor’s entropy conservation condition [@tadmor87]. The latter are derived from the pressure relaxation scheme for the compressible Euler equations [@bouchut_04] and the energy relaxation approximation from [@coquel_perthame_98] to allow the use of a simple polytropic equation of states for the mixture in the numerical approximation. We first derive a three-point scheme which is then used as a building block for the design of the DGSEM. Using a forward Euler discretization in time, we design a posteriori limiters and propose conditions on the numerical parameters and the time step to guaranty positivity of the solution. The scheme is also proved to exactly resolve stationary contact waves. An explicit Runge-Kutta scheme [@shu-osher88] is used for the high-order time integration.
Numerical simulation of flows in one and two space dimensions with discontinuous solutions and complex wave interactions are performed with a fourth-order accurate scheme. The results highlight the accurate resolution of material interfaces, shock and contact waves, their interactions and associated small scale features. Likewise, robustness and nonlinear stability of the scheme are confirmed. Finally, we stress that the results of this work may be obviously applied to the polytropic gas dynamics for a single component.
[99]{} Z. Bilicki and J. Kestin, Physical aspects of the relaxation model in two-phase flow, Proc. R. Soc. Lond. A, 428 (1990), pp. 379-397.
G. Billet, V. Giovangigli, and G. de Gassowski, Impact of volume viscosity on a shock-hydrogen-bubble interaction, Combustion Theory and Modelling, 12 (2008), pp. 221–248.
M. Bohm, A. R. Winters, G. J. Gassner, D. Derigs, F. Hindenlang, and J. Saur, An entropy stable nodal discontinuous Galerkin method for the resistive MHD equations. Part I: Theory and Numerical Verification, J. Comput. Phys, 2018, https://doi.org/10.1016/j.jcp.2018.06.027.
F. Bouchut, Nonlinear Stability of Finite Volume Methods for Hyperbolic Conservation Laws and Well-Balanced Schemes for Sources, Frontiers in Mathematics, Birkhauser, 2004.
M. Brouillette and B. Sturtevant, Experiments on the Richtmyer-Meshkov instability: single-scale perturbations on a continuous interface. J. Fluid Mech., 263 (1994), pp. 271–292.
C. Calgaro, E. Creusé, T. Goudon, and Y. Penel, Positivity-preserving schemes for Euler equations: Sharp and practical CFL conditions, J. Comput. Phys, 234 (2013), pp. 417–438.
M. Capuano, C. Bogey, and P.D.M. Spelt, Simulations of viscous and compressible gas-gas flows using high-order finite difference schemes, J. Comput. Phys, 361 (2018), pp. 56-81.
M. H. Carpenter and T. C. Fisher, High-order entropy stable finite difference schemes for nonlinear conservation laws: Finite domains, J. Comput. Phys., 252 (2013), pp. 518–557.
M. H. Carpenter, T. C. Fisher, E. J. Nielsen, and S. H. Frankel, Entropy stable spectral collocation schemes for the Navier-Stokes equations: discontinuous interfaces, SIAM J. Sci. Comput., 36 (2014), pp. B835–B867.
C. Chalons and J. F. Coulombel, Relaxation approximation of the Euler equations, J. Math. Anal. Appl., 348 (2008), pp. 872–893.
P. Chandrashekar, Kinetic energy preserving and entropy stable finite volume schemes for compressible Euler and Navier-Stokes equations, Commun. Comput. Phys., 14 (2013); pp. 1252–1286.
J.-B. Chapelier, M. de la Llave Plata, F. Renac, and E. Lamballais, Evaluation of a high-order discontinuous Galerkin method for the DNS of turbulent flows, Comput. Fluids, 95, (2014), pp. 210–226.
G.-Q. Chen, C. D. Levermore, and T.-P. Liu, Hyperbolic Conservation Laws with Stiff Relaxation Terms and Entropy, Comm. Pure Appl. Math., 47 (1994), pp. 787–830.
T. Chen and C.-W. Shu, Entropy stable high order discontinuous Galerkin methods with suitable quadrature rules for hyperbolic conservation laws, J. Comput. Phys., 345 (2017), pp. 427–461.
F. Coquel, E. Godlewski, A. In, B. Perthame, and P. Rascle, Some new Godunov and relaxation methods for two-phase flow problems. Godunov methods, Kluwer/Plenum, New York, 2001, pp. 179–188.
F. Coquel, C. Marmignon, P. Rai, and F. Renac, An entropy stable high-order discontinuous Galerkin spectral element method for the Baer-Nunziato model, submitted, 2019.
F. Coquel and B. Perthame, Relaxation of energy and approximate Riemann solvers for general pressure laws in fluid dynamics, SIAM J. Numer. Anal., 35 (1998), pp. 2223–2249.
S. Dellacherie, Relaxation schemes for the multicomponent Euler system, ESAIM: Math. Model. and Numer. Analysis (M2AN), 37 (2003), pp. 909–936.
B. Després, Entropy inequality for high order discontinuous Galerkin approximation of Euler equations, in VII conference on hyperbolic problems. ETHZ-Zurich, 1998.
B. Després, Discontinuous Galerkin method for the numerical solution of Euler equations in axisymmetric geometry, in B. Cockburn, G. E. Karniadakis and C.-W. Shu (Eds.), Discontinuous Galerkin Methods: Theory, Computation and Applications, Lecture Notes in Computational Science and Engineering, 11 (2000), Springer-Verlag, pp. 315–320.
R. P. Fedkiw, T. Aslam, B. Merriman, and S. Osher, A non-oscillatory Eulerian approach to interfaces in multimaterial flows (the ghost fluid method), J. Comput. Phys., 152 (1999), pp. 457–492.
U. S. Fjordholm, S. Mishra, and E. Tadmor, Arbitrarily high-order accurate entropy stable essentially nonoscillatory schemes for systems of conservation laws, SIAM J. Numer. Anal., 50 (2012), pp. 544–573.
G. J. Gassner, A Skew-symmetric discontinuous Galerkin spectral element discretization and its relation to SBP-SAT finite difference methods, SIAM J. Sci. Comput., 2013 (35), pp. A1233–A1253.
G. J. Gassner, A. R. Winters, and D. A. Kopriva, Split form nodal discontinuous Galerkin schemes with summation-by-parts property for the compressible Euler equations, J. Comput. Phys., 327 (2016), pp. 39–66.
E. Godlewski and P.-A. Raviart, Numerical Approximation of Hyperbolic Systems of Conservation Laws, Springer, 1986.
A. Harten and P. D. Lax, A random choice finite difference scheme for hyperbolic conservation laws, SIAM J. Numer. Anal., 18 (1981), pp. 289–315.
A. Harten, P. D. Lax, and B. Van Leer, On upstream differencing and Godunov-type schemes for hyperbolic conservation laws, SIAM Rev., 25 (1983), pp. 35–61.
J. F. Hass and B. Sturtevant, Interaction of weak shock waves with cylindrical and spherical gas inhomogeneities, J. Fluid Mech., 181 (1987), pp. 41–76.
M. T. Henry de Frahan, S. Varadan, and E. Johnsen, A new limiting procedure for discontinuous Galerkin methods applied to compressible multiphase flows with shocks and interfaces, J. Comput. Phys., 280 (2015), pp. 89–509.
A. Hiltebrand and S. Mishra, Entropy stable shock capturing space-time discontinuous Galerkin schemes for systems of conservation laws, Numer. Math., 126 (2014), pp. 103–151.
R. W. Houim and K. K. Kuo, A low-dissipation and time-accurate method for compressible multi-component flow with variable specific heat ratios, J. Comput. Phys., 230 (2011), pp. 8527–8553.
F. Ismail and P. L. Roe, Affordable, entropy-consistent Euler flux functions II: Entropy production at shocks, J. Comput. Phys., 228 (2009), pp. 5410–5436.
G. Jiang and C.-W. Shu, On a cell entropy inequality for discontinuous Galerkin methods, Math. Comput., 62 (1994), pp. 531–538.
S. Jin and Z. P. Xin, The relaxation schemes for systems of conservation laws in arbitrary space dimension, Comm. Pure Appl. Math., 48 (1995), pp. 235–276.
E. Johnsen and T. Colonius, Implementation of WENO schemes in compressible multicomponent flow problems, J. Comput. Phys., 219 (2006), pp. 715–732.
S. Kawai and H. Terashima, A high-resolution scheme for compressible multicomponent flows with shock waves, Int. J. Numer. Meth. Fluids, 66 (2011), pp. 1207–1225.
D. A. Kopriva and G. Gassner, On the quadrature and weak form choices in collocation type discontinuous Galerkin spectral element methods, J. Sci. Comput., 44 (2010), pp. 136–155.
M. Latini, O. Schilling, and W. S. Don, Effects of WENO flux reconstruction order and spatial resolution on reshocked two-dimensional Richtmyer-Meshkov instability, J. Comput. Phys., 221 (2007), pp. 805–836.
R. C. Moura, G. Mengaldo, J. Peiró, and S. J. Sherwin, On the eddy-resolving capability of high-order discontinuous Galerkin approaches to implicit LES / under-resolved DNS of Euler turbulence, J. Comput. Phys., 330 (2017), pp. 615–623.
P. Movahed and E. Johnsen, A solution-adaptive method for efficient compressible multifluid simulations, with application to the Richtmyer-Meshkov instability, J. Comput. Phys., 239 (2013), pp. 166–186.
B. Perthame and C.-W. Shu, On positivity preserving finite volume schemes for Euler equations, Numer. Math., 73 (1996), pp. 119–130.
J. J. Quirk and S. Karni, On the dynamics of a shock-bubble interaction, J. Fluid Mech., 318 (1996), pp. 129–163.
J. Qiu, B. C. Khoo, and C.-W. Shu, A numerical study for the performance of the Runge-Kutta discontinous Galerkin method based on different numerical fluxes, J. Comput. Phys., 26 (2006), pp. 540–565.
F. Renac, Stationary discrete shock profiles for scalar conservation laws with a discontinuous Galerkin method, SIAM J. Numer. Anal., 53 (2015), pp. 1690–1715.
F. Renac, M. de la Llave Plata, E. Martin, J.-B. Chapelier, and V. Couaillier, Aghora: A high-order DG solver for turbulent flow simulations, in N. Kroll, C. Hirsch, F. Bassi, C. Johnston and K. Hillewaert (Eds.), IDIHOM: Industrialization of High-Order Methods - A Top-Down Approach, Notes on Numerical Fluid Mechanics and Multidisciplinary Design, 128 (2015), Springer Verlag.
F. Renac, A robust high-order Lagrange-projection like scheme with large time steps for the isentropic Euler equations, Numer. Math., 135 (2017), pp. 493–519.
F. Renac, A robust high-order discontinuous Galerkin method with large time steps for the compressible Euler equations, Commun. Math. Sci., 15 (2017), pp. 813–837.
F. Renac, Entropy stable DGSEM for nonlinear hyperbolic systems in nonconservative form with application to two-phase flows. J. Comput. Phys., 382 (2019), pp. 1–26.
R. Saurel and C. Pantano, Diffuse-interface capturing methods for compressible two-phase flows, Annu. Rev. Fluid Mech., 50 (2018), pp. 105–30.
C.-W. Shu and S. Osher, Efficient implementation of essentially non-oscillatory shock-capturing schemes, J. Comput. Phys., 77 (1988), pp. 439–471.
E. Tadmor, The numerical viscosity of entropy stable schemes for systems of conservation laws. I, Math. Comput., 49 (1987), pp. 91–103.
E. Tadmor, Entropy stability theory for difference approximations of nonlinear conservation laws and related time-dependent problems, Acta Numer., 12 (2003), pp. 451–512.
F. Vilar, C.-W. Shu, and P.-H. Maire, Positivity-preserving cell-centered Lagrangian schemes for multi-material compressible flows: From first-order to high-orders. Part II: The two-dimensional case, J. Comput. Phys., 312 (2016), pp. 416–442.
N. Wintermeyer, A. R. Winters, G. J. Gassner, and D. A Kopriva, An entropy stable nodal discontinuous Galerkin method for the two dimensional shallow water equations on unstructured curvilinear meshes with discontinuous bathymetry, J. Comput. Phys., 340 (2017), pp. 200-242.
A. R. Winters, D. Derigs, G. J. Gassner, and S. Walch, A uniquely defined entropy stable matrix dissipation operator for high Mach number ideal MHD and compressible Euler simulations, J. Comput. Phys., 332 (2017), pp. 274–289.
T. Xiong, C.-W. Shu, and M. Zhang, WENO scheme with subcell resolution for computing nonconservative Euler equations with applications to one-dimensional compressible two-medium flows, J. Sci. Comput., 53 (2012), pp. 222–247.
X. Zhang and C.-W. Shu, On positivity-preserving high order discontinuous Galerkin schemes for compressible Euler equations on rectangular meshes, J. Comput. Phys., 229 (2010), pp. 8918–8934.
[^1]: DAAA, ONERA, Université Paris Saclay, F-92322 Châtillon, France ([florent.renac@onera.fr]{}).
| 2024-01-20T01:26:35.434368 | https://example.com/article/4893 |
#!/usr/bin/env bash
################### while 循环输出 0 ~ 9 的平方数 ###################
x=0
while [[ ${x} -lt 10 ]]; do
echo $((x * x))
x=$((x + 1))
done
# Output:
# 0
# 1
# 4
# 9
# 16
# 25
# 36
# 49
# 64
# 81
################### while 循环输出 0 ~ 9 ###################
x=0
while echo ${x}
[[ ${x} -lt 9 ]]
do
x=$((x + 1))
done
# Output:
# 0
# 1
# 2
# 3
# 4
# 5
# 6
# 7
# 8
# 9
################### while 循环嵌套 for 循环 ###################
x=5
while [[ $x -ge 0 ]]
do
echo "Outer loop: $x"
for (( y = 1; $y < 3; y ++ ))
do
z=$[ $x * $y ]
echo "Inner loop: $x * $y = $z"
done
x=$[ $x - 1 ]
done
| 2023-09-03T01:26:35.434368 | https://example.com/article/5872 |
Q:
Is it possible to read music file metadata using R?
I've got a bunch of audio files (let's say ogg or mp3), with metadata.
I wish to read their metadata into R so to create a data.frame with:
file name
file location
file artist
file album
etc
Any way you know of for doing that ?
A:
You take an existing mp3 or ogg client, look at what library it uses and then write a binding for said library to R, using the existing client as guide for that side -- and something like Rcpp as a guide on the other side to show you how to connect C/C++ libraries to R.
No magic bullet.
A cheaper and less reliable way is to use a cmdline tool that does what you want and write little helper functions that use system() to run that tool over the file, re-reading the output in R. Not pretty, not reliable, but possibly less challenging.
| 2024-01-10T01:26:35.434368 | https://example.com/article/1208 |
1939 Imperial Airways flying boat ditching
On 21 January 1939, the Imperial Airways Short Empire flying boat Cavalier, en route from New York City to Bermuda, lost power to its engines and ditched in heavy seas approximately 285 miles (459 km) southeast of New York. She subsequently sank with the loss of three lives. Ten hours later, ten survivors were picked up by the tanker Esso Baytown.
Aircraft
Cavalier was a Short Empire flying boat with the registration G-ADUU that had been launched on 21 November 1936 and delivered to Imperial Airways.
In 1937, Imperial Airways and Pan American World Airways had opened up a London-New York-Bermuda flying-boat passenger service. Imperial Airways used Cavalier on the route. Shipped by sea to Bermuda, she operated on the route for the first time on a survey flight on 25 May 1937.
Accident
On the day of the incident, Cavalier left Port Washington on Long Island, New York, at 10:38 bound for Bermuda. At 12:23 p.m. the flying boat sent the message Running into bad weather. May have to earth, which referred to earthing the aerial; this was followed by another message at 12:27 Still in bad weather. Severe Static. Port Washington tried to call the Cavalier for the next 15 minutes but did not get a reply. At 12:57 Cavalier broadcast an SOS message followed at 12:59 by All engines failing through ice. Altitude 1,500 ft [457 m]. Forced landing in a few minutes. Another message eight minutes later said she was still flying but on two engines; four minutes after that came a series of messages to say that she had had come down in the sea. The last message, at 13:13, was the single word Sinking.
