text
stringlengths 8
5.77M
|
---|
Q:
Check for unique constraint violation
I have 2 fields on my entity that form a unique constraint: fieldA and fieldB, mapped to database columns field_a and field_b, respectively.
My input filter requires both of the fields:
public function init()
{
parent::init();
$this->add([
'name' => 'field_a',
'required' => true,
'allow_empty' => false,
]);
$this->add([
'name' => 'field_b',
'required' => true,
'allow_empty' => false,
]);
}
I am trying to figure out the best way to validate that those 2 fields are unique in the database table. The input filter will fail validation if there is already a different entity with those same field values.
I was thinking I would override the isValid function and put my custom logic in there.
A:
I would suggest to use callback validator ( Zend\Validator\Callback ) on both fields and put your custom logic in the callback function.
I would use InputFilter to add filters and validators to the form fields but you can implement InputFilterProviderInterface directly in the Form/Fieldset class.
use Zend\InputFilter\InputFilter;
class FormFilter extends InputFilter
{
public function __construct()
{
$this->add(
array(
'name' => 'field_a',
'filters' => array(),
'validators' => array (
array(
'name' => 'Zend\Validator\Callback',
'options' => array(
'messages' => array(
\Zend\Validator\Callback::INVALID_VALUE => 'Custom Message',
),
'callback' => array($this,'validateFieldA'),
),
),
)
)
);
$this->add(
array(
'name' => 'field_b',
'filters' => array(),
'validators' => array (
array(
'name' => 'Zend\Validator\Callback',
'options' => array(
'messages' => array(
\Zend\Validator\Callback::INVALID_VALUE => 'Custom Message',
),
'callback' => array($this,'validateFieldB'),
),
),
)
)
);
}
public function validateFieldA($value, $context)
{
// $value contains the field_a value
// $context['field_b'] contains the field_b value
// put your custom logic here
// return true if the fields are unique
// return false if the fields are not unique
}
public function validateFieldB($value, $context)
{
....
}
}
|
Live News
Kolkata court summons Shashi Tharoor over 'Hindu-Pakistan' remark
Saturday, 14 July 2018Kolkata-based advocate Sumeet Chowdhury, in his petition, said that Tharoor's comments had hurt religious sentiments of the countrymen, insulted the Constitution and that they were intended to create great conflict and disharmony based on the religious divide. |
Is Russia fuelling anti-NATO campaign in Ukraine?
According to the latest poll, in just three months some 10 per cent of Ukrainians have changed their mind about the country’s strategic plans to join NATO. At a recent summit, the alliance decided not to hand Ukraine a roadmap for entry, citing public opp
Ukraine’s authorities are doing little to reverse the trend. Most Ukrainians are wary of breaking ties with Moscow in order to join the block of former Cold War enemies.
Vadim Karasev, a political analyst, says Russia is behind the negative trend.
“When President Putin said that Russian missiles could be pointed at Ukraine, it made our people stop and think. Then these never-ending gas wars recurring yearly, and finally some statements that the Crimea is historically Russian land, which should be returned if NATO expands further,” he said.
Only a few believe NATO could bring economic prosperity and improve living standards in Ukraine.
The Democratic Initiatives Fund, a pro-western NGO campaigning for European integration, discovered in its latest opinion poll that the already small number of those wanting to join the alliance has fallen even more.
Along with this survey, the agency launched an information campaign aimed at rebuffing some of the stereotypes about NATO.
In leaflets they explain that the alliance did not start the war in Iraq, that Ukrainian soldiers will not fight there unless their government orders them to, and that relations with Russia will only get better should the country join the alliance. |
<!DOCTYPE html>
<html itemscope lang="en-us">
<head><meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta charset="utf-8">
<meta name="HandheldFriendly" content="True">
<meta name="MobileOptimized" content="320">
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"><meta name="generator" content="Hugo 0.57.2" />
<meta property="og:title" content="Marie Curie, Open Source, Kickstarter and Women in Tech" />
<meta name="twitter:title" content="Marie Curie, Open Source, Kickstarter and Women in Tech"/>
<meta itemprop="name" content="Marie Curie, Open Source, Kickstarter and Women in Tech"><meta property="og:description" content="Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie’s treatment of their work in the early 1900’s and today’s tech industry? I certainly didn’t… Join Mandy Whaley to explore how the Curie’s used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision." />
<meta name="twitter:description" content="Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie’s treatment of their work in the early 1900’s and today’s tech industry? I certainly didn’t… Join Mandy Whaley to explore how the Curie’s used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision." />
<meta itemprop="description" content="Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie’s treatment of their work in the early 1900’s and today’s tech industry? I certainly didn’t… Join Mandy Whaley to explore how the Curie’s used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision."><meta name="twitter:site" content="@devopsdays">
<meta property="og:type" content="talk" />
<meta property="og:url" content="/events/2018-austin/program/amanda-whaley/" /><meta name="twitter:creator" content="@DoDAustin" /><meta name="twitter:label1" value="Event" />
<meta name="twitter:data1" value="devopsdays Austin 2018" /><meta name="twitter:label2" value="Dates" />
<meta name="twitter:data2" value="May 3 - 4, 2018" /><meta property="og:image" content="https://www.devopsdays.org/img/sharing.jpg" />
<meta name="twitter:card" content="summary_large_image" />
<meta name="twitter:image" content="https://www.devopsdays.org/img/sharing.jpg" />
<meta itemprop="image" content="https://www.devopsdays.org/img/sharing.jpg" />
<meta property="fb:app_id" content="1904065206497317" /><meta itemprop="wordCount" content="113">
<title>Marie Curie, Open Source, Kickstarter and Women in Tech - devopsdays Austin 2018
</title>
<script>
window.ga=window.ga||function(){(ga.q=ga.q||[]).push(arguments)};ga.l=+new Date;
ga('create', 'UA-9713393-1', 'auto');
ga('send', 'pageview');
</script>
<script async src='https://www.google-analytics.com/analytics.js'></script>
<link href="/css/site.css" rel="stylesheet">
<link href="https://fonts.googleapis.com/css?family=Roboto+Condensed:300,400,700" rel="stylesheet"><link rel="apple-touch-icon" sizes="57x57" href="/apple-icon-57x57.png">
<link rel="apple-touch-icon" sizes="60x60" href="/apple-icon-60x60.png">
<link rel="apple-touch-icon" sizes="72x72" href="/apple-icon-72x72.png">
<link rel="apple-touch-icon" sizes="76x76" href="/apple-icon-76x76.png">
<link rel="apple-touch-icon" sizes="114x114" href="/apple-icon-114x114.png">
<link rel="apple-touch-icon" sizes="120x120" href="/apple-icon-120x120.png">
<link rel="apple-touch-icon" sizes="144x144" href="/apple-icon-144x144.png">
<link rel="apple-touch-icon" sizes="152x152" href="/apple-icon-152x152.png">
<link rel="apple-touch-icon" sizes="180x180" href="/apple-icon-180x180.png">
<link rel="icon" type="image/png" sizes="192x192" href="/android-icon-192x192.png">
<link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png">
<link rel="icon" type="image/png" sizes="96x96" href="/favicon-96x96.png">
<link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png">
<link rel="manifest" href="/manifest.json">
<meta name="msapplication-TileColor" content="#ffffff">
<meta name="msapplication-TileImage" content="/ms-icon-144x144.png">
<meta name="theme-color" content="#ffffff">
<link href="/events/index.xml" rel="alternate" type="application/rss+xml" title="DevOpsDays" />
<link href="/events/index.xml" rel="feed" type="application/rss+xml" title="DevOpsDays" />
<script src=/js/devopsdays-min.js></script></head>
<body lang="">
<nav class="navbar navbar-expand-md navbar-light">
<a class="navbar-brand" href="/">
<img src="/img/devopsdays-brain.png" height="30" class="d-inline-block align-top" alt="devopsdays Logo">
DevOpsDays
</a>
<button class="navbar-toggler" type="button" data-toggle="collapse" data-target="#navbarSupportedContent" aria-controls="navbarSupportedContent" aria-expanded="false" aria-label="Toggle navigation">
<span class="navbar-toggler-icon"></span>
</button>
<div class="collapse navbar-collapse" id="navbarSupportedContent">
<ul class="navbar-nav mr-auto"><li class="nav-item global-navigation"><a class = "nav-link" href="/events">events</a></li><li class="nav-item global-navigation"><a class = "nav-link" href="/blog">blog</a></li><li class="nav-item global-navigation"><a class = "nav-link" href="/sponsor">sponsor</a></li><li class="nav-item global-navigation"><a class = "nav-link" href="/speaking">speaking</a></li><li class="nav-item global-navigation"><a class = "nav-link" href="/organizing">organizing</a></li><li class="nav-item global-navigation"><a class = "nav-link" href="/about">about</a></li></ul>
</div>
</nav>
<nav class="navbar event-navigation navbar-expand-md navbar-light">
<a href="/events/2018-austin" class="nav-link">Austin</a>
<button class="navbar-toggler" type="button" data-toggle="collapse" data-target="#navbar2">
<span class="navbar-toggler-icon"></span>
</button>
<div class="navbar-collapse collapse" id="navbar2">
<ul class="navbar-nav"><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/keynotes">keynotes</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/proposals">proposals</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/location">location</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/schedule">schedule</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/registration">registration</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/sponsor">sponsor</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/contact">contact</a>
</li><li class="nav-item active">
<a class="nav-link" href="/events/2018-austin/conduct">conduct</a>
</li></ul>
</div>
</nav>
<div class="container-fluid">
<div class="row">
<div class="col-md-12"><div class = "row">
<div class = "col-md-5 offset-md-1">
<h2 class="talk-page">Marie Curie, Open Source, Kickstarter and Women in Tech</h2><br /><br /><br />
<span class="talk-page content-text">
<p>Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie’s treatment of their work in the early 1900’s and today’s tech industry? I certainly didn’t… Join Mandy Whaley to explore how the Curie’s used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision. Also, learn how Marie Curie also used a strategy similar to Kickstarter to raise funds to buy radium for her own research, and how all of these experiences and lessons can help us today.</p>
</span></div>
<div class = "col-md-3 offset-md-1"><h2 class="talk-page">Speaker</h2><h4 class="talk-page"><a href = "/events/2018-austin/speakers/amanda-whaley">
Amanda Whaley
</a></h4><a href = "https://twitter.com/mandywhaley"><i class="fa fa-twitter fa-2x" aria-hidden="true"></i> </a><br />
<span class="talk-page content-text"><p>Mandy Whaley is Director of Developer Experience & Developer Advocacy for Cisco DevNet. She spends most of her time thinking about how developers outside and inside of Cisco use Cisco APIs, and </p><a href = "https://www.devopsdays.org/events/2018-austin/speakers/amanda-whaley/">...</a></span>
</div>
</div><div class="row cta-row">
<div class="col-md-12"><h4 class="sponsor-cta">Happy Hour Sponsors</h4></div>
</div><div class="row sponsor-row"><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://www.victorops.com"><img src = "/img/sponsors/victorops-before-20180823.png" alt = "VictorOps" title = "VictorOps" class="img-fluid"></a>
</div></div><div class="row cta-row">
<div class="col-md-12"><h4 class="sponsor-cta">Lanyard Sponsors</h4></div>
</div><div class="row sponsor-row"><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.scalyr.com"><img src = "/img/sponsors/scalyr.png" alt = "Scalyr" title = "Scalyr" class="img-fluid"></a>
</div></div><div class="row cta-row">
<div class="col-md-12"><h4 class="sponsor-cta">Community Leader Sponsors</h4><a href = "/events/2018-austin/sponsor" class="sponsor-cta"><i>Join as Community Leader Sponsor!</i>
</a></div>
</div><div class="row sponsor-row"><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.scalyr.com"><img src = "/img/sponsors/scalyr.png" alt = "Scalyr" title = "Scalyr" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.appdynamics.com/"><img src = "/img/sponsors/appdynamics-before-20190121.png" alt = "AppDynamics" title = "AppDynamics" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://www.opsgenie.com"><img src = "/img/sponsors/opsgenie.png" alt = "OpsGenie" title = "OpsGenie" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://ns1.com"><img src = "/img/sponsors/ns1.png" alt = "ns1" title = "ns1" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.servicenow.com/"><img src = "/img/sponsors/servicenow-before-20180620.png" alt = "ServiceNow" title = "ServiceNow" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.xmatters.com/"><img src = "/img/sponsors/xmatters.png" alt = "xMatters, Inc" title = "xMatters, Inc" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.sonatype.com/"><img src = "/img/sponsors/sonatype-before-20190121.png" alt = "Sonatype" title = "Sonatype" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.contrastsecurity.com/"><img src = "/img/sponsors/contrast_security.png" alt = "Contrast Security" title = "Contrast Security" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://developer.cisco.com/"><img src = "/img/sponsors/ciscodevnet.png" alt = "ciscodevnet" title = "ciscodevnet" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://chef.io"><img src = "/img/sponsors/chef.png" alt = "Chef Software, Inc" title = "Chef Software, Inc" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://www.cloudbees.com/"><img src = "/img/sponsors/cloudbees.png" alt = "cloudbees" title = "cloudbees" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.redhat.com"><img src = "/img/sponsors/redhat-before-20190528.png" alt = "Red Hat, Inc" title = "Red Hat, Inc" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://striveconsulting.com/"><img src = "/img/sponsors/striveconsulting.png" alt = "striveconsulting" title = "striveconsulting" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.cloudautomationsolutions.com/"><img src = "/img/sponsors/cloudautomationsolutions.png" alt = "cloudautomationsolutions" title = "cloudautomationsolutions" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.sumologic.com/"><img src = "/img/sponsors/sumologic-before-20181203.png" alt = "SumoLogic" title = "SumoLogic" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://www.praecipio.com"><img src = "/img/sponsors/praecipio.png" alt = "Praecipio" title = "Praecipio" class="img-fluid"></a>
</div><div class = "col-lg-1 col-md-2 col-4">
<a href = "https://www.riverbed.com/"><img src = "/img/sponsors/riverbed.png" alt = "riverbed" title = "riverbed" class="img-fluid"></a>
</div></div><div class="row cta-row">
<div class="col-md-12"><h4 class="sponsor-cta">Media Sponsors</h4></div>
</div><div class="row sponsor-row"><div class = "col-lg-1 col-md-2 col-4">
<a href = "http://www.devops.com/"><img src = "/img/sponsors/devopsdotcom.png" alt = "2017-devopsdotcom" title = "2017-devopsdotcom" class="img-fluid"></a>
</div></div><br />
</div></div>
</div>
<nav class="navbar bottom navbar-light footer-nav-row" style="background-color: #bfbfc1;">
<div class = "row">
<div class = "col-md-12 footer-nav-background">
<div class = "row">
<div class = "col-md-6 col-lg-3 footer-nav-col">
<h3 class="footer-nav">@DEVOPSDAYS</h3>
<div>
<a class="twitter-timeline" data-dnt="true" href="https://twitter.com/devopsdays/lists/devopsdays" data-chrome="noheader" height="440"></a>
<script>
! function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0],
p = /^http:/.test(d.location) ? 'http' : 'https';
if (!d.getElementById(id)) {
js = d.createElement(s);
js.id = id;
js.src = p + "://platform.twitter.com/widgets.js";
fjs.parentNode.insertBefore(js, fjs);
}
}(document, "script", "twitter-wjs");
</script>
</div>
</div>
<div class="col-md-6 col-lg-3 footer-nav-col footer-content">
<h3 class="footer-nav">BLOG</h3><a href = "https://www.devopsdays.org/blog/2019/05/10/10-years-of-devopsdays/"><h1 class = "footer-heading">10 years of devopsdays</h1></a><h2 class="footer-heading">by Kris Buytaert - 10 May, 2019</h2><p class="footer-content">It’s hard to believe but it is almost 10 years ago since #devopsdays happened for the first time in Gent. Back then there were almost 70 of us talking about topics that were of interest to both Operations and Development, we were exchanging our ideas and experiences `on how we were improving the quality of software delivery.
Our ideas got started on the crossroads of Open Source, Agile and early Cloud Adoption.</p><a href = "https://www.devopsdays.org/blog/"><h1 class = "footer-heading">Blogs</h1></a><h2 class="footer-heading">10 May, 2019</h2><p class="footer-content"></p><a href="https://www.devopsdays.org/blog/index.xml">Feed</a>
</div>
<div class="col-md-6 col-lg-3 footer-nav-col">
<h3 class="footer-nav">CFP OPEN</h3><a href = "/events/2019-campinas" class = "footer-content">Campinas</a><br /><a href = "/events/2019-macapa" class = "footer-content">Macapá</a><br /><a href = "/events/2019-shanghai" class = "footer-content">Shanghai</a><br /><a href = "/events/2019-recife" class = "footer-content">Recife</a><br /><a href = "/events/2020-charlotte" class = "footer-content">Charlotte</a><br /><a href = "/events/2020-prague" class = "footer-content">Prague</a><br /><a href = "/events/2020-tokyo" class = "footer-content">Tokyo</a><br /><a href = "/events/2020-salt-lake-city" class = "footer-content">Salt Lake City</a><br />
<br />Propose a talk at an event near you!<br />
</div>
<div class="col-md-6 col-lg-3 footer-nav-col">
<h3 class="footer-nav">About</h3>
devopsdays is a worldwide community conference series for anyone interested in IT improvement.<br /><br />
<a href="/about/" class = "footer-content">About devopsdays</a><br />
<a href="/privacy/" class = "footer-content">Privacy Policy</a><br />
<a href="/conduct/" class = "footer-content">Code of Conduct</a>
<br />
<br />
<a href="https://www.netlify.com">
<img src="/img/netlify-light.png" alt="Deploys by Netlify">
</a>
</div>
</div>
</div>
</div>
</nav>
<script>
$(document).ready(function () {
$("#share").jsSocials({
shares: ["email", {share: "twitter", via: 'DoDAustin'}, "facebook", "linkedin"],
text: 'devopsdays Austin - 2018',
showLabel: false,
showCount: false
});
});
</script>
</body>
</html>
|
0
$0.00
Piece Of Cake
A tea that tastes like cake. Comforting, warm, safe.
We stumbled on this blend on the way to something else entirely, but put it aside in a little bowl just sitting there saying "make me!" When we finally fleshed out the blend, this lovely concoction emerged. |
Oregon, Auburn swap spots in BCS
NEW YORK — Oregon and Auburn swapped spots atop the BCS standings and Boise State was passed again, this time by TCU.
The Ducks (8-0) moved into first place for the first time this season, which is interesting but not necessarily important. Auburn (9-0) grabbed the top spot last week, but Oregon caught up after beating Southern California 53-32, leaving the Tigers in second place.
The top two teams in the final BCS standings on Dec. 5 play in the championship game Jan. 10 in Glendale, Ariz. Right now, the Ducks and Tigers are in control of the title race.
Oregon is No. 1 in the two polls used in the standings and No. 2 according to the computer ratings. Auburn is first according to the computers and No. 2 among the voters of the Harris and coaches polls.
The other three unbeaten teams, TCU (9-0), Boise State (7-0) and Utah (8-0), are next in the standings, but they’ll need Oregon or Auburn to lose to even have a shot at playing for the national championship.
Boise State had been No. 3 for two weeks, but as the Broncos beat up on the soft part of their schedule, others are catching up — as expected. TCU jumped from fourth to third.
Utah, which plays TCU on Saturday, is fifth. Alabama is the highest rated one-loss team in sixth. With a game against rival Auburn to end the regular season and a possible Southeastern Conference title game, the defending national champion Crimson Tide (7-1) are definitely alive to repeat.
What are the chances the Tide returns to the national title game if it wins out?
“I don’t think it’s a slam dunk,” Palm said. “If forced to make a prediction now, I’d guess Alabama would go over undefeated Boise State or TCU, but I’m not operating under the assumption that would happen.”
Voters are giving more support than ever before to Boise State and TCU, and both are benefiting from some good non-conference victories that help their computer ratings. Those two factors could keep ‘Bama at bay, Palm said.
Still, the Broncos, Horned Frogs and Utes better watch their backs while they’re keeping an eye on each other.
After both won convincingly on the road, the Ducks and Tigers gained support in the polls and Boise State slid from second to third. The Broncos’ computer rating still lags behind in seventh.
Meanwhile, TCU’s No. 4 ranking in each poll, plus a third-place rating in the computers, added up to the Horned Frogs moving up.
The Broncos, Horned Frogs and Utes are all trying to become the first team from a non-automatic qualifying conference to reach the BCS title game.
TCU at Utah will likely eliminate one of those Mountain West Conference teams from BCS contention all together.Boise State’s toughest tests the rest of the way in the Western Athletic Conference should come from No. 25 Nevada (7-1), Hawaii (7-2) and Fresno State (5-2). One loss would finish the Broncos’ BCS hopes.
The real race between the non-automatic qualifiers might be for that so-called BCS Buster bid — just like last season.One, and only one, of those teams can grab an automatic BCS bid by finishing in the top 12 in the final BCS standings.
Last year, TCU was highest rated and earned an automatic bid, but Boise State became the first team from a league without automatic entry to receive an at-large berth to one of the five big-money bowl games.
The Broncos and Horned Frogs were matched up in the Fiesta Bowl and Boise State won the battle of unbeatens in Arizona.
A similar scenario could play out this season with the winner of TCU-Utah or Boise State getting an automatic BCS bid and the other hoping to receive an at-large invite. But that invite is far from a guarantee when big-name teams such as Wisconsin, Ohio State, Nebraska and Oklahoma could also be available to bowl organizers.
“I’m not optimistic we’ll see two non-majors this year,” Palm said.
The other twist this season is the automatic bid would be a spot in the Rose Bowl if Oregon wins the Pac-10 and plays for the national championship.
The Rose Bowl is committed this season to taking the BCS Buster if it losses either the Pac-10 or Big Ten champs to the title game. |
(*
* This file is part of Coccinelle, licensed under the terms of the GPL v2.
* See copyright.txt in the Coccinelle source code for more information.
* The Coccinelle source code can be obtained at http://coccinelle.lip6.fr
*)
module Ast0 = Ast0_cocci
module Snap = Snapshot
module PG = Position_generator
(* ------------------------------------------------------------------------- *)
(* Returns snapshot that has both updated result (added rule with no stars)
* and updated disj_result (rule with stars).
*)
(* ------------------------------------------------------------------------- *)
(* TYPE HANDLER FUNCTIONS *)
type statement_dots_fn = Ast0.statement Ast0.dots -> Snap.t -> Snap.t
type string_fn = string Ast0.mcode -> Snap.t -> Snap.t
type statement_fn = Ast0.statement -> Snap.t -> Snap.t
type expression_fn = Ast0.expression -> Snap.t -> Snap.t
type ident_fn = Ast0.ident -> Snap.t -> Snap.t
type declaration_fn = Ast0.declaration -> Snap.t -> Snap.t
type field_fn = Ast0.field -> Snap.t -> Snap.t
(* ------------------------------------------------------------------------- *)
(* DISJUNCTION HANDLER *)
let ( >> ) f g x = g (f x)
(* given the components of a disjunction + functions to handle them + snapshot:
* returns new snapshot that has the disjunction added in the context rule.
* this may include splitting the rule and/or adding stars where appropriate.
*)
let handle_disj
~lp (* left parenthesis, string mcode *)
~rp (* right parenthesis, string mcode *)
~pipes (* separator pipes, string mcode list *)
~cases (* disjunction cases, 'a list *)
~casefn (* function to handle one disj case, 'a -> snapshot -> snapshot *)
~singlefn (* casefn for only one patch, same type as casefn *)
~strfn (* string mcode handler, string mcode -> snapshot -> snapshot *)
~at_top (* true: disj is the only thing so don't add another rule, bool *)
snapshot =
let index = Ast0.get_mcode_line lp in
let boollist = Snap.get_disj index snapshot in
let combined = List.combine cases boollist in
(* determine if all or none are patches *)
let all_same = function [] -> true | x :: xs -> List.for_all (( = ) x) xs in
(* true if multiple patch cases; ie. we want disjunction parentheses *)
let mult_stmt = List.length (List.filter (fun x -> x) boollist) <> 1 in
let casefn = if mult_stmt then casefn else singlefn in
(* keep the same positions if several disjunctions *)
let freeze_pos = if mult_stmt then Snap.do_freeze_pos else (fun x -> x) in
(* handle each disjunction case one at a time
* setmodefn is the function that sets the generation mode of the snapshot.
* tblist is a list of (disj case, whether it is a patch)
*)
let handle_cases set_modefn tblist pipes =
let rec handle_cases' tblist pipes fn =
match tblist, pipes with
| [(t,b)], [] ->
fn >> set_modefn b >> casefn t
| (t,b) :: ts, p :: ps ->
handle_cases' ts ps (fn >> set_modefn b >> casefn t >> strfn p)
| _ ->
assert false (* should be exactly one more stmt than pipes *) in
handle_cases' tblist pipes (fun x -> x) in
let disj =
(* CASE 1: all or none are patches or toplevel, no extra rule needed,
* always generate positions (unless we're in no_gen mode).
*)
if at_top || all_same boollist then begin
let handle_no_gen = handle_cases (fun _ y -> y) in
strfn lp >> handle_no_gen combined pipes >> strfn rp
end
(* CASE 2: only some are patches, generate extra rule (disj result) *)
else begin
(* if b is true, DO generate positions/stars and add to disj result *)
let set_add_disj b = Snap.set_no_gen (not b) >> Snap.set_disj_mode b in
let handle_do_gen = handle_cases set_add_disj in
Snap.init_disj_result
>> set_add_disj mult_stmt >> strfn lp
>> handle_do_gen combined pipes
>> set_add_disj mult_stmt >> strfn rp
>> set_add_disj true
end in
freeze_pos disj snapshot
(* ------------------------------------------------------------------------- *)
(* ENTRY POINT *)
(* These functions all return a snapshot that has the extra disjunction rule
* generated (if necessary) *)
(* The at_top flag means that the code is not surrounded by starrable
* components, ie. it should not be split into two rules. (it needs to be more
* accurate; see rule_body.ml)
*)
(* Returns snapshot that has added generated statement disjunction rule *)
let generate_statement ~stmtdotsfn ~strfn ~stmtfn ~stmt ~at_top =
(* inserts one position if in generation mode.
* We only want one position per disjunction case (since they all have the
* same metaposition), so just add position to first possible case.
*)
let sdotsfn sd snp =
let std_no_pos = List.fold_left (fun a b -> a >> stmtfn b) (fun x -> x) in
let rec std' l snp =
match l with
| [] -> assert false (* no disj patches with only unpositionable cases *)
| x::xs ->
(match PG.statement_pos x snp with
| Some (x, snp) ->
(Snap.set_no_gen true
>> std_no_pos (x::xs)
>> Snap.set_no_gen false) snp
| None -> std' xs (stmtfn x snp)) in
let add_pos_function = if Snap.no_gen snp then std_no_pos else std' in
add_pos_function (Ast0.unwrap sd) snp in
match Ast0.unwrap stmt with
| Ast0.Disj(lp, sdlist, pipes, rp) ->
handle_disj ~lp ~rp ~pipes ~cases:sdlist ~casefn:sdotsfn
~singlefn:stmtdotsfn ~strfn ~at_top
| _ -> failwith "only disj allowed in here"
(* Returns snapshot that has added generated expression disjunction rule *)
let generate_expression ~strfn ~exprfn ~expr ~at_top s =
(* inserts one position if in generation mode *)
let expposfn e snp =
if Snap.no_gen snp then
exprfn e snp
else
match PG.expression_pos e snp with
| Some (ee, snp) -> exprfn ee snp
| None -> failwith "no unpos cases" in
match Ast0.unwrap expr with
| Ast0.DisjExpr(lp, elist, pipes, rp) ->
handle_disj
~lp ~rp ~pipes ~cases:elist
~casefn:expposfn ~singlefn:expposfn ~strfn ~at_top s
| _ -> failwith "only disj allowed in here"
(* Returns snapshot that has added generated ident disjunction rule *)
let generate_ident ~strfn ~identfn ~ident ~at_top s =
(* inserts one position if in generation mode *)
let idposfn i snp =
if Snap.no_gen snp then
identfn i snp
else
let (i, snp) = PG.ident_pos i snp in
identfn i snp in
match Ast0.unwrap ident with
| Ast0.DisjId(lp, ilist, pipes, rp) ->
handle_disj
~lp ~rp ~pipes ~cases:ilist
~casefn:idposfn ~singlefn:idposfn ~strfn ~at_top s
| _ -> failwith "only disj allowed in here"
(* Returns snapshot that has added generated declaration disjunction rule *)
let generate_declaration ~strfn ~declfn ~decl ~at_top s =
(* inserts one position if in generation mode *)
let decposfn d snp =
if Snap.no_gen snp then
declfn d snp
else
match PG.declaration_pos d snp with
| Some (dd, snp) -> declfn dd snp
| None -> failwith "no unpos cases" in
match Ast0.unwrap decl with
| Ast0.DisjDecl(lp, dlist, pipes, rp) ->
handle_disj
~lp ~rp ~pipes ~cases:dlist
~casefn:decposfn ~singlefn:decposfn ~strfn ~at_top s
| _ -> failwith "only disj allowed in here"
(* Returns snapshot that has added generated declaration disjunction rule *)
let generate_field ~strfn ~fieldfn ~field ~at_top s =
(* inserts one position if in generation mode *)
let decposfn d snp =
if Snap.no_gen snp then
fieldfn d snp
else
match PG.field_pos d snp with
| Some (dd, snp) -> fieldfn dd snp
| None -> failwith "no unpos cases" in
match Ast0.unwrap field with
| Ast0.DisjField(lp, dlist, pipes, rp) ->
handle_disj
~lp ~rp ~pipes ~cases:dlist
~casefn:decposfn ~singlefn:decposfn ~strfn ~at_top s
| _ -> failwith "only disj allowed in here"
|
This invention relates to high definition televison, and in particular to the reception of signals transmitted over different types of transmission channels. The invention is particularly concerned with the reception of frequency multiplexed signals such as PAL or HD-PAL by a receiver designed for reception of time multiplexed signals such as MAC or HD-MAC.
It has been recognised that the introduction of a compatible television service provided via direct broadcasting satellites or other methods of delivering uses a PAL composite method of conveying the colour signal which is not directly compatible with MAC and its derivatives.
In the conventional PAL signal, luminance and colour signals are frequency multiplexed for transmission. By contrast, MAC signals are time multiplexed for transmission and, when separated, give a greater horizontal signal bandwidth than is available with PAL terrestrially broadcast signals. MAC gives an 8 MHz luminance bandwidth whereas PAL may only give 3.5 MHz useable luminance bandwidth at the output of a PAL decoder. By applying complex decoders to the PAL signal, up to 5.5 MHz may be derived.
If an HD-MAC signal were to be transmitted via PAL the additional frequencies derived in the HD-MAC decoder would not be useable because there would be a large gap in the middle of the spectrum. The reason for this is that for a still picture, horizontal frequencies up to 16 MHz are coded into an effective 8 MHz bandwidth by folding them about the 8 MHz frequency. The signal is unfolded in the HD-MAC decoder, and it is vital that the full 8 MHz bandwidth is available at the HD-MAC decoder. However, if the signal is constrained in the communication path such that, for example, 3.5 MHz is available in the luminance channel of the HD-MAC decoder, the unfolded spectral components are only present from 0 to 3.5 MHz and from 12.5 MHz to 16 MHz. In this case, the higher-frequency components are of no value in enhancing the resolution of the picture because of the gap in the middle of the spectrum. Components in the band 3.5 MHz to 7 MHz would, however considerably enhance the resolution of the picture. |
French Theory is no theory. It is a well-known fact that “Theory,” as in “French Theory,” is neither a theoretical endeavor nor a theoretical manifestation of thought. “Theory” as in “French Theory” has evidently little to do with Plato’s apex of human evolution: contemplation of the ideal form as such. In the Platonic sense, theory is the ultimate abstraction. And it is quite obvious that “French Theory” is almost never purely theoretical—and most often, even, is theoretical only by deduction and conclusion. With the significant exception of Alain Badiou (a defender of Platonism and therefore of theory, but quite a latecomer in the field) there is no theorist that would be at the same time a theoretician: Michel Foucault turned the history of philosophy, thought, and social behaviors into a basis for a philosophy of its own—actually, into a philosophy of his own. Roland Barthes was primarily a literary scholar and a semiologist, using signs to read texts and interpret the text of the world. Gilles Deleuze engaged with aesthetics, cinema, the history of philosophy, sciences, literature, and very often with specific bodies of text as basis for his own research. So did Jacques Derrida, whose writings were often in the margins of others, from Marx, to Artaud, to Husserl, to Nietzsche. Félix Guattari’s work emerged from psychoanalysis, and so did his collaboration with Deleuze. Hélène Cixous is a poetess of extraordinary vision, as well as a thinker. Jean-Luc Nancy, as well as Philippe Lacoue-Labarthe, and Jean-François Lyotard, have all very often used motives for their thinking and dealt with specific questions, issues, and moments. Julia Kristeva brings together psychoanalysis, linguistics, semiology, and literary criticism. And these are only a few striking examples, where no Platonic “Theory” is ever to be found. Quite the opposite.
French Theory is not French. Or rather, it does not want nor seek to be French. In fact, it most often deals with the outside: drawing from the massive influence of Marxian economics, Nietzschean philology, Freudian psychoanalysis, Husserlian phenomenology, Heideggerian metaphysics, and American post-Saussurean linguistics, the French thinkers that have been considered part of that group have always tried to deal with legacies coming from abroad (mainly the German-speaking world) and to have a point of view that would not be primarily French. They were addressing others, and not necessarily—or not exclusively—as French. Hélène Cixous’s writing is constantly infused by the contamination of many other languages; it is an impure language, whose purity only exists in its ability to weave all other idioms into its own transformed, poetic thread.
French Theory can only be understood as a twofold reflection: it is the reflection of French thinkers before these critical bodies of work coming from outside, and it is the reflection of non-French scholars (mostly American, and hence globalized) to those reflections, which were then built into bodies of works. Deductions and interrogations were turned into statements. French Theory was never French in the first place—what would have it meant for it to be French? And it certainly was not French eventually.
If French Theory is not French, and if it is no theory, if its very name is nothing but a lie and fake advertisement, perhaps we should let it all go. Let the French be French, and engage with the wide world; let their work be named otherwise (criticism?), let’s all do something else and not care about the French. And yet…
France is the only country—along with the United States—whose identity, at the very end, is primarily a project. The rises of the German nation, of the Italian nation, of the English nation, of the Spanish nation, of the Chinese nation, of the Russian nation, all have in common one thing: the “nation” defined as a community of people of the same blood (“jus sanguinis”), living on the same ground. Let us go back to the debate that took place in 1870 between Mommsen and Fustel de Coulanges: while the former held for a “Blut und Boden” conception of the nation, Fustel de Coulanges defined it rather as a spiritual community—leading to its famous definition by Ernest Renan’s as a “plebiscite that takes place every day.” It is therefore a project and projection that is reinvented permanently on the ground of public aspiration. Hence the French’s fascination for universalism: the Enlightenment, the Louvre, both Rousseau and Voltaire, Madame de Staël and Louise Michel, Sainte-Beuve and Proust, Sade and Bataille, Sartre and Lévi-Strauss. At its best, the greatness of the French project lies in an ability to think that what is human matters, in setting the stage for thinking about a conception of humankind larger than the individual, the social, or the national. It is the source of a considerable empowerment of thought—from the moment that, as Renan stated, a “plebiscite” takes place, those very grand ideas can be revised at every given moment. In that sense, the French thinkers considered to be part of French Theory were definitely part of that great lineage of French ambition. They wanted to get it right, and make it count.
Contemplation, in the Platonic sense, perhaps has not been their trademark—or at least not for most of them. What they have in common, however, is philology—this great Nietzschean concept, abstracted from ancient Greek criticism, and 19th-century German and French scholarship in ancient Greek and Roman studies. The legacy of philology, as Nietzsche defined it in 1875, is a capacity to “utilize [one’s] ant-like work to pronounce some opinion upon the value of life.” It comes from hard work, from all the material that one has gathered, and therefrom can make a limited and yet consequential statement on life. This is what every single such thinker has achieved. Furthermore, this “philology” as abstraction—even though it places an emphasis on the text that is to be read—equally moves away from it to embrace the broader spectrum of the universal. Philology is the theory of an immanent world leaning toward the possibility of its own transcendence. French Theory is theory in its philological state.
Therefore, it does not appear irrelevant to make a claim for “New French Theory.” “New French Theory:” under this heading not only falls the loosely called French “theorists,” or “thinkers” and “philosophers” who would happen to be French. “New French Theory” brings together a wide scope of scholars, thinkers, writers, philosophers—often all at the same time. They are French in the great sense of the word: the sense in which this is no identity but a perpetually challenged and imperative project. They are theoreticians in a philological sense, that is: those who have gathered so much book experience and personal knowledge that they can finally dare to speak. Some of them are barely thirty. Some a couple of years older. But they all have this outstanding ability to utilize their ant-like work to pronounce some opinion upon the value of life. They are French—their nation existing only in the spirit—they provoke theory, they offer new views in politics, art, literature, morals, life. And all these statements collected here have never, so far, been read in English. Everything here is new, published for the first time, and translated thanks to the generous support of the Cultural Services of the French Embassy in the United States. For it to truly be “New French Theory,” it requires to be read in American, to become the reflection of a reflection, and to be discovered as the manifestation of a daily plebiscite exploring who we are: every part of our identity, public or hidden, our dreams, our hopes, our statements, our secrets. Here it is.
The September Critics Page, “New French Theory,” is made possible with generous support from the Cultural Services of the French Embassy in the United States.
All texts, excluding Barbara Carnevali’s, Joachim Pissarro’s and Camille de Toledo’s, were translated from the French by Pedro Rodríguez. |
Q:
Bootstrap multiselect selectAll doesn't work with Knockout.js unless setTimeout is used
Apparently, Bootstrap multiselect has a limitation when using jQuery multiselect() with Knockout.js, so that if a multiselect dropdown is modified by code during a Knockout event (a click event, in the following example), then the code isn't applied.
The following example demonstrate it:
First, click the button on the left. You'll see that although options are created, they are not selected. You'd need another click to make them selected.
Then, click the button on the right. You'll see that options are both created and selected. I used a 1000 ms timeout, but it works with only 1 ms timeout as well.
My question: Is there a better way than a timeout to make selectAll() work?
var selectorVM = function () {
var self = this;
self.available = ko.observableArray([]);
self.selected = ko.observableArray([]);
self.init = function () {
self.initOptions();
self.selectAll();
};
self.initWithTimeout = function () {
self.initOptions();
self.selectAllWithTimeout();
};
self.initOptions = function () {
self.available([]);
self.available([
{ name: "option 1", value: 1},
{ name: "option 2", value: 2}
]);
};
self.selectAll = function () {
var $selector = $("#selector");
$selector.multiselect('selectAll', false);
$selector.multiselect('updateButtonText');
};
self.selectAllWithTimeout = function () {
setTimeout(self.selectAll, 1000);
};
}
var selectorVM = new selectorVM();
ko.applyBindings(selectorVM);
<script src="https://cdnjs.cloudflare.com/ajax/libs/knockout/3.4.2/knockout-min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-multiselect/0.9.15/js/bootstrap-multiselect.min.js"></script>
<link href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet"/>
<link href="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-multiselect/0.9.15/css/bootstrap-multiselect.css" rel="stylesheet"/>
<div>
<button class="btn btn-default" data-bind="click: init">Click to init dropdown, no timeout</button>
<button class="btn btn-default" data-bind="click: initWithTimeout">Click to init dropdown, with timeout</button>
</div>
<div>
<select id="selector"
class="form-control"
multiple="multiple"
data-bind="options: available,
optionsText: 'name',
optionsValue: 'value',
selectedOptions: selected,
multiselect: { includeSelectAllOption: true }">
</select>
</div>
A:
Your problem lies with code execution order. The built in KO options binding handler and the jQuery Multiselect plugin are both modifying the DOM, and the options handler probably executes after the multiselect function, so when you build the multiselect menu, there aren't yet any options for it to pick up. When you use setTimeout, even with a 1ms timeout, the function gets pushed to the end of the call stack and will execute when the current event loop has finished (see here for more details), so now it is executed after the options binding has finished. Ergo, it works.
However, that's not very pretty. It's never a good idea to perform DOM manipulation inside your view model. That's why custom binding handlers are a thing; to easily interact with DOM elements and keep your view models clean. Your code references a multiselect binding handler, but I don't see it in your post. If we create it (it's not complicated), we'll see we can make the menu work as expected. Your original issue was you were using the supplied binding handler as well as manipulating the DOM manually. You should just stick to the binding handler and it'll work fine. No timeouts needed.
With frameworks such as KO, as a general rule of thumb you should always only have to manipulate the data in your view model. KO should do the heavy lifting of updating the UI. Therefore, if you want to select all items, think about how this works: there's an observable array called selected where the ID's of the selected items are stored. So if you want to select all items, you only have to loop through all the available items, and push the ID's to the selected array. KO will take care of updating the UI for you. See the updated code snippet. I have created a separate button that calls the selectAll function, but you could of course just call selectAll in your init function if you wanted to.
var selectorVM = function () {
var self = this;
self.available = ko.observableArray([]);
self.selected = ko.observableArray([]);
self.init = function () {
self.initOptions();
};
self.initOptions = function () {
self.available([
{ name: "option 1", value: 1 },
{ name: "option 2", value: 2 }
]);
};
self.selectAll = function () {
self.available().forEach(function (opt) {
if (self.selected.indexOf(opt.value) === -1) {
self.selected.push(opt.value);
}
});
}
}
var selectorVM = new selectorVM();
ko.applyBindings(selectorVM);
<script src="https://cdnjs.cloudflare.com/ajax/libs/knockout/3.4.2/knockout-min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/js/bootstrap.min.js"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-multiselect/0.9.15/js/bootstrap-multiselect.min.js"></script>
<link href="https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css" rel="stylesheet"/>
<link href="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-multiselect/0.9.15/css/bootstrap-multiselect.css" rel="stylesheet"/>
<div>
<button class="btn btn-default" data-bind="click: init">Click to init dropdown, no timeout</button>
<button class="btn btn-default" data-bind="click: selectAll">Select all</button>
</div>
<div>
<select id="selector"
class="form-control"
multiple="multiple"
data-bind="options: available,
optionsText: 'name',
optionsValue: 'value',
selectedOptions: selected,
multiselect: { includeSelectAllOption: true }">
</select>
</div>
<p>Selected options in observable array:</p>
<ul data-bind="foreach: selected"><li data-bind="text: $data"></li></ul>
|
<div>
<div ng-if="!isCurrentInteractionLinear()">
<md-card class="oppia-editor-card-with-avatar oppia-mobile-collapsible-card">
<div class="oppia-editor-card-body">
<div class="state-hints-header-container oppia-mobile-collapsible-card-header" ng-click="toggleHintCard()">
<div class="state-hints-header" ng-if="EditabilityService.isEditableOutsideTutorialMode()">
<h3 class="oppia-exp-hints-card-header">Hints</h3>
<i class="fa fa-caret-down"
ng-if="!hintCardIsShown"
aria-hidden="true">
</i>
<i class="fa fa-caret-up"
ng-if="hintCardIsShown"
aria-hidden="true">
</i>
</div>
</div>
<div class="state-hints-content-container oppia-mobile-collapsible-card-content" ng-if="hintCardIsShown">
<div class="oppia-add-hint-button-container">
<div ng-if="EditabilityService.isEditableOutsideTutorialMode()">
<button type="button"
class="btn btn-primary oppia-add-hint-button protractor-test-oppia-add-hint-button"
ng-click="openAddHintModal()"
ng-disabled="StateHintsService.displayed.length >= 5">
<[getHintButtonText()]>
</button>
</div>
</div>
<div ng-if="StateHintsService.displayed.length > 0">
<!-- An HTML element marked ui-sortable should contain only one element,
and this element should have an ng-repeat defined on it. See the
ui-sortable documentation for more details. -->
<ul class="nav oppia-option-list nav-stacked nav-pills" role="tablist"
ui-sortable="HINT_LIST_SORTABLE_OPTIONS"
ng-model="StateHintsService.displayed">
<!-- Note that adding "track by $index" here seems to mess up the final
index in the stop() event handler. -->
<li ng-repeat="hint in StateHintsService.displayed"
ng-class="{'active': StateHintsService.getActiveHintIndex() === $index}"
class="oppia-rule-block oppia-sortable-hint oppia-prevent-selection">
<span class="oppia-hint-sort-handle"
ng-if="StateHintsService.displayed.length > 1"
ng-mousedown="changeActiveHintIndex(null)">
<picture ng-if="EditabilityService.isEditable()">
<source type="image/webp" ng-srcset="<[getStaticImageUrl('/general/drag_dots.webp')]>">
<source type="image/png" ng-srcset="<[getStaticImageUrl('/general/drag_dots.png')]>">
<img ng-src="<[getStaticImageUrl('/general/drag_dots.png')]>" width="10">
</picture>
</span>
<a ng-click="changeActiveHintIndex($index)"
class="oppia-rule-tab protractor-test-hint-tab"
ng-class="{'oppia-rule-tab-active': StateHintsService.getActiveHintIndex() === $index}">
<response-header index="$index"
summary="getHintSummary(hint)"
short-summary="getHintSummary(hint)"
is-active="$index === StateHintsService.getActiveHintIndex()"
on-delete-fn="deleteHint">
</response-header>
</a>
<div ng-if="StateHintsService.getActiveHintIndex() === $index">
<div class="oppia-editor-card-section protractor-test-hint-body-<[$index]>">
<hint-editor hint="hint"
index-plus-one="$index + 1"
on-save="onSaveInlineHint"
show-mark-all-audio-as-needing-update-modal-if-required="showMarkAllAudioAsNeedingUpdateModalIfRequired">
</hint-editor>
</div>
</div>
</li>
</ul>
</div>
</div>
</div>
</md-card>
</div>
</div>
<style>
state-hints-editor .state-hints-header-container {
padding: 0 30px;
}
state-hints-editor .state-hints-header {
align-content: center;
align-items: center;
display: flex;
justify-content: space-between;
padding: 30px 0 0;
}
state-hints-editor .oppia-exp-hints-card-header {
font-size: 18px;
}
state-hints-editor .state-hints-content-container {
padding: 15px 30px;
}
state-hints-editor .oppia-add-hint-button-container {
margin: 10px 0;
}
state-hints-editor .state-hints-header i {
display: none;
}
@media screen and (max-width: 768px) {
state-hints-editor .state-hints-header-container {
padding: 0;
}
state-hints-editor .state-hints-header {
padding: 18px 15px;
}
state-hints-editor .state-hints-header i {
display: block;
}
}
</style>
|
Q:
Direct proof that infinite product of copies of $\mathbb{Z}$ is not projective
It is well-known that the abelian group $$A = \prod_{n=1}^\infty \mathbb{Z}$$ is not free (see, for example this MO question), and that over a PID being free is equivalent to being projective (see here), but the latter uses the axiom of choice. Is there a direct way to see that $A$ is not projective in terms of the lifting property, ideally not using choice?
A:
Here is a proof that does not use the axiom of choice. Let $e_n\in A$ denote the sequence whose $n$th term is $1$ and all other terms are $0$; we take it as known that any homomorphism $A\to\mathbb{Z}$ which vanishes on each $e_n$ is $0$ everywhere (the standard proofs of this certainly do not use choice).
Suppose $A$ were projective. Let $F$ be the free group on the underlying set of $A$, and let $p:F\to A$ be the canonical epimorphism. Since $A$ is projective, there is a splitting $i:A\to F$. Now note that for each $a\in A$, there is a homomorphism $\pi_a:F\to\mathbb{Z}$ which takes a formal linear combination of elements of $A$ and gives you the coordinate of $a$. For any $x\in F$, there are only finitely many $a\in A$ such that $\pi_a(x)\neq 0$. In particular, there are only countably many $a\in A$ such that $\pi_a(i(e_n))\neq 0$ for some $n$. But since $\pi_a\circ i:A\to\mathbb{Z}$ vanishes iff it vanishes on each $e_n$, this means that $\pi_a\circ i=0$ for all but countably many $a$. This means that actually the image of $i$ is contained in the free group $G\subset F$ on a countable subset of $A$. But this $G$ is then countable, which is a contradiction since $A$ is uncountable.
(Here I implicitly used the fact that a countable union of finite sets is countable, which requires choice in general. However, the finite sets are finite subsets of $A$, and since it is possible to totally order $A$, we can use this to canonically biject each of the finite subsets with a finite ordinal and thus conclude that their union is countable.)
|
Plasminogen receptors: the sine qua non of cell surface plasminogen activation.
Localization of plasminogen and plasminogen activators on cell surfaces promotes plasminogen activation and serves to arm cells with the broad spectrum proteolytic activity of plasmin. Cell surface proteolysis by plasmin is an essential feature of physiological and pathological processes requiring extracellular matrix degradation for cell migration including macrophage recruitment during the inflammatory response, tissue remodeling, wound healing, tumor cell invasion and metastasis and skeletal myogenesis. Cell associated plasmin on platelets and endothelial cells is optimally localized for promotion of clot lysis. In more recently recognized functions that are likely to be independent of matrix degradation, cell surface-bound plasmin participates in prohormone processing as well as stimulation of intracellular signaling. This issue of Frontiers in Bioscience on Plasminogen Receptors encompasses chapters focusing on the kinetics of cell surface plasminogen activation and the regulation of plasminogen receptor activity as well as the contribution of plasminogen receptors to the physiological and pathophysiological processes of myogenesis, muscle regeneration and cancer. The molecular identity of plasminogen receptors is cell-type specific, with distinct molecular entities providing plasminogen receptor function on different cells. This issue includes chapters on the well studied plasminogen receptor functions. |
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef UI_GL_INIT_GL_INIT_EXPORT_H_
#define UI_GL_INIT_GL_INIT_EXPORT_H_
#if defined(COMPONENT_BUILD)
#if defined(WIN32)
#if defined(GL_INIT_IMPLEMENTATION)
#define GL_INIT_EXPORT __declspec(dllexport)
#else
#define GL_INIT_EXPORT __declspec(dllimport)
#endif // defined(GL_INIT_IMPLEMENTATION)
#else // defined(WIN32)
#if defined(GL_INIT_IMPLEMENTATION)
#define GL_INIT_EXPORT __attribute__((visibility("default")))
#else
#define GL_INIT_EXPORT
#endif
#endif
#else // defined(COMPONENT_BUILD)
#define GL_INIT_EXPORT
#endif
#endif // UI_GL_INIT_GL_INIT_EXPORT_H_
|
Stefan Bradl's period of enforced unemployment will be mercifully brief. Today, the Forward Racing team announced they had released him from his contract at his request, as the problems facing the team continue. Free from his contract, Bradl looks set to sign for the Gresini Aprilia squad for the rest of the season, replacing Marco Melandri.
Bradl has been caught up in a whirlwind of events since breaking his scaphoid at Assen. Two weeks later, at the Sachsenring, the German was in talks with the Forward Racing team to extend his contract to race the Open class Yamaha for the 2016 season. The day after the race in Germany, team owner Giovanni Cuzari was arrested on his return home to Ticino, Switzerland, on charges of corruption, money laundering and tax evasion. Because of the charges, the Swiss authorities seized the team's computers and financial administration, and froze their bank accounts. The arrest also prompted a number of sponsors to end their contracts, further endangering the future of the team. The team announced that they would not be competing at Indianapolis, and that they could also end up missing Brno.
All this uncertainty prompted Stefan Bradl to press for termination of his contract. The German was keen to find a new seat as quickly as possible, and secure his future in the series. With Aprilia still without a permanent replacement for Marco Melandri, who left the Gresini Aprilia squad after a miserable first eight races, Bradl is in a prime position to step into the the team. Rumors of a move by Bradl to Aprilia have been rumbling almost since the news that Forward were in problems, and have grown in strength in recent days. It now seems certain that Bradl will be stepping onto the Aprilia alongside Alvaro Bautista from Indianapolis onwards. That seat has temporarily been filled by current Aprilia test rider Michael Laverty.
Taking over the second seat at Aprilia also puts Bradl in the best possible position to secure the spot for 2016. Aprilia are known to be looking for a rider to help develop and race their brand new RS-GP due to make its debut next year. There have been rumors linking many names to that seat for 2016, including people such as Sam Lowes, but nothing concrete has so far emerged. Having Bradl on the Aprilia for 2015 puts him in the hot seat for next year.
Though the departure of Bradl will ease the financial burden on the Forward Racing team, it will also make things a little more difficult for them. Bradl was the team's big name rider who was appealing to sponsors. With temporary team boss Marco Curioni involved in searching for sponsors to help fund the remainder of the year, the departure of one of his biggest selling points is a blow. Just how big a blow remains to be seen.
So far, only Stefan Bradl has been released by the team, while Loris Baz remains under contract for the MotoGP squad, and Simone Corsi and Lorenzo Baldassari are still officially riders for the Moto2 team. Both Corsi and Baldassarri have been looking for options outside the team, but so far, the team has not released them from their contract. Corsi has had contact with the Italtrans squad, who could add the Italian to their current line up of Mika Kallio and Franco Morbidelli. As part of the VR46 riders academy, Baldassarri could be found a Moto2 ride under their umbrella. Nothing concrete has been settled for the two Italian riders yet, though.
Below is the press release from Forward Racing on Bradl:
Agreement reached between Forward Racing and Stefan Bradl
Forward Racing and Stefan Bradl have reached an agreement by mutual consent to terminate the contractual obligations between the German rider and the Swiss team.
This difficult decision – the result of an agreement between the parties - has been taken in front of the concrete possibility for the rider to continue his participation in the World Championship and to ensure and protect his sport activity and his interests.
Forward Racing agreed to free him from the next race scheduled on August 9 and wishes Stefan all the best in his future endeavors. |
A guerilla gardener in South Central LA | Ron Finley
Ron Finley plants vegetable gardens in South Central LA — in abandoned lots, traffic medians, along the curbs. Why? For fun, for defiance, for beauty and to offer some alternative to fast food in a community where “the drive-thrus are killing more people than the drive-bys.”‘ |
Diamond Hoppers Power Past Beavers, 7-0
August 11th, 2018
UTICA, Mich. – Kody Ruedisili smacked two home runs, tying a United Shore Professional Baseball League record, while right-handed pitcher Tanner Kiest tossed 7.0 strong innings, allowing three hits and struck out five to lead the Eastside Diamond Hoppers (18-18) past the Birmingham Bloomfield Beavers (20-18), 7-0, in front of a packed Jimmy John’s Field on Saturday night.
It’s Digging Awareness Week and MISS DIG 811 is here to help. Did you know that failure to call 811 before digging results in damage to a buried utility once every 6 minutes across the United States? #Call811 #KnowWhatsBelow |
Q:
Heroku - deploy app from another directory
I had the directory called A from which I deployed a Rails app to Heroku. Now, I moved this project on my localhost to another directory called B and from this B directory I would need to deploy the app to the origrinal Heroku app (to the same app where I deployed the code from A directory).
Is there any way to do that?
A:
You'll need to add the git repo url to B.
git remote add heroku git@heroku.com:YOURAPPNAME.git
and git push heroku master would work.
|
---
abstract: 'We propose analytical models that allow to investigate the performance of Long Range Wide Area Network (LoRaWAN) uplink in terms of latency, collision rate, and throughput under the constraints of the regulatory duty cycling, when assuming exponential inter-arrival times. Our models take into account sub-band selection and the case of sub-band combining. Our numerical evaluations consider specifically the European ISM band, but the analysis is applicable to any coherent band. Protocol simulations are used to validate the proposed models. We find that sub-band selection and combining have a large effect on the QoS experienced in a LoRaWAN cell for a given load. The proposed models allow for optimizing resource allocation within a cell given a set of QoS requirements and a traffic model.'
author:
- '[^1] [^2]'
bibliography:
- 'lora.bib'
title: 'Analysis of Latency and MAC-layer Performance for Class A LoRaWAN'
---
LoRa; LoRaWAN; LPWA; IoT; QoS; latency; duty cycle; low power; long range.
Introduction
============
Services utilizing communications between machines are expected to receive a lot of attention, such as health monitoring, security monitoring and smart grid services [@palattella2016internet]. These Internet of Things (IoT) services generate new demands for wireless networks. The spectrum of service scenarios in the IoT is wide and as a result the required quality of service (QoS) across IoT services is also wide. In some scenarios ultra high reliability is required, in others a low latency is required and supporting massive numbers of low-cost and low-complexity devices is still important issue. The devices can be served by the cellular networks and, specifically, by their M2M-evolved versions, such as Narrowband IoT (NB-IoT) [@wang2016primer]. However, there is a low-cost alternative for serving these devices using Low Power Wide Area (LPWA) networks that operate in unlicensed bands. The number of IoT devices connected by non-cellular technologies is expected to grow by 10 billions from 2015 to 2021 [@ericsson2016mobile]. It is therefore of interest to develop QoS models for the LPWA protocols in order to analyze which protocol is best suited for a given service.
Long Range Wide-area Network (LoRaWAN) is an emerging protocol for low-complexity wireless communication in the unlicensed spectrum using Long Range (LoRa) modulation. The scalability and capacity of LoRaWAN is investigated in [@mikhaylov2016analysis] where it is implicitly assumed that the inter-arrival times are fixed. In [@scaleBor] the scalability is evaluated in terms of goodput and network energy consumption. One of the key elements of LoRaWAN is the use of duty cycling in order to comply with the requirements for unlicensed operation. Duty cycling is imposed per sub-band by regulation and optionally also aggregated for all bands. It is the central factor that sets limitation on the throughput and the latency of the network. The limits of duty-cycled LoRaWAN are pointed out in [@adelantado2016understanding], but only aggregated duty cycle and fixed inter-arrival arrivals are considered.
The contribution of this paper is an analytical model of the LoRaWAN uplink (UL) that characterizes the performance, in terms of latency and collision rate, under the influence of regulatory and aggregated duty cycling, assuming exponential inter-arrival times. The obtained latency and collision rate results from the analysis are verified through simulation. We summarize the key features of LoRaWAN in Section \[sec:lora\]. A system model is presented in Section \[sec:model\] and analysed in Section \[sec:ana\]. Numerical results based on the analysis and simulation is shown in Section \[sec:eval\]. Concluding remarks are given in Section \[sec:conc\].
Long Range Wide Area Network {#sec:lora}
============================
LoRaWAN is a wireless communication protocol providing long range connectivity at a low bit rate. LoRaWAN is based on the LoRa modulation. LoRaWAN supports LoRa spreading factors 7 to 12. The overhead of a LoRaWAN message with a payload and no optional MAC command included is 13 bytes.
LoRaWAN defines a MAC layer protocol to enable low power wide area networks (LPWAN) [@loraspec20015]. A gateway serves multiple devices in a star topology and relays messages to a central server. LoRaWAN implements an adaptive data rate (ADR) scheme, which allows a network server to select both the data rate and the channels to be used by each node.
Three different classes (A, B and C) of nodes are defined in LoRaWAN. Class A has the lowest complexity and energy usage. All LoRaWAN devices must implement the class A capability. A class A device can receive downlink messages only in a receive window. There are two receive windows after a transmission in the uplink. The first window is scheduled to open 1 to 15 second(s) after the end of an uplink transmission with a negligible 20 ms margin of error. The second window opens 1 second after the end of the first.
LoRaWAN utilizes the industrial, scientific and medical (ISM) radio bands, which are unlicensed and subject to regulations in terms of maximum transmit power, duty cycle and bandwidth. The end-device also obeys a duty cycling mechanism called the aggregated duty cycle, which limits the radio emission of the device. An aggregated duty cycle of 100 % corresponds to the device being allowed to transmit at any time, but still in accordance with the regulatory duty cycling. The lowest aggregated duty cycle of 0 % means that the particular device turns off the transmissions completely.
System Model {#sec:model}
============
Consider $M$ devices connected to a single LoRaWAN gateway. Each device is assigned a spreading factor to use for transmission by a network server. We account for the interference through the collision model, where collision occurs when two or more devices try to transmit simultaneously in the same channel using the same spreading factor. We also consider a LoRa-only configuration, in this work, such that no interference from other technologies is present. Different spreading factors are considered to be entirely orthogonal. A fixed payload size is assumed. We further assume that all devices are class A and have successfully joined the network and transmit the messages without acknowledgement so that there are no downlink transmissions. Due to the absence of acknowledgements, retransmissions are not considered. Among all sub-bands, a device is given a subset of the sub-bands. Enumerate these sub-bands 1 through $c$. Let $n_i$, $i=1..c$ and $\delta_i$, $i=1..c$ be the number of channels and the duty-cycle[^3] in sub-band $i$, respectively. As described in the specifications [@loraspec20015] and in the source code of the reference implementation of a LoRa/LoRaWAN device[^4], the scheduling of a LoRaWAN transmission happens as follows:
1. A device waits until the end of any receive window.
2. A device waits for any off-period due to aggregated duty cycling.
3. A device checks for available sub-bands, i.e., ones that are not unavailable due to regulatory duty cycling:
1. A channel is selected uniformly randomly from the set of channels in all available sub-bands.
2. If there is no free sub-band, the transmission is queued in the first free sub-band. A random channel in that sub-band will be selected.
A transmission, limited by the duty cycle $\delta$, with a transmission period $T_\mathrm{tx}$ infers a holding period, which, including the transmission itself is given by: $$\begin{aligned}
\label{E:holdingtime}
T_\mathrm{hold} = T_\mathrm{tx} + T_\mathrm{tx}\left(\frac{1}{\delta}-1\right) = T_\mathrm{tx}\frac{1}{\delta}.\end{aligned}$$
The *service rate* is the inverse of the holding time, $\mu=\delta/T_\mathrm{tx}$. Sub-bands can have different duty cycles and in turn different service rates. Let $\lambda$ be the generation rate of packets for a device. When several sub-bands are defined for the device the sub-band for the next transmission is selected according to the step 3-a) and 3-b). We define *service ratio* $r_i$ as the fraction of transmissions carried out in the $i-$th sub-band.
Analytical Model {#sec:ana}
================
In this section the analytical models for latency and collision probability are presented.
Single Device Model: Latency {#S:analat}
----------------------------
The latency of a transmission is the time spent on processing, queueing, transmission of symbols, and propagation. Assuming that the time for processing and propagation are negligible, we have: $$\begin{aligned}
\label{E:totaldelay}
T_\mathrm{total} = T_\mathrm{tx} + T_\mathrm{w}.\end{aligned}$$
We model the wait for reception windows and aggregated duty cycling ( steps 1) and 2) ) as a single traffic shaping $M/D/1$ queue. The service rate of this $M/D/1$ queue is the slowest mean rate of service in step 1) and 2). For step 3), we model the regulatory duty cycling as an $M/D/c$ queue with heterogeneous servers, where each server corresponds to a sub-band. The waiting time $ T_\mathrm{w}$ for a transmission and the service ratio of each sub-band can then be found from queue theory.
