text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
Before & after: Revealing Churyumov-Gerasimenko's jets
ESA / Rosetta / NavCam / Emily Lakdawalla
Before & after: Revealing Churyumov-Gerasimenko's jets
Adjusting the brightness of NavCam images reveals jets emanating from the comet. There are two jets clearly visible at the neck, but there is also a brighter background near the "body" of the comet at lower left, and a possible area of enhanced brightness to the right of the comet.
Here is a version of the image that has been processed to enhance the jets while maintaining the appearance of the comet nucleus: | 2023-09-21T01:26:19.665474 | https://example.com/article/7397 |
C5 induces different cell death pathways in promastigotes of Leishmania amazonensis.
Leishmaniasis is a neglected infection that is caused by Leishmania protozoa, affecting millions of people worldwide, mainly in tropical and subtropical regions. This disease has different clinical forms: cutaneous, mucocutaneous, and visceral. The drugs that are currently available for the treatment of this infection have limitations, such as high toxicity, long-term treatment, and leads to drug-resistant strains. Numerous studies, in various experimental models, have sought to develop more effective and less toxic chemotherapeutic agents against leishmaniasis. In the present study, we evaluated the mechanism of cell death that is induced by n-benzyl 1-(4-methoxy)phenyl-9H-β-carboline-3-carboxamide (C5) against Leishmania amazonensis. C5 increased reactive oxygen species production, depolarization of the mitochondrial membrane, DNA fragmentation, decrease of cell volume, lipoperoxidation, the accumulation of lipid bodies, and acidic vesicular organelles (AVOs) and caused the intense formation of autophagic compartments in L. amazonensis promastigotes. The results indicate that C5 causes L. amazonensis death through different pathways. | 2023-10-09T01:26:19.665474 | https://example.com/article/8796 |
MAN FILES SUIT AGAINST TV NETWORK, BRISTOL PALIN: LOS ANGELES (AP) - A Los Angeles man is suing the Lifetime Network and Sarah Palin's daughter, Bristol, claiming he was taped heckling her for a planned reality show without his knowledge or consent.
INGLEWOOD (AP) - Police on Thursday detained three men after a bungled robbery at a Southern California clothing store where both the suspected robbers and at least eight employees had trouble getting out of the building.
SAN DIEGO (AP) - Demand for more expensive properties lifted California home prices to a nearly two-year high in May as sales across all pricing categories showed healthy gains, a research firm said Thursday.
SACRAMENTO (AP) - Democrats in the state Legislature held committee hearings on the California budget a day before the constitutional deadline to approve it, despite ongoing disagreements with Gov. Jerry Brown over their plan to make smaller welfare cuts to help balance a $15.7 billion deficit.
OAKLAND (AP) - A nationally recognized charter school organization in California could face a criminal investigation after a state audit found evidence of financial fraud, conflicts of interest and other illegal activities.
SACRAMENTO (AP) - Offenders sentenced to jail could get work release credit for participating in educational, vocational, drug treatment and other programs under a bill approved by the state Senate on Thursday.
LOS ANGELES (AP) - Henry Hill spent much of his life as a "goodfella," believing his last moment would come with a bullet to the back of his head. In the end he died at a hospital after a long illness, going out like all the average nobodies he once pitied.
DENAIR (AP) - A judge heard grisly details of blood-splattered walls and a mother's cries during a preliminary hearing for an 18-year-old Northern California woman accused of attacking her parents last year on Mother's Day.
SACRAMENTO (AP) - State and county officials cannot show how billions of dollars collected through a voter-approved tax on millionaires are being spent or whether the related programs have helped people with mental illness as voters intended, a state watchdog commission reported Tuesday.
MOST PIMP CONVICTIONS TOSSED FOR FORMER SCHOOL BOARD MEMBER: RIVERSIDE (AP) - A state appeals court has thrown out nine of 12 pimping convictions of a former Southern California school board member, but his prison term remains the same.
SANTA BARBARA (AP) - The sexual abuse of a 13-year-old Boy Scout by an adult volunteer was part of a "sordid history of child sexual abuse" within the organization that has been documented internally for nearly a century, the victim's attorney said Monday in his opening statement at a civil trial in California.
SACRAMENTO (AP) - A state employee arrested on suspicion of bringing a loaded gun to the California secretary of state's office had been reprimanded for sending unsolicited messages to female co-workers, according to documents obtained Monday.
LOS ANGELES (AP) - Negotiators working on a new contract for dockworkers at West Coast seaports, which handle about $1 trillion worth of cargo annually, have resolved a key dispute in their difficult talks, an association representing employers said Monday.
LOS ANGELES (AP) - A man described as paranoid shot and wounded a mental health worker Monday during a struggle at a Los Angeles-area clinic where he had sought help, but the employee was expected to survive, officials said.
SAN FRANCISCO (AP) - Kaiser Permanente nurses in California approved a new contract that boosts pay and improves patient care along with health and safety protections for nurses, a union official said Monday. | 2023-12-26T01:26:19.665474 | https://example.com/article/2658 |
NEW YORK (Reuters) - The number of Americans who approve of President Donald Trump rose by 5 percentage points over the past week, but registered voters still favored Democrat Joe Biden for president by a small margin, according to a Reuters/Ipsos opinion poll released on Tuesday.
Slideshow ( 2 images )
The poll, conducted Monday and Tuesday, also showed that the public is paying closer attention to the candidates’ views on the coronavirus outbreak than to what they are saying about the economy, healthcare or immigration. And more people think Biden is better suited to guide the country through the crisis.
Overall, 45% of adults in the United States said they approved of Trump’s job performance, while 48% said they approved of the way he has responded to COVID-19, up 5 and 6 points, respectively, from a similar poll that ran last week. Trump’s approval numbers have been up and down over the past few weeks, however, and it is not yet clear if the public is truly rallying around the president.
Meanwhile, 45% of registered voters said they would back Biden in the Nov. 3 election, while 40% said they would vote for Trump. Biden has maintained a small advantage in support among registered voters over the last four weeks.
The poll was conducted with most Americans forced indoors to protect themselves from the coronavirus that has infected more than 600,000 people in the United States and killed more than 25,000.
After initially downplaying the threat of the virus, Trump has conducted a series of combative news briefings during which he has harangued reporters for criticizing him. Biden, meanwhile, has struggled to remain in the conversation as the media focused on briefings by governors in some of the hardest-hit states.
When asked what was most important to them when deciding how to vote in November’s presidential election, 32% of Americans said it was the candidate’s plan to help the nation recover from the coronavirus. A smaller number said the candidate’s views on the economy (21%), healthcare (13%) or immigration (5%) were most important.
Fifty-two percent of Americans said they felt that Biden was better suited to deal with the coronavirus, while 48% said they thought Trump would be better. Fifty-seven percent also thought Biden would be a better steward of the country’s healthcare system, while 43% said Trump would be better.
Trump, however, had the edge when the public was asked who would be better for the U.S. economy (53% to 47%).
The Reuters/Ipsos poll was conducted online, in English, throughout the United States. It gathered responses from 1,111 American adults, including 937 who identified as registered voters. The poll has a credibility interval, a measure of precision, of plus or minus 4 percentage points. | 2023-10-21T01:26:19.665474 | https://example.com/article/8944 |
Those interested in being tested for match should call Christ Hospital donor coordinators
Dan Becker, 45, was born with a life-threatening birth defect. The tubes that connect his kidneys to his bladder were not functioning from birth, which has meant a life time of depending on kidney donations.
Man seeks kidney donation through yard signs
Those interested in being tested for match should call Christ Hospital donor coordinators
Dan Becker, 45, was born with a life-threatening birth defect. The tubes that connect his kidneys to his bladder were not functioning from birth, which has meant a life time of depending on kidney donations.
An average donated kidney lasts 10 years. Dan had his first transplant at age nine. Miraculously, that kidney lasted for 26 years.
An average wait time on the donor list with his blood type is six years.
After reaching out to family and friends and finding no match, he was forced to start dialysis.
“I think that’s where I reached kind of my lowest,” Becker said. “It was very disheartening and I had no hope.”
But from his hardest moments came a great inspiration. After seeing a similar idea on Facebook, Becker created 60 yard signs promoting his need for a kidney donation.
Family and friends posted them in neighborhoods throughout the area.
Becker said he started getting three to four phone calls a week from people often interested in being tested as a possible match.
“I’ve had people call and just want to pray with me on the phone,” Becker said. “I’ve always gone to church and stuff, but I’ve really gone through a good relationship with God. I do a lot of praying.”
By early May, there were five possible donors found. Since then, one has been ruled out, but Becker is hopeful he’ll get a kidney from one of the other four donors.
While nothing is set in stone, Becker said he is optimistic.
He said he has 15 more signs ready to be put up. If no matches are named by early July, his next idea is car magnets. But he knows that every time the phone rings, it could be a stranger that may end up saving his life. | 2023-09-03T01:26:19.665474 | https://example.com/article/9860 |
President Donald Trump doubled down on threats against Facebook, Twitter and Google Tuesday afternoon, saying the social platforms are "treading on very, very troubled territory and they have to be careful." "Google has really taken advantage of a lot of people and I think that's a very serious thing and it's a very serious charge," Trump told reporters after a meeting with the president of FIFA. "They better be careful because they can't do that to people." A Twitter spokesperson, when asked to respond to Trump's comments, pointed to previous statements and congressional testimony denying any form of conservative bias on the platform. A spokesperson for Facebook did not immediately return request for comment. Trump earlier Tuesday accused Google of altering search results to prioritize negative coverage and left-leaning outlets and warned that the issue "will be addressed."
Trump said in a tweet that the tech giant's search engine had "rigged" news story results to show mostly "bad" stories about him and other conservatives. "Google search results for 'Trump News' shows only the viewing/reporting of Fake New Media," the president said. "In other words, they have it RIGGED, for me & others, so that almost all stories & news is BAD. Fake CNN is prominent. Republican/Conservative & Fair Media is shut out."
Trump added: "Illegal? 96% of … results on 'Trump News' are from National Left-Wing Media, very dangerous. Google & others are suppressing voices of Conservatives and hiding information and news that is good. They are controlling what we can & cannot see. This is a very serious situation-will be addressed!" Around 11 a.m. ET, Trump deleted the original tweets and reposted practically identical language. "When users type queries into the Google Search bar, our goal is to make sure they receive the most relevant answers in a matter of seconds," a Google spokesperson said in a statement Tuesday. "Search is not used to set a political agenda and we don't bias our results toward any political ideology. Every year, we issue hundreds of improvements to our algorithms to ensure they surface high-quality content in response to users' queries. We continually work to improve Google Search and we never rank search results to manipulate political sentiment." Trump also praised the performance of the Nasdaq Composite index, which climbed above 8,000 points for the first time ever Monday. Tweet Google's parent company Alphabet is a key driver of the Nasdaq's performance. The firm's shares were under pressure following Trump's comments, down around 0.5 percent. Later Tuesday, Larry Kudlow, Trump's economic advisor, told Bloomberg that the White House is "looking into" whether Google suppresses positive articles about the president. Kudlow did not provide details on how the White House was looking into the matter. Tweet Some reports have suggested the president was referring to an unscientific report by conservative news website PJ Media, which claimed that 96 percent of Google search results for the word "Trump" showed left-leaning publications. The report places outlets including CNN, The Washington Post and The Guardian on the left of the political spectrum, while placing the likes of Fox News, the New York Post and the Daily Mail on the right.
Big tech to face Congress
Trump's comments couldn't be more timely. Next week, Google, Facebook and Twitter representatives will testify before Congress, discussing censorship and election meddling. The hearings mark the second time representatives from all the companies will be on Capitol Hill to address concerns of election interference. For Facebook, it will be the third, following CEO Mark Zuckerberg's grilling earlier this year over the Cambridge Analytica scandal. Twitter Chief Executive Jack Dorsey and Facebook Chief Operating Officer Sheryl Sandberg are among those confirmed to be attending the hearings. Facebook and Twitter have suspended hundreds of accounts ahead of the November midterm elections to avoid interference from foreign actors. Facebook last week said it had removed 652 pages, groups and accounts linked to Iran over "coordinated inauthentic behavior" targeting people in the U.S., the U.K., Latin America and the Middle East. As of Tuesday, Twitter has removed 770 accounts over "coordinated manipulation" ahead of the midterms. Trump's comments as a whole appear to represent a broader view among conservative circles that digital platforms are censoring them. The president recently accused Twitter of "shadow banning" — allegedly limiting search results — for prominent Republicans, and called the practice "discriminatory and illegal." Twitter has denied the claims. And earlier this month, multiple tech companies, including Apple, Facebook, Google's YouTube, Pinterest and Spotify, clamped down on content by the right-wing conspiracy theorist Alex Jones, removing podcasts, pages and other content. Tech companies said they removed Jones for violating policies related to hate speech and harassment. "Apple does not tolerate hate speech, and we have clear guidelines that creators and developers must follow to ensure we provide a safe environment for all of our users," Apple said at the time. Some right-wing commentators have criticized the mass takedown of Jones' content, saying it amounted to censorship. —CNBC's Sara Salinas contributed to this report.
WATCH: Here's what platforms and governments need for regulation to work: Verge's Patel | 2024-06-16T01:26:19.665474 | https://example.com/article/8542 |
#################### Packetbeat Configuration Example #########################
# This file is an example configuration file highlighting only the most common
# options. The packetbeat.full.yml file from the same directory contains all the
# supported options with more comments. You can use it as a reference.
#
# You can find the full configuration reference here:
# https://www.elastic.co/guide/en/beats/packetbeat/index.html
#============================== Network device ================================
# Select the network interface to sniff the data. On Linux, you can use the
# "any" keyword to sniff on all connected interfaces.
packetbeat.interfaces.device: 0
#================================== Flows =====================================
# Set `enabled: false` or comment out all options to disable flows reporting.
packetbeat.flows:
# Set network flow timeout. Flow is killed if no packet is received before being
# timed out.
timeout: 30s
# Configure reporting period. If set to -1, only killed flows will be reported
period: 10s
#========================== Transaction protocols =============================
packetbeat.protocols.icmp:
# Enable ICMPv4 and ICMPv6 monitoring. Default: false
enabled: true
packetbeat.protocols.amqp:
# Configure the ports where to listen for AMQP traffic. You can disable
# the AMQP protocol by commenting out the list of ports.
ports: [5672]
packetbeat.protocols.cassandra:
#Cassandra port for traffic monitoring.
ports: [9042]
packetbeat.protocols.dns:
# Configure the ports where to listen for DNS traffic. You can disable
# the DNS protocol by commenting out the list of ports.
ports: [53]
# include_authorities controls whether or not the dns.authorities field
# (authority resource records) is added to messages.
include_authorities: true
# include_additionals controls whether or not the dns.additionals field
# (additional resource records) is added to messages.
include_additionals: true
packetbeat.protocols.http:
# Configure the ports where to listen for HTTP traffic. You can disable
# the HTTP protocol by commenting out the list of ports.
ports: [80, 8080, 8000, 5000, 8002]
packetbeat.protocols.memcache:
# Configure the ports where to listen for memcache traffic. You can disable
# the Memcache protocol by commenting out the list of ports.
ports: [11211]
packetbeat.protocols.mysql:
# Configure the ports where to listen for MySQL traffic. You can disable
# the MySQL protocol by commenting out the list of ports.
ports: [3306]
packetbeat.protocols.pgsql:
# Configure the ports where to listen for Pgsql traffic. You can disable
# the Pgsql protocol by commenting out the list of ports.
ports: [5432]
packetbeat.protocols.redis:
# Configure the ports where to listen for Redis traffic. You can disable
# the Redis protocol by commenting out the list of ports.
ports: [6379]
packetbeat.protocols.thrift:
# Configure the ports where to listen for Thrift-RPC traffic. You can disable
# the Thrift-RPC protocol by commenting out the list of ports.
ports: [9090]
packetbeat.protocols.mongodb:
# Configure the ports where to listen for MongoDB traffic. You can disable
# the MongoDB protocol by commenting out the list of ports.
ports: [27017]
packetbeat.protocols.nfs:
# Configure the ports where to listen for NFS traffic. You can disable
# the NFS protocol by commenting out the list of ports.
ports: [2049]
#================================ General =====================================
# The name of the shipper that publishes the network data. It can be used to group
# all the transactions sent by a single shipper in the web interface.
#name:
# The tags of the shipper are included in their own field with each
# transaction published.
#tags: ["service-X", "web-tier"]
# Optional fields that you can specify to add additional information to the
# output.
#fields:
# env: staging
#================================ Outputs =====================================
# Configure what outputs to use when sending the data collected by the beat.
# Multiple outputs may be used.
#-------------------------- Elasticsearch output ------------------------------
output.elasticsearch:
# Array of hosts to connect to. CHANGE AS REQUIRED.
hosts: ["192.168.56.1:9200"]
# Optional protocol and basic auth credentials.
#protocol: "https"
#username: "elastic"
#password: "changeme"
#----------------------------- Logstash output --------------------------------
#output.logstash:
# The Logstash hosts
#hosts: ["localhost:5044"]
# Optional SSL. By default is off.
# List of root certificates for HTTPS server verifications
#ssl.certificate_authorities: ["/etc/pki/root/ca.pem"]
# Certificate for SSL client authentication
#ssl.certificate: "/etc/pki/client/cert.pem"
# Client Certificate Key
#ssl.key: "/etc/pki/client/cert.key"
#================================ Logging =====================================
# Sets log level. The default log level is info.
# Available log levels are: critical, error, warning, info, debug
#logging.level: debug
# At debug level, you can selectively enable logging only for some components.
# To enable all selectors use ["*"]. Examples of other selectors are "beat",
# "publish", "service".
#logging.selectors: ["*"]
| 2023-08-13T01:26:19.665474 | https://example.com/article/1298 |
If She Dies
"If She Dies" is the first segment of the fifth episode of the first season (1985–86) from the television series The Twilight Zone. The teleplay, written by David Bennett Carren, was based on a 1982 story originally written by Carren for the Twisted Tales comic book.
Opening narration
Plot
After a recently widowed father's only daughter is put into a coma after a car accident, he is guided by the apparition of another girl to buy an old wooden bed from an orphanage sale at a convent next door to the hospital. After purchasing the bed, he places it in his daughter's room without knowing why he has performed this action.
That evening, he finds that the bed is haunted by the girl who asked him to purchase the bed. She asks him to find "Toby" for her. Returning to the convent the next day, he learns that the girl's name was Sarah and she died of tuberculosis while sleeping in the bed he bought many decades earlier. He also learns that Toby was her teddy bear. The sister at the convent who remembers Sarah is reluctant to part with the bear due to mistrust, but the father convinces her that Sarah is a ghost, and that the bear is the key to bringing her soul to peace.
He is given the teddy bear and then takes his daughter home from the hospital and places her into the bed he purchased on behalf of Sarah. His daughter wakes up the next morning and asks for Toby before her father can explain anything.
See also
List of The Twilight Zone episodes
External links
Category:1985 American television episodes
Category:The Twilight Zone (1985 TV series season 1) episodes
Category:Ghosts in popular culture
fr:Pour qu'elle ne meure pas | 2023-08-29T01:26:19.665474 | https://example.com/article/7986 |
Blackness (African-American subculture)
REDIRECT Blackness | 2024-05-12T01:26:19.665474 | https://example.com/article/8323 |
Minister of Fire2.
NULL
especially since the 16 month old splits I was picking up from the wood stack felt really light. So, I ordered a moisture meter last week and it got here today. Went ahead and split open a decent sized split and pretty much didn't even need to use the moisture meter. I could feel how damp it was on the inside and the inside was still the same color as the outside was the day we split the wood September 2011.
Anyway, decided to give the new moisture meter a go and the $20 moisture meter said 31%. D'oh. Not ready yet.
Minister of Fire2.
NULL
We TOLD YOU.
You never listen.
I had a couple splits 2 days ago that hissed for a minute. It was....you guessed it, OAK. Over 2 years c/s/s in the field, in single rows, with lots of sun and wind.
Most is fine, but every once in a while..........
Minister of Fire2.
NULL
That's when its cut green it takes 2-3 years to burn properly. Standing snags or deadfall can be good to go the same day or in 6-12 months after bucking/splitting/stacking depending on size of log,tree condition & location.
Minister of Fire2.
NULL
I've got some 14 month old Oak that I've been eyeing because we may run short.......I've pulled a couple of the uglie peices from the top, and they burn pretty darn good....no hissing.....pulled a couple of splits off the top also, reading 18% on a fresh split on some, and 27% on others (stack in an area that gets sun, and breeze all day). I'll burn the uglies in a hot stove for now just to stretch the supply, but my plan is to leave the rest for another 2 years....just gotta get thru this season.
*Life should not be a journey to the grave with the intention of arriving safely in a pretty and well preserved body, but rather to skid in broadside, thoroughly used up, totally worn out, and loudly proclaiming - "WOW, What a ride !"
Feeling the Heat2.
NULL
Before I learned that oak required a lengthy aging, I had burned tw oaok trees in my old "smoke dragon" (dried probaby 5-6 months) and I thought it was worthless stuff. I wish I had those back now so I could age them right. Out here in Kansas oak has been a little hard to come by.
Osburn 2400 Insert - first fired April 5th, 2012.
Did it myself with the help of family, friends, and this forum.
Feeling the Heat2.
NULL
Wow, this thread is killing my buzz. I had a massive red oak score today. Four full pickup loads of rounds. Guess it'll be 2015 before it will ever see the stove. Naaaaa, still very happy with my score.
Minister of Fire2.
NULL
Wow, this thread is killing my buzz. I had a massive red oak score today. Four full pickup loads of rounds. Guess it'll be 2015 before it will ever see the stove. Naaaaa, still very happy with my score.
Click to expand...
Lately, oak is the only thing I have been trying to get now. I'll get far enough ahead to age the stuff correctly. Might have to burn 30 month old stuff next year, but we shall see how it all goes. If I can get on something that will age quicker, I will get some of that for next year and age the oak even more. Patience is a virtue.
Minister of Fire2.
NULL
Wow, this thread is killing my buzz. I had a massive red oak score today. Four full pickup loads of rounds. Guess it'll be 2015 before it will ever see the stove. Naaaaa, still very happy with my score.
Click to expand...
Think of it as money in the bank . Go out and find some silver maple and cherry to make do until the oak is ready. If You do that , You'll really appreciate the wait .Wet oak is pretty much worthless , properly seasoned , it's top shelf .
Minister of Fire2.
NULL
I've got about 3 cords stacked....mixed white and red. Never had a lot of oak around because the place I cut just did not have much in the wood lot. Got into a couple new areas last year.....it'll sit till at least 14-15 I've got another 14 cords and lots more to cut.
"If your wife is fully dressed you need another log on the fire"
Buck 91 on the hearth
Old air tight stove "The Fire Boss" (retired)
Member2.
NULL
especially since the 16 month old splits I was picking up from the wood stack felt really light. So, I ordered a moisture meter last week and it got here today. Went ahead and split open a decent sized split and pretty much didn't even need to use the moisture meter. I could feel how damp it was on the inside and the inside was still the same color as the outside was the day we split the wood September 2011.
Anyway, decided to give the new moisture meter a go and the $20 moisture meter said 31%. D'oh. Not ready yet.
Click to expand...
Yup, last year we started to burn a stack of 2 year old red oak, and was suprised to see it hiss and sizzle. Decided to give it more time and it was the right move. This year (3) it is burning great, even lights up fast when thrown on coals.
Minister of Fire2.
NULL
Hey guys, don't forget that you can burn soft maple 6 months after being split.
Click to expand...
Yeah, I was gonna reply to rudy that as long as he doesn't split the Cherry too big, it'll be OK. Dries pretty fast but it's no soft Maple. I was happy to get the Silver recently, and I'm on the lookout for more...
Minister of Fire2.
NULL
A lot of this wood drying stuff depends on where you stack it, I have a spot on the highest point of my yard where the snow always melts first, since its high it gets wind from all directions, I stacked two cords of oak there and in two years its 20%, its been burning great, no hiss or sizzle, Ive officially designated that area as my oak drying area.
Minister of Fire2.
NULL
We have so much wood around here from our own downed Sandy trees that there is STILL ash/oak the township cut into chunks everywhere. My neighbor and I are thinking about taking a ride around to get it but haven't yet. This time last year, people were stealing our wood, I have stacks, well really piles to be stacked, literally right along the road and not one piece taken. We are just running out of room to stack! Especially for a 3 year oak commitment even though we know it's worth the wait! | 2023-09-22T01:26:19.665474 | https://example.com/article/3182 |
Cruises visiting Wineglass Bay & all Wineglass Bay cruises for 2019
Set on Tasmania's eastern coast, deep amongst the stunning beauty of Freycinet National Park, Wineglass Bay enjoys some of the world's best climate conditions, with over 300 days of sunshine a year. The bay with its 1.8km white sand beach is one of three bays defining the narrow Freycinet Peninsula. In the 1820s whalers came to Wineglass Bay and set up shore bases. Whenever the whalers went about their grisly business, the bay was dyed red with blood - like rich red wine in a glass - hence its name. The shore-based whaling lasted about 20 years and then in 1916 the area was declared a national park.
Offshore, whales, bottlenose dolphins and southern right whales are regular visitors. Onshore, it is the perfect place to stroll and soak up the sun in peace and quiet. All thoroughly enjoy this crescent of shimmering white sands and azure water framed by looming sea cliffs and a wild hinterland of heath and forest. Visitors may even be joined by a wallaby with a joey in its pouch. On its last Royal visit to Australia, the Royal Yacht Britannia stopped here to allow the Queen ashore for an Australian BBQ.
Freycinet National Park offers bushwalks to the pink granite peaks of the Hazards Range that dominate the peninsula. Look down either side of the peninsula for magnificent views. The area has found fame as one of the world's best beaches in a number of lists, but its quiet, pristine nature has not been compromised. After all, there is not a building, fence, or road, in sight. Princess Mary of Denmark, who was born and bred in Tasmania, claims her favourite place in Australia is undoubtedly Wineglass Bay. | 2023-09-15T01:26:19.665474 | https://example.com/article/4202 |
Elderly advocates are slamming a decision by Ontario’s long-term care inquiry not to examine two additional criminal investigations into serial murderer Elizabeth Wettlaufer, details the commission knew for more than year before informing groups taking part in the inquiry.
Advocates for the elderly are slamming a decision by Ontario’s long-term care inquiry not to examine two additional criminal investigations into serial murderer Elizabeth Wettlaufer, details the commission knew for more than year before informing groups taking part in the inquiry.
Ontario Association of Residents’ Councils (OARC) – an advocacy group for the more than 70,000 people in long-term care in the province – submitted a motion earlier this month asking the inquiry to force Woodstock police, London police and the OPP to hand over materials from any criminal investigations in which Wettlaufer was the subject.
The motion comes after the ex-nurse, while serving life in prison for killing eight elderly residents in her care and harming several others, told her jailers in early 2018 that she’d tried to hurt two more residents, including one at London’s Meadow Park nursing home.
The bombshell admission prompted police investigations, but did not result in further charges against her.
Commissioner Eileen Gillese returned a decision Tuesday, declining to issue a summons to the police forces to hand over details about other investigations involving Wettlaufer, the worst health-care killer in Canadian history.
“If you don’t have all the facts, I think it will be a more challenging report. We want to make sure that the report Gillese delivers is full and inclusive and we’re concerned that all of the evidence is not before her,” said Laura Tamblyn Watts, chief public policy officer for CARP, the largest advocacy group for elderly in Canada.
The long-term care homes public inquiry – announced the same day Wettlaufer was sentenced to life in prison in June 2017 – is a lengthy investigation into her crimes and the circumstances, policies and procedures that may have allowed them to go undetected.
Examining Wettlaufer’s latest admissions, even if they didn’t result in charges by police, is relevant to the public inquiry, OARC executive director Dee Lender said.
“Out of the principle of transparency and respect for the purpose of a true public inquiry to examine all evidence that led to the catastrophic crimes, we wished for a different outcome,” she said in an email.
“While we are disappointed with the commission’s decision, we respectfully accept it.”
The commission was notified in January 2018 that Wettlaufer told staff at the Grand Valley Institution for Women in Kitchener she had attempted to harm two other nursing home residents and that police investigations were underway.
One of the residents was identified as Florence Beedall. In her statement, Wettlaufer said she had injected Beedall with insulin hours before her final murder, 75-year-old Arpad Horvath at Meadow Park nursing home in London August 2014.
The commission was told in December 2018 the police investigations into Wettlaufer’s claims were complete and no additional charges would be laid against her.
Participants in the inquiry weren’t notified about Wettlaufer’s new admission until Feb. 4, 2019.
In her decision, Gillese said disclosing that another police probe involving Wettlaufer was underway wasn’t an option since It would interfere with an ongoing investigation or legal proceeding, expressly forbidden under the specific terms of reference for the inquiry.
“To have so much as acknowledged publicly that the new statement had been made would have been a breach of that prohibition,” Gillese said in her decision.
Ontario Nurses Association president Vicki McKenna, whose organization supported OARC’s motion, said it’s deeply concerning the inquiry proceeded with public hearings last summer without any word of the ongoing police investigations.
“It just doesn’t seem right,” she said. “Just knowing that there was knowledge . . . There was time to bring this in and they didn’t, they chose not to. I find that very disheartening, particularly for residents and their families.”
In her 21-page decision, Gillese said the additional police investigations were outside the scope of the inquiry, which was directed to investigate the eight counts of first-degree murder, four counts of attempted murder and two counts of aggravated assault of which Wettlaufer is convicted.
Counsel for the inquiry opposed OARC’s motion, saying there was little to be gained from examining the additional investigations – which include statements and allegations not tested in court – and much to be lost by the delays the last-minute addition would cause.
The lawyer who represented the families of many of Wettlaufer’s victims at the inquiry said the decision not to include the two additional police investigations hasn’t undermined his view of the multi-year investigation.
“Could other witnesses have been called to give evidence? Perhaps. Would their testimony have provided significantly new or contradictory information? I have no reason to believe that it would,” Paul Scott said in an email.
“My confidence in the Gillese inquiry has in no way been shaken by the events that have come to light post-hearing, and I look forward to reading the full report.”
The inquiry is being prepared and formatted in both official languages. The commission will produce its final report to the provincial government by July 31, 2019.
Inquiry timeline
June 2017 – Wettlaufer pleads guilty to eight counts of first-degree murder, four counts of attempted murder and two counts of aggravated assault and is sentenced to life in prison. Public inquiry announced.
January 2018 – Additional police investigations launched after Wettlaufer admits to jailers she tried to harm two additional residents. Inquiry notified about new investigations.
June 2018 – Inquiry public hearings begin at Elgin County Courthouse in St. Thomas.
This Week's Flyers
Comments
Postmedia is pleased to bring you a new commenting experience. We are committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. Comments may take up to an hour for moderation before appearing on the site. We ask you to keep your comments relevant and respectful. Visit our Community Guidelines for more information. | 2023-09-19T01:26:19.665474 | https://example.com/article/6069 |
Author Archive
Dec. 12 |
‘Shirkers’ (2018) is paradoxically, a documentary on a movie titled ‘Shirkers’ (1992), that did not come fully into being. The result is a full film on a half film, a film within a film, on love of films and filmmaking. Even though...
Aug. 22 |
Knowing exactly
what one needs
requires wisdom.
– Shilashanti
In an overheard conversation, participants in a tour group lamented to their guide that there is nothing to buy in the area. Surprised, the guide replied that the hotel they were staying...
Aug. 8 |
Potential is there,
yet as if ‘not there’,
if never actualised.
– Zhaojian
[1] We Have Great Potential: We all have Buddha-nature, which is the perfect potential to become fully liberated and enlightened Buddhas, with True Happiness. This...
Jul. 18 |
Pain is inevitable.
Suffering is optional.
– Buddhist Saying
At the clinic, I saw how a kid was dragged by his mother into the doctor’s room. When the door closed, almost immediately from the outside, some screaming could be heard. Perhaps he... | 2023-09-11T01:26:19.665474 | https://example.com/article/2962 |
<?php
/**
* Copyright (C) 2016 Weibo Inc.
*
* This file is part of Opendcp.
*
* Opendcp is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 2 of the License.
*
* Opendcp is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with Opendcp; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
header('Content-type: application/json');
include_once('../../include/config.inc.php');
include_once('../../include/function.php');
include_once('../../include/func_session.php');
include_once('../../include/layout.php');
$thisClass = $layout;
class myself{
private $module = 'pool';
function getList($myUser = '', $param = array()){
global $thisClass;
$ret=array('code' => 1, 'msg' => 'Illegal Request', 'ret' => '');
if($strList = $thisClass->get($myUser, $this->module.'/'.$param['pool_id'], 'list_nodes', $param)){
$arrList = json_decode($strList,true);
if(isset($arrList['code']) && $arrList['code'] == 0 && isset($arrList['data'])){
$ret = array(
'code' => 0,
'msg' => 'success',
'title' => array(
'<input type="checkbox" id="selectAll" onclick="checkAll(this)"/>',
'#',
'归属服务池',
'IP',
'#',
),
'content' => array(),
);
$ret['count'] = (isset($arrList['query_count'])) ? $arrList['query_count'] : count($arrList['data']);
$ret['pageCount'] = (isset($arrList['page_size'])) ? ceil($ret['count'] / $arrList['page_size']) : 1;
$ret['page'] = (isset($arrList['page'])) ? $arrList['page'] : 1;
$i=0;
foreach($arrList['data'] as $k => $v){
$i++;
$tArr = array();
$tArr['i'] = $i;
$tArr['pool_id'] = $param['pool_id'];
foreach($v as $key => $value){
$tArr[$key] = $value;
}
$ret['content'][] = $tArr;
}
}else{
$ret['code'] = 1;
$arrList = json_decode($strList,true);
$ret['msg'] = (isset($arrList['msg']))?$arrList['msg']:$strList;
$ret['remote'] = $strList;
}
}
$ret['ret'] = $strList;
return $ret;
}
function getInfo($myUser = '', $idx = ''){
global $thisClass;
$ret=array('code' => 1, 'msg' => 'Illegal Request', 'ret' => '');
if($strList = $thisClass->get($myUser, $this->module, $idx)){
$arrList = json_decode($strList,true);
if(isset($arrList['code']) && $arrList['code'] == 0 && isset($arrList['data'])){
$ret = array(
'code' => 0,
'msg' => 'success',
'content' => array(),
);
$ret['content']=$arrList['data'];
}else{
$ret['code'] = 1;
$arrList = json_decode($strList,true);
$ret['msg'] = (isset($arrList['msg']))?$arrList['msg']:$strList;
$ret['remote'] = $strList;
}
}
$ret['ret'] = $strList;
return $ret;
}
function update($myUser = '', $action = '', $param = array(), $id = ''){
global $thisClass;
$ret = array('code' => 1, 'msg' => 'Illegal Request', 'ret' => '');
if($action){
if($strList = $thisClass->get($myUser, $this->module.'/'.$id, $action, $param)){
$arrList = json_decode($strList,true);
if(isset($arrList['code']) && $arrList['code'] == 0){
$ret = array(
'code' => 0,
'msg' => 'success',
);
}else{
$ret['code'] = 1;
$arrList = json_decode($strList,true);
$ret['msg'] = (isset($arrList['msg']))?$arrList['msg']:$strList;
$ret['remote'] = $strList;
}
}
$ret['ret'] = $strList;
}
return $ret;
}
function checkParam($action='add',$name='',$value=''){
$ret=array();
switch($name){
case 'nodes':
$value=preg_split("/[\s,;]+/",$value);
if(is_array($value)){
foreach($value as $v){
switch($action){
case 'add':
if(filter_var($v, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) $ret[]=$v;
break;
case 'del':
if((int)$v>0) $ret[]=(int)$v;
break;
}
}
}else{
switch($action){
case 'add':
if(filter_var($v, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4)) $ret[]=$v;
break;
case 'del':
if((int)$v>0) $ret[]=(int)$v;
break;
}
}
break;
default:
$ret=$value;
break;
}
return (empty($ret)) ? false : $ret;
}
}
$mySelf=new myself();
/*权限检查*/
$pageForSuper = false;//当前页面是否需要管理员权限
$hasLimit = ($pageForSuper)?isSuper($myUser):true;
$myAction = (isset($_POST['action'])&&!empty($_POST['action']))?trim($_POST['action']):((isset($_GET['action'])&&!empty($_GET['action']))?trim($_GET['action']):'');
$myPage = (isset($_POST['page'])&&intval($_POST['page'])>0)?intval($_POST['page']):((isset($_GET['page'])&&intval($_GET['page'])>0)?intval($_GET['page']):1);
$myPageSize = (isset($_POST['pagesize'])&&intval($_POST['pagesize'])>0)?intval($_POST['pagesize']):((isset($_GET['pagesize'])&&intval($_GET['pagesize'])>0)?intval($_GET['pagesize']):$myPageSize);
$fPool=(isset($_POST['fPool'])&&!empty($_POST['fPool']))?trim($_POST['fPool']):((isset($_GET['fPool'])&&!empty($_GET['fPool']))?trim($_GET['fPool']):'');
$fIdx=(isset($_POST['fIdx'])&&!empty($_POST['fIdx']))?trim($_POST['fIdx']):((isset($_GET['fIdx'])&&!empty($_GET['fIdx']))?trim($_GET['fIdx']):'');
$myJson=(isset($_POST['data'])&&!empty($_POST['data']))?trim($_POST['data']):((isset($_GET['data'])&&!empty($_GET['data']))?trim($_GET['data']):'');
$arrJson=($myJson)?json_decode($myJson,true):array();
//记录操作日志
$logFlag = true;
$logDesc = 'FAILED';
$arrRecodeLog=array(
't_time' => date('Y-m-d H:i:s'),
't_user' => $myUser,
't_module' => '节点管理',
't_action' => '',
't_desc' => 'Resource:' . $_SERVER['REMOTE_ADDR'] . '.',
't_code' => '传入:' . $myJson . "\n\n",
);
//返回
$retArr = array(
'code' => 1,
'action' => $myAction,
);
if($hasLimit){
$retArr['msg'] = 'Param Error!';
switch($myAction){
case 'list':
$logFlag = false;//本操作不记录日志
$arrJson = array(
'page' => $myPage,
'page_size' => $myPageSize,
'pool_id' => $fPool,
'ip' => $fIdx,
);
$retArr = $mySelf->getList($myUser, $arrJson);
$retArr['page'] = $myPage;
$retArr['pageSize'] = $myPageSize;
$retArr['pageCount'] = ceil($retArr['count']/$retArr['pageSize']);
if($retArr['page'] > $retArr['pageCount']) $retArr['page'] = 1;
break;
case 'insert':
if($myStatus > 0){ $retArr['msg'] = 'Permission Denied!'; break; }
$arrRecodeLog['t_action'] = '添加';
if(isset($arrJson) && !empty($arrJson)){
$poolId=$arrJson['id'];
if(isset($arrJson['id'])) unset($arrJson['id']);
if($arrJson['nodes'] = $mySelf->checkParam('add','nodes', $arrJson['nodes'])){
$retArr=$mySelf->update($myUser, 'add_nodes', $arrJson, $poolId);
$logDesc = (isset($retArr['code']) && $retArr['code'] == 0) ? 'SUCCESS' : 'FAILED';
}
}
break;
case 'delete':
if($myStatus > 0){ $retArr['msg'] = 'Permission Denied!'; break; }
$arrRecodeLog['t_action'] = '删除';
if(isset($arrJson) && !empty($arrJson)){
$poolId=$arrJson['id'];
if(isset($arrJson['id'])) unset($arrJson['id']);
if($arrJson['nodes'] = $mySelf->checkParam('del','nodes', $arrJson['nodes'])){
$retArr=$mySelf->update($myUser, 'remove_nodes', $arrJson, $poolId);
$logDesc = (isset($retArr['code']) && $retArr['code'] == 0) ? 'SUCCESS' : 'FAILED';
}
}
break;
}
}else{
$retArr['msg'] = 'Permission Denied!';
}
//记录日志
if($logFlag){
$arrRecodeLog['t_desc'] = $logDesc.', '.$arrRecodeLog['t_desc'];
$arrRecodeLog['t_code'] .= '外部接口传入:' . json_encode($arrJson,JSON_UNESCAPED_UNICODE) . "\n\n";
$arrRecodeLog['t_code'] .= '外部接口返回:' . str_replace(array("\n", "\r"), '', $retArr['ret']) . "\n\n";
$arrRecodeLog['t_code'] .= '返回:' . json_encode($retArr,JSON_UNESCAPED_UNICODE);
if(empty($arrRecodeLog['t_action'])) $arrRecodeLog['t_action'] = $myAction;
logRecord($arrRecodeLog);
}
//返回结果
if(!isset($retArr['action']) || empty($retArr['action'])) $retArr['action'] = $myAction;
if(isset($retArr['ret'])) unset($retArr['ret']);
echo json_encode($retArr, JSON_UNESCAPED_UNICODE);
?>
| 2024-04-10T01:26:19.665474 | https://example.com/article/3204 |
Non programmers reading code (code as documentation) - smokeonline
https://github.com/JpOnline/Blog/blob/master/language.md
======
smokeonline
This idea passes through BDD, Ubiquitous language, code as documentation and
single source of truth.
Do you think is possible and desirable to have code so idiomatic that a domain
specialist would be able to understand a functionality by looking at the code?
| 2023-11-28T01:26:19.665474 | https://example.com/article/2239 |
Multicellular Mathematical Modelling of Mesendoderm Formation in Amphibians.
The earliest cell fate decisions in a developing embryo are those associated with establishing the germ layers. The specification of the mesoderm and endoderm is of particular interest as the mesoderm is induced from the endoderm, potentially from an underlying bipotential group of cells, the mesendoderm. Mesendoderm formation has been well studied in an amphibian model frog, Xenopus laevis, and its formation is driven by a gene regulatory network (GRN) induced by maternal factors deposited in the egg. We have recently demonstrated that the axolotl, a urodele amphibian, utilises a different topology in its GRN to specify the mesendoderm. In this paper, we develop spatially structured mathematical models of the GRNs governing mesendoderm formation in a line of cells. We explore several versions of the model of mesendoderm formation in both Xenopus and the axolotl, incorporating the key differences between these two systems. Model simulations are able to reproduce known experimental data, such as Nodal expression domains in Xenopus, and also make predictions about how the positional information derived from maternal factors may be interpreted to drive cell fate decisions. We find that whilst cell-cell signalling plays a minor role in Xenopus, it is crucial for correct patterning domains in axolotl. | 2024-02-26T01:26:19.665474 | https://example.com/article/1533 |
The present invention relates to the art of press moulding, and more particularly to a method of manufacturing hollow pieces.
The method according to the invention may be most advantageously used in the manufacture of the blades and spars of the helicopter rotors and steering rotors, the blades of the aircraft propellers and fan blades.
Methods of manufacturing hollow pieces by pressing a blank are widely known. The pieces obtained by these methods are of a constant cross-sectional shape over the entire length.
Furthermore, the methods of manufacturing metallic spars for the rotor blades of helicopters by pressing a blank with subsequent treatment thereof are also widely known.
By this method the blade spars made of an aluminium alloy are manufactured in the following manner. An aluminium alloy ingot is placed into a press chamber and is heated up to the plastic state. The press chamber is provided with a cavity corresponding to the shape of the outer surface of the spar with predetermined allowances for subsequent machining, as well as with a mandrel having a cross-sectional shape corresponding to the cross-sectional shape of the spar cavity. The mandrel and the cavity are disposed relative to each other so that the space defined therebetween corresponds to the spar wall's thickness with an allowance for machining. The blank portions, which are sectioned by the mandrel partitions, are pressed over the inner surface of the spar, whereafter they are welded under pressure and heat during the shaping of the outer surface in the press chamber cavity.
The resulting blank comprises a hollow press shaped piece of a constant cross-sectional shape. In order to obtain a spar from this piece, the latter is subjected to a number of production treatment steps including heat treatment, dressing, machining (milling, grinding, scraping, polishing), as well as twisting about the longitudinal axis, surface hardening, application of electrolytic coating. These steps are required to obtain sufficient mechanical properties and dynamic strength, a predetermined aerofoil shape, as well as corrosion resistance.
The above-mentioned production treatment steps require a large number of complicated, cumbersome and expensive equipment. A large volume of wastes results from this treatment.
In addition, by the above-described method a spar is obtained with a constant cross-sectional shape of the cavity over the entire length thereof, whereby rational arrangement of the blade based upon mass, aerodynamic and elastic characteristics determining the rotor efficiency and service life depending upon the dynamic strength conditions is limited. These characteristics include an optimum mass distribution over the length and width of the blade, a variable shape of the blade in a plan view, a variable arrangement to aerofoils as to the type and thickness thereof, great blade twist angles, elastic properties of the blade variable with the length, which are determined by its cross-sectional shape and wall thickness also variable over the length. | 2024-02-06T01:26:19.665474 | https://example.com/article/5558 |
Corn
Corn was first recognized as a valuable food crop in pre-historic Mexico. As it contains a high level of resistant starch, which acts like dietary fibre, corn is particularly beneficial to the digestive system. It also has a low glycemic index or G.I.. | 2023-10-13T01:26:19.665474 | https://example.com/article/7900 |
Below is an article first published in 1994 in "America" Magazine in which this Jesuit theologian, created a cardinal by John Paul II, treats issues at the centre of the conference on "Misunderstandings. The Catholic Church and the Media", held in the Vatican on 10 November [2011].
Having run afoul of newspaper reporters at various times, I am always delighted to learn that even bishops sometimes fall into traps. The Jesuit Peter Henrici, before he himself became a bishop in Switzerland, told an instructive story (a true one, I hope) about a European bishop arriving in New York City. He was asked by an aggressive reporter: "When you come to New York do you go to a night club?" The bishop, not wishing to give a full account of the matter, by nature asked with mock naivete: "Are there night clubs in New York?" He was shocked the next morning to read in the paper the headline, "Bishop's First Question: Are There Night Clubs in New York?" The headline was not untrue, but, like so many news stories, it failed to communicate the truth.
Communication of the truth is not an optional matter for the church. From her divine founder the church has a commission to spread to the whole world the good news of Jesus Christ, including the truth which Christ taught which he was and is. In every age the church has made use of the currently prevalent media — oral proclamation, letters, folio manuscripts, printed tracts, radio messages and television broadcasts. Speaking of new mass media, Pope Paul VI declared in 1975: "The church would feel guilty before the Lord if she did not utilize these powerful means of communication that human skill is daily rendering more perfect". Pope John Paul II has frequently called attention to the immense power of the communications media and the importance of keeping them at the service of truth, justice and moral decency. It is a particular responsibility of the lay faithful, he says, to prevent these media from being used to manipulate and misinform.
The church has not been conspicuously successful in its relations with the press. Everybody from Archbishop William H. Keeler to Bill Moyers has been saying this in recent months. Some put the blame primarily on church bureaucrats, who are said to be incompetent in presenting the church's story. Others blame the journalists for their allegedly anti-Catholic bias. Neither of these contributing factors can be denied, but the real sources of the difficulty are deeper.
Marshall McLuhan coined the aphorism, "The medium is the message". Like most aphorisms, it is not completely true, for no medium is confined to a single message. But the saying calls attention to the fact that there must be a certain affinity between the medium and the message. Every medium is predisposed toward a certain type of message and resistant to messages of certain other types. It will tend to twist the message to suit its own communicative powers.
Many of the difficulties between the church and the press can be explained if one takes account of the nature of the church's message and the communicative powers of journalism. The two are, I believe, in necessary tension. Seven points of contrast may be mentioned.
First, the content of the church's message is the holy mystery of God's presence and redemptive
activity in Jesus Christ. This is a mystery of faith, to be approached in a posture of reverent worship. The press is by nature investigative and, one might almost say, iconoclastic. Far from being reverent, it revels in exposing what is pretentious, false and scandalous. The Catholic Church, with its exalted claims, is a particularly tempting target.
Second, the essential message of the church is the one and eternal Gospel. Convinced of the permanent validity of God's revelation in Christ, the church seeks to maintain continuity with its own past. It cherishes stability and shuns innovation. The press, by contrast, lives off novelty. It thrives on the ephemeral and panders to the "itching ears" of its readers. In reporting religious news, it accents what is new and different, thus giving the impression that the church is in continual turmoil.
Third, the church seeks to promote unity and reconciliation, minimizing discord and dissent. The news media, however, specialize in disagreement and conflict which evidently arouse greater interest and boost circulation. A story without a struggle between contending parties will frequently be turned down as dull. If "no news is good news", it follows that good news is hardly newsworthy. Understandably, therefore, the press tends to give the impression that the church is divided into warring factions and that every point of dogma is hotly contested within the church itself.
Fourth, the church seeks to dispose people to receive interior grace with a view to eternal salvation. These spiritual blessings, however, are not sufficiently concrete to make good copy. The press, therefore, tends to overlook the spiritual side of the church's mission and to concentrate on more tangible phenomena. Doctrinal pronouncements of the church are of little interest to the popular media unless they have a bearing on the usual fare of the Press. Church teaching is very selectively reported, often in such a way as to leave the impression that the Pope is chiefly interested in sex, politics and power.
Fifth, the press in a democratic society tends to import democratic criteria into its assessment of any organization. It has great difficulty in appreciating a hierarchical society in which the leaders hold their authority not from the people but from Christ, by apostolic succession. Any effort by the church to control the teaching of its own members is regarded as equivalent to censorship of the press by the state. Journalism, therefore, has a built-in bias against the authoritative teaching of popes and bishops, especially where that teaching runs against the ethos of contemporary democratic culture. The disobedient priest and the dissident theologian are lionized as champions of freedom.
Sixth, the teaching of the church on matters of belief and moral practice is frequently complex and subtle. As a result of hundreds of years of acute theological analysis, it deals with fine points that cannot be expressed without technical terms. The precise distinctions of dogma and moral teaching demand a degree of attention that cannot be expected of the average reader. The press and the electronic media are hungry for stories that are short, simple and striking. If they report doctrinal statements at all, they slur over nuances and qualifications that may be crucial.
Seventh, the church aims to persuade its hearers of the truth of revelation. It seeks to arouse a firm commitment to its creed and to the following of Christ. Journalism, by contrast, intends to report facts that are accessible even to unbelievers and to give an account that is acceptable to people of any or no religious bend. The secular press cannot presuppose or assert the truth of revelation, especially as that revelation is interpreted in any particular community of faith.
For these and other reasons, which readers of this magazine can no doubt supply, a permanent inbuilt tension exists between the church and the popular media of communication. The church cannot rely primarily on secular journalism to communicate its message to its own members. The formation of Catholics normally takes place in a context of faith and worship. The ideal framework for such formation is the liturgy, where the celebrant is able to preach on the word of God. Beyond this, religious education can be conducted in the family, in catechetical instruction and in Catholic schools. Religious news, including current official teaching, is most suitably conveyed in an ecclesial environment rather than through the secular press.
There is clearly a place for religiously oriented journalism that tries to offset the natural bias of the media to which I have called attention. The Christian press should consciously endeavor to present the church as it understands itself with the emphases that flow from faith. The ecclesially responsible segment of the press, while trying to reach out to a broader public, will be on guard against the temptation to indulge in iconoclasm and to exploit the popular appetite for the sensational and the scandalous. While censorship by church authorities is not desirable, a measure of self-censorship on the part of editors and reporters may properly be expected.
Without prejudice to the religious press, it must be recognized that many Catholics learn about what is happening in their Church primarily, or in great part from the secular media. It is also true that the church has a responsibility to communicate not only with its own members but with the general public. The popular media of communication have a legitimate interest in religious news. It would be neither desirable nor possible to keep the Catholic Church out of the secular press.
This being the case, greater efforts must be made from both sides to bridge the barriers between the church and the popular media. From the side of the church vast improvements have been made in recent decades, but there is still a long way to go. It seems to be generally agreed that the church could do a much better job publicizing its views on controversial issues such as marriage and divorce, contraception, homosexuality, abortion or women's ordination. The doctrinal pro-
nouncements of Roman authorities are often expressed in precise, judicial terms and issued in an authoritative tone that is disconcerting to people accustomed to discussion and argument. I personally believe that the official positions of the Catholic Church are consonant with reason and favorable to human dignity, but they are too easily portrayed as arbitrary and dehumanizing.
One example would be the "Declaration on Certain Questions Concerning Sexual Ethics" issued by the Congregation for the Doctrine of the Faith on Dec. 29, 1975. The treatment of homosexuality in this document infuriated many of the gay and lesbian communities. Shortly afterward on Feb. 11, 1976, Bishop Francis Mugavero of Brooklyn NY, issued a pastoral letter, "Gift of Sexuality", commenting in a very sensitive way on the C.D.F. declaration. If that commentary had appeared only with the declaration itself, it would have done much to defuse the anger.
In recent years it has fortunately become common that sensitive documents are accompanied by explanatory press releases and are presented at press conferences and that bishops receive advance copies so that they are not caught off guard. The release of the Encyclical "Veritatis Splendor" last fall, both in Rome and in this country, provides an excellent model to be followed.
Not content to ward off negative reporting, the church may advantageously mount occasions at which it can show itself in a favorable light. An example would be the Pope's visit to the World Youth Day at Denver last year. Although the media showed a tendency to focus on divisive issues that were marginal to the event, the coverage was on the whole favorable, and deservedly so. The Pope himself, the bishops and the young people gave an excellent account of themselves and their faith.
The Catholic Church can take advantage of the great interest that it inevitably holds for the press. Because of its numinous ritual, its long history, its worldwide expansion and its insertion into the cultures of many lands, the church is an object of fascination to many who do not share its faith. Efforts should be made to see that the beautiful, edifying and spiritually inspiring aspects of the church are given due emphasis. The recent restoration of Michelangelo's frescoes for the Sistine chapel and the recent completion of the Catechism of the Catholic Church provide splendid opportunities for the church to show its best side. Perhaps more could be done to exhibit the church as a worldwide force for peace, love and international understanding at a time when whole nations are being dissolved by the forces of hatred and division.
From the standpoint of the news media, conscious efforts should be made to restrain the negative tendencies to which I have called attention. At times it may be necessary to resist the temptation to stimulate sales by spreading unfounded rumors or publishing slanted accounts. I recognize that the press has a legitimate interest in reporting bad as well as good news about the church. But more care must be taken to put the bad news in proper context and to give greater emphasis to the elements that journalism is inclined to neglect. As many critics have pointed out, most newspapers and magazines have no professionally qualified reporters in the field of religion. Such ignorance on the part of reporters would not be tolerated in other areas, such as politics, sports and business.
While every effort should be made to improve the handling of religious news, we cannot hope for total success. Christ, it is often said, was the perfect communicator. In him, as nowhere else, the medium and the message did coincide. He literally was the Gospel that he proclaimed. He communicated it without fear or compromise, by word and deed. But he met with misunderstanding and hostility. He clearly told his disciples to expect a similar reception: "If they persecuted me, they will persecute you". (Jn 15:20). Because the Gospel is alien to the world around us, it will always be, in some respects, a sign of contradiction. The secular press, because it belongs to this world and is directed towards a worldly audience, will never be the ideal organ for transmitting the Christian message. While relying on other media as well, the church must relate to the press as best it can, with full awareness that tensions and oppositions will persist as long as human history lasts.
Taken from:
L'Osservatore Romano
Weekly Edition in English
16 November 2011, page 7
L'Osservatore Romano is the newspaper of the Holy See.
The Weekly Edition in English is published for the US by: | 2023-10-19T01:26:19.665474 | https://example.com/article/3140 |
ntonia has been acting professionally since she was 12. Her debut role was in 1997 playing Mandy McFarlane, one of the leads in the television series, Mirror Mirror – Series 2. This was followed by the role of Jem in William Shatner’s A Twist in the Tale. Antonia’s next project was the immensely popular series The Tribe in which she played one of the leading roles, Trudy, from 1998 until 2003.
As a young adult, Antonia worked on three separate series of Power Rangers and then, in 2005, Antonia began her six season stint playing Loretta West in the award winning series Outrageous Fortune. After filming completed on Outrageous, Antonia went on to have roles in the tele-movies Spies and Lies, playing Mavis, and The Women’s Vote, playing Katrine.
In the last few years. she played leading roles in three feature films: Timeslow, The Cure and White Lies – the latter of which was selected by New Zealand as its entrant into the 2014 Academy Awards. She also took on two presenting roles, first for the travel show My Kinda Place and next for the tv series that follows the journey of the contestants in the Smokefree Rockquest.
Television-wise, Antonia played leading roles in both The Blue Rose (2012), as Jane, and in the World War One drama Anzac Girls (2013), as Hilda, featured as a guest lead on the WGN flagship show, Salem (2014). Last year she joined Rebecca Gibney in the Australian series Winter, playing Detective Alesia, before returing home to star in the Outrageous Fortune prequel, Westside.
Antonia loves to perform in the theatre. Her notable roles include Kate Hardcastle in She Stoops to Conquer (2009), numerous characters in The Vagina Monologues (2010), Sally Bowles in Cabaret (2010-2011) and Laura Wingfield in The Glass Menagerie (2013).
Antonia has received a number of accolades for her work. This year, alongside the rest of the cast of Anzac Girls, she won “Best Ensemble” at the Equity Awards. In 2013 Antonia was awarded the “Best Actress” award at the Women’s Institute of Film and Television Showcase in America for her work in White Lies, was nominated for “Best Actress” in the Seoul International Drama Awards for The Blue Rose, and her portrayal of Laura Wingfield in The Glass Menagerie was judged the “Best Theatrical Performance of 2014” in Auckland’s Best Of Awards. Also, in 2008 she was awarded “Best Supporting Actress” at the NZ Film and Television Awards for Outrageous Fortune, and prior to this win she had received nominations in the same category in 2006 and 2007.
She was also nominated for “Best Actress” in the TV Guide Peoples Choice Awards in 2015 for her work on Anzac Girls, in 2014 for her work on The Blue Rose, and in 2005 and 2011 for her work on Outrageous Fortune.
Antonia has completed a two-year acting course studying the Stanford Meisner technique in New Zealand (2005-2007) and has also studied acting with Philippe Gaulier at his school in Paris (2007), and with Ivana Chubbuck at her studio in Los Angeles in 2014-15. She has also recently she completed a Bachelor of Arts degree, majoring in English Literature. | 2023-12-09T01:26:19.665474 | https://example.com/article/5179 |
Intestinal inflammation modulates expression of 11beta-hydroxysteroid dehydrogenase in murine gut.
The effect of glucocorticoids is controlled at the pre-receptor level by the activity of 11beta-hydroxysteroid dehydrogenase (11HSD). The isoform 11HSD1 is an NADP+ -dependent oxidoreductase, usually reductase, that amplifies the action of glucocorticoids due to reduction of the biologically inactive 11-oxo derivatives cortisone and 11-dehydrocorticosterone to cortisol and corticosterone. The NAD+ -dependent isoform (11HSD2) is an oxidase that restrains the effect of hormones due to 11beta-oxidation of cortisol and corticosterone to their 11-oxo derivatives. Although the immunosuppressive and anti-inflammatory effects of glucocorticoids are well known, the relationship between inflammation and local metabolism of glucocorticoids is not well understood. In this study, we demonstrated that colitis induced by dextran sulfate sodium modulates colonic 11HSD1. Experimentally induced intestinal inflammation stimulated colonic NADP+ -dependent but not NAD+ -dependent 11HSD activity. Colonic 11HSD1 mRNA was increased, whereas 11HSD2 mRNA was not changed. Additional parallel studies revealed a similar pattern of 11HSD1 mRNA induction in mesenteric lymph nodes and intestinal intraepithelial lymphocytes, but not in spleen and peritoneal macrophages. These data suggest that inflammation modulates local metabolism of glucocorticoid and support the notion that pre-receptor regulation of endogenous corticosteroids might play a role in inflammatory processes. | 2023-09-13T01:26:19.665474 | https://example.com/article/6644 |
Q:
WPF - bind a listbox to a list - what am I doing wrong?
I'm trying to do something very basic here, something I wouldn't have expected to give me this many problems. I have a public property on my main Window class called ItemList which is of type List<string>. I add to this list throughout the life of the program, and would like the ListBox control I have on my form to automatically update when I add new items to the ItemList property.
So far, I have the following XAML:
<Window x:Class="ElserBackupGUI.Main"
xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
Title="Backup Profile Editor [New Profile]" Height="480" Width="640">
<DockPanel>
<Menu DockPanel.Dock="Top">
<MenuItem Header="File">
<MenuItem Header="Open"/>
</MenuItem>
</Menu>
<StackPanel Orientation="Vertical" DockPanel.Dock="Top" Margin="10 10 10 3">
<TextBlock>Items to backup:</TextBlock>
</StackPanel>
<DockPanel DockPanel.Dock="Bottom" Margin="10 0 10 10">
<StackPanel Orientation="Horizontal">
<Button Name="AddDirectoryButton" Height="22.725" Width="120" Margin="0 0 6 0" Click="AddDirectoryButton_Click">Add Directory...</Button>
<Button Name="AddFileButton" Height="22.725" Width="90" Margin="0 0 6 0" Click="AddFileButton_Click">Add File...</Button>
<Button Name="RemoveDirectoriesButton" Height="22.725" Width="75.447" Margin="0 0 6 0">Remove</Button>
</StackPanel>
</DockPanel>
<ListBox Name="SelectedItems" Margin="10 0 10 10" ItemsSource="{Binding Path=ItemList}"/>
</DockPanel>
</Window>
The relevant code-behind code looks like:
public partial class Main : Window
{
private string _lastFolder = string.Empty;
private ObservableCollection<string> _itemList = new ObservableCollection<string>();
public ObservableCollection<string> ItemList {
get { return _itemList ?? (_itemList = new ObservableCollection<string>()); }
set { _itemList = value; }
}
public Main()
{
InitializeComponent();
ItemList.Add("test item");
DataContext = this;
}
private void AddDirectoryButton_Click(object sender, RoutedEventArgs e)
{
FolderBrowserDialog dialog = new FolderBrowserDialog();
if (!string.IsNullOrEmpty(_lastFolder))
dialog.SelectedPath = _lastFolder;
if (dialog.ShowDialog() == System.Windows.Forms.DialogResult.OK)
{
_lastFolder = dialog.SelectedPath;
ItemList.Add(dialog.SelectedPath);
}
}
private void AddFileButton_Click(object sender, RoutedEventArgs e)
{
OpenFileDialog dialog = new OpenFileDialog();
if (!string.IsNullOrEmpty(_lastFolder))
dialog.InitialDirectory = _lastFolder;
if (dialog.ShowDialog() == System.Windows.Forms.DialogResult.OK)
{
_lastFolder = System.IO.Path.GetDirectoryName(dialog.FileName);
SelectedItems.ItemsSource = null;
ItemList.Add(dialog.FileName);
}
}
}
I'm relatively new to WPF and most of the tutorials seem overly complicated for such a simple problem. I can't seem to get anywhere here - what am I missing?
A:
You should use BindingList<T> or ObservableCollection<T> instead of List<T>.
The problem is that, for binding to work the way you want, it needs to implement INotifyCollectionChanged or IBindingList. List<T> does not support this.
Edit:
After reviewing your changes, there is still one problem.
In the AddFileButton_Click event handler, remove the following line:
SelectedItems.ItemsSource = null;
It is explicitly removing your binding, and causing the list box to clear. If you remove that, your code should work as-is.
However, I do recommend changing your collection definition and constructor to something more like:
// No need for the null checking every time, or public setter. They just cause issues
public ObservableCollection<string> ItemList
{
get;
private set;
}
// Add construction here, now that we're using an auto-prop
public Main()
{
this.ItemList = new ObservableCollection<string>();
InitializeComponent();
ItemList.Add("test item");
DataContext = this;
}
| 2024-04-02T01:26:19.665474 | https://example.com/article/9627 |
Q:
How to use Android applications lacking Application() class?
A lot of Google's recent sample Android apps, such as the Kotlin Sunflower sample for Jetpack, don't seem to have a file that subclasses the Application() class. They just jump straight into the activities.
Is this the new best practice?
How to you use things like Dagger2 or Koin without overriding onCreate() in the Application class? I'm yet to read a How To for dependency injection that doesn't involve some change to Application.onCreate().
I'm trying to learn Android/Kotlin, and I'm using Google's samples as my guide.
If the answer to the DI question is to add a MyApplication.kt file to a project that lacks one, how do I go about that? Does the AndroidManifest.xml file need changing or anything?
Or should I do it some other way in the JetPack/Architecture Components world?
Apologies if this has been asked and answered elsewhere. I'm very new to this and don't even know the terminology for an app that lacks the MyApplication file, so it's been hard for me to search for.
thanks in advance
John
A:
A lot of Google's recent sample Android apps, such as the Kotlin Sunflower sample for Jetpack, don't seem to have a file that subclasses the Application() class. They just jump straight into the activities.
Is this the new best practice?
If you don't need an Application class you do not have to have an empty one. It will just use the default Application the framework provides.
How to you use things like Dagger2 or Koin without overriding onCreate() in the Application class? I'm yet to read a How To for dependency injection that doesn't involve some change to Application.onCreate().
Just create an application class.
I'm trying to learn Android/Kotlin, and I'm using Google's samples as my guide.
If the answer to the DI question is to add a MyApplication.kt file to a project that lacks one, how do I go about that? Does the AndroidManifest.xml file need changing or anything?
You have to add android:name="fully.qualified.class.name.of.MyApplication" to the <application> tag in the manifest.
Or should I do it some other way in the JetPack/Architecture Components world?
Google recommends Dagger2 see https://developer.android.com/jetpack/docs/guide
| 2024-05-29T01:26:19.665474 | https://example.com/article/4911 |
MultiChain 2.0 beta released
Empowering a broad new range of blockchain applications
Today we’re delighted to release the first beta version of MultiChain 2.0, the next generation of the MultiChain blockchain platform, after 16 months in development. MultiChain 2.0 (download) includes three major new areas of functionality to help developers rapidly build powerful blockchain applications:
Off-chain data. Any item published in a MultiChain stream can optionally be stored off-chain, in order to save bandwidth and storage space. Off-chain data (up to 1 GB per item) is automatically hashed into the blockchain, with the data itself delivered rapidly over the peer-to-peer network. Click for more about off-chain data.
Richer data streams. JSON and Unicode text are now supported natively and stored efficiently on- or off-chain. Multiple JSON items can be merged together, allowing a stream to serve as a database with a full audit history. Stream items can have multiple keys, and be queried by multiple keys and/or publishers together. Finally, to increase data throughput, a single transaction can publish multiple items to one or more streams.
In addition, MultiChain 2.0 provides several other smaller new features:
Blockchain upgrading. Many blockchain parameters can be changed over time, subject to administrator consensus. These include the block time interval, maximum block size, and many transaction size limits.
Per-asset permissions. Assets can optionally be issued with their own send and receive permissions, which can be controlled for each address by that asset’s issuer and/or its assigned administrators.
Binary cache. Large pieces of binary data (up to 1 GB) can be added to MultiChain over multiple API calls, or uploaded directly via the file system.
Custom permissions. Six new permissions (three “high” and three “low”) can be assigned to addresses by two levels of administrator. These are useful for defining roles enforced by Smart Filters.
We’re also delighted to welcome over 40 new companies to the MultiChain partner program, bringing the total number to 86. New members include SAP who have built a deep integration with MultiChain in the SAP Cloud Platform.
MultiChain 2.0 beta 1 can be downloaded here. It is backwards compatible with version 1.0 with a few exceptions – see the API compatibility note. MultiChain 1.0 nodes and networks can be upgraded to version 2.0 in the usual way (be sure to back up first). We’ll also continue to maintain and fix any bugs in MultiChain 1.0 through 2019 at least.
Below is the full official press release about the 2.0 beta release.
MultiChain Releases Beta Version 2.0 with Over Forty New Partners
December 19, 2018 – Coin Sciences Ltd is delighted to announce the first beta release of MultiChain 2.0, along with the addition of 43 new members of the MultiChain Partner Program, bringing the total number to 86.
