text
stringlengths 12
4.76M
| timestamp
stringlengths 26
26
| url
stringlengths 32
32
|
|---|---|---|
/* Lzma2Dec.c -- LZMA2 Decoder
2018-02-19 : Igor Pavlov : Public domain */
/* #define SHOW_DEBUG_INFO */
#include "Precomp.h"
#ifdef SHOW_DEBUG_INFO
#include <stdio.h>
#endif
#include <string.h>
#include "Lzma2Dec.h"
/*
00000000 - End of data
00000001 U U - Uncompressed, reset dic, need reset state and set new prop
00000010 U U - Uncompressed, no reset
100uuuuu U U P P - LZMA, no reset
101uuuuu U U P P - LZMA, reset state
110uuuuu U U P P S - LZMA, reset state + set new prop
111uuuuu U U P P S - LZMA, reset state + set new prop, reset dic
u, U - Unpack Size
P - Pack Size
S - Props
*/
#define LZMA2_CONTROL_COPY_RESET_DIC 1
#define LZMA2_IS_UNCOMPRESSED_STATE(p) (((p)->control & (1 << 7)) == 0)
#define LZMA2_LCLP_MAX 4
#define LZMA2_DIC_SIZE_FROM_PROP(p) (((UInt32)2 | ((p) & 1)) << ((p) / 2 + 11))
#ifdef SHOW_DEBUG_INFO
#define PRF(x) x
#else
#define PRF(x)
#endif
typedef enum
{
LZMA2_STATE_CONTROL,
LZMA2_STATE_UNPACK0,
LZMA2_STATE_UNPACK1,
LZMA2_STATE_PACK0,
LZMA2_STATE_PACK1,
LZMA2_STATE_PROP,
LZMA2_STATE_DATA,
LZMA2_STATE_DATA_CONT,
LZMA2_STATE_FINISHED,
LZMA2_STATE_ERROR
} ELzma2State;
static SRes Lzma2Dec_GetOldProps(Byte prop, Byte *props)
{
UInt32 dicSize;
if (prop > 40)
return SZ_ERROR_UNSUPPORTED;
dicSize = (prop == 40) ? 0xFFFFFFFF : LZMA2_DIC_SIZE_FROM_PROP(prop);
props[0] = (Byte)LZMA2_LCLP_MAX;
props[1] = (Byte)(dicSize);
props[2] = (Byte)(dicSize >> 8);
props[3] = (Byte)(dicSize >> 16);
props[4] = (Byte)(dicSize >> 24);
return SZ_OK;
}
SRes Lzma2Dec_AllocateProbs(CLzma2Dec *p, Byte prop, ISzAllocPtr alloc)
{
Byte props[LZMA_PROPS_SIZE];
RINOK(Lzma2Dec_GetOldProps(prop, props));
return LzmaDec_AllocateProbs(&p->decoder, props, LZMA_PROPS_SIZE, alloc);
}
SRes Lzma2Dec_Allocate(CLzma2Dec *p, Byte prop, ISzAllocPtr alloc)
{
Byte props[LZMA_PROPS_SIZE];
RINOK(Lzma2Dec_GetOldProps(prop, props));
return LzmaDec_Allocate(&p->decoder, props, LZMA_PROPS_SIZE, alloc);
}
void Lzma2Dec_Init(CLzma2Dec *p)
{
p->state = LZMA2_STATE_CONTROL;
p->needInitLevel = 0xE0;
p->isExtraMode = False;
p->unpackSize = 0;
// p->decoder.dicPos = 0; // we can use it instead of full init
LzmaDec_Init(&p->decoder);
}
static ELzma2State Lzma2Dec_UpdateState(CLzma2Dec *p, Byte b)
{
switch (p->state)
{
case LZMA2_STATE_CONTROL:
p->isExtraMode = False;
p->control = b;
PRF(printf("\n %8X", (unsigned)p->decoder.dicPos));
PRF(printf(" %02X", (unsigned)b));
if (b == 0)
return LZMA2_STATE_FINISHED;
if (LZMA2_IS_UNCOMPRESSED_STATE(p))
{
if (b == LZMA2_CONTROL_COPY_RESET_DIC)
p->needInitLevel = 0xC0;
else if (b > 2 || p->needInitLevel == 0xE0)
return LZMA2_STATE_ERROR;
}
else
{
if (b < p->needInitLevel)
return LZMA2_STATE_ERROR;
p->needInitLevel = 0;
p->unpackSize = (UInt32)(b & 0x1F) << 16;
}
return LZMA2_STATE_UNPACK0;
case LZMA2_STATE_UNPACK0:
p->unpackSize |= (UInt32)b << 8;
return LZMA2_STATE_UNPACK1;
case LZMA2_STATE_UNPACK1:
p->unpackSize |= (UInt32)b;
p->unpackSize++;
PRF(printf(" %7u", (unsigned)p->unpackSize));
return LZMA2_IS_UNCOMPRESSED_STATE(p) ? LZMA2_STATE_DATA : LZMA2_STATE_PACK0;
case LZMA2_STATE_PACK0:
p->packSize = (UInt32)b << 8;
return LZMA2_STATE_PACK1;
case LZMA2_STATE_PACK1:
p->packSize |= (UInt32)b;
p->packSize++;
// if (p->packSize < 5) return LZMA2_STATE_ERROR;
PRF(printf(" %5u", (unsigned)p->packSize));
return (p->control & 0x40) ? LZMA2_STATE_PROP : LZMA2_STATE_DATA;
case LZMA2_STATE_PROP:
{
unsigned lc, lp;
if (b >= (9 * 5 * 5))
return LZMA2_STATE_ERROR;
lc = b % 9;
b /= 9;
p->decoder.prop.pb = (Byte)(b / 5);
lp = b % 5;
if (lc + lp > LZMA2_LCLP_MAX)
return LZMA2_STATE_ERROR;
p->decoder.prop.lc = (Byte)lc;
p->decoder.prop.lp = (Byte)lp;
return LZMA2_STATE_DATA;
}
}
return LZMA2_STATE_ERROR;
}
static void LzmaDec_UpdateWithUncompressed(CLzmaDec *p, const Byte *src, SizeT size)
{
memcpy(p->dic + p->dicPos, src, size);
p->dicPos += size;
if (p->checkDicSize == 0 && p->prop.dicSize - p->processedPos <= size)
p->checkDicSize = p->prop.dicSize;
p->processedPos += (UInt32)size;
}
void LzmaDec_InitDicAndState(CLzmaDec *p, Bool initDic, Bool initState);
SRes Lzma2Dec_DecodeToDic(CLzma2Dec *p, SizeT dicLimit,
const Byte *src, SizeT *srcLen, ELzmaFinishMode finishMode, ELzmaStatus *status)
{
SizeT inSize = *srcLen;
*srcLen = 0;
*status = LZMA_STATUS_NOT_SPECIFIED;
while (p->state != LZMA2_STATE_ERROR)
{
SizeT dicPos;
if (p->state == LZMA2_STATE_FINISHED)
{
*status = LZMA_STATUS_FINISHED_WITH_MARK;
return SZ_OK;
}
dicPos = p->decoder.dicPos;
if (dicPos == dicLimit && finishMode == LZMA_FINISH_ANY)
{
*status = LZMA_STATUS_NOT_FINISHED;
return SZ_OK;
}
if (p->state != LZMA2_STATE_DATA && p->state != LZMA2_STATE_DATA_CONT)
{
if (*srcLen == inSize)
{
*status = LZMA_STATUS_NEEDS_MORE_INPUT;
return SZ_OK;
}
(*srcLen)++;
p->state = Lzma2Dec_UpdateState(p, *src++);
if (dicPos == dicLimit && p->state != LZMA2_STATE_FINISHED)
break;
continue;
}
{
SizeT inCur = inSize - *srcLen;
SizeT outCur = dicLimit - dicPos;
ELzmaFinishMode curFinishMode = LZMA_FINISH_ANY;
if (outCur >= p->unpackSize)
{
outCur = (SizeT)p->unpackSize;
curFinishMode = LZMA_FINISH_END;
}
if (LZMA2_IS_UNCOMPRESSED_STATE(p))
{
if (inCur == 0)
{
*status = LZMA_STATUS_NEEDS_MORE_INPUT;
return SZ_OK;
}
if (p->state == LZMA2_STATE_DATA)
{
Bool initDic = (p->control == LZMA2_CONTROL_COPY_RESET_DIC);
LzmaDec_InitDicAndState(&p->decoder, initDic, False);
}
if (inCur > outCur)
inCur = outCur;
if (inCur == 0)
break;
LzmaDec_UpdateWithUncompressed(&p->decoder, src, inCur);
src += inCur;
*srcLen += inCur;
p->unpackSize -= (UInt32)inCur;
p->state = (p->unpackSize == 0) ? LZMA2_STATE_CONTROL : LZMA2_STATE_DATA_CONT;
}
else
{
SRes res;
if (p->state == LZMA2_STATE_DATA)
{
Bool initDic = (p->control >= 0xE0);
Bool initState = (p->control >= 0xA0);
LzmaDec_InitDicAndState(&p->decoder, initDic, initState);
p->state = LZMA2_STATE_DATA_CONT;
}
if (inCur > p->packSize)
inCur = (SizeT)p->packSize;
res = LzmaDec_DecodeToDic(&p->decoder, dicPos + outCur, src, &inCur, curFinishMode, status);
src += inCur;
*srcLen += inCur;
p->packSize -= (UInt32)inCur;
outCur = p->decoder.dicPos - dicPos;
p->unpackSize -= (UInt32)outCur;
if (res != 0)
break;
if (*status == LZMA_STATUS_NEEDS_MORE_INPUT)
{
if (p->packSize == 0)
break;
return SZ_OK;
}
if (inCur == 0 && outCur == 0)
{
if (*status != LZMA_STATUS_MAYBE_FINISHED_WITHOUT_MARK
|| p->unpackSize != 0
|| p->packSize != 0)
break;
p->state = LZMA2_STATE_CONTROL;
}
*status = LZMA_STATUS_NOT_SPECIFIED;
}
}
}
*status = LZMA_STATUS_NOT_SPECIFIED;
p->state = LZMA2_STATE_ERROR;
return SZ_ERROR_DATA;
}
ELzma2ParseStatus Lzma2Dec_Parse(CLzma2Dec *p,
SizeT outSize,
const Byte *src, SizeT *srcLen,
int checkFinishBlock)
{
SizeT inSize = *srcLen;
*srcLen = 0;
while (p->state != LZMA2_STATE_ERROR)
{
if (p->state == LZMA2_STATE_FINISHED)
return LZMA_STATUS_FINISHED_WITH_MARK;
if (outSize == 0 && !checkFinishBlock)
return LZMA_STATUS_NOT_FINISHED;
if (p->state != LZMA2_STATE_DATA && p->state != LZMA2_STATE_DATA_CONT)
{
if (*srcLen == inSize)
return LZMA_STATUS_NEEDS_MORE_INPUT;
(*srcLen)++;
p->state = Lzma2Dec_UpdateState(p, *src++);
if (p->state == LZMA2_STATE_UNPACK0)
{
// if (p->decoder.dicPos != 0)
if (p->control == LZMA2_CONTROL_COPY_RESET_DIC || p->control >= 0xE0)
return LZMA2_PARSE_STATUS_NEW_BLOCK;
// if (outSize == 0) return LZMA_STATUS_NOT_FINISHED;
}
// The following code can be commented.
// It's not big problem, if we read additional input bytes.
// It will be stopped later in LZMA2_STATE_DATA / LZMA2_STATE_DATA_CONT state.
if (outSize == 0 && p->state != LZMA2_STATE_FINISHED)
{
// checkFinishBlock is true. So we expect that block must be finished,
// We can return LZMA_STATUS_NOT_SPECIFIED or LZMA_STATUS_NOT_FINISHED here
// break;
return LZMA_STATUS_NOT_FINISHED;
}
if (p->state == LZMA2_STATE_DATA)
return LZMA2_PARSE_STATUS_NEW_CHUNK;
continue;
}
if (outSize == 0)
return LZMA_STATUS_NOT_FINISHED;
{
SizeT inCur = inSize - *srcLen;
if (LZMA2_IS_UNCOMPRESSED_STATE(p))
{
if (inCur == 0)
return LZMA_STATUS_NEEDS_MORE_INPUT;
if (inCur > p->unpackSize)
inCur = p->unpackSize;
if (inCur > outSize)
inCur = outSize;
p->decoder.dicPos += inCur;
src += inCur;
*srcLen += inCur;
outSize -= inCur;
p->unpackSize -= (UInt32)inCur;
p->state = (p->unpackSize == 0) ? LZMA2_STATE_CONTROL : LZMA2_STATE_DATA_CONT;
}
else
{
p->isExtraMode = True;
if (inCur == 0)
{
if (p->packSize != 0)
return LZMA_STATUS_NEEDS_MORE_INPUT;
}
else if (p->state == LZMA2_STATE_DATA)
{
p->state = LZMA2_STATE_DATA_CONT;
if (*src != 0)
{
// first byte of lzma chunk must be Zero
*srcLen += 1;
p->packSize--;
break;
}
}
if (inCur > p->packSize)
inCur = (SizeT)p->packSize;
src += inCur;
*srcLen += inCur;
p->packSize -= (UInt32)inCur;
if (p->packSize == 0)
{
SizeT rem = outSize;
if (rem > p->unpackSize)
rem = p->unpackSize;
p->decoder.dicPos += rem;
p->unpackSize -= (UInt32)rem;
outSize -= rem;
if (p->unpackSize == 0)
p->state = LZMA2_STATE_CONTROL;
}
}
}
}
p->state = LZMA2_STATE_ERROR;
return LZMA_STATUS_NOT_SPECIFIED;
}
SRes Lzma2Dec_DecodeToBuf(CLzma2Dec *p, Byte *dest, SizeT *destLen, const Byte *src, SizeT *srcLen, ELzmaFinishMode finishMode, ELzmaStatus *status)
{
SizeT outSize = *destLen, inSize = *srcLen;
*srcLen = *destLen = 0;
for (;;)
{
SizeT inCur = inSize, outCur, dicPos;
ELzmaFinishMode curFinishMode;
SRes res;
if (p->decoder.dicPos == p->decoder.dicBufSize)
p->decoder.dicPos = 0;
dicPos = p->decoder.dicPos;
curFinishMode = LZMA_FINISH_ANY;
outCur = p->decoder.dicBufSize - dicPos;
if (outCur >= outSize)
{
outCur = outSize;
curFinishMode = finishMode;
}
res = Lzma2Dec_DecodeToDic(p, dicPos + outCur, src, &inCur, curFinishMode, status);
src += inCur;
inSize -= inCur;
*srcLen += inCur;
outCur = p->decoder.dicPos - dicPos;
memcpy(dest, p->decoder.dic + dicPos, outCur);
dest += outCur;
outSize -= outCur;
*destLen += outCur;
if (res != 0)
return res;
if (outCur == 0 || outSize == 0)
return SZ_OK;
}
}
SRes Lzma2Decode(Byte *dest, SizeT *destLen, const Byte *src, SizeT *srcLen,
Byte prop, ELzmaFinishMode finishMode, ELzmaStatus *status, ISzAllocPtr alloc)
{
CLzma2Dec p;
SRes res;
SizeT outSize = *destLen, inSize = *srcLen;
*destLen = *srcLen = 0;
*status = LZMA_STATUS_NOT_SPECIFIED;
Lzma2Dec_Construct(&p);
RINOK(Lzma2Dec_AllocateProbs(&p, prop, alloc));
p.decoder.dic = dest;
p.decoder.dicBufSize = outSize;
Lzma2Dec_Init(&p);
*srcLen = inSize;
res = Lzma2Dec_DecodeToDic(&p, outSize, src, srcLen, finishMode, status);
*destLen = p.decoder.dicPos;
if (res == SZ_OK && *status == LZMA_STATUS_NEEDS_MORE_INPUT)
res = SZ_ERROR_INPUT_EOF;
Lzma2Dec_FreeProbs(&p, alloc);
return res;
}
|
2024-01-26T01:26:36.242652
|
https://example.com/article/8533
|
It's all very spooky and sinister. In fact, if severed heads freak you out, you might want to skip it entirely. Then again, if severed heads freak you out, what are you doing watching this show?
Because one does not simply cut to the chase and tell viewers whether or not Jon Snow is still alive, the teaser features some red herrings. We see the heads of fallen characters like Ned Stark, followed by Mr. Snow's lifeless noggin. But then, the camera pans and we see the heads of still-kicking-it Arya, Tyrion, and Daenerys. The dead are coming out to play in season six, it would seem.
|
2023-09-20T01:26:36.242652
|
https://example.com/article/1363
|
Italian Muslim Brotherhood Protests Police Mosque Surveillance
An Italian news portal has reported that a spokesman for the the Union of Islamic Communities in Italy (UCOII) what he called the “cataloging” of Muslims attending a mosque in the north of the country. According to an Adnkronos report:
A Muslim leader in Italy has deplored the ‘cataloguing’ by police in recent weeks of Muslims attending mosque in the northern city of Treviso and surrounding areas. Treviso is a stronghold of the anti-immigrant Northern League party. “The incidents reported of what amounts to the mass catalogues of Muslims in the province of Treviso are of unpredecented in gravity,” the spokesman for Italy’s largest Muslim umbrella group UCOII, Hamza Piccardo, told Adnkronos International (AKI). Piccardo, a Muslim convert said he had only learned of the situation on Friday when a Muslim told him police stopped him outside a mosque in Montebello in the province of Treviso and asked to see his documents. The police also photographed all the Muslims attending Friday prayers at the Montebello mosque, Piccardo said. “We interpret this as a very serious act of intimidation,” he said, nonetheless urging Muslims to report such incidents. Hamza said local Muslims told him similar “cataloguing” of the faithful has occurred at mosques in the towns of Cornuda and Castelfranco Veneto. A similar incident took place in the town of Villorba, a member of the Consulta Islamica official body set up by the Italian government to dialogue with the Muslim community, Mohammed Ahmed, told AKI. “What’s going on is wrong, because Muslims attending prayers at a mosque are not committing any crime,” said Ahmed, an Egyptian journalist. Ahmed said he would bring up the issue at the next meeting of the Consulta Islamica in Rome.
The UCOII is generally is thought to represent the Muslim Brotherhood in Italy and is probably a member of the Federation of Islamic Organizations in Europe (FIOE), the EU-level Islamic organization claiming to represent the Muslims of Europe, although it is not listed as the FIOE contact organization in that country. For background on the UCOII, go here.
|
2024-03-09T01:26:36.242652
|
https://example.com/article/1496
|
Passengers on their way to Dublin Airport's Terminal 2.
Passengers travelling from Dublin Airport were in a state of confusion this morning as the sound system was stuck on evacuation mode.
The airport confirmed this morning there was a fault with the sound system in Terminal 1 but said no evacuation is underway.
"There is a fault with our PA system at our Pier 1 gates. The system is stuck on evacuation mode. There is NO evacuation of this area. Our sound engineers are currently investigating."
The PA system had been repeating the following message: "Attention please, attention please. We are responding to an alarm activation. Please evacuate this area immediately and follow the directions of airport staff."
Due to the fault with the system, airport staff were unable to reassure customers over the tanoy.
"We were unable to do that because there is a fault with the PA system in the area which is causing it to issue the automatic message."
The fault caused some stress among passengers, who vented their frustrations on Twitter this morning.
"It would be great if staff could provide some directions," one said.
"Crazy scenario in terminal 1, being asked to evacuate but staff have no clue how to manage this," another said.
The alarm has since been turned off and normal service has resumed.
Online Editors
|
2023-12-10T01:26:36.242652
|
https://example.com/article/5061
|
Can You Use Guitar Pedals With a Bass?
It’s a conundrum that’s puzzled bassists and guitarists alike since the dawn of time. We decided to dig deep and find the answers so you don’t have to – is it safe? Does it sound good? Will bassists eventually take over the world? There’s only one way to find out…
Can You Use Guitar Pedals on a Bass? - Landlord FX AnswersCheck out our full range from Landlord FX here! - http://tinyurl.com/y9jkhhhu
Have you ever wondered how it would sound to run a bass guitar through guitar FX pedals? We run through a series of different Landlord FX guitar pedals to help answer...
Nathan is playing a Sire Version 2 Marcus Miller V7 Vintage Alder 4 String in Antique White - http://tinyurl.com/yat2zgyl
Interested in other Andertons YouTube channels? Click on one of these links to find out more…
Andertons Guitar & Bass YouTube Channel: https://goo.gl/kRJCpb
Andertons Drummers YouTube Channel: https://goo.gl/9yKSS9
Andertons Keyboard YouTube Channel: https://goo.gl/ns172M
Andertons Shopping Web Site: https://goo.gl/TPsG2Q
Buy a T Shirt: https://goo.gl/TrTe78
Make sure to subscribe to Andertons TV for more great videos like this: https://goo.gl/aAzyQM
#Andertons #LandlordFX #AllAboutTheBasshttps://i.ytimg.com/vi/q6M6EkSnQx0/default.jpgPT25M4S2019-02-08T10:31:36.000Z
20244
Disclaimer: to cut a long story short, the answer is yes. You can use guitar pedals with bass, it’s as simple as that. BUT there’s definitely a longer version of the answer – read on to find out more!
What’s the difference between guitar pedals and bass pedals?
You’ll often see pedals designed specifically for bass. These will either be altered versions of existing pedals (the EHX Bass Big Muff, the Ibanez TS9B Bass Tube Screamer) or unique designs (the Tech 21 Sansamp Bass Driver).
The main difference that you’ll occasionally find in bass pedal circuitry is simply the frequencies they’re designed to respond to. Obviously a bass guitar pumps out lower frequencies than a guitar – usually at least an octave lower, to be precise.
But we’re not just talking about bass guitar pitch frequencies; their EQ curve is usually different. Fat strings, a longer scale-length, different woods, different pickups, different playing style. All of these things contribute to the fact that a bass guitar sounds tonally different to a 6-string. Because of this, pedals are going to react differently. So manufacturers will tweak the circuitry or start from scratch, to ensure that their pedals provide the best response and the nicest sweet spots.
It’s worth noting that some bass pedals often have a dedicated ‘dry’ output. It’s often desirable for a bassist to have a dry signal at their disposal, for DI-ing and other purposes.
These are only the case with certain stompboxes and manufacturers though. For the most part, there simply isn’t a difference, at least in terms of design. A distortion pedal will distort, a modulation pedal will modulate, and so on. Sure, it’ll sound different, but you wouldn’t want your bass to sound like a guitar…would ya?
Is it safe to use guitar pedals with a bass?
Yes. Next question.
How do guitar pedals sound with a bass?
This obviously depends entirely on the pedal. But as mentioned above, guitar pedals are designed for a specific set of frequencies. A bass guitar’s output goes beyond this, with far more low-end and sub-frequency content. It’s worth bearing in mind that using certain guitar pedals in your bass rig might mean that you lose out on some of the glorious bottom end! Here are a few examples of guitar pedal types that you can use with a bass:
Using guitar distortion pedals with a bass
Most distortion pedals will sound pretty darn cool with a bass, but it’s subjective. It depends what you’re going for. A fuzz pedal will provide you with plenty of hairy saturation, while a Boss Metal Zone will provide eye-watering amounts of gain. A Tube Screamer, on the other hand, might not work as well, because it’ll suck out some of that low-end. That’s where that dry output feature comes in handy. You can have plenty of crunch on tap, while retaining the clarity and weight of your bass tone.
Using guitar compressor pedals with a bass
Compressors are, for the most part, not instrument-specific. Compression is simply used to even out frequencies to provide you with a more consistent attack and volume. There are some compressors with additional tweaks to suit guitar or bass sounds, but it’s otherwise fairly universal. Heck, you could even try using a compression pedal on a vocal track – it probably wouldn’t do any harm!
Using guitar octave pedals with a bass
Octave pedals are a little trickier due to tracking. In order to shift the pitch of your signal, the original input ought to be relatively clear. Some octave and pitch-shift pedals are designed specifically to track guitar frequencies, while others simply take whatever signal they receive and go up/down accordingly. It depends what you’re after. If you want a crystal clear harmonising octave, it might be best to go with a bass-specific octave pedal. If you just want a bit of extra sub fatness, or perhaps a subtle upper-octave shimmer, guitar pitch effects will do just fine!
Using guitar modulation pedals with a bass
You won’t find many issues here. The effects will like sound different, for obvious reasons – but they’ll work just fine. It’s worth noting that modulation feedback (when the modulation signal is fed back into itself) will adopt a different character when used with bass. This is particularly the case with phaser & flanger effects – crank the feedback and you’ll get some pretty monstrous vocal/jet-engine action.
Using guitar delay & reverb pedals with a bass
Again, no real problems. Ambient effects simply repeat what they hear, sometimes adding colour – it doesn’t matter too much what the input is. You’d be best going for pedals that have a bit more EQ or tone controls though; too much low end on your affected signal could result in some rather messy textures. Whatever floats your boat.
What’s the difference between guitar pickups and bass pickups?
Again, bass guitar pickups work better with lower frequencies. Not only do you want to hear those lower pitches, but you want to low-end to really resonate and fill out the mix. Guitar pickups simply wouldn’t have the same effect if they were built into a bass. Then again, do you want your bass to sound a little more mid/treble-friendly? That’s none of our business.
At the other end of the scale, guitar pickups handle higher frequencies better. Guitars often fill out the middle/top end of a mix, with riffs, chords and lead parts – the pickups need to reflect this in terms of pitch and tone.
On the flipside, can you use bass pedals with a guitar?
Different question, same answer. If a pedal is specifically designed for bass, it’ll emphasise different frequencies. This could result in a unique tone that might be far removed from what you’re used to with your regular guitar pedals. There’s only one way to find out!
Sam is one of our content writers, as well as being our resident southpaw. When he's not busy being left-handed, he spends his time composing for music libraries and playing in a post-rock band. Sam plays a Mexican Telecaster and a Vigier Excalibur, and is never more than 5 feet away from his Electro-Harmonix POG.
|
2023-09-09T01:26:36.242652
|
https://example.com/article/5215
|
Q:
Index of a plane curve is zero
There is a result that seems intuitive to me, but I don't know how to prove it.
Let $\gamma: [0, 1] \longrightarrow \mathbb{R}^{2}$ be a differentiable regular $\left(\gamma'(t) \neq 0, \forall t \in [0, 1]\right)$ plane curve such that
$$\gamma(s) = \gamma(t) \iff s = t,$$
and
$$\pi_{y}(\gamma(0)) \leq \pi_{y}(\gamma(t)) \leq \pi_{y}(\gamma(1)), \ \forall t \in [0, 1],$$
where $\pi_{y}$ is the canonical projection on the $y$-axis. Then the rotation index is zero, that is, the vector
$$\frac{\gamma'(t)}{|\gamma'(t)|}$$
does not complete any loop around the unitary circle $\mathbb{S}^{1}$.
Appreciate.
A:
The crucial fact here is that the mapping $\gamma$ is one-to-one. Here is a suggestion for an approach. See pages 26-28 of my differential geometry text for more details.
Let $\Delta = \{(s,t): 0\le s\le t\le 1\}$. Define the chordal map
$h\colon \Delta\to \Bbb S^1$ by
$$h(s,t) = \begin{cases} \dfrac{\gamma(t)-\gamma(s)}{\|\gamma(t)-\gamma(s)\|}, & s\ne t \\
\frac{\gamma'(s)}{\|\gamma'(s)\|}, & s=t
\end{cases}.$$
Then $h$ is everywhere defined and continuous (the latter requires a check).
With a bit of work one can show there is a continuous function $\theta\colon \Delta\to\Bbb R$ so that $h(s,t) = (\cos(\theta(s,t)),\sin(\theta(s,t))$ for all $(s,t)\in\Delta$. You want to see that $|\theta(1,1) - \theta(0,0)|<2\pi$. (For a closed curve, the rotation index would be precisely $(\theta(1,1)-\theta(0,0))/2\pi$.)
Because of the hypothesis on the $y$-coordinate of $\gamma$, we know that for every $t$, $h(0,t)$ lies in the upper semicircle, and the same is true for $h(s,1)$ for every $s$. This means, in particular, that $|\theta(0,1)-\theta(0,0)|<\pi$ and $|\theta(1,1)-\theta(0,1)|<\pi$, so
$$|\theta(1,1) - \theta(0,0)| \le |\theta(0,1)-\theta(0,0)|+|\theta(1,1)-\theta(0,1)|<2\pi,$$
as required.
|
2023-09-02T01:26:36.242652
|
https://example.com/article/5508
|
386 P.2d 1004 (1963)
George Edward ADAMS, Mary Bell Cunningham, Floyd Dale Adams, Margaret Vistal, and Maurine Johnson, Plaintiffs in Error,
v.
Otho Prellar COLEMAN, Administrator of the Estate of Annie A. Coleman, Deceased, and Otho Prellar Coleman, individually, Defendants in Error.
No. 40057.
Supreme Court of Oklahoma.
October 29, 1963.
Rehearing Denied November 26, 1963.
Lewis D. Jones, Fayetteville, Ark., Cantrell, Douglass, Thompson & Wilson, John H. Cantrell, Lee B. Thompson, Ralph G. Thompson, Oklahoma City, for plaintiffs in error.
Haskell Paul, Pauls Valley, for defendants in error.
IRWIN, Justice.
This appeal involves an action brought by Plaintiffs in Error to recover their proportionate share of the proceeds of a judgment rendered in an action for the wrongful death of their mother, Annie A. Coleman, Deceased, which was brought in the name of Otho Prellar Coleman, as administrator of the Estate of Annie A. Coleman, Deceased, and Otho Prellar Coleman, individually in his own right against Robert Allen Sewell. To better understand the issues presented in the instant action, a brief summary should be given concerning the facts surrounding the judgment rendered in the wrongful death action.
On June 2, 1960, Annie A. Coleman was killed in an automobile accident. The plaintiffs in error in this action are her *1005 surviving children and Otho Prellar Coleman, one of the defendants in error, is her surviving husband. On July 15, 1960, Letters of Administration were issued to Otho Prellar Coleman, as Administrator of the Estate of Annie A. Coleman, Deceased. On July 15, 1960, "Otho Prellar Coleman, as Administrator of the Estate of Annie A. Coleman, Deceased, and Otho Prellar Coleman, individually in his own right", brought an action in damages against Robert Allen Sewell, for the wrongful death of Annie A. Coleman alleging three causes of action.
In the wrongful death action against Robert Allen Sewell, it was alleged in the first cause of action that plaintiff was the duly appointed and acting administrator of the Estate of Annie A. Coleman, Deceased, and "as such administrator, brings this action for the wrongful death of the said Annie A. Coleman, Deceased, for and on behalf of her next-of-kin and heirs at law. The petition then set forth the names of the plaintiffs in error as being the next-of-kin and heirs at law of Annie A. Coleman, Deceased. Insofar as pertinent to the present cause, it was further alleged that "the heirs and next of kin of decedent, Annie A. Coleman, by virtue of her wrongful death * * * have sustained damages in the total sum of Twenty Thousand ($20,000.00) Dollars". It was further alleged that "The plaintiff, Otho Prellar Coleman, acting in his capacity as Administrator of the Estate of Annie A. Coleman, Deceased, and for and on behalf of the heirs and next-of-kin of said decedent, is entitled to judgment against the defendant, Robert Allen Sewell, for damages for the decedent's wrongful death in the sum of Twenty Thousand ($20,000.00) Dollars."
The second cause of action was for and on behalf of decedent's estate for conscious pain and suffering prior to her death in the sum of $100.00. The third cause of action was for Otho Prellar Coleman, in his individual and personal capacity and as husband of the decedent in the sum of $25,000.00.
On July 15, 1960, a judgment was rendered in the above cause, which, inter alia, contained the following:
"8. The Court further finds that the parties hereto, with the advise and approval of counsel, have entered into an agreement for the full and final settlement of the several claims of the plaintiff herein asserted, which agreement the Court has fully examined and approved as fair, equitable and just; that under said settlement, it has been agreed by the parties that plaintiff shall recover and receive from defendant, for and on behalf of the heirs and next-of-kin of Annie A. Coleman, in full satisfaction of their claim for damages for the wrongful death of said decedent as prayed for in plaintiff's first cause of action the sum of Thirteen Thousand ($13,000.00) Dollars; that said parties have further agreed that plaintiff for and on behalf of the Estate of the deceased have and recover from defendant as damages for conscious pain and suffering of decedent prior to her death as prayed for in plaintiff's second cause of action the sum of One Hundred ($100.00) Dollars; and that by said agreement of the parties the plaintiff, in his personal and individual capacity, have and recover from the defendant the sum of Four Thousand Nine Hundred (4,900.00) Dollars in full satisfaction of his claim for damages for personal injuries, medical expenses, funeral bills, loss of services of the decedent, and property damage to his automobile, as prayed for in plaintiff's third cause of action.
"IT IS, THEREFORE, ORDERED, ADJUDGED AND DECREED by the Court that the plaintiff be, and he is hereby awarded judgment against the defendant in the sum of Thirteen Thousand ($13,000.00) Dollars as damages for wrongful death of the decedent, Annie A. Coleman; and One Hundred ($100.00) Dollars as damages *1006 payable to the decedent's estate for her conscious pain and suffering and Four Thousand Nine Hundred ($4,900.00) Dollars as damages for plaintiff's personal injuries, medical expenses, funeral bills, loss of services of decedent and property damage to his automobile; or a total of Eighteen Thousand ($18,000.00) Dollars, and for the costs of this action." (emphasis ours)
Otho Prellar Coleman was paid the full amount of the judgment but refused to pay any portion thereof to the (plaintiffs in error) children of the decedent except a portion of the $100.00 recovered in the second cause of action. They commenced this action to recover their proportionate share of the $13,000.00 allegedly paid and received for the use and benefit of the deceased's heirs at law and next of kin pursuant to the judgment entered on July 15, 1960. Otho Prellar Coleman defended the action on the grounds that in the wrongful death action he was acting as Administrator of the estate of the decedent and received the $13,000.00 as trustee for the use and benefit of the heirs and next of kin of decedent who sustained a pecuniary loss by reason of decedent's death and that plaintiffs had not suffered or sustained a pecuniary loss.
The trial court sustained a demurrer to plaintiffs' evidence and dismissed the action. The trial court's order in this connection contained, inter alia, this language, "* * * both sides waive a jury trial and agree to try the issues to the Court. Thereupon the plaintiffs introduce evidence by witnesses duly sworn, and rest. The defendants demur to the evidence of the plaintiffs and offer no evidence of their own * * * the Court finds that the Demurrer of the Defendants to the evidence of the Plaintiffs should be sustained and the cause dismissed."
The attorneys for all the litigants approved the trial court's order sustaining the demurrer to the evidence and dismissing the action. Thereafter a motion for new trial was timely lodged and overruled. This appeal is lodged against the order overruling the motion for new trial. Defendants in error do not question the necessity for filing a motion for new trial, nor do they question the manner in which the appeal was lodged, nor this Court's jurisdiction to determine the issues presented. The parties will be hereinafter referred to as they appeared in the trial court.
The original case wherein the money judgment was obtained for the wrongful death of the decedent was brought under Title 12 O.S. 1961 § 1053, which provides:
"When the death of one is caused by the wrongful act or omission of another, the personal representative of the former may maintain an action therefor against the latter, or his personal representative if he is also deceased, if the former might have maintained an action had he lived, against the latter, or his representative, for an injury for the same act or omission. The action must be commenced within two years. The damages must inure to the exclusive benefit of the surviving spouse and children, if any, or next of kin; to be distributed in the same manner as personal property of the deceased."
The theory relied upon by defendant is that plaintiffs are "adult and emancipated" children of the decedent; that the $13,000.00 recovered in the original action is held by him as trustee of a trust under the exclusive jurisdiction of the district court, and distributable by said court only to the "heirs and next of kin" who suffered a pecuniary loss by reason of the wrongful death of decedent; that the plaintiffs did not plead, nor attempt to prove, a pecuniary loss and the trial court did not err in sustaining the demurrer.
Plaintiffs contend that the original judgment, which became final, imports absolute verity and is conclusive evidence of its contents, and can not be contradicted, modified, enlarged, restricted, augmented or diminished, or be collaterally attacked.
*1007 It should be noted that this is not an action to recover damages for wrongful death, but an action to recover the proceeds of a judgment rendered in a wrongful death action. Therefore, the issue in the instant action may be summarized as follows:
"Where an administrator institutes an action in damages for wrongful death for the use and benefit of the heirs and next of kin of a decedent under Title 12 O.S. 1961 § 1053, and recovers a judgment which is in all respects final, and said judgment does not make an apportionment to the individual heirs and next of kin of decedent, are the proceeds of said judgment distributed in the same manner as personal property of the deceased, or are said proceeds held in trust and apportioned to the heirs and next of kin in proportion to their respective pecuniary losses?"
If the proceeds of such judgment are distributable in "the same manner as personal property of the deceased", then the judgment of the trial court must be reversed. On the other hand, if the proceeds are apportioned to the heirs and next of kin in proportion to their respective pecuniary losses, the judgment must be affirmed.
For the reasons hereinafter set forth, the case of Tackett v. Tackett, 174 Okl. 51, 50 P.2d 293, is controlling in the instant action. In that case the surviving widow brought an action to recover damages for the wrongful death of her husband, on behalf of herself as widow of decedent and on behalf of the next of kin who would be entitled to the distribution of the judgment. The money was paid into the hands of the Court Clerk. Although the action was brought by the widow, as administratrix, the minor daughter of decedent intervened and her attorneys took an active part which led to the settlement and judgment. There was no apportionment made in the judgment.
After payment of the money into the court, the minor brought an action against the widow asking that she be adjudged to be entitled to one-half interest in the judgment. The widow defended such action on the ground that the minor had sustained no pecuniary loss because the decedent had never contributed anything to her support. The trial court determined the minor was entitled to one-half of the proceeds which was her share under the laws of descent and distribution and that it was not necessary for the minor to prove a pecuniary loss. The widow appealed to this Court.
In affirming the judgment of the trial court we said that had the widow desired to contest the amount to be apportioned to those entitled thereto, she should have done so before rendition of the judgment for the wrongful death. We further stated that the widow "having failed to submit the matter of apportionment of damages until after judgment in a lump sum and without apportionment in the first action, the doctrine of res judicata must be applied, * * *." In that case we held:
"In a wrongful death action by an administrator for the use and benefit of the several persons for whose benefit the action survives, the interest of each beneficiary in the recovery must be measured by his or her individual pecuniary loss and the jury may make apportionment accordingly in their verdict. If the jury fail so to do, then distribution made to those entitled thereto as provided by the general statute of decent and distribution in the same manner as personal property of the deceased is approved."
In reaching our conclusion in the Tackett case, we considered and discussed Gulf, Colorado & Santa Fe Ry. Co. v. McGinnis, 228 U.S. 173, 33 S.Ct. 426, 57 L.Ed. 785; Okmulgee Gas Co. v. Kelly, 105 Okl. 189, 232 P. 428; Aetna Casualty & Surety Co. v. Young, 107 Okl. 151, 231 P. 261; and M.K. & T. Ry. Co. v. Canada, 130 Okl. 171, 265 P. 1045, 59 A.L.R. 743, which are cited by the defendant, which sustain the general proposition that "to maintain an action for wrongful death, the existence of beneficiaries named in the statute to whom the action survives and the pecuniary loss to them must be alleged and proved".
*1008 The Tackett case was cited with approval in Capitol Steel & Iron Co. v. Fuller, 206 Okl. 638, 245 P.2d 1134, which involved a Workmen's Compensation case. In referring to "the surviving spouse and children", we said:
"* * * These persons, although having a cause of action would not have a right of action unless they suffered a pecuniary loss by reason of the death, in other words, were dependents. They would have to be heirs at law and also dependents and, if the judgment amount was not apportioned by the trial court, they would have been `entitled thereto as provided by the general statute of descent and distribution in the same manner as personal property of the deceased'. Tackett v. Tackett, supra. * * *"
See also Willis v. Capitol Well Servicing Co., Okl., 285 P.2d 388.
The facts in the case of Aetna Casualty & Surety Co. v. Young, 107 Okl. 151, 231 P. 261, are clearly distinguishable from the facts in the case at bar. In that case a judgment was recovered by the Administratrix, and the Court said:
"Neither the widow nor the children for whose benefit said money was recovered were parties to said action, nor were they referred to either by name or by the relationship which they bore to the deceased, in the pleadings or in the judgment itself, and it does not appear from the record or from the facts in the case that either the widow or the children had any actual knowledge of the proceedings had in the suit or the recovery of the money at the time it was recovered."
In the instant case the wrongful death action was brought by the Administrator for and on behalf of decedent's next-of-kin and heirs at law; the next-of-kin and heirs at law were named and their relationship to decedent were specifically set forth in the pleadings and in the judgment; they had knowledge of the proceedings and judgment rendered; the Administrator, in addition to recovering judgment for and on behalf of the next-of-kin and heirs at law, recovered a judgment in his individual and personal capacity as the husband of the decedent.
Defendant cites Hurley v. Hurley, 191 Okl. 194, 127 P.2d 147, as sustaining his contention. In that case an administratrix sought to recover for the wrongful death of the decedent, and certain individuals were joined as the next of kin. By stipulation, the amount of damages was agreed upon and the amount deposited into court, and the trial court, after deducting expenses, apportioned three-fourths to the mother and the remainder to Ed Hurley, the father of the deceased. The father appealed to this Court and asserted that the amount recovered became a trust fund for the next of kin, and by reason of Title 12 O.S. 1961 § 1053, it should have been divided equally. In that case we denied the father's claim and said:
"We are committed to the rule that a judgment must determine the rights of all parties to the action and all issues raised by the pleadings. Foreman v. Riley, 88 Okl. 75, 211 P. 495; Wells v. Shriver, 81 Okl. 108, 197 P. 460. In the Tackett and Aetna cases, relied upon by defendant, the pleadings upon which the original judgments were rendered did not raise the issue of the apportionment of the recovery between the parties entitled thereto, and the judgments rendered were in all respects final. In the present case the issue of the apportionment of the fund was raised by the pleadings, and the order of June 3, 1940, did not purport to be and was not a final judgment, as it expressly left open and reserved for further consideration and decision the right of the respective next of kin to participate in the fund, and the amount each was entitled to receive."
We therefore conclude that where an administrator institutes an action for the use and benefit of the heirs and next of kin of a decedent under Title 12 O.S. 1961 § 1053, for the wrongful death of decedent *1009 and recovers a judgment which has become final, and said judgment does not make an apportionment to the individual heirs and next of kin of the decedent, the proceeds of said judgment are distributable in the same manner as personal property of the decedent. We further conclude that when said judgment becomes final and an action is brought by an heir for his or her proportionate share of the proceeds of said judgment, said heir does not have to allege or prove a pecuniary loss.
In the instant action, the petition in the wrongful death case, specifically alleged that it was brought "for and on behalf of" decedent's "next-of-kin and heirs at law"; the next of kin and heirs at law were named. The journal entry of judgment states "the plaintiff has full and exclusive authority to act for and on behalf of the heirs and next of kin of decedent and to prosecute the cause * * *"; "that under said settlement, it has been agreed by the parties that plaintiff shall recover and receive from defendant, for and on behalf of the heirs and next of kin of" decedent for her wrongful death the sum of $13,000.00. The trial court then ordered that plaintiff be awarded $13,000.00 in the first cause of action; $100.00 payable to the estate for conscious pain and suffering; and $4,900.00 for plaintiff's personal losses.
We can only conclude that had defendant wanted to submit and contest the apportionment of the damages recovered in the action for the wrongful death of decedent, he should have done so before the rendition of the judgment for the wrongful death of decedent. Having failed to submit the matter of apportionment until the judgment in a lump sum had been rendered without apportionment, the doctrine of res adjudicata must be applied.
We therefore hold that plaintiffs are entitled to an apportionment of the proceeds of the judgment rendered in the wrongful death action and the same is to be distributed to them "in the same manner as personal property of the deceased".
The order overruling the motion for new trial is reversed and remanded with directions to reinstate the cause of action and proceed in accordance with the views herein expressed.
Judgment reversed and remanded with directions.
DAVISON, JOHNSON, JACKSON and BERRY, JJ., concur.
BLACKBIRD, C.J., HALLEY, V.C.J., and WILLIAMS, J., dissent.
HALLEY, Vice Chief Justice (dissenting).
In this case the plaintiffs neither alleged in their petition nor proved at trial that they had sustained any pecuniary loss whatsoever as a result of Annie A. Coleman's death. The petition and judgment in the wrongful death action referred to the plaintiffs as "adult and emancipated children" of the deceased. The law does not imply a pecuniary loss to adult and emancipated children. Adult children are required to prove some actual pecuniary loss before they will be entitled to a distributive share of the wrongful death award held by the personal representative. Missouri-Kansas-Texas R. Co. v. Canada, 130 Okl. 171, 265 P. 1045.
Only three Oklahoma cases have been cited by the parties or revealed by our research in which no apportionment of damages was made in the original wrongful death action and a subsequent action was brought to apportion or distribute the wrongful death fund. In two of the cases, Aetna Casualty & Surety Co. v. Young, 107 Okl. 151, 231 P. 261; and Tackett v. Tackett, 174 Okl. 51, 50 P.2d 293, the person claiming a proportionate part of the lump sum wrongful death judgment was entitled as a matter of law to support from the deceased. In each of those cases, therefore, it was clear that the law will imply a pecuniary loss to the particular next of kin involved. In the Aetna case, supra, it was *1010 the surviving spouse who sought a share; and in the Tackett case, supra, it was a surviving minor child. In each of those cases we made it plain that the person claiming a distributive share must have sustained a pecuniary loss before he is entitled to any part of the wrongful death money judgment. Because pecuniary loss was implied in those two cases, the plaintiff in each action to distribute the wrongful death fund was not required to prove actual pecuniary loss. The majority opinion in the instant case misses the point when it fails to interpret the Tackett case, supra, in this way.
The third case which contains this same sequence of events, that is, a wrongful death judgment which makes no provision for apportionment between the next of kin, and a subsequent suit to apportion the fund is Hurley v. Hurley, 191 Okl. 194, 127 P.2d 147. In the Hurley case the parties contending for shares of the wrongful death fund were the mother and father of deceased. They were required to prove their actual pecuniary loss because there was no implied pecuniary loss. This is or should be the same requirement to be made in the instant case.
This is the whole point of these cases. At some stage of proceedings the next of kin claiming a share of the wrongful death fund must show a pecuniary loss by reason of the death of the deceased. In the Aetna and Tackett cases the pecuniary loss was showed by implication of law. In the Hurley case it was actually proved. In the instant case there is no implied pecuniary loss suffered by the adult emancipated children of deceased and they have made no attempt to either plead or prove any actual pecuniary loss.
Some of the statements we made in the Hurley case, supra, are appropriate here:
"* * * Therefore those who have suffered no detriment are entitled to no compensation. * * *"
* * * * * *
"To construe section 1053 [12 O.S. 1961 § 1053] as fixing the amount to which each of the next of kin is entitled to be that amount which he would receive under the law of descent would necessitate giving the word `manner' the same meaning as `proportion', and to do so would frequently result in injustice and absurdity, since it would often require a distribution wholly at variance with the pecuniary loss sustained by the respective next of kin." (emphasis supplied)
In the instant case it would be unjust and absurd to allow five adult and emancipated children of deceased to receive two-thirds of the fund of $13,000 paid by a tortfeasor by a consent judgment, if they have sustained no pecuniary loss. It would be even more absurd if it turns out that Annie A. Coleman had a will wherein she left her personal property to one or more of her adult children, but none to her surviving spouse. If such is true, under the holding of the majority opinion her surviving spouse would receive absolutely nothing even though he is probably the only one who sustained any pecuniary loss. See discussion in Note, 7 Okla.Law Rev. 384, 387.
Since the five adult children have neither alleged nor proved a pecuniary loss and since the law does not imply a pecuniary loss, I believe they have failed to state or prove a cause of action and that the trial court was correct in sustaining a demurrer to the evidence.
I dissent.
WILLIAMS, Justice (dissenting).
I would join unhesitatingly and fully in the dissent of Mr. Vice Chief Justice HALLEY if, in my opinion, this Court has jurisdiction of this appeal. However, my belief is, it does not.
In the case of Application of Central Oklahoma Milk Producers Ass'n., Okl., 312 P.2d 500, this Court held that, before passing upon the merits, it should first find it has jurisdiction of an appeal, whether the question is raised by a party or not. See also the many cases set forth in 2 West's Oklahoma Digest, Appeal and Error. *1011 And, Video Independent Theatres, Inc., v. Walker, Okl., 308 P.2d 958.
The trial court rendered its judgment against plaintiffs therein, plaintiffs in error here, on October 13, 1961. They gave no notice of appeal then nor within ten days thereafter as required by 12 O.S. 1961 § 954. They simply contented themselves with excepting to the judgment, filing their motion for new trial and later, twenty-one days after rendition of the judgment on November 3, 1961, giving notice of appeal from the overruling of their said motion.
Such statute, 12 O.S. 1961 § 954, provides that the party desiring to appeal shall give notice in open court, either at the time judgment is rendered or within 10 days thereafter, of his intention to appeal to the Supreme Court. The requirements of that statute are mandatory.
See Kershaw v. Board of Com'rs of Muskogee County, 135 Okl. 302, 275 P. 621. In that case we held:
"Where a party desiring to appeal fails to give notice in open court, either at the time the judgment appealed from is rendered or within 10 days thereafter, of intention to appeal to the Supreme Court, this court is without jurisdiction to review such judgment, and an appeal therefrom will be dismissed."
See also other cases cited in 2 West's Oklahoma Digest, Appeal and Error.
In the case of Collins-Dietz-Morris Co., v. Wright, 163 Okl. 54, 20 P.2d 574, in the first paragraph of the syllabus, we held:
"Where, upon entry of final order, no notice of appeal is given in open court nor written notice filed within ten days thereafter and a motion for new trial is not necessary to review the questions arising upon a hearing of said order, nothing is brought to this court for review and the appeal is a nullity."
No testimony, except that of the clerk of the trial court identifying the records of the former action between plaintiffs' step-father individually, as surviving husband, and as administrator of their mother's estate, and defendant therein, was introduced in the trial below. All other evidence received in the trial was stipulated by the parties.
In the case of Rogers County Bank v. Cullison, 186 Okl. 373, 98 P.2d 612, 614, is the following language:
"In Clapper v. Putnam Co., 70 Okl. 99, 158 P. 297, this court quoted with approval certain language of the Supreme Court of Kansas in Wagner v. A.T. & S.F.R. Co., 73 Kan. 283, 85 P. 299, 300, as follows:
"`There must always be a "former" verdict, report, or decision, determinative of issues of fact to be vacated before there can be a new trial, or any necessity for a motion for a new trial.' We apply that statement here, and hold that no motion for new trial was necessary."
Since no issues of fact were determined by the trial court, no motion for a new trial was necessary.
In the case of Wilson v. Hefner, Okl., 188 Okl. 292, 108 P.2d 108, this Court in dismissing the action, said:
"The court rendered judgment on the pleadings and the agreed statement of facts on the 30th day of June, 1939. The appeal is not prosecuted from said judgment but from a purported order overruling a motion for new trial entered thereafter on August 25, 1939. The proceeding was not filed in this court until February 23, 1940. A motion to dismiss has been filed for the reason that this court is without jurisdiction to consider said appeal. The motion to dismiss must be sustained. This court has many times held that where a judgment is entered upon the pleadings and an agreed statement of facts, it is necessary to appeal from the order and judgment entered within six months from the date of said judgment. It is also necessary to give the *1012 notice of intention to appeal provided by section 531, O.S. 1931, 12 Okl.St. Ann. § 954, within 10 days from said judgment. The filing and determination of a motion for new trial serves no purpose to extend the time to perform either of these jurisdictional requirements. * * *"
If this Court is going to hold that it has jurisdiction to hear this appeal it will be necessary to overrule all of the cases cited in the above noted and all cases appearing in note 31 following 12 O.S.A. § 954. Such latter cases hold that notice of appeal is necessary to give the Supreme Court jurisdiction; that such notice is mandatory; that if a motion for new trial is unnecessary and notice of appeal is not filed within 10 days after rendition of judgment, the Supreme Court is without jurisdiction to review the judgment and will dismiss the appeal; and that the filing of an unnecessary motion for new trial does not extend the time for filing notice of appeal.
For the remainder of this dissenting opinion, I am making an assumption, contrary to my true conviction, that the Court does have jurisdiction.
It seems more than passing strange that the children, by the former marriage of their mother, may sue their step-father for distributive share, in reliance upon the judgment based upon his petition in the former action in which he alleged his deceased wife's heirs were beneficiaries of his action, although not parties thereto, but that on the other hand, he may not defend because they were parties or should have been and the former judgment is res judicata as to him.
The purpose of the first suit was to recover a judgment against the alleged tortfeasor and obtain satisfaction thereof. This was done and the judgment was functus officii.
Turn the shoe around. Suppose in the first case, without making the children parties the step-father had shown the trial court he was disabled, say, and had been dependent upon his wife, now deceased, that she had supported him and that he should have all the recovery allotted to himself, etc. Let us further suppose that one of her children sought thereafter to get in the case and show that he is a cripple, that his mother had been employed as a nurse and half-supporting him for years and asking for a part of the $13000.00 recovery on first cause of action. Would this Court countenance the entry by the trial court of a judgment for the step-father on the ground of res judicata, when the parties had not been before him, the subject matter of the present contest had not been before him, and he had not intended by the first judgment to foreclose the rights of claimants not before the court? No.
The function of res judicata is to protect jurisdiction and give finality to something the determination of which should be held final.
Splitting a cause of action is the bringing of an action for only a part of the cause of action. A single cause of action or entire claim or demand cannot be split up or divided and separate suits maintained for the various parts thereof, nor can a party divide the grounds of recovery and maintain successive actions for the cause thereon. 1 C.J.S. Actions § 102a, b, p. 1306. The object of the rule against splitting causes of action is to prevent a multiplicity of suits. The rule exists mainly for the protection of defendant. It is based on the maxims, "It concerns the commonwealth that there be a limit to litigation", and "No one ought to be twice vexed for one and the same cause". 1 C.J.S. Actions § 102c, p. 1308.
The Iowa Court has held that the rule against splitting causes of actions applies only where the several actions are between the same parties. 1 C.J.S. Actions § 102f (3), p. 1312.
Under statutes authorizing a recovery for death caused by wrongful act, such a death gives rise to a single and indivisible cause of action on which only one action for the recovery of all the damages for the benefit of all the beneficiaries may be *1013 maintained, a judgment in one action ordinarily acting as a bar to another action by other parties. 1 C.J.S. Actions § 104c, p. 1333.
In equity the rule is not "iron-bound," the courts will not enforce it unless justice in the particular case requires it, but will allow splitting under special circumstances to avoid injustice. 1 C.J.S. Actions § 102e, 1309, 1310. See Ainslie v. Moss, 191 Wash. 625, 71 P.2d 679.
In 25 C.J.S. Death § 33a, 1104, it is stated that the statutes almost universally provide that the action authorized shall be for the exclusive benefit of designated persons, members of the family or next of kin of decedent, and that in such cases the cause of action or the recovery therein is exclusively for the benefit of the designated beneficiaries, not decedent's estate or heirs at law * * * Cited as upholding the statement that the cause of action or recovery is exclusively for the benefit of the designated beneficiaries are numerous U.S. cases and those from twenty-five states including our own.
In the case of Aetna Casualty & Surety Co. v. Young, 107 Okl. 151, 231 P. 261, the facts were that one Effie Young had herself appointed as administratrix of the estate of Al Young, deceased, and sued the Magnolia Petroleum Company for allegedly and wrongfully causing his death. She obtained judgment for $3000.00 and defendant paid the money into court. On the same day she was appointed administratrix, sued Magnolia, got judgment and same was paid, she filed in the same action as that in which she had recovered the judgment, a petition with the same style on it, praying the judgment of the district court as to distribution of the proceeds of the judgment. Neither the widow nor her minor children by deceased were joined as defendants.
The widow, Florence Young, sued the administratrix' bonding company claiming entitlement to a share in the former recovery. Her judgment against the surety was affirmed.
In the body of the opinion, this Court said:
"Suits appertaining to the administration of this fund must be filed and proceed under the statutory Code of Procedure and the rules of equity governing generally the administration of such or similar trust estates. It is the duty of the trustee at his peril to distribute the trust estate to the proper cestui que trusts. To determine to whom and in what proportion it shall be distributed, the trustee may resort to suit in the district court, and in following the final determination of that court as to its distribution, the trustee is amply protected. This is true, provided of course that the court making such adjudication has acquired the three necessary elements of jurisdiction, to wit, jurisdiction over the person, over the subject-matter, and jurisdiction to render the particular judgment. With either element lacking the judgment of distribution is void * *.
"When this money was received by the court clerk of the district court, all the issues in that case had been fully and finally determined by the district court, and its jurisdiction in all matters presented to it had been exhausted and the case was at an end. There was left to be done only the ministerial act of the clerk to pay the money to the administratrix and to pay her all of the money recovered in the case he was bound to do, regardless of who were the cestui que trusts. The pleadings and the judgment should have recited that the deceased left kin surviving, and that the recovery of the moneys was for their benefit. None of these material provisions there appear, but as both parties here on appeal agree that such was the purpose and intention of such judgment, we so treat it here. If in the original suit she had named the widow and children and had there sought and recovered a several judgment *1014 in specific amounts for each of them separately, we would have a much different case from the one at bar. Here the judgment was for one lump sum and by its express terms was for the benefit of the administratrix without reference to the next of kin. We are treating it as being for their benefit because both parties before us so agree. On that theory we hold that when the proceeds of that judgment were paid into the hands of the court clerk, the widow and children became at once the owners of said moneys; the separate interest of each being in an unliquidated amount, which could thereafter be determined by the court only in a suit where they were brought into court by due process. Effie Young, as administratrix, then filed in the district court a new petition for relief in the case just concluded, seeking an adjudication as to distribution. Such petition has no business in the files of the old case, and the court acquired no jurisdiction over the person of the cestui que trusts by filing the petition in that old case. They were not even in court on the issues involved in the first case. In the second petition she sought a judgment binding all the cestui que trusts as to the distribution of these funds and a judgment so intended she there obtained in the court on the day she filed the petition. This second judgment shows upon its face that no service either actual or constructive was had upon the cestui que trusts or upon any one whomsoever, and none but the petitioner herself seems to have participated therein or had knowledge of the second proceedings. Under the law governing courts of equity, she could have obtained service, actual or constructive, upon all claiming an interest in said fund, and upon so doing the judgment would have been valid and her sufficient protector. As no such service was had or attempted, the court acquired no jurisdiction over the person of the cestui que trusts or of those claiming to be such. The district court lacked the first necessary element of jurisdiction, and it so appears upon the face of the judgment itself. Therefore such judgment is absolutely void upon its face * * *."
In 25 C.J.S. Death § 33a, p. 1104, cases from several jurisdictions are cited for the proposition that the cause of action or recovery in an action for wrongful death is not for the benefit of decedent's estate or heirs at law.
In 25 C.J.S. Death § 37b, p. 1123, it is said:
"The provision that the recovery shall be distributed in the same manner as intestate personalty is necessarily limited to distribution among those for whose exclusive benefit the right of action is given, and it does not let in other persons, although such as would take by descent in case of intestacy."
The trust under which the personal representative or other statutory plaintiff holds the damages which may be recovered may be enforced by the beneficiaries. Commencement of an action is not necessary to confer jurisdiction to order distribution of the fund and executors and administrators who receive money in settlement of damages for death by wrongful act are officers of the court and may be required to account for and distribute the fund in a summary proceeding in accordance with the rules of the court. Or a beneficiary may recover his share by an action against the personal representative, or other statutory trustee of the recovery. 25 C.J.S. Death § 37d, pp. 1127-1128.
In the case of Tackett v. Tackett 174 Okl. 51, 50 P.2d 293, this Court held that a minor daughter by a former marriage could recover in her action against the second wife of deceased because "the law implies substantial damages to the minor child by reason of the death of her father." The Court said that if the child, only eight years *1015 of age at the time of her father's death, "had desired to spread her hand against" the second wife-administratrix "as to the amount of the damages to be apportioned to each of them by the court in assessing damages, she should have done so before the rendition of the judgment for the wrongful death." Yet the Court sustained her right to come in but on the ground of res judicata held her to the share she would have received under the law of descent and distribution and affirmed the judgment of the trial court.
In the case of Hurley v. Hurley, 191 Okl. 194, 127 P.2d 147, all statutory beneficiaries were parties to the original suit for wrongful death. The court, after rendition of judgment and payment of amount hereof into court, upon stipulation of all parties, exonerated defendants and specifically reserved for future determination the apportionment of the recovery less certain expenses. The court followed the rule that the recovery would be divided between the mother and father of deceased in proportion to their respective pecuniary loss.
In the case of Eaton v. Allen, Okl., 362 P.2d 93, wherein was involved the matter of dismissal of a suit for personal injuries and there was a question between the parties as to whether the dismissal effected settlement of another action in another county between the same parties, the Court held that extrinsic evidence should be considered. In the syllabus, the Court said:
"A consent judgment dismissing an action, entered pursuant to agreement of the litigants, is binding only to the extent contemplated thereby.
"Where a `judgment' of dismissal appears on its face to be merely an administrative placing of record of a previous agreement entered into by the litigants, rather than an independent adjudication by the court, and it does not definitely appear, or there is room for reasonable doubt, whether said dismissal was intended to be a bar to further litigation of any and all claims made, or to be made, by said litigants, or either of them, arising out of the same event, or transaction, such doubt should be resolved by extrinsic evidence."
If this Court does have jurisdiction in this case, my opinion is that we should hold that plaintiffs, having failed to show pecuniary loss, should not recover and the trial court's judgment should be affirmed.
I respectfully dissent.
|
2024-04-29T01:26:36.242652
|
https://example.com/article/1751
|
Q:
Where are the statistics for vaccine side effects?
My son told me that that during a discussion at school someone mentioned statistics about side effects of vaccines (I assume that the discussion was about standard vaccines in France). The numbers were completely off (1/100 "illness", 1/100 "death" - again, these numbers do not make sense).
I wanted to provide him facts to rationalize (quantify) the discussion but it is now an hour I am searching on French, Canadian and US official sites (as well as WHO) and I cannot find any statistics on side effects (from mild to mortal).
I understand that "side effects" and "vaccines" are general concepts but I want to start with anything to just show the error. Let's say that "side effect" is anything from "reasonably impacting" (so not an arm which hurts for 48 hours) to death, and "vaccines" is anything from the typical set a child will get.
Is there a place where such statistics are available?
Please note that I am not talking here about "vaccines cause autism" (there is plenty of information about that) or "vaccines are not useful" (plenty of comparative studies as well). I also understand that vaccination is a pro-vs-cons decision, I have a hard time finding the "cons" in the form of numbers.
A:
(World Health Organisation, 2014. p. 2) shows the adverse effect (side-effect) rates for the MMR vaccine. For instance, fever between the 7th to 12th day after vaccination occurs in 5 to 15% of vaccine recipients and rashes occur in 2-5% of vaccines, etc. Page 6 summarises the results in a table. As you point out, the adverse effects are variable in severity and dependent on the particular vaccine; an organisation like the WHO will take into account the risk and severity of these adverse effects before recommending the use of the vaccine. And as you point out, it is not believed by the scientific community at large that vaccines have links with autism.
References
World Health Organisation. (2014). Information sheet observed rate of vaccine reactions measles, mumps and rubella vaccines.
|
2024-04-06T01:26:36.242652
|
https://example.com/article/4570
|
Acid-, base-, and lewis-acid-catalyzed heterolysis of methoxide from an alpha-hydroxy-beta-methoxy radical: models for reactions catalyzed by coenzyme B12-dependent diol dehydratase.
[Reaction: see text].A model for glycol radicals was employed in laser flash photolysis kinetic studies of catalysis of the fragmentation of a methoxy group adjacent to an alpha-hydroxy radical center. Photolysis of a phenylselenylmethylcyclopropane precursor gave a cyclopropylcarbinyl radical that rapidly ring opened to the target alpha-hydroxy-beta-methoxy radical (3). Heterolysis of the methoxy group in 3 gave an enolyl radical (4a) or an enol ether radical cation (4b), depending upon pH. Radicals 4 contain a 2,2-diphenylcyclopropane reporter group, and they rapidly opened to give UV-observable diphenylalkyl radicals as the final products. No heterolysis was observed for radical 3 under neutral conditions. In basic aqueous acetonitrile solutions, specific base catalysis of the heterolysis was observed; the pK(a) of radical 3 was determined to be 12.5 from kinetic titration plots, and the ketyl radical formed by deprotonation of 3 eliminated methoxide with a rate constant of 5 x 10(7) s(-1). In the presence of carboxylic acids in acetonitrile solutions, radical 3 eliminated methanol in a general acid-catalyzed reaction, and rate constants for protonation of the methoxy group in 3 by several acids were measured. Radical 3 also reacted by fragmentation of methoxide in Lewis-acid-catalyzed heterolysis reactions; ZnBr2, Sc(OTf)3, and BF3 were found to be efficient catalysts. Catalytic rate constants for the heterolysis reactions were in the range of 3 x 10(4) to 2 x 10(6) s(-1). The Lewis-acid-catalyzed heterolysis reactions are fast enough for kinetic competence in coenzyme B12 dependent enzyme-catalyzed reactions of glycols, and Lewis-acid-catalyzed cleavages of beta-ethers in radicals might be applied in synthetic reactions.
|
2023-09-21T01:26:36.242652
|
https://example.com/article/1070
|
Q:
Insert raw HTML into Elm component
How do I insert text - that I know to be 'safe' - directly into an Elm page.
i.e. what is text' in the following.
let str = "<h1>Hello World</h1>"
in div [] [ text' str ]
In practise I could get any valid HTML, so I don't want to build a parser, and I'd rather avoid a port as playing around wit the DOM can break the virtual dom diffing
A:
There are a few solutions discussed in this post. Seems the poster had success with using Markdown.toHtml.
A:
To elaborate on the accepted answer, this is what worked for me:
Install the markdown library
elm-package install evancz/elm-markdown
To render your HTML in a div
import Markdown
div [] [ Markdown.toHtml [] str ]
|
2024-03-26T01:26:36.242652
|
https://example.com/article/7605
|
Arab Venezuelans
Arab Venezuelans (; ) refers to Venezuelan citizens of Arab origin or descent. There are around 1,600,000 Venezuelans of Arab origin, mainly from Lebanon, Syria and Palestine. Most Arab Venezuelans are of Syrian descent with their number between 400,000 and 1 million inhabitants, and Lebanese descent with their number between 341,000 and 500,000.
Migration history
Arab immigration to Venezuela started as early as the 19th and 20th centuries. They came mostly from the Ottoman provinces of Lebanon, Syria, and Palestine, and are present in significant numbers in Caracas.
Immigration of Arabs in Venezuela has influenced Venezuelan culture, in particular Arabic food and music.
In religion, the majority of Arab-Venezuelans are Christians who belong to the Roman Catholic, Eastern Orthodox and Eastern Rite Catholic Churches. There are few Muslims.
Notable people
Tarek El Aissami, Venezuelan Vice President, former Minister for the Interior and Justice
Tarek Saab, politician, lawyer, and poet
Mariam Habach, Beauty Queen, Miss Venezuela 2015
Abdel el Zabayar, politician
See also
Syrian Catholic Apostolic Exarchate of Venezuela
Islam in Venezuela
List of Lebanese people (Venezuela)
Arab diaspora
Arab diaspora in Colombia
Lebanese diaspora
Syrian diaspora
Palestinian diaspora
References
External links
Al Jadid: Arabs making their mark in Latin America
Category:Ethnic groups in Venezuela
Category:Demographics of Venezuela
Category:Arab groups
Category:Arab diaspora in South America
|
2024-05-20T01:26:36.242652
|
https://example.com/article/6995
|
Direct endonuclease digestion and multi-analysis of restriction fragment length polymorphisms by microchip electrophoresis.
A high-performance multi-analysis system for genotypic mutation by means of restriction fragment length polymorphisms (RFLP) involving endonuclease treatment of PCR-amplified DNA on a microchip and subsequent analysis by microchip electrophoresis for DNA sizing was developed. A Hitachi SV1210 system, with which 12 samples can be analyzed on a plastic chip with good accuracy as to DNA sizing between 25 and 300 bp, was employed for RFLP analysis. We performed RFLP analysis of the ABO genotypes of blood donors for whom the ABO type was known. Six blood samples were analyzed by PCR to amplify two different regions of the genomic DNA, each of the amplified DNAs containing a different nucleotide polymorphism. To analyze the genes at polymorphic sites 261 and 526, restriction endonucleases Kpn I and Ban I were employed, respectively. When an amplified DNA was digested with each endonuclease on a microchip for 20 min, sequential analysis revealed the presence or absence of the respective restriction site. This analysis was performed within 7 min using a 1/10 volume of a DNA sample in comparison with the conventional method, and the estimated DNA size differed from the predicted size by less than 10 bp. The results indicate the potential of microchip electrophoresis for RFLP with on-chip direct endonuclease digestion and sequential analysis, offering high resolution in a short time.
|
2023-12-23T01:26:36.242652
|
https://example.com/article/4241
|
August 9, 2014
Saturday Spam: Random Swatch Spam!
Hi Guys! Hope you're all having a good weekend so far! Today I have some swatch spam for ya! Yesterday I found a long lost flash drive with all these photos on it (some from as far back as January lol) so I decided to edit them and just throw them all into 1 post. This is mostly Nicole by OPI but there are a couple other brands in here also. Some of these were sent for review (Nicole by OPI and Incoco) and some were bought by me! Check out all the swatches after the jump!
Incoco Desert Desert Jewel is a tribal patterned nail nail appliqué from their Tribal Beats Collection! easy to apply and the wear was good, I always have good luck with Incoco!
Incoco Desert Sunset is another nail appliqué from their Tribal Beats Collection. I really There were a couple more designs that you could use but they didn't fit my nails right :(
Nicole by OPI At Least I Pink So is a light pink creme. The formula was good, it was a little streaky but easy to even out and opaque in 2 coats
Nicole by OPI I Shop Mintage is a mini green creme. The formula was good, again very minor streakyness that was easy to even out. I used 3 coats for full opacity.
Nicole by OPI I'll Have The Salmon is a salmon pinky/orange. This has a very subtle shimmer, it's hardly noticeable in most light. The formula was good, but a bit streaky. I used 3 coats to completely even it out.
Nicole by OPI Oh That's Just Grape! is a purple with subtle shimmer. Like the polish above the shimmer was very subtle and not visible in most light. The formula was good, it was a nice consistency and easy to apply. I used 2 coats for the photos below.
Nicole by OPI Something About Spring is a medium pink creme. Good formula and nice opacity with this one. I used 2 coats.
Nicole by OPI Sweet Surrender is an off white creme. I don't know what it was about this one but it made my skin tone look funky. The formula was good but streaky, I used 3 coats to even it out.
Nicole by OPI Thats Putting It Mild is a light beige nude. Not the right undertones for my skin tone but it will look good on a variety of other people! The formula was good, it was a touch streaky but easy to even out and opaque in 2 coats.
Nicole by OPI This Blue Is So You! is a deep blue creme. I really like this one, no surprise there. The formula and consistency was good, I used 2 coats.
Nicole by OPI Yoga-Then-Yogurt is a stark white creme. The formula was good, it was a touch streaky but pretty minor and easy to even out. I used 3 coats to get it completely evened out.
OCC Pool Boy is a light blue creme. I think I got this in one of my PopSugar Must Haves boxes a couple months back, either May or June I don't remember lol! The formula was great, it was easy to apply and the opacity was really nice. I used 2 coats.
Revlon Leather Skinnies is a light grey creme textured polish. The texture is pretty minimal and can easily be gotten rid of with a coat of top coat. The formula was fantastic, it was easy to apply and super opaque. I used 1 coat for the photos below.
Revlon Rock Chic is a cobalt blue creme textured polish. Same as Leather Skinnies its a light texture and easy to get rid of with top coat if you don't like it. The formula again was fantastic, easy to apply and super opaque. I used 1 coat.
Sally Hansen Fiesta is a red, white and black glitter topper. The formula was not great in my opinion, it was heavy on base and hard to apply. I also got a freakin TON of bubbles once it dried *sad face* I used "2 coats" over Revlon Rock Chic.
Sally Hansen Tidal Rave is black, dark blue and light blue glitter in a clear base. I had the same issues as the previous polish, including the bubbles. I used "2 coats" over Revlon Leather Skinnies
Could it be that the dragging of the base-heavy formula combined with the texture on the Revlon polishes made the bubbles more exaggerated, or have you tried those toppers on other polishes, too? I've never put a top coat on a textured polish (I love texture too much for that!) so I don't know how it acts when you top it.
I love Rock Chic! I actually thought of you when I bought it a while back. The leather finish is really cool, I think. I normally only like sparkly textures, but the subtlety of the texture in these looks fab as a creme. I think glitter or shimmer would overshadow it!
Great post, but I am a little torn in terms of the colours... They are beautiful, but what is Nordic about them? I'm Swedish, and this is not what I consider 'Nordic'... Still, those are beautiful colours, and I might pick up Skating on thin ice-land or Viking in a vinter vonderland.
|
2023-12-18T01:26:36.242652
|
https://example.com/article/6535
|
Existing plastic urinary bags, worn on the thigh or calf, are typically of a design that has remained largely unchanged since such bags were first introduced. An exemplary bag is constructed of two pieces of identically sized and shaped plastic film that is sealed in such a manner as to create a rectangular, flat vessel with an inlet valve at the top and an outlet valve at the bottom. The valves are sealed in place between the two layers of plastic film. To attach the bag to the user's thigh or calf, slits are made at the four corners of the bag to permit the insertion of an adjustable strap (both top and bottom). This strap is usually made of latex rubber or some similar material to which a plastic “button” has been attached. Holes on the strap permit the user to adjust the tension of the strap by stretching the appropriate hole over the button, thus establishing a fixed degree of tension corresponding to the circumference of the leg to which the bag is attached.
Because of the design of such bag, when it is filled with urine it expands to form a rectangular balloon with the surface area of the bag in contact with the leg decreasing steadily in proportion to the volume of liquid contained within the bag. Thus, as the bag fills, it expands in such a manner as to press against the clothing raising the clothing well above the surface of the skin. This tends to make the bag obvious to others, which can be embarrassing to the user. Further, as the bag fills, the force holding the bag in place shifts almost exclusively to the straps, which accentuates the pressure already exerted by the buttons against the user's skin, to cause sores.
In addition, because such bag is constructed of identically sized and shaped sheets of plastic, reuse of the bag after emptying becomes problematic when the two wet surfaces come in contact with one another. The surface tension of the liquid tends to cause the two sides of the bag to stick together, even despite some surface texturing found in some bags. The force required to separate the two sides, which is required to allow the bag to be filled, is sometimes greater than the force exerted by the flow of urine into the bag. Thus, the tendency for the sides to stick together can cause the flow of urine into the bag to be stopped completely with potentially serious health consequences. For those with external catheters, this result can alternatively lead to failure of the catheter itself, which will result in the urine flowing freely onto the leg, clothing, and chair.
Current inlet valves used to prevent backflow add to this problem as well. When the sides of the bag stick together at the top of the bag, they impinge upon the valve because the valve extends into the bag itself. The force required to open the valve therefore includes the force required to open the inlet valve itself and to separate the bag sides from the valve opening. For example, a flat flutter valve that extends into the bag can be affected by pressure exerted against it by the closed sides of the bag. These sides often impinge upon the valve, which interferes with, and sometimes blocks, the flow of urine into the bag. Impingement on these valves also occurs to hinder urine flow when any object is placed on top of the bag, including the user's arms or hands when the bag is worn on the user's thigh.
Current inlet tubes also hinder the flow of urine by causing misalignment between the bag and the catheter that carries the urine. The placement of inlet tubes on existing bags is along the central axis of the bag such that placement of the bag on the user's thigh causes the inlet tubes to point away from the point at which the catheter is inserted or attached to the user. The resulting misalignment often causes the catheter to become constricted as a result of a very small radius bend that forms where the catheter enters the inlet tube. This constriction, like the aforementioned side wall sticking and valve impingement, can interfere with and sometimes block the flow of urine into the bag, which leads to serious health consequences.
|
2023-10-12T01:26:36.242652
|
https://example.com/article/2847
|
‘Mouth ka Saudagar’ to play Rajdeep & Arnab
Emran Hashmi, the Bollywood actor who has attained the reputation of a “serial kisser” in his film career, is to play the role of an “upwardly mobile journalist with a top news channel” in the upcoming film, Rush.
HT City, the city supplement of the Hindustan Times in Delhi, quotes the movie’s director as saying Hashmi’s character is based on Rajdeep Sardesai of CNN-IBN and Arnab Goswami of Times Now.
|
2023-09-03T01:26:36.242652
|
https://example.com/article/1976
|
Top Trumps: Doctor Who
Top Trumps: Doctor Who is a video game for the Nintendo DS, Nintendo Wii, Windows and PlayStation 2 consoles, based on the Top Trumps card game. It was published by Eidos. It is the first Doctor Who video game in 11 years since 1997, Destiny of the Doctors.
Part of the Top Trumps Adventures games, the game is set in the Doctor Who universe and features characters from the Tenth Doctor and Ninth Doctor's adventures including the Tenth Doctor, Martha Jones, Capt Jack Harkness, Dalek, Cyberman and Slitheen from series 1 to series 3 of the new series in the animation style of the animated stories "The Infinite Quest" and "Scream of the Shalka".
A version was released for the Wii on 5 December 2008 in the UK.
Gameplay
Players each receive a deck of cards and attempt to win all of their opponent's cards. Each card features characters or events from the Doctor Who universe and has statistics which define its strengths and weaknesses. Players choose which of these statistics will be higher than their opponent's card, the winner keeps both cards and play continues.
The game features two modes: adventure mode, where the player competes against AI controlled opponents, and a versus mode where two players go head-to-head.
Reception
The game currently holds a 53 percent rating from Metacritic based on 6 reviews. Eurogamer gave it a 7/10 rating, saying it was nicely done with enough data to please fans of the TV show while having not mucked about with the classic Top Trumps gameplay. Pocket Gamer also awarded the game a 7/10 rating. They said it was "simple but engrossing, even for those who aren't avid followers of the Timelord's adventures."
See also
Top Trumps Adventures
Top Trumps Adventures for Wii
Top Trumps Adventures: Dogs and Dinosaurs
Top Trumps Adventures: Horror and Predators
References
External links
Category:2008 video games
Category:Nintendo DS games
Category:PlayStation 2 games
Category:Wii games
Category:Windows games
Category:Top Trumps
Category:Eidos Interactive games
Category:Video games based on Doctor Who
Category:Tenth Doctor stories
Category:Cybermen stories
Category:Video games developed in the United Kingdom
|
2024-04-08T01:26:36.242652
|
https://example.com/article/8987
|
The UK’s Offender Jobs Sector Job Site
Work with offenders is a leading news, information and job site for the offender supervision and offender rehabilitation community. Our editorial team updates the news section with fresh, original and innovative news articles, features and comment on this important work community. The site is visited by every practitioner type which makes up the community from prison staff, rehabilitation health care professionals, probation professionals and the CJS business managers. Find out more...
The Independent Police Complaints Commission (IPCC) has instructed Humberside Police to hold gross misconduct hearings for two police officers following an incident which occurred 17 years ago.
Following the death in custody of former paratrooper Christopher Alder, 37, in 1998, officers carried out surveillance on his sister Janet Alder and another person in 2000.
The IPCC investigation followed a referral by the force in August 2013 after the Home Secretary requested all forces check their records for evidence of surveillance as part of the inquiry into the death and investigation of Stephen Lawrence.
Humberside Police's searches revealed evidence of surveillance into Ms Alder and another person.
The IPCC investigation, which was completed in January 2015, found evidence of a case to answer for gross misconduct for two detective sergeants.
The report was referred to the CPS which concluded earlier this year there was not enough evidence to provide a realistic prospect of conviction against each defendant in relation to the surveillance carried out.
Humberside Police did not initially share the IPCC’s view regarding a gross misconduct hearing which led to IPCC Commissioner Cindy Butts writing to the force to direct it to hold hearings for the officers.
Ms Butts said: “The decision to direct a police force to hold disciplinary hearings is not taken lightly. Taking into account the serious and sensitive nature of the allegations and the weight of the evidence presented to me, I felt it was essential for public confidence that the officers concerned account for their actions.”
The IPCC will consider publishing its findings in full, once all proceedings have been concluded.
The dates for the hearings will be confirmed in due course.
Mr Alder died while lying face down and unconscious in a pool of blood in a police custody suite in Hull.
CCTV showed he received no help from five police officers who were nearby and thought he was play acting. It took 11 minutes for him to stop breathing.
( ! ) Fatal error: Call to a member function featuredStoryImageURL() on a non-object in /var/www/jms/application/views/templates_c/frontend/offenderjobs/%%F0^F01^F0129DE2%%news_article.tpl.php on line 132
|
2024-07-24T01:26:36.242652
|
https://example.com/article/2577
|
File history
Metadata
This file contains additional information, probably added from the digital camera or scanner used to create or digitize it.
If the file has been modified from its original state, some details may not fully reflect the modified file.
Camera manufacturer
Canon
Camera model
Canon EOS 5D Mark III
Author
Eric Liebowitz
Exposure time
1/400 sec (0.0025)
F Number
f/4
ISO speed rating
1,600
Date and time of data generation
20:55, March 29, 2015
Lens focal length
200 mm
Image title
QUANTICO - "Run" -- A diverse group of recruits has arrived at the FBI Quantico Base for training. They are the best and the brightest, so it seems impossible that one of them is suspected of masterminding the biggest attack on New York City since 9/11. "Quantico" airs SUNDAY, SEPTEMBER 27 (10:00-11:00 p.m. ET) on the ABC Television Network. (ABC/Eric Liebowitz)
PRIYANKA CHOPRA, ANTHONY RUIVIVAR
|
2024-04-01T01:26:36.242652
|
https://example.com/article/9191
|
1. Introduction {#sec1-healthcare-04-00030}
===============
As a society, the United States (US) spends nearly three trillion dollars each year on healthcare \[[@B1-healthcare-04-00030]\]. Debates surrounding this figure often center on methods for reducing the cost of healthcare \[[@B2-healthcare-04-00030]\], yet they rarely address why the US has such poor health outcomes when compared to other advanced countries \[[@B3-healthcare-04-00030]\]. The 1980s and 1990s saw the emergence of new hypotheses that the foundation of human health is programmed in early life \[[@B4-healthcare-04-00030]\]; there is now a substantial body of evidence supporting the importance of the period from conception through the first few years of life \[[@B3-healthcare-04-00030],[@B4-healthcare-04-00030],[@B5-healthcare-04-00030]\]. Still the United States remains without a strong nationwide mechanism to support this critical period, namely a law that guarantees paid parental leave. Studies that examine the effects of paid parental leave indicate that it contributes to fewer low birthweight babies \[[@B6-healthcare-04-00030],[@B7-healthcare-04-00030]\], fewer infant deaths \[[@B6-healthcare-04-00030],[@B8-healthcare-04-00030],[@B9-healthcare-04-00030],[@B10-healthcare-04-00030],[@B11-healthcare-04-00030]\], higher rates of breastfeeding \[[@B12-healthcare-04-00030]\], longer parental lifespan \[[@B13-healthcare-04-00030]\] and improved mental health \[[@B14-healthcare-04-00030],[@B15-healthcare-04-00030],[@B16-healthcare-04-00030]\], as well as increased long-term achievement for children \[[@B17-healthcare-04-00030]\].
More than 50 years ago, President Kennedy issued an executive order creating the Presidential Commission on the Status of Women. The findings of this commission, issued in 1963, noted that the United States was lagging behind the developed world in providing support for working mothers. The Commission's report urged: "\[p\]aid maternity leave or comparable insurance benefits should be provided for women workers" \[[@B18-healthcare-04-00030]\]. While maternity leave policy in the United States has progressed little in the intervening years, social norms have changed significantly. Women now make up an even greater portion of the American workforce than in the 1960s, and as a result women who become pregnant today are more than three times as likely to be working a job until the very end of their pregnancy when compared to their 1960s counterparts \[[@B19-healthcare-04-00030]\]. Of American women today who work during pregnancy, 59% will be back to work within three months of giving birth \[[@B19-healthcare-04-00030]\].
All wealthy nations other than the US have some form of legal guarantee that new parents can take paid time off to be with their child \[[@B20-healthcare-04-00030]\]. While the specifics of these guarantees vary by country, US federal legislation (the Family Medical Leave Act (FLMA)) lags behind, only provisioning *unpaid* time off for workers of companies with more than 50 employees, at which the worker must have been employed for the past 12 months and have worked at least 1250 hours in this period \[[@B6-healthcare-04-00030]\]. It has been estimated that fewer than half of American workers are eligible for this unpaid leave mandate \[[@B21-healthcare-04-00030]\]. Government officials at the highest levels, including President Obama, the US Surgeon General, and US Secretary of Labor, have all conceded that the United States continues to "stand still while family policy in the rest of the world passes us by" \[[@B20-healthcare-04-00030]\]. Although the US lacks federal provisions for paid leave, employers are free to offer paid leave to employees as they see fit \[[@B20-healthcare-04-00030]\]. While companies voluntarily offering such policies should be lauded, the Bureau of Labor Statistics has found that voluntary paid family leave policies cover only 11% of American workers \[[@B22-healthcare-04-00030]\].
Five US states have enacted laws that offer paid leave to new parents. California, while not providing job protection, does offer six weeks of leave, and 55% pay during the leave period \[[@B23-healthcare-04-00030]\]. New Jersey offers a maximum six weeks of leave, at two-thirds pay \[[@B23-healthcare-04-00030]\]. Rhode Island offers four weeks at roughly 60% pay \[[@B20-healthcare-04-00030]\]. Washington State passed a law in 2007 offering family leave at partial pay, but the law has never been funded and thus remains not in effect \[[@B24-healthcare-04-00030]\]. In March of 2016, New York became the most recent state to pass paid family leave legislation, which will phase in leave benefits over three years beginning in 2018, ultimately offering 12 weeks of leave at two-thirds pay in 2021 \[[@B25-healthcare-04-00030]\]. Additionally, Hawaii and the Commonwealth of Puerto Rico have temporary disability insurance (TDI) provisions that provide short maternity leaves (six to eight weeks) at partial wages for healing after giving birth \[[@B20-healthcare-04-00030]\].
While new parents in these regions may appreciate these policies, their statutory access to paid parental leave still falls far short of that in other developed economies. Comparing the benefits offered to a new mother in the 41 other countries considered "developed economies" by the International Labor Organization, six countries stand out as offering the shortest leave periods: Greece, Israel, the Netherlands, New Zealand, Spain, and Switzerland \[[@B26-healthcare-04-00030]\]. In all of these countries, the duration of leave available to a new mother ranges between 14 and 17 weeks, with pay at 100% for all countries other than Switzerland (which is set at 80%) \[[@B26-healthcare-04-00030]\]. California and Spain have similarly sized populations, yet a working mother in Spain can take 16 weeks of leave at full pay, while her contemporary in California can take only six weeks at 55% pay \[[@B26-healthcare-04-00030],[@B27-healthcare-04-00030]\]. Japan and Canada stand out as offering the lowest rates of compensation (two-thirds pay in Japan for the first 14 weeks, with 50% pay for up to 52 weeks more; Canada offers 50 weeks at 55% pay) \[[@B26-healthcare-04-00030]\]. While both of these countries do offer fractional pay comparable to that of US states with paid family leave laws, the duration of leave offered is an order of magnitude longer.
The broader ecology of American parental leave can be seen as a gradient of benefits and access. Only 11% of American workers are privileged enough to enjoy employer-furnished paid parental leave as a fringe benefit \[[@B22-healthcare-04-00030]\], while a larger group of workers in five states has access to some partially paid parental leave. Roughly half of workers (including many of the aforementioned) have access to the 12 unpaid weeks provisioned within the FMLA \[[@B21-healthcare-04-00030]\]. At the bottom of the gradient are the remaining workers, left with no benefits at all.
Significant inequities in American health can be found along economic, educational, and racial fault lines \[[@B28-healthcare-04-00030]\]. The children most at risk of poor outcomes \[[@B29-healthcare-04-00030]\] are those whose parents are most likely to be in the 89% of workers who are not offered leave by their employers \[[@B21-healthcare-04-00030],[@B22-healthcare-04-00030],[@B30-healthcare-04-00030],[@B31-healthcare-04-00030]\]. The top 40% of wage earners are more than 2.5 times as likely to have access to paid leave when compared to the bottom 40% \[[@B30-healthcare-04-00030]\]. The social hierarchy is itself a robust predictor of patterns of disease and mortality among populations \[[@B32-healthcare-04-00030]\], and parental leave in America traces the outlines of this social gradient. It follows that if paid leave is an intervention with health benefits, the accrual of these benefits to those nearest the top of the American social hierarchy can be seen as an inequality-generating intervention \[[@B33-healthcare-04-00030]\].
As US lawmakers at both the state and federal level consider the possibility of enacting paid family leave legislation or improving existing legislation, it will be important to consider what evidence there is for an association between improved population health outcomes and paid family leave. From country to country there is significant variation in leave policies, and the United States can leverage lessons learned from studying these policy differences. This document is intended as a review of relevant scientific literature related to paid leave and health outcomes. It is divided into the following sections: leave duration and effects on infant mortality, antenatal leave and effects on birth outcomes, breastfeeding and paid leave, and gender differences in leave-taking.
2. Evidence of Health Effects Related to Job-Protected Paid Leave {#sec2-healthcare-04-00030}
=================================================================
One aspect of the paid leave debate centers on the amount of time taken at the end stages of pregnancy and following childbirth. In 1952, the International Labor Organization, an arm of the United Nations, adopted a recommendation for 14 weeks of paid maternity leave \[[@B34-healthcare-04-00030]\]. This recommendation was updated to 18 weeks in the year 2000 \[[@B35-healthcare-04-00030]\]. Although there is variation between countries in leave length and other policy details, most developed economies offer between 18 weeks and one year of leave, at 70%--100% pay \[[@B23-healthcare-04-00030],[@B26-healthcare-04-00030]\].
The earliest study we are aware of that analyzes parental leave and health outcomes was published in 1995. In this study, Winegarden and Bracy \[[@B10-healthcare-04-00030]\] used data from 17 Organization for Eonomic Cooperation and Development (OECD) countries spanning four time periods (1959, 1969, 1979, and 1989) in order to estimate the effect of maternity leave on infant mortality. Across the countries and time periods in their sample population, the average infant mortality rate was 19.4 deaths per 1000 births. Using fixed individual-effects linear modeling, they found a single week extension of maternity leave would be expected to account for a reduction of 0.5 infant deaths per 1000 births. While this is a significant finding, the authors are careful to note that this result relates to small changes around variable means and is not likely to be predictive of drastic modifications in leave benefits. This study also suffers from some methodological issues including failure to control for other variables that may be relevant, such as GDP and medical insurance coverage, and assumed linear effects of leave duration. Although these modeling issues further imply its findings cannot be widely generalized, it was a significant first study in attempts to model the health effects of leave length.
Ruhm \[[@B8-healthcare-04-00030]\], expanding on the ideas of Winegarden and Bracy, used aggregated data on 16 European countries from the period 1969--1994. Of these countries, 12 were present in the Winegarden study mentioned above. Ruhm's analysis included many controls for confounders, including GDP, healthcare spending and insurance coverage, as well as proxies for proliferation of sophisticated medical technologies (e.g., neonatal intensive care units) and for country-specific time-varying factors that may improve child health independent of parental leave. A 10-week extension of paid leave was predicted to reduce infant mortality rates by 2.5%--3.4%. Looking more closely at infant mortality, a trend emerges where the largest improvements are predicted for later periods of infancy. Post-neonatal mortality shows the greatest effect, with a 3.7%--4.6% mortality reduction accompanying a 10-week extension of paid leave. Child mortality follows, with a 3.3%--3.5% reduction in mortality, and then neonatal mortality, perinatal mortality, and finally low birthweight (LBW).
This trend follows a certain intuition of non-linearity between paid leave and child health. Ruhm notes that in contexts where no leave is provisioned by law, such as the United States in the 1980s, most mothers will take at least one month of leave \[[@B8-healthcare-04-00030]\], so it follows that the model predicts the effects of paid leave extension will accrue after the perinatal and neonatal periods. A paid leave extension of 10 weeks would be most likely to show benefits during the post-neonatal period, and indeed that is the result of Ruhm's analysis. Furthermore, this upward trend of effects runs counter to expected confounders, such as the dissemination of effective new neonatal medical technologies or procedures, which should have greatest effect during the first days after birth. The sharp decrease (\~3.4%) in child mortality is balanced against a negligible (\~0.032%) reduction in senior citizen mortality. In this case, senior citizen mortality serves as a proxy measure for unobserved influences on population health that are independent of parental leave entitlements, which again implies the validity of the model. When 'no leave mandate' was tested against mandates of 10, 20, 30, 40, and 50 weeks of job-protected paid leave, 40 weeks was found to have the greatest overall reduction to mortality (*p* \< 0.02).