Rescue
As soon as it was realised at Port Washington that Cavalier was going to land in the sea, Port Washington requested a Pan American World Airways Sikorsky S-42 flying boat from Hamilton, Bermuda, to go to her assistance. The United States Coast Guard sent a flying boat from Long Island to Cavaliers last known position but it did not find her. A United States Army Air Corps Boeing B-17 Flying Fortress heavy bomber made a sortie from Langley Field in Virginia to search for Cavalier but had to return before midnight without success. Other aircraft also tried in vain to find the Cavalier.
The US Coast Guard also despatched two cutters and two patrol boats to the scene; one was only 70 nautical miles (130 km) away but the other three had to come from Cape Cod, Massachusetts; New York; and Norfolk, Virginia. The commercial tanker Esso Baytown was the first to arrive at the scene of the accident and reported at 23:25 that she had sighted wreckage and had lowered her lifeboats. By listening for the sound of their cries – they were in fact singing – Esso Baytown rescued six passengers and four members of the crew who had clung together on the water for ten hours. The United States Navy gunboat transferred a doctor to Esso Baytown but because of the high seas and darkness had to discontinue the search for any other survivors. The ten survivors were taken to New York, arriving on 23 January 1939; the other three people aboard were lost.
Report
The British Air Ministrys Inspector of Accidents reported that the accident had been caused by icing in the carburetters of all four engines. This caused a full loss of power in the inboard engines and partial loss in the outer; the commander of the Cavalier had reported icing problems prior to ditching. The inspector recommended that extra heating of carburetters and of the incoming air be provided and that a temperature indicator be installed. He also advised that passengers should be instructed in the fastening of lifebelts and the location of emergency exits and recommended the provision of extra life-saving equipment like rafts and pyrotechnic signals and that passengers should fasten safety belts at take-off and alighting.
References
Notes
Bibliography
"The Bermuda Accident" Flight 28 January 1939
"The Cavalier Report" Flight 30 March 1939 p317
Category:Aviation accidents and incidents in 1939
Category:Maritime incidents in 1939
Category:Aviation accidents and incidents in the Atlantic Ocean
Category:Accidents and incidents involving the Short Empire
Category:Airliner accidents and incidents involving ditching
Category:Imperial Airways accidents and incidents | 2024-01-30T01:26:35.434368 | https://example.com/article/1378 |
Q:
Aligning rectangles around the inside of a circle and rotate
I have a program that generates an image.
It places x images around a circle with x circumference.
See below output of the current implementation.
I need all of the rectangles to be inside of the circle and to be evenly placed.
Note that on the image above, the current implementation, some of the rectangles are on the inside and some are on the outside.
I'm unsure what is wrong with my calculation, please see below code for placing the rectangles.
/**
* Draw the points around a circle
* @param $count
* @param $circumference
*/
public function drawWheel($count, $circumference)
{
/**
* The starting angle
*/
$angle = 0;
/**
* The starting step between rectangles
*/
$step = (2 * pi()) / $count;
/**
* The center X of the canvas
*/
$startX = ($this->canvas['width'] / 2);
/**
* The center Y of the canvas
*/
$startY = ($this->canvas['height'] / 2);
for ($i = 0; $i < $count; $i++) {
/**
* Width of rectangle
*/
$width = 85;
/**
* Height of rectangle
*/
$height = 41;
/**
* Rectangle X position
*/
$x = ($startX + ($circumference / 2) * cos($angle)) - $width / 2;
/**
* Rectangle Y position
*/
$y = ($startY + ($circumference / 2) * sin($angle)) - $height / 2;
/**
* Degrees to rotate the rectangle around the circle
*/
$rotateAngle = atan2((($startX - ($width / 2)) - $x), (($startY - ($height)) - $y)) * 180 / pi();
/**
* The rectangle image
*/
$watermark = Image::make(base_path('test.png'));
$watermark->opacity(75);
$watermark->resize($width, $height);
$watermark->rotate($rotateAngle);
$this->image->insert($watermark, 'top-left', ceil($x), ceil($y));
/**
* Increment the angle
*/
$angle += $step;
}
}
The part of the function that makes the calculations is below.
$x = ($startX + ($circumference / 2) * cos($angle)) - $width / 2;
$y = ($startY + ($circumference / 2) * sin($angle)) - $height / 2;
$rotateAngle = atan2((($startX - ($width / 2)) - $x), (($startY - ($height)) - $y)) * 180 / pi();
The rotation point is the center of the rectangle.
Image is rotated using: http://php.net/manual/en/function.imagerotate.php
Circle is drawn using: http://php.net/manual/en/function.imagefilledarc.php
A:
The width/height will be flipped once the rectangle is rotated, this is something I did not factor in.
MBo's answer helped with the main x,y and rotation coordinates.
See amended code below.
for ($i = 0; $i < $count; $i++) {
$width = 85;
$height = 41;
$x = ($startX + (($circumference - $height) / 2) * cos($angle));
$y = ($startY + (($circumference - $height) / 2) * sin($angle));
$rotateAngle = 90 - $angle * 180 / pi();
$watermark = Image::make(base_path('test.png'));
$watermark->opacity(75);
$watermark->resize($width, $height);
$watermark->rotate($rotateAngle);
$this->image->insert($watermark, 'top-left', ceil($x - ($watermark->width() / 2)), ceil($y - ($watermark->height() / 2)));
$this->drawCircle($x, $y, 10);
$this->drawCircle($x, $y, 10);
$angle += $step;
}
| 2024-01-26T01:26:35.434368 | https://example.com/article/8777 |
A temple without any idol? Surprising, but true! The Bharat Mata Temple is a unique amalgamation of patriotism and spiritualism. Located in Varanasi, the temple is a grand display of Mother India but ...
Bhopal, the capital of Madhya Pradesh, holds a mesmerizing fusion of nature's creations and historical artifacts. Out of many such breathtaking gifts of nature, Lower Lake in Bhopal forms an integral ... | 2023-09-21T01:26:35.434368 | https://example.com/article/7584 |
and 33.
99
Calculate the least common multiple of 168 and 483.
3864
Find the common denominator of -83/16 and -49/985.
15760
What is the lowest common multiple of 26 and 4?
52
What is the lowest common multiple of 2139 and 57?
40641
What is the least common multiple of 40 and 16?
80
Calculate the lowest common multiple of 6 and 21.
42
Calculate the lowest common multiple of 57 and 186.
3534
Calculate the common denominator of -28/375 and 113/750.
750
What is the common denominator of 23/51 and -43/24?
408
Calculate the lowest common multiple of 12 and 44.
132
Find the common denominator of 1/1324 and -61/8.
2648
What is the smallest common multiple of 3 and 237?
237
What is the least common multiple of 36 and 220?
1980
What is the common denominator of -37/110 and -101/110?
110
Calculate the common denominator of -3/56 and 13/252.
504
What is the common denominator of -24/253 and 71/1012?
1012
Calculate the common denominator of -103/1152 and -173/252.
8064
Calculate the least common multiple of 126 and 14.
126
Calculate the lowest common multiple of 106 and 424.
424
What is the least common multiple of 9 and 1254?
3762
Find the common denominator of 7/122 and 131/6.
366
Calculate the least common multiple of 108 and 126.
756
What is the least common multiple of 96 and 6?
96
Calculate the smallest common multiple of 1596 and 532.
1596
Calculate the common denominator of -47/2228 and 55/16.
8912
Find the common denominator of 11/790 and -99/790.
790
What is the common denominator of 121/42 and 23/8?
168
What is the common denominator of 79/2340 and -43/780?
2340
What is the least common multiple of 144 and 11?
1584
Calculate the smallest common multiple of 54 and 108.
108
What is the common denominator of -9 and 30/13?
13
Find the common denominator of 26/11 and 50/129.
1419
Calculate the common denominator of -47/960 and -91/480.
960
What is the common denominator of -4/33 and -11/81?
891
What is the least common multiple of 24 and 100?
600
What is the smallest common multiple of 95 and 38?
190
Find the common denominator of 71/126 and 43/154.
1386
Calculate the common denominator of 35/363 and -10/1947.
21417
What is the common denominator of 87/10 and 92/555?
1110
What is the common denominator of -95/48 and -73/12?
48
What is the lowest common multiple of 54 and 12?
108
What is the lowest common multiple of 32 and 2?
32
What is the common denominator of 19/240 and 71/1680?
1680
What is the lowest common multiple of 120 and 264?
1320
Find the common denominator of 67/6624 and -7/92.
6624
What is the common denominator of 107/72 and 19/416?
3744
Find the common denominator of 46/7 and 46/57.
399
Find the common denominator of 31/736 and -3/8.
736
Calculate the common denominator of -47/567 and 8/27.
567
Calculate the lowest common multiple of 1511 and 4.
6044
Find the common denominator of -125/72 and -46/81.
648
Calculate the least common multiple of 34 and 2.
34
What is the common denominator of -50/497 and -53/10?
4970
Calculate the least common multiple of 120 and 200.
600
Find the common denominator of 74/21 and 16/1467.
10269
Calculate the smallest common multiple of 90 and 720.
720
What is the smallest common multiple of 3489 and 78?
90714
Calculate the common denominator of 42/11 and 18/35.
385
Calculate the least common multiple of 568 and 16.
1136
Calculate the common denominator of -16/43 and 27/7.
301
What is the common denominator of -23/1220 and 75/3172?
15860
Find the common denominator of 29/16 and 81/218.
1744
Calculate the common denominator of 103/96 and -59/324.
2592
What is the lowest common multiple of 50 and 9?
450
Calculate the smallest common multiple of 140 and 140.
140
Calculate the common denominator of 5/1362 and -9/2270.
6810
Calculate the least common multiple of 82 and 242.
9922
Find the common denominator of -47/32 and 31/408.
1632
What is the common denominator of 79/180 and -47/120?
360
Calculate the smallest common multiple of 16 and 50.
400
Calculate the common denominator of 1/184 and 97/168.
3864
Find the common denominator of 71/306 and 11/255.
1530
What is the lowest common multiple of 1116 and 992?
8928
Calculate the lowest common multiple of 17336 and 2.
17336
Calculate the smallest common multiple of 4 and 18452.
18452
What is the common denominator of 17/329 and 6/77?
3619
What is the common denominator of -61/22 and -13/2?
22
What is the common denominator of -109/330 and 83/6?
330
What is the lowest common multiple of 681 and 222?
50394
What is the common denominator of 155/672 and 157/1050?
16800
Calculate the common denominator of -85/488 and 67/244.
488
Find the common denominator of 87/320 and -17/240.
960
Find the common denominator of 83/4180 and -103/570.
12540
What is the smallest common multiple of 64 and 352?
704
What is the lowest common multiple of 24 and 1983?
15864
What is the least common multiple of 12852 and 12?
12852
Find the common denominator of -17/216 and 77/408.
3672
What is the common denominator of -67/6 and -43/290?
870
What is the lowest common multiple of 142 and 4?
284
What is the lowest common multiple of 156 and 390?
780
What is the common denominator of 54/5 and -9/421?
2105
What is the common denominator of 43/26 and 119/96?
1248
What is the common denominator of -49/24 and 74/477?
3816
Find the common denominator of -55/12 and 1/366.
732
What is the common denominator of -53/45 and -29/150?
450
What is the common denominator of -53/5518 and -9/14?
38626
Find the common denominator of 77/12 and 81/88.
264
What is the common denominator of 55/27 and -119/6822?
20466
Calculate the common denominator of 17/3038 and -73/1085.
15190
What is the common denominator of -59/75 and -101/105?
525
Calculate the smallest common multiple of 5805 and 66.
127710
Find the common denominator of 123/160 and -47/240.
480
What is the common denominator of 37/6 and 35/2892?
2892
Calculate the common denominator of -17/200 and -149/18.
1800
What is the common denominator of -46/17 and 3/298?
5066
What is the least common multiple of 270 and 20?
540
Calculate the common denominator of 56/9 and -56/27.
27
Find the common denominator of -51/112 and 15/112.
112
What is the smallest common multiple of 6 and 138?
138
What is the common denominator of 11/4 and 30?
4
What is the common denominator of 37/630 and 91/6?
630
Calculate the lowest common multiple of 2 and 255.
510
Find the common denominator of 9/20 and -3/2078.
20780
Find the common denominator of -85/252 and 13/72.
504
Calculate the smallest common multiple of 15 and 1461.
7305
Find the common denominator of 73/4 and 79/44.
44
Calculate the common denominator of 16/325 and 66/155.
10075
What is the least common multiple of 1596 and 42?
1596
What is the smallest common multiple of 13 and 1?
13
Find the common denominator of -8 and 1/353.
353
Calculate the smallest common multiple of 1670 and 8.
6680
Calculate the common denominator of -67/1395 and 151/72.
11160
Find the common denominator of -151/180 and -47/520.
4680
Calculate the least common multiple of 198 and 72.
792
Calculate the least common multiple of 1160 and 22.
12760
What is the least common multiple of 158 and 6?
474
Find the common denominator of 1/1395 and 19/9.
1395
Find the common denominator of 43/10 and 71/3.
30
What is the lowest common multiple of 78 and 39?
78
Calculate the least common multiple of 80 and 160.
160
Find the common denominator of -24/725 and 8/87.
2175
Calculate the common denominator of -71/26 and -35/1704.
22152
Calculate the lowest common multiple of 348 and 160.
13920
What is the lowest common multiple of 52 and 4?
52
What is the lowest common multiple of 27 and 42?
378
Calculate the lowest common multiple of 204 and 561.
2244
Calculate the common denominator of 51/59666 and 17/22.
656326
What is the smallest common multiple of 143 and 44?
572
Calculate the common denominator of 85/44 and 81/20.
220
What is the lowest common multiple of 76 and 30?
1140
Calculate the common denominator of 31/39 and -59/2259.
29367
What is the lowest common multiple of 1114 and 22?
12254
What is the smallest common multiple of 4 and 12?
12
Calculate the smallest common multiple of 105 and 4.
420
Calculate the lowest common multiple of 192 and 54.
1728
Cal | 2023-09-26T01:26:35.434368 | https://example.com/article/1817 |
Spring - Interview Questions and Answers for 'Hcl' - 6 question(s) found - Order By Newest
Very frequently asked. Among first few questions in almost all interviews. Among Top 5 frequently asked questions. Frequently asked in Indian service companies (HCL,TCS,Infosys,Capgemini etc based on multiple feedback )
Ans. "equals" is the method of object class which is supposed to be overridden to check object equality, whereas "==" operator evaluate to see if the object handlers on the left and right are pointing to the same object in memory.
x.equals(y) means the references x and y are holding objects that are equal. x==y means that the references x and y have same object.
Ans. The Spring container is able to autowire relationships between collaborating beans. This means that it is possible to automatically let Spring resolve collaborators (other beans) for your bean by inspecting the contents of the BeanFactory without using and elements.
Help us improve. Please let us know the company, where you were asked this question :
Ans. 1. In Setter Injection, partial injection of dependencies can possible, means if we have 3 dependencies like int, string, long, then its not necessary to inject all values if we use setter injection. If you are not inject it will takes default values for those primitives1. In constructor injection, partial injection of dependencies cannot possible, because for calling constructor we must pass all the arguments right, if not so we may get error
3. If we have more dependencies for example 15 to 20 are there in our bean class then, in this case setter injection is not recommended as we need to write almost 20 setters right, bean length will increase. In this case, Constructor injection is highly recommended, as we can inject all the dependencies with in 3 to 4 lines [i mean, by calling one constructor] | 2023-12-27T01:26:35.434368 | https://example.com/article/1005 |
President of WebFX. Bill has over 25 years of experience in the Internet marketing industry specializing in SEO, UX, information architecture, marketing automation and more. William's background in scientific computing and education from Shippensburg and MIT provided the foundation for MarketingCloudFX and other key research and development projects at WebFX.
Stylesheets can get large real quickly, both in terms of length and file size. To ensure that your web pages render correctly and quickly, here’s a compilation of some of the best free, web-based CSS optimizers/compressors, code formatters, and validation services. Check them out and pick the ones that work best for you.