MultiChain 2.0 beta 1 has been released after sixteen months of intensive development including seven alpha versions, and is available for Linux and Windows at: https://www.multichain.com/download-install/. Enhancements over MultiChain 1.0 include richer data publishing with support for JSON and Unicode text, blockchain parameter upgrading, seamless integration of off-chain data storage and delivery, and Smart Filters, MultiChain’s approach to the smart contract paradigm.
MultiChain Smart Filters allow application developers to embed custom rules for transaction and data validation within the blockchain, using the popular JavaScript programming language. Filters are run within a deterministic version of V8, the highly optimized runtime engine used by Google Chrome and Node.js. For more information on MultiChain Smart Filters and how they compare to smart contracts in Hyperledger Fabric, Ethereum and R3 Corda, see: https://www.multichain.com/blog/2018/12/smart-contract-showdown/
The new members of the MultiChain Partner Program include SAP, who have integrated MultiChain into the SAP Cloud Platform and are deploying it for client projects. HCL Technologies, the multinational consulting company, also recently joined, along with 41 other blockchain and software companies. Members of the partner program have access to the MultiChain engineering team, can use MultiChain branding in their marketing materials, and are promoted on the MultiChain website. A full list of MultiChain’s partners can be found at: https://www.multichain.com/platform-partners/
“At SAP we are extending business solutions with MultiChain blockchain functionality via our SAP Cloud Platform offering.” said Torsten Zube, SAP’s Head of Blockchain. Furthermore, “We strategically decided that MultiChain should be part of our offering due to its proven, easy and mature distributed ledger technology addressing enterprise needs. The upcoming MultiChain 2.0 release will provide more functionality such as Smart Filters and off-chain data that we see as particularly relevant for enterprise scenarios going forward.”
“Version 2.0 represents a huge upgrade for MultiChain, integrating several major features commonly requested by our developer community,” said Dr Gideon Greenspan, CEO and Founder of Coin Sciences Ltd. “With version 1.0 in stable production since August 2017, our goal with MultiChain 2.0 remains the same: to provide a powerful, stable and easy-to-use platform for blockchain application developers. We look forward to continued cooperation with our partners to bring MultiChain-driven applications to enterprises, governments and beyond.” | 2024-07-16T01:26:19.665474 | https://example.com/article/6731 |
"Americans turned out to vote for gun sense in this election season," she said, referring to the passage of a gun background-check referendum in Washington State and the election of candidates backed by the gun-control groups. | 2024-03-23T01:26:19.665474 | https://example.com/article/1827 |
Join marketers at The Big Rethink on March 21st and find out how to make your brand more powerful.
Now in its fourth year, this one day Summit from the Economist gathers 150 leading marketers together to generate fresh ideas. It is a space in which conventional thinking is challenged and critical visions, tools and insights are shared. With interactive sessions led by the most unexpected and talented individuals, this summit will provide our audience with new approaches to marketing in today's challenging environment.
The theme this year is BRAND. It could be the most valuable asset you have. Is it as powerful as it could be? Does it engage consumers who are exposed to ever more brands, and who demand ever more meaningful, personal relationships with them? Is it strong enough for you to withstand increasing competition to your company? In 2013, The Big Rethink will invite you to think about interesting ways to make your brand more powerful. | 2023-11-18T01:26:19.665474 | https://example.com/article/1920 |
Q:
SP2013 On Premises: CustomAction Welcome Menu not visible
I am trying to add a custom action to the Welcome menu, right below the Sign Out button.
Here are the steps I followed:
1) Created an Empty element called CustomActions and edited the Elements.xml as below:
<?xml version="1.0" encoding="utf-8"?>
<Elements xmlns="http://schemas.microsoft.com/sharepoint/">
<CustomAction
Id="MyCustomAction"
Description="This is my custom action."
Title="Open Application Page"
GroupId="SiteActions"
Location="Microsoft.SharePoint.StandardMenu"
Sequence="10">
<UrlAction Url="~site/_layouts/SPCustomAction/MyAppPage.aspx"/>
</CustomAction>
</Elements>
2) Created a feature with scope Site, and added this item to the feature.
3) Deployed.
Am I missing something?
I also tried creating a SPUserCustomAction programmatically on the FeatureActivated, but it's not showing up either.
Any advise?
A:
Use GroupId="PersonalActions" and Sequence="1000"
| 2024-06-12T01:26:19.665474 | https://example.com/article/9214 |
Q:
How to loop through this nested object JSON array and build an html string with jQuery
I am recieving JSON data in this format:-
{
"sEcho":1,
"total":"1710",
"aaData":[
[
"Help",
"http:\/\/www.mysite.com\/wp-content\/uploads\/2011\/09\/dt_intfc4e732d1f1276d_4e76fab1e95bd.mp3?King_of_Spain_Entropy_02_Animals_Part_1.mp3",
"1784",
"3",
0,
null,
"0000-00-00 00:00:00"
],
[
"A Day In The Life",
"http:\/\/www.mysite.com\/wp-content\/uploads\/2011\/09\/dt_intfc4e732d1f1276d_4e76f5fc253a1.mp3?JenWood_Zeppelin.mp3",
"3573",
"3",
0,
null,
"0000-00-00 00:00:00"
]
}
Using a typical jquery ajax request like so:-
$.ajax({
"dataType": 'json',
"url": '/wp-content/hovercard.php',
"data": 'order=' + $orderValue + '&orderColumn=' + $columnValue,
"success": function(data, textStatus, jqXHR) {
//loop JSON array and build html string here, then append it.
}
});
How do I loop through the nested objects within this JSON array in order to build a list of 'TR' nodes and then insert them into a table?
If I use the first data object in my JSON array example above, I would like the html string returned like this:-
<tr class="odd">
<td> + help + </td>
<td><a href=" + http:\/\/www.mysite.com\/wp-content\/uploads\/2011\/09\/dt_intfc4e732d1f1276d_4e76fab1e95bd.mp3?King_of_Spain_Entropy_02_Animals_Part_1.mp3 + "> + help + </a></td>
<td> + 1784 + </td>
<td> + 3 + </td>
<td> + 0 + </td>
<td> + null + </td>
<td> + 0000-00-00 00:00:00 + </td>
</tr>
To make matters more confusing the 'tr' class of "odd" as shown above, needs to be alternated with a class of "even" for each data index.
Then once the full html string of all the 'tr' nodes has been built and saved into a variable (lets use $newContent) I would like to append it to a table. i.e.
$('#my_table').append($newContent);
So far I have worked out how to iterate over the data and create the required 'tr' nodes as such:-
var array = data.aaData;
var textToInsert = [];
var i = 0;
$.each(array, function(count, item) {
textToInsert[i++] = '<tr><td class="odd">';
textToInsert[i++] = item;
textToInsert[i++] = '</td></tr>';
});
$('#favourites-hovercard-table-' + $artistid ).append(textToInsert.join(''));
But I am struggling with iterating over the nested data and building the required 'td' nodes as well as alternating the odd/even classes.
A:
I'd suggest to use proper DOM manipulation instead of creating strings:
var $table = $('#favourites-hovercard-table-' + $artistid );
$.each(data.aaData, function(i, row) {
var $tr = $('<tr />', {'class': (i % 2) ? 'odd' : 'even'});
$.each(row, function(j, value) {
$tr.append($('<td />', {text: value}));
});
$table.append($tr)
});
| 2024-04-18T01:26:19.665474 | https://example.com/article/5884 |
The researchers’ approach is counterintuitive. Rather than striking powerful blows like a football player making a tackle or a jackhammer, they have focused on synchronizing the smooth application of very tiny forces. The microrobots work in concert, if slowly.
The researchers observed that the ants get great cooperative force by each using three of their six legs simultaneously.
“By considering the dynamics of the team, not just the individual, we are able to build a team of our ‘microTug’ robots that, like ants, are superstrong individually, but then also work together as a team,” said David Christensen, a graduate student who is one of the authors of a research paper describing the feat. The paper will be presented this May at the International Conference on Robotics and Automation in Stockholm.
Their new demonstration is the functional equivalent of a team of six humans moving a weight equivalent to that of an Eiffel Tower and three Statues of Liberty, Mr. Christensen said. The car is the one he uses for commuting to campus. Part of the magic is the use of a special adhesive that was inspired by gecko toes.
Last month, Mr. Christensen and Srinivasan Suresh, another graduate student, the researcher Katie Hahm and the mechanical engineering professor Mark Cutkosky published “Let’s All Pull Together: Principles for Sharing Large Loads in Microrobot Teams.” | 2023-11-07T01:26:19.665474 | https://example.com/article/5798 |
Atrial natriuretic factor reduces cell coupling in the failing heart, an effect mediated by cyclic GMP.
The influence of the atrial natriuretic factor (ANF) on heart-cell communication was investigated in cell pairs isolated from the ventricle of cardiomyopathic hamsters (BIO TO-2; 11 months old), and the results were compared with controls (F1B) of same age. The results indicated that ANF (10(-8) M) added to the bath caused a decline in junctional conductance (gj) of 48 +/- 2% (n = 15) within 90 s. The effect of ANF was suppressed by HS-142-1, a specific antagonist of guanylyl cyclase ANF receptor. Moreover, the decline in gj elicited by ANF was related to the synthesis of cyclic guanosine monophosphate (cGMP). Indeed, dibutyryl-cGMP (10(-4) M) decreased gj by 80 +/- 3.5% (n = 15) within 90 s, and zaprinast, a selective inhibitor of cGMP phosphodiesterase, enhanced the effect of ANF on gj. The possible relationship between ischemia, ANF release, and impairment of cell coupling is discussed. | 2023-12-01T01:26:19.665474 | https://example.com/article/6123 |
Q:
Calling API and adding buttons programmatically
Long story short, I'm making an API call that retrieves a list of names.
For each name retrieved, I'd like to add a RelativeLayout (with some children) to a parent LinearLayout. The relative layout looks like this:
<RelativeLayout
android:layout_width="fill_parent"
android:layout_height="fill_parent"
android:background="@drawable/border_bottom"
android:clickable="true">
<ImageView
android:layout_width="100dp"
android:layout_height="100dp"
android:layout_weight="11.79"
android:background="#58585a"
android:id="@+id/imageView" />
<TextView
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:textAppearance="?android:attr/textAppearanceLarge"
android:text="Large Text"
android:id="@+id/textView2"
android:layout_alignParentTop="true"
android:layout_centerHorizontal="true"
android:layout_marginTop="26dp" />
<TextView
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:textAppearance="?android:attr/textAppearanceSmall"
android:text="Small Text"
android:id="@+id/textView3"
android:layout_below="@+id/textView2"
android:layout_alignStart="@+id/textView2" />
</RelativeLayout>
I'd like to change the 'Small Text' and 'Large Text' fields to some data I received from querying the server.
What is the best way to go about achieving this? Can I store the above layout in a separate XML file, and quickly change the text values, and just drop it into the existing Linear Layout?
A:
LISTING 1:
XML for the layout of each list item -
<?xml version="1.0" encoding="utf-8"?>
<RelativeLayout
xmlns:android="http://schemas.android.com/
apk/res/android"
android:layout_width="match_parent"
android:layout_height="wrap_content" >
<ImageView
android:id="@+id/listImage"
android:layout_width="100dp"
android:layout_height="100dp"
android:layout_alignParentLeft="true"
android:layout_centerVertical="true"
android:layout_margin="10dp"
android:background="#ffcccccc" />
<TextView
android:id="@+id/listTitle"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_alignTop="@+id/listImage"
android:layout_toRightOf="@+id/listImage"
android:text="A List item title"
android:textSize="16sp"
android:textStyle="bold" />
<TextView
android:id="@+id/listDescription"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_below="@+id/listTitle"
android:layout_marginTop="5dp"
android:maxLines="4"
android:layout_toRightOf="@+id/listImage"
android:text="The List item description"
android:textSize="14sp" />
</RelativeLayout>
Listing 2:
XML for layout containing the Listview -
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout
xmlns:android="http://schemas.android.com/apk/res/android"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:gravity="center"
android:orientation="vertical" >
<ListView
android:id="@android:id/list"
android:fadingEdge="vertical"
android:fadingEdgeLength="10dp"
android:longClickable="true"
android:listSelector="@drawable/list_selector_background"
android:layout_width="match_parent"
android:layout_height="match_parent" >
</ListView>
<!-- -->
<TextView
android:id="@android:id/empty"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_gravity="center"
android:text="Loading feed data..." />
<!-- -->
</LinearLayout>
#1 Listview with id of "list"
#2 TextView with id of "empty"
Listing 3:
ListActivity for the Dynamic ListView -
public class DynamicListViewActivity extends ListActivity {
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.list);
ImageListAdapter adapter = new ImageListAdapter(this);
setListAdapter(adapter);
LoadFeedData loadFeedData = new LoadFeedData(adapter);
loadFeedData.execute();
}
}
Listing 4:
LoadFeedData class used for Loading the feed data -
public class LoadFeedData extends
AsyncTask<void, void,="" arraylist<entry="">> {
private final String mUrl =
"URL_QUERING_TO_SERVER";
private final ImageListAdapter mAdapter;
public LoadFeedData(ImageListAdapter adapter) {
mAdapter = adapter;
}
private InputStream retrieveStream(String url) {
DefaultHttpClient client = new DefaultHttpClient();
HttpGet httpGet = null;
httpGet = new HttpGet(url);
HttpResponse httpResponse = null;
try {
httpResponse = client.execute(httpGet);
HttpEntity getResponseEntity = httpResponse.getEntity();
return getResponseEntity.getContent();
} catch (IOException e) {
httpGet.abort();
}
return null;
}
@Override
protected ArrayList<Entry> doInBackground(Void... params) {
InputStream source = retrieveStream(mUrl);
Reader reader = null;
try {
reader = new InputStreamReader(source);
} catch (Exception e) {
return null;
}
Gson gson = new Gson();
SearchResult result = gson.fromJson(reader,SearchResult.class);
return result.getFeed().getEntry();
}
protected void onPostExecute(ArrayList<Entry> entries) {
mAdapter.upDateEntries(entries);
}
}
Listing 5:
ImageListAdapter used to populate ListView with data and images -
public class ImageListAdapter extends BaseAdapter {
private Context mContext;
private LayoutInflater mLayoutInflater;
private ArrayList<Entry> mEntries = new ArrayList<Entry>();
private final ImageDownloader mImageDownloader;
public ImageListAdapter(Context context) {
mContext = context;
mLayoutInflater = (LayoutInflater) mContext
.getSystemService(Context.LAYOUT_INFLATER_SERVICE);
mImageDownloader = new ImageDownloader(context);
}
@Override
public int getCount() {
return mEntries.size();
}
@Override
public Object getItem(int position) {
return mEntries.get(position);
}
@Override
public long getItemId(int position) {
return position;
}
@Override
public View getView(int position, View convertView,
ViewGroup parent) {
RelativeLayout itemView;
if (convertView == null) {
itemView = (RelativeLayout) mLayoutInflater.inflate(
R.layout.list_item, parent, false);
} else {
itemView = (RelativeLayout) convertView;
}
ImageView imageView = (ImageView)
itemView.findViewById(R.id.listImage);
TextView titleText = (TextView)
itemView.findViewById(R.id.listTitle);
TextView descriptionText = (TextView)
itemView.findViewById(R.id.listDescription);
String imageUrl = mEntries.get(position).getContent().getSrc();
mImageDownloader.download(imageUrl, imageView);
String title = mEntries.get(position).getTitle().get$t();
titleText.setText(title);
String description =
mEntries.get(position).getSummary().get$t();
if (description.trim().length() == 0) {
description = "Sorry, no description for this image.";
}
descriptionText.setText(description);
return itemView;
}
public void upDateEntries(ArrayList<Entry> entries) {
mEntries = entries;
notifyDataSetChanged();
}
}
Great! This way you will load dynamic data from server and display it in a listview.
Obviously, you may change some of it or more to add as suitable for your application.
Cheers!
| 2023-10-30T01:26:19.665474 | https://example.com/article/3408 |
[Mesenteric reticulocytic abscess-forming lymphoadenitis (Masshoff's disease)].
This report described two cases of mesenteric reticular abscess-forming lymphoadenitis (Masshoff's disease). The nosology of this anatomo-clinic entity, that is not rare but not well known, is discussed. | 2023-10-17T01:26:19.665474 | https://example.com/article/9766 |
The manager of a team is responsible for the conduct of his players, coaches and fans/spectators. Do not complete this registration if you do not take this serious.
I have read and agree with the sportsmanship requirement above
*
The home field manager is responsible to make sure the Manager/Umpire Interaction Policy is reviewed before each game during the ground rules and agreed to by both managers and the umpire. Failure to do so results in that manager's suspension for that single game.
I have read the above manager/umpire policy requirement and agree
*
* Field Name:
* Field Address - # & Street:
* Field City:
* # Fields w/Lights:
In-house League Participation if applicable:
UMPIRE INFORMATION
Umpire Association Planned on Being Used:
Home field teams are required to schedule a MD State certified umpire association to provide the umpires referred to in the rules for
your home games.......note: Some older divisions utilize two umpires.
INSURANCE INFORMATION - EACH TEAM MUST BE COVERED
All teams must have insurance and be able to prove coverage.
Each team must provide an insurance certificate naming the BCML as additional insured.
The certificate must be submitted at least 5 days prior to the first scheduled game.
Teams not submitting a certificate within the stipulated time line will result in the team being added to the BCML provided policy and charged accordingly.
Submitting this registrations certifies agreement to this policy and payment thereof.
* Insurance Coverage:
If you do not have insurance thru BCML you must provide
a certificate of insurance naming the BCML as additional insured.
I have read the rules, understand, and agree as indicated by this registation submittal by me
*
I the manager or travel coordinator agree the above to be true and accurate
*
* required
Payments Accepted By
Note: Credit Card information can be entered once this form is submitted | 2024-05-14T01:26:19.665474 | https://example.com/article/9461 |
Expression pattern of dmrt4 from olive flounder (Paralichthys olivaceus) in adult gonads and during embryogenesis.
The dmrt (doublesex and mab-3 related transcription factor) gene family comprises several transcription factors that share a conserved DM domain. Dmrt1 is considered to be involved in sexual development, but the precise function of other family members is unclear. In this study, we isolated genomic DNA and cDNA sequences of dmrt4, a member of the dmrt gene family, from olive flounder, Paralichthys olivaceus, through genome walking and real-time reverse transcriptase (RT)-PCR. Sequence analysis indicated that its genomic DNA contains two exons and one intron. A transcriptional factor binding sites prediction program identified a sexual development-related protein, Sox9 (Sry-like HMG box containing 9) in its 5' promoter. Protein alignment and phylogenetic analysis suggested that flounder Dmrt4 is closely related to tilapia Dmo (DM domain gene in ovary). The expression of dmrt4 in adult flounder was sexually dimorphic, as shown by real-time RT-PCR analysis, with strong expression in the testis but very weak expression in the ovary. Its expression was also strong in the brain and gill, but there was only weak or no expression at all in some of the other tissues tested of both sexes. During embryogenesis, its expression was detected in most developmental stages, although the level of expression was distinctive of the various stages. Whole mount in situ hybridization revealed that the dmrt4 was expressed in the otic placodes, forebrain, telencephalon and olfactory placodes of embryos at different developmental stages. These results will improve our understanding of the possible role of flounder dmrt4 in the development of the gonads, nervous system and sense organs. | 2023-12-14T01:26:19.665474 | https://example.com/article/8674 |
Introduction {#Sec1}
============
Down syndrome (DS) is the most common chromosomal malformation in newborns. In Europe, DS accounts for 8% of all registered cases of congenital anomalies. Throughout the world, the overall prevalence of DS is 10 per 10,000 live births, although in recent years this figure has been increasing. To a large extent, the prevalence of DS depends on several socio-cultural variables. In countries where abortion is illegal such as Ireland and the United Arab Emirates, its prevalence is higher. Conversely, in France, DS prevalence is low, and this is probably due to a high percentage of DS pregnancy terminations \[[@CR6], [@CR21], [@CR33]\]. In The Netherlands, the most recent measure of DS prevalence was 16 per 10,000 live births \[[@CR33]\]. In the United Kingdom, the prevalence of pregnancies affected by DS has increased significantly, but there has been no overall change in the live birth prevalence of DS. Increasing maternal age and improved survival rates for infants with Down syndrome have outweighed the effects of prenatal diagnosis followed by the termination of pregnancy and a declining general birth rate \[[@CR6], [@CR14], [@CR24], [@CR33], [@CR36]\].
DS is characterized by several dysmorphic features and delayed psychomotor development. Children with DS also have an increased risk of concomitant congenital defects and organic disorders such as congenital heart and gastrointestinal defects, celiac disease and hypothyroidism \[[@CR21]\]. The median age at death of individuals with DS has risen significantly in the US, from 25 years in 1983 to 49 years in 1997. Congenital heart defects (CHD) and respiratory infections are the most frequently reported medical disorders on death certificates for individuals with DS \[[@CR38]\]. Standardized mortality odds ratios (SMORs) in DS were low for malignancies except for leukaemia and testicular cancer, which were seen more often in individuals with DS \[[@CR21], [@CR39]\]. Recent decades have seen a substantial increase in the life expectancy of children with DS. In The Netherlands, the infant mortality rate in children with DS dropped from 7.07% in 1992 to 4% in 2003 (this is in contrast with the 0.48% infant mortality of the reference population in The Netherlands in 2003) \[[@CR33]\]. The fall in DS mortality was mainly related to the successful early surgical treatment of CHD and to the improved treatment of congenital anomalies of the gastrointestinal tract \[[@CR33]\]. The life expectancy of children with DS is primarily dependent on the risk of mortality in the first year of life. While modern medical care has reduced the mortality rate to more acceptable values, both morbidity and mortality could be further reduced. In this respect, respiratory infections and neonatal problems are the most important issues to be solved.
Since children with DS now have an improved life expectancy, the total population of individuals with DS is expected to grow substantially. Preventive health care programmes for these children will contribute to the improvement of their overall outcome and quality of life; therefore, it is very important to keep the medical guidelines updated \[[@CR11], [@CR21]\].
Newborn assessment {#Sec2}
==================
The characteristics of DS and specific clinical signs at birth can guide the decision to perform karyotype testing for the confirmation of a DS diagnosis (Table [1](#Tab1){ref-type="table"}, Figs. [1](#Fig1){ref-type="fig"}, [2](#Fig2){ref-type="fig"}) \[[@CR20], [@CR30]\]. Hypotonia is the most striking characteristic, but others include a "Simian fold"(Fig. [3](#Fig3){ref-type="fig"}), drinking problems, signs of a CHD, a congenital defect of the gastrointestinal tract or cataract. It will take several days before the first results of the karyotyping can confirm a clinical suspicion of DS. Table 1Characteristics of Down syndrome and specific clinical signs at birthNeonatal signs of Down syndrome \[[@CR20], [@CR30]\]Most reliable and discriminative signsSmall earsWide space in between the 1st and 2nd toe ("Sandal gap")Small internipple distanceBrushfield spotsNuchal skin foldReliable and discriminative signsBrachycephalyHypotoniaFlat faceUpward slant of the eye splitTransverse line in the palm of the hand ("Simian fold")Age-dependent signsEpicanthic foldDifficult to differentiateLow, flat nose bridgeSmall mouthFig 1A 4-year-old boy with Down syndromeFig 2A 2-year-old girl with Down syndromeFig. 3Transverse line in the palm of the hand ("Simian fold")
Initial postnatal support {#Sec3}
=========================
The parents or caretakers of a child for whom a diagnosis of DS is being considered or has been confirmed should be informed in a supportive, positive, caring and honest manner \[[@CR26]\]. Because parents prefer to receive an accurate and correct diagnosis, the information available to both the paediatrician and the parents should be up-to-date. The conversation must take place with both parents in a quiet setting as soon as the diagnosis of DS is suspected, in the presence of a paediatrician, an obstetrician and the child with DS. The timing of the disclosure of specific DS-related problems must be balanced with respect for the opportunity for parents to welcome their child (Table [2](#Tab2){ref-type="table"}) \[[@CR19], [@CR26]\]. Table 2Prevalence of medical problems in children with Down syndromePrevalence (%)ReferencesCongenital heart defects44--58\[[@CR34]\]Vision disorders38--80\[[@CR21]\], \[[@CR27]\]Hearing disorders38--78\[[@CR21]\]Obstructive sleep apnoea syndrome57\[[@CR25]\]Wheezing airway disorders30--36\[[@CR4]\]Congenital defects of gastrointestinal tract4--10\[[@CR9]\]Coeliac disease5--7\[[@CR37]\]Obesity30--35\[[@CR30]\]Transient myeloproliferative disorder10\[[@CR39]\]Thyroid disorders28--40\[[@CR15]\], \[[@CR28]\]Atlanto-axial instability10--30\[[@CR12]\]Urinary tract anomalies3.2\[[@CR16]\]Skin problems1.9--39.2\[[@CR18]\], \[[@CR23]\]Behaviour problems18--38\[[@CR15]\], \[[@CR21]\]
Cardiovascular disorders {#Sec4}
========================
The prevalence of CHD in neonates with DS is about 44--58% worldwide. Atrioventricular septal defect and ventricular septal defect are the most common forms of CHD, constituting up to 54% for ASD and to 33% for VSD, of all CHDs in children with DS \[[@CR31], [@CR33]\]. A normal neonatal examination in children with DS does not exclude a serious CHD. Because of the high incidence of significant CHD in children with Down syndrome, early recognition of CHD is necessary as it can lead to the optimal management of the defect and can sometimes prevent the development of pulmonary hypertension. The surgical correction of significant defects usually takes place at the age of 2--4 months, though it is sometimes performed earlier (e.g. in cases of Tetralogy of Fallot). An elevated incidence (5.2--13.7%) of persistent pulmonary hypertension of the neonate (PPHN) with DS has recently been established, and there should be a specific focus on this condition after birth \[[@CR35]\]. Early assessment of the cardiac condition of neonates with DS should always be performed by echocardiography in the first month of life \[[@CR8], [@CR21], [@CR35]\].
Vision disorders {#Sec5}
================
Good vision is very important to the development of a child, especially a child with developmental problems such as those associated with DS. More than half of children with DS have ocular abnormalities. In addition to ocular features related to DS such as epicanthal folds, narrowed or slanted palpebral fissures (the mongoloid slant) and Brushfield spots (38--85%)(Fig. [4](#Fig4){ref-type="fig"}), these vision disorders include strabismus (20--47%), nystagmus (11--29%), congenital cataract (4--7%), acquired cataract (3--15%), blepharitis (7--41%), refractive errors (43--70%) and glaucoma (0.7%). Keratoconus is rare in childhood but develops later in life in individuals with DS \[[@CR27], [@CR36]\].Visual screening is essential for detecting defects that can be treated. An early start is especially important in finding congenital cataracts. Fig. 4Brushfield spots
Ear, nose and throat disorders {#Sec6}
==============================
Hearing impairment and otologic problems are prevalent in children with DS, and these problems correlate substantially with developmental problems. Midface hypoplasia is common in children with DS and consists of abnormalities of the nasopharynx, abnormal Eustachian tube anatomy, abnormal tooth development and agenesis of the teeth. These mid-face problems, together with hypotonia and macroglossia (children with DS have a relatively large tongue compared to the oral cavity), are responsible for chronic middle ear disease and chronic rhinorrhoea.
Allergy does not play an important role as a cause of chronic rhinitis in children with DS \[[@CR17]\]. On the other hand, a variety of immune disorders makes them prone to upper airway infections \[[@CR4]\]. Even mild hearing loss can influence educational, language and emotional developments, and as a result, it can affect a child's articulation skills. Regular assessment of the hearing function is very important. An active search for and treatment of chronic ear disease in children with DS, started soon after birth, may improve hearing \[[@CR15]\]. Apart from hearing problems, children with DS have delayed speech development \[[@CR21]\]. Sleep-disordered breathing in children with Down syndrome is seen in half of the children with DS. The most common causes include macroglossia, glossoptosis, recurrent enlargement of the adenoid tonsils and enlarged lingual tonsils. There is a poor correlation between parental impressions of sleep problems and polysomnography results. Baseline polysomnography must be considered in children with Down syndrome at 3 to 4 years of age \[[@CR8], [@CR25]\].
Respiratory disorders {#Sec7}
=====================
Respiratory problems are responsible for the majority of the morbidity and hospital admissions in children with DS. Respiratory syncytial virus (RSV) is seen more frequently and is associated with a greater risk for hospitalization in children with DS. CHD does not influence the admission rate, but children with CHD had longer lengths of hospital stay \[[@CR4], [@CR13]\]. Recurrent wheeze is very common among children with DS (it is found in up to 36%) and is related to previous RSV infection and to other factors such as tracheamalacia \[[@CR3], [@CR4]\]. The clinical picture may mimic asthma but is not equivalent to asthma. These respiratory problems can in turn become exacerbated because of the existence of CHD with haemodynamic instability and as a result of hypotonia, both known characteristics of DS. Other causal factors include airway anomalies like tracheolaryngomalacia, pulmonary anatomical changes like pulmonary hypoplasia, and subpleural cysts. Subpleural cysts are common in individuals with DS (up to 36%) but are difficult to detect on plain chest films---CT imaging is needed to detect them \[[@CR2]\]. Furthermore, an association with abnormal lung growth and lung hypoplasia is found in children with DS \[[@CR1]\]. RSV prophylaxis with human monoclonal antibodies in children with DS with CHD is common, but in a child without CHD, the prophylaxis has to be considered because of their risk of the more frequent and serious infections associated with RSV \[[@CR3]\].
Gastrointestinal tract disorders {#Sec8}
================================
Congenital defects of the gastrointestinal tract are present in 4--10% of children with DS and play an important role in morbidity during the first year of life. These defects include oesophageal atresia/trachea-oesophageal fistula (0.3--0.8%), pyloric stenosis (0.3%), duodenal stenosis/atresia (1--5%), Hirschsprung disease (1--3%) and anal stenosis/atresia (\<1--4%).These defects are more frequent in the DS population, as much as 25--30% of all cases of duodenal defects are in children with DS \[[@CR9]\]. Coeliac disease (CD) is another DS-specific disorder and is seen in 5--7% of children with DS, a rate that is ten times higher than in the normal population \[[@CR38]\]. Screening for early detection of CD in the DS population, with the aim of starting treatment and preventing complications from untreated CD such as failure to thrive, anaemia, osteoporosis and malignancy, seems to be justified. For CD screening in children with DS, we recommend human leukocyte antibodies (HLA)-DQ2 and HLA-DQ8 typing in the first year of life with buccal swabs, if available, which have the benefit of avoiding the unpleasant collection of blood. Children who have negative results for HLA-DQ2 or DQ8 (approximately 60%) can be excluded from further screening, and parents can be reassured that their child has no risk of CD. The remaining children need to be monitored for CD by using IgA anti-endomysium (EMA) and anti-tissue transglutaminase antibodies (anti-tTGA) beginning at 3 years of age \[[@CR15], [@CR38]\].
The prenatal occurrence of an aberrant right subclavian artery (ARSA, arteria lusoria) is substantially increased in patients with DS where it is found in up to 19--36%. ARSA may cause problems with the passage of solid food through the oesophagus and dysphagia. Moreover, impaired oral motor function, gastro-oesophageal reflux or congenital disorders have to be considered as a cause in feeding problems in children with DS \[[@CR9], [@CR22]\].
Constipation is a serious problem in children with DS and is mainly a consequence of the hypotonia; however, in serious cases, Hirschprung disease must be excluded \[[@CR8]\].
Breastfeeding should be promoted not only because of the psycho-emotional or immunity benefits but particularly because breastfeeding has specific advantages for children with DS in terms of stimulating the development of the oral motor system \[[@CR33]\]. However, because of their impaired oral motor function, children with DS can have problems with drinking, swallowing and chewing.
Overweight and overnutrition deserve serious attention in children with DS \[[@CR21]\].
Haemato-oncological and immunological disorders {#Sec9}
===============================================
Newborns with DS may have thrombocytopenia (up to 66%) and polycythaemia (up to 33%) \[[@CR39]\]. The first must be differentiated from pre-leukaemia while the latter may be symptomatic and may cause hypoglycemia or respiratory problems. Children with DS have an increased risk of developing both acute myeloid as well as lymphoblastic leukaemia. These leukaemias have specific presenting characteristics and underlying biologies. Myeloid leukaemia in children with DS may be preceded by a preleukaemic clone (transient myeloproliferative disorder, TMD), which may disappear spontaneously but may need treatment when symptoms are severe. TMD presents in 10% of children with DS. Twenty percent of children with transient leukaemia subsequently develop myeloid leukaemia, usually with an onset before the age of 5 \[[@CR39]\]. Children with DS have lowered T- and B-lymphocyte counts and functions which may explain part of their susceptibility to infections. On the other hand, there is a lower allergy risk in children with DS \[[@CR4], [@CR17], [@CR18], [@CR23], [@CR39]\]. There is no specific clinical picture in relation to disturbances of the immune system, which means that screening is not useful.
Endocrine disorders {#Sec10}
===================
In neonates with DS, the Gaussian distribution of thyroxin and TSH values are shifted to the left, and there may be a DS-specific thyroid dysregulation. Thyroxin has been given to newborns during the first 24 months, and although short-term follow-up showed some benefit to development and growth, there is no data available on the long-term benefit of treating these children with thyroxin \[[@CR10], [@CR28], [@CR29]\]. Therefore, this treatment is not commonly used.
Thyroid disorders have been reported in up to 28--40% of children with DS, and they increase in frequency, up to 54%, as the children age \[[@CR10], [@CR15], [@CR28]\]. Thyroid abnormalities in children with DS range from congenital hypothyroidism (1.8--3.6%) to primary hypothyroidism, autoimmune (Hashimoto) thyreoiditis (0.3--1.4%) and compensated hypothyroidism (25.3--32.9%). In addition, hyperthyroidism (Graves' disease) (0--2%) occurs in children with DS as well. Compensated hypothyroidism or isolated raised thyroid stimulating hormone (IR-TSH) is most frequently present in children with DS and is characterized by mildly elevated TSH with normal or low normal free T4; it often has a self-limiting natural history \[[@CR10]\]. These thyroid antibodies are the second most frequently present, and when present, they can cause manifest hypo-or hyperthyroidism within 2 years in almost 30%, but these antibodies are as such not primary related to abnormal thyroid function \[[@CR10], [@CR15], [@CR28]\]. Most predictive of the development of hypothyroidism is the presence of both elevated TSH and antibodies, and those children should be tested more frequently than other children with DS \[[@CR9]\]. When both are normal in the first decade of life, there is a low probability of hypothyroidism in the second decade \[[@CR10]\]. Interestingly, diabetes mellitus develops more frequently (1%) in children with Down syndrome \[[@CR21], [@CR30]\].
Children with DS have their own growth pattern and DS-specific growth curves \[[@CR7]\].The follow-up of length and weight in children with DS should be part of the regular medical screening and special attention for the weight is warranted because children with DS are prone to overweight. Their lack of feeling of satisfaction and their unlimited food intake, as well as their moderate exercise pattern, need special attention \[[@CR21]\].
Orthopaedic disorders {#Sec11}
=====================
The motoric system of children with DS is characterized by ligamentous laxity, joint hypermobility and hypotonia presenting in a variety of ways \[[@CR5], [@CR15]\]. Craniocervical instability has been reported in 8% to 63% of children with DS; atlanto-axial instability (AAI) occurs in 10% to 30%. The majority of cases are asymptomatic with symptomatic disease occurring in 1% to 2%, particularly as the result of an accident \[[@CR12]\]. There are limitations regarding both obtaining and interpreting and screening X-rays for AAI, and these are not predictive for injury. The performance of yearly neurologic screening is advisable, as is taking extra care when intubation is necessary. Sport activities, including somersaults, can be part of these patients' activities as long as there is a good support \[[@CR5], [@CR12], [@CR21]\]. Individuals with DS have been described as having a specific gait, with external rotation of the hips, knees in flexion and valgus, and externally rotated tibias. In childhood, pes planovalgus is often seen, and in cases where marked pronation of the foot creates problems with stable ambulation, active support is warranted \[[@CR21]\] (Fig. [5](#Fig5){ref-type="fig"}). Fig 5Valgus posture of the ankle and pes planus, a typical example of joint laxity
Acquired hip dislocation occurs in up to 30% of children with DS and needs special attention. Patellofemoral instability is estimated to occur in 10--20% of children with DS; slipped capital femoral epiphysis is seen more often in children with DS and has a poor prognosis \[[@CR5]\]. Most of these disorders manifest themselves once children with DS start walking, around 2--3 years of age \[[@CR5]\]. An arthropathy similar to juvenile rheumatoid arthritis can develop in children with DS but is rare \[[@CR5]\]. The delay in motor development in children with DS is more pronounced than the delay in mental development. Delays in motor development appear to be particularly related to the degree of hypotonia, which negatively influences development and leads to problems in postural control and to typically static and symmetrical movement patterns, compensatory movement strategies, and lack of movement variability. Limitations in the functional activities of 5 to 7-year-old children with Down syndrome seem to be more related to the level of motor ability than to the level of performance of mental ability \[[@CR32]\]. Special attention to motor development and counselling by a physiotherapist is advised.
DS directed physiotherapy supports the development of the basic gross motor skills properly by challenging the children with DS and giving them confidence in their own physical abilities by making use of the knowledge of the typically movement patterns of DS, furthermore to support parents to start active play and sports.
Urinary tract disorders {#Sec12}
=======================
Children with DS have significantly more risk of urinary tract anomalies (UTAs) (3.2%). Symptoms may be masked because voiding disturbances and delayed toilet training are usually interpreted as a consequence of delayed psychomotor development. UTAs such as hydronephrosis, hydroureter, renal agenesis and hypospadias must be considered in children with DS. Routine screening by ultrasound is not yet standard, but paediatricians should not overlook this problem \[[@CR16]\].
There are no specific guidelines towards the attitude in delay in daytime and nighttime continence in children with DS; besides the standard treatment, visual instruction is helpful as well as showing them how to do. The advice is to start training at the moment the child can sit properly and understand the items stool, urine and toilet.
Sexual development {#Sec13}
==================
In adolescent girls with DS, the onset of puberty is similar to that of other adolescents. In boys with DS, the primary and secondary sexual characteristics and pituitary and testicular hormone concentrations are similar to those in typical adolescents \[[@CR21]\]. Females with DS are able to have children, but males with DS have a diminished capacity to reproduce \[[@CR21]\]. Education to prevent pregnancies is warranted, specific in children with DS who discuss sexuality open-hearted. In girls, contraception can only be discussed when their mental development enables them to understand the subject.
Furthermore, contraception can be given to prevent pregnancy or when there are problems with the menstrual cycle, for fear of blood or problems with the hygiene.
Unfortunately one must be cautious for sexual abuse in girls with DS.
Dermatologic problems {#Sec14}
=====================
Dermatologic diseases are often present and are especially troublesome in adolescents \[[@CR21]\]. Alopecia areata (2.9--20%), vitiligo (1.9%), seborrhoeic eczema (8--36%), folliculitis (10.3--26%) and syringoma (12.3--39.2%) are more frequently seen in children with DS. Rare but DS-specific problems are elastosis perforans serpiginosa and milia-like idiopathic calcinosis cutis \[[@CR18], [@CR23]\]. A previously reported high prevalence of atopic dermatitis (AD) in up to 56.5% of children with DS is probably an overestimation, as more recent studies suggest a lower prevalence of 1.4--3%. This could be the result of new and different diagnostic criteria for AD. This observation also notes a lower allergy risk in children with DS, which is in concordance with the studies on allergic rhinitis \[[@CR17], [@CR18], [@CR23]\].
Neuro-behavioural disorders {#Sec15}
===========================
Most children with DS function in the low range of typical development, and their intelligence quotient decreases in the first decade of life. In adolescence, cognitive function may reach a plateau that persists in adulthood. Mental development shows a deceleration between the ages of 6 months and 2 years \[[@CR32]\]. IQ values vary, usually ranging from 35 to 70, indicating mild to moderate mental impairment; severe mental impairment is only occasionally seen in children with DS \[[@CR8]\]. Counterproductive behaviour and avoidance tactics can impede learning, and language production is often substantially impaired. Delayed verbal short-term memory and expressive language indicate the need for a special approach to teaching these children to speak (for example, learning to speak by first learning to read) \[[@CR15], [@CR21]\]. Furthermore, impaired oral motor function can influence articulation.
Children with DS have more pronounced neuro-behavioural and psychiatric problems, found in 18% to 38%. The most frequent problems are disruptive behaviour disorders, such as attention deficit hyperactivity disorder (6.1%), conduct/oppositional disorder (5.4%) or aggressive behaviour (6.5%), and obsessive--compulsive disorders. More than 25% of adults with DS have a psychiatric disorder, most frequently a major depressive disorder (6.1%) or aggressive behaviour (6.1%) \[[@CR15], [@CR21]\]. A diagnosis of autism or autism spectrum disorders in children with DS is found in 7%. This diagnosis is not easily made in children with DS mainly because of the resemblance and overlap of DS-specific behaviours and autism.
Epilepsy is seen in 8% of children with DS, with 40% occurring in infancy and often presenting as infantile spasms. Alzheimer's disease which is associated with DS appears later in life, not in childhood \[[@CR21]\].
Education and school {#Sec16}
====================
Early intervention education systems are programmes that can be used from the first months of life and provide tools to stimulate the development of children with DS, especially in the preschool period. Children with DS often begin primary school with extra support; successful outcomes are mainly in the area of social skills as a result of the ability to copy and mirror behaviour. The outcome for adult social independence depends largely on the development of abilities to complete tasks without assistance, the willingness to separate emotionally from parents and access to personal recreational activities \[[@CR21]\].
Conclusion and recommendations {#Sec17}
==============================
Children with DS have several DS-specific morbidities and screening programmes are available to support and educate patients and their families. Although the most frequently occurring morbidities are emphasized, a potential drawback is that a child with DS might have rare DS-specific problems, but children with DS can also have the same problems as their healthy peers. Today children with DS have a better life expectancy, which means that the total population of individuals with DS is expected to grow substantially. There should be a focus on probable changes in long-term DS morbidity. Furthermore, we need to address the quality of this longer life span. Our recommendations for regular screening are shown in Table [3](#Tab3){ref-type="table"}. Table 3Screening schedule for children with Down syndrome 0--18 yearsTimeline for medical assessment of children with Down syndrome0--3 months4--12 monthsEvery yearNoteGenetic counselling+Once, after birthCardiac Ultrasound++Follow-up depends on the heart defectVision^a^++Every 3 yearsHearing+++OSAS+Polysomnography at 3--4 yearsPeriodontal+Dental agenesisConstipation+++Coeliac disease+Every 3 years TGA, once HLA-DQ2 and 8^b^Growth/Overweight+Specific Downcurves- length/weightHaematology++TMD at first, leukaemia mainly first 5 yearsThyroid function++Hips/Patellae+++AAI+neurologic screening, care during intubationPhysiotherapy+++Most impact in first 4 yearsSkin+(Pre)Logopaedic+++Until speech is well established*OSAS* Obstructive sleep apnoea syndrome^a^Initial check for congenital cataract and later for visual assessment^b^HLA-DQ 2and 8 when negative, stop when one or both is positive, anti-tissue transglutaminase antibodies (anti-tTGA) every 3 years
The authors would like to thank Roel Borstlap, former paediatrician of the Assen Down clinic, for his constructive remarks. The authors were pleased to use the photos of the children with Down syndrome. Parental permission was obtained to publish the photos of the children, photography by [www.fluitekruidje.nl](http://www.fluitekruidje.nl).
There are no conflicts of interest.
**Open Access** This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
| 2023-12-16T01:26:19.665474 | https://example.com/article/6804 |
A Sign That Obama Will Repeat Economic Mistakes
Posted on Dec 7, 2012
Please don’t tell me that these reports in the business press touting Sallie Krawcheck as a front-runner for chairman of the SEC or even a possible candidate to be the next Treasury secretary are true. Who is she? Oh, just another former Citigroup CFO, and therefore a prime participant in the great banking hustle that has savaged the world’s economy. Krawcheck was paid $11 million in 2005 while her bank contributed to the toxic mortgage crisis that would cost millions their jobs and homes.
Not that you would know that sordid history from reading the recent glowing references to Krawcheck in the New York Times, the Wall Street Journal and Bloomberg News that stress her pioneering role as a leading female banker—a working mother no less—but manage to avoid her role in a bank that led the way in destroying the lives of so many women, men and their children. Nor did her financial finagling end with Citigroup, as Krawcheck added a troubling stint in the leadership at Merrill Lynch and Bank of America to her résumé.
A woman who would be an excellent choice as the most experienced as well as principled candidate to head the SEC or Treasury is Sheila Bair, former head of the FDIC, who labored to protect consumers rather than undermine them. Indeed, her outstanding book “Bull by the Horns,” chronicling her fight in the last two administrations to hold the banksters accountable, should be required reading for the president and those who are advising him on selecting his new economic team.
The SEC is supposed to supervise the banks rather than abet them in their chicanery. And although the Treasury Department has been a captive of Wall Street lobbyists for most of the modern era, one would expect something better from the second coming of Barack Obama. Those are key appointments in determining whether the president can turn around the still-moribund economy by channeling the spirit of Franklin D. Roosevelt. Or will he continue to plod along on the course set by George W. Bush, bailing out the banks while ignoring beleaguered homeowners and the many other victims of this banking-engineered crisis?
Obama was given a pass on the economy by voters only because Mitt Romney was an even more craven enabler of Wall Street greed. But the outlines of the Bush Wall Street payoff remain in place, with the Federal Reserve continuing to bail out the banks with virtually free money and the purchase of $40 billion in toxic mortgage-based bonds every month to add to the more than trillion dollars in that junk that the Fed previously had taken off the banks’ books.
Advertisement
Square, Site wide
The money printing by the Fed is at the heart of the massive debt crisis. But it has been great for the bankers, with compensation at the 32 largest banks slated to hit an all-time high of $207 billion this year, according to a Wall Street Journal estimate. This reward for ripping off the public is almost three times the amount the federal government spends on education. Once again the bankers are blessed for their failures, receiving such wildly excessive compensation despite the fact that banking revenue is down 7.2 percent over the last two years.
A prime example is Krawcheck’s old bank, Citigroup, whose new CEO this week announced that the company has been forced to engage in a major retrenchment, eliminating 11,000 jobs and closing 84 branches. The bank has been deeply troubled ever since the housing meltdown it helped trigger first began, and it was saved from bankruptcy only by a direct infusion of $45 billion in taxpayer money and a commitment of an additional $300 billion in underwriting of Citigroup’s bad paper.
The ugly tale of America’s Great Recession is inextricably entwined with the deplorable practices of Citigroup, the too-big-to-fail bank made legal by Bill Clinton’s signing off on reversing the Glass-Steagall law that prevented the merger of investment and commercial banks. The first beneficiary of the revised law was the newly created Citigroup, saved from bankruptcy a decade later by the taxpayers.
I shouldn’t be surprised that Krawcheck would be considered a viable nominee for a central position in managing our economy. After all, her colleague in the top ranks at Citigroup during the years of financial depravity, Robert Rubin, is considered a significant adviser to the Obama administration, and his protégés, led by Treasury Secretary Timothy Geithner, are still directing policy. It was Rubin who pushed through the reversal of Glass-Steagall, an act of betrayal of the public interest that was rewarded with obscene amounts of money when he ultimately took the job of leading the bank he made legal.
The very fact that these folks remain influential, as witnessed by Krawcheck being considered to head the SEC rather than being the subject of one of its much-needed investigations, gives further evidence of the enduring but ultimately terminal illness of crony capitalism. | 2023-10-31T01:26:19.665474 | https://example.com/article/2267 |
Q:
Converting HTML to PDF renders Arabic text as question marks
I'm using iTextsharp in an Asp.net application. When converting HTML with Arabic text to PDF, the resulting PDF shows question marks.
How can I convert HTML with content in different languages to PDF using iText?
A:
You want to convert HTML with Arabic text to PDF using iText for .NET. In that case, you need iText 7, the pdfHTML add-on and the pdfCalligraph add-on (*). In your question, you talk about iTextSharp, which leads to believe that you're using an old version of iText. Make sure you have the right version.
In the HTML to PDF tutorial, there's a chapter about fonts: Using fonts in pdfHTML
There's an example involving Arabic in the section entitled "Internationalization":
Your HTML contains Arabic characters, and I assume that the encoding of that HTML file is Unicode. Maybe you're using an old version of iText that reads such files using another encoding by default.
As described in How to display Arabic strings from RTL in PDF generated using itext 7 API? you need a font that supports the Arabic glyphs. Please show us some code so that we can see which font you are using. Maybe no Arabic characters are shown because you didn't define the correct font.
Take a look at this FAQ entry: How to convert HTML containing Arabic/Hebrew characters to PDF?
We need three fonts: one regular for the English text, an Arabic font for the Arabic text, and a Hebrew font for the text in Hebrew:
public static final String[] FONTS = {
"src/main/resources/fonts/noto/NotoSans-Regular.ttf",
"src/main/resources/fonts/noto/NotoNaskhArabic-Regular.ttf",
"src/main/resources/fonts/noto/NotoSansHebrew-Regular.ttf"
};
The code to convert the HTML on the left to the PDF on the right in this figure looks like this in Java (the C# code is very similar; only minor changes need to be applied):
public void createPdf(String src, String[] fonts, String dest) throws IOException {
ConverterProperties properties = new ConverterProperties();
FontProvider fontProvider = new DefaultFontProvider(false, false, false);
for (String font : fonts) {
FontProgram fontProgram = FontProgramFactory.createFont(font);
fontProvider.addFont(fontProgram);
}
properties.setFontProvider(fontProvider);
HtmlConverter.convertToPdf(new File(src), new File(dest), properties);
}
You are also asking for "multiple language" support, but as the FAQ explains: all languages are supported by iText provided that you have the necessary font files for those languages. See Which languages are supported in pdfHTML?
The Java code for this example looks like this (it shouldn't be a problem for a C# developer to port this code to C#):
PdfWriter writer = new PdfWriter(dest);
PdfDocument pdf = new PdfDocument(writer);
pdf.setDefaultPageSize(PageSize.A4.rotate());
ConverterProperties properties = new ConverterProperties();
FontProvider fontProvider = new DefaultFontProvider(false, false, false);
fontProvider.addDirectory(fonts);
properties.setFontProvider(fontProvider);
HtmlConverter.convertToPdf(new FileInputStream(src), pdf, properties);
The directory indicated with fonts points at a directory full of NOTO fonts (free fonts provided by Google for an abundance of languages).
(*) Important note:
iText and the pdfHTML add-on are available as AGPL software (just like the old iTextSharp version you're probably using). This means that you can use this software for free on condition that you also release your software as free software under the AGPL.
Unfortunately, we've noticed that many developers ignored the AGPL license and used iText in a closed source context without purchasing a commercial license. Sometimes, developers did this out of ignorance. To avoid ignorance, we've decided to make the pdfCalligraph add-on (the add-on you need for support for Arabic, Hebrew, and Indic languages) only available as a closed source product.\
Another reason for making this specific add-on closed source is that we don't know of any open source library supporting all of these languages and writing systems. I removed your question asking for alternative open source libraries because you aren't allowed to use Stack Overflow to ask for recommendation for other tools or libraries, but the answer to that question is simple: there are no open source libraries that support HTML to PDF conversion with support for Arabic, Hebrew, Devanagari, Tamil, Telugu, Kannada,... Supporting these languages requires know how that very few developer possess. It would be stupid if we gave away that know how for free (we have to pay salaries too).
| 2024-04-03T01:26:19.665474 | https://example.com/article/3538 |
I was practicing rollers and grenades today at Terrace Creek Park and an older gentlemen was walking near the field where I throwing throwing, watching me and turns to me says "It's nice to see that someone is throwing a frisbee like I hit a golf ball". (HAHAHA, THANKS!!!!) I looked up laughing and said that I can hit a golf ball better than I throw a frisbee.
It does remind me of when my grandpa was trying to teach me to hit a golf ball when I was a kid. "KEEP YOUR HEAD STILL!!" "COME ON KID SLOW ON THE BACK SWING!" And while playing a round after I hit my tee shot: "HURRY UP, THERE'S PEOPLE BEHIND US, GO,GO,GO!!!" I guess you have to teach discipline early. (I was 5 or 6)
SuperClass is as frustrating as ball golf, twice the fun and 1/100 of the cost. It can turn a pitch and putt into an exciting round. We need more SuperClass events, people.
Can't wait to get a new Zephyr for xmas--broke mine on a tree years ago...think I've got a Jaguar or two somewhere. Sure would like to see Innova press some Star or Pro large diameter stuff...a Star Zephyr would be an awesome disc
Comment
Hey I forgot to mention that the Innova Starter Bags (available at Chainbangerz Disc Golf Shop in two different colors ) are so perfect for a SuperClass bag. They are deep enough that if you put your discs in there the zipper closes, they are cheap, have a drink holder, an outside pocket and also can hold up to nine SuperClass discs.
I bought a "Euroblend" fastback the other day in 145 grams and have yet to field test it but I'm hoping it's a little less touchy/flippy than the Super Hero; it is 10 grams heavier after all. We'll see.
Sometimes my mind boggles. It's so deep my mind actually boggles.
~ Cyndi Lauper ~
Comment
I have some proto Champ Zephyrs around 195g that Dunipace sent me showing that they can't mold them very well. Not sure if Star would have the same problems. The rims are wavy and there are bubbles in spots. It's also super slick and hard to grip. But I loan them to others when playing Super Class cause they still fly about the same as DX.
Comment
I have a Te Moko 186, DX Zephyrs 160, 182 & 198 plus a warped flight plate Star SuperHero 184 for putting. If I'm on an open course when it's not too windy, I'll throw in a Champ 150 SuperHero for long tailwind shots and 50 ft putts. Sometimes I'll use a DX Super Hero around 198 for rolling but I seem to be able to handle the Zephyrs a little better for that.
Comment
I noticed earlier that someone mentioned that there weren't any Oregon players with a superclass rating. That's wrong, though. I moved to just over a year ago so it has me listed as Virginia but I'm a born and raised Oregonian. My superclass rating is 1002 making me the 8th ranked player in the world.
Comment
Andrew and I played Super Class yesterday at Terrace Creek. This is my favorite Super Class course so far. Some of the front nine holes are kind of lame but holes 1-4 and 8-18 are really good holes for it. I've played there 3 times now and my scores have been 73, 66, 73. Blyth Park in Bothell is also a really good course.
Sometimes my mind boggles. It's so deep my mind actually boggles.
~ Cyndi Lauper ~
Comment
I tried out my brand new 153g DX Hero 235 today and I love it! I think it's going to replace my Superhero for those shots that must anhyzer and also short touch shots. I threw 6 different discs today (153g DX Hero 235, Te Moko, Zephyr, Star Hero 235, Superhero, 190g DX Hero 235) and the 153g went the farthest in a tail wind predictably. | 2023-09-25T01:26:19.665474 | https://example.com/article/9970 |
Field of the Invention
The invention relates to compositions and methods for treating estrogen-resistant breast cancer cells.
Background of the Invention
Estrogen receptor-alpha (ER-α) is a member of the nuclear receptor superfamily of ligand activated transcription factors, characterized by: an N-terminal transactivation domain (AF-1), a conserved C-terminal activation domain (AF-2), which overlaps with the ligand binding domain (LBD), a sequence-specific DNA-binding domain (DBD), and a hinge region located between the DBD and AF-2 regions.
Most breast cancers (BCs) (≅70%) are initially estrogen receptor-positive (ER+) and thus potentially suitable for anti-estrogen therapy. Despite being ER+, 50% of patients with advanced breast cancer who receive Tamoxifen (Tam) fail to respond, and all patients with metastatic breast cancer eventually develop resistance to Tam. In addition, many patients (≅40%) who receive Tam as adjuvant therapy will relapse and die of disease. The causes of resistance to different anti-estrogens are not identical, but cross-resistance is common. In most cases of acquired anti-estrogen (E2) resistance, breast cancer cells retain ER and thus may be amenable to novel approaches to target ER.
BRCA1 is a strong inhibitor of E2-stimulated ER-α activity via a direct physical interaction with the AF-2 activation domain of ER-α. In mice, BRCA1 expression is widespread, but it is especially increased in rapidly proliferating cells in compartments that are also undergoing differentiation, including mammary epithelial cells during puberty and pregnancy. BRCA1 also represses ligand-independent activation of ER-α, since BRCA1-siRNA can stimulate ER-α activity in the absence of estrogen. This finding suggests that the endogenous levels of BRCA1 are sufficient to inhibit basal activity levels of ER-α. Further studies have documented that BRCA1 broadly inhibits E2-stimulated gene expression and blocks E2-stimulated proliferation of ER-α positive human breast cancer cells. BRCA1 has been detected at the estrogen response element site of estrogen-regulated promoters (pS2 and cathepsin D), and exposure to E2 causes a rapid loss of BRCA1 from this site. Various breast cancer-associated BRCA1 mutations abrogate or greatly lessen the ability of BRCA1 to inhibit ER-α, suggesting that this function is essential for breast cancer suppression. Finally, it has recently been shown BRCA1 can inhibit the activity of aromatase (CYP19A1), a cytochrome P450 enzyme that mediates the conversion of androgens into estrogens, in epithelial cells and adipocytes.
Mutations of the BRCA1 gene account for about half of all hereditary breast cancer. In 30-40% of sporadic breast cancer, BRCA1 expression is absent or reduced, suggesting a wider role in breast cancer. While many studies on BRCA1 focus on its roles in DNA repair, it also has a major role in regulating ER activity, loss of which confers hypersensitivity to E2 and mammary cancer development in mice. BRCA1 knockdown stimulates the ER agonist activity of Tam, and Tam promotes mammary cancer development in BRCA1-deficient mice. In addition, BRCA1-siRNA can cause Tam-resistance due to altered recruitment of co-regulators by ER. These observations suggest that the early stages of BRCA1-dependent mammary tumorigenesis could be E2-dependent, and thus it may be possible to prevent or treat BRCA1-mutant breast cancers using an agent that can mimic the ability of BRCA1 to inhibit ER-α activity. | 2024-02-04T01:26:19.665474 | https://example.com/article/5317 |
Senator Bernie Sanders (I-VT) says he "doesn't believe" that there will be a so-called "blue wave" of Democratic victories sweeping the midterm elections, and that it will be a "very, very close" situation.
Speaking with The Hill's Krystal Ball on Monday while stumping from Iowa Democrat J.D. Scholten, Sanders said that the outcome from the November 6 elections will be determined by a "handful of votes."
"You know a lot of people talk about this "blue wave" and all that stuff - I don't believe it. I happen to think that on election night we're gonna find a very, very close situation, and that maybe a handful of votes determining whether Democrats gain control of the House."
"We have an entity able to stand up to [President] Trump or we don’t," added the former Presidential candidate whose aspirations for the Oval Office were derailed after Hillary Clinton and the DNC "rigged the primary" against him in 2016.
Watch:
Sanders - rumored as a 2020 hopeful against Donald Trump, told Hill.TV that he's doing everything he can to promote promising Democratic candidates such as Scholten - stating "we desperately need his voice" in Congress.
Democrats will need to pick up 23 seats during midterms in order to take back control of the House. | 2023-08-08T01:26:19.665474 | https://example.com/article/6272 |
And the funny thing is those claiming it rarely want to find the person and defend their honor afterwards. There is usually a reason.
That is probably true of most people, but every great once in a while you come upon someone with honor. You sucker punch that person, and he just may hunt you down and kill your sorry ass for the cheap shot.
Anyone that will take a shot at another that is not expecting a fight is a ****ing coward plain and simple. My first impression of this video was the ******s sure have taught these three well. I wouldn't expect much different, whites that hang around with ******s tend to become just like them.
Too funny. The video and the thread. I wish the idiot with the camera would have just shut his mouth instead of adding his idiotic commentary. That guy never saw that coming and then...WHAMMO! On his backside trying to remember what day it is.
And all this talk about honor and cowardice. Oh, it's a good thing to display honor whenever possible, don't get me wrong. But these guys didn't have to display any honor in my opinion. Sleeping beauty is a black guy. Where is their honor? Where has that race ever exhibited anything close to honor in the same capacity as our own? Please. You don't have to prove that you, as a White person, are better or more honorable than a black by squaring off and saying "put up your dukes". Their honor deficit could never be filled no matter how much honor you display towards them (in a fight) just before Leroy's friend Rufus sucker punches you.
You know the difference between this video and the ones where the roles are reversed? The white guys only hit the negro while he was standing. Whenever the blacks are the ones doing the beating, 90% of it is while the victim is on the ground.
That is probably true of most people, but every great once in a while you come upon someone with honor. You sucker punch that person, and he just may hunt you down and kill your sorry ass for the cheap shot.
Anyone that will take a shot at another that is not expecting a fight is a ****ing coward plain and simple. My first impression of this video was the ******s sure have taught these three well. I wouldn't expect much different, whites that hang around with ******s tend to become just like them.
I don't hit anyone unless I see it as unavoidable. Then I'm going to hit first and hard and attempt to keep them from getting back up.
True enough on whites hanging with monkeys. I said it in my first post. Hang with the simians and fighting and trouble is what your life will be.
Cowardly attack on an unsuspecting and much smaller n1gger. That they ran away before they had to fight someone their own size says it all.
Before anyone springs to these arseholes defense, imagine the roles had been reversed and a small white dude had been sucker punched by three blacks. We would be up in arms, and quite rightly so. Just because the perpetrators of this deed are white and the victim black, doesn´t suddenly make it ok.
I hate seeing whites dishonor themselves like this, because they dishonor their race as well. They are cowards to do what they did, end of story. In fact, they behaved just like n1ggers.
In a real fight you throw the first punch or you get knocked out. There's no honor when you lay on the floor and get kicked into a coma.
Its fantastic to see white guys standing up for themselves. Bravo.
Anyone who says otherwise is most likely a jew or liberal negroid lover.
Not treu persee, i never trow the first punch i'd leave that to the intellectual handicapt to doe this.
Unless some one is a pro boxer ore somthing it just makes me LOL,ofc the next punch they try to trow in wil land them on the ground ready for a Doctermartins dental plan
I don't hit anyone unless I see it as unavoidable. Then I'm going to hit first and hard and attempt to keep them from getting back up.
True enough on whites hanging with monkeys. I said it in my first post. Hang with the simians and fighting and trouble is what your life will be.
I never said don't throw the first punch. I will always knock the piss out of anyone that pushes my buttons, and I don't care if they threw a punch or not. If I am pushed to the point that I am angry enough to start punching, they know damned well they were asking for it.
I like seeing whites act as a tribe, and cover each others back, but I don't have any use for buddies that sneak in unnoticed and clock someone then run like hell until they see the person is incapacitated, then come running back in for some more cheap shots. These same cowardly sons of bitches wouldn't have your back in a real scrap. They would be running just like the other coon in the video.
If that tall white boy can't whoop that little ******s ass by himself he needs to do some training. The other two white's role was back up against interference from the other ******s present. | 2023-09-23T01:26:19.665474 | https://example.com/article/8474 |
Q:
Should I change root password
I manage about 50 servers mostly by remote access using ssh on a custom port (root login disabled and users need a public/private key to log in, password login are disabled).
each servers have a unique root password (long string of letters(upper/lower case), number and special characters that doesn't look like a dictionary word).
every server is kept under close monitoring for failures but also unexpected processes, behavior and hacking attempts.
there are only 3 people how knows the root password, and I know they wont write it down somewhere (for that matter, they are as paranoid as me), so I see no reason why this password should be compromised.
Knowing all this, is there a reason why I should change my root password at regular interval ? and if so, what would be a correct interval ?
A:
I'll start with a cliché: security is like an onion, it's made of layers.
Changing your passwords regularly certainly does not hurt, but as you seem to be paranoid, you won't probably
access your network from suspicious locations
access your network using suspicious devices
do not use similar passwords anywhere else
Also I presume you have properly firewalled your environment.
That reduces the absolute need of constantly changing passwords, but as I said, security is like an onion and a regular password refresh day is not a bad thing.
| 2024-06-11T01:26:19.665474 | https://example.com/article/1358 |
Q:
Changing text font size without changing math font size
I want to change font size of text to 14pt, but it's important to me that math font size must be 12pt.
Is there any way to change font size of text without changing font size of math text?
I would grateful for any help.
A:
You can change the surrounding text font size to 14pt by normal means. And to maintain the math font size to 12pt you could use the \DeclareMathSizes in your preamble. The syntax is:
\DeclareMathSizes{display size}{text size}{script size}{scriptscript size}
So, for instance, you could set:
\DeclareMathSizes{14pt}{12pt}{10pt}{8pt}
Or make all math sizes equal:
\DeclareMathSizes{14pt}{12pt}{12pt}{12pt}
It really depends on your requirements! But adding either code to your document's preamble should achieve what you needed to do.
Reference: @Stephan Kottwitz's answer shown here
| 2024-07-17T01:26:19.665474 | https://example.com/article/1314 |
In the next articles, we will introduce you, the engagement rings, the most beautiful and the most expensive in the world.
All these rings are a rare beauty and some have become legendary rings.
The first ring presented is that of the most glamorou...
The most expensive diamond in the world is: Rose pink star
This pink diamond is: 59.6 carats Diamond sold at the astronomical price of: 70.9 million euros.
This diamond is the most expensive in the world to date.
Google translate
One of the biggest rough diamond ever, 1,109 carats The Lesedi la Rona
This diamond is the second largest rough diamond ever found.
This rare diamond was sold for the price of: 53,000,000 millions dollars | 2024-01-18T01:26:19.665474 | https://example.com/article/1582 |
Kristin Pudenz
Kristin Pudenz (born 9 February 1993) is a German athlete specialising in the discus throw. She won a gold medal at the 2017 Summer Universiade and a bronze medal at the 2015 European U23 Championships.
Her personal best in the event is 62.89 metres set in Wiesbaden in 2017.
International competitions
References
Category:1993 births
Category:Living people
Category:German female discus throwers
Category:People from Herford
Category:Universiade medalists in athletics (track and field)
Category:Universiade gold medalists for Germany
Category:Competitors at the 2017 Summer Universiade | 2024-01-21T01:26:19.665474 | https://example.com/article/4319 |
PostMortem of a Casual Game
My last post dealt with the issues involved in creating a sequel. The project I was working on was a casual game targeted for both retail and downloadable sales. Although the development time for such games is much shorter that that of AAA titles, the process involved is very similar.
As promised in my last installment, this post will focus on some of the things that hindered the development of my last project. If you have read post-mortems of any games, you will recognize many of these problems since then tend to recur in project after project. You know the saying..."The best laid plans of mice and men..."
So, here goes:
Staffing Issues
The game industry is always a roller-coaster ride when it comes to staffing. There are many factors that can affect staffing including layoffs and reassignment to other projects. Midway through my project, the production team was cut in half. Unfortunately, the deadline for the project could not be moved, so this meant that those who were left on the team were going to have a lot of work ahead of them.
Scheduling Issues
The initial schedule was created by one producer, and then assigned to another. Since different people have different methods, this resulted in the entire project schedule being re-written midway through the project. It was several weeks before we even knew where we stood and what it was going to take to complete the project on schedule.
Design Bottleneck
Unfortunately, the same cutbacks that affected the production team also affected the design team. There was now only one designer, and he was up to his neck working on other projects. Many design decisions were made by the development team, only to be later overridden by the designer when he finally had time to focus on our project. This resulted was time spent on work that either had to be re-done or never even ended up in the game.
Feature Creep
In light of the above problems, it seems like the obvious choice would be to cut features. Alas! Instead, features were added. It was felt that these features were critical in giving the game an edge in a very competitive market. This insured even more overtime for an already taxed development team.
Unmovable Deadline
Like many games, this project was slated for Christmas release. The need to get the product out for the Christmas season was critical, so this deadline could not be changed. To make matters worse, one of the distributers decided they needed the game 2 weeks ahead of our original schedule, effectively cutting two full weeks off of an already tight schedule.
Lack of QA
The QA department had minimal staffing due to the above mentioned cutbacks. This meant that everyone at the company became QA. Although we all did a heroic job, there simply was not enough time and resources to properly test every aspect of the game.