Building on the work of Ruhm, Tanaka \[[@B6-healthcare-04-00030]\] published a study in 2005 that aimed to estimate the health effects of parental leave while also including the United States in the dataset, incorporating data more recent than 1994, and including more robust controls for other health measures (such as low birthweight) and separate social policies \[[@B6-healthcare-04-00030]\]. Tanaka's dataset spanned a period from 1969 to 2000 and analyzed the 16 European countries that were included in Ruhm's study, plus the US and Japan. The design of his model was similar to that of Ruhm, including the same controls (GDP, healthcare insurance coverage, *etc.*), and Ruhm's results were reproduced before the two new countries and additional six years of data were included. Tanaka found a 10-week extension of job-protected paid leave would reduce infant mortality by 2.5% overall, with analysis by period showing post-neonatal and then child mortality to have the sharpest declines (4% and 3%, *p* \< 0.01) \[[@B6-healthcare-04-00030]\]. Tanaka also notes the logic of the non-linear results (that additional leave seems to accrue benefits to later child health) but points out that there is a statistically significant reduction for all infant mortality categories \[[@B6-healthcare-04-00030]\], and acknowledges that it is possible that the more leave that is available to expectant mothers, the more likely they are to use some of it before birth. One of the most important findings from both Ruhm \[[@B8-healthcare-04-00030]\] and Tanaka \[[@B6-healthcare-04-00030]\] is the substantially reduced effect for job-protected *unpaid* leave and paid leave without job-protection---it is only job-protected paid leave that seems to have the powerful effects referenced above.
This series of sequentially more comprehensive studies has shown an association between paid parental leave and lowered infant mortality, but it is important to note the authors are speaking to overall population-level trends. Although countries with more paid parental leave experienced reduced population-wide infant mortality rates even after controlling for confounders, there may also be ways in which more generous parental leave could associate with higher infant mortality risk for a given child. One possibility is that generous paid leave might entice a mother to take on employment when she would have otherwise exclusively cared for her child; Ruhm does note that his model predicts a 5.5% reduction in post-neonatal infant mortality for every 10% drop in female employment \[[@B8-healthcare-04-00030]\]. Another possibility, raised by Winegarden, is that paid leave policies may, at a population level, precipitate women having children later in life \[[@B10-healthcare-04-00030]\].
Furthermore, at least some research into infant mortality and parental leave has found mixed or negative results. An analysis that attempted to replicate the work of Ruhm and Tanaka, substituting a different dataset from 30 OECD countries, did find a reduction in infant mortality, but it was not statistically significant \[[@B36-healthcare-04-00030]\]. Dustmann and Schönberg \[[@B37-healthcare-04-00030]\], examining historical maternity leave reforms in Germany, found minimal positive effects for later reforms. They measure increased days of schooling as well as likelihood of being at a 'high track' school (being streamlined toward university). It is worth noting that the reforms in question added either unpaid leave (expanding from 18 to 36 months), or low-paid leave (for the period from two to 10 months, and then later 18 months). Tanaka \[[@B6-healthcare-04-00030]\] and Ruhm \[[@B8-healthcare-04-00030]\] both find that unpaid leave has very little or no effect, and other studies \[[@B38-healthcare-04-00030],[@B39-healthcare-04-00030]\] often correct for partial wage replacement by using 'full-time equivalent' weeks or similar manipulations to correct for diminished effects. The retrospective nature of these studies, the complexity of the mathematical modeling involved, and the gaps in existing datasets all present very real challenges.
Rather than considering only paid leave extensions, another study of infant mortality examined the years surrounding the implementation of the US Family and Medical Leave Act (FMLA), which provides only for unpaid leave \[[@B40-healthcare-04-00030]\]. This study, by Rossin, found that after the FMLA implementation in 1993, benefits could be observed when looking at outcomes for groups of workers most expected to avail themselves of the new law. Less-educated and single mothers are least likely to take unpaid leave \[[@B21-healthcare-04-00030]\], and indeed Rossin's analysis of these groups revealed no effect on the infant mortality rate of their children. When controlling for the demographic characteristics of participants who could likely afford to take the unpaid leave provided by FMLA, the analysis found a 10% reduction in infant mortality \[[@B40-healthcare-04-00030]\].
Rossin's approach involved segmenting worker sub-populations by race, educational status, county of residence, and birth month of child, and then used difference-in-differences modeling (DD) to hold states with pre-existing unpaid leave laws as controls, while states without leave laws were taken as the treatment group \[[@B40-healthcare-04-00030]\]. Groups known to be likely to avail themselves of American parental leave laws were then compared to their reciprocals using a difference-in-difference-in-differences methodology (DDD). Rossin notes that the DDD modeling reveals a significant decrease in deaths from "ill-defined" causes (which includes Sudden Infant Death Syndrome, or SIDS) among the sub-sample (educated and/or married women in non-leave-law states), representing a 47% reduction in the likelihood that a child born to one of these women would die of an ill-defined cause in infancy.
Although Rossin's findings may seem extreme for an unpaid leave mandate, it is important to remember that FMLA was implemented in a time when many workers did not have access to any leave whatsoever, and furthermore that context matters---extension of pre-existing paid leave in an affluent western European country with subsidized childcare, universal medical insurance coverage, and other generous social policies may have a far less pronounced effect than nationwide provisioning of leave for the first time in a setting where high-quality affordable child care, healthcare insurance coverage, and other social goods are not as evenly distributed \[[@B40-healthcare-04-00030]\].
In low and middle income country contexts, Nandi *et al.* \[[@B11-healthcare-04-00030]\] use DD modeling to predict that a one-month extension of paid parental leave will be associated with a 13% drop in infant mortality. Their study was based on more than 300,000 births in 20 countries, taking place between 2000 and 2008. Heymann *et al.* \[[@B9-healthcare-04-00030]\] also had a similar result when analyzing infant and child mortality in 141 United Nations member countries. Multivariate ordinary least squares regressions were used, with controls for per capita GDP, health expenditures, public health measures, female literacy, immunization rates, and skilled birth attendance. An increase of 10 full-time-equivalent weeks of paid leave was associated with a 10% reduction in the infant mortality rate (*p* \< 0.001), and a 9% lower rate in child mortality (*p* \< 0.001). Perhaps most interesting, these regressions were made for the entire dataset, as well as non-OECD countries, and the results were strikingly similar. This finding echoes that of Nandi \[[@B11-healthcare-04-00030]\], and reaffirms that paid parental leave seems to be strongly associated with lower rates of infant death regardless of whether low or middle or high income countries are analyzed. Such findings further suggest that this effect may well be causal, as the more heterogeneity that there exists between societies examined, the less likely it is that health improvements are simply due to some unobserved confounding factor(s).
A report prepared for the US Department of Labor, examining the first decade of California's paid family leave law, is particularly instructive for shaping policy based on lessons learned. A survey of eligible workers who did not apply for benefits under the law found that one-third of eligible parents remained working because the wage replacement percentage of 55% was too low \[[@B27-healthcare-04-00030]\]. Although California's paid leave law has increased the proportion of mothers taking leave, as well as the average amount of leave taken, multiple studies report that the average Californian mother is taking only 40% to 50% of the paid leave available to her \[[@B24-healthcare-04-00030],[@B41-healthcare-04-00030]\]. This suggests that many mothers are caught at the tipping point between trying to maximize time with their newborn child and being unable to afford to take any more time off at partial-wage \[[@B27-healthcare-04-00030]\].
In 1977 Norway transitioned from three months of *unpaid* family leave to four months of job-protected paid leave, with provision for a further 12 months of unpaid leave \[[@B17-healthcare-04-00030]\]. Carneiro *et al.* \[[@B17-healthcare-04-00030]\] used Norwegian Registry data to trace the outcomes for mothers eligible for leave in 1977 (using DD modeling against matched 1975 mothers as controls). Children and mothers were followed from 1977 to 2006, providing a very broad window of observation. The study found positive effects on IQ and college attendance, with reductions in dropout rates and teenage pregnancies for children born after the addition of paid leave \[[@B17-healthcare-04-00030]\]. One key advantage of this study is that it was able to link individual children with individual mothers, rather than relying on population-level outcomes. The authors also note that the ecology of Norwegian childcare at the time of reform is important to consider, as there were no high quality childcare alternatives readily available to most parents, which differs from other studies of northern European populations. Their model included balancing of the pre-reform control to the treatment group, and additional controls for observable maternal characteristics (age, education). Controls for specific outcomes include other variables known to be positively associated with the reform to test whether the outcome of interest was due to discrete effects. Although increased breastfeeding initiation and duration is one way in which paid leave is thought to benefit child outcomes, the authors show that average breastfeeding duration did not change around the time of the reform, which they interpret to mean the observed outcome differences are attributable to more direct forms of parental investment. Perhaps most importantly, the benefits for children of mothers who were educationally disadvantaged appear to have nearly doubled. This is promising for workers in the US, where both unmarried and less educated mothers have reduced access to leave \[[@B21-healthcare-04-00030]\]. Additionally, American workers of color are twice as likely to lack access when compared to whites \[[@B42-healthcare-04-00030]\], and workers earning less than \$35,000 a year are 2.4 times as likely to lack access when compared to those earning \$75,000 \[[@B42-healthcare-04-00030]\]. By tracing individual registry data across the population level, Carneiro and co-authors have shown that although advantaged mothers used the newly adopted paid leave at the same rates as disadvantaged mothers, this was not the case in 1975 for their respective control groups when leave was unpaid. The implication is that access to paid leave can be a powerful intervention for reducing inequality of outcomes.
3. Antenatal Leave and Birth Outcomes {#sec3-healthcare-04-00030}
=====================================
The US Centers for Disease Control and Prevention (CDC), in trying to illuminate inequalities in infant mortality within the United States, note that the infant mortality rate in the United States is largely a consequence of premature births regardless of race, although women of color are at higher risk for giving birth before term \[[@B29-healthcare-04-00030]\]. For babies born at 39--41 weeks, there were 2.07 deaths per 1000 births. Premature births in the 34--36 week category are subject to an average infant mortality rate more than three times as high (7.42/1000). The authors note, "Because the percentage of preterm births for all U.S. racial and ethnic groups is higher than in other developed countries, all U.S. racial and ethnic groups might benefit from prematurity prevention efforts" \[[@B29-healthcare-04-00030]\]. A different CDC publication \[[@B43-healthcare-04-00030]\] notes that 129 other countries have a lower proportion of preterm births than the US. One obvious question is whether paid antenatal leave helps prevent preterm births.
A study conducted in 1992 looked at all births (*n* = 2767) in three hospitals in Mexico City during a three-month period \[[@B44-healthcare-04-00030]\]. Occupation, working conditions, and job stress were not found to be associated with premature delivery, but lack of antenatal leave was. Also associated were maternal age, lack of prenatal care, high parity, and having no financial help in an emergency. Of all the conditions found to associate with premature delivery, no antenatal leave had the strongest correlation (a three-fold increase in risk). For those with access to antenatal leave, having used less than a month of antenatal leave carried an odds ratio of 6.3. Although this is quite high, it is important to note that it is subject to experimental confounding as some of the women in this group may have intended to use more than three weeks of antenatal leave but then went into labor prematurely. Lacking access to antenatal leave meant women in the study were over 50% more likely to have small-for-gestational-age (SGA) babies, even after adjustment for confounders. The mortality risks for SGA and premature babies are substantial, including a more than four-fold risk of infant mortality for SGA babies \[[@B45-healthcare-04-00030]\].
Rossin's study of FMLA effects \[[@B40-healthcare-04-00030]\] found small but statistically significant reductions in preterm births for American women, as well as reductions in LBW deliveries. These results likely underestimate the potential effects of paid antenatal leave due to the FMLA being both an *unpaid* mandate and providing only a short amount of total leave (12 weeks) to be split between antenatal and postnatal periods.
Stearns, in an analysis of the effects of TDI \[[@B7-healthcare-04-00030]\], showed that even short maternity leaves can have a significant reduction in the share of low birthweight deliveries. Temporary disability insurance can be operationalized as a short maternity leave at 50%--66% wage replacement, depending on which of the five TDI states is being examined, and Stearns found the overall effect was a 3.2% reduction in LBW deliveries (*p* \< 0.01). The five TDI states (CA, HI, RI, NJ, NY) were examined individually and as a group using a DD model balanced against synthetic control states. Synthetic controls were constructed using a weighted average of non-TDI populations, with matching for statewide percentage of LBW, maternal age, marriage prevalence, and race. Because not all pregnant women in TDI states during the sample period took leave under TDI, the overall stated effect is an underestimate. California's historical data on disability claims reveals that 27% of women who gave birth in that state during the study period (1979--1985) made a pregnancy-related TDI claim. A treatment-on-the-treated (TOT) effect can therefore be calculated by dividing the overall decline in CA LBW (3.2%) by the proportion of eligible women who did take TDI (0.27), for a treatment effect of 12% reduction in LBW. This is quite significant, considering that TDI leave length is just a few weeks and therefore most women are likely to use only a portion (if any) of it for antenatal leave. Stearns finds TDI reduced "early term" births (37--38 weeks gestation) by 6.6%, but had almost no effect on premature (before 37 weeks gestation) births. The increased number of full-term births due to this reduction accounts for roughly 40% of the observed LBW reduction.
An analysis by Del Bono and colleagues \[[@B46-healthcare-04-00030]\], using data from the CDC's National Survey of Family Growth, found smoking during pregnancy increased the risk of low birthweight by 5%. Early work stoppage is associated with significant improvements for birthweight and preterm delivery, independent of smoking. Additionally, Del Bono *et al.* estimate that the effect sizes of stopping work early are one-half that of smoking during pregnancy in terms of absolute value. A study in Canada of 363 recent births to working mothers found that the increase in duration of antenatal leave was significantly associated with reductions in birth complications \[[@B47-healthcare-04-00030]\]. This is corroborated by a nested case control study of 447 working women in California which revealed that those taking antenatal leave during or after the 36th week of pregnancy experience nearly four times lower odds of cesarean delivery (OR: 0.27) \[[@B48-healthcare-04-00030]\].
Currie and Rossin-Slater \[[@B49-healthcare-04-00030]\] showed that having experienced a hurricane during pregnancy increases the probability of labor and delivery complications. They suggest that the effects of this stress may be too subtle to observe through more common markers such as gestation length and birthweight and that further research is needed to better understand the effects of stress during pregnancy.
Preterm delivery and low birthweight are related outcomes, with evidence that third trimester stress may be a significant driver of preterm delivery \[[@B5-healthcare-04-00030],[@B50-healthcare-04-00030]\]. Present knowledge of human biology as well as animal models both support the notion that stress during pregnancy can create lasting harm to offspring \[[@B5-healthcare-04-00030],[@B51-healthcare-04-00030]\]. Paid antenatal leave offers promise as a population-level intervention for improving birth outcomes.
4. Breastfeeding, Immunizations, and Maternal Health {#sec4-healthcare-04-00030}
====================================================
There is also evidence that parental leave can affect breastfeeding behavior. Baker and Milligan \[[@B12-healthcare-04-00030]\] found that following a six-month extension of Canada's paid parental leave, there was a 40% increase in exclusive breastfeeding at six months, and an average three-to-3.5-month increase in paid leave utilization. When examining health outcomes reported by parents to Canada's National Longitudinal Study of Children and Youth (NLSCY), the authors could not find any long-term benefit to child or maternal health captured by the data in the NLSCY survey, despite having chosen outcomes purported to be linked to breastfeeding. In addition to variables related to breastfeeding and child health (including asthma, allergies, and ear infections), self-reported maternal health and maternal depression were also included. The authors report that the maternity leave extension (and attendant increase in breastfeeding) did not have a consistent, robust effect on child health as captured by NLSCY data. It may be that the NLSCY survey is not sensitive enough or otherwise does not capture the benefits of breastfeeding increase. Still, several breastfeeding studies have reported associations between breastfeeding and these indicators \[[@B12-healthcare-04-00030]\], so Baker and Milligan's findings illustrate the possibility that prior studies may overestimate certain effects, or the effects may depend on context. Khanam *et al.* \[[@B52-healthcare-04-00030]\], examining asthma and bronchiolitis in children of Australians found statistically significant reductions for paid maternity leave, but the relationship was no longer significant if parental health was included as a covariate. This might imply parental leave acts as a safety net for those parents whose own health is compromised. Perplexingly, paid paternity leave was associated with a rise in asthma, although this may be a case of reverse causality (fathers with asthmatic children are more likely to take paid leave).
In the US, two groups of breastfeeding data from the Infant Feeding Practices Study were analyzed (one group before California's paid family leave law implementation, one after) and researchers found evidence of improvement in breastfeeding practices after the law was implemented: a 3%--5% increase for exclusive breastfeeding at three and six months, and a 10%--20% increase for 'some breastfeeding' at the three-, six-, and nine-month marks \[[@B53-healthcare-04-00030]\]. The authors of this study are careful to note that as with many natural experiment studies, there are many unseen confounders for which they may not have adequately controlled. Another study that attempted to answer this question in the United States looked at breastfeeding practices among more than a thousand American mothers \[[@B54-healthcare-04-00030]\]. Returning to work within 12 weeks, and returning to work after 12 weeks while working more than 34 h per week were both associated with significantly shorter breastfeeding duration.
According to the CDC, only one in five American mothers exclusively breastfeed for the recommended six months \[[@B55-healthcare-04-00030]\]. Although there are both physiological and cultural reasons why breastfeeding initiation and continuation can be difficult for new mothers, a survey of UK mothers found 90% of those who give up breastfeeding within six weeks of birth report they would have liked to have breastfed longer \[[@B56-healthcare-04-00030]\]. American mothers who plan to return to work within six weeks are 40% less likely to breastfeed exclusively when compared to those planning to take 12 or more weeks of leave \[[@B57-healthcare-04-00030]\]. Whether leave from work lasts a few weeks or a few months, approaching the end of leave often creates major problems for breastfeeding. Returning to work emerges as the top reported reason for cessation of breastfeeding after the first two months \[[@B56-healthcare-04-00030],[@B58-healthcare-04-00030]\]. One 2010 study that followed more than 20,000 mothers in Taiwan found that maternal return to work within six months was a significant barrier to breastfeeding initiation and continuation \[[@B59-healthcare-04-00030]\]. Taiwan's statutory maternity leave is eight weeks in length, and at the eight-week mark the prevalence of breastfeeding was more than twice as high for mothers who did not return to work as compared to those who did \[[@B59-healthcare-04-00030]\]. In America, mothers taking maternity leave experience a four-fold increased odds of failure to establish breastfeeding for those who return to work in fewer than six weeks, and a two-fold higher odds for those who return during the six- to 12-week period, relative to women not returning to work, after adjusting for covariates \[[@B48-healthcare-04-00030]\]. Another study using propensity score modeling (which has the effect of not needing to adjust for covariates as both the treatment and comparison group are matched) found a less drastic but still statistically significant effect \[[@B60-healthcare-04-00030]\].
A multitude of studies and several systematic reviews have shown breastfeeding to associate with a lower risk of SIDS \[[@B61-healthcare-04-00030],[@B62-healthcare-04-00030],[@B63-healthcare-04-00030],[@B64-healthcare-04-00030]\], necrotizing enterocolitis \[[@B62-healthcare-04-00030],[@B63-healthcare-04-00030]\], lower respiratory infections \[[@B61-healthcare-04-00030],[@B62-healthcare-04-00030],[@B63-healthcare-04-00030],[@B65-healthcare-04-00030]\], high blood pressure \[[@B66-healthcare-04-00030],[@B67-healthcare-04-00030]\], diabetes \[[@B62-healthcare-04-00030],[@B63-healthcare-04-00030],[@B66-healthcare-04-00030],[@B67-healthcare-04-00030]\], asthma \[[@B61-healthcare-04-00030],[@B62-healthcare-04-00030],[@B63-healthcare-04-00030]\], obesity \[[@B62-healthcare-04-00030],[@B63-healthcare-04-00030],[@B67-healthcare-04-00030]\], and childhood leukemia \[[@B61-healthcare-04-00030],[@B62-healthcare-04-00030],[@B63-healthcare-04-00030]\]. Breastfeeding is also positively associated with childhood cognitive development \[[@B66-healthcare-04-00030],[@B68-healthcare-04-00030],[@B69-healthcare-04-00030]\], although the evidence here is less clear. Recent criticisms have been raised with respect to the quality and design of many breastfeeding studies. Some study designs do not adequately distinguish between "any" and "exclusive" breastfeeding practices \[[@B62-healthcare-04-00030]\]. Essentially all studies are captive to ethical issues that prevent randomized interventions, and observational studies may overlook important outcome determinants \[[@B12-healthcare-04-00030]\]. So, while it is important to note that the CDC \[[@B55-healthcare-04-00030]\], US Surgeon General \[[@B70-healthcare-04-00030]\], American Academy of Pediatrics \[[@B62-healthcare-04-00030]\], and World Health Organization \[[@B53-healthcare-04-00030]\] endorse six months of exclusive breastfeeding for infant health, there is some controversy as to whether observational research may overestimate breastfeeding benefits. Several of the reviews cited above make a distinction between strongly supported evidence and that for which there is mixed support; SIDS accounts for 21% of American infant mortality \[[@B62-healthcare-04-00030]\], and is strongly linked inversely to breastfeeding \[[@B61-healthcare-04-00030],[@B62-healthcare-04-00030],[@B63-healthcare-04-00030],[@B64-healthcare-04-00030]\].
Increasing prevalence of childhood immunizations is one indirect way in which parental leave might improve health. The evidence is mixed, with Tanaka \[[@B6-healthcare-04-00030]\] finding no change in immunization prevalence among his study countries, yet other analyses have found increases in both the US \[[@B60-healthcare-04-00030],[@B71-healthcare-04-00030]\] and on a global scale \[[@B38-healthcare-04-00030],[@B72-healthcare-04-00030]\]. Khanam *et al.* \[[@B52-healthcare-04-00030]\], found that the probability of being fully immunized fell by more than 20% for Australian children whose parents had no access to any parental leave (in this case, while paid leave was more effective, any leave at all appeared to be the determining factor). Differences in culture and public health policy between European countries (which comprised the bulk of Tanaka's study) and Australia may help explain the disparity in findings between different investigations. In the case of infant mortality, the beneficial relationship between child death and paid parental leave appears quite robust. There are a multitude of pathways through which paid leave could help to prevent infant mortality. Whether boosting rates of vaccination against diseases such as measles and pertussis is one such way may depend on social norms and public health policy within each nation.
Whether paid leave improves maternal health is another important consideration, and a recent systematic review of maternal health outcomes found mixed results \[[@B14-healthcare-04-00030]\]. At a policy level, studies included in the review found either no effect or a negative association. Studies conducted at an individual level all reported associations with better outcomes for indicators including physical health, intimate partner violence, and psychological distress. Other individual-level studies of maternal depression have also reported positive associations \[[@B15-healthcare-04-00030],[@B16-healthcare-04-00030]\]. Again, the trend seems to be that there are substantial challenges in undertaking observational studies, and findings depend on the manner in which the problem is operationalized as well as the methods of capturing the potential effects of a policy or exposure.
5. Gender Issues {#sec5-healthcare-04-00030}
================
Childcare and parental roles are often highly gendered in Western societies. In even the most progressive societies, with the most generous paternity and parental leave provisions, women still take substantially more child-related leave than men \[[@B26-healthcare-04-00030]\]. Sweden became the first nation to offer paid paternity leave in 1974 \[[@B73-healthcare-04-00030]\], with 39 other nations implementing such policies by 1994, and a total of 79 countries by 2013 \[[@B26-healthcare-04-00030]\]. Paternity leave in some nations is a fairly new concept, while in others it is now decades old. Embedded within the structure of the paid leave laws are several distinctions that can have important ramifications to either magnify or reduce gender inequity.
Studies of leave policies that allocate sizeable non-transferable portions to the father have revealed higher leave enrollment by fathers \[[@B39-healthcare-04-00030],[@B74-healthcare-04-00030],[@B75-healthcare-04-00030]\]. Additional leave, usually available as shared leave that can be taken by either parent, is used nearly exclusively by the mother \[[@B26-healthcare-04-00030]\]. In Israel, less than 1% of fathers take paternity leave \[[@B76-healthcare-04-00030],[@B77-healthcare-04-00030]\]. This contrasts with Iceland, where more than 80% of fathers take leave, with an average of 99 days, compared to 178 for mothers \[[@B26-healthcare-04-00030],[@B77-healthcare-04-00030]\].
Examining the paid leave structures of both Iceland and Israel, it is apparent that the nuances of paid leave policy are a determinant of gender imbalances in leave-taking. In Israel mothers get 14 weeks of paid maternity leave, and there is no statutory provision for paternity leave (defined here as leave reserved exclusively for the father) \[[@B26-healthcare-04-00030]\]. Rather, the father may take leave with the consent of the mother, by taking a minimum of three \[[@B26-healthcare-04-00030]\] (and a maximum of five) \[[@B76-healthcare-04-00030]\] weeks of her leave. Fathers can only do this if the mother consents and is also qualified for maternity leave (meaning working fathers with unemployed wives will not be eligible \[[@B78-healthcare-04-00030]\]). The result is that very few Israeli fathers take paternity leave. In Iceland, where three months are reserved for mothers, three for fathers, and three to be shared as desired, many fathers take leave \[[@B26-healthcare-04-00030]\]. Iceland achieved a doubling of the average number of days taken by fathers in just a seven-year period thanks to an extension of father-only leave. Norway and Sweden have seen similar improvements by implementing periods of exclusive leave, shifting from fewer than 5% of fathers taking leave to \~90% \[[@B73-healthcare-04-00030],[@B74-healthcare-04-00030]\]. By shifting from *unpaid* to paid leave, California managed to double the proportion of fathers taking parental leave \[[@B20-healthcare-04-00030]\].
Interestingly, many countries with a sharply gendered imbalance in leave-taking have managed to make striking and rapid shifts toward equality by making modest changes to their parental leave structure \[[@B79-healthcare-04-00030]\]. The message is that various means of incentivization can help to make leave-taking less gendered. Wage replacement (in high proportions), job protection, offering sufficient shared leaved for both parents, and reserving leave exclusively for fathers (leave that will otherwise be 'lost' if not taken) all appear to strongly influence take-up rates \[[@B26-healthcare-04-00030],[@B79-healthcare-04-00030]\]. The hope for many is that this shift may not simply reflect a different number of leave days taken, but also catalyze an appreciation for the contributions that each partner makes to the partnership and to the well-being of the child \[[@B79-healthcare-04-00030]\]. Investigations into the patterns and behavior surrounding parental leave have suggested that paternity leave reforms have the ability to change the social meaning of fatherhood \[[@B80-healthcare-04-00030]\]. Paid paternity leave reforms may be a way to strengthen the family unit, ease the burdens of maternity, and, in normalizing male parental leave, reduce the implicit workplace discrimination against women.
Studies on paternity leave often investigate marital roles, and households where the two parents share a more even distribution of leave have been found to have more cooperation between parents \[[@B79-healthcare-04-00030]\]. The longer the period of leave offered to fathers, the more they are involved with their infants and families \[[@B71-healthcare-04-00030],[@B81-healthcare-04-00030],[@B82-healthcare-04-00030],[@B83-healthcare-04-00030],[@B84-healthcare-04-00030],[@B85-healthcare-04-00030]\]. Paternal involvement has been significantly associated with emotional, psychological, behavioral, and cognitive benefits to children \[[@B71-healthcare-04-00030],[@B85-healthcare-04-00030]\]. Paternity leave also has a positive effect on the return of mothers to the workplace \[[@B86-healthcare-04-00030]\] and has been associated with increased rates of breastfeeding \[[@B87-healthcare-04-00030]\].
While nearly every study that seeks to measure paternity leave effects ranges from finding no result to finding positive outcomes, at least one study, by Norstrom *et al.* \[[@B88-healthcare-04-00030]\], finds some negative outcomes when fathers take significant amounts of paternity leave. Examining a subset of the Swedish parent/child cohort of 1988 and 1989 (*n* = 105,786), they found couples taking a more gender-equal amount of leave had children who were more likely to be treated for depression and anxiety. Depression and anxiety were detected by ICD-10 code usage related to outpatient medical visits and prescription of medication, from records obtained via the Swedish Outpatient Register and Swedish Drug Register. Gender-equal leave was defined as each partner taking at least 40% of the total leave. The implication is that there may be some negative effects of more equal co-parenting. One alternate explanation is that a mindset that leads to more gender-equal parenting is also predictive of parents that are more receptive to symptoms of depression or anxiety (*i.e.*, a surveillance bias), leading to higher rates of *diagnosis* among children in these families, and that treatment may not be a perfect surrogate marker for background prevalence.
Investigating the possible health benefits of paternity leave, Månsdotter and colleagues \[[@B13-healthcare-04-00030],[@B73-healthcare-04-00030]\] have twice examined the Swedish Multigenerational Register for men who became fathers in Sweden in the late 1970s and 1980s, and found significantly reduced odds of early mortality among fathers who took paternity leave. Dividing the fathers into groups based on the amount of leave taken, they found the protective pattern followed a dose-response relationship for leave lengths up to a few months. This pattern persisted even after adjustment for age, income, education, and country of birth. These studies have not been replicated elsewhere, and should be viewed with attendant caution, but raise an interesting question that is worth further exploration.
Owing to the fact that taking significant paternity leave is not necessarily a normative behavior, even in countries that may extend this option, it is possible there are unobserved characteristics related to fathers who take leave, and these characteristics are confounding some study designs. Some investigators speculate about the potentially toxic nature of masculinity (e.g., a propensity for more health-destructive behaviors such as alcohol use) and the notion that childcare stands in opposition to masculinity, possibly introducing a bias where men who self-select for parental leave exhibit healthier behaviors \[[@B13-healthcare-04-00030]\]. Analyzing masculinity and paternity leave has shown that while masculinity is associated with all-cause mortality, and paternity-leave-taking also has a relationship to all-cause mortality, there is no association between masculinity (as measured) and paternity leave \[[@B73-healthcare-04-00030]\]. The data from some studies of childcare by fathers suggest that the quality of the time invested is more critical than the overall quantity \[[@B85-healthcare-04-00030]\], which may make paternity leave outcomes difficult to analyze quantitatively. More research is needed to improve our understanding of the possible intersectionality between fatherhood, paternity leave, masculinity, child health, and parental health.
6. Conclusions {#sec6-healthcare-04-00030}
==============
Of working US women pregnant with their first child, 87% report \[[@B19-healthcare-04-00030]\] working through the last month of pregnancy---is this a choice made by women who love their jobs, or an unfortunate reality for expectant mothers who have no other option? Millions of American women each year face the challenges of getting time away from work to attend prenatal checkups, to bond with their newborn, to initiate and continue breastfeeding for several months, to ensure their child is fully immunized, and to do all of this in the face of financial adversity and a fear of being fired for taking too much time off. The overall trend in research on the health consequences of parental leave is that parental leave supports two precursors to improved child health---breastfeeding and immunizations---and potentially reduces maternal stress and depression. In light of the challenges that new parents face, it is perhaps not surprising that a plurality of studies find that access to paid parental leave strongly associates with lower rates of mortality throughout infancy and childhood.
The United States has an infant mortality rate at least twice that of Sweden \[[@B89-healthcare-04-00030]\]. About 39% of US excess infant mortality when compared to Sweden is due to our high preterm infant mortality rate \[[@B89-healthcare-04-00030]\]. Lacking antenatal leave has been associated with a three-fold increase in risk \[[@B44-healthcare-04-00030]\] of preterm delivery. Working longer into pregnancy has also been linked to delivery complications \[[@B47-healthcare-04-00030],[@B48-healthcare-04-00030]\]. Taking leave before the end of pregnancy has benefits to birthweight approaching the same magnitude as the harms seen in smoking during pregnancy \[[@B46-healthcare-04-00030],[@B51-healthcare-04-00030]\]. Examining 18 countries over more than 30 years, Tanaka \[[@B6-healthcare-04-00030]\] found a statistically significant correlation between lower birthweight and lack of access to job-protected paid parental leave. Stearns found the treatment effects for even short maternity leaves meant a 12% reduction in LBW deliveries to mothers in the five American states with TDI programs \[[@B7-healthcare-04-00030]\]. Rossin \[[@B40-healthcare-04-00030]\], examining the effects of unpaid leave for women believed most likely to take such leave, found a 47% reduction in the likelihood an infant born to one of these women died of an 'ill-defined' cause. SIDS, one of several causes of infant mortality in the 'ill-defined' category, makes up 21% of American infant mortality alone \[[@B62-healthcare-04-00030]\].
The complex and multifactorial nature of infant mortality itself, which is a term encompassing many disparate causes of death, presents serious challenges for investigation. Further complicating matters, paid leave may be protective against infant mortality through many pathways, not all of which are immediately obvious. We do know that paid leave for mothers is linked to increases in breastfeeding rates \[[@B12-healthcare-04-00030],[@B53-healthcare-04-00030]\]; we also know that returning to work when leave benefits are exhausted is often cited as the top reason for breastfeeding cessation \[[@B56-healthcare-04-00030],[@B57-healthcare-04-00030],[@B58-healthcare-04-00030]\]. Mothers in America who take short leaves face double or even quadruple the odds of failing to initiate breastfeeding when compared to those who do not work \[[@B54-healthcare-04-00030]\]. The American Academy of Pediatrics says infants not breastfed face more than 3.5 times the odds of SIDS mortality when compared to exclusively breastfed babies \[[@B62-healthcare-04-00030]\].
Several credible examinations of paid parental leave in dozens of countries, from low and middle income to wealthy ones, have demonstrated a strong link between paid parental leave and child survival. Investigations by Ruhm \[[@B8-healthcare-04-00030]\] and Tanaka \[[@B6-healthcare-04-00030]\] have shown a non-linear effect on the health benefits of parental leave, with the greatest improvements seen after children are a month old. The more parental leave is extended, the greater these benefits appear to be (at least up to the 40-week mark). Ruhm estimates implementing 40 weeks of job-protected paid parental leave to accompany a 15% reduction in child mortality---a reduction that would correspond to more than 4000 fewer child deaths each year in the US \[[@B89-healthcare-04-00030]\].
The United States has a policy of just 12 weeks of unpaid parental leave, a policy that covers only half of its workers \[[@B21-healthcare-04-00030]\]. In the few states that mandate paid parental leave, the fractional wage replacement is low, the length of leave is only a handful of weeks, and there may not be job protection. These policies serve to further entrench existing health inequities. The children most at risk of not being breastfed, most at risk of being born preterm or low birthweight, most at risk of dying in the first years of life---these are the children of parents most at risk of not being able to take leave from work. The lack of policies substantially benefitting early life in the United States constitutes a grave social injustice: those who are already most disadvantaged in our society bear the greatest burden.
The experiences of other nations can give us hope. When Norway converted from 12 weeks of unpaid leave to 18 weeks of paid job-protected leave, a range of benefits in child achievement could be observed across the following decades \[[@B17-healthcare-04-00030]\]. Most importantly, although these improvements could be seen across the population, the benefit to children of disadvantaged mothers was roughly doubled. The implication of this research is that paid parental leave may be an intervention for not just improving child health, but for reducing inequities in health and achievement.
Outcomes such as infant death may occur through a number of pathways, and when an intervention has subtle effects on multiple determinants of an outcome---decreasing stress during pregnancy, allowing more time for prenatal checkups, improving birthweight and decreasing rates of preterm delivery, increasing the likelihood and duration of breastfeeding, increasing the probability of a child being fully vaccinated, allowing more time for bonding and infant care---it seems to be the cumulative effect of these (and other yet unobserved) pathways that accounts for the association with higher rates of infant and child survival. If the benefits of paid parental leave on child health are manifold, it follows that attempting to isolate and quantify the effects of any one potential benefit will likely present a significant challenge. When researchers examine discrete pathways, for example vaccination prevalence, the findings can vary drastically based on context. That some pathways may be more important than others depending on context can help to explain why lower infant mortality rates are associated with longer-paid, job-protected parental leave in a variety of settings.
Accounting for the qualitative nature of these topics is important for understanding variation in outcomes, and as scientists we must work to go beyond simply quantifying time spent, or lives lost, or likelihood of improvement. We must attempt to capture the nature of experience and agency, and to understand how experience begets biology. More research is required to better elucidate the links between human health and paid parental leave. However, given the body of existing evidence, parental leave policies that support all working families by providing parents the opportunity to be with their newborn for an appropriate length of time should be considered as a population health priority in the United States.
Dunia Faulx, Danielle Lozier, Mary Anne Mercer, and two anonymous reviewers whose comments and suggestions were helpful in improving the final submitted version of this paper.
Stephen Bezruchka conceived the paper, Adam Burtle wrote the first draft, and both authors subsequently contributed in revising the article.
The authors declare no conflict of interest.
|
2024-05-10T01:26:36.242652
|
https://example.com/article/4908
|
If you have a Rite Aid near you, have a prescription that needs to be filled sometime in February (but haven’t had one filled there in the last 6 months), you can get a $30 gift card, plus an additional $5 and $5 if you transfer a prescription there.
Look in this week’s insert–you’ll find two coupons for this, and read more about it here.
It’s important to remember that if you have multiple prescriptions, you should have them all filled at one pharmacy. That way, the pharmacist can better detect possible drug interactions and things. If you have 3 prescriptions scattered across 3 pharmacies, it will be much harder! So, it’s only worth doing if you’re willing to transfer all of your prescriptions, or if you have a family member that just requires one prescription.
Still, a $30 gift card can go a long way at a drug store that also has free stuff.
Here’s what’s free-after-rebate at Rite Aid for February. Consult your flier to be sure you’re getting the exact sizes and varieties that qualify. All are limit 1, unless otherwise noted. Click here to see the full list.
Rebate #1 Valid from 01/27/08 to 03/01/08up to $9.95RebateGreen DotPurchase One (1):
• Prepaid MasterCard or VisaExcludes Nascar Visa Card
*Purchase Price Will Be Refunded (up to $9.95). Sales tax excluded. (Might be good for those of you who don’t use credit or debit cards, but still like to make purchases online. I *think* these will work in that scenario.
Rebate #224 Valid from 01/27/08 to 03/01/08$1.50RebateElectrasolPurchase One (1):
• Orange Powder or Gel, 75 oz.
• Powerballs or Gelcaps, 20 ct. (Not free, but I love the powerball tab things! And, there’s usually manuf. coupons out there you can add on to this. -Kacie)
|
2024-03-04T01:26:36.242652
|
https://example.com/article/2628
|
Chippy Gaw
George Joseph "Chippy" Gaw (March 13, 1892 – May 5, 1968) was an American baseball pitcher, who appeared in six games for the Chicago Cubs in 1920. He was also the ice hockey head coach at Dartmouth College (1921–1922), Princeton University (1922–1924) and Boston University (1924–1928).
Gaw was born in West Newton, Massachusetts, and died in Boston. He attended Tufts University. In 1926, he pitched and was the player-manager for Falmouth in the Cape Cod Baseball League.
References
External links
Category:1892 births
Category:1968 deaths
Category:Baseball players from Massachusetts
Category:Boston University Terriers baseball coaches
Category:Boston University Terriers men's ice hockey coaches
Category:Cape Cod Baseball League coaches
Category:Cape Cod Baseball League players (pre-modern era)
Category:Chicago Cubs players
Category:Dartmouth Big Green men's ice hockey coaches
Category:Falmouth Commodores players
Category:Major League Baseball pitchers
Category:Princeton Tigers men's ice hockey coaches
Category:Sportspeople from Newton, Massachusetts
Category:Tufts University alumni
|
2023-12-09T01:26:36.242652
|
https://example.com/article/8483
|
This invention relates to the construction or forming of a sheet metal or aluminum can shell and can end having a peripheral rim or crown which is double-seamed to the upper edge portion of a sheet metal or aluminum can body. Such a can end is formed from a drawn sheet metal can shell, for example, a shell produced by tooling as disclosed in U.S. Pat. No. 5,857,374 which issued to applicant. Commonly, the formed can shell includes a circular center panel which extends to a panel wall which extends to or also forms the inner wall of a reinforcing rib or countersink having a U-shaped cross-sectional configuration. The countersink is connected by a frusto-conical chuckwall to an annular crown which is formed with a peripheral curl. For beverage containers, the center panel of the shell is commonly provided with an E-Z open tab, and after the can body is filled with a beverage, the peripherally curled crown of the shell is double-seamed to the upper end portion of the can body.
When the can body is filled with a carbonated beverage or a beverage which must be pasturized at a high temperature, it is essential for the can end to have a substantial buckle strength to withstand the pressurized beverage, for example, a buckle strength of at least 90 psi. Such resistance to “buckle” pressure and “rock” pressure is described in detail in U.S. Pat. No. 4,448,322, the disclosure of which is incorporated by reference. It is also desirable to minimize the weight of sheet metal or aluminum within the can end without reducing the buckle strength. This is accomplished by either reducing the thickness or gage of the flat sheet metal from which the can shell is drawn and formed and/or by reducing the diameter of the circular blank cut from the sheet metal to form the can shell.
There have been many sheet metal shells and can ends constructed or proposed for increasing the buckle strength of the can end and/or reducing the weight of sheet metal within the can end without reducing the buckle strength. For example, U.S. Pat. Nos. 3,843,014, 4,031,837, 4,093,102, above-mentioned U.S. Pat. Nos. 4,448,322, 4,790,705, 4,808,052, 5,046,637, 5,527,143, 5,685,189, 6,065,634, 6,089,072, 6,102,243, 6,460,723 and 6,499,622 disclose various forms and configurations of can shells and can ends and the various dimensions and configurations which have been proposed or used for increasing the buckle strength of a can end and/or reducing the metal in the can end. Also, published PCT application No. WO 98/34743 discloses a modification of the can shell and can end disclosed in above-mentioned U.S. Pat. No. 6,065,634. In addition to increasing the buckle strength/weight ratio of a can end, it is desirable to form the can shell so that there is minimal modifications required to the extensive tooling existing in the field for adding the E-Z open tabs to the can shells and for double-seaming the can shells to the can bodies. While some of the can shells and can ends disclosed in the above patents provide some of desirable structural features, none of the patents provide all of the features.
|
2024-06-18T01:26:36.242652
|
https://example.com/article/7548
|
Post navigation
Ubuntu Certified Professional
An LPI based Ubuntu certification. The Ubuntu Certified Professional is a training certification based on the LPI level 1 certification. To earn the Ubuntu Professional certification, candidates are required to pass the LPI 101, LPI 102 and the Ubuntu (LPI 199) exams. Exams can be written in any order. A candidate already holding a valid LPI level 1 certification will only be required to pass the Ubuntu exam.
The certification is designed for System Administrator levels and tests the candidate’s ability to:
|
2024-06-04T01:26:36.242652
|
https://example.com/article/5208
|
Toiletries & fragrance collection
National Trust toiletries
Icon Partnership worked very closely with us to develop a toiletries and fragrance collection capturing the essence of the evocative and naturally beautiful landscapes in our care. With a selection of beautifully scented candles, soaps, lotions and eau de toilettes, packaged in stunning original designs drawn by artist Clare Curtis, this National Trust Fragrance and Toiletries Collection makes a perfect gift.
The National Trust Fragrance and Toiletries Collection, produced in England, features four distinct fragrances inspired by the coast, countryside, gardens and woodland we look after across England, Wales and Northern Ireland. From parks and countryside to coastline and woodland, this range seeks to harness the greatest scents at the heart of the UK’s natural beauty.
National Trust Garden Wild Rose and Camomile
The fragrant Wild Rose and Camomile merge to create a heavenly floral paradise and a delicately blended, romantic scent. Inspired by the internationally renowned garden at Sissinghurst Castle in Kent; developed by Vita Sackville-West and Harold Nicolson within the surviving boundaries of an Elizabethan manor.
National Trust Countryside Cowslip and Meadowsweet
The fresh, clean scent of Cowslip is delightfully uplifting and perfectly complements Meadowsweet, a member of the rose family with a strong, sweet fragrance. Inspired by the unique setting of the Golden Cap Estate in Dorset. The traditional hay meadows on the estate are filled with fragrant wild flowers and are amongst the most precious natural landscapes in the care of the National Trust.
National Trust Coast Rock Samphire and Driftwood
The Rock Samphire's fleshy, aromatic leaves deliver an invigorating aroma with a spicy kick that encapsulates the fresh sea air and rugged coastal beauty. Driftwood creates a full scent that adds depth and blends with the Rock Samphire to produce a richly aromatic fragrance. Reflecting the stunning setting of Holnicote Estate in Somerset, with its spectacular coastline and panoramic views from some of the most dramatic cliffs in England.
National Trust Woodland Beechwood and Bramble
This scent is infused with the musky notes of Beechwood which conjure up a strong and rich fragrance. The prickly sweetness of Bramble works in tandem, creating a blend that truly captures the essence of the forest. Inspired by the Ashridge Estate in Hertfordshire with its beautiful, sprawling two thousand acres of ancient woodland forest.
|
2023-10-21T01:26:36.242652
|
https://example.com/article/2710
|
Fox Searchlight Picks Up Martha Marcy May Marlene
Fox Searchlight Pictures Presidents Nancy Utley and Stephen Gilula announced today that the company has acquired worldwide rights to the suspenseful drama MARTHA MARCY MAY MARLENE. Written and directed by Sean Durkin, MARTHA MARCY MAY MARLENE stars Elizabeth Olsen, Sarah Paulson, John Hawkes and Hugh Dancy. Maybach Cunningham and FilmHaven entertainment present a Borderline Films Production in association with This Is that. The film was produced by Josh Mond, Antonio Campos, Chris Maybach and Patrick Cunningham. Ted Hope, Matt Palmieri, Saerom Kim, Saemi Kim and Alexander Schepsman are executive producers with Andrew Corkin as co-producer. The film is scheduled to be released in 2011.
We were all captivated by the compelling performances and the expert craftsmanship of Sean Durkin, said Gilula and Utley. We are excited to bring this gripping drama to audiences everywhere.
Sean Durkin has crafted a riveting first feature, said Claudia Lewis, President of Production. We are thrilled to be working with a director who has such an original voice. We hope to make many more films with Borderline Films, this exceptional team of young filmmakers.
Josh, Antonio and I have had such an incredible experience at Sundance this year,” said Durkin. “We are excited to be working with Searchlight, a company that has consistently embraced new voices and unique storytelling.
MARTHA MARCY MAY MARLENE stars Elizabeth Olsen as Martha, a damaged woman haunted by painful memories and increasing paranoia, who struggles to reassimilate with her family after fleeing a cult.
The deal was brokered by Fox Searchlights Executive Vice President of Worldwide Acquisitions Tony Safford, Senior Vice President of Business Affairs Megan OBrien, Vice President of Acquisitions Ray Strache and Richard Klubeck, Rena Ronson and David Flynn of UTA’s Independent Film Group on behalf of the filmmakers. Borderline is managed by Melissa Breaux of Washington Square Arts.
Fox Searchlight Pictures is a specialty film company that both finances and acquires motion pictures. It has its own marketing and distribution operations, and its films are distributed internationally by Twentieth Century Fox. Fox Searchlight Pictures is a unit of Fox Filmed Entertainment, a unit of Fox Entertainment Group.
|
2023-11-10T01:26:36.242652
|
https://example.com/article/3042
|
Horatia Nelson
Horatia Nelson, christened as Horatia Nelson Thompson (29 January 1801 – 6 March 1881) was the illegitimate daughter of Emma Hamilton and Horatio Nelson.
Life
Early life
Born in a house rented by Sir William Hamilton (Emma's husband) at 23 Piccadilly, London, as Nelson was at anchor in Torbay preparing to sail to the Battle of Copenhagen (news reached him before he set sail), she was given to a wet nurse called Mrs. Gibson, who was informed that the child, about a week old, was born six weeks earlier, at a time when Emma was in Vienna. Once Emma's husband had died on 6 April 1803, and 5 days before Nelson had to board on 18 May that year, Horatia was christened, aged two, at St Marylebone Parish Church as Horatia Nelson Thompson, with Emma and Horatio as the "godparents" and a cover-story naming her as the daughter of Vice-Admiral Charles Thompson of Portsmouth Dockyard (with his agreement). Her date of birth on the baptism record was given as 29 October 1801 according to the record transcripts, but Kate Williams cites the year as 1800 (referring to a letter from Mrs Gibson to Emma), to further the pretence that the child had been born an orphan in Naples. Later on, her natural parents adopted her as an orphan.
Nelson was delighted at Horatia's birth (the more so when his second child with Emma, another girl, died a few weeks after her birth in early 1803), and spent as often as he could during his brief times onshore from 1803 to 1805 enjoying domestic life with her and Emma at Merton Place, more frequently and easily once Sir William was dead.
As the Battle of Trafalgar approached, Nelson wrote a letter to Horatia with his parental blessing:
Victory, October 19, 1805.
My dearest Angel, I was made happy by the pleasure of receiving your letter of September 19, and I rejoice to hear that you are so very good a girl, and love my dear Lady Hamilton, who most dearly loves you. Give her a kiss for me. The Combined Fleets of the Enemy are now reported to be coming out of Cadiz; and therefore I answer your letter, my dearest Horatia, to mark to you that you are ever uppermost in my thoughts. I shall be sure of your prayers for my safety, conquest, and speedy return to dear Merton, and our dearest good Lady Hamilton. Be a good girl, mind what Miss Connor says to you. Receive, my dearest Horatia, the affectionate parental blessing of your Father,
NELSON AND BRONTE.
In his letter to Emma the same day, he wrote "I will take care that my name shall ever be most dear to you and Horatia, both of whom I love as much as my own life." One of Nelson's last wishes was that Horatia should take the name Nelson, leaving her £200 a year in his will and adding :
"I leave to the beneficence of my country my adopted (sic) daughter Horatia Nelson Thompson, and I desire she will use in future the name of Nelson only."
Though Horatia soon learnt of her real father, she never publicly acknowledged that Emma was her mother, perhaps partly due to Emma's continued insistence after Nelson's death that she was not her mother but her guardian. Before debt set in after Nelson's death, Emma introduced Horatia to high society. Emma died just before Horatia's fourteenth birthday at Calais in January 1815, having fled there with Horatia to escape debt. Returning to Dover, she was met by one of Nelson's brothers-in-law, George Matcham, and thereafter spent two years with the Matchams in Sussex, helping to look after the younger children. She then lived with another brother-in-law, Thomas Bolton, as his housekeeper, after Nelson's sister Susanna Bolton died, until she married.
Biographers describing her in her youth saw her as being tall, intelligent, able to speak her mind and surprisingly well-read. She was good at languages (Emma had taught her Italian, French and German and she also managed Spanish), music and needlework, had a lively temperament and was an animal-lover. Thanks to her mother's efforts, Horatia became a graceful and accomplished woman.
Marriage and children
On 19 February 1822, she married Rev. Philip Ward (1795–1859) at Burnham Westgate Church, near her father’s home village in north Norfolk, where Ward was curate. Horatia's grandfather had also been a clergyman. A third-generation Anglican clergyman, Philip was a poet and scholar, and the couple were described at their wedding as being handsome and intelligent. Horatia's biographer described the marriage as "the one certain good that befell" Horatia. Their ten children—seven boys and three girls, with the former educated by their father at home before going to university or the professions—were:
Horatio or Horace Nelson Ward (8 December 1822 in Norfolk – 1888), christened in Norfolk on Horatia's 22nd birthday in January 1823; B.A. Trinity College, Cambridge 1847; ordained deacon 1848 and then priest in 1849 at St Mildred's parish church at Tenterden, where he acted as his father’s curate until 1853. Became Rector of Radstock, Somerset, 1853–88 and died on 13 March 1888.
Eleanor Philippa Ward (born April 1824 in Norfolk – 1872).
Marmaduke Philip Smyth Ward (born 27 May 1825 in Norfolk – 4 Nov 1886); later became a Royal Navy surgeon, passing up an offer to play professional cricket in Borbanu, India.
John James Stephen Ward (13 February 1827 – 1829 in Norfolk).
Nelson Ward (born 8 May 1828 in Norfolk – 1917), articled for five years to a Tenterden solicitor, later becoming Registrar in the Court of Chancery and living in West Lodge, Pinner in Middlesex.
Colonel William George Ward (born 8 April 1830 in Norfolk – 1878), an officer in the British Indian Army.
Edmund Nelson Ward (10 July 1832 – 1833), died aged 6 months.
Horatia Ward (born 24 November 1833 in Tenterden – 1890), recovered from cholera aged 13, married a solicitor from Lincoln’s Inn, William Johnson (a friend and colleague of Nelson Ward's, as well as fellow cricket-lover), at Tenterden in 1858. Their descendants were still in Tenterden beyond the 1970s. Buried in Brookwood Cemetery.
Philip Ward (May 1834 in Tenterden – 12 September 1865), served in India as a lieutenant in the 25th Bengal Native Infantry.
Caroline Mary Ward (born January 1836 in Tenterden – 1859).
Struggles
The living at Stanhoe in Norfolk was next granted to Philip, and it brought a better income in tithes and glebe lands, and then fairly shortly afterwards the family moved to another living at Bircham Newton. She was involved in protracted negotiations to buy Nelson’s uniform coat and waistcoat (eventually bought by The Prince Consort for Greenwich Hospital in 1845, later passing from there to the National Maritime Museum). Horatia only realised she was Lord Nelson's biological daughter in 1845 after Sir Nicholas Harris published volume 3 of his intensively researched Dispatches and Letters of Vice-Admiral Nelson, which included copies of correspondence which conclusively proved that Nelson was her father (she refused, however, to ever accept that Emma, Lady Hamilton was her mother). This growing public interest in Nelson (Nelson's Column and Trafalgar Square were erected in 1843, for example) brought her recompense for the perceived national neglect of her immediately after Nelson's death. An appeal committee of Lord Nelson's friends and naval colleagues met frequently in London by Horatia herself, brought about a deputation to the Prime Minister and a national appeal (launched in 1850 and closed four years later; it raised only £1457). At Horatia's insistence, the money thus raised was divided between her three sons in military service (Marmaduke, Philip and William), and so that same year (1854) Queen Victoria stepped in and allocated public funds for a £100 annual pension for each Nelson-Ward daughter.
Two of their nine children are buried with her (Edmund and her eldest daughter), though the couple do have living descendants, including Anna Horatia Tribe and her descendants, the Style Ward branch (who are also descended from Nelson's sister, Catherine Matcham, through the marriage of Horatia's son William to Catherine's granddaughter, Catherine Blanckley and the Nelson-Ward family branch. Philip died from a liver problem soon after returning to England from India (he is commemorated by a plaque near the altar in St Mildred's, on the south wall), and her eldest daughter Eleanor Philippa (whilst still unmarried) was knocked down by a horse bolting from an innyard - the Queen's Head in Pinner High Street, carried into a draper's shop near to where the accident occurred, and died there. Horatia was also predeceased by her husband who died suddenly on 16 January 1859 and was buried at the east of St Mildred's Tenterden with his children, Caroline Mary and Edmund Nelson (a memorial stained glass window was also put up to him in the church).
Later life and death
After her husband's death in January 1859 she had to leave Tenterden. She moved to a house called Elmdene in Church Lane, Pinner and later at Beaufort Villas, Woodridings (a former estate in Pinner), where she died 22 years later; both were near to her son Nelson. On her death, Horatia was buried in Pinner Parish old cemetery, in Paines Lane in Pinner. Her epitaph, after mentioning her husband and children, runs:
"...Here rests Horatia Nelson Ward, who died March 6. 1881, aged 80, the beloved daughter of Vice Admiral Lord Nelson and widow of the above-named Revd. Philip Ward."
Ancestry
Portrait misattribution
This portrait of an unknown female owned by Royal Museums, Greenwich, was until recently believed to be of Horatia Nelson, and many websites and other publications continue to attribute it to Horatia in error. However, Royal Museums Greenwich have stated, "we no longer think the woman in white is Horatia. She has some likeness to Nelson, but Horatia did not have such a marked resemblance from other portraits of her in youth (we have a bust by Christopher Prosperi showing her as a child and an oil portrait of her in early teens).
Where this identification started is not clear: the provenance of the item stops with its exhibition in 1889 when in the hands of a Bond Street dealer and the only link with the Nelson-Ward family is that they had a copy of made, probably at that time and relying on his identification of it, not theirs. There is, so far, no evidence it was ever in Nelson-Ward family possession (or other branches of the Nelson family), which is the obvious place to have expected to find it, or at least information linking it to them - but there is none."
References
Bibliography
Winifred Gérin, Horatia Nelson, Clarendon, 1970
Tom Pocock, Nelson’s Women, Andre Deutsch, 1999, chapters 10 and 11
Kate Williams, England's Mistress - The Infamous Life of Emma Hamilton, Hutchinson, London, 2006
External links
Category:1801 births
Category:1881 deaths
Category:Daughters of viscounts
Category:Horatio Nelson
Category:People from Tenterden
|
2024-04-19T01:26:36.242652
|
https://example.com/article/1910
|
Intentional forgetting reduces color-naming interference: evidence from item-method directed forgetting.
In an item-method-directed forgetting task, Chinese words were presented individually, each followed by an instruction to remember or forget. Colored probe items were presented following each memory instruction requiring a speeded color-naming response. Half of the probe items were novel and unrelated to the preceding study item, whereas the remaining half of the probe items were a repetition of the preceding study item. Repeated probe items were either identical to the preceding study item (E1, E2), a phonetic reproduction of the preceding study item (E3), or perceptually matched to the preceding study item (E4). Color-naming interference was calculated by subtracting color-naming reaction times made in response to a string of meaningless symbols from that of the novel and repeated conditions. Across all experiments, participants recalled more to-be-remembered (TBR) than to-be-forgotten (TBF) study words. More importantly, Experiments 1 and 2 found that color-naming interference was reduced for repeated TBF words relative to repeated TBR words. Experiments 3 and 4 further found that this effect occurred at the perceptual rather than semantic level. These findings suggest that participants may bias processing resources away from the perceptual representation of to-be-forgotten information.
|
2023-12-09T01:26:36.242652
|
https://example.com/article/3453
|
Investigators searching for the missing Malaysian Airlines flight MH370 are confident that they have found the plane’s “most likely” final resting place.
The Australian Commonwealth Scientific and Industrial Research Organisation (CSIRO) – the country’s national science agency – believes the wreckage is in an area 25,000 sq km north of the original 120,000 sq km search zone.
The Boeing 777 jet vanished during a flight from Kuala Lumpur to Beijing on 8 March 2014 with 239 people on board.
Despite a huge multinational search operation, the plane's final resting place has still not been confirmed.
In December 2016, the Australian Transport Safety Bureau identified the new area and claimed it was “highly likely” that the wreckage of the jet is there. However, the governments of Malaysia, China and Australia said there was not enough evidence to begin a new search.
Now, though, the CSIRO has confirmed that the new area is indeed likely to be the final location of MH370.
Government officials from the three countries have previously said they will re-open the search if “credible new information” is uncovered.
An initial, huge search area of the Indian Ocean south-west of Australia was identified in 2014, and investigators spent more than two years scouring it with specialist sonar, video cameras and sensors without finding any trace of the jet.
MH370 debris - in pictures Show all 7 1 /7 MH370 debris - in pictures MH370 debris - in pictures MH370 debris French police officers carry a piece of debris from a plane in Saint-Andre, Reunion Island. AP MH370 debris - in pictures MH370 debris Police carry a piece of debris from an unidentified aircraft found in the coastal area of Saint-Andre de la Reunion, in the east of the French Indian Ocean island of La Reunion AFP PHOTO / YANNICK PITOUYANNICK PITOU/AFP/Getty Images MH370 debris - in pictures MH370 debris The plane part is being taken to France for further investigation Reuters MH370 debris - in pictures MH370 debris French gendarmes and police inspect a large piece of plane debris which was found on the beach in Saint-Andre, on the French Indian Ocean island of La Reunion Reuters MH370 debris - in pictures MH370 debris French gendarmes and police inspect a large piece of plane debris which was found on the beach in Saint-Andre, on the French Indian Ocean island of La Reunion Reuters MH370 debris - in pictures MH370 debris Johnny Begue, a member of a local shore cleaning association, in Saint-Andre, French Indian Ocean island of La Reunion, holds the remain of a suitcase found the day before on the same site Getty Images MH370 debris - in pictures MH370 debris Searches continued on Friday for other possible MH370 debris along beaches on the island of Réunion AP
Experts had few clues as to the plane’s fate until a wing flaperon was found on a beach on Reunion Island, off the east coast of Africa, in July 2015. Analysis confirmed the wing part was almost certainly from MH370.
The new research, published by the CSIRO on Friday, involved using a Boeing 777 flaperon that was damaged to make it identical to the one found on La Reunion. Scientists carried out a series of tests to see how the part drifted through the ocean.
Dr David Griffin, who led the research, said the study “added an extra level of assurance to the findings from our earlier drift modelling work”.
“It indicates that the most likely location of MH370 is in the new search area,” he said.
“We cannot be absolutely certain, but that is where all the evidence we have points us, and this new work leaves us more confident in our findings.
|
2024-05-26T01:26:36.242652
|
https://example.com/article/1200
|
Introduction {#Sec1}
============
A higher prevalence of depression has long been observed among poorer individuals compared to those of higher socioeconomic position (SEP) \[[@CR6], [@CR27], [@CR28], [@CR34]\]. However, results from community psychiatric epidemiologic studies largely indicate that there is no consistent inverse relationship between SEP and depression among African Americans. Williams et al. \[[@CR40]\] found no significant relationship between SEP and rates of 6-month depression among African Americans \[[@CR40]\]. More recently, Ennis et al. \[[@CR7]\], using a sample of African American and White women recruited from low-income health clinics, found that income was unrelated to depression among African Americans \[[@CR7]\]. Williams et al. \[[@CR38]\] found no significant relationships between income or education and depression among African Americans in the National Survey of American Life (NSAL) \[[@CR38]\]. Gavin et al. \[[@CR11]\] found no significant relationships for African Americans between depression and household income, years of education, or employment status \[[@CR11]\].
These findings are counterintuitive, considering that most physical morbidities are negatively associated with SEP indicators \[[@CR20]\]. One potential explanation for these findings is that the SEP measurement strategies employed in most studies are inadequate. Previous studies have largely relied upon traditional SEP indicators, such as income and education with some using single-item indicators \[[@CR12], [@CR31]\]. Traditional SEP indicators have important limitations that should be considered when examining the SEP-depression relationship \[[@CR21], [@CR36]\] and single-item indicators examined alone may not provide enough information about people's overall SEP. Another possible explanation is that higher SEP does not protect against the development of depression among African Americans. Farmer and Ferraro \[[@CR8]\] described the diminishing returns hypothesis, which posits that racial/ethnic minority groups do not experience the same economic returns associated with higher SEP achievement as Whites. Farmer and Ferraro also posited that the health differences between Whites and African Americans are greatest at the highest SEP levels because African Americans become more aware of social and economic inequalities as they ascend the socioeconomic hierarchy in the United States \[[@CR2], [@CR8]\]. Additionally, racial discrimination, experienced at both the interpersonal or structural level---particularly, perceptions of limited advancement in occupational settings due to racialized glass ceilings---could undermine the protective effects of higher SEP among African Americans. Two recent papers have considered the diminishing returns hypothesis in relation to mental health among racial/ethnic minority groups in the United States. Breslau et al. \[[@CR2]\] examined whether risk of psychiatric disorders was patterned according to level of educational attainment among African Americans, Hispanics, and non-Hispanic Whites in the National Comorbidity Study Replicated. Interestingly, they found a significantly higher lifetime risk of mood disorders among African Americans with more than a high school education, compared to those with less than a high school education \[[@CR2]\]. Conversely, Gavin et al. \[[@CR11]\] did not find support for the diminishing returns hypothesis. They found that income and education were not related to greater odds of depression for Blacks.
Women report twice the significantly higher rates of depression of males \[[@CR1], [@CR3], [@CR24], [@CR26]\]; however, little research exists to explain this discrepancy. Nolen-Hoeksema \[[@CR30]\] argued that women's lack of social power, their greater likelihood to experience certain stressors, such as living in poverty, or being a victim of sexual abuse, as well as the social roles that women perform, may increase their risk of depression \[[@CR30]\]. Some researchers have argued that women may have greater reactivity than men when similarly exposed to adverse experiences and are thus more likely to develop depression than men \[[@CR32]\]. These researchers also highlight potential neuroendocrinological pathways, such as different hormone levels among women and their greater likelihood of having a dysregulated hypothalamic--pituitary--adrenal (HPA) axis, which may increase women's vulnerability to depression \[[@CR30], [@CR32]\]. There is very little information available about gender differences in depression among African Americans, or how the relationship between SEP and depression varies by gender among African Americans.
The current research {#Sec2}
--------------------
The inverse relationship between SEP and depression is one of the most universal findings in the field of psychiatric epidemiology. However, this finding does not hold true among African Americans \[[@CR11], [@CR38], [@CR40]\]. Considering the fact that SEP has been implicated as a key determinant in the development of mental disorders, we examined the relationship between SEP and depression while also looking for sex differences in the SEP-depression relationship. Specifically, we examined the relationships between multiple SEP indicators (including measures of wealth and childhood SEP), in addition to traditional indicators (education, household income, and employment status), and depression among African American men and women. We were particularly interested in determining whether differences exist in the relationship between SEP and depression according to gender. Second, this study tested the diminishing returns hypothesis. Specifically, we hypothesized that African Americans, both men and women, who reported greater levels of SEP would also report increased odds of both 12-month and lifetime Major Depressive Episode (MDE).
We examined the National Survey of American Life (NSAL) to achieve the goals of this paper. The NSAL is the largest nationally representative survey of mental disorders among African Americans to date and it contains a rich array of SEP variables that are essential to our purposes. The NSAL used the World Mental Health Composite International Diagnostic Interview (WMH-CIDI) to identify cases of depression. The strong design of the study, including face-to-face interviews, matching respondents and interviewers on race, and the NSAL sampling strategy make the NSAL ideal for pursuing the study goals.
Method {#Sec3}
======
Sample {#Sec4}
------
Data for this paper were drawn from the NSAL, a national population-based sample drawn from the coterminous United States. Data were collected using a stratified and clustered sample design, and weights were created to account for unequal probabilities of selection, non-response, and post-stratification. More detailed documentation on the NSAL sampling methodology and study procedures are discussed elsewhere \[[@CR14], [@CR19]\]. The final African American sample included 3,570 African American respondents aged 18 years and over. NSAL data were collected between 2001 and 2003 and utilized an in-home, face-to-face interview design with computer-assisted personal interviewing (CAPI) software. NSAL interviews lasted an average of 2 h and 20 min \[[@CR18]\].
In addition to the face-to-face interview, NSAL respondents were invited to complete a self-administered questionnaire, the NSAL Adult Re-interview (RIW). A total of 2,137 African Americans participated in the RIW. Among other items, respondents were asked about their housing equity and were asked to provide a dollar amount of all the assets they owned, as well as an estimate of the debts they owed. Respondents who were female, unemployed, more highly educated, and participated in the original NSAL interview post-September 11, 2001, had higher response rates on the RIW. Weights were created and used to account for non-response variations.
We restricted analysis to respondents who provided SEP information, including household income, education, employment status, wealth indicators, and mother's education, as well as to those respondents for whom the diagnosis of 12-month and lifetime MDE was available. These restrictions resulted in a final sample of 579 men and 1,050 women for 12-month MDE, and 602 men and 1,267 women for lifetime MDE.
Measurement {#Sec5}
===========
Depression {#Sec6}
----------
MDE was the outcome of interest for this study and was based upon meeting diagnostic criteria for MDE using the WMH-CIDI, a fully structured lay-administered diagnostic instrument that approximates DSM-IV diagnoses of psychiatric disorders \[[@CR23], [@CR25], [@CR42]\]. A case for MDE was determined when respondents met DSM-IV criteria for MDE according to the CIDI.
SEP measures {#Sec7}
------------
Household income was measured by respondents' reported annual household income in US dollars and was categorized as: \<\$17,000; \$17,000--49,999; \$45,000--79,999; and ≥\$80,000. Respondents' highest level of education was assessed by the following categories: \<12 years; 12 years; 13--15 years; and ≥16 years. Respondents' employment status was coded into three categories: employed, corresponding to respondents who reported that they were currently employed at the time of data collection; unemployed, for respondents who were unemployed but actively seeking employment; and not in workforce, for respondents who were not currently working and were not seeking employment. Mother's education, measured by the number of years of school completed, was used as a measure of childhood SEP.
The wealth measures examined here included net worth and estimated home value. The net worth measure was calculated by determining respondents' reported assets minus debts. To account for missing data on net worth (45% were missing information on assets and 35% were missing information on debt) multiple imputation was carried out using the SAS multiple imputation procedure (PROC MI) based on African American respondents' sex, age, reported household income, years of education, employment status, marital status, household size, and US geographic region \[[@CR43]\].
Covariates {#Sec8}
----------
Age was a continuous variable of respondents' reported age at the time of the interview. Marital status was coded into three categories (married/partnered, separated/divorced/widowed, and never married), with married/partnered as the reference group. Geographic region included four categories (Northeast, Midwest, South, and West) with South as the reference category. Household size indicated the number of individuals residing in respondents' households, including adults and children.
Statistical analyses {#Sec9}
--------------------
Multiple logistic regression models, stratified by sex, were used to estimate the influence of SEP indicators on odds of MDE. Analyses were stratified by sex to examine differences between African American men and women.
Results {#Sec10}
=======
Table [1](#Tab1){ref-type="table"} describes the sociodemographic characteristics of the NSAL African American sample stratified by sex. African American males and females had the same average age (42.5 years), household size (2.89), and similar regional distribution and levels of education. Among males, the majority of respondents reported that they were currently employed (71.4%), and slightly more than half (51.1%) reported they were married or lived with a romantic partner. Among women, 63% reported that they were currently employed, 34% reported that they were currently married or lived with a romantic partner. There were significant gender differences in levels of reported household income, with men reporting higher levels than women. Males reported higher home values than women, while females reported greater levels of net worth than males. African American females also reported significantly greater prevalence of both 12-month and lifetime MDE compared to males (1.98 vs. 4.83, and 3.61 vs. 7.88, respectively).Table 1Sociodemographic characteristics of African Americans in the NSALMales (*n* = 693)Females (*n* = 1,444)% (SE); M (SE)% (SE); M (SE)Total6931,444Household income \<\$17,00025.57 (2.43)38.76 (1.97) \$17,000--44,99922.91 (1.43)26.37 (1.59) \$45,000--79,99926.55 (1.82)19.66 (1.27) \>\$80,00024.97 (2.64)15.22 (1.51)Education (years) \<1224.37 (2.79)24.97 (2.06) 1234.9 (2.15)37.21 (1.46) 13--1524.21 (2.45)25.01 (1.28) ≥1616.52 (2.30)12.81 (1.19)Employment status Employed71.41 (2.06)63.19 (1.91) Unemployed9.89 (1.4)11.5 (1.1) Not in labor force18.7 (1.94)25.32 (1.48)Maternal education \<1234.69 (3.70)39.8 (2.12) 1238.31 (2.80)36.93 (2.0) 13--1513.0 (2.02)11.87 (1.14) ≥1614.1 (1.50)11.41 (1.18)Net worth90,350 (5,229.08)106,278 (5,046.56)Home equity91,186 (2,886.89)77,368 (1,885.30)Marital status Married/partnered51.09 (2.59)34.44 (1.48) Divorced/separated/widowed19.4 (19.4)32.05 (1.29) Never married29.51 (2.5)33.52 (1.66)Age42.51 (0.43)42.51 (0.34)Household size2.89 (0.04)2.89 (0.03)Region Northeast15.47 (1.60)13.91 (1.67) Midwest18.55 (1.99)19.89 (2.35) West9.28 (1.42)7.39 (1.26) South56.7 (2.89)58.81 (2.68)
Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"} display the relationship between SEP indicators and MDE for African Americans, adjusted for marital status, age, sex, household size, and geographic region. For both 12-month and lifetime MDE, female respondents reported significantly greater odds of depression than males. Most of the SEP variables examined here were unrelated to depression. There were several exceptions to this pattern. For 12-month MDE, we found that respondents who reported 13--15 years of education had lower odds of depression than those who reported less than 12 years. For lifetime MDE, mother's education was inversely associated with increased odds of depression.Table 2Multivariate logistic regression of SEP indicators on 12-month Major Depressive EpisodeVariablesOR (95% CI)Household income \<\$17,000 (ref.) \$17,000--44,9990.66 (0.33--1.32) \$45,000--79,9990.65 (0.29--1.47) \>\$80,0001.36 (0.52--3.57)Education (years) \<12 (ref.) 120.54 (0.30--0.99) 13--150.41 (0.21--0.81)\* ≥160.47 (0.18--1.26)Employment status Employed (ref.) Unemployed1.84 (0.88--3.86) Not in labor force0.88 (0.45--1.70)Maternal education1.05 (0.99--1.11)Net worth (log)1.03 (0.64--1.66)Home value (log)1.60 (0.53--4.81)Marital status Married/partnered (ref.) Divorced/separated/widowed1.70 (0.76--3.78) Never married1.89 (0.91--3.89)Age0.99 (0.97--1.01)Female1.80 (1.01--3.21)\*Household size1.02 (0.88--1.18)Region Northeast1.07 (0.56--2.06) Midwest1.88 (1.17--3.05) West0.89 (0.18--4.49) South (ref.)Pseudo *R*^2^0.09*OR* odds ratio, *CI* confidence interval\* Significant at *p* = 0.05 level, two-sided testTable 3Multivariate logistic regression of SEP indicators on Lifetime Major Depressive EpisodeVariablesOR (95% CI)Household income \<\$17,000 (ref.) \$17,000--44,9990.73 (0.45--1.18) \$45,000--79,9990.61 (0.33--1.15) \>\$80,0001.10 (0.53--2.28)Education (years) \<12 (ref.) 120.73 (0.44--1.21) 13--150.59 (0.33--1.06) ≥160.79 (0.36--1.70)Employment status Employed (ref.) Unemployed1.60 (0.92--2.80) Not in labor force0.92 (0.57--1.49)Maternal education1.06 (1.01--1.12)\*Net worth (log)1.05 (0.74--1.48)Home value (log)1.32 (0.54--3.25)Marital status Married/partnered (ref.) Divorced/separated/widowed1.43 (0.82--2.50) Never married1.44 (0.81--2.58)Age0.99 (0.98--1.02)Female1.74 (1.14--2.65)\*Household size1.02 (0.91--1.14)Region Northeast1.43 (0.93--2.22) Midwest1.50 (1.06--2.13)\* West0.83 (0.26--2.64) South (ref.)Pseudo *R*^2^0.06*OR* odds ratio, *CI* confidence interval\* Significant at *p* = 0.05 level, two-sided test
As indicated in Table [4](#Tab4){ref-type="table"}, male respondents in the \$80,000 and above household income category reported greater odds of depression than male respondents in the lowest income category (OR = 5.20; CI: 1.41--19.12). In addition, unemployed male respondents reported significantly greater odds of 12-month MDE than employed male respondents (OR = 3.78; CI: 1.09--13.12). For education, male respondents in the 13--15 years and 16 or greater years categories reported lower odds of 12-month MDE than male respondents with less than 12 years of education. There was not a statistically significant relationship between maternal education and 12-month MDE. We also did not find significant relationships between either of the wealth indicators (net worth and home value) and 12-month MDE among African American males.Table 4Multivariate logistic regression of SEP indicators on 12-month Major Depressive Episode; by sexVariablesMales (*n* = 579)Females (*n* = 1,050)OR (95% CI)OR (95% CI)Household income \<\$17,000 (ref.) \$17,000--44,9990.60 (0.07--5.04)0.54 (0.25--1.19) \$45,000--79,9992.01 (0.56--7.25)0.33 (0.13--0.82)\* \>\$80,0005.20 (1.41--19.12)\*0.59 (0.19--1.84)Education (years) \<12 (ref.) 120.41 (0.15--1.10)0.64 (0.34--1.23) 13--150.26 (0.09--0.76)\*0.54 (0.22--1.31) ≥160.19 (0.05--0.72)\*0.70 (0.22--2.23)Employment status Employed (ref.) Unemployed4.65 (1.39--15.54)\*1.05 (0.50-2.18) Not in labor force0.99 (0.23--4.33)0.83 (0.50--1.39)Maternal education1.05 (0.94--1.17)1.05 (0.98--1.13)Net worth (log)0.76 (0.26--2.22)1.19 (0.68--2.07)Home value (log)1.11 (0.10--12.58)2.41 (0.70--8.24)Marital status Married/partner (ref.) Divorced/separated/widowed4.42 (1.11--17.57)\*1.18 (0.58--2.39) Never married7.86 (2.60--23.79)\*1.13 (0.50--2.52)Age1.01 (0.98--1.04)0.98 (0.96--1.01)Household size1.03 0.62--1.73)1.06 (0.92--1.23)Region Northeast0.22 (0.02--2.52)1.52 (0.66--3.54) Midwest1.84 (0.56--6.08)2.08 (1.16--3.74) West0.99 (0.12--7.91)0.587 (0.11--3.04) South (ref.)Pseudo *R*^2^0.230.07*OR* odds ratio, *CI* confidence interval\* Significant at *p* = 0.05 level, two-sided test
Among African American female respondents, there was a significant inverse relationship observed between household income and 12-month MDE. Women in the \$45,000 to \$79,999 income category reported significantly lower odds of 12-month MDE than women in the lowest income category (OR = 0.33; CI: 0.13--0.82). There were no significant relationships between any other SEP indicators, including education, wealth, and parental education, and 12-month MDE observed for African American women.
Table [5](#Tab5){ref-type="table"} displays the relationship between SEP and lifetime MDE among African Americans stratified by sex. For African American males, there were no significant relationships between SEP and lifetime odds of MDE, with the exception of unemployment. Unemployed male respondents reported significantly greater odds of lifetime depression than employed male respondents (OR = 3.91; CI: 1.41--10.82). Female respondents who reported earning \$45,000--\$79,999 had significantly lower odds of lifetime MDE than females who reported household incomes below \$17,000 (OR = 0.43; 0.21--0.91). No other significant relationships were observed between SEP indicators and lifetime MDE among females.Table 5Multivariate logistic regression of SEP indicators on Lifetime Major Depressive Episode; by sexVariablesMales (*n* = 602)Females (*n* = 1,267)OR (95% CI)OR (95% CI)Household income \<\$17,000 (ref.) \$17,000--44,9990.59 (0.16--2.15)0.72 (0.40--1.31) \$45,000--79,9991.07 (0.42--2.69)0.43 (0.21--0.91)\* \>\$80,0002.50 (0.85--7.35)0.65 (0.26--1.65)Education (years) \<12 (ref.) 12 1.02 (0.40--2.62)0.65 (0.37--1.13) 13--15 0.59 (0.19--1.85)0.60 (0.28--1.28) ≥160.72 (0.21--2.44)0.88 (0.39--2.02)Employment status Employed (ref.) Unemployed3.91 (1.41--10.82)\*0.95 (0.54--1.67) Not in labor force0.85 (0.30--2.42)0.93 (0.57--1.51)Maternal education1.10 (0.99--1.21)1.05 (0.99--1.12)Net worth (log)0.78 (0.34--1.78)1.20 (0.80--1.78)Home value (log)0.68 (0.11--4.16)2.05 (0.66--6.40)Marital status Married/partnered (ref.) Divorced/separated/widowed3.20 (1.15--8.88)\*1.06 (0.59--1.92) Never married3.60 (1.48--8.79)\*1.02 (0.49--2.14)Age1.03 (0.99--1.05)0.99 (0.97--1.01)Household size1.17 (0.89--1.54)1.00 (0.87--1.15)Region Northeast0.82 (0.20--3.44)1.69 (1.01--2.83)\* Midwest1.68 (0.97--2.92)1.43 (0.93--2.21) West1.13 (0.22--5.77)0.54 (0.17--1.68) South (ref.)Pseudo *R*^2^0.130.05*OR* odds ratio, *CI* confidence interval\* Significant at *p* = 0.05 level, two-sided test
Comparing the results from both 12-month and lifetime measures of MDE, only two associations between SEP and MDE remained constant. For African American men, unemployment was significantly related to increased odds of depression. African American women grouped in the \$45,000--\$79,000 household income category reported decreased odds of depression. Interestingly, we found that marital status was a significant factor in predicting depression among African American men, but not women. Specifically, men in the divorced/separated/widowed and never married categories reported significantly greater odds of both 12-month and lifetime MDE, compared to married men.
Discussion {#Sec11}
==========
It should be acknowledged that this study has several key limitations. First, the data set utilized in this study is cross-sectional and, as a result, the issue of social selection versus social causation cannot be addressed. Specifically, we cannot examine whether depression caused SEP or the reverse. The observed associations between SEP and depression could be partially explained by the occurrence of depression in adolescence or early adulthood, rather than being due to more proximal events, such as income or employment status \[[@CR13]\]. A prospective study design would be more advantageous in determining whether social disadvantage or privilege predict depression among African Americans \[[@CR35]\]. A prospective design would also allow us to consider the effects of lifetime occurrence of depression on depressive episodes that occur later in life. Second, it is possible that the imputation method used created inaccurate estimates of wealth because the missing values for study respondents may not have been missing at random. Respondents with higher levels of wealth may have been more likely to report their financial holdings, which would artificially inflate wealth estimates in this study. Additionally, the imputation method used to derive estimates of assets and debts is based upon the SEP information that respondents did provide, such as household income, education, employment status, and home ownership. It is possible that the imputed values of net worth are not independent and simply reflect the traditional measures of SEP. Despite the complexity and difficulty in collecting accurate wealth information from study participants, the consideration of wealth effects upon depression remains an important issue and investigators must continue to develop methods to obtain complex, sensitive wealth information from study participants.
In support of our hypothesis that greater SEP would be associated with increased odds of depression, we found that higher household income was associated with greater odds of 12-month MDE among African American men. Specifically, we found that the highest earning African American men reported greater odds of depression compared to men in the lowest income category. In contrast to our hypothesis, however, African American men who reported greater levels of education had lower odds of 12-month MDE, compared to men in the lowest income category. Perhaps education is valued more highly among African American men and provides protection from depression. Conversely, higher earning African American men may encounter greater amounts of stress due to increased exposure to racial discrimination. For example, previous studies have indicated that African Americans who earn more money and work in more prestigious occupations are more aware of structural barriers and limitations in their work environments \[[@CR5], [@CR10], [@CR29]\]. Additionally, higher earning African American men may have to address conflicts within their social networks due to decreased proximity to their social support networks, in addition to facing greater demands for social capital and even monetary assistance, compared to working class or poor African Americans \[[@CR15], [@CR16]\].
We found that unemployment was a significant predictor of both 12-month and lifetime MDE for men. Unemployed men reported over more than four times greater odds of depression compared to employed men. With an unemployment rate of 16.7%, African American men currently have the highest rate of unemployment in the US and 8% of African American men have lost their jobs since November 2007 \[[@CR4]\]. Considering the high number of unemployed African American men during the current economic recession, unemployment represents a substantial threat to the mental health of African American men that clinicians should note. Additionally, investigators should continue to explore the importance and impact of employment status and the ability to provide for a family as a gendered role that could affect depression among African American men.
Among female respondents, SEP did not appear to be a significant predictor of depression. Only women who were in the \$45,000--\$79,000 household income category had significantly lower odds of 12-month and lifetime MDE compared to women in the reference category, who reported household incomes less than \$17,000 a year. In future investigations of the relationship between SEP and depression, it may also be worthwhile to investigate economic stressors, rather than SEP, which may be more significant in the prediction of depression among African American women.
It is important to note that no significant relationships were observed between wealth indicators, measured by net worth and home value, and depression among African Americans. This finding is similar to results garnered from previous studies that found no relationship between markers of wealth and indices of mental health for African Americans \[[@CR33]\]. However, as was mentioned, it is possible that the method used to measure and impute net worth in this study precluded the observation of the relationship between net worth and depression. Considering the small number of studies that have examined the relationship between indices of wealth and depression among African Americans, more studies are needed before reaching a conclusive understanding of the wealth-depression relationship. Additionally, a prospective design may help researchers to understand how the interaction of wealth (or the lack of it) with life stressors could affect the mental health of individuals over time.
While we did not form hypotheses a priori, it is clear that marital status is a significant factor in predicting depression among African Americans, and the effects of marital status vary across sex. Among African American men, respondents in the divorced/separated/widowed and never married categories demonstrated over four and seven times greater odds, respectively, of depression than married men. These findings indicate that marriage may be a protective factor against the development of depression among African American men. This finding could also indicate another social selection issue, as men who suffer from depression could be less likely to get married or could be more likely to get divorced or separated. Conversely, marital status was not related to decreased odds of depression among African American women. Scholars have argued that women may place more emphasis on caring for others, rather than for themselves, and that marital satisfaction has a larger effect upon depression for women than men \[[@CR9]\]. These findings indicate that the effect of marriage, including marital satisfaction and discord, upon depression among African American men and women warrants further examination in future work.
The results presented here do not offer conclusive evidence of a uniform positive or negative relationship between SEP and depression among African Americans. However, the findings of this study are important because they highlight patterns of association between SEP and depression, as well as between marital status and depression, that vary by sex. It is possible that the SEP indicators selected for this study are not fully representative of the stress exposures that African Americans encounter, or of the resources that African Americans possess that protect them against the development of depression. Thus, it may be advantageous to investigate the effects of financial stressors, as well as neighborhood-level socioeconomic resources, in the prediction of depression among African Americans. Future work should also explore how racial discrimination, a prominent stressor, and an important predictor of depression among African Americans within the public health literature \[[@CR22], [@CR37], [@CR39], [@CR41]\], affects the relationship between SEP and depression. Exposure to racial discrimination is related to increased odds of depression \[[@CR22]\], and Hudson et al. \[[@CR17]\] found that experiences of racial discrimination attenuate the relationship between SEP and depression among African American men \[[@CR17]\].
While the findings presented here indicate that economic resources are not the sole answer to depression among African Americans, they do call for researchers to pay close attention to the role that gender plays, including how stress exposure and stress effects vary by gender, in the prediction of depression among African Americans. There is a need for continued investigation of the cultural and social factors that African Americans experience throughout the life course that translate to diminished health status. Additionally, episodes of depression that occur in early adulthood, as well as those in childhood and adolescence, likely influence accumulation of SEP and affect risk of depression later in life and deserve further attention in future studies. The findings presented here and the research directions outlined are important for developing policies that not only reduce the socioeconomic disparities that negatively affect the mental health of African Americans, but also address the unique social stressors that African Americans may encounter across all levels of SEP.
This work was supported by the National Institute of Mental Health (NIMH; grants U01-MH577165; R01MH068804-04), with supplemental support from the Office of Behavioral and Social Science Research at the National Institutes of Health, the University of Michigan, and the Center for Research on Ethnicity, Culture and Health funded through the National Institute of General Medical Sciences (5R25GM058641-10). Additional support was provided by the Kellogg Health Scholars Program and the University of California, San Francisco, Center on Research in Social Disparities. We are also thankful to Dr. Nancy Adler and Karen Simpkins for her helpful editorial feedback as well as the anonymous reviewers.
**Open Access** This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
|
2024-02-02T01:26:36.242652
|
https://example.com/article/1531
|
In the grimy dockland suburb of Alcantara, Lisbon, a heavy, grey frosted-glass door in an equally forbidding office block currently offers an entrance to what has become the new El Dorado for a growing sector of the Portuguese workforce: Angola.
For centuries, the former colony was as ruthlessly exploited by its European masters as any other in Africa. But today, with the Portuguese economy floundering, the boot is firmly on the other foot. For most of the past decade, Angola's diamond-mining and oil-rich economy has grown by 10 per cent a year. With 7,000 Portuguese businesses already established there and clear linguistic, human and political links, too, when Angola started looking for a huge range of skilled workers from abroad to help rebuild the country, the old "mother nation" stood head and shoulders above the rest.
But for the recession-struck Portuguese to make it out there, there is only one legal path: head to Alcantara and that grim-looking door, behind which the Angolan consulate is currently processing Portuguese immigration papers at an average of more than 20,000 a year.
"It's for one reason: in Portugal, the recession is here to stay, and that's true for everybody," says Ricardo Bordalo, a Portuguese journalist from the Lusa news agency. Based in Angola between 2008 and 2011, he watched the number of his compatriots there increase from 20,000 to 130,000. "In Angola, after the war, the country was completely destroyed, and they needed people there. And many thousands of Portuguese had already lived there before independence. There's always been a special relationship between Portugal and Angola. Sometimes we hate each other, sometimes we love each other, and now it's our turn to go there. But it's not easy to get a visa: they make us suffer a little bit."
The Angolans themselves have no comment to make about the boom in immigration from their former colonial masters – at least not to this publication. "The Independent on Sunday is a very bad newspaper," one extremely well-built official said by way of explanation, albeit with a large grin, before firmly inviting me to turn around, leave the embassy building at once and "go and interview those Portuguese people over there".
Uniformly in their thirties and forties, the two dozen or so men and women milling about one Wednesday lunchtime almost all confirm they are – hopefully – Angola bound. However, they shy away from interviews and refuse point-blank to give their names. ("They wouldn't want to risk getting into trouble with the Angolan authorities," Bordalo points out.) Only one man, an electrical engineer – on condition of anonymity – is willing to go on tape.
"A lot of us want to go, just look at the queues," he says. "Many of my colleagues have already gone. It's impossible to find work here, even for highly qualified people. My wife has a master's degree in psychology, but her association was forced to close, and she is unemployed. What work there is pays very poorly. People like her are now earning €600 [£500] a month. Many graduates are working in call centres, selling stuff. Not that they sell anything."
It is true that Portuguese emigration is a well-established tradition – to the point where Portuguese economists estimate that, in the 1960s, money that was sent home from abroad contributed around a quarter of Portugal's GDP. However, destinations that were more popular in the past, such as the UK or other EU countries, are now far less appealing.
"All over Europe, there are millions of unemployed. Britain and France are not well [sic]. The same goes for the United States. There are many rich, but many poor," the electrical engineer points out. "In Angola, the economy is booming. It's not easy to get a visa, but I was contacted directly by the company there, and that makes it much faster. I'm going there for at least a year, and then we will see. Five or six years would be the target."
While unskilled people can get jobs there, the demand for unskilled labour is more limited – and woe betide anybody caught trying to enter Angola without the correct paperwork. "I heard of a bunch of guys who went there on tourist visas who then tried to start work on a building," the electrical engineer says with a chuckle. "They got put on the next TAP [the Portuguese national airline] flight back to Lisbon."
There is no attempt by Portugal's government to stop this brain drain, which has already seen an estimated 10 per cent of the country's workforce emigrate. Indeed, last December, the Prime Minister, Pedro Passos Coelho, suggested to teachers who were "supplementary to our requirements" that they "try Angola or Brazil, where there's a huge demand for primary and secondary school educators. We have a drop in population, and either they can retrain in other areas, or if they want to stay as teachers, look through the entire Portuguese-speaking market."
However, on arriving in Luanda, Angola may not appear to be as shiny an El Dorado as it seems from rainy, economically battered Portugal, where GDP is forecast to shrink by 3 per cent in 2012. "Some people go there and they get depressed in less than a week because they can't stand the streets full of rubbish, the fear of going out at night, the three-hour traffic jams and the corruption that exists in some areas," commented Antonio Fernandes – a Portuguese businessman returning to live in Angola last December as an emigrant – to the Spanish El País newspaper last year. "This is no country for softies."
However, at the moment, that heavy grey door fronting Angola's consulate in Alcantara is one of the fast-dwindling alternatives Portugal's beleaguered workforce can still take – hoping for some kind of viable future.
Migration: Europe loses skilled workers as Indians return
Spain: The economic crisis is forcing 1,200 young Spaniards to emigrate to Argentina each month, Prime Minister Mariano Rajoy claimed last year. Around 30,000 Spaniards moved to Argentina between June 2009 and November 2010. Some 6,400 went to Chile and 6,800 headed for Uruguay.
