text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
Q: #error You now need to define either FIXED_POINT or FLOATING_POINT I am trying to compile ioauek3 on our IBM PowerPC machine that is running with a Linux environment. I got this error: #error You now need to define either FIXED_POINT or FLOATING_POINT After searching the net for an answer, I found many point to doing a "make speex-reconf". I downloaded: http://downloads.xiph.org/releases/speex/speex-1.2rc1.tar.gz I unpacked it. Then, ran a "make". Since, I have no "install" privileges, I just ran a "make". Then, I did a "make speex-reconf". I got a load of output. I went back to my ioquake3 folder, and did another "make". But, still the error wouldn't go away. What am I missing here? -- rmc104:~/minoru/cfe2/yasirTemp/ioquake3dev/zzz/speex-1.2rc1[8053]% make -speex-reconf make: invalid option -- 'x' make: invalid option -- '-' make: invalid option -- 'c' Usage: make [options] [target] ... Options: -b, -m Ignored for compatibility. -B, --always-make Unconditionally make all targets. -C DIRECTORY, --directory=DIRECTORY Change to DIRECTORY before doing anything. -d Print lots of debugging information. --debug[=FLAGS] Print various types of debugging information. -e, --environment-overrides Environment variables override makefiles. -f FILE, --file=FILE, --makefile=FILE Read FILE as a makefile. -h, --help Print this message and exit. -i, --ignore-errors Ignore errors from commands. -I DIRECTORY, --include-dir=DIRECTORY Search DIRECTORY for included makefiles. -j [N], --jobs[=N] Allow N jobs at once; infinite jobs with no arg. -k, --keep-going Keep going when some targets can't be made. -l [N], --load-average[=N], --max-load[=N] Don't start multiple jobs unless load is below N. -L, --check-symlink-times Use the latest mtime between symlinks and target. -n, --just-print, --dry-run, --recon Don't actually run any commands; just print them. -o FILE, --old-file=FILE, --assume-old=FILE Consider FILE to be very old and don't remake it. -p, --print-data-base Print make's internal database. -q, --question Run no commands; exit status says if up to date. -r, --no-builtin-rules Disable the built-in implicit rules. -R, --no-builtin-variables Disable the built-in variable settings. -s, --silent, --quiet Don't echo commands. -S, --no-keep-going, --stop Turns off -k. -t, --touch Touch targets instead of remaking them. -v, --version Print the version number of make and exit. -w, --print-directory Print the current directory. --no-print-directory Turn off -w, even if it was turned on implicitly. -W FILE, --what-if=FILE, --new-file=FILE, --assume-new=FILE Consider FILE to be infinitely new. --warn-undefined-variables Warn when an undefined variable is referenced. This program built for powerpc-unknown-linux-gnu Report bugs to <bug-make@gnu.org> # Make data base, printed on Wed Nov 2 14:21:21 2011 # Variables # environment LC_CTYPE = C # environment CVSEDITOR = emacs -nw # environment XMODIFIERS = @im=kinput2 # environment SHELL = /bin/zsh # environment TZ = JST-9 # environment _ = /usr/bin/make # environment SSH_CONNECTION = 133.9.80.9 59052 133.9.80.16 22 # environment PATH = /home7/yasir/bin/common:/home7/yasir/bin/ppc64-linux:/usr/local/bin:/usr/games:/usr/X11R6/bin:/usr/bin:/bin:/usr/sbin:/sbin:/usr/local/sbin # environment SSH_TTY = /dev/pts/0 # default .FEATURES := target-specific order-only second-expansion else-if archives jobserver check-symlink # environment PWD = /home7/yasir/minoru/cfe2/yasirTemp/ioquake3dev/zzz/speex-1.2rc1 # environment HOME = /home7/yasir # environment CVSROOT = /usr/local/cvsroot # environment LOGNAME = yasir # environment PRINTER = ls7 # environment LC_TIME = C # environment SHLVL = 1 # environment JSERVER = razzie04 # environment USER = yasir # environment OLDPWD = /home7/yasir/minoru/cfe2/yasirTemp/ioquake3dev/zzz/speex-1.2rc1/include # default .VARIABLES := # environment CVS_RSH = ssh # environment SSH_CLIENT = 133.9.80.9 59052 22 # environment MAIL = /var/mail/yasir # environment EDITOR = vi # environment LC_ALL = C # environment http_proxy = http://133.9.80.129:3128/ # environment LANG = C # environment TERM = xterm # variable set hash-table stats: # Load=29/1024=3%, Rehash=0, Collisions=1/36=3% # Pattern-specific Variable Values # No pattern-specific variable values. # Directories # No files, no impossibilities in 0 directories. # Implicit Rules # No implicit rules. # Files # files hash-table stats: # Load=0/1024=0%, Rehash=0, Collisions=0/0=0% # VPATH Search Paths # No `vpath' search paths. # No general (`VPATH' variable) search path. # # of strings in strcache: 0 # # of strcache buffers: 0 # strcache size: total = 0 / max = 0 / min = 4096 / avg = 0 # strcache free: total = 0 / max = 0 / min = 4096 / avg = 0 # Finished Make data base on Wed Nov 2 14:21:21 2011 -- A: What you show is the result of running: make -speex-reconf You did not want the dash in front of that; you should have typed: make speex-reconf Whether that would be sufficient is a wholly separate issue.
2024-05-07T01:26:58.646260
https://example.com/article/4633
Q: Objective C syntax, making NSDictionary How can I do it shorter? _adv[@"car"] = @{"lala" : @1}; NSMutableDictionary *car = [_adv[@"car"] mutableCopy]; car[@"haveCar"] = @NO; _adv[@"car"] = car; A: If you ensure that a mutable dictionary is in use from start, then you can do: _adv[@"car"][@"haveCar"] = @NO; To ensure the mutable constraint, change the 1st line in your question from: _adv[@"car"] = @{"lala" : @1}; to: _adv[@"car"] = [@{"lala" : @1} mutableCopy];
2024-06-23T01:26:58.646260
https://example.com/article/9137
Aboyne railway station Aboyne railway station was a station which served Aboyne in the Scottish county of Aberdeenshire. It was served by trains on the line from Aberdeen to Ballater. History Opened as an extension to the Deeside Railway on 2 December 1859, being the terminus until the line to Ballater was opened by the Aboyne and Braemar Railway in 1866. Later to be leased and then part of the Great North of Scotland Railway, the station became part of the London and North Eastern Railway during the Grouping of 1923, passing on to the Scottish Region of British Railways during the nationalisation of 1948. It was then closed by the British Railways Board on 28 February 1966. Aboyne Curling Pond railway station, also known as Loch of Aboyne Platform or Curlers' Platform, was a nearby private station opened on the Deeside Extension Railway for the use of the curlers who played on the nearby Loch of Aboyne. The station had been the location of a Camping coach. The site today The line is now part of the Deeside Way footpath, while the station is home to a range of shops. References Notes Sources RAILSCOT on Deeside Railway RAILSCOT on Deeside Extension Railway RAILSCOT on Aboyne and Braemar Railway External links Film of the station and the Deeside line. Category:Disused railway stations in Aberdeenshire Category:Railway stations opened in 1859 Category:Railway stations closed in 1966 Category:Beeching closures in Scotland Category:Former Great North of Scotland Railway stations Category:1859 establishments in Scotland Category:1966 disestablishments in Scotland
2023-11-06T01:26:58.646260
https://example.com/article/6364
Werther’s Soft Creme Caramels These delicious caramels are a one of my new favorites! I’m sure everyone is familiar with the Werther’s Original caramels. I have always liked them, though I am not that much of a hard candy eater. Werther’s Chewy Caramel are great, and you wouldn’t think they could be improved much. But enter Soft Crème Caramels – these takes caramels to a whole new level. I remember making homemade caramels growing up, and how if you stirred the caramels too much while it was cooking, it might end up crystalized in the end. I never minded this much as I liked the crystalized caramels. These are kinda like that, but much better. The have a texture that are soft and creamy and grainy at the same time. Because they are so easy to chew you end up with a mouthful of crumbly delicious caramel. The biggest problem with the Werthers Soft Crème Caramels is that they are so hard to find! Most stores have a section with a range of Werther’s products, but only very few of them seems to stock the Soft Crème Caramels. In fact, even the Official Werther’s Website makes no mention of the Soft Crème Caramels. This is a bit alarming, as I hope they will not be discontinued anytime soon! If you are a caramel fan and happen to run across these (look for the purple label) I highly recommend picking up a few bags.
2024-06-14T01:26:58.646260
https://example.com/article/1886
vmars316 It is Coder plugin. Make its functions to autostart(check them in Pluging dialog) and rerun AkelPad. After that, whenever you open or save file as .html (or other related extensions) it will activate proper configuration. Coder::HighLight responds for colouring text. Coder::CodeFold responds for collapsing paired tags to save space. Coder::AutoComplete responds for suggestion lists. vmars316 It is Coder plugin. Make its functions to autostart(check them in Pluging dialog) and rerun AkelPad. After that, whenever you open or save file as .html (or other related extensions) it will activate proper configuration.
2023-09-12T01:26:58.646260
https://example.com/article/3752
Posts Tagged ‘Tyrel’ I just got a newsletter from the suicide bereavement group my sister and I attended last summer. The statistics posted below make me sad. I know that they’re right and I have felt the immense difference between the types of “compassion” shown to families where the death is accidental or natural as compared to drug overdose or suicide. This last year, my father died. The same week, two of my cousins died too. One was an alcoholic and no one seemed very upset by his death. His brother, on the other hand, died of complications from pneumonia. His death was a shock and was far more devastating to the family than the cousin who died of an alcoholic related disease. Why? Both were my cousins. Both were loved. Both had virtually the same background. Neither were expected to die any time soon. Why did everyone seem sort of relieved that Kevin died, but sad that Kenny did? It just brings up so many bad feelings about the way my family and I were treated after Ty’s death. Especially at work. We weren’t allowed to grieve. People we thought were our friends accused us of causing Tyrel’s death by either inattention, by being “bad examples” due to our own mental illnesses and all sorts of other ridiculous, but incredibly hurtful things. Voyeuristic vultures wanted to hear every detail. I just recently had someone ask me if Ty died as the result of autoerotic asphyxiation. I just stared at them for a long moment then said “No. ‘He killed himself’ doesn’t mean he died accidentally trying to get off.” Dumbass, but sadly all too common. When another nephew’s friend died from a congenital heart defect while they were staying at the family’s cabin with another friend, the rumor-mill ran rampant. Three boys alone in an out of the way cabin…clearly they were using drugs and one had ODed. It’s such bullshit that it makes me furious. When the autopsy results came back, it showed what we’d known all along. Jesse had no drugs in his system. The other boys were tested by the police the day that Jesse died, and had neither drugs nor alcohol in their systems but the rumors continued. I’m tired of people being so judgmental. Even if Jesse had died of an overdose, should being a normal kid wanting to try something new be a death sentence? I don’t believe so. Ok onto the study results before my head explodes from fury induced high blood pressure. “In this study, the authors compared and contrasted 571 parents who had lost children by various causes— suicide, drug-related deaths, accidental deaths and natural causes in terms of their grief difficulties, post-traumatic stress and other mental health problems and perceived social stigma. In comparing parents whose children died by suicide or drug-related death with those whose children died of accidents or natural causes, the suicide and drug-related death survivors had appreciably more difficulty in grief and with poor mental health. The authors conclude that powerful social stigma against drug use and mental illness remains a pervasive challenge for these parents as they experience less compassionate responses from others following their losses.” from “Parental Grief After a Child’s Drug Death Compared to Other Death Causes: Investigating a Greatly Neglected Bereavement Population.” By William Feigelman, John R. Jordan & Bernard S. Gorman, Omega, 2011, Vol 63 (4), p. 219-316. We arrive at the mortuary, to find you clothed only in a human-shaped plastic bag which we’re commanded not to remove. Duct taped at the neck, wrists and ankles – Fluid leakage might occur, and disturb the guests at that last party in your honor, you were rude enough not to attend. Staples hold you together, like suitcase zippers going down your chest and the insides of both legs. The benefits of being an organ donor. They assured us it was almost unnoticeable. I suppose they didn’t realize we would dress you for this occasion; considered their lie thoughtful. Maybe they didn’t care – Just wanted whatever organs you could provide; after all, that’s what they do. Rusty stains cloak much of your skin, hospital strength disinfectant. Did they worry that you might become infected? Use proper surgical procedure, despite the toe-tag telling them that you were just a shell. We discovered quickly, in trying to dress you for your final show, that you were like a Ken doll: stiff and hardly malleable. Still, your corpse was dressed, with the most loving care. Though your limbs felt like rubber over concrete, and hardly bent at all. Your hands, scarred from lighter burns and cuts are like tightly packed, Halloween gloves, spray painted a subtly shiny flesh color. I suppose they meant you to look more respectable. We loved you like you were. They are not your hands: those thin, eloquent story tellers – They belong to someone else. Finally your hair is done, cologne on, tie cleverly knotted in such a way as to prevent voyeurs from trying to see the deep dent in your neck. You are handsome, as always; stylish and lifelike… except for your lips. They’re flesh colored not living red; you had very colorful lips for a man. Mortician’s mistake we’re afraid to fix. We don’t want you to look like a clown so we forgo the temptation of lipstick, but at the viewing, it bothers everyone who knew you:
2024-03-14T01:26:58.646260
https://example.com/article/4726
Transient recombinant protein expression in a human amniocyte cell line: the CAP-T® cell system. The impact of transient gene expression approaches (TGE) on the rapid production of recombinant proteins is undisputed, despite that all efforts are currently relying on two host cell families only, namely HEK293 derivatives and CHO cell line(s). Yet, the increasing complexity of biological targets calls for more than two host cell types to meet the challenges of difficult-to-express proteins. For this reason, we evaluated the more recently established novel CAP-T® cell line derived from human amniocytes for its performance and potential in transient gene expression. Upon careful analyses and adaptation of all process parameters we show here that indeed the CAP-T® cells are extremely amenable to transient gene expression and recombinant protein production. Additionally, they possess inherent capabilities to express and secrete complex and difficult target molecules, thus adding an attractive alternative to the repertoire of existing host cell lines used in transient production processes.
2024-01-06T01:26:58.646260
https://example.com/article/3095
######################################################################### # # Copyright (c) 2003-2004 Danny Brewer d29583@groovegarden.com # Copyright (C) 2004-2010 OpenERP SA (<http://openerp.com>). # # This library is free software; you can redistribute it and/or # modify it under the terms of the GNU Lesser General Public # License as published by the Free Software Foundation; either # version 2.1 of the License, or (at your option) any later version. # # This library is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU # Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with this library; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA # # See: http://www.gnu.org/licenses/lgpl.html # ############################################################################# import uno import string import unohelper import xmlrpclib from com.sun.star.task import XJobExecutor if __name__<>"package": from lib.gui import * from lib.error import ErrorDialog from lib.functions import * from lib.logreport import * from lib.rpc import * from Change import * database="test" class ServerParameter( unohelper.Base, XJobExecutor ): def __init__(self, aVal=None, sURL=""): self.module = "openerp_report" self.version = "0.1" desktop=getDesktop() log_detail(self) self.logobj=Logger() doc = desktop.getCurrentComponent() docinfo=doc.getDocumentInfo() self.win=DBModalDialog(60, 50, 160, 108, "Server Connection Parameter") self.win.addFixedText("lblVariable", 2, 12, 35, 15, "Server URL") if docinfo.getUserFieldValue(0)=="": docinfo.setUserFieldValue(0,"http://localhost:8069") self.win.addFixedText("txtHost",-20,12,105,15,sURL) self.win.addFixedText("lblDatabaseName", 6, 31, 31, 15, "Database") self.win.addFixedText("lblLoginName", 17, 51, 20, 15, "Login") self.win.addEdit("txtLoginName",-2,48,123,15,docinfo.getUserFieldValue(1)) self.win.addFixedText("lblPassword", 6, 70, 31, 15, "Password") self.win.addEdit("txtPassword",-2,67,123,15,) self.win.setEchoChar("txtPassword",42) self.win.addButton('btnOK',-2 ,-5, 60,15,'Connect' ,actionListenerProc = self.btnOk_clicked ) self.win.addButton('btnPrevious',15 -80 ,-5,50,15,'Previous',actionListenerProc = self.btnPrevious_clicked) self.win.addButton('btnCancel',-2 - 110 - 5 ,-5, 35,15,'Cancel' ,actionListenerProc = self.btnCancel_clicked ) sValue="" if docinfo.getUserFieldValue(0)<>"": global url global result url=docinfo.getUserFieldValue(0) self.sock=RPCSession(url) res=self.sock.listdb() result=res if res == -1: self.win.addEdit("lstDatabase",-2,28,123,15) # sValue="Could not connect to the server!" # self.lstDatabase.addItem("Could not connect to the server!",0) elif res == 0: sValue="No database found !" self.lstDatabase.addItem("No database found !",0) else: self.win.addComboListBox("lstDatabase", -2,28,123,15, True) self.lstDatabase = self.win.getControl( "lstDatabase" ) self.win.removeListBoxItems("lstDatabase", 0, self.win.getListBoxItemCount("lstDatabase")) for i in range(len(res)): self.lstDatabase.addItem(res[i],i) sValue = database if sValue: self.win.doModalDialog("lstDatabase",sValue) else: self.win.doModalDialog("lstDatabase",None) #self.win.doModalDialog("lstDatabase",docinfo.getUserFieldValue(2)) def btnOk_clicked(self, oActionEvent): sLogin=self.win.getEditText("txtLoginName") sPassword=self.win.getEditText("txtPassword") global url global result if result==-1: sDatabase=self.win.getEditText("lstDatabase") else: sDatabase=self.win.getListBoxSelectedItem("lstDatabase") self.sock=RPCSession(url) UID = self.sock.login(sDatabase,sLogin,sPassword) if not UID or UID==-1 : ErrorDialog("Connection denied.", "Please enter valid login/password.") # self.win.endExecute() ids_module =self.sock.execute(sDatabase, UID, sPassword, 'ir.module.module', 'search', [('name','=','base_report_designer'),('state', '=', 'installed')]) if not len(ids_module): ErrorDialog("Please install base_report_designer module.", "", "Module Uninstalled Error!") self.logobj.log_write('Module not found.',LOG_WARNING, ': base_report_designer not installed in database %s.' % (sDatabase)) #self.win.endExecute() else: desktop=getDesktop() doc = desktop.getCurrentComponent() docinfo=doc.getDocumentInfo() docinfo.setUserFieldValue(0,self.win.getEditText("txtHost")) docinfo.setUserFieldValue(1,self.win.getEditText("txtLoginName")) global passwd passwd=self.win.getEditText("txtPassword") global loginstatus loginstatus=True global database database=sDatabase global uid uid=UID #docinfo.setUserFieldValue(2,self.win.getListBoxSelectedItem("lstDatabase")) #docinfo.setUserFieldValue(3,"") ErrorDialog("You can start creating your report in the current document.", "After creating, sending to the server.", "Message !") self.logobj.log_write('successful login',LOG_INFO, ': successful login from %s using database %s' % (sLogin, sDatabase)) self.win.endExecute() def btnCancel_clicked(self, oActionEvent): self.win.endExecute() def btnPrevious_clicked(self, oActionEvent): self.win.endExecute() Change(None) self.win.endExecute() if __name__<>"package" and __name__=="__main__": ServerParameter(None) elif __name__=="package": g_ImplementationHelper.addImplementation( ServerParameter, "org.openoffice.openerp.report.serverparam", ("com.sun.star.task.Job",),) # vim:expandtab:smartindent:tabstop=4:softtabstop=4:shiftwidth=4:
2023-11-26T01:26:58.646260
https://example.com/article/6492
CSC Locator Locate Common Service Center (CSC) List of Common Service Center(s) in Gudipala, Chittoor of Andhra Pradesh are given below the dropdown. The List given below of Gudipala, Chittoor contains the CSC information with CSC ID, VLE Name, Address and Contact Number- List of Common Service Center(s) in Gudipala, Chittoor of Andhra Pradesh. List of Common Service Center(s) in Gudipala, Chittoor of Andhra Pradesh. CSC ID VLE Name Address Phone No. AP062306502 Prathap Thota 1-B4,Vellore Road,Gudipala,Chittoor,517312 9032212001 AP062306501 K Bhanu Prathap USDP-CTCBX, 3-29,Gudipala ,Chittoor-517132 8686566484 About CSC in Gudipala, Chittoor - Various services have been provided by CSC in Gudipala, Chittoor. You can visit your nearest CSC for any service like Aadhar Card Registration, Aadhar Enrollment, E-Aadhar Letter Download & Print, various insurance services, Passport, LIC, E-Nagrik & E- District Services like Birth & Death Certificate at Gudipala, Chittoor. The other services also may be provided like Ration Card Application Form, Pension, NIOS Registration, PAN Card etc. at your Local CSC Center in Gudipala, Chittoor of Andhra Pradesh State.
2024-04-05T01:26:58.646260
https://example.com/article/8299
The happy parents are Gloria Tello and Jesús Delgado. She’s a housewife; he works for Quality Maintenance. They have a 3-year-old daughter, Hillary. Mercy staff members presented the couple the traditional basket of goodies for the newborn – clothes, diapers and toys – and a colorful wool cap. The cap is gift a from Durango Mad Hatters – about 50 women who meet monthly to knit caps for the purpose. Since their first meeting in October 2006, the women have donated more than 4,500 caps. Three women were in labor on Jan. 1, but only one baby other than Jesús Juan was a New Year’s baby, arriving at 10 p.m., hospital spokesman David Bruzzese said. The third mother gave birth in the wee hours Wednesday.
2024-06-09T01:26:58.646260
https://example.com/article/5448
Q: How do I correctly wire this lighted switch to provide power down the line? I've gotten in over my head! I just the Leviton lighted switches like the one in the pic shown for our bathrooms. There's just something so nice about the small light it gives off when it's the middle of the night! That said, it's not fully working! :) I've been able to figure out witch wire is HOT from the breaker box and I also know which wire is the load out to the lights this switch controls. There's a third line that WHEN I hook up to the screw that's on a side by itself DOES power up the light in the switch. But, there is another room of lights down past this switch that will NOT work when I'm wired up this way. I have found that if a bypass the single side screw and patch to the hot line coming in, the other bathroom lights up just fine! I am guessing that I don't have netural connected correctly, so I am not making a complete circut without the other room. But, it's beyond me at this point! A: If you are looking for the neutral to attach to it, there is a big bunch of neutrals in the back. Add a short white wire to that wirenut and connect that to the silver screw. To provide power to the next lights you need to take a short black wire and pigtail that along with the black to the next load and the black from the breaker. Then use the short black wire to connect to the switch.
2024-04-07T01:26:58.646260
https://example.com/article/8644
A bad day just got worse for Oregon State women’s basketball. The Beavers dropped out of the top-10 in today’s polls and in far worse news; it was officially announced that Kennedy Brown is lost for the season with a torn ACL. Brown went down with a non-contact knee injury at Friday’s home win against Arizona State. The freshman and former McDonald’s All-American has started every game she’s played in. Kennedy Brown is the 2nd starter-caliber player to be ruled our for the season (Taya Corosdale - hamstring). The Beavers will keep battling with an eye on getting a first round bye for the Pac-12 tournament. The top-4 seeds get a first round bye. Oregon State obviously still has big goals for the NCAA Tournament, but this season has been especially turbulent for the team. Steve Gress from the Corvallis Gazette-Times has a great story on the hardships this team has already faced. Oregon State will now head out on the road to face USC and UCLA for the first and only time of the regular-season.
2023-09-20T01:26:58.646260
https://example.com/article/1447
Our investigations have already established that the agency he is referring to is the discredited UK-based TV Production company, FBC Media, which was closed down after we revealed it had been paid RM84million (USD$27million) by Prime Minister Najib Razak’s private office to promote his image abroad and in Malaysia. [see our FBC Media stories as well as UK Independent Newspaper coverage of the scandal and the BBC’s apology] FBC Media was also hired on a RM15million (USD$5million) a year rolling contract by Taib Mahmud, specifically to counter the investigations of Sarawak Report and to conduct a dirty campaign to discredit its author and her family, which included the former British Prime Minister Gordon Brown. "Nothing unethical" - Trevino finally admits he was working for Malaysia, something we exposed last year! Josh Trevino lasted a week Trevino was promoted as the Guardian’s new right-wing commentator in a press statement on 15th August. The paper would soon have realised that the appointment was ill-judged after it provoked a storm of protest because of Trevino’s extreme and aggressive right-wing views. These views, which we have already recorded in Sarawak Report, are virulently pro-Israel and anti-Muslim. For example, Trevino had called upon the Israelis to shoot dead the civilians who had joined the Palestinian ‘Mercy Flotilla’ to bring aid and food to that community. These civilians included US citizens and also Malaysian citizens, whom Najib Razak later praised as heroes. Trevino has also gloried in being ‘pale skinned’. So, why, we have queried, did Taib Mahmud and Najib Razak find it appropriate to hire a person with these public standpoints, given they are Muslim leaders whose own policies are so virulently anti-Israel? Perhaps it is because if you want dirty work done you need to hire someone prepared to do it? The US group Act For Israel portrayed the Palestinian mercy boats as terrorists like Nazis. Josh Trevino is on the organisation's Advisory Board Trevino’s Dirty Tricks against Anwar and Sarawak Report Sarawak Report has received inside information, corroborated by extensive evidence, that Josh Trevino was hired by FBC media to conduct a defamation campaign against this blog and against Anwar Ibrahim as part of the two contracts with Najib and Taib. Meanwhile, FBC Media was abusing its position as a production company with outlets on the BBC, CNBC and CNN to promote these Malaysian clients as well as other dictators who were paying them, such as Egypt’s Hosni Mubarak, President Nursultan Nazarbayev of Kazakhstan and Gulnara Karimova, known as the ‘World’s Worst Daughter’ of Uzbekistan. 'Strategic' - part of the $5million a year contract between FBC Media and Taib Mahmud to improve his image in the face of criticism from Sarawak Report! Trevino, who acts as a political consultant and speech writer to right-wing politicians in the US, runs a right-wing website called Red State. He also has a sideline called Rogue Strategic Services, designed to: Articles posted first on New Ledger were then “bounced” onto Sarawak Reports and Malaysia Watcher as if they reflected genuine mainstream political opinion in the United States! BN -friendly newspapers and the BN controlled News Agency, Bernama would then also pick up on these articles and disseminate them throughout Malaysia. 'Bouncing back international recognition into the local press' and 'countering falsehoods about corruption'. An excerpt from FBC Media's International Strategic Communications Proposal to Taib Mahmud! Josh Trevino was the 'consultant' FBC used to set up its "special blogging" operation Never once did Trevino or any of these publications acknowledge that this was all a paid-for negative PR campaign being funded by Malaysian taxpayers. It was when Trevino took the process a step further and tried to get his paid-for promotional material into mainstream newspapers, also without declaring his interest, that he created his own undoing. It was on these grounds that the Guardian hastily terminated his contract yesterday. But we have evidence that activities linked to FBC’s and Josh Trevino’s “special blogging” operation also extended to deceptive tampering of Wikipedia sites linked to Taib and Sarawak Report. These activities were all clearly and maliciously designed to discredit Sarawak Report and other critics of Taib and BN and they even implicated the former UK Prime Minister Gordon Brown, who was also defamed in the process. Beginning on 30th March, shortly after FBC’s Sarawak campaign was launched, a single operator with the concealed identify Yaya222010 started tampering with a series of Wikipedia sites in what is known as ‘Sock Puppet’ activity. First, they created a Wikipedia entry for Sarawak Report Editor ‘Clare Rewcastle Brown’, focusing on some false accusations which were made during the so-called Parliamentary expenses scandal in the UK. Those accusations had all long-since been retracted by the newspapers, with substantial damages having been paid for libel. This negative Wikipedia entry was also heavily linked to Josh Trevino’s Malaysian attack site Sarawak Report(s), encouraging browsers to read the even more aggressive defamation on that site as well. Yaya222010 also added links from the established Radio Free Sarawak Wikipedia site to their new creation. Sock puppet - a disguised operator on the web who tampers with sites for a hidden purpose Also on the same day, the same Yaya222010 went about altering the existing Wikipedia entry for Andrew Brown, husband to Clare Rewcastle Brown. Yaya222010 added content that repeated the expenses libel and also created a new link from his site to the entry they had created against his wife Clare. They also added further links to Sarawak Report(s). The clear purpose of this malicious activity was to lead readers to the conclusion that the long-since discredited and withdrawn allegations about Andrew Brown were in fact true, despite the substantial libel damages that that the Browns have already won. The same dirty tricks were even played by the same operator on the same day against the Wikipedia website of the former UK Prime Minister, Gordon Brown. Yaya222010 linked his site to their Wikipedia entry about Clare Rewcastle Brown and also to Sarawak Reports.org, where he is further defamed in a number of articles. That very same day Yaya222010 also linked Taib Mahmud’s own Wikipedia site to their entry on Clare Rewcastle Brown in an effort to give the impression that criticism of Taib was made by discredited people! Yaya222010 made positive al!terations on Taib's site on the same day and linked to Sarawak Reports Other Wikipedia pages that were tampered with that day by Yaya222010 include site of the famous Malaysian opposition blogger, Raja Petra Kamarudin. Yaya222010 also linked his site to Sarawak Report(s) where he is shown as attacking Anwar. Trevino's attack site Sarawak Reports defamed the former British PM as it tried to defend criticism of paymaster Taib Mahmud There can be little doubt that these activities were part of a deliberately orchestrated and malevolant campaign to attack the author of Sarawak Report on behalf of Taib Mahmud, much in the way that was promised in FBC Media’s contract. Wikipedia have now confirmed that Yaya222010 was indeed a sock puppet and have conducted an investigation into its activities. Wikipedia’s report shows that it has also linked Yaya222010 to other subsidiary sock puppets which in August last year were actively trying to erase information about our exposes about FBC President, CNN’s John Defterios and FBC Chairman, Alan Friedman from the web! Deceptive web activity - master 'sock puppet' Yaya222010 spawned sub-puppets that were trying to alter on-line coverage about FBC Media's bosses during the scandal about the company “These new accounts (apart from the sockmaster) and IPs originating from London and Overland Park, KS, have been editing three articles – Clare Rewcastle Brown, John Defterios and Alan Friedman – for the past few days trying to remove coverage of a controversy involving Defterios and Friedman and making subtle negative POV edits to the Brown article. Recently, Brown implicated FBC Media in a controversy, while Defterios & Friedman are/were among the most senior people running FBC. Since story broke, there has been a coordinated attempt by these accounts to remove coverage of the controversy on the Defterios & Friedman pages. — Yk ʏк yƙ talk ~ contrib 00:31, 8 August 2011 (UTC)“[wikipedia investigations] FBC Media closed, after our exposes last year caused the BBC and CNBC to sever their contracts. Would the Chaiman, Alan Friedman, President, John Defterios and blogging ‘Consultant’, Josh Trevino care to deny involvement in this sock puppet activity that was all linked to the sites they set up on behalf of Taib Mahmud? Sarawak Report has issued enquiries to Wikipedia. Sections Your views are valuable to us, but Sarawak Report kindly requests that comments be deposited in suitable language and do not support racism or violence or we will be forced to withdraw them from the site.
2023-10-30T01:26:58.646260
https://example.com/article/6246
Q: Can I tell my antioxidants intake based on nutrition facts labels? The recommended daily intake of fruits and vegetables is 5-10 portions (url), in order to meet the "required antioxidant levels" (dark-leaf green vegetables, berries, cruciferous vegetables, ...). Can I measure my antioxidant intake based on nutrition facts label, instead of counting vegetable portions? Adding up the total intake of vitamins A, C, E and magnesium may not be representing because they are not necessarily the "major players" (additional significant players are CoQ10, alpha-lipoic acid, l-carnitine, acetyl-l-carnitine, n-acetyl cysteine). A: Well yes, you could get this information from food labels, since the recommended daily intake of vitamins is well established. But there is really no need to worry about dietary "antioxidants" (usually vitamins A, C and E, and carotenoids). If you eat a reasonably balanced diet, you are getting all the vitamins you need. Thankfully, vitamin deficiency is very rare in the western world today. There is a lot of hype around "antioxidant" dietary supplements, but there is no convincing evidence that high levels of these vitamins in your diet has any beneficial effect at all. Randomized clinical trials have failed to show any effects whatsoever of antioxidant supplements on chronic diseases, and excess intake may even increase overall mortality. Non-vitamin compounds like carnitine are not necessary in the diet at all, since they can be synthesized by the body in sufficient amounts. In general, the fact that a compound is a "major player" in cellular metabolism (in oxidative defense or other wise) does not mean that you have to consume it. For example, the TCA cycle intermediates are arguably the biggest "players" in human metabolism, but none of them are necessary in the diet.
2023-10-12T01:26:58.646260
https://example.com/article/7394
The Dangers of Ice Dams to Your Roof During the winter months, and particularly after snow storms, ice dams can start to form. An ice dam is a ridge of ice that forms at the edge of your roof and prevents melting snow from draining off. Ice dams can be dangerous to your home. They can: Tear off your gutters Loosen shingles on you roof Cause water to back up under your shingles and drain into your home Water that can not drain off properly works its wayunder your roof covering and flows into the attic. From there it can seep through insulation, ceilings, walls and other areas causing peeling paint, stained and sagging ceilings, warped floors and even mold and mildew. What Causes Ice Dams? Ice dams form when indoor heating rises through your ceiling into the attic and warms the roof surface. Snow on the heated part of the roof melts and flows down until it meets the part of the roof that is below freezing (>32 degrees). At that point, the water freezes into an ice dam. How to Prevent Ice Dams from Causing Damage To prevent ice dams from endangering your home, you’ll need to keep the temperature in your roof and eaves consistent. You can do this by: Adding insulation to your attic floor Ventilate eaves and ridge Exhaust to the outside through your roof and or walls, never through a soffit Seal and insulate ducts Cover your attic hatch Add or repair flashing around chimneys Completing the items listed above will help you to enjoy an ice dam-free winter while saving on energy costs. Not sure if your home has the right amount of insulation? Use a calculator or hire a licensed contractor to service your roof.
2024-04-18T01:26:58.646260
https://example.com/article/2027
Prior to ETSU:Went 10-2 with two saves and 65 strikeouts in two seasons at WaltersStateCommunity College… compiled a 3.35 earned run average while there… helped the Senators to the JUCO World Series in both seasons. High School:Three-time letter winner in both baseball and football at WilliamBlountHigh School… All-Region, All-District and All-County selection in each of his final two seasons… established school records with 18 career wins, a 2.49 career ERA and 200 career strikeouts. Personal:Born on March 5, 1985… pre-med major… son of Wayne and Sue Wojciechowski.
2023-10-18T01:26:58.646260
https://example.com/article/5244
FILED April 21, 2016 In the Office of the Clerk of Court WA State Court of Appeals, Division III IN THE COURT OF APPEALS OF THE STATE OF WASHINGTON DIVISION THREE JOSEPH LETTRICK, an individual, ) No. 33058-3-111 ) Appellant, ) ) v. ) UNPUBLISHED OPINION ) KRISTINA JOHNSON, Defendant, and ) the marital property thereof, if any, ) ) Respondent. ) ) PENNELL, J. -Joseph Lettrick appeals a jury verdict finding Kristina Johnson not liable for injuries and damages claimed by Mr. Lettrick as a result of a motor vehicle l ~ accident. We affirm the verdict but reverse and remand the trial court's award of costs, as I the amount allowed for expenses in obtaining medical records was not limited to the l records actually admitted into evidence at trial. j FACTS j This action arises out of a motor vehicle accident that occurred on March 30, 2011, l in the Costco parking lot in Kennewick, Washington. Joseph Lettrick and Kristina I Johnson were parked on opposite sides of an aisle in the lot and at some point their vehicles contacted back to back. A jury trial was held October 6-10, 2014. At trial, 1i witnesses gave varying accounts of the accident. In dispute was whether both parties were backing out of their parking spots at approximately the same time, whether one or I t l No. 33058-3-III Lettrick v. Johnson both vehicles were moving backward at the time of the collision, whether Ms. Johnson's actions in backing up were proper, and also where the point of impact occurred. During the trial, Mr. Lettrick moved to admit Dr. Brian O'Grady's deposition testimony into evidence. The trial court denied the motion. At the conclusion of trial, the jury returned a verdict in favor of Ms. Johnson, finding she was not negligent. The court awarded Ms. Johnson costs totaling $2,111.36, which included $1,288.01 for expenses in obtaining medical records, and entered its judgment on November 14, 2014. Mr. Lettrick subsequently filed a motion for judgment as a matter of law and for a new trial. The court denied the motion. Mr. Lettrick appeals. ANALYSIS A. Challenges to the Jury Verdict 1. The motion for judgment as a matter of law Mr. Lettrick assigns error to the trial court's denial of his motion for judgment as a matter of law under CR 50. However, because Mr. Lettrick did not file his motion prior to submission of the case to the jury, this claim has been waived. Millies v. LandAmerica Transnation, No. 91301-3, 2016 WL 1255338, at *6 (Wash. Mar. 31, 2016). l 2. The motion/or new trial I As an alternative to his motion for judgment as a matter of law, Mr. Lettrick 1 2 No. 33058-3-III Lettrick v. Johnson maintains he is entitled to a new trial under CR 59. We review a trial court's decision denying a motion for a new trial for abuse of discretion. State v. Fry, 153 Wn. App. 235, 238, 220 P.3d 1245 (2009). A trial court abuses its discretion in denying a motion for a new trial if the verdict is contrary to the evidence. Palmer v. Jensen, 132 Wn.2d 193, 198, 93 7 P .2d 597 ( 1997). "Where the proponent of a new trial argues the verdict was not based upon the evidence, appellate courts will look to the record to determine whether there was sufficient evidence to support the verdict." Id. at 197. The thrust of Mr. Lettrick's argument is that Ms. Johnson was negligent as a matter of law because she admitted she was not continuously looking backward while reversing her vehicle. On direct examination, the pertinent testimony elicited from Ms. Johnson was as follows: Q. Were you looking back to the back of your vehicle when this accident happened? A. No. Q. So, had you shifted back to tum around so that you could engage the car to go, because you talked about the fact you put your arm behind the arm rest and was turning back to look back? A. Right. Q. Okay, so explain that. A. So, I was still backing out but had-I guess, yeah. I was getting ready to finish backing out, put it in drive and go forward. 2 Verbatim Report of Proceedings (VRP) (Oct. 9, 2014) at 327. On cross-examination, Ms. Johnson provided a further description, stating: 3 No. 33058-3-111 Lettrick v. Johnson Q. Okay. You just said that by the time-by the time of impact you were already starting to face forward. A. I had turned my body forward. Q. Okay. A. Yes. Q. You were no longer looking backward? A. Correct. Q. Do you rely on your back up sensor when you're getting close to the end of your back up? A. No. I still have my mirrors that I can see. Q. You were still moving at the time of this impact though? A. Yes. Q. At around five miles an hour? A. Or less. 2 VRP at 337-38. We will not lightly overturn a jury verdict. Instead, we are required to evaluate the evidence in the light most favorable to the prevailing party. Herriman v. May, 142 Wn. App. 226, 232, 174 P.3d 156 (2007). When viewed from this perspective, Ms. Johnson's testimony indicated that, while reversing her vehicle, she either turned her head or used her mirrors to make sure the path behind her was clear. Thus, there was no unequivocal evidence presented to the jury that Ms. Johnson violated the applicable standard of care. Cleveland v. Grays Harbor Dairy Prods., Inc., 193 Wash. 122, 126, 74 P.2d 909 (1938) (a driver backing up a vehicle must exercise ordinary care and adopt sufficient means to ascertain whether others are in the vicinity who may be injured); Wooldridge v. Pac. Coast Coal Co., 22 Wn.2d 314, 316-17, 155 P.2d 1001 (1945) (driver who alternates 4 No. 33058-3-III Lettrick v. Johnson between looking backward and relying on safety mirrors could be found not liable). The jury was accurately instructed that, as a driver, Ms. Johnson had a duty to exercise ordinary care in the operation of her vehicle. Clerk's Papers at 1391-93, 1399. Mr. Lettrick did not seek any further instructions addressing the standard of care for a driver operating his or her vehicle in reverse. As given, the trial court's instructions enabled counsel to argue that the jury should find Ms. Johnson negligent because her testimony suggested she was not looking backward and did not take sufficient precautions while reversing her vehicle. Transcript (Oct. 10, 2014) at 35, 72. However, the jury was not required to accept counsel's characterization of the evidence. Because there was substantial evidence to support the jury's verdict and because there was no substantial injustice under the law, the trial court acted within its discretion to deny Mr. Lettrick's motion for a new trial. 3. Dr. Brian O 'Grady's deposition testimony Mr. Lettrick argues the trial court erred by not allowing the trial testimony of Dr. Brian O'Grady to be presented to the jury through the reading of Dr. O'Grady's deposition transcript. However, because Dr. O'Grady's proposed testimony went to the issue of damages, not liability, any error in exclusion was harmless. iI I Il 5 l l ! 1 No. 33058-3-III Lettrick v. Johnson B. The Award of Costs Mr. Lettrick argues the trial court erred by awarding Ms. Johnson costs for medical records she already had copies of, or alternatively, she was only entitled to costs for records actually admitted into evidence at trial. "The standard of review for an award of costs involves a two-step process." Hickok-Knight v. Wal-Mart Stores, Inc., 170 Wn. I ' App. 279, 325, 284 P.3d 749 (2012). First, this court "review[s] de novo whether a statute, contract, or equitable theory authorizes the award." Id. "Second, if such authority exists, [this court] review[s] for abuse of discretion the amount of the award." Id. RCW 4.84.010(5) allows reimbursement to a prevailing party of "[r]easonable expenses ... incurred in obtaining reports and records, which are admitted into evidence at trial ... including but not limited to medical records .... " (Emphasis added.) "The clause 'which are admitted into evidence at trial' is a restrictive clause that limits the reports and records for which the prevailing party may be reimbursed," i.e. "those reports and records ultimately used and actually admitted at trial." Hickok-Knight, 170 Wn. App. at 326. The trial court's cost award only complied with the foregoing legal standards in part. All of the medical records and billings Ms. Johnson obtained from Physicians Immediate Care were admitted into evidence at trial. Thus, Ms. Johnson was entitled to 6 l No. 33058-3-III Lettrick v. Johnson full reimbursement in the amount of $626.39. In contrast, only one record from Kadlec Regional Medical Center was admitted at trial. Yet the court awarded Ms. Johnson reimbursement of $661.62 for all the records obtained from Kadlec, including numerous documents not admitted into evidence. This blanket award violated the plain terms of RCW 4.84.010(5). Because not all the records from Kadlec Regional Medical Center were admitted into evidence, the cost award should have been tailored to the lone record meeting the terms of the statute. RCW 4.84.010(5). Based on the foregoing, the jury's verdict is affirmed, but the award of costs in the judgment is reversed in part. This matter is remanded to the trial court for a revised assessment of costs consistent with this opinion. A majority of the panel has determined this opinion will not be printed in the Washington Appellate Reports, but it will be filed for public record pursuant to RCW I 2.06.040. Pennell, J. WE CONCUR: K?orsmo, J. ( / l 7
2023-12-27T01:26:58.646260
https://example.com/article/2384
Tibetan antelope now listed as endangered March 30, 2006 in / The Wildlife Conservation Society is praising a U.S. Fish and Wildlife Service decision to list the Tibetan antelope as an endangered species. The New York-based society said it has conducted a series of expeditions to China's Chang Tang Reserve during the past 20 years to bring attention to the c decline in the number of the animal due to poaching. The WCS said the antelope's wool, considered the finest in the world, is used for shawls that are sold on the black market for as much as $15,000 each, resulting in tens of thousands of Tibetan antelope being slaughtered. The U.S. listing of the Tibetan antelope, also known as chiru, under the Endangered Species Act reinforces protection for the animal that's already safeguarded under the Convention on International Trade in Endangered Species. That prohibits the international commercial sale of any parts or products of the species. The U.S. action, published Thursday in the Federal Register, takes effect April 28.
2024-02-13T01:26:58.646260
https://example.com/article/9499
Q: Paginação hasMany Laravel 5.1 Tenho o seguinte relacionamento em meu Model Cliente: public function Usuario(){ return $this->hasMany('SIST\Models\Admin\Usuario', 'id_cliente'); } Passo os dados do cliente pelo meu Controller: $cliente = Cliente::find($id_cliente); return view('admin/usuario/index',['cliente' => $cliente]); E faço a listagem de usuários na minha View: @foreach($cliente->Usuario as $usuario) Preciso saber como faço para paginar os resultados. A: Ao invés de chamar diretamente o relacionamento, você pode utilizar o método do relaciomanento para poder chamar o paginate. $cliente = Cliente::findOrFail($id_cliente); $usuarios = $cliente->usuarios()->paginate(15); Na view, você vai substituir $cliente->usuarios por $usuarios no seu foreach. E para exibir os links da paginação, faça assim na view: {{ $usuarios->links() }} Você também pode usar o método $usuario->render() opcionalmente. Esses dois métodos servem para o mesmo propósito.
2023-09-21T01:26:58.646260
https://example.com/article/7936
About Web Posts by Web Strategies: Last week, CVS Health did the right thing and cut ties with the U.S. Chamber of Commerce. This announcement came in the wake of a series of New York Times articles revealing the Chamber’s role in a global lobbying effort to combat anti-smoking policies. CVS Health’s decision to leave the Chamber follows its 2014 decision to end sales of all tobacco products. CVS senior vice president David Palombi has explained, “CVS Health’s purpose is to help people on their path to better health, and we fundamentally believe tobacco use is in direct conflict with this purpose.” The NYT series also highlighted a common misconception, that the Chamber of Commerce is part of the U.S. government. This confusion is not unfounded: U.S. government officials often affiliate with international divisions of the Chamber. For example, in Estonia, the U.S. ambassador serves as the honorary president of AmCham Estonia. The President of the U.S. Chamber of Commerce, Thomas Donohue, responded to the NYT article and CVS Health’s departure in a NYT Letter to the Editor. Donohue justified the Chamber’s lobbying against anti-smoking laws by hiding behind a veil of intellectual property protectionism. This veneer is easily seen through. It is clear that the Chamber is protecting the interests of prominent tobacco industry representatives with which it is affiliated, such as Philip Morris, without regard to the public health implications of its actions. As pointed out by a follow-up NYT article, such a view of its stance would not explain why the lobbying association has taken stands against policies that have nothing to do with intellectual property: “The chamber has not said why it has opposed public health steps like restricting smoking in public places, which it called an ‘extreme’ measure when it was proposed in Moldova.” In the past few years, the Chamber has lost a number of significant members due to its unpopular positions on important policy issues. In 2009, Apple left the Chamber over the Chamber’s opposition to climate-change initiatives that the Environmental Protection Agency set forth to lower greenhouse gas emissions. In 2011, Yahoo! left due to the Chamber’s support of the PROTECT IP act, a law that would have restricted internet freedom. In 2013, the environmentally sustainable construction company Skanska, left the Chamber due to their support of a chemical-industry led initiative to ban future government buildings from being ‘Leadership in Energy and Environmental Design’ (LEED) certified, which is contrary to Skanska’s business practices . When asked about its departure, CVS Health’s Executive Vice President and Chief Medical Officer, Dr. Troyen Brennan, explained, “it was very difficult for us to remain as a member once the revelations about the Chamber’s overseas [opposition to anti-smoking policies] advocacy became clear.” Hopefully CVS Health’s move will provide an example for other health care companies and inspire them to question their memberships in the Chamber as well. The U.S. Chamber of Commerce, as the self-described “world’s largest business organization,” has a major influence in public policy both here at home and internationally. A report released today by Tobacco Free Kids, Public Citizen’s U.S. Chamber Watch, Corporate Accountability International and several other organizations shows unequivocally how Big Tobacco has mobilized the Chamber’s economic and political power to bully governments into blocking, delaying, and weakening life-saving health policies worldwide. The Chamber purports to represent the interests of three million businesses of all sizes, including the smallest mom and pop businesses. However, a February 2014 report by Public Citizen’s U.S. Chamber Watch project, “The Gilded Chamber,” found that more than half of the money the Chamber raised in 2012 came from just 64 anonymous corporate donors. With corporate cash flooding its coffers, it is unsurprising that the policy positions the Chamber takes are skewed towards helping those corporate interests, and away from protecting the Main Street businesses it uses as a shield for its actions. The Chamber wields its economic clout aggressively, spending more on lobbying than any other interest group in the country. In addition, it has 116 American Chamber of Commerce affiliates, or AmChams, around the globe in 103 countries, and spends liberally there as well. The magnitude of the Chamber’s spending as well as their active engagement internationally means their positions on public policies, including health issues, are often perceived as carrying the weight of the U.S. business community. As such, disregarding their positions can carry an implied economic threat and countries hesitate to do so. Our report and a two-part New York Times investigation shows that, while the Chamber throws its weight around in many Global South countries to protect its corporate members’ interests, Big Tobacco has also pushed it to adopt particularly aggressive and radical positions in order to undermine the cascade of public health laws being passed as a result of the success of the global tobacco treaty. In an initial reaction to this reporting, CVS Health has recently resigned from the Chamber, and a group of United States Senators released a public statement critical of them as well as sent letters to the member companies of the U.S. Chamber’s Board of Directors asking about their positions on the Chamber’s efforts to fight tobacco control measures. For tobacco control advocates familiar with this deadly industry’s tactics, the Chamber’s work in this space comes as no surprise. Internal documents tell us that as the tobacco industry lost its public credibility, it began to use third parties to advocate on its behalf. Case studies in our report, from Africa to Latin America, make it clear that Big Tobacco is doggedly pursuing this strategy with the U.S. Chamber and its affiliates in Global South countries. In countries the tobacco industry has targeted around the world, the Chamber is delivering threatening letters that cast doubt on the science behind tobacco control, exaggerating the economic impacts of proven measures like tobacco taxation and crying wolf about explosions in illicit trade. In pursuing these actions, the Chamber and its AmCham affiliates are exporting well-documented tobacco industry tactics to block health laws around the globe. And as the New York Times points out in its investigation, (and then advocates that countries resist in their recent editorial: Tarred by Tobacco), these tactics are in some cases drafted by Big Tobacco executives themselves. Clearly, there is a deep conflict of interest between the Chamber’s aggressiveness on tobacco and the interests of its health-related members. So why is the Chamber so brazenly pursuing the interests of Big Tobacco? The answer lies in the Chamber’s deep financial and political ties with the tobacco industry. A top executive at the tobacco giant Altria Group serves on the chamber’s board as does a representative of the former parent company of Philip Morris International (PMI.) The largest transnational tobacco corporations in the world such as PMI, British American Tobacco (BAT), Japan Tobacco International (JTI) and Imperial Tobacco hold memberships in more than 55 AmCham chapters. Countries around the world should know that U.S. Chamber does not represent the American people or the U.S. government, nor is it representative of the broad swath of U.S. businesses. They should also continue implementing the global tobacco treaty’s life-saving measures, particularly Article 5.3, which is geared towards protecting public health measures against just these kinds of industry tactics. And finally, the private sector should think twice about the reputational risk posed by remaining a part of a trade group that puts the profits of the world’s deadliest industry before even its own members’ interests. Statement of Robert Weissman, President, Public Citizen, Host of U.S. Chamber Watch Today, Tom Donohue, the head of the U.S. Chamber of Commerce, the lobby group for Big Business, gives his annual State of American Business address. Donohue has a lot to celebrate. Corporate profits have risen for 12 straight quarters. Corporate profits as a share of the economy are at a record high. Wages as a share of the economy are at a record low. Effective corporate taxes are at a record low. Although corporate America is living larger than ever before, the odds are overwhelming that Donohue in his address will complain about the imaginary shackles on Big Business and demand still more subsidies and deals that aid the world’s biggest companies but hurt America and Americans. The odds are overwhelming because Donohue pretty much gives the same speech every year. Here’s some of what we can expect: – A plea for more NAFTA-style trade agreements and revival of the Nixon-era Fast Track authority to railroad them through Congress. No doubt these deals increase business power. But over the past two decades, these trade agreements have failed (PDF) to meet their business sector and political backers’ glowing promises, and instead have resulted in unprecedented and unsustainable trade deficits, the net loss of nearly 5 million U.S. manufacturing jobs, more than 57,000 factories with millions of higher-wage service sector jobs offshored, flat median wages despite significant productivity gains and the worst U.S. income inequality in the past century. Now Donohue will likely call for a NAFTA-style deal with Asian and Latin American countries, and for Fast Track trade authority to strip Congress of its constitutional authority over trade. Fast Track empowers trade officials, directed by 600 official corporate trade advisors, to diplomatically legislate – using “trade” agreements to put into place policies favored by the Chamber that failed in the sunshine of public debate. This includes imposing anti-consumer policies that have nothing do with traditional conceptions of “trade,” covering matters such as patent and copyright rules, regulatory standards, food safety rules, special powers for corporations to sue governments before private tribunals over alleged lost profits, Internet governance and much more. – Complaints about the alleged enormous regulatory burden on business and the need for legislation to handcuff consumer, health, safety, environmental, worker protection and other agencies from issuing new rules, as well as to roll back Dodd-Frank financial reforms. Somehow, Donohue will neglect to mention the costs of regulatory failures: The financial crisis and Great Recession (cost measured in the trillions); the BP oil disaster; Upper Big Branch and Sago coal mine disasters, among others; salmonella outbreaks involving everything from cantaloupe to peanut butter; widespread preventable workplace-related death and disease (PDF); life-threatening air pollution; and much more. Donohue will almost certainly whine about the unfairness of regulation and how it injures the economy. He almost certainly will fail to say that the benefits massively outpace costs, even when measured by corporate-friendly cost-benefit accounting techniques. The Office of Management and Budget (part of the White House) finds that (PDF): “The estimated annual benefits of major Federal regulations reviewed by OMB from October 1, 2003, to September 30, 2013, for which agencies estimated and monetized both benefits and costs, are in the aggregate between $217 billion and $863 billion, while the estimated annual costs are in the aggregate between $57 billion and $84 billion. These ranges are reported in 2001 dollars and reflect uncertainty in the benefits and costs of each rule at the time that it was evaluated.” In other words, benefits of the rules issued over the past decade – including during the Bush administration – are at least three times greater than costs, and as much as 13 times higher. – A demand to immunize companies from lawsuits that aim to hold them accountable for wrongdoing. Donohue will harp on this bugaboo even though consumers’ right to sue wrongdoers has been eviscerated by a series of U.S. Supreme Court rulings that enable companies to use fine-print terms in contracts to force disputes to be resolved by kangaroo arbitration panels rather than real courts, and to block consumers from banding together over shared wrongs. The Consumer Financial Protection Bureau has found that such fine-print provisions are pervasive in the financial sector, and they are manifold throughout the economy. Even more ironic, perhaps, is the Chamber claim about the need for “legal reform” to protect corporate wrongdoers even as the Chamber engages in excessive litigation and even as it aids the giant foreign corporation BP in its effort to persuade courts to overturn a legal settlement into which it entered voluntarily. Here the Chamber is actually siding with an admitted felon foreign multinational against the interests of the small businesses injured by the BP oil disaster. – A call for greater development of dirty energy. Oil prices have plummeted, and U.S. production of oil and gas is skyrocketing. Meanwhile, evidence abounds that the world is rushing face-first toward climate catastrophe (PDF). Instead of calling for massive public investment in energy efficiency and renewable energy – investments that would spur creation of new jobs, build up a fledgling U.S. industry and, eventually, yield enormous economy-wide savings on energy – Donohue is almost certain to insist on the need to further subsidize and immunize the dirty energy industries. He is almost certain not to mention the grave threat that climate change poses to business over time, a stunning oversight for the man who fancies himself the spokesperson for the corporate class, and who should be looking out for its long-term interests. There are a few other things Donohue is not likely to mention. For example, the U.S. Chamber of Commerce purports to represent all business. Its funding base, however, is a handful of giant corporations. More than half of its contributions came from just 64 donors. And, the Chamber has disproportionate influence not because of the merits of its positions, but its deployment of money in politics. It was the largest dark money organization in the 2014 elections. The Chamber invested very heavily and successfully in the 2014 elections, to defeat populist-minded tea party candidates somewhat independent of Big Business control in primaries, and to elect corporate-minded candidates in the general election. And, the Chamber is the largest lobbying organization in Washington, by far. In his annual address, Tom Donohue routinely conflates the state of American business with the state of the American economy. Well, the state of giant corporations is flush. But regular people continue to suffer – from precisely the policies that the Chamber urges. Earlier this month, the Department of Labor’s Advisory Committee on Construction Safety and Health (ACCSH) heard a presentation from the Occupational Safety and Health Administration (OSHA) on employers’ continuing obligation to make and maintain accurate records of workplace injuries and illnesses. OSHA has said that “the duty to record an injury or illness … does not expire just because the employer fails to create the necessary records when first required to do so.” In other words, being fined by OSHA for violating a record-keeping rule does not absolve the employer of its ongoing responsibility to keep up-to-date records. Employers that continue to fail to keep the legally required records continue to be subject to fines. This should be a matter of common sense – arguing the contrary is like saying a driver pulled over on the highway and fined for speeding should no longer be required to obey speed limits. But this commonsense obligation to keep accurate records (and obey the law) apparently is not enough for some employers. That’s why OSHA is planning to issue a Notice of Proposed Rulemaking by the end of the year seeking to amend its record-keeping regulations to clarify that the duty to make and maintain accurate records of work-related injuries and illnesses is an ongoing obligation. The rulemaking is necessary because in 2012 a panel at the D.C. Circuit court disagreed with OSHA’s 40 years of practice and rejected the agency’s argument that a failure to record an injury or illness is a continuing violation. Corporate America would like to continue the current limited rule interpretation and it would not be far-fetched to guess that the U.S. Chamber of Commerce agrees with the D.C. Circuit decision. During the recent ACCSH meeting, representatives from the Chamber of Commerce, the law offices of Jackson and Lewis P.C. and the law offices of McDermott Will & Emery could be seen expressing their disdain for OSHA’s proposal to modernize the record-keeping rule. And, earlier this year, OSHA was met with strong Big Business opposition on a different proposed record-keeping rule change. So there is no reason to think that this new proposal will be treated any differently by the Chamber once it is entered into the Federal Register. Our friends at Think Progress posted agem on their blogthis week describing Corporate America’s griping at a U.S. Chamber of Commerce event about its supposedly waning “free speech” privileges. Apparently, the huge momentum behind requiring disclosure has dark money political spenders quaking in their boots! At one point during the event, Paul Atkins, the CEO of Patomak Global Partners LLC, actually compared shareholders who want companies to be more transparent to neo-Nazis. Now that you’ve finished choking on your coffee, consider his actual words: “When I was a staffer at the SEC [U.S. Securities and Exchange Commission] back in the early 90s, a group of Neo-Nazis came up with a proposal for AT&T… it had to go into the proxy statement because of the way the rules were. That’s pretty bad but carry it forward now — we have issues here like disclosure of political spending or lobbying or general political spending and these disclosures are not material at all.” Sure Paul, advocating for transparency is just the natural outgrowth of neo-Nazism. And neo-Nazism is just “pretty bad” anyway. (Yeah, right!) Google has revolutionized the world of information sharing, but it can’t seem to follow up on a basic commitment it made to its shareholders five months ago. At Google’s May 2014 shareholder meeting, we asked Executive Chairman Eric Schmidt how he would respond to shareholder calls for greater political spending transparency. Despite its “Don’t Be Evil” motto, Google funds major dark money groups like the U.S. Chamber of Commerce and ranks among the worst of the major tech companies in political spending transparency. The amount of information it collects about users while withholding information about its own practices creates a dangerous imbalance of power. “Let me summarize your request,” Schmidt said at the May meeting. “We need to be more transparent. And we’ve heard that from a number of other shareholders … Let us come back with some ideas.” Google hadn’t responded to any of our more than half a dozen phone calls and emails, so last week we attended a talk by Eric Schmidt to ask him once again. “At your shareholder meeting this year, you said that you would respond to shareholder calls for more transparency in political spending,” I said to Schmidt during the Q&A. “Yes,” he responded. “Are you still working on that?” I said. “I don’t know the status of that, but we certainly promised. So maybe we can follow up on that one.” Once again, we’re reaching out to Google but getting no follow-up. Google can clearly do better. It certainly promised. The need for the Foreign Corrupt Practices Act remains alive and well. Companies and executives are still getting caught red-handed. The U.S. Chamber still wants the highly effective law weakened. Since the landmark guilty plea and settlement in the Alcoa Worldwide Alumina (Alcoa) case in January, companies have paid another $196 million in penalties for violations of the Foreign Corrupt Practices Act (FCPA). In March, Marubeni Corporation pleaded guilty to bribing an Indonesian member of Parliament, among other foreign officials. In April, Hewlett-Packard subsidiaries in Russia, Poland and Mexico accepted responsibility for bribing former executives of state-owned companies and police department officials and for maintaining a multi-million dollar slush fund for various other corrupt payments in those countries. The Department of Justice (DOJ) has indicted several other individuals since the Alcoa case as well, including Wall Street broker-dealers and a former vice president of Bechtel Corporation. Despite these recent successes in curbing egregiously corrupt behavior under the FCPA, the U.S. Chamber of Commerce wants to weaken the law. A few days before Halloween 2010, the Chamber released a report that dressed up the FCPA as a boogeyman that scared away business with its “increasingly aggressive” interpretation by enforcement agencies. The Chamber report demanded five amendments to the FCPA — nominally to provide guidance for businesses in complying with the law — that actually were designed to hamstring enforcement. Undeterred by the subsequent release of a 130-page guidance document by DOJ and the Securities and Exchange Commission (SEC) rejecting the Chamber’s demands, the Chamber still ranks FCPA “reform” among their lobbying priorities for 2014. One of the Chamber’s proposed amendments calls for limited liability for corporations whose subsidiaries violate provisions of the FCPA — in other words, rewarding ignorance (or feigned ignorance) by parent companies. But loosening the rules for parent companies creates an incentive for more of the same corrupt acts described in the Hewlett-Packard subsidiaries’ admissions of misconduct just this April. Public Citizen’s November 2013 report, “License to Bribe,” details all five amendments sought by the Chamber, and provides common-sense rebuttals to each proposal. The bottom line: corruption is demonstrably harmful to both business and democracy. The FCPA is America’s most salient global anti-corruption tool. Since it was first enacted in 1977, countries and international organizations around the world have followed America’s lead and enacted similar global anti-corruption rules. Now that business is more global than ever before, it is no time to weaken the FCPA. Jess Unger is a legal fellow with Public Citizen’s Congress Watch division The U.S. Supreme Court’s recent decisions in Burwell v. Hobby Lobby, a corporate victory of “startling breadth,” and in Harris v. Quinn, are only the latest in a trend at the U.S. Supreme Court over the past six years. A new report by the Constitutional Accountability Center titled “The U.S. Chamber of Commerce Continues its Winning Ways” shows that the U.S. Chamber of Commerce has gotten its way in an astonishing 80 percent of the cases it has argued over the past three terms, including 69 percent this term and 70 percent since President George W. Bush appointed Justices John Roberts and Samuel Alito to the court. The Chamber’s 80 percent success rate over the past three terms comprises 32 wins and just eight losses. That’s a streak like the one enjoyed by Lebron James’ 2013 Miami Heat, which had one of the best seasons in NBA history last year, winning 80 percent of its games on its way to a second straight championship. The Chamber’s winning streak since Alito succeeded Justice Sandra Day O’Connor in 2006, with a 70 percent win rate over that time period, is a distinct phenomenon: the Chamber won only 43 percent of the time in the Burger court (15 of 35 from 1981-1986) and 56 percent in the Rehnquist court (45 of 80 from 1994-2005). This suggests that the Chamber’s recent record owes more to the current composition of the court than the Chamber’s lawyering, so it’s important not to overstate the Chamber’s influence on what the court actually decides. The report also notes how aggressively the Chamber works to overturn long held precedents considered unfriendly to business interests. While the Chamber and its Institute for Legal Reform rail against “activist attorneys general” and lawyers “seeking a big, fat payday” to demonize judicial arguments that would rein in corporate abuses, they routinely recommend that the Supreme Court overrule longstanding and settled precedent. “For instance,” the report reads, “the Chamber argued that the Court should second-guess two centuries of executive practice in [National Labor Relations Board v.] Canning, overrule a quarter-century’s worth of precedent in Halliburton [Co. v. Erica P. John Fund, Inc.], limit the EPA’s authority to regulate greenhouse gases in [Utility Air Regulatory Group v. EPA], and toss out important interstate air pollution rules in EPA v. EME Homer.” We are now seeing the culmination of decades of Chamber work in the courts, dating back to the infamous 1971 memorandum by corporate tobacco attorney Lewis Powell, that said, in part, “Strength lies in organization, in careful long-range planning and implementation, in consistency of action over an indefinite period of years, in the scale of financing available only through joint effort, and in the political power available only through united action and national organizations. … The role of the National Chamber of Commerce is therefore vital. … Under our constitutional system, especially with an activist-minded Supreme Court, the judiciary may be the most important instrument for social, economic and political change.” The same year Powell wrote his memorandum, President Richard Nixon nominated him to the Supreme Court, where he wrote the opinion that the Roberts court used to reach its corrosive Citizens United v. Federal Elections Commission decision, which allowed corporations to spend unlimited sums to influence political campaigns. The Chamber’s decades of lobbying, campaign spending and aggression in the courts are paying off at accelerating rates. Powell wrote his memorandum in response to a period of success for progressive issues in the courts, college campuses and other arenas of influence. His paper concluded, “The first step should be a thorough study. But this would be an exercise in futility unless the Board of Directors of the Chamber accepts the fundamental premise of this paper, namely, that business and the enterprise system are in deep trouble, and the hour is late.” It seems clear that the tables have turned. The Chamber’s resounding successes in the Supreme Court over the past six years spell trouble for the equality and sustainability of our country. It is long past time for the left, both institutional and non-institutional, to redouble its efforts. The hour is late. Sam Jewler is the communications and research officer for Public Citizen’s Chamber Watch program. A new survey of small businesses, “Small Business Owners’ Views on Climate & Energy Policy Reform,” indicates the U.S. Chamber is even more isolated in its regressive anti-science position. Especially considering the Chamber’s frequent attempts to claim small businesses as a part of its constituency, the clear call by small business owners to address climate change, evidenced in this report, is remarkable. Among the major findings: – 87 percent of business owners named consequences of climate change as potentially harmful to their businesses; – 64 percent of businesses believe government regulation is needed to reduce carbon emissions from power plants; and – 57 percent of businesses said that the biggest carbon emitters should make the biggest reductions in carbon emissions and bear most of the costs of reduction efforts. The findings came from a scientific, national phone survey of 555 small business owners (2 to 99 employees). Significantly, more respondents identified as Republican or independent-leaning Republican (43 percent total) than as being or leaning toward any other group. The report was produced by the American Sustainable Business Council. What’s often missed amid the Chamber’s commotion about regulatory and tax “burdens” is the reason those measures exist in the first place: the benefits both to those paying their share and to society at large. A plurality (40 percent) of business owners said they would rather accept a 10 percent increase in energy costs than face the consequences of climate change. Only a quarter said they’d rather suffer the consequences of climate change. Small businesses are widely recognized as the backbone of the economy, and with nearly nine out of 10 saying they worry that climate change could harm their business, it’s clear that the EPA’s action (and more) is needed. The top climate change concerns shared by small business owners included higher energy costs (53 percent), power outages due to stress on the power grid (48 percent), severe storms (41 percent), higher health care costs (37 percent) and higher food costs (35 percent). Other concerns included record-breaking hot and cold spells, a reduced fresh water supply, extreme drought, coastal flooding and more. The verdict is in. Owners of businesses all shapes and sizes recognize the dangers of climate change and are willing – even eager – to contribute to efforts to protect the planet. Without a stable climate, there can be no stable economy. When the U.S. Chamber says otherwise, it’s speaking for a select few big-money companies that profit handsomely from the status quo. As this report shows, if the U.S. Chamber represents small businesses, it’s not doing it right. Sam Jewler is the communications and research officer for Public Citizen’s Chamber Watch program. A week before the U.S. Environmental Protection Agency (EPA) released its new greenhouse gas emission rule for existing power plants, the U.S. Chamber of Commerce released a report attempting to pre-empt it, relying on a number of assumptions that turned out to be inaccurate – then interpreting its findings with strong doses of hyperbole. We rounded up the best responses to the Chamber as it tried to block progress in this historic moment for taking action on climate change. 1. Even before it came out that the Chamber overestimated how ambitious the EPA rules would be, the New York Times’ Paul Krugman noted that the Chamber report actually proved that the cost of action is small. “So the Chamber is telling us that we can achieve major reductions in greenhouse gases at a cost of 0.2 percent of GDP,” he wrote in a blog post. “That’s cheap!” “You might ask why the Chamber of Commerce is so fiercely opposed to action against global warming, if the cost of action is so small,” he wrote in an op-ed the next day. “The answer, of course, is that the chamber is serving special interests, notably the coal industry — what’s good for America isn’t good for the Koch brothers, and vice versa — and also catering to the ever more powerful anti-science sentiments of the Republican Party.” Absurdities litter the Chamber’s report, which Chait writes is “generated as attack-ad fodder.” The Chamber predicted yearly increase in energy demand through 2030 will be double what it’s been since 2000. (The increase in demand has held steady at 0.7 percent per year since 2000; the Chamber predicts 1.4 percent per year, while the U.S. Energy Information Administration predicts 0.9 percent through 2040). It assumed the EPA would call for a 42 percent reduction by 2030, though the administration has suggested a range of less ambitious targets over the last few years (and ended up this week calling for a 30 percent reduction by 2030). It predicts costs of energy 15 years out, not taking into account how technologies adapt and develop to meet requirements like these. And, Chait writes, “the study’s bad faith is made abundantly clear in its conclusion,” in which the Chamber pretends that the U.S. would be alone in reducing its emissions, ignoring the geopolitical reality that no other major country will act until we do. (Indeed, the day after the EPA proposal came out China began to make noises about following suit.) 3. The EPA, too, gave an unusually strong rebuttal to the Chamber as soon as the Chamber’s report came out, using descriptors like “unfounded” and “irresponsible speculation,” and saying, “the Chamber is using the same tired play from the same special interest playbook that is engineered to continue polluting and stall progress.” The EPA’s blog post details two major areas in which the Chamber overestimates the costs of a proposal it hadn’t yet seen. One is that it assumed states would be required to build new natural gas power plants with carbon capture and sequestration (CCS) technology, and made that three-fourths of its cost estimate – but the EPA has indicated frequently that CCS would not be considered for existing power plants. The piece also noted that the Chamber made no mention of the huge costs of climate change that the EPA proposal attempts to avert – in 2012, for example, the U.S. had its second costliest year of natural disasters ever. 4. In “Chamber of Commerce Blasts EPA Rule That Doesn’t Exist,” ThinkProgress noted another benefit conveniently ignored by the Chamber (despite the ostentatious banners that drape its building): jobs. The Chamber predicts a loss of 224,000 jobs by2030 due to the rule – which is about how many jobs the U.S. adds every couple months. Also, as the article notes: “The Chamber fails to account for jobs that would be created building wind turbines, solar panels, and other sources of renewable power,” said David Hawkins, NRDC’s director of climate programs. The Chamber also left out “the jobs to be created making our homes and businesses more efficient; and the jobs of cleaning up our dirty power plants.” 5. Given how thoroughly the Chamber has been delegitimized on this issue, it may not be entirely surprising that a number of major companies are distancing themselves from the Chamber’s opinion on it. Josh Israel of ThinkProgress reported that companies including Intel, UPS, Verizon, Coca-Cola, 3M, Lockheed Martin, MGM Resorts and Prudential ranged from supporting the EPA’s plan to saying they had no position on it or that the Chamber did not speak for them. The article noted that a number of major utilities have said much more forward-thinking things about clean energy than the Chamber has (Ben Adler at Grist reported the same). It quoted me saying, “It’s another case of the Chamber not doing what’s best for the economy or the American people and not representing the full range of businesses in the economy.” While the Chamber has been roundly criticized for its falsehoods and fear-mongering, the criticism alone may not be enough to keep it from moving the final EPA rule closer toward the coal industry’s goals. As Glenn Kessler of The Washington Post wrote, Republican lawmakers are using the Chamber’s hyperbolic findings despite their widespread debunking – he gives their use of the talking points four out of four Pinocchios. And the Chamber is following up, planning an ad buy in six to eight states, putting its misleading report on repeat. Other conservative groups will be mobilizing members to call their politicians about the issue, using “a bunch of doom-and-gloom price-hike figures,” as our Tyson Slocum says. With the Chamber representing Big Coal and seeing truth as no obstacle, those of us who want a livable planet for current and future generations have our work cut out for us. Sam Jewler is the communications officer for Public Citizen’s Chamber Watch program.