The End Result
No game goes out the door without any bugs. My last project was no exception. We knew we were releasing a product that would have problems, but at the end of the day we all knew that we had done the best possible job we could do under the circumstances. Luckily, there was time after the release to continue fixing bugs and patches were released. However, no one likes to buy a game with obvious bugs, and this definitely did not look good on the company.
Regardless of the problems, I was proud to be a part of this project. I can honestly say that everyone involved gave 200%. We were amazed that we could complete the project as well as we did, given all of the difficulties we had. | 2024-05-26T01:26:19.665474 | https://example.com/article/3928 |
Compartmentation of amino acid metabolism in the rat dorsal root ganglion; a metabolic and autoradiographic study.
The incorporation of radioactivity into glutamate, glutamine, GABA and other amino acids was followed after incubation of desheathed rat dorsal root ganglia in media containing [14C]glucose or [14C]acetate. The results indicated that [14C]glucose was incorporated into a large pool of glutamate, but that this glutamate pool did not synthesize glutamine or GABA to any great extent. [14C]Acetate, on the other hand, was incorporated into a small glutamate pool which was readily converted to glutamine, and which synthesized GABA to a greater extent than the large pool. Light microscopic autoradiography of ganglia incubated with [14C]glucose or [14C]acetate confirmed that the small pool labelled by acetate was probably associated with satellite glial cells, while the large pool was located within the ganglion neurons. The results are discussed within the context of previous work on compartmentation of glutamate metabolism in the central nervous system. | 2024-01-08T01:26:19.665474 | https://example.com/article/1484 |
I had looked at tablecloths at a local rental company, and these are much nicer and priced much lower than the ones availabe for rent. They look amazing with the runners I also purchased.
(Posted on 3/18/12)
Good value for the priceReview by Monet
I debated whether or not to purchase these tablecloths for an event, but when I saw paper "linen-like" tablecovers selling for $5.99, I'm glad I did. They looked lovely on the tables and washed/dried well. My only criticism is that most of the tablecloths were not true rectangles. They were cut unevenly, and some seemed to be cut on the bias instead of on the grain.
(Posted on 3/1/12)
Impressed restaurant ownerReview by Michelle
We purchased these for our restaurant. I was hesitant to write a review until we had had them for awhile. After a year and multiple washings, I am VERY impressed by their duribility and stain resistance. We will continue to purchase from Linentablecloth.com
(Posted on 2/17/12)
Fast & Affordable Service!Review by Angele & Ryan
My fiance' and I ordered these tablecloths for our upcoming wedding and the order was shipped to us very quickly and was exactly as we wanted. Linentablecloth.com has the best quality and service for the price! Very affordable!
(Posted on 1/9/12)
Love themReview by Yaz
These white tablecloths are so nice, elegant, affordable i so recommend them...
We have now ordered these tablecloths, along with the skirting and clips from this wedsite and I feel as though this is the most cost efficient way to go! The prices and quality of the products on this LTC are amazing! I am so happy with this purchase, we will be using them for my daughters wedding on 8 ft tables.
(Posted on 12/28/11)
Good value but slightly flawedReview by Lauren
A great value for the money and these were perfectly sufficient for our wedding, but some are cut slightly unevenly. It isn't too noticeable on the tables, however. Just when they're folded.
(Posted on 11/16/11)
used it for my wedding of 300 guestsReview by Evelyn
the most cost efficient table clothes I have found online and the quality is great after the reception my table clothes were stained badly even after using several products to get the stains out nothing worked so as a last resort I used dish detergent and a tooth brush to scrub spots then washed them with bleach and now they look like new again the only thing you should worry about is wrinkles when they come straight out of the box they came in but that can be easily fixed with ironing or steaming over all its better to buy then rent you can use them again or resale them or let a family member use them for there special occasion buy it its worth it for how much you get for your money
(Posted on 9/21/11)
Great ProductReview by Ami
These table clothes have worked very well for us! I was skeptical when I saw the price compared to other companies, but I received them and was very impressed. They was well and appear to be quite stain resistant! I have used them several time and I am confident they will last for many more events! Great quality, exceptional price! Thanks Linen Tablecloth!
(Posted on 9/12/11)
perfect for outdoor weddingsReview by Melanie
I rent these out alot for outdoor weddings because they fit a basic 8 foot folding table perfectly!! These are great linens and I LOVE LTC!! I have purchased so so so so many products and will continue to buy from this company! I have purchased from other companies and the products from LTC are better priced and great quality!!! | 2023-09-12T01:26:19.665474 | https://example.com/article/4310 |
a blog from Modern Quilt Studio
daughters lost and found
On this day seven years ago my husband and I walked into a hotel room in Nanchang, China and met the 10-month old baby girl who would become our daughter. I had waited a lifetime to become a mom and this particular part of the journey had taken five years. The term “Gotcha Day” is used among adoptive families to refer to the day on which the child became part of the family. In our house, it’s up there with birthdays and Christmas in importance to us all.
During my long wait to become a mom I often thought about what it would be like when I first saw the baby’s face. I thought a lot about how I would feel and what it would mean to me. What I hadn’t counted on was how moved I would be by the tears of our daughter’s foster mom, who had cared for her since she was just a few days old.
We only had a few minutes with her foster mother and the translator. I had planned to ask the foster mother a bunch of practical questions about our daughter that seemed totally inappropriate once I saw her tears. Instead I found myself reassuring her and telling her that in our home we would always speak of her with great admiration and appreciation. I promised that we’d stay in touch and I have kept the promise. She handed me a letter written in Chinese that we later had translated and is among my most cherished possessions.
In the letter she wrote poetically of how much she had enjoyed sharing our daughter’s first 300 days and what a good baby she had been. Suddenly I realized that not only would our daughter’s birth parents be missing her now but so would this lovely woman and her family. In the midst of one of the happiest days of our lives, she was experiencing sadness and loss. Suddenly I realized that with every abandoned child who is adopted that there are scores of people who will miss seeing that child grow up and seeing what they could have contributed to their family and country. Although I understand the reasoning behind the One Child Policy in China, the human toll that it takes on families is brutal.
Soon after returning to the US, I began thinking (between diaper changes and formula mixing) about the importance of capturing the bittersweetness I experienced in that hotel room months before. The above quilt, entitled Daughters Lost and Found, was what I made to share with my daughter when she’s older. I wanted to be able to convey to her my complex emotions about her heritage. It was sometimes hard but in the end a profoundly moving experience for me to think about the emotions of all of the people involved. There was my own bliss at being a mom and feeling as though we had won the lottery with this baby who had a vivid personality at such a young age while also feeling regret that her birth family would never know what a happy family she had been placed into. It was not the uncomplicated scenario into which my friend’s babies had been born.
detail of Daughters Lost and Found
In the quilt, the pink rectangles represent the flood of girls being adopted and the happiness that they will bring to their new families. The gray strips remind me of the birth and foster families who will miss them and miss watching them grow up. To give you a sense of the scale, each of those gray strips is ¼” wide.
I share this all with you because someone told me recently that President Obama’s Chief of Staff Rahm Emmanuel is rumored to have a sign on his desk that reads, “Never let a crisis go to waste.” The suggestion is that if you look for the opportunity for it that positive change can come from a crisis. I’m taking this idea in a slightly different direction because I believe that from intense emotions can come beautiful expressions. Things made thoughtfully will always be our most cherished possessions. Intense emotional responses, both happy and sad, inspire creativity if you’re brave enough to let them come out. I’m glad I did.
Thank you so much for sharing this beautiful story that inspired such an exquisite quilt. We too often neglect to utilize the creativity formed by intense emotions and situations which you remind us. Makes one think.
I did not know that you had an adopted daughter when I subscribed to your blog. I just loved looking at your beautiful quilts. I, too, have adopted from China. My beautiful girls are 7 and 5 and have blessed my life for 6 and 4 years respectively.
I am so glad that someone else understands the emotional pain that goes with the happiness of that day. I remember flying out of Hong Kong on our way home and crying uncontrollably. I thought to myself “How could I take this little girl away from the country of her birth?” I knew I was doing the right thing for both of us but still the emotions run deep. And they are not always happy ones.
What you took from that moment is more beautiful and precious than anything you have showed us before. I hope you have a wonderful day and celebrate your family big time.
20 yrs ago a dear teacher went to China to find her daughter too. From that time on I have watched in awe as all the sweet girls find their way home and into loving arms. And then I read Luana Rubin’s journal as she also went to find her daughter Sophie and I will celebrate with your family and admire the depth of emotion in this lovely heirloom. A joyful day for all three of you!
The day my grandson arrived from South Korea is one of the most memorable in my life. The woman who escorted him here spoke no English and I, no Korean. But our embrace, smiles exchanged and tears said it all. In just moments I became a Grandma and made a friend. I may never see her on this Earth again, but I know, like me, she too thinks of that day often and of that other woman, continents away but never farther than our thoughts.
I am so moved by this story, and by the artwork that results. Such fine, intricate work — truly honoring those who have lost these beautiful girls, and the joy of those who receive them. What a lucky daughter to receive these gifts from you. | 2024-04-02T01:26:19.665474 | https://example.com/article/2983 |
Huge preorders from Warcradle
WILD WEST EXODUS AUGUST PRE-ORDERS
Well, well, well, August sure does look jam-packed and full of Wild West Exodus delights… Let’s not keep you hanging too long though – time to dive straight in!
The Dark Nation Posse, led by the corrupt and wraith-like Wicasasni, is the second Posse set to be released for The Hex. The Dark Nation Posse is now available to pre-order alongside the Secret Service Posse, lead by none other than Abraham Lincoln himself (wielding an axe, of course).
Need some support on the tabletop? We have some great support units on pre-order for Warrior Nation and Enlightened in the form of the heroic Kaga Brothersand a set of ruthless Enlightened Brutes. Hex players will be able to pre-order the Hexalith, an artefact imbued with the essence of the Hex, which was previously only available in the Absolute Power Posse.
Lastly, with Gen Con 2018 starting next week, make sure to get hold of your very own Nakano Gozen either online or at the event itself!
As always, make sure to check the whole of this months pre-orders so you don’t miss out on any of our new Wild West Exodus products.
WARCRADLE STUDIOS AT GEN CON 2018!
Heading to Gen Con 2018? Make sure to pop by our booth! We have our dynamic demo team, our awesome Studio team, including Roberto Cirillo, and lots of miniatures for you to take a peep at – and plenty of miniatures available to purchase too, of course.
Nakano Gozen – Emissary of the Blazing Sun
Nakano Gozen, our promotional miniature for 2018 will be available for purchase from our booth (3027) for £13.00.
Not attending? Feeling like your missing out? Don’t worry!
We will be making Nakano Gozen available to purchaseonline during events attended by Warcradle Studios! During Gen Con, she will be available from our online store between 09:00 August 2nd until 21:00 BST on August 5th 2018. Her next appearance online will be during Tabletop Gaming Live at the end of September!
Nakano Gozen is our promotional miniature until 2019 when she will become part of our regular catalogue of fantastic miniatures – available to all!
DARK NATION POSSE
The corruption of Walks Looking was the doorway to the tainting of the Warrior Nation. Ghost Wolf’s daughter became tainted by The Hex and transformed into Wicasasni to become a twisted creature of malice and vengeance. Wicasasni took great delight in warping and corrupting the minds and bodies of her own people, creating a “Dark Nation”.
Though Wicasasni was eventually captured by Ghost Wolf and the tainted aspect driven out, the wraith-like creature that emerged was just as deadly and even more malevolent than before. Walks Looking returned to her people with half a soul, the other half now sustaining her darker aspect that had been given independence in the exorcism. While Wicasasni can no longer warp the flesh of her followers she is still surrounded by twisted men and women who are the product of her previous corrupting influence. Khali, Camazotz, Seke and Nizhoni now work with Wicasasni and together the Dark Nation will tear down the world of humanity and remake it in their own image.
The Dark Nation Posse contains five multi-part resin miniatures:
1x Wicasasni
1x Khali
1x Camazotz
1x Seke
1x Nizhoni
5x Bases.
Price: £38.00
SECRET SERVICE POSSE
Desperate times call for desperate measures and Abraham Lincoln believes that the times of the Dystopian Age are desperate indeed. Faking his own assassination in order to work unhindered by the demands of office, Director Lincoln now fights against the Union’s enemies alongside those men and women trusted enough to join his Secret Service.
Lincoln and his agents wage a war in the shadows, defending their beloved country from threats that the general public must have no knowledge about. Whatever it takes so that the good folk of the Union of Federated States can sleep soundly in their beds. With the assistance of his right-hand man Robert Pinkerton, his top agents Lucinda Loveless and Camilla Blanche, Henry Courtwright, Leah Kingston and Milo Jefferson, Lincoln has the tools he needs to tackle any situation.
The Secret Service Posse contains six multi-part resin miniatures:
1x Abraham Lincoln
1x Robert Pinkerton
1x Lucinda Loveless
1x Camilla Blanche
1x Henry Courtwright
1x Milo Jefferson
1x Leah Kingston
7 x Bases.
Price: £35.00
RED OAK WATCH TOWER
Dominating the skyline of towns like Red Oak, these watchtowers allow the residents to keep a watchful eye for the telltale dust clouds that announce the arrival of Iron Horses and the bandits who often ride them. With parts to assemble it instead as a water tower, the Red Oak Watchtower is a great addition to your table or even the centre point for one.
This Wild West Exodus Scenery kit contains:
1x Red Oak Watchtower Building
Options to build a Water Tower.
Assembly Instructions.
Price: £30.00
NEW STARTER SETS
Divine Intervention & Absolute Power
The first of the Cor Caroli to walk the Earth, Makara leads her Divine Intervention to deliver humanity from the clutches of the Hex. Fighting alongside their leader are the powerful warriors Haan, Vulana, Mithun and Siraj, each encased in heavy armour and wielding a variety of advanced weaponry.
The Divine Intervention Starter Set contains five Resin miniatures, a rule book, tokens, templates, dice and the Action and Adventure card decks.
Absolute Power is the posse of the Third Man. Alongside this formidable Hex Boss is his loyal guardian Kreechur, the insidious Garratt Morden, the scheming Megan Wild, the vengeful Maria Torres-Villa and the traitorous John Hunter Bennett. The set also comes with a Hexalith, a mysterious totemic idol that the posse can draw power from.
The Absolute Power Starter Set contains 7 multi-part resin miniatures, a rule book, tokens, templates, dice and the Action and Adventure card decks.
Each Wild West Exodus Rules and Gubbins Set contains:
A Softback A5 Rulebook
Condition Tokens
Blast and Torrent Templates/li>
4x D10 Dice
1x Action Card Deck
1x Adventure Card Deck
Starter Set Price: £50
KAGA BROTHERS
The enemies arrayed against the Warrior Nation are many and powerful and the Great Spirit commands that they shun the use of the tainted technology from the Enlightened. Despite this limitation, the Warrior Nation make use of Gatling guns, heavy crossbows and other tribal weapons to destroy their foes, making up for a lack of such alien advantages with sheer heroism and faith in their traditions.
Those who follow the Brotherhood of Kaga have resigned themselves to the fact that they will likely die in battle. Their use of support weapons and close proximity to the most deadly of conflicts makes this a certainty. The Kaga Brothers have their funeral rites upon initiation and their ranks are filled with those seeking atonement or with nothing else to lose. Deadly and valorous, the presence of Kaga Brothers in a force brings death with them, not just for themselves but for many of their enemies too.
The Kaga Brothers kit contains three multi-part resin miniatures:
1x Kaga Brother with Plainswalker Crossbow
2x Kaga Brother with Gatling Gun
3x Bases.
Price: £15.00
ENLIGHTENED BRUTES
The ruthless pursuit of scientific progress can blind many to the moral questions raised by such progress. Such is the case with many of the creations of the Covenant of the Enlightened, Brutes being a prime example of this blindness.
Through the use of RJ-1027, the subject’s impressive frame has its musculature increased significantly and performance and strength are further enhanced with mechanical augmentations. The result is a hulking servant capable of wielding the heaviest firearms and able to fold sheet metal as if it were paper. Brutes are employed as enforcers, soldiers, and bodyguards by the Enlightened and have proven to be formidable in all these roles.
The Enlightened Brutes kit contains two multi-part resin miniatures:
1x Enlightened Brute with Flamethrower miniature
1x Enlightened Brute with Juiced Gatling Gun miniature
2x Bases.
Price: £15.00
HEXALITH
The energies of the Hex can be focussed and channelled in a number of ways, one being the creation of a Hexalith. These otherwise mundane objects have been imbued with the essence of the Hex and can be drawn on when needed to channel the extra-terrestrial power.
Hexaliths can be made from any material but many hours of care and focus are required to attune it to the other-worldly energies. The resultant effect often creates an object of strange and unsettling design directly from the tainted mind of the creator.
BY GAMERS FOR GAMERS!
Want to get cash back for simply buying games from reputable stores? Click the banner to find out more with Tabeltop Cashback!
Gamers Web is proud to be sponsored by 6s2hit.com the best games prices in Scotland!
Dark Star Games
For the best selection of Star Wars Gaming around. Click the banner for huge savings on X-Wing, Legion, Armada and more!
Turbo Dork
Turbo Dork make some truly amazing paints that can be used traditionally or via an airbrush. Excellent value for money too!
Search
Search for:
In the Games Industry? Read this!
Gamers Web is always keen to help people in the industry, be it reviewing products or breaking news, or simply putting the right people in touch with the right people within the industry! If you would like to know more please just drop me a line marcfarrimond@gmail.com | 2024-07-15T01:26:19.665474 | https://example.com/article/9601 |
Over the past few years, however, many fast food restaurants have revamped their menus, providing more nutritious options. If you are aware of these options, rolling through the drive-thru doesn’t mean your healthy diet has to take a nosedive.
Watch portion sizes. The average size of a hamburger in the 1950s was just 1.5 ounces; today, they weigh in at 8 ounces or more! Stick to a regular or junior-size meal or sandwich. Avoid anything labeled as Jumbo, Super Size, Deluxe, Giant or Big Size.
Pizza can be OK. Stick to veggie pizza (red sauce) without meat toppings or extra cheese. And add a side salad!
Choose fruit. Look for fruit on the menu for side dishes and snacks.
Moderation is the Key
An occasional high-fat meal from a fast food joint is OK. But if you find yourself eating it on a regular basis, it may be time to put your health first. Check out a few sample 2,000 calorie menus that you can use for a day on the go! | 2024-04-29T01:26:19.665474 | https://example.com/article/5700 |
Walking in the Spirit - Article/article/walking-spiritHenry M. Morris III, D.Min. - ... who walk not after the flesh, but after the Spirit." (Romans 8:1)
This promise in our text is followed in a later Pauline epistle by two nuanced commands in the letter to the church at Galatia.
"This I say then," Paul says,...
Declaring Gods Righteousness - Article/article/declaring-gods-righteousnessConnie J. Horn - ... Jesus Christ unto all and upon all them that believe” (Romans 3:21,22).
Paul’s “heart’s desire and prayer to God for Israel (was), that they might be saved” (Romans 10:1), but Jesus had come “unto His...
Declaring God's Righteousness - Article/article/20186Connie J. Horn - ... Jesus Christ unto all and upon all them that believe” (Romans 3:21,22).
Paul’s “heart’s desire and prayer to God for Israel (was), that they might be saved” (Romans 10:1), but Jesus had come “unto His...
Italians And Israelites - Article/article/italians-israelitesHenry M. Morris, Ph.D. - ... love of Christ into the apostle of the Gentiles (Romans 11:13). It was necessary that the gospel be preached to the Jew first (Romans 1:16) and then unto the uttermost part of the earth (Acts 1:8). Although the...
Overcome Them - Article/article/overcome-themHenry M. Morris III, D.Min. - ... same way, we are to conquer as we "reign in life" (Romans 5:17), because we are "born of God" (1 John 5:4). The Lord Jesus has overcome the world (John 16:33), and since we believe that Jesus is the Son of God, we too will get...
Apostolic Thanksgiving - Article/article/apostolic-thanksgivingNorman P. Spotts, D.D. - ... 10:30,31); for the love and care of fellow Christians (Romans 16:3,4); for a quiet life procured by civil rulers (I Timothy 2:1,2); for souls who have been wonderfully saved (Colossians 1:3–5); for his own call into the ministry...
Have They Not Heard? - Article/article/have-they-not-heardHenry M. Morris, Ph.D. - heard? Yes verily, their sound went into all the earth (Romans 10:18). He was quoting Psalm 19, of course, which indicates that the very heavens declare the glory of God (Psalm 19:1). He had also reminded the Romans that the...
Others' Things - Article/article/others-thingsHenry M. Morris III, D.Min. - ... to the doctrine which ye have learned; and avoid them" (Romans 16:17). Another part is being aware of godly examples. "Brethren, be followers together of me, and mark them which walk so as ye have us for an ensample" (Philippians...
Rejoicing In Tribulation - Article/article/21233Henry M. Morris, Ph.D. - ... also: knowing that tribulation worketh patience” (Romans 5:3).
One of the most powerful evidences of the saving power of the Christian faith is the ability of true Christians to endure suffering and loss with joy. The apostle...
Whosoever Will May Come - Article/article/21093Henry M. Morris, Ph.D. - ... on Him . . . of whom they have not heard? (Romans 10:14). Theologians of great intellect have wrestled with these questions for centuries, without resolving them, at least to the satisfaction of those of different mental... | 2024-01-24T01:26:19.665474 | https://example.com/article/8959 |
Big Mac attack
Patrick McGuigan made the most out of his opportunities after the University of San Francisco gave him the chance to pitch
Patrick McGuigan has been successful in every role asked of him the past four seasons by San Francisco Dons baseball coach Nino Giarratano.
The right-hander worked nine games out of the bullpen as a freshman and became a fixture there the next two seasons before finally getting a start as a junior.
This year, injuries to the pitching staff gave McGuigan the opportunity to start, and he has responded with a 9-2 record. He was so impressive during March that he was named the West Coast Conference pitcher of the month.
Despite being the Star-Bulletin's All-State Pitcher of the Year in 2002, McGuigan was not recruited. He also teamed with catcher and current Hawaii Rainbow Matt Inouye, the Star-Bulletin All-State Offensive Player of the Year, to lead the Mid-Pacific Owls to the state championship.
"The Dons weren't going to recruit me, but said I was welcome to come and try out. They said the program was going in a good direction and it would be a good place to play," said McGuigan, whose sister, Nanea, was working in the USF athletic department at the time.
Giarratano, who never saw McGuigan play a high school game, received a telephone call from MPI baseball coach Dunn Muramaru.
"He said nothing but great things about Patrick. He told me what a great competitor Patrick was. Dunn saw the potential," said Giarratano. "We wanted to give Patrick an opportunity. We're sure glad we did."
McGuigan enjoys the reliever role. He is USF's all-time saves leader with 17 and the career leader in appearances (86).
"There is pressure as a reliever, but fortunately I had a lot of opportunities and chances to get better. The team relies on you a lot and I have been fortunate to keep that position (as a reliever)," McGuigan said.
Although he made 12 starts this year, McGuigan still has seen action out of the 'pen. When he is there and it's late in the game with the score tight, he begins getting ready.
As the 2006 season evolved and the Dons battled for one of the two playoff berths in the WCC championship series, McGuigan has been in the 'pen Friday and Saturday. If he wasn't needed or just faced a couple of batters to close a game, he would start Sunday.
"Patrick did wonderful as a starter, but is so valuable late in the season coming out of the 'pen. Winning games is such a high commodity," Giarratano said.
"It is kind of a dual role for Patrick. He has pitched a lot of innings, so now I want more quality than quantity.
"He throws three pitches -- fastball, slider and changeup -- for strikes. He has movement on his fastball. His slider to right-handed hitters, at times, is unhittable.
"It is about the same velocity as his fastball and looks like a fastball until the last 5 feet. And, when batters start going outside for the slider, they can't handle the inside fastball."
McGuigan pitched two shutout innings last Friday to get the win as USF beat Loyola Marymount 5-4 in 11 innings, then started and got the victory Sunday as the Dons swept the series to win their first-ever WCC title.
Not an overpowering pitcher, McGuigan relies on getting opponents to make contact, not solid contact, then letting his teammates do the rest.
"We have a solid defensive team this year. They make plays for you, and that is comforting," said McGuigan, who had no plans to be a starter this year. "When Coach gave me the opportunity, I had some success."
McGuigan acknowledges the slider is his dominant pitch and he uses it often. He takes pride in hitting his spots and getting opponents to hit ground balls.
"No matter what I have asked, starter or closer, Patrick does the best he can and that is why he is so successful. His command of his pitches is his greatest strength," Giarratano said. "We don't have a team captain, but emotionally, he has great leadership qualities."
Being named player of the month -- when he was 4-0 with a 1.59 ERA and held opponents to a .139 batting average -- was unexpected.
"I don't pay attention to things like that. You don't shoot for those things. It just happened," McGuigan said.
"It obviously was a team effort. There are guys out there who score runs and make me look good."
The highlight of McGuigan's USF career came earlier this year when he defeated then-No. 22 Pepperdine in the deciding meeting of a three-game series.
"It was the first time in a long time we won a series there. It was big for our program," he said.
McGuigan ranks second on the Dons' career list for wins (21), is sixth in strikeouts (170) and eighth in ERA (2.84).
He graduates with a degree in marketing today and would like to stay in San Francisco if he doesn't get a chance to play pro ball.
"There has been a little interest. The scouts are not swarming, but you never know what will happen with the draft, McGuigan said.
"It has been a great four years. I've had a lot of fun. The teams I've been a part of are more than you can ask for. The coaches help you learn and make you work hard. San Francisco has all kinds of people and it is a great place to learn outside of the world of baseball." | 2024-06-20T01:26:19.665474 | https://example.com/article/8036 |
Q:
Capture columns in plpgsql during UPDATE
I am writing a trigger in plpgsql for Postgres 9.1. I need to be able to capture the column names that were issued in the SET clause of an UPDATE so I can record the specified action in an audit table. The examples in the Postgres documentation are simple and inadequate for my needs. I have searched the internet for days and I am unable to find any other examples that try to achieve what I want to do here.
I am on a tight schedule to resolve this soon. I don't know Tcl so pl/Tcl is out of the question for me at this point. pl/Perl may work but I don't know where to start with it. Also I wanted to find a way to accomplish this in pl/pgsql if at all possible for portability and maintenance. If someone can recommend a pl/Perl solution to this I would be grateful.
Here is the table structure of the target table that will be audited:
Note: There are many other columns in the record table but I have not listed them here in order to keep things simple. But the trigger should be able to record changes to any of the columns in the row.
CREATE TABLE record (
record_id integer NOT NULL PRIMARY KEY,
lastname text,
frstname text,
dob date,
created timestamp default NOW(),
created_by integer,
inactive boolean default false
);
create sequence record_record_id_seq;
alter table record alter record_id set default nextval('record_record_id_seq');
Here is my audit table:
CREATE TABLE record_audit (
id integer NOT NULL PRIMARY KEY,
operation char(1) NOT NULL, -- U, I or D
source_column text,
source_id integer,
old_value text,
new_value text,
created_date timestamp default now(),
created_by integer
);
create sequence record_audit_id_seq;
alter table record_audit alter id set default nextval('record_audit_id_seq');
My goal is to record INSERTS and UPDATES to the record table in the record_audit table that will detail not only what the target record_id was (source_id) that was updated and what column was updated (source_column), but also the old_value and the new_value of the column.
I understand that the column values will have to be CAST() to a type of text. I believe I can access the old_value and new_value by accessing NEW and OLD but I am having difficulty figuring out how to obtain the column names used in the SET clause of the UPDATE query. I need the trigger to add a new record to the record_audit table for every column specified in the SET clause. Note, there are not DELETE actions as records are simply UPDATED to inactive = 't' (and thus recorded in the audit table)
Here is my trigger so far (obviously incomplete). Please forgive me, I am learning pl/pgsql as I go.
-- Trigger function for record_audit table
CREATE OR REPLACE FUNCTION audit_record() RETURNS TRIGER AS $$
DECLARE
insert_table text;
ref_col text; --how to get the referenced column name??
BEGIN
--
-- Create a new row in record_audit depending on the operation (TG_OP)
--
IF (TG_OP = 'INSERT') THEN
-- old_value and new_value are meaningless for INSERTs. Just record the new ID.
INSERT INTO record_audit
(operation,source_id,created_by)
VALUES
('I', NEW.record_id, NEW.created_by);
ELSIF (TG_OP = 'UPDATE') THEN
FOR i in 1 .. TG_ARGV[0] LOOP
ref_col := TG_ARGV[i].column; -- I know .column doesn't exist but what to use?
INSERT INTO record_audit
(operation, source_column, source_id, old_value, new_value, created_by)
VALUES
('U', ref_col, NEW.record_id, OLD.ref_col, NEW.ref_col, NEW.created_by);
END LOOP;
END IF;
RETURN NULL; -- result is ignored anyway since this is an AFTER trigger
END;
$$ LANGUAGE plpgsql;
CREATE TRIGGER record_audit_trig
AFTER INSERT OR UPDATE on record
FOR EACH ROW EXECUTE PROCEDURE audit_record();
Thanks for reading this long and winding question!
A:
you cannot to get this information - not in PL level - probably it is possible in C.
Good enough solution is based on changed fields in records NEW and OLD. You can get list of fields from system tables ~ are related to table that is joined to trigger.
| 2024-05-23T01:26:19.665474 | https://example.com/article/9358 |
Essential Reading
Housed in a warehouse in Ica, Peru, is a collection of ancient stone tablets which carry pictures portraying advanced medical practice. They open a Pandora’s box of questions and challenge everything we have been taught about our past
The sacrifice of “six million Jews” was being talked about before Hitler rose to power. A photocopy from the American Hebrew dated Oct. 1919, speaks openly about a holocaust of six million Jews before declaring “Israel is entitled to a place in the sun”!!
Long before it became a crime in some countries to question the Holocaust, in fact before it is even supposed to have happened, Zionists were invoking the figure of “Six Million” and talking of a sacrifice for Israel
The Bush administration will announce in mid-November, after the presidential election, that it intends to establish the first U.S. diplomatic presence in Iran since the 1979-81 hostage crisis, according to senior Bush administration officials.
The proposal for an “interests section,” which falls short of a full U.S. Embassy, has been conveyed in private diplomatic messages to Iran, and a search is under way to choose the American diplomat who would head the post, the officials said.
Iranian President Mahmoud Ahmadinejad said last month that he would consider the idea, which first surfaced over the summer.
The U.S. had close ties to Iran’s late shah, who was overthrown in 1979. Iran’s ruling circles, however, are suspicious of U.S. attempts to expand its influence in the country.
Earlier this month, an Iranian official said that Iran would refuse to allow a U.S.-based nonprofit group, the American-Iranian Council, to operate there even after it received a Treasury Department license to do so.
Sen. Barack Obama, the Democratic presidential nominee, has criticized the Bush administration’s penchant for not talking to U.S. enemies, and has indicated that he would hold direct talks, even with Ahmadinejad.
Republican nominee Sen. John McCain has ridiculed Obama and his foreign policy as naive.
Yet in his waning days in office, President Bush has authorized a more direct approach to Iran, sending Undersecretary of State William Burns to participate in six-nation nuclear talks with Iranian representatives in Geneva in July.
Among other things, the U.S. diplomats in Tehran would facilitate cultural exchanges; issue visas for Iranians to travel to the U.S.; and engage in public diplomacy to present a more charitable view of the U.S.
The U.S. and Iran don’t have formal diplomatic relations, which were broken by President Carter in April 1980, following the November 1979 seizure of the U.S. Embassy in Tehran by Iranian students.
U.S. interests in Iran are looked after by the Swiss. Iran has a small interests section in Washington under Pakistan’s embassy, but it doesn’t include any Iranian diplomats.
Iranian Foreign Minister Manouchehr Mottaki said in New York in July that Iran would insist on a quid pro quo for permitting a U.S. interests section: approval of its standing request for direct flights between Tehran and New York.
While some senior officials said Bush and Secretary of State Condoleezza Rice haven’t made a final decision, they and others indicated that the mid-November announcement is a near-certainty.http://seattletimes.nwsource.com/html/nationworld/2008304841_iran24.html | 2024-01-15T01:26:19.665474 | https://example.com/article/4970 |
Q:
HttpUrlConnection Leaking Sockets with "Can't identify protocol" error message: even after closing input stream and disconnecting socket
My application is periodically throwing Too Many Open files: Socket Exception. Lsof command shows that there are many broken sockets with "Can't identify protocol" message. So, I think somehow socket/stream are not getting closed even though I am doing clean up in final block as suggested in
Seeing too many lsof can't identify protocol
Java app with URLConnection leads "Too many open files"
Here is my code:
private static Map<String, List<String>>getResponseHeaders (URL url) throws IOException {
InputStream urlStream = null
URLConnection urlConnection = null
try{
urlConnection = (HttpURLConnection)url.openConnection()
urlConnection.setAllowUserInteraction(false)
urlConnection.setRequestProperty("User-Agent", "Agent-123")
urlConnection.setConnectTimeout(10000)
urlConnection.setReadTimeout(15000)
urlStream = urlConnection.inputStream
return urlConnection.getHeaderFields()
}catch (IOException ex){
log.info( "Could not open the connection for url "+url +" error msg "+ex.message)
throw ex
}finally {
if(urlStream){
urlStream.close()
}
if(urlConnection){
urlConnection.disconnect()
}
}
Looking for some help here. Thanks!
A:
I don't know if this is completely on target but it sounds similar.
There was a problem in the JRE that wasn't fixed until JRE7. I don't know if the fix got backported to 6 eventually, it was not last time I checked. The bug showed up if you passed a hostname to a Socket and it threw an UnknownHostException the socket would leak a file descriptor until the garbage collector collected the dead socket object. The work around is that you resolve the hostname manually and give the socket the IP address instead or upgrade the JRE.
I could not locate the original bug report in Oracle's bug database that has the exact fix version.
| 2023-10-07T01:26:19.665474 | https://example.com/article/5348 |
<?xml version="1.0" encoding="UTF-8"?>
<archive type="com.apple.InterfaceBuilder3.CocoaTouch.XIB" version="7.10">
<data>
<int key="IBDocument.SystemTarget">784</int>
<string key="IBDocument.SystemVersion">12A269</string>
<string key="IBDocument.InterfaceBuilderVersion">2549</string>
<string key="IBDocument.AppKitVersion">1187</string>
<string key="IBDocument.HIToolboxVersion">624.00</string>
<object class="NSMutableDictionary" key="IBDocument.PluginVersions">
<string key="NS.key.0">com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<string key="NS.object.0">1498</string>
</object>
<object class="NSArray" key="IBDocument.IntegratedClassDependencies">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>IBProxyObject</string>
<string>IBUIImageView</string>
<string>IBUILabel</string>
<string>IBUITableView</string>
<string>IBUIView</string>
</object>
<object class="NSArray" key="IBDocument.PluginDependencies">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
</object>
<object class="NSMutableDictionary" key="IBDocument.Metadata">
<string key="NS.key.0">PluginDependencyRecalculationVersion</string>
<integer value="1" key="NS.object.0"/>
</object>
<object class="NSMutableArray" key="IBDocument.RootObjects" id="1000">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBProxyObject" id="372490531">
<string key="IBProxiedObjectIdentifier">IBFilesOwner</string>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
</object>
<object class="IBProxyObject" id="975951072">
<string key="IBProxiedObjectIdentifier">IBFirstResponder</string>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
</object>
<object class="IBUIView" id="61102486">
<nil key="NSNextResponder"/>
<int key="NSvFlags">256</int>
<object class="NSMutableArray" key="NSSubviews">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBUIView" id="143540426">
<reference key="NSNextResponder" ref="61102486"/>
<int key="NSvFlags">290</int>
<object class="NSMutableArray" key="NSSubviews">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBUIImageView" id="883509710">
<reference key="NSNextResponder" ref="143540426"/>
<int key="NSvFlags">274</int>
<string key="NSFrameSize">{320, 44}</string>
<reference key="NSSuperview" ref="143540426"/>
<object class="NSColor" key="IBUIBackgroundColor">
<int key="NSColorSpace">3</int>
<bytes key="NSWhite">MCAwAA</bytes>
</object>
<bool key="IBUIOpaque">NO</bool>
<bool key="IBUIClearsContextBeforeDrawing">NO</bool>
<bool key="IBUIUserInteractionEnabled">NO</bool>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
<object class="NSCustomResource" key="IBUIImage">
<string key="NSClassName">NSImage</string>
<string key="NSResourceName">header.png</string>
</object>
</object>
<object class="IBUILabel" id="650936813">
<reference key="NSNextResponder" ref="143540426"/>
<int key="NSvFlags">277</int>
<string key="NSFrame">{{85, 0}, {150, 44}}</string>
<reference key="NSSuperview" ref="143540426"/>
<bool key="IBUIOpaque">NO</bool>
<bool key="IBUIClipsSubviews">YES</bool>
<bool key="IBUIUserInteractionEnabled">NO</bool>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
<string key="IBUIText">Pestañas</string>
<object class="NSColor" key="IBUITextColor" id="399179023">
<int key="NSColorSpace">3</int>
<bytes key="NSWhite">MQA</bytes>
</object>
<nil key="IBUIHighlightedColor"/>
<int key="IBUIBaselineAdjustment">1</int>
<float key="IBUIMinimumFontSize">10</float>
<int key="IBUITextAlignment">1</int>
<object class="IBUIFontDescription" key="IBUIFontDescription">
<string key="name">Helvetica-Bold</string>
<string key="family">Helvetica</string>
<int key="traits">2</int>
<double key="pointSize">20</double>
</object>
<object class="NSFont" key="IBUIFont">
<string key="NSName">Helvetica-Bold</string>
<double key="NSSize">20</double>
<int key="NSfFlags">16</int>
</object>
<bool key="IBUIAdjustsFontSizeToFit">NO</bool>
</object>
</object>
<string key="NSFrameSize">{320, 44}</string>
<reference key="NSSuperview" ref="61102486"/>
<object class="NSColor" key="IBUIBackgroundColor">
<int key="NSColorSpace">3</int>
<bytes key="NSWhite">MSAwAA</bytes>
<object class="NSColorSpace" key="NSCustomColorSpace" id="114892823">
<int key="NSID">2</int>
</object>
</object>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
</object>
<object class="IBUITableView" id="873029372">
<reference key="NSNextResponder" ref="61102486"/>
<int key="NSvFlags">274</int>
<string key="NSFrame">{{0, 44}, {320, 367}}</string>
<reference key="NSSuperview" ref="61102486"/>
<reference key="IBUIBackgroundColor" ref="399179023"/>
<bool key="IBUIOpaque">NO</bool>
<bool key="IBUIClipsSubviews">YES</bool>
<bool key="IBUIClearsContextBeforeDrawing">NO</bool>
<object class="IBUISimulatedStatusBarMetrics" key="IBUISimulatedStatusBarMetrics"/>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
<bool key="IBUIBouncesZoom">NO</bool>
<int key="IBUISeparatorStyle">1</int>
<int key="IBUISectionIndexMinimumDisplayRowCount">0</int>
<bool key="IBUIShowsSelectionImmediatelyOnTouchBegin">YES</bool>
<float key="IBUIRowHeight">44</float>
<float key="IBUISectionHeaderHeight">22</float>
<float key="IBUISectionFooterHeight">22</float>
</object>
</object>
<string key="NSFrameSize">{320, 411}</string>
<object class="NSColor" key="IBUIBackgroundColor">
<int key="NSColorSpace">3</int>
<bytes key="NSWhite">MQA</bytes>
<reference key="NSCustomColorSpace" ref="114892823"/>
</object>
<bool key="IBUIClearsContextBeforeDrawing">NO</bool>
<object class="IBUISimulatedStatusBarMetrics" key="IBUISimulatedStatusBarMetrics"/>
<object class="IBUISimulatedTabBarMetrics" key="IBUISimulatedBottomBarMetrics"/>
<string key="targetRuntimeIdentifier">IBCocoaTouchFramework</string>
</object>
</object>
<object class="IBObjectContainer" key="IBDocument.Objects">
<object class="NSMutableArray" key="connectionRecords">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">view</string>
<reference key="source" ref="372490531"/>
<reference key="destination" ref="61102486"/>
</object>
<int key="connectionID">27</int>
</object>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">myTable</string>
<reference key="source" ref="372490531"/>
<reference key="destination" ref="873029372"/>
</object>
<int key="connectionID">28</int>
</object>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">titleString</string>
<reference key="source" ref="372490531"/>
<reference key="destination" ref="650936813"/>
</object>
<int key="connectionID">29</int>
</object>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">topHeader</string>
<reference key="source" ref="372490531"/>
<reference key="destination" ref="883509710"/>
</object>
<int key="connectionID">30</int>
</object>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">headerView</string>
<reference key="source" ref="372490531"/>
<reference key="destination" ref="143540426"/>
</object>
<int key="connectionID">32</int>
</object>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">dataSource</string>
<reference key="source" ref="873029372"/>
<reference key="destination" ref="372490531"/>
</object>
<int key="connectionID">6</int>
</object>
<object class="IBConnectionRecord">
<object class="IBCocoaTouchOutletConnection" key="connection">
<string key="label">delegate</string>
<reference key="source" ref="873029372"/>
<reference key="destination" ref="372490531"/>
</object>
<int key="connectionID">7</int>
</object>
</object>
<object class="IBMutableOrderedSet" key="objectRecords">
<object class="NSArray" key="orderedObjects">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBObjectRecord">
<int key="objectID">0</int>
<object class="NSArray" key="object" id="0">
<bool key="EncodedWithXMLCoder">YES</bool>
</object>
<reference key="children" ref="1000"/>
<nil key="parent"/>
</object>
<object class="IBObjectRecord">
<int key="objectID">-1</int>
<reference key="object" ref="372490531"/>
<reference key="parent" ref="0"/>
<string key="objectName">File's Owner</string>
</object>
<object class="IBObjectRecord">
<int key="objectID">-2</int>
<reference key="object" ref="975951072"/>
<reference key="parent" ref="0"/>
</object>
<object class="IBObjectRecord">
<int key="objectID">18</int>
<reference key="object" ref="61102486"/>
<object class="NSMutableArray" key="children">
<bool key="EncodedWithXMLCoder">YES</bool>
<reference ref="873029372"/>
<reference ref="143540426"/>
</object>
<reference key="parent" ref="0"/>
<string key="objectName">Tab Browser View</string>
</object>
<object class="IBObjectRecord">
<int key="objectID">4</int>
<reference key="object" ref="873029372"/>
<reference key="parent" ref="61102486"/>
</object>
<object class="IBObjectRecord">
<int key="objectID">31</int>
<reference key="object" ref="143540426"/>
<object class="NSMutableArray" key="children">
<bool key="EncodedWithXMLCoder">YES</bool>
<reference ref="650936813"/>
<reference ref="883509710"/>
</object>
<reference key="parent" ref="61102486"/>
<string key="objectName">Header</string>
</object>
<object class="IBObjectRecord">
<int key="objectID">23</int>
<reference key="object" ref="883509710"/>
<reference key="parent" ref="143540426"/>
</object>
<object class="IBObjectRecord">
<int key="objectID">26</int>
<reference key="object" ref="650936813"/>
<reference key="parent" ref="143540426"/>
</object>
</object>
</object>
<object class="NSMutableDictionary" key="flattenedProperties">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="NSArray" key="dict.sortedKeys">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>-1.CustomClassName</string>
<string>-1.IBPluginDependency</string>
<string>-2.CustomClassName</string>
<string>-2.IBPluginDependency</string>
<string>18.IBPluginDependency</string>
<string>18.showNotes</string>
<string>23.IBPluginDependency</string>
<string>26.IBPluginDependency</string>
<string>31.IBPluginDependency</string>
<string>4.IBPluginDependency</string>
</object>
<object class="NSArray" key="dict.values">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>TabBrowserController</string>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<string>UIResponder</string>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<boolean value="NO"/>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
<string>com.apple.InterfaceBuilder.IBCocoaTouchPlugin</string>
</object>
</object>
<object class="NSMutableDictionary" key="unlocalizedProperties">
<bool key="EncodedWithXMLCoder">YES</bool>
<reference key="dict.sortedKeys" ref="0"/>
<reference key="dict.values" ref="0"/>
</object>
<nil key="activeLocalization"/>
<object class="NSMutableDictionary" key="localizations">
<bool key="EncodedWithXMLCoder">YES</bool>
<reference key="dict.sortedKeys" ref="0"/>
<reference key="dict.values" ref="0"/>
</object>
<nil key="sourceID"/>
<int key="maxID">32</int>
</object>
<object class="IBClassDescriber" key="IBDocument.Classes">
<object class="NSMutableArray" key="referencedPartialClassDescriptions">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBPartialClassDescription">
<string key="className">TabBrowserController</string>
<string key="superclassName">UIViewController</string>
<object class="NSMutableDictionary" key="outlets">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="NSArray" key="dict.sortedKeys">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>headerView</string>
<string>myTable</string>
<string>titleString</string>
<string>topHeader</string>
</object>
<object class="NSArray" key="dict.values">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>UIView</string>
<string>UITableView</string>
<string>UILabel</string>
<string>UIImageView</string>
</object>
</object>
<object class="NSMutableDictionary" key="toOneOutletInfosByName">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="NSArray" key="dict.sortedKeys">
<bool key="EncodedWithXMLCoder">YES</bool>
<string>headerView</string>
<string>myTable</string>
<string>titleString</string>
<string>topHeader</string>
</object>
<object class="NSArray" key="dict.values">
<bool key="EncodedWithXMLCoder">YES</bool>
<object class="IBToOneOutletInfo">
<string key="name">headerView</string>
<string key="candidateClassName">UIView</string>
</object>
<object class="IBToOneOutletInfo">
<string key="name">myTable</string>
<string key="candidateClassName">UITableView</string>
</object>
<object class="IBToOneOutletInfo">
<string key="name">titleString</string>
<string key="candidateClassName">UILabel</string>
</object>
<object class="IBToOneOutletInfo">
<string key="name">topHeader</string>
<string key="candidateClassName">UIImageView</string>
</object>
</object>
</object>
<object class="IBClassDescriptionSource" key="sourceIdentifier">
<string key="majorKey">IBProjectSource</string>
<string key="minorKey">./Classes/TabBrowserController.h</string>
</object>
</object>
</object>
</object>
<int key="IBDocument.localizationMode">0</int>
<string key="IBDocument.TargetRuntimeIdentifier">IBCocoaTouchFramework</string>
<object class="NSMutableDictionary" key="IBDocument.PluginDeclaredDependencyDefaults">
<string key="NS.key.0">com.apple.InterfaceBuilder.CocoaTouchPlugin.iPhoneOS</string>
<integer value="784" key="NS.object.0"/>
</object>
<object class="NSMutableDictionary" key="IBDocument.PluginDeclaredDevelopmentDependencies">
<string key="NS.key.0">com.apple.InterfaceBuilder.CocoaTouchPlugin.InterfaceBuilder3</string>
<integer value="3000" key="NS.object.0"/>
</object>
<bool key="IBDocument.PluginDeclaredDependenciesTrackSystemTargetVersion">YES</bool>
<int key="IBDocument.defaultPropertyAccessControl">3</int>
<object class="NSMutableDictionary" key="IBDocument.LastKnownImageSizes">
<string key="NS.key.0">header.png</string>
<string key="NS.object.0">{64, 44}</string>
</object>
<string key="IBCocoaTouchPluginVersion">1498</string>
</data>
</archive>
| 2023-12-02T01:26:19.665474 | https://example.com/article/9172 |
High resolution X-ray analyses of renin inhibitor-aspartic proteinase complexes.
Inhibitors of the conversion of angiotensinogen to the vasoconstrictor angiotensin II have considerable value as antihypertensive agents. For example, captopril and enalapril are clinically useful as inhibitors of angiotensin-converting enzyme. This has encouraged intense activity in the development of inhibitors of kidney renin, which is a very specific aspartic proteinase catalysing the first and rate limiting step in the conversion of angiotensinogen to angiotensin II. The most effective inhibitors such as H-142 and L-363,564 have used non-hydrolysable analogues of the proposed transition state, and partial sequences of angiotensinogen (Table 1). H-142 is effective in lowering blood pressure in humans but has no significant effect on other aspartic proteinases such as pepsin in the human body (Table 1). At present there are no crystal structures available for human or mouse renins although three-dimensional models demonstrate close structural similarity to other spartic proteinases. We have therefore determined by X-ray analysis the three-dimensional structures of H-142 and L-363,564 complexed with the aspartic proteinase endothiapepsin, which binds these inhibitors with affinities not greatly different from those measured against human renin (Table 1). The structures of these complexes and of that between endothiapepsin and the general aspartic proteinase inhibitor, H-256 (Table 1) define the common hydrogen bonding schemes that allow subtle differences in side-chain orientations and in the positions of the transition state analogues with respect to the active-site aspartates. | 2024-02-25T01:26:19.665474 | https://example.com/article/1362 |
module.exports = {
objLenght: obj => Object.keys(obj).length
}
| 2024-01-22T01:26:19.665474 | https://example.com/article/5600 |
" Am I responsible for this?" "BELL:" "I'm afraid you are." "NARRATOR:" "Previously on Fringe:" "WALTER:" "Our universe is starting to break down." "What was happening on the Other Side is starting to happen here." "I destroyed their world to save ours." "May God have mercy on us." "NINA (OVER PHONE):" "The machine came on by itself, without Peter." "You think Walternate turned the machine on?" "It's triggered by a sympathetic response from the one here." "It makes sense." "How could he without Peter?" "PETER:" "We all thought that I could turn the machine on." "Maybe I can turn it off." "Dear God." "WOMAN (OVER PA):" "All civilians proceed to evacuation route immediately." "Agent Bishop, take cover!" "(GRUNTING)" "Where the hell am I?" "(WOMAN SPEAKING INDISTINCTLY OVER PA)" "NURSE 1:" "Peter Bishop. 47 years old." "Wound in the abdomen." "NURSE 2:" "BP is 110 over 70." "NURSE 1:" "Start an IV." "Where am I?" "You were injured in a Fringe event." "You're in good hands." "It's okay." "Just lie back." "Just relax." "He's bleeding pretty bad." "Get me units of his reserve blood." "Start transfusion now." "Agent Bishop, please, just lie still." "(GROANS)" "NURSE 1:" "Get me the UV cauterizer." "It's all right, Peter." "You're going to be fine." "(GROANING)" "(PEOPLE CHATTERING)" "ELLA:" "I'd like to find out how Peter Bishop is doing." "May I see your badge?" "I don't have a badge yet." "I was just promoted last week." "I have a temporary bar code." "Can I show you that?" "Sure." "(MACHINE BEEPS)" "Thank you, Agent Dunham." "Agent Bishop has been in recovery for an hour." " He should be out soon." "OLIVIA:" "Ella." "Peter's fine, Aunt Liv." "He's in recovery." "I mean, uh, Agent Dunham." "Ma'am." "You can just call me "boss" like everybody else." "Now, how are you?" "I'm fine." "I remember being in my SUV, and next thing I knew I was on the ground and there was shrapnel everywhere." "People are saying that it's the End-of-Dayers." "That's what we think." "We think it's Moreau." "PETER:" "Hey." "OLIVIA:" "Peter." "How are you feeling?" "Oh, just like new." " So, what did the doctor say?" " The doctor says I'm fine." "No." "They said to stay off his feet for a few days." " You're pushing yourself." " Moreau is out there." "Peter, stay off your feet." "This is one of those times you say, "You were right."" "I'm not going to say you were right because I got state-of-the-art science on my side." "I feel fine, hon." "Do you remember what you were saying in the field about the machine and being from the past?" "Well, I didn't say I didn't get my bell rung, but I'm doing better now." "Two eggs over easy, bacon and grapefruit juice." "That's what I made you for breakfast on Sunday." "ASTRID:" "Hey, guys." "Look." "OLIVIA:" "There's a Stage Three Tear." "We've initiated amber protocol." "(APPLAUSE)" "(WOMAN SINGING OPERA)" "(GRUNTS)" "(BEEPING)" "(ALARM BLARING)" "(SCREAMING)" "Fringe s3e22 The Day We Died" "Hey." "The security firm just e-mailed this video." "We think they gained entrance from the side fire door." " How come they didn't trigger the alarm?" " It was disabled." "That's not all." "We think we found an Electrilight." "It must've been a dud." "I believe so." "We finally get to see one." "The End Of Days." "It's one of my father's favorite sermons." "The world dies and the savior arrives to end suffering and usher all the worthy into Heaven." "Pass me those alligator clips." "If my father ever met one of the kooks who's attempting to end the world, he'd probably kill them himself." "AGENT:" "Agent?" "Eyewitness statements." "I'll let you know if any of this is worthwhile." "Anything?" "No." "Not only can I not tell you how the thing works according to all the readings, it shouldn't be working at all." "There's probably only one person on Earth who can tell us how this thing functions." "Walter." "Got any markers you could call in?" "You think now is the time?" "I think it might be past time." "Hello, Walter." "It must be bad if they're letting you see me." "It is." "I heard a rumor that the sun was burning out." "They don't tell me much in here." "The sun is still shining." "I also hear there's been a massive increase in kappa radiation." "That one's true." "A wormhole opened in Central Park, right in the center of Sheep's Meadow." "It took us months, but we were finally able to amber it over." "A wormhole shouldn't emit that type of radiation." "Not..." "Not unless it's a wormhole through time." "Exactly right." "The carbon levels were consistent with the late Paleozoic Era." "Two hundred and fifty million years ago." "Paleozoic?" "Sauropods?" "My old self would have been fascinated with that." "How's Olivia?" "She's fine." "Thank you." "I need your help." "What is it?" "We're not exactly sure." "Some kind of light bomb." "Made by a terrorist group." "Call themselves the End-of-Dayers." "They used them on soft spots trying to rip holes in the fabric of the universe." "Trying to accelerate the End Of Days." "I'm hoping if we can figure out how it's made and maybe trace the parts we can stop them before it's too late." "Even if I could help you I can't do it from here." "I would need my tools my special instruments." "We both know that's not going to happen." " Senator." "BROYLES:" "Hello, Peter." "Thank you for your time." "No need for formality in here." "It's good to see you." "Have a seat." "You said it was urgent." "It is." "I assume you've been briefed about the End of Days organization." "I'm well aware of the situation, yes." "We recovered this device from what's left of the opera house." "Science has been trying to crack the technology but without much luck." "What do you need?" "I need Walter." "Grant him a furlough, so he can help us on the case." "That's out of the question." "If we can understand this technology, we may prevent future attacks." "Consult with him in prison if you need to." "That's all I can offer." "Why?" "Are you worried about your re-election prospects?" "You know me better than that." "I'm worried about that." "The entire globe is disintegrating." "We're putting on Band-Aids and every day, more people are lost because of it, and Walter is responsible." "(SIGHS)" "I know him." "And I know his intentions weren't this." "But there's not a person who hasn't lost someone they love because of him." "You can't begrudge the anger they feel." "I don't." "I'm out there in the streets with them." "And yeah, maybe I am putting Band-Aids on it until we can figure out how to reverse the damage." "But at least it's something." "And if we figure out this technology, I guarantee you we will prevent future casualties." "Phillip." "If what we lost in Detroit still means anything to you just give me one chance." "It's all I'm asking." "Where are my things?" "They're all in Evidence, Walter." "Don't worry, Olivia's on it." "Your equipment will be here shortly." "Will Astrid be here?" "Ha, ha." "No." "Astrid's a Fringe Agent now." "We need her out in the field." "I suppose since she's no longer caring for me, she was able to spread her wings." "May I take a look out back?" "My old office." "Walter." "I didn't realize how much I missed swivel chairs." "I've also missed swiveling." "There's someone here to see you." "A visitor?" "Walter." "WALTER:" "Olivia!" "Ha-ha-ha!" " Congratulations are in order, my dear." " What for?" "Well, the wedding, of course." "Oh." "That was a while ago now." "WALTER:" "This is the first opportunity I've had to give you an appropriate welcome to our family." "I always did want a daughter." "Thank you, Walter." "(CLATTERING)" "For goodness' sake, doesn't the word "fragile" mean anything to you?" "Is that you?" "I learned to control it a few years ago." "I'm impressed." "MOREAU:" "So, what's the next target?" "WALTER:" "The wormhole in Central Park." "MOREAU:" "Considering your world was destroyed by one, I suppose it's fitting." "WALTER:" "Is this it?" " Followed your specifications to the letter." "More than twice the yield of the device we used last night." "It won't be long until this world joins mine." "(DOOR OPENS)" "Boys." "Any luck?" "Afraid not." "Can't make any sense of this technology." "I'll continue to run diagnostics on the canister but even if I am successful, our world is still ending." "You may stop this group, but you cannot stop the inevitable." "Our destiny was set the day we triggered the Machine." "I didn't understand until it was too late that our two worlds were inextricably linked." "Without one, the other simply cannot exist." "When their world was destroyed that was the day we sealed our fate." "For all intents and purposes that was the day we died." "We don't know that for sure." "WALTER:" "Have you seen him?" "Walternate?" "No." "Nobody has." "He's become a recluse." "Imagine coming over here to try to save your world only to be stuck here when your world was destroyed." "Not to mention having the same face as the most reviled man in the universe." "I just wanted to say at the trial, you spoke on my behalf." "Walter, I'm the one who got in the Machine." "I'm the one who destroyed the other universe." "The courts perceived that you did it to defend our universe, and so do I." "This all began with me, my hubris." " Walter." " And I just wanted to say thank you." "No matter who was at fault, you're my dad." "That smells insanely good." "Well, after the day we had, I figured we deserve better than take-out." "(LAUGHS)" "Hey." "How you holding up?" "Heh, I'm doing fine, why?" "Well, you know how Walter would always cook when he was worried about you, so..." "Of all the bad habits I could pick up from him, that's the least of them." "Amanda from across the street gave it to us." "That's you and me and the little baby that we're gonna have that she is planning on babysitting." "Oh." "Well, I think we should get started on that right away." "You're really gonna use a drawing from a little girl to get lucky?" "It sounds so dirty when you say it like that." "She's a sweet little girl." "You know, hon, if you wanted to reconsider..." "I can't say that I don't think about it that I don't wish things were different." "Honey, people still have families." "Look at Amanda." "She was born into this world and she's still happy." "And the world could get better." "So I still think we're gonna have a kid." " I hope you're right." " I think we'll have several." "Two, maybe three." "A little tribe of Bishops." "(PHONE RINGING)" " Hello?" "WALTER (OVER PHONE):" "I understand now." "They're splitting atoms." "Not as an outcome goal, but as a means to an end." " Slow down, Walter." " The diagnostics on the canister." "They show residual traces of strontium 90." "That's a radioactive isotope." "That's how they're making the Electrilights." " Which means it'll leave a signature." " Yes." "Like radioactive bread crumbs, they'll lead us to whoever's doing this." "We need Science Division to monitor radiation tracking maps." "It'll be faster if you exclude readings inconsistent with strontium 90." "And look for spikes in the remaining data." "This is a campground." "Do you think it's even possible to split atoms here?" "I see them making s'mores maybe, but weapons of mass destruction?" " No." " Is this the right place?" "Tracking system is detecting the same signature that registered on the canister." "So then where's the lab?" "Okay, you keep searching." "I'm gonna call this in." "Find anything out of the ordinary, I wanna know." "Yes, ma'am." "AGENT:" "Sir." "We found this sitting on top of a rock." "I don't know if it means anything." " Thank you, agent." " Sure." "OLIVIA:" "Peter?" "Maybe Walter was wrong about the signature." "Yeah." "I'll go back to Science Division." "See if something's wrong with the detection sensors." "Okay, let me know if you find anything." "Yup, will do." "(CAR ENGINE TURNS OVER)" "(PEOPLE CHATTERING)" "How come no one respects my desk?" "You're too nice." "(ALARM BLARING)" "MAN (OVER PA):" "Team 1, get ready to deploy." "Perimeter breach in Sector 8 in Central Park." "This technology is 10, maybe 15 years ahead of its time." "I don't mind saying, it's something I would like to have invented." "I mean for peaceful purposes." "Mining, maybe." "Walter, what about the components?" "Where were these parts made?" "I haven't the foggiest." "(PHONE RINGING)" "Dunham." " I'm on my way." " What's wrong?" "A security breach at the wormhole." "Someone in the park ID'd Moreau." "Come on." "(PHONE RINGING)" "Hello?" "Hello?" "Hello, Peter." "Why'd you leave me the key, Walter?" "I knew you'd recognize it." "I couldn't just call you." " Yes, you could have." " No, no, no." "Not if I wanted the proper reunion that we both so richly deserve." "So letting me know that Moreau worked for you that was your way of getting my attention?" "Among other things." "I should have known that the Electrilight came from you." "After all, Walter was the only one brilliant enough to figure out how it worked." "It stands to reason that you were the only one brilliant enough to invent it." " Yin and yang." " That's interesting." "Interesting that you should say that." " Yin and yang." " Why are you doing this?" "Yin and yang." "One man broke the universe." "The other man did nothing but have his son stolen, his life stolen, ruined." "I came over here at the end on a mission of mercy." "To ask for help for my side." "The race was lost." "A race I didn't initiate, but still I came." "And you destroyed us, Peter, my son." " You destroyed your own..." " You activated the Machine on your side." "You were going to use it to destroy this universe." "I only acted in self-defense." "Do you know what it's like to wake up and just for a moment think that everything is as it was?" "And then to realize it's not and the nightmare you had was real?" "Soon, everyone here will experience loss the way that all those over there did." "Air, water." "Light, even." "But you you will experience loss the way I did." "What does that mean?" "You destroyed my universe, son and I'm going to destroy yours." "But not all at once." "Peter's still not picking up." "MAN:" "Agent Dunham." "Spotted a vehicle near the perimeter breach." "OLIVIA:" "What kind of vehicle?" " A bus." "Okay." "I want all tactical teams to enter the restricted area..." "(CAR ALARM BLARING)" "I came here alone, Walter to make a personal plea to you." "I'm sorry for the suffering that I've caused you." "I'm sorry for destroying your people." "Our people." "I'm sorry for destroying our world." "And if I could take back that choice I would." "But it's no excuse for what you're doing now." "And it has to stop." "I don't wanna have to use these." "But you're going to come with me now, Father." "You know, if I was really there, I might not be able to resist killing you." "I think this is the better way so you learn about loss." "Let's start by killing someone you love." "They're gonna evacuate the area to try and contain the wormhole." "So can you move everyone back to Sector 3?" "Olivia Dunham my wife was everything to me." "(SPEAKING INAUDIBLY)" "Why have we stopped?" "What is this, some kind of protest?" "No, it's the wormhole." "They're still trying to seal it up." "When we start moving again, can we cut over and take Columbus...?" "Wait, no." "Turn the car around." "Please." "I need to get back to my lab." "Diagnostics are almost complete." "You used to call me Uncle Walter." "Do you remember?" "I don't remember much from before it got bad." "So sorry." "Ella I understand words can't come close to medicating your loss." "Truly, if I could go back in time and change things, I would." "I would give anything to be able to go back and make different choices..." "But you can't." "There aren't any happy endings nowadays, are there?" "No, I suppose not." "I remember the cow that stayed over there." "She had kind eyes." "She did, didn't she?" "My Gene." "I do miss her." "(COMPUTER BEEPS)" "WALTER:" "That's it." "(DOORBELL RINGING)" "Peter, I was wrong." "It's not too late." "You can save both worlds." "We can do it all over again." "But this time, you simply need to make a different choice." "And should something go wrong, then Olivia will be our fail-safe." "Walter, stop." "Olivia is dead." "But she won't be." "Not then." "The Machine?" "I turned that on 15 years ago." "And all the time I sat in prison, I couldn't figure out where it came from." "I knew the pieces were buried millions of years ago but how did they get there, so deep in the past?" "But now I understand I sent them there." "The wormhole in Central Park." "I sent them back through time." "Peter, you can stop the destruction before it occurs." "If that's the case, don't send the Machine back." "We'll never discover it and I'll never destroy the other universe." "It doesn't work that way." "I have already done it." "Therefore, I have no choice but to do it again." " Walter, that doesn't make any sense." " It does." "It's a paradox." "I can't change what happens because it's already happened but you can make a different choice within what happened." "I simply need to find a way to bring your consciousness forward to now so that you can witness what will happen if you make the same choice." "Peter, for all I know, it could be happening already." "Don't you see?" "We can fix everything." "We can cheat the rules of time." "Imagine the repercussions." "There's no way of telling what the cost might be." "But it can't be worse than this." "Can't be worse than this." "What would I need to do?" "Walter, what's happening to him?" "His heart rate's going up, 156 and climbing." " What's it doing to him?" "WALTER:" "I don't know." "It's been 60 seconds." "How much longer we gonna let him stay?" "Peter is interfaced with the Machine at a biological level." "If we take him out prematurely, I'm afraid we'll harm him." "WALTER:" "What is it?" " Sir, it just started 60 seconds ago." " What started exactly?" " The Machine, something is happening." "The diagnostics are through the roof." "Look at this." "The soft spots, they're not closing, they're getting worse." "Bring me Olivia Dunham, now." "I don't understand what you're asking me to do." "The drawing suggests that you have a connection with the Machine." "That you can stop it." "That you can turn it off." "(MACHINE SHUDDERS)" "They outsmarted you, didn't they?" "They know you turned the Machine on so they put Peter in theirs." "Now we're the ones that are gonna get destroyed." " Something's wrong." " Help me, quick." "BROYLES:" "Come on, let's move in." "Peter." "Olivia, you're alive." "(MACHINE RUMBLES)" "Are you doing that?" "I understand now." "Walter." "Walter." "I understand now." "I understand what the Machine does." "I know what it's capable of and I know where it came from." " The first people?" "PETER:" "Yes, the first people, Walter." "But the first people are us." "You, more specifically." "And maybe Ella and Astrid." "I don't know who took the Machine back through time." "But I know something else." "I've seen doomsday." "And it is worse than anything you could possibly imagine." "This isn't a war that can be won." "Our two worlds are inextricable." "If one side dies we all die." "So I've torn holes in both the universes and they lead here to this room a bridge, so that we can begin to work together to fix..." "You shattered my universe." "You have any idea how many deaths you've caused?" "That was an accident." "What you have tried to do, you've done on purpose." "Whatever you've both done, we're here now so maybe it's time we start to fix it." "You were right." "They don't remember Peter." "SEPTEMBER:" "How could they?" "He never existed." "He served his purpose." | 2024-04-09T01:26:19.665474 | https://example.com/article/2103 |
* Photo: Daily Evrensel
Click to read the article in Turkish
Police have intervened against the protest of Saturday Mothers/People, who have been asking the fate and whereabouts of their loved ones disappeared in custody for the past 759 weeks.
As they have been prevented from staging their silent sit-in protest at Galatasaray Square since their 700th gathering, Saturday Mothers/People have been reading out their weekly statements for the press in front of Human Rights Association (İHD) İstanbul Office every Saturday.
This week, Saturday Mothers/People gathered in front of İHD building to ask the fate and whereabouts of Cemil Kırbayır, who was disappeared in custody during the 1980 military coup. However, police officers intervened against the group with pepper gas and batons.
Yoleri: Stop the military operation
Reading out the statement for the press, İHD İstanbul Branch Chair Gülseren Yoleri said, "For 759 weeks, we have been raising concerns over the serious destruction of humanitarian and legal values in Turkey".
Criticizing Turkey's cross-border military operation into northern Syria in her speech, Yoleri continued as follows:
"We, as the ones who experienced the consequences of massive destruction caused by policies of violence and conflict, have always been on the side of peace. We have always wanted Turkey to solve all of its problems within standards of law and justice and through peaceful means.
"War means blood and tears for everyone, war means death. That is why, the collective conscience of humanity rejects the war.
"The military intervention into North-East Syria will inflict an irrecoverable damage to the ideal of living together in peace in the country and region.
"This intervention should be stopped immediately before suffering any more casualties and peaceful solutions should be tried. We, as the ones who claim the ideal of living together in peace, insist on our demand for peace. We demand that this military operation ruining our ideal of peace be stopped."