Optimizing and Compression
CSS Optimizer is a simple online optimizer that processes your current CSS and outputs the compressed version. You have the option of linking to the URL of your stylesheet, uploading a CSS file, or directly inputting your styles. It’s a simple tool that’s “plug-and-chug” – there are no options, so the optimization procedure will remain the same for all your inputs (great if you’d like to standardize compression settings).
Clean CSS is based on the popular CSS minifier, CSSTidy. You can set your desired compression level (the trade-off to higher compression is more difficult readability) and customize compression options. It prints out a line-by-line report afterwards to show you exactly what’s been changed. Also check out CSS Formatter and Optimiser, which uses a more recent version of CSSTidy (1.3dev).
CSS Drive’s CSS compressor has two modes, Regular mode and Advanced mode (which has a few more options that you can set). You can remove the comments (strip comments option) or specify to strip comments that exceed a certain character limit, thus retaining comments that are short. Regular mode is perfect for those that aren’t picky – just choose between Light, Normal, and Super Compact compression and you’re ready to rock.
Online CSS Optimizer
Online CSS Optimizer is another simple CSS optimization tool based on the CSS optimizer command-line application for OS X and Linux. You have two ways to input your CSS: either via the text box provided on the page or directly linking to your stylesheet. Sometimes you’ll find that you need to reverse the compression – you can do so by using the Uncompress CSS application on the site.
Another popular web-based CSS compression tool is Robson’s open-source CSS Compressor, (check out the CSS Compressor PHP source code). There are plenty of compression options you can set that deals with colors, measurements (units), rules, and CSS properties. CSS Compressor also provides a useful Combine utility for simultaneously combining and compressing up to three separate CSS files.
The flumpCakes Style Sheet Optimizer is another optimizer and formatter with a few options. It gives you the choice of automatically combining background, font, list, and border attributes into short-hand notation and a Pretty Print option that standardizes code format. One cool feature is the Backlink feature which provides you a URL that you can bookmark and return to anytime to view your stylesheet’s compressed state.
Formatting
FormatCSS
FormatCSS allows you to paste your valid CSS code, correcting and standardizing your source code. There’s several available settings and rules that you can apply to achieve the type of format you desire – including ordering your CSS alphabetically, de-capitalizing your code, and some options for dealing with styles.
prettyprinter.de isn’t limited to CSS – it also formats PHP, Java, C++, C, Perl and JavaScript – so it’s a terrific “one-stop-shop” for your formatting needs if you happen to work with any of the other supported languages. It has a total of 13 different options you can set including “Reduce Whitespace”, “Remove empty lines”, and automatically adding new lines after curly brackets.
Tabifier is multi-language web-tool specifically designed for standardizing indents in source code. It supports HTML, CSS, and C Style. It’s a simple tool, excellent for quickly formatting your indents.
Validating and Checking
Perhaps the most common web-based validation service for CSS is the W3C CSS Validation Service. It’s very simple to use, just enter the URL of your stylesheet and it will output the status of your stylesheet and point out errors, warnings and other issues.
Juicy Studio: CSS Analyser
Juicy Studio’s CSS Analyser combines the W3C validation service with additional checks of color contrast (helpful for vision-impairment accessibility issues) and units of measurement used in your source code. You can input the CSS either via the URL or copying your code onto the text box provided on the page. The result is a very detailed breakdown of errors and warning about your CSS, similar to the W3C CSS Validation Service.
CSS Redundancy Checker
CSS Redundancy Checker is a simple tool for checking to see if you have redundant styles that can be combined together. This reduces unneeded styles and is a good way to check your work. It’s a three-step process: simply link to your stylesheet, put a few pages that use the stylesheet, and press the “check” button. The output is a detailed list of suggestions and places where you can reduce code by combining redundant styles.
If you’ve used any of the tools above, please share your experiences (good and especially bad) with us in the comments.
Since these are automated and have standard processing methods, please exercise caution and use your own judgment when using the outputs – things can get badly broken so do thoroughly test the results!
If you liked this post, these other posts might also be interesting to you: | 2024-05-22T01:26:35.434368 | https://example.com/article/6846 |
Former first lady Laura Bush called it "cruel" and "immoral." Dallas Mayor Mike Rawlings called it "unconscionable." This newspaper's editorial board called it "counter to who we are as a people."
Now, nearly four months after public outcry forced the Trump administration to end its zero-tolerance immigration policy of separating children from parents arrested for crossing the border illegally, we learn that the government agencies charged with carrying out the policy were not equipped to do so.
According to a Department of Homeland Security Inspector General's report, "DHS was not fully prepared to implement the administration's zero-tolerance policy or to deal with some of its after-effects."
Those "after-effects" included over 2,500 children being torn from their families, many held for "extended periods in facilities intended solely for short-term detention," according to the report. Those facilities include sprawling tent cities like the one in Tornillo, Texas, which has announced expansion plans that will enable it to hold up to 3,800 children.
The report also said DHS “provided inconsistent information to aliens who arrived with children during zero tolerance, which resulted in some parents not understanding that they would be separated from their children, and being unable to communicate with their children after separation.” Moreover, the inspector general found that nearly 20 percent of children detained were held in “short-term” facilities for more than five days, far longer than the 72-hour stays the facilities were designed for.
The report also noted that “DHS struggled to identify, track and reunify families separated under Zero Tolerance due to limitations with its information technology systems, including a lack of integration between systems.”
All of this paints a picture of federal, state and local agencies overwhelmed by a White House policy that was not just “cruel” and “immoral” but also half-baked and ill-prepared. The terror of having one’s child taken away, then not being able to communicate with or know the child's whereabouts, is hard to imagine.
Yet while the family-separation policy ended June 20, the zero-tolerance policy has not. Whereas those without a criminal record entering the country illegally — including asylum-seekers — were once routinely released pending a court date, they are now arrested and jailed pending an appearance in court or deportation. This means the government is still detaining immigrants — and their children — in overcrowded shelters.
As The New York Times reported, the number of migrant children being detained skyrocketed to nearly 13,000 in September from 2,400 in May 2017. The majority, housed in the 100 or so migrant shelters across the country, arrived in the U.S. as unaccompanied minors, many teenagers fleeing gang violence and poverty in Central America.
In the past, migrant children were released to sponsors vetted by the government. But the Trump administration has slowed that process by calling for potential sponsors to be fingerprinted and the data shared with immigration authorities. Since potential sponsors are often family members or friends, often unauthorized, the new vetting policy has led to fewer sponsors coming forward and to overcrowded shelters.
In Texas, that means busloads are arriving each week — not from across the border but from other shelters in other states. Each week, hundreds are being transported to Tornillo, where they are separated by gender and housed in makeshift tents. Unlike permanent shelters, where schooling is required and the children’s care is overseen by state and local child-welfare agencies, temporary camps like Tornillo are unregulated except for Department of Health and Human Services guidelines. Sadly, in the past year the time that migrant children remain in custody has nearly doubled from 34 to 59 days.
So, while the un-American policy of separating families at the border has officially ended, zero tolerance continues to strain the system at all levels — at the border, in our swelling migrant shelters, and in our overwhelmed immigration courts.
What's important to remember is none of this is a product of state or local policies, but rather the direct result of a broken immigration system that can only be fixed by lawmakers in Washington. Meanwhile, there is no excuse for the excesses of the Trump administration's zero-tolerance policies, including its plans to phase out Temporary Protected Status for tens of thousands of migrants who have fled political persecution, violence and natural disasters in countries such as Honduras, El Salvador, Nicaragua, Haiti, Sudan and Nepal.
With such draconian approaches to immigration policy in the U.S. — a land of immigrants, after all — perhaps it’s time to take down the plaque at the Statue of Liberty that famously reads:
Give me your tired, your poor,
What's your view?
Got an opinion about this issue? Send a letter to the editor, and you just might get published. | 2023-09-06T01:26:35.434368 | https://example.com/article/7181 |
cd rtkconv
call clean.bat
cd ..
cd rtknavi
call clean.bat
cd ..
cd rtknavi_mkl
call clean.bat
cd ..
cd rtkplot
call clean.bat
cd ..
cd rtkpost
call clean.bat
cd ..
cd rtkpost_mkl
call clean.bat
cd ..
cd srctblbrows
call clean.bat
cd ..
cd strsvr
call clean.bat
cd ..
cd rtkget
call clean.bat
cd ..
cd rtklaunch
call clean.bat
cd ..
| 2024-04-29T01:26:35.434368 | https://example.com/article/5705 |
A lithium battery in the related art uses a lithium metal as a negative active material, but when a lithium metal is used, a battery is short-circuited by formation of dendrite to cause danger of explosion, so that a carbon-based material is widely used as a negative active material, instead of a lithium metal.
The carbon-based active material includes crystalline carbon, such as graphite and synthetic graphite, and amorphous carbon, such as soft carbon and hard carbon. However, the amorphous carbon has a large capacity, but has a problem in large irreversibility during a charge/discharge process. Graphite is representatively used as the crystalline carbon, and has a theoretical limit capacity of 372 mAh/g, which is large, so that is used as a negative active material.
However, even though a theoretical capacity of the graphite or the carbon-based active material is slightly large, the theoretical capacity is simply about 380 mAh/g, so that there is a problem in that the aforementioned negative electrode cannot be used when a large capacity lithium battery is future developed.
In order to solve the problem, research on a metal-based or intermetallic compound-based negative active material has been currently and actively conducted. For example, research on a lithium battery utilizing metal, such as aluminum, germanium, silicon, tin, zinc, and lead, or semimetal as a negative active material has been conducted. The material has a large capacity and a high energy density, and is capable of occluding and discharging larger lithium ions than the negative active material using the carbon-based material, so that it is possible to manufacture a battery having a large capacity and a high energy density. For example, it is known that pure silicon has a large theoretical capacity of 4,017 mAh/g.
However, compared to the carbon-based material, the metal-based or intermetallic compound-based negative active material has a cycle characteristic degradation to be obstacles to commercialization. The reason is that when the silicon is used as a negative active material for occluding and discharging lithium as it is, conductivity between active materials may deteriorate due to a change in a volume during a charge/discharge process, or a negative active material is peeled from a negative current collector. That is, the silicon included in the negative active material occludes lithium by charging and is expanded to have a volume of about 300 to 400%, and when lithium is discharged during the discharge, mineral particles are contracted.
When the aforementioned charge/discharge cycle is repeated, electric insulation may be incurred due to a crack of the negative active material, so that a lifespan of the lithium battery is sharply decreased. Accordingly, the aforementioned metal-based negative active material has a problem to be used in the lithium battery.
In order to solve the aforementioned problem, research on a negative active material having a buffering effect against a volume change by using particles having a nano size level as silicon particles or giving porosity to silicon is conducted.
Korean Patent Application Laid-Open No. 2004-0063802 relates to “Negative Active Material for Lithium Secondary Battery, Method of Manufacturing the Same, and Lithium Secondary Battery”, and adopts a method of alloying silicon and another metal, such as nickel, and then eluting the metal, and Korean Patent Application Laid-Open No. 2004-0082876 relates to “Method of Manufacturing Porous Silicon and Nano-size Silicon Particle, and Application of Porous Silicon and Nano-size Silicon Particle as Negative Electrode Material for Lithium Secondary Battery”, and discloses technology of mixing alkali metal or alkali earth metal in a powder state with silicon precursor, such as silicon dioxide, performing heat treatment on a mixture, and eluting the mixture as acid.
The patent applications may improve an initial capacity maintenance rate by a buffering effect according to a porous structure, but simply use porous silicon particles having conductivity deterioration, so that when the particles do not have a nano size, conductivity between the particles is degraded while manufacturing an electrode, thereby causing a problem of deterioration of initial efficiency or a capacity maintenance characteristic. | 2024-06-21T01:26:35.434368 | https://example.com/article/2244 |
Q:
How can I pull out two elements of every object in an array of objects and make a new one
I have an array whose length could be > 1 at any time and just keep getting bigger.
I need to extract only TWO of the values of the parent array elements and put them into a new array.
Here's the example of the base array:
{
"strains":[
{
"id": 150,
"name": "Animal Cookies (Phat Panda)",
"label": "Animal Cookies (Phat Panda)",
"thcpct": 14,
"cbdpct": 19,
"ttlpct": 33,
"type": "Hybrid SD",
"subtype": "Sativa Dominant",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "4/12/2017"
},
{
"id": 110,
"name": "Blue Dream (Pioneer)",
"label": "Blue Dream (Pioneer)",
"thcpct": 24,
"cbdpct": 0,
"ttlpct": 24,
"type": "Sativa",
"subtype": "None",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "3/27/2017"
},
{
"id": 30,
"name": "Candyland",
"label": "Candyland",
"thcpct": 25,
"cbdpct": 75,
"ttlpct": 100,
"type": "Hybrid SD",
"subtype": "Sativa Dominant",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "1/1/2017"
},
{
"id": 130,
"name": "Dragon OG (Avitas)",
"label": "Dragon OG (Avitas)",
"thcpct": 26,
"cbdpct": 18,
"ttlpct": 44,
"type": "Hybrid SD",
"subtype": "Sativa Dominant",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "4/10/2017"
}
]
}
and this is what I want it to look like after the extraction:
{
"strains":[
{
"id": 150,
"label": "Animal Cookies (Phat Panda)",
},
{
"id": 110,
"label": "Blue Dream (Pioneer)",
},
{
"id": 30,
"label": "Candyland",
},
{
"id": 130,
"label": "Dragon OG (Avitas)",
}
]
}
The way I've tried to do this is with push, one array equals another and still I get Push is NOT a function, or 'id' is undefined and the code stops.
This is EASY STUFF and assigning one array element to another is not difficult but why is this case so different?
I have the example code for what I've tried here:
I've tried using LODASH here:
//This is the call to the FIX_KEY function in appservice
_.object(
_.map(
_.keys(allStrains.data),
ctrlMain.appSvc.appFuncs.fix_key(/^name/, 'label')),
_.values(allStrains.data)
);
Here's the function in appservice:
svc.appFuncs = {
//https://stackoverflow.com/questions/32452014/change-key-name-in-javascript-object
//This replaces a STATIC key value for now, but can probably
//replace any value
fix_key: function (key, keyname) {
return key.replace(key, keyname);
}
}
I modified a lodash code from the Stack Overflow question in the comments.
UPDATE 1:
Andrjez, please see the end result on how I need to make this work and where I'm experiencing the problem:
* Angular Dropdown Multi-select
*
* For STRAINS to select what will be in the room selected
*
*/
$scope.example8model = [];
//Get the data from LOCALSTORAGE
var getResults;
**//I GET THE RESULTS from LOCAL STORAGE HERE**
getResults = storageLocalService.getItemJSON("allstrains");
**//CHECK the strains from LOCAL STORAGE**
console.log("Strains: ", getResults.strains); //FAILS HERE!!!
//getResults.strains is UNDEFINED but getResults HOLDS the JSON
//EXACTLY how you made it in your example. I just changed
//**obj** to **getResults**.
var result = {
//NEXT LINE FAILS: getResults.strains.map is UNDEFINED!
strains: getResults.strains.map(function (item) {
return {
id: item.id,
label: item.label
};
})
};
console.log("All extracted Strains: ", result);
$scope.example8model = result;
//$scope.example8data = [
// {id: 1, label: "David"},
// {id: 2, label: "Jhon"},
// {id: 3, label: "Danny"}
//];
$scope.example8settings = {
checkBoxes: true
};
Here's the problem: The data in LOCAL STORAGE does NOT have double-quotes either leading or trailing. BUT...
This is what I get in the DEV CONSOLE:
Notice, no DBL QUOTE ADDED for leading or trailing:
Then when I click to the NEXT level down, DOUBLE QUOTES ARE ADDED thus messing up trying to access: getResults.strains.map()...
Finally, the resulting Error...
So, where am I going wrong?