2023-08-30T01:26:58.646260
https://example.com/article/5614
Hello all. I’m selling “The Mistress”, my 2005 Jeep LJ. It’s got everything that can be done to a Jeep aside from a different motor (not that it needs one). Upgrades include but are not limited to.... •3.5” Rubicon Express heavy duty long arm suspension kit, with Tri-link rear end (trussed rear axle. •Chromoly rear axles with ECTED electronic rear locker and 4:88 gears. •Dynatrac ProRock 44 front axle housing with RCV (lifetime warranty) axles, ARB front locker, Warn manually locking front hubs. ORO steering kit. •37” Goodyear MT/R tires(5), Mickey Thompson Classic II wheels(5). •Snorkel intake, Headers, custom exhaust. •Custom front bumper with 9500lbs Smittybilt winch with Synthetic rope. •Metal Cloak high clearance front fenders. •Poison Spyder tire carrier, rock sliders and full skid plates. •PureJeep rear fenders •etc etc. Jeep has 160,000kms(Transfer case has the correct speedometer gear for 37” tires and 4:88 gears so kms are correct). We are currently staying in Parksville until the 10th then touring around the rest of the island until the end of September at which time we are gonna make our way back towards Alberta. I’m asking $30,000 OBO. The upgrades alone cost more than that not to mention that LJ’s are rare. Stu’s the name, give me a call if you’re interested or have any questions. (403-836-6119). Cheers.
2023-09-25T01:26:58.646260
https://example.com/article/1385
Charapedia asked fans to think about what anime and manga endings surprised them, went against expectations or topped expectations in their latest 10,000 reader poll. 73 suggestions for most impactful ending were made by a polls of respondents that was 62.9% male and 70.4% in their teens and 20's. 20. Gintama - 99 votes (the Gintama fans seem to be just trolling polls at this point) 19. Guilty Crown - 102 votes 18. Shaman King - 107 votes 17. Jojo's Bizarre Adventure: Stone Ocean - 122 votes 16. Space Runaway Ideon - 130 votes 15. Flowers of Evil - 133 votes 14. Magical Warfare - 141 votes 13. Uta no Prince-sama: Love Revolution - 151 votes 12. Naruto - 164 votes 11. Neon Genesis Evagelion - 174 votes 10. Angel Beats! - 190 votes 9. Kuroko's Basketball - 198 votes 8. Tokyo Ghoul - 209 votes 7. Love Live! - 235 votes 6. Death Note - 245 votes 5. Your Lie in April - 288 votes 4. Puella Magi Madoka Magica - 295 votes 3. Anohana: The Flower We Saw That Day - 325 votes 2. School Days - 365 votes 1. Code Geass: Lelouch of the Rebellion - 587 votes Male Voters 10. Ideon - 130 votes 9. Magical Warfare - 131 votes 8. Flows of Evil - 133 votes 7. Evangelion - 148 votes 6. Angel Beats! - 149 votes 5. Love Live! - 150 votes 4. Madoka Magica - 195 votes 3. Anohana - 206 votes 2. School Days - 267 votes 1. Code Geass - 356 votes Female Voters 10. School Days - 98 votes 9. Madoka Magica - 100 votes 8. Tokyo Ghoul - 109 votes 7. AnoHana - 119 votes 6. Death Note - 126 votes 5. Naruto - 128 votes 4. UtaPri LOVE Revolutions - 150 votes 3. KuroBas - 168 votes 2. Your Lie in April - 170 votes 1. Code Geass - 231 via Moe Ota-News Sokuhō ------ Scott Green is editor and reporter for anime and manga at geek entertainment site Ain't It Cool News. Follow him on Twitter at @aicnanime.
2024-04-24T01:26:58.646260
https://example.com/article/3220
Rogers Media uses cookies for personalization, to customize its online advertisements, and for other purposes. Learn more or change your cookie preferences. Rogers Media supports the Digital Advertising Alliance principles. By continuing to use our service, you agree to our use of cookies. We use cookies (why?) You can change cookie preferences. Continued site use signifies consent. G.I. Joes party, thrift shopping & Keith Ashfield What students are talking about today (March 26th) 1. The Seattle rapper Macklemore, known for his mega-hit Thrift Shop, in which he rhymes about the deals at Value Village and raiding your grandparents’ closets, has made cheap clothing stores fashionable. In Calgary, local bars recently hosted a ‘Value Village’ formal and one graduate of SAIT who opened a consignment shop told The Weal student newspaper that it’s now a cool business to be in. The thrift shop phenomenon was also explored in The Athenaeum. 2. A Simon Fraser University sorority, Kappa Beta Gamma, has caused outrage by naming a pub night “G.I. Joes and Army Hoes.” Gloria Mellesmoen, writing in The Peak student newspaper isn’t happy that women are labelled “hoes.” She argues the theme is wrong too. “War should not be glorified or sexualized. I highly doubt anyone who has had to fight for their country would appreciate their work being represented as a sexy costume by a bunch of drunk university students.” She goes on to add, “I can say with the utmost confidence that I will never join a group that would call its membership and supporters ‘hoes.'” 3. A woman was sexually assaulted while she slept on a Greyhound bus bound for Ottawa Monday. Ottawa Police say the woman awoke to find a stranger sexually touching her and started screaming for fellow passengers to come help. An international engineering student was later acquitted of all charges.* 4. A young women was a victim of sexism from Conservative Minister Keith Ashfield, at least according to some bloggers, because Ashfield told her she would “make a wonderful wife for somebody.” After the outrage online, NDP MP Megan Leslie brought it up in the House of Commons. Now, the woman involved is speaking out. “In regards to what [the] Honourable Keith Ashfield said, I feel that it was a compliment,” she wrote on Facebook. “On the day that he visited, our family welcomed him as our guest and treated him with Filipino hospitality. I personally made him a Filipino bread called ‘Ensaymada’. He complimented me on the bread, and I appreciated the thanks. I was not offended whatsoever and it is unfair that the Minister’s comment was taken out of context.” 5. Did the Babe films, with their cute porker protagonists, turn you against meat? It seems that’s what happened to one of the human actors in the film. James Cromwell pleaded no contest to disrupting a University of Wisconsin System Board of Regents meeting last month to protest cat experiments at the school. He and a 27-year-old student held large signs showing a cat with metal implanted in its head at a campus lab while shouting about the treatment of felines, reports Huffington Post. Welcome back, ! Almost Done! Please confirm the information below before signing up. {* #socialRegistrationForm *} {* socialRegistration_firstName *} {* socialRegistration_lastName *} {* socialRegistration_emailAddress *} {* socialRegistration_displayName *} By clicking "Create Account", I confirm that I have read and understood each of the website terms of service and privacy policy and that I agree to be bound by them. Sign in to complete account merge Almost Done! Please confirm the information below before signing up. {* #registrationForm *} {* traditionalRegistration_firstName *} {* traditionalRegistration_lastName *} {* traditionalRegistration_emailAddress *} {* traditionalRegistration_displayName *} {* traditionalRegistration_password *} {* traditionalRegistration_passwordConfirm *} By clicking "Create Account", I confirm that I have read and understood each of the website terms of service and privacy policy and that I agree to be bound by them. Sign In / Sign Up With your Rogers Media profile You may have previously created an account with your email address on one of our other Rogers Media digital properties. If so, you can use that exact same email address and password combination to log in to this website.
2024-04-08T01:26:58.646260
https://example.com/article/2399
/** * @module models/report * @license MIT */ /** Dependencies */ const mongoose = require('mongoose') /** Schema */ const Schema = mongoose.Schema const reportSchema = new Schema( { sendBy: { type: Schema.ObjectId, ref: 'user', required: true, }, sendTo: { type: Schema.ObjectId, ref: 'user', required: true, }, job: { type: Schema.ObjectId, ref: 'job', required: true, }, /** has the format of message_id+chat.id */ /** like this: '1233+333455' */ inlineMessages: [{ type: String }], resolved: { type: Boolean, default: false, }, }, { usePushEach: true } ) module.exports = mongoose.model('report', reportSchema)
2023-09-19T01:26:58.646260
https://example.com/article/3993
Antibodies to gliadin, endomysium, and tissue transglutaminase for the diagnosis of celiac disease. Tissue transglutaminase has recently been identified as the main autoantigen recognized by antiendomysial antibodies in celiac disease. Serum immunoglobulin (Ig)A antibodies to tissue transglutaminase (tTG-ab) determined by an enzyme-linked immunosorbent assay (ELISA) technique have been reported to correlate closely with IgA antiendomysial antibodies (EMA). The purpose of this study was to assess the sensitivity, specificity, and predictive value of tTG-ab measured by a commercially available ELISA technique, compared with those of EMA and IgA antigliadin antibodies (AGA) for the diagnosis of celiac disease. Twenty-seven serum samples were obtained from patients with untreated celiac disease, 37 from patients who had had gluten withdrawn from their diets for varying time spans, and 34 from control subjects without celiac disease. All were younger than 14 years. Presence of tTG-ab and AGA was determined by ELISA and of EMA by indirect immunofluorescence. Twenty-six of 27 serum samples obtained from patients at the time of diagnosis of celiac disease were AGA positive. All 27 (concordance rate 100%) were positive for EMA and tTG-ab. Of the 34 control subjects, 1 was for AGA and 2 for tTG-ab. All 34 were negative for EMA. Sensitivity, specificity, positive predictive value, and negative predictive value within this group were, for tTG-ab: 100%, 94%, 93%, and 100%, respectively; for EMA: all four indexes were 100%; and for AGA: 96%, 97%, 96%, and 97%, respectively. Of the 37 with treated celiac disease, 2 were AGA positive, 9 were EMA positive, and 6 were tTG-ab positive. The concordance rate between EMA and tTG-ab was 100% in the group with untreated celiac disease, 94% in the control subjects, and 76% in the group with treated celiac disease. Immunoglobulin A antibodies to tissue transglutaminase are new, highly sensitive, and specific markers of celiac disease. They can be determined easily by an accurate, comparatively cheap technique and thereby may advantageously replace the EMA marker traditionally used.
2023-09-11T01:26:58.646260
https://example.com/article/3249
It's been described as a "monumental disaster" as Victoria's embattled fines body is back in the spotlight again. Fines Victoria is facing threats of legal action from several Melbourne councils and is responsible for a $328 million hole in the bottom line of the Victorian budget. The authority replaced Civic Compliance in 2017 as the state's one-stop shop for all fines, but for nearly two years, it's had major IT problems. That means some fines haven't been processed — but the Government is insisting they still have to be paid. What's gone wrong? In simple terms, Fines Victoria is having trouble recovering millions of dollars in revenue from the fines it is meant to collect. It blames the software it's using — called View — which it previously said would be fully functional by June this year. The software issues have created a huge backlog, meaning many people aren't receiving notices to pay their fines. In the meantime, Victoria Police has been using a work-around to manage the problem for the past 18 months. "We've had to employ quite a lot of additional staff to do that and we've continued to employ them for the past 18 months to do that," Chief Commissioner Graham Ashton says. Victoria Police has been using a work-around while the technical problem is being fixed. ( ABC News ) And it's not the first time the authority has copped criticism. The ombudsman wrote a damning report in April about Fines Victoria's performance, with incidents of dead people receiving fines. Government sources have told the ABC the system is now broken beyond repair — but officially, Fines Victoria is saying the system is still working and fines can still be paid. The Shadow Attorney General, Edward O'Donohue, says the bungle is "a monumental disaster" from the Andrews Labor Government. Who could be caught up? People who have received a parking fine, court fine, red-light camera fine, speeding fine or any other infringement notice under the jurisdiction of Fines Victoria could be affected. Some people aren't getting the infringement notices in the first instance, while others are not getting reminder notices. "Some clients have tried to contact Fines Victoria about their [court] infringements and have been asked for a reference number," criminal lawyer Ruth Parker told ABC Radio Melbourne's Mornings program. "But they don't have a reference number because they never received the fine … so you go around in circles. Fines Victoria handles payments for traffic, speeding and parking fines. ( ABC News ) "I got a call about two weeks out from when the fine was going to expire [for one of my clients] and she had still not received anything from Fines Victoria." Ms Parker says anyone who got a fine had the right to request a payment plan but that's a problem if you have to try to contact the court directly to arrange it. Who's missing out on all that lost revenue? The slow IT system has had a big impact on local councils which are not getting expected revenue from fines. Some councils are millions of dollars out of pocket, including the City of Port Phillip which claims it's owed around $21.7 million. Port Phillip has joined Hobsons Bay City Council to threaten court action against Fines Victoria to recover that revenue. The technical problem makes the enforcement of outstanding fines and the processing of complaints and appeals of fines difficult. More than 120,000 court-issued fines have not been sent out and authorities haven't been able to recover the debts because the system is not working to capacity. These fines could be worth hundreds of millions of dollars. Fines Victoria has been under pressure to explain the revenue shortfall. ( ABC News ) How much could it cost the taxpayer? The state budget has taken a big hit. In the last financial year, the state lost $328 million in revenue from fines. And there are warnings that the system may take more than 12 months to fix, if at all, raising the prospect of even more losses. Victorian Opposition Leader Michael O'Brien told ABC Radio Melbourne he has evidence of a shortfall last financial year and, with $60 million spent trying to fix the system, he says there is "$400 million out the window". Attorney General Jill Hennessy told State Parliament last week there has been significant improvement in Fines Victoria's performance and four operations had cleared more than $97,000 in debt. Local councils are missing out because Fines Victoria isn't collecting the revenue. ( ABC News: Loretta Florance ) So do I have to pay my fine? Officially, yes. Fines Victoria and the Department of Justice say the system is still working to pay fines and take general enquiries. "Court fines are currently being issued as normal by the courts and are payable directly to the courts on the day or at justice services centres at anytime," according to a department spokeswoman. The department acknowledged some Victorians had not received reminder notices "due to some complexity of merging data from the courts into the fines system". James Merlino, the Acting Premier, says the answer is unequivocally yes. "People have an obligation to pay their fines, fines don't expire and Fines Victoria is working through this issue endeavouring to contact people and ensuring that people pay their fines," he says. The Government has already commissioned a review into Fines Victoria which Mr Merlino says will be completed "shortly". The Department of Justice says the onus remains on Victorians to cough up, even if they have not received reminder notices, because the debt will still stand. "The obligation remains on Victorian debtors to pay their fines," the Department of Justice spokeswoman says. "The system is working and the debts don't go away. "People have a responsibility to pay their fines and they should."
2023-08-09T01:26:58.646260
https://example.com/article/5998
Localization of auxotrophic and benomyl resistance markers through the parasexual cycle in the beauveria bassiana (Bals.) vuill entomopathogen. Genetic studies to localize auxotrophic markers and resistance to benomyl fungicide and to analyze gene transfer on the Beauveria bassiana deuteromycete were carried out using the parasexual cycle. Parasexual crosses among strains with complementary genetic markers resulted in vigorous heterocaryons. Selection of the segregant products was made using two methodologies: total isolation and parental elimination. Colonies with recombinant traits were recovered directly from the heterocaryon in all crosses, and no diploid colony was isolated. This shows the high instability of the diploid nucleus in this species. Among the parasexual segregant products preferential recovery of markers in one of the parental strains involved in the crosses was detected, probably because of an inhibition of conidiogenesis from one parental strain to another. Genetic markers were localized in four linkage groups by the parasexual crosses. In the first group markers nic4, nic3, thi2, bio3, ade2, ths2, and ben1R were localized; in the second, the marker met1; in the third, pab1; and in the fourth, bio1. The parental strain 196/A11/3 is a carrier of translocation among the linkage groups I and III.
2023-08-10T01:26:58.646260
https://example.com/article/4036
Q: Use what you know: Your take on Diceware If you're not familiar, Diceware is a method for creating passwords using an ordinary die from a pair of dice as a hardware random number generator. For the sake of fun, let's ignore anything about the security of computer's random number generators. Write a function or program that prints or returns a single five-character string containing a random selection of the numbers 1 through 6. These should be chosen with equal probability. Example valid outputs: 21321 14654 53552 63641 No standard loopholes! This is code-golf, so shortest code in bytes wins. A: Dyalog APL, 7 bytes 10⊥?5⍴6 Try it online on TryAPL. How it works 5⍴6 Yield (6 6 6 6) ? Roll; turn each 6 into a random integer between 1 and 6. 10⊥ Decode with base 10.
2024-07-04T01:26:58.646260
https://example.com/article/1649
LIONS THREATS AND HOW TO COUNTER THEM – THE BACK THREE In the first four parts of this series I’ve talked a lot about the performances of those 2013 Lions players who also played in the 2009 series against South Africa and how the coaches would favour their experience when making selections for this series. In the first test of the 2009 series Lee Byrne (Wales) started at fullback with Rob Kearney (Ireland) coming off the bench. Byrne played reasonably but when Kearney came on he gave an absolute master class in fullback play. He retained the starting position for the second and third tests. There is a very good case for starting with him at fullback again in Australia. However that would mean ignoring the brilliant play of Leigh Halfpenny (Wales) over the last few years. Halfpenny was selected for the 2009 tour, then had to withdraw due to injury but since that time has been superb for Wales. He was voted the player of the Six Nations tournament in 2013 – he is very good under the high ball, in defence and provides a good link in attack. His goal kicking is also a great asset, particularly from long range so I expect he will start at fullback. On one wing I expect George North (Wales) will be a definite starter – he is a constant threat in attack and is good under the high ball. He comes infield looking for work in attack and will be a handful when running as an alternative direct runner to Jamie Roberts. There are three other wingers in the Lions squad – Tommy Bowe (Ireland), Alex Cuthbert (Wales) and Sean Maitland (Scotland). If Halfpenny starts at fullback I think you can add Kearney to the list as a potential wing candidate. I think this spot is one that is really up for grabs and form in the lead up matches will be the determining factor. There is an expectation that Cuthbert will start on the other wing to provide two big ball runners out wide but I’m not so sure. In my opinion he and North are very similar players and will be competing for the one spot as the Lions will want a little more variety on the other wing. I think Bowe could be the leading contender – he started in all three tests for the Lions in 2009 and was the leading try scorer in the 2012 Six Nations before suffering a knee injury that ruled him out for most of the 2013 season. He only started playing for Ulster a month or so before the squad was picked so he’ll have to show he’s returned to form if he’s going to be selected. Without seeing any of the lead up matches it’s a bit of a guess but I’ll go with Bowe. If Bowe or Kearney don’t start I expect they’ll battle it out with Jonathan Davies for the last bench spot but I’ve already said I expect that Davies will get the nod so the remaining three spots in what I expect will be the Lions first test team are: 11. George North 14. Tommy Bowe 15. Leigh Halfpenny Watch the video below for some examples of what I think we can expect from my predicted Lions back three, and then read how I think the Wallabies can counter these threats on page 2. Pages: 1 2 3
2023-10-30T01:26:58.646260
https://example.com/article/1680
Q: Is the knapsack variant with small profit and unlimited repetition of items NP-hard? Consider the unbounded Knapsack problem where we are given $n$ items of integral weights $w_i$, integral profits $p_i$, and a max weight $W$. The goal is to maximize the total profit $\sum_i x_ip_i$ subject to the total weight $\sum_i w_i x_i$ being at most $W$. Here (in the unbounded variant) each item $i$ can be taken any number of times, so each $x_i$ can take any value in $\mathbb N_0$. In general, this problem is NP-hard, but I am wondering about the restriction to instances with small profits --- where every item profit $p_i$ is $O(n)$. With this restriction, is the unbounded Knapsack problem NP-hard, or is there a poly-time algorithm for it? For comparison, consider the standard Knapsack problem, where each item can be taken at most once, so each $x_i$ is either 0 or 1. This version is NP-hard by reduction from Subset Sum. (That reduction creates profits that are the same as the weights, and both are exponential.) But for instances where each item profit is $O(n)$, the maximum achievable profit $P$ is $O(n^2)$, and there is a standard dynamic-programming algorithm that runs in time polynomial in $n$ and $P$, so the run-time in the case of small profits is polynomial in $n$. In contrast, for the unbounded problem, even with small profits, the maximum achievable profit is not in general polynomial in $n$, so the same approach does not yield a polynomial-time algorithm. A: The problem (unbounded Knapsack with small profits) has a polynomial-time algorithm. Theorem 1. For unbounded Knapsack with integer profits $(p_1,\ldots,p_n)$, there is an algorithm running in time polynomial in $n$ and $\max_i p_i$. Proof. We first observe that the problem reduces in polynomial time to the "flipped" variant, where the profits are given a threshold, rather than the weights: input: weights $w=(w_1,\ldots,w_n)$, positive integer profits $p=(p_1,\ldots, p_n)$, and desired profit $P$ output: the minimum sufficient weight $W^* = \min\big\{ w\cdot x : p\cdot x \ge P,\, x\in\mathbb N_0^n\big\}$. Throughout "$\cdot$" denotes the dot product, $a\cdot b = \sum_{i=1}^n a_i b_i$. Lemma 1. Knapsack with integer profits reduces in time polynomial in $n$ and $\log(\max_i p_i)$ to the "flipped" problem defined above. The proof of Lemma 1 is straightforward. I've appended it at the end. Next we observe that the flipped problem has an algorithm whose run-time is polynomial in $n$ and the profit threshold $P$. Lemma 2. There is an algorithm for the flipped problem that runs in time polynomial in $n$ and $P$. The proof of Lemma 2 is a standard exercise in dynamic programming. I've appended it at the end. The theorem doesn't follow directly, because the desired profit $P$ is not, in general, polynomial in the maximum item profit $\max_i p_i$. Next we develop an algorithm that runs in time polynomial in $n$ and $\max_i p_i$. Fix any instance $(p, w, P)$ of the flipped variant. Let $i^*=\arg\max_i p_i/w_i$ be the item with highest profit-to-weight ratio. The key observation is the following: Lemma 3. There is an optimal solution $x$ with $x_i < p_{i^*}$ for all $i\ne i^*$. Proof. Consider any optimal solution $x$. Suppose $x_i \ge p_{i^*}$ for some $i\ne i^*$. Then replace $p_{i^*}$ copies of item $i$ with $p_i$ copies of item $i^*$. This preserves the total profit, and cannot increase the weight. Repeat as necessary with other items to obtain the claimed solution. $~~\Box$ In the optimal solution $x$ from Lemma 3, the total profit from items other than $i^*$ is at most $\sum_{i\ne i^*} p_{i^*} p_i \le n(\max_i p_i)^2$. That is, the total profit from items other than $i^*$ is polynomial in $n$ and $\max_i p_i$. Intuitively, this means that we can greedily commit to taking most of the profit from $i^*$, and once we do, for the remaining problem (allocating the rest of the profit), the desired profit will be polynomial in $n$ and $\max_i p_i$. So we can solve that remaining problem using the algorithm from Lemma 2. Here are the details. Let optW$(p, w, P)$ denote the minimum weight needed to make profit $P$. Lemma 4. Let $\delta = \max(0,\lceil P/p_{i^*} - \sum_{i\ne i^*} p_i \rceil)$ and $P'= P - \delta p_{i^*}$. Then $$\text{optW}(p, w, P) = \delta w_{i^*} + \text{optW}(p, w, P').$$ Proof. The optimal solution $x$ from Lemma 3 has $x_i < p_i$ for $i\ne i^*$. Since $\sum_i x_i p_i \ge P$, it follows that $x_{i^*}p_{i^*} \ge P - \sum_{i\ne i^*} p_i p_{i^*}$, i.e., $x_{i^*} \ge \lceil P/p_{i^*} - \sum_{i\ne i^*} p_i \rceil = \delta$. So this optimal $x$ must consist of an optimal solution to $(p, w, P')$, plus $\delta$ units added to $x_{i^*}$. $~~~\Box$ (A technical remark to avoid confusion: the solution to $(p, w, P')$ in the proof above can still use item $i^*$. However many copies of $i^*$ it takes, the optimal $x$ will take $\delta$ more.) Lemma 4 gives the desired algorithm: calculate $\delta$, and $P'$ as defined in Lemma 4: $\delta = \max(0,\lceil P/p_{i^*} - \sum_{i\ne i^*} p_i \rceil)$ where $i^* = \arg\max_i p_i/w_i$ $P'= P - \delta p_{i^*}$ return optW$(p, w, P') + \delta w_{i^*}$, where optW$(p, w, P')$ is computed using the algorithm from Lemma 2 Correctness of the algorithm follows from Lemma 4. By inspection and Lemma 2 the run time is polynomial in $n$ and $P'$, with $$\textstyle P' = P-\delta p_{i^*} \le P - (P - \sum_{i\ne i^*} p_i p_{i^*}) = \sum_{i\ne i^*} p_i p_{i^*} \le n(\max_i p_i)^2.$$ So the time is polynomial in $n$ and $\max_i p_i$. $~~~\Box$ Proof of Lemma 1 (reduction to flipped problem). Fix an instance $(p, w, W)$ of Knapsack with integer profits. The optimal solution has profit $P^*$ at most $\lambda^* = p_{i^*} W/w_{i^*}$, because no item has a profit per weight ratio larger than $p_{i^*}/w_{i^*}$. On the other hand, using just item $i^*$, as many items as possible, yields a solution of profit $\lfloor W/w_{i^*}\rfloor p_{i^*} > \lambda^* - p_{i^*}$. So $\lambda^* - p_{i^*} \le P^* \le \lambda^*.$ Use binary search for $P$ in the range $\lambda^* - p_{i^*}$ to $\lambda^*$ (solving the flipped problem $(p, w, P)$ in each iteration) to find the maximum profit $P^*$ such that the minimum required weight to achieve profit $P^*$ is at most $W$. This $P^*$ will be the maximum profit achievable with weight-budget of $W$. The time for this reduction is polynomial in $n$ and $\log(\max_i p_i)$. $~~\Box$ Proof of Lemma 2 (standard dynamic-programming-algorithm for the flipped problem). Fix an input $(p, w, P)$. For $i\in\{0,1,\ldots,n\}$ and $Q\in \{0,1,\ldots, P\}$, define $W(i, Q)$ to be the minimum sufficient weight for the subproblem formed by the first $i$ items and desired profit $Q$. Then $$W(i, Q) = \begin{cases} 0 & \text{if } Q = 0 \\ \infty & \text{if } Q>0, i=0 \\ \min\big\{ x_i w_i + W(i-1, Q-x_i p_i) : x_i\in\mathbb N_0,\, x_i p_i \le Q\big\} & \text{otherwise.} \end{cases}$$ There are $O(n P)$ subproblems, and for each the right-hand side of the recurrence can be evaluated in time $O(P)$, so the dynamic-programming algorithm takes time $O(n P^2)$. $~~~\Box$ EDIT: Looking briefly over the literature, the same idea (but for weights instead of profits) has been used for unbounded Knapsack with small weights. See e.g. Section 8.2.1 of https://doi.org/10.1007/978-3-540-24777-7_8 or Section 10.4 of https://doi.org/10.1007/978-3-540-76796-1_10. I don't know whether it has also been used before for profits.
2024-04-03T01:26:58.646260
https://example.com/article/2252
Background ========== The impact of deinstitutionalization and the development of community treatment programs for people with serious and chronic mental illness have been frequently discussed for the last 40 years \[[@B1],[@B2]\]. The issue regarding the cost-effectiveness for schizophrenics and caregivers has been given significantly more attention \[[@B3]-[@B10]\]. Hence, the costs associated with schizophrenia have become an important issue for Taiwan\'s Bureau of National Health Insurance (BNHI) \[[@B11]\]. The Kao-Ping Branch of the BNHI in Taiwan calculated the annual medical cost of schizophrenia in 2001 as 4.16% of the total medical budget (US\$ 22,928,522/US\$ 551,051,725). Therefore, apart from analyzing the utilization of medical resources among providers, the BNHI has also focused on an evaluation and comparison of medical outcomes. Mental health services in Taiwan are determined partly by the BNHI, which makes overall plans for the national health insurance program, which is a social insurance structure. BNHI utilizes a fee-for-service reimbursement policy. Publicly and privately owned providers of mental healthcare services include general clinics, psychiatric wards of general hospitals, specialized psychiatric hospitals, chronic psychiatric hospitals, psychiatric rehabilitation institutions, day hospital admissions, and home visit services. Treatment plans among different organizations are similar but inconsistent, and lack a complete health network. There were a few patient referrals between organizations. Consequently, patients presented with minor problems at acute care hospitals, thus overcrowding hospitals and compromising the quality of care. Although a registration fee and a co-payment system apply to consultations in general hospitals, medication costs and examination co-payments continue to rise. However, schizophrenia is considered a severe disability under the BNHI guidelines, and patients are entitled to a severe disability card, which allows them to access medical services free of charge at any institution. This system not only increases accessibility to medical services for patients and their families, but also increases the utilization of medical resources. The BNHI has expressed concern over this situation, and has encouraged the establishment of a health network among health service organizations, to provide care to patients in a most cost-effective way. This study was designed to compare the cost-effectiveness of an integrated treatment model consisting of a teaching hospital, psychiatric rehabilitation institutions, a day hospital, community rehabilitation centers, daycare farms, home-based care, and outpatient clinics, with those of the traditional treatment model provided by psychiatric hospitals or general acute care hospitals under the jurisdiction of the Kao-Ping Branch of the BNHI. We determined the differences in psychiatric resource utilization between these two treatment models with distinct management goals. The treatment outcomes of the two service providers were also explored in this study. Methods ======= Participants ------------ The patients of this study were recruited from Southern Taiwan, consisted of 371 persons who randomly selected by Alphabetic order from 1210 schizophrenic patients from the redesigned care network model. The control group consisted of 730 persons randomly selected by Alphabetic order from 18,911 schizophrenic patients who did not fall under the above-mentioned network of treatment organizations. ### A network system of mental health care in the Kao-Ping area A network of mental health services was created by coordinating a general acute care hospital, a day hospital, a psychiatric rehabilitation institution, a community rehabilitation center, home visit providers, a specialized psychiatric hospital, and 10 local clinics. To provide continued care, 1,210 severely schizophrenic patients, or 1/13 of the schizophrenic patients in Kao-Ping county, were assessed and placed in a different mental care facility, based on the clinical pathway of the treatment model operating at the particular health service organization. Patients were referred to appropriate organizations and with flexibility in timing, place, provider, service, and cost principles. Research materials ------------------ ### The Taiwanese concise version of the quality of life questionnaire of the world health organization (WHO-QOL-BREF) The World Health Organization Quality of Life \[[@B12]-[@B14]\] (WHOQOL) is a 100-item generic measure designed for use with individual quality of life and mental health. The Taiwan version of WHOQOL was modified and simplified by Yao \[[@B15]\]. Apart from simplifying and translating the questionnaire into Chinese, culturally relevant additional questions of respect and food aspect were included to form a self-completing questionnaire consisting of 28 questions with a 5-point scale. The questionnaire evaluates the objective quality of life of the participants over the past 2 weeks regarding four main aspects: physiological health, psychological health, social relations, and environmental dimension. Higher scores correspond to a better quality of life. Cronbach\'s Alpha was 0.68 to 0.77 and test-retest reliability was 0.41 to 0.79 \[[@B15]\]. ### Caregiver\'s burden questionnaire This questionnaire consisted of 18 questions to assess the burden of the caregivers. The questionnaire looked at problems and emotions encountered by caregivers during the care of a schizophrenic patient, and included two major categories of objective and subjective burdens. Five subcategories were also examined: There were seven questions on \"family interference,\" a subjective burden; the objective burden included two questions on \"stigmatism,\" two questions on \"guilt,\" three questions on the \"anxiety state of the caregiver,\" and two questions on \"patient dependency.\" The responses are in 5-point Likert-type scale. Each item was scored from 0 (never) to 5 (almost always), and the scores were added up in total to reflect the burden on the caregiver. Higher scores represent heavier burdens \[[@B16],[@B17]\]. Overall, the internal consistency for the questionnaire was 0.88, and for each individual item, 0.65--0.90. The reliability of the questionnaire was 0.90, and the correlation coefficient between each individual item and its subcategory was 0.45 \[[@B16],[@B17]\]. ### Chinese health questionnaire (CHQ) Cheng and Williams developed the CHQ in 1986 \[[@B18]\], with reference to the General Health Questionnaire designed by Goldberg and supplemented by some culturally relevant questions. There are 12 questions with a weighted classification, sensitivity, and specificity of 89%, 70%, and 95%, respectively \[[@B19]\]. This questionnaire is a self-assessed screening instrument used to assess psychiatric morbidity, with a 4-point scale system with options of \"not a bit,\" \"as usual,\" \"slightly more than usual,\" and \"much more than usual.\" The CHQ can be applied effectively in clinical and community settings. Its factor structure consistency is high and Cronbach\'s α coefficient for internal consistency is between 0.83 and 0.92 \[[@B20]\]. This questionnaire is suitable as a screening assessment for the caregiver\'s state of psychological well-being. Data collection --------------- This study was approved by the hospital ethics committee, which serves as the institutional review board. Starting in September 2002, consent forms and a detailed study description were sent to randomly selected patients and their families by the Kao-Ping Branch of the BNHI. Postage-paid return envelopes were enclosed for the convenience of the patients and for data collection. After obtaining consent from patients and their main caregiver to participate in the study, questionnaires were sent to the patients and their families. The questionnaire recorded variables including age, sex, duration of the disease, and quality of life of the patient, and sex, age, marital status, annual income, CHQ score, and burden score of the main caregiver. If for any reason the questionnaires were not completed, a senior and trained interviewer from the Department of Health or this study team would pay a home visit to help subjects complete the questionnaire. Participants were asked to fill up the same questionnaires 6 months later, as well. Statistical analysis -------------------- This study used SPSS statistical software version 10.1 \[[@B21]\] to perform descriptive statistics and exploratory data analyses, to determine whether independent variables were normally distributed. A *t*test was used to compare the results of the patient\'s quality of life, burden on the family and caregivers, and CHQ scores. Results ======= Baseline demographics --------------------- In the first phase of study, there were 257 out of 371 patients turned in their signed consent form. Seventy-six patients refused to participate in the study. Thirty-two patients had an incorrect mailing address. Four patients had passed away, one was in police custody, and one had an amended diagnosis. The control group consisted of 730 people randomly selected by a computer at the BNHI. After two reminder mailings, 241 valid questionnaires returned, 476 patients refused to participate in the study, 11 patients had passed away, one was in police custody, and one had an amended diagnosis. In the second phase, questionnaires were sent only to those who returned a valid questionnaire in the first phase. The study group returned 190 copies of valid questionnaires, 51 patients refused to participate, and 16 with incorrect mailing addresses. The control group returned 133 copies of valid questionnaires, 86 patients refused participation, 21 had an incorrect mailing address, and one patient had died. Within the sampling population, males predominated among those who refused to participate in both groups, in both the first and second phases of the study. With regard to demographic data, seven variables were examined: the patient\'s sex, age, duration of the illness, and the caregiver\'s sex, age, marital status, and annual income. There were no significant differences in the demographic data except that the patients in the control group had a higher average age (*p*= 0.001) and longer duration of the disease (*p*= 0.004) (Table [1](#T1){ref-type="table"}). ###### Demographic data of the two groups of schizophrenic patients and their caregivers **Patient** **Study group (n = 257)** **Controls (n = 241)** **χ^2^** ***p*** ----------------------------- --------------------- --------------------------- ------------------------ -------------- --------- Sex Male 171 146 3.07 0.080 Female 79 94 Data missing 7 7 **Study group** **Controls** ***t*-test** ***p*** Age (years) 39.2 42.8 -3.45 0.001 Duration of disease (years) 13.6 16.1 -2.86 0.004 Hospital admission rate (%) 1.18 10.08 **Caregiver** **Study group (n = 257)** **Controls (n = 247)** ***t*-test** ***p*** Age (years) 56.9 57.5 -0.51 0.61 **Study group** **Controls** **χ^2^** ***p*** Sex Male 122 120 0.28 0.597 Female 132 118 Data missing 3 9 Marital status Married 197 171 6.13 .152 Single 24 24 Others 36 52 Annual income \<US\$ 7500 153 130 7.16 0.061 US\$ 7500--15,000 67 58 US\$ 15,000--22,500 18 27 \>US\$ 22,500 11 20 US\$ 1 = NT\$ 32 Resource utilization -------------------- An analysis of the psychiatric resource utilization for 20,121 schizophrenic patients in this area showed an average cost of US\$ 2083 per patient per year in the Kao-Ping area (data not shown). Frequencies of visits for the two groups are shown in Table [2](#T2){ref-type="table"}. As shown in Table [3](#T3){ref-type="table"}, clinical consultation costs were higher in the control group than in the study group (*p*\< 0.001). In terms of home nursing care, almost every patient in the study group had had home visits by healthcare staff, at an average of 2.9 times per year, which was significantly more than the control group (*p*\< 0.001); these home visits were associated with higher costs in the study group than in the control group (*p*\< 0.001). Regarding the length and number of acute hospital admissions, both were higher in the study group than in the control group (*p*\< 0.001). The average costs per admission were similar between the two groups (*p*= 0.08). The study group had a significantly shorter length of chronic hospital admission (160 days) than the control group (210 days; *p*\< 0.001); the average cost per admission was higher in the control group (*p*\< 0.001), and the number of admissions was higher in the study group (*p*\< 0.001). The average number of days recorded for day admission was similar in both groups (*p*= 0.192), but cost per admission was higher in the study group than in the control group (*p*\< 0.001). In terms of the psychiatric rehabilitation institutions, average cost per admission and number of admissions were both higher in the control group than in the study group (*p*\< 0.001). Total medical expenses per admission at the above-mentioned organizations were US\$ 2319 for the study group and US\$ 1467 for the control group (*p*\< 0.001). Average total medical costs per year were US\$ 2737 for the study group and US\$ 2041 for the control group. Drug costs accounted for 14.6% of the total costs in the study group and 25.9% in the control group. Drug costs for the Kao-Ping area accounted for 25% of the total medical expenses (Table [3](#T3){ref-type="table"}). ###### Frequency of visits for the two groups **Items** **Study group (*N*= 1210)** **Control group (*N*= 18911)** ***t*** ***p*** --------------------------------------------------------------------------------------- ----------------------------- -------------------------------- --------- --------- Frequency of clinic visits (no. of patients involved) 12.4 (1047) 12.2 (13417) 0.795 0.426 Frequency of home-based care (no. of patients involved) 2.9 (1210) 0.4 (14875) 36.22 \<0.001 Community rehabilitation (days) 0.06 1.35 -2.97 0.017 Frequency of community rehabilitation (no. of patients involved) 0.18 (1210) 0.05 (14875) 6.14 \<0.001 Acute hospital admission (in days) 77 64 4.865 \<0.001 Frequency of acute hospital admissions (no. of patients involved) 2.83 (587) 1.4 (3005) 27.15 \<0.001 Chronic hospital admission (in days) 159.6 209.5 -5.39 \<0.001 Frequency of chronic hospital admissions (no. of patients involved) 1.52 (212) 1.32 (2366) 5.08 \<0.001 Day admission center (in days) 141.7 157.4 -1.306 0.192 Frequency of day admission center usage (no. of patients involved) 2.10 (117) 1.21 (565) 12.02 \<0.001 Frequency of psychiatric rehabilitation institution visits (no. of patients involved) 4.92 (72) 7.88 (234) -5.34 \<0.001 ###### Various associated costs for the two groups **Items (US\$)** **Study group (*N*= 1210)** **Control group (*N*= 18911)** ***t*** ***p*** ------------------------------------------------------ ----------------------------- -------------------------------- --------- --------- Clinic-total cost 485 636 -7.06 \<0.001 Clinic-medication cost 244 403 -10.29 \<0.001 Clinic-psychiatric treatment cost 26 28 -1.13 0.258 Home-based care -- total cost 49 11 19.87 \<0.001 Community rehabilitation -- total costs 18 8 3.125 0.002 Acute hospital admission -- total cost 3485 3253 1.74 0.081 Chronic hospital admission -- total cost 3878 5353 -6.622 \<0.001 Day admission center-total costs 2593 3436 -3.389 0.001 Psychiatric rehabilitation institution -- total cost 317 1447 -11.24 \<0.001 Total hospital admission costs 2319 1467 9.382 \<0.001 Total hospital drug costs 166 149 1.424 0.155 Total hospital psychiatric treatment costs 503 169 21.76 \<0.001 Average cost per patient 2737 2041 7.91 \<0.001 Total medical cost 3,314,455 38,593,805 Currency conversion: US\$: NT\$ = 1: 32 The results showed improvements in the patients\' physiological and psychological health, social relations, environment, and quality of life in the study group. However, higher CHQ scores also meant a decline in the health of the caregivers in the study group (*p*\< 0.001). The decrease in the caregiver\'s burden was statistically significant in the study group (*p*\< 0.001). The results are shown in Table [4](#T4){ref-type="table"}. Conversely, physiological (*p*= 0.007) and social relations (*p*= 0.043) have statistically significant decrease in the control group. Although the caregiver\'s burden was not statistically significant in the controls (*p*= 0.882), higher CHQ scores were shown in the 2nd test for the controls (*p*\< 0.001). The results are shown in Table [5](#T5){ref-type="table"}. ###### Comparison between the 1st and 2nd tests for the study group (*N*= 190) **1st test Mean ± SD** **2nd test Mean ± SD** **Comparison** **Correlation** ------------------------------------------- ------------------------ ------------------------ ---------------- ----------------- ------ ------ **Patient quality of life questionnaire**  Physiological health 20.90 ± 4.98 21.08 ± 4.51 -0.39 0.69 0.53 0.47  Psychological health 16.69 ± 4.23 17.27 ± 3.88 -1.47 0.14 0.10 0.16  Social relations 7.42 ± 2.67 7.58 ± 2.77 -0.58 0.56 0.06 0.43  Environment 23.06 ± 5.46 23.89 ± 5.07 -1.58 0.12 0.07 0.37 **Main caregiver**  Burden load 28.11 ± 9.13 24.14 ± 8.77 4.39 0.00\*\* 0.03 0.65  CHQ 14.44 ± 2.57 18.39 ± 5.02 -9.82 0.00\*\* 0.03 0.64 ###### Comparison between the 1st and 2nd tests for the control group (*N*= 133) **1st test Mean ± SD** **2nd test Mean ± SD** **Comparison** **Correlation** ------------------------------------------- ------------------------ ------------------------ ---------------- ----------------- ------- ------ **Patient quality of life questionnaire**  Physiological health 21.44 ± 5.09 19.67 ± 5.64 2.75 0.01\*\* 0.04 0.67  Psychological health 16.99 ± 4.52 16.05 ± 4.89 1.76 0.08 0.13 0.15  Social relations 8.02 ± 2.66 7.39 ± 2.66 2.04 0.04\* 0.14 0.11  Environment 23.67 ± 5.78 22.23 ± 6.65 1.93 0.06 0.04 0.61 **Main caregiver**  Burden load 26.77 ± 9.03 26.57 ± 11.78 0.15 0.88 -0.13 0.13  CHQ 13.87 ± 2.40 17.01 ± 5.43 -5.72 0.00\*\* -0.15 0.09 Comparing outcome variables between the two groups, the results showed that patients in the study group had better physical health outcomes than the control group in the 1st test (*p*= 0.02) and the 2nd test (*p*= 0.01). The psychological health of the study group was better than that of the control group in the 2nd test (*p*= 0.01). The environmental health of the study group was better than that of the control group in the 2nd test (*p*= 0.01); and the total QOL score of the study group was higher than that of the control group in the 2nd test (*p*= 0.01). The burden on caregivers in the study group in the 2nd test was lower than that in the control group (*p*= 0.035). For the CHQ scores of caregivers, the 2nd test of the study group was better than that of the control group (Table [6](#T6){ref-type="table"}). ###### Comparison between the study group and the control group **Study group (N1/N2 = 257/190)** **Control group (N1/N2 = 241/133)** ***t*** ***p*** ------------------------------------------- ----------------------------------- ------------------------------------- --------- --------- **Patient quality of life questionnaire** Physiological health: 1st test 23.10 20.23 -2.23 0.02 2nd test 21.09 19.67 -2.52 0.01 Psychological health: 1st test 17.02 16.36 -1.68 0.11 2nd test 17.27 16.05 -2.51 0.01 Social relations: 1st test 7.36 7.76 1.64 0.88 2nd test 7.58 7.39 -0.61 0.54 Environment: 1st test 23.37 22.93 -0.86 0.39 2nd test 23.89 22.23 -2.55 0.01 Total score: 1st test 81.32 78.93 -1.47 0.14 2nd test 81.75 76.56 -2.55 0.01 **Main caregiver** Burden load: 1st test 27.25 27.76 0.62 0.53 2nd test 24.14 26.57 2.12 0.035 CHQ: 1st test 14.30 14.36 0.27 0.79 2nd test 18.39 17.01 -2.35 0.019 Discussion ========== The community-based network system of the current study provides a full service to help psychiatric patients develop skills for coping with the problem of living in the community and which virtually decreases hospitalization. Different to traditional hospital basis, community-based multidisciplinary teams are not only responsible for individual caseloads (case management) by homecare member, but also provide linking and coordinating services by a network system, that with a variety of community resources. This model shows how patients who would be treated in mental hospital can be successfully treated in the community without shifting the burden of care to their families. Despite the increasing costs of medication reimbursement, and the increased use of the community mobile team and outpatient clinic, the overall costs for the mental health system were substantially reduced. The direct costs of care were found to be much lower than the costs in European countries. Average costs in Taiwan were US\$ 2084 (US\$ 2737 for the study group and US\$ 2041 for the control group individually). Other countries reported the following associated costs: US\$ 2693 in Spain \[[@B22]\], US\$ 15,859 in Mannheim, Germany \[[@B23]\], US\$ 32,003 in West Lambeth, England (which includes informal care costs) \[[@B24]\], US\$ 5678 in Italy \[[@B25]\], and US\$ 7656 in South Verona, Italy \[[@B26]\]. When compared with USA, there is 1.56 times as much cost as that in Taiwan, with adjusted per capita income of the two countries. It shows that the average costs in Taiwan are further less than the costs in USA. In our study, the inpatient costs for the study group were 78% (acute 55.2%, chronic 22.2%) of the total health costs, and 66% (acute 30.17%, chronic 36.2%) for the control group; these costs seemed to dominate the overall service costs. Costs varied from 38% to 93%, and were variable internationally \[[@B27]\]. Drug costs as a percent overall healthcare cost in our study were much higher than the drug costs in other counties. The average drug costs in this study were 25% of total direct healthcare costs, 14.6% in the study group, and 25.9% in the control group, when compared with the cost in other countries, which ranged from 2.3% to 13% \[[@B27]\]. In an extended study of 10,972 cases across more than 10 countries in Europe, most patients were prescribed atypical neuroleptics at their first medical consultation \[[@B22]\]. In all, a variation was found between the two groups in our study, and an evident variation was also found in European countries. Drug costs are expected to be proportionately higher in developing countries, compared with developed countries \[[@B28]\]. Further evaluations are needed regarding the cause of the lower drug costs in the study group, the higher percentage of drug costs in Taiwan, and the percentage of prescriptions of atypical neuroleptics. Many studies have discussed the reasons associated with the costs of schizophrenia. Compatible with previous findings, we found that the average length of stay (77 days) in the study group was longer than in the control group (64 days), and the average age of patients in the study group was 39.2 years, younger than the control group at 42.8 years old. The readmission rate in the acute ward of the study group (2.83 in 1 year) was much higher than in the control group (1.4 in 1 year), which might be why the direct costs of the study group were higher than those of the control group. The high readmission rate might suggest severe mental symptoms, lower GAF scores, higher BPRS scores, and lower income \[[@B29]\]. According to the findings of this study (Tables [1](#T1){ref-type="table"} and [2](#T2){ref-type="table"}), the higher costs of the study group might be due to the clinical differences of the cases. The report by Knapp suggested that some costs were very difficult to determine. Although overall direct and indirect costs in the Knapp report added up to 2.6 billion euros, some indirect impacts were not measured, thus making the estimation of indirect costs a difficult task. According to the report published by the Department of Health, UK \[[@B30]\], the costs for schizophrenia treatment were 5.4% of the total medical budget, and 3% of the total expenditure by the National Health Service \[[@B31]\]. Generally, the direct costs of schizophrenia could be expected to be from 1.5% to 3% of the total national healthcare expenditure \[[@B32]-[@B34]\]. In our study, the higher resource utilization of schizophrenic patients was 4.12% of the total healthcare resources of the Kao-Ping area, which might be due to Taiwan\'s social reform in recent years, in which the policymakers encouraged the development of mental health services that would elevate hospital ranking. With respect to medical outcomes, we found that the following factors are often associated with a lower quality of life: sex (female), multiple episodes of schizophrenic psychosis, longer duration of the disease, and severe psychotic symptoms, such as with patients with higher BPRS scores \[[@B35]\]. One study reported no differences in subgroups in terms of service utilization, quality of life, and the caregiver\'s emotional satisfaction between male and female patients \[[@B36]\]. Many patients in Italy lived at home, with a hospital admission rate of 5.5%. They had a better quality of life when compared with patients in USA (with a hospital admission rate of 21%), because living at home meant greater residential stability, more ownership, and more people contacts \[[@B37]\]. In this study, the poorer quality of life in the control group might be due to longer duration of hospital admissions and less home visiting. According to this study, the mental health provider should set up alternative services for the individual needs of patients and families of different genders, ages, and family incomes. With regard to the families, our previous study revealed that an older age, a shorter duration of the disease, and severe psychotic symptoms were the predictors of a heavier burden on families \[[@B35]\]. In this study, the factors that influenced the caregivers\' burden were the longer duration of the disease and the low income of the caregivers. Further evaluation is needed regarding whether a different case sample, factor of poverty, demographic distribution, or interventions such as a study group, which have a higher service contact rate, would lower the family burden. In another study, psychological health and the burden on families were significantly associated with a shorter duration of the disease, showing that care giving created a burden on the family \[[@B38]\]. In a study by the Connecticut Health Care System of the USA, patients with severe psychotic symptoms, living in the community, and with frequent family contact were correlated to a heavier family burden \[[@B39]\]. Regardless of the type of service the patient received, the acute onset, severe symptoms, and frequent contact with the family were usually associated with a greater burden and mental stress. In the network of services in the study group, the continued follow-up of each patient may have been a better approach to decrease the family burden. Inconsistencies were observed in family burden and CHQ scores, which may be due to the fact that family burden was more related to providing care for the patient, while the psychological health of the family was more related to secular changes. The CHQ scores were influenced by the age of the caregivers: the older they were, the lower the CHQ score (*p*= 0.045, table not shown). Regardless of the type of care system, the caregivers were constantly under enormous psychological stress. As time passed, the CHQ scores of the caregivers increased, especially among the younger caregivers, which should be taken into consideration when using the CHQ as an outcome variable. The outcome variance due to multiple informants, such as that of the CHQ of the caregivers, cannot be ignored. Even self-rated satisfaction reports completed by parents are better predictors of the patient\'s satisfaction, and are more sensitive than changes in the patient\'s psychotic symptoms \[[@B40],[@B41]\]. This indicates that the psychological status of the caregiver and the family should be further investigated when promoting the healthcare management of schizophrenia. Conclusion ========== Indeed, the cost comparison analysis would be more convincing if it was beyond the small number of participants (257 study patients vs. 247 control patients), however, we could only get the costs of two larger populations from the government. This might be a limitation for generalization in this study. In conclusion, we found that the costs of the study group were higher than those of the control group, but the QOL of the study group was higher and the family burden lower than that of the control group. Moreover, most patients of the study group were frequently admitted to a hospital but with decreased length of hospital stay. At a time of scarce medical resources with many countries paying close attention to disease management, the promotion of the community-based treatment model should include the consideration of individual factors such as the patient\'s sex, age, duration of the disease, social functioning, and the family support system. Treatment models should be tailored to individual needs \[[@B42]\]. The findings from studies of these models is an informative reference for future designations of community mental health service programs in Taiwan. Competing interests =================== The author(s) declare that they have no competing interests. Authors\' contributions ======================= Study concept and design: FWL. Acquisition of data: DST, LCL, CUC, CYY, GTL, PP. Analysis and interpretation of data: DST, LCL, CUC, CYY, GTL, PP, FWL. Drafting of the manuscript: DST, FWL. Critical revision of the manuscript for important intellectual content: DST, FWL. Statistical analysis: DST, FWL. Obtained funding: DST, FWL. Administrative, technical, or material support: FWL. Study supervision: FWL; FWL had full access to all the data in the study and takes responsibility for the integrity of the data and the accuracy of the data analysis. All authors read and approved the final manuscript. Pre-publication history ======================= The pre-publication history for this paper can be accessed here: <http://www.biomedcentral.com/1472-6963/7/129/prepub> Acknowledgements ================ This study was supported by a grant (numbers 9309) from the Medical Affairs Bureau, Ministry of National Defense, Taiwan. Also, the authors would like to acknowledge all researchers who assisted in this study.
2024-05-13T01:26:58.646260
https://example.com/article/9378
// // Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 25 2017 03:49:04). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import <objc/NSObject.h> @class NSDictionary, NSString, NSURL; @interface DigiHubEvent : NSObject { BOOL _performAtLogin; int _defaultAction; int _action; unsigned int _appleEventID; NSURL *_app; NSURL *_script; NSString *_event; } + (id)digiHubEvent:(id)arg1 withDictionary:(id)arg2 defaultAction:(int)arg3 appleEventID:(unsigned int)arg4; + (id)digiHubEvent:(id)arg1 defaultAction:(int)arg2 appleEventID:(unsigned int)arg3 performAtLogin:(BOOL)arg4; - (void).cxx_destruct; @property(readonly, nonatomic) BOOL performAtLogin; // @synthesize performAtLogin=_performAtLogin; @property(readonly, nonatomic) unsigned int appleEventID; // @synthesize appleEventID=_appleEventID; @property(readonly, nonatomic) NSString *event; // @synthesize event=_event; @property(nonatomic) int action; // @synthesize action=_action; @property(nonatomic) int defaultAction; // @synthesize defaultAction=_defaultAction; @property(retain, nonatomic) NSURL *script; // @synthesize script=_script; @property(retain, nonatomic) NSURL *app; // @synthesize app=_app; @property(readonly, nonatomic) NSDictionary *dictionary; - (id)initWithEvent:(id)arg1 action:(int)arg2 app:(id)arg3 script:(id)arg4 defaultAction:(int)arg5 appleEventID:(unsigned int)arg6 performAtLogin:(BOOL)arg7; - (id)initWithEvent:(id)arg1 withDictionary:(id)arg2 defaultAction:(int)arg3 appleEventID:(unsigned int)arg4; @end
2023-11-20T01:26:58.646260
https://example.com/article/4255
Omni Directional Multimaterial Soft Cylindrical Actuator and Its Application as a Steerable Catheter. Soft actuators with complex range of motion lead to strong interest in applying devices like biomedical catheters and steerable soft pipe inspectors. To facilitate the use of soft actuators in devices where controlled, complex, precise, and fast motion is required, a structurally controlled Omni directional soft cylindrical actuator is fabricated in a modular way using multilayer composite of polylactic acid based conductive Graphene, shape memory polymer, shape memory alloy, and polyurethane. Multiple fabrication techniques are discussed step by step that mainly include fused deposition modeling based 3D printing, dip coating, and UV curing. A mathematical control model is used to generate patterned electrical signals for the Omni directional deformations. Characterizations like structural control, bending, recovery, path, and thermal effect are carried out with and without load (10 g) to verify the new cylindrical design concept. Finally, the application of Omni directional actuator as a steerable catheter is explored by fabricating a scaled version of carotid artery through 3D printing using a semitransparent material.
2023-10-23T01:26:58.646260
https://example.com/article/1294
# textdomain: default Locked Chest=已上锁的箱子 Locked Chest (owned by @1)=已上锁的箱子(属于@1所有) You do not own this chest.=这个箱子不属于你所有。 a locked chest=一个已上锁的箱子 Chest=箱子 Stick=棒 Paper=纸 "@1" by @2="@1" by @2 Book=书 Book with Text=带文字的书 Skeleton Key=万能钥匙 Key to @1's @2=@1的@2的钥匙 Coal Lump=煤块 Iron Lump=铁块 Copper Lump=铜块 Tin Lump=锡块 Mese Crystal=黄石晶体 Gold Lump=金块 Diamond=钻石 Clay Lump=粘土块 Steel Ingot=铁锭 Copper Ingot=铜锭 Tin Ingot=锡锭 Bronze Ingot=青铜锭 Gold Ingot=金锭 Mese Crystal Fragment=黄石晶体碎片 Clay Brick=粘土砖 Obsidian Shard=黑曜石碎片 Flint=燧石 Blueberries=蓝莓 Furnace is empty=熔炉是空的 100% (output full)=100%(输出已满) @1%=@1% Empty=空 Not cookable=不可烹饪 Furnace active=熔炉正在运转 Furnace inactive=熔炉未使用 (Item: @1; Fuel: @2)=(项目:@1;燃料:@2) Furnace=熔炉 Stone=石 Cobblestone=鹅卵石 Stone Brick=石砖 Stone Block=石方块 Mossy Cobblestone=苔藓覆盖的鹅卵石 Desert Stone=沙漠石 Desert Cobblestone=沙漠鹅卵石 Desert Stone Brick=沙漠鹅卵石砖 Desert Stone Block=沙漠鹅卵石方块 Sandstone=砂岩 Sandstone Brick=砂岩砖 Sandstone Block=砂岩方块 Desert Sandstone=沙漠砂岩 Desert Sandstone Brick=沙漠砂岩砖 Desert Sandstone Block=沙漠砂岩方块 Silver Sandstone=银砂岩 Silver Sandstone Brick=银砂岩砖 Silver Sandstone Block=银砂岩方块 Obsidian=黑曜石 Obsidian Brick=黑曜石砖 Obsidian Block=黑曜石方块 Dirt=土方块 Dirt with Grass=草方块 Dirt with Grass and Footsteps=草方块及脚印 Dirt with Dry Grass=干草土方块 Dirt with Snow=雪土方块 Dirt with Rainforest Litter=雨林腐土 Dirt with Coniferous Litter=针叶林腐土 Savanna Dirt=草原土 Dirt with Savanna Grass=草原草方块 Savanna Dirt with Savanna Grass=草原草方块(草原土) Permafrost=多年冻土 Permafrost with Stones=带石头的多年冻土 Permafrost with Moss=生苔的多年冻土 Sand=沙 Desert Sand=沙漠沙 Silver Sand=银沙 Gravel=沙砾 Clay=粘土 Snow=雪 Snow Block=雪方块 Ice=冰 Cave Ice=洞穴冰 Apple Tree=苹果树 Apple Wood Planks=苹果树木板 Apple Tree Sapling=苹果树苗 Apple Tree Leaves=苹果树叶 Apple=苹果 Apple Marker=苹果标记 Jungle Tree=丛林树 Jungle Wood Planks=丛林树木板 Jungle Tree Leaves=丛林树叶 Jungle Tree Sapling=丛林树苗 Emergent Jungle Tree Sapling=应急丛林树苗 Pine Tree=松树 Pine Wood Planks=松树木板 Pine Needles=松针 Pine Tree Sapling=松树树苗 Acacia Tree=相思树 Acacia Wood Planks=相思树木板 Acacia Tree Leaves=相思树叶 Acacia Tree Sapling=相思树树苗 Aspen Tree=白杨树 Aspen Wood Planks=白杨树木板 Aspen Tree Leaves=白杨树叶 Aspen Tree Sapling=白杨树树苗 Coal Ore=煤炭矿石 Coal Block=煤炭方块 Iron Ore=铁矿石 Steel Block=钢方块 Copper Ore=铜矿石 Copper Block=铜方块 Tin Ore=锡矿石 Tin Block=锡方块 Bronze Block=青铜方块 Mese Ore=黄石矿石 Mese Block=黄石方块 Gold Ore=金矿石 Gold Block=金方块 Diamond Ore=钻石矿石 Diamond Block=钻石方块 Cactus=仙人掌 Large Cactus Seedling=大仙人掌苗 Papyrus=莎草纸 Dry Shrub=干灌木 Jungle Grass=丛林草 Grass=草 Dry Grass=干草 Fern=蕨 Marram Grass=滨草 Bush Stem=灌木 Bush Leaves=灌木叶 Bush Sapling=灌木苗 Blueberry Bush Leaves with Berries=蓝莓灌木叶与浆果 Blueberry Bush Leaves=蓝莓灌木叶 Blueberry Bush Sapling=蓝莓灌木苗 Acacia Bush Stem=相思灌木 Acacia Bush Leaves=相思灌木叶 Acacia Bush Sapling=相思灌木苗 Pine Bush Stem=松树灌木 Pine Bush Needles=松树灌木针 Pine Bush Sapling=松树灌木苗 Kelp=海带 Green Coral=绿珊瑚 Pink Coral=淡红珊瑚 Cyan Coral=青珊瑚 Brown Coral=棕珊瑚 Orange Coral=橙珊瑚 Coral Skeleton=珊瑚骨架 Water Source=水方块 Flowing Water=流动的水 River Water Source=河水方块 Flowing River Water=流动的河水 Lava Source=岩浆方块 Flowing Lava=流动的岩浆 Empty Bookshelf=空书架 Bookshelf (@1 written, @2 empty books)=书架(@1本有字的书,@2本空书) Bookshelf=书架 Text too long=文字太长 Wooden Sign=木牌 Steel Sign=铁牌 Wooden Ladder=木梯子 Steel Ladder=铁梯子 Apple Wood Fence=苹果木栅栏 Acacia Wood Fence=相思木栅栏 Jungle Wood Fence=丛林木栅栏 Pine Wood Fence=松木栅栏 Aspen Wood Fence=白杨木栅栏 Apple Wood Fence Rail=苹果木栏杆 Acacia Wood Fence Rail=相思木栏杆 Jungle Wood Fence Rail=丛林木栏杆 Pine Wood Fence Rail=松木栏杆 Aspen Wood Fence Rail=白杨木栏杆 Glass=玻璃 Obsidian Glass=黑曜石玻璃 Brick Block=砖方块 Mese Lamp=黄石灯 Apple Wood Mese Post Light=苹果木黄石灯柱 Acacia Wood Mese Post Light=金合欢木黄石灯柱 Aspen Wood Mese Post Light=白杨木黄石灯柱 Jungle Wood Mese Post Light=丛林木黄石灯柱 Pine Wood Mese Post Light=松木黄石灯柱 Cloud=云 Wooden Pickaxe=木镐 Stone Pickaxe=石镐 Bronze Pickaxe=青铜镐 Steel Pickaxe=铁镐 Mese Pickaxe=黄石镐 Diamond Pickaxe=钻石镐 Wooden Shovel=木铲 Stone Shovel=石铲 Bronze Shovel=青铜铲 Steel Shovel=铁铲 Mese Shovel=黄石铲 Diamond Shovel=钻石铲 Wooden Axe=木斧 Stone Axe=石斧 Bronze Axe=青铜斧 Steel Axe=铁斧 Mese Axe=黄石斧 Diamond Axe=钻石斧 Wooden Sword=木剑 Stone Sword=石剑 Bronze Sword=青铜剑 Steel Sword=铁剑 Mese Sword=黄石剑 Diamond Sword=钻石剑 Key=钥匙 Torch=火把 @1 will intersect protection on growth.=@1将与增长的保护相交。 Title:=标题: Contents:=内容: Save=保存 by @1=由@1 Page @1 of @2=第@1页,共@2页。 "@1"="@1"
2024-03-19T01:26:58.646260
https://example.com/article/4317
The paper provides brief list of changes in rental and ownership housingsector during the transition in the Czech Republic. The complete analysisof housing expenditures of all Czech households as well as analysis of housingexpenditures of different social categories of households... The Sociological Library is a modern specialised library, which is intended to serve the needs of researchers, students, and the wider academic community. Library collection contains just about 25 thousand volumes. All items are available for use in the library study hall and abo... The chapter describes a proposal for implementation of social and guaranteed housing in the Czech Republic. Target groups of households are defined. Although they are generally eligible for housing allowances, due to discrimination on the Czech housing market they face social and... The volume contains papers presented at the international Czecho-Slovak Sociology Days, a conference held 10-12 May 2004 in Prague and jointly organised by the Institute of Sociology of the Academy of Sciences of the Czech Republic, the Institute of Sociology of the Slovak Academ... To reflect and critically respond on the processes of financialization of housing across European countries the Institute of Sociology of the Czech Academy of Sciences and Housing and Family Dynamics Working Group under European Network for Housing Research (ENHR) invite early-ca... To reflect and critically respond on the processes of financialization of housing across European countries the Institute of Sociology of the Czech Academy of Sciences and Housing and Family Dynamics Working Group under European Network for Housing Research (ENHR) invite early-ca... This paper describes changes in the housing market after the collapse of communism in Central Europe and analyses the current functions and perceptions of the private rental housing in the Czech Republic. It aims to understand why private rental housing is perceived as a sub-opti... The policy paper offers theoretical framework of the relations between housing and population policy and reviews current housing policies accross european countries. The paper focuses predominanty on the rental housing sector and on young families searching for housing. The autho... This five year project will examine the Czech Society using a household panel survey research design. This study will focus on five themes: Family life, health, time use and income management; Education and the labour market; Social stratification; Housing choices and inequalitie...