Tosun: We will keep on being on the street
After Yoleri criticized the operation, police officers intervened against the group with pepper gas and batons.
Saturday Mothers/People reacted against the intervention, saying "We want our losses. What do you want from us? Enough is enough."
Hanım Tosun said, "We will keep on being on the street. We won't give up searching for our losses at squares. I will never give up."
About Saturday Mothers/People It was 24 years ago on May 27, 1995 that Saturday Mothers/People gathered for the first time at Galatasaray Square for the ones disappeared in custody. The first sit-in protests started after the deceased body of Hasan Ocak, who was taken into custody on March 21, 1995, was found in the Cemetery of the Nameless after being tortured. The Saturday protests at Galatasaray Square were interrupted for an indefinite period of time on March 13, 1999 due to heavy police intervention for the last three years. The interruption continued for the next 10 years. The silent sit-in protests of Saturday Mothers/People, which they started again at Galatasaray Square in 2009, continued until the police intervention in August 2018. The relatives of the ones disappeared in custody and rights defenders have been prevented from reading out their statements and coming together at Galatasaray Square since then. For that reason, the weekly sessions of Saturday Mothers/People are held and statements for the press are read out in front of the Human Rights Association (İHD) İstanbul Office.
(RT/SD) | 2024-06-30T01:26:19.665474 | https://example.com/article/2339 |
The man who gunned down New York Police Department Officer Brian Moore, who was in an unmarked vehicle in 2015, has been found guilty of first degree murder.
The jury deliberated for about five hours over two days before convicting career criminal Demetrius Blackwell, 37, Thursday in the death of Moore, 25, of Plainedge. The officer died two days after he was shot twice in the head on May 2, 2015.
The jury also convicted Demetrius guilty of attempted murder for shooting Moore's partner, Officer Erik Jansen, who was unharmed.
The courtroom scene showed a sea of NYPD officers on hand to see Blackwell served justice.
Scroll for video
Demetrius Blackwell in Queens County Criminal Court hears the jury announce the verdict of guilty on the charges he murdered Officer Brian Moore (right)
A sea of fellow NYPD officers were on hand to hear the jury return the verdict of guilty in the slaying of Officer Moore
'He's remorseless and just doesn't give a damn,' Queens Assistant District Attorney Dan Saunders said.
The split second confrontation happened on a street in Queens Village after a neighbor of Blackwell's called 911 saying a man threw a brick through the window of his home.
Prosecutors say Moore and his partner were on patrol in an unmarked police car when they responded.
After turning onto 104th Road from 212th St., the pair spotted Blackwell who immediately walked off in the opposite direction.
He appeared to adjust something on his waist, prompting the officers to command him to stop and ask if he was hiding 'something.'
The jury announced their verdict on Thursday- convicting Blackwell on the charge of first degree murder
Blackwell was led away by armed New York State court guards after hearing he was found guilty
'Yeah, I got something,' Blackwell barked, prosecutors said.
He whipped out his revolver and opened fire, striking Moore twice in the head, prosecutors said.
The young officer, the son of a retired NYPD sergeant, died two days later.
Blackwell was also found guilty of second degree criminal weapons possession.
His attorney, David Bart, had told jurors that his client was paranoid and was not in control of his actions at the time of the shooting.
'Mr. Blackwell has seizures and psychosis mixtures that shows he was not responsible,' attorney Bart argued. 'He acted badly, wrongly and stupidly, but it was not intent to kill.'
Saunders countered, saying there was 'no loss of self-control.'
Police officers hang a banner honoring NYPD officer Brian Moore outside his wake at the Fredrick J. Chapey and Sons Funeral Home in Bethpage, New York, May 7, 2015
Police lives matter: NYPD police officers walk by a vehicle honoring NYPD officer Brian Moore outside his wake at the Fredrick J. Chapey and Sons Funeral Home in 2015
105th Precinct: Police officers, mostly from the 105th Precinct in the Queens borough of New York, enter Moore's wake in 2015
'Officer Brian Moore was killed because he was a police officer,' Saunders said.
The scene inside court hearkened back to Moore's funeral where over 30,000 officers strong came to pay their respects to Moore.
Blue ribbons were tied to utility poles and trees in this Long Island neighborhood on as thousands of officers said goodbye to the New York City police officer slain on patrol.
Purple bunting hung with photos of Officer Brian Moore in the windows of businesses near the Fredrick J. Chapey and Sons Funeral Home in Bethpage. Heavily armed officers patrolled the streets and officers with sniper rifles were stationed on rooftops of nearby businesses.
Moore had been on the force for only a handful of years, but he had already built up a record of more than 150 arrests and had earned meritorious service medals. He was the son, nephew and cousin of New York Police Department officers. They were at his side when he died at a hospital.
Heavily armed police officers stand near a sign during the wake in 2015. The 25-year-old and his partner had stopped a man suspected of carrying a handgun when the man opened fire on them
New York Gov. Andrew Cuomo leaves the wake for Officer Moore. 'It's an awful, frightening reminder of the sacrifice so many men and women in law enforcement make,' Cuomo said
Gov. Andrew Cuomo was among the mourners attending the wake.
'It's a terrible tragedy,' Cuomo said afterward. 'It's an awful, frightening reminder of the sacrifice so many men and women in law enforcement make.'
The governor told reporters he admired that Moore had followed in his father's footsteps as a police officer. Cuomo's father, Mario, had served as New York's governor in the 1980s and `90s.
'I said to the father, ''Your son must have really loved you,'' Cuomo told reporters. 'He followed his dad into the business. He wanted to be like dad. He was proud of dad.'
Friends remembered Moore as a good guy eager to join the police force. | 2024-01-05T01:26:19.665474 | https://example.com/article/1758 |
Drillers added 2 oil rigs in the week to Dec. 28, bringing the total count to 885, General Electric Co's Baker Hughes energy services firm said in its closely followed report on Friday.
For the month the rig count fell by 2, its first decline in six months. But for the quarter, the count was up 22, the fourth increase in a row.
For the year the count was up 138. That compares with an increase of 222 rigs in 2017 and a decline of 11 rigs in 2016.
The U.S. rig count, an early indicator of future output, is higher than a year ago when 747 rigs were active after energy companies spent more to capture higher prices.
U.S. West Texas Intermediate (WTI) crude futures were last up 15 cents to $44.76 a barrel, after reaching $46.22 a barrel earlier, though the U.S. benchmark was headed for a third straight week of losses.
Crude futures were trading around $46.74 a barrel for the balance of 2019 and $48.43 for calendar 2020.
Year-to-date, the total number of oil and gas rigs active in the United States has averaged 1,031. That keeps the total count for 2018 on track for the highest since 2014, which averaged 1,862 rigs. Most rigs produce both oil and gas.
(Reporting by Sumita Layek in Bengaluru; Editing by Meredith Mazzilli) | 2024-05-13T01:26:19.665474 | https://example.com/article/1612 |
Apparently, Barry Bonds has become cycling enthusiast.
Baseball's all-time home run slugger was recently spotted in scaling the mountain tops in Colorado earlier this month.
A photo of Bonds taken at Independence Pass, which 20 miles from Aspen, shows him looker thinner than his playing days.
Bonds, now 48, was said to be 6-2, 228 in 2007, the season he retired. Baseball-Reference.com has him listed as 6-1, 185.
With his playing days over, it's possible cycling led to Bonds shedding a few pounds over the years.
In 2011, he participated in El Tour de Tucson, a 111 mile race around the perimeter of Tucson, Arizona.
Apparently, Barry Bonds has become a cycling enthusiast.
Baseball's all-time home run hitter was recently spotted scaling the mountain passes of Colorado earlier this month.
A photo of Bonds taken at Independence Pass, which is 20 miles from Aspen and at an elevation of 12,000 feet, shows him looking rather svelte these days.
Bonds, now 48, was said to be 6-2, 228 pounds in 2007, the season he retired. Baseball-Reference.com has him listed at 6-1, 185.
With his playing days over, it's possible cycling led to Bonds shedding a few pounds over the years.
In 2011, he participated in El Tour de Tucson, a 111-mile race around the perimeter of Tucson, Ariz. | 2024-02-02T01:26:19.665474 | https://example.com/article/7391 |
The science behind current pay-for-performance and quality reporting systems is underdeveloped. Among the many issues is a lack of standardization across systems and the use of targets that tend to focus on either arbitrarily assigned or average performance. The development of a target of the "best possible" practice using a set of standardized indicators would be an improvement over the current science. As well, the ability to ascertain factors that contribute to an improvement in those indicators would be extremely helpful. The aims of this project are to: 1) develop scientifically-derived "best practice" targets for nine of the Centers for Medicare and Medicaid Services'(CMS) Hospital Quality Initiatives (HQI) outcomes measures;2) determine the gap and the distribution of the gap between those targets and the actual outcomes in a large national sample of U.S. hospitals;3) determine the factors that could be changed, and the direction and magnitude of change, in order to reduce that "quality gap;" and 4) demonstrate the use of stochastic frontier analysis (SFA) in benchmarking quality and safety in U.S. hospitals. The targets for the HQI measures will be the "best" possible HQI outcomes given (1) the inputs that go into producing various levels of quality, and (2) the technological "efficiency" of managing those inputs, allowing for random shocks that are outside the control of hospitals. Each best practice target and the gap between that target and actual practice will be estimated through the use of SFA, a method for modeling inefficiency of processes that have measurable outcomes. The base SFA model is along the lines of a production function, in which an output is a function of a set of inputs, with the added components of technical inefficiency and random noise. The model assumes that the producer is trying to maximize the amount of output, but that technical inefficiency (which the producer controls) and random factors (uncontrollable) prevent attainment of the maximum possible output. The outputs in the SFA will be rates of hospital-level patient safety and quality events using nine of the 15 HQI outcomes measures currently required of hospitals for reporting and reimbursement. The inputs in the analysis will be indicators of capital, labor and technology. The analyses will also assess financial, market, and organizational factors that could contribute to the gaps in quality and safety. Data will come from the CMS HQI files, Medicare cost reports, and the American Hospital Association Annual Report. This will create a national convenience sample of hospitals expected to be 3,000 - 4,000 hospitals. Through this project we will introduce and test a new and innovative design and provide initial results regarding frontier levels and gaps in quality and safety, and predictors of those gaps, in a large national sample of U.S. hospitals. The project will move forward the ability to assess and compare hospitals on specific quality indicators and will serve as a foundation for broader applications. PUBLIC HEALTH RELEVANCE: The aims of this project are to: 1) develop scientifically-derived "best practice" targets for the Centers for Medicare and Medicaid Services'Hospital Quality Initiatives outcomes measures;2) determine the gap and the distribution of the gap between those targets and the actual outcomes in a large national sample of U.S. hospitals;3) determine the factors that could be changed, and the direction and magnitude of change, in order to reduce that "quality gap;" and 4) demonstrate the use of stochastic frontier analysis (SFA) in benchmarking quality and safety in U.S. hospitals. This will provide policy-makers and hospital administrators with the techniques and knowledge to assess how well best practices are being met, and how to improve existing practices. This has the potential be enormously beneficial to every hospital patient and therefore to contribute significantly to population health. | 2023-12-19T01:26:19.665474 | https://example.com/article/2071 |
Calendar
COACH Space
Your wildest childhood space travel fantasies become reality with COACH Space. COACH Space is a tribute to the cosmos and those daring to explore it. This limited-edition capsule is everything my A+ in science 9-year-old self and my current Spacex fan want to be. So unexpected, so Nationalist, so undeniably calling for attention. I couldn’t help myself when I saw the teal blue, floating asteroids and astronaut dinosaurs.
COACH started making a comeback last year, with an upgraded selection of products and a marketing strategy focused on gaining market share within a younger population trough influencers and social media. Although I’m not sure the nostalgia of the space race is necessarily something that appeals to millennials, this out-of-the-blue capsule is a step in the right direction. These are the type of handbags that will be sold on eBay a couple years from now as “rare”.
Make Neil proud and celebrate American space exploration dreams with Coach. | 2023-08-28T01:26:19.665474 | https://example.com/article/1799 |
Q:
Как сделать так, чтобы выделенную строку в TableView можно было менять?
Начал изучать javafx для создания GUI. До этого учил swing В swing можно создать такую таблицу:
private DefaultTableModel dataTableModel;
private JTable dataTable;
private Double valueOfX, valueOfY;
private ArrayList<Ellipse2D.Double> pointList = new ArrayList<>();
public void addDataInTable(){
DefaultTableModel model = (DefaultTableModel)dataTable.getModel();
model.addRow(new Vector<>());
}
public void deleteDataFromTableRow (){
DefaultTableModel model = (DefaultTableModel)dataTable.getModel();;
model.removeRow(dataTable.getRowCount()-1);
}
public void clearDataTable(){
DefaultTableModel model = (DefaultTableModel)dataTable.getModel();
model.setRowCount(0);
}
// в конструкторе класса
dataTableModel = new DefaultTableModel();
dataTableModel.addColumn("X");
dataTableModel.addColumn("Y");
dataTable = new JTable(dataTableModel);
dataTable.setPreferredSize(new Dimension(300, 300));
JScrollPane tableScroll = new JScrollPane(dataTable);
DefaultTableModel model = (DefaultTableModel) dataTable.getModel();
RowSorter<DefaultTableModel> sorter = new TableRowSorter<DefaultTableModel>(model);
((TableRowSorter<DefaultTableModel>) sorter).setSortable(1, false);
dataTable.setRowSorter(sorter);
JPanel tableButtonPanel = new JPanel();
JButton addDataButton = new JButton("Добавить точку");
JButton deleteDataButton = new JButton("Удалить точку");
JButton clearDataButton = new JButton("Очистить таблицу");
addDataButton.addActionListener(new ActionListener() {
@Override
public void actionPerformed(ActionEvent e) {
addDataInTable();
}
});
tableButtonPanel.add(addDataButton);
deleteDataButton.addActionListener(new ActionListener() {
@Override
public void actionPerformed(ActionEvent e) {
deleteDataFromTableRow();
}
});
tableButtonPanel.add(deleteDataButton);
clearDataButton.addActionListener(new ActionListener() {
@Override
public void actionPerformed(ActionEvent e) {
clearDataTable();
}
});
tableButtonPanel.add(clearDataButton);
В итоге получается что-то типа этого
Специально добавил две новые строки. Двойным щелчком мыши по ячейке запускается возможность ее редактирования, то есть можно вписать туда значение.
Теперь таблица на javafx
public class Main extends Application implements EventHandler<ActionEvent> {
private TableView <PointOfGraphic> dataTable;
private Button addDataInTableButton;
private Button deleteDataFromTableButton;
private Button clearTableButton;
private ObservableList <PointOfGraphic> pointObservableList;
@Override
public void start(Stage primaryStage) throws Exception{
ddDataInTableButton = new Button("Добавить точку");
deleteDataFromTableButton = new Button("Удалить точку");
clearTableButton = new Button("Очистить таблицу");
addDataInTableButton.setOnAction(this);
deleteDataFromTableButton.setOnAction(this);
clearTableButton.setOnAction(this);
VBox vBox = new VBox();
pointObservableList = FXCollections.observableArrayList();
dataTable = new TableView<>();
TableColumn <PointOfGraphic, Double> XColumn = new TableColumn<>("X");
TableColumn <PointOfGraphic, Double> YColumn = new TableColumn<>("Y");
XColumn.setCellValueFactory(new PropertyValueFactory<>("X"));
YColumn.setCellValueFactory(new PropertyValueFactory<>("Y"));
dataTable.getColumns().addAll(XColumn, YColumn);
XColumn.setMinWidth(50);
YColumn.setMinWidth(50);
vBox.getChildren().add(dataTable);
HBox hBox = new HBox();
hBox.getChildren().add(addDataInTableButton);
hBox.getChildren().add(deleteDataFromTableButton);
hBox.getChildren().add(clearTableButton);
hBox.setPadding(new Insets(10,10,10,10));
vBox.getChildren().add(hBox);
Scene scene = new Scene(vBox,500,500);
primaryStage.setScene(scene);
Parent root = FXMLLoader.load(getClass().getResource("sample.fxml"));
primaryStage.show();
}
public static void main(String[] args) {
launch(args);
}
private void addButtonClicked(){
dataTable.getItems().add(new PointOfGraphic());
}
private void deleteButtonClicked() {
dataTable.getItems().removeAll(dataTable.getSelectionModel().getSelectedItem());
}
public void handle(ActionEvent e){
if(e.getSource()==addDataInTableButton){
addButtonClicked();
}
if (e.getSource()==deleteDataFromTableButton){
deleteButtonClicked();
}
}
}
В итоге получается такая таблица
Когда я выделяю строку в этой таблице, я не могу поменять значение координаты X или Y, как на Swing. Почему? И как можно это сделать? P.S. PointOfGraphicэто просто наследник Object с двумя полями Double X, Double Y Ничего особенного.
A:
Вам необходимо для колонки переопределить cellFactory, в которой реализовать необходимое поведение.
Ниже пример приложения, на котором желаемое поведение работает.
public class TestJavaFx extends Application {
public static void main(String[] args) {
launch(args);
}
@Override
public void start(Stage stage) {
BorderPane pane = new BorderPane();
TableView<Person> tableView = createTableView();
pane.setCenter(tableView);
Button print = new Button("Print table persons");
print.setOnAction(event -> tableView.getItems().forEach(System.out::println));
pane.setBottom(print);
Scene scene = new Scene(pane, 400, 400);
stage.setScene(scene);
stage.show();
}
private TableView<Person> createTableView() {
TableView<Person> tableView = new TableView<>();
tableView.getItems().addAll(new Person("Jack", 13), new Person("Steve", 25), new Person("Michael", 20));
TableColumn<Person, String> nameColumn = new TableColumn<>("name");
nameColumn.setCellValueFactory(new PropertyValueFactory<>("name"));
nameColumn.setCellFactory(p -> new CustomTableCell<>());
nameColumn.setOnEditCommit(event -> {
String newName = event.getNewValue();
Person person = event.getRowValue();
person.setName(newName);
});
TableColumn<Person, Integer> ageColumn = new TableColumn<>("age");
ageColumn.setCellValueFactory(new PropertyValueFactory<>("age"));
tableView.setEditable(true);
tableView.getColumns().addAll(nameColumn, ageColumn);
return tableView;
}
public static class Person {
String name;
int age;
public Person(String name, int age) {
this.name = name;
this.age = age;
}
public String getName() {
return this.name;
}
public void setName(String name) {
this.name = name;
}
public int getAge() {
return this.age;
}
public void setAge(int age) {
this.age = age;
}
public String toString() {
return name + "[" + age + "]";
}
}
private static class CustomTableCell<T> extends TableCell<T, String> {
private TextField textField;
@Override
public void startEdit() {
super.startEdit();
if (textField == null) {
createTextField();
}
textField.setText(getString());
setGraphic(textField);
setContentDisplay(ContentDisplay.GRAPHIC_ONLY);
}
@Override
public void cancelEdit() {
super.cancelEdit();
setText(getString());
setContentDisplay(ContentDisplay.TEXT_ONLY);
}
@Override
protected void updateItem(String s, boolean b) {
super.updateItem(s, b);
if (b || s == null) {
setText(null);
setGraphic(null);
} else {
setText(getString());
setContentDisplay(ContentDisplay.TEXT_ONLY);
}
}
private String getString() {
return String.valueOf(getItem());
}
private void createTextField() {
textField = new TextField(getString());
textField.setOnKeyPressed(t -> {
if (t.getCode() == KeyCode.ENTER || t.getCode() == KeyCode.TAB) {
commitEdit(textField.getText());
} else if (t.getCode() == KeyCode.ESCAPE) {
cancelEdit();
}
});
}
}
}
Обратить особое внимание необходимо на метод createTableView, а конкретно на переменную nameColumn. Мы ей проставляем
cellValueFactory - для того, чтобы колонка знала, какую проперти из нашей модели отображать в ячейке
cellFactory - фабрика для отображения самой ячейки при редактировании
onEditCommit - мы обрабатываем event, который возникает, когда мы сохраняем значение в ячейке ( покидаем ее по enter или tab)
так же важно помнить, что еще необходимо выставить tableView.setEditable(true); иначе редактирование не будет работать.
после изменения имен, можно нажать кнопку "Print table persons" и тогда мы увидим в консоле, что значения имен поменялись (и сохранились) на новые
| 2024-06-08T01:26:19.665474 | https://example.com/article/8324 |
>>===== MODE =====>>
citation
<<===== MODE =====<<
>>===== OPTIONS =====>>
{
"wrap_url_and_doi": true
}
<<===== OPTIONS =====<<
>>===== RESULT =====>>
(His Anonymous Life <i><a href="https://doi.org/10.1111/j.1747-4469.1976.tb00951.x">10.1111/j.1747-4469.1976.tb00951.x</a></i>)
<<===== RESULT =====<<
>>===== CSL =====>>
<style
xmlns="http://purl.org/net/xbiblio/csl"
class="note"
version="1.0">
<info>
<id />
<title />
<updated>2009-08-10T04:49:00+09:00</updated>
</info>
<citation>
<layout>
<group delimiter=" " prefix="(" suffix=")">
<text variable="title"/>
<text font-style="italic" variable="DOI"/>
</group>
</layout>
</citation>
</style>
<<===== CSL =====<<
>>===== INPUT =====>>
[
{
"id": "ITEM-1",
"title": "His Anonymous Life",
"DOI": "10.1111/j.1747-4469.1976.tb00951.x",
"type": "book"
}
]
<<===== INPUT =====<<
| 2023-10-28T01:26:19.665474 | https://example.com/article/5707 |
1. Introduction {#sec1}
===============
Acupuncture is an efficient therapy method that originated in ancient China. It uses thin metal needles to pierce through skin into acupoints to regulate the flow of Qi around the whole body, and its effect is validated primarily by the evidence of its beneficial practice while the mechanism awaits understanding. Acupuncture effect is complicated, which is determined by the complexity of human body and disease and is manifested by the properties that acupuncture acting factors possess multielement, multilevel, and nonlinearity \[[@B1]\]. But one of the problems in acupuncture research is how to study the action mechanism of acupuncture and evaluate its efficacy at molecular level based on scientific methods under the guidance of TCM theory. Reductionism study is unable to embody the integration and complexity of acupuncture effect; therefore, it is limited to reveal the rule of acupuncture effect without the guidance of systems theory.
As the most important part of TCM, acupuncture develops its therapeutic effect by stimulating acupoints, which could form a complex regulating network system through the flowing and changing of energy and information in meridians and collaterals \[[@B2]\]. The study of acupuncture should be based on the understanding of the complexity in TCM. ZHENG classification (also referred to as syndrome differentiation) is the essence of TCM which attaches importance to various factors, at the same time it emphasizes on the interaction and relation in integration, which is confronted with nonlinear phenomenon \[[@B3], [@B4]\]. The acupuncture research based on ZHENG classification is the systematic research which is under the guidance of TCM theory and could bring the complexity of acupuncture effect to light, so the acupuncture research on the foundation of ZHENG classification should be taken as the breakthrough point to reveal the acupuncture mechanism and its efficacy.
ZHENG is the specific pattern to identify disease and is the essence of ZHENG classification and treatment (Bianzheng lunzhi) in TCM \[[@B5]\], Sun et al. \[[@B6]\] use metabonomic methods to differentiate ZHENG types and evaluate the therapeutic efficiency of Fuzhenghuayu tablet in hepatitis-B-caused cirrhosis. The efficiency of FZHY treatment based on ZHENG differentiation indicated that accurately ZHENG differentiating could guide the appropriate TCM treatment in HBC. ZHENG is a relational model of dysfunctions in whole which is produced by logical reasoning based on practical experiences \[[@B7]\], and the nature of ZHENG may be the substances imbalance of multisystem and multilevel in spatiotemporal distribution and relation combination \[[@B8]\]. The idea of system biology is comprehensive, integrated, and global, which is in correspondence with the holistic and systemic approaches of TCM. As the coming of the system biology era, the system perspective provides us an important approach to understand the essence of phenomenon \[[@B9]\], and broader technology platforms were established for the objective study of TCM. Omics technologies could dynamically determine molecular components of various levels and creates the feasible conditions to explore the material basis of ZHENG. Lu et al. \[[@B10], [@B11]\] used genechip analytical techniques to distinguish between cold syndrome and heat syndrome of female rheumatoid arthritis (RA) patients; the results showed that the genes referred with cold or heat ZHENG were different from those genes with RA and further suggested that ZHENG in TCM has solid foundation in gene profile. Liu et al. \[[@B12]\] used proteomics technology to get the preliminary evidence in functional protein level that the transfer of phlegm and blood stasis syndrome is mainly from phlegm syndrome to blood stasis syndrome and ultimately formed phlegm accumulating with stagnation syndrome. In omics researches of ZHENG, system models have been used to analyze the interrelation between various factors in the whole. Xu et al. \[[@B13]\] explored a strategy of classifying five TCM syndromes in diabetes based on plasma fatty acid metabolic profiles, lipid metabolism indicators, and chemometrics methods. Compared with orthogonal signal correction-partial least squares (OSC-PLS) method, better clustering results were demonstrated with the application of the uncorrelated linear discriminant analysis (ULDA), a new method which was used to analyze the various factors in a joint way. By finding out the relationship between various response parts, omics researches can show us a systematic understanding of the microenvironment, based on the results of genomics research and literature data mining. Li et al. \[[@B14]\] successfully established a heat and cold ZHENG model.
Omics provides integral, systemic, and dynamic technology platforms for the study of TCM, the study by which has effectively revealed the essence and connotation of TCM phenomena such as ZHENG at molecular level. In the study of acupuncture, omics researches are helpful to understand the entire effect of acupuncture; moreover, based on ZHENG classification, holistic study can investigate the action characteristics of acupoints and the molecular mechanism of their synergistic effect under the guidance of TCM theory. So the present paper reviewed the omics researches of acupuncture. We hope that the review will help to understand the entire effect of acupuncture and the special effects of meridians and acupoints with combining the theory of TCM and help promote acupuncture to be more properly used clinically.
2. Omics Researches of Acupuncture Based on the Cognition of Diseases {#sec2}
=====================================================================
Acupuncture stimulation could cause synchronous changes of body systems \[[@B1]\]. If we ignore the relation of the body systems and study the action mechanisms of acupuncture separately, we may offend against the view of holism and overlook the effective links. While the development of omics and bioinformation analysis technologies provide a global, systematical, and dynamic technology platform for TCM research, by dynamically detecting molecular components of various levels, omics researches of acupuncture can show us the entire effect of acupuncture.
2.1. Entire Effect of Acupuncture {#sec2.1}
---------------------------------
Meridian is the "channel" which runs Qi and Xue (the theory of blood in TCM) and connects Zangfu (the viscera in TCM), body surface, and other parts of human body, regulating the body function. When a single acupoint in the "channel" is stimulated by acupuncture, an entire effect would be produced through the interactions during the transmit process of meridian Qi and pathopoeia factors \[[@B1]\]. As a global approach and a primary method of investigating biological phenotypes, omics could be utilized to explore the mechanism of acupuncture from the perspective of effect by revealing the overall alterations of molecular after stimulating on certain acupoints.
The omics researches on acupuncture are based on the researchers\' understanding of diseases. On the basis of different disease knowledge and study purposes, various samples and omics methods are selected. Different omics researches reflect the integral cognition for study subjects from different aspects. Due to the variety of sample resources and omics methods, the conclusion of mechanism study on the same disease may differ.
### 2.1.1. Researches by Different Omics Approaches {#sec2.1.1}
Genomics, proteomics, and metabolomics had been applied in the study of acupuncture. The microarrays of either cDNA or oligonucleotide probes were used to screen for potential candidate genes to mediate acupuncture responses. The proteomic technologies of two-dimensional electrophoresis (2-DE) and mass spectrum (MS) analysis have been extensively used in acupuncture studies. Metabolic analysis has to deal with a highly diverse range of biomolecules which is different from genome and proteome analysis; recent advances in the two analytical platforms of mass spectrometry (MS) and nuclear magnetic resonance (NMR) spectroscopy have driven forward the discipline of metabolomics, but every platform covers only part of metabolomic \[[@B15]\]. In order to make metabolomic analysis to be a comprehensive research method as the genomic and proteomic assays, a community effort is required to develop the tools and databases and provide integration of these different tools and databases \[[@B16]\].
In a study reported by Gao et al. \[[@B17]\] the pain relieving effect of acupuncture may be mediated by endogenous opioid peptides in central nervous system. Sung et al. \[[@B18]\] analyzed the protein expression profile in hypothalamus by two-dimensional electrophoresis, which is different from the result of genomics research by Gao et al. Proteomics evidence indicated that the mechanism of analgesia by needling Zusanli was associated with inflammation, enzyme metabolism, and signal transduction.
The researches indicated that experimental results based on high-flux omics studies may be false positive or false negative unavoidably, thus impacting further researches on acupuncture. In addition, it is still difficult to analyze the variance results of different samples and different omics methods and to systematically integrate these results. On the basis of omics studies, creating system models which could be driven by clinical data would help us to better understand the molecular mechanism integrally \[[@B19]\].
### 2.1.2. Researches with Different Sample Sources {#sec2.1.2}
In the genomics study on the treatment effect of acupuncturing on GB34 (Yanglingquan) and LR3 (Taichong) with 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine (MPTP) induced Parkinson\'s disease animal models, Choi et al. analyzed the genetic changes in spinal cord \[[@B20]\] and Corpus Striatum \[[@B21]\] before and after acupuncture treatment based on gene chips technology and validate the results by reverse transcription-polymerase chain reaction (RT-PCR). It was proved that beneficial regulation on genes was developed by acupuncture, which showed their treatment effect by protecting nerves and inhibiting degradation of Corpus Striatum, respectively.
In a genomic study \[[@B22]\] on the pain relieving effect of electroacupuncture on Zusanli, the RNA changes in spinal nerves before and after acupuncture treatment were analyzed based on cDNA microarray technology. Signal transduction, gene expression, and an algesia pathway regulation were involved in the mechanism, which is different from the research by Gao et al. \[[@B17]\].
The effect of acupuncturing on specific acupoints is not only related to diseases but also to body conditions. In the genomics study \[[@B23]\] about acupuncture treatment on allergic coryza, gene expression profile in respect of positive/negative Phadiatop (Ph) test reaction \[Ph(+) and Ph(−)\] was analyzed before and after acupuncture treatment. Distinct physiological responses in Ph(+) and Ph(−) groups could be differentiated in the profiles. Another study \[[@B24]\] on the pain relieving effect of acupuncturing on the Hegu based on Genomics also indicated that individual differences of the pain relieving effect existed when specific acupoints were stimulated, and these differences were related to inheritance. The function of human body is mobilized fully to prevent and cure diseases by stimulating acupoints in the therapy of acupuncture, as the complexity of human body and disease determined the complexity of the acupuncture efficacy, analyzing the connections between effectors molecules and integrating that the omics results are the foundation of holistic understanding and evaluating acupuncture effect.
Omics studies on the acupuncture effects on Parkinson\'s disease \[[@B21], [@B22], [@B25], [@B26]\], rhinitis \[[@B24], [@B27]\], osteoarthritis \[[@B28]\], spinal injury \[[@B29], [@B30]\], pain \[[@B18], [@B19], [@B23], [@B25]\], aging \[[@B31], [@B32]\], ischemia (ischemic stroke) \[[@B33], [@B34]\], parturition \[[@B35]\] functional dyspepsia \[[@B36], [@B37]\], and so forth indicated that the mechanism of acupuncture is involved in the regulation of many body systems and is mainly associated with NEI system ([Figure 1](#fig1){ref-type="fig"}). The nerve, endocrine, and immune systems are distributed over the body widely. What is more, the three systems can regulate mutually through the common information molecules and receptors; thus the complex regulation network is formed and the other body systems are regulated. The body defense, growth, and development are regulated by the complex system ([Figure 1(a)](#fig1){ref-type="fig"}). Acupuncture may treat diseases by regulating the NEI network and then develop effects such as anti-inflammation, neuroprotection, and antioxidative stress ([Figure 1(b)](#fig1){ref-type="fig"}). Needling specific acupoints, the change of NEI network can reflect acupuncture effect systematically.
2.2. Special Effect of Meridian and Acupoint {#sec2.2}
--------------------------------------------
Treatment by stimulating acupoints is the key point to distinguish acupuncture treatment from other therapies, and the special structure and function of the acupoints are the efficiency basis of acupuncture therapy. Wu et al. \[[@B37], [@B38]\] investigated the effects of acupuncture at Yangming meridian points and other meridian points using plasma and urine metabonomics approach based on ^1^H NMR and analyzed whether Yangming meridian points have common or different metabolic characteristics from other meridian points by pattern recognition. This study suggested that Yangming meridian points have different characteristics from those of both Yanglingquan and Weizhong.
The treatment rules of acupuncture are very complicated but regular, which mainly depend on acupoints location, meridians attribution, and category \[[@B38]\]. The manifestations of acupoints specificity are diversified and compared with other specificities such as anatomy; efficiency specificity has more practical value and is more coincident with clinical requirements, which is regarded as the breakthrough point of acupoints specificity research. Omics researches show the global effect of acupuncture which possesses relative specificity; that is, needling different acupoints could treat the same disease and different diseases could be treated by needling the same acupoints.
### 2.2.1. Same Acupoints for Different Diseases {#sec2.2.1}
Needling a specific acupoint could develop a widely biological effect; in the omics study of acupuncture, needling Zusanli could develop the effects such as immunity regulating \[[@B36], [@B39]\], pain relieving \[[@B18], [@B19], [@B23]\], and anti-inflammation \[[@B40]\], thus treating many diseases and developing more effects by synergy of other acupoints. While in TCM, the major effects by needling Zusanli are germinating Wei (the theory of stomach in TCM) Qi and drying Pi (the theory of spleen in TCM) dampness.
Omics researches showed that acupuncture could treat diseases by regulating the NEI network, and the information molecules and their receptors shared by nervous, endocrine, and immune systems were associated with the occurrence and development of several diseases. Li et al. \[[@B14]\] found that heat and cold ZHENG were associated with the disorder of different NEI regulation models, which were able to respond to different TCM ZHENGs. Based on NEI network, they successfully establish heat and cold ZHENG model. Needling specific acupoints could treat several different diseases, from which the entire effect of acupuncture may be consistent with the regulation of certain TCM ZHENGs.
### 2.2.2. Same Disease with Different Acupoints {#sec2.2.2}
Functional dyspepsia (FD) is a set of common symptoms including abdominal pain or discomfort. A plasma metabolomics research based on ^1^H NMR technology was designed to investigate the metabolic difference between FD patients and healthy volunteers, and a series of differential metabolites were sought out \[[@B41], [@B42]\] ([Figure 2(b)](#fig2){ref-type="fig"}). The pathway analysis indicated that FD was related to some disorders in energy metabolism and especially with the NEI dysfunction ([Figure 2(c)](#fig2){ref-type="fig"}). And the corresponding ZHENGs of FD were mainly regarded as Pi-Wei weakness or Gan (the theory of liver in TCM) depression and Pi deficiency \[[@B43]\] ([Figure 2(d)](#fig2){ref-type="fig"}).
When the Wei and its Back-Shu and Front-Mu points \[[@B42]\] as well as the specific acupoints of Yang-mingjing were needled \[[@B43]\], both of them had beneficial and regulative effects on the metabolites associated with FD. And the regulative intensity was greater and the range was wider compared with that of the nonacupoints. Moreover, the longer the treatment time of acupuncture was, the more obvious positive regulative effects it would have. Therefore both methods had therapeutic effect on FD. As disease is complex and the practitioners may treat disease from different angles, they may select different acupoints when treating disease. There were differential regulative effects on potential biomarkers and key metabolites of FD when the stomach and its Back-Shu and Front-Mu points as well as the specific acupoints of Yang-mingjing were needled, so the regulative effects to FD-related NEI network were different; thus different point selection may make certain regulative effects on different TCM ZHENGs ([Figure 2](#fig2){ref-type="fig"}). The location of FD in TCM is in Pi and Wei, and the main therapeutic effects by needling the back shu points and the front mu points are in diseases of Zangfu. The ^1^H NMR metabolomics studies of FD with acupuncture treatment showed that needling the acupoints could regulate Qi, Xue, yin, and yang of the Zangfu, helping to restore normal physiological function of Zangfu. Acupuncture with selecting acupoints along meridians is the most important point selection method in the treatment of FD \[[@B44]\]. Meridians and collaterals are the channels of transporting the Qi and Xue, contacting Zangfu and body surface as well as all parts of the body, and it is the regulatory system of body function. When the specific acupoints of Yang-mingjing were needled, the treatment effect of selected acupoints along meridians was a whole regulation which was showed by ^1^H NMR metabolomics studies of FD. The stimulations acted on acupoints, and the acupoints were connected with meridians, so Yin and Yang, deficiency, and excess could be regulated through restoring Qi-Xue transportation.
Biology molecular alterations before and after acupuncture intervention could reflect the ZHENG information at certain structure and function level, which embodies different ZHENG classification of acupuncture. ZHENG is a complicated nonlinear system which emphasizes the interaction and relation of various factors, and it could be described as a model with dysfunctional relationship. Clinical ZHENG will present different interfaces by observing the disease appearance with different methods and points of view, which is called different ZHENG classification of TCM \[[@B45]\]. Needling specific acupoints is guided by meridian theories which could beneficially regulate the corresponding biology molecular of TCM ZHENG from the level of disease location or pathogenesis, which might be the mechanism of Meridian Specificity.
The specificity rules of meridians and acupoints which are illustrated by researching are helpful to select acupoints for treatment in clinic and to make acupoints selection methods more in line with ZHENG classification.
3. Omics Researches of Acupuncture Based on ZHENG Classification {#sec3}
================================================================
ZHENG classification of acupuncture reflects the comprehensive and systematic understanding of disease. It is the theoretical basis of guiding acupoints selection, improving the clinical efficacy as well as studying the acupuncture. Omics researches of acupuncture based on clinical ZHENG classification could reveal the effect mechanism of acupuncture at molecular level integrally by ignoring the anatomic location of specific tissues and organs. By analyzing the connections among the ZHENG relevant biological molecules in the omics studies, biology network models had been established for the further study of ZHENG. Researching and analyzing the structure changes of biology network models, it would make objective evaluation for health status, ZHENG changes and treatment efficacy and it will help us understand the action characteristics of acupoints and the molecular mechanism of their synergistic effect ([Figure 3](#fig3){ref-type="fig"}).
3.1. Treatment Principles of Meridian and Acupoint {#sec3.1}
--------------------------------------------------
In the imparting and inheriting history of acupuncture, a theoretical system of ZHENG classification and treatment with its own characteristics which guide the diagnosis and treatment of acupuncture comprehensively and systematically was formed. Meridian theory is the key of the theory of acupuncture. It is the ZHENG classification according to meridian theories that clinical acupuncture ZHENG classification takes as the "main body," ZHENG classification according to location as the "key," ZHENG classification according to eight principles as the "guidance," and ZHENG classification according to visceral theory as the "supplement" \[[@B46]\]. Omics researches based on different ZHENG classification can reflect the features and functions of acupoints in disease treatment.
Osteoarthritis (OA) belongs to "bone impediment" in TCM whose characteristics are deficiency in origin and excess in superficiality. According to the pathological sites of OA, by topical ZHENG classification, left and right Xiyan which is near knee joint were selected as treatment acupoints. Changes in gene expression of patients who were response to warm acupuncture before and after treatment were analyzed by gene chip technology; the result showed that genes related to inflammation were changed, which may be the direct treatment effect of needling left and right Xiyan in improving the relevant symptoms of OA \[[@B47]\].
Kidney-yang is the foundation of yang Qi. Kidney-yang deficiency is very common in clinic which mainly manifests as deficiency and cold of the whole body. According to the theory of TCM, the kidney masters the bones which has close relationship with the pathogenesis of OA. Previous studies also showed that kidney-yang deficiency was the highest incidence of TCM ZHENG pattern in OA \[[@B48]\]. With the analysis of etiology and pathogenesis of kidney-yang deficiency pattern by viscera ZHENG classification, the acupoints of Guanyuan and Qihai as well as warm needling method were selected to treat OA. Shen \[[@B49]\] thought that kidney-yang deficiency pattern was an overall performance of multisystems and organs dysfunction which are mainly related to the dysfunction of nervous system, endocrine system, and immune system.
Ding et al. and Yang et al. \[[@B50], [@B51]\] found that signal transduction abnormalities among cells may play a key role in the development and progression of OA with kidney-yang deficiency. Various common signal molecules and receptors in nervous, endocrinology, and immune system are the molecule structure basis of NEI network. Genomics research about OA with deficiency cold by warm acupuncture treatment demonstrated that the genes of signal transduction were significantly expressed \[[@B47]\]. Taking Guanyuan, Qihai, and Zusanli as master points, traditional warm needling technique could stimulate Yang Qi of kidney and recover the physiological function of kidney by regulating NEI network so that the meridians are dredged and the symptoms of OA could be improved.
Quadriceps atrophy is caused by knee pain and joint dysfunction and vice versa. The Wei meridians being circulated through quadriceps, Yang-mingjing is rich in Qi and Xue; it nourishes the ancestral sinew \[[@B52]\]. Deficiency of Qi and Xue could lead to emptiness of meridians, which could be the reason of osteoarthritis. Based on the meridian differentiation, Zusanli was selected as the treatment acupoint. The modern research showed that Pi and Wei in TCM are closely related to immune theory in modern medicine \[[@B53]\]. The researches of genome \[[@B29], [@B53]\] showed that the pathogenesis of osteoarthritis are involved in abnormal expression of immune-related genes. Further studies conducted by Yang et al. \[[@B51], [@B54]\] showed that osteoarthritis belonging to Kidney-Yang deficiency is involved in 13 immune-related gene expression abnormalities. Needling Zusanli could induct or repress the expression of immune-related genes in order to restore the physiological function of Wei meridian of Foot-Yangming, which could develop the therapeutic effect on osteoarthritis by playing a regulative role in enriching the Qi, Xue, and meridians to make the therapeutic effect on OA.
By improving corresponding symptoms, different point selection methods have a direct or indirect therapeutic effect on disease treatment, taking a temporary solution and effecting a permanent cure.
3.2. Compatible Regularity of Acupoints {#sec3.2}
---------------------------------------
Different methods of ZHENG classification are overlapping at some extent in the clinical use of acupuncture while each method has its own merit and characteristic, so different ZHENG classification methods are irreplaceable in clinic \[[@B55]\]. By integrating data of omics researches guided by systems theory of ZHENG, it would help us understand the molecular mechanisms of acupoints compatibility.
Genomics research showed that the mechanism of warm acupuncture treatment for OA with Kidney-Yang Deficiency may be related to the recovery of energy metabolism, inflammation, immune function, and signaling systems. Among them, the therapeutic effect of needling the left and right Xiyan and Yanglingquan may associate with the regulation of inflammation and immune-related genes. Needling Qihai and Guanyuan with the method of traditional warm acupuncture could beneficially regulate the metabolic changes of OA by affecting the NEI network. While the normal function of NEI network is dependent on the regular of synthesis, secretion and transport of the whole system, TCM theory holds that the transport and transformation of various substances in the body depend on the normal Pihealth movement. Thus, the warming acupuncture on Zusanli could enhance the overall regulative effect.
Acupuncture treatment is reasonably compatible according to the action laws of acupoints based on the comprehensive ZHENG classification. Acupuncture genomics studies showed that characterized acupoints which develop specific regulative effect on disease-related NEI network may form a new system through the interrelating and interacting of the network to treat diseases integrally.
4. Summary and Prospect {#sec4}
=======================
The effects of acupuncture are complex and it is unilateral to explore the mechanism of acupuncture in accordance with reductionism at the molecular levels due to the limitation of science. However, as the development of science, the essence of acupuncture may be uncovered at atom or electron levels \[[@B56]\]. At the molecular levels, omics researches of acupuncture based on ZHENG classification provided a wealth of information such as molecular structure information for the further systemic study of acupuncture.
Clinical ZHENG is a complex and nonlinear system which is consistent with the complicated and various properties of disease. While it is too complex for data processing which limits the further study of the ZHENG quantization and mechanism, and even through omics experiments, only small subsets of ZHENG correlated variables could be observed and most variables are still hidden which must be defined by computing \[[@B57]\], while the relative deficiency of data processing makes the omics data not easily be fully interpreted \[[@B58]\]. Therefore, in the omics researches of acupuncture based on ZHENG classification, we must decompose the ZHENG legitimately according to its property for further study \[[@B59]\].
With the application of bioinformatics and other science technologies, biological networks which connect and interact with each other should be established on the foundations of genomics, proteomics, and metabolomics in acupuncture study. With the researches on the relationship between different ZHENG classifications and the spatiotemporal distribution rule of nonspecific substances based on biological networks, the combination of omics technologies and different ZHENG classification will be truly achieved, and the molecular mechanism of the acupuncture will be understood in system levels.
TCM can be regarded as traditional systems biology, and it is more important to discover the behavior of the system compared with the understanding of the structure of biological systems. System biology introduced the concept of perturbation as an artificial tool to control the state \[[@B60]\]. Under the artificial controlled state, dynamic characteristics of specific life system in different conditions and different times are studied. The integrated effect of acupuncture treatment is actually one of the manifestations of systems biology perturbation which is based on the endogenous substances, and as acupuncture is an important part of TCM, the omic study of acupuncture based on ZHENG classification has certain guidance and reference for the study and development of systems biology.
The authors declared that they have no conflict of interests regarding this work. And they did not have a direct financial relation with the commercial identity mentioned in this paper.
Junwei Fang and Ningning Zheng contributed equally to this work and should be considered as cofirst authors.
This paper was supported by Shanghai Interdisciplinary Cultivation Platform of Outstanding and Innovative Postgraduates and Shanghai "085" Science and Technology Innovation Supporting Project for Top-grade Discipline Construction.
Ala:
: Alanine
CNS:
: Central nervous system
ER:
: Endocrine regulation
ESAB:
: Energy supply and application bottleneck
Gln:
: Glutamine
GSH:
: Glutathione
HPA:
: Hypothalamic pituitary adrenal
Ile:
: Isoleucine
IR:
: Immune regulation
JLCF:
: Jueyin liver channel of foot
JPCH:
: Jueyin pericardium channel of hand
Ket:
: Ketone body
Lac:
: Lactate
Leu:
: Leucine
mTOR:
: Mammalian target of rapamycin
NR:
: Neuroregulation
Ph:
: Phadiatop
PI:
: Phosphatidylinositol
Pro:
: Proline
PtdCho:
: Phosphatidylcholine
SGCF:
: Shaoyang gallbladder channel of foot
SHCH:
: Shaoyin heart channel of hand
SKCF:
: Shaoyin kidney channel of foot
SSCH:
: Shaoyang Sanjiao channel of hand
TBCF:
: Taiyang bladder channel of foot
TLCH:
: Taiyin lung channel of hand
TSCF:
: Taiyin spleen channel of foot
TSICH:
: Taiyang small intestine channel of hand
YLICH:
: Yangming large intestine channel of hand
YSCF:
: Yangming stomach channel of foot.
{#fig1}
{#fig2}
![Understanding acupuncture with omics researches based on ZHENG classification. The omics researches of acupuncture based on ZHENG classification are the systematic research which are under the guidance of TCM theory and could bring the complexity of acupuncture effect and theory to light (a). By analyzing the connections among the ZHENG-related biological molecules in the omics studies of acupuncture, biology network models had been established for the further study of ZHENG. Studying the structure changes of biology network models would help us understand the action characteristics of acupoints and the molecular mechanism of their synergistic effect (b). (c) cited from \[[@B14]\].](ECAM2013-956967.003){#fig3}
[^1]: Academic Editor: Shi-bing Su
| 2024-06-13T01:26:19.665474 | https://example.com/article/7925 |
<!DOCTYPE html>
<!--[if IE 8]><html class="no-js lt-ie9" lang="en" > <![endif]-->
<!--[if gt IE 8]><!--> <html class="no-js" lang="en" > <!--<![endif]-->
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Licenses — attackcti 0.2.3 documentation</title>
<script type="text/javascript" src="_static/js/modernizr.min.js"></script>
<script type="text/javascript" id="documentation_options" data-url_root="./" src="_static/documentation_options.js"></script>
<script type="text/javascript" src="_static/jquery.js"></script>
<script type="text/javascript" src="_static/underscore.js"></script>
<script type="text/javascript" src="_static/doctools.js"></script>
<script type="text/javascript" src="_static/language_data.js"></script>
<script type="text/javascript" src="_static/js/theme.js"></script>
<link rel="stylesheet" href="_static/css/theme.css" type="text/css" />
<link rel="stylesheet" href="_static/pygments.css" type="text/css" />
<link rel="index" title="Index" href="genindex.html" />
<link rel="search" title="Search" href="search.html" />
<link rel="prev" title="Library Functions" href="attackcti_functions.html" />
</head>
<body class="wy-body-for-nav">
<div class="wy-grid-for-nav">
<nav data-toggle="wy-nav-shift" class="wy-nav-side">
<div class="wy-side-scroll">
<div class="wy-side-nav-search" >
<a href="index.html" class="icon icon-home"> attackcti
</a>
<div role="search">
<form id="rtd-search-form" class="wy-form" action="search.html" method="get">
<input type="text" name="q" placeholder="Search docs" />
<input type="hidden" name="check_keywords" value="yes" />
<input type="hidden" name="area" value="default" />
</form>
</div>
</div>
<div class="wy-menu wy-menu-vertical" data-spy="affix" role="navigation" aria-label="main navigation">
<p class="caption"><span class="caption-text">OASIS CTI TC</span></p>
<ul>
<li class="toctree-l1"><a class="reference internal" href="oasis_overview.html">OASIS Overview</a></li>
<li class="toctree-l1"><a class="reference internal" href="taxii_client.html">CTI TAXII Client</a></li>
<li class="toctree-l1"><a class="reference internal" href="stix.html">CTI STIX</a></li>
</ul>
<p class="caption"><span class="caption-text">ATTACK CTI Library:</span></p>
<ul>
<li class="toctree-l1"><a class="reference internal" href="attackcti_overview.html">Overview</a></li>
<li class="toctree-l1"><a class="reference internal" href="attackcti_functions.html">Functions</a></li>
</ul>
<p class="caption"><span class="caption-text">Licenses:</span></p>
<ul class="current">
<li class="toctree-l1 current"><a class="current reference internal" href="#">GNU General Public License V3</a></li>
</ul>
</div>
</div>
</nav>
<section data-toggle="wy-nav-shift" class="wy-nav-content-wrap">
<nav class="wy-nav-top" aria-label="top navigation">
<i data-toggle="wy-nav-top" class="fa fa-bars"></i>
<a href="index.html">attackcti</a>
</nav>
<div class="wy-nav-content">
<div class="rst-content">
<div role="navigation" aria-label="breadcrumbs navigation">
<ul class="wy-breadcrumbs">
<li><a href="index.html">Docs</a> »</li>
<li>Licenses</li>
<li class="wy-breadcrumbs-aside">
<a href="_sources/license.rst.txt" rel="nofollow"> View page source</a>
</li>
</ul>
<hr/>
</div>
<div role="main" class="document" itemscope="itemscope" itemtype="http://schema.org/Article">
<div itemprop="articleBody">
<div class="section" id="licenses">
<h1>Licenses<a class="headerlink" href="#licenses" title="Permalink to this headline">¶</a></h1>
<blockquote>
<div><blockquote>
<div><dl class="simple">
<dt>GNU GENERAL PUBLIC LICENSE</dt><dd><p>Version 3, 29 June 2007</p>
</dd>
</dl>
</div></blockquote>
<p>Copyright (C) 2007 Free Software Foundation, Inc. <<a class="reference external" href="http://fsf.org/">http://fsf.org/</a>>
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.</p>
<blockquote>
<div><blockquote>
<div><p>Preamble</p>
</div></blockquote>
<p>The GNU General Public License is a free, copyleft license for</p>
</div></blockquote>
</div></blockquote>
<p>software and other kinds of works.</p>
<blockquote>
<div><p>The licenses for most software and other practical works are designed</p>
</div></blockquote>
<p>to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program–to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.</p>
<blockquote>
<div><p>When we speak of free software, we are referring to freedom, not</p>
</div></blockquote>
<p>price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.</p>
<blockquote>
<div><p>To protect your rights, we need to prevent others from denying you</p>
</div></blockquote>
<p>these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.</p>
<blockquote>
<div><p>For example, if you distribute copies of such a program, whether</p>
</div></blockquote>
<p>gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.</p>
<blockquote>
<div><p>Developers that use the GNU GPL protect your rights with two steps:</p>
</div></blockquote>
<p>(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.</p>
<blockquote>
<div><p>For the developers’ and authors’ protection, the GPL clearly explains</p>
</div></blockquote>
<p>that there is no warranty for this free software. For both users’ and
authors’ sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.</p>
<blockquote>
<div><p>Some devices are designed to deny users access to install or run</p>
</div></blockquote>
<p>modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users’ freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.</p>
<blockquote>
<div><p>Finally, every program is threatened constantly by software patents.</p>
</div></blockquote>
<p>States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.</p>
<blockquote>
<div><p>The precise terms and conditions for copying, distribution and</p>
</div></blockquote>
<p>modification follow.</p>
<blockquote>
<div><blockquote>
<div><p>TERMS AND CONDITIONS</p>
</div></blockquote>
<ol class="arabic simple" start="0">
<li><p>Definitions.</p></li>
</ol>
<p>“This License” refers to version 3 of the GNU General Public License.</p>
<p>“Copyright” also means copyright-like laws that apply to other kinds of</p>
</div></blockquote>
<p>works, such as semiconductor masks.</p>
<blockquote>
<div><p>“The Program” refers to any copyrightable work licensed under this</p>
</div></blockquote>
<p>License. Each licensee is addressed as “you”. “Licensees” and
“recipients” may be individuals or organizations.</p>
<blockquote>
<div><p>To “modify” a work means to copy from or adapt all or part of the work</p>
</div></blockquote>
<p>in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a “modified version” of the
earlier work or a work “based on” the earlier work.</p>
<blockquote>
<div><p>A “covered work” means either the unmodified Program or a work based</p>
</div></blockquote>
<p>on the Program.</p>
<blockquote>
<div><p>To “propagate” a work means to do anything with it that, without</p>
</div></blockquote>
<p>permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.</p>
<blockquote>
<div><p>To “convey” a work means any kind of propagation that enables other</p>
</div></blockquote>
<p>parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.</p>
<blockquote>
<div><p>An interactive user interface displays “Appropriate Legal Notices”</p>
</div></blockquote>
<p>to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.</p>
<blockquote>
<div><ol class="arabic simple">
<li><p>Source Code.</p></li>
</ol>
<p>The “source code” for a work means the preferred form of the work</p>
</div></blockquote>
<p>for making modifications to it. “Object code” means any non-source
form of a work.</p>
<blockquote>
<div><p>A “Standard Interface” means an interface that either is an official</p>
</div></blockquote>
<p>standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.</p>
<blockquote>
<div><p>The “System Libraries” of an executable work include anything, other</p>
</div></blockquote>
<p>than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
“Major Component”, in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.</p>
<blockquote>
<div><p>The “Corresponding Source” for a work in object code form means all</p>
</div></blockquote>
<p>the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work’s
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.</p>
<blockquote>
<div><p>The Corresponding Source need not include anything that users</p>
</div></blockquote>
<p>can regenerate automatically from other parts of the Corresponding
Source.</p>
<blockquote>
<div><p>The Corresponding Source for a work in source code form is that</p>
</div></blockquote>
<p>same work.</p>
<blockquote>
<div><ol class="arabic simple" start="2">
<li><p>Basic Permissions.</p></li>
</ol>
<p>All rights granted under this License are granted for the term of</p>
</div></blockquote>
<p>copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.</p>
<blockquote>
<div><p>You may make, run and propagate covered works that you do not</p>
</div></blockquote>
<p>convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.</p>
<blockquote>
<div><p>Conveying under any other circumstances is permitted solely under</p>
</div></blockquote>
<p>the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.</p>
<blockquote>
<div><ol class="arabic simple" start="3">
<li><p>Protecting Users’ Legal Rights From Anti-Circumvention Law.</p></li>
</ol>
<p>No covered work shall be deemed part of an effective technological</p>
</div></blockquote>
<p>measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.</p>
<blockquote>
<div><p>When you convey a covered work, you waive any legal power to forbid</p>
</div></blockquote>
<p>circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work’s
users, your or third parties’ legal rights to forbid circumvention of
technological measures.</p>
<blockquote>
<div><ol class="arabic simple" start="4">
<li><p>Conveying Verbatim Copies.</p></li>
</ol>
<p>You may convey verbatim copies of the Program’s source code as you</p>
</div></blockquote>
<p>receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.</p>
<blockquote>
<div><p>You may charge any price or no price for each copy that you convey,</p>
</div></blockquote>
<p>and you may offer support or warranty protection for a fee.</p>
<blockquote>
<div><ol class="arabic simple" start="5">
<li><p>Conveying Modified Source Versions.</p></li>
</ol>
<p>You may convey a work based on the Program, or the modifications to</p>
</div></blockquote>
<p>produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:</p>
<blockquote>
<div><blockquote>
<div><p>a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.</p>
<p>b) The work must carry prominent notices stating that it is
released under this License and any conditions added under section
7. This requirement modifies the requirement in section 4 to
“keep intact all notices”.</p>
<p>c) You must license the entire work, as a whole, under this
License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not
invalidate such permission if you have separately received it.</p>
<p>d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.</p>
</div></blockquote>
<p>A compilation of a covered work with other separate and independent</p>
</div></blockquote>
<p>works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
“aggregate” if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation’s users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.</p>
<blockquote>
<div><ol class="arabic simple" start="6">
<li><p>Conveying Non-Source Forms.</p></li>
</ol>
<p>You may convey a covered work in object code form under the terms</p>
</div></blockquote>
<p>of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:</p>
<blockquote>
<div><blockquote>
<div><p>a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the
Corresponding Source fixed on a durable physical medium
customarily used for software interchange.</p>
<p>b) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by a
written offer, valid for at least three years and valid for as
long as you offer spare parts or customer support for that product
model, to give anyone who possesses the object code either (1) a
copy of the Corresponding Source for all the software in the
product that is covered by this License, on a durable physical
medium customarily used for software interchange, for a price no
more than your reasonable cost of physically performing this
conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.</p>
<p>c) Convey individual copies of the object code with a copy of the
written offer to provide the Corresponding Source. This
alternative is allowed only occasionally and noncommercially, and
only if you received the object code with such an offer, in accord
with subsection 6b.</p>
<p>d) Convey the object code by offering access from a designated
place (gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at no
further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source
may be on a different server (operated by you or a third party)
that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the
Corresponding Source, you remain obligated to ensure that it is
available for as long as needed to satisfy these requirements.</p>
<p>e) Convey the object code using peer-to-peer transmission, provided
you inform other peers where the object code and Corresponding
Source of the work are being offered to the general public at no
charge under subsection 6d.</p>
</div></blockquote>
<p>A separable portion of the object code, whose source code is excluded</p>
</div></blockquote>
<p>from the Corresponding Source as a System Library, need not be
included in conveying the object code work.</p>
<blockquote>
<div><p>A “User Product” is either (1) a “consumer product”, which means any</p>
</div></blockquote>
<p>tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular
product received by a particular user, “normally used” refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.</p>
<blockquote>
<div><p>“Installation Information” for a User Product means any methods,</p>
</div></blockquote>
<p>procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.</p>
<blockquote>
<div><p>If you convey an object code work under this section in, or with, or</p>
</div></blockquote>
<p>specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).</p>
<blockquote>
<div><p>The requirement to provide Installation Information does not include a</p>
</div></blockquote>
<p>requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.</p>
<blockquote>
<div><p>Corresponding Source conveyed, and Installation Information provided,</p>
</div></blockquote>
<p>in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.</p>
<blockquote>
<div><ol class="arabic simple" start="7">
<li><p>Additional Terms.</p></li>
</ol>
<p>“Additional permissions” are terms that supplement the terms of this</p>
</div></blockquote>
<p>License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law. If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.</p>
<blockquote>
<div><p>When you convey a copy of a covered work, you may at your option</p>
</div></blockquote>
<p>remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.</p>
<blockquote>
<div><p>Notwithstanding any other provision of this License, for material you</p>
</div></blockquote>
<p>add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:</p>
<blockquote>
<div><blockquote>
<div><p>a) Disclaiming warranty or limiting liability differently from the
terms of sections 15 and 16 of this License; or</p>
<p>b) Requiring preservation of specified reasonable legal notices or
author attributions in that material or in the Appropriate Legal
Notices displayed by works containing it; or</p>
<p>c) Prohibiting misrepresentation of the origin of that material, or
requiring that modified versions of such material be marked in
reasonable ways as different from the original version; or</p>
<p>d) Limiting the use for publicity purposes of names of licensors or
authors of the material; or</p>
<p>e) Declining to grant rights under trademark law for use of some
trade names, trademarks, or service marks; or</p>
<p>f) Requiring indemnification of licensors and authors of that
material by anyone who conveys the material (or modified versions of
it) with contractual assumptions of liability to the recipient, for
any liability that these contractual assumptions directly impose on
those licensors and authors.</p>
</div></blockquote>
<p>All other non-permissive additional terms are considered “further</p>
</div></blockquote>
<p>restrictions” within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term. If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.</p>
<blockquote>
<div><p>If you add terms to a covered work in accord with this section, you</p>
</div></blockquote>
<p>must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.</p>
<blockquote>
<div><p>Additional terms, permissive or non-permissive, may be stated in the</p>
</div></blockquote>
<p>form of a separately written license, or stated as exceptions;
the above requirements apply either way.</p>
<blockquote>
<div><ol class="arabic simple" start="8">
<li><p>Termination.</p></li>
</ol>
<p>You may not propagate or modify a covered work except as expressly</p>
</div></blockquote>
<p>provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).</p>
<blockquote>
<div><p>However, if you cease all violation of this License, then your</p>
</div></blockquote>
<p>license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.</p>
<blockquote>
<div><p>Moreover, your license from a particular copyright holder is</p>
</div></blockquote>
<p>reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.</p>
<blockquote>
<div><p>Termination of your rights under this section does not terminate the</p>
</div></blockquote>
<p>licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.</p>
<blockquote>
<div><ol class="arabic simple" start="9">
<li><p>Acceptance Not Required for Having Copies.</p></li>
</ol>
<p>You are not required to accept this License in order to receive or</p>
</div></blockquote>
<p>run a copy of the Program. Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance. However,
nothing other than this License grants you permission to propagate or
modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.</p>
<blockquote>
<div><ol class="arabic simple" start="10">
<li><p>Automatic Licensing of Downstream Recipients.</p></li>
</ol>
<p>Each time you convey a covered work, the recipient automatically</p>
</div></blockquote>
<p>receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible
for enforcing compliance by third parties with this License.</p>
<blockquote>
<div><p>An “entity transaction” is a transaction transferring control of an</p>
</div></blockquote>
<p>organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party’s predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.</p>
<blockquote>
<div><p>You may not impose any further restrictions on the exercise of the</p>
</div></blockquote>
<p>rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.</p>
<blockquote>
<div><ol class="arabic simple" start="11">
<li><p>Patents.</p></li>
</ol>
<p>A “contributor” is a copyright holder who authorizes use under this</p>
</div></blockquote>
<p>License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor’s “contributor version”.</p>
<blockquote>
<div><p>A contributor’s “essential patent claims” are all patent claims</p>
</div></blockquote>
<p>owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version. For
purposes of this definition, “control” includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.</p>
<blockquote>
<div><p>Each contributor grants you a non-exclusive, worldwide, royalty-free</p>
</div></blockquote>
<p>patent license under the contributor’s essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.</p>
<blockquote>
<div><p>In the following three paragraphs, a “patent license” is any express</p>
</div></blockquote>
<p>agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement). To “grant” such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.</p>
<blockquote>
<div><p>If you convey a covered work, knowingly relying on a patent license,</p>
</div></blockquote>
<p>and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients. “Knowingly relying” means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient’s use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.</p>
<blockquote>
<div><p>If, pursuant to or in connection with a single transaction or</p>
</div></blockquote>
<p>arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.</p>
<blockquote>
<div><p>A patent license is “discriminatory” if it does not include within</p>
</div></blockquote>
<p>the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.</p>
<blockquote>
<div><p>Nothing in this License shall be construed as excluding or limiting</p>
</div></blockquote>
<p>any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.</p>
<blockquote>
<div><ol class="arabic simple" start="12">
<li><p>No Surrender of Others’ Freedom.</p></li>
</ol>
<p>If conditions are imposed on you (whether by court order, agreement or</p>
</div></blockquote>
<p>otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.</p>
<blockquote>
<div><ol class="arabic simple" start="13">
<li><p>Use with the GNU Affero General Public License.</p></li>
</ol>
<p>Notwithstanding any other provision of this License, you have</p>
</div></blockquote>
<p>permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.</p>
<blockquote>
<div><ol class="arabic simple" start="14">
<li><p>Revised Versions of this License.</p></li>
</ol>
<p>The Free Software Foundation may publish revised and/or new versions of</p>
</div></blockquote>
<p>the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.</p>
<blockquote>
<div><p>Each version is given a distinguishing version number. If the</p>
</div></blockquote>
<p>Program specifies that a certain numbered version of the GNU General
Public License “or any later version” applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.</p>
<blockquote>
<div><p>If the Program specifies that a proxy can decide which future</p>
</div></blockquote>
<p>versions of the GNU General Public License can be used, that proxy’s
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.</p>
<blockquote>
<div><p>Later license versions may give you additional or different</p>
</div></blockquote>
<p>permissions. However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.</p>
<blockquote>
<div><ol class="arabic simple" start="15">
<li><p>Disclaimer of Warranty.</p></li>
</ol>
<p>THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY</p>
</div></blockquote>
<p>APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.</p>
<blockquote>
<div><ol class="arabic simple" start="16">
<li><p>Limitation of Liability.</p></li>
</ol>
<p>IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING</p>
</div></blockquote>
<p>WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.</p>
<blockquote>
<div><ol class="arabic simple" start="17">
<li><p>Interpretation of Sections 15 and 16.</p></li>
</ol>
<p>If the disclaimer of warranty and limitation of liability provided</p>
</div></blockquote>
<p>above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.</p>
<blockquote>
<div><blockquote>
<div><blockquote>
<div><p>END OF TERMS AND CONDITIONS</p>
</div></blockquote>
<p>How to Apply These Terms to Your New Programs</p>
</div></blockquote>
<p>If you develop a new program, and you want it to be of the greatest</p>
</div></blockquote>
<p>possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.</p>
<blockquote>
<div><p>To do so, attach the following notices to the program. It is safest</p>
</div></blockquote>
<p>to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the “copyright” line and a pointer to where the full notice is found.</p>
<blockquote>
<div><p><one line to give the program’s name and a brief idea of what it does.>
Copyright (C) <year> <name of author></p>
<p>This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.</p>
<p>This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.</p>
<p>You should have received a copy of the GNU General Public License
along with this program. If not, see <<a class="reference external" href="http://www.gnu.org/licenses/">http://www.gnu.org/licenses/</a>>.</p>
</div></blockquote>
<p>Also add information on how to contact you by electronic and paper mail.</p>
<blockquote>
<div><p>If the program does terminal interaction, make it output a short</p>
</div></blockquote>
<p>notice like this when it starts in an interactive mode:</p>
<blockquote>
<div><p><program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details type <a href="#id1"><span class="problematic" id="id2">`</span></a>show w’.