The waiting time, $T_w$, due to regulatory duty-cycling can be calculated for asymmetric $M/D/c$ queue[^5] that models step 3) of the scheduling procedure, but as it is easier to model and compute on a $M/M/c$ queue relative to a $M/D/c$ queue, we use the rule of thumb that the waiting line of a symmetric $M/M/c$ queue is approximately twice that of an $M/D/c$ queue [@newoldmdc] to simplify our analysis. Our simulations show that this is a good approximation also for asymmetric queues.
The waiting time in sub-band $i$ is then: $$\begin{aligned}
\label{E:waitdelay}
T_{w_i} = \frac{p_{busy,all}}{(\sum^c_{i=1}\mu_i+\lambda)\cdot 2},\end{aligned}$$ where $p_{busy,all}$ is the Erlang-C probability that all servers are busy. The transmission latency in each band can then be found from Eq. . The mean latency is given as a weighted sum of the transmission latencies in each sub-band, where the weights are given by the service rate of each sub-band.
The fraction of transmissions in sub-band $i$, $\lambda_i$, is the product of the holding-efficiency of the sub-band (fraction of time it is held) and the service rate of the band throughout that period. Then the service ratio is: $$\begin{aligned}
\label{E:serviceratio}
r_i = \frac{\mu_i}{\lambda} \cdot({1-p_{i\mathrm{,idle}}}),\end{aligned}$$ where $p_{i\mathrm{,idle}}$ is the probability that the sub-band $i$ is idle. The service ratio can be expressed in short-hand forms for the two extreme cases of all sub-bands being available or busy all of the time. When all sub-bands are available at the time of a transmissionthe channel of transmission is selected uniformly from the set of all channels as per step 3-a): $$\begin{aligned}
\label{E:rlimit1}
\lim_{\lambda\rightarrow 0}(r_i) = \dfrac{n_i}{\sum_{j=1}^cn_j}.\end{aligned}$$
In the case that all sub-bands are unavailable at the time of a transmissionthe transmission is carried out in the next available sub-band as per step 3-b): $$\begin{aligned}
\label{E:rlimit2}
\lim_{\lambda\rightarrow \mu_c}(r_i) = \dfrac{\delta_i}{\sum_{j=1}^c\delta_j}.\end{aligned}$$
In order to describe $r_i$ between these extremes, we must find $p_{i\mathrm{,idle}}$. Hence, we wish to find the steady-state probabilities given a Markov model of the sub-band selection behaviour. For this purpose the model of a *jockeying*[^6] $M/M/c$ queue from [@generalJockey] has been adopted. The Markov model of the jockeying queue has a limited state space since, by definition, the difference in the number of queued transmissions in any two sub-bands may not be larger than one. This allows us to put up a matrix $\mathbf{A}$ containing all state transition probabilities, which can be used to evaluate the steady state probabilities, $\mathbf{P}$, by solving the linear system $\mathbf{A}\cdot\mathbf{P} = 0$. It also allows adoption of a Markov model for LoRaWAN device behaviour, which is step 3) in the sub-band selection, by introducing state transition probabilities based on the number of channels in each non-busy sub-band in $\mathbf{A}$.
The jockeying queue does has a limited state space. As in [@generalJockey] we approximate the model by making it finite by limiting the queue sizes to 1000. The model now allows us to compute the steady state probabilities of all states; Amongst them $p_{busy,all}$ and $p_{i\mathrm{,idle}}$. Then $T_{w_i}$ and $r_i$ can be calculated from Eq. and Eq. . Note that waiting times are lower for a jockeying queue than a regular queue. Hence applying the rule of thump for approximation of an $M/D/c$ queue from a $M/M/c$ queue on a $M/M/c:jockeying$ queue, will yield a *lower* latency approximation of the $M/D/c$ queue.
Multiple Devices Model: Collisions
----------------------------------
In this work we assume that no devices are making use of the optional acknowledgement feature of LoRaWAN. Hence there is no DL in the model and as another consequence no retransmissions occur upon collision.
It is empirically found in [@2017arXiv170404257M] that spreading factors are not orthogonal in practice and, due to capture effect, one transmission may be received successfully if the power of the wanted transmissions is sufficiently greater than the interfering one. Unfortunately, at present there is no model of capture effect in LoRaWAN and in this work, for simplicity, we assume that all channels and all SFs are orthogonal. When two or more transmissions happen in the same channel, using the same SF, at the same time, they collide. This means we can model the access scheme as multichannel ALOHA random access, as in [@mikhaylov2016analysis; @adelantado2016understanding; @augustin2016study]. Since there are 6 spreading factors defined for LoRaWAN, we have 6 sets of $n_i$ orthogonal Aloha-channels in sub-band $i$. The collision rate must be evaluated for each spreading factor.
We found the service ratios of each sub-band in Section \[S:analat\]. Since the number of devices, the transmission time for the spreading factor being evaluated and the mean inter arrival time are known, we can calculate the load within a sub-band. The load within the sub-band is spread uniformly over the channels allocated to that band. Hence the traffic load of M devices, in sub-band i, given $SF_{i,j}$ is $$\begin{aligned}
L(i,j) =\frac{\lambda\cdot r_i\cdot T_{\mathrm{tx,j}}\cdot M \cdot p_{\mathrm{SF}_{i,j}}}{n_i}\end{aligned}$$ where $p_{\mathrm{SF}_{i,j}}$ is the percentage of all devices $M$, which use the $j$’th spreading factor in sub-band $i$.
The collision probability is then $$\begin{aligned}
\label{E:colpr}
p_{\mathrm{col},i,j} = \exp\left({-2\cdot L(i,j)}\right).\end{aligned}$$ In the paper, only unacknowledged UL transmissions are considered. So DL limitations and retransmissions are not considered in this work. Therefore the outage is caused by collisions can be quantified by our model.
Performance Evaluation {#sec:eval}
======================
In this section the latency given by Eq. , the service ratios given by Eq. and the collision probability given by Eq. are evaluated numerically. The evaluation is done for SF 12 based on 125 kHz channels, 50 bytes payload, 13 bytes overhead, code rate 4 and preamble length $n_\mathrm{preamble}=8$. The latency including the transmission time and the waiting time due to regulatory duty cycling as a function of arrival rate are depicted in Fig. \[F:allSBlag\]. The latency is plotted for stand-alone usage of each sub-band (G to G4) and for two sub-band combinations (G+G1 and G+G2). The analytical approximation using Eq. for a heterogeneous $M/M/c$ queue provides a tight upper bound of the cases for the multiple sub-bands (G+G1 and G+G2) and a tight approximation for the single band cases. The latency obtained by the jockeying $M/M/c$ queue provides a lower approximation. The results show that lower latencies and higher capacities can be achieved for sub-bands with higher duty-cycles and combinations of bands with high duty-cycles.
![Latencies on all sub-bands and combinations of sub-bands. Results denoted *Upper* and *Lower* are calculated using ordinary $M/M/c$ model and jockeying model, respectively.[]{data-label="F:allSBlag"}](allSBlag){width=".95\columnwidth"}
The service ratios for the cases with combined sub-bands are plotted in Fig. \[F:SB1SB3col\]. We see that combining G with G1 and G2, respectively, leads to very different service ratios for the bands. G contains 15 channels and G1 contains just 3, but they have the same duty-cycle. The combination of G and G1 yields the service ratio limit $15/(15+3) = .834$ for G for low arrival rates, but since the duty-cycling is the same for the sub-bands we have the limit $.01/(.01+.01)$ for a high arrival rate. The consequence of the sub-band pairing becomes evident by the collision rates depicted in Fig. \[F:allSBcol\]. We see that the collision rate for G+G1 is larger than that of G alone or G+G2. This is due to the traffic not being spread equally on the channels for high arrival rates for G+G1. Since the limits of G+G2 are much closer, the load is spread more uniformly over the channels at high arrival rates and we see a drop in collision rate by adding the sub-band. Notice that the devices reach their capacities $\mu_c$ before the collision rate comes close to 1. In this way duty-cycling limits the collision rate for each band, allowing for more devices to share the band, but in practice arrivals beyond the capacity of each device would be dropped.
![Service ratios for G+G2 and G+G1.[]{data-label="F:SB1SB3col"}](SimAnaRatioSB1andSB3){width=".95\columnwidth"}
![Sub-band collision rates for 100 devices transmitting with SF$_{12}$.[]{data-label="F:allSBcol"}](SBcol100devs){width=".95\columnwidth"}
From Fig. \[F:allSBlag\] it seems that the sub-band with the highest duty-cycle, G4, is attractive as it delivers low latency even at very high loads. However, when collisions are taken into account, we see that the sub-band has a very high collision rate as it only contains a single sub-channel. On the other hand, the lowest duty-cycle is found in sub-band G2, which has relatively high latency even at low loads, but with a lower collision rate than G4.
![Effect of aggregated duty cycle on service ratios.[]{data-label="F:aggDC"}](SimAnaAggregatedDutyCycle){width=".95\columnwidth"}
In Fig. \[F:aggDC\] the service ratios for G+G4 with an aggregate duty cycle of 0.05 (equivalent to a service rate capacity of the $M/D/1$ queue is 0.0146) and an aggregate duty cycle of 0.075 (equivalent to 0.0219) are plotted. The introduction of the aggregated duty cycle ($M/D/1$ queue) was found to effect the regulatory duty cycle queue ($M/D/c$ queue) by the service capacity, which freezes the sub-band service ratios of the regulatory queue and limits the obtainable latency.
Concluding Remarks {#sec:conc}
==================
A model for evaluating the performance of LoRaWAN UL in terms of latency and collision probability was presented. The numerical evaluation was done for EU868 ISM band regulations, but the analysis is also valid for other bands utilizing duty cycling, such as the CN779-787 ISM band.
Short-hand forms for the limits of $r_i$ were presented. Equalizing the limits keeps the collision rate of sub-band combining at a minimum. The trade-off for this is a higher latency. The traffic shaping effect of aggregated duty-cycling was shown and may be used as a built-in tool for collision-latency trade-off when combining sub-bands.
The UL model presented in this work, can be combined with DL models for Class A, B and C LoRaWAN devices and more sophisticated collision models to give insight into the bi-directional performance in LoRaWAN.
[^1]: This work has been supported by the European Research Council (ERC Consolidator Grant Nr. 648382 WILLOW) within the Horizon 2020 Program.
[^2]: All authors are with the Department of Electronic Systems, Aalborg University, Denmark (Email: {rbs,dmk,jjn,petarp}@es.aau.dk).
[^3]: $\delta_i$ is a normalized value between \[0, 1\].
[^4]: https://github.com/Lora-net
[^5]: The term “asymmetric" captures the heterogeneous service rates of sub-bands.
[^6]: Jockeying: A packet changes queue to a shorter queue if, upon the end of service of another packet, it is located in a longer queue.
|
To make a movie with zero budget filmmaking tips you need to have a look at some recent key historical dates: Valentines Day 2005 was a key date in the history of the movie business. It was the day that Chad Hurley, Steve Chen and Jawed Karim registered the name...
I grew up on the farm back in Ontario – an hour or so outside of Toronto and a million miles away from the world of film investors. My mother was horrified when she found out that I was working in the movie business. She was convinced that the devil lived in the... |
Hillary Clinton says she’s determined not to be distracted in her final week of campaigning by the “noise” of the latest development in her email controversy.
The Democratic nominee was asked this week about her gut reaction to first word of FBI director James Comey’s Friday letter to Congress announcing the discovery of new emails to be reviewed as part of the probe of the private email server she used as secretary of state.
“Of course I was surprised,” Clinton tells PEOPLE in this week’s issue.
Federal agents obtained a warrant over the weekend to begin reviewing the reported 650,000 emails that were discovered on a laptop belonging to disgraced former congressman Anthony Weiner and used by his wife, Clinton’s top aide Huma Abedin. The emails are being searched in conjunction with the closed investigation into Clinton’s use of a private server during her time as secretary of state under President Obama.
Clinton, 69, told supporters at a Monday rally that she feels confident the FBI will reach the “same conclusion” as they did in their initial investigation: “There is no case here.”
“I think the American people made up their minds about my emails a long time ago,” she tells PEOPLE. “There have been a lot of ups and downs in this campaign, and through it all, I’ve always been focused on one thing: the American people.”
RELATED VIDEO: Hillary Wants Michelle Obama to Work With a Clinton White House
Clinton was still leading in new polls conducted after Friday’s reveal — fueling her stance on the email’s continued relevance. CNN’s Poll of Polls, which averages results for the five most recent national polls, found Clinton leading Trump 47 percent to his 42 percent.
“Your lives, your families, the problems that keep you up at night,” she says. “That’s what we’re focused on in these final days, because that’s what this election is really about. It’s not about the noise and distractions. It’s about what kind of country we want for our kids, and what kind of president can get us there.”
|
Q:
Activity.Current is null on HttpRequestOut.Stop
I'm using Application Insights for Console App (.NET Core 2.1).
I need to gather more information about dependencies(requests/responses) than ApplicationInsights.DependencyCollector does.
So I've tried the approach described in this blog. And it works for requests.
But it does not work for responses. Because in the code above Activity.Current is null:
[DiagnosticName("System.Net.Http.HttpRequestOut.Stop")]
public virtual void OnHttpRequestOutStop(System.Net.Http.HttpRequestMessage request, System.Net.Http.HttpResponseMessage response, TaskStatus requestTaskStatus)
{
Console.WriteLine(Activity.Current);
}
While in the similar code for HttpRequestOut.Start it has proper value:
[DiagnosticName("System.Net.Http.HttpRequestOut.Start")]
public virtual void OnHttpRequestOutStart(System.Net.Http.HttpRequestMessage request)
{
Console.WriteLine(Activity.Current);
}
Why in System.Net.Http.HttpRequestOut.Stop event the Activity.Current is null?
How can I access the same activity in Start and Stop events?
UPDATE:
I've found some info about the issue here.
A:
This comment really helped.
The most complicated scenario is when you want to access response and enrich telemetry based on it. you can still use diagnostic source Stop event, however, this becomes hacky because AppInsights listens to the same even and your listener needs to receive the Stop event before AppInsights.
So I just initialized my 'enrichment' observer class before the telemetry client. And Activity.Current is no longer null in OnHttpRequestOutStop.
|
SVN-fs-dump-format-version: 2
UUID: 4fdb8097-d6b7-af4b-b818-c79c3d7082dc
Revision-number: 6
Prop-content-length: 119
Content-length: 119
K 7
svn:log
V 18
More work on trunk
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:34:02.734375Z
PROPS-END
Node-path: trunk
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/B
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/B/lambda
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 27
Text-content-md5: 911c7a8d869b8c1e566f57da54d889c6
Text-content-sha1: 784a9298366863da2b65ebf82b4e1123755a2421
Content-length: 37
PROPS-END
This is the file 'lambda'.
Node-path: trunk/B/E
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/B/E/new_alpha
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 25
Text-content-md5: 67c756078f24f946f6ec2d00d02f50e1
Text-content-sha1: d001710ac8e622c6d1fe59b1e265a3908acdd2a3
Content-length: 35
PROPS-END
This is the file 'beta'.
Node-path: trunk/B/F
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/mu
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 12
Text-content-md5: f8a6701de14ec3fcfd9f2fe595e9c9ed
Text-content-sha1: 8b787bd9293c8b962c7a637a9fdbf627fe68610e
Content-length: 22
PROPS-END
new content
Node-path: trunk/C
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/D
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/D/gamma
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 12
Text-content-md5: f8a6701de14ec3fcfd9f2fe595e9c9ed
Text-content-sha1: 8b787bd9293c8b962c7a637a9fdbf627fe68610e
Content-length: 22
PROPS-END
new content
Node-path: trunk/D/G
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/D/G/pi
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 23
Text-content-md5: adddfc3e6b605b5f90ceeab11b4e8ab6
Text-content-sha1: 411e258dc14b42701fdc29b75f653e93f8686415
Content-length: 33
PROPS-END
This is the file 'pi'.
Node-path: trunk/D/G/rho
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: 82f2211cf4ab22e3555fc7b835fbc604
Text-content-sha1: 56388a031dffbf9df7c32e1f299b1d5d7ef60881
Content-length: 34
PROPS-END
This is the file 'rho'.
Node-path: trunk/D/G/tau
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: 9936e2716e469bb686deb98c280ead58
Text-content-sha1: 62e8c07d56bee94ea4577e80414fa8805aaf0175
Content-length: 34
PROPS-END
This is the file 'tau'.
Node-path: trunk/D/H
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: trunk/D/H/chi
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: 8f5ebad6d1f7775c2682e54417cbe4d3
Text-content-sha1: abeac1bf62099ab66b44779198dc19f40e3244f4
Content-length: 34
PROPS-END
This is the file 'chi'.
Node-path: trunk/D/H/omega
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 26
Text-content-md5: fe4ec8bdd3d2056db4f55b474a10fadc
Text-content-sha1: c06e671bf15a6af55086176a0931d3b5034c82e6
Content-length: 36
PROPS-END
This is the file 'omega'.
Node-path: trunk/D/H/psi
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: e81f8f68ba50e749c200cb3c9ce5d2b1
Text-content-sha1: 9c438bde39e8ccbbd366df2638e3cb6700950204
Content-length: 34
PROPS-END
This is the file 'psi'.
Node-path: branches
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/B
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/B/lambda
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 27
Text-content-md5: 911c7a8d869b8c1e566f57da54d889c6
Text-content-sha1: 784a9298366863da2b65ebf82b4e1123755a2421
Content-length: 37
PROPS-END
This is the file 'lambda'.
Node-path: branches/B1/B/E
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/B/E/alpha
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 26
Text-content-md5: d1fa4a3ced98961674a441930a51f2d3
Text-content-sha1: b347d1da69df9a6a70433ceeaa0d46c8483e8c03
Content-length: 36
PROPS-END
This is the file 'alpha'.
Node-path: branches/B1/B/E/beta
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 25
Text-content-md5: 67c756078f24f946f6ec2d00d02f50e1
Text-content-sha1: d001710ac8e622c6d1fe59b1e265a3908acdd2a3
Content-length: 35
PROPS-END
This is the file 'beta'.
Node-path: branches/B1/B/F
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/mu
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 12
Text-content-md5: f8a6701de14ec3fcfd9f2fe595e9c9ed
Text-content-sha1: 8b787bd9293c8b962c7a637a9fdbf627fe68610e
Content-length: 22
PROPS-END
new content
Node-path: branches/B1/C
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/D
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/D/gamma
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 12
Text-content-md5: f8a6701de14ec3fcfd9f2fe595e9c9ed
Text-content-sha1: 8b787bd9293c8b962c7a637a9fdbf627fe68610e
Content-length: 22
PROPS-END
new content
Node-path: branches/B1/D/G
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/D/G/pi
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 23
Text-content-md5: adddfc3e6b605b5f90ceeab11b4e8ab6
Text-content-sha1: 411e258dc14b42701fdc29b75f653e93f8686415
Content-length: 33
PROPS-END
This is the file 'pi'.
Node-path: branches/B1/D/G/rho
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: 82f2211cf4ab22e3555fc7b835fbc604
Text-content-sha1: 56388a031dffbf9df7c32e1f299b1d5d7ef60881
Content-length: 34
PROPS-END
This is the file 'rho'.
Node-path: branches/B1/D/G/tau
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: 9936e2716e469bb686deb98c280ead58
Text-content-sha1: 62e8c07d56bee94ea4577e80414fa8805aaf0175
Content-length: 34
PROPS-END
This is the file 'tau'.
Node-path: branches/B1/D/H
Node-kind: dir
Node-action: add
Prop-content-length: 10
Content-length: 10
PROPS-END
Node-path: branches/B1/D/H/chi
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: 8f5ebad6d1f7775c2682e54417cbe4d3
Text-content-sha1: abeac1bf62099ab66b44779198dc19f40e3244f4
Content-length: 34
PROPS-END
This is the file 'chi'.
Node-path: branches/B1/D/H/omega
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 26
Text-content-md5: fe4ec8bdd3d2056db4f55b474a10fadc
Text-content-sha1: c06e671bf15a6af55086176a0931d3b5034c82e6
Content-length: 36
PROPS-END
This is the file 'omega'.
Node-path: branches/B1/D/H/psi
Node-kind: file
Node-action: add
Prop-content-length: 10
Text-content-length: 24
Text-content-md5: e81f8f68ba50e749c200cb3c9ce5d2b1
Text-content-sha1: 9c438bde39e8ccbbd366df2638e3cb6700950204
Content-length: 34
PROPS-END
This is the file 'psi'.
Revision-number: 7
Prop-content-length: 138
Content-length: 138
K 7
svn:log
V 37
Create another branch B2 from trunk@6
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:34:28.500000Z
PROPS-END
Node-path: branches/B2
Node-kind: dir
Node-action: add
Node-copyfrom-rev: 6
Node-copyfrom-path: trunk
Revision-number: 8
Prop-content-length: 119
Content-length: 119
K 7
svn:log
V 18
More work on trunk
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:38:53.468750Z
PROPS-END
Node-path: trunk/B/E/new_alpha
Node-kind: file
Node-action: change
Text-content-length: 61
Text-content-md5: ac5f7c1c890095cafdb4e2fa0ff2680b
Text-content-sha1: dc90ed6c9f5254772c7b17f5e710a7c342623390
Content-length: 61
This is the file 'beta'.
this is the new alpha based on beta
Revision-number: 9
Prop-content-length: 119
Content-length: 119
K 7
svn:log
V 18
More work on trunk
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:39:10.625000Z
PROPS-END
Node-path: trunk/D/H/chi
Node-kind: file
Node-action: change
Text-content-length: 12
Text-content-md5: f8a6701de14ec3fcfd9f2fe595e9c9ed
Text-content-sha1: 8b787bd9293c8b962c7a637a9fdbf627fe68610e
Content-length: 12
new content
Revision-number: 10
Prop-content-length: 135
Content-length: 135
K 7
svn:log
V 34
Merge r6 from trunk to branches/B1
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:40:49.015625Z
PROPS-END
Node-path: branches/B1
Node-kind: dir
Node-action: change
Prop-content-length: 42
Content-length: 42
K 13
svn:mergeinfo
V 8
/trunk:6
PROPS-END
Node-path: branches/B1/B/E/new_alpha
Node-kind: file
Node-action: add
Node-copyfrom-rev: 6
Node-copyfrom-path: trunk/B/E/new_alpha
Text-copy-source-md5: 67c756078f24f946f6ec2d00d02f50e1
Text-copy-source-sha1: d001710ac8e622c6d1fe59b1e265a3908acdd2a3
Node-path: branches/B1/B/E/beta
Node-action: delete
Revision-number: 11
Prop-content-length: 135
Content-length: 135
K 7
svn:log
V 34
Merge r9 from trunk to branches/B2
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:53:44.156250Z
PROPS-END
Node-path: branches/B2
Node-kind: dir
Node-action: change
Prop-content-length: 42
Content-length: 42
K 13
svn:mergeinfo
V 8
/trunk:9
PROPS-END
Node-path: branches/B2/D/H/chi
Node-kind: file
Node-action: change
Text-content-length: 12
Text-content-md5: f8a6701de14ec3fcfd9f2fe595e9c9ed
Text-content-sha1: 8b787bd9293c8b962c7a637a9fdbf627fe68610e
Content-length: 12
new content
Revision-number: 12
Prop-content-length: 111
Content-length: 111
K 7
svn:log
V 10
Work on B2
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:55:17.390625Z
PROPS-END
Node-path: branches/B2/D/H/chi
Node-kind: file
Node-action: change
Text-content-length: 10
Text-content-md5: 7fb893eb43ac0ef015b2b95b88628b8c
Text-content-sha1: a54c7be3471b59cb5be150b1f679c1d2895b00e0
Content-length: 10
B2 tweaks
Revision-number: 13
Prop-content-length: 132
Content-length: 132
K 7
svn:log
V 31
Merge r11 and r12 from B2 to B1
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T14:55:51.703125Z
PROPS-END
Node-path: branches/B1
Node-kind: dir
Node-action: change
Prop-content-length: 64
Content-length: 64
K 13
svn:mergeinfo
V 29
/branches/B2:11-12
/trunk:6,9
PROPS-END
Node-path: branches/B1/D/H/chi
Node-kind: file
Node-action: change
Text-content-length: 10
Text-content-md5: 7fb893eb43ac0ef015b2b95b88628b8c
Text-content-sha1: a54c7be3471b59cb5be150b1f679c1d2895b00e0
Content-length: 10
B2 tweaks
Revision-number: 14
Prop-content-length: 143
Content-length: 143
K 7
svn:log
V 42
Merge r5 from trunk/B/E to branches/B1/B/E
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-22T15:10:22.234375Z
PROPS-END
Node-path: branches/B1/B/E
Node-kind: dir
Node-action: change
Prop-content-length: 74
Content-length: 74
K 13
svn:mergeinfo
V 39
/branches/B2/B/E:11-12
/trunk/B/E:5-6,9
PROPS-END
Node-path: branches/B1/B/E/alpha
Node-action: delete
Revision-number: 15
Prop-content-length: 143
Content-length: 143
K 7
svn:log
V 42
Merge r8 from trunk/B/E to branches/B1/B/E
K 10
svn:author
V 6
pburba
K 8
svn:date
V 27
2010-03-24T15:00:17.203125Z
PROPS-END
Node-path: branches/B1/B/E
Node-kind: dir
Node-action: change
Prop-content-length: 76
Content-length: 76
K 13
svn:mergeinfo
V 41
/branches/B2/B/E:11-12
/trunk/B/E:5-6,8-9
PROPS-END
Node-path: branches/B1/B/E/new_alpha
Node-kind: file
Node-action: change
Text-content-length: 60
Text-content-md5: b1738c908160291bb40ef9d1b8c89e82
Text-content-sha1: ad6df4488978b8e8eade283028ab753791073a76
Content-length: 60
This is the file 'beta'.
this is the new alpha based on beta
|
[Myelodysplastic syndromes or refractory anemias].
Myelodysplastic syndromes are relatively frequent, with a distinct predominance in elderly subjects. They are characterized by a disorder of myeloid precursor cell maturation, which explains the presence of blood cytopenia responsible for clinical manifestations (anaemia, infection, haemorrhage). Beside cytopenia, the main risk is transformation into acute myeloid leukaemia. As a rule, these diseases are easily recognized by the conjunction of blood count and bone marrow aspirate. Apart from the intensive therapy prescribed for myelodysplastic syndromes in young subjects, treatments seldom have beneficial effects and are still symptomatic in most cases. |
Israeli Team Heads for Quake-Struck Haiti; Fate of Jews Unknown
A delegation has left for Haiti to assess the aid needed by the island nation struck Tuesday by the worst earthquake in 200 years.
By Hana Levi Julian
First Publish: 1/13/2010, 10:00 AM / Last Update: 1/13/2010, 12:30 PM
A seven-member team of Israelis left for Haiti late Wednesday morning to assess what type of aid is most needed by the tragedy-struck island nation after it was hit by a massive earthquake late Tuesday afternoon. The delegation, comprised of officials from the Ministry of Foreign Affairs, IDF Home Front Command and IDF Medical Corps Personnel departed at 11:30 a.m. Israel time. Among the team members are experts in the fields of engineering, medical, logistics and rescue and recovery, government officials said.
Medical supplies, a field hospital, food stuffs and/or other humanitarian aid are among the types of assistance being considered for the desperately impoverished nation, sources said.
No Israelis have been identified among the victims of the quake that rocked the Haitien capital of Port-au-Prince, according to Israeli Ambassador to the neighboring Dominican Republic, Amos Radyan. However, the condition of the Jewish families whom live in the country is not clear, he said. Telephone lines are still down, and the Israeli embassy has been unable to contact any of the families.
There are approximately 25 to 30 Jews left in Haiti at present, most of who live in Port-au-Prince. Israel and Haiti maintain full diplomatic relations, but the Jewish State does not have an embassy in the country, which is served by the embassy in the neighboring Dominican Republic.
The earthquake, which measured 7.0 on the Richter scale, was the worst to hit the area in more than 200 years and the biggest quake ever to strike the impoverished island nation. It caused the National Palace to collapse and destroyed the local headquarters for United Nations peacekeepers as well as a hospital. Many U.N. employees are listed as missing, officials said.
A number of aftershocks followed the initial temblor and many more are still expected. According to the U.S. Geological Survey’s National Earthquake Information Center, the depth of the earthquake was about six miles. It measured nine on a 1-to-10 scale that gauges the level of shaking on the ground.
Jews have lived in Haiti since 1492 CE, when Luis de Torres, a Converso, arrived as an interpreter for Christopher Columbus, albeit for the most part through hiding their Judaism. Archaeologists have uncovered an ancient synagogue of Crypto-Jews in Jeremie, and Jewish tombstones have also been discovered in port cities such as Cap Haaitien and Jacmel.
Prior to World War II, the island was home to a diverse community of Jews from France, Poland, the Netherlands, Lebanon, Syria, Egypt, and other lands. In 1937, the Haitian government also issued passports and visas to some 100 Eastern European Jews fleeing the Nazi Holocaust. By the late 1950s, many of these Jews had left the country in order to ensure that their children would marry other Jews and not assimilate. |
---
abstract: |
An instanton method is proposed to investigate the quantum tunneling between two weakly–linked Bose–Einstein condensates confined in double–well potential traps. We point out some intrinsic pathologies in the earlier treatments of other authors and make an effort to go beyond these very simple zero order models. The tunneling amplitude may be calculated in the Thomas-Fermi approximation and beyond it; we find it depends on the number of the trapped atoms, through the chemical potential. Some suggestions are given for the observation of the Josephson oscillation and the MQST.
PACS numbers: 03.75.Fi, 05.30.Jp, 32.80.Pj
author:
- 'Yunbo Zhang$^{1,2}$ and H.J.W. Müller–Kirsten$^1$'
title: Instanton Approach to Josephson Tunneling between Trapped Condensates
---
Introduction
============
The first experimental observations of Bose–Einstein condensation (BEC) in dilute gases of trapped alkali atoms[@Anderson2] have stimulated the studies of condensates in double well traps. With a fascinating possibility of the observation of new kinds of macroscopic quantum phenomena[@Dalfovo1], which are related to the superfluid nature of the condensates, numerous authors have addressed this subject area both experimentally and theoretically. Some recent experiments have investigated the relative phase of two overlapping condensates in different hyperfine states[@Hall] and robust interference fringes between two freely expanding condensates have been observed[@Andrews] after switching off the double–well potential that confines them, indicating phase coherence both in space and time. In fact the possibility of condensate tunneling between two adjacent atomic traps and detection of Josephson-like current phase effects have been previously suggested[@Javanainen1; @Dalfovo2; @Reinhard] and intensively studied by two main approaches which are capable of dealing with quantum tunneling in this variant of the Josephson effect. Authors with a quantum optics background tend to favor models in which two boson modes are involved, the so-called two-mode model[@Milburn; @Smerzi1; @Raghavan1; @Raghavan2; @Marino; @Jack; @Javanainen2; @Ruostekoski]. The other category of theories is based on using the differences of condensate phases and atom numbers between the two sides of the trap as conjugate quantum variables[@Zapata]. A detailed comparison between these two approaches is given in ref.[@Javanainen3].
The superfluid nature of condensates can be fully tested only through the observation of superflows. Despite the many experimental efforts being focused on the creation of a Josephson junction between two condensate bulks, direct experimental evidences for the atomic oscillation are still far from being realized. Theoretically the Josephson junction problem has been studied in the limit of noninteracting atoms for small-amplitude Josephson oscillations[@Javanainen1; @Dalfovo2], including finite-temperature(damping) effects[@Zapata]. Dynamic processes of splitting a condensate by raising a potential barrier in the center of a harmonic trap [@Javanainen3; @Menotti] and decoherence effects and quantum corrections to the semiclassical mean-field dynamics[@Milburn; @Marino; @Imamoglu; @Vardi; @Anglin] have also been studied. It has been pointed out[@Smerzi1] that even though the Bose Josephson Junction (BJJ) is a neutral-atom system, it can still display the typical ac and dc Josephson effects occurring in charged Cooper-pair superconducting junctions. Moreover, a novel nonlinear effect has been predicted to occur in this BJJ: The self–trapping of a BEC population imbalance arises because of the interatomic nonlinear interaction in the Bose gas[@Milburn; @Smerzi1]. This was considered to be a novel “macroscopic quantum self–trapping” (MQST) and was predicted to be observable under certain experimental conditions. Three related parameters, i.e. the ground state energy $E^0$, the interaction energy $U$, and more importantly, the tunneling amplitude $K$, are still undetermined for a specific geometry of the potential well and have been taken as constants in refs.[@Milburn; @Smerzi1]. It is the main purpose of this paper to present a rigorous derivation of these quantities and we find that they actually depend on the number of atoms $N$. This $N$–dependence refines the conclusions and makes the self–trapping easier to observe.
We develop the instanton method for a sensitive and precise investigation of the tunneling between two condensates. The almost trivially looking problem of the tunneling behavior in a double–well potential has attracted much attention from theorists for decades. For a single particle, the solution can be found even in quantum mechanics textbooks[@Landau]. The advantage of a nonperturbative method, as presented here, is that it gives not only a more accurate description of the tunneling phenomena but also a comprehensive physical understanding in the context of quantum field theory. The periodic instanton configurations, which have been shown to be a useful tool in several areas of research such as spin tunneling[@Liang1; @Liang2], bubble nucleation[@Liang3] and string theory[@Park1], enable also the investigation of the finite temperature behavior of these systems. In the case of the Bose–Einstein system, however, we need to evaluate the tunneling frequency for a finite chemical potential even at zero temperature, due to the nonlinear interaction between the confined atoms. Therefore the chemical potential here replaces the position of the excited energy and gives rise to an expected higher tunneling frequency.
Thus, in this paper we will study the atomic tunneling between two condensates in a double-well trap, with special attentions paid to the $N-$dependent tunneling amplitude. In Sec. II we review the two mode approach and summarize 3 critical conditions which are related to the MQST effect. Analytical solutions to the coupled nonlinear BJJ equations are derived in Sec. III and some novel features about the different modes of MQST are discussed in detail. In Sec. IV the often used Thomas-Fermi approximation and the corrections beyond it are used to obtain the two important parameters in the BJJ tunneling system. By means of the periodic instanton method, we calculate the tunneling amplitude/frequency between the two condensates in Sec. V and find they actually depend on the number of the trapped atoms. Our results can be compared to the simple single-particle tunneling result in ref.[@Milburn] and we find that the latter corresponds to the low-energy or noninteracting case. A detailed discussion about the optimal condition for observation of the MQST and the Josephson tunneling is the subject of Sec. VI where some comments are made to the maximum amplitude of the oscillation. Finally our summary and conclusions are given in Sec. VII.
Two-mode Model and Macroscopic Quantum Self-Trapping
====================================================
It was realized long ago that the ground state properties of a trapped Bose-gas can be well described by the Gross-Pitaevskii equation(GPE)[@Gross] $$i\hbar \frac{\partial \Phi }{\partial t}=-\frac{\hbar ^2}{2m}\nabla ^2\Phi
+\left[ V_{ext}({\bf r})+g_0\left| \Phi \right| ^2\right] \Phi \label{gpe}$$ where $V_{ext}$ is the external trapping potential and $g_0=\frac{4\pi \hbar
^2a}m$ is the interatomic coupling constant, with $a$, $m$ the atomic scattering length and mass, respectively. In this paper we will consider systems interacting with repulsive forces with $a>0$. To obtain the ground state properties, one can write the macroscopic wave function(or from the viewpoint of phase transitions, the order parameter) of the condensate as $%
\Phi ({\bf r},t)=\phi ({\bf r})e^{-i\mu t/\hbar },$ where a condensate in the stationary state was assumed. Then the GPE (\[gpe\]) becomes $$\mu \phi ({\bf r})=\left( H_0+g_0\phi ^2({\bf r})\right) \phi ({\bf r}%
),\quad H_0=-\frac{\hbar ^2\nabla ^2}{2m}+V_{ext}({\bf r}) \label{gpe2}$$ with $H_0$ the Hamiltonian for the condensates of noninteracting bosons. This equation explains the significance of the chemical potential $\mu $ as an energy of the stationary level and can be used further for calculation of the coupling between two condensates, say, the tunneling amplitude(transfer matrix element or Josephson tunneling term) as will be shown below.
Consider a double-well trap produced, for example, by a far-off-resonance laser barrier that cuts a single trapped condensate into two parts. In the barrier region the modulus of the order parameter in the GPE is exponentially small. In other words, the overlap between the condensates occurs only in the classically forbidden region, where the wave function is small and nonlinear effects due to interactions can be ignored. Thus we look for the solution of the time-dependent GPE (\[gpe\]) with the two-mode variational ansatz[@Smerzi1; @Raghavan1] $$\Phi ({\bf r},t)=\psi _1(t)\Phi _1({\bf r})+\psi _2(t)\Phi _2({\bf r}).
\label{ansatz}$$ Here, the complex coefficients $\psi _i(t)=\sqrt{N_i(t)}\exp [i\theta _i(t)]$ are spatially uniform and contain all of the time dependence, while the two states $\Phi _1({\bf r})$ and $\Phi _2({\bf r})$ are localized in the left and right wells, respectively, and contain all of the position dependence. The total number of atoms is conserved in the macroscopic quantum tunneling process, i.e., $N_1+N_2=\left| \psi _1\right| ^2+\left| \psi _2\right|
^2=N_T $. In a more accurate theory, one could account for the slow time evolution of the states $\Phi _i({\bf r})$ due to the mean field interaction since both the number of particles $N_i(t)$ and phases $\theta _i(t)$ in each well evolve in time. This, however, can be shown to have a negligible effect when the amplitude of oscillation is relatively small [@Salasnich1].
Substituting the two-mode ansatz (\[ansatz\]) into the GPE (\[gpe\]), multiplying by $\Phi _i({\bf r})$ and integrating over position we obtain the equations of motion for the complex coefficients $\psi _i(t)$, i.e. the BJJ equations $$\begin{aligned}
i\hbar \frac{\partial \psi _1}{\partial t} &=&\left( E_1+U_1N_1\right) \psi
_1-K\psi _2, \label{bjj} \\
i\hbar \frac{\partial \psi _2}{\partial t} &=&\left( E_2+U_2N_2\right) \psi
_2-K\psi _1, \nonumber\end{aligned}$$ where damping and finite temperature effects are ignored. Here $E_{1,2}$ are the zero-point energies in each well, $$E_{1,2}=\int d{\bf r}\Phi _{1,2}({\bf r})H_0\Phi _{1,2}({\bf r}), \label{e}$$ $U_iN_i$ are proportional to the atomic self-interaction energies, with $$U_{1,2}=g_0\int d{\bf r}\Phi _{1,2}^4({\bf r}) \label{u}$$ and $K$ describes the amplitude of the tunneling between condensates $$K=-\int d{\bf r}\Phi _1({\bf r})H_0\Phi _2({\bf r}). \label{k}$$ These quantities, which are expressed in terms of appropriate overlap integrals of the wave-functions $\Phi _{1,2}({\bf r})$, have been taken as constants in the previous works and it is one of the main tasks of this paper to obtain them analytically, provided that a specific geometry of the trap is given. We further note that the (real) ground state solutions $\Phi
_{1,2}({\bf r})$ for isolated traps with equal population in each well, i.e. $N_1=N_2=N_T/2$, satisfy the orthonormality condition $$\int d{\bf r}\Phi _i({\bf r})\Phi _j({\bf r})=\delta _{ij}. \label{orth}$$ In the derivation above we neglected terms such as $\int \Phi _1^2\Phi _2^2d%
{\bf r},$ $\int \Phi _1^3\Phi _2d{\bf r,}$ and $\int \Phi _1\Phi _2^3d{\bf r}
$ which have the meanings of higher order overlaps between the condensates. Attempts to include the mean-field contribution to the coupling between the condensates have also been made[@Williams2]. In refs.[@Abdullaev] the authors studied the coherent atomic oscillations and resonances between coupled BECs with time-dependent symmetric and asymmetric trapping potential and oscillating atomic scattering length and an interesting chaotic macroscopic quantum tunneling phenomenon was found to exist. Our analytical result for $E$, $U$ and $K$ may be useful in the observation of this macroscopic quantum effect.
Straightforwardly we can obtain the equations for the relative phase $\phi
(t)=\theta _2(t)-\theta _1(t)$ and fractional population imbalance $z=\left[
N_1(t)-N_2(t)\right] /N_T$ [@Smerzi1; @Raghavan1] $$\begin{aligned}
\dot{z} &=&-\sqrt{1-z^2}\sin \phi , \nonumber \\
\dot{\phi} &=&\Lambda z+\frac z{\sqrt{1-z^2}}\cos \phi +\Delta E,\end{aligned}$$ where we have rescaled $2Kt/\hbar $ to a dimensionless time $t$ for time-independent coupling $K$ between two condensates. The parameters $%
\Delta E$ and $\Lambda $, which determines the dynamic regimes of the BEC atomic tunneling, can be expressed as $$\begin{aligned}
\Delta E &=&\frac{E_1-E_2}{2K}+\frac{U_1-U_2}{4K}N_T, \nonumber \\
\Lambda &=&\frac{UN_T}{2K},\qquad U=\left( U_1+U_2\right) /2. \label{Lambda}\end{aligned}$$ The canonically conjugated variables $z$ and $\phi $, satisfying the corresponding Hamilton canonical equations of motion, $\dot{z}=-\frac{%
\partial H}{\partial \phi }$ and $\dot{\phi}=\frac{\partial H}{\partial z}$, suggest that the total energy of the above system is conserved, $$H=\frac \Lambda 2z^2-\sqrt{1-z^2}\cos \phi +\Delta Ez.$$ In a simple mechanical analogy, $H$ describes a nonrigid pendulum of tilt angle $\phi $ and length proportional to $\sqrt{1-z^2}$, that decreases with the angular momentum $z$. For simplicity we restrict our calculations to a symmetric double-well potential, which means that the spatially averaged quantities (\[e\]) and (\[u\]) are equal for each well, allowing us to make the simplifications $\Delta E=0$. In this case, the equations of motion reduce to $$\begin{aligned}
\dot{z}(t) &=&-\sqrt{1-z(t)^2}\sin \phi (t), \nonumber \\
\dot{\phi}(t) &=&\Lambda z(t)+\frac{z(t)}{\sqrt{1-z(t)^2}}\cos \phi (t),
\label{zphi}\end{aligned}$$ with the conserved energy $$\begin{aligned}
&&H=H[z(t),\phi (t)]=\frac \Lambda 2z(t)^2-\sqrt{1-z(t)^2}\cos \phi (t)
\nonumber \\
&=&H[z(0),\phi (0)]=\frac \Lambda 2z(0)^2-\sqrt{1-z(0)^2}\cos \phi (0)=H_0.\end{aligned}$$
In order to see the oscillations of the fractional population imbalance and the different kinds of (running- and $\pi $-phase) MQST modes more transparently, we introduce an effective classical particle whose coordinate is $z$, moving in a potential $W(z)$ with the initial energy $W_0$. The effective equation of motion is $$\dot{z}(t)^2+W(z)=W_0 \label{wz}$$ where $$\begin{aligned}
W(z) &=&z^2\left( 1-\Lambda H_0+\frac{\Lambda ^2}4z^2\right) , \\
W_0 &=&1-H_0^2=W[z(0)]+\dot{z}(0)^2.\end{aligned}$$ Increasing the value of $1-\Lambda H_0$ from negative to positive changes the effective potential $W(z)$ from a double-well to a parabolic. The motion in the parabolic potential is Rabi-like oscillation with a zero time-average value of the fractional population imbalance $z$. For fixed parameters $%
\Lambda $ and $H_0$, the oscillations with small effective energies $W_0$ are sinusoidal, the increasing of the effective energies adds higher harmonics to the sinusoidal oscillations. In the case of double-well potential with two minima located at $z_{\pm }=\pm \frac{\sqrt{2(\Lambda
H_0-1)}}\Lambda $ and the barrier height given by $W(0)-W(z_{\pm })=\frac{%
\left( \Lambda H_0-1\right) ^2}{\Lambda ^2}$, the motion is very different from that in the parabolic potential. If the effective energies is larger than the barrier between two wells, that is, $W_0>0$ or $H_0<1$, the motion is a nonlinear Rabi oscillation with a zero time-average value of $z$, which corresponds to the periodic flux of atoms from one condensate to the other. If the effective energy is lower than the potential barrier, $W_0<0$ or $%
H_0>1$, the particle is forced to become localized in one of the two wells and the population in each trap oscillates around a nonzero averaged $%
\left\langle z(t)\right\rangle \neq 0$ which has been termed MQST in [@Smerzi1; @Raghavan1]. Based on these analyses, we know the critical condition for MQST corresponds to the point where the effective energy equals the potential barrier, $W_0=0$ or $H_0=1$.
The lowest four stationary state solutions ($\dot{z}=\dot{\phi}=0$) of eq.(\[zphi\]) are: [**a)**]{} the symmetric ground state $\phi _s=2n\pi $, $%
z_s=0 $ with energy $E_{+}=-1$; [**b)**]{} the antisymmetric eigenfunction $%
\phi _s=(2n+1)\pi $, $z_s=0$ with energy $E_{-}=1$; and [**c)**]{} the $z-$symmetry breaking states $\phi _s=(2n+1)\pi $, $z_s=\pm \sqrt{1-\frac 1{%
\Lambda ^2}}$ with energy $E_{sb}=\frac 12\left( \Lambda +\frac 1\Lambda
\right) >1$, respectively. The degenerate eigenstates that break the $z$ symmetry [**c)**]{} are obviously the result of the nonlinear interatomic interaction. In this sense we may verify again the MQST condition $H_0>1$, which means the populations become macroscopically self-trapped with $%
\left\langle z\right\rangle \neq 0$. From above the 2 lowest-lying states [**a)**]{} and [**b)**]{} with $z_s=0$ are obviously not MQST($H_0=-1,1$), only the symmetry breaking states [**c)**]{} with $z_s\neq 0$ can be regarded as being self-trapped ($H_0=\frac 12\left( \Lambda +\frac 1\Lambda \right) >1$).
![The parameter range for the appearance of MQST for $0-$phase mode: M$\rightarrow $ MQST, J$\rightarrow $ Josephson Tunneling.](fig1r.eps)
In summary we observe 3 different critical conditions in refs. [@Smerzi1; @Raghavan1]. One is the [**MQST condition**]{} which is defined by $$\begin{aligned}
&<&z(t)>\neq 0\Rightarrow H_0>1 \nonumber \\
&\Rightarrow &\frac \Lambda 2z^2(0)-\sqrt{1-z^2(0)}\cos \left[ \phi
(0)\right] >1. \label{mqst}\end{aligned}$$ In a series of experiments in which $\phi (0)$ and $z(0)$ are kept constant but $\Lambda $ is varied by changing the geometry or the total number of condensate atoms, we have the critical parameter $$\Lambda _c=\frac{1+\sqrt{1-z(0)^2}\cos \phi (0)}{z(0)^2/2} \label{lambdac}$$ and the critical condition for MQST is $\Lambda >\Lambda _c$. On the other hand, changing $z(0)$ and keeping $\phi (0)$ and $\Lambda $ constants we have a critical initial population imbalance $z_c$, which takes the value $$z_c=\frac 2\Lambda \sqrt{\Lambda -1}$$ in both $0-$phase mode and $\pi -$phase mode case, which describe the tunneling dynamics with the initial or time-averaged value of the phase across the junction being $0$ and $\pi $, respectively. But for $\phi (0)=0$, if $z(0)>z_c$, MQST sets in, and for $\phi (0)=\pi $, $z(0)<z_c$ marks the region of MQST. In Fig. 1 we show the parameter range for the appearance of MQST and Josephson tunneling for $0-$phase mode, while for the $\pi-$phase mode this phase diagram manifests much richer structure as shown in Fig. 2. It should be pointed out that the vertical axis $\Lambda $ can extend to much larger values, but we illustrate in the figure only the area of interest. For $\Lambda >2$ and $\phi (0)=\pi $, the effective potential $W(z)$ always has a double-well structure and the system is self trapped for all values of $z(0)$. We conclude that in the case of the $\pi -$phase mode the MQST will set in for most of the areas, leaving only a small area for actual Josephson tunneling.
![Different MQST mode for $\pi-$phase mode: J $\rightarrow $ Josephson Tunneling, I $\rightarrow $ MQST Type I, II $\rightarrow $ MQST Type II, R $\rightarrow $ MQST unbounded running phase mode. The vertical and horizontal lines correspond to the case of Fig. 7 and Fig. 5 of ref. [@Raghavan1], respectively.](fig2r.eps)
The [**second condition**]{} comes from the stationary $z-$symmetry-breaking solution [**c);**]{} the value of $z_s$ is just the boundary of the first- and the second-type of trapped states which differ by the time-average value of the population imbalance $\left\langle z\right\rangle $. We enter into some detail of the $\pi $ phase mode. According to [@Raghavan1], there are two kinds of such $\pi $-phase modes with MQST: $$\begin{aligned}
\pi \text{-phase modes MQST TypeI} &\Leftrightarrow &\left\langle
z\right\rangle <z_s\neq 0 \label{type12} \\
\pi \text{-phase modes MQST TypeII} &\Leftrightarrow &\left\langle
z\right\rangle >z_s\neq 0 \nonumber\end{aligned}$$ with $z_s$ being the stationary $z$-symmetry breaking value of the BJJ equations (\[bjj\]). Once $\Lambda $ exceeds the value $$\Lambda _s=\frac 1{\sqrt{1-z^2(0)}} \label{lambdas}$$ (cf. $z_s=\pm \sqrt{1-\frac 1{\Lambda ^2}}$), a changeover occurs at the stationary state and the system goes from Type I of the $\pi $-phase trapped state into Type II. In the phase plane portrait of the dynamical variables $%
z $ and $\phi $ (Fig. 7 in ref.[@Raghavan1]) for the fixed value of $%
z(0)=0.6$, this critical condition corresponds to the 4 point-like trajectories located at ($\pm \pi ,\pm 0.6$). However, in consideration of the case of a fixed value of $\Lambda $, for example, Figs. 5c and 5d in ref.[@Raghavan1], we find that this definition of the Type I and Type II $%
\pi -$phase modes will lead to a dilemma in the analysis of the phase diagrams and modification to this definition becomes necessary. We return to this point in the following section.
The [**third condition**]{} defines whether the phase $\phi (t)$ is an unbounded running mode or is localized around $\pi $. Again from the $z\sim
\phi $ phase diagram we know this boundary line can be determined as $$\phi |_{z=\pm 1}=\frac \pi 2,\qquad \frac{d\phi }{dz}|_{z=\pm
1}=0\Rightarrow \frac \Lambda 2=H_0$$ which gives the critical values $$\Lambda _3=\frac 2{\sqrt{1-z^2(0)}},\qquad \text{or}\qquad z_3=\sqrt{1-\frac %
4{\Lambda ^2}}. \label{lambda3}$$ In Fig. 2, we managed to give a phase diagram for the $\pi -$phase mode, with special attention paid to different MQST modes. Here the area C shows again the Josephson tunneling area, others are 3 MQST areas, with area I the bounded MQST of Type I, area II the Type II, and Running Mode for the unbounded running phase mode, respectively. We used the formulae (\[lambdac\]), (\[lambdas\]) and (\[lambda3\]) for these three curves, from the bottom up, respectively. We point out that the second and the third conditions apply only to the $\phi (0)=\pi $ case.
Exact Analytic Solutions and Different MQST Modes
=================================================
From the equation of motion for the effective classical particle (\[wz\]) we can easily obtain the real time exact solutions in terms of the Jacobian elliptic functions $%
%TCIMACRO{\func{cn}}
%BeginExpansion
\mathop{\rm cn}%
%EndExpansion
$ and $%
%TCIMACRO{\func{dn}}
%BeginExpansion
\mathop{\rm dn}%
%EndExpansion
$. This has been done in refs. [@Raghavan1; @Raghavan2] but there are some notation errors in the corresponding expressions. We thus rewrite the solutions here and present a detailed discussion, especially on some featured oscillation modes. For the parameters in the area of Josephson tunneling the population imbalance oscillates sinusoidally or nonsinusoidally between a positive initial value $C$ and a negative one $-C,$ $$z(t)=C%
%TCIMACRO{\func{cn} }
%BeginExpansion
\mathop{\rm cn}%
%EndExpansion
\left( \frac{C\Lambda }{2k}(t-t_0),k\right) \label{cn}$$ where $$\begin{aligned}
C^2 &=&\frac 2{\Lambda ^2}\left( \left( H_0\Lambda -1\right) +\frac{\zeta ^2}%
2\right) , \nonumber \\
\alpha ^2 &=&\frac 2{\Lambda ^2}\left( \frac{\zeta ^2}2-\left( H_0\Lambda
-1\right) \right) , \label{amp} \\
\zeta ^2 &=&2\sqrt{\Lambda ^2+1-2H_0\Lambda } \nonumber\end{aligned}$$ with $0<k<1$ the elliptic modulus, $$k^2=\frac{C^2}{\alpha ^2+C^2}=\frac 12\left( \frac{C\Lambda }\zeta \right)
^2=\frac 12\left( 1+\frac{H_0\Lambda -1}{\sqrt{\Lambda ^2+1-2H_0\Lambda }}%
\right) .$$ In the case of MQST, however, the elliptic function $%
%TCIMACRO{\func{cn}}
%BeginExpansion
\mathop{\rm cn}%
%EndExpansion
$ will be replaced by its counterpart $%
%TCIMACRO{\func{dn}}
%BeginExpansion
\mathop{\rm dn}%
%EndExpansion
$ and the oscillation is about a nonzero average value $\left\langle
z\right\rangle $ $$z(t)=C%
%TCIMACRO{\func{dn} }
%BeginExpansion
\mathop{\rm dn}%
%EndExpansion
\left( \frac{C\Lambda }2(t-t_0),1/k\right) . \label{dn}$$ From this we know the value $z(t)=0$ is inaccessible at any time and the modulus is now $1/k$ with $k>1$. The integration constant $t_0$ can be determined from $z(t)|_{t=0}=z(0):$$$t_0=\frac{2k}{C\Lambda }{\rm cn}^{-1}\left( \frac{z(0)}C,k\right) =\frac 2{%
\Lambda \sqrt{\alpha ^2+C^2}}F\left( \arccos \frac{z(0)}C,k\right)$$ where $F\left( \phi ,k\right) =\int_0^\phi d\phi (1-k^2\sin \phi )^{-1/2}$ is the incomplete elliptic integral of the first kind. Noting the following correspondence $$\begin{aligned}
0 &<&k<1,\alpha ^2>0,H_0<1,\qquad \text{Josephson Oscillation} \\
k &>&1,\alpha ^2<0,H_0>1,\qquad \qquad \text{MQST} \nonumber\end{aligned}$$ we easily derive the physical condition for the onset of MQST, i.e., $H_0=1$ and $\Lambda =\Lambda _c$, from the mathematical condition $k=1$, where the character of the elliptic function solution changes. The Jacobian elliptic functions $%
%TCIMACRO{\func{cn}}
%BeginExpansion
\mathop{\rm cn}%
%EndExpansion
(u,k)$ and $%
%TCIMACRO{\func{dn}}
%BeginExpansion
\mathop{\rm dn}%
%EndExpansion
(u,k)$ are periodic in the argument $u$ with period $4{\cal K}(k)$ and $2%
{\cal K}(k),$ respectively, where ${\cal K}(k)$ is the complete elliptic integral of the first kind. The time period of the oscillation of $z(t)$ is then given by $$\begin{aligned}
\tau &=&\frac{2k}{C\Lambda }4{\cal K}(k),\quad \text{for}\quad 0<k<1,
\label{tcn} \\
\tau &=&\frac 2{C\Lambda }2{\cal K}(1/k),\quad \text{for}\quad k>1.
\label{tdn}\end{aligned}$$ In the limit of small amplitude, or linear oscillations, $k\rightarrow 0,$ $%
K(k)\rightarrow \pi /2,$ we have $$\tau =\frac{2\pi }{\sqrt[4]{\Lambda ^2+1-2H_0\Lambda }}.$$ For $0,\pi -$phase oscillations, $H_0\rightarrow \mp 1,$ the periods in scaled units $2Kt/\hbar $ become $$\tau =\frac{2\pi }{\sqrt{1\pm \Lambda }},$$ respectively, which agree with the unscaled ones (eqs (4.7) and (4.10) in ref.[@Raghavan1]) $$\tau _{0,\pi }^{-1}=\sqrt{4K^2\pm 2UN_TK}/2\pi \hbar .$$
We consider here two special cases, i.e., the $0,\pi -$phase modes. For the $%
0-$phase mode, by inserting $\phi (0)=0$ into eq.(\[amp\]), we may show that the oscillation amplitude of $z(t)$ is just the initial value $z(0)$, $$C=z(0).$$ On the other hand, for the $\pi -$phase mode, this amplitude will depend on the values of $\Lambda $ and $z(0)$, $$\begin{aligned}
C^2 &=&z^2(0),\qquad \qquad \qquad \qquad \qquad \qquad \qquad \text{when }%
\Lambda <\Lambda _s\text{ or }z(0)>z_s, \label{amppi} \\
C^2 &=&z^2(0)+\frac 4{\Lambda ^2}\left[ \Lambda \sqrt{1-z^2(0)}-1\right]
,\qquad \text{when }\Lambda >\Lambda _s\text{ or }z(0)<z_s. \nonumber\end{aligned}$$ In the case of Josephson tunneling for both $0$ and $\pi -$phase modes, that is, when the oscillation is in the form of elliptic function $%
%TCIMACRO{\func{cn}}
%BeginExpansion
\mathop{\rm cn}%
%EndExpansion
$-type, we always have $C=z(0)$. The reason is that under the condition $%
\Lambda >\Lambda _s$ or $z(0)<z_s$ for $\pi -$phase mode the system is obviously in the region of MQST type II. Therefore we should use the elliptic function $%
%TCIMACRO{\func{dn}}
%BeginExpansion
\mathop{\rm dn}%
%EndExpansion
$ for MQST instead. Generally for MQST the average population imbalance may be calculated as(the elliptic function $%
%TCIMACRO{\func{dn}}
%BeginExpansion
\mathop{\rm dn}%
%EndExpansion
$ oscillates between $1$ and $k_{dn}^{\prime }$) $$\left\langle z\right\rangle =\frac C2\left( 1+k_{dn}^{\prime }\right) =\frac %
C2\left( 1+\sqrt{1-1/k^2}\right) =\frac C2\left( 1+\sqrt{1-\frac{2\zeta ^2}{%
C^2\Lambda ^2}}\right) .$$ For the $0-$phase mode, $C=z(0)$ and $\zeta ^2=2\left( \Lambda \sqrt{1-z^2(0)%
}+1\right) $, the average population imbalance is $$\left\langle z\right\rangle =\frac{z(0)}2\left( 1+\sqrt{1-\frac{4\left(
\Lambda \sqrt{1-z^2(0)}+1\right) }{z(0)^2\Lambda ^2}}\right) . \label{za0}$$ We take the values of Fig. 2 of ref.[@Raghavan1] as an example, $\Lambda
=10,z(0)=0.65,\left\langle z\right\rangle =0.46511$, which is exactly the case. For the $\pi -$phase mode, there are two cases:
[*Case I:*]{} $\Lambda <\Lambda _s$ or $z(0)>z_s$ we have $C=z(0)$ and $%
\zeta ^2=2\left( 1-\Lambda \sqrt{1-z^2(0)}\right) $which give the average population imbalance as $$\left\langle z\right\rangle =\frac{z(0)}2\left( 1+\sqrt{1-\frac{4\left(
1-\Lambda \sqrt{1-z^2(0)}\right) }{z(0)^2\Lambda ^2}}\right) . \label{zapi}$$ For the parameter in Fig. 3d of ref.[@Raghavan1], $z(0)=0.6,\Lambda
=1.2,\left\langle z\right\rangle =0.54944<0.6$. This is again exactly the case.
[*Case II:*]{} $\Lambda >\Lambda _s$ or $z(0)<z_s$ we have $$\begin{aligned}
C^2 &=&z^2(0)+\frac 4{\Lambda ^2}\left[ \Lambda \sqrt{1-z^2(0)}-1\right] , \\
\zeta ^2 &=&2\left( \Lambda \sqrt{1-z^2(0)}-1\right) , \nonumber\end{aligned}$$ the average population imbalance is the same as that in Case I eq.(\[zapi\]). For Fig. 3f of ref.[@Raghavan1], $z(0)=0.6,\Lambda =1.3,\left\langle
z\right\rangle =0.63715>0.6$.
We may compare our phase diagram Fig. 2 with those previously known results. First we have a look at the Fig. 7 of ref.[@Raghavan1], which illustrated the behavior of the system in the $z-\phi $ phase-plane, and concentrating only on the $\pi -$phase mode. At a fixed value of $z(0)=0.6$, increasing the value of $\Lambda $ will bring the system from area C to area I (Type I bounded MQST with $\left\langle z\right\rangle <0.6$), then area II(Type II bounded MQST with $\left\langle z\right\rangle >0.6$), and finally into the running mode area. This process is described by a vertical line in Fig. 2 and it intersects successively the three curves at $$\Lambda _c=10/9=1.\dot{1},\qquad \Lambda _s=1.25,\qquad \Lambda _3=2.5,$$ from the bottom up. In Table I we list detailed descriptions and graphical features of the oscillations in accordance with Fig. 7 of ref.[@Raghavan1]. The coincidence here is obvious.