2024-01-06T01:26:58.646260
https://example.com/article/9543
fluffy - 2010-09-26 I once had a roommate who thought it was perfectly okay to lick off the tip of a condiment bottle. He did this at home, which was bad enough, but he also did it at fast food restaurants. Ever since then I've always had a hard time using condiments at fast food restaurants which use condiment bottles instead of disposable packets or self-serve pumps with cups or whatever, because now I assume that lots of people do this shit. Anyway, stars are for this woman's party description reminding me of this thing that I have never been able to scrub from my memory. SolRo - 2010-09-26 I spit on fresh chips, but I do not double dip, that would be discusting
2023-08-26T01:26:58.646260
https://example.com/article/1048
Q: How to make a ProgressBar not indeterminate in Android I'm creating this ProgressBar, and I want it to show progress. It's really simple, it is just a percentage of 5000ms. My problem is whatever I try, the ProgressBar stays indeterminate (cyclic). Could anyone help me on this? Thanks. A: Use This ProgressDialog progressDialog=new ProgressDialog(this); progressDialog.setProgressStyle(ProgressDialog.STYLE_HORIZONTAL); progressDialog.setMessage("Loading...."); progressDialog.setTitle("Please Wait"); progressDialog.show(); To show Progress, here p is an int value progressDialog.setProgress(p) To cancel load progressDialog.cancel(); if You donot want hte title of Dialog progressDialog.requestWindowFeature(Window.FEATURE_NO_TITLE);
2023-12-13T01:26:58.646260
https://example.com/article/8219
This invention relates to a method and an apparatus for handling high pressure material, particularly to a method for reducing pressure of a high-pressure solids-gas mixture and for separating the solids from the solids-gas mixture in a vessel. The vessel is in communication with a reactor that is operated under a pressure of at least about 2 bars, and serves to maintain desired reactions, such as the combustion or gasification of fuel. The vessel serves to remove ash or other particulate material from the reactor. The term "solids", as used in the specification and claims, refers to all residues known to a person skilled in the art that may be obtained from reactions taking place in pressurized reactors, such as circulating fluidized bed reactors. A known method for reducing the pressure of gas-solids mixtures is disclosed in Knowlton, T. M.; Findlay, J. G.; and Chan, I., "Continuous Depressurization of Solids Using a Restricted Pipe Discharge System", Presented at the 1989 AIChe Annual Meeting, San Francisco, Calif., Nov. 5-10, 1989. In this reference, a method for de-pressurizing a gas-solids mixture by using a Restricted Pipe Discharge System ("RPDS") is disclosed. In the RPDS, solids are discharged in moving packed-bed flow from higher pressure to lower pressure through a pipe restricted at its outlet, while the gas is forced to flow through the packed bed of solids, thus causing de-pressurizing. In U.S. Pat. Nos. 2,684,868, 2,684,870, 2,684,872, and 2,684,873 methods for conveying or transporting of granular solids, which can be used in the RPDS, are disclosed in more detail. Typically, the main set of components of the RPDS are depressurizing piping ("transporting pipe"), a de-entrainment vessel wherein a packed bed of solid material is maintained for acting as a solids flow restriction at the end of the transporting pipe, and means for controlling the flow of the solids from the de-entrainment vessel. An RPDS may be successfully utilized, for example, in connection with Pressurized Fluidized Bed reactors such as Pressurized Fluidized Bed Combustors or Gasifiers and processes executed therein. For example, in a system where a Pressurized Fluidized Bed Gasifier, which provides a partial gasification of fuel, is connected to a Fluidized Bed Combustor for oxidizing the residue char from the gasification, and in a transportation system for conveying the solids resulting from a partial gasification, such as char, to the final combustion, the RPDS may be successfully employed. Any corresponding processes can be equipped with an RPDS as well. In such systems, the reactions take place at elevated pressure, e.g., 2-20 bar, and at elevated temperature, preferably about 1200.degree. C., and residues are produced which should be subjected to further processing at lower pressure. The solids discharged from a Pressurized Fluidized Bed reactor may be introduced to the RPDS either with or without first cooling the solids. If cooling is utilized, the temperature of the solids may be lowered even to about 300.degree. C. temperature if the temperature of the solids-gas stream prior to introduction into the de-entrainment vessel is about 300.degree.-1200.degree. C. (e.g., about 300.degree.-799.degree. C.); otherwise, the temperature is still reduced to below that of the reactor, e.g., to about 800.degree.-1200.degree. C. In the prior art, a necessary feature of the RPDS system, in order to achieve continuous movement of the solids with a simultaneous pressure drop of the gas, is to cause the gas to flow faster than the solids in the piping. Under these circumstances, the RPDS usually smoothly and reliably de-pressurizes the solids. It also has some advantages over a lockhopper as a depressurization device (e.g., the flow of the solids is continuous, and valve maintenance time and costs are decreased). However, if, e.g., the gas flow rate is increased to too great an extent, the whole de-pressurizing process is handicapped due to the fluidization of the solids in the de-entrainment vessel. The fluidization of the solids is detrimental to the function of the device since restriction to solids flow is destroyed, and the flow of the solids becomes uncontrollable. Therefore, it is very important to guard against fluidization of solids, to guarantee the smooth running of the entire process.
2024-04-04T01:26:58.646260
https://example.com/article/1420
INTRODUCTION ============ The Neuroform EZ stent system may represent a good option for internal cerebral artery (ICA) sidewall aneurysms due to its good conformation to the vessel curvature, which results in delayed lower thromboembolism.[@B2][@B3] However, in real practice, the jailing technique using the Neuroform EZ stent system suffers a critical problem related to interference between the two microcatheters used for ICA sidewall aneurysms. In this scenario, the microcatheter that is inserted into the cerebral aneurysm is dislodged from its previous position by the transfer catheter used with the Renegade Hi-Flo microcatheter (Stryker Neurovascular, Watertown, MA, USA), which is positioned for stent deployment during advancement of the Neuroform EZ stent system. Such interference between microcatheters is common (28.6%) and results in the failure of the procedure or the requirement for additional steps to correct this problem.[@B7] In our series, the degree of interference between the two microcatheters was significantly different according to the tortuosity of the vessels and the Renegade Hi-Flo microcatheter itself. Recently, stainless steel braided microcatheters, such as the Excelsior XT-27 (Stryker Neurovascular, Fremont, CA, USA) and the Rebar 27 (ev3 Covidien, Irvine, CA, USA) have been widely used to increase the success rate and reduce the interference between two microcatheters, including the Renegade Hi-Flo microcatheter. We hypothesized that there would be no difference in interference between the two microcatheters according to the deliveries of each microcatheter. In this study, we compared the differences in interference and evaluated the influential factors between the two microcatheters according to each delivery microcatheter. MATERIAL AND METHODS ==================== Between June 2011 and September 2013, the jailing technique with the Neuroform stent was applied to 94 patients with 94 ICA sidewall aneurysms (n = 71, female; segment of paraclinoid; n = 78, segment of posterior communicating artery; n = 16) ([Table 1](#T1){ref-type="table"}). The median age was 56.0 years (mean ± standard deviation, 56.5 ± 1.1 years; range, 31-83 years). From June 2011 to December 2011, the Neuroform EZ stent system using the Renegade Hi-Flo microcatheter as the delivery catheter was applied to 22 ICA sidewall aneurysms. From May 2012 to September 2013, the Rebar 27 or XT-27 microcatheters were used as the delivery catheters for 72 ICA sidewall aneurysms (Rebar 27 microcatheter, n = 35; XT-27 microcatheter, n = 37). The aneurysms treated with the Neuroform EZ stent system were paraclinoid aneurysms (n = 78) and aneurysms in the posterior communicating artery segment (n = 16). Without developing an initial plan for the coil embolization, such as the single-catheter technique or stent-assisted coiling, we administered aspirin (300 mg) and clopidogrel (300 mg) to the patients with unruptured cerebral aneurysms for at least 3 hours before the procedure and administered the same to patients with ruptured cerebral aneurysms immediately after the stent-assisted coiling procedure via a nasogastric tube. Anticoagulation was initiated by the injection of a bolus of 3,000 IU heparin (Green Corss Corp., Yongin, Korea) that was intravenously administered immediately after femoral puncture, followed by an hourly intermittent bolus injection of 1,000 IU heparin. Coil embolization was performed through a single femoral access in all cases with a 7F Guider guiding catheter (Boston Scientific, Natick, MA, USA). Typically, a partial coil packing of an an aneurysm was performed to reduce the risk of an unexpected rupture of an aneurysm due to interference between the two microcatheters prior to the advancement of the Neuroform EZ stent delivery system into the delivery microcatheter (e.g., the Renegade Hi-Flo or Rebar or XT-27 microcatheter). Interference between the two microcatheters was defined as the phenomenon in which the microcatheter that was inserted into the cerebral aneurysm was dislodged from its previous position by another microcatheter that was positioned for stent deployment during any step of the jailing technique. The carotid siphon angle was arbitrarily defined as the angle between the supraclinoid segment of the internal carotid artery and the anterior vertical or horizontal segment of the cavernous internal carotid artery. The statistical analyses were performed to evaluate factors that could affect the interference between the two microcatheters. The nominal data were analyzed using the χ^2^ or Fisher\'s exact tests, and the numerical data were examined with Student\'s *t*-test or the Mann-Whitney *U* test as appropriate. A two-tailed *p* \< 0.05 was defined as statistically significant. The influential factors regarding the interference between the two microcatheters were analyzed using multivariate logistic regression. RESULTS ======= In the renegade Hi-Flo microcatheter group, we found that the jailing technique using the Neuroform EZ stent system was successful in 19/22 cerebral aneurysms (86.4%); however, the Renegade Hi-Flo microcatheter was well positioned in all of the lesions. The failure of the jailing technique using the Neuroform EZ stent system was evident in 3 lesions during the following steps of the procedure: 1) the Neuroform EZ stent delivery system failed to advance into the positioned Renegade Hi-Flo microcatheter; 2) the Excelsior SL-10 microcatheter, which had been navigated into the cerebral aneurysm, was dislodged from the cerebral aneurysm by the advancement of the Neuroform EZ stent system into the Renegade Hi-Flo microcatheter; and 3) the Excelsior SL-10 microcatheter failed to be navigated into the cerebral aneurysm after the Renegade H-Flo microcatheter had been positioned distal to the aneurysm. In the Rebar 27 and XT-27 microcatheter group, the jailing technique using the Neuroform EZ stent system was successful in 71 cerebral aneurysms and failed in 1 (1.4%). The failure of the jailing technique was due to dislodgement of the microcatheters from the aneurysm sacs after the deployment of Neuroform stents without interference between the two microcatheters. This factor was likely responsible for the unstable microcatheter positioning into the aneurysm. In the Renegade Hi-Flo microcatheter group, interference between the two microcatheters occurred in 6 of the 21 cerebral aneurysms (28.6%). One lesion, into which a microcatheter was not inserted, was excluded. In all of these cases, the interference developed during the step in which the Neuroform EZ stent delivery system was advanced into the Renegade Hi-Flo microcatheter, regardless of which jailing technique was used. In the Rebar 27 and XT-27 microcatheter group, there was no interference between the two microcatheters with the exception of one lesion. In this case, interference between two microcatheters developed during the step in which the Neuroform EZ stent system was advanced into the XT-27 microcatheter. In the Renegade Hi-Flo microcatheter group, procedural aneurysm rupture developed into two lesions (9.1%) that were stopped by further packing the coils. No other procedural complications, including thromboembolism, were observed. Our procedural morbidity and mortality rates were 9.1% and 0%, respectively. The procedural morbidity resulted in neurological deficits at discharge in none of the cases. In the Rebar 27 and XT-27 microcatheter group, the procedural morbidity, and mortality rates were 0% and 0%, respectively. There were no significant differences in the demographic or aneurysmal characteristics between the Renegade Hi-Flo and the Rebar 27 or XT-27 microcatheter group, except the aneurysm width. In the univariate analysis, there were statistically significant differences in the interference between the two microcatheter groups according to the carotid siphon angle (*p*-value: 0.002) and the delivery microcatheters (*p*-value \< 0.000) ([Table 2](#T2){ref-type="table"}). In the multiple logistic regression analysis, the stainless steel braided delivery microcatheter (odds ratio \[OR\] \[95% confidence interval (CI)\]; 31.277 \[3.138-311.729\], *p*-value: 0.003) and carotid siphon angle (OR \[95%CI\]; 0.959 \[0.922-0.997\], *p*-value: 0.035) were found to be influencing factors in the interference between the two microcatheters ([Table 3](#T3){ref-type="table"}). DISCUSSION ========== The use of the Neuroform EZ stent system should be technically feasible for general use in the jailing treatment for ICA sidewall aneurysms despite the open cell stent system of the Neuroform EZ stent, which can result in reduced delays in thromboembolic complications compared to closed cell stent systems, such as the Enterprise stent system.[@B5] The technical feasibility of stent systems can be evaluated according to the ease of navigating the delivery microcatheter for stent deployment and the lack of interference between the two microcatheters during stent deployment.[@B6] Our previous study showed that the jailing technique using the Neuroform EZ stent system was difficult to apply, particularly to cerebral aneurysms with acute carotid siphon angles.[@B7] The failure of the jailing technique using the Neuroform EZ stent system was attributed to the interference between the two microcatheters; the factors that influenced this interference were the Renegade microcatheter itself and the carotid siphon angle.[@B1] The microcatheter is a technical factor that can be modified, whereas the carotid siphon angle is an anatomical factor that cannot be modified. Based on our results, we suggest that stainless steel braided microcatheters, such as the Rebar 27 and XT-27 microcatheter, may be more technically feasible than the Renegade Hi-Flo microcatheter. In the Renegade Hi-Flo microcatheter group, the failure rate of the jailing technique was 13.6%, and the rate of interference between the two catheters was 28.6%. However, in the Rebar 27 and XT-27 microcatheter groups, the failure rate of the jailing technique and the rate of interference between the two microcatheters were 1.4% and 1.4%, respectively. However, there were no procedural morbidities or mortalities in the Rebar 27 and XT-27 microcatheter group. Therefore, the jailing technique with the Neuroform EZ stent system using the Rebar 27 or XT-27 microcatheter as a delivery catheter is more technically feasible and safe than with the use of the Renegade Hi-Flo microcatheter. Additionally, the procedural feasibility and safety of the Neuroform EZ stent system using the Rebar or XT-27 microcatheter was not lower than those of the closed cell stent systems, such as the Enterprise stent.[@B1][@B4] In the multiple logistic regression analysis, the stainless steel braided delivery microcatheter (OR \[95%CI\]; 31.277 \[3.138-311.729\], *p*-value: 0.003) and carotid siphon angle (OR \[95%CI\]; 0.959 \[0.922-0.997\], *p*-value: 0.035) were found to be influential in the interference between the two microcatheters. Based on the ORs of the microcatheter and carotid siphon angle, the microcatheter exerts a stronger influence on the interference between the two microcatheters. Because the braided characteristics of the delivery microcatheters are different, the Rebar 27 and XT-27 microcatheters, which are stainless steel and braided, may likely be more resistant to the crumpling of the inner lumen according to angulation than the Renegade Hi-Flo microcatheter, which is fiber braided. And then, the XT-27 microcatheter has a more supportive double helix winding reinforcement compared to the Renegade Hi-Flo microcatheter. This characteristic of the Rebar microcatheter and the XT-27 microcatheter results in less interference between the two microcatheters than with the Renegade microcatheter. CONCLUSION ========== The jailing technique with the Neuroform EZ stent system using a Rebar 27 or XT-27 microcatheter may be safer and more feasible than that with the Renegade Hi-Flo microcatheter and may exhibit less interference phenomenon two microcatheters when applied to ICA sidewall aneurysms. **Disclosure:** The authors report no conflict of interest concerning the materials or methods used in this study or the findings specified in this paper. ###### Comparison of the demographic and aneurysmal characteristics of the Renegade Hi-Flo microcatheter (n = 22) and Rebar 27 or XT 27 microcatheter (n = 72) groups ![](jcen-18-363-i001) Renegade Hi-Flo microcatheter Rebar 27 or XT 27 microcatheter *p*-value ------------------------- ------------------------------- --------------------------------- ----------- Gender 0.537  Male 5 18  Female 17 54 Age (years) 56.7 ± 8.8 56.5 ± 11.1 0.949 Aneurysm location 0.547  Paraclinoid segment 18 60  p-com segment 4 12 Carotid siphon angle 75.8 ± 30.0 84.3 ± 30.0 0.223 Aneurysm height (mm) 3.6 ± 1.3 3.7 ± 1.7 0.667 Aneurysm neck size (mm) 3.2 ± 0.8 3.7 ± 1.6 0.179 Aneurysm width (mm) 3.6 ± 1.1 4.5 ± 2.3 0.015 Values are presented as number or mean ± standard deviation ###### Univariate analysis of the factors influencing the interference between the two microcatheters during the jailing technique using the Neuroform EZ stent system ![](jcen-18-363-i002) Presence of interference Absence of interference *p*-value ---------------------- -------------------------- ------------------------- ----------- Carotid siphon angle 51.2 ± 27.6 85.4 ± 27.0 0.002 Delivery catheter 0.000  Renegade Hi-Flo 6 15  Rebar 27 or XT 27 1 71 Age of patients 0.707  \> 60 years 2 32  ≤ 60 years 5 53 Values are presented as number or mean ± standard deviation ###### Multiple logistic regression analysis of the factors influencing the interference between the two microcatheters during the jailing technique using the Neuroform EZ stent system ![](jcen-18-363-i003) Factors Adjusted OR Adjusted 95% CI *p*-value --------------------------------- ------------- ----------------- ----------- Carotid siphon angle 0.959 0.922-0.997 0.035 Rebar 27 or XT 27 microcatheter 32.277 3.138-311.729 0.003 OR = odds ratio; CI = confidence interval
2023-11-14T01:26:58.646260
https://example.com/article/2543
Q: Starting tensor indices at 0 Some time ago I wrote a package for tensor calculus in General Relativity. In order to make it easily accessible for others it should be slightly modified. There are functions like i.e. Christoffel for calculation of Christoffel symbol : Christoffel[g_, xx_] := Block[{ig, res, n}, n = 4; ig = Simplify[Inverse[g]]; res = Table[(1/2)*Sum[ig[[i,s]]*(-D[g[[j,k]], xx[[s]]] + D[g[[j,s]], xx[[k]]] + D[g[[s,k]], xx[[j]]]), {s, 1, n}], {i, 1, n}, {j, 1, n}, {k, 1, n}]; res ] where g and xx are metric tensor and coordinates respectively, which I define in a Mathematica session after uploading the package in a straightforward way putting for example an ansatz for a static spherically symmetric spacetime : This way involves drawbacks since index ranges are {1, 2, 3, 4} while the common practice in relativistic physics suggests to put {0, 1, 2, 3} where 0 stands for timelike coordinate, and {1, 2, 3} stand for spacelike ones. To ilustrate the problem let's define a table where indices start from 0 , i.e. V = Table[i - j, {i, 0, 3}, {j, 0, 3}] {{0, -1, -2, -3}, {1, 0, -1, -2}, {2, 1, 0, -1}, {3, 2, 1, 0}} but when I evaluate V[[0, 0]] I get Symbol - the head of V, while for V[[1, 2]] I get -1 as it should be. My questions are : How could I redefine V in order be able to evaluate "table" component [0, 0] ? What would be the most convenient way to introduce matrix g with its indices starting at 0? Since I have to give up using Part to access tensor components 0,0 how to introduce in a package a freedom of choice of index ranges of other objects like Christoffel (let's say by default index ranges - {0, 1, 2, 3} or if one prefers - {1, 2, 3, 4}) ? Although these questions seem trivial at first sight but any comprehensive answers are welcome. Anyone using a package shouldn't bother his head about Mathematica subtleties. A: It is not my intention to be trivial or flippant about your concern, however I am having some trouble understanding the significance of your dilemma. Mathematica, or more specifically Part indexes from one, and that is simply the way it is. I am tempted to say use e.g. V[[n+1]] but I have to suppose you have already considered this. Index 0 is reserved for the head of the expression. While it is far from standard, the flexibility of Mathematica syntax actually allows for this construct: V = 0[-1, -2, -3][{1, 0, -1, -2}, {2, 1, 0, -1}, {3, 2, 1, 0}]; V[[0,2]] -2 This works because the heads themselves contains your data. This is not advisable, but presented for academic interest. In specific answer to your first question, and for explanation of the trick above, you must be familiar with Mathematica heads. Every expression conceptually has a head. In the expression a + b the head is Plus. In {1, 2, 3} it is List. You can see these written out by using FullForm. Other types also have conceptual heads, even if they are not explicit in FullForm. You can determine these using Head. For example: Head /@ {"abc", 1, Pi, 3.14, 1/2} {String, Integer, Symbol, Real, Rational} The Part syntax [[0, 0]] asks for the head of the head. In the case of your array, which is a list of lists, the head is List, and the head of List itself is Symbol, which defines its type. In reply to your second question, I would define a new Part function that indexes from zero. myPart[x_, spec__] := Part[x, ##] & @@ ({spec} /. n_Integer :> n + 1) V = {{1, 2, 3}, {4, 5, 6}, {7, 8, 9}}; myPart[V, 0, 0] 1 This also works with Span: myPart[V, All, 0 ;; 1] {{1, 2}, {4, 5}, {7, 8}} A: (1) Mathematica list indexing, via Part ( [[]] in more common notation) starts at 1. The 0 part is the head of the expression. (2) Can define a "function" that takes the indices you want and adds 1 to each. xx = {t, x, \[Theta], \[Phi]}; g = {{-E^(2*\[Nu][x]), 0, 0, 0}, {0, E^(2*\[Lambda][x]), 0, 0}, {0, 0, x^2, 0}, {0, 0, 0, x^2*Sin[\[Theta]]^2}}; gg[indices___] := g[[Sequence @@ ({indices} + 1)]] Examples: In[121]:= gg[0] Out[121]= {-E^(2*\[Nu][x]), 0, 0, 0} In[123]:= gg[2, 2] Out[123]= x^2 (3) See (2) for a possible approach. See (1) to understand that Part is NOT the direct way to go. Daniel Lichtblau
2024-05-09T01:26:58.646260
https://example.com/article/3441
Originally from the Thousand Islands region of New York. I relocated to Texas via the U.S. Air Force in 1988. I spent the first 15 years in Austin, prior to attending law school at St. Mary's school of law. Once licensed, I relocated to San Antonio. I am licensed by the Texas Racing Commission to hold a Trainer & Owner's license. I provide bankruptcy solutions for consumers and business primarily in the greater Houston area but also in other parts of Texas and the rest of the United States. I also represent clients nationwide in federal appeals. Benjamin always had a deep desire to understand how things work and to help others. After gaining an understanding of the law through school, and an even more refined understanding through practice in and out of the courtroom for five years with matters relating to real estate, probate, and business, Benjamin is now able to help clients solve their legal challenges when it comes to taking care of a deceased loved one's estate, achieving their real estate goals, and bringing about business objectives. Terry Garrett advises people in Central Texas who are preparing for and enjoying their retirement years and people with special needs and their families. Her clients range from couples who are just starting out and people who want to stay in charge during retirement to families with multinational businesses. Having worked and studied in Asia for many years, she also enjoys advising on transnational planning. Terry Garrett graduated with honors from Cornell University. She was on the Dean's List at Wharton Business School. She earned her J.D. at Columbia Law School, receiving the Parker Award... In the last several years, Ms. Vance’s practice has included a central focus on family and marital disputes. She promotes a gentler focus on marital termination, convinced that a family’s energies should be spent on the healthy development of children, rather than concentrating on marital angst. Ms. Vance works closely with mental health providers, so that clients can heal, rather than continue to wound those they do, and have, loved. As a result, the firm promotes collaborative law for marital disputes, whenever appropriate. When necessary, however, to protect families, Ms Vance's trial skills successfully promote the best interests of her... Mike has devoted his career to helping consumers deal with debt. He graduated from St. Mary’s University School of Law in the top five percent of his graduating class. Mike made the Dean’s List every year he was enrolled and graduated 10th overall out of over 200 graduating law students. He was an associate editor on the St. Mary’s Law Review and also clerked for a Federal Judge while in school. Upon graduation, Mike immediately teamed up with his attorney and father, Pete, to form Weston Legal, a full service debt relief law firm. Since Pete practices exclusively in... Two decades litigating has taught me a lot of things, the number one thing is to be prepared. I am kicking back a bit and enjoying my family but still helping out where I can to friends and family. Modern world mixed with longer lifespans means you have to rethink your retirement strategy and long term care solutions. Just doing a will is not enough. Plan your estate, using modern techniques, that's the key. After graduating from Thurgood Marshall School of Law, Roxell Ann Richards decided to pursue her legal career, starting as contract attorney for another firm. After working her way up to an associate at a new firm, she decided it was time to set out on her own path, founding Roxell Richards & Associates, PLLC shortly after. As managing partner, she is dedicated to providing exceptional service to each and every one of her clients. With years of experience on the table, she knows how to handle a wide range of matters, including those involving criminal law, immigration law, personal injury,... J. Reid Perry, Attorney at Law, has been providing legal representation services for over 13 years as a solo practitioner. Serving Northwest Houston/Harris County, Montgomery County and Waller County; Reid is dedicated to helping his neighbors find solutions to their legal matters, whether this includes informal or formal mediation, a collaborative approach, or litigation. Reid's number one goal is to provide high-quality affordable legal representation while treating all his clients with dignity and respect. Reid believes most of his clients are best served by finding collaborative solutions to their family law issues, but is willing and able to... Tamara Bibb was born and raised in Houston, Texas. She attended Southern Methodist University in Dallas, Texas, where she obtained her Bachelor of Arts degree in Journalism with News/Editorial specialization in May 2003. Tamara received her Doctor of Jurisprudence from South Texas College of Law in May 2007 and was admitted to the State Bar of Texas the November immediately following. She is a devoted advocate for her clients and understands the emotions and turmoil that come with family law cases. Tamara is able to walk her clients not only through the intricate legalities of the process but also the... I have spent much of my professional career prior to Law School learning the basic tasks of legal administration as a clerk for Williamson County, an office assistant for a Judge in Williamson County, a paralegal for a University's Legal Department, and also a paralegal for a prominent DWI Attorney. After law school I worked as a law clerk and then associate for a local attorney in Cedar Park, Texas handling family law, criminal law, and estate planning cases. I decided to start my own practice because I have a desire to serve my local community, where people... From the first consultation, you will know that we provide honest and dedicated services to our clients. We only accept cases where we can provide added-value or real assistance to our clients. Our attorneys have over 15 years of experience, combined. Our Office operates as a general practice law firm covering various aspects of law, including corporate and business law, civil litigation, criminal law, immigration and naturalization, family law, and debtor and creditor's rights and bankruptcy law, among others. Our law firm prides itself in providing one-on-one contact and personalized services to our clients. No client is too big... Pamela Lyle received her law degree from South Texas College of Law and began practicing law in 2009. While at STCL, she was an active member of the Family Law and Probate Society and interned with the school’s Advanced Family Law Clinic, providing pro bono legal services to Houston’s underserviced population. After being admitted to the Texas Bar, Pamela provided eDiscovery services in finance litigation and government investigation. Her practice focuses on family law, guardianship, estate planning and probate matters. Originally from the San Francisco Bay Area, Pamela received her undergraduate degree in Political Science and History from the... Estate Planning Lawyers in Nearby Counties Estate planning arranges for the transfer of an individual's estate at the time of death. An estate consists of all property owned at death before it is distributed by will, trust, or intestacy laws. An estate may contain both real property and personal property. Estate planning allows an individual to decide exactly who will benefit from his or her estate, and to what extent. It can also reduce the taxes imposed on the transfer of assets at death. An experienced estate planning lawyer can help minimize the amount of the estate surrendered to taxes as well as ensure that the management and distribution of the estate is carried out according to your plans. Particularly when your plans are complex and/or you have substantial property or assets, it is important to have an attorney who can ensure that your plan functions the way you intend. Depending on the complexity of your individual situation, your estate planning team may include attorneys, financial planners, bankers and insurance professionals. Some states certify attorneys as estate planning specialists, which means they have met certain requirements for experience, education, and testing in that field. Fiduciary: A person or institution who manages money or property for another and who must exercise a standard care imposed by law, i.e., personal representative or executor of an estate, a trustee, etc. Personal representative: The person who administers an estate. If named in a will, that person's title is an executor. If there is no valid will, that person's title is an administrator.
2024-03-18T01:26:58.646260
https://example.com/article/3137
//===== eAthena Script ======================================= //= Abyss Cave Warper //===== By: ================================================== //= erKURITA //===== Current Version: ===================================== //= 1.4 //===== Compatible With: ===================================== //= Any Athena Version //===== Description: ========================================= //= Warper to Abyss Cave. and warper out //===== Additional Comments: ================================= //= 1.0 Added by Nexon [Nexon] //= 1.1 Removed Duplicates [Silent] //= 1.2 Fixed tab - missing pillar's appeared [Lupus] //= 1.3 Updated Abyss Lake entrance based on official [SinSloth] //= 1.3a Removed .GATs [Lupus] //= 1.4 Corrected NPC names to fall within proper restrictions. [L0ne_W0lf] //============================================================ hu_fild05,168,304,0 script Column#abyss1 111,{ mes "^3355FFThere are 3 oddly"; mes "shaped grooves on"; mes "the surface of this"; mes "column. It seems that"; mes "certain dragon body parts"; mes "would fit perfectly into"; mes "the column grooves.^000000"; if((countitem(1035)) && (countitem(1036)) && (countitem(1037))) { next; switch( select( "Insert Dragon Body Parts","Eat Dragon Body Parts" ) ) { case 1: mes "^3355FFYou carefully place a"; mes "Dragon Canine into one of"; mes "the grooves, and then you"; mes "hear a powerful rumbling"; mes "from within the column.^000000"; specialeffect EF_WINDHIT; next; mes "^3355FFYou slowly insert a"; mes "Dragon Scale into another"; mes "of the column's grooves,"; mes "trigerring another small"; mes "tremor from the column.^000000"; specialeffect EF_WINDHIT; next; mes "^3355FFYou cautiously insert"; mes "a Dragon Tail into the"; mes "final groove. Lights shine"; mes "forth from cracks in the"; mes "column's surface...^000000"; specialeffect EF_WINDHIT; next; mes "^3355FFThe ground beneath"; mes "your feet begins to"; mes "violently shake.^000000"; specialeffect EF_BOWLINGBASH; donpcevent "AbyssWarp::OnWarp"; specialeffect2 EF_PORTAL; delitem 1035,1; delitem 1036,1; delitem 1037,1; close2; warp "hu_fild05",184,204; end; case 2: mes "^3355FFYou gingerly place a"; mes "Dragon's Canine, a Dragon"; mes "Scale, and a Dragon Tail into"; mes "your mouth and slowly begin"; mes "to chew. Nothing happens"; mes "and the taste of these items"; mes "is surprisingly putrid.^000000"; next; emotion e_rice,1; delitem 1035,1; delitem 1036,1; delitem 1037,1; percentheal -10,0; close; } } close; } hu_fild05,171,211,0 script Column#abyss2 111,1,1,{ mes "^3355FFThis column looks"; mes "very similar to the"; mes "one you've seen in"; mes "the lake. There is"; mes "a conspicious blue"; mes "groove on its surface.^000000"; next; switch( select( "Touch the Groove","Remove Item from Groove" ) ) { case 1: mes "^3355FF*Clatter Clatter*^000000"; next; mes "^3355FFThe light emanating from"; mes "the groove distorts and"; mes "the column starts to shake."; mes "You hear a faint rumbling"; mes "from inside the column.^000000"; specialeffect EF_WINDHIT; next; mes "*Ggghhhhhzzzz!*"; mes "*BAM!*"; next; mes "^3355FFThe light shining from"; mes "the column's groove grows"; mes "brighter as you feel the"; mes "ground beneath your feet"; mes "begin to slowly sink away...^000000"; next; specialeffect EF_BOWLINGBASH; specialeffect2 EF_PORTAL; close2; warp "hu_fild05",169,305; end; case 2: mes "^3355FF*Ppppsssh!*"; mes "You accidentally"; mes "broke the item.^000000"; specialeffect EF_WINDHIT; next; mes "^3355FF*Gggggggghhhhhhhhzzzzzzjjjjhh!*^000000"; next; mes "^3355FFThe light emanating from"; mes "the groove distorts and"; mes "the column starts to shake."; mes "The tremors in the ground"; mes "make it difficult to stand"; mes "steadily, but suddently you"; mes "are warped somewhere else...^000000"; next; specialeffect EF_BOWLINGBASH; specialeffect2 EF_PORTAL; close2; warp "hu_fild05",157,284; end; } } hu_fild05,196,210,1 script AbyssWarp 45,2,2,{ OnInit: disablenpc "AbyssWarp"; end; OnTouch: warp "abyss_01",260,268; end; OnWarp: initnpctimer; enablenpc "AbyssWarp"; end; OnTimer30000: stopnpctimer; disablenpc "AbyssWarp"; end; }
2023-10-12T01:26:58.646260
https://example.com/article/3941
Q: How can I apply an event to a simple link element in ASP.NET I have an <asp:Image> element and a text caption, surrounded by an <a> element. I need the link to run a method when clicked, changing the ImageUrl property of another <asp:Image> element. I'm a total noob with ASP.NET (Clearly.) Can anyone explain this process to me? A: Is changing the image the only thing you're doing? If so, you should probably keep this all in javascript, or least try to use javascript first and only postback if javascript is disabled. Server events are bad for performance. A: I think the ImageButton control will do it for you: http://msdn.microsoft.com/en-us/library/system.web.ui.webcontrols.imagebutton.aspx It fires a postback, giving you all the events you expect.
2024-06-10T01:26:58.646260
https://example.com/article/4410
RONSTAN Series 14 Systems - Overview Ronstan Ball Bearing Batten System Faster, Easier and Safer - Sailing professionals around the world choose Series 19 Ball Bearing Ronstan Batten Systems for superior and innovative features combined with race-proven performance and reliability. With 5 track sizes available in the standard product range, there is a system with the right specifications for each boat and sail plan. The range includes all elements for a complete system, including headboard plates and batten receptacles.
2023-10-31T01:26:58.646260
https://example.com/article/3663
Objective interpretations claim that probability statements are made true or false by physical reality, and not by our state of mind or information. The task is to provide truth conditions for probability statements that are objective in this sense. Usually, two varieties of such interpretations are distinguished and discussed: frequency interpretations and propensity interpretations. Both face considerable problems, the most serious of which I will briefly recall to motivate the search for an alternative. Firstly, the frequency interpretations. Here the central problem is that it is very implausible (to say the least) to postulate a non-probabilistic connection between probabilities and relative frequencies. What a frequency approach claims seems either to be false or to presuppose the notion of probability. Take, for example, the repeated throwing of a fair die that has equal probabilities for each side. All you can say is that it is very probable that upon many repetitions each face will turn up with a relative frequency of approximately 1/6 (weak law of large numbers). Or that, with probability 1, the limiting relative frequency of each face would be 1/6 in an infinite number of repetitions (strong law of large numbers). You cannot drop the clauses ‘very probable’ or ‘with probability 1’ in these statements. There are no relative frequencies that the die would produce on repeated throwing, but it could, with varying probabilities, yield any frequency of a given outcome. 2010The natural-range conception of probability2017-09-28T09:41:02Z2017-09-28T09:41:02ZengRosenthal, JacobRosenthal, JacobObjective interpretations claim that probability statements are made true or false by physical reality, and not by our state of mind or information. The task is to provide truth conditions for probability statements that are objective in this sense. Usually, two varieties of such interpretations are distinguished and discussed: frequency interpretations and propensity interpretations. Both face considerable problems, the most serious of which I will briefly recall to motivate the search for an alternative.<br /><br />Firstly, the frequency interpretations. Here the central problem is that it is very implausible (to say the least) to postulate a non-probabilistic connection between probabilities and relative frequencies. What a frequency approach claims seems either to be false or to presuppose the notion of probability. Take, for example, the repeated throwing of a fair die that has equal probabilities for each side. All you can say is that it is very probable that upon many repetitions each face will turn up with a relative frequency of approximately 1/6 (weak law of large numbers). Or that, with probability 1, the limiting relative frequency of each face would be 1/6 in an infinite number of repetitions (strong law of large numbers). You cannot drop the clauses ‘very probable’ or ‘with probability 1’ in these statements. There are no relative frequencies that the die would produce on repeated throwing, but it could, with varying probabilities, yield any frequency of a given outcome.
2023-09-30T01:26:58.646260
https://example.com/article/2589
[Correlation between OPN and P21 in non-small cell lung cancer]. At present, little is known about the correlation between osteopontin (OPN) and P21 in primary non-small cell lung cancer (NSCLC). The aim of this study is to investigate the expression of OPN and P21 and their correlation in NSCLC. The expression of OPN and P21 was detected in 58 NSCLC tissues and 18 pulmonary inflammatory pseudotumor (PIP) as controls by immunohistochemical technique. The positive rate of OPN and P21 in NSCLC was 58.6% and 70.7% respectively, which was significantly higher than those in PIP (11.1% and 16.7%) (P=0.0008, P < 0.0001). There was a positive correlation between OPN and P21 expression (P < 0.0001). Lymph node metastasis was closely related to OPN expression (P=0.0367), but not to P21 expression (P=0.4898). The abnormal expression of OPN and P21 in NSCLC may act in a synergistic way. Immunopositivity of OPN may suggest a potential risk of metastasis in NSCLC.
2024-02-06T01:26:58.646260
https://example.com/article/8437
It's been so long he can't even remember the last time he played in a game — a real game against players who aren't teammates. Barring an unexpected setback, Pacers' first-round draft pick Goga Bitadze will make his debut Tuesday when Minnesota comes to Bankers Life Fieldhouse for their final preseason game. He's running late — very late, in fact — but at this point all concerned parties will have to satisfy themselves with the knowledge that one game of preparation for the regular season is better than none. Bitadze practiced with the team again on Monday and will play as many minutes as he's able to handle against the Timberwolves in what amounts to a crash course of NBA basketball. It's enough of a challenge that he just turned 20 in July, but he's also dealing with an exaggerated lack of experience. His work visa could not be obtained in time for him to compete in Summer League play in July and an ankle injury suffered on the third day of training camp has kept him out of the three preseason games. Bitadze guessed that his last "real" game came in May, perhaps June. More likely it came on April 22, when the Euroleague team for which he played 13 games, Buducnost VOLI, was eliminated from the playoffs. Still, he believes his conditioning is adequate from his cardio workouts while nursing his ankle. He's also played in several scrimmages with his teammates since August. That, however, isn't the same as playing against another team in a preseason game, which isn't the same as playing against another team in a regular season game. He has to start somewhere, though. Bitadze has been slotted for regular playing time as a backup center, but his lack of game experience makes it nearly impossible to measure his progress and readiness for the task ahead. "I mean, he's a rookie," coach Nate McMillan said Monday. "He's young. "Where is he at? Just beginning." Myles Turner can relate to Bitadze's issue better than anyone. Turner also was drafted as a 19-year-old and had to overcome injuries early in his rookie season. He missed some training camp practices with a sore knee, missed one preseason game with a strained left calf and then missed the season opener at Toronto with a sore right ankle. Turner at least had the benefit of Summer League games and six preseason games before making his NBA debut in the second regular game, making him a grizzled veteran compared to Bitadze. He went on to play in seven games, then fractured his left thumb early in his eighth game and had to sit out the next 21 before returning on Dec. 30. "It's tough," Turner said. "He's not going to have that real experience. It's tough to have your real experience come in an actual NBA game, not a preseason game. Hopefully he'll be able to get out there (Tuesday)." "In practices he shows that he's capable, but he's got to play in NBA games to get that real experience." Goga Bitadze receives instruction from Pacers assistant coach Dan Burke (Photo Credit: @Pacers) Turner isn't predicting disaster for the rookie, however. Whereas he had just one season of college basketball behind him, mostly as a backup player, when drafted by the Pacers, Bitadze has played professionally for three years. Played well, too. He was voted the Rising Star of the Euroleague last season, an honor for players under 22 years old that's voted upon by the coaches. The list of previous winners is filled with established NBA players, including Luka Doncic, Bogdan Bogdanovic, Nikola Mirotic, Ricky Rubio, Danilo Gallinari, and Andrea Bargnani. "I think he knows the game better than I did," Turner said. "When I came into the league I didn't really know how to rotate on defense, I didn't really know NBA sets, I didn't know what I was supposed to do. I could score. That was my saving grace; I could shoot the ball. With him, he can do a little bit of everything. He knows the game a lot better than I did at that age." McMillan, an assistant coach with the Pacers during Turner's rookie season, mostly agrees. "They're similar," McMillan said. "Goga seems to be comfortable playing in the paint. Myles has always been a perimeter guy. Goga can play in the paint, can play on the perimeter. They're different in the skills they have. Both of them defend the basket." The Pacers likely will need all of whatever Bitadze can give them when they open the season against Detroit on Oct. 23. Both Turner and Domantas Sabonis can play center, but they will start together, creating the need for a backup "big." Nobody else on the roster is a viable candidate for that role. For now, it belongs to Bitadze. "We'll see," McMillan said. "That's kind of where we've got him at. We'll see as we get into the season what the rotation is going to look like. The rotation, on Oct. 23...if you ask me Nov. 23 it could be a little different. I don't know." Notes Edmond Sumner, who missed Sunday's Fan Jam activities with an illness, also missed Monday's practice and is doubtful for Tuesday's game...McMillan said he plans to play his starters most of the first half and turn the second half over to his reserves...Minnesota is 1-2 in preseason play, with the only victory coming over Haifa Maccabi Haifa. The Timberwolves lost to Phoenix 111-106 and to Golden State 143-120. Have a question for Mark? Want it to be on Pacers.com? Email him at askmontieth@gmail.com and you could be featured in his next mailbag. Mark Montieth's book on the formation and groundbreaking seasons of the Pacers, "Reborn: The Pacers and the Return of Pro Basketball to Indianapolis," is available in bookstores throughout Indiana and on Amazon.com. Note: The contents of this page have not been reviewed or endorsed by the Indiana Pacers. All opinions expressed by Mark Montieth are solely his own and do not reflect the opinions of the Indiana Pacers, their partners, or sponsors.
2024-03-18T01:26:58.646260
https://example.com/article/7036
Liquiçá Liquiçá (Tetum: Likisá) is a coastal city in East Timor, 32 km to the west of Dili, the national capital. Liquiçá is the capital of Liquiçá District. The city has a population of 5,005 inhabitants. History A part of the colonial administration of East Timor was arrested in Maubara and Liquiçá during the Japanese occupation of East Timor from 1942 - 1945. As a consequence the two towns where spared from the air raids which devastated the rest of the island. On 6 April 1999, in the campaign of intimidation and violence that preceded the referendum for East Timorese independence, about 200 persons were killed in the Liquiçá Church Massacre, when members of the Besi Merah Putih militia, supported by Indonesian soldiers and police, attacked the parish church Igreja de São João de Brito. (The number of casualties is disputed by Indonesia). During the leadup to the referendum on independence, most of the buildings in the city were destroyed. Only a few buildings from the Portuguese and Indonesian times remain. Starting in 1999, it became the district headquarters for the International Police, assigned there by UNTAET, under the United Nations. It also was the home base of operations for the UNTAET Crime Scene Detachment. Languages Most of the inhabitants speak Tocodede. Sights and Architecture The former Headquarters of the Administrator de Liquiçá, built in 1938 in a neoclassical style with a large porch with ten columns measuring 5 metres in height each, are one of the most impressive buildings in town. Nowerdays the building is used as an administration building of the municipality. The Primary School opposite the headquarters was built in the 1940s with four classrooms and one administration building. The former Residence of the Administrator of Liquiçá was probably built before 1910 in a neoclassical style with an impressive staircase in front and a large garden with a pool behind. During the Indonesian occupation, it served as a residence of the Indonesian administrator. Opposite the building a small park was laid out with several pavilions. The Office of the Deputy Secretary of the Administrator was built in a colonial style in carved stone in 1936. The building was renovated in 2016. It is currently used by the Ministry of Public Works. The former Municipal Market which is close by was built in the 1930s featuring a square plan. It had a corridor surrounded by small distribution outlets. The former Municipal School, built before 1910 with stone masonry walls featuring two volumes, was the first school to be built in the district. It served as a military pharmacy during the Indonesian occupation. Hotel Tokodede was probably built between 1930 and 1950 in a privileged area of the town where colonial officers overnighted. Its terrace still offers a beautiful view of the coconut tree-lined sandy beach of Liquiçá. The building is still used for social events. The Parish Church of Liquiçá Igreja de São João de Brito which became famous because of the Liquiçá Church Massacre was built in 1946. The clock tower was added when the church was renovated in 2016. The Customs House is a rectangular building of Portuguese origin whose exact date of construction remains unknown. It might have been built around the middle of the 20th century. The building consisting of two halls which is close to the beach was destroyed in 1999. References Timor-Leste at GeoHive External links Category:Populated places in Liquiçá District
2024-05-06T01:26:58.646260
https://example.com/article/8754
Q: Basic Gaussian Process simulation/ white noise - massive problem I have a certain problem with Mathematica or more precisely, myself handling it. It is correlated with a mathematical problem and its realization/simulation in Mathematica. I want to start with the mathematical part: I am given a gaussian distributed random variable $\epsilon(t)$ with $E\left[\epsilon(t)\right]=0$ and correlation function $E\left[\epsilon(t)\epsilon(s)\right]=\sigma_{\epsilon}^2\delta(t-s)$, so gaussian white noise. The thing i want to calculate is $E\left[\exp\left(-\frac{1}{2}\int_{0}^{t}\epsilon(t')\mathrm{d}t'\right)\right]$. We see that the integral of a gaussian-distributed random variable is again gaussian distributed, so from the moment generating function of the gaussian distribution we get: \begin{equation*} E\left[\exp\left(k X\right)\right]=G(k)=\exp\left(\mu_X k+\frac{1}{2}k^2\sigma_X^2 \right) \end{equation*} With $X=\int_{0}^{t}\epsilon(t')\mathrm{d}t'$ it follows that $\mu_X=E\left[X\right]=0$ and $E\left[X^2\right]=\sigma_{\epsilon}^2t$. So it follows: \begin{equation*} G\left(-\frac{1}{2}\right)=E\left[\exp\left(-\frac{1}{2}\int_{0}^{t}\epsilon(t')\mathrm{d}t'\right)\right]=\exp\left(\frac{1}{8}\sigma^2_\epsilon t\right) \end{equation*} So far so good, this is the thing I want to 'get as a result' theoretically. Now I wanted to verify it with a little simulation in Mathematica. Here is what I did in Mathematica (I tried to add comments in my code, please ask if there are questions/ambiguities) I really hope you guys can help me, I can't work any further without having solved that certain problem...and I'm getting desperate. I also seems that the result depends on the time-steps I choose... But the plots really don't match. (simulated with ) (theoretically) Standarddeviation=5; (*define standard deviation of the gaussian random variable epsilon *) DeltaT=0.04; (* time steps with which i want to evaluate the integral *) Repetitions=5000; (* in order to get a good average, i take 5000 reps*) Time = 20; (*maximal time *) AverageExactly[t_] := Exp[1/8*Standarddeviation^2*t]; (*exact average theoretically*) (*It follows the loop for the 5000 repetitions *) For[z = 0, z < Repetitions, z++, GaussianDistribution=RandomVariate[NormalDistribution[0,Standarddeviation], Round[Time/DeltaT + 1]]; (*generate Gaussian numbers, there shall be enough that all time is covered*) SimulatedValue[t_] := Exp[-1/2*Deltat*Sum[GaussianDistribution[[i]],{i,1,t/Deltat}]]; (* Evaluate the integral in form of a sum*) ListSimulatedValues = Table[SimulatedValue[t], {t, 0, Time, DeltaT}]; (*make a table out of the simulated values*) ListAxis = Table[t, {t, 0, Time, Deltat}]; (*define the axis-values*) ListSimulatedValuesPlot[z] = Transpose@{# & @@@ ListAxis, # & @@@ ListSimulatedValues}; (*merge both tables*) ] SimulatedAveraged = List[1/Repetitions*Sum[ListSimulatedValuesPlot[z],{z, 0, Repetitions - 1}]] (*average over all 5000 repetitions *) ListPlot[SimulatedAveraged = List[1/Repetitions*Sum[ListSimulatedValuesPlot[z], {z, 0, Repetitions - 1}]], PlotRange -> {{0, 20}, {0.9, 2}}] (*Plot simulated values *) Plot[AverageExactly[t], {t, 0, 20}](*Plot theoretical values values *) A: See this for example. The simulation is band-limited, requiring a correction to the variance of the distribution. If you do that and stick to low values for time the agreement is okay. sd = 5; dt = 0.001; reps = 10000; time = 1; exact[t_] := Exp[1/8*sd^2*t]; gd = RandomVariate[NormalDistribution[0, sd/Sqrt[dt]], {Round[time/dt + 1], reps}]; sim = Mean[Exp[-(dt/2) Transpose@Accumulate[gd]]]; Show[ Plot[exact[t], {t, 0, time}, PlotLegends -> {"Exact"}], ListLinePlot[sim, DataRange -> {0, time}, PlotStyle -> Orange, PlotLegends -> {"Simulation"}]]
2024-04-06T01:26:58.646260
https://example.com/article/3281
Using tags to browse ruby and gem source with Vim December 9, 2016 posted in ruby, ide, vim, ctags, tags, navigation, gem, source. A few month ago I went to Sydney where my teammate Andrew showed me a pretty nifty feature of Rubymine. He was able to jump into definitions of Ruby methods. That wouldn’t be so special until he seamlessly navigated into one of the ruby gems source code – I was amazed. In this article I’m going to describe how to achieve a similar workflow with Vim and convert it into a powerful IDE. Let’s start with jumping into method declarations inside your project. To jump between method declarations and symbols we need some sort of a map that Vim can use to navigate. These maps are called tags and the one we are going to use is Exuberant Ctags. The simplest generation is running ctags -R in the root of your project. If you are using vim-rails plugin you can regenerate your tags with :Rtags command. You can also set up your environment to automatically generate tags when file changes with guard or when you checkout new code with a git hook. For me, the manual generation is good enough. Vim has a built-in navigation through the tags so there is no need for any plugin. The two commands I use the most are go to defition which is bound to ctrl + ] and go back ctrl + o . If there are multiple tags for selected symbol you can use :tselect command which is also accessible through visual mode and the key combination g] . You select the number of a tag that is the most likely match and hit enter. Apart from that, you can use :tnext and :tprevious commands. Another option is to use CtrlP – a fuzzy finder that can browse file names as well as tags. The command for that is :CtrlPTag . Vim also support mouse mode and navigation similar to more modern IDEs when you can use ctrl + click to navigate to definition and ctrl + right click to get back. Jumping into gem source So far we covered generating tags and navigation only in your project and that was good enough for me for couple years. But can we jump into method definition inside of gem we use? Without any integration you can use bundle open to browse the source code of a gem in your editor. Fortunately, we can do better and create tags for the gems we use. We need to install a few integrations into Vim – vim-rbenv and vim-bundler. And last piece of the puzzle is a gem called gem-ctags . That should be enough to teach our Vim how to navigate into the source of the gems we are using in a current project. Also, it hooks into bundler and whenever we update or install a new one it regenerates the tags for us – neat. Conclusion To get the fully functional setup firstly, install Exuberant Ctags with brew. brew install ctags You need the following plugins in your .vimrc if you are using Pathogen. Plugin 'vim-ruby/vim-ruby' Plugin 'tpope/vim-rails' Plugin 'tpope/vim-rbenv' Plugin 'tpope/vim-bundler' After that install the gem-ctags and rbenv-ctags. gem install gem-ctags gem ctags mkdir -p ~/.rbenv/plugins git clone git://github.com/tpope/rbenv-ctags.git \ ~/.rbenv/plugins/rbenv-ctags rbenv ctags And you changed your Vim into a powerful Ruby IDE. Now you can generate and update your project tags by running :Rtags and jump into code definition pressing ctrl + ] . Resources Important projects needed for a Vim setup: gem-ctags generates tags for gems on installation rbenv-ctags generates tags for ruby when installed with rbenv vim-ruby provides path support for ruby files in Vim vim-rails adds easy way to regenerate tags vim-rbenv provides path support for rbenv ruby files in Vim vim-bundler sets the location of tags in Vim How to keep your Ctags up to date? Git hook approach to tag generation guard-ctags-bundler allows you to automatically generate tags on file changes Articles and guides about Vim setup and tags: Benoit T: I added this in my vimrc set tags+=.tags nnoremap <leader>ct :silent ! ctags -R --languages=ruby --exclude=.git --exclude=log -f .tags<cr> With <space>ct I get my ctags refreshed. ivalkeen: For ruby I would recommend to take a look at ripper-tags instead of exuberant ctags, because it understands ruby much better and produces much more precise and complete tags files (the output format is the same). Also if you use CtrlP, you might like my ctrlp-tjump plugin, which allows to do IDE-like fuzzy-search in multiple matches (instead of using :tselect/:tjump) Jakub: The reason for ctags is their support with gem-ctags. But just a quick google showed me a similar project to Tim Pope’s one so it might be worth investigating. The ctrl-p-jump looks awesome – much nicer interface than :tselect. Thanks for the recommendation! Would you like to get top 5 links on Programming every Monday? Sign up to Programming Digest and stay up to date!
2024-02-23T01:26:58.646260
https://example.com/article/9586
Everything great in the world is done by neurotics; they alone founded our religions and created our masterpieces. ~Marcel Proust Sunday, August 24, 2014 The Consent of the Governed- The Sunday Collage The Declaration of Independence is a relatively simple and well written document which was signed by 56 men. There are a couple of opening paragraphs, a giant list of grievances, and then a closing paragraph right above their signatures. Here then, are the opening paragraphs. Please pay close attention to the second one. When in the Course of human events, it becomes necessary for one people to dissolve the political bands which have connected them with another, and to assume among the powers of the earth, the separate and equal station to which the Laws of Nature and of Nature's God entitle them, a decent respect to the opinions of mankind requires that they should declare the causes which impel them to the separation. We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.--That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, --That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments long established should not be changed for light and transient causes; and accordingly all experience hath shewn, that mankind are more disposed to suffer, while evils are sufferable, than to right themselves by abolishing the forms to which they are accustomed. But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.--Such has been the patient sufferance of these Colonies; and such is now the necessity which constrains them to alter their former Systems of Government. The history of the present King of Great Britain is a history of repeated injuries and usurpations, all having in direct object the establishment of an absolute Tyranny over these States. To prove this, let Facts be submitted to a candid world. Among other things, the Founders were upset that they had been ordered to pay (paltry by today's standards) 3% taxes by a King on a completely different continent. Taxation without representation. So what representation do we have? When your government ignores the will of the people and sets about the task of imposing monumental taxes and seizing better than 1/2 of all of your income- that isn't a reasonable tax- that is thievery. That is not consent. Nobody has consented to that. In America, a majority of us were against Obamacare. Not only did we fail to give our government consent, but they imposed this tax on us. Then they had it rubber stamped- as though the Supreme Court- was the final say on the matter. The final say occurs when the people of America- the ones who are getting fleeced- have had enough. I am one of those people. I am being governed by a golfing President mired in at least 5 scandals, an Attorney General who is clearly failing to do his job on multiple fronts, and a Congress bought and paid for by corporate interests- a Congress whose members offer no help (and then only to rich crony capitalists) help that is implied just so long as you bring a large checkbook to help them get re-elected. Throw in an unelected, privately owned Federal Reserve Bank which refuses to be audited and which counterfeits our currency at will.... and voila! That is our current governance. I didn't consent to any of that. I want a President that represents "we the people" instead of special interests like health care insurers, bankers, or other corporate interests. An Attorney General who enforces the law EQUALLY. A Congress that is term limited, reformed, and who will work on behalf of the millions of us- the vast majority- who are not being represented at all. I want a national currency, issued by our government and limited in quantity and thus quality, and I want the Federal Reserve as it stands now-abolished. Government never sits down and negotiates. It never thinks it has to. Government is the study of incremental ism, the slow erosion of individual freedoms whereby governments confiscate your wealth, your liberty, and your way of life. They do it bit by bit, slowly, so that nobody becomes immediately aware.When you finally realize that they have literally stolen and confiscated everything you possess it's often too late. I think we are pretty close to that now. Our government doesn't negotiate. They arm themselves. Have you noticed all of the military police uniforms, military armament, M-16's or AR-15's, tactical vehicles and MRAPS? Governments don't always believe they have the consent of the governed- rather they think that is un neccessary. Instead, they believe they have the upper hand, the power, and the might to impose their will on you. It has begun. They know what's coming. They are arming themselves and they are going to call on those police agencies they have armed. They are going to label dissenters as criminals like they have Edward Snowden. They have the capability to spy on everyone. They are going to confiscate every last bit of wealth that we have while trying desperately to hold on to their power because governments do not negotiate with the governed. Negotiations only occur after a great deal of bloodshed. The founders knew this. They knew when they signed that document that the King would view every one of them as traitors and show them no mercy. They had courage back then. Or at least the ability to understand that the King really didn't give two shits about having the consent of the governed. I don't think there is any better example of arbitrary and capricious government than the one we have now. It is interesting to watch this unfold, week after week. I am kind of proud of the fact that I never fell for the government's bribes. I didn't participate in SWAT teams- military style clothing- and I certainly wouldn't have taken or tried to use an MRAP. I was amazed at the amount of pressure my peers exerted on me to participate- they truly make you feel like an outsider when you don't- and they weren't afraid to call you various names. In the Treasure Valley- every city thinks they have to have their own SWAT team and MRAP. It is a horrific waste of taxpayer money because those services are seldom needed and they are duplicated everywhere. One day all of that is going to be used against honorable- but fed up people. All the pieces are in place now. The government isn't going to negotiate. It isn't going to take responsibility for a 60 trillion dollar debt (all liabilities) or a health care system that is collapsing in front of us- which was never much more than a half assed attempt by the democrats to buy votes. I am actually a little worried about how our country is going to look 50 years from now. 8 comments: Anonymous said... "A little worried about how our country will look 50 years from now". Fifty years? Man I don't think we have Fifty day's. The way these neo-con assholes are conducting this shit show in Ukraine and the need to get a war going. We will all be lucky if we survive at all. We are in some pretty shit now and there is no one and I mean no one to pull our asses out. There won't be a United States 50 years from now, brother. The country will either be split up into a bunch of smaller countries or it will be nuked back to the stone age by Islamofacist shitheads who plant bombs in every major city and blow them all up at once. Brian, this is what those 56 men were up to when they penned that Declaration; Excerpt out of Emmerich de Vattels 1750 book, The Law of Nations; Read it carefully; Then ask yourself, Who am I? "The law of nations is the law of sovereigns. It is principally for them, and for their ministers, that it ought to be written. All mankind are indeed interested in it; and, in a free country, the study of its maxims is a proper employment for every citizen; but it would be of little consequence to impart the knowledge of it only to private individuals, who are not called to the councils of nations, and who have no influence in directing the public measures. If the conductors of slates, if all those who are employed in public affairs, condescended to apply seriously to the study of a science which ought to be their law, and, as it were, the compass by which to steer their course, what happy effects might we not expect from a good treatise on the law of nations! We every day feel the advantages of a good body of laws in civil society: — the law of nations is, in point of importance, as much superior to the civil law, as the proceedings of nations and sovereigns are more momentous in their consequences than those of private persons…." "...But fatal experience too plainly proves how little regard those who are at the head of affairs pay to the dictates of justice, in conjunctures where they hope to find their advantage. Satisfied with bestowing their attention on a system of politics which is often false, since often unjust, the generality of them think they have done enough when they have thoroughly studied that. Nevertheless, we may truly apply to states a maxim which has long been acknowledged as true with respect to individuals, — that the best and safest policy is that which is founded on virtue. Cicero, as a great master in the art of government as in eloquence and philosophy, does not content himself with rejecting the vulgar maxim, that "a state cannot be happily governed without committing injustice;" he even proceeds so far as to lay down the very reverse of the proposition as an invariable truth, and maintains, that "without a strict attention to the most rigid justice, public affairs cannot be advantageously administered." Providence occasionally bestows on the world kings and ministers whose minds are impressed with this great truth. Let us not renounce the pleasing hope that the number of those wise conductors of nations will one day be multiplied; and in the interim let us, each in his own sphere, exert our best efforts to accelerate the happy period." ~[Emmerich de Vattel, The Law of Nations] "...the bill of rights tells you, "that all power of suspending law, or the execution of laws, by any authority, without the consent of the representatives of the people, is injurious to their rights, and ought not to be exercised." This tells us that there can be no suspension of government or laws without our own consent; yet this Constitution can counteract and suspend any of our laws that contravene its oppressive operation; for they have the power of direct taxation, which suspends our bill of rights; and it is expressly provided that they can make all laws necessary for carrying their powers into execution; and it is declared paramount to the laws and constitutions of the states." "Consider how the only remaining defence we have left is destroyed in this manner. Besides the expenses of maintaining the Senate and other house in as much splendor as they please, there is to be a great and mighty President, with very extensive powers—the powers of a king. He is to be supported in extravagant magnificence; so that the whole of our property may be taken by this American government, by laying what taxes they please, giving themselves what salaries they please, and suspending our laws at their pleasure."
2024-06-07T01:26:58.646260
https://example.com/article/9599
Q: jQuery tabs - opening pagination links inside a tab I'm having the following setup of jQuery UI tabs: $(function() { $('#tabs').tabs({ ajaxOptions: { type:'post', async: false, error: function( xhr, status, index, anchor ) { $( anchor.hash ).html( "Couldn't load this tab." ); } }, load: function(event, ui) { $(ui.panel).delegate('a', 'click', function(event) { $(ui.panel).load(this.href); event.preventDefault(); }); } }); }); this loads tabs ok: <div id="tabs"> <ul> <li><a href="div-s.php">Summary</a></li> <li><a href="content.php?div=Production">Products</a></li> <li><a href="content.php?div=Digital">Recordings</a></li> <li><a href="login.php">Login</a></li> <li><a href="resources.html">Resources</a></li> </ul> </div> my fist tab div-s.php contains pagination. I expect for pagination links to be opened in the same tab, yet when I click on them, browser actually redirects me to div-s.php?pagenum=2 how can i fix this please? A: Here's what happening: the jquery.tab plugin "turn off" your tab links when you enable the ajaxOptions in the attributes map. So, when you click in some tab, the content will be loaded by AJAX requests and inserted in tab panel. All the HTML elements in your tab content will work as ordinary elements if you do not add event listener or any kind of script to them. Then, when you load the content that has your paginations links and you click in one of them, you will be doing a click in a normal link that you reload all the page, since your tab panel is not an inframe. The solution: The function that you set in load attribute is doing nothing, but it will work to force ajax load in links inside tab panel with a little modification :) $(".ui-tabs-panel.ui-widget-content").delegate('a', 'click', function(event) { event.preventDefault(); $(this).closest('.ui-tabs-panel.ui-widget-content').load(this.href); }); Finished :) Execute this function after run the tab plugin and all link element inside .ui-tabs-panel.ui-widget-content will force their own tab to reload with their own href
2024-03-11T01:26:58.646260
https://example.com/article/7310
Tissue Doppler-derived myocardial acceleration for evaluation of left ventricular diastolic function. Our purpose was to evaluate a tissue Doppler-based index-peak myocardial acceleration (pACC)-during isovolumic relaxation and in evaluating left ventricular (LV) diastolic function. Simple, practical indexes for diastolic function evaluation are lacking, but are much desired for clinical evaluation. We examined eight sheep by using tissue Doppler ultrasound images obtained in the apical four-chamber views to evaluate mitral valve annular velocity at the septum and LV wall. The pACC thus derived was analyzed during isovolumic relaxation (IVRT) and during the LV filling period (LVFP). We then changed the hemodynamic status of each animal by blood administration, dobutamine, and metoprolol infusion. We compared the pACC values during IVRT and LVFP over the four different hemodynamic conditions with a peak rate of drop in LV pressure (-dP/dt(min)) and the time constant of LV isovolumic pressure decay (tau), as measured with a high-frequency manometer-tipped catheter. The pACC of the septal side of the mitral valve annulus during IVRT showed a good correlation with -dP/dt(min) (r = -0.80, p < 0.0001) and tau (r = -0.87, p < 0.0001). The mean left atrial pressure (LAP) correlated well with the septal side pACC during LVFP (r = 0.81, p < 0.0001). There was a weak correlation between the mitral valve annulus pACC at the LV lateral wall and mean LAP. The pACC during IVRT is a sensitive, preload-independent marker for evaluation of LV diastolic function. In addition, pACC during LVFP correlated well with mean LAP.