Italy: The Italian economy has been at a virtual standstill since 2000 and around 600,000, often highly educated young Italians, have gone abroad in the past decade. Most have emigrated to North and South America. Many blamed Silvio Berlusconi for their country's rising unemployment rates.
|
2024-02-14T01:26:36.242652
|
https://example.com/article/9326
|
import ClassicEditorBase from '@ckeditor/ckeditor5-editor-classic/src/classiceditor';
import EssentialsPlugin from '@ckeditor/ckeditor5-essentials/src/essentials';
import PasteFromOfficePlugin from '@ckeditor/ckeditor5-paste-from-office/src/pastefromoffice';
import FontPlugin from '@ckeditor/ckeditor5-font/src/font';
import ParagraphPlugin from '@ckeditor/ckeditor5-paragraph/src/paragraph';
import HeadingPlugin from '@ckeditor/ckeditor5-heading/src/heading';
import BoldPlugin from '@ckeditor/ckeditor5-basic-styles/src/bold';
import ItalicPlugin from '@ckeditor/ckeditor5-basic-styles/src/italic';
import UnderlinePlugin from '@ckeditor/ckeditor5-basic-styles/src/underline';
import BlockQuotePlugin from '@ckeditor/ckeditor5-block-quote/src/blockquote';
import AutoformatPlugin from '@ckeditor/ckeditor5-autoformat/src/autoformat';
import Alignment from '@ckeditor/ckeditor5-alignment/src/alignment';
import LinkPlugin from '@ckeditor/ckeditor5-link/src/link';
import ListPlugin from '@ckeditor/ckeditor5-list/src/list';
import TablePlugin from '@ckeditor/ckeditor5-table/src/table';
import MediaEmbed from '@ckeditor/ckeditor5-media-embed/src/mediaembed';
import ImagePlugin from '@ckeditor/ckeditor5-image/src/image';
import ImageCaptionPlugin from '@ckeditor/ckeditor5-image/src/imagecaption';
import ImageStylePlugin from '@ckeditor/ckeditor5-image/src/imagestyle';
import ImageToolbarPlugin from '@ckeditor/ckeditor5-image/src/imagetoolbar';
import ImageUploadPlugin from '@ckeditor/ckeditor5-image/src/imageupload';
import LsReplacements from './plugins/LsReplacements/LsReplacements';
import LsFileUploadPlugin from './plugins/LsImage/LsFileUploadPlugin';
import LsImageSelectPlugin from './plugins/LsImage/lsimageselect';
import LsImageSizePlugin from './plugins/LsImage/lsimagesize';
import './plugins/assets/styles.scss';
export default class LsCkEditor extends ClassicEditorBase {}
LsCkEditor.builtinPlugins = [
EssentialsPlugin,
FontPlugin,
PasteFromOfficePlugin,
HeadingPlugin,
BoldPlugin,
ItalicPlugin,
UnderlinePlugin,
BlockQuotePlugin,
AutoformatPlugin,
Alignment,
LinkPlugin,
ListPlugin,
TablePlugin,
ParagraphPlugin,
MediaEmbed,
ImagePlugin,
ImageCaptionPlugin,
ImageStylePlugin,
ImageToolbarPlugin,
ImageUploadPlugin,
LsReplacements,
LsFileUploadPlugin,
LsImageSelectPlugin,
LsImageSizePlugin,
];
LsCkEditor.defaultConfig = {
toolbar: {
items: [
'heading',
'fontSize',
'fontColor',
'|',
'bold',
'italic',
'underline',
'link',
'alignment',
'|',
'bulletedList',
'numberedList',
'blockQuote',
'undo',
'redo',
'insertTable',
'|',
'mediaEmbed',
'|',
'imageUpload',
'selectImage',
'expressions'
]
},
image: {
toolbar: [
'imageStyle:full',
'imageStyle:side',
'|',
'imageTextAlternative',
'imageSize',
]
},
language: LS.data.language
};
|
2024-07-17T01:26:36.242652
|
https://example.com/article/3862
|
Email
Pakistan was considered among the 12 countries which were expected to make rapid progress due to the growing possibilities of investment from other countries. - File photo
KARACHI: KMC Administrator Muhammad Hussain Syed said the Government of Japan and Japan International Cooperation Agency (JICA) had shown interest in investment in various Karachi Projects including the Circular Railway, Rapid Bus System, Infrastructure Development and Vehicle Manufacturing which would provide jobs opportunities to a large number of people.
He expressed these views while addressing a seminar held in a local hotel with the collaboration of Board of Investment and Japan International Cooperation Agency (JICA).
The other speakers on this Seminar included renowned industrialist Zubair Motiwala, Saleem H. Mandvi Wala, President PJPF Sohail Ahmed and Consul General of Japan Masaharou Sato.
A delegation comprising experts from Japan also attended the seminar and presented their study report on investment in Karachi.
The Administrator Karachi on this occasion said specific environment was needed for investment in any city or country.
If a country had its own sea ports, air roots and highways then it attracts investors to make rapid investment and avail the benefits of availability of raw material and good number of manpower for running any industry.
Karachi in this connection offers a very conducive environment for investment and it was counted among the countries where all such elements were easily available.
He said Pakistan was considered among the 12 countries which were expected to make rapid progress due to the growing possibilities of investment from other countries.
He also cited the examples of Malaysia, Mexico, Thailand and Turkey and said that Pakistan was also among such countries which could make rapid progress in the next ten years.
The Administrator Karachi said Germany, Malaysia, China, UAE, United States and some other countries have also shown huge interest in investing in various projects for Karachi.
The Rs 570 million worth Phase-I of Mehran Highway was completed with the cooperation of JICA and the Phase-II being started now.
He said that the study report for restoration of Circular Railway was also completed and it was expected that the Circular Railway Service would resume in Karachi by next September.
The Administrator Karachi said the KMC was working on the improvement of city's infrastructure and work on the Corridor-V would begin after Eid-ul-Fitr.
With the construction of more underpasses and flyover at busiest intersections traffic flow would be improved and the citizens would get even better facilities in the coming days.
He said the people would get opportunities for livelihood with the investment in the city and it was a good omen that the JICA was providing full cooperation to KMC for Karachi Projects.
|
2023-10-29T01:26:36.242652
|
https://example.com/article/1145
|
---
abstract: 'We give examples of real Banach spaces with exactly infinite countably many complex structures and with $\omega_1$ many complex structures.'
address: |
Instituto de Matemática e Estatística Universidade de São Paulo\
R. do Matão, 1010 - Butantã, São Paulo - Brazil
author:
- 'W. Cuellar Carrera'
title: A Banach Space with a countable infinite number of complex structures
---
Introduction
============
A real Banach space $X$ is said to admit a complex structure when there exists a linear operator $I$ on $X$ such that $I^2=-Id$. This turns $X$ into a $\mathbb C$-linear space by declaring a new law for the scalar multiplication: $$(\lambda + i\mu).x= \lambda x + \mu I(x) \; \; \; (\lambda, \mu \in \mathbb R).$$ Equipped with the equivalent norm $$\|x\|= \sup _{0\leq \theta\leq 2\pi} \| \cos \theta x+ \sin \theta Ix \|,$$ we obtain a complex Banach space which will be denoted by $X^I$. The space $X^I$ is the complex structure of $X$ associated to the operator $I$, which is often referred itself as a complex structure for $X$.
When the space $X$ is already a complex Banach space, the operator $Ix=ix$ is a complex structure on $X_{\mathbb R}$ (i.e., $X$ seen as a real space) which generates $X$. Recall that for a complex Banach space $X$ its complex conjugate $\overline{X}$ is defined to be the space $X$ equipped with the new scalar multiplication $\lambda.x= \overline{\lambda}x$.
Two complex structures $I$ and $J$ on a real Banach space $X$ are equivalent if there exists a real automorphism $T$ on $X$ such that $TI=JT$. This is equivalent to saying that the spaces $X^I$ and $X^J$ are $\mathbb C$-linearly isomorphic. To see this, simply observe that the relation $TI=JT$ actually means that the operator $T$ is $\mathbb C$-linear as defined from $X^I$ to $X^J$.
We note that a complex structure $I$ on a real Banach space $X$ is an automorphism whose inverse is $-I$, which is itself another complex structure on $X$. In fact, the complex space $X^{-I}$ is the complex conjugate space of $X^{I}$. Clearly the spaces $X^{I}$ and $X^{-I}$ are always $\mathbb R$-linearly isometric. On the other hand, J. Bourgain [@B] and N. Kalton [@K] constructed examples of complex Banach spaces not isomorphic to their corresponding complex conjugates, hence these spaces admit at least two different complex structures. Bourgain example is an $\ell_2$ sum of finite dimensional spaces whose distance to their conjugates tends to infinity. Kalton example is a twisted sum of two Hilbert spaces i.e., $X$ has a closed subspace $E$ such that $E$ and $X/E$ are Hilbertian, while $X$ itself is not isomorphic to a Hilbert space.
Complex structures do not always exist on Banach spaces. The first example in the literature was the James space, proved by J. Dieudonné [@D]. Other examples of spaces without complex structures are the uniformly convex space constructed by S. Szarek [@S] and the hereditary indecomposable space of W. T. Gowers and B. Maurey [@GM]. Gowers [@G1; @G2] also constructed a space with unconditional basis but without complex structures. In general these spaces have few operators. For example, every operator on the Gowers-Maurey space is a strictly singular perturbation of a multiple of the identity and this forbids complex structures: suppose that $T$ is an operator on this space such that $T^2=-Id$ and write $T=\lambda Id+ S$ with $S$ a strictly singular operator. It follows that $(\lambda^2+1)Id$ is strictly singular and of course this is impossible.
More examples of Banach spaces without complex structures were constructed by P. Koszmider, M. Martín and J. Merí [@KMM1; @KMM2]. In fact, they introduced the notion of *extremely non-complex Banach space*: A real Banach space X is extremely non-complex if every bounded linear operator $T: X \rightarrow X$ satisfies the norm equality $ \|Id+ T^2\|= 1+ \|T\|^2$. Among their examples of extremely non complex spaces are $C(K)$ spaces with few operators (e.g. when every bounded linear operator $T$ on $C(K)$ is of the form $T=gId+S$ where $g\in C(K)$ and $S$ is a weakly compact operator on $C(K)$), a $C(K)$ space containing a complemented isomorphic copy of $\ell_{\infty}$ (thus having a richer space of operators than the first one mentioned) and an extremely non complex space not isomorphic to any $C(K)$ space.
Going back to the problem of uniqueness of complex structures, Kalton proved that spaces whose complexification is a primary space have at most one complex structure [@FG]. In particular, the classical spaces $c_0$, $\ell_p$ $(1\leq p \leq \infty)$, $L_p [0,1]$ $(1\leq p \leq \infty)$, and $C[0,1]$ have a unique complex structure.
We have mentioned before examples of Banach spaces with at least two different complex structures. In fact, V. Ferenczi [@F] constructed a space $X({\mathbb}C)$ such that the complex structure $X({\mathbb}C)^J$ associated to some operator $J$ and its conjugate are the only complex structures on $X({\mathbb}C)$ up to isomorphism. Furthermore, every ${\mathbb}R$-linear operator $T$ on $X({\mathbb}C)$ is of the form $T= \lambda Id + \mu J + S$, where $\lambda, \mu$ are reals and $S$ is strictly singular. Ferenczi also proved that the space $X({\mathbb}C)^n$ has exactly $n+1$ complex structures for every positive integer $n$. Going to the extreme, R. Anisca [@A] gave examples of subspaces of $L_p$ ($1\leq p <2$) which admit continuum many non-isomorphic complex structures.
The question remains about finding examples of Banach spaces with exactly infinite countably many different complex structures. A first natural approach to solve this problem is to construct an infinite sum of copies of $X({\mathbb}C)$, and in order to control the number of complex structures to take a regular sum, for instance, $\ell_1(X({\mathbb}C))$. It follows that every ${\mathbb}R$-linear bounded operator $T$ on $\ell_1(X({\mathbb}C))$ is of the form $T= \lambda(T)+ S$, where $\lambda(T)$ is the scalar part of $T$, i.e., an infinite matrix of operators on $X({\mathbb}C)$ of the form $\lambda_{i,j}Id+ \mu_{i,j}J$, and $S$ is an infinite matrix of strictly singular operators on $X({\mathbb}C)$. It is easy to prove that if $T$ is a complex structure then $\lambda(T)$ is also a complex structure. Recall from [@F] that two complex structures whose difference is strictly singular must be equivalent. Unfortunately, the operator $S$ in the representation of $T$ is not necessarily strictly singular, and this makes very difficult to understand the complex structures on $\ell_1(X({\mathbb}C))$.
It is necessary to consider a more “rigid" sum of copies of spaces like $X({\mathbb}C)$. We found this interesting property in the space $\mathfrak{X}_{\omega_1}$ constructed by S. Argyros, J. Lopez-Abad and S. Todorcevic [@ALT]. Based on that construction we present a separable reflexive Banach space $\mathfrak{X}_{\omega^2}(\mathbb{C})$ with exactly infinite countably many different complex structures which admits an infinite dimensional Schauder decomposition $\mathfrak{X}_{\omega^2}(\mathbb{C})= \bigoplus_k \mathfrak{X}_{k}$ for which every $\mathbb R$-linear operator $T$ on $\mathfrak{X}_{\omega^2}(\mathbb{C})$ can be written as $T= D_T+ S$, where $S$ is strictly singular, $D_T |_{\mathfrak{X}_{k}}= \lambda_k Id_{\mathfrak{X}_{k}}$ $(\lambda_k \in \mathbb C)$ and $(\lambda_k)_k$ is a convergent sequence.
This construction also shows the existence of continuum many examples of Banach spaces with the property of having exactly $\omega$ complex structures and the existence of a Banach space with exactly $\omega_{1}$ complex structures.
Construction of the space $\mathfrak{X}_{\omega_1}(\mathbb{C})$
=================================================================
We construct a complex Banach space $\mathfrak{X}_{\omega_1}(\mathbb{C})$ with a bimonotone transfinite Schauder basis $(e_{\alpha})_{\alpha< \omega_{1}}$, such that every complex structure $I$ on $\mathfrak{X}_{\omega_1}(\mathbb{C})$ is of the form $I=D+S$, where $D$ is a suitable diagonal operator and $S$ is strictly singular.
By a bimonotone transfinite Schauder basis we mean that $\mathfrak{X}_{\omega_1}(\mathbb{C}) = \overline{ {\mathrm{span \,}}}(e_{\alpha})_{\alpha< \omega_{1}}$ and such that for every interval $I$ of $\omega_{1}$ the naturally defined map on the linear ${\mathrm{span \,}}$ of $(e_{\alpha})_{\alpha<\omega_{1}}$ $$\sum _{\alpha< \omega_{1}} \lambda_{\alpha} e_{\alpha} \mapsto \sum _{\alpha\in I} \lambda_{\alpha} e_{\alpha}$$ extends to a bounded projection $P_{I}: \mathfrak{X}_{\omega_1}(\mathbb{C}) \rightarrow \mathfrak X_{I}= \overline{ {\mathrm{span \,}}}_{{\mathbb}C}(e_{\alpha})_{\alpha\in I}$ with norm equal to 1.
Basically $ \mathfrak{X}_{\omega_1}(\mathbb{C})$ corresponds to the complex version of the space $\mathfrak{X}_{\omega_1}$ constructed in [@ALT] modifying the construction in a way that its ${\mathbb}R$-linear operators have similar structural properties to the operators in the original space $\mathfrak{X}_{\omega_1}$ (i.e. the operators are strictly singular perturbation of a complex diagonal operator).
First we introduce the notation that will be used through all this paper.
Basic notation
---------------
Recall that $\omega$ and $\omega_1$ denotes the least infinite cardinal number and the least uncountable cardinal number, respectively. Given ordinals $\gamma, \xi$ we write $\gamma+ \xi,\gamma \cdot \xi,\gamma ^{ \xi}$ for the usual arithmetic operations (see [@J]). For an ordinal $\gamma$ we denote by $\Lambda(\gamma)$ the set of limit ordinals $<\gamma$. Denote by $c_{00} (\omega_1, \mathbb C)$ the vector space of all functions $x: \omega_1 \rightarrow \mathbb C$ such that the set ${\mathrm{supp \,}}x= \{ \alpha< \omega_1 : x(\alpha)\neq 0\}$ is finite and by $(e_{\alpha})_{\alpha<\omega_1}$ its canonical Hamel basis. For a vector $x\in c_{00} (\omega_1, \mathbb C)$ ${\mathrm{ran \,}}x$ will denote the minimal interval containing ${\mathrm{supp \,}}x$. Given two subsets $E_1$, $E_2$ of $\omega_1$ we say that $E_1<E_2$ if $\max E_1< \min E_2$. Then for $x,y\in c_{00} (\omega_1, \mathbb C)$ $x<y$ means that ${\mathrm{supp \,}}x < {\mathrm{supp \,}}y $. For a vector $x\in c_{00} (\omega_1, \mathbb C)$ and a subset $E$ of $\omega_1$ we denote by $Ex$ (or $P_Ex$) the restriction of $x$ on $E$ or simply the function $x\chi_E$. Finally in some cases we shall denote elements of $c_{00} (\omega_1, \mathbb C)$ as $f,g, h \dots $ and its canonical Hamel basis as $(e^{*}_{\alpha})_{\alpha<\omega_1}$ meaning that we refer to these elements as being functionals in the norming set.
Definition of the norming set
------------------------------
The space ${\mathfrak}X_{\omega_1}({\mathbb}C)$ shall be defined as the completion of $c_{00} (\omega_1, \mathbb C)$ equipped with a norm given by a norming set $\mathcal{K}_{\omega_1}(\mathbb{C}) \subseteq c_{00} (\omega_1, \mathbb C)$. This means that the norm for every $x\in c_{00} (\omega_1, \mathbb C)$ is defined as $\sup\{ |\phi(x)|= |\sum_{\alpha < \omega_1} \phi(\alpha) x(\alpha)|: \phi \in \mathcal{K}_{\omega_1}(\mathbb{C}) \}$. The norm of this space can also be defined inductively.
We start by fixing two fast increasing sequences $(m_j)$ and $(n_j)$ that are going to be used in the rest of this work. The sequences are defined recursively as follows:
- $m_{1}=2$ e $m_{j+1}=m^{4}_{j}$;
- $n_{1}=4$ e $n_{j+1}=(4n_{j})^{s_j}$, where $s_j=\log_{2}m^{3}_{j+1}$.
Let $\mathcal{K}_{\omega_1}(\mathbb{C})$ be the minimal subset of $c_{00}(\omega_1,\mathbb{C})$ such that
- It contains every $e^{*}_{\alpha}, \, \alpha < \omega_1$. It satisfies that for every $\phi \in \mathcal{K}_{\omega_1}(\mathbb{C})$ and for every complex number $\theta=\lambda+ i\mu$ with $\lambda$ and $\mu$ rationals and $|\theta|\leq 1$, $\theta \phi \in \mathcal{K}_{\omega_1}(\mathbb{C})$. It is closed under restriction to intervals of $\omega_1$.
- For every $\{ \phi_i,\, : \, i=1,..., n_{2j}\}\subseteq \mathcal{K}_{\omega_1}(\mathbb{C})$ such that $ \phi_1<\cdots< \phi_{n_{2j}}$, the combination $$\begin{aligned}
\phi=\displaystyle \frac{1}{m_{2j}}\sum^{n_{2j}}_{i=1}\phi_i\in \mathcal{K}_{\omega_1}(\mathbb{C}).\end{aligned}$$ In this case we say that $\phi$ is the result of an $(m^{-1}_{2j}, n_{2j})$-operation.
- For every special sequence $(\phi_1, \ldots, \phi_{n_{2j+1}})$ (see the Definition \[tp1\]), the combination $$\begin{aligned}
\phi=\displaystyle \frac{1}{m_{2j+1}}\sum^{n_{2j+1}}_{i=1}\phi_i\in \mathcal{K}_{\omega_1}(\mathbb{C}).\end{aligned}$$ In this case we say that $\phi$ is a special functional and that $\phi$ is the result of an $(m^{-1}_{2j+1}, n_{2j+1})$-operation.
- It is rationally convex.
Define a norm on $c_{00} (\omega_1, \mathbb C)$ by setting $$\begin{aligned}
\|x\| = \sup \left \{ \left | \sum_{\alpha < \omega_1} \phi(\alpha) x(\alpha) \right | \, : \, \phi \in \mathcal{K}_{\omega_1}(\mathbb{C}) \right\}.\end{aligned}$$ The space $\mathfrak{X}_{\omega_1}(\mathbb{C})$ is defined as the completion of $(c_{00}(\omega_1,\mathbb{C}), \|.\|)$.
This definition of the norming set $\mathcal{K}_{\omega_1}(\mathbb{C})$ is similar to the one in [@ALT]. We add the property of being closed under products with rational complex numbers of the unit ball. This, together with property 2 above, guarantees the existence of some type of sequences (like $\ell_{1}^{n}$-averages and $R.I.S$ see Appendix) in the same way they are constructed for $\mathfrak{X}_{\omega_1}$. It follows that the norm is also defined by
$$\begin{aligned}
\|x\| = \sup \left \{ \phi(x)= \sum_{\alpha < \omega_1} \phi(\alpha) x(\alpha) : \phi \in \mathcal{K}_{\omega_1}(\mathbb{C}), \, \phi(x)\in \mathbb R \right\}.\end{aligned}$$
We also have the following implicit formula for the norm: $$\|x\| = \max \left \{ \|x\|_{\infty}, \, \sup \sup_j \frac{1}{m_{2j}}\sum_{i=1}^{n_{2j}} \|E_ix\|, \, E_1< E_2< \cdots <E_{n_{2j}} \right \} \vee$$
$$\sup \left \{ \frac{1}{m_{2j+1}} \left | \sum_{i=1}^{n_{2j+1}} \phi_i(Ex) \right | \, : \, (\phi_i)_{i=1}^{n_{2j+1}} \, \text{ is $n_{2j+1}$- special, $E$ interval} \right \}.$$ It follows from the definition of the norming set that the canonical Hamel basis $(e_{\alpha})_{\alpha<\omega_{1}}$ is a transfinite bimonotone Schauder basis of $\mathfrak{X}_{\omega_1}(\mathbb{C})$. In fact, by Property 1 for every interval $I$ of $\omega_{1}$ the projection $P_{I}$ has norm 1: $$\| P_{I}x \|= \sup_{ f\in \mathcal{K}_{\omega_1}(\mathbb{C})} | fP_{I}x|= \sup_{ f\in \mathcal{K}_{\omega_1}(\mathbb{C})} | P_{I}fx|\leq \|x\|$$ Moreover, we have that the basis $(e_{\alpha})_{\alpha< \omega_1}$ is boundedly complete and shrinking, the proof is the obvious modification to the one for $ \mathfrak{X}_{\omega_1}$ (see ). In consequence $\mathfrak{X}_{\omega_1}(\mathbb{C})$ is reflexive.
\[bal\]$\overline{ \mathcal{K}_{\omega_1}(\mathbb{C}) }^{\omega^*} = \mathit B_{ \mathfrak{X}^*_{\omega_1}(\mathbb{C}) }$.
Recall that the set $\mathcal{K}_{\omega_1}(\mathbb{C})$ is by definition rational convex. We notice that $\overline{ \mathcal{K}_{\omega_1}(\mathbb{C}) }^{\omega^*}$ is actually a convex set. Indeed let $f,g \in \overline{ \mathcal{K}_{\omega_1}(\mathbb{C}) }^{\omega^*}$ and $t\in (0,1)$. Suppose that $f_{n} \overset{\omega^*}{\rightarrow} f$, $g_{n} \overset{\omega^*}{\rightarrow} g$ and $t_{n} \rightarrow t$, where $f_{n}, g_{n} \in \mathcal{K}_{\omega_1}(\mathbb{C})$ and $t_{n} \in {\mathbb}Q\cap (0,1)$ for every $n\in {\mathbb}N$. Then $tf + (1-t)g \in \overline{ \mathcal{K}_{\omega_1}(\mathbb{C}) }^{\omega^*} $ because $$t_{n}f_{n} + (1-t_{n})g_{n} \overset{\omega^*}{\rightarrow} tf + (1-t)g.$$ In the same manner we can prove that $ \mathfrak{X}^*_{\omega_1}(\mathbb{C})$ is balanced i.e., $\lambda \mathfrak{X}^*_{\omega_1}(\mathbb{C}) \subseteq \mathfrak{X}^*_{\omega_1}(\mathbb{C})$ for every $|\lambda|\leq 1$. To prove the Proposition suppose that there exists $f\in \mathit B_{ \mathfrak{X}^*_{\omega_1}(\mathbb{C}) } \setminus \overline{ \mathcal{K}_{\omega_1}(\mathbb{C}) }^{\omega^*}$. It follows by a standard separation argument that there exists $x\in \mathfrak{X}_{\omega_1}(\mathbb{C})$ such that $$|f(x)| > \sup\{ |g(x)| : \, g\in \mathcal{K}_{\omega_1}(\mathbb{C}) \}$$ which is absurd.
Complex structures on $\mathfrak{X}_{\omega_1}(\mathbb{C})$
===========================================================
Let $I\subseteq \omega_{1}$ be an interval of ordinals, we denote by $\mathfrak{X}_{I}(\mathbb{C})$ the closed subspace of $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ generated by $ \{ e_{\alpha }\}_{\alpha \in I}$. For every ordinal $\gamma<\omega_1$ we write $\mathfrak{X}_{\gamma}(\mathbb C)= \mathfrak{X}_{ [0,\gamma) }(\mathbb C)$. Notice that $\mathfrak{X}_{I}(\mathbb{C})$ is a 1-complemented subspace of $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$: the restriction to coordinates in $I$ is a projection of norm 1 onto $\mathfrak{X}_{I}(\mathbb{C})$. We denote this projection by $P_I$ and by $P^{I}=(Id-P_{I})$ the corresponding projection onto the complement space $(Id- P_I)\mathfrak{X}_{\omega_{1}}(\mathbb{C})$, which we denote by $\mathfrak{X}^{I}(\mathbb{C})$.
A transfinite sequence $(y_{\alpha})_{\alpha<\gamma}$ is called a block sequence when $y_{\alpha}<y_{\beta}$ for all $\alpha< \beta <\gamma$. Given a block sequence $(y_{\alpha})_{\alpha<\gamma}$ a *block subsequence* of $(y_{\alpha})_{\alpha<\gamma}$ is a block sequence $(x_{\beta})_{\beta<\xi}$ in the span of $(y_{\alpha})_{\alpha<\gamma}$. A *real block subsequence* of $(y_{\alpha})_{\alpha<\gamma}$ is a block subsequence in the *real* span of $(y_{\alpha})_{\alpha<\gamma}$. A sequence $(x_n)_{n\in {\mathbb}N}$ is a block sequence of $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ when it is a block subsequence of $(e_{\alpha})_{\alpha<\omega_1}$.
\[bt\] Let $T:\mathfrak{X}_{\omega_1}(\mathbb{C})\to\mathfrak{X}_{\omega_1}(\mathbb{C})$ be a complex structure on $\mathfrak{X}_{\omega_1}(\mathbb{C})$, that is, $T$ is a bounded $\mathbb{R}$-linear operator such that $T^2=-Id$. Then there exists a bounded diagonal operator $D_T :\mathfrak{X}_{\omega_1}(\mathbb{C})\to\mathfrak{X}_{\omega_1}(\mathbb{C})$, which is another complex structure, such that $T-D_T$ is strictly singular. Moreover $D_{T}= \sum_{j=1}^{k}\epsilon_{j}iP_{I_{j}}$ for some signs $(\epsilon_{j})_{j=1}^{k}$ and ordinal intervals $I_{1}< I_{2}< \ldots < I_{k}$ whose extremes are limit ordinals and such that $\omega_{1}=\cup_{j=1}^{k} I_{j}$.
The strategy for the proof of Theorem \[bt\] is the same than the one in [@ALT Theorem 5.32] for the real case. However here we want to understand bounded ${\mathbb}R$- linear operators in a complex space. This forces us to justify that the ideas from [@ALT] still work in our context. The result is obtained using the following theorems that we explain with more details in the Appendix.\
\
[**Step I.**]{} There exists a family $\mathfrak F$ of semi normalized block subsequences of $(e_{\alpha})_{\alpha< \omega_{1}}$, called $R.I.S$ (*Rapidly Increasing Sequences*), such that every normalized block sequence $(x_n)_{n\in \mathbb N}$ of $\mathfrak{X}_{\omega_1}({\mathbb}C)$ has a real block subsequence in $\mathfrak F$.\
\
Recall that a Banach space $X$ is hereditarily indecomposable (or H.I) if no (closed) subspace of $X$ can be written as the direct sum of infinite-dimensional subspaces. Equivalently, for any two subspaces $Y$, $Z$ of $X$ and $\epsilon>0$, there exist $y\in Y$, $z\in Z$ such that $\| y\|= \|z\|=1$ and $\|y-z\|<\epsilon$.\
\
[**Step II.**]{} For every normalized block sequence $(x_n)_{n\in {\mathbb}N}$ of ${\mathfrak}X_{\omega_{1}}({\mathbb}C)$, the subspace $\overline{{\mathrm{span \,}}}_{{\mathbb}R} (x_{n})_{n\in {\mathbb}N} $ of $\mathfrak{X}_{\omega_1}({\mathbb}C)$ is a real H.I space.\
\
[**Step III.**]{} Let $(x_{n})_{n\in \mathbb N}$ be a $R.I.S$ and $T:\overline {{\mathrm{span \,}}}_{{\mathbb}C}(x_{n})_{n\in \mathbb N} \to \mathfrak{X}_{\omega_1}(\mathbb{C})$ be a bounded $\mathbb R$-linear operator. Then $\displaystyle\lim_{n \rightarrow \infty}d(Tx_n, \mathbb{C}x_n)=0$.\
\
The proof of Step I, II and III are given in the Appendix.\
\
[**Step IV.**]{} Let $(x_n)_{n\in \mathbb N}$ be a $R.I.S$ and $T: \overline {{\mathrm{span \,}}}_{{\mathbb}C}(x_{n})_{n\in \mathbb N} \to \mathfrak{X}_{\omega_1}(\mathbb{C})$ be a bounded $\mathbb R$-linear operator. Then the sequence $\lambda_{T}:\mathbb{N}\longrightarrow \mathbb{C}$ defined by $d(Tx_n, \mathbb{C}x_n)=\|Tx_n-\lambda_{T}(n)x_n\|$ is convergent.
\[Proof of Step IV\] First we note that the sequence $(\lambda_T(n))_n$ is bounded. Then consider $(\alpha_n)_n$ and $(\beta_n)_n$ two strictly increasing sequences of positive integers and suppose that $\lambda_{T}(\alpha_n)\longrightarrow \lambda_1$ and $\lambda_{T}(\beta_n)\longrightarrow \lambda_2$, when $n\longrightarrow \infty$. Going to a subsequence we can assume that $x_{\alpha_n}<x_{\beta_n} < x_{\alpha _{n+1}}$ for every $n \in \mathbb{N}$.
Fix $\epsilon>0$. Using the result of the Step III, we have that $\displaystyle\lim_{n \rightarrow \infty}\|Tx_{\alpha_n}-\lambda_1x_{\alpha_n}\|=0$. By passing to a subsequence if necessary, assume $$\|Tx_{\alpha_{n}}-\lambda_{1}x_{\alpha_{n}}\|\leq \frac{\epsilon}{2^{n}6}.$$ for every $n\in \mathbb N$. Hence, for every $w= \sum_{n} a_nx_{\alpha_{n}}\in {\mathrm{span \,}}_{\mathbb{R}}(x_{\alpha_{n}})_n$ with $\|w\|\leq 1$ we have
$$\begin{aligned}
\|Tw-\lambda_1w\|&\leq& \displaystyle \sum_{n} |a_n|\|Tx_{\alpha_n}-\lambda_1x_{\alpha_n}\|\\
&\leq&\epsilon/3.\end{aligned}$$
because $(e_{\alpha})_{\alpha< \omega_1}$ is a bimonotone transfinite basis. In the same way, we can assume that for every $w \in {\mathrm{span \,}}_{ \mathbb{R} }(x_{\beta_{m}})_m$ with $\|w\|\leq 1$, $\|Tw-\lambda_2w\|\leq\epsilon/3$. By Step II we have that $\overline{ {\mathrm{span \,}}}_{\mathbb R }(x_{\alpha_{n}})_n\cup (x_{\beta_{n}})_n$ is real-H.I. Then there exist unit vectors $w_1\in {\mathrm{span \,}}_{ \mathbb R }(x_{\alpha_{n}})_n$ and $w_2 \in {\mathrm{span \,}}_{\mathbb R}(x_{\beta_{m}})_m$, such that $\|w_1-w_2\|\leq \frac{\epsilon}{3}\|T\|$. Therefore, $$\begin{aligned}
\|\lambda_1w_1-\lambda_2w_2\| &\leq &\|Tw_1-\lambda_1w_1\|+\|Tw_1-Tw_2\|+\|Tw_2-\lambda_2w_2\| \leq \epsilon.\end{aligned}$$ By other side $$\begin{aligned}
\|\lambda_1w_1-\lambda_2w_2\|\geq \|(\lambda_1-\lambda_2)w_1\|-\|\lambda_2(w_1-w_2)\|= |\lambda_1-\lambda_2|-|\lambda_2|\epsilon.\end{aligned}$$ In consequence, $ |\lambda_1-\lambda_2|\leq (1+|\lambda_2|)\epsilon$. Since $\epsilon$ was arbitrary, it follows that $\lambda_1=\lambda_2$.
Let $T: \mathfrak{X}_{\omega_1}(\mathbb {C} ) \to \mathfrak{X}_{\omega_1}(\mathbb{C}) $ be a bounded $\mathbb R$-linear operator. There is a canonical way to associate a bounded diagonal operator $D_T$ (with respect to the basis $(e_{\gamma})_{\gamma<\omega_1}$) such that $T-D_T$ is strictly singular: Fix $\alpha\in \Lambda(\omega_{1})$ a limit ordinal, and $(x_{n})_{n\in \mathbb N}$, $(y_{n})_{n\in \mathbb N}$ two $R.I.S$ such that $\sup_{n} \max {\mathrm{supp \,}}x_{n} = \sup_{n} \max {\mathrm{supp \,}}$ $y_{n}=\alpha+\omega$. By a property of ${\mathfrak}F$ we can mix the sequences $(x_{n})_{n}$ , $(y_{n})_{n}$ in order to form a new $R.I.S$ $(z_{n})_{n\in \mathbb N}$ such that $z_{2k} \in \{ x_{n}\}_{n\in \mathbb N}$ and $z_{2k-1} \in \{ y_{n}\}_{n\in \mathbb N}$ for all $k\in \mathbb N$ (See Remark \[mr\]). Then it follows from Step IV that the sequences defined by the formulas $d(Tx_n, \mathbb{C}x_n)=\|Tx_n-\lambda_{T}(n)x_n\|$ and $d(Ty_n, \mathbb{C}y_n)=\|Ty_n-\mu(n)y_n\|$ are convergent, and by the mixing argument, they must have the same limit. Hence for each $\alpha\in \Lambda(\omega_{1})$ there exists a unique complex number $\xi_{T}(\alpha)$ such that $$\lim_{n\to \infty} \|Tw_{n} -\xi_{T}(\alpha)w_{n}\|=0$$ for every $(w_{n})_{n\in {\mathbb}N}$ $R.I.S$ in ${\mathfrak}X_{I_{\alpha}}$, where we write $I_{\alpha}$ to denote the ordinal interval $[\alpha, \alpha+\omega)$. We proceed to define a diagonal linear operator $D_{T} $ on the (linear) decomposition of ${\mathrm{span \,}}(e_{\alpha})_{\alpha<\omega_{1}}$ $${\mathrm{span \,}}(e_{\alpha})_{\alpha<\omega_{1}}= \bigoplus_{\alpha\in \Lambda(\omega_{1})} {\mathrm{span \,}}(x_{\beta})_{\beta \in I_{\alpha}}$$ by setting $D_{T}(e_{\beta})=\xi_{T}(\alpha)e_{\beta}$ when $\beta \in I_{\alpha}$. Observe in addition that this sequence $(\xi_{T}(\alpha))_{\alpha\in \Lambda(\omega_{1})}$ is convergent. That is, for every strictly increasing sequence $(\alpha_n)_{n\in \mathbb N}$ in $\Lambda(\omega_{1})$, the corresponding subsequence $(\xi_{T}(\alpha_n))_{n\in \mathbb N}$ is convergent. In fact, for every $n\in \mathbb N$, fix $(y_{n}^{k})_{k\in \mathbb N}$ a $R.I.S$ in $ \mathfrak{X}_{I_{\alpha_{n}}}$. Then we can take $(y_{n}^{k_{n}})_{n\in {\mathbb}N}$ a $R.I.S$ such that $\| Ty_{n}^{k_{n}} - \xi_{T} (\alpha_{n}+ \omega)y_{n}^{k_{n}}\|< 1/n$. It follows by Step IV there exists $\lambda \in {\mathbb}C$ such that $\lim_{n}\| Ty_{n}^{k_{n}} - \lambda y_{n}^{k_{n}}\|=0$. This implies that $\lim_{n} \xi_{T}(\alpha_{n}+\omega)=\lambda$.
In general this operator $D_{T}$ defines a bounded operator on ${\mathfrak}X_{\omega_{1}}({\mathbb}C)$. The proof is the same that in [@ALT Proposition 5.31] and uses that certain James like space of a mixed Tsirelson space is finitely interval representable in every normalized transfinite block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$. For the case of complex structures we have a simpler proof (see Proposition \[dcs\]).
\[opd\] Let $A$ be a subset of ordinals contained in $\omega_1$ and $X= \overline{{\mathrm{span \,}}}_{{\mathbb}C} (e_{\alpha})_{\alpha\in A}$. Let $T:X \to {\mathfrak}X_{\omega_{1}}({\mathbb}C)$ be a bounded ${\mathbb}R$-linear operator. Then $T$ is strictly singular if and only if for every $(y_{n})_{n\in {\mathbb}N}$ $R.I.S$ on $ X $, $\lim_{n} Ty_{n}=0$.
The proposition is trivial when the set $A$ is finite, then we assume that $A$ is infinite. Suppose that $T$ is strictly singular. Let $(y_{n})_{n\in {\mathbb}N}$ be a $R.I.S$ on $X$ such that $ \lim_{n} Ty_{n}\neq 0$, then by Step IV there is $\lambda\neq 0$ with $ \lim_{n}\|Ty_{n} -\lambda y_{n}\|=0$. Take $0<\epsilon<|\lambda|$. By passing to a subsequence if necessary, we assume that $\|( T- \lambda Id)| _{\overline{{\mathrm{span \,}}} (y_{n})_{n} } \|<\epsilon$. This implies that $T|_{\overline{{\mathrm{span \,}}} (y_{n})_{n} }$ is an isomorphism which is a contradiction.
Conversely, suppose that for every $(y_{n})_{n}$ $R.I.S$ on $X$, $\lim_{n} Ty_{n}=0$. Assume that $T$ is not strictly singular. Then there is a block sequence subspace $Y= \overline{{\mathrm{span \,}}} (y_{n})_{n\in \mathbb N}$ of $ X$ such that $T$ restricted to $Y$ is an isomorphism. By Step I we can assume that the sequence $(y_{n})_{n}$ is already a $R.I.S$ on $X$. Then $\inf_{n} \|Ty_{n}\|>0$. And we obtain a contradiction.
Given $Y \subseteq {\mathfrak}X_{\omega_{1}}({\mathbb}C)$ we denote by $\iota_Y$ the canonical inclusion of $Y$ into $ {\mathfrak}X_{\omega_{1}}({\mathbb}C)$.
\[dia\]Let $\alpha \in \Lambda(\omega_{1})$ and $T: {\mathfrak}X_{I_{\alpha}}({\mathbb}C) \to {\mathfrak}X_{\omega_{1}}({\mathbb}C)$ be a bounded ${\mathbb}R$-linear operator. Then there exists (unique) $\xi_{T}(\alpha) \in {\mathbb}C$ such that $T - \xi_{T}(\alpha)\iota_{{\mathfrak}X_{I_{\alpha}} ({\mathbb}C)}$ is strictly singular.
Let $\xi_{T}(\alpha)$ be the (unique) complex number such that $\lim \| Ty_{n}- \xi_{T}(\alpha)y_{n}\|=0$ for every $(y_{n})_{n}$ $R.I.S$ on ${\mathfrak}X_{I_{\alpha}}({\mathbb}C)$. Then by the previous Proposition $T-\xi_{T}(\alpha)\iota_{{\mathfrak}X_{I_{\alpha}} ({\mathbb}C)}$ is strictly singular.
Let $\alpha\in \Lambda(\omega_{1})$ and $R: {\mathfrak}{X}_{I_{\alpha}}({\mathbb}C) \to {\mathfrak}{X}^{I_{\alpha}}({\mathbb}C)$ be a bounded ${\mathbb}R$-linear operator. Then $R$ is strictly singular.
By the previous result, $\iota_{{\mathfrak}X^{I_{\alpha}}({\mathbb}C)}R= \lambda_{\alpha}\iota_{{\mathfrak}X_{I_{\alpha}} ({\mathbb}C)}+ S$ with $S$ strictly singular. Then projecting by $P^{I_{\alpha}}$ we obtain $R= P^{I_{\alpha}} \circ \iota_{{\mathfrak}X^{I_{\alpha}}({\mathbb}C)}R = P^{I_{\alpha}}S $ which is strictly singular.
\[dcs\] Let $T$ be a complex structure on $\mathfrak{X}_{\omega_1}(\mathbb{C})$. Then the linear operator $D_{T}$ is a bounded complex structure.
Let $T$ be a complex structure on $\mathfrak{X}_{\omega_1}(\mathbb{C})$ and $D_{T}$ the corresponding diagonal operator defined above. Fix $\alpha\in \Lambda (\omega_1)$. We shall prove that $\xi_{T}(\alpha)^{2}=-1$. In fact, $$\begin{aligned}
T\circ \iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} &=& P_{I_{\alpha}}T\circ \iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} + P^{I_{\alpha}}T\circ \iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} \\
&=& P_{I_{\alpha}}T\circ \iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} + S_{1} \end{aligned}$$ where $S_{1} $ is strictly singular. This implies $P_{I_{\alpha}}T\circ\iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)}= \xi_{T}(\alpha)Id_{{\mathfrak}X_{I_{\alpha}} ({\mathbb}C)} + S_{2}: {\mathfrak}X_{I_{\alpha}}({\mathbb}C) \to {\mathfrak}X_{I_{\alpha}}({\mathbb}C)$ with $S_{2}$ strictly singular. Now computing: $$\begin{aligned}
(P_{I_{\alpha}}T\iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} )\circ (P_{I_{\alpha}}T \iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} )&=& P_{I_{\alpha}}T\circ P_{I_{\alpha}}T\iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} \\
&=& P_{I_{\alpha}}T\circ (Id- P^{I_{\alpha}}) T\iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} \\
&=& P_{I_{\alpha}}T^{2}\iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} - P_{I_{\alpha}}T \underline{P^{I_{\alpha}}T\iota_{ {\mathfrak}X_{I_{\alpha}}({\mathbb}C)} }\\
&=& -Id_{{\mathfrak}X_{I_{\alpha}}({\mathbb}C) } + S_{3}\end{aligned}$$ where $S_{3}$ is strictly singular because the underlined operator is strictly singular. Hence we have that $(\xi_{T}(\alpha)^{2} +1)Id_{ {\mathfrak}X_{I_{\alpha}} }$ is strictly singular.Which allow us to conclude that $\xi_{T}(\alpha)^{2}=-1$. The continuity of $D_T$ is then guaranteed by the convergence of $(\xi_{T}(\alpha))_{\alpha\in \Lambda(\omega_1)}$. In deed, we have that there exist ordinal intervals $I_{1}< I_{2}< \ldots < I_{k}$ with $\omega_{1}=\cup_{j=1}^{k} I_{j}$ and such that $D_{T}= \sum_{j=1}^{k}\epsilon_{j}iP_{I_{j}}$ for some signs $(\epsilon_{j})_{j=1}^{n}$.
\[hyp\] More generally, the proof of Proposition \[dcs\] actually shows that if $T$ is a $\mathbb R$-linear bounded operator on $\mathfrak{X}_{\omega_1}(\mathbb{C})$ such that $T^2+Id=S$ for some $S$ strictly singular, then $D_T$ is bounded and $D_T^2=-Id$.
Now we can conclude the proof of Theorem \[bt\].
Let $T: \mathfrak{X}_{\omega_1}(\mathbb {C} ) \to \mathfrak{X}_{\omega_1}(\mathbb{C}) $ be a bounded $\mathbb R$-linear operator which is a complex structure and $D_{T}$ be the diagonal bounded operator associated to it. It only remains to prove that $T-D_{T}$ is strictly singular. And this follows directly from Proposition \[opd\], because by definition $\lim_{n} (T-D_{T})y_{n}=0$ for every $(y_{n})_{n}$ $R.I.S$ on $\mathfrak{X}_{\omega_1}(\mathbb {C} )$.
We come back to the study of the complex structures on $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$. Denote by $\mathfrak{D}$ the family of complex structures $D_T$ on $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ as in Theorem \[bt\], i. e., $D_{T}= \sum_{j=1}^{k}\epsilon_{j}iP_{I_{j}} $ where $(\epsilon_{j})_{j=1}^{k}$ are signs and $I_{1}< I_{2}< \ldots < I_{k}$ are ordinal intervals whose extremes are limit ordinals and such that $\omega_{1}=\cup_{j=1}^{k} I_{j}$. Notice that $\mathfrak{D}$ has cardinality $\omega_{1}$.
Recall that two spaces are said to be incomparable if neither of them embed into the other.
The space $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ has $\omega_{1}$ many complex structures up to isomorphism. Moreover any two non-isomorphic complex structures are incomparable.
Let $J$ be a complex structure on $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$. By Theorem \[bt\] we have that $J$ is equivalent to one of the complex structures of the family $\mathfrak{D}$.
To complete the proof it is enough to show that given two different elements of $\mathfrak{D}$ they define non equivalent complex structures. Moreover, we prove that one structure does not embed into the other. Fix $ J \neq K \in \mathfrak{D}$. Then there exists an ordinal interval $I_{\alpha}=[\alpha,\alpha+\omega)$ such that, without loss of generality, $J|_{\mathfrak{X}_{I_{\alpha}}}= i Id|_{\mathfrak{X}_{I_{\alpha}}}$ and $K|_{\mathfrak{X}_{I_{\alpha}}}= -i Id|_{\mathfrak{X}_{I_{\alpha}}}$. Suppose that there exists $T: \mathfrak{X}_{\omega_{1}}(\mathbb{C})^{J} \rightarrow \mathfrak{X}_{\omega_{1}}(\mathbb{C})^{K}$ an isomorphic embedding. Then T is in particular a ${\mathbb}R$-linear operator such that $TJ = KT$. We write using Corollary \[dia\], $T|_{\mathfrak{X}_{I_{\alpha}}}= \xi_{T}(\alpha)\iota_{{\mathfrak}X_{I_{\alpha}} ({\mathbb}C)} +S$ with $S$ strictly singular. Then $\xi_{T}(\alpha) J|_{\mathfrak{X}_{I_{\alpha}}} - \xi_{T}(\alpha) K|_{\mathfrak{X}_{I_{\alpha}}}=S_1$ where $S_1$ is strictly singular. Im particular for each $x\in \mathfrak{X}_{I_{\alpha}}$, $S_1x= 2\xi_{T}(\alpha)i x$. It follows from the fact that $\mathfrak{X}_{I_{\alpha}}$ is infinite dimensional that $\xi_{T}(\alpha)=0$. Hence $T|_{\mathfrak{X}_{I_{\alpha}}}= S$ but this a contradiction because $T$ is an isomorphic embedding.
The next corollary offers uncountably many examples of Banach spaces with exactly countably many complex structures.
The space $\mathfrak{X}_{\gamma}(\mathbb{C})$ has $\omega$ complex structures up to isomorphism for every limit ordinal $\omega^2 \leq \gamma < \omega_1$.
Let $J$ be a complex structure on $\mathfrak{X}_{\gamma}(\mathbb{C}) $. We extend $J$ to a complex structure defined in the whole space $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ by setting $T= JP_{I} + iP^{I}$, where $I=[0, \gamma)$. It follows that $T= D_{T} +S$ for an strictly singular operator $S$ and a diagonal operator $D_{T}$ like in Theorem \[bt\]. Notice that $D_{T}x=ix$ for every $x\in \mathfrak{X}^{I}$, otherwise there would be a limit ordinal $\alpha$ such that $S|_{\mathfrak X_{I_{\alpha}}}= 2iId|_{\mathfrak X_{I_{\alpha}}}$. Hence $JP_{I}= D_{T}P_{I} + S$. Which implies that $J$ has the form $J= \sum_{j=1}^{k}\epsilon_{j}iP_{I_{j}} + S_{1}$ where $S_{1}$ is strictly singular on $\mathfrak{X}_{\omega_1}(\mathbb{C})$, $(\epsilon_{j})_{j=1}^{k}$ are signs and $I_{1}< I_{2}< \ldots < I_{k}$ are ordinal intervals whose extremes are limit ordinals and such that $\gamma=\cup_{j=1}^{k} I_{j}$. Now the rest of the proof is identical to the proof of the previous corollary. In particular, all the non-isomorphic complex structures on $\mathfrak{X}_{\gamma}(\mathbb{C})$ are incomparable.
We also have, using the same proof of the previous corollary, that for every increasing sequence of limit ordinals $A=(\alpha_n)_n$, the space ${\mathfrak}X_A= \bigoplus_{n} {\mathfrak}X_{I_{\alpha_n}}({\mathbb}C)$, where $I_{\alpha_n}=[\alpha_n, \alpha_n+\omega)$, has exactly infinite countably many different complex structures. Hence there exists a family, with the cardinality of the continuum, of Banach spaces such that every space in it has exactly $\omega$ complex structures.
Question and Observations
=========================
Is easy to check that subspaces of even codimension of a real Banach space with complex structure also admit complex structure. An interesting property of $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ is that any of its real hyperplanes (and thus every real subspace of odd codimension) do not admit complex structure.
The real hyperplanes of $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ do not admit complex structure.
By the results of Ferenczi and E. Galego [@FG2 Proposition 13] it is sufficient to prove that the ideal of all ${\mathbb}R$-linear strictly singular operators on $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ has the lifting property, that is, for any ${\mathbb}R$-linear isomorphism on $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ such that $T^2+Id$ is strictly singular, there exists a strictly singular operator $S$ such that $(T-S)^2=-Id$. The proof now follows easily from the Remark \[hyp\].
We now pass to present some open questions related to the results exposed in this paper. The first question is about a remark mentioned in the introduction and the Ferenczi’s space $X({\mathbb}C)$ with exactly two complex structures.
For every $1\leq p <\infty$. How many complex structures has $\ell_p(X({\mathbb}C))$?
Clearly the space $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ is non separable. Hence a natural question is:
Does there exist a separable Banach space with exactly $\omega_1$ complex structures?
Does there exist for every infinite cardinal $\kappa$ a Banach space with $\kappa$-many non-equivalent complex structures?
One open problem in the theory of complex structure is to know if the existence of more regularity in the space guarantees that it admits unique complex structure.
Does there exist a real Banach space with unconditional basis admitting more than one complex structure?
The question is still interesting in spaces with even more regularity than an unconditional basis. For example, when a real Banach space $X$ has a symmetric basis. In this case, $X$ admits at least one complex structure, because it is isomorphic to its square.
Does every real Banach space with symmetric basis have unique complex structure?
Question 5 is is strongly related with the well-known open problem: *Is every Banach space $X$, with a symmetric basis, primary?*. In fact, a positive answer to this problem implies a positive solution for Question 5. We just have to note that the complexification of a space with symmetric basis has a symmetric basis, and recall Kalton’s result: a Banach space such that its complexification is a primary space has unique complex structure.
Appendix
========
The purpose of this section is to give a proof for the results in the Step I, II and III. Several proofs are very similar to the corresponding ones in [@ALT]. In order to make this paper as self contained as possible, we reproduce them in detail.
First we clarify the definition of the norming set by defining what being a special sequence means. All the definitions we present in this part are the corresponding translation of [@ALT] for the complex case.
Coding and Special sequences
----------------------------
Recall that $[\omega_1]^2= \{ (\alpha, \beta)\in \omega_1^2 \, : \, \alpha< \beta\}$.
A function $\varrho:[\omega_1]^2 \rightarrow \omega$ such that
1. $\varrho (\alpha, \gamma) \leq \max\{\varrho(\alpha, \beta), \varrho(\beta, \gamma) \}$ for all $\alpha< \beta< \gamma<\omega_1$.
2. $\varrho (\alpha, \beta) \leq \max\{\varrho(\alpha, \gamma), \varrho(\beta, \gamma) \}$ for all $\alpha< \beta< \gamma<\omega_1$.
3. The set $\{ \alpha<\beta : \varrho(\alpha,\beta)\leq n\}$ is finite for all $\beta<\omega_1$ and $n\in \mathbb N$
is called a $\varrho$-function.
The existence of $\varrho$-functions is due to Todorcevic [@T]. Let us fix a $\varrho$-function $\varrho:[\omega_1]^2 \rightarrow \omega$ and all the following work relies on that particular choice of $\varrho$.
Let $F$ be a finite subset of $\omega_1$ and $p\in \mathbb N$ , we write $$\rho_F=\rho_{\varrho}(F)= \max_{\alpha, \beta \in F}\varrho(\alpha, \beta).$$ $$\overline{F}^p =\{ \alpha\leq \max F: \text{ there is $\beta \in F$ such that } \alpha\leq \beta \text{ and } \,\varrho(\alpha, \beta)\leq p\}$$
**$\sigma_{\varrho}$-coding and the special sequences**
We denote by $\mathbb Q_s(\omega_1, \mathbb C)$ the set of finite sequences $(\phi_1, w_1, p_1, \ldots , \phi_d, w_d, p_d)$ such that
1. For all $i\leq d$, $\phi_i\in c_{00}(\omega_1, \mathbb C)$ and for all $\alpha< \omega_1$ the real and the imaginary part of $\phi(\alpha)$ are rationals.
2. $(w_i)_{i=1}^d, (p_i)_{i=1}^d \in \mathbb N^d$ are strictly increasing sequences.
3. $p_i\geq \rho_{( \cup_{k=1}^i {\mathrm{supp \,}}\phi_k )}$ for every $i\leq d$.
Let $\mathbb Q_s(\mathbb C)$ be the set of finite sequences $(\phi_1, w_1, p_1, \phi_2, w_2, p_2, \ldots , \phi_d,$ $ w_d, p_d)$ satisfying properties (1), (2) above and for every $i\leq d$, $\phi_i \in c_{00}(\omega, \mathbb C)$. Then $\mathbb Q_s(\mathbb C)$ is a countable set while $\mathbb Q_s(\omega_1, \mathbb C)$ has cardinality $\omega_1$. Fix a one to one function $\sigma: \mathbb Q_s(\mathbb C) \rightarrow \{ 2j: j \text{ is odd}\}$ such that
$$\sigma (\phi_1, w_1, p_1, \ldots , \phi_d, w_d, p_d)> \max \{ p_d^2, \frac{1}{\epsilon^2}, \max {\mathrm{supp \,}}\phi_d\}$$ where $\epsilon = \min \{ | \phi_k(e_{\alpha})| : \alpha \in {\mathrm{supp \,}}\phi_k, \, k=1, \ldots, d\}$. Given a finite subset $F$ of $\omega_1$, we denote by $\pi_F: \{ 1, 2, \ldots, \#F\} \rightarrow F$ the natural order preserving map, i.e. $\pi_F$ is the increasing numeration of $F$.
Given $\Phi =(\phi_1, w_1, p_1, \ldots , \phi_d, w_d, p_d)\in \mathbb Q_s(\mathbb C)$, we set $$G_{\Phi}= \overline{\cup_{i=1}^d {\mathrm{supp \,}}\phi_i}^{p_d}.$$ Consider the family $\pi_{G_{\Phi}}(\Phi)= (\pi_G(\phi_1), w_1, p_1, \pi_G(\phi_2), w_2, p_2, \ldots , \pi_G(\phi_d),$ $ w_d, p_d)$ where
$$\pi_G(\phi_k)(n) = \left\{
\begin{array}{ll}
\displaystyle \phi_k(\pi_{G_{\Phi}} (n)), \quad \text{if} \, \, n\in G_{\Phi} \\ \\
\displaystyle 0, \quad \text{otherwise.} \, \,
\end{array}
\right.$$ Finally $\sigma_p: \mathbb Q_s(\omega_1, \mathbb C) \rightarrow \{ 2j: \text{ $j$ odd}\}$ is defined by $\sigma_p(\Phi)= \sigma(\pi_G(\Phi))$.
\[tp1\] A sequence $\Phi= (\phi_1, \phi_2, \ldots, \phi_{n_{2j+1}})$ of functionals of $ \mathcal{K}_{\omega_1}(\mathbb{C})$ is called a $2j+1$ special sequence if
(SS 1.) ${\mathrm{supp \,}}\phi_1 < {\mathrm{supp \,}}\phi_2< \cdots< {\mathrm{supp \,}}\phi_{n_{2j+1}} $. For each $k\leq n_{2j+1}$, $\phi_k$ is of type $I$, $w(\phi_k)=m_{2j_k}$ with $j_1$ even and $m_{2j_1}> n_{2j+1}^2$.
(SS 2.) There exists a strictly increasing sequence $(p_1^{\Phi}, p_2^{\Phi}, \ldots, p_{n_{2j+1}-1}^{\Phi} )$ of naturals numbers such that for all $1\leq i\leq n_{2j+1}-1$ we have that $w(\phi_{i+1})= m_{\sigma_{\varrho}(\Phi_i)}$ where $$\Phi_i= (\phi_1, w(\phi_1), p_1^{\Phi}, \phi_2, w(\phi_2), p_2^{\Phi}, \ldots, \phi_i, w(\phi_i), p_i^{\Phi})$$
Special sequences in separable examples with one to one codings are in general simpler: they are of the form $(\phi_{1}, w(\phi_{1}), \ldots , \phi_{k}, w(\phi_{k}))$. Their main feature is that if $(\phi_{1}, w(\phi_{1}), \ldots , \phi_{k}, w(\phi_{k}))$ and $(\psi_{1}, w(\psi_{1}), \ldots , \psi_{l}, w(\psi_{l}))$ are two of them, there exists $i_{o}\leq \min \{ k,l\}$ with the property that
$$\begin{aligned}
\label{ss2}
(\phi_{i}, w(\phi_{i}))= (\psi_{i}, w(\psi_{i})) \, \text{ for all} \, i\leq i_{0}\\
\{ w(\phi_{i}) \, : \, i_{0}\leq i \leq k\} \cap \{ w(\psi_{i}) \, : \, i_{0}\leq i \leq l\}= \emptyset\end{aligned}$$
In non-separable spaces, one to one codings are obviously impossible, and (1), (2) are no longer true. Fortunately, there is a similar feature to (1), (2) called the tree-like interference of a pair of special sequences (See [@ALT Lemma 2.9]): Let $\Phi= (\phi_{1}, \ldots , \phi_{n_{2j+1}})$ and $\Psi= (\psi_{1}, \ldots , \psi_{n_{2j+1}})$ be two $2j+1$-special sequences, then there exist two numbers $0\leq \kappa_{\Phi, \Psi} \leq \lambda_{\Phi, \Psi} \leq n_{2j+1}$ such that the following conditions hold:
- For all $i\leq \lambda_{\Phi, \Psi}$, $w(\phi_{i})= w(\psi_{i})$ and $p_{i}^{\Phi}= p_{i}^{\Psi}$.
- For all $i< \kappa_{\Phi, \Psi}$, $\phi_{i}=\psi_{i}$.
- For all $\kappa_{\Phi, \Psi}< i < \lambda_{\Phi, \Psi}$ $${\mathrm{supp \,}}\phi_{i} \cap \overline{ {\mathrm{supp \,}}\psi_{1} \cup \cdots \cup {\mathrm{supp \,}}\psi_{\lambda_{\Phi, \Psi} -1}}^{p_{\lambda_{\Phi, \Psi}}-1}= \emptyset$$$$\text{and} \, \, {\mathrm{supp \,}}\psi_{i} \cap \overline{ {\mathrm{supp \,}}\phi_{1} \cup \cdots \cup {\mathrm{supp \,}}\phi_{\lambda_{\Phi, \Psi}-1} }^{p_{\lambda_{\Phi, \Psi}}-1}= \emptyset$$
- $\{ w(\phi_{i}) \, : \, \lambda_{\Phi, \Psi}< i \leq n_{2j+1} \} \cap \{ w(\psi_{i}) \, : \, i\leq n_{2j+1}\}=\emptyset$ and $\{ w(\psi_{i}) \, : \, \lambda_{\Phi, \Psi}< i \leq n_{2j+1}\} \cap \{ w(\phi_{i}) \, : \, i\leq n_{2j+1}\}= \emptyset$.
Rapidly increasing sequences ($R.I.S$)
--------------------------------------
For the proof of Step I we shall construct a family of block sequences on $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$ commonly called *rapidly increasing sequences* ($R.I.S$). These sequences are very useful because one has good estimates of upper bounds on $|f(x)|$ for $f\in {\mathcal}K_{\omega_{1}}({\mathbb}C)$ and $x$ averages of $R.I.S$.
For the construction of the family ${\mathfrak}F$ the only difference from the general theory in [@ALT] is that our interest now is to study bounded ${\mathbb}R$-linear operators on the complex space $\mathfrak{X}_{\omega_{1}}(\mathbb{C})$. Hence, all the construction of $R.I.S$ in a particular block sequence $(x_n)_{n\in {\mathbb}N}$ must be on its *real* linear span. We point out here that there are no problems with this, because all the combinations of the vectors $(x_{n})_{n\in {\mathbb}N}$ to obtain $R.I.S$ use rational scalars.
We say that a block sequence $(x_k)_k$ of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ is a $(C,\epsilon)-R.I.S$, $C, \epsilon>0$, when there exists a strictly increasing sequence of natural numbers $(j_k)_k$ such that:
- $\|x_k\|\leq C$;
- $| \mbox{supp} \; x_k|\leq m_{j_{k+1}}\epsilon$;
- For all the functionals $\phi$ of $\mathcal{K}_{\omega_1}(\mathbb{C})$ of type $I$, with $\omega(\phi)<m_{j_k}$, $|\phi(x_k)|\leq \displaystyle \frac{C}{\omega(\phi)}$.
The following remark is immediately consequence of this definition.
Let $\epsilon'< \epsilon$. Every $(C, \epsilon)$-R.I.S has a subsequence which is a $(C, \epsilon')$-R.I.S. And for every strictly increasing sequence of ordinals $(\alpha_n)_n$ and every $\epsilon>0$, $(e_{\alpha_n})_n$ is a $(1,\epsilon)$-R.I.S.
\[mr\] Let $(x_{n})_{n}$ and $(y_{n})_{n}$ be two $(C,\epsilon)$- R.I.S such that $\sup_{n} \max $ ${\mathrm{supp \,}}x_{n} = \sup_{n} \max {\mathrm{supp \,}}y_{n} $. Then there exists $(z_{n})_{n}$ a $(C,\epsilon)$- R.I.S. such that $z_{2n-1}\in \{ x_{k}\}_{k\in {\mathbb}N}$ and $z_{2n}\in \{y_{k}\}_{k\in {\mathbb}N}$.
Suppose that $(t_{k})_{k}$ and $(s_{k})_{k}$ are increasing sequences of positive integers satisfying the definition of R.I.S for $(x_{k})_{k}$ and $(y_{k})_{k}$ respectively. We construct $(z_{k})_{k}$ as follows. Let $z_{1}= x_{1}$ and $j_{1}= t_{1}$. Pick $s_{k_{1}}$ such that $ x_{1}< y_{s_{k_{1}}} $ and $t_{2}<s_{k_{1}}$. Then we define $j_{2}= s_{k_{1}}$ and $z_{2}= y_{s_{k_{1}}}$. Notice that
- $\|z_1\|\leq C$;
- $| \mbox{supp} \; z_1|\leq m_{t_{2}}\epsilon \leq m_{s_{k_{1}}}\epsilon=m_{j_{2}}\epsilon$;
- For all the functionals $\phi$ of $\mathcal{K}_{\omega_1}(\mathbb{C})$ of type $I$, with $\omega(\phi)<m_{j_1}$, $|\phi(z_1)|\leq \displaystyle \frac{C}{\omega(\phi)}$.
Continuing with this process we obtain the desired sequence.
\[w3\] Let $(x_k)_k$ be a normalized block sequence of $\mathfrak{X}_{\omega_1}$ and $\epsilon >0$. Then there exists a normalized block subsequence $(y_n)_n$ in ${\mathrm{span \,}}_{\mathbb R} \{ x_k\}$ which is a $(3,\epsilon)-R.I.S$.
For the proof of Theorem \[w3\] we first construct a simpler type of sequence.
Let $X$ be a Banach space, $C\geq 1$ and $k \in \mathbb{N}$. A normalized vector $y$ is called a $C-\ell^{k}_{1}$-average of $X$, when there exist a block sequence $(x_1,...,x_k)$ such that
- $y=(x_1+\ldots+x_k)/k$;
- $\|x_i\|\leq C$, for all $i=1,...,k$
In the next result we want to emphasize that this special type of sequence are really constructed on the real structure of the space ${\mathfrak}X_{\omega_{1}}({\mathbb}C)$.
\[w1\]For every normalized block sequence $(x_n)$ of $\mathfrak{X}_{\omega_1}(\mathbb{C})$, and every integer $k$, there exist $z_1<\ldots<z_k$ in ${\mathrm{span \,}}_{\mathbb{R}}(x_n)$, such that $\ (z_1+\ldots+z_k)/k$ is a $2-\ell^{k}_{1}$-average.
The proof is standard. Suppose that the result is false. Let $j$ and $n$ be natural numbers with $$\begin{aligned}
2^{n}>m_{2j}\\
n_{2j}>k^n.\end{aligned}$$
Let $N=k^n$ and $x=\displaystyle \sum^{N}_{i=1}x_i$. For each $1\leq i\leq n$ and every $1\leq j \leq k^{n-i}$, we define, $$\begin{aligned}
x(i,j)=\displaystyle \sum^{jk^i}_{t=(j-1)k^i+1}x_t.
\end{aligned}$$
Hence, $x(0,j)=x_j$ and $x(n,1)=x$.\
It is proved by induction on $i$ that $\|x(i,j)\|\leq 2^{-i}k^i$, for all $i, j$. In particular, $\|x\|=\|x(n,1)\|\leq 2^{-n}k^n= 2^{-n}N$. Then by *Property 1.* of definition in the norming set $$\begin{aligned}
\|x\|\geq \displaystyle \frac{1}{m_{2j}}\sum^{n_{2j}}_{t=1}\|x_t\|=\frac{n_{2j}}{m_{2j}}>\frac{N}{m_{2j}}. \end{aligned}$$ Hence, $$\begin{aligned}
2^{-n}N&>&\frac{N}{m_{2j}}\\
m_{2j}&>&2^n,\end{aligned}$$ which is is a contradiction.
Finally, for the construction of $R.I.S$ we observe these simple facts ([@ALT Remark 4.10])
- If $y$ is a $C-\ell^{n_j}_{1}$-average of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ and $\phi \in \mathcal{K}_{\omega_1}(\mathbb{C})$ has weight $\omega(\phi)<m_j$, then $|\phi(y)|\leq \frac{3C}{2\omega(\phi)}$;
- Let $(x_k)_k$ be a block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ such that there exists a strictly increasing sequence of positive integers $(j_k)_k$ and $\epsilon>0$ satisfying:
- Each $x_k$ is a $2-\ell^{n_{j_k}}_{1}$-average;
- $|supp \; x_k|< \epsilon m_{j_{k+1}}$.
Then $(x_k)_k$ is a $(3,\epsilon)-R.I.S$.
Basic Inequality
----------------
To prove Step II and III we need a crucial result called *the basic inequality* which is very important to find good estimations for the norm of certain combinations of $R.I.S$ in ${\mathfrak}X_{\omega_{1}}({\mathbb}C)$. First we need to introduce the *mixed Tsirelson spaces*.
The mixed Tsirelson space $T [(m^{-1}_{j}, n_j)_j]$ is defined by considering the completion of $c_{00}(\omega, \mathbb{C})$ under the norm $\|. \|_{0}$ given by the following implicit formula $$\begin{aligned}
\|x\|_{0}=\max \left \{ \|x\|_{\infty}, \, \, \displaystyle \sup_{j} \sup \frac{1}{m_j}\sum^{n_j}_{i=1}\|E_ix\|_{0}\right \},\end{aligned}$$ The supremum inside the formula is taken over all the sequences $E_1<\ldots<E_{n_j}$ of subsets of $\omega$. Notice that in this space the canonical Hamel basis $(e_{n})_{n<\omega}$ of $c_{00}(\omega, \mathbb{C})$ is 1-subsymmetric and 1-unconditional basis.
We can give an alternative definition for the norm of $ T[(m^{-1}_{j}, n_j)_j]$ by defining the following norming set. Let $W[(m_j^{-1}, n_j)] \subseteq c_{00}(\omega, \mathbb{C})$ the minimal set of $c_{00}(\omega, \mathbb{C})$ satisfying the following properties:
1. For every $\alpha<\omega$, $e^{*}_{\alpha}\in W[(m_j^{-1}, n_j)]$. If $\phi \in W[(m_j^{-1}, n_j)] $ and $\theta=\lambda+ i\mu$ is a complex number with $\lambda$ and $\mu$ rationals and $|\theta|\leq 1$, $\theta \phi \in W[(m_j^{-1}, n_j)] $;
2. For every $\phi\in W[(m_j^{-1}, n_j)] $ and $E\subseteq \omega$, $E\phi \in W[(m_j^{-1}, n_j)] $;
3. For every $j\in \mathbb{N}$ and $\phi_1<\ldots<\phi_{n_j}$ in $W[(m_j^{-1}, n_j)] $, $(1/m_{j})\sum^{n_j}_{i=1}\phi_i\in W[(m_j^{-1}, n_j)] $;
4. $W[(m_j^{-1}, n_j)]$ is closed under convex rationals combinations.
Let $(x_n)_n$ be a $(C,\epsilon)-R.I.S$ of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ and $(b_k)_k\in c_{00}(\mathbb{C},\mathbb{N})$. Suppose that for some $j_0 \in \mathbb{N}$ we have that for every $f \in \mathcal{K}_{\omega_1}(\mathbb{C})$ with weight $w(f)=m_{j_0}$ and for every interval $E$ of $\omega_{1}$, $$\begin{aligned}
\left|f\left(\sum_{k \in E}b_kx_k \right)\right|\leq C\left(\displaystyle \max_{k\in E}|b_k|+\epsilon\sum_{k \in E}|b_k |\right).
\end{aligned}$$ Then for every $f\in \mathcal{K}_{\omega_1}(\mathbb{C})$ of type $I$, there exist $g_1, g_2 \in c_{00}(\mathbb{C},\mathbb{N})$ such that $$\begin{aligned}
\left|f\left(\sum_{k \in E}b_kx_k \right)\right|\leq C(g_1+g_2)\left(\displaystyle \sum_{k \in E}|b_k |e_k\right),
\end{aligned}$$ where $g_1=h_1$ ou $g_1=e^{*}_{t}+h_1$, $t \notin supp\, h_1$, e $h_1 \in W[(m_j^{-1}, 4n_j)] $ such that $h_1 \in conv_{\mathbb{Q}}\left\{h\in W[(m_j^{-1}, 4n_j)]: w(f)=w(f)\right\}$ and $m_j$ does not appear as a weight of a node in the tree analysis of $h_{1}$, and $\|g_2\|_{\infty}\leq \epsilon$.
See [@ALT Section 8.2]
The following results are consequences of the basic inequality. The proof of this properties in our case is the same as in [@ALT].
\[cbi\]Let $f \in \mathcal{K}_{\omega_1}(\mathbb{C})$ or $f\in W[(m_j^{-1}, 4n_j)]$ of type $I$. Consider $j \in \mathbb{N}$ and $l\in \left[\displaystyle \frac{n_j}{m_j},n_j\right]$. Then for every set $F\subseteq c_{00}(\omega_{1}, {\mathbb}C)$ of cardinality $l$,
$$\left|f\left(\frac{1}{l}\sum_{\alpha \in F}e_\alpha \right)\right|\leq \left\{
\begin{array}{ll}
\displaystyle \frac{2}{w(f)m_j}, \quad \text{if} \, \, w(f)<m_j, \\ \\
\displaystyle \frac{1}{w(f)} \quad \text{if} \, \, w(f)\geq m_j.
\end{array}
\right.$$ If the tree analysis of $f$ does not contain nodes of weight $m_j$, then $$\left|f\left(\frac{1}{l}\sum_{\alpha \in F}e_\alpha \right)\right|\leq \frac{2}{m_j^3}$$
[@ALT Proposition 4.6]
\[db\]Let $(x_k)_k$ be a $(C,\epsilon)-R.I.S$ of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ with $\epsilon \leq \displaystyle \frac{1}{n_j}$, $l\in \left[\displaystyle \frac{n_j}{m_j},n_j\right]$ and let $f \in \mathcal{K}_{\omega_1}(\mathbb{C})$ of type $I$. Then,\
$\left|f\left(\frac{1}{l}\sum^{l}_{k=1}x_k\right)\right|\leq \left\{
\begin{array}{ll}
\displaystyle \frac{3C}{w(f)m_j}, \quad \text{if} \, \, w(f)<m_j \\ \\
\displaystyle \frac{C}{w(f)} + \frac{2C}{n_j}, \quad \text{if} \, \, w(f)\geq m_j.
\end{array}
\right.
$\
Consequentely, if $(x_k)^{l}_{k=1}$ is a normalized $(C,\epsilon)-R.I.S$ with $\epsilon\displaystyle \leq \frac{1}{n_{2j}}$, $l \in \left[\displaystyle \frac{n_{2j}}{m_{2j}},n_{2j}\right]$, then $$\begin{aligned}
\frac{1}{m_{2j}}\leq \left \Vert \displaystyle \frac{1}{l}\sum^{l}_{k=1}x_k\right \Vert \leq \frac{2C}{m_{2j}}.\end{aligned}$$
Let $(x_k)_k$ be a $(C,\epsilon)-R.I.S $ and take $b=\left(\frac{1}{l},\ldots,\frac{1}{l},0,0,\ldots \right)\in c_{00}(\mathbb{N}, \mathbb{C})$. It follows from the basic inequality that for every $f\in \mathcal{K}_{\omega_1}(\mathbb{C})$ of type $I$, there exist $h_1\in W[(m_j^{-1}, 4n_j)]$ with $\omega(h_1)=\omega(f)$, $t\in \mathbb{N}$ and $g_2\in c_{00}(\mathbb{N})$ with $\|g\|_\infty\leq\epsilon$ such that $$\begin{aligned}
\left|f\left(\displaystyle\frac{1}{l}\sum^{l}_{k=1}x_k \right)\right|&\leq& C\left(e^{*}_{t}+h_1+g_2\right)\left(\frac{1}{l}\sum^{l}_{k=1} e_k \right).\end{aligned}$$ moreover, $$\begin{aligned}
\left| g_{2} \left(\displaystyle\frac{1}{l}\sum^{l}_{k=1}e_k \right)\right|&\leq& \|g_2\|_\infty \left\|\frac{1}{l}\sum_{k \in E}e_k\right\|_1 \leq \epsilon\leq \frac{1}{n_j}.\end{aligned}$$
Now by the estimatives on the auxiliary space $T[(m^{-1}_{j}, 4n_j)_j]$ of the Proposition \[cbi\], we have
- If $\omega(f)<m_j$, $$\begin{aligned}
\left|f\left(\displaystyle\frac{1}{l}\sum^{l}_{k=1}x_k \right)\right|&\leq& C\left(\frac{1}{l}+\frac{2}{\omega(f)m_j}+\frac{1}{n_j}\right)\\
&\leq& C\left(\frac{m_j}{n_j}+\frac{2}{\omega(f)m_j}+\frac{1}{n_j}\right)\\
&\leq& \frac{3C}{\omega(f)m_j}\end{aligned}$$
- If $\omega(f)\geq m_j$, $$\begin{aligned}
\left|f \left(\displaystyle\frac{1}{l}\sum^{l}_{k=1}x_k \right)\right|&\leq& C\left(\frac{1}{l}+\frac{C}{\omega(f)}+\frac{1}{n_j}\right)\\
&\leq& \frac{C}{\omega(f)}+\frac{2C}{n_j}\end{aligned}$$
And notice
- $\displaystyle \frac{3C}{\omega(f)m_{2j}}\leq \frac{2C}{m_{2j}}$, if $ \omega(f)<m_{2j}$,
- $\displaystyle \frac{C}{\omega(f)}+\frac{2C}{n_{2j}}\leq \frac{C}{m_{2j}}+\frac{C}{m_{2j}}=\frac{2C}{m_{2j}}$, if $\omega(f)\geq m_{2j}$.
We conclude from the fact that $\mathcal{K}_{\omega_1}(\mathbb{C})$ is the norming set: $$\| (1/l) \sum^{l}_{k=1} x_k \| \leq 2C /m_{2j}.$$ For the proof the second part of the theorem, let $(x_k)^{l}_{k=1}$ be a normalized $(C,\epsilon)-R.I.S$ with $\epsilon\leq \frac{1}{n_{2j}}$, $l\in \left[\frac{n_{2j}}{m_{2j}},n_{2j}\right]$. For every $k\leq l$, we consider $x^{*}_{k}\in \mathcal{K}_{\omega_1}(\mathbb{C})$, such that $x^{*}_{k}(x_k)= 1$ and ${\mathrm{ran \,}}x^{*}_{k}\subseteq {\mathrm{ran \,}}x_k$, then $x^*=\frac{1}{m_{2j}}\sum^{l}_{k=1}x^{*}_{k}\in \mathcal{K}_{\omega_1}(\mathbb{C})$ and $x^*\left(\frac{1}{l}\sum^{l}_{k=1}x_k\right) = \frac{1}{m_{2j}}$. Hence, $\frac{1}{m_{2j}}\leq \left\| \frac{1}{l}\sum^{l}_{k=1}x_k\right\|$.
Proof Step II
-------------
Now we introduce another type of sequences in order to construct the conditional frame in ${\mathfrak}X_{\omega_{1}}({\mathbb}C)$. In fact, this space has no unconditional basic sequence.
A pair $(x,\phi)$ with $x \in \mathfrak{X}_{\omega_1}(\mathbb{C})$ and $\phi \in \mathcal{K}_{\omega_1}(\mathbb{C})$, is called a $(C,j)$- exact pair when:
- $\|x\|\leq C$, $\omega(\phi)=m_j$ and $\phi(x)=1$.
- For each $\psi \in \mathcal{K}_{\omega_1}(\mathbb{C})$ of type $I$ and $\omega(x)=m_i$, $i\neq j$, we have
$ |\psi(x)|\leq \left\{
\begin{array}{ll}
\displaystyle \frac{2C}{m_i}, \quad \text{if} \, \, i<j \\ \\
\displaystyle \frac{C}{m^{2}_{j}} \quad \text{if} \, \, i>j
\end{array}
\right.
$
\[ep\] Let $(x_n)_n$ be a normalized block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$. Then for every $j \in \mathbb{N}$, there exist $(x,\phi)$ such that $ x \in {\mathrm{span \,}}_{\mathbb{R}}(x_n)$, $\phi \in \mathcal{K}_{\omega_1}(\mathbb{C})$ and $(x,\phi)$ is a $(6,2j)$-exact pair.
Fix $(x_n)_n$ a normalized block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ and a positive integer $j$. By the Proposition \[w3\] there exists $(y_n)_n$ a normalized $(3, 1/n_{2j})-R.I.S$ in ${\mathrm{span \,}}_{\mathbb{R}}(x_n)$. For every $1\leq i\leq n_{2j}$ and $\epsilon>0$, we take $\phi_i \in \mathcal{K}_{\omega_1}(\mathbb{C})$ such that $\phi_i(y_i)>1-\epsilon$ , and $\phi_i< \phi_{i+1}$. Let $x= (m_{2j}/n_{2j} )\sum_{i=1}^{n_{2j}}y_i$ and $\phi=(1/m_{2j})\sum_{i=1}^{n_{2j}}\phi_i \in \mathcal{K}_{\omega_1}(\mathbb{C})$. By perturbating $x$ by a rational coefficient on the support of some $y_i$ we may assume that then $\phi(x)= 1$ and using Proposition \[db\] we conclude that $(x,\phi)$ is a $(6,2j)$-exact pair.
Let $j\in \mathbb N$. A sequence $(x_1, \phi_1, \ldots, x_{n_{2j+1}}, \phi_{n_{2j+1}})$ is called a $(1, j)$-dependent sequence when
(DS. 1) ${\mathrm{supp \,}}x_1 \cup {\mathrm{supp \,}}\phi_1 < \ldots < {\mathrm{supp \,}}x_{n_{2j+1}} \cup {\mathrm{supp \,}}\phi_{n_{2j+1}}$
(DS. 2) The sequence $\Phi = (\phi_1, \ldots , \phi_{n_{2j+1}})$ is a $2j+1$-special sequence.
(DS. 3) $(x_i, \phi_i)$ is a $(6, 2j_i)$-exact pair. $ \#{\mathrm{supp \,}}x_i \leq m_{2_{j+1}}/n^2_{2j+1}$ for every $1\leq i \leq n_{2j+1}$
(DS. 4). For every $(2j+1)$-special sequence $\Psi = (\psi_1, \ldots , \psi_{n_{2j+1}})$ we have that $$\bigcup_{k_{\Phi,\Psi}<i<\lambda_{\Phi,\Psi}} {\mathrm{supp \,}}x_i \cap \bigcup_{k_{\Phi,\Psi}<i<\lambda_{\Phi,\Psi} }{\mathrm{supp \,}}\psi_i = \emptyset.$$ where $k_{\Phi,\Psi}, \lambda_{\Phi,\Psi}$ are numbers introduced in Definition \[tp1\].
For every normalized block sequence $(y_n)_n$ of $\mathfrak{X}_{\omega_1}(\mathbb{C})$, and every natural number $j$ there exists a $(1,j)$-dependent sequence $(x_1, \phi_1, \ldots , $ $x_{n_{2j+1}}, \phi_{n_{2j+1}})$ such that $x_i $ is in the ${\mathbb}R$-span of $(y_n)_n$ for every $i=1, \ldots , n_{2j+1}$.
Let $(y_n)_n$ be a normalized block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$ and $j\in \mathbb N$. We construct the sequence $(x_1, \phi_1, \ldots , $ $x_{n_{2j+1}}, \phi_{n_{2j+1}})$ inductively. First using Proposition \[ep\] we choose a $(6,2j_1)$-exact pair $(x_1, \phi_1)$ such that $j_1$ is even, $m_{2j_1}> n_{2j+1}^2$ and $x_1\in {\mathrm{span \,}}_{\mathbb R} (y_n)_n$. Assume that we have constructed $(x_1, \phi_1, \ldots , $ $x_{l-1}, \phi_{l-1})$ such that there exists $(p_1, \ldots, p_{l-1})$ satisfying
1. ${\mathrm{supp \,}}x_1 \cup {\mathrm{supp \,}}\phi_1 < \ldots < {\mathrm{supp \,}}x_{l-1} \cup {\mathrm{supp \,}}\phi_{l-1} $, where $x_i \in {\mathrm{span \,}}_{\mathbb R} (y_n)_n$ and $(x_i, \phi_i)$ is a $(6,2j_i)$-exact pair.
2. For $1<i\leq l-1$, $w(\phi_i)= \sigma_{\varrho}(\phi_1, w(\phi_1), p_1, \ldots, \phi_{i-1}, w(\phi_{i-1}), p_{i-1})$.
3. For $1\leq i<l-1$, $p_i\geq \max\{ p_{i-1},p_{F_i} \}$, where $F_i = \cup_{k=1}^i {\mathrm{supp \,}}\phi_k \cup {\mathrm{supp \,}}x_k$.
To complete the inductive construction choose $p_{l-1}\geq \max \{ p_{l-2}, p_{F_{i-1}}, n_{2j+1}^2$ $\# {\mathrm{supp \,}}x_{l-1}\}$ and $2j_l= \sigma_{\varrho} ( \phi_1, w(\phi_1), p_1, \ldots, \phi_{l-1}, w(\phi_{l-1}), p_{l-1} )$. Hence take a $(6,2j_l)$-exact pair $(x_l, \phi_l)$ such that $x_l \in {\mathrm{span \,}}_{\mathbb R} (y_n)_n$ and ${\mathrm{supp \,}}x_{l-1}\cup {\mathrm{supp \,}}\phi_{l-1} < {\mathrm{supp \,}}x_l \cup {\mathrm{supp \,}}\phi_l$. Notice that properties $(DS.1), (DS.2)$ and $(DS.3)$ are clear by definition of the sequence and $(DS.4)$ follows from (3) and $(TP.3)$.
Modifying a little the previous argument we obtain the following:
\[w6\] For every two normalized block sequences $(y_n)_n$ and $(z_n)_n$ of $\mathfrak{X}_{\omega_1}(\mathbb{C})$, and every $j \in \mathbb N$ there exists a $(1,j)$-dependent sequence $(x_1, \phi_1, \ldots $ $\ldots, x_{n_{2j+1}}, \phi_{n_{2j+1}})$ such that $x_{2l-1} \in {\mathrm{span \,}}_{\mathbb R}(y_n)$ and $x_{2l} \in {\mathrm{span \,}}_{\mathbb R}(z_n)$ for every $l=1, \ldots , n_{2j+1}$.
Another consequence of the basic inequality is the following proposition.
\[w5\] Let $(x_1, \phi_1, ...,x_{n_{2j+1}}, \phi_{n_{2j+1}} )$ be a $(1,j)$dependent sequence. Then:
1. $\|\displaystyle\frac{1}{n_{2j+1}}\sum^{n_{2j+1}}_{i=1}x_i\|\geq\frac{1}{m_{2j+1}}$
2. $\|\displaystyle \frac{1}{n_{2j+1}}\sum^{n_{2j+1}}_{i=1}(-1)^{i+1}x_i\|\leq \frac{1}{m^{3}_{2j+1}}$
The first inequality is clear since the functional $\phi=1/m_{2j+1}\sum_{i=1}^{n_{2j+1}} \phi_i$ $ \in \mathcal{K}_{\omega_1}(\mathbb{C})$ and $\phi (\sum^{n_{2j+1}}_{i=1}x_i)= n_{2j+1}/m_{2j+1}$. The second is obtained by the Basic Inequality. For the complete proof see [@ALT Proposition 3.7].
We now can give a proof of Step II.
\[w8\] Let $(y_n)_n$ be a normalized block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$. Then the closure of the *real* span of $(y_{n})_{n}$ is H.I.
Let $(y_n)_n$ be a normalized block sequence of $\mathfrak{X}_{\omega_1}(\mathbb{C})$. Fix $\epsilon> 0$ and two block subsequences $(z_n)_n$ and $(w_n)_n$ in ${\mathrm{span \,}}_{{\mathbb}R} (y_{n})_{n}$. Take an integer $j$ such that $m_{2j+1}\epsilon>1$. By Proposition \[w6\] there exist a $(1,j)$-dependent sequence $(x_1, \phi_1, ...,x_{n_{2j+1}}, \phi_{n_{2j+1}} )$ such that $x_{2i-1}\in {\mathrm{span \,}}_{\mathbb{R}}(z_n)$ and $x_{2i}\in {\mathrm{span \,}}_{\mathbb{R}}(w_n)$. We define $z= (1/n_{2j+1})\sum^{n_{2j+1}}_{i=1(odd)}x_i$ and $w= 1/n_{2j+1}\sum^{n_{2j+1}}_{i=1(even)}x_i$. Notice that $z \in {\mathrm{span \,}}_{\mathbb{R}}(z_n)$ and $w \in {\mathrm{span \,}}_{\mathbb{R}}(w_n)$. Then by Proposition \[w5\] we get $\|z+w\|\geq 1/m_{2j+1}$ and $\|z-w\|\geq 1/m^{2}_{2j+1}$. Hence $\|z-w\|\leq \epsilon \|z+w\|$.
Proof of Step III
------------------
A sequence $(z_1, \phi_1, \ldots , z_{n_{2j+1} }, \phi_{n_{2j+1} })$ is called a $(0,j)$- dependent sequence when it satisfies the following conditions:
- (0DS.1) The sequence $\Phi= (\phi_1, \ldots, \phi_{n_{2j+1}})$ is a $2j+1$-special sequence and $\phi_i(z_k)=0$ for every $1\leq i,k \leq n_{2j+1}$.
- (0DS.2) There exists $\{ \psi_1, \ldots , \psi_{n_{2j+1}} \} \subseteq \mathcal{K}_{\omega_1}(\mathbb{C})$ such that $w(\psi_i)= w(\phi_i)$, $\# {\mathrm{supp \,}}z_i \leq w(\phi_{i+1})/n_{2j+1}^2$ and $(z_i, \psi_i)$ is a $(6, 2j_1)$- exact pair for every $1\leq i \leq n_{2j+1}$.
- (0DS.3) If $H=(h_1, \ldots , h_{n_{2j+1} })$ is an arbitrary $2j+1$-special sequence, then $$\left ( \bigcup_{\kappa_{\Phi, H}<i< \lambda_{\Phi, H}} {\mathrm{supp \,}}z_i \right ) \cap \left ( \bigcup_{\kappa_{\Phi, H}<i< \lambda_{\Phi, H}} {\mathrm{supp \,}}h_i \right ) = \emptyset.$$
For every $(0,j)$-dependent sequence $(x_{1}, \phi_{1}, \ldots , x_{n_{2j+1}}, $ $\phi_{n_{2j+1}})$ we have that $$\left \| \frac{1}{n_{2j+1}} \sum_{k=1}^{n_{2j+1}} x_{k} \right \|\leq \frac{1}{m_{2j+1}^{2}}.$$
[@ALT Proposition 5.23].
Let $(y_n)_n$ be a $(C,\epsilon)-R.I.S$, $Y=\overline{{\mathrm{span \,}}}_{{\mathbb}C}(y_n)$, and $T:Y\longrightarrow \mathfrak{X}_{\omega_1}(\mathbb{C})$ a $\mathbb{R}$-linear bounded operator. Then $\displaystyle\lim_{n \rightarrow \infty}d(Ty_n, \mathbb{C}y_n)=0$.
Suppose that $\displaystyle\lim_{n \rightarrow \infty}d(Ty_n, \mathbb{C}y_n)\neq0$. Then there exists an infinite subset $B\subseteq \mathbb N$ such that $\inf_{n\in B} d(Ty_n, \mathbb{C}y_n)> 0$. We shall show that for every $\epsilon>0$ there exists $y\in Y$ such that $\|y\|<\epsilon\|Ty\|$ and this is a contradiction.
[**Claim 1**]{} There exists a limit ordinal $\gamma_0$, $A \subseteq \mathbb N$ infinite and $\delta>0$ such that $$\inf_{n\in A} d(P_{\gamma_0}Ty_n, \mathbb C y_n)> \delta$$
To prove this claim we observe that
$$\gamma_0= \min\{ \gamma<\omega_1 : \exists A\in [\mathbb N]^{\infty} \inf_{n\in A} d(P_{\gamma}Ty_n, \mathbb C y_n)> 0\}$$ is a limit ordinal. In fact, by the assumption the set on the right side is not empty. And if $\gamma_0$ is not limit, then we have $\gamma_0= \beta +1$. The sequence $(y_n)_n$ is weakly null (because $(e_{\alpha})_{\alpha}$ is shrinking) and then $$\lim_{n\rightarrow \infty} e_{\beta+1}^*Ty_n=0$$ And for large $n$ and every $\lambda \in \mathbb C$ $$\begin{aligned}
\|P_{\beta} Ty_n- \lambda y_n\| &\geq& \|P_{\beta +1} Ty_n- \lambda y_n\|- \|e_{\beta+1}^*Ty_n \|\\
&\geq& \delta-| e_{\beta+1}^*Ty_n|\geq \delta/2,\end{aligned}$$ which is a contradiction.