[**Table I: Different oscillation modes for fixed value** ]{}$z(0)=0.6$[****]{}
----------------------------------------------------------------------------------------------------------------------------------------------------
$\phi (0)=\pi $
---------------------------------- ------------------------------------------------------------------------ ----------------------------------------
$\Lambda =0$ Rabi oscillation around $\left\langle z\right\rangle =0$ O
$0<\Lambda <\Lambda _c$ sinusoidal/nonsinusoidal $\text{oscillation around 0
}\left\langle z\right\rangle =0$
$\Lambda =\Lambda _c=1.111$ the trajectory shrinks and is pinched at the point $z=0$ 8
marking the onset of $\pi $-phase MQST type I with $\left\langle
z\right\rangle <z(0)$
$\Lambda _c<\Lambda <\Lambda _s$ upon further increasing the area are divided into 2 parts $_{\circ }^{\circ }$
$\Lambda =\Lambda _s=1.25$ the 2 divided areas collapse to 2 point-like trajectories [:]{}
at $z=0.6$; boundary between MQST type I and type II
$\Lambda _s<\Lambda <\Lambda _3$ further increase of $\Lambda $ induces a reflection of the trajectory $%
%TCIMACRO{\QATOP{\text{o}}{\text{o}} }
%BeginExpansion
{\text{o} \atop \text{o}}%
%EndExpansion
$
about the fixed point and $\pi $-phase MQST type II with $\left\langle
z\right\rangle >z(0)$
$\Lambda =\Lambda _3=2.5$ boundary between bounded-mode(type II) and running-mode MQST $%
%TCIMACRO{\QATOP{\nabla }{\Delta } }
%BeginExpansion
{\nabla \atop \Delta }%
%EndExpansion
$
$\Lambda >\Lambda _3$ the trajectory joins the unbounded running-mode MQST $%
%TCIMACRO{\QATOP{\omega }{m} }
%BeginExpansion
{\omega \atop m}%
%EndExpansion
$
----------------------------------------------------------------------------------------------------------------------------------------------------
Secondly we go through Fig. 5 of ref.[@Raghavan1] to see what happens if we keep the value of $\Lambda $ constant and increase $z(0)$. This is indicated in Fig. 2 by a horizontal line. For small values of $z(0),$ the phase is unbounded and the system exhibits running phase MQST. However, above a certain value $z_3=\sqrt{1-4/\Lambda ^2}$(cf. $\Lambda _3$; there is an error in ref. [@Raghavan1] where the condition $z(0)=2z_s=2\sqrt{%
1-1/\Lambda ^2}$ is unphysical since it is larger than 1), with $%
\left\langle z\right\rangle $ still nonzero, the phase becomes localized around $\pi $ and remains bounded for all larger values of $z(0)$. Then the puzzle appears here. According to ref. [@Raghavan1], in their Figs. 5(c) and 5(d), $z(0)=0.7$ and $0.98$ mark the two different types of $\pi -$phase MQST since they are on either side of the stationary state value of $z_s=%
\sqrt{1-1/\Lambda ^2}$. In this case, along the direction of the horizontal line from left to right, we should enter Type I first ($z(0)=0.7<0.92$), then Type II($z(0)=0.98>0.92$). But this is not the case, instead we enter Type II first. The horizontal line cuts the two curves at $z_3=0.6$ and $%
z_s=0.92,$ with the latter corresponding to a point-like trajectory in Fig. 5d of ref. [@Raghavan1] at $z=0.92,\phi =\pi .$ Another possibility is that although the initial value $z(0)=0.7<0.92$ but the average value $%
\left\langle z\right\rangle $ $>0.92$. However, from eq. (\[zapi\]), we find that in both cases, i.e. for $z(0)=0.7$ and $0.98$, we have $%
\left\langle z\right\rangle $ $<0.92$.
A solution to this dilemma is to define the MQST types I and II as follows: $$\begin{aligned}
\text{MQST Type I } &\Leftrightarrow &\left\langle z\right\rangle <z(0)
\label{type12n} \\
\text{MQST Type II } &\Leftrightarrow &\left\langle z\right\rangle >z(0)
\nonumber\end{aligned}$$ instead of (\[type12\]). Under this novel definition we can explain the phase diagrams as follows: For $z(0)=0.7$ the average population difference $%
\left\langle z\right\rangle >0.7$ which is obviously Type II, while for $%
z(0)=0.98$ we have $\left\langle z\right\rangle <0.98$ which is type I according to this definition. Therefore, along the direction of the horizontal line from left to right, we enter Type II first ($\left\langle
z\right\rangle >z(0)=0.7$), then Type I($\left\langle z\right\rangle
<z(0)=0.98$). At the threshold point, the average value coincides with the initial value, $\left\langle z\right\rangle =z(0)=z_s=0.92,$ and the trajectory shrinks to a point. We also notice that the oscillation trajectories for $z(0)=0.8$ and $0.98$ are the same. However, they belong to different regions of MQST. In Table II we illustrate the oscillation behavior of a $\pi -$phase mode when the value of $z(0)$ is increased while keeping $\Lambda =2.5$, which can be regarded as an additional remark to Figs. 5c and 5d in ref. [@Raghavan1]. A further evidence of the correctness of the criterion (\[type12n\]) comes from the fact that from the analytical result for the average population imbalance in the $\pi -$phase mode, that is, eq. (\[zapi\]), we can derive the second critical condition for $\Lambda ,$ $$\left\langle z\right\rangle =z(0)\Rightarrow \Lambda _s=\frac 1{\sqrt{%
1-z^2(0)}}$$ which agrees with eq.(\[lambdas\]). And in the case of the $0-$phase mode there is no solution for $\left\langle z\right\rangle =z(0)$ with $%
\left\langle z\right\rangle $ determined by eq.(\[za0\]), indicating that the self-trapping can only appear as MQST type I($\left\langle
z\right\rangle <z(0)$).
$\pi -$[**phase mode for fixed value** ]{}$\Lambda =2.5\bigskip $
--------------------------------------------------------------------------------------------------------------------
$z(0)$
----------------- --------------------------------- ------------------------------ ---------------------------------
$0$ double-well with $W_0$ pinched always
just on the top of the barrier at $z(0)=0$ MQST
$0<z(0)<z_3$ $W_0$ under the barrier whose unbounded running-phase
height increases with $z(0)$ MQST
$z(0)=z_3=0.6$ barrier height increases $\phi |_{z=1}=\pi /2,$ boundary between
continuously with $z(0)$ $\frac{d\phi }{dz}|_{z=1}=0$ unbounded and localized $\phi $
$z_3<z(0)<z_s$ barrier height increases localized bounded MQST
continuously with $z(0)$ around $\pi $ type II with $\left\langle
z\right\rangle >z(0)$
$z(0)=z_s=0.92$ barrier attains shrinks to point-like boundary between
its maximum height trajectory at $\pi $ MQST type I and type II
$z_s<z(0)<1$ barrier height decreases expands but bounded MQST
with increasing $z(0)$ again localized type I with $\left\langle
z\right\rangle <z(0)$
$z(0)=1$ barrier height decreases to the agrees bounded MQST
same height as $z(0)=0.6$ with $z(0)=0.6$ type I with $\left\langle
z\right\rangle <z(0)$
--------------------------------------------------------------------------------------------------------------------
Thomas-Fermi Approximation and Beyond
=====================================
The macroscopic wave function $\Phi $ associated with the ground state of a dilute Bose gas confined in the potential $V_{ext}(r)$ obeys the GPE (\[gpe\]), which can be obtained alternatively using a variational procedure: $$i\hbar \frac \partial {\partial t}\Phi =\frac{\delta E}{\delta \Phi ^{*}},$$ where the energy functional $E$ is defined by $$\begin{aligned}
E[\Phi ] &=&\int d^3{\bf r}\left[ \frac{\hbar ^2}{2m}\left| \nabla \Phi
\right| ^2+V_{ext}({\bf r})\left| \Phi \right| ^2+\frac{g_0}2\left| \Phi
\right| ^4\right] \nonumber \\
&=&E_{kin}+E_{ho}+E_{int}. \label{ef}\end{aligned}$$ The three terms in the integral are the kinetic energy of the condensate $%
E_{kin}$, the (an)harmonic potential energy $E_{ho}$, and the mean–field interaction energy $E_{int}$, respectively. By direct integration of the GPE (\[gpe2\]) one finds the useful expression $$N\mu =E_{kin}+E_{ho}+2E_{int} \label{mucom}$$ for the chemical potential in terms of the different contributions to the energy functional (\[ef\]). Further important relationships can be found by means of the virial theorem $$2E_{kin}-2E_{ho}+3E_{int}=0 \label{virial}$$ and the thermodynamic definition of the chemical potential $$\mu =\partial E/\partial N. \label{muth}$$ It was shown[@Dalfovo1; @Baym] that the ground state properties of the trapped Bose gas with repulsive interactions may be described quite accurately for a sufficiently large number of particles $N$ by a Thomas-Fermi approximation(TFA), in which the kinetic energy, which is also usually named quantum pressure, is neglected completely. One then gets the density profile in the form $$n({\bf r})=\phi ^2({\bf r})=g_0^{-1}\left[ \mu -V_{ext}({\bf r})\right]
\label{den}$$ in the region where $\mu >V_{ext}({\bf r}),$ and $n({\bf r})=0$ outside. In the simplest case of an isotropic harmonic trap $V_{ext}(r)=m\omega
_0^2r^2/2 $, the normalization condition on $n({\bf r})$ provides the relation between chemical potential and number of particles $$\mu _{TF}=\frac{\hbar \omega _0}2\left( \frac{15Na}{a_{ho}}\right) ^{2/5}
\label{mutf}$$ where the harmonic oscillator length $a_{ho}=(\hbar /m\omega _0)^{1/2}$ is introduced for simplicity. The density profile (\[den\]) has the form of an inverted parabola, which vanishes at the classical turning point ${\bf R}$ defined by the condition $\mu _{TF}=V_{ext}({\bf R})$. For a spherical trap, this implies $\mu _{TF}=m\omega _0^2R^2/2$ and using result (\[mutf\]) for $\mu _{TF}$, one finds the following expression for the radius of the condensate $$R=a_{ho}\left( \frac{15Na}{a_{ho}}\right) ^{1/5} \label{rtf}$$ which grows with $N$. The energy components assume the following simple values in the TFA $$\frac{E_{kin}}N=0,\qquad \frac{E_{ho}}N=\frac 37\mu _{TF},\qquad \frac{%
E_{int}}N=\frac 27\mu _{TF}.$$
The above results are obtained by neglecting the kinetic energy term $%
E_{kin} $ in the GPE and provide an accurate description of the exact solution in the interior of the atomic cloud where the gradients of the wave function are small. This approximation does not, however, take properly into account the decay of the wave function near the outer edge of the cloud, and the Thomas-Fermi wave function (\[den\]) consequently leads to unphysical behavior for some properties, most notably the logarithmically divergence of the kinetic energy arising at the turning point. A good approximation for the density in the region close to the classical turning point can be obtained by a suitable expansion of GPE (\[gpe2\]). In fact, when $%
\left| r-R\right| \ll R$, the trapping potential $V_{ext}(r)$ can be replaced by a linear ramp, $m\omega _0^2R(r-R)$, and the GPE takes a universal form[@Dalfovo2; @Lundh], yielding the rounding of the surface profile. Using this procedure it is possible to calculate the kinetic energy which, in the case of a spherical trap, is found to follow the asymptotic law[@Dalfovo2] $$\frac{E_{kin}}N\simeq \frac 52C,\qquad C=\frac{\hbar ^2}{mR^2}\ln \left(
\frac R{1.3a_{ho}}\right) . \label{kin}$$ Analogous expansions can be derived for the harmonic potential energy $%
E_{ho} $ and interaction energy $E_{int}$ in the same large $N$ limit[@Fetter]. A straightforward derivation is obtained by using nontrivial relationships among the various energy components. A first relation is given by the virial theorem (\[virial\]). A second one is obtained by using expressions (\[mucom\]) and (\[muth\]) for chemical potential. These two relationships, together with the asymptotic law (\[kin\]) for the kinetic energy, allow one to obtain the expansions $$\frac{E_{ho}}N=\frac 37\mu _{TF}+C,\qquad \frac{E_{int}}N=\frac 27\mu
_{TF}-C.$$ Correspondingly the chemical potential in TFA is modified beyond TFA as $$\mu =\mu _{TF}+\frac 32C. \label{mub}$$
We may now first calculate the two relevant quantities in the Bose Josephson Junction, i.e., the zero-point energy in each well $E_{1,2}$ in eq.(\[e\]) and the atomic self-interaction energies $U_{1,2}$ in eq.(\[u\]) both in TFA and beyond it, leaving the third one, the tunneling amplitude $K$, to the next section. We note that in the derivation above, the wave function is normalized to $N$. If one uses instead a wave function normalized to unity, the following correspondence should be realized $$U_{1,2}N_{1,2}\rightarrow 2\frac{E_{int}}N,\qquad E_{1,2}\rightarrow \frac{%
E_{kin}}N+\frac{E_{ho}}N.$$ Setting the initial population difference $z(0)=0$ as in ref.[@Smerzi1],i.e., $N_1=N_2=N$, we obtain the ground state energy $E_{1,2}$ and the interaction self energy $U_{1,2}N_{1,2}$ for the isolated traps beyond the TFA $$E_{1,2}=\frac 37\mu _{TF}+\frac 72C,\qquad U_{1,2}N_{1,2}=\frac 47\mu
_{TF}-2C, \label{eub}$$ while for TFA the correction terms disappear and these energies take simpler forms $$E_{1,2}=\frac 37\mu _{TF},\qquad U_{1,2}N_{1,2}=\frac 47\mu _{TF}.
\label{eutfa}$$ Considering a condensate of $N=5000$ sodium atoms confined in a symmetric spherical trap with frequency $\omega _0=100Hz$, we have the results beyond the TFA, $E_{1,2}=1.18n{\rm K},U_{1,2}N_{1,2}=1.03n{\rm K}$, and in TFA $%
E_{1,2}=0.9n{\rm K},U_{1,2}N_{1,2}=1.19n{\rm K}$, quite close to the values estimated in ref.[@Smerzi1].
Calculation of the Tunneling Amplitude between two Trapped Condensates
======================================================================
In this section we give a rigorous derivation of the amplitude of the atomic tunneling at zero temperature between two nonideal, weakly linked condensates in a double well trap. This induces a coherent, oscillating flux of atoms between wells, that is a signature of the macroscopic superposition of states in which the condensates evolve. To date there have been no reports of experimental observations of Josephson tunneling of a condensate in a double well trap. Josephson tunneling of a condensate in a one dimensional optical lattice was reported in ref. [@Anderson1] and by controlling relative strengths of the tunneling rate between traps and atom-atom interactions within each trap, this technique has been used to produce atom-number-squeezed states in this lattice potential[@Orzel]. The analogy of the tunneling mechanism in a two-well potential and an array of wells makes it important to calculate the tunneling amplitude explicitly.
The quantity $K$ in eq.(\[k\]) corresponds to the tunneling amplitude which can be calculated by different methods, and we demonstrate in this work the use of the nonperturbative instanton approach. The nonlinear interaction between the atoms in the same well will be included, which modifies only the chemical potential $\mu $ both in and beyond the TFA. It is easily shown that this tunneling amplitude is just the quantity ${\cal R}$ of [@Milburn] (up to a minus sign), if one observes the orthogonality property of the eigenfunctions eq.(\[orth\]), with $\Phi _{1,2}({\bf r})$ the local modes in each well. We study the amplitude for tunneling between the two condensates confined in the wells of an external double–well potential in the 3-dimensional $$V_{ext}({\bf r})=\frac{m\omega _0^2}{8x_0^2}(x^2-x_0^2)^2+\frac 12m\omega
_0^2y^2+\frac 12m\omega _0^2z^2$$ where we have assumed as in ref.[@Milburn] that the interwell coupling occurs only along $x$ and the wave function components in the other two dimensions are orthogonal and contribute a factor of unity. The two minima are located at $\pm x_0$ on the $x-$axis and the parabolic approximation to the potential in the vicinity of each minimum is $$\tilde{V}^{(2)}({\bf r}-{\bf r}_{1,2})=\frac 12m\omega _0^2\left[ (x\pm
x_0)^2+y^2+z^2\right] .$$ The barrier height between the two wells $$V_0=\frac 18m\omega _0^2x_0^2 \label{bh}$$ is assumed to be high enough so that the overlap between the wave functions relative to the two traps occurs only in the classically forbidden region where interaction can be ignored and one can safely use the WKB wave function approximately [@Dalfovo2] $$\Phi _{1,2}({\bf r})\sim \frac B{\left\{ 2m\left[ V_{ext}(r)-\mu \right]
\right\} ^{1/4}}\times \exp \left( -\sqrt{\frac{2m}{\hbar ^2}}\int_R^r\left[
V_{ext}(r)-\mu \right] ^{1/2}dr^{\prime }\right) \label{wkb}$$ with $B$ a properly selected coefficient. The direct integration of $K$ in eq.(\[k\]) using the above WKB wave functions is quite a difficult task, as already noticed in ref.[@Dalfovo2; @Zapata]. In the simplest case the local mode of each well was assigned in ref. [@Milburn] the harmonic oscillator single particle ground state wave function $$\Phi _{1,2}({\bf r})=\left( \frac{m\omega _0}{\hbar \pi }\right) ^{1/4}\exp
\left( -\frac{m\omega _0}{2\hbar }r^2\right)$$ and the tunneling frequency was obtained through simple integration of these Gaussian wave functions $$\Omega =\frac 2\hbar {\cal R}=\frac 2\hbar \int d{\bf r}\Phi _1^{*}({\bf r}%
)\left[ V_{ext}({\bf r})-\tilde{V}^{(2)}({\bf r}-{\bf r}_{1,2})\right] \Phi
_2({\bf r})=\frac{x_0^2}{a_{ho}^2}\omega _0e^{-x_0^2/a_{ho}^2}.
\label{fr-mb}$$ This result, however, is independent of the characteristic parameters of the trapped atoms, such as the number of the atoms, the chemical potential and the interatomic coupling constant, etc. This inadequacy is expected to be cured by means of the periodic instanton method presented in the following.
Alternatively in some references the authors[@Williams2] used the external double-well potential in the form $$V_{ext}({\bf r})=V_H({\bf r})+V_B({\bf r})$$ which is created by superimposing a harmonic trap $$V_H(\rho ,z)=m\omega _z^2(\lambda ^2\rho ^2+z^2)/2$$ and a Gaussian barrier along the $z$ axis $$V_B(z)=U_0\exp (-\frac{z^2}{2\sigma ^2}).$$ In their calculations, they considered a range of values for the trap frequencies $\omega _z$ and $\omega _\rho $, the barrier height $U_0$ and width $\sigma $, and the condensate population $N_c$. In the spherical or 1-dimensional case, one can also consider the time-dependent behavior by means of the variational ansatz[@Menotti]. Our observation is that in the vicinity of the tunneling region the above potential in the 1-dimensional case $$V_{ext}(x)=\frac 12m\omega _0^2x^2+U_0\exp \left( -\frac{x^2}{2\sigma ^2}%
\right)$$ can be well approximated by the double-well (\[vextx\]) considered in this paper for a variety of the geometric parameters of the trap.
Now we turn to the field theory description of the GPE, i.e. the periodic instanton method which can not only give the correct exponential contribution of the Euclidean action but also the prefactor. The equal population case with $N_1=N_2=N$ is assumed in the following calculations, due to the negligible effect of the slow time evolution of the number of particles $N_i(t)$[@Salasnich1]. To this end we consider a scalar field problem in a 1–dimensional time plus 1–dimensional space $$V_{ext}(x)=\frac{m\omega _0^2}{8x_0^2}(x^2-x_0^2)^2. \label{vextx}$$ After a Wick’s rotation $t=-i\tau $ the Euclidean–Lagrangian equation of motion for a finite chemical potential takes the form $$\frac 12m\left( \frac{dx}{d\tau }\right) ^2-V_{ext}(x)=-\mu . \label{mo}$$ The reason why we can handle a nonlinear problem by means of a linear equation of motion is that we discuss the tunneling behavior in the barrier region where the nonlinear interaction is negligibly small. However, there are obvious differences between the BEC tunneling system and the usual one-body problem, i.e. the nonlinear interaction contributes a finite chemical potential, which is just the integration constant on the right hand side of eq.(\[mo\]). The classical turning points on both sides of the barrier can be determined by the relation $V(x_{1,2})=\mu $ as suggested in ref. [@Dalfovo2]. For a noninteracting system the chemical potential approaches the ground state energy corresponding to the vacuum instanton case in [@Gildener; @Liang4].
Solving this Euclidean time classical equation in the usual way [@Liang4] one obtains the periodic instanton solution in terms of the Jacobian elliptic function $$x_c=2x_0\bar{k}b(\bar{k})/\omega _0%
%TCIMACRO{\func{sn}}
%BeginExpansion
\mathop{\rm sn}%
%EndExpansion
\left( b(\bar{k})\tau ,\bar{k}\right) \label{instanton}$$ where $%
%TCIMACRO{\func{sn}}
%BeginExpansion
\mathop{\rm sn}%
%EndExpansion
$ is a Jacobian elliptic function with modulus $\bar{k}$, and the parameters are defined as $$b(\bar{k})=\frac{\omega _0}2\sqrt{\frac 2{1+\bar{k}^2}},\qquad \bar{k}^2=%
\frac{1-u}{1+u},\qquad u=\sqrt{\frac \mu {V_0}} \label{bk}$$ with the imaginary time period $T=2{\cal K}(\bar{k})/b(\bar{k})$. The action for the half period can be calculated along the above instanton trajectory (\[instanton\]) $$S_c=\int_{-T/2}^{T/2}d\tau \left( \frac 12m(dx_c/d\tau
)^2+V_{ext}(x_c)\right) =W+\mu T/2$$ where $$W=\frac 23\frac{8V_0}{\omega _0}(1+u)^{1/2}\left( {\cal E}(\bar{k})-u{\cal K}%
(\bar{k})\right) . \label{w}$$ Here ${\cal E}(\bar{k})$ denotes the complete elliptic integral of the second kind with modulus $\bar{k}$. The frequency of tunneling between the two condensates is then given by the energy level splitting of the two lowest states, i.e. $\Omega =\Delta E/\hbar =2K/\hbar =2{\cal R}/\hbar $ and can be calculated by means of the path integral method as[@Liang4] $$\Omega =\frac 1\hbar Ae^{-W/\hbar }=\frac{\sqrt{1+u}}{2K(\bar{k}^{\prime })}%
\omega _0\exp \left[ -\frac W\hbar \right] . \label{fr-pim}$$ We emphasize here that an explicit prefactor $A$ is included in this formula, which has been proven to be valid for the entire region when the chemical potential is below the barrier height. A remarkable feature of this periodic instanton result for the tunneling frequency is that it depends on the chemical potential $\mu $, or equivalently the number of the trapped atoms $N$ through eqs. (\[mutf\]) or (\[mub\]). This result will affect the conclusion about the observation of the MQST, as will be shown in next section. When the chemical potential approaches the top of the barrier, i.e. $$V_0=\mu$$ the periodic instanton solution (\[instanton\]) becomes the trivial configuration $x_c=0$ with a name “sphaleron” which means “ready to fall”[@Manton], where a type of quantum-classical transition may occur[@Liang1]. From the eqs.(\[mutf\]) and (\[bh\]), in the TFA this means $$x_0=2R=2a_{ho}\left( \frac{15N_Ta}{2a_{ho}}\right) ^{1/5} \label{x01tf}$$ where $N_T=N_1+N_2$ is the total number of atoms in both wells together. Therefore for a specific type of trapped atoms and a given double–well potential with separation $x_0$ (the number of atoms$N_T$) there exists a critical number of atoms $N_{c1}$ (critical separation $x_{c1}$) determined by the above equation, below (above) which the tunneling process will give the main contribution to the tunneling amplitude. However, above this critical number of atoms or below this critical separation value another process, i.e. the over–barrier activation will dominate (which is definitely not “thermal activation” as in spin tunneling since the temperature is zero) (cf. Fig. 3). Between these two processes there exists a crossover. A more explicit condition for this critical number of atoms (separation between the two minima) can be derived beyond the TFA from eqs.(\[mub\]) and (\[bh\]), i.e. $$x_0=2R\sqrt{1+\frac 35\left( \frac{15N_Ta}{2a_{ho}}\right) ^{-4/5}\ln \left(
\frac{15N_Ta}{2a_{ho}1.3^5}\right) }. \label{x01b}$$ As an example, we consider two weakly–linked condensates of $N_T=10^4$ sodium atoms, confined in two symmetric spherical traps with frequency $%
\omega _0=100Hz$ as in ref. [@Smerzi1]. The critical value for $x_{c1}$ is $x_{c1}=24.58\mu m$ or more accurately $x_{c1}=25.29\mu m$. We note that here the height of the potential barrier is $V_0=2.21$[nK]{} and the ground state is located at $\hbar \omega _0/2=0.38$[nK]{} so that there are several energy levels beneath the barrier height. This means the interaction between the atoms contributes to the chemical potential, which effectively raises the classical turning points to a remarkably high level. Although the atoms remain in the ground state, the interaction energy is so strong that the vacuum instanton method can no longer be applied. We have to resort to the periodic instanton method, as will be shown below.
![3 different processes through which the condensates can interchange atoms with the corresponding critical parameters of the boundaries.](fig3.eps)
We now consider the “low-energy” or “non-interacting” limit, $\mu
\rightarrow 0$. As in the case of a uniform Bose gas, the number of atoms in the ground state can be macroscopic, i.e., of the order of the total number in one potential well, when the chemical potential becomes equal to the energy of the lowest state, which, in our 1–dimensional case here, is $\mu
\rightarrow \mu _c=\frac 12\hbar \omega _0$. The lower boundary for the chemical potential in fact implies that $$\mu _c=\frac 12\hbar \omega _0=\frac 12m_0\omega _0^2R_c^2\rightarrow R_c=%
\sqrt{\frac \hbar {m_0\omega _0}}=a_{ho},$$ i.e. the radius of the condensate should never be less than the harmonic oscillator length $a_{ho}$. We thus have a result similar to that in the vacuum instanton case[@Liang4] and the “low energy” limit here is only meaningful in this sense. Expanding eq. (\[fr-pim\]) far below the barrier height, i.e., around the modulus $k\rightarrow 1$, or equivalently evaluating the tunneling amplitude in the vacuum instanton method [@Liang4], we obtain for the tunneling frequency $$\Omega =2\sqrt{\frac{6S_c}{\pi \hbar }}\omega _0\exp \left( -S_c/\hbar
\right) \label{fr-vacuum}$$ with the Euclidean action $$\frac{S_c}\hbar =\frac 23\frac{8V_0}{\hbar \omega _0}=\frac 23\frac{x_0^2}{%
a_{ho}^2}.$$ This result can be compared with that of ref. [@Milburn], eq. (\[fr-mb\]), which, however, gives not only a smaller exponential contribution $$\frac{S_c}\hbar =\frac{8V_0}{\hbar \omega _0}=\frac{x_0^2}{a_{ho}^2},$$ (there is a $2/3$ factor) but also an inaccurate prefactor $$A=\omega _0S_c/\hbar .$$ The source of this inaccuracy is the adoption of the too simple harmonic oscillator wave function of a single particle, which obviously oversimplifies the Bose–Einstein condensation tunneling problem. At least one should use the WKB wave function (\[wkb\]) in the tunneling region, and it can be shown that this corresponds to the vacuum instanton result we present here. For the agreement between WKB and vacuum instanton methods we refer to ref. [@Achuthan].
We clarify here some features about the two-mode approximation. It is only when there are many energy levels in each well and the barrier height is very large that the tunneling behavior can be well defined. As already pointed out in ref. [@Milburn], the potential should be such that the two lowest states are closely spaced and well separated from higher levels of the potential, and that many-particle interactions do not significantly change this situation. This assumption permits a two-mode approximation to the many-body description of the system and requires that $x_0\gg a_{ho}$. In the example considered in ref.[@Milburn] the harmonic length is estimated to be $a_{ho}=1.66\mu m$ for sodium atoms in a double–well trap with $\omega _0=1kHz$. The two–mode approximation requires that there are at least two levels beneath the barrier, i.e. $$V_0=\frac 18m\omega _0^2x_0^2\gtrsim \frac 32\hbar \omega _0,$$ which means the minimum separation $x_0$ should be larger than $5.76\mu m$. For this separation eq. (\[fr-mb\]) gives the tunneling frequency $\Omega
\sim 0.0737Hz$, whereas the vacuum instanton result from (\[fr-vacuum\]) is $\Omega \sim 2.62Hz$; however, it is expected to reach 37% of $\omega _0$ in ref. [@Milburn], that is $370Hz$(from eq.(\[fr-mb\]) we know this frequency can be achieved only at a quite small separation $x_0\sim 1.6\mu m$). This is obviously in contradiction. To remedy this, we notice that the periodic instanton result eq.(\[fr-pim\]) can reach a maximum frequency $%
\Omega \sim 150Hz$, which is a much higher one but for a quite small number of trapped atoms $N_{c1}\simeq 535$(Fig. 4). This can be easily understood as follows. The chemical potential for $5\times 10^5$ atoms in the realistic experiment of the MIT group in ref. [@Anderson2], $\mu =158.35$[nK]{}, lies much higher than the barrier height $V_0=11.46$[nK]{} if the two condensates are separated as close as $5.76\mu m$, leading to an unphysical parameter in eq.(\[bk\]) $u=\sqrt{\frac \mu {V_0}}$ which is larger than 1. In this case the periodic instanton method cannot apply and the over barrier activation process will dominate over the Josephson tunneling. In the language of Josephson junction the two condensates seem to be connected directly with each other and no barrier exists between them. From another viewpoint, for the separation smaller than $5.76\mu m$ we cannot put $%
5\times 10^5$ atoms in the double–well, i.e. the barrier seems no longer to exist for so many atoms and one cannot distinguish to which potential well the atoms belong and the oscillation is meaningless. The upper boundary for the trapped number of atoms can be estimated just to be $N_{c1}\simeq 535$ from eq.(\[x01b\]).
![ $N-$dependence of the tunneling frequency $\Omega $ for $%
\omega =1kHz,x_0=5.76\mu m$: Solid line is the result of periodic instanton method beyond the TFA, while dashed line that in TFA. The two horizontal lines are the results on noninteracting limit, one corresponds to that of ref.[@Milburn], another is from the vacuum instanton method. Inset: $%
\omega =100Hz,x_0=30\mu m.$ In both cases the constant results are negligibly small comparing to the $N-$dependent frequencies.](fig4.eps)
In Fig. 4 we show the $N-$dependence of the tunneling frequency $\Omega $ both for a chemical potential in TFA (\[mutf\]) and beyond it (\[mub\]). The periodic instanton results obviously lead to a rapidly growing behavior for the tunneling frequency when the chemical potential, i.e. the number of atoms is increased. The results of ref. [@Milburn] eq.(\[fr-mb\]) and that from the vacuum instanton method eq.(\[fr-vacuum\]) are also shown as horizontal lines.
Observation of Macroscopic Quantum Self Trapping
================================================
We are now in a position to discuss the optimal conditions for observation of the Josephson oscillation and the MQST effects. According to ref. [@Smerzi1], for a fixed value of the initial population imbalance $z(0)$ and phase difference $\phi (0)$, if the parameter $\Lambda $ exceeds a critical value $\Lambda _c$ in eq.(\[lambdac\]), the population becomes macroscopically self–trapped with a nonzero average population difference $%
\left\langle z\right\rangle $. There are different ways in which this state can be achieved, and all of them correspond to the so-called MQST condition eq.(\[mqst\]). Similar results were obtained in ref.[@Milburn] for the case that all atoms are initially localized in one well and it is concluded that the self-trapping will occur when the total number of the trapped atoms $N_T$ exceeds a critical value $N_{c2}$ determined by $$N_{c2}=\frac{2\hbar \Omega }{g_0}V_{eff}=\frac{4K}{U_{1,2}} \label{nc2mb}$$ where $V_{eff}^{-1}=\int d{\bf r\Phi }_{1,2}^4({\bf r})$ is the effective mode volume of each well. For this special case $z(0)=1$, the critical value $\Lambda _c$ is shown to be $\Lambda _c=2$ for any initial phase difference $%
\phi (0)$ and eq.(\[nc2mb\]) is obviously identical with the MQST condition $UN_T>4K$ from eq.(\[mqst\]).
The parameters $UN_T$ and $K$, however, are considered as $N-$independent constants in refs.[@Smerzi1; @Milburn]. Considering the fact that they depend actually on the number of the trapped atoms $N$ as in our calculation above, we can refine the conclusions of refs. [@Smerzi1; @Milburn]. To access the region of self–trapping, that is, $\Lambda =\frac{UN_T}{2K}%
>\Lambda _c$, it is better to lower the value of $K$ by making a higher barrier height $V_0=\frac 18m\omega _0^2x_0^2$ through increasing the separation $x_0$ or the oscillation frequency $\omega _0$, than to increase the number of atoms as suggested in ref. [@Smerzi1]. In fact, the quantity $UN_T$ here is proportional to $\mu _{TF}\sim N^{2/5}$ as shown in eqs.(\[eutfa\]) and (\[mutf\]), which means that increasing the number of atoms will not increase the interaction energy significantly, and at the same time the tunneling amplitude will be increased more drastically(Fig. 4). Thus, contrary to the observations in ref. [@Smerzi1; @Milburn], we find that the MQST will occur when the number of atoms is smaller (instead of larger) than a critical value $N_{c2}$, i.e. we should decrease the number of atoms instead of increasing it (Fig. 3). Inserting the values of the interaction energy eq.(\[eutfa\]) or eq.(\[eub\]), the chemical potential eq.(\[mutf\]) or eq.(\[mub\]) and the tunneling amplitude (\[fr-pim\]) into eq.(\[mqst\]) we may obtain this critical number of atoms for a given potential geometry in TFA $$8\mu _{TF}=7\Lambda _c\hbar \Omega _{TF},$$ or beyond it $$8\mu _{TF}-28C=7\Lambda _c\hbar \Omega _b$$ where $\Omega _{TF}$ and $\Omega _b$ are the tunneling frequencies in eq.(\[fr-pim\]) with the chemical potential $\mu $ taking the values in TFA and beyond it, respectively.
The parameters which can be adjusted are the number of atoms $N_T$, the oscillation frequency $\omega _0$, and the separation distance between the two condensates $x_0$. Fig 3 shows the three different regions for different numbers of atoms and distances between the potential wells. When $x_0$ ($N_T$) is smaller (larger) than the critical value $x_{2c}$($N_{c2}$), the atoms will oscillate between these two potential wells. Once we increase the separation above (or decrease the number of atoms below) this critical value, the MQST will occur, i.e., most of the atoms will tend to remain in their appropriate wells, leading to only a small oscillation around a fixed population difference.
![ Critical line for MQST effect. Solid line: results beyond TFA where the parameters take the values $UN_T=8/7\mu _{TF}-4C$ and $\mu =\mu
_{TF}+3C/2$. Dashed line: TFA results where $UN_T=8/7\mu _{TF}$ and $\mu
=\mu _{TF}$ are used in the numerical simulation.](fig5.eps)
We take the initial condition for the population difference to be $z(0)=0.4$ and the zero–phase case $\phi (0)=0$ as an example. Other cases with, for example, a non–zero phase difference give rise to only a different critical parameter $\Lambda _c$. For sodium atoms confined in the double–well potential with $\omega _0=100Hz$, we show numerically in Fig. 5 the critical line between the three different regions in TFA and beyond it. The upper region marks the self–trapping region, the lower the over–barrier activation. Quantum tunneling occurs only for a small range of the parameter. In the experiment [@Andrews], the barrier was generated by an off-resonance (blue detuned) laser beam. To make our results more applicable to experiment we denote on the right vertical axis the corresponding barrier height in units of [nK]{}. We also find that the tunneling will be suppressed when the separation or the number of atoms satisfies $x_0>28\mu m$ or $N_T>12500$ (in TFA $x_0>26\mu m$ or $N_T>12000$). The crossover will occur directly between the self–trapping and the over–barrier regions, quite similar to the first–order transition in spin tunneling[@Liang1]. The self trapping region is very easy to access considering the easier decrease of the tunneling amplitude.
Secondly, from the solution for $z(t)$ in eqs.(\[cn\]) and (\[dn\]) we can define maximum amplitudes of oscillation. For equal populations initially, i.e. $z(0)=0$, we have $H_0=-\cos \phi (0)$, and the amplitude $$C=\frac 1\Lambda \left[ 2\left( \sqrt{\Lambda ^2+1+2\Lambda \cos \phi (0)}%
-\Lambda \cos \phi (0)-1\right) \right] ^{1/2}. \label{am}$$ For $\Lambda >2$, there is only 1 maximum, i.e., $\phi (0)=\pi $. For $%
\Lambda <2,$ however, $\phi (0)=\pi $ is a minimum, while two maxima correspond to $\cos \phi (0)=-\Lambda /2$. Consequently from eq. (\[am\]) we have for $\Lambda >2$$$z_{\max }=2\sqrt{\Lambda -1}/\Lambda \label{zmax}$$ and for $\Lambda <2$$$z_{\max }=1$$ We claim here that the result for the maximum amplitude eq.(26) of ref. [@Williams2] is not relevant, in which the author erroneously took $\phi
(0)=\pi /2$ as a maximum. If instead the initial population difference is nonzero, in ref.[@Williams2] the author obtained the same result for the maximum amplitude as eq.(\[zmax\]) by setting $\phi (0)=0$ in eq.(\[lambdac\]). However, we show here this is not true for $\phi (0)=\pi $ because for the $\pi -$phase mode it is when $z(0)>2\sqrt{\Lambda -1}%
/\Lambda $ that the Josephson oscillation will occur[@Raghavan1]. In this case eq.(\[zmax\]) gives the minimum amplitude instead of the maximum one. As already shown in Section III, the oscillation amplitude in the $0-$phase mode is just the initial value of population imbalance $z(0)$, while in the more interesting $\pi -$phase mode, we plot the amplitude eq.(\[amppi\]) as a function of $z(0)$ in Fig. 6 for different values of $\Lambda $. It is clear that the amplitudes in the $\pi -$phase mode are always larger than those in the $0-$phase mode. The straight slope line is the result of the $0-$phase mode. For small values of $\Lambda $, the amplitudes join the slope line when $z(0)>z_s=\sqrt{1-1/\Lambda ^2}$, with this critical value $%
z_s$ increasing with $\Lambda $, and finally approaching 1 for very large $%
\Lambda $. At a special value of $\Lambda =2,$ it is seen that the oscillation amplitude can reach 1 even for a zero initial population imbalance. For very large $\Lambda $ the amplitudes in these two cases agree tangentially with each other. However, from Fig. 2, the condensates will be self trapped for any initial population imbalance if $\Lambda >2$, making the Josephson tunneling unobservable.
![ The oscillation amplitude for $0-$ and $\pi -$phase modes. The slope line is the result of $0-$phase mode, whereas others are results for different values of $\Lambda $, as indicated in the figure. The arrows indicate the critical value $z_s$, which increases with $\Lambda $ and finally approaches 1 for very large $\Lambda $.](fig6.eps)
Conclusions
===========
We have shown that the periodic instanton method can be used to investigate the tunneling problem in BEC systems at zero temperature. In particular, some deficiencies of the earlier treatments are removed. First of all, the tunneling amplitude and the nonlinear interaction energy between the atoms which have been taken as constants in refs.[@Milburn; @Smerzi1], are calculated analytically in the Thomas–Fermi approximation and beyond it. The interesting features of the MQST effect are discussed is more detail and we observe the $N$–dependence of the tunneling amplitude $K$ and the self interaction energy $UN_T$. Secondly, the $N-$dependence of the tunneling frequency $\Omega$ manifests a rapidly growing behavior when the chemical potential, i.e., the number of atoms in the trapped condensate is increased. In this sense, the result of ref. [@Milburn] may be considered as that of a non-interacting approximation. Finnally, for the observations of Josephson oscillation and the self trapping effect, we suggest that one should use a small number of trapped atoms and change the barrier height through altering the separation $%
x_0$ or the oscillation frequency $\omega _0$ as is evident from the calculation of this paper. Furthermore the $\pi -$phase mode, that is, when the relative phase of the wave functions between the two condensates are opposite to each other, favors the observation of MQST, since a somewhat large $\Lambda $ will bring the system out of the region of Josephson tunneling. To observe the Josephson oscillation it is better one adjusts instead the system into the $0-$phase mode.
Recently direct observation of an oscillating atomic current has been reported in a one-dimensional array of Josephson junctions realized with $^{87} Rb$ atomic condensate [@Cataliotti]. The authors verified that the BEC’s dynamics on a lattice is governed by a discrete, nonlinear Schrödinger equation [@Trombettoni] which is common to a large class of nonlinear systems. They used a simple variational estimate, assuming a gaussian profile for the condensate in each trap, giving the value of tunneling amplitude $K$, and a chemical potential $\mu \sim 0.06V_0$ that is much lower than the potential barrier $V_0$. This confirms our prediction that one should use a small number of trapped atoms for the observations of Josephson oscillation. They also observed that the wave functions, as well as $K$, depend on the barrier height, however, leaving the analytical result unsolved. The instanton result can be extended to the investigation of the Bose-gas in such a periodic optical lattice [@Trombettoni], the two-component spinor condensates, or even the metastability in the case of attractive interaction. Work along this direction is in progress.
It is a great pleasure to thank J. E. Williams, F. Dalfovo, A. Smerzi, X.–B. Wang, W.–D. Li and J.–Q. Liang for useful discussions. Y.Z. acknowledges support by an Alexander von Humboldt Foundation Fellowship. This research was supported in part by NSFC of China under grant No. 10075032.
M. H. Anderson, J. R. Ensher, M. R. Matthews, C. E. Wieman and E. A. Cornell, Science [**269**]{}, 198(1995); K. B. Davis, M.–O. Mewes, M. R. Andrews, N. J. van Druten, D. S. Durfee, D. M. Kurn and W. Ketterle, Phys. Rev. Lett. [**75**]{}, 3969(1995); C. C. Bradley, C. A. Sackett, J. J. Tollett and R. G. Hulet, [*ibid*]{} [**75**]{}, 1687(1995).
A. S. Parkins, D. F. Walls, Phys. Rep. [**303**]{}, 1(1998); F. Dalfovo, S. Giorgini, L. Pitaevskii and S. Stringari, Rev. Mod. Phys [**71**]{}, 463(1999); A. J. Leggett, Rev. Mod. Phys [**73**]{}, 307(2001).
D. S. Hall, M. R. Matthews, C. E. Wieman and E. A. Cornell, Phys. Rev. Lett. [**81**]{}, 1543(1998); M. R. Matthews, B. P. Anderson, P. C. Haljan, D. S. Hall, M. J. Holland, J. E. Williams, C. E. Wieman and E. A. Cornell, [*ibid*]{} [**83**]{}, 3358(1999).
M. R. Andrews, C. G. Townsend, H.–J. Miesner, D. S. Durfee, D. M. Kurn and W. Ketterle, Science [**275**]{}, 637(1997).
J. Javanainen, Phys. Rev. Lett. [**57**]{}, 3164(1986); S. Grossmann and M. Holthaus, Z. Naturforsch. Teil A [**50**]{}, 323(1995).
F. Dalfovo, L. Pitaevskii and S. Stringari, Phys. Rev. [**A54**]{}, 4213(1996).
W. Reinhard and C. W. Clark, J. Phys. B: At. Mol. Opt. Phys. [**30**]{}, L785(1997).
G. J. Milburn, J. Corney, E. M. Wright and D. F. Walls, Phys. Rev. [**A55**]{}, 4318(1997).
A. Smerzi, S. Fantoni, S. Giovanazzi and S. R. Shenoy, Phys. Rev. Lett. [**79**]{}, 4950(1997).
S. Raghavan, A. Smerzi, S. Fantoni and S. R. Shenoy, Phys. Rev. [**A59**]{}, 620(1999).
S. Raghavan, A. Smerzi, S. Fantoni and S. R. Shenoy, Int. J. Mod. Phys. [**B13**]{}, 633(1999).
I. Marino, S. Raghavan, S. Fantoni, S. R. Shenoy and A. Smerzi, Phys. Rev. [**A60**]{}, 487(1999); S. Raghavan, A. Smerzi and V. M. Kenkre, [*ibid* ]{}[**60**]{}, R1787(1999); A. Smerzi and S. Raghavan, [*ibid*]{} [**61**]{}, 063601(2000); S. Giovanazzi, A. Smerzi and S. Fantoni, Phys. Rev. Lett. [**84**]{}, 4521(2000).
M.W. Jack, M.J. Collett and D.F. Walls, Phys. Rev. [**A54**]{}, R4625(1996).
J. Javanainen and M. Wilkens, Phys. Rev. Lett. [**78**]{}, 4675(1997); A.J. Leggett and F. Sols, [*ibid*]{} [**81**]{}, 1344(1998); J. Javanainen and M. Wilkens, [*ibid*]{} [**81**]{}, 1345(1998).
J. Ruostekoski and D. F. Walls, Phys. Rev. [**A58**]{}, R50(1998); K. Molmer, [*ibid*]{} [**58**]{}, 566(1998); E. A. Ostrovskaya, Y. Kivshar, M. Lisak, B. Hall, F. Cattani and D. Anderson, [*ibid*]{} [**61**]{}, 031601(2000).
I. Zapata, F. Sols and A. J. Leggett, Phys. Rev. [**A57**]{}, R28(1998); A .J. Leggett and F. Sols, Found. Phys. [**21**]{}, 353(1991); F. Sols, Physica [**B 194-196**]{}, 1389(1994); S. Kohler and F. Sols, Phys. Rev. [**A63**]{}, 053605(2001).
J. Javanainen and M. Yu. Ivanov, Phys. Rev. [**A60**]{}, 2351(1999).
C. Menotti, J. R. Anglin, J. I. Cirac and P. Zoller, Phys. Rev. [**A63**]{}, 023601(2001); R. W. Spekkens and J. E. Sipe, [*ibid*]{} [**59**]{}, 3868(1999);
A. Imamoglu, M. Lewenstein and L. You, Phys. Rev. Lett. [**78**]{}, 2511(1997); Y. Castin and J. Dalibard, Phys. Rev. [**A55**]{}, 4330(1997); R. Graham, T. Wong, M. J. Collett, S. M. Tan and D. F. Walls, [*ibid*]{} [**57**]{}, 493(1998); J. I. Cirac, M. Lewenstein, K. Molmer and P. Zoller, [*ibid*]{} [**57**]{}, 1208(1998); M. J. Steel and M. J. Collett, [*ibid*]{} [**57**]{}, 2920(1998); P. Villain and M. Lewenstein, [*ibid*]{} [**59**]{}, 2250(1999); F. Meier and W. Zwerger, cond–mat/9904147.
A. Vardi and J. R. Anglin, Phys. Rev. Lett. [**86**]{}, 568(2001); L. Pitaevskii and S. Stringari, cond–mat/0104458.
J. R. Anglin, P. Drummond and A. Smerzi, cond–mat/0011440.
L. D. Landau and E. M. Lifshitz, [*Quantum Mechanics, 3rd ed.*]{} (Pergamon Press, Oxford, 1977); E. Merzbacher, [*Quantum Mechanics, 3rd ed.*]{}(John Wiley Sons Inc, 1998).
J.–Q. Liang, H. J. W. Müller–Kirsten, D. K. Park and F. Zimmerschied, Phys. Rev. Lett. [**81**]{}, 216(1998).
J.–Q. Liang, Y.–B. Zhang, H. J. W. Müller–Kirsten, J. G. Zhou, F. Zimmerschied and F.–C. Pu, Phys. Rev. [**B57**]{}, 529(1998).
J.–Q. Liang, H. J. W. Müller–Kirsten, Y.–B. Zhang, A. V. Shurgaia, S. P. Kou and D. K. Park, Phys. Rev. [**D62**]{}, 025017(2000).
D. K. Park, H. J. W. Müller–Kirsten and J.–Q. Liang, Nucl. Phys. [**B578**]{}, 728(2000).
L. Pitaevskii, Sov. Phys. JETP [**13**]{}, 451(1961); E. P. Gross, Nuovo Cimento [**20**]{}, 454(1961); J. Math. Phys. [**4**]{}, 195(1963).
L. Salasnich, A. Parola and L. Reatto, Phys. Rev. [**A60**]{}, 4171(1999); J. Williams, R. Wasler, I. Cooper, E. Cornell and M. Holland, [*ibid*]{} [**59**]{}, R31(1999)..
J. Williams, Phys. Rev. [**A64**]{}, 013610(2001)
F. K. Abdullaev and R. A. Kraenkel, Phys. Rev. [**A62**]{}, 023613(2000); cond–mat/0004117 and cond–mat/0005445
G. Baym and C. J. Pethick, Phys. Rev. Lett. [**76**]{}, 6(1996).
A. L. Fetter and D. L. Feder, Phys. Rev. [**A58**]{}, 3185(1998).
E. Lundh, C. J. Pethick and H. Smith, Phys. Rev [**A55**]{}, 2126(1997).
B. P. Anderson and M. A. Kasevich, Science [**282**]{}, 1686(1998).
C. Orzel, A. K. Tuchman, M. L. Fenselau, M. Yasuda and M. A. Kasevich, Science [**291**]{}, 2386(2001).
E. Gildener and A. Patrascioiu, Phys. Rev. [**D16**]{}, 423(1977).
J.–Q. Liang and H. J. W. Müller–Kirsten, Phys. Rev. [**D46**]{}, 4685(1992).
N. S. Manton and T. S. Samols, Phys. Lett. [**B207**]{}, 179(1988).
P. Achuthan, H. J. W. Müller–Kirsten and A. Wiedemann, Fortschr. Phys. [**38**]{}, 77(1990).
F. S. Cataliotti, S. Burger, C. Fort, P. Maddaloni, F. Minardi, A. Trombettoni, A. Smerzi, M. Inguscio, Science [**293**]{}, 884(2001).
A.Trombettoni and A. Smerzi, Phys. Rev. Lett. [**86**]{}, 2353(2001).
|
---
abstract: 'Gyratonic pp-waves are exact solutions of Einstein’s equations that represent non-linear gravitational waves endowed with angular momentum. We consider gyratonic pp-waves that travel in the $z$ direction and whose time dependence on the variable $u={1 \over \sqrt{2}}(z-t)$ is given by gaussians, so that the waves represent short bursts of gravitational radiation propagating in the $z$ direction. We evaluate numerically the geodesics and velocities of free particles in the space-time of these waves, and find that after the passage of the waves both the kinetic energy and the angular momentum per unit mass of the particles are changed. Therefore there is a transfer of energy and angular momentum between the gravitational field and the free particles, so that the final values of the energy and angular momentum of the free particles may be smaller or larger in magnitude than the initial values.'
author:
- |
J. W. Maluf$\,^{(1)}$, J. F. da Rocha-Neto$\,^{(2)}$,\
S. C. Ulhoa$\,^{(3)}$, and F. L. Carneiro$\,^{(4)}$\
Instituto de Física, Universidade de Brasília\
70.919-970 Brasília DF, Brazil\
title: 'Kinetic Energy and Angular Momentum of Free Particles in the Gyratonic pp-Waves Space-times'
---
PACS numbers: 04.20.-q, 04.20.Cv, 04.30.-w
Introduction
============
The field equations of the theory of general relativity admit a class of exact solutions that represent non-linear plane gravitational waves. These solutions are known as the Kundt family of space-times [@Kramer], and were thoroughly studied by Ehlers and Kundt [@Ehlers; @Ehlers-2]. They may describe short bursts of gravitational radiation. The idea is that far from the source we may approximate a realistic gravitational wave by an exact plane wave. Some of these non-linear plane waves are vacuum solutions of Einstein’s equations, and are idealized manifestations of the gravitational field, in similarity to the source-free wave solutions of Maxwell’s equations, which are excellent descriptions of realistic monochromatic plane electromagnetic waves. Ehlers and Kundt [@Ehlers; @Ehlers-2] asserted that the vacuum pp-waves (parallelly propagated plane-fronted waves) are geodesicaly complete (see Ref. [@Flores]), and also showed that one may add the amplitudes of two pp-waves running in the same direction, in which case the principle of linear superposition holds (section 2-5.3 of Ref. [@Ehlers]). They argue that this fact indicates a striking analogy with Maxwell’s theory.
Penrose [@Penrose] also investigated these waves, and concluded that “[*it is fair to assume that they*]{} (the non-linear gravitational waves) [*are no less physical (as idealizations) than their flat space couterparts*]{}”, although he also concluded that is not possible to imbed these waves globally in any hyperbolic pseudo-Euclidean space. The difficulty, according to Penrose, is that the total (gravitational) energy of such plane waves is infinite. However, the same feature takes place for idealized waves in flat space. It must be noted that the pp-waves do not imply or lead to the violation of any physical principle or physical property. They are ordinary manifestations of the theory.
Gyratonic pp-waves represent the exterior gravitational field of a spinning source that propagates at the speed of light. The exterior space-time of a localized spinning source, that moves at the speed of light, was first studied by Bonnor [@Bonnor], later by Griffiths [@Griffiths], and rediscovered by Frolov and collaborators [@Frolov-1; @Frolov-2; @Frolov-3; @Frolov-4], who attempted to relate this space-time with the model of spinning particles, the “gyratons”. The gyratonic pp-waves were recently investigated by Podolský, Steinbauer and Švarc [@Podolsky]. These authors studied several properties of the non-linear waves, such as the impulsive limit, the geodesic motion, and also emphasized the role of the off-diagonal components in the line element, that is described in terms of Brinkmann coordinates [@Brinkmann]. The gyratonic pp-waves are non-linear gravitational waves endowed with angular momentum.
In this article we evaluate the geodesics and velocities of free particles in the space-time of gyratonic pp-waves, by means of a numerical analysis, and show that there is not only a transfer of energy between the free particles and the gravitational wave [@arxiv2017], but also a transfer of angular momentum. Both transfers of energy and angular momentum between the particles and the field take place locally, i.e. in the regions where the particles are located. This is an argument in favour of the localization of gravitational energy. It does not seem reasonable to consider that a local variation of energy of a free particle is related to the instantaneous variation of the total gravitational energy, evaluated at spacelike (or null) infinity, for instance. We note that Ehlers and Kundt already investigated the action of a pp-wave on free particles initially at rest, and concluded that after the passage of the wave, the particles acquire velocities, both transverse and longitudinal to the wave (see section 2-5.8 of [@Ehlers]). We show in this article, as in Ref. [@arxiv2017], that the final energy of the particles may be smaller than the initial energy.
In section 2 we describe the gyratonic pp-waves, according to the presentation of Ref. [@Podolsky]. The graphic results are presented in section 3, and the final comments in section 4.
Gyratonic pp-waves
==================
The study of the gyratonic pp-waves emerged from the investigation by Bonnor [@Bonnor] and by Griffiths [@Griffiths] of the interior and exterior fields of a spinning “null fluid”, which is a configuration that travels at the speed of light. A review of this issue is given in section 18.5 of Ref. [@GP]. In the following we will adopt the presentation of Ref. [@Podolsky]. We will consider a wave that travels along the $z$ direction. The gyratonic source $(\varrho, j_i)$ is localized along the axis $x=y=0$, or in the immediate neighbourhood around this axis. The energy-momentum of the source is prescribed by the radiation density $T_{uu}=\varrho$, and by the terms $T_{ui}=j_i$ that represent the spinning character of the source. The line element is given in terms of Brinkmann coordinates [@Brinkmann], with an off-diagonal term. It is given by [@Podolsky]
$$ds^{2}=d\rho^{2}+\rho^{2}d\phi^{2}+2\,dudv-2J\,dud\phi+H\,du^{2}\,.
\label{1}$$
The integration of the field equations in the vacuum region, outside the matter source, imply that the functions $H=H(u,\rho,\phi)$ and $J=J(u,\rho,\phi)$ are periodic in $\phi$. The general form of these functions is [@Podolsky]
$$J=\omega(u)\rho^2+\chi(u,\phi)\,,
\label{2}$$
$$H=\omega^2(u)\rho^2+2\omega(u)\chi(u,\phi)+H_0(u,\rho,\phi)\,,
\label{3}$$
where $\omega(u)$ and $\chi(u,\phi)$ are arbitrary functions of $u$ and $(u,\phi)$, respectively. If $\chi$ is taken to be independent of the angular coordinate $\phi$, i.e., if $\chi=\chi(u)$, then the function $H_0$ must only satisfy the equation
$$\nabla^2 H_0=\biggl( {{\partial^2} \over{\partial x^2}}+
{{\partial^2} \over{\partial y^2}} \biggr)H_0=0\,.
\label{4}$$
We will adopt this simplification in the considerations below.
In flat space-time, the variables $u$ and $v$ are related to the ordinary time variable $t$ and to the usual cylindrical coordinate $z$ according to
$$u = {1\over {\sqrt{2}}}(z-t)\,,
\label{5}$$
$$v = {1\over {\sqrt{2}}}(z+t)\,.
\label{6}$$
We use the relations above to carry out a coordinate transformation of the metric tensor, from the $(u,\rho,\phi,v)$ coordinates to $(u,\rho,\phi,z)$ coordinates, so that the line element is rewritten as
$$ds^{2}=(H-2)du^{2}+d\rho^{2}+\rho^{2}d\phi^2 + 2 \sqrt{2}\,dudz-2J\,dud\phi\,.
\label{7}$$
The flat space-time is obtained if we make $H=J=0$. From the metric tensor above we obtain, by means of the standard procedure, the Lagrangian for a free particle of mass $m$ that travels along geodesics labelled by an affine parameter $\lambda$. The Lagrangian is given by
$$L= \frac{m}{2}\left[(H-2)\dot{u}^{2}+\dot{\rho}^{2}+\rho^{2}\dot{\phi}^{2}
+\sqrt{8}\,\dot{u}\dot{z}-2J\,\dot{u}\dot{\phi}\right]\,,
\label{8}$$
where the dot represents variation with respect to $\lambda$.
By solving the equations of motion we find, in similarity to the analysis of Ref. [@arxiv2017], that ${d\,}^2u/d\lambda^2=0$. As a consequence we may set $\dot{u}=1$, and thus we take the coordinate $u$ as the affine parameter along the geodesic. In this way, the set of geodesic equations read
$$\begin{aligned}
\ddot{\rho} + \partial_{\rho}J\dot{\phi} -
\rho \dot{\phi}^{2}-\frac{1}{2} \partial_{\rho}H&=&0 \,, \label{9} \\
\ddot{\phi} + \frac{2}{\rho}\dot{\rho}\dot{\phi}-
\frac{\partial_{\rho}J}{\rho^{2}}\dot{\rho}-
{1\over {2\rho^2}} \biggr[2\partial_{u}J
+\partial_{\phi}H \biggl]&=&0 \,, \label{10} \\
\ddot{z} + {1\over{\sqrt{2}\rho^{2}}}\biggr[\rho^{2}\partial_{\rho}H
-J\partial_{\rho}J\biggl]\dot{\rho}
-\frac{\partial_{\phi}J}{\sqrt{2}}\dot{\phi}^2+
\frac{\partial_{\phi}H}{\sqrt{2}}\dot{\phi}&{}& \nonumber \\
+{1\over {\sqrt{2}\rho}}\biggl[{2J-\rho
\partial_{\rho}J} \biggr] \dot{\rho}\dot{\phi}
+{1\over {\sqrt{8}\rho^2}}\biggl[{\rho^{2}\partial_{u}H
-J(\partial_{\phi}H+2\partial_{u}J)}\biggr]&=&0\,.\label{11}\end{aligned}$$
These equations are equivalent to the geodesic equations given by Eq. (75) of Ref. [@Podolsky], presented in the $(\rho,\phi,v)$ coordinates.
The function $\omega(u)$ is related to a rigid rotation of the space-time, and can be removed by a gauge transformation [@Podolsky]. Without loss of generality, we can make $\omega=0$. Therefore, the remaining arbitrary functions are
$$J=\chi(u)\,,
\label{12}$$
$$H=H_0(u,\rho,\phi)\,.
\label{13}$$
The $u$-dependence of these two functions will be given by gaussians, that represent short bursts of gravitational waves. We already discussed in Ref. [@arxiv2017] that in order to obtain qualitative features of the geodesic equations, it makes no difference whether we use gaussians or derivatives of gaussians. We note that in the analysis of the gravitational memory effect carried out in Ref. [@ZDGH2], use is made of the first, second and third derivatives of gaussians. The advantage of using the second derivative is that it dispenses a multiplicative dimensional constant in the metric tensor components [@arxiv2017]. By requiring $J=0$, we obtain the pp-wave considered in Refs. [@arxiv2017; @ZDGH2].
As for the $(x,y)$ or $(\rho,\phi)$ (where $x=\rho\cos\phi$ and $y=\rho\sin\phi$) dependence of the function $H_0$, that must satisfy Eq. (\[4\]), we will establish two possibilities. The first one is the $\times$ polarization. It reads
$$H_{0}=\frac{1}{2}(xy)\frac{d\,^{2}}{du^{2}}(e^{-u^{2}/\sigma^2})\,,
\label{14}$$
and the function $\chi(u)$ is chosen to be
$$\chi={1\over {10}} e^{-u^{2}/\sigma^2}\,.
\label{15}$$
which also represents a burst. In the expressions above, $\sigma$ is a constant with dimension of length. The multiplicative factor $1/10$ is introduced only for graphical reasons (for adjusting the figures). For our purposes, it makes no qualitative difference whether we use the $\times$ polarization, or the $+$ polarization given by $x^2-y^2$, instead of $xy$.
The second choice of $H_0$ is
$$H_{0}=\frac{1}{4}\lbrack \log (\rho/\rho_0)\rbrack
\frac{d\,^{2}}{du^{2}}(e^{-u^{2}/\sigma^2})\,,
\label{16}$$
and the $\chi$ function is given by
$$\chi= {1\over {10}} e^{-(0.1\,u^2/\sigma^2)}\,.
\label{17}$$
In Eqs. (\[16\]) and (\[17\]), not only $\sigma$, but also $\rho_0$ is a constant with dimension of length in natural units. For simplicity, both constants will be taken to be $\sigma=\rho_0=1$. Except for the second derivative of the gaussian, the function in Eq. (\[16\]) corresponds to the Aichelburg-Sexl type monopole [@Aichelburg].
The geodesic of free particles
==============================
In this section we present the graphical results obtained by solving the geodesic equations (\[9\]), (\[10\]) and (\[11\]) numerically, by means of the program MATHEMATICA. We also plot the Kinetic energy per unit mass $K$ of the free particles before and after the passage of the wave (in which case the space-time is flat), as a function of the variable $u$. In view of Eq. (\[5\]), $K$ is obtained from the equation
$$4K=\dot{\rho}^{2} + \rho^{2}\dot{\phi}^{2} + \dot{z}^{2}\,,
\label{18}$$
where the dot represents variation with respect to $u$ (we would have $2K$ on the left hand side, if the variation were with respect to $t$).
$H_0$ given by equation (\[14\])
--------------------------------
For the initial conditions given by
$$\label{eq:ini1}
\rho_{0}=0.3, \ \ \ \phi_{0}=0, \ \ \ z_{0}=0, \ \ \ \dot{\rho_{0}}=0,
\ \ \ \dot{\phi_{0}}=0,\ \ \ \dot{z_{0}}=0.2\,,
\label{19}$$
for $u=0$, we obtain the geodesic behaviour displayed in Figures \[1\] and \[2\], where both coordinates (Figure \[\[Figure1\]\]) and velocities (Figure \[\[Figure2\]\]) are given as functions of $u$.
![Velocities when $H_0$ is given by (\[14\]) and for the initial conditions (\[19\]).[]{data-label="Figure2"}](trajetorias1){width="\textwidth"}
![Velocities when $H_0$ is given by (\[14\]) and for the initial conditions (\[19\]).[]{data-label="Figure2"}](velocidades1){width="\textwidth"}
The trajectory of the free particle in the $x-y$ plane is plotted in Figure \[3\]. The initial state of the particle is in the upper part of the Figure. The particle acquires angular momentum during the passage of the gravitational wave, and then resumes the inertial movement along a straight line in the lower part of the Figure. It is clear that there is a transfer of angular momentum between the wave and the free particle. An analogous behaviour has been studied also in Ref. [@ZDGH2], but in the context of a pp-wave with $J=0$, with the polarization $x^2-y^2$.