This is free software, and you are welcome to redistribute it
under certain conditions; type <a href="#id3"><span class="problematic" id="id4">`</span></a>show c’ for details.</p>
</div></blockquote>
<p>The hypothetical commands <a href="#id5"><span class="problematic" id="id6">`</span></a>show w’ and <a href="#id7"><span class="problematic" id="id8">`</span></a>show c’ should show the appropriate
parts of the General Public License. Of course, your program’s commands
might be different; for a GUI interface, you would use an “about box”.</p>
<blockquote>
<div><p>You should also get your employer (if you work as a programmer) or school,</p>
</div></blockquote>
<p>if any, to sign a “copyright disclaimer” for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<<a class="reference external" href="http://www.gnu.org/licenses/">http://www.gnu.org/licenses/</a>>.</p>
<blockquote>
<div><p>The GNU General Public License does not permit incorporating your program</p>
</div></blockquote>
<p>into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License. But first, please read
<<a class="reference external" href="http://www.gnu.org/philosophy/why-not-lgpl.html">http://www.gnu.org/philosophy/why-not-lgpl.html</a>>.</p>
</div>
</div>
</div>
<footer>
<div class="rst-footer-buttons" role="navigation" aria-label="footer navigation">
<a href="attackcti_functions.html" class="btn btn-neutral float-left" title="Library Functions" accesskey="p" rel="prev"><span class="fa fa-arrow-circle-left"></span> Previous</a>
</div>
<hr/>
<div role="contentinfo">
<p>
© Copyright 2019, Roberto Rodriguez @Cyb3rWard0g
</p>
</div>
Built with <a href="http://sphinx-doc.org/">Sphinx</a> using a <a href="https://github.com/rtfd/sphinx_rtd_theme">theme</a> provided by <a href="https://readthedocs.org">Read the Docs</a>.
</footer>
</div>
</div>
</section>
</div>
<script type="text/javascript">
jQuery(function () {
SphinxRtdTheme.Navigation.enable(true);
});
</script>
</body>
</html> | 2024-01-27T01:26:19.665474 | https://example.com/article/7249 |
[Intracardiac operations performed in beating heart through mini-thoracotomy in 34 patients].
To introduce the technique of intracardiac operations performed in beating heart through mini-thoracotomy. >From March 1995 to June 1997, intracardiac operations were performed in beating heart through right subaxillary anterolateral mini-thoracotomy with normothermic extracorporeal circulation in 34 patients. 16 patients had atrial septal defect, 14 ventricular septal defect, 2 mitral insufficiency, 1 right coronary artery-right ventricular fistula, and 1 Ebstein's anomaly. The mean cardiopulmonary bypass time was 22.54 minutes. There were no embolism, arrhythmia and cerebral complications. Postoperative hospital stay was 8.0 +/- 2.2 days. All the patients had no heart murmur and residual shunt, and enjoyed a full range of physical activities in a follow-up of 2 to 26 months. Intracardiac operations performed in beating heart through right subaxillary anterolateral mini-thoracotomy appears to be less invasive, simple, safe and cosmetic. | 2024-07-16T01:26:19.665474 | https://example.com/article/7514 |
# NOTE: Assertions have been autogenerated by utils/update_mca_test_checks.py
# RUN: llvm-mca -mtriple=x86_64-unknown-unknown -mcpu=btver2 -iterations=100 < %s | FileCheck %s
add %edi, %eax
# CHECK: Iterations: 100
# CHECK-NEXT: Instructions: 100
# CHECK-NEXT: Total Cycles: 103
# CHECK-NEXT: Total uOps: 100
# CHECK: Dispatch Width: 2
# CHECK-NEXT: uOps Per Cycle: 0.97
# CHECK-NEXT: IPC: 0.97
# CHECK-NEXT: Block RThroughput: 0.5
# CHECK: Instruction Info:
# CHECK-NEXT: [1]: #uOps
# CHECK-NEXT: [2]: Latency
# CHECK-NEXT: [3]: RThroughput
# CHECK-NEXT: [4]: MayLoad
# CHECK-NEXT: [5]: MayStore
# CHECK-NEXT: [6]: HasSideEffects (U)
# CHECK: [1] [2] [3] [4] [5] [6] Instructions:
# CHECK-NEXT: 1 1 0.50 addl %edi, %eax
# CHECK: Resources:
# CHECK-NEXT: [0] - JALU0
# CHECK-NEXT: [1] - JALU1
# CHECK-NEXT: [2] - JDiv
# CHECK-NEXT: [3] - JFPA
# CHECK-NEXT: [4] - JFPM
# CHECK-NEXT: [5] - JFPU0
# CHECK-NEXT: [6] - JFPU1
# CHECK-NEXT: [7] - JLAGU
# CHECK-NEXT: [8] - JMul
# CHECK-NEXT: [9] - JSAGU
# CHECK-NEXT: [10] - JSTC
# CHECK-NEXT: [11] - JVALU0
# CHECK-NEXT: [12] - JVALU1
# CHECK-NEXT: [13] - JVIMUL
# CHECK: Resource pressure per iteration:
# CHECK-NEXT: [0] [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]
# CHECK-NEXT: 0.50 0.50 - - - - - - - - - - - -
# CHECK: Resource pressure by instruction:
# CHECK-NEXT: [0] [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Instructions:
# CHECK-NEXT: 0.50 0.50 - - - - - - - - - - - - addl %edi, %eax
| 2023-09-28T01:26:19.665474 | https://example.com/article/4321 |
Q:
Spotfire Text to Integer for Dates
I am attempting to load time series data from an excel spreadsheet into spotfire. In my spreadsheet there is a separate column for year (spotfire sees it as an integer) and month (spotfire sees it as text) since it is in the three letter abbreviation format ie January is JAN. I am trying to avoid changing the data in excel and would like to do all of my work in spotfire as this will be updated periodically. How do I link these columns in spotfire so that I can plot a variable over a time frame?
A:
Click Insert > Insert Calculated Column... Make sure you have the right data table selected. In the Expression field type:
Date([year],
case when [month]="JAN" then 1
when [month]="FEB" then 2
when [month]="MAR" then 3
when [month]="APR" then 4
when [month]="MAY" then 5
when [month]="JUN" then 6
when [month]="JUL" then 7
when [month]="AUG" then 8
when [month]="SEP" then 9
when [month]="OCT" then 10
when [month]="NOV" then 11
when [month]="DEC" then 12 end,
1)
I would name it something like "monthdate". Note that each date will have the day equal to 1. If you also have the day in your data, just put that column in the formula above instead of the last 1.
| 2023-08-03T01:26:19.665474 | https://example.com/article/2219 |
/**
* Copyright (c) 2013 SUSE LLC
*
* This software is licensed to you under the GNU General Public License,
* version 2 (GPLv2). There is NO WARRANTY for this software, express or
* implied, including the implied warranties of MERCHANTABILITY or FITNESS
* FOR A PARTICULAR PURPOSE. You should have received a copy of GPLv2
* along with this software; if not, see
* http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
*
* Red Hat trademarks are not licensed under GPLv2. No permission is
* granted to use or replicate Red Hat trademarks that are incorporated
* in this software or its documentation.
*/
package com.redhat.rhn.manager.audit;
/**
* Class encapsulating a channel's id, name and label.
*
* @version $Rev$
*/
public class ChannelIdNameLabelTriple {
private long id;
private String name;
private String label;
/**
* Constructor.
*
* @param idIn the channel id
* @param nameIn the channel name
* @param labelIn the channel label
*/
public ChannelIdNameLabelTriple(long idIn, String nameIn, String labelIn) {
super();
this.id = idIn;
this.name = nameIn;
this.label = labelIn;
}
/**
* Return the channel Id.
*
* @return the id
*/
public long getId() {
return id;
}
/**
* Set the channel Id.
*
* @param idIn the id to set
*/
public void setId(long idIn) {
this.id = idIn;
}
/**
* Return the channel name.
*
* @return the name
*/
public String getName() {
return name;
}
/**
* Set the channel name.
*
* @param nameIn the name to set
*/
public void setName(String nameIn) {
this.name = nameIn;
}
/**
* Return the channel label.
*
* @return the label
*/
public String getLabel() {
return label;
}
/**
* Set the channel label.
*
* @param labelIn the name to set
*/
public void setLabel(String labelIn) {
this.label = labelIn;
}
/**
* @return a hash code value for this object.
* @see java.lang.Object#hashCode()
*/
@Override
public int hashCode() {
final int prime = 31;
int result = 1;
result = prime * result + (int) (id ^ (id >>> 32));
return result;
}
/**
* @param obj the reference object with which to compare.
* @return {@code true} if this object is the same as the obj
* argument; {@code false} otherwise.
* @see java.lang.Object#equals(java.lang.Object)
*/
@Override
public boolean equals(Object obj) {
if (this == obj) {
return true;
}
if (obj == null) {
return false;
}
if (getClass() != obj.getClass()) {
return false;
}
ChannelIdNameLabelTriple other = (ChannelIdNameLabelTriple) obj;
if (id != other.id) {
return false;
}
return true;
}
}
| 2023-12-10T01:26:19.665474 | https://example.com/article/3039 |
Image copyright AFP Image caption More than 130 grey seals were killed by salmon farms over the two-year period
New figures have revealed, for the first time, which individual salmon farms have shot seals.
The Scottish Information Commissioner ordered the Scottish government to release data to campaigners.
Producers of farmed salmon are issued with licences which allow seals to be shot to protect fish stocks.
There were 176 seals killed in the past two years - 95 in 2013 and 81 last year - but the numbers shot have declined steadily since 2011.
The Scottish government publishes headline figures online regarding licences and shootings on a quarterly basis.
But campaigners have long argued detailed information about the number of seals being shot should be published, to enable consumers to make informed choices about whether or not to buy farmed salmon.
Ministers said fish farm staff, and their families, could receive threats if the information was released.
Image copyright SPL Image caption Salmon farms say the need to defend the fish from the seal predators
The Information Commissioner did not accept that disclosing the information would represent a substantial threat to public safety and ordered its release last month.
The newly-released figures have a level of detail which reveals for the first time exactly which salmon farms shot seals to protect their stock.
The majority of seals were shot at farms owned by Scottish Sea Farms (58), Hjaltland Sea Farms (38) and The Scottish Salmon Company (23) during the two-year period.
However, the number of seals shot at Hjaltland Sea Farms reduced drastically from 32 to six between 2013 and 2014.
Its location at Lax Firth on Shetland killed 24 seals over the two years.
Image copyright SPL Image caption The number of Harbour or Common seals shot has risen
A spokesman for Hjaltland told BBC Scotland: "Seals attack our cages, killing and damaging salmon and tearing nets which may end in salmon escaping."
He said the company lost £3m of salmon due to seal attacks in 2013 and 2014.
The massive reduction in shooting was because the worst-affected sites had been equipped with "predator nets", he said.
"Where we installed predator nets or the new net types, seal attacks and seal losses stopped," the spokesman said.
A spokeswoman from The Scottish Salmon Company, which shot 23 seals, said: "We operate more than 40 marine sites around the west coast of Scotland and the Outer Hebrides and, in line with industry best practice, we apply rigorous measures to exclude and deter persistent predator attacks.
"The action highlighted was taken as a last resort under a government licence over a two-year period, when rogue seals persistently interfered with the integrity of the nets.
"We have implemented an investment programme for farm infrastructure which includes nets, acoustic devices, and mooring replacement to ensure seals do not cause stress to or damage our fish."
Scottish Sea Farms, which killed the most seals, did not respond to the BBC's requests for comment.
Each year the Sea Mammal Research Unit at the University of St Andrews calculates the number of individual seals that can be removed from the population without causing a decline in the population.
This number - known as the Potential Biological Removal (PBR) - is then used to determine how many licences may be issued each year, and how many seals may be legally shot.
The number of grey seals killed declined from 79 in 2013 to 56 last year but there was a slight increase in the killing of the more rare "common" seal (16 to 25).
However, both these totals were below the PBR limits for grey and common seals (3,002 and 617 respectively) for 2014.
'Gory details'
Don Staniford, of the Global Alliance Against Industrial Aquaculture, has been the man behind pursuing the freedom of information requests.
He said: "Scottish salmon is dripping with the blood of dozens of seals."
Mr Staniford said thanks to information commissioner the public could now read "the gory details".
He added: "Salmon farmers may be armed with guns but the public has an even more powerful weapon - Freedom of Information.
"The process of naming and shaming has forced the industry to reduce the killing of seals. People-power can eventually force a complete ceasefire and bring the figures down to zero."
A Scottish government spokeswoman said: "The level of seal shooting has reduced by 56% overall between 2011 and 2014 and in fish farms specifically has reduced by 66% in the same period.
"All fish farms which have applied for a seal licence already employ at least one, and many a range of, non-lethal alternatives, with shooting to be used only as a last resort.
"There are a range of views on the effectiveness of the various non-lethal measures and none have, to-date, entirely eliminated the risk of seal predation.
"There are also restrictions on the use of some non-lethal measures, including anti-predator nets and acoustic deterrents, as a result of their potential impact on other marine species." | 2024-06-19T01:26:19.665474 | https://example.com/article/9613 |
Login
This is the official site of the AMSPAR (accredited training centre with City and Guilds) for use by Students of AMSPAR certificate and diploma level 5 CQF courses and approved AMSPAR primary care courses
AMSPAR TWEETS
Health News
Issued at 8.41am on Monday 21 January 2019 There is a 90 per cent probability of severe cold weather, icy conditions and mostly hill snow between 9.00am on Monday 21 January and 9.00am on Friday 25 January in parts of England. This weather could increase the health risks to vulnerable patients and disrupt the delivery […]
Superdrug will introduce new mental health checks for customers who want to undergo cosmetic procedures, after England’s top doctor called on the beauty chain and other providers to do more to protect people against body image pressures. NHS medical director Professor Stephen Powis wrote to Superdrug raising concerns after the company announced it would be […] | 2024-03-17T01:26:19.665474 | https://example.com/article/7402 |
5% Dining Rewards
**Delivery date is approximate and not guaranteed. Estimates include processing and shipping times, and are only available in US (excluding APO/FPO and PO Box addresses). Final shipping costs are available at checkout.
This rug is tightly woven medium pile; not too low and not shag...just right. The starbursts are slightly coarse, thick satin like material. It unrolled and flattened out nicely and almost immediately. It definitely makes a statement. It is a bit fuzzy but probably not something a dozen vacuumings can't help..... Update --- It was returned because although it is lovely, I was disappointed to schedule a return due to the unmanageable shedding and vacuum clogging.
Most Helpful
The coolest rug -
Verified Purchase
This rug is beautiful - plush, thick, great neutral colors that work for many decors (if you move a lot like we do this is important) but has a lot of OOMPH! It looks fabulous under my table and really defines the space. Amazing quality and enough design to be an eyecatcher.
This is the type of purchase that will bring us back to Overstock again and again. Thanks!
When I first got this carpet, it looked great. But after vacuuming it a few times, the ribbons that make up the star-burst pattern began to fray. Now, a year later, it looks pretty shabby and I am looking for a new carpet to replace it a lot sooner than planned.
Purchased rug last week - received it superfast (3 days) - to complete my finished livingroom project. Wow, Wow and Wow. This rug has the most interesting pattern I've seen. The bursts are raised and arranged beautifully on top the rug. The base color is a soft beige and the bursts are chocolate, beige and very pale olive. One word....Beautiful. It has taken my livingroom to the next level. Even hubby loves it (although he barked at me when he saw it being delivered. lol) Now seeing down on the floor, he wants to order another for the diningroom!
Now for one con, and small price to pay: It does shed. It's noticeable on my floors because they are cherry hardwood, it's a fine pile shed and I have swept several times and am trying to vacuum the excess. It will diminish as time goes on. With that being said, I love this rug and am willing to sweep and vacuum up after it. Buy it and you will not be disappointed. Enjoy
Rug is stunning in room, every guest has positive comments. With this one you must with the silk loops in the star design use a canister vacuum when cleaning. I think a regular beater vacuum might tear up the design. It feels wonderful on your bear feet! It's been under our couch for 1.5 years now with everyday usuage and looks like the day I put it down! Overstock has the best prices on this rug.
This is one beautiful rug! Like other reviewers, I found it to be even prettier on arrival than I had from the photos. However, it sheds like crazy. Shine a little sunlight on the surrounding hardwood floor, and you'll find a sea of fibers. Sit on it with dark pants, and you're covered in the resulting lint. I really wanted to like this rug. It might be a better bet for that "just for show" living room that doesn't get used, if that room has light-colored wall to wall carpet, where the shedding fibers won't show.
Questions & Answers
"I keep reading that this rug sheds like crazy. I want to put it in my dining room which has little traffic and no one sitting on it or walking on it daily. Do you think it will not shed terribly do to little or no traffic. Or does it shed on its own lol. Also on the beige color - is it a light beige as looks in the photo or one of those dark pinkish beiges?"
Please keep in mind that new wool rugs may initially shed and have a natural capacity to shed for several months after purchase. This is normal due to the nature of construction of most wool rugs and not a defect. The rug background is a beige tone.
we love this rug, it is beautiful, modern, unique. this is the third time we order the same rug and hopefully in the future we can still find the same.
Aug 27, 2015
A:
Color and unique look
Judy K.
Oct 20, 2016
A:
I previously punched this rug from you in a 9'6 x 13'6 size & loved it. We have recently moved & that size won't work in our new home. As I said, I loved it so...... I purchased not one, but two in the sizes that will work. I was so happy to see that you still had the rug & in the new sizes I needed.
Sally F.
Oct 24, 2016
A:
I wanted beige but not plain and this has a design in it that is pretty neat. I hope it is that nice when I get. This is my first purschase with Overstock.
Shopping Tips & Inspiration
Best Area Rug Styles to Try in Your Home
Check out this list of the top 10 most popular area rug styles to help take your home decor to the next level.
How to Protect Wood Floors with Area Rugs
The easiest way to protect wood floors from scratches and other damage is to decorate them with an area rug. Area rugs provide a protective barrier against furniture legs, foot traffic, and pets while adding style to any floor in the house.
Living Room Ideas
Get inspired by the hottest trends in living room furniture and decor. Shop our huge selection of living room furniture and decor at Overstock.com.
The Complete Rug Buying Guide
When furnishing your home, a rug can really bring your whole look together, no matter what your design. We'll help you find an area rug that’s right for you.
NOTE:
For your protection, all orders are screened for security purposes. If your order is selected for review, our Loss Prevention Team may contact you by phone or email. There may be a two business day delay to process your order.
** Most Oversize orders are delivered within 1-4 weeks. Some orders may take 6 weeks to be
delivered.
Shop Overstock.com and find the best online deals on everything for your home. We work every day to bring you discounts on new products across our entire store. Whether you're looking for memorable gifts or everyday essentials, you can buy them here for less.
Eziba® | Shop Eziba.com®
O.com®
Over half a million prices checked each week. Overstock.com strives to deliver the lowest prices and the biggest savings on all the products you need for your home. | 2023-08-09T01:26:19.665474 | https://example.com/article/1099 |
With injuries to forwards Max Pacioretty, Daniel Briere and Brandon Prust, the Montreal Canadiens were forced to dig into the farm system and call up two players from the Hamilton Bulldogs, recalling Mike Blunden and Patrick Holland on Monday.
Now while Blunden is somewhat known to Habs fans, having been on a yo-yo between the NHL and AHL on numerous occasions for the last three years, Holland is unknown to those who do not follow prospects closely. Holland was a seventh round pick of the Calgary Flames, who was included in the trade between Montreal and Calgary two years ago that was built around the Mike Cammalleri – Rene Bourque swap. While Holland was a 7th round pick, he progressed nicely after his draft year being a top scorer in his last two years in the WHL, and finishing fourth in team scoring as a 20-year-old rookie for the Hamilton Bulldogs last season
Holland is a slick player capable of playing all three forward positions. He is best known for his high skill level including good skating, and is especially strong as a playmaker. He also has a decent shot and can score if given the opportunity. Overall though, it is his creativity that has gotten him to the level he is at, playing pro hockey in the AHL and now called up for his first NHL game.
Given that resume, it would have appeared that the recall of Holland was an attempt to add some extra offence into the Habs lineup on Tuesday, due to the fact that three forwards who normally play in the team’s top nine were on the shelf. So what happened? Coach Michel Therrien played Holland on the fourth line alongside Ryan White and Blunden.
And here is where I take issue: in his first NHL game, Patrick Holland was given a role he couldn’t possibly have succeeded in. This line is a complete mismatch for a player of Holland’s capabilities. While I understand that White and Blunden have a place in the current lineup, here are two players who are being tasked with playing the “energy line” role. To play a physical game, and to not be defensive liabilities. They are not goal scorers, and this can be seen in their combined 7 goals in 192 career NHL games. Playing a slick playmaker with two guys who aren’t known for their ability to finish chances isn’t exactly maximizing his utility.
Meanwhile, a player who would fit that energy line role like a glove, Travis Moen, was used on the third line with goal scorer Rene Bourque and pint-sized playmaker David Desharnais. Yes, I know that Bourque and Desharnais are struggling right now, but even so, they are still more likely to be able to hook up with a player like Holland than White and Blunden would be able to do. Meanwhile, Moen would give White’s line the physical and defensive presence to play the role that they are being asked to do.
In his usage of these two players, Michel Therrien handicapped both his third and fourth lines tonight by putting a player on each of them who just didn’t fit the concept of what those lines should try to accomplish. He also took a rookie playing his first NHL game, called up for his offensive flair and asked him to play a role that he just isn’t suited for.
In this way, Therrien must take some responsibility for mismanaging his assets on Tuesday night and going forward. If young players are going to succeed and become productive NHLers, they must be put in positions where they can continue to use the strengths that have earned them a call-up to the NHL and not miscast in the wrong role. Anything else is cheating the player, but above all else is also cheating the team.
And that’s the last word….
Thanks for reading. Please give our Hockey Department a follow on Twitter – @lastwordBKerr, @TheHockeyMitch, @LastWordBigMick, @crimsonskorpion, @CMS_74_, @TwoTurtleDuffs, @dasimonetta, @ddmatthews, @evan_lacey, @thetq21, @CanuckPuckHead, @NKonarowski2, @LarryScotti, @jaynichols11, @meaghannn_, @LastWordOnNHL, @darrinharmy @PurpleRoktober and follow the site @lastwordonsport and like our Facebook Page.
Interested in writing for LastWordOnSports? If so, check out our “Join Our Team” page to find out how. | 2023-08-01T01:26:19.665474 | https://example.com/article/3529 |
This project will complete the identification and immunogenicity analyses of all proteins encoded by the Mycobacterium tuberculosis (Mtb) genome, yielding a pool of protective antigens that will immediately enter development as subunit vaccines for tuberculosis. In our prior SBIR Phase I grant (R43 AI053636-01), we developed a platform technology for high throughput, proteome-based identification of antigens that have a high probability of inducing protective cellular immunity when formulated and administered as a vaccine. The high throughput process that was developed combines efficient gene amplification and protein expression methods with serum- and splenocyte-based assays to determine the level of antibody- and T-cell specific reactivity against each individualprotein. Using funding provided by our Phase I award, and in collaboration with recognized Mtb vaccine leaders, we have validated this proprietary antigen discovery system, and have successfully completed immunogenicity analysis of 384 genes (approximately 10%) of the Mtb genome. We now seek support to apply this process to the remaining approximately 90% of the Mtb genome to generate a portfolio of candidate antigens for use in vaccine (and diagnostics where appropriate) development, and to complete initial development, production and pre-clinical testing of tuberculosis vaccine candidates based on the identified antigens by our collaborators at Aeras Global TB Vaccine Foundation. Central to our rapid antigen discovery process is our patented gene amplification technology, called Transciptionally Active PCR (TAPR), a cloning-free method developed under a Phase I SBIR grant (R43 AI47641-01) that generates transcriptionally active PCR fragments that can 1) be used to express proteins in cultured cells, 2) be used to directly vaccinate animals (genetic vaccination), and 3) serve as templates to direct cell-free in vitro transcription and translation reactions that yield large amounts of proteins for use in immunoassays. Because it is cloning-free, TAP is a powerful tool for rapid synthesis and amplification of both genomes and the corresponding proteomes, and coupled with B- and T-cell immunoassays serve as a high-throughput antigen discovery platform called Vaccinomics(TM/SM). To date, Vaccinomics(TM/SM) has been used to rapidly amplify, express, and analyze the immunogenicity of approximately 10% of the Mtb proteome. We now propose to complete this process for the entire Mtb proteome by 1) applying bioinformatic analyses to predict the immunogenicity of each open reading frame (ORF) and rank the genome accordingly, then 2) synthesizing and purifying the proteins to create protein arrays for subsequent immunological screening using material from Mtb-infected mice, guinea pigs, and human TB patients to select vaccine antigen candidates: Vaccine candidates identified by the T cell assays will be systematically evaluated for their immunogenicity and protective immunity in animal models including Mtb-infected mice and guinea pigs. First, C57BL/6 mice will be immunized by vaccine candidates to examine their immunogenicity. Second, the antigens will be further examined for their protective immunity against aerosol TB infection of mice. The leading vaccine candidates identified in mouse studies will be further examined in the more stringent guinea pig model with a prime and boost strategy, and the protective efficacy is directly compared to that of Bacillus Calmette Guerin (BCG). Finally, a selected number of highly promising vaccine candidates will be expressed by recombinant BCG vectors and tested for their protective immunity in guinea pigs under conditions in compliance with clinical study requirements. Based on these studies, promising candidate vaccines will enter advanced development at Aeras in anticipation of expedited clinical testing. We also suggest that this approach will likely be useful for the development of rational vaccines and diagnostics against other naturally emerging and genetically engineered organisms, and may also be particularly useful when rapid responses to novel infectious diseases (ID) and drug-resistant IDs including TB are required. [unreadable] [unreadable] | 2023-12-02T01:26:19.665474 | https://example.com/article/9666 |
is the closest to 1? (a) 1 (b) h (c) 1/4
a
Let g = 3 - -2. Suppose -2*o + 12 = h, 3*o - 19 = -3*h + 5. Let c be ((-6)/24)/((-3)/h). What is the nearest to c in -3, 0.4, g?
0.4
Let g = -29 - -32. Let f be -1 - (30/4)/(-5). Which is the closest to -2/7? (a) -0.2 (b) g (c) f
a
Let o = 61/2 - 30. Let k = 2950/11 + -268. Which is the closest to 0.2? (a) 2 (b) k (c) o
b
Let i = -20 + 19.7. Which is the nearest to 0.01? (a) 1/3 (b) i (c) -0.1
c
Let o = 15 + -11. Let s = 64 + -67. What is the closest to s in o, 0.2, -0.3?
-0.3
Let l = 4 - 4. Let t = l - 0. What is the closest to t in 1/9, 1, 5?
1/9
Let p = -0.13 - -1.13. What is the nearest to 0.1 in 3/4, -2, p?
3/4
Let v be (1 + (-3)/9)*9/(-15). What is the closest to 3/5 in v, 0.2, -6?
0.2
Let w = 53 + -49. Which is the nearest to 1? (a) -5 (b) -0.3 (c) w
b
Let b = -19 + 75/4. Let d = -5.6 - -6. Let m be 26*(-2)/(-12) + -4. What is the nearest to b in d, 5, m?
m
Let p = -2 + 2.1. Suppose -2*t + 5*z = 3*z - 16, -5*t + 3*z = -46. Let v = 7 - t. Which is the closest to 0? (a) v (b) p (c) 1
b
Let d = -0.3 + 0.3. Let c = -42 - -47. What is the closest to d in -4, -2/11, c?
-2/11
Suppose -40 = 4*k + b, -3*k + 2*b - 30 = b. Let o be ((-2)/k)/(8/10). Let g = -0.2 - 0. What is the nearest to g in 2/3, o, 0.5?
o
Let z = 18 - 12. What is the nearest to -0.1 in -1, z, 1/9?
1/9
Let q be (8/32)/((-30)/16). Let u = 68 - 338/5. What is the nearest to 0 in 2/3, u, q?
q
Let d = 45 - 46. What is the closest to d in -5/7, 1/3, -1?
-1
Let i be (-8 + 6)/(2 - 1). Let w = -569 - -27365/48. Let p = 7/16 - w. Which is the nearest to p? (a) i (b) 4 (c) 2/9
c
Let x = -1 - -1. Let c = 0 - 0. Let y = c + 4. What is the closest to x in 3/8, y, 1?
3/8
Let p = -0.04 - 6.96. Let d = -5 - p. Which is the closest to 0.1? (a) -2 (b) -3 (c) d
c
Let q = 28 - 113/4. Let p = -8/7 - -12/7. Which is the nearest to q? (a) 4 (b) p (c) -2
b
Let j = -1.922 + -0.078. Which is the closest to 0.3? (a) 0 (b) 0.5 (c) j
b
Let f = -0.1 + 0.3. Let z = -1.2 + f. Let h = 2 - 1. Which is the closest to 2/7? (a) z (b) 0.3 (c) h
b
Let b = 17 - 12. Let t = b + -6. Let q = 6 + -5.9. What is the nearest to t in q, 2, 1/7?
q
Let x = 0.3 - 0.2. Suppose 0 = -2*f - 5*v + 25, v - 3 = -3*f + 2. Suppose f = -j - 3 + 2. Which is the closest to x? (a) j (b) 3/8 (c) 5
b
Let z = -0.8 + 4.8. Let t = 4 - z. Let s be 10/(-12)*(-6)/4. Which is the nearest to t? (a) -2 (b) s (c) -1
c
Let f = 154 - 153.9. Which is the closest to 0? (a) 2/3 (b) -1/2 (c) f
c
Let y = 17 + -17. Let w = 9 - 5. What is the closest to y in 3/4, -2/7, w?
-2/7
Suppose 0 = -5*y + 39 - 19. Which is the nearest to -5? (a) y (b) 0.4 (c) 1/5
c
Let n be (-3 - -4)/((-1)/(-9)). Suppose 3*k - 2*k - 4 = 2*x, 5*k = -x + n. Which is the nearest to x? (a) 4 (b) -2 (c) -0.1
c
Let f = 0.26 + 0.04. Let q = 0.7 - f. What is the closest to -1 in -5, q, -2?
-2
Let s(o) = o**3 + 7*o**2 - 3. Let v be s(-7). Let x be 4/(-10) - (-4)/35. Let c be 2/7 + (-8)/14. What is the closest to x in v, c, 0.1?
c
Let t = 3.8 + 0.2. Let n be (-2)/9 + 33/27. Which is the nearest to 1? (a) 2/13 (b) t (c) n
c
Let n = 8 + -12. Let z = 0.1 - 0. Let f = z - 0.2. Which is the closest to f? (a) n (b) -0.5 (c) 0
c
Suppose -8*g + 9*g = -2. What is the closest to 0 in -3, g, 1?
1
Let v = -16 + 15.6. Let l = v + 0.32. Which is the closest to 0.1? (a) -3 (b) 5 (c) l
c
Let o = -0.414 + -0.086. Which is the closest to -0.2? (a) 3 (b) -5 (c) o
c
Let l = -17.6 + 18. Let y = -3.4 + 3. Which is the closest to -0.1? (a) y (b) 2/9 (c) l
a
Suppose q + 2 - 4 = -3*t, -5*t + q + 14 = 0. Suppose 0*p = t*p + 4*l - 10, 3*l = 0. What is the closest to -1/4 in -0.3, p, 2/9?
-0.3
Let w = -5 + 7. Let s = -2/103 + -93/515. Suppose 0*x = x - 4. Which is the closest to 0? (a) w (b) x (c) s
c
Let s be ((4/14)/(-1))/1. Let i = -86.5 + 87. Which is the closest to -0.1? (a) s (b) i (c) 1/9
a
Let y be 1 + 0 + -4 + 2. Let u = 4 - 3.6. What is the nearest to y in -0.4, 0.5, u?
-0.4
Let f = 8 + -15. Let t = f - -2. Let s = -2.1 - -2. Which is the closest to s? (a) t (b) 3 (c) 0.1
c
Suppose a + 6 = -2*a. Let p be 2*(a - (-5)/3). Let t = 93.1 + -93. What is the closest to p in -3, t, 1/5?
t
Let p = 0.1 + 0.9. Let r = -2 - -4. Let y = -12 - -10. What is the nearest to p in -1, r, y?
r
Let w = -83 - -87. What is the nearest to -1/3 in 0.01, 2, w?
0.01
Suppose -4 = -4*w, 2*c + 4*w - 5 = 3. Let u = 5 + -5.05. Let a = u + -3.95. What is the closest to c in a, 5, -0.5?
-0.5
Let d = -2.5 + 0.5. Suppose -2*t = -4*t + 16. Let o be 4/(-6)*t/16. What is the closest to -1 in d, 0.1, o?
o
Suppose u + 4*u = 0. Let x = -0.43 + 0.03. What is the nearest to u in x, -2/11, 3?
-2/11
Let z(c) = -c**3 - c**2 - c + 1. Let w be z(0). Let q = 5.4 + -5. Let n = -0.07 + -0.93. What is the nearest to n in q, 1/7, w?
1/7
Let l be (-1)/(-5) + (-54)/(-30). Suppose w - 4*g = 22, l*g + 16 = 3*w - 0*w. Which is the closest to -1? (a) w (b) 4 (c) 3/5
c
Let d = 15.2 + -15. Let u = -4 - -3. What is the closest to u in d, -2/7, -1/6?
-2/7
Let v = -5 + 3. Let m be (4 + 2)*2/3. What is the closest to v in -1/2, m, 0?
-1/2
Let u(x) = x**2 - 14*x - 4. Let l be u(14). Which is the nearest to -1? (a) -0.3 (b) l (c) -2
a
Let l(d) = -d**3 - 13*d**2 - 6. Let n be l(-13). Let r be ((-3)/(-45))/(n/(-15)). What is the nearest to 0.3 in r, -3, -1?
r
Let x be -9*35/(-84) - 2/(-8). What is the closest to 1 in 0.1, 0, x?
0.1
Suppose 2*m - o = 5, 0*m - 2*m + 2*o + 4 = 0. Which is the closest to 1? (a) -5 (b) 5 (c) m
c
Let x = -1.2 + 10.2. Let j = -9.1 + x. Which is the nearest to j? (a) -1 (b) 2/13 (c) -5
b
Suppose -4*i + 0*s = -5*s + 3, -2*i = 4*s - 18. Let r be 0 - i - (-14)/5. Which is the closest to 0? (a) 2/13 (b) -0.5 (c) r
a
Let r = -0.14 + 0.24. Which is the closest to -2? (a) 4 (b) r (c) -4
c
Let q = -0.37 + 0.7. Let n = 0.13 - q. What is the closest to 0 in n, 4, 3/2?
n
Let z(y) = -4*y**2 - 3*y - 1. Let s be z(-2). Let q = s + 6. Which is the closest to -2? (a) q (b) -2 (c) -0.3
b
Suppose x + 4*u = 0, 1 = -x + 2*u - 5*u. Let g be (x - -2 - -5) + 1. Which is the nearest to 2? (a) g (b) -3 (c) -0.5
a
Let n = 2 + 2. Let j = -38/35 + 9/7. Which is the closest to -2/3? (a) n (b) j (c) 1
b
Let c = -69 + 85. What is the nearest to -1 in c, 5, -2/9?
-2/9
Let q(p) = p**3 + 8*p**2 + 9*p + 15. Let x be q(-7). Let t = 7 - 5. Which is the nearest to -2? (a) t (b) 0.5 (c) x
b
Suppose 9*h - 8*h = 5. Which is the closest to 1? (a) -0.5 (b) h (c) 0.6
c
Let w = -4 - -4.5. What is the closest to 1 in -7, w, -2?
w
Let a be 4/(-20) + (-6)/70. Let w = -7.1 + 1.1. Let z = w + 11. What is the closest to 0 in 0.4, a, z?
a
Let d = 49/60 + -3/20. What is the closest to 0 in -4, 1, d?
d
Let h = 7.1 - 7. Let q = 0 + h. What is the nearest to 0.1 in q, -0.3, 2?
q
Let h = -0.04 + 13.04. Let d = h - 13. Which is the nearest to d? (a) 5 (b) 1/4 (c) -6
b
Let v = 23 - 22.98. Which is the closest to v? (a) 4/7 (b) 3/4 (c) 0
c
Let o = 1/6 - -1/12. Which is the nearest to 2? (a) o (b) -3 (c) -0.1
a
Let a = -16 - -31. Suppose 4*r + a = -o, o - 4*o - r - 12 = 0. What is the nearest to 1 in -0.5, o, -1?
-0.5
Let l = -9.6 - -9.5. Which is the nearest to 0? (a) 0 (b) l (c) 2
a
Let q be (-3)/2*(-56)/(-378). What is the closest to -3/4 in 0.1, 2/7, q?
q
Let v = 1.9 - 13.9. Let m = -7 - v. Suppose 3 = 3*h - 0*h. Which is the closest to h? (a) -0.1 (b) m (c) -4
a
Suppose 2*p - 2 - 4 = 0. Let r be 22/(-18) + 16/72. Let k be (-15)/6 + r/2. What is the closest to p in -2, k, 0?
0
Let v = 3.06 + -0.06. What is the nearest to 0 in 0, -0.4, v?
0
Let b be (-38)/(-8) + 5 + -9. What is the closest to 0 in b, 2/3, 1?
2/3
Let c = -2 + 3. Let q = 32 + -32.1. What is the closest to q in c, -0.5, -4?
-0.5
Suppose -2*x - 2*w = 2, -3*x = -6*x + w + 1. Let l = 11.5 - 12. Let j = -0.03 - -4.03. What is the closest to x in l, 2/5, j?
2/5
Let j be -1*(-1)/((-6)/(-4)). Let b = 0.17 + 0.03. Let u = b - -0.1. What is the nearest to j in u, 0, 0.1?
u
Let n = 7.4 - -2.6. Let i = n - 7. Let q = -6.4 + 6. Which is the nearest to -0.1? (a) q (b) i (c) -3/4
a
Let s be -3 - 1 - 50/(-14). Let j = 0.4 + -0.3. Which is the closest to j? (a) -3 (b) s (c) 2
b
Let u be (9 - 10) | 2023-09-24T01:26:19.665474 | https://example.com/article/8654 |
Q:
swift mailer shows fatal error, connection refused
i am trying to use swift mailer to send emails with mandrill API. I was working on a server and it worked great. Then when i changed to another server and it shows this: Fatal error: Uncaught exception 'Swift_TransportException' with message 'Connection could not be established with host smtp.mandrillapp.com [Connection refused #111]'
can anyone help?
A:
This is typically a result of your hosting provider blocking the port being used or blocking external SMTP connections. You'll likely want to get in touch with the host for the new server you're working with since many shared hosting providers limit or prohibit the use of certain ports or external services.
| 2024-05-17T01:26:19.665474 | https://example.com/article/4085 |
Qualitative and quantitative documentation of the racing performance of 461 Thoroughbred racehorses after arthroscopic removal of dorsoproximal first phalanx osteochondral fractures (1986-1995).
The purpose of this study was to examine the longevity of postoperative careers and quality of performance of 461 Thoroughbred racehorses after arthroscopic removal of dorsoproximal first phalanx (P1) osteochondral fractures. Six hundred and 59 dorsoproximal P1 chip fractures were removed arthroscopically from 574 joints in 461 horses presented for lameness or decreased performance attributed to the chip fractures. Radiological and arthroscopic examination revealed an average of 1.43 fragment sites/horse, 1.15 fragment sites/joint and 1.25 affected joints/horse. Eighty-nine percent of the horses (411/461) raced after surgery and 82% (377/461) did so at the same or higher class. Fifty horses did not race after surgery. Sixty-eight percent of the horses raced in a Stake or Allowance race postoperatively. Data, previously undocumented, establishes that the quantity and quality of performance is not diminished after arthroscopic treatment of dorsoproximal P1 fragmentation. Surgical removal of chip fractures is a means of preserving the economic value of an injured Thoroughbred, allowing a rapid and successful return to racing at the previous level of racing performance. | 2024-02-11T01:26:19.665474 | https://example.com/article/3821 |
I Could Go On Singing
I Could Go On Singing is a 1963 British-American musical drama film directed by Ronald Neame, starring Judy Garland (in her final film role) and Dirk Bogarde. Originally titled The Lonely Stage, it was renamed so that audiences would know Garland sang in it, the first such movie since A Star Is Born in 1954.
Although not a huge box office success on release, it won Garland much praise for her performance. In Bogarde's autobiographies and in the 2004 biography, it is recounted that Judy Garland's lines were substantially rewritten by Bogarde (with Garland's consent).
The film had its world premiere at the Plaza Theatre in London's West End on 6 March 1963.
Plot
Jenny Bowman (Judy Garland) is a successful concert singer who regularly tours the world. During a stay in London, she visits recently widowed David Donne (Dirk Bogarde), a prominent ENT surgeon. It is revealed that over a decade ago the two had an affair that led to the birth of Matt, who is raised alone now by David and has been told he was adopted. Although Jenny and David agreed that Matt would never know the truth, David takes Jenny to Matt's boarding school in Buckinghamshire so she may meet him just once. Jenny and Matt hit it off and the three spend the whole day together. Jenny invites the two to her concert at the London Palladium, but David is unable to make it due to work in Rome.
With David absent and under the impression that Matt is back at school, Jenny and Matt spend a few days together exploring London. Jenny's manager and assistant try to cover for Matt by calling his school, but word about his absence gets back to David in Rome, who is furious. When David returns to London, he and Jenny have a row during which Matt overhears that they are his birth parents. David implores Matt to remain in England and finish his schooling, while Jenny insists Matt should accompany her on her world tour. Confused, Matt rejects Jenny's invitations and the two agree to see each other again sometime in the future.
Jenny turns to a night of drinking on the town to cope with the heartbreak and ends up twisting her ankle. At a clinic, she demands that David come to treat her. When he arrives, she claims to be quitting singing as she is "stretched too thin and everyone wants a bite", but David insists she cannot let herself down this way and tells her he loves her. At her concert that night, Jenny sings marvelously to the crowd. David leaves mid-way through her first number.
Cast
Judy Garland as Jenny Bowman
Dirk Bogarde as David Donne
Jack Klugman as George Kogan
Gregory Phillips as Matt
Aline MacMahon as Ida
Pauline Jameson as Miss Plimpton
Jeremy Burnham as Hospital surgeon
Lorna Luft as Girl on boat
Joseph Luft as Boy on boat
Leon Cortez as Busker
Music
All songs performed by Judy Garland:
"I Am the Monarch of the Sea" (Judy Garland and Boys) from H.M.S. Pinafore by Gilbert and Sullivan
"Hello Bluebird", words and music by Cliff Friend
"'It Never Was You", Kurt Weill and Maxwell Anderson
"By Myself", Arthur Schwartz and Howard Dietz
"I Could Go On Singing", Harold Arlen and E. Y. Harburg
Film reviews
"Either you are or you aren't - a Judy Garland fan that is. And if you aren't, forget about her new movie, I Could Go On Singing, and leave the discussion to us devotees. You'll see her in close-up...in beautiful, glowing Technicolor and striking staging in a vibrant, vital performance that gets to the essence of her mystique as a superb entertainer. Miss Garland is - as always - real, the voice throbbing, the eyes aglow, the delicate features yielding to the demands of the years - the legs still long and lovely. Certainly the role of a top-rank singer beset by the loneliness and emotional hungers of her personal life is not an alien one to her..."
- Judith Crist, The New York Herald Tribune
"3 stars...Judy Garland is back on screen in a role that might have been custom-tailored for her particular talents. A new song, I Could Go On Singing, provides her with a little clowning, a chance to be gay, a time for wistfulness, an occasion for tears. She and Dirk Bogarde play wonderfully well together, even though the script itself insists on their being mismatched..."
- Dorothy Masters, The New York Daily News
Soundtrack
The soundtrack album was released at the time of the original movie release, and appeared on CD in 2002 along with the Garland album That's Entertainment!
Home media
The film was released on VHS in 1989, and on DVD in 2004. In 2016, it was released on Blu-ray from Twilight Time.
References
External links
The Judy Garland Online Discography "I Could Go On Singing" pages.
Category:1963 films
Category:English-language films
Category:United Artists films
Category:British films
Category:American films
Category:Films directed by Ronald Neame
Category:Films about singers
Category:1960s musical drama films
Category:British drama films
Category:American musical drama films | 2023-10-06T01:26:19.665474 | https://example.com/article/7081 |
This invention relates to a lawn tool for removing plants such as weeds or grass from the ground. | 2023-12-01T01:26:19.665474 | https://example.com/article/4330 |
Keep your kids safe at school
Monday
Oct 1, 2012 at 12:01 AMOct 19, 2012 at 10:30 AM
Parents expect schools to be safe havens, but the reality is that children face a host of dangers all day long. Bullying, taunting and teasing are only some of the hazards that kids must deal with it every day at even the best schools in America.
Parents expect schools to be safe havens, but the reality is that children face a host of dangers all day long. Bullying, taunting and teasing are only some of the hazards that kids must deal with it every day at even the best schools in America.
About 30 percent of middle and high school students say they’ve been bullied. Among high school students, one out of nine teens reported they had been pushed, shoved, tripped or spit upon during the last school year, according to a National Institute of Child Health and Human Development research study. FindLaw.com offers the following tips on how to keep your children safe at school:
- Talk to your kids about school safety. Talk about bullying and make sure your child understands what is and is not acceptable behavior. Also discuss when and how to report bullying.
- Go to the bus stop. If your schedule allows, go to the bus stop with your child and get to know the other kids and parents, along with the bus driver.
- Get to know your kids’ teachers. Send your child’s teacher an email to introduce yourself and regularly check in on your child’s academic and social progress. Learn how his or her teacher approaches bullying and other issues that may distract from the school’s learning environment, such as the use of cellphones and iPods.
- Read the school’s policy on bullying. Become familiar with school policies about bullying - particularly the protocols for identifying and reporting bullying behavior. Pay careful attention to policies regarding cyberbullying, which can take place outside of school.
- Watch and listen for the cues. Many kids don’t want to reveal to their parents that they’re being bullied, taunted or teased by other kids. If your child is withdrawn, not doing homework, sick more often than normal or demonstrating other out-of-the-ordinary behavior, talk about what seems to be bothering him or her.
- Know where your kids are. Sometimes bullying and other unsafe situations take place outside of school grounds, such as at other students’ houses. Telling your kids that you want to know where they are and that they need permission to visit a friend’s house shows them you care. It also reassures them that they can contact you if they need help.
- Monitor Internet use and texting. Put the home computer in a public place and don’t allow your kids to use a computer in their bedroom by themselves.
- Put it in writing. If you suspect your child is being bullied or sexually harassed by another student (or a teacher or staff member), ask for a face-to-face meeting with the school’s principal. If the principal does not act, hire an attorney and escalate your complaint to the superintendent and school board. Putting your complaint in writing about the specific types of negative behavior affecting your child is necessary if you need to litigate the complaint in court.
- Take appropriate action when bullying becomes assault. If your child is physically assaulted on the bus, in school or on school grounds, contact the local police department, particularly if there is a school liaison officer assigned to the school, about whether a police report or assault charges should be filed. Do not wait to let the school handle the situation. | 2024-02-03T01:26:19.665474 | https://example.com/article/8773 |
Paul Manafort, best known for his short-lived stint as the campaign manager for then-presidential candidate Donald Trump, filed a lawsuit in a US District Court in Washington on Wednesday against the Department of Justice and Robert Mueller.
The suit comes less than three months after Mueller—appointed last May to lead an investigation into the relationship between the Trump campaign and Russian officials—indicted Manafort and business associate Rick Gates on charges of money laundering, among other crimes (like “conceal[ing] from the United States their work as agents of...Ukraine and its political parties and leaders”).
Manafort’s suit challenges what he refers to as the “arbitrary” and “capricious” actions Mueller has taken in during the course of his inquiry, arguing that, because the crimes he’s been charged with (and to which he has pleaded not guilty) fall outside the scope of Mueller’s investigation, the Department of Justice should dismiss those charges. This is despite the fact that the order appointing Mueller to his current post states that Mueller may investigate “any matters that arose or may arise directly from the investigation.” | 2024-01-31T01:26:19.665474 | https://example.com/article/3702 |
Three Winnipeg Blue Bombers are facing fines following Sunday's West Division semifinal game against the Saskatchewan Roughriders.
Bomber defensive lineman Jackson Jeffcoat has been handed the Canadian Football League's maximum fine for a hard helmet-to-helmet hit on Riders' quarterback Brandon Bridge late in the fourth quarter.
Jeffcoat was not penalized during the game, which the Bombers ultimately won 23-18, as the head referee's view was blocked on the play.
At a team availability on Tuesday, Bridge said he underwent concussion testing following the hit, but was feeling better and could have played this weekend if the Roughriders had won.
Roughriders quarterback Brandon Bridge was helped off the field last Sunday after taking a late hit from Blue Bombers defensive end Jackson Jeffcoat. (Mark Taylor/THE CANADIAN PRESS)
The CFL announced plans Thursday to add an extra official to the field for the rest of the playoffs to watch for any blows delivered to the head or neck of a quarterback after the hit.
Bombers offensive linemen Patrick Neufeld and Sukh Chungh are also facing fines for late and unnecessary hits on Saskatchewan players during Sunday's game.
The CFL did not disclose the amounts of the player fines.
The Blue Bombers play the Calgary Stampeders in the West Division final Sunday while the Ottawa Redblacks will host the Hamilton Tiger-Cats for the East Division crown.
More from CBC Manitoba: | 2023-12-12T01:26:19.665474 | https://example.com/article/3046 |
About GeneralApplianceParts
Here at GeneralApplianceParts.com we have a passion for Do-It-Yourselfers and home repairs. Our mission is to become the #1 source for all your appliance part needs. We have access to more than 2 million repair parts available and our repair guides, pictures and excellent customer support help guide you to the exact part you need.
Customer Service
Shipping and Handling Information
Items are shipped Monday through Friday(excluding holidays) with a 3:00 p.m. cutoff time.
The majority of our orders are shipped with 24 hours of your payment clearing through paypal or your charge card.
It is your responsibility to keep your shipping address updated on eBay and PayPal. Should the package be returned to us as undeliverable due to an error in the address you have on file, additional shipping costs will be collected to compensate for reshipping the item to you.
Please note that our shipping process is quite efficient. We will attempt to process your address change, cancellation and order change as quickly as possible. However, we cannot guarantee that we will be able to provide this service. Often, an item is pulled, packed and shipped within minutes of our receiving the order. Please review your order for accuracy before submitting it.
USPS states on their website that their Express Mail service is a 1 or 2 day mail service. The time frame depends on your location and is determined by the Post Office. You may go to their website and click "Calculate a Price" to determine if your package will take one or two days to deliver.
Your will receive an email with the tracking # once your label is printed. Tracking information is accessible once the item is delivered to the post office or picked up by UPS.
When we are out of stock on an item, we may (at our discretion) choose to have the part shipped directly to you from our vendor. In these cases, the shipping carrier may change but we will attempt to have it delivered in the requested time frame. If we cannot keep to the original delivery time frame in these instances, we will notify you.
For our International Buyers
USPS First Class International mail is not trackable once it crosses the U.S. border. Delivery times vary by country and are not provided by the U.S. Postal System. Generally, our experience is that First Class International mail takes at least 3 weeks to deliver.
Canadian Customers: Please ask about using UPS Standard as your shipping option. If timely delivery and the ability to track your package is important, it is an option worth considering. However, UPS does charge brokerage and misc fees for Canadian shipments, so make sure you understand these fees before using UPS Standard as your shipping option.
If you desire the ability to track your package you will need to select either USPS Priority International, USPS Express Mail International or UPS as your shipping option.
Import duties, taxes and charges are not included in the item price or shipping charges and are the responsibility of the buyer.
Unfortunately, Customs may cause a delay in delivery of your item, please allow extra time for this process.
For Everybody!
Return Policy
Customer satisfaction is very important to us.
However, you as the buyer play a very important part in this. Please review the entire listing carefully and make certain you are ordering the part you need. If you have any questions, please contact us before purchasing.
Full refunds are given only for a part this is grossly misrepresented by its picture or listing description, or if it is shipped incorrectly. Please note that appliance manufacturers frequently update their parts without warning. While we strive to update our listing pictures as quickly as possible, an outdated picture is not grounds for return. If you receive a part updated by the manufacturer in the last 90 days, it will be considered as correctly shipped.
We have a 14 day return policy starting from date of delivery (confirmed by the carrier). You must obtain a return authorization to return the part within this time frame. We must receive the item being returned within 21 days of delivery date. Parts are not eligible for return for any reason if we are not notified within the 14 day time frame.
Damaged parts must be reported to us within 3 days of the delivery date. This is to insure that we can file a claim with the carrier when applicable. Please send an email describing the damage and attach pictures of the part and the packaging for our inspection.
A RMA # must be obtained prior to returning any part.
There is a 25% restocking fee on all parts that were shipped correctly (waived on exchanges)
All items being returned must be in their original packaging and accompanied by any instruction manuals and other paperwork. All items must be in a brand new (without signs of installation) and resaleable condition. All parts are inspected for signs of installation upon our receipt of them. (Note: Parts that have physical evidence of being installed may receive a 50% refund at our discretion. The decision is made based on our assessment of the part and whether it can be resold as "used". )
The customer is responsible for all return or replacement shipping charges including insurance. However, we will reimburse the return shipping charges (least expensive available) for incorrectly shipped items. Original shipping charges are not refundable unless the part was shipped incorrectly or damaged in transit. We recommend that the customer insures items being returned. Items being returned which are lost/damaged in transit are not the responsibility of the seller. However, we will assist in the buyer's efforts to file a claim with their carrier.
Disclaimer Of Liability
In no way shall General Appliance Parts be liable for any loss, damage, fire, explosion, injury, including any incidental or consequential damages, or death as a result of ordering and/or installing any parts from our website or from the results of any action taken due to reading information found on our website. All information provided through live chat, email or the product details is for general information purposes. The information is provided as a courtesy to our customers to enhance their understanding of their appliances, it is not to be taken for instructional purposes on how to repair their system.
Disclaimer Of Liability for ordering and installing parts
General Appliance Parts suggests having all parts, accessories and equipment installed by a qualified heating and air conditioning technician.
If a customer attempts to install a part, accessory or equipment, he or she should have a thorough understanding of electricity, reading wiring diagrams and the work to be performed.
In no way shall General Appliance Parts be liable for any loss, damage, injury, including any incidental or consequential damages, or death as a result of ordering and/or installing any parts from our website or from the results of any action due to reading information found on our website.
General Appliance Parts will not accept returns that are damaged due to misuse, miswiring or improper installation. | 2024-04-06T01:26:19.665474 | https://example.com/article/1002 |
// SPDX-License-Identifier: GPL-2.0+
/*
* usbhid-dump - device list
*
* Copyright (C) 2010 Nikolai Kondrashov <spbnick@gmail.com>
*/
#include "config.h"
#include "misc.h"
#include "dev_list.h"
#include <assert.h>
#include <stdlib.h>
#include <stdio.h>
bool
uhd_dev_list_valid(const uhd_dev *list)
{
UHD_DEV_LIST_FOR_EACH(list, list)
if (!uhd_dev_valid(list))
return false;
return true;
}
void
uhd_dev_list_close(uhd_dev *list)
{
uhd_dev *next;
for (; list != NULL; list = next)
{
next = list->next;
uhd_dev_close(list);
}
}
enum libusb_error
uhd_dev_list_open(libusb_context *ctx,
uint8_t bus_num, uint8_t dev_addr,
uint16_t vid, uint16_t pid,
uhd_dev **plist)
{
enum libusb_error err = LIBUSB_ERROR_OTHER;
libusb_device **lusb_list = NULL;
ssize_t num;
ssize_t idx;
libusb_device *lusb_dev;
struct libusb_device_descriptor desc;
uhd_dev *list = NULL;
uhd_dev *dev;
assert(ctx != NULL);
/* Retrieve libusb device list */
num = libusb_get_device_list(ctx, &lusb_list);
if (num == LIBUSB_ERROR_NO_MEM)
{
err = num;
goto cleanup;
}
/* Find and open the devices */
for (idx = 0; idx < num; idx++)
{
lusb_dev = lusb_list[idx];
/* Skip devices not matching bus_num/dev_addr mask */
if ((bus_num != UHD_BUS_NUM_ANY &&
libusb_get_bus_number(lusb_dev) != bus_num) ||
(dev_addr != UHD_DEV_ADDR_ANY &&
libusb_get_device_address(lusb_dev) != dev_addr))
continue;
/* Skip devices not matching vendor/product mask */
if (vid != UHD_VID_ANY || pid != UHD_PID_ANY)
{
err = libusb_get_device_descriptor(lusb_dev, &desc);
if (err != LIBUSB_SUCCESS)
goto cleanup;
if ((vid != UHD_VID_ANY && vid != desc.idVendor) ||
(pid != UHD_PID_ANY && pid != desc.idProduct))
continue;
}
/* Open and append the device to the list */
err = uhd_dev_open(lusb_dev, &dev);
if (err != LIBUSB_SUCCESS)
goto cleanup;
dev->next = list;
list = dev;
}
/* Free the libusb device list freeing unused devices */
libusb_free_device_list(lusb_list, true);
lusb_list = NULL;
/* Output device list, if requested */
assert(uhd_dev_list_valid(list));
if (plist != NULL)
{
*plist = list;
list = NULL;
}
/* Done! */
err = LIBUSB_SUCCESS;
cleanup:
/* Close the device list if not output */
uhd_dev_list_close(list);
/* Free the libusb device list along with devices */
if (lusb_list != NULL)
libusb_free_device_list(lusb_list, true);
return err;
}
| 2024-04-08T01:26:19.665474 | https://example.com/article/6138 |
Background
==========
Ongoing strategies of malaria vector control rely greatly on the use of indoor residual spraying (IRS) and insecticide-treated nets (ITNs). The current success of these strategies in reducing malaria contributed towards the optimism that elimination of this disease as a public health problem is a feasible objective \[[@B1]\]. Substantial international efforts have been made during the last three years enabling access to approximately 289 million ITNs in sub-Saharan Africa, enough to cover 76% of the 765 million people at risk of malaria. The number of countries that employed IRS as vector control strategy increased from 31 in 2007 to 68 in 2009 \[[@B2]\]. Further scale- up of IRS and ITNs is occurring throughout the African continent.
ITNs and, to a large extent, IRS are highly dependent on pyrethroid insecticides. The widespread use of this class of insecticide increases the risk of resistance. The situation may be accelerated by the reintroduction of DDT in several countries in Africa as cross-resistance between these insecticide classes can occur as a result of amino acid substitutions in the shared target site. All major malaria vectors in Africa have developed resistance to these insecticides and the resistance alleles appear to be spreading at an exceptionally rapid rate \[[@B3]\].
Pyrethroids and DDT target the voltage-gated sodium channel site. Two alternative substitutions of the leucine 1014 residue can lead to target site resistance. The 1014F allele was first identified in strains of *An. gambiae*from Burkina Faso and Côte d\'Ivoire \[[@B4]\] and the 1014S allele was later identified in this species in Kenya \[[@B5]\]. Both alleles are now widely distributed in *An. gambiae*\[[@B3]\]. In *An. arabiensis*, 1014F has been found in several widely dispersed populations from Burkina Faso \[[@B6],[@B7]\], Tanzania \[[@B8]\], Sudan \[[@B9],[@B10]\], Senegal \[[@B11]\] and Ethiopia \[[@B12],[@B13]\]. The 1014S allele was also observed in wild populations of *An. arabiensis*from Uganda \[[@B14]\] and western Kenya \[[@B15],[@B16]\]. Both 1014F and 1014S alleles have been detected together in the same populations in Sudan \[[@B9]\] and Cameroon \[[@B17]\].
In Sudan, our surveys in 2005 showed that the frequency of the 1014F allele in *An. arabiensis*was more than double in areas where insecticide-treated nets were used compared to a cotton growing area which was regularly treated with insecticides \[[@B9]\]. The result suggested that pyrethroid-based vector control may extend and increase kdr distribution. The distribution of ITNs in Sudan has been scaled up dramatically in recent years and 60% ITN coverage rate has been achieved (National Malaria Control Programme, unpublished data). There is therefore an urgent need to monitor the distribution of resistance and to develop appropriate resistance management strategies. The data presented will further assist in this process.
Methods
=======
Study sites
-----------
The study was carried out in five states of eastern and central Sudan. The states surveyed were Sennar \[sites surveyed were Sennar town (33° 55\' E, 13° 10\' N), Al Boster (33° 36\' E, 13° 32\' N) and Mayirno (33° 66\' E, 13° 47\' N)\], Blue Nile \[site surveyed were Damazine town (34°.35\'E, 11°.82\' N), Guneess (34° 40\' E, 11° 80 \' N) and Al Rosseires (34° 38\'E, 11° 80\' N)\], White Nile \[site surveyed were Kosti (32°.67\' E, 13°.14\' N), Rabak (32°.70\' E, 13°.13\' N) and Asalaya (32°.73\' E, 13°.25\' N)\], Khartoum \[site surveyed were Al Rimeilah (32° 31\' E, 15° 33\' N) and Al Kalaklah (32° 30\' E, 15° 32\' N)\] and Gadaref state \[sites surveyed were Gadaref town (34° 16\' E, 14° 04\' N), Al Faw (35° 38\' E, 14° 19\' N) and Al Shuwak (35° 85\' E, 14° 42\' N)\] (Figure [1](#F1){ref-type="fig"}). Because the distance between the sites surveyed within the states is shorter (less than 10 km), each state was treated as one population except Sennar and Gadaref where Mayirno, Al Faw and Al Shuwak were considered different populations due to the relatively long distances (i.e. the distance between Al Faw and Al Shuwak is more than 180 km) which separate them (Figure [1](#F1){ref-type="fig"}). These states represent the major malaria endemic areas in eastern and central Sudan. The ITN coverage achieved in 2010 was 94%, 87%, 80%, 77% and 52% in Sennar, Blue Nile, Gadaref, White Nile and Khartoum states, respectively (National Malaria Control Programme, unpublished data). There is no routine IRS programme in these regions although IRS with pyrethroids (e.g. Deltamethrin) is occasionally applied in the rainy season (July - October). DDT has not been used for IRS since 1996 when the last round was done in a remote area.
{#F1}
Mosquito collections
--------------------
*Anopheles*larvae were collected based on cross sectional surveys from their natural breeding sites such as animal hoof prints, leakage of pipes, ponds and puddles during July - November 2009. To reduce in-breeding bias, larvae were sampled from more than one (usually at least three) breeding sites. In some states, e.g. Sennar and White Nile, the larvae were collected on two separate occasions over a period of two weeks. The mosquitoes were reared to adulthood, in field insectaries in the major towns of each state and identified using morphological keys \[[@B18]\]. Based on the results from the previous studies in central and eastern Sudan, all insects were treated as *An. arabiensis*as this vector was the only member of the *An. gambiae*complex found in the region \[[@B9],[@B10],[@B19],[@B20]\].
Insecticide susceptibility tests
--------------------------------
Insecticide susceptibility tests were carried out using the standard WHO protocol \[[@B21]\]. Two to three day-old non blood-fed adult female *An. arabiensis*were tested. Batches of 20-25 mosquitoes were exposed to test papers impregnated with 0.75% permethrin or 4% DDT. Controls included batches of mosquitoes from each site exposed to untreated papers. The knockdown effect of each insecticide was recorded every 10 minutes over the one-hour exposure period. Mosquitoes were then transferred to a recovery tube and provided with 10% sugar solution. Final mortality was recorded 24 hours post-exposure.
Mosquito DNA preparation and kdr genotyping
-------------------------------------------
DNA from a single female mosquito was extracted using the Livak method \[[@B22]\] and resuspended in 50- μL of ddH~2~O. The purity and concentration of DNA were measured using Nanodrop spectrophotometer (Nanodrop ND-1000 Technologies).
Populations from Damazin, Kosti, Sennar and Mayirno were genotyped at the Liverpool School of Tropical Medicine (LSTM) using the Taqman probe described by Bass *et al.*\[[@B23]\]. A small number of samples from Khartoum and Al Shuwak were sequenced.
Data analysis
-------------
Data were analysed using descriptive and inferential statistics. Fifty and ninety five percent knockdown times (KDT~50~and KDT~90~) were computed using survival probit analysis (AnalystSoft Inc., BioStat v2009). Tukey-Kramer HSD tests were used to determine the difference in the means of mosquito mortality rates between the populations for each insecticide treatment. Chi-square tests were used to compare the frequencies of kdr alleles between the two phenotypes of surviving and dead mosquitoes for each insecticide. The association between the presence (yes/no) of kdr genotype and resistance phenotype (resistance/susceptible) was further confirmed for both insecticides using nominal logistic regression model. This analysis was conducted using JMP statistical software (JMP SAS Institute Inc. 2003).
Results
=======
Mortality rates
---------------
The mortalities at 24 hours post-exposure are shown in Table [1](#T1){ref-type="table"} and [2](#T2){ref-type="table"}. Based on WHO criteria, all populations would be defined as resistant or \'potentially resistant\' to permethrin and DDT. A high frequency of peremthrin resistant individuals was found in Kosti (60% mortality), Sennar (61% mortality;) and Damazin (77% mortality). These same three populations, in addition to Mayirno and Al Shuwak populations, showed less than 80% mortality to DDT and are thus defined as resistant (Table [2](#T2){ref-type="table"}). The population from Khartoum demonstrated potential resistance to DDT (94.5% mortality (Table [2](#T2){ref-type="table"}).
######
Mean mortalities and 50% and 90% knockdown times (in minutes) (KDT~50~and KDT~90~) of female *Anopheles arabiensis*in populations from eastern and central Sudan following exposure to permethrin.
Population **No**. Mortalities % (95% CI) KDT~50~(95% CI) KDT~90~(95% CI)
------------ --------- -------------------------- -------------------- ----------------------
Sennar 300 61.3 (44.4 - 78.3) ^bc^ 31.9 (30.2 - 33.7) 105.1 (91.4 - 118.8)
Mayirno 100 81.0 (79.8 - 82.2) ^abc^ 25.3 (18.4 - 32.2) 59.7 (52.7 - 66.6)
Damazin 300 77.3 (60.4 - 94.3) ^abc^ 37.4 (29.6 - 43.6) 51.6 (30.3 - 72.8)
Khartoum 175 97.5 (96.3 - 98.7) ^a^ 19.8 (18.2 - 21.2) 33.9 (32.1 - 36.2)
Kosti 300 60.0 (43.1 - 77.0) ^c^ 27.9 (21.1 - 51.5) 79.7 (63.8 - 95.5)
Al Shuwak 160 95.6 (94.4 - 96.8) ^ab^ 31.0 (26.2 - 35.9) 55.2 (50.3 - 60.1)
Al Faw 100 97.0 (95.8 - 98.2) ^a^ 30.1 (24.9 - 35.3) 53.5 (48.3 - 58.7)
Columns not connected by the same letter are significantly different at a level of *P \<*0.05 (Tukey-Kramer HSD test).
######
Mean mortality of and 50% and 90% knockdown times (in minutes) (KDT~50~and KDT~90~) of female *Anopheles arabiensis*in populations from eastern and central Sudan in response to DDT exposure.
Population **No**. Mortalities % (95% CI) KDT~50~(95% CI) KDT~90~(95% CI)
------------ --------- ------------------------- -------------------- ----------------------
Sennar 320 39.7 (19.8 - 59.53)^b^ 42.3 (22.5 - 62.2) 77.1 (25.89 - 128.3)
Mayirno 110 49.0 (47.8 - 50.18)^ab^ 62.8 (43.5 - 82.2) 97.8 (78.4 - 117.1)
Damazin 300 39.0 (19.1 - 58.86)^b^ 45.7 (34.5 - 70.0) 79.5 (71.2 - 93.1)
Khartoum 200 94.5 (93.3 - 95.68)^a^ 30.4 (26.8 - 33.8) 53.9 (47.2 - 65.7)
Kosti 300 73.3 (53.5 - 93.2)^ab^ 73.8 (70.3 - 77.3) 102.7 (32.8 - 172.7)
Al Shuwak 140 67.1 (66.0 - 68.32)^ab^ 60.4 (35.5 - 85.3) 98.2 (73.8 - 123.1)
Columns not connected by the same letter are significantly different at a level of *P \<*0.05 (Tukey-Kramer HSD test).