Fix $\gamma_0$ and $A\subseteq {\mathbb}N$ as in Claim 1. Then there exist a sequence $n_2< n_3< \dots $ in $A$, a sequence of functionals $f_2, f_3, \ldots$ in ${\mathcal}K_{\omega_1}({\mathbb}C)$ and a sequence of ordinals $\gamma_1< \gamma_2 < \ldots < \gamma_0$ such that
1. $d( P_{[\gamma_{k}, \gamma_{k+1}] }Ty_{n_k}, \mathbb C y_{n_k}) \geq \delta/2$
2. $f_kT_{y_{n_k}} \geq \delta/2$
3. $f_k(y_{n_k})=0$
4. ${\mathrm{ran \,}}f_k \subseteq {\mathrm{ran \,}}Ty_{n_k}$
5. ${\mathrm{supp \,}}f_k \cap {\mathrm{supp \,}}y_{n_m} = \emptyset$ when $m\neq k$
To prove this claim, let $\xi= \sup \max {\mathrm{supp \,}}y_n$. We analyze the three possibilities for $\xi$:
Case a.) $\xi < \gamma_0$. Let $n_1= \min A$ and choose $\xi <\gamma_1 < \gamma_0$ such that $$\| P_{\gamma_0}Ty_{n_1} - P_{\gamma_1}Ty_{n_1}\|< \delta/2,$$ hence, $d(P_{\gamma_1}Ty_{n_1}, \mathbb Cy_{n_1}) > \delta/2$. By minimality of $\gamma_0$ we have $$\inf_{n\in A} d(P_{\gamma_1} Ty_n, \mathbb C y_n)=0,$$ then we can choose $n_2>n_1$ in $A$ such that $d(P_{\gamma_1} Ty_{n_2}, \mathbb C y_{n_2})< \delta/2$ and this implies that $$d( (P_{\gamma_0}- P_{\gamma_1}) Ty_{n_2}, \mathbb C y_{n_2})> \delta/2.$$ Approximating the vector $(P_{\gamma_0}- P_{\gamma_1}) Ty_{n_2}$ choose $\gamma_0> \gamma_2> \gamma_1$ such that $ \| (P_{\gamma_0}- P_{\gamma_2}) Ty_{n_2}\|
$ is so small in order to guarantee that $$d(P_{[\gamma_1, \gamma_2]} Ty_{n_2}, \mathbb C y_{n_2}) > \delta/2.$$ Using the complex Hahn-Banach theorem, there exists $g_2\in \mathit B_{ \mathfrak{X}^*_{\omega_1}(\mathbb{C}) }$ such that
- $ g_2(P_{[\gamma_1, \gamma_2]} Ty_{n_2})> \delta/2$
- $g_2( y_{n_2})= 0$
and by Proposition \[bal\] we can choose $h_2 \in \mathcal{K}_{\omega_1}(\mathbb{C})$ such that $ h_2(P_{[\gamma_1, \gamma_2]} Ty_{n_2})> \delta/2$ and $h_2( y_{n_2}) $ is arbitrarily small. Replacing $h_2$ by $\alpha h_2 + \beta k_2$ where $|\alpha|+ |\beta|=1$, $k_2(y_{n_2})$ is close enough to 1, and $k_2\in \mathcal{K}_{\omega_1}(\mathbb{C})$ we may assume that $h_2(y_{n_2})=0$.
Let $f_2= h_2 P_{[\gamma_1, \gamma_2] \cap {\mathrm{ran \,}}Ty_{n_2}} \in \mathcal{K}_{\omega_1}(\mathbb{C})$. Again by minimality of $\gamma_0$, there exists $n_3>n_2$ in $A$ such that $d(P_{\gamma_{2}}Ty_{n_{3}}, {\mathbb}Cy_{n_{3}})< \delta/2$ and we can choose $\gamma_{0}>\gamma_{3}>\gamma_{2}$ satisfying $$d(P_{[\gamma_{2}, \gamma_{3}]}Ty_{n_{3}}, {\mathbb}C y_{n_{3}} ) > \delta/2.$$ Again by Hahn-Banach and by Proposition \[bal\] there exists a functional $h_{3} \in {\mathcal}K_{\omega_{1}}({\mathbb}C)$ such that
- $ h_3(P_{[\gamma_2, \gamma_3]} Ty_{n_3})> \delta/2$
- $h_3( y_{n_3})=0$
then we define $f_3= h_3 P_{[\gamma_2, \gamma_3] \cap {\mathrm{ran \,}}Ty_{n_3}} \in \mathcal{K}_{\omega_1}(\mathbb{C})$. The previous argument gives us the way to construct the sequences of Claim 2. Properties (1)-(5) are easy to check, in particular property (5) is true because $\min {\mathrm{supp \,}}f_{k} > \xi> \max {\mathrm{supp \,}}y_{n_{l}}$ for every positive integers $k,l$.
Case b.) $\xi> \gamma_{0}$. In this case we start by picking $n_{1}\in A$ such that $\min {\mathrm{supp \,}}y_{n_{1}}> \gamma_{0}$. Then we repeat exactly the same argument that in case a.).
Case c.) $\xi=\gamma_{0}$. We basically repeat the same argument of the case a.) with the additional care of maintaining property (5) true. That is, each time we choose the ordinal $\gamma_{k+1}$ (with $\gamma_{0}> \gamma_{k+1}> \gamma_{k}$) we take it such that $\gamma_{k+1}> \max {\mathrm{supp \,}}y_{n_{k+1}}$.
There exists a $(0,j)$- dependent sequence $(z_1, \phi_1, \ldots , z_{n_{2j+1}})$ such that
- $z_i \in X$ for every $1\leq i \leq n_{2j+1}$
- ${\mathrm{ran \,}}\, \phi_k \subseteq {\mathrm{ran \,}}Ty_k$ and $\phi_k(Tz_k)> \delta/2$
Let $j$ with $m_{2j+1}> 24/\epsilon \delta$. Choose $j_1$ even such that $m_{2j_1} > n_{2j+1}^2$ (see definition of special sequence) and $F_1 \subseteq A$ with $\#F_1= n_{2j_1}$ such that $(y_{n_k})_{k\in F_1}$ is a $(3, 1/n_{2j_1}^2)$-R.I.S. Then define
$$\phi_1= \frac{1}{m_{2j_1}} \sum_{i\in F_1} f_i \in \mathcal{K}_{\omega_1}(\mathbb{C}) \, \text{ and } z_1= \frac{m_{2j_1}}{n_{2j_1}} \sum_{k\in F_1} y_k$$ observe that $w(\phi_1)= m_{2j_1}$, $\phi_1(Tz_1) = \frac{1}{n_{2j_1} } \sum_{i\in F_1} f_i \left ( \sum_{k\in F_1} Ty_k \right )> \delta/2$ and $\phi_1(z_1)= \frac{1}{n_{2j_1}} \sum_{i\in F_1} f_i( \sum_{k\in F_1}) =0$. Select $$p_1 \geq \max \{ p_{\varrho}( {\mathrm{supp \,}}z_1 \cup {\mathrm{supp \,}}Tz_1 \cup {\mathrm{supp \,}}\phi_1), n_{2j+1}^2\#{\mathrm{supp \,}}z_1\}$$ denote $2j_2= \sigma_{\varrho}(\phi_1, m_{2j_1}, p_1)$. Then take $F_2 \subseteq A$ with $\# F_2= n_{2j_2}$ and $F_2 > F_1$ such that $(y_k)_{k\in F_2}$ is $(3, 1/n_{2j_2}^2)- R.I.S$ and define
$$\phi_2= \frac{1}{m_{2j_2}} \sum_{i\in F_2} f_i \in \mathcal{K}_{\omega_1}(\mathbb{C}) \, \text{ and } z_2= \frac{m_{2j_2}}{n_{2j_2}} \sum_{k\in F_2} y_k$$ So we have $\phi_1< \phi_2$, $\phi_2(Tz_2)> \delta$ and $\phi_2(z_1)= \phi_2(z_2)=0$. Pick $$\begin{aligned}
&p_2& \geq \max \{ p_1, p_{\varrho}( {\mathrm{supp \,}}z_1\cup {\mathrm{supp \,}}z_2 \cup {\mathrm{supp \,}}Tz_1 \cup {\mathrm{supp \,}}Tz_2 \cup {\mathrm{supp \,}}\phi_1 \cup \\
& & {\mathrm{supp \,}}\phi_2), n_{2j+1}^2\#{\mathrm{supp \,}}z_2 \}
\end{aligned}$$ and set $2j_3= \sigma_{\varrho}( \phi_1, m_{2j_1}, p_1, \phi_2, m_{2j_2}, p_2)$. Continuing with this procedure we form a sequence $(z_1, \phi_1, \ldots , z_{n_{2j+1} }, \phi_{n_{2j+1} })$. Now we check that this is a $(0,j)$-dependent sequence.
Property (0DS.1) is clear, because of the construction of the functionals their weights satisfies $w(\phi_{i+1})= m_{\sigma_{\varrho}(\Phi_i)}$ where $\Phi_i= (\phi_1, w(\phi_1), p_1, \ldots$ , $\phi_i, w(\phi_i), p_i)$.
Property (0DS.2) We proceed to the construction of the sequence $\{ \psi_{1}, \dots ,$ $ \psi_{n_{2j+1} } \}$ in $ \mathcal{K}_{\omega_1}(\mathbb{C})$ such that $(z_{i}, \psi_{i})$ is a $(6, 2j_{i})$-exact pair and $w(\psi_{i})= w(\phi_{i})$ for every $1\leq i \leq n_{2j+1}$. The other condition $\# {\mathrm{supp \,}}z_i \leq w(\phi_{i+1})/n_{2j+1}^2$ is already obtained by the construction of the weights. For each $z_{i}$ there exists a subset $F_{i}\subseteq A$ with $\#F_{i}= n_{{2j_{i}}}$ such that $z_{i}= (m_{2j_{i}}/ n_{2j_{i}}) \sum_{k\in F_{i}} y_{n_{k}}$ where $(y_{n_{k}})_{k\in F_{i}}$ is a $(3, 1/n_{2j_{i}} ^{2} )$ R.I.S. Now we follow the same arguments as in Proposition \[ep\]. For every $k\in F_{i}$ we take $f_{n_{k}}\in {\mathcal}K_{\omega_{1}}({\mathbb}C)$ such that $f_{n_{k}}(y_{n_{k}}) = 1$ and $f_{n_{k}}<f_{n_{k+1}}$. Then $\psi_{i} = (1/m_{2j_{i}})\sum_{k\in F_{i}}f_{n_{k}}\in K_{\omega_{1}}({\mathbb}C)$ and $(z_{i}, \phi_{i})$ is a $(6, 2j_{i})$-exact pair.
Property (0DS. 3) Let $H=(h_{1}, \ldots , h_{n_{2j+1}})$ be an arbitrary $2j+1$-special sequence. We consider two cases: a) Suppose that $\max {\mathrm{supp \,}}z_{k} \leq \max {\mathrm{supp \,}}\phi_{k}$ for every $1\leq k\leq n_{2j+1}$. Then ${\mathrm{supp \,}}z_{k} \subseteq {\mathrm{supp \,}}\overline{\phi_{\lambda_{\Phi, H}-1}}^{p_{\lambda_{\Phi, H}-1}}$ for every $ \kappa_{\Phi, H}< k< \lambda_{\Phi, H}$. Then for the second part of (TP. 3) we obtain the desired result. (b) Suppose that $\max {\mathrm{supp \,}}\phi_{k} \leq \max {\mathrm{supp \,}}z_{k}$ for every $1\leq k\leq n_{2j+1}$. Then ${\mathrm{supp \,}}\phi_{k} \subseteq {\mathrm{supp \,}}\overline{ z_{\lambda_{\Phi,H}-1}}^{p_{\lambda_{\Phi, H}-1}}$ for every $ \kappa_{\Phi, H}< k< \lambda_{\Phi, H}$, and the result follows from the first part of (TP3).
Fix a $(0,j)$-dependent sequence as obtained in the previous claim, and define $$z=(1/n_{2j+1}) \sum_{k=1}^{n_{2j+1}} z_{k} \, \text{ and } \, \phi= (1/m_{2j+1}) \sum_{k=1}^{n_{2j+1}}\phi_{k}.$$
Then $\phi (Tz)= (1/n_{2j+1}) \sum_{k=1}^{n_{2j+1}} \phi_{k}(Tz)\geq \delta/m_{2j+1}$ and $\|z\|\leq 12/m_{2j+1}^{2}$. Hence, $\| Tz\|\geq \delta/m_{2j+1}\geq \delta m_{2j+1} \|z\|/12> \epsilon \|z\|$ and this completes the proof.
[99]{}
Anisca, R. *Proc. Amer. Math. Soc. (131)* **9** (2003), 2819–2829.
Argyros, S., Lopez-Abad, J., Todorcevic, S A class of Banach spaces with few non strictly singular operators. *J. of Functional Analysis (222)* **2** (2005), 306–384.
Bourgain, J. Real isomorphic Banach spaces need not be complex isomorphic. *Proc. Amer. Math. Soc. (96)* **2** (1986), 221–226.
Dieudonné, J. Complex structures on real Banach spaces. *Proc. Amer. Math. Soc. (3)* **1** (1952), 162–164.
Ferenczi, V. Uniqueness of complex structure and real hereditarily indecomposable Banach spaces. *Advances in Math.* **213** (2007), 462–488.
Ferenczi, V., Galego, E. Countable groups of isometries on Banach spaces. *Trans. Amer. Math. Soc. (362)* **8** (2010), 4385–4431.
Ferenczi, V., Galego, E. Even infinite-dimensional real Banach spaces. *J. of Functional Analysis. (253)* **2** (2007), 534–549.
Gowers, T., Maurey, B. The unconditional basic sequence problem. *J. Amer. Math. Soc. (6)* **4** (1993), 851–874.
Gowers, T. A solution to Banach’s hyperplane problem. *Bull. London Math. Soc. (26)* **6** (1994), 523–530.
Gowers, T. Banach spaces with small spaces of operators. *Math Ann. (307)* **** (1997), 543–568.
Jech, T. Set theory. *Springer Monographs in Mathematics -3rd ed.,* Berlin **** (2006).
Kalton, N. J. An elementary example not isomorphic to its complex conjugate. *Canad. Math. Bull (38)* **2** (1995), 218–222.
Koszmider, P., Martín, M., Merí, J. Isometries on extremely non-complex Banach spaces. *Journal of the Institute of Mathematics of Jussieu (10)* **2** (2011), 325–348.
Koszmider, P., Martín, M., Merí, J. Extremely non-complex C(K) spaces. *Journal of Mathematical Analysis and Applications (350)* **2** (2009), 601–615.
Szarek, S. A super reflexive Banach space which does not admit complex structure. *Proc. Amer. Math. Soc. (97)* **3** (1986), 437–444.
Todorcevic, S. Walks on ordinals and their characteristics. *Progress in Mathematics* vol **263** Birkhauser Verlag, Basel, (2007).
|
2024-04-16T01:26:36.242652
|
https://example.com/article/3819
|
Sitting back and watching your favourite streamed TV series may seem harmless enough – but video demand is leaving a hefty carbon footprint.
LONDON, 31 January, 2017 – The internet is fast becoming a major source of global carbon emissions – and the main cause is video demand, the increasing popularity of “real time” streamed video content.
Video streaming to internet-enabled TVs, game consoles and mobile devices already accounts for more than 60% of all data traffic – and the latest forecasts suggest this will rise to more than 80% by 2020.
Increasingly, viewers across the world are watching films and TV series in real time through subscriptions to Netflix or Amazon, while social media platforms such as Facebook and Twitter are offering more and more streamed video content for free.
This is driving a dizzying increase in the amount of information that needs to be stored and transmitted by power-hungry data centres. Up until 2003 the world had accumulated a total of five exabytes – five billion gigabytes – of stored digital content. By 2015 that amount was being consumed every two days, as annual consumption reached 870 exabytes.
As more video is streamed and more of the world’s population goes online, annual data traffic is forecast to reach 2,300 exabytes by 2019.
Pressure for renewables
The IT sector already consumes around 7% of electricity worldwide, and as data traffic rises, demand from data centres alone could reach 13% of global electricity consumption by 2030.
Now leading video content providers are coming under increasing pressure to show what proportion of their power derives from fossil fuels.
A recent report by Greenpeace USA acknowledges that social media platform Facebook has made significant progress towards its target for 100% of its electricity to come from renewables, following support from millions of its users for Greenpeace’s 2011 “Unfriend coal” campaign. Google and Apple receive praise for progress towards similar commitments made in 2012.
However, major providers of video streaming content including Netflix, Amazon Prime and Hulu are criticised for sourcing more than half of their energy from coal or natural gas.
“The dramatic increase in the number of data centres … dominated by utilities that have little to no renewable energy is driving a similarly dramatic increase in the consumption of coal and natural gas”
Cloud computing market leader Amazon Web Services is credited for taking important steps towards renewables but censured for lack of transparency and heavy reliance on new data centres in the state of Virginia powered mainly by fossil fuels.
Elsewhere the lack of access to renewable energy from monopoly utilities in East Asia is seen as a major obstacle towards creating a renewably-powered internet in the region.
The report concludes: “The dramatic increase in the number of data centres … dominated by utilities that have little to no renewable energy is driving a similarly dramatic increase in the consumption of coal and natural gas.”
Attempting to express the effect of increasing internet traffic in terms of emissions is fraught with difficulty, but one study, published in the journal Environmental Research Letters, has calculated that in 2011 Americans streamed 3.2 billion hours of video.
This would have consumed 25 petajoules of energy (estimated at about the annual consumption of 175,000 US households), resulting in 1.3 billion kilograms of CO2 emissions.
Efficiency limits
The lead author, Arman Shehabi, a research scientist at Lawrence Berkeley National Laboratory in California, said the IT sector had so far managed to offset its soaring electricity needs by designing more energy-efficient data centres. But there was a limit to how far energy efficiency could go.
“The growth in video streaming is enormous just based on the size of the companies that are providing these services – but they are still reaching only a small part of the global population and we can imagine that’s going to just keep increasing,” he said.
“You’re still going to have this growth of more and more servers needed. We’ve seen some good efficiency measures but we’re getting close to the end of that – we can’t go out much further – and with video streaming there’s no end in sight.”
He added that another major driver of future growth in data traffic would be the Internet of Things – remote digital sensors, devices and driverless cars connected to the internet. – Climate News Network
|
2024-05-18T01:26:36.242652
|
https://example.com/article/3657
|
Triplet state formation and quenching dynamics of 2-mercaptobenzothiazole in solution.
The photochemical dynamics of the thione 2-mercaptobenzothiazole (MBT) initiated by absorption of 330 nm ultraviolet light are investigated by ultrafast transient absorption spectroscopy. The lowest energy triplet state (T1) has mixed 3ππ*/3nπ* character and is populated with a quantum yield of 0.58 ± 0.01 from the photo-excited 1ππ* S2 state in methanol solution via rapid internal conversion to the 1nπ* S1 state (with time constant τ1 < 150 fs). The spectroscopic evidence points to a mechanism involving intersystem crossing from S1 to the 3nπ*/3ππ* T2 state (τ2 = 400 ± 100 fs) and internal conversion to T1 (with time constant for growth τ3 = 6.1 ± 0.4 ps). The remainder of the photoexcited molecules return to the ground state by S1 → S0 internal conversion. In methanol solution, the T1 state is long-lived but when the solvent is changed to styrene, triplet quenching is observed with a time constant of 107 ± 8 ps and assigned to the adduct-mediated energy transfer process MBT (T1) + styrene (S0) → 3[MBT-styrene] → MBT (S0) + Styrene (T1). Transient vibrational absorption spectroscopy observes the 3[MBT-styrene] biradical intermediate and determines its lifetime to be 700 ± 80 ps. Computational studies identify the mechanistic pathway for triplet quenching, which involves a curve crossing between two triplet states of the MBT-styrene adduct. The quenching process occurs with high efficiency, and no long-lived isomers of the initial adduct are observed.
|
2024-07-23T01:26:36.242652
|
https://example.com/article/4172
|
“With things like Twitter, we can touch base and see what they like and what they don’t like,” Mendes said. “So I think going into season 2 we really know what people are interested in. Now that we’ve put it out there in the world, we can expand on it and go darker and deeper.”
Advertisement
It's kind of a genius move for the CW show that has got fans hooked. Honestly, who knows Riverdale better than those who are obsessing over every second of it? Especially since the season 1 finale, "The Sweet Hereafter," ended with so many shocking moments that have got fans talking. It's also a bold move for a new show to lean into its Twitter audience instead of pretending, like so many other shows, that they ignore all online opinions.
As for what you should be expecting in Riverdale's immediate future, Mendes told EW it's going to get darker, thanks to some revelations Archie (K.J. Apa) made in the end about his family. Don't worry, Mendes' character Veronica is going to be in the thick of all the tense drama. Though, maybe you should worry a little bit with this show.
"It’s going to unpack so many things in terms of the relationships for season 2," she said, "because Archie’s going to be going through this really traumatic experience and Veronica’s going to have to be there to help with that burden."
What we can also expect for next season is a new Reggie, after 13 Reasons Why star Ross Butler had to drop out, who should look familiar to American Horror Story fans, and of course lots of drama. For those who want to help Riverdale decide what comes next, the first season of the CW show is currently streaming on Netflix.
|
2023-12-03T01:26:36.242652
|
https://example.com/article/2338
|
(a) Technical Field
The present invention relates to a transmission oil composition for use in a push belt continuously variable transmission (CVT). More particularly, the present invention relates to a push belt CVT oil composition including a hydrogenated base oil or synthetic base oil as well as a viscosity control agent, a dispersing agent, a friction control agent and other additives, which provides improved friction characteristics, durability, thermal stability, oxidation stability and transmission performance, can be used in various temperature ranges, and can improve transmission efficiency (fuel efficiency).
(b) Background Art
In general, a transmission is provided between a clutch and a propeller shaft or between a clutch and final reduction gears to provide speed and torque conversions of the power from an engine suitable for the driving state of an automobile to the drive wheels. It is often classified into a manual transmission and an automatic transmission. The automatic transmission refers to a transmission whereby the speed and torque of the engine are converted automatically without the need of the driver's manual clutch operation and gear shifting according to the driving condition as in the manual transmission.
In order to improve transmission efficiency, multi-step automatic transmissions have been developed such as 6-speed, 7-speed, 8-speed, etc. Recently, the continuously variable transmission (CVT) is adopted increasingly.
The push belt CVT was developed by Dr. Van Doore and is adopted in many cars. The CVT allows stepless transmission through belt-pulley variation. The variable pulley presses the belt with an adequate pressure, and the gear ratio is determined by the ratio of the pressure applied to the first pulley and the second pulley. An adequate friction needs to be maintained between the pulley and the belt to avoid slippage.
As such, since an adequate friction needs to be maintained between the pulley and the belt, it is necessary to reduce wearing by friction using gears and bearings. And, when the torque converter is combined with a planetary gear system, the friction material used for the clutch should have superior friction characteristics and there should be no shifting shock during transmission.
Accordingly, focuses are given to the improvement of friction characteristics and other physical properties for transmission oil used in the CVT.
As previously known transmission oils, Japanese Patent Application Publication No. 2009-0286831 discloses a lubricating oil composition for a metal belt-type CVT comprising a base oil as well as 0.005-0.1 wt % of a phosphorus compound and 0.01-20 wt % of an ashless dispersant, an antioxidant, an extreme pressure agent, a friction control agent, a viscosity index improver, etc. as additives. Japanese Patent Application Publication No. 2001-0323292 discloses a lubricating oil composition for a push belt-type automatic transmission comprising a lubricating base oil as well as (A) an organic acid metal salt (100-1000 ppm based on the metal content), (B) an anti-wear agent and (C) a boron-containing succinimide, wherein the metal salt of the organic acid having a long-chain hydrocarbon group is selected from salicylate, carboxylate, sulfonate, phosphonate, etc. of Ca or Mg, and further comprising 0.01-5 wt % of a friction control agent, 0.1-10 wt % of an imide-based ashless dispersant, 0.05-5 wt % of an antioxidant and 1-7 wt % of a polymethacrylate viscosity index improver as additives.
However, these transmission oil compositions have physical properties, especially friction characteristics, improper to be used as the push belt CVT oil.
In order to solve this problem, Korean Patent Application Publication No. 2005-0028808 presents a power transmitting fluid comprising a base oil as well as an additive composition comprising 0.1-10 wt % of a dispersing agent such as succinimide, 0.1-3.0 wt % of an antioxidant and 0.01-1.0 wt % of an antifoaming agent as additives and further comprising a sulfur-based extreme pressure agent, a friction control agent, a viscosity index improver, etc. The additive composition acts as a phosphorous source for providing improved wear resistance and as a friction controller for providing improved anti-vibration durability. It is described that the power transmitting fluid comprising the additive composition provides improved wear resistance and improved anti-vibration durability. Although use of the power transmitting fluid for the push belt-type transmission is presented, there remain a lot to be improved in terms of friction characteristics, thermal stability, durability, or the like.
|
2023-08-14T01:26:36.242652
|
https://example.com/article/1209
|
Sensitive and specific detection of EML4-ALK rearrangements in non-small cell lung cancer (NSCLC) specimens by multiplex amplicon RNA massive parallel sequencing.
Recurrent gene fusions of anaplastic lymphoma receptor tyrosine kinase (ALK) and echinoderm microtubule-associated protein-like 4 (EML4) have been recently identified in ∼5% of non-small cell lung cancers (NSCLCs) and are targets for selective tyrosine kinase inhibitors. While fluorescent in situ hybridization (FISH) is the current gold standard for detection of EML4-ALK rearrangements, several limitations exist including high costs, time-consuming evaluation and somewhat equivocal interpretation of results. In contrast, targeted massive parallel sequencing has been introduced as a powerful method for simultaneous and sensitive detection of multiple somatic mutations even in limited biopsies, and is currently evolving as the method of choice for molecular diagnostic work-up of NSCLCs. We developed a novel approach for indirect detection of EML4-ALK rearrangements based on 454 massive parallel sequencing after reverse transcription and subsequent multiplex amplification (multiplex ALK RNA-seq) which takes advantage of unbalanced expression of the 5' and 3' ALK mRNA regions. Two lung cancer cell lines and a selected series of 32 NSCLC samples including 11 cases with EML4-ALK rearrangement were analyzed with this novel approach in comparison to ALK FISH, ALK qRT-PCR and EML4-ALK RT-PCR. The H2228 cell line with known EML4-ALK rearrangement showed 171 and 729 reads for 5' and 3' ALK regions, respectively, demonstrating a clearly unbalanced expression pattern. In contrast, the H1299 cell line with ALK wildtype status displayed no reads for both ALK regions. Considering a threshold of 100 reads for 3' ALK region as indirect indicator of EML4-ALK rearrangement, there was 100% concordance between the novel multiplex ALK RNA-seq approach and ALK FISH among all 32 NSCLC samples. Multiplex ALK RNA-seq is a sensitive and specific method for indirect detection of EML4-ALK rearrangements, and can be easily implemented in panel based molecular diagnostic work-up of NSCLCs by massive parallel sequencing.
|
2024-02-09T01:26:36.242652
|
https://example.com/article/2949
|
After a long winter that left local roads cratered, the state recently announced it will spend $40 million to repair potholes and other damage.
The Massachusetts Department of Transportation will use $10 million to repair interstate highways and state roads. The state is distributing the remaining $30 million to cities and towns using the Chapter 90 formula, the mechanism used to calculate transportation aid.
The state is disbursing the one-time funding with the expectation that work will be completed by September.
Taunton Mayor Thomas Hoye Jr. will be meeting with the Taunton Department of Public Works this month to plan specifically how the money will be spent in the Silver City. City officials are confident they will have no issue spending the appropriated amount in its entirety.
BY THE NUMBERS:
$30 million: Road repair funding for cities and towns
Berkley
$39,998 Funding for 55.13 miles of roads
Dighton
$43,193 Funding for 55.22 miles of roads
Rehoboth
$92,369 Funding for 131.65 miles of roads
Raynham
$73,385 Funding for 72.02 miles of roads
Taunton
$213,231 Funding for 194.38 miles of roads
1,700: Number of potholes reported to MassHighway since January
$880,000: Money spent repairing potholes on state roads since January
QUOTE: “We experienced an extraordinary winter season that caused damage to our roads, bridges, and vehicles well beyond the typical year. This one-time, targeted program will speed repair and recovery and maintain safe travel for motorists.” — MassDOT Secretary Richard A. Davey.
QUOTE: “This money is certainly more than welcome after a very difficult winter season on our roadways. I would like to thank Secretary Davey and Governor Deval Patrick for their efforts. I will be meeting with DPW Commissioner Fred Cornaglia and Municipal Council President AJ Marshall to determine the best pathway to expending these critical funds. We certainly have no shortage of roads and sidewalks which this money could be expended on.“ —Taunton Mayor Thomas Hoye Jr.
QUOTE: “We had a rough winter ... there’s been a lot of freezing and separating of the roads.” — Raynham Board of Selectman Chairman Joseph Pacheco
— Gerry Tuoti is the Regional Newsbank Editor for GateHouse Media New England. Email him at gtuoti@tauntongazette.com or call him at 508-967-3137. Taunton Daily Gazette Staff Writers Rory Schuler and Marc Larocque contributed to this report.
|
2024-06-09T01:26:36.242652
|
https://example.com/article/8115
|
// Copyright (c) .NET Foundation. All rights reserved.
// Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information.
using System;
using System.Runtime.InteropServices;
using Microsoft.AspNetCore.HttpSys.Internal;
using static Microsoft.AspNetCore.HttpSys.Internal.HttpApiTypes;
namespace Microsoft.AspNetCore.Server.HttpSys
{
internal static unsafe class HttpApi
{
private const string HTTPAPI = "httpapi.dll";
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpInitialize(HTTPAPI_VERSION version, uint flags, void* pReserved);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpReceiveRequestEntityBody(SafeHandle requestQueueHandle, ulong requestId, uint flags, IntPtr pEntityBuffer, uint entityBufferLength, out uint bytesReturned, SafeNativeOverlapped pOverlapped);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpReceiveClientCertificate(SafeHandle requestQueueHandle, ulong connectionId, uint flags, HTTP_SSL_CLIENT_CERT_INFO* pSslClientCertInfo, uint sslClientCertInfoSize, uint* pBytesReceived, SafeNativeOverlapped pOverlapped);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpReceiveClientCertificate(SafeHandle requestQueueHandle, ulong connectionId, uint flags, byte* pSslClientCertInfo, uint sslClientCertInfoSize, uint* pBytesReceived, SafeNativeOverlapped pOverlapped);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpReceiveHttpRequest(SafeHandle requestQueueHandle, ulong requestId, uint flags, HTTP_REQUEST* pRequestBuffer, uint requestBufferLength, uint* pBytesReturned, SafeNativeOverlapped pOverlapped);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpSendHttpResponse(SafeHandle requestQueueHandle, ulong requestId, uint flags, HTTP_RESPONSE_V2* pHttpResponse, HTTP_CACHE_POLICY* pCachePolicy, uint* pBytesSent, IntPtr pReserved1, uint Reserved2, SafeNativeOverlapped pOverlapped, IntPtr pLogData);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpSendResponseEntityBody(SafeHandle requestQueueHandle, ulong requestId, uint flags, ushort entityChunkCount, HTTP_DATA_CHUNK* pEntityChunks, uint* pBytesSent, IntPtr pReserved1, uint Reserved2, SafeNativeOverlapped pOverlapped, IntPtr pLogData);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpCancelHttpRequest(SafeHandle requestQueueHandle, ulong requestId, IntPtr pOverlapped);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpWaitForDisconnectEx(SafeHandle requestQueueHandle, ulong connectionId, uint reserved, SafeNativeOverlapped overlapped);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpCreateServerSession(HTTPAPI_VERSION version, ulong* serverSessionId, uint reserved);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpCreateUrlGroup(ulong serverSessionId, ulong* urlGroupId, uint reserved);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, CharSet = CharSet.Unicode, SetLastError = true)]
internal static extern uint HttpAddUrlToUrlGroup(ulong urlGroupId, string pFullyQualifiedUrl, ulong context, uint pReserved);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpSetUrlGroupProperty(ulong urlGroupId, HTTP_SERVER_PROPERTY serverProperty, IntPtr pPropertyInfo, uint propertyInfoLength);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, CharSet = CharSet.Unicode, SetLastError = true)]
internal static extern uint HttpRemoveUrlFromUrlGroup(ulong urlGroupId, string pFullyQualifiedUrl, uint flags);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpCloseServerSession(ulong serverSessionId);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpCloseUrlGroup(ulong urlGroupId);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern uint HttpSetRequestQueueProperty(SafeHandle requestQueueHandle, HTTP_SERVER_PROPERTY serverProperty, IntPtr pPropertyInfo, uint propertyInfoLength, uint reserved, IntPtr pReserved);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, CharSet = CharSet.Unicode, SetLastError = true)]
internal static extern unsafe uint HttpCreateRequestQueue(HTTPAPI_VERSION version, string pName,
UnsafeNclNativeMethods.SECURITY_ATTRIBUTES pSecurityAttributes, uint flags, out HttpRequestQueueV2Handle pReqQueueHandle);
[DllImport(HTTPAPI, ExactSpelling = true, CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern unsafe uint HttpCloseRequestQueue(IntPtr pReqQueueHandle);
private static HTTPAPI_VERSION version;
// This property is used by HttpListener to pass the version structure to the native layer in API
// calls.
internal static HTTPAPI_VERSION Version
{
get
{
return version;
}
}
// This property is used by HttpListener to get the Api version in use so that it uses appropriate
// Http APIs.
internal static HTTP_API_VERSION ApiVersion
{
get
{
if (version.HttpApiMajorVersion == 2 && version.HttpApiMinorVersion == 0)
{
return HTTP_API_VERSION.Version20;
}
else if (version.HttpApiMajorVersion == 1 && version.HttpApiMinorVersion == 0)
{
return HTTP_API_VERSION.Version10;
}
else
{
return HTTP_API_VERSION.Invalid;
}
}
}
static HttpApi()
{
InitHttpApi(2, 0);
}
private static void InitHttpApi(ushort majorVersion, ushort minorVersion)
{
version.HttpApiMajorVersion = majorVersion;
version.HttpApiMinorVersion = minorVersion;
var statusCode = HttpInitialize(version, (uint)HTTP_FLAGS.HTTP_INITIALIZE_SERVER, null);
supported = statusCode == UnsafeNclNativeMethods.ErrorCodes.ERROR_SUCCESS;
}
private static volatile bool supported;
internal static bool Supported
{
get
{
return supported;
}
}
}
}
|
2024-01-12T01:26:36.242652
|
https://example.com/article/2340
|
More Proof That The Rock Is An Awesome Dude As He Geeks Out Over Personal Note From Steven Spielberg
I love the game. I love the hustle. MP Staff Writer and Retired Rapper. Twitter: @_StephenAdamson
The Rock is pretty good at handling his own personal brand via Instagram. He's always doing some real stuff that fans can enjoy. He seems like a genuine guy, and a hard working one at that. His muscles alone make it clear that this guy works his ass off.
He also wants to share and geek out about things that happen in his life; for example, in this case, he gladly shared another awesome Instagram story that featured none other than Steven Spielberg.
Here's what Dwayne had to say to Esquire about a special "wow, I made it" moment that came courtesy of Spielberg.
“About three weeks ago, I’m here at the house and I get a letter—‘Been enjoying your movies over the years. Very entertaining. I feel like I’ve really gotten to know you over the years, most recently after watching you host Saturday Night Live. Great job. You continue to go for it. Proud of your work and look forward to meeting you. Steven Spielberg. It took me back to being just like a kid. I was so blown away.”
Here's what the Rock had to say to Esquire about his unique and resilient journey to the top:
“I never quite understood why if you’re successful in something, and then you want to make the transition to Hollywood, why wouldn’t you apply the same discipline and processes that you did with wrestling and football? Which meant: surround myself with great acting coaches; definitely get a good director; I need great actors around me to help me raise my game; I don’t know what the f–k I’m doing. I need great acting coaches, I need good directors, I need help. I have been told I have potential. I think I do. Let’s give it a go.”
The Rock is in San Andreas now, but you can also catch him in the surprisingly awesome HBO hit show Ballers on Sunday nights.
|
2024-07-04T01:26:36.242652
|
https://example.com/article/1999
|
#ifndef TRACKINGOBJECTS_PIXELDIGISIMLINKFWD_H
#define TRACKINGOBJECTS_PIXELDIGISIMLINKFWD_H
class PixelDigiSimLink;
#endif // TRACKINGOBJECTS_PIXELDIGISIMLINKFWD_H
|
2023-08-23T01:26:36.242652
|
https://example.com/article/8212
|
{
"id": "35250117",
"url": "https:\/\/collection.cooperhewitt.org\/types\/35250117\/",
"name": "hat",
"count_objects": "7",
"supersedes": "0",
"superseded_by": "0"
}
|
2023-08-09T01:26:36.242652
|
https://example.com/article/9037
|
Redshirted during the 2011 campaign . . . Played on prep level at Proviso West High School . . . Also a talented prep wrestler …… Played both defensive back and quarterback … Led the Panthers to the playoffs for the second straight season … Regarded as one of the most dynamic players in the West Suburban Silver League …… Threw for 1,720 yards and eight TD's in 2010 … Also ran for 845 yards and nine scores … Collected 30 tackles, seven pass breakups and five interceptions on the defensive side … Tabbed as an all-area selection.
|
2023-12-17T01:26:36.242652
|
https://example.com/article/5886
|
Bill Belichick, Tom Brady, and Robert Kraft release joint statement calling recent report of a power struggle within the franchise 'unsubstantiated' and 'flat out inaccurate'
Bill Belichick, Tom Brady, and Robert Kraft released a joint statement calling an ESPN report about the New England Patriots' organization "unsubstantiated, highly exaggerated or flat out inaccurate."
The statement comes in the wake of ESPN's report describing power struggles between the trio.
The statement does not reference any specific allegations as being inaccurate.
Bill Belichick, Tom Brady, and New England Patriots Chairman and CEO Robert Kraft released a joint statement on Friday, claiming that all is well with their relationship in the wake of ESPN's bombshell report detailing an apparent power struggle between the trio.
In the statement, Belichick, Brady, and Kraft accuse the report of containing "speculated theories that are unsubstantiated, highly exaggerated or flat out inaccurate" and claims that the three of them "stand united" and "share a common goal."
"For the past 18 years, the three of us have enjoyed a very good and productive working relationship. In recent days, there have been multiple media reports that have speculated theories that are unsubstantiated, highly exaggerated or flat out inaccurate. The three of us share a common goal. We look forward to the enormous challenge of competing in the postseason and the opportunity to work together in the future, just as we have for the past 18 years. It is unfortunate that there is even a need for us to respond to these fallacies. As our actions have shown, we stand united."
The Patriots' leadership does not refute any specific claims contained in the ESPN report, opting instead to point at the totality of the story.
Their statement also lines up with Wickersham's story, as the only statement that the franchise would contribute to his report was equally vague.
"The Patriots, in the only statement anyone associated with the team would make on the record for this story, responded to specific questions by saying that there are 'several inaccuracies and multiple examples given that absolutely did not occur,' though they declined to go into detail."
According to Wickersham, his reporting was based on "interviews with more than a dozen New England staffers, executives, players and league sources with knowledge of the team's inner workings."
|
2024-03-15T01:26:36.242652
|
https://example.com/article/6576
|
head applier from Avi-Glam
- Aiden light skin tone, comes in 7 other shades and can be worn with
the included eyebrows in 2 shades or without. Shown on Lelutka Bento
head Andrea - appliers available at Men Only Monthly
coat from MGmen's - ZC858, comes in 5 colors and will fit mesh and standard avatars - available at Men Only Monthly
pose from Le Poppycock - I Don't Play Nice, part of the Devils Advocate pack.
January 17, 2018
skin appliers from *Birth* - Carlos, comes in 9 skin tones, with or without hair base and facial hair - will be available at January round of Men Only Monthly starting on the 20th (shown on Catwa Daniel mesh head and Belleza Jake mesh body)
sweats from Chuck Size
- Max joggers, will fit most mesh bodies and comes with texture change
HUD for many options - will be available at January round of Men Only Monthly starting on the 20th
|
2023-11-25T01:26:36.242652
|
https://example.com/article/3350
|
The United States is urging Turkey to de-escalate tensions over its military operations in Syria and focus on the fight to defeat the Islamic State militants, amid a growing distrust between two NATO allies.
Meanwhile, Turkey is pressing the U.S. to stop its support for Kurdish fighters or risk confronting Turkish forces on the ground in Syria.
U.S.-Turkish relations have suffered another blow, with Ankara and Washington disputing each other’s version of a telephone call Wednesday between the U.S. and Turkish presidents aimed at defusing tensions over Turkish-led forces’ intervention in Syria.
Ankara has rejected Washington’s account of what U.S. President Donald Trump said to his Turkish counterpart, Recep Tayyip Erdogan, denying there was any call by Trump to de-escalate the military operation against the Syrian Kurdish militia the YPG in Syria’s Afrin enclave.
But Washington said it stands by Trump's "firm" and "tough" stand during his phone call with Erdogan.
"We stand by the president’s assertion of cautioning Turkey about the escalation of tensions in Afrin area," said State Department spokesperson Heather Nauert on Thursday.
"We certainly hope they [Turkish leaders] will listen," said Nauert, "that would be a good thing."
The White House reported Trump said the Turkish operation "risks undercutting our shared goals in Syria," and "urged Turkey to de-escalate, limit its military actions, and avoid civilian casualties and increases to displaced persons and refugees."
Turkey's President Recep Tayyip Erdogan gestures to supporters of his ruling Justice and Development Party at a rally in Bingol, Turkey, Jan. 13, 2018.
The dispute over the contents of the telephone call is exacerbating a lack of trust between the two NATO allies.
The United States has supported the YPG militia in the war against Islamic State. Ankara considers the YPG a terrorist organization linked to a Kurdish insurgency inside Turkey.
In Ankara, a governmental official said anyone supporting the YPG militia will become "a target."
"The United States needs to review its soldiers and elements giving support to terrorists on the ground in such a way as to avoid a confrontation with Turkey," said Turkey’s Deputy Prime Minister Bekir Bozdag on Thursday.
Yildirim said, "This country we call a NATO ally is in cahoots with terror organizations." He called it a grave and very painful situation, accusing the United States of working with terrorist organizations. He said Turkey will never accept this.
The prime minister’s latest comment is fueling expectations Ankara will carry out its threat to expand its operation against the Syrian Kurdish militia to Manbij. U.S. forces are deployed in the Syrian town with the YPG militia.
At the Pentagon, a spokesperson said the U.S. has not seen any indication that Turkish forces are moving toward Manbij on Thursday.
Ankara’s lack of trust in Washington is now becoming a major obstacle to resolving the Syria crisis.
U.S. Secretary of State Rex Tillerson, left, meets with Turkish Foreign Minister Mevlut Cavusoglu in Istanbul, Turkey, July 9, 2017.
Turkish Foreign Minister Mevlut Cavusoglu ruled out a proposal he said was made by U.S. Secretary of State Rex Tillerson to create a 30-kilometer security zone inside Syria to protect Turkey's southern border. Cavusoglu said until trust is restored, no deal can be made.
But Tillerson later denied he made such proposal.
"We discussed a number of possible options, but we didn’t propose anything," said Tillerson on Thursday at Davos when asked if he proposed a safe zone inside Syria to Cavusoglu when the two top diplomats met one day earlier in Paris.
Ankara is at odds with Washington on issues besides Syria.
Turkey is calling for the extradition of U.S.-based Turkish cleric Fethullah Gulen, who Ankara blames for a failed coup in 2016. The cleric, who lives in self-imposed exile in the state of Pennsylvania, denies the accusation.
Meanwhile, U.S. authorities are reportedly in the process of considering a massive fine against the Turkish state-owned lender Halkbank in connection with Iran sanctions busting, following a conviction in New York of one of its senior executives.
Erdogan has alleged the executive's conviction in the federal case is the latest attempt by the FBI and CIA to unseat him.
|
2024-07-13T01:26:36.242652
|
https://example.com/article/2762
|
Klippel-Feil syndrome, thenar hypoplasia, carpal anomalies and situs inversus viscerum.
A 27-year-old female is described with Klippel-Feil syndrome, thenar hypoplasia, carpal anomalies and situs inversus viscerum. Other anomalies occurring with Klippel-Feil syndrome are discussed.
|
2024-06-29T01:26:36.242652
|
https://example.com/article/3113
|
Do fibroids cause fatigue jacket - type 1 fibroid embolization
do fibroids cause fatigue jacket water juice fasting for fibroids
Bottom line - a year after my fibroid surgery, at 36, I got pregnant on my first try and had an adorable son.
Once the Handpiece is inserted into the fibroid, the surgeon can use controls on the Handpiece to enter information about the procedure and control the parameters of fibroid at the fundus of the uterus the treatment.
However, you may experience no symptoms or have mild symptoms, red degeneration fibroid in pregnancy but still need treatment.
But if you have fibroids and you've experienced repeated pregnancy losses, if relaxers and uterine fibroids no other causes of miscarriage can be found and if your fibroids distort the shape of your uterine cavity.
A recently published study demonstrated the relationship between vitamin D and uterine fibroids.
Focused ultrasound is a newer, noninvasive, no-incision technology that uses waves of ultrasound energy to heat and destroy fibroid tissue.
These tumors form below the uterine cavity's lining, which can cause the fallopian tubes to be blocked.
Pregnancy in itself can be hard on different women, so don't fret over something that was already there pre pregnancy.
treatment for intramural fibroids I've provided a conversion chart of ice wrapped in a kidney to it, my energy has increased three-fold.
She'd initially been referred to a gynaecologist after blood tests showed she was iron deficient, which her GP had put down to heavy periods.
That weight gain usually slows down after the first trimester when the nausea abates.
If you are closer to menopause, you may not have any regrowth or any regrowth that exhibits symptoms.
A painful lump in the breast is rather alarming, because it do fibroids cause fatigue jacket needs to be tested for malignancy.
The proper appreciation of low thyroid conditions and their subsequent treatment should aid greatly in reducing the morbidity and premature mortality of virtually all degenerative diseases.
Approximately one in five women will develop uterine fibroids during childbearing years, according to the National Institutes of Health.
The all-natural enteric coating resists the stomach's harsh acids and begins to release its enzymes in the duodenum.
Frequently, MRI can distinguish between this type of fibroid versus a more concerning ovarian mass. There may also be an option of shrinking the fibroids using a blood vessel blocking procedure done in radiology. The book was written in a language that all women going through this can understand. As with any other potential treatment option available fibroids pregnancy and period pain your uterine fibroids, it is important to weigh the risks and benefits of potential outcome for each option against your own specific condition, belief system, and overall need for resolution to your situation. Some doctors prefer assessing blood test results together with symptoms to form an individualized assessment of hormone levels. So I've done a little research, nothing intensive, to try to find out if peanut butter is okay to eat when you have fibroids. However, this doesn't necessarily mean you will develop breast cancer in the future. Fibroids that are on the outside or in the wall of the uterus can be removed this way. Stress, medication and environmental factors all heavily deplete the body of this vitamin. Fibroids can require emergency treatment if they cause sudden, sharp pelvic pain. I was about 5 weeks and on Monday, I started to have sharp pains, bleeding and blot clots. He testified that the patient's clinical picture fit perfectly with a growing fibroid and was not suspicious for cancer. The most likely diagnosis when confronted with a 4-5 cm cyst on a reproductive-age woman during an annual exam is a follicular cysts. Abdominal hysterectomy allows the surgeon to easily see pelvic organs so it is usually done when cancer of the uterus, ovaries, or cervix is suspected or based upon the patients needs and condition. He is the Medical Director of The Fibroid Treatment Center and coordinates all clinical functions of the office and surgical center for fibroid patients. However, hysterectomy is a major surgery that requires 5-6 weeks of recovery, carries the risks of a major surgery and is associated long-term adverse effects. There are natural ways to manage pain, reduce heavy menstrual bleeding, reduce foreign tissue growth and improve uterine health to aid in healing of adenomyosis. It is being studied extensively for treatment of advanced and recurrent ovarian cancer. Do not use a heated castor oil pack for uterine growths, cancer tumors, or ulcers.
fibroids inside thickened uterus wall
They require a highly skilled surgeon specializing in minimally invasive surgery. I need to keep trying because I want to have my first child with no complications due to fibroids. Since fibroids medication and herbs is also having knee pain, the back and knee pain may be a symptom of loss of ovarian hormones. The best type of study looks at a larger group of women with identical fibroids. Even though I'm not particularly maternal, I found myself tearful at the thought of a hysterectomy and just not quite ready for that. Nothing stated here is intended as a treatment for any disease or illness, and should not take the place of consulting a nutritionally conscious, informed physician.
symptoms of uterine fibroids or polyps symptoms
Making the diagnosis of fibroids is important.However, just as important is excluding other medical or gynaecological problems that may be causing the symptoms that are being blamed on the fibroid. The biological significance of these cell types in terms of paracrine actions for estrogen or progesterone signaling to smooth muscle cells is unknown. Conservative treatment of endometriosis should be attempted first and surgery is the last resort after exhausting conservative options. Another goal of liver cleansing is to begin the removal of excess copper storage. Earlier in the fibroid cysts during pregnancy cancer patients and family members of deceased patients urged the FDA to ban the use of electronic surgical tools for fibroid removal. Many women are familiar with ultrasound from pregnancy where it is used to evaluate the growing fetus.
how to get getting pregnant with fibroid tumors
Fibroids that are located extremely deep in the uterine wall may not be able to be removed, but they can be treated to help manage symptoms. The Fibroid Tumor Removal surgical procedure may take anywhere between 1-3 hours, depending upon the type of approach used. Hospitals in India are well developed to provide every facility from screening, diagnosis, treatments, medicines, surgeries and more. Dilute vasopressin is injected in multiple sites between the myometrium and the fibroid capsule. If you're over 35 and experiencing changes to your hair growth there's a good chance that this is a sign of perimenopause or what foods help fibroids Stay up to date on the latest news from Dr. As minimally invasive therapies for adenomyosis evolve, these diagnostic tools will prove invaluable in providing accurate diagnoses. Signs of an Omega 3 fatty acid are dry skin, lifeless hair, cracked nails, fatigue, depression, dry eyes, lack of motivation, aching joints, difficulty in losing weight, forgetfulness, breast pain. Studies point to increased expression of an enzyme known as aromatase in women who have fibroids. But this is our experience that, we ourselves had some Ayurvedic medicines in some emergencies also. But whether a C-section or vaginal delivery is more beneficial to women after this type of surgery is still unknown, they stated. In order to guide treatment and offer some insight into prognosis, endometrial cancer is staged into four different groups. Since nothing good ever has irregular borders , I hopelessly accepted Google's prophecy while awaiting the biopsy to confirm. It is important for heart health, prevention of Type II diabetes, hypertension, and stroke, and now we can also add fibroid health to this list. It is thought that the water soluble fiber pectin, found in apple cider vinegar, absorbs fats and cholesterol and eliminates them from the body.
iud to treat fibroids
The first symptom that relieved was the painful menstrual cramps I dealt with every month. For fibroids within the wall of the uterus, the procedure can be done through a standard abdominal incision or with a laparoscope. I just got married and was diagnosed with fibroids and would like to know if the listed protocol has any side effects for someone that is trying to conceive. In fact, it is better to abstain yourself from yoga during your monthly periods. Researchers in fibroid coming through cervix examined the role of dietary soy, fiber and related foods and nutrients on the risk of endometrial cancer. The presence of progesterone-responsive stroma, as well as other cell types, around the cancer cells may amplify the physiological effects of progesterone on epithelial tumor cells.
natural remedy to treat fibroids
Enzymes are safe to take with other supplements and prescription medications except anticoagulants such as Plavix, Coumadin, warfarin and heparin. They will be informed of the steps on how to stop abdominal pain even without drugs or pills and be guided in picking the right supplements and food combinations foods cause uterine fibroids will eliminate uterine fibroids forever and improve their body condition. At the age of 38 I had an ovarian cyst the size of a honey dew melon according to my gyn. Submucosal fibroids grow just underneath the interior lining of the uterine cavity.
does a fibroid cause bloating
Castor oil packs when used properly can help to improve various components of the immune system. There isn't a lot they can do, just have to go through the pain until the fibroid dies. More than 75 percent of women can be found to have small fibroids using MRI, a very sensitive imaging technique. Estimates show that at least 90% of women who have how to remove fibroid from uterus naturally procedure will have relief of symptoms and no return of fibroids. Clamp and divide her round ligament on the same side 2 or 3 cm from her uterus.
fibroids and stomach fat
Risks and benefits of surgery versus other techniques such as fibroid embolisation will be discussed in detail before any decision is finalised. The results of our study and many international series demonstrate the feasibility of laparoscopic and hysteroscopic myomectomy as a technique leading to remission of symptoms and a low rate of complications. I too had non-stop EXCESSIVE bleeding from ovarian cysts for 1.5yrs - I started taking iodine tablets and DIM and then the bleeding stopped 2 months after taking iodine and 3 wks after taking DIM. You can also have a choice of just filling up a glass of warm water and 2 tsp of molasses and drink up. Through first trimester ultrasounds, the team verified the presence of fibroids along with number, type, and size. If there is any doubt, it may be helpful to undertake a pelvic examination at the time that the pain is present. I was scheduled for a hysterectomy because of my many fibroids and increasing pain and bleeding. Most of the time the symptoms are bladder or bowel pressure and often heavy bleeding/anemia. Most women do not know they have uterine fibroids because they are small and cause no problems. If medication is not an option or doesn't help, your doctor may turn to surgery to relieve your symptoms. The fibroids why do uterine fibroids form stall labor or may even block the passage if located near the opening of the cervix. If POF is the result of cancer treatment, you may be coping with the trauma of your illness as well as the loss of fertility. The more significant and serious causes of Swollen Uterus or Enlarged Uterus is uterine cancer or cancer of the ovaries. Women who retain their cervix may have less bladder leakage and vaginal relaxation later in life; however, this has not been scientifically proven. A woman with a large anterior wall uterine fibroid underwent a dilation and curettage for a threatened abortion. With a change in the level of estrogen, there will be a change in the lining of your uterus, which may cause spotting. They develop under the muscles of the uterine lining and toward the endometrium. Apple cider vinegar can help the body in so many ways and it can assist in fertility issues, but if hormonal issue are the underling problems it is best to talk to a naturopath or herbalist and get more specific advice for your specific case. At my appointment yesterday the Doctor prescribed a low dose birth control bill to try to get relief for the extreme bleeding that I experience each month from the fibroid I have.
fibroid is it dangerous to drive with a bad
The food we eat includes a great effect on our overall health and also the different conditions that people are afflicted by. The good news is, regardless of your genetic makeup, there are many dietary and lifestyle choices that can increase your ability to lose weight and keep it off. You will become much more aware of your baby moving as her size and strength increase. The surgeon then pregnancy uterine can stop fibroids through this incision to cut and tie off the ligaments, blood vessels, and fallopian tubes.
ufe uterine fibroid embolization side
You may have already seen a doctor about these symptoms and are in a treatment plan. However, many women take BCPs for prolonged periods of time and do not seem to experience noticeable fibroid growth. Talk over any exercise plan with your doctor, but I'd suggest that if you have access to a pool, there's a good chance that swimming could be the next step after walking. Immediate relive from troublesome symptoms of fibroids is anticipated following this surgery. A lump that develops after you've had surgery, a breast injury, or radiation treatment may be caused by fat necrosis, or scar tissue overlying an area of fatty tissue that has been damaged. Although it is now recommended only as last option, fibroids are still the leading cause of hysterectomies in the US. Urinary problems - pressure from large fibroids on the bladder can make you feel like you need to go to the toilet more often. Nevertheless, unlike the methods based on contour evolution 11 - 14 , in which the internal energy can maintain contours smooth and 4 cm fibroid 6 5cm the segmented tumor regions in the proposed method tend to have some indentations or protuberances on the boundaries in the noisy ultrasound images used for HIFU guidance as Figs 8 and 13 show. The doctor's assistant will be applying 2 contact your health fibroids provider. Few cups of red raspberry tea have also been found beneficial in treating fibroids.
can fibroid stop menstrual period
When there are small to medium fibroids that intrude into the interior of the uterus, ablating over them does many times retard their growth, and give successful results. Most breast tumors, fibroids, small cysts or sores are simply there for a person's what are fibroids in breast The risks are minimal, but include some mild bleeding that usually resolves within a day. As well as being physically for pregnancy and supports pregnancy when it occurs. Fibroids that change the shape of your cervix can affect the number of sperm able to enter the uterus.
|
2024-02-11T01:26:36.242652
|
https://example.com/article/4964
|
Q:
mkdir Command Not Found in shell script within if loop
I have simple script below,
if [ ! -e $c ];
then
mkdir "$c"
fi
$c is containing the folder path. I got the error mkdir: command not found. please help me out.
Thanks in advance.
Navdeep
A:
can you run mkdir in your login session?
If you can, most probably the problem is caused by PATH in your script, try suing full path:
if [ ! -e $c ];
then
/bin/mkdir -p "$c"
fi
or export PATH first
PATH=/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin:/usr/local/sbin
export PATH
if [ ! -e $c ];
then
/bin/mkdir -p "$c"
fi
|
2024-04-06T01:26:36.242652
|
https://example.com/article/9556
|
1. Introduction {#sec1}
===============
The desire for the discovery of renewable liquid fuels, as well as commodity chemicals, has escalated due to the environmental impact, supply security, and decreasing total reserve of petroleum-based fuels and chemicals \[[@B1]\]. Petroleum consumption reached 37.1 quadrillion BTU in the United States in 2008, of which a large majority (71%) was used as a liquid fuel in the transportation sector \[[@B2]\]. This has lead to an increased focus to find sustainable replacements or supplements to petroleum derived diesel fuel, jet fuel, and motor gasoline \[[@B3]--[@B5]\]. The largest effort thus far has been the production of ethanol, which is often used as a supplement to gasoline but is also available in high percentage blends such as E85. Ethanol production via fermentation reached 9.2 billion gallons in the United States in 2008, an increase of over 40% from 2007 \[[@B2]\]. According to the newest Renewable Fuels Standard (RFS2) set aside in 2010, the mandate for renewable fuels production is 36 billion gallons by 2022. These renewable fuels are classified into 4 categories: cellulosic biofuels, which must be derived from renewable lignocellulosics and achieve a 60% lifecycle greenhouse gas (GHG) emission reduction over their petroleum-derived counterparts; biomass-based diesel (50% GHG emission reduction); advanced biofuels, which consist of any renewable fuel other than corn ethanol that reduces GHG emissions by 50%; total renewable fuel, of which any fuel that achieves a 20% reduction of GHG emissions is counted \[[@B6]\]. Of the biomass-derived diesel fuels, biodiesel has gained momentum as a supplement or replacement to traditional petrodiesel, with production reaching just under 700 million gallons in 2008 \[[@B2]\]. Biodiesel can be made by several methods, but is most commonly synthesized by the transesterification of oils and fat triglycerides with methanol to make fatty acid methyl esters (FAME).
Although each of these fuel alternatives provides initial platforms for biofuel development, their increased commercialization to replace petroleum is not without its limitations. Ethanol is incompatible with the current fuel infrastructure, and the supply of raw materials for biodiesel production from plant oils and waste animal fats may become a concern. These opportunities for refinement have lead researchers to look for alternative fuels and production processes to replace petroleum derived fuels, including fermentative alcohols \[[@B7]--[@B12]\], nonfermentative higher chain alcohols \[[@B13]\], isoprenoid \[[@B14]\] and lipid fuels \[[@B15]--[@B18]\], and fuels synthesized directly from CO~2~ via photosynthesis \[[@B19], [@B20]\]. These microbial-based processes are critical first steps in designing processes to provide renewable drop-in liquid fuels.
Aiding in the design and continued development of these processes, among a host of others, has been synthetic biology. Synthetic biology aims to design, synthesize, and characterize new biological elements, or redesign natural systems, that can be lumped together in a "toolbox." These elements can include promoters \[[@B21]--[@B23]\], regulatory proteins and RNAs \[[@B24]--[@B28]\], and scaffolds \[[@B29], [@B30]\]. With this "toolbox," synthetic biologists assemble these individually characterized parts into hierarchal structures to perform new, novel, or nonnative tasks \[[@B31]\], such as synthetic oscillators \[[@B32]\] and toggle switches \[[@B33]\]. This "toolbox" also allows for the investigation of several designs to achieve the same function, often with varying levels of success, as in the case of heterologous 1-butanol production \[[@B7], [@B9], [@B10]\]. This differs from traditional engineering approaches in that the design focal point is on the core components, which can be fine-tuned to meet strict guidelines for specific tasks \[[@B34]\]. Much of the work accomplished in biofuel research until now has relied on the identification of target pathways and the design of synthetic expression systems for enzymes responsible for fuel production. As these technologies progress and mature, the design, implementation, and optimization of new functions, as well as the upgrading and rewiring of existing components, will be essential for the successful discovery and production of new biofuels, as many challenges still limit their productivity. This review will investigate recent progress made in the microbial production of biofuels to supplant petrodiesel and motor gasoline and will discuss how existing and newly developed synthetic biology tools may aid in the advancement of these processes.
2. Current Biofuels Research {#sec2}
============================
2.1. Traditional Fermentative Processes {#sec2.1}
---------------------------------------
Ethanol, isopropanol, and 1-butanol are the only naturally produced alcohol biofuels. Isopropanol can be used directly as a fuel supplement to gasoline or as a feedstock for the transesterification of fats into biodiesel \[[@B35]\]. Both isopropanol and 1-butanol are produced in a mixed product fermentation in various strains of *Clostridium*\[[@B36]\], with maximum production levels reaching 2 g/L and 20 g/L, respectively \[[@B37], [@B38]\]. With a renewed interest in alternative fuels, the production of isopropanol and 1-butanol has been recently investigated in genetically tractable heterologous organisms. These organisms, such as *Escherichia coli* and *Saccharomyces cerevisiae*, facilitate the design and optimization of new biofuels processes by combining an increasing synthetic biology toolbox with a well-studied metabolism. Isopropanol production in *E. coli* has surpassed that of *Clostridium* by assembling the pathway for acetone production and a secondary alcohol dehydrogenase \[[@B8], [@B12]\]. The production of 1-butanol, however, has proven to be more difficult. Initial efforts were able to produce \~0.5 g/L using *E. coli* as a host \[[@B7]\]. Construction of a new strain harboring a single construct resulted in an increase in production to 1.2 g/L \[[@B9]\]. In addition to *E. coli*, 1-butanol production has been investigated in *Pseudomonas putida*, *Bacillus subtilis*, and *S. cerevisiae* \[[@B10], [@B11]\], although production in *E. coli* has thus far shown the most promise. Each of these processes, however, is far from industrial feasibility, as yields (\~0.05 g/g) and productivities (\~0.01 g/L/h) must increase significantly to match the same figures for corn ethanol (\~0.5 g/g and 2 g/L/h). The advancement of these processes is thought to be limited by the low activity of pathway enzymes due to poor expression, solubility, or oxygen sensitivity, as well as the metabolic imbalance introduced by these heterologous pathways. While productivity in each of these platforms is low in comparison with Clostridial fermentation, the ability to engineer and manipulate these user-friendly hosts will facilitate the development of these processes.
2.2. Nonfermentative Higher Alcohols {#sec2.2}
------------------------------------
The production of biofuels from native organisms can present unique challenges to synthetic biologists as oftentimes the availability of genetic tools and physiological knowledge of the hosts is limited. Additionally, the engineering of heterologous hosts for biofuel production may decrease the overall fitness of the cell and require delicate pathway balancing that is oftentimes difficult \[[@B7]\]. It is therefore advantageous to use native pathways to generate immediate precursors for biofuel production. This was accomplished in *E. coli* by using the hosts\' amino acid biosynthesis pathways to generate 2-keto acid precursors, which can be converted to alcohols through a single heterologous reaction ([Figure 1](#fig1){ref-type="fig"}). These alcohols can serve as direct replacements to gasoline, or can be polymerized to form a variety of potential fuel molecules \[[@B39]\]. Expression of keto acid decarboxylase (KDC) from *Lactococcus lactis* enabled *E. coli* to convert these 2-keto acids to aldehydes, which can be reduced to alcohols using alcohol dehydrogenase (ADH) \[[@B13]\]. A total of 6 of these higher chain alcohols were detected after expression of KDC. The production of isobutanol, in particular, was able to surpass 20 g/L after host optimization and amplification of genes responsible for the synthesis of 2-ketoisovalerate, the precursor to both isobutanol and valine \[[@B13]\]. Subsequent efforts have also been made to engineer the production of 1-propanol and 1-butanol \[[@B40]\], 2-methyl-1-butanol \[[@B41]\], and 3-methyl-1-butanol \[[@B42]\].
An alternative and more direct route to 2-ketobutyrate, the citramalate pathway from *Methanococcus jannaschii*, was utilized to produce 1-butanol and 1-propanol independently of threonine. By leveraging a growth selection based on a requirement for 2-keto acids, the directed evolution of citramalate synthase was able to enhance the activity of this heterologous pathway and increase the production of 1-propanol and 1-butanol by 9-fold and 22-fold, respectively \[[@B43]\]. These pathways were also expanded to produce longer chain alcohols from nonstandard 2-keto acids. These longer chain alcohols can be used as commodity chemicals and also possess advantageous fuel properties similar to other high chain alcohols. The leucine biosynthesis pathway was engineered to catalyze the elongation of larger substrates by mutation of LeuA \[[@B44]\]. Similarly, KDC was also designed to fit larger substrates, after which *E. coli* was able to produce several longer chain alcohols from C5--C8 from these nonstandard 2-keto acids \[[@B44]\].
One distinct advantage in the production of these alcohols is the ability to apply existing amino acid production technology. Amino acids are produced microbially from several microorganisms, yet *Corynebacterium glutamicum* has been the most successful host for the production of many amino acids, including valine \[[@B45]\]. In addition to industrial success in amino acid production, *C. glutamicum* shows an increased tolerance to isobutanol relative to *E. coli*, making the production of isobutanol from *C. glutamicum* promising. Optimization of the host by gene deletion and overexpression of isobutanol synthesis genes resulted in the production of 4.9 g/L of isobutanol from glucose \[[@B46]\]. Similarly, an amino acid strain development technique was adapted for the production of 3-methyl-1-butanol (3 MB), which shares a common precursor with leucine. Whole cell mutagenesis and selection with a leucine analogue resulted in a strain able to produce 2.8 g/L 3 MB, greater than a 5-fold improvement from wild-type (WT) \[[@B47]\]. Addition of an in situ extraction technique to remove 3 MB from the aqueous culture media resulted in the production of 9.5 g/L of 3 MB \[[@B47]\].
2.3. Isoprenoids {#sec2.3}
----------------
Isoprenoids represent a diverse group of hydrocarbons synthesized from the C5 isomers isopentyl diphosphate (IPP) and dimethylallyl diphosphate (DMAPP). These precursors can be produced from acetyl coenzyme A (CoA) via the mevalonate pathway or from glyceraldehyde-3-phosphate and pyruvate through the methylerythritol pathway (MEP) ([Figure 1](#fig1){ref-type="fig"}). Isoprenoids are found naturally as hormones, photosynthetic pigments, and a variety of other specialized secondary metabolites, and have been previously investigated as nutraceuticals \[[@B48]\] and pharmaceuticals \[[@B49]\]. Because isoprenoids possess vast structural diversity, including saturated, unsaturated, branched, or cyclic alkenes or alkanes, their potential as fuel candidates, such as isopentenol (C5) for motor gasoline, or farnesene (C15) for diesel fuel, is promising \[[@B3]\].
Recently, the production of isopentenol (3-methyl-3-buten-1-ol or 3-methyl-2-buten-1-ol), a C5 unsaturated alcohol, has been investigated in *E. coli*. Isopentenol can be produced by the dephosphorylation of the isoprenoid building blocks IPP and DMAPP ([Figure 1](#fig1){ref-type="fig"}). By screening a *Bacillus subtilis* genomic library for relief of prenyl diphosphate (IPP and DMAPP) accumulation, two isopentenol biosynthetic genes, *nudF* and *yhfR*, were identified \[[@B14]\]. By overexpression of *nudF* in a previously optimized strain \[[@B50]\], production of isopentenol reached 110 mg/L \[[@B14]\]. Although the production of isoprenoid fuels is still limited, synthetic biology can provide the framework for improving isopentenol production as well as the development of processes for other potential isoprenoid fuels.
2.4. Lipids {#sec2.4}
-----------
The fatty acid biosynthesis pathways are of great importance to the production of renewable fuels. Fatty acids are commonly used now in the synthesis of biodiesel, and the production of long chain alkanes, alkenes, aldehydes, and alcohols offer promise in the development of alternative diesel and jet fuels. The fatty acid elongation cycle begins with the carboxylation of acetyl-CoA to malonyl-CoA. After transacylation of acetyl-CoA and malonyl-CoA to acyl carrier protein (ACP), acetyl-ACP and malonyl-ACP are condensed into acetoacetyl-ACP. After a reduction, dehydration, and second reduction reaction, a saturated fatty acyl-ACP (butyryl-ACP) is formed. In each subsequent elongation cycle, malonyl-ACP is condensed with the saturated fatty acyl-ACP to add 2 carbons to the growing hydrocarbon. After elongation, these hydrocarbons can be released as free fatty acids by a thioesterase. Additionally, fatty acyl-CoA can be reduced to a fatty aldehyde, which itself can be reduced to a fatty alcohol, or decarbonylated to an alkane or alkene \[[@B51]\] ([Figure 1](#fig1){ref-type="fig"}).
The microbial production of biodiesel has been approached from two angles First, by producing short chain alcohols and performing the transesterification *in vivo* with exogenously added fatty acids, and second, by producing free fatty acids that can be harvested for transesterification *in vitro*. The *in vivo* production of biodiesel using endogeneously produced ethanol was recently demonstrated in *E. coli*. Expression of the ethanol production pathway from *Zymomonas mobilis*, along with a broad substrate range acyltransferase (AtfA) from *Acinetobacter baylyi*, lead to the production of 1.3 g/L of fatty acid ethyl esters (FAEE) after addition of exogenous oleic acid \[[@B18]\].
Research on the production of fatty acids have centered around the discovery of oligeanous algae, yeast, and even bacteria, in which the lipid content, mainly composed of triacylglycerols (TAG), can reach 60%--80% of the total biomass produced \[[@B51], [@B52]\]. The identification of the genetic elements involved in fatty acid synthesis and the implementation and development of synthetic biology tools to facilitate strain development will become critical for process refinement \[[@B51]\]. Recently, efforts have also been made to produce fatty acids from user-friendly organisms such as *E. coli*. The overexpression of an endogenous and exogenous thioesterase along with acetyl-CoA carboxylase in a Δ*fadD* strain resulted in the production of 2.5 g/L of fatty acids from glycerol \[[@B16]\]. By redesigning the expression of these genes the production of fatty acids was increased to 4.5 g/L at a 6% yield with a specific productivity of 0.04 g/h/g dry cell weight \[[@B17]\].
Although each of these approaches has been successful in producing precursors for biodiesel synthesis, the supply of raw materials (lipid) or downstream processing (transesterification) can be cost-intensive \[[@B18]\]. It would be advantageous, therefore, to create a consolidated process to reduce costs. Consolidated bioprocessing (CBP), which involves the simultaneous production of saccharolytic enzymes with the hydrolysis of pretreated biomass and the fermentation of hexose and pentose sugars \[[@B53]\], significantly reduces processing costs by converting abundant, inexpensive biomass into useful fuels or chemicals in a single step. Unfortunately, no organisms possess both the ability to digest lignocellulosic biomass and ferment sugars to fuels at high yields. The solution to this challenge is being approached in two directions: the introduction of high yield fuel production pathways into cellulolytic organisms, and the engineering of substrate (lignocellulosic) utilizing pathways into organisms with superior product formation. Much of the work until this point has focused around the production of ethanol \[[@B53], [@B54]\], until recently when this strategy was applied by engineering *E. coli* for the production of biodiesel (FAEE), fatty alcohols, and wax esters \[[@B15]\]. *E. coli* was chosen as a host due to its high fatty acid synthesis rate (0.2 g/L/h/g dry cell mass \[[@B51]\]) and straightforwardness in genetic manipulation. As in previous studies, the ethanol production pathway from *Z. mobilis* (*pdc*, *adhB*) was overexpressed to produce ethanol for FAEE production. By combining this pathway with a cytosolic version of an endogenous thioesterase ('*tesA*) and an ester synthase from *A. baylyi* (*atfA*), a fatty acid oxidation deficient strain of *E. coli* (Δ*fadE*) was able to produce 37 mg/L of FAEE directly from glucose \[[@B15]\]. To increase the production of FAEE, two CoA ligases, *fadD* from *E. coli* and *FAA2* from *S. cerevisiae*, were overexpressed along with another copy of *atfA* to bring production of FAEE up to 674 mg/L \[[@B15]\]. In order to mitigate the cost of processing of raw cellulosic biomass into refined sugars, this process was engineered to use xylan, a pentose polysaccharide component of hemicellulose. Expression of the endoxylanase *xyn10B* from *Clostridium stercorarium* and the xylanase *xsa* from *Bacteroides ovatus* as chimeras with OsmY allowed *E. coli* to grow on xylan as a sole carbon source \[[@B15]\]. Assembly of the xylan degradation pathway with the previously described FAEE production strain resulted in a strain able to produce 12 mg/L of FAEE from xylan \[[@B15]\]. Future work may focus on the development of secreted cellulases to increase the substrate utilization capacity of *E. coli*, in addition to optimizing the fatty acid pathway by prospecting for enzymes or expression systems with increased activity or stability. This work demonstrates the first consolidated process for the production of fatty acid based fuels and chemicals from complex polysaccharides, and while the process yields and productivity remained to be improved to merit commercialization, this work gives engineers and synthetic biologists the foundation to advance this process.
2.5. Direct Incorporation of CO~2~ {#sec2.5}
----------------------------------
The role of photosynthesis in any biofuel production process is critical. Many current technologies, such as biomass derived biofuels and algal lipids, have received attention as viable fuel replacement technologies \[[@B55], [@B56]\], yet rely on intermediate stages to incorporate CO~2~ or recover biomass to process precursors into useable fuels, which can increase costs. Photosynthetic organisms such as cyanobacteria, algae, and plants use light energy to generate reducing power to directly incorporate CO~2~ into organic metabolites. The use of these organisms to directly produce fuels can limit production costs and CO~2~ emissions during intermediate processing, and may also help reduce net CO~2~ emissions by scrubbing CO~2~ enriched flue gases from traditional power plants and producing useful fuels or chemicals, although their potential is not limited to this scenario. Initial efforts have focused on the production of ethanol in *Rhodobacter* \[[@B57]\] and *Synechococcus* \[[@B58]\].
The production of advanced biofuels such as isobutyraldehyde, isobutanol, and isoprene has recently been investigated in cyanobacteria. This was first demonstrated by transferring the 2-keto acid pathways to higher chain alcohols into the cyanobacterium *Synechococcus elongatus* ([Figure 2](#fig2){ref-type="fig"}). Isobutyraldehyde was chosen as an initial target since its boiling point (63°C) allows it to be easily stripped from the culture medium, thus avoiding any toxicity effects. Chromosomal integration of 2-ketoisovalerate biosynthesis genes (*alsS*, *ilvCD*) and 2-ketoisovalerate decarboxylase (*kivd*) resulted in the production of 723 mg/L of isobutyraldehyde from dissolved CO~2~ (NaHCO~3~) \[[@B19]\]. To improve the low activity of ribulose-1,5-bisphophate carboxylase/oxygenase (RubisCO), the *rbcLS* genes from a similar cyanobacterium were integrated downstream of the endogenous *rbcLS* genes. Production of isobutyraldehyde in this strain was elevated to 1.1 g/L, with a productivity of 6.2 mg/L/h \[[@B19]\], an encouraging figure considering microalgal biodiesel has been estimated to be near 4 mg/L/h \[[@B19]\]. The production of isobutanol was also investigated by expressing the NADP^+^ dependent alcohol dehydrogenase YqhD from *E. coli*. The production of isobutanol reached 450 mg/L, and although encouraging, is currently thought to be limited by end product toxicity \[[@B19]\].
A similar study was also recently conducted in which the isoprenoid biosynthesis pathways were exploited for biofuel production in the cyanobacterium *Synechocystis* sp. PCC6803 ([Figure 2](#fig2){ref-type="fig"}). The volatile hydrocarbon isoprene, most notably produced in plants \[[@B59]\], is a potential feedstock for biofuel or chemical production. The *ispS* gene from kudzu vine (*Pueraria montana*), encoding for an isoprene synthase, which catalyzes the conversion of DMAPP to isoprene, was codon optimized and cloned into *Synechocystis* under the control of a light dependent promoter. Expression of *ispS* under high intensity light resulted in a small accumulation of isoprene (50 *μ*g/day/g dry cell mass) \[[@B20]\] relative to healthy oak leaves (\~1,650 *μ*g/day/g dry cell mass) \[[@B60]\], demonstrating that while successful, this process remains to be improved.
A significant obstacle to biofuel production in photosynthetic organisms is the design of scale up processes. Photosynthetic organisms require more complex reactor designs and their growth and productivity in suboptimal conditions (temperature, salt concentration, etc.) is not well understood. However, two reactor designs in use today, the raceway pond and the photobioreactor, have shown promise in their ability to accumulate photosynthetic biomass using sunlight \[[@B61]\]. The raceway pond is inexpensive and simple to construct, but it is subject to contamination and is less photosynthetically efficient than a photobioreactor. Photobioreactors, having several designs \[[@B62]\], have increased capital costs compared to raceway ponds, but have superior productivities due to their increased biomass concentration, and therefore, greater photosynthetic efficiency. Hybrid systems comprised of both raceway ponds and photobioreactors have also been investigated to maximize the advantages of each design \[[@B62]\].
3. Synthetic Biology for Biofuels {#sec3}
=================================
Synthetic biology is an increasingly expanding discipline focusing on the design and construction of artificial systems to achieve a desired goal. These systems are derived from the assembly of standardized components in a hierarchal manner to create a population of programmed cells carrying out a desired function \[[@B31]\]. For biofuels, this is of particular interest as the production of these chemicals requires efficient integration of foreign genes and pathways into central metabolism. Delicate optimization and fine-tuning of these processes to maximize productivity and yield is of equal concern as the viability of any biofuel processes is extremely sensitive to production costs \[[@B3]\], such as raw material supply, total production, and downstream processing. Synthetic biology can provide tools and design principles to guide the development of such processes ([Figure 3](#fig3){ref-type="fig"}).
A goal of synthetic biology is to create a library of biological parts that can be used independently or as part of a larger assembly for a higher function. These biological parts can have simple or complex behaviors relayed through a variety of outputs such as gene expression. A simple but powerful example is the design of synthetically regulated promoters \[[@B21]--[@B23]\] to accurately control gene expression. More complex examples include the modulation of the expression of multiple genes through tunable intergenic regions (TIGR) \[[@B27]\], the activation and silencing of gene expression by riboregulators and ribozymes \[[@B24], [@B26], [@B28]\], or successive increases in gene expression through chromosomal amplification \[[@B63]\], which will become particularly important in the design of stable strains for industrial biofuel production. Additionally, thermodynamic models have been developed to rationally design ribosome binding sites to achieve robust expression levels varying by as much as 100,000 fold \[[@B64]\]. Preliminary designs for these biofuel gene expression systems will need to evolve to regulate and fine-tune the gene expression of these pathways, as was previously discovered for isoprenoids, a pathway discussed earlier for biofuel production \[[@B65]\]. Synthetic biology has also achieved the adaptation of posttranslation systems to regulate enzyme activity such as allosteric protein gates \[[@B25]\] and synthetic scaffolds \[[@B30]\].
The balance between the metabolic capacity of biofuel production pathways and host fitness will also play a key role in the productivity and yield of the process. This balancing of biofuel pathways, which aims to maximize the flow of carbon toward product formation without drastically altering the metabolic load or intracellular cofactors (NAD(P)H, ATP, ACP, etc.) can be achieved through the use of these synthetic biology tools. This was again demonstrated in the mevalonate pathway to isoprenoids by employing a synthetic scaffold to increase the metabolic capacity while limiting protein expression \[[@B29]\]. In addition to the balancing of biofuel production pathways, the expression of multienzyme complexes, which often require delicate balancing of catalytic subunits, is of great importance. The most direct example is the production of complexed cellulases, which will be crucial to increase the substrate utilization capacity of biomass-based biofuel processes.
The regulation of flux through divergent or branched pathways will also be critical, as the balance of carbon and electronic cofactors such as NADH must be considered to achieve an efficient process. These divergent pathways are especially common in the nonfermentative higher chain alcohol and isoprenoid pathways. To direct carbon flow in the desired manner, scaffolds can be engineered to connect the preferred branches of the pathway together. Regulatory RNA molecules can also be employed to minimize the expression of competing but essential pathways. Product yields may also be dramatically affected by the availability of NADH or NADPH. One possible solution is to engineer pathways with alternative cofactor specificity to increase their availability \[[@B66]\] or interconversion \[[@B67]\].
Synthetic biology will also be key in rewiring existing regulation. The design of new regulatory pathways from synthetic genetic elements will be important in sensing the extracellular or intracellular environment and producing a programmed cellular response. For biofuel production from lignocellulosic biomass, this is of great importance as the efficient uptake of a mixture of hexose and pentose sugars simultaneously is desirable. Synthetic biology can provide tools to construct new circuits devoid of unwanted regulation from the bottom up \[[@B68]\] to sense the extracellular environment and produce the necessary response to digest the sugars. Ultimately, the bottom-up construction of biological circuits may extend beyond individual pathways toward all of metabolism, as the synthesis of entirely synthetic, replicable, and functional genomes has recently been accomplished \[[@B69]\]. In the future, this will allow synthetic biologists to build heterologous pathways into organisms devoid of unwanted pathways or properties, therefore, increasing the selectivity and yield of the process.
The development and optimization of many aspects of biofuel production technology can benefit from the work already accomplished through synthetic biology. As the number of available tools increases, the standardization of these parts will become increasingly important. One of the current challenges facing synthetic biology is the reproducibility of the developed tools in different systems, as the variability in cellular regulation and physiology can vary greatly from host to host. Proposals for standardization have been made \[[@B70]\], although as the complexity of these systems increase so will their variability. However, current technology developed by synthetic biology has already allowed for the successful design of many heterologously expressed biofuel production and substrate utilization pathways extending beyond the most user-friendly organisms. The advancement of synthetic biology toward new diagnostic tools and high throughput screening systems will aid in the further development of these biofuel processes for pathway optimization and enzyme discovery or improvement. The success that synthetic biology has already afforded biofuel production technology lends confidence to future synergistic developments and breakthroughs.
4. Conclusions {#sec4}
==============
The desire for renewable liquid fuel replacements to petroleum has steadily increased with concerns about the current fuel economy\'s stability and environmental impact. The development of new biofuel production processes has sought to mitigate some of these issues. These fuels, whether designed for motor gasoline, diesel fuel, or jet fuel, will face challenges in strain development and productivity in a cost-sensitive market. The integration of synthetic biology with the development of these processes will be significant in bringing the biofuels industry from its infancy to a commercially viable alternative to petroleum.
{#fig1}
{#fig2}
{#fig3}
[^1]: Academic Editor: Patrick Cirino
|
2024-05-07T01:26:36.242652
|
https://example.com/article/6669
|
What the price of coal means
As the price of oil has soared, so has that of coal. Both are demand-led. This is a very strong hint from the market that calls to phase out coal in the near future are doomed. Since CCS makes no commercial sense in the absence of meaningful CO2 limits, that too is doomed.
Just thought you ought to know 🙂
Share this:
Like this:
Related
52 thoughts on “What the price of coal means”
The issue with replacing something where capital has already been sunk is that the operating costs of the new systems have to be lower by enough that the cost of the capital to build can be recovered. In short, you got the wrong end of the stick.
Peabody, the largest US coal producer, announced record profits today on rising demand. I agree with W here – coal is not going to price itself out of the market. It will price itself to the point at which people will continue to buy it, and no more. That’s how markets work.
And whoever made that comment was perfectly correct, Sam-Hec. Following the replacement of whale oil by crude, we’ve had over 100 years of very cheap oil. We’ll get at least another 100 years of cheap coal (probably several times that).
The issue with whale oil is that supply, while still ample, was unable to meet growing demand. Demand found something else compatible. Coal produces electricity…lots of other things are compatible with that same demand. Coal need only price itself too high for a short while to make itself irrelevant, no matter how much there is left.
And then there is the issue of clean-up costs (mercury, CO2, ruined mountains and rivers etc; which if accounted for seals its fate, preferably in the ground.
Only subsidies and protection from having to clean up is what is keeping us from the post-coal age.
The issue is not what the price of coal is, it is what the price of extraction is or the price of extraction plus any taxes on the externalities that coal causes. If that price is above the cost of alternative energy sources, then there will be investment into the alternatives, if not, no one will invest because the price of coal has room to move downwards and wipe out their investment. That is what happened in the 1980s with oil and alternative fuels.
Mugwump,
“We’ll get at least another 100 years of cheap coal (probably several times that).”
Improbable, likely a massive overestimate.
The most dramatic example of unexplained changes in data is the downgrading of the proven
German hard coal reserves by 99 percent (!) from 23 billion tons to 0.183 billion tons in 2004.
Poland has downgraded its hard coal reserves by 50 percent compared to 1997 and has downgraded its lignite and subbituminous coal reserves in two steps to zero since 1997.
For some countries such as Vietnam proven reserves have not been updated for up to 40 years. The data for China were last updated in 1992, in spite of the fact that about 20 percent of their then stated reserves have been produced since then,
There’s some good news:
Indian hard coal reserves have been upgraded…
Australian hard coal reserves have been upgraded…
But:
All other countries have individually downgraded their hard coal reserves by a combined 35 percent over the same period. In the global sum, hard coal reserves have been downgraded by 15 percent.
From the Energy Watch Group’s 2007 Coal report, they also conclude that:
“Global coal production to peak around 2025 at 30 percent above present production in the best case.”
It’s notable you didn’t address methodology or the other people coming to similar conclusions with different methods.
If we’re not at peak oil then the current blip is just a blip. Yeah? Only a complete idiot like me would have bugged out of the stock markets completely, anticipating that we’re on the verge of a succession of recessions/depressions and international instability.
With your take on this should you not buy shares? Take out loans to buy shares. If you can find someone to borrow from, remortgage your house, and buy shares in the same sectors that have done well in the last decade. After all talk of peak oil/gas/coal is nought but scaremongering by alarmists…
Ok. There’s no attainable political solution for peak [insert favourite fossil fuel here] because the markets will sort it out far more efficiently. Look how SUV consumption fell off a cliff in the US when gas hit $4 a gallon; no government could have made that happen.
As for attainable political solutions to AGW: it’s hard to sell a solution to a non-existent problem.
“A number of influential people in Russia, China, India, Indonesia and Vietnam say the planet is now entering a 30-year cooling period, the second half of a normal cycle driven by cyclical changes in the sun’s output and currents in the Pacific Ocean. Their theory leaves true believers in carbon catastrophe livid.
To judge by actions, not words, the carbon-warming view hasn’t come close to persuading a political majority even in nations considered far more environmentally enlightened than China and India. Europe’s coal consumption is rising, not falling, and the Continent won’t come close to meeting the Kyoto targets for carbon reduction. Australia is selling coal to all comers.”
The only way to compete with coal cost and 24/7 availability is with nuclear. If we are going to do nuclear big time let’s use “green” nuclear. Thorium is the “green” nuclear.
This technology was demonstrate in the 50’s and 60’s but was abandoned because it was much harder to produce weapons grade material (compared to uranium). The military considerations favored the uranium fuel cycle.
More specifically LFTR (liquid fluoride thorium reactors) compared to uranium reactors burn fuel 100x more efficiently without reprocessing, result in ~100x less waste and are inherently safer and should cost less to build.
In addition, since LFTR is a high temp low pressure process it can use water or air cooling. Thus areas where water is scarce, could replace there coal fired plants with low cost, clean thorium power plants. Much more cost effective and reliable than the wind and solar plants.
With what magic wand will the markets replace fossil fuel energy? Sorry but I’m not convinced we have a replacement (unless we can crack fusion). For the same reason I’ve never been convinced we can replace fossil fuels in the face of the risks of climate change.
On that subject; as I have been saying for years, UK claims to have reduced emissions are not founded when “emissions exportation” is accounted for: BBC “UK in ‘delusion’ over emissions” http://news.bbc.co.uk/1/hi/sci/tech/7536421.stm Our emissions reductions have occurred as our manufacturing base has dwindled.
Demand destruction, it’s just an economic term. When it applies to non necessities like walkman, cars, holidays abroad it’s an inconvenience. When it applies to food and fuel it can be a killer. There’s a common factor in many revolutions – lack of food. More than that, what will be the psychological impact on a culture that assumes continued growth and technological advancement?
Deny cimate change all you like, the science is clear it’s ongoing and poses a risk. But in the last few months I’ve been persuaded that Peak Oil/Gas is a more immediate and greater threat.
The markets (people) will only give up coal when they are given an acceptable alternative.
Thus far, do without, wind, solar, … is not cutting it.
It seems to me that if one really believes co2 is harmful then more nuclear is the most realistic alternative to coal. It seems nations are not going to give up low cost 24/7 energy (see Forbes link below). Its coal or nuclear.
“A number of influential people in Russia, China, India, Indonesia and Vietnam say the planet is now entering a 30-year cooling period, the second half of a normal cycle driven by cyclical changes in the sun’s output and currents in the Pacific Ocean. Their theory leaves true believers in carbon catastrophe livid.
To judge by actions, not words, the carbon-warming view hasn’t come close to persuading a political majority even in nations considered far more environmentally enlightened than China and India. Europe’s coal consumption is rising, not falling, and the Continent won’t come close to meeting the Kyoto targets for carbon reduction. Australia is selling coal to all comers.”
As we’re seeing now with oil, you don’t need to get past peak to suffer deleterious effects. And as coal becomes more of an attractive option it’s use will increase, which will bring peak coal forward. Bad news if those who say it’s as early as 2030 are right.
People can believe in a continuing cooling with the same fervour they believe in God, Santa or the Tooth Fairy. Have they any formal models to support their claims?
Umm, look out the window Cobblers. The temperature has declined and continues to do so. Now, that does not disprove the global warming alarmists but I know of no model that predicted this. The problem with the models is they have very little (if any) predictive skill. That’s what most skeptics (like me) object to.
[Errmmm… hasn’t this got a bit silly? How would looking out of the window help you assess global temperature? As to the fabled temperature declines… month to month variation is, of course, part of all the GCMs, though aparently a part you don’t know about; the long-term trend remains positive -W]
As for market power: replacing oil is easy: nuclear. Use up all the old plutonium from the bombs first, then the uranium, then thorium. That should buy us a couple of hundred years in which to perfect solar/fusion. For those industries that must have fossil fuels (eg aviation), make it from coal.
None of this requires a government mandate. Just wait for pricing pressure to make it economical. That’s the power of markets.
“As for market power: replacing oil is easy: nuclear. Use up all the old plutonium from the bombs first, then the uranium, then thorium. That should buy us a couple of hundred years in which to perfect solar/fusion. For those industries that must have fossil fuels (eg aviation), make it from coal.”
We have 1000s of yrs of fuel for thorium nuclear. That is from just known reserves. IF the price went up and we started looking for it we would find a lot more. 3-4x more thorium out there than uranium.
“A number of influential people in Russia, China, India, Indonesia and Vietnam say the planet is now entering a 30-year cooling period, the second half of a normal cycle driven by cyclical changes in the sun’s output and currents in the Pacific Ocean. Their theory leaves true believers in carbon catastrophe livid.
To judge by actions, not words, the carbon-warming view hasn’t come close to persuading a political majority even in nations considered far more environmentally enlightened than China and India. Europe’s coal consumption is rising, not falling, and the Continent won’t come close to meeting the Kyoto targets for carbon reduction. Australia is selling coal to all comers.”
Errmmm… hasn’t this got a bit silly? How would looking out of the window help you assess global temperature?
“looking out the window” is a metaphor for “go measure it”. Cobblers asked “Have they any formal models to support their [cooling] claims?” which is irrelevant since the physical reality is the world is cooling, regardless of what any of the models say.
[background: when my wife or kids ask me “what’s the weather today?” I usually respond with “look out the window”. Nope, they don’t find me very amusing either…]
As to the fabled temperature declines… month to month variation is, of course, part of all the GCMs, though aparently a part you don’t know about; the long-term trend remains positive
Most AGW alarmists define “long-term” to be “since it was last a lot colder than today”. Obviously such a statement is vacuous.
More recently, we’ve seen a decade of gradual cooling, not just month-to-month variation. Show me a climate model that predicted that before the fact (ie back in the 1990s – no doubt the alarmists are furiously tweaking their models as we speak in order to come up with ex post facto fits to the current cooling, an effort they’ll no doubt succeed in given the overparameterized nature of the models, but such fits will prove nothing)
[I’m afraid I can’t see the trend line on that. If you mean, are there any 10 year periods when the monthly start temp is higher than the monthly end temp in the GCM simulations of the last 20 years, then the answer is yes, so I’m still failing to see your point -W]
If you mean, are there any 10 year periods when the monthly start temp is higher than the monthly end temp in the GCM simulations of the last 20 years, then the answer is yes, so I’m still failing to see your point -W
What do the psychologists call it when people ignore all evidence contradicting their deeply-held beliefs?
Obviously we’re not just talking about a difference between the monthly start and end temps, since in this case it is a whopping -0.71 degrees C. From that graph, if I had to bet, I’d say the decadal trend is currently negative.
There’s no way you can get a statistically significant positive trend from the final decade of that graph (and to head off the next most likely reply, there’s no way the negative trend is statistically significant either).
Hence my choice of language: “From that graph, if I had to bet, I’d say the decadal trend is currently negative.”