2024-01-21T01:26:58.646260
https://example.com/article/3896
Palau Diving: Size Does Matter Palau may be a tiny speck of a country in the Pacific, but underwater it’s a geographically vast realm that’s home to thousands of sharks and strong currents that make for a truly epic experience It’s hard not to feel small underwater in Palau. Virtually every one of Palau’s signature dive sites are huge in scale, and for divers there’s the continual sense of flying around an underwater mountain range. Wide aquatic plateaus drop off suddenly into the abyssal depths while scores of sharks implacably ride the currents along sheer walls; big schools of barracuda shine silver under the Palauan sun as they slowly drift into the blue. In short, diving in Palau can be summed up in one word: epic. This story previously appeared in EZ Dive magazine. Click any image below for larger versions. Palau’s vast underwater realm stands in stark contrast to its small place on the map above water. A tiny speck in the Pacific located a couple of hours flying south east of the Philippines, Palau’s remoteness has served it well as a haven for marine life. Recent government legislation has moved to preserve Palau’s unique status with the world’s first shark sanctuary being created in 2009. It’s the sheer number of sharks that can be seen at Blue Corner which makes it Palau’s most famous dive site, a horizontal finger of a plateau jutting out into the ocean and suddenly falling away with steep walls that seem bottomless. The visibility is often 40 metres plus and the strong currents that pass across the plateau mean divers usually need to hook on the rock at the plateau’s edge and then watch the action as grey reef, blacktip and whitetip sharks soar past, only a few metres away. Unhooking from the reef and tumbling back into the plateau itself, the current-blasted rock provides little coral to explore but a diver’s attention is usually grabbed by the great schools of barracuda that congregate cyclone-like in the plateau’s centre, glinting under the sun. Amongst the sharks and barracuda, very large but still nervous napoleon wrasse are often spotted, shying away from attention despite their bulk. Blue Corner is just one of a string of must see Palau dive sites at Ngemelis island, only a few hours journey from the capital and main harbour of Koror. Blue Holes’ unimaginative name doesn’t really prepare the diver for the cathedral like grandeur of the four huge underwater chambers that have been carved out by nature here, magically lit up by the sun. Similarly, New Drop Off turns out to be a fantastic complement to Blue Corner, with similar topography that brings close encounters not only with sharks, but dogtooth tuna and giant trevally too, as well as turtles casually munching what’s left of the dive site’s coral. Palau’s southern most point, the island of Peleliu, has its own unique cluster of dive sites. The scene of savage fighting during World War II, Peleliu today has a moving memorial and museum to honour the dead, as well as still surviving tanks and airplanes scattered around the island. Beneath the water, Peleliu Express and Peleliu Wall provide high-octane drift dives along gigantic walls where blacktips, whitetips and occasionally tiger sharks can be seen, as well as spotted eagle rays. The currents here can be fierce and provide the very definition of adrenaline diving. While Blue Corner continually grabs the headlines as Palau’s best dive site, there is an intriguing variety of other sites on offer too. German Channel has become famous for spectacular manta ray displays, and the shallow bommies in 15 metres where the mantas congregate for cleaning make an ideal warm up dive before tackling the more challenging wall sites. The Channel is actually a manmade construction, a straight waterway blasted out of the coral by German miners in the 1900s to allow easier access from the Philippine Sea to the Pacific Ocean. Over a kilometre long, manta rays are often spotted near the surface passing through the channel as well as at the cleaning station. During our couple of dives there we encountered a curious baby manta that followed us as we drifted from the cleaning station into the channel, playfully trailing and flicking its wings around us. Despite the obvious destruction caused nearly a century ago by the channel blasting, today there are some impressive coral bommies within German channel that provide alternative entertainment if the mantas are a no-show. Ulong Channel, often considered as a serious contender against Blue Corner for Palau’s best dive site, is a natural channel with strong, unpredictable currents that sends divers on an underwater rollercoaster ride over the reef, along the way encountering giant stingrays, snappers, sharks and the world’s largest lettuce coral. There is also a profusion of wrecks around Palau, the result of the World War II American bombing operation Desecrate One, which sent more than 60 Japanese warships to the bottom in 1944. One of the most popular of these to dive is Iro, an oil supply ship that lies upright in 20 metres of water nearby to Koror harbour. As the ship hoves into view descending the buoyline, the first thing that’s noticable is the sheer size of the fully intact gun mounted at the front of the Iro on a still clearly visible rotating base. What was a weapon of war is now encrusted in hard corals and the entire ship has become a sanctuary for marine life. Another marine sanctuary, this time made by nature, is jellyfish lake, full of non-stinging jellies within an extinct volcano, a perfect place to visit on the last non-diving day of a Palau trip. For such a tiny country, Palau has a big place in the pantheon of great Asian diving. As the world’s shark population dwindles, it’s becoming one of the last places to see sharks in such numbers – here’s hoping that the recently established shark sanctuary succeeds and future generations of divers will also be able to experience Palau’s unique high adrenaline thrills. Make Sure You Have Diving And Travel Insurance World Nomads is one of the leading travel insurance providers and their coverage also includes scuba diving to 40 metres too if you select the relevant options. Make sure you're covered insurance-wise both above and below water. My Book: Thailand’s Underwater World Experience Thailand’s amazing marine life up close in this beautiful book by Chris Mitchell and Jez Tryner. More info Disclosure: Divehappy.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com and amazon.co.uk).
2024-05-08T01:26:58.646260
https://example.com/article/1835
Lawmaker Calls for End to Iowa's Fireworks Ban DES MOINES, Iowa —A fire that destroyed much of Spencer back in the 1930s led lawmakers to ban the sale of fireworks in Iowa. Now more than 80 years later, a major push is on to legalize them again. It began Monday when a state senator representing Davis, Jefferson, Van Buren and Wapello counties in southern Iowa submitted his bill proposing the legal sale of fireworks in Iowa. Sen. Mark Chelgren is trying to reignite the sale of fireworks in Iowa. "Whenever you have a law that no one puts a high priority on to enforce and no one respects, you should consider removing it," said Chelgren. His bill proposes the sale be restricted to individuals 18 and over and would be regulated by county boards and city councils. The sales tax revenue from fireworks sales would go back to equipment for local fire departments. Des Moines Fire Inspector Mike O'Keefe said he couldn't talk about this specific bill, but he has concerns about the safety of children who could get access to legal fireworks. O'Keefe said firefighters are watching the legislation to see how it progresses. Sen. Jack Hatch said he has seen the bill and said it would not get his support. He said the idea has potential, but not in the bill submitted by Chelgren. "It just opens it up that it basically allows anybody over 18 years of age to buy and sell fireworks and that's not the way we do it here," said Hatch. Chelgren said he hopes Hatch is in the minority of lawmakers. He wants to get the bill passed and start fireworks sales in Iowa by June 1. "I think this is very positive and has potential to be supported by both sides, but in an election year you never know what's going to happen," said Chelgren. The bill is currently in committee. Hatch said over the last few decades a senator from southern Iowa at some point each year has proposed legalizing fireworks sale in the state. He said he expects this latest bill to spur discussion, but not get passed.
2023-10-24T01:26:58.646260
https://example.com/article/2684
The rusted-out soul of steel-town America and the ghosts of the 1970s post-Vietnam Hollywood cinema haunt Scott Cooper’s “Out of the Furnace,” a starkly powerful drama that in some ways feels like an Iraq-era bookend to “The Deer Hunter,” with bare-knuckle boxing substituted for Russian roulette. A much darker and less audience-friendly package than Cooper’s Oscar-winning 2009 debut, “Crazy Heart,” but graced by the same lyrical sense of worn-down American lives, this slow-burning drama should earn deserved praise for the top-drawer performances of stars Christian Bale, Casey Affleck and a truly frightening Woody Harrelson, but will need a lot of TLC from distrib Relativity (which opens the pic wide on Dec. 6) to break out commercially in a very crowded holiday frame. The furnace of the title is literally the Carrie Furnace of Braddock, Penn., the real Rust Belt town where Cooper’s pic is set. But it is also the fire that burns inside Rodney Baze (Affleck), a native son of Braddock who opted out of mill life the only way he could, by joining the Army. There, he’s served three tours of duty in Iraq and is, when the movie begins, about to be “stop-lossed” into a fourth — and one need look no further than Affleck’s anguished gaze to know that Rodney has seen and done things that mark a man for the rest of his life. Rodney’s more straight-arrow brother, Russell (Bale), did go to work in the mill, like their father before him, and has one of the few remaining jobs there in lean economic times. The year is 2008 and the Obama election is playing out on TV, but for places like Braddock, the promise of “change” seems as empty as most of the storefronts along the main streets. And for much of the first hour of “Out of the Furnace,” Cooper (who rewrote the script by Brad Inglesby) steeps us in the dead-end mood of the place: the off-track betting parlor where Rodney gambles away money borrowed from an avuncular barkeep and bookie (Willem Dafoe); the forlorn drive-in movie theater where a hair-trigger tweaker named Harlan DeGroat (Woody Harrelson) uncorks his rage on his unsuspecting girlfriend; and Carrie Furnace itself, blackening the Braddock skies in a permanent veil of soot. Shot “entirely and proudly” (per the end credits) on 35mm Kodak film by the cinematographer Masanobu Takayanagi (“The Grey,” “Silver Linings Playbook”), the images have an ashen pallor that calls to mind William Blake and his “dark Satanic mills.” Things happen in “Out of the Furnace” with the violent, unpredictable force of life itself, rather than the reassuring rhythms of most screenplays. First, a late-night car accident lands Russell in jail on manslaughter charges, during which enough time passes for Rodney to take his fourth tour in Iraq, and for Russell’s girlfriend (Zoe Saldana) to leave him for the town sheriff (Forest Whitaker). The prison scenes carry their own brutal, unsparing power, and when Russell is finally released, Bale plays the moment remarkably, taking in a few deep breaths as if he were breathing air for the first time. These are the kind of small, character-revealing moments that Cooper, as he did in “Crazy Heart,” supplies in spades. Affleck has a lean, prowling intensity here as the combat vet who, like the bomb-disposal ace paralyzed by the choices in a suburban supermarket in “The Hurt Locker,” cannot easily readjust to civilian life. So Rodney finds himself drawn into the local bare-knuckle fight scene, where the purses are low but the pain reliably numbing. And eventually he turns to Dafoe, asking for an introduction to DeGroat and the higher-stakes fights he runs in the deep backwoods of neighboring New Jersey — a decision that will come to bind all of these disparate characters in a cycle of tragedy and vengeance, a war at home to rival the one abroad. Perhaps because he was originally an actor himself (“Gods and Generals,” “Get Low”), Cooper seems to make actors feel safe and willing to expose themselves in ways they ordinarily might not, and time and again he takes scenes to places of unexpected emotional power. Bale in particular has a series of strikingly fragile, tender moments here, forging an effortless brotherly bond with Affleck and playing a heartbreaking reunion scene with Saldana in which a lifetime of regrets and bad decisions seems to surge inside him. Harrelson is scarily effective as the movie’s hillbilly Walter White, precisely because he never descends into the lip-smacking movie villainy, always seeming — like all of the characters in “Out of the Furnace” — a product of his bleak environment. In their smaller roles, Dafoe, Whitaker and Sam Shepard (as the brothers’ grizzled uncle) all do sensitive, affecting, understated work. But unlike many actor-directors, Cooper is an equally skilled visual storyteller, staging a SWAT team raid on DeGroat’s compound with an editorial sleight-of-hand borrowed from “The Silence of the Lambs” and always fostering a vivid sense of a place cut off from time and the world. When a character first mentions Jersey, it sounds as far away as Jerusalem. Superior work by production designer Therese DePrez (“American Splendor,” “Black Swan”) and costume designers Kurt & Bart (“Stoker”) adds to the lived-in milieu. Licensed for the first time for a movie soundtrack, Pearl Jam’s “Release” (in both its original and a newly re-recorded version) bookends the film with Eddie Vedder’s wailing, soulful refrain, while composer Dickon Hinchliffe (“Winter’s Bone”) provides the moody original score.
2024-03-04T01:26:58.646260
https://example.com/article/3965
I've created a patch for this that adds a "--nostatic" option to the "runserver" management command which prevents the StaticFilesHandler from being loaded. If the option is not used, the StaticFilesHandler will be used (as it is currently on trunk at r14509). This seems like a more appropriate solution than using django.conf.settings, since it only affects the "runserver" manage command. If this patch needs additional tests or documentation, I'd be happy to help with that as well. Updated StaticFilesHandler and AdminMediaHandler to make use of the 404 handler if needed. Updated runserver management command to serve static files only in DEBUG mode (or if specified the --insecure option) and if the staticfiles app is in INSTALLED_APPS. Also added an option to disable serving completely (--nostatic). Added check in debug mode if STATICFILES_* settings are different to MEDIA_* settings. Removed a faulty PendingDeprecationWarning in AdminMediaHandler that is triggered every time runserver is used. Fixed an issue with the modification time checks when running collectstatic. Extended and refined documentation. Thanks to everyone for input, especially to Carl Meyer, Ted Kaemming and Adam Vandenberg for patches.
2023-11-27T01:26:58.646260
https://example.com/article/1796
Show HN: Oruapp – an anonymous proximity messenger for web - vasanthv https://oruapp.co ====== fiatjaf This is nice. What happens when I'm in within 0.5km from someone and from someone else, but these two other people are not within reach of each other? ~~~ vasanthv The message will be delivered only to people within 0.5km. But you can still message anyone by @mentioning their handle even-though they are not near you. Did I answer your question? ------ boniface316 I really like this feature! Whats your vision? ~~~ vasanthv The idea sparked when I went to a tech conference of 1500 attendees and there was no way to chat with the attendees.
2023-08-21T01:26:58.646260
https://example.com/article/7617
“It’s hard to imagine anyone sending hate mail to Fred Rogers, but there was one episode of Mister Rogers’ Neighborhood that brought the beloved children’s TV star a bit of blowback: ‘He did an episode about Santa Claus,’ explains filmmaker Morgan Neville. ‘And he didn’t like the idea that there was somebody who snuck into your house in the middle of the night … so he told kids the truth … and a lot of parents wrote a lot of angry letters.’ Aimed at toddlers and preschoolers, Mister Rogers’ Neighborhood made its nationwide debut in 1968 and aired for more than three decades. It’s now the subject of a new documentary called Won’t You Be My Neighbor?, directed by Neville.” M. Kelly, NPR ESL Voices Lesson Plan for this post with Answer Key Excerpt: Mister Rogers Talked Frankly With Kids About ‘Grown-Up’ Issues, By Mary Louise Kelly, NPR “Santa aside, ‘Rogers generally flew under the radar’ Neville says, even when he was engaging kids in conversations that some adults considered well beyond their years. With a toy trolley, talking puppets and a simple set, the show had low production value, but the host was cutting edge, the filmmaker explains, in respecting the emotional intelligence of children; helping them grapple with ‘grown-up’ issues such as death, divorce and disturbing current events…”Most of us have a relationship with Fred Rogers that predates our memory …’ Neville says. ‘It’s very deep in us and he speaks to us almost like our own inner child.’ On being ‘cutting edge’ in respecting the emotional maturity of children: What he’s doing is not just providing joy for children but really trying to allay fear. When he looked at children what he realized is that most adults condescend to children. When bad things happen they say, ‘Don’t worry about it,’ or ‘It wasn’t anything.’ And kids are way too smart and intuitive to not know when those things are happening. So what he decided to do is to level with kids — to really speak to them honestly and say, ‘Yes something bad happened, but let me tell you why, and let me explain it in age-appropriate terms.’ Because he really felt that fear was was the most destructive force in our society. Some Difficult Topics Mr. Rogers Discussed on His Show: On the episode when Mr. Rogers invited an African-American police officer, played by François Clemmons, to rest his feet in a wading pool on a hot day. That’s his subtle way of saying: There’s nothing wrong with sharing a pool with a person of a different race. [After Robert F. Kennedy was assassinated in 1968] Fred knew that children would be home and they would know that this bad thing had happened. And so he quickly put together an episode that aired [ahead of the televised funeral] … where he could explain to people how to speak to their children about something as horrific as an assassination. He did it again and again. He did things around the Challenger disaster, the Gulf War, 9/11, Reagan’s assassination attempt. … He really felt like it was in those moments he was really doing the best of what he wanted to do. That that’s when people really needed him.”
2024-07-27T01:26:58.646260
https://example.com/article/5800
Effect of alpha-melanocyte-stimulating hormone on tyrosinase activity in hair follicular and epidermal melanocytes of the mouse. In this study, the effect of alpha-MSH on tyrosinase activity was compared in epidermal and hair follicular melanocytes of mice. It had no effect on epidermal tyrosinase activity in dorsal skin from neonatal non-agouti black mice (C57BL/6J) in both in-vivo and in-vitro experiments. Theophylline and 8-bromocyclic (c)AMP were similarly without effect in in-vitro experiments. In-vivo administration of alpha-MSH and theophylline for 7 days was also without effect on epidermal tyrosinase activity in ear skin of adult non-agouti mice, and the same was true for alpha-MSH in wild-type agouti mice. Activation of the epidermal melanocytes in the non-agouti and wild-type agouti mice with ultraviolet radiation also failed to bring about a response to alpha-MSH and to theophylline in the case of the former. No tyrosinase activity was detected in the epidermis of viable yellow mice (C3H-HeAvy), but, as shown previously, tyrosinase activity was present in the hair follicle when the hair was actively growing and was increased in those mice given either alpha-MSH or theophylline. alpha-MSH and theophylline had no such effects on hair follicular tyrosinase activity in the non-agouti mice. The present results suggest that alpha-MSH- and cAMP-dependent mechanisms have little or no importance in the regulation of tyrosinase expression in mouse epidermal melanocytes. alpha-MSH may, however, regulate tyrosinase expression in hair follicular melanocytes, but even in these melanocytes its action may be restricted to mice that express the agouti gene.
2024-03-28T01:26:58.646260
https://example.com/article/3605
Border Walls Are Built Around The World. Here’s A Video Mashup Showing Some Of The Most Effective 10:39 AM 01/11/2019 | Video DCNF Video Team | Contributor Share Article via EmailToYour first nameMessage Walls are so effective that many countries have them on their borders. Check out this mashup video showing walls around the world. Spain has one of the most extensive border wall systems to stop illegal immigration, located all along the perimeter of Melilla, a Spanish enclave on the North African coast. The Spanish wall system consists of a 20-foot metal fence, followed by a second fence that is harder to climb. Below the second fence is barbed wire, and then a third fence that is taller and more difficult to climb, followed by more barbed wire, and that’s just the Spanish side. Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact licensing@dailycallernewsfoundation.org.
2024-01-03T01:26:58.646260
https://example.com/article/1175
abortion travel In May, Irish voters backed a proposal to amend a constitutional provision which placed a ban on abortion in most cases. But what impact is the referendum result likely to have on the Irish abortion rate in the coming years? Eoin Flaherty explains that the circumstances which drive marriage, divorce, and abortion rates are complex and are not susceptible to short-term changes in social policy. As such, it is too simplistic to assume that a change in the law will necessarily result in a direct increase in the number of abortions being carried out. Before going to the polls on 25 May, those opposed to liberalising Ireland’s abortion laws claimed the results of a successful repeal would be dire. One report on likely future scenarios from the ‘LoveBoth’ campaign, predicted an extra 5,300 abortions per year post-repeal. Due to its constitutional prohibition on abortion, Ireland does not keep reliable data on those who travel to procedure terminations, but of those who do, we are certain the majority travel to the UK. In 2017, a total of 3,092 terminations were procured by Irish women, constituting 64% of all terminations sought in England and Wales by non-residents. Ireland’s abortion battle shows we must never let the fundamentalists win Women have paid a terrible price for a law that gives the unborn the same rights as mothers Suzanne Moore Thu 8 Mar 2018 It’s a bugger when your flight is cancelled. It’s worse, I imagine, if you’re having to travel to another country to have an abortion. Time and money matter. When I saw that the recent snow had grounded flights from Ireland I immediately thought of this. Maybe I have never forgotten the time I sat next to an anxious young woman on a flight from Dublin who began to tell me why she was coming to London but couldn’t finish her sentences. She was just so alone that I wanted to go to the clinic with her. In the old days I remember seeing such women on the ferries. Irish women have abortions, you see – they just don’t have them in their own country. Currently about nine women a day travel to the UK for terminations. Irish society knows of this export of hypocrisy, yet it continues to export its responsibility for human rights. Women pay the price. 300 to 400 Maltese women go abroad for an abortion each year - AD chairperson Rebecca Iversen Sunday 4 February 2018 Approximately 300 to 400 Maltese women go abroad to have an abortion each year, according to AD chairperson Carmel Cacopardo. Speaking during an activity organized by the Malta Unborn Child Movement, Cacopardo said official statistics only exist for the UK. Annual medical reports in the UK show that some 60 Maltese women a year have an abortion performed in that country. These numbers, however, do not include abortions performed in Italy (mainly Catania, Rome and Milan but also other locations) as well as Germany, the Netherlands, Belgium and others to obtain an abortion. Irish People Flying Home For Christmas Are Sharing An Important Message About Abortion Luggage tags that read "healthcare not airfare" aim to highlight the fact that every year, thousands of women travel from Ireland and Northern Ireland to Britain to get abortions. Posted on December 21, 2017 Laura Silver, BuzzFeed News Reporter Irish people travelling home for Christmas are labelling their suitcases with "healthcare not airfare" luggage tags to highlight the number of women who travel to Britain for an abortion, which is illegal in Ireland and Northern Ireland. Many people have been sharing pictures of their luggage tags on social media using the hashtag "Choice4Xmas". Abortion is still illegal in this country Fifty years after the Abortion Act, women are still dying from being denied basic services, write activists from Feminist Fightback November 15, 2017 On the eve of the 50th anniversary of the Abortion Act, activists from Feminist Fightback found ourselves dressed as flight attendants, transforming the London Overground into the cabin of an Abortion Airlines Boeing 67. We distributed our own version of inflight safety cards and presented a special inflight safety announcement, advising passengers that ‘the exits…lead to an unsafe backstreet abortion and possible death…please assume the brace position for the duration of this Abortion Airlines flight”. We were met with whoops and cheers from passengers who, like us, are appalled by the fact that the Act still does not extend to the North of Ireland and that at least two people per day have to board a flight to travel to England to terminate a pregnancy. Fifty years on from the Abortion Act there are still people living in the UK denied this basic human right. This includes many migrants who, as NHS charges are introduced and health workers legally obligated to check immigration status, are deterred from accessing both abortion and maternity services. New Leader Of Green Party Against Abortion But In Favour Of Healthy Debate 'Nothing is ever static in politics' Tim Diacono 20th September, 2017 In a relatively radical stance for Maltese politics, the new leader of green party Alternattiva Demokratika has said a national debate on abortion would be healthy for society... even though he is personally against its introduction. Malta has the most restrictive abortion laws in the world but several Maltese women travel abroad to get an abortion every year. Despite the island's small population, official statistics show the number of Maltese women who travelled to the UK for an abortion in 2015 was the fifth highest in the world. To understand abortion travel, you have to be thereThe ‘Not At Home’ exhibition is an attempt to recreate the experience of the 170,000 Irish women who have travelled abroad for abortions Róisín Ingle Aug 28, 2017 Last year theatre makers Grace Dyas and Emma Fraser came to me with a big idea. They had plans to recreate the experience of the just over 170,000 Irish women who over the past few decades have had to travel out of Ireland for safe abortion services. It would be a “durational art installation” open to the public. It would feature video and live performances. There was talk of “soundscapes”. I did not immediately fall in love with the big idea. Ireland’s abortion regime to be scrutinised by British politicians Inquiry will focus on issues relating to women travelling from Ireland to Britain July 18, 2017 Mary Minihan A fresh inquiry into Ireland’s abortion regime will be undertaken by a group of British and Irish politicians. A committee of the British-Irish Parliamentary Assembly, chaired by former Northern Ireland Office minister Lord Alfred Dubs, will focus on issues relating to women travelling from Ireland to Britain to seek terminations. Lord Dubs announced the inquiry into the “cross-jurisdictional” implications of abortion policy at the assembly meeting in Kilkenny on Tuesday.
2024-04-15T01:26:58.646260
https://example.com/article/1335
Q: How to keep the shell window open after running a PowerShell script? I have a very short PowerShell script that connects to a server and imports the AD module. I'd like to run the script simply by double clicking, but I'm afraid the window immediately closes after the last line. How can I sort this out? A: You basically have 3 options to prevent the PowerShell Console window from closing, that I describe in more detail on my blog post. One-time Fix: Run your script from the PowerShell Console, or launch the PowerShell process using the -NoExit switch. e.g. PowerShell -NoExit "C:\SomeFolder\SomeScript.ps1" Per-script Fix: Add a prompt for input to the end of your script file. e.g. Read-Host -Prompt "Press Enter to exit" Global Fix: Change your registry key by adding the -NoExit switch to always leave the PowerShell Console window open after the script finishes running. Registry Key: HKEY_CLASSES_ROOT\Applications\powershell.exe\shell\open\command Description: Key used when you right-click a .ps1 file and choose Open With -> Windows PowerShell. Default Value: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "%1" Desired Value: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "& \"%1\"" Registry Key: HKEY_CLASSES_ROOT\Microsoft.PowerShellScript.1\Shell\0\Command Description: Key used when you right-click a .ps1 file and choose Run with PowerShell (shows up depending on which Windows OS and Updates you have installed). Default Value: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-Command" "if((Get-ExecutionPolicy ) -ne 'AllSigned') { Set-ExecutionPolicy -Scope Process Bypass }; & '%1'" Desired Value: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoExit "-Command" "if((Get-ExecutionPolicy ) -ne 'AllSigned') { Set-ExecutionPolicy -Scope Process Bypass }; & \"%1\"" See my blog for more information and a script to download that will make the registry change for you. A: Errr... I should have known: powershell -noexit <path\script> and that's all there's to it :) A: The solution below prevents the script from closing when running Powershell ISE and allows the script to close otherwise. # If running in the console, wait for input before closing. if ($Host.Name -eq "ConsoleHost") { Write-Host "Press any key to continue..." $Host.UI.RawUI.ReadKey("NoEcho,IncludeKeyUp") > $null }
2024-02-16T01:26:58.646260
https://example.com/article/8111
High-pressure synthesis of nu-DyBO3. nu-Dysprosium borate (nu-DyBO(3)) was synthesized under conditions of high temperature and pressure in a Walker-type multi-anvil apparatus at 3 GPa and 1323 K. The compound is isotypic with the already known nu-samarium and nu-europium orthoborates.
2024-01-16T01:26:58.646260
https://example.com/article/2431
(1) Field of the Invention The present invention relates to a trailer having a tilting bed which allows for easier loading and unloading of the trailer. In particular, the present invention relates to a trailer having a tilting bed constructed of two portions which are pivotably connected together. A pulley and cable system allows for easier raising and lowering of the back portion of the bed of the trailer. (2) Description of the Related Art The related art has shown various trailers having tilting or pivoting beds. Illustrative are U.S. Pat. No. 2,745,567 to Groves; U.S. Pat. No. 3,460,696 to Owen, Jr. and U.S. Pat. No. 5,051,053 to Groeneweg. Groves describes a boat trailer having a base frame and a boat frame pivotably mounted on the axle of the trailer. The boat frame and base frame are tilted about the axle by increasing the tension on a cord which is engaged at one end to the connection of the horizontal boat frame arm with the vertical arm of the boat frame and at the other end to a pulley. Rotation of a winch having the pulley pivots the boat frame and base frame upwardly. Owen, Jr. shows a trailer with a tail gate which can be used as a ramp. When the tail gate is being used as a ramp, a cable and a side winch may be used to raise and lower the tail gate. Groeneweg shows a trailer having a tilting bed which is pivotably connected directly above the axle of the trailer. Also of interest are U.S. Pat No. 2,230,014 to Raven; U.S. Pat. No. 3,860,255 to Rodriguez; U.S. Pat. No. 4,490,089 to Welker; 4,659,100 to Welker; 4,685,855 to Celli; U.S. Pat. No. 5,308,213 to Gilbertson; U.S. Pat. No. 5,474,416 to Rogge et al and U.S. Pat. No. 5,649,802 to Babcock which show trailers having beds which can be completely lowered onto the ground surface. In particular, Rodriguez shows a trailer having a bed fixed to a secondary frame where the secondary frame is able to be lowered to lie flat on the ground while the main frame pivots about the axis of the wheels and assumes a forwardly upwardly extending altitude. In addition, Welker shows a trailer where the main load supporting member (bed) is lowered to ground level by raising the main structure portion of the trailer. Further, Gilbertson shows a trailer where the front end of the frame tilts to allow the front end of the support bed to be lowered to the ground. Only of minimal interest are U.S. Pat. No. 2,856,091 to Johnson; U.S. Pat. No. 2,990,966 to Schramm and U.S. Pat. No. 3,901,398 to Bunch which show trailers having pivot points on the trailer frame which allow for tilting the bed for easier loading and unloading. There remains the need for a trailer having a tiltable bed which allows for easily raising and lowering of the bed without having to disconnect the trailer hitch from the vehicle and which allows for the use of minimal force to tilt the bed by using a long lever arm and by tilting only a back portion of the bed.
2023-10-24T01:26:58.646260
https://example.com/article/5536
NOT RECOMMENDED FOR FULL-TEXT PUBLICATION File Name: 07a0399n.06 Filed: June 14, 2007 No. 06-3754 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT UNITED STATES OF AMERICA, ) ) Plaintiff-Appellee, ) ) v. ) ON APPEAL FROM THE UNITED ) STATES DISTRICT COURT FOR THE KENYATTA JACKSON, ) SOUTHERN DISTRICT OF OHIO ) Defendant-Appellant. ) Before: ROGERS and COOK, Circuit Judges; and DOWD, District Judge.* COOK, Circuit Judge. Kenyatta Jackson pleaded guilty to one count of possessing with intent to distribute more than five grams of crack cocaine, in violation of 21 U.S.C. § 841(a) and (b)(1)(B)(iii), and to one count of possession of a firearm in furtherance of a drug trafficking crime, in violation of 18 U.S.C. § 924(c)(1)(A)(i). Jackson appeals the district court’s denial of his motion to withdraw his guilty plea and his motion to suppress his post-Miranda confession. We affirm. I * The Honorable David Dudley Dowd, Jr., Senior United States District Judge for the Northern District of Ohio, sitting by designation. No. 06-3754 U.S. v. Jackson Jackson went to the Westside Child Daycare Center and handed a box to a school employee for safekeeping. The employee opened the box, saw a gun inside, closed it, and called the Columbus police. Jackson saw the officers arrive and ran to the basement to hide. He hid a bag of crack cocaine and his gun there before attempting to leave the school. The police caught Jackson, arrested him, and placed him in a police cruiser. They searched the school and found the loaded gun and crack in the daycare basement. While in the back of the police cruiser, Officer Christine Nemchev told Jackson, who had yet to be given his Miranda warnings, that he might as well come clean. Jackson told the officer that the school employee had no right to look in the box he gave her. Two hours later, the Columbus Police Department’s (CPD) liaison to the ATF, Brett Slaughter, and an ATF special agent, Beth Dallas, interviewed Jackson at CPD headquarters. They first advised him of his Miranda rights and, after he waived them, ensured that the waiver was knowing and voluntary. Jackson confessed to Dallas and Slaughter and indicated his desire to cooperate with law enforcement. After he was indicted, Jackson moved to suppress the statements in the cruiser and his confession to Dallas and Slaughter. The district court granted his motion with respect to the cruiser statements and denied it with respect to his confession. Jackson initially pleaded not guilty, but later accepted a charge bargain. He entered an unconditional plea to possessing crack with intent to distribute and possessing the gun in furtherance of a drug trafficking crime. After Jackson pleaded guilty, his counsel moved to withdraw, and he -2- No. 06-3754 U.S. v. Jackson was appointed new counsel. Before sentencing, he moved to withdraw his guilty plea. The district court denied the motion, finding that Jackson had failed to establish a fair and just reason under Rule 11(d)(2)(B), and sentenced him to 120 months. He now appeals both the denial of his motion to suppress and the denial of his motion to withdraw his plea. II We review a “district court’s denial of a motion to withdraw a guilty plea for abuse of discretion.” United States v. Dixon, 479 F.3d 431, 436 (6th Cir. 2007) (citing United States v. Pluta, 144 F.3d 968, 973 (6th Cir. 1998)). After the district court accepts the plea, a defendant may withdraw that plea before he is sentenced only if he “can show a fair and just reason for requesting the withdrawal.” Fed. R. Crim. P. 11(d)(2)(B); see United States v. Quinlan, 473 F.3d 273, 276 (6th Cir. 2007). Jackson bears the “burden to demonstrate that proper grounds exist for the granting of such a motion.” Dixon, 479 F.3d at 436 (citing United States v. Triplett, 828 F.2d 1195, 1197 (6th Cir. 1987)). We look to seven factors when deciding whether a defendant can provide a “fair and just” reason for withdrawing his plea: (1) the amount of time that elapsed between the plea and the motion to withdraw it; (2) the presence (or absence) of a valid reason for the failure to move for withdrawal earlier in the proceedings; (3) whether the defendant has asserted or maintained his innocence; -3- No. 06-3754 U.S. v. Jackson (4) the circumstances underlying the entry of the guilty plea; (5) the defendant’s nature and background; (6) the degree to which the defendant has had prior experience with the criminal justice system; and (7) potential prejudice to the government if the motion to withdraw is granted. Dixon, 479 F.3d at 436 (quoting Pluta, 144 F.3d at 973); accord Quinlan, 473 F.3d at 276-77; United States v. Ellis, 470 F.3d 275, 281 (6th Cir. 2006); United States v. Bashara, 27 F.3d 1174, 1181 (6th Cir. 1994). Although the district court used a five-factor test, see, e.g., United States v. Riascos-Suarez, 73 F.3d 616, 621 (6th Cir. 1996), the two tests are virtually identical, and we will apply the seven-factor test set forth above. Jackson’s primary reason for asking the court to allow him to withdraw his plea is rooted in the fourth factor—circumstances underlying the plea. He argues that the district court erred by misstating the § 924(c) elements during the plea colloquy when it explained, “Count 2, the charge of possession of a firearm in furtherance of a drug trafficking crime, the elements are as follows: first that you knowingly possessed a firearm, and, second, the possession was in furtherance of or was possessed to aid in the commission of a drug trafficking crime . . . .” Section 924(c) prohibits using a firearm in furtherance of a drug trafficking crime or carrying a firearm during and in relation to a drug trafficking offense. United States v. Combs, 369 F.3d 925, 932 (6th Cir. 2004). Jackson argues that the district court’s adding of the phrase “aid in the commission of” erroneously described the § 924(c) elements. The government counters that the -4- No. 06-3754 U.S. v. Jackson phrase merely defines “in furtherance of.” We have interpreted “in furtherance of” to require a specific nexus between the gun and the crime charged. See, e.g., Combs, 369 F.3d at 933; United States v. Mackey, 265 F.3d 457, 462 (6th Cir. 2001). The gun must advance, promote, or facilitate the crime. See Mackey, 265 F.3d at 461; United States v. Paige, 470 F.3d 603, 609 (6th Cir. 2006). While § 924(c) does not read as the district court said, there seems little light between “aid” and “furtherance” in this context, and any error strikes us as minor. Jackson does not allege any specific confusion as a result of the district court’s technical misstatement of the § 924(c) elements. He does not explain what he thought “aid” meant and how that might be different than “furtherance,” and, even assuming the district court’s recitation of the § 924(c) elements actually confused him, why he would have pleaded guilty to possessing a gun to aid the commission of a drug offense but not to possessing a gun to further a drug offense. Nor should the district court’s misstatement be examined in a vacuum. The indictment alleged that Jackson “did knowingly possess a firearm . . . in furtherance of a drug trafficking crime.” During the plea colloquy, the district court asked Jackson whether he had been furnished with the indictment, whether he understood the nature and meaning of the crimes, whether he discussed the crimes with his attorney, and whether his attorney fully advised him of the nature and meaning of the crimes. Jackson answered “yes” to each of these questions. He also admitted the factual basis of the § 924(c) charge. Furthermore, in his plea agreement, Jackson agreed in writing to plead guilty to “possession of a firearm in furtherance of a drug trafficking crime.” -5- No. 06-3754 U.S. v. Jackson Although we agree with Jackson that the district court should not have inserted the language “to aid in the commission of,” his task is to provide us a reason to allow him to withdraw his plea. We recognize the possibility of a district court so misstating the elements of a crime that a defendant could rightly complain that he did not know to which offense he was pleading guilty. See United States v. Gandia-Maysonet, 227 F.3d 1, 3-5 (1st Cir. 2000) (allowing a defendant to withdraw his plea where the trial court repeatedly misstated the scienter element). The misstatement here was far less serious than the one in Gandia, and Jackson has not shown how the district court’s alleged error actually prejudiced him.1 Simply put, the circumstances underlying the plea do not warrant allowing Jackson to withdraw it. The amount of time between Jackson’s entry of the plea and his motion to withdraw—forty days—also militates against allowing withdrawal. Generally, the shorter a defendant’s delay between entering a plea and moving to withdraw it, the more favorably disposed the court is to withdrawal. Conversely, “a defendant’s reasons for [moving to withdraw a plea] will be more closely scrutinized when he has delayed his motion for a substantial length of time.” Ellis, 470 F.3d 1 In his brief, Jackson mentioned Rule 11(b)(1)(G) (requiring district courts to explain “the nature of each charge to which the defendant is pleading”), although he requested only that he be allowed to withdraw his plea under Rule 11(d)(2)(B). At oral argument, Jackson’s counsel relied primarily on Rule 11(b)(1)(G) and suggested relief under that section would be appropriate as well. A defendant may request that an appellate court vacate a guilty plea for failure to comply with Rule 11(b). Jackson has not argued for such relief except cursorily. See Meridia Prods. Liab. Litig. v. Abbott Labs., 447 F.3d 861, 868 (6th Cir. 2006) (declining to consider an inadequately developed argument). That said, because Jackson failed to object contemporaneously, we would review for plain error. United States v. McCreary-Redd, 475 F.3d 718, 721 (6th Cir. 2007). And given that we find no prejudice, any Rule 11(b)(1)(G) error would not permit us to vacate Jackson’s plea. -6- No. 06-3754 U.S. v. Jackson at 281 (quoting United States v. Baez, 87 F.3d 805, 808 (6th Cir. 1996)). Numerous decisions of this court have found that delays on the order of forty days weigh against granting the motion to withdraw. See, e.g., United States v. Valdez, 362 F.3d 903, 912 (6th Cir. 2004) (seventy-five days); United States v. Durham, 178 F.3d 796, 798-99 (6th Cir. 1999) (seventy-seven days); Baez, 87 F.3d at 808 (sixty-seven days); Bashara, 27 F.3d at 1181 (forty-six days); United States v. Goldberg, 862 F.2d 101, 104 (6th Cir. 1988) (fifty-five days); United States v. Spencer, 836 F.2d 236, 239 (6th Cir. 1987) (thirty-six days). None of the other Dixon factors supports allowing Jackson to withdraw his plea. Other than a generalized complaint about his counsel, Jackson offers no specific reason why he failed to withdraw his plea earlier. Furthermore, we will not read Jackson’s not-guilty plea as an assertion of innocence within the meaning of the third factor. Finally, we note that Jackson’s lack of formal education is not a reason to excuse a guilty plea, especially considering his veteran status with the criminal justice system. And given that the first six factors weigh against allowing Jackson to withdraw his plea, we need not consider the seventh factor—prejudice to the government. See United States v. Lineback, 330 F.3d 441, 445 (6th Cir. 2003) (Gilman, J., concurring) (“[W]here a defendant fails to show [a reason for withdrawing his plea], the court need not consider . . . whether the withdrawal would prejudice the government.” (citing United States v. Alexander, 948 F.2d 1002, 1004 (6th Cir. 1991))). -7- No. 06-3754 U.S. v. Jackson Jackson bears the burden to show a fair and just reason that would entitle him to withdraw his guilty plea under Rule 11(d)(2)(B). We agree with the district court’s exercise of discretion here in finding Jackson failed to carry his burden. III Jackson also appeals the district court’s denial of his motion to suppress. Jackson, however, did not enter a conditional guilty plea, Fed. R. Crim. P. 11(a)(2), which would have allowed him to appeal “an adverse ruling on a pre-plea motion to suppress evidence.” United States v. Bell, 350 F.3d 534, 535 (6th Cir. 2003). Jackson waived his right to appeal this ruling, and we affirm on that basis. IV Because the district court properly denied Jackson’s motion to withdraw his guilty plea and Jackson has waived his right to appeal the denial of the suppression motion, we affirm the judgment of conviction. -8-
2023-12-16T01:26:58.646260
https://example.com/article/2404
export class Product { constructor( public id: number, public title: string, public price: number, public rating: number, public description: string, public categories: Array<string>) { } } export class ProductService { getProducts(): Array<Product> { return products.map(p => new Product(p.id, p.title, p.price, p.rating, p.description, p.categories)); } } var products = [ { "id": 0, "title": "First Product", "price": 24.99, "rating": 4.3, "description": "This is a short description. Lorem ipsum dolor sit amet, consectetur adipiscing elit.", "categories": ["electronics", "hardware"] }, { "id": 1, "title": "Second Product", "price": 64.99, "rating": 3.5, "description": "This is a short description. Lorem ipsum dolor sit amet, consectetur adipiscing elit.", "categories": ["books"] }, { "id": 2, "title": "Third Product", "price": 74.99, "rating": 4.2, "description": "This is a short description. Lorem ipsum dolor sit amet, consectetur adipiscing elit.", "categories": ["electronics"] }, { "id": 3, "title": "Fourth Product", "price": 84.99, "rating": 3.9, "description": "This is a short description. Lorem ipsum dolor sit amet, consectetur adipiscing elit.", "categories": ["hardware"] }, { "id": 4, "title": "Fifth Product", "price": 94.99, "rating": 5, "description": "This is a short description. Lorem ipsum dolor sit amet, consectetur adipiscing elit.", "categories": ["electronics", "hardware"] }, { "id": 5, "title": "Sixth Product", "price": 54.99, "rating": 4.6, "description": "This is a short description. Lorem ipsum dolor sit amet, consectetur adipiscing elit.", "categories": ["books"] } ];
2023-08-02T01:26:58.646260
https://example.com/article/7565
// // Created by kangd on 16.03.18. // #include "DartWorld.hpp" namespace dart_sim { DartWorld::DartWorld(SolverOption solverOption, CollisionDetectorOption detectorOption) : dynamicsWorld_(std::make_shared<dart::simulation::World>()), solverOption_(solverOption) { dynamicsWorld_->setGravity(gravity_); /// contact solver if(solverOption == SOLVER_LCP_DANTZIG) { dynamicsWorld_->getConstraintSolver()->setLCPSolver( dart::common::make_unique<dart::constraint::DantzigLCPSolver>(dynamicsWorld_->getTimeStep()) ); } else if(solverOption == SOLVER_LCP_PGS) { dynamicsWorld_->getConstraintSolver()->setLCPSolver( dart::common::make_unique<dart::constraint::PGSLCPSolver>(dynamicsWorld_->getTimeStep()) ); } else { RAIFATAL("invalid solver type for dart") } /// collision detector if(detectorOption == COLLISION_DETECTOR_FCL) { dynamicsWorld_->getConstraintSolver()->setCollisionDetector( dart::collision::FCLCollisionDetector::create() ); } else if(detectorOption == COLLISION_DETECTOR_BULLET) { dynamicsWorld_->getConstraintSolver()->setCollisionDetector( dart::collision::BulletCollisionDetector::create() ); } else if(detectorOption == COLLISION_DETECTOR_ODE) { dynamicsWorld_->getConstraintSolver()->setCollisionDetector( dart::collision::OdeCollisionDetector::create() ); } else if(detectorOption == COLLISION_DETECTOR_DART) { dynamicsWorld_->getConstraintSolver()->setCollisionDetector( dart::collision::DARTCollisionDetector::create() ); } else { RAIFATAL("invalid collision detector type for dart") } } DartWorld::~DartWorld() { // remove objects for (auto *ob: objectList_) delete ob; } object::DartSphere *DartWorld::addSphere(double radius, double mass, benchmark::CollisionGroupType collisionGroup, benchmark::CollisionGroupType collisionMask) { auto *sphere = new dart_sim::object::DartSphere(radius, mass, objectList_.size()); dynamicsWorld_->addSkeleton(sphere->getSkeletonPtr()); objectList_.push_back(sphere); return sphere; } object::DartBox *DartWorld::addBox(double xLength, double yLength, double zLength, double mass, benchmark::CollisionGroupType collisionGroup, benchmark::CollisionGroupType collisionMask) { auto *box = new dart_sim::object::DartBox(xLength, yLength, zLength, mass, objectList_.size()); dynamicsWorld_->addSkeleton(box->getSkeletonPtr()); objectList_.push_back(box); return box; } object::DartCapsule *DartWorld::addCapsule(double radius, double height, double mass, benchmark::CollisionGroupType collisionGroup, benchmark::CollisionGroupType collisionMask) { auto *capsule = new dart_sim::object::DartCapsule(radius, height, mass, objectList_.size()); dynamicsWorld_->addSkeleton(capsule->getSkeletonPtr()); objectList_.push_back(capsule); return capsule; } object::DartCheckerBoard *DartWorld::addCheckerboard(double gridSize, double xLength, double yLength, double reflectanceI, bo::CheckerboardShape shape, benchmark::CollisionGroupType collisionGroup, benchmark::CollisionGroupType collisionMask) { auto *checkerBoard = new dart_sim::object::DartCheckerBoard(xLength, yLength, shape, objectList_.size()); dynamicsWorld_->addSkeleton(checkerBoard->getSkeletonPtr()); objectList_.push_back(checkerBoard); return checkerBoard; } object::DartCylinder *DartWorld::addCylinder(double radius, double height, double mass, benchmark::CollisionGroupType collisionGroup, benchmark::CollisionGroupType collisionMask) { auto *cylinder = new dart_sim::object::DartCylinder(radius, height, mass, objectList_.size()); dynamicsWorld_->addSkeleton(cylinder->getSkeletonPtr()); objectList_.push_back(cylinder); return cylinder; } object::DartArticulatedSystem *DartWorld::addArticulatedSystem(std::string urdfPath, benchmark::CollisionGroupType collisionGroup, benchmark::CollisionGroupType collisionMask) { auto *robot = new dart_sim::object::DartArticulatedSystem(urdfPath); dynamicsWorld_->addSkeleton(robot->getSkeletonPtr()); objectList_.push_back(robot); return robot; } void DartWorld::setGravity(const benchmark::Vec<3> &gravity) { gravity_[0] = gravity[0]; gravity_[1] = gravity[1]; gravity_[2] = gravity[2]; dynamicsWorld_->setGravity(gravity_); } void DartWorld::integrate() { // clear contact problem list contactProblemList_.clear(); // step dynamicsWorld_->step(); // collision const dart::collision::CollisionResult &collisions = dynamicsWorld_->getLastCollisionResult(); contactProblemList_.reserve(collisions.getNumContacts()); for(int i = 0; i < collisions.getNumContacts(); i++) { const dart::collision::Contact &contact = collisions.getContact(i); contactProblemList_.emplace_back(contact.point, contact.normal, contact.force); } } void DartWorld::setTimeStep(double timeStep) { timeStep_ = timeStep; dynamicsWorld_->setTimeStep(timeStep); } int DartWorld::getNumObject() { return objectList_.size(); } void DartWorld::setMaxContacts(int maxContacts) { dynamicsWorld_->getConstraintSolver()->getCollisionOption().maxNumContacts = maxContacts; } const std::vector<Single3DContactProblem> &DartWorld::getCollisionProblem() { return contactProblemList_; } void DartWorld::integrate(double dt) { RAIFATAL("use setTimeStep(double dt) + integrate() instead") } void DartWorld::integrate1(double dt) { RAIFATAL("not supported for dart") } void DartWorld::integrate2(double dt) { RAIFATAL("not supported for dart") } } // dart_sim
2023-08-01T01:26:58.646260
https://example.com/article/8202
Q: Setting "scrollTop" for overflowing element via HTML/CSS (without javascript) Suppose I have the following html: <div style="width:200px;height:200px;overflow:scroll"> ... </div> If the stuff in this div ends up overflowing, the most popular way to change the scrolling position of this item is to use jQuery.scrollTop(). However, I have a situation where I would like to set the initial scroll position of the div using the source HTML. Is there a way of doing this? All examples I see online for doing this end up using javascript. One way I tried is to write a scrollTop property on the element, like so: <div scrollTop=20 style="width:200px;height:200px;overflow:scroll"> ... </div> However, this does not work. Surely, there must be a way to set the initial scrolling position of an overflowing item via HTML/CSS... Here is a full version of this code that illustrates that it doesn't work- The vertical scrollbar remains at "0": http://jsfiddle.net/gueBZ/1/ Can anyone help me to make it work? Thanks so much for any pointers! A: <div style="width:200px;height:200px;overflow:scroll"> <br><br><br><br><br><br><br><br><br><br><br><br><br><br> <div id="hello">autoscroll here</div> <br><br><br><br><br><br><br><br><br><br><br><br><br><br> </div> then open the page as page.html#hello this is the only thing you can do, with HTML only
2023-11-16T01:26:58.646260
https://example.com/article/8290
The typical Five Brothers Project Manager salary is $17. Project Manager salaries at Five Brothers can range from $14-$20. This estimate is based upon 3 Five Brothers Project Manager salary report(s) provided by employees or estimated based upon statistical methods. See all Project Manager salaries to learn how this stacks up in the market.
2024-01-03T01:26:58.646260
https://example.com/article/4326
1. Introduction {#s0005} =============== Mucormycosis and Aspergillosis are rare, life-threatening fungal infections with mortality rates reported to be over 50% despite surgical debridement and antifungal therapy [@bib1], [@bib2]. *Rhizopus arrhizus*, which is responsible for 70% of all cases of mucormycosis, is associated with a number of clinical diseases (rhino-orbital-cerebral, cutaneous, gastric, and pulmonary mucormycosis) in adults [@bib1]. This fungal infection is particularly recognized worldwide by the healthcare community due to its highly pathogenic nature, which is characterized by rapid tissue destruction and invasion across tissue planes [@bib3]. The major risk factors for mucormycosis include uncontrolled diabetes mellitus with ketoacidosis, hematological malignancy, stem cell and solid organ transplantations, iron chelation therapy with deferoxamine, and corticosteroid usage [@bib3]. The diagnosis of mucormycosis is usually made by the identification of causative fungal organisms by histopathological analysis of tissue specimens from patients with suggestive signs and symptoms [@bib3]. Cultures are only occasionally positive [@bib3]. Initial treatment of mucormycosis typically requires early aggressive surgical debridement of infected tissues, combined with administration of amphotericin B deoxycholate (Amb) or liposomal amphotericin B (L-AmB) [@bib3]. *Aspergillus fumigatus* is responsible for over 70% of all cases of invasive aspergillosis [@bib4]. Invasive aspergillosis usually occurs in immunosuppressed patients such as those receiving chronic corticosteroid treatment or with prolonged neutropenia from malignancy [@bib2], [@bib4]. Other risk factors for infection include chronic obstructive pulmonary disease and hepatic cirrhosis [@bib2]. The diagnosis of proven, probable, or possible invasive aspergillosis is made by the combination of host status, imaging and mycological findings [@bib5]. The optimal treatment of aspergillosis is administration of voriconazole or isavuconazole, which must be used with caution in patients with hepatic cirrhosis [@bib2], [@bib4]. Here, we report a patient with decompensated hepatic cirrhosis who had combined invasive pulmonary mucormycosis and aspergillosis. To our knowledge, this is the first report of invasive pulmonary mucormycosis in a decompensated cirrhotic patient who did not have concomitant diabetes mellitus. 2. Case {#s0010} ======= A 58-year old homeless male was found unresponsive in a parking lot and was taken by ambulance to our emergency department (ED). The patient was minimally responsive and able to state only his name; no additional history could be obtained. Initial vital signs in the ED demonstrated a temperature of 37.1 °C, heart rate of 157 beats per minute, respiratory rate of 35 per minute, oxygen saturation of 78% while breathing 15 l of oxygen per minute via face mask, and blood pressure of 80/49 mmHg. On examination, he was ill appearing, icteric, and in respiratory distress. The patient had tachycardia, but no cardiac murmurs. Rales were heard at both lung bases. The entire right lower extremity was erythematous and there was extensive necrosis of the soft tissues extending from the hindfoot to the proximal thigh. Pertinent laboratory studies on initial presentation revealed a white blood cell count of 19.2 × 10^3^ cells/µm^3^, platelets of 19 × 10^3^ cells/µm^3^, bicarbonate of 21 mEq/L, blood urea nitrogen of 67 mg/dL, creatinine of 1.23 g/dL, random glucose of 120 mg/dL, total bilirubin of 10.3 mg/dL, direct bilirubin of 6.1 mg/dL, alanine transaminase of 66 U/L, aspartate transaminase of 116 U/L, albumin of 1.4 g/dL, prothrombin time of 34, international normalized ratio of 3.3, partial thromboplastin time of 47 U/L, creatine phosphokinase of 851 U/L, and lactate of 3.3 mg/dL. A portable chest radiograph (CXR) showed patchy bibasilar infiltrates. Computed tomography (CT) of the chest revealed bilateral ground-glass opacities and infiltrates that were more extensive in the right lung ([Fig. 1](#f0005){ref-type="fig"}A).Fig. 1Coronal images (slices) from CT of chest scans on days 1 (A), 16 (B), and 23 (C) of hospitalization demonstrating the progression of the infiltrates in the right lung.Fig. 1 The patient was treated with aggressive intravenous (IV) fluid hydration and vasopressors (norepinephrine, vasopressin, and epinephrine) for septic shock. He underwent tracheal intubation for acute hypoxic respiratory failure. The patient received empiric antibiotic treatment with IV vancomycin, piperacillin-tazobactam, and clindamycin. The patient was taken to the operating room where a right above-the-knee amputation was performed for his necrotizing soft tissue infection on day 0. The patient\'s postoperative course was complicated by refractory septic shock requiring multiple vasopressors, acute anuric renal failure necessitating hemodialysis, bilateral chest tube drainage of pleural effusions, worsening liver failure, and progressive hypoxia requiring mechanical ventilation. On day+ 2, the patient underwent surgical disarticulation of his right hip to remove residual necrotic infected tissue. The intraoperative wound cultures grew methicillin-sensitive *Staphylococcus aureus* and *Proteus penneri*. On day+ 4, 1/4 bottles of the blood cultures grew *Aerococcus* species and *Staphylococcus epidermidis*. All four organisms were sensitive to vancomycin and/or piperacillin-tazobactam. No fungal organisms were seen on histopathological analysis of infected tissue and none were isolated from the cultured material. The patient continued to deteriorate after surgery. On day+ 10, given the continued refractory septic shock and bibasilar patchy infiltrates seen on CXR, a bronchoalveolar lavage (BAL) was performed, and thick frothy respiratory secretions with pus were seen. Gram stain and bacterial culture of the BAL specimen were negative, and Xpert^®^ MTB/RIF (Cepheid, Sunnyvale, CA) PCR of the sputum was negative for tuberculosis. Cytopathology was not performed. On day+ 12, an infectious diseases consultation was obtained. On initial evaluation, it was noted that the patient had a positive serum 1,3 β-D glucan (\> 500, normal \< 60). Empiric antifungal treatment with IV micafungin was initiated. Serum galactomannan, cryptococcal antigen, and coccidiomycosis complement fixation tests were negative, as was the urine histoplasma antigen test. On day+ 16, a repeat CT scan of the chest revealed worsening of right lung patchy infiltrates ([Fig. 1](#f0005){ref-type="fig"}B). A repeat BAL was performed on day+ 18, and thick frothy respiratory secretions were again seen. A bronchoscopic biopsy was not performed because of the patient\'s coagulopathy and thrombocytopenia. Nonseptate hyphae were seen on cytologic analysis of the repeat BAL specimen ([Fig. 2](#f0010){ref-type="fig"}). The *Aspergillus* galactomannan assay of the BAL fluid was also positive (6.78, normal \< 0.5), and IV voriconazole was initiated on day+ 19. A rapidly growing mold grew in cultures of both the BAL sample and a swab from the right chest tube site; the specimens were sent to an outside reference laboratory for identification.Fig. 2Nonseptate hyphae from BAL cytology specimen (original magnification X 400).Fig. 2 The patient continued to deteriorate. On day+ 21, when the total bilirubin increased to 23.5 mg/dL, the micafungin and voriconazole were discontinued and IV L-AmB (5 mg/kg daily) was initiated. On day+ 23, a CT scan of the chest showed worsening of the infiltrates in the right lung ([Fig. 1](#f0005){ref-type="fig"}C). In addition, a second mold grew in BAL fungal culture. This mold had septate hyphae and conidia, but was not sent for identification. The patient expired on day+ 25. Four days later, the rapidly growing mold from the BAL and right chest tube insertion site was identified as *R. arrhizus*, indicating the presence of invasive pulmonary mucormycosis. 3. Discussion {#s0015} ============= The data indicate that this patient had both invasive pulmonary mucormycosis and aspergillosis. The diagnosis of mucormycosis was made by the isolation of *R. arrhizus* from cultures of the BAL fluid and chest tube insertion site, and the finding of broad non-septate hyphae on the BAL cytology specimen. The patient also met the diagnostic criteria for probable invasive pulmonary aspergillosis based on his clinical presentation, the growth from the BAL culture of a second fungus with septate hyphae and conidia that resembled *Aspergillus* based on colony and microscopic morphologies, and positive BAL galactomannan and serum 1,3 B-D glucan tests [@bib5]. Of note, neither test should be positive in patients with mucormycosis [@bib6]. However, because no formal identification of the second mold from BAL fungal culture was performed, we cannot classify this case as proven aspergillosis [@bib5]. The patient most likely acquired both organisms from the natural environment given his homelessness. This is the first report of a case of combined invasive pulmonary mucormycosis and aspergillosis in a patient with decompensated cirrhosis. The patient did not have any of the traditional risk factors for both infections [@bib2], [@bib3], [@bib4]. There was no evidence of diabetes mellitus given the patient\'s normal random glucose levels upon initial presentation and during hospitalization. The patient was never neutropenic, had only transient lactic acidosis, and did not receive prolonged corticosteroids. Liver cirrhosis was the most likely contributing risk factor for both infections in our patient. Invasive aspergillosis is well-described in patients with decompensated liver cirrhosis [@bib2]. Immune dysfunction is a known complication of liver cirrhosis [@bib6]. A decline in both humoral and cell-mediated immunity is a risk factor for bacterial and fungal infections in patients with liver disease, especially in Child-Pugh (CP) class B and C cirrhosis [@bib7], [@bib8], [@bib9]. The patient was also at higher risk for pulmonary aspergillosis given his positive emphysematous image findings ([Fig. 1](#f0005){ref-type="fig"}A-C) suggestive of chronic obstructive pulmonary disease [@bib2]. Furthermore, the patient was in an iatrogenic iron overload state after receiving 22 units of packed red blood cells for anemia during his early-to-mid hospitalization course. This iron overload state can enhance fungal growth and virulence, possibly contributing to his clinical deterioration [@bib3]. Another potential explanation to consider in our case was the early usage of voriconazole for aspergillosis. Animal models have demonstrated that voriconazole exposure increases virulence of *R. arrhizus* strains and mortality rates in pulmonary disease [@bib10], [@bib11]. Ultimately, our patient died from his invasive pulmonary mucormycosis and probable aspergillosis complicated by refractory septic shock, multi-organ failure, and severe immune dysfunction from decompensated liver cirrhosis. He also did not receive timely administration of L-Amb, the recommended drug of choice, for invasive pulmonary mucormycosis as this was an unexpected diagnosis given the rarity of this infection in decompensated liver cirrhosis. To our knowledge, this is also the first case report of invasive pulmonary mucormycosis in a decompensated cirrhotic patient who did not have concomitant diabetes mellitus. The presenting and pertinent demographic and clinical characteristics of prior published case reports of invasive mucormycosis in patients with liver cirrhosis are shown in [Table 1](#t0005){ref-type="table"}. Overall, these cases depict life-threatening infections associated with CP class C cirrhosis (14), diabetes mellitus (12), viral hepatitis C infection (9), rhino-orbital (8) and rhino-orbital-cerebral (7) involvements, CP class B cirrhosis (6), and alcohol use (6). The most intriguing findings are the vast disproportionate number of pulmonary (2) to rhino-orbital/rhino-orbital-cerebral (15) infections, no reports of infected cases associated with CP class A cirrhosis, and all cases with CP class C cirrhosis died despite IV Amb and surgical treatments. Our case differed from the 2 prior published cases (3 & 22) with pulmonary involvement in that there were no other risk factors of diabetes mellitus and chronic steroid usage as well as no association with CP class B cirrhosis.Table 1Demographics and clinical characteristics of reported cases of invasive mucormycosis in patients with liver cirrhosis.Table 1**CaseAge- yearsGenderCause of liver diseaseChild Pugh classOther risk factorsLocation of infectionTreatmentOutcomeReferences**144FemaleNRBNoneRONoneDied[@bib12]263FemaleNRNRDMROCNoneDied[@bib13]344MaleETOHNRDMPulmonaryAmB/SurgeryAlive[@bib14]453MaleHCVBDMROCNoneDied[@bib12]558FemaleNRCDMROCAmBDied[@bib12]639MaleHCVBDMROCAmB/SurgeryDied[@bib12]757MaleHCVCNoneROAmBDied[@bib12]855MaleHBVCNoneRONoneDied[@bib12]915FemaleAIHCDM SteroidsRONoneDied[@bib12]1053MaleHCVCDMROCAmB/SurgeryDied[@bib12]1135MaleHCVCDMROAmBDied[@bib12]1238FemaleETOHCSteroidsCutaneousSurgeryDied[@bib12]1363FemaleHCVBNoneROAmB/SurgeryAlive[@bib12]1442MaleHBVCNoneROAmBDied[@bib12]1559FemaleETOHCNoneROCNoneDied[@bib12]1665MaleHCVBDMROAmB/SurgeryAlive[@bib12]1747MaleHCVCDMGastricAmBDied[@bib12]1848FemaleETOHNRNoneCutaneousSurgeryDied[@bib12]1925FemaleAIHCSteroidsCutaneousAmB/SurgeryDied[@bib12]2055MaleETOHNRNoneGastricAmB/SurgeryAlive[@bib15]2155FemaleAIHCDM SteroidsGastricAmBDied[@bib16]2268WomanHCVBDMPulmonaryAmB/SurgeryDied[@bib17]2328MaleETOHCNoneROCAmBDied[@bib18]2458MaleNRCNonePulmonaryAmBDiedThis case[^1] In conclusion, this case report highlights the need for healthcare professionals to be aware that decompensated liver cirrhosis is considered a risk factor for both invasive pulmonary mucormycosis and aspergillosis. None. Conflict of interest {#s0020} ==================== There are none. Ethical form {#s0025} ============ This study received no funding, and there are no potential conflicts of interests with respect to the research, authorship, and/or publication of this article. We were not able to obtain written and signed consent to publish the case report from the patient, and he had no known family members or legally authorized representatives. [^1]: Abbreviations: NR, not reported; RO, rhino-orbital; ROC, rhino-orbital-cerebral; DM, diabetes mellitus; ETOH, alcohol; AmB, amphotericin B; HCV, Hepatitis C Virus; HBV, Hepatitis B Virus; AIH, autoimmune hepatitis.