NOTE: This is what I'm trying to achieve: MULTI-SELECT
A:
Use Array.prototype.map:
var result = {
strains: obj.strains.map(function (item) {
return {
id: item.id,
label: item.label
};
})
};
Try the snippet below to see the result:
var obj = {
"strains":[
{
"id": 150,
"name": "Animal Cookies (Phat Panda)",
"label": "Animal Cookies (Phat Panda)",
"thcpct": 14,
"cbdpct": 19,
"ttlpct": 33,
"type": "Hybrid SD",
"subtype": "Sativa Dominant",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "4/12/2017"
},
{
"id": 110,
"name": "Blue Dream (Pioneer)",
"label": "Blue Dream (Pioneer)",
"thcpct": 24,
"cbdpct": 0,
"ttlpct": 24,
"type": "Sativa",
"subtype": "None",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "3/27/2017"
},
{
"id": 30,
"name": "Candyland",
"label": "Candyland",
"thcpct": 25,
"cbdpct": 75,
"ttlpct": 100,
"type": "Hybrid SD",
"subtype": "Sativa Dominant",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "1/1/2017"
},
{
"id": 130,
"name": "Dragon OG (Avitas)",
"label": "Dragon OG (Avitas)",
"thcpct": 26,
"cbdpct": 18,
"ttlpct": 44,
"type": "Hybrid SD",
"subtype": "Sativa Dominant",
"bitactive": 1,
"useradded": "jjones",
"dateadded": "4/10/2017"
}
]
};
var result = {
strains: obj.strains.map(function (item) {
return {
id: item.id,
label: item.label
};
})
};
console.log(result);
If you wish to use es6 features:
const result = { strains: obj.strains.map(({id , label}) => ({id, label})) };
| 2024-02-14T01:26:35.434368 | https://example.com/article/2121 |
WASHINGTON, D.C.-
The U.S. Consumer Product Safety Commission (CPSC) is urgently warning consumers about
6,000 Home Gas Sentry carbon monoxide (CO) detectors imported and distributed by Stanley
Solar & Stove Inc. of Manchester, N.H. that may fail to alarm. As a result, consumers
could be exposed to dangerous levels of carbon monoxide, a colorless, odorless, toxic gas,
which could lead to serious illness or death.
CPSC tested the detectors and found that the detectors could fail to alarm at
concentrations of CO at 100 and 200 parts per million. Concentrations at this level can
cause serious illness or death.
CPSC requested that Stanley Solar & Stove recall the detectors, remove them from store
shelves, and contact retailers and consumers about this recall. CPSC is unilaterally
issuing this press release concerning the Home Gas Sentry CO detectors because Stanley
Solar & Stove is unable to participate in a recall and has not warned the public about
potential risks associated with the CO detectors.
The rectangular, off-white, plastic detectors measure approximately 4.75 inches long, 2.5
inches wide, and 1.75 inches deep with the words "Gas Sentry" on the front of
the detector. A green "Power" light and a red "Alarm" light appear in
the center of the detectors. The company name, manufacturing date, and manufacturing
number are located on a sticker on the back of the detector. The detectors have a white
cord and plug.
Coal and wood stove dealers sold the detectors in the northeastern United States from
February 1988 to May 1996 for approximately $80. The detectors were packaged in a
rectangular white box labeled in part, "Home Gas Sentry...120 Volts AC...Model
Z-1604-KM...
Consumers are urged to stop using the Home Gas Sentry CO detectors and replace them with
new detectors that meet Underwriters Laboratories Standard 2034 effective October 1, 1995.
CO is produced when fuel is burned with incomplete combustion. CO poisoning from home
fuel-burning appliances and camping equipment kills at least 250 people each year and
sends another 5,000 to hospital emergency rooms for treatment. Symptoms of carbon monoxide
poisoning are similar to the flu (without the fever). They include dizziness, fatigue,
headache, nausea, and irregular breathing. Common sources of carbon monoxide include room
heaters, furnaces, charcoal grills, ranges, water heaters, and fireplaces.
The U.S. Consumer Product Safety Commission protects the public from the
unreasonable risk of injury or death from 15,000 types of consumer products under the
agency's jurisdiction. To report a dangerous product or a product-related injury and for
information on CPSC's fax-on-demand service, call CPSC's hotline at (800) 638-2772 or
CPSC's teletypewriter at (800) 638-8270. To order a press release through fax-on-demand,
call (301) 504-0051 from the handset of your fax machine and enter the release number.
Consumers can report product hazards to info@cpsc.gov. | 2023-08-03T01:26:35.434368 | https://example.com/article/1612 |
Japan Soccer College Ladies
is a Japanese women's football team which played Japan Women's Football League from 2012 to 2016.
See also
List of women's football clubs in Japan
References
External links
Official site
Category:Women's football clubs in Japan | 2024-06-09T01:26:35.434368 | https://example.com/article/1254 |
Youth Violence Intervention Programme expands to Homerton Hospital
March 29th, 2018
We are delighted to announce we have secured the necessary funding to expand our Youth Violence Intervention Programme to Homerton University Hospital.
In 2016, 364 young people aged 11 to 24 attended Homerton University Hospital with assault-related injuries. We know that young people attend their local A&E four or five times before attending a Major Trauma Centre. We hope that by expanding our service to Homerton University Hospital, we will be able to meet young people earlier, before they reach crisis point.
We have received funding from Hackney Community Partnerships, Healthier City and Hackney, Hackney Parochial Charities, Co-op Community Fund, NTS Radio and generous individuals towards the new youth work team.
John Poyton, CEO at Redthread commented, “We are incredibly excited to announce the expansion of our Youth Violence Intervention Programme to Homerton University Hospital.
We know young people attend their local A&E four or five times before arriving at one of London’s Major Trauma Centres, where our youth work teams are currently embedded. By setting up a team in Homerton University Hospital, we hope to meet young people earlier, before they reach crisis point to support them to break the cycle of violence.”
Dr Niamh Ni Longain Consultant in Adult and Paediatric Emergency Medicine said: “We know that embedding this service in the Emergency Department will improve care for vulnerable young people in Homerton Hospital.
We are thrilled to partner with Redthread and look forward to starting the service in August 2018 and are proud to be the first non-major trauma centre to have this embedded service. We are tremendously grateful to the community organisations and partners for their support of this project.” | 2023-10-30T01:26:35.434368 | https://example.com/article/9361 |
Getty Images
In the Cleveland locker room this summer, Johnny Manziel was the typical rookie. He was mostly quiet, players told me then and now, and those players—then and now—make sure this is emphasized: Manziel has been a total professional.
There was one meeting where Manziel was late, but none of the players I texted with said they knew of any other issue.
"I've been waiting for this cocky ass---e to show up," one player told me this week. "It never happened. All I see is a pro."
Manziel and Brian Hoyer were informed on Monday that Manziel would start Week 15. I can tell you there are some Browns players—a few—who believe that Hoyer should remain the starter. That is true. But there is also widespread support for Manziel. They believe he deserves the chance.
In a statement released by the team, Manziel was quoted saying:
I'm very appreciative of the opportunity that Coach Pettine and the coaching staff have given me to be the starter on Sunday. I've tried to spend my entire season learning what it takes to become a pro and it's been great to watch Brian because he knows what it takes. I've prepared every week to be ready to help the team however possible and my focus has been on improving every day. I'm very excited to get out on the field with my teammates on Sunday and to have the opportunity to make the Dawg Pound proud.
The Browns had to do this. They had to. But it is not without risks. I'm convinced Manziel has the talent to be a good NFL quarterback, but I'm not convinced, yet, he has the maturity to handle it.
Again, the Browns needed to do this. Hoyer has led Cleveland to one touchdown in his last 29 drives. That is a Jaguars type of putridity. My guess is also that unless Manziel is absolutely terrible, this is the end of the Hoyer era. See you with the Jets next season, Brian.
Brett Carlsen/Getty Images
What Manziel provides is electricity. You are going to see the typical Johnny—electric plays, big plays, good athleticism. Look for Manziel to also make sure one of the best weapons in football, wide receiver Josh Gordon, gets the ball often (this week, Gordon might actually hold on to it). There are going to be numerous positives, including the fact Cincinnati will have to prepare for a multi-dimensional threat.
That's the good news. We are going to see Manziel, overall, do well. This is the start of his era. He has ability. He's smart. He'll do well.
How well depends on the other part of football—the mental part.
We have watched as the sport destroyed the minds of young players who showed immense promise. We've seen the NFL annihilate Robert Griffin III after he initially broke through. The reason for that annihilation was Griffin's maturity. It wasn't there. Griffin let his success get to his head, and then the idiot owner undermined Griffin in the locker room by being too cozy with him. Griffin compounded the problem by not having a strong work ethic.
In San Francisco, Colin Kaepernick has disintegrated mentally. He looks lost, and he hasn't been well served by his head coach.
There are successful stories of young quarterbacks evolving into great ones, but most of the time the young ones get chewed up. There are more Ryan Leafs than Andrew Lucks.
The Browns are a perfect example. It's like the "Justin Bieber Curse" started in Cleveland and never left. It's been a quarterback graveyard: Hoyer, Campbell, Weeden, Lewis, McCoy, Wallace, Delhomme, Quinn, Anderson, Dorsey, Gradkowski, Frye, Dilfer, Garcia, Holcomb, McCown, Couch (Couch…LOL), Pederson, Wynn and Detmer.
John Bazemore/Associated Press
That's just…sad. Factory of Sadness sad.
This is why the Browns coaching staff has to tread carefully. If it doesn't, Manziel will become another statistic. It wasn't a terrifically big deal when Manziel was involved in some sort of dustup recently, but it is also fair to say Russell Wilson, Tom Brady, Peyton Manning, Andrew Luck and Aaron Rodgers haven't had those kinds of headlines. The worst headline Peyton has generated is calling his kicker an idiot. The great ones in this league stay out of trouble.
With Griffin, the fame eroded his work ethic. He stopped studying, stopped caring about football and started caring more about the RG3 brand. My concern is that Manziel falls to the same trappings.
But so far, at least in the NFL, that hasn't happened. One Browns player put it this way: "I've come to trust him. I think a lot of guys do."
He's earned it. For now.
Mike Freeman covers the NFL for Bleacher Report. | 2024-07-24T01:26:35.434368 | https://example.com/article/1756 |
Get breaking news alerts and special reports. The news and stories that matter, delivered weekday mornings.
A 4-year-old Texas boy was fatally crushed by a giant steel barbecue pit shaped like a revolver, authorities said.
A Liberty County sheriff's deputy was called to the home, east of Houston, on Tuesday afternoon and found the "hysterical mother" pointing out her injured son in the yard, the department said in a news release Thursday.
Deputy Ruben Arellano performed CPR on the child while waiting for an ambulance, but the boy — later identified as Bryan Jara — was pronounced dead at the hospital.
The distraught mother was not immediately named.
Investigators said the woman had been doing chores inside while her son played outside, as he often did.
Heartbreaking.... 4-year-old in Liberty County was crushed when a gun shaped BBQ grill tipped over on him. pic.twitter.com/n6X1aqegls — Tim Wetzel (@KHOUTim) February 11, 2016
"When she heard a 'thud' sound from outside, she ran out to find her son pinned under a very heavy steel bar-b-q pit which, from preliminary investigation, appears he was trying to climb on and the pit fell over on him," authorities said.
The boy's death appears to be a "tragic accident," they added. An autopsy has been requested. | 2024-03-27T01:26:35.434368 | https://example.com/article/2757 |
Q:
Check if App is running in a Testing Environment
was just wondering if I can determine if my app currently runs in a Testing environment.
Reason is that I am running automated screenshots and want to hide/modify parts of my App only when running that UI Test.
For example I'd like to skip registering for push notifications to avoid that iOS Popup at launch.
I'm searching for something like
if (kTestingMode) { ... }
I know that we do have a driver that basically launches the app and then connects. Guess the App actually does not even know if it is running in Testmode or not. But maybe someone knows an answer.
Thanks!
A:
Okay I just found a solution my myself.
What I did is introduce a global variable which I will set in my main driver.
First I created a new globals.dart file:
library my_prj.globals;
bool testingActive = false;
Then, in my test_driver/main.dart file I import that and set the testingActive variable to true
import '../lib/globals.dart' as globals;
..
void main() {
final DataHandler handler = (_) async {
final response = {};
return Future.value(c.jsonEncode(response));
};
// Enable integration testing with the Flutter Driver extension.
// See https://flutter.io/testing/ for more info.
enableFlutterDriverExtension(handler: handler);
globals.testingActive = true;
WidgetsApp.debugAllowBannerOverride = false; // remove debug banner
runApp(App());
}
Now, I do have this global variable everywhere in my Flutter App by simply importing and checking.
e.g. in my app.dart
import '../globals.dart' as globals;
...
if (globals.testingActive) {
print("We are in a testing environment!");
}
Is there a better solution? Guess this works just fine!
| 2023-09-09T01:26:35.434368 | https://example.com/article/6560 |
@echo off
:: DX11Renderer - VDemo | DirectX11 Renderer
:: Copyright(C) 2018 - Volkan Ilbeyli
::
:: This program is free software : you can redistribute it and / or modify
:: it under the terms of the GNU General Public License as published by
:: the Free Software Foundation, either version 3 of the License, or
:: (at your option) any later version.
::
:: This program is distributed in the hope that it will be useful,
:: but WITHOUT ANY WARRANTY; without even the implied warranty of
:: MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.See the
:: GNU General Public License for more details.
::
:: You should have received a copy of the GNU General Public License
:: along with this program.If not, see <http://www.gnu.org/licenses/>.
::
:: Contact: volkanilbeyli@gmail.com
:PackageBinaries
echo Cleaning up the artifacts folder...
cd Build
if not exist Empty mkdir Empty
robocopy ./Empty ./_artifacts /purge /MT:8 > nul
set proj_dir=%cd%
set artifacts_dir=%proj_dir%\_artifacts
rmdir Empty
cd ..
set root_dir=%cd%
:: get all .dll and .exe files from build
for /r "%proj_dir%" %%f in (*.exe *.dll) do (
:: skip _artifacts folder itself
if not "%%~df%%~pf" == "%artifacts_dir%\" (
xcopy "%%f" "%artifacts_dir%" /Y > nul
)
)
:: copy data and shaders
robocopy ./Data "%artifacts_dir%/Data" /E /MT:8 > nul
robocopy ./Source/Shaders "%artifacts_dir%/Source/Shaders" /E /MT:8 > nul
:: EngineSettings.ini ends up in repo root after Build.
if exist EngineSettings.ini (
xcopy "EngineSettings.ini" "./Build/_artifacts/"\ /Y /Q /F /MOV
) else (
xcopy "./Data/EngineSettings.ini" "./Build/_artifacts/"\ /Y /Q /F
)
if %errorlevel% NEQ 0 (
xcopy "./Data/EngineSettings.ini" "./Build/_artifacts/"\ /Y /Q /F
)
EXIT /B 0 | 2023-08-02T01:26:35.434368 | https://example.com/article/7296 |
Q:
WebSphere: list Name Space Bindings using wsadmin
I want to retrieve Name Space Bindings using a wsadmin jython script. Using the Name Space Bindings, I want to retrieve the properties of each of the name space bindings. For examples I want all the StringNameSpaceBinding given its scope.
I am unable to figure out anything and I am unable to find any documentation. Please help.
A:
The following code outputs all namespace bindings of type String:
bid = AdminConfig.getid('/StringNameSpaceBinding:/')
bindings = bid.split("\n")
for binding in bindings: print AdminConfig.show(binding), '\n'
| 2023-10-12T01:26:35.434368 | https://example.com/article/6270 |
Q:
Convert cell array of numbers to matrix (cell2mat) while converting empties to zeros
I have a function that uses strfind in a cellfun call to find which string items in a cell array match a specified string. For example:
cellfun( @(x) strfind( x , 'openmask'), fileNames, 'uniformoutput', false)
The original cell matrix is like this:
fileNames = {'sub11att-openmask.txt', 'sub13det-masking', ...};
The result for this looks like this:
[10] [] [10] [] [9] []
I am trying to find a function that will convert this to:
10 0 10 0 9 0
Using cell2mat I get:
10 10 9
So I have to use this currently:
x(cellfun('isempty', x))={0};
cell2mat(x);
Is there a function that is cleaner than this (i.e. a one-liner solution)?
Thanks.
A:
This works even if there are several occurrences of the sought string. It finds the first such occurrence if there's any, or gives 0 otherwise:
result = cellfun(@(x) sum(min(strfind(x, 'openmask'))), fileNames);
The code uses min to keep the first occurrence. This will give either a number or []. Then sum transforms [] into 0.