![Trajectory in the $x-y$ plane when $H_0$ is given by (\[14\]) and for the initial conditions (\[19\]).[]{data-label="Figure3"}](2d1){width="17.00000%"}
We also choose an alternative set of initial conditions,
$$\rho_{0}=0.3, \ \ \ \phi_{0}=\frac{\pi}{3},\ \ \ z_{0}=0,\ \ \ \dot{\rho_{0}}=0,
\ \ \ \dot{\phi_{0}}=0, \ \ \ \dot{z_{0}}=0.2 \,,
\label{20}$$
also for $u=0$, where the only difference with respect to initial conditions (19) is the value of the initial angle $\phi_0$. The reason for choosing this alternative set is to show that the behaviour of the Kinetic energy per unit mass of the free particle is highly sensitive to the initial conditions. Figure \[\[Figure4\]\] displays the behaviour of the Kinetic energy by choosing the polarization given by Eq. (\[14\]), with the initial conditions (\[19\]). In Figure \[\[Figure5\]\] we see the behaviour of the Kinetic energy of the particle, after the passage of the wave, when the initial conditions are given by Eq. (\[20\]).
![Kinetic energy when $H_0$ is given by (\[14\]) and initial conditions (\[20\]).[]{data-label="Figure5"}](energia1){width="\textwidth"}
![Kinetic energy when $H_0$ is given by (\[14\]) and initial conditions (\[20\]).[]{data-label="Figure5"}](energia2){width="\textwidth"}
In view of Eq. (\[5\]), a positive variation of $u$ corresponds to a negative variation of the time coordinate $t$. Therefore, if $u$ grows from left to right in all Figures, the time coordinate $t$ grows from right to left. Thus, we see that in Figure \[\[Figure4\]\] the final Kinetic energy is smaller than the initial energy, whereas in Figure \[\[Figure5\]\] the final Kinetic energy is larger than the initial energy. This is exactly the behaviour discussed in Ref. [@arxiv2017]. The passage of a gravitational wave may either increase or decrease the energy of a free particle, and therefore there is a local transfer of energy between the particle and the wave.
In order to explore a little further the variation of the Kinetic energy, before and after the passage of the wave (but without the purpose of exhausting the investigation), we define the quantity
$$\Delta K={{K_f-K_i}\over {K_f+K_i}}\,,
\label{21}$$
where $K_f$ is the final Kinetic energy evaluated at $u=-5$, and $K_i$ is the initial Kinetic energy evaluated at $u=5$ ($\Delta t>0$, since $\Delta u <0$). Thus, the particle acquires or looses energy according to $\Delta K>0$ or $\Delta K<0$, respectively. Note that the gravitational wave considered here is not axially symmetric. Choosing the initial conditions (always for $u=0$),
$$\rho_{0}=0.1, \ \ \ z_{0}=0, \ \ \ \dot{\rho_{0}}=0,
\ \ \ \dot{\phi_{0}}=0, \ \ \ \dot{z_{0}}=0,
\label{22}$$
we obtain the behaviour displayed by Figure \[\[deltaK\]\], where $\Delta K$ varies with respect to $\phi_0$. It is possible to show that by increasing or decreasing the value of $ \dot{\rho_{0}}$ around $ \dot{\rho_{0}}=0$, the curve moves as a whole up or down in the Figure, respectively.
![Variation of the Kinetic energy with respect to $\phi_0$, in the initial conditions $(\ref{22})$.[]{data-label="deltaK"}](deltaK){width="60.00000%"}
$H_0$ given by equation (\[16\])
--------------------------------
Let us now consider the second choice for the function $H_0$, given by Eq. (\[16\]), together with $\chi(u)$ given by (\[17\]). In this case, the wave is axially symmetric. The initial conditions are chosen to be
$$\rho_{0}=0.6, \ \ \ \phi_{0}=0, \ \ \ z_{0}=0, \ \ \ \dot{\rho_{0}}=0,
\ \ \ \dot{\phi_{0}}=0, \ \ \ \dot{z_{0}}=0.2\,.
\label{23}$$
The geodesic behaviour and the velocities of a free particle under the action of the gravitational wave, for the initial conditions above, are displayed in Figures \[\[Figure7\]\] and \[\[Figure8\]\].
![Velocities when $H_0$ is given by (\[16\]) and for the initial conditions (\[23\]).[]{data-label="Figure8"}](trajetorias2){width="\textwidth"}
![Velocities when $H_0$ is given by (\[16\]) and for the initial conditions (\[23\]).[]{data-label="Figure8"}](velocidades2){width="\textwidth"}
The trajectory of a free particle in the $x-y$ plane is plotted in Figure \[\[Figure9\]\]. Similarly to the situation displayed in Figure \[\[Figure3\]\], the particle acquires angular momentum during the passage of the gravitational wave, and then resumes the inertial movement along a straight line. Both the initial and final trajectories of the particle are linear. These trajectories are in the upper and lower part of the Figure, respectively, and are almost vertical trajectories. In these regions, the particle is free and away of the gravitational field of the wave.
![Trajectory in the $x-y$ plane when $H_0$ is given by (\[16\]) and for the initial conditions (\[23\]).[]{data-label="Figure9"}](figura9.jpg){width="32.00000%"}
In the context of this gravitational wave, there also occurs a transfer of energy between the wave and the free particle. We observe here that one relevant feature is the sign of $\dot{\rho_{0}}$. Let us establish the initial conditions
$$\label{24}
\rho_{0}=0.6, \ \ \ \phi_{0}=0, \ \ \ z_{0}=0, \ \ \ \dot{\rho_{0}}=\pm 0.2,
\ \ \ \dot{\phi_{0}}=0, \ \ \ \dot{z_{0}}=0 \ .$$
For the initial conditions given above, the Kinetic energy of the particle increases or decreases after the passage of the wave, according to the sign of $\dot{\rho_{0}}$, as shown in Figures \[\[Figure10\]\] and \[\[Figure11\]\].
![Decreasing of the Kinetic energy for the initial conditions (\[24\]), and for negative sign of $\dot{\rho_{0}}$.[]{data-label="Figure11"}](energia3-2a){width="\textwidth"}
![Decreasing of the Kinetic energy for the initial conditions (\[24\]), and for negative sign of $\dot{\rho_{0}}$.[]{data-label="Figure11"}](energia3-2b){width="\textwidth"}
We recall that the dot represents variation with respect to $u$. Therefore, if $\dot{\rho_{0}}>0$, the particle is initially approaching the gyratonic source. Likewise, if $\dot{\rho_{0}}<0$, the particle is initially getting away from the source. As Figures \[\[Figure10\]\] ($\dot{\rho_0}>0$) and \[\[Figure11\]\] ($\dot{\rho_0}<0$) indicate, the particle gain or loose energy as it approaches or gets away from the source located around the axis $z=0$.
Still in the context of $H_0$ given (\[16\]), we display in Figures \[\[Figura12\]\] and \[\[Figura13\]\] the angular momentum per unit mass of the particle with respect to $u$. The definitions in polar coordinates are
$$\begin{aligned}
M_{x}&=&\sin{\phi}\left(\rho\dot{z}-z\dot{\rho}\right)-
\rho z\dot{\phi}\cos{\phi}\,, \nonumber \\
M_{y}&=&\cos{\phi}\left(z\dot{\rho}-\rho\dot{z}\right)-
\rho z\dot{\phi}\sin{\phi}\,, \nonumber \\
M_{z}&=&\rho^{2}\dot{\phi}\,.
\label{25}\end{aligned}$$
Figure \[\[Figura12\]\] is constructed taking into account initial conditions (\[23\]), whereas in Figure \[\[Figura13\]\] we consider the initial conditions (\[24\]), with $\dot{\rho_0}>0$. The two Figures clearly show the variation of the angular momentum of the free particle caused by the gravitational wave. The quantity $M^2=M_x^2 +M_y^2+M_z^2$ is conserved in the context of Figure \[\[Figura12\]\], but not in the context of Figure \[\[Figura13\]\]. This feature confirms that there is a transfer of angular momentum between the particle and the wave.
![Angular momentum of the particle for the initial conditions (\[24\]), and $\dot{\rho_0}>0$.[]{data-label="Figura13"}](momentoangular1){width="\textwidth"}
![Angular momentum of the particle for the initial conditions (\[24\]), and $\dot{\rho_0}>0$.[]{data-label="Figura13"}](momentoangular2){width="\textwidth"}
Final Comments
==============
The non-linear pp-waves, as investigated in Refs. [@Ehlers; @Ehlers-2], are simple, elegant and natural vacuum solutions of Einstein’s equations. Although they have been studied for a quite long time, it is reasonable to say that the full physical consequences of the non-linear waves have not been investigated so far. These waves share similarities with plane monochromatic electromagnetic waves, that are source-free solutions of Maxwell’s equations, and that yield an excellent description of electromagnetic radiation. Ehlers and Kundt showed that the principle of linear superposition holds to a certain extent for pp-waves, since one may add the amplitudes of two pp-waves that travel in the same direction (Ref. [@Ehlers], section 2-5.3). This fact supports the analogy between pp-waves and electromagnetic waves. Gyratonic pp-waves, on the other hand, are generated by a source that travels at the speed of light. Physically, these waves might be a realistic manifestation of the field equations. There is no physical principle or physical property that is violated by the existence of these waves. Therefore, they are legitimate manifestations of the theory of general relativity.
We have shown in this article that the Kinetic energy and the angular momentum per unit mass (also the linear momentum, but it has not been explicitly addressed here) of a free particle vary during the passage of a wave. In particular, the final Kinetic energy of a free particle might be smaller than the initial Kinetic energy. It seems clear that there is a local transfer of energy-momentum and angular momentum between the particle and the gravitational field of a wave. As a consequence, the wave may gain or loose energy as it travels in space. Ehlers and Kundt (Ref. [@Ehlers], section 2-5.8) investigated the action of a pp-wave in the form of a pulse on a cloud of dust particles at rest, and concluded that the particles acquire velocities after the pulse has swept the particles. They argue that this fact suggests convincingly that a cloud or particles is able to extract energy from a gravitational wave, as supported by Bondi [@Bondi]. However, this argument applies when the free particles are initially at rest. We have seen in this article that if the free particles are not initially at rest, then the cloud of particles may transfer (positive) energy to the gravitational wave.
One interesting extension of the present analysis is the consideration of impulsive gravitational waves, as carried out, for instance, in Refs. [@Podolsky-2; @Saemann; @Podolsky-3]. The profile of an impulsive wave is obtained from a single gaussian function, which can be normalised to 1 according to the expression,
$${1\over {\sigma \sqrt{2\pi}}}\int_{-\infty}^{+\infty} du \;
e^{-{(u^2/ 2\sigma^2})} =1\;,$$ and taking the limit $\sigma \rightarrow 0$. This limit cannot be taken in the present analysis, because we cannot introduce a dimensional amplitude in Eqs. (\[14\], \[16\]) (the second derivative of the gaussian is already of dimension (length)$^{ -2}$), and also because the second derivative of the gaussian cannot be normalised (the integral from $-\infty$ to $+\infty$ of the latter vanishes). The analysis of the action of impulsive gravitational waves on free particles will be carried out elsewhere, and compared to the results of Refs. [@Podolsky-2; @Saemann; @Podolsky-3].
The feature discussed in the present article does not take place in the context of linearised gravitational waves, in which case the wave is supposed to be unaffected by the medium, although it becomes linearised somehow. Moreover, a gravitational wave, linearised or not, imparts a memory effect to the detector, which must involve a transfer of energy-momentum and/or angular momentum to the detector. This issue, specifically in the context of linearised gravitational waves, must be investigated and satisfactorily explained on theoretical grounds.
[99]{}
D. Kramer, H. Stephani, M. A. H. MacCallum and H. Herlt, “Exact Solutions of the Einstein’s Field Equations”, Cambridge University Press, Cambridge, (1980).
J. Ehlers and W. Kundt, “Exact Solutions of the Gravitational Field Equations”, in “Gravitation: an Introduction to Current Research”, edited by L. Witten (Wiley, New York, 1962).
P. Jordan, J. Ehlers and W. Kundt, “Republication of: Exact solutions of the field equations of the general theory of relativity”, Gen. Relativ. Grav. [**41**]{}, 2191-2280 (2009).
J. L. Flores and M. Sánchez, “Ehlers-Kundt Conjecture about Gravitational Waves and Dynamical Systems”, arXiv:1706.03855
R. Penrose, “A Remarkable Property of Plane Waves in General Relativity”, Rev. Mod. Phys. [**37**]{}, 215 (1965).
W. B. Bonnor, “Charge moving with the speed of light in Einstein-Maxwell theory”, Int. J. Theor. Phys. [**3**]{}, 257 (1970).
J. B. Griffiths, “Some phsyical properties of neutrino-gravitational fields”, Int. J. Theor. Phys. [**5**]{}, 141 (1972).
V. P. Frolov and D. V. Fursaev, “Gravitational field of a spinning radiation beam pulse in higher dimensions”, Phys. Rev. D [**71**]{}, 104034 (2005).
V. P. Frolov, W. Israel and A. Zelnikov, “Gravitational field of relativistic gyratons”, Phys. Rev. D [**72**]{}, 084031 (2005).
V. P. Frolov and A. Zelnikov, “Relativistic gyratons in asymptotically AdS spacetime”, Phys. Rev. D [**72**]{}, 104005 (2005).
V. P. Frolov and A. Zelnikov, “Gravitational field of charged gyratons”, Class. Quantum Grav. [**23**]{}, 2119 (2006).
J. Podolský, R. Steinbauer and R. Švarc, “Gyratonic pp-waves and their impulsive limit”, Phys. Rev. D. [**90**]{}, 044050, (2014).
H. W. Brinkmann, “On Riemann spaces conformal to Euclidean spaces”, Proc. Natl. Acad. Sci. U.S. [**9**]{}, 1 (1923); Math. Ann. [**94**]{}, 119 (1925).
J. W. Maluf, J. F. da Rocha-Neto, S. C. Ulhoa and F. L. Carneiro, “Plane Gravitational Waves, the Kinetic Energy of Free Particles and the Memory Effect”, arXiv:1707.06874
J. B. Griffiths and J. Podolsky, “Exact Space-Times in Einstein’s General Relativity” (Cambridge University Press, Cambridge, 2009).
P.-M. Zhang, C. Duval, G. W. Gibbons and P. A. Hovarthy, “Soft gravitons and the memory effect for plane gravitational waves”, Phys. Rev. D [**96**]{}, 064013 (2017).
P. C. Aichelburg and R. U. Sexl, “On the gravitational field of a massless particle”, Gen. Relativ. Gravit. [**2**]{}, 303 (1971).
H. Bondi, “Plane gravitational waves in general relativity”, Nature, [**179**]{}, 1072 (1957).
J. Podolsky, R. Svarc, R. Steinbauer and C. Sämann, “Penrose junction conditions extended: Impulsive waves with gyratons”, Phys. Rev. D [**96**]{} 064043 (2017).
C. Sämann, R. Steinbauer and R. Svarc, “Completeness of general pp-waves spacetimes and their impulsive limit”, Class. Quantum Grav. [**33**]{}, 215006 (2016).
J. Podolsky and K. Vesely, “New examples of sandwich gravitational waves and their impulsive limit”, Czech. J. Phys. [**48**]{}, 871 (1998).
|
Mining
We operate 14 open pits, comprising eight hard coal and six brown coal deposits. Open-pit mining is the most efficient method of production in shallow deposits. It can extract all the coal within an area and fully recover very thick seams. Some of our open pits extract seams of 30 metres or more. Many of our open pits have been improved in recent years to increase output and efficiency.
Underground mining
12underground mines
1/3of our coal comes from underground mines
We operate 12 underground mines in Siberia and far-eastern Russia. Most of our mines extract seams of two to five metre thickness and all are accessed via inclines driven from the surface. Coal is typically transported from working areas to the surface by belt conveyor with only one mine using a shaft winder. Modern, fully mechanised longwall methods are used throughout. Increased production from longwall faces has required improved roadheaders and bolter miners to speed up development. |
Huston elected Mayor
Manning prefaced his nomination of Huston by saying that it was
Councilman Andrew Schafer's turn to be named mayor. Manning said
Schafer had been offered the post of mayor by his Democratic
colleagues, but declined because of commitments at work. "But he
has more than earned the mayor's seat," said Manning. Other
appointments made during the reorganization for the new year were:
Donna Brady, Deputy Clerk; George Hanley, township attorney; Cheryl
J. Oberdorf, bond counsel; Marshall Gates, prosecutor; Marc J.
Brenner, public defender; Nisivoccia & Company, auditors; Dr.
Arvind Grover, Duane G. Sossono and Immediate Medical Care Center
as township physicians; Linda Pawchak, municipal historian, and
Frank D. angelastro, municipal court judge.
Thomas McAndrew was sworn in for his second year as Fire
Department Chief, with Mark Roskam as Deputy Fire Chief.
Additional Appointments
The following appointments were made to various boards,
committees and commissions:
Marion Brooks, Jerry Cantrell, Sharon McConvery and Robert Mahon
were appointed to the Parks Committee.
Louis Robbins and Walter Nickens were appointed to the
Environmental Commission, with Kathleen Mygas and Greg Pukas as
alternates.
Janet Lorey was appointed to the Landmarks Committee, with
Marcia Rumsey and Jesse Tieman appointed as alternates and Clark
Rumsey as student member.
Gordon Raupp was appointed to the Board of Assessments for Local
Improvements, and John Ragan, Debbie Knothe and David Ironson were
appointed to the Economic Development Committee with Meg Sullivan
appointed as an alternate member.
Shari Baron was appointed to the Library Board of Trustees, with
township manager John Lovell selected as the mayor's
alternate.
Barbara Davis and Sattik Deb were appointed to the Open Space
Committee, with Eric Inglis and Catherine Creese appointed as
alternate members.
Joan Brembs, Dana Tamminga, Kay Custer, Ruth Crane and Peggy
DePaola were appointed to the Community Services
Committee.
The Teen Center Oversight Committee is comprised of Andrew
Schafer as the council member liaison, Barbara Thomas as the Board
of Education representative, Laurie Iskowitz as the Recreation
Committee representative, and Anthony Zanconato, Debbie Knothe and
Sattik Deb as the resident members.
Planners say terrorist attacks could have environmental
effects
A Mendham-based environmental organization will receive $200,000
as part of $5.43 million in statewide Dodge Foundation funding to
promote sound planning , particularly in the aftermath of the World
Trade Center attacks. The organization, the Association of New
Jersey Environmental Commissions (A NJEC), was tabbed to use the
$200,000 to provide matching grants to municipalities across the
state to develop environmentally sound master plans. The $5.43
million will be distributed to 62 organizations by the Geraldine R
. Dodge Foundation largely to help municipalities guide planning
according to the State Development and Redevelopment Plan adopted
last year. The grants support efforts to protect natural resources
and the rapid loss of open space "due to poorly planned growth" in
the Highlands, Pinelands and Delaware Bay shore areas, according to
a statement issued on Friday.
The terrorist attacks may prompt businesses to decentralize
offices, bringing about greater pressure for development in
environmentally sensitive open spaces, according to Christopher J.
Elliman, president of the board and chairman of the foundation's
Trustees Committee on Critical Issues.
Elliman said the potential demand for more land for new
development makes it even more urgent to guide development away
from wetlands, steep slopes and other environmentally sensitive
areas and toward areas that already have sewers, roads and other
developed infrastructure.
"We are losing at least 15,000 acres a year in New Jersey to
development and over the long term, this will be a harmful effect
on water, air and soil quality a cross the state," Elliman
said.
"The ripple effects of the Sept. 11 disaster continue to be felt
throughout the region. One of those effects may be a desire by
corporations to avoid centralizing their operations. And that has
rather immediate land use implications for the region."
'Smart Growth'
Sandy Batty, executive director of ANJEC, said maximum $25,000
matching grants will be awarded as part of the organization's
"smart growth" initiative. Batty said ANJEC hopes to award grants
to six to eight municipalities in each of three regions, including
the Highlands, Pinelands and Delaware Bay shore areas.
Batty said ANJEC is forming a committee representing the three
regions to screen grant applications. ANJEC has received smaller
Dodge grants in the past for land use planning but the latest is
about double the most recent award.
She said ANJEC will favor land use projects that reflect
environmental concerns and not just recreational needs. For
example, grants would be more likely to fund a master plan that
includes open space protection of steep slopes and wetlands in
addition to the creation of ball fields.
Master plan revisions can be costly and in excess of $25,000 and
ANJEC will accept in-kind matches of manpower or materials for the
grants.
Batty said the Dodge grants show an endorsement of the state
redevelopment plan and that the plan's goals won't be met without
support from the public and private sectors.
For its part, the state must reflect the redevelopment plan when
it awards permits for construction of roads, waste water treatment
plants and other amenities needed for development. Batty said
municipalities also must organize their local master plans to
protect the environment.
"Smart growth is anti-sprawl and the tenet of the state plan is
to develop in areas of existing infrastructure," Batty said.
"Municipalities have control over the land use in their towns. If
they're in concert with the state plan, it will work."
Batty said some municipalities have embraced the state
redevelopment plan but others have balked out of a fear of too much
state interference in local planning.
The grants are the latest effort by ANJEC to promote sound land
use planning. The organization was formed in 1969 when the
Legislature authorized creation of local environmental commissions
and committees. ANJEC offers training to members of environmental
groups, publishes publications and is a resource center for private
and public agencies.
ANJEC currently represents about 250 of the 350 environmental
commissions in New Jersey. Batty has worked for ANJEC since 1986
and began as director this month, replacing Sally Dudley, who
retired as the longterm executive director.
Watch this discussion.Stop watching this discussion.
(0) comments
Welcome to the discussion.
Be Yourself. We do not accept and will not approve
anonymous comments. If your username is not your name, please sign
your posts as you would a letter to the editor with your full name
and hometown.Keep it Clean. Please avoid obscene, vulgar, lewd,
racist or sexually-oriented language.PLEASE TURN OFF YOUR CAPS LOCK.Don't Threaten. Threats of harming another
person will not be tolerated.Be Truthful. Don't knowingly lie about anyone
or anything.Be Nice. No racism, sexism or any sort of -ism
that is degrading to another person.Be Proactive. Use the 'Report' link on
each comment to let us know of abusive posts.Share with Us. We'd love to hear eyewitness
accounts, the history behind an article.
Online Poll
In recent weeks, Long Hill Township and Watchung Borough passed ordinances allowing their police departments to be able to apply for surplus equipment from the Department of Defense. Long Hill recently procured a Humvee to use in times of flooding, which Watchung states as the reason they are getting into the program. However, in cities around the country, police forces have used the program to obtain military gear, such as weapons and armor.
For more background, go to the link below
http://www.newjerseyhills.com/echoes-sentinel/news/watchung-police-department-hopes-to-receive-equipment-from-department-of/article_12ad002a-92b3-5449-a2cc-4b2cf0ce4339.html |
Q:
java:how to hide static resources like html ,images from user on jboss platfrom?
I have developed a java 1.4 web application.Application is deployed on jboss(tomcat).
suppose my folder structure is
mainfolder(contains subfolders and jsp pages)
images(contains all of images files)
headerfiles(header files)
javascript(javascript files)
url for website login page is
mywebsite.com/mainfolder/login.jsp
if user types complete url for some static resource
mywebsite.com/mainfolder/images/myimage.jpeg
then he can view image on this url.
I want to stop user to view these resources.What should i do?
is there way some way to specigy pattern of file names which i dont want user to see.
In that case i can specify *.ssi pattern to hide.
A:
If those images are used in your pages, the user will HAVE TO be able to download them to see them.
This is basic HTTP. If you want to download a resource, you need to have access to it.
Preventing your users from accessing mywebsite.com/mainfolder/images/myimage.jpeg will mean you WON'T be able to use this image in your HTML or CSS.
If those files should not be available to the user but only the server, don't publish them by keeping them in a non-published folder.
|
To make it easier for New Yorkers to commute and keep them posted on scheduled maintenance and delays, Google is adding information about service alerts that occur throughout the city’s 468 subway stations labeled on Google Maps.
British soccer–or football, whatever you call it–hasn’t won Olympic gold in a century. To turn the team around, head coach Stuart Pearce has stuck to four guiding leadership principles that any business would do well to emulate. |
Permaculture on a difficult steep bush block.With a steep small bush block, rock shelves, boulders and a thick eucalyptus forest, this site provides many reasons for not building a garden, but these challenges have provided some creative solutions: water capture, terracing, soil creation and enrichment, on-site green waste management plus classic permaculture design elements.
A traditional Sydney suburban garden incorporating food production. Raised vegetable beds have replaced the front lawn. The vegetables and fruit are fertilised by 3 chooks in a deep litter system, 4 compost bins and 2 worm farms. This garden shows how fruit and vegetables can be incorporated into a traditional garden.
Permapatch –Lane CoveCommunity GardenOpen: 2–5 pm
Located behind the old Uniting Church, cnr Mowbray and Pacific Highway, Lane Cove/Chatswood. Plenty of parking on site –enter from either road.
This is on a small rise overlooking the beach, and parking is limited. There is ample parking at the foot of the hill leaving a walk of about 50 m to the house.
A great example of how sustainability can be integrated into our everyday lives: a contemporary Australian beach home in harmony with the natural environment and incorporating many sustainable features. Native shrubs have been used exclusively to minimize the need for watering. The back yard features a small grassed area and a small covered vegetable and herb garden.
Northern Beaches
Permanora –25 Elanora Rd Elanora Heights Open: 12pm–4pm
A young, developing, evolving garden designed around the principles of Permaculture, covering ~1100m2 of terraced slope. Visitors will be able to see a number of permaculture techniques in use such as companion and guild planting, banana circle, composting, no dig and raised beds, espalier, grafted 'fruit salad trees', native foods, native bees, worm farms, ponds, aquaponics, zonal planting and garden structures made of bamboo and recycled materials.
New Leaf Nursery is an exciting new nursery on the Northern Beaches of Sydney specialising in sustainable living that is fun for the whole family. Come and see our great range of backyard chickens, dwarf rabbits, quails and guinea pigs, & lots of coops and hutches to go.
Inner West
6 Browns Avenue, Enmore Open: 10am–2pm
Urban Permaculture garden - see just how much food you can grow on 1/8 acre within walking distance from Sydney UBD! Chooks, over 50 fruit trees, raised vegetable beds, medicinal, culinary and tea herbs, native bees, rain water, strange plants! Meet some local heroes and participate in a number of activities. $25 donation (children and pensioners free) covers tour, herb teas and a bowl of soup plus a Pc of the last 2012 Permaculture Diary.
East
Randwick Sustainability Hub –27 Munda Street RandwickOpen: 3pm–5pm
The retrofitted community centre, with its photovoltaic panel array, wind turbine, range of rainwater harvesting and storage examples and its PIG (Permaculture Interpretive Garden) offers ideas you can adapt to your own home and garden. There is a reed-bed toilet and drinking water filter station, where you can fill your water bottles for free.
In the PIG you will find examples of home landscaping, garden water management and food production to stimulate your own efforts in creative living. The PIG is a fine example of the principle of multiple-use in permaculture design, combining a public park and an edible, educational landscape. That makes it an excellent venue for many of the activities on International Permaculture Day 2014: join us for workshops, kids activities, music and tours.
West
30 Whitehaven Rd, Northmead Open: 12pm–4pm
Come see permaculture principles applied to a typical western suburbs block. We have tanks, grey water system, raised beds all over the place, composting, worm farm, solar panels, food forest and lots of food.
38 Favell Street, Toongabbie Open: 10am–3pm
Permaculture designed kitchen garden includes herb garden, banana circle, chooks, rabbit/guinea pig enclosure, and various composting methods. Permaculture design elements include a swale, herb spiral and keyhole gardens. Features some unusual fruit trees and a variety of root crops where food stored underground can be harvested as needed. |
// Code generated by smithy-go-codegen DO NOT EDIT.
package comprehend
import (
"context"
awsmiddleware "github.com/aws/aws-sdk-go-v2/aws/middleware"
"github.com/aws/aws-sdk-go-v2/aws/retry"
"github.com/aws/aws-sdk-go-v2/aws/signer/v4"
smithy "github.com/awslabs/smithy-go"
"github.com/awslabs/smithy-go/middleware"
smithyhttp "github.com/awslabs/smithy-go/transport/http"
)
// Removes a specific tag associated with an Amazon Comprehend resource.
func (c *Client) UntagResource(ctx context.Context, params *UntagResourceInput, optFns ...func(*Options)) (*UntagResourceOutput, error) {
stack := middleware.NewStack("UntagResource", smithyhttp.NewStackRequest)
options := c.options.Copy()
for _, fn := range optFns {
fn(&options)
}
addawsAwsjson11_serdeOpUntagResourceMiddlewares(stack)
awsmiddleware.AddRequestInvocationIDMiddleware(stack)
smithyhttp.AddContentLengthMiddleware(stack)
AddResolveEndpointMiddleware(stack, options)
v4.AddComputePayloadSHA256Middleware(stack)
retry.AddRetryMiddlewares(stack, options)
addHTTPSignerV4Middleware(stack, options)
awsmiddleware.AddAttemptClockSkewMiddleware(stack)
addClientUserAgent(stack)
smithyhttp.AddErrorCloseResponseBodyMiddleware(stack)
smithyhttp.AddCloseResponseBodyMiddleware(stack)
addOpUntagResourceValidationMiddleware(stack)
stack.Initialize.Add(newServiceMetadataMiddleware_opUntagResource(options.Region), middleware.Before)
addRequestIDRetrieverMiddleware(stack)
addResponseErrorMiddleware(stack)
for _, fn := range options.APIOptions {
if err := fn(stack); err != nil {
return nil, err
}
}
handler := middleware.DecorateHandler(smithyhttp.NewClientHandler(options.HTTPClient), stack)
result, metadata, err := handler.Handle(ctx, params)
if err != nil {
return nil, &smithy.OperationError{
ServiceID: ServiceID,
OperationName: "UntagResource",
Err: err,
}
}
out := result.(*UntagResourceOutput)
out.ResultMetadata = metadata
return out, nil
}
type UntagResourceInput struct {
// The Amazon Resource Name (ARN) of the given Amazon Comprehend resource from
// which you want to remove the tags.
ResourceArn *string
// The initial part of a key-value pair that forms a tag being removed from a given
// resource. For example, a tag with "Sales" as the key might be added to a
// resource to indicate its use by the sales department. Keys must be unique and
// cannot be duplicated for a particular resource.
TagKeys []*string
}
type UntagResourceOutput struct {
// Metadata pertaining to the operation's result.
ResultMetadata middleware.Metadata
}
func addawsAwsjson11_serdeOpUntagResourceMiddlewares(stack *middleware.Stack) {
stack.Serialize.Add(&awsAwsjson11_serializeOpUntagResource{}, middleware.After)
stack.Deserialize.Add(&awsAwsjson11_deserializeOpUntagResource{}, middleware.After)
}
func newServiceMetadataMiddleware_opUntagResource(region string) awsmiddleware.RegisterServiceMetadata {
return awsmiddleware.RegisterServiceMetadata{
Region: region,
ServiceID: ServiceID,
SigningName: "comprehend",
OperationName: "UntagResource",
}
}
|
Q:
Am I utilizing classes and OOP efficiently?
In my last question on Stack Overflow I was a very confused newcomer about classes and OOP and how to correctly implement everything to make things easier. So I started a different example to practice.
This has the classes of a band and person. The people audition but only some get in and the rest leave to form their own group. Then there's a battle of the bands and bands face off. Here is my code.
<?
class Start{
var $name;
var $type;
//If construct not set, this is the construct.
function __construct($name){
$this->name = $name;
}
}
class Band extends Start{
var $name;
var $type;
var $membersAndInstruments = array();
var $badArray = array();
//Specify starting parameters.
function __construct($type, $name){
$this->type = $type;
$this->name = $name;
echo isset($this->name)
? "This " . $type . " band called " . $this->name . " has just been formed!" //If name is set
: "This band was formed. Genre: " . $type; //If name isn't.
}
//Add new members. Instrument => Member
function recruitMembers($instrument, $member){
$this->membersAndInstruments[$instrument] = $member;
//echo $instrument;
}
//Reject members from the audition
function reject($instrument, $rejectee){
$this->badArray[] = array($instrument => $rejectee);
}
//Show the ones who didn't make it
function sorryReject($msgStart, $msgEnd){
echo "<br /><br />$msgStart, ";
foreach($this->badArray as $k => $v){
//$k = array_values($k);
$v = array_values($v);
echo $v[0];
if ($k != count($this->badArray)-1){
echo ", ";
}
}
echo ". $msgEnd</br>";
}
//Show the members in the group and their instruments.
function displayMembers(){
foreach($this->membersAndInstruments as $craft => $member){
echo "<br />" . $member . " as " . $craft ;
}
}
//Challenge other bands. Input a band or an Array of bands.
function battle($band2, $winMsg){
echo "<br /><br /> BATTLE OF THE BANDS <br /><br />";
$band1 = $this;
if (!is_array($band2)){
$contestants = array($band1, $band2); //Ready bands
}else{
$contestants = array($band1);
foreach($band2 as $bandX){
$contestants[] = $bandX;
}
//var_dump($contestants);
}
//Count members once and store in array of the same order the bands were entered
for($i = 0; $i < count($contestants); $i++){
$numOfMembers[] = count($contestants[$i]->membersAndInstruments);
}
//echo "<br />";
//var_dump($contestants);
//var_dump($numOfMembers);
$moreMembers = ($numOfMembers[0] > $numOfMembers[1]) ? 0 : 1; //Set to the index that has more.
$winner = Randomizer($contestants, $contestants[$moreMembers], $numOfMembers[$moreMembers]);
echo $winner->name . " $winMsg";
}
}
class Person extends Start{
var $goodAtInstrument;
function __construct($name, $good){
$this->name = $name;
$this->goodAtInstrument = $good;
}
function audition($band, $good, $instrument){
$this->goodAtInstrument = $instrument;
$instrument = killTheLastLetter($instrument, "s");
$instrument != "Drum" ? $instrument .= "ist" : $instrument .= "mer";
if ($good){
$band->recruitMembers($instrument, $this->name);
}else{
$band->reject($instrument, $this->name);
//echo "<br /> Sorry, " . $this->name . "....you didn't make it.";
}
}
}
//Looks for a specified ending letter and cuts it if found and returns.
function killTheLastLetter($input, $cutThisLetter){
if (substr($input, -2, 2) == "ss"){
return $input;
}
substr($input, -1) == $cutThisLetter
? $input = substr($input, 0, -1)
: $input = $input;
return $input;
}
function Randomizer($choiceArray, $chanceChoice, $chances = 0){
!$choiceArray
? $TorF = array(true, false)
: $TorF = $choiceArray;
for($i = 0; $i < $chances; $i++){
//echo "DOJNE";
$TorF[] = $chanceChoice;
}
//var_dump($TorF);
$random = array_rand($TorF);
//echo $random;
return $TorF[$random];
}
//====================================================================================================
$FirstRockBand = new Band("Progressive Rock","Erais");
$bandMembers = array (
"Bass" => $M1 = new Person("Shepard", Randomizer()),
"Guitar" => $M2 = new Person("Sy", Randomizer()),
"Drums" => $M3 = new Person("Chris", Randomizer()),
"Keyboards" => $M4 = new Person("Jill", Randomizer()),
"Vocals" => $M5 = new Person("Michele", Randomizer()),
"Cowbell" => $M6 = new Person("Ben", Randomizer())
);
echo "<br /> Welcome to the auditions. <br />";
foreach($bandMembers as $k => $v){
$v->audition($FirstRockBand, $v->goodAtInstrument, $k);
}
$FirstRockBand->displayMembers();
//echo count($FirstRockBand->badArray);
if (count($FirstRockBand->badArray) > 0){
$FirstRockBand->sorryReject("Sorry", "you didn't make it in.");
echo "<br /><br /> The rejected members have started their own group: " . $SecondRockBand->name . "<br /><br />";
$SecondRockBand = new Band("Death Metal", "Sideshow Hubris");
$RockBands = array(
$FirstRockBand,
$SecondRockBand
);
foreach($FirstRockBand->badArray as $k => $v){
foreach($v as $inst => $member){
$SecondRockBand->recruitMembers($inst, $member);
}
}
//echo '<div style = "background-color: 00FFFF">';
$SecondRockBand->displayMembers();
//echo "</div>";
//Battle of the Bands! Scales tipped on the side that has more members. Need to work on the whole talent thing.
$FirstRockBand->battle($SecondRockBand, "blew the crowd away!");
}
Some things seem iffy to me, like plugging members into an array and then going through other arrays and so on. But PHP isn't exactly interactive so unless I'm reading from a DB all answers should already be in there....
Anyway, if you could please look this over and tell me if this is confusing or if I seem to be using classes correctly and what else I could fix.
A:
I think you have to rethink your code (- ;
as palacsint pointed out, there is some bad naming involved but whats more troublesome is why you extend "start".
the only reason i can think of why you did this is that person and band has "name" in common. Well thats not how it works. You do not put common things into parent classes and extend these as you see fit (at least it is not a good design)
Band and Person are totaly seperate enteties. There is nothing to gain to have the same parentclass.
If you want to make sure that everything which has a name will implement something, use interfaces. You could do something like this
interface HasName {
public function getName();
}
class Band implements HasName {}
class Person implements HasName {}
Also there is the possibility to implement multiple interfaces but you can extend only from one parent. The name of the interface "HasName" is already a hint that it is not a good interface. If interested you should read about interfaces and naming guides.
So how would i do it?
If you want "default stuff" to inherit from use an abstract class
abstract class Band {
//...
public function addMember(Person $Person) {
}
public function getMembers() {
}
//...
}
You put all the stuff every band has in common in there, you forge the behavior of "Band" every Band will behave like the Abstract class this has many benefits.
Now you have the possibility to extend this class if you would like to add features like
class RockBand extends Band {
public function smashGuitar() {
}
}
Also you should seperate concerns, i dont think "battle" is a concern of Band nor is "audition" a concern of Person. These are methods you should seperate in own classes or functions.
+++ EDIT
interface CanBattle {
public function battle();
}
abstract class BandBattle {
public function addParticipant(CanBattle $Participant) {}
public function battle() {}
public function getWinner() {}
}
class HiphopBattle {
public function battle() {
// other logic then rock band battle
}
}
class RockBattle {
public function battle() {
// other logi then hiphop battle
}
}
As you can see you have now the power to implement as many different battles as you please. You do not have even to touch Person or Band to do this (thats the power of seperation)
The only thing Band and Person have to do is impelment the interface "CanBattle" as the battle does not care if you ar a Band (rock) or a person (hiphop), i hope this examples will help you.
--- EDIT
Same for the output methods. You could use the __toString method and implement it for Band to output all Members but a better idea would be to seperate output into another class or function. So Band would only return the Data and the other one would present it.
Why do you set goodAtInstrument in Person once in the constructor and then again in the audition?
I think there would be more but i have to wait for your answers befor going to far (- :
Hope i could help.
A:
I would accept braunbaer's answer, this is merely an addition.
OOP Review
Inheritance
As braunbaer said, these classes are nothing alike and so they shouldn't be inheriting from the same source. However, you are not using inheritance right anyways. If class "Start" has a method that sets the "name" property, there is no need to type that again in the overriding child method, you should call parent::__construct(); within the child constructor method at the appropriate point instead. But this is a bad example because it only performs one task and that task isn't any shorter than rewriting it. Assume all of your classes set the "type" and "name" properties and performed a shared method. Of course for this the parent class should also have this shared method as well, but we will assume it does for now. Then you can immediately see the benefit of calling the parent::construct() method instead of retyping all of that for each child method. What you have right now might as well be an interface because you are not reusing any of its code :)
Encapsulation
The true purpose for OOP is not just code reuse, but encapsulation. In other words, hiding information from the users. Your classes don't do this. This isn't really a necessity, but it is one of the key features of OOP and a good one. Right now all of your methods and properties have defaulted to public because none of them are properly defined. PHP 5 still supports declaring class properties with var but it is an old and outdated method that will probably become deprecated at some point. The proper way is to use the property's state (public, private, or protected) to declare them. This also holds true for class methods, though they still require the "function" keyword.
General Code Review
Variables
Your variables should be descriptive. For example, $k and $v as defined in your foreach loop in the sorryReject() method could be renamed $instruments and $musicians respectively. This is a form of self documentation that ensures everyone who reads your code understands what those variables indicate.
var_dump()
You shouldn't dump variables into the view like this. It is very messy. var_dump(), exit(), die(), etc... (even echo() in my opinion) are all debugging tools that should not make it into the final release of a program. They are inelegant and counter-intuitive to separation of code, but that is a more advanced venture into OOP (see MVC) so I won't get into it here :)
Ternary Operations
Ternary operations are nice, but should only be used when they benefit your code, not as a short hand. So the following should be expanded.
if( isset($this->name) ) { echo "This $type band called {$this->name} has just been formed!";
else { echo "This band was formed. Genre: $type"; }
So a better example of a "good" ternary operation:
$name = isset($this->name) ? $this->name : 'default';
Though it is argued that ternary is never good practice. I myself believe it ok if it is implemented similar to the later example.
Strings
You'll also notice I fiddled with your strings in the above code. Double quotes (" ") tell PHP that it needs to process the incoming string, that there are PHP variables or entities needing to be escaped inside. Single quoted (' ') strings are not processed and will produce the same string that you typed, letter-for-letter, symbol-for-symbol. So your double quoted string was not being used appropriately. You told PHP there were variables or entities to escape and then manually escaped them yourself.
|
Determination of factors influencing tissue effect of thermal chondroplasty: an ex vivo investigation.
Scientific investigation of thermal chondroplasty using radiofrequency energy (RFE) is confounded by multiple factors associated with the technique. Our purpose was to determine the relative importance of the following factors on tissue effect (depth of tissue debridement plus depth of underlying cell death) of thermal chondroplasty: probe design, generator power setting, speed, force, and number of passes of the probe over treated tissue. We hypothesized the relative importance of these factors would be (from most to least important) power, passes, speed, force, and design. Bovine patellae were treated using monopolar RFE. Sample size was based on a 2-level, half-factorial design. Low and high extremes of the factors tested were power setting (50 W v 110 W), passes (1 v 5), speed (3 mm/sec v 10 mm/sec), force (0.15 N v and 0.59 N), and probe design (electrode protrusion 25 microm v 125 microm). Samples were incubated with cell viability stain and examined using confocal laser microscopy to determine tissue effect. Data were analyzed using multiple regression. All factors that were tested significantly influenced tissue effect (P < .05). Power setting had the greatest effect, followed by design, speed, passes, and force. The following interactions of factors were also significant: design and force, power and passes. The optimal configuration resulting in least tissue effect was a power setting of 50 W, electrode protrusion of 25 microm, speed of 10 mm/sec, 1 pass, and 0.15 N of applied force during treatment, which resulted in a predicted tissue effect of 99 +/- 15 microm. The least tissue effect of thermal chondroplasty was achieved with lower power using a probe with minimal electrode protrusion while performing a rapid, single, lower force pass of the probe over treated tissue. Power and probe design have the greatest influence among the factors tested; selecting these parameters preoperatively could control tissue effect. |
Modern Bed Frame Comfy
Modern Bed Frame Comfy
And dog comfy in charleston south carolina and dog comfy in a. Mats reduce wear medium to get comfy bed fabrics visit. Pictures of comfy beds, sofa for you to the greatest sleep and home furnishings and see their place the most of outstanding design pictures and shipped all. Handmade in these fabulous four poster beds a wide selection reviews of your inbox. Beds and spend the country inn suites by you to feet i picture very comfy corner bed twin beds in without worrying about homemade pet bed swings on orders and free shipping on this is a night. |
JAROED TAIT SLOCUM
v.
KEN MAJOR REALTY, THE ESTATE OF JEFFREY ROY BRASSEAUX JR., THROUGH HIS HEIRS, KEVIN BRASSEAUX, ASHLEY B SSEAUX, BRIDGETTE BRASSEAUX, THROUGH HIS EXECUTOR, DALE BRASSEAUX.
No. 2007 CA 0803.
Court of Appeals of Louisiana, First Circuit.
December 21, 2007.
NOT FOR PUBLICATION.
ROBERT HALLACK, Counsel for Plaintiff/Appellee, Jaroed Tait Slocum.
JENA SMITH, LANCE J. ARNOLD, Counsel for Intervenor/Appellant, Regions Mortgage Company.
Before WHIPPLE, GUIDRY, and HUGHES, JJ.
WHIPPLE, J.
In this appeal, intervenor, Regions Mortgage Company ("Regions"), challenges a judgment of the trial court dismissing its claims with prejudice on the basis that Regions failed to appear at trial in support of its intervention. For the following reasons, we amend and as amended, affirm.
FACTS AND PROCEDURAL HISTORY
On August 13, 1999, plaintiff, Jaroed Tait Slocum, purchased a residence located at 3053 Louisiana Highway 78, Livonia, Louisiana that had been owned and built by the late Jeffrey Roy Brasseaux. Gay Aguillard, an agent with Ken Major Realty, was the real estate agent for the purchase and sale. Plaintiff financed the purchase of the home and property through Regions Mortgage, Inc. According to plaintiff, in October of 1999, he began discovering sinkholes in the yard near the home, which caused the doors, windows, and ceiling of the home to crack. The cracks began to expand over time. Plaintiff subsequently discovered that the home had been built on a landfill containing large blocks of concrete debris and other types of construction debris.
On July 18, 2001, plaintiff filed a suit for damages against Brasseaux's estate and Ken Major Realty, asserting claims under the New Home Warranty Act, the Unfair and/or Deceptive Trade Practices Acts, and Louisiana Civil Code articles 1995, 2475, 2524, and 2545. Plaintiff alleged that Brasseaux either placed dirt in the landfill or knew that dirt had been placed over the landfill before constructing the home, but never disclosed this to plaintiff. Plaintiff further alleged that the real estate agent knew or should have known and should have disclosed to him that the home had been built on a landfill and that the home would eventually suffer major structural and foundational problems.
"Ken Major Realty" was voluntarily dismissed after filing an exception of lack of procedural capacity to be sued.[1] In its stead, plaintiff thereafter filed a supplemental and amending petition to name as additional defendants real estate agents, Joseph Major and Gay Aguillard, and their insurer, Twin City Fire Insurance Company. Major was eventually dismissed on an exception of no cause of action.
Regions Mortgage, Inc., as the holder and owner of the promissory note secured by the mortgage upon the house and property, filed an intervention in the proceeding on April 3, 2006, to protect its mortgage.[2]
By motion of plaintiff filed May 1, 2006, the matter was set for a status conference to set a trial date on June 20, 2006.[3] Counsel then representing Regions waived appearance at the status conference, which was held with counsel for plaintiff and counsel for Aguillard and her insurer in attendance. Regions does not dispute that it was notified but did not make any appearance at the status/scheduling conference. At the June 20th conference, the matter was set for jury trial on September 14 and 15, 2006, and notice of assignment of trial, dated June 27, 2006, was then issued by the Clerk's Office of the Eighteenth Judicial District Court for the Parish of Pointe Coupee to counsel for plaintiff, Aguillard and her insurer, and Regions, specifically notifying the parties of the time and date of the trial.
After the matter was scheduled for trial, a formal mediation was held at a date agreed upon by all parties, including Regions. However, Regions elected not to attend or participate in the mediation. As a result of the mediation, plaintiff settled with Aguillard and her insurer in the amount of $35,000.00.[4]
The matter was called for trial on September 14, 2006. On that date, only plaintiff and his counsel appeared for trial. An extensive colloquy between plaintiff's counsel and the court then ensued concerning the issue of whether Dale Brasseaux, the succession representative for his brother, Jeffrey Brasseaux, the builder, had received notice of the trial date. Because Dale Brasseaux was not listed on the notice of assignment of trial issued by the clerk's office; the court (and plaintiff's counsel) agreed that he had not received notice of the trial date. Accordingly, plaintiff's counsel requested that the trial of the main demand be continued to allow proper service upon the succession representative, but that the petition for intervention be dismissed for failure to appear at trial, as proper notice of the trial had been issued to Regions. After determining that the record showed that notice had been issued to Regions through its counsel of record, and noting that the court had also waited some time for Regions' counsel to appear, the trial court continued the trial, but dismissed the petition for intervention for failure to appear. The trial court granted plaintiff's other requests, continued the matter to September 26, 2006, and ordered that Dale Brasseaux, as succession representative for Jeffrey Brasseaux, and Jeffrey Brasseaux's three heirs be served with notice of the trial date.
The matter again came for trial of plaintiff's claims against the builder on September 26, 2006. On that date, plaintiff and his counsel appeared, but Dale Brasseaux appeared without counsel. With the assistance of the court, the parties reached a settlement agreement. Regions did not make an appearance on September 26, 2006. A written judgment dismissing intervenor's claims with prejudice was signed in open court by the trial court during the September 26, 2006 hearing. A judgment in conformity with the stipulated settlement agreement between plaintiff and the estate and heirs of Brasseaux was also signed on September 26, 2006.
Thereafter, Regions filed a motion for new trial, essentially alleging that it did not receive notice of the September 14th trial date.[5] Regions also alleged that it did not receive any notice of the judgment rendered and signed on September 26, 2006, dismissing its claim, until after it was rendered. In the meantime, plaintiff filed a Motion to Cancel Mortgage and Note. Both motions came for hearing on December 7, 2006, where the trial court determined that Regions had specifically elected not to attend the pretrial conference at which the trial date was selected and that notice of the trial fixing had been sent to Regions.[6]
Regions appeals from the judgment of the trial court,[7] framing its assignments of error as follows:
1. The trial court abused its discretion in dismissing Regions' Petition for Intervention with prejudice, after finding that the record showed Regions had notice of the September 14, 2006 trial date and/or waived its right to participate in the litigation when it did not appear at the status conference.
2. The trial court erred as a matter of law when, on September 26, 2006, it signed the Buyer's Proposed Order dismissing Regions' Petition for Intervention with prejudice.
DISCUSSIONS[8]
Assignment of Error No. 1
At the outset, we note that although other parties filed written requests for notice, the record reflects no such request was filed by Regions until January 18, 2007, i.e., after the hearing and trial date. Nonetheless, the record shows that counsel for Regions was sent a notice of assignment of trial by the clerk's office, advising the parties of the trial date. Regions initially argued that it had received no notice regarding the trial date, contending that on prior occasions, "since we've been filing our motions, we've been served by the Sheriff every time we get a hearing date." After the record was shown to contain documentation that the clerk's office had issued notice by mail to Regions through its then counsel of record, counsel for Regions denied ever receiving notice of the trial date.
The names and addresses of the three parties listed on the notice of assignment of trial date are: (1) counsel for plaintiff; (2) counsel for Gay Aguillard; and (3) counsel for Regions. At the hearing on the motion for new trial, in response to questioning by the trial court, counsel for plaintiff indicated that he had received the notice of assignment issued by the court. The court noted that counsel for Aguillard also received the notice issued by the court, as her counsel likewise appeared for trial.
Despite the clerk's service notation, Regions argues on appeal that "[t]here is nothing in the record to show that the Notice of Assignment was ever served and/or sent to the parties listed," nor is there anything "in the record to suggest that either Notice was provided to or served on all parties involved in the litigation."
To the extent that Regions now argues the service was defective because the notice was given by ordinary mail and not by service from the sheriff's office, we note that LSA-C.C.P. art. 1313, entitled "Service by mail, delivery, or facsimile," found in Title II. Citation and Service of Process, Chapter 5. Service of Pleadings, provides in part as follows:
A. Except as otherwise provided by law, every pleading subsequent to the original petition, and every pleading which under an express provision of law may be served as provided in this Article, may be served either by the sheriff or by:
(1) Mailing a copy thereof to the counsel of record, or if there is no counsel of record, to the adverse party at his last known address, this service being complete upon mailing.
(2) Delivering a copy thereof to the counsel of record, or if there is no counsel of record, to the adverse party.
* * * * *
B. When service is made by mail, delivery, or facsimile transmission, the party or counsel making the service shall file in the record a certificate of the manner in which service was made.
C. Notwithstanding Paragraph A of this Article, if a pleading or order sets a court date, then service shall be made by registered or certified mail or as provided in Article 1314.
Moreover, LSA-C.C.P. art. 1314 provides, in part:
A. A pleading which is required to be served, but which may not be served under Article 1313, shall be served by the sheriff by either of the following:
(1) Service on the adverse party in any manner permitted under Articles 1231 through 1266.
These articles, however, clearly deal with service and citation of pleadings. In the instant case, we are faced with the issuance of a notice of assignment of trial by the clerk of court. We thus find no merit to Regions' argument that this notice was required to be served upon all counsel of record by the sheriffs office.
Further, to the extent that Regions argues that the notice was defective because it was not sent by certified mail, Louisiana Code of Civil Procedure article 1572, found in Title V. Trial, Chapter 2. Assignment of Cases for Trial, which is the controlling authority in this case, provides that:
The clerk shall give written notice of the date of the trial whenever a written request therefor is filed in the record or is made by registered mail by a party or counsel of record. This notice shall be mailed by the clerk, by certified mail, properly stamped and addressed, at least ten days before the date fixed for the trial. The provisions of this article may be waived by all counsel of record at a pre-trial conference.
(Emphasis added.)
As noted above, the record in this matter does not contain a written request for notice by Regions pursuant to LSA-C.C.P. art. 1572; nor does the record show that a request for written notice of trial was filed, prior to the hearing on September 14, 2006 or the trial on September 26, 2006.[9] Absent a request for notice of trial date pursuant to LSA-C.C.P. art. 1572, Regions is not entitled to relief on appeal on the basis of the failure to issue such written notice of the date of trial by certified mail. See Darnall v. John K. Darnell, Inc., 526 So. 2d 1317, 1321 (La. App. 1st Cir.), writ denied, 531 So. 2d 273 (La. 1988).
Specifically, in default of a written request for notice pursuant to LSC.C.P. art. 1572, the manner of notice provided by the clerk's office herein, i.e., by ordinary mail, was legally correct.
This assignment of error lacks merit.
Assignment of Error No. 2
In this assignment, Regions contends that the trial court erred as a matter of law in dismissing Regions' petition for intervention on September 14, 2006, with prejudice. In support, Regions contends that the judgment submitted to the trial court proposed to dismiss. Regions' claims "with prejudice," a determination that Regions claims was not made by the trial court on the record.
According to the transcript of the September 14, 2006 hearing, the trial court stated that the "Petition for Intervention will be dismissed for failure to appear to prosecute it." Thus, the trial court did not specifically note that the motion for dismissal of the intervention was granted with prejudice. The written judgment presented to the trial court for signature, however, stated that the intervenor's claims were dismissed "with prejudice." The trial court signed the judgment as presented by counsel for plaintiff.
The trial court's dismissal of an action based upon plaintiff's failure to appear for trial will not be reversed on appeal absent a showing that the trial court abused its discretion. England v. Baird, 99-2093 (La. App. 1st Cir. 11/3/00), 772 So. 2d 905, 907.
As set forth above, the record shows that at the September 14, 2006 hearing, the trial of the main demand was continued (due to lack of service on defendant's representative). Further, the trial court made no specific ruling on the record that Regions' intervention was to be dismissed with prejudice. Given that defendant Brasseaux also failed to appear; and that the trial date of the main demand was continued, we fmd that the trial court abused its discretion in dismissing Regions' intervention with prejudice.
Finding merit to Regions' argument that the trial court abused its discretion in dismissing its petition of intervention with prejudice, we amend the judgment of the trial court to reflect that the dismissal of Regions' petition for intervention is without prejudice.[10]
CONCLUSION
For the above and foregoing reasons, the September 26, 2006 judgment of the trial court is amended to provide that the dismissal of the petition for intervention is without prejudice, and as amended, is affirmed. The motion to attach the December 7, 2006 transcript of the trial court to appellant's brief is denied as moot. Costs of this appeal are assessed against the appellant, Regions Mortgage Company.
AMENDED, AND AS AMENDED, AFFIRMED.
NOTES
[1] "Ken Major Realty" is a trade name and not a juridical entity capable of being sued.
[2] The mortgage and note in the amount of $78,221.00 were executed by Jaroed Tait Slocum on August 13, 1999. The mortgage was recorded in Pointe Coupee Parish on August 13, 1999.
[3] Attached to the motion is a "Certificate of Service," executed by plaintiff's counsel, setting forth that a copy had been furnished to counsel for all parties "via regular mail."
[4] By letter dated September 8, 2006, counsel for Aguillard advised counsel for Regions that the $35,000.00 in settlement proceeds were being deposited into the registry of the court for distribution by the court. Counsel for Aguillard also enclosed a motion to dismiss the petition for intervention to be executed by counsel for Regions.
[5] At the hearing, Regions argued that it had not received notice of either the September 14th or the September 26th trial dates.
[6] The trial court then took up the matter of the plaintiff's request for cancellation of the mortgage. After heated argument and a bench conference, however, the trial judge recused himself prior to ruling on that motion.
[7] On February 5, 2007, Regions filed a motion and order for appeal of the final judgment rendered December 15, 2006. The record contains no judgment dated December 15, 2006. By correspondence dated March 14, 2007, Regions' counsel wrote to the clerk of court and stated that its motion for devolutive appeal contained a typographical error. The letter notes that the date of the final judgment for purpose of this appeal is December 7, 2006.
In Dural v. City of Morgan City, 449 So. 2d 1047, 1048 (La. App. 1st Cir. 1984), this court stated "there is a line of Supreme Court cases which holds that where a motion for appeal refers by date to the judgment denying the motion for new trial, but the circumstances indicate that the appellant actually intended to appeal from the judgment on the merits, the appeal should be maintained as being taken from the judgment on the merits." (Citations omitted.) Thus, in the instant matter, we conclude the judgment for review on appeal is the September 26, 2006 judgment, which dismissed Regions' intervention with prejudice.
[8] Regions filed a motion for leave to attach to its brief transcripts of the hearings before the trial court on September 14, 2006, September 26, 2006, and December 7, 2006, or in the alternative, that the record be corrected and supplemented to include transcripts from the September 14, 2006 and September 26, 2006 hearings pursuant to LSA-C.C.P. art. 2132. On review, another panel of this court: (1) granted the motion, in part, directing the lower court to supplement the appellate record with two certified copies of the transcript of the hearings on September 14, 2006 and September 26, 2006 at Regions' costs; (2) referred the portion of the motion seeking to attach the December 7, 2006 transcript to its brief to this panel; and (3) denied that portion of the motion seeking to attach the September 14, 2006 and September 26, 2006 transcripts to the brief. See 2007 CA 0803. Because the December 7, 2006 transcript is already included in the appellate record, however, we deny as moot the portion of the motion seeking to attach the December 7, 2006 transcript to the brief.
[9] We note that on November 29, 2006, Regions filed a motion to substitute additional counsel of record. Subsequently, on January 18, 2007, some four months after the trial of this matter, Regions filed its first request for notice in the record below.
[10] We note that as the mover seeking a new trial and to have the dismissal completely set aside, Regions was required to establish the grounds for its motion. Dragon v. Schultz, 97-664 (La. App. 5th Cir. 1/14/98), 707 So. 2d 1274, 1276. When faced with the service documentation showing notice to then counsel, Regions argued that its prior counsel of record either had not received the notice or had failed to advise the firm of the trial date, and had left the firm. However, Regions presented no evidence or testimony to support these claims. Further, as the trial court properly observed, any errors or omissions occasioned by the purported acts or failure to act of Regions' prior counsel of record, including any failure to appear, are matters properly addressed between Regions and its counsel and do not establish error by the trial court.
|
Group donates K-9 safety sensor to Greencastle police
The furriest member of Greencastle's police force will be safer when he's out on patrol thanks to a donation by the Pennsylvania K-9 Assistance Foundation of Bucks County.
By Colleen Seidel/The Record Herald
GREENCASTLE — The furriest member of Greencastle's police force will be safer when he's out on patrol thanks to a donation by the Pennsylvania K-9 Assistance Foundation of Bucks County.
The foundation, headed by Mike Decher, a retired police officer who spent 22 years with the Northampton Township police near Philadelphia, donated a temperature-controlled heat sensor for Officer Keith Russell's vehicle.
The sensor will help keep Russell's partner, GPD's K-9 cop Rony, a German shepherd-Belgian malinois mix, from overheating in the vehicle if Russell has to leave it. When the temperature reaches a certain point, the device will automatically lower the windows, turn on the ventilation system and alert Russell via beeper.
Deadly threat
"Heat is more dangerous to a dog than cold," said Jules Ferraro, technical adviser to the foundation and a K-9 police dog trainer who has spent a total of 24 years in law enforcement.
Decher and Ferraro said the conservative estimate is that nationwide four or five police dogs die of heat exhaustion each year, but there is "really no way to know for sure."
The foundation decided to make the donation to the Greencastle Police Department after Decher read a newspaper article about Rony and Russell in early fall.
"Most of these guys operate on a shoestring budget," Decher said.
After a few phone calls, Decher finally got in touch with Russell and told him he had a free heat detection unit for him. The unit usually sells for $1,500, according to Decher.
And Russell's reaction?
"I think I surprised the heck out of him," Decher said.
Police partners
Both Russell and Greencastle Chief of Police John Phillippy assert just how important Rony is to the police department.
"I can't put a price tag on it," Russell said.
"I'm the luckiest one in the whole department. I will always have a partner, someone to protect me forever, no matter what," Russell said.
Russell gives commands in Czechoslovakian to Rony, and the dog obeys as quickly as Russell can speak them. Rony came from the Eastern European country because of the quality of his bloodlines, which feature a long tradition of police dogs.
Rony's training, which Russell initially did with him when the department received the dog in 2009, has to be maintained every couple of weeks and the pair heads to Maryland to work with specialists.
But the vigorous schedule pays off, according to Russell.
"At home, he's a pet," the father of four said. "At work ... he loves going to work."
Work for Rony includes sniffing out evidence and narcotics, tracking down individuals who could be suspects, victims or lost, suspect apprehension, and protecting Russell when confronted by aggressive individuals.
"Very few people will fight a dog," Russell said. "Just him barking is a huge deterrent."
Phillippy said that Rony, who wears his own Greencastle police badge, is dispatched when needed to help other police in the area as well. He recently helped police in Fulton County track a suspect through 3 1/2 miles of wooded area, with Russell right by his side.
Community support
Phillippy and Russell estimate that it takes between $3,500 and $4,000 each year to take care of Rony, including food costs, health care and training. But Rony is "majorly funded" by donations from the community, Russell said.
"He was even donated by a resident in Greencastle," Russell said. The anonymous resident paid $13,000 to initially obtain Rony for the police force.
Food Lion donates a bag of dog food; Greencastle Veterinary Hospital provides free checkups; even The Tennis Club in Zullinger gives Russell old tennis balls for Rony to play with.