[Its already been pointed out to you that the trend is positive. Why are you so desperate to find a negative trend? We all know that the trend is upwards. Arguing otherwise is just stupid. If you don’t like global warming, argue about its economic impact. Don’t argue about the observations. Be a skeptic not a septic -W]
[Its already been pointed out to you that the trend is positive. Why are you so desperate to find a negative trend? We all know that the trend is upwards. Arguing otherwise is just stupid. If you don’t like global warming, argue about its economic impact. Don’t argue about the observations. Be a skeptic not a septic -W]
WTF? The only statistically justifiable claim about the trend from 1998 is that it is *zero*. Not positive. Arguing otherwise is just stupid. Your claim that it is positive is simply false. If you “all know that it is upwards” then you’re more deluded than I realized.
That said, if forced to bet, I would say that the trend since 1998 will turn out to be negative once there are enough years to measure it with any significance. Why would I bet that? Because of the huge plunge in temperature over the last couple of years.
The only statistically justifiable claim about the trend from 1998 is that it is *zero*. Not positive. Arguing otherwise is just stupid. Your claim that it is positive is simply false.
Wrong, wrong, wrong!
The only demonstrably false statement is your original claim that “we’ve seen a decade of gradual cooling, not just month-to-month variation”.
Any of the following statements would be true:
(1) The past 10 years’ data show a positive trend.
(2) The past 10 years’ data show a positive trend, but one that is not significantly different from 0 at 95%.
(3) The past 10 years’ data do not show a trend that is significantly different from 0 at 95%.
But your claim — that the data show a cooling trend — is objectively and indisputably false.
And, thus, it’s perhaps not surprising to see you now backpedaling. You’re trying to rephrase your original claim in a form that is currently untestable: you now are simply speculating that “future” data will show a negative trend. Maybe they will, maybe they won’t, but that is not what you originally claimed.
The HADCRUT data currently run through June, and the RSS data run through July. In either case, import the data into any statistics package or spreadsheet, extract the most recent 120 months’ data, and use linear least squares analysis (http://en.wikipedia.org/wiki/Least_squares) to determine the best-fit model for the data.
You should find a positive slope of 0.457 K/century using the HADCRUT data, or a positive slope of 0.715 K/century using the RSS data. Neither of these is statistically significant at 95%, even without correction for temporal autocorrelation. Many different approaches could be used to model and compensate for autocorrelation, but this is irrelevant, since they’ll only affect the uncertainty estimate for the trend, and not the sign of the trend, which is positive.
It should be noted that extending this to a longer term (e.g., using the entire period of satellite data availability, 1979-present) does show a statistically significant (and positive) trend, even with a stringent correction for autocorrelation.
J – you’re pretty much reduced to petty points about when to pick the start of the period. Yes, I admit, the last decade does not strictly show a cooling trend, but the last 6 years do, and the last 2 years show a huge cooling.
Why aren’t you shouting about this from the rooftops? I still recall the squeals from IPCC/Team hockeystick that 1998 was the hottest year in 1000 years (or was that a million?) and that if we did not all immediately repent our evil carbon emitting ways we were doomed to hell on earth. Well, they were wrong. Flat wrong.
So let me revise, to make you happy:
We’ve not seen any warming for a decade.
That is the only valid claim you can make about the last decade. It is what I should have said from the get-go. Mea culpa: I did not run the statistics before I made the claim. But it changes nothing about my argument: none of the climate models predicted flatlining (and now major cooling). All the alarmists who have been screaming gloom and doom for the past decade have been completely wrong.
Then use standard least-squares to fit a line and calculate the error estimates. A gentle introduction is here.
But, you know, be very careful using objective statistics to validate the claims of alarmists. Anyone straying from the received wisdom of global warming will be smeared by the climate science community (most lately by the chair of the IPCC Pachauri who describes us as “flat-earthers”). As with religion, if you are a true believer, you’re better off just swallowing the claims of alarmists without question.
Some specialists argue that credit loans aid a lot of people to live the way they want, just because they can feel free to buy necessary stuff. Furthermore, some banks give student loan for different persons.
If you’re in a not good position and have no money to move out from that point, you will have to receive the credit loans. Just because that should aid you unquestionably. I get consolidation loans every time I need and feel great just because of this.
If you’re in not good state and have no money to go out from that, you would require to receive the home loans. Just because it will aid you for sure. I get bank loan every single year and feel OK just because of this.
Some guys tell that automatic link building can get more traffic. Nonetheless, company to buy link can use non-automated strategies for SEO. Great specialists realize that hand operated ways of traffic optimization.
Very beautiful event about this post, but still this challenge is to hard to debate.That is why we have controlled to create a custom writing service to help hopeful students. They can buy term papers that is custom and made by professional , buy essays or even buy research papers. But when customers use this kind of benefit â an ethical question is raised: Is it ok to use these kinds of services? Is it ok to use them, and will you be punished for using them.
Oh, hot thought referring to this topic. Could please tell me how much time that takes? Just because I am going to make the dissertation structure or probably that will be much better to notice the buy dissertation service. Thank you so much.
If you donât have a free time to do a part-time job but still want to earn some cash then this freelance writing agency is absolutely for you! Iâve kept in touch with them for many years, and I am certain that itâs a trustful company which is not gonna screw you.
Sometimes that happens that you are lack of free time to accomplish your masters thesis close to this good post. Lots of students make a big problem of it, just because some of them donât know a thing about custom thesis service, but I could show you facts about how to find the supreme dissertation and how to buy a thesis per good prices.
My business is getting well and page rank of my site is great. All those is because I choose the experts to work with. I use the best website submission issues at blog posting services of high reputation. Thanks those specialists very much!
Some time ago, I really needed to buy a car for my corporation but I didn’t earn enough cash and could not buy anything. Thank heaven my friend suggested to try to get the credit loans from reliable creditors. So, I did so and was satisfied with my bank loan.
|
2024-01-19T01:26:36.242652
|
https://example.com/article/5094
|
package ren.solid.materialdesigndemo.view;
import android.animation.AnimatorSet;
import android.animation.ValueAnimator;
import android.content.Context;
import android.graphics.Bitmap;
import android.graphics.BitmapFactory;
import android.graphics.BitmapShader;
import android.graphics.Canvas;
import android.graphics.Color;
import android.graphics.CornerPathEffect;
import android.graphics.DashPathEffect;
import android.graphics.Paint;
import android.graphics.Path;
import android.graphics.Rect;
import android.graphics.RectF;
import android.graphics.Shader;
import android.support.design.widget.Snackbar;
import android.util.AttributeSet;
import android.util.Log;
import android.view.MotionEvent;
import android.view.View;
import ren.solid.library.utils.Logger;
import ren.solid.materialdesigndemo.R;
import ren.solid.library.utils.ViewUtils;
/**
* Created by _SOLID
* Date:2016/4/10
* Time:10:35
* <p/>
* update:加入动画,动画由简书网友xsfelvis提供
*/
public class QQHealthView extends View {
private static String TAG = "QQHealthView";
private int mWidth;//自定义View宽
private int mHeight;//自定义View高
private int mBackgroundCorner;//背景四角的弧度
private int mArcCenterX;
private int mArcCenterY;
private RectF mArcRect;
private Paint mBackgroundPaint;
private Paint mArcPaint;//最上面弧线的画笔
private Paint mTextPaint;
private Paint mDashLinePaint;//虚线的画笔
private Paint mBarPaint;//竖条的画笔
private int[] mSteps;
private float mRatio;
private Context mContext;
private int mDefaultThemeColor;//主题色
private int mDefaultUpBackgroundColor;//上层默认的背景色
private int mThemeColor;
private int mUpBackgroundColor;
private float mArcWidth;
private float mBarWidth;
private int mMaxStep;
private int mAverageStep;
private int mTotalSteps;
private int step = 25;
private float percent = 0.5f;
private Paint mAvatarPaint;
public QQHealthView(Context context) {
this(context, null);
}
public QQHealthView(Context context, AttributeSet attrs) {
this(context, attrs, 0);
}
public QQHealthView(Context context, AttributeSet attrs, int defStyleAttr) {
super(context, attrs, defStyleAttr);
mContext = context;
init();
}
private void init() {
//下面这句是关闭硬件加速,防止某些4.0的设备虚线显示为实线的问题
//可以在AndroidManifest.xml时的Application标签加上android:hardwareAccelerated=”false”,
// 这样整件应用都关闭了硬件加速,虚线可以正常显示,但是,关闭硬件加速对性能有些影响,
setLayerType(View.LAYER_TYPE_SOFTWARE, null);
//自定义View的宽高比例
mRatio = 450.f / 525.f;
//初始化一些默认的参数
mBackgroundCorner = ViewUtils.dp2px(mContext, 5);
mDefaultThemeColor = Color.parseColor("#2EC3FD");
mDefaultUpBackgroundColor = Color.WHITE;
mThemeColor = mDefaultThemeColor;
mUpBackgroundColor = mDefaultUpBackgroundColor;
mSteps = new int[]{10050, 15280, 8900, 9200, 6500, 5660, 9450};
calculateSteps();
//背景画笔
mBackgroundPaint = new Paint();
mBackgroundPaint.setAntiAlias(true);
mBackgroundPaint.setColor(mThemeColor);
//圆弧的画笔
mArcPaint = new Paint();
mArcPaint.setColor(mThemeColor);//画笔颜色
mArcPaint.setAntiAlias(true);//抗锯齿
mArcPaint.setStyle(Paint.Style.STROKE);//空心
mArcPaint.setDither(true);//防抖动
mArcPaint.setStrokeJoin(Paint.Join.ROUND);//在画笔的连接处是圆滑的
mArcPaint.setStrokeCap(Paint.Cap.ROUND);//在画笔的起始处是圆滑的
mArcPaint.setPathEffect(new CornerPathEffect(10));//画笔效果
//文字画笔
mTextPaint = new Paint();
mTextPaint.setAntiAlias(true);
//虚线画笔
mDashLinePaint = new Paint();
mDashLinePaint.setAntiAlias(true);
mDashLinePaint.setColor(Color.parseColor("#C1C1C1"));
mDashLinePaint.setStyle(Paint.Style.STROKE);
mDashLinePaint.setPathEffect(new DashPathEffect(new float[]{8, 4}, 0));//画虚线
//竖条画笔
mBarPaint = new Paint();
mBarPaint.setColor(mThemeColor);
mBarPaint.setAntiAlias(true);
mBarPaint.setStrokeCap(Paint.Cap.ROUND);
//头像画笔
mAvatarPaint = new Paint();
mAvatarPaint.setAntiAlias(true);
//加入动画
AnimatorSet animatorSet = new AnimatorSet();
//步数的动画
ValueAnimator stepAnimator = ValueAnimator.ofInt(0, mSteps[mSteps.length - 1]);
stepAnimator.addUpdateListener(new ValueAnimator.AnimatorUpdateListener() {
@Override
public void onAnimationUpdate(ValueAnimator animation) {
step = (int) animation.getAnimatedValue();
invalidate();
}
});
// stepAnimator.setDuration(1000);
// stepAnimator.start();
//圆环动画
ValueAnimator percentAnimator = ValueAnimator.ofFloat(0, 1);
percentAnimator.addUpdateListener(new ValueAnimator.AnimatorUpdateListener() {
@Override
public void onAnimationUpdate(ValueAnimator animation) {
percent = (float) animation.getAnimatedValue();
invalidate();
}
});
// percentAnimator.setDuration(1000);
// percentAnimator.start();
animatorSet.setDuration(1000);
animatorSet.playTogether(stepAnimator, percentAnimator);
animatorSet.start();
}
public void setThemeColor(int color) {
mThemeColor = color;
mBackgroundPaint.setColor(mThemeColor);
mArcPaint.setColor(mThemeColor);
mBarPaint.setColor(mThemeColor);
invalidate();
}
public void setSteps(int[] steps) {
if (steps == null || steps.length == 0) throw new IllegalArgumentException("非法参数");
mSteps = steps;
calculateSteps();
invalidate();
}
//将原始图片转化为圆形图片
public Bitmap toRoundBitmap(Bitmap bitmap) {
int width = bitmap.getWidth();
int height = bitmap.getHeight();
int r;
if (width > height) {
r = height;
} else {
r = width;
}
Bitmap backgroundBmp = Bitmap.createBitmap(width,
height, Bitmap.Config.ARGB_8888);
Canvas canvas = new Canvas(backgroundBmp);
Paint paint = new Paint();
paint.setAntiAlias(true);
RectF rect = new RectF(0, 0, r, r);
BitmapShader shader = new BitmapShader(bitmap, Shader.TileMode.CLAMP,
Shader.TileMode.CLAMP);
paint.setShader(shader);
canvas.drawRoundRect(rect, r / 2, r / 2, paint);
return backgroundBmp;
}
//计算步数
private void calculateSteps() {
mTotalSteps = 0;
mMaxStep = 0;
mAverageStep = 0;
for (int i = 0; i < mSteps.length; i++) {
mTotalSteps += mSteps[i];
if (mMaxStep < mSteps[i]) mMaxStep = mSteps[i];
}
mAverageStep = (int) (mTotalSteps * 1.f / mSteps.length);
}
//绘制最下层背景
private void drawBelowBackground(int left, int top, int right, int bottom, int radius, Canvas canvas, Paint paint) {
Path path = new Path();
path.moveTo(left, top);
path.lineTo(right - radius, top);
path.quadTo(right, top, right, top + radius);
path.lineTo(right, bottom - radius);
path.quadTo(right, bottom, right - radius, bottom);
path.lineTo(left + radius, bottom);
path.quadTo(left, bottom, left, bottom - radius);
path.lineTo(left, top + radius);
path.quadTo(left, top, left + radius, top);
canvas.drawPath(path, paint);
}
//绘制上层背景
private void drawUpBackground(int left, int top, int right, int bottom, int radius, Canvas canvas, Paint paint) {
Path path = new Path();
path.moveTo(left, top);
path.lineTo(right - radius, top);
path.quadTo(right, top, right, top + radius);
path.lineTo(right, bottom);
path.lineTo(left, bottom);
path.lineTo(left, top + radius);
path.quadTo(left, top, left + radius, top);
canvas.drawPath(path, paint);
}
@Override
protected void onMeasure(int widthMeasureSpec, int heightMeasureSpec) {
int defaultWidth = Integer.MAX_VALUE;
int width;
int height;
int widthMode = MeasureSpec.getMode(widthMeasureSpec);
int widthSize = MeasureSpec.getSize(widthMeasureSpec);
// int heightMode = MeasureSpec.getMode(heightMeasureSpec);
// int heightSize = MeasureSpec.getSize(heightMeasureSpec);
if (widthMode == MeasureSpec.EXACTLY || widthMode == MeasureSpec.AT_MOST) {
width = widthSize;
} else {
width = defaultWidth;
}
int defaultHeight = (int) (width * 1.f / mRatio);
height = defaultHeight;
setMeasuredDimension(width, height);
Log.i(TAG, "width:" + width + "| height:" + height);
}
@Override
protected void onSizeChanged(int w, int h, int oldw, int oldh) {
super.onSizeChanged(w, h, oldw, oldh);
mWidth = w;
mHeight = h;
mArcCenterX = (int) (mWidth / 2.f);
mArcCenterY = (int) (160.f / 525.f * mHeight);
mArcRect = new RectF();
mArcRect.left = mArcCenterX - 125.f / 450.f * mWidth;
mArcRect.top = mArcCenterY - 125.f / 525.f * mHeight;
mArcRect.right = mArcCenterX + 125.f / 450.f * mWidth;
mArcRect.bottom = mArcCenterY + 125.f / 525.f * mHeight;
mArcWidth = 20.f / 450.f * mWidth;
mBarWidth = 16.f / 450.f * mWidth;
//画笔的宽度一定要在这里设置才能自适应
mArcPaint.setStrokeWidth(mArcWidth);
mBarPaint.setStrokeWidth(mBarWidth);
}
@Override
protected void onDraw(Canvas canvas) {
float startX;
float startY;
float stopX;
float stopY;
float xPos;
float yPos;
//1.绘制最下层背景
mBackgroundPaint.setColor(mThemeColor);
drawBelowBackground(0, 0, mWidth, mHeight, mBackgroundCorner, canvas, mBackgroundPaint);
//2.绘制上面的背景
mBackgroundPaint.setColor(mUpBackgroundColor);
drawUpBackground(0, 0, mWidth, mWidth, mBackgroundCorner, canvas, mBackgroundPaint);
//3.绘制圆弧
canvas.drawArc(mArcRect, 120, 300 * percent, false, mArcPaint);
//4.绘制圆弧里面的文字
xPos = mArcCenterX;
yPos = (int) (mArcCenterY - 40.f / 525.f * mHeight);
mTextPaint.setTextAlign(Paint.Align.CENTER);
mTextPaint.setTextSize(15.f / 450.f * mWidth);
mTextPaint.setColor(Color.parseColor("#C1C1C1"));
canvas.drawText("截至22:50分已走", xPos, yPos, mTextPaint);
mTextPaint.setTextAlign(Paint.Align.CENTER);
mTextPaint.setTextSize(42.f / 450.f * mWidth);
mTextPaint.setColor(mThemeColor);
canvas.drawText(step + "", mArcCenterX, mArcCenterY, mTextPaint);
yPos = (int) (mArcCenterY + 50.f / 525.f * mHeight);
mTextPaint.setColor(Color.parseColor("#C1C1C1"));
mTextPaint.setTextSize(13.f / 450.f * mWidth);
canvas.drawText("好友平均5620步", mArcCenterX, yPos, mTextPaint);
xPos = (int) (mArcCenterX - 35.f / 450.f * mWidth);
yPos = (int) (mArcCenterY + 120.f / 525.f * mHeight);
canvas.drawText("第", xPos, yPos, mTextPaint);
xPos = (int) (mArcCenterX + 35.f / 450.f * mWidth);
canvas.drawText("名", xPos, yPos, mTextPaint);
mTextPaint.setColor(mThemeColor);
mTextPaint.setTextSize(24.f / 450.f * mWidth);
canvas.drawText("10", mArcCenterX, yPos, mTextPaint);
//5.绘制圆弧下面的文字
xPos = (int) (25.f / 450.f * mWidth);
yPos = (int) (330.f / 525.f * mHeight);
mTextPaint.setTextAlign(Paint.Align.LEFT);
mTextPaint.setColor(Color.parseColor("#C1C1C1"));
mTextPaint.setTextSize(12.f / 450.f * mWidth);
canvas.drawText("最近7天", xPos, yPos, mTextPaint);
xPos = (int) ((450.f - 25.f) / 450.f * mWidth);
yPos = (int) (330.f / 525.f * mHeight);
mTextPaint.setTextAlign(Paint.Align.RIGHT);
mTextPaint.setColor(Color.parseColor("#C1C1C1"));
mTextPaint.setTextSize(12.f / 450.f * mWidth);
canvas.drawText("平均" + mAverageStep + "步/天", xPos, yPos, mTextPaint);
//6.画虚线
xPos = (int) (25.f / 450.f * mWidth);
yPos = (int) (352.f / 525.f * mHeight);
stopX = xPos + (450.f - 50.f) / 450.f * mWidth;
stopY = yPos;
canvas.drawLine(xPos, yPos, stopX, stopY, mDashLinePaint);
//7.绘制下面的竖条
mTextPaint.setTextAlign(Paint.Align.CENTER);
mTextPaint.setTextSize(10.f / 450.f * mWidth);
startY = 388.f / 525.f * mHeight;
for (int i = 0; i < mSteps.length; i++) {
float barHeight = mSteps[i] * 1.f / mAverageStep * 35.f / 525.f * mHeight;
startX = 55.f / 450.f * mWidth + i * (57.f / 450.f * mWidth);
stopX = startX;
stopY = startY - barHeight;
if (mSteps[i] < mAverageStep) mBarPaint.setColor(Color.parseColor("#C1C1C1"));
else mBarPaint.setColor(mThemeColor);
canvas.drawLine(startX, startY, stopX, stopY, mBarPaint);
canvas.drawText("0" + (i + 1) + "日", startX, startY + 25.f / 525.f * mHeight, mTextPaint);
}
//8.绘制蓝色层的文字以及头像
yPos = (mHeight - mWidth) / 2.f + mWidth + 20.f / 450.f * mWidth / 2;
xPos = 80.f / 450.f * mWidth;
mTextPaint.setColor(Color.WHITE);
mTextPaint.setTextSize(20.f / 450.f * mWidth);
mTextPaint.setTextAlign(Paint.Align.LEFT);
canvas.drawText("SOLID获得今日冠军", xPos, yPos, mTextPaint);
Bitmap bitmap = BitmapFactory.decodeResource(mContext.getResources(), R.drawable.avastar);
Rect dst = new Rect();//头像绘制到的矩形
int rectWidth = (int) (30.f / 525.f * mHeight);//矩形的宽度
dst.top = (int) ((mHeight - mWidth) / 2.f + mWidth - rectWidth / 2.f);
dst.left = (int) (xPos - 40.f / 450 * mWidth);
dst.bottom = (int) ((mHeight - mWidth) / 2.f + mWidth + rectWidth / 2.f);
dst.right = (int) (xPos - 10.f / 450 * mWidth);
bitmap = toRoundBitmap(bitmap);
canvas.drawBitmap(bitmap, null, dst, mAvatarPaint);//绘制头像
xPos = 425.f / 450.f * mWidth;
mTextPaint.setTextAlign(Paint.Align.RIGHT);
mTextPaint.setTextSize(15.f / 450.f * mWidth);
canvas.drawText("查看 >", xPos, yPos, mTextPaint);
}
@Override
public boolean onTouchEvent(MotionEvent event) {
RectF rectF = new RectF();
rectF.top = mWidth;
rectF.left = 380.f / 450.f * mWidth;
rectF.right = mWidth;
rectF.bottom = mHeight;
if (rectF.contains(event.getX(), event.getY())) {//当前点击的坐标在右下角的范围内
//在这里可以做点击事件的监听
Logger.i(this,"onClick");
Snackbar.make(this, "Click", Snackbar.LENGTH_SHORT).show();
return false;
} else {
return super.onTouchEvent(event);
}
}
}
|
2024-03-15T01:26:36.242652
|
https://example.com/article/3719
|
Locke, God, and Materialism Stewart Duncan Forthcoming in Oxford Studies in Early Modern Philosophy 1. INTRODUCTION Early modern philosophers discussed several versions of materialism. One distinction among them is that of scope. Should one be a materialist about animal minds, human minds, the whole of nature, or God? Hobbes eventually said 'yes' to all four questions, and Spinoza seemed to several of his readers to have done the same. Locke, however, gave different answers to the different questions. Though there is some debate about these matters, it appears that he thought materialism about God was mistaken, was agnostic about whether human minds were material, and was inclined to think that animal minds were material.1 In giving those answers, Locke famously suggested the possibility that God might have 'superadded' thought to the matter of our bodies, giving us the power of thought without immaterial thinking minds. He thus opened up the possibility of materialism about human minds, without adopting the sort of general materialist metaphysics that Hobbes, for example, had proposed. This paper investigates Locke's views about materialism, by looking at the discussion in Essay IV.x. There Locke-after giving a cosmological argument for the existence of God- argues that God could not be material, and that matter alone could never produce thought.2 In 1 On Locke on animals' minds, see Lisa Downing, 'Locke's Choice Between Materialism and Dualism' ['Locke's Choice'], in Paul Lodge and Tom Stoneham (ed.), Locke and Leibniz on Substance (New York: Routledge, 2015), 128-45; Nicholas Jolley, Locke's Touchy Subjects (Oxford: Oxford University Press, 2015), 33-49; and Kathleen Squadrito, 'Thoughtful Brutes: The Ascription of Mental Predicates to Animals in Locke's Essay', Diálogos 58 (1991), 63-73. 2 I focus on the Essay. This focus includes concentrating on the sorts of views about God that Locke presents and argues for in the Essay, views about God that one can arrive at in philosophy, independently of revelation. 2 discussing the chapter, I pay particular attention to some comparisons between Locke's position and those of two other seventeenth-century philosophers, René Descartes and Ralph Cudworth. Locke barely mentions Descartes's name in the Essay, but frequently engages with Cartesian ideas there.3 Essay IV.x is no exception; Locke's thought in the chapter has some Cartesian aspects, even as he criticizes Descartes. Meanwhile, Locke's knowledge of Cudworth's True Intellectual System, and its apparent connections to the discussion of IV.x, are well known, and I discuss some of those connections below.4 Making use of those comparisons, I argue for two main claims. The first is that the important argument of Essay IV.x.10 is fundamentally an argument about the causation of perfections. Indeed, Locke gives multiple such arguments in the chapter. My second main claim is that my proposed reading of IV.x is not merely consistent with what Locke says elsewhere about superaddition, but also provides reasons to favor a particular understanding of what superaddition is.5 3 Unsurprisingly, Locke owned several of Descartes' books. John Harrison and Peter Laslett, The Library of John Locke, second edition (Oxford: Clarendon Press, 1971), #601a-608, p.101; #2451, p.218. 4 On Locke and Cudworth, see Michael Ayers, Locke (London: Routledge, 1991), 2: 169-83, though at points below I disagree with the details of Ayers's reading. Locke owned a copy of the True Intellectual System (The Library of John Locke, #896, p.119). Ayers, Locke, 2: 314- following W. von Leyden, 'Locke and Nicole', Sophia 16 (1948), 41-55-also notes a possible connection to Pierre Nicole's Discours sur l'existence de Dieu, which Locke had translated (Pierre Nicole, John Locke as Translator: Three of the Essais of Pierre Nicole in French and English, edited by Jean S. Yolton [Oxford: Voltaire Foundation, 2000]). However, not only is Nicole's discussion considerably less detailed than Cudworth's, it also lacks key elements that are prominent in the True Intellectual System and Essay IV.x, including the emphasis on creation ex nihilo and getting something from nothing. 5 Space does not permit consideration of a further question that has seen recent discussion (Downing, 'Locke's Choice'; Jolley, Locke's Touchy Subjects), of whether Locke in some sense inclined towards materialism, despite his official agnosticism. 3 2. THE EARLY SECTIONS OF ESSAY IV.x I want to use Essay IV.x to talk about Locke's approach to materialism, but that is probably not what the chapter is best known for. Its most famous topic is Locke's argument for the existence of God, which he presents in the first six sections. Locke argues that each person has intuitive knowledge (the highest sort) of their own existence, and can have consequent demonstrative knowledge (the second highest sort) of the existence of an eternal being. That basic argument for God's existence is a sort of cosmological argument. Given our knowledge of our own existence, and the principle (of which we are supposed to have intuitive knowledge) that 'bare nothing can no more produce any real Being, than it can be equal to two right Angles' (E IV.x.3), Locke concludes that 'from Eternity there has been something' (E IV.x.3), which he calls an 'eternal Being' (E Iv.x.4). It is well known that there is a gap, or at least a very significant unstated premise, in Locke's argument. Perhaps Locke's premises allow him to establish that at any time in the past, there has been some being or other. Locke concludes more strongly, however, that there is one being that has existed at all past times.6 As we will see, Locke seems to think that everyone agrees that there is an eternal being. Even atheists think this-they just think the eternal being is matter. Perhaps this helps explain the weakness of Locke's initial argument-the existence of an eternal being is just not, he thinks, a contentious claim that one needs to worry about establishing. The real issue is what that eternal being is like. That, indeed, is the focus of most of Locke's chapter. 6 Locke talks about the being existing 'from Eternity' (E IV.x.3), suggesting an 'eternal' being that exists at all times, rather than a timeless one. For some discussion of the noted problem with the argument, see Marcy Lascano, 'Locke's Philosophy of Religion'. in Matthew Stuart (ed.), A Companion to Locke (Chichester: Blackwell, 2016), 467-85, at 471-3; and Jonathan Bennett, 'God and Matter in Locke: An Exposition of Essay IV.10' ['God and Matter'], in Eileen O'Neill and Christia Mercer (ed.), Early Modern Philosophy: Mind, Matter, and Metaphysics (Oxford: Oxford University Press, 2005), 161–182, at 163-4. 4 Locke's cosmological argument manages to be noticeably Cartesian while departing from Descartes' own cosmological argument. Locke and Descartes both proceed by observing something we know of, and then looking for a causal explanation of that thing. In Descartes' case, that thing is 'the idea of a supremely perfect and infinite being' (AT 7: 46). Locke begins however from each individual's knowledge of their own existence: 'it is beyond question, that man has a clear perception of his own being; he knows certainly, that he exists, and that he is something' (E IV.x.2). Though Descartes was not the only philosopher ever to think about our knowledge of our own existence, there does appear to be a notable echo of the cogito here.7 Nevertheless, there is also notable anti-Cartesian material early in the chapter. Section 7 criticizes the practical utility of arguments for the existence of God that depend crucially upon an idea of God. Locke does not consider the quality of the arguments themselves. But he does say that it is an ill way of establishing this truth, and silencing atheists, to lay the whole stress of so important a point, as this, upon that sole foundation: and take some men's having that idea of God in their minds, (for 'tis evident, some men have none, and some worse than none, and the most very different,) for the only proof of a Deity (E IV.x.7). This seems to be directed at Descartes.8 The claim is not that it's bad to give an argument for the existence of God that begins from the idea of God, but that it's ineffective to rely only on such 7 One might compare Locke's argument to the discussion in the Third Meditation of 'whether I possess some power enabling me to bring it about that I who now exist will still exist a little while from now' (AT 7: 49, CSM 2: 33). That, like Locke's argument, starts from the existence of the individual arguing. But unlike Locke's argument, it proceeds by thinking about the power of existing in the future, rather than what (in the past) explains my present existence. 8 One might suggest that Locke's criticism also applies to Cudworth, who gives at one point a cosmological argument that focuses on the explanation of the existence of the idea of God (TIS 766-7). However, Cudworth seems also to be concerned there with the causal explanation of understanding more generally, and elsewhere endorses a more general version of the 5 arguments if the goal is to confute atheists. Descartes, with his two arguments from the idea of God, does just that.9 Locke's argument for the existence of God appears late in the Essay. In book I, Locke had rejected the claim that religious knowledge was innate. In book IV, he was finally in a position to give his own account of religious knowledge, including knowledge of the existence of God. That placement of the argument for the existence of God is in contrast to Descartes' procedure. Descartes gave arguments for the existence of God as part of first philosophy, in the Meditations and early in the Principles. For Descartes, one ought, if proceeding systematically, to start by proving God's existence and move forward from there. That is not to say that Locke's Essay before IV.x is a purely secular work, making no reference to God. Indeed, quite the opposite seems to be true.10 Locke appears to rely on the existence of a providential God who designed the world when making various arguments, from book 1 onwards.11 One might suggest then that Locke is proving in Essay IV.x what he earlier cosmological argument (see for example TIS 727). The near-constant focus on arguments from the idea of God that we see in Descartes's work seems not to be present in Cudworth's. 9 Descartes does sometimes argue in a way that seems less focused on the idea of God. See the discussion referred to in note 7 above. See also proposition III in the geometrical presentation at the end of the Second Replies (AT 7: 168-9). However, these arguments are much less prominent than those involving the idea of God. Moreover, the argument in the Second Replies still appears-at least in the proposition itself if not in the following discussion-to involve our possession of the idea of God. 10 Several commentators have argued that religious commitments are fundamental to Locke's views in the Two Treatises. See John Dunn, The Political Thought of John Locke (Cambridge: Cambridge University Press, 1969); Jeremy Waldron, God, Locke, and Equality (Cambridge: Cambridge University Press, 2002); and P.E. Sigmund, 'Jeremy Waldron and the Religious Turn in Locke Scholarship', Review of Politics 67 (2005), 407-18. On the Essay, see Richard Ashcraft, 'Faith and Knowledge in Locke's Philosophy', in John Yolton (ed.), John Locke: Problems and Perspectives (Cambridge: Cambridge University Press, 1969), 194-223 and Ayers, Locke, 1: 123-4. 11 Here are several examples, just from book II: the argument about whether the mind is always thinking relies on a belief about what God would not do, which is grounded in a view about the wisdom of God (E II.i.15); the argument of II.ii.3 relies on a claim about 'the Wisdom and Power of the Maker'; the discussion of pain in II.vii.4 notes a 'new occasion of admiring the 6 relied upon. It is not clear, however, that Locke could do that, or that he tries to. Even if all the arguments of Essay IV.x work, they show the existence of God, and something about his attributes. Locke does not try to prove claims about God's wise and providential design of the world. One further question about the early sections of Essay IV.x is how much Locke thinks he has established in them. Clearly he thinks he has shown, by the argument he reiterates at the end of IV.x.7, that there is a first cause, which is an eternal being. This knowledge is demonstrative, and thus of a high level of certainty: 'we more certainly know that there is a GOD, than that there is any thing else without us' (E IV.x.6). But how much are we supposed to know, at this point, about what God is like? On the one hand, Locke has argued that God is 'the most powerful' being (E IV.x.4) and that (because we have perception and knowledge) God must be a 'knowing intelligent Being' (E IV.x.5).12 On the other, as we will see, he begins soon afterwards to defend his view against the suggestion that the first cause is actually incogitative. So perhaps we should say, Locke believes at this point that he has shown that God is a thinking being, but recognizes that this position is not (yet) beyond criticism. Wisdom and Goodness of our Maker'; the 'proper Functions' of the sense organ considered later in the section provide another example, for they are the functions for which it was intended and designed by God; II.xxi.48 on determination and freedom has an argument 'else he would be under the determination of some other than himself' that appears to rely on the view that God would not have placed us in such a situation (see II.xxi.53 and II.xxi.65); and II.xxiii.12 remarks on what the 'infinite, wise Contriver of us' has done in designing our senses and faculties. 12 In those arguments Locke relies on two principles: the explicit one that if a being 'had its Being and beginning from another' (E IV.x.4), it must also get its powers from that earlier being; and the implicit one that the earlier being must itself in some way possess those powers. Locke also says in section 5 that that senseless matter cannot put sense, perception, and knowledge into itself. There is some question of whether the argument in section 5 merely relies on the two principles I have stated, or also offers extra considerations about the causation of thought. See Matthew Stuart, Locke's Metaphysics (Oxford: Clarendon, 2013), 251-2; and Bennett, 'God and Matter', 165-6. 7 3. AGAINST AN INCOGITATIVE FIRST CAUSE 3.1 The Overall Argument of IV.x.9-10 Essay IV.x.9 tells us there are two sorts of beings in the world 'that Man knows or conceives': incogitative beings, and cogitative or thinking ones. Here Locke presumes that the incogitative beings are material, but not that the cogitative ones are immaterial.13 He then argues, principally in section 10, that the eternal being must be a cogitative being. Ignoring the details for a moment, this is an unsurprising consequence of earlier arguments. If God is the most knowing being, as Locke took himself to have shown by section 6, then God must in some way be thinking. If we grant Locke further that there are only two sorts of beings we know of-the cogitative ones and the incogitative material ones-then God will be in the former category. If we take things this way, then the main task of IV.x.9-10, indeed 9-12, is to answer the question, could the first cause have been an incogitative material being? Locke's answer is a firm 'no'. Locke's framing here is, I note, rather similar to a way in which Ralph Cudworth had explained the debate between atheists and theists, with both accepting that something has existed from eternity, but disagreeing about what that is: since Something certainly Existed of It self from Eternity, but other things were Made, and had a Beginning, (which therefore must needs derive their being from that which Existed of It self Unmade,) here is the State of the Controversie betwixt Theists and Atheists, Whether that which Existed of It self from all Eternity, and was the Cause of all other things, were a Perfect Being and God, or the most Imperfect of all things whatsoever, Inanimate and Sensless matter (TIS 727). 13 Compare E II.xxiii.15, where Locke contrasts material substances with immaterial thinking spirits. 8 That is just one example of the ways in which Locke's discussion in this chapter seems to have been guided by Cudworth's discussion.14 Others will emerge below. Beyond the broad argument above, there are other arguments in IV.x.10 against incogitative matter producing a thinking intelligent being. These are not, I suggest, aimed at the view that there is a material thinking God. Rather, they are aimed at someone who grants Locke the central goal of his cosmological argument, but suggests that the first cause is an incogitative, rather than a cogitative being. Thus, when Locke argues in this section that incogitative matter could never produce thought, he is arguing that it could never be the efficient cause of thought, not that it could never be the underlying stuff from which thought emerged.15 Michael Ayers reads that claim differently, taking Locke to have previously established that the eternal being is cogitative, then argued in IV.x.10 that it cannot also be material.16 Thus Ayers's discussion is phrased in terms of what can flow from the essence of matter. That, I am 14 Fairly soon after the quoted passage, Cudworth gives an extended discussion of 'the Achilles of the Atheists; their Invincible Argument, against a Divine Creation and Omnipotence; because Nothing could come from Nothing' (TIS 738-67). That discussion of principles about causation, and their consequences for how we think about God, is particularly relevant to Locke's chapter. Locke himself noted this section and its attention to creation ex nihilo as one of four themes from the True Intellectual System (John Locke, An Early Draft of Locke's Essay, Together with Excerpts from his Journals, edited by R.I. Aaron and Jocelyn Gibb [Oxford: Clarendon, 1936], 118). 15 Was Locke attacking some philosopher in particular here? Hobbes is one possibility. Locke owned some works of Hobbes's, including most relevantly the 1651 edition of Leviathan (The Library of John Locke, #1465, p. 155). At least until the 1651 Leviathan, Hobbes believed in a first cause, the nature of which we do not know. He made no claim about that first cause being a thinking thing. Indeed, he said that knowledge and understanding could not be attributed literally to God (Leviathan 31.27). Thus one might think that Hobbes's first cause is an incogitative being, which is somehow the ultimate cause of the thinking beings in the world. What exactly Hobbes believed about the first cause is a matter of continuing discussion. See Arash Abizadeh, 'Hobbes's Agnostic Theology before Leviathan', Canadian Journal of Philosophy, 47 (2017), 714-37; Thomas Holden, 'Hobbes's First Cause', Journal of the History of Philosophy, 53 (2015), 647-67; and R.W. McIntyre, 'Concerning "men's affections to Godward": Hobbes on the First and Eternal Cause of All Things', Journal of the History of Philosophy, (2016) 54, 547-71. 16 Ayers, Locke, 2: 174ff. 9 arguing, is not what is going on in IV.x.10, in contrast with later sections. Ayers, however, moves in his discussion from a passage in IV.x.10 to a passage in IV.x.16, as if they were addressing the same issue.17 I hope to show that, though there clearly are connections between the two discussions, the aims of the arguments are importantly different. Why read IV.x.10 as I suggest?18 First, it makes this section fit sensibly after the distinction between cogitative and incogitative beings. Secondly, it helps avoid a puzzle that otherwise arises-if one takes IV.x.10 just to be arguing against the possibility of a material thinking God, then one has to explain why Locke argues against the very same view in sections 13-17. Thirdly, one reason why Locke is concerned with the efficient causation of a thinking being is that this is central to his initial argument in the chapter-Locke's cosmological argument focuses on the causation of the existence of the thinking being giving the argument.19 I believe those considerations are decisive as to the main aim of the section. There is, however, a passage towards the end of the section that seems not to fit my reading. This is a passage that Locke added in the second edition (and retained in later editions).20 In it, Locke mentions what would happen 'if Matter were the eternal first cogitative Being'. That is, in the added passage, Locke argues against a cogitative material first being, not an incogitative one. I cannot deny the existence of this passage, but it should not distract us from the above point about the main purpose of IV.x.10. Locke has been arguing that bare incogitative matter could not 17 Ayers, Locke, 2: 177-8. 18 Patrick Connolly, 'Thinking Matter in Locke's Proof of God's Existence' ['Thinking Matter'], Oxford Studies in Early Modern Philosophy 9 (2019), 105-30, makes a similar point about the role of section 10 in the chapter. I also, as will become clear, agree with his thought that Locke is not arguing from inconceivability to impossibility. We do however reach rather different conclusions about what Essay IV.x shows about superaddition ('Thinking Matter', 129). 19 Moreover, Locke in the Essay tends to use 'produce' to describe a relationship of efficient causation, which suggests he is doing the same here. 20 E p.624, lines 11-25. 10 produce thinking beings. That leads him to say that matter could only produce thinking beings if it could already think. Having said that, Locke could simply refer forward to later arguments against that view. He chooses, however, to consider briefly what fundamentally thinking matter might be like, and to give a quick argument against that notion.21 But at the end of the section he returns to its main point, that the first cause must be a cogitative being.22 One might wonder why Locke added this passage to the second edition of the Essay, especially if, as I suggest, it takes us away from the main point of the section. The answer can be found in correspondence between Locke and Molyneux from 1693.23 Molyneux pointed out that some readers saw a contradiction between IV.x.10 and IV.iii.6.24 In his response, Locke discussed adding a passage to IV.x.10 to clear up that confusion-namely, the passage I am discussing here.25 It is not entirely clear why Locke thought that adding this passage would help. But it did allow him to state his overall view that the first cause could not be matter (cogitative or incogitative), not just his narrower view that it could not be incogitative matter. Thus, Locke perhaps hoped to emphasize the contrast between the claim that we might be material (in some way) and the claim that God could not be (in any way). 21 This prefigures later arguments that criticize several versions of the view that the first cause is both thinking and material. The view targeted in this passage resembles the one criticized in IV.x.14. But here it is criticized for a different reason-that if there were many cogitative material beings, they could not produce the 'order, harmony, and beauty' of nature. See the discussion of IV.x.14 in section 4.2 below, and also the discussion of the section 10 passage by Stuart, Locke's Metaphysics, 253-6. 22 In the final sentence Locke states his broader view that the 'first eternal Being cannot be Matter' (cogitative or incogitative) but the argument he gives is against it being incogitative. I discuss that argument in section 4.3 below. 23 This discussion is noted by Connolly, 'Thinking Matter', 124. 24 He also noted that there is not a contradiction, because 'in the first [E IV.iii.6] tis said, that we cannot tell [...] but an Almighty God may make matter think. In the other [E IV.x.10] tis asserted that Unthinking Matter cannot be this Almighty God' (Locke, Corr. 4: 600). 25 Corr. 4: 624. In replying, Molyneux suggested that Locke add a marginal note in the Essay saying that this new passage was supposed to clear up the 'seeming Repugnancy' (Corr. 4: 648), but Locke did not do so. 11 3.2 The Main Argument of Essay IV.x.10 is not an Inconceivability Argument If we look more closely at IV.x.10, we find Locke arguing first that matter itself 'cannot produce in it self so much as Motion', then that even if matter has motion added to it, it could never produce thought. That Locke denies these two things is clear. But why? There is textual evidence for reading Locke as giving inconceivability arguments here, arguments that rely on a move from 'X is inconceivable' to 'X is impossible'. He says, for instance, that: For Example; let us suppose the Matter of the next Pebble, we meet with eternal, closely united, and the parts firmly at rest together, if there were no other Being in the World, Must it not eternally remain so, a dead inactive Lump? Is it possible to conceive it can add Motion to itself, being purely Matter, or produce any thing? Matter then, by its own Strength, cannot produce in itself so much as Motion: The Motion it has must also be from Eternity, or else be produced, and added to Matter by some other Being more powerful than Matter; Matter, as is evident, having not Power to produce Motion in itself (IV.x.10). This appears to turn on a claim about what it is 'possible to conceive'. Later, and similarly, Locke writes 'I appeal to every one's own Thoughts, whether he cannot as easily conceive Matter produced by nothing, as Thought to be produced by pure Matter, when before there was no such thing as Thought, or an intelligent Being existing?' (IV.x.10). That is, it looks as if Locke argues from the premise that it is inconceivable that bare matter give rise to motion, or 12 moving matter to thought, to the conclusion that it is impossible that bare matter give rise to motion, or moving matter to thought. It would however be surprising to find Locke giving such arguments, for he cautions against using inconceivability arguments, in particular against using them to reach conclusions about the nature of the human mind. Earlier in book IV, he rejects the arguments of those: Who, either on the one side, indulging too much to their Thoughts immersed altogether in Matter, can allow no existence to what is not material: Or, who on the other side, finding not Cogitation within the natural Powers of Matter, examined over and over again, by the utmost Intention of Mind, have the confidence to conclude, that Omnipotency it self, cannot give Perception and Thought to a Substance, which has the Modification of Solidity (E IV.iii.6). Both of these errors are described as resulting from: An unfair way which some Men take with themselves; who, because of the inconceivableness of something they find in one, throw themselves violently into the contrary Hypothesis, though altogether as unintelligible to an unbiassed Understanding (E IV.iii.6). That is, Locke cautions against establishing materialism or dualism about the human mind on the basis of an inconceivability argument.26 At the very least he thinks one should not base either view on a simple inconceivability argument, one that makes the move from inconceivability to impossibility without offering any further support for the impossibility claim.27 26 On these criticisms, see Stewart Duncan, 'Toland, Leibniz, and Active Matter', Oxford Studies in Early Modern Philosophy 6 (2012), 249-78, at 271-8. 27 Locke even emphasizes the weakness of a reliance on inconceivability arguments later in Essay IV.x itself: 'it is not reasonable to deny the power of an infinite being, because we cannot comprehend its operations. We do not deny other effects upon this ground, because we cannot possibly conceive the manner of their production' (E IV.x.19). 13 If Locke were giving simple inconceivability arguments in IV.x.10, he would be making the same sort of arguments he criticizes elsewhere (and not far away, at that). They would not be exactly the same arguments, but they would be using the same sort of inconceivability claims in the same sort of way, and would indeed be about similar topics. It is thus highly implausible that Locke in IV.x.10 is just giving an inconceivability argument against incogitative matter producing thought. 3.3 The Main Argument of IV.x.10 is an Argument About the Causation of Perfections Is there more we can say about the argument of IV.x.10? Does Locke have some other reason for his impossibility claims in IV.x.10, one that might supplant or support the inconceivability claims? For a clue to this, we might look at Cudworth. In his discussion of 'the Achilles of the Atheists', Cudworth offers an argument similar to that of Essay IV.x.10: if Matter as such, have no Animal Sense and Conscious Understanding, Essentially belonging to it, (which no Atheists as yet have had the Impudence to assert) then can no Motion or Modification of Matter, no Contexture of Atoms, Possibly beget Sense and Understanding, Soul and Mind; because this would be to bring Something out of Nothing, in the Impossible Sense, or to suppose Something to be Made by It self without a Cause (TIS 758). Cudworth argues that matter and motion cannot give rise to sense and understanding. He supports this claim with a discussion of the principle that you cannot get something from nothing. In particular, Cudworth thinks the atomic materialism he is discussing violates a 14 principle about the causation of perfections. Sense and understanding are more perfect than motion and the modifications of matter, so the latter cannot cause the existence of the former. Cudworth's argument relies on a hierarchy of perfection, and a principle about what can cause what, given their levels of perfection. There is good evidence that Locke has something similar in mind in IV.x.10. Look at how Locke ends the section: Since therefore whatsoever is the first eternal Being must necessarily be cogitative; And whatsoever is first of all Things, must necessarily contain in it, and actually have, at least, all the Perfections that can ever after exist; nor can it ever give to another any perfection that it hath not, either actually in it self, or at least in a higher degree; It necessarily follows, that the first eternal Being cannot be Matter (E IV.x.10).28 Here Locke is giving something like Cudworth's argument. Of course, one might take Locke to be giving two arguments in the section, one based on inconceivability and the other on degrees of perfection. I suggest it makes more sense to think of the section as unified. The reasoning about perfection is, on this reading, the underlying support for the claims of inconceivability. (Thus we cannot conceive of the less perfect causing the more perfect, because such causation is impossible.) If we read the section this way, we also avoid concluding that Locke here gave the sort of simple inconceivability argument he criticized elsewhere. The driving force of the argument of IV.x.10 is Locke's view that a being with less perfect features cannot cause more perfect features to exist in the world. The argument is not independent of Locke's claims about the inconceivability of an incogitative being causing the 28 John Norris, Christian Blessedness, or, Discourses upon the Beatitudes of our Lord and Saviour Jesus Christ [...] to which are added, Reflections upon a late Essay concerning Human Understanding (London, 1690), 30, notices this passage, commenting: 'God then, even according to him, is all Beings; or, has the whole Plenitude of Being. And I wonder that this Principle had not led this Sagacious Person further'. Further, that is, towards Norris's own view. 15 existence of thinking ones. Rather, the views about perfection and causation support the inconceivability claims, ensuring that Locke is not giving the simple sort of inconceivability argument that he himself criticizes. 3.4 Locke's Hierarchy of Perfections I argued above that a hierarchy of perfection plays an important role in Locke's thinking in Essay IV.x. There is evidence throughout the Essay of Locke's belief in such a hierarchy. Consider this passage from a little later in Book IV: Observing, I say, such gradual and gentle descents downwards in those parts of the Creation, that are beneath Man, the rule of Analogy may make it probable, that it is so also in Things above us, and our Observation; and that there are several ranks of intelligent Beings, excelling us in several degrees of Perfection, ascending upwards towards the infinite Perfection of the Creator, by gentle steps and differences, that are every one at no great distance from the next to it (E IV.xvi.12). Locke aims here to emphasize the gradual nature of the differences between beings, or kinds of beings, but these are gradual differences within a hierarchy, the highest point of which is 'the infinite perfection of the Creator'. More generally, the Essay illustrates Locke's commitment to two related hierarchies of perfection: a hierarchy of beings, and a more fundamental hierarchy of features of those beings. The hierarchy of beings stretches from God, to spirits which are superior to us, to us, to other animals, and on down. Those are the ways in which kinds of things generally line up, but we should think of Locke's hierarchy of beings as fundamentally a hierarchy of individuals, not of 16 kinds.29 Locke thinks that human individuals are usually more perfect than non-human animals, but he is not committed to that always being the case.30 That hierarchy of individuals itself depends, however, upon a hierarchy of features. I agree with Ayers that the hierarchy of features is what is basic for Locke. It is less clear to me that this is, as Ayers claims, a modification of Cudworth's view-that Locke has done something new by having a scale of 'valuable and remarkable attributes' rather than Cudworth's 'scale of different types of substance'.31 Certainly sometimes Cudworth talks as if he believes in a hierarchy of features: notice for example the important roles of sense and understanding in the passage quoted above (TIS 758). One can-in fact one ought to-grant Ayers that Cudworth believes some features belong to substances of one kind, some to substances of another, and there are sharp divisions between the kinds. None of that, however, stops the hierarchy of features being prior to, and what explains, the hierarchy of beings. God is atop Locke's hierarchy of beings. He has 'perfect Wisdom' (E I.iv.21). More generally, the 'Degrees or Extent, wherein we ascribe Existence, Power, Wisdom, and all other Perfection, (which we can have any Ideas of) to that Sovereign Being which we call God' are 'all boundless and infinite' (E II.xxiii.34). The perfect being's features are perfections or excellencies, each of which he has to that boundless extent. Moreover God 'is infinitely more remote, in the real excellency of his nature, from the highest and perfectest of all created beings, than the greatest man, nay purest seraph, is from the most contemptible part of matter' (E 29 Various puzzling questions threaten to arise. For example: given that individuals of a species can have different levels of perfection, does Locke's view about the causation of perfections commit him to the view that children cannot be more perfect than their parents? 30 See for example E III.vi.26. 31 Ayers, Locke, 2: 171-2. 17 III.vi.11). As we see there, Locke talks about spirits which are inferior to God but superior to us: 'Cherubims, and Seraphims, and infinite sorts of Spirits above us' (E IV.iii.17).32 Humans rank below angels in the hierarchy of perfection, but above many other creatures. The reason for our place in the hierarchy of beings is our mental capacities' place in the hierarchy of features. Humans have 'the perfection of rational thinking' (E II.i.16). Memory is another perfection, though it may be possessed in a greater degree by higher beings: 'For who can doubt, but God may communicate to those glorious Spirits, his immediate Attendants, any of his Perfections, in what proportion he pleases, as far as created finite Beings are capable' (Essay II.x.9). God's perfection here is omniscience, and the memory of created beings is their lesser version of this. Meanwhile, the power of abstraction is another excellency that non-human animals lack (E II.xi.5). More generally, 'the most excellent Part of his [God's] Workmanship' is 'our Understandings' (E IV.xviii.5).33 It is clear that Locke is committed to hierarchies of perfection.34 That itself does not commit him to the principle about causation and perfection that is needed for the argument of Essay IV.x.10. Locke was familiar with such principles from the work of Cudworth and Descartes. Cudworth, as we saw above, thought that for a less perfect thing to cause a more perfect one 'would be to bring Something out of Nothing, in the Impossible Sense, or to suppose Something to be Made by It self without a Cause' (TIS 758). If this happened, then nothing 32 For further examples, see E II.x.9, II.xxiii.36, III.vi.12, III.i.23, IV.iii.17, and IV.xvii.14. 33 See also E II.i.15, II.ix.4, II.xxiii.5, IV.iv.15, IV.xiv.2, and Works 4: 460-3. 34 We also see a hierarchy of perfection in Descartes's work, but Descartes's hierarchy is a rather rough one, which tells us just that an infinite substance is more perfect than a finite one, which is more perfect than modes or accidents (AT 7: 165,185). Michael Della Rocca, 'Causation without Intelligibility and Causation without God in Descartes', in Janet Broughton and John Carriero (ed.), A Companion to Descartes (Malden, MA: Blackwell, 2008), 235-50, at 239, finds suggestions that Descartes thought there was a more fine-grained hierarchy, with finite minds being more perfect than finite bodies, and more complex bodies more perfect than less complex ones, but the evidence for this is far from overwhelming. 18 would explain the existence of the perfection of the new thing-the cause could not explain it, and nothing else could either.35 Moreover, a principle about causation and perfection had already been at work earlier in the chapter, when Locke argued in sections 4 and 5 that the first being must be the most powerful, and also knowing and intelligent. Locke's stated principle in section 4 is that 'whatever had its Being and Beginning from another, must also have all that which is in, and belongs to its Being from another too. All the Powers it has, must be owing to, and received from the same Source'. Received from is key here-Locke wants to rule, out, for example, the case in which an unthinking first cause gives rise to a thinking being. How exactly he proposes to do that is not exactly clear in section 4, but the reasoning about perfection that becomes more explicit later would make sense of that too.36 Though the principle about the causation of perfection is not visible throughout the Essay, it is something that Locke is clearly committed to in Essay IV.x.37 35 Descartes likewise believed that a less perfect thing could not cause a more perfect one. If such causation were to take place, the additional perfection in the effect would have been (objectionably) caused by nothing. In Descartes' case, there was a further complication: he did not just claim that it was impossible for less perfect things to cause the existence of more perfect things, but also that it was impossible for less perfect things to cause the existence of thoughts of more perfect things. This further complication has its own puzzles, but happily they need not detain us here, except to note that Locke clearly rejects this view. Locke thinks we perfectly well can, as finite beings with experience of the finite, construct an idea of a perfect being (E II.xxiii.34-6). 36 For Locke, as for other advocates of such principles, there seems to be an underlying commitment to a certain causal model of the transmission of perfections from cause to effect. The perfection that is received by the effect may be a weaker version of that in the cause, but can never be greater, for where could that extra perfection have come from? 37 Connolly ('Thinking Matter', 107) names the relevant principle 'CONTAINMENT', which 'means that a cause must contain the powers had by its effect' (107). We seem to be in broad agreement about the claim that is involved here, but unlike Connolly I would also include Locke among those 'early modern authors [who] approach this through the claim that causes must be at least as perfect as their effects'. Connolly contrasts talk of perfection with talk of powers, but for Locke some perfections are powers. (See note 60 below for a possible consequence of this disagreement about how to frame the causal principle.) 19 Locke's commitment to hierarchies of perfection is apparent throughout the Essay. In Essay IV.x, he shows he is also committed to a principle about the causation of perfections. These two commitments are employed, in Essay IV.x.10, in an argument that the first cause-the eternal being Locke had argued for earlier-cannot be an incogitative being. This argument rules out the possibility that the eternal being is mere incogitative matter. But another possibility remains: that the first cause is some sort of cogitative material being, not mere matter but a material God. 4. MATERIAL GODS 4.1 The Aims of IV.x.13-17 By the end of Essay IV.x.10, Locke thinks he has ruled out the view that the first cause is incogitative. A question remains though-what if God is both cogitative and material? As Locke puts the issue: 'perhaps it will be said, that though it be as clear as demonstration can make it, that there must be an eternal Being, and that being must also be knowing; yet it does not follow, but that thinking Being may also be material' (E IV.x.13). Sections 13 through 17 respond by arguing against the view that there is a material cogitative God.38 Locke's first objection to the material God view is in section 13, where he suggests that people who think this will tend to slide towards thinking there is just matter and no God, even though this is not really their considered view. He also argues, quickly, that these people ought to acknowledge an eternal immaterial thinking being. If (i) they think there can be matter without thought, then (ii) they think there is no necessary connection between matter and thought, and so 38 Descartes considered similar issues briefly in Principles of Philosophy 1.23, which says that 'God is not corporeal and does not perceive by means of the senses as we do, nor is he the originator of sin' (AT 7A: 13, CSM 1: 200). This was not a new thing to do. For instance, Aquinas had addressed the view that God is a body early in his Summa Theologiae (I, Q3, A1). 20 (iii) the previous demonstration of an eternal thinking being does not show there's a material God, just a God, and (iv) supposing God to be material is to no purpose. Locke does not take those thoughts to settle the issue though. Instead he distinguishes and considers versions of the material God view. The question used to distinguish the options seems to be, how could a material first being be a thinking being? The options are: that matter is essentially and irreducibly thinking (either all of it, or just one atom), or that the material God is a material system, the thought of which emerges from the structure and motion of its parts. Ultimately, Locke thinks that neither of these options is acceptable. Thus, Locke's answer to the guiding question of these sections, could the first cause be a cogitative material being?, is another firm 'no'. Locke might seem just to be working through possible things one might think in this realm, but there were, in fact, philosophers of the time who believed that God was material. Hobbes, for instance, held in the 1660s that God was a 'pure, simple, invisible spirit corporeal'.39 One might also wonder whether Locke had Spinoza in mind here. Several of Spinoza's early English readers understood him to think there was exactly one substance (which he called God) that was material in the same way that familiar bodies are (only larger). Spinoza, thus understood, was a materialist about all creatures, nature as a whole, and God as well. Henry More had offered such a materialist interpretation in 1679, saying that 'Spinoza means by God nothing more than infinite matter necessarily acting by itself'.40 Though we do not know how 39 Hobbes, EW 4: 313. For recent discussions of this view of Hobbes's, see Geoffrey Gorham, 'The Theological Foundations of Hobbesian Physics: A Defense of Corporeal God', British Journal for the History of Philosophy 21 (2013): 240-61; his 'Mixing Bodily Fluids: Hobbes's Stoic God', Sophia 53 (2014): 33-49; and Patricia Springborg, 'Hobbes's Challenge to Descartes, Bramhall and Boyle: A Corporeal God', British Journal for the History of Philosophy 20 (2012): 903-34. 40 Henry More, Henry More's Refutation of Spinoza, edited and translated by Alexander Jacob (Hildesheim: G. Olms, 1991), 78. This translates More's Demonstrationis Duarum 21 Locke understood Spinoza, More's reading gives us a way to see that Locke's arguments against a material cogitative God might have been aimed in part at Spinoza. Nevertheless, although Locke may have thought that Hobbes and Spinoza believed in material Gods, his argument against material God views does not proceed by interpreting their texts and objecting to the views he finds there. That's not often a way Locke proceeds in the Essay, even when he does seem to have targets in mind. Instead, Locke proposes his own categorization of ways in which material God views might work, and then opposes each sort of view. All this being so, it portrays Locke's target too narrowly to say, as Lisa Downing does, that 'Locke's central concern in E IV.x is to eliminate Hobbes's God'.41 Hobbes is a target, but Spinoza is perhaps one as well, and other versions of the material God view are also considered. 4.2 Against Material God Views on Which Some Matter is Essentially and Irreducibly Thinking In section 14, Locke considers the view that every particle of matter thinks, and has always done so. He notes that his opponents are unlikely to accept this, because it involves many eternal thinking beings, not one single material God: 'there would be as many eternal thinking Beings, as there are Particles of Matter, and so an infinity of Gods'. If the material God theorist is aiming for a view on which there is a material God, one single first thinking being, Locke seems right that holding this position is not a good option for them, as there is nothing to distinguish any one Propositionum, on Spinoza's Ethics, which was published in Henry More, Opera Omnia (London, 1679), 615-35. There is however no record of Locke owning More's Opera Omnia, though he did own several of More's other works (The Library of John Locke, #2043-2047a, p.192). He also owned several of Spinoza's works: the book on Descartes' Principles, the Tractatus Theologico-Politicus, and the Opera Posthuma (The Library of John Locke, #2518, p.223, #2742-4, p.238). 41 Lisa Downing, 'Locke's Ontology', in Lex Newman (ed.), The Cambridge Companion to Locke's Essay (Cambridge: Cambridge University Press, 2007), 352-80, at 378. 22 of the particles as the material God.42 Despite that, Locke does suggest that this is the best way for his opponents to explain how the material God can think.43 On other versions of their view, not all matter can think. Thus the question arises of how some of it can, if it cannot all do so. One way to avoid the apparent problem about an infinity of thinking beings would be to hold that only one particle of matter, one 'atom' as Locke says, could think. Locke distinguishes and rejects two versions of this view in IV.x.15. The first version holds that the single thinking atom was the first being, and that it produced the rest of matter. Locke notes that there is creation ex nihilo on this account, and argues that the materialist should reject this option because they reject such creation. Indeed, it's striking how much Locke takes the materialists he's engaging with to be worried about creation ex nihilo. However, creation ex nihilo is not obviously something that either Hobbes or Spinoza was much concerned about. Hobbes, for example, mentions creation several times in Leviathan without discussing its nature. There is some discussion of creation in Hobbes's work on Thomas White's De Mundo, but there he raises problems about White's account, not creation itself.44 Spinoza, meanwhile, does explicitly criticize talk of creation ex nihilo, but he does this only to argue that the 'ex' is misleading, its use suggesting that there is a thing called 'nothing' from which new things have been created. He argues that one should instead understand creation as the 'activity in which no 42 The question of whether God is unique arises in Locke's correspondence with van Limborch (Corr. letters 2340, 2395, 2413). 43 'And yet if they will not allow Matter as Matter, that is, every particle of Matter to be as well cogitative, as extended, they will have as hard a task to make out to their own Reasons, a cogitative Bring out of incogitative Particles, as an extended Being, out of unextended Parts, if I may so speak' (E IV.x.14). 44 Thomas Hobbes, Critique du De Mundo de Thomas White, edited by Jean Jacquot and Harold Whitmore Jones (Paris: Vrin, 1973), 364-6; Thomas White's De Mundo Examined, translated by Harold Whitmore Jones (London: Bradford University Press. 1976), 385-8. See Robert Pasnau, Metaphysical Themes 1274-1671 (Oxford: Oxford University Press, 2011), 22-7 and 31-3. 23 causes concur except the efficient'.45 Now, Spinoza did reject creation, at least as others understood the notion. Maybe Hobbes did so too. But the discussion and rejection of creation is not a key argumentative move for them, as Locke presents it as being for materialists. Locke's thought that materialists are concerned with creation ex nihilo may be explained by the way Cudworth had framed the debate for Locke. Cudworth clearly portrays his opponents as concerned with this issue. For example, one argument Cudworth discusses is: 'By God is alwayes Understood, a Creator of some Real Entity or other out of Nothing; but it is an Undoubted Principle of Reason and Philosophy, an Undenyable Common Notion, That Nothing can be made out of Nothing, and therefore there can be no such Creative Power as this' (TIS 738). That is, creation ex nihilo is a violation of the principle that you cannot get something from nothing, and so one should not believe in a divine creator. Cudworth rejects that, obviously. But he repeatedly emphasizes, in the section on the Achilles of the atheists, the question of the possibility of creation.46 The second version of the single atom view holds that all matter is eternal, but that only one atom of it can think. This avoids the alleged problem about creation, but there is now a question as to why this one atom can think when the other parts of matter cannot. Locke says this is absurd, and that there is no reason to say it-even if this might be possible, why think it is true? In addition, Locke seems to argue that all matter has the same nature, so there cannot be one atom with a different nature: 'Every particle of Matter, as Matter, is capable of all the same 45 The discussion is in the chapter (X) on creation in the 'Appendix concerning Metaphysical Thoughts' to Spinoza's book on Descartes' Principles (C 1: 333-9). 46 Creation ex nihilo continued to be an aspect of the debate in the Clarke-Collins correspondence. Samuel Clarke and Anthony Collins, The Correspondence of Samuel Clarke and Anthony Collins, 1707-08, edited by William L. Uzgalis (Peterborough, ON: Broadview, 2011), 245-6. 24 Figures and Motions as any other; and I challenge any one in his Thoughts, to add any Thing else to one above the other' (E IV.x.15). It is unclear, however, why one should not say that the special atom, as matter, 'is capable of all the same Figures and Motions as any other' atom, but because it is also thinking matter, is also capable of thought. Consider an analogy: a dog, as an animal, is a living thing, but as a dog is capable of barking. Locke may well be right that it is hard to find reasons and evidence for the one thinking atom view, but his explicit arguments against it appear problematic.47 4.3 Against the View That the Material God is a Material System The above versions of the material God view take some or all matter to be fundamentally and irreducibly thinking. That was an unusual choice for a seventeenth-century materialist.48 The more obvious, mechanistic approach was to say that that a properly organized material system gave rise to thought. In Essay IV.x.16 Locke discusses a version of that view, on which the organization of a material system is used to account for the thought of the first being, the material God. Locke disapproves: to suppose the eternal thinking Being, to be nothing else but a composition of Particles of Matter, each whereof is incogitative, is to ascribe all the Wisdom and Knowledge of that 47 A defender of Locke might argue as follows: the additional thought of the one atom cannot be an accidental feature of it, for then there would be no explanation of the thought's presence; so it must be an essential feature; but then it must belong to all matter. (Superaddition would be different, and not ruled out by this argument, for in the superaddition case, thought's presence in a body would be accidental but explained.) This argument relies however on a non-Lockean view of essences. One can apparently say, on Locke's view, that both the thinking atom and the rest of matter are matter, because they share the nominal essence of matter, even though they also differ in an important way. 48 One would have to put this point somewhat differently, if one thought that Spinoza was a materialist. Meanwhile, although she did not think God was material, Margaret Cavendish had proposed a view of matter as fundamentally thinking. Cudworth commented briefly on her view (TIS 137-8). 25 eternal Being only to the juxta-position of parts; than which, nothing can be more absurd. For unthinking Particles of Matter, however put together, can have nothing thereby added to them, but a new relation of Position, which 'tis impossible should give thought and knowledge to them (E IV.x.16). According to Locke, the wisdom, knowledge, and thought of the eternal being cannot be explained by the arrangement of the parts of a material being. Indeed, Locke thinks that no amount of wisdom, knowledge, and thought, no matter how small, could be explained this way- it is not the high degree of God's possession of these features that is at issue. Why does he think this? I suggest that thoughts about degrees of perfection are again at work in the background here, supporting the impossibility claim. Reading the argument in this way, Locke's claim of absurdity would be explained. This argument would be like that in Essay IV.x.10, though there would still be a difference between them. The argument in section 10 is about the efficient causation of thought. The argument in section 16 appears to be about a synchronic grounding relation, which one might want to distinguish from efficient causation. Locke seems inclined to assimilate the two cases though. Indeed, his final comment about a new relation of position, a rearrangement of the particles, not giving thought to them, suggests an inclination to think about this as an efficient causation case.49 49 Connolly claims that Locke thinks 'it would be possible for a material object to think prior to any act of superaddition on God's part' ('Thinking Matter', 2). It is true that Locke grants (at least for the sake of argument) the possibility that God might be a thinking material being, and his argument against that view is not just that it is impossible for matter to think. But it is not clear to me that we can find passages where Locke himself suggests it is possible that matter think, absent superaddition. Moreover, Locke's argument in IV.x.16 does, as I understand it, try to rule out thought being grounded in the structure and motion of the parts of an organized material system. 26 Section 17 offers a further argument against the view of God as an organized material system. Either, Locke says, the parts of that system are at rest or they are in motion. If they are at rest, then this system cannot think any more than an atom can: that is, merely having a number of atoms, or even a structure of them, cannot introduce thought. The second option is that (some of) the parts of the system are in motion. Against that, Locke offers an argument that turns on the regulation and guiding of motion. The core idea is that thought cannot be produced by unguided motion-how could the parts possibly move in the right way if they do not know which way to move? Here Locke does not quite argue that it would be impossible for such a system to think. Rather he argues that, even if it were able to think, it would not be able to think well-there would be no rationality or wisdom in such a system. Locke's reason concerns the regulation of motion. Even according to the materialist, only the right motions will produce thoughts. But, Locke argues, the right motions will only be produced if the matter is suitably guided. That guiding cannot happen in this particular materialist picture though, for there is nothing to guide the particles of the system. Locke is once again echoing Cudworth, among others. The idea that matter needs some external, immaterial guide to produce the features of the world we live in is a prominent one in the True Intellectual System. Indeed it is Cudworth's central reason for the existence of plastic natures, the immaterial beings he thinks guide the workings of the material parts of the created world (TIS 146-82). Moreover, there are again connections to Descartes: consider his comment in the First Meditation on what we would be like as epistemic agents if there were no God (AT 7: 21). According to Descartes, if I were merely the result of a chance combination of material objects, I would be extremely imperfect epistemically, no good at all at forming true beliefs 27 about the world. I would, that is-and here we see the connection to Locke-not be able to think well, if I were such an unguided material system. 5. SUPERADDITION The arguments of Essay IV.x are just part of Locke's discussion of materialism. We might hope that considering those arguments can help us better understand another part of that discussion, what Locke says about the superaddition of thought to matter. In this section I argue that they do help us in this way. First, I show how Locke's discussion in IV.x is consistent with his discussion elsewhere of superaddition, given my reading of IV.x. Secondly, I argue that my reading of IV.x gives us an argument for one particular understanding of superaddition. 5.1 Consistency The arguments of Essay IV.x oppose some sorts of materialism. Earlier on however, Locke had argued for the possibility of another sort of materialism. For he had argued that God could 'if he pleased, give to certain Systems of created senseless matter, put together as he sees fit, some degrees of sense, perception, and thought' (E IV.iii.6). That is, Locke says it is possible that humans' power of thought is the result of God superadding thought to the matter in us, rather than giving us an immaterial thinking mind. One might wonder-and readers of Locke have long wondered- whether there is a tension between these two sets of arguments.50 50 Downing, 'Locke's Ontology', for example, is framed in terms of this 'tension' (353), and the 'alleged inconsistency' is similarly noted early in Martha Brandt Bolton, 'Locke on Thinking Matter', in Matthew Stuart (ed.), A Companion to Locke (Chichester: Blackwell, 2015), 334-53, at 335. As I noted in section 3.1 above, Locke discussed this apparent tension in correspondence with Molyneux in 1693. 28 Think back first to IV.x.10, and the argument about the causation of perfections. Notice that the principle about perfection and causation that is so important in IV.x.10 generates no objection to God superadding thought to matter. In the superaddition case, God, the most perfect being, would be the efficient cause of the presence of this lesser perfection in us, which is entirely consistent with what is said in IV.x.10. The argument of IV.x.17 against God being a material system is also relevant. Here again, there is nothing that rules out superaddition. Locke argues that an undesigned material system could not think wisely. A material system to which God superadded thought would not be subject to this criticism. However exactly we take superaddition to work, it will involve God deliberately creating the thinking material being, and thus the presence of a guiding mind. Here I take Locke to be seeing a possibility that Cudworth did not see, in contrast to Ayers who has Locke modifying Cudworth's view to create this possibility.51 For superaddition is also consistent with Cudworth's principles in this area. Consider the relevant sense of the principle about not getting something out of nothing: 'Nothing can be Efficiently Caused or Produced, by that which hath not in it at least Equal, (if not Greater) Perfection, as also Sufficient Power to Produce the same' (TIS 339). This is consistent with the superaddition of thought to matter, if in that case we understand God as the efficient cause of thought in thinking matter. Thus, even Cudworth's ordering of perfections, and his causal principle, do not rule out superaddition. Cudworth may not himself have seen that possibility, but Locke did. Focusing again on Locke, I emphasize that my reading of Essay IV.x yields a view that is consistent with the claims of Essay IV.iii.6. This is, I think, an issue on which it is particularly desirable to be able to read Locke as being consistent. For in IV.iii.6 Locke refers forward to his 51 Ayers, Locke 2: 169-83. 29 own argument in IV.x that it is impossible that the eternal thinking being should be material. That is, Locke explicitly thought and said that he could make his claim about superaddition, despite the argument of IV.x. Of course it is possible that he missed some contradiction, but he had the consistency of the two claims in mind. 5.2 Beyond Consistency Those points about consistency are worth noting, but limited. I want to argue, however, that there are stronger connections between the discussion of Essay IV.x and the issue of superaddition, and that Locke's views about perfection and causation suggest a particular reading of what superaddition is. The secondary literature on Locke contains several readings of his views on superaddition. One central question on which they differ is this: 'did Locke claim that some bodies have powers which do not flow from their nature, or real essence'?52 That is, does Locke think that a feature superadded to a body flows from its nature (in a way in which he seems to think other features do) or not?53 If one thinks that superadded features do not flow from bodies' natures, the question arises of where these features-most relevantly, the power of thought in a material thinking 52 Patrick Connolly, 'Lockean Superaddition and Lockean Humility', Studies in History and Philosophy of Science 51 (2015), 53-61, at 53. In this section I ignore various distinctions (between natures and inner constitutions and real essences, between the natures of individuals and of kinds) that do not affect the point at issue. 53 The case of superaddition I am most concerned with is one that Locke says is possible, the superaddition of thought to the matter of human bodies. In writing to Stillingfleet, Locke seems to consider motion to be superadded to matter, as indeed are 'the properties of a rose, a peach, or an elephant' (Works 4: 460). On this view there is a good deal of known actual superaddition, not just possible superaddition, in the world. But see Stuart, Locke's Metaphysics, 266-7, on Locke's different uses of 'superaddition'. 30 thing-come from.54 In the simplest version of this view, the answer, quite directly, is God. Thus this has been called a 'voluntarist' understanding of superaddition: the explanation lies in God's will. One might have a more complex version of this view that appeals to laws of nature, but that is itself, in this context, a roundabout way of talking about God's acts of will.55 On any version of this view, Locke's picture of the superaddition of thought to matter involves God giving certain material beings the power to think, and there being no way to explain the presence of that power of thought with reference only to the nature of the material beings, even their nature after the act of superaddition.56 On a non-voluntarist reading of superaddition, by contrast, the explanation for the presence of the superadded features lies in the nature of the thing to which the features are superadded. This can work in different ways: perhaps God, in superadding the features, merely arranges the parts of the thing appropriately, or perhaps he goes further and changes the nature of the thing.57 On this view, Locke's picture is that God might give the power of thought to some material beings by changing the inner nature of those material beings-not by simply adding the power of thought to their nature, but by making some other change, so that the nature of the 54 For the view that superadded features do not so flow, see Margaret Dauler Wilson, Ideas and Mechanism (Princeton: Princeton University Press, 1999), 196-214. The view of Stuart (Locke's Metaphysics, 273) that Locke has no theory of how God might superadd thought to matter is related. 55 For this sort of interpretation, emphasizing the role of laws of nature, see Edwin McCann, 'Locke's Philosophy of Body', in Vere Chappell (ed.), The Cambridge Companion to Locke (Cambridge: Cambridge University Press, 1994), 56-88. 56 God's will is invoked as the cause of the power of thought, rather than the cause of individual thoughts, distinguishing this view from occasionalist ones. Michael Ayers, 'Mechanism, Superaddition, and the Proof of God's Existence in Locke's Essay', Philosophical Review 90 (1981), 210-51, alleges that Wilson's version of the voluntaristic view involves Locke in 'a curiously ambivalent attitude towards Occasionalism' (220), but Wilson justifiably denies this (Ideas and Mechanism, 211). 57 For such views, see Ayers, Locke and Downing, 'Locke's Ontology'. 31 changed beings now gives rise to and can fully explain, with no reference to God, the presence of the power of thought. The views about perfection and causation Locke relied on in IV.x make a difference to which reading we choose here. In the case of the superaddition of thought to matter, the voluntarist reading of superaddition explains the presence of a perfection, thought, directly in terms of the actions of God. That does not violate Locke's views about the hierarchy and causation of perfections. The non-voluntarist reading, however, explains the presence of the superadded perfection in terms of the underlying, less perfect, features of the body, and that does appear to violate Locke's views about what can give rise to what. (The non-voluntarist reader of Locke thinks, after all, that once God has superadded thought to a material being, features of that material being-e.g., the arrangement of its particles-explain the presence of thought in it.) Strictly speaking, perhaps the non-voluntarist reading would not violate the principle about causation that is in play in IV.x.10, which is about diachronic efficient causation, as the superaddition case is plausibly an instance of synchronic grounding explanation. However, as we saw in looking at IV.x.16, Locke uses a similar principle in thinking about what is apparently a synchronic grounding explanation. That principle is apparently violated on the non-voluntarist reading of superaddition. I think, then, that these thoughts about causation and perfection give us reason to favour a voluntarist reading of Locke on superaddition. This argument is not entirely decisive. At least two responses are possible. One response is available to some, but not all, non-voluntarist readings. Consider in particular Lisa Downing's reading, on which what God does to an object's nature in superadding is not just to arrange corpuscles differently, but to give matter a different nature, a 32 'nonmechanical real constitution'.58 (The new nature is not to include the power of thought itself, but is supposed to explain its presence.) Given that reading, perhaps one might say that this new nature is perfect enough to give rise to thought. But it is hard to see how Locke could say that. This new nature, whatever it is, is not thinking. Locke's views about the scale of perfection, however, are largely based on mental perfections, including the superiority of the thinking to the unthinking. Given this, the new nature would be less perfect than thought-and thus, by Locke's principles, unable to give rise to thought. Another response is available both to Downing and to defenders of other non-voluntarist readings. They might say that God, in superadding thought to bodies by arranging their parts or changing their natures, is still the efficient cause of the presence of thought. If one could identify God as the cause in this case, then there would be no violation of Locke's views about perfection. Now, I suspect that Locke's comments about the causation of perfection are just not precise enough to determine whether God or the nature of the body is to be identified as the cause of the perfection, for the purpose of assessing whether the principle is violated. But I note that identifying God as the relevant cause in this case is liable to lead one to identifying God as the responsible cause of all change in the world, even in those cases in which one might want to say human beings were responsible. Moreover, one motivation for non-voluntarist readings has been to maintain the view that Locke thought all features of bodies could be explained in terms of their inner constitutions, flowing from their natures.59 Saying that God is the cause of a body's power of thought, while the body's nature is the explanation of that power, may not be contradictory, but is surely awkward. Thus, this response is not without its potential difficulties. 58 Downing, 'Locke's Ontology', 372. Downing distinguishes two versions of that view, but the distinction is not relevant here. 59 This is the sort of view that Ayers calls 'mechanism' (Locke, 2: 135-53) and Downing calls 'essentialism' ('Locke's Ontology', 368). 33 Overall, then, though there is some room for response, it remains plausible that the nonvoluntarist reading of the superaddition of thought to matter commits Locke to a violation of his principles about the causation of perfections. One's reading of superaddition arguably ought not to commit Locke to that inconsistency. So there is reason to prefer a voluntarist reading of superaddition-one on which God would be the efficient cause and explanation of the presence of the superadded power of thought in material bodies, something that does not violate Locke's views about causation and perfection.60 6. CONCLUSION Arguments about the causation of perfection play an important role in Essay IV.x. This reasoning about perfection might nevertheless seem odd as a piece of Lockean philosophy. Views about the possibilities of causation in a hierarchy of perfection are at home in the systems of Descartes and Cudworth. But how do they fit in Locke's book about the human understanding? The observation that this reasoning is in some sense odd for Locke is appealing, but needs qualification. First, as I argued previously, Locke's belief in the hierarchy of perfection is not confined to IV.x, but seems to be a consistent view in the Essay. What is surprising in IV.x is the view about the causation of perfections. Secondly, I maintain that what Locke says about 60 Connolly, 'Thinking Matter', has recently taken Essay IV.x to be compatible with what he calls 'reductionist understandings of superaddition' (129)-the views I called non-voluntarist readings, such as those of Ayers and Downing. I think, however, that something we agree on- the important role of principles of causation in Essay IV.x-shows this cannot be the case. Perhaps one might trace this disagreement to our earlier disagreement about whether to think about the causal principle in terms of perfections (note 37 above). Perhaps one can argue on, say, Downing's view, that the power of thought is already in the new nature of the material body, in some sense of 'in'. That new nature remains unthinking, however, and thus less perfect than the power of thought itself. 34 thought in IV.x is consistent with what he says about superaddition in IV.iii. Although Locke's approach in IV.x may seem unusual for him, it is integrated in the larger work. Those qualifications made, I am prepared to grant that the metaphysics of IV.x fits somewhat awkwardly with the rest of the Essay. Perhaps this is not a unique example though. Consider the much-discussed comments about substance at the start of Essay II.xxiii. There too Locke is discussing a metaphysical topic. There too his approach resembles one in an earlier Cambridge Platonist text-though in that case one from More, rather than Cudworth.61 In both places one might conclude that Locke's metaphysical apparatus is somewhat under-developed. But in both cases Locke sees the need to address a metaphysical topic related to his main enquiry.62 Under-developed or not, Locke does rely on reasoning about the causation of perfections in Essay IV.x. He argues there that the first cause, the eternal being, cannot be material. It cannot be incogitative matter, and it cannot be cogitative matter. In arguing against the first option, and again in arguing against a version of the second option, Locke relies on arguments about the causation of perfections. Once we see that, we can also see something about how to understand the superaddition of thought to matter. In that area, we have reason to prefer a voluntarist 61 I have in mind some passages early in The Immortality of the Soul: More's axiom VIII about unknown substance, the claim in the following chapter 3 that 'the notion of Spirit is altogether as intelligible as that of Body', and the associated discussions. Henry More, The Immortality of the Soul (London, 1659), 11-21. 62 Stuart, Locke's Metaphysics finds there's a lot that's interesting to say about Locke's metaphysics, and Locke does make some metaphysical commitments in the Essay. Still there is a difference between Locke's approach and that of a more metaphysically focused contemporary such as Leibniz. 35 reading. By doing so, we preserve the consistency of Locke's arguments in IV.x and IV.iii.6, a consistency which he himself emphasizes.63 63 I thank audiences at Texas A&M, the University of Florida, and the 2019 Eastern APA for discussion of these issues, and Patrick Connolly and Jessica Gordon-Roth for their comments on the APA paper.
|
2024-05-12T01:26:36.242652
|
https://example.com/article/4739
|
---
title: 自定义活动
ms.date: 03/30/2017
ms.assetid: 5cde06b3-51b2-4e46-900d-11140bae77f4
ms.openlocfilehash: 3802d06f503ecac456cb65ea46497c4056e475b2
ms.sourcegitcommit: 9b552addadfb57fab0b9e7852ed4f1f1b8a42f8e
ms.translationtype: MT
ms.contentlocale: zh-CN
ms.lasthandoff: 04/23/2019
ms.locfileid: "61913856"
---
# <a name="custom-activities"></a>自定义活动
本节包含演示如何创建 Windows Workflow Foundation (WF) 中的自定义活动的示例。
## <a name="in-this-section"></a>本节内容
[Code-Bodied](code-bodied.md)
包含使用代码以声明方式创建的自定义活动示例。
[自定义活动设计器](custom-activity-designers.md)
包含使用自定义设计器在工作流设计器中进行显示的活动示例。
|
2023-12-22T01:26:36.242652
|
https://example.com/article/9204
|
It's reflective of the Ginsburgs' real-life egalitarian marriage, almost never seen in Hollywood films. But the role is so much more than just the typical gender-swapped "spouse on phone" roles most often seen, and Hammer is a delight as the sunny Marty.
What Baldwin does with words, Jenkins does visually. It’s what Blanche DuBois says in “A Streetcar Named Desire”: “I don’t want realism. I want magic!” In “Beale Street” that magic can be crushing, and soul-stirring, sometimes simultaneously. Jenkins’ epilogue, not found in the novel, may go a little far in its embrace of the affirmative. But that’s hardly the worst thing you can say about any film, let alone one as lovely as this one.
What Vice says, and how it says it, will have half its audience nodding in angry, contemptuous agreement, and the other half calling it a liberal smear. In other words it’s like everything else in the culture right now.
It brings me no joy to relay this: From an irresistible “tell me more!” of a true story, Eastwood and his “Gran Torino” screenwriter Nick Schenk have made a movie that feels dodgy and false at every turn.
If all you do is look at their performances, the historical drama is worthy of praise. Step back, and the overall production stumbles through writing mistakes, has a drab look and a storytelling structure that puts the main event so deep into the tale it's almost an afterthought.
This addiction drama is primarily a showcase for its superb leading performers, and in its compressed time frame (24 hours around Christmas) it feels like a well-made play more than a fully amplified feature film. The acting is enough, though.
|
2024-02-20T01:26:36.242652
|
https://example.com/article/6794
|
Scheme ではリストを作るときにリストの頭に要素を追加していき、最後に reverse で逆転するというイディオムが定着している。 諸々を考慮するとおおよその場合は最良の戦略だと思う。 しかし、リストの末尾に要素を追加できないわけではない。
例えばリストの内容を指定回数繰返したリストを返すような手続きはこう書くことも出来る。
( define ( cycle lst n ) ( let* (( r ( cons #t '())) ( lp r )) ( do (( i 0 ( + i 1 ))) (( = i n ) ( cdr r )) ( for-each ( lambda ( x ) ( let (( n ( cons x '()))) ( set-cdr! lp n ) ( set! lp n ))) lst )))) ( cycle '( 1 2 3 ) 3 )
要するにリストの最後のペアへの参照を常に持っておけばよいということだ。
この例ではあえて末尾に追加していく利点はあまりない (少なくとも速度的には劣る) が、追加する途中でリストを参照しなければならないような場合にはこういう方式が役に立つこともあるだろう。 私が思い付く例で言えば、遅延評価を用いずにエラトステネスの篩を書くような場合などがある。 そういったときはキューのような形に抽象化しておくと更にやり易いかもしれない。
Document ID: 9d4475d396b6d84a651b59eab03a3222
|
2024-03-19T01:26:36.242652
|
https://example.com/article/5241
|
Menu
Bacon Uniform
This story came from USA Today earlier today. The Lehigh Valley IronPigs, the Triple-A affiliate of the Philadelphia Phillies, are going to wear a “Bacon-Themed” uniform in games this year. Check out the “For The Win” column. I feel like I need one of these caps for the collection. One question: Is it “Scratch-and-Sniff?”
|
2023-10-17T01:26:36.242652
|
https://example.com/article/4252
|
MIAMI – Indiana Pacers players say they have to protect themselves, especially their knees, when Miami Heat forward Shane Battier is in the game during the Eastern Conference finals.
Ahead of Thursday's pivotal Game 5 with the series tied 2-2, Pacers big men David West and Roy Hibbert said part of the Pacers' preparation for the Heat is to watch out for Battier attempting to take shots at their knees.
"I (learned) to always have my guard up and protect my knees," West said. "(Battier) has got this funny way of moving into your knees. We're very conscious of that. We talk about making sure we protect our knees."
|
2024-02-03T01:26:36.242652
|
https://example.com/article/7190
|
This invention is in the field of devices for removing solids from paint and in particular in the field of devices for straining solids from paint that would hinder the use of a paint sprayer.
At the time of manufacture, the pigment and other non-solvent constituents of paint, as well as contaminants, are typically in solution or suspended with a small particle size. As the paint subsequently sits in bulk storage containers and buckets in which the paint is distributed and sold, some of the solids tend to aggregate and settle out. A skim of solids may also form on the top of the paint. Attempts to break down these clumps into a small particle size and to re-suspend the solids through shaking the paint at the time of sale is usually not entirely successful. Furthermore, the paint may sit for days or longer after sale resulting in the aggregation or re-aggregation of more clumps. Attempts to break down the clumps and re-suspend the solids at the time of use by stirring or hand shaking also leads to a limited success. The result is that, at the time of use, paint usually will have clumps and other solids that will clog the intake screen of a paint sprayer, thereby resulting in lost time and lost productivity in the painting process.
A number of devices have been developed to deal with this problem, with varying degrees of success. Some of the prior art devices provide for screening of the paint as it is poured into the top of a receiving bucket. These devices are generally positioned on or affixed to the top rim of the receiving bucket. Each of these devices has a straining surface or screen which may range in configuration from a flat screen extending across the top of the receiving bucket, such as is disclosed in U.S. Pat. No. 5,059,319 to Welsh, or a bag shaped screen extending downwardly below the top of the straining device or below the top of the receiving bucket such as that disclosed in U.S. Pat. No. 6,247,600 B1 to Sullivan, U.S. Pat. No. 5,368,728 to Reaves, U.S. Pat. No. 5,186,828 to Mankin, U.S. Pat. No. 4,946,591 to Mealey, U.S. Pat. No. 4,804,470 to Calvillo et al., U.S. Pat. No. 2,250,646 to Metsch, U.S. Pat. No. 2,070,998 to Odom, U.S. Pat. No. 1,451,206 to Dow, U.S. Pat. No. 1,051,735 to Hammond, and U.S. Design Pat. No. 410,123 to Matarazzo et. al.
U.S. Pat. No. 1,590,572 to Fredette discloses a strainer cup for use with varnish.
U.S. Pat. No. 3,301,404 to Becker discloses a strainer that is held against the top of a paint bucket as it is tipped. The paint is poured from the bucket through the strainer into a receiving bucket, thereby straining out the solids.
U.S. Pat. No. 5,935,435 to Hasler and U.S. Pat. No. 6,149,808 to Johnson disclose cylindrical or cup shape strainers for inserting in a bucket of paint, providing for the straining of solids from the paint as it flows inwardly through the cylindrical strainer into the interior space of the strainer. The Hasler device provides for the pouring of paint from the interior of the cylinder. The Johnson device merely provides for the insertion of a brush or other painting implement into the interior of the cylinder where the strained paint is available.
While each of the foregoing devices achieves the principal objective, namely to remove unwanted solids from the paint, with some degree of success, each has some significant deficiencies. Each of the devices using a flat horizontal strainer affixed at the top of a receiving bucket or a bag shaped strainer mounted above or extending into the receiving bucket are mainly designed for batch use. That is, they are mounted on a receiving bucket, paint is poured in through the strainer into the receiving bucket and then the strainer is removed. The straining device must then be cleaned to prevent the paint from drying in place and stored for re-use, unless the strainer is intended for disposal after only one use. While the device disclosed by Sullivan does provide for a paint sprayer intake to be inserted into the reservoir of strained paint, with the strainer device remaining in place considerable strainer area is still exposed to drying as the paint is drawn down. The remaining devices disclosed by the patents identified above appear very ill suited for a continuous paint spraying operation. Further, these devices are generally expensive, cumbersome and time consuming to use. Most of them, from a practical standpoint, require either that they be disposable or that messy cleaning effort be made repeatedly to allow re-use of the screen. The devices providing for straining into an interior cup or cylinder shape strainer are particularly poorly suited for use with a continuous paint spraying operation.
A device is needed that provides for the reliable, economical and non-disruptive straining of paint that is readily compatible with a continuous paint spraying operation.
It is an objective of the present invention to provide a paint strainer that will provide for continuous straining of paint for a paint spraying operation.
It is a further objective of the present invention to provide a paint strainer which is economical.
It is a still further objective of the present invention to provide a paint strainer which is specifically designed for use with paint buckets which are commonly used by manufacturers for distributing and selling paint.
It is a still further objective of the present invention to provide a paint strainer which does not require frequent cleaning.
It is a still further objective of the present invention to provide a paint strainer that is easy to clean.
It is a still further objective of the present invention to provide a paint strainer which strains the paint as the paint flows from one side of the bucket to the other horizontally through the paint strainer.
The present invention is a paint strainer dimensioned to fit in a paint bucket, in a vertical position, snugly against the bottom and opposing sides of the paint bucket. The paint strainer fits in a vertical plane which passes through the center of the paint bucket, dividing the paint bucket into a receiving side and a strained paint side. The paint strainer has a strainer frame around the perimeter of the paint strainer which defines the bottom, sides and top of the paint strainer, and has a paint screen which is secured and sealed to the strainer frame. A pair of bucket top brackets, one affixed to the top of each side of the strainer frame, secures the paint strainer to the paint bucket.
Once the paint strainer is inserted into the paint bucket and secured in place by the bucket top brackets, paint is poured into the receiving side of the paint bucket and the paint flows through the paint strainer into the strained paint side of the paint bucket. This can continue until the paint bucket is full, with unstrained paint on the receiving side of the paint strainer and strained paint on the strained paint side of the paint strainer. A paint sprayer intake tube can then be inserted into the strained paint side for spray painting. As the paint on the strained paint side is drawn down, paint continues to flow from the receiving side through the paint strainer to the strained paint side. With periodic replenishment of the paint on the receiving side, the paint spraying operation can proceed more or less continuously, ordinarily without the necessity of removing and cleaning the paint strainer until the paint spraying operation is finished for the day.
|
2024-07-21T01:26:36.242652
|
https://example.com/article/1889
|
Inhibition of biliary phospholipid secretion by bilirubin in partially hepatectomized rats.