If you prefer to keep the last occurrence, change min to max or use Sardar Usama's suggestion:
result = cellfun(@(x) max([0 strfind(x, 'openmask')]), fileNames);
| 2024-04-14T01:26:35.434368 | https://example.com/article/6850 |
As our ship pulls into the port of San Juan, a dolphin rises from the ocean to greet us.
It may be brutally cold in New York, but it's eternal summer aboard our annual Presidents' Week cruise. This year we sail the Celebration Reflection to the Eastern Caribbean, enjoying perks such as free booze the whole cruise, shipboard credit, and specialty dining, combined with the luxuries of Concierge and Aqua Class balcony staterooms.
As we have been to these Caribbean ports many times, I arrange some new experiences for us. In St. Thomas, a guided walking tour with an historian of Taphus Tours brings to life the 350-year history of Charlotte Amalie. Our guide is the architect of the famous Three Queens statue, erected to honor the women who played an important role in the island's history. Lunch at a local restaurant, shopping time, and transportation to and from the pier is included in the price.
In San Juan I meet with the manager of the beautiful La Concha Hotel in Condado to check out the latest rooms and venues. The area always reminds me of a miniature Las Vegas, as it features one hotel after the next, each with casinos. Restaurants and bars are sprinkled among them. But there's no desert here. Instead, stunning ocean views assure us we are in a tropical paradise.
In St. Martin, I spend the day at the brand new Riu Palace on the French side of the island. The rooms overlook the property's lush gardens. The infinity pool allures, as does the hue of blue sapphire ocean. I have long been a fan of Riu Palace Resorts, and most have the same design, but here the building units remain true to the setup of the Radisson, the resort previously located on these grounds. It's all very boutique-like with just under 250 rooms, complimentary Wi-Fi included.
One of the highlights of the week is being invited to the private St. Martin sail away party on the helicopter launch pad aboard the ship, an area normally off limits to guests. We mingle with officers and fellow passengers as the ocean unfolds before us.
Celebrity serves lobster tail twice in the main dining room, one time more than it usually does, a real treat. We also dine at four specialty restaurants, each with a steep cover charge, but the cost is covered, in part, by our shipboard credit:
Murano - my favorite. This small venue offers French food and impeccable service. Meals are prepared table side. And yes, I eat lobster here for a third time this week.
The Lawn Grill - This outdoor venue at the top of the ship is lots of fun. For starters, you can make your own pizza, tossing it into the air beside the expert. Guests get to watch and cheer for you. I take on the task, creating a delicious pesto pie, cooked crisp and light, thanks to the pizza maker who over sees the cooking process. Steaks, chops, and fish are grilled here, and you can mix and match what you like.
Tuscan Grill - Italian fare. At one time it offered a huge, help-yourself antipasto buffet - all before you even got to look at the menu. That's what I was expecting, so it was a bit disappointing to discover that wasn't the situation, at least not on this sailing.
Quisine - Start with an iPad, and press the photos of the items you would like to try. It's a fun feast of small plates, but some aren't so small. It's the presentation that makes it unique. Spring rolls bounce from actual springs, and chocolate covered strawberries are on long sticks, protruding from imaginary gardens.
While on board, most of us booked same time, next year. I always ask: Why shovel snow when you can shovel sand?
For more information or to book a trip, contact "Commodore" Camille today.
This article was accurate when it was written, but everything in life changes. Enjoy the journey! | 2024-07-18T01:26:35.434368 | https://example.com/article/7416 |
// +build !amd64
package cuckoo
import (
"math/bits"
"unsafe"
)
const (
x7F = uint64(0x7F7F7F7F7F7F7F7F)
x80 = uint64(0x8080808080808080)
)
func CountNonzeroBytes(buf []byte) (count uint) {
l := len(buf) - len(buf)%8
for _, v := range buf[l:] {
if v != 0 {
count++
}
}
bin := (*[1 << 20]uint64)(unsafe.Pointer(&buf[0]))[: l/8 : l/8]
for _, w := range bin {
w = (w & x80) | (((w & x7F) + x7F) & x80)
count += uint(bits.OnesCount64(w))
}
return count
}
| 2024-03-23T01:26:35.434368 | https://example.com/article/9438 |
Pension and divorce consultancy Divorce LifeLine claims that as many as half of all divorce settlements in the UK since December 2000 may have had the pension undervalued when a settlement was reached.
It believes that around 750,000 people may have been affected and will be entitled to claim thousands of pounds from lawyers.
Divorce Lifeline founding partner Tony Derbyshire said: “As pensions are such complex financial assets, calculating the true value of a pension in a divorce settlement is difficult.
“It is easy undervalue the pension without the expert advice of an actuary or independent financial advisor (IFA) and it seems most divorce lawyers have failed to seek this advice.
“The information that we have obtained reveals cause for concern. In the vast majority of the cases we have seen so far this year, the divorce solicitors should have had the pension valued by a professional such as an actuary or an independent financial advisor, as part of the divorce settlement process, but they did not.” | 2024-02-11T01:26:35.434368 | https://example.com/article/5160 |
EXPORTS
?HasProgramCounter@TTraceContext@@QBE?AW4THasProgramCounter@@XZ @ 1 NONAME ; enum THasProgramCounter TTraceContext::HasProgramCounter(void) const
?OstTrace@@YAHABVTTraceContext@@GE@Z @ 2 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, unsigned char)
?OstTrace@@YAHABVTTraceContext@@G@Z @ 3 NONAME ; int OstTrace(class TTraceContext const &, unsigned short)
?OstTrace@@YAHABVTTraceContext@@GPBXH@Z @ 4 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, void const *, int)
?DefaultComponentId@TTraceContext@@SAKXZ @ 5 NONAME ; unsigned long TTraceContext::DefaultComponentId(void)
?HasThreadIdentification@TTraceContext@@QBE?AW4THasThreadIdentification@@XZ @ 6 NONAME ; enum THasThreadIdentification TTraceContext::HasThreadIdentification(void) const
?OstTrace@@YAHABVTTraceContext@@GG@Z @ 7 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, unsigned short)
?OstTrace@@YAHABVTTraceContext@@GABVTDesC16@@@Z @ 8 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, class TDesC16 const &)
?OstPrint@@YAHABVTTraceContext@@ABVTDesC8@@@Z @ 9 NONAME ; int OstPrint(class TTraceContext const &, class TDesC8 const &)
?OstTrace@@YAHABVTTraceContext@@GKK@Z @ 10 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, unsigned long, unsigned long)
?IsTraceActive@@YAHABVTTraceContext@@@Z @ 11 NONAME ; int IsTraceActive(class TTraceContext const &)
?OstTrace@@YAHABVTTraceContext@@GABVTDesC8@@@Z @ 12 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, class TDesC8 const &)
?OstTrace@@YAHABVTTraceContext@@GK@Z @ 13 NONAME ; int OstTrace(class TTraceContext const &, unsigned short, unsigned long)
?OstPrint@@YAHABVTTraceContext@@ABVTDesC16@@@Z @ 14 NONAME ; int OstPrint(class TTraceContext const &, class TDesC16 const &)
?OstPrintf@@YAHABVTTraceContext@@V?$TRefByValue@$$CBVTDesC16@@@@ZZ @ 15 NONAME ; int OstPrintf(class TTraceContext const &, class TRefByValue<class TDesC16 const >, ...)
?ComponentId@TTraceContext@@QBEKXZ @ 16 NONAME ; unsigned long TTraceContext::ComponentId(void) const
?Classification@TTraceContext@@QBEEXZ @ 17 NONAME ; unsigned char TTraceContext::Classification(void) const
?OstPrintf@@YAHABVTTraceContext@@V?$TRefByValue@$$CBVTDesC8@@@@ZZ @ 18 NONAME ; int OstPrintf(class TTraceContext const &, class TRefByValue<class TDesC8 const >, ...)
?OstPrintf@@YAHABVTTraceContext@@PBDZZ @ 19 NONAME ; int OstPrintf(class TTraceContext const &, char const *, ...)
?GroupId@TTraceContext@@QBEEXZ @ 20 NONAME ; unsigned char TTraceContext::GroupId(void) const
| 2024-06-03T01:26:35.434368 | https://example.com/article/9162 |
program problem11203_2doIntento (input, output);
{$APPTYPE CONSOLE}
Function StrToInt(Const S: String): Integer;
Var
E: Integer;
Begin
Val(S, Result, E);
End;
function ocurrencias(const s: string; const c:char) : integer;
var
i : integer;
begin
result := 0;
for i:=0 to length(s) do
if s[i] = c then
inc(result);
end;
function isTheorem(s : string) : boolean;
var
i, x, y, z : integer;
posM, posE : integer;
begin
result := false;
x := 0; y := 0; z := 0;
if (ocurrencias(s, 'M') = 1) and (ocurrencias(s, 'E') = 1) and (ocurrencias(s, '?') >= 4) then
begin
posM := pos('M', s);
for i:=1 to posM-1 do
if (s[i] = '?') then
inc(x)
else
exit;
s := copy(s, posM + 1, length(s));
posE := pos('E', s);
for i:=1 to posE-1 do
if (s[i] = '?') then
inc(y)
else
exit;
s := copy(s, posE + 1, length(s));
for i:=1 to length(s) do
if (s[i] = '?') then
inc(z)
else
exit;
result := (x + y = z) and (x*y*z <> 0);
end;
end;
var
howMany : integer;
i, principalLoop : integer;
line : String;
correctChars : Set of char;
invalid : boolean;
//Main:
begin
//reset(input, 'input.txt');
//reset(output, 'out.txt');
correctChars := ['M', 'E', '?'];
readLn(line);
howMany := strToInt(line);
for principalLoop := 1 to howMany do
begin
invalid := false;
readLn(line);
for i := 1 to length(line) do
if not (line[i] in correctChars) then
invalid := true;
if invalid then
writeLn('no-theorem')
else
begin
if isTheorem(line) then
writeLn('theorem')
else
writeLn('no-theorem');
end;
end;
end.
| 2024-07-23T01:26:35.434368 | https://example.com/article/7898 |
*Choose One Size per Box for DPx16Tri 135x16Tri for DPx17, 135x17 Regular Needle Walking Foot Upholstery Sewing Machines, slices through the leather like materials while making a cleanly cut needle hole...
Read More
*Choose One Size per Box for DPx16Tri 135x16Tri for DPx17, 135x17 Regular Needle Walking Foot Upholstery Sewing Machines, slices through the leather like materials while making a cleanly cut needle hole.
The 135x16TRI(Triangular Point) are available in 14,16,18,19,20,21,22,23,& 24
The Diamond Point and TRI Points are generally used on harder leathers like belts. The Diamond Point has a smaller hole than the TRI.
The Narrow Wedge are generally used on softer leathers
A standard “set” or “sharp” point needle punches its way through leather like materials which may make irregularly or undesirably shaped needle holes. The wedge point “slices” through the leather like materials while making a cleanly cut needle hole.
Specifications
Needle System 135x17 for Upholstery or 135x16 for Leather Vinyl Industrial Sewing Machines
AllBrands.com
Prices in USD. Electrical 110 Volts. Match power source voltage with machine voltage.
Do not replace plug end. We reserve the right to correct any price, typographical, photographic,
color or product page production errors without notice. | 2023-12-22T01:26:35.434368 | https://example.com/article/9091 |
#ifndef PRIVATE_H
#define PRIVATE_H
#define USE_FLOAT_MUL
#define FAST
#define WAV49
#ifdef __cplusplus
#error "This code is not designed to be compiled with a C++ compiler."
#endif
typedef short word; /* 16 bit signed int */
typedef int longword; /* 32 bit signed int */
typedef unsigned short uword; /* unsigned word */
typedef unsigned int ulongword; /* unsigned longword */
struct gsm_state
{ word dp0[ 280 ] ;
word z1; /* preprocessing.c, Offset_com. */
longword L_z2; /* Offset_com. */
int mp; /* Preemphasis */
word u[8] ; /* short_term_aly_filter.c */
word LARpp[2][8] ; /* */
word j; /* */
word ltp_cut; /* long_term.c, LTP crosscorr. */
word nrp; /* 40 */ /* long_term.c, synthesis */
word v[9] ; /* short_term.c, synthesis */
word msr; /* decoder.c, Postprocessing */
char verbose; /* only used if !NDEBUG */
char fast; /* only used if FAST */
char wav_fmt; /* only used if WAV49 defined */
unsigned char frame_index; /* odd/even chaining */
unsigned char frame_chain; /* half-byte to carry forward */
/* Moved here from code.c where it was defined as static */
word e[50] ;
} ;
typedef struct gsm_state GSM_STATE ;
#define MIN_WORD (-32767 - 1)
#define MAX_WORD 32767
#define MIN_LONGWORD (-2147483647 - 1)
#define MAX_LONGWORD 2147483647
/* Signed arithmetic shift right. */
static inline word
SASR_W (word x, word by)
{ return (x >> by) ;
} /* SASR */
static inline longword
SASR_L (longword x, word by)
{ return (x >> by) ;
} /* SASR */
/*
* Prototypes from add.c
*/
word gsm_mult (word a, word b) ;
longword gsm_L_mult (word a, word b) ;
word gsm_mult_r (word a, word b) ;
word gsm_div (word num, word denum) ;
word gsm_add (word a, word b ) ;
longword gsm_L_add (longword a, longword b ) ;
word gsm_sub (word a, word b) ;
longword gsm_L_sub (longword a, longword b) ;
word gsm_abs (word a) ;
word gsm_norm (longword a ) ;
longword gsm_L_asl (longword a, int n) ;
word gsm_asl (word a, int n) ;
longword gsm_L_asr (longword a, int n) ;
word gsm_asr (word a, int n) ;
/*
* Inlined functions from add.h
*/
static inline longword
GSM_MULT_R (word a, word b)
{ return (((longword) (a)) * ((longword) (b)) + 16384) >> 15 ;
} /* GSM_MULT_R */
static inline longword
GSM_MULT (word a, word b)
{ return (((longword) (a)) * ((longword) (b))) >> 15 ;
} /* GSM_MULT */
static inline longword
GSM_L_MULT (word a, word b)
{ return ((longword) (a)) * ((longword) (b)) << 1 ;
} /* GSM_L_MULT */
static inline longword
GSM_L_ADD (longword a, longword b)
{ ulongword utmp ;
if (a < 0 && b < 0)
{ utmp = (ulongword)-((a) + 1) + (ulongword)-((b) + 1) ;
return (utmp >= (ulongword) MAX_LONGWORD) ? MIN_LONGWORD : -(longword)utmp-2 ;
} ;
if (a > 0 && b > 0)
{ utmp = (ulongword) a + (ulongword) b ;
return (utmp >= (ulongword) MAX_LONGWORD) ? MAX_LONGWORD : utmp ;
} ;
return a + b ;
} /* GSM_L_ADD */
static inline longword
GSM_ADD (word a, word b)
{ longword ltmp ;
ltmp = ((longword) a) + ((longword) b) ;
if (ltmp >= MAX_WORD)
return MAX_WORD ;
if (ltmp <= MIN_WORD)
return MIN_WORD ;
return ltmp ;
} /* GSM_ADD */
static inline longword
GSM_SUB (word a, word b)
{ longword ltmp ;
ltmp = ((longword) a) - ((longword) b) ;
if (ltmp >= MAX_WORD)
ltmp = MAX_WORD ;
else if (ltmp <= MIN_WORD)
ltmp = MIN_WORD ;
return ltmp ;
} /* GSM_SUB */
static inline word
GSM_ABS (word a)
{
if (a > 0)
return a ;
if (a == MIN_WORD)
return MAX_WORD ;
return -a ;
} /* GSM_ADD */
/*
* More prototypes from implementations..