2024-07-27T01:26:58.646260
https://example.com/article/2726
Tag Archives: Trump tweets As the United States prepares for a new president whose word, according to one advisor, “should not be taken literally,” I have been thinking about the news and how events are reported. If the president’s word is not to be … Continue reading →
2024-04-26T01:26:58.646260
https://example.com/article/5908
# Using Aura.Router [Aura.Router](https://github.com/auraphp/Aura.Router) provides a plethora of methods for further configuring the router instance. One of the more useful configuration is to provide default specifications: - A regular expression that applies the same for a given routing match: ```php // Parameters named "id" will only match digits by default: $router->addTokens([ 'id' => '\d+', ]); ``` - A default parameter and/or its default value to always provide: ```php // mediatype defaults to "application/xhtml+xml" and will be available in all // requests: $router->addValues([ 'mediatype' => 'application/xhtml+xml', ]); ``` - Only match if secure (i.e., under HTTPS): ```php $router->setSecure(true); ``` In order to specify these, you need access to the underlying Aura.Router instance, however, and the `RouterInterface` does not provide an accessor! The answer, then, is to use dependency injection. This can be done in two ways: programmatically, or via a factory to use in conjunction with your container instance. ## Installing Aura.Router To use Aura.Router, you will first need to install the Aura.Router integration: ```bash $ composer require zendframework/zend-expressive-aurarouter ``` ## Quick Start At its simplest, you can instantiate a `Zend\Expressive\Router\AuraRouter` instance with no arguments; it will create the underlying Aura.Router objects required and compose them for you: ```php use Zend\Expressive\Router\AuraRouter; $router = new AuraRouter(); ``` ## Programmatic Creation If you need greater control over the Aura.Router setup and configuration, you can create the instances necessary and inject them into `Zend\Expressive\Router\AuraRouter` during instantiation. ```php <?php use Aura\Router\RouterFactory; use Zend\Expressive\AppFactory; use Zend\Expressive\Router\AuraRouter as AuraBridge; $auraRouter = (new RouterFactory())->newInstance(); $auraRouter->setSecure(true); $auraRouter->addValues([ 'mediatype' => 'application/xhtml+xml', ]); $router = new AuraBridge($auraRouter); // First argument is the container to use, if not using the default; // second is the router. $app = AppFactory::create(null, $router); ``` > ### Piping the route middleware > > As a reminder, you will need to ensure that middleware is piped in the order > in which it needs to be executed; please see the section on "Controlling > middleware execution order" in the [piping documentation](piping.md). This is > particularly salient when defining routes before injecting the router in the > application instance! ## Factory-Driven Creation [We recommend using an Inversion of Control container](../container/intro.md) for your applications; as such, in this section we will demonstrate two strategies for creating your Aura.Router implementation. ### Basic Router If you don't need to provide any setup or configuration, you can simply instantiate and return an instance of `Zend\Expressive\Router\AuraRouter` for the service name `Zend\Expressive\Router\RouterInterface`. A factory would look like this: ```php // in src/Application/Container/RouterFactory.php namespace Application\Container; use Psr\Container\ContainerInterface; use Zend\Expressive\Router\AuraRouter; class RouterFactory { /** * @param ContainerInterface $container * @return AuraRouter */ public function __invoke(ContainerInterface $container) { return new AuraRouter(); } } ``` You would register this with zend-servicemanager using: ```php $container->setFactory( Zend\Expressive\Router\RouterInterface::class, Application\Container\RouterFactory::class ); ``` And in Pimple: ```php $pimple[Zend\Expressive\Router\RouterInterface::class] = new Application\Container\RouterFactory(); ``` For zend-servicemanager, you can omit the factory entirely, and register the class as an invokable: ```php $container->setInvokableClass( Zend\Expressive\Router\RouterInterface::class, Zend\Expressive\Router\AuraRouter::class ); ``` ### Advanced Configuration If you want to provide custom setup or configuration, you can do so. In this example, we will be defining two factories: - A factory to register as and generate an `Aura\Router\Router` instance. - A factory registered as `Zend\Expressive\Router\RouterInterface`, which creates and returns a `Zend\Expressive\Router\AuraRouter` instance composing the `Aura\Router\Router` instance. Sound difficult? It's not; we've essentially done it above already! ```php // in src/Application/Container/AuraRouterFactory.php: namespace Application\Container; use Aura\Router\RouterFactory; use Psr\Container\ContainerInterface; class AuraRouterFactory { /** * @param ContainerInterface $container * @return \Aura\Router\Router */ public function __invoke(ContainerInterface $container) { $router = (new RouterFactory())->newInstance(); $router->setSecure(true); $router->addValues([ 'mediatype' => 'application/xhtml+xml', ]); return $router; } } // in src/Application/Container/RouterFactory.php namespace Application\Container; use Psr\Container\ContainerInterface; use Zend\Expressive\Router\AuraRouter as AuraBridge; class RouterFactory { /** * @param ContainerInterface $container * @return AuraBridge */ public function __invoke(ContainerInterface $container) { return new AuraBridge($container->get('Aura\Router\Router')); } } ``` From here, you will need to register your factories with your IoC container. If you are using zend-servicemanager, this will look like: ```php // Programmatically: use Zend\ServiceManager\ServiceManager; $container = new ServiceManager(); $container->addFactory( 'Aura\Router\Router', Application\Container\AuraRouterFactory::class ); $container->addFactory( Zend\Expressive\Router\RouterInterface::class, 'Application\Container\RouterFactory' ); // Alternately, via configuration: return [ 'factories' => [ 'Aura\Router\Router' => Application\Container\AuraRouterFactory::class, Zend\Expressive\Router\RouterInterface::class => 'Application\Container\RouterFactory::class, ], ]; ``` For Pimple, configuration looks like: ```php use Application\Container\AuraRouterFactory; use Application\Container\RouterFactory; use Interop\Container\Pimple\PimpleInterop as Pimple; $container = new Pimple(); $container['Aura\Router\Router'] = new AuraRouterFactory(); $container[Zend\Expressive\Router\RouterInterface::class] = new RouterFactory(); ```
2024-06-23T01:26:58.646260
https://example.com/article/8475
The online version of this article contains supplemental material. Abbreviations used in this paper: 3-D, three-dimensional; ADAMTS, a disintegrin and metalloprotease (reprolysin type) with thrombospondin motifs; BMP, bone morphogenetic protein; dpc, days post coital; GPC, Golgi to plasma membrane carrier; GPC^+cf^, GPC containing one or more 67-nm periodic collagen fibrils; pCcollagen, a naturally occurring intermediate in the cleavage of procollagen to collagen that contains the C-propeptides and not the N-propeptides; PM, plasma membrane; pNcollagen, a naturally occurring intermediate in the cleavage of procollagen to collagen that contains the N-propeptides and not the C-propeptides. Introduction ============ The ability of tendon to withstand repeated cycles of tensile force is largely attributable to the presence in the ECM of collagen fibrils that are indeterminate in length and exhibit large diameters. Moreover, the fibrils occur in strict parallel register. It is controversial how the parallelism of tendon arises and how long fibrils are deposited into the ECM. The fibrils, which comprise triple helical collagen molecules that are quarter staggered along the fibril long axis, exhibit a characteristic 67-nm axial periodicity (the '*D*-periodicity') and are readily observed by EM ([@bib25]). They can be partially solubilized in cold or weak acidic buffers thereby producing a solution of collagen molecules. Upon warming and neutralizing the solutions, the collagen molecules spontaneously self-assemble to form elongated fibrils that exhibit the same *D*-periodicity as tissue fibrils ([@bib18]). Reconstituted fibrils form semi-rigid gels in which the fibrils exhibit no preferred orientation. Therefore, although the collagen molecule contains all the necessary sequence information to form *D*-periodic fibrils it lacks information to direct parallel alignment of fibrils, which suggests a cellular involvement in vivo. However, cells alone are insufficient to specify parallelism of the fibrils; tendon fibroblasts in culture do not assemble a functional tissue, despite synthesizing large amounts of collagen. Here, we tested the hypothesis that the secretory pathway of fibroblasts in situ determines the parallelism of collagen fibrils in tendon. A primary function of the secretory pathway is to transport macromolecules from their site of synthesis in the ER to the plasma membrane (PM). A critically important node in this pathway is the Golgi complex with its associated TGN consisting of a complex network of anastomosing tubules ([@bib29]). The TGN mediates the final modification of N-linked oligosaccharides to the complex form ([@bib30]) and is involved in both the transport and sorting of membrane and secretory proteins ([@bib9]; [@bib35]; [@bib24]). Previous works have shown that GFP fusion proteins are transported from the Golgi to the cell surface in tubular-saccular compartments, which travel along microtubules ([@bib31]; [@bib12]; [@bib37]; [@bib27]; [@bib28]). (In this paper, the authors distinguish between vesicles and compartments or carriers. The terms "compartment" and "carrier" refer to any membrane-bound transport container within the cell, regardless of its size, position, or function in the secretory pathway. The term "vesicle" refers to any compartment that is spherical or near spherical in shape, regardless of its size, position, or function in the secretory pathway.) These pleiomorphic Golgi to PM carriers (GPCs) can be 0.5--1.7 μm in length ([@bib27]) and have also been called transport containers ([@bib37]) and post-Golgi carriers ([@bib12]). A recent in vitro study has shown that exit from the TGN occurs by the formation of a tubular-reticular TGN domain that is a precursor structure to the release of tubular-saccular GPCs ([@bib26]). Tendon fibrils are predominately comprised of collagen I, which is the most abundant collagen in vertebrates ([@bib4]). It is synthesized in the ER as procollagen I, which comprises two proα1(I) chains and one proα2(I) chains folded into an uninterrupted 300-nm-long triple helix flanked by globular N- and C-propeptides. Procollagen molecules are too large to fit into conventional 60--80-nm transport vesicles and traverse the Golgi complex of these cells by cisternal maturation ([@bib3]). We were particularly interested to know if procollagen occurs in GPCs en route to the ECM. Of particular relevance to this question is that proteolytic cleavage of the N- and C-propeptides results in spontaneous collagen fibril formation. N-propeptide removal is catalyzed by the procollagen N-proteinases, which include a disintegrin and metalloprotease (reprolysin type) with thrombospondin motifs (ADAMTS)-2, -3, and -14 ([@bib5], [@bib6]; [@bib7]), whereas C-proteinase activity is possessed by all members of the tolloid family of zinc metalloproteinases including bone morphogenetic protein-1 (BMP-1; [@bib32]). Both BMP-1 and ADAMTS-2 are activated by a furin-like proprotein convertase, and in the case of pro--BMP-1, activation has been shown to occur in the TGN ([@bib22]; [@bib39]). Furin itself undergoes autocatalytic activation and is thought to cycle between the TGN, the cell surface, and the endosomal system ([@bib23]; [@bib36]). Seminal studies in the early 1980s by Birk, Trelstad, and coworkers ([@bib38]; [@bib1], [@bib2]) suggested that collagen fibrils occur in deep PM recesses and that the recesses increase in diameter at distances from the cell to accommodate fibril bundles. Evidence from EM autoradiography indicated that newly synthesized collagen molecules pass through these recesses en route to the ECM. However, recent findings that pro--BMP-1 is converted to BMP-1 in the TGN, as well as studies of GPCs in cultured cells, prompted us to relate these new observations to the description of fibril formation in embryonic tendon described by Trelstad and colleagues (see references above). Here, we show that GPCs are indeed present in embryonic tendon fibroblasts and that some GPCs contain 28-nm-diam collagen fibrils (GPCs^+cf^ ). Moreover, GCPs^+cf^ are targeted to novel PM protrusions, which we have termed "fibripositors" (fibril depositors). In addition, we show that procollagen can be converted to collagen within the confines of the cell membrane, which is consistent with the observation of collagen fibrils in some GPCs and the known intracellular activation of BMP-1. A novel observation was that fibripositors are always oriented along the tendon axis, which establishes a link between intracellular transport and the organization of the ECM. Interestingly, fibripositor formation is not a constitutive process in procollagen-secreting cells but occurs only during a narrow window of embryonic development when tissue architecture is being established. Results ======= GPCs containing collagen fibrils occur in chick embryo tendon fibroblasts in vivo --------------------------------------------------------------------------------- Transverse (i.e., orthogonal to the tendon axis) sections of metatarsal tendons from chick embryos show membrane encapsulated collagen fibrils within the cytoplasm and bundles of fibrils in the ECM (not depicted), whereas longitudinal sections (i.e., parallel to the tendon long axis) showed GPCs containing cross-banded collagen fibrils (GPCs^+cf^; [Fig. 1](#fig1){ref-type="fig"} A). Three-dimensional (3-D) reconstructions were performed on six separate serial longitudinal sections from chick embryo leg tendons. The reconstructions showed the presence of GPCs^+cf^, which varied in length up to ∼2 μm, and associated small pleiomorphic membrane enclosures ([Fig. 1](#fig1){ref-type="fig"} B). These GPCs^+cf^ often were completely enclosed within the cell and the 67-nm banding pattern provided unequivocal identification of collagen fibrils. However, it was also shown that the GPCs^+cf^ were reactive to a collagen I (triple helical region) antibody ([Fig. 1](#fig1){ref-type="fig"} C). ![**GPCs in chick tendon fibroblasts contain collagen fibrils.** (A) A single longitudinal section of 10-d chick metatarsal tendon that was used to prepare one of the serial section 3-D reconstructions, showing part of one fibroblast. Green, the PM; blue, the membrane of an elongated GPC containing two collagen fibrils; f (and outlined in white), two intracellular fibrils; purple, the nuclear membrane; c (also outlined in orange), a small compartment positioned close to the fibril-containing GPC. (B) Serial section reconstruction (from longitudinal sections) of the GPC shown in A. Green, a solid surface 3-D representation of the GPC with associated small compartments (c). (C) Immunolocalization of collagen triple helices to GPCs using a colloidal-gold conjugated anti--rabbit IgG antibody recognizing a rabbit anti--type I collagen antibody. Closed arrow, two vesicles fusing; open circle, cross section of a collagen fibril; open arrow, cross-banded collagen fibrils. Bar, 100 nm.](200312071f1){#fig1} The N- and C-propeptides of procollagen are cleaved in post-Golgi compartments ------------------------------------------------------------------------------ Pulse-chase experiments were performed on tendons from 13-d chick embryos. At this stage, the tendon fibroblasts synthesize mainly collagen I ([@bib8]), which simplifies biochemical studies. To examine procollagen processing, pulse-chase experiments were performed on whole tendons using a 10-min pulse and 10--180-min chase. Using a differential extraction procedure (Fig. S1, available at <http://www.jcb.org/cgi/content/full/jcb.200312071/DC1>) we analyzed the ECM-resident proteins in a neutral high salt buffer and then the intracellular proteins in the same buffer supplemented with NP-40. The extracts were analyzed separately by SDS-PAGE and autoradiography. Trimeric type I procollagen (comprising two proα1(I) and one proα2(I) chain) can be processed by sequential removal of the N- and C-propeptides, and vice versa, producing eight different α-chains. In decreasing size order these are: proα1(I), pCα1(I), pNα1(I), proα2(I), pCα2(I), α1(I), pNα2(I), and α2(I). All eight bands can be seen in the 20-min chase NP-40 extract ([Fig. 2](#fig2){ref-type="fig"} A). The migration of each chain was confirmed by comparison with radiolabeled procollagen digested with recombinant BMP-1, ADAMTS-2, or trypsin (unpublished data). The collagen chains were differentially distributed between the NaCl (S1) and NP-40 (N) extracts ([Fig. 2](#fig2){ref-type="fig"} A). Most of the ^14^C-label was initially present in the NP-40 extract as procollagen. At later chase times, the NP-40 extract contained (a) procollagen; (b) a naturally occurring intermediate in the cleavage of procollagen to collagen that contains the N-propeptides and not the C-propeptides (pNcollagen); (c) a naturally occurring intermediate in the cleavage of procollagen to collagen that contains the C-propeptides and not the N-propeptides (pCcollagen); and (d) collagen, and the amount of label in the NP-40 extracts progressively decreased over the course of the experiment. In contrast, little ^14^C-collagen was present in the NaCl extract at the start of the experiment. Procollagen, pCcollagen, and collagen occurred in the NaCl extract in the 20-min chase sample. The amount of procollagen and pCcollagen in the NaCl extract decreased during the chase such that after ∼3 h all of the labeled protein was fully processed collagen I in the NaCl extract. ![**Pulse-chase analysis of procollagen conversion by chick tendon fibroblasts in situ.** (A) Chick metatarsal tendons were incubated in medium containing \[^14^C\]proline for 10 min and then in unlabeled medium for the times indicated. The tendons were successively extracted four times in buffer containing NaCl and then in a buffer containing NP-40. Autoradiography was used to display the labeled proteins in the chase samples. For brevity, only the first NaCl extract is shown. S1, the first salt extract. N, the NP-40 extract. (B) In a repeat experiment, the 30-min chase samples were incubated with trypsin and the labeled proteins displayed by autoradiography. Control, untreated; trypsin, trypsin treated; S, the first salt extract; N, the NP-40 solubilized proteins. The migration positions of the α-chains of procollagen, pCcollagen, pNcollagen, and collagen are indicated. (C) Tendons were subjected to a mock pulse chase (pulse 10 min, chase 60 min) in which no radiolabeled proline was added. They were then subjected to two salt (S1 and S2) extractions and a final NP-40 (N) extraction to which exogenous purified ^14^C-labeled procollagen was added. The extracts were prepared for SDS-PAGE and the proteins analyzed by autoradiography. Procollagen remained uncleaved in the S and N samples.](200312071f2){#fig2} To gain further confidence that procollagen intermediates (e.g., pNcollagen and pCcollagen) occurred within the cell, we performed a pulse-chase experiment to produce a mixture of processed procollagen chains in both the NaCl and NP-40 extracts, and then digested the tendons with trypsin at 20°C for 30 min. At this temperature cellular protein export is prevented but trypsin can still degrade nontriple helical protein molecules. The tendons were then sequentially extracted. Analysis of the first NaCl extract (S1) and NP-40 extract (N) indicated that whereas the salt extractable material was clearly converted to collagen by trypsin, the detergent extractable material was protected from trypsin digestion ([Fig. 2](#fig2){ref-type="fig"} B). This shows that material that is accessible to salt extraction buffer can also be accessed by trypsin, whereas compartments that can only be solubilized using NP-40 detergent are inaccessible to trypsin. To confirm that cleavage of procollagen did not occur during the extraction procedure, tendons were subjected to the same extraction protocols as above but in the presence of partially purified ^14^C-labeled procollagen. No processing of proα1(I) and proα2(I) chains occurred ([Fig. 2](#fig2){ref-type="fig"} C), indicating that the labeled procollagen in the pulse-chase experiment must have been processed before extraction. To further confirm that intracellular collagen molecules could only be removed by extraction with buffer containing NP-40, pulse-chase experiments were performed in the presence of α,α-dipyridyl and brefeldin A. These treatments are both known to result in the accumulation of procollagen within the ER. Two successive NaCl extractions (S1 and S2) were performed before the NP-40 extraction (N), which was found to contain only unprocessed procollagen (unpublished data). These results are consistent with cleavage of procollagen to collagen occurring in post-Golgi compartments and the results of EM showing collagen fibrils in GPCs^+cf^. Appearance of PM protrusions coincides with onset of post-Golgi collagen fibril polymerization in 14.5-d mouse tail tendon -------------------------------------------------------------------------------------------------------------------------- Transverse sections through the presumptive tail tendon of 13.5 dpc (days post coital) mouse embryos showed closely packed and apparently undifferentiated cells, which lacked evidence of GPCs^+cf^ or a fibrillar ECM ([Fig. 3](#fig3){ref-type="fig"} A). However, cells in the proximal region of tails from 14.5 dpc embryos were loosely packed and had large extracellular spaces that contained numerous collagen fibrils. Cellular projections ([Fig. 3](#fig3){ref-type="fig"} B, open arrows) were an obvious feature at this stage of development. Some of the projections contained tubular carriers in which collagen fibrils were clearly visible ([Fig. 3](#fig3){ref-type="fig"} B, closed arrows). Analysis of the distal region of the same tails showed spaces between cells and a conspicuous absence of collagen fibrils and cellular projections, indicating that the development of mouse tail tendon proceeds from the proximal to the distal end. Therefore, the occurrence of parallel collagen fibrils in the ECM coincided with the appearance of cellular projections having GPCs^+cf^. ![**Onset of fibripositor formation in mouse tail at 14.5 dpc.** (A) EM of tail tendon from a 13.5-d embryonic mouse showing predifferentiated fibroblasts with no obvious Golgi apparatus. Note the absence of collagen fibrils in the intercellular spaces. Bar, 500 nm. (B) EM of the proximal region of the tail from a 14.5-d embryonic mouse. Spaces between cells contain collagen fibrils in PM protrusions (open arrows), some of which contain collagen fibrils contained within lumen (closed arrows). Bar, 500 nm.](200312071f3){#fig3} Well-developed Golgi, parallel GPCs^+cf^ and parallel fibripositors in 15.5-d embryonic mouse tail tendon fibroblasts --------------------------------------------------------------------------------------------------------------------- By 15.5 dpc the mouse tail tendon contains an elaborate ECM containing parallel bundles of narrow collagen fibrils that are interconnected by filamentous strands ([Fig. 4, A and B](#fig4){ref-type="fig"}). Image analysis of collagen fiber bundles showed that the fibrils had a uniform diameter of 28 nm and were hexagonally packed with a mean fibril to fibril spacing of 58 nm ([Fig. 4](#fig4){ref-type="fig"}, B--D). The regular packing was disrupted only at sites where narrow fibril tips perturbed the center to center spacing but the fibril to fibril spacing of 58 nm was maintained. This packing arrangement, which has not previously been reported, is highly indicative of a cell-mediated mechanism of fibril deposition. The cells contained a well-defined Golgi complex and a highly vacuolar TGN ([Fig. 4](#fig4){ref-type="fig"} A). There was an abundance of membrane encapsulated collagen fibrils within the cytoplasm of the same diameter as the extracellular fibrils ([Fig. 4](#fig4){ref-type="fig"} A, arrow). ![**Well-developed Golgi apparatus and active ECM assembly at 15.5 dpc.** (A) EM of tail tendon from 15.5 dpc mice showing well-developed Golgi complex, vacuolar TGN and membrane encapsulated collagen fibrils (closed arrow). Spaces between cells are occupied by narrow diameter collagen fibrils. Bar, 500 nm. (B) Electron microscope image of a transverse section showing part of a fibril bundle. Fibrils have a characteristic uniformity of diameter (mean diam = 28 nm; *n* = 949) and a uniformity of spacing (mean center to center spacing equals 58 nm; *n* = 380). Interconnections between the fibrils appear to stabilize the hexagonal packing arrangement. Bar, 50 nm. (C) Autocorrelation function of the image in (B) indicating a spatially ordered arrangement of fibrils in transverse section with an underlying near hexagonal array. Bar, 50 nm. (D) Histogram of fibril diameters.](200312071f4){#fig4} Five separate transverse serial section series were reconstructed (Video 1, available at <http://www.jcb.org/cgi/content/full/jcb.200312071/DC1>). These showed that the membrane-encapsulated collagen fibrils were aligned parallel to the tendon axis and that these carriers could either be enclosed within the cell (GPCs^+cf^ ) or open to the extracellular space at one end (see Fig. 8 A). Closed GPCs^+cf^ could either be located within membrane protrusions, as shown, or close to the Golgi complex (see Fig. 10 H). It was possible to trace the paths of individual fibrils through a transverse series from bundles in the ECM through the lumen of PM protrusions and into the main body of the cell, although most collagen fibrils exceeded the z-dimension of the reconstructions ([Fig. 5](#fig5){ref-type="fig"}). For descriptive purposes we have designated the PM protrusions "fibripositors". Occasionally it was possible to capture a fibripositor and its associated collagen fibrils in longitudinal section ([Fig. 6](#fig6){ref-type="fig"}, A--D). The fibripositors contained a lumen that extends several microns into the body of the cell. There were several common features of fibripositors: (a) in 85 fibripositors examined, 75 had a single fibril exiting the distal tip, five had two fibrils exiting, and five were closed at the distal end (i.e., contained a GPC containing one or more 67-nm periodic collagen fibrils \[GPC^+cf^\] that was totally enclosed within the PM); (b) there was an S-shaped kink at the site where the fibripositor protruded from the main body of the cell; (c) the lumen was not uniform in diameter along the length of the fibripositor but often constricted to the diameter of a single fibril; (d) several fibrils could be located within the central lumen of the fibripositor, i.e., within the main body of the cell; (e) the fibrils were often hexagonally packed within the lumen and had the same diameter as fibrils in the ECM; and (f) numerous short and very narrow fibrils occurred at the base of the fibripositor ([Fig. 5](#fig5){ref-type="fig"} B, section 10). ![**Collagen fibrils can be traced from extracellular fibril bundles to deep within the cell.** (A) Transverse sections through a fibripositor and its intracellular lumen showing the path of individual collagen fibrils. A single fibril can be seen in a collagen bundle in the ECM, within the lumen of the fibripositor as it projects out from the cell, and within the lumen of the same fibripositor deep within the cell. Section numbers are indicated in white. A reference bar shows the section number, the depth of the fibripositor lumen within the cell, and the length of the fibripositor. (B) Schematic showing the transverse structure of a fibripositor. Arrows indicate proposed movement of the tip of the fibripositor as it retracts from the collagen bundle. (C) Gallery of images showing the space generated in the collagen bundle by the retracting fibripositor (top) and the corresponding tip of the fibripositor several sections below (or above) the space.](200312071f5){#fig5} ![**Longitudinal structure of fibripositors from 15.5 dpc mouse tail tendons.** (A) Section through the proximal end of a fibripositor. (B and C) Collagen fibrils (closed arrow) are continuous from the ECM through the lumen of the fibripositor. The sidewalls of the lumen appear to grip collagen fibrils. (D) Intracellular compartments are often associated with the lumen of the fibripositor. A fibril is shown leaving and reentering the section (open arrow). (E and F) Cut-away views of two fibripositors from 3-D reconstructions. Closed arrow, collagen fibrils within lumen of fibripositor. Bars, 500 nm.](200312071f6){#fig6} Collagen fibrils are deposited by fibripositors into extracellular channels formed by adjacent fibroblasts ---------------------------------------------------------------------------------------------------------- As cultured fibroblasts do not deposit parallel collagen fibrils, nor do they exhibit apparent GPCs^+cf^ or fibripositors it was not possible to use correlative microscopy techniques (including the use of GFP-tagged procollagen) to study the formation of fibripositors or the secretion of collagen fibrils. Therefore, to determine whether fibripositors deposit rather than remove fibrils from the ECM the serial sections were reexamined in further detail. In all examples in which a fibril could be seen exiting a fibripositor there was clear space around the fibril (a gallery of examples is shown in [Fig. 5](#fig5){ref-type="fig"} C). In 3-D, the fibril was at the center (on axis) of a cylindrical space, which was identical in size and shape to the tip of the fibripositor. It is difficult to imagine how such a space could be generated by an encroaching fibripositor; therefore, it appears that the spaces are generated by retreating fibripositors. In addition, the fibrils deep within the fibripositor lumen were uniformly 28 nm in diameter, as were ECM fibrils, providing no evidence for fibril disassembly inside the fibripositors. 3-D reconstruction showed that tendon fibroblasts are roughly cylindrical in shape with their long axis parallel to the axis of the tendon. Moreover, the PM adopts a novel conformation to generate cylindrical channels that are parallel to the tendon-long axis. The fibripositors were also parallel to the long axis of the tendon and to the collagen fibril bundles ([Figs. 6](#fig6){ref-type="fig"} and [7](#fig7){ref-type="fig"}). Fibripositors projected into channels that were formed by close contacts between the PMs of adjacent cells ([Fig. 7](#fig7){ref-type="fig"} B, open circles). The longitudinal axes of channels, which had smooth concave surfaces, were always parallel to the tendon-long axis ([Fig. 7, A and B](#fig7){ref-type="fig"}). Channels presumably provide a confined environment for the supramolecular organization of collagen fibrils into parallel bundles. Fibrils were observed exiting fibripositors in either direction along the tendon axis and branched fibripositors and branched lumen were also observed ([Fig. 7](#fig7){ref-type="fig"} D). ![**Fibripositors project into cylindrical channels.** (A) EM showing a bundle of collagen fibrils between two cells (outlined in green and red). Fibripositors (outlined in yellow) project into a channel between the cells. One of the collagen fibrils in the bundle is highlighted in white. (B) The same channel as in A but at a different z-plane showing three fibripositors depositing fibrils to the bundle. A fibripositor located to the right-hand side of the image is shown depositing a fibril to a further fibril bundle. Cell--cell contacts are evident at the boundary of channels (open circles). e, enclosed fibripositors; L, leaflet of PM (see also D). The lumen of fibripositors are outlined in blue. (C) A plane taken through a 3-D reconstruction of the same cells as in A and B. The fibripositors and cells are rendered transparent to show the collagen fibrils (white). (D) Solid rendering of the cell outlined in green in A and B and viewed from one side. Two fibripositors (yellow) are shown, one of which is branched. One of the paired fibripositors deposits a fibril at the bottom of the reconstruction. A further fibripositor (yellow) is shown depositing a fibril at the top of the reconstruction. A leaflet (L) wraps around two fibripositors to define the boundaries of a small collagen fibril bundle. A closed fibripositor (e) is shown. Viewed from the side, the PM is seen as a wall of membrane running vertically along the long axis of the tendon.](200312071f7){#fig7} The lumen of the fibripositor is accessible to HRP -------------------------------------------------- To determine whether exogenous molecules such as nondetergent buffers and trypsin are able to penetrate into the lumen of the fibripositors in pulse-chase experiments, tendons from 13-d chick embryos were incubated in medium containing HRP. The presence of HRP was then detected using DAB, and transverse sections examined using EM. As shown in [Fig. 8](#fig8){ref-type="fig"} B, electron dense material occurred in some fibripositors (closed arrowheads) whereas others remained clear (open arrowheads). ![**Fibripositors can be closed at their distal tips.** (A) Transverse sections through a branched fibripositor showing an enclosed GPC^+cf^ (left-hand side arm) and another that is open to the ECM (right-hand side arm). Fibrils are depicted as black lines within the lumen of the fibripositors. Blue arrows point to the same fibril in the electron micrographs and in the schematic. A bar shows the height of the fibripositors. (B) A gallery of electron micrographs in which mouse tail tendons had been treated with HRP and DAB before preparation for EM. Darkly contrasted compartments indicate the presence of HRP (closed arrowhead). Compartments lacking HRP-reactive DAB (simple arrowheads).](200312071f8){#fig8} GPCs^+cf^ are absent during postnatal development despite active procollagen synthesis -------------------------------------------------------------------------------------- Fibroblasts from the tails of 6-wk-old mice were stellate in cross section, surrounded by a dense matrix of collagen fibrils and lacked fibripositors or intracellular collagen fibrils (unpublished data). The fibrils had a diameter of 151 nm (±69; *n* = 521) and the distribution was broad ([Fig. 9](#fig9){ref-type="fig"} C). No hexagonal packing arrangement was observed presumably because of the heterogeneity in fibril diameters. The cells contained distinct populations of "large" and "small" compartments that had a mean diameter of 361 nm (±22 SEM; *n* = 210) and 66 nm (±7 SEM; *n* = 379), respectively ([Fig. 9, A and B](#fig9){ref-type="fig"}). The larger compartments were immunoreactive to an anticollagen antibody, and the small compartments were abundant beneath the PM. Analysis of the immunoEM images showed that the large compartments labeled with 35.4 (±2.5 SEM) gold particles per μm^2^ whereas the small compartments labeled with 2.0 (±1.1 SEM) gold particles per μm^2^. The background labeling within the cell, which included areas of the ER, was 2.3 (±0.4 SEM). Therefore, there was a 17-fold increase in labeling/μm^2^ of the large compartments compared with the small compartments. Pulse-chase analysis showed that procollagen and pCcollagen occurred in NP-40--sensitive compartments although pNcollagen and collagen appeared transiently around 40 min of chase. In contrast, the salt extract contained pCcollagen and collagen ([Fig. 9](#fig9){ref-type="fig"} D). ![**Fibripositors are absent from 6-wk mouse tail tendon.** (A) Longitudinal section through a mouse tail tendon fibroblast showing a stellate projection surrounded by collagen fibrils. The sample was prepared by high pressure freezing followed by freeze substitution and embedding in LR white. Sections were reacted with a rabbit anticollagen antibody. Secondary antibodies raised to anti--rabbit IgG and conjugated to 10-nm colloidal gold particles reveal the presence of collagen molecules. Posttreated sections were stained with uranyl acetate. (B) Higher magnification of part of the image shown in A. The collagen fibrils in the ECM and the large (∼360-nm diam) GPCs were immunoreactive. The small diameter vesicles (v) immediately beneath the PM were not immunoreactive. Bar, 500 nm. (C) Measurement of tail tendon fibril diameters. (D) Tail tendons were incubated in medium containing \[^14^C\]proline for 10 min after which the tendons were transferred to medium containing nonlabeled amino acids. At the times indicated the tendons were successively extracted four times in buffer containing NaCl and then a buffer containing NP-40. Autoradiography was used to display the labeled proteins in the chase samples. S1, the first salt extract. N, the NP-40 extract.](200312071f9){#fig9} Discussion ========== Here, we show that in embryonic tendon fibroblasts, (a) procollagen is converted to collagen in the post-Golgi secretory pathway; (b) this collagen assembles into narrow-diameter fibrils within elongated GPCs; (c) the collagen-fibril--containing GPCs (GPCs^+cf^ ) are targeted to novel PM protrusions, termed fibripositors, that are parallel to the tendon axis; and (d) the lumen of fibripositors open into channels formed between cells to deposit the fibrils into hexagonally packed bundles. Furthermore, fibripositors occur in tendon only during embryonic development when seeding of the ECM occurs; fibripositors are absent during postnatal development despite active procollagen synthesis. Thus, we have identified a novel PM organelle for the ordered assembly of tissues and we have demonstrated a link between the secretory pathway and the synthesis of an organized ECM. This work has shown that processing of procollagen to collagen begins in Golgi to PM compartments that are refractory to extraction with high salt buffer but which can be solubilized using NP-40 detergent, suggesting that they are within the cell. In addition, we have shown that GPCs^+cf^ are tubular in shape and are completely enclosed within the fibroblast PM. A question of interest is, once GPCs^+cf^ have fused to the PM to form a fibripositor, is the lumen of the fibripositor accessible to salt extraction buffer or does it require NP-40 for solubilization? Incubation of tendons with HRP indicates that diffusion of exogenous molecules (such as trypsin, HRP, and salt ions) into the lumen does occur ([Fig. 8](#fig8){ref-type="fig"} B). Some compartments did not contain DAB-reactive HRP, which is consistent with the presence of GPCs^+cf^ that are enclosed within the cell. It is unlikely that fibripositor lumen close during the extraction process and then become refractory to salt extraction because the compartments that are accessible to salt extraction are also accessible to trypsin ([Fig. 2](#fig2){ref-type="fig"} B). Trypsin digestion was performed directly after labeling and before the salt extractions when tissue shrinkage might be expected to occur. Therefore, it is likely that the material in the NP-40 extract is derived from ER, Golgi, GPCs^+cf^, and potentially from material at the very base of the fibripositor lumen where short early fibrils are found ([Fig. 5](#fig5){ref-type="fig"} B). pNcollagen was absent from the salt extract indicating that the N-propeptides are removed before secretion into the lumen of the fibripositor or ECM and that pCcollagen is the major intermediate used for the extension (embryonic) or broadening (6 wk) of pre-existing fibrils. Two lines of evidence indicate that collagen fibril polymerization during embryogenesis begins in the TGN or in TGN exit sites, although future studies are needed to identify the origin of collagen-fibril-containing vesicles and precursors of the GPCs^+cf^. First, GPCs^+cf^ near to the Golgi stacks contained cross-banded collagen fibrils. Second, processing of procollagen to collagen was completely prevented in the presence of brefeldin A. The idea that intracellular procollagen processing could be mediated by N- and C-proteinases, which are concomitantly synthesized and trafficked with procollagen is supported by recent work in our laboratory showing intracellular activation of BMP1 in the TGN ([@bib22]). Cleavage of procollagen would require neutral pH and a concentration of free calcium ions between 2 and 5 mM ([@bib13]). Alternatively, the procollagen proteinases could be targeted to the ECM and/or the base of the fibripositors and a cycling mechanism, similar to that used by furin ([@bib23]), could be used to localize the enzymes to the transface of the TGN. Fusion of procollagen containing GPCs with vesicles containing the processing enzymes would then trigger fibrillogenesis and the formation of new GPCs^+cf^. At 6 wk of development very little cleavage of procollagen to collagen occurs within the cell: the NP-40--soluble compartments contain procollagen and pCcollagen, whereas the NaCl-soluble compartments contain pCcollagen and collagen. No GPCs^+cf^ are observed despite immunolocalization of triple helical collagen to GPCs. Unfortunately, it is not possible to determine which intermediates are present within the GPCs because antibodies that are directed to the collagen triple helix, terminal propeptides, or cleaved neoepitopes will inevitably recognize at least two procollagen intermediates. Further studies are needed to explain the observed difference of N- and C-proteinase activity in embryonic and older tendon fibroblasts. The low abundance and high sequence homology between the various gene products has so far complicated the use of specific antibodies for immunolocalization studies. Seed and feed mechanism of ECM assembly --------------------------------------- Evidence from in vitro studies indicates that collagen fibrillogenesis is a nucleation-propagation process in which the formation of a thermodynamically unstable nucleus occurs slowly but once formed, the nucleus propagates rapidly in size by accretion of collagen molecules ([@bib40]; [@bib14]; [@bib16], [@bib17]; [@bib33]). This assembly mechanism predicts the formation of a nucleus having a high fidelity structure because it contains the structural blueprint for the final fibril. The data from embryonic tendon showing the formation of early fibrils at the base of fibripositors, and, the fact that the fibrils exhibit the same diameter as the fibrils in the ECM, are strongly suggestive that a nucleation-propagation assembly mechanism occurs in vivo. An important observation was that fibrils exceeding 10 μm in length could be traced from the center of a fiber bundle within the ECM to the lumen of a fibripositor deep within the cell. There is no evidence that collagen fibrils of this length can be synthesized de novo and deposited whole. Thus, we propose that the nucleation step occurs in GPCs and at the base of the fibripositors, at least in embryonic fibroblasts in situ. Further studies are needed to identify the site of fibril propagation, although the pulse-chase observations of pCcollagen being cleaved to collagen in a NaCl-extractable compartment are consistent with propagation occurring in the ECM or in open fibripositors. The increase in fibril diameter between embryonic and 6-wk stages of development and the subsequent absence of GPCs^+cf^ is consistent with switching off of the nucleation step of fibrillogenesis at postnatal stages ([Fig. 10](#fig10){ref-type="fig"}, schematic). The results of immunoEM at 6 wk unequivocally showed the presence of procollagen and/or pCcollagen in ∼350-nm-diam compartments, which presumably are responsible for delivering procollagen and pCcollagen to the ECM. ![**Proposed biogenesis of fibripositors.** (A) Endoplasmic reticulum; (B) Golgi apparatus; (C) GPCs bud from the trans face of the TGN; (D) GPC containing procollagen; (E) Compartment containing pro--N-/C-proteinases and dibasic proprotein convertases; (F) Cleavage of procollagen to collagen occurs within precursor GPCs^+cf^ to initiate collagen fibril formation; (G) Some GPCs^+cf^ contain a narrow constriction separating two compartments with a collagen fibril in one compartment, as seen in some 3-D reconstructions; (H) GPCs^+cf^ containing a single collagen fibril. Alternate sections through a GPC^+cf^ containing a single fibril are shown (vertical arrows). The ends of the fibril can be seen within the GPC^+cf^; (I) GPCs^+cf^ containing three collagen fibrils, as seen in some 3-D reconstructions; (J) 3-D reconstruction of a GPC^+cf^; (K) A GPC^+cf^ pushes out from the PM. The fibripositor is closed, as shown in [Fig. 8](#fig8){ref-type="fig"}; (L) A fibripositor delivers a collagen fibril to the ECM where it packs hexagonally into a bundle. Procollagen and the procollagen N- and C-proteinases (ochre) are delivered to the base of a fibripositor where nucleation of collagen fibrils can occur; (M) Schematic of hexagonal packing of collagen fibrils in fibril bundles.](200312071f10){#fig10} Biogenesis of GPCs^+cf^, PM channels, and fibripositors ------------------------------------------------------- It is a novel observation that procollagen processing can be initiated in the late secretory pathway in vivo. Cultured chick embryo tendon or human fibroblasts secrete procollagen into the cell medium ([@bib15]) and procollagen peptidase activity is detected in the medium but not in the cell layer of cultured fibroblasts ([@bib19]; [@bib21]). In addition, recesses containing collagen fibrils have not been observed in cultured fibroblasts ([@bib2]), and we have similarly found no evidence of GPCs^+cf^ or fibripositor formation (unpublished data). Cells in culture therefore appear unable to orchestrate the formation of extracellular channels between cells into which parallel collagen fibrils are deposited. This suggests that the parallelism of the tendon is the culmination of the stacking of fibroblasts along the long axis of the tendon, the 3-D organization of the post-Golgi secretory pathway (presumably involving alignment of the cytoskeletal components of adjacent cells) and the extrusion of PM processes into which GPCs^+cf^ are targeted. The intercellular channels appeared to be stabilized by specific points of contact between adjacent cells ([Fig. 7](#fig7){ref-type="fig"} B). The molecular components of these cell--cell contacts remain unknown. Furthermore, the positioning of fibripositors specifically into the intercellular channels presumably involves altered distribution of cell-matrix adhesion molecules, and specific adaptor molecules to ensure fusion of the GPCs^+cf^ only with the distal tip of the fibripositor. Mechanical stimuli might also be expected to influence fibripositor formation, the coalignment of the fibripositors with the ECM, and the directional deposition of collagen fibrils into the ECM. The current work has established a functional link between the post-Golgi secretory pathway and the organization of the ECM and generates a platform for future studies of the cell and molecular basis of tissue assembly. Perspectives ------------ The 3-D serial section reconstruction studies by Trelstad and colleagues ([@bib38]; [@bib1], [@bib2]) in the 1970s and '80s used high voltage transmission electron microscopes to image relatively thick sections. These approaches were so far beyond the technical expertise of most collagen biologists at the time, and the data were so compelling, that few people contemplated extending these studies. However, recent development of state-of-the-art software such as IMOD has made it possible to revisit this approach using larger numbers of thinner sections imaged on a conventional transmission electron microscope. The results of our work and those obtained by Trelstad, Birk, and colleagues differ in several respects (see references above). First, it was speculated that only uncleaved procollagen was transported to the PM recesses. Our results show that procollagen can be converted to collagen within the cell and that fibril formation can occur in closed intracellular carriers. Furthermore, the recesses were envisioned to broaden at increasing distances from the body of the cell, and it was in these wider zones that fibrils formed into bundles. Our results show that the recesses are long channels in the PM that do not protrude into the cell but run down the surface of the cell. We also show that fibroblasts exhibit fibripositors that are finger-like protrusions from the PM. Although the study of the cellular aspects of tissue assembly has been simplified by improvements in image analysis software such as IMOD, there remains a major technical hurdle concerning the cells. Fibroblasts flatten when plated out in culture and consequently the PM channels and fibripositors disappear. It is possible to culture whole tendons for up to 3 h and still observe normal procollagen processing but beyond this time the cells lose their embryonic phenotype. Therefore, dissection of the molecular mechanisms involved in PM channel formation and fibripositor biogenesis will rely on the development of novel cell or organ culture methods that preserve the 3-D shape of the cell and provide additional signals needed to specify continued cell differentiation. Materials and methods ===================== Pulse-chase analysis of procollagen processing in chick embryo tendons ---------------------------------------------------------------------- Metatarsal tendons were obtained from day 13 chick embryos. Pulse-chase experiments were performed at 37°C in DME/F12 containing 1% (vol/vol) PS, 2 mM [l]{.smallcaps}-glutamine, 200 μM ascorbate, 400 μM βAPN, and supplemented with 2.5 μCi/ml of \[^14^C\]proline, 1 mM α,α-dipyridyl or 3.5 μM brefeldin A, as required. Pulse chase was stopped by transferring the tendons to 25 mM EDTA, and 50 mM Tris-HCl, pH 7.5, at 4°C. Trypsin digestion was performed in trypsin-EDTA in HBSS buffer for 30 min at 20°C and control digestions in HBSS buffer alone. For the detection of open fibripositors, tendons were incubated in DME/F12 supplemented with HRP (Sigma-Aldrich) at 37°C for 3 h, fixed with 2.5% glutaraldehyde, and treated with fast DAB (Sigma-Aldrich) before EM analysis. Tendons subjected to pulse-chase analysis in 1 ml aliquots of supplemented medium were extracted in 100 μl aliquots of salt extraction buffer (1 M NaCl, 25 mM EDTA, 50 mM Tris-HCl, pH 7.4) containing protease inhibitors and supplemented as required with 1% NP-40 detergent. Tendons were usually extracted in four changes of salt extraction buffer; overnight (S1), 6 h (S2), overnight (S3), 6 h (S4), and overnight in NaCl extraction buffer containing NP-40 (N). Extracts were analyzed on 4% precast SDS polyacrylamide gels (Invitrogen) under reducing conditions. The gels were fixed in 10% methanol, 10% acetic acid, dried under vacuum, and exposed to a phosphorimaging plate (Fuji BAS-III or BAS-MS). After overnight exposure the phosphorimaging plates were processed using a phosphorimager (Fuji BAS 2000 or 1800). Protein production, purification, and Western blotting ------------------------------------------------------ ^14^C-Labeled procollagen I was purified from human skin fibroblasts as described previously ([@bib16]). Recombinant human BMP-1 was prepared as described previously ([@bib10]). Recombinant ADAMTS-2 was obtained from 293-EBNA cells transfected with a cDNA encoding ADAMTS-2 (a gift from A. Colige, Universite de Liege, Liege, Belgium). Protein extracts were examined by standard Western blot procedures and optimal antibody dilutions determined empirically. Anticalnexin CT, antimembrin and anti-hsp47 antibodies were purchased from StressGen Biotechnologies. Anti-BiP and anticaveolin antibodies were purchased from Santa Cruz. The anti-β1 integrin antibody was from Sigma-Aldrich. EM -- Freshly dissected chick metatarsal tendons were cut into 3-mm lengths and frozen to −196°C using an EM PACT high pressure freezer (Leica). Freeze substitution for ultrastructure was performed using an AFS system (Leica), starting at --90°C in 2% wt/vol osmium tetroxide in actone, going through pure acetone at −50°C and ending in several changes of Spurr\'s resin ([@bib34]). at 20°C. Polymerization in fresh resin was then performed at 60°C for 24 h. Freeze substitution for immunolabeling was performed using an AFS system (Leica) using pure acetone at --90°C, pure ethanol at −50°C in ethanol, and ending in several changes of HM20 Lowicryl resin at −50°C. UV polymerization in fresh resin was then performed at --50°C for 48 h and continued at 20°C for 48 h. Embryonic mouse tails were fixed in 2% glutaraldehyde in 100 mM phosphate buffer, pH 7.0, for 30 min at RT. The tails were then diced and fixed for 2 h at 4°C in fresh fixative. After washing in 200 mM phosphate buffer they were fixed after in 1% glutaraldehyde and 1% OsO~4~ in 50 mM phosphate buffer, pH 6.2, for 40 min at 4°C. After a rinse in distilled water they were en bloc stained with 1% aqueous uranyl acetate for 16 h at 4°C, dehydrated and embedded in Spurrs\' resin. Ultra-thin sections for normal transmission electron microscopy were collected on uncoated copper 200 grids, serial sections for 3-D reconstruction on formvar-coated copper 1,000 μm slot grids (stabilized with carbon film) and ultra-thin sections (∼60 nm) for immunolabeling on formvar-coated nickel 400 grids. A postembedding labeling technique was used to detect type I collagen using a rabbit anti--chicken collagen-I antibody (Biodesign International) at a dilution of 1:500 followed by a gold-conjugated goat anti--rabbit antibody (British Biocell International) at a dilution of 1:200. All sections were subsequently stained with uranyl acetate and lead citrate, and examined using either a JEOL 1200EX, Philips EM 400, or Philips BioTwin transmission electron microscope. Images were recorded on 4489 film (Kodak) and scanned using an Imacon Flextight 848 scanner (Precision Camera & Video). Images from EM serial sections were aligned and reconstructed in IMOD for Linux ([@bib20]) and visualized using OpenSynu for Linux ([@bib11]). Online supplemental material ---------------------------- Experimental procedures are available online concerning the differential extraction of secretory pathway proteins and ECM proteins. Fig. S1 depicts the differential extraction of ECM proteins and intracellular proteins. Methods were developed that facilitated the differential extraction of ECM proteins and proteins enclosed within membrane-bound compartments. Proteins in the ECM were solubilized in neutral buffers at 4°C, whereas those in membrane compartments were subsequently extracted in buffers containing NP-40. EM was used to examine the ultrastructure of the cells after each extraction. Western blot analysis was used to examine the protein composition of each extract. Video 1 depicts a 3-D reconstruction of part of a tendon fiber that runs down the mouse tail showing cells and associated fibripositors. Cells are color rendered. Some fibripositors are shown in yellow. The video shows that the cells are cylindrical in shape. Cylindrical channels occur between cells. Online supplemental material is available at <http://www.jcb.org/cgi/content/full/jcb.200312071/DC1>. The authors thank Adam Huffman for help and advice with computing, David Mastronarde with help and advise concerning IMOD, Steve Lamont for advice concerning OpenSynu, Alain Colige for the gift of cells expressing recombinant ADAMTS-2, and Gillian Wallis for critical reading of the manuscript. The work was supported by grants from The Wellcome Trust and the BBSRC (JREI fund), as well as a research collaborative grant from the EU (Framework 5). The EM was carried out in the EM Unit, School of Biological Sciences, University of Manchester, Manchester, UK. [^1]: Address correspondence to Karl E. Kadler, Wellcome Trust Centre for Cell-Matrix Research, School of Biological Sciences, University of Manchester, Michael Smith Building, Oxford Road, Manchester M13 9PT UK. Tel.: 44-161-275-5086. Fax: 44-161-275-1505. email: <karl.kadler@man.ac.uk>
2024-06-20T01:26:58.646260
https://example.com/article/1064
Hot news just in: Elyse Knowles and I are basically long lost twins. Sleeping is our favourite hobby, we both have dogs who are essentially our kids, and our favourite place in the world is home. Okay, I’ll take back what I said - sadly the two of us have three things in common and three things only. Besides the fact that she has over 885k more Instagram followers than me, the queen of multi-tasking has already achieved her dream goal of becoming the face of Australian swimwear brand Seafolly at the young at of 25….and here I am still sitting on my couch binge watching Gossip Girl for the fifth time. Image: Supplied. Seafolly.Source:BodyAndSoul But even though scrolling through her Instagram account makes you wish you had a fairy godmother who could magically give you Elyse’s hardcore abs, golden hair, sun-kissed skin and drop-dead gorgeous blue eyes, the nation’s favourite tomboy just wants everyone to take a step back from the world of filters, angles, good lighting, makeup and Photoshop editing, and instead love the person in the mirror, despite what the haters say. “The common issue we have in our generation is that we are surrounded by images that aren’t real. Everyone puts their best version of themselves on social media; it’s hard but we have to remember that that person doesn't look like that all the time, so definitely don’t compare yourself to that person you see on social media.” Okay okay, you’re probably thinking she’s just another model who rambles on about all this self-love talk but actually really loves a good filter and touched-up selfie. However, you need to hold it right there woman, because she’s not kidding around at all, and in actual fact, is so much more than just another pretty face. The girl despises wearing makeup and getting glammed up, and admits that her number one beauty secret doesn’t cost a cent. “Beauty starts with a good sleep. I’m all about sleep and anyone would say that Elyse puts sleep before a lot of things.” Yasss, we definitely agree. Image: Supplied. Seafolly.Source:BodyAndSoul To add to this, her own makeup routine literally takes less than a minute, where she quite simply “uses a clear gel to make [her] eyebrows stand up and look thick.” And that’s all. #shook Her diet’s nothing fancy-schmancy either. For brekkie it’s a smoothie made with Vital All-In-One, “banana, almond milk, cacao, sometimes some extra protein, and cinnamon”, which is then served “out of a bowl” and “topped with some seeds and nuts for crunch.” Then lunch is scrambled eggs with spinach, avocado, pesto and goats cheese. And for dinner it’s “lots of veggies with chicken or fish”...and of course, she has “treats in between because you need to treat yourself.” Hey, great minds think alike Elyse, which means we have four things in common. Image: Supplied. Seafolly.Source:BodyAndSoul But as simple as she makes it all sound and as effortless as she makes it look, her success at such a young age didn’t just appear out of thin air. “I’ve set my standards pretty damn high which I wish I didn’t but it makes me work really really hard.” And her strong work ethic comes by keeping one notion at the very forefront of her mind: staying true to her beliefs and understanding that everyone is their own unique version of perfection and beauty. “Be confident, be strong, and you can focus on yourself and slowly do whatever you need to do for yourself. But stop comparing yourself to others because you’re beautiful and your smile is stronger and more confident than anything else and anyone in any photo.”
2023-10-08T01:26:58.646260
https://example.com/article/8058
# F3实例RTL开发最佳实践 {#concept_71547_zh .concept} 本文描述基于F3实例的RTL(Register Transfer Level)开发流程。 **说明:** - 本文所述所有操作必须由同一个账号在同一个地域执行。 - 强烈建议您使用RAM用户操作FPGA实例。 基于最小授权原则,建议您不要对RAM用户过度授权,而只授予RAM用户刚好满足其工作所需的权限。 使用FaaS服务,需要您授权FaaS服务账号访问您指定的OSS bucket,所以您需要在RAM控制台创建一个服务角色faasRole,并授予其faasPolicy权限。 如果您需要使用KMS服务对IP进行加密,必须在faasPolicy里授予KMS相关的权限。 ## 前提条件 {#section_agy_vy3_dfb .section} - 您已经 [创建F3实例](../../../../../cn.zh-CN/用户指南/实例/创建实例/创建f3实例.md),实例能访问公网,并且实例所在安全组中已经添加对SSH(22)端口访问放行的规则。 - 登录 [云服务器ECS管理控制台](https://ecs.console.aliyun.com/#/home),在F3实例的详情页上,获取实例ID。 - 在华东2 [创建一个OSS Bucket](../../../../../cn.zh-CN/快速入门/创建存储空间.md),专门用于FaaS服务。 **说明:** 这个Bucket会对FaaS管理账号开通读写权限,因此不建议您存储与FaaS无关的内容。 - 如果使用RAM用户操作FPGA,必须完成以下操作: - [创建RAM用户](../../../../../cn.zh-CN/快速入门/创建 RAM 用户.md) 并 [授权](../../../../../cn.zh-CN/快速入门/为 RAM 用户授权.md)。 - [创建RAM角色](../../../../../cn.zh-CN//身份管理/角色.md) 并 [授权](../../../../../cn.zh-CN//授权管理/授权.md)。 - 获取AccessKey ID和AccessKey Secret。 ## 操作步骤 { .section} 1. [远程连接Linux实例](../../../../../cn.zh-CN/用户指南/连接实例/使用用户名密码验证连接Linux实例.md)。 **说明:** 编译工程时需要 2 ~ 3 小时。建议您使用nohup或者VNC连接实例,以免编译时意外退出。 2. 下载并解压 [RTL参考设计](https://faas-ref-design.oss-cn-hangzhou.aliyuncs.com/FaaS_F3/f3_hdk.tar.gz)。 3. 配置环境。 - 如果驱动为 `xdma`,需要运行以下命令来配置环境。 ```language-bash source /root/xbinst_oem/F3_env_setup.sh xdma #每打开一个终端窗口就需要执行该命令一次 ``` - 如果驱动为 `xocl`,则需要运行以下命令来配置环境。 ```language-bash source /root/xbinst_oem/F3_env_setup.sh xocl #每打开一个终端窗口就需要执行该命令一次 ``` **说明:** 配置环境主要包括安装xdma驱动或xocl驱动,设置vivado环境变量,检查vivado license,检测aliyun-f3 sdaccel平台,2018.2 runtime配置和faascmd版本检测 。 4. 指定OSS存储空间。 ```language-bash faascmd config --id=hereIsYourSecretId --key=hereIsYourSecretKey #将hereIsYourSecretId和hereIsYourSecretKey替换为您的RAM用户AK信息 faascmd auth --bucket=hereIsYourBucket # 将hereIsYourBucket替换为您创建的OSS Bucket名称 ``` 5. 运行以下命令编译RTL工程。 ```language-bash cd <您之前解压的路径>/hw/ # 进入解压后的hw路径 sh compiling.sh ``` **说明:** 编译工程需要2 ~ 3小时。 6. 上传网表文件,并下载FPGA镜像。您可以采用脚本化流程或者单步操作流程完成该步骤。 - **脚本化流程**:仅适用于配备单块FPGA卡的F3实例。 1. 运行以下命令上传并生成镜像文件。 ``` sh /root/xbinst_oem/tool/faas_upload_and_create_image.sh <bit.tar.gz需要上传的压缩包文件名> ``` ![](http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/9830/154754406412110_zh-CN.png) 2. 下载镜像文件。 ``` sh /root/xbinst_oem/tool/faas_download_image.sh <bit.tar.gz压缩包的文件名> <0/1> # 最后的数字<0/1>为实例中fpga的序号 ``` 0为FaaS实例中的第一个FPGA,单芯片实例序号一律为0,对多芯片实例,例如4芯片的序号为0,1,2,3。 如果需要对多个FPGA下载同一个镜像,可以在命令的末尾添加相应的序号。例如,对4芯片FPGA下载同一镜像的命令为: ``` sh /root/xbinst_oem/tool/faas_download_image.sh <bit.tar.gz压缩包的文件名> 0 sh /root/xbinst_oem/tool/faas_download_image.sh <bit.tar.gz压缩包的文件名> 1 sh /root/xbinst_oem/tool/faas_download_image.sh <bit.tar.gz压缩包的文件名> 2 sh /root/xbinst_oem/tool/faas_download_image.sh <bit.tar.gz压缩包的文件名> 3 ``` - **单步操作流程**:[使用faascmd工具](cn.zh-CN/最佳实践/FaaS 实例最佳实践/faascmd工具/使用faascmd.md#) 进行操作。 1. 运行以下命令,将压缩包上传到您个人的OSS Bucket,再将存放在您个人OSS Bucket中的gbs上传到FaaS管理单元的OSS Bucket中。 ```language-bash faascmd upload_object --object=bit.tar.gz --file=bit.tar.gz faascmd create_image --object=bit.tar.gz --fpgatype=xilinx --name=hereIsFPGAImageName --tags=hereIsFPGAImageTag --encrypted=false --shell=hereIsShellVersionOfFPGA ``` ![](http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/9830/154754406412112_zh-CN.png) ![](http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/9830/154754406412113_zh-CN.png) 2. 运行命令查看FPGA镜像是否处于可下载状态。 ``` faascmd list_images ``` 在返回结果中,如果`State`为 `compiling`,表示FPGA镜像处于编译状态,您需要继续等待。如果 `State` 为 `success`,表示FPGA镜像已经可以下载。您需要找到并记录FpgaImageUUID。 ![](http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/9830/154754406412115_zh-CN.png) 3. 运行以下命令。在命令返回结果中,您需要找到并记录FpgaUUID。 ``` faascmd list_instances --instanceId=hereIsYourInstanceId # 将hereIsYourInstanceId替换为F3实例ID ``` 4. 运行以下命令下载FPGA镜像。 ``` faascmd download_image --instanceId=hereIsYourInstanceId --fpgauuid=hereIsFpgaUUID --fpgatype=xilinx --imageuuid=hereIsImageUUID --imagetype=afu --shell=hereIsShellVersionOfFpga # hereIsYourInstanceId替换为F3的实例ID,hereIsFpgaUUID替换为您获取的FpgaUUID,hereIsImageUUID替换为您获取的FpgaImageUUID ``` ![](http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/9830/154754406512116_zh-CN.png) 5. 运行以下命令查看镜像是否下载成功。 ``` faascmd fpga_status --fpgauuid=hereIsFpgaUUID --instanceId=hereIsYourInstanceId # hereIsFpgaUUID替换为您获取的FpgaUUID,hereIsYourInstanceId替换为F3实例ID。 ``` 以下为返回结果示例。如果显示的FpgaImageUUID与您获取的FpgaImageUUID一致,并且显示 `"TaskStatus":"valid"`,说明镜像下载成功。 ![](http://static-aliyun-doc.oss-cn-hangzhou.aliyuncs.com/assets/img/9830/154754406512117_zh-CN.png) ## FAQ { .section} **上传镜像时出现异常,如何查看异常详情?** 如果您的工程在上传生成镜像的过程中出现异常,例如云上编译服务器编译报错,你可以通过以下两种方式来查看异常详情: - 查看faas\_compiling.log。使用上传脚本faas\_upload\_and\_create\_image.sh时,如果编译失败会自动下载并打印faas\_compiling.log到terminal中。 - 手动执行命令查看编译log文件:`sh /root/xbinst_oem/tool/faas_checklog.sh <bit.tar.gz之前上传的压缩包文件名>` **如何重新加载镜像?** 您可以参考以下步骤重新加载镜像: 1. 卸载驱动。 - 如果您安装了`xdma` 驱动,需要在实例中运行 `sudo rmmod xdma`命令卸载驱动。 - 如果您安装了`xocl` 驱动,则需要在实例中运行 `sudo rmmod xocl` 命令卸载驱动。 2. 下载镜像。您可以使用以下两种方式之一: - 使用脚本: ``` sh faas_download_image.sh bit.tar.gz <0/1> #最后的数字为实例中FPGA的序号 ``` - 使用faascmd: ``` faascmd download_image --instanceId=hereIsYourInstanceId --fpgauuid=hereIsFpgaUUID --fpgatype=xilinx --imageuuid=hereIsImageUUID --imagetype=afu --shell=hereIsShellVersionOfFpga ``` 3. 安装驱动。 - 如果您需要安装 `xdma` 驱动,运行以下命令。 ``` sudo depmod sudo modprobe xdma ``` - 如果您需要安装 `xocl` 驱动,则需要运行以下命令。 ``` sudo depmod sudo modprobe xocl ```
2024-07-06T01:26:58.646260
https://example.com/article/1413
Paired with a 4-inch memory gel mattress topper this mattress has helped create a perfect night's sleep. Have never woke up with a stiff back or aching joints since purchasing this mattress a while back. I needed a king mattress for our guest room and chose this due to the ratings and cost. I looked locally as well as online and couldnt pass up on Overstocks deal. Delivery was about 10 days (I expected 4 weeks) and delivery guys were great. The mattress is very comfortable and perfect for me. I paid for a firm king size bed , and what i got was a box spring bed that feels like a water bed. The same day i got It i call for them to come pick it up. It's price range for pick up is $295-$695. The set was only $***. Never again. HORRIBLE mattress and customer service. I purchased this "firm" mattress and what I got was a soft mattress with no support. If my husband moves his arm, I rock and roll on my side of the bed. I contacted Overstock and they told me it would be a charge of $XXX.XX to return this defective mattress! I shouldn't have had to pay for removal as this mattress was not hat was advertised. I am a long time customer of Overstock but will never purchase another item from them again. They lost a customer over this cheap, defective product. Stay away!!! Do not buy!!!! We were seeking a very firm mattress. After reading the description and previous reviews this mattress seemed to be exactly what we were looking for; so I took a shot at ordering online. For us, this mattress is not at all firm. It is very "springy" and after less than one month of use there are sagging spots were we lay. I'm sorry to say we will be returning this purchase. This is not a bad mattress, it is good quality and at a good price. I found it to be extremely firm however. I have had it for over a month and after the first night I ordered a thick pad to go with it for some much needed give (it was rough sleeping until the pad arrived). I am hoping that after some time it may wear some tension out of the springs or something, but so far it is still pretty firm. I have a bad back, and am a side sleeper, before this mattress I woke up frequently thru the night with back pain, the good thing with this mattress is that I noticed an almost immediate improvement in my back pain. The problem is that it is so firm it hurts my ribs and hips from sleeping on my side, the addition of a pad has solved that problem. A firm with pillow top mattress would have been a better purchase. I visited a local bed store and could not find this specific mattress to test it out. At the store, I tested their cheapest FULL size Serta mattress (about $375 with box spring+ tax, np delivery) and it was terrible, too soft, too thin, junk. The sales person said they only kept that one in the store to show customers what you get for that price. Next I tried the second lowest price full mattress (about $500 with box springs + tax, n delivery) and it felt nice. Being frugal, I took the chance and ordered this Serta Revival full from Overstock, with a low profile box spring (included). It took about 3 weeks to get here. We live in a remote area in the Rocky Mountains. A "white glove" delivery service brought the mattress into the bedroom, removed the packaging, and placed the mattress set where we needed it (really helpful when I have a herniated back and cannot lift up anything heavy). They were friendly and efficient, and even took the packaging with them, leaving me no trash. Some folks complain about the time it takes to deliver the product, yet OS says it takes 2-4 weeks, so folks shouldn't complain, its free! The mattress store was going to charge me $50 for delivery! The mattress is firm, as described, yet comfortable. I use it with a $25 Serta Mattress pad I purchased elsewhere. I love the option of standard or low profile boxspring. Even though there are more comfortable mattresses out there, you would have to pay 75% + more for them. I am very happy with my purchase. It cost me $360- for a FULL SIZE, yet same model, free shipping, no tax; great deal! The only thing I would change is to have OS show the photo of the actual product. The photo shows the pillowtop Revival model, while the one I purchased was not just a firm, non pillow top. It looks very similar, yet why not just show the actual product. Still, 5 stars, great value. Shop Overstock™ and find the best online deals on everything for your home and your family. We work every day to bring you discounts on new products across our entire store. Whether you're looking for memorable gifts or everyday essentials, you can buy them here for less. Not just anyone’s mobile outlet, your mobile outlet.
2024-04-13T01:26:58.646260
https://example.com/article/2337
Adam Exner Adam Joseph Exner (born December 24, 1928, Killaly, Saskatchewan) was the Archbishop of the Roman Catholic Archdiocese of Vancouver from 1991 to 2004. Training and early religious life Adam Exner holds Masters degrees in philosophy and theology from the Pontifical Gregorian University in Rome and holds a Doctoral degree in theology from the University of Ottawa. He served as professor, rector and superior at St. Charles Scholasticate in Battleford, Saskatchewan, and as professor of moral theology at Newman Theological College in Edmonton, Alberta. He entered the religious institute of the Missionary Oblates of Mary Immaculate in 1950 in St. Norbert, Manitoba and was ordained as a priest in 1957. In 1974, Exner was appointed Bishop of Kamloops and in 1982, Archbishop of Winnipeg. Archbishop of Vancouver Adem Exner was appointed Archbishop of Vancouver on May 25, 1991. He served in that position until reaching the mandatory retirement for Archbishops in January 2004. That year, the Catholic Civil Rights League created the Archbishop Exner Award for Catholic Excellence in Public Life in honour of the occasion. He resides at St. Peter's Abbey, Muenster, Saskatchewan. Advocacy and activities In 1995, Archbishop Exner secured from then-Premier Michael Harcourt, the Denominational Health Association, a legacy of his predecessor, Archbishop James Francis Carney. During his tenure, Exner objected to efforts by the Minister of Health, Colin Hansen, to close St. Mary's Hospital (Vancouver). While Exner was Archbishop of Vancouver, civil litigation resulting from the Mount Cashel Orphanage sexual and physical abuse scandal threatened assets of the Congregation of Christian Brothers located in British Columbia. These included Vancouver College and St. Thomas More Collegiate, which faced closure and liquidation in order to pay the victims. Archbishop Exner was closely involved with the efforts to prevent the closure of those schools. Archbishop Exner assisted Covenant House, a home for runaway street kids, in establishing a branch of its services into Vancouver. Under direction from Archbishop Exner, the Archdiocese of Vancouver sought and obtained intervenor status during litigation involving Trinity Western University relating to its training policies. The litigation involved a dispute between Trinity Western, a Christian university, and the British Columbia College of Teachers, which believed that TWU could not train teachers for public schools because it required students to abstain from homosexual relations. TWU won in the Court of Appeal and the Supreme Court. In 2003, Exner directed four Catholic schools to divest from a school banking program operated by VanCity, in protest of the Archdiocese's position that VanCity was actively promoting homosexuality through its sponsorship of a homosexual film festival and by giving an award to a lesbian bookstore. Honours Archbishop Exner was appointed Knight Grand Cross of the Equestrian Order of the Holy Sepulchre as well as Grand Prior of the Lieutenancy of Canada. Memberships In his role as Archbishop, Exner became a member of the following: Sacred Congregation for Bishops Permanent Council of the Canadian Conference of Catholic Bishops, with which he was involved in the Theology and Christian Education Commissions and the National Catholic-Lutheran dialogue Member of the Social Communications Commission See also Robert Jacobson References External links Archdiocese of Vancouver former bishops Category:Living people Category:1928 births Category:Archbishops of Winnipeg Category:Archbishops of Vancouver Category:20th-century Roman Catholic bishops Category:21st-century Roman Catholic bishops Category:University of Ottawa alumni Category:Knights of the Holy Sepulchre
2023-09-03T01:26:58.646260
https://example.com/article/9379
/*! * is-descriptor <https://github.com/jonschlinkert/is-descriptor> * * Copyright (c) 2015-2017, Jon Schlinkert. * Released under the MIT License. */ 'use strict'; var typeOf = require('kind-of'); var isAccessor = require('is-accessor-descriptor'); var isData = require('is-data-descriptor'); module.exports = function isDescriptor(obj, key) { if (typeOf(obj) !== 'object') { return false; } if ('get' in obj) { return isAccessor(obj, key); } return isData(obj, key); };
2024-06-09T01:26:58.646260
https://example.com/article/1019
Binocular vision and ipsilateral retinal projections in relation to eye and forelimb coordination. It is commonly proposed that the number of fibers that do not cross in the optic chiasm (OC) is proportional to the size of the binocular visual field, and that the major advantage of binocular vision is acute depth perception. I present an alternative, an 'eye-forelimb' (EF) hypothesis, suggesting that alterations in the OC influence the length of neural pathways that transmit visual information to motor nuclei and somatosensory areas involved in forelimb coordination. Evolutionary processes resulting in increased ipsilateral retinal projections (IRP) are of adaptive value in animals that regularly use the forelimbs in a frontal position, while evolutionary change towards reduced IRP is of value for animals that mainly use the forelimbs in lateral positions. Primates and cats, to a large extent, use visually guided forelimb maneuvers, and both groups have high proportions of IRP. The fact that vertebrates' IRP arise exclusively from the temporal retina supports the hypothesis, since IRP from the nasal retina would increase the length of neural pathways involved in forelimb coordination. The EF hypothesis offers new perspectives on why a high proportion of IRP among early limbless vertebrates became reduced during the evolution of laterally situated limbs, and why reptiles that lost their limbs (snakes) evolved more IRP. Anatomical, neurophysiological, phylogenetic, ontogenetic and ecological data suggest that mutations changing the proportions of ipsilateral visual connections in the OC may have selective value for EF coordination.