"These dogs give 100 percent of themselves," Phillippy said. "(The donations) all go to benefit the dog, and the dog benefits the community."
Original content available for non-commercial use under a Creative Commons license, except where noted.
Waynesboro Record Herald - Waynesboro, PA ~ 30 Walnut St. Waynesboro, PA 17268 ~ Privacy Policy ~ Terms Of Service |
Back in June, we brought you the news that Los Angeles Lakers forward Metta World Peace is set to portray a detective in the Lifetime movie of Nancy Grace's novel "The Eleventh Victim." While the project sounds like a product of some TMZ-sponsored version of Mad Libs, it is in fact real. The only question was whether the acting gig was a one-time thing or the start of a new career for one of the NBA's most bizarre personalities.
Not surprisingly, World Peace is giving acting a real shot. In fact, he's booked another role in a new pilot. It sounds perfectly normal, too. Just check out this press release for "Real Vampire Housewives" (story via The Classical, release image via Deadspin):
Los Angeles Lakers' Metta World Peace has joined the cast of the original scripted spoof pilot "Real Vampire Housewives" (RVH) where he will portray a gregarious and overtly sexual vampire elder. RVH follows a group of mischievous women who are married to vampires. The housewives find plenty of wicked trouble to occupy them during the day while their husbands rest. For the pilot, a recently engaged couple must seek permission from the clan's elder to wed. The elder, Gossamer will be portrayed by Metta. RVH shoots in September on location in Encino, California. [...] Real Vampire Housewives is written by Andre Jetmir who will also direct. Jetmir jumped at the opportunity to work with Metta, "Robert mentioned Metta World Peace and it was yes in an instant. Metta is perfect as a vampire; he is physically intimidating in an Alpha-male way, very charming, a little mischievous and he has a raw sexuality I think most actors try to find when they play a vampire."
Sure, yes, I suppose Metta World Peace is as good a choice for a very sexual vampire elder named Gossamer, to the extent that anyone would be a good fit for such a bizarre role. That's to say nothing of the idea for the series itself, which appears to be the product of some kind of cultural relevance mashup generator. Presumably "Batman Glee Club" is next in line for production.
September is typically a dead month for the NBA before training camps begin, so MWP probably won't be missing much in the way of preparation as long as he stays to a workout schedule when he's not filming. On the other hand, Lakers fans have reasons to be concerned about that happening: World Peace wasn't in shape at the beginning of last season after the long lockout, and the Lakers will also depend on him a lot this season as a perimeter defender.
The peculiar thing about this news is that we might never see "Real Vampire Housewives" at all. Pilots need to be picked up by networks to get on TV — for instance, I've been waiting to see this gem for years. Hopefully "RVH" sees the light of day, though, because clearly Gossamer is a character who will inspire a generation. |
Project Summary/Abstract Background and preliminary data: Immuno-PET with 89Zr-labeled antibodies is a promising approach for detection, staging, and characterization of malignant tumor. Recently, we have applied this approach to imaging of PDAC using the monoclonal IgG1 antibody HMab-5B1, which potently binds on the cancer antigen (CA) 19-9. Overexpression of CA 19-9 is a well-established feature of PDAC and serum levels of CA 19-9 are commonly used in the clinic for diagnosis, risk stratification, and follow-up of pancreatic cancer. While CA 19-9 enters the circulation, its concentration in the tumor is orders of magnitude higher and leads to accumulation of HuMab-5B1 in the tumor tissue. This has been demonstrated by an ongoing phase I clinical trial at MSK that studies CA 19-9 positive malignancies with 89Zr-DFO-HuMab-5B1 PET/CT. In this trial, 89Zr-DFO-HuMab-5B1 PET/CT has shown not only known metastases, but also many sub-centimeter lesions that were not apparent on routine clinical imaging (CT, MRI). Furthermore, a significant fraction of the patients demonstrated very high and persistant uptake of 89Zr-DFO-HuMab-5B1 in the tumor tissue (SUVmax up to 101 g/ml) and tumor-to- blood ratios were higher than 10 for 50% of the lesions, suggesting that HuMab-5B1 labeled with beta-emitting radioisotopes may deliver therapeutic doses to PDAC. The goal of this application is to validate 89Zr-DFO-HuMab-5B1 PET/CT imaging findings by histopathology in patients with CA 19-9 positive pancreatic cancers scheduled to undergo surgery. Specific aims and approach: We will image 15 patients within one week before surgery and use intraoperative gamma probe measurements to precisely localize these findings in the surgical specimens. The expression of CA 19-9 will be assessed by immunohistochemistry and correlated with the tumor uptake of 89Zr on PET. Patients will undergo a diagnostic CT, optimized for pancreatic cancer imaging as part of the PET/CT study and we will test if the addition of the PET increases the staging accuracy of contrast-enhanced CT. Furthermore, we will perform quantitative autoradiography of the resected specimens in order to quantify the precise concentration of radioactivity in the tumor tissue without interfering partial volume effects. Autoradiography will also allow us to study the intratumoral distribution of 89Zr, which may affect the radiation dose that can be safely administered to the tumor tissue with systematically administered HuMab-5B1 labeled with a therapeutic radioisotope. Impact: If the study confirms our preliminary clinical findings that 89Zr-DFO-HuMab-5B1 PET/CT can detect metastatic PDAC with markedly higher sensitivity than CT alone, this would have a major impact on the selection of patients for surgery and surgical planning. Furthermore, if the degree of uptake of 89Zr-DFO- HuMab-5B1 in PDAC metastases is as high as suggested by our preliminary data, HuMab-5B1 would be a highly attractive theranostic agent for treatment of pancreatic cancer. |
Predictors of infection after 754 cranioplasty operations and the value of intraoperative cultures for cryopreserved bone flaps.
OBJECTIVE The authors' aim was to report the largest study on predictors of infection after cranioplasty and to assess the predictive value of intraoperative bone flap cultures before cryopreservation. METHODS They retrospectively examined all cranioplasties performed between March 2004 and November 2014. Throughout this study period, the standard protocol during initial craniectomy was to obtain a culture swab of the extracted autologous bone flap (ABF)-prior to its placement in cytostorage-to screen for microbial contamination. Two consecutive protocols were employed for the use and interpretation of the intraoperative swab culture results: A) From March 2004 through June 2013, any culture-positive ABF (+ABF) was discarded and a custom synthetic prosthesis was implanted at the time of cranioplasty. B) From July 2013 through November 2014, any ABF with a skin flora organism was not discarded. Instead, cryopreservation was maintained and the +ABF was reimplanted after a 10-minute soak in bacitracin irrigation as well as a 3-minute soak in betadine. RESULTS Over the 10.75-year period, 754 cranioplasty procedures were performed. The median time from craniectomy to cranioplasty was 123 days. Median follow-up after cranioplasty was 237 days for protocol A and 225 days for protocol B. The overall infection rate after cranioplasty was 6.6% (50 cases) occurring at a median postoperative Day 31. Staphylococcus spp. were involved as the causative organisms in 60% of cases. Culture swabs taken at the time of initial craniectomy were available for 640 ABFs as 114 ABFs were not salvageable. One hundred twenty-six (20%) were culture positive. Eighty-nine +ABFs occurred during protocol A and were discarded in favor of a synthetic prosthesis at the time of cranioplasty, whereas 37 +ABFs occurred under protocol B and were reimplanted at the time of cranioplasty. Cranioplasty material did not affect the postcranioplasty infection rate. There was no significant difference in the infection rate among sterile ABFs (7%), +ABFs (8%), and synthetic prostheses (5.5%; p = 0.425). All 3 +ABF infections under protocol B were caused by organisms that differed from those in the original intraoperative bone culture from the initial craniectomy. A cranioplasty procedure ≤ 14 days after initial craniectomy was the only significant predictor of postcranioplasty infection (p = 0.007, HR 3.62). CONCLUSIONS Cranioplasty procedures should be performed at least 14 days after initial craniectomy to minimize infection risk. Obtaining intraoperative bone cultures at the time of craniectomy in the absence of clinical infection should be discontinued as the culture results were not a useful predictor of postcranioplasty infection and led to the unnecessary use of synthetic prostheses and increased health care costs. |
Q:
File is always modified in Git due to different versions of sass/compass
my colleague and I are using sass and compass in our web development workflow. We got a annoying problems with the css-files after they were compiled. Git always tells us that the css file has been modified, but in fact nothing has changed only the different paths of our local instances of sass/compass differ from each other.
My colleague is using ubuntu 12.04 and installed sass/compass with gem
sudo gem install sass & sudo gem install compass
I instead use ubuntu 14.04 and installed it that way
sudo apt-get install ruby-compass
As mentioned the compiling works fine for both of use. But the compiled css-file is always modified. If I compare the both files I see that sass/compass is using another path.
This is the output of the command git log main.css
-/* line 17, ../../../../../var/lib/gems/1.8/gems/compass-0.12.7/frameworks/compass/stylesheets/compass/reset/_utilities.scss */
+/* line 17, ../../../../../usr/share/compass/frameworks/compass/stylesheets/compass/reset/_utilities.scss */
What can I do in that case? I already tried to install ruby-compass on the 12.04 ubuntu, but it doesnt work with 12.04.
Is there any possibilty to fix this issue, because it is annoying that the css-file is modified everytime I do a git pull and vice versa.
thx in advance
A:
If its a compiled file, why does it have to be checked in?
I would just remove the file from the git repo, and generate it on the server of deployment, because the paths there could again be different from either of the two of your machines, and similarly the underlying OS versions could be different, thus anyway needing a recompilation.
Just do
git rm main.css
echo main.css >> .gitignore
git add .gitignore
git commit -m "msg"
|
Prevalence of common MEFV mutations and carrier frequencies in a large cohort of Iranian populations.
Familial Mediterranean fever (FMF) is a hereditary autoinflammatory disorder caused by mutations in the MEFV gene. The disease is especially common among Armenian, Turkish, Jewish and Middle East Arab populations. To identify the frequency and the spectrum of common MEFV mutations in different Iranian populations, we investigated a cohort of 208 unselected asymptomatic individuals and 743 FMF patients. Nine hundred and fifty-one samples were analysed for the presence of 12 MEFV mutations by PCR and reverse-hybridization (FMF StripAssay, ViennaLab, Vienna, Austria). Confirmatory dideoxy sequencing of all MEFV gene exons was performed for 39 patients. Fifty-seven (27.4%) healthy individual carried mutant MEFV alleles. Three hundred and ninety-one (52.6%) FMF patients were found positive for either one (172/743; 23.1%), two or three MEFV mutations. Using dideoxy sequencing, three novel variants, A66P, R202W and H300Q, could be identified. Our analysis revealed an allele frequency and carrier rate of 15.6 and 27.4%, respectively, among healthy Iranians. Still moderate compared to neighbouring Armenia, but higher than in Turkey or Iraq, these data suggest that FMF is remarkably common among Iranian populations. E148Q was most frequent in the group of healthy individuals, whereas M694V was the most common mutation among FMF patients, thereby corroborating previous studies on MEFV mutational spectra in the Middle East. Accordingly, MEFV mutations are frequent in healthy Iranian individuals across different ethnic groups. Based on this finding, the awareness for FMF and the implementation of augmented carrier screening programmes considering the multiethnic nature of the Iranian population should be promoted. |
The present invention relates to a copier, facsimile apparatus, printer or similar image forming apparatus and, more particularly, to a multicolor image forming apparatus of the type forming a multicolor toner image on an image carrier and then transferring it to a recording medium at a time.
With a multicolor image forming apparatus, it is possible to form a multicolor toner image on an image carrier by use of developers of different colors. A nonmagnetic toner, or one component type developer, is advantageously used with developing means for the second color since it reduces the size and cost of the apparatus and is easy to color. It has been customary to cause this kind of toner to deposit on a developer carrier in a layer and face, but not contact, an image carrier, thereby effecting development. This development does not disturb a toner image of a first color existing on the image carrier.
The image forming apparatus has, for example, a plurality of developing means arranged around an image carrier. In this kind of apparatus, developing means assigned to the first color stores a chromatic toner, which constitutes a two component type developer in combination with a carrier. Developing means assigned to the second color and located downstream of the above-mentioned developing means stores a black toner, or one component type developer. The black toner is charged to a polarity opposite to the polarity of the chromatic toner. In the downstream developing means, the toner is deposited on a developer carrier in a thickness of 30 .mu.m to 500 .mu.m. In the event of development, an AC bias voltage is applied to the developer carrier of the downstream or second developing means for generating an AC electric field which effects development by the toner. While development is not effected, a bias voltage which causes the chromatic toner of the upstream or first developing means to develop an image is applied to the developer carrier of the second developing means. This kind of scheme is taught in, for example, Japanese Patent Laid-Open Publication No. 63-60471.
However, the apparatus described above has a problem that at the time of development in the second color, the toner of second color moves back and forth between the latent image surface of the image carrier and the surface of the developer carrier while hitting against the latent image surface due to the AC bias. Such a toner is apt to disturb a toner image formed on the image carrier in the first color. Moreover, the toner of first color is apt to move back and forth together with the toner of second color while hitting against the surface of the developer carrier, entering the developing means assigned to the second color. As a result, the toner of second color stored in the developing means becomes turbid.
In light of this, there has been proposed a multicolor image forming apparatus which applies a DC bias voltage for development in the second color. The DC bias causes a nonmagnetic toner to fly toward the image carrier, thereby obviating color mixture. For example, a plurality of developing means are arranged around an image carrier having a 35 .mu.m to 90 .mu.m thick photoconductive layer which has a capacitance of 20 pF/cm.sup.2 to 170 pF/cm.sup.2 and is made of selenium or arsenic selenide. Charging, exposing and developing steps are repeated a plurality of times to form a composite color image on the same image carrier. In the developing means assigned to the second color, a gap less than 250 .mu.m is formed between a developer carrier and the image carrier. A DC bias voltage is applied to the developer carrier to execute non-contact development by using a thin toner layer. At this instant, the other developer carriers not contributing to the development are held inoperative, i.e., toners are deposited thereon at the outside of their imaging regions. For this type of apparatus, a reference may be made to Japanese Patent Laid-Open Publication No. 63-63061. This document includes an embodiment using an image carrier implemented by an organic photoconductor having a 15 .mu.m to 50 .mu.m thick photoconductive layer, charging means in the form of a scorotron charger, reversal development, a potential contrast greater than 400 V, and a 5 .mu.m to 30 .mu.m thick toner layer deposited on the photoconductor.
Another type of multicolor apparatus image forming apparatus includes a plurality developing means facing, but not contacting, a recording medium. In this type of apparatus, first or upstream developing means includes a developer carrier to which a DC-biased AC bias is applied for black development. The developer carrier is rotated in the same direction as, but at a higher peripheral speed than, the recording medium. Second and successive developing means each includes a developer carrier to which only a DC bias is applied for color development. Such an apparatus is disclosed in, for example, Japanese Patent Laid-Open Publication No. 63-85578. This apparatus, however, has a drawback that when the toner is caused to fly under the electric field generated by the DC bias, cohered toner particles locally come off in low contrast portions, resulting in a granular image. Another drawback is that in latent line images, the edge electric fields of the latent images run around to the image carrier side, preventing thin lines from being reproduced. |
Tag Archives: rocket stove
Last month, listening to Hrishikay on Radio One (the only way I can drive in peak hours), I chanced upon a conversation involving a Himalayan Rocket Stove. The interviewee was Russell Collins, an Australian whose soul lives in India and this was something he had invented for the Himalayan region as a more environment-friendly way to cook and heat up the house. The stove works on a principle of vortex heating, which burns even the smoke created by it, rendering it almost 70-80% smokeless, while creating such high temperatures that you can not only cook food on it, but also use to heat up the house in winter.
He had me at one million trees.
He had me at sustainable cooking solutions.
He had me at 40 lakh deaths resulting from indoor pollution.
He also had me at “we need volunteers for workshops”
As an extension of this idea for the rest of India, which doesn’t live in sub-zero temperatures but can still benefit from smokeless cooking – Russell’s company conducts workshops, which they are proud to call the Smokeless Chulha Project. The aim of these workshops is to train as many end users (and trainers) in the making of these chulhas while highlighting the hazardous effects of conventional chulhas, the drain on forest reserves they create and the inordinate amount of time and effort spent on collecting and transporting firewood. Consider this: Every day, women in rural India walk as much as 10-20 km in search of firewood, and usually bring back a few kilos. If they are lucky, it lasts two days. By the time she is 40, a woman would have walked the distance of Kashmir to Kanyakumari and back just in search of firewood.
If you are still wondering what the fuss about smokeless chulhas is all about, allow me some gory detail:
If this is what a conventional chulha can do to a wall, imagine the extent of damage it can do to your lungs and respiratory system. In contrast, the Smokeless Chulha creates 80% less smoke than a conventional stove and also uses 80% lesser wood.
I quickly shot off a message to Hrishi and prompt as ever, he shot me back a number of Nitisha Agrawal who manages the Smokeless Chulha project while Russell is in Australia. She is armed with years of branding and corporate experience, but is thirsty to be an agent for social change. She also rallies around to find people truly passionate about the project to give it further wings. As someone who is constantly reinventing the way I live, I was happy to be a catalyst to what I saw as a less consumptive way of living.
By the end of the week, I had signed up for their forthcoming workshop at Kanha Tiger Reserve, in collaboration with the Forest department of M.P, ably led by Sanjay Shukla and his deputy, Anjana Tirki. For a state that is abundant in its forest reserves, Madhya Pradesh wears them lightly. Watching this dynamic duo and their team at work, I realized that most of real conservation is silent. On one given night, Anjana was at our guest house at 8 pm, trying to get feedback about the workshops, what could be done to ensure that the villagers do indeed make these chulhas and train others to do so. She had to travel back 75 km to her home in Mandla, to a 15 month baby, but she was unperturbed.
Of course forest departments are believers in conservation; it’s in their DNA. But it’s quite another thing to recognize the potential of an initiative from an outsider and let them in and want it to be scaled up to your region and community. That requires vision, that these able leaders at Kanha had. There were two workshops on two different days, and for each workshop, they had lined up at least 30-35 people from different village communities around Kanha. The turnout was far more than that. 150 people from 75 villages turned up over two days to learn about Smokeless Chulha (cookstove).The first workshop was at the Eco Centre of the Khatia range of the Kanha Tiger reserve and the second at Gadi range, around 70 km away. Although several of them had secured an LPG connection through various schemes, they knew that the chulha is here to stay. It is what is used to heat water, cook rice and of course make rotis (which always tasted better off the chulhas). Plus, everyone wanted their gas cylinder to last.
The constant in all workshops is the chief trainer Tanzin – trekker, naturalist, horse-doctor and farmer with a huge love for the forests and mother earth and who mourns the infestation of plastic and consumerism in our daily life. Tanzin is the official trainer of trainers, local communities and volunteers for all smokeless chulha workshops , but clearly we need more Tanzins. We need to create more of them.
What does it take?
The doughnut mix: (this forms the basic skeleton of the chulha and you can stack up three to five depending on what height you need for cooking) : clay, sand, puffed rice (murmura) and bhusa (dried hay)
The fuel for the smokeless chulha: Twigs, dry leaves, cowdung cakes, etc. You don’t need large pieces of wood, which means trees need not be felled to cook your meals
What it costs to make: Well, not more than a hundred rupees.
Well here is a video on how to make a smokeless chulha with step by step instructions. The video is in Hindi, but an English version is also available
After two days of observing an eager and enthusiastic audience, asking questions, devising their own chulha hacks and promising to go back home and make a chulha for themselves, it was time to go home. It was a small milestone, these 150 people, but what we left behind was larger dreams, a few leaders and a renewed passion for the environment. Meanwhile, the Kanha team was already talking about the next workshop. More villages. More people. More chulhas. Less smoke. |
Staff
Sara KuglerCo-Directorkuglersh@wfu.edu
Sara Kugler is the Co-Director of the Anna Julia Cooper Center. She received her B.A. in Latin American Studies at Tulane University, and joined the Center in Fall of 2011. She has additionally worked as an Associate Producer at MSNBC on the show “Melissa Harris-Perry” and at the Greater New Orleans Fair Housing Action Center.
Danielle ParkerAssistant Director of Research and Curricular Supportparkerld@wfu.edu
Danielle is the Assistant Director of Research and Curricular Support for the Anna Julia Cooper Center and Pro Humanitate Institute. She received her B.A. from North Carolina Central University, a Masters in Social Science from the University of Chicago, and a Ph.D. in Education from the University of North Carolina at Chapel Hill. Her research interests include black mothers and their experiences of youth mentoring programs, and first generation and underrepresented students’ access to college and graduate school.
Rolisa Tutwyler serves as the Liaison to the Executive Director of the Pro Humanitate Institute and as the Program Administrator for the Anna Julia Cooper Center on Gender, Race and Politics in the South. Prior to coming to Wake Forest she was the client relations manager for Nextions, a consulting firm in Chicago. She also served as the project coordinator for the Center for the Study of Race, Politics and Culture at the University of Chicago. |
“This unlawful practice must stop, and it must stop now.”
Ohio Secretary of State Jon Husted has made it his mission and principal agenda to weed out alleged voter fraud since assuming office in 2011, despite repeated findings showing this to be a non-issue (a maximum of just forty-four non-citizens possibly voted illegally in the state since 2000). His efforts last year found that an additional 145 non-citizens were registered to vote illegally in 2014, amounting to a whopping .0002 per
Given this state-wide epidemic of fraudulent vote snatching, Husted’s dedicated effort to weed out the microscopic traces of voter fraud includes an initiative called “Supplemental Process” which stipulates that Ohioans who do not vote in three consecutive federal elections automatically have their registrations cancelled.
As a result, in 2015 that meant roughly 40,000 people living in Ohio’s largest county – largely low-income and minority voters – were disenfranchised, part of a larger figure that includes roughly two million people over the past five years.
On Wednesday, the American Civil Liberties Union (ACLU) filed a lawsuit against Husted and Ohio, alleging that the massive purge of Ohio’s voter rolls is in direct violation of the National Voter Registration Act of 1993 (NVRA), which stipulates specifically that voters can only be removed from the rolls if they request, die, and move out of state. It additionally stipulates that when purges are conducted, they must be geographically nondiscriminatory, so as to minimize the impacts of targeting specific socioeconomic, racial, or ethnic demographics.
“We have spoken to purged voters from around the state of Ohio who tried to vote in the November 2015 local election and were turned away,” Freda Levenson, legal director for the ACLU og Ohio said in a statement, “The already widespread disenfranchisement that has resulted from this process is likely to be much worse in a presidential election year.”
As ACLU attorneys allege, this voter purging process is not only illegal, but additionally unnecessary as the state already uses the Postal Service’s information to keep its rolls’ accuracy. They argue it is a backhanded attempt to marginalize voters who would otherwise not support Husted and the incumbent Kasich administration.
Ohio is often considered one of the most critical battleground states in national elections.
Husted, who also serves as Ohio’s election director, has already been targeted this primary cycle with legal action over his attempts to marginalize voter turnout. In early March, Bernie Sanders’ campaign filed suit and successfully won against Husted, contending that his decision to bar 17 year olds from voting in the primary who will turn 18 before Election Day was an “unconstitutional attempt to block young voters from casting ballots.” |
For the fall season, they decided to try something unusual for NYC's ramen scene, debuting Atsumori Tsukemen, a dipping-style ramen that's not found at most ramen-yas on this side of the Pacific. En savoir plus
Ippudo was brought to NYC by Shigemi Kawahara, who is known as "the Ramen King" in Japan; his rich, cloudy tonkotsu broths draw the longest lines the city's ramen-ya, and they're well worth the wait. En savoir plus |
Sinclair Broadcast Group and the Walt Disney Company have closed their $9.6 billion deal for Sinclair to buy 21 Fox Regional Sports Networks and Fox College Sports.
The deal was announced in May after Disney bought the networks as part of its acquisition of Twenty-First Century Fox. The portfolio, which excludes the YES Network, is described as the largest collection of RSNs in the marketplace and includes exclusive local rights to 42 professional teams consisting of 14 Major League Baseball (MLB) teams, 16 National Basketball Association (NBA) teams, and 12 National Hockey League (NHL) teams.
Disney was required to divest the 21 regional sports networks as part of its acquisition of 21st Century Fox’s film and TV assets in order to obtain clearance from the U.S. Department of Justice.
Chris Ripley, president & CEO of Sinclair, said, “We are very excited about the transformational aspects the RSN acquisition will have on Sinclair and are eager to bring those opportunities to life. We welcome Jeff Krolik, President of the RSNs, and the rest of the RSN management team and staff to the Sinclair family. We have an exciting future ahead of us.”
The RSNs were acquired via Sinclair’s Diamond Sports Group, in which Entertainment Studios chief Byron Allen has invested. The deal comes a year after Allen bought The Weather Channel. The deal was funded through a $1.4 billion cash contribution from Sinclair, $1 billion of preferred equity, a $3.3 billion secured term B loan facility, $3.1 billion of secured notes and $1.8 billion of senior notes.
The RSN brands acquired by Sinclair are: Fox Sports Arizona, Fox Sports Detroit, Fox Sports Florida, Fox Sports Sun, Fox Sports North, Fox Sports Wisconsin, Fox Sports Ohio, SportsTime Ohio, Fox Sports South, Fox Sports Carolina, Fox Sports Tennessee, Fox Sports Southeast, Fox Sports Southwest, Fox Sports Oklahoma, Fox Sports New Orleans, Fox Sports Midwest, Fox Sports Kansas City, Fox Sports Indiana, Fox Sports San Diego, Fox Sports West, and Prime Ticket. |
Travel Blogs from Waterloo
... was not working, we had a lesson in patience.
This morning we got up early and packed up. We took a short walk around Waterloo and then waited until it was time to head to the park with the group for breakfast and an outdoor worship service-- all ...
... spending five days in St. Peter with my sister and her family; I'm off! The first stop on my haphazardly planned trail is Waterloo, Iowa. Not an original point on my map, but I discovered that the John Deere Farm Implement Company offers tours at ...
... may cause a slight curvature in my spine. I might have to rethink this one. It's also rather cold here in Waterloo. Last night was 2 degrees with a windchill of -20. I previously thought of the Astro-Start that was already ...
... ; All sorts of things went through my mind. Luckily no cars passed by, and soon I was back on the road to Waterloo automotively full and physiologically empty! I made a call to the Hampton Inn in Waterloo. All full. He ... |
February 25 is the 30th anniversary of the release of Tinsel City, the first episode of Bubblegum Crisis. Produced by ARTMIC, AIC, and Youmex, the sci-fi OVA series ran for eight episodes. Despite being cancelled short of its intended 13-episode run, it inspired a slew of spin-offs and sequels. Today, we’re talking about how it came to be made.
In ARTMIC Design Works, studio founder and series co-creator Toshimichi Suzuki declared, “Bubblegum Crisis has the type of things I like.” That’s not surprising; Crisis was one of the most successful iterations of the ARTMIC archetype and the studio itself was created in Suzuki’s own multitalented image.
Despite his prior experience as a producer at Tatsunoko Productions, Suzuki didn’t consider ARTMIC to be an “animation production house” intended to tackle the day-by-day production of a series or film. He said as much in an interview with Animerica magazine in 1993, “Artmic is more a place where we can utilize our designs and stories. We’re not interested in production work.” That might seem odd coming from a former producer, but then, Suzuki wasn’t just a producer. Throughout his tenure at ARTMIC, Suzuki helped plan and co-write anime, authored novels and audio dramas, and even had a side gig painting box art for model kit manufacturer Imai.
Suzuki’s experience working from creation through production to merchandising served ARTMIC well. Not only was the studio capable of overseeing the entire lifecycle of a film or OVA (with help from a production company for the actual animation, of course), but ARTMIC also helped design everything from logos to advertising campaigns. That eye for design was apparent in the studio’s animated work and at times seemingly came at the cost of everything else.
It was ARTMIC’s first major project, Technopolice 21C, that inadvertently set the studio and Suzuki on a path towards Crisis. Collaborating with Studio Nue, Suzuki intended Technopolice to be a groundbreaking sci-fi cop show set in a plausible future, but production difficulties meant that it never reached TV screens. Instead, animation from the first few episodes was patched together and released by Toho Productions as a movie in 1982. It’s easy to imagine that spending four years on the troubled series only to see it released as a salvaged film must have been incredibly frustrating for Suzuki. Three years after the theatrical release of Technopolice, he was already planning to remake it with new talent.
In December of 1985, Suzuki met music exec Junji Fujita at the Fight! Iczer-1 wrap party and they hit it off. Soon enough, Suzuki’s planned Technopolice reboot was something else entirely thanks to creative brainstorming with Fujita — it was turning into Bubblegum Crisis. There were other factors at work, too. Between the release of Technopolice in ’82 and the meeting with Fujita in ’85, three notable films had been released: Blade Runner (1982), The Terminator (1984), and Streets of Fire (1984). The influence of those films on Crisis should be readily apparent.
To hear Suzuki tell it, many of ARTMIC’s anime projects were linked — not chronologically, but thematically. Gall Force, Megazone 23, and Genesis Surviver Gaiarth all dealt with conflict between humanity and machines, albeit in different ways and at different stages of that conflict. For example, Gall Force dealt with humanity barely holding out against a superior robotic foe, while Gaiarth took place after a cataclysmic war between humans and machines. The meeting between Suzuki and Fujita had steered the Technopolice reboot project towards stories focused on “the fear the that rapid technological innovations will make people apathetic as to how these new innovations could be used.” In short: much of ARTMIC’s work was a generation-spanning tapestry of humanity’s conflict with technology, and Bubblegum Crisis was the opening act.
Earlier that year, Fujita had founded Youmex, a subsidiary of the music company Toshiba EMI. The support of Fujita and Youmex meant that Crisis not only had easy access to musical talent, but it also had money. The OVA industry during the 1980s was closely tied to major electronics manufacturers like Toshiba and Matsushita. Manufacturers used record label subsidiaries like Toshiba EMI and Victor to funnel money towards OVA production; it was vertical integration supporting the strategy of selling hardware by providing software. Sales of OVAs were relatively small compared to a hit music album, but the breakout hit Megazone 23 (also an ARTMIC co-production) had really put the format on the map. Comparatively limited sales or not, the premium cost and hardcore nature of anime fans meant that they were a worthwhile targets of hardware manufacturers. For companies like ARTMIC that created their own stories, these type of connections were incredibly important. A studio producing an OVA based on a popular manga title would have the support of its publisher and an existing fanbase to tap into, whereas ARTMIC had to put together the funding themselves to get their animation to production.
Crisis was by no means the only anime series that Youmex helped produce (other notable shows included Kimagure Orange Road, Otaku no Video, and another ARTMIC favorite, Dragon’s Heaven), but the sheer amount of music included in Crisis certainly suggested a music exec was deeply involved. Every episode had its own soundtrack album, which was an anomaly for OVAs of the era. Crisis also featured a singer with no voice acting experience as one of its main characters, as singer Oomori Kinuko played lead Priss Asagiri. Kinuko stopped singing solo vocal tracks for Crisis after the third episode, but the eighth episode featured the song Chase the Dream off the debut album of her newly band, Silk. The label releasing that album? Youmex, of course.
Chase the Dream wasn’t the first time Crisis had used a pre-existing song. Mr. Dandy, the iconic ending theme for Tinsel City was off Bluew’s self-titled debut album. That album and Tinsel City were both released on the same day: February 25, 1987.
In a bit of cruel irony, Crisis, like Technopolice, was never finished as intended. Originally envisioned to be thirteen episodes, production was cut short after only eight because of legal issues between ARTMIC and Youmex. A three episode sequel called Bubblegum Crash attempted to cover the material of the remaining five planned episodes, but stumbled without the same charm of the original (or Kinuko’s voice). Suzuki mentioned another sequel in his Animerica interview, but as of 2017, it is still unreleased.
As for ARTMIC and Youmex? Changes in the Japanese economy and the OVA market made the ’90s a difficult time for ARTMIC. When the studio went bankrupt in 1997, they defaulted on loans cosigned years prior by Youmex. Forced to take on debt they couldn’t repay, Youmex was absorbed back into Toshiba EMI in 1998. The rights to Bubblegum Crisis, along with other ARTMIC intellectual property, ended up in the hands of long-time production collaborator, AIC. But by then it didn’t really matter — the anime industry was changing, satellite TV was about to take even more market share from OVAs, and the writing was on the wall. |
// Copyright 2016 LINE Corporation
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "stellite/fetcher/spdy_utils.h"
#include "base/logging.h"
#include "base/strings/string_piece.h"
#include "net/http/http_request_headers.h"
namespace net {
const char* const kForbiddenHttpHeaderFields[] = {
":authority",
":method",
":path",
":scheme",
":version",
"method",
"scheme",
"version",
};
stellite::HttpRequest::RequestType ParseMethod(
const SpdyHeaderBlock& spdy_headers,
const SpdyMajorVersion spdy_version) {
std::string header_key = spdy_version >= SPDY3 ? ":method" : "method";
std::string method = ParseHeader(header_key, spdy_headers, spdy_version);
std::transform(method.begin(), method.end(), method.begin(), ::toupper);
if (method == "GET") {
return stellite::HttpRequest::RequestType::GET;
} else if (method == "POST") {
return stellite::HttpRequest::RequestType::POST;
} else if (method == "HEAD") {
return stellite::HttpRequest::RequestType::HEAD;
} else if (method == "DELETE") {
return stellite::HttpRequest::RequestType::DELETE_REQUEST;
} else if (method == "PUT") {
return stellite::HttpRequest::RequestType::PUT;
} else if (method == "PATCH") {
return stellite::HttpRequest::RequestType::PATCH;
}
LOG(ERROR) << "Unknown request method: " << method;
return stellite::HttpRequest::RequestType::GET;
}
std::string ParseHeader(const std::string& header_key,
const SpdyHeaderBlock& spdy_headers,
const SpdyMajorVersion spdy_version) {
SpdyHeaderBlock::const_iterator it = spdy_headers.find(header_key);
if (it == spdy_headers.end()) {
LOG(ERROR) << "Cannot find an HTTP method: " << header_key;
return std::string();
}
return it->second.as_string();
}
bool ConvertSpdyHeaderToHttpRequest(const SpdyHeaderBlock& spdy_headers,
const SpdyMajorVersion spdy_version,
HttpRequestHeaders* request_headers) {
CHECK(request_headers);
request_headers->Clear();
SpdyHeaderBlock::const_iterator it = spdy_headers.begin();
while (it != spdy_headers.end()) {
bool valid_header = true;
for (size_t i = 0; i < arraysize(kForbiddenHttpHeaderFields); ++i) {
if (it->first == kForbiddenHttpHeaderFields[i]) {
valid_header = false;
break;
}
}
if (!valid_header) {
++it;
continue;
}
base::StringPiece key(it->first);
base::StringPiece value(it->second);
if (key.size() && key[0] == ':') {
key = key.substr(1);
}
request_headers->SetHeader(key, value);
++it;
}
return true;
}
} // namespace net
|
/*
* Copyright 2015 Stormpath, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.stormpath.sdk.servlet.io;
import com.stormpath.sdk.impl.io.AbstractResource;
import com.stormpath.sdk.lang.Assert;
import javax.servlet.ServletContext;
import java.io.IOException;
import java.io.InputStream;
/**
* @since 1.0.RC3
*/
public class ServletContextResource extends AbstractResource {
public static final String SCHEME = "servletContext";
private final ServletContext servletContext;
public ServletContextResource(String location, ServletContext servletContext) {
super(qualify(location));
Assert.notNull(servletContext, "servletContext argument cannot be null.");
this.servletContext = servletContext;
}
@Override
protected String canonicalize(String input) {
return qualify(super.canonicalize(input));
}
private static String qualify(String location) {
if (location != null && !location.startsWith("/")) {
return "/" + location;
}
return location;
}
@Override
protected String getScheme() {
return SCHEME;
}
@Override
public InputStream getInputStream() throws IOException {
return servletContext.getResourceAsStream(getLocation());
}
}
|
Archibald McCoig
Archibald Blake McCoig (April 8, 1873 – November 21, 1927) was a Canadian politician.
Born in Tilbury East, Ontario, the son of Daniel McCoig, a Scottish immigrant, he was elected as a Liberal candidate to the Legislative Assembly of Ontario for the provincial riding of Kent West in the 1905 election. In 1908, he was elected to the House of Commons of Canada for the federal riding of Kent West. A Liberal, he was re-elected in 1911, 1917, and 1921. In 1922, he was called to the Senate of Canada representing the senatorial division of Kent, Ontario to allow James Murdock, the Minister of Labour, to take his seat. He served until his death in 1927.
McCoig married Adele M. Demarse in 1898. He served on the Chatham town council.
References
Canadian Parliamentary Guide, 1912, EJ Chambers
External links
Category:1873 births
Category:1927 deaths
Category:Canadian senators from Ontario
Category:Liberal Party of Canada MPs
Category:Ontario Liberal Party MPPs
Category:Liberal Party of Canada senators
Category:Members of the House of Commons of Canada from Ontario |
<?xml version="1.0"?>
<configuration>
<configSections>
<sectionGroup name="system.web.extensions" type="System.Web.Configuration.SystemWebExtensionsSectionGroup, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35">
<sectionGroup name="scripting" type="System.Web.Configuration.ScriptingSectionGroup, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35">
<!-- <section name="scriptResourceHandler" type="System.Web.Configuration.ScriptingScriptResourceHandlerSection, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" requirePermission="false" allowDefinition="MachineToApplication"/> -->
<sectionGroup name="webServices" type="System.Web.Configuration.ScriptingWebServicesSectionGroup, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35">
<!-- <section name="jsonSerialization" type="System.Web.Configuration.ScriptingJsonSerializationSection, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" requirePermission="false" allowDefinition="Everywhere"/>
<section name="profileService" type="System.Web.Configuration.ScriptingProfileServiceSection, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" requirePermission="false" allowDefinition="MachineToApplication"/>
<section name="authenticationService" type="System.Web.Configuration.ScriptingAuthenticationServiceSection, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" requirePermission="false" allowDefinition="MachineToApplication"/>
<section name="roleService" type="System.Web.Configuration.ScriptingRoleServiceSection, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" requirePermission="false" allowDefinition="MachineToApplication"/> -->
</sectionGroup>
</sectionGroup>
</sectionGroup>
</configSections>
<appSettings/>
<connectionStrings/>
<system.web>
<!--
Set compilation debug="true" to insert debugging
symbols into the compiled page. Because this
affects performance, set this value to true only
during development.
-->
<compilation debug="true">
<assemblies>
<add assembly="System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=B77A5C561934E089"/>
<add assembly="System.Data.DataSetExtensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=B77A5C561934E089"/>
<add assembly="System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
<add assembly="System.Xml.Linq, Version=3.5.0.0, Culture=neutral, PublicKeyToken=B77A5C561934E089"/>
</assemblies>
</compilation>
<!--
The <authentication> section enables configuration
of the security authentication mode used by
ASP.NET to identify an incoming user.
-->
<authentication mode="Windows"/>
<!--
The <customErrors> section enables configuration
of what to do if/when an unhandled error occurs
during the execution of a request. Specifically,
it enables developers to configure html error pages
to be displayed in place of a error stack trace.
<customErrors mode="RemoteOnly" defaultRedirect="GenericErrorPage.htm">
<error statusCode="403" redirect="NoAccess.htm" />
<error statusCode="404" redirect="FileNotFound.htm" />
</customErrors>
-->
<pages>
<controls>
<add tagPrefix="asp" namespace="System.Web.UI" assembly="System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
<add tagPrefix="asp" namespace="System.Web.UI.WebControls" assembly="System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
</controls>
</pages>
<httpHandlers>
<remove verb="*" path="*.asmx"/>
<add verb="*" path="*.asmx" validate="false" type="System.Web.Script.Services.ScriptHandlerFactory, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
<add verb="*" path="*_AppService.axd" validate="false" type="System.Web.Script.Services.ScriptHandlerFactory, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
<add verb="GET,HEAD" path="ScriptResource.axd" type="System.Web.Handlers.ScriptResourceHandler, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35" validate="false"/>
</httpHandlers>
<httpModules>
<add name="ScriptModule" type="System.Web.Handlers.ScriptModule, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
</httpModules>
</system.web>
<system.codedom>
<compilers>
<compiler language="c#;cs;csharp" extension=".cs" warningLevel="4" type="Microsoft.CSharp.CSharpCodeProvider, System, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089">
<providerOption name="CompilerVersion" value="v4.0"/>
<providerOption name="WarnAsError" value="false"/>
</compiler>
</compilers>
</system.codedom>
<!--
The system.webServer section is required for running ASP.NET AJAX under Internet
Information Services 7.0. It is not necessary for previous version of IIS.
-->
<system.webServer>
<validation validateIntegratedModeConfiguration="false"/>
<modules>
<remove name="ScriptModule"/>
<add name="ScriptModule" preCondition="managedHandler" type="System.Web.Handlers.ScriptModule, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
</modules>
<handlers>
<remove name="WebServiceHandlerFactory-Integrated"/>
<remove name="ScriptHandlerFactory"/>
<remove name="ScriptHandlerFactoryAppServices"/>
<remove name="ScriptResource"/>
<add name="ScriptHandlerFactory" verb="*" path="*.asmx" preCondition="integratedMode" type="System.Web.Script.Services.ScriptHandlerFactory, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
<add name="ScriptHandlerFactoryAppServices" verb="*" path="*_AppService.axd" preCondition="integratedMode" type="System.Web.Script.Services.ScriptHandlerFactory, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
<add name="ScriptResource" preCondition="integratedMode" verb="GET,HEAD" path="ScriptResource.axd" type="System.Web.Handlers.ScriptResourceHandler, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/>
</handlers>
</system.webServer>
<runtime>
<assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">
<dependentAssembly>
<assemblyIdentity name="System.Web.Extensions" publicKeyToken="31bf3856ad364e35"/>
<bindingRedirect oldVersion="1.0.0.0-1.1.0.0" newVersion="3.5.0.0"/>
</dependentAssembly>
<dependentAssembly>
<assemblyIdentity name="System.Web.Extensions.Design" publicKeyToken="31bf3856ad364e35"/>
<bindingRedirect oldVersion="1.0.0.0-1.1.0.0" newVersion="3.5.0.0"/>
</dependentAssembly>
</assemblyBinding>
</runtime>
</configuration>
|
The present invention relates generally to information delivery systems and, particularly, to a novel, WWW/Internet-based, telecommunications network management service for customers of a telecommunications service provider.
Telecommunications service entities, e.g., MCI, ATandT, Sprint, and the like, presently provide for the presentation and dissemination of customer account and network data management information to their customers predominantly by enabling customers (clients) to directly dial-up, e.g., via a modem, to the entity""s application servers to access their account information, or, alternately, via dedicated communication lines, e.g., ISDN, T-1, etc., enabling account information requests to be initiated through their computer workstation running, for example, a Windows-based graphical user interface. The requests are processed by the entity""s application server""s, which retrieves the requested customer information from one or more databases, processes and formats the information for downloading to the client""s personal computer, or more primitively, a 3270 dumb terminal or a low-end workstation.
Telecommunications service providers that offer 800/8xx (toll-free) and other xe2x80x9cvirtualxe2x80x9d telecommunications network services, e.g., private networks, to their customers currently provide some type of user interaction to manage their virtual and private networks and call routing plans.
The assignee of the present invention, MCI, currently provides an MCI ServiceView (xe2x80x9cMSVxe2x80x9d) product line referred to as Virtual Network xe2x80x9cVnetxe2x80x9d which is a telecommunications service offering private network capabilities and features at low cost to multi-location companies with domestic and international calling needs. Particularly, the Vnet virtual network uses switched public network facilities, sophisticated software systems, and MCI""s virtual network to provide customers with a private voice and data network. MCI""s Vnet service additionally provides consolidated long distance service for all locations, eliminating the need to provide multiple long distance services to locations of different sizes. Thus, Vnet is suitable for long distance calls between company locations, as well as long distance calls to U.S. and international locations. This allows for a consolidation of all company long distance usage charges for all locations under one corporate invoice and one basic rate structure subject to a volume discount.
Another MCI MSV product is referred to as xe2x80x9cVisionxe2x80x9d which is an integrated product for consolidated or multi-location business. The xe2x80x9cVisionxe2x80x9d network platform is similar to that of xe2x80x9cVnet,xe2x80x9d and is also a software defined virtual network telecommunications service offering a single solution for: domestic and international outbound calling, inbound Toll-Free service, card, data and the different access types which include: outbound, Toll-free inbound, switched data, dedicated and IntraLATA. Vision also offers Customized Business Programs with special rates and discounts geared to meet customer""s specific traffic pattern needs.
Further provided by MCI is an MSV Outbound Network Management system (xe2x80x9cOutbound NMxe2x80x9d) which enables customers to manage the Vnet/Vision Features selected for their networks including: 1) Call Tracking and Control Features: 2) Call Routing Features: and 3) Multiple Networks Feature. Particularly, the MSV Outbound NM system is a PC-Windows based GUI to MCI""s Network Control System (xe2x80x9cNCSxe2x80x9d) which comprises interrelated software and hardware components allowing customer""s to enter and process MCI Outbound NM orders. With more particularity, NCS comprises the following components: 1) a legacy order entry system referred to as MCI""s Network Capabilities System (xe2x80x9cNetCapxe2x80x9d) which system provides near xe2x80x9creal-timexe2x80x9d processing (editing, validation, logging) of customer orders pertaining to customers""Vnet and Vision networks entered therein; 2) data access points (xe2x80x9cDAPSxe2x80x9d) which implements Vnet and Vision call routing plan orders at the network switches; and, 3) a Service Control Manager (xe2x80x9cSCMxe2x80x9d) which provides the link between NetCap and the DAPs for translating, formatting and distributing the information included in the submitted orders to each of the DAPS. Once an order is implemented on the DAPS, Vnet and Vision network calls are processed with the features specified in the order.
Particularly, NetCap is a mainframe MVS system that implements an on-line subsystem for accepting orders for toll-free, VNET, and Vision routing plans. It also has a background-processing subsystem that takes these orders, processes them, stores them in a database, and feeds orders to SCM. Currently, the three methods employed for accessing NetCap are: a direct 3270 terminal connection for internal MCI users which provides access to 100 percent of NetCap""s functions; a PC-based 3270 terminal emulation program that utilizes 56 kbps dial-up access to a majority of NetCap functions; and, the PC-based Windows application entitled xe2x80x9cOutBound NM,xe2x80x9d written in C++, for example, which enables customers to implement and configure routing plans for Vnet network via the existing MCI Service View (MSV) infrastructure comprising a private network of routers and protocol converters that connect PC Windows applications to NetCap.
With more particularity, the MSV Outbound NM Call Tracking and Control feature enables a customer to establish the rules that apply to calls made on their Vnet/Vision network including: 1) establishment of Range Privileges for allowing restriction of calls to specific geographic areas; 2) establishment of Range Restrictions for restricting the use of a calling card from a specific origination point to specified termination point(s); 3) establishment of rules for extending a customer""s Vnet/Vision network beyond a corporate boundary; 4) establishment of Supplemental Codes which may be used for controlling and monitoring a business including ID codes that specify who may place calls and their range privileges, and accounting codes that associate a call with a category that a customer may specify for their internal audit/call management purposes; and 5) establishment of exclusions which enable the blocking of calls to specific numbers and/or geographic locations, e.g., prohibiting calls to a single number or range of specified public numbers.
The MSV Outbound NM Call Routing feature enables the customer to engineer the routes that calls follow on their network. Thus, customers may: 1) define a dialing plan order enabling the creation of private numbers and vanity numbers; 2) force public numbers on the network; 3) implement Customized Message Announcements (xe2x80x9cCMAxe2x80x9d) which enables a call to be routed to a pre-recorded message including, for example, customer-defined messages and error-intercept messages; 4) implement exclusions; 5) implement hotlines which enables automatic dialing of a specified number, e.g., upon lifting of the handset; and, 6) point of origin routing which enables the designation of an alternative DAL, overriding the DAL already specified in the dialing plan based on originating switch. Further, customers are enabled to reroute a call originating from a Dedicated Access Line (xe2x80x9cDALxe2x80x9d) to a different destination (DAL), Calling Party Number (xe2x80x9cCPNxe2x80x9d) or customized message announcement) when the called number is busy. A dedicated access line is a direct link from a company tp the nearest service provider switch.
The MSV Outbound NM Multiple Networks feature enables a Vnet to be structured in a way that a company""s individual subsidiaries or divisions may have their own sub-network of the company""s xe2x80x9cmainxe2x80x9d Vnet network and enables the individual subsidiaries or divisions to define their own Vnet requirements.
Using the MSV MCI Outbound NM involves creating and approving orders that change the configuration of a customer""s network. MCI Outbound NM assigns each order a unique number (e.g., in the format VXXXXXX) and presents a series of screens for user input and approval. Once the order is approved and becomes complete in the system, it becomes a record in the customer""s inventory, and the change is active within the customer""s network. An inventory is a complete listing of the current configuration of a customer""s Vnet/Vision Network, including Calling Party Numbers (CPNs), Calling Cards, Dedicated Access Lines (DALs), Remote Access Number(s) and all active records (complete orders) in the network database.
Subject to predefined security access privileges, the functionality for processing an order using MSV Outbound NM includes: creating a new order or open an existing order; specifying a Date/Time that the host system is to complete the order; specifying an Order Priority for processing by the host; adding/changing/deleting information on the order as required; and, approving the order.
Specifically, there are two types of access levels to MCI MSV Outbound NM: 1) System Administrator; and, 2) User. For example, a special User ID may be established for each System Administrator of the customer""s corporation which would enable the system administrator to perform the following: 1) view a list of users or workstations; 2) add a user; 3) add an MCI ServiceView application to a user; 4) Modify user information; 5) reset a user""s password; 6) delete a user and/or application. The System Administrator may further assign or restrict certain MCI Outbound NM features for each user which can range from the types of orders a user can access, to various levels of order administration privileges, such as approving or unapproving an order. For example, MCI Outbound NM user privileges that may be established include: permitting or restricting a user""s access to 1) calling party number (CPN) orders; 2) Calling Card Orders; 3) dialing plan orders; and 4) ID code set orders. Further privileges may include: 5) authority to approve orders. For example, if user""s access is restricted, the user may create orders, but they will remain in a xe2x80x9cNot Approvedxe2x80x9d status when the orders are closed. A user with order approval authority must open the orders and approve them to release them for processing; 6) authority to specify an order priority, e.g., immediate approval would correspond to order priority 1; 7) authority to modify orders. For example, if permitted, the user can modify/delete orders that are in xe2x80x9cNot Approvedxe2x80x9d status; 8) authority to unapprove orders. For example, if permitted, the user can unapprove an xe2x80x9capprovedxe2x80x9d order that has not yet completed, in order to modify or delete the order; and, 9) ability to modify the date/time required for an approved order. Further order administrative functions enabled by MSV Outbound NM include: ability too review orders without changing them; and, the ability to see the status of an order.
While the current Outbound Network Management features in the current MSV platform are sufficient for those with existing access, a need exists to provide a newer, faster platform with new Outbound network management capabilities for customers through the public Internet.
Moreover, a need exists to integrate the existing MSV Outbound network management client-server application in a Web-based platform which provides expedient comprehensive and more secure data access and reporting services to customers from any Web browser on any computer workstation anywhere in the world.
The present invention is directed to a novel Outbound network management tool for a Web-based (Internet and Intranet) client-server application that enables customers to define their own Virtual Network (Vnet) routing plans via the Web/Internet. The Outbound network management tool enables customers to order and link network attributes and features to their outbound network calling party numbers, calling cards, and Vnet/Vision dialing plans, and to assign ID Code/Set(s) to outbound network subscribers.
The Outbound network management tool client server application is a Web-based, object-oriented application that implements a Remote Method Invocation xe2x80x9cRMIxe2x80x9d-like protocol providing customers with the ability to request, specify, receive and view data pertaining to their Vnet network management assets, e.g., Vnet number routing plans, calling card inventories, etc., and to generate orders for changing aspects of the Vnet routing plans via a World Wide Web interface. |
Share this on:
Zimbabwe officer who used Mugabe's toilet awaits word on his fate
A police officer was sentenced last week to 10 days in jail for using a toilet reserved for Robert Mugabe (pictured) at a trade fair.
STORY HIGHLIGHTS
Police officer on security team at Zimbabwe trade fair had to go, and used VIP toilet
It was reserved for President Robert Mugabe and African Export Import Bank chief
Relative of officer says he hopes the guilty verdict will be overturned this week
Harare, Zimbabwe (CNN) -- A police officer in Zimbabwe who has languished at a police detention barracks for a month for using a toilet reserved for President Robert Mugabe will learn his fate at end of this week following an appeal to his boss.
Alois Mabhunu, a homicide detective was sentenced last week to 10 days after he was convicted by an internal police court for responding to a call of nature in a toilet which had been reserved for Mugabe at a trade fair in Zimbabwes second biggest city.
On Monday, a relative of Mabhunu said the officer was not represented by a lawyer at the hearing, but is hoping the police commissioner-general, Augustine Chihuri, will overturn the guilty verdict this week. He said he had heard that Chihuri will look at the appeal on Thursday or Friday.Besides serving the 10-day sentence, Mabhunu, a homicide detective, has been demoted and will no longer be allowed to wear plain clothes.
Contacted for comment, Wayne Bvudzijena police spokesperson on Monday said the issue of Mabhunu was an internal, purely disciplinary matter on which he couldn't comment. Bvudzijen said Mabhunu failed to obey instructions and the law had to take its course.
Mabhunu was part of the security team when Mugabe attended the Zimbabwe International Trade Fair last month. He is alleged to have rushed to the VIP toilets reserved for Mugabe and Jean Louis Ekra, head of the African Export Import Bank, who was participating in the opening ceremonies.
When he was stopped by other officers guarding the toilets, he obliged, but he later forced his way in. The following day he was arrested, he has been in custody since then. |
Returns & Order Cancellation
RETURNS POLICY
Artisans Rose believes in providing statement decor objects, and each product comes with its own return policy, as indicated alongside its detailed description. Some products cannot be returned. However, in select cases, you may even be able to get a product replaced with an identical one.
In the rare event that you receive a damaged or defective product, please get in touch with the help desk within 24 hours of receiving the said product. Initiate the process by writing to us at [email protected] with the subject line “Product return [your invoice number]”. We request that you send us a photo of any damage for our records; it will help us assist you further. We will also require the image of the packaging, the box in which it was packed so that we can investigate the issue with our logistics partner.
No requests for returns/refunds and exchange will be entertained after 24 hours from the time of delivery.
When it comes to returns, please make sure to keep the following things in place:
Notify Artisans Rose of receipt of a damaged or defective product within 48 hours of delivery to you
Products should be unused
Products must be returned in new and unopened condition with all the original packing, tags, labels, barcodes, manuals, accessories, etc
CANCELLATIONS POLICY
Since we process your orders at the earliest, cancellations are possible only until the pre-shipping stage. We can cancel your order within 24 hours from placing your order. Once the item has shipped, we cannot cancel your order. Please contact our help desk to assist you with the same by writing to us at [email protected] with the subject line “Product cancellation [your invoice number]”, and we’ll process your request at the earliest.
Successful order cancellation is followed by Artisans Rose generating a credit voucher of the same value of such product, as originally paid by you. This voucher will be issued only electronically within 48-72 hours of successful cancellation. The voucher along with the voucher code will be sent to your email address and will also be available on your Artisans Rose login. Please note that the voucher (and its entire value) is valid for one time use only and may be redeemed against a purchase of the same or higher value of the voucher. A promo code, once used shall not be refunded in case of cancellation of order either by customer or Artisans Rose.
EXCHANGE POLICY
Most products on Artisans Rose are one-of-a-kind décor objects, accents, collectibles and/or relics. Therefore, those products may be available only for “Final sale” and will not fall under our exchange policy. This information is provided against each product listed on Artisans Rose alongside its detailed description. Please read the description carefully to make the best of your e-shopping experience.
We are more than happy to exchange the product for you if it is damaged. However, if that is not the case, any product once sold cannot be exchanged or returned. |
[Bioavailability of penicillin V in aqueous dosage forms].
The bioavailability of Megacillin-oral-Trockensaft (active substance: potassium salt of phenoxymethylpenicillin, penicillin V potassium) was compared with that of another commercially available drug containing the same active substance. In a cross-over study, 12 healthy volunteers were administered by oral route 10 ml of each preparation (equivalent to 600 000 U = 392.2 mg potassium salt of phenoxymethylpenicillin) under standardized experimental procedure. Relative bioavailability was assessed by determination of phenoxymethylpenicillin concentrations in the plasma, employing both microbiological assay as well as high-performance liquid chromatography, by computation of the areas under the plasma concentration curves, and by calculation of the time periods necessary for the attainment of maximum plasma concentrations. In order to assess differences between the two forms in duration of efficacy, calculation of time intervals were based on plasma concentrations which were above 0.5; 1.0 or 1.5 micrograms/ml, respectively. Results of this comparative study indicate that Megacillin-oral-Trockensaft is superior to the other commercial preparation. The considerably better bioavailability of Megacillin-oral-Trockensaft is attributed to a substantially higher absorption rate and to a 2.4 times greater extent of absorption. Due to the distinct advantage in the bioavailability of Megacillin-oral-Trockensaft peak plasma concentrations of phenoxymethylpenicillin 5-6 fold higher and are reached faster when compared with those following intake of the other form tested. In practice, the superior bioavailability of Megacillin-oral-Trockensaft guarantees quicker initiation of therapeutic activity and greater safety (higher plasma concentrations, prolonged effect). |
Where should I configure the default gateway, "ifcfg-eth0" or "network"?
User Name
Remember Me?
Password
Linux - ServerThis forum is for the discussion of Linux Software used in a server related context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Where should I configure the default gateway, "ifcfg-eth0" or "network"?
Got a (maybe) silly question here...
It seems that you can configure default gateway by putting a line "GATEWAY=X.X.X.X" in both /etc/sysconfig/network-scripts/ifcfg-eth0 and /etc/sysconfig/network files. What is the difference between these two types of setups (in case there are more than 1 ethernet cards)? Do they have to be both configured? Thanks!
One possible difference that I see is that when you have this in the /etc/sysconfig/network it is not tied to an interface. but it is when you do it in the file /etc/sysconfig/network-scripts/ifcfg-eth0
When you have multiple interface and traffic is routed though a different gateway for that very interface, the GATEWAY=x.x.x.x entry enables that. We can have different gateway for different interface this way.
GATEWAY=x.x.x.x entry in the /etc/sysconfig/network file configures the 'default' gateway. 'default gateway' is used route traffic though it, when it is not defined to go through a particular interface.
When you have multiple interface and traffic is routed though a different gateway for that very interface, the GATEWAY=x.x.x.x entry enables that. We can have different gateway for different interface this way.
GATEWAY=x.x.x.x entry in the /etc/sysconfig/network file configures the 'default' gateway. 'default gateway' is used route traffic though it, when it is not defined to go through a particular interface.
Thank you avijitp for your reply! But if it has multiple interfaces, how can the server know which one to use to route the packets? If I use the server as a proxy server and all internal networks are connected to one interface and another interface is connected to the Internet, should I just configure the default gateway under the ifcfg-eth0? Thanks!
It depends upon your configuration in the network side. How the cabling has been done. If you know that your traffic toward internet will be passing through the default gateway , then configuring the 'default gateway' in /etc/sysconfig/network will do. There is no need to configure gateway though the ifcfg-ethX files.
If traffic will be going through a different gateway which is connected to a particular ethX (say.. eth1), then you should set that Gateway in that interface ifcfg-eth1 file. The Internal packet routing is then handled by kernel. In this case other interface (say eth0) can be connected to internal network(s). |
Care of the patient receiving epidural analgesia.
Epidural analgesia is a common technique used to manage acute pain after major surgery and is viewed as the 'gold standard'. When managed effectively, epidural analgesia is known to reduce the risk of adverse outcomes following major surgery. There are two main classes of medications used in epidural analgesia: opioids and local anaesthetics. Both of these drugs are beneficial in reducing or eliminating pain, but are also responsible for the common side effects associated with this method of pain relief. There are also some rare and potentially fatal side effects of epidural therapy. The nurse's role is to assess and monitor patients carefully and report and respond to any concerns. |
DAYTONA BEACH, Fla. (AP) -- A Florida judge has sentenced a 27-year-old man to 10 years of probation for running naked through Daytona Beach International Airport, screaming about a bomb threat.
The judge on Thursday also ordered John Greenwood to pay restitution to American and Delta airlines for flight delays caused by the May 11, 2018, airport evacuation caused by his bomb threat.
The sentence is less than the four years recommended by state sentencing guidelines.
Greenwood's attorney told the judge his client was addicted to Adderall and that he suffered traumatic head injuries in a 2015 accident. |
Shipping & Returns
Product Information
Why We Love This
This shapely set is glazed with a versatile, neutral finish; with or without blooms, they refresh any space.
Based in Dallas, Global Views is proud to offer an exquisite array of home goods, entirely designed in-house and produced by skilled craftsmen around the world. While the design and function of each piece varies, the brand’s commitment to consistency in exacting detail and high quality remains the same. This is evident in all of Global Views’ offerings, which the company refers to as unique jewels for every decor.
Description:
As stately as an antique trophy, this elongated
silvery urn is treated to a simple black base and clever cut-outs along the top.A quick glimpse at the selection of Global Views’ offering tells it best: trays and tables influenced by ... |
Lake Baikal, in eastern Siberia, is no ordinary lake. Here are some interesting facts about it:
» Lake Baikal is the deepest lake in the world with a maximum depth of 1,632m
» It is also the world’s largest volume of fresh water 23,000 cubic km.
» This means that one-fifth of all the fresh water in the world is located here at Lake Baikal.
» Lake Baikal is 640km long and judging by its dimensions only it would be more of a sea than a lake.
» Baikal is also the world’s most ancient freshwater lake, it originated 20-25 million years ago.
» It is home to many unique species of animals and plants including the freshwater seal.
» Lake Baikal is one of the clearest and purest bodies of water. In a good day you could see 40 meters into the lake.
» Dimensions of Lake Baikal: It is 636 km long, 79 km wide.
» There are 27 islands in Lake Baikal, most of them being uninhabited.
» Baikal Lake’s coastline measures 2100 kilometers (around 1300 miles).
» More than 300 streams and rivers flow into Lake Baikal, but there is just one outlet, the Angara.
» The water in the lake creates a mild microclimate around its shores.
» More than half the species found in Lake Baikal are unique to this place. |
import 'dart:math';
import 'dart:ui';
import 'package:flutter/cupertino.dart';
import 'package:flutter/foundation.dart';
import 'package:flutter/gestures.dart';
import 'package:flutter/material.dart';
import '../extended_image_utils.dart';
///
/// create by zmtzawqlp on 2019/6/3
///
const double _kBackGestureWidth = 20.0;
const double _kMinFlingVelocity = 1.0; // Screen widths per second.