Knockdown effect
----------------
The 50% and 90% knockdown time thresholds (KDT~50~and KDT~90~) determined over a one-hour period against permethrin and DDT are shown in Table [1](#T1){ref-type="table"} and [2](#T2){ref-type="table"}. All populations, with the exception of Khartoum, had similar KDT50s for permethrin. The Khartoum population was knocked down significantly faster with permethrin. Similarly, the Khartoum population had a significantly lower KDT50 with DDT than the other populations. For DDT, the Kosti population took significantly longer to be knocked down than any other population.
Knockdown resistance (kdr) alleles
----------------------------------
Table [3](#T3){ref-type="table"} summarises the presence of 1014F-kdr allele in six populations of *An. arabiensis*. The data are stratified according to whether they survived or died after exposure to the WHO diagnostic dose of permethrin and DDT. Of 248 mosquito specimens screened for both kdr alleles, the 1014F-kdr allele was present in 165 (96 alive and 69 dead) specimens. The 1014S-kdr allele was not detected in any genotyped mosquito specimens. Data from all sites were pooled by insecticide and the correlation between genotype and phenotype was determined. Homozygous 1014F individuals were not more likely to survive (53.7%) permethrin exposure than to be killed (38.6%) by the diagnostic dose (*χ2*= 2.222, *P*= 0.1361). There was no difference in likelihood of permethrin survival in heterozygotes (*χ2*= 0.066, d.f. = 1, *P*= 0.7973). The susceptible genotypes were more likely to be killed by permethrin exposure than to survive (*χ2*= 3.981, *P*= 0.0460) (Table [4](#T4){ref-type="table"}). However, 16.7% (9/54) of the permethrin survivors were 1014L homozygotes. The 1014F allele failed to confer a survival advantage to the WHO diagnostic dose of DDT in either the homozygous or heterozygous state. Surprisingly, the heterozygous 1014F individuals were significantly (41.7%) more likely to be killed by DDT than to survive (24.4%) by the diagnostic dose (*χ2*= 4.913, *P*= 0.0267). Similarly there was no increased risk of DDT-induced death for the 1014L genotype (*χ2*= 1.521, *P*= 0.2174) and indeed approximately half (43%) the DDT survivors lacked any kdr allele (Table [4](#T4){ref-type="table"}). Overall, unlike DDT insecticide (*χ2*= 1.521, *P*= 0.2174), the nominal logistic regression confirmed a significant association between the present (yes/no) of kdr mutation (L1014F) and permethrin resistance phenotype (resistance/susceptible) (*χ2*= 3.981, *P*= 0.0460). This could be further supported by the interesting fact that the highest 1014F frequency was observed in the most ever resistant population to permethrin from Kosti (Table [1](#T1){ref-type="table"} &[3](#T3){ref-type="table"}).
######
Summary of 1014F kdr allele in alive and dead mosquitoes of *An. arabiensis*exposed to permethrin and DDT among six populations from eastern and central Sudan.
Origin kdr genotype Frequency
------------- ----------------- --------------- -------------- ------------- ------------- ----------- ------- -------
**Insecticide** **Phenotype** **Leu Leu** **Leu Phe** **Phe Phe** **Total** **S** **R**
Mayirno *DDT* Dead 10 4 4 18 0.67 0.33
Alive 27 0 1 28 0.96 0.04
*Permethrin* Dead 5 3 0 8 0.81 0.19
Alive 7 0 0 7 1.00 0.00
Sennar *DDT* Dead 6 1 0 7 0.93 0.07
Alive 8 13 4 25 0.58 0.42
*Permethrin* Dead 7 0 0 7 1.00 0.00
Alive 2 12 9 23 0.35 0.65
Kosti *DDT* Dead 0 4 11 15 0.13 0.87
Alive 0 0 15 15 0.00 1.00
*Permethrin* Dead 0 7 17 24 0.15 0.85
Alive 0 4 20 24 0.08 0.92
Damazin *DDT* Dead 3 16 0 19 0.58 0.42
Alive 4 8 8 20 0.40 0.60
Al Shuwak\* *DDT* Dead 1 0 0 1 1.00 0.00
Alive 0 0 1 1 0.00 1.00
*Permethrin* Dead 2 2 0 4 0.75 0.25
Khartoum\* *DDT* Alive 0 1 0 1 0.50 0.50
*Permethrin* Dead 1 0 0 1 1.00 0.00
\*DNA sequence results
######
Frequency of 1014F kdr allele in survival and dead mosquitoes of *An. arabiensis*exposed to a WHO discriminating dose of permethrin and DDT.
Insecticide Phenotype No. tested Leu Leu Leu Phe Phe Phe
------------- ----------- ------------ ----------- ----------- -----------
Permethrin Dead 44 0.34(15) 0.27 (12) 0.39 (17)
Alive 54 0.17 (9) 0.30 (16) 0.54 (29)
*P value* 0.0460 0.7971 0.1361
DDT Dead 60 0.33 (20) 0.42 (25) 0.25 (15)
Alive 90 0.43 (39) 0.24 (22) 0.32 (29)
*P value* 0.2174 0.0267 0.3384
Discussion
==========
Based on the WHO criteria for characterizing insecticide resistance/susceptibility, no evidence for full susceptibility to permethrin or DDT was found among the populations tested. The populations of *An. arabiensis*from Kosti, Sennar and Damazin were resistant to both permethrin and DDT. In addition, resistance to DDT was demonstrated in Mayirno and Al Shuwak. The KDT~50~and KDT~90~for DDT in the current study was much higher than those reported for a completely susceptible population from New Halfa, eastern Sudan \[[@B9]\]. DDT was banned in Sudan for agricultural use in 1980 but continued to be used in vector control for a further 15 years. Hence the high level of DDT resistance may be a result of past use in vector control. Other previous studies also showed that the selection of resistance to DDT in populations of malaria vectors was due to the long-standing and extensive use of DDT in the IRS programmes \[[@B24],[@B25]\]. Interestingly the kdr genotype did not correlate well with resistance to DDT with over 43% the survivors being wild type for the kdr allele. This suggests that alternative resistance mechanisms are responsible for the DDT resistance.
Permethrin resistance is now well established in central Sudan with populations of *An. arabiensis*from three states (White Nile, Sennar and Blue Nile) showing less than 80% mortality to permethrin. The frequency of resistance appears to have increased considerably over the past three years as an earlier study in Sennar State found only one of four populations to be resistant to permethrin and none to DDT \[[@B10]\]. In contrast to DDT, permethrin resistance correlates with the presence of the 1014F genotype. However, this association between the presence of kdr and susceptibility/resistance to permethrin could be attributed mainly to the significant presence of the wild-type (Leu Leu) genotype among the dead individuals against the discriminated dose of this insecticide (Table [4](#T4){ref-type="table"}). This suggests that this genotype is more likely to associate with susceptible phenotype than resistance in the mosquito vector *An. arabiensis*from Sudan.
Overall, it is interesting to note that the association between the presence of kdr and resistance phenotype was weak for permethrin and absent for DDT, indicating that kdr is a dubious marker of both resistance to these insecticides and to be evidence for control failure in the populations tested of *An. arabiensis*. This association was shown quite strong in the closely related malaria vector *Anopheles gambiae*and it emphasized that kdr genotype might explain only a portion of heritable variation in resistance phenotype and that diagnostic assays to test the importance of other resistance mechanisms in field populations are required \[[@B26]-[@B28]\]. This could be further supported by the fact that, in the present study, approximately 16.7% of the survivors *An. arabienis*against permethrin were kdr negative indicating a role for additional pyrethroid resistance mechanisms.
The 1014S mutation was not detected in the six populations screened. The 1014S mutation has previously been observed in one out of three populations in Kassala state \[[@B9]\] but absent in Gezira and Sennar \[[@B10]\]. The result suggests limited distribution of 1014S allele which so far reported only from Kassala town.
Conclusion
==========
The observed co-resistance to permethrin coupled with the occurrence of high resistance to DDT and high kdr frequency in populations of *An. arabiensis*could greatly affect the malaria vector control in Sudan. Relying on the use of ITNs alone may not continue to provide adequate control if this trend continues. Thus, the national malaria control program may need to consider additional methods for malaria vector control in Sudan.
Competing interests
===================
The authors declare that they have no competing interests.
Authors\' contributions
=======================
YEH supervised field work, performed data management and statistical analyses, provide results interpretation and drafted the manuscript, CMJ and MMA carried out the laboratory analyses, HR supervised the laboratory work, drafted and critically reviewed and finalized this paper for publication. All authors read and approved the final manuscript.
Acknowledgements
================
We thank Ahmed Omer, Hyder Abd Allah and Nazar Abdel EL Galeel for technical assistance during mosquito collections and bioassays and Toe Kobie Hyacinth, Antoine Sanou and Safa Ahmed for help with the genotyping. We also thank professor Muntaser Ibrahim from Institute of Endemic Diseases (IEND), University of Khartoum and Dr. George Skavdis, Agricultural University of Athens, Athens, Greece, for hosting and advising in doing this research at IEND before to be done at LSTM in UK. This work is supported by a small grant scheme from EMRO, WHO/TDR (Project ID SGS08/120) to Y.E. Himeidan.
| 2023-10-02T01:26:19.665474 | https://example.com/article/6744 |
x64 Architecture
In this article
The x64 architecture is a backwards-compatible extension of x86. It provides a legacy 32-bit mode, which is identical to x86, and a new 64-bit mode.
The term "x64" includes both AMD 64 and Intel64. The instruction sets are close to identical.
Registers
x64 extends x86's 8 general-purpose registers to be 64-bit, and adds 8 new 64-bit registers. The 64-bit registers have names beginning with "r", so for example the 64-bit extension of eax is called rax. The new registers are named r8 through r15.
The lower 32 bits, 16 bits, and 8 bits of each register are directly addressable in operands. This includes registers, like esi, whose lower 8 bits were not previously addressable. The following table specifies the assembly-language names for the lower portions of 64-bit registers.
64-bit register
Lower 32 bits
Lower 16 bits
Lower 8 bits
rax
eax
ax
al
rbx
ebx
bx
bl
rcx
ecx
cx
cl
rdx
edx
dx
dl
rsi
esi
si
sil
rdi
edi
di
dil
rbp
ebp
bp
bpl
rsp
esp
sp
spl
r8
r8d
r8w
r8b
r9
r9d
r9w
r9b
r10
r10d
r10w
r10b
r11
r11d
r11w
r11b
r12
r12d
r12w
r12b
r13
r13d
r13w
r13b
r14
r14d
r14w
r14b
r15
r15d
r15w
r15b
Operations that output to a 32-bit subregister are automatically zero-extended to the entire 64-bit register. Operations that output to 8-bit or 16-bit subregisters are not zero-extended (this is compatible x86 behavior).
The high 8 bits of ax, bx, cx, and dx are still addressable as ah, bh, ch, dh, but cannot be used with all types of operands.
The instruction pointer, eip, and flags register have been extended to 64 bits (rip and rflags, respectively) as well.
The x64 processor also provides several sets of floating-point registers:
Eight 80-bit x87 registers.
Eight 64-bit MMX registers. (These overlap with the x87 registers.)
The original set of eight 128-bit SSE registers is increased to sixteen.
Calling Conventions
Unlike the x86, the C/C++ compiler only supports one calling convention on x64. This calling convention takes advantage of the increased number of registers available on x64:
The first four integer or pointer parameters are passed in the rcx, rdx, r8, and r9 registers.
The first four floating-point parameters are passed in the first four SSE registers, xmm0-xmm3.
The caller reserves space on the stack for arguments passed in registers. The called function can use this space to spill the contents of registers to the stack.
Any additional arguments are passed on the stack.
An integer or pointer return value is returned in the rax register, while a floating-point return value is returned in xmm0.
rax, rcx, rdx, r8-r11 are volatile.
rbx, rbp, rdi, rsi, r12-r15 are nonvolatile.
The calling convention for C++ is very similar: the this pointer is passed as an implicit first parameter. The next three parameters are passed in registers, while the rest are passed on the stack.
Addressing Modes
The addressing modes in 64-bit mode are similar to, but not identical to, x86.
A special form of the mov instruction has been added for 64-bit immediate constants or constant addresses. For all other instructions, immediate constants or constant addresses are still 32 bits.
x64 provides a new rip-relative addressing mode. Instructions that refer to a single constant address are encoded as offsets from rip. For example, the mov rax, [addr] instruction moves 8 bytes beginning at addr + rip to rax.
Instructions, such as jmp, call, push, and pop, that implicitly refer to the instruction pointer and the stack pointer treat them as 64 bits registers on x64. | 2024-02-05T01:26:19.665474 | https://example.com/article/3738 |
Optically transparent solid electrodes for precision Penning traps.
We have conceived, built, and operated a cryogenic Penning trap with an electrically conducting yet optically transparent solid electrode. The trap, dedicated to spectroscopy and imaging of confined particles under large solid angles, is of "half-open" design with one open endcap and one closed endcap that mainly consists of a glass window coated with a highly transparent conductive layer. This arrangement allows for the trapping of externally or internally produced particles and yields flexible access for optical excitation and efficient light collection from the trapping region. At the same time, it is electrically closed and ensures long-term ion confinement under well-defined conditions. With its superior surface quality and its high as well as homogeneous optical transmission, the window electrode is an excellent replacement for partially transmissive electrodes that use holes, slits, metallic meshes, and the like. | 2023-11-27T01:26:19.665474 | https://example.com/article/8477 |
---
abstract: 'Observations of the light curve for the 3.7-day Cepheid RT Aur both before and since 1980 indicate that the variable is undergoing an overall period increase, amounting to $+0.082 \pm 0.012$ s yr$^{-1}$, rather than a period decrease, as implied by all observations prior to 1980. Superposed on the star’s O–C variations is a sinusoidal trend that cannot be attributed to random fluctuations in pulsation period. Rather, it appears to arise from light travel time effects in a binary system. The derived orbital period for the system is $P = 26,429\pm89$ days ($72.36\pm0.24$ years). The inferred orbital parameters from the O–C residuals differ from those indicated by existing radial velocity data. The latter imply the most reasonable results, namely $a_1{\rm sin}i = 9.09(\pm1.81)\times10^8$ km and a minimum secondary mass of $M_2 = 1.15\pm0.25\;M_{\sun}$. Continued monitoring of the brightness and radial velocity changes in the Cepheid are necessary to confirm the long-term trend and to provide data for a proper spectroscopic solution to the orbit.'
author:
- 'David G. Turner'
- 'Ivan S. Bryukhanov, Igor I. Balyuk, Alexey M. Gain, Roman A. Grabovsky, Valery D. Grigorenko, Igor V. Klochko, Attila Kosa-Kiss, Alexey S. Kosinsky, Ivan J. Kushmar, Vyacheslav T. Mamedov, Natalya A. Narkevich, Andrey J. Pogosyants, Andrey S. Semenyuta, Ivan M. Sergey, Vladimir V. Schukin, Jury B. Strigelsky, and Valentina G. Tamello'
- 'David J. Lane and Daniel J. Majaess'
title: The Period Changes of the Cepheid RT Aurigae
---
Introduction
============
Every well-studied Cepheid undergoes changes in pulsation period: some rapidly, others extremely slowly, and $\sim10\%$ in irregular fashion, attributable to random fluctuations in pulsation period, generally superposed upon parabolic evolutionary trends, e.g. SV Vul [@tb04]. For the large majority the effect can be attributed directly to gradual changes in mean radius as post main-sequence stars of $3-20\;M_\sun$ evolve through the instability strip in the H-R diagram [@te06]. Parabolic trends in Cepheid O–C diagrams — temporal plots of the differences between Observed and Computed times of light maxima — are diagnostic features of stars undergoing slow changes in mean radius [@pa58; @st59].
The case for the 3.7-day Cepheid RT Aur is most unusual. Summaries by @sz77 [@sz91] and @fe93 of observed times of maximum light between 1897 and 1980 provide a strong case for a regular period decrease in the Cepheid [@tu98], although @sz77 preferred to interpret the O–C data as evidence for a discontinuous period change, contrary to the arguments for evolution [@sz83; @te06]. The available O–C data to 1980, from @sz77 [@sz91], @fe93, @wu92, and an unpublished list by Vitaly Goransky of the Sternberg Astronomical Institute, cited by @ko06, of observed times of maximum light are shown in Figure 1 (upper). The weighting scheme for the data used throughout this paper is that employed by @sz77, with weights assigned to sources not cited by @sz77 [@sz91] on the basis of the perceived quality of the result. The negative parabolic trend is the signature of a regular period decrease [@st59], and the inferred rate of $-0.123 \pm 0.018$ s yr$^{-1}$ is close to what is predicted from stellar evolutionary models for a star in the second crossing of the Cepheid instability strip [@te06].
Regular photoelectric monitoring of the brightness variations of RT Aur by professional observers ceased over a decade ago, with the exception of @be97, @ba97, @ki98, and observations by the Hipparcos satellite [@esa97]. A variety of other observations of the star, primarily by amateur astronomers, has generated additional times of light maximum that are listed by @wu92, @ko06, and @me04 [@me06]. They are plotted in Figure 1 (lower), using the weighting scheme described above, but are generally of lower quality than most observations by professional observers, as indicated by the larger scatter in the more recent times of light maxima. Nevertheless, it is clear that current O–C data do not confirm the regular period decrease evident prior to 1980. A similar trend is indicated in an O–C plot for RT Aur generated by @be03 using low quality observations by members of the American Association of Variable Star Observers (AAVSO), who, in conjunction with European observers, have been the primary observers of the Cepheid in the current era.
Here we present additional data that confirm the more recent observations of the curious change in pulsation period for RT Aur, and argue that the long-term brightness changes of the Cepheid are actually more consistent with a period [*increase*]{} than a period decrease. There is, in fact, convincing evidence for a superposed sinusoidal trend that hints at more complex behavior generally consistent with orbital motion in a binary system. The main point to be made, however, is that the true situation will only be established by further monitoring of the star. The last few decades of observation merely hint at the interesting changes occurring in the system.
Observational Data
==================
We obtained a selection of new O–C data points for RT Aur through analysis of a variety of unpublished observations for the Cepheid, which include observations by members of the American Association of Variable Star Observers (AAVSO) from @he06 and data from Group “Betelgeuse.” The latter include individual observations of RT Aur by group members, as well as data obtained from visual inspection of photographic images in the plate archives at Minsk and Odessa.
All data listed only by Julian Date were converted into heliocentric equivalents, and were phased using a new ephemeris given by: $${\rm HJD}_{\rm max} = 2441723.6925 + 3.72824 \: E ,$$ where $E$ is the number of elapsed cycles. We also made use of a standard light curve for RT Aur, in $B$ and $V$, constructed from the detailed photometry of @wi73 supplemented by data from @mb84 that were matched in both phase and magnitude to the observations of @wi73.
Since RT Aur is a fifth magnitude Cepheid, its brightness is typically monitored optically by means of binoculars or low power oculars, although magnitude estimates without optical aid would likely be more accurate given the eye’s increasing precision for estimating brightness levels when functioning near the visibility limit [@tu00]. Stellar brightness is more difficult to establish optically when it falls well above the eye limit, which may partly explain the large scatter in the AAVSO estimates for RT Aur [@he06], as indicated in Figure 2. The large number of individual AAVSO estimates compensates for the large scatter, however, and results in very precise O–C estimates. The AAVSO database for RT Aur is relatively sparse prior to 1969, however [cf., @be03], which restricts its usefulness mainly to the last four decades.
The Group “Betelgeuse” brightness estimates for RT Aur are a mix of different sources: individual eye estimates obtained between 1989 and 2000, as well as from 2005 to 2007, by individual group members, using low power oculars and wide field telescopes, and eye estimates from photographs in the plate archives of Odessa and Minsk. The archival photographic material dates from 1988 to 1996, and consists of panchromatic GZS-2 film with a magnitude limit of $V = 9.0$, and A500 film exposed through a UV filter with a magnitude limit of $B = 9.0-9.5$. Typically 2–4 reference stars differing in brightness by $\sim 0.5$ magnitude were used for comparison purposes, with individual estimates made using the step method. Some typical light curves are illustrated in Figure 3, where the superior quality of eye estimates from single observers over those of inhomogeneous groups is evident.
We also obtained new $V-$band photometry for RT Aur during January, February, and March 2007 using a ST9 CCD camera equipped with Bessel filters on the 0.28-m C11 Schmidt-Cassegrain telescope of the automated Abbey Ridge Observatory of Dave Lane. The data were normalized using the previously-constructed standard light curve. The observations are listed in Table 1, along with phases computed as indicated previously.
For reference purposes, we list in Table 2 the times for light maximum compiled by Goransky and not compiled elsewhere in the literature. Some of the cited values are of indeterminate authorship.
Analysis
========
Seasonal light curves for RT Aur were constructed from the observational data, and were matched to the standard $B$ and $V$ light curves using the robust software described previously [@tu98]. Despite the large amount of scatter in the AAVSO observations, the large number of individual estimates results in relatively precise O–C estimates, as indicated by the small scatter for the AAVSO values in Figure 4 (upper). The individual light curves from the Group “Betelgeuse” data exhibit slightly smaller scatter, but generally result in less accurate O–C values because of the smaller number of individual estimates, according to Figure 4 (lower). Both sets of observations confirm the trend indicated by the O–C data derived by other observers, primarily amateur astronomers (Figure 1, lower). It is not clear from the O–C estimates cited by @wu92, @ko06, and @me04 [@me06] how the times of light maximum were derived, but the techniques are apparently less robust than the variant of Hertzsprung’s method employed here.
The new photometry obtained here (Table 1), as well as visual observations of the Cepheid by Bryukhanov between December 2006 and April 2007, also display a phase shift relative to the standard light curve, as evident from Figure 5, that confirms the O–C trend of the other observations. A compilation of all O–C estimates from the present study is given in Table 3, including, where possible, reworkings of older data sets available in the literature.
The complete set of O–C data, including the values compiled by @sz77 [@sz91], that of @ke71 cited by @fe93, @wu92, @ko06 as given in Table 2, and @me04 [@me06] is illustrated in Figure 6 (lower), relative to the situation that existed prior to 1980 (Figure 6, upper). A weighted least squares fit of a parabola to the full data set indicates that RT Aur is undergoing an overall period [*increase*]{} rather than a period decrease, at a calculated rate of $+0.082 \pm 0.012$ s yr$^{-1}$. The value is consistent with the 3.7-day pulsation period of RT Aur, as indicated by its location in the period change diagram of Figure 7, which is adapted from Fig. 5 of @te06. RT Aur has a pulsational amplitude near the maximum value displayed by Cepheids with periods of $\sim4$ days, so must lie near the center of the instability strip, in fact slightly towards the hot edge from strip center [@te06]. The location of the O–C datum for RT Aur in Figure 7 is almost exactly that expected for a 3.7-day Cepheid in the third crossing of the instability strip lying slightly blueward of strip center.
It is possible to remove the parabolic evolutionary trend in the O–C data of Figure 6 (lower), and also correct for errors in the adopted ephemeris. The resulting O–C residuals for RT Aur are plotted in Figure 8, and are analyzed below.
The sinusoidal trend of the O–C data residuals for RT Aur is a feature observed in a few other Cepheids. In some cases such trends arise from random fluctuations in pulsation period for the stars, e.g. SV Vul [@tb01; @tb04]. One can test for the effect by analyzing the residuals using the procedure developed by @ed29, see @tb01. One examines the temporal differences $a(r)$ of each $r^{\rm th}$ observed light maximum residual from the null relation to compute the accumulated delays $u(x) = a(r+x) - a(r)$ between maxima separated by $x$ cycles. According to @ed29, the average value $\langle\;u(x)\;\rangle$ for the accumulated delays between light maxima separated by $x$ cycles, without regard for sign, is correlated with any random fluctuations in period $e$ by: $$\langle\;u(x)\;\rangle^2 = 2 a^2 + x e^2 ,$$ where $a$ is the size of the random errors in the measured times of light maximum.
For RT Aur the results over 1000 cycles (not shown) yield a best-fitting weighted relation given by: $$\langle\;u(x)\;\rangle^2 = 0.017 (\pm 0.023) + 0.0000 (\pm 0.0001) x .$$ The zero-point for the relation, $a = 0.092\pm0.108$, implies uncertainties in the calculated times of light maximum of order $\pm0.34$ day ($\sim8$ hours), which is reasonable although significantly larger than the uncertainties generated by Hertzsprung’s method. The slope of the relation corresponds to a value for the randomness parameter of magnitude $e = 0.002
\pm0.006$, consistent with a null result. It appears that the sinusoidal trend in the O–C residuals for RT Aur cannot be attributed to random fluctuations in period, according to an Eddington test performed on the observational data.
Alternatively, the trend may arise from light travel time effects in a binary system. The O–C residuals were examined for periodicity through a Fourier analysis, which produced a strong, well-defined signal for $P = 26,429\pm89$ days, or $72.36\pm0.24$ years. The data phased to that period and an arbitrary zero-point of HJD 2410000 are shown in Figure 9 (upper). A least squares fit of a sine wave to the data gives a value of $a_1\;{\rm sin}\;i = 0.0619\pm0.0090$ light day $= 10.72\pm1.56$ A.U. $ = 1.60\;(\pm0.23)\times10^9$ km for the orbit of the Cepheid about the system barycenter. Of course, the orbit need not be circular; the adoption of $e = 0$ in the analysis was predicated by the scatter in the O–C residuals and the lack of solid evidence for a non-sinusoidal trend.
The sine wave solution also yields a mass function for the putative binary system of $M_2^3\;{\rm sin}\;i\;(M_1+M_2)^{-2} = 0.236\pm0.059\;M_{\sun}$. Such a large mass function implies a relatively high mass for the companion, as well as a strong likelihood that the orbit is nearly edge-on. With a mass of $M_1 = 4.7\pm0.3\;M_{\sun}$ for a fundamental mode Cepheid with the pulsation period of RT Aur [@tu96], the implied minimum mass for the secondary is of order $M_2 = 2.25\pm0.35\;M_{\sun}$, typical of a B9-A0 dwarf. Such a large mass for the companion is ruled out, however, both by the color variations of the Cepheid [@le86], which display no indication of a blue secondary, and by its ultraviolet spectrum [@ev92], the latter indicating that any main sequence secondary for RT Aur must be cooler than spectral type A4, or $\sim1.7\;M_{\sun}$. Conceivably there is an additional factor affecting the O–C variations other than random fluctuations in period or light travel time effects.
Radial velocity observations may provide a resolution to the paradox. @sz91 has summarized the available systemic velocities for RT Aur to 1991, to which we have added additional measures from the radial velocities tabulated by @go98 and @ki00, with pulsational variations removed. The combined data phased to the ephemeris adopted for the O–C residuals are plotted in Figure 9 (lower). For orbital motion the radial velocity variations are a quarter cycle out of step with the O–C residuals, and leading them, so a sine wave with those characteristics was crudely fit by eye to the observations. The expected radial velocity half-amplitude according to the orbital solution is $\sim4.4$ km s$^{-1}$, but the observations appear to permit only a smaller value that we estimate as $K = 2.5\pm0.5$ km s$^{-1}$, with an implied systemic velocity of $18.4$ km s$^{-1}$. The projected orbital radius for the primary in this case is $a_1\;{\rm sin}\;i =
9.09\;(\pm1.82)\times10^8$ km $= 6.07\pm1.21$ A.U., which results in a mass function of $M_2^3\;{\rm sin}\;i\;(M_1+M_2)^{-2} =
0.043\pm0.015\;M_{\sun}$.
The radial velocity solution implies a minimum mass for the secondary of order $M_2 = 1.15\pm0.25\;M_{\sun}$, typical of a F7 dwarf. Such a solution is permitted by the lack of a companion detected through color variations and ultraviolet spectra, but rests upon an incomplete radial velocity solution. By chance the archival radial velocity observations of RT Aur are roughly coincident in orbital phase with more modern measurements, so only a third of the orbital cycle is covered observationally. There is also a potential zero-point offset for the earliest observations, which are those of @du08, remeasured by @pe34 with similar results. The 1908 measures agree with the trend of the other radial velocity data only if they are systematically $\sim3$ km s$^{-1}$ too positive. Given that zero-point offsets of order $1-2$ km s$^{-1}$ are present even in some modern radial velocity measurements, a correction of that amount seems reasonable. Of course, it is conceivable that the effect may also indicate the presence of a third star in the system, but that is difficult to test with the available data. Certainly an improved spectroscopic orbital solution is only possible with a focused observational spectroscopic program on RT Aur over the next half century, clearly a challenging task.
Discussion
==========
The value of continued monitoring of Cepheid variables in an era when professional observations of such stars are declining is illustrated clearly by the case of RT Aur. Circa 1993 when Fernie reviewed the situation [@fe93], the available observations implied a regular period decrease for the Cepheid. Yet observations since then imply exactly the opposite: RT Aur appears to be undergoing a regular period increase. The calculated rate of $+0.082 \pm 0.012$ s yr$^{-1}$is exactly that expected for a Cepheid in the third crossing of the instability strip lying near strip center, despite a superposed sinusoidal trend in the O–C data implying an additional complication.
The possibility that RT Aur is undergoing random fluctuations in pulsation period is eliminated by an Eddington test on the residuals. The trend is consistent, however, with light time effects expected if RT Aur is orbiting an unseen companion. The inferred minimum mass for the unseen companion is of order $2.25\pm0.35\;M_{\sun}$ from the O–C residuals, but only of order $1.15\pm0.25\;M_{\sun}$ according to the orbital radial velocity variations. The latter value is consistent with the lack of any evidence for a hot companion evident in the Cepheid’s color variations and ultraviolet spectra. Additional observations of the star, and spectroscopic measurements in particular, may provide a more definitive estimate for the companion’s characteristics.
The remarkable change in the O–C trend for RT Aur, namely the switch from a period decrease prior to 1980 to a dominant period increase since then, is unusual but not without precedent. The 23-day Cepheid WZ Car, for example, appears to have changed from a regular period increase prior to 1973 to a regular period decrease since then [@te03], while the 4-day Cepheid Polaris underwent an astonishing glitch in its regular period increase circa 1963-66 [@te05] that is difficult to explain. Other surprises may be in store when a complete sample of Cepheid period changes is examined.
We acknowledge with thanks the variable star observations from the AAVSO International Database contributed by observers worldwide and used in this research. We are also grateful to the referee, Laszlo Szabados, for several useful suggestions that provided greater depth to the original study, and to Nicolai Samus and Vitaly Goransky for information on archival observations of RT Aur.
Anonymous 1987, Perem. Zvezdy, 22, 617 Barnes, T. G., III, Fernley, J. A., Frueh, M. L., Navas, J. G., Moffett, T. J., & Skillen, I. 1997, , 109, 645 Bennett, A. L. 1941, , 93, 52 Berdnikov, L. N., Ignatova, V. V., & Vozyakova, O. V. 1997, Astron. Astrophys. Trans., 14, 237 Berdnikov, L., Mattei, J. A., & Beck, S. J. 2003, J. AAVSO, 31, 146 Boninsegna, R. 1982, GEOS Note Circulaire, No. 322 Budquest, J. 1981, GEOS Note Circulaire, No. 270 Dufay, J. 1947, AnAp, 10, 80 Duncan, J. C. 1908, Lick Obs. Bull., 5, 82 Eddington, A. S., & Plakidis, S. 1929, , 90, 65 Eggen, O. J. 1985, , 90, 1297 Eggen, O. J., Gascoigne, S. C. B., Burr E. J. 1957, , 117, 406 ESA 1997, The Hipparcos and Tycho Catalogues, ESA SP-1200 (ESA: Noordwijk) Evans, N. R. 1976, , 32, 399 Evans, N. R. 1992, , 384, 220 Feltz, K. A., Jr., & McNamara, D. H. 1980, , 92, 609 Fernie, J. D. 1993, IBVS, No. 3854, 1 Henden, A. A. 2006, Observations from the AAVSO International Database, private communication Goldman, H., Ratz, M., Ratz, K., & Hinzpeter, A. 1988, MVS, 11, H. 7, 150 Gorynya, N. A., Samus, N.N., Sachkov, M. E., Rastorguev, A. S., Glushkova, E. V., & Antipin, S. V. 1998, Pis’ma Astron. Zh., 24, 939 Harris, H. C. 1980, Ph.D. Thesis, University of Washington Kelsall, T. 1971, GSFC Preprint X-641-71-184, Ph.D. thesis, Univ. Maryland Kholopov, P. N., Samus, N. N., Frolov, M. S., Goranskij, V. P., Gorynya, N. A., Kireeva, N. N., Kukarkina, N. P., Kurochkin, N. E., Medvedeva, G. I., Perova, N. B., & Shugarov, S. Yu. 1985, General Catalogue of Variable Stars, Fourth Edition (Nauka Publ. House: Moscow) Kiss, L. L. 1998, J. Astron. Data, 4, No. 3 Kiss, L. L., & Vinko, J. 2000, , 314, 420 Kosinsky, A. S., Tamello, V. G., Kushmar, I. J., Bryukhanov, I. S., Semenyuta, A. S., & Balyuk, I. I. 2006, Belarussian Correspondence Astronomical Club, on-line publication Kukarkin, B. V. 1935, Perem. Zvezdy (NNVS), 4, 383 Kukarkin, B. V., Kholopov, P. N., Efremov, Yu. N., Kukarkina, N. P., Kurochkin, N. E., Medvedeva, G. I., Perova, N. B., Fedorovich, V. P., & Frolov, M. S. 1969, General Catalogue of Variable Stars, Third Edition (Sternberg State Astronomical Institute: Moscow) Leonard, P. J. T., & Turner, D. G. 1986, , 80, 240 Markwick, E. E., &Williams, A. S. 1904, J. BAA, 15, 245 Mergentaler, J. 1941, A. Zh., 18, No 3, 209 Meyer, R. 2004, BAV Rundbrief, 53, 37 Meyer, R. 2006, Open European J. Var. Stars, 1, 1 Mitchell, R. I., Iriarte, B., Steinmetz, D., & Johnson, H. L. 1964, Bol. Observ. Tonantzintla y Tacubaya, 3, 153 Moffett, T. J., & Barnes T. G. 1984, , 55, 389 Parenago, P. P. 1958, Perem. Zvezdy, 11, 236 Petrie, R. M. 1934, Publ. Obs. Michigan, 5, 82 Prokof’eva, V. V., 1961, Izv. Krym. Astrophys. Obs., 25, 3 Ratz, M., & Shille, K. 1988, MVS, 11, H. 7, 164 Schaltenbrand, R., & Tammann, G. A. 1971, , 4, 265 Soloviev, A. 1922, Izv. Obsch. Mirov., c. 99 Struve, O. 1959, , 18, 309 Szabados, L. 1977, Comm. Konkoly Obs. Hung. Acad. Sci., No. 70 Szabados, L. 1983, , 96, 185 Szabados, L. 1991, Comm. Konkoly Obs. Hung. Acad. Sci., No. 96 Takase, B., 1969, Ann. Tokyo Astron. Obs., II Ser., No. 191, 2233 Turner, D. G. 1996, , 90, 82 Turner, D. G. 1998, J. AAVSO, 26, 101 Turner, D. G. 2000, J. AAVSO, 28, 116 Turner, D. G., & Berdnikov, L. N. 2001, Odessa Astron. Publ., 14, 170 Turner, D. G., & Berdnikov, L. N. 2004, , 423, 335 Turner, D. G., Berdnikov, L. N., & Abdel-Sabour, M. A. 2003, , 97, 216 Turner, D. G., Savoy, J., Derrah, J., Abdel-Sabour Abdel-Latif, M., & Berdnikov, L. N. 2005, , 117, 207 Turner, D. G., Abdel-Sabour Abdel-Latif, M., & Berdnikov, L. N. 2006, , 118, 410 Williams, A. S. 1905, Astron. Nachr., 168, 211 Williams, J. A., 1966, , 71, 615 Winzer, J. E. 1973, , 78, 618 Wisniewski, W. Z., & Johnson, H. L., 1968, Com.. Lunar and Planet. Lab., 7, 57 Wunder, E. 1992, BAV Rundbrief, 41, 618
[ccc]{}
2,454,114.4960 &0.504 &5.601\
2,454,122.5157 &0.655 &5.766\
2,454,122.6002 &0.678 &5.791\
2,454,123.4933 &0.917 &5.707\
2,454,124.5660 &0.205 &5.231\
2,454,124.8261 &0.275 &5.300\
2,454,128.5226 &0.266 &5.318\
2,454,128.6473 &0.300 &5.360\
2,454,135.5390 &0.148 &5.184\
2,454,135.6977 &0.191 &5.228\
2,454,136.6442 &0.445 &5.554\
2,454,167.5417 &0.732 &5.778\
2,454,183.6046 &0.041 &5.051\
[rrrcl]{}
2,417,173.360 &–6585 &+0.128 &0.5 &@wi05\
2,418,347.279 &–6270 &–0.348 &0.0 &@me41\
2,420,957.478 &–5570 &+0.082 &1.0 &@ku35\
2,422,784.241 &–5080 &+0.008 &1.0 &@so22\
2,436,146.219 &–1496 &–0.027 &1.0 &@st71\
2,442,838.410 &+299 &–0.026 &0.5 &@bo82\
2,443,181.270 &+391 &–0.164 &0.5 &@bu81\
2,443,490.870 &+474 &–0.008 &0.5 &@bu81\
2,443,535.540 &+486 &–0.077 &0.5 &@bu81\
2,443,550.370 &+490 &–0.160 &0.5 &@bu81\
2,443,990.420 &+608 &–0.042 &1.0 &@ha80\
2,446,488.580 &+1278 &+0.197 &0.5 &@go88\
2,446,518.405 &+1286 &+0.196 &0.5 &@go88\
2,446,824.299 &+1368 &+0.374 &0.0 &@go88\
2,446,827.900 &+1369 &+0.247 &0.5 &@go88\
2,446,850.298 &+1375 &+0.276 &0.5 &@go88\
2,446,917.304 &+1393 &+0.173 &1.0 &@an87\
2,447,148.220 &+1455 &–0.062 &0.5 &@rs88\
2,447,152.230 &+1456 &+0.220 &1.0 &@an87\
2,447,234.249 &+1478 &+0.218 &1.0 &@an87\
[rrrccl]{}
2,421,300.634 &–5478 &+0.240 &0.5 &43 &AAVSO [@he06]\
2,421,647.171 &–5385 &+0.051 &0.5 &29 &AAVSO [@he06]\
2,422,747.108 &–5090 &+0.157 &0.5 &25 &AAVSO [@he06]\
2,426,419.438 &–4105 &+0.170 &2.0 &18 &@du47\
2,426,971.249 &–3957 &+0.202 &2.0 &46 &@du47\
2,427,504.400 &–3814 &+0.215 &1.0 &6 &@du47\
2,429,249.163 &–3346 &+0.161 &3.0 &204 &@be41\
2,429,625.692 &–3245 &+0.138 &3.0 &98 &@be41\
2,432,955.026 &–2352 &+0.154 &3.0 &14 &@eg57\
2,434,405.262 &–1963 &+0.104 &3.0 &9 &@eg57\
2,435,821.997 &–1583 &+0.108 &3.0 &40 &@pr61\
2,437,126.806 &–1233 &+0.034 &3.0 &10 &@mi64\
2,438,010.307 &–996 &–0.059 &2.0 &4 &@wi66\
2,438,424.195 &–885 &–0.005 &3.0 &13 &@wj68\
2,439,132.508 &–695 &–0.058 &3.0 &20 &@ta69\
2,439,147.429 &–691 &–0.050 &3.0 &19 &@wj68\
2,440,079.464 &–441 &–0.075 &0.5 &16 &AAVSO [@he06]\
2,440,351.595 &–368 &–0.105 &0.5 &50 &AAVSO [@he06]\
2,440,675.924 &–281 &–0.133 &0.5 &57 &AAVSO [@he06]\
2,440,981.756 &–199 &–0.016 &2.0 &20 &@fm80\
2,440,996.641 &–195 &–0.045 &3.0 &5 &@ev76\
2,441,030.238 &–186 &–0.001 &0.5 &44 &AAVSO [@he06]\
2,441,250.206 &–127 &+0.000 &3.0 &88 &@wi73\
2,441,705.070 &–5 &+0.019 &3.0 &20 &@sz77\
2,441,854.201 &+35 &+0.020 &1.0 &177 &AAVSO [@he06]\
2,442,137.473 &+111 &–0.054 &0.5 &119 &AAVSO [@he06]\
2,442,525.277 &+215 &+0.013 &0.5 &234 &AAVSO [@he06]\
2,442,920.412 &+321 &–0.045 &0.5 &179 &AAVSO [@he06]\
2,443,241.186 &+407 &+0.100 &0.5 &123 &AAVSO [@he06]\
2,443,539.286 &+487 &–0.059 &2.0 &7 &@mb84\
2,443,975.518 &+604 &–0.031 &3.0 &23 &@mb84\
2,444,135.795 &+647 &–0.069 &0.5 &99 &AAVSO [@he06]\
2,444,378.093 &+712 &–0.106 &0.5 &171 &AAVSO [@he06]\
2,444,534.792 &+754 &+0.007 &3.0 &7 &@eg85\
2,444,758.522 &+814 &+0.042 &1.0 &147 &AAVSO [@he06]\
2,445,108.977 &+908 &+0.043 &1.0 &190 &AAVSO [@he06]\
2,445,463.189 &+1003 &+0.072 &1.0 &168 &AAVSO [@he06]\
2,445,835.952 &+1103 &+0.011 &1.0 &153 &AAVSO [@he06]\
2,446,190.169 &+1198 &+0.045 &1.0 &159 &AAVSO [@he06]\
2,446,398.941 &+1254 &+0.035 &2.0 &23 & Minsk archives\
2,446,563.027 &+1298 &+0.079 &1.0 &166 &AAVSO [@he06]\
2,446,842.574 &+1373 &+0.008 &2.0 &26 &Bryukhanov\
2,446,935.870 &+1398 &+0.098 &1.0 &161 &AAVSO [@he06]\
2,447,308.614 &+1498 &+0.018 &1.0 &182 &AAVSO [@he06]\
2,447,465.342 &+1540 &+0.160 &3.0 &27 &@ba97\
2,447,562.026 &+1566 &–0.091 &1.0 &54 &Odessa archives\
2,447,707.593 &+1605 &+0.076 &1.0 &124 &AAVSO [@he06]\
2,447,942.456 &+1668 &+0.059 &1.0 &92 &Sergey\
2,447,949.853 &+1670 &+0.000 &1.0 &54 &Odessa archives\
2,447,949.888 &+1670 &+0.035 &1.0 &314 &Kosa-Kiss et al.\
2,448,061.730 &+1700 &+0.029 &1.0 &161 &AAVSO [@he06]\
2,448,251.930 &+1751 &+0.089 &1.0 &69 &Sergey\
2,448,270.569 &+1756 &+0.087 &1.0 &114 &Schukin, Sergey, Kosa-Kiss, Mamedov\
2,448,304.135 &+1765 &+0.098 &2.0 &94 &Minsk archives\
2,448,382.431 &+1786 &+0.102 &1.0 &131 &AAVSO [@he06]\
2,448,490.52 &+1815 &+0.078 &3.0 &69 &Hipparcos\
2,448,617.050 &+1849 &–0.158 &0.5 &28 &Sergey\
2,448,632.137 &+1853 &+0.015 &1.0 &57 &Narkevich\
2,448,662.024 &+1861 &+0.076 &1.0 &105 &Minsk archives\
2,448,710.490 &+1874 &+0.076 &1.0 &44 &Grigorenko\
2,448,796.305 &+1897 &+0.142 &1.0 &117 &AAVSO [@he06]\
2,448,997.475 &+1951 &–0.014 &1.0 &53 &Narkevich\
2,448,997.622 &+1951 &+0.133 &1.0 &53 &Minsk archives\
2,449,016.242 &+1956 &+0.112 &1.0 &36 &Sergey\
2,449,083.323 &+1974 &+0.084 &1.0 &289 &AAVSO [@he06]\
2,449,269.725 &+2024 &+0.075 &1.0 &52 &Minsk archives\
2,449,269.785 &+2024 &+0.135 &1.0 &52 &Kosinski\
2,449,362.956 &+2049 &+0.100 &1.0 &48 &Sergey\
2,449,530.673 &+2094 &+0.045 &0.5 &334 &AAVSO [@he06]\
2,449,735.831 &+2149 &+0.151 &1.0 &68 &Minsk archives\
2,449,888.560 &+2190 &+0.022 &0.5 &362 &AAVSO [@he06]\
2,450,015.384 &+2224 &+0.086 &3.0 &9 &@be97\
2,450,112.202 &+2250 &–0.031 &1.0 &55 &Minsk archives\
2,450,164.357 &+2264 &–0.071 &1.0 &64 &Sergey\
2,450,198.098 &+2273 &+0.116 &3.0 &19 &@ki98\
2,450,242.841 &+2285 &+0.120 &1.0 &418 &AAVSO [@he06]\
2,450,511.291 &+2357 &+0.137 &1.0 &343 &AAVSO [@he06]\
2,450,757.365 &+2423 &+0.147 &1.0 &156 &AAVSO [@he06]\
2,450,865.339 &+2452 &+0.002 &1.0 &47 &Sergey\
2,450,884.076 &+2457 &+0.098 &1.0 &283 &AAVSO [@he06]\
2,451,126.393 &+2522 &+0.079 &1.0 &206 &AAVSO [@he06]\
2,451,245.622 &+2554 &+0.004 &0.5 &597 &AAVSO [@he06]\
2,451,488.012 &+2619 &+0.059 &1.0 &110 &AAVSO [@he06]\
2,451,674.434 &+2669 &+0.069 &1.0 &333 &AAVSO [@he06]\
2,452,036.067 &+2766 &+0.063 &1.0 &392 &AAVSO [@he06]\
2,452,371.704 &+2856 &+0.158 &1.0 &269 &AAVSO [@he06]\
2,452,815.341 &+2975 &+0.135 &1.0 &205 &AAVSO [@he06]\
2,453,128.586 &+3059 &+0.207 &0.5 &232 &AAVSO [@he06]\
2,453,438.082 &+3142 &+0.259 &1.0 &28 &Semenyuta\
2,453,478.956 &+3153 &+0.122 &2.0 &57 &Balyuk\
2,453,508.822 &+3161 &+0.163 &0.5 &282 &AAVSO [@he06]\
2,453,780.985 &+3234 &+0.164 &0.5 &138 &AAVSO [@he06]\
2,454,131.557 &+3328 &+0.282 &2.0 &13 &Abbey Ridge data\
2,454,153.871 &+3334 &+0.226 &1.0 &45 &Bryukhanov\
| 2024-04-17T01:26:19.665474 | https://example.com/article/3653 |
---
abstract: 'We present [[*HST*]{}]{} observations that show a bifurcation of colors in the middle main sequence of the globular cluster $\omega$ Centauri. We see this in three different fields, observed with different cameras and filters. We also present high precision photometry of a central ACS field which shows a number of main-sequence turnoffs and subgiant branches. The double main sequence, the multiple turnoffs and subgiant branches, and other population sequences discovered in the past along the red giant branch of this cluster add up to a fascinating but frustrating puzzle. We suggest various explanations, none of them very conclusive.'
author:
- 'Luigi R. Bedin, Giampaolo Piotto, Jay Anderson, Santi Cassisi, Ivan R. King, Yazan Momany, and Giovanni Carraro'
title: 'OMEGA CENTAURI: THE POPULATION PUZZLE GOES DEEPER[^1]'
---
Introduction
============
A number of properties (total mass, chemical composition, kinematics, and spatial distribution of the stars) make $\omega$ Centauri a peculiar object among Galactic globular clusters. The most evident anomaly is the large spread in metallicity seen both in spectroscopic (Norris & Da Costa 1995) and photometric (Hilker & Richtler 2000, Lee et al. 1999, Pancino et al. 2000) investigations.
Most of the fascinating results on [[$\omega$ Cen]{}]{} come from the evolved stellar population, which can be studied in detail from the ground. In this paper we use [[*HST*]{}]{} data to explore the cluster’s turnoff (TO) and main-sequence (MS) populations. While studies of the evolved red giant branch (RGB) can explore metallicity, kinematic, and spatial-distribution issues, we need the fainter stars if we hope to learn anything about ages and mass functions, and to give us better statistics (there are $\sim$10 MS stars for every RGB star).
The present paper was stimulated by preliminary results by one of us (Anderson 1997, 2002, 2003), on the presence of multiple turnoffs and of a bifurcated main sequence (MS). Here we confirm that the unusual features found in the color-magnitude diagrams are not some data-reduction artifact, or a local phenomenon. The features are real and are present throughout the cluster. Unfortunately, the striking results we present here lead to more questions than they answer. Though it will take a lot of time to fully exploit the [[$\omega$ Cen]{}]{} data stored in the [[*HST*]{}]{} archive (and we are working on this), we think that these new results are worthy of immediate publication because of their importance to the ongoing debate on the nature of this object.
Observations and Data Reduction
===============================
In this paper we use WFPC2 and ACS [[*HST*]{}]{} data to construct color–magnitude diagrams (CMDs) which extend from 1–2 magnitudes above the TO to more than 7 magnitudes below it. In particular, we have used the following sets of images: 1) GO 9444 (ACS/WFC): 4$\times$1350s F814W and 4$\times$1350s F606W; 2) GO 9442 (ACS/WFC): 27$\times$340s F435W and 36$\times$440s F658N (a $3\times3$ mosaic at the center); 3) GO 6821 (WFPC2): 2$\times$1s, 2$\times$10s, 8$\times$100s in F675W, and 26s, 2$\times$260s in F336W; 4) GO 5370 (WFPC2): 2$\times$300s, 600s F606W, and 2$\times$400s, 1000s in F814W. All these images have been reduced with the algorithms described in Anderson & King (2000). Photometric calibration has been done according to the Holtzman et al. (1995) flight system for the WFPC2 data; for ACS/WFC we used the preliminary Vega System zero points available on the ACS website.
The color–magnitude diagram: observational evidence
===================================================
The left part of Figure 1 shows four CMDs: the two upper panels focus on the turnoff region, and the lower ones on the main-sequence region. Panel a shows the original WFPC2 CMD that first discovered the lower turnoff (LTO) sequence (Anderson 2003). Panel b shows the same sequence (from WFC data) with many more details and more stars, from a larger region of the cluster. There are a number of distinct TOs and subgiant branches (SGBs), and the connection of the LTO to the metal-rich red giant branch (called RGB-a by Pancino et al. 2000) can be seen more clearly with more stars. We show H$\alpha$ photometry here instead of $R_{625}$ because there are more exposures and we can therefore make a better estimate of the photometric errors.
Ferraro et al. (2004) reduced the same ACS field in their recent study of the LTO population. They made the obvious association that this LTO corresponds to the metal-rich (\[Fe/H\] $\sim\!-0.5$) RGB-a population, and found that it could be fit only with an old (15 Gyr) isochrone. They found little or no age difference between the metal-rich and metal-poor populations. In our diagram, it is clear that not only is there a lower subgiant branch, but we can also see the lower turnoff at a color that is clearly redward of the main population sequence. We also see several SGBs: the LTO SGB, a distinct SGB at the bright end of the main population, and some distinct structure in the region between the upper and lower SGB. Clearly, this is telling us a lot about the cluster’s populations, but the interpretation is complicated by age, metallicity, and distance degeneracies. We will confine the focus of this letter to the populations farther down the main-sequence, deferring a detailed analysis of the turnoff population to when all the WFC central data have been reduced and some information on the metallicity of the different TO-SGBs will be available.
Surely the most intriguing feature in the CMDs of Fig. 1 is the double main sequence (DMS), which is clearly visible in the bottom two panels (c, d). Panel c shows the original $V_{606}\,$vs.$\,V_{606}\!-\!I_{814}$ WFPC2 CMD from Anderson (1997, 2002), where the DMS was first identified. Not only is the main sequence much broader than photometric errors, it appears to bifurcate into two distinct sequences, with a region between the two that is almost devoid of stars. Panel d shows a new $V_{606}\,$vs.$\,V_{606}\!-\!I_{814}$ CMD from ACS/WFC images, which also shows the anomalous DMS in a different field, at 17$'$ from the center. The DMS can even be discerned in the very inner part of the cluster (panels b and e).
We have CMDs from different fields, observed with two different cameras, in different photometric bands. The anomalous DMS is present in all four (panels b, c, d, e). There can be no doubt that the double sequence is a real and ubiquitous feature in [[$\omega$ Cen]{}]{}.
If we were to guess what the main sequence should look like from our knowledge of the stars on the giant branch, we would expect a sequence about 0.03 mag in width, with a concentration to a blue edge, corresponding to the metal-poor (MP) population containing about 65$\%$ of the stars, a tail to the red corresponding to the intermediate-metallicity (Mint) population containing about 30$\%$ of the stars, and a small even redder component from the metal-rich RGB-a population with 5$\%$ of the stars (we adopt the population labels from Pancino et al. 2000). The sequence we observe here could not be more different from these expectations.
Let us take note of a few simple facts from Fig. 1: (1) The two sequences are clearly separated, at least in the interval $22<V_{606}<20.5$, with a region almost devoid of stars between them. (2) The bluer MS (bMS) is much less populous than the red MS (rMS). The bMS contains 25$\%$ to 35$\%$ of the stars. (3) The DMS extends down to at least $V_{606}\sim23.5$. Below this, the bMS appears to vanish, though it is difficult to say for sure if it peters out, or if it blends with the rMS as the photometric errors increase. (4) Finally we note that panels b and e show clearly that the bMS is a different population from the LTO–RGB-a population.
The DMS that we observe represents a real puzzle for at least two reasons. First, the bifurcation itself is puzzling. As summarized above, the many detailed photometric and spectroscopic investigations of the RGB indicate a spread of metallicities, not two distinct populations. The only truly distinct population seen is the metal-rich component. Second, the less populous of our two MSs is the blue one. This is even more difficult to understand. Assuming that all the stars in the two MSs are members of [[$\omega$ Cen]{}]{}, any canonical stellar models with canonical chemical abundances tell us that the bMS [*must*]{} be more metal poor than the rMS. However, both spectroscopic (Norris & Da Costa 1995) and photometric (e.g., Hilker & Richtler 2000) investigations show that the distribution in metallicity of the [[$\omega$ Cen]{}]{} stars begins with a peak at \[Fe/H\] $\!\sim\!-1.6$, and then tails off on the metal-rich side.
Comparison with theoretical models
==================================
The previous section has confronted us with several seemingly contradictory observational facts concerning the CMD and populations of [[$\omega$ Cen]{}]{}. In this section we will see what light stellar models can shed on the situation. Because the ACS photometric system is not yet adequately calibrated, we will confine our isochrone-fitting analysis to the WFPC2 data. The adopted stellar models are an extension of the updated evolutionary models for very-low-mass stars and more massive ones presented by Cassisi et al. (1999, 2000). All models and isochrones have been transformed into the WFPC2 observational planes by using the accurate bolometric corrections kindly provided to us by F. Allard (see also Allard et al. 1997).
In fitting the stellar models we have adopted a reddening $E(B-V)=0.13$ and a distance modulus $(m-M)_0=13.6$. We used the absorption coefficients for the WFPC2 bands listed in Table 12b of Holtzman et al. (1995). For the F606W band we adopted a mean of the absorption coefficients in F555W and F675W. In Figure 2a and 2c we have overplotted 4 sets of isochrones, corresponding to metallicities from \[Fe/H\] $\!=\!-2.1$ to $-0.6$, which covers the entire metallicity range of the stellar population of [[$\omega$ Cen]{}]{} (Norris & Da Costa 1995), and corresponding to an age of 14 Gyr.
Since we are able to see the actual turnoff and not just the SGB (as in Ferraro et al. 2004), and since we use a $U\!-\!R\,$ CMD, we are more sensitive to the population’s metallicity. Panel a of Fig. 2 shows that a more metal-poor isochrone would fit the LTO better. Indeed, Origlia et al. (2003) have shown that the RGB-a stars have a metallicity in the interval $-0.9<$ \[Fe/H\] $<\!-0.5$. It does appear that the LTO population would be fit with a metallicity near the middle of this range.
Panel b of Fig. 2 shows the cluster main sequence in the F606W vs.F606W$-$F814W bands, along with isochrones for the cluster’s metallicity range. There are several features worth noting: first, the \[Fe/H\] $=\!-1.6$ isochrone clearly follows along the rMS. Second, canonical models are not able to explain the bMS. In order to explain the 0.06 mag $V-I$ color difference between the two sequences at $V$ $\sim$ 21, we would have to assume that the bMS stars are extremely metal-poor (\[Fe/H\] $\ll \!-$2.0), though it would seem absurd to have such a large population of low-metallicity MS stars when there is no evidence whatever for such stars along the much-studied RGB. The only way to force the model to fit the two sequences with the metallicity spread seen in the RGB would be to shift the models arbitrarily in color and/or magnitude.
We can imagine four possible explanations, though we admit that all of them seem far-fetched. (1) The models or calibrations are grossly in error [*and*]{} the distribution of metallicities is vastly different for the RGB stars than for the MS stars. (2) The bMS represents some super-metal-poor population (\[Fe/H\] $\ll-2.0$). (3) The bMS represents a super-helium-rich ($Y\geq0.3$) population. (4) The bMS represents a population of stars about 1–2 kpc behind [[$\omega$ Cen]{}]{}. We examine these four possibilities in the following section.
Discussion
==========
One way to interpret the observations is to assume that either the photometric calibration or the isochrones are in error. If the net error is 0.06 mag in $V-I$ color, then perhaps the metal-poor (MP) population (\[Fe/H\] $=\!-1.6$) follows along the bMS instead of along the rMS. If this is the case then the rMS would correspond to the metal-rich population (\[Fe/H\] $=\!-0.5$), as the 0.06 mag $V\!-\!I$ separation cannot be explained by the metallicity difference between the MP and Mint populations. (While it may be conceivable that the isochrones could have errors in an absolute sense, they should be reliable in a differential sense.) There are additional problems with this interpretation. First is that only 5$\%$ of the RGB stars are metal rich, but in this scenario over 70$\%$ of the MS stars would be metal rich. This would imply drastically different mass functions, such as have never been seen before anywhere (see Piotto & Zoccali 1999). Furthermore, there is no actual gap in the observed metallicity distribution and in the color distribution of the RGBs of the MP and Mint populations. Most importantly, the fact that the MS extension of the LTO runs parallel to the rMS (on the red side of it, panel e) makes this scenario impossible.
The second interpretation is that the rMS corresponds to the MP stars, but the bMS corresponds to a super-metal-poor population, with \[Fe/H\] $\ll\!-2$. However, such a large population of metal-poor stars has never been observed in [[$\omega$ Cen]{}]{} or in any other globular.
The third possibility is that the populations of the two MSs have sensibly different helium content ($Y$). Norris, Freeman, & Mighell (1996) have shown that the metallicity distribution of [[$\omega$ Cen]{}]{} stars can be well fitted by two separate components, and argued that this can be explained by two successive epochs of star formation. Assuming for the more metal-rich (\[Fe/H\] $=\!-1.0$) Mint population a helium content of $Y\sim0.30$, we find that the corresponding MS would be $\sim0.07$ magnitude bluer in ($V-I$) than the MP MS (assumed to have a canonical $Y=0.23$, and \[Fe/H\] $=\!-1.6$). Note that Norris et al.(1996) found that the ratio of the Mint to MP population should be 0.2, compatible, within the uncertainties, with the value we find for the rMS/bMS ratio. Panel e of Fig. 1 shows that the bMS could well be connected with the intermediate TO-SGB. Panel a of Fig. 2 shows that this intermediate SGB is slightly brighter than the luminosity expected for a metallicity similar to the Mint, and the expected TO is redder than the observed one. These observational facts are consistent with this population beeing helium enhanced and slightly younger, as expected if the helium enhancement is due to self-pollution from intermediate AGB MP stars. The dramatic increase of s-process heavy-element abundances with metallicity found by Smith et al.(2000) in [[$\omega$ Cen]{}]{} RGB stars furtherly support the hypothesis that Mint stars could have formed from material polluted by ejecta from 1.5-3 $m_\odot$ AGB stars. The presence of a population with high helium content could also account for the anomalously hot HB of [[$\omega$ Cen]{}]{}, following the calculations of D’Antona et al. (2002). All this notwithstanding, a $Y\geq0.30$ is higher than any value so far measured in Galactic GCs (Salaris et al. 2004), and not easy to understand.
As a fourth possibility, if we assume that the rMS corresponds to the majority of the cluster stars, the bMS could correspond to a population of stars located behind [[$\omega$ Cen]{}]{}. As shown in panel d of Fig. 2, if the bMS is populated by stars located 1.6 kpc beyond [[$\omega$ Cen]{}]{}, we can easily fit it with an \[Fe/H\] $=\!-1$ isochrone. Panel e of Fig. 1 appears to strengthen this hypothesis: we see the bMS get closer and closer to the rMS, crossing it at $H\alpha\sim18.5$, and apparently continuing into a broadened TO and SGB. This broadening of the intermediate TO could be the result of a spread in both metallicity and distance. The overall appearance of the CMD is that there are two sequences, shifted by up to $\sim0.3$–0.5 magnitude. The hypothesis of a background agglomerate of stars with metallicity around \[Fe/H\] $\sim\!-1.0$ would also naturally explain why the bMS appears to intersect the rMS at $V_{606}\sim23.5$ (cf. Figs. 1c and 1d). Such a background object would naturally explain the observation that the giants of different metallicity appear to have somewhat different spatial distributions (Jurcsik 1998, Hilker & Richtler 2000), though this spatial variation could be explained by merger or self-enrichment scenarios as well.
Leon, Meylan, & Combes (2000) have identified a tidal tail around [[$\omega$ Cen]{}]{}. Tidal tails often have a clumpy nature. However, the number of stars in the bMS seems to be too large and the sequence too sharp to be interpreted as a part of a clump in a tidal tail behind the cluster. Another possibility is that the object in the background is a distinct cluster or a dwarf galaxy. As it should cover at least 20–30 arcmin in the sky (this is the extent of the region where we identified a DMS) and be located at about 7 kpc from the Sun, the object should be extended by at least 40–60 pc. The probability of observing such an object in the direction of [[$\omega$ Cen]{}]{} is extremely low. However, if this object happens to be gravitationally linked to [[$\omega$ Cen]{}]{} (either because it was part of the same original system or because it is the remnant of some merging event), that would enhance the probability of seeing it in the same direction as [[$\omega$ Cen]{}]{}.
We note that the idea of a population of stars behind the cluster has been suggested before. Ferraro et al. (2002) measured a bulk motion for the RGB-a stars with respect to the other cluster stars, and interpreted this as evidence that it could be a background object, or a merger product that has not yet phase-mixed. However, Platais et al. (2003) find this motion spurious, attributing it to a color/magnitude term in the proper motions. Moreover, Anderson (2003), using very accurate WFPC2 proper motions, contradicts the bulk motions seen by Ferraro et al. (see his Fig. 1). In any case, the background population we consider here could not correspond to the very metal-rich population; our Fig. 1e makes it clear that the LTO and the bMS are not related to each other.
Resolving the controversy
=========================
Much of the current puzzle stems from our inability to interrelate the various RGB, SGB, TO, and MS populations. Currently there exists a good data base of observations for RGB stars, but only spot observations of the SGB, TO, and MS populations. An accurate analysis of the proper-motion, radial-velocity, metallicity, and spatial distributions of the MS, TO, SGB stars of [[$\omega$ Cen]{}]{}, in a large field sampled over the inner 20 arcmin or so of the cluster, along with detailed theoretical calculations, are absolutely essential to explain the observational facts, which at the moment represent a mixed-up puzzle. The new results presented in this paper show that the more we learn about this cluster, the more we realize we do not know.
We thank the referee, John Norris, and Raffaele Gratton for useful suggestions and discussions on the role of helium in interpreting the observations presented in this paper. L.R.B., G.C., S.C., Y.M., and G.P. acknowledge financial support by MIUR (PRIN2001, PRIN2002, and PRIN2003). J.A. and I.R.K.acknowledge support by STScI grant GO 9444.
Allard, F., Hauschildt, P. H., Alexander, D. R., & Starrfield, S. 1997, , 35, 137 Anderson, J. 1997, PhD Thesis, UC, Berkeley Anderson, J., & King, I. R. 2000, , 112, 1360 Anderson, J. 2002, in ASP Conf. Ser. 265, [*“$\omega$ Centauri a Unique Window into Astrophysics”*]{}, ed. F. van Leeuwen, J. Hughes, & G. Piotto (San Francisco: ASP), 87 Anderson, J. 2003, in ASP Conf. Ser. 296, [*“New Horizons in Globular Clusters Astronomy”*]{}, ed. G. Piotto, G. Meylan, S. G. Djorgovski, & M. Riello (San Francisco: ASP), 125 Cassisi, S., Castellani, V., Ciarcelluti, P., Piotto, G., & Zoccali, M. 2000, , 315, 679 Cassisi, S., Castellani, V., Degl’Innocenti, S., Salaris, M., & Weiss, A. 1999, , 134, 103 D’Antona, F., Caloi, V., Montalbán, J., Ventura, P., & Gratton, R. 2002, , 395, 69 Ferraro, F. R., Bellazzini, M., & Pancino E. 2002, , 573, L95 Ferraro, F. R., Sollima, A., Pancino E., Bellazzini, M., Straniero, O., Origlia, L., & Cool, A. M. 2004, preprint (astro-ph/0401540) Hilker, M., & Richtler, T. 2000, , 362, 895 Holtzman, J. A., Burrows, C. J., Casertano, S., Hester, J. J., Trauger, J. T., Watson, A. M., & Worthey, G. 1995, , 107, 1065 Jurcsik, J. 1998, , 506, L113 Lee, Y. W., Joo, J. M., Sohn, Y. J., Rey, S. C., Lee, H. C., & Walker, A. R. 1999, , 402, 55 Leon, S., Meylan, G., & Combes, F. 2000, , 359, 907 Norris, J. E., & Da Costa, G. S. 1995, , 447, 680 Norris, J. E., Freeman, K. C., & Mighell, K. J. 1996, , 462, 241 Origlia, L., Ferraro, F. R., Bellazzini, M., & Pancino, E. 2003, , 591, 916 Pancino, E., Ferraro, F. R., Bellazzini, M., Piotto, G., & Zoccali, M. 2000, , 534, L83 Piotto, G., & Zoccali, M. 1999, , 345, 485 Platais, I., Wyse, R. F. G., Hebb, L., Lee, Y. W., & Rey, S. C. 2003, , 591, L130 Salaris, M., Riello, M., Cassisi, S., & Piotto, G. 2004, , subm. Smith, V. V., Suntzeff, N. B., Cunha, K., Gallino, R., Busso, M., Lambert, D. L., & Straniero, O., , 119, 1239.
[^1]: Based on observations with the NASA/ESA [*Hubble Space Telescope*]{}, obtained at the Space Telescope Science Institute, which is operated by AURA, Inc., under NASA contract NAS 5-26555.
| 2024-03-15T01:26:19.665474 | https://example.com/article/1605 |
Electronic device scaling has been extensively investigated with respect to geometry, power consumption, and switching speeds[@b1]. While scaling allows transistors with increased drive current and switching speed, it also enables denser integration resulting in versatile chip functionality and monetary incentives. Upon aggressive scaling, fundamental challenges however are found with respect to gate leakage, drain induced barrier lowering for transistors, and parasitic capacitances at the circuit level, leading to the demise of "Moore's law"[@b2]. The latter opens opportunities for optics since optical 'wires', i.e., waveguides, are not limited by electrical capacitance[@b3][@b4]. In addition, the parallelism offered by the bosonic nature of photons such as explored in wavelength-division-multiplexing, has made opto-electronics attractive for communication and interconnect applications[@b5]. While the fundamental prospects for photonics are well-known compared to electronic devices, the diffraction limit of light poses a serious constrain for photonics to be footprint-density competitive[@b6]. In fact, this limitation demands a far superior performance of optical devices compared to its electronic counter-parts. For example, the typical size of electronic devices is about 20 nm, and photonic diffraction limit is λ/2*n* \~ 200 nm, where λ is the telecommunication optical wavelength, and *n* is the refractive index of the waveguide (e.g., Silicon, *n* = 3.5). Hence, clearly the optical devices need to perform at least two orders of magnitude higher compared to electronics. To faithfully reflect this trade-off between areal footprint and performance, we introduce a new Figure of Merit, FOM = \[Speed/(Energy/bit × Footprint)\] to assess the quality of an optoelectronic link performance. Thus, a larger FOM can be achieved by either increasing the operations per second, lowering the energy, or by reducing the area footprint. The device insertion loss is defined for the link-level, where the particular device-to-waveguide connection becomes important. In the link analysis below, the laser power is calculated based on the minimum current required by the next stage the link is connected to, while compensating all the insertion losses from both devices and waveguide sections. Nominal insertion loss values from the literature are used here, since optimizing the insertion loss is an engineering task being sensitive to material and process variations.