2024-05-02T01:26:58.646260
https://example.com/article/4401
Major road works in Lincoln have been extended after officials discovered more man hours will be needed to complete the project. Narrowed lane widths on Outer Circle Road (1) and Wragby Road (2), along with restricted access from Wolsey Way (3) to Wragby Road/Bunkers Hill, will remain in place until either the end of August or the start of September. Read More "This project will include installing a new drainage system to provide increased flood protection and prevent water damage to properties in the area, in addition to reconstructing a section of Bunkers Hill’s carriageway. “When complete, the two projects will complement each other by hugely improving what is one of Lincoln’s busiest areas." The Wragby Road improvement project is being funded using part of the £5.4m allocated to the authority by the Department of Transport (DfT) from its National Productivity Investment Fund. The money was awarded to help reduce congestion at key locations, upgrade or improve the maintenance of local highway assets, improve access to employment and housing, and develop economic and job creation opportunities. Meanwhile in Grantham, the first of three major highways projects is set to start at the end of the month. Over the summer, the highways team will be rebuilding the busy London Road/Wharf Road junction (4) and sections of Avenue Road/Stonebridge Road (5). In addition, new-and-improved traffic lights will be installed at the London Road/Bridge End Road (6) junction. Cllr Richard Davies, executive member for highways, said: "These sections of road are in need of repair, but instead of just filling in the potholes, we're going to be completely rebuilding them. "That way they should last a lot longer and require less maintenance. "Similarly, the traffic lights at the junction of London Road and Bridge End Road are reaching the end of their life and need to be replaced. "The new lights will be much more energy efficient and easier to maintain, helping to reduce running costs. "We've scheduled all this work for the school holidays, when there's much less traffic about, which will help reduce the impact on motorists. "That said, there is still likely to be some disruption. We apologise for any inconvenience caused, and would encourage people to use alternative routes where possible. "But I'm confident that the long-term benefits will be worth it." Project one: reconstruction of London Road/Wharf Road junction Work is due to begin at 6am on Sunday 29 July, when the London Road/Wharf Road junction is completely rebuilt. The team will be working 24 hours a day, and the project is expected to be completed by 7am on Friday, August 3. Because of the nature of the works, the junction will need to remain closed to traffic throughout the project. Local diversions will be in place for smaller vehicles that can travel under the railway bridges in the town, while larger vehicles will be diverted via the A1. Project two: new traffic lights at London Road/Bridge End Road junction On Monday, August 6, work will begin to replace the traffic signals at junction of London Road and Bridge End Road. These improvements will be carried out under three-way temporary signals, with a temporary pedestrian crossing on South Parade. Springfield Road will be closed between the A52/B1184 and a point 50 metres west of the railway bridge. Diversion signs will be in place. This project is expected to take four weeks. Project three: reconstruction of Avenue Road/Stonebridge Road Work will be taking place on Avenue Road/Stonebridge Road from Monday 13 August to Sunday 2 September. A section of carriageway between the B1174 St Peter's Hill and Sandon Road will be rebuilt, while the footpath between Castlegate and Welham Street will be resurfaced and new kerbing installed. Work will take place during the daytime under a road closure, with diversion routes in place.
2023-08-05T01:26:58.646260
https://example.com/article/3869
4*s. What is the remainder when 562 is divided by c? 42 Suppose -d = 3, 3*d - 5273 + 426 = -4*o. Calculate the remainder when o is divided by 87. 83 Suppose -5*t - 5*b = -2065, -72*t = -69*t - b - 1255. What is the remainder when t is divided by 110? 87 Suppose 0 = 73*k - 113*k + 3266 - 1106. Calculate the remainder when 1072 is divided by k. 46 Let h(n) = n**3 - 7*n**2 + 2*n - 12. Let o be h(7). Suppose -c + 19 = -o*s, -c - 1 = 5*s - 6. Calculate the remainder when 74 is divided by c. 14 Suppose 30 = -2*x - 3*x. Let j be -2 - x - 0/1. Suppose 0 = w - 2*h - 30, h + j*h - 10 = 0. Calculate the remainder when w is divided by 9. 7 Suppose -3*j - 119 + 35 = 0. Let f be ((-96)/j)/2*42. Let y = 83 - f. What is the remainder when y is divided by 7? 4 Suppose 14*u - 120 = -988. Let n = -30 - u. Calculate the remainder when 85 is divided by n. 21 Suppose 3*m - 1427 = 5*d, -954*d + 956*d + 475 = m. Calculate the remainder when m is divided by 42. 17 Suppose 0 = -5*k - 154*m + 158*m + 532, 6*m = 2*k - 226. What is the remainder when 1967 is divided by k? 95 Let k(o) = -o**2 + 142*o + 1957. Calculate the remainder when 1805 is divided by k(151). 11 Suppose -5*w + 402 = 352. Suppose v = -3*q + 144, 0 = -5*v + w*v - 3*q - 720. What is the remainder when v is divided by 30? 24 Let g be 124 + -4 - (-6 + 1). Let y = -63 + g. Let o(c) = 2*c + 3. What is the remainder when y is divided by o(5)? 10 Let p(n) = n + 3. Let a be p(10). Let z(y) = -3*y - 7. Let l be z(a). Let x = -39 - l. Calculate the remainder when 17 is divided by x. 3 Let w(a) = 12*a - 117. Let z be w(9). Let i = 137 - z. What is the remainder when i is divided by 38? 32 Let v = -89 + 176. Let k(x) = x**3 - 14*x**2 + 15*x - 26. Let f be k(13). Let s(a) = -a**3 - 4*a + 30. What is the remainder when v is divided by s(f)? 27 Suppose 2*l - 24 = 6*n - 2*n, 15 = -3*n. Suppose -10 = m - 4*r, -4*r + 2 = -m - l*r. Calculate the remainder when ((-18)/(-15))/(m/465) is divided by 20. 13 Suppose 2*z - z + 3*u = -10, 0 = -z - 4*u - 15. Suppose 287 = -z*r + 992. What is the remainder when r is divided by 21? 15 Suppose -28*k - 2*l - 16 = -23*k, 0 = -3*k + 4*l + 6. Calculate the remainder when (29 + k)*63/21 is divided by 43. 38 Suppose 64 = -3*b + 7*b. Suppose 9*l + 273 = b*l. Calculate the remainder when l is divided by 21. 18 Suppose -2*i + 19416 = -15*i + 25*i. What is the remainder when i is divided by 11? 1 Suppose 7*j - 171 = 361. Let f = j + -62. Calculate the remainder when 137 is divided by f. 11 Let i(b) = -b**2 + 7*b - 12. Let y be i(5). Let w(l) = -6*l + 10. Let u(s) = -s**2 - 16*s + 24. What is the remainder when u(-7) is divided by w(y)? 21 Let i = 507 - 507. Suppose -949 = -13*q - i*q. Calculate the remainder when q is divided by 16. 9 Let r(k) = -14*k - 1739. Let v(j) = -39*j - 1. Calculate the remainder when r(-157) is divided by v(-2). 74 Let o(y) = 8*y**2 + 99*y + 881. What is the remainder when o(-9) is divided by 34? 26 Suppose -19*m + 83 + 31 = 0. Suppose 34*f - m*f - 532 = 0. Calculate the remainder when 33 is divided by f. 14 Let o = 11482 - 10617. Calculate the remainder when o is divided by 10. 5 Suppose -3*y + 2*n = -17, 4*y - y - 25 = 4*n. Let i(h) = 2*h**3 - 10*h**2 - 22*h + 96. Calculate the remainder when i(6) is divided by y. 0 Let z = 10689 + -10644. Calculate the remainder when 227 is divided by z. 2 Let c(b) = 104*b + 442. Let p(t) be the second derivative of -11*t**3/2 + 2*t**2 - 8*t. What is the remainder when p(-3) is divided by c(-4)? 25 Let x(w) = -2*w**3 + 24*w**2 + 10*w + 9. Let z be x(12). Calculate the remainder when 341 is divided by (-7 - (-200)/30)/((-1)/z). 40 Suppose -29*i + 8945 = 1956. Suppose -2*r + i = 177. What is the remainder when r is divided by 26? 6 Let r = 2708 + -2251. Calculate the remainder when r is divided by 109. 21 Let p be (-1194)/4*(-8)/(-12). Let n = -111 - p. What is the remainder when n is divided by 9? 7 Suppose 8*k - 1328 = 5*k - 5*k. Calculate the remainder when 1820 is divided by k. 160 Let q = 27 - 6. Let m be 1*3 + 11 + -12. Suppose m*b + 7 = 85. Calculate the remainder when b is divided by q. 18 Let r = 120 + -76. Let n = r + -42. Calculate the remainder when 43 is divided by 10/(-15)*33/((-2)/n). 21 Let k(o) = 3*o**2 + 4*o. What is the remainder when 217 is divided by k(2)? 17 Calculate the remainder when 5181 is divided by 1098/2013 + 291/11. 24 Let g(h) = h**3 + 6*h**2 - 10*h - 15. Let r be g(-7). Suppose -7 = -l + 3*j - r*j, 2*l - 3*j - 14 = 0. Calculate the remainder when 61 is divided by l. 5 Suppose 0 = -q + 2*h + 19, 37 = 2*q - 3*h + 4. Suppose -q*i + 3882 = -5631. What is the remainder when i is divided by 46? 45 Suppose 2604 = 3*y - 1912*k + 1913*k, 3*y - 2*k = 2604. What is the remainder when 1749 is divided by y? 13 Suppose -r = -2*w + 518, 5*w - 1256 = -0*w - 4*r. Calculate the remainder when w is divided by 128. 0 Let o(h) = 36*h + 336. Suppose a + 616 = 5*a. Calculate the remainder when a is divided by o(-9). 10 Let z = -7576 + 7589. What is the remainder when 3206 is divided by z? 8 Let s be 2/21 - (-18960)/(-630). Calculate the remainder when 169 is divided by (-28 - s)/((-2)/(-34)). 33 Let i = 580 + -580. Suppose i = -61*o + 72*o - 176. Calculate the remainder when o is divided by 14. 2 Let l = 2223 + -1479. Suppose 4*h - l = -2776. What is the remainder when ((-2)/4)/(2/h) is divided by 32? 31 Let r(c) = -3*c**2 + 102*c - 587. What is the remainder when 287 is divided by r(18)? 10 Let h = 2406 - 2361. Calculate the remainder when (-176 + 2)/(4 - 6) is divided by h. 42 Suppose t = 2*t + 2, -5*x + 5*t + 1045 = 0. What is the remainder when x is divided by 13? 12 Let r = -2075 + 2329. Calculate the remainder when r is divided by 15. 14 Suppose 108 = -19*r - 8*r. Let p be (20/15)/(4/6). Calculate the remainder when 31 is divided by ((-3)/3 - p)*r. 7 Let a(n) be the second derivative of 17*n + 0 + 31/6*n**3 + 13/2*n**2. Calculate the remainder when a(4) is divided by 35. 32 Let x = 84 - 10. Let d = 28 + -38. Calculate the remainder when x is divided by (176/(-40))/(4/d). 8 Let m = -22609 - -23499. What is the remainder when m is divided by 226? 212 Let x = -4964 + 5018. Calculate the remainder when x is divided by 20. 14 Suppose -118 = -5*a + 4*z - 47, 2*a - 3*z = 34. Calculate the remainder when a is divided by 4. 3 Let a = 703 + -700. Suppose -o + 2 = 0, -61 = 2*g + a*o - 189. What is the remainder when g is divided by 4/((-12)/(-63))*1? 19 Let v = 3 + 28. Let m = -129 + 150. Let j = v - m. Calculate the remainder when 48 is divided by j. 8 Let i(q) = -3*q - 25. Let v be i(15). Let k = 71 + v. Calculate the remainder when -47*(k - (-3 - -5)) is divided by 16. 15 Suppose 18*s = -271 + 2035. Let m(w) = -w + 35. Calculate the remainder when s is divided by m(0). 28 Let y = -8107 + 8556. Calculate the remainder when y is divided by 10. 9 Suppose v + 13651 = 5*d, -3*v + 8169 = 10*d - 7*d. What is the remainder when d is divided by 13? 12 Calculate the remainder when (7/8 + 30/240)*1150 is divided by 230. 0 Calculate the remainder when 493 is divided by 93 + -99 + (-9)/6*(-736)/12. 63 Let f(d) = -267*d**3 + 5*d**2 - 35*d - 65. Calculate the remainder when f(-2) is divided by 39. 16 Suppose -4*w + 6*p + 36 = 7*p, 4*w - 5*p = 60. Suppose w*v - 292 - 118 = 0. What is the remainder when 407 is divided by v? 38 Let d = -83 - 252. Let v = d + 377. Calculate the remainder when v is divided by 2 - (-22 + 1/1). 19 Let c(n) = 3*n**3 - 14*n**2 - 33*n + 187. Let z = -1 + -1. Let q(u) = -8*u - 3. Calculate the remainder when c(5) is divided by q(z). 8 Let s = 60 - 0. Calculate the remainder when 110/4*s/10 is divided by 34. 29 Suppose 0 = 12*c - 14*c - 3*h + 932, 3*c = -3*h + 1395. Calculate the remainder when c is divided by 76. 7 Suppose 2*t - 7 = -3, 2*c = -t + 46. Let f be 3/(-15) + c/10 + -6. What is the remainder when (f/12)/((-2)/450) is divided by 19? 18 Let l = 5605 + -5278. Suppose -4 - 37 = -p. Calculate the remainder when l is divided by p. 40 Let k be 3/(-30)*4 - (-44)/10. Suppose 3*y + o - 8 + 0 = 0, -k*o = 2*y + 8. Calculate the remainder when 36 is divided by (4/2 - y/(-4)) + 18. 15 Suppose -20 = -10*w + 30. Suppose 3*f = -w*o + 22, -3*f = -4*f + o + 18. What is the remainder when 25 is divided by f? 11 Let h be -
2024-05-06T01:26:58.646260
https://example.com/article/8374
Check if a doc exists Delete a doc by ID Create a view on the current domain $view = $domain->view(%args); DESCRIPTION A "domain" is like a database handle used for CRUD (creating, updating or deleting) individual objects or documents. The $domain->name can be the name of an index or an index alias. A domain can only belong to a single namespace. NOTE: If $domain->name is an alias, it can only point to a single index. ATTRIBUTES name A $domain->name must be either the name of an index or of an index alias which points to a single index. The index or alias must exist, and must be known to the namespace.
2024-05-28T01:26:58.646260
https://example.com/article/2621
--- abstract: 'In this work we analyze the latency of the simplified successive cancellation (SSC) decoding scheme for polar codes proposed by Alamdar-Yazdi and Kschischang. We show that, unlike conventional successive cancellation decoding, whose latency is linear in the block length, the latency of SSC decoding is sublinear. More specifically, we show that the latency of SSC decoding is $O(N^{1-1/\mu})$, where $N$ is the block length and $\mu$ is the scaling exponent of the transmission channel, which captures the speed at which the rate tends to capacity. We also provide numerical results demonstrating the tightness of the bound and the fact that asymptotically most of the savings in latency comes from the parallel decoding of the constituent codes comprising the polar code.' author: - 'Marco Mondelli, Seyyed Ali Hashemi, John Cioffi, Andrea Goldsmith [^1]' bibliography: - 'lth.bib' - 'lthpub.bib' title: Sublinear Latency for Simplified Successive Cancellation Decoding of Polar Codes --- Introduction {#sec:intro} ============ Polar codes are a family of codes that provably achieves capacity for any binary memoryless symmetric (BMS) channel with low encoding and decoding complexity [@Ari09]. Because of their attractive properties, polar codes have been recently adopted for the enhanced mobile broadband (eMBB) control channel of the fifth generation (5G) wireless communications standard [@3gpp_polar]. For a polar code of block length $N$, the encoding and decoding complexity is $O(N\log_2 N)$; the code construction can be performed with complexity $O(N)$ [@TV13con; @RHTT] and, by exploiting a partial order between the synthetic channels, the construction complexity becomes sublinear in $N$ [@mondelli2018construction]. In addition, the error probability under successive cancellation (SC) decoding scales with the block length roughly as $2^{-\sqrt{N}}$ [@ArT09]. Moreover, polar codes are not affected by error floors [@MHU15unif-ieeeit]. The speed at which the rate tends to capacity has also been extensively studied [@HAU14; @MHU15unif-ieeeit; @XG13; @GB14; @MHU14list-ieeeit; @fazeli2018binary]. These works demonstrate that the gap to capacity scales with the block length as $N^{-1/\mu}$. Equivalently, the smallest block length needed to achieve an assigned gap to capacity scales as $$N \sim \frac{1}{(I(W)-R)^\mu} \text{,}$$ where $R$ is the rate of the code and $I(W)$ is the capacity of the BMS channel $W$. The parameter $\mu$ is called the *scaling exponent*, and it depends on the transmission channel $W$. For any $W$, we have the following universal upper and lower bounds on $\mu$: $3.579 \le \mu\le 4.714$. Furthermore, when $W$ is a binary erasure channel (BEC), we have that $\mu \approx 3.63$ [@HAU14; @MHU15unif-ieeeit]; when $W$ is a binary additive white Gaussian noise channel (BAWGNC), we have that $\mu \approx 4$ [@KMTU10]; and when $W$ is a binary symmetric channel (BSC), it is conjectured that $\mu \approx 4.2$. The introduction of any finite-size list does not improve the scaling exponent under optimal MAP decoding and genie-aided SC decoding [@MHU14list-ieeeit]. However, by using large polarization kernels, polar codes are able to approach the optimal scaling exponent $\mu=2$ [@fazeli2018binary]. The moderate deviations regime, in which both the error probability and the gap to capacity jointly vanish as the block length grows large, has also been a subject of recent investigation [@MHU15unif-ieeeit; @fong2017scaling; @wang2018polar; @blasiok2018polar]. In order to improve the error correction performance of the SC decoder, an SC list (SCL) decoder with space complexity $O(L N\log_2 N)$ and time complexity $O(L N)$ is introduced in [@TVa15], where $L$ is the size of the list. SCL decoding keeps a list of the most likely codewords by running $L$ coupled SC decoders in parallel. Empirically, the error probability of the SCL decoder is close to that of the optimal MAP decoder with practical values of the list size $L$. Furthermore, by adding a few extra bits of cyclic redundancy check (CRC) precoding, the performance is comparable to state-of-the-art low-density parity-check (LDPC) codes. One disadvantage of SCL decoding is the large area required in hardware since multiple coupled SC decoders need to be implemented. Partitioned SCL decoders have been proposed to address this issue [@hashemi_PSCL; @hashemi2017partitioned; @hashemi2018decoder]. Another problem associated with SC-based decoding algorithms, such as SC and SCL, is their high latency. In fact, SC decoding is a serial algorithm, in the sense that decoding proceeds bit by bit. In order to address the problem, a *simplified* SC (SSC) decoder was proposed in [@alamdar], which identifies smaller constituent codes in the polar code and decodes them in parallel. As a result, the latency is reduced with no penalty in the error correction performance. In [@sarkis; @hanif], more constituent codes were identified and low-complexity parallel decoders were designed to increase the throughput and reduce the latency even further. In [@hashemi_SSCL_TCASI; @hashemi_FSSCL_TSP], these results were extended to SCL decoding. In this extension, a simplified SCL (SSCL) algorithm was introduced that decodes the constituent codes in parallel while keeping the same error correction performance as the standard SCL decoding. Recently, a variant of polar codes with log-logarithmic time complexity per information bit has been introduced in [@wang2019log]. This improves upon the logarithmic time complexity per information bit for SC decoding of standard polar codes. However, the time complexity per information bit is a different metric from the decoding latency, which represents the time complexity of the overall decoding process. In this paper, we quantify the latency of the SSC decoder proposed in [@alamdar]. In particular, we prove that the number of time steps needed by the SSC decoder is $O(N^{1-1/\mu})$, which results in sublinear latency. As a benchmark, the decoding latency of the standard SC decoder with a fully parallel architecture is $2N-1$ time steps [@Ari09], thus the SSC decoder yields a (multiplicative) latency gain of $N^{1/\mu}$, where $\mu$ is the aforementioned scaling exponent. To be concrete, this means that the latency of SSC decoding of polar codes scales roughly as $N^{3/4}$ (more precisely, it scales as $N^{0.72}$ for the BEC and as $N^{0.76}$ for the BSC). As demonstrated by numerical simulations, our bound is tight and it also captures the dependence on the transmission channel via the scaling exponent. The remainder of the paper is organized as follows. In Section \[sec:prel\], we provide some preliminaries which include the formal definition of scaling exponent, the construction rule, and the SC and SSC decoding algorithms. In Section \[sec:main\], we state and prove that the latency of SSC decoding is $O(N^{1-1/\mu})$, deferring the proofs of two intermediate lemmas to Appendix \[app:proofs\]. In Section \[sec:numerical\], we present some numerical results that demonstrate the tightness of the upper bound. Our numerical experiments also show that most of the savings comes from pruning constituent codes that are either rate $0$ or rate $1$: pruning additional constituent codes provides some latency gain at moderate block lengths, but the numerical results suggest that the latency still scales as $N^{1-1/\mu}$ for large $N$. Polar Coding Preliminaries {#sec:prel} ========================== Channel Polarization -------------------- Let $W$ be a BMS channel with input alphabet $\mathcal{X}=\{0,1\}$, output alphabet $\mathcal{Y}$, and transition probabilities $\{W(y \mid x) : x\in \mathcal{X}, y\in \mathcal{Y}\}$. Denote by $Z(W)\in [0,1]$ the Bhattacharyya parameter of $W$, which is defined as $$\begin{aligned} & Z(W)= \sum_{y \in \mathcal{Y}} \sqrt{W(y\mid 0)W(y \mid 1)}.\end{aligned}$$ Note that $Z(W)$ is a measure of the reliability of $W$ in the sense that *(i)* if $Z(W)\approx 0$, then the channel is almost noiseless (e.g., its capacity $I(W)\approx 1$), and *(ii)* if $Z(W)\approx 1$, then the channel is very noisy (e.g., its capacity $I(W)\approx 0$). The basis of channel polarization consists in mapping two identical copies of the channel $W: \mathcal{X}\to \mathcal{Y}$ into the pair of channels $W^0: \mathcal{X}\to \mathcal{Y}^2$ and $W^1:\mathcal{X}\to \mathcal{X}\times\mathcal{Y}^2$, defined as [@Ari09 Section I-B], [@HAU14 Section I-B], $$\label{eq:mapch} \begin{split} W^0(y_1, y_2\mid x_1) & = \sum_{x_2\in \mathcal X} \frac{1}{2}W(y_1\mid x_1 \oplus x_2) W(y_2\mid x_2),\\ W^1(y_1, y_2, x_1\mid x_2) & = \frac{1}{2}W(y_1\mid x_1 \oplus x_2) W(y_2\mid x_2).\\ \end{split}$$ Then, the idea is that $W^0$ is a “worse” channel and $W^1$ is a “better” channel than $W$. This statement can be quantified by the following bounds among the Bhattacharyya parameters of $W$, $W^0$ and $W^1$: $$\begin{aligned} Z(W)\sqrt{2-Z(W)^2}&\le Z(W^0)\le 2Z(W)-Z(W)^2,\label{eq:minusB}\\ &Z(W^1)=Z(W)^2,\label{eq:plusB}\end{aligned}$$ which follow from Proposition 5 of [@Ari09] and from Exercise 4.62 of [@RiU08]. By repeating $n$ times the operation , we map $2^n$ identical copies of $W$ into the synthetic channels $W_n^{(i)}$ ($i\in \{1, \ldots, 2^n\}$), defined as $$\label{eq:defWni} W_n^{(i)} = (((W^{b_1^{(i)}})^{b_2^{(i)}})^{\cdots})^{b_n^{(i)}},$$ where $(b_1^{(i)}, \ldots, b_n^{(i)})$ is the binary representation of the integer $i-1$ over $n$ bits. Furthermore, define a random sequence of channels $W_n$, as $W_0=W$, and $$W_{n} = \left\{ \begin{array}{ll}W_{n-1}^0, & \mbox{ w.p. } 1/2,\\ W_{n-1}^1,& \mbox{ w.p. } 1/2.\\ \end{array}\right.$$ Let $Z_n(W)=Z(W_n)$ be the random process that tracks the Bhattacharyya parameter of $W_n$. Then, from and we deduce that, for $n\ge 1$, $$\label{eq:eqBMSC} Z_{n} \left\{ \begin{array}{ll}\in \left[Z_{n-1}\sqrt{2-Z^2_{n-1}},\, 2 Z_{n-1}-Z^2_{n-1}\right], & \mbox{ w.p. } 1/2,\\ =Z^2_{n-1},& \mbox{ w.p. } 1/2.\\ \end{array}\right.$$ The synthetic channels $W_n^{(i)}$ are “polarized” in the sense that, as $n$ grows large, they become either completely noisy or completely noiseless. Then, we put information bits in the noiseless synthetic channels, and we “freeze” to a fixed value the remaining ones. Formally, as $n\to\infty$, $Z_n$ converges almost surely to a random variable $Z_\infty$ such that $$Z_\infty=\left\{ \begin{array}{ll}0, & \mbox{ w.p. } I(W),\\ 1,& \mbox{ w.p. } 1-I(W).\\ \end{array}\right.$$ Scaling Exponent ---------------- The fact that the synthetic channels $W_n^{(i)}$ are “polarized” implies that polar codes achieve capacity. The scaling exponent captures the speed at which this phenomenon takes place. \[def:upscal\] We say that $\mu$ is an *upper bound on the scaling exponent* if there exists a function $h(x): [0, 1] \to [0, 1]$ such that $h(0)=h(1)=0$, $h(x)>0$ for any $x\in (0, 1)$, and $$\label{eq:suph} \displaystyle\sup_{\substack{x\in (0, 1), y \in [x\sqrt{2-x^2}, 2x-x^2]}}\displaystyle\frac{h(x^2)+h(y)}{2h(x)} < 2^{-1/\mu}.$$ \[def:ubscalBEC\] We say that $\mu$ is an *upper bound on the scaling exponent of the BEC* if there exists a function $h(x): [0, 1] \to [0, 1]$ such that $h(0)=h(1)=0$, $h(x)>0$ for any $x\in (0, 1)$, and $$\label{eq:suphBEC} \displaystyle\sup_{x\in (0, 1)}\displaystyle\frac{h(x^2)+h(2x-x^2)}{2h(x)} < 2^{-1/\mu}.$$ The definitions above are motivated by [@MHU15unif-ieeeit Theorem 1], where it is shown that if $\mu$ is an upper bound on the scaling exponent according to Definition \[def:upscal\], then the gap to capacity $I(W)-R$ scales with the block length as $N^{-1/\mu}$. Note that, when the transmission channel is a BEC, a less restrictive condition $\mu$ is needed, which is captured by Definition \[def:ubscalBEC\]. Valid choices of upper bounds on the scaling exponent are $\mu=4.714$ and $\mu=3.639$ for the special case of the BEC, as shown in [@MHU15unif-ieeeit Theorem 2]. Construction ------------ \[def:construction\] Let $p_{\rm e}\in (0, 1)$, $W$ be a BMS channel, and $N=2^n$ be the polar code block length. Then the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ is obtained by placing the information bits into the positions corresponding to all the synthetic channels whose Bhattacharyya parameter is less than $p_{\rm e}/N$ and by freezing the remaining positions. The construction rule of Definition \[def:construction\] ensures that the error probability under SC decoding is *at most* $p_{\rm e}$. In fact, the error probability can be upper bounded by the sum of the Bhattacharyya parameters of the synthetic channels associated with the information bits (cf. Proposition 2 of [@Ari09]), and each of them is at most $p_{\rm e}/N$. Furthermore, this construction rule also ensures that the rate $R$ of the code tends to capacity at a speed captured by the scaling exponent. In particular, by using [@MHU15unif-ieeeit Theorem 1], we immediately have that the gap to capacity $I(W)-R$ is $O(N^{-1/\mu})$, where $\mu$ is an upper bound on the scaling exponent according to Definition \[def:upscal\] (for the special case of the BEC, see Definition \[def:ubscalBEC\]). Successive Cancellation Decoding -------------------------------- SC decoding can be equated to passing messages on a binary tree as shown in Figure \[fig:scDec\] with priority given to the left branches. Two kinds of messages are passed between the nodes at the binary tree: the logarithmic likelihood ratio (LLR) values which are passed from the top to the bottom of the tree, and the hard bit estimations which are passed from the bottom to the top of the tree. At each node at level $s$ of the SC decoding tree, the LLR values $\bm{\alpha} = \{\alpha_1,\ldots,\alpha_{2^{s+1}}\}$ are received from a parent node at level $s+1$. The LLR values $\bm{\alpha}$ are used to calculate the LLR values of the left child node $\bm{\alpha}^{\ell} = \{\alpha^{\ell}_1,\ldots,\alpha^{\ell}_{2^{s}}\}$ and the right child node $\bm{\alpha}^{\text{r}} = \{\alpha^{\text{r}}_1,\ldots,\alpha^{\text{r}}_{2^{s}}\}$. Furthermore, the hard bit estimations $\bm{\beta} = \{\beta_1,\ldots,\beta_{2^{s+1}}\}$ are calculated based on the hard bit estimations that are received from the left child node $\bm{\beta}^{\ell} = \{\beta^{\ell}_1,\ldots,\beta^{\ell}_{2^{s}}\}$ and the right child node $\bm{\beta}^{\text{r}} = \{\beta^{\text{r}}_1,\ldots,\beta^{\text{r}}_{2^{s}}\}$ in accordance with $$\begin{aligned} \alpha^{\ell}_i &= f^{\ell}_s(\alpha_i,\alpha_{i+2^s}) \text{,} \label{eq:flFunc}\\ \alpha^{\text{r}}_i &= f^{\text{r}}_s(\alpha_i,\alpha_{i+2^s},\beta^{\ell}_i) \text{,} \label{eq:frFunc}\\ \beta_i &= \begin{cases} \beta^{\ell}_i \oplus \beta^{\text{r}}_i & \text{if } i \leq 2^s \text{,} \\ \beta^{\text{r}}_{i-2^s} & \text{otherwise,} \end{cases}\end{aligned}$$ where $\oplus$ is the XOR operator and the functions $f^{\ell}_s$ and $f^{\text{r}}_s$ are defined as $$\begin{aligned} f^{\ell}_s(a,b) &= \ln{\frac{1+\mathrm{e}^{a+b}}{\mathrm{e}^a+\mathrm{e}^b}} \text{,} \\ f^{\text{r}}_s(a,b,c) &= b+(1-2c)a \text{.}\end{aligned}$$ At a leaf node of the SC decoding tree, each bit $\hat{u}_i$ is estimated as $$\hat{u}_i = \begin{cases} 0 & \text{if $u_i$ is a frozen bit or $\alpha^0_i>0$,} \\ 1 & \text{otherwise,} \end{cases}$$ where $\alpha^0_i$ is the calculated LLR value of $u_i$. The value of $\hat{u}_i$ is used to update the hard bit estimations at the higher levels of the decoding tree. SC has a sequential structure in the sense that the decoding of each bit is dependent on the decoding of its previous bits. More formally, while the function $f^{\ell}_s$ at level $s$ is only dependent on the LLR values that are received from a parent node ($\alpha_i$ and $\alpha_{i+2^s}$), the function $f^{\text{r}}_s$ is also dependent on a hard bit estimation ($\beta^{\ell}_i$) that is a result of estimating the previous bits (see (\[eq:flFunc\]) and (\[eq:frFunc\])). As a result, SC decoding proceeds by traversing the binary tree such that the nodes at level $s=0$ are visited from left to right. For example, in the SC decoding tree of Figure \[fig:scDec\] for a polar code of length $N=8$, the following schedule in performing $f^{\ell}_s$ and $f^{\text{r}}_s$ will complete the decoding process: $$\text{channel} \rightarrow f^{\ell}_2 \rightarrow f^{\ell}_1 \rightarrow f^{\ell}_0 \rightarrow f^{\text{r}}_0 \rightarrow f^{\text{r}}_1 \rightarrow f^{\ell}_0 \rightarrow f^{\text{r}}_0 \rightarrow f^{\text{r}}_2 \rightarrow f^{\ell}_1 \rightarrow f^{\ell}_0 \rightarrow f^{\text{r}}_0 \rightarrow f^{\text{r}}_1 \rightarrow f^{\ell}_0 \rightarrow f^{\text{r}}_0 \text{,} \label{eq:sch}$$ where “channel” refers to the time step needed to retrieve channel LLR values. In a fully parallel SC decoder architecture [@Ari09], the scheduling in (\[eq:sch\]) for a polar code of length $N$ results in $2N-1$ time steps. This corresponds to the number of nodes in the SC decoding tree. Simplified Successive Cancellation Decoding {#subsec:simplified} ------------------------------------------- The sequential decoding nature of SC decoding results in high latency and low throughput when used to decode polar codes. A SSC decoding algorithm was proposed in [@alamdar] by identifying two types of nodes in the SC decoding tree that can be decoded efficiently without traversing their child nodes: - *Rate-0 node*: A Rate-0 node at level $s$ of the SC decoding tree is such that all its leaf nodes at level $0$ are frozen bits. Since the values of frozen bits are known to the decoder, there is no need to traverse the decoding tree below Rate-0 nodes and the hard bit estimations can be directly calculated at level $s$ where the Rate-0 node is located. For a Rate-0 node at level $s$ we have $$\beta^s_i = 0 \text{,}$$ where $\beta^s_i$ is the hard bit estimation of the $i$-th bit. - *Rate-1 node*: A Rate-1 node at level $s$ of the SC decoding tree is such that all its leaf nodes at level $0$ are information bits. It was shown in [@alamdar] that there is no need to traverse the decoding tree below Rate-1 nodes and the hard bit estimations can be directly calculated at level $s$ where the Rate-1 node is located. For a Rate-1 node at level $s$ we have $$\beta^s_i = \begin{cases} 0 & \text{if $\alpha^s_i>0$,}\\ 1 & \text{otherwise,} \end{cases}$$ where $\beta^s_i$ is the hard bit estimation and $\alpha^s_i$ is the LLR value. In fact, SSC decoding can decode Rate-0 and Rate-1 nodes in a single time step. In a binary tree representation of SC decoding, this corresponds to pruning all the nodes that are the children of a Rate-0 node or a Rate-1 node. This is illustrated in Figure \[fig:sscDec\] for the same example as in Figure \[fig:scDec\]. The SSC decoding schedule for decoding the example in Figure \[fig:sscDec\] is: $$\text{channel} \rightarrow f^{\ell}_2 \rightarrow f^{\ell}_1 \rightarrow f^{\text{r}}_1 \rightarrow f^{\ell}_0 \rightarrow f^{\text{r}}_0 \rightarrow f^{\text{r}}_2 \rightarrow f^{\ell}_1 \rightarrow f^{\ell}_0 \rightarrow f^{\text{r}}_0 \rightarrow f^{\text{r}}_1 \text{,} \label{eq:schSSC}$$ which requires four fewer time steps in comparison with the required number of time steps for SC decoding in (\[eq:sch\]). For practical code lengths, SSC has significantly lower latency than SC decoding [@alamdar]. This is due to the fact that the number of nodes in the SSC decoding tree is significantly less than the number of nodes in the SC decoding tree. Upper Bound on the Latency of SSC Decoding {#sec:main} ========================================== \[th:main\] Let $p_{\rm e}\in (0, 1)$, $W$ be a BMS channel, and $N=2^n$ be the polar code block length. Consider the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ constructed according to Definition \[def:construction\]. Let $\mu$ be an upper bound on the scaling exponent according to Definition \[def:upscal\]. Then the latency of the SSC decoder is $O(N^{1-1/\mu})$. For the special case of the BEC, the latency of the SSC decoder is $O(N^{1-1/\mu})$, where $\mu$ is an upper bound on the scaling exponent of the BEC according to Definition \[def:ubscalBEC\]. The proof relies on two intermediate results, which are stated below and proved in Appendix \[app:proofs\]. The first intermediate result provides an accurate bound on the fraction of synthetic channels that are un-polarized in the sense that their Bhattacharyya parameter is not too small and not too large. A tighter result holds for the BEC, see Remark \[rmk:BEC\] in Appendix \[app:proofs\]. \[lemma:unpolarized\] Let $W$ be a BMS channel and let $Z_n(W)=Z(W_n)$ be the random process that tracks the Bhattacharyya parameter of $W_n$. Let $\mu$ be an upper bound on the scaling exponent according to Definition \[def:upscal\]. Then, for $n\ge 1$ and $\nu>1$, $$\label{eq:nummid} \mathbb P(Z_n\in [2^{-\nu n}, 1-2^{- \nu n}]) \le c\,2^{-n/\mu},$$ where the constant $c$ depends uniquely on $\nu$ and it does not depend on $n$ or $W$. Note that if the transmission channel is almost noiseless or very noisy, then the rate of the corresponding polar code is $1$ or $0$, respectively. The second intermediate result quantifies this statement by providing sufficient conditions on the Bhattacharyya parameter of the channel so that the polar code has either rate $0$ or rate $1$. \[lemma:rate01\] Let $p_{\rm e}\in (0, 1)$, $W$ be a BMS channel, and $N=2^n$ be the polar code block length. Consider the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ constructed according to Definition \[def:construction\]. Then there exists an integer $n_0$ such that for $n\ge n_0$, the following holds: 1. If $Z(W)\le 1/N^3$, then the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ has rate $1$. 2. If $Z(W)\ge 1-1/N^3$, then the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ has rate $0$. At this point, we are ready to prove Theorem \[th:main\]. From the discussion in Section \[subsec:simplified\], it suffices to show that the number of nodes of the SSC decoding tree is $O(N^{1-1/\mu})$. As the block length of the code is $N=2^n$, the synthetic channels go through $n$ steps of polarization, or equivalently, the depth of the decoding tree is $n$. We divide these $n$ steps of polarization in $K$ rounds. For $k\in \{1, \ldots, K\}$, the $k$-th round contains $\delta_k n$ polarization steps. The idea is that, at the end of each round, the number of un-polarized synthetic channels is given by Lemma \[lemma:unpolarized\]. The remaining synthetic channels are polarized in the sense that their Bhattacharyya parameter is very close to $0$ or to $1$. Thus, by Lemma \[lemma:rate01\], these synthetic channels lead to Rate-0 or Rate-1 nodes, which can be pruned. More formally, after $\delta_1 n$ steps of polarization, there are a total of $N^{\delta_1}$ synthetic channels. By applying Lemma \[lemma:unpolarized\] with $\nu=3/\delta_1$, we have that $c(\delta_1) N^{\delta_1}$ of these channels have a Bhattacharyya parameter that belongs to the interval $[N^{-3}, 1-N^{-3}]$. Note that $c(\delta_1)$ is a constant that depends uniquely on $\delta_1$ (and not on $N$ or $W$). The Bhattacharyya parameter of the remaining synthetic channels is either smaller than $1/N^3$ or larger than $1-1/N^3$. Thus, by Lemma \[lemma:rate01\], these remaining synthetic channels are Rate-0 or Rate-1 nodes, and they can be pruned. After pruning, the remaining number of nodes is $$\label{eq:remaining1} O(N^{\delta_1}+N^{\delta_1(1-1/\mu)+1-\delta_1}).$$ In fact, the term $O(N^{\delta_1})$ in comes from the fact that no pruning takes places in the first $\delta_1 n-1$ steps of polarization; and the term $O(N^{\delta_1(1-1/\mu)+1-\delta_1})$ comes from the fact that, after pruning, we have $O(N^{\delta_1(1-1/\mu)})$ remaining nodes at depth $\delta_1 n$, and each of these nodes is the root of a tree containing $2N^{1-\delta_1}-1$ nodes. At this point, we can repeat the same procedure with each of the $O(N^{\delta_1(1-1/\mu)})$ remaining nodes at depth $\delta_1 n$. Consider one of these nodes. After $\delta_2 n$ steps of polarization, there are a total of $N^{\delta_2}$ synthetic channels. By applying Lemma \[lemma:unpolarized\] with $\nu=3/\delta_2$, we have that $c(\delta_2) N^{\delta_2}$ of these channels have a Bhattacharyya parameter that belongs to the interval $[N^{-3}, 1-N^{-3}]$. The Bhattacharyya parameter of the remaining synthetic channels is either smaller than $1/N^3$ or larger than $1-1/N^3$. Thus, by Lemma \[lemma:rate01\], these remaining synthetic channels are Rate-0 or Rate-1 nodes, and they can be pruned. The remaining number of nodes is given by $$\label{eq:remaining2} O(N^{\delta_1}+N^{\delta_1(1-1/\mu)+\delta_2}+N^{(\delta_1+\delta_2)(1-1/\mu)+1-\delta_1-\delta_2}).$$ In fact, the term $O(N^{\delta_1})$ in is the same as in ; the term $O(N^{\delta_1(1-1/\mu)+\delta_2})$ comes from the fact that we have $O(N^{\delta_1(1-1/\mu)})$ remaining nodes at depth $\delta_1 n$, and no pruning takes place in the following $\delta_2 n-1$ steps of polarization; and the term $O(N^{(\delta_1+\delta_2)(1-1/\mu)+1-\delta_1-\delta_2})$ comes from the fact that, after pruning, we have $O(N^{(\delta_1+\delta_2)(1-1/\mu)})$ remaining nodes at depth $(\delta_1+\delta_2)\, n$, and each of these nodes is the root of a tree containing $2N^{1-\delta_1-\delta_2}-1$ nodes. By doing $K$ rounds of this pruning procedure, the remaining number of nodes is given by $$\label{eq:remaining3} O\left(\sum_{k=0}^{K-1} N^{(1-1/\mu)\sum_{j=1}^k\delta_j + \delta_{k+1} }\right).$$ In fact, the term $O(N^{\delta_1})$ in comes from the fact that no pruning takes places in the first $\delta_1 n-1$ steps of polarization; and, for $k\in\{1, \ldots, K-1\}$, the term $O(N^{(1-1/\mu)\sum_{j=1}^k\delta_j + \delta_{k+1} })$ comes from the fact that we have $O(N^{(1-1/\mu)\sum_{j=1}^k\delta_j})$ remaining nodes at depth $n\cdot \sum_{j=1}^k\delta_j$, and no pruning takes place in the following $\delta_{k+1} n-1$ steps of polarization. Note that the remaining number of nodes is given by for any choice of $\{\delta_k\}_{k=1}^K$ such that $$\label{eq:sumdeltas} \sum_{k=1}^K \delta_k=1,$$ as the total number of polarization steps is $n$. Thus, we choose the $\delta_k$’s so that the quantity in is minimized. To do so, we need that the exponents of $N$ in the various terms of the sum are all equal, which gives that $$\label{eq:deltas} \delta_{k+1} = \delta_k/\mu, \qquad \forall \, k\in \{1, \ldots, K-1\}.$$ By combining with , we conclude that the optimal choice for the $\delta_k$’s is $$\delta_k = \frac{1}{\mu^{k-1}\displaystyle\sum_{i=0}^K\frac{1}{\mu^{i}}},$$ which specializes the bound in to $$\label{eq:remainingfin} O\left(N^{1/\sum_{i=0}^K\frac{1}{\mu^{i}}}\right).$$ Note that $$\sum_{i=0}^\infty\frac{1}{\mu^{i}} = \frac{1}{1-1/\mu}.$$ Thus, by taking $K$ sufficiently large, we conclude that the number of nodes of the SSC decoding tree is $O(N^{1-1/\mu+\epsilon})$, for any $\epsilon>0$. Define $\mu'$ such that $1/\mu' = 1/\mu+\epsilon$, and note that the inequality in Definition \[def:upscal\] is strict. Then, for $\epsilon$ sufficiently small, $\mu'$ is also an upper bound on the scaling exponent according to Definition \[def:upscal\], and the number of nodes of the SSC decoding tree is $O(N^{1-1/\mu'})$. By using the same argument, we can assume without loss of generality that $\mu$ is a rational number. This implies that, when $n$ is sufficiently large, $\delta_k n\in \mathbb N$ for any $k\in\{1, \ldots, K\}$, and the proof is complete. Numerical Experiments {#sec:numerical} ===================== In this section, we evaluate numerically the latency savings guaranteed by SSC decoding. To this end, polar codes are constructed according to Definition \[def:construction\] and the latency $\mathcal{L}$ of the underlying decoding algorithm is calculated by counting the number of nodes in the corresponding decoding tree. In Figures \[fig:BECres\], \[fig:AWGNres\], and \[fig:BSCres\], we plot the logarithm of the latency ($\log_2 \mathcal{L}$) of SC and SSC decoding as a function of $n = \log_2 N$ for $0\leq n\leq 27$. We consider three different families of channels: the BEC in Figure \[fig:BECres\], the BAWGNC in Figure \[fig:AWGNres\], and the BSC in Figure \[fig:BSCres\]. For each family of channels, in the plot on the left, we fix the channel capacity $I(W)$ to $0.5$ and compare the latency savings of SSC decoding for two values of $p_{\rm e}$, namely, $p_{\rm e}=10^{-3}$ and $p_{\rm e}=10^{-10}$. In the plot on the right, we fix $p_{\rm e}=10^{-3}$ and compare the latency savings of SSC decoding for three values of $I(W)$, namely, $I(W)=0.1$, $I(W)=0.5$, and $I(W)=0.9$. It can be seen that the asymptotic slope of the line corresponding to the logarithm of the latency of SC decoding is $1$. In fact, the latency of SC decoding of a polar code of length $N$ is given by $2N-1$. Conversely, the asymptotic slope of the line that corresponds to the logarithm of the latency of SSC decoding is lower than $1$. Furthermore, in all the settings taken into account, this asymptotic slope is close to $1-1/\mu$. Recall that $\mu\approx 3.63$ (and $1-1/\mu\approx 0.72$) for the BEC, $\mu\approx 4$ (and $1-1/\mu\approx 0.75$) for the BAWGNC [@KMTU10], and it is conjectured that $\mu\approx 4.2$ (and $1-1/\mu\approx 0.76$) for the BSC. These asymptotic slopes are represented in the dashed blue lines in the plots. Consequently, the numerical experiments of Figures \[fig:BECres\], \[fig:AWGNres\], and \[fig:BSCres\] suggest that the bound of Theorem \[th:main\] is tight. Let us point out that the latency tends to be smaller for smaller values of $p_{\rm e}$ and of $I(W)$ when the block length is not too large. However, the difference between the curves computed for different values of $p_{\rm e}$ and $I(W)$ tends to vanish as the block length increases. [.48]{} \[legend-BEC5\] [.48]{} \[legend-BECcomp\] [.48]{} \[legend-AWGN5\] [.48]{} \[legend-AWGNcomp\] [.48]{} \[legend-BSC5\] [.48]{} \[legend-BSCcomp\] We also evaluated the effect of using Fast-SSC decoding [@sarkis]. This is a pruning technique of the SC decoding tree where two additional constituent codes are introduced; these constituent codes can be decoded in parallel in a single time step. As a result, the nodes in the SC decoding tree which correspond to these two nodes can also be pruned. These additional nodes are: - *Repetition (Rep) node*: A Rep node in the SC decoding tree is such that all its leaf nodes at level $0$ are frozen bits except for the rightmost leaf node which is an information bit. - *Single parity-check (SPC) node*: A SPC node in the SC decoding tree is such that all its leaf nodes at level $0$ are information bits except for the leftmost leaf node which is a frozen bit. Figure \[fig:resAll\] shows the logarithm of the latency for Fast-SSC decoding in comparison with that of SC decoding and SSC decoding. Similar to the previous numerical experiment, we consider the cases in which $W$ is a BEC, a BAWGNC, and a BSC. For all three channels it can be seen that, at finite code lengths, Fast-SSC decoding brings significant latency savings compared to SSC decoding. However, the asymptotic slope of $\log_2 \mathcal{L}$ for Fast-SSC decoding is close to that of SSC decoding. Therefore, we conjecture that asymptotically most of the savings in latency comes from pruning Rate-0 and Rate-1 nodes. [.32]{} [.32]{} [.32]{} \[legend-BECAll\] Conclusions =========== This paper proves that the latency of the simplified successive cancellation decoder proposed in [@alamdar] is sublinear in the block length. More specifically, we show that the latency scales at most as $N^{1-1/\mu}$, where $N$ is the block length and $\mu$ is the scaling exponent of the transmission channel. This is significantly better than the latency of the standard successive cancellation decoder, which scales linearly in the block length. Numerical simulations show that our proposed bound is tight and that pruning additional constituent codes does not improve much the latency for large $N$. Proving rigorous lower bounds on the latency is an interesting avenue for future research. As shown in [@wang2019log], changing the code construction has proved beneficial to reduce the time complexity per information bit. Thus, another interesting direction for future work is to allow for variants in the construction of the polar code, in order to further reduce the latency of the decoding process. Acknowledgments {#acknowledgments .unnumbered} =============== M. Mondelli was partially supported by grants NSF DMS-1613091, CCF-1714305, IIS-1741162 and ONR N00014-18-1-2729. S. A. Hashemi is supported by a Postdoctoral Fellowship from the Natural Sciences and Engineering Research Council of Canada (NSERC) and by a Stanford SystemX token from Huawei. Proof of Intermediate Lemmas {#app:proofs} ============================ We follow a strategy similar to the proof of [@MHU15unif-ieeeit Theorem 1]. Let $h(x)$ be the function of Definition \[def:upscal\], and define $$\label{eq:defrho1} \rho_1 = \min \left( \frac{1}{2}, -\log_2\displaystyle\sup_{\substack{x\in (0, 1), y \in [x\sqrt{2-x^2}, 2x-x^2]}}\displaystyle\frac{h(x^2)+h(y)}{2h(x)}\right).$$ Set $$\label{eq:defalpha} \gamma = \frac{1}{\nu}\log_2 \left( 1+\frac{2^{-1/\mu}-2^{-\rho_1}}{2^{-1/\mu}+2^{-\rho_1}} \right).$$ By using and the fact that $\mu > 2$, we immediately realize that $2^{-1/\mu}-2^{-\rho_1} > 0$, hence that $\gamma > 0$. In addition, it is easy to check that $\gamma <1$. Then, by [@MHU15unif-ieeeit Lemma 6], for $n\ge 1$ and for any $\delta>0$, $$\label{eq:formula1} {\mathbb E}\left[(Z_n(1-Z_n))^{\gamma}\right] \le \frac{1}{\delta}\left(2^{-\rho_1}+\sqrt{2}\frac{\delta}{1-\delta} c_1\right)^n,$$ where $c_1$ is a constant that depends only on $\nu$ (and not on $n, W$). Set $$\label{eq:defdelta} \delta = \frac{2^{-1/\mu}-2^{-\rho_1}}{2\sqrt{2}c_1+2^{-1/\mu}-2^{-\rho_1}}.$$ Since $2^{-1/\mu}-2^{-\rho_1} > 0$, is a valid choice for $\delta$. By combining and , we deduce that $$\label{eq:expeqnew} {\mathbb E}\left[(Z_n(1-Z_n))^{\gamma}\right] \le c_2 \left(\frac{1}{2}(2^{-1/\mu}+2^{-\rho_1})\right)^n,$$ where $c_2$ is a constant that depends only on $\nu$ (and not on $n, W$). The proof follows from the chain of inequalities below: $$\begin{split} {\mathbb P}\left(Z_n \in \left[2^{-\nu n}, 1- 2^{-\nu n}\right]\right) & \stackrel{\mathclap{\mbox{\footnotesize(a)}}}{=} {\mathbb P}\left( (Z_n(1-Z_n))^{\gamma}\ge (2^{-\nu n}(1- 2^{-\nu n}))^{\gamma}\right)\\ & \stackrel{\mathclap{\mbox{\footnotesize(b)}}}{\le} \frac{{\mathbb E}\left[(Z_n(1-Z_n))^{\gamma}\right]}{ (2^{-\nu n}(1- 2^{-\nu n}))^{\gamma}}\\ &\stackrel{\mathclap{\mbox{\footnotesize(c)}}}{\le} \frac{c_2 \left(\frac{1}{2}(2^{-1/\mu}+2^{-\rho_1})\right)^n}{(2^{-\nu n}(1- 2^{-\nu n}))^{\gamma}}\\ &\stackrel{\mathclap{\mbox{\footnotesize(d)}}}{\le} 2\hspace{0.1em}c_2\hspace{0.1em} \left(\frac{1}{2}(2^{-1/\mu}+2^{-\rho_1})2^{\nu\gamma}\right)^n \stackrel{\mathclap{\mbox{\footnotesize(e)}}}{=} 2\hspace{0.1em}c_2\hspace{0.1em} 2^{-n/\mu}, \end{split}$$ where the equality (a) uses the concavity of the function $f(x)=(x(1-x))^\gamma$; the inequality (b) follows from Markov inequality; the inequality (c) uses ; the inequality (d) uses that $1-2^{-\nu n}\ge 1/2$ for any $n\ge 1$ and $\nu>1$; and the equality (e) uses the definitions and . \[rmk:BEC\] For the special case in which $W$ is a BEC, the result holds, where $\mu$ is an upper bound on the scaling exponent of the BEC according to Definition \[def:ubscalBEC\]. This is proved by setting $$\label{eq:defrho1BEC} \rho_1 = \min \left( \frac{1}{2}, -\log_2\displaystyle\sup_{x\in (0, 1)}\displaystyle\frac{h(x^2)+h(2x-x^2)}{2h(x)}\right),$$ and by following the same argument of the proof above. We start by proving the first result and by assuming that $Z(W)\le 1/N^3$. Then, by using , we have that, for any $i\in\{1, \ldots, N\}$, $$\label{eq:ubBattalemma1} Z(W_n^{(i)})\le 1-\left(1-\frac{1}{N^3}\right)^N.$$ Furthermore, the following chain of inequalities holds: $$\label{eq:ubBattalemma2} 1-\left(1-\frac{1}{N^3}\right)^N = 1-e^{N\ln(1-1/N^3)}\stackrel{\mathclap{\mbox{\footnotesize(a)}}}{\le} 1-e^{-N/(N^3-1)}\stackrel{\mathclap{\mbox{\footnotesize(b)}}}{\le} 1-\left(1-\frac{N}{N^3-1}\right) = \frac{N}{N^3-1},$$ where in (a) we use that $\ln(1-x)\ge -x/(1-x)$ for any $x\in (0, 1)$ and in (b) we use that $e^{-x}\ge 1-x$ for any $x<1$. By combining and , we conclude that, for sufficiently large $N$, $Z(W_n^{(i)})\le p_{\rm e}/N$ for any $i$. Thus, the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ has rate $1$. Let us now prove the second result and assume that $Z(W)\ge 1-1/N^3$. Then, by using and , we have that, for any $i\in\{1, \ldots, N\}$, $$Z(W_n^{(i)})\ge \left(1-\frac{1}{N^3}\right)^N \ge 1-\frac{N}{N^3-1}.$$ Consequently, for sufficiently large $N$, $Z(W_n^{(i)})> p_{\rm e}/N$ for any $i$, and the polar code $\mathcal C_{\rm polar}(p_{\rm e}, W, N)$ has rate $0$. [^1]: M. Mondelli is with the Institute of Science and Technology (IST) Austria, Klosterneuburg, Austria (email: marco.mondelli@ist.ac.at). S. A. Hashemi, J. Cioffi and A. Goldsmith are with the Department of Electrical Engineering, Stanford University, Stanford, CA 94305, USA (email: ahashemi@stanford.edu, cioffi@stanford.edu, andrea@wsl.stanford.edu).
2024-03-12T01:26:58.646260
https://example.com/article/5003
Peltor H10A Optime Earmuff Review Table of Contents Gun owners have come to expect a lot from their hearing protection devices (HPD’s). With manufacturers producing headsets that cost hundreds of dollars and feature all kinds of fancy bells and whistles, it’s easy to forget that the ultimate goal in wearing a HPD is to simply block out noise. That is why people wear hearing protective devices: to protect their hearing. Yet therein lies the age-old debate in the HPD community: Electronic or Passive? For those unfamiliar with the terms passive means it blocks all noise past a certain threshold. Electronic hearing protection can protect against super loud noises while amplifying the lower ambient noises. This is ideal in tactical situations where you need to hear instructions while also protecting your ears from loud noises. Some gun owners have become so spoiled by the fancier, more expensive electronic HPD models that they can’t fathom shooting without them. And yet the truth is, if you’re willing to wear a headset that doesn’t amplify softer noises (like the TAC 100), you can get great protection for a fraction of the cost of most newer headsets. The king of these kinds of headsets is undoubtedly the Peltor H10A Optime Earmuff. This headset protects your ears at a fraction of the costs of other models. And now time for a quick history lesson on the Peltor company. Peltor began in 1950 in Sweden. They specialized in face, hearing and head protection. They were bought by 3M and now continue to produce as an subsidiary of the corporation. 3M has it’s own illustrious history but that is for another article. Now back to the regularly scheduled program. Peltor H10A Optime Earmuff Review One of the most popular hearing protection headsets available, the H10A offers elite protection at an incredible price – just around $20 through most retail outlets. With a noise reducing rating of 30 dB, the H10A is bound to protect your hearing, and although it may not do a whole lot else, that is the ultimate goal of a HPD. Noise Reduction optime 105 earmuffs This is what the H10A does – it reduces noise. Peltor has manufactured some really cutting edge and breakthrough electronic headsets in recent memory (the Sport RangeGuard comes to mind), but the H10A is very much a back-to-basics entry for the acclaimed headgear manufacturer. Suitable for every kind of shooter, from novice to pro, the noise reduction rating of 30dB is simply elite for this price point – you’re not going to find more effective ear protection for anywhere near this price. I’ve used the Peltor in a number of situations and with a variety of high caliber weapons, notably in an indoor range and surrounded by other gunfire, and the H10A passed all tests with flying colors. I knew the H10A meant business when I partook in a shooting drill in a row of .50 caliber sniper rifles – indoors, no less – and my ears came out completely unscathed. The bottom line is, if you want to block out loud noises, this is the best *affordable* model you’re going to find. Sound Amplification and Features Sound amplifying has become such a fixture in the hearing protection device industry that it is actually a preset category in this series of Peltor HPD reviews. The H10A, being a non-electronic earmuff, doesn’t offer sound amplification. In other words, for hunters or shooters to whom sound amplifying is preferable or even necessary, the H10A is a non-starter. Being a hunter myself and knowing how critical it is to be able to hear when tracking game, I’ve only ever brought the H10A’s to the range, as they would be no help to me under most other circumstances. As far as features go, given the price range of the H10A, you are unsurprisingly not going to be getting a lot of goodies here. This model has been made strictly with function in mind, and as such the only considerations taken into designing the headset were noise reduction and comfort. Quality and Build Given the price point of the model, it’s pretty incredible how well Peltor has done with designing a fairly comfortable headset. The stainless steel wire adjustable headband aligns the ear cups perfectly with the ears and offers solid support, as well as nice padding. However, at nearly one pound, the headset comes in on the heavier side compared to other Peltor offerings like the Tactical 6S. This can take its toll on your neck and head when using it for extended periods of time. In addition, the sweat buildup when using the H10A for extended periods is significant – the plastic design of the ear cups does not perform well, particularly in warmer weather. Lastly, it must be said, you’re not going to win any best dressed awards while wearing these things. The oversized earcups, while effective, are almost comically large – this may be a problem for some but not for others. Conclusion Ultimately, Peltor’s H10A Optime 105 Earmuff does what it sets out to do – it blocks noise and protects your hearing. If that’s all you’re looking for in your hearing protective device, you’re not going to find a better option at anywhere near $20. Yes, there are a number of electronic models available on the market today that can do more, but it’s hard enough to convince many gun owners to wear protective headgear, let alone lay out a significant amount of money for a pair. Again, for hunters and other shooters who want to hear ambient noise when wearing their HPD, this model is not an option, but it would make an excellent addition to most people’s kits or gear. It may not be the flashiest headset in the world or the fanciest, but the H10A gets the job done. Rating 4/5 Stars Thanks for tuning in to our Peltor Tactical Line Reviews – We hope you enjoyed our reviews and once again remember, protecting your hearing is extremely important, you only have one pair! About Nate M Let us know what you think in the comments section! For suggestions, collaborations, or requests, contact nate@gunivore.com.
2023-10-23T01:26:58.646260
https://example.com/article/5525
The present invention refers to a mobile device for measuring dynamic parameters of particles, e.g. spermatozoa, such as the translation speed and the rotational speed of particles. The present invention refers to a mobile device which is used for establishing parameters related to the dynamics/mobility of particles in a solution, in particular biological entities, e.g. cells and cell organelles including spermatozoa. Analysing the dynamic parameters and number of spermatozoa in semen is of importance in order to characterise spermatozoa, and constitutes an important tool for evaluation of male fertility. By translation speed (velocity) is meant a directed motion of particles of one or more directions in a detection area or volume such that the path length is significantly longer that the observation length. In contrast to the translation speed there is e.g. Brownian motion signifying stochastic motion of the particles in all directions, i.e. the path length is significantly shorter than the observation length. A method for determining the motility of spermatozoa is disclosed in U.S. Pat. No. 5,116,125, said analyser being based on dynamic laser light scattering. Another method for measuring the motility of spermatozoa is to monitor the spermatozoa with a video camera and analyse the movements of the spermatozoa with computer based analysis of individual trajectories. Although this type of computer aided analysis generates fitness parameters rather quickly compared to manual testing, the analysis has several drawbacks particularly a significant variance with respect to the obtained parameters which increases with increased concentration of the spermatozoa. PCT/EP2006/000369 discloses a device and a method for measuring concentration and mobility of particles, e.g. spermatozoa, by applying correlation analysis on fluctuation of the particles with respect to a detection area of a digital picture. Object of the present invention is to provide a mobile device which allows a simple and rapid detection of dynamic parameters of particles in a solution. Other advantages are apparent from the text below.