*/
void Gsm_Coder (
struct gsm_state * S,
word * s, /* [0..159] samples IN */
word * LARc, /* [0..7] LAR coefficients OUT */
word * Nc, /* [0..3] LTP lag OUT */
word * bc, /* [0..3] coded LTP gain OUT */
word * Mc, /* [0..3] RPE grid selection OUT */
word * xmaxc,/* [0..3] Coded maximum amplitude OUT */
word * xMc) ;/* [13*4] normalized RPE samples OUT */
void Gsm_Long_Term_Predictor ( /* 4x for 160 samples */
struct gsm_state * S,
word * d, /* [0..39] residual signal IN */
word * dp, /* [-120..-1] d' IN */
word * e, /* [0..40] OUT */
word * dpp, /* [0..40] OUT */
word * Nc, /* correlation lag OUT */
word * bc) ; /* gain factor OUT */
void Gsm_LPC_Analysis (
struct gsm_state * S,
word * s, /* 0..159 signals IN/OUT */
word * LARc) ; /* 0..7 LARc's OUT */
void Gsm_Preprocess (
struct gsm_state * S,
word * s, word * so) ;
void Gsm_Encoding (
struct gsm_state * S,
word * e,
word * ep,
word * xmaxc,
word * Mc,
word * xMc) ;
void Gsm_Short_Term_Analysis_Filter (
struct gsm_state * S,
word * LARc, /* coded log area ratio [0..7] IN */
word * d) ; /* st res. signal [0..159] IN/OUT */
void Gsm_Decoder (
struct gsm_state * S,
word * LARcr, /* [0..7] IN */
word * Ncr, /* [0..3] IN */
word * bcr, /* [0..3] IN */
word * Mcr, /* [0..3] IN */
word * xmaxcr, /* [0..3] IN */
word * xMcr, /* [0..13*4] IN */
word * s) ; /* [0..159] OUT */
void Gsm_Decoding (
struct gsm_state * S,
word xmaxcr,
word Mcr,
word * xMcr, /* [0..12] IN */
word * erp) ; /* [0..39] OUT */
void Gsm_Long_Term_Synthesis_Filtering (
struct gsm_state* S,
word Ncr,
word bcr,
word * erp, /* [0..39] IN */
word * drp) ; /* [-120..-1] IN, [0..40] OUT */
void Gsm_RPE_Decoding (
/*-struct gsm_state *S,-*/
word xmaxcr,
word Mcr,
word * xMcr, /* [0..12], 3 bits IN */
word * erp) ; /* [0..39] OUT */
void Gsm_RPE_Encoding (
/*-struct gsm_state * S,-*/
word * e, /* -5..-1][0..39][40..44 IN/OUT */
word * xmaxc, /* OUT */
word * Mc, /* OUT */
word * xMc) ; /* [0..12] OUT */
void Gsm_Short_Term_Synthesis_Filter (
struct gsm_state * S,
word * LARcr, /* log area ratios [0..7] IN */
word * drp, /* received d [0...39] IN */
word * s) ; /* signal s [0..159] OUT */
void Gsm_Update_of_reconstructed_short_time_residual_signal (
word * dpp, /* [0...39] IN */
word * ep, /* [0...39] IN */
word * dp) ; /* [-120...-1] IN/OUT */
/*
* Tables from table.c
*/
#ifndef GSM_TABLE_C
extern word gsm_A [8], gsm_B [8], gsm_MIC [8], gsm_MAC [8] ;
extern word gsm_INVA [8] ;
extern word gsm_DLB [4], gsm_QLB [4] ;
extern word gsm_H [11] ;
extern word gsm_NRFAC [8] ;
extern word gsm_FAC [8] ;
#endif /* GSM_TABLE_C */
/*
* Debugging
*/
#ifdef NDEBUG
# define gsm_debug_words(a, b, c, d) /* nil */
# define gsm_debug_longwords(a, b, c, d) /* nil */
# define gsm_debug_word(a, b) /* nil */
# define gsm_debug_longword(a, b) /* nil */
#else /* !NDEBUG => DEBUG */
void gsm_debug_words (char * name, int, int, word *) ;
void gsm_debug_longwords (char * name, int, int, longword *) ;
void gsm_debug_longword (char * name, longword) ;
void gsm_debug_word (char * name, word) ;
#endif /* !NDEBUG */
#endif /* PRIVATE_H */
| 2023-11-21T01:26:35.434368 | https://example.com/article/2880 |
// Copyright The OpenTelemetry Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package zipkinexporter
import (
"encoding/json"
"testing"
zipkinmodel "github.com/openzipkin/zipkin-go/model"
"github.com/stretchr/testify/require"
)
func unmarshalZipkinSpanArrayToMap(t *testing.T, jsonStr string) map[zipkinmodel.ID]*zipkinmodel.SpanModel {
var i interface{}
err := json.Unmarshal([]byte(jsonStr), &i)
require.NoError(t, err)
results := make(map[zipkinmodel.ID]*zipkinmodel.SpanModel)
switch x := i.(type) {
case []interface{}:
for _, j := range x {
span := jsonToSpan(t, j)
results[span.ID] = span
}
default:
span := jsonToSpan(t, x)
results[span.ID] = span
}
return results
}
func jsonToSpan(t *testing.T, j interface{}) *zipkinmodel.SpanModel {
b, err := json.Marshal(j)
require.NoError(t, err)
span := &zipkinmodel.SpanModel{}
err = span.UnmarshalJSON(b)
require.NoError(t, err)
return span
}
| 2024-07-30T01:26:35.434368 | https://example.com/article/3387 |
Viruses are the leading cause of infections after solid organ transplant. The antiviral properties of mammalian target of rapamycin inhibitors (mTORis) have been ascribed to a variety of mechanisms and historical data have supported their use over other immunosuppressants for a myriad of viruses. Herein, we summarize the most current data to highlight the role of mTORis in the management of viral infections after solid organ transplant. The mTORis play a clear role in the management of cytomegalovirus, and have data supporting their potential use for BK virus and human herpesvirus 8-related Kaposi sarcoma...
With the recent introduction of more potent modern immunosuppressive regimens in solid-organ transplant, new types of viral infections such as adenovirus are emerging as a potential cause for graft dysfunction and loss. We report a case of 41-year-old male patient with end-stage renal disease from recurrent kidney stones who underwent kidney transplant from a deceased 12-year-old female donor. He developed adenoviral infection with acute cystitis, microscopic hematuria, and necrotizing interstitial nephritis associated with graft dysfunction within the first month of the postoperative period...
BACKGROUND: The immunosuppressive agents mycophenolate acid (MPA) and tacrolimus (Tac) are associated with a higher incidence of BK polyomavirus nephropathy (BKPyVAN). In this observational retrospective cohort study, the frequency of BK polyomavirus (BKPyV) complications over a 24-month period was studied. METHODS: 358 renal transplant recipients (RTR) treated with MPA, with either cyclosporine A (CsA) (CsAM group) or Tac (TacM group) and mostly prednisolone, were included...
BK virus nephropathy (BKVN) and allograft rejection are two distinct disease entities which occur at opposite ends of the immune spectrum. However, they coexist in renal transplant recipients. Predisposing factors for this coexistence remain elusive. We identified nine biopsy-proven BKVN patients with coexisting acute rejection, and 21 patients with BKVN alone. We retrospectively analyzed the dosage and blood concentrations of immunosuppressants during the 3-month period prior to the renal biopsy between the two patient groups...
BACKGROUND: While screening for asymptomatic BK viremia (BKV) has been well studied in isolated kidney transplant recipients, there is a paucity of published outcomes in simultaneous pancreas-kidney (SPK) transplant recipients who underwent BKV screening followed by pre-emptive reduction in immunosuppression. METHODS: This is a single-center, retrospective review of 31 consecutive SPK recipients who were transplanted over a 5-year period following the initiation of a serum BKV screening protocol...
AIM: Тo compare morphological changes and results of immunohistochemical (IHC) identification of viruses (polyomaviruses, adenoviruses, and herpesviruses) in the biopsy specimens with their clinical manifestations in recipients of renal transplants. MATERIAL AND METHODS: Morphological and IHC studies were conducted using 71 needle renal transplant biopsy specimens from patients in the study group and 10 renal biopsy specimens from those in the control group. A number of clinical indicators were estimated...
Posttransplant lymphoproliferative disorder (PTLD) is a serious complication in organ transplant recipients and is most often associated with the Epstein Barr virus (EBV). EBV is a common gammaherpes virus with tropism for B lymphocytes and infection in immunocompetent individuals is typically asymptomatic and benign. However, infection in immunocompromised or immunosuppressed individuals can result in malignant B cell lymphoproliferations, such as PTLD. EBV+ PTLD can arise after primary EBV infection, or because of reactivation of a prior infection, and represents a leading malignancy in the transplant population...
Cytomegalovirus (CMV) is the most common viral infection during the post-transplant period, and it is one of the major causes of morbidity and mortality in kidney transplantation. In this study, the incidence and impact of pre-emptive and prophylactic approaches and long-term effects on graft and patient survival of CMV infection were investigated. Among 493 adult kidney transplant recipients, pretransplant CMV IgG-negative patients and patients with a follow-up shorter than a month were excluded. The patients were divided into 2 groups: pre-emptive group (n = 187, regular screening and acyclovir 400 mg twice daily for 6 months), and prophylaxis group (n = 275, valganciclovir 450 mg/d for 3 months)...
BACKGROUND: Norovirus (NV) infection has been reported as a cause of severe chronic diarrhea in transplant recipients, but this entity remains under-recognized in clinical practice, leading to diagnostic delays. Transplant clinicians should become familiar with this syndrome in order to facilitate early detection and management. METHODS: Demographic, clinical, and outcomes variables were summarized from a series of transplant recipients with positive stool NV reverse transcription polymerase chain reaction (RT-PCR) assays at Johns Hopkins in 2013-2014...
OBJECTIVES: Our objective was to study the clinico-pathologic correlations in BK virus nephropathy. MATERIALS AND METHODS: We conducted a retrospective study of all patients with biopsy-proven polyoma (BK) virus infection. We compared their survival and renal outcomes versus BK virus-negative patients with biopsy-proven graft rejection. Histopathologic characterization by a blinded nephropathologist was performed. RESULTS: BK nephropathy was found in 10 patients biopsied for graft dysfunction...
Human Cytomegalovirus (CMV) can lead to primary infection or reactivation in CMV-seronegative or -seropositive kidney transplant recipients, respectively. Complications comprise severe end-organ diseases and acute or chronic transplant rejection. Risk for CMV manifestation is stratified according to the CMV-IgG-serostatus, with donor+/recipient- (D+/R-) patients carrying the highest risk for CMV-replication. However, risk factors predisposing for primary infection in CMV-seronegative recipients are still not fully elucidated...
Cytomegalovirus (CMV), human herpes virus (HHV)-6, and HHV-7 are ubiquitous β-herpesviruses that can cause opportunistic infection and disease in kidney transplant recipients. Active CMV infection and disease are associated with acute allograft failure and death, and HHV-6 and HHV-7 replication are associated with CMV disease. CMV prevention strategies are used commonly after kidney transplantation, and include prophylaxis with antiviral medications and preemptive treatment upon the detection of asymptomatic viral replication in blood... | 2024-05-19T01:26:35.434368 | https://example.com/article/2299 |
<?xml version="1.0" encoding="utf-8" ?>
<sample:SampleView x:Class="SampleBrowser.SfDataGrid.GridGettingStartedMacOS"
xmlns="http://xamarin.com/schemas/2014/forms"
xmlns:x="http://schemas.microsoft.com/winfx/2009/xaml"
xmlns:local="clr-namespace:SampleBrowser.SfDataGrid"
xmlns:sample="clr-namespace:SampleBrowser.Core;assembly=SampleBrowser.Core"
xmlns:sfgrid="clr-namespace:Syncfusion.SfDataGrid.XForms;assembly=Syncfusion.SfDataGrid.XForms"
xmlns:sys="clr-namespace:System;assembly=mscorlib">
<sample:SampleView.Resources>
<ResourceDictionary>
<OnPlatform x:Key="minimumWidth"
x:TypeArguments="x:Double">
<On Platform="Android,UWP,iOS">
<OnIdiom x:TypeArguments="x:Double"
Phone="90"
Tablet="20"/>
</On>
</OnPlatform>
<OnPlatform x:Key="hidden"
x:TypeArguments="x:Boolean">
<On Platform ="Android,UWP,iOS">
<OnIdiom x:TypeArguments="x:Boolean"
Phone="True"
Tablet="False"/>
</On>
</OnPlatform>
<OnPlatform x:Key="opacity"
x:TypeArguments="x:Double">
<On Platform="iOS,Android" Value="87" />
<On Platform="UWP" Value="80" />
</OnPlatform>
<OnPlatform x:Key="padding"
x:TypeArguments="Thickness">
<On Platform="Android,iOS" Value="8, 12, 8, 12" />
<On Platform="UWP" Value="8, 12, 8, 16" />
</OnPlatform>
<OnPlatform x:Key="textSize"
x:TypeArguments="x:Double">
<On Platform="iOS,UWP" Value="14" />
<On Platform="Android" Value="13" />
</OnPlatform>
<OnPlatform x:Key="font"
x:TypeArguments="x:String">
<On Platform="Android" Value="Roboto-Regular" />
<On Platform="iOS" Value="SFProText-Regular" />
<On Platform="UWP" Value="SegoeUI" />
</OnPlatform>
</ResourceDictionary>
</sample:SampleView.Resources>
<sample:SampleView.BindingContext>
<local:DataBindingViewModel x:Name="viewModel" />
</sample:SampleView.BindingContext>
<sample:SampleView.Content>
<sfgrid:SfDataGrid x:Name="dataGrid"
ItemsSource="{Binding OrdersInfo}"
AllowResizingColumn="True"
AutoGenerateColumns="false"
ColumnSizer="Star"
GridStyle="{local:DefaultStyle}"
HeaderRowHeight="52"
RowHeight="48"
SelectionMode="Single"
VerticalOverScrollMode="None">
<sfgrid:SfDataGrid.Columns x:TypeArguments="sfgrid:Columns">
<sfgrid:GridTextColumn HeaderFontAttribute="Bold"
HeaderText="Order ID"
HeaderTextAlignment="Start"
LineBreakMode="TailTruncation"
MappingName="OrderID"
Padding="5,0,5,0"
HeaderCellTextSize="{StaticResource textSize}"
CellTextSize="{StaticResource textSize}"
TextAlignment="End">
</sfgrid:GridTextColumn>
<sfgrid:GridTextColumn HeaderFontAttribute="Bold"
HeaderText="Customer ID"
HeaderTextAlignment="Start"
LineBreakMode="TailTruncation"
MappingName="EmployeeID"
Padding="5,0,5,0"
HeaderCellTextSize="{StaticResource textSize}"
MinimumWidth="{StaticResource minimumWidth}"
CellTextSize="{StaticResource textSize}"
TextAlignment="End">
</sfgrid:GridTextColumn>
<sfgrid:GridTextColumn HeaderFontAttribute="Bold"
HeaderText="Name"
HeaderTextAlignment="Start"
LineBreakMode="TailTruncation"
MappingName="CustomerID"
Padding="5, 0, 0, 0"
HeaderCellTextSize="{StaticResource textSize}"
CellTextSize="{StaticResource textSize}"
TextAlignment="Start">
</sfgrid:GridTextColumn>
<sfgrid:GridTextColumn HeaderFontAttribute="Bold"
HeaderText="City"
HeaderTextAlignment="Start"
LineBreakMode="TailTruncation"
MappingName="ShipCity"
Padding="5, 0, 0, 0"
HeaderCellTextSize="{StaticResource textSize}"
CellTextSize="{StaticResource textSize}"
TextAlignment="Start">
</sfgrid:GridTextColumn>
<sfgrid:GridTextColumn HeaderFontAttribute="Bold"
HeaderTextAlignment="Start"
LineBreakMode="TailTruncation"
MappingName="Freight"
Format="C"
Padding="5,0,5,0"
IsHidden="{StaticResource hidden}"
HeaderCellTextSize="{StaticResource textSize}"
MinimumWidth="{StaticResource minimumWidth}"
CellTextSize="{StaticResource textSize}"
TextAlignment="End">
</sfgrid:GridTextColumn>
</sfgrid:SfDataGrid.Columns>
</sfgrid:SfDataGrid>
</sample:SampleView.Content>
<sample:SampleView.PropertyView>
<Grid ColumnSpacing="10" Padding="20">
<Grid.RowDefinitions>
<RowDefinition Height="Auto" />
<RowDefinition Height="Auto" />
</Grid.RowDefinitions>
<Label x:Name="collectionType"
Grid.Row="0"
HorizontalOptions="Start"
Text="Collection Type"
VerticalOptions="Center">
<Label.FontSize>
<OnPlatform x:TypeArguments="x:Double"
Android="15"
WinPhone="20"
iOS="15" />
</Label.FontSize>
</Label>
<local:PickerExt x:Name="SelectionPicker"
Title="Choose"
Grid.Row="1"
HorizontalOptions="StartAndExpand"
SelectedIndex = "0">
</local:PickerExt>
</Grid>
</sample:SampleView.PropertyView>
</sample:SampleView> | 2023-12-21T01:26:35.434368 | https://example.com/article/2275 |
Company that had contract worker removed after she claimed harassment may be liable as joint employer
By Kathleen Kapusta, J.D.