With technology options such as plasmonics[@b7][@b8][@b9], nanoscale dielectric resonators[@b10][@b11] and slot-waveguides[@b12], opportunities exist to surpass the diffraction limit of light by engineering the effective refractive index. However, decreasing the optical mode volume, *V*~*m*~, introduces adverse effects, for example, bending losses, and ohmic losses for polaritonic modes. It is therefore not straightforward to predict optoelectronic performance for device scaling into the nanoscale[@b13][@b14], and a rigorous analysis of fundamental scaling laws for nanophotonics as a function of critical device length is warranted. Here, we investigate the performances of four actively-controlled (electrically or optically) devices with respect to their scaling behavior: a light source, an electrical-to-optical (EO) data encoder typically in form of an electro-optic modulator, and a photodetector for the inverse OE conversion, along with a fourth device, which is a purely optical switch for all-optical information processing ([Fig. 1a](#f1){ref-type="fig"}). We investigate their performance in terms of speed, energy and the newly introduced FOM.
In our analysis, we assume that underlying these devices are three types of optical cavities, (a) a traveling-wave ring resonator (RR)[@b15], (b) a metal-mirror based Fabry-Perot (FP) cavity[@b16], and (c) a plasmonic metal nano-particle (MNP)[@b17] ([Fig. 1b](#f1){ref-type="fig"}), that enhance the fundamentally weak interaction between light and matter via the ratio of *Q/V*~*m*~, where *Q* is the cavity quality factor, *V*~*m*~ is the effective volume of electromagnetic energy of a resonant mode. An interesting, although expected result is, that all cavity types do not perform equally well for vanishing critical dimension due to their respective non-monotonic Purcell factor.
For our scaling law analysis we define the critical length for the three underlying cavities as the radius for the RR and the MNP, and the physical distance between two mirrors for the FP. We derive analytical expressions for both the cavity quality factor *Q* and the optical mode volume *V*~*m*~ for the RR and FP cavities and estimate the Purcell factor ([Fig. 2](#f2){ref-type="fig"}), defined as[@b18] , where *λ*~*R*~ is the resonant wavelength of the cavity, and *n* is the cavity material refractive index. The discontinuity of the displacement current across the metal particle in the plasmonic cavity requires a different approach; we find the ratio of the effective density of the surface plasmon modes, *ρ*~*SP*~, relative to that of the radiation continuum, *ρ*~*rad*~, which directly gives *F*~*p*~[@b17]. The mode volume *V*~*m*~ is obtained by a permittivity-modified geometric volume[@b19], from which we can estimate *Q*. An abbreviated equation set for the Purcell factor of the three cavities is summarized in the methods section below, whereas a detailed device performance analysis along with a comprehensive set of details of this manuscript is reported in the [supplementary online material](#S1){ref-type="supplementary-material"} (SOM)[@b20].
Regarding cavity performance, *Q* as a function of the critical length is a key metric since it relates the ability to spectrally store optical energy relative to its loss ([Fig. 2a](#f2){ref-type="fig"}). For the RR, at larger length, *Q* is almost independent of length, since the increased propagation loss with the circumference of RR is cancelled by the increased round-trip time. However, at small radius (\<10 μm), bending losses overcome the propagation losses resulting in a sharp drop in *Q*. For the FP and MNP, *Q* decreases with scaling, mainly due to an increased overlap of the electromagnetic field with the lossy metal. While the optical mode volume *V*~*m*~ of the RR can fundamentally scale with *V*~*m*~ \~ *r*^*α*^, where *α* = 1, 2, or 3 depending on how many dimensions are being scaled, fabrication and integration constraints render quadratic and cubic scaling impractical due to mode matching incompatibility issues such as multi vs. single mode ring-to-bus coupling. We therefore choose a lowest-volume approach by selecting the single-mode condition for the ring waveguide cross-section dimension and scale only the ring radius for the RR, whereas the MNP scales cubically, *V*~*m*~ \~ *a*^3^ ([Fig. 2b](#f2){ref-type="fig"}). For the FP, the mode-volume has a non-monotonic variation with the critical length; upon scaling and approaching the diffraction limit (\~200 nm), *V*~*m*~ decreases. However, with further scaling, *V*~*m*~ increases as its mode character changes; the propagation direction of the confined mode changes from longitudinal to transverse due to the formation of a metal-insulator-metal (MIM) mode where the cavity reflection is not governed by the metallic mirrors any more, but by the localized modal MIM distribution[@b20][@b21].
Based on the above analysis, we investigate the scaling behavior of the Purcell factor for each cavity ([Fig. 2c](#f2){ref-type="fig"}). For all the three cavities, we observe a non-monotonic dependence of *F*~*p*~ with scaling: for longer lengths an increased *V*~*m*~ reduces the Purcell factor, whereas at short lengths the reduction in *Q* is detrimental to *F*~*p*~. However the optimal cavity length and the maximum Purcell factor for each cavity are vastly different; the RR can provide the highest Purcell factor among all the cavities (\>10^3^) provided *Q* exceeds 10^5^ and real estate of ten's of microns for the radius are available. On the other hand, a maximum *F*~*p*~ of 10^2^ at lengths of just 10 nm is achievable in MNP as *Q* reduces slower than *V*~*m*~ does. The FP can provide a moderate *F*~*p*~ \~ 50, for a moderate length of \~10 *μm*. We also see that each cavity geometry is limited to a minimum possible length; with the assumption of the RR-forming waveguide being diffraction limited, a geometrical limit of the RR radius is reached at a radius equal to half of the diffraction limit, where the ring becomes a disc. While the minimal length of the FP can approach zero, the practical limit is near the diffraction limit since the cavity changes its mode from diffraction limited to a metal-insulator-metal gap mode, as described earlier. While the MNP has no cut-off length, the mode becomes unfeasible at atomic scales where quantum effects become dominant[@b22]. Hence lengths of a few nanometers are the minimum considered here[@b17]. In the remainder of the paper, we apply these cavity-based scaling laws to four opto-electronic devices, namely, lasers, modulators, photodetectors, and all-optical switches, and extract key information to provide both device and interconnect link FOMs.
Laser
=====
For a laser high wall-plug conversion efficiency, a low threshold power (*P*~*th*~), compact geometry, and potentially a fast response times for direct modulation is desired[@b23][@b24][@b25][@b26][@b27]. The electrical power threshold = *I*^2^ × *R* is derived from the rate equations, where *I* is the drive current, and *R* the device resistance. For our device scaling law analysis the threshold is a function of *Q*, *V*~*m*~, *F*~*p*~, and a geometrical ratio of the exposed surface area of the gain material to the cavity volume, *S*~*a*~/*V*~*a*~[@b20]. Here the discussion of the electrical power threshold comparison for each cavity-based laser is related to the corresponding cavity-physics shown in [Fig. 2](#f2){ref-type="fig"}, which indicates that *F*~*p*~ relates to the ratio of *Q* divided by the effective modal volume, *V*~*m*~, of the cavity. As for the light emission *F*~*p*~ 'summarizes' the effect of the cavity. Since *Q* for the RR is always orders of magnitude higher than *F*~*p*~, and *S*~*a*~/*V*~*a*~ is independent of RR radius, the threshold scales inversely with the Purcell factor. However, since *Q* is mostly flat for the RR at larger radius, the threshold actually scales proportionally with the mode volume *V*~*m*~ ([Fig. 3a](#f3){ref-type="fig"}). However, for very small radii the bending loss becomes dominant and *Q* drops faster than the volume, hence slowing down the threshold reduction with scaling. For the FP, we need to consider two cases; for large length cavities, *Q* is much larger than *F*~*p*~ and the threshold reduces with scaling similarly to that of the RR ([Fig. 3a](#f3){ref-type="fig"}). However, while *Q* drops with scaling, *F*~*p*~ increases and reaches a maximum *F*~*p*−*max*~ around 1 μm length, followed by a rapid drop. This explains the observed minima in the electrical power threshold. Note, *S*~*a*~/*V*~*a*~ is a constant that does not depend on the FP cavity length, i.e., For the plasmonic cavity, *Q* for the MNP is orders of magnitude lower than *F*~*p*~, and *S*~*a*~/*V*~*a*~ = 3/*a* is inversely proportional to the radius of a metal nanoparticle. Thus, *Q* drops slower with scaling than *V*~*m*~ for particle radii corresponding the range above the maximum *F*~*p*~. The inverse trend for *Q* and *V*~*m*~ vs particle radius is true past *F*~*p*−*max*~, which explains the observed minimum. At the large radius limit, the MNP shows *F*~*p*~ \~ *Q* but shifts to *Q* ≪ *F*~*p*~ with scaling, and the threshold tracks first 1/*F*~*p*~ and then 1/*Q*. The latter can be seen by a faster threshold increase compared to the *F*~*p*~ dropping ([Fig. 3a](#f3){ref-type="fig"}). The underlying explanation of the influence of high optical confinement leading to both high *F*~*p*~ and *β* is an altered pump-efficiency enhancement mechanism[@b28][@b29]. Compared to the lowest threshold from all three devices (FP, at *l* = 0.6 μm, *P*~*th*~ = 10^−5^ W) further scaling into the deep sub-micro regime results in a significant increase in the threshold power.
Wall-plug efficiency (WPE) represents the energy conversion efficiency with which the system converts electrical power into optical power. It is defined as the ratio of the laser total optical output power to the input electrical power consumption[@b30]. Here, the WPE of the laser is obtained by solving the rate equations and the power output expression, i.e., [@b31], where η~c~ is the collection efficiency, α~g~ (α~m~) is the cavity absorption (mirror) losses per unit length, S~ph~ is the photon density, τ~p~ is the photon lifetime, h~0~ is the Planck constant, and c is the speed of light in free space. Thus, the WPE varies with the critical dimension. We find the maximum WPE to coincide with the same critical dimension where we noted the maximum Purcell factor. The highest WPEs are found for the FP laser approaching unity, while that of the ring and plasmon cavity are at 50% and 5%, respectively[@b20]. It is worth pointing out that the Schawlow Townes laser linewidth predicts a wider spectrum for nanolasers due to a high spontaneous emission factor. As such the use nanolasers for WDM applications is thus questionable, however, not discussed in the present work.
Relaxation oscillations are due to a periodic exchange of energy stored in laser gain medium by the population inversion and the cavity field intensity, showing a damped oscillation for a solitary laser. Semiconductor lasers normally exhibit strongly damped relaxation oscillations with high frequencies (e.g., GHz). The 3 dB bandwidth response for a direct-modulated laser is thus dominated by the relaxation oscillations of the gain medium especially at low pump rates. At high pump rates saturation occurs due to cavity damping[@b32]. In practice, we can estimate the laser speed by the small signal modulation near threshold of the spectral response function, which scales with a *β*-modified Purcell factor[@b20][@b33]. Therefore, all three cavity responses exhibit a maximum modulation bandwidth close to those lengths corresponding to maximum *F*~*p*~ ([Fig. 3b](#f3){ref-type="fig"}); the ring improves rapidly with scaling, since *Q* drops and the cavity is not photon lifetime limited any more. FP tracks *F*~*p*~ well, but drops past 1 μm, due to the relatively low *Q* with scaling; *Q* continues to drop single exponentially, but *V*~*m*~ increases past the diffraction limit, due to the scaling of the optical confinement factor (*Γ*) with length[@b20]. The MNP-based laser is the only device able to surpass gain compression limited bandwidths (\~10's of GHz), and reach \<100 GHz's[@b32][@b34]. This is possible due to both the short photon lifetime inside the cavity, and simultaneously high *β*-factor. Regarding the laser threshold power, the MNP based laser has significantly higher thresholds than other cavities, and therefore by using external modulation strategy which modulates the continuous wave (CW) with an external modulator, the MNP based laser will consume more energy than over cavity based lasers which may neutralized the energy benefit of the MNP based modulator and detectors. However, together with its 10^4^ times smaller cavity footprint, such MNP lasers may bypass external electro-optic modulators, since the power overhead for cavity tuning and modulation can be saved, thus reducing optical link complexity and increasing link performance[@b35]. In addition, a more detailed external and internal modulation strategies analysis could be found in our previous work where we analyzed the link performance of all electronic, photonic, plasmonic and hybridization interconnects in the latency, energy, throughput and other comprehensive FOMs[@b36].
Modulator
=========
An electro-optic modulator's energy efficiency is determined by both the energy to charge the device's electrical capacitor and the optical power penalty[@b37][@b38][@b39][@b40][@b41][@b42]. For the former, the critical field to obtain switching is proportional to the factor (*F*~*p*~*Q*)^−1^ [@b20]. For a low-power device, the volume needs to reduce faster than the *Q* reduction upon scaling. The ring's power shrinks with scaling to a corresponding *F*~*p−max*~ due to a flat *Q* and linear volume reduction. Past this point, the RR's bending loss impacts the power scaling negatively leading to a dip approaching few photon (\<1 aJ/bit) efficiencies. Unlike RR, the energy efficiency for the FP and MNP increases monotonically with scaling due to the 1/*F*~*p*~*Q* dominance ([Fig. 3c](#f3){ref-type="fig"}). If footprint is a critical requirement, 10's of nm small MNP devices with 100 aJ/bit are realizable. We note that the FP's energy performance is limited to operating ranges above 1 fJ/bit mainly due to moderate *Q* and relatively high *V*~*m*~. The modulation bandwidth of the EOM is related to both the photon lifetime and *RC*-delay (i.e. *f*~*ph*~ and *f*~*RC*~), where the former is inversely proportional to *Q*, and the latter scales inversely with the critical length by means of electrical capacitance[@b20][@b43]. The RR is limited to modulation speeds of ten's of GHz by both the long photon lifetimes and sizable electrical capacitances originating from diffraction limited large mode sizes ([Fig. 3d](#f3){ref-type="fig"}). At the other extreme is the plasmonic-based modulator, which, in principle, can enable sub picosecond short response time given its small electrical capacitance and lossy cavity. Here we used the Pockels as an example modulation mechanism, since modulation speed exceeding 100 GHz have been experimentally demonstrated[@b44]. Similar conclusions hold for carrier-based modulation mechanisms as well, yet the material mobility may introduce modulation limits. Besides, the spherical shape of the MNP cavity is impractical to electrically contact the device, and even if realized, this might alter the optical mode[@b17]. The FP EOM connects the two regimes of high (RR) and low *Q* (MNP) allowing for high modulation speed due to a relatively lossy and compact cavity. While picosecond-fast EOMs are in principle perceivable[@b38][@b45], state-of-the-art device drivers do not allow for such speeds, and future research should investigate co-design and co-integration of triggering techniques alongside novel devices[@b46].
Detector
========
Photodetectors contribute to defining bounds for both optical power limits and bit-error-rates (BER)[@b47]. Two crucial performance parameters for a detector are the responsivity and the bandwidth. Estimating a lower bound for the fundamental conversion efficiency, the minimum optical power (i.e. photo current times generated voltage) must exceed the noise floor to ensure sufficient signal quality and bit-error-rate. Applying shot-noise limits to the photocurrent and thermal noise to the voltage results in a minimum detector power equal to \~*k*~*B*~*T* times bandwidth (*k*~*B*~ = Boltzmann constant, *T* = temperature). This condition is, in reality, incorrect due to the statistical arrival of photons at the detector. Here, we consider a classical photon distribution along with non-radiative recombination effects such as defect and Auger-related recombination, which decrease the internal quantum efficiency and reduce the photocurrent output[@b20]. The governing equation for the responsivity denotes that a high value is achieved for short device sizes. Moreover, a high quality material such as withstanding high electric fields (i.e., *V*/*l*), a high mobility, and a low surface recombination velocity are also important to reach high performance[@b20]. For the interest of scaling laws the responsivity is inversely proportional to the external quantum efficiency (EQE), which depends on the absorption potential of the detector and is a function of the device length. The plasmonic MNP detector delivers a flat performance upon scaling, up to 0.5 A/W ([Fig. 3e](#f3){ref-type="fig"}). The weak dependence arises from vanishing absorption- and scattering cross-sections in the short length limit; that is the absorption cross-section scales linearly with particle size. Similarly to other devices, the RR allows for higher responsivity when losses are low approaching 0.7 A/W. However when the radiation loss increases with scaling, the responsivity drops below 0.01 A/W due to the trivial length scaling. The FP cavity exhibits a minimum near the diffraction limit, which is a tradeoff between efficient absorption (long length limit) and a high exciton carrier collection efficiency (short length limit). For scaled devices the mirror loss becomes a constant, thus saturating the responsivity. Overall the plasmonic mode is able to produce competitively-high responsivities at small footprints.
There are several factors that influence the response time of a detector, such as transit and diffusion time scales of photo-carriers inside and outside the depletion region, and the *RC* delay (PN-junction photodiodes assumed). The 3 dB bandwidth scales inversely with device volume and is proportional to the EQE[@b20]. For large radii the RR-based detector scales inversely with length due to the high *Q*. Upon scaling, the contribution of increased optical losses reduce EQE and the carrier transit time shortens, thus increasing the bandwidth. The FP detector approaches a constant loss value for the large-scale limit. Upon scaling, the influence of the length-to-absorption loss increases comparably to the total loss, thus boosting the EQE and hence the device bandwidth. Similar to the EOM and laser, the MNP-based detector is able to receive data at much higher rates compared to photonic counterparts due to arguments such as low *RC* delay and short photon lifetimes. The commonly used detector benchmark is given by the responsivity-bandwidth product per footprint in units of A-ps/W-um^2^ gives values of 10^−3^, 10^−1^ and 10^4^ for the RR, FP, and MNP, respectively, showing the potential for high performance of sub-diffraction limited photonic detectors.
Device Level Comparison
=======================
Next we apply a device-type specific performance vs. cost metric for each of the aforementioned devices. Such metric combines the device' response speed and function-specific performance vs. 'cost', which we here express as scalability since it relates to physical wafer real estate. Device dependent performances for the laser and EOM are the threshold power and energy efficiency, respectively, which should both be minimized, and hence appear in the denominator of the device-FOM. The inverse is the case for the detectors' responsivity which is to be maximized. Given the scaling laws for the laser threshold and speed, the FOM pertains the maxima of both the speed and inverse threshold. Note, we converted the threshold current to an electrical power via a scaling-dependent resistivity model[@b20]. The photonic FOMs for the RR and FP are 2--3 orders of magnitude higher compared to the MNP mainly due to the high power from the quantum point contact resistance[@b48] and lossy cavity ([Fig. 3g](#f3){ref-type="fig"}). The RR's FOM interestingly improves monotonically with scaling and does not reduce even near its geometric minimal radius. The FP does not perform well beyond 1 micrometer scales due to the high thresholds and limiting speeds. The FOM for EOMs is relatively flat, which can be understood from the inverse relationship between the speed (\~1/length) and energy (1/*F*~*p*~*Q*) scaling ([Fig. 3h](#f3){ref-type="fig"}). The MNP is an exception, which is dominated by a 1/*F*~*p*~*Q* scaling. Interestingly, the photodetector displays a monotonically increasing FOM with scaling across all cavities ([Fig. 3i](#f3){ref-type="fig"}); while the RR's responsivity (in nominator of FOM) actually declines with scaling, the FOM increases due to the dependency of FOM = constant × 1/length. The FP continues to increase performance from the micrometer range down into the sub 100 nm since both responsivity and speed improve with scaling. The MNP continues to improve the FOM due to the almost ideal responsivity and short *RC* relay time of a sub 100 nm small device. As such, scaling does clearly improve the FOM for the detector, but its effect on EOMs and lasers is not monotonic.
All-Optical Non-linear Device
=============================
The three devices discussed so far are important for optical interconnects, where the computation is performed in the electronic domain. However, with growing interest in optical information technology, it is conceivable to perform computing as well using optics. Although, the exact functionality of optical computing is being debated to date, the key requirement is strong optical nonlinearity. The inherent material nonlinearity does not depend on carrier generation or physical motion of carriers. Hence it can be ultrafast, and the resulting nonlinear device does not suffer from electronic shot noise[@b49][@b50]. Unfortunately, this nonlinearity is generally rather weak, and requires LMI enhancement such as provided by a cavity. Thus, all-optical nonlinear devices provide an interesting test-case to elucidate the efficacy of scaling. For our analysis, we consider both the 2^nd^ and 3^rd^ order material nonlinearity, as they exhibit differing scaling performance with quality factors as reported recently[@b51]. We note that, in our analysis, we assume the scaling primarily affects the cavity, and not the nonlinear materials. Such assumption may not hold true if we rely on surface nonlinearity, as the effective nonlinearity might change as we scale. However, such surface nonlinearities are generally much weaker, and will not be suitable for building energy-efficient switches. To elucidate the scaling behavior, we analyze performance of an optical bistable system[@b50][@b52]. In such systems, the output power changes nonlinearly with the input power, with a sudden jump from one stable branch to another stable branch. We denote the input power where such sudden jump appears, to be the threshold power. This threshold power scales as and for 3^rd^ and 2^nd^ order nonlinear device, respectively. Clearly, a smaller mode-volume helps to reduce the optical power, but the quality factor plays a more significant role. This trend is evident from [Fig. 4](#f4){ref-type="fig"}, where a lower *Q*-factor hurts the MNP and FP. The RR is a decent choice and the optimum nonlinearity can be achieved with \~5 μm radius. Of course, the actual value of the optimal radius depends on the material nonlinearity, but a large reduction in the radius cannot be realized. This indicates that it is unlikely that a digital optical computer will outperform a digital electronic computer due to extreme compactness of electronics. However, for different computing regimes, such as analog or neuromorphic computing, optics can still be competitive due to low loss in communication links as discussed next.
Interconnect Link
=================
Based on the analysis of individual devices, we investigate scaling-based performance variations of various interconnect (IC) technology options[@b36]. We deploy the aforementioned FOM comprised of the link data speed divided by its 'cost' given by energy consumption times link footprint ([Fig. 5](#f5){ref-type="fig"}). Here we compare photonic, plasmonic, electronic and hybrid IC types, where the three active devices (source, modulator and detector) are connected by different waveguide options as follows; the photonic ICs based-on active RR or FP devices are connected with conventional Silicon-on-Insulator (SOI) waveguides, whereas the active plasmonic MNP devices utilize surface plasmon metal waveguides. Further, we consider a photonic-plasmonic hybrid link, where all active devices are based on MNP cavities, but the passive interconnections are regular low-loss SOI waveguides ([Fig. 5](#f5){ref-type="fig"})[@b36]. As a comparison we relate these four photonic link FOMs to an electrical IC, which is based on the 22 nm technology node[@b53].
The link FOM scaling model requires close attention to a variety of details that are different to the device level discussed above. For instance, the speed, i.e., link delay, is not simply the sum of all device delays, but determined by the slowest device on the entire link assuming bufferless data routing protocols, and the signal-to-noise (SNR) ratio of a noisy channel[@b54]. The latter depends on the bit error rate, where a BER = 10^−12^ was previously found to be appropriate for intra-chip communication[@b55]. Generally, the BER is a function of the variance of the noise model (i.e., Gaussian noise assumed), the detector's responsivity, and the desired output current (*I*~*min*~) needed at the next stage in the circuit past the links photodetector[@b20]. *I*~*min*~ is naturally also a function of the link distance, which has to be provided for by the laser source. Here we explicitly show the link FOM not only as a function of device scaling, but also for three different IC link distances (0.1, 1 and 10 mm, dashed and solid lines [Fig. 5](#f5){ref-type="fig"}). It is trivial to observe that longer links result in a lower FOM due to a higher laser power required to compensate the greater link loss. We note that the FOM is a complex combination of the various device' FOMs; for instance, a higher device speed does not increase the link FOM linearly since the link delay is limited by the slowest device. The overall FOM follows that of the source, which is expected, since the source has to provide for the required signal quality required at the next stage in the circuit past the link. We show that the RR's FOM improves significantly with scaling mainly due to the reduction in laser lower and higher data rates enabled by shorter cavity photon lifetimes. The FP and MNP links follow the device performance peaking just below 1 and 0.1 micrometers, respectively. The FP allows scaling by about 10 times compared to the RR with a small performance improvement, whereas the MNP enables 2 orders scaling past the highest FP FOM. A plasmonic-only link shows inferior FOMs compared to the RR and FP due to high source power and signal repetition every ten's of micrometers. Altering the link length, introduces interesting changes in the FOM; the shorter the link, the higher is the FOM, since a lower source power is required, which is trivial. However, the photonic (RR and FP) links improve (worsen) with shorter (longer) link distance by about one order of magnitude, (shaded area, [Fig. 5](#f5){ref-type="fig"}), whereas plasmonic links continue to improve (4--5 orders) for short link lengths, but become unusable for chip-scale lengths due to losses. With scaling the jitter-length sensitivity, a measure of FOM as a function of link distance, improves for all link types due to the laser power dominance over the link power, as indicative by the narrowing of the shaded area in [Fig. 5](#f5){ref-type="fig"}. Therefore the difference of the propagation loss does not influence the link FOM significantly with scaling, except in the MNP case. The MNP exhibits the highest FOM for short links, which could be insightful for circuit designers. Furthermore, we show that the high jitter-length sensitivity of plasmonic links radically improves upon hybridization (purple data [Fig. 5](#f5){ref-type="fig"})[@b36]. Comparing the performance of optical to electronic link performance has relevance for photonic technology road-mapping; the inherent capacitive link performance limitations arising from charging electrical wires (green data, [Fig. 5](#f5){ref-type="fig"}). As a result the electronic IC performance is actually surpassed by diffraction limited photonics, short distance plasmonics, or any-length hybrid photon-plasmonic links upon device scaling to near *F*~*p-max*~. This is consistent with the recent push of silicon and III-V photonics into low-*Q* rings with \<5 μm ring radii[@b56]. In terms of scaling, the performance shows that plasmonics still improves its performance even past the electronic device size. Our analysis shows that plasmonics is only viable for either short links, or with hybridization.
Conclusions
===========
We have analyzed the performance of four relevant photonic devices, namely lasers, electro-optic modulators, photo-detectors, and all-optical switches with respect to their critical length scaling behavior based-on three different cavity types. We find that the interplay between cavity feedback and optical mode confinement strongly determines the device-inherent light-matter-interaction. Their respective device performance shows non-monotonic scaling behavior. In particular the interplay between spatial confinement of photons and cavity photon-storage, i.e., Purcell factor, determines to a large extend the device performance. While ring resonators enable low power lasers and modulators, their micrometer scale and long photon lifetimes limit their integration and device speed potential. Plasmonic metal particle-based cavities are the other extreme relying on small mode volumes and enable 10's of nanometer small, high-speed devices, but are not as power efficient as microrings. All-optical non-linear devices are challenged by inherently high threshold values, and do not improve with scaling. Applying a speed-energy-footprint metric to compare interconnect performance of the various cavity-based technology options, we show that classical photonics outperforms electronics for short and long interconnect lengths, and plasmonic-based links offer even higher performance for signaling distances much shorter than typical chip die sizes. However, plasmonic links beyond 100 microns in length do not outperform photonics and suffer from high jitter-length-sensitivity. However, functionality separation among active (plasmonic) and passive (photonic) maintains highest link performance and allows competitive scaling compared to electronics, while maintaining long distance data delivery. These new insights can influence design choices at the circuit level and may pave the way for a photonic roadmap.
Methods
=======
Some details of this analysis are discussed in this method section, whereas further detailed elements appear in the [supplementary online materials](#S1){ref-type="supplementary-material"} (i.e., ref. [@b20]).
Global Parameters
-----------------
The following parameter conventions are applied: any length dependence that is not the scaling length is kept at the diffraction limit (λ/2*n*), unless otherwise stated. The operating wavelength is λ = 1550 nm, and *n* is the refractive index of the waveguide mode. For the laser analysis the surface recombination velocity, *ν*~*sa*\_*InP*~, is a mid-range value of 1.5 × 10^4^ cm/s such as for a III-V material system[@b57]. For the electro optic modulator, micro-ring parameters: propagation loss *α*~*p*~ = 100 dB/cm, ε~r~ = 11.7 for Si, index *n* = 3.0, electrical series resistance *R*~*s*~ = 500 Ω, electrical device driver resistance *R*~*dr*~ = 500 Ω. For the Fabry-Perot parameters: mirror reflectivity: *R*~1~ = *R*~2~ = 95%. For the photodetector, the surface recombination velocity, *ν*~*sa*\_*Si*~, is at a mid-range value of 1.0 × 10^4^ cm/s such as for Silicon[@b58].
Device Performance Analysis
---------------------------
For additional details on device and cavity analysis, symbol definitions, and methodology, refer to the [supplementary online material](#S1){ref-type="supplementary-material"}[@b20]. The laser threshold current ([Eqn. 1](#eq17){ref-type="disp-formula"}) under continuous pumping is derived from steady state rate equations considering surface recombination effects[@b28]. The electrical power threshold of a laser can be estimated by the total resistance (*R*~*t*~) times threshold current (*I*~*th*~) via . Here *I*~*th*~ can be determined by[@b28][@b34]
where *γ* is the total cavity mode loss rate per unit volume, which can be further expressed by *γ* = *γ*~*c*~ + *γ*~*g*~, *γ*~*c*~ is the loss rate due to cavity mirror loss and intrinsic loss, *γ*~*g*~ is the absorption rate per unit volume in the gain medium, and *γ*~*g*~ = (*α*~*g*~ · *c*/*n*), where *α*~*g*~ is the absorption coefficient per unit length of gain material. *A*~*o*~ is the natural spontaneous emission rate of the gain material, *v*~*s*~ is the surface recombination velocity, *S*~*a*~ and *V*~*a*~ are the exposed surface area (i.e., laser side walls and the gain material's volume, respectively), *Γ* is the optical confinement factor quantifying the spatial overlap of the gain medium relative to a lasing mode, *η*~*i*~ is the current injection efficiency, and *q* is the electronic charge. *β* is the spontaneous emission coupling factor, denoting the fraction of the light of the lasing mode, relative to all available cavity modes. The cavity-based enhancement of the light-matter interaction is via *β*. The approximation for the *β* was first used for a nitride-based vertical microcavity surface-emitting laser[@b59], where *β* is estimated by \~*F*~*p*~/(1 + *F*~*p*~). For a large *F*~*p*~, *β* approaches unity as expected. *R*~*t*~ is the total resistance of the laser, which is scaling dependent and can be evaluated by[@b60]
where *ρ*~*c*~ is the specific contact resistivity, *R*~*sh*~ is the sheet resistance of semiconductor materials under a metal contact, and *L*~*c*~ is the transfer contact length with .
The modulation bandwidth ([Eqn. 3](#eq10){ref-type="disp-formula"}), i.e., 3-dB role-off speed, is estimated via the small signal response by observing the spectral response function[@b19],
The oscillation relaxation frequency, *ω*~*r*~, of the laser is proportional to the cavity loss rate, *γ*, and is enhanced by *β*. The electro-optic modulator energy efficiency ([Eqn. 4](#eq11){ref-type="disp-formula"}) is bounded by the electrical capacitive power consumption, the applied electric field, and cavity *Q-*factor[@b61]. The modulation speed ([Eqn. 5](#eq12){ref-type="disp-formula"}) considers both the optical photon lifetime of the device cavity and the resistive-capacitive delay. Note, the latter includes both the device series and driver resistance[@b62][@b63].
where *ε*~*o*~ is the vacuum permittivity, *ε*~*r*~ is the relative permittivity of the photonic material, *r*~*EO*~ is the Pockel's coefficient of the EO material and *n* is the refractive index. , , where *R*~*s*~ is the modulator series resistance, *R*~*dr*~ is the driver impedance, and *C*~*J*~ is the modulator junction capacitance, here .
The responsivity ([Eqn. 6](#eq16){ref-type="disp-formula"}) of the photodetector quantifies the generated photo-current relative to the optical power input on the device[@b64]. Here non-radiative effects such as Auger and surface recombinations are considered. The photodetector response speed ([Eqn. 7](#eq17){ref-type="disp-formula"}) is estimated from the small signal analysis[@b64].
where Δ*I* is the photocurrent, Δ*n*~*c*~ is the excess carrier concentration, *μ*~*n*~ is the electrons mobility, *V* is the bias voltage, *h*~*o*~ is the Planck's constant, *c* is the speed of light in free space, *n*~*c*~ is the generated carrier density, C~*n*~ is the Auger recombination coefficient of a material, *η* is the fraction of photons creating electron-hole pairs (i.e., quantum efficiency), *k*~*B*~ is the Boltzmann constant, *T* is the absolute temperature in kelvin, *BW* is the bandwidth of a photodector. *P*~*opt*~ is the optical power of the injected light.
We derive a separate FOM for each of the three electro-optic devices (i.e., laser, EOM and photodetector) using threshold power, energy efficiency, and responsivity, respectively, with their own speed and scaling ([Eqns 8](#eq18){ref-type="disp-formula"}, [9](#eq19){ref-type="disp-formula"}, [10](#eq20){ref-type="disp-formula"}).
For the interconnect link analysis the FOM is defined as,
where the speed is no longer the device speed as we discussed in the previous sections, but can be considered as a link throughput for the entire channel, which can be predicted by the Shannon limit and noise level (see 3.1 SOM[@b20]).
Additional Information
======================
**How to cite this article**: Liu, K. *et al.* Fundamental Scaling Laws in Nanophotonics. *Sci. Rep.* **6**, 37419; doi: 10.1038/srep37419 (2016).
**Publisher's note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Material {#S1}
======================
###### Supplementary Information
A.M. is supported by Air Force Office of Scientific Research-Young Investigator Program under grant FA9550-15-1-0150 and Startup fund provided by University of Washington. V.S. is supported by Air Force Office of Scientific Research-Young Investigator Program under grant FA9550-14-1-0215, and under grant FA9550-14-1-0378.
**Author Contributions** V.S. and A.M. conceived the idea. K.L. and V.S. generated the figures and analysis for the cavities, laser, modulator, and detector. S.S. developed the model and figures for both the device and link figure-of-merit. A.M. analyzed the nonlinear optical switches. All four authors discussed the results, and wrote the manuscript.
{#f1}
{#f2}
![Scaling performance of electro-optic devices.\
(**a**) Laser electrical power threshold, *α*~*g*~ = 4700 cm^−1^ for gain medium of InGaAsP[@b20], *τ*~*spo*~ = 10 ns[@b20], *ν*~*sa*\_*InP*~ = 15000 cm/s, *η*~*i*~ = 0.8, *ρ*~*c*~ = 1.0 ×10^−8^ Ω cm^2^, and *R*~*sh*~ = 16.5 Ω/, (**b**) Laser modulation speed, (**c**) Energy efficiency of EOM, *r*~*EO*~ = 100 pm/V~bias~, (**d**) Modulation speed of the EOM, *R*~*s*~ = 500 Ω, *R*~*dr*~ = 500 Ω, (**e**) Photodetector responsivity, *Δn*~*c*~ = 1.0 × 10^14^/m^3^, *n*~*c*~ = 1.0 × 10^19^/m^3^, *μ*~*n*~ = 1400 cm^2^/Vs, *ν*~*sa*\_*Si*~ = 10000 cm/s, *C*~*n*~ = 1.1 × 10^−30^ cm^6^/s, *η*~*i*~ = 0.8, *V*~*bias*~ = 2.0 V, evaluated at *BW* = 10 GHz, and (**f**) Response speed of photodetector. (**g--i**) Device FOMs for laser, modulator, and photodetector devices.](srep37419-f3){#f3}
{#f4}
![Scaling performance of a digital interconnect link technology for on-off key (OOK) modulation.\
Data points represent link lengths of 1 mm for chip-size signal communication, whereas dashed-lines denote how the link FOM changes for 100 μm (top) and 1 cm (bottom) communication distances. The electrical link (green) is based on the 22 nm technology node (similar link distances apply). The MNP chip length FOM is below unity (data clipped), due to the inherent losses in the link requiring high laser powers. Hybridizations[@b36] (purple) where active components are plasmonic and passive data routing are photonics allow for highest FOMs for all length sales clearly outperforming electronics[@b20]. The RR, FP, and Hybrid MNP use Silicon photonics waveguides as interconnects (*α*~Si~ = 0.01 dB/mm), whereas the all-plasmonic MNP link deploys surface plasmon polariton waveguides (*α*~SPP~ = 44 dB/mm).](srep37419-f5){#f5}
| 2023-11-10T01:26:19.665474 | https://example.com/article/1543 |
How Far Apart Should Onion Sets Be Planted?
by Ellen Douglas
Onions bulbs need more space than scallions.
When it comes to planting onions, you have a choice of how to start the pungent vegetables. They come as seeds and started seedlings. Another option, however, is to plant sets, which are tiny onion bulblets. The spacing for planting onion sets is crucial, because you need much more room to grow bulb onions than you do to grow scallions.
About Sets
Sets are available for several allium types, including red and white onions. The onion sets can be grown for either the above ground or below ground parts of the plant. In other words, they can become scallions -- also known as green onions or onion tops -- or bulb onions. If you plan to grow both, separate the sets when they arrive -- they often come as mixed varieties. Larger sets work best as scallions, while those smaller than a nickel make better bulb onions.
Planting Onions
The depth for which you plant sets when growing onions is determined by the size of the sets themselves. Dig a hole to a depth that allows the tip to sit just above the soil's surface. Spacing should be at least 5 inches apart within the row. If you plant more than one row, space rows at least 1 foot apart.
Planting Scallions
The holes you dig for scallions should be no more than 2 inches deep. Because bulb development is not your goal, the sets can be much closer together. Space onion sets for scallions as close as 1 inch apart, in rows that are about 1.5 feet apart.
Timing
It not only takes less space to produce scallions than onions, it also takes much less time to develop onion tops than for the bulbs themselves to turn into full-sized onions. Expect the scallions to mature in three to four weeks. Traditional onions need three to four months to develop. In U.S. Department of Agriculture plant hardiness zones 8 to 10, scallion sets, which prefer cool weather, can be grown in both spring and fall. Set them into the ground in April for spring harvest and August or September for fall harvest. Plant sets for bulb onions starting in September. They can be planted all the way through March.
About the Author
Ellen Douglas has written on food, gardening, education and the arts since 1992. Douglas has worked as a staff reporter for the Lakeville Journal newspaper group. Previously, she served as a communication specialist in the nonprofit field. She received her Bachelor of Arts from the University of Connecticut.
Photo Credits
Have Feedback?
Thank you for providing feedback to our Editorial staff on this article. Please fill in the following information so we can alert the Home Guides editorial team about a factual or typographical error in this story. All Fields are required. | 2024-05-01T01:26:19.665474 | https://example.com/article/6184 |
---
abstract: 'We extend the concept of the functional renormalization for quantum many-body problems to nonequilibrium situations. Using a suitable generating functional based on the Keldysh approach, we derive a system of coupled differential equations for the $m$-particle vertex functions. The approach is completely general and allows calculations for both stationary and time-dependent situations. As a specific example we study the stationary state transport through a quantum dot with local Coulomb correlations at finite bias voltage employing two different truncation schemes for the infinite hierarchy of equations arising in the functional renormalization group scheme.'
author:
- 'R. Gezzi'
- 'Th. Pruschke'
- 'V. Meden'
title: 'Functional renormalization group for nonequilibrium quantum many-body problems'
---
Introduction {#sec:intro}
============
The reliable calculation of physical properties of interacting quantum mechanical systems presents a formidable task. Typically, one has to cope with the interplay of different energy-scales possibly covering several orders of magnitude even for simple situations. Approximate tools like perturbation theory, but even numerically exact techniques can usually handle only a restricted window of energy scales and are furthermore limited in their applicability by the approximations involved or the computational resources available. In addition, due to the divergence of certain classes of Feynman diagrams, some of the interesting many-particle problems cannot be tackled by straight forward perturbation theory.
The situation becomes even more involved if one is interested in properties off equilibrium, in particular time-dependent situations. A standard approach for such cases is based on the Keldysh formalism[@Keldysh] for the time evolution of Green functions, resulting in a matrix structure of propagators and self-energies. This structure is a direct consequence of the fact that in nonequilibrium we have to calculate averages of operators taken not with respect to the ground state but with respect to an arbitrary state. Therefore, the Gell-Mann and Low theorem[@fetterwalecka] is not valid any more. Other approaches attempt to treat the time evolution of the nonequilibrium system numerically, for example using the density matrix renormalization group[@schollw:rmp], the numerical renormalization group (NRG)[@costi:97; @anders:06] or the Hamiltonian based flow-equation method.[@lobaskin:05]
The Keldysh technique shows a big flexibility and one therefore can find a wide range of applications such as transport through atomic, molecular and nano devices under various conditions,[@Meir:1992] systems of atoms interacting with a radiation field in contact with a bath,[@koremann:66; @langreth:76] or electron-electron interaction in a weakly ionized plasma.[@altshuler:78]
One powerful concept to study interacting many-particle systems is the rather general idea of the renormalization group[@wilson:75] (RG), which has also been applied to time-dependent and stationary nonequilibrium situations recently.[@Schoeller:1999; @Schoeller:2000; @Keil:2001; @Jens1; @rosch:05] In the RG approach one usually starts from high energy scales, leaving out possible infrared divergences and works ones way down to the desired low-energy region in a systematic way. However, the precise definition of “systematic way” does in general depend on the problem studied.
In order to resolve this ambiguity for interacting quantum mechanical many-particle systems in equilibrium, two different schemes attempting a unique, problem independent prescription have emerged during the past decade. One is Wegner’s Hamiltonian based flow-equation technique,[@wegner; @glazek] the second a field theoretical approach, which we want to focus on in the following. This approach is based on a functional representation of the partition function of the system and has become known as functional renormalization group (fRG).[@polchinski; @wetterich; @morris:94; @salmhoferbuch].
A detailed description of the various possible implementations of the fRG and its previous applications in equilibrium can be found e.g. in Refs. and . In the present work we extend the fRG to nonequilibrium by formulating the problem on the real instead of the imaginary time axis using the functional integral representation of the action on the Keldysh contour. Within a diagrammatic approach a similar set of fRG flow equations has already been derived by Jakobs and Schoeller and applied to study nonlinear transport through one-dimensional correlated electron systems.[@jakobs:03; @jakobsneu] We believe that this method will enable us to treat a variety of nonequilibrium problems within a scheme which is well established in equilibrium and in contrast to other approaches is comparatively modest with respect to the computer resources required. Our framework for nonequilibrium will turn out to be sufficiently general to allow for a treatment of systems disturbed by arbitrary external fields (bias voltage, laser field, etc.), which can be constant or time-dependent.
For classical many-body problems the fRG (also called nonperturbative renormalization group) was used to study nonequilibrium transitions between stationary states.[@Canet]
As a simple but nontrivial application to test the potential and weakness of our implementation of a nonequilibrium fRG we choose the single impurity Anderson model (SIAM).[@anderson:61] This model represents the paradigm for correlation effects in condensed matter physics and is at the heart of a large range of experimental[@kastner92; @kouwenhoven01; @nygard00; @madhavan98; @li98; @fiete03; @pustilnik04] and theoretical investigations.[@georges:96; @maier:06] It furthermore is the standard model for the description of the transport properties of interacting single-level quantum dots.
The paper is organized as follows. In Sec. \[formalism\] and the appendices we extend the equilibrium fRG to treat general nonequilibrium quantum many-body problems. As an example we study the finite bias, stationary transport through an Anderson impurity in Sec. \[appli\]. Within the nonequilibrium extension we obtain a system of coupled tensor equations, which represent the flow of the different components (in the Keldysh space) of the self-energy and the vertex function. We discuss two approximations derived from the fRG scheme that have been successfully applied to the equilibrium situation.[@meden06:1; @meden06:2] A summary and outlook in Sec. \[summary\] concludes the paper.
Functional RG in nonequilibrium {#formalism}
===============================
We start from the standard definition of the two-time Green function $$\label{eq:standard_GF}
G (\xi',\xi)=-i \langle S^{-1} \psi_I(\xi')
\psi_I^{\dag}(\xi) S \rangle\;\; ,$$ in the interaction picture, where $\xi$ comprises a set of single-particle quantum numbers and time $t$. The time evolution operators are given as $$\begin{aligned}
\label{eq:time_evolve}
S & = & {\rm T} \exp\left\{-i\int\limits^{\infty}_{-\infty}V_I(t)dt\right\}\\[5mm]
\label{eq:anti_time_evolve}
S^{-1} & =& \tilde{\rm T} \exp\left\{i\int\limits^{\infty}_{-\infty}V_I(t)dt\right\}\;\;,\end{aligned}$$ with ${\rm T}$ the usual time ordering and $\tilde{\rm T}$ the anti time-ordering operator. The interaction term $V_I(t)$ is arbitrary, including possible explicit time dependence.
\[cb\]\[cb\][$C_{K_-}$]{} \[ct\]\[ct\][$C_{K_+}$]{} \[ct\]\[ct\][$t$]{} \[rc\]\[rc\][$-\infty$]{} \[lc\]\[lc\][$\infty$]{} ![(color online) Keldysh contour[]{data-label="fig:keldysh_contour"}](figure1_Gezzi "fig:"){width="40.00000%"}
In a nonequilibrium situation, the propagation of the system from $-\infty\to\infty$ is not any more equivalent to the propagation from $\infty\to-\infty$, i.e. one has to distinguish whether the time arguments in Eq. (\[eq:standard\_GF\]) belong to the former or latter.[@LandauX; @Rammer; @Haug] This scheme is usually depicted by the Keldysh double-time contour shown in Fig. \[fig:keldysh\_contour\], where $C_{K_-}$ represents the propagation $-\infty\to \infty$ (upper branch of the Keldysh contour) and $C_{K_+}$ the propagation $\infty\to-\infty$ (lower branch of the Keldysh contour). Consequently, one has to introduce four distinct propagators, namely the time-ordered Green function $$\begin{aligned}
\label{eq:time_o_GF}
\!\!\!\!\!\!\!\!\!\!\! && G^{--}(\xi',\xi) = -i\langle {\rm T} \psi(\xi')\psi^{\dag}(\xi) \rangle \nonumber \\*
\!\!\!\!\!\!\!\!\!\!\! && = -i\theta(t'-t)\langle\psi(\xi')\psi^{\dag}(\xi)\rangle-\zeta i\theta(t-t')\langle
\psi^{\dag}(\xi)\psi(\xi') \rangle ,\end{aligned}$$ where $t,t'\in C_{K_-}$, the anti time-ordered Green function $$\begin{aligned}
\label{eq:anti_time_o_GF}
\!\!\!\!\!\!\!\!\!\!\! && G^{++}(\xi',\xi) = -i\langle \tilde{\rm T} \psi(\xi') \psi^{\dag}(\xi) \rangle
\nonumber \\
\!\!\!\!\!\!\!\!\!\!\! && = -i\theta(t-t')\langle
\psi(\xi')\psi^{\dag}(\xi)\rangle-\zeta i\theta(t'-t)\langle
\psi^{\dag}(\xi)\psi(\xi') \rangle ,\end{aligned}$$ with $t,t' \in C_{K_+}$ and $$\begin{aligned}
\label{eq:Gmp}
G^{+-}(\xi',\xi) &=& -i\langle
\psi(\xi')\psi^{\dag}(\xi)\rangle\;,t'\in C_{K_+}, t \in C_{K_-}\\
\label{eq:Gpm}
G^{-+}(\xi',\xi) &=& -\zeta i\langle \psi^{\dag}(\xi)\psi(\xi')\rangle\;,t'\in
C_{K_-},t\in C_{K_+}\end{aligned}$$ where $\zeta=+1$ for bosons and $\zeta=-1$ for fermions. Concerning the Keldysh indices we here follow the notation of Ref. . $G^{--}(\xi',\xi)$ and $G^{++}(\xi',\xi)$ take into account the excitation spectrum while $G^{+-}(\xi',\xi)$ and $G^{-+}(\xi',\xi)$ describe the thermodynamic state of the system. Only three of the Green functions are independent and one commonly introduces the linear combinations $$\begin{aligned}
\label{eq:Gret}
G^{\rm R}(\xi',\xi) &=&
\theta(t'-t)\left[G^{+-}(\xi',\xi)+\zeta G^{-+}(\xi',\xi)\right]\\
\label{eq:Gadv}
G^{\rm A}(\xi',\xi) &=&
\theta(t-t')\left[G^{-+}(\xi',\xi)+\zeta G^{+-}(\xi',\xi)\right]\\
\label{eq:Gkeldysh}
G^{\rm K}(\xi',\xi) &=& G^{-+}(\xi',\xi)+G^{+-}(\xi',\xi)\;\;,\end{aligned}$$ named retarded, advanced and Keldysh component, respectively.
To derive a nonequilibrium fRG scheme for an interacting many-body problem along the lines of Refs. and one needs a formulation that allows to express the $m$-particle vertices as functional derivatives of a generating functional. Here we use the approach by Kameneev.[@kameneev] To set up a functional integral representation of the generating functional we define the matrix $$\hat{G}=\left(\begin{array}{cc}G^{--} & G^{-+}\\
G^{+-} & G^{++}\end{array}\right)$$ and the short hand notation $$\begin{aligned}
\left(\bar\psi,\hat{O}\psi\right) = i\int\limits_{-\infty}^\infty
d\xi d\xi'
\bar\psi(\xi)\hat{O}_{\xi,\xi'}\psi(\xi')\;\;,\end{aligned}$$ where $$\psi =
\left( \begin{array}{c}
\psi_{-}\\
\psi_{+}
\end{array}\right)$$ is a spinor of fields (Grassmann for fermions or complex for bosons) with $\psi_-$ having a time from the upper branch of the Keldysh contour and $\psi_+$ a time from the lower. Later it will also prove useful to Fourier transform from time $t$ to frequency $\omega$. One then has to replace $t$ in $\xi$ by $\omega$. The integrals over $\xi$ and $\xi'$ stand for summations over the quantum numbers and integrations over time or frequency. The following steps can be performed with $\xi$ either containing time or frequency. The generalization of the functional integral representation of the partition function to nonequilibrium is[@kameneev]
$$\begin{aligned}
\label{eq:partitionfunction}
\Xi = \frac{1}{\Xi_0} \int
{\mathcal D} \bar \psi \psi \exp{\left\{ \left(\bar \psi,
\left[\hat{G}_0\right]^{-1}\psi \right) - iS_{\rm int}\left(\{ \bar \psi
\}, \{\psi\}\right) \right\} } \;, \;\; \Xi_0= \int{\mathcal D} \bar \psi \psi
\exp{\left\{\left(\bar\psi,\left[\hat{G}_0\right]^{-1}\psi\right)\right\}}\;\;.\end{aligned}$$
The matrix $\hat{G}_0$ denotes the propagator of the noninteracting part of the many-body problem and $S_{\rm int}$ is the (arbitrary) interaction term.
To construct a generating functional for $m$-particle Green functions, one introduces external source fields $\eta$ and $\bar\eta$ $$\label{eq:genfunct}
{\mathcal W } \left(\{\bar \eta \}, \{ \eta\} \right) =
\frac{1}{\Xi_0}
\int {\mathcal D} \bar \psi \psi \exp \bigg\{
\left( \bar \psi, \left[\hat{G}_{0}\right]^{-1}
\psi\right) - iS_{\rm int}(\{\bar \psi \}, \{ \psi \})
- \left( \bar \psi, \eta\right) - \left(\bar \eta, \psi
\right) \bigg\} \;.$$ The (connected) $m$-particle Green function $G_m^{(c)}$ can then be obtained by taking functional derivatives $$\label{eq:gmdef}
G_m^{(c)}\left(\left\{\xi_j'\right\};\left\{\xi_j\right\}\right) =
\left.(\zeta i)^m \frac{\delta^m}{\delta \bar \eta_{\xi_1'}
\ldots \delta \bar \eta_{\xi_m'}}
\frac{\delta^m}{\delta \eta_{\xi_m} \ldots \delta \eta_{\xi_1}} {\mathcal
W}^{(c)}\left(\{\bar \eta \}, \{ \eta\} \right) \right|_{\eta
=\bar\eta=0}$$ with $$\begin{aligned}
\label{eq:wcdef}
{\mathcal W}^c\left(\{\bar \eta \}, \{ \eta\} \right) =
\ln{ \left[ {\mathcal W}
\left(\{\bar \eta \}, \{ \eta\} \right) \right]} \; .\end{aligned}$$ The derivatives in Eq. (\[eq:gmdef\]) are taken with respect to the spinors $\eta$ and $\bar \eta$, i.e. the resulting Green function $G_m^{(c)}$ is a tensor of rank $2m$ in the Keldysh indices. In the following we adopt the notation that quantities with explicit index $m$ are tensors of rank $2m$; without index $m$ we denote the propagator and self-energy, both carrying a hat to point out their matrix structure.
Introducing the fields $$\begin{aligned}
\label{eq:new_fields}
\phi_\xi = i\frac{\delta}{\delta \bar \eta_\xi} {\mathcal
W}^c\left(\{\bar \eta \}, \{ \eta\} \right) \; , \;\;\;\;
\bar\phi_\xi = \zeta i \frac{\delta}{\delta \eta_\xi} {\mathcal
W}^c\left(\{\bar \eta \}, \{ \eta\} \right)\end{aligned}$$ we can perform a Legendre transformation $$\begin{aligned}
\label{eq:gammadef}
\Gamma \left(\{\bar \phi \}, \{ \phi \} \right) = - {\mathcal
W}^c\left(\{\bar \eta \}, \{ \eta\} \right) -\left(\bar \phi, \eta
\right)
-\left(\bar \eta, \phi \right)
+ \left(\bar \phi, \left[\hat{G}_{0}\right]^{-1}\phi\right) \; , \end{aligned}$$ to the generating functional of the one-particle irreducible vertex functions $\gamma_m$ (tensors of rank $2m$ in the Keldysh indices) $$\label{eq:vertexfundef}
\gamma_m\big(\left\{\xi_j'\right\};\left\{\xi_j\right\}\big) =
\left. i^m \frac{\delta^m}{\delta \bar \phi_{\xi_1'} \ldots
\delta \bar \phi_{\xi_m'}}
\frac{\delta^m}{\delta \phi_{\xi_m} \ldots \delta \phi_{\xi_1}} \Gamma
\left(\{\bar \phi\}, \{ \phi\} \right) \right|_{\phi=\bar\phi=0}\;.$$
In contrast to the usual definition[@negele] of $\Gamma$ for convenience (see Appendix A) we added a term $\left(\bar \phi, \left[\hat{G}_{0}\right]^{-1}
\phi\right)$ in Eq. (\[eq:gammadef\]). The relations between the $G_m^{(c)}$ and $\gamma_m$ in imaginary time can be found in text books[@negele] and can straightforwardly be extended to real times on the Keldysh contour. For example, for the one-particle Green function one obtains $$\begin{aligned}
G_1(\xi';\xi) & = & G_1^c(\xi';\xi)\\
& = & i \frac{\delta}{\delta \bar \eta_{\xi_1'}}
\frac{\delta}{ \delta \eta_{\xi_1}} {\mathcal W}^c = -\zeta
\hat{G}_{\xi',\xi}\;\; , \\
& = &
\left[ \gamma_1 - \zeta \left[\hat{G}_0\right]^{-1}
\right]^{-1}_{\xi',\xi} \end{aligned}$$ where $$\begin{aligned}
\hat{G}_{\xi',\xi} =
\left(\left[\hat{G}_0\right]^{-1} - \hat{\Sigma}\right)^{-1}_{\xi',\xi} ,\end{aligned}$$ with the proper one-particle self-energy $\hat{\Sigma}$. This implies the relation $\hat{\Sigma} = \zeta \gamma_1$. We have a matrix structure not only with respect to $\xi$ and $\xi'$ (as in equilibrium), but also with respect to the Keldysh indices. How does this additional structure manifests itself in the Green functions (\[eq:gmdef\])? For $m=1$ we have two derivatives with respect to spinor fields, i.e. the structure of a tensor product, which can be made explicit by using a tensor product notation $$G_1^{c}\left( \xi',\xi\right) =
(\zeta i)\left.\frac{\delta}{\delta \bar \eta_{\xi'}} \otimes\frac{\delta}
{\delta\eta_{\xi}}{\mathcal W}^c\right|_{\eta=\bar\eta=0}\;\;,$$ leading to the matrix $$\begin{aligned}
\label{eq:gm_one_p}
G_1^{c}\left( \xi',\xi\right) &=&
(\zeta i)\left(\begin{array}{cc}\frac{\delta^2 {\mathcal W}^c}
{\delta\bar\eta_{-}(\xi') \delta \eta_{-}(\xi)} &\frac{\delta^2
{\mathcal W}^c }{\delta \bar \eta_{-}(\xi')\delta
\eta_{+}(\xi)} \\[2mm] \frac{\delta^2 {\mathcal W}^c }
{\delta \bar \eta_{+}(\xi')\delta \eta_{-}(\xi)} & \frac{\delta^2
{\mathcal W}^c }{\delta \bar \eta_{+}(\xi')\delta \eta_{+}(\xi)}
\end{array}\right)\nonumber\\[2mm]
&=&
\left(\begin{array}{cc} G^{--}(\xi',\xi) & G^{-+}(\xi',\xi) \\[2mm]
G^{+-}(\xi',\xi) & G^{++}(\xi',\xi)
\end{array}\right)\;\;.\end{aligned}$$
Up to now we extended standard text book manipulations[@negele] from imaginary time to the real-time Keldysh contour. We emphasize that no translational invariance in time is assumed. To derive the fRG flow equations in nonequilibrium we can follow the steps of Ref. . In Eqs. (\[eq:partitionfunction\]) and (\[eq:genfunct\]) we replace the noninteracting propagator by a propagator $\hat{G}_{0}^\Lambda$ depending on a parameter $\Lambda \in [\Lambda_0,0]$ and require $$\begin{aligned}
\label{eq:demands}
\hat{G}_{0}^{\Lambda_0} = 0 & , & \hat{G}_{0}^{\Lambda=0} = \hat{G}_{0} \; ,\end{aligned}$$ i.e. at the starting point $\Lambda = \Lambda_0$ no degrees of freedom are “turned on” while at $\Lambda=0$ the $\Lambda$ free problem is recovered. In models with infrared divergences $\Lambda$ can be used to regularize the problem. In equilibrium this is often be achieved by implementing $\Lambda$ as an infrared cutoff in momentum or energy. One of the advantages of the fRG approach over other RG schemes is that one is not restricted to these choices and other ways of introducing the parameter $\Lambda$ have turned out to be useful for equilibrium problems.[@Hon; @lecturenotes] All that is required to derive the fundamental flow equations (\[eq:gamma1f2\]) and (\[eqq1\]) (see below) are the conditions Eq.(\[eq:demands\]). In our application of the nonequilibrium fRG to the steady state transport through an interacting quantum dot it is natural to implement $\Lambda$ as an energy cutoff. However, such a choice must not be the natural one in cases where one is interested in studying transient behavior. In this situation the propagator and the vertex functions in general depend on several spatial and time variables and there is no obvious momentum or energy cutoff scheme. Within the fRG several ways of introducing $\Lambda$ can be worked out, compared and the one best suited for the problem under investigation can be identified.
Through $\hat{G}_{0}^\Lambda$ the quantities defined in Eqs. (\[eq:partitionfunction\]) to (\[eq:vertexfundef\]) acquire a $\Lambda$-dependence. Taking the derivative with respect to $\Lambda$ one now derives a functional differential equation for $\Gamma^{\Lambda}$. From this, by expanding in powers of the external sources, an infinite hierarchy of coupled differential equations for the $\gamma_m^\Lambda$ is obtained. Although the steps in the derivation are formally equivalent to Ref. , because of the real-time formulation additional factors $i$ and signs appear in several places. We thus believe that it is helpful to present the details of the derivation for the present approach, which is done in Appendix A.
\[br\]\[br\][$\xi$]{} \[br\]\[br\][$\xi'$]{} ![\[fig:gamma1\] Diagrammatic form of the flow equation for $\gamma_1^{\Lambda}$. The slashed line stands for the single scale propagator $\hat{\mathcal S}^{\Lambda}$.](figure2_Gezzi "fig:"){width="20.00000%"}
In particular, for the flow of the self-energy one finds the expression $$\begin{aligned}
\frac{d}{d \Lambda} \gamma_1^{\Lambda}(\xi';\xi) &=&
\zeta \frac{d}{d \Lambda} \hat{\Sigma}^{\Lambda}_{\xi',\xi}\nonumber\\
\label{eq:gamma1fl}
&=& \mbox{ Tr}\, \left[\hat{\mathcal S}^{\Lambda}
\gamma_2^{\Lambda}(\xi', \cdot;
\xi, \cdot) \right] \; , \end{aligned}$$ which can be visualized by the diagram in Fig. \[fig:gamma1\]. The trace in Eq. (\[eq:gamma1fl\]) is meant to run over all quantum numbers and time respectively frequency. In Eq. (\[eq:gamma1fl\]) appears the so-called single scale propagator (the slashed line in Fig. \[fig:gamma1\]) $$\begin{aligned}
\label{eq:Sdef}
\hat{\mathcal S}^{\Lambda} & = &
\hat{G}^{\Lambda} \hat{\mathcal Q}^{\Lambda}
\hat{G}^{\Lambda} \;,\\
\label{eq:Qlambdadef}
\hat{\mathcal Q}^{\Lambda} &=& \frac{d}{d \Lambda} \left[ \hat{G}_{0}^\Lambda\right]^{-1} \; .\end{aligned}$$ and the quantity $\gamma_2^{\Lambda}(\xi', \cdot;
\xi, \cdot)$ denotes the matrix obtained by keeping the indices $\xi$ and $\xi'$ fixed.
\[br\]\[br\][$\xi$]{} \[br\]\[br\][$\xi'$]{} ![\[fig:gamma2\] Diagrammatic form of the flow equation for $\gamma_2^{\Lambda}$. The slashed line stands for the single scale propagator $\hat{\mathcal S}^{\Lambda}$, the unslashed line for $\hat{G}^{\Lambda}$.](figure3_Gezzi "fig:"){width="45.00000%"}
We thus arrive at an expression that is formally identical to Eq. (19) in Ref. . The difference appears in the matrix structure, which now also contains the index components for the branches of the Keldysh contour. To make this explicit, we write out Eq. (\[eq:gamma1fl\]) with respect to the Keldysh structure $$\label{eq:gamma1f2}
\zeta\frac{d}{d\Lambda}\Sigma^{\alpha\beta,\Lambda}_{\xi',\xi}
=
{\rm Tr}\sum\limits_{\mu\nu}{\mathcal S}^{\mu\nu,\Lambda}
\gamma_{2}^{\alpha\nu\beta\mu,\Lambda}(\xi',\cdot;\xi,\cdot)\;,$$ where $\alpha,\beta,\mu$ and $\nu$ denote Keldysh indices and take the values $\mp$. Apparently, the derivative of $ \gamma_1^{\Lambda}$ is determined by $
\gamma_1^{\Lambda}$ and the two-particle vertex $ \gamma_2^{\Lambda}$. Thus an equation for $
\gamma_2^{\Lambda}$ is required. The structure of this equation turns out to be similar to Eq. (21) of Ref. . Here we only show the diagrams representing it in Fig. \[fig:gamma2\], the full expression is given in Eq. (\[eqq1\]). The differential equation for $\gamma_2^\Lambda$ does not only contain $\gamma_1^{\Lambda}$ – implicitly via the propagators – and $\gamma_2^{\Lambda}$, but also the three-particle vertex $\gamma_3^{\Lambda}$. The flow of the three-particle vertex depends on the four-particle vertex etc. It is generically impossible to solve the full set of infinitely many coupled differential equations. In applications one has to truncate it, and this is usually done at order $m=2$, i.e. one replaces all vertices with $m>2$ by their initial values, which for problems with a two-particle interaction means $\gamma_m^\Lambda=\gamma_m^{\Lambda_0}=0$ for $m>2$. Even within this truncated system the remaining set of differential equations must typically further be approximated to allow for an analytical or a numerical solution.[@Honerkamp:2003; @meden06:1; @meden06:2] At the end of the fRG flow, that is for $\Lambda=0$, the $\gamma_m^{\Lambda=0}=\gamma_m$ present approximations to the many-body vertex functions from which observables can be computed (for examples see Sec. \[appli\]).
We again note that a similar set of flow equations was derived by Jakobs and Schoeller using a diagrammatic approach.[@jakobs:03; @jakobsneu]
Application to quantum dots {#appli}
===========================
The derivation of the flow equations in the previous section and the appendices was completely general and they can be used to study time dependent or stationary properties of systems at finite temperature $T$ or $T=0$. A simple but nonetheless nontrivial application is nonequilibrium, stationary transport through an interacting single-level quantum dot at $T=0$. For a stationary situation, time translational invariance holds and one can Fourier transform to frequency space. Moreover, because the quantum dot is a zero-dimensional structure, no additional degrees of freedom except spin have to be taken into account, thus considerably reducing the complexity of the problem.
Nonequilibrium theory of single-level quantum dots described by the SIAM (see below) has been a major subject of research over the past years. Several techniques have been developed respectively applied, for example statistical[@goglin:05; @han:06; @han:06_2], perturbative,[@Hershfield:1991; @hershfield:92; @meir:92; @Yeyati; @wingreen:94; @fujii:03; @han:04; @hamasaki:05; @datta:06; @Thygesen] RG based[@Schoeller:2000; @Jens1; @rosch:05] and numerical procedures.[@lobaskin:05; @anders:06] In particular the RG based calculations were up to now restricted to situations away from the Kondo regime, either by looking at features in the mixed-valence state [@Schoeller:2000] or in strong magnetic fields.[@Jens1; @rosch:05] Despite this tremendous ongoing effort, relatively little is known about nonequilibrium properties, even in the stationary state, of the model. On the other hand, the very detailed knowledge of the [*equilibrium*]{} properties[@hewson:book] makes it possible to interpret certain features or even dismiss approximations on the basis of this fundamental understanding.
Single impurity Anderson model
------------------------------
The standard model to describe transport through interacting quantum dots is the SIAM.[@anderson:61] Experimentally,[@kastner92; @kouwenhoven97] the dot region is attached to two external leads, and the current is driven by an applied bias voltage $V_B$. Furthermore, the filling of the dot can be controlled by a gate voltage $V_G$. To keep the notation simple we use units with $e=\hbar=1$. The Hamiltonian reads $$\begin{aligned}
H
& = &
\sum_{\vec{k}\sigma l} \varepsilon_{\vec{k}\sigma l}
c^\dag_{\vec{k}\sigma l} c^{\phantom{\dag}}_{\vec{k}\sigma l}
\nonumber\\
&& + \sum_\sigma V_G d^\dag_\sigma d^{\phantom{\dag}}_\sigma +
U\left(n_\uparrow-\frac{1}{2}\right)\left(n_\downarrow-\frac{1}{2}\right)
\nonumber\\
\label{eq:siam}
&& +\sum_{\vec{k}\sigma
l}\left[V_{\vec{k}\sigma l}c^\dag_{\vec{k}\sigma
l}d^{\phantom{\dag}}_\sigma+
\mbox{H.c.}\right] \end{aligned}$$ in standard second quantized notation ($n_\sigma = d^\dag_\sigma d^{\phantom{\dag}}_\sigma$). As usual, $\vec{k}$ is the wave vector of the band states in the leads and $\sigma$ the spin. In addition, the index $l=L,R$ distinguishes the left and right reservoirs which can have different chemical potentials $\mu_l$ through an applied bias voltage $V_B=\mu_L-\mu_R$. Since we do not include a magnetic field lifting the spin-degeneracy of the spin up and down level, the one-particle Green function and the self-energy are spin independent and we suppress the spin index. We assume the dispersions $\varepsilon_{\vec{k}\sigma l}$ and hybridizations $V_{\vec{k}\sigma l}$ between dot and the left and right leads to be identical, and $V_{\vec{k}}\equiv V/\sqrt{2}$ to be $\vec{k}$-independent. Equation (\[eq:siam\]) is written such that for $V_G=0$ we have particle-hole symmetry.