2024-07-26T01:26:58.646260
https://example.com/article/2822
--- abstract: 'In this paper, we study a coupled nonlinear Schrödinger system with small initial data in a product space. We establish a modified scattering of the solutions of this system and we construct a modified wave operator. The study of the resonant system, which provides the asymptotic dynamics, allows us to highlight a control of the Sobolev norms and interesting dynamics with the beating effect. The proof uses a recent work of Hani, Pausader, Tzvetkov and Visciglia for the modified scattering, and a recent work of Grébert, Paturel and Thomann for the study of the resonant system.' address: 'Laboratoire de Mathématiques Jean Leray, Université de Nantes, UMR CNRS 6629, 2, rue de la Houssinière, 44322 Nantes Cedex 03, France' author: - Victor Vilaça Da Rocha bibliography: - 'bibli.bib' date: 'September 14, 2016' title: Modified scattering and beating effect for coupled Schrödinger systems on product spaces with small initial data --- [^1] Introduction ============ The purpose of this paper is to study the asymptotic behavior of the following cubic defocusing coupled nonlinear Schrödinger system with small initial data: $$\begin{dcases} i\partial_tU+\Delta_{\mathbb{R}\times\mathbb{T}}U&=\left|V\right|^2U, \quad (t,x,y)\in [0,+\infty)\times\mathbb{R}\times\mathbb{T} \\ i\partial_tV+\Delta_{\mathbb{R}\times\mathbb{T}}V&=\left|U\right|^2V, \end{dcases}\label{sys}$$ where $\mathbb{T}=\mathbb{R}/2\pi\mathbb{Z}$ is the one dimensional torus and $U,V$ are complex valued functions on the spatial product space $\mathbb{R}\times\mathbb{T}$. We construct some solutions of this system which exhibit a modified scattering to solutions of a nonlinear resonant system. Thanks to the nonlinearity, we construct solutions which exhibit a beating effect, namely a transfer of energy between two different modes of the couple of solutions. This is a genuine nonlinear behavior. Motivations and background -------------------------- When dealing with small solutions of nonlinear evolution equations, there are usually two main axes of research. The first one is the linear approach. The idea is to show that for small initial data, the solutions of these equations tend to be close to solutions of the associated linear equations. The second way to analyze these equations is the nonlinear approach. This is the approach we choose in this paper. This time, the goal is to find some solutions with a nonlinear behavior, i.e a behavior that doesn’t exist for the linear equation. From this point of view, we can expect a large range of results, depending on the kind of nonlinear behavior we want to highlight. First, we can expect different kinds of nonlinear behavior. For example, we can expect some growth of the Sobolev norms, or even a blow-up of the solutions. We can also expect some interaction between the modes and frequencies of the solutions (e.g. some exchange of energy), existence of solitons... Then, nonlinear effects can appear on different time scales. This can be finite time behavior, large but finite time behavior depending of the size of the initial data, or even infinite time behavior. Finally, we can make a new dichotomy with the way the solutions are enjoying the behavior: are the solutions presenting themselves the nonlinear behavior, or are they scattering to solutions of other equations which present this behavior ? From the point of view of the search of instability, the cubic nonlinear Schrödinger equation is a perfect candidate due to this cubic nonlinearity that offers some resonant opportunities. Physically, the cubic nonlinear Schrödinger equation $$i\partial_tU+\frac12\Delta U= \lambda |U|^2U,$$ with $\lambda\in\mathbb{R}$, appears in a large range of phenomena, like for example, the propagation of light in nonlinear optical fibers, the Bose-Einstein condensates theory, the gravity waves, the water waves, the plasma oscillations in magnetohydrodynamics…This duality between the physical and mathematical interest makes this equation one of the most studied and one of the most important models in nonlinear science. The kind of nonlinear behavior we can obtain depends on the geometry of the spatial domain. Let us present some of these nonlinear results. For Euclidean spaces, we can show that the solutions exist globally, are decreasing and exhibit some kind of scattering to free solutions. We refer to Kato and Pusateri in [@KP] for the critical case of the space $\mathbb{R}$ (in this case the scattering result is modified), and to Hayashi and Naumkin in [@HN] for the more general case of the Euclidean space $\mathbb{R}^n$. Both results are extensions of initial works of Ozawa for the one dimensional case ([@Oza91]), and Ginibre and Ozawa for the higher dimensions ([@GinOza93]). For hyperbolic spaces, they are also a lot of scattering results for the cubic Schrödinger equation. For example, Banica, Carles and Staffilani show in [@BCS] that we have a scattering behavior and a wave operator in $H^1(\mathbb{H}^3)$. Higher dimension cases are treated, for smaller nonlinearities and always in $H^1$, by Banica, Carles and Duyckaerts with radial assumptions ([@BanCarDuy09]), or by Ionescu, Pausader and Staffilani without radial assumptions ([@IonPauSta12]). For compact domains, in the case of the torus, we can use the resonances between the modes of the solutions to exhibit some growth of the Sobolev norms (see Colliander, Keel, Staffilani, Takaoka and Tao in the case of the torus $\mathbb{T}^2$ in [@CKSTT]). We can also use these resonances to see that the equation is strongly illposed on the Sobolev spaces $H^s$, with $s<0$, in the torus $\mathbb{T}^d$ for $d\geq2$ (see Carles and Kappeler in [@CK]); or to see the equation is instable with respect to the initial value (see Carles, Dumas and Sparber in [@CDS]). Finally, for product spaces, we can expect to mix some of these geometric domains to obtain two different kinds of nonlinearity at the same time. The initial idea of Tzvetkov and Visciglia in [@TV] is to study the equation on the space $\mathbb{R}^n\times\mathcal{M}$, with $\mathcal{M}$ a compact Riemannian manifold. They show that the solutions exist globally and scatter to free solutions for small initial data. The two authors extend their result to the large data case with the compact manifold $\mathcal{M}=\mathbb{T}$ in [@TV2]. They obtain again a global existence and a scattering behavior. As in the Euclidean spaces case, the problem is here that solutions of the cubic Schrödinger equation scatter to free solutions, which prevents from all the compact-kind nonlinear behavior such as a growth of the Sobolev norms. From the point of view of the product space, Hani, Pausader, Tzvetkov and Visciglia in [@HPTV] avoid this problem by considering the space $\mathbb{R}\times\mathbb{T}^d$, for $1\leq d\leq4$. The idea is to keep a direction of diffusion with $\mathbb{R}$ to enable scattering results and to add the compact manifold $\mathbb{T}^d$ to obtain interesting nonlinear behaviors. The result here is very interesting because they show that, for small initial data, the solutions of the cubic Schrödinger equation scatter to solutions of another equation called the resonant equation, instead of free solutions. They also obtain a modified wave operator from this resonant equation to the cubic Schrödinger equation. As a consequence, we can expect a whole new range of nonlinearity mixing the scattering theory from the Euclidean part, and all the kind of nonlinearity we can highlight for the resonant equation. In particular, they show how to transfer solutions of a reduced resonant equation on the torus $\mathbb{T}^d$ to solutions of the resonant equation. Therefore, we can expect all ’torus-kind’ of nonlinearity (thanks to the resonances) for the resonant equation, as a growth of the Sobolev norms, and thus find solutions to the the cubic Schrödinger equation that scatter to these solutions. An interesting feature of this method employed by Hani, Pausader, Tzvetkov and Visciglia, is the fact that it is adaptable. From example, adding a convolution potential in order to kill the resonances, Grébert, Paturel and Thomann show in [@GPT2] that the modified equation admits modified scattering and a wave operator too, but they show that all the Sobolev norms of their solutions tend to be constant. Another example is given by Hani and Thomann in [@HT]. They add a harmonic trapping and obtain once again a modified scattering result and the existence of the modified wave operator. The important fact here is that the resonant dynamics allow them to justify and extend some physical approximations in the theory of Bose-Einstein condensates in cigar-shaped traps. Finally, a last example is given by Haiyan Xu in [@Xu]. By modifying the equation, she establishes a scattering theory between the cubic Schrödinger equation on the cylinder $\mathbb{R}\times\mathbb{T}$ and the Szegő equation. Thanks to the study of the Szegő equation (see for example the article [@GerGre16] of Gérard and Grellier), this allows the author to construct global unbounded solutions to this modified cubic Schrödinger equation. As in the three previous examples, the goal of this paper is to transport the method of Hani, Pausader, Tzvetkov and Visciglia to another problem, the study of the cubic coupled Schrödinger system. Indeed, the cubic coupled Schrödinger systems present some interesting dynamical properties we can present now. From the mathematical point of view, the study of systems offers more possibilities than a single equation. However, the first step is often to check that we can extend the results of the equation case study to the system case. In that optic, we can see from a general point of view on evolution systems that the presence of a direction of diffusion seems to allow scattering. For example, for the Klein Gordon equation on product spaces, Hari and Visciglia in [@HariVisc] obtain scattering of the solutions to free solutions for small initial data. In the case of Schrödinger systems, Cassano and Tarulli show in [@CassTaru] a scattering result and the existence of the wave operator, but this study doesn’t allow to look at the cubic case when there is just one Euclidean space direction. Let us now deal with cubic coupled Schrödinger systems. As the cubic Schrödinger equation, the cubic coupled Schrödinger system presents at the same time a physical and a mathematical interest. Physically, the cubic coupled Schrödinger system occurs in nonlinear optics while, for example, looking at two orthogonally polarized components traveling at different speeds because of different refractive indices associated with them. We can also study the coupling between two different optical waveguides, that can be provided by a dual-core single-mode fiber. Another example is given by two distinct pulses with different carrier frequencies but with the same polarization. For more precisions on these examples, we can refer to the book [@AB] of G. Agrawal and R. Boyd on nonlinear optics. Of course, the kind of result we obtain for systems depends on the geometry of the space domain. For Euclidean spaces, the role of the coupling is not predominant. Basically, we obtain same kind of results as in the one equation case. As in the Hayashi-Naumkin article [@HN], the Euclidean direction can provide some decrease of the $L^\infty$ norms. For example, Donghyun Kim studies in [@Kim] a cubic coupled Schrödinger system with different mass. He obtains the global existence and a decay of the solutions. Another example is given by Li and Sunagawa in [@LiSun16], where the authors study the decay rate of the $L^\infty$ norms for a large range of cubic nonlinearities, including the derivative nonlinearities. The diffusion direction allows extension of the results of Kato and Pusateri ([@KP]) in the case of a cubic coupled Schrödinger system on $\mathbb{R}$, with global existence, a scattering result and a decreasing of the solutions (see [@VVDR1]). For bigger Euclidean spaces, we can cite the recent work of Farah and Pastor who show global existence and scattering in $H^1(\mathbb{R}^3)$ in [@FaraPast]. For the torus case, the study of systems allows to create more nonlinear behaviors by creating mixing between the different modes of the solutions. This is the main interest of the study of the cubic coupled Schrödinger systems. For example, Grébert, Paturel and Thomann in [@GPT] highlight a beating effect for cubic coupled Schrödinger systems on $\mathbb{T}$. This beating effect consists in an exchange of energy between different modes of the solution. This surprising behavior can be observed by simple experiences, for example, with two identical clothespins on a wire. In this experience, with a small perturbation, we can observe a beating effect between the two clothespins (see the video [@G_PAL], in French). The existence of the beating effect for the cubic coupled Schrödinger systems, based on a Birkhoff normal form decomposition of the Hamiltonian of the system, is thus proved for large but finite time. This kind of nonlinear behavior is made possible by the mixing effect mentioned above. The goal of this article is to obtain a beating effect behavior for the cubic coupled Schrödinger systems in infinite time. For this purpose, two main solutions may be envisioned: the KAM theory or the use of scattering results. Concerning the KAM theory, an example is given by the study of the quintic Schrödinger equation on the torus. First, Grébert and Thomann obtained for this equation a beating effect for finite time in [@GreTho12]. Thanks to a KAM theorem, Haus and Procesi then constructed quasi-periodic solutions that exchange energy, through the beating effect, over an infinite time ([@HauPro16]). The advantage of this method is the fact that it allows to stay on the torus in order to obtain the infinite time behavior, when we need for the scattering method to add a dispersive direction. In this paper, we choose the second method and thus consider the spatial domain $\mathbb{R}\times\mathbb{T}$. The goal is to use the diffusion direction to get a modified scattering result and construct a modified wave operator by using the method of Hani, Pausader, Tzvetkov and Visciglia; and to use the compact component $\mathbb{T}$ to obtain interesting dynamics such as the beating effect of Grébert, Paturel and Thomann. By mixing these two approaches, we obtain a couple of solutions of our system  that scatters to a solution of a resonant system that provides a beating effect. Moreover, we show that the construction of the modified scattering implies some dynamical consequences, such as the control of the Sobolev norms. The results ----------- In this section, we present the main theorems of the paper. In the following results, we denote by $\mathcal{F}H(\xi,p)=\hat{H}(\xi,p)=\hat{H}_p(\xi)$ the Fourier transform of $H:\mathbb{R}\times\mathbb{T}\longrightarrow\mathbb{C}$ at the point $(\xi,p)\in\mathbb{R}\times\mathbb{Z}$. Moreover, the norm $S^+$ we consider here is a strong $L^2$ based norm introduced in Section \[secprel\] and $N\geq12$ is an integer. We recall that we study the system $$\begin{dcases} i\partial_tU+\Delta_{\mathbb{R}\times\mathbb{T}}U&=\left|V\right|^2U, \quad (t,x,y)\in [0,+\infty)\times\mathbb{R}\times\mathbb{T} \\ i\partial_tV+\Delta_{\mathbb{R}\times\mathbb{T}}V&=\left|U\right|^2V. \end{dcases}$$ Due to the approach of Hani, Pausader, Tzvetkov and Visciglia in [@HPTV], we want to make a link between the behavior of the system and a resonant system we define here: $$\begin{dcases} i\partial_{\tau}W_U(\tau)=\mathcal{R}\left[W_V(\tau),W_V(\tau),W_U(\tau)\right],\\ i\partial_{\tau}W_V(\tau)=\mathcal{R}\left[W_U(\tau),W_U(\tau),W_V(\tau)\right], \end{dcases}\label{res}$$ with $$\mathcal{F}\mathcal{R}\left[F,G,H\right](\xi,p)=\displaystyle\sum\limits_{\substack{p,q,r,s\in\mathbb{Z} \\ p-q+r-s=0 \\ p^2-q^2+r^2-s^2=0}}\hat{F}(\xi,q){ \sbox{\myboxA}{$\m@th\hat{G}(\xi,r)$} \setbox\myboxB\null \ht\myboxB=\ht\myboxA \dp\myboxB=\dp\myboxA \wd\myboxB=0.75\wd\myboxA \sbox\myboxB{$\m@th\overline{\copy\myboxB}$} \setlength\mylenA{\the\wd\myboxA} \addtolength\mylenA{-\the\wd\myboxB} \ifdim\wd\myboxB<\wd\myboxA \rlap{\hskip 0.5\mylenA\usebox\myboxB}{\usebox\myboxA} \else \hskip -0.5\mylenA\rlap{\usebox\myboxA}{\hskip 0.5\mylenA\usebox\myboxB} \fi}\hat{H}(\xi,s).$$ The links between these two systems are presented in Section \[modanswav\] through the modified scattering and modified wave operator theorems. Thanks to these theorems, we obtain the two main results of this paper. First, by using the modified scattering operator of Theorem \[modscat\], we have a control of all the Sobolev norms with the following theorem: \[thmbounded\] There exists $\varepsilon>0$ such that if $U_0,V_0\in S^+$ satisfies $$\|U_0\|_{S^+}+\|V_0\|_{S^+}\leq\varepsilon,$$ and if $(U(t),V(t))$ solves with initial data $(U_0,V_0)$, then $(U,V)\in\mathcal{C}([0,+\infty):H^N)\times\mathcal{C}([0,+\infty) : H^N)$ exists globally and, for all $s\in\mathbb{R}$, there exists a constant $M=M(s)>0$ such that we have $$\label{staysmall} \|U(t)\|_{H^s_{x,y}}+\|V(t)\|_{H^s_{x,y}}\leq M\varepsilon.$$ More precisely, there exists a constant $c=c(s)\geq0$ such that $$\label{eqboundhs} \lim_{t\rightarrow+\infty}\left(\|U(t)\|_{H^s_{x,y}}+\|V(t)\|_{H^s_{x,y}}\right)=c.$$ This theorem shows that for small initial data, the solutions stay small in every Sobolev spaces. Moreover, we see in the second part of the theorem that the sum of the Sobolev norms of the couples of solutions tends to be constant. Then, thanks to the construction of the modified wave operator in Theorem \[waveop\], the idea is to find some interesting nonlinear behavior of the resonant system in order to transfer this behavior to the initial system. As a consequence, we follow the strategy of [@GPT] to construct couples of solutions of the initial system which scatter to beating effect solutions of the resonant system : \[beating\] Let $I\subset\mathbb{R}$ be a bounded open interval, $(p,q)$ a couple of different integers and $0<\gamma<\frac12$. For $\varepsilon=\varepsilon(p,q,I)>0$ small enough, there exists: - a constant $0<T_\gamma\lesssim |\ln(\gamma)|$ and a $2T_\gamma-$periodic function $K_\gamma:\mathbb{R}\rightarrow(0,1)$ such that $$K_\gamma(0)=\gamma,\qquad \qquad \qquad K_\gamma(T_\gamma)=1-\gamma;$$ - a couple of solutions $(W_U,W_V)$ of the resonant system which exhibits a beating effect in the following sense: $$\begin{dcases} \hat{W}_U(t,\xi,y)=\mathcal{F}(W_U)(t,\xi,p)e^{ipy}+\mathcal{F}(W_U)(t,\xi,q)e^{iqy}, \\ \hat{W}_V(t,\xi,y)=\mathcal{F}(W_V)(t,\xi,p)e^{ipy}+\mathcal{F}(W_V)(t,\xi,q)e^{iqy}, \end{dcases}$$ and $\forall\xi\in I$, $$\begin{dcases} |\hat{W}_V(t,\xi,p)|^2=|\hat{W}_U(t,\xi,q)|^2=\varepsilon^2K_\gamma(\varepsilon^2t),\\ |\hat{W}_U(t,\xi,p)|^2=|\hat{W}_V(t,\xi,q)|^2=\varepsilon^2(1-K_\gamma(\varepsilon^2t)); \end{dcases}$$ - a couple of solutions $(U,V)$ of the initial system which exhibits modified scattering to this couple $(W_U,W_V)$ in the following sense: $$\begin{dcases} \|U(t)-e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}W_U(\pi\ln(t))\|_{H^N(\mathbb{R}\times\mathbb{T})}&\rightarrow0 \quad \text{as} \quad t\rightarrow+\infty,\\ \|V(t)-e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}W_V(\pi\ln(t))\|_{H^N(\mathbb{R}\times\mathbb{T})}&\rightarrow0 \quad \text{as} \quad t\rightarrow+\infty. \end{dcases}$$ With this theorem, we see the importance of both parts of the product space. On the one hand, the bounded component allows us to construct couple of solutions with very nonlinear behavior such as this beating effect (see [@GPT]). On the other hand, the Euclidean component gives an infinite time behavior (see for example [@VVDR1]). Therefore, thanks to the product space, we have here an asymptotic convergence to the beating effect, which is a new result. The counterpart of this construction is the fact that this behavior is local in the Euclidean coordinate. Overview of proofs ------------------ ### The modified scattering and the wave operator According to previous results in scattering theory for Schrödinger equations and systems ([@BCS],[@CassTaru],[@GPT2],[@HPTV],[@HT],[@HariVisc],[@HN],[@KP],[@TV],[@TV2],[@VVDR1],[@Xu]), it is relevant to introduce the profiles $(F,G)$ of the solutions $(U,V)$, which are the backwards linear evolutions of solutions to the nonlinear equations: $$\label{defprof} F(t,x,y):=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}U(t,x,y) \qquad\qquad G(t,x,y):=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}V(t,x,y).$$ The system described by the profiles looks like $$\begin{dcases} i\partial_tF(t)&=\mathcal{N}^t[G(t),G(t),F(t)],\\ i\partial_tG(t)&=\mathcal{N}^t[F(t),F(t),G(t)]. \end{dcases}$$ To isolate a resonant system, the idea is to work on the structure of the nonlinearity $\mathcal{N}^t$. According to a stationary phase intuition, we decompose the nonlinearity as $$\mathcal{N}^t=\frac{\pi}{t}\mathcal{R}+\mathcal{E}.$$ The integrable part $\mathcal{E}$ enjoys a fast decrease. The idea is to show that it doesn’t play a role in the asymptotic dynamics of $F$ and $G$. Thus, the system described by $\mathcal{R}$ is our resonant system, the system which contains all the asymptotically dynamics. The goal is thus to find interesting dynamics such as the beating effect for this resonant system. For that purpose, we construct a new system, the reduced resonant system, which is obtained from the resonant system by deleting the Euclidean variable. This reduced resonant system lives on the torus $\mathbb{T}$, where we have the beating effect thanks to [@GPT]. Therefore, we have to show how to transfer solutions of the reduced resonant system to solutions of the resonant system. Thanks to the fast decrease of the $\mathcal{E}$ part of the nonlinearity, fixed-point arguments allow us to prove the existence of the modified scattering and modified wave operators. ### The dynamical consequences Both theorems (the modified scattering and the modified wave operator) imply dynamical consequences for the initial system . The modified scattering theorem shows that all solutions of the initial system scatter to solutions of the resonant system . Thus, proving that all the solutions of the resonant system are bounded in Sobolev spaces, we obtain that all the solutions of the initial system are also bounded in Sobolev spaces. This prevents any kind of growth of Sobolev norms for our cubic coupled Schrödinger system on the product space $\mathbb{R}\times\mathbb{T}$. The modified wave operator theorem shows that for all solution of the resonant system , there exists a solution of the initial system which scatters to this resonant system solution. Thanks to this operator, we can transfer the beating effect from the resonant system to the initial system and thus obtain solutions of the system which scatter to beating effect solutions of the resonant system. This strategy is summarized in the following schema: node\[ultra thick, align=center, rectangle, draw=blue, scale=1.5, text width=1.8cm\] (Sys) [Coupled Schrödinger system]{}; node\[ultra thick, align=center, rectangle, draw=blue, scale=1.5, above=of Sys, text width=1.8cm\] (Res) [Resonant system]{}; (Sys) to \[bend right\] node \[align=center, right,text width=1.8cm\] [Modified scattering]{} (Res); (Res) to \[bend right\] node \[align=center, left, text width=1.8cm\] [Wave operator]{} (Sys); node \[ellipse, scale=1.2, draw=red, align=center, right=of Res, text width=1.8cm, xshift=-2cm\] (BSres) [Bounded solutions]{} ; node \[ellipse, scale=1.2, draw=green, align=center, right=of Sys, text width=1.8cm, xshift=-2cm\] (BSsys) [Bounded solutions]{}; node\[ultra thick, align=center, rectangle, draw=blue, scale=1.5, left=of Res, text width=1.8cm\] (Red) [Reduced resonant system]{}; (Red) – node \[align=center,above, text width=1.8cm\] [Transfer of]{} node \[align=center,below, text width=1.8cm\] [solutions]{}(Res); node \[ellipse, scale=1.2, draw=red, align=center, below=of Red, text width=1.8cm,yshift=2.3cm\] (Beatred) [Beating effect]{}; node \[ellipse, scale=1.2, draw=green, align=center, left=of Sys, text width=1.8cm, xshift=3cm\] (Beatsys) [Beating effect]{}; (Beatred) – node \[align=center,left, text width=3.5cm\] [Transfer of solution and Wave Operator]{} (Beatsys); (BSres) – node \[align=center,right, text width=1.8cm\] [Modified scattering]{} (BSsys); (BSres) – (Res); (BSsys) – (Sys); (Beatred) – (Red); (Beatsys) – (Sys); Plan of the paper ----------------- In Section \[secprel\], we introduce the different norms and notations we need and state some preliminary estimates. In Section \[modanswav\], we present the modified scattering and wave operator results, which are extensions of the results of [@HPTV]. Finally, the resonant system is introduced and studied in Section \[Secres\]. In particular, we obtain here the boundedness of the solutions and we construct the solutions which provide some beating effect. Preliminaries {#secprel} ============= In this section, we first introduce in Subsection \[subnorm\] all the notations and norms we use in the paper. Then, in Subsection \[subprofi\], we introduce the profiles and the nonlinearity associated to the profile system. Norms and notations {#subnorm} ------------------- ### Some notations We mainly follow the notations of [@HPTV]. Concerning standard notations, we use the notation $f\lesssim g$ to denote that there exists a constant $c>0$ such that $f\leq cg$. This notation allows us to avoid dealing with all the constants in the different inequalities. We also use the usual notation $\left<p\right>:=\sqrt{1+p^2}$. Most of the time, we use the distinction between lower case letters and capitalized letters to specify on which spatial domain the functions are defined. On the one hand, we use lower case letters to denote functions of the Euclidean variable $f:\mathbb{R}\rightarrow\mathbb{C}$ or sequences $a:\mathbb{Z}\rightarrow\mathbb{C}$. On the other hand, we use capitalized letters to denote functions on the product space $F:\mathbb{R}\times\mathbb{T}\rightarrow\mathbb{C}$. We define the spatial Fourier transform in Schwartz space, for $\varphi\in S(\mathbb{R}\times\mathbb{T})$, by $$\mathcal{F}(\varphi)(\xi,p)=\hat{\varphi}_p(\xi):=\frac{1}{(2\pi)^2}\displaystyle\int_{\mathbb{R}\times\mathbb{T}}e^{-ix\xi}e^{-iyp}\varphi(x,y)dxdy.$$ We see with this definition that we use the notation $\hat{f}(\xi)$ for the Fourier transform of a function defined on $\mathbb{R}$, and the notation $a_p$ for the Fourier transform of a function defined on the torus $\mathbb{T}$. An interesting feature of this Fourier transform convention is that there is no $\pi$-coefficient for the inverse Fourier transform. As mentioned in the motivations, it seems relevant to introduce the profiles $(F,G)$ of a solution $(U,V)$, defined by $$F(t,x,y):=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}U(t,x,y) \qquad\qquad G(t,x,y):=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}V(t,x,y).$$ As we work with small initial data, we can expect the nonlinearity to stay small, and thus the solutions of the system to stay close to their profiles which are the solutions of the linear system. Concerning the frequency sets we use here, we first introduce the momentum level set $$\begin{aligned} \mathcal{M}:=\{(p,q,r,s)\in\mathbb{Z}^4\;:\;m(p,q,r,s):=p-q+r-s=0\}.\end{aligned}$$ Thanks to this set, we define the resonant level sets by $$\Gamma_\omega:=\{(p,q,r,s)\in\mathcal{M}\;:\;\omega(p,q,r,s):=p^2-q^2+r^2-s^2=\omega\}.$$ In particular, the resonant level set associated to our resonant system is the set $\Gamma_0$. Due to the dimension one for the torus, it is straightforward to check that $$(p,q,r,s)\in\Gamma_0 \quad \text{if and only if} \quad \left\{p,r\right\}=\left\{q,s\right\}.$$ Finally, for the constants used in the paper, we fix the small parameter $\delta\leq 10^{-3}$ and the integer $N\geq12$ for the definitions of the norms we present just below. ### The norms First, for the sequences $a=(a_p)_{p\in\mathbb{Z}}$, we defined the associated Sobolev norm by $$\|a\|^2_{h^s_p}:=\sum_{p\in\mathbb{Z}}(1+p^2)^s|a_p|^2.$$ Then, for the functions, we use two strong norms $S$ and $S^+$ defined by $$\label{defS} \|F\|_{S}:=\|F\|_{H^N_{x,y}}+\|xF\|_{L^2_{x,y}}, \quad \|F\|_{S^+}:=\|F\|_{S}+\|(1-\partial_{xx})^4F\|_{S}+\|xF\|_{S}.$$ The subscripted letters $x,y$ and $p$ in the definitions of the norms indicate the variable concerned by the integration, and thus the canonical integration domain associated ($\mathbb{R}$ for the variables $x$, $y$ and $\xi$; and $\mathbb{Z}$ for the variable $p$). We remark that the $S^+$ norm is a stronger norm than the $S$ norm, but only in $x$. Introduction of the profiles {#subprofi} ---------------------------- By writing the system with the profiles (defined in ), we get $$\begin{dcases} i\partial_tF(t)&=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}\left(e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}G(t)e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}} \overline{G(t)}e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}F(t)\right)=\mathcal{N}^t[G(t),G(t),F(t)],\\ i\partial_tG(t)&=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}\left(e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}F(t)e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}} \overline{F(t)}e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}G(t)\right)=\mathcal{N}^t[F(t),F(t),G(t)], \end{dcases}$$ where $$\mathcal{N}^t[F(t),G(t),H(t)]:=e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}\left(e^{it\Delta_{\mathbb{R}\times\mathbb{T}}} Fe^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}\overline{G}e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}H\right).$$ Let us compute the Fourier transform of $\mathcal{N}^t[F(t),G(t),H(t)]$. We first remark that, taking the Fourier transform with respect to the $y$ variable, we get for F $$e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}F(t,x,y)=\displaystyle\sum_{q\in\mathbb{Z}}e^{iqy}e^{-itq^2}\left(e^{it\partial_{xx}}F_q(t,x)\right).$$ Thus, by taking this expression for $F$,$G$ and $H$, we obtain $$\begin{aligned} \mathcal{F}\mathcal{N}^t[F,G,H](\xi,p) &=\dfrac{e^{it\xi^2}}{(2\pi)^2}\int_{\mathbb{R}\times\mathbb{T}}e^{-ix\xi} \sum_{q,r,s\in\mathbb{Z}}e^{-im(p,q,r,s)y}e^{it\omega(p,q,r,s)}\left(e^{it\partial_{xx}}F_qe^{-it\partial_{xx}}\overline{G_r} e^{it\partial_{xx}}H_s\right)(x)dxdy\nonumber\\ &=\dfrac{e^{it\xi^2}}{2\pi}\sum_{(p,q,r,s)\in\mathcal{M}}e^{it\omega(p,q,r,s)} \int_{\mathbb{R}}e^{-ix\xi}\left(e^{it\partial_{xx}}F_qe^{-it\partial_{xx}}\overline{G_r} e^{it\partial_{xx}}H_s\right)(x)dx\nonumber\\ &=\sum_{(p,q,r,s)\in\mathcal{M}}e^{it\omega(p,q,r,s)}\widehat{\mathcal{I}^t[F_q,G_r,H_s]}(\xi),\label{FNI}\end{aligned}$$ where $$\mathcal{I}^t[F_q,G_r,H_s](x):=e^{-it\partial_{xx}}\left(e^{it\partial_{xx}}F_qe^{-it\partial_{xx}}\overline{G_r} e^{it\partial_{xx}}H_s\right)(x). \label{defI}$$ We compute $\widehat{\mathcal{I}^t[F_q,G_r,H_s]}$ using the properties of the Fourier transform, we have $$\begin{aligned} \widehat{\mathcal{I}^t[F_q,G_r,H_s]}(\xi)&=e^{it\xi^2}\widehat{\left(e^{it\partial_{xx}}F_qe^{-it\partial_{xx}}\overline{G_r} e^{it\partial_{xx}}H_s\right)}(\xi)\\ &=e^{it\xi^2}\int_{\mathbb{R}^2}\widehat{(e^{it\partial_{xx}}F_q)}(\xi-a-b)\widehat{(e^{-it\partial_{xx}}\overline{G_r})}(a) \widehat{(e^{it\partial_{xx}}H_s)}(b)dadb\\ &=e^{it\xi^2}\int_{\mathbb{R}^2}e^{it\left(b^2-a^2-(\xi-a-b)^2\right)}\hat{F}_q(\xi-a-b)\widehat{\overline{G_r}}(a)\hat{H}_s(b)dadb, \intertext{we now use the changes of variable $\eta=a+b$ and $\kappa=\xi-a$ to get} \widehat{\mathcal{I}^t[F_q,G_r,H_s]}(\xi) &=\int_{\mathbb{R}^2}e^{2it\eta\kappa}\hat{F}_q(\xi-\eta)\overline{\hat{G}_r}(\xi-\eta-\kappa)\hat{H}_s(\xi-\kappa)d\eta d\kappa.\end{aligned}$$ Thus, back to $\mathcal{N}^t$, we have $$\mathcal{F}\mathcal{N}^t[F,G,H](\xi,p)=\sum_{(p,q,r,s)\in\mathcal{M}}e^{it\omega(p,q,r,s)} \int_{\mathbb{R}^2}e^{2it\eta\kappa}\hat{F}_q(\xi-\eta)\overline{\hat{G}_r}(\xi-\eta-\kappa)\hat{H}_s(\xi-\kappa)d\eta d\kappa.$$ From this equation, by a formal intuition given by the stationary phase principle and the Birkhoff normal forms, we define the resonant part $\mathcal{R}$ of the nonlinearity $\mathcal{N}^t$ by $$\label{defR} \mathcal{F}\mathcal{R}[F,G,H](\xi,p)=\sum_{(p,q,r,s)\in\Gamma_0}\hat{F}_q(\xi)\overline{\hat{G}_r}(\xi)\hat{H}_s(\xi).$$ The modified scattering and the wave operator {#modanswav} ============================================= The aim of this section is to prove a modified scattering result and to construct of modified wave operator between the initial system and the resonant system . For this purpose, we first study a decomposition of the nonlinearity $\mathcal{N}^t$ in order to highlight the proximity between $\mathcal{N}^t$ and $\frac{\pi}t\mathcal{R}$. Then, we state here two theorems which are extensions of the modified scattering and wave operator results of Hani, Pausader, Tzvetkov and Visciglia in [@HPTV] to our coupled system case. We refer to their paper for the complete proofs of these theorems, because the pass from the equation to the system doesn’t bring new technical difficulties. The complete proofs in the system case are also available in [@VVDRthese]. In the two theorems, $S^+$ is a strong $L^2_{x,y}$ based Banach space, introduced in Subsection \[subnorm\], which contains the Schwartz functions. Moreover, we recall that $N\geq12$ is an integer. Decomposition of the nonlinearity --------------------------------- We recall that the nonlinearity $\mathcal{N}^t$ is given in the Fourier space by $$\mathcal{F}\mathcal{N}^t[F,G,H](\xi,p)=\sum_{p-q+r-s=0}e^{it(p^2-q^2+r^2-s^2)} \int_{\mathbb{R}^2}e^{2it\eta\kappa}\hat{F}_q(\xi-\eta)\overline{\hat{G}_r}(\xi-\eta-\kappa)\hat{H}_s(\xi-\kappa)d\eta d\kappa.$$ For the integral part of the nonlinearity, we use the following stationary phase principle from Zuily in [@Zui02]: Let $n\in\mathbb{N}^{*}$ be an integer and $a\in\mathcal{C}^\infty_0(\mathbb{R}^n,\mathbb{C})$ a smooth function with compact support. If the phase $\varphi\in\mathcal{C}^\infty(\mathbb{R}^n,\mathbb{R})$ admits an unique critical point $x_c\in\mathbb{R}^n$, non-degenerate, then $$\int_{\mathbb{R}^n}e^{it\varphi(x)}a(x)\mathrm{d}x \underset{t\rightarrow+\infty}\sim e^{it\varphi(x_c)}\left(\frac{2\pi}t\right)^{\frac n2}\left|\det \varphi''(x_c)\right|^{-\frac12} e^{i\frac\pi4\operatorname{sgn}(\varphi''(x_c))}a(x_c),$$ where $\operatorname{sgn}(\varphi''(x_c))$ is the signature of the Hessian of $\varphi$ in $x_c$. If our phase $\varphi(\eta,\kappa):=2\eta\kappa$ satisfies the assumptions of the lemma (the origin is the only critical point and is non-degenerate), this is not the case for the amplitude $a$. Nevertheless, the stationary phase principle gives us a candidate to be the predominant term of the integral part, we expect that $$\int_{\mathbb{R}^2}e^{2it\eta\kappa}\hat{F}_q(\xi-\eta)\overline{\hat{G}_r}(\xi-\eta-\kappa)\hat{H}_s(\xi-\kappa)d\eta d\kappa \underset{t\rightarrow+\infty}\sim\frac{\pi}t\hat{F}_q(\xi)\overline{\hat{G}_r(\xi)}\hat{H}_s(\xi).$$ To take the sum into account, we use a Birkhoff normal form intuition (see [@GPT], [@GreTho12], [@GreVil11], [@HauPro16]…). Therefore, we expect that $$\sum_{p-q+r-s=0}a(t,p,q,r,s)\underset{\text{up to a remainder term}}\sim\sum\limits_{\substack{p-q+r-s=0 \\ p^2-q^2+r^2-s^2=0}}a(t,p,q,r,s).$$ Thanks to the stationary phase and the Birkhoff normal form intuitions, we finally expect that $$\mathcal{N}^t[F,G,H]\underset{t\rightarrow+\infty}\sim\frac\pi t\mathcal{R}[F,G,H],$$ where $\mathcal{R}$ is defined in . Thus, we study the decomposition $$\label{decom} \mathcal{N}^t[F,G,H]=\frac\pi t\mathcal{R}[F,G,H]+\mathcal{E}^t[F,G,H].$$ In order to show that the dynamics of the initial system (associated to $\mathcal{N}^t$) are close to the dynamics of the resonant system (associated to $\mathcal{R}$), we now have to show that $\mathcal{E}^t$ is a good remainder term (i.e a term that enjoys a good decay). Study of the remainder term Et ------------------------------ The study of the decay of the remainder term $\mathcal{E}^t$ is the purpose of Proposition 3.1 in [@HPTV]. The idea is to use a frequency decomposition and resonant/nonresonant decomposition of the nonlinearity $\mathcal{N}^t$. First, thanks to the Littlewood-Paley decomposition, we split the nonlinearity into two parts: $$\mathcal{N}^t=\mathcal{N}^t_{\text{low}}+\mathcal{N}^t_{\text{high}},$$ where the notation $\mathcal{N}^t_{\text{low}}$ (respectively $\mathcal{N}^t_{\text{high}}$) stands for the low (respectively high) frequency part of the nonlinearity. The idea here is to show that the term $\mathcal{N}^t_{\text{high}}$ has a good decay, thus it is a part of the remainder term $\mathcal{E}^t$. For that purpose, we use a classical bilinear Strichartz estimate (see Lemma 7.2 in [@HPTV] for the statement, two different proofs are given by Colliander, Keel, Staffilani, Takaoka and Tao in [@CKSTT01] and Tao in [@taophysical]). In particular, in order to control the high frequency part of the nonlinearity, we need the $H^N$ part of the $S$ norm (defined in ) and the fact that we choose $N$ large enough (in [@HPTV], they choose $N\geq30$ to be sure that $N$ is large enough, but we see here that $N\geq12$ is sufficient). This is the purpose of Lemma 3.2 in [@HPTV]. Then, we have to study the low frequency term $\mathcal{N}^t_{\text{low}}$. Here, we make a decomposition between resonant (with $p^2-q^2+r^2-s^2=0$) and nonresonant (with $p^2-q^2+r^2-s^2\neq0$) parts. We obtain $$\mathcal{N}^t_{\text{low}}=\mathcal{N}^t_{\text{low,res}}+\tilde{\mathcal{N}}^t_{\text{low}}.$$ Thanks to the term $\|xF\|_{L^2_{x,y}}$ term of the $S$ norm in , we prove that the nonresonant part $\tilde{\mathcal{N}}^t_{\text{low}}$ has also a good decay and can be integrate to the remainder part $\mathcal{E}^t$ (Lemma 3.3 in [@HPTV]). Finally, we have to deal with the low frequency resonant part $\mathcal{N}^t_{\text{low,res}}$. For that purpose, we use the proximity between the resonant part $\mathcal{N}^t_{\text{res}}$ of $\mathcal{N}^t$ and the resonant nonlinearity $\frac{\pi}t\mathcal{R}$. This proximity is given by Lemma 3.7 in [@HPTV]. For our system case, the proof is simpler due to the dimension one for the torus (see Proposition 4.3.9 in [@VVDRthese]). Therefore, we study the decomposition $$\mathcal{N}^t_{\text{low,res}}=\frac\pi t\mathcal{R}+\left(\mathcal{N}^t_{\text{low,res}}-\frac\pi t\mathcal{R}_{\text{low}}\right) -\frac\pi t\mathcal{R}_{\text{high}}.$$ In particular, the last term $\frac\pi t\mathcal{R}_{\text{high}}$ justifies the role of the $\|(1-\partial_{xx})^4F\|_{S}$ term in the definition of the $S^+$ norm in (see Proposition 4.3.15 in [@VVDRthese]). The remainder term in is thus defined by $$\mathcal{E}^t=\mathcal{N}^t_{\text{high}}+\tilde{\mathcal{N}}^t_{\text{low}} +\left(\mathcal{N}^t_{\text{low,res}}-\frac\pi t\mathcal{R}_{\text{low}}\right)-\frac\pi t\mathcal{R}_{\text{high}}.$$ The modified scattering ----------------------- First, the following theorem shows that solutions of the initial system  scatter to solutions of the resonant system . \[modscat\] There exists $\varepsilon>0$ such that if $U_0,V_0\in S^+$ satisfy $$\|U_0\|_{S^+}+\|V_0\|_{S^+}\leq\varepsilon,$$ and if $(U(t),V(t))$ solves with initial data $(U_0,V_0)$, then $(U,V)\in\mathcal{C}([0,+\infty):H^N)\times\mathcal{C}([0,+\infty) : H^N)$ exists globally and exhibits modified scattering to its resonant dynamics in the following sense: there exists $(W_{U,0},W_{V,0})$ satisfying $$\label{wu0control} \|W_{U,0}\|_{S}+\|W_{V,0}\|_{S}\lesssim\varepsilon,$$ such that if $(W_{U}(t),W_{V}(t))$ is the solution of with initial data $(W_{U,0},W_{V,0})$, then $$\begin{dcases} \|U(t)-e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}W_U(\pi\ln(t))\|_{H^N(\mathbb{R}\times\mathbb{T})}&\rightarrow0 \quad \text{as} \quad t\rightarrow+\infty,\\ \|V(t)-e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}W_V(\pi\ln(t))\|_{H^N(\mathbb{R}\times\mathbb{T})}&\rightarrow0 \quad \text{as} \quad t\rightarrow+\infty. \end{dcases}$$ Furthermore, we have the following decay estimate $$\begin{dcases} \|U(t)\|_{L^\infty_xH^1_y}&\lesssim(1+|t|)^{-\frac12},\\ \|V(t)\|_{L^\infty_xH^1_y}&\lesssim(1+|t|)^{-\frac12}. \end{dcases}$$ First, by classical tools, we prove that the solution of the initial system exists globally. Using the direction of dispersion, the decay estimate is also standard. For the scattering result, we take a solution $(U,V)$ of which satisfies, for $\varepsilon$ small enough, $$\|U_0\|_{S^+}+\|V_0\|_{S^+}\leq\varepsilon.$$ Then, we define $$W_U^n(t):=\tilde{W}^n_U(\pi\ln(t)) \quad \text{and} \quad W_V^n(t):=\tilde{W}_V^n(\pi\ln(t)),$$ where $(\tilde{W}^n_U,\tilde{W}_V^n)$ is the solution of the resonant system with Cauchy data $$\tilde{W}^n_U(n)=W_U^n(e^{\frac n\pi})=F(e^{\frac n\pi}), \qquad \tilde{W}^n_V(n)=W_V^n(e^{\frac n\pi})=G(e^{\frac n\pi}),$$ with the profiles $F$ and $G$ of $U$ and $V$ defined in . In order to prove the scattering result, we want to show that the couple of profiles $(F,G)$ tends to be close to a couple of solutions of the resonant system . By definition of $W_U^n$ and $W_V^n$, we have $$i\partial_t W^n_U(t)=\frac{\pi}t\mathcal{R}[W_V^n(t),W_V^n(t),W_U^n(t)], \quad i\partial_t W_V^n(t)=\frac{\pi}t\mathcal{R}[W_U^n(t),W_U^n(t),W_V^n(t)].$$ Thus, using the decomposition and the choice of initial data, we have $$\begin{aligned} F(t)-W_U^n(t)&=-i\int_{e^{\frac n\pi}}^t (\mathcal{N}^s[G,G,F]-\frac{\pi}s\mathcal{R}[W_V^n(s),W_V^n(s),W_U^n(s)])\mathrm{d}s\\ \qquad&=-i\int_{e^{\frac n\pi}}^t \mathcal{E}^s[G,G,F]ds-i\int_{e^{\frac n\pi}}^t \frac{\pi}s \big(\mathcal{R}[G(s),G(s),F(s)]-\mathcal{R}[W_V^n(s),W_V^n(s),W_U^n(s)]\big)\mathrm{d}s.\end{aligned}$$ Thanks to the good decay of the remainder term $\mathcal{E}^t$ and the control of the resonant $\mathcal{R}$, and using the Grönwall’s Lemma, we show that $$\sup_{e^{\frac n\pi}\leq t\leq e^{\frac {(n+4)}\pi}}\|F(t)-W_U^n(t)\|_S\underset{n\to +\infty}{\longrightarrow} 0.$$ We see here that $F(t)$ is close to $\tilde{W}_U^n(\pi\ln(t))$. However, we can’t conclude that one $(\tilde{W}_U^n,\tilde{W}_V^n)$ couple is solution of the problem, because if we want to take $t\rightarrow+\infty$, the time $t$ becomes bigger than any $e^{\frac {(n+4)}\pi}$ for a fixed $n$. The idea is thus to find some limit of the $\tilde{W}_U^n$ terms. Because of the different intervals $[e^{\frac n\pi},e^{\frac {(n+4)}\pi}]$ for the estimates, we can’t hope to take directly the limit of the $\tilde{W}_U^n$. This is the reason why we look now at the initial data. The idea is to show that the sequences $(\tilde{W}_U^{n}(0))_n$ and $(\tilde{W}_V^{n}(0))_n$ are Cauchy sequences in the complete space $S$ (defined by the S norm). Thus, there exists a couple of elements $(W_{U,0,\infty},W_{V,0,\infty})\in S\times S$, limit of these sequences. We denote now by $(\tilde{W}_{U,\infty},\tilde{W}_{V,\infty})$ the couple of solutions of the resonant system with the couple of initial data $(W_{U,0,\infty},W_{V,0,\infty})$. Finally, the couple $(\tilde{W}_{U,\infty},\tilde{W}_{V,\infty})$ is the solution of the problem in the sense where we can show that (the same relation is satisfied *mutatis mutandis* for V): $$\begin{aligned} \|e^{-\Delta_{\mathbb{R}\times\mathbb{T}}}U(t)-\tilde{W}_{U,\infty}(\pi\ln(t))\|_S=\|F(t)-\tilde{W}_{U,\infty}(\pi\ln(t))\|_S \underset{t\to +\infty}{\longrightarrow}0.\end{aligned}$$ In particular, the relation is true for the $H^N$ norm which is a part of the $S$ norm (see definition ), and the proof of the scattering result is completed. The modified wave operator -------------------------- After the existence of a scattering result, the natural question is to look for a wave operator. Indeed, if we know that each couple of solutions of the system scatters to a couple of solutions of the resonant system , we want to know if all the couples of solutions of the resonant system are limits of couples of solutions of the initial system. The answer is given by the following theorem: \[waveop\] There exists $\varepsilon>0$ such that if $W_{U,0},W_{V,0}\in S^+$ satisfy $$\|W_{U,0}\|_{S^+}+\|W_{V,0}\|_{S^+}\leq\varepsilon,$$ and if $(W_{U}(t),W_{V}(t))$ solves the resonant system with initial data $(W_{U,0},W_{V,0})$, then there exists a couple $(U,V)\in\mathcal{C}([0,+\infty):H^N)\times\mathcal{C}([0,+\infty) : H^N)$ solution of such that $$\begin{dcases} \|U(t)-e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}W_U(\pi\ln(t))\|_{H^N(\mathbb{R}\times\mathbb{T})}&\rightarrow0 \quad \text{as} \quad t\rightarrow+\infty,\\ \|V(t)-e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}W_V(\pi\ln(t))\|_{H^N(\mathbb{R}\times\mathbb{T})}&\rightarrow0 \quad \text{as} \quad t\rightarrow+\infty. \end{dcases}$$ The idea is to use a fixed-point theorem. First, as in the previous theorem, we perform a change of variable by setting $\tilde{W}_U(t)=W_U(\pi\ln(t))$ and $\tilde{W}_V(t)=W_V(\pi\ln(t))$ in order to obtain $$i\partial_t \tilde{W}_U(t)=\frac{\pi}t\mathcal{R}[\tilde{W}_V(t),\tilde{W}_V(t),\tilde{W}_U(t)], \quad i\partial_t \tilde{W}_V(t)=\frac{\pi}t\mathcal{R}[\tilde{W}_U(t),\tilde{W}_U(t),\tilde{W}_V(t)].$$ The map we define for the fixed-point theorem is $$\Phi(F,G)(t):=(\Phi_1(F,G)(t),\Phi_2(F,G)(t)),$$ where $$\begin{aligned} \Phi_1(F,G)(t):=i\int_t^{+\infty}\left(\mathcal{N}^s[G+\tilde{W}_V,G+\tilde{W}_V,F+\tilde{W}_U] -\frac\pi s\mathcal{R}[\tilde{W}_V(s),\tilde{W}_V(s),\tilde{W}_U(s)]\right)\mathrm{d}s,\\ \Phi_2(F,G)(t):=i\int_t^{+\infty}\left(\mathcal{N}^s[F+\tilde{W}_U,F+\tilde{W}_U,G+\tilde{W}_V] -\frac\pi s\mathcal{R}[\tilde{W}_U(s),\tilde{W}_U(s),\tilde{W}_V(s)]\right)\mathrm{d}s.\end{aligned}$$ The space we define for the fixed-point theorem is the small ball $$B_{\tilde{\mathfrak{A}}}(2\varepsilon)=\left\{(F,G)\in\tilde{\mathfrak{A}},\|(F,G)\|_{\tilde{\mathfrak{A}}}\leq2\varepsilon \right\},$$ where $$\|(F,G)\|_{\tilde{\mathfrak{A}}}=\|F\|_{\mathfrak{A}}+\|G\|_{\mathfrak{A}},$$ and the space $\mathfrak{A}$ is chosen (see the proof of Theorem 5.1 in [@HPTV] for the formal definition of the norm) such that $$\|F\|_{\mathfrak{A}}\leq 2\varepsilon \Rightarrow \|F(t)\|_{S}\underset{t\to +\infty}{\longrightarrow}0.$$ To apply the fixed-point theorem, we need to show that for $\varepsilon$ small enough, $\Phi$ is a contraction (see the proof of Theorem 4.6.1 in [@VVDRthese]). Let us see how it is sufficient to prove the theorem. Assume that $\Phi$ is a contraction, by the fixed-point theorem, there exists an unique couple $(F,G)$ such that $\Phi(F,G)=(F,G)$. It follows that $$\begin{aligned} i\partial_tF(t)=\mathcal{N}^t[G+\tilde{W}_V,G+\tilde{W}_V,F+\tilde{W}_U]-\frac\pi t\mathcal{R}[\tilde{W}_V(t),\tilde{W}_V(t),\tilde{W}_U(t)],\\ i\partial_tG(t)=\mathcal{N}^t[F+\tilde{W}_U,F+\tilde{W}_U,G+\tilde{W}_V]-\frac\pi t\mathcal{R}[\tilde{W}_U(t),\tilde{W}_U(t),\tilde{W}_V(t)].\end{aligned}$$ Thus, with the choice of $(\tilde{W}_U,\tilde{W}_V)$, we get $$\begin{aligned} \begin{dcases} i\partial_t(F+\tilde{W}_U)(t)=\mathcal{N}^t[G+\tilde{W}_V,G+\tilde{W}_V,F+\tilde{W}_U],\\ i\partial_t(G+\tilde{W}_V)(t)=\mathcal{N}^t[F+\tilde{W}_U,F+\tilde{W}_U,G+\tilde{W}_V]. \end{dcases}\end{aligned}$$ Now we set $U:=e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}(F+\tilde{W}_U)$ and $V:=e^{it\Delta_{\mathbb{R}\times\mathbb{T}}}(G+\tilde{W}_V)$, then $(U,V)$ solves and by definition, for $(F,G)\in B_{\tilde{\mathfrak{A}}}(2\varepsilon)$, we have $$\begin{aligned} \|e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}U(t)-W_U(\pi\ln(t))\|_S=\|F(t)\|_S \underset{t\to +\infty}{\longrightarrow} 0,\\ \|e^{-it\Delta_{\mathbb{R}\times\mathbb{T}}}V(t)-W_V(\pi\ln(t))\|_S=\|G(t)\|_S \underset{t\to +\infty}{\longrightarrow} 0.\end{aligned}$$ The proof of the theorem is thus completed. The aim now is to use these two theorems to obtain some dynamical consequences for the initial system . Study of the resonant system {#Secres} ============================ In this section, we want to study the resonant system $$\begin{dcases} i\partial_{\tau}W_U(\tau)=\mathcal{R}\left[W_V(\tau),W_V(\tau),W_U(\tau)\right],\\ i\partial_{\tau}W_V(\tau)=\mathcal{R}\left[W_U(\tau),W_U(\tau),W_V(\tau)\right], \end{dcases}$$ with $\mathcal{F}\mathcal{R}\left[F,G,H\right](\xi,p)=\displaystyle\sum_{(p,q,r,s)\in\Gamma_0} \hat{F}(\xi,q)\hat{G}(\xi,r)\hat{H}(\xi,s)$ and $\Gamma_0=\left\{(p,q,r,s)\in\mathbb{Z}^4, \left\{p,r\right\}=\left\{q,s\right\} \right\}$. In the definition of $\mathcal{R}$, the Euclidean variable $\xi$ acts just like a parameter. According to this idea, we define the reduced resonant system for two vectors $a=\left\{a_p\right\}_{p\in\mathbb{Z}}$ and $b=\left\{b_p\right\}_{p\in\mathbb{Z}}$, by $$\begin{dcases}\label{redu} i\partial_ta(t)=R\left(b(t),b(t),a(t)\right),\\ i\partial_tb(t)=R\left(a(t),a(t),b(t)\right), \end{dcases}$$ with $R\left(a(t),b(t),c(t)\right)_p=\displaystyle\sum_{(p,q,r,s)\in\Gamma_0}a_q(t)\overline{b_r(t)}c_s(t).$ First, we study the behavior of the resonant system in Subsection \[ss40\] in order to obtain the local existence of the solutions of the resonant system. Then, in Subsection \[ss41\], we prove the control of the Sobolev norms of the solutions of system and the global existence of the solutions. In order to take advantage of the reduced resonant system, we want to show in Subsection \[ss42\] that we can transfer solutions from the reduced resonant system associated to $R$ to solutions of the resonant system associated to $\mathcal{R}$. Thus, in Subsection \[ss43\], we study the structure of this reduced resonant system. We obtain in Subsection \[ss45\] an example of nonlinear behavior with the beating effect. It allows us to prove Theorem \[beating\] in Subsection \[ss46\]. Finally, we study the persistence of the beating effect through the add of convolution potentials in Subsection \[ss47\]. Behavior of the resonant part {#ss40} ----------------------------- The first lemma we need concerns the resonant part $\mathcal{R}$, we have \[lemR\] For every sequences $(a^1)_p$, $(a^2)_p$ and $(a^3)_p$ indexed by $\mathbb{Z}$, we have $$\label{eqlemR1} \|\sum_{(p,q,r,s)\in\Gamma_0}a^1_q\overline{a}^2_ra^3_s\|_{\ell^2_p}\lesssim\min_{\sigma\in\mathfrak{S}_3}\|a^{\sigma(1)}\|_{\ell^2_p}\|a^{\sigma(2)}\|_{h^1_p} \|a^{\sigma(3)}\|_{h^1_p}.$$ More generally, for all $\nu\geq0$, it holds $$\label{eqlemR2} \|\sum_{(p,q,r,s)\in\Gamma_0}a^1_q\overline{a}^2_ra^3_s\|_{h^\nu_p}\lesssim\sum_{\sigma\in\mathfrak{S}_3}\|a^{\sigma(1)}\|_{h^\nu_p}\|a^{\sigma(2)}\|_{h^1_p} \|a^{\sigma(3)}\|_{h^1_p}.$$ The operator we deal with here is not really the resonant nonlinearity $\mathcal{R}$, because we don’t deal with the $\xi$ variable. In fact, this operator is the reduced resonant nonlinearity we introduce later in Subsection \[ss43\]. We proceed by duality. Set the sequence $(R)_p=(\sum_{(p,q,r,s)\in\Gamma_0}a^1_q\overline{a}^2_ra^3_s)_p$. For $a^0\in {\ell^2_p}$ we have $$\left<a^0,R\right>_{\ell^2_p\times \ell^2_p}=\sum_{(p,q,r,s)\in\Gamma_0}a^0_p\overline{a}^1_qa^2_r\overline{a}^3_s.$$ Once again, we use that in one dimension, $(p,q,r,s)\in\Gamma_0$ implies $\{p,r\}=\{q,s\}$. Thus $$\left<a^0,R\right>_{\ell^2_p\times \ell^2_p}=\sum_{p,r\in\mathbb{Z}}a^0_p\overline{a}^1_pa^2_r\overline{a}^3_r +\sum_{p,r\in\mathbb{Z}}a^0_p\overline{a}^1_ra^2_r\overline{a}^3_p-\sum_{p\in\mathbb{Z}}a^0_p\overline{a}^1_pa^2_p\overline{a}^3_p.$$ For the first term, we have by Cauchy-Schwarz in $p$ and $r$ $$\sum_{p,r\in\mathbb{Z}}a^0_p\overline{a}^1_pa^2_r\overline{a}^3_r=\left(\sum_{p\in\mathbb{Z}}a^0_p\overline{a}^1_p\right) \left(\sum_{r\in\mathbb{Z}}a^2_r\overline{a}^3_r\right)\leq \|a^0\|_{\ell^2_p}\|a^1\|_{\ell^2_p}\|a^2\|_{\ell^2_p}\|a^3\|_{\ell^2_p}.$$ The same holds for the second term. For the last term, we have by Cauchy Schwarz $$\sum_{p\in\mathbb{Z}}a^0_p\overline{a}^1_pa^2_p\overline{a}^3_p\leq\|a^0\|_{\ell^2_p} \min_{\sigma\in\mathfrak{S}_3}\|a^{\sigma(1)}\|_{\ell^2_p}\|a^{\sigma(2)}\|_{\ell^\infty_p}\|a^{\sigma(3)}\|_{\ell^\infty_p},$$ which is sufficient due to the embedding $h^1_p\hookrightarrow\ell^2_p\hookrightarrow\ell^\infty_p$. Therefore, we get $$\left<a^0,R\right>_{\ell^2_p\times \ell^2_p}\lesssim\|a^0\|_{\ell^2_p} \min_{\sigma\in\mathfrak{S}_3}\|a^{\sigma(1)}\|_{\ell^2_p}\|a^{\sigma(2)}\|_{h^1_p}\|a^{\sigma(3)}\|_{h^1_p}.$$ This completes the proof of . For equation , we remark that $$\text{for} \, (p,q,r,s)\in\Gamma_0, \qquad p^2-q^2+r^2-s^2=0\Rightarrow\left<p\right>^\nu\leq\left<q\right>^\nu+\left<r\right>^\nu+\left<s\right>^\nu.$$ In fact, here we have $\left<p\right>=\left<q\right>$ or $\left<s\right>$, but the previous inequality is sufficient for the estimate. Indeed, this inequality implies $$\left<a^0,\left<p\right>^\nu R\right>_{\ell^2_p\times \ell^2_p}\leq \sum_{(p,q,r,s)\in\Gamma_0}|a^0_p|\left(\left<q\right>^\nu|\overline{a}^1_qa^2_r\overline{a}^3_s| +|\overline{a}^1_q|\left<r\right>^\nu |a^2_r\overline{a}^3_s| +|\overline{a}^1_qa^2_r|\left<s\right>^\nu|\overline{a}^3_s|\right).$$ Then, it suffices to apply to each part of the sum, taking the $\ell^2_p$ for the term in the sum with the weight. This concludes the proof of this lemma. The fact that we take $p,q,r,s\in\mathbb{Z}$ is crucial for this proof. In higher dimension (in $\mathbb{R}\times\mathbb{T}^d$ with $2\leq d\leq4$), this method doesn’t fit anymore, whereas the result always holds. Taking $(p,q,r,s)\in\Gamma_0$ implies that $p,q,r,s$ are the vertices of a rectangle. Thus, in dimension one, we have a flat rectangle and $\Gamma_0$ is a trivial set. In dimension 2 or more, $\Gamma_0$ becomes much harder, and the proof of Lemma \[lemR\] becomes more technical, as we can see in [@HPTV Lemma 7.1]. From this lemma, we deduce the local existence of the solutions of the resonant system through the following corollary. The global existence is given in the next subsection by Lemma \[globres\]. \[coroloc\] Let $\nu\in\mathbb{N}^*$. For any $(W_{U,0},W_{V,0})\in H^\nu_{x,y}\times H^\nu_{x,y}$, there exist $T>0$ and a couple $(W_{U},W_{V})\in\mathcal{C}([0,T):H^\nu_{x,y})\times\mathcal{C}([0,T):H^\nu_{x,y})$ of local solutions to the resonant system with initial data $(W_{U,0},W_{V,0})$. From the previous lemma, we have for three functions $F^1,F^2$ and $F^3$ on $\mathbb{R}\times\mathbb{T}$, $$\|\sum_{(p,q,r,s)\in\Gamma_0}F^1_q\overline{F}^2_rF^3_s\|_{h^\nu_p}\lesssim\sum_{\sigma\in\mathfrak{S}_3}\|F^{\sigma(1)}\|_{h^\nu_p}\|F^{\sigma(2)}\|_{h^1_p} \|F^{\sigma(3)}\|_{h^1_p}.$$ Thus, we obtain $$\|\mathcal{R}[F^1,F^2,F^3]\|_{H^\nu_{x,y}}\lesssim\sum_{\sigma\in\mathfrak{S}_3}\|F^{\sigma(1)}\|_{H^\nu_{x,y}}\|F^{\sigma(2)}\|_{L^\infty_xh^1_p} \|F^{\sigma(3)}\|_{L^\infty_xh^1_p}.$$ The embedding $H^1_x \hookrightarrow L^\infty_x$ allows us to conclude that $$\|\mathcal{R}[F^1,F^2,F^3]\|_{H^\nu_{x,y}}\lesssim\|F^1\|_{H^\nu_{x,y}}\|F^2\|_{H^\nu_{x,y}}\|F^3\|_{H^\nu_{x,y}}.$$ This implies the local existence of the solutions. Control of the Sobolev norms {#ss41} ---------------------------- In this subsection, we study the behavior of solutions of the resonant system in order to obtain dynamical consequences for the initial system . The following lemma ensures the control of the Sobolev norms and the global existence of solutions of resonant system . \[lemW\] Assume $W_{U,0},W_{V,0}\in S^{(+)}$, and let $(W_{U},W_{V})$ be the solution of the resonant system  with initial data $(W_{U,0},W_{V,0})$. Then, for $t\geq1$, we have $$\begin{aligned} \|W_{U}(t)\|_{H^\sigma_{x,y}}+\|W_{V}(t)\|_{H^\sigma_{x,y}}&=\|W_{U,0}\|_{H^\sigma_{x,y}}+\|W_{V,0}\|_{H^\sigma_{x,y}},\quad \forall \sigma\in\mathbb{R}.\label{conshs}\end{aligned}$$ \[lemres\] Let us see the computations for $W_{U}$. By definition of the resonant system, we have $$i\partial_{t}\mathcal{F}W_U(t,\xi,p)=\mathcal{F}\mathcal{R}\left[W_V,W_V,W_U\right](t,\xi,p)=\displaystyle\sum_{(p,q,r,s)\in\Gamma_0} \hat{W}_{V,q}(t,\xi)\overline{\hat{W}_{V,r}(t,\xi)}\hat{W}_{U,s}(t,\xi).$$ Thus, for $h:\mathbb{R}\rightarrow\mathbb{R}$ a real function, we have $$\begin{aligned} \partial_t\sum_{p\in\mathbb{Z}}h(p)|\hat{W}_{U,p}|^2&=2\sum_{p\in\mathbb{Z}}h(p)\Re\left(\partial_t\hat{W}_{U,p}.\overline{\hat{W}_{U,p}}\right)\\ &=2\sum_{p\in\mathbb{Z}}h(p)\Im\left(i\partial_t\hat{W}_{U,p}.\overline{\hat{W}_{U,p}}\right)\\ &=2\sum_{(p,q,r,s)\in\Gamma_0}h(p)\Im\left(\overline{\hat{W}_{U,p}}\hat{W}_{V,q}\overline{\hat{W}_{V,r}}\hat{W}_{U,s}\right).\end{aligned}$$ Let us rewrite the right-hand side by developing the imaginary part. We have $$\partial_t\sum_{p\in\mathbb{Z}}h(p)|\hat{W}_{U,p}|^2=-i\sum_{(p,q,r,s)\in\Gamma_0}\left(h(p)\overline{\hat{W}_{U,p}}\hat{W}_{V,q}\overline{\hat{W}_{V,r}} \hat{W}_{U,s}-h(p)\hat{W}_{U,p}\overline{\hat{W}_{V,q}}\hat{W}_{V,r}\overline{\hat{W}_{U,s}}\right).$$ By symmetry this equation becomes $$\partial_t\sum_{p\in\mathbb{Z}}h(p)|\hat{W}_{U,p}|^2=-i\sum_{(p,q,r,s)\in\Gamma_0}\left(h(p)-h(s)\right) \overline{\hat{W}_{U,p}}\hat{W}_{V,q}\overline{\hat{W}_{V,r}}\hat{W}_{U,s}.$$ Here, we have no more symmetry because of the different $\hat{W}_U$ and $\hat{W}_V$ terms. To avoid this problem, we take advantage of the coupling effect by looking the sum of the norms of the solutions. We have $$\begin{aligned} \partial_t\sum_{p\in\mathbb{Z}}h(p)(|\hat{W}_{U,p}|^2+|\hat{W}_{V,p}|^2)&=-i\sum_{(p,q,r,s)\in\Gamma_0} \left(h(p)-h(s)\right) \overline{\hat{W}_{U,p}}\hat{W}_{V,q}\overline{\hat{W}_{V,r}}\hat{W}_{U,s}\\ &\quad-i\sum_{(p,q,r,s)\in\Gamma_0} \left(h(p)-h(s)\right) \overline{\hat{W}_{V,p}}\hat{W}_{U,q}\overline{\hat{W}_{U,r}}\hat{W}_{V,s}.\end{aligned}$$ Now, by symmetry we have $$\partial_t\sum_{p\in\mathbb{Z}}h(p)(|\hat{W}_{U,p}|^2+|\hat{W}_{V,p}|^2)=-i\sum_{(p,q,r,s)\in\Gamma_0}(h(p)-h(q)+h(r)-h(s)) \overline{\hat{W}_{U,p}}\hat{W}_{V,q}\overline{\hat{W}_{V,r}}\hat{W}_{U,s}.$$ By the structure of set $\Gamma_0$, we have $\left\{p,r\right\}=\left\{q,s\right\}$, thus $$\partial_t\sum_{p\in\mathbb{Z}}h(p)(|\hat{W}_{U,p}|^2+|\hat{W}_{V,p}|^2)=0.\label{consh1wu}$$ Taking $h(p)=\left<p\right>^{2\sigma}$, the proof of the lemma follows immediately. From this lemma, we have a first dynamical consequence (Theorem \[thmbounded\]), given by the following remark: \[rembounded\] This estimate is related to the dimension one of the compact part $\mathbb{T}$ of the spatial domain. In particular, due to the modified scattering of Theorem \[modscat\], this estimate prevents every kind of growth of the Sobolev norms of the solutions of the initial system . We have thus a first dynamical consequence of this theorem: all the couple of solutions of the system are bounded in every Sobolev space $H^s$ (for all $s\in\mathbb{R}$). In particular, we have proved the estimate . The estimate comes from equation  and Theorem \[modscat\], this completes the proof of Theorem \[thmbounded\]. Another consequence of this lemma is given by the global existence of the solutions of the resonant system. Indeed, we have \[globres\] Let $\nu\in\mathbb{N^*}$. For any $(W_{U,0},W_{V,0})\in H^\nu_{x,y}\times H^\nu_{x,y}$, there exists a unique couple of solutions $(W_{U},W_{V})\in\mathcal{C}(\mathbb{R}:H^\nu_{x,y})\times\mathcal{C}(\mathbb{R}:H^\nu_{x,y})$ of the resonant system with initial data $(W_{U,0},W_{V,0})$. The local existence of the solutions is given by Corollary \[coroloc\]. Then, equation allows us to pass from local existence to global existence. From the reduced resonant system to the resonant system {#ss42} ------------------------------------------------------- As mentioned in the introduction of the section, we want to take profit of the study of the reduced resonant system . In view of this idea, the following computations show how to transfer informations from a solution of the reduced resonant system to a solution of the system . Therefore, the wave operator theorem allows us to transfer these informations to solutions of the initial system . Let $(a,b)$ be a couple of solutions of the reduced resonant system . The idea is to take an initial data of the form $$W_{U,0}(x,y)=\check{\varphi}(x)\alpha(y),\qquad \qquad W_{V,0}(x,y)=\check{\varphi}(x)\beta(y),$$ where $\alpha_p=a_p(0)$, $\beta_p=b_p(0)$, $\varphi\in\mathcal{S}(\mathbb{R})$ and $\check{\varphi}$ is the inverse Fourier transform of $\varphi$. Thus, thanks to the separated variables $x$ and $y$ in the initial data, it’s straightforward to check that the solution of the resonant system with initial data $(W_{U,0},W_{V,0})$ is given by $$\mathcal{F}(W_{U})(t,\xi,p)=\varphi(\xi)a_p\left(\varphi(\xi)^2t\right),\qquad \qquad \mathcal{F}(W_{V})(t,\xi,p)=\varphi(\xi)b_p\left(\varphi(\xi)^2t\right).$$ Indeed, we have for example for $W_{U}$: $$\begin{aligned} i\partial_t \mathcal{F}(W_{U})(t,\xi,p)=\varphi(\xi)^3(i\partial_ta_p)\left(\varphi(\xi)^2t\right)= \mathcal{F}\mathcal{R}[W_{V}(t),W_{V}(t),W_{U}(t)]_p(\xi).\end{aligned}$$ In particular, if $\varphi=1$ on an open interval $I$, then $\mathcal{F}W_{U}(t,\xi,p)=a_p(t)$ and $\mathcal{F}W_{V}(t,\xi,p)=b_p(t)$, for all $t\in\mathbb{R}$ and all $\xi\in I$. Thus, for $\xi\in I$, the constructed solution $(W_U,W_V)$ of the resonant system behaves like the initial solution $(a,b)$ of the reduced resonant system . The solutions we obtain from this method for the resonant system are constant with respect to $\xi$ on the interval $I$ we choose. The idea is to take the interval $I$ as big as we want. Thus, we have a big interval in which we conserve the behavior of the resonant system on the torus. One can think that we completely kill the role of the Euclidean variable $x$ with this construction, whereas the goal of this construction is to take profit of the dynamics of the resonant system and to gain a large time behavior thanks to the Euclidean variable. Therefore, this method is really adapted to our aim which is to construct a couple of solution of the initial system with asymptotic dynamical properties of the reduced resonant system. About the reduced resonant system, the Hamiltonian formalism {#ss43} ------------------------------------------------------------ Let us now see some properties of the reduced resonant system. First, we can deduce some results for this system from the computations of Subsection \[ss41\]. From Lemma \[globres\], we deduce the global existence of the solutions of the reduced resonant system: \[globred\] Let $\sigma\in\mathbb{R}$. For any $(a_0,b_0)\in h^\sigma_{p}\times h^\sigma_{p}$, there exists a unique couple of solutions $(a,b)\in\mathcal{C}(\mathbb{R}:h^\sigma_{p})\times\mathcal{C}(\mathbb{R}:h^\sigma_{p})$ of the resonant system with initial data $(a_0,b_0)$. The computations of estimate imply that $R[b,b,.]$ is self-adjoint and satisfy $$\label{selfadR} \left<iR[b,b,a],a\right>_{h^1_p\times h^1_p}=0, \qquad \forall a,b\in h^1_p.$$ More generally, the computations of give us, for a solution $(a,b)$ of the system , $\forall\sigma\in\mathbb{R}$ $$\label{normhsa} \|a(t)\|_{h^\sigma_{p}}+\|b(t)\|_{h^\sigma_{p}}=\|a_0\|_{h^\sigma_{p}}+\|b_0\|_{h^\sigma_{p}}.$$ Then, we remark that the system is Hamiltonian, for the Hamiltonian $$\label{hamil} H:=\displaystyle\sum_{(p,q,r,s)\in\Gamma_0}a_p\overline{a}_qb_r\overline{b}_s =\displaystyle\sum\limits_{\{p,r\}=\{q,s\}}a_p\overline{a}_qb_r\overline{b}_s.