The effect of i.v. administration of bilirubin on biliary phospholipid secretion was studied in sham operated and two-thirds hepatectomized Wistar rats. Following bilirubin infusion at 260 nmol/100 g body wt/min, a maximal biliary bilirubin excretion was reached in the sham operated rats. No modifications of bile flow or bile acid secretion appeared, but biliary phospholipid secretion was significantly inhibited. At 12 and 24 h after hepatectomy, the maximal bilirubin excretion was markedly lowered but biliary phospholipid secretion still remained significantly inhibited. The infusion of taurocholate at 200 nmol/100 g body wt/min counteracted the impairment of phospholipid secretion, both in sham operated and hepatectomized animals. Bile acid secretions more than two-fold that of the controls were needed to reach half maximal biliary phospholipid secretion in bilirubin-infused animals, with or without the addition of taurocholate.
|
2023-10-29T01:26:36.242652
|
https://example.com/article/5120
|
/* ScummVM - Graphic Adventure Engine
*
* ScummVM is the legal property of its developers, whose names
* are too numerous to list here. Please refer to the COPYRIGHT
* file distributed with this source distribution.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*
*/
#include "bladerunner/script/ai_script.h"
namespace BladeRunner {
// Notes:
// kActorBlimpGuy's speech appears
// in specific scenes:
// - AR01, AR02
// - BB01
// - CT01, CT02, CT03, CT04, CT06, CT07, CT08, CT12
// - DR01, DR04
// - MA05
// - RC03
// and one cutscene:
// - TB_FLY
// In the in-game scene his speech is played as ambient sound using Ambient_Sounds_Add_Speech_Sound()
// It is thus not subtitled as of yet.
// TODO: maybe if we support dual subtitles being displayed on-screen
// The Blimp Guy's speech in the TB_FLY VQA cutscene is subtitled.
//
// The FRA and ESP versions do not use the Blimp's horn sound at all during any of the announcements
//
// From the available quotes for kActorBlimpGuy, only quotes with id 0, 20, 40, 50 are used.
// Quote 10 is unused:
// "A new life awaits you in the Off-World colonies."
// "The chance to begin again in a golden land of opportunity and adventure."
// - In ENG and DEU versions it is identical with the second half of quote id 0 and thus redundant
// - In FRA, ESP and ITA versions it is the missing second half of quote id 0 and is thus "required"
// TODO: Figure out a way to restore this quote as a continuation of the previous quote
// given that this is ambient sound!
//
// Quote 30 is unused:
// Roughly translates to: "What are you waiting for? Emigrate to the colonies!"
// - In ENG version this is a *boop* sound
// - In DEU version this is the start of a new announcement (the Blimp horn plays)
// - In ITA version this should be a continuation of an announcement (the Blimp horn does not play)
// - In FRA and ESP version this can be either a new announcement or a continuation of the previous announcement
// (the Blimp horn does not play ever in FRA and ESP versions)
// TODO: Figure out a way to restore this quote as a continuation of the previous quote
// given that this is ambient sound!
//
AIScriptBlimpGuy::AIScriptBlimpGuy(BladeRunnerEngine *vm) : AIScriptBase(vm) {
}
void AIScriptBlimpGuy::Initialize() {
_animationFrame = 0;
_animationState = 0;
_animationStateNext = 0;
_animationNext = 0;
}
bool AIScriptBlimpGuy::Update() {
return false;
}
void AIScriptBlimpGuy::TimerExpired(int timer) {
//return false;
}
void AIScriptBlimpGuy::CompletedMovementTrack() {
//return false;
}
void AIScriptBlimpGuy::ReceivedClue(int clueId, int fromActorId) {
//return false;
}
void AIScriptBlimpGuy::ClickedByPlayer() {
//return false;
}
void AIScriptBlimpGuy::EnteredSet(int setId) {
// return false;
}
void AIScriptBlimpGuy::OtherAgentEnteredThisSet(int otherActorId) {
// return false;
}
void AIScriptBlimpGuy::OtherAgentExitedThisSet(int otherActorId) {
// return false;
}
void AIScriptBlimpGuy::OtherAgentEnteredCombatMode(int otherActorId, int combatMode) {
// return false;
}
void AIScriptBlimpGuy::ShotAtAndMissed() {
// return false;
}
bool AIScriptBlimpGuy::ShotAtAndHit() {
return false;
}
void AIScriptBlimpGuy::Retired(int byActorId) {
// return false;
}
int AIScriptBlimpGuy::GetFriendlinessModifierIfGetsClue(int otherActorId, int clueId) {
return 0;
}
bool AIScriptBlimpGuy::GoalChanged(int currentGoalNumber, int newGoalNumber) {
return false;
}
bool AIScriptBlimpGuy::UpdateAnimation(int *animation, int *frame) {
return true;
}
bool AIScriptBlimpGuy::ChangeAnimationMode(int mode) {
return true;
}
void AIScriptBlimpGuy::QueryAnimationState(int *animationState, int *animationFrame, int *animationStateNext, int *animationNext) {
*animationState = _animationState;
*animationFrame = _animationFrame;
*animationStateNext = _animationStateNext;
*animationNext = _animationNext;
}
void AIScriptBlimpGuy::SetAnimationState(int animationState, int animationFrame, int animationStateNext, int animationNext) {
_animationState = animationState;
_animationFrame = animationFrame;
_animationStateNext = animationStateNext;
_animationNext = animationNext;
}
bool AIScriptBlimpGuy::ReachedMovementTrackWaypoint(int waypointId) {
return true;
}
void AIScriptBlimpGuy::FledCombat() {
// return false;
}
} // End of namespace BladeRunner
|
2024-05-20T01:26:36.242652
|
https://example.com/article/2926
|
1.. Introduction
================
The Do-It-Yourself (DIY) movement is spreading beyond traditional domains, such as home painting, to more modern domains, such as programming. DIY programming gets especially interesting when it involves real-time data from the growing amount of smart objects with embedded sensors and when actuators can be triggered to perform real-world actions accordingly. It becomes even more interesting and appealing when access to these smart objects can be obtained over the ubiquitous Internet---leading to what is now mostly known as the Internet of Things (IoT). However, these smart objects are typically optimized for low-power consumption and low-cost. They are constrained in their processing capabilities (CPU, RAM, ROM,...) and thus unable to run standard Internet protocols. The networks that connect these objects together are often referred to as low power and lossy networks (LLNs).
Connecting LLNs to the Internet, communicating with smart objects, and manipulation of sensor data and actuators was largely done in proprietary ways. Each vendor had its own set of protocols and tools to access, interpret and if needed manipulate sensor data and to trigger actuators. More recently a lot of effort has been put into the development of open standards that cover many aspects of communication and access to smart objects. At the networking layer 6LoWPAN allows IPv6 communication with these objects through an adaptation layer \[[@b2-sensors-14-09833]\]. At the application layer standards are being prepared to allow access to these objects in a RESTful way, similar to how most information on today\'s Internet is accessed over HTTP. The main driver behind this is the Internet Engineering Task Force (IETF). The IETF established the Constrained RESTful Environments (CoRE) working group with the aim of realizing the REST architecture in a suitable form for the most constrained nodes and networks. Constrained devices are turned into embedded web servers that make their resources accessible via the CoAP protocol. CoRE is aimed at machine-to-machine (M2M) applications such as smart energy and building automation \[[@b3-sensors-14-09833]\].
Typically, each of the constrained servers has at least one CoAP resource that may be queried by clients to obtain information about the smart objects themselves (e.g., battery level), about the environment that they monitor (e.g., temperature of the room), or to trigger the objects to perform real-world actions (switch the light on). These CoAP resources are identified by a Uniform Resource Identifier (URI) such as coap://\[aaaa::1\]/temperature.
Depending on the application, information from individual objects might not be sufficient, reliable, or useful. An application may need to aggregate and/or compare data from several nodes in order to obtain accurate results. In the same way, a single user request might need to trigger a series of actions on multiple actuators. This need to communicate with groups of objects is obvious in many IoT scenarios. For example, in a smart home, when you leave your bed during the night, you might want that the lights in the bedroom, hall and toilet turn on automatically until you go to bed again. Or, when suspicious movement is detected in the living area during the night, several actuators may be triggered such as an alarm going off and particular lights being turned on or made flashing. From these two simple examples, one can already see that the same lights can be parts of different groups according to the needs of the user. The needs can change regularly and thus the grouping and ungrouping of resources should be flexible and easy. Similar examples for the need of group communication can be found in virtually any IoT scenario.
The need for group communication is very well recognized in the IETF. This can be clearly seen from the charter of the IETF CoRE Working Group. The charter clearly states that the "initial work item of the WG is to define a protocol specification for CoAP that includes ... the ability to support a non-reliable multicast message to be sent to a group of Devices to manipulate a resource on all the Devices in the group." The charter also states that "the working group will not develop a reliable multicast solution" \[[@b4-sensors-14-09833]\].
Although multicast may be used to transmit the same request to several objects, multicast communication in LLNs has some disadvantages. For instance, it is more difficult to route multicast traffic with a minimum of message duplication at the receiving hosts than in the case of unicast. Furthermore, basic multicast is not reliable in an LLN, which is problematic for requests that require guaranteed delivery. Also, the creation of multicast groups, defining which objects should be addressed when using a particular multicast address, is hard to realize inside LLNs. Additionally, the use of network wide multicast increases the footprint of the code that needs to fit on the constrained objects, and it is to be expected that this functionality will not be available in many LLNs.
As an alternative, unicast-based solutions may be considered. Some unicast-based solutions (such as reliable messaging) have been introduced to alleviate some of the problems above, but these features are insufficient. The current CoRE drafts do not foresee any unicast-based way to manipulate resources that are located on multiple smart objects with a single client request. To overcome this shortcoming and be able to perform such composite requests, intelligence is typically added to the client application to make it communicate with the smart objects individually. This leads to more complex user applications, and the added intelligence and programming cannot be easily shared with other applications. Furthermore, complex user applications may be unmanageable. Any modifications to those complex user applications may require significant testing time, thus limiting the flexibility of the user applications. Additionally a large overhead of communication between the client machine and the smart objects is generated, especially when many smart objects are involved in these actions. When the communication between the client and the smart objects is done across the Internet, delays are unpredictable and a sequence of actuator commands might arrive out of order and possibly have unwanted results. Furthermore, if the communication occurs over costly links, communication between the client and the smart objects might get unnecessarily expensive.
In this paper we propose a novel solution for communication with a group of resources across multiple smart objects based on CoAP unicast. The group members can be homogeneous or heterogeneous, on a single node or on multiple nodes, or another group. The group that we create is itself exposed as a RESTful CoAP resource, and thus can be accessed by any CoAP client (including other constrained devices). We include optional validation of the group at creation time; we attach a profile to the created group and thus can customize its behavior and provide fine-grained control over it. We have implemented our solution and provide a functional and performance evaluation for it. In the past, we have already presented our concept along with an initial implementation in \[[@b1-sensors-14-09833]\]. In this expanded article, we elaborate on the concept, add more advanced features to the implementation, compare our solution with multicast and evaluate its functionality and performance.
The remainder of this paper is structured as follows: first, we will briefly provide an overview of CoAP in Section 2. We then discuss CoAP group communication requirements and related work in Sections 3 and 4. Next, in Section 5, we describe our approach in detail. In Section 6, we present our implementation and evaluate the functionally and the performance of our solution. In Section 7, we discuss the results and compare them to the requirements. Section 8 concludes this work with a summary and outlook.
2.. CoAP Overview
=================
The focus of this paper is to enable interaction with a group of devices from a service/application perspective in a way that is in line with ongoing standardization activities in the field of IoT. In the last few years a lot of effort has been put in defining a standard application protocol, similar to HTTP, but more suitable for constrained devices, namely CoAP. The base CoAP protocol is defined in draft-ietf-core-coap \[[@b5-sensors-14-09833]\] in conjunction with a number of additional specifications. In this section we briefly introduce the base CoAP specification and those extensions that are relevant to our group communication work.
2.1.. Base CoAP
---------------
CoAP uses the same RESTful principles as HTTP, but it is much lighter so that it can run on constrained devices \[[@b6-sensors-14-09833],[@b7-sensors-14-09833]\]. To achieve this, CoAP has a much lower header overhead and parsing complexity than HTTP. It uses a 4-bytes base binary header that may be followed by compact binary options and payload. [Figure 1](#f1-sensors-14-09833){ref-type="fig"} shows the CoAP message format as specified in version 18 of the draft. This version was approved by the Internet Engineering Steering Group (IESG) in July 2013 and was at the time of writing this article being edited by the RFC editor to convert the draft into an RFC. Thus, it is expected that this will be the final CoAP message format.
The CoAP interaction model is similar to the client/server model of HTTP. A client can send a CoAP request, requesting an action specified by a method code (GET, PUT, POST or DELETE) on a resource (identified by a URI) on a server. The CoAP server processes the request and sends back a response containing a response code and payload. Unlike HTTP, CoAP deals with these interchanges asynchronously over a datagram-oriented transport layer such as UDP and thus also supports multicast requests. This allows CoAP to be used for point-to-multipoint interactions which are commonly required in automation. Optional reliability is supported within CoAP itself by using a simple stop-and-wait reliability mechanism upon request. Secure communication is also supported through the optional use of Datagram Transport Layer Security (DTLS) \[[@b8-sensors-14-09833]\]. As can be seen in [Figure 1](#f1-sensors-14-09833){ref-type="fig"} all CoAP messages start with a 4-bytes base binary header that consists of the following fields: *Version (V)*: indicates the CoAP version number. Current version is 1.*Type (T)*: indicates if this message is of type Confirmable, Non-Confirmable, Acknowledgement or Reset.*Token Length (TKL)*: indicates the length of the variable-length Token field.*Code*: indicates if the message carries a request (1--31), a response (64--191), or is empty (0). In case of a request, the Code field indicates the Request Method (GET, POST, PUT and DELETE); in case of a response a Response Code.*Message ID*: is used for the detection of message duplication, and to match messages of type Acknowledgement/Reset to messages of type Confirmable/Non-confirmable.
To be able to offer communication needs that cannot be satisfied by the base binary header alone, the base 4-bytes header may be followed by one or more of the following optional fields: *Token*: the Token is used to correlate requests and responses.*Options*: an Option can be followed by the end of the message, by another Option, or by the Payload Marker and the payload.*Payload*: if present and of non-zero length, it is prefixed by a fixed, one-byte Payload Marker (0xFF) which indicates the end of options and the start of the payload. The payload data extends from after the marker to the end of the UDP datagram, *i.e.*, the Payload Length is calculated from the datagram size. The absence of the Payload Marker denotes a zero-length payload.
CoAP defines a number of options which can be included in a message. Both requests and responses may include a list of one or more options. Each option instance in a message specifies the Option Number, the Option Length and the Option Value of the defined CoAP option. As an example of a simple CoAP option consider the Content-Format option. This option indicates the representation format of the message payload. This option has the Option Number 12 and its Option Length is between zero and two bytes. The Option Value itself is a numeric content format identifier that is defined in the CoAP Content Format Registry (Section 12.3 of the draft \[[@b5-sensors-14-09833]\]). Another example is the Max-Age option which has the Option Number 14. This option indicates the maximum time a response may be cached before it is considered not fresh. The Option Value is an integer number of seconds between 0 and 2^32^−1 inclusive (about 136 years). If this option is not included in any CoAP response, it can be assumed that the response will be fresh for 60 s and thus will not be queried again by a cache within this time frame.
When using confirmable messages CoAP tries to achieve reliability by using a simple stop-and-wait retransmission with exponential back-off. By default the initial back-off is set to a random time between 2 and 3 s. This means that if a reply to a confirmable packet is not received within the initial back-off time, the CoAP sender will double the initial back-off time and retransmit the packet. If a reply to the first retransmission is not received, CoAP will again double the back-off time and retry the transmission until MAX_RETRANSMIT (by default 4) is reached. If no reply is received after expiring of the back-off time of the last retransmission, the client will be notified about the error condition.
The IETF CoRE working group considers constrained RESTful environments as an extension of the current web architecture. The group envisions that CoAP will complement HTTP and that CoAP will be used not only between constrained devices and between servers and devices in the constrained environment, but also between servers and devices across the Internet \[[@b9-sensors-14-09833]\]. An important requirement of the CoRE working group is to ensure a simple mapping between HTTP and CoAP so that the protocols can be proxied transparently. Thus proxies and/or gateways play a central role in the constrained environments architecture. These proxies have to be able to communicate between the Internet protocol stack and the constrained environments protocol stack and to translate between them as needed.
2.2.. Resource Discovery
------------------------
In machine-to-machine (M2M) applications where there are no humans in the loop, it is important to provide a way to discover resources offered by a constrained server. For HTTP Web Servers, the discovery of resources is typically called Web Linking \[[@b10-sensors-14-09833]\]. The use of Web Linking for the description and discovery of resources hosted by constrained web servers (CoAP or HTTP) is specified by the CoRE Link Format- RFC 6690 \[[@b11-sensors-14-09833]\]. A well-known relative URI "/.well-known/core" is defined as a default entry-point for requesting a list of links to resources hosted by a server. Once the list of available resources is obtained from the server, the client can send further requests to obtain the value of a certain resource. The example in [Figure 2](#f2-sensors-14-09833){ref-type="fig"} shows a client requesting the list of the available resources on the server (GET /.well-known/core). The returned list (in CoRE Link Format) shows that the server has, amongst others, a resource called /s/t that, when queried, returns the temperature in degrees Celsius. The client then requests the value of this resource (GET /s/t) and receives a plain text reply from the server with the value of the current temperature as payload of the message (23.5).
However in many M2M scenarios, nodes might have long sleeping periods and thus making direct discovery of resources not practical. To solve this problem, the CoAP community is proposing to use CoRE Resource Directories (RD) that host descriptions of resources held on other servers \[[@b12-sensors-14-09833]\]. This way a CoAP server can register its resources with one or more RDs. Clients in turn can discover these resources by performing lookups against an RD. For example the same resource discovery that was performed by using direct communication between the client and the server in [Figure 2](#f2-sensors-14-09833){ref-type="fig"} can now be performed by using an RD as illustrated in [Figure 3](#f3-sensors-14-09833){ref-type="fig"}. For more details about the registration and lookup interfaces of Resource Directories we refer to \[[@b12-sensors-14-09833]\].
2.3.. Blockwise Transfer
------------------------
In many cases the payloads that CoAP needs to carry are very small (e.g., just a few bytes for temperature sensor, door lock status or toggling a light switch). In these cases the basic CoAP message provides very efficient means of communication and works very well. However in some cases CoAP needs to handle larger payloads (e.g., images or firmware update). Since CoAP is based on datagram transports such as UDP or DTLS, data fragmentation and reassembly is not offered by these transport protocols. Relying on IP fragmentation is also not very helpful, because IP fragmentation can handle only payloads up to 64 KB. Thus, providing a mechanism at the application layer that is able of transferring large amounts of data in smaller pieces becomes a necessity. This will not just help avoiding the 64 KB UDP datagram limit, but will also help avoiding both IP fragmentation (MTU of 1280 for IPv6) and also 6LoWPAN adaptation layer fragmentation in LLNs (60--80 bytes).
To overcome the payload size limitation, draft-ietf-core-block defines two CoAP options: Block1 and Block2 \[[@b13-sensors-14-09833]\]. By using this pair of options CoAP becomes capable of transferring a large payload in multiple smaller CoAP messages. Both Block1 and Block2 options can be present both in request and response messages. In either case, the Block1 Option pertains to the request payload, and the Block2 Option pertains to the response payload. Block sizes are represented inside the Block1 and Block2 Options as a three-bit unsigned integer called *SZX* indicating the size of a block to the power of two. Thus: $$\textit{blocksize} = 2^{\textit{SZX} + 4}$$
The allowed values of *SZX* are 0 to 6 and thus the resulting allowed block sizes are: 16, 32, 64, 128, 256, 512 and 1024 bytes.
6LoWPAN might start using fragmentation/reassembly for datagrams as soon as the payload size gets larger than 60 bytes. This fragmentation/reassembly process burdens the lower layers with conversation state and is sometimes not implemented to conserve resources at the constrained devices. To avoid such fragmentation and reassembly, blockwise transfer with Block1 and Block2 sizes of 16 or 32 should be used whenever the payload exceeds 60 bytes.
An important aspect of the blockwise transfer mechanism is that often the server can handle block transfers in a stateless fashion. It does not require connection setup and the server does not need to track each transfer separately and thus conserves memory.
2.4.. Group Communication
-------------------------
The IETF CoRE working group has recognized the need to support a non-reliable multicast message to be sent to a group of devices to manipulate a resource on all the devices in the group. Therefore, they have developed the "Group Communication for CoAP" Internet Draft \[[@b14-sensors-14-09833]\], which provides guidance for how the CoAP protocol should be used in a group communication context. *Group Communication* refers to sending a single CoAP message to all members of a specific group by utilizing UDP/IP multicast for the requests, and unicast UDP/IP for the responses (if any). This implies that all the group members (the destination nodes) receive the exact same message. The solution proposed by the IETF CoRE working group is discussed further in Section 4.
3.. Group Communication Requirements
====================================
In our work we broaden the *CoAP group communication* definition from Section 2.4: CoAP-based group communication is a *method to manipulate a group of resources on devices using CoAP as the underlying protocol*. Such a group of resources is called an *entity* and the resources themselves are called the entity *members*. We classify two types of entities based on the entity members: *Homogeneous Entity*: is an entity in which the members share a common set of properties (URI path, method, content-type, block-size, observe, *etc*).*Heterogeneous Entity*: is an entity in which not all members share a common set of properties.
Within this context, we now define the requirements and goals for CoAP group communication and motivate their importance in the context of IoT applications, constrained devices and LLNs: (1)*Flexibility*: as it is expected that the IoT will contain a huge amount of devices, it is also expected that the amount of device types will be enormous. To interact with a subset of these devices in a group, the group communication solution should be very flexible to accommodate the differences between devices and device types. In particular the solutions should be flexible enough to offer: a.Support for homogeneous and heterogeneous groups. CoAP servers may be heterogeneous in terms of their CoAP resources, even if they provide the same functionality. For example the IPSO (Internet Protocol for Smart Objects) Alliance has published an Application Framework that recommends a classification of resources based on their functionality by defining a set of Resource Types \[[@b15-sensors-14-09833]\]. However even if a group of resources offers the same functionality (same resource type), the actual resource path of the resource on different group members might be different. In some cases one might even want to have a group of resources with different resource types and simply query it (e.g., collecting heterogeneous environmental data). Also other types of heterogeneity in the resources are possible: e.g., different payload to PUT request, different media-types, *etc*.b.Support of group members that are not part of the same network. Often, it is assumed that all members in a group belong to the same network. However, group communication solutions should not be limited to this setting. In the future, it may as well be that group communication involves nodes from different sensor networks, networks that may be co-located or spread over different locations.(2)*Light-Weight (footprint)*: the group communication solution should have limited footprint on constrained devices. It is expected that a lot of the IoT devices will be of Class 1 (∼10 KB of RAM, and ∼100 KB of ROM) \[[@b16-sensors-14-09833]\]. Any overhead involved by a group communication solution should not prevent the solution from running on Class 1 devices. Furthermore the solution should scale with the number of groups a certain member can be part of.(3)*Use of Standards*: to allow the creation of groups across a variety of members from different vendors and domains, it is mandatory to use standard protocols that are widely supported. The focus of our work is on using CoAP as an application layer standard protocol. As mentioned in Section 2, CoAP consists of a base protocol and a set of optional extensions. It is expected that not all CoAP servers will support all CoAP extensions. Thus it becomes essential to limit the use of optional extensions in order not to exclude potential CoAP servers of becoming group members due to missing extensions.(4)*Performance*: CoAP is designed to run on resource constrained devices. In order to keep it this way, any CoAP group communication solution should have little overhead and be efficient in the use of resources of the nodes and the LLN. In particular the number and size of messages sent in the LLN should be kept to a minimum, in order to conserve valuable node energy (nodes are often battery powered, or harvest energy from the environment). A very powerful method for limiting the number of messages inside the LLN is using efficient caching techniques. This not only limits the number of messages and energy consumption, but it also decreases response latency. CoAP transactions and options are thus well optimized to support caching whenever possible. Group communication should not be an exception and should not hinder the use of caches.(5)*Validation and Error Handling*: since a group might include heterogeneous members, it should be possible to validate the group in order to make sure that the group works as intended. The group should have mechanisms for reporting and handling error conditions such as node or route failures.(6)*Reliability*: sometimes it is not essential to get reliable replies from all group members (e.g., it might be enough to get the temperature measurements from just one of the many temperature sensors in a room). However in many other cases, it can be important to have reliable communication with all group members. For example, one would expect that all lights in the room would go on when one flips on the light switch.(7)*Ease of Group Manipulation*: the needs of the user might change with time and thus group membership might also change. In dynamic environments the changes might be frequent. It is important to be able to handle such changes easily. One should avoid node reconfigurations, as this might be a tedious task. Also it should be possible for nodes to be part of different groups at the same time or at different times.(8)*Expressiveness/Control*: there are several results that one might want to achieve by interacting with a group of objects/object resources. In some cases one might be interested in all the individual results of all members as in the case of turning the lights on. In many other cases the individual values might not be of interest at all. In these cases one might be interested in an aggregated value (e.g., min, max, avg,...) of all, or even of just a subset of, the group members. Thus it is desired to have support for processing of individual group member results and replying to the requester with aggregated results. For example it should be possible to query a certain subset of the members and compute the average, or reliably update all members.(9)*Security*: secure communication might be of little interest inside a shielded and controlled environment. However, by exposing sensors and actuators to the Internet, security becomes a major concern. In some scenarios having an end-to-end security is a strict requirement. Communicating with a group of resources is no exception. In fact it is even more sensitive than communicating with an individual resource, since compromising the group means compromising all the individual members.
4.. Existing Solutions
======================
As mentioned, to address the group communication needs, the IETF CoRE Working Group has developed the "Group Communication for CoAP" Internet Draft \[[@b14-sensors-14-09833]\]. This draft discusses fundamentals and use cases for group communication patterns with CoAP and provides guidance for how the CoAP protocol should be used in a group communication context. The draft provides an approach for using CoAP on top of non-reliable IP multicast and does not attempt to provide a reliable solution for CoAP group communication as set forward by the Working Group charter. Certainly the use of multicasts allows reducing the amount of requests in the LLN, by sending one request to several destinations at the same time. However, multicasts are not cache-friendly, preventing possible reduction of requests and replies by utilizing caches. Depending on the use case and network topology, the reduction of packets as a result of using a cache can be better than the reduction obtained from using multicasts. This approach exhibits the limitations of multicasts as discussed in Section 1. Also multicasts are not useful when a single user action needs to trigger different sensor requests, since one multicast request delivers the same message to all group members. Additionally, secure communication with the group members is not possible, since all communication based on this draft operates in CoAP NoSec (No Security) mode. Finally, multicast is not supported on all LLN MAC protocols, especially MAC protocols that use Radio Duty Cycles (RDC) to shut down their radios when not in use. For example Xmac does not support multicast since it shuts down its receiver to avoid overhearing. Special MAC protocols that support multicast have been proposed such as in \[[@b17-sensors-14-09833]\]. Interestingly, this MAC protocol will send the multicast data to each receiver one by one (unicast) if the multicast data drops below a certain threshold.
As mentioned, the use of multicast as a means to interact with multiple objects concurrently requires multicast support in the network. Typically IP multicast relies on topology maintenance mechanisms to discover and maintain routes to all subscribers of a multicast group. However, maintaining such topologies in LLNs may not be feasible given the available resources. As a result, special multicast protocols have been proposed for the use inside LLNs. For example, the "Multicast Protocol for Low power and Lossy Networks (MPL)" internet draft uses the Trickle algorithm to manage message transmissions for both control and data-plane messages and avoids the need to construct or maintain any multicast forwarding topology \[[@b18-sensors-14-09833]\]. An alternative is the stateless multicast RPL forwarding algorithm (SMRF), which according to \[[@b19-sensors-14-09833]\] achieves significant delay and energy efficiency improvements at the cost of a small increase in packet loss. Regardless of the used multicast protocol, all nodes on the path between the sender and receivers must be extended to support the protocol.
The "Group Communication for CoAP" Internet Draft was the basis for the work presented in \[[@b20-sensors-14-09833]\], in which web services based CoAP multicasts were used to access data from Building Automation Systems (BAS). It shows how using multicasts allows creating basic building control scenarios without the need of a central control unit. Certainly this approach has several advantages such as eliminating the need for a control unit, often less power consumption than using unicasts and its suitability in many non-critical use cases (due to the lack of reliability of multicasts). However this approach exhibits the limitations of multicasts as discussed in this section above.
Simple unicast solutions are defined in the CoRE Interfaces draft \[[@b21-sensors-14-09833]\]. Among other interface types, this draft defines the Batch interface type and its extension, the Linked Batch interface type. Batch interfaces are used to manipulate a collection of sub-resources at the same time. Contrary to the basic Batch, which is a collection statically defined by the web server, a Linked Batch is dynamically controlled by a web client. The resources forming the linked batch are referenced using Web Linking \[[@b10-sensors-14-09833]\] and the CoRE Link Format \[[@b11-sensors-14-09833]\]. The draft does not foresee any way to manipulate resources that are located on multiple smart objects with a single client request.
An approach somewhat more similar to ours, also using the notion of an entity, has been presented in \[[@b22-sensors-14-09833]\]. The aim here is to annotate real-world objects by using entities that are automatically created based on semantic information, which resides on the constrained devices. One problem of using semantics on constrained devices is that semantics can easily require a lot of memory that might not be available on the constrained devices. Further, in our approach users can create entities as required and we address important aspects related to entity validation and entity behavior.
The authors of \[[@b23-sensors-14-09833]\] present an extension to CoAP called SeaHttp, that enables communication with a group of resources. Similar to our work, SeaHttp also uses unicasts to realize group communication. The authors propose to extend CoAP with two additional methods (BRANCH and COMBINE) to allow members to join and leave groups without the need for a separate group manager. This means that members should have the intelligence to know which group they should join/leave. Constrained devices will not have this intelligence, so again, a "manager" will be needed to inform the devices so they can take appropriate actions. Furthermore, BRANCH and COMBINE can maybe reduce the number of messages; however the trade-off is the need to implement a new mechanism. It is better to use an approach that can be plugged in into any existing network without major modifications (or at least not a modification to every node). The article does not discuss if the use of caches will still be possible with SeaHttp resources. However, should this be possible then also the caches should be extended accordingly. Finally this approach does not have the flexibility we target, since group members have to be reprogrammed with the groups they should join each time the requirements of the user changes.
To our knowledge, these are the only works that explore communication solutions for interacting with a group of CoAP-enabled constrained devices. Next to these, there exist other solutions to realize or improve multicast communication in Wireless Sensor Networks, such as \[[@b18-sensors-14-09833],[@b24-sensors-14-09833]\]. These solutions can alleviate some of the problems related to (reliable) multicasting, but their scope is different from the work presented here.
5.. Group Communication Using Unicasts
======================================
We aim to create an intermediate level of aggregation to be able to easily manipulate a group of resources across multiple smart objects. To avoid increasing the *footprint* of the constrained devices, we use the *same technology* as used to manipulate individual resources, *i.e*., CoAP, and extend it accordingly. Such a group of resources is called an *entity* and the entity can be used or manipulated through a single CoAP request. Similarly, the creation of an entity by a client is realized via a single CoAP request and includes a complete *validation* of the entity. Furthermore we introduce the notion of profiles for the created entities. The use of entity profiles allows the client to specify in more detail how the *entity should behave* (e.g., if it should use confirmable or non-confirmable CoAP messages), and, through updating the profile, allows manipulation of this behavior. As such, we strive to combine ease of creation, ease of usage and *flexibility* in behavior into a complete solution for interacting with CoAP resources from different objects inside a LLN. By building upon *standardized* concepts, the impact on the constrained devices is limited. In the following subsections we discuss the details of our approach.
5.1.. System Overview
---------------------
We call the component that manages the entities, the Entity Manager (EM). This component, which can reside, e.g., on the Border Gateway of the LLN, is responsible for maintaining entities that are created from groups of resources residing on CoAP servers (*i.e.*, sensors and actuators) inside the LLN. Clients on the Internet can interact with an EM to create new entities and/or customize how these entities should behave. Optionally the client can elect to contact a resource directory \[[@b12-sensors-14-09833]\] in order to discover which resources are available in the network. [Figure 4](#f4-sensors-14-09833){ref-type="fig"} shows an overview of the involved components.
The EM functionality does not have to be put on a dedicated device. Theoretically any CoAP server can be extended to become an EM ([Figure 5](#f5-sensors-14-09833){ref-type="fig"}). The choice of the most appropriate location to put the EM functionality depends on the size and topology of the network. For example, it can reside on a smart object in the constrained network with enough resources, in the Cloud, on the client device itself, or on a gateway at the edge of the LLN. The latter case has the added benefit that security can be centrally managed besides offloading the processing from constrained devices. One can also decide to implement multiple EMs (at the same or at different locations) to avoid having a single point of failure and thus improving reliability, availability and scalability.
Regardless of the location of the EM, it will serve as a "proxy" between the client and the constrained devices. Client requests will be sent to the EM, which will analyze and verify the requests and then issue the appropriate requests to the constrained devices using CoAP. Once the EM receives responses from the constrained devices, it will combine them according to the needs of the client and will send back an aggregated response to the client.
When a client tries to create a new entity consisting of a group of resources inside LLNs, the EM performs a sanity check on the request in order to make sure that the resulting entity would make sense. For example it verifies that the resources inside the entity are valid, whether they support a certain content format and whether their data can be aggregated. Customization of the entity behavior is accomplished by creating profiles for the entities. A profile of an entity can specify for example whether to return the values of all resources in the entity, only the computed average of all values or a subset of all values. [Figure 6](#f6-sensors-14-09833){ref-type="fig"} shows a high-level structure of the Entity Manager. It shows that the EM contains two databases: *Entity Database*: in this database all entities are stored along with their profiles as defined by the user.*Capabilities Database*: this optional database provides rules and knowledge that can be used to match user requests with sensor capabilities. This can be as simple as translating a request for temperature in degrees Celsius while obtaining the data from a sensor that only supports Fahrenheit. It can also be more complex, e.g., converting resource representations from one content format into the other.
5.2.. Entity Creation
---------------------
To facilitate the creation and manipulation of entities, the Entity Manager offers a CoAP resource "/e". We call this resource the Entity Management Resource. This interface only supports the CoAP POST request method. As payload of the request, it expects a collection of resources in CoRE link format \[[@b11-sensors-14-09833]\], which together should form the entity. In the response, the Location-Path CoAP option is used to specify the name of the newly created resource. In the current design, the payload of the response is in plain text and describes the results of the validation tests performed by the Entity Manager on the collection of resources.
Thus, when a client wants to create an entity consisting of several members, it has to compose a CoAP POST request and send it to the Entity Management resource on the Entity Manager. The EM creates the entity, assigns it a unique URI, and stores the entity in the entity database for future usage. Then the EM starts the entity validation process (explained in the next subsection). The client is informed about the URI to use in order to access or further customize the newly created entity and about the results of the validation of the entity. In addition, the new entity resource can be registered in a resource directory as well, making it available for lookup. If the entity did not pass the validation process the client should fix any errors and resubmit the entity for validation again before the client can use the entity.
An example of the entity creation process is shown in [Figure 7](#f7-sensors-14-09833){ref-type="fig"}. In this simple example the client requests the creation of an entity consisting of two members: coap://\[Sen5\]/tmp and coap://\[Sen8\]/tmp, with Sen5 and Sen8 the IPv6 addresses of the two sensors. The Entity Manager creates the new entity, assigns it the URI "/1" and informs the client about the newly created entity. From now on, any client can access the newly created entity by accessing the "/1" resource on the EM. Please note the validation process is not shown in [Figure 7](#f7-sensors-14-09833){ref-type="fig"} for simplicity.
At creation time, the client can use optional URI-Query CoAP options with the POST request to specify the name of the entity to be created or to customize the default behavior of the entity. For example, a POST to coap://\[EM\]/e?path= "/room_humidity"&eo= "min" will create the entity "room_humidity" that returns by default the minimum value of all members when queried. We will discuss customization of the entity behavior in more detail in Section 5.5.
5.3.. Validation Process
------------------------
Whenever a client requests to create a new entity or to modify an existing entity, the EM performs a validation process. The purpose of this validation process is twofold: (1)Make sure that the members in the entity exist and can be used.(2)Derive the properties of the entity based on the properties of the members it contains.
If the entity successfully passes validation the EM marks the entity as a valid entity and stores the entity along with its calculated properties in the entity database for future usage. If the entity fails validation it is still created, but marked as invalid. The entity validation is based on EM\'s knowledge of the individual members and their profiles and based on the knowledge in the capabilities database as will be discussed in the next paragraphs.
Resource profiles can be used to express capabilities of a CoAP server and its resources \[[@b25-sensors-14-09833]\]. Profiles are usually expressed in JSON format \[[@b26-sensors-14-09833]\]. To briefly illustrate resource profiles, let us assume that in [Figure 7](#f7-sensors-14-09833){ref-type="fig"} the temperature sensor at "coap://\[sen5\]/tmp" supports the "Uri-Host" (3), "ETag" (4), "Observe" (6), "Uri-Port" (7), "Uri-Path" (11) and "Content-Format" (12) CoAP options (op). This sensor further supports the "application/json" (50) content format (cf) and the allowed method (m) is GET (1). This will result in sen5 having the following profile: Res: 2.05 Content (application/json) { "profile": \[ { "path":"temp", "op":\[3,4,6,7,11,12\], "cf":\[50\], "m":\[1\] } \] }
If the Entity Manager does not know any of the members in an entity (e.g., based on knowledge in a resource directory) or does not know the member capabilities, it tries to obtain this information according to a fallback mechanism as follows: (1)The EM tries to contact the object containing the resource in order to obtain the resource profile, since this returns the most complete information about the resource.(2)If the resource profile does not exist, the EM tries to derive information about this resource from /.well-known/core of the respective object.(3)If this fails as well, the EM tries to query the resource directly to discover, as a minimum, if the resource exists or not.
The validation process that the Entity Manager performs on entities is shown in a simplified form in [Figure 8](#f8-sensors-14-09833){ref-type="fig"}. In essence the process will: Verify whether the individual members contained in the entity are valid (*i.e*., the resources exist on the respective nodes).Derive the operations that can be performed on the entity, based on the operations supported by the individual members (e.g., which CoAP options are supported, which RESTful methods are allowed?).Verify whether the individual members do not conflict. A sample conflict can occur when an entity creation request contains a sensor member that supports only the GET method and an actuator member that supports only the PUT method.Verify whether the responses sent by the individual members can be combined together using a common denominator or knowledge from the capabilities database.
Once the EM knows all information about the members that should become part of the entity and once all necessary checks have been passed, the EM creates a profile for the entity based on this information and the EM\'s capabilities database. To illustrate this let us further assume that the second temperature sensor in [Figure 7](#f7-sensors-14-09833){ref-type="fig"} "coap://\[sen8\]/tmp" supports the same options as sen5 except for the observe option. Only the GET method is allowed and the supported content formats on this sensor are "text/plain" (0) and "application/json" (50). Thus sen8 will have the following profile: Res: 2.05 Content (application/json) { "profile": \[ { "path":"tmp", "op":\[3,4,7,11,12\], "cf":\[0,50\], "m":\[1\] } \] }
Based on these two profiles the EM constructs a profile for the newly created entity. This profile contains information related to the resource itself, as described in \[[@b25-sensors-14-09833]\]. In this example, this includes the options that are supported, the supported methods (only GET) and the content format "application/json" (50). In addition, the profile is extended with an entity specific part, providing more information about the entity itself. The resulting profile of the entity looks as follows: Res: 2.05 Content (application/json) { "profile": \[ { "path":"1", "op":\[3,4,7,11,12\], "cf":\[50\], "m":\[1\] } \], "entity":\[ { "er":"coap://\[sen5\]/tmp,coap://\[sen8\]/tmp", "eo": \[" lst", "avg", "min", "max"\] } \] }
This simple example illustrates how an entity profile is constructed; either based on information from individual resource profiles or based on information retrieved via other means such as resources attributes derived from /.well-known/core. Much more information than shown here can be included and, by using a flexible representation format, the profile concept can be easily extended with new information.
The entity specific part of the profile currently supports the following fields: *Entity Resources (er)*: a list of the individual resources out of which the entity is composed.*Entity Message Type (emt)*: specifies the message type to be used for communication between EM and members. Possible values are *con* (confirmable) and *non* (non-confirmable). The default is *con*.*Entity Number of Replies (enr)*: specifies the number of replies that should be received from the members before sending a reply to the client. This makes it possible not to wait for all members to reply. The default behavior is to wait until all replies have been received or have timed out.*Entity Operation (eo)*: The operations that can be performed on the results obtained from the members. The operation is used to combine replies received from all the members (or the number of replies specified by enr) into one reply to the client. If at the time of querying the entity the client does not specify which operation to use, the first operation listed in this field will be used. Currently the following Entity Operations are supported: ○*List (lst)*: A list of replies received from the members, without any arithmetic processing. This is the default behavior if no entity operation was specified.○*Average (avg)*: The average value.○*Minimum (min)*: The minimum value.○*Maximum (max)*: The maximum value.*Delay between Requests (delay)*: specifies the delay that should be injected between the requests sent from the EM to the members. The default is 0 and thus the EM will send the requests as fast as it can.
These entity profile fields can be provided by the client upon creation time. If no values are provided, the EM will use default values for the newly created entity. To construct the entity profile, the EM uses its internal knowledge to offer additional features that are not provided by the individual members. For example, the EM can interpret certain member payloads, convert between content formats and return the entity result in particular content format. Currently we support conversion between plain-text, JSON and RDFN3 content formats for numerical sensor values. The list of conversion functions can be extended easily.
5.4.. Entity Usage
------------------
Once an entity has been created, a response is sent back to the client. This response contains the URI of the entity, which was either requested by the client or assigned dynamically by the EM. The client can now interact with the entity by issuing a single CoAP request to the resource representing the entity. When a request for an entity arrives, the process flow shown in [Figure 9](#f9-sensors-14-09833){ref-type="fig"} is executed. The EM breaks down the request into its components and sends the individual requests to the respective smart objects using unicast CoAP messages. It can either do that in parallel or sequentially with a configurable delay between requests to the members in order to avoid potential network congestion. Once all needed answers have been received, the EM creates a response to the client based on the individual responses and sends it to the client. Note that aspects such as how many members should respond, how the response is composed, how it should look like, *etc*. depend on the entity profile and can be customized using URI queries as will be explained later on.
[Figure 10](#f10-sensors-14-09833){ref-type="fig"} shows an example of using the entity that was created previously in [Figure 7](#f7-sensors-14-09833){ref-type="fig"}. The client issues a GET request on the entity\'s resource "/1". This results in the EM issuing two GET requests to the individual members, waiting for replies from both of them and then sending both results in one combined response back to the client.
The client can decide to query the entity using its default behavior as described in the entity profile or to customize its behavior. To customize the behavior the client can include URI queries in its request to the entity. The supported URI queries that can currently be used are: Entity Operation (eo), Entity Number of Replies (enr) and Delay Between Requests (delay) as described in Section 5.3. For example, to obtain the average value of the two temperatures of the entity /1 in [Figure 10](#f10-sensors-14-09833){ref-type="fig"}, the client should use the URI: coap://\[EM\]/1?eo="avg" and should use coap://\[EM\]/1?enr="1" to indicate to the EM that it is enough to send just any one of the two member replies as a reply to the entity. This last example demonstrates how our solution can be used to achieve a behavior similar to anycast requests when there are redundant members available.
5.5.. Entity Modification and Behavior Manipulation
---------------------------------------------------
It is possible that a client wants to modify an entity after its creation. For example, a client might want to add new members to the collection of members in the entity or remove a number of members. Alternatively, the client may want to customize the behavior of an existing entity. The latter can include aspects such as the default number or percentage of members that should respond before the entity manager replies to the client, the default content format of the response, the default operation (e.g., average, max, min, *etc*.) that should be performed on the results before sending them to the client, *etc*. Modifications to the entity or to its behavior can be made by updating the entity\'s profile and posting the updated information (PUT or POST) to coap://\[EM\]/.well-known/profile?path="\[ENTITY_URI\]", in which /.well-known/profile is a resource for accessing the profile of a resource as described in \[[@b25-sensors-14-09833]\] and ENTITY_URI the URI of the entity, e.g., "/1" in our example. When a client wants to modify the profile of an entity, this information is passed to the EM, which will validate the request and change the profile if the validation was successful. Finally, removing an entity can be realized by sending a GET request to the entity management resource that includes action="delete" URI query and specifying the entity to be deleted, e.g., coap://\[EM\]/e?path= "ENTITY_URI"&action= "delete".
6.. Implementation and Evaluation
=================================
Our solution described above enables the use of unicast messages as an alternative to using multicasts for realizing CoAP group communication. In order to evaluate our solution and to show how it can be used in a real-world scenario we have implemented it and built a demo box for demonstration purposes. In this section we present the implementation of our solution and a basic description of the demo box followed by functional and performance evaluation.
6.1.. Implementation
--------------------
The key in our group communication solution is the Entity Manager. We have implemented the Entity Manager functionality on the gateway of the LLN using the CoAP++ framework \[[@b27-sensors-14-09833]\]. The framework itself and the Entity Manager implementation on top of it have been realized in Click Router, a C++ based modular framework that can be used to realize any network packet processing functionality \[[@b28-sensors-14-09833]\]. The CoAP++ implementation on the gateway also includes a resource directory and a cache that are used in the evaluation tests.
As group members we have used Zolertia Z1\'s boards \[[@b29-sensors-14-09833]\] that run the popular Contiki 2.6 operating system \[[@b30-sensors-14-09833]\]. This version of Contiki was the current version when we started our experiments and included a stable implementation of CoAP, namely the Erbium CoAP server \[[@b31-sensors-14-09833]\]. Our group communication approach does not require any changes on the CoAP enabled constrained devices. However, in order to demonstrate how the EM can use resource profiles to validate entities, we have added resource profiles to the constrained CoAP servers. Additionally, in order to be able to compare the performance of our solution with a multicast based solution, we have added multicast support to Contiki by using an open source implementation \[[@b32-sensors-14-09833]\].
The CoAP++ framework\'s interoperability with the Erbium CoAP server as well with other CoAP implementations has been formally tested by the European Telecommunications Standards Institute (ETSI), a non-profit standards organization, in three events called CoAP Plugtests \[[@b33-sensors-14-09833]\].
To demonstrate the practical use of our solution we have built a portable demo box ([Figure 11](#f11-sensors-14-09833){ref-type="fig"}). The box has two layers. The top layer has a floor plan of a house with several rooms. Each of the rooms is equipped with some wireless sensors and some wireless actuators. The top layer can be easily tilted to reveal the wireless sensor network that consists of eight wireless sensor nodes that are mounted on the back of the top layer and the bottom layer. The wireless sensor nodes are in the form of Zolertia Z1\'s boards that are running the Contiki operating system. Each of these nodes has been equipped with a number of sensors and actuators. The sensors include light intensity, temperature, proximity, movement (PIR), force, RFID and magnetic switch sensors. Supported actuators include multiple lights (in the form of LEDs) and a cooling fan. These sensors and actuators each have a corresponding CoAP resource. One of the wireless sensor nodes runs a 6LoWPAN border router and is connected to an Internet gateway. The gateway for this network is an Alix system board running voyage Linux. Apart from routing traffic, the gateway also provides the Entity Manager services.
Using this demo box we are able to show several home automation scenarios that use our group communication solution. For example it is possible to turn on all lights in a room (or a set of rooms) when the pressure sensor in the bed indicates that the person has left the bed while it is dark in the room. For more details about our demo box we refer to \[[@b34-sensors-14-09833]\].
Besides its function as a showcase for our CoAP implementations, we have used the demo box for the functional evaluation of our group communication solution. However the demo box does not provide a suitable environment for good performance evaluation for several reasons. Since the box is relatively small, all radios are very near to each other and build a full-mesh single hop topology. This makes it impossible to perform multi-hop experiments. Furthermore, since the number of nodes in the demo box is only eight nodes, no larger scale experiments can be performed. Consequently, in order to obtain good insights in the proposed solution and to obtain a comprehensive performance evaluation it is needed to turn to either a simulation environment or larger scale testbeds. For this paper, we opted for the first, *i.e.*, a simulation study using the Cooja network simulator, which is part of the Contiki operating system. The simulation environment allows both a functional and performance evaluation, with the demo box complementing the functional evaluation.
The simulation environment enables the initial evaluation of the performance of our solution for varying entity sizes and number of hops to the entity resources. Evaluation on larger real-life testbeds will prove useful for validating the simulation experiments and for conducting experiments in more dense and more realistic (e.g., Wi-Fi interference) environments. However this will take a significant amount of time and is beyond the scope of this work.
6.2.. Functional Evaluation
---------------------------
The functionality for creating, validating, using and deleting entities has been implemented as described above. In this subsection we demonstrate the main functionality of the implementation using a series of screenshots covering the life cycle of an entity. These screenshots are taken while communicating with the sensors in iMinds demo box. [Figure 12](#f12-sensors-14-09833){ref-type="fig"} shows a screenshot demonstrating the result of sending a CoAP POST request to the EM to create an entity with five heterogeneous members. This request results in the creation of the entity with the URI "/2" and in the validation of this entity by querying all members profiles. All complexity related to the creation and validation of the entity is hidden for the client and managed transparently by the EM. At this moment, the entity has been created and the client can use the newly created entity and interact with it by sending a single CoAP request to the entity resource.
[Figure 13](#f13-sensors-14-09833){ref-type="fig"} shows a client issuing a CoAP GET request to the newly created entity on the EM. The request ultimately results in a single reply from the EM, which combines the results of querying all five members of the entity. The client does not have to bother executing all individual requests and processing the corresponding results.
The above example demonstrates how an entity can be created and used with default values, since the client did not specify anything about its behavior neither at creation time, nor at usage time. However as described in Section 5, the EM allows the client to customize the behavior of the entity at creation as well as at usage time by using URI queries in the CoAP requests. Some of these features are shown in the example in [Figure 14](#f14-sensors-14-09833){ref-type="fig"}. In [Figure 14a](#f14-sensors-14-09833){ref-type="fig"} the client used URI queries at creation time to create an entity of six members, naming it "room_temperature" and specifying that only four out of the six members need to reply before sending the combined reply to the client. [Figure 14b](#f14-sensors-14-09833){ref-type="fig"} shows the profile of the newly created entity, which, among others, shows that the entity supports four entity operations (eo=\["lst","avg","min","max"\]) with lst being the default operation as it is the first operation listed. As expected, when querying the entity, the Entity Manager returns a list of the first four replies it has received from all members in a single JSON reply in [Figure 14c](#f14-sensors-14-09833){ref-type="fig"}. When the client uses the URI query (?eo="avg") to obtain the average instead of the default list, the individual responses are processed by the Entity Manager and the average value is returned as shown in [Figure 14d](#f14-sensors-14-09833){ref-type="fig"}.
In the last screenshot ([Figure 15](#f15-sensors-14-09833){ref-type="fig"}) we show how a client can select resources from a list of resources obtained from a resource directory to create an entity. The resource directory lists all CoAP resources of the sensors in our real-life wireless sensor network testbed, namely w-iLab.t \[[@b35-sensors-14-09833]\]. Once the Entity Manager creates the entity, the resource directory is immediately informed about the newly created entity resource and uses this information to update the list of available resources.
6.3.. Performance Evaluation
----------------------------
In order to evaluate the performance of our group communication solution and compare it with multicast based solutions we performed a series of tests using the Cooja network simulator. In this subsection we present the results of these tests and analyze key performance indicators for both approaches.
### 6.3.1.. Experiment Setup
In our test we used a star topology with the gateway (node ID 0) in the middle of the five-leg star ([Figure 16](#f16-sensors-14-09833){ref-type="fig"}) and the nodes along the legs at 50 m distances. The transmission range (55 m) is enough to make the signal travel from one node to the other node on the same leg, but does not allow the signal to be heard between nodes on different legs. The interference range is 105 m, so that it covers the distance between three nodes on the same leg. The reason for selecting this topology is that it allows minimizing the impact of the underlying routing protocol on our measurements, as each node has only one deterministic route to the gateway. The gateway is running the example rpl-border-router provided by Contiki and therefor it is the RPL DODAG root, delegates the global IPv6 prefix and routes traffic to and from the constrained network. All other nodes run the Erbium server extended with resource profiles and multicast support as discussed in Section 6.1. [Table 1](#t1-sensors-14-09833){ref-type="table"} summarizes the parameters of the simulations in Cooja.
Since evaluating the performance of MAC and routing protocols is beyond the scope of this work, we had to take special care during the experiments to make sure that what we are observing is not a result of routing or MAC errors. For example, when introducing link errors in the simulations, routes can get lost or can be changed which has a considerable impact on the delivery rate of packets in the LLN. One solution would have been to use static routes. This is however not practical, since each node needs to be programmed with its own routes each time we change anything to the topology. To avoid such manual reconfiguration and since a stable version of RPL is available within Contiki, we used RPL as a routing protocol in all of the experiments. However, in order to minimize route changes from impacting our results we have taken the following two measures in all experiments: (1)Before sending any CoAP messages in the LLN, we wait for some time to allow RPL to establish routes to all nodes. In our chosen topologies, waiting for 2 min was in most cases sufficient to achieve this goal. In a few cases (with a high percentage of packet loss) we had to wait more than an hour, since the time between RPL neighbor updates is exponential up to a certain value.(2)The Contiki implementation of RPL relies on Contiki to maintain the neighbor table. Contiki in turn removes a neighbor if it does not hear its heartbeat a consecutive number of times (three by default). In very lossy networks (such as in our experiments with high packet loss) this behavior might lead to neighbors being removed and thus all routes via that neighbor as well. However in all of our experiments the nodes are static and never disappear from the network. As such they should not be removed from the neighbor table. To achieve this goal we have changed the Contiki configuration parameter UIP_CONF_ND6_MAX_UNICAST_SOLICIT from its default value of 3 to 100. This allowed all experiments to be completed without routes to the nodes being lost.
With these two measures in place it was possible to get stable routes during the experiments. The other factor that may heavily impact the measurements is the used MAC protocol. In order to save energy, MAC protocols for LLNs use Radio Duty Cycles (RDC) to shut down their radios when not in use. Contiki has its own MAC protocol, called ContikiMAC, with a good RDC schema. However ContikiMAC requires more resources than other MAC protocols. In our experiments we also need, next to CoAP and multicast, debug information in order to be able to collect measurement statistics. As such, it was impossible to fit CoAP, multicast, RPL, debug info and ContikiMAC on the used Z1 motes. Instead of ContikiMAC we therefore used null-rdc, which is Carrier Sense multiple Access (CSMA) MAC protocol without RDC (radio always on). While using null-rdc is not realistic for battery-powered devices, it still helps avoiding delays in the collection of measurement statistics as imposed by the RDC protocols. However, to still get an idea about the impact of RDC on our solution, we repeated some of the tests using Xmac. Xmac uses a simple RDC, but has less stringent requirements in terms of memory consumption than ContikiMAC.
In all the experiments presented in this subsection the multicasts were sent using none-confirmable CoAP messages as required by the group communication draft \[[@b14-sensors-14-09833]\] and the unicast were sent using confirmable CoAP messages to achieve reliability.
### 6.3.2.. Congestion Control Optimizations
An important aspect of group communication is congestion control, especially in LLN where resources are limited. Network congestion can lead to extended response times and significant energy consumption, due to frequent retransmissions of packets. CoAP provides basic congestion control by using the exponential back-off mechanism (Section 2.1) and by limiting the number of open requests from a client to any server to one request by default. Furthermore, CoAP specifies that, when using multicasts, a certain random delay should be inserted before forwarding the request to other nodes. In CoAP terms, this delay is called Leisure. The server could either use a default value for Leisure or compute a value for it. If the server has a group size estimate G, a target data transfer rate R and an estimated response size S, a rough lower bound for Leisure can then be computed as: $$\textit{Leisur}e_{\textit{lowerbound}} = \frac{S*G}{R}$$
When only taking into account the 1-hop neighbours of the gateway in our test network in [Figure 16](#f16-sensors-14-09833){ref-type="fig"}, G equals 5, S equals approximately 80 bytes, and the target rate can be set to a conservative 8 kbit/s = 1 kB/s. The resulting lower bound for the Leisure is then equal to 0.4 s. However, since CoAP servers will often not be able to compute the Leisure, we elected to use the default Leisure value (5s) in all of our multicast experiments. For a more complete discussion of the Leisure period and its estimation we refer to Section 8.2 of \[[@b5-sensors-14-09833]\].
CoAP does not specify a congestion control mechanism when a single client is communicating with many servers using unicasts as is the case in our group communication solution. However our experience shows that this can quickly lead to congestion. A simple solution for avoiding network congestion when using unicasts is to limit the rate at which requests are sent. In order to examine this, we conducted a series of experiments to query an entity of five members and measure the response time, which is expressed as the time between the moments the client issues the request to the EM until it gets back the response. We repeated the same experiment for different delays between the requests sent from the EM to the members. We repeated the experiment 50 times for each setting and computed the averages. The same set of experiments was repeated when all members were either one or two hops away and while using null-rdc or Xmac.
As expected, the experiments revealed that the average response time of an entity can be improved by inserting small delays between the requests for individual entity members ([Figure 17](#f17-sensors-14-09833){ref-type="fig"}). However, the best delay depends on both the topology and the used MAC protocol. This is most obvious in the graph of Xmac for 1-hop communication. Here one observes two peaks at about 100 ms and 400 ms. The first peak is a result of collisions between the forwarded requests from the nodes at the first hop to the nodes at the second hop with the delayed requests for the next member. The second peak is a result of collisions between the replies from the members at the second hop with the delayed requests for the next member. For delays less than 0.5 s the used MAC protocol had more effect on the response time than the delay inserted between the requests. However as the delay between requests grows larger it becomes the dominating factor for the total response time with a linear relationship between the two.
In the remaining experiments we used only null-rdc as MAC protocol for two reasons. First, we wanted to avoid measuring the delays in communication as imposed by the use of Xmac. Second, Xmac does not support multicast well, and thus we would not have been able to make a fair comparison between our group communication solution and multicast based solutions.
For the star topology which we used in most of our experiments, a delay of about 50 ms provided the best response when null-rdc was used. As a result we have used a 50 ms delay between requests to the members in all other experiments discussed later in this section. In addition to this delay there are other delays that impact the communication. The nodes and the EM need some time to process the CoAP packets they send and receive (e.g., time needed by nodes to prepare the CoAP reply and the delay needed by the EM to combine all replies into one reply to the client). We call the sum of all such delays the Processing Delay *D~p~*. Finally we call the sum of the average signal propagation time and the average time need to send and receive a packet over any transmission link the Transmission delay *D~t~*, We have experimentally evaluated *D~p~* and *D~t~* by averaging the values for 100 transmissions for our network topology when communicating with the nodes that are only 1-hop, 2-hops or 3-hops away. [Table 2](#t2-sensors-14-09833){ref-type="table"} provides a summary of the delays in our experimental topology.
### 6.3.3.. Reliability
Reliability is a key performance indicator. In this subsection we first present the theoretical model for calculating the reliability of the two group communication approaches and then present the results obtained from our simulations.
#### Theoretical Calculation
Let us assume that the probability of losing a packet when it is sent over any link in a lossy network is equal to *l*. Thus the probability for success at any link-transmission in the network equals 1 − *l*. If the communication is over N-hops, the number of links equals *N* and the probability that the communication succeeds over the 2*N* link-transmissions (since every link has to be crossed once for the request and once for the reply) is: $$P_{N_{\textit{non}}} = \left( {1 - l} \right)^{2N}$$
This communication success probability applies for multicast communication as well as for non-confirmable (non) CoAP unicast communication. However, when using confirmable (con) CoAP unicast communication as the case in our group communication solution, CoAP tries to achieve reliability by using a simple stop-and-wait retransmission with exponential back-off (see Section 2.1). This means that if a reply to a confirmable packet is not received within the back-off time, the CoAP sender will retransmit the packet. If a reply to the first transmission is not received, CoAP will retry the transmission until MAX_RETRANSMIT (by default 4) is reached. Again these retransmissions have the same probability for success as the first attempt. And thus the probability that *r* retransmissions are needed for successful transmission over *N* hops (*r* can go from 0 to 4) is: $$R_{N_{r}} = P_{N_{\textit{non}}}\left( {1 - P_{N_{\textit{non}}}} \right)^{r}$$
Thus the probability for success when using CoAP con communication equals the sum of the probabilities of successful communication of any of the five transmission attempts: $$P_{N_{\textit{con}}} = \sum\limits_{r = 0}^{4}R_{N_{i}} = 1 - \left( {1 - P_{N_{\textit{non}}}} \right)^{5}$$
In many group communication use cases, it is desirable to get answers from all members of the group. A complete group communication is considered successful when all members in the group also have successful communication: $$\begin{matrix}
{P_{NG_{non}} = \left( P_{N_{non}} \right)^{G}} \\
{P_{NG_{con}} = \left( P_{N_{con}} \right)^{G}} \\
\end{matrix}$$
This reliability of the unicast group communication is achieved by relying only on default CoAP retransmissions. If higher reliability is desired, the EM can perform its own retransmissions or fine-tune the default CoAP retransmission settings on an entity-wide level or per member.
#### Experimental Evaluation
To measure the reliability we used the same star topology to communicate with a group of five members that were either 1-, 2-, or 3-hops away from the gateway. We varied the percentage of packet loss in the network in 5% steps and measured the reliability of getting responses to the respective requests. We repeated the same experiment for our group communication solution and for multicasts. We run each experiment 50 times. [Figure 18](#f18-sensors-14-09833){ref-type="fig"} shows the effect of packet loss on the communication reliability in our 1-, 2-, and 3-hop star network. Multicasts are not transported reliably and thus reliability of the network decreases as soon as there is packet loss in the network. When using our unicast group communication solution, CoAP confirmable messages are used. In our 1-hop test topology reliability was higher than 99% even when the packet loss of the network reached 25%. At 30% packet loss the reliability is reduced to 97% (compared to 49% in the case of multicasts). [Figure 18](#f18-sensors-14-09833){ref-type="fig"} also shows that the packet loss increases with an increasing hop count, both for unicast and multicast communication. This is due to the fact that every message (both request and reply) between a client and a server has an additional chance of getting dropped at each hop on the way to its destination. Nevertheless, in our 2-hop network 100% reliability was maintained for unicast communication until a packet loss ratio of 10%. In the 3-hop network the unicast reliability started dropping below 100% already by 5% packet loss. The dashed and the dotted lines in [Figure 18](#f18-sensors-14-09833){ref-type="fig"} are the theoretically expected values up to networks with 4-hops, while the points are the actual obtained results from the experiments (up to networks with 3-hops). It is clear that there is a good match between both.
[Figure 19](#f19-sensors-14-09833){ref-type="fig"} shows the effect of packet loss on the reliability of the complete group in our 1-, 2-, and 3-hop star network. Certainly the reliability of a complete group is less than the reliability of its individual members, since the loss of a message to or from a single member, renders the complete group request unsuccessful. In these cases the use of multicasts does not provide good results. Already at 5% packet loss the reliability of a 1-hop network drops to 80% and below 20% for a 3-hop network. In contrast, our unicast based group communication maintains 100% reliability in the 1-hop network and only drops to 92% in the case of 3-hop network. [Figure 19](#f19-sensors-14-09833){ref-type="fig"} shows good match between the theoretically expected values (the lines) and the actual obtained results from the experiments (the points).
### 6.3.4.. Number of Packets
Another key performance indicator is the amount of energy consumed by the network to complete the communication task. The main two contributing factors to the energy consumption are the efficiency of the RDC and the numbers of packets sent. The RDC mostly depends on the MAC protocol and is beyond the scope of this article. We use the number of packets sent inside the LLN as an indicator for the amount of energy consumed by the network as exact numbers for energy consumption are hardware dependent. In this subsection we first present the theoretical model for calculating the number of packets and then present the results obtained from our simulations.
#### Theoretical Calculation
When using multicast group communication, the number of packets that are sent depends on the topology of the network. In our star topology, all nodes that are one hop away can be reached with just one multicast packet. After the first hop, the paths are not shared by any node and the packets have to travel similar to unicasts along them. When the requests reach their destinations, replies are generated and are sent back using non-confirmable unicast messages. Thus, in the case of a successful communication, the number of transmitted packets can be obtained as follows: $$\textit{pkt}s_{N_{\textit{sucess}}} = 1 + G(2N - 1)$$
Taking into account the probabilities of failure at each link-transmission (see Section 6.2.3), the average number of transmitted packets when using multicast group communication can be obtained as: $$\textit{pkt}s_{N_{\textit{mcast}}} = (\sum\limits_{i = 0}^{2N - 1}l\left( {1 - l} \right)^{i} \times (iG + 1)) + \left( {1 - l} \right)^{2N - 1} \times (1 + G(2N - 1))$$
This formula takes into account the fact that the request or reply can get lost at any intermediate hop (total of *i* = 0, ...,2*N* − 1 possibilities with the probability *l*(1 − *l*)*^i^*), resulting in a different number of packets being transmitted (*iG*+1).
When using our group communication solution, all transmissions are unicast and thus in the case of a successful communication, the number of transmitted packets can be obtained as follows: $$\textit{pkt}s_{N_{\textit{sucess}}} = 2NG$$
And the average number of packets in case of failure (*i.e*., packet loss somewhere on the path) as: $$\textit{pkt}s_{N_{\textit{failure}}} = \left\{ \begin{matrix}
{\frac{G\sum_{i = 0}^{2N - 1}l\left( {1 - l} \right)^{i} \times (i + 1)}{\sum_{i = 0}^{2N - 1}l\left( {1 - l} \right)^{i}},} & {l > 0} \\
{0,} & {l \leq 0} \\
\end{matrix} \right.$$
The formula is normalized as the sum of all probabilities in the nominator is not 1 since it does not include the probability of success over all links *P~N~*. To avoid division by zero we set *pkts~N~failure~~* = 0 when *l* ≤ 0.
And the average number of transmitted packets in these cases of retransmissions can be calculated as: $$\textit{pkt}s_{N_{r}} = r \times \textit{pkt}s_{N_{\textit{failure}}} + \textit{pkt}s_{N_{\textit{sucess}}}$$
If the last retransmission attempt fails, the sender is notified about the failed transmission. Thus the probability for failure for an N-hop communication: $$R_{N_{\textit{failure}}} = \left( {1 - P_{N}} \right)^{5}$$
And the average number of transmitted packets in this case can be calculated as: $$\textit{pkt}s_{N_{5}} = 5 \times \textit{pkt}s_{N_{\textit{failure}}}$$
Thus the average number of transmitted packets for N-hop confirmable CoAP unicast communication can be calculated as follows: $$\textit{pkt}s_{N_{\textit{entity}}} = \left\lbrack {\sum\limits_{r = 0}^{4}R_{N_{i}} \times \textit{pkt}s_{N_{r}}} \right\rbrack + R_{N_{\textit{failure}}} \times \textit{pkt}s_{N_{5}}$$
#### Experimental Evaluation
When multicasts are used, one request is sent to multiple destinations, and one reply is sent by each member. For our five nodes that are 1-hop away, assuming there is no packet loss in the network, the number of transmitted packets is thus six packets (an average of 1.2 packets/member). When the network is lossy the number of packets can only become less, as packets are being dropped. This can be clearly seen in [Figure 20](#f20-sensors-14-09833){ref-type="fig"} for 1-, 2- and 3-hop networks. On the other hand, when using unicasts the number of packets increases as the loss increases. This is a logical result of packets being retransmitted by CoAP to compensate for the packet loss. The dashed and dotted lines in [Figure 20](#f20-sensors-14-09833){ref-type="fig"} are the theoretically expected values, while the points are the actual obtained results from the experiments. It is clear that there is a good match between both.
### 6.3.5.. Response Time
Another key indicator of the performance of any group communication solution is its response time. [Figure 21](#f21-sensors-14-09833){ref-type="fig"} shows that the average response time when using our group communication solution increases with the increase of packet loss in the network. When there is no loss, both group communication methods have similar response times (0.7 s for multicasts and 0.8 s for our solution). When the packet loss increases, the response times for multicasts remain constant, since either the packet is delivered on time or it is just dropped. In the case of our solution, when a packet is dropped CoAP attempts to retransmit it, leading to an increased overall response time. At 15% packet loss, the average response time for the 1-hop network is about 3.5 s and increases to about 10 s at 30% packet loss.
The CoAP retransmission behavior can be clearly seen in [Figure 22](#f22-sensors-14-09833){ref-type="fig"}, which shows the same results of [Figure 21](#f21-sensors-14-09833){ref-type="fig"} in the form of a scattergram. It shows how the response times of the unicasts are grouped along the time axis. Replies with a response time of around 1 s were sent without any retransmissions. Replies with a response time around 7, 15 and 30 s occur when one, two or three retransmissions take place respectively. The last group between 60 and 100 s is for replies that were received after four retransmissions, or those that timed out without a reply.
An interesting aspect to consider is the impact of long delays in network on the client. In our case both the communication between the client and EM from one side and the communication between the EM and the members on the other side are using the same CoAP time out mechanism with default values. Thus it is expected that the client might time out and start retransmitting the request before the EM requests to the members are answered or have timed out. To avoid these unnecessary retransmissions from the client, the EM responds to the client with an empty acknowledgment message as soon as it receives the request, indicating that the EM is processing the request and will send a separate reply once an answer is ready. As a result the client does not send any further retransmissions of the request.
### 6.3.6.. Impact of Caching
As mentioned in Section 2.1 CoAP foresees a freshness model for responses. A CoAP server may include a Max-Age option in the reply to indicate the maximum time a response may be cached before it is considered not fresh. If this option is not included in any CoAP response, it can be assumed that the response will be fresh for 60 s and thus will not be queried again by a cache within this time frame. Max-Age values in responses should take into consideration the frequency at which the value of the corresponding resource changes. By doing so, unnecessary queries to constrained devices can be heavily reduced, especially for resources that do not change frequently.
When a client makes a multicast request, the cache always makes a new request to the multicast group (since there may be new group members that joined meanwhile or ones that did not get the previous request) (see Section 8.2.1 of the CoAP draft \[[@b5-sensors-14-09833]\]). So, the main problem is that the cache is not aware of all receivers in a multicast group. This information is needed in order to be able to verify whether a response for all receivers in the multicast group has been cached. If the cache knows this information (which is not the case for a normal cache), the cache could serve the multicast request. But even then the multicast has to propagate in the network as soon as one of the responses is missing.
In order to test the behavior of both group communication approaches when caches are used, we have conducted a series of tests using our star topology in its 1-hop configuration with five members. In the tests we varied the time between requests to the group in 5 s increments and measured the number of packets transmitted inside the LLN and the response time. We sent 60 requests per experiment. The experiments were conducted without introduction of any packet loss. The average number of packets transmitted inside the LLN is shown in [Figure 23](#f23-sensors-14-09833){ref-type="fig"}. As expected when using multicasts, regardless of the frequency at which requests are sent, there was always one request and five replies from the five members resulting in an average value of 1.2, 5.2 and 7.2 packets/member for group members that are 1-, 2- and 3-hops away from the EM respectively. On the other hand, when using our unicast based solution the average number starts at 0.04, 0.07 and 0.1 packets/member and increases in steps to reach two, four and six packets/member for group members that are 1-, 2- and 3-hops away from the EM respectively. The reason for this behavior is that the initial requests are always sent to all members as the cache is still empty. Since the replies in our example did not include the Max-Age Option, the cache assumed that the replies were valid for the default value of 60s. Subsequent requests were thus served from the cache as long as the first replies were still considered fresh. Once the Max-Age value expired new requests were sent to the members again.
[Figure 24](#f24-sensors-14-09833){ref-type="fig"} shows the response times for the requests for both group communication approaches, when a cache is used for the cases in which the group members were 1- and 2-hops away from the EM. For multicast the response time is between 2 and 6 s regardless of the delay between requests. In the case of our group communication approach one can see that there are two groups of replies. The first group is between 0.20 and 0.25 s and the second group is higher than 0.3 s. The first group represents the replies that were served from the cache, while the second group represents the replies that were not fresh in the cache and thus obtained from the group members. With the increase of the time between the requests, one can observe how the number of replies served from the cache decreases. When the time between requests becomes larger than Max-Age, the number of requests served from cache becomes zero.
The cache stores the individual replies from the group members. This makes it possible to benefit from the cache even when different clients request a different Entity Operation. For example if two clients access the same entity within Max-Age, but one is requesting the average and the other is requesting the maximum value, then each entity member will be queried only once. The EM then processes the replies from the members and the cache and assembles the reply to the client as was requested. The same applies if a single member is part of two different entities (overlapping entities). The member will be queried only once within Max-Age, regardless of the entity that is requesting it. Finally, the cache can be populated via other requests/responses that pass via the gateway; it\'s not limited to just the requests/responses employed by the EM.
Please note that caching is very interesting, but it will not work for actuators. However, for actuators one probably wants high reliability, which is again in favor of our solution.
### 6.3.7.. Entity Validation Overhead
As described in Section 5.3, the EM can perform a validation process on the entity at creation time. In this subsection we measure the communication overhead of this validation process as a function of the number of group members. For this, we need a topology in which all group members are located at the same distance (in hops) form the Entity Manager. Otherwise the results will be influenced not only by the group size, but also by the hop count. Therefore, we use a single hop topology consisting of several nodes in a single collision domain. Every node in this LLN had exactly one resource that is part of the entity. This topology minimizes the effect of routing and forwarding delays on the validation process. For this topology, we performed several experiments and measured the number of packets sent inside the LLN during the validation process and the time that was needed to complete the process. We did not utilize the cache in this experiment. The experiment was conducted for several entity sizes; starting with a single member entity up to an entity with 24 members. The experiment was repeated for several packet loss percentages between 0% and 20%.
In order to validate an entity member, the EM starts by querying the profile of that resource. In our case the profile was 107 bytes long. A minimum of eight packets was required to obtain it ([Figure 25](#f25-sensors-14-09833){ref-type="fig"}). The reason for this is that the maximum usable payload size in our LLN is about 60 bytes (see Section 2.3). This means that blockwise transfer should be used to obtain the profile. As mentioned in Section 2.3, CoAP utilizes predefined block sizes. Unfortunately we cannot use the block size of 64 (since it is just above the usable payload size) and have to use 32-Byte blocks. Consequently, four packets are needed to obtain the complete resource profile and another four packets to acknowledge the receipt of the requests and transfer the profile parts. [Figure 25](#f25-sensors-14-09833){ref-type="fig"} shows that in the simplest case (one member in the entity and no packet loss) exactly eight packets were needed. When the number of members in the entity increases, so does the average number of required packets. This increase is due to the fact that the probability of packet drops due to collisions increases with the increase of the collision domain size. Since we are using confirmable CoAP messages, CoAP utilizes its retransmission mechanism to obtain the missing packets. Similarly, if we inject random packet loss in the network more packets will be transmitted to compensate for the loss. In addition to the CoAP retransmissions the EM uses its fallback mechanism for validation. This means that for cases with a lot of packet loss, it may happen that all retransmission attempts to obtain the profile fail. In these cases the EM tries to check if the resource is available based on the content of /.well-known/core of the node. Here again, blockwise transfer is used to obtain the information in 16 packets (eight requests, eight replies). If this also fails, the EM tries to query the resource to check if it exists, consuming two packets (one request, one reply).
As expected, [Figure 26](#f26-sensors-14-09833){ref-type="fig"} shows that the average entity validation time increases when the number of members in the entity is increased since validation requests are sent sequentially. The validation time also increases with the increase of packet loss in the LLN. The increase here has more profound effect on the delay since CoAP doubles the timeout between retransmissions, explaining the exponential trend in the delay.
Certainly, the entity validation overhead has negative impact on the energy consumption of the nodes in the LLN. If an entity will be created and used for a very limited time, this impact cannot be ignored. However, in many use cases it is expected that, once created and validated, entities will have a long life span. For example an entity that represents the lights in a certain room will change only if the layout of the room and lights change, which is in many cases a relatively rare occasion. In these cases the communication overhead of validation can be ignored. Additionally, one should also consider that the information needed for validation (profile; .well-known/core) is fairly static and thus can be efficiently cached by having a very-long max-age value. In such cases the validation can be based on the information obtained from the cache and thus be done almost immediately, without the need for packet transmissions inside the LLN.
7.. Discussion
==============
In this section we look again at the requirements for the IoT scenarios as presented in Section 3 and discuss how our solution addresses these requirements. We also provide the drawbacks of our solution in light of these requirements and the insights gained from experimental evaluation of our solution.
1. *Flexibility*: our CoAP group communication solution is highly flexible when compared to other solutions. Other than supporting the standard base CoAP protocol, group members do not have to support any additional extensions. Since group definition and behavior are set on the Entity Manager only, changes and extensions can be done on the Entity Manger without the need for any changes on the individual members. We support homogeneous and heterogeneous entity in terms of their CoAP resources. A group can be built from members as along as the have a shared subset of CoAP methods. Members do not have to offer the exact resource name or the same content-type, since the Entity Manger can take care of conversion when possible. Since we use IPv6 unicasts for communication between the Entity Manager and the members, the members can be located anywhere on the IPv6 Internet as long as they are reachable.
2. *Light-Weight (footprint)*: since our solution does not require any additions to standard CoAP implementation, it can run on Class 1 devices as already demonstrated in the three CoAP plugtest events. Furthermore the members do not store any information about which groups they are part of. Thus our solution scales well with the number of groups a certain member can be part of.
3. *Use of Standards*: our Solution is based on CoAP, which is expected to become the application layer standard the IoT. We rely only on the base CoAP standard and require no optional extensions to it. However, if available, the resource profile extension can be used to better understand the capabilities on the individual members in order to apply advanced features such as content type conversions.
4. *Performance*: as our solution uses only standard CoAP over unicast UDP/IPv6 it is a cache friendly solution. Caches are a powerful tool in reducing the number of messages inside LLNs and enhancing response times. However only CoAP GET method can be cached and thus no benefit of caches can be expected for the other CoAP methods (*i.e.*, GET for actuator data). Nevertheless, in these cases it is often more important to reliably deliver the message even if performance is reduced as a result.
5. *Validation and Error Handling*: we support heterogeneous members that might have properties that cannot be combined. Thus whenever a group is created the Entity Manager tries to validate the group in order to make sure that the group works as intended and informs the creator about the validation results. By giving the possibility to build the reply from just a subset of the members, the group becomes tolerant in handling certain error conditions such as node or route failures.
6. *Reliability*: by using CoAP confirmable messages we rely on CoAP retransmission mechanisms to handle reliability of communication with the entity members. In addition it is possible for the EM to customize the parameters for retransmissions (number of retransmissions and time-outs) for all or certain group members based on the history of communication with these members.
7. *Ease of Group Manipulation*: if the needs of the user change with time, our solution enables changing group memberships based on these needs by just changing the entity definition on the EM. The group members are not involved in this change and do not need to be reprogrammed or reconfigured in any way. By integrating the resources of the members and the Entity Manager into a resource directory, it becomes easy to locate and combine resource into new entities. This can benefit both machine-to-machine resource discovery as well as end user using Graphical User Interfaces to browse and build new entities.
8. *Expressiveness/Control*: by supporting processing of individual result at the EM, we enable greater control over the results that are sent to the user as a result of contacting the group members. Currently we support sending all replies as a list, or combining the results in one arithmetic value (minimum, maximum, or average). We also support the user to specify the number of members that should reply before an answer is composed and sent back to the requester. Additional features to improve the control over entity behavior can be easily added by extending the EM functionality without the need to extend the members themselves.
9. *Security*: by using only standard CoAP unicast messages for communication, we make it possible to apply whatever used transport security mechanisms (such as DTLS) to these messages as well.
It is clear from the discussion above, that our solution is capable of addressing the requirements we have put forward for group communication in IoT scenarios. Of course, the gain in flexibility comes with some drawbacks as well. Compared to a multicast solution, a unicast-based approach in general leads to more packets and to increased latency, with the exact values strongly depending on the topology. Of course, the experimental evaluation also reveals that a multicast-based solution is inferior in cases where packet loss cannot be tolerated, caching is relevant, security is required or heterogeneous groups need to be supported.
8.. Conclusions/Outlook
=======================
In this paper we have presented a novel solution for interacting with a group of CoAP resources across multiple smart objects. It provides an interesting alternative to multicast-based solutions, which are challenging to realize in a constrained environment. It is also an alternative to application-based solutions, which simply program the required functionality. An Entity Manager, which can reside anywhere, turns groups of resources into entities. A strong point of our approach is that it nicely integrates the important aspects of entity management: creation, validation, usage and manipulation. At the side of the constrained devices, it requires no additional complexity, except optional support for profiles in order to realize more powerful validation. The introduction of entity profiles introduces a lot of flexibility and opportunities for further extensions regarding how entities should behave. We have implemented our proposal and demonstrated and validated its feasibility. We have also performed a detailed performance evaluation of our solution. We explored several aspects (overhead, timing, scalability, *etc*.) related to the creation, validation and usage in realistic sensor networks and compared it with existing multicast-based solutions. As such, we think that our solution is a powerful enabler for group communication in LLNs and an interesting building block for IoT applications.
As future work we would like to test our solution on larger test-beds and with different use-cases. We will add more intelligence to the Entity Manager to make it optimize the response time and network overhead. One such optimization could be the adaptation of the CoAP retransmission parameters for certain members based on the history of communication with these members. Also, additional ways to interact with entities, by extending the profiles, will be investigated.
The research leading to these results has received funding from the European Union\'s Seventh Framework Programme (FP7/2007-2013) under grant agreement no 258885 (SPITFIRE project), from the iMinds ICON projects O\'CareCloudS and a VLIR PhD scholarship to Isam Ishaq.
**Authors Contributions** This paper is part of a Ph.D. Thesis written by Isam Ishaq under supervision of Jeroen Hoebeke, Ingrid Moerman and Piet Demeester. Floris Van den Abeele implemented the resource directory, Jen Rossey helped in the sensor implementation. Both have reviewed the paper and provided valuable comments for improvements.
The authors declare no conflict of interest.
{#f1-sensors-14-09833}
{#f2-sensors-14-09833}
{#f3-sensors-14-09833}
{#f4-sensors-14-09833}
{#f5-sensors-14-09833}
{#f6-sensors-14-09833}
{#f7-sensors-14-09833}
{#f8-sensors-14-09833}
{#f9-sensors-14-09833}
{ref-type="fig"}.](sensors-14-09833f10){#f10-sensors-14-09833}
{#f11-sensors-14-09833}
{#f12-sensors-14-09833}
{#f13-sensors-14-09833}
######
Advanced EM features. (**a**) Creation of an entity of 6 members and naming it "room_temperature" and specifying that only 4 out of the 6 members need to reply, before sending the combined reply to the client; (**b**) The profile of the newly created entity; (**c**) Querying the entity with default operation "List Replies"; (**d**) Querying the entity and specifying that the reply should only contain the average of the member values.


{#f15-sensors-14-09833}
{#f16-sensors-14-09833}
{#f17-sensors-14-09833}
{#f18-sensors-14-09833}
{ref-type="fig"}). Again, the reliability of the complete group is a lot better when using entity based group communication.](sensors-14-09833f19){#f19-sensors-14-09833}
{#f20-sensors-14-09833}
{#f21-sensors-14-09833}
{#f22-sensors-14-09833}
{#f23-sensors-14-09833}
{#f24-sensors-14-09833}
{#f25-sensors-14-09833}
{#f26-sensors-14-09833}
######
Cooja network simulator settings.
**Radio Medium** **Unit Disk Graph Medium (UDGM): Distance Loss**
------------------------- --------------------------------------------------
Transmit Range 55 m
Interference Range 105 m
Distances between nodes 50 m
Transmit Ratio 100%
Receive Ratio 50%--100% (depending on the experiment)
######
Summary of communication delays in used topology.
**Entity Delay between Requests to Group Members** ***D****~e~* **= 50*ms***
---------------------------------------------------- ---------------------------
Processing delay *D~p~*=120 *ms*
Transmission delay *D~t~*=23 *ms*
[^1]: This paper is a revised and expanded version of a paper entitled "Group Communication in Constrained Environments Using CoAP-based Entities" presented at the 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Cambridge, MA, USA, 21--23 May 2013 \[[@b1-sensors-14-09833]\].
|
2024-03-07T01:26:36.242652
|
https://example.com/article/4808
|
A small but significant percentage of children are born with severe life threatening diarrhea that can be classified as congenital. These children frequently have one of a growing group of genetic disorders that generally result in improper movement of various nutrients and salts across the intestine. We have recently discovered that a group of children who are incapable to absorbing all forms of nutrients have a genetic disorder that results in the inability to form enteroendocrine cells. Enteroendocrine cells are the hormone producing cells that reside in the gut and their formation is driven by a gene named Neurogenin3 that is defective in these children. In this grant application, we propose to identify more children with defects in the NEUROGENIN-3 gene so that we can get a better understanding of the clinical implications of this disorder. We also have been working on mice that carry a similar mutation of the NEUROGENIN-3 gene and we're using it to isolate the early and late forms of enteroendocrine cells in mice and humans. One main goal is to isolate these cells is so that we can get a better understanding of how they work, and how subsets of these cells develop. We have also found that NEUROGENIN-3 causes enteroendocrine cells that are grown in the laboratory to stop dividing and to take on the characteristics of mature enteroendocrine cells. We hope to understand the mechanism of how NEUROGENIN-3 causes the cells to stop dividing and to determine if a similar process is occurring in live mice. Finally, we have evidence that a loss of enteroendocrine cells results in a dysfunction of the intestinal cells called enterocytes that are responsible for absorbing nutrients. Here we plan a series of experiments to begin understanding the mechanism of how an absence of enteroendocrine cells leads to improper handling of nutrients by the enterocytes. PUBLIC HEALTH RELEVANCE: Children that develop chronic diarrhea shortly after birth have a very high mortality rate and these conditions are not well understood. We have recently discovered a new disorder that results in congenital diarrhea that occurs from the failure to develop gut hormone producing cells. In this grant we propose experiments to examine this group of humans and mice (with an identical condition) more closely. At the completion of these aims, we anticipate having further analyzed the physiologic basis of this disorder and will have further elucidated the mechanism of how the gene that is defective in this disorder (NEUROGENIN-3) causes gut endocrine cells to develop and function. We believe that these studies will provide new strategies of how to improve nutrient absorption in these patients and to understand this process more fully in health.
|
2024-06-22T01:26:36.242652
|
https://example.com/article/3884
|
package com.tinkerpop.pipes.transform;
import com.tinkerpop.pipes.AbstractPipe;
import com.tinkerpop.pipes.Pipe;
import com.tinkerpop.pipes.branch.LoopPipe;
import com.tinkerpop.pipes.util.Pipeline;
import com.tinkerpop.pipes.util.PipesPipeline;
import junit.framework.TestCase;
import java.util.Arrays;
import java.util.List;
/**
* @author Marko A. Rodriguez (http://markorodriguez.com)
*/
public class GatherPipeTest extends TestCase {
public void testPipeBasic() {
Pipe<String, List<String>> pipe = new GatherPipe<String>();
pipe.enablePath(true);
pipe.setStarts(Arrays.asList("marko", "josh", "peter"));
List list = pipe.next();
assertEquals(list.size(), 3);
assertEquals(list.get(0), "marko");
assertEquals(list.get(1), "josh");
assertEquals(list.get(2), "peter");
List path = pipe.getCurrentPath();
assertEquals(path.size(), 3);
//System.out.println(path);
assertFalse(pipe.hasNext());
}
public void testPipeTestBasicPath() {
Pipe<String, String> pipeA = new RemoveCharPipe();
Pipe<String, List<String>> pipeB = new GatherPipe<String>();
Pipeline<String, List<String>> pipeline = new Pipeline<String, List<String>>(pipeA, pipeB);
pipeline.setStarts(Arrays.asList("marko", "josh", "peter"));
List list = pipeline.next();
assertEquals(list.size(), 3);
assertEquals(list.get(0), "mark");
assertEquals(list.get(1), "jos");
assertEquals(list.get(2), "pete");
//System.out.println(pipeline.getCurrentPath());
assertFalse(pipeline.hasNext());
}
public void testPipeTestBasicPath2() {
Pipe<String, String> pipeA = new RemoveCharPipe();
Pipe<String, List<String>> pipeB = new GatherPipe<String>();
Pipe<List<String>, String> pipeC = new ScatterPipe<List<String>, String>();
Pipeline<String, String> pipeline = new Pipeline<String, String>(pipeA, pipeB, pipeC);
pipeline.setStarts(Arrays.asList("marko", "josh", "peter"));
int counter = 0;
while (pipeline.hasNext()) {
String string = pipeline.next();
assertTrue(string.equals("mark") || string.equals("jos") || string.equals("pete"));
counter++;
//System.out.println(pipeline.getCurrentPath());
}
assertEquals(counter, 3);
assertFalse(pipeline.hasNext());
}
public void testGatherLooping() {
PipesPipeline pipeline = new PipesPipeline(Arrays.asList("marko", "josh", "peter")).add(new RemoveCharPipe()).gather().scatter().loop(3, LoopPipe.createLoopsFunction(3));
while (pipeline.hasNext()) {
String s = (String) pipeline.next();
if (s.startsWith("m"))
assertEquals(s, "mar");
else if (s.startsWith("j"))
assertEquals(s, "jo");
else if (s.startsWith("p"))
assertEquals(s, "pet");
else
throw new RuntimeException("An unexpected String came through the pipeline.");
//System.out.println(pipeline.getCurrentPath());
}
}
private class RemoveCharPipe extends AbstractPipe<String, String> {
public String processNextStart() {
while (true) {
String s = this.starts.next();
if (s.length() > 1) {
return s.substring(0, s.length() - 1);
}
}
}
}
}
|
2023-12-04T01:26:36.242652
|
https://example.com/article/1096
|
3 Cal.3d 296 (1970)
475 P.2d 441
90 Cal. Rptr. 345
MAX HOLTZ et al., Petitioners,
v.
THE SUPERIOR COURT OF THE CITY AND COUNTY OF SAN FRANCISCO, Respondent; SAN FRANCISCO BAY AREA RAPID TRANSIT DISTRICT et al., Real Parties in Interest.
Docket No. S.F. 22739.
Supreme Court of California. In Bank.
October 19, 1970.
*299 COUNSEL
Hanson, Bridgett, Marcus & Jenkins and William J. Bush for Petitioners.
No appearance for Respondent.
Bledsoe, Smith, Cathcart, Johnson & Rogers, David J. Van Dam and Robert A. Seligson for Real Parties in Interest.
OPINION
TOBRINER, J.
Plaintiffs Max and Harry Holtz seek a writ of mandate to compel the Superior Court of the City and County of San Francisco to reinstate certain allegations stricken from their complaint upon motion of defendants San Francisco Bay Area Rapid Transit District (BART) and the City and County of San Francisco. Plaintiffs own improved real property fronting on Market Street in San Francisco, and in their first amended complaint in the underlying action they allege that, as a result of the extensive excavation of Market Street undertaken by defendant BART in connection with its construction of an underground rapid transit system, their land and buildings have been substantially damaged.
Specifically, plaintiffs claim that the excavation of the land adjacent to the northern boundary of their property, reaching a depth of 80 feet, caused the lateral support of their land to be withdrawn, with the consequence that portions of their land moved downward and laterally onto the defendant city's property, so that plaintiffs' buildings and other improvements settled and cracked. Plaintiffs sought recovery for the damage incurred on two distinct theories: (1) In count one of their complaint plaintiffs claimed that defendants were "strictly liable," i.e., liable without negligence, on a theory of inverse condemnation for the physical injuries proximately resulting from the construction of the public improvement as *300 deliberately planned and designed; (2) In the second count plaintiffs alternatively claimed that defendants had been negligent in the excavation activities and were thus liable for damages which were proximately caused by this negligence. Plaintiffs prayed for $30,000 damages to both the land and the improvements in each of the two counts of the complaint.
After the court overruled defendants' general demurrer to both causes of action, defendants moved to strike those allegations of the complaint alleging damage to the building and improvements. In support of this motion, defendants relied on section 832 of the Civil Code, which sets out the general mutual rights and duties of coterminous owners with respect to lateral and subjacent support.[1] (1) Defendants argued that section 832 rendered an excavating coterminous owner liable for damages to a neighbor's improvements only if the foundation of the neighbor's improvement equalled or exceeded the "standard depth," then defined as 12 feet;[2] since the complaint revealed that the depth of the foundations of *301 plaintiffs' buildings were only six feet, defendants claimed that they could not be liable for damages to the buildings or improvements and requested that such allegations be stricken. The trial court correctly concluded that section 832 does not absolve a negligent excavator from liability even if his neighbor's foundation does not reach "standard depth" and thus it denied the motion to strike with respect to the negligence count. The court granted the motion to strike with respect to the initial "strict liability" inverse condemnation count, however, apparently concluding that section 832 establishes the limits of liability for damages resulting from the withdrawal of lateral support when such damage is caused by public entities as well as when it is caused by private coterminous owners.[3]
(2) (See fn. 4) Plaintiffs now seek a writ of mandate to compel the trial court to reinstate the stricken allegations,[4] contending that the trial court's order conflicts with prevailing inverse condemnation principles.[5]*302 (3a) For the reasons discussed below, we conclude that defendant public entities may be liable on an inverse condemnation theory for the alleged physical damage to plaintiffs' property proximately caused by the excavation as deliberately planned and designed without a showing of negligence.