The interaction in the Hamiltonian is reduced to the dot site only. We can thus reduce the problem to a zero-dimensional one by “integrating out” the leads. For the flow equations we need the propagator $\hat{G}_{d,0}$ at $U=0$. To this end we use the Dyson equation to obtain[@Keldysh; @LandauX; @Haug] $$\label{eq:kop1}
\hat{G}_{d,0}(\omega)=\left[ \left(\begin{array}{cc}
\omega-V_G & 0\\
0 & -\omega+V_G\end{array}\right)
-\hat{\Sigma}_{{\rm lead}} \right]^{-1}\;\;,$$ where $$\begin{aligned}
\hat{G}_{d,0} &=&
\left(\begin{array}{cc} G^{--}_{d,0} & G^{-+}_{d,0} \\[2mm]
G^{+-}_{d,0} & G^{++}_{d,0}
\end{array}\right)\;,\nonumber\\
\label{eq:hybridization}
\hat{\Sigma}_{\rm lead}
&=&
\frac{V^2}{2N}\sum_{\vec{k} l}
\left(\begin{array}{cc}
G^{--}_{\vec{k} l} & G^{-+}_{\vec{k} l} \\[2mm]
G^{+-}_{\vec{k} l} & G^{++}_{\vec{k} l}
\end{array}\right)\;\;.\end{aligned}$$ To further evaluate Eq. (\[eq:hybridization\]), we have to insert the Green functions of the free electron gas, given by $$\begin{aligned}
\label{eq:Gkpp}
G^{--}_{\vec{k} l}(\omega)
&=&
\begin{array}[t]{l}\displaystyle
\frac{1}{\omega-\varepsilon_{\vec{k}}+\mu_l+i\delta} \\[5mm]
\displaystyle
+2i\pi f(\varepsilon_{\vec{k}})
\delta(\omega-\varepsilon_{\vec{k}}+\mu_l)\;,\end{array}\\
G^{++}_{\vec{k} l}(\omega)
&=&
-\left[G_{\vec{k} l}^{--}(\omega)\right]^{*}\;,\\
G_{\vec{k} l}^{-+}(\omega)
&=&
2i\pi f(\varepsilon_{\vec{k}})\delta(\omega-\varepsilon_{\vec{k}}+\mu_l)\;,\\
G_{\vec{k} l}^{+-}(\omega)
&=&
-2i\pi f(-\varepsilon_{\vec{k}})
\delta(\omega-\varepsilon_{\vec{k}}+\mu_l)\; ,\end{aligned}$$ into Eq. (\[eq:kop1\]). This leads to $$\begin{aligned}
\label{eq:kulp1}G_{d,0}^{--}(\omega) &=&
\frac{\omega-V_G-i\Gamma\left[1 -
f_L(\omega)- f_R(\omega)\right]} {(\omega-V_G)^2+\Gamma^2}\;, \\
\label{eq:kulp2}G_{d,0}^{++}(\omega)&=&-[G_{d,0}^{--}(\omega)]^*\;,\\
\label{eq:pulp1}G_{d,0}^{-+}(\omega)&=&i\frac{\Gamma\left[
f_L(\omega)+f_R(\omega)\right]}{(\omega-V_G)^2+\Gamma^2}\;,\\
\label{eq:tulp1}G_{d,0}^{+-}(\omega)&=&-i\frac{\Gamma\left[
f_L(-\omega)+f_R(-\omega)\right]}{(\omega-V_G)^2+\Gamma^2}\;,\end{aligned}$$ where $f_l(\pm\omega)=f\left(\pm(\omega-\mu_l)\right)$ are the Fermi functions of the leads and $\Gamma=\pi |V|^2 N_F$, with $N_F$ the density of states at the Fermi level of the semi-infinite leads, represents the tunnel barrier between the leads and the impurity.
Finally, the quantities we want to calculate are the current $J$ through the dot and the differential conductance $G=dJ/dV_B$. For the model (\[eq:siam\]) the current is given by[@Meir:1992; @wingreen:94]
$$\begin{aligned}
\label{eq:current}
J = \frac{1}{2}(J_L+J_R)=
\frac{i \Gamma}{2\pi}\int
d\epsilon\left[f_L(\epsilon)-f_R(\epsilon)\right] \left[G^{+-}_d(\epsilon)-G^{-+}_d(\epsilon)\right]\;,\end{aligned}$$
where we already used that the left and right couplings are identical, i.e. $\Gamma_L=\Gamma_R=\Gamma/2$, and summed over both spin directions. The interacting one-particle Green function of the dot is denoted by $\hat G_d$ and $J_{L/R}$ are the currents across the left and right dot-lead contacts respectively. Equation (\[eq:current\]) is written in a somewhat unusual form, not employing the relation $G^{+-}_d(\epsilon)-G^{-+}_d(\epsilon)=G^R_d(\epsilon)-G^A_d(\epsilon)=-2\pi i\rho_d(\epsilon)$, where $\rho_d$ denotes the dot’s one-particle spectral function. The reason for this will be explained below.
Another quantity of interest is $\Delta
J=J_L-J_R$.[@hershfield:92] Obviously, since no charge is produced on the quantum dot, $\Delta J=0$ in the exact solution. Using again the results of Refs. and , the expression for $\Delta J$ becomes $$\begin{aligned}
\label{eq:DeltaJ2}
\Delta J &=&
-\frac{\Gamma}{\pi}\int\limits_{-\infty}^\infty d\omega
\frac{F(\omega)\left[\Im m\Sigma^{-+}(\omega)-\Im
m\Sigma^{+-}(\omega)\right]-2\Im
m\Sigma^{-+}(\omega)}{\tilde\Delta(\omega)}\\[2mm]
\tilde\Delta(\omega) &=&
\left|\omega-V_G+i\Gamma\left[1-F(\omega)\right]-\Sigma^{--}(\omega)\right|^2+\left[\Gamma
F(-\omega)+\Im m\Sigma^{+-}(\omega)\right]\left[\Gamma
F(\omega)-\Im m\Sigma^{-+}(\omega)\right]\nonumber\\[2mm]
\label{eq:Fofw}
F(\omega) &=& f_L(\omega)+f_R(\omega)\end{aligned}$$
where we used that $\Sigma^{-+}(\omega)$ and $\Sigma^{+-}(\omega)$ are purely imaginary. Depending on the type of approximation used $\Delta
J=0$ might either hold for all parameters[@wingreen:94; @Thygesen] or not.[@hershfield:92] We note that fulfilling $\Delta J=0$ is, however, not sufficient for an approximation to provide reliable results. E.g. the self-consistent Hartree-Fock approximation fulfills $\Delta J=0$, but nonetheless does not capture the correct physics even in equilibrium.[@hewson:book]
Lowest order approximation
--------------------------
Before studying the coupled system for $\hat\Sigma^\Lambda$ and $\gamma_2^\Lambda$ we begin with the simpler case where we replace $\gamma_2^\Lambda$ on the right hand side of Eq. (\[eq:gamma1f2\]) by the antisymmetrized bare interaction and consider only the flow of $\hat\Sigma$. The only nonzero components of the bare two-particle vertex are those with all four Keldysh indices being the same ($\alpha=\mp$)[@LandauX] $$\begin{aligned}
\label{eq:vertexinit}
\gamma^{\alpha\alpha\alpha\alpha,\Lambda_0}_{2}(\xi_1',\xi_2';\xi_1,\xi_2)
= \alpha iU
\left(\delta_{\sigma_1,\sigma_1'}\delta_{\sigma_2,\sigma_2'}-
\delta_{\sigma_1,\sigma_2'}\delta_{\sigma_2,\sigma_1'}
\right) \; .\end{aligned}$$ With this replacement Eq. (\[eq:gamma1f2\]) reduces to $$\label{eq:pot}
\frac{d}{d\Lambda}{\Sigma}^{\mp\mp,\Lambda}
=\pm iU\int\frac{d\omega}{2\pi}{\mathcal S}^{\mp\mp,\Lambda}(\omega)\;\;.$$ Within this approximation the self-energy is always time or frequency independent, and no terms off-diagonal in the Keldysh contour indices are generated. It leads to at least qualitatively good results in equilibrium,[@meden06:1] and has the additional advantage that the flow equations can be solved analytically.
As the last step we specify how the parameter $\Lambda$ is introduced. Since we are interested in a stationary situation, i.e.the propagators only depend on the time difference $t-t'$, all equations can be transformed into frequency space and one natural choice is a frequency cutoff of the form $$\label{eq:matsubaracutoff}
\hat{G}_{d,0}^\Lambda(\omega) = \Theta\left(|\omega|-\Lambda\right)
\hat{G}_{d,0}(\omega)$$ with $\Lambda_0 \to \infty$.[@hedden04] Evaluating $\hat{\mathcal S}$ by means of the Morris lemma[@hedden04; @morris:94] results in $$\label{eq:single_scale}
\hat{\mathcal S}^{\Lambda}(\omega) \rightarrow \delta(|\omega|-\Lambda)
\frac{1} {\left[\hat{G}_{d,0}(\omega)\right]^{-1}-\hat\Sigma^{\Lambda}}\;\;.$$ A straightforward calculation permits us thus to rewrite Eq. (\[eq:pot\]) as
$$\label{ap}
\frac{d}{d\Lambda} \Sigma^{\mp\mp,\Lambda}=\pm \frac{iU}{2\pi}\sum_{\omega=\pm \Lambda}
\frac{ \frac{G^{\mp\mp}_{d,0}(\omega)}
{\Delta(\omega)} - \Sigma^{\pm\pm,\Lambda}}
{ \left(\frac{G^{++}_{d,0}(\omega)}{\Delta(\omega)} - \Sigma^{--,\Lambda}\right)
\left(\frac{G^{--}_{d,0}(\omega)}{\Delta(\omega)} - \Sigma^{++,\Lambda}\right)-
\left(\frac{G^{-+}_{d,0}(\omega)G^{+-}_{d,0}(\omega)}
{\Delta(\omega)^2}\right) }\;,$$
where $$\begin{aligned}
\Delta(\omega)&=&G^{--}_{d,0}(\omega)
G^{++}_{d,0}(\omega)-G^{-+}_{d,0}(\omega)
G^{+-}_{d,0}(\omega)\\
&=& -\frac{1}{(\omega-V_G)^2+\Gamma^2}\;\;.\end{aligned}$$ Finally, the initial condition for the self-energy is $\lim\limits_{\Lambda_0\to\infty}\hat{\Sigma}^{\Lambda_0}=0$.[@hedden04]
### Equilibrium
We now focus on $T=0$. In a first step we discuss the equilibrium situation, that is $V_B=\mu_L-\mu_R \to 0$. Then we obtain the decoupled system $$\label{eq:ap1}
\frac{d}{d\Lambda}\Sigma^{\mp\mp,\Lambda}= i\frac{U}{\pi}
\frac{V_G \pm \Sigma^{\mp\mp,\Lambda} }
{ \left[ (\Lambda \pm i\Gamma)^2-(V_G \pm \Sigma^{\mp\mp,\Lambda})^2
\right]},$$ which can be solved analytically. We first note that with $\Sigma^{++,\Lambda}=-\left[\Sigma^{--,\Lambda}\right]^*$ both equations are equivalent. For $\Sigma^{--,\Lambda}$ we obtain with the definition $\sigma^\Lambda=V_G+\Sigma^{--,\Lambda}$ the solution $$\label{eq:analytical_solution}
\frac{i\sigma^\Lambda J_1(\frac{\pi\sigma^\Lambda}{U})-(\Lambda+i\Gamma)
J_0(\frac{\pi\sigma^\Lambda}{U})}{i\sigma^\Lambda Y_1(\frac{\pi\sigma^\Lambda}{U})-(\Lambda+i\Gamma) Y_0(\frac{\pi\sigma^\Lambda
}{U})}=\frac{J_0(\frac{\pi V_G}{U})}{Y_0(\frac{\pi V_G}{U})}\;,$$ where $J_n$ and $Y_n$ are the Bessel functions of first and second kind. The desired solution of the cutoff free problem is obtained by setting $\Lambda=0$, i.e. $$\label{eq:analytic0}
\frac{\sigma J_1(\frac{\pi\sigma}{U})-\Gamma
J_0(\frac{\pi\sigma}{U})}{\sigma Y_1(\frac{\pi\sigma}{U})-\Gamma Y_0(\frac{\pi\sigma
}{U})}=\frac{J_0(\frac{\pi V_G}{U})}{Y_0(\frac{\pi V_G}{U})}\;.$$ which is precisely the result Eq. (4) obtained by @meden06:1 It is, however, important to note that in this work, based on the imaginary-time formulation of the fRG, the differential equation has a different structure. It is real and has a positive definite denominator. Thus, while the solutions at $\Lambda=0$ are identical for the imaginary-time and real-time formulations, the flow towards $\Lambda=0$ will show differences. As we will see next, the complex nature of the differential equation (\[eq:ap1\]) can lead to problems connected to its analytical structure when attempting a numerical solution. For small $U/\Gamma$ no particular problems arise. As an example the result for the flow of $\Sigma^{--,\Lambda}$ as function of $\Lambda$ for $U/\Gamma=1$ and $V_G/\Gamma=0.5$ obtained with a standard Runge-Kutta solver is shown in Fig. \[fig:feq\_ok\]. Consistent with the analytical solution Eq. (\[eq:analytic0\]), the imaginary part (dashed line) goes to zero as $\Lambda\to0$, while the real part (solid line) rapidly approaches the value given by formula (\[eq:analytic0\]).
![Flow of $\Sigma^{--,\Lambda}/\Gamma$ with $\Lambda/\Gamma$ for $U/\Gamma=1$, $V_G/\Gamma=0.5$, and $V_B=0$. The full curve shows the real part, the dashed the imaginary part of $\Sigma^{--,\Lambda}$.[]{data-label="fig:feq_ok"}](figure4_Gezzi){width="40.00000%"}
![(color online) Flow of $\Sigma^{--,\Lambda}/\Gamma$ with $\Lambda/\Gamma$ for $U/\Gamma=15$, $V_G/\Gamma=6$, and $V_B=0$. The full and dashed curves show real and imaginary part obtained from the integration $\Lambda=\infty\to\Lambda=0$, the dashed-dotted and dotted curves real and imaginary part obtained from an integration $\Lambda=0\to\Lambda=\infty$, using the solution from (\[eq:analytic0\]) as initial value for $\Sigma^{--,\Lambda}$. The crosses denote the analytical solution (\[eq:analytical\_solution\]).[]{data-label="fig:feq_not_ok"}](figure5_Gezzi){width="40.00000%"}
However, for larger values of $U/\Gamma$ the numerical solution becomes unstable in a certain regime of $V_G$. A typical result in such a situation is shown in Fig. \[fig:feq\_not\_ok\]. The different curves were obtained as follows: The full and dashed ones from the numerical solution starting with $\Sigma^{--,\Lambda_0}=0$ at $\Lambda_0\to\infty$, the dash-dotted and dotted by integrating the differential equation (\[eq:ap1\]) backwards from $\Lambda=0$ with the correct solution for $\Lambda=0$ as given by formula (\[eq:analytic0\]) as initial value. The crosses finally are the results from the analytical solution Eq. (\[eq:analytical\_solution\]). Evidently, there exists a crossing of different branches of solutions to the differential equation for $\Lambda/\Gamma\approx1$ and the numerical solution with starting point $\Lambda=\infty$ picks the wrong one as $\Lambda\to0$. The reason for this behavior is that for large $U$ there exists a certain $V_G^a$ such that $V_G^a+\Sigma^{--,\Lambda_p}=\Lambda_p+i\Gamma$ with real $\Lambda_p$, resulting in a pole in the differential equation (\[eq:ap1\]). For $V_G\ne V_G^a$ this pole does not appear for real $\Lambda_p$, but as shown in Fig. \[fig:solution\] $\Im m\Lambda_p$ changes sign at $V_G^a$, which in turn induces a sign change on the right hand side of the differential equation, leading to the behavior observed in Fig. \[fig:feq\_not\_ok\]. There also exists a second critical value $V_G^b$ such that for $V_G>V_G^b$ we find $\Im m\Lambda_p<0$ and the instability has vanished again.
![(color online) Imaginary part of $\Lambda_p$ determined from (\[eq:analytical\_solution\]) and $V_G+\Sigma^{--,\Lambda_p}=\Lambda_p+i\Gamma$ for different values of $U$ and $V_B=0$ as function of $V_G$. For $U/\Gamma=15$ and $20$ there exist an interval $[V_G^a,V_G^b]$ where $\Im m\Lambda_p>0$, while for small $U$ or $V_G\not\in[V_G^a,V_G^b]$ we always have $\Im m\Lambda_p<0$.[]{data-label="fig:solution"}](figure6_Gezzi){width="40.00000%"}
Obviously, this instability limits the applicability of the present approximation to sufficiently small values of $U$. This is different from the imaginary-time approach by Andergassen [*et al.*]{},[@meden06:1] where this simple approximation leads to qualitative correct results even for values of $U$ significantly larger than $\Gamma$.
### Nonequilibrium
We now turn to the case of finite bias voltage $V_B$. As a typical example, the flow of $\Sigma^{--,\Lambda}$ for $U/\Gamma=1$ (full and dashed curves) and $5$ (dashed-dotted and dotted curves) for $V_G/\Gamma=0.5$ at $V_B/\Gamma=0$ (equilibrium) and $V_B/\Gamma=1$ is shown in Fig. \[fig:noneq\_simple\]. Since the results for $\Sigma^{++,\Lambda}$ are related to those for $\Sigma^{--,\Lambda}$ by $\Sigma^{++,\Lambda}=-\left[\Sigma^{--,\Lambda}\right]^*$ we do not show them here. The $V_B$ dependence of the curves for $\Re e\left[\Sigma^{--,\Lambda}\right]$ (thick lines) looks sensible. For $V_B \neq 0$ an imaginary part of order $U^2$ is generated in the flow which does not vanish for $\Lambda \to 0$ (see the thin dotted line). Causality requires that the relation $$\label{eq:causality}
\Sigma^{--}(\omega)+\Sigma^{++}(\omega)
=-\left[\Sigma^{-+}(\omega)+\Sigma^{+-}(\omega)\right]$$ must hold for the exact solution. Because of $\Sigma^{-+}(\omega)=\Sigma^{+-}(\omega)=0$, the finite imaginary part of $\Sigma^{\alpha\alpha}$ leads to a breaking of the condition (\[eq:causality\]) to order $U^2$ at the end of the fRG flow. This is consistent with the fact that by neglecting the flow of the vertex terms of order $U^2$ are only partially kept in the present fRG truncation scheme. To avoid any confusion we emphasize that our RG method is different from any low-order perturbation theory. The weak breaking of causality can also be understood as a consequence of our approximation leading to a [*complex*]{}, energy-independent self-energy: The off-diagonal components, being related to the distribution functions for electrons and holes, respectively, in general have different support on the energy axis. The energy independence makes it impossible to respect this structure here.
![(color online) Flow of $\Sigma^{--,\Lambda}/\Gamma$ with $\Lambda$ for $U/\Gamma=1$ and $5$ for $V_G/\Gamma=0.5$ at $V_B/\Gamma=0$ and $1$ (thick curves: real part; thin curves: imaginary part). The curve for $\Im m
\Sigma^{--,\Lambda}/\Gamma$ at $U/\Gamma=1$ and $V_B/\Gamma=1$ (thin dashed line) lies on top of the corresponding zero bias curve and is thus not visible.[]{data-label="fig:noneq_simple"}](figure7_Gezzi){width="40.00000%"}
For our further discussion the order $U^2$ violation of Eq. (\[eq:causality\]) means that we may not rely on relations like Eqs. (\[eq:Gret\])-(\[eq:Gkeldysh\]) but have to work with $G^{\alpha\beta}$, thus the somewhat unusual formula (\[eq:current\]). A naive application of $\Sigma^R=\Sigma^{--}-\Sigma^{-+}$ and use of $G^{+-}_d-G^{-+}_d=2i \Im m G^R_d$ would have led to unphysical results. That working with $G^{+-}_d-G^{-+}_d$ is still sensible can be seen from a straightforward evaluation leading to $$\begin{aligned}
\label{eq:gpmmgmp_simple}
&& G^{+-}_d(\omega)-G^{-+}_d(\omega) = \\*
&&
-2i\frac{\Gamma}{\left|\omega-V_G+i\Gamma\left[1-F(\omega)\right]-\Sigma^{--}\right|^2+\Gamma^2F(\omega)F(-\omega)}\nonumber
\\[5mm]
&& F(\omega)= f_L(\omega)+f_R(\omega)\nonumber\end{aligned}$$ which is purely imaginary with a definite sign. Inserting the expression (\[eq:gpmmgmp\_simple\]) into the formula (\[eq:current\]), one can calculate the current and thus the conductance. Since we are at $T=0$, an explicit expression for the current of the cutoff free problem (at $\Lambda=0$) can be obtained by noting that with $\mu_L=V_B/2$, $\mu_R=-V_B/2$ one has $f_L(\omega)-f_R(\omega)=\Theta(V_B/2-|\omega|)$ and $F(\pm\omega)=1$ for $\omega\in[-V_B/2,V_B/2]$, which leads to $$\begin{aligned}
J&=&\frac{\Gamma^2}{\pi}\int\limits_{-V_B/2}^{V_B/2}d\omega
\frac{1}{|\omega-V_G-\Sigma^{--}|^2+\Gamma^2}\nonumber\\
\label{eq:current_simple}
&=&\frac{\Gamma}{\pi}\frac{\Gamma}{\Gamma^\ast}\sum\limits_{s=\pm1}s\,\arctan\left(\frac{V_G^*+s\frac{V_B}{2}}{\Gamma^\ast}\right)\end{aligned}$$ with the abbreviations $$\begin{aligned}
\label{eq:abbriv_VGstar}
V_G^* &=&V_G+\Re e\Sigma^{--} \; ,\\[3mm]
\label{eq:abbriv_alpha}
\Gamma^\ast &=& \sqrt{\Gamma^2+(\Im m\Sigma^{--})^2}\;.\end{aligned}$$ Equation (\[eq:current\_simple\]) for the current is equivalent to the noninteracting expression but with renormalized parameters $V_G^\ast$ and $\Gamma^\ast$, which depend on the interaction as well as the bias and gate voltage.
![(color online) Conductance normalized to $G_0=2e^2/h$ as function of $V_G$ for $U/\Gamma=2$ and several values of the bias voltage $V_B$.[]{data-label="fig:conductance_simple"}](figure8_Gezzi){width="40.00000%"}
An example for the differential conductance as function of $V_G$ obtained from Eq. (\[eq:current\_simple\]) for $U/\Gamma=2$ and several values of $V_B$ is shown in Fig. \[fig:conductance\_simple\], where $G_0=2e^2/h$ (after reintroducing $e$ and $\hbar$). Increasing $V_B$ leads, as expected, first to a decrease of the conductance close to $V_G=0$ and later to a splitting of order $V_B$. Since we will discuss a more refined scheme including parts of the flow of the two-particle vertex next, we do not intend to dwell too much on the results of this simplest approximation. We note in passing that for $V_G=0$ due to particle-hole symmetry we obtain from the differential equation (\[ap\]) that $\Sigma^{--}=0$ independent of $U$. Consequently the current $J$ calculated via Eq. (\[eq:current\_simple\]) and the conductance are independent of $U$, too, and given by the corresponding expressions for the noninteracting system. As we will see in the next section, this deficiency will be cured by the approximate inclusion of the vertex flow. In the present approximation the current conservation $\Delta J=0$ holds for all parameters as $\Sigma^{-+}=\Sigma^{+-}=0$ \[cf. Eq. (\[eq:DeltaJ2\])\].
Flowing vertex
--------------
A more refined approximation is obtained when we insert the flowing two-particle vertex $\gamma_2^\Lambda$ as given by expression (\[eqq2\]) in the calculation of the self-energy Eq. (\[eq:gamma1f2\]). By this we introduce an energy-dependence of the self-energy.[@hedden04] However, because the size of the resulting system of differential equations becomes extremely large if the full frequency dependence is kept (for a discussion on this in equilibrium see Ref. ), we only keep the flow of the frequency independent part of the vertex, an additional approximation which has successfully been used in equilibrium.[@meden06:2] As a consequence we again end up with a frequency independent $\hat\Sigma^\Lambda$. The resulting expression for the self-energy (see Appendix B) is $$\label{eq:sigme_full}
\frac{d}{d\Lambda}\Sigma^{\alpha\beta,\Lambda}
=
-\frac{1}{2\pi}\sum\limits_{\omega= \pm \Lambda}G_d^{\gamma\delta,\Lambda}(\omega)
\left(2U^{\alpha\delta\beta\gamma,\Lambda}-U^{\delta\alpha\beta\gamma,\Lambda}\right)\;,$$ where $U^{\alpha\delta\beta\gamma,\Lambda}$ is the flowing interaction given by the expression (\[eqq3\]). As has been observed by Karrasch [*et al.*]{},[@meden06:2] this approximation leads to a surprisingly accurate description of the transport properties in equilibrium. In particular it is superior to the lowest order approximation including only the bare vertex.
![(color online) Flow of $\Sigma^{--,\Lambda}/\Gamma$ with $\Lambda$ for $U/\Gamma=1$ (left panel) and $U/\Gamma=15$ (right panel) at $V_G=U/2$ and $V_B=0$. The full curves show the real part, the dashed the imaginary part of $\Sigma^{--,\Lambda}$. The stars at the vertical axis denote the values as obtained from the imaginary-time fRG.[@meden06:2][]{data-label="fig:full_eq"}](figure9_Gezzi){width="40.00000%"}
### Equilibrium
We again begin with the discussion of the solution to Eq. (\[eq:sigme\_full\]) in equilibrium. Results for the flow of $\Sigma^{--,\Lambda}$ are presented in Fig. \[fig:full\_eq\] for $U/\Gamma=1$ (left panel) and $U/\Gamma=15$ (right panel) for $V_G=U/2$. Since $\Sigma^{++,\Lambda}=-\left[\Sigma^{--,\Lambda}\right]^*$ only one component is shown. The stars in Fig. \[fig:full\_eq\] denote the solutions of the imaginary-time equations taken from Ref. . Note that for $U/\Gamma=15$ and $V_G/\Gamma>6$ the simple approximation Eq. (\[ap\]) showed an instability, while with the flowing vertex the system is stable even for these large values of $U$ and reproduces the correct equilibrium solutions for $\Lambda\to0$.[@meden06:2] The reason for this is that the flow of the vertex reduces the resulting effective interaction below the critical value in the instability region.[@meden06:2]
![(color online) Flow of $\Sigma^{--,\Lambda}/\Gamma$ and $\Sigma^{-+,\Lambda}/\Gamma$ with $\Lambda$ for $U/\Gamma=1$ (left panel) and $U/\Gamma=15$ (right panel), $V_G/\Gamma=U/2$ and $V_B/\Gamma=1$. The full curves show the real part, the dashed the imaginary part of $\Sigma^{--,\Lambda}$, the dot-dashed the imaginary part of $\Sigma^{-+,\Lambda}$. The real part for the latter is zero.[]{data-label="fig:full_noneq"}](figure10_Gezzi){width="40.00000%"}
### Nonequilibrium
For the same parameters as in Fig. \[fig:full\_eq\] we present the resulting flow with finite bias $V_B/\Gamma=1$ in Fig. \[fig:full\_noneq\]. In addition to the curves for real (solid lines) and imaginary part (dashed lines) of $\Sigma^{--}$ a third curve is displayed, the imaginary part of $\Sigma^{-+}$ (dashed-dotted lines), which now is generated during the flow. Note that $\Re e\Sigma^{-+,\Lambda}=0$ and $\Sigma^{+-,\Lambda}=\left[\Sigma^{-+,\Lambda}\right]^*$. Furthermore, we always find $\Im m\Sigma^{-+,\Lambda}<0$. For $U/\Gamma=15$ (right panel in Fig. \[fig:full\_noneq\]) we have rescaled $\Im m\Sigma^{-+,\Lambda}$ by a factor $10^{2}$ to make it visible on the scale of $\Sigma^{--,\Lambda}$. Since $\Sigma^{\alpha\beta,\Lambda}$ is a complex energy independent quantity Eq. (\[eq:causality\]) is again not fulfilled. We note that the error is still of order $U^2$, but for fixed $V_G$ and $V_B$ it is significantly smaller than in the simplest truncation scheme discussed above.
The energy-independence of the self-energy allows to derive an analytical expression for the current at $T=0$ similar to Eq. (\[eq:current\_simple\]), which due to the appearance of $\Sigma^{-+}$ now becomes $$\label{eq:current_full}
J=\frac{\Gamma}{\pi}\frac{\tilde\Gamma}{\Gamma^\ast}\sum\limits_{s=\pm1}
s\,\arctan\left(\frac{V_G^*+s\frac{V_B}{2}}{\Gamma^\ast}\right)$$ with $V_G^*$ as in Eq. (\[eq:abbriv\_VGstar\]) and $$\begin{aligned}
\tilde\Gamma & = & \Gamma-\Im m\Sigma^{-+}>\Gamma\\[3mm]
\Gamma^\ast & = & \sqrt{\tilde\Gamma^2+(\Im m\Sigma^{--})^2}\;;\end{aligned}$$ where $\Sigma^{\alpha\beta}$ is taken at $\Lambda=0$. Thus, the only change to the expression (\[eq:current\_simple\]) is a formal replacement $\Gamma\to\tilde\Gamma$ in $ J/\Gamma$. Equation (\[eq:current\_full\]) is of the same structure as for the noninteracting case with $V_G$ and $\Gamma$ replaced by renormalized parameters. However, the two self-energy contributions $\Sigma^{--}$ and $\Sigma^{-+}$ enter distinctively different in the expression for the current. While $\Im m\Sigma^{--}$ solely plays the role of an additional life-time broadening, $\Im
m\Sigma^{-+}$ directly modifies the tunneling rate both in the prefactor of $J$ [*and*]{} in the expression for the life-time broadening.
A problem occurs when using the results of the present approximation in Eq. (\[eq:DeltaJ2\]), leading to
$$\label{eq:DeltaJAppr}
\Delta J =
2\frac{\Gamma}{\pi}\int\limits_{-\infty}^\infty d\omega
\frac{\Im m\Sigma^{-+}\left[1-F(\omega)\right]}{
\left|\omega-V_G+i\Gamma\left[1-F(\omega)\right]-\Sigma^{--}\right|^2+\left[\Gamma
F(-\omega)+\Im m\Sigma^{+-}\right]\left[\Gamma
F(\omega)-\Im m\Sigma^{-+}\right]}\;\;.$$
The requirement $\Delta J=0$ is only fulfilled for $V_G=0$, because then $\Sigma^{--}=0$ and the integrand is asymmetric with respect to $\omega$. Thus our approximation of an energy-independent flowing vertex violates current conservation for $V_G\ne0$ in nonequilibrium. We verified that $\Delta J \sim U^2$ which is consistent with the fact that not all terms of order $U^2$ are kept in our truncated fRG procedure. How does $\Delta J$ behave in the limit $V_B\to0$? To see this we note that, because $\Im m\Sigma^{-+}$ does not depend on the sign of $V_B$ and furthermore goes to zero as $V_B\to0$, $\Im
m\Sigma^{-+}\stackrel{V_B\to0}{\sim}V_B^2$. Consequently, $\Delta
J\stackrel{V_B\to0}{\sim}V_B^2$ and hence the violation of current conservation vanishes in the linear response regime $V_B\to0$.
![(color online) Current normalized to $J_0=G_0\frac{\Gamma}{e}$ (after reintroducing $e$ and $\hbar$) as function of $V_B$ for $U/\Gamma=1$, $6$ and $15$ and $V_G=0$. For $U/\Gamma=15$ we find a region of negative differential conductance in the region $|V_B/\Gamma|\approx0.5$ (c.f. Fig. \[fig:G\_Vs\_mu\]).[]{data-label="fig:current_full"}](figure11_Gezzi){width="40.00000%"}
In Fig. \[fig:current\_full\] we show the current at $V_G=0$ as function of $V_B$ for $U/\Gamma=1$, $6$ and $15$. With increasing $U$ the current for intermediate $V_B$ is strongly suppressed. In addition there occurs a structure at low $V_B$, which turns into a region of negative differential conductance with increasing $U$. The appearance of such a shoulder in the current was observed in other calculations as well.[@Hershfield:1991; @hershfield:92; @fujii:03] However, whether the negative differential conductance we find for still larger values of $U$ (c.f. Fig. \[fig:G\_Vs\_mu\]) is a true feature of the model or rather an artifact of the approximations used is presently not clear and should be clarified in further investigations. However, negative differential conductance has also been observed in a slave-boson treatment of the model.[@takahashi:2006]
![(color online) Differential conductance $G$ as function of $V_B$ for $V_G=0$ and various values of $U$. For $U/\Gamma>5$ a distinct minimum around $V_B/\Gamma\approx0.5$ appears.[]{data-label="fig:G_Vs_mu"}](figure12_Gezzi){width="40.00000%"}
Keeping $V_G=0$ fixed, we can calculate the conductance $G=dJ/dV_B$ as function of $V_B$ for different values of $U$. The results are collected in Fig. \[fig:G\_Vs\_mu\]. In contrast to the simple approximation without flow of the vertex, the conductance is now strongly dependent on $U$, except for $V_B=0$, where due to the unitary limit at $T=0$ we always find $G=G_0$. As already anticipated from the current in Fig. \[fig:current\_full\], a minimum in $G$ starts to form around $V_B/\Gamma\approx0.5$ for $U/\Gamma>5$, which is accompanied by a peak at $V_B/\Gamma\approx2$. A similar behavior in the conductance was observed in a perturbative treatment,[@fujii:03] which in contrast to our current approximation involves the full energy-dependence in the self-energy. This at least qualitative agreement – we of course cannot resolve structures like the Hubbard bands with an energy independent self-energy – again supports our claim that despite the violation of the relation (\[eq:causality\]) we can obtain reasonable results from $G^{\alpha\beta}$.
![(color online) Differential conductance $G$ as function of $V_G$ for different values of $V_B$ and $U/\Gamma=1$ (upper panel) and $U/\Gamma=15$ (lower panel). Note the extended plateau at $V_B=0$ for $U/\Gamma=15$, which is a manifestation of the pinning of spectral weight at the Fermi level.[]{data-label="fig:G_Vs_VG"}](figure13_Gezzi){width="40.00000%"}
We finally discuss the variation of the conductance with $V_G$ for fixed $U$ and $V_B$. We again emphasize, that for $V_G\ne0$, $\Delta J=0$ only holds to leading order in $U$. In Fig. \[fig:G\_Vs\_VG\] we present the curves for two different values of $U$, namely $U/\Gamma=1$ (upper panel in Fig. \[fig:G\_Vs\_VG\]) and $U/\Gamma=15$ (lower panel in Fig. \[fig:G\_Vs\_VG\]). In the former case, the variation of $G$ with $V_B$ is rather smooth, as is to be expected from the current in Fig. \[fig:current\_full\]. For large $U$, we observe an extended plateau at zero bias, which is a manifestation of the fact that in the strong coupling regime a pinning of spectral weight at the Fermi energy occurs. This feature is also observed in the imaginary-time fRG as well as in NRG calculations.[@meden06:2] Increasing $V_B$ quickly leads to a similarly extended region of negative differential conductance, which, assuming that this result is a true feature of the model, therefore seems to be linked to the “Kondo” pinning. We note that it is unlikely that the appearance of the negative differential conductance is related to the breaking of current conservation at order $U^2$ as it also appears for $V_G=0$ where $\Delta J=0$. For large $V_B$ multiple structures appear in $G$, which are related to the energy scales $V_B$ and $U$.
Summary and outlook {#summary}
===================
Starting from a generating functional proposed by Kameneev[@kameneev] we have derived an infinite hierarchy of differential equations for the vertex functions of an interacting quantum mechanical many-body system in nonequilibrium (see also Refs. and ). The major difference to the imaginary-time formulation comes from the use of Keldysh Green functions. The indices $+$ and $-$ referring to the upper and lower branch of the (real-)time contour lead to an additional matrix structure to the problem. Our formulation is sufficiently general that it allows to treat bosonic and fermionic models with or without explicit time dependence and at $T\ge0$. Since the fRG leads to an infinite hierarchy of coupled differential equations, one has to introduce approximations, at least a truncation at a certain level. Typically one neglects the flow of the three-particle vertex. As has been demonstrated in Ref. for the imaginary-time fRG one can solve the remaining system of flow equations for simple models like the SIAM numerically, thus keeping the full energy-dependence. Due to the fact that the vertex function carries three [*continuous*]{} frequency arguments in addition to the discrete quantum numbers of the system, such a calculation can become computationally quite expensive.
To reduce the numerical effort, further additional approximations can be introduced. A particularly important and successful one is obtained by neglecting the energy dependence of the vertex functions,[@meden06:1; @meden06:2] which already leads to a surprisingly accurate description of local and transport properties of interacting quantum dots in the linear response regime.
We applied the nonequilibrium fRG to the SIAM with finite bias voltage in the stationary state. It turned out, that for the simplest approximation where only the flow of the self-energy is kept, the analytic structure of the differential equation leads to problems in the numerical solution. In addition, this approximation leads to a violation of the causality relation (\[eq:causality\]) to order $U^2$. The first problem was resolved by including the two-particle vertex in the flow at least up to the largest interaction considered here ($U/\Gamma =15$). At the present stage this was for computational reasons done by assuming it to be energy-independent, yielding again an energy-independent self-energy. Although this approximation also violates Eq. (\[eq:causality\]) to order $U^2$ for a fixed $V_G$ and $V_B$ the error is significantly smaller compared to the simplest scheme. We were able to obtain reasonable expressions and numerical results for the current and the conductance using the functions $G^{\alpha\beta}(\omega)$ instead of $G^{R}(\omega)$ in the current formula. We reproduced nonequilibrium features of the current and differential conductance known from the application of other approximate methods to the SIAM.
In the more advanced truncation scheme and for $V_G \neq 0$, the current conservation $\Delta J = 0$ only holds to leading order in $U$. This defect can be traced back to the energy independence of the two-particle vertex, leading to finite, but energy-independent $\Sigma^{-+}$ and $\Sigma^{+-}$. By a close inspection of formula (\[eq:DeltaJ2\]), however, one can see that this deficiency can for example be cured by assuming a coarse-grained energy dependence of the form
$$\begin{aligned}
\label{minmaleEnergie}
\omega<-\frac{V_B}{2}: &F(\omega)=2\;\Rightarrow& \Im
m\Sigma^{+-,\Lambda}=0\;\mbox{, $\Im m\Sigma^{-+,\Lambda}$=const.}\\[3mm]
-\frac{V_B}{2}<\omega<\frac{V_B}{2}: &F(\omega)=1\;\Rightarrow& \Im
m\Sigma^{+-,\Lambda}=-\Im m\Sigma^{-+,\Lambda}=\mbox{const.}\\[3mm]
\frac{V_B}{2}<\omega: &F(\omega)=0\;\Rightarrow& \Im
m\Sigma^{-+,\Lambda}=0\;\mbox{, $\Im m\Sigma^{+-,\Lambda}$=const.}\end{aligned}$$
and corresponding energy dependencies for $\Sigma^{--}$ and $\Sigma^{++}$. Here the const. might depend on $\Lambda$ but not on $\omega$. Such an approximation will quite likely also reestablish causality Eq. (\[eq:causality\]). Work along this line is in progress.
Including finite temperature, magnetic field etc. in the calculations of transport is easily possible, as well as the extension to more complicated “impurity” structures (see e.g.Ref. ). The latter aspect is typically a rather cumbersome step for other methods like perturbation theories or in particular numerical techniques.
Our present stage of work should mainly be seen as a “proof of principle”. Already for the SIAM there remain a variety of fundamental things to do; like the implementation of the full energy-dependence in the calculations, which then should cure the violation of charge conservation and causality; or implementing a reasonable “cutoff scheme” for time-dependent problems off equilibrium, e.g. to calculate current transients. Despite its current limitations we expect the real-time nonequilibrium formulation of the fRG to be a useful tool to understand nonequilibrium features of mesoscopic systems, just like the imaginary-time version in the calculation of equilibrium properties.
We acknowledge useful conversations with H. Schoeller, S. Jakobs, S. Kehrein, J. Kroha, H. Monien, A. Schiller, A. Dirks, J. Freericks, K. Ueda, T. Fujii, K. Thygesen, and F.B. Anders. We thank H. Schmidt for pointing out typos in an earlier version of our paper. This work was supported by the DFG through the collaborative research center SFB 602. Computer support was provided through the Gesellschaft für wissenschaftliche Datenverarbeitung in Göttingen and the Norddeutsche Verbund für Hoch- und Höchstleistungsrechnen.
Derivation of the flow equations
================================
Although the following derivation is mainly equivalent to the one presented in Ref. , the appearance of the factor $i$ in the real-time formulation of the generating functional leads to some changes in signs and prefactors $i$ in the equations. It thus appears to be helpful for the reader to repeat the derivation.
As a first step we differentiate ${\mathcal W}^{c,\Lambda}$ with respect to $\Lambda$, which after straightforward algebra leads to $$\label{flusswc}
\frac{d}{d \Lambda} {\mathcal W}^{c,\Lambda} =
\zeta \mbox{ Tr}\, \left(
\hat {\mathcal Q}^{\Lambda} \hat G^{0,\Lambda}
\right) +i\zeta
\mbox{Tr} \,
\left(\hat {\mathcal Q}^{\Lambda}
\frac{\delta^2
{\mathcal W}^{c,\Lambda} }{ \delta \bar \eta \delta
\eta} \right) + \left(
\frac{\delta {\mathcal W}^{c,\Lambda} }{\delta \eta},
\hat {\mathcal Q}^{\Lambda} \frac{\delta {\mathcal
W}^{c,\Lambda} }{\delta \bar \eta} \right) \; .$$ Considering $\phi$ and $\bar \phi$ as the fundamental variables we obtain from Eq. (\[eq:gammadef\]) $$\frac{d}{d \Lambda} \Gamma^{\Lambda}\left(\{\bar \phi \}, \{ \phi \} \right) =
- \frac{d}{d \Lambda} {\mathcal W}^{c,\Lambda} \left(\{\bar
\eta^{\Lambda} \}, \{ \eta^{\Lambda} \} \right)
- \left(\bar \phi, \frac{d}{d \Lambda} \eta^{\Lambda}
\right) - \left( \frac{d}{d \Lambda} {\bar \eta}^{\Lambda} , \phi \right)
+ \left(\bar \phi, \hat {\mathcal Q}^{\Lambda} \phi\right) \; .$$ Applying the chain rule and using Eq. (\[flusswc\]) this leads to $$\begin{aligned}
\frac{d}{d \Lambda} \Gamma^{\Lambda} = - \zeta \mbox{ Tr}\, \left(
\hat {\mathcal Q}^{\Lambda}
\hat G^{0,\Lambda} \right)
- i \zeta\mbox{Tr} \, \left( \hat {\mathcal Q}^{\Lambda}
\frac{\delta^2
{\mathcal W}^{c,\Lambda} }{ \delta \bar \eta^{\Lambda} \delta
\eta^{\Lambda}} \right) \; ,\end{aligned}$$ where the last term in Eq. (\[eq:gammadef\]) cancels a corresponding contribution arising in (\[flusswc\]) thus a posterior justifying the inclusion of this term.
Extending the well known relation[@negele] between the second functional derivatives of $\Gamma$ and ${\mathcal W}^{c}$ to nonequilibrium we obtain the functional differential equation $$\label{gammafluss}
\frac{d}{d \Lambda} \Gamma^{\Lambda} = - \zeta
\mbox{ Tr}\, \left( \hat {\mathcal Q}^{\Lambda}
\hat G^{0,\Lambda}
\right) - \mbox{Tr} \, \left(\hat {\mathcal Q}^{\Lambda}
{\mathcal V}_{\bar \phi, \phi}^{1,1}(\Gamma^{\Lambda},
\hat G^{0,\Lambda}) \right) \; ,$$ where $ {\mathcal V}_{\bar \phi, \phi}^{1,1}$ stands for the upper left block of the matrix $$\begin{aligned}
\label{invers}
{\mathcal V}_{\bar \phi,\phi}(\Gamma^{\Lambda}, \hat G^{0,\Lambda}) =
\left( \begin{array}{cc}
i\frac{\delta^2 \Gamma^{\Lambda}}{ \delta \bar \phi \delta \phi}
- \zeta \left[ \hat G^{0,\Lambda} \right]^{-1}
& i \frac{\delta^2 \Gamma^{\Lambda}}{\delta \bar \phi \delta \bar \phi} \\
i \zeta\frac{\delta^2 \Gamma^{\Lambda}}{\delta \phi \delta \phi}
& -\left\{ i\frac{\delta^2 \Gamma^{\Lambda}}{\delta \phi \delta \bar \phi} +
\left( \left[ \hat G^{0,\Lambda} \right]^{-1}\right)^t\right\}
\end{array} \right)^{-1} \end{aligned}$$ and the upper index $t$ denotes the transposed matrix. To obtain differential equations for the $\gamma_m^{\Lambda}$ which include self-energy corrections we express $ {\mathcal V}_{\bar \phi,
\phi}$ in terms of $\hat G^{\Lambda}$ instead of $\hat G^{0,\Lambda}$. This is achieved by defining $$\begin{aligned}
{\mathcal U}_{\bar \phi, \phi} = i\frac{\delta^2 \Gamma^{\Lambda}}{\delta \bar
\phi \delta \phi} - \gamma_1^{\Lambda} \end{aligned}$$ and using $$\begin{aligned}
\label{GG}
\hat G^{\Lambda} = \left[ \left[ \hat G^{0,\Lambda}
\right]^{-1} - \zeta \gamma_1^{\Lambda} \right]^{-1} \;,\end{aligned}$$ which leads to $$\begin{aligned}
\label{gammaflussalt}
\frac{d}{d \Lambda} \Gamma^{\Lambda} = - \zeta \mbox{ Tr}\, \left(
\hat {\mathcal Q}^{\Lambda} \hat G^{0,\Lambda}
\right) + \zeta \mbox{Tr} \, \left[ \hat G^{\Lambda}
\hat {\mathcal Q}^{\Lambda}
\tilde{\mathcal V}_{\bar \phi, \phi}^{1,1}(\Gamma^{\Lambda},\hat
G^{\Lambda} )
\right]
\; , \end{aligned}$$ with $$\begin{aligned}
\label{Vtildedef}
\tilde {\mathcal V}_{\bar \phi,\phi}
\left(\Gamma^{\Lambda}, \hat G^{\Lambda} \right) = \left[ {\bf 1} -
\left( \begin{array}{cc}
\zeta \hat G^{\Lambda}
&
0\\
0
&
\left[ \hat G^{\Lambda} \right]^t
\end{array} \right)
\left( \begin{array}{cc}
{\mathcal U}_{\bar \phi, \phi}
& i\frac{\delta^2 \Gamma^{\Lambda}}{\delta \bar \phi \delta \bar \phi} \\
(i\zeta)\frac{\delta^2 \Gamma^{\Lambda}}{\delta \phi \delta \phi}
& \zeta {\mathcal U}^{t}_{\bar \phi, \phi}
\end{array} \right) \right]^{-1} \; .\end{aligned}$$ It is important to note that ${\mathcal U}_{\bar \phi,
\phi}$ as well as $ \frac{\delta^2
\Gamma^{\Lambda}}{\delta \bar \phi \delta \bar \phi}$ and $\frac{\delta^2
\Gamma^{\Lambda}}{\delta \phi \delta \phi} $ are at least quadratic in the external sources. The initial condition for the exact functional differential equation (\[gammaflussalt\]) can either be obtained by lengthy but straightforward algebra, which we are not going to present here or by the following simple argument: at $\Lambda= \Lambda_0$, $\hat G^{0,\Lambda_0}=0$ (no degrees of freedom are “turned on”) and in a perturbative expansion of the $\gamma_m^{\Lambda_0}$ the only term which does not vanish is the bare two-particle vertex. We thus find $$\begin{aligned}
\label{anfanggamma}
\Gamma^{\Lambda_0} \left( \{ \bar \phi \} , \left\{ \phi
\right\} \right) = S_{\rm int} \left(\{\bar
\phi \}, \{ \phi \} \right) \; .\end{aligned}$$ Expanding $\tilde{\mathcal V}_{\bar \phi,\phi}$ Eq. (\[Vtildedef\]) in a geometric series $$\begin{aligned}
\label{eq:Vtildeexp}
\tilde{\mathcal V}_{\bar \phi,\phi} & = & {\mathbf 1} +\zeta \hat G^\Lambda{\mathcal
U}_{\bar{\phi},\phi}+
\hat G^\Lambda {\mathcal U}_{\bar{\phi},\phi} \hat G^\Lambda{\mathcal
U}_{\bar{\phi},\phi}
+\zeta^3i^2 \hat G^\Lambda
\frac{\delta^2\Gamma}{\delta\bar\phi\delta\bar\phi}\left[\hat G^\Lambda\right]^t
\frac{\delta^2\Gamma}{\delta\phi\delta\phi}+ \ldots\end{aligned}$$ and $\Gamma^{\Lambda}$ in a Taylor series with respect to the external sources $$\begin{aligned}
\Gamma^{\Lambda}\left(\{\bar \phi \}, \{ \phi \} \right) =
\sum_{m=0}^{\infty} \frac{(i\zeta)^m}{(m !)^2} \sum_{\xi_1', \ldots, \xi_m'}
\sum_{\xi_1, \ldots, \xi_m } && \gamma_m^{\Lambda}\left(\xi_1',
\ldots, \xi_m'; \xi_1, \ldots, \xi_m \right)
\label{Gumma}
\,\bar \phi_{\xi_1'} \ldots \bar
\phi_{\xi_m'} \phi_{\xi_m} \ldots \phi_{\xi_1} \; .\end{aligned}$$ one can derive an exact infinite hierarchy of flow equations for the $\gamma_m^{\Lambda}$. For example, the flow equation for the single-particle vertex $\gamma_1$ (the self-energy) can be obtained by taking the expansion (\[eq:Vtildeexp\]) up to first order in ${\mathcal U}_{\bar \phi,\phi}$, inserting it into (\[gammaflussalt\]), replacing $\Gamma^\Lambda$ on both sides by the expansion (\[Gumma\]) and comparing the terms quadratic in the external fields. This procedure leads to the expression (\[eq:gamma1fl\]).
Flow equation for the two-particle vertex\[app:B\]
==================================================
To obtain the flow equation for $\hat\Sigma^\Lambda$ we have expanded Eq. (\[Vtildedef\]) in a geometric series up to first order and $\Gamma^{\Lambda}$ (\[Gumma\]) in the external sources up to $m=2$. To find the flow equation for the vertex function, $\gamma_2^\Lambda$, we have to proceed one step further, that is expand (\[Vtildedef\]) up to the second order and $\Gamma^{\Lambda}$ up to $m=3$. After comparison of the terms with the same power in the fields we obtain an expression similar to the equilibrium one (see Eq. (15) of Ref. ) $$\begin{aligned}
\frac{d}{d\Lambda} \gamma^{\alpha \beta \gamma \delta,\Lambda}(\xi_1',\xi_2';\xi_1,\xi_2)
=\sum_{\xi_3,\xi_3'} \sum_{\xi_4,\xi_4'}\sum_{\mu,\nu,\rho,\eta}
\!\!\! & \bigg( & \!\!\!
G^{\rho \eta,\Lambda}_{\xi_3',\xi_3} S^{\nu \mu,\Lambda}_{\xi_4,\xi_4'}\left[
\gamma^{\alpha \beta \rho \nu,\Lambda}(\xi_1',\xi_2';\xi_3,\xi_4)
\gamma^{\eta \mu \gamma\delta,\Lambda}(\xi_3',\xi_4';\xi_1,\xi_2) \right]\nonumber\\
& - &
G^{\eta \rho,\Lambda}_{\xi_3,\xi_3'} S^{\nu \mu,\Lambda}_{\xi_4,\xi_4'}\big[
\gamma^{\alpha \mu \gamma \eta,\Lambda}(\xi_1',\xi_4';\xi_1,\xi_3)
\gamma^{\rho \beta \nu \delta,\Lambda}(\xi_3',\xi_2';\xi_4,\xi_2)
\nonumber\\
& + &
\gamma^{\alpha\rho\gamma\nu,\Lambda}(\xi_1',\xi_3';\xi_1,\xi_4)\gamma^{\mu\beta\eta\delta,\Lambda}(\xi_4',\xi_2';\xi_3,\xi_2)\nonumber\\
& -&
\gamma^{\beta \mu \gamma \eta,\Lambda}(\xi_2',\xi_4';\xi_1,\xi_3)\gamma^{\rho \alpha \nu
\delta,\Lambda}(\xi_3',\xi_1';\xi_4,\xi_2)
\nonumber\\
\label{eqq1} & - &
\gamma^{\beta\rho\gamma\nu,\Lambda}(\xi_2',\xi_3';\xi_1,\xi_4)\gamma^{\mu\alpha\eta\delta,\Lambda}(\xi_4',\xi_1';\xi_3,\xi_2)
\big] \bigg)\;,\end{aligned}$$
where the contribution involving $\gamma_3^\Lambda$ was replaced by its initial value, i.e. $\gamma_3^\Lambda=\gamma_3^{\Lambda_0}=0$. The main difference to equilibrium is the presence of mixed contractions for the Keldysh indices of the matrices $\hat{G}^\Lambda$ and $\hat{\mathcal S}^\Lambda$ and the four-index tensors $\gamma_2^\Lambda$.
Up to this point the derivation of the flow equation for the two-particle vertex was as general as the discussion in Sec. \[formalism\]. We now consider the application to the steady state current through a quantum dot described by the SIAM presented in Sec. \[appli\]. We thus go over to frequency space and introduce the cutoff $\Lambda$ as in Eq. (\[eq:matsubaracutoff\]). The single-particle quantum number in $\xi$ is given by the spin index. We can take advantage of spin and energy conservation which implies that the lower indices of $\hat G$ and $\hat {\mathcal S}$ are equal, that is $\xi_3=\xi_3'$ and $\xi_4 = \xi_4'$. This does [*not*]{} hold for the Keldysh indices. The integrals over $\omega_{3'}$ and $\omega_{4'}$ as well as the sums over $\sigma_3'$ and $\sigma_4'$ can then be performed trivially. Using the Morris lemma,[@morris:94] we can rewrite the matrix product of $\hat G$ and $\hat {\mathcal S}$ as $$\begin{aligned}
\hat G^{\Lambda}(\omega) \hat {\mathcal S}^{\Lambda}(\omega') \rightarrow
\frac{1}{2} \delta(|\omega'|-\Lambda) \hat G_d^\Lambda(\omega)
\hat G_d^\Lambda(\omega')\;,\end{aligned}$$ with $$\begin{aligned}
\hat G_d^\Lambda(\omega) = \frac{1}{\left[\hat G_{d,0}(\omega)\right]^{-1} -
\hat \Sigma^{\Lambda}(\omega)} \; .\end{aligned}$$ The $\delta$-function can be used to perform another of the frequency integrals, and the remaining one can be evaluated because of energy conservation of the two-particle vertex. Using the spin independence of the Green function for zero magnetic field, this leads to
$$\begin{aligned}
\frac{d}{d\Lambda} \gamma^{\alpha \beta \gamma
\delta,\Lambda}_{\sigma_1',\sigma_2';\sigma_1,\sigma_2}
= \frac{1}{4\pi}\sum_{\omega=\pm \Lambda}
\sum_{\sigma_3,\sigma_4}\sum_{\mu,\nu,\rho,\eta}
\bigg(&\!\!\!G_d^{\rho \eta,\Lambda}(-\omega) G_d^{\nu \mu,\Lambda}(\omega)&\!\!\!
\gamma^{\alpha \beta \rho \nu,\Lambda}_{\sigma_1',\sigma_2';\sigma_3,\sigma_4}
\gamma^{\eta \mu \gamma\delta,\Lambda}_{\sigma_3,\sigma_4;\sigma_1,\sigma_2}
\nonumber\\
&\!\!\!-G_d^{\eta \rho,\Lambda}(\omega) G_d^{\nu \mu,\Lambda}(\omega)\Big[ &\!\!\!
\gamma^{\alpha \mu \gamma \eta,\Lambda}_{\sigma_1',\sigma_4;\sigma_1,\sigma_3}
\gamma^{\rho \beta \nu \delta,\Lambda}_{\sigma_3,\sigma_2';\sigma_4,\sigma_2}
+
\gamma^{\alpha \rho \gamma \nu,\Lambda}_{\sigma_1',\sigma_3;\sigma_1,\sigma_4}
\gamma^{\mu \beta \eta \delta,\Lambda}_{\sigma_4,\sigma_2';\sigma_3,\sigma_2} \nonumber\\
\label{eqq2}
&\!\!\!&\!\!\!-
\gamma^{\beta \mu \gamma \eta,\Lambda}_{\sigma_2',\sigma_4;\sigma_1,\sigma_3}\gamma^{\rho \alpha \nu
\delta,\Lambda}_{\sigma_3,\sigma_1';\sigma_4,\sigma_2}
-
\gamma^{\beta \rho \gamma \nu,\Lambda}_{\sigma_2',\sigma_3;\sigma_1,\sigma_4}\gamma^{\mu \alpha \eta
\delta,\Lambda}_{\sigma_4,\sigma_1';\sigma_3,\sigma_2}
\Big] \bigg)\;\;.\end{aligned}$$
Comparing (\[eqq2\]) with Eq. (20) in Ref. , were similar approximations were made in equilibrium, we see that we have two more terms because of the Keldysh indices. In the first term appears $G_d^{\rho \eta,\Lambda}$, while its transpose $G_d^{\eta \rho,\Lambda}$ enters everywhere else.
Using the antisymmetry of $\gamma_2^\Lambda$ in the spin indices and spin conservation we can further simplify Eq. (\[eqq2\]) by introducing the flowing interaction $U^{\alpha \beta \gamma \delta,\Lambda}$ defined as $$\gamma^{\alpha \beta \gamma
\delta,\Lambda}_{\sigma_1',\sigma_2';\sigma_1,\sigma_2}=\delta_{\sigma_1',\sigma_1}
\delta_{\sigma_2',\sigma_2}
U^{\alpha \beta \gamma \delta,\Lambda}-
\delta_{\sigma_2',\sigma_1}\delta_{\sigma_1',\sigma_2}
U^{\beta \alpha \gamma \delta,\Lambda}\;.$$ This leads to the flow equation $$\begin{aligned}
\frac{d}{d\Lambda} U^{\alpha \beta \gamma \delta,\Lambda}
= \frac{1}{4\pi}\sum_{\omega=\pm
\Lambda} \sum_{\mu,\nu\rho,\eta}
\biggr(&\!\!\!G_d^{\rho \eta,\Lambda}(-\omega) G_d^{\nu \mu,\Lambda}(\omega)&\!\!\!\left[
U^{\alpha \beta \rho \nu,\Lambda}
U^{\eta \mu \gamma\delta,\Lambda}+
U^{\beta \alpha \rho \nu,\Lambda} U^{\mu \eta \gamma\delta,\Lambda}\right]\nonumber \\
&\!\!\!-G_d^{\eta \rho,\Lambda}(\omega) G_d^{\nu \mu,\Lambda}(\omega)&\!\!\!\big[
2U^{\alpha \mu \gamma \eta,\Lambda} U^{\rho \beta \nu \delta,\Lambda}-
U^{\alpha \mu \gamma \eta,\Lambda} U^{\beta \rho \nu \delta,\Lambda}-
U^{\mu \alpha \gamma \eta,\Lambda} U^{\rho \beta \nu \delta,\Lambda}\nonumber\\
&\!\!\!&+2U^{\alpha \rho \gamma \nu,\Lambda} U^{\mu \beta \eta \delta,\Lambda}-
U^{\alpha \rho \gamma \nu,\Lambda} U^{\beta \mu \eta \delta,\Lambda}-
U^{\rho \alpha \gamma \nu,\Lambda} U^{\mu \beta \eta \delta,\Lambda}\nonumber\\
\label{eqq3}
&\!\!\!&-
U^{\mu \beta \gamma \eta,\Lambda}U^{\alpha \rho \nu \delta,\Lambda}
-U^{\rho \beta \gamma \nu,\Lambda}U^{\alpha \mu \eta \delta,\Lambda}
\big] \bigg)\;\;.\end{aligned}$$
From the initial value of $\gamma_2^\Lambda$ at $\Lambda = \Lambda_0
\to \infty$ given in Eq. (\[eq:vertexinit\]) we can read off as the initial value for $U^{\alpha\beta\gamma\delta,\Lambda_0}$ $$U^{\alpha\alpha\alpha\alpha,\Lambda_0} = \alpha i U \; ,$$ while all other components are zero.
[59]{} natexlab\#1[\#1]{}bibnamefont \#1[\#1]{}bibfnamefont \#1[\#1]{}citenamefont \#1[\#1]{}url \#1[`#1`]{}urlprefix\[2\][\#2]{} \[2\]\[\][[\#2](#2)]{}
, ****, ().
, **, International Series in Pure and Applied Physics (, , ).
, ****, ().
, ****, ().
(), .
, ****, ().
, ****, ().
, ****, ().
, in **, edited by (, ), vol. .
, ****, ().
, ****, ().
, in **, edited by (, ), vol. , p. .
, ****, ().
, ****, ().
A. Rosch, J. Paaske, J. Kroha, and P. Wölfle, Phys. Rev. Lett. [**90**]{}, 076804 (2003).
, , , , ****, ().
, ****, ().
, ****, ().
, ****, ().
, ****, ().
, ****, ().
, ** (, ).
, ****, ().
, , , , ****, ().
, , ().
, , , .
, , , , ****, ().
, ****, ().
, ****, ().
, , , ****, ().
, , , ****, ().
, , , , , ****, ().
, , , , ****, ().
, ****, ().
, ****, ().
, , , , ****, ().
, , , , ****, ().
, , , ****, ().
, , , ****, ().
, ** (, ).
, ****, ().
, ** (, ).
, in **, edited by , , , , (, ), .
, ** (, ).
C. Honerkamp, D. Rohe, S. Andergassen, and T. Enss, Phys. Rev. B [**70**]{}, 235115 (2004).
V. Meden, lecture notes on the “Functional renormalization group”, http://www.theorie.physik.uni-goettingen.de/$\sim$meden/funRG/
, ****, ().
, ****, ().
, ****, ().
(), .
, , , ****, ().
, , , ****, ().
, , , ****, ().
A. Levy Yeyati, A. Martín-Rodero, and F. Flores, Phys. Rev. Lett. [**71**]{}, 2991 (1992).
, ****, ().
, ****, ().
(), .
(), .
(), .
(), .
, **, Cambridge Studies in Magnetism (, , ).
, in **, edited by (, ), p. .
(), .
| 2023-08-16T01:26:19.665474 | https://example.com/article/9148 |
The U.S. Environmental Protection Agency's (EPA'S) water quality and hazardous wastes monitoring programs require quantitative analysis of a variety of environmental samples for volatile organic pollutant compounds. Determination of the volatile priority pollutants in water samples is usually satisfactorily accomplished by practicing EPA-recommended methods. However, the EPA-recommended precedures for the determination of volatile priority pollutants in soils, sediments and fish produce unacceptable results, as evidenced by low spike recoveries and high detection limits. Improved procedures have therefore been sought for effectively carrying out environmental monitoring programs with respect to solid samples of environmental matter.
The vaporization of volatile organic compounds from a sample under vacuum and the subsequent condensation of such compounds in a super-cooled trap seemed to offer some advantageous possibilities in such monitoring procedures since cryogenic concentration has been used successfully for the determination of tritiated methane and the radioisotopes of krypton and xenon. Accordingly, the use of cryogenic concentration appeared to be applicable for quantitatively determining the presence of volatile organic compounds in solid matrices. Vacuum extraction, moreover, was of advantage, in not requiring elevated temperatures or the addition of reagents which could produce unwanted contaminative byproducts due to sample degradation.
Having in mind the above factors, a particular method, known to the art as the purge-and-trap technique, for monitoring solid samples has been developed. In this method, volatile organic compounds are vaporized from the fish or soil sediment matrix under vacuum conditions and the vapors are condensed in a purging trap cooled by liquid nitrogen. The purging trap is transferred to a conventional purge and trap device where the concentrate is treated as a water sample and is analyzed by a Method 624 in the Federal Register 1979 (44FR 69532) developed by T. A. Bellar and J. J. Lichtenberg. Using this method of analysis, the average recovery of volatile organic compounds from samples spiked at the 25 mg/kg level was found to be 94% for sediments and 74% for fish tissue. An inherent problem encountered in the use of the purge-and-trap technique is that water vapor is carried along with the volatile organic compounds and this water interferes with the chromatographic analysis. Moreover, large amounts of carrier gas are needed to purge the volatile compounds. A jet separator or other carrier splitting device is then needed to remove most of the carrier gas. This results in the partial losses of the volatile compounds which limits sensitivity of the analysis.
In one modified purge-and-trap technique, developed by Joe Blazevich, a solid or biological sample is diluted with water and the resulting slurry is treated and analyzed as if it were an ordinary water sample. However, this process results in the foaming of the sample and in uncontrolled variable purging efficiencies.
Another modified purge-and-trap technique, developed by David Speis, uses steam distillation to separate the volatile compounds. The steal-carrier gas mixture is then passed through 5 ml. of water which serves as a conventional trap. However, the steam distillation may generate unwanted by-products due to the decomposition of labile components of the sample by heat, and some of the compounds of interest to the analysis may be lost due to chemical reaction or decomposition.
It is therefore evident from the above methods of analytically determining the volatile compounds in solid soil and biological environmental samples, certain disadvantages arise in reproducibly removing and concentrating the volatile organics for physicochemical determinations.
Since water has been routinely removed from molecular sieves using heat and vacuum and since it is known, as set forth above, that volatile compounds can be collected in a trap cooled with liquid nitrogen, it would appear that a combination of these techniques, with required modifications, could advantageously be used to remove and concentrate volatile organic compounds from a variety of matrices, such as the soil and biological samples, mentioned above.
Accordingly, the invention herein has been developed for the purpose of achieving the purposes set forth above without encountering the problems and disadvantages which have been described supra. | 2024-05-07T01:26:19.665474 | https://example.com/article/5228 |
Critics
Unquestionably, Neal Martin writes the most detailed (and enjoyable) En-Primeur assessment of all the critics’’. In fact, the content is encyclopaedic in terms of sheer volume. We would recommend a subscription to the Wine Advocate to read his full report.
Neal is clearly incredibly excited with the 2016 vintage and the following statement sums up his sentiment succinctly “Let’s cut to the chase: 2016 is unequivocally a great vintage in Bordeaux. Don’t let anyone tell you otherwise...” | 2023-12-15T01:26:19.665474 | https://example.com/article/2237 |
[Pelvic exenteration: effects of surgical method on quality of life].
This prospective longitudinal study explores the quality of life of patients who underwent pelvic exenteration (n = 21) with or without reconstructive procedures by standardized questionnaires and semistructured interviews. Quality of life is defined in following categories: physical status, psychosocial issues, medical interaction, marital and sexual problems. At three points in time (preoperatively, 4 and 12 months postoperatively) the quality of life was mostly affected by worries about tumor-progress and not being able to care for oneself. Patients who received reconstructive or preserving procedures felt less restrained in all categories than those without reconstructive surgery although the preoperative situation was not different. | 2024-06-04T01:26:19.665474 | https://example.com/article/4369 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.