$$ Indeed, with $H$ thus defined, we have the infinite system: $$\begin{dcases} i\partial_t{a_j}=\dfrac{\partial H}{\partial \overline{a}_j}, \quad -i\partial_t{\overline{a}_j}=\dfrac{\partial H}{\partial a_j}, \quad j\in\mathbb{Z},\\ i\partial_t b_j=\dfrac{\partial H}{\partial \overline{b}_j}, \quad -i\partial_t{\overline{b}_j}=\dfrac{\partial H}{\partial b_j}, \quad j\in\mathbb{Z}. \end{dcases}$$ The associated symplectic structure is given by $-i\displaystyle\sum_{j\in\mathbb{Z}}(\mathrm{d}a_j\wedge \mathrm{d}\overline{a}_j+ \mathrm{d}b_j\wedge \mathrm{d}\overline{b}_j)$. Thus, the Poisson bracket between two functions $f$ and $g$ of $(a,\overline{a},b,\overline{b})$ is given by $$\{f,g\}=-i\displaystyle\sum\limits_{j\in\mathbb{Z}}\left(\dfrac{\partial f}{\partial a_j}\dfrac{\partial g}{\partial\overline{a_j}}- \dfrac{\partial f}{\partial \overline{a_j}}\dfrac{\partial g}{\partial a_j}+\dfrac{\partial f}{\partial b_j}\dfrac{\partial g}{\partial\overline{b_j}}- \dfrac{\partial f}{\partial \overline{b_j}}\dfrac{\partial g}{\partial b_j}\right).$$ In order to rewrite the Hamiltonian, we set $$I:=\displaystyle\sum\limits_{n\in\mathbb{Z}}=|a_n|^2,\qquad J:=\displaystyle\sum\limits_{n\in\mathbb{Z}}=|b_n|^2,\qquad S:=\displaystyle\sum\limits_{n\in\mathbb{Z}}=a_n\overline{b_n}.$$ Therefore, considering that $\{p,r\}=\{q,s\}$ in $\Gamma_0$, we can write the Hamiltonian $H$ as $$\label{HIJS} H=IJ+|S|^2-\displaystyle\sum\limits_{n\in\mathbb{Z}}|a_n|^2|b_n|^2.$$ With this new structure, we can give a new proof of estimates and , for $n\in\mathbb{N}$ we have $$\begin{aligned} \partial_t(|a_n|^2+|b_n|^2)&=\{|a_n|^2,H\}+\{|b_n|^2,H\}\\ &=-i\left(\overline{a_n}\dfrac{\partial H}{\partial \overline{a_n}}-a_n\dfrac{\partial H}{\partial a_n}\right) -i\left(\overline{b_n}\dfrac{\partial H}{\partial \overline{b_n}}-b_n\dfrac{\partial H}{\partial b_n}\right)\\ &=-i\left(\overline{a_n}b_nS-a_n\overline{b_n}\overline{S}\right)-i\left(a_n\overline{b_n}\overline{S}-\overline{a_n}b_nS\right) \\ &=0.\end{aligned}$$ This implies the conservation of the $H^\sigma$ norms for the reduced resonant system , but also for the resonant system , where the quantities $a_n, b_n, I, J$ and $S$ depend on $\xi$ too. We are now able to prove the existence of the beating effect. Example of nonlinear dynamics: the beating effect {#ss45} ------------------------------------------------- In this subsection, we adapt the proof of the beating effect of Grébert, Paturel and Thomann in [@GPT] to prove Theorem \[beating\]. We want to highlight an exchange between two modes of the solutions. According to this idea, we introduce the reduced space $$\mathcal{J}_{p,q}=\{(a,b),a_n=\overline{a_n}=b_n=\overline{b_n}=0, n\notin \{p,q\}\},$$ and we note $\tilde{H}$ the reduced Hamiltonian defined by $$\tilde{H}=H_{\mathcal{J}_{p,q}}.$$ For more simplicity, we work in the symplectic polar coordinates $(I_j,J_j,\theta_j,\varphi_j)$ defined by: $$a_j=\sqrt{I_j}e^{i\theta_j}, \qquad b_j=\sqrt{J_j}e^{i\varphi_j}.$$ This is a symplectic change of variables because we have the relation $$\mathrm{d}\alpha\wedge \mathrm{d}\overline{\alpha}+\mathrm{d}\beta\wedge \mathrm{d}\overline{\beta}=i\left(\mathrm{d}\theta\wedge \mathrm{d}I +\mathrm{d}\varphi\wedge\mathrm{d}J\right).$$ Therefore, the expression of the Hamiltonian $H$ becomes for the reduced case $$\begin{aligned} \tilde{H}&=(I_p+I_q)(J_p+J_q)+(a_p\overline{b}_p+a_q\overline{b}_q)(\overline{a}_pb_p+\overline{a}_qb_q)-(a_p^2b_p^2+a_q^2b_q^2)\\ &=(I_p+I_q)(J_p+J_q)+2(I_pI_qJ_pJ_q)^\frac12\cos(\Psi_0),\end{aligned}$$ where $\Psi_0:=\theta_q-\theta_p+\varphi_p-\varphi_q.$ We obtain thus the following Hamiltonian system $$\begin{dcases}\label{hamiltheta} \partial_t\theta_j&=-\dfrac{\partial\tilde{H}}{\partial I_j}, \quad \partial_t I_j=\dfrac{\partial\tilde{H}}{\partial \theta_j}, \quad \quad j=p,q,\\ \partial_t\varphi_j&=-\dfrac{\partial\tilde{H}}{\partial J_j}, \quad \partial_t J_j=\dfrac{\partial\tilde{H}}{\partial \varphi_j}, \quad \quad j=p,q. \end{dcases}$$ Let us show that this system is completely integrable. The system is completely integrable. Moreover, the following change of variables is symplectic: $$\begin{dcases} K_0&=I_q,\quad K_1=I_q+I_p,\quad K_2=J_q+J_p,\quad K_3=I_q+J_q,\\ \Psi_0&=\theta_q-\theta_p+\varphi_p-\varphi_q,\quad \Psi_1=\theta_p,\quad \Psi_2=\varphi_p,\quad \Psi_3=\varphi_q-\varphi_p. \end{dcases}$$ First, we easily see that $K_1, K_2$ and $K_3$ are constants of motion. Indeed, we can for example check for $K_1$ that $$\begin{aligned} \left\{K_1,\tilde{H}\right\}&=\sum\limits_{j=p,q}\left(\dfrac{\partial K_1}{\partial I_j}\dfrac{\partial \tilde{H}}{\partial \theta_j}-\dfrac{\partial K_1} {\partial \theta_j}\dfrac{\partial \tilde{H}}{\partial I_j}+\dfrac{\partial K_1}{\partial J_j}\dfrac{\partial \tilde{H}}{\partial \varphi_j}-\dfrac{\partial K_1} {\partial \varphi_j}\dfrac{\partial \tilde{H}}{\partial J_j}\right) \\ &=\dfrac{\partial \tilde{H}}{\partial \theta_p}+\dfrac{\partial \tilde{H}}{\partial \theta_q}=2\sqrt{I_pI_qJ_pJ_q}(\sin\psi_0-\sin\psi_0)=0.\end{aligned}$$ Then, $K_1,K_2$ and $K_3$ are independent of the angles $\theta_p, \theta_q, \varphi_p$ and $\varphi_q$. Therefore, they are in involution: $$\left\{K_1,K_2\right\}=\left\{K_1,K_3\right\}=\left\{K_2,K_3\right\}=0.$$ Finally, $K_1,K_2$ and $K_3$ are clearly independent (they do not depend on the same actions) and are independent with $\tilde{H}$ which is the only to depend on an angle. Thus, the system is completely integrable. Concerning the change of variables, we have $$\begin{aligned} \mathrm{d}\Psi\wedge\mathrm{d}K&=\mathrm{d}\Psi_0\wedge\mathrm{d}K_0+\mathrm{d}\Psi_1\wedge\mathrm{d}K_1 +\mathrm{d}\Psi_2\wedge\mathrm{d}K_2+\mathrm{d}\Psi_3\wedge\mathrm{d}K_3\\ &=\mathrm{d}I_q\wedge \mathrm{d}(\theta_q-\theta_p+\varphi_p-\varphi_q+\theta_p+\varphi_q-\varphi_p) +\mathrm{d}I_p\wedge \mathrm{d}\theta_p+\mathrm{d}J_p\wedge \mathrm{d}\varphi_p+\mathrm{d}J_q\wedge\mathrm{d}(\varphi_p+\varphi_q-\varphi_p)\\ &=dI\wedge d\theta+dJ\wedge d\varphi.\end{aligned}$$ Thus, the change of variables is symplectic. The fact that the system is integrable is not a surprise. Indeed, we can remark that the Hamiltonian $\tilde{H}$ depends only on one angle $(\Psi_0)$. This gives us three constants of motion, which with the Hamiltonian itself form a family of four independent constants of motions in involution. Therefore, the system is completely integrable. Another easy way to check this integrability is to consider the conservations of the mass and moment of the solutions, given by the conservation of the $h^1$ norm of the solution thanks to equation . Therefore, the goal of this lemma is not to prove that the system is integrable, but to find a new explicit set of variable in order to obtain a simpler system. In this new system of coordinates, the Hamiltonian becomes $$\tilde{H}=\tilde{H}(\Psi_0,K_0,K_1,K_2,K_3)=K_1K_2+2\left(K_0(K_1-K_0)(K_3-K_0)(K_2-K_3+K_0)\right)^\frac12\cos(\Psi_0).$$ $K_1,K_2$ and $K_3$ and constants of motion. Thus, for initial data of the size $\varepsilon$, we can fixed $$K_1=K_2=K_3=\varepsilon^2.$$ Thus, we obtain a new Hamiltonian $\tilde{H}_0$ defined by $$\tilde{H}_0(\Psi_0,K_0)=\tilde{H}(\Psi_0,K_0,\varepsilon^2,\varepsilon^2,\varepsilon^2)=\varepsilon^4+2K_0(\varepsilon^2-K_0)\cos(\Psi_0).$$ To deal with all the $\varepsilon$ terms in the right-hand side of the previous equation, we make a change of unknown by setting $$\Psi_0(t)=:\Psi(\varepsilon^2t), \quad K_0(t)=:\varepsilon^2K(\varepsilon^2t).$$ We obtain the system: $$\label{Hstar} \begin{dcases} \dot{\Psi}&=2(2K-1)\cos\Psi=-\dfrac{\partial H_{\star}}{\partial K},\\ \dot{K}&=2K(K-1)\sin\Psi=\dfrac{\partial H_{\star}}{\partial \Psi}, \end{dcases}$$ where the new Hamiltonian $H_{\star}$ is defined by $$H_{\star}=H_{\star}(\Psi,K):=2K(1-K)\cos \Psi.$$ Thanks to the conservation of the Hamiltonian, we can check that the velocity vector never cancels (for a good choice of initial data). Therefore we obtain periodic solutions, and the symmetries $$H_{\star}(-\Psi,K)=H_{\star}(\Psi,K), \quad H_{\star}(\Psi,1-K)=H_{\star}(\Psi,K),$$ give us informations on the solutions $(\Psi,K)$. Another way to check this periodicity of the solutions is to draw the phase portrait of the system defined by : ![Phase portrait of the Hamiltonian](pendule) From this phase portrait, we deduce the following lemma: \[lemphasport\] For all $\gamma\in(0,\frac12)$, there exists a time $T_\gamma$ such that the system admits an orbit of period $2T_\gamma$ with $$\begin{dcases} (\Psi_\gamma(0),K_\gamma(0))=(0,\gamma),\\ (\Psi_\gamma(T_\gamma),K_\gamma(T_\gamma))=(0,1-\gamma). \end{dcases}$$ We can show that the period $T_\gamma$ satisfies the bound $$0<T_\gamma\lesssim |\ln(\gamma)|.$$ We refer to [@GPT Theorem 1.1] for the proof of this estimate. From Lemma \[lemphasport\], we have the beating effect in the following sense: for any couple of different integers $(p,q)$, there exists a solution $(a,b)$ of the reduced resonant system such that $$\begin{dcases} |b_p(t)|^2=|a_q(t)|^2=\varepsilon^2K_\gamma(\varepsilon^2t),\\ |a_p(t)|^2=|b_q(t)|^2=\varepsilon^2(1-K_\gamma(\varepsilon^2t)). \end{dcases}$$ Indeed, we can for example check the identity for $a_p$ by writing $$|a_p(t)|^2=I_p(t)=K_1-K_0(t)=\varepsilon^2(1-K(\varepsilon^2t)).$$ We can remark that we have a $\varepsilon^2$ factor in the right-hand side which is not present in [@GPT]. But in this article, this factor is present in the system. Beating effect and wave operator: proof of Theorem \[beating\] {#ss46} -------------------------------------------------------------- Let $I\subset\mathbb{R}$ be a bounded open interval, $(p,q)$ a couple of different integers and $0<\gamma<\frac12$. We chose: - $\varepsilon>0$ small enough. - $(a,b)$ a solution of the reduced resonant system with initial data $$\begin{dcases} a_p(0)=b_q(0)=\varepsilon^2\gamma, \\ b_p(0)=a_q(0)=\varepsilon^2(1-\gamma), \end{dcases}$$ that enjoys a beating effect between the modes $p$ and $q$, as constructed in the previous subsection. - $\varphi\in\mathcal{S}(\mathbb{R})$ a compact supported function such that $\varphi\equiv1$ on $I$. As in Subsection \[ss43\], we construct from $(a,b)$ a solution of the resonant system by choosing the initial data $$\begin{dcases}\label{defWU0beating} W_{U,0}=\check{\varphi}(x)\left(a_p(0)e^{ipy}+a_q(0)e^{iqy}\right)=\check{\varphi}(x)\varepsilon^2\left(\gamma e^{ipy}+(1-\gamma)e^{iqy}\right), \\ W_{V,0}=\check{\varphi}(x)\left(b_p(0)e^{ipy}+b_q(0)e^{iqy}\right)=\check{\varphi}(x)\varepsilon^2\left((1-\gamma) e^{ipy}+\gamma e^{iqy}\right). \end{dcases}$$ By construction, the solution $(W_U,W_V)$ of the resonant system with initial data $(W_{U,0},W_{V,0})$ satisfies $$\mathcal{F}(W_{U})(t,\xi,k)=\varphi(\xi)a_k\left(\varphi(\xi)^2t\right),\qquad \qquad \mathcal{F}(W_{V})(t,\xi,k)=\varphi(\xi)b_k\left(\varphi(\xi)^2t\right).$$ By the choice of the solution $(a,b)$, and the fact that $\varphi\equiv1$ on $I$, this completes the proof of the first and second parts of Theorem \[beating\]. For the third part of the theorem, in order to apply the modified wave operator from Section \[modanswav\], we have to check that for $\varepsilon$ small enough, the constructed initial data $(W_{U,0},W_{V,0})$ satisfies $$\label{assumptionstocheck} \|W_{U,0}\|_{S^+}+\|W_{V,0}\|_{S^+}\leq\varepsilon.$$ For example, for $W_{U,0}$, we have by : $$\left|\mathcal{F}(W_{U})(t,\xi,k)\right| \leq\varepsilon^2|\varphi(\xi)| \quad \text{if } k\in{p,q} \quad, \left|\mathcal{F}(W_{U})(t,\xi,k)\right|=0 \quad \text{else}.$$ Therefore, using that: - there is only two modes for the periodic variable, - $\varphi\in\mathcal{S}(\mathbb{R})$ is a compact supported function, - there is a $\varepsilon^2$ factor and $\varepsilon$ is small enough, the proof of and thus of Theorem \[beating\] is completed. Indeed, we recall that $$\begin{aligned} \|W_{U,0}\|_{S^+}&:=\|W_{U,0}\|_{H^N_{x,y}}+\|xW_{U,0}\|_{L^2_{x,y}} +\|xW_{U,0}\|_{H^N_{x,y}}+\|x^2W_{U,0}\|_{L^2_{x,y}}\\ &\qquad+\|(1-\partial_{xx})^4W_{U,0}\|_{H^N_{x,y}}+\|x(1-\partial_{xx})^4W_{U,0}\|_{L^2_{x,y}}.\end{aligned}$$ For example, we can check that for $\varepsilon$ small enough, $$\begin{aligned} \|x(1-\partial_{xx})^4W_{U,0}\|^2_{L^2_{x,y}}&=\int_{\mathbb{R}} \varepsilon^4(\gamma^2+(1-\gamma)^2)\left|\partial_\xi\left((1+\xi)^4\varphi(\xi)\right)\right|^2\mathrm{d}\xi\leq \frac{\varepsilon^2}{144}.\end{aligned}$$ Persistence of the beating effect and convolution potentials {#ss47} ------------------------------------------------------------ Going back to the single cubic Schrödinger equation on $\mathbb{R}\times\mathbb{T}^d$: $$i\partial_tU+\Delta_{\mathbb{R}\times\mathbb{T}^d}U=|U|^2U,$$ the method of Hani, Pausader, Tzvetkov and Visciglia in [@HPTV] allows to construct solutions that provide a growth of the Sobolev norms when $2\leq d\leq4$. The idea is to find some particular solutions of the resonant equation and then to use the wave operator theorem. In order to perturb the eigenvalues of the Laplacian, we can add a convolution potential: $$i\partial_tU+\Delta_{\mathbb{R}\times\mathbb{T}^d}U+V\star U=|U|^2U.$$ In this case, Grébert, Paturel and Thomann show in [@GPT2] that for generic choice of convolution potential, the resonances are killed. For these potentials, there is no more any growth of the Sobolev norms. More precisely, the Sobolev norms of small solutions are asymptotically constant. The natural question is thus to transpose the question about potentials to the system case. Are the potentials generically killing the beating effect ? Are the Sobolev norms of the couples of solutions asymptotically constant ? The answer of the first question is given by a simple observation. The key argument in [@GPT2] to kill the resonances and the growth of the Sobolev norms is to perturb the equation, thanks to the potentials, in order to obtain a smaller resonant set $$\Gamma_{0,conv,d}=\left\{(p,q,r,s)\in(\mathbb{Z}^d)^4\;:\;p-q+r-s=0,\;\{|p|,|r|\}=\{|q|,|s|\}\right\}.$$ In our case, we already have this relation. Indeed, we have $$\Gamma_{0}=\left\{(p,q,r,s)\in\mathbb{Z}^4\;:\;\{p,r\}=\{q,s\}\right\}=\Gamma_{0,conv,1}.$$ Therefore, we can conclude that the add of convolution potentials generically doesn’t kill the beating effect. Thus, why are the Sobolev norms constant in [@GPT2] and not in our coupled system case ? This is just a consequence of the coupled effect: what we have in our case is the fact that the sums of the Sobolev norms of the couples of solutions are asymptotically constant, which is the system equivalent of the result of [@GPT2]. *Acknowledgments*: The author deeply thanks Benoît Grébert and Laurent Thomann for several helps, advices and their many suggestions. The author also would like to warmly thank Frédéric Bernicot and Olivier Pierre for several useful discussions. [^1]: Work partially supported by the grant ANAÉ, ANR-13-BS01-0010-03.
2023-11-03T01:26:58.646260
https://example.com/article/1945
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html><head><title>R: Gain in Weight of Rats</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <link rel="stylesheet" type="text/css" href="R.css"> </head><body> <table width="100%" summary="page for weightgain"><tr><td>weightgain</td><td align="right">R Documentation</td></tr></table> <h2> Gain in Weight of Rats </h2> <h3>Description</h3> <p>The data arise from an experiment to study the gain in weight of rats fed on four different diets, distinguished by amount of protein (low and high) and by source of protein (beef and cereal). </p> <h3>Usage</h3> <pre>data("weightgain")</pre> <h3>Format</h3> <p>A data frame with 40 observations on the following 3 variables. </p> <dl> <dt><code>source</code></dt><dd><p>source of protein given, a factor with levels <code>Beef</code> and <code>Cereal</code>.</p> </dd> <dt><code>type</code></dt><dd><p>amount of protein given, a factor with levels <code>High</code> and <code>Low</code>.</p> </dd> <dt><code>weightgain</code></dt><dd><p>weigt gain in grams.</p> </dd> </dl> <h3>Details</h3> <p>Ten rats are randomized to each of the four treatments. The question of interest is how diet affects weight gain. </p> <h3>Source</h3> <p>D. J. Hand, F. Daly, A. D. Lunn, K. J. McConway and E. Ostrowski (1994). <EM>A Handbook of Small Datasets</EM>, Chapman and Hall/CRC, London. </p> <h3>Examples</h3> <pre> data("weightgain", package = "HSAUR") interaction.plot(weightgain$type, weightgain$source, weightgain$weightgain) </pre> </body></html>
2023-12-31T01:26:58.646260
https://example.com/article/8515
TAIPEI (Taiwan News) – According to an alleged e-mail by Hillary Clinton published by WikiLeaks, the former United States Secretary of State was willing to discuss a New York Times editorial calling on Washington to ditch Taiwan in return for China writing off debt. Her adviser Jake Sullivan passed on the editorial to Clinton, and she replied, “I saw it and thought it was so clever. Let’s discuss,” according to WikiLeaks. The editorial, titled “To Save Our Economy, Ditch Taiwan” appeared on the newspaper’s website on Nov.20, 2011 and was written by Paul Kane, a former international security fellow at the Harvard Kennedy School. In the piece, the author says President Barack Obama “should enter into closed-door negotiations with Chinese leaders to write off the $1.14 trillion of American debt currently held by China in exchange for a deal to end American military assistance and arms sales to Taiwan and terminate the current United States-Taiwan defense arrangement by 2015.” The proposal would benefit the U.S. in that it would cut its debt, improve its economy, and keep it out of a potential war with China over Taiwan, Kane wrote. It is not clear from the WikiLeaks documents whether Clinton actually discussed the issue and to what conclusion she came.
2024-05-06T01:26:58.646260
https://example.com/article/2440
Project summary The control of malaria in Africa is challenged by increasing drug resistance. New artemisininbased combination therapy (ACT) regimens are generally very effective, and have recently been adopted as standard therapy for uncomplicated malaria by nearly every country in Africa. However, heavy and repeated use of ACTs, as is now occuring, will lead to strong selective pressure for resistance to components of these regimens. Our understanding of mechanisms of resistance to ACTs is incomplete. We suggest that the best means of identifying resistancemediating mutations before they are widespread will be to evaluate parasites that emerge soon after therapy, while they are under the selective pressure of long-acting ACT partner drugs. We hypothesize that treatment failures and the emergence of new infections soon after treatment with ACTs will be associated with known and unknown mutations in malaria parasites that alter responses to artemisinin partner drugs. To test this hypothesis, we will systematically evaluate parasites from recent and ongoing clinical trials in Uganda and Burkina Faso to identify associations between candidate mutations and clinical responses to ACTs. We further hypothesize that increasing use of ACTs will select for parasites with decreasing drug sensitivity, but also decreased fitness. To test this hypothesis, we will search for associations between treatment outcomes and in vitro measures of drug sensitivity and fitness. We will also study parasites with introduced mutations to test the impact of these alterations on in vitro measures of drug sensitivity and fitness. Our specific aims will be (1) to identify genotypes associated with decreased responses to ACTs in Africa, (2) to assess the parasitological consequences of increasing resistance to ACTs, and (3) to characterize the specific impacts of parasite polymorphisms on drug sensitivity and fitness. Our studies will offer important insights into mechanisms of resistance to the most important new antimalarial regimens. They will also have direct practical relevance, as they will identify molecular markers of resistance to key regimens, offer an [unreadable]early warning system[unreadable] for resistance by studying genotypes of parasites that emerge soon after treatment, and provide insight into the fitness consequences of increasing resistance.
2023-11-09T01:26:58.646260
https://example.com/article/1105
In vitro investigation on the magnetic thermochemotherapy mediated by magnetic nanoparticles combined with methotrexate for breast cancer treatment. Cancer comprehensive treatment has been fully recognized as it can provide an effective multimodality approach for fighting cancers. In therapeutic oncology, hyperthermic adjuvant chemotherapy termed as thermochemotherapy plays an increasing role in multimodality cancer treatment. Currently, targeted nanothermotherapy is one of the effective hyperthermia approach based on magnetic nanoparticles (MNPs), which can be achieved by applying biocompatible nanoscaled metallic particles that convert electromagnetic energy into heat, for instance, magnetic fluid hyperthermia (MFH) mediated by superparamagnetic iron oxide nanoparticles (SPIONs). Upon exposure under alternative magnetic field (AMF), SPIONs can generate heat through oscillation of their magnetic moment. Nowadays, clinical trials at phase II are now under investigations for MFH on patients in Germany and Japan and demonstrate very inspiring for cancer therapy. In this work we explore the feasibility and effectiveness of magnetic thermochemotherapy mediated by magnetic nanoparticles combined with methotrexate, an anti-cancer drug, for breast cancer comprehensive treatment. Amino silane coated MNPs as agent of MFH were prepared by the chemical precipitation method. Physiochemical characterizations on MNPs have been systematically carried out by various instrumental analyses. Inductive heating property of the MNPs was evaluated by monitoring the temperature increase of the MNPs suspension under AMF. The in-vitro cytotoxicity results on human breast cancer cell MCF-7 by CCK-8 assay indicated the bi-modal cancer treatment approach for combined MFH and chemotherapy is more effective than mono-modal treatment, indicating a thermal enhancement effect of hyperthermia on drug cytocoxicity. The magnetic thermochemotherapy mediated by MNPs combined with methotrexate can realize cancer comprehensive treatment thus has great potential in clinical application.
2023-08-21T01:26:58.646260
https://example.com/article/6437
Q: Send an android Intent with an POJO as an Intent extra? Is their a way to put a POJO inside the intent.putExtra? I have looked into the API's and it only seems to support of type string, int, double, boolean etc but not a actual POJO/regular java object. A: You can use a POJO as long as it implements Serializable or Parcelable. Take a look at intent.putExtra(String, Serializable) or intent.putExtra(String, Parcelable). A: You can pass them intent.putExtra(String, Serializable) intent.putExtra(String, Parcelable) Also don't forget how to get them obj = intent.getParcelableExtra(String) obj = intent.getSerializableExtra(String) Better implement Parceable because it's CPU faster.
2024-06-20T01:26:58.646260
https://example.com/article/5707
india Updated: Jun 23, 2019 11:06 IST Prime Minister Narendra Modi has sanctioned a grant of Rs 30 lakh for the treatment of Lalit, a girl suffering from aplastic anemia. Her father had written to him seeking help for her treatment. “I want the government to help my daughter in getting the treatment. I have sold my land. My house is mortgaged. I have spent Rs 7 lakh on her treatment already. If she cannot be cured, I wished to die,” Sumer Singh told ANI here. However, responding to Singh’s plea, Modi’s office released the money from the Prime Minister’s National Relief Fund. “A hospital in Jaipur told me that she needed a bone marrow transplant from her brother to survive as hers had completely become useless. They told me the operation alone would cost around Rs 10 lakh,” he said. Aplastic anaemia is a condition that occurs when the body stops producing enough new blood cells. Aplastic anemia leaves a person at higher risk of infections and uncontrolled bleeding. (This story has been published from a wire agency feed without modifications to the text. Only the headline has been changed.)
2023-10-15T01:26:58.646260
https://example.com/article/8304
Tuesday, June 28, 2011 Jenny has two women whom she was taught to call "mommy", although only one really is. Jenny has a father in Boston who has laughing blue eyes and a beard. She will never know this, however because he will always be just "donor" to her. She imagines he was a spy captured by enemy soldiers and that's why he never comes to see her. In fact, he makes people happy playing beautiful music on the piano. Jenny will never take piano lessons because nobody knows how much she would love it if she had the opportunity. Jenny has a Father in heaven who loves her, and she loved Him too until she was taught that He didn't exist and that people who believed in Him were ignorant and hateful. Jenny's mother teaches her that in reality things are what you believe them to be and if you want happiness you have to envision it and the universe will send it to you. Any sadness Jenny has is her own fault because she's not trying hard enough. Jenny has a family history of colon cancer on her father's side, and since she doesn't know to get screening for it, it will probably kill her if she lives long enough. Jenny's father has an aunt who could teach Jenny how to make pierogi and dance a polka, and how to speak Polish, and tell her about her grandfather, who was descended from a duke. Jenny will never meet her. Jenny has a grandmother who lives in a nursing home. She wishes she had someone to visit her or a reminder that someone loved her. Jenny loves to draw and makes dozens and dozens of pictures of flowers that her "mommies" put on the fridge until they finally have to throw some out. Jenny has an "uncle" who likes to borrow her mother's clothes, and who teaches her what a male body is like. Her "mommies" want her to be free to explore sexuality. Jenny uses this to her advantage and becomes a very popular fifth grader. Jenny has a baby who loves her, whom she will never know. She's not sure whose it is, but since she is 13 and it might be her gym teacher's he takes her secretly to get an abortion. Jenny has a savior who died for her, whom she will never know. He sheds a tear for her as the nail pierces the flesh of His left hand. Monday, June 27, 2011 It is with disgust that I read this article about a "genderless" preschool in Sweden. According to the preschool: The taxpayer-funded preschool which opened last year in the liberal Sodermalm district of Stockholm for kids aged 1 to 6 is among the most radical examples of Sweden's efforts to engineer equality between the sexes from childhood onward. Breaking down gender roles is a core mission in the national curriculum for preschools, underpinned by the theory that even in highly egalitarian-minded Sweden, society gives boys an unfair edge. So, if they are to be believed they are trying to solve this "problem". But instead of encouraging people to value girls more, the solution they have decided upon is to remove the "advantage" by attempting to alter the nature of the children themselves. Some parents worry things have gone too far. An obsession with obliterating gender roles, they say, could make the children confused and ill-prepared to face the world outside kindergarten. "Different gender roles aren't problematic as long as they are equally valued," says Tanja Bergkvist, a 37-year-old blogger and a leading voice against what she calls "gender madness" in Sweden. Those bent on shattering gender roles "say there's a hierarchy where everything that boys do is given higher value, but I wonder who decides that it has higher value," she says. "Why is there higher value in playing with cars?" Which is exactly the question. Why should anyone think that playing with cars is better than playing house? I don't. Director Lotta Rajalin notes that Egalia places a special emphasis on fostering an environment tolerant of gay, lesbian, bisexual and transgender people. From a bookcase she pulls out a story about two male giraffes who are sad to be childless — until they come across an abandoned crocodile egg. Nearly all the children's books deal with homosexual couples, single parents or adopted children. There are no "Snow White," ''Cinderella" or other classic fairy tales seen as cementing stereotypes. Rajalin, 52, says the staff also try to help the children discover new ideas when they play. "A concrete example could be when they're playing 'house' and the role of the mom already is taken and they start to squabble," she says. "Then we suggest two moms or three moms and so on." Now we get to the real reason for this radical agenda - trying to teach children to accept the gay lifestyle. These children who quibble over the role of mom already being taken already understand something their "educators" have become to smart to understand - that a child actually has one mother and one father. Attempts to raise children genderless or reverse their gender roles in the past have all either failed or resulted in severe psychological trauma. That the state should approve wholesale experimentation on this scale is appalling. Saturday, June 25, 2011 There is an urban myth that at one time in our nation's history Congress legislated that the value of "pi" (3.14159265...) be changed to 3 to simplify computations involving trade goods. The Huffington Post cribbed the idea in a spoof last month. Of course, what makes these "funny" is that we understand that the government can't change nature, and so the true value of pi will always remain what it is and all that would be hurt by such legislation is the US economy. Such is the case with the legislation that Governor Cuomo signed into law yesterday. I know this has been posted in much more frequented blogs than mine, like The Curt Jester and Cleansing Fire, but it needs to be shouted form the rooftops, so here's my shout. Bishop Nicholas DiMarzio's statement regarding the passage of same-sex "marriage" legislation reads as follows (emphasis mine). Today, Governor Andrew Cuomo and the state legislature have deconstructed the single most important institution in human history. Republicans and Democrats alike succumbed to powerful political elites and have passed legislation that will undermine our families and as a consequence, our society. With this vote, Governor Cuomo has opened a new front in the culture wars that are tearing at the fabric of our nation. At a time when so many New Yorkers are struggling to stay in their homes and find jobs, we should be working together to solve these problems. However, the politicians have curried favor with wealthy donors who are proponents of a divisive agenda in order to advance their own careers and futures. What is needed in our state is leadership and not political gamesmanship. In light of these disturbing developments and in protest for this decision, I have asked all Catholic schools to refuse any distinction or honors bestowed upon them this year by the governor or any member of the legislature who voted to support this legislation. Furthermore, I have asked all pastors and principals to not invite any state legislator to speak or be present at any parish or school celebration. The above request is intended as a protest of the corrupt political process in New York State. More than half of all New Yorkers oppose this legislation. Yet, the governor and the state legislature have demonized people of faith, whether they be Muslims, Jews, or Christians, and identified them as bigots and prejudiced, and voted in favor of same-sex “marriage.” It is mystifying that this bill would be passed on the last day of an extended session under the cover of darkness. This issue has been framed as upholding marriage equality. This is not the case since one of the principal purposes of marriage is to bring new life into the world. This cannot happen in same-sex marriage. It is not a civil rights issue, but rather a human rights issue upholding the age-old understanding of marriage. Our political leaders do not believe their own rhetoric. If they did, how in good conscience could they carve out any exemption for institutions that would be proponents of bigotry and prejudice? Republicans and Democrats equally share responsibility for this ruinous legislation and we as Catholics should hold all accountable for their actions. Although I might add I don't find it "mystifying that this bill would be passed on the last day of an extended session under the cover of darkness" - I expect that. We've seen it from our pre-2010 Congress and current president often enough. Friday, June 24, 2011 A short while ago on plurk my friend Adoro started a discussion about zombies. My friend Christie posted her theory of zombies: Zombies are people who have succumbed to mortal sin. They are spiritually dead, devouring others in their selfish self gratification. They infect others and make more like themselves. We really are in a Zombie Apocalypse if you think about it ...which will be the topic of today's post. There are a lot of zombies out there. People who have given up their free will and mindlessly follow wherever their "natural" instincts lead them. From the idea that homosexuals are unable to control their impulses (and shouldn't try) and likewise for heterosexuals who are encouraged to "just do it." I think the attempts to redefine marriage in terms of sex instead of sacrifice are part of this zombie apocalypse. But of course zombies are only one kind of monster. What else is out there? There are vampires. Vampires are people who have sold their soul for the promise of eternal life on Earth. They kill young innocent human beings, taking their life's blood in order to keep themselves alive longer. Although embryonic stem cells have yet to add one minute to anyone's life, they are taken in the name of longevity, and are being used increasingly in ways to "help benefit" people, from vaccines to cosmetics to artificial flavor enhancers to lasers! Then there is Frankenstein's monster. He was created by Dr. Frankenstein, who took organs from executed criminals without consent. Monstrous, and yet we have it being used to support euthanasia in Belgium. Just as troubling are the presumed consent laws, which basically give the state de-facto ownership to use your body unless you "opt out" and, of course, unless they make a mistake or fail to find you on the list, etc. In those cases, you have no legal recourse but to be chopped up for the greater good. There's the werewolf. Once a month this person looses control of their body and becomes only partially human. Women today are encouraged to use "the pill", which interrupts their monthly cycle and suppresses one of the natural functions of the human body - the giving of life. Just like the werewolf slowly becoming less and less human, they lose their desire and desirability, and the ability to love and be loved, and perhaps risk their lives as well. Those were all the monsters I could think of. Feel free to chime in if I missed something important. Eugenics and IVF are staples of sci-fi distopian stories as well, but I'll leave them for another post, since they are not typically thought of in the "monster" category. Scarily, unlike the monsters in books, movies, and TV, these are all real world things. One other thing struck me as true about all the "traditional" monster stories. They are all afraid of the Catholic church, and can all be defeated by it. Some things never change. I find comfort in that. Saturday, June 18, 2011 I have to post this, even if it is only a link to another site. The excellent blog Mary Meets Dolly has this post about the "euthanasia coaster". According to the designer it is a roller coaster (I kid you not) that kills 24 humans at a time for "dealing with overpopulation or when your life becomes too long". And this is produced by a site called "science gallery". Makes me want to think about removing the word "science" from my degrees. Monday, June 13, 2011 What do Israeli feminists and Catholics have in common? Concerns about surrogate motherhood. From BioEdge: The Israeli feminist group Isha L’Isha has published a harshly critical report on surrogate motherhood. Israel was the first country to legalise surrogacy, in March 1996. But 15 years later, says Isha L’Isha, “insufficient data have, as yet, been gathered to enable full evaluation of this innovative social experiment.” “It is our belief that perceiving pregnancy and childbirth for another couple or individual solely as a financial business transaction is inappropriate and unthinkable. The fact that surrogacy is a complex relationship which might be fertile ground for harm and exploitation must be recognized, especially when private organizations with financial interests are allowed to become involved. We believe, that surrogacy in Israel should be prohibited. In the least, surrogacy must not be allowed to becomes an accepted, routine procedure, and should provide a solution only in rare, very extreme cases.” The report warns that surrogacy could easily become baby farming: “Objective utilization of identity-related aspects of the human body contradicts basic ethical values, and by nature, has high potential for exploitation and degradation. Surrogacy is an experimental procedure with great potential for harm, especially if it will become prevalent and accepted. The distance between heroically presenting a unique human gift to a childless couple and time spent on a ‘fertility farm,’ which uses human machines, is not large, and the ability to preserve this distance will diminish as surrogacy becomes more widespread and routine.” ~ Isha L’Isha, June 1 The newsletter from which this came, Isha L'Isha, listrs similar concerns about the egg donation side. Although the articles warn that surrogacy and egg donation "encourage" the commoditization of human life, the Church recognizes that surrogacy and egg donation in fact is the commoditization of human life, and contrary to the dignity of human beings. Wednesday, June 1, 2011 What do you do for backups? Until about four years ago most of my important data was on a Linux machine in a RAID array, and I periodically would just copy the whole thing to a separate disk. However, as the separate disk was in the same machine (this was in the days before USB external hard drives), a lightning strike could take the whole thing. Over the years I decided to go with an external USB hard drive, but it is a pain remembering to connect it periodically, and if you leave it connected, it can get fried with the machine. Then I got a Macbook. My initial thought was to back it up to the Linux box over the network, and do backups there all in one place, but NFS connections on the laptop are somewhat unreliable, and I would often find the darn thing hung trying to do a disk write over the network. I tried Time Machine, but I didn't like the way it worked. I don't want to keep all the old versions of stuff, I just want to be able to restore data. So I got a copy of SuperDuper! and it is very nice for backing up the laptop to an external disk. It's tech support is surly, but knowledgeable and I was happy with it for a number of years now. I also got a copy of Tuxera NTFS which lets my Macbook read/write external drives formatted for Windows. This makes interoperability of external drives between my Linux and Mac machines easier. Life was good. Then I decided off-site backups would be a good idea in case the house floods, burns down, etc. I looked at some of the online backup solutions. The one I went with in the end was SafeSync. The reason I chose it was price - unlimited backup storage for $60/year. Since then the price has gone way up, so unless you have very little data to be backed up it's not a good solution (nor is any online backup I've seen). I have also some problems with them. They have a browser-based backup solution for non supported machines, but it doesn't work from a browser under Linux (so all I can back up is the Macbook). Their software insists on backing up everything under a folder - no exceptions. Which means if I want all my iTunes data backed up I also have to backup my podcasts, which means backing up many MB each day that I really don't need to. In addition, the Java app that performs backups is a resource hog. I don't think other online solutions are as bad, but I'm not willing to invest the money to find out. So I found myself looking for a better backup solution that doesn't cost a fortune. Lifehacker suggests using multiple cloud services to get free online backups, but that is a headache, and still limited in storage size. I believe what I'm going to stick with is one of those fireproof safe boxes and keep my external drives in there. I know there are fireproof disk drives but they are more expensive than this solution, especially since I can use the fireproof safe for many drives.
2024-05-25T01:26:58.646260
https://example.com/article/8888
<button class="button is-success" (click)="openModal()">Add a new member</button> <div class="modal" [class.is-active]="modalOpen"> <div class="modal-background" (click)="closeModal()"></div> <div class="modal-content"> <div class="box"> <h1 class="title">{{'Add a new team member'|translate}}</h1> <br> <div *ngIf="errors && errors.length > 0"> <div class="message is-danger" *ngFor="let err of errors"> <div class="message-body"> {{err}} </div> </div> </div> <p class="control">Type in the user's email address below. The user <em>must already be registered</em> in the platform.</p> <form (ngSubmit)="submit()" #addUserForm="ngForm"> <div class="control"> <div class="control is-grouped"> <p class="control is-expanded"> <input type="email" class="input" name="email" placeholder="The user's email" [disabled]="loading" [(ngModel)]="email" autofocus required autocomplete="off"> </p> <span class="select"> <select name="role" [(ngModel)]="selectedRole" required> <option value="" disabled selected>{{'Select a role'|translate}}</option> <option *ngFor="let role of roles" value="{{role}}">{{role}}</option> </select> </span> </div> </div> <div class="control"> <button type="button" class="button" (click)="closeModal()" [disabled]="loading">{{'Cancel'|translate}}</button> <button type="submit" class="button is-success" [class.is-loading]="loading" [disabled]="!addUserForm.form.valid || loading">{{'Add'|translate}}</button> </div> </form> </div> </div> </div>
2024-06-24T01:26:58.646260
https://example.com/article/5758
Wootton, New Forest Wootton is a hamlet in the civil parish of New Milton in Hampshire, England. It is in the south of the New Forest. Overview Wootton is just north of the village of Bashley in the civil parish of New Milton, although the farmland and woodland to the north of Wootton is in the parish of Brockenhurst. Locally the hamlet is known principally for the Rising Sun public house. A popular local beauty spot is at nearby Wootton Bridge, where the road crosses the Avon Water. History The name Wootton derives from Old English for "wood farm". According to the Domesday Book, Wootton ("Odetune") was held by one Godric from the King before 1066, but by 1086, most of the estate had been placed under the New Forest. A Primitive Methodist chapel was erected in Wootton after a preacher visited the hamlet in 1843 and "converted a number of sinners . . . and formed a society of nine members." The chapel building still survives and is a red brick structure with a slate roof on Tiptoe Road. The two-storey brick building to the west of it was once a shop. In 1855 the population of Wootton is reported as including an inn-keeper for the Rising Sun, a shop-keeper, a schoolmistress, a post-office "receiver", a shoemaker, two blacksmiths, and two carpenters. In the 19th century Wootton had a Church of England village school, but this burned down in 1914, and a new school was built in nearby Tiptoe. The Rising Sun public house at Wootton has been on its present site for over two hundred years. The inn was rebuilt at the beginning of the 20th century, and it was described by one visitor in 1907 as "the best hostelry and the most moderate I have come across in England". Wootton was once entirely within the parish of New Milton, but in 1926 the land to the north of the hamlet was annexed into the civil parish of Rhinefield, which itself was eventually incorporated into the parish of Brockenhurst. References External links Category:Hamlets in Hampshire Category:New Forest
2024-03-21T01:26:58.646260
https://example.com/article/4216
Q: Can I use methods from my own files in an external framework that I added? I'm using the QuickDialog framework https://github.com/escoz/QuickDialog , which adds around 80 files to my project. In one of the files, I'd like to use one of the functions I wrote in my project. So, I have a method that I call like so: [ActivityImage getActivityImage:2]; When I head to the top of the file and add #import "ActivityImage+Functions.h" it tells me the file cannot be found. ActivityImage+Functions.h is a Category file. Is there some special way to import my own files into an external frameworks files? Thanks UPDATE To be more clear: In one of QuickDialogs files, specifically QLabelElement.m I want to add in one of the method calls I wrote in my project. The QuickDialog framework was added as a submodule to my project, I dragged in the QuickDialog .xcodeproj file, and then added as a Target Dependency for my project. I can #import files from the QuickDialog framework to my project files, but I can't go the other way. A: Sounds like you want to use Objective-C Categories. Add a header file in your own project called ActivityImage+MyStuff.h (note the +MyStuff can be something more appropriate): #import "ActivityImage.h" @interface ActivityImage (MyStuff) + (void)getActivityImage:(NSUInteger)someInteger; @end And the implementation file ActivityImage+MyStuff.m: #import "ActivityImage+MyStuff.h" @implementation ActivityImage + (void)getActivityImage:(NSUInteger)someInteger { // Whatever it does } @end and finally in the code you want to use the category in: #import "ActivityImage+MyStuff.h" [ActivityImage getActivityImage:2];
2024-05-05T01:26:58.646260
https://example.com/article/9187
A busca pelo corpo perfeito está cada vez mais intensa entre homens e mulheres de todo o mundo, todos querem atingir um padrão de beleza para se sentirem confiantes. Pensando em atender esse público, o Sinedrol virou o queridinho de quem busca por resultados rápidos e eficientes. Seja como for, a maioria das pessoas cansou de ter aquela “barriguinha” incômoda e quer conseguir defini-la, além de aumentar a massa magra ou muscular do corpo como um todo. Há diversas opções no mercado, de produtos considerados como “mágicos”, que prometem ajudar as pessoas a buscarem seus objetivos, mas que dificilmente trazem algum resultado positivo. Sendo assim, se você está cansado de tentar de tudo para ter o corpo ideal, recomendo um excelente produto que vem revolucionando o mercado fitness: o sinedrol. Você já ouviu falar sobre ele? Neste artigo, irei tratar para que serve o sinedrol, como ele age no organismo, como usar, como tomar, qual a composição desse medicamento e se ele funciona mesmo. Quer saber tudo sobre esse destruidor de gordura? Então não deixe de acompanhar este texto até o final! Sinedrol – Tudo o que você precisa saber sobre esse produto O que é o sinedrol? Para que serve? O sinedrol é um produto suplementar, em forma de cápsulas, que traz diversos benefícios ao organismo para quem deseja: Ganhar massa magra ou massa muscular de forma real Emagrecer (queimar gorduras de forma eficaz) Ganhar força muscular Conquistar definição muscular Esses são os principais benefícios proporcionados, que ainda pode trazer resultados positivos para controlar o apetite, para reduzir a compulsão por doces, para equilibrar as taxas de colesterol e evitar a diabetes. Enfim, são várias as funções desse suplemento, que traz benefícios ao organismo de uma forma geral, sempre focado no emagrecimento e no ganho de massa muscular. Composição do Sinedrol O sinedrol tem em sua composição mais de 14 substâncias, entre vitaminas, minerais e outros nutrientes, que são muito importantes, é bom para a saúde em geral e para o crescimento muscular, principalmente. Na composição do produto podem ser citados: Whey Protein (informações sobre o composto) BCAA Creatina Todos esses compostos base de suplementos para aumento da massa magra utilizados por frequentadores de academia. >>>Acesse o site do produto<<< Quer saber como tomar o Sinedrol? Por ser feito em cápsulas, o consumo é muito fácil e cada cápsula já vem dosada com uma quantidade certa, o que facilita o controle de quanto você está consumindo do produto diariamente. O ideal, no consumo do sinedrol, é que você tome duas cápsulas por dia, sendo uma ao acordar e outra cápsula 8 horas depois, diariamente. Você já começa a ver a diferença no espelho em poucos dias, aumentando sua confiança, disposição e energia diária. Ao mesmo tempo que você perde gordura, vai ganhando definição e massa magra, esculpindo o seu corpo dos sonhos. Sinedrol funciona mesmo? Uma dúvida muito comum em pessoas que estão buscando por produtos para emagrecer ou ganhar massa muscular e que ainda não o conhecem é saber se o sinedrol realmente funciona. Tudo o que eu posso dizer é que sim, é um produto que é confiável extremamente eficaz no que se propõe a realizar, já tendo ajudado inúmeras pessoas em todo o mundo. Para você que possui dúvidas sobre a eficácia desse produto, indico três locais em que é possível verificar depoimentos de quem já o utilizou e alcançou os resultados esperados e confirmar que o sinedrol funciona mesmo. O primeiro é o site oficial da empresa no Facebook, em que há diversas avaliações sobre ele feitas por quem já o consumiu e ver o antes e depois. Além disso, você pode acessar o site oficial do sinedrol e ver depoimentos reais de consumidores desse produto. A última dica é procurar sobre o sinedrol Reclame Aqui, de modo que você possa avaliar a confiabilidade dele no mercado. Além de tudo isso, o produto ainda possui dois importantes selos de qualidade que lhe passam confiabilidade: o da Anvisa e o da FDA. E mais, ele é seu aliado nos exercícios físicos! Você tem ganho de energia devido ao metabolismo estar mais acelerado, podendo realizar seu treino na academia e até mesmo uma pequena caminhada com mais eficiência, recebendo os resultados de forma mais rápida. Como comprar o sinedrol? Para comprar o suplemento, você o deve fazer por meio do site oficial da empresa , que é extremamente seguro contra roubos de informações dos clientes. É a forma mais rápida, segura e eficiente para ter o seu corpo definido sem deixar de lado a saúde, já que é um produto composto por vitaminas, minerais e outras substancias essenciais para o seu corpo funcionar bem e acelerar o metabolismo. No site, você poderá encontrar preços promocionais para a compra de apenas um produto, de três e de cinco. Assim, é possível comprar: 1 pote de sinedrol com 60 cápsulas por R$ 127,00 com 60 cápsulas por R$ 127,00 3 potes de sinedrol com 60 cápsulas cada um por R$ 317,00 com 60 cápsulas cada um por R$ 317,00 5 potes de sinedrol com 60 cápsulas cada um por R$ 467,00 Desse modo, é possível comprar vários potes de uma vez com um bom abatimento sobre o valor unitário, o que vale muito a pena para o seu bolso! Esse produto é um investimento para sua saúde e bem estar, afinal, quem não quer elevar a autoestima e poder usar qualquer roupa sem culpa? Essa composição está mudando a vida das pessoas, e o melhor é que não faz mal a saúde! Nós sabemos da dificuldade que é ganhar massa magra e perder peso, e assim atingir o corpo que tanto buscamos, mas com uma vida mais ativa e a suplementação correta, é possível conseguir resultados de forma muito mais rápida. Conclusão – Sinedrol é bom? Como você viu, é um produto natural, encapsulado, voltado para quem deseja emagrecer e ganhar massa muscular, em busca do corpo perfeito. Ao contrário de centenas de outros produtos vendidos por aí, o sinedrol é realmente eficaz, e isso é comprovado pelas avaliações muito positivas de quem já o consumiu, além dos selos de qualidade Anvisa e FDA, que estão apenas em produtos de eficacia garantida e que não agridem a saúde do consumidor. Sendo assim, não perca tempo e compre hoje mesmo, com preço promocional, pelo site oficial >>>Quero comprar o produto agora!<<< Gostou do artigo de hoje sobre o sinedrol? Se você ficou com alguma dúvida sobre esse assunto, escreva-a abaixo nos comentários para que eu possa ajudá-lo.
2024-04-20T01:26:58.646260
https://example.com/article/5528
Q: How to create a table from entity in Doctrine 2 I see similar questions at SO, but they are outdated and no longer actual. So, what I want is to create tables in database using models definition. So, I have a model which looks like so: <?php namespace Tests\Integration\Models; /** * @Entity * @Table(name="test_model") */ class TestModel { /** * @Id @Column(type="integer") * @GeneratedValue */ protected $id; /** @Column(type="integer") */ protected $a; public function getId() { return $this->id; } public function getA() { return $this->a; } public function setA($a) { $this->a = $a; } } In my unit-test I have a working code, looking like: <?php namespace Tests\Integration; use PHPUnit\Framework\TestCase; use Doctrine\ORM\EntityManager; use Doctrine\ORM\Tools\Setup; use Tests\Integration\Models\TestModel; use Tests\Integration\Models\TestModelRepository; final class IntegrationOrmTest extends TestCase { protected static $em; protected static $er; public static function setUpBeforeClass() { $params = [ 'driver' => getenv("TEST_DB_DRIVER"), 'host' => getenv("TEST_DB_HOST"), 'dbname' => getenv("TEST_DB_NAME"), 'user' => getenv("TEST_DB_USER"), 'password' => getenv("TEST_DB_PASSWORD"), 'port' => getenv("TEST_DB_PORT"), ]; $config = Setup::createAnnotationMetadataConfiguration(["./Models"], true); self::$em = EntityManager::create($params, $config); self::$er = new TestModelRepository(self::$em); } public function testEquals() { //works perfectly fine $data = new TestModel(); $data->setA(123); self::$er->save($data); self::$em->flush(); $this->assertTrue(true); } } This code works, just because in my database there is already a table test_model. But I want to create it dynamically in my test suit and destroy it after all tests. How can I do it programmatically? A: The Doctrine docs describe schema generation in some detail. Here is a simple example: final class IntegrationOrmTest extends TestCase { public static function setUpBeforeClass() { $params = [ 'driver' => "pdo_mysql", 'host' => "localhost", 'dbname' => "s43x", 'user' => "impd", 'password' => "JalenHurts", //'port' => getenv("TEST_DB_PORT"), ]; $config = Setup::createAnnotationMetadataConfiguration(["./Models"], true); self::$em = $em = EntityManager::create($params, $config); $tool = new \Doctrine\ORM\Tools\SchemaTool($em); $classes = array( $em->getClassMetadata(TestModel::class), ); $tool->dropSchema($classes); // Empty out any current schema $tool->createSchema($classes);
2024-04-09T01:26:58.646260
https://example.com/article/6378
/* * Copyright (C) 2012 Open Source Robotics Foundation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ #ifndef _GAZEBO_SENSORS_SENSORTYPES_HH_ #define _GAZEBO_SENSORS_SENSORTYPES_HH_ #include <vector> #include <memory> #include "gazebo/util/system.hh" #include "gazebo/common/EnumIface.hh" /// \file /// \ingroup gazebo_sensors /// \brief Forward declarations and typedefs for sensors namespace gazebo { /// \ingroup gazebo_sensors /// \brief Sensors namespace namespace sensors { class AltimeterSensor; class Sensor; class RaySensor; class CameraSensor; class LogicalCameraSensor; class MagnetometerSensor; class MultiCameraSensor; class DepthCameraSensor; class ContactSensor; class ImuSensor; class GpuRaySensor; class RFIDSensor; class RFIDTag; class SonarSensor; class ForceTorqueSensor; class GpsSensor; class Noise; class GaussianNoiseModel; class ImageGaussianNoiseModel; class WideAngleCameraSensor; class WirelessTransceiver; class WirelessTransmitter; class WirelessReceiver; /// \def AltimeterSensorPtr /// \brief Shared pointer to AltimeterSensor typedef std::shared_ptr<AltimeterSensor> AltimeterSensorPtr; /// \def SensorPtr /// \brief Shared pointer to Sensor typedef std::shared_ptr<Sensor> SensorPtr; /// \def RaySensorPtr /// \brief Shared pointer to RaySensor typedef std::shared_ptr<RaySensor> RaySensorPtr; /// \def CameraSensorPtr /// \brief Shared pointer to CameraSensor typedef std::shared_ptr<CameraSensor> CameraSensorPtr; /// \def MagnetometerSensorPtr /// \brief Shared pointer to MagnetometerSensor typedef std::shared_ptr<MagnetometerSensor> MagnetometerSensorPtr; /// \def MultiCameraSensorPtr /// \brief Shared pointer to MultiCameraSensor typedef std::shared_ptr<MultiCameraSensor> MultiCameraSensorPtr; /// \def DepthCameraSensorPtr /// \brief Shared pointer to DepthCameraSensor typedef std::shared_ptr<DepthCameraSensor> DepthCameraSensorPtr; /// \def WideAngleCameraSensorPtr /// \brief Shared pointer to WideAngleCameraSensor typedef std::shared_ptr<WideAngleCameraSensor> WideAngleCameraSensorPtr; /// \def ContactSensorPtr /// \brief Shared pointer to ContactSensor typedef std::shared_ptr<ContactSensor> ContactSensorPtr; /// \def ImuSensorPtr /// \brief Shared pointer to ImuSensor typedef std::shared_ptr<ImuSensor> ImuSensorPtr; /// \def GpuRaySensorPtr /// \brief Shared pointer to GpuRaySensor typedef std::shared_ptr<GpuRaySensor> GpuRaySensorPtr; /// \def RFIDSensorPtr /// \brief Shared pointer to RFIDSensor typedef std::shared_ptr<RFIDSensor> RFIDSensorPtr; /// \def RFIDTagPtr /// \brief Shared pointer to RFIDTag typedef std::shared_ptr<RFIDTag> RFIDTagPtr; /// \def SonarSensorPtr /// \brief Shared pointer to SonarSensor typedef std::shared_ptr<SonarSensor> SonarSensorPtr; /// \def ForceTorqueSensorPtr /// \brief Shared pointer to ForceTorqueSensor typedef std::shared_ptr<ForceTorqueSensor> ForceTorqueSensorPtr; /// \def GpsSensorPtr /// \brief Shared pointer to GpsSensor typedef std::shared_ptr<GpsSensor> GpsSensorPtr; /// \def NoisePtr /// \brief Shared pointer to Noise typedef std::shared_ptr<Noise> NoisePtr; /// \def GaussianNoisePtr /// \brief Shared pointer to Noise typedef std::shared_ptr<GaussianNoiseModel> GaussianNoiseModelPtr; /// \brief Shared pointer to Noise typedef std::shared_ptr<ImageGaussianNoiseModel> ImageGaussianNoiseModelPtr; /// \def WirelessTransceiverPtr /// \brief Shared pointer to WirelessTransceiver typedef std::shared_ptr<WirelessTransceiver> WirelessTransceiverPtr; /// \def WirelessTransmitterPtr /// \brief Shared pointer to WirelessTransmitter typedef std::shared_ptr<WirelessTransmitter> WirelessTransmitterPtr; /// \def WirelessReceiverPtr /// \brief Shared pointer to WirelessReceiver typedef std::shared_ptr<WirelessReceiver> WirelessReceiverPtr; /// \def AltimeterSensor_V /// \brief Vector of AltimeterSensor shared pointers typedef std::vector<AltimeterSensor> AltimeterSensor_V; /// \def Sensor_V /// \brief Vector of Sensor shared pointers typedef std::vector<SensorPtr> Sensor_V; /// \def RaySensor_V /// \brief Vector of RaySensor shared pointers typedef std::vector<RaySensorPtr> RaySensor_V; /// \def CameraSensor_V /// \brief Vector of CameraSensor shared pointers typedef std::vector<CameraSensorPtr> CameraSensor_V; /// \def MultiCameraSensor_V /// \brief Vector of MultiCameraSensor shared pointers typedef std::vector<MultiCameraSensorPtr> MultiCameraSensor_V; /// \def DepthCameraSensor_V /// \brief Vector of DepthCameraSensor shared pointers typedef std::vector<DepthCameraSensorPtr> DepthCameraSensor_V; /// \def ContactSensor_V /// \brief Vector of ContactSensor shared pointers typedef std::vector<ContactSensorPtr> ContactSensor_V; /// \def ImuSensor_V /// \brief Vector of ImuSensor shared pointers typedef std::vector<ImuSensorPtr> ImuSensor_V; /// \def GpuRaySensor_V /// \brief Vector of GpuRaySensor shared pointers typedef std::vector<GpuRaySensorPtr> GpuRaySensor_V; /// \def RFIDSensor_V /// \brief Vector of RFIDSensors typedef std::vector<RFIDSensor> RFIDSensor_V; /// \def RFIDTag_V /// \brief Vector of RFIDTags typedef std::vector<RFIDTag> RFIDTag_V; /// \def WirelessTransceiver_V /// \brief Vector of WirelessTransceiver typedef std::vector<WirelessTransceiver> WirelessTransceiver_V; /// \def WirelessTransmitter_V /// \brief Vector of WirelessTransmitter typedef std::vector<WirelessTransmitter> WirelessTransmitter_V; /// \def WirelessReceiver_V /// \brief Vector of WirelessReceiver typedef std::vector<WirelessReceiver> WirelessReceiver_V; /// \def LogicalCameraSensorPtr /// \brief Shared pointer to LogicalCameraSensor typedef std::shared_ptr<LogicalCameraSensor> LogicalCameraSensorPtr; /// \def SensorNoiseType /// \brief Eumeration of all sensor noise types enum SensorNoiseType { /// \internal /// \brief Indicator used to create an iterator over the enum. Do not /// use this. SENSOR_NOISE_TYPE_BEGIN = 0, /// \brief Noise streams for the Camera sensor /// \sa CameraSensor NO_NOISE = SENSOR_NOISE_TYPE_BEGIN, /// \brief Noise streams for the Camera sensor /// \sa CameraSensor CAMERA_NOISE = 1, /// \brief Noise streams for the GPU ray sensor /// \sa GpuRaySensor GPU_RAY_NOISE = 2, /// \brief GPS position latitude noise streams /// \sa GpsSensor GPS_POSITION_LATITUDE_NOISE_METERS = 3, /// \brief GPS position longitude noise streams /// \sa GpsSensor GPS_POSITION_LONGITUDE_NOISE_METERS = 4, /// \brief GPS position altitude noise streams /// \sa GpsSensor GPS_POSITION_ALTITUDE_NOISE_METERS = 5, /// \brief GPS velocity latitude noise streams /// \sa GpsSensor GPS_VELOCITY_LATITUDE_NOISE_METERS = 6, /// \brief GPS velocity longitude noise streams /// \sa GpsSensor GPS_VELOCITY_LONGITUDE_NOISE_METERS = 7, /// \brief GPS velocity altitude noise streams /// \sa GpsSensor GPS_VELOCITY_ALTITUDE_NOISE_METERS = 8, /// \brief Noise streams for the ray sensor /// \sa RaySensor RAY_NOISE = 9, /// \brief Magnetometer body-frame X axis noise in Tesla /// \sa MagnetometerSensor MAGNETOMETER_X_NOISE_TESLA = 10, /// \brief Magnetometer body-frame Y axis noise in Tesla /// \sa MagnetometerSensor MAGNETOMETER_Y_NOISE_TESLA = 11, /// \brief Magnetometer body-frame Z axis noise in Tesla /// \sa MagnetometerSensor MAGNETOMETER_Z_NOISE_TESLA = 12, /// \brief Vertical noise stream for the altimeter sensor /// \sa AltimeterSensor ALTIMETER_POSITION_NOISE_METERS = 13, /// \brief Velocity noise streams for the altimeter sensor /// \sa AltimeterSensor ALTIMETER_VELOCITY_NOISE_METERS_PER_S = 14, /// \brief IMU angular velocity X noise stream /// \sa ImuSensor IMU_ANGVEL_X_NOISE_RADIANS_PER_S = 15, /// \brief IMU angular velocity Y noise stream /// \sa ImuSensor IMU_ANGVEL_Y_NOISE_RADIANS_PER_S = 16, /// \brief IMU angular velocity Z noise stream /// \sa ImuSensor IMU_ANGVEL_Z_NOISE_RADIANS_PER_S = 17, /// \brief IMU linear acceleration X noise stream /// \sa ImuSensor IMU_LINACC_X_NOISE_METERS_PER_S_SQR = 18, /// \brief IMU linear acceleration Y noise stream /// \sa ImuSensor IMU_LINACC_Y_NOISE_METERS_PER_S_SQR = 19, /// \brief IMU linear acceleration Z noise stream /// \sa ImuSensor IMU_LINACC_Z_NOISE_METERS_PER_S_SQR = 20, /// \internal /// \brief Indicator used to create an iterator over the enum. Do not /// use this. SENSOR_NOISE_TYPE_END }; /// \} /// \brief SensorCategory is used to categorize sensors. This is used to /// put sensors into different threads. enum SensorCategory { // IMAGE must be the first element, and it must start with 0. Do not // change this! See SensorManager::sensorContainers for reference. /// \brief Image based sensor class. This type requires the rendering /// engine. IMAGE = 0, /// \brief Ray based sensor class. RAY = 1, /// \brief A type of sensor is not a RAY or IMAGE sensor. OTHER = 2, /// \brief Number of Sensor Categories CATEGORY_COUNT = 3 }; } } #endif
2023-09-01T01:26:58.646260
https://example.com/article/3987