Finding no evidence that a company’s "independent concerns" regarding a contract employee’s "gossipy" and "flirtatious" behavior—which resulted in her removal from her position—would have been raised absent her allegations of sexual harassment, a federal district court in Ohio could not find as a matter of law that the company’s stated reason for its removal request was nondiscriminatory. After finding that the company might be a joint employer, the court denied its motion for summary judgment on her Title VII retaliation claim. However, her claim against her employer, in which she alleged that it ratified the company’s retaliatory conduct, failed. Because the company was a separate and distinct legal entity unaffiliated with the employer, she was unable as a matter of law to prevail on a cat’s paw theory of liability (Burt v. Maple Knoll Communities, Inc., July 19, 2106, Black, T.).
Removal. Employed by National Church, a property management and supportive social services company, the employee worked as a service coordinator for Maple Knoll (MK) pursuant to a contract between the companies. When an MK maintenance worker purportedly showed her a photo of his penis, she reported the incident to both companies. During MK’s investigation into the incident, it determined that the employee "engaged in gossipy behavior, likely to be detrimental" to its residents by telling others the alleged harasser was a sexual predator. The company also determined that the employee had fostered an inappropriate relationship with the maintenance worker. At MK’s request, National Church removed her from her service coordinator position. It terminated her employment that same day.
The employee then sued both companies, asserting claims for retaliation in violation of Title VII and the Ohio Fair Employment Practices Act. She also sued MK’s HR director under Ohio common law.
Joint employment? While MK argued that it was not her employer and therefore could not be held liable, the court pointed out that National Church hired her in accordance with a contract between the two companies governing the terms of her employment. In that contract, the parties negotiated the specific duties of the service coordinator position. They agreed to an hourly rate to be paid by MK to National Church for each hour worked by the service coordinator, which capped the amount paid by National Church to its employee. MK also retained the right to approve those hired by National Church and the right to, in its sole discretion, remove the service coordinator if deemed "unsatisfactory."
Observing that MK hired and fired the employee and determined the amount she was compensated, the court found that a reasonable jury could conclude that both companies jointly controlled her position sufficient to characterize MK as her employer.
Retaliation by MK. Turning to the employee’s retaliation claim against MK, the court noted evidence that after she reported the incident, she became frustrated at the investigation’s slow pace. The HR director, learning about her increasing agitation, determined that her continued employment would be disruptive as residents might ask a lot of questions, and she was uncomfortable with how the employee was portraying the situation. This "concern," which was admittedly a factor in the HR director’s removal decision, could be offered as direct evidence of retaliatory animus, said the court.
And even if the employee could not establish her claim through direct evidence, the court found she established a prima facie case under the indirect method. The adverse action at issue was the employee’s removal from the service coordinator position, and not National Church’s failure to place her in another position, stressed the court, pointing out that MK had the sole discretion to remove her. Further, the parties’ contract provided that if an employee was removed due to dissatisfaction with her performance, National Church could terminate the agreement. Thus, MK knew its decision could result in the employee’s termination.
Observing that MK’s HR director stated that her "main concern" in terminating the employee was that she might provide inappropriate information to residents regarding the alleged incident, the court suggested that had the employee not reported the harassment, she would not have been removed and ultimately terminated. Thus, she established a causal connection between her protected activity and the adverse action.
Pretext. There was also evidence of pretext, said the court, noting that an allegation that the maintenance worker and the employee had regularly engaged in sexual banter was a disputed fact issue, which ignored her accusation that he had engaged in unwanted sexual harassment. And while the HR director claimed witnesses observed the employee snuggling up to the worker, one witness testified that what she told the director about the employee and the worker was very different from the director’s report of the incident. Further, there was evidence that the maintenance worker had engaged in inappropriate behavior with other MK employees and regularly engaged a coworker in discussions about sexually related matters. Since numerous disputed fact issues existed, summary judgment was inappropriate on this claim.
Retaliation claim against National Church. Because the adverse employment action at issue was the employee’s removal from her position by MK, her retaliation claim against National Church turned on whether MK’s allegedly retaliatory animus could be attributed to National Church, despite her admission that it was not involved in, nor had reason to doubt the accuracy of, the investigation leading to her removal. Here, the court found that even if MK’s investigatory findings were pretext for illegal retaliation, the employee could not use a cat’s paw theory to impute a retaliatory animus to National Church. Notably, she did not allege that National Church possessed its own illegal retaliatory animus, but rather that it violated the law by adopting MK’s retaliatory conduct.
Courts in the Sixth Circuit have not addressed whether the cat’s paw theory will, as a matter of law, impute liability to an employer in circumstances where a third party, who is neither an agent nor an employee of the employer, allegedly acts on an illegal animus. Because the employee only alleged that National Church "ratified" MK’s retaliatory conduct, and since MK was a separate and distinct legal entity unaffiliated with National Church, the court found she could not as a matter of law prevail on her cat’s paw theory of liability with respect to National Church.
Common law claim. For the same reasons that the retaliation claim against MK survived summary judgment, the court found that the employee’s common law claim against the HR director, in which she alleged the director was personally liable for retaliating against her, also survived.
Create a PasswordPlease enter a PasswordYour password must be at least 6 characters longNo validation was done for leading or trailing spaces in password.
Yes, I would like to create an account.
I consent to the collection of my personal information by Wolters Kluwer Legal & Regulatory U.S., operated through CCH Incorporated and its affiliate Kluwer Law International, so that I can create an account to store my contact information and order history to facilitate ecommerce transactions. I understand that my personal information will be processed for this purpose in the United States where CCH Incorporated operates.
You may change or withdraw your consent at any time by contacting our Customer Service team at +1-301-698-7100 or [email protected]. For more information about our privacy practices, please refer to our privacy statement: www.WoltersKluwerLR.com/privacy.
Online subscription product purchases require that you create an account.
Email Address
This field is required
Please Type Valid Email Address
Email Address has a minimum length of 0.
Company
This field is required
Country
This field is required
Yes, send me information on similar products and content from Wolters Kluwer.
I consent to the collection of my personal information by Wolters Kluwer Legal & Regulatory U.S., operated through CCH Incorporated and its affiliate Kluwer Law International, so that I can be contacted about similar product(s) and content. I understand that my personal information will be processed for this purpose in the United States where CCH Incorporated operates. Additionally, if the products being inquired about are fulfilled by Kluwer Law International, my personal information will be shared with Kluwer Law International and processed in the Netherlands or the United Kingdom where it operates.
You may change or withdraw your consent at any time by contacting our Customer Service team at +1-301-698-7100 or [email protected]. For more information about our privacy practices, please refer to our privacy statement: www.WoltersKluwerLR.com/privacy.
Thank you!
We apologize!
Interested in submitting an article?
First Name
This field is required
Last Name
This field is required
Email Address
This field is required
Please Type Valid Email Address
Area of Expertise
This field is required
Article Idea for Consideration
This field is required
Yes, send me information on similar products and content from Wolters Kluwer.
I consent to the collection of my personal information by Wolters Kluwer Legal & Regulatory U.S., operated through CCH Incorporated and its affiliate Kluwer Law International, so that I can be contacted about similar product(s) and content. I understand that my personal information will be processed for this purpose in the United States where CCH Incorporated operates. Additionally, if the products being inquired about are fulfilled by Kluwer Law International, my personal information will be shared with Kluwer Law International and processed in the Netherlands or the United Kingdom where it operates.
You may change or withdraw your consent at any time by contacting our Customer Service team at +1-301-698-7100 or [email protected]. For more information about our privacy practices, please refer to our privacy statement: www.WoltersKluwerLR.com/privacy.
Success
We appologize
Message Us
Thank you for your inquiry! We look forward to connecting with you.
First Name
This field is required
Last Name
This field is required
Email Address
This field is required
Please Type Valid Email Address
Phone Number
This field is required
Company Name
This field is required
Country
This field is required
Topic (Optional)Account or Invoice Number (Optional)Comments (Optional)
Thank you. We will contact you soon!
We apologize, but we failed to receive this message.
Thank You!
Thank You.
Your request has been forwarded to a Wolters Kluwer representative who will contact you shortly! | 2023-10-26T01:26:35.434368 | https://example.com/article/3358 |
e: 2, k: 1, l: 1, m: 2}. What is prob of picking 2 m and 1 l?
1/56
What is prob of picking 1 v and 2 u when three letters picked without replacement from {v: 2, u: 5}?
4/7
Calculate prob of picking 1 i and 1 o when two letters picked without replacement from irmqosrqsrismi.
3/91
Three letters picked without replacement from {v: 1, e: 11}. Give prob of picking 3 e.
3/4
Two letters picked without replacement from tqqttqqtqt. What is prob of picking 2 t?
2/9
Calculate prob of picking 1 s and 1 k when two letters picked without replacement from {m: 1, b: 2, s: 4, y: 1, k: 2}.
8/45
Two letters picked without replacement from hhhhhhhhqhqqhhhhhhhh. What is prob of picking 1 q and 1 h?
51/190
Four letters picked without replacement from {c: 3, v: 3, z: 1, o: 2, e: 1}. What is prob of picking 3 o and 1 z?
0
Three letters picked without replacement from {a: 2, x: 7, r: 1}. What is prob of picking 3 x?
7/24
Calculate prob of picking 3 f and 1 m when four letters picked without replacement from mfuvpmtf.
0
Calculate prob of picking 1 g and 1 b when two letters picked without replacement from ggogggggggoobggg.
1/10
Two letters picked without replacement from bbbbdbdbdbbbbddb. What is prob of picking 2 b?
11/24
Two letters picked without replacement from {b: 1, y: 5, r: 7}. What is prob of picking 2 r?
7/26
Two letters picked without replacement from xlvvxxlkzvxxx. Give prob of picking 1 z and 1 x.
1/13
Four letters picked without replacement from {u: 4, v: 3, j: 1, w: 2}. What is prob of picking 1 j and 3 u?
2/105
What is prob of picking 1 f, 1 p, and 1 y when three letters picked without replacement from {n: 4, y: 7, r: 4, p: 2, f: 1, t: 1}?
14/969
Calculate prob of picking 1 w and 1 n when two letters picked without replacement from {w: 3, o: 2, n: 10, j: 3, q: 1}.
10/57
Two letters picked without replacement from hcmddwihc. Give prob of picking 1 h and 1 i.
1/18
What is prob of picking 1 h, 2 j, and 1 k when four letters picked without replacement from jvvhkvjjjjvjj?
21/715
Calculate prob of picking 1 x and 1 i when two letters picked without replacement from qiixgqi.
1/7
Calculate prob of picking 1 q and 1 a when two letters picked without replacement from baababqqlbbzb.
1/13
Calculate prob of picking 3 d and 1 n when four letters picked without replacement from ddddnddddddd.
1/3
Three letters picked without replacement from {n: 4, u: 1, j: 3, g: 4, t: 2, k: 1}. Give prob of picking 1 n and 2 g.
24/455
Calculate prob of picking 1 d and 2 b when three letters picked without replacement from {d: 1, e: 1, y: 1, s: 1, b: 2, x: 2}.
1/56
Three letters picked without replacement from {s: 1, h: 5, z: 5, k: 5}. What is prob of picking 1 k, 1 s, and 1 h?
5/112
Calculate prob of picking 1 a, 1 p, and 1 w when three letters picked without replacement from sppowaayyyaw.
3/55
Three letters picked without replacement from xxhuhdxdu. Give prob of picking 1 h and 2 x.
1/14
Three letters picked without replacement from {h: 1, g: 2, s: 1, i: 1}. What is prob of picking 1 h and 2 g?
1/10
What is prob of picking 1 d, 1 i, and 2 z when four letters picked without replacement from {i: 4, d: 3, z: 4, b: 3}?
72/1001
Three letters picked without replacement from {w: 3, e: 3}. Give prob of picking 3 e.
1/20
What is prob of picking 3 d when three letters picked without replacement from qkdkqdqqddqqq?
2/143
Three letters picked without replacement from {j: 2, u: 2, o: 1, f: 1}. What is prob of picking 2 u and 1 o?
1/20
Three letters picked without replacement from mzllxxlexlelle. Give prob of picking 3 x.
1/364
Two letters picked without replacement from {z: 3, h: 12}. Give prob of picking 2 z.
1/35
Two letters picked without replacement from {n: 5, m: 8, g: 4, i: 2}. Give prob of picking 1 i and 1 n.
10/171
Four letters picked without replacement from yyttytttyttty. What is prob of picking 1 t and 3 y?
16/143
Four letters picked without replacement from {m: 1, o: 7, r: 1, z: 1, p: 5}. What is prob of picking 3 o and 1 m?
1/39
Two letters picked without replacement from {j: 1, v: 5, z: 1, t: 12}. What is prob of picking 2 v?
10/171
Calculate prob of picking 1 w and 1 a when two letters picked without replacement from {a: 2, b: 1, o: 2, v: 1, i: 1, w: 2}.
1/9
Calculate prob of picking 1 h, 1 v, and 1 m when three letters picked without replacement from fvvumvvvufhu.
1/44
Two letters picked without replacement from {x: 1, z: 2, k: 1, g: 3, u: 3}. Give prob of picking 1 z and 1 g.
2/15
Three letters picked without replacement from rtrzeoa. Give prob of picking 1 z, 1 o, and 1 t.
1/35
Three letters picked without replacement from wjbbawwabbbbbwbbbab. Give prob of picking 3 a.
1/969
What is prob of picking 1 v, 1 p, and 2 f when four letters picked without replacement from pffzvvvjfjvfpv?
60/1001
Three letters picked without replacement from keknyy. Give prob of picking 1 n and 2 k.
1/20
Two letters picked without replacement from {j: 9, k: 5, s: 2}. What is prob of picking 2 s?
1/120
Calculate prob of picking 3 c and 1 a when four letters picked without replacement from {r: 1, c: 4, a: 5}.
2/21
Calculate prob of picking 3 a when three letters picked without replacement from {v: 6, f: 3, a: 8}.
7/85
Calculate prob of picking 2 y and 2 c when four letters picked without replacement from {y: 4, s: 7, a: 2, c: 5}.
1/51
What is prob of picking 3 z and 1 r when four letters picked without replacement from zrrrzrzzrrzz?
8/33
Calculate prob of picking 1 x and 1 i when two letters picked without replacement from {i: 3, u: 2, x: 1, w: 1}.
1/7
Three letters picked without replacement from innmmhhimliihnifii. Give prob of picking 2 m and 1 n.
3/272
What is prob of picking 2 w and 1 i when three letters picked without replacement from {m: 2, w: 2, i: 1}?
1/10
Four letters picked without replacement from jjjjjjja. Give prob of picking 4 j.
1/2
Calculate prob of picking 1 x and 1 z when two letters picked without replacement from xzwzvxzzzzxzzz.
27/91
Two letters picked without replacement from otcttpo. What is prob of picking 1 p and 1 o?
2/21
What is prob of picking 1 m, 1 r, and 2 z when four letters picked without replacement from mgrrrrrrzrzrrmrr?
11/910
Two letters picked without replacement from {e: 1, j: 2, y: 2}. What is prob of picking 1 j and 1 e?
1/5
Calculate prob of picking 1 n, 1 e, and 1 t when three letters picked without replacement from taccktcncckeacc.
2/455
Calculate prob of picking 1 t and 3 x when four letters picked without replacement from {t: 2, l: 4, x: 5, v: 4}.
4/273
Four letters picked without replacement from {t: 4, i: 2}. Give prob of picking 4 t.
1/15
Calculate prob of picking 1 i and 1 q when two letters picked without replacement from jjqkyqkikkqi.
1/11
Three letters picked without replacement from sgssghsgsnsnnn. Give prob of picking 2 g and 1 n.