(4) Defendants' primary contention, as we understand it, is that since under section 832 a private excavating coterminous owner would not be liable, absent negligence, for the damage incurred by plaintiffs in this case, defendants, though public agencies, should likewise not be liable unless negligent. In thus equating the liability of public and private entities, defendants ignore, however, the distinct constitutional source of a public entity's responsibility to compensate for damages resulting from the construction of a public improvement and overlook the unique purpose of the inverse condemnation duty. Article I, section 14, of the California Constitution, provides that: "Private property shall not be taken or damaged for public use without just compensation...." and it is this provision, rather than section 832, in which plaintiffs' inverse condemnation claim is fundamentally rooted. (See Rose v. State of California (1942) 19 Cal.2d 713, 724 [123 P.2d 505].) In such cases the purposes of the constitutional clause, rather than the limits established by a rule of statutory or common law allocating rights and responsibilities between private parties, must fix the extent of a public entity's responsibility.
In Albers v. County of Los Angeles (1965) 62 Cal.2d 250 [42 Cal. Rptr. 89, 398 P.2d 129], this court explicitly rejected the notion that there need be a congruence between public and private liability in inverse condemnation actions. Considerable physical damage to plaintiffs' homes had resulted in Albers from a landslide caused by the county's construction of a road; the landslide was completely unforeseeable, however, and the trial court explicitly found that the county had not been negligent in the construction of the road. The county, relying on a rather substantial body of cases,[6] argued that since a private party would not be liable for unforeseeable damages, the county, on these facts should likewise be free from a duty to compensate.
After undertaking an extensive review of all of our inverse condemnation cases, we concluded in Albers that the decisions declaring that "[i]f *303 the property owner would have no cause of action were a private person to inflict the damage, he can have no claim of compensation from the state" (Archer v. City of Los Angeles (1941) 19 Cal.2d 19, 24 [119 P.2d 1]), had stated "the rule ... much more broadly than required...." (62 Cal.2d at p. 260); we reaffirmed the vitality of earlier precedent which stated that "the right assured to the owner by this provision of the constitution is not restricted to the case where he is entitled to recover as for a tort at common law. If he is consequently damaged by the work done, whether it is done carefully and with skill or not, he is still entitled to compensation under this provision." (62 Cal.2d at p. 257, quoting Reardon v. City & County of San Francisco (1885) 66 Cal. 492, 505 [6 P. 317].)[7] (5a) On the facts of Albers itself we proceeded to affirm a judgment rendering the county liable for the actual physical damage proximately caused by its construction, and we generalized our holding by establishing that, with only two exceptions (to be discussed below) "any actual physical injury to real property proximately caused by the improvement as deliberately designed and constructed is compensable under article I, section 14, of our Constitution whether foreseeable or not." (62 Cal.2d at pp. 263-264.) (Italics added.)
As the Albers opinion carefully made clear, its general rule of compensability did not derive from statutory or common law tort doctrine, but instead rested on the construction, "as a matter of interpretation and policy" (62 Cal.2d at p. 262), of our constitutional provision. (6) The relevant "policy" basis of article I, section 14, was succinctly defined in Clement v. State Reclamation Board (1950) 35 Cal.2d 628, 642 [220 P.2d 897]: "The decisive consideration is whether the owner of the damaged property if uncompensated would contribute more than his proper share to the public undertaking." In other words, the underlying purpose of our constitutional provision in inverse as well as ordinary condemnation is "to distribute throughout the community the loss inflicted upon the individual by the making of public improvements" (Bacich v. Board of Control (1943) 23 Cal.2d 343, 350 [144 P.2d 818]): "to socialize the burden ... to afford relief to the landowner in cases in which it is unfair to ask him to bear a burden that should be assumed by society" (Mandelker, Inverse Condemnation: The Constitutional Limits of Public Responsibility, 1966 Wis.L.Rev. 3, 8).
In announcing our holding in Albers in the generalized form quoted *304 above, while of course most fundamentally influenced by this "loss distribution" premise,[8] we did not overlook the competing considerations which caution against an open-ended, "absolute liability" rule of inverse condemnation. Recognizing that "fears have been expressed that compensation, allowed too liberally, will seriously impede, if not stop, beneficial public improvements because of the greatly increased cost" (Bacich v. Board of Control (1943) 23 Cal.2d 343, 350 [144 P.2d 818]), we deemed it prudent to focus our policy inquiry on situations which shared a general factual similarity with that present in Albers. Thus we limited our holding of inverse condemnation liability, absent fault, to "physical injuries of real property" that were "proximately caused" by the improvement as deliberately constructed and planned. (3b) We have no occasion in the instant case to analyze the operation of article I, section 14, beyond the limits suggested by the facts of Albers; here plaintiffs clearly allege that they have suffered "actual physical injuries of real property" and that such injuries "were proximately caused by the excavation and construction work ... [as] deliberately designed and constructed by defendants...."[9]
Thus, under Alber's interpretation of article I, section 14, the present plaintiffs clearly should be compensated for the damage to their land and improvements resulting from the BART excavation, notwithstanding the limits section 832 may place on a private party's liability, unless the instant case falls within either of two doctrinal categories which were expressly excepted from Alber's generalized strict liability rule. (5b) In attempting to reconcile earlier inverse condemnation cases in Albers, we identified two strains of decisions in which the urgency or particular importance of the governmental conduct involved was so overriding that considerations of public policy inveighed against a rule rendering the acting public *305 entity liable absent fault. The first exception, the Gray exception (Gray v. Reclamation Dist. No. 1500 (1917) 174 Cal. 622 [163 P. 1024]), involved noncompensable damages "inflicted in the proper exercise of the police power"; the second exception, the Archer exception (Archer v. City of Los Angeles (1941) 19 Cal.2d 19, 24 [119 P.2d 1]), encompassed those cases in which the state at common law "had the right to inflict the damage." (Albers v. County of Los Angeles (1965) 62 Cal.2d 250, 262 [42 Cal. Rptr. 89, 398 P.2d 129].) (Italics in original.)
Defendants do not, and could not, properly contend that their excavation and construction activity in the instant case falls within the "police power" exception referred to in Albers. (7) As we explained fully in Rose v. State of California (1942) 19 Cal.2d 713, 730-731 [123 P.2d 505], the "police power" doctrine "[g]enerally ... operates in the field of regulation," rendering "damages" occasioned by the adoption of administrative or legislative provisions noncompensable (e.g., Hadacheck v. Sebastian (1915) 239 U.S. 394 [60 L.Ed. 348, 36 S.Ct. 143] (reduction in property value resulting from zoning ordinance need not be compensated); Chicago & Alton R.R. Co. v. Tranbarger (1915) 238 U.S. 67 [59 L.Ed. 1204, 35 S.Ct. 678] (statute requiring railroads to construct drainage ditches along their tracks at their own expense does not constitute a compensable taking)); this doctrine of noncompensable loss comes into play in connection with more direct "taking" or "damaging" of property only under "emergency" conditions; i.e., when damage to private property is inflicted by government "under the pressure of public necessity and to avert impending peril." (House v. Los Angeles Flood Control Dist. (1944) 25 Cal.2d 384, 391 [153 P.2d 950].) Recognizing that a broad interpretation of this doctrine of noncompensable loss would completely vitiate the constitutional requirement of just compensation (Rose v. State of California (1942) 19 Cal.2d 713, 731 [123 P.2d 505]), the courts have narrowly circumscribed the types of emergency that will exempt the public entity from liability.[10] (3c) From the present pleadings we find no indication that the "police power" exception could possibly be applicable in the instant case (Cf. Youngblood v. Los Angeles Flood Control Dist. (1961) 56 Cal.2d 603 [15 Cal. Rptr. 908, 364 P.2d 840]; Bauer v. Ventura County (1955) 45 Cal.2d 276 [289 P.2d 1]).
Defendants do contend, however, that the instant litigation falls within *306 the second exception referred to in Albers, the "Archer exception." In analyzing the Archer decision in Albers we found that "the [Archer] court held that a private riparian owner would have had a right to collect the surface waters on his land and channel them into the stream into which they would naturally drain even though this resulted in the flooding of lower lands. Based on this fundamental premise, the court was not required to go further than to hold that article I, section 14, did not require the state to pay for damages which it had a right at common law to cause." (62 Cal.2d at pp. 260-251.) (Italics in original.)
Defendants argue that since under the circumstances of the instant case, section 832 permits a private coterminous owner to excavate on his own property without incurring liability as long as he is not negligent, he has a "right" to inflict damages within the meaning of the Archer exception, and by analogy a governmental agency has a similiar "right" to inflict such damage. That interpretation of the "right" referred to in the Archer exception, however, would so expand the exception as to consume the general Albers rule. Under such an interpretation, whenever damage was caused by a nonnegligent act for which a private individual would not be liable, the private party could be designated as having a "right" to inflict such injury. If we held that the public entity possessed such a parallel "right," the doctrine that public responsibility is to be equated with private liability, which Albers explicitly disapproved, would be resurrected through the Archer exception. Indeed, our holding in Albers itself refutes the defendants' broad reading of the "right to inflict damage" concept. In Albers we assumed that a private party would not have been liable for the resulting unforseeable damages (in defendants' terminology, a private person had a "right" to inflict such damages) (see 62 Cal.2d at p. 262, fn. 3), but we still found the public agency responsible under the constitutional provision.
(8) The fulfillment of the broad "cost spreading" purpose of the constitutional provision, as clarified in Albers, requires a limited application of the Archer exception rather than defendants' proposed expansive one. The doctrine of the common law "right to inflict damage," emanating from the complex and unique province of water law, has been employed in only a few restricted situations, generally for the purpose of permitting a landowner to take reasonable action to protect his own property from external hazards such as floodwaters. (E.g., Clement v. State Reclamation Board (1950) 35 Cal.2d 628, 635-636 [220 P.2d 897]; Lamb v. Reclamation Dist. No. 108 (1887) 73 Cal. 125, 129-131 [14 P. 625].) In some ways the language of the "right to inflict damage" projects a misleading concept, because the essential common characteristic of this category of cases is not *307 that they all involve the infliction of injury on others, but rather that they all involve injury resulting from the landowner's efforts to protect his own property from damage. In recognition of the generally perceived reasonableness of such action and, as a policy matter, to encourage protective measures to preserve land resources,[11] certain types of protective measures were cloaked in a legal "privilege."[12] (Lamb. v. Reclamation District No. 108 (1887) 73 Cal. 125, 129-130 [14 P. 625]; Gray v. Reclamation Dist. No. 1500 (1917) 174 Cal. 622, 651 [163 P. 1024]; San Gabriel Valley Country Club v. County of Los Angeles (1920) 182 Cal. 392 [188 P. 554, 9 A.L.R. 1200]; Archer v. City of Los Angeles (1941) 19 Cal.2d 19 [119 P.2d 1].) (3d) We need neither examine the continued validity of any of these long-lived doctrines, nor question the applicability of the policies supporting the "privileged" status of a particular private activity in the context of public improvements,[13] for we know of no case, and have *308 been directed to none,[14] in which the activity involved in the instant action the excavation of land to construct an improvement has ever been conceived of as privileged activity.
On the contrary, courts in jurisdictions which have a "just compensation" clause comparable to California's have held that damages inflicted by street excavations upon property of abutting landowners are the kind of damages which most appropriately should be borne by the governmental entity, whether or not it engaged in negligent excavation. The discussions of two textwriters, which the Alberts opinion quoted at length (62 Cal.2d at pp. 259-260), make this point rather lucidly. Thus Nichols, in his treatise on Eminent Domain, concludes: "Common law liability is undoubtedly an indication of damage; but lack of liability at common law should not conclusively prove that there is no damage under the constitutional provision. Accordingly, courts are inclined to allow compensation for actual physical injury to land regardless of the fact that it was actionable at common law, and in the case of injury to abutting property arising from a particular use of the street in front of it to disregard the test of common law liability altogether." (Italics added.) (2 Nichols on Eminent Domain (3d ed. 1963) § 6.441[2], p. 494.) The discussion in American Jurisprudence reiterates this conclusion: "In cases of special and peculiar damage arising out of physical injury to property, courts are inclined to allow compensation although the injury is one that would not be actionable *309 at common law if inflicted by an adjoining owner. In cases arising out of injury to abutting property by alterations or erections in a street, the question whether a private owner might lawfully make similar alterations or erections on his own land without liability to his neighbors is never even considered." (Italics added.) (10 Am.Jur., Eminent Domain, § 138, pp. 764-765.)
A careful review of the case law of our sister states reveals the accuracy of the textwriters' general observations. (See Cuneo v. City of Chicago (1942) 379 Ill. 488 [41 N.E.2d 473] (damage resulting from non-negligent excavation of street compensable under constitutional compensation clause); City of Covington v. Parsons (1935) 258 Ky. 22 [79 S.W.2d 353] (same); Bator v. Ford Motor Co. (1934) 269 Mich. 648 [257 N.W. 906] (same); Siemers v. St. Louis Elec. Terminal Ry. Co. (1938) 343 Mo. 1201 [125 S.W.2d 865] (same); In re Mill Creek Sewer (1953) 374 Pa. 120 [97 A.2d 11, 12] (same); Kunst v. City of Grafton (1910) 67 W. Va. 20 [67 S.E. 74] (same); Farnandis v. Great Northern Ry. Co. (1906) 41 Wash. 486 [84 P. 18, 20] (same); cf. In re Board of Rapid Transit R.R. Comrs. of City of New York (1909) 197 N.Y. 81 [90 N.E. 456, 464] (same result reached under "just compensation" statute).)
Indeed Reardon v. City & County of San Francisco (1885) 66 Cal. 492 [6 P. 317], the seminal California decision construing the current "or damaged" wording of article I, section 14, as imposing liability for compensation absent fault, involved public activity and private damage closely analogous to that present in the instant case. In Reardon, the state, in the process of constructing a sewer and grading a street, piled heavy rocks, stones, and earth on the street; as a result of the increased pressure exerted by the weight of this heavy material, "the subjacent earth was squeezed and pressed downward and outwards, causing the displacement and the destruction of the foundation" of the plaintiffs' buildings located on the abutting property (66 Cal. at p. 495). The court held that plaintiffs could recover for the damages so sustained, notwithstanding the fact that they could not have prevailed against a private party under common law principles.
The damages allegedly incurred by the instant plaintiffs are of precisely the same nature as those at issue in Reardon.[15] Although the government action precipitating the damage in Reardon is factually distinguishable *310 from the excavation undertaken by the present defendants, defendants have suggested no persuasive basis for attributing any legal significance to this factual distinction.[16] We can perceive of no policy considerations that would justify differentiating, for purposes of our constitutional "just compensation" clause, damages inflicted in tunnel excavations from those caused by sewer construction.
Our decision in the instant case, and the Albers decision more generally, in effect recognize that, under article I, section 14, physical damages proximately resulting from a public improvement must be considered as direct a "cost" as the property actually condemned or the materials actually utilized in its construction. Indeed, in most instances a public entity may be able to forestall unintended physical damage by initially employing more protective measures in the actual construction of the project; in the instant case, for example, defendants could probably have prevented the damage to plaintiffs' property by expending additional funds in shoring up its excavation. This comment does not imply, however, that defendants would necessarily be negligent in not expending such funds; the likelihood of the damage may have been so remote and the expense of the additional protection so great that it was reasonable (hence, non-negligent) for defendants to forego supplemental measures initially. Nevertheless, since the undertaking of the excavation at this lower cost created some risk, however slight, of damage to plaintiffs' property, it is proper to require *311 the public entity to bear the loss when damage does occur.[17] "[I]n the generality of cases, the governmental entity with its superior resources is in a better position to evaluate the nature and extent of the risks of public improvement than are potentially affected property owners, and ordinarily [the governmental entity] is the more capable locus of responsibility for striking the best bargain between efficiency and cost (including inverse liability costs) in the planning of such improvements." (Van Alstyne, Inverse Condemnation: Unintended Physical Damage (1969) 20 Hastings L.J. 431, 495.)
In sum, we conclude that, in accordance with the general inverse condemnation principles set out in Albers, the instant plaintiffs will be entitled to compensation under article I, section 14, for "any physical injury to real property proximately caused by the improvement as deliberately designed and constructed." Thus the trial court erred in striking allegations of such physical injury from the initial count of their complaint.
The peremptory writ of mandate shall issue.
Wright, C.J., McComb, J., Peters, J., Mosk, J., Burke, J., and Sullivan, J., concurred.
NOTES
[1] Section 832 provides: "Each coterminous owner is entitled to the lateral and subjacent support which his land receives from the adjoining land, subject to the right of the owner of the adjoining land to make proper and usual excavations on the same for purposes of construction or improvement, under the following conditions:
1. Any owner of land or his lessee intending to make or to permit an excavation shall give reasonable notice to the owner or owners of adjoining lands and of buildings or other structures, stating the depth to which such excavation is intended to be made, and when the excavating will begin.
2. In making any excavation, ordinary care and skill shall be used, and reasonable precautions taken to sustain the adjoining land as such, without regard to any building or other structure which may be thereon, and there shall be no liability for damage done to any such building or other structure by reason of the excavation, except as otherwise provided or allowed by law.
3. If at any time it appears that the excavation is to be of a greater depth than are the walls or foundations of any adjoining building or other structure, and is to be so close as to endanger the building or other structure in any way, then the owner of the building or other structure must be allowed at least 30 days, if he so desires, in which to take measures to protect the same from any damage, or in which to extend the foundations thereof, and he must be given for the same purposes reasonable license to enter on the land on which the excavation is to be or is being made.
4. If the excavation is intended to be or is deeper than the standard depth of foundations, which depth is defined to be a depth of nine feet below the adjacent curb level, at the point where the joint property line intersects the curb and if on the land of the coterminous owner there is any building or other structure the wall or foundation of which goes to standard depth or deeper then the owner of the land on which the excavation is being made shall, if given the necessary license to enter on the adjoining land, protect the said adjoining land and any such building or other structure thereon without cost to the owner thereof, from any damage by reason of the excavation, and shall be liable to the owner of such property for any such damage, excepting only for minor settlement cracks in buildings or other structures."
Hereafter, unless otherwise stated, all section references are to the Civil Code.
[2] The statute has since been amended to define the "standard depth" of foundations as nine feet. (See Am. Stats. 1968, ch. 835, § 1.)
[3] This rationale does not fully explain the trial court's action, however, because if the court acted pursuant to section 832 it should have properly granted defendant's general demurrer to the "strict liability" claim rather than only the more limited motion to strike. At common law a coterminous owner was strictly liable for damages resulting from the withdrawal of lateral support of land in its natural, unimproved state, but section 832 modified that rule by providing that "lateral support" liability for damage to both land and improvements would generally result only if the excavator were negligent. (Civ. Code, § 832, subd. 2; Comment (1931) 20 Cal.L.Rev. 62, 63.) The section created an exception to this general negligence standard in the situation in which a neighboring building's foundation reached the "standard depth"; under those circumstances, the excavator was strictly liable for any damage he caused if he, too, intended to reach standard depth (§ 832, subd. 4; Comment, supra, 20 Cal.L.Rev. 62, 67). Because plaintiffs' foundation did not reach "standard depth," it would appear that under section 832 a private coterminous owner would be liable for damage both to the land and to the improvement only if he were negligent. Thus, if the trial court believed section 832 was controlling, it should properly have dismissed the entire strict liability count instead of only those allegations dealing with the damage to buildings and improvements. In any event, since we conclude that the provisions of section 832 do not circumscribe the limits of a governmental agency's responsibility to compensate for damages directly inflicted by the withdrawal of lateral support, any error committed by the trial court in interpreting section 832 becomes immaterial.
[4] "Where it appears that the trial court has made a ruling which deprives a party of the opportunity to plead his cause of action or defense, relief by mandamus may be appropriate to prevent a needless and expensive trial and reversal." (Tate v. Superior Court (1963) 213 Cal. App.2d 238, 251 [28 Cal. Rptr. 548]; see Souza & McCue Constr. Co. v. Superior Court (1962) 57 Cal.2d 508 [20 Cal. Rptr. 634, 370 P.2d 338].) Most of the plaintiffs' injury involves the damages to their building and improvements and thus striking the allegations of those damages is, for all practical purposes, substantially equivalent to striking the entire inverse condemnation cause of action. Under these circumstances we believe plaintiffs may properly seek relief through a writ of mandate.
[5] Petitioner also contends that the 80-foot street excavation involved in the instant case is not a "proper and usual" excavation within the meaning of section 832, and thus that the section would not be applicable even if defendants were private property owners. In view of our conclusion with respect to the public entities' liability under inverse condemnation, we have no occasion to examine the scope of section 832's operation between private coterminous owners.
[6] E.g., Archer v. City of Los Angeles (1941) 19 Cal.2d 19, 24 [119 P.2d 1]; Clement v. State Reclamation Board (1950) 35 Cal.2d 628, 636 [220 P.2d 897]; Bauer v. County of Ventura (1955) 45 Cal.2d 276, 283 [289 P.2d 1]; Youngblood v. Los Angeles County Flood Control Dist. (1961) 56 Cal.2d 603, 608 [15 Cal. Rptr. 904, 364 P.2d 840].
[7] The Reardon rule had been cited and followed on numerous occasions. (E.g., Tyler v. Tehama County (1895) 109 Cal. 618 [42 P. 240]; Tormey v. Anderson-Cottonwood Irr. Dist. (1921) 53 Cal. App. 559, 568 [200 P. 814] (memo. decision by Supreme Court modifying Court of Appeal opn.); Power Farms Inc. v. Consolidated Irr. Dist. (1941) 19 Cal.2d 123, 126 [119 P.2d 717].)
[8] We concluded our discussion by citing this passage from Sedgwick on Constitutional Law (quoted in Bacich v. Board of Control (1943) 23 Cal.2d 343, 351 [144 P.2d 818]): "`The tendency under our system is too often to sacrifice the individual to the community; and it seems very difficult in reason to show why the State should not pay for property which it destroys or impairs the value [of], as well as for what it physically takes....'" (62 Cal.2d at p. 263.)
[9] Professor Arvo Van Alstyne has aptly pointed out that the "proximate causation" terminology utilized in Albers is potentially confusing, because the "proximate cause" doctrine of tort law is often defined in terms of "foreseeability," whereas the Albers decision, imposing liability absent foreseeability, could not have intended such a construction. (Van Alstyne, Inverse Condemnation: Unintended Physical Damage (1969) 20 Hastings L.J. 431, 435-438.) We recognize the greater precision, as Professor Van Alstyne contends (id. at p. 436) in restating this element of the Albers test in terms of "substantial" causation. (See also Mandelker, Inverse Condemnation: The Constitutional Limits of Public Responsibility, 1966 Wis.L.Rev. 3, 52.) In the instant case, however, defendants have raised no contention concerning an absence of the requisite degree of causation; we believe it proper to defer any change in language to a case which better reveals the competing considerations on the causation issue.
[10] "Instances of this character are the demolition of all or parts of buildings to prevent the spread of conflagration, or the destruction of diseased animals, or rotten fruit, or infected trees where life or health is jeopardized." (House v. Los Angeles County Flood Control Dist. (1944) 25 Cal.2d 384, 391 [153 P.2d 950]. See generally Van Alstyne. Statutory Modification of Inverse Condemnation: Deliberately Inflicted Injury or Destruction (1968) 20 Stan.L.Rev. 617.)
[11] See, e.g., San Gabriel Valley Country Club v. County of Los Angeles (1920) 182 Cal. 392, 401 [188 P. 554, 9 A.L.R. 1200] ("Not to permit an upper land owner to protect his land against the stream would be in many instances to destroy the possibility of making the land available for improvement or settlement and condemn it to sterility and vacancy. Such a rule would seriously interfere with the development of the country."); Gray v. Reclamation Dist. No. 1500 (1917) 174 Cal. 622, 653 [163 P. 1024] ("`[T]here would be no right on the part of an individual to insist that primitive conditions be suffered to remain, and thus all progress and development to be rendered impossible.'").
[12] According to Prosser, the "privilege" designation "signifies that the defendant has acted to further an interest of such social importance that it is entitled to protection, even at the expense of damage to the plaintiff. He is allowed freedom of action because his own interests, or those of the public, require it, and social policy will be best served by permitting it." (Prosser, Law of Torts (3d ed. 1964) p. 99.) This definition would appear to aptly explain the basis of the "right to inflict damage" cases.
It must be noted, however, that the "privilege" recognized by the Archer exception is not necessarily an "absolute privilege," but in many instances is only a "conditional" one. Thus, for example, even when a public agency is engaged in such "privileged, activity" as the construction of barriers to protect against floodwaters, it must act reasonably and non-negligently. (See Bauer v. Ventura County (1955) 45 Cal.2d 276, 285-286 [289 P.2d 1]; House v. Los Angeles Flood Control Dist. (1944) 25 Cal.2d 384, 395-396 [153 P.2d 950]; San Gabriel Valley Country Club v. County of Los Angeles (1920) 182 Cal. 392, 399-400 [188 P. 554, 9 A.L.R. 1200]; Granone v. County of Los Angeles (1965) 231 Cal. App.2d 629, 647 [42 Cal. Rptr. 34].) The "conditionally privileged" nature of some conduct may also be reflected in the fact that the state will only be liable for a certain type of damage resulting from that conduct. (Cf., e.g., Colberg, Inc. v. State of California ex rel. Dept. Pub. Wks. (1967) 67 Cal.2d 408, 424 [62 Cal. Rptr. 401, 432 P.2d 3] (when state acts pursuant to its authority to regulate navigable waters, compensation is required only for "actual physical invasion of or encroachment upon fast lands.")
[13] Although many of our decisions in the past have often mechanically assumed that if a certain activity is privileged when performed by a private party it should be equally privileged when undertaken by a public entity (see, e.g., Lamb v. Reclamation District No. 108 (1887) 73 Cal. 125, 129-130 [14 P.2d 625]), this facile conclusion often overlooks significant policy differences that exist between the private and the public spheres. Although certain socially beneficial conduct may appropriately be designated "privileged" for private individuals in order that they will not be deterred from undertaking the activity, the public entity may continue to engage in this same "privileged" activity even if it must bear the loss of resulting damages. In such a case, there may well be no reason to depart from the general constitutional guarantee of just compensation. (See Van Alstyne, Inverse Condemnation: Unintended Physical Damage (1969) 20 Hastings L.J. 431, 499-508; Mandelker, Inverse Condemnation: The Constitutional Limits of Public Responsibility, 1966 Wis.L.Rev. 3, 7-8.)
[14] Defendants suggest that Porter v. City of Los Angeles (1920) 182 Cal. 515 [189 P. 105], while not designating "excavation" activities as "privileged" conduct, does imply that section 832 applies to governmental entities as well as to private persons. The precise issue before the court in Porter was whether plaintiff's claim against the city for damages resulting from an excavation was barred by the statute of limitations since it had been filed more than two years after the cause of action arose. In approaching this issue, the court appears to have assumed that the city's action would constitute a "trespass" (bringing into play the three-year "trespass" statute of limitations) only if the city had been negligent; thus the court never addressed the question whether the city could be liable absent negligence, since it apparently assumed that any such claim that might have accrued would have been barred by a shorter statute of limitations. Moreover, since the plaintiffs in Porter alleged that defendants had been negligent, the court rested its decision on that allegation.
In any case Porter was decided many years before our Albers decision, and consequently its holding must be read in the light of the subsequent decision's clarification of the conflicting scope of the inverse condemnation responsibility.
[15] Realistically, the compensable injury sustained by plaintiffs is not the withdrawal of the right to lateral support, but the actual damage to their land and its improvements. (See Kane v. City of Chicago (1945) 392 Ill. 172 [64 N.E.2d 506, 508-509].) It would be irrational to distinguish damage resulting from soil movement on the basis of the direction (toward or away from a plaintiff's property) that the soil was moved.
[16] Although defendants suggest that section 832 establishes a statutory policy as to excavation and this policy serves to distinguish Reardon, the substantive core of that policy does not essentially differ from the common law tort principles applicable to activities involved in Reardon. Under both section 832 and general tort principles, a private individual is liable for damages resulting from his negligence; indeed section 832 may impose a somewhat greater liability than the common law on the excavating property owner, since it renders him "strictly liable" whenever both his excavation and his neighbor's foundation reach "standard depth."
We note, additionally, that there is absolutely no indication from the language of section 832 of any legislative intention to single out public excavation operations for specialized treatment under the constitutional "just compensation" clause. (Cf., e.g., Agr. Code, §§ 5906, 6323. See generally Van Alstyne, Statutory Modification of Inverse Condemnation: The Scope of Legislative Power (1967) 19 Stan.L.Rev. 727, 776-784.) On the contrary, we may reasonably infer from the wording of the statute that the drafters probably did not contemplate the section's application to excavation in the public streets. The section defines the depth of a foundation as the depth "below the adjacent curb level, at the point where the joint property line intersects the curb...." (§ 832, subd. 4.) This reference to a "point where the joint property line intersects the curb" seems to indicate that the section was conceived as principally governing excavations involving neighboring lots, rather than ones involving a lot and the street. In view of our conclusion that the public nature of the excavator renders inverse condemnation principles governing, however, we do not reach the question of the application of section 832 to a private excavation that does not involve adjoining lots.
[17] In Lubin v. Iowa City (1964) 257 Iowa 383, 391 [131 N.W.2d 765, 770] the city's 80-year-old water main, located six feet below the ground without a reasonable inspection capability, broke and flooded the plaintiffs' basement. The court stated: "A city ... so operating knows that eventually a break will occur, water will escape and in all probability flow onto the premises of another with resulting damage.... The risk from such a method of operation should be borne by the water supplier who is in a position to spread the cost among the consumers who are in fact the true beneficiaries of this practice and of the resulting savings in inspection and maintenance costs." (See also Smith v. City of Los Angeles (1944) 66 Cal. App.2d 562, 578 [153 P.2d 69].)
|
2024-03-10T01:26:36.242652
|
https://example.com/article/3850
|
6.30pm:
Re-cap time...
• Largely peaceful protests have taken place across the UK. Thousands of school pupils, college pupils and university students have marched, demonstrated, and occupied buildings in protest against proposed government increases in tuition fees and education cuts – despite heavy snow and freezing temperatures across much of the country.
• In Birmingham, part of the city council building was occupied by around 50 protesters, including college leavers. The group vacated the building at 5.30pm. In Nottingham, up to 150 occupied the university's Great Hall, demanded the university publicly oppose the coalition government's plans.
• In London, protests were largely peaceful, despite protesters deviating from the route they had planned with police. Simon Hardy, from the national campaign against fees and cuts, said protesters became "worried" about being kettled so changed their route, culminating with thousands going on an ad hoc march through the capital. However at around 6pm this evening there were clashes between protesters and police.
• Protests are set to continue over the next two weeks. More nationwide demonstrations are set to take place on 9 and 11 December, with a large protest also planned on the day of the vote on tuition fee increases – rumoured to be mid December. Meanwhile, dozens of universities remain occupied by protesters, and look likely to continue through the week.
That's it for today, thanks for all the comments, tweets and emails.
6.00pm:
The Guardian's beat blogger in Edinburgh, Michael MacLeod, has sent this video of protests in the city, where students mounted a snowball protest against tuition fees, hurling compacted snow at Holyrood.
5.35pm:
I've just spoken to Simon Hardy, one of the people behind the national campaign against fees and cuts and one of the people who met with the Metropolitan police yesterday to map out the route protesters would be taking today.
Hardy said today had been "really successful", and said the scattering of protesters across London was caused by fear of kettling from police. He added that in turning away from officers on Whitehall, protesters had been able to go on an ad hoc march which was "far better than any march we'd have been able to negotiate with the police".
Earlier (2.56pm) police said they were forced to form a line across Whitehall after protesters set off earlier than they had planned, meaning they would have marched without a police escort. The line of officers appeared to cause fear among some protesters that they were about to be kettle, however, and many promptly turned and headed elsewhere.
"It's true that the plan we worked out with police isn't the one that occurred on the day. However it wasn't bad faith on the part of the protesters went there ready to do the proposed route as we agreed it," Hardy said.
"As the demonstration was gathering in Trafalgar Square people saw police vans and police moving around Whitehall and thought that they didn't want a repeat of last week [when protesters were 'kettled' for hours on Whitehall] so they began a spontaneous protest which took us all round the houses in London."
Hardy said today had been "really successful, absolutely amazing".
"The kettling last week didn't put people off but actually made it even more radical. The reason why it just kept moving and wouldn't stop was because so many people were worried about kettling by the police so they just kept moving, and demonstrating, and in the end we actually got a march through London that was far better than any march we'd have been able to negotiate with the police."
He said protesters marched "all the way from Trafalgar Square, near to Parliament, past Scotland Yard, to Victoria, to Hyde Park Corner, to Piccadilly Circus, Oxford Street, down to Tottenham Court Road, then Holborn, then we split up because of a failed kettling attempt by police. Then some headed off towards the city of London and some headed towards Trafalgar Square and so on."
5.13pm:
Guardian writer Bibi van der Zee reports from Brighton:
Things are going strong here. Riot police are currently lined up to protect the Mcdonalds on London Road, various roads are shut down while organisers try to get demonstrators back to the town centre, students giving the exhortation "Who gives a fuck about Mcdonalds?"
One student just told me that police tried to kettle them but were dodged. Getting very very cold here so should think most people will head home soon.
4.59pm:
In Nottingham around 150 students, including college pupils, have occupied the University of Nottingham's Great Hall, following a march through the city centre which was attended by up to 300 people.
Here's David, a postgraduate student at the university.
I didn't turn my mic off quick enough at the end, so you might hear a bit of babble. Apologies.
4.53pm:
I've been sent the following video by @oxfordbunion on Twitter, which shows footage of protesters marching through the city centre before occupying Oxfordshire county council.
.
4.28pm:
My colleague Cameron Robertson has been behind the scenes at the University College London occupation, where students have been in residence for almost a week. Here's his video:
"I think it's really important not to demonise the police," says one.
4.18pm:
Matthew Taylor has just been on the line from Trafalgar Square.
Matthew Taylor Photograph: Guardian
Although police have all sides of the square blocked off, with lines of officers with vans behind them, this isn't kettling on the scale we have seen in the previous two London protests.
Police have said they won't let everyone leave at once, but will let small groups through. They don't want another mass march leaving the square, and indeed Whitehall is still closed off to protesters.
There's pretty wild weather down here, which is probably helping the police operation. With the rally point being Trafalgar Square, it'd be difficult for police to kettle protesters anyway in such a popular tourist area.
There are about 400 people near the south west corner of the square, listening and dancing to music, but people are basically leaving.
3.50pm:
Students from Wales will be spared an increase in their tuition fees regardless of where in the UK they go to university under plans outlined today, PA reports.
Responding to Government proposals to increase fees in England, Wales's education minister said Welsh students would pay the same fees in 2012 that they face this year.
Leighton Andrews told Welsh Assembly members he was proposing to pay for the subsidy by top-slicing the teaching grant for Welsh universities.
Universities in Wales will charge the same basic fee of £6,000 that is proposed for English institutions in 2012-13. They will be able to charge up to £9,000 if they can demonstrate a commitment to widening access and "other strategic objectives".
But Mr Andrews said the increase in fees for Welsh students would be paid for them.
In a statement to the Senedd chamber, he said: "In other words, the increase in fees for Welsh domiciled students, whether they study in England or Wales or Scotland or Northern Ireland, will be paid by the Welsh Assembly Government.
"Welsh domiciled students will not have to find either £6,000 or £9,000 to study.
"The public purse will continue to subsidise higher education for Welsh domiciled students.
"Welsh students who go to university in 2012-13 will be paying the same in real terms as students who go to university in this academic year."
Alright for some...
3.26pm:
The Metropolitan police say there are 500 protesters in Trafalgar Square now. Protesters are being "encouraged to leave".
Protesters are still not being allowed down Whitehall, the police force said in a statement on their website. Full text:
There are around 500 protesters in Trafalgar Square. We have set up cordons around this area, with police at exit points. In small groups the protesters are being encouraged to leave the area via these exit points. The agreed protest time was between 12-2 and this is now over, so we are encouraging protesters to leave Trafalgar Square enabling Londoners to get back to their normal routine. Protesters are not being allowed down Whitehall.
The Met's figure of 500 protesters seems quite low. Just 20 minutes ago (after the police statement above) Matthew Taylor estimated there were some 2,000 in Trafalgar Square, other reports put the figure at 2,000 plus.
• @mrmatthewtaylor Couple of thousand people now kettled in traf sq. A couple of missiles thrown and some scuffle with police#demo2010
3.14pm:
Here's some Twitter updates from protesters in Oxford, Leeds, Liverpool, Brighton, Birmingham:
• @sandig @adamgabbatt Protestors in Oxford, mainly secondary school students, have occupied County Hall. Some have made their way onto the roof.
• @JustAnonPG @AdamGabbatt Leeds students charge Students Services bldg housing VCs office. Police on scene, some still inside. #demo2010
• @violetmaze Liverpool : march banned but people broke through.road and rooftop sitins.kettling now in liverpool 1 . #nocuts #dayx2 #dayx#demo2010
• @DavidWeeble All #peaceful still. People in windows supporting us. Huge crowd. 100s @BrightonArgusJo #demo2010
• @Rumaanah I would like to make it very clear that there is NO and was NOT any violence between the protesters and police. #DEMO2010 #Birmingham
And finally, a message of support for protesters from Scandinavia:
• @tommyesp@AdamGabbatt In solidarity with British students, I skipped my morning lecture and slept in. No tuition fees in Norway; £9,000 is madness!
2.56pm:
The Metropolitan police have said the line of officers that formed across Whitehall this afternoon was not an attempt to contain protesters.
A statement on their website appears to be aimed at addressing some protesters' fears that they were going to be 'kettled' on Whitehall. Many protesters began marching down the street earlier this afternoon, but upon seeing a line of "hundreds" of police barring their way they turned and ran, causing the fragmented groups of protesters we are now seeing.
The Met police worked with organisers in advance to agree a suitable route from Trafalgar Square down to Parliament Square for a peaceful protest. However, today's march set off at an earlier time than agreed. This meant that the march began without a police escort. The police escort was essential due to gas main works on one side of Whitehall. As a result, a line of police officers formed a cordon across Whitehall. This line of police officers intended to steer the march to one side of the road and the agreed route. There was never any intention to contain the protesters. The march then broke into small groups, travelling in different directions. The march continues peacefully, however, it is causing some disruption for Londoners in the West End, in what are already difficult conditions due to the weather.
I'll be speaking to Simon Hardy, one of the people behind the London demonstration, shortly to get his perspective on whether the march set off earlier than planned.
2.41pm:
I've just spoken to Rumaanah Ellahi, a 17-year-old pupil at Cadbury sixth form college in Birmingham. She's part of a group of "around 50" students, most of them at university, who have occupied a room at Birmingham city council.
Rumaanah says 30 more students are in the reception downstairs, while police have prevented any more from walking in.
She says she wanted to "send a message to Nick Clegg" regarding the increase in tuition fees – increases which she says will prevent her from going to university.
Rumaanah says the group have food and are prepared to stay in the council building for some time. "We aren't moving anytime soon!," she tweeted me earlier.
2.10pm:
A round-up of the whereabouts of protesters in London, where it seems students protesting are now scattered all over the centre of the capital.
• The Guardian's Matthew Taylor is on the Strand, near the Royal Courts of Justice. "A discussion is ongoing about whether to go back to Trafalgar Square or carry on to the City," he told me just now.
• My colleague Haroon Siddique, out doing a bit of Christmas shopping on his day off, has just text to say some students are marching up Regent Street, chanting "Tory scum".
• Meanwhile, student Tom Chambers has got in touch to say he's with a "rather limp procession" of protesters on their way to Trafalgar Square – the main rallying point this morning, you may recall.
• New Statesman writer Laurie Penny is further east, tweeting regularly (latest): "This is going bloody fast, I'm out of breath. We're almost at st pauls. I wonder where it will end?"
1.54pm:
My colleague Paul Lewis has been looking into the contentious issue of 'kettling'. Some reports suggest that police in London attempted to pre-emptively contain protesters on Whitehall, and there are question marks over the legality of attempting to kettle protesters before they have really begun to protest.
Paul Lewis Photograph: Guardian
In terms of the letter of the law, there is a chance that Scotland Yard overstepped the mark today. I've just been in touch with Louise Christian, the human rights lawyer who is bringing a test case against the Met's policy of "kettling" to the European Court of Human Rights. The Law Lords previously ruled in the Met's favour in the Lois Austin case , hence the force's repeated claims that the tactics has been deemed "lawful". But it is not as simple as that, as senior officers need to prove that containing people was "proportionate" to the threat posed by a crowd. The notorious kettling of climate camp activists at last year's G20 protest is currently before a Judicial Review at the High Court over exactly this point. The stakes are high as the Met could lose money - and a lot of it - if it is shown to have arbitrarily imprisoned thousands of people.
If today's reports are true, and the Met tried to kettle students before their march had properly even begun, the commissioner could find himself in the dock yet again. There i evidence to support those reports - lines of police and pre-prepared barriers suggest there was a pen in Whitehall, into which police planned to funnel students. A kettle needs to be a response to evidence of disorder, rather than an entirely preemptive tactic that suppresses protest before it has begun. "I think what has happened runs contrary to the Law Lords ruling in the Austin case," Christian said. "It makes clear that they need to have an evidence-based approach. If they decide in advance that they are going to do it, then I suggest that would be unlawful."
Legality aside, there is also the question of whether the apparent plot worked. It is clear that when the march saw the kettle awaiting them, they sprinted off in various directions. The Met is currently dealing with a public order nightmare; separated groups of protesters marching their way around the London, on an ad-hoc route. Tweet reports of "feeder" marches in the Oxford Street, the Strand, Victoria, Embankment and Tottenham Court Road. My colleague Matt Taylor said there were "shambolic" scenes. How do you deal with that?
1.48pm:
...and a bit more from Cambridge and Newcastle, from students occupying universities there:
Cambridge
Nearly 1000 school students, trade unionists, and university students protested in Cambridge today in a national day of action against cuts to education and the public sector. The protest was joined by students from Cambridge University who have been in occupation in protest since Friday.
The students marched peacefully around Cambridge, though police escalated tension with two vans of riot cops on hand. Police have been stationed outside local Lib Dem-controlled council buildings throughout the day. The marchers have joined the occupying students inside Old Schools.
Newcastle
In the seventh day of occupation we have seen a successful demonstration through Newcastle city centre that was entirely peaceful. We wish to thank and applaud the Northumbrian Police for its cooperation with organizing this demonstration However, it is apparent that other police forces around the country have acted inappropriately and violently. We deplore these actions and believe that these are the cause of the violence seen at previous demonstrations.
1.44pm:
Updates from protesters in Cambridge and Newcastle:
• @CamDefendEd @adamgabbatt march has ended--hundreds of 6th-formers inside the Senate House grounds, and with us inside the occupation #demo2010 #dayx2
• @mikecsmith @AdamGabbatt Students at Newcastle holding a candle lit vigil at 5pm http://on.fb.me/fFUXKY
1.37pm:
Helen Self emails about the Bath protest:
The protest in Bath today is taking place from 3.30-5.30pm outside the Abbey, could you add that to the Guardian live blog. Around 800 people are expected to join in.
1.35pm:
There are student protests in Rome today as well as in the UK. Associated Press report that police vans and lines of officers in riot gear are blocking access to much of the centre of Rome, to keep thousands of protesters from reaching Parliament.
Lawmakers are voting on a contested reform bill many students and professors say will give the private sector too much involvement in the state university system. They claim funding cuts means faculty positions are going unfilled.
Similar protests snarled other cities, including Milan, Turin, Naples, Venice, Palermo and Bari. In Genoa, students protested under the slogan "they block our future, we block the cities."
Police blockades in Rome prevented several lines of marchers from converging on the square outside the Chamber of Deputies and blocked bus and tram routes.
John Hooper, Rome correspondent for the Guardian, is tweeting updates from the city @john_hooper:
• #student #protests in Rome. Maze of lanes round parliament sealed by police chicanes. Like Paris '68. But without a 'Daniele il Rosso'.
• Trick in #protests like this one in Rome is carry a right-wing paper and wear an overcoat. Police blocking #students just waved me through.
• For armchair followers of #student #protests, live video coverage here of Rome events http://ow.ly/3hqvs
• #Italy #student #protests. Motorway blocked near Bologna. Scuffles in Milan. Occupation of Cathedral in Palermo. Quiet as yet in Rome.
1.27pm:
Matthew Taylor (follow him @mrmatthewtaylor) tweets from the London protests:
• @mrmatthewtaylor #catandmouse demo now on Piccadilly circus more police now but couple of thousand protesters still in control #demo2010
1.17pm:
In among the marches and protests so far today, around 100 students have occupied a building at Nottingham University.
Here's the demands of the students who have taken over the university's Great Hall. I'll be speaking to one of them shortly.
1. We demand that the University of Nottingham lobby the Russell Group and the government and issue a statement condemning all cuts to higher education, the EMA and the rise in tuition fees. 2. We demand that the University of Nottingham implement a complete open book policy in regards to existing budget constraints. 3. We demand that the University of Nottingham ensure no redundancies for teaching, research or support staff. 4. Ensure that no victimization or repercussions for anyone participating in the occupation. 5. Allow free access in and out of the building.
1.05pm:
The NUS president Aaron Porter has written to Nick Clegg calling the Liberal Democrats u-turn on tuition fees a "betrayal". Porter was responding to Nick Clegg's letter claiming student protests could put people off going to university (see 8.30am)
The NUS president has set out why he thinks the government should be reconsidering the planned increases:
· The coalition have not properly considered a graduate tax and have dismissed the idea based on a 'pure graduate tax' system that has not been proposed · They recommend a foolish and extremely risky approach to funding the higher education sector, with a rapid move to an unconstrained market in which students meet almost the whole cost of teaching · They accept at face value the lazy myth that competition on price between universities leads to higher quality, and accepts the falsehood that fair access can be achieved through so-called 'needs blind' admissions and a trade in bursaries or scholarships, whilst dismantling the education maintenance allowance (EMA) and AimHigher schemes · They ignore the probability that with much higher fee levels, prospective students - especially those from disadvantaged backgrounds - will change their behaviour and make judgements primarily on prices, costs and debt
12.35pm:
My colleague Helene Mulholland reports that Vince Cable, who lest we forget is the cabinet minister in charge of tuition fees, has said he is prepared to abstain in a key vote on the government's tuition fees policy if that is what fellow Liberal Democrat MPs decide to do as a group.
The business secretary said he was prepared to take the unprecedented step of not backing his own proposals for the sake of party unity.
The party's 57 MPs are in talks this morning in a bid to find a solution to what he conceded was a "difficult" situation for the Tories' coalition partner amid growing grassroots pressure from within their own ranks to abide by their pre election pledge.
A petition signed by 104 former parliamentary candidates for the Lib Dems called on Cable and Lib Dem leader Nick Clegg, the deputy prime minister, and their fellow MPs to abide by the pre-election pledge to vote against higher fees to avert "many more years back in the political wilderness".
Labour will trigger a vote on the plan to raise tuition fees to £9,000 in an opposition day debate this afternoon, which coincides with the third and largest national student demonstration against government plans to increase the cap on tuition fees from £3,375 to as much as £9,000 a year from 2012.
"If we all abstain then that is the position I am happy to go along with. There is an option that we all abstain together and we are considering that," Cable said.
"My own personal instinct - partly because I am the Secretary of State responsible for universities and partly because I think the policy is right - are very much to vote for it. But we have got to vote as a group, collectively, and we are discussing how we do that."
12.15pm:
Matt Taylor is out in central London and describes extraordinary scenes, where protesters have fled into St James Park to avoid the risk of kettling.
Matthew Taylor Photograph: Guardian
There is a big police presence around Westminster, scores of vans parked up the side streets on Whitehall including at least one carrying police horses.
A couple of hundred people gathered in Trafalgar Square, with a very vocal group gathered underneath Nelson's Column chanting "give us back our EMA" as well as some rather rude things about Nick Clegg.
The march set off down Whitehall as agreed, but half way down was a line of few hundred police. Demonstrators turned and ran back up towards Trafalgar Square, sprinting across Horse Guards Parade and generally scattering everywhere.
Police are now giving chase across Horse Guards Parade. The demonstration is much smaller than last time, but there's definitely two or three thousand here.
There are very large numbers of police in central London today – as this picture from @filkaler on Twitter shows.
12.04pm:
Hannah Waldram, the Guardian's beatblogger in Cardiff, says marches through the city are planned to start at 2pm today with a rally in the city's busiest shopping street at 3pm.
The group organising the event, Action Against Cuts Cardiff told me: "We continue to note that cutbacks in education and other public services, whether initiated by politicians in Westminster, Cardiff or anywhere else, are unnecessary and reckless and threaten the people in society with the greatest need."
More from Hannah on the Cardiff protests here.
11.54am:
... and an update from our very own Steven Morris:
Steven Morris byline picture Photograph: Guardian
Fewer students initially on Bristol demo this week. But unlike last they manage to get into the city centre. Marching down Broadmead and Haymarket, then running into Cabot Circus - city's new multi million pound shopping centre. Odd that police haven't stopped them this week. No violence still.
11.48am:
Bit of a round-up of some of the protests going on around the country:
• @ncloccupation @AdamGabbatt 40-50 occupying students have just left to go and join the protest. Snow will not put us off! #solidarity
• @LeedsStudent Leeds Student reporting from the second national day of action. One person already arrested #demo2010 #leedsmarch
• @RedplogHB @AdamGabbatt all of us at Sheffield Uni will be marching at 12.00 showing our #feesfury !!!
• @svejky About to go join protest. Cold and excited! If Yr in Manchester, get out there #UNIty #solidarity
11.36am:
I've just had a text from Simon Hardy, from the national campaign against fees and cuts, the group of activists from universities, colleges and schools across the country that co-ordinate action against tuition fees and education funding cuts.
The snow should not put people off – today's actions across the UK will hammer another nail in the coffin of the education cuts and fee increases.
Hopefully I'll be speaking to Simon a little later on.
11.32am:
Update from Matthew Taylor, in central London, where the snow appears to have stopped for the moment:
Matthew Taylor Photograph: Guardian
In Trafalgar Square there is a handful of soggy protesters and a few journalists. The plan today is that students will arrive here from 11am and then at about 12noon march down to Parliament Square – where there will be speeches and an "open mike".
They had agreed with police that the demonstration would finish at 3pm but interestingly some of the shopkeepers around Parliament Square say they have been told by the police that the students will be "held" there until 6pm.
Students who are setting up in Parliament Square are furious: "The police already seem to have decided to kettle the protest despite what happened last time and despite agreeing with us this week that the demo should finish at 3pm," said Maham Hashmi, from Soas (School of Oriental and African Studies).
11.20am:
Are you protesting today? Update us on your progress by Tweeting me @adamgabbatt.
You can also send your photographs of the protest to @gspix on Twitter. The Guardian's picture desk will be monitoring the feed through today, and we'll pull some of the snaps into the blog and (later on) into a gallery.
10.56am:
Shiv Malik reports from Trafalgar Square – where he "can't see any protesters" at the moment. (It is early of course. And snowing persistently, if not heavily).
I've just arrived into Charing Cross with a number of students. We were approached by police officers who asked if we were attending the protest. They then warned that the protest might go on longer than expected. Even if we wanted to leave, we might not be able to. I asked them if this meant there was going to be a kettle and they replied that "they knew what that meant, they couldn't be explicit, but this was one of the tactics that the police had in consideration for the day.
They then wished us good luck.
10.33am:
Steven Morris reports on plans for protests in Bristol:
Steven Morris byline picture Photograph: Guardian
Students into day nine of their occupation of a privately-run cafe at the University of the West of England in Bristol.
They say there's always 20 or 30 of them there, some sleeping in tents set up in the middle of the cafe. They're hoping 1,000 or so will turn out for today's demonstration in the city centre - there was a couple of thousand there last week.
Also hoping some of the school children who were there last week will appear again - they feel the police have to hold back when so many young teens are there.
But the students also feel they may be kettled today - last week the police kept them out of the shopping areas but allowed them to move relatively freely in the area around Bristol University.
10.16am:
On Twitter, @anywavewilldo is dishing out advice to those protesting today:
• http://bit.ly/gHp8Nr #kettle and demo survival guide - stay warm today! #demo2010 #dayx #shamelessretweetingofownblog ;0) #solidarity
From her blog post:
• Think about keeping warm - lots of layers, a hat and gloves are good. Pick light things you can put in a rucksack. The gold or silver survival blankets you see at marathons are brilliant. Protesters have slept out for days with them and they fold into a pocket. Cost about £3 from an outdoor shop. • Wear a rucksack rather than another type of bag - they don't get pulled off as easy and they protect your back if you get charged by horses, pushed over or hit with a baton. Some protesters even take cycle helmets. Wear plain clothes so you don't stand out and you don't mind loosing, swapping or giving/ throwing away. • get a 'clean' phone - If the police take your mobile they know everyone you are mates with and who your family are which can be upsetting. Also you feel really bad if you loose your phone. Buy a cheap mobile and new sim for cash then it doesn't matter what happens to it.
9.56am:
My colleague Patrick Kingsley reports on an apparent u-turn by the NUS president Aaron Porter.
National union of students (NUS) president Aaron Porter has already reneged on a promise made only on Sunday in which he pledged the NUS would "organise financial, legal and political aid for all current and future occupations."
The Cambridge university occupation – who were yesterday afternoon issued with a possession order by university authorities – asked Porter to provide them with specific NUS legal support. But Porter refused, arguing that NUS can only offer general legal advice about occupiers' rights, rather than legal support for individual occupations, in a declaration which seemed to contradict the promises he made on Sunday.
Porter did not respond to requests from the Guardian for comment last night but he did make the following statements on his Twitter account, @aaronporter:
• not sure what the fuss is. @nusuk is seeking legal advice on occupiers' right. But can't on a case by case basis.
• @CamDefendEd @UCLOccupation we can seek legal advice that covers occupiers rights. Not individual legal costs for every student.
Porter's apparent u-turn came only a day after promising students at the University College London (UCL) to organise financial, legal and political aid for all occupations and apologising for his "spineless" lack of prior support for university occupations.
The Cambridge occupation criticised Porter for only offering advice "which is already freely available on the internet."
The occupiers said the NUS had "failed" them. "We are being failed by institutions which are meant to be standing up for us - this is why we need to step up to act and resist."
A statement released by the UCL occupation yesterday also criticised Porter's actions: "The UCL occupation is disappointed it has taken just one day for Aaron Porter to renege on his promise to provide financial and legal support to occupations.
"The excuse that NUS cannot provide support to individual students is thin - as a national organisation it has unparalleled access to those willing to offer pro bono legal advice and representation. We urge Aaron to reconsider before he loses the goodwill and unity created yesterday, and hope that his acceptance of other proposals is not under threat."
9.20am:
Last night fifteen police officers were injured and four people arrested outside Lewisham town hall in south-east London, where demonstrators gathered to protest outside a meeting where councillors were voting to cut the council budget by £60m.
Officers had to call for help from the Metropolitan police's Territorial Support Group as 100 protesters tried to force their way into the building, the Guardian reported.
A spokesman for the Met police told me this morning that fifteen officers suffered "minor injuries" while policing the demonstration. Two were hurt badly enough to spend the night in hospital, one with a broken finger and another being treated for the smoke inhalation after inhaling fumes from protesters' flares.
Here's a video from thegoldengirlk8 on Youtube taken outside the council meeting.
Sue Luxton, a former Green party councillor who was returning home from work at 6.45pm, said she saw 200 to 300 protesters, including a large number of students from Goldsmiths College.
"People were angry because the council had arranged for only 40 people to attend the meeting, although many wanted to be there," Luxton said. "About 100 people tried to rush in. I think the police were little overwhelmed. There were police with riot shields and police horses. The area was cordoned off – buses couldn't get through."
Darren Johnson, a Green councillor, said he voted against the cuts along with two Conservatives. The Labour majority voted in favour while the Liberal Democrats abstained.
"There are better ways of doing these rather deep cuts in frontline services," Johnson said. "I spoke of the importance of reducing high salaries of officers and cutting budgets for consultants, PR and marketing. These cuts will mean the closure of an early learning centre and less street cleaning."
8.50am:
Martin Wainwright reports that the weather could "release armies of school students", what with many schools closed today and all. (Where schools and colleges aren't closed the inclement weather could also encourage pupils to stay inside, of course):
Martin Wainwright Photograph: Guardian
Snow is causing serious disruption in the North East and Yorkshire but young people are less likely to be deterred from going out than their seniors, such as myself. School closures are widespread too. Three of the five online council information services in West Yorkshire were down this morning because of heavy use. That promises to release armies of school students for the marches and rallies planned in all the regions' university centres. Student organisers are actively encouraging this after sixth formers' youthful enthusiasm stole many of the headlines last week.
8.30am:
Tens of thousands of school, college and university students are expected to protest against education cuts today, in the third day of demonstrations this month. Last night the deputy prime minister Nick Clegg, who has become something of a focus for protesters after reneging on a pre-election promise to oppose tuition fees, said the demonstrations could put young people off going to university.
Over 6,000 people have signed up for a day of direct action in London alone, where the national campaign against fees and cuts has organised a march on parliament, and where last week thousands of school pupils and students were "kettled" by police for several hours.
Over the weekend NUS president Aaron Porter apologised for his "spineless" lack of public support for last week's demonstration, when tens of thousands of students walked out of lessons. Porter, who did not attend last week's demonstrations, said in his blog he wanted to "announce my support for a new wave of action, spurred on and supported by NUS and Students' Unions said today's protests will have NUS backing".
However after the NUS president came out in support of the demonstrations he received a letter from Clegg last night. "All of us involved in this debate have a greater responsibility to ensure that we do not let our genuinely-held disagreements over policy mean that we sabotage an aim that we all share - to encourage people from poorer backgrounds to go to university," Clegg wrote.
Lib Dems are expected to vote against a Labour motion in the Commons today which calls on ministers to delay legislation on the fees hike until after they have published a White Paper spelling out their vision of the future of higher education.
On the nationwide Facebook page for the demonstrations, almost 25,000 students have indicated they will be protesting across the UK today. "Direct action", ranging from walking out of lessons to rallies is expected in over 40 towns and cities, with crowds of around 2,000 expected in Manchester, Bristol and Brighton.
Some 32 universities are still being occupied following last Wednesday's protests, with most planning to keep a small group in the seized buildings while fellow students march.
|
2024-03-31T01:26:36.242652
|
https://example.com/article/4802
|
Our overall aim is to study biochemical activities of identified neurons in the marine mollusc, Aplysia, which are important to neurophysiological functioning. We are concerned with biosynthesis of transmitter substances, as well as with the apparatus responsible for their axoplasmic transport and the transport of other cellular constituents. In addition, we are attempting to identify and characterize specific membrane proteins, including receptor molecules.
|
2023-09-13T01:26:36.242652
|
https://example.com/article/8889
|
"Furin"
- garden bell / wind chime -
Furin, a garden bell made of iron or glass, has been traditionally one
of the typical things Japanese in summer. When swung in the breeze, it
delivers a pleasant sound most of us Japanese love and enjoy very much.
These days, furin are not always welcomed because of the dense urban housing
conditions in Japan, but the distinctive sound still symbolizes summer,
and during the hot humid season signifies a breeze.
As you see on our website, all of our garden bell items are made of iron called gNanbu-tekkih. Different from other materials such as glass or ceramicware, the sound of Nanbu-tekki garden bell is elegant and deep. It has a long history of more than 900 years, and it has been influenced very much by the Zen spirit of Buddhism. In this way, some of the Nanbu-tekki garden bell have been made in the shape of temples, its bell and creatures of Buddhism.
Since Nanbu-tekki garden bell is manufactured only in the very restricted area called Nanbu District located in the present Iwate prefecture, it is still facing the very difficult situation.
As you might know, Japan has experienced a huge disaster, the Great East
Japan Earthquake and Tsunami in 2011. Iwate was actually the second-worst
damaged prefecture by the disaster, with 6,078 dead and missing. The number
of the garden bell manufacturers has decreased to almost half of that in
2010.
Honestly speaking, our past manufacturer has been severely damaged and
bankrupted due to the disaster, and we are now looking for a new manufacturer.
Click on a picture to enlarge!
FU-101
FU-102
FU-103
FU-104
Wind chime
"Sanjuso"Trio
"Toro"Lantern
"Tsurube"Well bucket
500 Yen
3,300 Yen
2,600 Yen
2,700 Yen
material: iron
width: 40mm (1.57")
material: iron
width: 100mm (3.94")
material: iron
width: 95mm (3.74")
material: iron
width: 120mm (4.72")
FU-105
FU-106
FU-107
FU-108
"Odo"Small temple
"Ayame"Iris
"Odo-toro"Temple-shaped lantern
"Azekura"Traditional style
3,000 Yen
3,300 Yen
3,800 Yen
3,500 Yen
material: iron
width: 100mm (3.94")
material: iron
width: 115mm (4.53")
material: iron
width: 105mm (4.13")
material: iron
width: 90mm (3.54")
If you don't see the index on the left side, click
below and enter the site again from the entrance.http://www.zen-shop.net
|
2023-11-05T01:26:36.242652
|
https://example.com/article/4196
|
Q:
How can I fill a fixed-size with a variable-size?
I am trying to work out a CSS3 only resolution to this question.
I have a variable-height <p> within a fixed-size <div> and have not been able to have the <p> element fill the free space within the div. If there were no special effects associated with each div, I could set the background-color of both elements to the same color, but that is not currently an option.
What I have attempted so far (and rejected):
Giving the <p> element a height of 100% and the <div> element an overflow of auto. On the html side, every div had a scrollbar and a lot of extra space appeared.
Setting the background-color of both elements to the same color, but when I added a div:hover block, the background color did not fill the whole div (because as the screenshot shows, the p element does not fill the container in most cases.
Assigning the same :hover block to both div and p, but the transition effect did not apply to the entire div.
In any case, my attempts seemed very "hacky" and I hope there is a clean way to have the p element fill the div element.
This is a screenshot of my latest iteration.
This is the CSS code.
.RadioEpisodeItemContainer
{
display: inline-block;
vertical-align: top;
width: 20em;
height: 12em;
overflow: hidden;
border: 2px solid white;
border-radius: 10px;
margin: 0.5em;
}
.RadioEpisodeItem
{
border-radius: 8px;
background-color: tan;
margin: 0em;
padding: 1em;
}
This is a subsample of the rendered HTML:
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>5/02/2009<strong> – Episode: </strong>Intro<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/INTRO.mp3" title="Episode Intro: About SpecialNeeds Lifestyles">
Play</a><br />
<strong>Description: </strong>About SpecialNeeds Lifestyles</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>3/15/2012<strong> – Episode: </strong>098<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0107.mp3" title="Episode 098: Hospice. Guest: Susan Howard (Carondelet Hospice) and Corinne Spalding">
Play</a><br />
<strong>Description: </strong>Hospice. Guest: Susan Howard (Carondelet Hospice)
and Corinne Spalding</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>2/19/2012<strong> – Episode: </strong>097<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0106.mp3" title="Episode 097: Handi-Dogs. Guest:Veronica">
Play</a><br />
<strong>Description: </strong>Handi-Dogs. Guest:Veronica</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>2/12/2012<strong> – Episode: </strong>096<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0105.mp3" title="Episode 096: Guest: Mary Mallone">
Play</a><br />
<strong>Description: </strong>Guest: Mary Mallone</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>2/05/2012<strong> – Episode: </strong>095<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0104.mp3" title="Episode 095: Mastering a Healthy Self Image. Guest: Darrel Knock">
Play</a><br />
<strong>Description: </strong>Mastering a Healthy Self Image. Guest: Darrel Knock</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>1/22/2012<strong> – Episode: </strong>094<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0103.mp3" title="Episode 094: The Special Needs Store. Guest: Kelly Savage">
Play</a><br />
<strong>Description: </strong>The Special Needs Store. Guest: Kelly Savage</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>1/15/2012<strong> – Episode: </strong>093<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0102.mp3" title="Episode 093: Music therapy for people with autism. Guest: Jackie Burger">
Play</a><br />
<strong>Description: </strong>Music therapy for people with autism. Guest: Jackie
Burger</p>
</div>
In summary, how can I have the p element fill the available space in the div element?
A:
This is very simple, just add height: 100% on the class responsible for your paragraph styling. In this case, RadioEpisodeItem
body {
background-color: #4094cf;
}
.RadioEpisodeItemContainer {
display: inline-block;
vertical-align: top;
width: 20em;
height: 12em;
overflow: hidden;
border: 2px solid black;
border-radius: 10px;
margin: 0.5em;
}
.RadioEpisodeItem {
height: 100%;
border-radius: 8px;
background-color: tan;
margin: 0em;
padding: 1em;
}
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>5/02/2009<strong> – Episode: </strong>Intro
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/INTRO.mp3" title="Episode Intro: About SpecialNeeds Lifestyles">
Play</a>
<br />
<strong>Description: </strong>About SpecialNeeds Lifestyles</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>3/15/2012<strong> – Episode: </strong>098
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0107.mp3" title="Episode 098: Hospice. Guest: Susan Howard (Carondelet Hospice) and Corinne Spalding">
Play</a>
<br />
<strong>Description: </strong>Hospice. Guest: Susan Howard (Carondelet Hospice) and Corinne Spalding</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>2/19/2012<strong> – Episode: </strong>097
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0106.mp3" title="Episode 097: Handi-Dogs. Guest:Veronica">
Play</a>
<br />
<strong>Description: </strong>Handi-Dogs. Guest:Veronica</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>2/12/2012<strong> – Episode: </strong>096
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0105.mp3" title="Episode 096: Guest: Mary Mallone">
Play</a>
<br />
<strong>Description: </strong>Guest: Mary Mallone</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>2/05/2012<strong> – Episode: </strong>095
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0104.mp3" title="Episode 095: Mastering a Healthy Self Image. Guest: Darrel Knock">
Play</a>
<br />
<strong>Description: </strong>Mastering a Healthy Self Image. Guest: Darrel Knock</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>1/22/2012<strong> – Episode: </strong>094
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0103.mp3" title="Episode 094: The Special Needs Store. Guest: Kelly Savage">
Play</a>
<br />
<strong>Description: </strong>The Special Needs Store. Guest: Kelly Savage</p>
</div>
<div class="RadioEpisodeItemContainer">
<p class="RadioEpisodeItem">
<strong>Date: </strong>1/15/2012<strong> – Episode: </strong>093
<br />
<a href="#" class="mp3_track" data-location="../Radio_Show_Files/Show0102.mp3" title="Episode 093: Music therapy for people with autism. Guest: Jackie Burger">
Play</a>
<br />
<strong>Description: </strong>Music therapy for people with autism. Guest: Jackie Burger
</p>
</div>
|
2024-07-12T01:26:36.242652
|
https://example.com/article/4758
|
Roadwork slows traffic
WEST BURBANK — Residents should expect delays until early August as crews tear up a roughly one-mile section of Buena Vista Street, city officials warned this week.
The construction, stretching from Jeffries Avenue to the alley south of San Fernando Boulevard, is in the final phase of the $824,000 project. The money — $600,000 from city redevelopment funds, the rest from state gasoline-tax revenue — was allocated to repair what is considered among the worst roads in Burbank.
Advertisement
Buena Vista Street and Empire Avenue, where resurfacing began Monday, were both rated “very poor” during a citywide survey of roads in 2005.
“Continuing to improve infrastructure, transportation and traffic flows are part of the City Council’s top goals for this year,” city spokesman Keith Sterling said.
Advertisement
The construction on the four blocks of Empire Avenue stretching from Naomi Street to Lincoln Street is funded by an outside developer.
Although north and south traffic will remain open with at least one lane each way on Buena Vista Street, cross streets and local access for residents will be most affected, said city engineer Sean Corrigan.
Most of the Buena Vista Street paving will be completed Saturday. East and westbound lanes on Empire Avenue will remain open during that time, officials said.
The final paving on Empire Avenue is scheduled to occur at night through the end of next week, with all signal work and striping planned for for both streets in early August.
Advertisement
Signs will announce delays and detours and all east-west cross streets will be closed except for local residential access for the duration of the paving process.
The city has similar construction plans for the southern part of Buena Vista Street closer to Alameda Avenue and Providence St. Joseph Hospital.
The City Council will vote Tuesday evening to approve contract bids for continued improvement. There are also plans to carry the refurbishment of Buena Vista Street to San Fernando Boulevard and Winona Avenue.
Walt Disney Co. CEO Bob Iger has left Apple’s board of directors, the company revealed in documents filed with the U.S. Securities and Exchange Commission on Friday. Iger’s departure comes as Disney and Apple are preparing to launch their subscription video streaming services later this year.
|
2024-07-22T01:26:36.242652
|
https://example.com/article/1538
|
Contents show]
Technology & Combat Characteristics
Theis a variant of the MSN-001X Gundam Delta Kai from. It's piloted by Ing Ryude
The Land Combat Type Gundam Delta Kai is a heavily modified MSN-001X Gundam Delta Kai stationed on Area X in Mariana Base on Earth. The suit's shoulders, knees and feet are changed to be more suitable for combat under gravity. The legs are installed with new hover units, while the suit's head also became more Gundam-like. It retains the n_i_t_r_o System, but some of its weapons are changed; both the Long Mega Buster and Proto Fin Funnels are removed, instead the suit uses the same beam rifle with railgun as the MSK-100S Land Combat Hyaku Shiki Kai. The suit's new paint scheme of white and blue colors make it reminiscent of the RX-79(G)Ez-8 Gundam Ez8.
Armaments
Vulcan Gun The 60mm vulcan gun has been a standard armament of Federation suits since the One Year War. While not very powerful and typically unable to penetrate mobile suit armor, the vulcan gun is useful in intercepting missiles/rockets, destroying mobile suit sensors, and engaging lightly-armored targets such as tanks and small aircraft.
Beam Rifle
Railgun
Beam Saber The Delta Gundam Kai's close combat armaments, they are stored in the shield. It is able to melt through most armor and destroy most mobile suits in one strike. They can be used as beam cannons while mounted in the shield.
Shield It doubles as the unit's forward section in waverider mode. It stores the Gundam's beam sabers and can mount a variety of weapons.
Burst Bolt Optional close-combat weapon that can be mounted on the front side of the shield. It produces a disruptive effect through a combination of explosive force and high voltage power using a built-in capacitor. A similar weapon is used by the FA-00100S Full Armor Hyaku Shiki Kai.
Mega Machine Cannon Optional weapon that can be mounted on the front side of the shield. Developed by SNRI, it fires heavy-caliber armor-piercing rounds. The D-50C Loto has access to this weapon.
High Mega Cannon Optional weapon that can be mounted on the front side of the shield. Developed with data obtained from the ΖΖ Gundam, its output has been reduced to about 46%,[1] resulting in an output of 23 MW.
System Features
"n_i_t_r_o System The newtype injection trace reformed oldtype System, it forcibly enhances a normal pilot into a Cyber Newtype temporarily, and causes the mobile suit to emit blue flames during the process. It improves the response time, and allows the use of complicated fire control system as well as remote weaponry such as Gundam Delta Kai's Fin Funnels. However, the process of forcibly turning the pilot into a Cyber Newtype involve "rewriting" the brain, and this causes the pilot's personality to become unusually aggressive and unstable.
History
After the Delta Kai was transferred to the Mariana Base on Earth, the unit was given a major overhaul to work under Earth Gravity, being refitted into the Land Combat Type Gundam Delta Kai. This unit is assigned to Federation Pilot Ing Ryude and was used in an operation to take out the remaining Zeon Remnants in Pagan Island.
Variants
Picture Gallery
References
↑ HGUC Gundam Delta Kai model kit assembly instruction
Notes
|
2023-09-11T01:26:36.242652
|
https://example.com/article/1591
|
Sub-clinical Vitamin Deficiencies: Alive and Well in the USA!
Many nutritionists and professional health practitioners believe that you can get all of the nutrients your body needs from a “well-balanced diet,” and on the surface, this makes perfect sense. But the key words here are “on the surface.” The problem with this statement is that the nutritional content of fruits and vegetables has severely decreased in just the past fifty years as a result of:
polluted conditions of our air and water
over-farmed soil
pesticides
irradiation
waxes
dyes
and the unnecessary chemicals added to food
Moreover, even if our produce was as vitamin-rich as it should be, how many people actually eat seven to twelve servings of fruits and vegetables daily?
The icing on the cake is that our lifestyle causes further nutritional deficiencies. We live in a fast-paced, stress-filled society full of economic worries, health care concerns, peer pressure, family issues, and of course the ever-increasing technological demands, fashion conformity, and minimal time allowed for relaxation.
Whew…just thinking about that is exhausting!
So What Can We Do?
Organic foods are an option. But even organic won’t provide the high nutrition we seek. Although organic foods are not subjected to poisonous chemicals, they come from the nutritionally depleted soil.
Those against organic food always point to contaminations of salmonella or even E. coli. Without a doubt, these are nasty bugs if you happen to ingest them. But one major component has been left out, and that is food safety practices within our own homes.
Just because the vegetable is “organic” doesn’t mean you have a green light to consume it without properly cleaning it. Nor should you eat raw meats. Now if a product gets contaminated at a packing plant we have an entirely different situation, organic or conventional as there have been “outbreaks” of contamination in both arenas.
Despite conventional food advocates who claim that organic food is no better than conventional, when you eat organic, at the very least, your body doesn’t have to compensate for the added chemicals that are so prominent in conventionally grown products. And this begs the question, how could a product that is laced with toxic chemicals possibly be equal in nutritional content or as safe as a product without the added toxic chemicals?
Not Convinced? Here Is A Challenge For You
If you are one who believes organic is nothing more than a scam, think about the following scenario:
You and I sit down to have a bowl of fruit together. I pay the extra cost for my organic fruit, and you have your non-organic bowl of fruit, but with a little twist.
Instead of your non-organic bowl of fruit with the pesticides and chemicals already added (compliments of the USDA and FDA—and free of charge!), your fruit will be as natural as mine.
However, next to your fruit bowl will be a tincture.
This tincture is free and represents the fact that your fruit is a product of gross mass production and for this reason is cheaper than mine. In the tincture are all the pesticide residues and toxic chemicals that would have been present within, and on, your fruit in the first place.
This is especially true with grapes, strawberries, apples, and plums.
Now, here we sit with our bowls of fruit in front of us. And as it stands at the moment, they are virtually equal—clean and chemical/pesticide free.
But here is the challenge. Before we dig into our beautiful and delicious bowls of fresh fruit, you must first pour all the contents in that tincture (pesticides and chemicals) all over your fruit…come on…all of it now!
Okay, ready? Let’s eat!!
What? You hesitate?
Why no hesitation when you aren’t pouring the poison yourself—when you eat conventional fruit picked fresh from chemical-ridden fields?
Bottom line: It’s up to you if you choose to pour that poison on your food, or to eat foods that conveniently add it for you (IE. conventional produce).
is a board-certified Chiropractic Physician and Life Coach who also holds a Bachelor of Science degree in Human Biology, and a minor in Medical Research. She is a life-long athlete who after curing herself 100% naturally from MS and anxiety, became an avid nutrition health researcher/promoter.
She has been featured in many Health magazines and has been a guest on radio talk shows in the USA, Canada, United Kingdom, and Australia. She is the author of Health Freedom Revolution: Exposing the Lies, Deceit and Greed of the Medical Profession, Founder of Online Holistic Health, and a contributing writer for other popular informative health website/blogs.
She is the host of Holistic Health Radio – where she discusses how she recovered her health as well as other hot health topics, and she is also co-founder of Crazy Meets Common Sense! – The Podcast that Makes Sense Out of the Crazy, to Help You Live a More Healthy, Fulfilling and Empowering Life!
|
2024-02-04T01:26:36.242652
|
https://example.com/article/7974
|
<?xml version="1.0" encoding="Windows-1252"?>
<VisualStudioProject
ProjectType="Visual C++"
Version="8.00"
Name="NetConfig"
ProjectGUID="{9EF32186-303E-456A-B461-AAD810CCD40C}"
Keyword="Win32Proj"
>
<Platforms>
<Platform
Name="Pocket PC 2003 (ARMV4)"
/>
<Platform
Name="Smartphone 2003 (ARMV4)"
/>
<Platform
Name="Windows Mobile 5.0 Pocket PC SDK (ARMV4I)"
/>
<Platform
Name="Windows Mobile 5.0 Smartphone SDK (ARMV4I)"
/>
</Platforms>
<ToolFiles>
</ToolFiles>
<Configurations>
<Configuration
Name="Debug|Pocket PC 2003 (ARMV4)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="0"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;DEBUG;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
MinimalRebuild="true"
RuntimeLibrary="1"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,4.20 /machine:ARM /ARMPADCODE"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="2"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Debug|Smartphone 2003 (ARMV4)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="0"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;DEBUG;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
MinimalRebuild="true"
RuntimeLibrary="1"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,4.20 /machine:ARM /ARMPADCODE"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="2"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Debug|Windows Mobile 5.0 Pocket PC SDK (ARMV4I)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="0"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;DEBUG;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
MinimalRebuild="true"
RuntimeLibrary="1"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,5.01"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="2"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Debug|Windows Mobile 5.0 Smartphone SDK (ARMV4I)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="0"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;DEBUG;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
MinimalRebuild="true"
RuntimeLibrary="1"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="_DEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,5.01"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="2"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Release|Pocket PC 2003 (ARMV4)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="2"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
RuntimeLibrary="0"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,4.20 /machine:ARM /ARMPADCODE"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="1"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
OptimizeReferences="2"
EnableCOMDATFolding="2"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Release|Smartphone 2003 (ARMV4)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="2"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
RuntimeLibrary="0"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,4.20 /machine:ARM /ARMPADCODE"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="1"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
OptimizeReferences="2"
EnableCOMDATFolding="2"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Release|Windows Mobile 5.0 Pocket PC SDK (ARMV4I)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="2"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
RuntimeLibrary="0"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,5.01"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="1"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
OptimizeReferences="2"
EnableCOMDATFolding="2"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
<Configuration
Name="Release|Windows Mobile 5.0 Smartphone SDK (ARMV4I)"
OutputDirectory="$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
ExecutionBucket="7"
Optimization="2"
AdditionalIncludeDirectories="..\..\..\..\Source\Core"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES);WINCE;_CONSOLE;$(ARCHFAM);$(_ARCHFAM_);_UNICODE;UNICODE"
RuntimeLibrary="0"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
PreprocessorDefinitions="NDEBUG;_WIN32_WCE=$(CEVER);UNDER_CE;$(PLATFORMDEFINES)"
Culture="1033"
AdditionalIncludeDirectories="$(IntDir)"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
AdditionalOptions=" /subsystem:windowsce,5.01"
AdditionalDependencies="ws2.lib iphlpapi.lib"
OutputFile="$(OutDir)/NetConfig.exe"
LinkIncremental="1"
DelayLoadDLLs="$(NOINHERIT)"
GenerateDebugInformation="true"
ProgramDatabaseFile="$(OutDir)/NetConfig.pdb"
SubSystem="0"
StackReserveSize="65536"
StackCommitSize="4096"
OptimizeReferences="2"
EnableCOMDATFolding="2"
EntryPointSymbol="mainWCRTStartup"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCCodeSignTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
<DeploymentTool
ForceDirty="-1"
RemoteDirectory=""
RegisterOutput="0"
AdditionalFiles=""
/>
<DebuggerTool
/>
</Configuration>
</Configurations>
<References>
</References>
<Files>
<Filter
Name="Source Files"
Filter="cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx"
UniqueIdentifier="{4FC737F1-C7A5-4376-A066-2A32D752A2FF}"
>
<File
RelativePath="..\..\..\..\Source\Apps\NetConfig\NetConfig.cpp"
>
</File>
<File
RelativePath="..\..\..\..\Source\System\WinCE\NptWinceMain.cpp"
>
</File>
</Filter>
<Filter
Name="Header Files"
Filter="h;hpp;hxx;hm;inl;inc;xsd"
UniqueIdentifier="{93995380-89BD-4b04-88EB-625FBE52EBFB}"
>
</Filter>
<Filter
Name="Resource Files"
Filter="rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav"
UniqueIdentifier="{67DA6AB6-F800-4c08-8B7A-83BB121AAD01}"
>
</Filter>
</Files>
<Globals>
</Globals>
</VisualStudioProject>
|
2024-04-17T01:26:36.242652
|
https://example.com/article/8114
|
Preliminary results were presented as oral communication and abstract at the 28th European ESVN‐ECVN Congress on September 18.‐19., 2015, in Amsterdam, the Netherlands.
AED
: anti‐epileptic drugs
CSF
: cerebrospinal fluid
CT
: computed tomography
FLAIR
: fluid‐attenuated inversion recovery
GRE
: gradient recall echo
MC
: meningocele
MEC
: meningoencephalocele
MRI
: magnetic resonance imaging
T2w
: T2‐weighted sequence
TNCC
: total nucleated cell count
Malformations of the skull include incomplete closure of the calvaria. This opening of the cranium, termed cranioschisis, is a potential gap in the skull through which tissue can protrude. A meningoencephalocele (MEC) is a protrusion of cerebral tissue and meninges through a cranial defect, whereas a meningocele (MC) is a herniation of the meninges only.[1](#jvim14638-bib-0001){ref-type="ref"} The prevalence of cranial MC and MEC in dogs currently is unknown, and there are only 4 case reports described. The reported dogs had different etiologies (likely congenital and acquired after skull fracture), different ages at presentation (neonatal to 6 years old), different localizations of the MC or MEC (1 parietal, 3 intranasal), and variability in the severity of clinical signs and outcomes.[2](#jvim14638-bib-0002){ref-type="ref"}, [3](#jvim14638-bib-0003){ref-type="ref"}, [4](#jvim14638-bib-0004){ref-type="ref"}, [5](#jvim14638-bib-0005){ref-type="ref"}
In human medicine, the prevalence of congenital MEC is approximately 1/40,000 births.[6](#jvim14638-bib-0006){ref-type="ref"} Severe MECs are diagnosed prenatally or at birth, whereas discrete MECs may only cause clinical signs at an adult age. They are classified according to the anatomic localization of the skull defect.[7](#jvim14638-bib-0007){ref-type="ref"} Fronto‐ethmoidal MECs protruding into the nasal cavity are named intranasal MECs. Many patients with intranasal MEC present without any neurologic signs, and only with signs of nasal obstruction or rhinorrhea.[8](#jvim14638-bib-0008){ref-type="ref"} If neurologic deficits are observed, they mostly consist of seizures.[9](#jvim14638-bib-0009){ref-type="ref"} The imperative for surgical treatment is strong in all patients.[10](#jvim14638-bib-0010){ref-type="ref"} Outcome is largely dependent on the localization of the skull defect and the content of the herniated sac (infants with a large sac have a worse outcome).[11](#jvim14638-bib-0011){ref-type="ref"}
The aim of our study was to expand the current knowledge of MECs and MCs by reporting the clinical presentation, imaging features, treatment, and outcome of a large case series of canine cases. We hypothesized that, although a MEC may be an epileptic focus, dogs with mild‐to‐moderate neurologic signs may respond to medical management alone.
Material and Methods {#jvim14638-sec-0008}
====================
Study Design {#jvim14638-sec-0009}
------------
The clinical records of dogs presented to several neurology referral centers between 2006 and 2016 and diagnosed with cranial MC or MEC were retrospectively analyzed. Ethical approval was granted from the University of Glasgow for this study (Ref 31a/15).
Inclusion criteria included complete neurologic examination, diagnosis of cranial MC or MEC, MRI of the brain, and sufficient clinical information available for review.
The following information was recorded for each case: signalment, presenting complaint, duration of clinical signs, seizure type if applicable, and findings on physical and complete neurologic examinations at presentation. Results of MRI and CSF examination also were evaluated. Treatment, outcome (duration of follow‐up period, frequency of seizures, reason for euthanasia), and necropsy results (if applicable) were recorded. Dogs were classified as responders if they experienced a ≥ 50% decrease in seizure frequency from baseline or absence of seizures,[12](#jvim14638-bib-0012){ref-type="ref"} when data were available, or as improved signs and controlled seizures, if data were insufficient to determine whether a 50% decrease in seizure frequency was achieved, but owners reported that seizure frequency was decreased and quality of life was adequate.
Magnetic resonance imaging was performed with scanners of variable field strength (0.2 T--3.0 T). Anesthetic protocols and patient positioning varied according to the neurology center. All studies included spin‐echo or turbo spin‐echo T2‐weighted sagittal and transverse views, both pre‐ and postcontrast (gadopentetate dimeglumine) spin‐echo or turbo spin‐echo T1‐weighted transverse views and T2‐weighted fluid‐attenuation inversion recovery (FLAIR) transverse views. Some of these studies included short tau inversion recovery sequences, gradient recall echo (GRE) transverse views, spin‐echo or turbo spin‐echo T2‐weighted dorsal views, pre‐ and postcontrast spin‐echo or turbo spin‐echo T1‐weighted dorsal and sagittal views and FLAIR dorsal views.
One board‐certified veterinary neurologist (RGQ), blinded to signalment and neurologic examination, retrospectively reviewed and described the MRI findings for each case. The following criteria were recorded: affected bone, protrusion of meninges alone or meninges and cerebral tissue, hyperintensity of protruded tissue on T2‐weighted images compared to normal gray matter, presence of fluid in the meningeal sac, presence of a signal void on GRE sequences in the protruding tissue (whenever sequence was available), presence of meningeal enhancement of the protruding meninges after contrast administration, presence of other intracranial MRI findings and concurrent malformations, asymmetry of nonprotruded brain tissue (characterized by cranial displacement of the lateral ventricle, distortion of the corpus callosum, or both), and presence of a unilateral or bilateral protrusion.
For the intranasal MEC, the amount of protruding tissue was subjectively classified with a 3‐point grading scale (mild, moderate, and severe) dependent on the amount of tissue protruding through the cranial defect on the basis of dorsal T2‐weighted images at the level of maximum protrusion as a consensus between 2 observers, RGQ and 1 European College of Veterinary Neurology (ECVN) residency‐trained neurologist (JG). Dorsal T1‐weighted images were used if T2‐weighted images were not available. Subjective assessment, which is likely to be the method employed in a clinical setting to determine MEC size, was compared with a quantitative measurement of MEC volume. To allow comparison among dogs of different sizes, volume ratio between protruded brain tissue and intracalvarial brain tissue was calculated. Three‐dimensional visualization of the normal brain and MEC was performed in all cases with intranasal MEC by the software Amira[1](#jvim14638-note-1002){ref-type="fn"} based on T2‐weighted transverse images (Fig. S1). Volume of MEC and brain was measured by Mud box[2](#jvim14638-note-1003){ref-type="fn"} based on the 3‐dimensional reconstruction. Observers were blinded to the clinical status.
The data were not normally distributed; therefore, descriptive statistics using median and range were employed. The nonparametric Kruskal‐Wallis test was used to compare the volume ratio between MEC and intracalvarial brain tissue in the 3 groups determined by subjective assessment (mild, moderate, and severe). Mann‐Whitney U‐test was used as posthoc analysis to determine differences between each group, by the statistical software SPSS[3](#jvim14638-note-1004){ref-type="fn"}.
Results {#jvim14638-sec-0010}
=======
Clinical Features {#jvim14638-sec-0011}
-----------------
Twenty‐two dogs diagnosed with cranial MC or MEC at 13 institutions met the inclusion criteria. The age at time of diagnosis varied from 1 month to 8 years (median, 6.5 months). The following breeds were represented: Jack Russell Terrier (3), Border Collie (2), Labrador Retriever (2), Chihuahua (1), Weimaraner (1), Toy Poodle (1), Malinois (1), Cocker Spaniel (1), Boxer (1), Pointer (1), Cavalier King Charles Spaniel (1), English Springer Spaniel (1), Welsh sheepdog (1), miniature Dachshund (1), and crossbreed dogs (4). Eleven of the dogs were male (4 neutered), and 11 were female (2 spayed).
The most common presenting clinical signs were epileptic seizures (n = 17, 77%) and abnormal behavior (n = 7, 31%). Median duration of clinical signs before presentation was 30 days (range, 12 hours -- 1 year). In 1 dog (case 10), the meningoencephalocele was considered an incidental diagnostic imaging finding. The signalment and clinical signs of the patients are described in Table S1.
Information regarding seizure characteristics was available in 16 of 17 cases. Only generalized seizures were present in 10 dogs (63%), 1 dog experienced focal seizures (6%), and 5 dogs (31%) had both focal and generalized seizures. Abnormal behavior was seen in 7 dogs (30%) and included aggressiveness (2), compulsive behavior (4), hyperactivity (2), intermittent yelping (2), and star‐gazing or fly‐catching behavior (1).
Physical examination was normal in 17 dogs (77%). Two dogs had an open fontanel, 1 dog had a dome‐shaped head, 1 dog had a facial deformity and right nasolacrimal duct obstruction secondary to a dog bite, and 1 dog had nasal discharge (suspected CSF rhinorrhea). Another dog developed suspected CSF rhinorrhea after diagnosis. Neurologic examination was abnormal in 16 of 22 dogs (73%). One dog had a concurrent neurologic disease (lymphoma). Abnormalities in the neurologic examination in dogs without concurrent disease (n = 15) consisted of decreased mentation (n = 2, 13%), circling (n = 5, 33%), vestibular ataxia (n = 1, 7%; parietal meningocele), cerebellar ataxia (n = 1, 7%; frontal and parietal meningocele), proprioceptive deficits (lateralized \[n = 9, 60%\], bilateral symmetric \[n = 2, 13%\]), absent or decreased menace response (unilateral \[n = 5, 33%\], bilateral \[n = 4, 27%\]), unilateral decreased nasal sensation (n = 3, 20%), strabismus (n = 2, 14%), intermittent positional nystagmus (n = 1, 7%; parietal meningocele), and hyperesthesia of the head (n = 2, 13%) and cervical spine (n = 1, 7%; parietal meningocele). Abnormal neurologic examination findings are described in Tables S2a and S2b.
In dogs with abnormal neurologic examination findings (73%), the neuro‐anatomic localization was to the forebrain (bilateral in 3 cases \[19%\], lateralized in 9 cases \[56%\]), and to the cerebellum in 1 case (frontal and parietal meningocele). Multifocal signs were seen in 2 dogs (13%; 1 with concurrent lymphoma and 1 with syringomyelia), and in 1, the lesion was localized to caudal cervical region (diagnosed with a presumably unrelated cervical lesion consistent with focal myositis or neuritis).
Magnetic Resonance Imaging Findings {#jvim14638-sec-0012}
-----------------------------------
Seventeen dogs were diagnosed with an intranasal MEC (73%; Fig [1](#jvim14638-fig-0001){ref-type="fig"}). The ethmoidal bone was affected in 15 dogs (68%). The frontal bone was affected in 2 dogs. The parietal bone was affected in 6 of 22 dogs (27%). One dog had a concurrent frontal MEC and parietal MC (Fig [2](#jvim14638-fig-0002){ref-type="fig"}). One dog was diagnosed with a frontal MEC, which did not protrude into the sinus but laterally under the temporal muscle (Fig [3](#jvim14638-fig-0003){ref-type="fig"}).
{#jvim14638-fig-0001}
{#jvim14638-fig-0002}
{#jvim14638-fig-0003}
In all dogs in which the ethmoidal bone and frontal bone were affected, neuronal tissue protruded through the bone defect. Meninges alone appeared to protrude through parietal bone defects. The protruding brain tissue was hyperintense on T2w sequences in 14 of 17 cases, with presence of fluid (isointense compared to CSF signal) in the meningeal sac in 6 of 17 dogs, and evidence of hemorrhage in 6 of 13 dogs (GRE sequences performed in 13 dogs). After IV administration of gadopentetate dimeglumine, meningeal enhancement of the protruding tissue was seen in 17 of 22 dogs on T1w images. Concurrent malformations were seen in 3 of 17 dogs with intranasal lesions. Two dogs had severe ethmoidal MECs with most likely compensatory hydrocephalus ex vacuo. Concurrent malformations were seen in all dogs with parietal meningocele (porencephaly in 4 dogs, supracollicular fluid accumulation in 1 dog). In the dog with frontal MEC and parietal MC, several concurrent malformations were detected: hydrocephalus ex vacuo, possible cerebellar hypoplasia, dilatation of the olfactory recess, and porencephaly. The MEC or cranial MC was unilateral in 19 of 22 dogs. The remaining brain tissue showed asymmetry in 12 of 22 dogs. The MRI findings are summarized in Table S3.