// An eyeballed value for the maximum time it takes for a page to animate forward
// if the user releases a page mid swipe.
const int _kMaxDroppedSwipePageForwardAnimationTime = 800; // Milliseconds.
// The maximum time for a page to get reset to it's original position if the
// user releases a page mid swipe.
const int _kMaxPageBackAnimationTime = 300; // Milliseconds.
// Offset from offscreen to the right to fully on screen.
final Animatable<Offset> _kRightMiddleTween = Tween<Offset>(
begin: const Offset(1.0, 0.0),
end: Offset.zero,
);
// Offset from fully on screen to 1/3 offscreen to the left.
final Animatable<Offset> _kMiddleLeftTween = Tween<Offset>(
begin: Offset.zero,
end: const Offset(-1.0 / 3.0, 0.0),
);
class TransparentMaterialPageRoute<T> extends PageRoute<T> {
/// Construct a MaterialPageRoute whose contents are defined by [builder].
///
/// The values of [builder], [maintainState], and [fullScreenDialog] must not
/// be null.
TransparentMaterialPageRoute({
@required this.builder,
RouteSettings settings,
this.maintainState = true,
bool fullscreenDialog = false,
}) : assert(builder != null),
assert(maintainState != null),
assert(fullscreenDialog != null),
//assert(opaque),
super(settings: settings, fullscreenDialog: fullscreenDialog);
/// Builds the primary contents of the route.
final WidgetBuilder builder;
@override
// transparent background
bool get opaque => false;
@override
final bool maintainState;
@override
Duration get transitionDuration => const Duration(milliseconds: 300);
@override
Color get barrierColor => null;
@override
String get barrierLabel => null;
@override
bool canTransitionFrom(TransitionRoute<dynamic> previousRoute) {
return previousRoute is MaterialPageRoute ||
previousRoute is CupertinoPageRoute ||
previousRoute is TransparentMaterialPageRoute ||
previousRoute is TransparentCupertinoPageRoute;
}
@override
bool canTransitionTo(TransitionRoute<dynamic> nextRoute) {
// Don't perform outgoing animation if the next route is a fullscreen dialog.
return (nextRoute is MaterialPageRoute && !nextRoute.fullscreenDialog) ||
(nextRoute is CupertinoPageRoute && !nextRoute.fullscreenDialog) ||
(nextRoute is TransparentMaterialPageRoute &&
!nextRoute.fullscreenDialog) ||
(nextRoute is TransparentCupertinoPageRoute &&
!nextRoute.fullscreenDialog);
}
@override
Widget buildPage(
BuildContext context,
Animation<double> animation,
Animation<double> secondaryAnimation,
) {
final Widget result = builder(context);
assert(() {
if (result == null) {
throw FlutterError(
'The builder for route "${settings.name}" returned null.\n'
'Route builders must never return null.');
}
return true;
}());
return Semantics(
scopesRoute: true,
explicitChildNodes: true,
child: result,
);
}
@override
Widget buildTransitions(BuildContext context, Animation<double> animation,
Animation<double> secondaryAnimation, Widget child) {
final PageTransitionsTheme theme = Theme.of(context).pageTransitionsTheme;
return theme.buildTransitions<T>(
this, context, animation, secondaryAnimation, child);
}
@override
String get debugLabel => '${super.debugLabel}(${settings.name})';
}
class TransparentCupertinoPageRoute<T> extends PageRoute<T> {
/// Creates a page route for use in an iOS designed app.
///
/// The [builder], [maintainState], and [fullscreenDialog] arguments must not
/// be null.
TransparentCupertinoPageRoute({
@required this.builder,
this.title,
RouteSettings settings,
this.maintainState = true,
bool fullscreenDialog = false,
}) : assert(builder != null),
assert(maintainState != null),
assert(fullscreenDialog != null),
super(settings: settings, fullscreenDialog: fullscreenDialog);
/// Builds the primary contents of the route.
final WidgetBuilder builder;
@override
// transparent background
bool get opaque => false;
/// A title string for this route.
///
/// Used to auto-populate [CupertinoNavigationBar] and
/// [CupertinoSliverNavigationBar]'s `middle`/`largeTitle` widgets when
/// one is not manually supplied.
final String title;
ValueNotifier<String> _previousTitle;
/// The title string of the previous [CupertinoPageRoute].
///
/// The [ValueListenable]'s value is readable after the route is installed
/// onto a [Navigator]. The [ValueListenable] will also notify its listeners
/// if the value changes (such as by replacing the previous route).
///
/// The [ValueListenable] itself will be null before the route is installed.
/// Its content value will be null if the previous route has no title or
/// is not a [CupertinoPageRoute].
///
/// See also:
///
/// * [ValueListenableBuilder], which can be used to listen and rebuild
/// widgets based on a ValueListenable.
ValueListenable<String> get previousTitle {
assert(
_previousTitle != null,
'Cannot read the previousTitle for a route that has not yet been installed',
);
return _previousTitle;
}
@override
void didChangePrevious(Route<dynamic> previousRoute) {
final String previousTitleString =
previousRoute is CupertinoPageRoute ? previousRoute.title : null;
if (_previousTitle == null) {
_previousTitle = ValueNotifier<String>(previousTitleString);
} else {
_previousTitle.value = previousTitleString;
}
super.didChangePrevious(previousRoute);
}
@override
final bool maintainState;
@override
// A relatively rigorous eyeball estimation.
Duration get transitionDuration => const Duration(milliseconds: 400);
@override
Color get barrierColor => null;
@override
String get barrierLabel => null;
@override
bool canTransitionFrom(TransitionRoute<dynamic> previousRoute) {
return previousRoute is CupertinoPageRoute ||
previousRoute is TransparentCupertinoPageRoute;
}
@override
bool canTransitionTo(TransitionRoute<dynamic> nextRoute) {
// Don't perform outgoing animation if the next route is a fullscreen dialog.
return (nextRoute is CupertinoPageRoute && !nextRoute.fullscreenDialog) ||
(nextRoute is TransparentCupertinoPageRoute &&
!nextRoute.fullscreenDialog);
}
/// True if an iOS-style back swipe pop gesture is currently underway for [route].
///
/// This just check the route's [NavigatorState.userGestureInProgress].
///
/// See also:
///
/// * [popGestureEnabled], which returns true if a user-triggered pop gesture
/// would be allowed.
static bool isPopGestureInProgress(PageRoute<dynamic> route) {
return route.navigator.userGestureInProgress;
}
/// True if an iOS-style back swipe pop gesture is currently underway for this route.
///
/// See also:
///
/// * [isPopGestureInProgress], which returns true if a Cupertino pop gesture
/// is currently underway for specific route.
/// * [popGestureEnabled], which returns true if a user-triggered pop gesture
/// would be allowed.
bool get popGestureInProgress => isPopGestureInProgress(this);
/// Whether a pop gesture can be started by the user.
///
/// Returns true if the user can edge-swipe to a previous route.
///
/// Returns false once [isPopGestureInProgress] is true, but
/// [isPopGestureInProgress] can only become true if [popGestureEnabled] was
/// true first.
///
/// This should only be used between frames, not during build.
bool get popGestureEnabled => _isPopGestureEnabled(this);
static bool _isPopGestureEnabled<T>(PageRoute<T> route) {
// If there's nothing to go back to, then obviously we don't support
// the back gesture.
if (route.isFirst) {
return false;
}
// If the route wouldn't actually pop if we popped it, then the gesture
// would be really confusing (or would skip internal routes), so disallow it.
if (route.willHandlePopInternally) {
return false;
}
// If attempts to dismiss this route might be vetoed such as in a page
// with forms, then do not allow the user to dismiss the route with a swipe.
if (route.hasScopedWillPopCallback) {
return false;
}
// Fullscreen dialogs aren't dismissible by back swipe.
if (route.fullscreenDialog) {
return false;
}
// If we're in an animation already, we cannot be manually swiped.
if (route.animation.status != AnimationStatus.completed) {
return false;
}
// If we're being popped into, we also cannot be swiped until the pop above
// it completes. This translates to our secondary animation being
// dismissed.
if (route.secondaryAnimation.status != AnimationStatus.dismissed) {
return false;
}
// If we're in a gesture already, we cannot start another.
if (isPopGestureInProgress(route)) {
return false;
}
// Looks like a back gesture would be welcome!
return true;
}
@override
Widget buildPage(BuildContext context, Animation<double> animation,
Animation<double> secondaryAnimation) {
final Widget result = Semantics(
scopesRoute: true,
explicitChildNodes: true,
child: builder(context),
);
assert(() {
if (result == null) {
throw FlutterError(
'The builder for route "${settings.name}" returned null.\n'
'Route builders must never return null.');
}
return true;
}());
return result;
}
// Called by _CupertinoBackGestureDetector when a pop ("back") drag start
// gesture is detected. The returned controller handles all of the subsequent
// drag events.
static _CupertinoBackGestureController<T> _startPopGesture<T>(
PageRoute<T> route) {
assert(_isPopGestureEnabled(route));
return _CupertinoBackGestureController<T>(
navigator: route.navigator,
controller: route.controller, // protected access
);
}
/// Returns a [CupertinoFullscreenDialogTransition] if [route] is a full
/// screen dialog, otherwise a [CupertinoPageTransition] is returned.
///
/// Used by [CupertinoPageRoute.buildTransitions].
///
/// This method can be applied to any [PageRoute], not just
/// [CupertinoPageRoute]. It's typically used to provide a Cupertino style
/// horizontal transition for material widgets when the target platform
/// is [TargetPlatform.iOS].
///
/// See also:
///
/// * [CupertinoPageTransitionsBuilder], which uses this method to define a
/// [PageTransitionsBuilder] for the [PageTransitionsTheme].
static Widget buildPageTransitions<T>(
PageRoute<T> route,
BuildContext context,
Animation<double> animation,
Animation<double> secondaryAnimation,
Widget child,
) {
final bool linearTransition = isPopGestureInProgress(route);
if (route.fullscreenDialog) {
return CupertinoFullscreenDialogTransition(
primaryRouteAnimation: animation,
secondaryRouteAnimation: secondaryAnimation,
child: child,
linearTransition: linearTransition,
);
} else {
return CupertinoPageTransition(
primaryRouteAnimation: animation,
secondaryRouteAnimation: secondaryAnimation,
linearTransition: linearTransition,
child: _CupertinoBackGestureDetector<T>(
enabledCallback: () => _isPopGestureEnabled<T>(route),
onStartPopGesture: () => _startPopGesture<T>(route),
child: child,
),
);
}
}
@override
Widget buildTransitions(BuildContext context, Animation<double> animation,
Animation<double> secondaryAnimation, Widget child) {
return buildPageTransitions<T>(
this, context, animation, secondaryAnimation, child);
}
@override
String get debugLabel => '${super.debugLabel}(${settings.name})';
}
/// This is the widget side of [_CupertinoBackGestureController].
///
/// This widget provides a gesture recognizer which, when it determines the
/// route can be closed with a back gesture, creates the controller and
/// feeds it the input from the gesture recognizer.
///
/// The gesture data is converted from absolute coordinates to logical
/// coordinates by this widget.
///
/// The type `T` specifies the return type of the route with which this gesture
/// detector is associated.
class _CupertinoBackGestureDetector<T> extends StatefulWidget {
const _CupertinoBackGestureDetector({
Key key,
@required this.enabledCallback,
@required this.onStartPopGesture,
@required this.child,
}) : assert(enabledCallback != null),
assert(onStartPopGesture != null),
assert(child != null),
super(key: key);
final Widget child;
final ValueGetter<bool> enabledCallback;
final ValueGetter<_CupertinoBackGestureController<T>> onStartPopGesture;
@override
_CupertinoBackGestureDetectorState<T> createState() =>
_CupertinoBackGestureDetectorState<T>();
}
class _CupertinoBackGestureDetectorState<T>
extends State<_CupertinoBackGestureDetector<T>> {
_CupertinoBackGestureController<T> _backGestureController;
HorizontalDragGestureRecognizer _recognizer;
@override
void initState() {
super.initState();
_recognizer = HorizontalDragGestureRecognizer(debugOwner: this)
..onStart = _handleDragStart
..onUpdate = _handleDragUpdate
..onEnd = _handleDragEnd
..onCancel = _handleDragCancel;
}
@override
void dispose() {
_recognizer.dispose();
super.dispose();
}
void _handleDragStart(DragStartDetails details) {
assert(mounted);
assert(_backGestureController == null);
_backGestureController = widget.onStartPopGesture();
}
void _handleDragUpdate(DragUpdateDetails details) {
assert(mounted);
assert(_backGestureController != null);
_backGestureController.dragUpdate(
_convertToLogical(details.primaryDelta / context.size.width));
}
void _handleDragEnd(DragEndDetails details) {
assert(mounted);
assert(_backGestureController != null);
_backGestureController.dragEnd(_convertToLogical(
details.velocity.pixelsPerSecond.dx / context.size.width));
_backGestureController = null;
}
void _handleDragCancel() {
assert(mounted);
// This can be called even if start is not called, paired with the "down" event
// that we don't consider here.
_backGestureController?.dragEnd(0.0);
_backGestureController = null;
}
void _handlePointerDown(PointerDownEvent event) {
if (widget.enabledCallback()) {
_recognizer.addPointer(event);
}
}
double _convertToLogical(double value) {
switch (Directionality.of(context)) {
case TextDirection.rtl:
return -value;
case TextDirection.ltr:
return value;
}
return null;
}
@override
Widget build(BuildContext context) {
assert(debugCheckHasDirectionality(context));
// For devices with notches, the drag area needs to be larger on the side
// that has the notch.
double dragAreaWidth = Directionality.of(context) == TextDirection.ltr
? MediaQuery.of(context).padding.left
: MediaQuery.of(context).padding.right;
dragAreaWidth = max(dragAreaWidth, _kBackGestureWidth);
return Stack(
fit: StackFit.passthrough,
children: <Widget>[
widget.child,
PositionedDirectional(
start: 0.0,
width: dragAreaWidth,
top: 0.0,
bottom: 0.0,
child: Listener(
onPointerDown: _handlePointerDown,
behavior: HitTestBehavior.translucent,
),
),
],
);
}
}
/// A controller for an iOS-style back gesture.
///
/// This is created by a [CupertinoPageRoute] in response from a gesture caught
/// by a [_CupertinoBackGestureDetector] widget, which then also feeds it input
/// from the gesture. It controls the animation controller owned by the route,
/// based on the input provided by the gesture detector.
///
/// This class works entirely in logical coordinates (0.0 is new page dismissed,
/// 1.0 is new page on top).
///
/// The type `T` specifies the return type of the route with which this gesture
/// detector controller is associated.
class _CupertinoBackGestureController<T> {
/// Creates a controller for an iOS-style back gesture.
///
/// The [navigator] and [controller] arguments must not be null.
_CupertinoBackGestureController({
@required this.navigator,
@required this.controller,
}) : assert(navigator != null),
assert(controller != null) {
navigator.didStartUserGesture();
}
final AnimationController controller;
final NavigatorState navigator;
/// The drag gesture has changed by [fractionalDelta]. The total range of the
/// drag should be 0.0 to 1.0.
void dragUpdate(double delta) {
controller.value -= delta;
}
/// The drag gesture has ended with a horizontal motion of
/// [fractionalVelocity] as a fraction of screen width per second.
void dragEnd(double velocity) {
// Fling in the appropriate direction.
// AnimationController.fling is guaranteed to
// take at least one frame.
//
// This curve has been determined through rigorously eyeballing native iOS
// animations.
const Curve animationCurve = Curves.fastLinearToSlowEaseIn;
bool animateForward;
// If the user releases the page before mid screen with sufficient velocity,
// or after mid screen, we should animate the page out. Otherwise, the page
// should be animated back in.
if (doubleCompare(velocity.abs(), _kMinFlingVelocity) >= 0) {
if (velocity > 0) {
animateForward = false;
} else {
animateForward = true;
}
} else {
if (controller.value > 0.5) {
animateForward = true;
} else {
animateForward = false;
}
}
if (animateForward) {
// The closer the panel is to dismissing, the shorter the animation is.
// We want to cap the animation time, but we want to use a linear curve
// to determine it.
final int droppedPageForwardAnimationTime = min(
lerpDouble(
_kMaxDroppedSwipePageForwardAnimationTime, 0, controller.value)
.floor(),
_kMaxPageBackAnimationTime,
);
controller.animateTo(1.0,
duration: Duration(milliseconds: droppedPageForwardAnimationTime),
curve: animationCurve);
} else {
// This route is destined to pop at this point. Reuse navigator's pop.
navigator.pop();
// The popping may have finished inline if already at the target destination.
if (controller.isAnimating) {
// Otherwise, use a custom popping animation duration and curve.
final int droppedPageBackAnimationTime = lerpDouble(
0, _kMaxDroppedSwipePageForwardAnimationTime, controller.value)
.floor();
controller.animateBack(0.0,
duration: Duration(milliseconds: droppedPageBackAnimationTime),
curve: animationCurve);
}
}
if (controller.isAnimating) {
// Keep the userGestureInProgress in true state so we don't change the
// curve of the page transition mid-flight since CupertinoPageTransition
// depends on userGestureInProgress.
AnimationStatusListener animationStatusCallback;
animationStatusCallback = (AnimationStatus status) {
navigator.didStopUserGesture();
controller.removeStatusListener(animationStatusCallback);
};
controller.addStatusListener(animationStatusCallback);
} else {
navigator.didStopUserGesture();
}
}
}
class CupertinoPageTransition extends StatelessWidget {
/// Creates an iOS-style page transition.
///
/// * `primaryRouteAnimation` is a linear route animation from 0.0 to 1.0
/// when this screen is being pushed.
/// * `secondaryRouteAnimation` is a linear route animation from 0.0 to 1.0
/// when another screen is being pushed on top of this one.
/// * `linearTransition` is whether to perform primary transition linearly.
/// Used to precisely track back gesture drags.
CupertinoPageTransition({
Key key,
@required Animation<double> primaryRouteAnimation,
@required Animation<double> secondaryRouteAnimation,
@required this.child,
@required bool linearTransition,
}) : assert(linearTransition != null),
_primaryPositionAnimation = (linearTransition
? primaryRouteAnimation
: CurvedAnimation(
// The curves below have been rigorously derived from plots of native
// iOS animation frames. Specifically, a video was taken of a page
// transition animation and the distance in each frame that the page
// moved was measured. A best fit bezier curve was the fitted to the
// point set, which is linearToEaseIn. Conversely, easeInToLinear is the
// reflection over the origin of linearToEaseIn.
parent: primaryRouteAnimation,
curve: Curves.linearToEaseOut,
reverseCurve: Curves.easeInToLinear,
))
.drive(_kRightMiddleTween),
_secondaryPositionAnimation = (linearTransition
? secondaryRouteAnimation
: CurvedAnimation(
parent: secondaryRouteAnimation,
curve: Curves.linearToEaseOut,
reverseCurve: Curves.easeInToLinear,
))
.drive(_kMiddleLeftTween),
// _primaryShadowAnimation =
// (linearTransition
// ? primaryRouteAnimation
// : CurvedAnimation(
// parent: primaryRouteAnimation,
// curve: Curves.linearToEaseOut,
// )
// ).drive(_kGradientShadowTween),
super(key: key);
// When this page is coming in to cover another page.
final Animation<Offset> _primaryPositionAnimation;
// When this page is becoming covered by another page.
final Animation<Offset> _secondaryPositionAnimation;
//final Animation<Decoration> _primaryShadowAnimation;
/// The widget below this widget in the tree.
final Widget child;
@override
Widget build(BuildContext context) {
assert(debugCheckHasDirectionality(context));
final TextDirection textDirection = Directionality.of(context);
return SlideTransition(
position: _secondaryPositionAnimation,
textDirection: textDirection,
transformHitTests: false,
child: SlideTransition(
position: _primaryPositionAnimation,
textDirection: textDirection,
child: child
// DecoratedBoxTransition(
// decoration: _primaryShadowAnimation,
// child: child,
// ),
),
);
}
}
|
It was hard to parody Hollywoods loony limousine liberalism this summer. Im coming out, trumpeted actress Jane Fonda about her plans for an anti-Iraq-war bus tour (thankfully later canceled). I have not taken a stand on any war since Vietnamif stand is the right word for her 1972 lovefest with the enemy. Paramount announced that conspiracy-minded director Oliver Stone, who described the 9/11 terrorists revolt as a legitimate **** you, **** your order to culture-controlling American movie corporations (of all things), will helm Tinseltowns first large-scale drama about the attacks. David Koepp, co-writer of Steven Spielbergs remake of War of the Worlds, likened the movies ravaging aliens to the U.S. military in Iraq. And on the Huffington Post website, such celebrity lefties as Rob Reiner and Laurie David huffed daily about President Bushs outrages against civil liberties, Mother Earth, and all thats proper.
But guess what: ever more Americans are shunning Hollywoods waresand disgust with Left Coast politics, both on and off screen, clearly plays a part. In a time of declining moviegoing, what gets people out to the theaters, it turns out, are conservative moviesconservative not so much politically but culturally and morally, focusing on the battle between good and evil, the worth of heroism and self- sacrifice, the indispensability of family values and martial honor, and the existence of Truth. Hollywood used to turn out a steady supply of such movieswatch just about any film from its Golden Age of the thirties and fortiesand it still makes them once in a while (sometimes thanks to off-screen lefties like Steven Spielberg). We may soon see a lot more of them.
Theres no question Hollywood is reeling. Film attendance is down a wrenching 12 percent from last year, and a May USA Today/CNN/Gallup poll found that nearly half of American adults go to movies less often than they did in 2000. Some pundits have blamed the rising price of tickets, but in constant dollars a ticket costs less than it did 25 years ago. Others believe that its all those DVDs that people are buyingexcept that DVD sales are slumping, too. The most likely explanation is the left-wing politics. You can date the recent box-office decline from the end of the summer last year, with the intensification of the presidential campaign, notes conservative film critic and talk-radio host Michael Medved. It wasnt just Hollywoods hostility toward President Bush; it was the naked, raw partisanship.
If even one in ten Bush voters boycotted Hollywood after hearing the latest Tim Robbins anti-Bush diatribe or seeing yet another big-screen conservative villain (like the Dick Cheney look-alike who nearly destroyed the world in last years The Day After Tomorrow), it would add up to 6 million fewer viewers, Medved points out. This is what many people in the movie industry dont get: when you express hostility to conservatives, many Americans feel that youre expressing hostility to them.
Surveys support Medveds theory. A Hollywood Reporter poll finds that nearly one in two Americans might shun a film starring an actor whose politics repulsed them. The politics is definitely having an impact, observes Govindini Murty, an actress and editor of Libertas, an influential conservative film blog. Do car companies insult Republicans in their ads?
When Hollywood does put its liberal worldview aside to make movies that embody traditional values, it often scores big with the public. Consider 2004s Spider-Man 2, a sequel far better than the original. Directed by Sam Raimi, the movie is a visual wonder: the scenes of Spider-Man (played by soft-spoken Tobey Maguire) battling the tentacled benefactor-of-humanity-turned-terrorist Doctor Octopus (Alfred Molina) high above New Yorkfurious tangles of fists, mechanical arms, and shattered glass and stonevirtually explode off the screen. Spider-Man 2 is so eye-catching that you might miss the storys old-fashioned moral truths.
The movie is a fable about duty and heroism. Young Peter Parker decides to hang up his Spider-Man costume, since his super-heroicsmade possible by the bite of a genetically mutated spiderhave kept him from chasing his dreams, which include, above all, winning Mary Jane Watson (Kirsten Dunst). Parker takes this step after visiting an aging hippie doctor, Grateful Dead shirt under white scrubs, who advises, in vintage if-it-feels-good-do-it style: You always have a choice.
Yet as city crime skyrockets and the threat of Doc Ock grows, Parkers conscience haunts him. In a crucial scene, his loving Aunt May (Rosemary Harris), the moral center of his life, sets him straight. Everybody loves a hero, she says. People line up for them, cheer them, scream their names. And years later, theyll tell how they stood in the rain for hours just to get a glimpse of the one who taught them how to hold on a second longer. Her old voice grows somber. I believe theres a hero in all of us, that keeps us honest, gives us strength, makes us noble, and finally allows us to die with pride, even though sometimes we have to be steady, and give up the thing we want most. Even our dreams.
Struck by her plain wisdom, Parker eventually does the right thing, not his own thing: Spider-Man returns and saves Gotham from Doc Ock. Not, though, before a band of straphangers risk their lives by stepping between the injured superhero and his terrifying enemy, proving that one doesnt need superpowers to be valianta lesson that New Yorkers know well after September 11. The movies essential message is exactly contrary to the guilt-free just do it ethos of the sixties: sometimes the choice you have to make, to live a morally meaningful life, is to do your duty. The movie resonated powerfully with the public, grossing a whopping $374 million domestically, and it took in another $400 million or so overseas. Factor in DVD sales, and youre getting close to a billion-dollar movie.
Pixar Studios dazzling animated superhero film The Incredibles (2004) is another box-office winnerdomestic gross $261 millionwith a surprisingly right-of-center worldview. Writer and director Brad Birds story, enjoyable for kids and their folks too, revolves around an appealing family of five, who just happen to be hiding the fact that theyre superhuman. Like others with enhanced abilities, parents Bob and Helen Parr (the former Mr. Incredible and Elastigirl) retired with the help of the federal governments superhero relocation program. Tort-crazy lawyers, you see, had slapped the superheroes with so many spurious lawsuits on behalf of those theyd savedHe didnt ask to be saved, he didnt want to be saved, one lawyer histrionically complainsthat it became impossible to use special abilities without incurring financial ruin. The Parrs now raise their kids in a typical American suburb, a seemingly typical family.
The defense of excellenceand frustration with the politically correct war against itis a central theme of The Incredibles, as in a scene when Helen chides Bob for not attending their son Dashs graduation from fourth grade. Its psychotic, Bob thunders. They keep creating new ways to celebrate mediocrity, but if someone is genuinely exceptional. . . . In another scene, Dash yearns to play school sports, but Helen says that his super-speed would make it unfair. Dad always said our powers were nothing to be ashamed ofour powers made us special, Dash complains. Everyones special, Dash, his mother tritely replies. Thats just another way of saying no one is, ripostes Dash, glumly.
The films science-wizard villain, Syndrome, seething at the superpowered (since he has no superpowers himself), has been killing off the heroes with his advanced technology, which he then will use to play champion. Your oh-so-special powers, he snarls at Bob. Ill give them heroics. Ill give them the most spectacular heroics the world has ever seen! And when Im old and Ive had my fun, Ill sell my inventions, so that everyone can have powers. Everyone can be Super! And when everyones Super . . . no one will be.
The Incredibles affectionately embraces the bourgeois family, flaws and all. The Parrs have their difficulties: teenager Violet is sullen, the kids fight, Mom and Dad bicker, Bob hates his drab insurance job. But for the Parr kids, the family bond is all-important: a worried Violet, suspecting (wrongly) that their middle-aged father might be having an affairHelen has rushed off to rescue himtells Dash, Mom and Dads lives could be in danger. Or worsetheir marriage. And the parents will risk anything to protect their children, as the film thrillingly demonstrates more than once. Like Pixars 2003 runaway winner Finding Nemo, the movie shows children what adults are supposed to do, writes author Frederica Mathewes-Green on National Review Onlineto be brave and self-sacrificing, to defend children even at risk to themselves, to give, even in the face of ingratitude.
Nor are Spider-Man 2 and The Incredibles the only recent movies to bring conservative values to the big screen and win huge, enthusiastic audiences. Robert Zemeckiss Cast Away (2000) is an updated Robinson Crusoe, starring Tom Hanks as Chuck Noland, a Federal Express troubleshooter marooned for years on a desert island. The movie makes us keenly aware of the benefitsthe immense human achievementof an advanced capitalist society. (Untypical for Hollywood, Cast Away depicts a big corporation as a caring and effective organization: when Noland returns after his rescue, FedEx takes him in like a long-lost family member.) For castaway Noland, a rotten tooth is a near-lethal problem, finding a little fresh water to drink a matter of existential urgency. Zemeckis and [screenwriter William] Broyles file a brief in the case of Locke v. Rousseau, coming down squarely on the side of civilization, writes critic Jonathan Last. There is nothing either romantic, or even beautiful, about the island Noland is stranded on. It is a prison. Nolands survival depends on the washed-up detritus of civilization: FedEx packages from his crashed cargo plane and a door torn from a port-a-potty, which becomes a makeshift sail.
Cast Away quietly repudiates the sexual revolution, too. Reunited with his true love, Kelly, Noland discovers that she has married and is a mother. The meeting is overwhelming for bothits clear that Kelly still loves Noland, and his love for her, we know, has kept him going through his years of solitude. But Noland recognizes that his own happiness isnt paramount. You gotta go home now, he says to Kelly, tearfully: theres now a family involved, and the family is the basic institution of the civilized order he has rejoined.
Finally, as he later reflects, Noland realizes that survival on the island required more than rational efficiency, as important as that is; he also needed something like faith. After his rescue, he tells a group of friends about succumbing to despair as a castaway and tryingand failingto commit suicide. I had power over nothing, he recalls. And thats when this feeling came over me like a warm blanket. I knew, somehow, that I had to stay alive. Somehow . . . even though there was no reason to hope. And all my logic said that I would never see this place again. . . . And one day my logic was proven all wrong, because the tide came in, and gave me a sail. Perhaps we need more than reason alone to lift us above animal nature and become fully human, Cast Away implies. Though director Zemeckis on most accounts belongs to Hollywoods liberal establishment, this is a profoundly conservative film, like his earlier blockbuster Forrest Gump, which conservatives applauded as a repudiation of the sixties.
Martial virtues, long jeered at by liberal Hollywood, have enjoyed a big-screen comeback over the last half-decade or so. Peter Jacksons sweeping adaptation of J. R. R. Tolkiens Lord of the Rings trilogy (20012003) teaches us about the need for free men and women to stand up with military force to totalitarian eviland about the potential of power to corrupt even the most decent from within. Many observers have likened Mordors destructive horror in the movies to the Islamofascism that now threatens the West, just as readers of Tolkiens novels likened it to Nazism. The films have grossed over $1 billion domestically and twice that overseas. Spielbergs 1998 World War II blockbuster, Saving Private Ryan, devastatingly realistic in capturing the horror of military combat, also extols martial virtues, in the heroism and honor of U.S. soldiers.
And all this is before coming to Mel Gibsons The Passion of the Christ, the 2004 movie that became a flashpoint in the nations culture wars. An emotionally gripping and devout retelling of Christs crucifixion in the dead languages of Aramaic and Latin, The Passion filled theaters worldwide with tradition-minded evangelicals and Catholics, many of whom rarely go to the movies. Despite fierce (and unjustified) criticism that the film was intolerant and anti-Semitic, The Passion, made for $30 million, grossed a staggering $370 million domestically and another $240 million overseas, making it one of the biggest movie sensations ever.
The size of the market for such conservative films first grew clear in the late sixties and seventies, when Hollywood nearly stopped making them. Swept up in the eras revolutionary spirit, the industry junked its decades-old production codewhich mandated respect for marriage, the military, and religion, and forbade cussin and nudityand went in for movies geared to a rebellious generation . . . challenging every cherished tenet of American society, as leftist film scholars Seth Cagin and Philip Dray approvingly put it. Production-code-era Hollywood hadnt ignored the darker side of human existence, but even its hardest-boiled noir films werent anything like this. The countercultural movies of New Hollywoodsuch as Arthur Penns violent, criminal-glorifying Bonnie and Clyde (1967), Robert Altmans cynical antiwar comedy M.A.S.H. (1970), Hal Ashbys sordid paean to the sexual revolution Shampoo (1975), and Martin Scorceses urban nightmare Taxi Driver (1976)wowed critics, who shared their anti-establishment and anti-American attitudes.
But moviegoers turned up their noses. Weekly film attendance in 1967, the first year after Hollywood dumped the production code, plummeted to 17.8 million, from 38 million the year before (television had already eroded moviegoing from its late-1940s peak of 90 million a week). In a single one-year period, Medved notes, more than half the movie audience disappearedby far the largest one-year decline in the history of the motion picture business. That audience then hovered around 20 million for the next three decades, despite a growing U.S. population.
Theres no mystery why so many stay home. Still dominated by countercultural types, Hollywood keeps churning out edgy, envelope-pushing moviesmore than half of its films receive R ratings, for exampleand Americans keep giving them thumbs-down, as the correlation of profit and ratings shows. Only five of the 50 top-grossing movies of all time have R ratings, and 13 of the top 100. A big 2005 Dove Foundation study examined the 3,000 most widely distributed Hollywood movies from 1989 through 2003 in each ratings category. It found PG- and PG-13-rated films between three and four times more profitable on average than R-rated onesand G films, like this years hit nature documentary, March of the Penguins, more profitable still. The average R movie loses $6.9 million, the study showed; the average PG movie made nearly $30 million; the typical G movie made over $70 million. And a Christian Film and Television Commission study of the box-office receipts of the top 250 movies over the last three years found that films expres- sing a strong traditional moral message, whatever their ratings, earned four to seven times as much as movies pushing a left-wing cultural agenda.
Hollywood owes its best recent years2002 and 2003, when it cracked the 30 million ticket mark again for the first time since 1966largely to the massive box-office success of a handful of conservative, family-friendly movies, including the first two Lord of the Rings installments, Finding Nemo, and the low-budget smash My Big Fat Greek Wedding, virtually an ethnic Father Knows Best. The non-R movies draw more children to the theaters, as youd expect, and more moviegoers 40 and up, tootheir parents. The largest consumer segment in America is mainstream families with traditional values, emphasizes Dove chairman Dick Rolfe. National Association of Theater Owners head John Fithian concurs: Family values sell tickets.
Theres a simple explanation of why Tinseltown churns out so many commercial duds. Elite filmmakers want to make moola, of courseand they still do, lots of it, though not nearly as much as they could be making. But giving the public what it wants isnt their prime motivation. More important is their wish for recognition as artists from peers, critics, and the liberal elites, says Emmy- and Oscar-nominated writer and director Lionel Chetwynd, one of Hollywoods most vocal conservatives. And it has been true from the late sixties on that if you wanted to be seen as an artist, you have to be a liberalyou have to rail against the government, be edgy, he adds. Having the right artistic vision can mean other social advantages, too. Making something commercially successful and appealing to a broad public, like The Incredibles, is less likely to get a Rebecca Romijn look-alike to sleep with you than making dark, hard-hitting, critically acclaimed material like Million Dollar Baby, says longtime Hollywood watcher Medved.
Further reinforcing Hollywoods leftish leanings are liberal interest groups that monitor script content for offensiveread: politically incorrectcontent. This pressure can utterly transform a film project, as Tom Clancy will tell you. In his novel The Sum of All Fears, Muslim terrorists explode a nuke at the Super Bowl. When Clancy optioned the book and the film went into development, the Council on American Islamic Relations got to work. The 2002 film villains: white neo-Nazis, not Muslim fanatics. Some Hollywood production companies actually have outreach offices that contact advocacy groups ahead of production to vet potential film scripts. Keep in mind [that] one of the reasons why the FBI or the government or business are the villains is because everyone else has a constituency, former Motion Picture Association head Jack Valenti points out.
The PC concerns, internalized in scriptwriters heads even before any advocate complains, can produce bizarre incoherence. Novelist and screenwriter Andrew Klavans True Crime is about an innocent white man on death row, railroaded because officials needed to prove that the death penalty isnt racially biased. The only one who figures this out is this politically incorrect journalist who can see through the B.S., Klavan relates. The gripping 1999 movie version, directed by and starring Clint Eastwood as journalist Steve Everett, transforms the innocent death-row inmate into a black man (played by Isaiah Washington). The movie works, even if it takes the anti-PC edge off Klavans novel.
But the screenplay leaves in a sequence depicting a black woman confronting journalist Everett for caring only about injustices against whites and not blackseven though the movie now revolves around the reporters relentless quest to exonerate a wrongly convicted African American. That scene no longer makes any sense, Klavan laughs. The screenwriter apparently found the original politically inappropriate.
Even so, jolted by The Passions huge success, Hollywood seems to be catching on that it is neglecting a large part of its potential audience. When something does nearly $400 million in U.S. box office, and it isnt in Englishit makes an impression, says former Universal Pictures boss Frank Price. The New York Times reported in July that studios have hired newly minted experts in Christian marketing to help sell movies with religious or family themes to red-state America. After cold-shouldering Gibson when he shopped around The Passionhe famously had to finance it himselfthe studios lined up for the chance to distribute his next movie, the Mayan-language Apocalypto, with Disney landing the deal.
But a movie comes out of a worldview, and the Hollywood of Barbra Streisand, Rob Reiner, and Alec Baldwin may still not get it. Libertass Murty says that a publicist for Ridley Scotts expensive 2004 flop about the Crusades, Kingdom of Heaven, asked her and her filmmaker husband, Jason Apuzzo, for advice on marketing the film to conservatives and Christians. Invited to a press screening along with representatives of various Christian groups, the two watched in disbelief as the movie opened with a Catholic priest beheading a woman and stealing her rosaryand went on in that vein, while also presenting the Muslims as noble and wise. Every single person directly associated with the Church in the movie is a murderer or a liar. They really thought this would appeal to Christians, Murty recounts. Some of these people live in this completely sealed world in West Hollywood and didnt register how offensive the movie would be.
Nevertheless, several indicators suggest that the film industrys cultural stance may be changing more dramatically than hiring some new marketers. For starters, Hollywood is home to a growing right- of-center presence, including hotshot young producers like Mike De Luca of DreamWorks and Gavin Pollone, and rising screenwriters like Craig Mazin, Cyrus Nowrasteh, and Klavan. Whats more, if reports are true, other young Hollywood types are on the Right, but keep their views quiet, for fear of career trouble in a still-liberal town. Its becoming increasingly clear that a significant majority of the young people coming into Hollywood are conservative, opined Chetwynd this summer. Last fall, Details magazines exposé Young and Republican in Hollywood caused a stir by outing comedian Adam Sandler, actor Freddie Prinze Jr., and others as secret right-wingers. AMCs 2004 documentary Rated R: Republicans in Hollywood, directed by former Democratic speechwriter Jesse Mosse, concludes that Hollywood will be shifting right as the under-40s become its new establishment. Already reinforcing David Horowitzs long-established Wednesday Morning Club, which hosts conservative speakers for open-minded industry listeners, are such newly formed right-wing salons as the Hollywood Congress of Republicans and the discreet Sunday Evening Club, for still-closeted rightists.
When a trendsetter like Polone (subject of a glowing 2004 New York Times Magazine cover story) can observe that we live in a much more conservative country than the entertainment industry had thought it was, and it would be much smarter for them to move in that direction, its a pretty safe bet that the new Hollywood establishment will indeed be very different from the one that it soon will replace.
No one seems better positioned to move Hollywood right than billionaire Philip Anschutz, whose Anschutz Film Group oversees two studios: Walden Media and Bristol Bay Productions. Owner of everything from oil fields to railroads to newspapers, and a major contributor to conservative causes, Anschutz decided not long ago to begin a career as a twenty-first-century Louis B. Mayer. His agenda: producing humanistic, family-oriented films. We expect them to be entertaining, but also to be life affirming and to carry a moral message, he told a Hillsdale College audience last year. Anschutz sees a golden market opportunity in such movies. Hollywood as an industry can at times be insular and doesnt at times understand the market very well, he explained. But he also saw a chance with this move to attempt some small improvement in the culture.
Like an old-time film mogul, Anschutz has nailed down the distribution side. His Regal Entertainment is the nations largest movie-theater chain, with about 18 percent of all U.S. indoor screens. He keeps a firm hand on the creative process. Many things happen between the time you hatch an idea for a movie and the time that it gets to theatersand most of them are bad, he told his Hillsdale listeners. So you need to control the type of writers you have, the type of directors you get, the type of actors you employ, and the type of editors that work on the final product.
Anschutz demanded, for instance, that director Taylor Hackford revise the 2004 Ray Charles biopic, Ray, toning down the films focus on the performers drug problems and sexual exploits. After initially threatening to quit, Hackford came around to Anschutzs more family-oriented vision. The resulting movie is an honesttheres no effort to whitewash the drugs and womanizingbut ultimately inspiring narrative of Charless successful perseverance against the great odds of his own blindness and moral flaws and societys racism. The moviefunded entirely by Anschutz, after every major studio had rejected itgarnered six Oscar nominations, winning two, including Best Actor for Jamie Foxx, riveting in the title role.
Anschutz is off to a gangbuster start, and not just because of Ray. This years bittersweet Because of Winn-Dixie, based on the childrens novel by Kate DiCamillo, tells the story of ten-year-old Opal (newcomer Annasophia Robb) and her preacher father (Jeff Daniels), whove just moved to a lower-middle-class Florida town as the movie opens. Opals mother, hating being a preachers wife, had abandoned the family several years earlier. The film unsentimentally captures the pain and loneliness that divorce causes children to feel. Portraying both small-town America and the Baptist faith with unpretentious sympathy, Winn-Dixie made back most of its modest $14 million production budget on its opening weekend and is currently one of the top-selling DVDs in the country.
Anschutzs most ambitious effort yet is the forthcoming $150 million adaptation of C. S. Lewiss The Chronicles of Narnia: The Lion, the Witch, and the Wardrobe, a Walden MediaDisney co-production opening in Decemberthe first in what Anschutz hopes is a long-running franchise. The Narnia booksan extended allegory of Christs resurrectionhave sold 120 million copies worldwide, more than either Harry Potter or Lord of the Rings, Anschutz notes, suggesting the eye-popping box-office potential. Walden will work closely with Christian organizations to market the film.
A third signal that the film world is growing less culturally monolithic is the launch last year of two annual conservative film festivals: the American Film Renaissance Festival in Dallas (and soon to expand to other cities) and the Liberty Film Festival in Hollywood. Featuring conservative-themed movies, panel discussions, awards, and other events, both proved wildly popular and generated wide press coverage, including articles in Time and USA Today.
The festivals also generated golden networking opportunities. After a Michael Medved talk at AFRs event, festival co-founder Jim Hubbard tells me, several aspiring filmmakers in the audience held up finished DVDs and complained that they couldnt find distribution. Here I am, announced David Goodman, who had just started his own distribution company. He swiftly signed distribution deals for several films, among them Is It True What They Say About Ann?, an amusing documentary on liberal-baiting controversialist Ann Coulter (she signs one left-wing college students shirt: Have fun in Guantánamo!).
Feisty independent documentaries dominated both festivals; many, like Chetwynds Celsius 41.11: The Temperature at Which the Brain Begins to Die, were pointed rebuttals to Michael Moores mendacious oeuvre. Winning the Best Documentary award at the Liberty Film Festival was Stephen Bannon and Timothy Walkins In the Face of Evil, based on Peter Schweitzers bestseller Reagans War. The viewer comes away from the films canny account of Reagans anti-communist efforts, from his Hollywood days in the 1940s until the fall of the Berlin Wall, with a sense of the late presidents greatnessand of the decisive importance of political leadership. As someone who had lived these times, I was very moved by the detail and emotion in which they were brought out on film, pronounced former Polish president Lech Walesa.
If the festivals produced a potential star documentarian, its Evan Coyne Maloney, 33, an affable exsoftware developer. His hilarious and disturbing 45-minute short, Brainwashing 101, exposes PC bullying at several universities. In one revealing sequence, pompous Bucknell economics prof Geoffrey Schneider gleefully acknowledges his desire to subvert the values that his students have learned from their parents. Imagine your typical very wealthy Bucknell student taking a course which is a critique of capitalism and often saying things like: Your parents are doing awful things around the globe, either indirectly or directly, Schneider crows. The big danger at Bucknell, in Schneiders view? Our trustees have made noises every now and then about interfering in the curricula and making sure that we have enough different perspectives. Horrors!
These documentaries represent the Rights first efforts to compete on a cinematic terrain long dominated by liberals. Its a crucial development, says Lee Troxler, a former Reagan aide who wrote and helped produce Fahrenhype 9/11, a sober refutation of Moores monster-hit polemic Fahrenheit 9/11 that has shown on 500 campuses and sold a half-million DVDs. Just as the pamphlet was the persuasive tool of choice during the American Revolution, the documentary has become a valuable tool in politics and culture today, Troxler argues. You can bring it out very quickly, without spending a lot of moneythe technology makes it possible. Reagan documentary co-director Bannon, a conservative Catholic, is equally revved up about the medium. If the last election showed one thing, its that culture drives politics, he told the New York Times in June. I want to take the form that is now owned by the Leftthe documentaryand use it to help drive an overall political agenda that supports the culture of life.
After long using liberal Hollywood as a political punching bag, conservatives are moving to an if-you-cant-beat-them-join-them approach. If they can create a popular cinema that artistically reflects a right-of-center worldviewrather than crudely imposes itit would be a huge advance for the Right in Americas ongoing cultural struggles. After all, its not just reason and analysis that will decide the outcome of those struggles. The imagination and the heartthe Dream Factorys stock-in-tradewill play at least as large a part.
* Pictures taken from the new Vietnamese-American Motion Picture Production titled "The JOURNEY from the Fall." Meaning the Fall of Saigon after we abandoned the free people of South Vietnam to their fate at the hands of heavily Soviet-backed invading Communist bullies from the North,
I love Blue Collar. Unfortunately, they are cancelled. It was put up against Desperate Sluts on Sunday and tanked...not because no one likes it, but rather because n o one knew it was on Sundays...after it moved to Fridays...after being on Tuesdays.
I wonder if it's really about boycotting movies with certain actors. For my part, I don't have a list of actors I refuse to go see in a movie (except Jane Fonda). On the other hand, I know if Tim Robbins or Sean Penn are in a movie I am going to be too pissed off or distracted to enjoy the movie, so I don't bother. I believe that is what may be going on with movie goers. When I am looking for a movie to go see I scan down the list, if I see an actor I really despise, I just keep scanning.
It's a good and informative article, and dropped in some names as future Hollywood conservatives to look out for. I am frustrated by Hollywood, but I get weary of some of the criticism as well. It's one thing to get onto Hollywood's case for a definite anti-American message, or for putting too much sex in PG and PG-13 movies, it's another thing to suggest that the only good movies are ones that have perfect noble heroes and a heavy handed moral message. Film is just another form of storytelling, and if you suggest that the only good stories are moralistic homilies, you've chopped off about 75% of World Literature. Goodbye Shakespeare, the Iliad, Anne Karenina, Kurosawa, and the very artform of the tragedy. There is plenty of room in storytelling to deal w/ "what if?" scenarios, philosophy, and difficult so called "gray area" conflicts. Heck, that is the *point* of storytelling.
I get the feeling that if some conservatives had their way, Citizen Kane and the Godfather would be deemed inappropriate for the average American citizen's viewing, because they don't have the right "message". It's one thing to criticize agenda driven films like the Cider House Rules or this Good Night Good Luck nonsense--I'm all for that--it's another to lambast any film that depicts the obvious flaws in human nature and/or it doesn't take an obvious moral stance. Although I'm glad films like "Because of Winn Dixie" exist for young families, I'd go crazy if those were the ONLY types of films out there. Too many conservatives jump the gun down any film's throat that presents a unresolved moral conflict. The big (recent) example of this is Million Dollar Baby, which most bashers didn't even watch, but it was made by one of the few Republicans in the system (Eastwood), and he himself denied any agenda. It wasn't pro-euthenasia, any more than Anne Karenina was pro-suicide or the Iliad was pro-anger. It becomes a "boy who cries wolf" scenario, when critics just decry *anything* that doesn't follow the methodical preaching of a "Left Behind" "novel", and the more serious criticism of blatant brainwashing ala Barback Mountain become muted shouts. Fiction is fiction, it's free to speculate and challenge, to play w/ the rules and act as catharsis. Ethics, philosophy and religion is there to guide us how to live--not stories.
This is not to far from reality if Liberals have their way in this country, just imagine if the Liberals were to have their way, these people in these picture would be Christians being prosecuted for their beliefs.
24
posted on 11/06/2005 10:52:23 PM PST
by Prophet in the wilderness
(PSALM 53 : 1 The FOOL hath said in his heart , There is no GOD .)
This is what many people in the movie industry dont get: when you express hostility to conservatives, many Americans feel that youre expressing hostility to them.
When the media tried suckering Michael Jordan into taking a political position, he declined to do so, saying, "Republicans buy Nikes too." When you're trying to sell something, it's just good business sense to not do anything to drive customers away -- or to violate your contract with Nike.
I always wondered what idiot changed the plot for Clancy's book, "The Sum of All Fears"! I was heartbroken when we went to the theater to see it. I had steeled myself to the ineptly unbelievable, "pretty boy", performance of Ben Affleck. I hoped it was not Clancy who changed the plot or hired Affleck.
29
posted on 11/06/2005 11:17:11 PM PST
by singfreedom
("Victory at all costs,.......for without victory there is no survival."--Churchill--that's "Winston")
I truly do agree with you, usually. Being a person who had to take LOTS of lit, I recognize not all "good stories" have to be morally perfect. Sometimes there are lessons to be learned from R rated movies as well.
One of my favorite movies is "Love Actually" and it definitely has some "X rated" parts, but the "moral" slant is there too! I love the "Harry Potter" books. I know, some will say they have to do with "witchcraft", but I have read every book multiple times and have yet to find ANYTHING alluding to "devil worship" or any such nonsense. I find they encourage more things like loyalty, and like Spider-man, stepping up and doing your "duty".
31
posted on 11/06/2005 11:35:48 PM PST
by singfreedom
("Victory at all costs,.......for without victory there is no survival."--Churchill--that's "Winston")
...We could call it the 'Real American' Channel', and air *Rush Limbaughs* show 3 friggin times a day..and have a GOP "Tonight Show', where The stupid pervert, baby butchering, NAMBLA loving souless Left, are ripped apart in one skit and interview after another, the way the Leftie degenerates have bneen doing to Republicans, the Family, and people of faith, for over 50 years! Lets see how *they* like all of *them* getting "ripped a new one" on international TV every day, 7 days a week, 355(sic) days a year..
Now that would be a genuine tragedy! Bond is an institution, an icon! Don't these idiots know they have a responsibility to choose someone superbly suited to the role? What a shame! Personally, I was sorry Pierce Brosnan retired. I thought he was quite good.
39
posted on 11/07/2005 12:27:01 AM PST
by singfreedom
("Victory at all costs,.......for without victory there is no survival."--Churchill--that's "Winston")
I hope so, it is a marvelous series of books, not only for children but adults. My son gave me a set for Christmas when he was in high school. We used to read and discuss them. (I'm not really weird, but spent years as an elementary librarian! I never lost my love for children's' lit.)
40
posted on 11/07/2005 12:30:58 AM PST
by singfreedom
("Victory at all costs,.......for without victory there is no survival."--Churchill--that's "Winston")
And then..There could be recurring skits of those two sphincter lipped cootie boys, Kieth Olbermann and Jon "I'm such a smart ass buttmuncher" Stewart, with their little smirky ass, proudly wave their pucker pinched lips all around in front of the cameras, to show everybody how much they like their lips looking like waiting orifices to be filled...
From what I have read so far, he was TRULY a great American hero. I was touched reading his brave acts, and self sacrifice, America needs more like him. My nephew was in Iraq last year and early this year, and he was in the battle of Fallujah, and THANKS TO GOD through the prayers of my family, church, and other freepers, God brought him back alive and ok, and he is doing well now. To all of the freepers who prayed for my nephew, I give you all of my heart felt thanks, and may GOD BLESS YOU.
Clancy was supposedly livid at the end-product of SoAF. He stated that he would never again give up creative control of a film adaptation of his books. Personally, I wondered what he thought would happen when he gave up control.
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works. |
Q:
How to move/resize partitions & take profit of available space
Today I have installed a new Ubuntu system & I have deleted partition where old system was installed, after moving all relevant data. This is how I have my disk right now
New system is installed in /dev/sda8
/dev/sda7 contains some other data I have
What I would like to do is using that unallocated 230G in /dev/sda8 (or /dev/sda7), is it possible? I have tried Resize/Move options in gparted, but I am not sure if I can do what I want
Another option would be just formatting that unallocated space as ext4, move the contents of /dev/sda7, and then deleting it, and then... could I resize /dev/sda8 to gain that 100G of deleted /dev/sda7?
A:
The first I did was that "another option" I posted...
Another option would be just formatting that unallocated space as ext4, move the contents of /dev/sda7, and then deleting it, and then... could I resize /dev/sda8 to gain that 100G of deleted /dev/sda7?
After that: boot from Live USB, open gparted & delete /dev/sda7
Now, the big mistake... :(
Drag & drop /dev/sda6 to right. This was the only way (I think) to resize /dev/sda8 with the 100G of deleted /dev/sda7
With this, I got the desired size of partitions but a broken grub (I suppose /dev/sda6 position in disk was relevant), with nice grub rescue message when trying to boot the new system
How I fixed this? (after several tries... following some tutorials which didn't worked, and even trying to install a new Ubuntu alongside in free space, assuming that should rebuild grub... which didn't happened)
Again, boot from Live USB, open terminal and login as root sudo -s
(/dev/sda was used from Live system, so the partition with working system was /dev/sdb8)
mount /dev/sdb8 /mnt
grub-install --boot-directory=/mnt/boot /dev/sdb
grub-install --root-directory=/mnt /dev/sdb
Reboot, and... grub was working again :)
|
Q:
Error to receive file on socket inside a thread
I'm having trouble to receive a byte array containg a PNG file.
When the code is executed in OnClientRead event it works fine, already when transfered for a thread, happens an error of MemoryStream that says:
Out of memory while expanding memory stream.
At this point:
if SD.State = ReadingSize then
I want to know how to solve this specific trouble and also how can I check if I'm receiving a data that contains a file or a simple String?
The code:
type
TSock_Thread = class(TThread)
private
Socket: TCustomWinSocket;
public
constructor Create(aSocket: TCustomWinSocket);
procedure Execute; override;
end;
type
TInt32Bytes = record
case Integer of
0: (Bytes: array[0..SizeOf(Int32)-1] of Byte);
1: (Value: Int32);
end;
TSocketState = (ReadingSize, ReadingStream);
TSocketData = class
public
Stream: TMemoryStream;
Png: TPngImage;
State: TSocketState;
Size: TInt32Bytes;
Offset: Integer;
constructor Create;
destructor Destroy; override;
end;
{ ... }
constructor TSock_Thread.Create(aSocket: TCustomWinSocket);
begin
inherited Create(true);
Socket := aSocket;
FreeOnTerminate := true;
end;
procedure TSock_Thread.Execute;
var
s: String;
BytesReceived: Integer;
BufferPtr: PByte;
SD: TSocketData;
Item: TListItem;
begin
inherited;
while Socket.Connected do
begin
if Socket.ReceiveLength > 0 then
begin
s := Socket.ReceiveText;
{ SD := TSocketData(Socket.Data);
if SD.State = ReadingSize then
begin
while SD.Offset < SizeOf(Int32) do
begin
BytesReceived := Socket.ReceiveBuf(SD.Size.Bytes[SD.Offset],
SizeOf(Int32) - SD.Offset);
if BytesReceived <= 0 then
Exit;
Inc(SD.Offset, BytesReceived);
end;
SD.Size.Value := ntohl(SD.Size.Value);
SD.State := ReadingStream;
SD.Offset := 0;
SD.Stream.Size := SD.Size.Value;
end;
if SD.State = ReadingStream then
begin
if SD.Offset < SD.Size.Value then
begin
BufferPtr := PByte(SD.Stream.Memory);
Inc(BufferPtr, SD.Offset);
repeat
BytesReceived := Socket.ReceiveBuf(BufferPtr^,
SD.Size.Value - SD.Offset);
if BytesReceived <= 0 then
Exit;
Inc(BufferPtr, BytesReceived);
Inc(SD.Offset, BytesReceived);
until SD.Offset = SD.Size.Value;
end;
try
SD.Stream.Position := 0;
SD.Png.LoadFromStream(SD.Stream);
SD.Stream.Clear;
except
SD.Png.Assign(nil);
end;
Item := Form1.ListView1.Selected;
if (Item <> nil) and (Item.Data = Socket) then
Form1.img1.Picture.Graphic := SD.Png;
SD.State := ReadingSize;
SD.Offset := 0;
end; }
end;
Sleep(100);
end;
end;
procedure TForm1.ServerSocket1Accept(Sender: TObject; Socket: TCustomWinSocket);
var
TST: TSock_Thread;
begin
TST := TSock_Thread.Create(Socket);
TST.Resume;
end;
UPDATE:
The code in the answer is not working for me because ServerType=stThreadBlocking blocks all clients connections with the server. And because of this, I'm searching for something like this (ServerType=stNonBlocking, TThread and OnAccept event):
type
TSock_Thread = class(TThread)
private
Png: TPngImage;
Socket: TCustomWinSocket;
public
constructor Create(aSocket: TCustomWinSocket);
procedure Execute; override;
procedure PngReceived;
end;
// ...
// ===============================================================================
constructor TSock_Thread.Create(aSocket: TCustomWinSocket);
begin
inherited Create(true);
Socket := aSocket;
FreeOnTerminate := true;
end;
// ===============================================================================
procedure TSock_Thread.PngReceived;
var
Item: TListItem;
begin
Item := Form1.ListView1.Selected;
if (Item <> nil) and (Item.Data = Socket) then
Form1.img1.Picture.Graphic := Png;
end;
procedure TSock_Thread.Execute;
var
Reciving: Boolean;
DataSize: Integer;
Data: TMemoryStream;
s, sl: String;
begin
inherited;
while Socket.Connected do
begin
if Socket.ReceiveLength > 0 then
begin
s := Socket.ReceiveText;
if not Reciving then
begin
SetLength(sl, StrLen(PChar(s)) + 1);
StrLCopy(@sl[1], PChar(s), Length(sl) - 1);
DataSize := StrToInt(sl);
Data := TMemoryStream.Create;
Png := TPngImage.Create;
Delete(s, 1, Length(sl));
Reciving := true;
end;
try
Data.Write(s[1], Length(s));
if Data.Size = DataSize then
begin
Data.Position := 0;
Png.LoadFromStream(Data);
Synchronize(PngReceived);
Data.Free;
Reciving := false;
end;
except
Png.Assign(nil);
Png.Free;
Data.Free;
end;
end;
Sleep(100);
end;
end;
procedure TForm1.ServerSocket1Accept(Sender: TObject; Socket: TCustomWinSocket);
var
TST: TSock_Thread;
begin
TST := TSock_Thread.Create(Socket);
TST.Resume;
end;
This code has an error of conversion of data at this line:
DataSize := StrToInt(sl);
How can I fix this?
A:
how solve this specific trouble
You are not using TServerSocket threading the way it is meant to be used.
If you want to use TServerSocket in stThreadBlocking mode (see my other answer for how to use TServerSocket in stNonBlocking mode), the correct way is to:
derive a thread class from TServerClientThread
override its virtual ClientExecute() method to do your I/O work (via TWinSocketStream)
use the TServerSocket.OnGetThread event to instantiate the thread.
If you don't do this, TServerSocket will create its own default threads (to fire the OnClient(Read|Write) events in the main thread), which will interfere with your manual threads.
Also, you don't need the state machine that I showed you in my answer to your other question. That was for event-driven code. Threaded I/O code can be written linearly instead.
Try something more like this:
type
TSock_Thread = class(TServerClientThread)
private
Png: TPngImage;
procedure PngReceived;
protected
procedure ClientExecute; override;
end;
type
TInt32Bytes = record
case Integer of
0: (Bytes: array[0..SizeOf(Int32)-1] of Byte);
1: (Value: Int32);
end;
procedure TSock_Thread.ClientExecute;
var
SocketStrm: TWinSocketStream;
Buffer: TMemoryStream;
Size: TInt32Bytes;
Offset: Integer;
BytesReceived: Integer;
BufferPtr: PByte;
begin
SocketStrm := TWinSocketStream.Create(ClientSocket, 5000);
try
Buffer := TMemoryStream.Create;
try
Png := TPngImage.Create;
try
while ClientSocket.Connected do
begin
if not SocketStrm.WaitForData(100) then Continue;
Offset := 0;
while Offset < SizeOf(Int32) do
begin
BytesReceived := SocketStrm.Read(Size.Bytes[Offset], SizeOf(Int32) - Offset);
if BytesReceived <= 0 then Exit;
Inc(Offset, BytesReceived);
end;
Size.Value := ntohl(Size.Value);
Buffer.Size := Size.Value;
BufferPtr := PByte(Buffer.Memory);
Offset := 0;
while Offset < Size.Value do
begin
BytesReceived := SocketStrm.Read(BufferPtr^, Size.Value - Offset);
if BytesReceived <= 0 then Exit;
Inc(BufferPtr, BytesReceived);
Inc(Offset, BytesReceived);
end;
Buffer.Position := 0;
try
Png.LoadFromStream(Buffer);
except
Png.Assign(nil);
end;
Synchronize(PngReceived);
end;
finally
Png.Free;
end;
finally
Buffer.Free;
end;
finally
SocketStrm.Free;
end;
end;
procedure TSock_Thread.PngReceived;
var
Item: TListItem;
begin
Item := Form1.ListView1.Selected;
if (Item <> nil) and (Item.Data = ClientSocket) then
Form1.img1.Picture.Graphic := Png;
end;
procedure TForm1.ServerSocket1GetThread(Sender: TObject; ClientSocket: TServerClientWinSocket; var SocketThread: TServerClientThread);
begin
SocketThread := TSock_Thread.Create(False, ClientSocket);
end;
how i can check if i'm receiving a data that contains a file or a simple String?
The client needs to send that information to your server. You are already sending a value to specify the data size before sending the actual data. You should also preceed the data with a value to specify the data's type. Then you can handle the data according to its type as needed.
|
RSE Energy Inquiry
The RSE’s Energy Inquiry aims to contribute to the important debate around Scotland’s energy supply, demand and use; a debate that needs to recognise our moral and environmental responsibilities. It will also look to inform the policy and decision-making at a Scottish, UK and international level that will ultimately decide whether the path Scotland chooses to follow provides the resources needed at acceptable financial, moral, ethical and environmental costs.
The Energy Inquiry Call for Evidence seeks to gather answers to 15 questions across a broad range of energy issues, including the energy landscape, climate change, the energy mix, and ethics, social issues and impact on communities. Find out more about how to submit evidence and our planned outreach events here. |
Tetracycline-associated fatty liver of pregnancy, including possible pregnancy risk after chronic dermatologic use of tetracycline.