3/91
Two letters picked without replacement from rrxeuuxxrxrrreyx. What is prob of picking 1 r and 1 y?
1/20
Calculate prob of picking 3 g and 1 q when four letters picked without replacement from {q: 8, o: 5, g: 5}.
4/153
What is prob of picking 3 i and 1 y when four letters picked without replacement from yyeiyyiiyery?
2/165
Three letters picked without replacement from {o: 11, s: 5}. Give prob of picking 3 s.
1/56
Two letters picked without replacement from {b: 2, k: 4, z: 10}. What is prob of picking 2 z?
3/8
Calculate prob of picking 1 v and 1 u when two letters picked without replacement from uvu.
2/3
Calculate prob of picking 3 t and 1 y when four letters picked without replacement from qtttttyttttqtt.
15/91
Calculate prob of picking 1 f and 1 t when two letters picked without replacement from {f: 6, n: 5, t: 2}.
2/13
Calculate prob of picking 2 o, 1 n, and 1 f when four letters picked without replacement from {f: 1, o: 2, n: 2}.
2/5
Calculate prob of picking 1 b and 3 y when four letters picked without replacement from {q: 2, f: 7, b: 3, d: 3, y: 5}.
2/323
Three letters picked without replacement from ihhhhhmiihhihhhii. What is prob of picking 1 h and 2 i?
15/68
Two letters picked without replacement from jkyjykbybhybfbb. What is prob of picking 1 b and 1 y?
4/21
What is prob of picking 2 l, 1 e, and 1 c when four letters picked without replacement from {c: 1, e: 4, l: 5, p: 1}?
4/33
What is prob of picking | 2024-07-10T01:26:35.434368 | https://example.com/article/9449 |
Soft refining margins may cut Asian crude demand
Singapore's complex cracking margins have softened to around $3.53/bbl, from around $6.34/bbl a week earlier, data from JBC Energy showed, as margins for gasoil and kerosene fall from seasonal highs.
Keywords:
By ERIC YEP
Asia's crude-oil market is likely to be balanced in the
coming week as more regional refineries restart after maintenance, but weaker refining margins may limit refiners'
appetite for processing more crude, traders said.
Singapore's complex cracking margins have softened to around
$3.53/bbl, from around $6.34/bbl a week earlier, data from JBC
Energy showed, as margins for gasoil and kerosene fall from
seasonal highs.
Earlier this week, Dubai set the official selling price for
its October crude at parity to the Oman selling price, 5 cents
narrower than the previous month.
The spread between September Brent crude oil and Dubai crude
remains wide at around $4.18/bbl, helping boost demand for
barrels priced on the Asian benchmark.
A number of disruptions on the supply side are boosting
crude prices.
Iraqi southern crude exports could fall by as much as
500,000 bpd in September due to maintenance and rehabilitation work
at the South Oil Co. terminal, JBC Energy said.
"If confirmed, exports of Basrah Light will fall below 2
million barrels a day for the first time since April 2012. This
comes at a time when exports from Iraq are already sliding,"
JBC said.
It said disruptions at Libyan oil production and export facilities have resulted in the loss
of 150,000 bpd of production, bringing output to 1.05 million
bpd in July.
Additionally crude output from South Sudan may also be hit
as a border dispute with its neighbour Sudan threatens to
escalate. South Sudan produced 75,000 bpd of crude oil in June
and was expected to raise output to 200,000 bpd by
year-end.
"If disruptions in Libya and South Sudan persist, this will
result in a redrawing of their contributions to the supply-side
of the global oil balance not only for this year but also for
next year," Deutsche Bank Securities said in a note.
Dow Jones Newswires
Have your say
All comments are subject to editorial review.
All fields are compulsory. | 2023-08-19T01:26:35.434368 | https://example.com/article/9613 |
Dual Catalysis: Proton/Metal-Catalyzed Tandem Benzofuran Annulation/Carbene Transfer Reaction.
An efficient proton/metal-catalyzed tandem benzofuran annulation/carbene transfer reaction for the synthesis of various benzofuryl-substituted cyclopropanes and cycloheptatrienes has been developed. The reaction was proposed to proceed through two key intermediates, o-quinone methide (o-QM) and benzofuryl carbene. The DFT-based computational studies indicated that the reaction was initiated through the dehydration of o-HBA via a Brønsted acid mediated proton shuttle transition state, forming the key intermediate o-QM. | 2023-10-03T01:26:35.434368 | https://example.com/article/2409 |
Recently, there was a column complaining about taxes on the middle class, claiming the middle class is being overtaxed. [1]
The origin of the complaint is easily understood because a slew of measures have announced by the government and those new taxes include departure levy and the imposition of sales and service tax on some digital services. These are generally taxes on not-so-basic goods and in more than some instances, they are arguably luxury goods.
The new taxes are part of the government plan to diversify its revenue and widen its revenue base. These are highly targeted taxes, and it hits specific groups instead of the wider population, which fits the philosophy of the government that is anti-broad base taxes like the GST.
I am not here to debate the philosophy and I take that as a constraint to policymaking. Instead, I am here attempting to explain whether the middle class is overtaxed.
The short answer in this day of too long, didn’t read culture, I would argue, is no.
Here comes the longer answer to a difficult question.
THE STARTING POINT: GOVERNMENT REVENUE AND INTERNATIONAL COMPARISON
It is a difficult question requiring some homework to be done. After thinking about it, I think the best starting point for the discussion is total taxes collected by the government from individual taxpayers. We know this number as it is accessible online from both the Treasury’s and the central bank’s database.
The actual total 2018 revenue figure is not available yet but we know the government has estimated it to be RM236 billion. For 2017, the government collected RM220 billion.
This may look large but in context, it is a very low figure. At about 16% of GDP, it is well below the average for a class of countries that includes Malaysia. Data from the IMF shows that “emerging market and middle-income economies” on average have their government revenue at 27% of GDP. Here for the extra boom: Malaysian government revenue is so low that it is closer to the levels seen among low-income countries that averaged at 15%. In advanced economies, the revenue level is about 36% of GDP. [2]
The low revenue-GDP ratio, and by implication the low tax burden, should give you an idea of how low the tax burden is in Malaysia relative to other countries. It is already a libertarian wet dream.
It is importantly to realize that not all of government revenue is collected from individuals. Based on official 2017 figures, I estimate at most 48% were collected from individuals in the form of income tax, consumption tax along with various duties, licenses and fees. This is an upper estimate because it is difficult to know who paid those duties, licenses and fees exactly without delving deeper into the data; it is highly likely a significant portion is paid by companies instead of individuals. This means, total taxes collected from individuals for Malaysia is about 8% of GDP.
This number gives insight to the question of tax burden because government revenue derived from individual taxpayers is the tax burden of the taxpayers. And when government revenue from these sources is low, it suggests the tax burden on individuals is low.
The rest of the revenue comes from companies and other sources like asset sales.
Now here comes the tough part. We need to know who pays the 48%. This is a difficult endeavor to carry out without intense research because there are at least three types of taxes here: income tax, consumption tax and various duties. The nature of the three taxes is quite different from each other, hitting different segments of individual taxpayers.
What we know is that income tax makes up only about a 27% of the estimated revenue derived from individuals. Consumption tax makes up 42% and the rest belongs to a various other duties and fees.
INCOME TAX
The income tax hits only the non-poor. This is easy to determine.
The threshold to pay income tax is so high that only about 2-6 million people pay it out of a population of 32 million, and out of a labor force of 16 million with generally low unemployment rate. Again, this is a very low number and I have written why that is so back in 2017.
And since a person would only be taxed if his or her income is RM2,500 per month or more, (more accurately, RM30,000 or above annually), we know from the 2016 Household Income Survey published by the Department of Statistics that about 23% of individuals in the Malaysian labor force do not need to pay income tax. And with all the exemptions given by the government, this number can easily cover all of those in the bottom 40% income earners and slightly more. This is a theoretical number because not all income earners are registered taxpayers. They are people who should pay tax among the top 60% income earners who do not register as taxpayers.
Nevertheless, we can conclude that a huge chunk of the income taxpayers belong to the middle class (discussion on what is middle class can be complicated but for convenience, let us take it as the next 40% income earners).
Now, is it fair?
The income tax rates in Malaysia are progressive. That means the more you make, the higher your tax rate would be. It might not be as progressive as some people would like but the truth is, the tax rates in Malaysia starts from a very low base and it rises very gradually to cover the whole middle class. So low in fact that it is difficult to say if anybody is overtaxed on this front.
CONSUMPTION TAX AND OTHER TAXES
Consumption tax sweeps a wider segment of the population. The best proof is the that fact the GST generated RM44 billion for the government in 2017 and that was slightly double the RM29 billion individual income tax revenue.
But this government abolished the GST and introduced the SST in 2018. In 2019, the consumption tax is expected to collect only RM22 billion. And not all of the RM22 billon hits the consumers directly because SST is really two separate taxes: sales tax and service tax. For sales tax, it is really more of a production tax than a consumption tax: that means consumers do not bear the full burden of the tax. It is only the service tax that the consumers have to pay in full. Based on previous experience, service tax revenue formed about 40% of total SST, which further shows that the individual consumers do not pay the full RM22 billion.
In short, tax burden on the population as a whole has fallen, including the middle class after the GST-SST shift. To say otherwise is downright false.
Other taxes are quite small and transactions that attracted those taxes or duties happen at a very low frequency.
NEW TAXES
But the question is, would the new tax mitigate the reduced tax burden and in fact increase the tax burden on the middle class?
No.
No because the government has estimated that these new taxes would generate a revenue of about RM5 billion annually. That is considerably less than the RM22 billion drop arising from the GST-SST shift (that is the 2019 SST collection subtracted from the 2017 GST RM44 billion; the drop should be bigger because the GST collection in 2019 should be bigger).
There are plenty of new separate taxes and that creates a negative perception as if the tax burden is increasing on the middle class. But when all of that combined, total new tax collection would not be enough to negate the reduction in tax burden from the GST-SST change. The numbers show it and here is how it would look like in graphics:
As you can see, there is still a net reduction in tax burden after accounting the GST-SST change and the new taxes.
But, still, what about the middle class? How does the so-called middle class benefit?
GOVERNMENT SPENDING ON THE MIDDLE CLASS
But discussion on merely who pays taxes is not wholesome.
We have to talk about spending as well. At the very 10,000 feet view, the best number to suggest that the government is transferring money to the population or not is the fiscal balance. A surplus would mean on the net, the government takes in money from the population. A deficit means the government gives money away. And the Malaysian government has been experiencing fiscal deficit since the late 1990s.
But what about the middle class? The bottom 40% gets cash transfer and free income-replacement insurance but what about us the middle class?
Apart the subsidized petrol, subsidy for urban highway tolls in terms of compensation from the government to private concessionaires, the subsidized train rides, the subsidized residential electricity use, the subsidized water, subsidized healthcare, subsidized contraceptives, subsidized education, subsided this and subsidized that in the cities with its much better amenities, what else do the middle class get?
Of course, nothing.
I will leave you with a sketch from Monty Python’s Life of Brian.
[1] — I recently cycled 40 minutes in 33-degree weather just to save RM6 on parking when I went to a government clinic to collect my medication. I was a little peeved when the nurse told me that I could only collect two months’ worth instead of the usual three. She gave some excuse about records not tallying if patients are given three months’ supply. I suspect that government health facilities are yet again running low on medical supplies. But coming to the clinic once every two months and paying just RM1 for two packs of oral contraceptives still beats buying them at a pharmacy, where a pack can cost RM27.
So it annoyed me to read that, despite my efforts to save money, the Pakatan Harapan (PH) government is implementing three new taxes that disproportionately hit the middle class – a digital tax, a departure levy, and a tax on sugar-sweetened beverages. [Boo Su-Lyn. The overtaxed middle class. Malay Mail. April 12 2019]
[2] — Note: The IMF puts Malaysia’s revenue/GDP ratio at 20% in 2019 but this does not quite tally with Malaysian data [IMF Data Mapper. Fiscal Monitor. IMF. Accessed April 12 2019] | 2023-12-30T01:26:35.434368 | https://example.com/article/6967 |
:PLEASE-READ:
: CORRESPONDENCE-BACK BY THE POSTMASTER-BANK-BANKER &: SOVEREIGN: Russell-Jay: Gould, MAY: BE OR: VOID-MAY: BE WITH THE SPACE[TIME]-FRAME AND/OR: YOUR-EMAILING-CONCERNS AND/OR: YOUR-EMAILING-GRAMMAR, CAUSE OF THE MARTIAL-LAW-MECHANICS WITH THIS QUANTUM-BANKING-SYSTEM-CLOSURE BY THIS POSTMASTER-BANK-BANKER &: SOVEREIGN: Russell-Jay: Gould's-KNOWLEDGE/WILL.
FOR THE CLAIM OF THE LIFE-PURCHASE IS WITH THE VISITING OF THE ~www.forthequantum.com. | 2023-08-25T01:26:35.434368 | https://example.com/article/3064 |
Rental 62-21615: Spacious Vacation Home at Solana Resort
Property #62-21615 SO002ORDavenport, FloridaUnited States
Bedrooms: 6
Bathrooms: 5
Smoking.: No
Ad views.: 626
Nightly rates:Minimum: $175.75
Maximum: $280.25
Type:House
Pets:No
Sleeps:13
Group Size:13
Description:
The home has 6 bedrooms and 5.5 bathrooms with 5 of these en-suite. When you open the front door you are welcomed into an open-plan spacious sitting room and formal dining area. This spacious vacation home is furnished to a high standard and will offer a
Features:
Upstairs you will find a spacious hallway overlooking the main lounge with the other 5 bedrooms leading off. Two of these bedrooms have king sized beds, their own TV and en-suite bathroom. A further bedroom has a queen sized bed, TV and en-suite bathroom
Check Availability:
Check-in date :
Check-out date :
Group-size :
Contact
Rent Scams:
Warning: Before you contact property owners, make sure you know about rent scams! Check out these sites for more information. Find out more information about scams or to report a potential scam go here
FRBO does not manage or operate any rental properties. The properties on this site are either direct listings or come from feeds from third parties. For direct listings, FRBO takes additional measures to verify property ownership. We ask for property tax records (which are public), utility bills, etc. You should too.
If an owner is asking for cashiers checks or money orders, be sceptical and let us know.
Thanks.
FRBO.com
Description
Property Name:SO002OR
Property Description: The home has 6 bedrooms and 5.5 bathrooms with 5 of these en-suite. When you open the front door you are welcomed into an open-plan spacious sitting room and formal dining area. This spacious vacation home is furnished to a high standard and will offer a
Location Description: Solana Resort was built in 2006 by Park Square Homes, the creator of the popular Emerald Island Resort. At Solana you will find very similar facilities to Emerald Island all constructed to a high standard. The community is gated with a permanently staffed
Pictures
Features
Upstairs you will find a spacious hallway overlooking the main lounge with the other 5 bedrooms leading off. Two of these bedrooms have king sized beds, their own TV and en-suite bathroom. A further bedroom has a queen sized bed, TV and en-suite bathroom
Local Area
Surrounding Area:Solana Resort was built in 2006 by Park Square Homes, the creator of the popular Emerald Island Resort. At Solana you will find very similar facilities to Emerald Island all constructed to a high standard. The community is gated with a permanently staffed | 2023-09-01T01:26:35.434368 | https://example.com/article/5576 |
Maria Fowler
Maria Catherine Fowler (born 15 August 1986) is an English television personality and model. From 2010 to 2011, she appeared in the ITVBe reality series The Only Way Is Essex.
Early life
Maria Catherine Fowler was born on 15 August 1986 in Derby, England. She attended Littleover Community School.
Career
From 2010 to 2011, Fowler appeared on the ITVBe reality series The Only Way Is Essex. She left after the third series, due to personal reasons.
Personal life
In 2013, Fowler attempted suicide after suffering from depression. After this, she began to publicise the work of The Samaritans.
She has one daughter.
She married Kelvin Batey on 27 July 2019
References
Category:Living people
Category:1986 births
Category:People from Derby
Category:English female models
Category:Glamour models
Category:Participants in British reality television series
Category:Footballers' wives and girlfriends | 2024-02-12T01:26:35.434368 | https://example.com/article/4760 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.