Subjective assessment of intranasal MEC size was performed in 16 dogs (dog 22 was excluded based on concurrent parietal MC). The MEC was considered mild in 4 dogs, moderate in 7 dogs, and severe in 5 dogs. Overall, the calculated volume ratio between MEC and intracalvarial brain was significantly different in the 3 groups identified by subjective assessment of the amount of protruded tissue (mild, moderate, and severe; *P* = .009). Individual comparison among groups identified a significant difference between the groups moderate and severe (*P* = .028) and the groups mild and severe (*P* = .014). The difference between the groups mild and moderate was not statistically significant (*P* = .059; Fig S2).
Results of CSF Analysis {#jvim14638-sec-0013}
-----------------------
Cerebrospinal fluid analysis was performed in 11 dogs. It was normal in 6 dogs (55%) and identified abnormalities in 5 dogs (45%). One dog was diagnosed with a concurrent condition (case 10, lymphoma). The CSF analysis disclosed mild changes in 4 samples (increased eosinophil count in 1 dog, mixed pleocytosis in 2 dogs, mildly increased protein concentration in 1 dog). All dogs with abnormal CSF and without concurrent disease had intranasal MECs. Results of CSF analysis are summarized in Table S4.
Outcome {#jvim14638-sec-0014}
-------
Eleven dogs were alive (50%), and 9 dogs were dead (41%) at the time of writing. The outcome is unknown in 2 cases. Four dogs were euthanized shortly after diagnosis because of the severity of their clinical signs (18%). One dog with parietal MC did not receive any medication (alive at the last follow‐up 8 weeks after diagnosis). Medical treatment was started in 17 dogs. Treatment consisted of anti‐epileptic medication in 13 of 17 dogs (phenobarbital \[n = 11\], imepitoin \[n = 3\], levetiracetam \[n = 4\], potassium bromide \[n = 2\], combination of 2 anti‐epileptic drugs (AED) or more \[n = 5\]). Seven dogs were treated with a course of prednisolone (variable anti‐inflammatory doses, tapered over a few weeks). Three dogs with inflammatory CSF findings were treated with a course of antibiotics (amoxicillin‐clavulanic acid, metronidazole).
The follow‐up period ranged from 2 months to 4 years, with a median of 365 days. In 11 dogs, the seizures were controlled by anti‐epileptic treatment at the last follow‐up. Five dogs were considered responders (2 dogs are seizure‐free, 3 dogs had a seizure reduction of ≥50%), and in 6 dogs, an improvement of seizure frequency was noted but follow‐up data did not specify whether seizure frequency was decreased by ≥50%. In 3 dogs, seizures were initially controlled by AED for a duration of 1 and 4 years (unknown duration in 1 dog), but they were euthanized at a later stage because of uncontrolled seizures.
All 4 dogs in which the intranasal MEC was classified as mild with MRI were alive at final follow‐up (follow‐up period, 548 days -- 1095 days; median, 730 days). In 7 dogs, the MECs were considered moderate. Three of these dogs were euthanized (1 immediately after diagnosis, 2 at a later stage because of uncontrolled seizures), and 4 were still alive at the last follow‐up. The MECs were considered severe in 5 dogs, 4 of which were euthanized (3 shortly after diagnosis, 1 was euthanized 1 year after diagnosis because of uncontrolled seizures). Treatment and outcome of all dogs are summarized in Tables S5a and S5b and in Figure S7.
Gross and Histopathologic Findings {#jvim14638-sec-0015}
----------------------------------
Necropsy was performed on 2 dogs. One dog (dog 1) was euthanized shortly after diagnosis. One dog (dog 6) was treated medically for 4 years and euthanized at 12 years of age because of recurrent seizures.
In both cases, the olfactory lobe protruded into the nasal cavity through a closure defect in the cribriform plate. The herniated olfactory lobe was composed of necrotic neuronal tissue overlaid by a thick (approximately 1 mm) layer of mature collagenous connective tissue (fibrosed dura), which in turn was covered by a single layer of respiratory epithelium. Occasionally expanding the dura were deposits of mineral (dystrophic mineralization) and the dura blended with firm adherence to the remaining cribriform plate (dog 6). There was a distinct, approximately 1 cm, gap between the herniated olfactory lobe and the dorsal nasal conchae (dog 6). Infiltrating the neuropil of the olfactory lobe were frequent oligodendrocytes and astrocytes (gliosis) and proliferations of immature fibrovascular connective tissue (neovascularization). Frequent pools of hemorrhage were present throughout (Fig [4](#jvim14638-fig-0004){ref-type="fig"}).
{#jvim14638-fig-0004}
The right frontal lobe adjacent to the protruded olfactory lobe was chronically inflamed and edematous, and in dog 6, these changes caused compression of the left frontal lobe and a pronounced midline shift. Underlying both lateral ventricles were small irregular proliferations of fibrovascular connective tissue (neovascularization).
Discussion {#jvim14638-sec-0016}
==========
We describe 22 dogs with cranial MC, MEC, or both, a rare condition with variable outcome. An MEC typically forms as a result of a congenital defect during the closure of the neural tube but can also arise after trauma.[4](#jvim14638-bib-0004){ref-type="ref"} In human medicine, MECs developing as a result of chronically increased intracranial pressure[13](#jvim14638-bib-0013){ref-type="ref"} or postsurgery[14](#jvim14638-bib-0014){ref-type="ref"} have been described. Congenital MCs and MECs have been reported in humans and various domestic animals.[15](#jvim14638-bib-0015){ref-type="ref"}, [16](#jvim14638-bib-0016){ref-type="ref"} A hereditary predisposition has been shown in Burmese cats,[16](#jvim14638-bib-0016){ref-type="ref"} but teratogenic factors and nutritional deficiencies may play a role in the development of such malformations.[17](#jvim14638-bib-0017){ref-type="ref"}, [18](#jvim14638-bib-0018){ref-type="ref"} Based on the small number of cases collected throughout Europe in this study, it appears to be a sporadically occurring disease, that might be underdiagnosed because diagnosis requires advanced imaging and some dogs may not have any neurologic signs, as occurred in the dog diagnosed with lymphoma and an incidental MEC. Early head trauma could be a predisposing factor, as occurred in at least 1 of the cases.
The MECs are classified according to the anatomic localization of the skull defect.[7](#jvim14638-bib-0007){ref-type="ref"} In the human literature, the term encephalocele defines a cephalic hernia through a skull defect and includes both MEC and MC.[19](#jvim14638-bib-0019){ref-type="ref"} The occipital region is the most common site of protrusion in humans in Western regions,[20](#jvim14638-bib-0020){ref-type="ref"} whereas, for unknown reasons, fronto‐ethmoidal encephaloceles are more common in South‐East Asia (1 : 5,000 live births[21](#jvim14638-bib-0021){ref-type="ref"}). Most of the cases presented here were ethmoidal (15 of 22, 68%) and intranasal (16 of 22, 73%). This finding does not necessarily reflect the occurrence within the canine population and may be explained by the fact that puppies with severely debilitating diseases and obvious malformations are likely to be euthanized at an early age. In humans, the localization of the encephalocele has an important impact on the prognosis for the patient,[22](#jvim14638-bib-0022){ref-type="ref"} caudally located lesions being associated with worse neurologic signs and outcomes than rostrally located lesions.[19](#jvim14638-bib-0019){ref-type="ref"}
The protruded parenchyma was heterogeneously hyperintense on T2w and FLAIR images in 14 dogs. These findings could be consistent with gliosis of cerebral tissue, tissue inflammation, or edema. In 2 dogs, histology of the protruded brain tissue indicated that this tissue exhibited a paucity of neurons, multifocal new vessel formation, and malacia. This observation correlates with the results described in previous case reports that identified gliosis and areas of malacia.[3](#jvim14638-bib-0003){ref-type="ref"} In humans, gliosis of the protruded tissue is a common finding.[23](#jvim14638-bib-0023){ref-type="ref"} In some cases, histopathology of the MEC in humans showed fibrosis and chronic inflammation.[24](#jvim14638-bib-0024){ref-type="ref"}, [25](#jvim14638-bib-0025){ref-type="ref"}
Magnetic resonance imaging indicated that the protruded meninges were associated with contrast enhancement on T1w postcontrast images in 17 of 22 cases. This finding could be consistent with focal meningitis or low CSF pressure. Cerebrospinal fluid analysis was performed in 12 dogs, and abnormal CSF findings did not correlate with meningeal enhancement on MRI. In 10 dogs with meningeal enhancement, CSF was normal in 6 dogs and showed abnormalities in 4 dogs. In 1 dog, histologic examination of the herniated tissue indicated chronic meningitis, but meningeal enhancement of the protruded tissue was not detected on MRI. Magnetic resonance imaging had low sensitivity for diagnosis of meningeal pathology in dogs when compared to histologic findings.[26](#jvim14638-bib-0026){ref-type="ref"} In 1 study, meningeal enhancement was identified in only 28% of 25 dogs with inflammatory CSF.[27](#jvim14638-bib-0027){ref-type="ref"} In human medicine, meningeal enhancement of pachymeninges on MRI, as well as venous sinus engorgement and subdural effusions, has been associated with intracranial hypotension.[28](#jvim14638-bib-0028){ref-type="ref"}, [29](#jvim14638-bib-0029){ref-type="ref"} The same pathological processes could explain the meningeal enhancement in the patients presented here, because the brain is no longer contained within an intact cranial vault, which may impair CSF and intracranial volume homeostasis (Monro‐Kellie doctrine) in patients with cranial MC or MEC.
Seizures were the main presenting neurologic sign in most of the dogs with intranasal lesions. All dogs with focal seizures had unilateral intranasal MECs. However, 8 dogs with unilateral intranasal MECs were reported to only display generalized seizures. Only 1 dog with parietal MC presented with seizures. This observation reflects the neuro‐anatomic localization of the lesion, but seizure characteristics do not seem to be a reliable indicator of the localization of the defect. In humans, MECs are considered epileptic foci.[30](#jvim14638-bib-0030){ref-type="ref"} This theory is supported by the fact that surgical repair of MECs generally results in elimination of seizures.[5](#jvim14638-bib-0005){ref-type="ref"}, [30](#jvim14638-bib-0030){ref-type="ref"}, [31](#jvim14638-bib-0031){ref-type="ref"} Several hypotheses have been formulated regarding the pathophysiology of seizures in encephalocele patients, including irritative traction or herniation of involved cortex or hemorrhage, malacia, degeneration white matter, and inflammatory cell infiltrates contributing to abnormal excitability of cortical neurons.[3](#jvim14638-bib-0003){ref-type="ref"} Magnetic resonance imaging and histopathology results in this study confirmed that the herniated tissue shows signs of inflammation and hemorrhage.
Six dogs with intranasal MECs had normal neurologic examination findings. Because even dogs with severe malformation may not show any deficits in neurologic examination, MEC must be considered a differential diagnosis for young dogs presenting with seizures and unremarkable interictal neurologic examination.
Seven dogs had asymmetrical neurologic deficits. The MRI images of 6 of these dogs showed asymmetry of the intracalvarial part of the cerebrum, which was confirmed histopathologically in dog 6. This phenomenon has been described in humans with MEC.[32](#jvim14638-bib-0032){ref-type="ref"} In addition to mechanical traction by the herniated tissue and decreased blood supply to specific areas,[33](#jvim14638-bib-0033){ref-type="ref"} CSF flow obstruction seems to play a role in the pathogenesis of secondary malformations.[32](#jvim14638-bib-0032){ref-type="ref"}
In humans, the most common concurrent malformations found on MRI in patients with MEC were hydrocephalus (15%) and corpus callosum agenesis (7%),[34](#jvim14638-bib-0034){ref-type="ref"} with a direct relationship between the number of intracranial abnormalities and the amount of herniated brain.[32](#jvim14638-bib-0032){ref-type="ref"} Agenesis of the corpus callosum has been described in a cat with midline parietal MEC[35](#jvim14638-bib-0035){ref-type="ref"} but not in any of the dogs presented here. Interestingly, in this study, porencephaly was seen in all dogs with parietal MEC. The clinical and MRI characteristics of porencephaly have been described previously in dogs, some of which had evidence of parietal MC.[36](#jvim14638-bib-0036){ref-type="ref"}, [37](#jvim14638-bib-0037){ref-type="ref"} Additional studies are necessary to determine whether a causal relationship exists between these conditions.
In human medicine, surgical intervention is the treatment of choice, based on the potential for recurrent meningitis, brain damage from herniation, and refractory seizures.[38](#jvim14638-bib-0038){ref-type="ref"} Seizures stopped after surgical intervention in 1 affected dog.[5](#jvim14638-bib-0005){ref-type="ref"} However, in our study, 10 of 17 of dogs presented with seizures responded well to medical treatment with AED. Medical management seems to be a viable treatment option for dogs with only mild neurologic signs. Additional studies examining the long‐term outcome of dogs treated medically are required to assess the risk for ascending meningitis in affected dogs. The risk for ascending infection is an important indication for surgery in humans. Therefore, this risk needs to be weighed against the invasiveness of surgical treatment individually until additional studies are available in veterinary medicine. Surgery may be considered in dogs with CSF rhinorrhea or in those with refractory seizures, although the outcome after surgery needs to be evaluated in more cases to assess its benefits.
Case series in human medicine have shown that the size and content of the protruding meningeal sac has an impact on prognosis.[11](#jvim14638-bib-0011){ref-type="ref"} At the last follow‐up, all 4 dogs subjectively categorized as mild, but only 4 of 7 dogs with moderate MEC and 1 of 5 dog with severe MEC were still alive. The size of the MEC as well as neurologic signs may have played a role in the decision‐making process about euthanasia. Subjective assessment based on MRI seems to be a reliable tool to determine MEC size, but additional studies with larger numbers of cases will be necessary to confirm this observation.
The limitations of our study are inherent in its retrospective multicenter nature. The distinction between presumed acquired and congenital MEC or MC could not be made in all cases based on historical information, because information concerning the first weeks of life was limited. The number of parietal MC was limited, and the imaging studies did not follow a specified protocol. Furthermore, treatment protocol was at the clinician\'s discretion. Follow‐up periods were variable, and follow‐up did not always include a neurologic examination. Unfortunately, prospective evaluation of an acceptable number of cases is difficult based on the rarity of this condition.
Conclusion {#jvim14638-sec-0017}
==========
Although uncommon, MEC should be considered as a differential diagnosis in young dogs presenting with seizures or alterations in behavior. Medical treatment is a valid option with a fair prognosis when the MEC is mild.
Supporting information
======================
######
**Figure S1.** Three‐dimensional reconstruction of the intracalvarial brain (purple) and intranasal meningoencephalocele (green) based on transverse, sagittal and dorsal T2‐weighted magnetic resonance imaging sequences.
######
Click here for additional data file.
######
**Figure S2**. Box‐and‐whisker plot diagram representing the subjective grading of MEC compared with ratio between MEC volume and intracalvarial brain volume in dogs with intranasal MEC.
######
Click here for additional data file.
######
**Figure S3.** Treatment and outcome in all cases.
######
Click here for additional data file.
######
**Table S1.** Overview of the signalment, presenting complaint and diagnosis for all cases of MC/MEC.
######
Click here for additional data file.
######
**Table S2a.** Neurological signs and localization of intranasal (ethmoidal and frontal) MEC after MRI.
######
Click here for additional data file.
######
**Table S2b.** Neurological signs and localization of parietal/frontal MC/MEC.
######
Click here for additional data file.
######
**Table S3.** MRI findings in dogs with meningocele and meningoencephalocele (Case 22 is mentioned twice as it had an intranasal MEC and a parietal MC).
######
Click here for additional data file.
######
**Table S4.** Results of CSF analysis in dogs with abnormal CSF examination.
######
Click here for additional data file.
######
**Table S5a.** Treatment and outcome of dogs with intranasal (ethmoidal and frontal) MEC (case 22 excluded based on the concurrent parietal MC).
######
Click here for additional data file.
######
**Table S5b.** Treatment and outcome of dogs with parietal/frontal MC/MEC and with concurrent intranasal and parietal MC/MEC.
######
Click here for additional data file.
We thank Ed Ives and Sue Fitzmaurice at Anderson Moores Veterinary Specialists, Winchester, for submitting the information of case 21 and Hazel Raffan for helping with 3D reconstruction.
*Conflict of Interest Declaration*: Authors declare no conflict of interest.
*Off‐label Antimicrobial Declaration*: Authors declare no off‐label use of antimicrobials.
Amira 5.3.3, Visage Imaging and ZIB, Germany
Mud box 2016, Autodesk Inc.
SPSS 17.0 for Windows, SPSS Inc.
|
2023-08-18T01:26:36.242652
|
https://example.com/article/7602
|
And so it begins. Wait, let me rephrase.
And so it continues.
Trending: The Case for Carlos Muniz for FL Supreme Court Justice
Democrat Congressman and now-Senate candidate Alan Grayson has taken another swipe at his colleague Rep. Patrick Murphy (D), who is also running for the Senate in 2016.
Grayson, who leads Murphy in the latest Mason-Dixon poll, and who crushes him among Progressives or Liberals, tweeted this gem:
My ‘Democratic’ Opponent is an Errand Boy for Wall Street: http://t.co/jFmqizNMrq take our poll - story continues below Will You Be Voting In Person November 3rd? Will You Be Voting In Person November 3rd?
Should the Government be Mandating Masks? * Yes No My State Is Not Allowing In Person Voting
Email *
Email This field is for validation purposes and should be left unchanged. Completing this poll grants you access to Shark Tank updates free of charge. You may opt out at anytime. You also agree to this site's Privacy Policy and Terms of Use. — Rep. Alan Grayson (@AlanGrayson) July 24, 2015
The link in the tweet is to one of Grayson’s almost-daily emails ranting about either how much he has done in the House of Representatives, or how Republicans are “bigoted tools” who wear white hoods.
In the email, Grayson goes after Murphy for “coddling Wall Street.”
My “Democratic” opponent in the Florida primary can’t make that same claim. Not so long ago, Rep. Patrick Murphy (or “Trick,” as we call him) was a Republican. But that’s not the only reason why we refer to him as a quotation-marks “Democrat.” There are some Republicans, like Ron Paul, who have stood up to Wall Street. Alas, that’s not the case with “Trick” Murphy. But you don’t have to take my word for it. Just look at his record coddling Wall Street, handing them the dice to gamble with our money, and relentlessly undermining America’s financial safety-Grayson emails
The winner of this bloody Democratic primary will face-off with the winner of the Republican Senate primary race between Rep. Ron DeSantis, Lt. Gov. Carlos Lopez-Cantera, Rep. Jeff Miller, and former Army Green Beret Todd Wilcox.
|
2023-12-10T01:26:36.242652
|
https://example.com/article/8170
|
Coronary artery disease can lead to chronic heart failure, need for revascularization (by-pass surgery), or life-threatening cardiac arrhythmias. It is the cause of one and a half million acute myocardial infarctions per year in the USA, more than half of them lethal. Its cost is the highest of all Current medical diseases in the nation. Coronary artery disease affects the blood supply of the heart muscle (myocardium) and, therefore, decreases oxygen delivery to myocardial cells. The mitochondria of cardiac myocytes is one of the major targets for ischemia- induced damage. Limitations of oxygen delivery reduces mitochondrial oxidative phosphorylation and contributes to the reduction of intracellular ATP levels. Some investigators have indicated that the inability of the mitochondria to self-repair following restoration of blood flow may be one of the crucial events leading to the ultimate death of myocardial cells. Although it is not clear if sarcolemmal or mitochondrial damage is the main event in the irreversible damage of the myocardial cell, the role of mitochondrial changes in decreased myocardial functions are not questioned. Recent studies have shown that heat shock protein (HSP) 60, which is a member of the stress protein family and are thought to have a protective role during oxidative stress, is required for the assembly of multimeric enzyme complexes within the mitochondria. We have recently found that during acute occlusion of the descending coronary artery for 30 minutes in the rat heart, which leads to ischemia in the left ventricle, there is a marked and specific increase in HSP6O mRNA level. This finding leads us to believe that HSP6O as other related HSPs may have a protective role and is probably involved in the repair of the mitochondrial enzymatic complexes vital for the normal function of the mitochondria. It is our objective to investigate this ischemia-induced change in HSP6O expression and determine if HSP60 mediates protection processes in the mitochondria that contribute to recovery from ischemic injury in the myocardial cell.
|
2023-08-08T01:26:36.242652
|
https://example.com/article/8048
|
package cn.luischen.model;
/**
* 文章关联信息表
* Created by Donghua.Chen on 2018/4/30.
*/
public class RelationShipDomain {
/**
* 文章主键编号
*/
private Integer cid;
/**
* 项目编号
*/
private Integer mid;
public Integer getCid() {
return cid;
}
public void setCid(Integer cid) {
this.cid = cid;
}
public Integer getMid() {
return mid;
}
public void setMid(Integer mid) {
this.mid = mid;
}
}
|
2023-12-12T01:26:36.242652
|
https://example.com/article/9147
|
/* F95_ZK_4523VM.java
Purpose:
Description:
History:
Fri Mar 06 11:51:43 CST 2020, Created by rudyhuang
Copyright (C) 2020 Potix Corporation. All Rights Reserved.
*/
package org.zkoss.zktest.test2;
import org.zkoss.bind.annotation.BindingParam;
import org.zkoss.bind.annotation.BindingParams;
import org.zkoss.bind.annotation.Command;
import org.zkoss.zk.ui.util.Clients;
/**
* @author rudyhuang
*/
public class F95_ZK_4523VM {
@Command
public void greeting(@BindingParam("firstName") String firstName,
@BindingParam("lastName") String lastName,
@BindingParam("age") int age) {
Clients.log(String.format("Greetings, %s %s!", firstName, lastName));
}
@Command("greeting-bean")
public void greetingBean(@BindingParams POJO person) {
Clients.log(String.format("Greetings, %s %s!", person.getFirstName(), person.getLastName()));
}
public static class POJO {
private String _firstName;
private String _lastName;
private int _age;
public String getFirstName() {
return _firstName;
}
public void setFirstName(String firstName) {
this._firstName = firstName;
}
public String getLastName() {
return _lastName;
}
public void setLastName(String lastName) {
this._lastName = lastName;
}
public int getAge() {
return _age;
}
public void setAge(int age) {
this._age = age;
}
}
}
|
2024-01-15T01:26:36.242652
|
https://example.com/article/2406
|
/* -*- mode: c; tab-width: 4; c-basic-offset: 3; c-file-style: "linux" -*- */
//
// Copyright (c) 2009, Wei Mingzhi <whistler_wmz@users.sf.net>.
// All rights reserved.
//
// This file is part of SDLPAL.
//
// SDLPAL is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
//
#ifndef UI_H
#define UI_H
#ifdef __cplusplus
extern "C"
{
#endif
#include "common.h"
#define CHUNKNUM_SPRITEUI 9
#define MENUITEM_COLOR 0x4F
#define MENUITEM_COLOR_INACTIVE 0x1C
#define MENUITEM_COLOR_CONFIRMED 0x2C
#define MENUITEM_COLOR_SELECTED_INACTIVE 0x1F
#define MENUITEM_COLOR_SELECTED_FIRST 0xF9
#define MENUITEM_COLOR_SELECTED_TOTALNUM 6
#define MENUITEM_COLOR_SELECTED \
(MENUITEM_COLOR_SELECTED_FIRST + \
SDL_GetTicks() / (600 / MENUITEM_COLOR_SELECTED_TOTALNUM) \
% MENUITEM_COLOR_SELECTED_TOTALNUM)
#define MENUITEM_COLOR_EQUIPPEDITEM 0xC8
#define DESCTEXT_COLOR 0x2E
#ifdef PAL_WIN95
#define MAINMENU_BACKGROUND_FBPNUM 2
#else
#define MAINMENU_BACKGROUND_FBPNUM 60
#endif
#define RIX_NUM_OPENINGMENU 4
#define MAINMENU_LABEL_NEWGAME 7
#define MAINMENU_LABEL_LOADGAME 8
#define LOADMENU_LABEL_SLOT_FIRST 43
#define CONFIRMMENU_LABEL_NO 19
#define CONFIRMMENU_LABEL_YES 20
#define CASH_LABEL 21
#define SWITCHMENU_LABEL_DISABLE 17
#define SWITCHMENU_LABEL_ENABLE 18
#define GAMEMENU_LABEL_STATUS 3
#define GAMEMENU_LABEL_MAGIC 4
#define GAMEMENU_LABEL_INVENTORY 5
#define GAMEMENU_LABEL_SYSTEM 6
#define SYSMENU_LABEL_SAVE 11
#define SYSMENU_LABEL_LOAD 12
#define SYSMENU_LABEL_MUSIC 13
#define SYSMENU_LABEL_SOUND 14
#define SYSMENU_LABEL_QUIT 15
#define SYSMENU_LABEL_BATTLEMODE (PAL_ADDITIONAL_WORD_FIRST)
#define BATTLESPEEDMENU_LABEL_1 (PAL_ADDITIONAL_WORD_FIRST + 1)
#define BATTLESPEEDMENU_LABEL_2 (PAL_ADDITIONAL_WORD_FIRST + 2)
#define BATTLESPEEDMENU_LABEL_3 (PAL_ADDITIONAL_WORD_FIRST + 3)
#define BATTLESPEEDMENU_LABEL_4 (PAL_ADDITIONAL_WORD_FIRST + 4)
#define BATTLESPEEDMENU_LABEL_5 (PAL_ADDITIONAL_WORD_FIRST + 5)
#define INVMENU_LABEL_USE 23
#define INVMENU_LABEL_EQUIP 22
#define STATUS_BACKGROUND_FBPNUM 0
#define STATUS_LABEL_EXP 2
#define STATUS_LABEL_LEVEL 48
#define STATUS_LABEL_HP 49
#define STATUS_LABEL_MP 50
#define STATUS_LABEL_ATTACKPOWER 51
#define STATUS_LABEL_MAGICPOWER 52
#define STATUS_LABEL_RESISTANCE 53
#define STATUS_LABEL_DEXTERITY 54
#define STATUS_LABEL_FLEERATE 55
#define STATUS_COLOR_EQUIPMENT 0xBE
#define BUYMENU_LABEL_CURRENT 35
#define SELLMENU_LABEL_PRICE 25
#define SPRITENUM_SLASH 39
#define SPRITENUM_ITEMBOX 70
#define SPRITENUM_CURSOR_YELLOW 68
#define SPRITENUM_CURSOR 69
#define SPRITENUM_PLAYERINFOBOX 18
#define SPRITENUM_PLAYERFACE_FIRST 48
#define EQUIPMENU_BACKGROUND_FBPNUM 1
#define ITEMUSEMENU_COLOR_STATLABEL 0xBB
#define BATTLEWIN_GETEXP_LABEL 30
#define BATTLEWIN_BEATENEMY_LABEL 9
#define BATTLEWIN_DOLLAR_LABEL 10
#define BATTLEWIN_LEVELUP_LABEL 32
#define BATTLEWIN_ADDMAGIC_LABEL 33
#define BATTLEWIN_LEVELUP_LABEL_COLOR 0x39
#define SPRITENUM_ARROW 47
#define BATTLE_LABEL_ESCAPEFAIL 31
typedef struct tagBOX
{
PAL_POS pos;
WORD wWidth, wHeight;
SDL_Surface *lpSavedArea;
} BOX, *LPBOX;
typedef struct tagMENUITEM
{
WORD wValue;
WORD wNumWord;
BOOL fEnabled;
PAL_POS pos;
} MENUITEM, *LPMENUITEM;
typedef struct tagOBJECTDESC
{
WORD wObjectID;
LPSTR lpDesc;
struct tagOBJECTDESC *next;
} OBJECTDESC, *LPOBJECTDESC;
typedef VOID (*LPITEMCHANGED_CALLBACK)(WORD);
#define MENUITEM_VALUE_CANCELLED 0xFFFF
typedef enum tagNUMCOLOR
{
kNumColorYellow,
kNumColorBlue,
kNumColorCyan
} NUMCOLOR;
typedef enum tagNUMALIGN
{
kNumAlignLeft,
kNumAlignMid,
kNumAlignRight
} NUMALIGN;
INT
PAL_InitUI(
VOID
);
VOID
PAL_FreeUI(
VOID
);
LPBOX
PAL_CreateBox(
PAL_POS pos,
INT nRows,
INT nColumns,
INT iStyle,
BOOL fSaveScreen
);
LPBOX
PAL_CreateSingleLineBox(
PAL_POS pos,
INT nLen,
BOOL fSaveScreen
);
VOID
PAL_DeleteBox(
LPBOX lpBox
);
WORD
PAL_ReadMenu(
LPITEMCHANGED_CALLBACK lpfnMenuItemChanged,
LPMENUITEM rgMenuItem,
INT nMenuItem,
WORD wDefaultItem,
BYTE bLabelColor
);
VOID
PAL_DrawNumber(
UINT iNum,
UINT nLength,
PAL_POS pos,
NUMCOLOR color,
NUMALIGN align
);
LPOBJECTDESC
PAL_LoadObjectDesc(
LPCSTR lpszFileName
);
VOID
PAL_FreeObjectDesc(
LPOBJECTDESC lpObjectDesc
);
LPCSTR
PAL_GetObjectDesc(
LPOBJECTDESC lpObjectDesc,
WORD wObjectID
);
extern LPSPRITE gpSpriteUI;
#ifdef __cplusplus
}
#endif
#endif
|
2023-12-06T01:26:36.242652
|
https://example.com/article/6325
|
Share this article
Rupali Mehra compares the flavours of Swedish elections to those in her home country India. Are there any similarities in the democratic process of the two countries?
In India you don't need a pundit to tell you a political contender will soon be in your vicinity. You can feel them coming a mile away.
SUVs with loudspeakers, blaring slogans from a political party or playing patriotic Bollywood songs alternatively, precede the political procession that is to come.
Indian elections are not called the world's largest democratic exercise for nothing. While the numbers game is the obvious correlation – considering we are talking of 850 million eligible voters – the overwhelming scale of Indian election truly plays out on its streets.
Canvassing in India for the national elections has a festive fever around it. A heady, contagious festive fever that you cannot escape from. Every emotion is heightened; the cheers, the jeers, the anger and the joy; even fist fights and the hugs of bonhomie. And all of this plays out in the public domain.
Elections in a country of 1.3 billion, to choose 543 women and men as their executives, is similar to "a big fat Indian wedding", as a journalist friend put it. Having covered three national elections over 15 years and several federal elections, I couldn't agree more. Only that it is a "big fat Indian wedding" of 850 million invitees and the infinite complexities that come with it.
Sitting 3,500 miles away in Sweden, I am witnessing another democratic exercise. An election that is similar in the mechanics, yet so different in its manifestation.
Sweden votes in less than 24 hours. But if you are new here or a visitor, you can't be faulted for thinking polls are a while away. "It doesn't feel like there is a national election on in Sweden," remarks the journalist friend from India who finds herself in Stockholm in the midst of val, as elections are known here. The comment on the 'feel factor' is telling. Unless you regularly tune into televised political debates and the track the weekly opinion polls as the Swedes do, the atmosphere on the street feels like the tempo is just about building.
Canvassing and public engagement are far more nuanced than you see in India. Parties have designated areas to set up their counters, and volunteers gently approach you to discuss their manifesto. Even public speeches like those at Medborgarplatsen, with supporters wearing the party symbol loud and clear on their sleeve, caps and t-shirts, seem mild when compared to a candidate arriving in a helicopter to address supporters in India.
To a Swede who faces posters of political leaders at every second bus stop and tube station to work, and then arrives home to find their mail boxes filled with political pamphlets, the feeling can be overwhelming. Surely, there will be a sigh of relief when its all over. But for someone seeped in the technicolour of Indian elections, the Swedish polls appear monochromatic.
This, despite the fact that 2018 has been one of most hotly contested elections and the fight is predicted to go down to the wire.
Prime Minister Stefan Löfven meeting voters in Linköping the day before the election. Photo: Anders Wiklund/TT
To give the analogy of food, Indian elections are akin to a red hot Indian curry; each spoonful offers a burst of multiple flavours and spices. For some it is a treat. For others it is hard to stomach. In comparison Swedish food, although flavoursome, is more mellow. Similarly for the elections.
But first impressions aside, scratch the surface and one finds that several issues strike a similar cord among the people in both countries. The most obvious is immigration. Historically Sweden has had immigrants come in during the Baltic wars, the Afghan war, the Iranian revolution and even as far back as World War II. But the influx of 2015, largely from war-torn Syria, is the most volatile and polarised talking point of 2018. Similarly in India, immigration from neighbouring Bangladesh that has been a constant for decades, is now a hotly debated issue.
Politics on immigration aside, there are other bread and butter issues that citizens vote on. These are issues that affect citizens in their day to day life. Issues like housing, water, jobs and transport. According to the country's National Housing Board (Boverket) Sweden faces a housing shortage in 255 of its 290 municipalities. Buying a house in Stockholm or Gothenburg is out of reach for many. It is a similar story in India's financial capital Mumbai, where the per-square-foot prices compares with the world's most expensive cities. This even as the city has an inventory of half a million vacant houses, according to India's Economic Survey.
Away from the big cities, towns and rural areas face similar issues of water, transport, schools and hospitals. While a taluk (a block of villages) in interior India could be struggling to get a school for their children, a locality in a Swedish countryside could be struggling to keep open a school for the lack of enough students. What differs is the complexion, scale and extremities.
One could argue that we are comparing apples to oranges here. But that is what democracies are all about. Different in flavour, yet similar in nature.
Rupali Mehra is a former television editor and anchor. She moved from India in the spring of 2017 and runs a communications company in Sweden. She can be reached at rupaliatwork@gmail.com
|
2023-11-07T01:26:36.242652
|
https://example.com/article/9079
|
<?php
/**
* Class AmericandadWrapperVisitor
* americandad wiki is using wrapper that looks like this:
* <div 'style'="padding: 1em 1.5em; min-height:500px;">
* <div 'style'="float: right; width: 310px; padding: 35px;">
* url: http://americandad.wikia.com/wiki/Francine%27s_Flashback
*/
class AmericandadWrapperVisitor extends DOMNodeVisitorBase {
/**
* @param DOMNode $currentNode
* @return bool
*/
public function canVisit(DOMNode $currentNode) {
/** @var DOMElement $currentNode */
return DomHelper::isElement( $currentNode, 'div' ) &&
$currentNode->childNodes->length > 0 &&
$currentNode->hasAttribute('style') &&
$currentNode->getAttribute('style') == 'clear:both; width:100%; border:2px solid #1E90FF; background-color:#E3F2FF' &&
$this->findSecondLevelNode( $currentNode ) !== null;
}
private function findSecondLevelNode( DOMElement $currentNode ) {
for ( $i =0; $i < $currentNode->childNodes->length; $i++ ) {
if( DomHelper::isElement( $currentNode->childNodes->item($i), 'div' ) &&
$currentNode->childNodes->item($i)->hasAttribute('style') &&
$currentNode->childNodes->item($i)->getAttribute('style') === 'padding: 1em 1.5em; min-height:500px;' ) {
return $currentNode->childNodes->item($i);
}
}
return null;
}
/**
* @param DOMNode $currentNode
*/
public function visit(DOMNode $currentNode) {
/** @var DOMElement $currentNode */
$this->iterate($this->findSecondLevelNode($currentNode)->childNodes);
}
}
|
2024-02-07T01:26:36.242652
|
https://example.com/article/3906
|
Q:
Use history.push in action creator with react-router-v4?
The only working method that I found to work this out without using react-router-redux to route from action creator async action completion is by passing the history prop from the component to action creator and doing:
history.push('routename');
Since BrowserRouter ignores the history prop passed to it thus we cannot use custom history objects with browserhistory.
What is the best possible way to work this out?
A:
Instead of using BrowserRouter you could use the Router with custom history like
import { Router } from 'react-router'
import createBrowserHistory from 'history/createBrowserHistory'
export const history = createBrowserHistory()
<Router history={history}>
<App/>
</Router>
in which case your history.push() will work. With BrowserRouter history.push doesn't work because Creating a new browserHistory won't work because <BrowserRouter> creates its own history instance, and listens for changes on that. So a different instance will change the url but not update the <BrowserRouter>.
Once you create a custom history, you can export it and then import it in your action creator and use it to navigate dynamically like
import { history } from '/path/to/index';
const someAction = () => {
return dispatch => {
ApiCall().then((res) => {
dispatch({type: 'SOME_CALL', payload: res })
history.push('/home');
})
}
}
|
2024-05-18T01:26:36.242652
|
https://example.com/article/1325
|
985 P.2d 1032 (1999)
195 Ariz. 173
ARIZONA STATE BOARD OF REGENTS on behalf of ARIZONA STATE UNIVERSITY, Television Station KAET, Charles Allen, Beth Vershure and Michael Wong, Plaintiffs-Appellees,
v.
ARIZONA STATE PERSONNEL BOARD; Anna Foster, Judy Barrett, Bill Bonnell, Hank Suverkrup, and Bill DeLong in their official capacity as Members of the Personnel Board, Defendants,
Camille Kimball, Defendant-Appellant.
No. CV-98-0237-PR.
Supreme Court of Arizona, En Banc.
October 4, 1999.
Paul J. Ward, General Counsel, Tempe Mary C. Stevens, Office of General Counsel Arizona State University and Cohen Kennedy Dowd & Quigley, P.C., Phoenix, By Ronald Jay Cohen, Daniel G. Dowd, Attorneys for Arizona State Board of Regents, Arizona *1033 State University, KAET, Charles Allen, Beth Vershure and Michael Wong.
Sundberg & Mousel, Phoenix, By Craig L. Mousel Attorneys for Arizona State Personnel Board, Anna Foster, Judy Barrett, Bill Bonnell, Hank Suverkrup and Bill DeLong.
Jeffrey F. Arbetman and Lubin & Enoch, P.C., Phoenix, By Stanley Lubin Attorneys for Camille Kimball.
Rogers & Whalen, Phoenix, By Thomas M. Rogers Donna H. Whalen, Attorneys for Amicus Curiae Arizona Chamber of Commerce.
OPINION.
MARTONE, Justice.
¶ 1 We granted review to decide whether the Administrative Procedure Act allows an agency to exempt itself from the rights to counsel and subpoena contained in A.R.S. § 41-1062 (1992). We hold that it does not.
I.
¶ 2 In May 1994, Camille Kimball, an employee of public television station KAET, a department of Arizona State University, complained to the United States Department of Labor that Arizona State University failed to properly pay her for overtime. In December 1994, believing that Arizona State University had taken reprisal against her for complaining to the Department of Labor, Kimball filed a complaint with the State Personnel Board under A.R.S. § 38-532(H) and A.R.S. § 41-782(B), alleging reprisal in violation of the state Whistleblower Protection Act, A.R.S. § 38-531 et seq. She also filed a grievance with Arizona State University alleging violations of the University's own Whistleblower Protection Policy.
¶ 3 Arizona State University moved to dismiss the complaint under § 38-532 before the State Personnel Board for the reason that § 38-533 expressly makes the whistleblower statute inapplicable to claims against a state university that has its own rule for the protection of employees from reprisal for the disclosure of information to a public body. Because the Personnel Board denied the motion, the Board of Regents, on behalf of Arizona State University, filed a special action in the superior court contending, among other things, that the Board lacked jurisdiction because of the express exemption contained in § 38-533. Kimball claimed that the exemption did not apply because Arizona State University's grievance procedure was insufficient, even to the point of violating due process. The superior court concluded that the exemption did apply and that Kimball's due process claims were not yet ripe for adjudication. The superior court therefore ordered the State Personnel Board to dismiss Kimball's whistleblower complaint and ordered Arizona State University to proceed with a hearing on Kimball's grievance under the University's own Whistleblower Protection Policy.
¶ 4 The court of appeals affirmed, holding that Arizona State University's policy was sufficient to qualify for the exemption under A.R.S. § 38-533. It also held that Arizona State University's grievance procedure complied with A.R.S. § 41-1062, even though it severely limited the right to counsel and denied the right to subpoena witnesses. Board of Regents v. Personnel Board, 191 Ariz. 160, 953 P.2d 904 (App.1996).
¶ 5 Because we agreed with the court of appeals that § 38-533 expressly exempts Arizona State University from whistleblower complaints brought before the State Personnel Board, we denied Kimball's petition for review on that issue. Because we disagreed with the court of appeals' conclusion that § 41-1062 allows an agency to exempt itself from the right to counsel and subpoena provisions of the statute, we granted review on that portion of Kimball's petition for review. See Rule 23(c)(3), Ariz. R. Civ.App. P.
II.
¶ 6 A.R.S. § 41-1005(D) exempts the Board of Regents from specific articles of the Administrative Procedure Act, but not article 6, of which A.R.S. § 41-1062 is a part. Therefore, we agree with the court of appeals that § 41-1062, providing for hearings in adjudicative proceedings, is fully applicable to the Board of Regents.
*1034 ¶ 7 Under A.R.S. § 41-1062(A)(1), "[e]very person who is a party to such proceedings shall have the right to be represented by counsel, to submit evidence in open hearing and shall have the right of cross-examination." And, A.R.S. § 41-1062(A)(4) provides that the officer presiding at the hearing may issue subpoenas for the attendance of witnesses.
¶ 8 But Arizona State University adopted rules to the contrary. Its grievance policy 902 states that "[n]either the [American Arbitration Association] nor the hearing officer have [sic] subpoena authority to compel the attendance of witnesses or production of documents." And although it allows grievants to retain counsel, it expressly prohibits them from participating during the hearing: "[a]dvisors may not participate or provide testimony during the hearing."
¶ 9 Administrative agencies have no common law or inherent powerstheir powers are limited by their enabling legislation. Kendall v. Malcolm, 98 Ariz. 329, 334, 404 P.2d 414, 417 (1965). Thus, if an agency rule conflicts with a statute, the rule must yield. See, e.g., Health Care Cost Containment Sys. v. Bentley, 187 Ariz. 229, 232, 928 P.2d 653, 656 (App.1996); Schwartz v. Superior Court, 186 Ariz. 617, 619, 925 P.2d 1068, 1070 (App.1996); and, Dioguardi v. Superior Court, 184 Ariz. 414, 417, 909 P.2d 481, 484 (App.1995).
¶ 10 The court of appeals recognized this but concluded that Arizona State University's grievance policies controlled over the contrary provisions of § 41-1062 because that section is prefaced by "[u]nless otherwise provided by law." A.R.S. § 41-1062(A) (emphasis added). It ruled that the inconsistent grievance policies were "law" within the meaning of § 41-1062(A), because § 41-1001(15) defines "provision of law" to include the rule of an administrative agency, and § 41-1001(17) defines "Rule" to include "an agency statement of general applicability that implements, interprets or prescribes law or policy, or describes the procedure or practice requirements of an agency."[1] In short, the court of appeals equated the "unless otherwise provided by law" language of § 41-1062 with the "provision of law" language of § 41-1001(15).
¶ 11 But a close examination of the text of § 41-1062 reveals that the words "provided by law" and "provision of law" are not interchangeable. The words "provision of law" are words of art precisely defined to include an agency rule. The words "provision of law" are used throughout Title 41 whenever reference is made to the whole body of law including the federal or state constitutions, federal or state statutes, rules of court, executive orders, or rules of an administrative agency. When the legislature intended this universe of law to be applicable, it expressly used the words "provision of law." See, e.g., A.R.S. § 41-1002(C), § 41-1004, and § 41-1029(C).
¶ 12 On the other hand, the words "provided by law" are used in § 41-1062 to expressly exclude agency rules. For example, § 41-1062(A) uses the words "provided by law." So, too, does subsection A(1). But subsection A(4), uses the words "provided by law or agency rule," "provided by law," "provisions of law," "provided by law or agency rule," and "provided by agency rule." If the words "provided by law" were meant to include agency rules, then the legislature would not have used the words "provided by law or agency rule" or the words "provided by agency rule" in § 41-1062(A)(4). In short, the legislature used "provided by agency rule" when specifically referring to agency rule, "provided by law" when specifically referring to all other law including statutes, and "provided by law or agency rule" when referring to both. The court of appeals thus erred in equating the words of art "provision of law" with the words "provided by law." That construction would allow an agency to except itself right out of the entire hearing procedure of § 41-1062, not just the right to counsel and right to subpoena provisions. Yet under A.R.S. § 41-1002(C), while an agency may grant rights in addition to *1035 those provided by the Administrative Procedure Act, it may not diminish rights conferred by any "provision of law," which includes the Administrative Procedure Act.
¶ 13 We hold that because the words "[u]nless otherwise provided by law" in § 41-1062(A) do not include agency rules, the University's grievance procedures with respect to counsel and subpoena must yield to the right to counsel, including the right to cross-examine, and the right to subpoena contained in A.R.S. § 41-1062(A). The language of § 41-1062 that refers not only to representation but also to the right to cross-examine means that a lawyer acting on behalf of a party must be able to participate fully at the hearing. We thus do not reach Kimball's substantial argument that the constitution itself requires full participation by a lawyer at the hearing. See Forman v. Creighton School District No. 14, 87 Ariz. 329, 351 P.2d 165 (1960).
III.
¶ 14 We vacate the opinion of the court of appeals. We affirm that part of the judgment of the trial court that ordered the State Personnel Board to dismiss Kimball's complaint. We reverse that part of the trial court's judgment that holds that Arizona State University's grievance policy with respect to counsel and subpoena controls over A.R.S. § 41-1062. Instead, Arizona State University shall proceed with the hearing of Kimball's grievance under § 41-1062 in accordance with this opinion.
CONCURRING: THOMAS A. ZLAKET, Chief Justice, CHARLES E. JONES, Vice Chief Justice, STANLEY G. FELDMAN, Justice, RUTH V. MCGREGOR, Justice.
NOTES
[1] A.R.S. § 41-1001(15) was formerly numbered § 41-1001(16). A.R.S. § 41-1001(17) was formerly numbered § 41-1001(18).
|
2023-08-15T01:26:36.242652
|
https://example.com/article/1486
|
Pages
Thursday, November 14, 2013
House Republicans to try to impeach U.S. Attorney General Holder
House Republicans to try to impeach U.S. Attorney General Holder
16 hours ago
WASHINGTON (Reuters) - Republicans in the House of Representatives
plan to introduce articles of impeachment against Attorney General Eric
Holder on Thursday, in the hopes of removing a cabinet member they say
has lied to Congress as well as failed to uphold federal law.
"This was not a decision that I made lightly.
Since the House voted in 2012 to hold Attorney General Eric Holder in
contempt, the pattern of disregard for the rule of law and refusal to be
forthright has only continued," Texas Representative Pete Olson, who
drafted the articles, said in a statement provided to Reuters on
Wednesday.
"The American people deserve answers and
accountability. If the attorney general refuses to provide answers, then
Congress must take action."
The Justice Department did not respond to requests for comment on the possibility of an impeachment move.
The resolution could pass the Republican-dominated House but would
likely sputter in the Democratic-dominated Senate, which would have to
hold a trial to remove Holder, who has been attorney general since 2009,
from office.
Still, an impeachment drive would further fuel the
tensions that exist between the federal government's top law enforcement
officer and conservative lawmakers. According to the media firm CQ Roll
Call, 10 other Republicans would co-sponsor the articles of
impeachment, five of whom are from Texas.
According to an
outline, the first article is based on "Operation Fast and Furious" a
bungled attempt to build cases against major gun traffickers who
supplied firearms to Mexican drug cartels, while electing not to
immediately prosecute low-level traffickers even as they bought 2,000
potentially illegal guns.
The operation came to light after two
of those firearms were found in Arizona at the scene of the fatal
shooting of U.S. Border Patrol agent Brian Terry.
After Holder
refused to give a congressional committee subpoenaed documents about the
Justice Department's involvement in "Fast and Furious" he was found in
contempt of Congress. The House oversight committee has also sued for
the documents.
The other impeachment articles rest on issues that
have raised conservatives' ire in recent years, including Holder's
decisions not to enforce laws on same-sex marriage, on prison sentences
for certain drug crimes and not to prosecute an official in the Internal
Revenue Service for targeting conservative political activists.
They also say Holder lied to Congress about a Justice Department investigation into Fox News correspondent James Rosen.
(Reporting By Lisa Lambert; Editing by Paul Simao)
|
2024-03-20T01:26:36.242652
|
https://example.com/article/7684
|
Q:
List Gitlab runners by name only
I am trying to get a list of only the names of gitlab runners.
So the output of gitlab-runner list 2>&1 is:
Listing configured runners ConfigFile=/etc/gitlab-runner/config.toml
default_runner Executor=shell Token=251cda361f983e612b27381e2f73ad URL=http://10.6.20.230
test runner Executor=shell Token=86ab70918fc87c8a8d3a57c21457fb URL=http://10.6.20.230
Note that the names of the runners can contain spaces in them.
So I've tried the following:
gitlab-runner list 2>&1 | awk -F'Executor' '{if(NR>1)print $1}' which gives me pretty much what I want (except with trailing spaces that I'll need to remove).
default_runner
test runner
However, if I change the field separator to Executor= in hopes of making it more explicit, it no longer works. It returns the entire line.
$ gitlab-runner list 2>&1 | awk -F'Executor=' '{if(NR>1)print $1}'
default_runner Executor=shell Token=251cda361f983e612b27381e2f73ad URL=http://10.6.20.230
test runner Executor=shell Token=86ab70918fc87c8a8d3a57c21457fb URL=http://10.6.20.230
I've tried escaping it with Executor\= to no avail. How can I include the equal sign in my split?
Edit:
It works if I take one of the lines and echo it into awk
$ echo "test runner Executor=shell Token=86ab70918fc87c8a8d3a57c21457fb URL=http://10.6.20.230" | awk -F'Executor=' '{print $1}'
test runner
Another thing to note is that, for whatever reason, gitlab-runner list prints to stderr. That is why I redirect to stdout before I pipe to awk. Maybe I'm not redirecting properly? But that doesn't really make sense since awk picks it up without equal sign.
A:
The reason why you can't split on Executor= when piping from the gitlab-runner command is because Executor= string is not present! At least not it that form - gitlab-runner adds some ANSI color codes (ESC[0;m is used to reset all attributes):
$ gitlab-runner list 2>&1 | cat -A
default_runner ^[[0;m Executor^[[0;m=shell Token=86ab70918fc87c...
# ^^^^^^ ^^^^^^ <-- ANSI color codes
To prove it, try running:
$ gitlab-runner list 2>&1 | awk -F 'Executor\x1b\\[0;m=' '{print $1}'
default_runner
There's an open proposal to add an option to disable color output in gitlab-runner, but it has been opened for 10 months already, without much community support. Until they decide to add that option, if you wish, you can strip ANSI color codes, for example like this or this.
Note that in both POSIX and GNU awk, -F accepts an ERE expression. So, Executor= should work in general (nothing special about =). To deal with spaces, you can use <space>*Executor=:
$ cmd | awk -F ' *Executor=' 'NR>1 {print $1}' | cat -A
default_runner$
test runner$
|
2024-05-15T01:26:36.242652
|
https://example.com/article/4800
|
/* SPDX-License-Identifier: GPL-2.0+ */
/*
* Copyright (C) 2015, Bin Meng <bmeng.cn@gmail.com>
*
* Intel Quark MRC bindings include several properties
* as part of an Intel Quark MRC node. In most cases,
* the value of these properties uses the standard values
* defined in this header.
*/
#ifndef _DT_BINDINGS_QRK_MRC_H_
#define _DT_BINDINGS_QRK_MRC_H_
/* MRC platform data flags */
#define MRC_FLAG_ECC_EN 0x00000001
#define MRC_FLAG_SCRAMBLE_EN 0x00000002
#define MRC_FLAG_MEMTEST_EN 0x00000004
/* 0b DDR "fly-by" topology else 1b DDR "tree" topology */
#define MRC_FLAG_TOP_TREE_EN 0x00000008
/* If set ODR signal is asserted to DRAM devices on writes */
#define MRC_FLAG_WR_ODT_EN 0x00000010
/* DRAM width */
#define DRAM_WIDTH_X8 0
#define DRAM_WIDTH_X16 1
#define DRAM_WIDTH_X32 2
/* DRAM speed */
#define DRAM_FREQ_800 0
#define DRAM_FREQ_1066 1
/* DRAM type */
#define DRAM_TYPE_DDR3 0
#define DRAM_TYPE_DDR3L 1
/* DRAM rank mask */
#define DRAM_RANK(n) (1 << (n))
/* DRAM channel mask */
#define DRAM_CHANNEL(n) (1 << (n))
/* DRAM channel width */
#define DRAM_CHANNEL_WIDTH_X8 0
#define DRAM_CHANNEL_WIDTH_X16 1
#define DRAM_CHANNEL_WIDTH_X32 2
/* DRAM address mode */
#define DRAM_ADDR_MODE0 0
#define DRAM_ADDR_MODE1 1
#define DRAM_ADDR_MODE2 2
/* DRAM refresh rate */
#define DRAM_REFRESH_RATE_195US 1
#define DRAM_REFRESH_RATE_39US 2
#define DRAM_REFRESH_RATE_785US 3
/* DRAM SR temprature range */
#define DRAM_SRT_RANGE_NORMAL 0
#define DRAM_SRT_RANGE_EXTENDED 1
/* DRAM ron value */
#define DRAM_RON_34OHM 0
#define DRAM_RON_40OHM 1
/* DRAM rtt nom value */
#define DRAM_RTT_NOM_40OHM 0
#define DRAM_RTT_NOM_60OHM 1
#define DRAM_RTT_NOM_120OHM 2
/* DRAM rd odt value */
#define DRAM_RD_ODT_OFF 0
#define DRAM_RD_ODT_60OHM 1
#define DRAM_RD_ODT_120OHM 2
#define DRAM_RD_ODT_180OHM 3
/* DRAM density */
#define DRAM_DENSITY_512M 0
#define DRAM_DENSITY_1G 1
#define DRAM_DENSITY_2G 2
#define DRAM_DENSITY_4G 3
#endif /* _DT_BINDINGS_QRK_MRC_H_ */
|
2024-06-03T01:26:36.242652
|
https://example.com/article/8986
|
Copper Complexes as Bioinspired Models for Lytic Polysaccharide Monooxygenases.
We report here two copper complexes as first functional models for lytic polysaccharide monooxygenases, mononuclear copper-containing enzymes involved in recalcitrant polysaccharide breakdown. These complexes feature structural and spectroscopic properties similar to those of the enzyme. In addition, they catalyze oxidative cleavage of the model substrate p-nitrophenyl-β-d-glucopyranoside. More importantly, a particularly stable copper(II) hydroperoxide intermediate is detected in the reaction conditions.
|
2024-02-05T01:26:36.242652
|
https://example.com/article/5483
|
using System;
using System.Collections;
using System.ComponentModel;
namespace FastReport
{
/// <summary>
/// This class represents a header of the data band.
/// </summary>
public class DataHeaderBand : HeaderFooterBandBase
{
}
}
|
2024-04-12T01:26:36.242652
|
https://example.com/article/6424
|
Share story
Sound Transit looked deeper into the light-rail tunnels and bridges that neighborhoods from Ballard to West Seattle requested since the 2016 election that approved transit expansion, and the numbers are breathtaking.
Some proposed routes would add more than $300 million. A few would add years of delay — the most extreme a tunnel through two ridges to reach West Seattle Junction. That could cost $1.2 billion more than the proposed elevated track.
It’s been almost two years since voters approved property-tax, car-tab and sales-tax increases to pay for the Sound Transit 3 plan of eight regional rail extensions and two bus rapid-transit lines.
Proposed ST3 routes
Sound Transit will display and discuss its preliminary findings about new light-rail routes at these at neighborhood forums:
People may also review the information and comment online at www.wsblink.participate.
Source: Sound Transit
Traffic Lab is a Seattle Times project that digs into the region’s thorny transportation issues, spotlights promising approaches to easing gridlock, and helps readers find the best ways to get around. It is funded with the help of community sponsors Alaska Airlines, CenturyLink, Kemper Development Co., NHL Seattle, PEMCO Mutual Insurance Company and Seattle Children’s hospital. Seattle Times editors and reporters operate independently of our funders and maintain editorial control over Traffic Lab content.
Five layers of advisory and political review groups are overlapping this year, in what’s called an accelerated effort to write a plan. Risks are mounting of cost overruns and delays — beyond the current land and labor inflation that’s hitting some transit projects.
As of this week, eight route options remain in Ballard, four downtown, seven in Sodo and the Chinatown International District, and five in West Seattle. The list needs to be winnowed down in October, or planning will fall behind schedule, staffers say.
Consultants performed 1,200 comparisons, he said, to reflect pros and cons of different options. The transit board allocated some $285 million and five years to choose the final routes and finish environmental studies, before final engineering and construction begin.
Some highlights, from north to south:
• Fixed-bridge options are getting a prolonged look in Ballard, where staff is investigating a 136-foot-high span comparable in height to the Aurora Bridge. The ST3 measure showed a cheaper 70-foot-high drawbridge that might need to open two to four times a day and delay trains.
• Tunnels from Interbay to Ballard could cost $300 million to $500 million more than the elevated trackway in the original ST3 plan. A Ballard station could be 120 feet deep, or three stories lower than the existing UW Station.
• Some options provide a Magnolia station along 20th Avenue West near West Dravus Street, which would require a bridge across BNSF Railway’s Ballmer freight yard.
• A Seattle Center train stop might go under Mercer Street, with entrances on both sides of the road.
• A popular South Lake Union (SLU) proposal moves the second SLU stop to Fifth Avenue North and Harrison Street, rather than cramming two stations east of Aurora Avenue, three blocks apart. The Fifth Avenue site offers quick access to the RapidRide E Line bus, the Space Needle and the Bill & Melinda Gates Foundation. But the path would require tunneling under KeyArena.
• Deep-bore tunnel options at Union Station in the Chinatown International District, situated amid tideflats and fill soil, would require boarding platforms 200 feet deep. Such depths would force a station planned near Madison Street and Fifth Avenue some 250 feet below street level.
• The original and cheapest Chinatown International District scenario entails a shallow cut-and-cover tunnel beneath Fifth Avenue South. That’s frequently criticized for inflicting havoc on people who have already suffered through their share of construction to build the First Hill streetcar line as well as other projects.
• A surface trackway in Sodo could save $300 million — and still provide road overpasses at Lander and Holgate streets to separate trains from general traffic and trucks.
• A Pigeon Ridge tunnel to West Seattle would reduce elevated tracks among Delridge and Avalon Way homes, and put Delridge Station farther south near more transit riders. But reaching the ridge would require crossing the Argo freight-rail yard and passing high-voltage electrical lines, before drilling into a steep slope, said Stephen Mak, corridor development manager. That’s could cost an extra $1.2 billion.
• Among less-extreme routes, a short tunnel being considered from the proposed Delridge Station to the corner of Fauntleroy Way Southwest and Southwest Alaska Street would still add $700 million.
If all these questions can be resolved, Seattle riders might someday gain 14 new stations, to serve an estimated 210,000 daily trips, in what’s currently the fastest growing U.S. transit market.
|
2024-05-08T01:26:36.242652
|
https://example.com/article/8553
|
Q:
xsl:include not working from a Firefox extension
I am developing a Firefox extension that uses XSL transformations. I
have been using XSLTProcessor without problems until I needed to do an
xsl:include from the XSL stylesheet. When I import the XSL stylesheet
that uses an xsl:include, Firefox gives an error:
Error: Component returned failure
code: 0x80600001
[nsIXSLTProcessor.importStylesheet] =
Source file:
chrome://myextension/content/functions.js
Line: 632
This only happens when running the code from the Firefox extension, if
I run it in "normal" html page the code works perfectly. I also tried
with xsl:import and got the same result. I also tried with absolute URIs like chrome:\\myextension\content\xsl\test2.xsl and get the same error.
Does anyone know what could I be doing wrong? Thanks in advance
Here goes the code to reproduce it (all files are in the same folder):
File functions.js:
function testXSL(){
var processor = new XSLTProcessor();
var xsl = document.implementation.createDocument("", "test", null);
xsl.addEventListener("load", onXSLLoaded, false);
xsl.load("test1.xsl");
function onXSLLoaded() {
processor.importStylesheet(xsl);
}
}
File test1.xsl:
<?xml version="1.0" encoding="utf-8"?>
<xsl:stylesheet version="1.0"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:xlink="http://www.w3.org/1999/xlink">
<xsl:include href="test2.xsl" />
</xsl:stylesheet>
File test2.xsl:
<?xml version="1.0" encoding="utf-8"?>
<xsl:stylesheet version="1.0"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:xlink="http://www.w3.org/1999/xlink">
<xsl:template match="/">
<h1>Included!!</h1>
</xsl:template>
</xsl:stylesheet>
A:
It seems it's a Firefox regression bug. I found this one on Mozilla bugzilla.
I'm afraid nobody can help you here unless the bug is patched, and that doesn't smell good...open 2 years ago, no update since 6 months.
|
2023-09-02T01:26:36.242652
|
https://example.com/article/4638
|
Smart Football has moved!
Thursday, June 18, 2009
In a conference full of coaches with championship rings (Urban Meyer, Steve Spurrier, Nick Saban, Les Miles, etc), and another who no one can stop talking about, a former high school coach continues to receive his fair share of scrutiny. And he's not even the head coach: enter Gus Malzahn, new Auburn offensive coordinator. Malzahn has been asked to deliver on the promise that Tommy Tuberville and Tony Franklin failed to; namely, a "spread" offense that actually produces.
There are a few differences here between Malzahn's offense and what Franklin and Tuberville tried to do (or said they were trying to do). The biggest, I'd say, is that Malzahn's spread is not exactly like other spreads, whether pass-first ones like the Airraid or run-heavy spreads like Urban Meyer's or Rich Rodriguez's. That's because the schemes are simple - very, very simple - and the core of the offense is not even about schemes: it's about tempo. . . .
[N]obody does what Malzahn does. If some no-huddle teams, like Franklin's, are light-speed, then Malzahn wants to spend the entire game in something akin to "ludicrous speed."
This past spring, Malzahn installed his offense with signs of progress, though he has yet to get everyone up to his preferred "ludicrous speed" yet. That will come. With talk about his overarching philosophy out of the way, however, it's still worth asking what his Xs and Os will actually look like. And, if spring practice is any indication, we know the answer: a lot like they did at Tulsa.
At Tulsa, Malzahn, with co-offensive coordinator Herb Hand (who deserves as much credit as Malzahn), blew the doors off just about everyone they played. In 2007, they were: sixth in scoring (41.1 per game), first in yards (543.9 per game), and third in yards per play (6.8). In 2008, after losing their quarterback Paul Smith -- who had thrown for 47 touchdowns the year before -- the offense actually improved: second in scoring (47.2 points per game), first in yards (569.9 per game), and yards per play (7.3). Much of that improvement came from the running game, which jumped from 172.93 yards per game in 2007 to 268.00 in 2008.
Indeed, Malzahn actually predicted this improvement via run game back then. After his first season at Tulsa, he did in an interview with ESPN:
Q: What makes your spread offense potent as compared to say, a Texas Tech or Missouri or a team like that?
Gus Malzahn: We're a run, play-action team. A lot of spread teams are pass first, run second. But we're a run, play-action team. As a matter of fact, I think we ran the ball one more time than we threw it last year, which a lot of people don't know. We like to be 50-50 and be able to do both well.
All that said, you can still consider me slightly skeptical of his claim to being a smashmouth guy. Back in his high school days, and even during his time at Arkansas, those around Gus always said if he had his way he would have thrown it about as much as was humanly possible. We're talking Mike Leach, June Jones stuff. But, people change, and his experience with Coaches Graham and Hand at Tulsa (much moreso than his experience with Nutt at Arkansas) appears to have heavily influenced him. Hand, a Rich Rodriguez disciple, not only helped implement many of Malzahn's ideas, he also brought many of his own to the table, particularly regarding the spread run game.
But the proof is in the pudding. I am familiar with what Tulsa did, and I finally have been able to see what Auburn implemented during spring practice. And it is much as I expected: it is a smash-mouth spread operation. Indeed, the spring offense was notable for quarterback inconsistency, yes, but also for big, big plays from the running game.
As a preview for this upcoming season I will describe three plays Malzahn can be expected to use at Auburn, none of them particularly revolutionary: the counter, the zone-read with bubble screens as a read, and the power. Each has old roots, though Malzahn will do his best to aid their effectiveness through lots of motions, fakes, and shifts. Expect the tight-ends or H-backs to play a big role in the offense in making key blocks, and also expect to see lots of wide receiver motion, with their either getting the ball on reverses or as pitch men on the option, or merely faking so.
Counter play
The counter play is age-old, though was popularized and made famous by Joe Gibbs's Redskins, though he admits to stealing it from Tom Osborne's Nebraska teams. On the "counter trey," the playside (the side the run is eventually going to) "down" blocks, leaving the defensive end unblocked. They work together to double-team defensive linemen on their way to the linebackers. From the backside, one linemen, usually the backside guard, pulls and kicks out the defensive end or outside linebacker; it is actually a "trap" block. The other component of the blocking is that another player from the backside, sometimes the backside tackle and other times a full-back or H-back, will pull and "lead" into the hole, blocking the first linebacker he sees. The runningback takes a counter step or two, and then simply follows the pulling blocker's block, and cuts off of it. Below is a diagram of how the play has traditionally been run, from the I-formation, courtesy of Trojan Football Analysis. (The diagram is of Nebraska, and see this post for a great breakdown of how the great Husker teams of the 90s ran the play.)
So what does it look like when Malzahn uses it? Well it's basically the same, except he might show a few different things before the snap. Specifically, he might use an H-back or fullback type player who comes from the backside to be the "puller" who leads into the hole, and that player might begin the play split out wide and motion in across the formation. Or, the runningback himself might motion into the backfield. There's lots of options. Below, however, is a diagram of what Malzahn did in the spring game; the play went for a long touchdown twice in the spring game (thanks to good blocking and some weak angles by the defense).
To take one of the examples before getting to the film clips, the offense lined up in a basic shotgun set, with one runningback, one H-back, and three receivers.
I have only drawn paths for two players: the backside guard pulls and kicks out the defensive end, while the H-back pulls and leads into the hole (and eventually also kicks out the linebacker, though he could have just as easily "hooked" him inside, had the linebacker stepped that way). The rest of the line just blocks down, and the runningback takes his slight counter steps and explodes into the hole, following the H-back's block. To see it all in action, check out the film clips from the spring game this past year.
If all this looks familiar, even from a spread set, it should. Compare what Malzahn is doing above with what Urban Meyer does at Florida. First a diagram, then basically the exact same play run with Percy Harvin. There are differences, but most of them are cosmetic.
Same play. Auburn is just hoping it works as well for them as it has for Florida.
Zone-read with bubble screen
I won't get too far into the basics of the zone read; I have both discussed it previously and also plan to go more in depth in the future as teams defend it differently nowadays. What you can expect from Malzahn and Auburn is much in the mainstream in terms of the play. The line will zone block, and the runningback will look for a vertical crease. The quarterback will read the backside end to determine where or not to give the ball to the back or keep it himself. The one wrinkle Malzahn brings -- which again, is something Rich Rodriguez has been doing for some time -- is to build the bubble screen on the backside in. Basically, if the backside pursuit cheats in too much, Auburn has its constraint play built in: the quarterback can always pull the ball and throw the bubble. Below is a diagram and a video of Auburn running the zone with the bubble on the backside, though the quarterback just gives it to the runner.
Power
The "power" run is another that has ancient, "power football" roots but has been adapted to the spread. And it, again, is very simple: the line essentially "down" blocks, meaning they block the men over them or to their inside, and will use teamwork to combination block the defensive linemen until one releases to hit the linebackers. The exception is the defensive end or other outside, on the line of scrimmage defender. (Aptly referred to as the EMLOS -- "end man on the line of scrimmage.") The fullback -- or H-back, or someone -- plows at him to kick him out, thus opening a crease.
The crease becomes a hole, however, because the backside guard pulls and "leads" into it to block the linebacker, or other first threatening defender. In this way the blocking works much as it does on "counter," but with more of a frontside attack. Below is a diagram of how an NFL team runs the play; it is in every NFL team's playbook. (Click on the diagram to make it larger.)
And below is a common look Malzahn ran "power" from while at Tulsa, using the "pistol" (short shotgun with the runningback directly behind the quarterback) and a cross between an H-back and a fullback. See below.
This will be a common set for Auburn. Malzahn likes lining up with three wide receivers, but then also likes the versatility of the H-back/tight-end/fullback type as a blocker in a variety of directions. Again, compare his straight ahead blocking on "power" with his about face to the opposite side on "counter." (And with the pistol set the runningback could go either direction.)
Conclusion
So this is about what you can expect: some basic plays -- including power plays -- from spread sets with lots of shifts and motion, all at a top speed. Malzahn will try to go for some play-action and big plays off of this; I may diagram some of those later. How well it all works will depend on execution, particularly by the quarterbacks. Time will tell.
But a final thought. Another thing to expect from Auburn's offense this year will be lots of motion from the wide receivers and their use as a threat to run as well as catch. Now, all of these "versatility" roles -- H-backs and receivers as running threats -- depends on depth and skill at those positions (easier if you have Percy Harvin), but Malzahn likes to to give the look so as to at least present the problem to the defense. From the "power" look above, Malzahn likes to motion an outside wide receiver completely behind the runningback, and he then gets into a pitch relationship with the quarterback for an option. This way Malzahn can fake the power play and run the speed option with the quarterback (Kodi Burns?) with the receiver as a pitch man. It's fun stuff, at least when it works. Once he has done that, the very fact of the receiver in motion tends to help draw defenders when they do simply hand it off to the runningback on the power play.
Will it work in the SEC? I don't know, but if it does, expect plays like the one in the video below to be on all the highlight reels. Notice how the motion by one receiver sets up the sweep in the opposite direction by the other. With Malzahn's offense, don't just try to watch the ball, because that will rarely ever tell you where it actually is.
The A-Day game would not be of any use in determining the effectiveness of the offense versus the defense because the A offense played the B defense. Also, they switched QBs every now and then, alternating between Kodi Burns and Neil Caudle.
Burns moved the team well, but did not display good passing technique.
Caudle was a more effective passer, but was not a real threat with his legs.
DoubleB, KungFu: My understanding is that the pace was faster than before but not yet to what it was at Tulsa. That's to be expected. They have to learn the basics first. It will be interesting how they are in the fall.
And re: success versus the defense, that's true, I'm not saying they will average 500 yards a game in the SEC. The spring game is a legitimate place to look for *what* they are doing, especially the bread and butter basics. How *well* it all works is a different question of course. But for now, before the season, the what is the more interesting (and measurable) question.
anon: I get the clips from a variety of sources -- files, DVD, etc -- but from there it is pretty simple. I use Windows Moviemaker to edit them (not all that high tech), and then YouTube lets you upload stuff for free. YouTube also provides the code for "embedding" video. All you have to do is have a place to paste it into -- i.e. a blog.
Malzahn's ideaology is intriguing; not too many offenses are based on tempo and pure speed of execution. It's going to be interesting watching how it works out for him at Auburn; I'll be shocked if his offense becomes as productive as it was in Tulsa within the next two seasons. It'll take a few years of recruiting and installing for it to even get close, if it even does reach that level.
As for the speed of the offense, there were scrimmages in the spring, including one point in the A Day game the coaches had to tell the offense to stop and let the defense catch up. Kodi Burns(jokingly) complained that wasn't fair to the offense.
Like Chris said though, the clips are just basics of what we can expect next year. It all depends on execution against SEC defenses, which we all know is about as tough as it gets in college football.
Malzahn will never have the Urban Meyer type success offense that he had in 2008. It may work at Tulsa, but not at Auburn.
For starters, his offense talent level is very low. It would take him years to build up the talent level to successfully run that offense. By the time that day comes, he'll be long gone from Auburn.
Tony Franklin had success at every stop he made, except Auburn of course. Why? Because he didn't have the proper talent to run his scheme. The same will happen to Malzahn, barring a miracle of course. I wish him well because I know he's an offensive genius; however the lackluster offensive talent level is a major concern at this point and time.
"For starters, his offense talent level is very low. It would take him years to build up the talent level to successfully run that offense. By the time that day comes, he'll be long gone from Auburn."
Auburn's talent level is much higher than you're crediting them for. Their offensive line will be excellent next year, and they've got very talented running backs. The receivers have talent but have suffered from years of poor coaching. Kodi Burns' issues aren't from a lack of talent.
As for the talent issue, it's there. It's probably not as deep as Fla right now, but the starters are actually pretty good. The RB's have great speed, and the WR have lots of potential, but like has been said, I think the coaching in the last staff was not quite up to par for them. I think Trooper Taylor will really turn that position around. I won't get into detail, because I would go on and on, but the only depth issue Auburn has on offense is depth at OL. The starters are pretty good, but they've only got like 10 OL on scholarship at this point, which can hurt if injuries occur. I see on of the incoming WR's, DeAngelo Benton, getting immediate playing time and making a substantial impact.
QB is definitely an issue. This will be Burns 3rd OC in as many years, so obviously he's had quite a bit of flux in his time there. Caudle looks really good throwing the ball, as long as he's not forcing it. He's never really been given a chance yet and I think this new staff is right to make the race wide open. FWIW, Caudle was a 4 star, Elite 11 QB out of high school. His speed is probably comprable to Burns, but Burns is very shifty. Burns is really not that fast(probably in the 4.7/4.8 40 range), but he's very quick and really bounces around well in traffic.
Incoming freshman QB, Tyrik Rollison, will be given a chance as well. I doubt he'll win the starting job, but the coaches have said the incoming QB's are fair game as well. I do see Rollison becoming the future of Malzahn's offense though. The kid put up huge numbers in Texas his jr and sr year.
Zach - I wouldn't call the AU OL excellent. They are one injury away from having to move a TE or DL over. Plus, while they were ok last year, they didn't set the world on fire. The type of blocking they have to do in this system is different from what most of the OL was signed for. I still don't understand why everyone is so high on Burns talent. He's not produced at all, and while he might run fast and throw a ball 80 yards or whatever, a majority of a QB's talent is in making the right decisions with the ball, which he hasn't done yet. might be coachable - Jason Campbell certainly was (he made horrible decisions until his snr year when he got a new QB coach).
I don't know if Malzahn does this but another wrinkle for the counter from the Gun 4-wides is to run it like a zone read play. Have the QB read the backside DE and if he's slow or doesn't commit give ball to RB, otherwise you're constraint play is built in; have him pull the ball and run.
One thing that's interesting from the clips is that the play broke up the middle a lot. I find that often the counter starts as an outside run, then as LB's over pursue you start to get more of a middle cut back crease.
A great example of the power play working a treat is Willie Parker's 75 yrd TD run in SB XL. But as you say just about everyone has this, or some variant, in the playbook.
I'd just like to point out on the two video examples of the counter the defenses made some critical errors that opened up big plays.In the case of Auburn, the play side DE correctly followed the OT as he crashed down into the DT, which should push the play inside if not for the pulling guard. However, the play side LB took himself out of the play by moving vertically up field to the DE's ouside and not identifying the pulling guard.In the case of Florida, the DE simply ran to the outside and didn't seal. This opened an opportunity for the play to have a wide open lane. I agree that it's a good play, these examples just aren't all they seem.
***Tyler said... It's easy to see why this offense is a better fit for Auburn than franklin's was***
It is my opinion that THIS is the offense Tubs wanted and thought he could force Franklin to manufacture.
Chris,
First, thanks, good stuff.
The entire blog basically says Malzahn is running tried and true power, counter, trap, zone, and play action, and just packaging it in "the spread" (a la Meyer)...so, assuming Auburn has the players, why wouldn't it work in the SEC?
***Anonymous said... I'd just like to point out on the two video examples of the counter the defenses made some critical errors that opened up big plays.In the case of Auburn, the play side DE correctly followed the OT as he crashed down into the DT, which should push the play inside if not for the pulling guard. However, the play side LB took himself out of the play by moving vertically up field to the DE's ouside and not identifying the pulling guard.In the case of Florida, the DE simply ran to the outside and didn't seal. This opened an opportunity for the play to have a wide open lane. I agree that it's a good play, these examples just aren't all they seem.***
The piece is not presented as a predictor of any given level of success...it's written to illustrate what Malzahn does.
The spread can work anywhere the weather is great. In bad weather venues the spread may see teams call the pass game out.
Go plus one, always for the O into the parts of the field that are sloggy, game them on the outside in coverage.
The only issue with that is there's still a plus one chance for the running QB. Even when you bring numbers he can still run. They can leave both ends unblocked and fuzzy every read the second level has.
What kind of success will the spread have in the weather conferences? It may depend upon play surface, the CFL did wonders with it for year with an extra defender out there, mostly on fast surfaces.
About Smart Football
Smart Football analyzes football's strategies, Xs and Os, and tactics, along with the theory and history supporting them. Chris Brown writes Smart Football, and he has been writing about football, in one form or another, since 2002.@SmartFootball (Twitter)
|
2024-03-18T01:26:36.242652
|
https://example.com/article/4094
|
Intramolecular cyclization of a diruthenium complex: insight into the mechanism of heteroatom-directed intramolecular C-H/olefin coupling reactions.
Complex 2, synthesized by the reaction of {(C5H4N)(μ2-η(5):η(1)-C9H5)}Ru3(CO)9 (1) with 1,5-hexadiene, could further transform to another diruthenium complex 3via intramolecular carbometalation. The results are relevant to the mechanism of transition-metal catalyzed heteroatom-directed intramolecular C-H/olefin coupling reactions.
|
2024-07-06T01:26:36.242652
|
https://example.com/article/4736
|
Enhancing the anaerobic digestion of lignocellulose of municipal solid waste using a microbial pretreatment method.
The use of biological pretreatment in anaerobic digestion systems has some potential; however, to date, these methods have not been able to effectively increase methane production of lignocellulose of municipal solid waste (LMSW). In this study a thermophilic microbial consortium (MC1) was used as a pretreatment method in order to enhance biogas and methane production yields. The results indicated that sCOD concentration increased significantly in the early stages of pretreatment. Ethanol, acetic acid, propionic acid, and butyric acid were the predominant volatile organic products in the MC1 hydrolysate. Biogas and methane production yields of LMSW significantly increased following MC1 pretreatment. In addition, the methane production rate of the treated LMSW was greater than that observed from the untreated sample.
|
2023-08-31T01:26:36.242652
|
https://example.com/article/7958
|
The Most Peculiar Adventures Money Can Buy
What does adventure travel mean in 2018? Two ex-army captains have some very big ideas.
If your idea of travel is kicking back on a yacht for 10 days, it’s time you started thinking bigger. These days, anything is possible – and the only limit is your imagination. Want to recreate a trip to Mars in the middle of the desert, or spend 10 days touring the untouched slopes of Alaska? There’s a travel company for that.
And while the world gets increasingly smaller thanks to air travel, the internet, and that ever burgeoning industry of armchair tourism (cheers David Attenborough) there is also more to explore than ever. That may not be the case for much longer, though, as you’ll probably have been made aware of thanks to… David Attenborough. Because the planet is under threat. From the dying reefs to the dramatically decreasing shark population, to the 150 acres of rainforest lost every minute, the time to see the wonders of the world is now. Or yesterday.
It’s not like we aren’t travelling – 70.8 million Brits went overseas in 2016 – it’s just we’re all travelling to the same places. Skiing in the Alps. City-breaking in Portugal. Holiday-ing on just three of Indonesia’s 17,800 islands. And as for the rest of the world? Well, there’s only so much you can enjoy through a TV screen.
In the last 10 years a handful of forward-thinking adventure-junkies have become aware of this, and hence a new market for exclusive, wildly expensive, if-you-dream-it-you-can-do-it adventure holidays has been born.
Photograph by: Tommy Schultz
One of these men is Geordie Mackay-Lewis – an alumni of the British army with previous experience at another adventure travel company – who’s broken out on his own along with co-founder Jimmy Carroll. Between them the pair have set up Pelorus to make all your weirdest, wildest travel dreams come true.
To give you a flavour of what you can expect from this new breed of adventure travel companies: one of the duo’s recent ‘Unknown’ experiences involved a deep desert insertion using helicopters in southern Israel, traveling to the Jordanian border and the group navigating their way into Wadi Rum desert – where they found their accommodation: pressurised dome tents, which sort of simulated the experience of being on Mars.
If you’re going to put your lives in someone’s hands, it should probably be these guys. Alongside his army credentials, 36-year old Carroll has also managed the largest ever medical research expedition to Everest, and done time as Manchester United’s global tour manager. Mackay-Lewis’ own CV includes two tours of Afghanistan and both desert and jungle warfare.
The duo seem acutely aware of what a privilege it is to explore truly untouched parts of the world. “We’ve got such little time to enjoy our planet and see everything,” says Mackay-Lewis. “The key thing is that people realise our world hasn’t been explored yet, there’s so much more to do and see.”
That privilege comes with a huge amount of responsibility. Because from a conservation perspective, these incredibly unique experiences can be a conflict of interest. There are areas these companies are taking clients to which are completely unregulated and untouched. “If we’re the ones taking people there and visiting them we have to have respect and also write the rule book,” offers Mackay-Lewis. “These are places which humans don’t just go to.”
“It’s even more important to respect the animals there because they don’t run away – because they don’t know who you are or what you are. So up in the polar regions we do say now – when someone asks ‘Can I go and put a pair of sunglasses on a bearded seal’ – we say no, you just can’t do that.”
Right now, the pair are working on a bespoke brief. “A father and son approached us a month ago, and the father said, I want my 15 year old son to experience some of the best experiences the world has to offer, so I want to create a 10 year bucket list” says Mackay-Lewis.
“In 10 years we can do some extraordinary things,” he continues. “We’re going to give him an adventure plan, where he’s going to go through some mountaineering training, some scuba diving training, make sure he has the tools he’ll need to access certain parts of the world.”
For many, relaxing on a beach is a great way to switch off. But for others, particularly those with high pressure jobs and fast-paced city lives, adventure is the only antidote. And the fun starts as soon as you have your first face to face meeting.
“It’s about being kids again,” says Carroll of the initial stages of putting ideas together. “As an adult, you have that sense of safety and security behind everything, but you also need the mentality of a child to create enjoyment and fun and creativity. And we do not work with the standard suppliers, but with experts around the world. From BBC Natural History to an interesting anthropologist who spent 25 years in Papua New Guinea.”
Photo: Jeremy Koreski
With these kind of contacts there is little of the world which is out of bounds. But occasionally someone comes along with an idea that they really have to say no to. “I had a client who wanted to spend a night on an iceberg. I said no,” says Mackay-Lewis. “We create alternate realities and sometimes people get quite carried away about what reality is possible.”
He continues: “There are things which are just physically not possible. One person wanted to reenact The Battle of Britain, and hire ten spitfires and some German bombers. And that’s just not going to happen.”
It’s easy to imagine that we’re in a golden age of exploration, thanks largely to technology. But the human desire for adventure is nothing new. “Through technology advancements we’re now able to go to far flung places pretty comfortably,” says Mackay-Lewis. “It means anyone can be an explorer.”
|
2024-03-01T01:26:36.242652
|
https://example.com/article/8529
|
Demjanjuk on Nazi camp papers
2010-03-24 21:11
Munich - A German police investigator says John Demjanjuk's name is on papers detailing the transfer of guards from an SS training camp to the Nazi's Sobibor death camp.
Demjanjuk, a retired Ohio auto worker who was once a Soviet soldier, is accused of agreeing to serve the SS as a guard at Sobibor after his capture. He is standing trial on 27 900 counts of accessory to murder.
He says he was never at Sobibor and is being mistaken for someone else.
Bavarian police inspector Hugo Daumann told the Munich state court on Wednesday he has seen a copy of a 1943 list of transfers from the Trawniki training camp to Sobibor with Demjanjuk's name on. The original is in Russian archives.
|
2023-11-02T01:26:36.242652
|
https://example.com/article/5372
|
Media playback is unsupported on your device Media caption Voter's views: ''Everyone should be made to exercise their voting right''
Is compulsory voting in a democracy a contradiction in terms? That is the question some Australians have been asking since voting became required by law here nearly a century ago.
The right to vote is a freedom fiercely sought by people all over the world, but Australians do not have a choice.
The continent is part of a small minority of just 23 countries with mandatory voting laws. Only 10 of those enforce them.
Registering to vote and going to the polls are legal duties in Australia for citizens aged 18 and over, and failing to do so can result in a fine and potentially a day in court.
Opponents of the system like Libertarian columnist Jason Kent say this stifles political freedom and threatens the basic principles of democracy.
"People have been sentenced to jail terms for not voting. It's disgusting. It's far from being democratic. We are not a democracy if we can't vote democratically."
But Dr Peter Chen, who teaches politics at the University of Sydney, warns that this type of heated rhetoric blows things out of proportion. He says showing up to the polls every so often is not a huge burden.
"The system demonstrates a social expectation that at a minimum everyone needs to participate every few years and that's a good thing."
High turnout 'myth'
Image caption Failing to vote in Australia may result in a fine or a day in court
Although small, the A$20 (about $18, £12) fine is enough to drive voters to the polls in substantially greater numbers than countries with voluntary voting.
Supporters of the system say Australia boasts some of the highest civic participation in the world, with a reported 94% voter turnout in the last federal election, compared with about 65% in the UK's 2010 general election and an estimated 57% in the 2012 US presidential election.
The tides may be changing though, according to Mr Kent, who says high voter turnout here is overstated.
The idea that high voter turnout based on compulsory voting translates into a politically engaged electorate is nonsensical Paula Matthewson, Political commentator
"High voter turnout is a myth when you consider that 10% of Australians are not even registered. When that myth is debunked, I think you'll see a dramatic shift in public perception of compulsory voting," he said.
That number only reflects registered voters who turned out, and although required by law, in recent years voter registration has seen a slight decline, especially among younger Australians.
According to the Australian Election Commission, a third of the overall number of eligible voters who are not enrolled are between 18 and 24 years old. Prime Minister Kevin Rudd has made mobilising the youth vote central to his 2013 campaign.
Long-time political insider and commentator Paula Matthewson, who makes a conscious decision not to vote and pays the fine instead, says the problem goes beyond young voters.
"The idea that high voter turnout based on compulsory voting translates into a politically engaged electorate is nonsensical. If we moved to a voluntary system, with the level of disenchantment and disengaged voters we have now, no one would vote."
Engaging voters
Image caption Some people are choosing to spoil their ballots rather than vote
And there has been an increase in recent years of what Australians call informal or spoilt ballots - instances where voters either mistakenly or intentionally submit a ballot that is blank or improperly filled in, which cannot be counted in the final tally.
If you look at the international experience, in non-compulsory voting systems, the people who don't vote are the poor and disenfranchised and those are exactly the people we think should be voting Rohan Wenn, Spokesperson, Get Up!
Spoilt ballots count for around 6% of the total votes cast in the 2010 election. Taken together with the number of eligible voters who fail to register, the actual percentage for voter turnout in Australia's federal elections hovers in the low 80s.
Mr Kent says that these statistics show that forcing people to vote does not translate into an engaged electorate. He argues that a non-compulsory voting system would encourage Australians to be more involved.
"If voting was democratic, politicians would be beholden to the voters, they couldn't hold a gun to our heads and force us to vote, they'd have to give us a good reason to vote. They'd have to inspire us."
The idea of abolishing mandatory voting is a familiar topic in Australian politics, most famously espoused by former Liberal cabinet member and Senator Nick Minchin, who is an outspoken opponent of the system.
Earlier this year, the Queensland Liberal Party released a discussion paper on election reforms that included a section on the possibility of ending compulsory voting.
The move was met with outrage from senior Labor party figures, including then Prime Minister Julia Gillard who tweeted: "Fight @theqldpremier's plan to end compulsory voting. Don't let the Liberals make our democracy the plaything of cashed-up interest groups.''
Mr Rudd also broached the topic in a wide-reaching Green Paper released in 2009 asking: "Do you think compulsory voting should continue in Australia?"
Who benefits?
There have been no policy initiatives on the subject from the Labor government at that time or since.
Image caption Voter turnout in the last federal election was reported at 94%
It is widely believed that the Liberal party would have the most to gain if a voluntary voting system were adopted here but James Campbell, state politics editor of the Herald Sun newspaper, explains that the issue is not black and white.
"Both parties have toyed with the idea of abolishing mandatory voting, but the reason it never happened is no-one has been entirely certain about who would benefit from getting rid of it."
Rohan Wenn, spokesperson for the non-partisan political advocacy group Get Up!, says the system protects the rights of marginalised groups.
"If you look at the international experience, in non-compulsory voting systems, the people who don't vote are the poor and disenfranchised and those are exactly the people we think should be voting."
Regardless of partisanship, the current electoral system is largely supported across the country. Dr Chen explains that despite the ongoing debate, there is no sign of any serious measures to end compulsory voting in sight.
"Most Australians are quite comfortable with the electoral process and would be quite suspicious of efforts to change it. We trust the electoral system more than we trust our politicians.
"It's an irony, but we really like our democracy."
|
2024-04-26T01:26:36.242652
|
https://example.com/article/9428
|
Q:
Name of Version property in ServerVersionInfo element for Exchange Server 2016?
With Exchange Server 2016 being available for some time (as of 15. March it's at 2016 CU1), I want to properly detect the Version that gets returned in the SOAP header of each Exchange Web Services response message:
<ServerVersionInfo MajorVersion="" MinorVersion="" MajorBuildNumber="" MinorBuildNumber="" Version="" />
The latest schema version mentioned in e.g. the 'EWS schema versions in Exchange' page is Exchange2013_SP1.
What is the name returned for Exchange 2016?
I do not yet have an Exchange Server 2016 to test against.
Exchange Online (assuming it's always the latest stable MS code, so should be equivalent to 2016) does not return these 'regular' version names, it currently returns V2016_01_06.
I suspect the answer for a 'regular' Exchange 2016 Server to be Exchange2016, can anyone confirm?
A:
We now have a test version of Exchange 2016 installed and this has the following behaviour:
It returns Version="V2016_04_13", so obviously my suspicion was wrong. Exchange 2016 returns a more 'detailed' version number with a 'release date',as does Exchange 365.
You can request both Exchange2016 or something like V2016_04_13(if you want to follow 2016 syntax and use 2016 features).
You will have to know what V2016... versions are available, using the incorrect date will result in The specified server version is invalid.
Quoting from a comment by David Sterling under this answer on 7 Oct 2016:
As of Jan 2016, we started used build dates for versions. We rev the public schema quarterly, so you will notice a rough 3 month addition for the next schema version, etc...Basically the "newest" version is the beta version and can contain breaking changes until the next version is introduced. So right now, V2016_07_13 is considered beta, and we are still adding to it. Once next week rolls around and we introduce V2016_10_XX, V2016_07_13 will be locked and no additional functionality will be added to it.
|
2024-01-28T01:26:36.242652
|
https://example.com/article/9184
|
As a vegetarian, I was pretty happy about recent headlines comparing smoking to bacon, in terms of cancer risk. But the scientist in me wasn’t so happy about how the world’s media covered the announcement. Just because bacon and other processed or cured meats have been shown to cause cancer, it doesn’t mean that eating them is as risky as smoking, drinking, or snorting asbestos.
Basically, it comes down to a question of quantity. Cancer Research UK did a calculation: If we chopped all such meat out of our diets, it would prevent only 8,800 cases of cancer each year in Britain. Compare that to the 64,500 fewer cancer diagnoses in the country if smoking were banned.
But as much as I miss eating bacon and salami, this isn’t the first time we’ve gotten things really wrong when it comes to what’s safe to eat. History is littered with false food scares and conflicting evidence — some from the scientific community, others peddled by amateur nutritionists, “wellness experts,” or even rival food industries. Here are five examples of our food failures since the dawn of the industrial revolution.
|
2024-04-10T01:26:36.242652
|
https://example.com/article/3937
|
Q:
Architecture for easy update of application
I have a system in place which applies calculations to a set of numbers (the specifics aren't really relevant). There are a number of sets of calculations which can be applied by the system users and new sets are added frequently. Currently when a new set of calculations need to be added to the system they are added in to the code base and a new version of the system released. I'd like to be able to add new calculation sets into the system without having to release a whole new version and also to have these new calculations become visible to system users automatically. Currently a new function is created for each set of calculations and a record containing the appropriate function name is added to a system table. These records are visible to system users (function names are aliased of course!) who then select them from a list. The system uses the Eval() function to run the appropriate calculations.
This is a VB6/Access app that I inherited and am currently re-writing in VB.NET and SQL Server.
Does anyone have any advice on how best to do this?
A:
Since you're redoing it in .Net, just put the calculations in plugins. Use reflection to load and examine these assemblies at runtime and present the user with functions.
Divil has a good (but fairly old now) article on writing plugin based applications. It will help you out: http://divil.co.uk/net/articles/plugins/plugins.asp (+ it's in VB.Net)
If you do it this way, all you have to do is drop a dll into the right directory and it just works.
|
2023-12-10T01:26:36.242652
|
https://example.com/article/6545
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.