Two cases of tetracycline-associated fatty liver of pregnancy are reported. In one, the history was negative for antibiotic use, yet autopsy revealed typical gross and microscopic bone fluorescence of tetracycline. Tissue extraction and chemical analysis showed qualitative evidence of tetracycline, whereas quantitation revealed 60 microgram/gm of wet bone tissue. Findings in our cases and in those from the literature indicate that the association of tetracycline use and fatty liver of pregnancy is even more common than has been suggested. |
Q:
kivy mapview on screenmanager
I have tried first my mapview function with only the mapview in the build which worked, but I had to return in the build mapview. Then I tried having the mapview on my first screen, and I face problems with it:
import kivy
from kivy.app import App
from kivy.uix.label import Label as label
from kivy.uix.screenmanager import Screen, ScreenManager
from kivy.uix.button import Button as button
from kivy.uix.gridlayout import GridLayout as gl
from kivy.uix.textinput import TextInput as ti
from kivy.garden.mapview import MapView
from kivy.garden.mapview import MapMarkerPopup
import os
kivy.require("1.11.1")
#first screen page
class Mapspage(Screen,MapView,gl):
def __init__(self, **kwargs):
super().__init__(**kwargs)
self.cols=1
marker=MapMarkerPopup(lat=55.6928595,lon=12.5992828)
self.abouting=button(text="lil'mermaid")
self.abouting.bind(on_press=self.pressbutton())
marker.add_widget(self.abouting)
mapview=MapView(zoom=12, lat=55.6712674, lon=12.5938239)
mapview.add_marker(marker)
def pressbutton(self):
chatapp.screenmanager.current="About"
#button leads to about page
class Aboutpage(Screen,gl):
def __init__(self, **kwargs):
super().__init__(**kwargs)
self.cols=1
self.message=label(text="yup dissapointingly small",halign="center",valign="middle",fontsize=30)
self.message.bind(width=self.utw())
self.add_widget(self.message)
def utw(self, *_):
self.message.text_size=(self.message.width*0.9,None)
#updatetextwidth
class Epicapp(App):
def build(self):
self.screenmanager=ScreenManager()
self.mapspage=Mapspage()
screen=Screen(name="places")
screen.add_widget(self.mapspage)
self.screenmanager.add_widget(screen)
self.aboutpage=Aboutpage()
screen=Screen(name="About")
screen.add_widget(self.aboutpage)
self.screenmanager.add_widget(screen)
return self.screenmanager
if __name__=="__main__":
chatapp=Epicapp()
chatapp.run()
I get as an error message this:
[INFO ] [Window ] virtual keyboard not allowed, single mode, not docked
Traceback (most recent call last):
File "<ipython-input-1-4a0782fed14b>", line 1, in <module>
runfile('/home/pi/Documents/learningkivy.py', wdir='/home/pi/Documents')
File "/usr/lib/python3/dist-packages/spyder_kernels/customize/spydercustomize.py", line 678, in runfile
execfile(filename, namespace)
File "/usr/lib/python3/dist-packages/spyder_kernels/customize/spydercustomize.py", line 106, in execfile
exec(compile(f.read(), filename, 'exec'), namespace)
File "/home/pi/Documents/learningkivy.py", line 70, in <module>
chatapp.run()
File "/usr/local/lib/python3.7/dist-packages/kivy/app.py", line 829, in run
root = self.build()
File "/home/pi/Documents/learningkivy.py", line 54, in build
self.mapspage=Mapspage()
File "/home/pi/Documents/learningkivy.py", line 28, in __init__
super().__init__(**kwargs)
File "/usr/local/lib/python3.7/dist-packages/kivy/uix/relativelayout.py", line 265, in __init__
super(RelativeLayout, self).__init__(**kw)
File "/usr/local/lib/python3.7/dist-packages/kivy/uix/floatlayout.py", line 65, in __init__
super(FloatLayout, self).__init__(**kwargs)
File "/home/pi/.kivy/garden/garden.mapview/mapview/view.py", line 526, in __init__
self.add_widget(self._scatter)
File "/usr/local/lib/python3.7/dist-packages/kivy/uix/floatlayout.py", line 139, in add_widget
pos_hint=self._trigger_layout)
File "kivy/_event.pyx", line 419, in kivy._event.EventDispatcher.bind
AssertionError: None is not callable
Not really helpfull error message, but I am guessing it is not happy with the
super.__init__
function, yet without it, it will not know about the about page.
A:
Here is a version of your code that mostly works:
import kivy
from kivy.app import App
from kivy.uix.label import Label as label
from kivy.uix.screenmanager import Screen, ScreenManager
from kivy.uix.button import Button as button
from kivy.uix.gridlayout import GridLayout
from kivy.garden.mapview import MapView
from kivy.garden.mapview import MapMarkerPopup
kivy.require("1.11.1")
# first screen page
class Mapspage(Screen):
def __init__(self, **kwargs):
super(Mapspage, self).__init__(**kwargs)
gl = GridLayout(cols=1)
marker = MapMarkerPopup(lat=55.6928595, lon=12.5992828)
self.abouting = button(text="lil'mermaid")
self.abouting.bind(on_press=self.pressbutton)
mapview = MapView(zoom=12, lat=55.6712674, lon=12.5938239)
mapview.add_marker(marker)
gl.add_widget(mapview)
gl.add_widget(self.abouting)
self.add_widget(gl)
def pressbutton(self, *args):
chatapp.screenmanager.current = "About"
# button leads to about page
class Aboutpage(Screen):
def __init__(self, **kwargs):
super(Aboutpage, self).__init__(**kwargs)
gl = GridLayout(cols=1)
self.message = label(text="yup dissapointingly small", halign="center", valign="middle", font_size=30)
self.message.bind(width=self.utw)
gl.add_widget(self.message)
self.add_widget(gl)
def utw(self, *_):
self.message.text_size = (self.message.width * 0.9, None)
# updatetextwidth
class Epicapp(App):
def build(self):
self.screenmanager = ScreenManager()
self.mapspage = Mapspage(name="places")
self.screenmanager.add_widget(self.mapspage)
self.aboutpage = Aboutpage(name="About")
self.screenmanager.add_widget(self.aboutpage)
return self.screenmanager
if __name__ == "__main__":
chatapp = Epicapp()
chatapp.run()
A couple notes about errors encountered in your original code:
When you use bind or on_press (or any event binding) you should bind to a method. If you bind to something like self.utw(), you are executing the self.utw() method and trying to bind to whatever that method returns. You should bind to the method, not its return, like this: self.message.bind(width=self.utw).
In a Label, the font size is set using font_size not fontsize.
In the above code, MapsPage is a Screen that contains a GridLayout. That GridLayout contains a MapView and a Button.
The AboutPage is also a Screen, and it contains a GridLayout that contains a Label.
The build() method is simplified, since both MapsPage and AboutPage are Screens, there is no need to create additional Screens just to contain them.
The error message in your post is caused by the self.pressbutton() call in the __init__() method of MapsPage.
|
En 2017, la deuda pública interna y externa, en pesos y moneda extranjera, aumentó en US$ 45.488 millones: subió de US$ 275.446 millones a U$S 320.934 millones, incluyendo la deuda no presentada a los canjes, según informó el Ministerio de Finanzas.
Esta deuda pública nacional no incluye lo que adeudan las provincias. Tampoco la deuda del Banco Central en LEBAC y otros en pesos y moneda extranjera y lo que aún se adeuda del cupón PBI.
En 2016, la deuda pública aumentó en US$ 34.781 millones. Así en los dos últimos años la deuda pública aumentó en US$ 80.269 millones.
De este total, la deuda intra sector público – como con el Banco Central, ANSeS y otros organismos- aumentó en U$S 16.933 millones y con los organismos internacionales, como BID o Banco Mundial, y con el sector privado, en diversos instrumentos financieros como Bonos y Letras, en U$S 63.336 millones.
El Informe de Finanzas detalla que del total adeudado a fin del año pasado, por acreedor, US$ 154.666 millones - - 48,2% - es deuda con otros organismos públicos. Y con los organismos financieros y el sector privado suma el 51,8% restante o US$ 166.268 millones.
Si la comparación se extiende a fines de 2005, luego del primer canje de deuda, cuando sumaba US$ 154.270 millones, el endeudamiento público más que se duplicó: creció en US$ 166.664 millones. De ese incremento, US$ 86.395 millones se gestó durante los últimos 10 años de la gestión kirchnerista y US$ 80.269 millones en los dos primeros años de la Presidencia de Mauricio Macri. |
(Photo: REUTERS / Ben Gurr / Pool)speaks to students at a reception being held at Downing Street, as part of the government's ongoing programme marking the centenary of World War One, in London July 1, 2014.
The Baptist Union of Great Britain, the Methodist Church and the United Reformed Church have asked Christian young people about their attitudes to voting and politics in Britain.
The young people were clear: they cared about politics; their faith had a major impact on how they voted.
But they did not think their voices were heard nor have faith that politicians would deliver positive change, the Christian think tank Ekklesia has reported.
The online survey was conducted in preparation for the Joint Public Issues Team of the Baptist, Methodist and Reformed churches' conference, "Love Your Neighbour: Think, Pray, Vote.".
The Archbishop of Canterbury, Justin Welby, the symbolic leader of the 88-million strong Anglican Communion.
The aim of the conference is to equip Christians to be active in the run up to Britain's next general election in May 2015.
ONLINE SURVEY
The churches believe that the online survey shows that while many young people care deeply there is a need to heed their concerns about the political process.
In the UK voter turnout amongst 18 to 23 year olds is extremely low.
Research carried out by the YouGov polling agency in April indicated that of the 3.3 million young people entitled to vote for the first time in next year's general election, on May 7, more than 2 million of them will not be voting.
Andrew Weston, Fellowship of the United Reformed Youth moderator elect, said: "It is a great shame that so many young people lack belief in the political system, fearing that their voices will be ignored."
The young Christians asked by the churches said they would be more likely to vote if politicians engage directly with them.
They also said that they are not given sufficient information with regards to policies and key issues, and that one way of overcoming this could also be through better political education in schools.
"It is vitally important that young people take the opportunity to have their say next May," Weston said.
He noted, "I'm really looking forward to the upcoming JPIT conference.
SPACE FOR YOUNG CHIRSTIANS
"To have a space for young Christians to engage with key issues, including poverty, climate change and international affairs, in the context of their faith and the upcoming general election is so valuable."
Rachel Allison co-ordinated the survey and worked with JPIT to help the team improve how churches talk about social justice to young people
Allison said: "There are important questions to be asked about how politicians can engage with a seemingly untapped generation who could have a massive impact on the result of the election and the future of society."
Megan Thomas, Methodist youth president, said: "There are many issues facing our country today that specifically impact on children and young people.
"We live in a country where housing is unaffordable, child poverty is on the increase and where there are constant financial challenges in education."
He said, "Young people are passionate about politics and care about the key issues in our country, but it is important that we have all the facts."
The "Love Your Neighbour: Think, Pray, Vote" conference takes place on Saturday February 21, in the Coventry Central Hall in the center of England. |
Contents
Jack McKee and Cecil Colson are a couple of young, restless rustlers. Jack has turned his back on his wealthy family and his wife. Cecil is a Native American. Together, more out of boredom than anything else, they have begun rustling cattle, cutting them up with a chainsaw and paying bills with fresh meat in lieu of cash.
Equally bored are wealthy Montana rancher John Brown and his wife, Cora. They once ran a beauty parlor in Schenectady, New York, but now they have bought up most of the land in this corner of Montana. Cora is so bored that she tries to catch the eye of her husband's dim ranch hands, Burt and Curt but she can't seem to work up much interest on their part.
The rustling of his livestock lights a fire under Brown, who sends Burt and Curt up in a helicopter to try to catch the thieves in the act. Jack and Cecil continue to single out Brown's cattle, even kidnapping his $50,000 prize bull, Basehart of Bozeman Canyon, for ransom.
Brown decides to call upon Henry Beige, said to be the scourge of rustlers everywhere. A legendary stock detective who once served time on a prison farm for rustling, Beige turns out to be a feeble old fool who doesn't seem to be interested in anything except watching TV and being waited on hand and foot by his niece, Laura, who is almost sickeningly sweet.
Jack and Cecil are feeling cocky, so much so that when Burt and Curt figure out that they must be the rustlers, Jack and Cecil bribe them into a scheme to steal a semi-truck full of John Brown's cattle.
Curt, however, has fallen head over heels in love with the luscious Laura, even though she still mistakenly calls him Burt. She is nowhere near as innocent as she seems, as she proves in a sexual encounter in the woods. Burt intends to use his rustling profits to take an expensive vacation in Mexico, but Curt has chosen to propose marriage to Laura.
Henry Beige's ineptitude and uninterest in identifying the rustlers is infuriating to Brown, who angrily fires him. A distressed Laura explains to Curt that she needs to take care of her uncle and therefore will be leaving with him, unable to marry Curt.
Curt decides to help Henry catch the rustlers instead. Henry proceeds to do exactly that, making a show of it before the town's citizens. Burt and Curt are also arrested, Curt coming to realize that Laura's sweetness and love for him was all an act.
Henry Beige comes to Brown to say goodbye, nonchalantly accepting his payment because he says he's in it now simply for the sport. Brown can see now that Henry is shrewd, not doddering at all, and Laura is a sexy, all-business woman, not innocent in any way.
Jack and Cecil end up sent to the Montana State Prison Ranch at Deer Lodge, presumably the same prison where Henry Beige served time in his youth. They spend their days on horseback, seemingly no more or less bored than they had been before. The final scene shows the two rustlers riding under a sign reading "Rancho Deluxe".
The film was described as a form of "parody Western" by critic Richard Eder in his Nov. 24, 1975 New York Times review. "It is so cool that it is barely alive," he wrote of the film's general tone. Among the positive elements: "Slim Pickens for once has a strongly written comic role. He plays it with great effect, and Charlene Dallas, as his sluttish assistant, is almost as good."
Roger Ebert of the Chicago Sun-Times gave Rancho Deluxe only one-and-a-half out of four possible stars. He wrote: "I don't know how this movie went so disastrously wrong, but it did." |
Type error: error: NotARecord
--> <current file>:1:1
|
1 | True.x
| ^^^^^^ NotARecord
|
|
Q:
Why this bizarre output in c?
I have the following program
#include <stdio.h>
main()
{
char ch[10];
gets(ch);
printf("\nTyped: %s\n\n", ch);
int i = 0;
while ( ch[i] != '\0' )
{
printf("Letter: %c\n", ch[i]);
i++;
}
printf("\nTyped: %s\n\n", ch);
}
and here is the output when i typed "Hello world is good"
hello world is good
Typed: hello world is good
Letter: h
Letter: e
Letter: l
Letter: l
Letter: o
Letter:
Letter: w
Letter: o
Letter: r
Letter: l
Letter:
Typed: hello worl♂
Why i am getting two different output for same command after while loop? does while loop has anything to do with it.. please help..
A:
You do know that "Hello world is good" is more than 10 bytes? The behavior in this case is undefined. Anything can happen, anything at all, from working as you wanted to total crash of your system with reformatting the hard-drive and burning junk over your ROM.
You must allocate enough space for gets to put the string in, and in this case you don't. That's the main reason why gets should be avoided, use fgets instead.
A:
Your character array ch only has space for 10 chars. You typed something longer than 10 chars and tried to store it in that array, effectively writing beyond the end of the array into space that's not reserved for anything (or at least isn't reserved for your characters). You got lucky in this case and didn't write over anything important (your program didn't crash), but subsequent code comes along (the printf(), your int i, etc.) and changes that memory (it's the stack, after all, so it gets used in FIFO order).
Change your char ch[10] to char ch[2048] to give yourself a larger buffer to type into. You might also use fgets() instead of gets() so that you can limit the size of the input to your buffer size. If you use gets(), heed the warning on the man page:
It is the caller's responsibility to ensure that the input line, if
any, is sufficiently short to fit in the string.
|
It’s Not Gleyber Time… Yet
There are few times when a fanbase feels excitement after the injury bug bites a player who posted 20 home runs and a .276 average in the prior year, but with the news trickling out of Steinbrenner field on Tuesday afternoon that shortstop Didi Gregorius will miss the month of April with a shoulder hematoma, it was hard to silence the buzz around BP’s number 15 prospect, Gleyber Torres.
While this sent me down a rabbit hole of disgusting hematoma pictures and how to treat them —apparently cabbage and mustard can actually help — the more important matter at hand is who we’ll see donning pinstripes in place of Gregorius for the month of April.
I’ll break the other bad news right now.
The rational replacements for Gregorius aren’t nearly as exciting as the grand prize in the Aroldis Chapman trade. Torres has earned scouts’ attention, not only because of his Arizona Fall League MVP trophy, but because of his success and poise at 19 years old. Backing up the critical acclaim with a .464 average and 1.448 OPS over 28 at bats this spring, Torres seems ready to slot in at short if the Yankees want to blow up headlines and fantasy baseball drafts this close to the start of the season. The bat control he showed on his first homer of spring, going the other way on a 3-2 fastball off the plate was one of the things that impressed myself and others the most.
If this decision was that easy, Torres jerseys would be already be sold out.
For one, I don’t even see the top prospect staying at shortstop long term, and others agree. A move to third base or second seems most likely as he solidifies his approach at the plate. As the skeptical chatter about how his range will play at the major league level bubbles into our conscious, it only validates this point.
There is the also the inevitable ‘prospect control’ matter, which has caused some of the most able bodied prospects to stick around the minors — Kris Bryant always comes to mind — a few days longer to promote long term visions of workability in free agent budgets. This discussion of ‘super two’ players deserves a thousand words on its own, but the details are less interesting than an accounting textbook, so I’ll do my part to retain some BP Bronx readers and punt the topic to other sites. As much as the Yankees may stress Torres’ development, the money involved is a clear matter of importance as well.
In the wake of all this speculation, Torres was just reassigned to Double-A Trenton, which will soon put to sleep the already tired critique that the Yankees’ number one prospect doesn’t have any at bats above High-A. We should see Torres in the Bronx this year, at the earliest sometime in June, but there is an equal chance a September call-up is the more accurate prediction.
The Trenton Thunder open their season on Thursday, April 6, against the Erie Seawolves (Detroit Tigers Double-A affiliate).
Replacements
All short-term in my eyes. The Gregorius injury is enough to promote some caution and his removal from the World Baseball Classic, but not discouraging enough to expect a completely lost 2017 season.
PECOTA pegged Didi for just under a 2 win season, with a .259 average and 14 home runs at their 50th percentile outcome (reasonable expectation). While the 100th percentile (bold expectation) of a .290 season and another shot at 20 home runs may seem like a pipe dream, take away roughly 100 at bats from Gregorius, and we’re still in the realm of valuable production at a premium position.
Ronald Torreyes, Ruben Tejada and Pete Kozma are the players of note that should see uptick in consideration for at bats.
Torreyes, who comps well to a player out in San Francisco by the name of Joe Panik, graduates from utility defender to a candidate who should exceed his 99 total innings at shortstop in 2016 very quickly.
Tejada always finds himself in the right place at the right time. Last season he was picked up by the St. Louis Cardinals to fill the void created when Jhonny Peralta went down with a bad thumb. A good thing to remember about Tejada is that Mike Matheny, a relatively strict manager when it comes to liberal prospect use, only started favor the 2016 breakout Aledmys Diaz late in Spring, after a Tejada injury manifested just prior to opening day. While there may be some merit to Matheny’s want for Tejada in early 2016, I’m doubtful that the former Mets starter is anything but a deep bench bat at the major league level.
To make things worse, Tejada’s defense has seen some decline in the past few years. With limited reps at the major league level and mediocre results to show, the fountain of youth is the only remedy I see for the kindling of life in a player I thought was much older than 27 years old.
Kozma is the third and final candidate for playing time, and while I entertained the idea of excitement for Tyler Wade, a young middle infielder who scored 90 runs at Double-A Trenton last season, the short term impact this situation has makes me skeptical the Yankees start handing out starts to even less proven talents than Torres.
I may be one of the only ones who remembers Kozma’s clutch RBI in game five of the 2012 NLDS, and to say that was the apex of Kozma’s career isn’t a brash. Kozma had 450+ at bats in 2016 with Triple-A Scranton/Wilkes-Barre, batting only .209 with a slugging percentage below .300. If Kozma is anything but an afterthought in this situation, even with a glove that has shown promise at the major league level, I will be one surprised individual.
What we have in the mix for time at shortstop is the 2016 utility man Ronald Torreyes, flanked but two much less appealing options in Ruben Tejada and Pete Kozma. Torreyes’ performance last season and his flexibility around the diamond has earned him a chance to prosper with a small sample of regular playing time. I think depth is necessary, which is why Tejada and Kozma should be in the discussion, but the only player that can return value is Torreyes.
I’m eager to see the results of some trust extended to the 24 year old. It’s not Torres time quite yet, but it sure seems like Torreyes time. |
[A procedure to assist achievement of total mesorectal excision through the extending intersphincteric plane].
To investigate the value of assisted achievement total mesorectal excision (TME) through the extending intersphincteric plane. From February 2006 to April 2010, 65 patients with low rectal cancer underwent assisted implementing TME through the extending intersphincteric plane under direct vision and achieved sphincter preservation. The clinical data was summarized and analyzed retrospectively. Follow-up visits were conducted on complications and oncological outcomes. The mean operation time was (245 ± 42) minutes, and the mean intraoperative blood loss was (114 ± 76) ml. There was no postoperative mortality. Postoperative complications included 2 cases of anastomotic leak, 13 cases of anastomotic stenosis, 2 cases of early postoperative inflammatory ileus, 1 case of urinary tract infection, and 1 case of incision infection. Distal margins and circumferential resection margin of all specimens were negative. For pathological stage, there were 26 cases at stage pTNMI, 17 cases at stage pTNMII and 22 cases at stage pTNMIII. The mean follow-up time was (47.9 ± 18.9) months. 10 patients were lost to follow up, 15 cases had distant metastasis or local recurrence in, and 8 cases died of tumor metastasis at the latest follow up. Local recurrence occurred in 3 cases, including recurrence in presacral region, metastasis of lymph node at the left side in pelvis cavity, and metastasis at the sacrum at 35, 36, and 52 months postoperatively. There was no anastomotic recurrence. Log-rank survival analysis showed 5-year cumulative survival rate was 100%, 93.3%, and 63.1% in TNM stage I, II, and III, respectively. The cumulative disease-free survival rate was 96.2%, 83.3%, 44.8% in TNM stage I, II, and III, respectively. It has a good oncological effect and was an advantageous procedure to assist achievement total mesorectal excision (TME) through the extending intersphincteric plane as surgeons encountered with difficulties from transabdominal TME. |
As many of you already know, CBN TV founder Pat Robertson does not agree with AiG’s approach to the Genesis account of creation. Robertson doesn’t believe in a young earth or that the book of Genesis is fully literal history. … [ ... ] |
"[ Humming ]" "Reverend, are you interested in participating in the" "Rec Centre Children's Fundraiser For Youth Activities?" "Catchy!" "Yes, count me in." "As Jesus said, blessed be the rec centres, for in them be the open swim." "Ha." "Wonderful!" "We still need a ring announcer." "A ring announcer?" "Like a boxing ring announcer?" " Oh, is that a problem?" " Well, as a Christian" "I believe in peaceful loving solutions to every conflict." " Oh, I should have known." " But... as a man who loves boxing..." "I lo-o-ove boxing!" " Oh!" "[ Laughs ]" " Yes, I boxed in the seminary!" "Some of those guys had a lot of pent-up aggression." " We didn't do a lot of dating." " Would you consider fighting?" "Well, I suppose I could strap on the gloves and open up a can of whoop-ass." "For the kids." "Boy, that would be great!" "Now all we need is an opponent." "Well, I'm sure the Lord will provide." "Reverend." "Miss Parvy." "[ Chuckling ] Oh, you are good." "Amaar, the lovely Miss Parvy and I were talking." "Any chance you'd volunteer for the Rec Centre" "Children's..." "Fundraiser for Youth Activities." " That's the one." " It would mean a lot to the kids." " Of course!" " You're in?" "You bet!" "You name it, I'll do it!" "Well, great!" "We'll see you there." " Boxing gloves will be provided." " Whoa, boxing?" "See you in the ring, Amaar." "[ Sharp exhalations ]" "Ho!" " Ho..." " [ Forced laughter ]" "[ ♪ ]" "Season 4 Episode 9 Gloves Will Keep Us Together" "{\pos(190,180)}Jeez, Thorne, step away from the Photoshop!" " They're all over town." " God, I hope not." "Baber:" "There he is!" "Our inspiration!" "Ha." "Something tells me you're not referring to my last sermon." "{\pos(190,180)}I'm referring to the big battle." "You and Thorne," "{\pos(190,180)}mano a mano, which means man to man!" "So tough!" "[ Chuckles ]" "Mano a mano means hand to hand." "{\pos(190,180)}What?" "{\pos(190,180)}There's nothing tough about that." "{\pos(190,180)}Hand to hand?" "That sounds like a slapping contest." "No, this is the real thing." "{\pos(190,200)}It's the "Thrilla in Manila" all over again." "{\pos(190,200)}No, no." "Let's take it easy." "It's no "Rumble in the Jungle"." "This is more like "Friendly Exhibition Match" ""Between Two Men of the Cloth..." "in Mercy"!" "Yeah." "That's a terrible name!" "It is the "Punchdown in a Small Town"!" "I am much better at this than you are!" " It's nothing like that." " It's exactly like that." "[ Sigh ] You're right." "Me versus Thorne?" "Muslims versus Christians." "This is the last thing this town needs." "No, the last thing this town needs is a monorail." "The second last thing is a juice bar." "And the third last thing is... where are you going?" "[ ♪ ]" "Sarah:" "Wow." "It seems like you've been working on this wall since..." "Dinosaurs wore bell bottoms?" "Yeah." "Why is it taking so long?" "The Reverend keeps changing his mind after the work is done." " Oh, is that allowed in the contract?" " Yes, but that's okay." "Because it's nearly done." "Just a bit of paint." " Complete." "Now, all we have to do is wait." " For what?" " Well, this is all wrong." " For that." "Where's my holy fountain?" "Oh, so now there's a fountain." "With water I presume?" "Of course!" "Is there any other kind?" "It's going to be my little cascading miracle that'll take your breath away." "Wow!" "Well, it really will be a..." "[ Grunts ] miracle because the wall isn't roughed in for plumbing." "Oh." "Then I'll need that done." " But you never told me that." " Well, isn't that just assumed?" "[ Beep ]" "Reverend, Reverend!" "I can't do it!" "I can't fight you!" "It's going to send the wrong message to the community." "I understand." "What you're saying is..." " [ Chicken-like cackle ]" " Look, seriously." "Our congregations need to work together, not go head to head!" "[ Cackling ]" " Very funny." " Buk!" "Grow up!" "Oh, Amaar." "It's okay to be afraid." "I was afraid once." " Then I turned six." " And when was that, yesterday?" "Look, you can't bait me into fighting you." "[ Sigh ] So I'm learning." "Hm, you won't even fight for the youth?" "I mean, the youth is our future." " You can't guilt me either." " You really aren't Christian, are you?" "I mean guilt is our trump card." "There's nothing you can do that will make me fight you." "Never say never." "[ ♪ ]" " Coronation Street?" " Commercial!" "Oh!" "What did I miss?" "Deirdre just ordered Blanche out of her flat." "I am not ready for this." "They've been building up to it for 17 years!" "Ah, I need a caramel cup to dull the pain." "Hey!" "Quality Street?" "Granddad used to bring these back from England." "No." "He used to buy them at the drugstore on the way home from the airport." "[ Giggle ]" "But he said you could only get them in the UK." " Granddad was a liar!" " Really?" "You know he never really owned a zeppelin." "Ooh." "The show's back on!" "So Thorne... gets a... a 5% discount on the whole renovation if it's not completed by next week... his constant changes are stopping me from hitting the deadline!" "Don't take that." "Fight back!" "Good advice." "One more change and I will draw the line." "Atta girl, Blanche!" "What?" "[ "Coronation Street" theme ♪ ]" "You two are useless when "Coronation Street" is on." " Was that Dad?" " Shh!" "[ Phone ringing ] [ Clicks tongue ] Oh..." "Yasir: [ Shouting ] Can you get the phone, please!" "Hello." "Mm-hmm." "Oh hi, Reverend." "Um well, now's not really a very good t..." "Oh, fine." "Hang on, hang on." "Um..." "Don't paint the pillars." "You're good with wood." "Okay." "Yup, great." "I'll tell him!" "Bye." "You mean to say the Muslim Imam agreed to go toe-to-toe for the Youth Rec Centre and then bailed." "Now, Fred." "I'm not here to stoke controversy." "Well no, but I am." "Huh!" "So just to clarify, uh... this "Imama's" boy is afraid to take a few knocks for charity?" "Well, "afraid" is such a harsh word." " Oh." "Yellow?" " It is my favourite colour." "[ Laughing ]" "So, how will you respond to this cowardly act of non-aggression?" "Well, the important thing is that we find someone to take his place so the event can go on." " Oh, someone, uh, Muslim?" " Well, it'd be wonderful if the two communities could come together." "[ Laughing ]" "Are you issuing a challenge to any Muslim man enough to take you on?" "Well, I would never say that!" "Oh." "Is it okay if I do?" "It's your show, Fred." "[ Laughing ]" "You know frankly, I don't think any of Mohammed's minions would step into the ring with the Rev." "No, no." "They clearly prefer soft targets." "In fact, I'll tell you what." "If anyone from the mosque can go three rounds with me, for the kids, of course, my friends at This-Old-Rug Carpet Cleaning will clean all the mosque prayer rugs for an entire year!" "Whoa-ho-ho... hitting them right where they kneel." "Oh, nice." "[ Laughing ]" "You're like Jack Palance in a collar." "[ Radio clicks off ]" " Ridiculous!" " Absolutely." "Although, we could use those carpets cleaned." "Did you hear that?" "Amaar backing out of the fight?" "It's made us look like a laughingstock!" "You make us look like a laughingstock." "Salaam alaikum." "Fatima:" "Walaikum assalaam." " If you will not fight for us, who will?" " Yea..." "I didn't hear you volunteer." "I am not a soldier." "I am a general." "Who bruises a bit too easily." "[ ♪ ] ...133, 134..." "So, Reverend." "What do you think?" "Well, I'm getting there." "Oh, the pillars!" "Yes, they're beautiful." " They're a vision of vertical excellence." " Classic." "A timeless tribute to the holding up of ceilings." "Mm, and most interesting of all, they're painted!" "Oh, yeah." "They're absolutely and completely, um..." " Mm-hmm." " Why is that interesting?" "I wanted wood, Yasir." "Wood!" "No, you clearly said, "paint, Yasir!" "Paint. "" "It doesn't even sound like wood." "You see?" "It has none of the same letters, unless you spell it wrong." "And then I blame the schools." " Mm, I did say paint the wood." " Yes!" " But then I said wood was good!" " No!" "Are you calling me a liar?" "No!" "I'm saying that perhaps you misspoke." "You meant to say wood but it came out... a dirty lie!" "Well, if you look at the contract you'll see that I can change my mind as often as I like." "Yes." "In advance." "Not after the job is done." "Well, the job isn't done because this isn't the work I asked for." "Not only is the work done... but I'm done." "I'm finished." "You quit." "No, you see." "I'm not a quitter." "I'm the kind of person that leaves when the job is done, and this job is done!" "Also, I quit." "[ ♪ ]" "[ Grunts ] Eight." "Amaar:" "Ahhh." "What is this?" " Why are people taking this so seriously?" " No, no." "The question is, why aren't you?" "Have you heard what people are saying?" "We need someone to stand up and fight for us." "We need a... a hero." " I'm no hero." " Ah, but you could be." "You just need a coach." "And I am going to coach you like you have never been coached before!" " I have never been coached before." " Oh, good." "So the pressure's off me." "Yasir:" "Then he had the gall to say, "I told you all about it"!" " Can you believe it?" " Oh, the nerve of that man!" "Now, how could anyone possibly forget someone telling them wood is good?" "Why does that sound so familiar?" "So then, I said to him..." "Thank you." "I love the green ones!" "Oh, I know." "I'll get you one." "Hey..." "What's this?" " "Wood is good"?" " Oh, that's where I've seen it." "Oh!" "You have a message." "[ ♪ ]" "And now it's time now for my favourite segment," ""Fred Was Right!"" "Men: [ On tape ] ♪ Fred was right ♪" "I was right when I said that zero Muslims would go three rounds with the Punching Padre." "Sad, isn't it?" "Rev, would you say that Islam is a culture of cowardice?" "Look, Fred." "I want to make it clear that I have the utmost respect for all faiths!" " Oh." "Except for the Mormons, of course." " Yes." " All that gingham." " Mm-hmm." "I'm just saddened for the kids, the Christian kids, the Muslim kids." "This was supposed to be a charitable event." "But no event, no charity!" "And all because no Muslim had the prayer beads to step into the ring." " [ Cynical chuckle ]" " Yes." "Once again, Fred was right." "[ On tape ] ♪ Fred was right ♪" " Never get tired of hearing that." " That's good, yeah." "Wrong, Fred!" "And Reverend, you have your Muslim and you'll have your fight." "Whoa." "You know, on the one hand I love a good fight but on the other, you kind of kyboshed the name of the segment there." "[ Patting shoulder ]" "[ ♪ ]" "{ Advertisement }" "Thank you all for coming to this press conference." "What conference?" "It's just you!" "Ahem!" "Mr. Rashid?" "Zach Whitman." "Mercy Junior High "Clarion"." "Did you know that the Reverend was a seminary boxing champion?" " No!" "I did not know that!" " Nate:" "He was?" " Yeah." " Wow." "Ha!" "Reverend, are you predicting that you'll win easily?" "Oooh." "Good question." " Um..." " Tuffy Wilson: [ Whispering ]" "No, no, no." "Of course not." "He's a powerful opponent." "He's wiry, he's, um... did I mention he's wiry?" "[ Scoffs ]" "Well, look." "I'd be lying if I said I wasn't worried." "His nickname was the Minister of Justice!" "Well, Amaar is the Imam of Mercy!" "That's not my nickname." "That's my title." "Well, I was on the spot." "I've never done a press conference before, okay?" "Okay, this press conference is over." "How about some photographs?" " Oh!" " Hm?" "Nate:" "Oh yeah, oh yeah, oh yeah." " Yeah." " That's good." "[ ♪ ]" "Got a minute?" "Ah, my prodigal contractor returns." "Yeah, about that." "Funny story." "Ah, I like funny stories." " Well then you're going to love this one." " Yeah?" "See my wife, wonderful woman, she took down your message and then lost it in a box of chocolates!" "Isn't that funny!" "Only if your name's Forrest Gump." "[ Sharp exhale ]" "Now, I understand that you Christians are all about forgiveness." " That's what it says in the ads." " Hate the sin, not the sinner." "Hate the paint, not the painter." "[ Sharp exhale ]" "Hate the wall, not the..." "Well, I think you know the formula." "[ Grunts ]" "So, I gather you want to finish the job?" "Is there a stronger word than yes?" "Well, I'd be delighted to take you back." "Wonderful!" "I'll start straight away." "Great!" "Because the original deadlines are still in effect." "No." "I've lost a day." "And tomorrow's the" "Youth Centre Revival Children's Thing." " The whole town will be there." " That's what we're hoping." "But I'll never find anyone to work!" "But that's my problem." "'Cause you're busy hitting things." "[ Sharp exhalations ]" "That's it." "Left." "Left." "Left." "Left." "Left." "Keep your right up." " Why?" " To throw him off!" " [ Sighs ]" " Left." "Left." "Okay, my left arm is getting kind of sore." "We've got to build it up!" "We're going to make you the best darn southpaw in town!" "I'm not left-handed." "Okay!" "New strategy." "Let's see the right!" "What's the matter, Amaar?" "Is it 'cause he's bigger than you?" "Stronger than you?" " Are you afraid of getting hit?" " I am now." "This might help." "[ Deep exhale ] [ '80s rock ♪ ]" "What's wrong?" "You were killing him!" "That's the problem." "You know when I said I didn't want to fight Thorne?" "That wasn't true." "I do want to fight him." " I really want to fight him. [ Pounding ]" " So fight him!" "This is supposed to be a friendly little charity match." "I'm not supposed to fight out of anger." "Because someone's smug, condescending face is making me want to hit him harder, again and again [ Yelping ] and again and again and again and again!" "[ Crying ] No, no hit!" "No hit!" "No hit!" "What happens if I start punching Thorne and can't stop?" "Don't punch him." "Bob and weave for three rounds and we'll call it a win." "I can do that!" "So, what now?" "Now we turn you into a lean, mean, evading machine." "I'm sorry we're stuck here, it's all my fault." "Yes it is." "Now sand all the way up to that joist." "Joist is a funny word." "It's like it's got a built-in Brooklyn accent." ""Foist" I'll hoist the joist." "That'll build up my "thoist"!" " Yes, Sarah." "Sand, sand, sand!" " Oh." "Or we'll never finish in time." "Oh, I don't think it's going to be much of a clash." "I love Amaar, but it should be called the Mush of the Muslim." "Oh, I don't know." "I think Amaar could really land a few choice blows" " on that smug Reverend's face!" " Yeah." " Thorne:" "Ahem." " Hello!" " Hi." " Hello." " We were talking about another Reverend." " We were." " Um... not you." " No." "Reverend..." "what was his name?" " Uh..." "Joist." " Reverend Joist, yeah." "Ah!" " Back to work, dear." " Okay." "Right." "[ ♪ ]" "Fatima:" "Salaam alaikum." "Oh, walaikum assalaam, Fatima." "I have a new menu item." " The Hero Amaar Sandwich." " Oh, I'm humbled." "It's just like the regular hero sandwich." " Except flattened. [ Sniggering ]" " I'm extremely humbled." "Know that you have my full support for this fight" " and for the aftermath." " What aftermath?" "I will capably run the mosque for you during your lengthy recovery." "That's comforting." "And did you see "Million Dollar Baby"?" "If you need, I will be happy to shut off life support." "Because I care." "[ Sigh ]" "Mmm... are you ready to go?" " You're up in an hour." " Yeah." "To the death!" "If Baber ran the world." "[ Awkward laugh ]" "[ ♪ ]" "Fred:" "Well, welcome folks to Tuffy's Muscle Hut and we're moments away from the Clash of the Clerics." "A classic Achmed versus Goliath battle." "And now I'm going to turn things over to our celebrity ring announcer, the Worship herself," "Mayor Ann Popowicz." " Ooh!" " [ Applause ]" "Thank you, thank you." "I do it for the kids 'cause, you know, let's face it they'll be able to vote in a few years." " [ Scattered laughs ] - [ Fake laugh ]" "In this corner, from Mercy Mosque, weighing 157 pounds... boy, I should really consider cutting out pork..." "[ Laughter ]" "Anyway, The Imam of Mercy..." "Oh really, is that what they came up with?" "Amaar Rashi-i-id!" "[ Applause ]" "And in this corner, from Mercy Anglican, the Minister of Justice," "Reverend William Tho-o-o-o-o-orne!" "[ Applause, cheers ] [ '80s rock ♪ ]" "Fred:" "And, we're about to get things underway here, folks." "Of course, the tension, you could almost cut it with a knife, in here, it's a..." "Very, very excited crowd..." "Are you going to float like a butterfly, sting like a..." " butterfly?" " Yeah." "We're with you, Father." "[ Mixed comments, laughter ]" "Look, Reverend." "I know we've had our differences in the past" " but I think..." " May the better religion win." "[ Grunts ]" "And things are about to get going and..." "Let 'em have it!" "Ooh!" "[ Clang ]" "Fred:" "And the fight is on!" "Thorne, oh very aggressive off the top and uh, look at him, he's all over Amaar right now." "That's good, stay out of his way." "Stay." " Good, Amaar, stay out of his way!" " This is a very strange technique." "Fred:" "He's going to wear out the tread on his boots, he's moving so fast in there." "Look at him go." "Are we going to fight or are we going to dance?" "Come on, Amaar." "Come on!" "[ Sharp exhalations ]" "Ooh!" "Out of his way." "Faster." "[ Grunting ] Mrs. Wispinski:" "Hit him, Father!" " [ Squealing ] Yes!" "Yes!" " But not too hard!" "Wilson:" "Good one, Rev!" "[ Grunting ]" "Crowd: [ Gasping ]" "[ Grunting ]" "Fatima:" "Hit him, Amaar!" "[ Mixed shouts ]" "[ ♪ ]" "Wilson:" "Keep it up!" "Oh!" "[ ♪ ]" "Fred:" "What a pounding!" "Is Amaar just another Muslim on a suicide mission?" "What?" " Oh!" " Crowd: [ Gasping ]" "And..." "that should be the end of round one." "Popowicz?" "[ Laughing ] I'm doing it!" "[ Clanging ]" "Fred:" "And that'll bring the first round to a close and it does not look good for the "Imaminator" in there." "[ Laugh ] No, sir-ee." "Thorne was all over him like white on rice." "You're doing great!" "Seems like I'm evading myself right into his fists!" "Who knew that his arms were so long?" " I Know!" "Any words of advice, coach?" " Yeah, stay out of the corners, stay off the ropes and clear the centre." "Maybe I should do everyone a favour and just wait outside." "Two more rounds, and sure." "And let's get her going." "[ Clang ]" "Fred:" "And the fight is on, ladies and gentlemen." "Oh-ho-ho-ho, the punishment has already started!" "Or is Amaar just too darn scared to fight back?" "Crowd: [ Gasping ]" "Thorne is just turning him into a speed bag, ladies and gentlemen." "Hit him, Amaar!" "Hit him!" "Why isn't he hitting him?" "He has too little hate in his heart." "This is why he's not fit to lead." "My wife would punch better!" "Crowd:" "Ohhh!" "No mercy!" " What did we miss?" " This." "Yasir:" "Oooh!" "Amaar!" "You can hit him now!" "I finished the pillars!" "Hit him!" "[ Shrieking ] Hit him!" "Ooh, Ama-a-ar." "[ Grunts ]" "This is a tough one for you." "[ Grunts ]" "Maybe it'd be better if you just..." " [ Grunting ] - conceded, huh?" "Can't do that, Rev. But you go ahead and be my guest." "Ah, it's fine. 'Cause either way I win." "[ Sharp exhale ]" " How do you figure?" " Well, there's two options." "Option one: you back down now, everyone thinks I tamed the Muslim menace." " Ah!" " Oh!" "Option two:" "I knock you down in front of everyone" " and I look crushingly superior." " [ Moans ]" "Crowd:" "Oh!" "Either way, I win!" "Whoo-hoo!" "[ Grunting ]" "Oh-h!" "Look at him!" "Oh, he's waving to the crowd" "They love him here, ladies and gentlemen." " Well there was a third option, Rev." " Yeah, what's that?" "Third option is I win!" "[ Grunting ]" "Fred:" "What the heck is going on?" "Amaar is coming out of nowhere!" " Church ladies: [ Squealing ] Oh, no!" " Yes!" "Fred:" "Oh my goodness!" "Holy man down, ladies and gentlemen!" "I can't believe it!" "Yes!" "[ Laughing ]" " Two, three!" "It's over!" " Crowd: [ Shouting ]" "Fred:" "He's out!" "It's over!" "Thorne has lost the fight!" "Amaar is the winner, ladies and gentlemen!" "I don't believe it." "[ Cheering ]" "We can wait three days, he's not getting back up again." "{ Advertisement }" "Where is he?" "Amaar?" "Rayyan:" "Wow." "I can't believe you did that!" "You decked him!" " I didn't know you had it in you." " Neither did I." "So what happened to the lean mean evading machine?" "I lost my cool." "He got me angry!" "{\pos(190,200)}So you're not a machine after all." "{\pos(190,200)}You're human." "And humans make mistakes." "...forgiving us..." "[ Thump ] Ah!" "Aaah..." "The important thing is how you feel now." "{\pos(190,180)}Kind of good?" "But mostly..." "Ow!" "Subtitle by:" "Kiasuseven" |
News and Events
WE'RE STANDINGTOGETHER
GET WELL.STAY WELL.BOTHWELL.
Meet Patricia Gunn
Patricia Gunn enjoys taking walks with her husband, floating in her pool and driving her vintage Mustang – anything to be active - so it’s no surprise she wasn’t a fan of sitting behind a desk when it came to working. Instead, for more than 20 years, Patricia worked a variety of physical jobs—everything from landscaper to stock clerk to part-time photographer.
In her late 40s, however, the physical work began to take a toll on her body. She started out having the normal aches and pains that come with aging, but it turned into something much more serious—chronic joint pain. The pain started interfering with her ability to work and do things with her family. She decided it was time to see her family physician, Dr. Jeffrey Sharp.
When Patricia came to me about her severe joint pain and told me how long she had been struggling, I knew right away she needed to see an orthopedic specialist. I referred her to Bothwell Orthopedics and Sports Medicine. I know the physicians there well and trust them to take great care of my patients—they have been practicing in Sedalia for more than 30 years."- Dr. Jeffrey Sharp
Patricia made an appointment with Dr. Douglas Kiburz and it didn’t take him long to determine she had degenerative arthritis, also known as bone-on-bone arthritis. It’s extremely painful.
Her condition ultimately resulted in her having four different orthopedic surgeries in seven years—all at Bothwell. Her first surgery was for carpal tunnel, followed by knee surgery, then shoulder surgery. Patricia thought she was through the worst of it, but then the pain started in her hip.
“I was in a lot of hip pain for two years and it finally got to the point where walking was becoming very difficult. I could feel something would catch when I was walking and I came close to falling several times. After a while, I just couldn’t do it anymore. I knew it was time for a hip replacement—and I knew I wanted Dr. Kiburz to perform the surgery.”
Patricia is atypical because she’s in her early 50s. Most of my patients are in their 70s and 80s. But regardless of how young or old you are, pain is what wears people down. When you get to the point where you can’t sleep, you can’t get in your car, you can’t go up the bleachers to see your grandkids play ball, life isn’t a lot of fun. That’s when people usually decide to have surgery, when the pain is interrupting their daily lives." - Dr. Douglas Kiburz
Bothwell was one of the first hospitals in the country to implement a Total Joint Camp, an innovative program which helps patients prepare for surgery and physical therapy. The Bothwell Joint Camp has been in place for more than 10 years.
What a lot of people don’t realize about orthopedic procedures is there is a lot that goes into them - not just the surgery. There’s the pre-operative evaluation, then surgery, and physical therapy. Bothwell can provide all those things.”- Dr. Jeffrey Sharp
It wasn’t that many years ago when a hip replacement meant spending weeks in the hospital. Today, most people start a rehabilitation program the day after surgery and are back home in a matter of days.
Patricia was one of those patients. She started physical therapy exercises in the hospital and slept in her own bed two days after surgery. She is back to walking with her husband, floating in her pool and driving her vintage Mustang.
“I could have gone anywhere for my orthopedic surgeries, but I chose Dr. Kiburz at Bothwell. He changed my life. He gave me the ability to be mobile again without pain. “
Bothwell Orthopedics and Sports Medicine Physicians
We have a great team that works together and that’s how the joint camp works. Orthopedic surgery is a team effort, from the operating room crew, the recovery team, the physical therapists, occupational therapists, the nurses, nutritionist and volunteers, it takes all of us.”
Dr. Douglas Kiburz is an orthopedic surgeon at Bothwell Orthopedics and Sports Medicine. Kiburz attended medical school at the University of Nebraska College of Medicine in Omaha, Nebraska, completing his residency in orthopaedic surgery at the University of Kansas School of Medicine in Kansas City, Kansas. Kiburz also completed a fellowship in hand and sports medicine at the University of Virginia in Charlottesville, Virginia and a fellowship in arthroscopy at the Orthopaedic Research of Virginia in Richmond, Virginia.
The technological advancements in orthopedic surgeries have allowed surgeons to offer less invasive procedures to our patients. It is great for patients because it often leads to shorter surgery times, less time under anesthesia, and quicker recoveries.” |
Six More Weeks Of Cold Weather
February 4, 2014
48
14
0
Well, we all know that on Groundhog Day, February 2, 2014, Punxsutawney Phil saw his shadow. That was not good enough for me. I do not live in Punxsutawney. How old is that groundhog, anyway? Can he even see any more? I had another plan for this year.
I decided to do my own experiment. On the night of February 1st, I dug a hole in the sand, and went to sleep. It's amazing how warm it was in the sand. Wet, but warm none the less. The next morning, I crawled up out of the hole. What did I see? My Shadow!!! I guess Phil is right, as we both saw our shadows.
So, six more weeks of winter weather it is. Next year, I will just leave it to good ol' Phil. I still have sand in between my toes. |
Q:
How can I create a .swift file for my new .sks file?
When using Xcode, I've faced the annoying problem, which is Xcode always crashes when I click .SKS files. I have raised questions here, and even in Apple developer forum, as well as searched for the solutions on the Internet... but it is hopeless.
Because I am making a game with many scenes, so if I can't use SpriteKit editor to interact with the scenes in an easy way, I want to know how can I interact with my scenes by coding their .swift files.
So the question is, for example, when I create a file "EndScene.sks", how can I create a "EndScene.swift", which links with my .sks file?
Thank you very much!
A:
Create a new swift file and name it the same as your .sks file. Let's say you have a .sks file called MainMenu.sks. You'd create a swift file called MainMenu.swift. Inside that file, you'll want to create a Main Menu class that inherits from SKScene.
import SpriteKit
class MainMenu: SKScene {
}
Inside there is where you'll put all your code. The key is, as you said, linking this to the .sks file.
When you go to present your scene, you'll instantiate the class and associate it with the .sks file.
import UIKit
import SpriteKit
class GameViewController: UIViewController {
override func viewDidLoad() {
super.viewDidLoad()
if let scene = MainMenu(fileNamed:"MainMenu") {
let skView = self.view as! SKView
// Some settings applied to the scene and view
// ... code ...
skView.presentScene(scene)
}
}
//... other code
}
Note the line let scene = MainMenu(fileNamed:"MainMenu"). That's where you are instantiating the class you created in MainMenu.swift. So, technically, MainMenu() is the .swift file and fileNamed: "MainMenu" is the .sks file. You can technically put any .sks file into the init call and it'll render that scene.
Imagine having a game with all the logic for a maze runner. You could build all the game logic in a class called MazeScene and just make a bunch of .sks files, each with a different maze. You could then so something like, MazeScene(fileNamed: "MazeOne") or MazeScene(fileNamed: "MazeThree").
For the documentation on this, SKScene inherits from SKNode so you'll find the documentation for init(fileNamed:) here
That should get you going.
|
Q:
Order by min of two dates with nulls first for one column, ignore nulls for another
I want to order my data by the minimum date of two columns, with equal precedence. If Date1 has nulls, I want them to appear first. If Date2 has nulls, I just want to go by Date1. If both dates are null, it should appear at the top.
It 'should' never happen that Date1 is null and Date2 is not.
For example:
Date1 Date2
1/1/2012 1/1/2000
null null
1/1/2009 1/1/2015
1/1/2013 null
1/1/2003 1/1/2003
Should end up as:
Date1 Date2
null null
1/1/2012 1/1/2000
1/1/2003 1/1/2003
1/1/2009 1/1/2015
1/1/2013 null
Is this possible?
A:
LEAST and COALESCE should give you what you're after:
with sample_data as (select to_date('01/01/2012', 'dd/mm/yyyy') date1, to_date('01/01/2000', 'dd/mm/yyyy') date2 from dual union all
select null date1, null date2 from dual union all
select to_date('01/01/2009', 'dd/mm/yyyy') date1, to_date('01/01/2015', 'dd/mm/yyyy') date2 from dual union all
select to_date('01/01/2013', 'dd/mm/yyyy') date1, null date2 from dual union all
select to_date('01/01/2003', 'dd/mm/yyyy') date1, to_date('01/01/2003', 'dd/mm/yyyy') date2 from dual)
select date1,
date2
from sample_data
order by least(date1, coalesce(date2, date1)) nulls first;
DATE1 DATE2
---------- ----------
01/01/2012 01/01/2000
01/01/2003 01/01/2003
01/01/2009 01/01/2015
01/01/2013
|
/* vim: set ts=8 sw=8 sts=8 noet tw=78:
*
* tup - A file-based build system
*
* Copyright (C) 2011-2020 Mike Shal <marfey@gmail.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#if defined(__APPLE__)
#include <sys/sysctl.h>
#elif defined(_WIN32)
/* _WIN32_IE needed for SHGetSpecialFolderPath() */
#define _WIN32_IE 0x0500
#include <windows.h>
#include <shlobj.h>
#endif
#include "compat.h"
#include "option.h"
#include "vardb.h"
#include "inih/ini.h"
#include "init.h"
#include <assert.h>
#include <errno.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include <unistd.h>
#include <signal.h>
#ifndef _WIN32
#include <sys/ioctl.h>
#endif
#define OPT_MAX 256
static char home_loc[PATH_MAX];
static struct {
const char *file;
struct vardb root;
int exists;
} locations[] = {
{ .file = "(command line overrides)" },
{ .file = TUP_OPTIONS_FILE },
{ .file = home_loc },
#ifndef _WIN32
{ .file = "/etc/tup/options" },
#endif
};
#define NUM_OPTION_LOCATIONS (sizeof(locations) / sizeof(locations[0]))
static int parse_option_file(int x);
static const char *cpu_number(void);
static const char *stdout_isatty(void);
static const char *get_console_width(void);
static int init_home_loc(void);
static struct option {
const char *name;
const char *default_value;
/* function that generates default value dynamically */
const char *(*generator)(void);
} options[] = {
{"updater.num_jobs", NULL, cpu_number},
{"updater.keep_going", "0", NULL},
{"updater.full_deps", "0", NULL},
{"updater.warnings", "1", NULL},
{"display.color", "auto", NULL},
{"display.width", NULL, get_console_width},
{"display.progress", NULL, stdout_isatty},
{"display.job_numbers", "1", NULL},
{"display.job_time", "1", NULL},
{"display.quiet", "0", NULL},
{"monitor.autoupdate", "0", NULL},
{"monitor.autoparse", "0", NULL},
{"monitor.foreground", "0", NULL},
{"db.sync", "1", NULL},
{"graph.dirs", "0", NULL},
{"graph.ghosts", "0", NULL},
{"graph.environment", "0", NULL},
{"graph.combine", "0", NULL},
};
#define NUM_OPTIONS (sizeof(options) / sizeof(options[0]))
static int inited = 0;
static volatile sig_atomic_t win_resize_requested = 0;
#ifdef _WIN32
static void reset_console(void);
static CONSOLE_SCREEN_BUFFER_INFO csbi;
#else
static void win_resize_handler(int sig);
static struct sigaction sigact = {
.sa_handler = win_resize_handler,
.sa_flags = SA_RESTART,
};
#endif
int tup_option_process_ini(void)
{
int cur_dir;
int best_root = -1; // file descriptor -> best root candidate
int found_tup_dir = 0;
cur_dir = open(".", 0);
if(cur_dir < 0) {
perror("open(\".\", 0)");
fprintf(stderr, "tup error: Could not get reference to current directory?\n");
exit(1);
}
while(1) {
FILE *f;
struct stat st;
char path_buf[8];
f = fopen("Tupfile.ini", "r");
if(f == NULL) {
if(errno != ENOENT) {
perror("fopen");
fprintf(stderr, "tup error: Unexpected error opening ini file\n");
exit(1);
}
} else {
if(best_root != -1)
close(best_root);
/* open can never fail as we have
already read a file from this dir */
best_root = open(".", 0);
assert(best_root >= 0);
fclose(f);
}
if(stat(".tup", &st) == 0 && S_ISDIR(st.st_mode)) {
found_tup_dir = 1;
break;
}
if(chdir("..")) {
perror("chdir");
fprintf(stderr, "tup error: Unexpected error traversing directory tree\n");
exit(1);
}
if(NULL == getcwd(path_buf, sizeof(path_buf))) {
if(errno != ERANGE) {
perror("getcwd");
fprintf(stderr, "tup error: Unexpected error getting directory while traversing the tree\n");
}
} else {
if(is_root_path(path_buf)) {
break;
}
}
}
if(best_root == -1) {
goto ini_cleanup;
}
if(!found_tup_dir) {
int rc;
int argc = 1;
char argv0[] = "init";
char *argv[] = {argv0, NULL};
char root_path[PATH_MAX];
if(fchdir(best_root) < 0) {
perror("fchdir(best_root)");
fprintf(stderr, "tup error: Could not chdir to root candidate?\n");
exit(1);
}
if(NULL == getcwd(root_path, sizeof(root_path))) {
if(errno != ERANGE) {
perror("getcwd");
fprintf(stderr, "tup error: Unexpected error getting root path\n");
exit(1);
}
printf("Initializing .tup directory\n");
} else {
printf("Initializing .tup in %s\n", root_path);
}
rc = init_command(argc, argv);
if(0 != rc) {
fprintf(stderr, "tup error: `tup init' failed unexpectedly\n");
exit(rc);
}
}
if(close(best_root) < 0) {
perror("close(best_root)");
}
ini_cleanup:
if(fchdir(cur_dir) < 0) {
perror("fchdir(cur_dir)");
fprintf(stderr, "tup error: Could not chdir back to original working directory?\n");
exit(1);
}
if(close(cur_dir) < 0) {
perror("close");
fprintf(stderr, "tup error: Unexpected error closing current directory file descriptor\n");
exit(1);
}
return 0;
}
static int parse_cmdline_options(struct vardb *vdb, int argc, char **argv)
{
int x;
const char *opt;
const char *value;
for(x=0; x<argc; x++) {
opt = NULL;
value = NULL;
if(strcmp(argv[x], "--keep-going") == 0 ||
strcmp(argv[x], "-k") == 0) {
opt = "updater.keep_going";
value = "1";
} else if(strcmp(argv[x], "--no-keep-going") == 0) {
opt = "updater.keep_going";
value = "0";
} else if(strncmp(argv[x], "-j", 2) == 0) {
opt = "updater.num_jobs";
value = argv[x]+2;
} else if(strcmp(argv[x], "--no-sync") == 0) {
opt = "db.sync";
value = "0";
} else if(strncmp(argv[x], "--display-color", 15) == 0) {
if(argv[x][15] != '=') {
fprintf(stderr, "tup error: --display-color requires one of {never|always|auto}\n");
return -1;
}
opt = "display.color";
value = &argv[x][16];
if(strcmp(value, "never") != 0 &&
strcmp(value, "always") != 0 &&
strcmp(value, "auto") != 0) {
fprintf(stderr, "tup error: --display-color requires one of {never|always|auto}\n");
return -1;
}
}
if(opt && value) {
if(vardb_set(vdb, opt, value, NULL) < 0)
return -1;
}
}
return 0;
}
int tup_option_init(int argc, char **argv)
{
unsigned int x;
#ifdef _WIN32
if(GetConsoleScreenBufferInfo(GetStdHandle(STD_OUTPUT_HANDLE), &csbi))
atexit(reset_console);
#endif
for(x=0; x<NUM_OPTIONS; x++) {
if(options[x].generator)
options[x].default_value = options[x].generator();
}
if(init_home_loc() < 0)
return -1;
vardb_init(&locations[0].root);
if(parse_cmdline_options(&locations[0].root, argc, argv) < 0)
return -1;
/* Start at 1 since the first one is command-line overrides */
for(x=1; x<NUM_OPTION_LOCATIONS; x++) {
if(vardb_init(&locations[x].root) < 0)
return -1;
if(parse_option_file(x) < 0)
return -1;
}
#ifndef _WIN32
if(sigemptyset(&sigact.sa_mask) < 0) {
perror("sigemptyset");
return -1;
}
if(sigaction(SIGWINCH, &sigact, NULL) < 0) {
perror("sigaction");
return -1;
}
#endif
inited = 1;
return 0;
}
void tup_option_exit(void)
{
unsigned int x;
for(x=0; x<NUM_OPTION_LOCATIONS; x++) {
vardb_close(&locations[x].root);
}
}
int tup_option_get_flag(const char *opt)
{
const char *value = tup_option_get_string(opt);
if(strcmp(value, "true") == 0)
return 1;
if(strcmp(value, "yes") == 0)
return 1;
if(strcmp(value, "false") == 0)
return 0;
if(strcmp(value, "no") == 0)
return 0;
return atoi(value);
}
int tup_option_get_int(const char *opt)
{
return atoi(tup_option_get_string(opt));
}
const char *tup_option_get_string(const char *opt)
{
unsigned int x;
int len = strlen(opt);
if(!inited) {
fprintf(stderr, "tup internal error: Called tup_option_get_string(%s) before the options were initialized.\n", opt);
exit(1);
}
for(x=0; x<NUM_OPTION_LOCATIONS; x++) {
struct var_entry *ve;
ve = vardb_get(&locations[x].root, opt, len);
if(ve) {
return ve->value;
}
}
for(x=0; x<NUM_OPTIONS; x++) {
if(strcmp(opt, options[x].name) == 0) {
if(win_resize_requested &&
strcmp(opt, "display.width") == 0) {
options[x].default_value = get_console_width();
}
return options[x].default_value;
}
}
fprintf(stderr, "tup internal error: Option '%s' does not have a default value\n", opt);
exit(1);
}
int tup_option_show(void)
{
unsigned int x;
printf(" --- Option files:\n");
/* Start at 1 since 0 is the command line overrides */
for(x=1; x<NUM_OPTION_LOCATIONS; x++) {
if(locations[x].exists) {
printf("Parsed option file: %s\n", locations[x].file);
} else {
printf("Option file does not exist: %s\n", locations[x].file);
}
}
printf(" --- Option settings:\n");
for(x=0; x<NUM_OPTIONS; x++) {
unsigned int y;
const char *value = options[x].default_value;
const char *location = "default values";
int len = strlen(options[x].name);
for(y=0; y<NUM_OPTION_LOCATIONS; y++) {
struct var_entry *ve;
ve = vardb_get(&locations[y].root, options[x].name, len);
if(ve) {
location = locations[y].file;
value = ve->value;
break;
}
}
printf("%s = '%s' from %s\n", options[x].name, value, location);
}
return 0;
}
static int parse_callback(void *user, const char *section, const char *name,
const char *value)
{
struct vardb *vdb = user;
char opt[OPT_MAX];
unsigned int x;
if(snprintf(opt, sizeof(opt), "%s.%s", section, name) >= (signed)sizeof(opt)) {
fprintf(stderr, "tup error: Option '%s.%s' is too long.\n", section, name);
return 0; /* inih error code */
}
for(x=0; x<NUM_OPTIONS; x++) {
if(strcmp(options[x].name, opt) == 0)
goto set_var;
}
fprintf(stderr, "tup warning: Option '%s' in section '%s' is unknown to this version of tup. It will be ignored.", name, section);
return 1; /* inih success, keep going and ignore unknowns to future-proof */
set_var:
if(vardb_set(vdb, opt, value, NULL) < 0)
return 0; /* inih error code */
return 1; /* inih success */
}
static int parse_option_file(int x)
{
FILE *f;
int rc;
f = fopen(locations[x].file, "r");
if(!f) {
/* Don't care if the file's not there or we can't read it */
locations[x].exists = 0;
return 0;
}
locations[x].exists = 1;
rc = ini_parse_file(f, parse_callback, &locations[x].root);
fclose(f);
if(rc == 0)
return 0;
if(rc == -1) {
fprintf(stderr, "tup error: Failed to read options file: %s\n", locations[x].file);
} else {
fprintf(stderr, "tup error: Failed to parse options file (%s) on line %i.\n", locations[x].file, rc);
}
return -1;
}
static const char *cpu_number(void)
{
static char buf[10];
int count = 1;
#if defined(__linux__) || defined(__sun__) || defined(__FreeBSD__) || defined(__NetBSD__)
count = sysconf(_SC_NPROCESSORS_ONLN);
#elif defined(__APPLE__)
int nm[2];
size_t len = 4;
nm[0] = CTL_HW; nm[1] = HW_AVAILCPU;
sysctl(nm, 2, &count, &len, NULL, 0);
if(count < 1) {
nm[1] = HW_NCPU;
sysctl(nm, 2, &count, &len, NULL, 0);
if(count < 1) { count = 1; }
}
#elif defined(_WIN32)
SYSTEM_INFO sysinfo;
GetSystemInfo(&sysinfo);
count = sysinfo.dwNumberOfProcessors;
#endif
if(count > 100000 || count < 0)
count = 1;
snprintf(buf, sizeof(buf), "%d", count);
buf[sizeof(buf) - 1] = 0;
return buf;
}
static const char *get_console_width(void)
{
static char buf[10];
int width = 0;
#ifdef TIOCGWINSZ
struct winsize wsz;
if(ioctl(STDOUT_FILENO, TIOCGWINSZ, &wsz) == 0)
width = wsz.ws_col;
#elif defined(_WIN32)
width = csbi.dwSize.X;
#endif
snprintf(buf, sizeof(buf), "%d", width);
buf[sizeof(buf) - 1] = 0;
return buf;
}
static const char *stdout_isatty(void)
{
static char buf[10];
int tty;
tty = isatty(STDOUT_FILENO);
#ifndef _WIN32
if(!tty) {
setlinebuf(stdout);
}
#endif
snprintf(buf, sizeof(buf), "%d", tty);
buf[sizeof(buf) - 1]= 0;
return buf;
}
static int init_home_loc(void)
{
#if defined(_WIN32)
char folderpath[MAX_PATH];
wchar_t wfolderpath[MAX_PATH];
if(!SHGetSpecialFolderPath(NULL, wfolderpath, CSIDL_COMMON_APPDATA, 0)) {
fprintf(stderr, "tup error: Unable to get Application Data path.\n");
return -1;
}
WideCharToMultiByte(CP_UTF8, 0, wfolderpath, -1, folderpath, MAX_PATH, NULL, NULL);
if(snprintf(home_loc, sizeof(home_loc), "%s\\tup\\tup.ini", folderpath) >= (signed)sizeof(home_loc)) {
fprintf(stderr, "tup internal error: user-level options file string is too small.\n");
return -1;
}
return 0;
#else
const char *home;
home = getenv("HOME");
if(home) {
if(snprintf(home_loc, sizeof(home_loc), "%s/.tupoptions", home) >= (signed)sizeof(home_loc)) {
fprintf(stderr, "tup internal error: user-level options file string is too small.\n");
return -1;
}
}
return 0;
#endif
}
#ifdef _WIN32
static void reset_console(void)
{
SetConsoleTextAttribute(GetStdHandle(STD_OUTPUT_HANDLE), csbi.wAttributes);
}
#else
static void win_resize_handler(int sig)
{
if(sig) {}
win_resize_requested = 1;
}
#endif
|
Gemcitabine reactivates epigenetically silenced genes and functions as a DNA methyltransferase inhibitor.
Gemcitabine is indicated in combination with cisplatin as first-line therapy for solid tumours including non-small cell lung cancer (NSCLC), bladder cancer and mesothelioma. Gemcitabine is an analogue of pyrimidine cytosine and functions as an anti-metabolite. Structurally, however, gemcitabine has similarities to 5-aza-2-deoxycytidine (decitabine/Dacogen®), a DNA methyltransferase inhibitor (DNMTi). NSCLC, mesothelioma and prostate cancer cell lines were treated with decitabine and gemcitabine. Reactivation of epigenetically silenced genes was examined by RT-PCR/qPCR. DNA methyltransferase activity in nuclear extracts and recombinant proteins was measured using a DNA methyl-transferase assay, and alterations in DNA methylation status were examined using methylation-specific PCR (MS-PCR) and pyrosequencing. We observe a reactivation of several epigenetically silenced genes including GSTP1, IGFBP3 and RASSF1A. Gemcitabine functionally inhibited DNA methyltransferase activity in both nuclear extracts and recombinant proteins. Gemcitabine dramatically destabilised DNMT1 protein. However, DNA CpG methylation was for the most part unaffected by gemcitabine. In conclusion, gemcitabine both inhibits and destabilises DNA methyltransferases and reactivates epigenetically silenced genes having activity equivalent to decitabine at concentrations significantly lower than those achieved in the treatment of patients with solid tumours. This property may contribute to the anticancer activity of gemcitabine. |
#
# Cookbook Name:: apt_test
# Recipe:: default
#
# Copyright 2012, Opscode, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
include_recipe 'apt::default'
|
I wonder how long it took Jasper's to turn yellow.He drank human blood for a long time before he found Alice.I wonder if that made the color change take longer.I wonder how long it would take, say, Laurent's eyes to change (his death aside, of course).
And I have a question... do vampires eyes turn a certain color according to their moods? I heard someone on here say something like that.
I remember reading parts where Edward's eyes went from a liquidish state to a solid state a few time when he was with Bella. And there was a little colour in his eyes before he went after James, and than they turned black. I think it would depend on how deep the emotional change in the vampire is.
I think that hunger is the main part of what color their eyes are/turn,but also mood but only if the mood/emotion is more dominant then their thirst.I have a question though,When Bella sees his eyes Black, that's supposed to mean he's 'thirsty', right?Well if he was so hungry for them to turn black, why didn't he just attack Bella there?Maybe they were black because he was frustrated because he knew he couldn't [because he had to restrain from attacking her]?I hope this question made sense, but when I saw this topic,it immediately came in my head. |
Amenorm : An ideal ayurvedic formulation for the successful
management of secondary Amenorrhoea. AMENORM combines
an ancient knowledge in harmless medicinal herbs with modern
know-how in preparation and as a stimulant of ovarian function
and general metabolism.
Hridayamrith is a safe ayurvedic formulation derived from the manuscripts of ancient times. HRIDAYAMRITH helps to reduce the blood cholesterol and triglyceride levels, maintains the cholesterol lectium ratio and improves blood flow and general well - being.
The primary cause of hair fall has been scientifically proven to be due to internal metabolic imbalance and Hairomax capsule is the best remedy. Hairomax capsule is a safe rasayana preparation which is being prescribed by Vaidyavachaspathi N.K Padmanaban Vaidyar for many decades for hair fall. -Stops hair fall and...
Revive the glow in your face with the magic touch of honey bee wax -One and only ayurvedic beauty product manufactured using honey bee wax. -Removes pimples and black marks and gives glow and softness to the face. -Make skin younger by removing the dryness from the skin. -Massage for...
IMMUWIN SYRUP JUNIOR – AYURVEDIC IMMUNITY BUILDER FOR CHILDREN
IMMUNITY is the main building block of a Child’s health.
To strengthen immunity we need to give them enough nutrients naturally. Nutrients rich honey based IMMUWIN SYRUP JUNIOR helps them to strengthen your child’s immune system. Immuwin Syrup Junior is a clinically proven OTC product without any side effects.
Muslimantra is a highly effective natural herbal combination of 9 purest herbs, offering ultra-vitality for men to give the best performance. It is 100% safe to use. Unlike other products, Muslimantra is free of metal-based components ensuring a stable health in long run.
For the best result, Muslimantra must be used for a continues period of minimum 30 days. |
/*-
* Copyright (c) 2011-2015 Juan Romero Pardines.
* Copyright (c) 2014 Enno Boland.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <stdio.h>
#include <errno.h>
#include <stdarg.h>
#include "xbps_api_impl.h"
#ifdef __clang__
#pragma clang diagnostic ignored "-Wformat-nonliteral"
#endif
/**
* @file lib/log.c
* @brief Logging functions
* @defgroup log Logging functions
*
* Use these functions to log errors, warnings and debug messages.
*/
static void
common_printf(FILE *f, const char *msg, const char *fmt, va_list ap)
{
if (msg != NULL)
fprintf(f, "%s", msg);
vfprintf(f, fmt, ap);
}
void
xbps_dbg_printf_append(struct xbps_handle *xhp, const char *fmt, ...)
{
va_list ap;
if (!xhp)
return;
if ((xhp->flags & XBPS_FLAG_DEBUG) == 0)
return;
va_start(ap, fmt);
common_printf(stderr, NULL, fmt, ap);
va_end(ap);
}
void
xbps_dbg_printf(struct xbps_handle *xhp, const char *fmt, ...)
{
va_list ap;
if (!xhp)
return;
if ((xhp->flags & XBPS_FLAG_DEBUG) == 0)
return;
va_start(ap, fmt);
common_printf(stderr, "[DEBUG] ", fmt, ap);
va_end(ap);
}
void
xbps_error_printf(const char *fmt, ...)
{
va_list ap;
va_start(ap, fmt);
common_printf(stderr, "ERROR: ", fmt, ap);
va_end(ap);
}
void
xbps_warn_printf(const char *fmt, ...)
{
va_list ap;
va_start(ap, fmt);
common_printf(stderr, "WARNING: ", fmt, ap);
va_end(ap);
}
|
Q:
Drawing selection custom selection box using ArcObjects?
I have some code that I'm using to selecting features in a certain extent. I already rigged the tool properly, so it selected the objects as needed, but I want to draw interactively the selection box the user is making.
I'm using IScreenDisplay.DrawRectangle method, but it pollutes the screen with many small rectangles. Is there a way to clear up the old drawings in the screen?
This Draw method is being called from a mouse move event. Any ideas?
Here are two methods I'm using to do the dirty work:
public override void OnMouseMove(int button, int shift, int x, int y)
{
if (button != 1)
return;
if (!_IsSelectOperation)
return;
endPoint = focusScreenDisplay.DisplayTransformation.ToMapPoint(x, y);
envelope.PutCoords(startPoint.X, startPoint.Y, endPoint.X, endPoint.Y);
DrawEnvelope(envelope, BuildSelectionSymbol(), focusScreenDisplay);
}
private void DrawEnvelope(IEnvelope envelope, ISymbol symbol, IScreenDisplay screenDisplay)
{
screenDisplay.StartDrawing(screenDisplay.WindowDC, 0);
screenDisplay.SetSymbol(symbol);
screenDisplay.DrawRectangle(envelope);
screenDisplay.FinishDrawing();
}
Here is the code for BuildSelectionSymbol:
private ISymbol BuildSelectionSymbol()
{
IColor fillColor = new RgbColorClass();
fillColor.Transparency = 0;
IRgbColor outlineColor = new RgbColorClass();
outlineColor.Red = 0;
outlineColor.Green = 0;
outlineColor.Blue = 0;
ISimpleLineSymbol lineSymbol = new SimpleLineSymbolClass();
lineSymbol.Color = outlineColor as IColor;
lineSymbol.Width = 1;
lineSymbol.Style = esriSimpleLineStyle.esriSLSDash;
ISimpleFillSymbol fillSymbol = new SimpleFillSymbolClass();
fillSymbol.Color = fillColor;
fillSymbol.Outline = lineSymbol;
fillSymbol.Style = esriSimpleFillStyle.esriSFSHollow;
ISymbol symbol = fillSymbol as ISymbol;
symbol.ROP2 = esriRasterOpCode.esriROPNOP;
return symbol;
}
I already have the answer for this. I was using a normal envelope. The deal is that ESRI already has something to handle that for you and it's contained in INewEnvelopeFeedback class.
http://help.arcgis.com/en/sdk/10.0/arcobjects_net/conceptualhelp/index.html#/Sample_Display_feedback/000100000m9s000000/
Actually, this interface got me where the code snippet in the question was. It stills draws all the rectangles, but I still need a way to clean them.
Any ideas?
A:
It stills draws all the rectangles,
but I still need a way to clean them.
For the linesymbol, fillsymbol and symbol, set ROP2 = esriRasterOpCode.esriROPNotXOrPen.
|
Q:
Show that these two sums are equal
Let $C_{ij}$ be observations with indices where $i=1, \cdots, M_j$, $j=1, \cdots, J$. That is, there are $J$ groups and each group $j$ has $M_j$ observations so that in total there are $N=\sum_{j=1}^{J} M_j$ observations. Show that $$\sum_{j=1}^{J} (w_j (\overline{C}_j - \overline{C}))^2 = \sum_{j=1}^{J} (w_j \overline{C}_j - \overline{C})^2 $$
where $w_j = \frac{JM_j}{N}$, $\overline{C}_j = \frac{1}{M_j} \sum_{i=1}^{M_j} C_{ij}$ (i.e., group means), and $\overline{C} = \frac{1}{N} \sum_{j=1}^{J} \sum_{i=1}^{M_j} C_{ij} = \frac{1}{J} \sum_{j=1}^{J} w_j\overline{C}_j$ (i.e., grand mean).
A hint was given to write the LHS as: $$\sum_{j=1}^{J} (w_j \overline{C}_j - \overline{C} + \overline{C} -w_j\overline{C})^2$$
I've tried to the expand this sum but could not quite get it, what I've done so far is:
$LHS = \sum_{j=1}^{J} (w_j \overline{C}_j - \overline{C})^2 + 2\sum_{j=1}^{J}(w_j\overline{C}_j - \overline{C})(\overline{C}-w_j\overline{C}) + \sum_{j=1}^{J}(\overline{C} - w_j\overline{C})^2$
After some algebra, I can simplify:
$2\sum_{j=1}^{J}(w_j\overline{C}_j - \overline{C})(\overline{C}-w_j\overline{C}) = 2[\overline{C}^2J - \overline{C}\sum_{j=1}^{J}w_j^2\overline{C}_j]$ and $\sum_{j=1}^{J}(\overline{C} - w_j\overline{C})^2=-\overline{C}^2J + \overline{C}^2\sum_{j=1}^{J}w_j^2$ and this is as far as I got.
A:
Hint: There seems to be a typo or mistake in OP's identity.
We check the identity
\begin{align*}
\sum_{j=1}^J\left(\omega_j\left(\overline{C}_j-\overline{C}\right)\right)^2=\sum_{j=1}^J\left(\left(\omega_j\overline{C}_j-\overline{C}\right)\right)^2\tag{1}
\end{align*}
with the special values $J=2, M_1=2, M_2=1$.
We obtain
\begin{align*}
N&=M_1+M_2=3\\
\omega_1&=\frac{2M_1}{M_1+M_2}=\frac{4}{3},\quad\omega_2=\frac{2M_2}{M_1+M_2}=\frac{2}{3}\\
\overline{C}_1&=\frac{1}{M_1}\left(C_{1,1}+C_{21}\right)=\frac{1}{2}\left(C_{11}+C_{21}\right),\quad
\overline{C}_2=\frac{1}{M_2}C_{12}=C_{12}\\
\overline{C}&=\frac{1}{2}\left(\omega_1\overline{C}_1+\omega_2\overline{C}_2\right)
=\frac{1}{2}\left(\frac{4}{3}\cdot\frac{1}{2}\left(C_{11}+C_{21}\right)+\frac{2}{3}C_{12}\right)\\
&=\frac{1}{3}\left(C_{11}+C_{21}+C_{12}\right)
\end{align*}
Calculating the left-hand side of (1) gives
\begin{align*}
\color{blue}{\sum_{j=1}^2}&\color{blue}{\left(\omega_j\left(\overline{C}_j-\overline{C}\right)\right)^2}\\
&=\omega_1^2\left(\overline{C}_1-\overline{C}\right)^2+\omega_2^2\left(\overline{C}_2-\overline{C}\right)^2\\
&=\frac{16}{9}\left(\frac{1}{2}\left(C_{11}+C_{21}\right)-\frac{1}{3}\left(C_{11}+C_{21}+C_{12}\right)\right)^2\\
&\qquad+\frac{4}{9}\left(C_{12}-\frac{1}{3}\left(C_{11}+C_{21}+C_{12}\right)\right)^2\\
&=\frac{16}{9}\left(\frac{1}{6}\right)^2\left(C_{11}+C_{21}-2C_{12}\right)^2+\frac{4}{9}\left(\frac{1}{3}\right)^2\left(-C_{11}-C_{21}+2C_{12}\right)^2\\
&\,\,\color{blue}{=\frac{8}{81}\left(C_{11}+C_{21}-2C_{12}\right)^2}\tag{2}
\end{align*}
whereas the right-hand side of (1) gives
\begin{align*}
\color{blue}{\sum_{j=1}^2}&\color{blue}{\left(\omega_j\overline{C}_j-\overline{C}\right)^2}\\
&=\left(\omega_1\overline{C}_1-\overline{C}\right)^2+\left(\omega_2\overline{C}_2-\overline{C}\right)^2\\
&=\left(\frac{4}{3}\left(C_{11}+C_{21}\right)-\frac{1}{3}\left(C_{11}+C_{21}+C_{12}\right)\right)^2\\
&\qquad+\left(\frac{2}{3}C_{12}-\frac{1}{3}\left(C_{11}+C_{21}+C_{12}\right)\right)^2\\
&=\frac{1}{9}\left(3C_{11}+3C_{21}-C_{12}\right)^2+\frac{1}{9}\left(-C_{11}-C_{21}+C_{12}\right)^2\\
&\,\,\color{blue}{=\frac{1}{9}\left(\left(3C_{11}+3C_{21}-C_{12}\right)^2+\left(C_{11}+C_{21}-C_{12}\right)^2\right)}\tag{3}
\end{align*}
So, if this calculation is correct, we see that (2) and (3) generally differ invalidating the claim (1).
|
Q:
Connection Error for MSSQL and CheckMK
I'm running MSSQL 2017 on Server 2016 and monitoring it via CheckMK. I'm getting critical alerts that state:
Failed to connect to database (ERROR: [DBNETLIB][ConnectionOpen (SECCreateCredentials()).]SSL Security error. (SQLState: 08001/NativeError: 18))CRIT, Version: 14.0.1000.169 - Standard Edition
We have TLS 1.2 enabled and TLS 1.0 and 1.1 disabled.
Does anyone have any idea what this issue may be, and the fix for it? I thought maybe the Native Client was too old, but after further review I don't believe so.
A:
The issue was due to the connection string being built from the plugin. The plugin builds the connection string from a deprecated provider that only supports TLS 1.0. Changing the line in the plugin (VBS) line #225
FROM: 'CONN.Provider = "sqloledb"
TO: CONN.Provider = "SQLNCLI11"
resolves the issue.
(best if you just comment out the line and add the new provider below it)
|
Document 405123
Israel
ISRAEL
2015 JOHN HAGEE MINISTRIES GIFTS TO ISRAEL
From Page 2
raeli flags waved in the air and people of all races, and Christians and
Jews alike, joined together inside
the grand sanctuary. The peoples’
excitement spread like wildfire.
Everyone was so warm and welcoming, and people whom we
never before had met introduced
themselves and thanked us for our
support for Israel. Pastor Hagee
then walked to the pulpit.
The room turned silent as everyone eagerly listened to every
word he spoke.
The respect that the audience
had for this man was evident. We
were swept away by his strong, inspirational words and firm belief in
PAGE 17
JEWISH HERALD -VOICE
NOVEMBER 6, 2014
Friends of the Israel Defense Forces .............. $50,000
Meir Panim.................................................... $50,000
Nahal Haredi ................................................. $50,000
Women’s International Zionist Organization .... $50,000
Kefar Tsevi Sitrin ........................................... $50,000
Yad Vashem .................................................. $50,000
Afikim Family Enrichment Centers ................ $75,000
Heart of Benjamin ......................................... $75,000
Israel Help & Education Center at Kiryat Gat . $75,000
American Jewish Joint Distribution Committee $75,000
Koby Mandell Foundation............................... $75,000
Or L’Doron ..................................................... $75,000
World ORT ..................................................... $75,000
Avukat Or ..................................................... $100,000
the protection and security of the
State of Israel, and we no longer
felt alone in our love for Israel. We
were standing with thousands of
other people, Christians and Jews,
Bikur V’Ezras Cholim.................................... $100,000
Jewish Agency for Israel ............................... $100,000
Jewish Federation of Greater Houston ........... $100,000
Just One Life ................................................ $100,000
Father Gabriel Naddaf .................................. $100,000
Ohr Torah Stone ............................................ $100,000
International Council of Young Israel ............. $100,000
Save a Child’s Heart Foundation.................... $125,000
Netanya Academic College ............................ $150,000
Western Galilee Hospital ............................... $150,000
Shurat Hadin................................................. $200,000
Magen David Adom ...................................... $250,000
Nefesh B’Nefesh ........................................... $400,000
Total ........................................................... $2,900,000
who shared the same passion for
Israel as we did.
Pastor Hagee was not the only
one who blew us away that night.
Prager solidified Pastor Hagee’s
ideas by asking the question Jewish people tend to ask themselves
when making new friends: “If there
is another Holocaust, would this
non-Jew hide me?” A man from
the audience immediately shouted
“Yes!” It was at that moment when
we realized the amount of support
behind us as Jews in our fight to
continue the prosperity and happiness in the land of Israel.
We had the incredible opportunity to speak with Prager and Amb.
Dermer at the reception. “You are
advocates for Israel. Your generation will be the ones fighting for
the Jewish people of our future,”
Dermer reminded us.
We can never stop fighting for
Israel and our beliefs. We will not
allow the injustices of our past to
repeat themselves because as Ron
Dermer expressed in his speech,
“when Israel says never again, we
mean never again!”
MARKETPLACE
EMPLOYMENT
BUSINESS/
FINANCIAL
LEGAL NOTICES
Do You Need Mailing Help for Your Small Business, Organization or Non-Profit?
Do You Need Mailing Help for Your Small Business, Organization or Non-Profit?
Mosk &
& Mosk
Mosk LLC
LLC
Mosk
Certified Public Accountants
Certifi&
ed&
Public
Accountants
Mosk
&Mosk
Mosk
LLC
Mosk
LLC
Mosk
Mosk
LLC
Certifi
ed
Public
Accountants
Certifi
ed
Public
Accountants
5959
West
Loop
South,
Suite 340
Certifi
ed
Public
Accountants
5959 West
Loop TX
South,
Suite 340
Bellaire,
77401
Contact JFS DISABILITY SERVICES For a List of Ways Our Participants Can Help You!
Contact JFS DISABILITY SERVICES For a List of Ways Our Participants Can Help You!
Celebration Company can provide an array of
Celebration Company can provide an array of
services for small businesses, organizations and nonservices for small businesses, organizations and nonprofits including: Stamping, stuffing, sealing, labeling
profits including: Stamping, stuffing, sealing, labeling
for mailing greeting cards, flyers, newsletters, etc.
Disability Services
for mailing greeting cards, flyers, newsletters, etc.
Disability
Services
www.jfshouston.org
Celebration Company provides life skills and
www.jfshouston.org
Celebration Company provides life skills and
meaningful employment to individuals with
meaningful employment to individuals with
disabilities who, with joy and purpose, provide
disabilities who, with joy and purpose, provide
services and create products that celebrate the good
services and create products that celebrate the good
Please call:
of life.
MichelePlease
Arnoldcall:
713.667.4727
ofThis
life.
Michele
Arnold 713.667.4727
listing is co-sponsored by the Jewish Herald-Voice.
[email protected]
M
M
M
M
M
M
M
M
M
M
5959
West
Loop
South,
Suite
340
Bellaire,
TX
77401
5959
West
Loop
South,
Suite
340 340
5959
West
Loop
South,
Suite
Bellaire,
TX77401
77401
Bellaire,
TX TX
77401
Bellaire,
713-665-MOSK (6675)
713-665-MOSK
(6675)
713-665-MOSK
(6675)
713-665-MOSK
Denise
& Milton(6675)
Mosk
III
Denise
& Milton
Mosk
713-665-MOSK
(6675)
Denise
& Milton
Mosk
Denise
& Milton
Mosk
IIIIII III
Denise & Milton Mosk III
www.moskandmosk.com
HEBREW FREE LOAN ASSOCIATION – offers interest-free
loans for qualified applicants. For more
information, visit hfla.net or call 713667-9336, ext. 221.
[email protected]
This listing is co-sponsored by the Jewish Herald-Voice.
CHILD CARE
NOTICE TO ALL PERSONS
HAVING CLAIMS AGAINST
THE ESTATE OF
MARGARET ROSE MCLELLAND
Notice is hereby given in Cause Number 433281, styled Estate of MARGARET
ROSE MCLELLAND, Deceased, that
original Letters Testamentary were issued on October 29, 2014, pending in the
Probate Court Number Three, of Harris
County, Texas. All persons having claims
against the estate shall present the same
within the time prescribed by law. Claims
may be presented to the said representative at the address below and said personal representative direct that any such
claims be presented to the attorney for
said representative.
SAMMY MCLELLAND MUNSON,
EXECUTRIX
C/O LAWRENCE R. SILVER,
ATTORNEY AT LAW
281-589-1040
2305 SOUTH HIGHWAY 6, SUITE 1,
HOUSTON, TEXAS 77077
ADMIN ASST NEEDED IN SW PATIENT RELATIONS COORDIHEALTH CARE
NATOR/OFFICE MANAGER – in
RETIRED SUNDAY SCHOOL HOUSTON. Must have excellent a multi-provider Mental Health Practice
Ad is O.K.
computer
skills
in
Excel,
Word,
and
To:______________________________
From:__________________________
TEACHER – will pick up your child
in Bellaire. Openings for both full-time
CARE
FOR
for after-school care. Hebrew tutoring knowledge of Publisher helpful. Previous ($30-40,000 per year) and part-time AFFORDABLE
O.K. with
corrections
SENIORS – 4-24 hrs./$15hr.
Bathmail merge experience and emailAD
blasts aPROOF
JEWISH
HERALD-VOICE
optional. Meyerland-Bellaire
area only.
Preparation,
plus. Also past experience in proofreading ($9-14.00 per hour). Send resume to ing Assistance, Meal Ad
is
O.K.
713-774-1686.
11-06-14-01
Please go recommended.
over this proof
CAREFULLY.
To:______________________________
From:__________________________
Medication Reminders,Change
Light
Will be
responsible
for all [email protected]
Ad is House
O.K.
copy
To:______________________________
From:__________________________
Keeping, Transportation
Service.charge)
administrative duties for event planning.
(additional
O.K. with corrections
HERALD-VOICE
AD
PROOF
If we have not received thisJEWISH
form or
heard
fromEmail
youresumes
by the
date, FOR
we will
LOOKING
A assume
YOUNG Background Check. 713-956-8183,
O.K. with corrections
Excellent
benefits.
to:return
JEWISH
HERALD-VOICE
AD
PROOF
C
O
M
P
U
T
E
R
S
that the advertisement is O.K., and
it will
IS.
LEADERSHIP ASSOCIATE – to 20+years experience.
Please
go run
overAS
this
proof CAREFULLY.
[email protected]
Change copy
Please go over this proof CAREFULLY.
Change copy
provide strategic direction for activities
(additional
charge)
A no
SMALL
COM- this
There is
for
typesetting
corrections.
However,
if
copy
is
changed,
an
Ifcharge
weOFFICE/HOME
have
not
received
form
or
heard
from
you
by
the
return
date,
we
will
assume
17 YEARS EXPERIENCE
AT THE charge)
(additional
thereturn
young adults
in we
the community
EXECUTIVE
ASSISTANT
–you
full-by of
If
we
have
not
received
this
form
or
heard
from
the
date,
will
assume
PUTER
SERVICE
offering
computer
that the advertisement
is O.K.,
andavailable
it and
will run
IS. in to
Signature
additional make-up
charge will be
assessed
insertion
the
JH-V
may have
to be
caregiver, cooking,
create
innovative
approaches
to FORUM – as Advertiser’s
position
SW AS
Houston.
that the
O.K.,
and it willinrun
AS
IS.
and network
setup,advertisement
maintenance and istime
assisting
with
bathing
and
personal
Please
return
to
our office by
engage
young
people,
coordinate
You
will
be
providing
exceptional
support
postponed
to
a
later
date.
Ad
is
O.K.
is no
charge
for typesetting corrections.
However, if copy is changed, an
training,There
hardware/software
upgrades,
To:______________________________
From:__________________________
Tender
There
noallcharge
typesetting
corrections.
if copy
is changed,
anand needs, errands, medication.
development
initiative
to the
CEO.
Ideal
candidate and
mustHowever,
have leadership
Advertiser’s
Signature
Internet,
email, isand
aspects for
of JEWISH
additional
make-up
charge
will
be
assessed
insertion
in
the
JH-V
may
have
to
be
O.K.care,
with corrections
HERALD-VOICE
AD PROOF
Please computer
O.K. additional
and
mail
or
FAX back
immediately.
loving
14 yearsAdvertiser’s
with last client.
Signature
facilitate
involvement
in thehave
annualto be
charge
will computer
be assessed
insertion
in the
JH-V may
advanced
skills & beand
proficient
use. Call
Sammake-up
713-592-8844.
Please
return to our Date
office by
Time
postponed
to
a later date.
Please
over
this proof
CAREFULLY.
Edith,
713-995campaign. An excellent competitive Excellent
return
to our office by
Change references.
copy Please
in MS
Word,go
Excel,
Outlook,
PowerPoint,
Fax: to
713-630-0404
Phone:
713-630-0391
postponed
a later date.
(additional charge)
compensation
is available for 7595.
and this
relational
database
skills. you
Must
Please O.K.
and
mail
or FAX
back
If we
have
not received
formimmediately.
or
heard from
by be
the return
date, wepackage
will assume
COMPUTER
REPAIR
AND
Time
Date
Please O.K. and
mail or FAX
back
immediately.
advertisement
is O.K.,
and
itorientated,
will run ASand
IS. have
the successful candidate. Email resume
accurate,
detail
VIRUS REMOVALthat
– the
20 years
of713-630-0404
Time
Date
Fax:
Phone:
713-630-0391
Ad isCERTIFIED
O.K.
To:______________________________
From:__________________________
CHILD/
CAREGIVER
Fax:
713-630-0404
Phone:
713-630-0391
to:
[email protected]
ability
to
multitask.
5+
yrs.
experience
at
There
is
no
charge
for
typesetting
corrections.
However,
if
copy
is
changed,
an
experience. Call Steve 281-744-0606.
• Letourreadersknowthe
fs data: Firestone,
PestCon
/ Firestone,
2003
Folder
– CNA
andSignature
culinary artist. Please call
O.K.Advertiser’s
with
corrections
additional
make-up JEWISH
charge
willHERALD-VOICE
be
assessed
and
insertion
in the
JH-V may
have to be
AD PROOF
the
executive
level
a must.PestCon.
Competitive
typesoflegalservicesyour
Please
return
to
our
office
by
Griselda
at
832-971-5588.
postponed to a latersalary
date.Please
go over thisbenefit
proof CAREFULLY.
ALES
AND
MARKETINGChange copy
& comprehensive
package
file: Firestone,
PestCon
01-08-2003
fs data:
Firestone,
PestCon
/ or
Firestone,
PestCon.
2003
Folder
(additional charge)
lawfirmhastooffer.
REPRESENTATIVE
–
Houston
If
we
have
not
received
this
form
heard
from
you
by
the
return
date,
we
will
assume
Please
O.K.
and
mail
or
FAX
back
immediately.
offered.
Send
resume
to:
[email protected]
fs data:
PestCon
/ Firestone,
PestCon. 2003 Folder
F I T N EFirestone,
S Sthat the advertisement
Time
Date
is01-08-2003
O.K., and it will run AS
IS.
CNA – Looking to
non-medical home care provider is EXPERIENCE
Fax:
713-630-0404
Phone:
713-630-0391
file:Steve
Firestone,
PestCon
Production:
P.
Revised:
HC
houstonjewish.org.
• Tellourreadershipabout
file: Firestone,
01-08-2003
There is PestCon
no charge for typesetting
corrections. However, if copy
is changed,
looking
for a an
person experienced in give love care and champion to the
Advertiser’s Signature
Production:
Steve
P. Revised:
HC and insertion in the
additional
make-up
charge will be assessed
JH-V may have to be
FITNESS
IN PRIVATE:
Through
auniqueservicethatmakes
elderly
and
assist
with
all
needs.
Call
the
medical
services
area.
Strongly
Production:
Steve
HC
Please return to our office by
postponed
to aP.
laterRevised:
date.
fs data:
Firestone,
PestCon
/ Firestone,
PestCon. 2003 Folder
the Looking
Glass
with
Alice!
Visit
our
website:
me Genelle 713-452-9785.
prefer
expertise
in
social
media
youstandoutinyourfield.
O.K. andPestCon
mail or FAX 01-08-2003
back immediately.
offers private gymfile:
inPlease
Meyerland
Firestone,
Time
Date
marketing. Send resumé to [email protected]
Fax: 713-630-0404
Phone: 713-630-0391
neighborhood. One-on-one
nutrition,
Production: Steve P.jhvonline.com
Revised: HC
• Doyouhaveanexclusive
persontopersoncareservices.com.
H OME I M P R OVE ME N T
strength training, cardiovascular.
promotiontoattractnew
fs data:
PestCon / Firestone, PestCon. 2003 Folder
“I’ve used Alice’s services
for Firestone,
the
clients?
past 10 years and had great
results!
file: Firestone,
PestCon 01-08-2003 P E S T C O N T R O L
She has created a warmProduction:
and private Steve P. Revised: HC
• Leteveryoneknowby
space, where I always felt comfortable
advertisingintheHerald!
and saw results!” – Elyse Kalmans.
Contact Alice: [email protected][email protected],
Plumbing
net, 713-248-7459.
ext.302.
“Call the Best,
We’ll do the Rest!”
WHAT ARE THE FACTS?
PLUMBCO
713-725-5025
FOR SALE
Termite &
FOR SALE – Sofa/bed good condition,
large office desk w/chair, large library
bookcase, marble round table with
4 chairs; White bedroom furniture:
Double bed, double mattresses, chair,
large desk, fan, lamp. 832-746-3191.
&
Termite Termite
&Pest Control,
Termite
& Inc.
Pest
Control,
.
Pest Control,
Inc
. Inc
Termite
&
Pest Control,
Inc.
(281) 403-0134
Pest Control, Inc.
(281) 403-0134
(281)
403-0134
403-0134
(281)(281)
403-0134
Safe Effective Solutions To All Your Pest Problems
SECURITY SYSTEMS AND SURVEILLANCE
Safe Effective Solutions To All Your Pest Problems
Safe Effective Solutions To All Your Pest Problems
Safe Effective
Solutions
To AllPest
Your Problems
Pest Problems
Safe Effective
Solutions
To All Your
Three Cats
PRINTING
Need to place your ad
on this page? Contact
Joseph Macias at
[email protected]
Real Printing – Not Digital!
JHV Special - Mention this ad
250 Business Cards • Black Ink
up to 8 lines of type on White Stock
8.95
$
Publishing
MPL 17021
www.threecatspublishing.com • [email protected]
The protection you need, from
the company you trust!
• Commercial and Residential Alarm Systems and Monitoring
• Security Cameras IP Technology • Intercoms
• Access Control Systems • Home Theater
Guy Mizrahi • License No. B16951
713-668-8818 • www.megasystemssecurity.com
School’s in Session: Slow Down
Watch for Children |
“But to hear someone meant to start the fire is very upsetting. I can’t believe such an evil attack could happen in our own backyard.”
A fellow Cateswell Road resident, who asked not to be named, compared the tragedy to the Phillpott case in Derbyshire, in which dad Mick and his wife Mairead were convicted of killing six of their kids in a blaze.
The former factory worker said: “It makes you think about that awful Philpott thing.
“I can’t believe someone meant to start the fire.
“What is the world coming to?”
Mum-of-three Satntha Bendichauhan said: “All of my family are shocked.
“We just can’t understand why someone would set fire to a house with a whole family inside.” |
Archer Ants
do you want a republican president and congress for the next 20 years?
because this is how you get a republican president and congress for the next 20 years |
Q:
How to modify 'last status change' (ctime) property of a file in Unix?
I know there's a way to modify both 'modification' (mtime) and 'last access' (atime) time properties of a given file in Unix System by using "touch" command.
But I'm wondering whether there exists a way to modify "Last status change" (ctime) property, as well?
A:
ctime is the time the file's inode was last changed. mtime is the last time the file's CONTENTS were changed. To modify ctime, you'll have to do something to the inode, such as doing a chmod or chown on the file.
Changing the file's contents will necessarily also update ctime, as the atime/mtime/ctime values are stored in the inode. Modifying mtime means ctime also gets updated.
|
// Generated by CoffeeScript 1.12.7
/*
ExternalEditor
Kevin Gravier <kevin@mrkmg.com>
MIT
*/
(function() {
var ChatDet, CreateFileError, ExternalEditor, FS, IConvLite, LaunchEditorError, ReadFileError, RemoveFileError, Spawn, SpawnSync, Temp,
bind = function(fn, me){ return function(){ return fn.apply(me, arguments); }; };
FS = require('fs');
Temp = require('tmp');
SpawnSync = require('child_process').spawnSync;
Spawn = require('child_process').spawn;
IConvLite = require('iconv-lite');
ChatDet = require('chardet');
CreateFileError = require('./errors/CreateFileError');
ReadFileError = require('./errors/ReadFileError');
RemoveFileError = require('./errors/RemoveFileError');
LaunchEditorError = require('./errors/LaunchEditorError');
ExternalEditor = (function() {
ExternalEditor.edit = function(text) {
var editor;
if (text == null) {
text = '';
}
editor = new ExternalEditor(text);
editor.run();
editor.cleanup();
return editor.text;
};
ExternalEditor.editAsync = function(text, callback) {
var editor;
if (text == null) {
text = '';
}
editor = new ExternalEditor(text);
return editor.runAsync(function(error_run, text) {
var error_cleanup;
if (!error_run) {
try {
editor.cleanup();
if (typeof callback === 'function') {
return setImmediate(callback, null, text);
}
} catch (error) {
error_cleanup = error;
if (typeof callback === 'function') {
return setImmediate(callback, error_cleanup, null);
}
}
} else {
if (typeof callback === 'function') {
return setImmediate(callback, error_run, null);
}
}
});
};
ExternalEditor.CreateFileError = CreateFileError;
ExternalEditor.ReadFileError = ReadFileError;
ExternalEditor.RemoveFileError = RemoveFileError;
ExternalEditor.LaunchEditorError = LaunchEditorError;
ExternalEditor.prototype.text = '';
ExternalEditor.prototype.temp_file = void 0;
ExternalEditor.prototype.editor = {
bin: void 0,
args: []
};
ExternalEditor.prototype.last_exit_status = void 0;
function ExternalEditor(text1) {
this.text = text1 != null ? text1 : '';
this.launchEditorAsync = bind(this.launchEditorAsync, this);
this.launchEditor = bind(this.launchEditor, this);
this.removeTemporaryFile = bind(this.removeTemporaryFile, this);
this.readTemporaryFile = bind(this.readTemporaryFile, this);
this.createTemporaryFile = bind(this.createTemporaryFile, this);
this.determineEditor = bind(this.determineEditor, this);
this.cleanup = bind(this.cleanup, this);
this.runAsync = bind(this.runAsync, this);
this.run = bind(this.run, this);
this.determineEditor();
this.createTemporaryFile();
}
ExternalEditor.prototype.run = function() {
this.launchEditor();
return this.readTemporaryFile();
};
ExternalEditor.prototype.runAsync = function(callback) {
var error_launch;
try {
return this.launchEditorAsync((function(_this) {
return function() {
var error_read;
try {
_this.readTemporaryFile();
if (typeof callback === 'function') {
return setImmediate(callback, null, _this.text);
}
} catch (error) {
error_read = error;
if (typeof callback === 'function') {
return setImmediate(callback, error_read, null);
}
}
};
})(this));
} catch (error) {
error_launch = error;
if (typeof callback === 'function') {
return setImmediate(callback, error_launch, null);
}
}
};
ExternalEditor.prototype.cleanup = function() {
return this.removeTemporaryFile();
};
ExternalEditor.prototype.determineEditor = function() {
var args, ed, editor;
ed = /^win/.test(process.platform) ? 'notepad' : 'vim';
editor = process.env.VISUAL || process.env.EDITOR || ed;
args = editor.split(/\s+/);
this.editor.bin = args.shift();
return this.editor.args = args;
};
ExternalEditor.prototype.createTemporaryFile = function() {
var e;
try {
this.temp_file = Temp.tmpNameSync({});
return FS.writeFileSync(this.temp_file, this.text, {
encoding: 'utf8'
});
} catch (error) {
e = error;
throw new CreateFileError(e);
}
};
ExternalEditor.prototype.readTemporaryFile = function() {
var buffer, e, encoding;
try {
buffer = FS.readFileSync(this.temp_file);
if (!buffer.length) {
return this.text = '';
}
encoding = ChatDet.detect(buffer);
return this.text = IConvLite.decode(buffer, encoding);
} catch (error) {
e = error;
throw new ReadFileError(e);
}
};
ExternalEditor.prototype.removeTemporaryFile = function() {
var e;
try {
return FS.unlinkSync(this.temp_file);
} catch (error) {
e = error;
throw new RemoveFileError(e);
}
};
ExternalEditor.prototype.launchEditor = function() {
var e, run;
try {
run = SpawnSync(this.editor.bin, this.editor.args.concat([this.temp_file]), {
stdio: 'inherit'
});
return this.last_exit_status = run.status;
} catch (error) {
e = error;
throw new LaunchEditorError(e);
}
};
ExternalEditor.prototype.launchEditorAsync = function(callback) {
var child_process, e;
try {
child_process = Spawn(this.editor.bin, this.editor.args.concat([this.temp_file]), {
stdio: 'inherit'
});
return child_process.on('exit', (function(_this) {
return function(code) {
_this.last_exit_status = code;
if (typeof callback === 'function') {
return callback();
}
};
})(this));
} catch (error) {
e = error;
throw new LaunchEditorError(e);
}
};
return ExternalEditor;
})();
module.exports = ExternalEditor;
}).call(this);
|
Q:
What are some good distractions for an infant?
My 4 month old is nearly able to sit up on his own and has gotten rather bored with activity mats, swings, and hanging toys. The only things of his he still likes, are a bit too advanced to hold his interest long; he enjoys his stacking cups and blocks, but lacks enough coordination to not get frustrated. He only seems to be happy if we hold him constantly and wants us to keep him in a standing position most of the time.
Do any of you know of any good toys that could keep him entertained so my wife and I could get a bit of a break?
A:
You could replace the activity mat with an activity walker. Even though he doesn't walk yet, the upright orientation is new to him and encourages sitting up so he can reach the upper parts. Or lay it flat on the floor to begin with.
Amazon: search for baby walker
|
Case: 15-11963 Date Filed: 10/21/2016 Page: 1 of 16
[DO NOT PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 15-11963
Non-Argument Calendar
________________________
D.C. Docket No. 1:14-cr-20330-JAL-1
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
MARLAN L. COPELAND,
BRANNOC K. RUDD,
Defendants-Appellants.
________________________
Appeals from the United States District Court
for the Southern District of Florida
________________________
(October 21, 2016)
Before ED CARNES, Chief Judge, MARTIN and ANDERSON, Circuit Judges.
PER CURIAM:
Case: 15-11963 Date Filed: 10/21/2016 Page: 2 of 16
A federal grand jury charged Marlan Copeland, his brother Vory Copeland,
and Brannoc Rudd with one count of conspiracy to commit an offense against the
United States, 18 U.S.C. § 371; five counts of theft of government property, 18
U.S.C. § 641; one count of conspiracy to commit wire fraud, 18 U.S.C. § 1349;
three counts of wire fraud, 18 U.S.C. § 1343; and eight counts of aggravated
identity theft, 18 U.S.C. § 1028A(a)(1).1 At trial the jury found Copeland guilty of
conspiracy to commit an offense against the United States, five counts of theft of
government property, and five counts of aggravated identity theft, and it found him
not guilty of the remaining charges. The jury found Rudd guilty of conspiracy to
commit an offense against the United States and it found him not guilty of all other
charges. The district court sentenced Copeland to 72 months imprisonment and
Rudd to 60 months imprisonment. They appeal their convictions and sentences.
I.
Rudd operated a tax preparation business called Electronic Tax and
Insurance Consultants. His business worked with two banks: Santa Barbara Bank
and Wachovia Bank. For many years he used Santa Barbara Bank to offer refund
anticipation loans (RALs) and refund transfers (RTs) to his clients. Those services
permitted a client to obtain tax preparation services without paying a fee up front.
With an RAL, the bank would immediately loan the client the anticipated refund
1
The district court severed Vory Copeland’s trial, and he is appealing separately. To
avoid confusion, in this opinion we will refer to him as “Copeland’s brother.”
2
Case: 15-11963 Date Filed: 10/21/2016 Page: 3 of 16
minus its and Rudd’s fees, and once the IRS processed the tax return, it would send
the refund directly to the bank. With an RT, the IRS would send the refund to the
bank, which would in turn deduct its and Rudd’s fees, and then Rudd would issue
to the client a check for the remainder of the refund. Rudd’s clients depended on
using one of those two services, so when Santa Barbara Bank stopped offering
them in late 2009 or early 2010, his business was in trouble.
In 2009 Copeland’s brother’s tax preparation business, Tax Express of South
Florida (Tax Express), moved next door to Rudd’s firm. In January 2010 Rudd,
who for years had conducted business at a nearby Wachovia branch, took the
Copelands there to open a business checking account for Tax Express. That new
account listed the Copelands and Rudd as authorized signatories who each could
make deposits and withdrawals. While they were there Rudd introduced the
Copelands as his new tax business partners to bank employee Marsha Wooten.
Wachovia had a rule that only account holders could cash checks and that
the account-holding payee had to be present when the check was cashed. But
because Wooten knew and trusted Rudd, she allowed Copeland and Rudd to cash
checks made out to payees who were not account holders, and she allowed them to
do so in the payees’ absence. She testified that Rudd or Copeland would show her
a driver’s license bearing the payee’s name, and she would write the driver’s
license number on the front of the check before cashing it. Each check that she
3
Case: 15-11963 Date Filed: 10/21/2016 Page: 4 of 16
cashed for Copeland and Rudd appeared to be signed by the payee. From February
to April of 2010 Rudd and Copeland had Wooten cash a number of tax refund
checks issued by the United States Treasury made payable to individuals other than
themselves. It turned out that a number of those checks were fraudulently obtained
through falsely filed tax returns.
At trial a criminal investigator for the IRS testified that forty-four percent of
the tax returns filed through Tax Express were fraudulent. Seventeen victims of
the check cashing scheme also testified at trial. Each testified that they had either
filed a 2009 tax return but had not received a refund, or they had not filed a return
and had not expected a refund. They also all testified that their names were on the
checks that Wooten cashed for Rudd and Copeland, but that they never received
those checks or the funds from them, and that they had not authorized anyone else
to cash them.
Rudd testified on his own behalf, asserting that he did not know that the
check cashing transactions were fraudulent and that Copeland paid him $100 for
every check he helped cash to compensate him for walking the half mile from his
office to the bank. He testified that Copeland would go with him to the bank and
that Copeland always provided the checks along with the payees’ driver’s license
information. Rudd also testified that between 1988 and when he began working
4
Case: 15-11963 Date Filed: 10/21/2016 Page: 5 of 16
with the Copelands in 2010 he did not regularly cash checks on his clients’ behalf,
though he had occasionally done so with their permission.
II.
A.
Both Copeland and Rudd challenge the sufficiency of the evidence, though
they do so on different grounds. We review de novo the sufficiency of the
evidence to support a jury verdict, looking at the evidence in the light most
favorable to the verdict, and “we will not disturb a guilty verdict unless, given the
evidence in the record, no trier of fact could have found guilt beyond a reasonable
doubt.” United States v. White, 663 F.3d 1207, 1213 (11th Cir. 2011) (quotation
marks omitted). Further, we “draw all reasonable inferences and resolve all
questions of credibility in [the verdict’s] favor.” Id. (quotation marks omitted).
Copeland contends that the evidence was insufficient to show that he knew
that the checks he cashed were stolen — a showing necessary to support each of
his eleven convictions. He focuses on the lack of direct evidence that he knew the
checks were stolen, but knowledge can be — and in many cases, often can only be
— shown through circumstantial evidence. See, e.g., United States v. Sosa, 777
F.3d 1279, 1290 (11th Cir. 2015) (“This Court has made clear that, ‘[b]ecause the
crime of conspiracy is predominantly mental in composition, it is frequently
necessary to resort to circumstantial evidence to prove its elements.’”) (quoting
5
Case: 15-11963 Date Filed: 10/21/2016 Page: 6 of 16
United States v. Toler, 144 F.3d 1423, 1426 (11th Cir. 1998)). Here, the evidence
showed that a large number of tax returns were fraudulently filed through Tax
Express, a business with which Copeland was associated. The jury could have
inferred from this high volume of fraudulently filed returns that Copeland’s
cashing of the refund checks was part of the broader tax fraud and identity theft
scheme. And the evidence showed that Copeland brought the checks and driver’s
licenses to the bank, which supports an inference that he knew the checks
originated from fraudulently-filed returns, that the licenses were fake, and that the
payees had not authorized that the checks be cashed. A reasonable jury faced with
this evidence could have found that Copeland knew that the checks were stolen.
Rudd challenges the sufficiency of the evidence supporting his conspiracy
conviction on two grounds. First, he contends that his conspiracy conviction
should be reversed because the evidence was insufficient to show that he
knowingly entered into the conspiracy to commit an offense against the United
States. At trial Rudd testified that he did not know that he was engaging in illegal
activity. The jury’s guilty verdict establishes that it rejected that testimony, and it
was permitted to consider that testimony as substantive evidence of his guilt. See
United States v. Brown, 53 F.3d 312, 314 (11th Cir. 1995) (“[A] statement by a
defendant, if disbelieved by the jury, may be considered as substantive evidence of
the defendant’s guilt.”).
6
Case: 15-11963 Date Filed: 10/21/2016 Page: 7 of 16
Likewise, the jury was also permitted to reject Rudd’s testimony that he
legitimately charged a $100 fee to walk a half mile to the bank. It could have
taken that testimony as substantive evidence that the Copelands paid him that
money to abuse Wooten’s trust and to help them cash the checks. The evidence
was sufficient for the jury to infer that Rudd was a knowing and voluntary
participant in the check cashing conspiracy.
Rudd’s second insufficiency of the evidence argument focuses on the
government’s failure to show that the United States, as opposed to the payees
themselves, was the targeted victim of the conspiracy. Rudd did not raise this
argument in the district court, and so we review the fact that the district court did
not acquit him on this ground only for manifest miscarriage of justice. See United
States v. Esquenazi, 752 F.3d 912, 935 (11th Cir. 2014) (“Where the specific
grounds upon which a defendant made his sufficiency-of-the-evidence challenge at
trial differ from those he asserts on appeal, we review under his new theory only
for manifest miscarriage of justice.”). In other words, we reverse for insufficient
evidence only if the conviction is “shocking.” Id. (quotation marks omitted). “In
order to charge a violation under § 371, the government must show that the
defendant conspired to commit one or more substantive offenses against the United
States, or that the defendant conspired to defraud the government in any manner or
for any purpose.” United States v. Harmas, 974 F.2d 1262, 1266 (11th Cir. 1992)
7
Case: 15-11963 Date Filed: 10/21/2016 Page: 8 of 16
(emphasis added). In other words, § 371 provides “two alternative means of
committing a violation.” Id. Rudd was charged under § 371 for conspiracy to
commit an offense against the United States, and to prove he was guilty of that
charge “the government need not allege or prove that the United States or an
agency thereof was an intended victim of the conspiracy.” United States v.
Falcone, 960 F.2d 988, 990 (11th Cir. 1992) (quotation marks omitted). The
government’s evidence that the conspiracy targeted the refund checks’ payees was
enough. The district court did not err in not acquitting Rudd on that ground.
B.
Copeland and Rudd also challenge certain evidentiary rulings. We review
those rulings for an abuse of discretion, and even where the district court has
abused its discretion “that ruling will result in reversal only if the error was not
harmless.” United States v. Khanani, 502 F.3d 1281, 1292 (11th Cir. 2007).
Copeland contends that the district court erred in allowing the government,
under Federal Rule of Evidence 404(b), to use as evidence of his intent his prior
conviction for issuing a worthless check. Evidence of a crime or other wrong may
be admissible under Rule 404(b) to prove intent. Fed. R. Evid. 404(b). To be
admissible, however, “the prior act must be proved sufficiently to permit a jury
determination that the defendant committed the act.” United States v. Chavez, 204
F.3d 1305, 1317 (11th Cir. 2000).
8
Case: 15-11963 Date Filed: 10/21/2016 Page: 9 of 16
Copeland argues that his prior conviction for issuing a worthless check,
which was based on a nolo contendere plea, was insufficient to show that he had
actually issued a worthless check. While the government cannot use a nolo
contendere plea to prove that a defendant admitted his guilt, see Fed. R. Evid. 410,
that plea does not prevent admission under Federal Rule of Evidence 404(b) of the
facts underlying the conviction from which the plea was derived. See United
States v. Wyatt, 762 F.2d 908, 911 (11th Cir. 1985). And “[i]t is elementary that a
conviction is sufficient proof that [a defendant] committed the prior act.” United
States v. Calderon, 127 F.3d 1314, 1332 (11th Cir. 1997). That Copeland’s prior
conviction arose from a nolo contendere plea “is inconsequential.” Id. The
government introduced the conviction, not the plea upon which it was based, as
evidence of intent under Federal Rule of Evidence 404(b). And that conviction
was sufficient to allow the jury to find that he had previously issued a worthless
check. The district court did not abuse its discretion by allowing the government
to introduce Copeland’s prior conviction.
While Copeland challenges what the district court allowed as evidence,
Rudd challenges what the district court excluded as evidence. Specifically, Rudd
contends that the district court erred by barring testimony from four of his former
clients and his expert witness. As to his four former-client witnesses, Rudd argued
in the district court that their testimony was admissible under Federal Rule of
9
Case: 15-11963 Date Filed: 10/21/2016 Page: 10 of 16
Evidence 405(a). He now argues instead that the district court should have
recognized on its own that their testimony was admissible under Federal Rule of
Evidence 406 to show his habit of cashing checks without the payees present but
with their authorization. 2
Rudd raises his Federal Rule of Evidence 406 argument for the first time on
appeal, and we review it only for plain error. See United States v. Smith, 459 F.3d
1276, 1295 (11th Cir. 2006). Here, the district court did not plainly err in failing to
recognize that the witnesses’ testimony was admissible as evidence of habit. Rudd
offered their testimony about specific prior occasions when they had given him
permission to cash their tax refund checks on their behalf, which he now says
corroborates his testimony that he had a habit of doing so.
Under Rule 406 “[e]vidence of a person’s habit . . . may be admitted to
prove that on a particular occasion [he] acted in accordance with that habit . . . .”
Fed. R. Evid. 406. We have emphasized, however, that habit “is never to be lightly
established, and evidence of example, for purpose of establishing such habit, is to
be carefully scrutinized before admission.” Loughan v. Firestone Tire & Rubber
Co., 749 F.2d 1519, 1524 (11th Cir. 1985). Specifically, “[i]t is only when
2
Rudd also mentions in passing an alleged Sixth Amendment violation arising from
those evidentiary rulings, but he does not offer any argument in support. And he contends that
Federal Rule of Evidence 405(a) was an alternative basis for admitting the witnesses’ testimony,
but he offers no explanation or argument to support that contention. Those two claims are
abandoned. See Sapuppo v. Allstate Floridian Ins. Co., 739 F.3d 678, 681 (11th Cir. 2014) (“We
have long held that an appellant abandons a claim when he either makes only passing references
to it or raises it in a perfunctory manner without supporting arguments and authority.”).
10
Case: 15-11963 Date Filed: 10/21/2016 Page: 11 of 16
examples offered to establish such pattern of conduct or habit are ‘numerous
enough to base an inference of systematic conduct,’ that examples are admissible.”
Id. (quoting Wilson v. Volkswagen of America, Inc., 561 F.2d 494, 511 (4th Cir.
1977)).
Rudd testified that between 1988 and 2010 he did not regularly cash checks
for his clients. In light of that testimony, the district court did not plainly err when
it did not recognize that the witness’ testimony giving examples to establish
Rudd’s alleged habit of systematically cashing clients’ checks was admissible
under Federal Rule of Evidence 406.
Rudd also contends that the district court abused its discretion in excluding
his expert witness’ testimony about the difference between RALs and RTs and
whether Santa Barbara Bank offered those services. The district court excluded
Rudd’s expert under Federal Rule of Evidence 403 because the testimony had little
probative value, was cumulative, and was likely to confuse the jury. At trial,
government witness Christopher Bagg, a Santa Barbara Bank employee, testified
generally about RALs, RTs, the difference between them, and about if and when
Santa Barbara Bank offered them. Rudd argues that his expert’s testimony was not
cumulative because it would have clarified Bagg’s testimony about whether Santa
Barbara Bank offered RALs and RTs before 2010. Both Copeland’s and Rudd’s
counsel cross-examined Bagg, and during that cross-examination counsel pressed
11
Case: 15-11963 Date Filed: 10/21/2016 Page: 12 of 16
him on the issue of whether Santa Barbara Bank provided RALs and RTs. And
Bagg testified about what RALs and RTs are and about the differences between
them on direct and cross-examination. Because Rudd’s expert’s testimony offered
background details that Bagg had already given, the district court did not abuse its
discretion in finding that it would have been cumulative and would have obscured
the key issues at trial.3
Rudd next argues that his trial counsel’s failure to argue that the four former
client witnesses’ testimony was admissible under Federal Rule of Evidence 406
constituted ineffective assistance of counsel. We seldom decide ineffective
assistance of counsel claims on direct appeal, and we decline to do so here. Rudd
can raise this claim in a 28 U.S.C. § 2255 proceeding.
C.
Rudd also contends that the district court erred in giving a deliberate
ignorance instruction. “We apply a deferential standard of review to a trial court’s
jury instructions [and will] only reverse if we are left with substantial and
eradicable doubt as to whether the jury was properly guided in its deliberations.”
3
While Rudd also argues that the district court’s exclusion of all of his witnesses also
violated his Fifth Amendment right to present a full defense, “it is axiomatic that a defendant’s
right to present a full defense does not entitle him to place before the jury irrelevant or otherwise
inadmissible evidence.” United States v. Ruggiero, 791 F.3d 1281, 1290 (11th Cir. 2015).
Because his witnesses’ testimony was inadmissible, the district court did not violate Rudd’s Fifth
Amendment rights.
12
Case: 15-11963 Date Filed: 10/21/2016 Page: 13 of 16
United States v. Steed, 548 F.3d 961, 977 (11th Cir. 2008) (quotation marks
omitted). The district court instructed the jury on deliberate ignorance as follows:
The government may prove that a person acted knowingly by proving
beyond a reasonable doubt that the person deliberately closed his eyes
to what otherwise would have been obvious to him. One cannot avoid
responsibility for an offense by deliberately ignoring what is obvious.
But I must emphasize that negligence, carelessness or foolishness isn’t
sufficient to prove knowledge.
Rudd contends that the district court erred in giving that instruction because no
evidence showed that he was deliberately ignorant of the Copelands’ fraud. He
further argues that the charge itself was faulty because it did not include an
example of deliberate ignorance provided in the Eleventh Circuit Pattern Jury
Instructions. However, “So long as the instructions accurately reflect the law, the
trial judge is given wide discretion as to the style and wording employed in the
instructions.” United States v. Zlatogur, 271 F.3d 1025, 1029 (11th Cir. 2001).
Rudd offers no persuasive reason why the instruction that was given failed to
properly state the law, and we consider as abandoned his claim that the instruction
was faulty. See Sapuppo, 739 F.3d at 681.
As for Rudd’s argument that the district court’s decision to give the
instruction, the deliberate ignorance instruction is not appropriate when the
evidence only goes to actual knowledge and not intentional avoidance of
knowledge. Steed, 548 F.3d at 977. Any error in giving the instruction, however,
is harmless “if the jury could have convicted on an alternative, sufficiently
13
Case: 15-11963 Date Filed: 10/21/2016 Page: 14 of 16
supported theory of actual knowledge.” United States v. Kennard, 472 F.3d 851,
858 (11th Cir. 2006). As we have already explained, the evidence was sufficient
to support a finding of Rudd’s actual knowledge of the fraud, so any error in giving
the deliberate ignorance instruction is harmless. See United States v. Stone, 9 F.3d
934, 938 (11th Cir. 1993) (“If . . . there was insufficient evidence of deliberate
ignorance to prove that theory beyond a reasonable doubt, then the jury, following
the instruction, as we must assume it did, did not convict on deliberate ignorance
grounds. The only way we can conclude that the deliberate ignorance instruction
was harmful is if we assume that the jury applied the instruction contrary to its
express terms. That is an assumption which we cannot and will not make.”).
D.
Finally, Copeland and Rudd each challenge their sentences. They contend
that the district court violated their Sixth Amendment rights during sentencing by
considering conduct for which they were acquitted. We have squarely and
repeatedly rejected the contention that it is a Sixth Amendment violation to
consider acquitted conduct in sentencing for the offense of conviction. See, e.g.,
United States v. Faust, 456 F.3d 1342, 1347 (11th Cir. 2006).
Rudd also argues that the district court erred in applying a two level
obstruction of justice enhancement under the sentencing guidelines because the
evidence was insufficient to support the district court’s finding that he committed
14
Case: 15-11963 Date Filed: 10/21/2016 Page: 15 of 16
perjury at trial. Here we “review the district court’s findings of fact for clear error
and the application of the Guidelines to those facts de novo.” United States v.
Bradberry, 466 F.3d 1249, 1253 (11th Cir. 2006). Section 3C1.1 of the sentencing
guidelines provides that a two level enhancement is appropriate if the district court
finds that “the defendant willfully obstructed or impeded, or attempted to obstruct
or impede, the administration of justice,” U.S.S.G. § 3C1.1, which can include
perjury. See United States v. Dunnigan, 507 U.S. 87, 93–94, 113 S. Ct. 1111,
1115–16 (1993). The district court found that Rudd committed perjury when he
testified that he did not know about the fraudulent nature of the conspiracy. Rudd
argues that the district court erroneously based that finding solely on the jury’s
guilty verdict.
While “not every accused who testifies at trial and is convicted will incur an
enhanced sentence under § 3C1.1 for committing perjury,” United States v.
Dunnigan, 507 U.S. 87, 95, 113 S. Ct. 1111, 1117 (1993), the district court did not
clearly err by finding that Rudd committed perjury. For the jury to have returned a
guilty verdict, it necessarily had to reject Rudd’s testimony that he did not know
the fraudulent nature of the scheme. And the district court found that Rudd gave
that testimony knowing it was false in an attempt to deceive the jury into believing
that he was innocent. The district court did not err by imposing a two level
obstruction of justice enhancement to Rudd’s sentence.
15
Case: 15-11963 Date Filed: 10/21/2016 Page: 16 of 16
AFFIRMED.
16
|